From: Andy Green <andy@warmcat.com>
To: linux-wireless@vger.kernel.org
Subject: Packetspammer and iwlwifi fragility
Date: Wed, 07 Mar 2007 13:05:22 +0000 [thread overview]
Message-ID: <45EEB892.6040201@warmcat.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 1798 bytes --]
Hi folks -
Attached is a small tool called "packetspammer" I just made from ripping
bits out of penumbrad, it sends 256-byte broadcast packets using the
management interface at a rate you define. It only depends on
libpcap-devel to compile.
# packetspammer <wlan0-type-interface> <delay between packets in us>
eg
# packetspammer wlan0 0
packetspammer brings up the management interface and determines which
one it is using /sys, the paths in there might need meddling with if the
very recent /sys clearout patch stuff is in your kernel, but it is
working with Linville's FC7 #3 2961 kernel which is what I am using
here. Then it loops using libpcap to spam broadcast packets down the
management interface.
So I try packetspammer on iwlwifi and zd1211rw-mac80211: both are
associated to a WPA protected network during the test and a second
machine in Monitor mode looks on.
* zd1211rw-mac80211: packets spew out at any delay, including 0.
Remains associated during the testing. The netdev start and stop stuff
must regulate the packet flow. Good!
* iwlwifi: drops dead without dmesg error after 55 - 89 packets (0us -
1000us delay). Association lost, no further packets are sent until the
thing is rmmodded, will not reassociate with wpa_supplicant restart
unless it is rmmodded and insmodded back in. Even at 1s delay between
packets, eventually it falls over. Bad!
Also notice that packets cannot be sent by packetspammer until the
interface is brought up, which I guess is reasonable enough, but also I
found not until the interface was associated with a WPA network, which
is a problem if the plan is to use the injection action to do the work
of association in userspace.
I hope maybe this can help validate and find the source of any fragility.
-Andy
[-- Attachment #2: packetspammer-0.1.tar.gz --]
[-- Type: application/x-gzip, Size: 15704 bytes --]
next reply other threads:[~2007-03-07 13:09 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-03-07 13:05 Andy Green [this message]
2007-03-07 14:10 ` Packetspammer and iwlwifi fragility Michael Wu
2007-03-07 15:09 ` Andy Green
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=45EEB892.6040201@warmcat.com \
--to=andy@warmcat.com \
--cc=linux-wireless@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).