Hi Fujimoto

I am generating proto==150 using Scapy tool(packet generator).
So every time I send a packet from sender_host to receiver_host with (proto
= 150 and length < 2000), it should be sent to the controller as packet_in
and store in a buffer(list) for 5 seconds according to my changes in the
code.
But, I see flow entry of both sender_host and receiver_host in the flow
table after I send the first generated packet. Also I noticed that every
packet which I generate is satisfying the proto and length conditions and
is storing in the buffer for 5 seconds and is then sent as a packet_out.
This is the behavior I don't understand, generated packets are going to
controller then how come there is entry in flow table for the hosts?

Can you please put a light on this matter.

I am sorry if it was not clear last time.

Thank You
Sheenam


On Mon, Aug 21, 2017 at 9:05 AM, Fujimoto Satoshi <
satoshi.fujimo...@gmail.com> wrote:

> Hi,
>
> Sorry, Please confirm me.
> Your problem is that, Packet-in comes for every packet which matches some
> condition(proto == 150 and total_len <= 2000),
> even though flow entry is added in OVS switch, right?
>
> I could not make your app work (I don't know how to send packets whose
> proto is 150),
> but I guess that the packet does not matches with installed flow entries.
>
> Please make sure that the packet matches with installed flows, especially
> "eth_dst".
> (You can see "eth_dst" in packets by using Wireshark or some other tools.)
>
> Or, could you let me see the flow table in your OVS?
>
>
> Thanks,
> Fujimoto
>
>
> On 2017年08月20日 20:11, Attitude Killer wrote:
>
> Hi
>
> Thanks Fujimoto for your response.
>
> I corrected that and it is running now.
> I am stuck with another problem.
> Here is the code I am running. Everything is going good but I don't
> understand why there is a flow entry added in ovs switch.  As, when a
> packet arrives it matches the if condition if proto == 150 and total_len
> <= 2000:  and generates a packet_in to the controller every time. When I
> look into the switch flow table I see entries for both sender and the
> receiver. If both sender and receiver enteries are in flow table then how
> come packet_in is being generated everytime?Can you please explain why? I
> am confused with this. Please help me.
>
>
>
> # Copyright (C) 2011 Nippon Telegraph and Telephone Corporation.
> #
> # Licensed under the Apache License, Version 2.0 (the "License");
> # you may not use this file except in compliance with the License.
> # You may obtain a copy of the License at
> #
> #    http://www.apache.org/licenses/LICENSE-2.0
> #
> # Unless required by applicable law or agreed to in writing, software
> # distributed under the License is distributed on an "AS IS" BASIS,
> # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
> # implied.
> # See the License for the specific language governing permissions and
> # limitations under the License.
>
> from ryu.base import app_manager
> from ryu.controller import ofp_event
> from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER
> from ryu.controller.handler import set_ev_cls
> from ryu.ofproto import ofproto_v1_3
> from ryu.lib.packet import packet
> from ryu.lib.packet import ethernet,ipv4,udp
> from ryu.lib.packet import ether_types
> import time
> from struct import *
>
>
> class SimpleSwitch13(app_manager.RyuApp):
>     OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]
>
>     def __init__(self, *args, **kwargs):
>         super(SimpleSwitch13, self).__init__(*args, **kwargs)
>         self.mac_to_port = {}
>         self.start_time = time.time()
>         self.iot_data = []
>         self.iot_data_size = 0
>         self.ip_ihl=5
>         self.ip_ver=4
>         self.ip_tos = 0
>         self.ip_tot_len = 0  # kernel will fill the correct total length
>         self.ip_id = 54321   #Id of this packet
>         self.ip_frag_off = 0
>         self.ip_ttl = 255
>         self.ip_proto = 0
>         self.ip_check = 0    # kernel will fill the correct checksum
>         self.ip_saddr = 0   #Spoof the source ip address if you want to
>         self.ip_daddr = 0
>         self.ip_ihl_ver = (self.ip_ver << 4) + self.ip_ihl
>
>     @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
>     def switch_features_handler(self, ev):
>         datapath = ev.msg.datapath
>         ofproto = datapath.ofproto
>         parser = datapath.ofproto_parser
>
>         # install table-miss flow entry
>         #
>         # We specify NO BUFFER to max_len of the output action due to
>         # OVS bug. At this moment, if we specify a lesser number, e.g.,
>         # 128, OVS will send Packet-In with invalid buffer_id and
>         # truncated packet data. In that case, we cannot output packets
>         # correctly.  The bug has been fixed in OVS v2.1.0.
