xref: /freebsd/sbin/routed/routed.8 (revision 38a52bd3b5cac3da6f7f6eef3dd050e6aa08ebb3)
1.\"   $Revision: 2.26 $
2.\"
3.\" Copyright (c) 1983, 1991, 1993
4.\"	The Regents of the University of California.  All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. Neither the name of the University nor the names of its contributors
15.\"    may be used to endorse or promote products derived from this software
16.\"    without specific prior written permission.
17.\"
18.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28.\" SUCH DAMAGE.
29.\"
30.\"     @(#)routed.8	8.2 (Berkeley) 12/11/93
31.\" $FreeBSD$
32.\"
33.Dd June 27, 2022
34.Dt ROUTED 8
35.Os
36.Sh NAME
37.Nm routed ,
38.Nm rdisc
39.Nd network RIP and router discovery routing daemon
40.Sh SYNOPSIS
41.Nm
42.Op Fl isqdghmpAtv
43.Op Fl T Ar tracefile
44.Oo
45.Fl F
46.Ar net Ns Op /mask Ns Op ,metric
47.Oc
48.Op Fl P Ar parms
49.Sh DESCRIPTION
50The
51.Nm
52utility is a daemon invoked at boot time to manage the network
53routing tables.
54It uses Routing Information Protocol, RIPv1 (RFC\ 1058),
55RIPv2 (RFC\ 1723),
56and Internet Router Discovery Protocol (RFC 1256)
57to maintain the kernel routing table.
58The RIPv1 protocol is based on the reference
59.Bx 4.3
60daemon.
61.Pp
62It listens on the
63.Xr udp 4
64socket for the
65.Xr route 8
66service (see
67.Xr services 5 )
68for Routing Information Protocol packets.
69It also sends and receives multicast Router Discovery ICMP messages.
70If the host is a router,
71.Nm
72periodically supplies copies
73of its routing tables to any directly connected hosts and networks.
74It also advertises or solicits default routes using Router Discovery
75ICMP messages.
76.Pp
77When started (or when a network interface is later turned on),
78.Nm
79uses an AF_ROUTE address family facility to find those
80directly connected interfaces configured into the
81system and marked "up".
82It adds necessary routes for the interfaces
83to the kernel routing table.
84Soon after being first started, and provided there is at least one
85interface on which RIP has not been disabled,
86.Nm
87deletes all pre-existing
88non-static routes in kernel table.
89Static routes in the kernel table are preserved and
90included in RIP responses if they have a valid RIP -hopcount
91(see
92.Xr route 8 ) .
93.Pp
94If more than one interface is present (not counting the loopback interface),
95it is assumed that the host should forward packets among the
96connected networks.
97After transmitting a RIP
98.Em request
99and
100Router Discovery Advertisements or Solicitations on a new interface,
101the daemon enters a loop, listening for
102RIP request and response and Router Discovery packets from other hosts.
103.Pp
104When a
105.Em request
106packet is received,
107.Nm
108formulates a reply based on the information maintained in its
109internal tables.
110The
111.Em response
112packet generated contains a list of known routes, each marked
113with a "hop count" metric (a count of 16 or greater is
114considered "infinite").
115The advertised metric for a route reflects the metrics associated
116with interfaces
117(see
118.Xr ifconfig 8 )
119though which it is received and sent,
120so setting the metric on an interface
121is an effective way to steer traffic.
122See also
123.Cm adj_inmetric
124and
125.Cm adj_outmetric
126parameters below.
127.Pp
128Responses do not include routes with a first hop on the requesting
129network to implement in part
130.Em split-horizon .
131Requests from query programs
132such as
133.Xr rtquery 8
134are answered with the complete table.
135.Pp
136The routing table maintained by the daemon
137includes space for several gateways for each destination
138to speed recovery from a failing router.
139RIP
140.Em response
141packets received are used to update the routing tables provided they are
142from one of the several currently recognized gateways or
143advertise a better metric than at least one of the existing
144gateways.
