session-replay-tools / tcpcopy

An online request replication and TCP stream replay tool, ideal for real testing, performance testing, stability testing, stress testing, load testing, smoke testing, and more.
http://session-replay-tools.github.io/tcpcopy/
Other
4.48k stars 1.03k forks source link

intercept收到转发过来的syn报文后没有下一步操作 #371

Closed Fucck closed 4 years ago

Fucck commented 4 years ago

王工你好,最近我在用你们开发的工具在线下做验证的时候遇到了以下问题:

模拟线上机器A IP: 10.119.249.37 测试机器B IP:10.117.71.44 辅助机器C IP:10.117.71.45

执行的tcpcopy版本为1.2.0,intercept版本为1.0.0。三台机器的内核版本均为3.10

在机器B上配置:route add -net 10.117.70.1 netmask 255.255.255.255 gw 10.117.71.45 dev xgbe0

执行intercept:./intercept -i xgbe0 -F 'tcp and dst host 10.117.70.1' -d

执行tcpcopy:./tcpcopy -x 10.119.249.37:8999-10.117.71.44:8500 -s 10.117.71.45 -c 10.117.70.1 -d

开始之后,在A和B使用python -m SimpleHTTPServer部署一个简单服务,在网页打开A的网站,在B的服务日志里看不到访问记录。在B上抓包,发现: