git: 2e13459e2aa4 - main - pf tests: fix plfow:v6 after scapy-2.6.0 update
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 15 Oct 2024 14:29:34 UTC
The branch main has been updated by kp: URL: https://cgit.FreeBSD.org/src/commit/?id=2e13459e2aa43506069f14e026ff2d7629c0d8e8 commit 2e13459e2aa43506069f14e026ff2d7629c0d8e8 Author: Kristof Provost <kp@FreeBSD.org> AuthorDate: 2024-10-15 09:08:09 +0000 Commit: Kristof Provost <kp@FreeBSD.org> CommitDate: 2024-10-15 14:29:11 +0000 pf tests: fix plfow:v6 after scapy-2.6.0 update Avoid receiving ICMPv6 destination unreachable packets, because scapy will attempt to parse the pflow information from those (partial) packets as well, and then get confused. MFC after: 1 week Sponsored by: Rubicon Communications, LLC ("Netgate") --- tests/sys/netpfil/pf/pft_read_ipfix.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tests/sys/netpfil/pf/pft_read_ipfix.py b/tests/sys/netpfil/pf/pft_read_ipfix.py index 2c11bdfd130c..02ef2ca5ab06 100644 --- a/tests/sys/netpfil/pf/pft_read_ipfix.py +++ b/tests/sys/netpfil/pf/pft_read_ipfix.py @@ -60,7 +60,7 @@ def parse_ipfix(p): c = datafl.payload def receive(recvif, recvport): - pkts = sp.sniff(iface=recvif, timeout=65) + pkts = sp.sniff(iface=recvif, timeout=65, filter="udp port 2055") if len(pkts) == 0: print("No data")