sc_pinger(1)

The utility provides the ability to connect to a running instance and run ping on a set of IPv4 and IPv6 addresses.

Section 1 scamper bookworm source

Description

SC_PINGER(1) General Commands Manual SC_PINGER(1)

NAME

sc_pinger — scamper driver to run ping with different probe methods on a list of addresses.

SYNOPSIS

sc_pinger [-?D] [-a infile] [-o outfile] [-p port] [-U unix-socket] [-c probe-count] [-m method] [-t logfile]

DESCRIPTION

The sc_pinger utility provides the ability to connect to a running scamper(1) instance and run ping on a set of IPv4 and IPv6 addresses. For each address in the file, sc_pinger will try ICMP, UDP, and TCP-ack probe methods to solicit responses from the address. sc_pinger will not try all methods if one method obtains responses. The output of sc_pinger is written to a warts(5) file, which can then be processed to extract details of responses. The options are as follows:

-?

prints a list of command line options and a synopsis of each.

-D

causes sc_pinger to detach and become a daemon.

-a infile

specifies the name of the input file which consists of a sequence of IPv4 and IPv6 addresses, one per line.

-o outfile

specifies the name of the output file to be written. The output file will use the warts(5) format.

-p port

specifies the port on the local host where scamper(1) is accepting control socket connections.

-U unix-socket

specifies the name of a unix domain socket where scamper(1) is accepting control socket connections.

-c probe-count

specifies the number of probes to send for each method. sc_pinger accepts two formats: a single integer that specifies the number of probes (and responses) desired; or, two integers, separated by /, that specify the number of responses desired and maximum number of probes to send. By default, sc_pinger seeks three responses from up to five probes.

-m method

specifies a single probe method to try. The available probe methods are the same as scamper’s ping implementation, listed in scamper(1) manual page. By default, sc_pinger uses ICMP-echo, UDP-dport, and TCP-ack-sport to destination port 80.

-t logfile

specifies the name of a file to log output from sc_pinger generated at run time.

EXAMPLES

Given a set of IPv4 and IPv6 address sets in a file named infile.txt:

192.0.2.1
192.0.32.10
192.0.31.60
2001:db8::1

and a scamper(1) daemon listening on port 31337, then these addresses can be probed using

sc_pinger -a infile.txt -o outfile.warts -p 31337

To send 4 probes, and stop after receiving two responses:

sc_pinger -a infile.txt -o outfile.warts -p 31337 -c 2/4

To use ICMP-echo and TCP-syn probes to destination port 443

sc_pinger -a infile.txt -o outfile.warts -p 31337 -m icmp-echo -m ’tcp-syn -d 443’

SEE ALSO

scamper(1), sc_wartsdump(1), sc_warts2json(1), sc_warts2text(1)

AUTHORS

sc_pinger was written by Matthew Luckie <mjl@luckie.org.nz>. GNU Jun 24, 2020 SC_PINGER(1)