145.Pp
146When an update is applied,
147.Nm
148records the change in its own tables and updates the kernel routing table
149if the best route to the destination changes.
150The change in the kernel routing table is reflected in the next batch of
151.Em response
152packets sent.
153If the next response is not scheduled for a while, a
154.Em flash update
155response containing only recently changed routes is sent.
156.Pp
157In addition to processing incoming packets,
158.Nm
159also periodically checks the routing table entries.
160If an entry has not been updated for 3 minutes, the entry's metric
161is set to infinity and marked for deletion.
162Deletions are delayed until the route has been advertised with
163an infinite metric to ensure the invalidation
164is propagated throughout the local internet.
165This is a form of
166.Em poison reverse .
167.Pp
168Routes in the kernel table that are added or changed as a result
169of ICMP Redirect messages are deleted after a while to minimize
170.Em black-holes .
171When a TCP connection suffers a timeout,
172the kernel tells
173.Nm ,
174which deletes all redirected routes
175through the gateway involved, advances the age of all RIP routes through
176the gateway to allow an alternate to be chosen, and advances of the
177age of any relevant Router Discovery Protocol default routes.
178.Pp
179Hosts acting as internetwork routers gratuitously supply their
180routing tables every 30 seconds to all directly connected hosts
181and networks.
182These RIP responses are sent to the broadcast address on nets that support
183broadcasting,
184to the destination address on point-to-point links, and to the router's
185own address on other networks.
186If RIPv2 is enabled, multicast packets are sent on interfaces that
187support multicasting.
188.Pp
189If no response is received on a remote interface, if there are errors
190while sending responses,
191or if there are more errors than input or output (see
192.Xr netstat 1 ) ,
193then the cable or some other part of the interface is assumed to be
194disconnected or broken, and routes are adjusted appropriately.
195.Pp
196The
197.Em Internet Router Discovery Protocol
198is handled similarly.
199When the daemon is supplying RIP routes, it also listens for
200Router Discovery Solicitations and sends Advertisements.
201When it is quiet and listening to other RIP routers, it
202sends Solicitations and listens for Advertisements.
203If it receives
204a good Advertisement and it is not multi-homed,
205it stops listening for broadcast or multicast RIP responses.
206It tracks several advertising routers to speed recovery when the
207currently chosen router dies.
208If all discovered routers disappear,
209the daemon resumes listening to RIP responses.
210It continues listening to RIP while using Router Discovery
211if multi-homed to ensure all interfaces are used.
212.Pp
213The Router Discovery standard requires that advertisements
214have a default "lifetime" of 30 minutes.
215That means should
216something happen, a client can be without a good route for
21730 minutes.
218It is a good idea to reduce the default to 45
219seconds using
220.Fl P Cm rdisc_interval=45
221on the command line or
222.Cm rdisc_interval=45
223in the
224.Pa /etc/gateways
225file.
226.Pp
227While using Router Discovery (which happens by default when
228the system has a single network interface and a Router Discover Advertisement
229is received), there is a single default route and a variable number of
230redirected host routes in the kernel table.
231On a host with more than one network interface,
232this default route will be via only one of the interfaces.
233Thus, multi-homed hosts running with
234.Fl q
235might need
236.Cm no_rdisc
237described below.
238.Pp
239See the
240.Cm pm_rdisc
241facility described below to support "legacy" systems
242that can handle neither RIPv2 nor Router Discovery.
243.Pp
244By default, neither Router Discovery advertisements nor solicitations
245are sent over point to point links (e.g.\& PPP).
246The netmask associated with point-to-point links (such as SLIP
247or PPP, with the IFF_POINTOPOINT flag) is used by
248.Nm
249to infer the netmask used by the remote system when RIPv1 is used.
250.Pp
251The following options are available:
252.Bl -tag -width indent
253.It Fl i
254allow
255.Nm
256to accept a RIP request from non-router node.
257When specified once,
258.Nm
259replies to a route information query from neighbor nodes.
260When specified twice,
261it replies to a query from remote nodes in addition.
262.Xr rtquery 8
263utility can be used to send a request.
264.Pp
265This feature is disabled by default because of a risk of reflection attack
266though it is useful for debugging purpose.
267.It Fl s
268force
269.Nm
270to supply routing information.
271This is the default if multiple network interfaces are present on which
272RIP or Router Discovery have not been disabled, and if the kernel switch
273ipforwarding=1.
274.It Fl q
275is the opposite of the
276.Fl s
277option.
278This is the default when only one interface is present.
279With this explicit option, the daemon is always in "quiet-mode" for RIP
280and does not supply routing information to other computers.
281.It Fl d
282do not run in the background.
283This option is meant for interactive use.
284.It Fl g
285used on internetwork routers to offer a route
286to the "default" destination.
287It is equivalent to
288.Fl F
289.Cm 0/0,1
290and is present mostly for historical reasons.
291A better choice is
292.Fl P Cm pm_rdisc
293on the command line or
294.Cm pm_rdisc
295in the
296.Pa /etc/gateways
297file,
298since a larger metric
299will be used, reducing the spread of the potentially dangerous
300default route.
301This is typically used on a gateway to the Internet,
302or on a gateway that uses another routing protocol whose routes
303are not reported to other local routers.
304Notice that because a metric of 1 is used, this feature is
305dangerous.
306It is more commonly accidentally used to create chaos with a
307routing loop than to solve problems.
308.It Fl h
309cause host or point-to-point routes to not be advertised,
310provided there is a network route going the same direction.
311That is a limited kind of aggregation.
312This option is useful on gateways to Ethernets that have other gateway
313machines connected with point-to-point links such as SLIP.
314.It Fl m
315cause the machine to advertise a host or point-to-point route to
316its primary interface.
317It is useful on multi-homed machines such as NFS servers.
318This option should not be used except when the cost of
319the host routes it generates is justified by the popularity of
320the server.
321It is effective only when the machine is supplying
322routing information, because there is more than one interface.
323The
324.Fl m
325option overrides the
326.Fl q
327option to the limited extent of advertising the host route.
328.It Fl A
329do not ignore RIPv2 authentication if we do not care about RIPv2
330authentication.
331This option is required for conformance with RFC 1723.
332However, it makes no sense and breaks using RIP as a discovery protocol
333to ignore all RIPv2 packets that carry authentication when this machine
334does not care about authentication.
335.It Fl t
336increase the debugging level, which causes more information to be logged
337on the tracefile specified with
338.Fl T
339or standard out.
340The debugging level can be increased or decreased
341with the
342.Em SIGUSR1
343or
344.Em SIGUSR2
345signals or with the
346.Xr rtquery 8
347command.
348.It Fl T Ar tracefile
349increases the debugging level to at least 1 and
350causes debugging information to be appended to the trace file.
351Note that because of security concerns, it is wisest to not run
352.Nm
353routinely with tracing directed to a file.
354.It Fl v
355display and logs the version of daemon.
356.It Fl F Ar net[/mask][,metric]
357minimize routes in transmissions via interfaces with addresses that match
358.Em net/mask ,
359and synthesizes a default route to this machine with the
360.Em metric .
361The intent is to reduce RIP traffic on slow, point-to-point links
362such as PPP links by replacing many large UDP packets of RIP information
363with a single, small packet containing a "fake" default route.
364If
365.Em metric
366is absent, a value of 14 is assumed to limit
367the spread of the "fake" default route.
368This is a dangerous feature that when used carelessly can cause routing
369loops.
370Notice also that more than one interface can match the specified network
371number and mask.
372See also
373.Fl g .
374.It Fl P Ar parms
375is equivalent to adding the parameter
376line
377.Em parms
378to the
379.Pa /etc/gateways
380file.
381.El
382.Pp
383Any other argument supplied is interpreted as the name
384of a file in which the actions of
385.Nm
386should be logged.
387It is better to use
388.Fl T
389instead of
390appending the name of the trace file to the command.
391.Pp
392The
393.Nm
394utility also supports the notion of
395"distant"
396.Em passive
397or
398.Em active
399gateways.
