diff -upk.orig iputils.orig/doc/arping.8 iputils/doc/arping.8 --- iputils.orig/doc/arping.8 2002-09-27 17:12:43 +0000 +++ iputils/doc/arping.8 2005-11-24 18:57:05 +0000 @@ -87,9 +87,9 @@ expire or until probes are answered. .SH "SEE ALSO" .PP -\fBping\fR(8), -\fBclockdiff\fR(8), -\fBtracepath\fR(8). +\fBping\fR(1), +\fBtracepath\fR(1), +\fBclockdiff\fR(8). .SH "AUTHOR" .PP \fBarping\fR was written by diff -upk.orig iputils.orig/doc/clockdiff.8 iputils/doc/clockdiff.8 --- iputils.orig/doc/clockdiff.8 2002-09-27 17:12:45 +0000 +++ iputils/doc/clockdiff.8 2005-11-24 18:56:31 +0000 @@ -48,9 +48,9 @@ use NTP in this case, which is even bett \fBclockdiff\fR shows difference in time modulo 24 days. .SH "SEE ALSO" .PP -\fBping\fR(8), -\fBarping\fR(8), -\fBtracepath\fR(8). +\fBping\fR(1), +\fBtracepath\fR(1), +\fBarping\fR(8). .SH "REFERENCES" .PP [1] ICMP ECHO, diff -upk.orig iputils.orig/doc/ping.8 iputils/doc/ping.8 --- iputils.orig/doc/ping.8 2002-09-27 17:12:47 +0000 +++ iputils/doc/ping.8 2005-11-24 18:55:51 +0000 @@ -3,7 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "PING" "8" "27 September 2002" "iputils-020927" "System Manager's Manual: iputils" +.TH "PING" "1" "27 September 2002" "iputils-020927" "System Manager's Manual: iputils" .SH NAME ping, ping6 \- send ICMP ECHO_REQUEST to network hosts .SH SYNOPSIS diff -upk.orig iputils.orig/doc/rdisc.8 iputils/doc/rdisc.8 --- iputils.orig/doc/rdisc.8 2002-09-27 17:12:50 +0000 +++ iputils/doc/rdisc.8 2005-11-24 18:55:11 +0000 @@ -87,9 +87,9 @@ Alexey Kuznetsov . .SH "SEE ALSO" .PP +\fBping\fR(1), \fBicmp\fR(7), -\fBinet\fR(7), -\fBping\fR(8). +\fBinet\fR(7). .SH "REFERENCES" .PP Deering, S.E.,ed "ICMP Router Discovery Messages", diff -upk.orig iputils.orig/doc/tracepath.8 iputils/doc/tracepath.8 --- iputils.orig/doc/tracepath.8 2002-09-27 17:12:53 +0000 +++ iputils/doc/tracepath.8 2005-11-24 18:58:34 +0000 @@ -3,7 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "TRACEPATH" "8" "27 September 2002" "iputils-020927" "System Manager's Manual: iputils" +.TH "TRACEPATH" "1" "27 September 2002" "iputils-020927" "System Manager's Manual: iputils" .SH NAME tracepath, tracepath6 \- traces path to a network host discovering MTU along this path .SH SYNOPSIS @@ -61,9 +61,9 @@ guess about amount of hops from the dest different when the path is asymmetric. .SH "SEE ALSO" .PP -\fBtraceroute\fR(8), -\fBtraceroute6\fR(8), -\fBping\fR(8). +\fBtraceroute\fR(1), +\fBtraceroute6\fR(1), +\fBping\fR(1). .SH "AUTHOR" .PP \fBtracepath\fR was written by @@ -75,7 +75,7 @@ No security issues. .PP This lapidary deserves to be elaborated. \fBtracepath\fR is not a privileged program, unlike -\fBtraceroute\fR, \fBping\fR and other beasts of this kind. +\fBping\fR and other beasts of this kind. \fBtracepath\fR may be executed by everyone who has some access to network, enough to send UDP datagrams to investigated destination using given port.