History log of /openbsd-current/regress/sys/kern/sosplice/scapy/scapy-handshake.py
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 1.3 25-Dec-2020 bluhm

Switch to scapy with python 3.


Revision tags: OPENBSD_6_4_BASE OPENBSD_6_5_BASE OPENBSD_6_6_BASE OPENBSD_6_7_BASE OPENBSD_6_8_BASE
# 1.2 29-Jul-2018 bluhm

New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to
clear this list when starting the sniffer thread. The TCP sequence
number check in sr1() became more strict. Use the sniffer thread
to capture retransmitted packetes which the new TCP answers() check
ignores now.


Revision tags: OPENBSD_6_3_BASE
# 1.1 27-Oct-2017 bluhm

I am trying to find a bug that seems to be triggered by a combination
of TCP timing and socket splicing. Add tests that use Scapy scripts
as client and server. That allows to drop, delay and retransmit
single TCP packets to execute various code paths in the remote
OpenBSD stack.


# 1.2 29-Jul-2018 bluhm

New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to
clear this list when starting the sniffer thread. The TCP sequence
number check in sr1() became more strict. Use the sniffer thread
to capture retransmitted packetes which the new TCP answers() check
ignores now.


Revision tags: OPENBSD_6_3_BASE
# 1.1 27-Oct-2017 bluhm

I am trying to find a bug that seems to be triggered by a combination
of TCP timing and socket splicing. Add tests that use Scapy scripts
as client and server. That allows to drop, delay and retransmit
single TCP packets to execute various code paths in the remote
OpenBSD stack.


# 1.1 27-Oct-2017 bluhm

I am trying to find a bug that seems to be triggered by a combination
of TCP timing and socket splicing. Add tests that use Scapy scripts
as client and server. That allows to drop, delay and retransmit
single TCP packets to execute various code paths in the remote
OpenBSD stack.