1#!/usr/local/bin/python3
2
3print("fully fragmented maximum size ping6 packet, sent in random order")
4
5#          |----|
6#                                        |----|
7#                              |----|
8#                                                       |----|
9#     |----|
10
11import os
12import random
13from addr import *
14from scapy.all import *
15
16pid=os.getpid()
17eid=pid & 0xffff
18iplen=2**16
19size=424
20payload=b"ABCDEFGHIJKLMNOP" * int(iplen / 16)
21packet=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/ \
22    ICMPv6EchoRequest(id=eid, data=bytes(payload)[0:iplen-8-1])
23frag=[]
24fid=pid & 0xffffffff
25max=int(iplen/size)
26for i in range(max):
27	frag.append(IPv6ExtHdrFragment(nh=58, id=fid, m=1,
28	    offset=i*int(size/8))/bytes(packet)[40+i*size:40+(i+1)*size])
29frag.append(IPv6ExtHdrFragment(nh=58, id=fid,
30    offset=max*int(size/8))/bytes(packet)[40+max*size:])
31eth=[]
32for f in frag:
33	pkt=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/f
34	eth.append(Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/pkt)
35
36child = os.fork()
37if child == 0:
38	time.sleep(1)
39	randeth=eth
40	random.shuffle(randeth)
41	for e in randeth:
42		sendp(e, iface=LOCAL_IF)
43		time.sleep(0.001)
44	os._exit(0)
45
46ans=sniff(iface=LOCAL_IF, timeout=10, filter=
47    "ip6 and src "+REMOTE_ADDR6+" and dst "+LOCAL_ADDR6+" and proto ipv6-frag")
48os.kill(child, 15)
49os.wait()
50
51for a in ans:
52	if a and a.type == ETH_P_IPV6 and \
53	    ipv6nh[a.payload.nh] == 'Fragment Header' and \
54	    a.payload.payload.offset == 0 and \
55	    ipv6nh[a.payload.payload.nh] == 'ICMPv6' and \
56	    icmp6types[a.payload.payload.payload.type] == 'Echo Reply':
57		id=a.payload.payload.payload.id
58		print("id=%#x" % (id))
59		if id != eid:
60			print("WRONG ECHO REPLY ID")
61			exit(2)
62		exit(0)
63print("NO ECHO REPLY")
64exit(1)
65