. "$TESTDIR/def.inc" pktws_check_http() { # $1 - test function # $2 - domain [ "$NOTEST_FAKE_FAKED_HTTP" = 1 ] && { echo "SKIPPED"; return 0; } local testf=$1 domain="$2" local ok ttls attls f ff fake fooling splitf splitfs= split splits='method+2 midsld method+2,midsld' local PAYLOAD="--payload=http_req" if [ -n "$FAKE_HTTP" ]; then fake=fake_http else fake=fake_default_http fi ttls=$(seq -s ' ' $MIN_TTL $MAX_TTL) attls=$(seq -s ' ' $MIN_AUTOTTL_DELTA $MAX_AUTOTTL_DELTA) # do not test fake + multisplit if multisplit works [ "$need_fakedsplit" = 0 -a "$SCANLEVEL" != force ] || splitfs=fakedsplit # do not test fake + fakeddisorder if fakeddisorder works [ "$need_fakeddisorder" = 0 -a "$SCANLEVEL" != force ] || splitfs="${splitfs:+$splitfs }fakeddisorder" for splitf in $splitfs; do ok=0 for ttl in $ttls; do for split in $splits; do # orig-ttl=1 with start/cutoff limiter drops empty ACK packet in response to SYN,ACK. it does not reach DPI or server. # missing ACK is transmitted in the first data packet of TLS/HTTP proto for ff in $fake 0x00000000; do for f in '' "--payload=empty --out-range=s1