summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJon Schipp <jonschipp@gmail.com>2013-05-22 09:49:44 -0400
committerDaniel Borkmann <dborkman@redhat.com>2013-05-22 17:02:44 +0200
commit4e497b9aa7e8635a9414021bd1bf31a9ff923566 (patch)
tree63b24ea0f6ff5c65575eed4cf5864f88d660b90e
parent4e59bb4da1c3f3d8b59cf0bb975315a86e4fdbdc (diff)
man: astraceroute: minor edits all over
Some minor edits all over the place. Signed-off-by: Jon Schipp <jonschipp@gmail.com> Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
-rw-r--r--astraceroute.837
1 files changed, 18 insertions, 19 deletions
diff --git a/astraceroute.8 b/astraceroute.8
index 0a69ae5..1714634 100644
--- a/astraceroute.8
+++ b/astraceroute.8
@@ -18,24 +18,24 @@ increasing the IP's TTL field in the hope, that the intermediate node sends a
ICMP TIME_EXCEEDED notification back to us.
astraceroute supports IPv4 and IPv6 queries and will display country and city
-information if available as well as the AS number the hop belongs to and its
+information, if available, as well as the AS number the hop belongs to and its
ISP name. astraceroute also displays timing information and reverse DNS data.
Due to astraceroute's configurability it is also possible to gather some more
-useful information about the hop regarding what it passes through and what not.
-I.e. astraceroute also allows some clear text strings for probing some DPIs or
+useful information about the hop regarding what it does and doesn't pass through.
+I.e. astraceroute also allows some clear text strings for probing DPIs or
``great firewalls'' that would filter out blacklisted critical keywords. This
tool might be a good start for further in-depth analysis of such systems.
.SH OPTIONS
.SS -H <host>, --host <host>
-Hostname, IPv4 or IPv6 address of the remote host where the AS route should
-be traced to. In case of an IPv6 address or host, also option ``-6'' must be
+Hostname or IPv4 or IPv6 address of the remote host where the AS route should
+be traced to. In case of an IPv6 address or host, option ``-6'' must be
used. IPv4 is the default.
.SS -p <port>, --port <port>
-TCP port for the remote host to use. If not otherwise specified, the default
+TCP port for the remote host to use. If not specified, the default
port to be used is 80.
.SS -i <device>, -d <device>, --dev <device>
@@ -48,8 +48,7 @@ initial TTL value is 1.
.SS -m <ttl>, --max-ttl <ttl>
Maximum TTL value to be used. If not otherwise specified, the maximum
-TTL value is 30. Thus, after this has been reached astraceroute exits
-itself.
+TTL value is 30. Thus, after this has been reached astraceroute exits.
.SS -q <num>, --num-probes <num>
Specifies the number of queries to be done on a particular hop. The
@@ -61,8 +60,8 @@ the maximum time astraceroute must wait for an ICMP response from the current
hop. The default is 3 seconds.
.SS -X <string>, --payload <string>
-Places an ASCII cleartext into the packet payload. In case the cleartext
-contains whitespaces, it must be put into quotes, f.e. "censer me".
+Places an ASCII cleartext into the packet payload. Cleartext that
+contains whitespaces must be put into quotes (e.g., "censer me").
.SS -l <len>, --totlen <len>
Specifies the total length of the packet. Payload that does not have a
@@ -119,7 +118,7 @@ Use TCP's ECN flag for the request.
Explicitly specify IP's TOS.
.SS -G, --nofrag
-Set the IP's no fragmentation flag.
+Set IP's no fragmentation flag.
.SS -Z, --show-packet
Show and dissect the returned packet.
@@ -139,8 +138,8 @@ tell astraceroute to perform reverse DNS lookups for each hop.
.SS astraceroute -6 -i eth0 -S -E -N -H www.6bone.net
In this example, a TCP SYN/ECN probe for the IPv6 host www.6bone.net is being
-performed. Also in this case, the ``eth0'' device is being used and hops are
-being reserve DNS'ed.
+performed. Also in this case, the ``eth0'' device is being used as well as a
+reverse DNS lookup for each hop.
.SS astraceroute -i eth0 -N -F -H netsniff-ng.org
Here, we send out a TCP FIN probe to the remote host netsniff-ng.org. Again,
@@ -163,7 +162,7 @@ If a TCP-based probe will fail after a number of retries, astraceroute will
automatically fall back to ICMP-based probes to pass through firewalls resp.
routers.
-To gather more information about astraceroute's displayed AS numbers, see f.e.
+To gather more information about astraceroute's displayed AS numbers, see e.g.,
http://bgp.he.net/AS<number>.
.SH BUGS
@@ -175,11 +174,11 @@ regularly e.g. with astraceroute's --update option.
At some point in time, we need a similar approach to gather more reliable path
information such as in paris-traceroute.
-Due to the generic nature of astraceroute it currently does only have a built-in
-mechanism to stop the trace after a static number of hops, since the configurable
-TCP flags can have anything included. It is possible to decrease this number of
-course. In future, if a SYN probe is sent out, there should be a listener thus
-we can stop the trace if we detect a handshake in progress.
+Due to the generic nature of astraceroute, it currently has a built-in mechanism
+to stop the trace after a static number of hops, since the configurable TCP flags
+can have anything included. It is possible to decrease this number of course.
+In the future, if a SYN probe is sent out, there should be a listener thus we can
+stop the trace if we detect a handshake in progress.
.SH LEGAL
astraceroute is licensed under the GNU GPL version 2.0.