diff options
author | Denis Ovsienko <denis@ovsienko.info> | 2023-03-12 20:11:15 +0000 |
---|---|---|
committer | Denis Ovsienko <denis@ovsienko.info> | 2023-04-02 13:43:16 +0100 |
commit | 65773cd6ab3ab6f8163c260dfed18b1f97f7c57c (patch) | |
tree | cac82656c97d6989bdc738bac63be55de1ccae1c | |
parent | 0c48f66ac7ca43a1279fb7a2a7b2c23e210507d2 (diff) | |
download | tcpdump-65773cd6ab3ab6f8163c260dfed18b1f97f7c57c.tar.gz |
man: Spell TCP header flags names. [skip ci]
In the prose use the names from respective registry [1], which says:
* "PSH", not "PUSH",
* "CWR", not "ECN CWR", and
* "ECE", not "ECN-Echo".
This does not resolve all known inconsistencies related to TCP flags,
but at least makes the problem smaller.
1: https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml
(cherry picked from commit eb2f8839ac53daa4d80fad2809be55d997678397)
-rw-r--r-- | tcpdump.1.in | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/tcpdump.1.in b/tcpdump.1.in index 652b3e4a..87e0fbb8 100644 --- a/tcpdump.1.in +++ b/tcpdump.1.in @@ -20,7 +20,7 @@ .\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF .\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. .\" -.TH TCPDUMP 1 "30 July 2022" +.TH TCPDUMP 1 "12 March 2023" .SH NAME tcpdump \- dump traffic on a network .SH SYNOPSIS @@ -1299,7 +1299,7 @@ The general format of a TCP protocol line is: \fISrc\fP and \fIdst\fP are the source and destination IP addresses and ports. \fITcpflags\fP are some combination of S (SYN), -F (FIN), P (PUSH), R (RST), U (URG), W (ECN CWR), E (ECN-Echo) or +F (FIN), P (PSH), R (RST), U (URG), W (CWR), E (ECE) or `.' (ACK), or `none' if no flags are set. \fIData-seqno\fP describes the portion of sequence space covered by the data in this packet (see example below). @@ -1366,7 +1366,7 @@ feature, causing the original sequence numbers to be output. .LP On the 6th line, rtsg sends csam 19 bytes of data (bytes 2 through 20 in the rtsg \(-> csam side of the conversation). -The PUSH flag is set in the packet. +The PSH flag is set in the packet. On the 7th line, csam says it's received data sent by rtsg up to but not including byte 21. Most of this data is apparently sitting in the |