tcpcopy
tcpcopy copied to clipboard
tcpdump捕获了大量的镜像包,但是访问日志内数据却很少
目前的部署方式,在线服务器(10.10.159.99),测试服务器和辅助服务器(10.10.136.11)放在一台上,测试服务器能够抓到大量的包,但是访问日志内请求数据却很少,执行命令如下: ./intercept -i eth0 -F tcp and src port 80 -d ./tcpcopy -x 80-10.10.136.11:80 -s 10.10.136.11 -d
抓获的数据包如下: 16:57:21.207052 IP 10.10.251.35.60291 > 10.10.136.11.80: Flags [S], seq 1697152367, win 28800, options [mss 1440,sackOK,TS val 857761608 ecr 0,nop,wscale 9], length 0 16:57:21.207096 IP 10.10.136.11.80 > 10.10.251.35.60291: Flags [S.], seq 1902579325, ack 1697152368, win 28040, options [mss 1414,sackOK,TS val 541331270 ecr 857761608,nop,wscale 7], length 0 16:57:21.207193 IP 10.10.251.35.60291 > 10.10.136.11.80: Flags [R], seq 1697152368, win 0, length 0 16:57:21.207891 IP 10.10.251.34.14955 > 10.10.136.11.80: Flags [S], seq 2660399339, win 28800, options [mss 1440,sackOK,TS val 859746607 ecr 0,nop,wscale 9], length 0 16:57:21.207927 IP 10.10.136.11.80 > 10.10.251.34.14955: Flags [S.], seq 3176313919, ack 2660399340, win 28040, options [mss 1414,sackOK,TS val 541331271 ecr 859746607,nop,wscale 7], length 0 16:57:21.208032 IP 10.10.251.34.14955 > 10.10.136.11.80: Flags [R], seq 2660399340, win 0, length 0 16:57:21.209946 IP 10.10.251.37.25766 > 10.10.136.11.80: Flags [S], seq 2969922405, win 28800, options [mss 1440,sackOK,TS val 857135612 ecr 0,nop,wscale 9], length 0 16:57:21.210001 IP 10.10.136.11.80 > 10.10.251.37.25766: Flags [S.], seq 2177301660, ack 2969922406, win 28040, options [mss 1414,sackOK,TS val 541331273 ecr 857135612,nop,wscale 7], length 0 16:57:21.210092 IP 10.10.251.37.25766 > 10.10.136.11.80: Flags [R], seq 2969922406, win 0, length 0 16:57:21.210161 IP 10.10.251.35.60291 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.210192 IP 10.10.136.11.80 > 10.10.251.35.60291: Flags [R], seq 1902579326, win 0, length 0 16:57:21.210189 IP 10.10.251.35.60291 > 10.10.136.11.80: Flags [P.], seq 1:735, ack 1, win 57, length 734 16:57:21.210231 IP 10.10.136.11.80 > 10.10.251.35.60291: Flags [R], seq 1902579326, win 0, length 0 16:57:21.210190 IP 10.10.251.37.25766 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.210249 IP 10.10.136.11.80 > 10.10.251.37.25766: Flags [R], seq 2177301661, win 0, length 0 16:57:21.210191 IP 10.10.251.37.25766 > 10.10.136.11.80: Flags [P.], seq 1:671, ack 1, win 57, length 670 16:57:21.210260 IP 10.10.136.11.80 > 10.10.251.37.25766: Flags [R], seq 2177301661, win 0, length 0 16:57:21.211274 IP 10.10.251.35.60386 > 10.10.136.11.80: Flags [S], seq 59220496, win 28800, options [mss 1440,sackOK,TS val 857761612 ecr 0,nop,wscale 9], length 0 16:57:21.211343 IP 10.10.136.11.80 > 10.10.251.35.60386: Flags [S.], seq 3682945646, ack 59220497, win 28040, options [mss 1414,sackOK,TS val 541331274 ecr 857761612,nop,wscale 7], length 0 16:57:21.211429 IP 10.10.251.35.60386 > 10.10.136.11.80: Flags [R], seq 59220497, win 0, length 0 16:57:21.211555 IP 10.10.251.34.14955 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.211600 IP 10.10.136.11.80 > 10.10.251.34.14955: Flags [R], seq 3176313920, win 0, length 0 16:57:21.211622 IP 10.10.251.34.14955 > 10.10.136.11.80: Flags [P.], seq 1:735, ack 1, win 57, length 734 16:57:21.211625 IP 10.10.251.36.13926 > 10.10.136.11.80: Flags [S], seq 4140228613, win 28800, options [mss 1440,sackOK,TS val 857450613 ecr 0,nop,wscale 9], length 0 16:57:21.211649 IP 10.10.136.11.80 > 10.10.251.34.14955: Flags [R], seq 3176313920, win 0, length 0 16:57:21.211620 IP 10.10.251.35.60386 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.211669 IP 10.10.136.11.80 > 10.10.251.36.13926: Flags [S.], seq 3428288448, ack 4140228614, win 28040, options [mss 1414,sackOK,TS val 541331275 ecr 857450613,nop,wscale 7], length 0 16:57:21.211692 IP 10.10.136.11.80 > 10.10.251.35.60386: Flags [R], seq 3682945647, win 0, length 0 16:57:21.211623 IP 10.10.251.35.60386 > 10.10.136.11.80: Flags [P.], seq 1:677, ack 1, win 57, length 676 16:57:21.211709 IP 10.10.136.11.80 > 10.10.251.35.60386: Flags [R], seq 3682945647, win 0, length 0 16:57:21.211770 IP 10.10.251.36.13926 > 10.10.136.11.80: Flags [R], seq 4140228614, win 0, length 0 16:57:21.211837 IP 10.10.251.36.13926 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.211854 IP 10.10.136.11.80 > 10.10.251.36.13926: Flags [R], seq 3428288449, win 0, length 0 16:57:21.211855 IP 10.10.251.36.13926 > 10.10.136.11.80: Flags [P.], seq 1:673, ack 1, win 57, length 672 16:57:21.211875 IP 10.10.136.11.80 > 10.10.251.36.13926: Flags [R], seq 3428288449, win 0, length 0 16:57:21.214579 IP 10.10.251.34.15009 > 10.10.136.11.80: Flags [S], seq 3171064599, win 28800, options [mss 1440,sackOK,TS val 859746614 ecr 0,nop,wscale 9], length 0 16:57:21.214631 IP 10.10.136.11.80 > 10.10.251.34.15009: Flags [S.], seq 3387837857, ack 3171064600, win 28040, options [mss 1414,sackOK,TS val 541331278 ecr 859746614,nop,wscale 7], length 0 16:57:21.214725 IP 10.10.251.34.15009 > 10.10.136.11.80: Flags [R], seq 3171064600, win 0, length 0 16:57:21.214822 IP 10.10.251.34.15009 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.214858 IP 10.10.136.11.80 > 10.10.251.34.15009: Flags [R], seq 3387837858, win 0, length 0 16:57:21.214823 IP 10.10.251.34.15009 > 10.10.136.11.80: Flags [P.], seq 1:736, ack 1, win 57, length 735 16:57:21.214884 IP 10.10.136.11.80 > 10.10.251.34.15009: Flags [R], seq 3387837858, win 0, length 0 16:57:21.215725 IP 10.10.251.37.25783 > 10.10.136.11.80: Flags [S], seq 1738513694, win 28800, options [mss 1440,sackOK,TS val 857135617 ecr 0,nop,wscale 9], length 0 16:57:21.215789 IP 10.10.136.11.80 > 10.10.251.37.25783: Flags [S.], seq 2816685897, ack 1738513695, win 28040, options [mss 1414,sackOK,TS val 541331279 ecr 857135617,nop,wscale 7], length 0 16:57:21.215894 IP 10.10.251.37.25783 > 10.10.136.11.80: Flags [R], seq 1738513695, win 0, length 0 16:57:21.215963 IP 10.10.251.35.60414 > 10.10.136.11.80: Flags [S], seq 493389072, win 28800, options [mss 1440,sackOK,TS val 857761617 ecr 0,nop,wscale 9], length 0 16:57:21.216005 IP 10.10.136.11.80 > 10.10.251.35.60414: Flags [S.], seq 692835079, ack 493389073, win 28040, options [mss 1414,sackOK,TS val 541331279 ecr 857761617,nop,wscale 7], length 0 16:57:21.215962 IP 10.10.251.37.25783 > 10.10.136.11.80: Flags [R.], seq 1, ack 1, win 57, length 0 16:57:21.216108 IP 10.10.251.35.60414 > 10.10.136.11.80: Flags [R], seq 493389073, win 0, length 0 16:57:21.216161 IP 10.10.251.35.60414 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.216181 IP 10.10.136.11.80 > 10.10.251.35.60414: Flags [R], seq 692835080, win 0, length 0 16:57:21.216240 IP 10.10.251.35.60414 > 10.10.136.11.80: Flags [P.], seq 1:682, ack 1, win 57, length 681 16:57:21.216264 IP 10.10.136.11.80 > 10.10.251.35.60414: Flags [R], seq 692835080, win 0, length 0 16:57:21.216257 IP 10.10.251.35.60418 > 10.10.136.11.80: Flags [S], seq 480244296, win 28800, options [mss 1440,sackOK,TS val 857761617 ecr 0,nop,wscale 9], length 0 16:57:21.216286 IP 10.10.136.11.80 > 10.10.251.35.60418: Flags [S.], seq 3525785955, ack 480244297, win 28040, options [mss 1414,sackOK,TS val 541331279 ecr 857761617,nop,wscale 7], length 0 16:57:21.216389 IP 10.10.251.35.60418 > 10.10.136.11.80: Flags [R], seq 480244297, win 0, length 0 16:57:21.216433 IP 10.10.251.34.15019 > 10.10.136.11.80: Flags [S], seq 2071244414, win 28800, options [mss 1440,sackOK,TS val 859746616 ecr 0,nop,wscale 9], length 0 16:57:21.216432 IP 10.10.251.35.60418 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.216462 IP 10.10.136.11.80 > 10.10.251.35.60418: Flags [R], seq 3525785956, win 0, length 0 16:57:21.216450 IP 10.10.251.35.60418 > 10.10.136.11.80: Flags [P.], seq 1:733, ack 1, win 57, length 732 16:57:21.216486 IP 10.10.136.11.80 > 10.10.251.34.15019: Flags [S.], seq 649325165, ack 2071244415, win 28040, options [mss 1414,sackOK,TS val 541331279 ecr 859746616,nop,wscale 7], length 0 16:57:21.216504 IP 10.10.136.11.80 > 10.10.251.35.60418: Flags [R], seq 3525785956, win 0, length 0 16:57:21.216586 IP 10.10.251.34.15019 > 10.10.136.11.80: Flags [R], seq 2071244415, win 0, length 0 16:57:21.216656 IP 10.10.251.34.15019 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.216688 IP 10.10.136.11.80 > 10.10.251.34.15019: Flags [R], seq 649325166, win 0, length 0 16:57:21.216657 IP 10.10.251.34.15019 > 10.10.136.11.80: Flags [P.], seq 1:687, ack 1, win 57, length 686 16:57:21.216717 IP 10.10.136.11.80 > 10.10.251.34.15019: Flags [R], seq 649325166, win 0, length 0 16:57:21.218924 IP 10.10.251.37.25797 > 10.10.136.11.80: Flags [S], seq 3819559054, win 28800, options [mss 1440,sackOK,TS val 857135621 ecr 0,nop,wscale 9], length 0 16:57:21.218979 IP 10.10.136.11.80 > 10.10.251.37.25797: Flags [S.], seq 502857887, ack 3819559055, win 28040, options [mss 1414,sackOK,TS val 541331282 ecr 857135621,nop,wscale 7], length 0 16:57:21.219074 IP 10.10.251.37.25797 > 10.10.136.11.80: Flags [R], seq 3819559055, win 0, length 0 16:57:21.219161 IP 10.10.251.37.25797 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.219191 IP 10.10.136.11.80 > 10.10.251.37.25797: Flags [R], seq 502857888, win 0, length 0 16:57:21.219163 IP 10.10.251.37.25797 > 10.10.136.11.80: Flags [P.], seq 1:688, ack 1, win 57, length 687 16:57:21.219213 IP 10.10.136.11.80 > 10.10.251.37.25797: Flags [R], seq 502857888, win 0, length 0 16:57:21.220809 IP 10.10.251.36.13946 > 10.10.136.11.80: Flags [S], seq 1705109000, win 28800, options [mss 1440,sackOK,TS val 857450622 ecr 0,nop,wscale 9], length 0 16:57:21.220843 IP 10.10.136.11.80 > 10.10.251.36.13946: Flags [S.], seq 2019292126, ack 1705109001, win 28040, options [mss 1414,sackOK,TS val 541331284 ecr 857450622,nop,wscale 7], length 0 16:57:21.220919 IP 10.10.251.36.13946 > 10.10.136.11.80: Flags [R], seq 1705109001, win 0, length 0 16:57:21.221004 IP 10.10.251.36.13946 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.221029 IP 10.10.136.11.80 > 10.10.251.36.13946: Flags [R], seq 2019292127, win 0, length 0 16:57:21.221026 IP 10.10.251.36.13946 > 10.10.136.11.80: Flags [P.], seq 1:732, ack 1, win 57, length 731 16:57:21.221056 IP 10.10.136.11.80 > 10.10.251.36.13946: Flags [R], seq 2019292127, win 0, length 0 16:57:21.223304 IP 10.10.251.35.60477 > 10.10.136.11.80: Flags [S], seq 1332516872, win 28800, options [mss 1440,sackOK,TS val 857761624 ecr 0,nop,wscale 9], length 0 16:57:21.223374 IP 10.10.136.11.80 > 10.10.251.35.60477: Flags [S.], seq 1592280304, ack 1332516873, win 28040, options [mss 1414,sackOK,TS val 541331286 ecr 857761624,nop,wscale 7], length 0 16:57:21.223452 IP 10.10.251.35.60477 > 10.10.136.11.80: Flags [R], seq 1332516873, win 0, length 0 16:57:21.223695 IP 10.10.251.35.60477 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.223802 IP 10.10.136.11.80 > 10.10.251.35.60477: Flags [R], seq 1592280305, win 0, length 0 16:57:21.223722 IP 10.10.251.35.60477 > 10.10.136.11.80: Flags [P.], seq 1:701, ack 1, win 57, length 700 16:57:21.223857 IP 10.10.136.11.80 > 10.10.251.35.60477: Flags [R], seq 1592280305, win 0, length 0 16:57:21.224227 IP 10.10.251.35.60482 > 10.10.136.11.80: Flags [S], seq 1998986114, win 28800, options [mss 1440,sackOK,TS val 857761624 ecr 0,nop,wscale 9], length 0 16:57:21.224269 IP 10.10.251.34.15051 > 10.10.136.11.80: Flags [S], seq 3645847296, win 28800, options [mss 1440,sackOK,TS val 859746624 ecr 0,nop,wscale 9], length 0 16:57:21.224280 IP 10.10.136.11.80 > 10.10.251.35.60482: Flags [S.], seq 1801472981, ack 1998986115, win 28040, options [mss 1414,sackOK,TS val 541331287 ecr 857761624,nop,wscale 7], length 0 16:57:21.224317 IP 10.10.136.11.80 > 10.10.251.34.15051: Flags [S.], seq 3033276433, ack 3645847297, win 28040, options [mss 1414,sackOK,TS val 541331287 ecr 859746624,nop,wscale 7], length 0 16:57:21.224423 IP 10.10.251.35.60482 > 10.10.136.11.80: Flags [R], seq 1998986115, win 0, length 0 16:57:21.224435 IP 10.10.251.34.15051 > 10.10.136.11.80: Flags [R], seq 3645847297, win 0, length 0 16:57:21.224558 IP 10.10.251.35.60482 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.224600 IP 10.10.136.11.80 > 10.10.251.35.60482: Flags [R], seq 1801472982, win 0, length 0 16:57:21.224609 IP 10.10.251.35.60482 > 10.10.136.11.80: Flags [P.], seq 1:683, ack 1, win 57, length 682 16:57:21.224625 IP 10.10.136.11.80 > 10.10.251.35.60482: Flags [R], seq 1801472982, win 0, length 0 16:57:21.224666 IP 10.10.251.34.15051 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.224699 IP 10.10.136.11.80 > 10.10.251.34.15051: Flags [R], seq 3033276434, win 0, length 0 16:57:21.224713 IP 10.10.251.34.15051 > 10.10.136.11.80: Flags [P.], seq 1:735, ack 1, win 57, length 734 16:57:21.224733 IP 10.10.136.11.80 > 10.10.251.34.15051: Flags [R], seq 3033276434, win 0, length 0 16:57:21.226223 IP 10.10.251.35.60504 > 10.10.136.11.80: Flags [S], seq 1624219052, win 28800, options [mss 1440,sackOK,TS val 857761626 ecr 0,nop,wscale 9], length 0 16:57:21.226273 IP 10.10.136.11.80 > 10.10.251.35.60504: Flags [S.], seq 1273815715, ack 1624219053, win 28040, options [mss 1414,sackOK,TS val 541331289 ecr 857761626,nop,wscale 7], length 0 16:57:21.226226 IP 10.10.251.36.13958 > 10.10.136.11.80: Flags [S], seq 485031038, win 28800, options [mss 1440,sackOK,TS val 857450627 ecr 0,nop,wscale 9], length 0 16:57:21.226313 IP 10.10.136.11.80 > 10.10.251.36.13958: Flags [S.], seq 1106924661, ack 