summaryrefslogtreecommitdiffstats
path: root/regress/sys/net/pf_fragment/udp_cksum.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Switch to scapy with python 3.bluhm2020-12-251-13/+13
|
* Fix typo in variable name.bluhm2017-01-241-1/+1
|
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-2/+5
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
| | | | | be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
* Extend the pf forward and fragment tests with a second challengebluhm2015-08-241-1/+1
| | | | | | | | | for path MTU discovery. The router behind the pf machine has MTU 1300. The ICMP packet generated by the router matches the pf state and is NATed correctly. Additionally the pf machine itself has an interface MTU 1400. So when pf is sending a packet is has to generate a correct "fragmentation needed" or "packet too big" ICMP response. This is done with pf route-to and reply-to.
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
| | | | makes the fragment tests work on FreeBSD. From Ilya Bakulin.
* Kill trailing whitespaces.bluhm2012-07-101-1/+1
|
* Add a test suite to route ip fragments through a box running pf.bluhm2011-09-191-0/+40
You have to setup four machines manually as described in the makefile. The test uses scapy and python to send ping echo request or udp echo packets along the routers. It analyzes the returned ping echo reply or udp packets or the icmp error packets.