hanoh haim | 5 Feb 07:01 2016
Picon

New Payload header with total frame size example

Hi experts,

I'm newbies to scapy and lately we integrated it into TRex traffic generator http://trex-tgn.cisco.com/ for crafting streams and it is pretty great.

I would like to get your suggestion on how to implement a new payload header called Pyload.

Eth()/IP()/UDP()/Pyload(total_frame=128,type="\xaa")

The above should craft *total* frame size of 128 with 0xaa as payload.  the complex stuff is how to estimate the prev headers until this header.

One way to do it is to always create maximum packet and in the call back (that fix checksum) trim it to the size I want by creating copy of the prev->headers (Eth()/IP()/UDP()) with the same default args (as they could be variable size headers) and measure the len

Is this is the best way to do it or maybe there is simpler way?

-- 
Hanoh
Sent from my iPhone
Max Williams | 1 Feb 22:20 2016
Picon

sniff filter help needed: 'tcpdump: 802.11 link-layer types supported only on 802.11'

Hi all,
I'm trying to work out how to create two filters for the sniff function. I can do it with the tcpdump command but having trouble translating it into a scapy format filter string. I need the filter because I don't have enough resources to filter the packets after the capture using prn function.

1. Sniff WLAN probe requests:
'type mgt subtype probe-req'

2. Capture any WLAN packets from a specified MAC address:
'wlan addr1 <mac addr> or wlan addr2 <mac addr> or wlan addr3 <mac addr> or wlan addr4 <mac addr> or ether host <mac addr>'

3. Combine both 1 and 2 to capture probe requests but only from specific MAC address:
'(wlan addr1 70:14:a6:e2:14:7a or wlan addr2 70:14:a6:e2:14:7a or wlan addr3 70:14:a6:e2:14:7a or wlan addr4 70:14:a6:e2:14:7a or ether host 70:14:a6:e2:14:7) and type mgt subtype probe-req'

I've seen some examples that use 'link[26] = 0x40' as a filter. Is there a lookup table for these numbers? Or are they from an RFC or something?

This is the error I get:
>>> sniff(iface="mon0", prn=print_function, filter='type mgt', store=0)
tcpdump: 802.11 link-layer types supported only on 802.11
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
  File "/usr/local/lib/python2.7/dist-packages/scapy/sendrecv.py", line 570, in sniff
    s = L2socket(type=ETH_P_ALL, *arg, **karg)
  File "/usr/local/lib/python2.7/dist-packages/scapy/arch/linux.py", line 470, in __init__
    attach_filter(self.ins, filter)
  File "/usr/local/lib/python2.7/dist-packages/scapy/arch/linux.py", line 127, in attach_filter
    raise Scapy_Exception("Filter parse error")
scapy.error.Scapy_Exception: Filter parse error

I've read many examples but having trouble finding the exact format for this filter string when working with a WLAN interface.

I'm using raspbian Linux and CONFIG_PACKET is enabled.

Kind regards,
Max
Richard Henry | 21 Jan 20:54 2016
Gravatar

Return codes and exceptions

Is there any documentation as to return types and potential exceptions 
thrown by functions like scapy.read()?

Does read() send all bytes or does it act like socket.read()?

Can it throw an exception, i.e. if the target address doesn't exist?

I paged through the manual but felt like I was missing something.

Thanks in advance,
Rich

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Ludwig Kräh | 19 Jan 13:28 2016
Picon

Chose class needed for dissection when dissection has already begun?

Hello,

I'm currently facing a problem. I'm trying to write a Packet class for 
the BACnet APDU layer, which follows after the NPDU layer. The APDU 
layer looks like the following:

  1 Byte
+--------------------------------------------------------------+--------+
|                                                              | 1 Bit  
|

+-----------------------------------------------------------------------+
|              TYPE                 | FLAG 1 | FLAG 2 | FLAG 3 | FLAG 4 
|
+-----------------------------------------------------------------------+
|                                 SOME                                  
|
+-----------------------------------------------------------------------+
|                                 OTHER                                 
|
+-----------------------------------------------------------------------+
|                                 OPTIONAL FIELDS                       
|
+-----------------------------------------------------------------------+
|                                 FIELDS                                
|

There are eight different variations of this layer and each has it's own 
TYPE (ranging from 0 to 7) - The TYPE field is also the only one all of 
them have in common. The TYPE field also decides about which fields 
shall follow. So some have only two of the flags, some have more 
following fields, some have none.
The NPDU layer below has no helpful information about the following 
layers structure, the only way to know this is by knowing the TYPE.
So I wrote eight different classes for each of these layers, thinking I 
could just use layer binding to bind them together by the TYPE field 
like that

> bind_layers(NPDU, APDU, TYPE=0)
> bind_layers(NPDU, APDU, TYPE=1)

... and so on.

