Path: blob/main/tests/sys/netinet6/frag6/frag6_16.py
39483 views
#!/usr/bin/env python1#-2# SPDX-License-Identifier: BSD-2-Clause3#4# Copyright (c) 2019 Netflix, Inc.5#6# Redistribution and use in source and binary forms, with or without7# modification, are permitted provided that the following conditions8# are met:9# 1. Redistributions of source code must retain the above copyright10# notice, this list of conditions and the following disclaimer.11# 2. Redistributions in binary form must reproduce the above copyright12# notice, this list of conditions and the following disclaimer in the13# documentation and/or other materials provided with the distribution.14#15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF25# SUCH DAMAGE.26#27#2829import argparse30import logging31logging.getLogger("scapy").setLevel(logging.CRITICAL)32import scapy.all as sp33import socket34import sys35from sniffer import Sniffer36from time import sleep3738def check_icmp6_error(args, packet):39ip6 = packet.getlayer(sp.IPv6)40if not ip6:41return False42oip6 = sp.IPv6(src=args.src[0], dst=args.to[0])43if ip6.dst != oip6.src:44return False45icmp6 = packet.getlayer(sp.ICMPv6DestUnreach)46if not icmp6:47return False48# ICMP6_DST_UNREACH_NOPORT 449if icmp6.code != 4:50return False51# Should we check the payload as well?52# We are running in a very isolated environment and nothing else53# should trigger an ICMPv6 Dest Unreach / Port Unreach so leave it.54#icmp6.display()55return True5657def main():58parser = argparse.ArgumentParser("frag6.py",59description="IPv6 fragementation test tool")60parser.add_argument('--sendif', nargs=1,61required=True,62help='The interface through which the packet will be sent')63parser.add_argument('--recvif', nargs=1,64required=True,65help='The interface on which to check for the packet')66parser.add_argument('--src', nargs=1,67required=True,68help='The source IP address')69parser.add_argument('--to', nargs=1,70required=True,71help='The destination IP address')72parser.add_argument('--debug',73required=False, action='store_true',74help='Enable test debugging')7576args = parser.parse_args()777879# Start sniffing on recvif80sniffer = Sniffer(args, check_icmp6_error)818283########################################################################84#85# A single fragmented packet with upper layer data in multiple segments86# to pass fragmentation.87# We need to do a bit of a dance to get the UDP checksum right.88#89# A: 1 reassembled packet90# R: Statistics and ICMPv6 error (non-fragmentation) as no port open.91#92data = "6" * 128093dataall = data * 3094ip6f01 = \95sp.IPv6(src=args.src[0], dst=args.to[0]) / \96sp.UDP(dport=3456, sport=6543) / \97dataall98ip6fd = sp.IPv6(sp.raw(ip6f01))99100ip6f01 = sp.Ether() / \101sp.IPv6(src=args.src[0], dst=args.to[0]) / \102sp.IPv6ExtHdrFragment(offset=0, m=1, id=16) / \103sp.UDP(dport=3456, sport=6543, len=ip6fd.len, chksum=ip6fd.chksum) / \104data105if args.debug :106ip6f01.display()107sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)108109foffset=(int)(1288/8)110mbit=1111for i in range(1,30):112if i == 29:113mbit=0114ip6f0n = sp.Ether() / \115sp.IPv6(src=args.src[0], dst=args.to[0]) / \116sp.IPv6ExtHdrFragment(offset=foffset, m=mbit, id=16, nh=socket.IPPROTO_UDP) / \117data118if args.debug :119ip6f0n.display()120sp.sendp(ip6f0n, iface=args.sendif[0], verbose=False)121foffset += (int)(1280/8)122123sleep(0.10)124sniffer.setEnd()125sniffer.join()126if not sniffer.foundCorrectPacket:127sys.exit(1)128129sys.exit(0)130131if __name__ == '__main__':132main()133134135