mirror of
https://github.com/freebsd/freebsd-src
synced 2024-07-09 12:46:43 +00:00
If we redirect a packet to localhost and it gets dummynet'd it may be re-injected later (e.g. when delayed) which means it will be passed through ip_input() again. ip_input() will then reject the packet because it's directed to the loopback address, but did not arrive on a loopback interface. Fix this by having pf set the rcvif to V_iflo if we redirect to loopback. See also: https://redmine.pfsense.org/issues/15363 Sponsored by: Rubicon Communications, LLC ("Netgate")
807 lines
22 KiB
Bash
807 lines
22 KiB
Bash
#
|
|
# SPDX-License-Identifier: BSD-2-Clause
|
|
#
|
|
# Copyright (c) 2018 Kristof Provost <kp@FreeBSD.org>
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions
|
|
# are met:
|
|
# 1. Redistributions of source code must retain the above copyright
|
|
# notice, this list of conditions and the following disclaimer.
|
|
# 2. Redistributions in binary form must reproduce the above copyright
|
|
# notice, this list of conditions and the following disclaimer in the
|
|
# documentation and/or other materials provided with the distribution.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
# SUCH DAMAGE.
|
|
|
|
. $(atf_get_srcdir)/utils.subr
|
|
|
|
common_dir=$(atf_get_srcdir)/../common
|
|
|
|
atf_test_case "v4" "cleanup"
|
|
v4_head()
|
|
{
|
|
atf_set descr 'Basic route-to test'
|
|
atf_set require.user root
|
|
}
|
|
|
|
v4_body()
|
|
{
|
|
pft_init
|
|
|
|
epair_send=$(vnet_mkepair)
|
|
ifconfig ${epair_send}a 192.0.2.1/24 up
|
|
epair_route=$(vnet_mkepair)
|
|
ifconfig ${epair_route}a 203.0.113.1/24 up
|
|
|
|
vnet_mkjail alcatraz ${epair_send}b ${epair_route}b
|
|
jexec alcatraz ifconfig ${epair_send}b 192.0.2.2/24 up
|
|
jexec alcatraz ifconfig ${epair_route}b 203.0.113.2/24 up
|
|
jexec alcatraz route add -net 198.51.100.0/24 192.0.2.1
|
|
jexec alcatraz pfctl -e
|
|
|
|
# Attempt to provoke PR 228782
|
|
pft_set_rules alcatraz "block all" "pass user 2" \
|
|
"pass out route-to (${epair_route}b 203.0.113.1) from 192.0.2.2 to 198.51.100.1 no state"
|
|
jexec alcatraz nc -w 3 -s 192.0.2.2 198.51.100.1 22
|
|
|
|
# atf wants us to not return an error, but our netcat will fail
|
|
true
|
|
}
|
|
|
|
v4_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "v6" "cleanup"
|
|
v6_head()
|
|
{
|
|
atf_set descr 'Basic route-to test (IPv6)'
|
|
atf_set require.user root
|
|
}
|
|
|
|
v6_body()
|
|
{
|
|
pft_init
|
|
|
|
epair_send=$(vnet_mkepair)
|
|
ifconfig ${epair_send}a inet6 2001:db8:42::1/64 up no_dad -ifdisabled
|
|
epair_route=$(vnet_mkepair)
|
|
ifconfig ${epair_route}a inet6 2001:db8:43::1/64 up no_dad -ifdisabled
|
|
|
|
vnet_mkjail alcatraz ${epair_send}b ${epair_route}b
|
|
