Commit Graph

11 Commits

Author SHA1 Message Date
pvalchev
36aeccd4bd Install examples in share/examples, not share/doc.
From Sebastian Stark; ok'ed by maintainer Patroklos G. Argyroudis
2002-12-24 01:08:43 +00:00
naddy
c53eb436cb No regression tests available. 2002-10-28 01:38:44 +00:00
pvalchev
cec381e225 Update to tcptraceroute-1.4; from maintainer Patroklos Argyroudis 2002-07-31 17:14:30 +00:00
pvalchev
6c8a6a1fe8 Update to tcptraceroute-1.3; from maintainer argp@ieee.org 2002-05-24 00:40:24 +00:00
espie
47bb0f3975 uniformize maintainer addresses. 2002-05-11 00:31:22 +00:00
espie
5b37289c23 md5->distinfo 2002-03-21 19:59:18 +00:00
naddy
78a967e7ef Remove workarounds for 2.9 <net/if.h> multiple inclusion bug. 2001-08-17 18:57:40 +00:00
obecian
655a90a983 new maintainer is Patroklos Argyroudis <argp@otenet.gr> 2001-08-11 03:36:19 +00:00
obecian
2fd3715627 fix for 2.9-stable (naddy@) - sorry Patroklos, didn't see your port
before import.
2001-08-10 01:09:36 +00:00
obecian
ae7146f784 oops bin->sbin noticed by valchev@ 2001-08-07 04:23:22 +00:00
obecian
76b2522589 tcptraceroute-1.2 import
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination. 

The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common
firewall filters.
2001-08-07 03:14:39 +00:00