source:
patches/iputils-s20150815-build-1.patch@
00529f2
Last change on this file since 00529f2 was cd6248b, checked in by , 9 years ago | |
---|---|
|
|
File size: 45.7 KB |
-
iputils-s20150815
Submitted By: William Harrington <kb0iic at cross-lfs dot org> Date: 2015-08-30 Initial Package Version: s20150815 Upstream Status: Applied Origin: git://git.linux-ipv6.org/gitroot/iputils.git Description: Edits Makefile USE_ Variables and includes man pages. diff -Naur iputils-s20150815.orig/Makefile iputils-s20150815/Makefile
old new 27 27 # sysfs support (with libsysfs - deprecated) [no|yes|static] 28 28 USE_SYSFS=no 29 29 # IDN support [yes|no|static] 30 USE_IDN= yes30 USE_IDN=no 31 31 32 32 # Do not use getifaddrs [no|yes|static] 33 33 WITHOUT_IFADDRS=no … … 35 35 ARPING_DEFAULT_DEVICE= 36 36 37 37 # nettle library for ipv6 ping [yes|no|static] 38 USE_NETTLE= yes38 USE_NETTLE=no 39 39 # libgcrypt library for ipv6 ping [no|yes|static] 40 40 USE_GCRYPT=no 41 41 # Crypto library for ping6 [shared|static|no] -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/arping.8 iputils-s20150815/doc/arping.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "ARPING" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 arping \- send ARP REQUEST to a neighbour host 9 .SH SYNOPSIS 10 11 \fBarping\fR [\fB-AbDfhqUV\fR] [\fB-c \fIcount\fB\fR] [\fB-w \fIdeadline\fB\fR] [\fB-s \fIsource\fB\fR] \fB-I \fIinterface\fB\fR \fB\fIdestination\fB\fR 12 13 .SH "DESCRIPTION" 14 .PP 15 Ping \fIdestination\fR on device \fIinterface\fR by ARP packets, 16 using source address \fIsource\fR. 17 .SH "OPTIONS" 18 .TP 19 \fB-A\fR 20 The same as \fB-U\fR, but ARP REPLY packets used instead 21 of ARP REQUEST. 22 .TP 23 \fB-b\fR 24 Send only MAC level broadcasts. Normally \fBarping\fR starts 25 from sending broadcast, and switch to unicast after reply received. 26 .TP 27 \fB-c \fIcount\fB\fR 28 Stop after sending \fIcount\fR ARP REQUEST 29 packets. With 30 \fIdeadline\fR 31 option, instead wait for 32 \fIcount\fR ARP REPLY packets, or until the timeout expires. 33 .TP 34 \fB-D\fR 35 Duplicate address detection mode (DAD). See 36 RFC2131, 4.4.1. 37 Returns 0, if DAD succeeded i.e. no replies are received 38 .TP 39 \fB-f\fR 40 Finish after the first reply confirming that target is alive. 41 .TP 42 \fB-I \fIinterface\fB\fR 43 Name of network device where to send ARP REQUEST packets. 44 .TP 45 \fB-h\fR 46 Print help page and exit. 47 .TP 48 \fB-q\fR 49 Quiet output. Nothing is displayed. 50 .TP 51 \fB-s \fIsource\fB\fR 52 IP source address to use in ARP packets. 53 If this option is absent, source address is: 54 .RS 55 .TP 0.2i 56 \(bu 57 In DAD mode (with option \fB-D\fR) set to 0.0.0.0. 58 .TP 0.2i 59 \(bu 60 In Unsolicited ARP mode (with options \fB-U\fR or \fB-A\fR) 61 set to \fIdestination\fR. 62 .TP 0.2i 63 \(bu 64 Otherwise, it is calculated from routing tables. 65 .RE 66 .TP 67 \fB-U\fR 68 Unsolicited ARP mode to update neighbours' ARP caches. 69 No replies are expected. 70 .TP 71 \fB-V\fR 72 Print version of the program and exit. 73 .TP 74 \fB-w \fIdeadline\fB\fR 75 Specify a timeout, in seconds, before 76 \fBarping\fR 77 exits regardless of how many 78 packets have been sent or received. In this case 79 \fBarping\fR 80 does not stop after 81 \fIcount\fR 82 packet are sent, it waits either for 83 \fIdeadline\fR 84 expire or until 85 \fIcount\fR 86 probes are answered. 87 .SH "SEE ALSO" 88 .PP 89 \fBping\fR(8), 90 \fBclockdiff\fR(8), 91 \fBtracepath\fR(8). 92 .SH "AUTHOR" 93 .PP 94 \fBarping\fR was written by 95 Alexey Kuznetsov 96 <kuznet@ms2.inr.ac.ru>. 97 It is now maintained by 98 YOSHIFUJI Hideaki 99 <yoshfuji@skbuff.net>. 100 .SH "SECURITY" 101 .PP 102 \fBarping\fR requires CAP_NET_RAW capability 103 to be executed. It is not recommended to be used as set-uid root, 104 because it allows user to modify ARP caches of neighbour hosts. 105 .SH "AVAILABILITY" 106 .PP 107 \fBarping\fR is part of \fIiputils\fR package 108 and the latest versions are available in source form at 109 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/clockdiff.8 iputils-s20150815/doc/clockdiff.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "CLOCKDIFF" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 clockdiff \- measure clock difference between hosts 9 .SH SYNOPSIS 10 11 \fBclockdiff\fR [\fB-o\fR] [\fB-o1\fR] \fB\fIdestination\fB\fR 12 13 .SH "DESCRIPTION" 14 .PP 15 \fBclockdiff\fR Measures clock difference between us and 16 \fIdestination\fR with 1 msec resolution using ICMP TIMESTAMP 17 [2] 18 packets or, optionally, IP TIMESTAMP option 19 [3] 20 option added to ICMP ECHO. 21 [1] 22 .SH "OPTIONS" 23 .TP 24 \fB-o\fR 25 Use IP TIMESTAMP with ICMP ECHO instead of ICMP TIMESTAMP 26 messages. It is useful with some destinations, which do not support 27 ICMP TIMESTAMP (f.e. Solaris <2.4). 28 .TP 29 \fB-o1\fR 30 Slightly different form of \fB-o\fR, namely it uses three-term 31 IP TIMESTAMP with prespecified hop addresses instead of four term one. 32 What flavor works better depends on target host. Particularly, 33 \fB-o\fR is better for Linux. 34 .SH "WARNINGS" 35 .TP 0.2i 36 \(bu 37 Some nodes (Cisco) use non-standard timestamps, which is allowed 38 by RFC, but makes timestamps mostly useless. 39 .TP 0.2i 40 \(bu 41 Some nodes generate messed timestamps (Solaris>2.4), when 42 run \fBxntpd\fR. Seems, its IP stack uses a corrupted clock source, 43 which is synchronized to time-of-day clock periodically and jumps 44 randomly making timestamps mostly useless. Good news is that you can 45 use NTP in this case, which is even better. 46 .TP 0.2i 47 \(bu 48 \fBclockdiff\fR shows difference in time modulo 24 days. 49 .SH "SEE ALSO" 50 .PP 51 \fBping\fR(8), 52 \fBarping\fR(8), 53 \fBtracepath\fR(8). 54 .SH "REFERENCES" 55 .PP 56 [1] ICMP ECHO, 57 RFC0792, page 14. 58 .PP 59 [2] ICMP TIMESTAMP, 60 RFC0792, page 16. 61 .PP 62 [3] IP TIMESTAMP option, 63 RFC0791, 3.1, page 16. 64 .SH "AUTHOR" 65 .PP 66 \fBclockdiff\fR was compiled by 67 Alexey Kuznetsov 68 <kuznet@ms2.inr.ac.ru>. It was based on code borrowed 69 from BSD \fBtimed\fR daemon. 70 It is now maintained by 71 YOSHIFUJI Hideaki 72 <yoshfuji@skbuff.net>. 73 .SH "SECURITY" 74 .PP 75 \fBclockdiff\fR requires CAP_NET_RAW capability 76 to be executed. It is safe to be used as set-uid root. 77 .SH "AVAILABILITY" 78 .PP 79 \fBclockdiff\fR is part of \fIiputils\fR package 80 and the latest versions are available in source form at 81 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/ninfod.8 iputils-s20150815/doc/ninfod.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "NINFOD" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 ninfod \- Respond to IPv6 Node Information Queries 9 .SH SYNOPSIS 10 11 \fBninfod\fR [\fB-dhv\fR] [\fB-p \fIpidfile\fB\fR] [\fB-u \fIuser\fB\fR] 12 13 .SH "DESCRIPTION" 14 .PP 15 Responds to IPv6 Node Information Queries (RFC4620) from clients. 16 Queries can be sent by various implementations of \fBping6\fR command. 17 .SH "OPTIONS" 18 .TP 19 \fB-a\fR 20 Debug mode. Do not go background. 21 .TP 22 \fB-h\fR 23 Show help. 24 .TP 25 \fB-v\fR 26 Verbose mode. 27 .TP 28 \fB-u \fIuser\fB\fR 29 Run as another user. 30 \fIuser\fR can either be username or user ID. 31 .TP 32 \fB-p \fIpidfile\fB\fR 33 File for process-id storage. 34 \fIuser\fR is required to be able to create the file. 35 .SH "SEE ALSO" 36 .PP 37 \fBping\fR(8). 38 .SH "AUTHOR" 39 .PP 40 \fBninfod\fR was written by USAGI/WIDE Project. 41 .SH "COPYING" 42 .PP 43 44 .nf 45 Copyright (C) 2012 YOSHIFUJI Hideaki. 46 Copyright (C) 2002 USAGI/WIDE Project. 47 All rights reserved. 48 49 Redistribution and use in source and binary forms, with or without 50 modification, are permitted provided that the following conditions 51 are met: 52 1. Redistributions of source code must retain the above copyright 53 notice, this list of conditions and the following disclaimer. 54 2. Redistributions in binary form must reproduce the above copyright 55 notice, this list of conditions and the following disclaimer in the 56 documentation and/or other materials provided with the distribution. 57 3. Neither the name of the project nor the names of its contributors 58 may be used to endorse or promote products derived from this software 59 without specific prior written permission. 60 61 THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 62 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 63 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 64 ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 65 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 66 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 67 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 68 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 69 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 70 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 71 SUCH DAMAGE. 72 .fi -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/pg3.8 iputils-s20150815/doc/pg3.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "PG3" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 pg3, ipg, pgset \- send stream of UDP packets 9 .SH SYNOPSIS 10 11 \fBsource ipg\fR 12 13 14 \fBpg\fR 15 16 17 \fBpgset\fR \fB\fICOMMAND\fB\fR 18 19 .SH "DESCRIPTION" 20 .PP 21 \fBipg\fR is not a program, it is script which should be sourced 22 to \fBbash\fR. When sourced it loads module \fIpg3\fR and 23 exports a few of functions accessible from parent shell. These macros 24 are \fBpg\fR to start packet injection and to get the results of run; 25 and \fBpgset\fR to setup packet generator. 26 .PP 27 \fBpgset\fR can send the following commands to module \fIpg3\fR: 28 .SH "COMMAND" 29 .TP 30 \fBodev \fIDEVICE\fB\fR 31 Name of Ethernet device to test. See 32 warning below. 33 .TP 34 \fBpkt_size \fIBYTES\fB\fR 35 Size of packet to generate. The size includes all the headers: UDP, IP, 36 MAC, but does not account for overhead internal to medium, i.e. FCS 37 and various paddings. 38 .TP 39 \fBfrags \fINUMBER\fB\fR 40 Each packet will contain \fINUMBER\fR of fragments. 41 Maximal amount for linux-2.4 is 6. Far not all the devices support 42 fragmented buffers. 43 .TP 44 \fBcount \fINUMBER\fB\fR 45 Send stream of \fINUMBER\fR of packets and stop after this. 46 .TP 47 \fBipg \fITIME\fB\fR 48 Introduce artificial delay between packets of \fITIME\fR 49 microseconds. 50 .TP 51 \fBdst \fIIP_ADDRESS\fB\fR 52 Select IP destination where the stream is sent to. 53 Beware, never set this address at random. \fBpg3\fR is not a toy, 54 it creates really tough stream. Default value is 0.0.0.0. 55 .TP 56 \fBdst \fIMAC_ADDRESS\fB\fR 57 Select MAC destination where the stream is sent to. 58 Default value is 00:00:00:00:00:00 in hope that this will not be received 59 by any node on LAN. 60 .TP 61 \fBstop\fR 62 Abort packet injection. 63 .SH "WARNING" 64 .PP 65 When output device is set to some random device different 66 of hardware Ethernet device, \fBpg3\fR will crash kernel. 67 .PP 68 Do not use it on VLAN, ethertap, VTUN and other devices, 69 which emulate Ethernet not being real Ethernet in fact. 70 .SH "AUTHOR" 71 .PP 72 \fBpg3\fR was written by Robert Olsson <robert.olsson@its.uu.se>. 73 .SH "SECURITY" 74 .PP 75 This can be used only by superuser. 