Add regress test showing that OpenBSD IPv6 fragment reassembly is
authorbluhm <bluhm@openbsd.org>
Tue, 12 Mar 2024 21:31:29 +0000 (21:31 +0000)
committerbluhm <bluhm@openbsd.org>
Tue, 12 Mar 2024 21:31:29 +0000 (21:31 +0000)
commit8f79da2a7ab2d3087d9588c271f22381fe816d25
treebfca24c0f0745f4efa79867018e59ba114895e31
parent43ae943ea4e5ba5fc2137a190e368f9ef2d8e1dc
Add regress test showing that OpenBSD IPv6 fragment reassembly is
not affected by FreeBSD-SA-23:06.ipv6 security advisory.  Scapy
test frag6_oversize.py reassembles fragments of a packet too big
to fit.  Test frag6_unfragsize.py also plays games with ECN bits
and hop-by-hop extension header to check overflow protection.  ICMP6
parameter problem responses are expected.  As pf does not generate
such ICMP6 error packets, these tests are only run with frag6_input()
in the IPv6 stack.
regress/sys/netinet6/frag6/LICENSE
regress/sys/netinet6/frag6/Makefile
regress/sys/netinet6/frag6/frag6_oversize.py [new file with mode: 0644]
regress/sys/netinet6/frag6/frag6_unfragsize.py [new file with mode: 0644]