Hop-by-hop forwarding chain validation from the device perspective. Not a traceroute — a FIB trace.
Project description
fibtrace
Hop-by-hop forwarding chain validation from the device perspective. Not a traceroute — a FIB trace.
The Problem
When a network path breaks, traceroute tells you where packets die. It doesn't tell you why.
To find the root cause, you SSH into the first device, check the route table, check the FIB, validate ARP resolution, inspect the egress interface — then move to the next hop and do it all again. Device by device, control plane to data plane, tedious but precise.
Every network engineer knows this workflow. Nobody has automated it.
fibtrace does. Given a target prefix and a starting device, it walks the forwarding chain hop by hop, validating what each device actually knows and what it's actually doing with the traffic. When it finds ECMP, it follows every branch. When it finds a problem, it tells you exactly what broke and where.
How It Works
At each hop, fibtrace asks four questions:
- Is there a route? — RIB lookup for the prefix
- Is it in the FIB? — Is the route programmed in the forwarding table?
- Is the next-hop resolved? — ARP entry (IPv4) or ND entry (IPv6), MAC address learned?
- Is the egress link healthy? — Interface up, error counters clean?
Then it follows the next-hop to the next device and repeats. The walk continues until it reaches a connected route (end of path), a black hole (problem found), or an unresolvable next-hop (problem found). ECMP paths are followed as a tree — every branch is validated, not just one.
IPv6 and Link-Local Next-Hops
fibtrace is fully dual-stack. IPv6 prefixes are traced using the correct address-family commands per platform (show ipv6 route, inet6.0 table, v6 forwarding table lookups) with ND replacing ARP for next-hop resolution.
OSPFv3 and other v6 IGPs commonly use link-local addresses (fe80::) as next-hops. These aren't routable — you can't SSH to them. fibtrace resolves link-local next-hops automatically via cross-AF correlation:
link-local NH → ND lookup → MAC address → ARP table search → IPv4 management IP → SSH
When the ND table is empty (common on devices without IPv6 addresses on the transit interface), fibtrace falls back to EUI-64 MAC derivation — most network hardware generates link-local addresses from the interface MAC using the EUI-64 encoding, so the MAC is embedded directly in the fe80:: address:
fe80::e3f:42ff:fef4:b565 → flip bit 7, remove ff:fe → MAC 0c:3f:42:f4:b5:65 → ARP search → IPv4
This happens transparently. The summary output shows both the data-plane next-hop and the resolved management target:
ge-0/0/0.0 → fe80::ea6:5aff:fe8b:9033 (→ 172.17.1.23)
No LLDP, no CDP, no topology database required — just the forwarding tables the device already has.
Quick Start
pip install paramiko
# Basic IPv4 trace
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret
# IPv6 trace (management plane stays IPv4)
python -m fibtrace -p 2001:db8:1dc11::14/128 -s 172.17.1.29 -u admin --password secret
# Host address (auto /32 for IPv4, auto /128 for IPv6)
python -m fibtrace -p 172.16.11.41 -s 172.16.1.6 -u admin --password secret
python -m fibtrace -p 2001:db8:1dc11::14 -s 172.17.1.29 -u admin --password secret
# Verbose — per-hop detail during the walk
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret -v
# Full diagnostic dump to JSON
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret --log /tmp/trace.json
# JSON output for scripting
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret --json
# Legacy SSH devices (old ciphers/KEX)
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret --legacy-ssh
# Skip MAC table lookups (faster on pure L3 paths)
python -m fibtrace -p 10.0.0.0/24 -s 172.16.1.1 -u admin --password secret --skip-mac
Real Output
Five-hop IPv4 trace across a multi-vendor lab (Arista EOS spines, Cisco IOS routers), ECMP split at hop 2:
fibtrace: 172.16.11.41/32 from usa-spine-2