76 .PP 77 This tool creates floods of packets which is unlikely to be handled 78 even by high-end machines. For example, it saturates gigabit link with 79 60 byte packets when used with Intel's e1000. In face of such stream 80 switches, routers and end hosts may deadlock, crash, explode. 81 Use only in test lab environment. 82 .SH "AVAILABILITY" 83 .PP 84 \fBpg3\fR is part of \fIiputils\fR package 85 and the latest versions are available in source form at 86 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/ping.8 iputils-s20150815/doc/ping.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "PING" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 ping, ping6 \- send ICMP ECHO_REQUEST to network hosts 9 .SH SYNOPSIS 10 11 \fBping\fR [\fB-aAbBdDfhLnOqrRUvV6\fR] [\fB-c \fIcount\fB\fR] [\fB-F \fIflowlabel\fB\fR] [\fB-i \fIinterval\fB\fR] [\fB-I \fIinterface\fB\fR] [\fB-l \fIpreload\fB\fR] [\fB-m \fImark\fB\fR] [\fB-M \fIpmtudisc_option\fB\fR] [\fB-N \fInodeinfo_option\fB\fR] [\fB-w \fIdeadline\fB\fR] [\fB-W \fItimeout\fB\fR] [\fB-p \fIpattern\fB\fR] [\fB-Q \fItos\fB\fR] [\fB-s \fIpacketsize\fB\fR] [\fB-S \fIsndbuf\fB\fR] [\fB-t \fIttl\fB\fR] [\fB-T \fItimestamp option\fB\fR] [\fB\fIhop\fB\fR\fI ...\fR] \fB\fIdestination\fB\fR 12 13 .SH "DESCRIPTION" 14 .PP 15 \fBping\fR uses the ICMP protocol's mandatory ECHO_REQUEST 16 datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. 17 ECHO_REQUEST datagrams (``pings'') have an IP and ICMP 18 header, followed by a struct timeval and then an arbitrary 19 number of ``pad'' bytes used to fill out the packet. 20 .PP 21 \fBping6\fR is IPv6 version of \fBping\fR, and can also send Node Information Queries (RFC4620). 22 Intermediate \fIhop\fRs may not be allowed, because IPv6 source routing was deprecated (RFC5095). 23 .SH "OPTIONS" 24 .TP 25 \fB-a\fR 26 Audible ping. 27 .TP 28 \fB-A\fR 29 Adaptive ping. Interpacket interval adapts to round-trip time, so that 30 effectively not more than one (or more, if preload is set) unanswered probe 31 is present in the network. Minimal interval is 200msec for not super-user. 32 On networks with low rtt this mode is essentially equivalent to flood mode. 33 .TP 34 \fB-b\fR 35 Allow pinging a broadcast address. 36 .TP 37 \fB-B\fR 38 Do not allow \fBping\fR to change source address of probes. 39 The address is bound to one selected when \fBping\fR starts. 40 .TP 41 \fB-c \fIcount\fB\fR 42 Stop after sending \fIcount\fR ECHO_REQUEST 43 packets. With 44 \fIdeadline\fR 45 option, \fBping\fR waits for 46 \fIcount\fR ECHO_REPLY packets, until the timeout expires. 47 .TP 48 \fB-d\fR 49 Set the SO_DEBUG option on the socket being used. 50 Essentially, this socket option is not used by Linux kernel. 51 .TP 52 \fB-D\fR 53 Print timestamp (unix time + microseconds as in gettimeofday) before 54 each line. 55 .TP 56 \fB-f\fR 57 Flood ping. For every ECHO_REQUEST sent a period ``.'' is printed, 58 while for ever ECHO_REPLY received a backspace is printed. 59 This provides a rapid display of how many packets are being dropped. 60 If interval is not given, it sets interval to zero and 61 outputs packets as fast as they come back or one hundred times per second, 62 whichever is more. 63 Only the super-user may use this option with zero interval. 64 .TP 65 \fB-F \fIflow label\fB\fR 66 \fBping6\fR only. 67 Allocate and set 20 bit flow label (in hex) on echo request packets. 68 If value is zero, kernel allocates random flow label. 69 .TP 70 \fB-h\fR 71 Show help. 72 .TP 73 \fB-i \fIinterval\fB\fR 74 Wait \fIinterval\fR seconds between sending each packet. 75 The default is to wait for one second between each packet normally, 76 or not to wait in flood mode. Only super-user may set interval 77 to values less 0.2 seconds. 78 .TP 79 \fB-I \fIinterface\fB\fR 80 \fIinterface\fR is either an address, or an interface name. 81 If \fIinterface\fR is an address, it sets source address 82 to specified interface address. 83 If \fIinterface\fR in an interface name, it sets 84 source interface to specified interface. 85 For \fBping6\fR, when doing ping to a link-local scope 86 address, link specification (by the '%'-notation in 87 \fIdestination\fR, or by this option) is required. 88 .TP 89 \fB-l \fIpreload\fB\fR 90 If \fIpreload\fR is specified, 91 \fBping\fR sends that many packets not waiting for reply. 92 Only the super-user may select preload more than 3. 93 .TP 94 \fB-L\fR 95 Suppress loopback of multicast packets. This flag only applies if the ping 96 destination is a multicast address. 97 .TP 98 \fB-m \fImark\fB\fR 99 use \fImark\fR to tag the packets going out. This is useful 100 for variety of reasons within the kernel such as using policy 101 routing to select specific outbound processing. 102 .TP 103 \fB-M \fIpmtudisc_opt\fB\fR 104 Select Path MTU Discovery strategy. 105 \fIpmtudisc_option\fR may be either \fIdo\fR 106 (prohibit fragmentation, even local one), 107 \fIwant\fR (do PMTU discovery, fragment locally when packet size 108 is large), or \fIdont\fR (do not set DF flag). 109 .TP 110 \fB-N \fInodeinfo_option\fB\fR 111 \fBping6\fR only. 112 Send ICMPv6 Node Information Queries (RFC4620), instead of Echo Request. 113 CAP_NET_RAW capability is required. 114 .RS 115 .TP 116 \fBhelp\fR 117 Show help for NI support. 118 .RE 119 .RS 120 .TP 121 \fBname\fR 122 Queries for Node Names. 123 .RE 124 .RS 125 .TP 126 \fBipv6\fR 127 Queries for IPv6 Addresses. There are several IPv6 specific flags. 128 .RS 129 .TP 130 \fBipv6-global\fR 131 Request IPv6 global-scope addresses. 132 .RE 133 .RS 134 .TP 135 \fBipv6-sitelocal\fR 136 Request IPv6 site-local addresses. 