tcptraceroute-1.2 import
The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination. The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that traceroute(8) sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.
This commit is contained in:
parent
a72dcfe87f
commit
76b2522589
29
net/tcptraceroute/Makefile
Normal file
29
net/tcptraceroute/Makefile
Normal file
@ -0,0 +1,29 @@
|
||||
# $OpenBSD: Makefile,v 1.1.1.1 2001/08/07 03:14:39 obecian Exp $
|
||||
|
||||
COMMENT= "traceroute implementation using TCP packets"
|
||||
|
||||
DISTNAME= tcptraceroute-1.2
|
||||
CATEGORIES= net
|
||||
NEED_VERSION= 1.427
|
||||
|
||||
HOMEPAGE= http://michael.toren.net/code/tcptraceroute/
|
||||
|
||||
MAINTAINER= Mark Grimes <obecian@openbsd.org>
|
||||
|
||||
# GPL
|
||||
PERMIT_PACKAGE_CDROM= Yes
|
||||
PERMIT_PACKAGE_FTP= Yes
|
||||
PERMIT_DISTFILES_CDROM= Yes
|
||||
PERMIT_DISTFILES_FTP= Yes
|
||||
|
||||
MASTER_SITES= http://michael.toren.net/code/tcptraceroute/
|
||||
|
||||
LIB_DEPENDS= net::net/libnet
|
||||
|
||||
do-install:
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/tcptraceroute ${PREFIX}/bin
|
||||
${INSTALL_DATA} ${WRKSRC}/tcptraceroute.8 ${PREFIX}/man/man8
|
||||
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/tcptraceroute
|
||||
${INSTALL_DATA} ${WRKSRC}/examples.txt ${PREFIX}/share/doc/tcptraceroute
|
||||
|
||||
.include <bsd.port.mk>
|
3
net/tcptraceroute/files/md5
Normal file
3
net/tcptraceroute/files/md5
Normal file
@ -0,0 +1,3 @@
|
||||
MD5 (tcptraceroute-1.2.tar.gz) = e31e3f5bfd817d32ed6d954382ca768d
|
||||
RMD160 (tcptraceroute-1.2.tar.gz) = a7ec078b70e0fc4636f79d3bf62eeb86b92f917d
|
||||
SHA1 (tcptraceroute-1.2.tar.gz) = 612dba7ef93d6ece42def5e4faef226523c8b01a
|
29
net/tcptraceroute/patches/patch-Makefile
Normal file
29
net/tcptraceroute/patches/patch-Makefile
Normal file
@ -0,0 +1,29 @@
|
||||
--- Makefile.orig Tue Jul 31 20:52:40 2001
|
||||
+++ Makefile Mon Aug 6 12:17:11 2001
|
||||
@@ -3,18 +3,22 @@
|
||||
|
||||
CC = gcc
|
||||
CFLAGS = -O2 -Wall
|
||||
-DESTDIR=/usr/local/bin
|
||||
+INC=-I/usr/local/include
|
||||
+LIB=-L/usr/local/lib
|
||||
+DESTDIR=
|
||||
+
|
||||
+all: tcptraceroute
|
||||
|
||||
tcptraceroute: tcptraceroute.c
|
||||
$(CC) $(CFLAGS) `libnet-config --defines` \
|
||||
-o tcptraceroute tcptraceroute.c \
|
||||
- `libnet-config --libs` -lpcap
|
||||
+ `libnet-config --libs` $(INC) $(LIB) -lpcap
|
||||
|
||||
static:
|
||||
$(MAKE) tcptraceroute CFLAGS="$(CFLAGS) -static"
|
||||
|
||||
-install: tcptraceroute
|
||||
- install -D tcptraceroute $(DESTDIR)/tcptraceroute
|
||||
+#install: tcptraceroute
|
||||
+# install -D tcptraceroute $(DESTDIR)/tcptraceroute
|
||||
|
||||
distrib: clean changelog man
|
||||
|
16
net/tcptraceroute/pkg/DESCR
Normal file
16
net/tcptraceroute/pkg/DESCR
Normal file
@ -0,0 +1,16 @@
|
||||
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
|
||||
packets with a TTL of one, and increments the TTL until the destination
|
||||
has been reached. By printing the gateways that generate ICMP time
|
||||
exceeded messages along the way, it is able to determine the path
|
||||
packets are taking to reach the destination.
|
||||
|
||||
The problem is that with the widespread use of firewalls on the modern
|
||||
Internet, many of the packets that traceroute(8) sends out end up being
|
||||
filtered, making it impossible to completely trace the path to the
|
||||
destination. However, in many cases, these firewalls will permit inbound
|
||||
TCP packets to specific ports that hosts sitting behind the firewall are
|
||||
listening for connections on. By sending out TCP SYN packets instead of
|
||||
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
|
||||
firewall filters.
|
||||
|
||||
WWW: ${HOMEPAGE}
|
5
net/tcptraceroute/pkg/PLIST
Normal file
5
net/tcptraceroute/pkg/PLIST
Normal file
@ -0,0 +1,5 @@
|
||||
@comment $OpenBSD: PLIST,v 1.1.1.1 2001/08/07 03:14:39 obecian Exp $
|
||||
bin/tcptraceroute
|
||||
man/man8/tcptraceroute.8
|
||||
share/doc/tcptraceroute/examples.txt
|
||||
@dirrm share/doc/tcptraceroute
|
Loading…
Reference in New Issue
Block a user