485031039, win 28040, options [mss 1414,sackOK,TS val 541331289 ecr 857450627,nop,wscale 7], length 0 16:57:21.226384 IP 10.10.251.35.60504 > 10.10.136.11.80: Flags [R], seq 1624219053, win 0, length 0 16:57:21.226395 IP 10.10.251.36.13958 > 10.10.136.11.80: Flags [R], seq 485031039, win 0, length 0 16:57:21.226476 IP 10.10.251.35.60504 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.226519 IP 10.10.136.11.80 > 10.10.251.35.60504: Flags [R], seq 1273815716, win 0, length 0 16:57:21.226479 IP 10.10.251.35.60504 > 10.10.136.11.80: Flags [P.], seq 1:674, ack 1, win 57, length 673 16:57:21.226550 IP 10.10.136.11.80 > 10.10.251.35.60504: Flags [R], seq 1273815716, win 0, length 0 16:57:21.226537 IP 10.10.251.36.13958 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.226565 IP 10.10.136.11.80 > 10.10.251.36.13958: Flags [R], seq 1106924662, win 0, length 0 16:57:21.226539 IP 10.10.251.36.13958 > 10.10.136.11.80: Flags [P.], seq 1:734, ack 1, win 57, length 733 16:57:21.226577 IP 10.10.136.11.80 > 10.10.251.36.13958: Flags [R], seq 1106924662, win 0, length 0 16:57:21.226991 IP 10.10.251.37.25819 > 10.10.136.11.80: Flags [S], seq 2459078618, win 28800, options [mss 1440,sackOK,TS val 857135629 ecr 0,nop,wscale 9], length 0 16:57:21.227048 IP 10.10.136.11.80 > 10.10.251.37.25819: Flags [S.], seq 1273264467, ack 2459078619, win 28040, options [mss 1414,sackOK,TS val 541331290 ecr 857135629,nop,wscale 7], length 0 16:57:21.227176 IP 10.10.251.37.25819 > 10.10.136.11.80: Flags [R], seq 2459078619, win 0, length 0 16:57:21.227612 IP 10.10.251.35.60521 > 10.10.136.11.80: Flags [S], seq 4047571007, win 28800, options [mss 1440,sackOK,TS val 857761628 ecr 0,nop,wscale 9], length 0 16:57:21.227667 IP 10.10.136.11.80 > 10.10.251.35.60521: Flags [S.], seq 1634713884, ack 4047571008, win 28040, options [mss 1414,sackOK,TS val 541331291 ecr 857761628,nop,wscale 7], length 0 16:57:21.227764 IP 10.10.251.35.60521 > 10.10.136.11.80: Flags [R], seq 4047571008, win 0, length 0 16:57:21.227899 IP 10.10.251.35.60521 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.227900 IP 10.10.251.37.25819 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.227938 IP 10.10.136.11.80 > 10.10.251.35.60521: Flags [R], seq 1634713885, win 0, length 0 16:57:21.228092 IP 10.10.136.11.80 > 10.10.251.37.25819: Flags [R], seq 1273264468, win 0, length 0 16:57:21.227902 IP 10.10.251.37.25819 > 10.10.136.11.80: Flags [P.], seq 1:729, ack 1, win 57, length 728 16:57:21.228120 IP 10.10.136.11.80 > 10.10.251.37.25819: Flags [R], seq 1273264468, win 0, length 0 16:57:21.227902 IP 10.10.251.35.60521 > 10.10.136.11.80: Flags [P.], seq 1:691, ack 1, win 57, length 690 16:57:21.228178 IP 10.10.136.11.80 > 10.10.251.35.60521: Flags [R], seq 1634713885, win 0, length 0 16:57:21.228612 IP 10.10.251.34.15084 > 10.10.136.11.80: Flags [S], seq 1545459512, win 28800, options [mss 1440,sackOK,TS val 859746628 ecr 0,nop,wscale 9], length 0 16:57:21.228654 IP 10.10.136.11.80 > 10.10.251.34.15084: Flags [S.], seq 4035137823, ack 1545459513, win 28040, options [mss 1414,sackOK,TS val 541331292 ecr 859746628,nop,wscale 7], length 0 16:57:21.228756 IP 10.10.251.34.15084 > 10.10.136.11.80: Flags [R], seq 1545459513, win 0, length 0 16:57:21.229573 IP 10.10.251.35.60535 > 10.10.136.11.80: Flags [S], seq 2001555707, win 28800, options [mss 1440,sackOK,TS val 857761630 ecr 0,nop,wscale 9], length 0 16:57:21.229657 IP 10.10.136.11.80 > 10.10.251.35.60535: Flags [S.], seq 3494081079, ack 2001555708, win 28040, options [mss 1414,sackOK,TS val 541331293 ecr 857761630,nop,wscale 7], length 0 16:57:21.229875 IP 10.10.251.35.60535 > 10.10.136.11.80: Flags [R], seq 2001555708, win 0, length 0 16:57:21.229982 IP 10.10.251.35.60535 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.230012 IP 10.10.136.11.80 > 10.10.251.35.60535: Flags [R], seq 3494081080, win 0, length 0 16:57:21.229984 IP 10.10.251.35.60535 > 10.10.136.11.80: Flags [P.], seq 1:715, ack 1, win 57, length 714 16:57:21.230043 IP 10.10.136.11.80 > 10.10.251.35.60535: Flags [R], seq 3494081080, win 0, length 0 16:57:21.231722 IP 10.10.251.36.13978 > 10.10.136.11.80: Flags [S], seq 2191454395, win 28800, options [mss 1440,sackOK,TS val 857450633 ecr 0,nop,wscale 9], length 0 16:57:21.231759 IP 10.10.136.11.80 > 10.10.251.36.13978: Flags [S.], seq 4182237504, ack 2191454396, win 28040, options [mss 1414,sackOK,TS val 541331295 ecr 857450633,nop,wscale 7], length 