This project is mirrored from https://github.com/nplab/packetdrill.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Oct 21, 2018
-
-
Michael Tüxen authored
-
- Oct 11, 2018
-
-
Michael Tüxen authored
-
- Oct 05, 2018
-
-
Michael Tüxen authored
-
- Oct 04, 2018
-
-
Michael Tüxen authored
-
- Sep 17, 2018
-
-
Michael Tüxen authored
When tearing down a TCP connection, try injecting a RST segment by pretending to peer has received the last packet as an out of the blue packet.
-
- May 06, 2018
-
-
Michael Tüxen authored
This avoids conflics with definitions on Solaris 10.4.
-
- Feb 08, 2018
-
-
Michael Tüxen authored
Thanks to Timo Voelker for finding and reporting the bug.
-
- Jan 10, 2018
-
-
Michael Tüxen authored
-
- Oct 14, 2017
-
-
Michael Tüxen authored
-
- Oct 13, 2017
-
-
Michael Tüxen authored
-
- Oct 07, 2017
-
-
Michael Tüxen authored
-
Michael Tüxen authored
-
- Aug 10, 2017
-
-
Jason Eggleston authored
In order to simulate delayed packets, there are occasions where responses to those packets need to be ignored insofar as they modify relative sequence numbers or timestamps. For example a retransmitted SYN or SYN-ACK might be delayed until after the TCP session ends, but a combination of bugs on the client and server might result in the session persisting as if it never ended. inbound injected packet: 0.100034 S 0:0(0) win 65535 <mss 1460,nop,wscale 6,sackOK,TS val 100 ecr 0> outbound sniffed packet: 0.100083 S. 3079308609:3079308609(0) ack 1 win 65535 <mss 1460,nop,wscale 4,sackOK,TS val 3206488061 ecr 100> inbound injected packet: 0.150127 . 1:101(100) ack 3079308610 win 1031 <nop,nop,TS val 150 ecr 3206488061> outbound sniffed packet: 0.150170 . 3079308610:3079308610(0) ack 101 win 12495 <nop,nop,TS val 3206488111 ecr 150> outbound sniffed packet: 0.150192 P. 3079308610:3079309010(400) ack 101 win 12501 <nop,nop,TS val 3206488111 ecr 150> inbound injected packet: 0.200251 . 101:101(0) ack 3079309010 win 1024 <nop,nop,TS val 200 ecr 3206488111> inbound injected packet: 0.200271 F. 101:101(0) ack 3079309010 win 1031 <nop,nop,TS val 200 ecr 3206488111> outbound sniffed packet: 0.200287 . 3079309010:3079309010(0) ack 102 win 12501 <nop,nop,TS val 3206488161 ecr 200> outbound sniffed packet: 0.200324 F. 3079309010:3079309010(0) ack 102 win 12501 <nop,nop,TS val 3206488161 ecr 200> inbound injected packet: 0.250354 . 102:102(0) ack 3079309011 win 1031 <nop,nop,TS val 250 ecr 3206488161> inbound injected packet: 0.265380 S 0:0(0) win 65535 <mss 1460,nop,wscale 6,sackOK,TS val 100 ecr 0> outbound sniffed packet: 0.265402 S. 3079308609:3079308609(0) ack 1 win 65535 <mss 1460,nop,wscale 4,sackOK,TS val 3118763918 ecr 100> inbound injected packet: 0.300437 . 1:1(0) ack 3079308610 win 1031 <nop,nop,TS val 150 ecr 3206488061> outbound sniffed packet: 0.300455 R 3079308610:3079308610(0) win 0 0.000 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3 +0.000 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0 +0.000 bind(3, ..., ...) = 0 +0.000 listen(3, 1) = 0 +0.100 < S 0:0(0) win 65535 <mss 1460,nop,wscale 6,sackOK,TS val 100 ecr 0> +0.000 > S. 0:0(0) ack 1 win 65535 <mss 1460,nop,wscale 4,sackOK,TS val 200 ecr 100> +0.050 < . 1:101(100) ack 1 win 1031 <nop, nop, TS val 150 ecr 200> +0.000 accept(3, ..., ...) = 4 +0.000 read(4, ..., 100) = 100 +0.000 write(4, ..., 400) = 400 +0.000 > . 1:1(0) ack 101 win 12495 <nop, nop, TS val 250 ecr 150> +0.000 > P. 1:401(400) ack 101 win 12501 <nop, nop, TS val 250 ecr 150> +0.050 < . 101:101(0) ack 401 win 1024 <nop, nop, TS val 200 ecr 250> +0.000 < F. 101:101(0) ack 401 win 1031 <nop, nop, TS val 200 ecr 250> +0.000 > . 401:401(0) ack 102 win 12501 <nop, nop, TS val 300 ecr 200> +0.000 close(4) = 0 +0.000 > F. 401:401(0) ack 102 win 12501 <nop, nop, TS val 300 ecr 200> +0.050 < . 102:102(0) ack 402 win 1031 <nop, nop, TS val 250 ecr 300> +0.015 < S 0:0(0) win 65535 <mss 1460,nop,wscale 6,sackOK,TS val 100 ecr 0!> +0.000 > S. ...(0) ack 1 win 65535 <mss 1460,nop,wscale 4,sackOK,TS val ... ecr 100> +0.035 < . 1:1(0) ack 1 win 1031 <nop, nop, TS val 150 ecr 200> +0.000 > . 1:1(0) ack 1 win 12501 <nop, nop, TS val 200 ecr 150>
-
- Jul 06, 2017
-
-
Michael Tüxen authored
Sponsored by: Netflix, Inc.
-
- Jun 29, 2017
-
-
Michael Tüxen authored
This allows to support a mixture of encapsulated and non-encapsulated packets in a single script file. Sponsored by: Netflix, Inc.
-
- Jun 01, 2017
-
-
Michael Tüxen authored
Ensure sequence numbers are mapped correctly.
-
- May 25, 2017
-
-
Michael Tüxen authored
-
- May 23, 2017
-
-
Michael Tüxen authored
This adds support for SCTP/UDP and TCP/UDP including ICMP support. Sponsored by: Netflix, Inc.
-
- Mar 01, 2017
-
-
George Neville-Neil authored
-
- Feb 28, 2017
-
-
George Neville-Neil authored
-
- Jan 08, 2017
-
-
Michael Tüxen authored
This fixes #114 and also the TCP remote mode.
-
- Nov 23, 2016
-
-
Michael Tüxen authored
Sponsored by: Netflix, Inc.
-
- Nov 20, 2016
-
-
Michael Tüxen authored
This is based on a patch from Jason Eggleston with minor modifications from me.
-
- Oct 27, 2016
-
-
Michael Tüxen authored
When injecting out of the blue packet, don't update the socket under test if one is available. This allows to use the python code for TCP info to inspect closed sockets. Sponsored by: Netflix.
-
- Sep 05, 2016
-
-
Michael Tüxen authored
Sponsored by: Neflix.
-
Michael Tüxen authored
Sponsored by: Netflix.
-
- Aug 11, 2016
-
-
Michael Tüxen authored
-
- Jul 22, 2016
-
-
Julian Cordes authored
-
- Jul 19, 2016
-
-
Aomx authored
-
- Jul 14, 2016
- Jul 13, 2016
-
-
Aomx authored
-
- May 21, 2016
-
-
Hoelscher authored
-
- May 12, 2016
-
-
Hoelscher authored
-
- May 09, 2016
-
-
Hoelscher authored
-
- Apr 17, 2016
-
-
Hoelscher authored
-
- Mar 15, 2016
- Mar 14, 2016