jexec alcatraz ifconfig ${epair_send}b inet6 2001:db8:42::2/64 up no_dad
|
|
jexec alcatraz ifconfig ${epair_route}b inet6 2001:db8:43::2/64 up no_dad
|
|
jexec alcatraz route add -6 2001:db8:666::/64 2001:db8:42::2
|
|
jexec alcatraz pfctl -e
|
|
|
|
# Attempt to provoke PR 228782
|
|
pft_set_rules alcatraz "block all" "pass user 2" \
|
|
"pass out route-to (${epair_route}b 2001:db8:43::1) from 2001:db8:42::2 to 2001:db8:666::1 no state"
|
|
jexec alcatraz nc -6 -w 3 -s 2001:db8:42::2 2001:db8:666::1 22
|
|
|
|
# atf wants us to not return an error, but our netcat will fail
|
|
true
|
|
}
|
|
|
|
v6_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "multiwan" "cleanup"
|
|
multiwan_head()
|
|
{
|
|
atf_set descr 'Multi-WAN redirection / reply-to test'
|
|
atf_set require.user root
|
|
}
|
|
|
|
multiwan_body()
|
|
{
|
|
pft_init
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
epair_cl_one=$(vnet_mkepair)
|
|
epair_cl_two=$(vnet_mkepair)
|
|
|
|
vnet_mkjail srv ${epair_one}b ${epair_two}b
|
|
vnet_mkjail wan_one ${epair_one}a ${epair_cl_one}b
|
|
vnet_mkjail wan_two ${epair_two}a ${epair_cl_two}b
|
|
vnet_mkjail client ${epair_cl_one}a ${epair_cl_two}a
|
|
|
|
jexec client ifconfig ${epair_cl_one}a 203.0.113.1/25
|
|
jexec wan_one ifconfig ${epair_cl_one}b 203.0.113.2/25
|
|
jexec wan_one ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
jexec wan_one sysctl net.inet.ip.forwarding=1
|
|
jexec srv ifconfig ${epair_one}b 192.0.2.2/24 up
|
|
jexec client route add 192.0.2.0/24 203.0.113.2
|
|
|
|
jexec client ifconfig ${epair_cl_two}a 203.0.113.128/25
|
|
jexec wan_two ifconfig ${epair_cl_two}b 203.0.113.129/25
|
|
jexec wan_two ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec wan_two sysctl net.inet.ip.forwarding=1
|
|
jexec srv ifconfig ${epair_two}b 198.51.100.2/24 up
|
|
jexec client route add 198.51.100.0/24 203.0.113.129
|
|
|
|
jexec srv ifconfig lo0 127.0.0.1/8 up
|
|
jexec srv route add default 192.0.2.1
|
|
jexec srv sysctl net.inet.ip.forwarding=1
|
|
|
|
# Run echo server in srv jail
|
|
jexec srv /usr/sbin/inetd -p multiwan.pid $(atf_get_srcdir)/echo_inetd.conf
|
|
|
|
jexec srv pfctl -e
|
|
pft_set_rules srv \
|
|
"nat on ${epair_one}b inet from 127.0.0.0/8 to any -> (${epair_one}b)" \
|
|
"nat on ${epair_two}b inet from 127.0.0.0/8 to any -> (${epair_two}b)" \
|
|
"rdr on ${epair_one}b inet proto tcp from any to 192.0.2.2 port 7 -> 127.0.0.1 port 7" \
|
|
"rdr on ${epair_two}b inet proto tcp from any to 198.51.100.2 port 7 -> 127.0.0.1 port 7" \
|
|
"block in" \
|
|
"block out" \
|
|
"pass in quick on ${epair_one}b reply-to (${epair_one}b 192.0.2.1) inet proto tcp from any to 127.0.0.1 port 7" \
|
|
"pass in quick on ${epair_two}b reply-to (${epair_two}b 198.51.100.1) inet proto tcp from any to 127.0.0.1 port 7"
