1#!/usr/local/bin/python3
2# send 2 non-overlapping ping fragments
3
4import os
5import threading
6from addr import *
7from scapy.all import *
8
9class Sniff1(threading.Thread):
10	filter = None
11	captured = None
12	packet = None
13	def run(self):
14		self.captured = sniff(iface=SRC_IF, filter=self.filter,
15		    count=1, timeout=3)
16		if self.captured:
17			self.packet = self.captured[0]
18
19dstaddr=sys.argv[1]
20pid=os.getpid()
21eid=pid & 0xffff
22payload=b"ABCDEFGHIJKLOMNO"
23packet=IP(src=SRC_OUT, dst=dstaddr)/ICMP(type='echo-request', id=eid)/payload
24fid=pid & 0xffff
25frag0=bytes(packet)[20:36]
26frag1=bytes(packet)[36:44]
27pkt0=IP(src=SRC_OUT, dst=dstaddr, proto=1, id=fid, frag=0, flags='MF')/frag0
28pkt1=IP(src=SRC_OUT, dst=dstaddr, proto=1, id=fid, frag=2)/frag1
29eth=[]
30eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt0)
31eth.append(Ether(src=SRC_MAC, dst=PF_MAC)/pkt1)
32
33sniffer = Sniff1();
34sniffer.filter = "ip and src %s and dst %s and icmp" % (dstaddr, SRC_OUT)
35sniffer.start()
36time.sleep(1)
37sendp(eth, iface=SRC_IF)
38sniffer.join(timeout=5)
39a = sniffer.packet
40
41if a and a.type == ETH_P_IP and \
42    a.payload.proto == 1 and \
43    a.payload.frag == 0 and a.payload.flags == 0 and \
44    icmptypes[a.payload.payload.type] == 'echo-reply':
45	id=a.payload.payload.id
46	print("id=%#x" % (id))
47	if id != eid:
48		print("WRONG ECHO REPLY ID")
49		exit(2)
50	load=a.payload.payload.payload.load
51	print("payload=%s" % (load))
52	if load == payload:
53		exit(0)
54	print("PAYLOAD!=%s" % (payload))
55	exit(1)
56print("NO ECHO REPLY")
57exit(2)
58