summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet/pmtu/udp_echo6.py
blob: 2505e33783cc677a6efbb0d1d85afcd4733596d8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
#!/usr/local/bin/python3

import os
import threading
import string
import random
from addr import *
from scapy.all import *

class Sniff(threading.Thread):
	filter = None
	captured = None
	packet = None
	def __init__(self):
		# clear packets buffered by scapy bpf
		sniff(iface=LOCAL_IF, timeout=1)
		super(Sniff, self).__init__()
	def run(self):
		self.captured = sniff(iface=LOCAL_IF, filter=self.filter,
		    timeout=3)
		if self.captured:
			self.packet = self.captured[0]

e=Ether(src=LOCAL_MAC, dst=REMOTE_MAC)
ip6=IPv6(src=FAKE_NET_ADDR6, dst=REMOTE_ADDR6)
uport=os.getpid() & 0xffff
# inetd ignores UDP packets from privileged port or nfs
if uport < 1024 or uport == 2049:
	uport+=1024

print("Send UDP packet with 1400 octets payload, receive echo.")
data=''.join(random.choice(string.ascii_uppercase + string.ascii_lowercase +
    string.digits) for _ in range(1400))
udp=UDP(sport=uport, dport='echo')/data
echo=srp1(e/ip6/udp, iface=LOCAL_IF, timeout=5)

if echo is None:
	print("ERROR: No UDP answer from echo server received.")
	exit(1)

print("Send ICMP6 packet too big packet with MTU 1300.")
icmp6=ICMPv6PacketTooBig(mtu=1300)/echo.payload
sendp(e/IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/icmp6, iface=LOCAL_IF)

print("Clear route cache at echo socket by sending from different address.")
sendp(e/IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/udp, iface=LOCAL_IF)

# srp1 cannot be used, fragment answer will not match on outgoing UDP packet
sniffer = Sniff()
sniffer.filter = \
    "ip6 and src "+ip6.dst+" and dst "+ip6.src+" and proto ipv6-frag"
sniffer.start()
time.sleep(1)

print("Send UDP packet with 1400 octets payload.")
sendp(e/ip6/udp, iface=LOCAL_IF)

print("Path MTU discovery will send UDP fragment with maximum length 1300.")
sniffer.join(timeout=5)

for a in sniffer.captured:
	fh=a.payload.payload
	if fh.offset != 0 or fh.nh != (ip6/udp).nh:
		continue
	uh=fh.payload
	if uh.sport != udp.dport or uh.dport != udp.sport:
		continue
	frag=a
	break
else:
	print("ERROR: No matching IPv6 fragment UDP answer found.")
	exit(1)

print("UDP echo has IPv6 and UDP header, so expected payload len is 1448.")
elen = echo.plen + len(IPv6())
print("elen=%d" % elen)
if elen != 1448:
	print("ERROR: UDP echo payload len is %d, expected 1448." % elen)
	exit(1)

print("Fragments contain multiple of 8 octets, so expected len is 1296.")
flen = frag.plen + len(IPv6())
print("flen=%d" % flen)
if flen != 1296:
	print("ERROR: UDP fragment len is %d, expected 1296." % flen)
	exit(1)

exit(0)