import pytest
from utils import DelayedSend
from atf_python.sys.net.tools import ToolsHelper
from atf_python.sys.net.vnet import VnetTestTemplate
class TestIGMP(VnetTestTemplate):
REQUIRED_MODULES = [ "pf" ]
TOPOLOGY = {
"vnet1": {"ifaces": ["if1"]},
"vnet2": {"ifaces": ["if1"]},
"if1": {"prefixes4": [("192.0.2.2/24", "192.0.2.1/24")]},
}
def vnet2_handler(self, vnet):
ifname = vnet.iface_alias_map["if1"].name
ToolsHelper.print_output("/sbin/pfctl -e")
ToolsHelper.pf_rules([
"pass",
])
ToolsHelper.print_output("/sbin/pfctl -x loud")
ToolsHelper.print_output("echo \"j 230.0.0.1 %s\ns 3600\nq\" | /usr/sbin/mtest" % ifname)
def find_igmp_reply(self, pkt, ifname):
pkt.show()
s = DelayedSend(pkt)
found = False
packets = self.sp.sniff(iface=ifname, timeout=5)
for r in packets:
r.show()
igmp = r.getlayer(self.sc.igmp.IGMP)
if not igmp:
continue
igmp.show()
if not igmp.gaddr == "230.0.0.1":
continue
found = True
return found
@pytest.mark.require_user("root")
@pytest.mark.require_progs(["scapy"])
def test_ip_opts(self):
"""Verify that we allow IGMP packets with IP options"""
ifname = self.vnet.iface_alias_map["if1"].name
import scapy.all as sp
import scapy.contrib as sc
import scapy.contrib.igmp
self.sp = sp
self.sc = sc
pkt = sp.IP(dst="224.0.0.1%%%s" % ifname, ttl=1,
options=[sp.IPOption_Router_Alert()]) \
/ sc.igmp.IGMP(type=0x11, mrcode=1)
assert self.find_igmp_reply(pkt, ifname)
pkt = sp.IP(dst="224.0.0.1%%%s" % ifname, ttl=1,
options=[sp.IPOption_NOP()]) \
/ sc.igmp.IGMP(type=0x11, mrcode=1)
assert not self.find_igmp_reply(pkt, ifname)
pkt = sp.IP(dst="224.0.0.1%%%s" % ifname, ttl=2,
options=[sp.IPOption_Router_Alert()]) \
/ sc.igmp.IGMP(type=0x11, mrcode=1)
assert not self.find_igmp_reply(pkt, ifname)
pkt = sp.IP(dst="224.0.0.2%%%s" % ifname, ttl=2,
options=[sp.IPOption_Router_Alert()]) \
/ sc.igmp.IGMP(type=0x11, mrcode=1)
assert not self.find_igmp_reply(pkt, ifname)