Skip to content

autobahn-testsuite support for IPv6 #115

@Pioter44

Description

@Pioter44

Hi,

I'm testing Websocket client and server using 'autobahn-testsuite':

  • I've tested Websocket client and server with 'autobahn-testsuite' for IPv4 and everything is working

When I want to test Websocket client with 'autobahn-testsuite' for IPv6 then the Websocket client cannot connect with 'autobahn-testsuite' fuzzing server.

  • Is any one faced similar issue?
  • Does 'autobahn-testsuite' support IPv6?
  • is my fuzzingserver.json file for IPv6 correct?
    My IP settings was:
    user@user-VirtualBox:~$ ifconfig
    enp0s3: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
    inet 192.18.32.6 netmask 255.255.255.0 broadcast 192.18.32.255
    inet6 fd53:7cb8:383:4::11c prefixlen 64 scopeid 0x0
    ether 02:84:cf:3b:be:00 txqueuelen 1000 (Ethernet)

I did some investigation and it seems that 'autobahn-testsuite' fuzzing server is not working for IPv6:
a) Checking if Autobahn-testsuite is working for "localhost" IP settings in fuzzingserver.json file
I. fuzzingserver.json file
{
"url": "ws://localhost:7681",
"options": {"failByDrop": false},
"outdir": "./reports/clients",
"webport": 0,

"cases": ["1.1.1", "1.1.2", "1.1.3", "1.1.4", "1.1.5", "1.1.6", "1.1.7", "1.1.8", "1.2.1", "1.2.2", "1.2.3", "1.2.4", "1.2.5", "1.2.6", "1.2.7", "1.2.8", "2.1"],
"exclude-cases": [],
"exclude-agent-cases": {}
}

II. Running Fuzzing server
    VirtualBox:~//WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916$ wstest --mode=fuzzingserver

/home/user//WebSocket/WS_Test/Python_venvs/wstest/lib/python2.7/site-packages/OpenSSL/crypto.py:14: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.
from cryptography import utils, x509
Using implicit spec file 'fuzzingserver.json'
Loading spec from /home/user/WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916/fuzzingserver.json

Using Twisted reactor class <class 'twisted.internet.epollreactor.EPollReactor'>
Using UTF8 Validator class <type 'wsaccel.utf8validator.Utf8Validator'>
Using XOR Masker classes <type 'wsaccel.xormask.XorMaskerNull'>

Autobahn WebSocket 0.8.1/0.10.9 Fuzzing Server (Port 7681)
Ok, will run 17 test cases for any clients connecting
Cases = ['1.1.1', '1.1.2', '1.1.3', '1.1.4', '1.1.5', '1.1.6', '1.1.7', '1.1.8', '1.2.1', '1.2.2', '1.2.3', '1.2.4', '1.2.5', '1.2.6', '1.2.7', '1.2.8', '2.1']

III. Checking if Autobahn-testsuite welcom page can be reach through browser (http://192.18.32.10:7681/)
     Answer: Yes - we are getting Autobahn-testsuite welcom page with message: "AutoBahnPython 0.10.9 I'm not Web Server 
     but a WebSocket Endpoint ...."

b) Checking if Autobahn-testsuite is working for "192.18.32.10:7681" IP settings in fuzzingserver.json file
I. fuzzingserver.json file
{
"url": "ws://192.18.32.10:7681",
"options": {"failByDrop": false},
"outdir": "./reports/clients",
"webport": 0,

"cases": ["1.1.1", "1.1.2", "1.1.3", "1.1.4", "1.1.5", "1.1.6", "1.1.7", "1.1.8", "1.2.1", "1.2.2", "1.2.3", "1.2.4", "1.2.5", "1.2.6", "1.2.7", "1.2.8", "2.1"],
"exclude-cases": [],
"exclude-agent-cases": {}
}

II. Running Fuzzing server
    VirtualBox:~/WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916$ wstest --mode=fuzzingserver

/home/user/WebSocket/WS_Test/Python_venvs/wstest/lib/python2.7/site-packages/OpenSSL/crypto.py:14: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.
from cryptography import utils, x509
Using implicit spec file 'fuzzingserver.json'
Loading spec from /home/user/WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916/fuzzingserver.json

Using Twisted reactor class <class 'twisted.internet.epollreactor.EPollReactor'>
Using UTF8 Validator class <type 'wsaccel.utf8validator.Utf8Validator'>
Using XOR Masker classes <type 'wsaccel.xormask.XorMaskerNull'>

Autobahn WebSocket 0.8.1/0.10.9 Fuzzing Server (Port 7681)
Ok, will run 17 test cases for any clients connecting
Cases = ['1.1.1', '1.1.2', '1.1.3', '1.1.4', '1.1.5', '1.1.6', '1.1.7', '1.1.8', '1.2.1', '1.2.2', '1.2.3', '1.2.4', '1.2.5', '1.2.6', '1.2.7', '1.2.8', '2.1']

III. Checking if Autobahn-testsuite welcom page can be reach through browser (http://192.18.32.10:7681/)
     Answer: Yes - we are getting Autobahn-testsuite welcom page with message: "AutoBahnPython 0.10.9 I'm not Web Server 
     but a WebSocket Endpoint ...."

c) Checking if Autobahn-testsuite is working for "http://[fd53:7cb8:383:4::11c]:7681" IP settings in fuzzingserver.json file
I. fuzzingserver.json file
{
"url": "ws://[fd53:7cb8:383:4::11c]:7681",
"options": {"failByDrop": false},
"outdir": "./reports/clients",
"webport": 0,

"cases": ["1.1.1", "1.1.2", "1.1.3", "1.1.4", "1.1.5", "1.1.6", "1.1.7", "1.1.8", "1.2.1", "1.2.2", "1.2.3", "1.2.4", "1.2.5", "1.2.6", "1.2.7", "1.2.8", "2.1"],
"exclude-cases": [],
"exclude-agent-cases": {}
}

II. Running Fuzzing server
    VirtualBox:~/WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916$ wstest --mode=fuzzingserver

/home/user/WebSocket/WS_Test/Python_venvs/wstest/lib/python2.7/site-packages/OpenSSL/crypto.py:14: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.
from cryptography import utils, x509
Using implicit spec file 'fuzzingserver.json'
Loading spec from /home/user/WebSocket/WS_Test/TestClient/ModeFuzzingServer/SACID_LWS_CS5916/fuzzingserver.json

Using Twisted reactor class <class 'twisted.internet.epollreactor.EPollReactor'>
Using UTF8 Validator class <type 'wsaccel.utf8validator.Utf8Validator'>
Using XOR Masker classes <type 'wsaccel.xormask.XorMaskerNull'>

Autobahn WebSocket 0.8.1/0.10.9 Fuzzing Server (Port 7681)
Ok, will run 17 test cases for any clients connecting
Cases = ['1.1.1', '1.1.2', '1.1.3', '1.1.4', '1.1.5', '1.1.6', '1.1.7', '1.1.8', '1.2.1', '1.2.2', '1.2.3', '1.2.4', '1.2.5', '1.2.6', '1.2.7', '1.2.8', '2.1']

III. Checking if Autobahn-testsuite welcom page can be reach through browser (http://[fd53:7cb8:383:4::11c]:7681)
     Answer: NO- we are not getting Autobahn-testsuite welcom page. We are getting page with message: "Unable to connect"

Thanks,
Piotr

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions