xref: /freebsd/sbin/ping/ping.8 (revision 5521ff5a4d1929056e7ffc982fac3341ca54df7c)
1.\" Copyright (c) 1985, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     @(#)ping.8	8.2 (Berkeley) 12/11/93
33.\" $FreeBSD$
34.\"
35.Dd March 1, 1997
36.Dt PING 8
37.Os BSD 4.3
38.Sh NAME
39.Nm ping
40.Nd send
41.Tn ICMP ECHO_REQUEST
42packets to network hosts
43.Sh SYNOPSIS
44.Nm
45.Op Fl AQRadfnqrv
46.Op Fl c Ar count
47.Op Fl i Ar wait
48.Op Fl l Ar preload
49.Op Fl m Ar ttl
50.Op Fl p Ar pattern
51.Op Fl P Ar policy
52.Op Fl s Ar packetsize
53.Op Fl S Ar src_addr
54.Op Fl t Ar timeout
55.Bo
56.Ar host |
57.Op Fl L
58.Op Fl I Ar interface
59.Op Fl T Ar ttl
60.Ar mcast-group
61.Bc
62.Sh DESCRIPTION
63.Nm Ping
64uses the
65.Tn ICMP
66.No protocol Ap s mandatory
67.Tn ECHO_REQUEST
68datagram to elicit an
69.Tn ICMP ECHO_RESPONSE
70from a host or gateway.
71.Tn ECHO_REQUEST
72datagrams
73.Pq Dq pings
74have an IP and
75.Tn ICMP
76header, followed by a
77.Dq struct timeval
78and then an arbitrary number of
79.Dq pad
80bytes used to fill out the packet.  The options are as follows:
81.Bl -tag -width indent
82.It Fl A
83Audible.
84Include a bell
85.Pq ASCII 0x07
86character in the output when no packet is received before the next packet
87is transmitted.
88.It Fl a
89Audible.
90Include a bell
91.Pq ASCII 0x07
92character in the output when any packet is received.
93This option is ignored
94if other format options are present.
95.It Fl c Ar count
96Stop after sending
97.Pq and receiving
98.Ar count
99.Tn ECHO_RESPONSE
100packets.
101If this option is not specified,
102.Nm
103will operate until interrupted.
104.It Fl d
105Set the
106.Dv SO_DEBUG
107option on the socket being used.
108.It Fl f
109Flood ping.
110Outputs packets as fast as they come back or one hundred times per second,
111whichever is more.
112For every
113.Tn ECHO_REQUEST
114sent a period
115.Dq .\&
116is printed, while for every
117.Tn ECHO_REPLY
118received a backspace is printed.
119This provides a rapid display of how many packets are being dropped.
120Only the super-user may use this option.
121.Bf -emphasis
122This can be very hard on a network and should be used with caution.
123.Ef
124.It Fl i Ar wait
125Wait
126.Ar wait
127seconds
128.Em between sending each packet .
129The default is to wait for one second between each packet.
130The wait time may be fractional, but only the super-user may specify
131values less then 1 second.
132This option is incompatible with the
133.Fl f
134option.
135.It Fl I Ar interface
136Source multicast packets with the given interface address.
137This flag only applies if the ping destination is a multicast address.
138.It Fl l Ar preload
139If
140.Ar preload
141is specified,
142.Nm
143sends that many packets as fast as possible before falling into its normal
144mode of behavior.
145Only the super-user may use this option.
146.It Fl m Ar ttl
147Set the IP Time To Live for outgoing packets.
148If not specified, the kernel uses the value of the
149.Va net.inet.ip.ttl
150MIB variable.
151.It Fl L
152Suppress loopback of multicast packets.
153This flag only applies if the ping destination is a multicast address.
154.It Fl n
155Numeric output only.
156No attempt will be made to lookup symbolic names for host addresses.
157.It Fl p Ar pattern
158You may specify up to 16
159.Dq pad
160bytes to fill out the packet you send.
161This is useful for diagnosing data-dependent problems in a network.
162For example,
163.Dq Li \-p ff
164will cause the sent packet to be filled with all
165ones.
166.It Fl P Ar policy
167.Ar policy
168specifies IPsec policy for the ping session.
169For details please refer to
170.Xr ipsec 4
171and
172.Xr ipsec_set_policy 3 .
173.It Fl Q
174Somewhat quiet output.
