Skip to content

Commit 03fa5eb

Browse files
committed
fixup: vent frustration
1 parent 33190bf commit 03fa5eb

File tree

1 file changed

+12
-3
lines changed

1 file changed

+12
-3
lines changed

leak-checker/src/traceroute/platform/windows.rs

+12-3
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,11 @@ pub struct AsyncIcmpSocketImpl(tokio::net::UdpSocket);
3131
pub struct AsyncUdpSocketWindows(tokio::net::UdpSocket);
3232

3333
/// Implementation of traceroute using `ping.exe`
34+
///
35+
/// This monstrosity exists because the Windows firewall is not helpful enough to allow us to
36+
/// permit a process (the daemon) to receive ICMP TimeExceeded packets. We can get around this by
37+
/// using `ping.exe`, which does work for some reason. My best guess is that it has special kernel
38+
/// access to be able to do this.
3439
pub async fn traceroute_using_ping(opt: &TracerouteOpt) -> anyhow::Result<LeakStatus> {
3540
let interface_ip = get_interface_ip(&opt.interface)?;
3641

@@ -44,12 +49,16 @@ pub async fn traceroute_using_ping(opt: &TracerouteOpt) -> anyhow::Result<LeakSt
4449
ping_tasks.push(async move {
4550
sleep(probe_delay).await;
4651

52+
log::debug!("sending probe packet (ttl={ttl})");
53+
54+
// ping.exe will send ICMP Echo packets to the destination, and since it's running in
55+
// the kernel it will be able to receive TimeExceeded responses.
4756
let ping_path = r"C:\Windows\System32\ping.exe";
4857
let output = tokio::process::Command::new(ping_path)
4958
.args(["-i", &ttl.to_string()])
50-
.args(["-n", "1"])
59+
.args(["-n", "1"]) // number of pings
5160
.args(["-w", &SEND_TIMEOUT.as_millis().to_string()])
52-
.args(["-S", &interface_ip.to_string()])
61+
.args(["-S", &interface_ip.to_string()]) // bind to interface IP
5362
.arg(opt.destination.to_string())
5463
.kill_on_drop(true)
5564
.output()
@@ -64,7 +73,7 @@ pub async fn traceroute_using_ping(opt: &TracerouteOpt) -> anyhow::Result<LeakSt
6473
log::trace!("ping stdout: {stdout}");
6574
log::trace!("ping stderr: {_stderr}");
6675

67-
// Dumbly search stdout for a line that looks like this:
76+
// Dumbly parse stdout for a line that looks like this:
6877
// Reply from <ip>: TTL expired
6978

7079
if !stdout.contains("TTL expired") {

0 commit comments

Comments
 (0)