1#!/usr/local/bin/python3
2# send a ping6 packet with routing header type 0
3# the address pointer is at the final destination
4# hide the routing header behind a fragment header to avoid header scan
5# we expect an echo reply, as there are no more hops
6
7print("send with fragment and routing header type 0 to the final destination")
8
9import os
10from addr import *
11from scapy.all import *
12
13pid=os.getpid()
14eid=pid & 0xffff
15fid=pid & 0xffffffff
16payload=b"ABCDEFGHIJKLMNOP"
17packet=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/\
18    IPv6ExtHdrFragment(id=fid)/\
19    IPv6ExtHdrRouting(addresses=[OTHER_FAKE1_ADDR6, OTHER_FAKE2_ADDR6], \
20    segleft=0)/\
21    ICMPv6EchoRequest(id=eid, data=payload)
22eth=Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/packet
23
24if os.fork() == 0:
25	time.sleep(1)
26	sendp(eth, iface=LOCAL_IF)
27	os._exit(0)
28
29ans=sniff(iface=LOCAL_IF, timeout=3, filter=
30    "ip6 and dst "+LOCAL_ADDR6+" and icmp6")
31for a in ans:
32	if a and a.type == ETH_P_IPV6 and \
33	    ipv6nh[a.payload.nh] == 'ICMPv6' and \
34	    icmp6types[a.payload.payload.type] == 'Echo Reply':
35		reply=a.payload.payload
36		id=reply.id
37		print("id=%#x" % (id))
38		if id != eid:
39			print("WRONG ECHO REPLY ID")
40			exit(2)
41		data=reply.data
42		print("payload=%s" % (data))
43		if data != payload:
44			print("WRONG PAYLOAD")
45			exit(2)
46		exit(0)
47print("NO ICMP6 ECHO REPLY")
48exit(1)
49