History log of /openbsd-src/regress/sys/net/pf_forward/ping6_mtu.py (Results 1 – 12 of 12)
Revision Date Author Comments
# 85c0d959 24-Dec-2020 bluhm <bluhm@openbsd.org>

Switch to scapy with python 3.


# 9ae5678b 18-Jan-2017 bluhm <bluhm@openbsd.org>

Do not use privileged or NFS source ports for UDP packets as inetd
ignores such packets. This should avoid some sporadic failures.
While there, use variable names consistently in all tests.


# 1ca2c44d 20-Oct-2016 bluhm <bluhm@openbsd.org>

During sniffing filter strictly on icmp6 "packet too big" to avoid
that "neighbor discovery" confuses the test.


# 9a7ee091 20-Oct-2016 bluhm <bluhm@openbsd.org>

By removing all the sleeps I created a race in the pf tests. The
packet was sent and its reply received before the sniffer was up
and running. So sleep a second after starting the sniffer thread
bu

By removing all the sleeps I created a race in the pf tests. The
packet was sent and its reply received before the sniffer was up
and running. So sleep a second after starting the sniffer thread
but before sending the packet. With pf_forward 0m51.54s, pf_fragment
1m33.59s, pf_state 0m03.64s the test are still faster than with
forking.

show more ...


# 2dff962a 20-Oct-2016 bluhm <bluhm@openbsd.org>

Replace fork() and sleep() with a Python thread for sniffing packets.
This reduces test execution time from 1m20.34s to 0m37.32s.


# 7553dc43 22-May-2016 bluhm <bluhm@openbsd.org>

Fix tests: Restrict getpid() to lower 16 bit so that it can still
be used as packet id. Now scapy calls nexthopmtu with this name
explicitly in icmp structure.


# a2cb595e 11-Sep-2015 bluhm <bluhm@openbsd.org>

fter fixing poll(2) semantics in dynamic TCP buffer size update,
making netcat non-blocking and fixing ip6_forward() ICMP6 checksum,
this test can be made more aggressive. Delete the path MTU route

fter fixing poll(2) semantics in dynamic TCP buffer size update,
making netcat non-blocking and fixing ip6_forward() ICMP6 checksum,
this test can be made more aggressive. Delete the path MTU route
before sending TCP streams through the pf firewall. This checks
that PMTU discovery works with outgoing interface MTU and router
MTU.
Test IPv4 and IPv6 protocols ICMP echo, UDP, TCP with pf nat-to,
rdr-to, af-to, route-to, reply-to. Some af-to cases seem to be
broken.

show more ...


# 5004ddd2 24-Aug-2015 bluhm <bluhm@openbsd.org>

Extend the pf forward and fragment tests with a second challenge
for path MTU discovery. The router behind the pf machine has MTU
1300. The ICMP packet generated by the router matches the pf state

Extend the pf forward and fragment tests with a second challenge
for path MTU discovery. The router behind the pf machine has MTU
1300. The ICMP packet generated by the router matches the pf state
and is NATed correctly. Additionally the pf machine itself has an
interface MTU 1400. So when pf is sending a packet is has to
generate a correct "fragmentation needed" or "packet too big" ICMP
response. This is done with pf route-to and reply-to.

show more ...


# 9c70e3bf 19-Dec-2014 bluhm <bluhm@openbsd.org>

Use a simpler expression to check the ether type in scapy. This
makes the fragment tests work on FreeBSD. From Ilya Bakulin.


# 98a41332 10-Jul-2012 bluhm <bluhm@openbsd.org>

Add a workaround that scapy srp1() cannot detect ICMP6 error replies
with broken checksums in the quoted IPv6 packet. Fork a process
to sendp() the packet in the background and sniff() the reply
man

Add a workaround that scapy srp1() cannot detect ICMP6 error replies
with broken checksums in the quoted IPv6 packet. Fork a process
to sendp() the packet in the background and sniff() the reply
manually in the foreground.

show more ...


# 621b42f7 10-Jul-2012 bluhm <bluhm@openbsd.org>

Add a subtest to the MTU ping that checks wether the ip length of
the original packet and the icmp quoted packet are the same.


# 0d0cafa0 10-Jul-2012 bluhm <bluhm@openbsd.org>

Add a test suite to route ip packets through a box running pf. You
have to setup four machines manually as described in the makefile.
The test uses netcat and scapy to send ping or udp echo packets

Add a test suite to route ip packets through a box running pf. You
have to setup four machines manually as described in the makefile.
The test uses netcat and scapy to send ping or udp echo packets or
tcp streams along the routers. It analyzes the returned reply or
icmp error packets. It tests the forward and net/rdr and net64
paths.

show more ...