137 .RE 138 .RS 139 .TP 140 \fBipv6-linklocal\fR 141 Request IPv6 link-local addresses. 142 .RE 143 .RS 144 .TP 145 \fBipv6-all\fR 146 Request IPv6 addresses on other interfaces. 147 .RE 148 .RE 149 .RS 150 .TP 151 \fBipv4\fR 152 Queries for IPv4 Addresses. There is one IPv4 specific flag. 153 .RS 154 .TP 155 \fBipv4-all\fR 156 Request IPv4 addresses on other interfaces. 157 .RE 158 .RE 159 .RS 160 .TP 161 \fBsubject-ipv6=\fIipv6addr\fB\fR 162 IPv6 subject address. 163 .RE 164 .RS 165 .TP 166 \fBsubject-ipv4=\fIipv4addr\fB\fR 167 IPv4 subject address. 168 .RE 169 .RS 170 .TP 171 \fBsubject-name=\fInodename\fB\fR 172 Subject name. If it contains more than one dot, 173 fully-qualified domain name is assumed. 174 .RE 175 .RS 176 .TP 177 \fBsubject-fqdn=\fInodename\fB\fR 178 Subject name. Fully-qualified domain name is 179 always assumed. 180 .RE 181 .TP 182 \fB-n\fR 183 Numeric output only. 184 No attempt will be made to lookup symbolic names for host addresses. 185 .TP 186 \fB-O\fR 187 Report outstanding ICMP ECHO reply before sending next packet. 188 This is useful together with the timestamp \fB-D\fR to 189 log output to a diagnostic file and search for missing answers. 190 .TP 191 \fB-p \fIpattern\fB\fR 192 You may specify up to 16 ``pad'' bytes to fill out the packet you send. 193 This is useful for diagnosing data-dependent problems in a network. 194 For example, \fB-p ff\fR will cause the sent packet 195 to be filled with all ones. 196 .TP 197 \fB-q\fR 198 Quiet output. 199 Nothing is displayed except the summary lines at startup time and 200 when finished. 201 .TP 202 \fB-Q \fItos\fB\fR 203 Set Quality of Service -related bits in ICMP datagrams. 204 \fItos\fR can be decimal (\fBping\fR only) or hex number. 205 206 In RFC2474, these fields are interpreted as 8-bit Differentiated 207 Services (DS), consisting of: bits 0-1 (2 lowest bits) of separate 208 data, and bits 2-7 (highest 6 bits) of Differentiated Services 209 Codepoint (DSCP). In RFC2481 and RFC3168, bits 0-1 are used for ECN. 210 211 Historically (RFC1349, obsoleted by RFC2474), these were interpreted 212 as: bit 0 (lowest bit) for reserved (currently being redefined as 213 congestion control), 1-4 for Type of Service and bits 5-7 214 (highest bits) for Precedence. 215 .TP 216 \fB-r\fR 217 Bypass the normal routing tables and send directly to a host on an attached 218 interface. 219 If the host is not on a directly-attached network, an error is returned. 220 This option can be used to ping a local host through an interface 221 that has no route through it provided the option \fB-I\fR is also 222 used. 223 .TP 224 \fB-R\fR 225 \fBping\fR only. 226 Record route. 227 Includes the RECORD_ROUTE option in the ECHO_REQUEST 228 packet and displays the route buffer on returned packets. 229 Note that the IP header is only large enough for nine such routes. 230 Many hosts ignore or discard this option. 231 .TP 232 \fB-s \fIpacketsize\fB\fR 233 Specifies the number of data bytes to be sent. 234 The default is 56, which translates into 64 ICMP 235 data bytes when combined with the 8 bytes of ICMP header data. 236 .TP 237 \fB-S \fIsndbuf\fB\fR 238 Set socket sndbuf. If not specified, it is selected to buffer 239 not more than one packet. 240 .TP 241 \fB-t \fIttl\fB\fR 242 \fBping\fR only. 243 Set the IP Time to Live. 244 .TP 245 \fB-T \fItimestamp option\fB\fR 246 Set special IP timestamp options. 247 \fItimestamp option\fR may be either 248 \fItsonly\fR (only timestamps), 249 \fItsandaddr\fR (timestamps and addresses) or 250 \fItsprespec host1 [host2 [host3 [host4]]]\fR 251 (timestamp prespecified hops). 252 .TP 253 \fB-U\fR 254 Print full user-to-user latency (the old behaviour). Normally 255 \fBping\fR 256 prints network round trip time, which can be different 257 f.e. due to DNS failures. 258 .TP 259 \fB-v\fR 260 Verbose output. 261 .TP 262 \fB-V\fR 263 Show version and exit. 264 .TP 265 \fB-w \fIdeadline\fB\fR 266 Specify a timeout, in seconds, before 267 \fBping\fR 268 exits regardless of how many 269 packets have been sent or received. In this case 270 \fBping\fR 271 does not stop after 272 \fIcount\fR 273 packet are sent, it waits either for 274 \fIdeadline\fR 275 expire or until 276 \fIcount\fR 277 probes are answered or for some error notification from network. 278 .TP 279 \fB-W \fItimeout\fB\fR 280 Time to wait for a response, in seconds. The option affects only timeout 281 in absence of any responses, otherwise \fBping\fR waits for two RTTs. 282 .PP 283 When using \fBping\fR for fault isolation, it should first be run 284 on the local host, to verify that the local network interface is up 285 and running. Then, hosts and gateways further and further away should be 286 ``pinged''. Round-trip times and packet loss statistics are computed. 287 If duplicate packets are received, they are not included in the packet 288 loss calculation, although the round trip time of these packets is used 289 in calculating the minimum/average/maximum round-trip time numbers. 290 When the specified number of packets have been sent (and received) or 291 if the program is terminated with a 292 SIGINT, a brief summary is displayed. Shorter current statistics 293 can be obtained without termination of process with signal 294 SIGQUIT. 295 .PP 296 If \fBping\fR does not receive any reply packets at all it will 297 exit with code 1. If a packet 298 \fIcount\fR 299 and 300 \fIdeadline\fR 301 are both specified, and fewer than 302 \fIcount\fR 303 packets are received by the time the 304 \fIdeadline\fR 305 has arrived, it will also exit with code 1. 