Skip site navigation (1)Skip section navigation (2)

FreeBSD Manual Pages

  
 
  

home | help
NAME
       nemesis-ospf -- OSPF Protocol (The Nemesis Project)

SYNOPSIS
       nemesis-ospf  [-vZ?]  [-p  TYPE]	 [-N  ADDR] [-i	SEC] [-l SEC] [-z LEN]
		    [-x	TYPE] [-B NUM] [-P FILE] [-L ADDR] [-u NUM] [-j	 ADDR]
		    [-k	 DATA]	[-y  TYPE]  [-w	 TOS]  [-m  METRIC]  [-f ADDR]
		    [-g	TAG] [-L ADDR] [-n MASK] [-h ADDR]

DESCRIPTION
       nemesis is designed to be a command line-based, portable	human IP stack
       for UNIX-like and Windows systems.  The suite is	broken down by	proto-
       col,  and  should  allow	 for useful scripting of injected packets from
       simple shell scripts.

       nemesis-ospf provides an	interface to craft and	inject	OSPF  packets,
       allowing	the the	user to	specify	any portion of an OSPF packet, as well
       as lower-lever IP packet	information.

OSPF Options
       -m METRIC
	       OSPF Metric

       -s NUM  OSPF Sequence Number

       -r ADDR
	       OSPF Advertising	Router Address

       -n MASK
	       OSPF Netmask

       -o OPT  OSPF Options, 1 byte value

       -R ADDR
	       OSPF Source Router ID

       -A ADDR
	       OSPF Area ID, e.g. 0.0.0.1, default 0.0.0.0

       -P FILE
	       Filename	 to  read  for raw (HEX) OSPF packet payload, appended
	       after selected packet type.  I.e., can be used with -pU to cre-
	       ate multi LSA Link State	Updates.

       -v      Display the injected packet in human readable form.  Use	 twice
	       to  see	a hexdump of the injected package with printable ASCII
	       characters on the right.	 Use three times for a hexdump without
	       decoded ASCII.

   OSPF	Packet Types
       -p TYPE

	       -pH   Hello
	       -pD   Database Description
	       -pR   Link State	Request
	       -pU   Link State	Update
	       -pUR  Router Links Advertisement
	       -pUN  Network Links Advertisement
	       -pUS  IP	Summary	Links Advertisement
	       -pUE  AS	External Link Advertisement

   OSPF	HELLO options
       -N ADDR
	       Neighbor	Router Address

       -i SEC  Dead Router Interval, seconds

       -P SEC  OSPF Interval, seconds

   OSPF	Database Description (DBD) options
       -z LEN  OSPF Maximum Datagram Length

       -x TYPE
	       OSPF DBD	Exchange Type

   OSPF	Link State Update (LSU)	options
       -B NUM  Number of Link State Advertisements (LSAs) to broadcast

       -P FILE
	       RAW payload file	with LSAs, in plain -pU	mode

   OSPF	Router LSA options
       -L -AR -ADDR
	       Link State ID: Originating Router ID (IP	address)

       -u NUM  Number of links,	default	1

       -j ADDR
	       Link ID

       -k DATA
	       Link data

       -y TYPE
	       Link type, default 1

       -w TOS  Link TOS	number,	default	0

       -m METRIC
	       Link TOS	(0) metric (2 bytes)

   OSPF	Autonomous System External LSA options
       -f ADDR
	       Forward Address

       -g TAG  External	route tag

   OSPF	Network	LSA options
       -L ADDR
	       Link State ID: Originating Router ID (IP	address)

       -n MASK
	       Netmask

       -h ADDR
	       Attached	Router (IP address)

   OSPF	Summary	LSA (IP	Network) options
       -L ADDR
	       Link State ID: Network route to summarize

       -n MASK
	       Netmask of route

       -c NUM  Cost of this route (4 bytes)

   Generic LSA options for LSR and LSU packets
       -G LSA_Age
	       Link State Advertisement	Age.

       -L ADDR
	       Link State ID, usually the Router ID of the originating router

       -r ADDR
	       Advertising Router Address

       -s NUM  Sequence	Number

       -n MASK
	       Multi-purpose netmask

IP OPTIONS
       -S ADDR
	       Specify the source address within the IP	header.

       -D ADDR
	       Specify the destination address within the IP header.  Defaults
	       to  the	link-local  multicast  address	224.0.0.5  (All	  OSPF
	       Routers).

       -F OPT  Specify the IP header fragmentation options:

		     -FD	don't fragment
		     -FM	more fragments
		     -FR	reserved flag
		     -F	offset

	       IP  fragmentation options can be	specified individually or com-
	       bined into a single argument to the -F command line  switch  by
	       separating  the options with commas (eg.	 -FD,M)	or spaces (eg.
	       -FM 223).  The IP fragmentation offset is a 13-bit  field  with
	       valid  values  from 0 to	8189.  Don't fragment (DF), more frag-
	       ments (MF) and the reserved flag	(RESERVED  or  RB)  are	 1-bit
	       fields.

	       NOTE: Under normal conditions, the reserved flag	is unset.

       -I ID   Specify the IP ID within	the IP header.

       -O FILE
	       This  will  cause  nemesis-ospf to use the specified IP options
	       file as the options when	building the IP	 header	 for  the  in-
	       jected  packet.	 IP  options  can be up	to 40 bytes in length.
	       The IP options file must	be created manually based upon the de-
	       sired options.  IP options can also be read from	stdin by spec-
	       ifying -O- instead.

       -S ADDR
	       Specify the source IP address within the	IP header.

       -t TOS  Specify the IP type of service  (TOS)  within  the  IP  header.
	       Valid type of service values:

		     2	 Minimize monetary cost
		     4	 Maximize reliability
		     8	 Maximize throughput
		     24	 Minimize delay

	       NOTE:  Under normal conditions, only one	type of	service	is set
	       within a	packet.	 To specify multiple types, specify the	sum of
	       the desired values as the type of service.

       -T TTL  Specify the IP time-to-live (TTL) in the	IP header.

DATA LINK OPTIONS
       -d IFNAME
	       Specify the name	(for UNIX-like systems)	 or  the  number  (for
	       Windows	systems)  of  the IFNAME to use	(eg. fxp0, eth0, hme0,
	       1).

       -H MAC  Specify the source MAC address, (XX:XX:XX:XX:XX:XX).

       -M MAC  Specify the destination MAC address, (XX:XX:XX:XX:XX:XX).

       -Z      Lists the available network interfaces by  number  for  use  in
	       link-layer injection.

	       NOTE: This feature is only relevant to Windows systems.

DIAGNOSTICS
       nemesis-ospf returns 0 on a successful exit, 1 if it exits on an	error.

SEE ALSO
       nemesis-arp(1),	nemesis-dhcp(1),  nemesis-dns(1), nemesis-ethernet(1),
       nemesis-icmp(1),	  nemesis-igmp(1),   nemesis-ip(1),    nemesis-rip(1),
       nemesis-tcp(1), nemesis-udp(1).

AUTHORS
       Mark Grimes <mark@stateful.net>,
       Jeff Nathan <jeff@snort.org> and
       Joachim Nilsson <troglobit@gmail.com>

BUGS
       Please report at	https://github.com/libnet/nemesis/issues

				 Dec 15, 2019		       nemesis-ospf(1)

Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=nemesis-ospf&sektion=1&manpath=FreeBSD+Ports+15.0.quarterly>

home | help