──────────────────────────────────────────────────
hop 0: usa-spine-2 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY Ethernet1 → 172.16.1.5
hop 1: usa-rtr-1 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY GigabitEthernet0/3 → 172.16.128.6
hop 2: eng-rtr-1 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY GigabitEthernet0/2 → 172.16.2.2, GigabitEthernet0/3 → 172.16.2.6
hop 3: eng-spine-1 | route ✓ fib — nh — link — → HEALTHY (connected) Vlan11
hop 4: eng-spine-2 | route ✓ fib — nh — link — → HEALTHY (connected) Vlan11
──────────────────────────────────────────────────
Status: COMPLETE | 5 devices | 1 ECMP branches | 77.0s
Four-hop IPv4 trace across Juniper vMX (14.1) and Arista EOS, mixed vendor path:
fibtrace: 172.17.1.29/32 from edge01
──────────────────────────────────────────────────
hop 0: edge01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY ge-0/0/0.0 → 172.17.1.23
hop 1: spine1 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY Port-Channel1 → 172.17.1.10
hop 2: edge1-01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY ge-0/0/2.0 → 172.17.1.26
hop 3: edge5-01 | route ✓ fib — nh — link — → HEALTHY (connected) ge-0/0/1.0
──────────────────────────────────────────────────
Status: COMPLETE | 4 devices | 0 ECMP branches | 58.8s
Three-hop IPv6 trace across Arista EOS and Juniper Junos with link-local next-hops (OSPFv3):
fibtrace: 2001:db8:1dc11::14/128 from spine5-01
──────────────────────────────────────────────────
hop 0: spine5-01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY Ethernet1 → fe80::205:86ff:fe71:5b01 (→ 172.17.1.28)
hop 1: edge5-01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY ge-0/0/0.0 → fe80::205:86ff:fe71:8503 (→ 172.17.1.33)
hop 2: edge1-02 | route ✓ fib — nh — link — → HEALTHY (connected) lo0.0
──────────────────────────────────────────────────
Status: COMPLETE | 3 devices | 0 ECMP branches | 46.5s
Four-hop IPv6 trace originating from Cisco IOS, across Arista EOS and Juniper Junos — three vendors, link-local resolution via EUI-64 fallback at the IOS hop:
fibtrace: 2001:db8:1dc11::12/128 from tor201
──────────────────────────────────────────────────
hop 0: tor201 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY GigabitEthernet0/0 → fe80::e3f:42ff:fef4:b565 (→ 172.17.202.1)
hop 1: spine5-01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY Ethernet1 → fe80::205:86ff:fe71:5b01 (→ 172.17.1.28)
hop 2: edge5-01 | route ✓ fib ✓ nh ✓ link ✓ → HEALTHY ge-0/0/2.0 → fe80::205:86ff:fe71:3902 (→ 172.17.1.27)
hop 3: edge1-01 | route ✓ fib — nh — link — → HEALTHY (connected) lo0.0
──────────────────────────────────────────────────
Status: COMPLETE | 4 devices | 0 ECMP branches | 80.0s
Each line shows: the device hostname, the four forwarding checks (route/FIB/next-hop/link), the verdict, the egress interface(s), and where traffic goes next. For IPv6 link-local next-hops, the resolved IPv4 SSH target is shown in parentheses.
Supported Platforms
| Platform | Parsing | IPv4 | IPv6 | Status |
|---|---|---|---|---|
| Arista EOS | Native JSON (| json) |
✅ | ✅ | Tested in production lab |
| Juniper Junos | Native XML (| display xml) |
✅ | ✅ | Tested in production lab (14.1+) |
| Cisco IOS/IOS-XE | Regex | ✅ | ✅ | Tested in production lab |
| Cisco NX-OS | Native JSON (| json) |
✅ | v6 commands ready, parsers pending | Parsers written, untested |
Platform detection is automatic — fibtrace fingerprints each device via prompt analysis and show version output, then selects the correct command set and parser.
Mixed-vendor paths work transparently. The trace adapts its CLI syntax per hop (e.g., CIDR notation for EOS, dotted-mask for IOS, bare IP for Junos host routes) and its output parsing (JSON for EOS/NX-OS, XML for Junos, regex for IOS). Address family is detected from the target prefix and drives command selection automatically — show ip route vs show ipv6 route, show arp vs show ipv6 neighbors, v4 vs v6 FIB tables.