0 16:57:21.231882 IP 10.10.251.36.13978 > 10.10.136.11.80: Flags [R], seq 2191454396, win 0, length 0 16:57:21.231965 IP 10.10.251.34.15084 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.231986 IP 10.10.136.11.80 > 10.10.251.34.15084: Flags [R], seq 4035137824, win 0, length 0 16:57:21.232003 IP 10.10.251.34.15084 > 10.10.136.11.80: Flags [P.], seq 1:665, ack 1, win 57, length 664 16:57:21.232024 IP 10.10.136.11.80 > 10.10.251.34.15084: Flags [R], seq 4035137824, win 0, length 0 16:57:21.232004 IP 10.10.251.36.13978 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.232049 IP 10.10.136.11.80 > 10.10.251.36.13978: Flags [R], seq 4182237505, win 0, length 0 16:57:21.232006 IP 10.10.251.36.13978 > 10.10.136.11.80: Flags [P.], seq 1:731, ack 1, win 57, length 730 16:57:21.232060 IP 10.10.136.11.80 > 10.10.251.36.13978: Flags [R], seq 4182237505, win 0, length 0 16:57:21.232186 IP 10.10.251.35.60555 > 10.10.136.11.80: Flags [S], seq 4036513662, win 28800, options [mss 1440,sackOK,TS val 857761633 ecr 0,nop,wscale 9], length 0 16:57:21.232229 IP 10.10.136.11.80 > 10.10.251.35.60555: Flags [S.], seq 2691248400, ack 4036513663, win 28040, options [mss 1414,sackOK,TS val 541331295 ecr 857761633,nop,wscale 7], length 0 16:57:21.232286 IP 10.10.251.34.15100 > 10.10.136.11.80: Flags [S], seq 2561822642, win 28800, options [mss 1440,sackOK,TS val 859746632 ecr 0,nop,wscale 9], length 0 16:57:21.232327 IP 10.10.136.11.80 > 10.10.251.34.15100: Flags [S.], seq 1346908894, ack 2561822643, win 28040, options [mss 1414,sackOK,TS val 541331295 ecr 859746632,nop,wscale 7], length 0 16:57:21.232347 IP 10.10.251.35.60555 > 10.10.136.11.80: Flags [R], seq 4036513663, win 0, length 0 16:57:21.232430 IP 10.10.251.34.15100 > 10.10.136.11.80: Flags [R], seq 2561822643, win 0, length 0 16:57:21.233413 IP 10.10.251.34.15109 > 10.10.136.11.80: Flags [S], seq 2848613059, win 28800, options [mss 1440,sackOK,TS val 859746633 ecr 0,nop,wscale 9], length 0 16:57:21.233449 IP 10.10.136.11.80 > 10.10.251.34.15109: Flags [S.], seq 1782399765, ack 2848613060, win 28040, options [mss 1414,sackOK,TS val 541331296 ecr 859746633,nop,wscale 7], length 0 16:57:21.233554 IP 10.10.251.34.15109 > 10.10.136.11.80: Flags [R], seq 2848613060, win 0, length 0 16:57:21.233601 IP 10.10.251.34.15109 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.233622 IP 10.10.136.11.80 > 10.10.251.34.15109: Flags [R], seq 1782399766, win 0, length 0 16:57:21.233602 IP 10.10.251.35.60555 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.233654 IP 10.10.136.11.80 > 10.10.251.35.60555: Flags [R], seq 2691248401, win 0, length 0 16:57:21.233604 IP 10.10.251.35.60555 > 10.10.136.11.80: Flags [P.], seq 1:685, ack 1, win 57, length 684 16:57:21.233679 IP 10.10.251.34.15109 > 10.10.136.11.80: Flags [P.], seq 1:738, ack 1, win 57, length 737 16:57:21.233684 IP 10.10.136.11.80 > 10.10.251.35.60555: Flags [R], seq 2691248401, win 0, length 0 16:57:21.233690 IP 10.10.136.11.80 > 10.10.251.34.15109: Flags [R], seq 1782399766, win 0, length 0 16:57:21.234319 IP 10.10.251.37.25846 > 10.10.136.11.80: Flags [S], seq 1466003511, win 28800, options [mss 1440,sackOK,TS val 857135636 ecr 0,nop,wscale 9], length 0 16:57:21.234379 IP 10.10.136.11.80 > 10.10.251.37.25846: Flags [S.], seq 2849527601, ack 1466003512, win 28040, options [mss 1414,sackOK,TS val 541331297 ecr 857135636,nop,wscale 7], length 0 16:57:21.234491 IP 10.10.251.37.25846 > 10.10.136.11.80: Flags [R], seq 1466003512, win 0, length 0 16:57:21.235357 IP 10.10.251.34.15100 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.235383 IP 10.10.136.11.80 > 10.10.251.34.15100: Flags [R], seq 1346908895, win 0, length 0 16:57:21.235393 IP 10.10.251.34.15100 > 10.10.136.11.80: Flags [P.], seq 1:687, ack 1, win 57, length 686 16:57:21.235394 IP 10.10.251.37.25846 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.235419 IP 10.10.136.11.80 > 10.10.251.34.15100: Flags [R], seq 1346908895, win 0, length 0 16:57:21.235434 IP 10.10.136.11.80 > 10.10.251.37.25846: Flags [R], seq 2849527602, win 0, length 0 16:57:21.235433 IP 10.10.251.35.60582 > 10.10.136.11.80: Flags [S], seq 3222179618, win 28800, options [mss 1440,sackOK,TS val 857761636 ecr 0,nop,wscale 9], length 0 16:57:21.235395 IP 10.10.251.37.25846 > 10.10.136.11.80: Flags [P.], seq 1:676, ack 1, win 57, length 675 16:57:21.235456 IP 10.10.136.11.80 > 10.10.251.35.60582: Flags [S.], seq 834739244, ack 