306 On other error it exits with code 2. Otherwise it exits with code 0. This 307 makes it possible to use the exit code to see if a host is alive or 308 not. 309 .PP 310 This program is intended for use in network testing, measurement and 311 management. 312 Because of the load it can impose on the network, it is unwise to use 313 \fBping\fR during normal operations or from automated scripts. 314 .SH "ICMP PACKET DETAILS" 315 .PP 316 An IP header without options is 20 bytes. 317 An ICMP ECHO_REQUEST packet contains an additional 8 bytes worth 318 of ICMP header followed by an arbitrary amount of data. 319 When a \fIpacketsize\fR is given, this indicated the size of this 320 extra piece of data (the default is 56). Thus the amount of data received 321 inside of an IP packet of type ICMP ECHO_REPLY will always be 8 bytes 322 more than the requested data space (the ICMP header). 323 .PP 324 If the data space is at least of size of struct timeval 325 \fBping\fR uses the beginning bytes of this space to include 326 a timestamp which it uses in the computation of round trip times. 327 If the data space is shorter, no round trip times are given. 328 .SH "DUPLICATE AND DAMAGED PACKETS" 329 .PP 330 \fBping\fR will report duplicate and damaged packets. 331 Duplicate packets should never occur, and seem to be caused by 332 inappropriate link-level retransmissions. 333 Duplicates may occur in many situations and are rarely (if ever) a 334 good sign, although the presence of low levels of duplicates may not 335 always be cause for alarm. 336 .PP 337 Damaged packets are obviously serious cause for alarm and often 338 indicate broken hardware somewhere in the 339 \fBping\fR packet's path (in the network or in the hosts). 340 .SH "TRYING DIFFERENT DATA PATTERNS" 341 .PP 342 The (inter)network layer should never treat packets differently depending 343 on the data contained in the data portion. 344 Unfortunately, data-dependent problems have been known to sneak into 345 networks and remain undetected for long periods of time. 346 In many cases the particular pattern that will have problems is something 347 that doesn't have sufficient ``transitions'', such as all ones or all 348 zeros, or a pattern right at the edge, such as almost all zeros. 349 It isn't necessarily enough to specify a data pattern of all zeros (for 350 example) on the command line because the pattern that is of interest is 351 at the data link level, and the relationship between what you type and 352 what the controllers transmit can be complicated. 353 .PP 354 This means that if you have a data-dependent problem you will probably 355 have to do a lot of testing to find it. 356 If you are lucky, you may manage to find a file that either can't be sent 357 across your network or that takes much longer to transfer than other 358 similar length files. 359 You can then examine this file for repeated patterns that you can test 360 using the \fB-p\fR option of \fBping\fR. 361 .SH "TTL DETAILS" 362 .PP 363 The TTL value of an IP packet represents the maximum number of IP routers 364 that the packet can go through before being thrown away. 365 In current practice you can expect each router in the Internet to decrement 366 the TTL field by exactly one. 367 .PP 368 The TCP/IP specification states that the TTL field for TCP 369 packets should be set to 60, but many systems use smaller values 370 (4.3 BSD uses 30, 4.2 used 15). 371 .PP 372 The maximum possible value of this field is 255, and most Unix systems set 373 the TTL field of ICMP ECHO_REQUEST packets to 255. 374 This is why you will find you can ``ping'' some hosts, but not reach them 375 with 376 \fBtelnet\fR(1) 377 or 378 \fBftp\fR(1). 379 .PP 380 In normal operation ping prints the TTL value from the packet it receives. 381 When a remote system receives a ping packet, it can do one of three things 382 with the TTL field in its response: 383 .TP 0.2i 384 \(bu 385 Not change it; this is what Berkeley Unix systems did before the 386 4.3BSD Tahoe release. In this case the TTL value in the received packet 387 will be 255 minus the number of routers in the round-trip path. 388 .TP 0.2i 389 \(bu 390 Set it to 255; this is what current Berkeley Unix systems do. 391 In this case the TTL value in the received packet will be 255 minus the 392 number of routers in the path \fBfrom\fR 393 the remote system \fBto\fR the \fBping\fRing host. 394 .TP 0.2i 395 \(bu 396 Set it to some other value. Some machines use the same value for 397 ICMP packets that they use for TCP packets, for example either 30 or 60. 398 Others may use completely wild values. 399 .SH "BUGS" 400 .TP 0.2i 401 \(bu 402 Many Hosts and Gateways ignore the RECORD_ROUTE option. 403 .TP 0.2i 404 \(bu 405 The maximum IP header length is too small for options like 406 RECORD_ROUTE to be completely useful. 407 There's not much that can be done about this, however. 408 .TP 0.2i 409 \(bu 410 Flood pinging is not recommended in general, and flood pinging the 411 broadcast address should only be done under very controlled conditions. 412 .SH "SEE ALSO" 413 .PP 414 \fBnetstat\fR(1), 415 \fBifconfig\fR(8). 416 .SH "HISTORY" 417 .PP 418 The \fBping\fR command appeared in 4.3BSD. 419 .PP 420 The version described here is its descendant specific to Linux. 421 .SH "SECURITY" 422 .PP 423 \fBping\fR requires CAP_NET_RAW capability 424 to be executed 1) if the program is used for non-echo queries 425 (See \fB-N\fR option), or 2) if kernel does not 426 support non-raw ICMP sockets, or 3) if the user is not allowed 427 to create an ICMP echo socket. The program may be used as 428 set-uid root. 429 .SH "AVAILABILITY" 430 .PP 431 \fBping\fR is part of \fIiputils\fR package 432 and the latest versions are available in source form at 433 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/rarpd.8 iputils-s20150815/doc/rarpd.