1#!/usr/local/bin/python2.7 2# send 2 ping6 fragments with hop-by-hop extension header 3 4import os 5import threading 6from addr import * 7from scapy.all import * 8 9class Sniff1(threading.Thread): 10 filter = None 11 captured = None 12 packet = None 13 def run(self): 14 self.captured = sniff(iface=SRC_IF, filter=self.filter, 15 count=1, timeout=3) 16 if self.captured: 17 self.packet = self.captured[0] 18 19dstaddr=sys.argv[1] 20pid=os.getpid() & 0xffff 21payload="ABCDEFGHIJKLOMNO" 22packet=IPv6(src=SRC_OUT6, dst=dstaddr)/ICMPv6EchoRequest(id=pid, data=payload) 23frag0=IPv6ExtHdrFragment(nh=58, id=pid, m=1)/str(packet)[40:56] 24frag1=IPv6ExtHdrFragment(nh=58, id=pid, offset=2)/str(packet)[56:64] 25pkt0=IPv6(src=SRC_OUT6, dst=dstaddr)/IPv6ExtHdrHopByHop()/frag0 26pkt1=IPv6(src=SRC_OUT6, dst=dstaddr)/IPv6ExtHdrHopByHop()/frag1 27eth=[] 28eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt0) 29eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt1) 30 31sniffer = Sniff1(); 32sniffer.filter = "ip6 and src %s and dst %s and icmp6" % (dstaddr, SRC_OUT6) 33sniffer.start() 34sendp(eth, iface=SRC_IF) 35sniffer.join(timeout=5) 36a = sniffer.packet 37 38if a and a.type == ETH_P_IPV6 and \ 39 ipv6nh[a.payload.nh] == 'ICMPv6' and \ 40 icmp6types[a.payload.payload.type] == 'Echo Reply': 41 id=a.payload.payload.id 42 print "id=%#x" % (id) 43 if id != pid: 44 print "WRONG ECHO REPLY ID" 45 exit(2) 46 data=a.payload.payload.data 47 print "payload=%s" % (data) 48 if data == payload: 49 exit(0) 50 print "PAYLOAD!=%s" % (payload) 51 exit(1) 52print "NO ECHO REPLY" 53exit(2) 54