>         match = parser.OFPMatch()
>         actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
>                                           ofproto.OFPCML_NO_BUFFER)]
>         self.add_flow(datapath, 0, match, actions)
>
>
>     def add_flow(self, datapath, priority, match, actions, buffer_id=None):
>         ofproto = datapath.ofproto
>         parser = datapath.ofproto_parser
>         inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
>                                              actions)]
>         if buffer_id:
>             mod = parser.OFPFlowMod(datapath=datapath,
> buffer_id=buffer_id,
>                                     priority=priority, match=match,
>                                     instructions=inst)
>         else:
>             mod = parser.OFPFlowMod(datapath=datapath, priority=priority,
>                                     match=match, instructions=inst)
>         datapath.send_msg(mod)
>
>     @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
>     def _packet_in_handler(self, ev):
>         # If you hit this you might want to increase
>         # the "miss_send_length" of your switch
>         if ev.msg.msg_len < ev.msg.total_len:
>             self.logger.debug("packet truncated: only %s of %s bytes",
>                               ev.msg.msg_len, ev.msg.total_len)
>         msg = ev.msg
>         datapath = msg.datapath
>         ofproto = datapath.ofproto
>         parser = datapath.ofproto_parser
>         in_port = msg.match['in_port']
>
>         pkt = packet.Packet(msg.data)
>         eth = pkt.get_protocols(ethernet.ethernet)[0]
>
>         if eth.ethertype == ether_types.ETH_TYPE_LLDP:
>             # ignore lldp packet
>             return
>         dst = eth.dst
>         src = eth.src
>
>
>         # get ipv4 packet
>         ipv4_packet = pkt.get_protocol(ipv4.ipv4)
>         if ipv4_packet:
>             proto = ipv4_packet.proto
>             total_len = ipv4_packet.total_length
>             source=ipv4_packet.src
>             destination= ipv4_packet.dst
>             print "INFORMATION:", proto
>             print total_len
>         else:
>             proto=total_len=0
>                 #ip_pkt = pkt.get_protocols(ipv4.ipv4)[3]
>                         #ip_src = ip_pkt.src
>
>
>
>         dpid = datapath.id
>         self.mac_to_port.setdefault(dpid, {})
>
>         self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port)
>         if proto == 150 and total_len <= 2000:
>                         data = msg.data
>             #print " # stores the packet data"
>                         self.iot_data.append(data)
>             #print "# increment size counter"
>                         self.iot_data_size += total_len
>                         elapsed_time = time.time() - self.start_time
>                         print "ELAPSED: ", elapsed_time
>                         print "BUFFER: ", self.iot_data
>
>                         if elapsed_time > 5 or self.iot_data_size > 3500:
>                 #if self.iot_server_mac in self.mac_to_port[dpid]:
>
>                  #out_port = self.mac_to_port[dpid][dst]
>                     #print "1st condition"
>                                 self.no_of_data=len(self.iot_data)
>                                 self.ip_proto=proto
>                                 self.ip_saddr=source
>                                 self.ip_daddr=destination
>                  ip_head= pack('!BBHHHBBH16s16s' , self.ip_ihl_ver,
> self.ip_tos, self.ip_tot_len, self.ip_id, self.ip_frag_off,
> self.ip_ttl,self.ip_check,self.ip_proto, self.ip_saddr, self.ip_daddr)
>                                 total_pkts= pack('!I', self.no_of_data)
>                                 print "TOTALLLL,,,,",self.no_of_data
>                                 ip_head="{" + ip_head + "}"
>                                 total_pkts="{" + total_pkts + "}"
>                                 s='|startofdata|'
>                                 data = s.join(self.iot_data)
>                                 data="|startofdata|" + data
>                                 pckt= ip_head + total_pkts + data
>                                 #print repr(ip_head)
>
>                                 self.iot_data = []
>                                 print "BUFFER: ", self.iot_data
>                                 self.iot_data_size = 0
>                                 self.start_time = time.time()
>
>                                 out_port = 2 #ofproto.OFPP_FLOOD
>                                 actions = [parser.OFPActionOutput(out_
> port)]
>                                 #data = ''.join(self.iot_data)
>                                 out = parser.OFPPacketOut(datapath=
> datapath,
>                                                   buffer_id=ofproto.OFP_NO_
> BUFFER,
>                                                   in_port=in_port,
> actions=actions,
>                                                  data=pckt)
>                                 print "out--->" , out
>                                 datapath.send_msg(out)
>
>
>         else:
>
>         # learn a mac address to avoid FLOOD next time.
