.Dd July 31, 2025 .Dt FJORKER 8 .Os .Sh NAME .Nm fjorker .Nd minimalistic ICMP echo request/reply implementation .Sh SYNOPSIS .Nm .Ar host .Nm .Fl -version .Sh DESCRIPTION The .Nm utility is a secure-by-default ICMP echo request/reply implementation that follows OpenBSD's philosophy of minimalism and security. .Pp Unlike traditional ping implementations, .Nm minimizes information disclosure about the source host, uses random identifiers instead of process IDs, validates sequence numbers in responses, and has minimal code base for better security. .Sh OPTIONS .Bl -tag -width Ds .It Fl -version Display version information and exit. .El .Sh EXIT STATUS .Ex -std .Sh EXAMPLES .Bl -tag -width Ds .It Nm Ar 1.1.1.1 Ping 1.1.1.1 using ICMP echo requests .It Nm Fl -version Display version information .El .Sh SECURITY CONSIDERATIONS .Nm requires root privileges to create raw sockets for ICMP communication. However, the --version option can be used without elevated privileges. .Pp The program uses random identifiers instead of process IDs to avoid leaking system information. It also validates sequence numbers in responses to detect potential ICMP packet manipulation. .Sh SEE ALSO .Xr ping 8 .Sh STANDARDS The .Nm utility implements ICMP echo request/reply as described in RFC 792. .Sh HISTORY The .Nm utility first appeared in 2025.