[scamper-announce] scamper-cvs-20240916

Matthew Luckie mjl at luckie.org.nz
Mon Sep 16 15:05:15 PDT 2024


https://www.caida.org/catalog/software/scamper/code/scamper-cvs-20240916.tar.gz

SHA256 (scamper-cvs-20240916.tar.gz) = fdb6b83dda79245cfbc79a05467d41394a354aa74c12bf5514435808440eaac5
SIZE (scamper-cvs-20240916.tar.gz) = 2958113

scamper:
* with ping -F 0 and trace -s 0, choose a different TCP or UDP source
  port if an otherwise available source port has been used in the past
  5 seconds to the same destination IP and port.
* ping: add udp-sport probe method
* ping: refactor udp packet matching on datalink sockets
* allow -D when outputting to a file.
* use SO_TIMESTAMP on linux packet sockets, rather than call an ioctl,
  to fix buggy linux timestamps when not using ring
* rework privsep code to be signal aware, and forward signals from
  scamper's privileged process to scamper's unprivileged process via
  the socketpair between the processes.  i.e.,
  scamper -D -U /path/to/scamper-unix-socket -e /path/to/scamper.pid
  kill -HUP `cat /path/to/scamper.pid`
  now works.  TERM and INT also propagate from privileged to
  unprivileged process.  this allows the user that started scamper to
  send signals to the privileged process, which it then forwards to
  unprivileged process.  the user who started scamper is otherwise not
  able to send the unprivileged process signals, as that process
  typically runs as user nobody.
* host: add -O nsid to signal queried server to include nsid OPT
  record in response.  parse any server-provided OPT records.
* udpprobe: record ifname replies were received on
* udpprobe: increase supported probe size from 1000 to 1400 bytes.
* factor out most repeated tls code patterns into utils_tls.c
* add functions to utils_tls.c to load key material from opened
  file descriptors, to allow key material to be reloaded in
  unprivileged process
* reload TLS key material on HUP signal
* do not negotiate use of TLS v1.1
* refactor privsep code to make it obvious which functions belong to
  which process, and develop an obvious pattern in the code.
* make route socket interface work on NetBSD again
* tracelb: fix sport validation
* other minor code cleanups

sc_minrtt:
* thread input stage, add batch import.  by default, sc_minrtt
  will import N files per batch, where N is the number of processors
  online.
* add -b batchc parameter that allows for batch size to be adjusted
  according to what is appropriate for the system
* set exit status to zero when import is successful
* add -v to emit version of scamper release the utility came from
* refactor code in places

libscamperfile:
* bump version to account for added interfaces for udpprobe, host
  objects.

Python module:
* add nsid option to ScamperCtrl.do_dns method
* add ScamperUdpprobeReply.ifname attribute
* add OPT glue to ScamperHost, and related features
  (udpsize, edns_version, edns_do attributes)
* add context manager support to ScamperFile and ScamperCtrl, allowing
  for Python with / as syntax

sc_bdrmap:
* change -v vp-ases option to -V vp-ases
* add -v to emit version of scamper release the utility came from

sc_attach, sc_hoiho, sc_remoted:
* add -v to emit version of scamper release the utility came from

sc_wartsdump:
* update for new udpprobe, host features.

tests:
* add unit_cmd_tracelb, contributed by Marcus Luckie.
* add unit_ping_lib, check scamper_ping_reply_is_from_target
* add unit_host_warts, check OPT record reading and writing.
* expand unit_dl_parse_ip tests

documentation:
* update python module documentation to reflect changes
* update scamper, sc_attach, sc_bdrmap, sc_hoiho, sc_minrtt,
  sc_pinger, sc_remoted manual pages to reflect changes
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 195 bytes
Desc: not available
URL: <http://mailman.caida.org/pipermail/scamper-announce/attachments/20240917/9c5d64c6/attachment.sig>


More information about the scamper-announce mailing list