Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/tests/net/if_ipsec Add ATF for NAT-T enabled ipsecif(4).



details:   https://anonhg.NetBSD.org/src/rev/d1b9af504163
branches:  trunk
changeset: 995496:d1b9af504163
user:      knakahara <knakahara%NetBSD.org@localhost>
date:      Tue Dec 25 03:54:44 2018 +0000

description:
Add ATF for NAT-T enabled ipsecif(4).

diffstat:

 distrib/sets/lists/tests/mi        |    3 +-
 tests/net/if_ipsec/Makefile        |    4 +-
 tests/net/if_ipsec/t_ipsec_natt.sh |  441 +++++++++++++++++++++++++++++++++++++
 3 files changed, 445 insertions(+), 3 deletions(-)

diffs (truncated from 479 to 300 lines):

diff -r 1f2852362f6d -r d1b9af504163 distrib/sets/lists/tests/mi
--- a/distrib/sets/lists/tests/mi       Tue Dec 25 03:38:59 2018 +0000
+++ b/distrib/sets/lists/tests/mi       Tue Dec 25 03:54:44 2018 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: mi,v 1.800 2018/12/24 21:42:05 thorpej Exp $
+# $NetBSD: mi,v 1.801 2018/12/25 03:54:44 knakahara Exp $
 #
 # Note: don't delete entries from here - mark them as "obsolete" instead.
 #
@@ -3336,6 +3336,7 @@
 ./usr/tests/net/if_ipsec/Atffile               tests-net-tests         atf,rump
 ./usr/tests/net/if_ipsec/Kyuafile              tests-net-tests         atf,rump,kyua
 ./usr/tests/net/if_ipsec/t_ipsec               tests-net-tests         atf,rump
+./usr/tests/net/if_ipsec/t_ipsec_natt          tests-net-tests         atf,rump
 ./usr/tests/net/if_l2tp                                tests-net-tests         compattestfile,atf
 ./usr/tests/net/if_l2tp/Atffile                        tests-net-tests         atf,rump
 ./usr/tests/net/if_l2tp/Kyuafile               tests-net-tests         atf,rump,kyua
diff -r 1f2852362f6d -r d1b9af504163 tests/net/if_ipsec/Makefile
--- a/tests/net/if_ipsec/Makefile       Tue Dec 25 03:38:59 2018 +0000
+++ b/tests/net/if_ipsec/Makefile       Tue Dec 25 03:54:44 2018 +0000
@@ -1,11 +1,11 @@
-# $NetBSD: Makefile,v 1.1 2018/01/10 11:06:06 knakahara Exp $
+# $NetBSD: Makefile,v 1.2 2018/12/25 03:54:44 knakahara Exp $
 #
 
