[shara] playground for port restricted IP with ping, traceroute and ftp -A

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Thu, 03 February 2011 10:22 UTC

Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: shara@core3.amsl.com
Delivered-To: shara@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6CC143A68D8 for <shara@core3.amsl.com>; Thu, 3 Feb 2011 02:22:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.536
X-Spam-Level:
X-Spam-Status: No, score=0.536 tagged_above=-999 required=5 tests=[AWL=0.626, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qKASIinWpUMN for <shara@core3.amsl.com>; Thu, 3 Feb 2011 02:22:39 -0800 (PST)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by core3.amsl.com (Postfix) with SMTP id C2C6B3A68F1 for <shara@ietf.org>; Thu, 3 Feb 2011 02:22:38 -0800 (PST)
Received: (qmail 93349 invoked from network); 3 Feb 2011 10:32:02 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 3 Feb 2011 10:32:02 -0000
Message-ID: <4D4A8256.5040804@necom830.hpcl.titech.ac.jp>
Date: Thu, 03 Feb 2011 19:24:22 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ja; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: shara@ietf.org
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
Subject: [shara] playground for port restricted IP with ping, traceroute and ftp -A
X-BeenThere: shara@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Sharing of an IPv4 Address discussion list <shara.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/shara>
List-Post: <mailto:shara@ietf.org>
List-Help: <mailto:shara-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Feb 2011 10:22:40 -0000

Dear all;

I have set up an environment in which you can try to use port
restricted IP with end to end transparency.

Though my implementation is with end to end NAT, it should
be able to interoperate with A+P and/or PE-ARP based system,
if some of you implement them and ICMP ID and sequence
numbers are appropriately treated as port numbers.

There are two private networks with two gateways (enatg1, enatg2).

Private network behind enatg1 has two end-to-end-NAT-aware hosts
(enate1 and enate2) and a normal router (e2enatgwp).

Private network behind enatg2 has an end-to-end-NAT-aware host
(enage3).

                  public internet
                       |
--------+--------------+------------------+------
        | 131.112.32.141                    | 131.112.32.142
      enatg1                              enatg2
        | 192.168.1.1                       | 192.168.1.1
--+-----+----------------+-------        ---+---
  | 192.168.1.2          | 192.168.1.3      | 192.168.1.2
enate1                e2enatgwp           enate3
(port 100, 200, ...,     | 192.168.2.1   (port 100, 200, ...,
of 131.112.32.141)    ---+---            of 131.112.32.142)
                         | 192.168.2.2
                      enate2
                      (port 150, 250, 350, ..,
                      of 131.112.32.142)

you can login all the hosts with user name and password of "guest".
e2enatgwp may be logged in indirectly from other hosts shareing
a private network.

You can use traceroute (optionally with "-I")

	enate2% traceroute -q 1 -n -p 31000.100 131.112.32.142
	 1  192.168.2.1  0.484 ms
	 2  192.168.1.1  0.651 ms
	 3  131.112.32.142  2.078 ms
	 4  131.112.32.142  2.487 ms
	enate2% traceroute -q 1 -n -p 31000.100 131.112.32.142

and see details with tcpdump

	enatg1% tcpdump -l -vvv -n -i wm0 icmp

					Masataka Ohta