Группа :: Мониторинг
Пакет: tcptraceroute
Главная Изменения Спек Патчи Sources Загрузить Gear Bugs and FR Repocop
Текущая версия: 1.5-alt5
Время сборки: 12 апреля 2007, 23:54 ( 891.5 недели назад )
Размер архива: 125.71 Kb
Домашняя страница: http://michael.toren.net/code/tcptraceroute
Лицензия: GPL
О пакете: A traceroute implementation using TCP packets
Описание:
Список всех майнтейнеров, принимавших участие
в данной и/или предыдущих сборках пакета: Список rpm-пакетов, предоставляемый данным srpm-пакетом:
ACL:
Время сборки: 12 апреля 2007, 23:54 ( 891.5 недели назад )
Размер архива: 125.71 Kb
Домашняя страница: http://michael.toren.net/code/tcptraceroute
Лицензия: GPL
О пакете: A traceroute implementation using TCP packets
Описание:
tcptraceroute is a traceroute implementation using TCP packets.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit
inbound TCP packets to specific ports that hosts sitting behind the
firewall are listening for connections on. By sending out TCP SYN
packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to
bypass the most common firewall filters.
It is worth noting that tcptraceroute never completely establishes a
TCP connection with the destination host. If the host is not listening
for incoming connections, it will respond with an RST indicating that
the port is closed. If the host instead responds with a SYN|ACK, the
port is known to be open, and an RST is sent by the kernel tcptraceroute
is running on to tear down the connection without completing three-way
handshake. This is the same half-open scanning technique that nmap(1)
uses when passed the -sS flag.
Текущий майнтейнер: Dmitry V. Levin The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit
inbound TCP packets to specific ports that hosts sitting behind the
firewall are listening for connections on. By sending out TCP SYN
packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to
bypass the most common firewall filters.
It is worth noting that tcptraceroute never completely establishes a
TCP connection with the destination host. If the host is not listening
for incoming connections, it will respond with an RST indicating that
the port is closed. If the host instead responds with a SYN|ACK, the
port is known to be open, and an RST is sent by the kernel tcptraceroute
is running on to tear down the connection without completing three-way
handshake. This is the same half-open scanning technique that nmap(1)
uses when passed the -sS flag.
Список всех майнтейнеров, принимавших участие
в данной и/или предыдущих сборках пакета: Список rpm-пакетов, предоставляемый данным srpm-пакетом:
- tcptraceroute