175.No Don Ap t
176display ICMP error messages that are in response to our query messages.
177Originally, the
178.Fl v
179flag was required to display such errors, but
180.Fl v
181displays all ICMP error messages.  On a busy machine, this output can
182be overbearing.  Without the
183.Fl Q
184flag,
185.Nm
186prints out any ICMP error messages caused by its own ECHO_REQUEST
187messages.
188.It Fl q
189Quiet output.
190Nothing is displayed except the summary lines at startup time and
191when finished.
192.It Fl R
193Record route.
194Includes the
195.Tn RECORD_ROUTE
196option in the
197.Tn ECHO_REQUEST
198packet and displays
199the route buffer on returned packets.
200Note that the IP header is only large enough for nine such routes;
201the
202.Xr traceroute 8
203command is usually better at determining the route packets take to a
204particular destination.
205If more routes come back than should, such as due to an illegal spoofed
206packet, ping will print the route list and then truncate it at the correct
207spot.
208Many hosts ignore or discard the
209.Tn RECORD_ROUTE
210option.
211.It Fl r
212Bypass the normal routing tables and send directly to a host on an attached
213network.
214If the host is not on a directly-attached network, an error is returned.
215This option can be used to ping a local host through an interface
216that has no route through it
217.Po
218e.g., after the interface was dropped by
219.Xr routed 8
220.Pc .
221.It Fl s Ar packetsize
222Specify the number of data bytes to be sent.
223The default is 56, which translates into 64
224.Tn ICMP
225data bytes when combined
226with the 8 bytes of
227.Tn ICMP
228header data.
229Only the super-user may use this option.
230.It Fl S Ar src_addr
231Use the following IP address as the source address in outgoing packets.
232On hosts with more than one IP address, this option can be used to
233force the source address to be something other than the IP address
234of the interface the probe packet is sent on.  If the IP address
235is not one of this machine's interface addresses, an error is
236returned and nothing is sent.
237.It Fl t Ar timeout
238Specify a timeout, in seconds, before ping exits regardless of how
239many packets have been recieved.
240.It Fl T Ar ttl
241Set the IP Time To Live for multicasted packets.
242This flag only applies if the ping destination is a multicast address.
243.It Fl v
244Verbose output.
245.Tn ICMP
246packets other than
247.Tn ECHO_RESPONSE
248that are received are listed.
249.El
250.Pp
251When using
252.Nm
253for fault isolation, it should first be run on the local host, to verify
254that the local network interface is up and running.
255Then, hosts and gateways further and further away should be
256.Dq pinged .
257Round-trip times and packet loss statistics are computed.
258If duplicate packets are received, they are not included in the packet
259loss calculation, although the round trip time of these packets is used
260in calculating the round-trip time statistics.
261When the specified number of packets have been sent
262.Pq and received
263or if the program is terminated with a
264.Dv SIGINT ,
265a brief summary is displayed, showing the number of packets sent and
266received, and the minimum, maximum, mean, and standard deviation of
267the round-trip times.
268.Pp
269This program is intended for use in network testing, measurement and
270management.
271Because of the load it can impose on the network, it is unwise to use
272.Nm
273during normal operations or from automated scripts.
274.Sh ICMP PACKET DETAILS
275An IP header without options is 20 bytes.
276An
277.Tn ICMP
278.Tn ECHO_REQUEST
279packet contains an additional 8 bytes worth of
280.Tn ICMP
281header followed by an arbitrary amount of data.
282When a
283.Ar packetsize
284is given, this indicated the size of this extra piece of data
285.Pq the default is 56 .
286Thus the amount of data received inside of an IP packet of type
287.Tn ICMP
288.Tn ECHO_REPLY
289will always be 8 bytes more than the requested data space
290.Pq the Tn ICMP header .
291.Pp
292If the data space is at least eight bytes large,
293.Nm
294uses the first eight bytes of this space to include a timestamp which
295it uses in the computation of round trip times.
296If less than eight bytes of pad are specified, no round trip times are
297given.
298.Sh DUPLICATE AND DAMAGED PACKETS
299.Nm Ping
300will report duplicate and damaged packets.
301Duplicate packets should never occur when pinging a unicast address,
302and seem to be caused by
303inappropriate link-level retransmissions.
304Duplicates may occur in many situations and are rarely
305.Pq if ever
306a good sign, although the presence of low levels of duplicates may not
307always be cause for alarm.
