Path: blob/main/tests/sys/netinet6/frag6/frag6_20.py
39483 views
#!/usr/bin/env python1#-2# SPDX-License-Identifier: BSD-2-Clause3#4# Copyright (c) 2019 Netflix, Inc.5#6# Redistribution and use in source and binary forms, with or without7# modification, are permitted provided that the following conditions8# are met:9# 1. Redistributions of source code must retain the above copyright10# notice, this list of conditions and the following disclaimer.11# 2. Redistributions in binary form must reproduce the above copyright12# notice, this list of conditions and the following disclaimer in the13# documentation and/or other materials provided with the distribution.14#15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF25# SUCH DAMAGE.26#27#2829import argparse30import logging31logging.getLogger("scapy").setLevel(logging.CRITICAL)32import scapy.all as sp33import socket34import sys35from sniffer import Sniffer36from time import sleep3738def check_icmp6_error(args, packet):39ip6 = packet.getlayer(sp.IPv6)40if not ip6:41return False42oip6 = sp.IPv6(src=args.src[0], dst=args.to[0])43if ip6.dst != oip6.src:44return False45icmp6 = packet.getlayer(sp.ICMPv6TimeExceeded)46if not icmp6:47return False48# ICMP6_TIME_EXCEED_REASSEMBLY 149if icmp6.code != 1:50return False51# Should we check the payload as well?52# We are running in a very isolated environment and nothing else53# should trigger an ICMPv6 Time Exceeded / Frag reassembly so leave it.54#icmp6.display()55return True565758def main():59parser = argparse.ArgumentParser("frag6.py",60description="IPv6 fragementation test tool")61parser.add_argument('--sendif', nargs=1,62required=True,63help='The interface through which the packet will be sent')64parser.add_argument('--recvif', nargs=1,65required=True,66help='The interface on which to check for the packet')67parser.add_argument('--src', nargs=1,68required=True,69help='The source IP address')70parser.add_argument('--to', nargs=1,71required=True,72help='The destination IP address')73parser.add_argument('--debug',74required=False, action='store_true',75help='Enable test debugging')7677args = parser.parse_args()787980# Start sniffing on recvif81sniffer = Sniffer(args, check_icmp6_error)828384########################################################################85#86# Send a proper first fragment (off=0) and a second fragment which87# just fits the 64k. The re-send the first fragment with an extra88# unfragmentable part making the 64k to exceed the limit.89# This is to make sure we don't allow to update meta-data for a90# 1st fragmented packet should a second arrive but given the91# fragmentable part is an exact duplicate only that fragment92# will be silently discarded.93#94# A: Reassembly failure, timeout after95# R: ICMPv6 time exceeded / statistics for the duplicate96#97data = "6" * 898ip6f00 = \99sp.Ether() / \100sp.IPv6(src=args.src[0], dst=args.to[0]) / \101sp.IPv6ExtHdrFragment(offset=0, m=1, id=20) / \102sp.UDP(dport=3456, sport=6543) / \103data104data = "6" * 15105ip6f01 = \106sp.Ether() / \107sp.IPv6(src=args.src[0], dst=args.to[0]) / \108sp.IPv6ExtHdrFragment(offset=0x1ffc, m=0, id=20) / \109sp.UDP(dport=3456, sport=6543) / \110data111data = "6" * 8112ip6f02 = \113sp.Ether() / \114sp.IPv6(src=args.src[0], dst=args.to[0]) / \115sp.IPv6ExtHdrDestOpt(options = \116sp.PadN(optdata="\x00\x00\x00\x00\x00\x00")) / \117sp.IPv6ExtHdrFragment(offset=0, m=1, id=20) / \118sp.UDP(dport=3456, sport=6543) / \119data120if args.debug :121ip6f00.display()122ip6f01.display()123ip6f02.display()124sp.sendp(ip6f00, iface=args.sendif[0], verbose=False)125sp.sendp(ip6f01, iface=args.sendif[0], verbose=False)126sp.sendp(ip6f02, iface=args.sendif[0], verbose=False)127128sleep(3)129sniffer.setEnd()130sniffer.join()131if not sniffer.foundCorrectPacket:132sys.exit(1)133134sys.exit(0)135136if __name__ == '__main__':137main()138139140