为什么我在wireshark中看不到c#应用程序生成的UDP流量?
我正在使用 UDPClient 类在我的环回地址上发送和接收消息。可执行文件也相互交互。但是为什么wireshark中看不到流量呢?
顺便说一句,我在 OSX 上并行运行 Windows,并且只能选择 1 个接口,即我在wireshark 中的 intel pro net 网卡。
I am using the UDPClient class to send and receive messages on my loopback address. The executables are also interacting with each other. But why doesnt the traffic appear in wireshark?
BTW I am running windows inside parallels on OSX and can select only 1 interface that is my intel pro net network card in wireshark.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
这是关键短语:
环回地址是一个完整的附加接口,而不仅仅是一个地址。 Wireshark 配置为侦听特定接口,我猜环回接口不是它。
Here's the key phrase:
The loopback address is a complete additional interface, not just an address. Wireshark is configured to listen on a specific interface, and I'm guessing the loopback interface is not it.
网络数据包筛选器驱动程序不会捕获环回流量。
一种解决方法是将其发送到您的 Intel Pro NIC 的 IP 地址。根据我的经验,这足以触发 NPF 捕获驱动程序并显示在 Wireshark 中。 (嗯,准确地说,我在这方面的经验不涉及虚拟机,所以 YMMV)。
当然,侦听器应该绑定到该 NIC IP 以接收数据包(而不仅仅是本地主机)。
The loopback traffic is not captured by the Net Packet Filter driver.
One workaround is to send it to the IP address of your Intel Pro NIC. In my experience, this is enough to hit the NPF capture driver and show up in Wireshark. (Well, to be accurate, my experience in that matter doesn't involve a VM so YMMV).
Of course, the listener should be bound to that NIC IP to receive the packets (and not only to localhost).