diff options
author | 2017-11-07 22:06:17 +0000 | |
---|---|---|
committer | 2017-11-07 22:06:17 +0000 | |
commit | 15b894fd5d7e4b3899078a28a951fd9e75f837b2 (patch) | |
tree | a56eeae32420eb11f94205da329f9e8d6efb0a87 /regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py | |
parent | Prevent a potential stack buffer overrun when a urtwn(4) device (diff) | |
download | wireguard-openbsd-15b894fd5d7e4b3899078a28a951fd9e75f837b2.tar.xz wireguard-openbsd-15b894fd5d7e4b3899078a28a951fd9e75f837b2.zip |
Test more variations of TCP packets in the scapy splicing tests.
Delay connect and SYN+ACK to splice data into a connecting socket.
Diffstat (limited to 'regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py')
-rw-r--r-- | regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py | 106 |
1 files changed, 106 insertions, 0 deletions
diff --git a/regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py b/regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py new file mode 100644 index 00000000000..28d2423ef44 --- /dev/null +++ b/regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py @@ -0,0 +1,106 @@ +#!/usr/local/bin/python2.7 +# send payload from client to relay before connecting to server + +import os +import sys +import threading +from addr import * +from scapy.all import * + +client=os.getpid() & 0xffff +relay=int(sys.argv[2]) +server=int(sys.argv[1]) + +class Sniff1(threading.Thread): + filter = None + captured = None + packet = None + def run(self): + self.captured = sniff(iface=LOCAL_IF, filter=self.filter, + count=1, timeout=5) + if self.captured: + self.packet = self.captured[0] + +ip=IP(src=FAKE_NET_ADDR, dst=REMOTE_ADDR) + +print "Send SYN packet, receive SYN+ACK" +syn=TCP(sport=client, dport=relay, seq=0, flags='S', window=(2**16)-1) +synack=sr1(ip/syn, iface=LOCAL_IF, timeout=5) + +if synack is None: + print "ERROR: No matching SYN+ACK packet received" + exit(1) + +print "Send ACK packet to finish handshake" +ack=TCP(sport=synack.dport, dport=synack.sport, + seq=1, ack=synack.seq+1, flags='A') +send(ip/ack, iface=LOCAL_IF) + +print "Expect spliced SYN" +sniffer = Sniff1(); +sniffer.filter = "src %s and dst %s and tcp port %u " \ + "and tcp[tcpflags] = tcp-syn" % (ip.dst, ip.src, server) +sniffer.start() +time.sleep(1) + +print "Send 10 bytes payload" +data="0123456789" +payload=TCP(sport=synack.dport, dport=synack.sport, + seq=1, ack=synack.seq+1, flags='APU')/data +payload_ack=sr1(ip/payload, iface=LOCAL_IF) + +if payload_ack is None: + print "ERROR: No payload ACK packet received" + exit(1) +if payload_ack.ack != len(data)+1: + print "ERROR: Expected ack %d, got %d in payload ACK" % \ + (len(data)+1, payload_ack.ack) + exit(1) + +sniffer.join(timeout=7) +spliced_syn = sniffer.packet + +if spliced_syn is None: + print "ERROR: No spliced SYN packet received" + exit(1) + +print "Expect spliced payload" +sniffer = Sniff1(); +sniffer.filter = "src %s and dst %s and tcp port %u " \ + "and tcp[tcpflags] = tcp-ack|tcp-push" % (ip.dst, ip.src, server) +sniffer.start() +time.sleep(1) + +print "Send spliced SYN+ACK packet to finish handshake" +spliced_synack=TCP(sport=spliced_syn.dport, dport=spliced_syn.sport, + seq=0, ack=spliced_syn.seq+1, flags='SA') +spliced_ack=sr1(ip/spliced_synack, iface=LOCAL_IF) + +if spliced_ack is None: + print "ERROR: No spliced ACK packet received" + exit(1) + +sniffer.join(timeout=7) +spliced_payload = sniffer.packet + +if spliced_payload is None: + print "ERROR: No spliced payload packet received" + exit(1) +if spliced_payload.seq != spliced_ack.seq: + print "ERROR: Expected seq %d, got %d in spliced payload" % \ + (spliced_ack.seq, spliced_payload.seq) + exit(1) +if spliced_payload.len-20-20 != len(data): + print "ERROR: Expected len %d, got %d in spliced payload" % \ + (len(data), spliced_payload.len-20-20) + exit(1) + +print "Kill connections with RST" +spliced_rst=TCP(sport=spliced_ack.dport, dport=spliced_ack.sport, + seq=1, ack=spliced_ack.seq, flags='RA') +send(ip/spliced_rst, iface=LOCAL_IF) +rst=TCP(sport=synack.dport, dport=synack.sport, + seq=payload_ack.ack, ack=synack.seq+1, flags='RA') +send(ip/rst, iface=LOCAL_IF) + +exit(0) |