tcptraceroute-1.2 import

The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination. 

The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
firewall filters.
This commit is contained in:
obecian 2001-08-07 03:14:39 +00:00
parent a72dcfe87f
commit 76b2522589
5 changed files with 82 additions and 0 deletions

View File

@ -0,0 +1,29 @@
# $OpenBSD: Makefile,v 1.1.1.1 2001/08/07 03:14:39 obecian Exp $
COMMENT= "traceroute implementation using TCP packets"
DISTNAME= tcptraceroute-1.2
CATEGORIES= net
NEED_VERSION= 1.427
HOMEPAGE= http://michael.toren.net/code/tcptraceroute/
MAINTAINER= Mark Grimes <obecian@openbsd.org>
# GPL
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
MASTER_SITES= http://michael.toren.net/code/tcptraceroute/
LIB_DEPENDS= net::net/libnet
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/tcptraceroute ${PREFIX}/bin
${INSTALL_DATA} ${WRKSRC}/tcptraceroute.8 ${PREFIX}/man/man8
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/tcptraceroute
${INSTALL_DATA} ${WRKSRC}/examples.txt ${PREFIX}/share/doc/tcptraceroute
.include <bsd.port.mk>

View File

@ -0,0 +1,3 @@
MD5 (tcptraceroute-1.2.tar.gz) = e31e3f5bfd817d32ed6d954382ca768d
RMD160 (tcptraceroute-1.2.tar.gz) = a7ec078b70e0fc4636f79d3bf62eeb86b92f917d
SHA1 (tcptraceroute-1.2.tar.gz) = 612dba7ef93d6ece42def5e4faef226523c8b01a

View File

@ -0,0 +1,29 @@
--- Makefile.orig Tue Jul 31 20:52:40 2001
+++ Makefile Mon Aug 6 12:17:11 2001
@@ -3,18 +3,22 @@
CC = gcc
CFLAGS = -O2 -Wall
-DESTDIR=/usr/local/bin
+INC=-I/usr/local/include
+LIB=-L/usr/local/lib
+DESTDIR=
+
+all: tcptraceroute
tcptraceroute: tcptraceroute.c
$(CC) $(CFLAGS) `libnet-config --defines` \
-o tcptraceroute tcptraceroute.c \
- `libnet-config --libs` -lpcap
+ `libnet-config --libs` $(INC) $(LIB) -lpcap
static:
$(MAKE) tcptraceroute CFLAGS="$(CFLAGS) -static"
-install: tcptraceroute
- install -D tcptraceroute $(DESTDIR)/tcptraceroute
+#install: tcptraceroute
+# install -D tcptraceroute $(DESTDIR)/tcptraceroute
distrib: clean changelog man

View File

@ -0,0 +1,16 @@
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
firewall filters.
WWW: ${HOMEPAGE}

View File

@ -0,0 +1,5 @@
@comment $OpenBSD: PLIST,v 1.1.1.1 2001/08/07 03:14:39 obecian Exp $
bin/tcptraceroute
man/man8/tcptraceroute.8
share/doc/tcptraceroute/examples.txt
@dirrm share/doc/tcptraceroute