Wow, what an alphabet soup that last post was
I sniffed the DNS request packets, once from my laptop using nslookup (which worked), and then again using GuruTerm from my C64 (didn't work). I posted the request packets below.
The only differences seem to be the fact that the UDP header seems to have no checksum from Guruterm, and the case of the query.
Also, GuruTerm blasts out 8 DNS query packets in 1.5 seconds, not sure if that's by design. I only show one of them here.
First of all, the packet that worked from my laptop (was followed by a DNS reply):
Code:
No. Time Source Destination Protocol Info
6 3.998781 192.168.7.22 209.151.129.1 DNS Standard query A www.rittwage.com
Frame 6 (76 bytes on wire, 76 bytes captured)
Arrival Time: May 8, 2006 22:48:02.682975000
Time delta from previous packet: 0.704340000 seconds
Time since reference or first frame: 3.998781000 seconds
Frame Number: 6
Packet Length: 76 bytes
Capture Length: 76 bytes
Protocols in frame: eth:ip:udp:dns
Ethernet II, Src: 192.168.7.22 (00:05:1b:00:61:1d), Dst: 192.168.7.1 (00:30:eb:c6:3d:d3)
Destination: 192.168.7.1 (00:30:eb:c6:3d:d3)
Source: 192.168.7.22 (00:05:1b:00:61:1d)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.7.22 (192.168.7.22), Dst: 209.151.129.1 (209.151.129.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 62
Identification: 0x72d2 (29394)
Flags: 0x00
0... = Reserved bit: Not set
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 128
Protocol: UDP (0x11)
Header checksum: 0xad85 [correct]
Good: True
Bad : False
Source: 192.168.7.22 (192.168.7.22)
Destination: 209.151.129.1 (209.151.129.1)
User Datagram Protocol, Src Port: 1495 (1495), Dst Port: domain (53)
Source port: 1495 (1495)
Destination port: domain (53)
Length: 42
Checksum: 0xe60a [correct]
Domain Name System (query)
Transaction ID: 0x0002
Flags: 0x0100 (Standard query)
0... .... .... .... = Response: Message is a query
.000 0... .... .... = Opcode: Standard query (0)
.... ..0. .... .... = Truncated: Message is not truncated
.... ...1 .... .... = Recursion desired: Do query recursively
.... .... .0.. .... = Z: reserved (0)
.... .... ...0 .... = Non-authenticated data OK: Non-authenticated data is unacceptable
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
www.rittwage.com: type A, class IN
Name: www.rittwage.com
Type: A (Host address)
Class: IN (0x0001)
0000 00 30 eb c6 3d d3 00 05 1b 00 61 1d 08 00 45 00 .0..=.....a...E.
0010 00 3e 72 d2 00 00 80 11 ad 85 c0 a8 07 16 d1 97 .>r.............
0020 81 01 05 d7 00 35 00 2a e6 0a 00 02 01 00 00 01 .....5.*........
0030 00 00 00 00 00 00 03 77 77 77 08 72 69 74 74 77 .......www.rittw
0040 61 67 65 03 63 6f 6d 00 00 01 00 01 age.com.....
And one of the 8 packets from Guruterm, which didn't work (no reply)
Code:
No. Time Source Destination Protocol Info
1 0.000000 192.168.7.21 209.151.129.1 DNS Standard query A WWW.RITTWAGE.COM
Frame 1 (76 bytes on wire, 76 bytes captured)
Arrival Time: May 8, 2006 22:49:51.037932000
Time delta from previous packet: 0.000000000 seconds
Time since reference or first frame: 0.000000000 seconds
Frame Number: 1
Packet Length: 76 bytes
Capture Length: 76 bytes
Protocols in frame: eth:ip:udp:dns
Ethernet II, Src: 192.168.7.21 (00:0c:64:03:13:37), Dst: 192.168.7.1 (00:30:eb:c6:3d:d3)
Destination: 192.168.7.1 (00:30:eb:c6:3d:d3)
Source: 192.168.7.21 (00:0c:64:03:13:37)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.7.21 (192.168.7.21), Dst: 209.151.129.1 (209.151.129.1)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 62
Identification: 0x001a (26)
Flags: 0x00
0... = Reserved bit: Not set
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 255
Protocol: UDP (0x11)
Header checksum: 0xa13e [correct]
Good: True
Bad : False
Source: 192.168.7.21 (192.168.7.21)
Destination: 209.151.129.1 (209.151.129.1)
User Datagram Protocol, Src Port: 1026 (1026), Dst Port: domain (53)
Source port: 1026 (1026)
Destination port: domain (53)
Length: 42
Checksum: 0x0000 (none)
Domain Name System (query)
Transaction ID: 0x0001
Flags: 0x0100 (Standard query)
0... .... .... .... = Response: Message is a query
.000 0... .... .... = Opcode: Standard query (0)
.... ..0. .... .... = Truncated: Message is not truncated
.... ...1 .... .... = Recursion desired: Do query recursively
.... .... .0.. .... = Z: reserved (0)
.... .... ...0 .... = Non-authenticated data OK: Non-authenticated data is unacceptable
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries
WWW.RITTWAGE.COM: type A, class IN
Name: WWW.RITTWAGE.COM
Type: A (Host address)
Class: IN (0x0001)
0000 00 30 eb c6 3d d3 00 0c 64 03 13 37 08 00 45 00 .0..=...d..7..E.
0010 00 3e 00 1a 00 00 ff 11 a1 3e c0 a8 07 15 d1 97 .>.......>......
0020 81 01 04 02 00 35 00 2a 00 00 00 01 01 00 00 01 .....5.*........
0030 00 00 00 00 00 00 03 57 57 57 08 52 49 54 54 57 .......WWW.RITTW
0040 41 47 45 03 43 4f 4d 00 00 01 00 01 AGE.COM.....