|
|
|
|
# These will always succeed, because we don't change interface to route
|
|
# correctly here.
|
|
result=$(echo "one" | jexec wan_one nc -N -w 3 192.0.2.2 7)
|
|
if [ "${result}" != "one" ]; then
|
|
atf_fail "Redirect on one failed"
|
|
fi
|
|
result=$(echo "two" | jexec wan_two nc -N -w 3 198.51.100.2 7)
|
|
if [ "${result}" != "two" ]; then
|
|
atf_fail "Redirect on two failed"
|
|
fi
|
|
|
|
result=$(echo "one" | jexec client nc -N -w 3 192.0.2.2 7)
|
|
if [ "${result}" != "one" ]; then
|
|
atf_fail "Redirect from client on one failed"
|
|
fi
|
|
|
|
# This should trigger the issue fixed in 829a69db855b48ff7e8242b95e193a0783c489d9
|
|
result=$(echo "two" | jexec client nc -N -w 3 198.51.100.2 7)
|
|
if [ "${result}" != "two" ]; then
|
|
atf_fail "Redirect from client on two failed"
|
|
fi
|
|
}
|
|
|
|
multiwan_cleanup()
|
|
{
|
|
rm -f multiwan.pid
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "multiwanlocal" "cleanup"
|
|
multiwanlocal_head()
|
|
{
|
|
atf_set descr 'Multi-WAN local origin source-based redirection / route-to test'
|
|
atf_set require.user root
|
|
}
|
|
|
|
multiwanlocal_body()
|
|
{
|
|
pft_init
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
epair_cl_one=$(vnet_mkepair)
|
|
epair_cl_two=$(vnet_mkepair)
|
|
|
|
vnet_mkjail srv1 ${epair_one}b
|
|
vnet_mkjail srv2 ${epair_two}b
|
|
vnet_mkjail wan_one ${epair_one}a ${epair_cl_one}b
|
|
vnet_mkjail wan_two ${epair_two}a ${epair_cl_two}b
|
|
vnet_mkjail client ${epair_cl_one}a ${epair_cl_two}a
|
|
|
|
jexec client ifconfig ${epair_cl_one}a 203.0.113.1/25
|
|
jexec wan_one ifconfig ${epair_cl_one}b 203.0.113.2/25
|
|
jexec wan_one ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
jexec wan_one sysctl net.inet.ip.forwarding=1
|
|
jexec srv1 ifconfig ${epair_one}b 192.0.2.2/24 up
|
|
|
|
jexec client ifconfig ${epair_cl_two}a 203.0.113.128/25
|
|
jexec wan_two ifconfig ${epair_cl_two}b 203.0.113.129/25
|
|
jexec wan_two ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec wan_two sysctl net.inet.ip.forwarding=1
|
|
jexec srv2 ifconfig ${epair_two}b 198.51.100.2/24 up
|
|
|
|
jexec client route add default 203.0.113.2
|
|
jexec srv1 route add default 192.0.2.1
|
|
jexec srv2 route add default 198.51.100.1
|
|
|
|
# Run data source in srv1 and srv2
|
|
jexec srv1 sh -c 'dd if=/dev/zero bs=1024 count=100 | nc -l 7 -w 2 -N &'
|
|
jexec srv2 sh -c 'dd if=/dev/zero bs=1024 count=100 | nc -l 7 -w 2 -N &'
|
|
|
|
jexec client pfctl -e
|
|
pft_set_rules client \
|
|
"block in" \
|
|
"block out" \
|
|
"pass out quick route-to (${epair_cl_two}a 203.0.113.129) inet proto tcp from 203.0.113.128 to any port 7" \
|
|
"pass out on ${epair_cl_one}a inet proto tcp from any to any port 7" \
|
|
"set skip on lo"
|
|
|
|
# This should work
|
|
result=$(jexec client nc -N -w 1 192.0.2.2 7 | wc -c)
|
|
if [ ${result} -ne 102400 ]; then
|
|
jexec client pfctl -ss
|
|
atf_fail "Redirect from client on one failed: ${result}"
|
|
fi
|
|
|
|
# This should trigger the issue
|
|
result=$(jexec client nc -N -w 1 -s 203.0.113.128 198.51.100.2 7 | wc -c)
|
|
jexec client pfctl -ss
|
|
if [ ${result} -ne 102400 ]; then
|
|
atf_fail "Redirect from client on two failed: ${result}"
