Project

General

Profile

Actions

Feature #310

open

tpmeter: convert any provided address to proper originator address

Added by Martin Weinelt about 8 years ago. Updated about 1 year ago.

Status:
New
Priority:
Low
Target version:
-
Start date:
11/04/2016
Due date:
% Done:

0%

Estimated time:

Description

# batctl -m ffda-bat n
[B.A.T.M.A.N. adv 2016.4, MainIF/MAC: ffda-vpn/56:a3:b3:8b:aa:e4 (ffda-bat/2a:a9:cb:dd:79:4e BATMAN_IV)]
IF             Neighbor              last-seen
     ffda-vpn      da:ff:61:00:05:03    0.240s
     ffda-vpn      da:ff:61:00:02:03    0.540s
          en1      42:f7:31:6f:6c:c8    0.600s
# batctl -m ffda-bat tp da:ff:61:00:05:03  
Test duration 10110ms.
Sent 0 Bytes.
Throughput: 0 Bytes/s (0 Bps)
# batctl -m ffda-bat tp da:ff:61:00:02:03 
Test duration 10110ms.
Sent 0 Bytes.
Throughput: 0 Bytes/s (0 Bps)

All hosts involved are running batman-adv 2016.4. The local host from where I'm running the tpmeter has the following setup:

# ip netns exec ffda ip link
1: lo: <LOOPBACK> mtu 65536 qdisc noop state DOWN mode DEFAULT group default qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: ffda-bat: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master ffda-br state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether 2a:a9:cb:dd:79:4e brd ff:ff:ff:ff:ff:ff
3: en1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel master ffda-bat state UP mode DEFAULT group default qlen 1000
    link/ether 00:25:90:0e:66:41 brd ff:ff:ff:ff:ff:ff
4: ffda-br: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether 2a:a9:cb:dd:79:4e brd ff:ff:ff:ff:ff:ff
11: ffda-vpn: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1280 qdisc fq_codel master ffda-bat state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether 56:a3:b3:8b:aa:e4 brd ff:ff:ff:ff:ff:ff

where
  • ffda-bat is the batman-adv if
  • ffda-vpn is a fastd tunnel with 1280 MTU
  • en1 is a hardlink connecting a local router
  • ffda-br is a bridge wrapping the ffda-bat if

There is no firewalling set up:

# ip netns exec ffda iptables-save
# Generated by iptables-save v1.6.0 on Fri Nov  4 15:34:37 2016
*filter
:INPUT ACCEPT [17646:4553404]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1482:94244]
COMMIT
# Completed on Fri Nov  4 15:34:37 2016


Files

Actions

Also available in: Atom PDF