Before, the source_port_list(and therefore user-specified source-ports) were simply ignored.
Now it actually uses the user-specified source ports.
This can either be a single port, a list of ports or a port-range.
If the user specifies source ports, a random source-port for each attacker-packet is chosen from that list.
This also adds a testcase which specifies a portrange.
This addresses the fixme in DDoSAttack:
Before, the source_port_list(and therefore user-specified source-ports) were simply ignored.
Now it actually uses the user-specified source ports.
This can either be a single port, a list of ports or a port-range.
If the user specifies source ports, a random source-port for each attacker-packet is chosen from that list.
This also adds a testcase which specifies a portrange.
This addresses the fixme in DDoSAttack:
Before, the source_port_list(and therefore user-specified source-ports) were simply ignored. Now it actually uses the user-specified source ports. This can either be a single port, a list of ports or a port-range. If the user specifies source ports, a random source-port for each attacker-packet is chosen from that list.
This also adds a testcase which specifies a portrange.
This is a nice change.