Authors Top

If you have a few years of experience in Computer Science or research, and you’re interested in sharing that experience with the community, have a look at our Contribution Guidelines.

1. Introduction

Understanding the meaning of the various error messages that we, system administrators, face in our daily routine is key to quickly pinpoint and troubleshoot issues and bottlenecks. So, among the more frequent errors on modern distributed systems, we have the “request timed out” and “destination host unreachable” messages.

Errors like these may ruin anyone’s day. Actually, they are signs of a diverse range of issues that will surely require attention and immediate action.

In this tutorial, we’ll dig a little bit into these errors, and talk about some tools to help troubleshoot them.

2. The Internet Control Message Protocol

The Internet Control Message Protocol (ICMP) was first designed along with the venerable IP protocol, (RFC791) and is defined on the RFC792, dated back to 1981. It goals to provide diagnostic and control messages to IP networks.

Like any of the other major internet protocols, for instance, TCP or UDP, it runs over IP. Regardless of some of its original functions being now deprecated, it’s still quite used. Many of its control messages occur to signal network or its gateways connectivity issues. The more common ICMP control messages associated with those issues are (for the full listing, please check this):

    \[\vbox{ \offinterlineskip \halign{ \strut \vrule height1ex depth1ex width0px # &\kern3pt \hfil #\hfil\kern3pt &\kern3pt \hfil #\hfil\kern3pt &\kern3pt \hfil #\kern3pt &\kern3pt #\hfil\kern3pt \cr & \hfill Type & \hfill & Code & Description\cr \noalign{\hrule} & \hfill 0 & Echo Reply\hfill & 0 & Echo reply (used to~ping)\cr \noalign{\hrule} & \hfill 3 & Destination Unreachable\hfill & 0 & Destination network unreachable\cr & \hfill & \hfill & 1 & Destination host unreachable\cr & \hfill & \hfill & 2 & Destination protocol unreachable\cr & \hfill & \hfill & 3 & Destination port unreachable\cr & \hfill & \hfill & 4 & Fragmentation required, and~DF flag~set\cr & \hfill & \hfill & 5 & Source route failed\cr & \hfill & \hfill & 6 & Destination network unknown\cr & \hfill & \hfill & 7 & Destination host unknown\cr & \hfill & \hfill & 8 & Source host isolated\cr & \hfill & \hfill & 9 & Network administratively prohibited\cr & \hfill & \hfill & 10 & Host administratively prohibited\cr & \hfill & \hfill & 11 & Network unreachable for~ToS\cr & \hfill & \hfill & 12 & Host unreachable for~ToS\cr & \hfill & \hfill & 13 & Communication administratively prohibited\cr & \hfill & \hfill & 14 & Host Precedence Violation\cr & \hfill & \hfill & 15 & Precedence cutoff in effect\cr \noalign{\hrule} & \hfill 8 & Echo Request\hfill & 0 & Echo request (used to ping)\cr \noalign{\hrule} & \hfill 11 & Time Exceeded\hfill & 0 & TTL expired in transit\cr & \hfill & \hfill & 1 & Fragment reassembly time exceeded\cr \noalign{\hrule} & \hfill 30 & Traceroute (deprecated)\hfill & 0 & Information Request\cr } }\]

2.1. Destination Host Unreachable

The “Destination Unreachable” control message, including its subclass “Destination Host Unreachable”, occurs when the user host or its gateways can’t find a path to reach the destination.

Thus, when that happens, it is usually due to the lack of available and suitable routes from the user to the destination. We must note that, although unusual, there are network and firewall configurations or administrative actions that may generate this kind of message.

2.2. Request Timeout

On the other hand, The “Request Timeout” associates with the inability of client software to receive an answer (to an echo request control message, for instance) in a specific amount of time. It is not an actual ICMP control message.

It is generated when after some time, no answer was received whatsoever due to many factors: congestion in the network, the host being down or unresponsive, or packet losses.

