git: 2e13459e2aa4 - main - pf tests: fix plfow:v6 after scapy-2.6.0 update
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 15 Oct 2024 14:29:34 UTC
The branch main has been updated by kp:
URL: https://cgit.FreeBSD.org/src/commit/?id=2e13459e2aa43506069f14e026ff2d7629c0d8e8
commit 2e13459e2aa43506069f14e026ff2d7629c0d8e8
Author: Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2024-10-15 09:08:09 +0000
Commit: Kristof Provost <kp@FreeBSD.org>
CommitDate: 2024-10-15 14:29:11 +0000
pf tests: fix plfow:v6 after scapy-2.6.0 update
Avoid receiving ICMPv6 destination unreachable packets, because scapy will
attempt to parse the pflow information from those (partial) packets as well, and
then get confused.
MFC after: 1 week
Sponsored by: Rubicon Communications, LLC ("Netgate")
---
tests/sys/netpfil/pf/pft_read_ipfix.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/sys/netpfil/pf/pft_read_ipfix.py b/tests/sys/netpfil/pf/pft_read_ipfix.py
index 2c11bdfd130c..02ef2ca5ab06 100644
--- a/tests/sys/netpfil/pf/pft_read_ipfix.py
+++ b/tests/sys/netpfil/pf/pft_read_ipfix.py
@@ -60,7 +60,7 @@ def parse_ipfix(p):
c = datafl.payload
def receive(recvif, recvport):
- pkts = sp.sniff(iface=recvif, timeout=65)
+ pkts = sp.sniff(iface=recvif, timeout=65, filter="udp port 2055")
if len(pkts) == 0:
print("No data")