3222179619, win 28040, options [mss 1414,sackOK,TS val 541331298 ecr 857761636,nop,wscale 7], length 0 16:57:21.235470 IP 10.10.136.11.80 > 10.10.251.37.25846: Flags [R], seq 2849527602, win 0, length 0 16:57:21.235552 IP 10.10.251.37.25853 > 10.10.136.11.80: Flags [S], seq 1082194284, win 28800, options [mss 1440,sackOK,TS val 857135637 ecr 0,nop,wscale 9], length 0 16:57:21.235579 IP 10.10.136.11.80 > 10.10.251.37.25853: Flags [S.], seq 2909696083, ack 1082194285, win 28040, options [mss 1414,sackOK,TS val 541331298 ecr 857135637,nop,wscale 7], length 0 16:57:21.235551 IP 10.10.251.35.60582 > 10.10.136.11.80: Flags [R], seq 3222179619, win 0, length 0 16:57:21.235670 IP 10.10.251.37.25853 > 10.10.136.11.80: Flags [R], seq 1082194285, win 0, length 0 16:57:21.235668 IP 10.10.251.35.60582 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.235704 IP 10.10.136.11.80 > 10.10.251.35.60582: Flags [R], seq 834739245, win 0, length 0 16:57:21.235692 IP 10.10.251.35.60582 > 10.10.136.11.80: Flags [P.], seq 1:684, ack 1, win 57, length 683 16:57:21.235735 IP 10.10.136.11.80 > 10.10.251.35.60582: Flags [R], seq 834739245, win 0, length 0 16:57:21.235806 IP 10.10.251.37.25853 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.235828 IP 10.10.136.11.80 > 10.10.251.37.25853: Flags [R], seq 2909696084, win 0, length 0 16:57:21.235809 IP 10.10.251.37.25853 > 10.10.136.11.80: Flags [P.], seq 1:671, ack 1, win 57, length 670 16:57:21.235847 IP 10.10.136.11.80 > 10.10.251.37.25853: Flags [R], seq 2909696084, win 0, length 0 16:57:21.241083 IP 10.10.251.35.60640 > 10.10.136.11.80: Flags [S], seq 3149302850, win 28800, options [mss 1440,sackOK,TS val 857761642 ecr 0,nop,wscale 9], length 0 16:57:21.241150 IP 10.10.136.11.80 > 10.10.251.35.60640: Flags [S.], seq 1269874635, ack 3149302851, win 28040, options [mss 1414,sackOK,TS val 541331304 ecr 857761642,nop,wscale 7], length 0 16:57:21.241253 IP 10.10.251.35.60640 > 10.10.136.11.80: Flags [R], seq 3149302851, win 0, length 0 16:57:21.241432 IP 10.10.251.35.60640 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.241478 IP 10.10.136.11.80 > 10.10.251.35.60640: Flags [R], seq 1269874636, win 0, length 0 16:57:21.241464 IP 10.10.251.35.60640 > 10.10.136.11.80: Flags [P.], seq 1:685, ack 1, win 57, length 684 16:57:21.241507 IP 10.10.136.11.80 > 10.10.251.35.60640: Flags [R], seq 1269874636, win 0, length 0 16:57:21.241701 IP 10.10.251.36.14029 > 10.10.136.11.80: Flags [S], seq 977271021, win 28800, options [mss 1440,sackOK,TS val 857450643 ecr 0,nop,wscale 9], length 0 16:57:21.241742 IP 10.10.136.11.80 > 10.10.251.36.14029: Flags [S.], seq 3704675116, ack 977271022, win 28040, options [mss 1414,sackOK,TS val 541331305 ecr 857450643,nop,wscale 7], length 0 16:57:21.241832 IP 10.10.251.36.14029 > 10.10.136.11.80: Flags [R], seq 977271022, win 0, length 0 16:57:21.242259 IP 10.10.251.36.14029 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.242292 IP 10.10.136.11.80 > 10.10.251.36.14029: Flags [R], seq 3704675117, win 0, length 0 16:57:21.242306 IP 10.10.251.36.14029 > 10.10.136.11.80: Flags [P.], seq 1:684, ack 1, win 57, length 683 16:57:21.242329 IP 10.10.136.11.80 > 10.10.251.36.14029: Flags [R], seq 3704675117, win 0, length 0 16:57:21.243880 IP 10.10.251.37.25878 > 10.10.136.11.80: Flags [S], seq 3324138536, win 28800, options [mss 1440,sackOK,TS val 857135646 ecr 0,nop,wscale 9], length 0 16:57:21.243917 IP 10.10.136.11.80 > 10.10.251.37.25878: Flags [S.], seq 386929082, ack 3324138537, win 28040, options [mss 1414,sackOK,TS val 541331307 ecr 857135646,nop,wscale 7], length 0 16:57:21.244020 IP 10.10.251.34.15168 > 10.10.136.11.80: Flags [S], seq 1028829276, win 28800, options [mss 1440,sackOK,TS val 859746643 ecr 0,nop,wscale 9], length 0 16:57:21.244039 IP 10.10.251.37.25878 > 10.10.136.11.80: Flags [R], seq 3324138537, win 0, length 0 16:57:21.244070 IP 10.10.136.11.80 > 10.10.251.34.15168: Flags [S.], seq 4151051395, ack 1028829277, win 28040, options [mss 1414,sackOK,TS val 541331307 ecr 859746643,nop,wscale 7], length 0 16:57:21.244127 IP 10.10.251.37.25878 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.244149 IP 10.10.136.11.80 > 10.10.251.37.25878: Flags [R], seq 386929083, win 0, length 0 16:57:21.244146 IP 10.10.251.37.25878 > 10.10.136.11.80: Flags [P.], seq 1:683, ack 1, win 57, length 682 16:57:21.244147 IP 10.10.251.34.15168 > 10.10.136.11.80: Flags [R], seq 1028829277, win 0, length 