10-10-2001
Offhand I can't think of any (none routing) reason to hack the TTL field or any tools that use the TTL field to scan with the exception of traceroute .
If you can post the exact "netscan application" that uses TTL and why it uses it, then we can give a more accurate reply.
It is certainly possible to return bogus values of processes, including TTL. I'm more interested in understanding why you think you need to do this... thanks.
9 More Discussions You Might Find Interesting
1. IP Networking
Hi All,
I know that getaddrinfo() return the multiple IP addresses (if present) for a hostname. But, I want to know how to get the TTL value for this list from DNS. I want to get this TTL value and cache this IP address list for that much time and then again go for DNS resolution if TTL expires.
... (2 Replies)
Discussion started by: softindia
2 Replies
2. Shell Programming and Scripting
I want to sort alphabetically on the first field and sort in descending numerical order on the 2nd field. With a normal "sort -r -n" it does this:
abc ||| 5e-05 ||| bla
abc ||| 3 ||| ble
def ||| 1 ||| abc
def ||| 0.2 ||| def
As you can see it ignores the fact that 5e-05 is actually 0.00005... (1 Reply)
Discussion started by: FrancoisCN
1 Replies
3. Solaris
Is there a way to setup the TTL (Time To Live) on a process. We have many ssh processes that seem to just stack up. These processes do not need a static connection all the time and it might cause problems on our servers. Does anybody know how to setup the TTL on a process? (10 Replies)
Discussion started by: jastanle84
10 Replies
4. Shell Programming and Scripting
Hi, all
I need to get fields in a line that are separated by commas, some of the fields are enclosed with double quotes, and they are supposed to be treated as a single field even if there are commas inside the quotes.
sample input:
for this line, 5 fields are supposed to be extracted, they... (8 Replies)
Discussion started by: kevintse
8 Replies
5. Shell Programming and Scripting
First, thanks for the help in previous posts... couldn't have gotten where I am now without it!
So here is what I have, I use AWK to match $1 and $2 as 1 string in file1 to $1 and $2 as 1 string in file2. Now I'm wondering if I can extend this AWK command to incorporate the following:
If $1... (4 Replies)
Discussion started by: right_coaster
4 Replies
6. Linux
I have a .CSV file (file.csv) whose data are all enclosed in double quotes. Sample format of the file is as below:
column1,column2,column3,column4,column5,column6, column7, Column8, Column9, Column10
"12","B000QRIGJ4","4432","string with quotes, and with a comma, and colon: in... (3 Replies)
Discussion started by: dhruuv369
3 Replies
7. Shell Programming and Scripting
Hello,
I have a text file in the below format:
Source Destination State Lag Status
CQA02W2K12pl:D:\CAQA ... (10 Replies)
Discussion started by: pocodot
10 Replies
8. Shell Programming and Scripting
Table
ACN|NAME|CITY|CTY|NO1|NO2
115|AKKK|ASH|IND|10|15
115|AKKK|ASH|IND|20|20
115|AKKK|ASH|IND|30|35
115|AKKK|ASH|IND|30|35
112|ABC|FL|USA|15|15
112|ABC|FL|USA|25|20
112|ABC|FL|USA|25|45
i have written shell script using cut command
and awk programming getting error correct it and add... (5 Replies)
Discussion started by: udhal
5 Replies
9. Shell Programming and Scripting
I am trying to output a tab-delimited result that uses the data from a tab-delimited file to combine and subtract specific lines.
If $4 matches in each line then the first matching sequential $6 value is added to $2, unless the value is 1, then the original $2 is used (like in the case of line... (3 Replies)
Discussion started by: cmccabe
3 Replies
LEARN ABOUT REDHAT
tracepath
TRACEPATH(8) System Manager's Manual: iputils TRACEPATH(8)
NAME
tracepath, tracepath6 - traces path to a network host discovering MTU along this path
SYNOPSIS
tracepath destination [ port]
DESCRIPTION
It traces path to destination discovering MTU along this path. It uses UDP port port or some random port. It is similar to traceroute,
only does not not require superuser privileges and has no fancy options.
tracepath6 is good replacement for traceroute6 and classic example of application of Linux error queues. The situation with tracepath is
worse, because commercial IP routers do not return enough information in icmp error messages. Probably, it will change, when they will be
updated. For now it uses Van Jacobson's trick, sweeping a range of UDP ports to maintain trace history.
OUTPUT
root@mops:~ # tracepath6 3ffe:2400:0:109::2
1?: [LOCALHOST] pmtu 1500
1: dust.inr.ac.ru 0.411ms
2: dust.inr.ac.ru asymm 1 0.390ms pmtu 1480
2: 3ffe:2400:0:109::2 463.514ms reached
Resume: pmtu 1480 hops 2 back 2
The first column shows TTL of the probe, followed by colon. Usually value of TTL is obtained from reply from network, but sometimes reply
does not contain necessary information and we have to guess it. In this case the number is followed by ?.
The second column shows the network hop, which replied to the probe. It is either address of router or word [LOCALHOST], if the probe was
not sent to the network.
The rest of line shows miscellaneous information about path to the correspinding hetwork hop. As rule it contains value of RTT. Addition-
ally, it can show Path MTU, when it changes. If the path is asymmetric or the probe finishes before it reach prescribed hop, difference
between number of hops in forward and backward direction is shown folloing keyword async. This information is not reliable. F.e. the third
line shows asymmetry of 1, it is because the first probe with TTL of 2 was rejected at the first hop due to Path MTU Discovery.
Te last line summarizes information about all the path to the destination, it shows detected Path MTU, amount of hops to the destination
and our guess about amount of hops from the destination to us, which can be different when the path is asymmetric.
SEE ALSO
traceroute(8), traceroute6(8), ping(8).
AUTHOR
tracepath was written by Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>.
SECURITY
No security issues.
This lapidary deserves to be elaborated. tracepath is not a privileged program, unlike traceroute, ping and other beasts of this kind.
tracepath may be executed by everyone who has some access to network, enough to send UDP datagrams to investigated destination using given
port.
AVAILABILITY
tracepath is part of iputils package and the latest versions are available in source form from anonymous ftp ftp://ftp.inr.ac.ru/ip-rout-
ing/iputils-current.tar.gz.
iputils-020927 27 September 2002 TRACEPATH(8)