History log of /openbsd-src/regress/sys/net/pf_forward/ping_mtu.py (Results 1 – 8 of 8)
Revision Date Author Comments
# 85c0d959 24-Dec-2020 bluhm <bluhm@openbsd.org>

Switch to scapy with python 3.


# 9ae5678b 18-Jan-2017 bluhm <bluhm@openbsd.org>

Do not use privileged or NFS source ports for UDP packets as inetd
ignores such packets. This should avoid some sporadic failures.
While there, use variable names consistently in all tests.


# 1ca2c44d 20-Oct-2016 bluhm <bluhm@openbsd.org>

During sniffing filter strictly on icmp6 "packet too big" to avoid
that "neighbor discovery" confuses the test.


# 7553dc43 22-May-2016 bluhm <bluhm@openbsd.org>

Fix tests: Restrict getpid() to lower 16 bit so that it can still
be used as packet id. Now scapy calls nexthopmtu with this name
explicitly in icmp structure.


# a2cb595e 11-Sep-2015 bluhm <bluhm@openbsd.org>

fter fixing poll(2) semantics in dynamic TCP buffer size update,
making netcat non-blocking and fixing ip6_forward() ICMP6 checksum,
this test can be made more aggressive. Delete the path MTU route

fter fixing poll(2) semantics in dynamic TCP buffer size update,
making netcat non-blocking and fixing ip6_forward() ICMP6 checksum,
this test can be made more aggressive. Delete the path MTU route
before sending TCP streams through the pf firewall. This checks
that PMTU discovery works with outgoing interface MTU and router
MTU.
Test IPv4 and IPv6 protocols ICMP echo, UDP, TCP with pf nat-to,
rdr-to, af-to, route-to, reply-to. Some af-to cases seem to be
broken.

show more ...


# 5004ddd2 24-Aug-2015 bluhm <bluhm@openbsd.org>

Extend the pf forward and fragment tests with a second challenge
for path MTU discovery. The router behind the pf machine has MTU
1300. The ICMP packet generated by the router matches the pf state

Extend the pf forward and fragment tests with a second challenge
for path MTU discovery. The router behind the pf machine has MTU
1300. The ICMP packet generated by the router matches the pf state
and is NATed correctly. Additionally the pf machine itself has an
interface MTU 1400. So when pf is sending a packet is has to
generate a correct "fragmentation needed" or "packet too big" ICMP
response. This is done with pf route-to and reply-to.

show more ...


# 621b42f7 10-Jul-2012 bluhm <bluhm@openbsd.org>

Add a subtest to the MTU ping that checks wether the ip length of
the original packet and the icmp quoted packet are the same.


# 0d0cafa0 10-Jul-2012 bluhm <bluhm@openbsd.org>

Add a test suite to route ip packets through a box running pf. You
have to setup four machines manually as described in the makefile.
The test uses netcat and scapy to send ping or udp echo packets

Add a test suite to route ip packets through a box running pf. You
have to setup four machines manually as described in the makefile.
The test uses netcat and scapy to send ping or udp echo packets or
tcp streams along the routers. It analyzes the returned reply or
icmp error packets. It tests the forward and net/rdr and net64
paths.

show more ...