#
925939b7 |
| 29-Jul-2018 |
bluhm <bluhm@openbsd.org> |
New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to clear this list when starting the sniffer thread. The TCP sequence number check in sr1() became more strict. Use the sniffer threa
New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to clear this list when starting the sniffer thread. The TCP sequence number check in sr1() became more strict. Use the sniffer thread to capture retransmitted packetes which the new TCP answers() check ignores now.
show more ...
|
#
3488794c |
| 27-Oct-2017 |
bluhm <bluhm@openbsd.org> |
I am trying to find a bug that seems to be triggered by a combination of TCP timing and socket splicing. Add tests that use Scapy scripts as client and server. That allows to drop, delay and retran
I am trying to find a bug that seems to be triggered by a combination of TCP timing and socket splicing. Add tests that use Scapy scripts as client and server. That allows to drop, delay and retransmit single TCP packets to execute various code paths in the remote OpenBSD stack.
show more ...
|