But this does not work - I guess because the field, on which the binding 
depends, must be in the lower layer. So my problem is, that Scapy should 
know which layer to use for dissection while already dissecting it.
I also tried separating the TYPE field from the rest by writing eight 
different classes without the TYPE field and adding them in the APDU 
layer as PacketFields with conditional fields depending on the TYPE. 
That didn't work either - I guess it didn't work because the TYPE field 
is not a full Byte.

Generally speaking - The problem I'm facing is that I need to decide 
which layer should be used for dissection, but the information necessary 
for this decision is only available when dissection has already begun.

So now I really don't know how to approach this. I was hoping someone 
might be able to help me.

Thank you in advance,
Ludwig Kräh

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Guillaume Valadon | 15 Jan 14:16 2016
Picon

Scapy 2.3.2

Dear Scapy users & developers,

I wish you all a happy new year. 2015 has been a wonderful year for the
Scapy community, as we received and merged a lot of pull-requests.
Thanks a lot for your help and support !

After some an unfortunate delay, Scapy 2.3.2 was released today.
According to the mercurial logs, this new stable release includes some
really nice improvements.

On the protocol side, multiple PR were merged, such as:
- enhanced support for GTP
- preliminary support for SEND
- detailed HomePlugAV PLC
- the ISIS routing protocol
- a refactored Netfow v5 support
- some IPv6 enhancements: ICMPv6NDOptDNSSL, framgent6(), PPP, random
addresses, ...
- enhanced MPLS support
- ICMP extensions
- support for SPBM (Shortest Path Bridging)

Concerning the core and the included tools:
- arm64 support
- fixes for FreeBSD10
- send()/sendp() can now returns sent packets
- corrections to farpd

More changes are already on the way !

Along with this new release, we decided to move the repository to git
and move to github. As a result, the current mercurial repository on
bitbucket will be closed.

Scapy new home for development is: <https://github.com/secdev/scapy>.
The main website at http://www.secdev.org/projects/scapy/ will soon be
updated accordingly.

All the current bitbucket PR will be discussed then merged on github.
Recent bitbucket issues will also be discussed then closed if a relevant
solution is found. Moreover, if you prefer to open an issue on github to
continue an issue on bitbucket, please close the corresponding issue on
bitbucket,

Guillaume, on behalf of the Scapy team

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Christian Graf | 12 Jan 17:40 2016
Picon
Picon

sr-function - filtering answer on arbitrary packet

Dear all,

kindly ask for help. With scapy I would like to test a 3rd party encapsulation device.
scapy crafts IPv4 packets, which arrive at the encapsulator. The encapsulator performs encapsulation of
the IPv4 (IPv4-in-IPv6) and forwards this frame to external device (so its not sent back to scapy, which
crafted the IPv4 packet from a mac/IP-address prospective)

input=IP(src='1.1.1.1', dst='1.1.1.2')/TCP()

feeding the crafted input frame into the encapsulator results in a frame like this:

output=IPv6(src='2001:db7::1', dst='2001:db7::2', nh=4)/IP(src='1.1.1.1', dst='1.1.1.2')/TCP()

>>> input.summary()
'IP / TCP 1.1.1.1:ftp_data > 1.1.1.2:http S'
>>> output.summary()
'IPv6 / IP / TCP 1.1.1.1:ftp_data > 1.1.1.2:http S’

I am wondering how I can use the sr-function to match exact answer/response as seen above? We can assume,
that both the input and output is on the same interface/linux-bridge, however src/dst mac-addresses are
not mutually the same (IPv6 output-frame is not sent back to the IPv4 source). I should say add that many
different “unique” IPv4 packets are being crafted via scapy, each with a different matching
“encapsulated” packet to match on.

any feedback much appreciated

thanks

christian

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Gulshan Singh | 24 Dec 05:34 2015
Picon

Serializing/Pickling PacketList

Hi,

I'm wondering if anyone has experimented with serializing PacketList? I'm wondering if serializing and deserializing a PacketList might be faster than reading a PCAP. I've tried to write the required `__getstate__` and `__setstate__` methods for pickling Packet, but I either run into some field that can't be pickled, or I can pickle/unpickle but the resulting object is somehow corrupted (i.e., I can't print it). Has anyone tried this?
Christian Graf | 23 Dec 00:11 2015
Picon
Picon

scapy - generate IPv6 fragments - wrong next-header setting

Dear all,

first thanks for this great tool. I am kindly asking for help.

I am suspecting an bug with scapy 2.2.0.  In case I am doing it wrongly, any help would be much appreciated,

I am crafting an IPv4-in-IPv6 tunnel, which perfectly works fine.
However when trying use fragment6 on this frame, next-header information looks incorrect to me.

details:

the unfragmented packet  - next-header is set correctly to nh=4 to carry IPv4 packet
==================================================================

payload6="6"*1200
p=Ether(src='22:22:22:22:22:22', dst='22:22:22:22:22:23',
type=0x86dd)/IPv6(src='2001:db7::1', dst='2001:db7::2', nh=4)/IP(src='1.1.1.1', dst='1.1.1.2')/TCP()/payload6

>>> p.show()
###[ Ethernet ]###
  dst= 22:22:22:22:22:23
  src= 22:22:22:22:22:22
  type= 0x86dd
###[ IPv6 ]###
     version= 6
     tc= 0
     fl= 0
     plen= None
     nh= IP   <<<<<<<<<< nh=4 - correct!
     hlim= 64
     src= 2001:db7::1
     dst= 2001:db7::2
###[ IP ]###
        version= 4
        ihl= None
        tos= 0x0
        len= None
        id= 1
        flags=
        frag= 0
        ttl= 64
        proto= tcp
        chksum= None
        src= 1.1.1.1
        dst= 1.1.1.2
        \options\
###[ TCP ]###
           sport= ftp_data
           dport= http
           seq= 0
           ack= 0
           dataofs= None
           reserved= 0
           flags= S
           window= 8192
           chksum= None
           urgptr= 0
           options= {}
###[ Raw ]###
              load= '

now fragmenting this frame
========================
changes to original frame:
nh=44 to indicate fragmentation-header
inside fragmentation-header I am setting nh=4 to indicate IPv4 payload. here I am unclear if my approach is correct.

>>> p_frag=Ether(src='22:22:22:22:22:22', dst='22:22:22:22:22:23',
type=0x86dd)/IPv6(src='2001:db7::1', dst='2001:db7::2',
nh=44)/IPv6ExtHdrFragment(nh=4)/IP(src='1.1.1.1', dst='1.1.1.2')/TCP()/payload6
>>> for f in fragment6(p_frag,500):
...   f.show()
...
###[ Ethernet ]###
  dst= 22:22:22:22:22:23
  src= 22:22:22:22:22:22
  type= 0x86dd
###[ IPv6 ]###
     version= 6
     tc= 0
     fl= 0
     plen= None
     nh= Fragment Header  <<<<< correct
     hlim= 64
     src= 2001:db7::1
     dst= 2001:db7::2
###[ IPv6 Extension Header - Fragmentation header ]###
        nh= No Next Header  <<<< I would expect this to be IPv4 (nh=4)  <<<<<<<<
         ^^^^^^^^^^^^^^^^^^^
        res1= 0
        offset= 0
        res2= 0
        m= 1
        id= 897762134
###[ Raw ]###
           load=
'E\x00\x04\xd8\x00\x01\x00\x00 <at> \x06r\x1b\x01\x01\x01\x01\x01\x01\x01\x02\x00\x14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00w\xbb\x00\x0066666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666'
###[ Ethernet ]###
  dst= 22:22:22:22:22:23
  src= 22:22:22:22:22:22
  type= 0x86dd
###[ IPv6 ]###
     version= 6
     tc= 0
     fl= 0
     plen= None
     nh= Fragment Header
     hlim= 64
     src= 2001:db7::1
     dst= 2001:db7::2
###[ IPv6 Extension Header - Fragmentation header ]###
        nh= No Next Header  << unclear here what shall be expected
        ^^^^^^^^^^^^^^^^^^^
        res1= 0
        offset= 54
        res2= 0
        m= 1
        id= 897762134
###[ Raw ]###
           load= '666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666'
###[ Ethernet ]###
  dst= 22:22:22:22:22:23
  src= 22:22:22:22:22:22
  type= 0x86dd
###[ IPv6 ]###
     version= 6
     tc= 0
     fl= 0
     plen= None
     nh= Fragment Header
     hlim= 64
     src= 2001:db7::1
     dst= 2001:db7::2
###[ IPv6 Extension Header - Fragmentation header ]###
        nh= No Next Header
        res1= 0
        offset= 108
        res2= 0
        m= 0
        id= 897762134
###[ Raw ]###
           load= ‘6666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666'

Please let me know if I need to use a different way to get the frame fragmented, of if it looks like a bug.

thanks

christian

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Fabio D'Alfonso | 22 Dec 13:03 2015
Gravatar

Issues setting 2.3.1 on Windows 7

Hi,
meanwhile I got a 2.2.0 on Ubuntu 15.