>             self.mac_to_port[dpid][src] = in_port
>
>             if dst in self.mac_to_port[dpid]:
>                 out_port = self.mac_to_port[dpid][dst]
>             else:
>                 out_port = ofproto.OFPP_FLOOD
>
>             actions = [parser.OFPActionOutput(out_port)]
>
>         # install a flow to avoid packet_in next time
>             if out_port != ofproto.OFPP_FLOOD:
>                 match = parser.OFPMatch(in_port=in_port, eth_dst=dst)
>             # verify if we have a valid buffer_id, if yes avoid to send
> both
>             # flow_mod & packet_out
>                 if msg.buffer_id != ofproto.OFP_NO_BUFFER:
>                   self.add_flow(datapath, 1, match, actions, msg.buffer_id)
>                   return
>                 else:
>                      self.add_flow(datapath, 1, match, actions)
>             data = None
>             if msg.buffer_id == ofproto.OFP_NO_BUFFER:
>                 data = msg.data
>             out = parser.OFPPacketOut(datapath=datapath,
> buffer_id=msg.buffer_id,
>                                   in_port=in_port, actions=actions,
> data=data)
>             datapath.send_msg(out)
>
>
>
>
> Thank You
> Sheenam
>
>
>
> On Fri, Aug 18, 2017 at 12:50 PM, Fujimoto Satoshi <
> satoshi.fujimo...@gmail.com> wrote:
>
>> Hi,
>>
>> from ryu.ryu.app import simple_switch_13.py
>>
>> The above line should be removed.
>> It causes a SyntaxError and Ryu fails to load your app.
>>
>> Furthermore, other errors seem to exist in your code, such like "global
>> name 'time' is not defined".
>> Please make sure.
>>
>> Thanks,
>> Fujimoto
>>
>>
>>
>> On 2017年08月18日 12:16, Attitude Killer wrote:
>>
>> Hi
>>
>> I am trying to run a modified application of simple_switch_13.py.
>>
>> I am getting this error:
>>
>> loading app simple_switch_13.py
>> Traceback (most recent call last):
>>   File "/usr/local/bin/ryu-manager", line 9, in <module>
>>     load_entry_point('ryu==4.16', 'console_scripts', 'ryu-manager')()
>>   File "/home/server/.local/lib/python2.7/site-packages/ryu/cmd/manager.py",
>> line 98, in main
>>     app_mgr.load_apps(app_lists)
>>   File 
>> "/home/server/.local/lib/python2.7/site-packages/ryu/base/app_manager.py",
>> line 415, in load_apps
>>     cls = self.load_app(app_cls_name)
>>   File 
>> "/home/server/.local/lib/python2.7/site-packages/ryu/base/app_manager.py",
>> line 392, in load_app
>>     mod = utils.import_module(name)
>>   File "/home/server/.local/lib/python2.7/site-packages/ryu/utils.py",
>> line 106, in import_module
>>     return importlib.import_module(modname)
>>   File "/usr/lib/python2.7/importlib/__init__.py", line 37, in
>> import_module
>>     __import__(name)
>> ImportError: No module named simple_switch_13.py
>>
>>
>> This is my modified code:
>>
>> # Copyright (C) 2011 Nippon Telegraph and Telephone Corporation.
>> #
>> # Licensed under the Apache License, Version 2.0 (the "License");
>> # you may not use this file except in compliance with the License.
>> # You may obtain a copy of the License at
>> #
>> #    http://www.apache.org/licenses/LICENSE-2.0
>> #
>> # Unless required by applicable law or agreed to in writing, software
>> # distributed under the License is distributed on an "AS IS" BASIS,
>> # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
>> # implied.
>> # See the License for the specific language governing permissions and
>> # limitations under the License.
