Python 不会接收 UDP 数据包(非广播)
Python won't Receive UDP Packets(Non Broadcast)
我正在 python2.7 在 windows XP 机器上编写脚本。机器使用不同的网卡连接到多个网络。我已经发布了与此问题相关但没有直接解决的问题
我有一个服务器以大约 1 秒的间隔通过 UDP 发送 "status data"
服务器IP:10.42.40.34
我的机器 IP:10.31.9.0
我使用的网卡:Intel(R) Gigabit CT Desktop Adapter
我可以观察到 "Servers" 数据包(通过 wireshark)被发送到 "My Machine"。
2995 19.592120 10.42.40.34 10.31.9.0 UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415 Destination port: 62415
3012 19.688119 10.42.40.34 10.31.9.0 UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415 Destination port: 62415
套接字创建没有问题:
self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
然而,当我将套接字绑定到接口时:
self.sock.bind(('10.31.9.0', 62415))
然后使用(不设置超时):
reply, addr = self.sock.recvfrom(65535)
为了接收,我的脚本只是在 recvfrom()
方法调用处等待。这对我来说意味着它没有收到数据包。尽管我验证了它是通过 Wireshark 实现的。
我真的在用头撞墙,任何帮助都将不胜感激...
Bellow 是从 wireshark 中提取的完整 "status" 数据包,我想也许某些 header 信息可能是错误的,这就是 python 忽略它的原因... IDK
0000 03 00 00 00 81 b5 02 00 00 2a 28 20 08 00 45 00 .........*( ..E.
0010 01 b8 1b 2b 40 00 01 11 17 a0 0a 2a 28 22 0a 1f ...+@......*("..
0020 09 00 f3 cf f3 cf 01 a4 00 00 00 00 00 00 7e 4e ..............~N
0030 9c a7 00 00 00 00 04 04 04 00 03 01 00 00 00 00 ................
0040 01 00 3e 99 99 9a 01 01 00 00 00 00 00 00 00 00 ..>.............
0050 00 00 00 00 00 00 00 00 00 00 3e 8c e7 04 3e 9c ..........>...>.
0060 43 2d bf 17 5f 6e bf 17 5f 6e 00 00 00 00 00 00 C-.._n.._n......
0070 00 00 03 01 00 00 03 00 00 00 04 04 00 00 04 04 ................
0080 00 00 04 04 00 00 04 04 00 00 00 00 00 01 00 00 ................
0090 00 00 00 00 00 00 03 00 00 00 00 00 00 40 00 00 .............@..
00a0 00 00 40 90 00 00 40 86 4c cb 40 90 00 00 40 86 ..@...@.L.@...@.
00b0 4c cb bf 09 09 21 40 6a 57 4e 40 6a 57 4e 3f dc L....!@jWN@jWN?.
00c0 b1 4e 3f dc b1 4e bf f7 fd 4e bf f7 fd 4e 3e 80 .N?..N...N...N>.
00d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00e0 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 ................
00f0 00 0f 01 00 00 00 00 00 00 00 00 ee ee 00 00 00 ................
0100 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0130 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0180 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0190 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01c0 00 00 79 c7 42 05 56 ..y.B.V
事实证明,我的 "server" 发送的数据包不是 IP 认证。所以他们在网络和传输层被拒绝。解决方案是不使用 python 套接字 class,而是使用 winpcap 和 ctypes
直接与 OSI-L2 通信
我正在 python2.7 在 windows XP 机器上编写脚本。机器使用不同的网卡连接到多个网络。我已经发布了与此问题相关但没有直接解决的问题
我有一个服务器以大约 1 秒的间隔通过 UDP 发送 "status data"
服务器IP:10.42.40.34 我的机器 IP:10.31.9.0
我使用的网卡:Intel(R) Gigabit CT Desktop Adapter
我可以观察到 "Servers" 数据包(通过 wireshark)被发送到 "My Machine"。
2995 19.592120 10.42.40.34 10.31.9.0 UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415 Destination port: 62415
3012 19.688119 10.42.40.34 10.31.9.0 UDP 455 000000007e4e9ca700000000040404000301000000000100... Source port: 62415 Destination port: 62415
套接字创建没有问题:
self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
然而,当我将套接字绑定到接口时:
self.sock.bind(('10.31.9.0', 62415))
然后使用(不设置超时):
reply, addr = self.sock.recvfrom(65535)
为了接收,我的脚本只是在 recvfrom()
方法调用处等待。这对我来说意味着它没有收到数据包。尽管我验证了它是通过 Wireshark 实现的。
我真的在用头撞墙,任何帮助都将不胜感激...
Bellow 是从 wireshark 中提取的完整 "status" 数据包,我想也许某些 header 信息可能是错误的,这就是 python 忽略它的原因... IDK
0000 03 00 00 00 81 b5 02 00 00 2a 28 20 08 00 45 00 .........*( ..E.
0010 01 b8 1b 2b 40 00 01 11 17 a0 0a 2a 28 22 0a 1f ...+@......*("..
0020 09 00 f3 cf f3 cf 01 a4 00 00 00 00 00 00 7e 4e ..............~N
0030 9c a7 00 00 00 00 04 04 04 00 03 01 00 00 00 00 ................
0040 01 00 3e 99 99 9a 01 01 00 00 00 00 00 00 00 00 ..>.............
0050 00 00 00 00 00 00 00 00 00 00 3e 8c e7 04 3e 9c ..........>...>.
0060 43 2d bf 17 5f 6e bf 17 5f 6e 00 00 00 00 00 00 C-.._n.._n......
0070 00 00 03 01 00 00 03 00 00 00 04 04 00 00 04 04 ................
0080 00 00 04 04 00 00 04 04 00 00 00 00 00 01 00 00 ................
0090 00 00 00 00 00 00 03 00 00 00 00 00 00 40 00 00 .............@..
00a0 00 00 40 90 00 00 40 86 4c cb 40 90 00 00 40 86 ..@...@.L.@...@.
00b0 4c cb bf 09 09 21 40 6a 57 4e 40 6a 57 4e 3f dc L....!@jWN@jWN?.
00c0 b1 4e 3f dc b1 4e bf f7 fd 4e bf f7 fd 4e 3e 80 .N?..N...N...N>.
00d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00e0 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 ................
00f0 00 0f 01 00 00 00 00 00 00 00 00 ee ee 00 00 00 ................
0100 00 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0130 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0180 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0190 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
01c0 00 00 79 c7 42 05 56 ..y.B.V
事实证明,我的 "server" 发送的数据包不是 IP 认证。所以他们在网络和传输层被拒绝。解决方案是不使用 python 套接字 class,而是使用 winpcap 和 ctypes
直接与 OSI-L2 通信