I am getting some UT test errors and also there are modules in Python 
2.5 that are not available in 2.6.

So I would ask for suggestions about python version, and related 
packages.

Just one question:
Why the compliant python packages (excluding python itself) are not 
provided in the download, with some direct instruction on how to do the 
job, instead of being necessary to go here and there to look for?

Thanks

--

-- 

Fabio D'Alfonso
  'Enabling Business Through IT'
  cell.  +39.348.059.40.22 *
  web: www.fabiodalfonso.com
  email: fabio.dalfonso <at> fabiodalfonso.com
linkedin: www.linkedin.com/in/fabiodalfonso
  twitter: www.twitter.com/#!/fabio_dalfonso

fax: +39.06.874.599.581
  BlackBerry® Wireless Enabled Address.

* HIDDEN  NUMBERS ARE AUTOMATICALLY REJECTED BY THE PHONE

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Steve (Gadget) Barnes | 4 Dec 07:48 2015
Picon

Re: ICMPv6 getting started


On 04/12/2015 00:49, Marco Zunino wrote:
> As a Scapy user, I can say that this is quite confusing.
> 
> As far as I understand porting Scapy to Python 3 require a big effort,
> so much to be actually a separate project.

It is not only a separate project it is being done by different people.

> Which advantaged the porting to Scapy to Python 3 would actually bring?
> 
It would let python 3 users use scapy and also extend the life of scapy
beyond the life of python 2.
> If scapy3k is a porting of Scapy to Python3, why it cannot be
> merged-back to original scapy? Would this break compatibility with Python 2?
> 
It could possibly be merged in but only if those doing the porting to
python 3:
 a) Make a specific effort to make there changes backwards compatible
 b) Ensure that changes in the python 2 version of scapy are regularly
merged into the python 3 version
 c) regularly submit their changes back into the python 2 version and
respond to any feedback
__and__ those that are maintaining/developing the python 2 version
 a) review those changes and either:
  a1) find then good and merge them in or
  a2) give feedback of why those changes are not yet suitable for inclusion.
 b) merge the changes in once they are acceptable.

And for these to happen all parties will have to take some time out from
both their paid work and there work on developing & enhancing their
respective versions to make it happen.

Sadly, from what I have seen for one reason or another the above process
does not _seem_ to be happening smoothly at the moment. __I may be
mistaken of course!__ <ducks> but that is my impression from the posts
below.
> 
> 
> On Sun, Nov 29, 2015 at 9:45 AM, Eriks Dobelis <eriks.dobelis <at> biti.lv
> <mailto:eriks.dobelis <at> biti.lv>> wrote:
> 
>     Relax, Pierre. Instead of explanations and apologies, why don't we
>     talk on constructive way forward? I have posted my suggestion on
>     Bitbucket in July. How do you (and Guillaume) suggest going forward
>     with this scapy vs. scapy3k situation?
> 
>     Also, it would definitely help if other people besides 3 of us would
>     express their view on way forward.
> 
>     On 2015.11.29. 18:07, Pierre LALET wrote:
> 
>         Hi,
> 
>         I've had enough of that, and this ML is not the place for those
>         discussions. I don't have enough time to contribute to Scapy or
>         other
>         open-source projects as much as I would like to, so I'm not going to
>         waste it any more.
> 
>         Again, my impression is that you are using any pretext here or on
>         bitbucket to promote your fork (and reading Guillaume's e-mails on
>         this ML, I've got the impression I'm not the only one), and that
>         it's
>         not helping. One more time, I ask you to stop that.
> 
>         About the WONTFIX, if asking you to accept my apologies was not
>         enough, well, I'm sorry but that's all I can offer now. On the other
>         hand, if you wanted explainations back in February, you just had to
>         ask.
> 
> 
> 
>     ---------------------------------------------------------------------
>     To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org
>     <mailto:scapy.ml-unsubscribe <at> secdev.org>
> 
> 

--

-- 
Steve (Gadget) Barnes
Any opinions in this message are my personal opinions and do not reflect
those of my employer.

