[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[MiNT] Weird ping reply



Hi,

I the following packet sniff there is a ping request and response packets shown captured from an artificial network between Windows and MiNT (SpareMiNT) installation running in ARAnyM. I wonder why the reply HW address in the destination packet is not the source one taken from the request packet. The Windows network is a bridge over two connections if it helps.

Request:
>    Destination: 00:41:45:54:48:30 (00:41:45:54:48:30)
>    Source: 02:41:41:41:41:41 (02:41:41:41:41:41)

Reply:
>    Destination: 00:50:18:05:3a:aa (Advanced_05:3a:aa)
>    Source: 00:41:45:54:48:30 (00:41:45:54:48:30)

Perhaps there is something I am missing completely in netwoking, please help.

STanda


======================= Cut =================
No. Time Source Destination Protocol Info 16 15.036576 192.168.0.222 192.168.0.223 ICMP Echo (ping) request

Frame 16 (74 bytes on wire, 74 bytes captured)
    Arrival Time: Nov 25, 2004 11:36:42.125426000
    Time delta from previous packet: 0.029008000 seconds
    Time since reference or first frame: 15.036576000 seconds
    Frame Number: 16
    Packet Length: 74 bytes
    Capture Length: 74 bytes
Ethernet II, Src: 02:41:41:41:41:41, Dst: 00:41:45:54:48:30
    Destination: 00:41:45:54:48:30 (00:41:45:54:48:30)
    Source: 02:41:41:41:41:41 (02:41:41:41:41:41)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 192.168.0.222 (192.168.0.222), Dst Addr: 192.168.0.223 (192.168.0.223)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
    Total Length: 60
    Identification: 0x6b3e (27454)
    Flags: 0x00
    Fragment offset: 0
    Time to live: 128
    Protocol: ICMP (0x01)
    Header checksum: 0x4c75 (correct)
    Source: 192.168.0.222 (192.168.0.222)
    Destination: 192.168.0.223 (192.168.0.223)
Internet Control Message Protocol
    Type: 8 (Echo (ping) request)
    Code: 0
    Checksum: 0x395c (correct)
    Identifier: 0x0300
    Sequence number: 0x1100
    Data (32 bytes)

0000  00 41 45 54 48 30 02 41 41 41 41 41 08 00 45 00   .AETH0.AAAAA..E.
0010  00 3c 6b 3e 00 00 80 01 4c 75 c0 a8 00 de c0 a8   .<k>....Lu......
0020  00 df 08 00 39 5c 03 00 11 00 61 62 63 64 65 66   ....9\....abcdef
0030  67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76   ghijklmnopqrstuv
0040  77 61 62 63 64 65 66 67 68 69                     wabcdefghi

No. Time Source Destination Protocol Info 17 15.037698 192.168.0.223 192.168.0.222 ICMP Echo (ping) reply

Frame 17 (74 bytes on wire, 74 bytes captured)
    Arrival Time: Nov 25, 2004 11:36:42.126548000
    Time delta from previous packet: 0.001122000 seconds
    Time since reference or first frame: 15.037698000 seconds
    Frame Number: 17
    Packet Length: 74 bytes
    Capture Length: 74 bytes
Ethernet II, Src: 00:41:45:54:48:30, Dst: 00:50:18:05:3a:aa
    Destination: 00:50:18:05:3a:aa (Advanced_05:3a:aa)
    Source: 00:41:45:54:48:30 (00:41:45:54:48:30)
    Type: IP (0x0800)
Internet Protocol, Src Addr: 192.168.0.223 (192.168.0.223), Dst Addr: 192.168.0.222 (192.168.0.222)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
    Total Length: 60
    Identification: 0x00e4 (228)
    Flags: 0x00
    Fragment offset: 0
    Time to live: 255
    Protocol: ICMP (0x01)
    Header checksum: 0x37cf (correct)
    Source: 192.168.0.223 (192.168.0.223)
    Destination: 192.168.0.222 (192.168.0.222)
Internet Control Message Protocol
    Type: 0 (Echo (ping) reply)
    Code: 0
    Checksum: 0x415c (correct)
    Identifier: 0x0300
    Sequence number: 0x1100
    Data (32 bytes)

0000  00 50 18 05 3a aa 00 41 45 54 48 30 08 00 45 00   .P..:..AETH0..E.
0010  00 3c 00 e4 00 00 ff 01 37 cf c0 a8 00 df c0 a8   .<......7.......
0020  00 de 00 00 41 5c 03 00 11 00 61 62 63 64 65 66   ....A\....abcdef
0030  67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76   ghijklmnopqrstuv
0040  77 61 62 63 64 65 66 67 68 69                     wabcdefghi