xref: /linux/tools/testing/selftests/net/netfilter/packetdrill/conntrack_synack_reuse.pkt (revision 621cde16e49b3ecf7d59a8106a20aaebfb4a59a9)
1// Check reception of another SYN while we have an established conntrack state.
2// Challenge ACK is supposed to pass through, RST reply should clear conntrack
3// state and SYN retransmit should give us new 'SYN_RECV' connection state.
4
5`packetdrill/common.sh`
6
7// should show a match if bug is present:
8+0 `iptables -A INPUT -m conntrack --ctstate INVALID -p tcp --tcp-flags SYN,ACK SYN,ACK`
9
10+0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
11+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
12+0 bind(3, ..., ...) = 0
13+0 listen(3, 10) = 0
14
15+0 < S 0:0(0) win 32792 <mss 1000,nop,wscale 7, TS val 1 ecr 0,nop,nop>
16+0 > S. 0:0(0) ack 1 <mss 1460,nop,nop,TS val 100 ecr 1,nop,wscale 8>
17+.01 < . 1:1(0) ack 1 win 257 <TS val 1 ecr 100,nop,nop>
18+0 accept(3, ..., ...) = 4
19
20+0 < P. 1:101(100) ack 1 win 257 <TS val 2 ecr 100,nop,nop>
21+.001 > . 1:1(0) ack 101 win 256 <nop,nop,TS val 110 ecr 2>
22+0 read(4, ..., 101) = 100
23
241.0 < S 2000:2000(0) win 32792 <mss 1000,nop,wscale 7, TS val 233 ecr 0,nop,nop>
25// Won't expect this: challenge ack.
26
27+0 > . 1:1(0) ack 101 win 256 <nop,nop,TS val 112 ecr 2>
28+0 < R. 101:101(0) ack 1 win 257
29+0 close(4) = 0
30
311.5 < S 2000:2000(0) win 32792 <mss 1000,nop,wscale 0, TS val 233 ecr 0,nop,nop>
32
33+0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep -q SYN_RECV`
34+0 `iptables -v -S INPUT | grep INVALID | grep -q -- "-c 0 0"`
35