diff options
author | Jon Schipp <jonschipp@gmail.com> | 2013-05-22 09:49:44 -0400 |
---|---|---|
committer | Daniel Borkmann <dborkman@redhat.com> | 2013-05-22 17:02:44 +0200 |
commit | 4e497b9aa7e8635a9414021bd1bf31a9ff923566 (patch) | |
tree | 63b24ea0f6ff5c65575eed4cf5864f88d660b90e | |
parent | 4e59bb4da1c3f3d8b59cf0bb975315a86e4fdbdc (diff) |
man: astraceroute: minor edits all over
Some minor edits all over the place.
Signed-off-by: Jon Schipp <jonschipp@gmail.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
-rw-r--r-- | astraceroute.8 | 37 |
1 files changed, 18 insertions, 19 deletions
diff --git a/astraceroute.8 b/astraceroute.8 index 0a69ae5..1714634 100644 --- a/astraceroute.8 +++ b/astraceroute.8 @@ -18,24 +18,24 @@ increasing the IP's TTL field in the hope, that the intermediate node sends a ICMP TIME_EXCEEDED notification back to us. astraceroute supports IPv4 and IPv6 queries and will display country and city -information if available as well as the AS number the hop belongs to and its +information, if available, as well as the AS number the hop belongs to and its ISP name. astraceroute also displays timing information and reverse DNS data. Due to astraceroute's configurability it is also possible to gather some more -useful information about the hop regarding what it passes through and what not. -I.e. astraceroute also allows some clear text strings for probing some DPIs or +useful information about the hop regarding what it does and doesn't pass through. +I.e. astraceroute also allows some clear text strings for probing DPIs or ``great firewalls'' that would filter out blacklisted critical keywords. This tool might be a good start for further in-depth analysis of such systems. .SH OPTIONS .SS -H <host>, --host <host> -Hostname, IPv4 or IPv6 address of the remote host where the AS route should -be traced to. In case of an IPv6 address or host, also option ``-6'' must be +Hostname or IPv4 or IPv6 address of the remote host where the AS route should +be traced to. In case of an IPv6 address or host, option ``-6'' must be used. IPv4 is the default. .SS -p <port>, --port <port> -TCP port for the remote host to use. If not otherwise specified, the default +TCP port for the remote host to use. If not specified, the default port to be used is 80. .SS -i <device>, -d <device>, --dev <device> @@ -48,8 +48,7 @@ initial TTL value is 1. .SS -m <ttl>, --max-ttl <ttl> Maximum TTL value to be used. If not otherwise specified, the maximum -TTL value is 30. Thus, after this has been reached astraceroute exits -itself. +TTL value is 30. Thus, after this has been reached astraceroute exits. .SS -q <num>, --num-probes <num> Specifies the number of queries to be done on a particular hop. The @@ -61,8 +60,8 @@ the maximum time astraceroute must wait for an ICMP response from the current hop. The default is 3 seconds. .SS -X <string>, --payload <string> -Places an ASCII cleartext into the packet payload. In case the cleartext -contains whitespaces, it must be put into quotes, f.e. "censer me". +Places an ASCII cleartext into the packet payload. Cleartext that +contains whitespaces must be put into quotes (e.g., "censer me"). .SS -l <len>, --totlen <len> Specifies the total length of the packet. Payload that does not have a @@ -119,7 +118,7 @@ Use TCP's ECN flag for the request. Explicitly specify IP's TOS. .SS -G, --nofrag -Set the IP's no fragmentation flag. +Set IP's no fragmentation flag. .SS -Z, --show-packet Show and dissect the returned packet. @@ -139,8 +138,8 @@ tell astraceroute to perform reverse DNS lookups for each hop. .SS astraceroute -6 -i eth0 -S -E -N -H www.6bone.net In this example, a TCP SYN/ECN probe for the IPv6 host www.6bone.net is being -performed. Also in this case, the ``eth0'' device is being used and hops are -being reserve DNS'ed. +performed. Also in this case, the ``eth0'' device is being used as well as a +reverse DNS lookup for each hop. .SS astraceroute -i eth0 -N -F -H netsniff-ng.org Here, we send out a TCP FIN probe to the remote host netsniff-ng.org. Again, @@ -163,7 +162,7 @@ If a TCP-based probe will fail after a number of retries, astraceroute will automatically fall back to ICMP-based probes to pass through firewalls resp. routers. -To gather more information about astraceroute's displayed AS numbers, see f.e. +To gather more information about astraceroute's displayed AS numbers, see e.g., http://bgp.he.net/AS<number>. .SH BUGS @@ -175,11 +174,11 @@ regularly e.g. with astraceroute's --update option. At some point in time, we need a similar approach to gather more reliable path information such as in paris-traceroute. -Due to the generic nature of astraceroute it currently does only have a built-in -mechanism to stop the trace after a static number of hops, since the configurable -TCP flags can have anything included. It is possible to decrease this number of -course. In future, if a SYN probe is sent out, there should be a listener thus -we can stop the trace if we detect a handshake in progress. +Due to the generic nature of astraceroute, it currently has a built-in mechanism +to stop the trace after a static number of hops, since the configurable TCP flags +can have anything included. It is possible to decrease this number of course. +In the future, if a SYN probe is sent out, there should be a listener thus we can +stop the trace if we detect a handshake in progress. .SH LEGAL astraceroute is licensed under the GNU GPL version 2.0. |