400When
401.Nm
402is started, it reads the file
403.Pa /etc/gateways
404to find such distant gateways which may not be located using
405only information from a routing socket, to discover if some
406of the local gateways are
407.Em passive ,
408and to obtain other parameters.
409Gateways specified in this manner should be marked passive
410if they are not expected to exchange routing information,
411while gateways marked active
412should be willing to exchange RIP packets.
413Routes through
414.Em passive
415gateways are installed in the
416kernel's routing tables once upon startup and are not included in
417transmitted RIP responses.
418.Pp
419Distant active gateways are treated like network interfaces.
420RIP responses are sent
421to the distant
422.Em active
423gateway.
424If no responses are received, the associated route is deleted from
425the kernel table and RIP responses advertised via other interfaces.
426If the distant gateway resumes sending RIP responses, the associated
427route is restored.
428.Pp
429Such gateways can be useful on media that do not support broadcasts
430or multicasts but otherwise act like classic shared media like
431Ethernets such as some ATM networks.
432One can list all RIP routers reachable on the HIPPI or ATM network in
433.Pa /etc/gateways
434with a series of
435"host" lines.
436Note that it is usually desirable to use RIPv2 in such situations
437to avoid generating lists of inferred host routes.
438.Pp
439Gateways marked
440.Em external
441are also passive, but are not placed in the kernel
442routing table nor are they included in routing updates.
443The function of external entries is to indicate
444that another routing process
445will install such a route if necessary,
446and that other routes to that destination should not be installed
447by
448.Nm .
449Such entries are only required when both routers may learn of routes
450to the same destination.
451.Pp
452The
453.Pa /etc/gateways
454file is comprised of a series of lines, each in
455one of the following two formats or consist of parameters described later.
456Blank lines and lines starting with '#' are comments.
457.Bd -ragged
458.Cm net
459.Ar Nname[/mask]
460.Cm gateway
461.Ar Gname
462.Cm metric
463.Ar value
464.Pf < Cm passive No \&|
465.Cm active No \&|
466.Cm extern Ns >
467.Ed
468.Bd -ragged
469.Cm host
470.Ar Hname
471.Cm gateway
472.Ar Gname
473.Cm metric
474.Ar value
475.Pf < Cm passive No \&|
476.Cm active No \&|
477.Cm extern Ns >
478.Ed
479.Pp
480.Ar Nname
481or
482.Ar Hname
483is the name of the destination network or host.
484It may be a symbolic network name or an Internet address
485specified in "dot" notation (see
486.Xr inet 3 ) .
487(If it is a name, then it must either be defined in
488.Pa /etc/networks
489or
490.Pa /etc/hosts ,
491or a method in
492.Xr nsswitch.conf 5
493must be able to resolve it.)
494.Pp
495.Ar Mask
496is an optional number between 1 and 32 indicating the netmask associated
497with
498.Ar Nname .
499.Pp
500.Ar Gname
501is the name or address of the gateway to which RIP responses should
502be forwarded.
503.Pp
504.Ar Value
505is the hop count to the destination host or network.
506.Pp
507.Cm Host Ar hname
508is equivalent to
509.Cm net Ar nname/32 .
510.Pp
511One of the keywords
512.Cm passive ,
513.Cm active
514or
515.Cm external
516must be present to indicate whether the gateway should be treated as
517.Cm passive
518or
519.Cm active
520(as described above),
521or whether the gateway is
522.Cm external
523to the scope of the RIP protocol.
524.Pp
525As can be seen when debugging is turned on with
526.Fl t ,
527such lines create pseudo-interfaces.
528To set parameters for remote or external interfaces,
529a line starting with
530.Cm if=alias(Hname) ,
531.Cm if=remote(Hname) ,
532etc.\& should be used.
533.Ss Parameters
534Lines that start with neither "net" nor "host" must consist of one
535or more of the following parameter settings, separated by commas or
536blanks:
537.Bl -tag -width indent
538.It Cm if Ns = Ns Ar ifname
539indicates that the other parameters on the line apply to the interface
540name
541.Ar ifname .
