A simple command line (CLI) tool to check network connectivity.
Netiscope is meant to be a helper tool to be used in case the network doesn't seem to be working properly, and can give hints about what's going wrong. There is not a lot of secret sauce to this tool: a seasoned user can do these check themselves with various tools to determine the root cause of a problem. However, Netiscope may make this task simpler.
Netiscope is open source and can be extended with more checks.
In order to compile, you need to install Golang. Then, to get the source for Netiscope:
mkdir -p ~/go/src/
cd ~/go/src/
git clone https://github.com/robert-kisteleki/netiscope.git
There are a few Go packages that are required to compile, you can get them by:
cd ~/go/src/netiscope/
go mod download
Now you're ready to compile and run:
go build netiscope
./netiscope -v
On Linux, the ping functionality may need '"unprivileged" ping via UDP" permission:
sudo sysctl -w net.ipv4.ping_group_range="0 2147483647"
Netiscope executes a series of checks, each tailored to discover if a particular networking function is working properly or not.
The default output contains lines of [timestamp, check, level, details].
Check if any routable addresses are present. Current unicast IPv4 and IPv6 addresses are evaluated on each interface. Special addresses (such as RFC1918) are marked.
Check if DNS resolvers are defined, reachable and if they work properly. Each resolver defined in resolv.conf is pinged and a series of DNS lookups (for well known targets such as google.com) are executed against them. The results are matched against a known-good list of potential responses (see CIDR list).
Check if well-known open DNS resolvers are reachable. "Well-known" includes:
- 1.1.1.1 (Cloudflare)
- 8.8.8.8 (Google)
- 9.9.9.9 (Quad9)
Like with the local DNS resolvers, each one is pinged and a series of DNS lookups (for well known targets such as google.com) are executed against them. The results are matched against a known-good list of potential responses (see CIDR list).
Test all root name servers (A..M) on IPV4 and IPv6 if possible:
- ping (note: G-root doesn't answer pings)
- query for "SOA ." and check basic sanity of the answer
- query for a set of known TLDs and list their defined nameservers
- query for randomly generaed TLD names and expect that to fail
The port filtering check tries to make outgoing connections to a number of ports in order to see if these are blocked or not. The default configuration contains a specific target server (netiscope[.]net) for these. Instead of a full protocol implementation the response from the default server is a pre-set value. If enabled (which is the default setting), the check also verifies if the response is this expected value or not; when checking against other servers this part of the check should be disabled as otherwise they will fail.
As per the default configuration the following connections are tried:
- SSH (22/TCP)
- TELNET (23/TCP)
- SMTP (25/TCP)
- DNS (53/UDP and 53/TCP)
- HTTP (80/TCP) and HTTPS (443/TCP)
- POP3 (110/TCP) and POP3S (995/TCP)
- IMAP (143/TCP)
- NTP (123/UDP)
In this check a series of name lookups are tried against a number of DoH providers. The list of DoH providers is defined in the [doh] section of the configuration file. Similary as with other DNS checks, the list of names to look up is defined in the [dns] section and the results are matched against a known-good list of potential responses (see CIDR list).
Both JSON and RFC8484 formats are supported.
The checks could also include:
- (TODO, possible) Wifi signal/noise/channel/rate/packet loss/...
- (TODO, possible) Check of DoT (DNS over TLS) or DNSSEC validation are available and working
- (TODO) Traceroute to root DNS servers and local/open resolvers, others
- (TODO, possible) Traceroute to known targets (M-Lab, RIPE Atlas anchors, ...)
- (TODO, possible) Detect presence of a captive portal
- (TODO, possible) Availability of popular services (google, facebook, ...), perhaps including:
- IP based (as opposed to DNS based) to detect DNS censorship
- verification of TLS certificates
- sanity check of responses
- whether protocols such as QUIC can be used
- (TODO, possible) IPv6 PMTUD to various targets
- (TODO, possible) Check ability to spoof packets / BCP38 compliance
- (TODO, possible) Measure upstream/downstream bandwidth
- (TODO, possible) User defined check: favourite VPN, personal webserver, ... using ping/HTTPS/etc
See netiscope.ini
for details. This configuration is loaded on start. It can be explicitly
specified via the -c
parameter, from ./netiscope.ini
, or from ~/.config/netiscope.ini
.
Notable command line options:
-c CONFIG
specifies a config file-C CIDRFILE
specifies a provider CIDR list file-s SECTION
specifies a configuration section list sthe checks to execute instead ofchecks
-skip4
and-skip6
disable IPV4/IPv6 checks, respectively-force4
and-force6
enforce IPV4/IPv6 checks, respectively, even if no useful network interfaces are found-l LEVEL
sets the log level. LEVEL can be detail, info, warning or error-v
for verbose mode:-check CHECK
to execure (only) that check
The configuration file has several sections:
- The
main
section has basic options, many which can also be set on the command line:loglevel
skip_ipv4
andskip_ipv6
force_ipv4
andforce_ipv6
ping_packets
- The
checks
section lists the checks to execute- Each check has (or can have) its own section (as well as shared ones like
dns
ordns_resolvers
) defining options for the particular check
- Each check has (or can have) its own section (as well as shared ones like
- The
CIDRFILE
contains the list of CIDR blocks for (some) providers. This allows checking if the IP address used (or looked up) for that provider is in this "known good" list. This file is looked up using the-C
option, or where the main config file is. - See the sections and comments in the supplied config file for more details, examples and default settings
Robert Kisteleki (kistel@gmail.com)
The code is open sourced under GPLv3 license. It is available at https://github.com/robert-kisteleki/netiscope/.