|
|
fi
|
|
}
|
|
|
|
multiwanlocal_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "icmp_nat" "cleanup"
|
|
icmp_nat_head()
|
|
{
|
|
atf_set descr 'Test that ICMP packets are correct for route-to + NAT'
|
|
atf_set require.user root
|
|
atf_set require.progs scapy
|
|
}
|
|
|
|
icmp_nat_body()
|
|
{
|
|
pft_init
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
epair_three=$(vnet_mkepair)
|
|
|
|
vnet_mkjail gw ${epair_one}b ${epair_two}a ${epair_three}a
|
|
vnet_mkjail srv ${epair_two}b
|
|
vnet_mkjail srv2 ${epair_three}b
|
|
|
|
ifconfig ${epair_one}a 192.0.2.2/24 up
|
|
route add -net 198.51.100.0/24 192.0.2.1
|
|
jexec gw sysctl net.inet.ip.forwarding=1
|
|
jexec gw ifconfig ${epair_one}b 192.0.2.1/24 up
|
|
jexec gw ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec gw ifconfig ${epair_three}a 203.0.113.1/24 up mtu 500
|
|
jexec srv ifconfig ${epair_two}b 198.51.100.2/24 up
|
|
jexec srv route add default 198.51.100.1
|
|
jexec srv2 ifconfig ${epair_three}b 203.0.113.2/24 up mtu 500
|
|
jexec srv2 route add default 203.0.113.1
|
|
|
|
# Sanity check
|
|
atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2
|
|
|
|
jexec gw pfctl -e
|
|
pft_set_rules gw \
|
|
"nat on ${epair_two}a inet from 192.0.2.0/24 to any -> (${epair_two}a)" \
|
|
"nat on ${epair_three}a inet from 192.0.2.0/24 to any -> (${epair_three}a)" \
|
|
"pass out route-to (${epair_three}a 203.0.113.2) proto icmp icmp-type echoreq"
|
|
|
|
# Now ensure that we get an ICMP error with the correct IP addresses in it.
|
|
atf_check -s exit:0 ${common_dir}/pft_icmp_check.py \
|
|
--to 198.51.100.2 \
|
|
--fromaddr 192.0.2.2 \
|
|
--recvif ${epair_one}a \
|
|
--sendif ${epair_one}a
|
|
|
|
# ping reports the ICMP error, so check of that too.
|
|
atf_check -s exit:2 -o match:'frag needed and DF set' \
|
|
ping -D -c 1 -s 1000 198.51.100.2
|
|
}
|
|
|
|
icmp_nat_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "dummynet" "cleanup"
|
|
dummynet_head()
|
|
{
|
|
atf_set descr 'Test that dummynet applies to route-to packets'
|
|
atf_set require.user root
|
|
}
|
|
|
|
dummynet_body()
|
|
{
|
|
dummynet_init
|
|
|
|
epair_srv=$(vnet_mkepair)
|
|
epair_gw=$(vnet_mkepair)
|
|
|
|
vnet_mkjail srv ${epair_srv}a
|
|
jexec srv ifconfig ${epair_srv}a 192.0.2.1/24 up
|
|
jexec srv route add default 192.0.2.2
|
|
|
|
vnet_mkjail gw ${epair_srv}b ${epair_gw}a
|
|
jexec gw ifconfig ${epair_srv}b 192.0.2.2/24 up
|
|
jexec gw ifconfig ${epair_gw}a 198.51.100.1/24 up
|
|
jexec gw sysctl net.inet.ip.forwarding=1
|
|
|
|
ifconfig ${epair_gw}b 198.51.100.2/24 up
|
|
route add -net 192.0.2.0/24 198.51.100.1
|
|
|
|
# Sanity check
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
|
|
jexec gw dnctl pipe 1 config delay 1200
|
|
pft_set_rules gw \
|
|
"pass out route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe 1"
|
|
jexec gw pfctl -e
|
|
|
|
# The ping request will pass, but take 1.2 seconds
|
|
# So this works:
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1
|
|
# But this times out:
|
|
atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
|
|
# return path dummynet
|
|
pft_set_rules gw \
|
|
"pass out route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe (0, 1)"
|
|
|
|
# The ping request will pass, but take 1.2 seconds
|
|
# So this works:
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1
|
|
# But this times out:
|
|
atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
}
|
|
|
|
dummynet_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "dummynet_in" "cleanup"
|
|
dummynet_in_head()
|
|
{
|
|
atf_set descr 'Thest that dummynet works as expected on pass in route-to packets'
|
|
atf_set require.user root
|
|
}
|
|
|
|
dummynet_in_body()
|
|
{
|
|
dummynet_init
|
|
|
|
epair_srv=$(vnet_mkepair)
|
|
epair_gw=$(vnet_mkepair)
|
|
|
|
vnet_mkjail srv ${epair_srv}a
|
|
jexec srv ifconfig ${epair_srv}a 192.0.2.1/24 up
|
|
jexec srv route add default 192.0.2.2
|
|
|
|
vnet_mkjail gw ${epair_srv}b ${epair_gw}a
|
|
jexec gw ifconfig ${epair_srv}b 192.0.2.2/24 up
|
|
jexec gw ifconfig ${epair_gw}a 198.51.100.1/24 up
|
|
jexec gw sysctl net.inet.ip.forwarding=1
|
|
|
|
ifconfig ${epair_gw}b 198.51.100.2/24 up
|
|
route add -net 192.0.2.0/24 198.51.100.1
|
|
|
|
# Sanity check
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
|
|
jexec gw dnctl pipe 1 config delay 1200
|
|
pft_set_rules gw \
|
|
"pass in route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe 1"
|
|
jexec gw pfctl -e
|
|
|
|
# The ping request will pass, but take 1.2 seconds
|
|
# So this works:
|
|
echo "Expect 1.2 s"
|
|
ping -c 1 192.0.2.1
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1
|
|
# But this times out:
|
|
atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
|
|
# return path dummynet
|
|
pft_set_rules gw \
|
|
"pass in route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe (0, 1)"
|
|
|
|
# The ping request will pass, but take 1.2 seconds
|
|
# So this works:
|
|
echo "Expect 1.2 s"
|
|
ping -c 1 192.0.2.1
|
|
atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1
|
|
# But this times out:
|
|
atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1
|
|
}
|
|
|
|
dummynet_in_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "ifbound" "cleanup"
|
|
ifbound_head()
|
|
{
|
|
atf_set descr 'Test that route-to states bind the expected interface'
|
|
atf_set require.user root
|
|
}
|
|
|
|
ifbound_body()
|
|
{
|
|
pft_init
|
|
|
|
j="route_to:ifbound"
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
ifconfig ${epair_one}b up
|
|
|
|
vnet_mkjail ${j}2 ${epair_two}b
|
|
jexec ${j}2 ifconfig ${epair_two}b inet 198.51.100.2/24 up
|
|
jexec ${j}2 ifconfig ${epair_two}b inet alias 203.0.113.1/24
|
|
jexec ${j}2 route add default 198.51.100.1
|
|
|
|
vnet_mkjail $j ${epair_one}a ${epair_two}a
|
|
jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec $j route add default 192.0.2.2
|
|
|
|
jexec $j pfctl -e
|
|
pft_set_rules $j \
|
|
"set state-policy if-bound" \
|
|
"block" \
|
|
"pass out route-to (${epair_two}a 198.51.100.2)"
|
|
|
|
atf_check -s exit:0 -o ignore \
|
|
jexec $j ping -c 3 203.0.113.1
|
|
}
|
|
|
|
ifbound_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "ifbound_v6" "cleanup"
|
|
ifbound_v6_head()
|
|
{
|
|
atf_set descr 'Test that route-to states for IPv6 bind the expected interface'
|
|
atf_set require.user root
|
|
}
|
|
|
|
