[ipv6hackers] Help wanted: Testing tunnel support (RAW_IP) in the SI6 toolkit
fgont at si6networks.com
Sat Feb 2 16:05:57 CET 2013
-----BEGIN PGP SIGNED MESSAGE-----
I've been committing some time to work on the SI6 IPv6 toolkit
Among the features I had in my TODO list was support for IPv6 tunnels,
such that you can play with the tools if your v6 connectivity is
provided by e.g. gogoc or the like.
I've incorporated such support to two of the tools (frag6 and tcp6)..
and if everything goes okay, I will incorporate the same support in
the rest of the tools. The two updated tools (frag6 and tcp6) are
I'd appreciate if some folks could help with testing these tools.
So far, I've done some basic testing of tcp6 (e.g., performing
IPv6-based TCP SYN-floods), and everything seems to work fine.
But since I'm mostly off-line this week (and only intermittently
connected to the Internet with a pretty bad connection), I wasn't able
to test the updated tools thoroughly.
If you want to help, you can test the updated tools with the examples
included in the relevant manuals (see  and  below). For
example, you can test these two features of frag6:
1) Frag ID generation policy
# sudo ./frag6 -i INTERFACE --frag-id-policy -d DESTINATION -v
(caveat: For some of the tests, frag6 needs to spoof the source
address...So if your tunnel provider enforces ingress/egress
filtering, such proves could be lost. You might want to try to
circumvent this by specifying a prefix with "-s PREFIX/LEN" (e.g., the
one where your tunnel endpoint v6 address belongs to).
2) Assess the Frag reassembly policy
# frag6 -i INTERFACE --frag-reass-policy -d DESTINATION -v
 frag6 manual:
 tcp6 manual:
As noted above, the updated tools are available at:
If you have any questions, please do hesitate to ask them.
e-mail: fgont at si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
-----END PGP SIGNATURE-----
More information about the Ipv6hackers