542.It Cm subnet Ns = Ns Ar nname Ns Oo / Ns Ar mask Oc Ns Op , Ns Ar metric
543advertises a route to network
544.Ar nname
545with mask
546.Ar mask
547and the supplied metric (default 1).
548This is useful for filling "holes" in CIDR allocations.
549This parameter must appear by itself on a line.
550The network number must specify a full, 32-bit value, as in 192.0.2.0
551instead of 192.0.2.
552.Pp
553Do not use this feature unless necessary.
554It is dangerous.
555.It Cm ripv1_mask Ns = Ns Ar nname Ns / Ns Ar mask1 , Ns Ar mask2
556specifies that netmask of the network of which
557.Ar nname Ns / Ns Ar mask1
558is
559a subnet should be
560.Ar mask2 .
561For example,
562.Dq Li ripv1_mask=192.0.2.16/28,27
563marks 192.0.2.16/28
564as a subnet of 192.0.2.0/27 instead of 192.0.2.0/24.
565It is better to turn on RIPv2 instead of using this facility, for example
566with
567.Cm ripv2_out .
568.It Cm passwd Ns = Ns Ar XXX[|KeyID[start|stop]]
569specifies a RIPv2 cleartext password that will be included on
570all RIPv2 responses sent, and checked on all RIPv2 responses received.
571Any blanks, tab characters, commas, or '#', '|', or NULL characters in the
572password must be escaped with a backslash (\\).
573The common escape sequences \\n, \\r, \\t, \\b, and \\xxx have their
574usual meanings.
575The
576.Cm KeyID
577must be unique but is ignored for cleartext passwords.
578If present,
579.Cm start
580and
581.Cm stop
582are timestamps in the form year/month/day@hour:minute.
583They specify when the password is valid.
584The valid password with the most future is used on output packets, unless
585all passwords have expired, in which case the password that expired most
586recently is used, or unless no passwords are valid yet, in which case
587no password is output.
588Incoming packets can carry any password that is valid, will
589be valid within the next 24 hours, or that was valid within the preceding
59024 hours.
591To protect the secrets, the passwd settings are valid only in the
592.Pa /etc/gateways
593file and only when that file is readable only by UID 0.
594.It Cm md5_passwd Ns \&= Ns Ar XXX|KeyID[start|stop]
595specifies a RIPv2 MD5 password.
596Except that a
597.Cm KeyID
598is required, this keyword is similar to
599.Cm passwd .
600.It Cm no_ag
601turns off aggregation of subnets in RIPv1 and RIPv2 responses.
602.It Cm no_super_ag
603turns off aggregation of networks into supernets in RIPv2 responses.
604.It Cm passive
605marks the interface to not be advertised in updates sent via other
606interfaces, and turns off all RIP and router discovery through the interface.
607.It Cm no_rip
608disables all RIP processing on the specified interface.
609If no interfaces are allowed to process RIP packets,
610.Nm
611acts purely as a router discovery daemon.
612.Pp
613Note that turning off RIP without explicitly turning on router
614discovery advertisements with
615.Cm rdisc_adv
616or
617.Fl s
618causes
619.Nm
620to act as a client router discovery daemon, not advertising.
621.It Cm no_rip_mcast
622causes RIPv2 packets to be broadcast instead of multicast.
623.It Cm no_rip_out
624causes no RIP updates to be sent.
625.It Cm no_ripv1_in
626causes RIPv1 received responses to be ignored.
627.It Cm no_ripv2_in
628causes RIPv2 received responses to be ignored.
629.It Cm ripv2_out
630turns on RIPv2 output and causes RIPv2 advertisements to be
631multicast when possible.
632.It Cm ripv2
633is equivalent to
634.Cm no_ripv1_in
635and
636.Cm no_ripv1_out .
637This enables RIPv2.
638.It Cm no_rdisc
639disables the Internet Router Discovery Protocol.
640.It Cm no_solicit
641disables the transmission of Router Discovery Solicitations.
