summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorlum <>2012-02-07 12:11:43 +0000
committerlum <>2012-02-07 12:11:43 +0000
commit2b9ca52cf6e0bc8502ce861e3b26e1fce376681c (patch)
tree309e8a9edf088073cfc658dc0439e1f41b2470aa
parent8a83e74e706942a4d9581f028c6d4ac43c103243 (diff)
downloadopenbsd-2b9ca52cf6e0bc8502ce861e3b26e1fce376681c.tar.gz
openbsd-2b9ca52cf6e0bc8502ce861e3b26e1fce376681c.tar.bz2
openbsd-2b9ca52cf6e0bc8502ce861e3b26e1fce376681c.zip
Expand the CAVEAT section to more fully describe the behaviour of
the -uz combination. This diff stems from a diff by brynet@ sent to tech@ help from jmc@ regarding wording.
-rw-r--r--src/usr.bin/nc/nc.119
1 files changed, 13 insertions, 6 deletions
diff --git a/src/usr.bin/nc/nc.1 b/src/usr.bin/nc/nc.1
index d249aa18b1..75d1437580 100644
--- a/src/usr.bin/nc/nc.1
+++ b/src/usr.bin/nc/nc.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: nc.1,v 1.59 2011/10/04 08:34:34 fgsch Exp $ 1.\" $OpenBSD: nc.1,v 1.60 2012/02/07 12:11:43 lum Exp $
2.\" 2.\"
3.\" Copyright (c) 1996 David Sacerdote 3.\" Copyright (c) 1996 David Sacerdote
4.\" All rights reserved. 4.\" All rights reserved.
@@ -25,7 +25,7 @@
25.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 25.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 26.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27.\" 27.\"
28.Dd $Mdocdate: October 4 2011 $ 28.Dd $Mdocdate: February 7 2012 $
29.Dt NC 1 29.Dt NC 1
30.Os 30.Os
31.Sh NAME 31.Sh NAME
@@ -449,8 +449,15 @@ Original implementation by *Hobbit*
449Rewritten with IPv6 support by 449Rewritten with IPv6 support by
450.An Eric Jackson Aq ericj@monkey.org . 450.An Eric Jackson Aq ericj@monkey.org .
451.Sh CAVEATS 451.Sh CAVEATS
452UDP port scans will always succeed 452UDP port scans using the
453(i.e. report the port as open),
454rendering the
455.Fl uz 453.Fl uz
456combination of flags relatively useless. 454combination of flags will always report success irrespective of
455the target machine's state.
456However,
457in conjunction with a traffic sniffer either on the target machine
458or an intermediary device,
459the
460.Fl uz
461combination could be useful for communications diagnostics.
462Note that the amount of UDP traffic generated may be limited either
463due to hardware resources and/or configuration settings.