>>
>> from ryu.base import app_manager
>> from ryu.controller import ofp_event
>> from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER
>> from ryu.controller.handler import set_ev_cls
>> from ryu.ofproto import ofproto_v1_3
>> from ryu.lib.packet import packet
>> from ryu.lib.packet import ethernet
>> from ryu.lib.packet import ether_types
>> from ryu.ryu.app import simple_switch_13.py
>>
>>
>> class SimpleSwitch13(app_manager.RyuApp):
>>     OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]
>>
>>     def __init__(self, *args, **kwargs):
>>         super(SimpleSwitch13, self).__init__(*args, **kwargs)
>>         self.mac_to_port = {}
>>     self.start_time = time.time()
>>         self.iot_data = []
>>         self.iot_data_size = 0
>>         self.ip_ihl=5
>>         self.ip_ver=4
>>         self.ip_tos = 0
>>         self.ip_tot_len = 0  # kernel will fill the correct total length
>>         self.ip_id = 54321   #Id of this packet
>>         self.ip_frag_off = 0
>>         self.ip_ttl = 255
>>         self.ip_proto = 0
>>         self.ip_check = 0    # kernel will fill the correct checksum
>>         self.ip_saddr = 0   #Spoof the source ip address if you want to
>>         self.ip_daddr = 0
>>         self.ip_ihl_ver = (self.ip_ver << 4) + self.ip_ihl
>>
>>     @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
>>     def switch_features_handler(self, ev):
>>         datapath = ev.msg.datapath
>>         ofproto = datapath.ofproto
>>         parser = datapath.ofproto_parser
>>
>>         # install table-miss flow entry
>>         #
>>         # We specify NO BUFFER to max_len of the output action due to
>>         # OVS bug. At this moment, if we specify a lesser number, e.g.,
>>         # 128, OVS will send Packet-In with invalid buffer_id and
>>         # truncated packet data. In that case, we cannot output packets
>>         # correctly.  The bug has been fixed in OVS v2.1.0.
>>         match = parser.OFPMatch()
>>         actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
>>                                           ofproto.OFPCML_NO_BUFFER)]
>>         self.add_flow(datapath, 0, match, actions)
>>
>>     def add_flow(self, datapath, priority, match, actions,
>> buffer_id=None):
>>         ofproto = datapath.ofproto
>>         parser = datapath.ofproto_parser
>>
>>         inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
>>                                              actions)]
>>         if buffer_id:
>>             mod = parser.OFPFlowMod(datapath=datapath,
>> buffer_id=buffer_id,
>>                                     priority=priority, match=match,
>>                                     instructions=inst)
>>         else:
>>             mod = parser.OFPFlowMod(datapath=datapath, priority=priority,
>>                                     match=match, instructions=inst)
>>         datapath.send_msg(mod)
>>
>>     @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
>>     def _packet_in_handler(self, ev):
>>         # If you hit this you might want to increase
>>         # the "miss_send_length" of your switch
>>         if ev.msg.msg_len < ev.msg.total_len:
>>             self.logger.debug("packet truncated: only %s of %s bytes",
>>                               ev.msg.msg_len, ev.msg.total_len)
>>         msg = ev.msg
>>         datapath = msg.datapath
>>         ofproto = datapath.ofproto
>>         parser = datapath.ofproto_parser
>>         in_port = msg.match['in_port']
>>
>>         pkt = packet.Packet(msg.data)
>>         eth = pkt.get_protocols(ethernet.ethernet)[0]
>>
>>         if eth.ethertype == ether_types.ETH_TYPE_LLDP:
>>             # ignore lldp packet
>>             return
>>         dst = eth.dst
>>         src = eth.src
>>
>>         #udp
>>         udp_pkt= pkt.get_protocol(udp.udp)
>>         if udp_pkt:
>>                 total_len=udp_pkt.total_length
>>                 sr_port = udp_pkt.src_port
>>                 ds_port = udp_pkt.dst_port
>>                 print "UDPPP PORT --->" , sr_port
>>                 print "UDP DESTINATION----> ", ds_port
>>                 print "INFORMATION:UDP LENGTH:", total_len
>>         else:
>>                 total_len=0
>>
>>         # get ipv4 packet
>>         ipv4_packet = pkt.get_protocol(ipv4.ipv4)
>>         if ipv4_packet:
>>             proto = ipv4_packet.proto
>>             total_len = ipv4_packet.total_length
>>             source=ipv4_packet.src
>>             destination= ipv4_packet.dst
>>             print "INFORMATION:", proto
>>             print total_len
>>         else:
>>             proto=total_len=0
>>                 #ip_pkt = pkt.get_protocols(ipv4.ipv4)[3]
>>                         #ip_src = ip_pkt.src
>>
>> #ip_dst = ip_pkt.dst
>>
>> #               print "IP --->SOURCE:",ip_src'''
>>
>>         dpid = datapath.id
>>         self.mac_to_port.setdefault(dpid, {})
>>
