linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Andy Green <andy@warmcat.com>
To: linux-wireless@vger.kernel.org
Subject: Packetspammer and iwlwifi fragility
Date: Wed, 07 Mar 2007 13:05:22 +0000	[thread overview]
Message-ID: <45EEB892.6040201@warmcat.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 1798 bytes --]

Hi folks -

Attached is a small tool called "packetspammer" I just made from ripping 
bits out of penumbrad, it sends 256-byte broadcast packets using the 
management interface at a rate you define.  It only depends on 
libpcap-devel to compile.

# packetspammer <wlan0-type-interface> <delay between packets in us>

eg

# packetspammer wlan0 0

packetspammer brings up the management interface and determines which 
one it is using /sys, the paths in there might need meddling with if the 
very recent /sys clearout patch stuff is in your kernel, but it is 
working with Linville's FC7 #3 2961 kernel which is what I am using 
here.  Then it loops using libpcap to spam broadcast packets down the 
management interface.

So I try packetspammer on iwlwifi and zd1211rw-mac80211: both are 
associated to a WPA protected network during the test and a second 
machine in Monitor mode looks on.

  * zd1211rw-mac80211: packets spew out at any delay, including 0. 
Remains associated during the testing.  The netdev start and stop stuff 
must regulate the packet flow.  Good!

  * iwlwifi: drops dead without dmesg error after 55 - 89 packets (0us - 
1000us delay).  Association lost, no further packets are sent until the 
thing is rmmodded, will not reassociate with wpa_supplicant restart 
unless it is rmmodded and insmodded back in.  Even at 1s delay between 
packets, eventually it falls over.  Bad!

Also notice that packets cannot be sent by packetspammer until the 
interface is brought up, which I guess is reasonable enough, but also I 
found not until the interface was associated with a WPA network, which 
is a problem if the plan is to use the injection action to do the work 
of association in userspace.

I hope maybe this can help validate and find the source of any fragility.

-Andy

[-- Attachment #2: packetspammer-0.1.tar.gz --]
[-- Type: application/x-gzip, Size: 15704 bytes --]

             reply	other threads:[~2007-03-07 13:09 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-03-07 13:05 Andy Green [this message]
2007-03-07 14:10 ` Packetspammer and iwlwifi fragility Michael Wu
2007-03-07 15:09   ` Andy Green

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=45EEB892.6040201@warmcat.com \
    --to=andy@warmcat.com \
    --cc=linux-wireless@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).