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "RARPD" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 rarpd \- answer RARP REQUESTs 9 .SH SYNOPSIS 10 11 \fBarping\fR [\fB-aAvde\fR] [\fB-b \fIbootdir\fB\fR] [\fB\fIinterface\fB\fR] 12 13 .SH "DESCRIPTION" 14 .PP 15 Listens 16 RARP 17 requests from clients. Provided MAC address of client 18 is found in \fI/etc/ethers\fR database and 19 obtained host name is resolvable to an IP address appropriate 20 for attached network, \fBrarpd\fR answers to client with RARPD 21 reply carrying an IP address. 22 .PP 23 To allow multiple boot servers on the network \fBrarpd\fR 24 optionally checks for presence Sun-like bootable image in TFTP directory. 25 It should have form \fBHexadecimal_IP.ARCH\fR, f.e. to load 26 sparc 193.233.7.98 \fIC1E90762.SUN4M\fR is linked to 27 an image appropriate for SUM4M in directory \fI/etc/tftpboot\fR. 28 .SH "WARNING" 29 .PP 30 This facility is deeply obsoleted by 31 BOOTP 32 and later 33 DHCP protocols. 34 However, some clients really still need this to boot. 35 .SH "OPTIONS" 36 .TP 37 \fB-a\fR 38 Listen on all the interfaces. Currently it is an internal 39 option, its function is overridden with \fIinterface\fR 40 argument. It should not be used. 41 .TP 42 \fB-A\fR 43 Listen not only RARP but also ARP messages, some rare clients 44 use ARP by some unknown reason. 45 .TP 46 \fB-v\fR 47 Be verbose. 48 .TP 49 \fB-d\fR 50 Debug mode. Do not go to background. 51 .TP 52 \fB-e\fR 53 Do not check for presence of a boot image, reply if MAC address 54 resolves to a valid IP address using \fI/etc/ethers\fR 55 database and DNS. 56 .TP 57 \fB-b \fIbootdir\fB\fR 58 TFTP boot directory. Default is \fI/etc/tftpboot\fR 59 .SH "SEE ALSO" 60 .PP 61 \fBarping\fR(8), 62 \fBtftpd\fR(8). 63 .SH "AUTHOR" 64 .PP 65 \fBrarpd\fR was written by 66 Alexey Kuznetsov 67 <kuznet@ms2.inr.ac.ru>. 68 It is now maintained by 69 YOSHIFUJI Hideaki 70 <yoshfuji@skbuff.net>. 71 .SH "SECURITY" 72 .PP 73 \fBrarpd\fR requires CAP_NET_RAW capability 74 to listen and send RARP and ARP packets. It also needs CAP_NET_ADMIN 75 to give to kernel hint for ARP resolution; this is not strictly required, 76 but some (most of, to be more exact) clients are so badly broken that 77 are not able to answer ARP before they are finally booted. This is 78 not wonderful taking into account that clients using RARPD in 2002 79 are all unsupported relic creatures of 90's and even earlier. 80 .SH "AVAILABILITY" 81 .PP 82 \fBrarpd\fR is part of \fIiputils\fR package 83 and the latest versions are available in source form at 84 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/rdisc.8 iputils-s20150815/doc/rdisc.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "RDISC" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 rdisc \- network router discovery daemon 9 .SH SYNOPSIS 10 11 \fBrdisc\fR [\fB-abdfrstvV\fR] [\fB-p \fIpreference\fB\fR] [\fB-T \fImax_interval\fB\fR] [\fB\fIsend_address\fB\fR] [\fB\fIreceive_address\fB\fR] 12 13 .SH "DESCRIPTION" 14 .PP 15 \fBrdisc\fR implements client side of the ICMP router discover protocol. 16 \fBrdisc\fR is invoked at boot time to populate the network 17 routing tables with default routes. 18 .PP 19 \fBrdisc\fR listens on the ALL_HOSTS (224.0.0.1) multicast address 20 (or \fIreceive_address\fR provided it is given) 21 for ROUTER_ADVERTISE messages from routers. The received 22 messages are handled by first ignoring those listed router addresses 23 with which the host does not share a network. Among the remaining addresses 24 the ones with the highest preference are selected as default routers 25 and a default route is entered in the kernel routing table 26 for each one of them. 27 .PP 28 Optionally, \fBrdisc\fR can avoid waiting for routers to announce 29 themselves by sending out a few ROUTER_SOLICITATION messages 30 to the ALL_ROUTERS (224.0.0.2) multicast address 31 (or \fIsend_address\fR provided it is given) 32 when it is started. 33 .PP 34 A timer is associated with each router address and the address will 35 no longer be considered for inclusion in the the routing tables if the 36 timer expires before a new 37 \fBadvertise\fR message is received from the router. 38 The address will also be excluded from consideration if the host receives an 39 \fBadvertise\fR 40 message with the preference being maximally negative. 41 .PP 42 Server side of router discovery protocol is supported by Cisco IOS 43 and by any more or less complete UNIX routing daemon, f.e \fBgated\fR. 44 Or, \fBrdisc\fR can act as responder, if compiled with -DRDISC_SERVER. 45 .SH "OPTIONS" 46 .TP 47 \fB-a\fR 48 Accept all routers independently of the preference they have in their 49 \fBadvertise\fR messages. 50 Normally \fBrdisc\fR only accepts (and enters in the kernel routing 51 tables) the router or routers with the highest preference. 52 .TP 53 \fB-b\fR 54 Opposite to \fB-a\fR, i.e. install only router with the best 55 preference value. It is default behaviour. 56 .TP 57 \fB-d\fR 58 Send debugging messages to syslog. 59 .TP 60 \fB-f\fR 61 Run \fBrdisc\fR forever even if no routers are found. 62 Normally \fBrdisc\fR gives up if it has not received any 63 \fBadvertise\fR message after after soliciting three times, 64 in which case it exits with a non-zero exit code. 65 If \fB-f\fR is not specified in the first form then 66 \fB-s\fR must be specified. 