ifbound_v6_body()
|
|
{
|
|
pft_init
|
|
|
|
j="route_to:ifbound_v6"
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
ifconfig ${epair_one}b up
|
|
|
|
vnet_mkjail ${j}2 ${epair_two}b
|
|
jexec ${j}2 ifconfig ${epair_two}b inet6 2001:db8:1::2/64 up no_dad
|
|
jexec ${j}2 ifconfig ${epair_two}b inet6 alias 2001:db8:2::1/64 no_dad
|
|
jexec ${j}2 route -6 add default 2001:db8:1::1
|
|
|
|
vnet_mkjail $j ${epair_one}a ${epair_two}a
|
|
jexec $j ifconfig ${epair_one}a inet6 2001:db8::1/64 up no_dad
|
|
jexec $j ifconfig ${epair_two}a inet6 2001:db8:1::1/64 up no_dad
|
|
jexec $j route -6 add default 2001:db8::2
|
|
|
|
jexec $j ping6 -c 3 2001:db8:1::2
|
|
|
|
jexec $j pfctl -e
|
|
pft_set_rules $j \
|
|
"set state-policy if-bound" \
|
|
"block" \
|
|
"pass inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \
|
|
"pass out route-to (${epair_two}a 2001:db8:1::2)"
|
|
|
|
atf_check -s exit:0 -o ignore \
|
|
jexec $j ping6 -c 3 2001:db8:2::1
|
|
}
|
|
|
|
ifbound_v6_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "ifbound_reply_to" "cleanup"
|
|
ifbound_reply_to_head()
|
|
{
|
|
atf_set descr 'Test that reply-to states bind to the expected interface'
|
|
atf_set require.user root
|
|
}
|
|
|
|
ifbound_reply_to_body()
|
|
{
|
|
pft_init
|
|
|
|
j="route_to:ifbound_reply_to"
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
ifconfig ${epair_one}b inet 192.0.2.2/24 up
|
|
ifconfig ${epair_two}b up
|
|
|
|
vnet_mkjail $j ${epair_one}a ${epair_two}a
|
|
jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec $j route add default 198.51.100.254
|
|
|
|
jexec $j pfctl -e
|
|
pft_set_rules $j \
|
|
"set state-policy if-bound" \
|
|
"block" \
|
|
"pass in on ${epair_one}a reply-to (${epair_one}a 192.0.2.2) inet from any to 192.0.2.0/24 keep state"
|
|
|
|
atf_check -s exit:0 -o ignore \
|
|
ping -c 3 192.0.2.1
|
|
|
|
atf_check -s exit:0 \
|
|
${common_dir}/pft_ping.py \
|
|
--to 192.0.2.1 \
|
|
--from 203.0.113.2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
# pft_ping uses the same ID every time, so this will look like more traffic in the same state
|
|
atf_check -s exit:0 \
|
|
${common_dir}/pft_ping.py \
|
|
--to 192.0.2.1 \
|
|
--from 203.0.113.2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
jexec $j pfctl -ss -vv
|
|
}
|
|
|
|
ifbound_reply_to_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "ifbound_reply_to_v6" "cleanup"
|
|
ifbound_reply_to_v6_head()
|
|
{
|
|
atf_set descr 'Test that reply-to states bind to the expected interface for IPv6'
|
|
atf_set require.user root
|
|
}
|
|
|
|
ifbound_reply_to_v6_body()
|
|
{
|
|
pft_init
|
|
|
|
j="route_to:ifbound_reply_to_v6"
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
|
|
vnet_mkjail ${j}s ${epair_one}b ${epair_two}b
|
|
jexec ${j}s ifconfig ${epair_one}b inet6 2001:db8::2/64 up no_dad
|
|
jexec ${j}s ifconfig ${epair_two}b up
|
|
#jexec ${j}s route -6 add default 2001:db8::1
|
|
|
|
vnet_mkjail $j ${epair_one}a ${epair_two}a
|
|
jexec $j ifconfig ${epair_one}a inet6 2001:db8::1/64 up no_dad
|
|
jexec $j ifconfig ${epair_two}a inet6 2001:db8:1::1/64 up no_dad
|
|
jexec $j route -6 add default 2001:db8:1::254
|
|
|
|
jexec $j pfctl -e
|
|
pft_set_rules $j \
