Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 07 Dec 2015 08:23:17 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 205081] [maintainer] net/scamper: update to 20141211c
Message-ID:  <bug-205081-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=205081

            Bug ID: 205081
           Summary: [maintainer] net/scamper: update to 20141211c
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: mjl@luckie.org.nz

Created attachment 163930
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=163930&action=edit
update scamper to 20141211c

From

https://mailman.caida.org/pipermail/scamper-announce/2015-October/000004.html
https://mailman.caida.org/pipermail/scamper-announce/2015-December/000005.html

sc_filterpolicy:
* add a new scamper driver to test systems for congruent filtering policy
  http://www.caida.org/tools/measurement/scamper/man/sc_filterpolicy.1.pdf

scamper:
* update scamper maximum PPS to 10,000 (from 1000).  Its not 2002 anymore.
* bind to requested source port with UDP sockets.
* set SO_SNDBUF once, when a probe socket is created.
* remove dlts option which was only used by traceroute.
* drop divert socket from privsep, which was not used in scamper anywhere.
* shift socket creation glue from scamper_privsep.c to
  scamper_udp4.c, scamper_icmp6.c, etc.

traceroute:
* add dl option, to replace dlts option removed from scamper.
* process UDP responses, if a UDP probe method is used.
* add tx timestamp to hop records

ping:
* add tcp-syn ping method.
* fix memory leak when payloads are specified in ping.

tbit
* add support for initial congestion window (ICW) inferences
* add new tests to check response to packets that could have been
  sent by a blind attacker
* add a TCP fast-open implementation, with both experimental
  and official option values
* add support for testing HTTPS and BGP.  drop FTP, DNS, and SMTP
* add sc_tbitblind driver that was used for IMC 2015 paper

sc_ipiddump
* report IPID values from traceroute measurements, where available
* report the source IP address used to probe the destination

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-205081-13>