From mboxrd@z Thu Jan 1 00:00:00 1970 From: Bill Bogstad Subject: Re: Playing nice with incoming traceroutes Date: Sat, 15 May 2010 23:17:07 -0400 Message-ID: References: Mime-Version: 1.0 Return-path: DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :in-reply-to:references:date:message-id:subject:from:to:cc :content-type; s=sasl; bh=/Dv5vekrMvgSIZdSsLjMDhNF1U4=; b=hkxibA aopZPc0G/Z6GUB5dDmhfgKfpllobXHwV+lPkaBWfboDPd2WR03qzZbuTwjOepZDi OT5udkQ6/8UzgGVUflpK12xL7NBrHoCCPYTSyPgkINt/0h08sKBcc3TVxznPRr9V 4jC7h6s39ODRI6EBgbQTHb4Pue+ulFF9FB3JU= In-Reply-To: Sender: netfilter-owner@vger.kernel.org List-ID: Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Pieter Smit Cc: Curby , netfilter@vger.kernel.org On Sat, May 15, 2010 at 12:51 PM, Pieter Smit wrote: > You would send an ICMP time exceeded (type 11) packet if you receive a > packet with a ttl=1 you will decrement it one realize it is 0 and send > the ICMP time exceeded. > > Traceroute could also use ping ICMP echo request (type 8). Or TCP SYN packets. From "man traceroute" on my Ubuntu system: -I Use ICMP ECHO for probes -T Use TCP SYN for probes Actually the "LIST OF AVAILABLE METHODS" section is quite extensive. Apparently people have been hacking on traceroute while I wasn't watching. Bill Bogstad