[tcpreplay] tcpreplay高级用法--使用tcpreplay-edit进行循环动态发包

 

tcpreplay-edit提供了可对包进行修改的高级用法:

      --unique-ip
              Modify IP addresses each loop iteration to generate unique flows.  This option must appear in combination with the following options: loop.  This option must not appear
              in combination with any of the following options: seed, fuzz-seed.

              Ensure IPv4 and IPv6 packets will be unique for each --loop iteration.  This is done in a way that will not alter packet CRC, and therefore will genrally not affect per‐
              formance. This option will significantly increase the flows/sec over generated over multiple loop iterations.

       --unique-ip-loops=string
              Number of times to loop before assigning new unique ip.  This option may appear up to 1 times.  This option must appear in combination with the following options: unique-
              ip.

              Number of --loop iterations before a new unique IP is assigned. Default is 1. Assumes both --loop and --unique-ip.

 

原包如下:

┬─[tong@T7:~/Data]─[11:29:32 AM]
╰─>$ sudo tcpreplay-edit -i replay-br0 -t baidu.pcap 

收包如下:

[root@dpdk ~]# tcpdump -i eth1 -nn "tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) == 0"   
11:30:17.125017 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:30:17.125093 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:30:17.125124 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:30:17.125133 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0

 

使用,--uique-ip 参数可以在保证flow关系的前提下修改IP,修改策略是,源IP地址加一,目的IP地址减一

发包如下:

┬─[tong@T7:~/Data]─[11:30:17 AM]
╰─>$ sudo tcpreplay-edit -i replay-br0 -t --unique-ip -l3 baidu.pcap 

收包如下:

[root@dpdk ~]# tcpdump -i eth1 -nn "tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) == 0"   

11:30:31.745157 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:30:31.745175 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:30:31.745183 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:30:31.745186 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:30:31.745213 IP 192.168.10.55.39036 > 202.89.233.104.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:30:31.745249 IP 192.168.10.55.50724 > 203.208.39.206.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:30:31.745278 IP 192.168.10.57.43440 > 120.25.241.228.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:30:31.745292 IP 192.168.10.57.46882 > 114.55.49.181.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:30:31.745360 IP 192.168.10.54.39036 > 202.89.233.105.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:30:31.745395 IP 192.168.10.54.50724 > 203.208.39.207.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:30:31.745404 IP 192.168.10.58.43440 > 120.25.241.227.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:30:31.745406 IP 192.168.10.58.46882 > 114.55.49.180.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0

 

再增加 --unique-ip-loops=3 参数,可以增加策略复杂性,效果就是,第2次loop和第3次loop的包,与第一次loop重复,例子如下:

发包:

┬─[tong@T7:~/Data]─[11:32:58 AM]
╰─>$ sudo tcpreplay-edit -i replay-br0 -t --unique-ip --unique-ip-loops=3 -l9 baidu.pcap 

收包:

┬─[tong@T7:~/Data]─[11:32:58 AM]
╰─>$ sudo tcpreplay-edit -i replay-br0 -t --unique-ip --unique-ip-loops=3 -l9 baidu.pcap 

11:33:16.886335 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.886981 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.887154 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.887209 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.888984 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.889845 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.889931 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.889944 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.890927 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.891194 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.891251 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.891261 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.891299 IP 192.168.10.55.39036 > 202.89.233.104.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.891473 IP 192.168.10.55.50724 > 203.208.39.206.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.892247 IP 192.168.10.57.43440 > 120.25.241.228.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.892283 IP 192.168.10.57.46882 > 114.55.49.181.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.892333 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.892378 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.892419 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.893655 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.893749 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.893793 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.893831 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.893841 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.893887 IP 192.168.10.54.39036 > 202.89.233.105.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.893938 IP 192.168.10.54.50724 > 203.208.39.207.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.893979 IP 192.168.10.58.43440 > 120.25.241.227.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.893990 IP 192.168.10.58.46882 > 114.55.49.180.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.894044 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.894094 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.894135 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.894284 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0
11:33:16.894342 IP 192.168.10.56.39036 > 202.89.233.103.80: Flags [S], seq 457447575, win 29200, options [mss 1460,sackOK,TS val 1030094825 ecr 0,nop,wscale 7], length 0
11:33:16.894394 IP 192.168.10.56.50724 > 203.208.39.205.80: Flags [S], seq 1542082891, win 29200, options [mss 1460,sackOK,TS val 2360166698 ecr 0,nop,wscale 7], length 0
11:33:16.894439 IP 192.168.10.56.43440 > 120.25.241.229.80: Flags [S], seq 2289326803, win 29200, options [mss 1460,sackOK,TS val 1189064550 ecr 0,nop,wscale 7], length 0
11:33:16.894450 IP 192.168.10.56.46882 > 114.55.49.182.80: Flags [S], seq 3018541313, win 29200, options [mss 1460,sackOK,TS val 2155225803 ecr 0,nop,wscale 7], length 0

 

posted on 2017-12-29 12:05  toong  阅读(3451)  评论(0编辑  收藏  举报