67 .TP 68 \fB-r\fR 69 Responder mode, available only if compiled with -DRDISC_SERVER. 70 .TP 71 \fB-s\fR 72 Send three \fBsolicitation\fR messages initially to quickly discover 73 the routers when the system is booted. 74 When \fB-s\fR is specified \fBrdisc\fR 75 exits with a non-zero exit code if it can not find any routers. 76 This can be overridden with the \fB-f\fR option. 77 .TP 78 \fB-p \fIpreference\fB\fR 79 Set preference in advertisement. 80 Available only with -r option. 81 .TP 82 \fB-T \fImax_interval\fB\fR 83 Set maximum advertisement interval in seconds. Default is 600 secs. 84 Available only with -r option. 85 .TP 86 \fB-t\fR 87 Test mode. Do not go to background. 88 .TP 89 \fB-v\fR 90 Be verbose i.e. send lots of debugging messages to syslog. 91 .TP 92 \fB-V\fR 93 Print version and exit. 94 .SH "HISTORY" 95 .PP 96 This program was developed by Sun Microsystems (see copyright 97 notice in source file). It was ported to Linux by 98 Alexey Kuznetsov 99 <kuznet@ms2.inr.ac.ru>. 100 It is now maintained by 101 YOSHIFUJI Hideaki 102 <yoshfuji@skbuff.net>. 103 .SH "SEE ALSO" 104 .PP 105 \fBicmp\fR(7), 106 \fBinet\fR(7), 107 \fBping\fR(8). 108 .SH "REFERENCES" 109 .PP 110 Deering, S.E.,ed "ICMP Router Discovery Messages", 111 RFC1256, Network Information Center, SRI International, 112 Menlo Park, Calif., September 1991. 113 .SH "SECURITY" 114 .PP 115 \fBrdisc\fR requires CAP_NET_RAW to listen 116 and send ICMP messages and capability CAP_NET_ADMIN 117 to update routing tables. 118 .SH "AVAILABILITY" 119 .PP 120 \fBrdisc\fR is part of \fIiputils\fR package 121 and the latest versions are available in source form at 122 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/tftpd.8 iputils-s20150815/doc/tftpd.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "TFTPD" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 tftpd \- Trivial File Transfer Protocol server 9 .SH SYNOPSIS 10 11 \fBtftpd\fR \fB\fIdirectory\fB\fR 12 13 .SH "DESCRIPTION" 14 .PP 15 \fBtftpd\fR is a server which supports the DARPA 16 Trivial File Transfer Protocol 17 (RFC1350). 18 The TFTP server is started 19 by \fBinetd\fR(8). 20 .PP 21 \fIdirectory\fR is required argument; if it is not given 22 \fBtftpd\fR aborts. This path is prepended to any file name requested 23 via TFTP protocol, effectively chrooting \fBtftpd\fR to this directory. 24 File names are validated not to escape out of this directory, however 25 administrator may configure such escape using symbolic links. 26 .PP 27 It is in difference of variants of \fBtftpd\fR usually distributed 28 with unix-like systems, which take a list of directories and match 29 file names to start from one of given prefixes or to some random 30 default, when no arguments were given. There are two reasons not to 31 behave in this way: first, it is inconvenient, clients are not expected 32 to know something about layout of filesystem on server host. 33 And second, TFTP protocol is not a tool for browsing of server's filesystem, 34 it is just an agent allowing to boot dumb clients. 35 .PP 36 In the case when \fBtftpd\fR is used together with 37 \fBrarpd\fR(8), 38 tftp directories in these services should coincide and it is expected 39 that each client booted via TFTP has boot image corresponding 40 its IP address with an architecture suffix following Sun Microsystems 41 conventions. See 42 \fBrarpd\fR(8) 43 for more details. 44 .SH "SECURITY" 45 .PP 46 TFTP protocol does not provide any authentication. 47 Due to this capital flaw \fBtftpd\fR is not able to restrict 48 access to files and will allow only publically readable 49 files to be accessed. Files may be written only if they already 50 exist and are publically writable. 51 .PP 52 Impact is evident, directory exported via TFTP \fBmust not\fR 53 contain sensitive information of any kind, everyone is allowed 54 to read it as soon as a client is allowed. Boot images do not contain 55 such information as rule, however you should think twice before 56 publishing f.e. Cisco IOS config files via TFTP, they contain 57 \fBunencrypted\fR passwords and may contain some information 58 about the network, which you were not going to make public. 59 .PP 60 The \fBtftpd\fR server should be executed by \fBinetd\fR 61 with dropped root privileges, namely with a user ID giving minimal 62 access to files published in tftp directory. If it is executed 63 as superuser occasionally, \fBtftpd\fR drops its UID and GID 64 to 65534, which is most likely not the thing which you expect. 65 However, this is not very essential; remember, only files accessible 66 for everyone can be read or written via TFTP. 67 .SH "SEE ALSO" 68 .PP 69 \fBrarpd\fR(8), 70 \fBtftp\fR(1), 71 \fBinetd\fR(8). 72 .SH "HISTORY" 73 .PP 74 The \fBtftpd\fR command appeared in 4.2BSD. The source in iputils 75 is cleaned up both syntactically (ANSIized) and semantically (UDP socket IO). 76 .PP 77 It is distributed with iputils mostly as good demo of an interesting feature 78 (MSG_CONFIRM) allowing to boot long images by dumb clients 79 not answering ARP requests until they are finally booted. 80 However, this is full functional and can be used in production. 81 .SH "AVAILABILITY" 82 .PP 83 \fBtftpd\fR is part of \fIiputils\fR package 84 and the latest versions are available in source form at 85 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
iputils-s20150815
diff -Naur iputils-s20150815.orig/doc/tracepath.8 iputils-s20150815/doc/tracepath.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "TRACEPATH" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 tracepath, tracepath6 \- traces path to a network host discovering MTU along this path 9 .SH SYNOPSIS 10 11 \fBtracepath\fR [\fB-n\fR] [\fB-b\fR] [\fB-l \fIpktlen\fB\fR] [\fB-m \fImax_hops\fB\fR] [\fB-p \fIport\fB\fR] \fB\fIdestination\fB\fR 12 13 .SH "DESCRIPTION" 14 .PP 15 It traces path to \fIdestination\fR discovering MTU along this path. 16 It uses UDP port \fIport\fR or some random port. 17 It is similar to \fBtraceroute\fR, only does not require superuser 18 privileges and has no fancy options. 19 .PP 20 \fBtracepath6\fR is good replacement for \fBtraceroute6\fR 21 and classic example of application of Linux error queues. 22 The situation with IPv4 is worse, because commercial 23 IP routers do not return enough information in ICMP error messages. 24 Probably, it will change, when they will be updated. 25 For now it uses Van Jacobson's trick, sweeping a range 26 of UDP ports to maintain trace history. 27 .SH "OPTIONS" 28 .TP 29 \fB-n\fR 30 Print primarily IP addresses numerically. 31 .TP 32 \fB-b\fR 33 Print both of host names and IP addresses. 34 .TP 35 \fB-l\fR 36 Sets the initial packet length to \fIpktlen\fR instead of 37 65535 for \fBtracepath\fR or 128000 for \fBtracepath6\fR. 38 .TP 39 \fB-m\fR 40 Set maximum hops (or maximum TTLs) to \fImax_hops\fR 41 instead of 30. 42 .TP 43 \fB-p\fR 44 Sets the initial destination port to use. 45 .SH "OUTPUT" 46 .PP 47 48 .nf 49 root@mops:~ # tracepath6 3ffe:2400:0:109::2 50 1?: [LOCALHOST] pmtu 1500 51 1: dust.inr.ac.ru 0.411ms 52 2: dust.inr.ac.ru asymm 1 0.390ms pmtu 1480 53 2: 3ffe:2400:0:109::2 463.514ms reached 54 Resume: pmtu 1480 hops 2 back 2 55 .fi 56 .PP 57 The first column shows TTL of the probe, followed by colon. 58 Usually value of TTL is obtained from reply from network, 59 but sometimes reply does not contain necessary information and 60 we have to guess it. In this case the number is followed by ?. 61 .PP 62 The second column shows the network hop, which replied to the probe. 63 It is either address of router or word [LOCALHOST], if 64 the probe was not sent to the network. 65 .PP 66 The rest of line shows miscellaneous information about path to 67 the correspinding network hop. As rule it contains value of RTT. 68 Additionally, it can show Path MTU, when it changes. 69 If the path is asymmetric 70 or the probe finishes before it reach prescribed hop, difference 71 between number of hops in forward and backward direction is shown 72 following keyword async. This information is not reliable. 73 F.e. the third line shows asymmetry of 1, it is because the first probe 74 with TTL of 2 was rejected at the first hop due to Path MTU Discovery. 75 .PP 76 The last line summarizes information about all the path to the destination, 77 it shows detected Path MTU, amount of hops to the destination and our 78 guess about amount of hops from the destination to us, which can be 79 different when the path is asymmetric. 80 .SH "SEE ALSO" 81 .PP 82 \fBtraceroute\fR(8), 83 \fBtraceroute6\fR(8), 84 \fBping\fR(8). 85 .SH "AUTHOR" 86 .PP 87 \fBtracepath\fR was written by 88 Alexey Kuznetsov 89 <kuznet@ms2.inr.ac.ru>. 90 .SH "SECURITY" 91 .PP 92 No security issues. 93 .PP 94 This lapidary deserves to be elaborated. 95 \fBtracepath\fR is not a privileged program, unlike 96 \fBtraceroute\fR, \fBping\fR and other beasts of this kind. 97 \fBtracepath\fR may be executed by everyone who has some access 98 to network, enough to send UDP datagrams to investigated destination 99 using given port. 100 .SH "AVAILABILITY" 101 .PP 102 \fBtracepath\fR is part of \fIiputils\fR package 103 and the latest versions are available in source form at 104 http://www.skbuff.net/iputils/iputils-current.tar.bz2. -
doc/traceroute6.8
diff -Naur iputils-s20150815.orig/doc/traceroute6.8 iputils-s20150815/doc/traceroute6.8
old new 1 .\" This manpage has been automatically generated by docbook2man 2 .\" from a DocBook document. This tool can be found at: 3 .\" <http://shell.ipoline.com/~elmert/comp/docbook2X/> 4 .\" Please send any bug reports, improvements, comments, patches, 5 .\" etc. to Steve Cheng <steve@ggi-project.org>. 6 .TH "TRACEROUTE6" "8" "24 August 2015" "iputils-140519" "System Manager's Manual: iputils" 7 .SH NAME 8 traceroute6 \- traces path to a network host 9 .SH SYNOPSIS 10 11 \fBtraceroute6\fR [\fB-dnrvV\fR] [\fB-i \fIinterface\fB\fR] [\fB-m \fImax_ttl\fB\fR] [\fB-p \fIport\fB\fR] [\fB-q \fImax_probes\fB\fR] [\fB-s \fIsource\fB\fR] [\fB-w \fIwait time\fB\fR] \fB\fIdestination\fB\fR [\fB\fIsize\fB\fR] 12 13 .SH "DESCRIPTION" 14 .PP 15 Description can be found in 16 \fBtraceroute\fR(8), 17 all the references to IP replaced to IPv6. It is needless to copy 18 the description from there. 19 .SH "SEE ALSO" 20 .PP 21 \fBtraceroute\fR(8), 22 \fBtracepath\fR(8), 23 \fBping\fR(8). 24 .SH "HISTORY" 25 .PP 26 This program has long history. Author of \fBtraceroute\fR 27 is Van Jacobson and it first appeared in 1988. This clone is 28 based on a port of \fBtraceroute\fR to IPv6 published 29 in NRL IPv6 distribution in 1996. In turn, it was ported 30 to Linux by Pedro Roque. After this it was kept in sync by 31 Alexey Kuznetsov 32 <kuznet@ms2.inr.ac.ru>. And eventually entered 33 \fBiputils\fR package. 34 .SH "SECURITY" 35 .PP 36 \fBtracepath6\fR requires CAP_NET_RAW capability 37 to be executed. It is safe to be used as set-uid root. 38 .SH "AVAILABILITY" 39 .PP 40 \fBtraceroute6\fR is part of \fIiputils\fR package 41 and the latest versions are available in source form at 42 http://www.skbuff.net/iputils/iputils-current.tar.bz2.
Note:
See TracBrowser
for help on using the repository browser.