-
-
Notifications
You must be signed in to change notification settings - Fork 571
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Fails to capture traffic from most non-physical interfaces #30
Comments
For the "No traffic has been observed yet. Waiting for network packets..." I can do nothing: it depends on what pcap is actually able to sniff in term of kind of interface. Thank you for having reported the problem with the "any" interface though, I think I have the solution for that one. In the meantime, you can observe the traffic by choosing the specific interface (wlan0 and other actually receiving packets) |
Not sure if it's the same issue, but I get the same message for the For reference, i'm running Arch linux with the linux-hardened kernel and systemd-networkd for networking + wireguard. Are there specific flags for outputting debug logs via the cli? |
I confirm that it's the same issue. |
Similar issue but maybe not identical. I use wirguard on MacOS and tunnel everything through that interface. I am only able to observe updates when selecting the wlan interface but all that shows is that it is communicating with my wg-server endpoint. It does not actually seperate out the different connections being made through wg. When I select any of the other interfaces in the list, it just says waiting for packets/data. Is it possible to use something like wg and see what is being sent through the tunnel itself in more detail? |
If no packets are received through a given interface, the problem is not related to Sniffnet itself but to what rust-pcap is actually able to sniffs. |
If you click on the network host you are interested in, you will see a list of its connections. Isn't it? |
Sniffnet currently defines a "connection" by the network-5-tuple:
If you see only one connection it means that all the exchanged packets are from/to the same ports. |
Yes, technically that is correct. Because. wireguard being a tunelling protocol, all connections that my laptop makes gets sent through this tunnel from my laptop to the server. The server then acts a forwarding proxy and makes the actual connection to the desired remote server. So currently sniffnet just sees that all packets are going from my laptop to my server. I guess what I am hearing is that it is not possible for sniffnet to intercept the packets prior to them being encrypted and sent through the tunnel so as to see where the request is actually being made. Great project though. Thanks for your efforts |
Sniffnet can see everything directly incoming/outgoing to/from your network card. If it doesn't see some specific interfaces, it's a problem related to pcap which I'd like to better understand myself. |
I think I've finally understood the nature of this problem: so far Sniffnet was only able to read interfaces whose "link_type" was Ethernet. Today I've found out that I wasn't able to monitor the traffic on my OpenVPN TUN adapter because it uses Null/Loopback as link type (see the screenshot below made using Wireshark). So, I'm considering to add support for the Null/Loopback with the hope to solve the problem you guys mentioned as well, which is strictly related. Before proceeding I would like to know if even in your scenarios the link type is Null/Loopback. Thank you in advance for your cooperation @vi @muzzah @3lpsy |
Related issue: JulianSchmid/etherparse#78 |
This issue is being closed by #421 Unluckily, parsing packets from the I'm opening a separate issue to also keep track of that. |
Describe the bug
It works for
wlan0
or veth interfaces, but fails for non-Ethernet-like things likeany
or wireguard.To Reproduce
cargo install sniffnet
on Linux Debian 11.any
.Expected behavior
It considers the same packets as e.g.
tcpdump -i any
.Actual behavior
"No traffic can be observed because the adapter you selected has no active addresses"
or
"No traffic has been observed yet. Waiting for network packets..."
The text was updated successfully, but these errors were encountered: