Clean up script to generate LW46 bindings / MAP-E rules.

Change-Id: I3a3949e728f4e4875efddd4f02a55746c998a5ed
Signed-off-by: Ole Troan <ot@cisco.com>
This commit is contained in:
Ole Troan
2016-01-05 20:05:52 +01:00
parent ce853c4838
commit 92be0df475
4 changed files with 57 additions and 789 deletions

View File

@@ -1,4 +1,4 @@
#!/usr/bin/env python3.4
#!/usr/bin/env python3
# Copyright (c) 2015 Cisco and/or its affiliates.
# Licensed under the Apache License, Version 2.0 (the "License");
@@ -20,194 +20,83 @@ import sys
# map add domain ip4-pfx <pfx> ip6-pfx ::/0 ip6-src <ip6-src> ea-bits-len 0 psid-offset 6 psid-len 6
# map add rule index <0> psid <psid> ip6-dst <ip6-dst>
def_ip4_pfx = '192.0.2.0/24'
def_ip6_pfx = '2001:db8::/32'
def_ip6_src = '2001:db8::1'
def_psid_offset = 6
def_psid_len = 6
def_ea_bits_len = 14
parser = argparse.ArgumentParser(description='MAP VPP configuration generator')
parser.add_argument('-t', action="store", dest="mapmode")
parser.add_argument('--ip4-prefix', action="store", dest="ip4_pfx", default=def_ip4_pfx)
parser.add_argument('--ip6-prefix', action="store", dest="ip6_pfx", default=def_ip6_pfx)
parser.add_argument('--ip6-src', action="store", dest="ip6_src", default=def_ip6_src)
parser.add_argument('--psid-len', action="store", dest="psid_len", default=def_psid_len)
parser.add_argument('--psid-offset', action="store", dest="psid_offset", default=def_psid_offset)
parser.add_argument('--ea-bits-len', action="store", dest="ea_bits_len", default=def_ea_bits_len)
args = parser.parse_args()
#
# 1:1 Shared IPv4 address, shared BR, Terastream
# Algorithmic mapping Shared IPv4 address
#
def terastream():
ip4_pfx = ipaddress.ip_network('20.0.0.0/22')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
ip6_src = ipaddress.ip_address('cccc:bbbb::')
def algo(ip4_pfx_str, ip6_pfx_str, ip6_src_str, psid_len, ea_bits_len, ip6_src_ecmp = False):
print("map add domain ip4-pfx " + ip4_pfx_str + " ip6-pfx " + ip6_pfx_str + " ip6-src " + ip6_src_str +
" ea-bits-len " + str(ea_bits_len) + " psid-offset 6 psid-len " + str(psid_len))
#
# 1:1 Full IPv4 address
#
def lw46(ip4_pfx_str, ip6_pfx_str, ip6_src_str, psid_len, ea_bits_len, ip6_src_ecmp = False):
ip4_pfx = ipaddress.ip_network(ip4_pfx_str)
ip6_src = ipaddress.ip_address(ip6_src_str)
ip6_dst = ipaddress.ip_network(ip6_pfx_str)
psid_len = 0
mod = ip4_pfx.num_addresses / 1024
for i in range(ip4_pfx.num_addresses):
if not i % 64:
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx " + str(ip6_dst[i]) + "/128 ip6-src",
ip6_src, "ea-bits-len 0 psid-offset 0 psid-len 0")
if ip6_src_ecmp and not i % mod:
ip6_src = ip6_src + 1
#
# 1:1 Shared IPv4 address, shared BR (16) VPP CLI
#
def lw46_shared(ip4_pfx_str, ip6_pfx_str, ip6_src_str, psid_len, ea_bits_len, ip6_src_ecmp = False):
ip4_pfx = ipaddress.ip_network(ip4_pfx_str)
ip6_src = ipaddress.ip_address(ip6_src_str)
ip6_dst = ipaddress.ip_network(ip6_pfx_str)
mod = ip4_pfx.num_addresses / 1024
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-src " + str(ip6_src) +
" ea-bits-len 0 psid-offset 0 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
if ip6_src_ecmp and not i % mod:
ip6_src = ip6_src + 1
#
# 1:1 Shared IPv4 address, shared BR, OTE
# 1:1 Shared IPv4 address, shared BR
#
def oteshared11():
ip4_pfx = ipaddress.ip_network('2.84.63.0/24')
dst = list(ipaddress.ip_network('2a02:580:8c00::/40').subnets(new_prefix=56))
def lw46_shared_b(ip4_pfx_str, ip6_pfx_str, ip6_src_str, psid_len, ea_bits_len, ip6_src_ecmp = False):
ip4_pfx = ipaddress.ip_network(ip4_pfx_str)
ip6_src = ipaddress.ip_address(ip6_src_str)
ip6_dst = list(ipaddress.ip_network(ip6_pfx_str).subnets(new_prefix=56))
psid_len = 6
ip6_src = ipaddress.ip_address('2a02::')
for i in range(ip4_pfx.num_addresses):
if not i % 64:
ip6_src = ip6_src + 1
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-src " + str(ip6_src) +
" ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
enduserprefix = list(dst.pop(0).subnets(new_prefix=64))[255-1]
enduserprefix = list(ip6_dst.pop(0).subnets(new_prefix=64))[255-1]
print("map add rule index", i, "psid", psid, "ip6-dst", enduserprefix[(i * (0x1<<psid_len)) + psid])
#
# 1:1 Shared IPv4 address, shared BR, Terastream
#
def confdterastream():
ip4_pfx = ipaddress.ip_network('20.0.0.0/22')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
ip6_src = ipaddress.ip_address('cccc:bbbb::')
for i in range(ip4_pfx.num_addresses):
if not i % 64:
ip6_src = ip6_src + 1
print("vpp softwire softwire-instances softwire-instance", i, "br-ipv6 " + str(ip6_src) + " ipv6-prefix ::/0" + " ipv4-prefix " + str(ip4_pfx[i]) +
"/32 ea-len 0 psid-offset 6 psid-len", psid_len)
# print("vpp softwire softwire-instances softwire-instance", i, "ipv4-pfx " + str(ip4_pfx[i]) + "/32 ipv6-pfx ::/0 br-ipv6 " + str(ip6_src) +
# " ea-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("binding", psid, "ipv6-addr", ip6_dst[(i * (0x1<<psid_len)) + psid])
def shared11br_yang():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
for i in range(ip4_pfx.num_addresses):
print("vpp softwire softwire-instances softwire-instance " + str(i) + " ipv4-prefix " + str(ip4_pfx[i]) + "/32 " +
"ipv6-prefix ::/0 ea-len 0 psid-offset 6 tunnel-mtu 1234 psid-len", psid_len)
#print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-shared-src cccc:bbbb::1",
# "ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
# print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
print("binding", psid, "ipv6-addr", ip6_dst[(i * (0x1<<psid_len)) + psid])
def shared11br_xml():
ip4_pfx = ipaddress.ip_network('20.0.0.0/32')
ip6_dst = ipaddress.ip_network('bbbb::/32')
ip6_src = ipaddress.ip_address('cccc:bbbb::')
psid_len = 6
print('<vpp xmlns="http://www.cisco.com/yang/cisco-vpp"><softwire><softwire-instances>');
count = 1024;
for i in range(ip4_pfx.num_addresses):
if not i % 64:
ip6_src = ip6_src + 1
if count == 0:
break;
count = count - 1;
print('<softwire-instance>')
print(' <id>'+ str(i)+ '</id>')
print(' <ipv4-prefix>'+ str(ip4_pfx[i])+ '/32</ipv4-prefix>')
print(' <ipv6-prefix>::/0</ipv6-prefix>')
print(' <ea-len>0</ea-len>')
print(' <psid-offset>0</psid-offset>')
print(' <psid-len>'+ str(psid_len) + '</psid-len>')
for psid in range(0x1 << psid_len):
print(' <binding>')
print(' <psid>', psid, '</psid>')
print(' <ipv6-addr>'+ str(ip6_dst[(i * (0x1<<psid_len)) + psid]) + '</ipv6-addr>')
print(' </binding>')
print('</softwire-instance>')
print('</softwire-instances></softwire>')
print('</vpp>')
#
# 1:1 Shared IPv4 address, shared BR
#
def shared11br():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-shared-src cccc:bbbb::1",
"ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
#
# 1:1 Shared IPv4 address, shared BR
#
def shared11br():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-shared-src cccc:bbbb::1",
"ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
#
# 1:1 Shared IPv4 address
#
def shared11():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_src = ipaddress.ip_network('cccc:bbbb::/64')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-src", ip6_src[i],
"ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
#
# 1:1 Shared IPv4 address small
#
def smallshared11():
ip4_pfx = ipaddress.ip_network('20.0.0.0/24')
ip6_src = ipaddress.ip_network('cccc:bbbb::/64')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 6
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx ::/0 ip6-src", ip6_src[i],
"ea-bits-len 0 psid-offset 6 psid-len", psid_len)
for psid in range(0x1 << psid_len):
print("map add rule index", i, "psid", psid, "ip6-dst", ip6_dst[(i * (0x1<<psid_len)) + psid])
#
# 1:1 Full IPv4 address
#
def full11():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_src = ipaddress.ip_network('cccc:bbbb::/64')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 0
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx " + str(ip6_dst[i]) + "/128 ip6-src", ip6_src[i],
"ea-bits-len 0 psid-offset 0 psid-len 0")
def full11br():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
ip6_dst = ipaddress.ip_network('bbbb::/32')
psid_len = 0
for i in range(ip4_pfx.num_addresses):
print("map add domain ip4-pfx " + str(ip4_pfx[i]) + "/32 ip6-pfx " + str(ip6_dst[i]) + "/128 ip6-shared-src cccc:bbbb::1",
"ea-bits-len 0 psid-offset 0 psid-len 0")
#
# Algorithmic mapping Shared IPv4 address
#
def algo():
print("map add domain ip4-pfx 20.0.0.0/24 ip6-pfx bbbb::/32 ip6-src cccc:bbbb::1 ea-bits-len 16 psid-offset 6 psid-len 8")
print("map add domain ip4-pfx 20.0.1.0/24 ip6-pfx bbbb:1::/32 ip6-src cccc:bbbb::2 ea-bits-len 8 psid-offset 0 psid-len 0")
#
# IP4 forwarding
#
def ip4():
ip4_pfx = ipaddress.ip_network('20.0.0.0/16')
for i in range(ip4_pfx.num_addresses):
print("ip route add " + str(ip4_pfx[i]) + "/32 via 172.16.0.2")
globals()[args.mapmode]()
globals()[args.mapmode](args.ip4_pfx, args.ip6_pfx, args.ip6_src, args.psid_len, args.psid_offset,
args.ea_bits_len)

View File

@@ -1,214 +0,0 @@
#!/usr/bin/env python
# Copyright (c) 2015 Cisco and/or its affiliates.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at:
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import sys, time
from scapy.all import *
import mapalgs
ifname = "vpp-tap"
loc_v4_mac = "aa:aa:aa:aa:aa:a4"
loc_v6_mac = "aa:aa:aa:aa:aa:a6"
vpp_mac = "aa:aa:aa:aa:00:00"
map_t = 1
fragsize = 0
map_mtu = 200
def mac_to_vppmac(mac):
mac = mac.replace(':', '')
return mac[0:4]+"."+mac[4:8]+"."+mac[8:12]
map = mapalgs.MapCalc( rulev6 = 'bbbb::/32',
rulev4 = '20.0.0.0/24',
ratio = 256);
dmr = mapalgs.DmrCalc('cccc:bbbb::/96')
ICMP_TYPES_CODES = {
0: 0,
3: 15,
4: 0,
5: 3,
6: 0,
8: 0,
9: 0,
10: 0,
11: 1,
12: 2,
13: 0,
14: 0,
15: 0,
16: 0,
17: 0,
18: 0
}
ICMP6_TYPES_CODES = {
1: 7,
2: 0,
3: 1,
4: 3,
}
def net_conf():
c = ""
c += "tap connect "+ifname+" hwaddr "+mac_to_vppmac(vpp_mac)+" \n"
c += "set int state tap-0 up \n"
c += "set ip6 neighbor tap-0 2001:f00d::1 "+mac_to_vppmac(loc_v6_mac)+" \n"
c += "set ip arp tap-0 10.0.0.1 "+mac_to_vppmac(loc_v4_mac)+" \n"
c += "ip route add ::/0 via 2001:f00d::1 tap-0 \n"
c += "ip route add 0.0.0.0/0 via 10.0.0.1 tap-0 \n"
return c
def conf():
c = net_conf()
c += "map add domain ip4-pfx 20.0.0.0/24 ip6-pfx bbbb::/32 ea-bits-len 16 psid-offset 6 psid-len 8"
if map_mtu != 0:
c += " mtu "+str(map_mtu)
if map_t:
c += " ip6-src cccc:bbbb::/96 map-t"
else:
c += " ip6-src cccc:bbbb::ffff"
c += "\n"
return c
def send_packet(ip_header, ip_content):
print("Send packet")
if fragsize != 0:
if ip_header.version == 4:
frags = fragment(ip_header/ip_content, fragsize=fragsize)
for f in frags:
print("Fragmented IPv4 packet")
sendp(Ether(dst=vpp_mac, src=loc_v4_mac)/f, iface=ifname)
elif ip_header.version == 6:
frags = fragment6(ip_header/IPv6ExtHdrFragment()/ip_content, fragsize)
for f in frags:
print("Fragmented IPv6 packet")
sendp(Ether(dst=vpp_mac, src=loc_v6_mac)/f, iface=ifname)
else:
sendp(Ether(dst=vpp_mac)/ip_header/ip_content, iface=ifname)
def send_packet_frag_inner(packet, inner_header, inner_content):
print("Send packet with inner ICMP packet")
if fragsize != 0:
if packet.version == 4:
frags = fragment(inner_header/inner_content, fragsize=fragsize)
for f in frags:
print("Fragmented IPv4 inner packet")
sendp(Ether(dst=vpp_mac, src=loc_v4_mac)/packet/f, iface=ifname)
elif packet.version == 6:
frags = fragment6(inner_header/IPv6ExtHdrFragment()/inner_content, fragsize)
for f in frags:
print("Fragmented IPv6 inner packet")
sendp(Ether(dst=vpp_mac, src=loc_v6_mac)/packet/f, iface=ifname)
else:
sendp(Ether(dst=vpp_mac)/packet/inner_header/inner_content, iface=ifname)
def sendv6udp(src, dst, port):
psid = map.gen_psid(port)
ceaddr = str(map.get_mapce_addr(src, psid))
dst = str(dmr.embed_6052addr(dst))
send_packet(IPv6(dst=dst, src=ceaddr), UDP(sport=port)/('X'*900))
def sendv6tcp(src, dst, port):
psid = map.gen_psid(port)
ceaddr = str(map.get_mapce_addr(src, psid))
dst = str(dmr.embed_6052addr(dst))
send_packet(IPv6(dst=dst, src=ceaddr), TCP(sport=port)/('X'*900))
def sendv4udp(src, dst, port):
send_packet(IP(dst=dst, src=src), UDP(dport=port)/('X'*900))
def sendv4tcp(src, dst, port):
send_packet(IP(dst=dst, src=src), TCP(dport=port)/('X'*900))
def sendv6ping(src, dst, id):
psid = map.gen_psid(id)
ceaddr = str(map.get_mapce_addr(src, psid))
dst = str(dmr.embed_6052addr(dst))
send_packet(IPv6(dst=dst, src=ceaddr), ICMPv6EchoRequest(id=id, data='A'*500))
send_packet(IPv6(dst=dst, src=ceaddr), ICMPv6EchoReply(id=id, data='A'*500))
def sendv4ping(src, dst, id):
send_packet(IP(dst=dst, src=src), ICMP(id=id, type=0)/('X'*500))
send_packet(IP(dst=dst, src=src), ICMP(id=id, type=8)/('X'*500))
def sendv4icmperr(src, dst, type, code, port, inner_src, inner_dst, payload_length):
inner = IP(dst=inner_dst, src=inner_src)/TCP(sport=port, dport=8888)/('X'*payload_length)
send_packet_frag_inner(IP(dst=dst, src=src)/ICMP(type=type, code=code), IP(dst=inner_dst, src=inner_src), TCP(sport=port, dport=8888)/('X'*payload_length))
#send_packet(IP(dst=dst, src=src)/ICMP(type=type, code=code)/inner)
def sendv6icmperr(src, dst, type, code, port, payload_length):
psid = map.gen_psid(port)
src = str(map.get_mapce_addr(src, psid))
dst = str(dmr.embed_6052addr(dst))
inner_header = IPv6(dst=src, src=dst)
inner_content = TCP(sport=8888, dport=port)/('X'*payload_length)
send_packet_frag_inner(IPv6(dst=dst, src=src)/ICMPv6DestUnreach(type=type, code=code), inner_header, inner_content)
#send_packet(IPv6(dst=dst, src=src)/ICMPv6DestUnreach(type=type, code=code)/inner)
def sendv4icmp_errors(src, dst, port, inner_src, inner_dst, payload_length):
for type in ICMP_TYPES_CODES:
for code in range(0, ICMP_TYPES_CODES[type] + 1):
sendv4icmperr(src, dst, type, code, port, inner_src, inner_dst, payload_length)
#sendv4icmperr(src, dst, type, ICMP_TYPES_CODES[type] + 2, port, inner_src, inner_dst, payload_length)
#sendv4icmperr(src, dst, type, 255, port, inner_src, inner_dst, payload_length)
#sendv4icmperr(src, dst, 1, 0, port, inner_src, inner_dst, payload_length)
#sendv4icmperr(src, dst, 2, 10, port, inner_src, inner_dst, payload_length)
#sendv4icmperr(src, dst, 255, 255, port, inner_src, inner_dst, payload_length)
#TODO: Check wrong paramater with different pointer values
def sendv6icmp_errors(src, dst, port, payload_length):
for type in ICMP6_TYPES_CODES:
for code in range(0, ICMP6_TYPES_CODES[type] + 1):
sendv6icmperr(src, dst, type, code, port, payload_length)
#sendv6icmperr(src, dst, type, ICMP6_TYPES_CODES[type] + 2, port, payload_length)
#sendv6icmperr(src, dst, type, 255, port, payload_length)
def traffic():
delay = 2.0
while 1:
#sendp(Ether(dst="bb:bb:bb:bb:bb:b4")/IP(dst="20.0.0.1")/UDP(chksum=0)/('X'*900), iface="vpp-tapv4")
#sendp(Ether(dst="bb:bb:bb:bb:bb:b6")/IPv6(dst="cccc:bbbb::a000:0001")/ICMPv6EchoRequest()/('X'*900), iface="vpp-tapv6")
#sendp(Ether(dst="bb:bb:bb:bb:bb:b6")/IPv6(dst="cccc:bbbb::a000:0001")/UDP()/('X'*900), iface="vpp-tapv6")
sendv6udp("20.0.0.1", "10.0.0.1", 12001)
sendv6tcp("20.0.0.1", "10.0.0.1", 12002)
sendv4udp("10.0.0.1", "20.0.0.1", 12003)
sendv4tcp("10.0.0.1", "20.0.0.1", 12004)
sendv6ping("20.0.0.1", "10.0.0.1", 12005)
sendv4ping("10.0.0.1", "20.0.0.1", 12006)
sendv4icmp_errors("10.0.0.1", "20.0.0.1", 12006, "20.0.0.1", "10.0.0.1", 500)
sendv4icmp_errors("10.0.0.1", "20.0.0.1", 12006, "20.0.0.1", "10.0.0.1", 1500)
sendv6icmp_errors("20.0.0.1", "10.0.0.1", 12006, 500)
time.sleep(delay)
delay *= 0.9
if len(sys.argv) <= 1:
print("Usage: conf|traffic")
exit(1)
if sys.argv[1] == "conf":
print(conf())
elif sys.argv[1] == "traffic":
traffic()

View File

File diff suppressed because it is too large Load Diff

View File

@@ -1,80 +0,0 @@
#!/usr/bin/env python
# Copyright (c) 2009-2014 Cisco and/or its affiliates.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at:
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import threading
import time
from scapy.all import *
from Queue import *
iface = 'veth1'
class SnifferThread(threading.Thread) :
def __init__(self,q,iface,flt,timeout) :
threading.Thread.__init__(self)
self.q = q
self.iface = iface
self.timeout = timeout
self.flt = flt
print("Sniffers reporting for service on ",self.iface)
def run(self) :
conf.iface=self.iface
conf.iface6=self.iface
r = sniff(filter=self.flt,iface=self.iface,timeout=self.timeout,prn=lambda x: x.summary())
self.q.put(r)
# New "SR" function
# Fire off thread with filter and expected answer packet(s).
# Fire off sniffer thread, main thread sends packet
# Returns true if found
def sr2(answer, *args, **kwargs):
q = Queue()
print("Creating SnifferThreadWorkerThread")
flt='ip proto 41'
iface='veth1'
sniffer = SnifferThread(q,iface,flt,1)
sniffer.setDaemon(True)
sniffer.start()
print "Sending packet:"
send(*args, **kwargs)
sniffer.join()
ps = q.get()
# ps.summary()
print "Number of packets sniffed:", len(ps)
for p in ps:
ip = p.getlayer(1)
print "Comparing", ip.summary(), "and", answer.summary()
if ip == answer:
print "We have a match!!"
return True
return False
aip6 = IPv6(dst='2002:0a0a:0a0a::12')/ICMPv6EchoRequest()
answer= IP(src="10.0.0.100",dst="10.10.10.10",ttl=63)/aip6
packet = IPv6(dst='2002:0a0a:0a0a::12')/ICMPv6EchoRequest()
# From IPv6
sr2(answer, packet,iface='veth1')
#From IPv4
packet = IP(src='10.10.10.10',dst='10.0.0.100')/IPv6(src='2002:0a0a:0a0a::12',dst='1::2')/ICMPv6EchoRequest()
sr2(answer, packet,iface='veth1')