642.It Cm send_solicit
643specifies that Router Discovery solicitations should be sent,
644even on point-to-point links,
645which by default only listen to Router Discovery messages.
646.It Cm no_rdisc_adv
647disables the transmission of Router Discovery Advertisements.
648.It Cm rdisc_adv
649specifies that Router Discovery Advertisements should be sent,
650even on point-to-point links,
651which by default only listen to Router Discovery messages.
652.It Cm bcast_rdisc
653specifies that Router Discovery packets should be broadcast instead of
654multicast.
655.It Cm rdisc_pref Ns \&= Ns Ar N
656sets the preference in Router Discovery Advertisements to the optionally
657signed integer
658.Ar N .
659The default preference is 0.
660Default routes with smaller or more negative preferences are preferred by
661clients.
662.It Cm rdisc_interval Ns \&= Ns Ar N
663sets the nominal interval with which Router Discovery Advertisements
664are transmitted to N seconds and their lifetime to 3*N.
665.It Cm fake_default Ns \&= Ns Ar metric
666has an identical effect to
667.Fl F Ar net[/mask][=metric]
668with the network and mask coming from the specified interface.
669.It Cm pm_rdisc
670is similar to
671.Cm fake_default .
672When RIPv2 routes are multicast, so that RIPv1 listeners cannot
673receive them, this feature causes a RIPv1 default route to be
674broadcast to RIPv1 listeners.
675Unless modified with
676.Cm fake_default ,
677the default route is broadcast with a metric of 14.
678That serves as a "poor man's router discovery" protocol.
679.It Cm adj_inmetric Ns \&= Ns Ar delta
680adjusts the hop count or metric of received RIP routes by
681.Ar delta .
682The metric of every received RIP route is increased by the sum
683of two values associated with the interface.
684One is the adj_inmetric value and the other is the interface
685metric set with
686.Xr ifconfig 8 .
687.It Cm adj_outmetric Ns \&= Ns Ar delta
688adjusts the hop count or metric of advertised RIP routes by
689.Ar delta .
690The metric of every received RIP route is increased by the metric
691associated with the interface by which it was received, or by 1 if
692the interface does not have a non-zero metric.
693The metric of the received route is then increased by the
694adj_outmetric associated with the interface.
695Every advertised route is increased by a total of four
696values,
697the metric set for the interface by which it was received with
698.Xr ifconfig 8 ,
699the
700.Cm adj_inmetric Ar delta
701of the receiving interface,
702the metric set for the interface by which it is transmitted with
703.Xr ifconfig 8 ,
704and the
705.Cm adj_outmetric Ar delta
706of the transmitting interface.
707.It Cm trust_gateway Ns \&= Ns Ar rname[|net1/mask1|net2/mask2|...]
708causes RIP packets from router
709.Ar rname
710and other routers named in other
711.Cm trust_gateway
712keywords to be accepted, and packets from other routers to be ignored.
713If networks are specified, then routes to other networks will be ignored
714from that router.
715.It Cm redirect_ok
716allows the kernel to listen ICMP Redirect messages when the system is acting
717as a router and forwarding packets.
718Otherwise, ICMP Redirect messages are overridden and deleted when the
719system is acting as a router.
720.El
721.Sh FILES
722.Bl -tag -width /etc/gateways -compact
723.It Pa /etc/gateways
724for distant gateways
725.El
726.Sh SEE ALSO
727.Xr icmp 4 ,
728.Xr udp 4 ,
729.Xr rtquery 8
730.Rs
731.%T Internet Transport Protocols
732.%R XSIS 028112
733.%Q Xerox System Integration Standard
734.Re
735.Sh HISTORY
736The
737.Nm
738utility appeared in
739.Bx 4.2 .
740.\"  LocalWords:  loopback ICMP rtquery ifconfig multicasting Solicitations RIPv
741.\"  LocalWords:  netstat rdisc
742.Sh BUGS
743It does not always detect unidirectional failures in network interfaces,
744for example, when the output side fails.
745