Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | ESP path MTU discovery over IPv6 tunnel has been fixed. Add test. | 2021-02-01 | 1 | -6/+76 | |
| | |||||
* | Test path MTU discovery with IPv6 TCP packets tunneled in IPv4 ESP. | 2021-01-20 | 3 | -17/+75 | |
| | |||||
* | py3-scapy is now scapy | 2020-12-30 | 3 | -9/+9 | |
| | | | | OK bluhm sthen | ||||
* | getifaddrs() can return entries where ifa_addr is NULL. Check for this | 2020-12-30 | 1 | -2/+3 | |
| | | | | | before accessing anything in ifa_addr. ok claudio@ | ||||
* | Missed a python2.7, scapy 2, copyright bump in previous scapy 3 commits. | 2020-12-26 | 1 | -13/+13 | |
| | |||||
* | Wrap long lines. | 2020-12-26 | 1 | -2/+2 | |
| | |||||
* | Send fragment that reaches beyond max packet length. pf ignores | 2020-12-25 | 2 | -1/+60 | |
| | | | | it, but stack somehow puts it into the fragment queue. | ||||
* | Switch to scapy with python 3. | 2020-12-25 | 6 | -73/+72 | |
| | |||||
* | Switch to scapy with python 3. | 2020-12-25 | 24 | -263/+263 | |
| | |||||
* | Switch to scapy with python 3. | 2020-12-25 | 14 | -101/+100 | |
| | |||||
* | Test that IPv4 path MTU discovery works over IPsec in tunnel mode. | 2020-12-21 | 2 | -3/+53 | |
| | |||||
* | Use regress framework for setup and shorten target names. | 2020-12-20 | 1 | -41/+47 | |
| | |||||
* | Link broadcast_bind, carp, in_pcbbind, sendsrcaddr regress to build. | 2020-12-17 | 1 | -2/+10 | |
| | |||||
* | Use ${SUDO} or skip test if not root. | 2020-12-17 | 1 | -3/+3 | |
| | |||||
* | Remove echo headlines. | 2020-12-17 | 5 | -81/+5 | |
| | |||||
* | Do not create files as dependency of .BEGIN rule. Noticed by | 2020-01-15 | 2 | -7/+7 | |
| | | | | deraadt@ with make obj in regress. | ||||
* | Rework when tests have to be skipped due to insufficient configuration | 2020-01-08 | 1 | -1/+7 | |
| | | | | of the regress machine. | ||||
* | The IPsec policy check for IPComp bundles has been fixed in the | 2019-12-20 | 1 | -11/+11 | |
| | | | | | kernel. So we can make the test config stricter. Change the type of ipcomp bundle flows from use to dontacq. | ||||
* | Make checksum comparison more robust. 0xffff is the same as 0. | 2019-09-19 | 1 | -1/+1 | |
| | |||||
* | Ignore missing pseudo terminal for ssh when called from cron job. | 2019-09-05 | 1 | -5/+5 | |
| | |||||
* | Name environment variables consistently. | 2019-09-05 | 4 | -21/+21 | |
| | |||||
* | Minimize differences between IPv4 and IPv6 multicast tests. | 2019-09-05 | 4 | -61/+98 | |
| | |||||
* | Create remote log files in obj directory. | 2019-09-03 | 1 | -15/+15 | |
| | |||||
* | Link multicast tests to regress build. | 2019-09-02 | 1 | -2/+2 | |
| | |||||
* | Test multicast sender, receiver, router. Minimal mcroute implmentation | 2019-09-02 | 5 | -0/+834 | |
| | | | | | | does not care about IGMP, it simply adds static multicast routes. Mutlicast routing needs at least two test machines. Otherwise only send and receive on localhost is tested. | ||||
* | Simplify the detection for installed python and scapy. Refactor | 2019-05-10 | 3 | -100/+79 | |
| | | | | | these tests to make them similar. Use the setup and cleanup variables. | ||||
* | Always try to build packet reflector on remote machine. It may be | 2018-09-28 | 1 | -1/+2 | |
| | | | | missing after reinstall. | ||||
* | Send many small fragments that exceed the pf reassembly queue limit. | 2018-09-10 | 2 | -1/+77 | |
| | |||||
* | Fragment one large 64k IP ping packet into 155 fragments, each with | 2018-09-07 | 1 | -0/+62 | |
| | | | | | 424 bytes payload. Send them in random order. Expect a fragment with matching echo reply header. | ||||
