Python 不会接收 UDP 数据包(非广播)

Python won't Receive UDP Packets(Non Broadcast)

我正在 python2.7 在 windows XP 机器上编写脚本。机器使用不同的网卡连接到多个网络。我已经发布了与此问题相关但没有直接解决的问题

我有一个服务器以大约 1 秒的间隔通过 UDP 发送 "status data"

服务器IP:10.42.40.34 我的机器 IP:10.31.9.0

我使用的网卡:Intel(R) Gigabit CT Desktop Adapter

我可以观察到 "Servers" 数据包(通过 wireshark)被发送到 "My Machine"。

2995    19.592120   10.42.40.34 10.31.9.0   UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415  Destination port: 62415
3012    19.688119   10.42.40.34 10.31.9.0   UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415  Destination port: 62415

套接字创建没有问题:

self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

然而,当我将套接字绑定到接口时:

self.sock.bind(('10.31.9.0', 62415))

然后使用(不设置超时):

reply, addr = self.sock.recvfrom(65535)

为了接收,我的脚本只是在 recvfrom() 方法调用处等待。这对我来说意味着它没有收到数据包。尽管我验证了它是通过 Wireshark 实现的。

我真的在用头撞墙,任何帮助都将不胜感激...

Bellow 是从 wireshark 中提取的完整 "status" 数据包,我想也许某些 header 信息可能是错误的,这就是 python 忽略它的原因... IDK

0000   03 00 00 00 81 b5 02 00 00 2a 28 20 08 00 45 00  .........*( ..E.
0010   01 b8 1b 2b 40 00 01 11 17 a0 0a 2a 28 22 0a 1f  ...+@......*("..
0020   09 00 f3 cf f3 cf 01 a4 00 00 00 00 00 00 7e 4e  ..............~N
0030   9c a7 00 00 00 00 04 04 04 00 03 01 00 00 00 00  ................
0040   01 00 3e 99 99 9a 01 01 00 00 00 00 00 00 00 00  ..>.............
0050   00 00 00 00 00 00 00 00 00 00 3e 8c e7 04 3e 9c  ..........>...>.
0060   43 2d bf 17 5f 6e bf 17 5f 6e 00 00 00 00 00 00  C-.._n.._n......
0070   00 00 03 01 00 00 03 00 00 00 04 04 00 00 04 04  ................
0080   00 00 04 04 00 00 04 04 00 00 00 00 00 01 00 00  ................
0090   00 00 00 00 00 00 03 00 00 00 00 00 00 40 00 00  .............@..
00a0   00 00 40 90 00 00 40 86 4c cb 40 90 00 00 40 86  ..@...@.L.@...@.
00b0   4c cb bf 09 09 21 40 6a 57 4e 40 6a 57 4e 3f dc  L....!@jWN@jWN?.
00c0   b1 4e 3f dc b1 4e bf f7 fd 4e bf f7 fd 4e 3e 80  .N?..N...N...N>.
00d0   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
00e0   00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00  ................
00f0   00 0f 01 00 00 00 00 00 00 00 00 ee ee 00 00 00  ................
0100   00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0110   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0120   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0130   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0140   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0150   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0160   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0170   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0180   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
0190   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
01a0   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
01b0   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
01c0   00 00 79 c7 42 05 56                             ..y.B.V

事实证明,我的 "server" 发送的数据包不是 IP 认证。所以他们在网络和传输层被拒绝。解决方案是不使用 python 套接字 class,而是使用 winpcap 和 ctypes

直接与 OSI-L2 通信