0 16:57:21.244171 IP 10.10.136.11.80 > 10.10.251.37.25878: Flags [R], seq 386929083, win 0, length 0 16:57:21.244282 IP 10.10.251.34.15168 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.244334 IP 10.10.136.11.80 > 10.10.251.34.15168: Flags [R], seq 4151051396, win 0, length 0 16:57:21.244318 IP 10.10.251.34.15168 > 10.10.136.11.80: Flags [P.], seq 1:690, ack 1, win 57, length 689 16:57:21.244382 IP 10.10.136.11.80 > 10.10.251.34.15168: Flags [R], seq 4151051396, win 0, length 0 16:57:21.244648 IP 10.10.251.35.60668 > 10.10.136.11.80: Flags [S], seq 3828148188, win 28800, options [mss 1440,sackOK,TS val 857761645 ecr 0,nop,wscale 9], length 0 16:57:21.244680 IP 10.10.136.11.80 > 10.10.251.35.60668: Flags [S.], seq 3313404230, ack 3828148189, win 28040, options [mss 1414,sackOK,TS val 541331308 ecr 857761645,nop,wscale 7], length 0 16:57:21.244760 IP 10.10.251.35.60668 > 10.10.136.11.80: Flags [R], seq 3828148189, win 0, length 0 16:57:21.245298 IP 10.10.251.35.60677 > 10.10.136.11.80: Flags [S], seq 3528200759, win 28800, options [mss 1440,sackOK,TS val 857761646 ecr 0,nop,wscale 9], length 0 16:57:21.245290 IP 10.10.251.35.60676 > 10.10.136.11.80: Flags [S], seq 3305859383, win 28800, options [mss 1440,sackOK,TS val 857761646 ecr 0,nop,wscale 9], length 0 16:57:21.245327 IP 10.10.136.11.80 > 10.10.251.35.60677: Flags [S.], seq 3131083714, ack 3528200760, win 28040, options [mss 1414,sackOK,TS val 541331308 ecr 857761646,nop,wscale 7], length 0 16:57:21.245343 IP 10.10.136.11.80 > 10.10.251.35.60676: Flags [S.], seq 3035627015, ack 3305859384, win 28040, options [mss 1414,sackOK,TS val 541331308 ecr 857761646,nop,wscale 7], length 0 16:57:21.245504 IP 10.10.251.35.60676 > 10.10.136.11.80: Flags [R], seq 3305859384, win 0, length 0 16:57:21.245540 IP 10.10.251.35.60676 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.245536 IP 10.10.251.35.60677 > 10.10.136.11.80: Flags [R], seq 3528200760, win 0, length 0 16:57:21.245557 IP 10.10.136.11.80 > 10.10.251.35.60676: Flags [R], seq 3035627016, win 0, length 0 16:57:21.245538 IP 10.10.251.35.60668 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.245549 IP 10.10.251.35.60676 > 10.10.136.11.80: Flags [P.], seq 1:691, ack 1, win 57, length 690 16:57:21.245586 IP 10.10.136.11.80 > 10.10.251.35.60668: Flags [R], seq 3313404231, win 0, length 0 16:57:21.245539 IP 10.10.251.35.60668 > 10.10.136.11.80: Flags [P.], seq 1:736, ack 1, win 57, length 735 16:57:21.245600 IP 10.10.136.11.80 > 10.10.251.35.60668: Flags [R], seq 3313404231, win 0, length 0 16:57:21.245541 IP 10.10.251.35.60677 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.245611 IP 10.10.136.11.80 > 10.10.251.35.60676: Flags [R], seq 3035627016, win 0, length 0 16:57:21.245633 IP 10.10.136.11.80 > 10.10.251.35.60677: Flags [R], seq 3131083715, win 0, length 0 16:57:21.245550 IP 10.10.251.35.60677 > 10.10.136.11.80: Flags [P.], seq 1:671, ack 1, win 57, length 670 16:57:21.245645 IP 10.10.136.11.80 > 10.10.251.35.60677: Flags [R], seq 3131083715, win 0, length 0 16:57:21.247133 IP 10.10.251.34.15183 > 10.10.136.11.80: Flags [S], seq 287420920, win 28800, options [mss 1440,sackOK,TS val 859746647 ecr 0,nop,wscale 9], length 0 16:57:21.247165 IP 10.10.136.11.80 > 10.10.251.34.15183: Flags [S.], seq 4023295394, ack 287420921, win 28040, options [mss 1414,sackOK,TS val 541331310 ecr 859746647,nop,wscale 7], length 0 16:57:21.247261 IP 10.10.251.34.15183 > 10.10.136.11.80: Flags [R], seq 287420921, win 0, length 0 16:57:21.247386 IP 10.10.251.34.15185 > 10.10.136.11.80: Flags [S], seq 3742544998, win 28800, options [mss 1440,sackOK,TS val 859746647 ecr 0,nop,wscale 9], length 0 16:57:21.247413 IP 10.10.136.11.80 > 10.10.251.34.15185: Flags [S.], seq 3982929000, ack 3742544999, win 28040, options [mss 1414,sackOK,TS val 541331310 ecr 859746647,nop,wscale 7], length 0 16:57:21.247502 IP 10.10.251.34.15185 > 10.10.136.11.80: Flags [R], seq 3742544999, win 0, length 0 16:57:21.247581 IP 10.10.251.34.15183 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.247607 IP 10.10.136.11.80 > 10.10.251.34.15183: Flags [R], seq 4023295395, win 0, length 0 16:57:21.247583 IP 10.10.251.34.15183 > 10.10.136.11.80: Flags [P.], seq 1:671, ack 1, win 57, length 670 16:57:21.247584 IP 10.10.251.34.15185 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.247632 IP 10.10.136.11.80 > 10.10.251.34.15183: Flags [R], seq 4023295395, win 0, length 0 16:57:21.247639 