summaryrefslogtreecommitdiffstats
path: root/regress/sys/net/pf_fragment/ping6_mtu_1300.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Switch to scapy with python 3.bluhm2020-12-251-6/+6
|
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-2/+2
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* During sniffing filter strictly on icmp6 "packet too big" to avoidbluhm2016-10-201-1/+3
| | | | that "neighbor discovery" confuses the test.
* By removing all the sleeps I created a race in the pf tests. Thebluhm2016-10-201-0/+1
| | | | | | | | packet was sent and its reply received before the sniffer was up and running. So sleep a second after starting the sniffer thread but before sending the packet. With pf_forward 0m51.54s, pf_fragment 1m33.59s, pf_state 0m03.64s the test are still faster than with forking.
* Replace fork() and sleep() with a Python thread for sniffing packets.bluhm2016-10-201-11/+21
| | | | This reduces test execution time from 2m21.95s to 1m09.80s.
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
| | | | | be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
* Extend the pf forward and fragment tests with a second challengebluhm2015-08-241-3/+4
| | | | | | | | | for path MTU discovery. The router behind the pf machine has MTU 1300. The ICMP packet generated by the router matches the pf state and is NATed correctly. Additionally the pf machine itself has an interface MTU 1400. So when pf is sending a packet is has to generate a correct "fragmentation needed" or "packet too big" ICMP response. This is done with pf route-to and reply-to.
* Enable path MTU test with ping for IPv6. Scapy srp1() does notbluhm2015-08-241-2/+16
| | | | | | accept inner IPv6 packets in ICMP6 with bad checksum created by pf. Use same workaround as in pf_forward tests and fork a process for sniffing.
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
| | | | makes the fragment tests work on FreeBSD. From Ilya Bakulin.
* Kill trailing whitespaces.bluhm2012-07-101-1/+1
|
* Add a test suite to route ip fragments through a box running pf.bluhm2011-09-191-0/+23
You have to setup four machines manually as described in the makefile. The test uses scapy and python to send ping echo request or udp echo packets along the routers. It analyzes the returned ping echo reply or udp packets or the icmp error packets.