Unmaintained upstream, no update since import in 2022, does not work:

        $ fragroute -h
        Usage: fragroute [-f file] dst
        Rules:
               delay first|last|random <ms>
               drop first|last|random <prob-%>
               dup first|last|random <prob-%>
               echo <string> ...
               ip_chaff dup|opt|<ttl>
               ip_frag <size> [old|new]
               ip_opt lsrr|ssrr <ptr> <ip-addr> ...
               ip_ttl <ttl>
               ip_tos <tos>
               order random|reverse
               print
               tcp_chaff cksum|null|paws|rexmit|seq|syn|<ttl>
               tcp_opt mss|wscale <size>
               tcp_seg <size> [old|new]

        $ echo print >test.conf
        # fragroute -f test.conf 1.1.1.1
        Segmentation fault (core dumped) 

        # egdb -q -batch -ex bt fragroute fragroute.core
        [New process 447575]
        Core was generated by `fragroute'.
        Program terminated with signal SIGSEGV, Segmentation fault.
        #0  event_add (ev=0xaf2e9e54cb8, tv=0x0) at 
/usr/src/lib/libevent/event.c:661
        661             const struct eventop *evsel = base->evsel;
        #0  event_add (ev=0xaf2e9e54cb8, tv=0x0) at 
/usr/src/lib/libevent/event.c:661
        #1  0x00000af2e9e4c351 in ?? ()
        #2  0x00000af2e9e4c279 in ?? ()
        #3  0x00000af2e9e4c002 in ?? ()
        #4  0x0000000000000000 in ?? ()

Same crash with default /etc/fragroute.conf -- I doubt anyone uses this.

OK to remove?
---
Information for inst:fragroute-1.2p8

Comment:
intercept, modify, and rewrite egress traffic

Description:
fragroute intercepts, modifies, and rewrites egress traffic destined for
a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.

It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.

Maintainer: The OpenBSD ports mailing-list <ports@openbsd.org>

WWW: http://www.monkey.org/~dugsong/fragroute/



Reply via email to