1#!/usr/local/bin/python2.7
2
3print "fully fragmented maximum size ping6 packet, sent in random order"
4
5#          |----|
6#                                        |----|
7#                              |----|
8#                                                       |----|
9#     |----|
10
11import os
12import random
13from addr import *
14from scapy.all import *
15
16pid=os.getpid()
17eid=pid & 0xffff
18iplen=2**16
19size=424
20payload="ABCDEFGHIJKLMNOP" * (iplen / 16)
21packet=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/ \
22    ICMPv6EchoRequest(id=eid, data=str(payload)[0:iplen-8-1])
23frag=[]
24fid=pid & 0xffffffff
25max=iplen/size
26for i in range(max):
27	frag.append(IPv6ExtHdrFragment(nh=58, id=fid, m=1,
28	    offset=i*(size/8))/str(packet)[40+i*size:40+(i+1)*size])
29frag.append(IPv6ExtHdrFragment(nh=58, id=fid,
30    offset=max*(size/8))/str(packet)[40+max*size:])
31eth=[]
32for f in frag:
33	pkt=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/f
34	eth.append(Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/pkt)
35
36child = os.fork()
37if child == 0:
38	time.sleep(1)
39	randeth=eth
40	random.shuffle(randeth)
41	for e in randeth:
42		sendp(e, iface=LOCAL_IF)
43		time.sleep(0.001)
44	os._exit(0)
45
46ans=sniff(iface=LOCAL_IF, timeout=10, filter=
47    "ip6 and src "+REMOTE_ADDR6+" and dst "+LOCAL_ADDR6+" and proto ipv6-frag")
48os.kill(child, 15)
49os.wait()
50
51for a in ans:
52	if a and a.type == ETH_P_IPV6 and \
53	    ipv6nh[a.payload.nh] == 'Fragment Header' and \
54	    a.payload.payload.offset == 0 and \
55	    ipv6nh[a.payload.payload.nh] == 'ICMPv6' and \
56	    icmp6types[a.payload.payload.payload.type] == 'Echo Reply':
57		id=a.payload.payload.payload.id
58		print "id=%#x" % (id)
59		if id != eid:
60			print "WRONG ECHO REPLY ID"
61			exit(2)
62		exit(0)
63print "NO ECHO REPLY"
64exit(1)
65