1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155
|
<refentry id="tracepath">
<refmeta>
<refentrytitle>tracepath</refentrytitle>
<manvolnum>8</manvolnum>
<refmiscinfo>iputils-&snapshot;</refmiscinfo>
</refmeta>
<refnamediv>
<refname>tracepath, tracepath6</refname>
<refpurpose>
traces path to a network host discovering MTU along this path</refpurpose>
</refnamediv>
<refsynopsisdiv>
<cmdsynopsis>
<command>tracepath</command>
<arg choice="req"><replaceable/destination/</arg>
<arg choice="opt"><replaceable/port/</arg>
</cmdsynopsis>
</refsynopsisdiv>
<refsect1><title>DESCRIPTION</title>
<para>
It traces path to <replaceable/destination/ discovering MTU along this path.
It uses UDP port <replaceable/port/ or some random port.
It is similar to <command/traceroute/, only does not not require superuser
privileges and has no fancy options.
</para>
<para>
<command/tracepath6/ is good replacement for <command/traceroute6/
and classic example of application of Linux error queues.
The situation with <command/tracepath/ is worse, because commercial
IP routers do not return enough information in icmp error messages.
Probably, it will change, when they will be updated.
For now it uses Van Jacobson's trick, sweeping a range
of UDP ports to maintain trace history.
</para>
</refsect1>
<refsect1><title>OUTPUT</title>
<para>
<literallayout>
root@mops:~ # tracepath6 3ffe:2400:0:109::2
1?: [LOCALHOST] pmtu 1500
1: dust.inr.ac.ru 0.411ms
2: dust.inr.ac.ru asymm 1 0.390ms pmtu 1480
2: 3ffe:2400:0:109::2 463.514ms reached
Resume: pmtu 1480 hops 2 back 2
</literallayout>
</para>
<para>
The first column shows <literal/TTL/ of the probe, followed by colon.
Usually value of <literal/TTL/ is obtained from reply from network,
but sometimes reply does not contain necessary information and
we have to guess it. In this case the number is followed by ?.
</para>
<para>
The second column shows the network hop, which replied to the probe.
It is either address of router or word <literal/[LOCALHOST]/, if
the probe was not sent to the network.
</para>
<para>
The rest of line shows miscellaneous information about path to
the correspinding hetwork hop. As rule it contains value of RTT.
Additionally, it can show Path MTU, when it changes.
If the path is asymmetric
or the probe finishes before it reach prescribed hop, difference
between number of hops in forward and backward direction is shown
folloing keyword <literal/async/. This information is not reliable.
F.e. the third line shows asymmetry of 1, it is because the first probe
with TTL of 2 was rejected at the first hop due to Path MTU Discovery.
</para>
<para>
Te last line summarizes information about all the path to the destination,
it shows detected Path MTU, amount of hops to the destination and our
guess about amount of hops from the destination to us, which can be
different when the path is asymmetric.
</para>
</refsect1>
<refsect1><title>SEE ALSO</title>
<para>
<citerefentry><refentrytitle/traceroute/<manvolnum/8/</citerefentry>,
<link linkend="traceroute6">
<citerefentry><refentrytitle/traceroute6/<manvolnum/8/</citerefentry></link>,
<link linkend="ping">
<citerefentry><refentrytitle/ping/<manvolnum/8/</citerefentry></link>.
</para>
</refsect1>
<refsect1><title>AUTHOR</title>
<para>
<command/tracepath/ was written by
<ulink url="mailto:kuznet@ms2.inr.ac.ru">Alexey Kuznetsov
<kuznet@ms2.inr.ac.ru></ulink>.
</para>
</refsect1>
<refsect1><title>SECURITY</title>
<para>
No security issues.
</para>
<para>
This lapidary deserves to be elaborated.
<command/tracepath/ is not a privileged program, unlike
<command/traceroute/, <command/ping/ and other beasts of this kind.
<command/tracepath/ may be executed by everyone who has some access
to network, enough to send UDP datagrams to investigated destination
using given port.
</para>
</refsect1>
<refsect1><title>AVAILABILITY</title>
<para>
<command/tracepath/ is part of <filename/iputils/ package
and the latest versions are available in source form from anonymous ftp
<ulink url="ftp://ftp.inr.ac.ru/ip-routing/iputils-current.tar.gz">
ftp://ftp.inr.ac.ru/ip-routing/iputils-current.tar.gz</ulink>.
</para>
</refsect1>
<![IGNORE[
<refsect1><title>COPYING</title>
<para>
<literallayout>
This documentation is free software; you can redistribute
it and/or modify it under the terms of the GNU General Public
License Version 2.
This program is distributed in the hope that it will be
useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
For more details see the file COPYING in the source
distribution of Linux kernel of version 2.4.
</literallayout>
</para>
</refsect1>
]]>
</refentry>
|