Unmaintained upstream, no update since import in 2022, does not work: $ fragroute -h Usage: fragroute [-f file] dst Rules: delay first|last|random <ms> drop first|last|random <prob-%> dup first|last|random <prob-%> echo <string> ... ip_chaff dup|opt|<ttl> ip_frag <size> [old|new] ip_opt lsrr|ssrr <ptr> <ip-addr> ... ip_ttl <ttl> ip_tos <tos> order random|reverse print tcp_chaff cksum|null|paws|rexmit|seq|syn|<ttl> tcp_opt mss|wscale <size> tcp_seg <size> [old|new]
$ echo print >test.conf # fragroute -f test.conf 1.1.1.1 Segmentation fault (core dumped) # egdb -q -batch -ex bt fragroute fragroute.core [New process 447575] Core was generated by `fragroute'. Program terminated with signal SIGSEGV, Segmentation fault. #0 event_add (ev=0xaf2e9e54cb8, tv=0x0) at /usr/src/lib/libevent/event.c:661 661 const struct eventop *evsel = base->evsel; #0 event_add (ev=0xaf2e9e54cb8, tv=0x0) at /usr/src/lib/libevent/event.c:661 #1 0x00000af2e9e4c351 in ?? () #2 0x00000af2e9e4c279 in ?? () #3 0x00000af2e9e4c002 in ?? () #4 0x0000000000000000 in ?? () Same crash with default /etc/fragroute.conf -- I doubt anyone uses this. OK to remove? --- Information for inst:fragroute-1.2p8 Comment: intercept, modify, and rewrite egress traffic Description: fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper of January 1998. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behaviour. Maintainer: The OpenBSD ports mailing-list <ports@openbsd.org> WWW: http://www.monkey.org/~dugsong/fragroute/