>>         self.logger.info("packet in %s %s %s %s", dpid, src, dst,
>> in_port)
>>     if proto == 150 and total_len <= 2000:
>>         #if udp_pkt:
>> #       if udp_pkt and ds_port == 5006 and total_len <=2000:
>>                         data = msg.data
>>             #print " # stores the packet data"
>>                         self.iot_data.append(data)
>>             #print "# increment size counter"
>>                         self.iot_data_size += total_len
>>                         elapsed_time = time.time() - self.start_time
>>                         print "ELAPSED: ", elapsed_time
>>                         print "BUFFER: ", self.iot_data
>>
>>                         if elapsed_time > 5 or self.iot_data_size > 3500:
>>                 #if self.iot_server_mac in self.mac_to_port[dpid]:
>>
>> #          out_port = self.mac_to_port[dpid][dst]
>>                     #print "1st condition"
>>                                 self.no_of_data=len(self.iot_data)
>>                                 self.ip_proto=proto
>>                                 self.ip_saddr='10.0.11.6'
>>                                 self.ip_daddr='10.0.11.5'
>>
>>
>>                                 ip_head= pack('!BBHHHBBH16s16s' ,
>> self.ip_ihl_ver, self.ip_tos, self.ip_tot_len, self.ip_id,
>> self.ip_frag_off, self.ip_ttl,self.ip_check,self.ip_proto,
>> self.ip_saddr, self.ip_daddr)
>>                                 total_pkts= pack('!I', self.no_of_data)
>>                                 print "TOTALLLL,,,,",self.no_of_data
>>                                 ip_head="{" + ip_head + "}"
>>                                 total_pkts="{" + total_pkts + "}"
>>                                 s='|startofdata|'
>>                                 data = s.join(self.iot_data)
>>                                 data="|startofdata|" + data
>>                                 pckt= ip_head + total_pkts + data
>>                                 #print repr(ip_head)
>>
>>                 self.iot_data = []
>>                                 print "BUFFER: ", self.iot_data
>>  self.iot_data_size = 0
>>                                 self.start_time = time.time()
>>
>>                                 out_port = 2 #ofproto.OFPP_FLOOD
>>                                 actions = [parser.OFPActionOutput(out_po
>> rt)]
>>
>>
>>                                 #data = ''.join(self.iot_data)
>>
>>
>>                                 out = parser.OFPPacketOut(datapath=d
>> atapath,
>>
>> buffer_id=ofproto.OFP_NO_BUFFER,
>>                                                   in_port=in_port,
>> actions=actions,
>>                                                  data=data)
>>                                 print "out--->" , out
>>                                 datapath.send_msg(out)
>>
>>
>>     else:
>>         # learn a mac address to avoid FLOOD next time.
>>             self.mac_to_port[dpid][src] = in_port
>>
>>             if dst in self.mac_to_port[dpid]:
>>                 out_port = self.mac_to_port[dpid][dst]
>>             else:
>>                 out_port = ofproto.OFPP_FLOOD
>>
>>             actions = [parser.OFPActionOutput(out_port)]
>>
>>             # install a flow to avoid packet_in next time
>>             if out_port != ofproto.OFPP_FLOOD:
>>                 match = parser.OFPMatch(in_port=in_port, eth_dst=dst)
>>                 # verify if we have a valid buffer_id, if yes avoid to
>> send both
>>                 # flow_mod & packet_out
>>                 if msg.buffer_id != ofproto.OFP_NO_BUFFER:
>>                     self.add_flow(datapath, 1, match, actions,
>> msg.buffer_id)
>>                     return
>>                 else:
>>                     self.add_flow(datapath, 1, match, actions)
>>             data = None
>>             if msg.buffer_id == ofproto.OFP_NO_BUFFER:
>>                 data = msg.data
>>
>>             out = parser.OFPPacketOut(datapath=datapath,
>> buffer_id=msg.buffer_id,
>>                                       in_port=in_port, actions=actions,
>> data=data)
>>             datapath.send_msg(out)
>>
>> Please help me in knowing what I am doing wrong. I will appreciate your
>> help. Thank  You
>>
>> Thanks
>> Sheenam
>>
>>
>> ------------------------------------------------------------------------------
>> Check out the vibrant tech community on one of the world's most
>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>
>>
>>
>> _______________________________________________
>> Ryu-devel mailing 
>> listRyu-devel@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/ryu-devel
>>
>>
>>
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>
>
>
> _______________________________________________
> Ryu-devel mailing 
> listRyu-devel@lists.sourceforge.nethttps://lists.sourceforge.net/lists/listinfo/ryu-devel
>
>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Ryu-devel mailing list
Ryu-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to