![]() These features make traceroute more robust than tracepath, but at the cost of sometimes requiring root authentication. ![]() In theory, ICMP packets could be part of a DDoS attack and are therefore restricted. The traceroute command can also send Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) packets. Doing so requires root privileges because malformed or malicious packets are a danger to the network. In fact, traceroute can directly manipulate network packets-and there's the problem. The power of the traceroute command lies in its flexibility and ability to initiate custom network tests using various protocols. But what's the real difference, why might root be needed, and which tool should you select? What is traceroute? Most documentation simply states that tracepath does not require root privileges to run, and traceroute does (or some traceroute options require root). However, the tracepath utility receives a lot of attention. The traceroute command has been around for a very long time, and it's a powerful tool. Red Hat OpenShift Service on AWS security FAQ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |