Path: blob/main/tests/sys/netinet6/frag6/frag6_07.py
39483 views
#!/usr/bin/env python1#-2# SPDX-License-Identifier: BSD-2-Clause3#4# Copyright (c) 2019 Netflix, Inc.5#6# Redistribution and use in source and binary forms, with or without7# modification, are permitted provided that the following conditions8# are met:9# 1. Redistributions of source code must retain the above copyright10# notice, this list of conditions and the following disclaimer.11# 2. Redistributions in binary form must reproduce the above copyright12# notice, this list of conditions and the following disclaimer in the13# documentation and/or other materials provided with the distribution.14#15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF25# SUCH DAMAGE.26#27#2829import argparse30import logging31logging.getLogger("scapy").setLevel(logging.CRITICAL)32import scapy.all as sp33import socket34import sys35from sniffer import Sniffer36from time import sleep3738def check_icmp6_error(args, packet):39ip6 = packet.getlayer(sp.IPv6)40if not ip6:41return False42oip6 = sp.IPv6(src=args.src[0], dst=args.to[0])43if ip6.dst != oip6.src:44return False45icmp6 = packet.getlayer(sp.ICMPv6ParamProblem)46if not icmp6:47return False48# ICMP6_PARAMPROB_HEADER 049if icmp6.code != 0:50return False51# Should we check the payload as well?52# We are running in a very isolated environment and nothing else53# should trigger an ICMPv6 Param Prob so leave it.54#icmp6.display()55return True5657def check_icmp6_error_2(args, packet):58ip6 = packet.getlayer(sp.IPv6)59if not ip6:60return False61oip6 = sp.IPv6(src=args.src[0], dst=args.to[0])62if ip6.dst != oip6.src:63return False64icmp6 = packet.getlayer(sp.ICMPv6TimeExceeded)65if not icmp6:66return False67# ICMP6_TIME_EXCEED_REASSEMBLY 168if icmp6.code != 1:69return False70# Should we check the payload as well?71# We are running in a very isolated environment and nothing else72# should trigger an ICMPv6 Time Exceeded / Frag reassembly so leave it.73#icmp6.display()74return True7576def main():77parser = argparse.ArgumentParser("frag6.py",78description="IPv6 fragementation test tool")79parser.add_argument('--sendif', nargs=1,80required=True,81help='The interface through which the packet will be sent')82parser.add_argument('--recvif', nargs=1,83required=True,84help='The interface on which to check for the packet')85parser.add_argument('--src', nargs=1,86required=True,87help='The source IP address')88parser.add_argument('--to', nargs=1,89required=True,90help='The destination IP address')91parser.add_argument('--debug',92required=False, action='store_true',93help='Enable test debugging')9495args = parser.parse_args()969798# Start sniffing on recvif99sniffer = Sniffer(args, check_icmp6_error)100sniffer2 = Sniffer(args, check_icmp6_error_2)101102103########################################################################104#105# Two fragments with payload and offset set to add up to >64k.106#107# Make a first fragment arrive and a second to explode everything.108#109# A: Reassembly failure.110# R: ICMPv6 param prob, param header.111# R: ICMPv6 timeout (1st frag, off=0)112#113data = "6" * 1280114ip6f01 = \115sp.Ether() / \116sp.IPv6(src=args.src[0], dst=args.to[0]) / \117sp.IPv6ExtHdrFragment(offset=0, m=1, id=7) / \118sp.UDP(dport=3456, sport=6543) / \119data120ip6f02 = \121sp.Ether() / \122sp.IPv6(src=args.src[0], dst=args.to[0]) / \123sp.IPv6ExtHdrFragment(offset=0x1fff, m=1, id=7) / \124sp.UDP(dport=3456, sport=6543) / \125data126if args.debug :127ip6f01.display()128ip6f02.display()129sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)130sp.sendp(ip6f02, iface=args.sendif[0], verbose=False)131132sleep(1.00)133sniffer.setEnd()134sniffer.join()135if not sniffer.foundCorrectPacket:136sys.exit(1)137138139# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # ##140#141# A fragment with payload and offset set to add up to >64k.142#143# Try again with the first packet to make things explode.144#145# A: Reassembly failure.146# R: ICMPv6 param prob, param header.147#148149# Start sniffing on recvif150sniffer = Sniffer(args, check_icmp6_error)151152ip6f01 = \153sp.Ether() / \154sp.IPv6(src=args.src[0], dst=args.to[0]) / \155sp.IPv6ExtHdrFragment(offset=0x1fff, m=1, id=0x7001) / \156sp.UDP(dport=3456, sport=6543) / \157data158if args.debug :159ip6f01.display()160sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)161162sleep(0.10)163sniffer.setEnd()164sniffer.join()165if not sniffer.foundCorrectPacket:166sys.exit(1)167168# Wait for expiry from first test run.169sleep(3)170sniffer2.setEnd()171sniffer2.join()172if not sniffer2.foundCorrectPacket:173sys.exit(1)174175sys.exit(0)176177if __name__ == '__main__':178main()179180181