1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
|
#!/usr/bin/env python3
# Copyright (c) 2021 Cisco and/or its affiliates.
#
# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
#
# Licensed under the Apache License 2.0 or
# GNU General Public License v2.0 or later; you may not use this file
# except in compliance with one of these Licenses. You
# may obtain a copy of the Licenses at:
#
# http://www.apache.org/licenses/LICENSE-2.0
# https://www.gnu.org/licenses/old-licenses/gpl-2.0-standalone.html
#
# Note: If this file is linked with Scapy, which is GPLv2+, your use of it
# must be under GPLv2+. If at any point in the future it is no longer linked
# with Scapy (or other GPLv2+ licensed software), you are free to choose
# Apache 2.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Traffic script that sends an ICMP/ICMPv6 packet out one interface, receives
a LISP-encapsulated packet on the other interface and verifies received packet.
"""
import sys
import ipaddress
from scapy.all import bind_layers, Packet
from scapy.fields import FlagsField, BitField, IntField
from scapy.layers.inet import ICMP, IP, UDP
from scapy.layers.inet6 import ICMPv6EchoRequest
from scapy.layers.inet6 import IPv6, ICMPv6ND_NS, ICMPv6MLReport2, ICMPv6ND_RA
from scapy.layers.l2 import Ether
from scapy.packet import Raw
from ..PacketVerifier import RxQueue, TxQueue
from ..TrafficScriptArg import TrafficScriptArg
class LispHeader(Packet):
"""Scapy header for the LISP Layer."""
name = u"Lisp Header"
fields_desc = [
FlagsField(
u"flags", None, 8, [u"N", u"L", u"E", u"V", u"I", u"", u"", u""]
),
BitField(u"nonce/map_version", 0, size=24),
IntField(u"instance_id/locator_status_bits", 0)]
class LispInnerIP(IP):
"""Scapy inner LISP layer for IPv4-in-IPv4."""
name = u"Lisp Inner Layer - IPv4"
class LispInnerIPv6(IPv6):
"""Scapy inner LISP layer for IPv6-in-IPv6."""
name = u"Lisp Inner Layer - IPv6"
def valid_ipv4(ip_address):
"""Check IPv4 address.
:param ip_address: IPv4 address to check.
:type ip_address: str
:returns: True if IP address is correct.
:rtype: bool
:raises AttributeError, AddressValueError: If IP address is not valid.
"""
try:
ipaddress.IPv4Address(ip_address)
return True
except (AttributeError, ipaddress.AddressValueError):
return False
def valid_ipv6(ip_address):
"""Check IPv6 address.
:param ip_address: IPv6 address to check.
:type ip_address: str
:returns: True if IP address is correct.
:rtype: bool
:raises AttributeError, AddressValueError: If IP address is not valid.
"""
try:
ipaddress.IPv6Address(ip_address)
return True
except (AttributeError, ipaddress.AddressValueError):
return False
def main():
"""Send IP ICMP packet from one traffic generator interface to the other.
:raises RuntimeError: If the received packet is not correct.
"""
args = TrafficScriptArg(
[
u"tg_src_mac", u"tg_dst_mac", u"src_ip", u"dst_ip", u"dut_if1_mac",
u"dut_if2_mac", u"src_rloc", u"dst_rloc"
],
[u"ot_mode"]
)
tx_src_mac = args.get_arg(u"tg_src_mac")
tx_dst_mac = args.get_arg(u"dut_if1_mac")
rx_dst_mac = args.get_arg(u"tg_dst_mac")
rx_src_mac = args.get_arg(u"dut_if2_mac")
src_ip = args.get_arg(u"src_ip")
dst_ip = args.get_arg(u"dst_ip")
src_rloc = args.get_arg(u"src_rloc")
dst_rloc = args.get_arg(u"dst_rloc")
tx_if = args.get_arg(u"tx_if")
rx_if = args.get_arg(u"rx_if")
ot_mode = args.get_arg(u"ot_mode")
rxq = RxQueue(rx_if)
txq = TxQueue(tx_if)
pkt_raw = Ether(src=tx_src_mac, dst=tx_dst_mac)
if valid_ipv4(src_ip) and valid_ipv4(dst_ip):
pkt_raw /= IP(src=src_ip, dst=dst_ip)
pkt_raw /= ICMP()
ip_format = IP
lisp_layer = LispInnerIP
elif valid_ipv6(src_ip) and valid_ipv6(dst_ip):
pkt_raw /= IPv6(src=src_ip, dst=dst_ip)
pkt_raw /= ICMPv6EchoRequest()
ip_format = IPv6
lisp_layer = LispInnerIPv6
else:
raise ValueError(u"IP not in correct format")
bind_layers(UDP, LispHeader, dport=4341)
bind_layers(LispHeader, lisp_layer)
pkt_raw /= Raw()
sent_packets = list()
sent_packets.append(pkt_raw)
txq.send(pkt_raw)
while True:
if tx_if == rx_if:
ether = rxq.recv(2, ignore=sent_packets)
else:
ether = rxq.recv(2)
if ether is None:
raise RuntimeError(u"ICMP echo Rx timeout")
if ether.haslayer(ICMPv6ND_NS):
# read another packet in the queue if the current one is ICMPv6ND_NS
continue
elif ether.haslayer(ICMPv6MLReport2):
# read another packet in the queue if the current one is
# ICMPv6MLReport2
continue
elif ether.haslayer(ICMPv6ND_RA):
# read another packet in the queue if the current one is
# ICMPv6ND_RA
continue
# otherwise process the current packet
break
if rx_dst_mac == ether[Ether].dst and rx_src_mac == ether[Ether].src:
print(u"MAC addresses match.")
else:
raise RuntimeError(f"Matching packet unsuccessful: {ether!r}")
ip = ether.payload
if ot_mode == u"6to4":
if not isinstance(ip, IP):
raise RuntimeError(f"Not an IP packet received {ip!r}")
elif ot_mode == u"4to6":
if not isinstance(ip, IPv6):
raise RuntimeError(f"Not an IP packet received {ip!r}")
elif not isinstance(ip, ip_format):
raise RuntimeError(f"Not an IP packet received {ip!r}")
lisp = ether.getlayer(lisp_layer)
if not lisp:
raise RuntimeError("Lisp layer not present or parsing failed.")
# Compare data from packets
if src_ip == lisp.src:
print(u"Source IP matches source EID.")
else:
raise RuntimeError(
f"Matching Src IP unsuccessful: {src_ip} != {lisp.src}"
)
if dst_ip == lisp.dst:
print(u"Destination IP matches destination EID.")
else:
raise RuntimeError(
f"Matching Dst IP unsuccessful: {dst_ip} != {lisp.dst}"
)
if src_rloc == ip.src:
print(u"Source RLOC matches configuration.")
else:
raise RuntimeError(
f"Matching Src RLOC unsuccessful: {src_rloc} != {ip.src}"
)
if dst_rloc == ip.dst:
print(u"Destination RLOC matches configuration.")
else:
raise RuntimeError(
f"Matching dst RLOC unsuccessful: {dst_rloc} != {ip.dst}"
)
sys.exit(0)
if __name__ == u"__main__":
main()
|