IP 10.10.136.11.80 > 10.10.251.34.15185: Flags [R], seq 3982929001, win 0, length 0 16:57:21.247669 IP 10.10.251.34.15185 > 10.10.136.11.80: Flags [P.], seq 1:734, ack 1, win 57, length 733 16:57:21.247681 IP 10.10.136.11.80 > 10.10.251.34.15185: Flags [R], seq 3982929001, win 0, length 0 16:57:21.248611 IP 10.10.251.35.60698 > 10.10.136.11.80: Flags [S], seq 520210445, win 28800, options [mss 1440,sackOK,TS val 857761649 ecr 0,nop,wscale 9], length 0 16:57:21.248656 IP 10.10.136.11.80 > 10.10.251.35.60698: Flags [S.], seq 1268409841, ack 520210446, win 28040, options [mss 1414,sackOK,TS val 541331312 ecr 857761649,nop,wscale 7], length 0 16:57:21.248755 IP 10.10.251.35.60698 > 10.10.136.11.80: Flags [R], seq 520210446, win 0, length 0 16:57:21.248820 IP 10.10.251.35.60698 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.248856 IP 10.10.136.11.80 > 10.10.251.35.60698: Flags [R], seq 1268409842, win 0, length 0 16:57:21.248841 IP 10.10.251.35.60698 > 10.10.136.11.80: Flags [P.], seq 1:715, ack 1, win 57, length 714 16:57:21.248891 IP 10.10.136.11.80 > 10.10.251.35.60698: Flags [R], seq 1268409842, win 0, length 0 16:57:21.251345 IP 10.10.251.37.25896 > 10.10.136.11.80: Flags [S], seq 1860133803, win 28800, options [mss 1440,sackOK,TS val 857135653 ecr 0,nop,wscale 9], length 0 16:57:21.251394 IP 10.10.136.11.80 > 10.10.251.37.25896: Flags [S.], seq 3110446776, ack 1860133804, win 28040, options [mss 1414,sackOK,TS val 541331314 ecr 857135653,nop,wscale 7], length 0 16:57:21.251494 IP 10.10.251.37.25896 > 10.10.136.11.80: Flags [R], seq 1860133804, win 0, length 0 16:57:21.251692 IP 10.10.251.37.25896 > 10.10.136.11.80: Flags [.], ack 1, win 57, length 0 16:57:21.251721 IP 10.10.136.11.80 > 10.10.251.37.25896: Flags [R], seq 3110446777, win 0, length 0 16:57:21.251700 IP 10.10.251.37.25896 > 10.10.136.11.80: Flags [P.], seq 1:729, ack 1, win 57, length 728 16:57:21.251737 IP 10.10.136.11.80 > 10.10.251.37.25896: Flags [R], seq 3110446777, win 0, length 0 16:57:21.252440 IP 10.10.251.37.25899 > 10.10.136.11.80: Flags [S], seq 1519731074, win 28800, options [mss 1440,sackOK,TS val 857135654 ecr 0,nop,wscale 9], length 0 16:57:21.252479 IP 10.10.136.11.80 > 10.10.251.37.25899: Flags [S.], seq 3791260696, ack 1519731075, win 28040, options [mss 1414,sackOK,TS val 541331315 ecr 857135654,nop,wscale 7], length 0 16:57:21.252576 IP 10.10.251.37.25899 > 10.10.136.11.80: Flags [R], seq 1519731075, win 0, length 0 16:57:21.256082 IP 10.10.251.35.60758 > 10.10.136.11.80: Flags [S], seq 3307596832, win 28800, options [mss 1440,sackOK,TS val 857761657 ecr 0,nop,wscale 9], length 0 16:57:21.256103 IP 10.10.251.35.60760 > 10.10.136.11.80: Flags [S], seq 1672761103, win 28800, options [mss 1440,sackOK,TS val 857761657 ecr 0,nop,wscale 9], length 0 16:57:21.256129 IP 10.10.136.11.80 > 10.10.251.35.60758: Flags [S.], seq 1413966856, ack 3307596833, win 28040, options [mss 1414,sackOK,TS val 541331319 ecr 857761657,nop,wscale 7], length 0 16:57:21.256153 IP 10.10.136.11.80 > 10.10.251.35.60760: Flags [S.], seq 835590691, ack 1672761104, win 28040, options [mss 1414,sackOK,TS val 541331319 ecr 857761657,nop,wscale 7], length 0
内核配置如下: [root@waf-engine-01 log]# sysctl -a | grep rp_fi net.ipv4.conf.all.arp_filter = 0 net.ipv4.conf.all.rp_filter = 0 net.ipv4.conf.default.arp_filter = 0 net.ipv4.conf.default.rp_filter = 0 net.ipv4.conf.docker0.arp_filter = 0 net.ipv4.conf.docker0.rp_filter = 0 net.ipv4.conf.eth0.arp_filter = 0 net.ipv4.conf.eth0.rp_filter = 0 net.ipv4.conf.lo.arp_filter = 0 net.ipv4.conf.lo.rp_filter = 0 [root@waf-engine-01 log]# sysctl -a | grep ip_for net.ipv4.ip_forward = 0 net.ipv4.ip_forward_use_pmtu = 0
响应包需要被干掉的,要是回到了真正的客户端,会立即回送reset数据包的,这就是问题的所在。 路由设置是黑洞掉响应包的方式之一
当然如果在云平台,你也可以在tcpcopy设置-c参数成tcpcopy所在机器的ip地址,然后在tcpcopy所在的机器设置iptables来黑洞掉测试服务器回来的响应包
目前是在ucloud云平台,我能否直接在测试服务器上直接DROP掉响应包呢 iptables -A OUTPUT -o eth0 -p tcp --sport 80 -j DROP 或者我在在线服务器上将-c参数设置成一台机器的IP10.10.136.12,然后再12上面drop掉响应的包呢,在线服务器我这边没有操作权限,业务也不太愿意直接增加一条iptables iptables -I INPUT -p tcp -s10.10.136.11 --sport 80 -j DROP
额外请教下: 辅助服务器程序不会主动将包给丢弃掉吗? 需要使用iptables来丢弃?
如果要在测试服务器iptables drop掉,请参考:https://github.com/session-replay-tools/tcpcopy/issues/279
响应包需要被干掉的,要是回到了真正的客户端,会立即回送reset数据包的,这就是问题的所在。 路由设置是黑洞掉响应包的方式之一
当然如果在云平台,你也可以在tcpcopy设置-c参数成tcpcopy所在机器的ip地址,然后在tcpcopy所在的机器设置iptables来黑洞掉测试服务器回来的响应包
tcpcopy和intercept所在的机器都没有iptables和route的权限,在这种情况下该如何解决reset包的问题。有没有其他办法来丢弃响应包。