#
85c0d959 |
| 24-Dec-2020 |
bluhm <bluhm@openbsd.org> |
Switch to scapy with python 3.
|
#
9ae5678b |
| 18-Jan-2017 |
bluhm <bluhm@openbsd.org> |
Do not use privileged or NFS source ports for UDP packets as inetd ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
|
#
1ca2c44d |
| 20-Oct-2016 |
bluhm <bluhm@openbsd.org> |
During sniffing filter strictly on icmp6 "packet too big" to avoid that "neighbor discovery" confuses the test.
|
#
7553dc43 |
| 22-May-2016 |
bluhm <bluhm@openbsd.org> |
Fix tests: Restrict getpid() to lower 16 bit so that it can still be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
|
#
a2cb595e |
| 11-Sep-2015 |
bluhm <bluhm@openbsd.org> |
fter fixing poll(2) semantics in dynamic TCP buffer size update, making netcat non-blocking and fixing ip6_forward() ICMP6 checksum, this test can be made more aggressive. Delete the path MTU route
fter fixing poll(2) semantics in dynamic TCP buffer size update, making netcat non-blocking and fixing ip6_forward() ICMP6 checksum, this test can be made more aggressive. Delete the path MTU route before sending TCP streams through the pf firewall. This checks that PMTU discovery works with outgoing interface MTU and router MTU. Test IPv4 and IPv6 protocols ICMP echo, UDP, TCP with pf nat-to, rdr-to, af-to, route-to, reply-to. Some af-to cases seem to be broken.
show more ...
|
#
5004ddd2 |
| 24-Aug-2015 |
bluhm <bluhm@openbsd.org> |
Extend the pf forward and fragment tests with a second challenge for path MTU discovery. The router behind the pf machine has MTU 1300. The ICMP packet generated by the router matches the pf state
Extend the pf forward and fragment tests with a second challenge for path MTU discovery. The router behind the pf machine has MTU 1300. The ICMP packet generated by the router matches the pf state and is NATed correctly. Additionally the pf machine itself has an interface MTU 1400. So when pf is sending a packet is has to generate a correct "fragmentation needed" or "packet too big" ICMP response. This is done with pf route-to and reply-to.
show more ...
|
#
621b42f7 |
| 10-Jul-2012 |
bluhm <bluhm@openbsd.org> |
Add a subtest to the MTU ping that checks wether the ip length of the original packet and the icmp quoted packet are the same.
|
#
0d0cafa0 |
| 10-Jul-2012 |
bluhm <bluhm@openbsd.org> |
Add a test suite to route ip packets through a box running pf. You have to setup four machines manually as described in the makefile. The test uses netcat and scapy to send ping or udp echo packets
Add a test suite to route ip packets through a box running pf. You have to setup four machines manually as described in the makefile. The test uses netcat and scapy to send ping or udp echo packets or tcp streams along the routers. It analyzes the returned reply or icmp error packets. It tests the forward and net/rdr and net64 paths.
show more ...
|