2.3. Time Exceeded

In contrast, the “Time Exceeded” ICMP control message is not related to time but with distance. Whenever the network stack creates a new IP packet, it inserts a “Time to Live field”, also known as TTL. IPv6 specification renamed this field to “Hop Limit” retaining its functionality.

While traveling through the network, each time the packet goes to the next hop, its TTL value is decreased by one. As soon as it reaches 0 (zero), a “Time Exceeded” control message is sent to the packet’s origin host to inform that the packet would travel longer than the original packet’s TTL.

This behavior is shown on this image, the client sends an IP packet with a starting TTL of 10 towards a destination server. Each hop in the path decreases the TTL until it reaches its destination:


The maximum possible TTL (or Hop Limit in IPv6) is 255, meaning that this is the largest hop distance allowed for a single point-to-point Internet conversation. It is possible to enhance this distance with proxies in the route that can disassemble the packets, and assembling new ones, even though it is a behavior typical of man-in-the-middle class of attacks.

2.4. Traceroute

We can note on the table that the Traceroute control message is now deprecated. This may sound strange for administrators who use traceroute or tracert commands on daily basis to diagnose network connectivity issues.

The fact is that, currently, its functionality was actually redundant. By the way, it has been implemented by sending successive ICMP echo requests, TCP SYN, or UDP probe packets. By progressively increasing the sent packets TTL, from 1 to the number of hops needed to reach the target.

When the packet can’t reach its destination, or TTL goes to zero, an ICMP control message is sent back. That way, the client software registers the IP of the hosts that sent the corresponding ICMP control messages.

3. Utilities to Diagnose Network Connectivity Issues.

When faced with errors like “request timed out” or “destination host unreachable”, the first thing we must do is to try to pinpoint what is its underlying cause.

Any operating system that implements the IP stack must have a set of troubleshooting utilities at the system administrator’s disposal. We’ll take a look at the more common ones.

3.1. Ping

The first network diagnosis command that comes to mind is ping. This utility is almost as old as the IP protocol itself. It works by sending ICMP echo requests. Then it measures the time needed to receive a correspondent echo reply control message.

If that does not occur at a specific time, it issues “Request timed out” messages as a result.

For instance, to check if there is connectivity between two hosts and to check their communication latency (one of ping‘s output is the round-trip time – RTT) and packet loss. That way, we can use:

# ping -c 10
PING ( 56(84) bytes of data.
64 bytes from icmp_seq=1 ttl=53 time=31.8 ms
64 bytes from icmp_seq=2 ttl=53 time=31.7 ms
64 bytes from icmp_seq=3 ttl=53 time=31.2 ms
64 bytes from icmp_seq=4 ttl=53 time=30.2 ms
64 bytes from icmp_seq=5 ttl=53 time=31.1 ms
64 bytes from icmp_seq=6 ttl=53 time=79.1 ms
64 bytes from icmp_seq=7 ttl=53 time=30.6 ms
64 bytes from icmp_seq=8 ttl=53 time=319 ms
64 bytes from icmp_seq=9 ttl=53 time=31.5 ms
64 bytes from icmp_seq=10 ttl=53 time=29.9 ms

--- ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9015ms
rtt min/avg/max/mdev = 29.904/64.621/319.028/86.009 ms

The parameter -c is used to specify how many probe packets will be sent. As we can see. while probing the IP with 10 packets, we had 0% packet loss and an average round-trip time of 64 milliseconds, with 86 milliseconds mean standard deviation.

The current version of the ping command has a large number of options, we can see them all using the command ping -h.

3.2. Common Applications of ping

For the purpose of estimating latency and data loss, sometimes we need a large number of packets, and bigger payloads, as in:

# sudo ping -f -c 579 -s 1460
PING ( 1460(1488) bytes of data.
--- ping statistics ---
579 packets transmitted, 567 received, 2.07254% packet loss, time 9249ms
rtt min/avg/max/mdev = 148.030/154.707/408.936/25.042 ms, pipe 14, ipg/ewma 16.000/149.251 ms

The command with the -f (fastest packet rate possible) and -s (packet payload size) options set, generates higher loads, and the -f option is restricted to superuser only. As a matter of fact, we should never use the -f option to probe other parties’ systems, as it is considered spurious traffic and may be understood as malicious.

On a side note, the options -f and -s had some history of being abused by DoS (Denial of Service attacks). Like the famous Ping of Death attack, targeting a packet fragmentation bug, where a multimillion-dollar machine could be brought down by a single command as simple as:

# ping -s 65535 <host IP>

Even though these attacks have few vulnerable targets nowadays, ICMP control messages are extensively used by prospective attackers to map networks and potential targets.

That’s why it is usual to use firewalls to control what ICMP control messages can pass to the internal network elements and to what destinations.

The best practice is to allow only incoming ICMP traffic to a handful of internal hosts needed for basic troubleshooting and restrict outbound to only ICMP echo request and reply control messages.

3.3. Traceroute

If we see messages like “destination host unreachable”, we know that we have some issue with the routing discovery to that host. Accordingly, to pinpoint where it occurs, we can use the traceroute command.

This command traces what are the hops in between two hosts.

We can select the protocol used to probe (among ICMP, UDP, or TCP), the number and timing of the probes, hint the routers, gateways, or interfaces to use, and try to probe the MTU (Max Transmission Unit, i.e., the largest payload without fragmentation) along the routes or gues the reverse route from the target to our own host.

For instance, let’s map the route from our host to google DNS:

# traceroute -n
traceroute to (, 30 hops max, 60 byte packets
 1  4.162 ms  3.856 ms  3.705 ms
 2  9.591 ms  9.481 ms  9.371 ms
 3  9.265 ms  9.155 ms  9.991 ms
 4  10.101 ms  10.107 ms  9.663 ms
 5  33.581 ms  27.239 ms  27.133 ms
 6  30.848 ms  28.394 ms  23.335 ms
 7  *  30.368 ms *
 8  * * *
 9  28.958 ms  32.079 ms  31.915 ms

The option -n asks to not resolve hostnames. The command’s output showed 9 hops from the local machine to the google DNS server, and there are some very interesting things to note:

  • The asterisk marks show probes that timed out, it is not uncommon to find gateways on the net that simply do not respond to probes of some kind, like the 8th hop.
  • On some hops, 3rd, 4th, 5th, and 6th, we had answers from different hosts, meaning that multiple routes were available, and our probes moved through different gateways.
  • By the time difference among each hop, we can see the ones who add more time to our round-trip time. Hence, if we consistently see inter-hop time differences of more than 100ms, we are probably seeing international routes. More than 500 ms, chances are that the packets are going through satellite ones.

For a complete list of the extensive number of parameters, we can issue a traceroute –help command.

4. Conclusion

In this tutorial, we briefly talked about common errors like “Destination Host Unreachable” and “Request Timeout”. Furthermore, we got a better understanding of how they relate to each other, and some of the tools we use to analyze them.

However, the are several network analysis tools that can enhance our understanding of network issues:

Sometimes, we need to go deeper. Analyze the traffic, review its content, using tools that can show the network packets’ anatomy, headers, and payload. For that matter, we can use Tcpdump or, a graphical packet analyzer like Wireshark.

Other times, we need to gather more information about the network itself and its hosts. So, we can use Nmap, a tool that can do a very detailed analysis of the hosts in a network, and detect what services they run, among many other uses.

Last, but not least, we can use the tc command to simulate network issues and evaluate how our systems will operate on specific scenarios of network malfunction.

Authors Bottom

If you have a few years of experience in Computer Science or research, and you’re interested in sharing that experience with the community, have a look at our Contribution Guidelines.

Comments are closed on this article!