Send packets with IPv4 option or IPv6 extension header over loopback
authorbluhm <bluhm@openbsd.org>
Wed, 27 Apr 2022 18:28:40 +0000 (18:28 +0000)
committerbluhm <bluhm@openbsd.org>
Wed, 27 Apr 2022 18:28:40 +0000 (18:28 +0000)
commitb4d308b44d7e798031d566d6097e9322f7caef7d
tree28c6f431b4e9e65e1eccd6141c4a4f22b6618e5b
parentafb1c1edc409018855b0a91b0240eea4319e2a1c
Send packets with IPv4 option or IPv6 extension header over loopback
interface and check which of the packets are dropped by pf.  The
bad packets appear in pflog0 tcpdump.  This regress is testing rules
with and without allow-opts.
14 files changed:
regress/sys/net/pf_opts/LICENSE [new file with mode: 0644]
regress/sys/net/pf_opts/Makefile [new file with mode: 0644]
regress/sys/net/pf_opts/icmp.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6_dst.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6_hop.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6_hop_bad.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6_hop_pad.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp6_hop_ra.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp_bad.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp_eol.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp_pad.py [new file with mode: 0644]
regress/sys/net/pf_opts/icmp_ra.py [new file with mode: 0644]
regress/sys/net/pf_opts/pf.conf [new file with mode: 0644]