* | Use correct environment variable to access remote machine. | 2018-08-30 | 1 | -3/+3 | |
| | |||||
* | Replace fork with sniffer thread in Python. Clear the BPF list | 2018-07-30 | 5 | -40/+129 | |
| | | | | | before sniffing, Scapy 2.4.0 remembers old packets that confuse the test. | ||||
* | zap empty line | 2018-07-08 | 1 | -2/+1 | |
| | |||||
* | hook up recvmsg | 2018-07-04 | 1 | -2/+2 | |
| | |||||
* | Add regress covering the recently fixed mbuf double free in rip_usrreq(). | 2018-07-04 | 2 | -0/+97 | |
| | |||||
* | Make sure that the inetd echo and nonxt protocol reflectors are | 2018-05-28 | 1 | -2/+9 | |
| | | | | running on the remote machines. | ||||
* | Activate IPv6 no next header protocol over IPsec test. Run the | 2018-05-21 | 4 | -28/+112 | |
| | | | | | | protocol 59 reflector as daemon on the remote machine like an echo service. It is configured during setup creation and started by an rc.d script. | ||||
* | Install inetd.conf files and start the daemon on remote machines | 2018-05-19 | 1 | -17/+53 | |
| | | | | | | during make create-setup. This makes it easier to configure all machines correctly for the test run. suggested by mpi@ | ||||
* | Additionally send no next header protocol 59 packets through the | 2018-05-19 | 3 | -14/+285 | |
| | | | | | | IPsec test. They consist solely of an IPv6 header chain and trigger edge cases. Deactivate for now until the raw IP reflector can be build and started reliably on remote machine. | ||||
* | Typo fix, ok bluhm@ | 2018-05-15 | 1 | -4/+4 | |
| | |||||
* | Disable counting TCP packets in the test as it does not work reliably. | 2018-04-12 | 1 | -23/+4 | |
| | | | | The sequence of packets and combination of flags depends on timing. | ||||
* | Clean up pf rules and states on remote machine so that they do not | 2017-09-15 | 2 | -4/+13 | |
| | | | | interfere with later tests. | ||||
* | Link regress/sys/netinet/frag to build. Get IPv4 and IPv6 fragment | 2017-09-07 | 19 | -76/+188 | |
| | | | | tests into common shape. Add some missing test cases. | ||||
* | Copy IPv6 fragment test cases to IPv4 and adapt to the different | 2017-09-07 | 21 | -0/+1195 | |
| | | | | | | behavior. All tests are run once with pf fragment reassembly and once with pf disabled and IP input reassembly. Three sub tests are currently disabled as the IP stack behaves differently than pf. | ||||
* | Rewrite regress sendsrcaddr so that is uses UDP sockets on localhost, | 2017-07-11 | 2 | -319/+232 | |
| | | | | does not try to connect to google and avoids BPF programming. | ||||
* | Remove useless make depend targets. | 2017-07-07 | 3 | -9/+3 | |
| | |||||
* | Initialize the return value and do not use garbage as exit status. | 2017-07-06 | 1 | -1/+4 | |
| | | | | Then the test passes. | ||||
* | Now that pf looks behind IPv4 authentication headers, disable the | 2017-05-28 | 1 | -2/+5 | |
| | | | | | transport mode tests that fail because of floating states. At least IPv4 and IPv6 are in sync now. | ||||
* | Do not use reject routes as they prevent path MTU discovery. | 2017-05-27 | 1 | -14/+30 | |
| | | | | | Drop possible old TCP connections from previous test runs. Adapt regex that checks tcpdump pflog0, output has been fixed. | ||||
* | Try to work around a race in the daily test run. Before killing | 2017-05-15 | 1 | -1/+2 | |
| | | | | tcpdump, sleep a while to collect all data. | ||||
* | Run all IPsec tests with a pf rule that logs everything on the enc0 | 2017-05-12 | 3 | -15/+69 | |
| | | | | | | interface. Use tcpdump to write the pflog0 output into a file. Then grep can verify that all encrypted packets have been processed by pf. |