Re: Multicast & Tunnel devices
- Reply: Dirk-Willem van Gulik : "Re: Multicast & Tunnel devices"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 29 Apr 2024 17:52:28 UTC
>
>
> > On 29 Apr 2024, at 03:09, Rodney W. Grimes <freebsd-rwg@gndrsh.dnsmgr.net> wrote:
> >
> >> Would anyone know if there is something special with tunnel devices and multicast ?
> >>
> >> I?ve got some code that happily processes multicast packets on a normal interface; but appears not to do this on a tunnel interface. Tun0 shows multicast enabled:
> >>
> >> tun0: flags=8043<UP,BROADCAST,RUNNING,MULTICAST> metric 0 mtu 1500
> >>
> >> Tcpdump on that interface gives the expected thing (here with mDNS):
> >>
> >> tcpdump -n -i tun0 port 5353
> >> listening on tun0, link-type NULL (BSD loopback), capture size 262144 bytes
> >> 19:26:03.976259 IP 10.31.0.6.5353 > 224.0.0.251.5353: 0 PTR (QM)? _raop._tcp.local. (34)
> >>
> >> And code, with a simple IP_ADD_MEMBERSHIP of the MC group on the IP of the local interface below works on a normal interface (e.g. igb0/10.0.0.1/24).
> >>
> >> ./listener 10.0.0.1 224.0.0.251 5353
> >
> > Is 10.0.0.1 the IP address of tun0, or is it the address of some other interface?
> > I suspect that the IP address of the tun0 interface is 10.31.0.6 from your tcpdump above.
>
> That is correct 10.0.0.1/8. 10.31.0.6 is another machine at the other end of the tunnel broadcasting.
>
> > IIRC you have to join multicast group on all interfaces you expect to receive mustcast packets on.
> >
> >> Received packet, len=128
> >> etc
> >>
> >> But yields no output if ran against above tun0 interface (while tcpdump on same is fine). Does that ring a bell with anyone ?
> >>
> >> Dw
> >>
> >>
> >> int main(int argc, char *argv[])
> >> {
> >> struct sockaddr_in addr;
> >> struct ip_mreq mreq;
> >>
> >> // skip error trapping command line arguments
> >>
> >> char* ip = argv[1];
> >> char* group = argv[2];
> >> int port = atoi(argv[3]); // 0 if error, which is an invalid port
> >>
> >> memset(&addr, 0, sizeof(addr));
> >> addr.sin_family = AF_INET;
> >> addr.sin_addr.s_addr = htonl(INADDR_ANY);
> >> addr.sin_port = htons(port);
> >>
> >> mreq.imr_interface.s_addr = inet_addr(ip);
> >> mreq.imr_multiaddr.s_addr = inet_addr(group);
> >>
> >> // skip error trapping on inet_addr
> >>
> >> int fd = socket(AF_INET, SOCK_DGRAM, 0);
> >> // skip error trapping socket
> >>
> >> if (bind(fd, (struct sockaddr*) &addr, sizeof(addr)) < 0) {
> >> // skip error trapping
> >>
> >> if (setsockopt(fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, (char*) &mreq, sizeof(mreq)) < 0 ){
> >> // skip error trapping argumetns
> >>
> >> while (1) {
> >> ..
> >> int nbytes = recvfrom(fd,msgbuf,MSGBUFSIZE,0,(struct sockaddr *) &addr,&addrlen);
> >> if (nbytes < 0) {
> >> perror("recvfrom");
> >> return 1;
> >> }
> >> printf(?Received packet, len=%d\n", nbytes);
> >> }
> >>
>
--
Rod Grimes rgrimes@freebsd.org