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org

Marcus Poller | 18 Nov 22:02 2015
Picon

ICMPv6 getting started

Hey guys,

I am working on a masterthesis and I cannot get the grips with IPv6. I want to sent an ICMPv6 echo request.

A working sample would be nice.
For further self help: A hint on getting a list of all implemented IPv6 functions would be nice, too.

Here is what I tried:

  $ sudo scapy
  Welcome to Scapy (2.2.0)
  >>> sr1(IPv6(src="::1",dst="::1")/ICMP())
  Begin emission:
  ERROR: --- Error in child 5618
  Traceback (most recent call last):
    File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 89, in sndrcv
      pks.send(p)
    File "/usr/lib/python2.7/dist-packages/scapy/arch/linux.py", line 387, in send
      sx = str(ll(x))
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 261, in __str__
      return self.build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 319, in build
      p = self.do_build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 308, in do_build
      pkt = self.self_build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 299, in self_build
      p = f.addfield(self, p, val)
    File "/usr/lib/python2.7/dist-packages/scapy/fields.py", line 70, in addfield
      return s+struct.pack(self.fmt, self.i2m(pkt,val))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 94, in i2m
      return MACField.i2m(self, pkt, self.i2h(pkt, x))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 88, in i2h
      x = conf.neighbor.resolve(pkt,pkt.payload)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 38, in resolve
      return self.resolvers[k](l2inst,l3inst)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 468, in <lambda>
      conf.neighbor.register_l3(Ether, IPv6, lambda l2,l3: getmacbyip6(l3.dst))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 109, in getmacbyip6
      res = neighsol(ip6, a, iff, chainCC=chainCC)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 77, in neighsol
      p /= ICMPv6NDOptSrcLLAddr(lladdr=get_if_hwaddr(iface))
    File "/usr/lib/python2.7/dist-packages/scapy/arch/__init__.py", line 43, in get_if_hwaddr
      raise Scapy_Exception("Unsupported address family (%i) for interface [%s]" % (addrfamily,iff))
  Scapy_Exception: Unsupported address family (-2) for interface [teredo]
  INFO: --- Error in child 5618

Maybe "ICMP()" is not for IPv6. Next try:
  >>> sr1(IPv6(src="::1",dst="::1")/ICMPv6EchoRequest())
  Begin emission:
  ERROR: --- Error in child 9398
  Traceback (most recent call last):
    File "/usr/lib/python2.7/dist-packages/scapy/sendrecv.py", line 89, in sndrcv
      pks.send(p)
    File "/usr/lib/python2.7/dist-packages/scapy/arch/linux.py", line 387, in send
      sx = str(ll(x))
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 261, in __str__
      return self.build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 319, in build
      p = self.do_build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 308, in do_build
      pkt = self.self_build()
    File "/usr/lib/python2.7/dist-packages/scapy/packet.py", line 299, in self_build
      p = f.addfield(self, p, val)
    File "/usr/lib/python2.7/dist-packages/scapy/fields.py", line 70, in addfield
      return s+struct.pack(self.fmt, self.i2m(pkt,val))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 94, in i2m
      return MACField.i2m(self, pkt, self.i2h(pkt, x))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 88, in i2h
      x = conf.neighbor.resolve(pkt,pkt.payload)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 38, in resolve
      return self.resolvers[k](l2inst,l3inst)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 468, in <lambda>
      conf.neighbor.register_l3(Ether, IPv6, lambda l2,l3: getmacbyip6(l3.dst))
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 109, in getmacbyip6
      res = neighsol(ip6, a, iff, chainCC=chainCC)
    File "/usr/lib/python2.7/dist-packages/scapy/layers/inet6.py", line 77, in neighsol
      p /= ICMPv6NDOptSrcLLAddr(lladdr=get_if_hwaddr(iface))
    File "/usr/lib/python2.7/dist-packages/scapy/arch/__init__.py", line 43, in get_if_hwaddr
      raise Scapy_Exception("Unsupported address family (%i) for interface [%s]" % (addrfamily,iff))
  Scapy_Exception: Unsupported address family (-2) for interface [teredo]
  INFO: --- Error in child 9398

Maybe I still got it wrong, so I stole from
  http://www.packetlevel.ch/html/scapy/scapyipv6.html
  >>> sr1(IPv6(dst="::1")/ICMPv6EchoRequest(data=RandString(7))
sends a packet, that does not appear on my tcpdump.

Thanks a lot,
Marcus

---------------------------------------------------------------------
To unsubscribe, send a mail to scapy.ml-unsubscribe <at> secdev.org


Gmane