[scamper-announce] scamper-cvs-20240916
Matthew Luckie
mjl at luckie.org.nz
Mon Sep 16 15:05:15 PDT 2024
https://www.caida.org/catalog/software/scamper/code/scamper-cvs-20240916.tar.gz
SHA256 (scamper-cvs-20240916.tar.gz) = fdb6b83dda79245cfbc79a05467d41394a354aa74c12bf5514435808440eaac5
SIZE (scamper-cvs-20240916.tar.gz) = 2958113
scamper:
* with ping -F 0 and trace -s 0, choose a different TCP or UDP source
port if an otherwise available source port has been used in the past
5 seconds to the same destination IP and port.
* ping: add udp-sport probe method
* ping: refactor udp packet matching on datalink sockets
* allow -D when outputting to a file.
* use SO_TIMESTAMP on linux packet sockets, rather than call an ioctl,
to fix buggy linux timestamps when not using ring
* rework privsep code to be signal aware, and forward signals from
scamper's privileged process to scamper's unprivileged process via
the socketpair between the processes. i.e.,
scamper -D -U /path/to/scamper-unix-socket -e /path/to/scamper.pid
kill -HUP `cat /path/to/scamper.pid`
now works. TERM and INT also propagate from privileged to
unprivileged process. this allows the user that started scamper to
send signals to the privileged process, which it then forwards to
unprivileged process. the user who started scamper is otherwise not
able to send the unprivileged process signals, as that process
typically runs as user nobody.
* host: add -O nsid to signal queried server to include nsid OPT
record in response. parse any server-provided OPT records.
* udpprobe: record ifname replies were received on
* udpprobe: increase supported probe size from 1000 to 1400 bytes.
* factor out most repeated tls code patterns into utils_tls.c
* add functions to utils_tls.c to load key material from opened
file descriptors, to allow key material to be reloaded in
unprivileged process
* reload TLS key material on HUP signal
* do not negotiate use of TLS v1.1
* refactor privsep code to make it obvious which functions belong to
which process, and develop an obvious pattern in the code.
* make route socket interface work on NetBSD again
* tracelb: fix sport validation
* other minor code cleanups
sc_minrtt:
* thread input stage, add batch import. by default, sc_minrtt
will import N files per batch, where N is the number of processors
online.
* add -b batchc parameter that allows for batch size to be adjusted
according to what is appropriate for the system
* set exit status to zero when import is successful
* add -v to emit version of scamper release the utility came from
* refactor code in places
libscamperfile:
* bump version to account for added interfaces for udpprobe, host
objects.
Python module:
* add nsid option to ScamperCtrl.do_dns method
* add ScamperUdpprobeReply.ifname attribute
* add OPT glue to ScamperHost, and related features
(udpsize, edns_version, edns_do attributes)
* add context manager support to ScamperFile and ScamperCtrl, allowing
for Python with / as syntax
sc_bdrmap:
* change -v vp-ases option to -V vp-ases
* add -v to emit version of scamper release the utility came from
sc_attach, sc_hoiho, sc_remoted:
* add -v to emit version of scamper release the utility came from
sc_wartsdump:
* update for new udpprobe, host features.
tests:
* add unit_cmd_tracelb, contributed by Marcus Luckie.
* add unit_ping_lib, check scamper_ping_reply_is_from_target
* add unit_host_warts, check OPT record reading and writing.
* expand unit_dl_parse_ip tests
documentation:
* update python module documentation to reflect changes
* update scamper, sc_attach, sc_bdrmap, sc_hoiho, sc_minrtt,
sc_pinger, sc_remoted manual pages to reflect changes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 195 bytes
Desc: not available
URL: <http://mailman.caida.org/pipermail/scamper-announce/attachments/20240917/9c5d64c6/attachment.sig>
More information about the scamper-announce
mailing list