308Duplicates are expected when pinging a broadcast or multicast address,
309since they are not really duplicates but replies from different hosts
310to the same request.
311.Pp
312Damaged packets are obviously serious cause for alarm and often
313indicate broken hardware somewhere in the
314.Nm
315packet's path (in the network or in the hosts).
316.Sh TRYING DIFFERENT DATA PATTERNS
317The
318(inter)network
319layer should never treat packets differently depending on the data
320contained in the data portion.
321Unfortunately, data-dependent problems have been known to sneak into
322networks and remain undetected for long periods of time.
323In many cases the particular pattern that will have problems is something
324that does not have sufficient
325.Dq transitions ,
326such as all ones or all zeros, or a pattern right at the edge, such as
327almost all zeros.
328It is not
329necessarily enough to specify a data pattern of all zeros (for example)
330on the command line because the pattern that is of interest is
331at the data link level, and the relationship between what you type and
332what the controllers transmit can be complicated.
333.Pp
334This means that if you have a data-dependent problem you will probably
335have to do a lot of testing to find it.
336If you are lucky, you may manage to find a file that either
337cannot
338be sent across your network or that takes much longer to transfer than
339other similar length files.
340You can then examine this file for repeated patterns that you can test
341using the
342.Fl p
343option of
344.Nm .
345.Sh TTL DETAILS
346The
347.Tn TTL
348value of an IP packet represents the maximum number of IP routers
349that the packet can go through before being thrown away.
350In current practice you can expect each router in the Internet to decrement
351the
352.Tn TTL
353field by exactly one.
354.Pp
355The
356.Tn TCP/IP
357specification states that the
358.Tn TTL
359field for
360.Tn TCP
361packets should be set to 60, but many systems use smaller values
362.Po
363.Bx 4.3
364uses 30,
365.Bx 4.2
366used 15
367.Pc .
368.Pp
369The maximum possible value of this field is 255, and most
370.Ux
371systems set
372the
373.Tn TTL
374field of
375.Tn ICMP ECHO_REQUEST
376packets to 255.
377This is why you will find you can
378.Dq ping
379some hosts, but not reach them with
380.Xr telnet 1
381or
382.Xr ftp 1 .
383.Pp
384In normal operation
385.Nm
386prints the ttl value from the packet it receives.
387When a remote system receives a ping packet, it can do one of three things
388with the
389.Tn TTL
390field in its response:
391.Bl -bullet
392.It
393Not change it; this is what
394.Bx
395systems did before the
396.Bx 4.3 tahoe
397release.
398In this case the
399.Tn TTL
400value in the received packet will be 255 minus the
401number of routers in the round-trip path.
402.It
403Set it to 255; this is what current
404.Bx
405systems do.
406In this case the
407.Tn TTL
408value in the received packet will be 255 minus the
409number of routers in the path
410.Em from
411the remote system
412.Em to
413the
414.Nm Ns Em ing
415host.
416.It
417Set it to some other value.
418Some machines use the same value for
419.Tn ICMP
420packets that they use for
421.Tn TCP
422packets, for example either 30 or 60.
423Others may use completely wild values.
424.El
425.Sh RETURN VALUES
426The
427.Nm
428command returns an exit status of zero if at least one response was
429heard from the specified
430.Ar host ;
431a status of two if the transmission was successful but no responses
432were received; or another value
433.Pq from Aq Pa sysexits.h
434if an error occurred.
435.Sh SEE ALSO
436.Xr netstat 1 ,
437.Xr ifconfig 8 ,
438.Xr routed 8 ,
439.Xr traceroute 8
440.Sh HISTORY
441The
442.Nm
443command appeared in
444.Bx 4.3 .
445.Sh AUTHORS
446The original
447.Nm
448command was written by
449.An Mike Muuss
450while at the US Army Ballistics
451Research Laboratory.
452.Sh BUGS
453Many Hosts and Gateways ignore the
454.Tn RECORD_ROUTE
455option.
456.Pp
457The maximum IP header length is too small for options like
458.Tn RECORD_ROUTE
459to be completely useful.
460.No There Ap s
461not much that can be done about this, however.
462.Pp
463Flood pinging is not recommended in general, and flood pinging the
464broadcast address should only be done under very controlled conditions.
465.Pp
466The
467.Fl v
468option is not worth much on busy hosts.
469