Verdict Reference
fibtrace evaluates each hop against a truth table and assigns a verdict:
| Verdict | Meaning | Terminal? |
|---|---|---|
HEALTHY |
Route in RIB, programmed in FIB, next-hop resolved, link clean | No — walk continues |
NO_ROUTE |
No RIB entry for the prefix | Yes — path is broken here |
BLACKHOLE |
FIB entry is null/drop | Yes — traffic is discarded |
RIB_ONLY |
Route exists but not programmed in FIB | No — walk continues |
INCOMPLETE_ARP |
Next-hop ARP/ND is unresolved | No — walk continues |
INTERFACE_DOWN |
Egress interface is down | No — walk continues |
INTERFACE_ERRORS |
Error counters above threshold | No — walk continues |
UNREACHABLE |
SSH connection to device failed | Yes — can't evaluate |
Interface errors and ARP issues are flspineed but never stop the trace. The walk always continues to the next hop — reachability is confirmed or denied by the SSH connection, not by error counters on the previous device.
The error counter threshold is configurable (--error-threshold, default 100). Minor errors on long-uptime interfaces are noted but don't change the verdict.
Architecture
fibtrace/
├── __init__.py # Package exports
├── __main__.py # python -m fibtrace entry point
├── client.py # SSH client (Paramiko invoke-shell wrapper)
├── models.py # Vendor-neutral forwarding data models (dual-stack)
├── commands_and_parsers.py # Platform fingerprinting, command sets, AF-aware dispatch
├── parsers.py # Platform parsers: raw CLI output → model dataclasses
├── diagnostics.py # Structured diagnostic capture and formatters
└── walker.py # BFS chain walker, verdict assessment, link-local resolver
Design Decisions
Forwarding-plane only. fibtrace doesn't care about OSPF metrics, BGP local-pref, or admin distance. The routing protocol already picked a winner — fibtrace validates whether that winner is actually forwarding packets. Route protocol is recorded as a lightweight enum (connected, static, dynamic) for human context, not as an input to any decision.
Dual-stack from the ground up. Address family is detected from the target prefix and drives the entire walk — command selection, parser dispatch, next-hop resolution strategy. IPv4 and IPv6 share the same models, walker, and verdict logic. The only AF-specific code is in command templates and the link-local resolver. Both address families are exercised through the same code paths, so v4 behavior is never regressed by v6 changes.
Link-local resolution without topology. OSPFv3 (and IS-IS) use link-local next-hops that can't be SSH'd to. Rather than requiring LLDP, CDP, or a topology database, fibtrace correlates across address families: ND gives a MAC, the ARP table gives the IPv4 address that owns that MAC. This works because any device running dual-stack will have both ND and ARP entries for the same physical neighbor. When the ND table is empty (e.g., IOS devices with no IPv6 on the transit interface), fibtrace derives the MAC directly from the EUI-64 encoding in the link-local address — no extra commands needed. Two extra commands per link-local hop, zero external dependencies.
Hostname-based device tracking. Devices are identified by the hostname extracted from the CLI prompt, not by the SSH target IP. In real networks, the same device is reachable via multiple IPs (management, loopback, transit interfaces), and different devices can share IPs (unnumbered interfaces, overlapping transit subnets). The prompt is the canonical identity. This means loop detection is post-connection — one SSH handshake is burned to discover a revisit. Acceptable for chains of 3–15 devices.
BFS tree walk. ECMP at any hop creates branches. fibtrace walks breadth-first: all devices at depth N are evaluated before depth N+1. Loop detection via visited hostname set catches cycles at the shallowest depth.
Diagnostic-first. Every command execution is wrapped in a diagnostic record: the exact command sent, the full raw output, which parser was used, what it extracted (or why it failed), and wall-clock timing. Parser failures are never silent. Three output levels: summary (always), verbose (-v), and full JSON dump (--log).
Parser Strategy
Three tiers, best to worst:
| Tier | Method | Platforms | Reliability |
|---|---|---|---|
| 1 | Native JSON | Arista EOS, NX-OS | High — structured output |
| 1 | Native XML | Juniper Junos (14.1+) | High — stable across all versions |
| 2 | TextFSM | Cisco IOS/IOS-XE (future) | Medium — template-based |
| 3 | Regex | Cisco IOS/IOS-XE | Functional — tested against real devices |
Parsers are dispatched via a registry keyed on (Platform, data_type). Data types include: route, fib, arp, nd, arp_by_mac, interface, and mac_table. Adding a new platform means writing parser functions for the relevant data types and registering them. The nd and arp_by_mac parsers are implemented for Junos, EOS, and IOS — all three platforms tested with v6 in production.
SSH Client
The SSH client is adapted from Secure Cartography, a production-hardened Paramiko wrapper validated against 357+ devices. Features: invoke-shell mode (required for most network gear), pagination disable shotgun, legacy cipher/KEX support, ANSI sequence filtering, and multi-vendor prompt detection with hostname extraction.
CLI Reference
usage: python -m fibtrace [-h] -p PREFIX -s SOURCE -u USERNAME
[--password PASSWORD] [--key-file KEY_FILE]
[--max-depth MAX_DEPTH] [--timeout TIMEOUT]
[--legacy-ssh] [--error-threshold ERROR_THRESHOLD]
[--skip-mac] [-v] [--debug] [--log LOG] [--json]
Arguments:
-p, --prefix Target prefix (e.g., 10.0.0.0/24, 172.16.1.1,
2001:db8::/32, or 2001:db8::1)
-s, --source Source device IP to start the walk
-u, --username SSH username
--password SSH password
--key-file Path to SSH private key
Options:
--max-depth Maximum hop depth (default: 15)
--timeout Per-command timeout in seconds (default: 10.0)
--legacy-ssh Enable legacy SSH ciphers/KEX for old devices
--error-threshold Interface error count threshold (default: 100)
--skip-mac Skip MAC table lookups (faster on L3 paths)
Output:
-v, --verbose Print per-hop summaries during the walk
--debug Debug-level logging
--log FILE Write full diagnostic JSON to file
--json Output chain result as JSON (for scripting)
JSON Output
With --json, fibtrace outputs a machine-readable trace suitable for integration with other tools:
{
"target_prefix": "172.16.11.41/32",
"source_device": "usa-spine-2",
"status": "complete",
"is_healthy": true,
"total_devices": 5,
"ecmp_branches": 1,
"duration_seconds": 77.0,
"hops": [
{
"device": "usa-spine-2",
"ip": "172.16.1.6",
"platform": "arista_eos",
"verdict": "healthy",
"is_terminal": false,
"next_hops": ["172.16.1.5"],
"notes": []
}
],
"anomalies": []
}
With --log FILE, fibtrace writes a full diagnostic JSON dump including every command sent, raw output received, parser used, parse result, and timing. This is the post-mortem record — everything needed to understand what the tool saw and how it interpreted it.
Requirements
- Python 3.10+
- paramiko
Roadmap
The core walk engine is proven across both address families. These are the next targets, roughly in priority order:
- Speed — Async/parallel SSH within a BFS level. The two ECMP branches at a given depth connect sequentially today; they could connect simultaneously.
- TUI dashboard — Textual-based tree view with color-coded verdicts, drill-down into any hop for full diagnostics. Same pattern as TerminalTelemetry.
- TextFSM templates — Replace IOS regex parsers with NTC-templates for better cross-version reliability.
- NX-OS IPv6 parsers — v6 command templates are in place; ND and ARP-by-MAC parsers needed for NX-OS to complete quad-platform v6 coverage.
- MPLS label path tracing — Models include label stacks and LFIB lookups. Parsers and walker integration needed.
- VXLAN/overlay tracing — Follow the overlay, then validate the underlay for each VTEP-to-VTEP segment.
- Pre/post change comparison — Snapshot a chain, make a change, snapshot again, diff the forwarding state.
- NetBox integration — Credential lookup, topology hints, expected-path validation.
- Credential vault — YubiKey, HashiCorp Vault integration via existing nterm patterns.
License
MIT
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fibtrace-0.1.3.tar.gz.
File metadata
- Download URL: fibtrace-0.1.3.tar.gz
- Upload date:
- Size: 57.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
624e54c16793cf1c3ce416bd6a3e699833c48f388a240d30e8d1280b47802e0d
|
|
| MD5 |
ea23a61a6e9dfa0e481cd71aa95589d3
|
|
| BLAKE2b-256 |
bd975c33a92db4e94a2fc167aed0739a79882c7a5f6174bfaca78487ff819784
|
File details
Details for the file fibtrace-0.1.3-py3-none-any.whl.
File metadata
- Download URL: fibtrace-0.1.3-py3-none-any.whl
- Upload date:
- Size: 54.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
50b92281d73368f5bb26024da05928bd5cdfee445a05dc86bba1ae90e0338ee6
|
|
| MD5 |
6d6a967dc7b20d2fd601a31a56e45375
|
|
| BLAKE2b-256 |
94ae073c7cc809803e720d1f5b5ceed00f28e1f80b20905f03f358303de8f008
|