Go Premium for a chance to win a PS4. Enter to Win


Raw Sockets - UDP client _  REQUIREMENT

Posted on 2011-03-11
Medium Priority
Last Modified: 2012-05-11
Hi Experts

I have the following requirements (on a Linux machine):

1- Spoof multiple source IP addresses (10,000):

Source and destination MAC addresses will be the same.
Source IP addresses will be taken from a text file. Destination IP address will be fixed. Transport protocol will be UDP, source and destination ports will be fixed. Packets created must be valid (checksums/CRC) because they will be sent to a real server.

2- Keep track of the number of packets sent by each IP.  To accomplish this, write a sequence number in the UDP payload - counter will be 32 bit wide. Append to the sequence number created a fixed string of characters.

3- The program should be able to generate half a million to a million of packets per second.
Frames sent will be be at the minimum 120 bytes. Each host will send 5 packets and the program will cycle through all 10,000 hosts.


4- Randomize the amount and the size of of packets sent per host. Maximum packet size will be 320 bytes long.

My preference is to use PERL if it is possible and use Raw sockets. But I am also opened to  C++ if it is an absolute requirement to get this working.

First question ( at 500 points), please indicate the modules I should use if using PERL, or if using C++
please explain your choice and why it must be done that way.

I will raise 4 other questions (at 500 points), one for each of the items described above.

Thank you

Question by:pierre-alex
  • 9
  • 5

Author Comment

ID: 35109353
Hi, I work for an Internet Service Provider. I have to design a tool to stress Core backbone equipments. We have tools that can generate far more than 1 million packets per second and can spoof multiple IP addresses,  but unfortunately they are not flexible enough to increment a sequence number inside the payload. Thus my request.
LVL 80

Accepted Solution

arnold earned 1500 total points
ID: 35110069
Here is an example of raw socket use:

It depends on the type of stress testing you are looking to perfrm, there might be a tool already.

Author Comment

ID: 35110346
Hi arnold, thank for the link. I am after UDP stress testing though.

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

LVL 80

Expert Comment

ID: 35110469
change the proto to UDP from 6 to 17
follow the link to http://www.networksorcery.com/enp/protocol/ip.htm

The issue I'm seeing is that if you alter the source IP as part of the script, you will not receive a response from the packet you sent. So not sure what you are testing.
A spoof is inevitably a one way test of a DoS.
Is the system on which you plan to run the perl script multihomed i.e. all the IPs are present?

Author Comment

ID: 35110578
arnold,  I don't need a response from the server.
 The server in question is a Syslog server receiving messages from close to 10,000 devices. The server in question has only have one IP. It receives the messages and store them to disk and that is the end of the story.

Author Comment

ID: 35111524
How would I modify the code  on the link below to send 10 packets instead of one packet?


I tried the following :

     for ($count = 10; $count >= 1; $count--)
but got error messages.


Author Comment

ID: 35112601
OK. I solved the loop part of the problem:

What I did is I populated an array:

$src_host_list[0] = '';
$src_host_list[1] = '';
$src_host_list[2] = '';

Then I did:

  for $src_host (@src_host_list)  

   #print "$src_host\n";

and that generated packets from different sources.

What I need now is to do the same with UDP. I am concerned however about the checksum  calculation ....


Author Comment

ID: 35114998

Referring to the example provided:

I have been trying to make sense of the line below so I can modify (if necessary) for UDP.

setsockopt(RAW, 0, 1, 1);

Please see below what I have found. Can you please clarify what the meaning are of LEVEL = 0
OPTNAME = 1 and how I would go about choosing options for UDP?

Sets the socket option requested. Returns undefined if there is an error. Use integer constants provided by the Socket module for LEVEL and OPNAME. Values for LEVEL can also be obtained from getprotobyname. OPTVAL might either be a packed string or an integer. An integer OPTVAL is shorthand for pack("i", OPTVAL).

Pasted from <http://perldoc.perl.org/5.8.8/functions/setsockopt.html

      The setsockopt() function shall set the option specified by the option_name argument, at the protocol level specified by the level argument, to the value pointed to by the option_value argument for the socket associated with the file descriptor specified by the socket argument.
      The level argument specifies the protocol level at which the option resides. To set options at the socket level, specify the level argument as SOL_SOCKET. To set options at other levels, supply the appropriate level identifier for the protocol controlling the option. 

For Boolean options, 0 indicates that the option is disabled and 1 indicates that the option is enabled.
Options at other protocol levels vary in format and name.

Pasted from <http://pubs.opengroup.org/onlinepubs/009695399/functions/setsockopt.html
LVL 80

Expert Comment

ID: 35116225

Chapter 7.2

You could use getprotobyname with ipproto_UDP to see what the level should be for UDP.
Level 17 is UDP.
setsockopt (socket_filehandle,17,optional,optional) will set the socket for UDP

137 is currently the higher number in use.

print "Level\tDesc\n";
while ($count<=137) {
print "$count\t$level \n";

Open in new window


Author Comment

ID: 35117922
Hi Arnold, thanks for your help.

I have been able to accomplish the first two objectives successfully, that is:

1- Spoof multiple source IP addresses (10,000) with correct calculation of checksums
2- Keep track of the number of packets sent by each IP using a 32 bit counter.

Now regarding the third objective ( send half a million packets per seconds ) I am a reaching a bottleneck somewhere.  The test server (quad processor 6 GIG of RAM running Ubuntu 64 bit) is only at 25 percent CPU utilization  and 5G free memory, but I am only getting about 85,000 packets per seconds / 88,341,000 bps

I have tried to run the script multiple times, but it seems that the amount of CPU gets divided by the different instances so I never go over 25% CPU utilization.

Is it a limitation of Perl? Problem with the network card buffers?

Any suggestion?

LVL 80

Expert Comment

ID: 35118264
I am not sure, it might be an issue with the tcp/IP stack dealing with how many entries it can keep.
Not sure whether threaded setup might increase your throughput or whether using fork() within perl is a better alternative.

Author Comment

ID: 35120121
OK, I will have a look. Thanks

Author Closing Comment

ID: 35129930
Hi Arnold

I got around the performance issue by:

1) generating udp traffic using the perl script
2_recording the outpug using tcpdump
3) replaying it using a third party tool bittwist.

I managed to generate around 350,000 pps  (a bit short of my objective ) but by combining two servers, I  should be able to get the job done.

Thanks your input


Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
The goal of the video will be to teach the user the difference and consequence of passing data by value vs passing data by reference in C++. An example of passing data by value as well as an example of passing data by reference will be be given. Bot…
The viewer will be introduced to the member functions push_back and pop_back of the vector class. The video will teach the difference between the two as well as how to use each one along with its functionality.
Suggested Courses

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question