Question

The Hans tool can be used to bypass firewalls by tunneling an IP connection over this protocol. This protocol’s “Fragmentation needed” messages are used to implement Path MTU Discovery, which is a big reason why networks shouldn’t filter out this protocol. In his “Harder Drive” project, Tom7 made a hard drive entirely contained in (15[1])this protocol, along with a hard drive made from NES Tetris games and another from used COVID tests. The “Smurf” (15[1])DDoS attack involves tricking a network into flooding a machine (-5[1])with this protocol. This protocol’s Time Exceeded and Destination Unreachable messages are used by (*) traceroute to map (-5[1])router hops. Unexpectedly large data is sent through this protocol in an attack named for a certain kind of packet “of death”. For 10 points, what protocol’s Echo Request and Echo Reply messages are used by a ubiquitous networking utility to check if a host is reachable? ■END■ (10[1]0[1])

ANSWER: ICMP [accept answers describing the ping protocol; accept Internet Control Message Protocol]
<AW>
= Average correct buzz position
Conv. %Power %Average Buzz
75%50%91.33

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Vishwa ShanmugamMacro EditorsEdwardian Manifestation of All Colonial Sins5315
Adam Finescreaming into the public static void main(String[] args)a neural-net processor; a thinking machine7315
Dan Niplaying emacs while my parents are arguingDianetics for Diabetics83-5
Ashvin SrivatsaEight Megabytes And Constantly SwappingWe Bought a Complexity Zoo Story100-5
Swapnil GargWe Bought a Complexity Zoo StoryEight Megabytes And Constantly Swapping1480
Jaimie CarlsonDianetics for Diabeticsplaying emacs while my parents are arguing14810