|
|
"set state-policy if-bound" \
|
|
"block" \
|
|
"pass quick inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \
|
|
"pass in on ${epair_one}a reply-to (${epair_one}a 2001:db8::2) inet6 from any to 2001:db8::/64 keep state"
|
|
|
|
atf_check -s exit:0 -o ignore \
|
|
jexec ${j}s ping6 -c 3 2001:db8::1
|
|
|
|
atf_check -s exit:0 \
|
|
jexec ${j}s ${common_dir}/pft_ping.py \
|
|
--to 2001:db8::1 \
|
|
--from 2001:db8:2::2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
# pft_ping uses the same ID every time, so this will look like more traffic in the same state
|
|
atf_check -s exit:0 \
|
|
jexec ${j}s ${common_dir}/pft_ping.py \
|
|
--to 2001:db8::1 \
|
|
--from 2001:db8:2::2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
jexec $j pfctl -ss -vv
|
|
}
|
|
|
|
ifbound_reply_to_v6_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "ifbound_reply_to_rdr_dummynet" "cleanup"
|
|
ifbound_reply_to_rdr_dummynet_head()
|
|
{
|
|
atf_set descr 'Test that reply-to states bind to the expected non-default-route interface after rdr and dummynet'
|
|
atf_set require.user root
|
|
}
|
|
|
|
ifbound_reply_to_rdr_dummynet_body()
|
|
{
|
|
dummynet_init
|
|
|
|
j="route_to:ifbound_reply_to_rdr_dummynet"
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
ifconfig ${epair_one}b inet 192.0.2.2/24 up
|
|
ifconfig ${epair_two}b up
|
|
|
|
vnet_mkjail $j ${epair_one}a ${epair_two}a
|
|
jexec $j ifconfig lo0 inet 127.0.0.1/8 up
|
|
jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec $j route add default 198.51.100.254
|
|
|
|
jexec $j pfctl -e
|
|
jexec $j dnctl pipe 1 config delay 1
|
|
pft_set_rules $j \
|
|
"set state-policy if-bound" \
|
|
"rdr on ${epair_one}a proto icmp from any to 192.0.2.1 -> 127.0.0.1" \
|
|
"rdr on ${epair_two}a proto icmp from any to 198.51.100.1 -> 127.0.0.1" \
|
|
"match in on ${epair_one}a inet all dnpipe (1, 1)" \
|
|
"pass in on ${epair_one}a reply-to (${epair_one}a 192.0.2.2) inet from any to 127.0.0.1 keep state"
|
|
|
|
atf_check -s exit:0 -o ignore \
|
|
ping -c 3 192.0.2.1
|
|
|
|
atf_check -s exit:0 \
|
|
${common_dir}/pft_ping.py \
|
|
--to 192.0.2.1 \
|
|
--from 203.0.113.2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
# pft_ping uses the same ID every time, so this will look like more traffic in the same state
|
|
atf_check -s exit:0 \
|
|
${common_dir}/pft_ping.py \
|
|
--to 192.0.2.1 \
|
|
--from 203.0.113.2 \
|
|
--sendif ${epair_one}b \
|
|
--replyif ${epair_one}b
|
|
|
|
jexec $j pfctl -sr -vv
|
|
jexec $j pfctl -ss -vv
|
|
}
|
|
|
|
ifbound_reply_to_rdr_dummynet_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "dummynet_frag" "cleanup"
|
|
dummynet_frag_head()
|
|
{
|
|
atf_set descr 'Test fragmentation with route-to and dummynet'
|
|
atf_set require.user root
|
|
}
|
|
|
|
dummynet_frag_body()
|
|
{
|
|
pft_init
|
|
dummynet_init
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
|
|
ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
|
|
vnet_mkjail alcatraz ${epair_one}b ${epair_two}a
|
|
jexec alcatraz ifconfig ${epair_one}b 192.0.2.2/24 up
|
|
jexec alcatraz ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec alcatraz sysctl net.inet.ip.forwarding=1
|
|
|
|
vnet_mkjail singsing ${epair_two}b
|
|
jexec singsing ifconfig ${epair_two}b 198.51.100.2/24 up
|
|
jexec singsing route add default 198.51.100.1
|
|
|
|
route add 198.51.100.0/24 192.0.2.2
|
|
|
|
jexec alcatraz dnctl pipe 1 config bw 1000Byte/s burst 4500
|
|
jexec alcatraz dnctl pipe 2 config
|
|
# This second pipe ensures that the pf_test(PF_OUT) call in pf_route() doesn't
|
|
# delay packets in dummynet (by inheriting pipe 1 from the input rule).
|
|
|
|
jexec alcatraz pfctl -e
|
|
pft_set_rules alcatraz \
|
|
"set reassemble yes" \
|
|
"pass in route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq dnpipe 1" \
|
|
"pass out dnpipe 2"
|
|
|
|
|
|
atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2
|
|
atf_check -s exit:0 -o ignore ping -c 1 -s 4000 198.51.100.2
|
|
}
|
|
|
|
dummynet_frag_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_test_case "dummynet_double" "cleanup"
|
|
dummynet_double_head()
|
|
{
|
|
atf_set descr 'Ensure dummynet is not applied multiple times'
|
|
atf_set require.user root
|
|
}
|
|
|
|
dummynet_double_body()
|
|
{
|
|
pft_init
|
|
dummynet_init
|
|
|
|
epair_one=$(vnet_mkepair)
|
|
epair_two=$(vnet_mkepair)
|
|
|
|
ifconfig ${epair_one}a 192.0.2.1/24 up
|
|
|
|
vnet_mkjail alcatraz ${epair_one}b ${epair_two}a
|
|
jexec alcatraz ifconfig ${epair_one}b 192.0.2.2/24 up
|
|
jexec alcatraz ifconfig ${epair_two}a 198.51.100.1/24 up
|
|
jexec alcatraz sysctl net.inet.ip.forwarding=1
|
|
|
|
vnet_mkjail singsing ${epair_two}b
|
|
jexec singsing ifconfig ${epair_two}b 198.51.100.2/24 up
|
|
jexec singsing route add default 198.51.100.1
|
|
|
|
route add 198.51.100.0/24 192.0.2.2
|
|
|
|
jexec alcatraz dnctl pipe 1 config delay 800
|
|
|
|
jexec alcatraz pfctl -e
|
|
pft_set_rules alcatraz \
|
|
"set reassemble yes" \
|
|
"nat on ${epair_two}a from 192.0.2.0/24 -> (${epair_two}a)" \
|
|
"pass in route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq dnpipe (1, 1)" \
|
|
"pass out route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq"
|
|
|
|
ping -c 1 198.51.100.2
|
|
jexec alcatraz pfctl -sr -vv
|
|
jexec alcatraz pfctl -ss -vv
|
|
|
|
# We expect to be delayed 1.6 seconds, so timeout of two seconds passes, but
|
|
# timeout of 1 does not.
|
|
atf_check -s exit:0 -o ignore ping -t 2 -c 1 198.51.100.2
|
|
atf_check -s exit:2 -o ignore ping -t 1 -c 1 198.51.100.2
|
|
}
|
|
|
|
dummynet_double_cleanup()
|
|
{
|
|
pft_cleanup
|
|
}
|
|
|
|
atf_init_test_cases()
|
|
{
|
|
atf_add_test_case "v4"
|
|
atf_add_test_case "v6"
|
|
atf_add_test_case "multiwan"
|
|
atf_add_test_case "multiwanlocal"
|
|
atf_add_test_case "icmp_nat"
|
|
atf_add_test_case "dummynet"
|
|
atf_add_test_case "dummynet_in"
|
|
atf_add_test_case "ifbound"
|
|
atf_add_test_case "ifbound_v6"
|
|
atf_add_test_case "ifbound_reply_to"
|
|
atf_add_test_case "ifbound_reply_to_v6"
|
|
atf_add_test_case "ifbound_reply_to_rdr_dummynet"
|
|
atf_add_test_case "dummynet_frag"
|
|
atf_add_test_case "dummynet_double"
|
|
}
|