 .include <bsd.own.mk>
 
 TESTSDIR=      ${TESTSBASE}/net/if_ipsec
 
-.for name in ipsec
+.for name in ipsec ipsec_natt
 TESTS_SH+=             t_${name}
 TESTS_SH_SRC_t_${name}=        ../net_common.sh t_${name}.sh \
        ../ipsec/common.sh ../ipsec/algorithms.sh
diff -r 1f2852362f6d -r d1b9af504163 tests/net/if_ipsec/t_ipsec_natt.sh
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/tests/net/if_ipsec/t_ipsec_natt.sh        Tue Dec 25 03:54:44 2018 +0000
@@ -0,0 +1,441 @@
+#      $NetBSD: t_ipsec_natt.sh,v 1.1 2018/12/25 03:54:44 knakahara Exp $
+#
+# Copyright (c) 2018 Internet Initiative Japan Inc.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+#    notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+#    notice, this list of conditions and the following disclaimer in the
+#    documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+# POSSIBILITY OF SUCH DAMAGE.
+#
+
+SOCK_LOCAL=unix://ipsec_natt_local
+SOCK_NAT=unix://ipsec_natt_nat
+SOCK_REMOTE=unix://ipsec_natt_remote
+BUS_LOCAL=./bus_ipsec_natt_local
+BUS_NAT=./bus_ipsec_natt_nat
+
+DEBUG=${DEBUG:-false}
+HIJACKING_NPF="${HIJACKING},blanket=/dev/npf"
+
+setup_servers()
+{
+
+       rump_server_crypto_start $SOCK_LOCAL netipsec ipsec
+       rump_server_npf_start $SOCK_NAT
+       rump_server_crypto_start $SOCK_REMOTE netipsec ipsec
+       rump_server_add_iface $SOCK_LOCAL shmif0 $BUS_LOCAL
+       rump_server_add_iface $SOCK_NAT shmif0 $BUS_LOCAL
+       rump_server_add_iface $SOCK_NAT shmif1 $BUS_NAT
+       rump_server_add_iface $SOCK_REMOTE shmif0 $BUS_NAT
+}
+
+setup_ipsecif()
+{
+       local sock=$1
+       local ifid=$2
+       local src_ip=$3
+       local src_port=$4
+       local dst_ip=$5
+       local dst_port=$6
+       local ipsecif_ip=$7
+       local peer_ip=$8
+
+       export RUMP_SERVER=$sock
+       atf_check -s exit:0 rump.ifconfig ipsec$ifid create
+       atf_check -s exit:0 rump.ifconfig ipsec$ifid link0 # enable NAT-T
+       atf_check -s exit:0 rump.ifconfig ipsec$ifid tunnel ${src_ip},${src_port} ${dst_ip},${dst_port}
+       atf_check -s exit:0 rump.ifconfig ipsec$ifid ${ipsecif_ip}/32
+       atf_check -s exit:0 -o ignore \
+           rump.route -n add ${peer_ip}/32 $ipsecif_ip
+}
+
+add_sa()
+{
+       local sock=$1
+       local proto=$2
+       local algo_args="$3"
+       local src_ip=$4
+       local src_port=$5
+       local dst_ip=$6
+       local dst_port=$7
+       local out_spi=$8
+       local in_spi=$9
+       local tmpfile=./tmp
+
+       export RUMP_SERVER=$sock
+       cat > $tmpfile <<-EOF
+       add $src_ip [$src_port] $dst_ip [$dst_port] $proto $out_spi -m transport $algo_args;
+       add $dst_ip [$dst_port] $src_ip [$src_port] $proto $in_spi -m transport $algo_args;
+       EOF
+       $DEBUG && cat $tmpfile
+       atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
+       # XXX it can be expired if $lifetime is very short
+       #check_sa_entries $SOCK_LOCAL $ip_local $ip_remote
+}
+
+prepare_file()
+{
+       local file=$1
+       local data="0123456789"
+
+       touch $file
+       for i in `seq 1 512`
+       do
+               echo $data >> $file
+       done
+}
+
+build_npf_conf()
+{
+       local outfile=$1
+       local localnet=$2
+
+       cat > $outfile <<-EOF
+       set bpf.jit off
+       \$int_if = inet4(shmif0)
+       \$ext_if = inet4(shmif1)
+       \$localnet = { $localnet }
+       map \$ext_if dynamic \$localnet -> \$ext_if
+       group "external" on \$ext_if {
+               pass stateful out final all
+       }
+       group "internal" on \$int_if {
+               block in all
+               pass in final from \$localnet
+               pass out final all
+       }
+       group default {
+               pass final on lo0 all
+               block all
+       }
+       EOF
+}
+
+PIDSFILE=./terminator.pids
+start_natt_terminator()
+{
+       local sock=$1
+       local ip=$2
+       local port=$3
+       local pidsfile=$4
+       local backup=$RUMP_SERVER
+       local pid=
+       local terminator="$(atf_get_srcdir)/../ipsec/natt_terminator"
+
+       export RUMP_SERVER=$sock
+
+       env LD_PRELOAD=/usr/lib/librumphijack.so \
+           $terminator $ip $port &
+       pid=$!
+       if [ ! -f $PIDSFILE ]; then
+               touch $PIDSFILE
+       fi
+       echo $pid >> $PIDSFILE
+
+       $DEBUG && rump.netstat -a -f inet
+
+       export RUMP_SERVER=$backup
+
+       sleep 1
+}
+
+stop_natt_terminators()
+{
+       local pid=
+
+       if [ ! -f $PIDSFILE ]; then
+               return
+       fi
+
+       for pid in $(cat $PIDSFILE); do
+               kill -9 $pid
+       done
+       rm -f $PIDSFILE
+}
+
+check_ping_packets()
+{
+       local sock=$1
+       local bus=$2
+       local from_ip=$3
+       local to_ip=$4
+
+       local outfile=./out.ping
+
+       extract_new_packets $bus > $outfile
+
+       export RUMP_SERVER=$sock
+       atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $to_ip
+
+       extract_new_packets $bus > $outfile
+       $DEBUG && cat $outfile
+       atf_check -s exit:0 \
+           -o match:"$from_ip > $to_ip: ICMP echo request" \
+           cat $outfile
+       atf_check -s exit:0 \
+           -o match:"$to_ip > $from_ip: ICMP echo reply" \
+           cat $outfile
+}
+
+check_ping_packets_over_ipsecif()
+{
+       local sock=$1
+       local bus=$2
+       local to_ip=$3
+       local nat_from_ip=$4
+       local nat_from_port=$5
+       local nat_to_ip=$6
+       local nat_to_port=$7
+
+       local outfile=./out.ping_over_ipsecif
+
+       extract_new_packets $bus > $outfile
+
+       export RUMP_SERVER=$sock
+       atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 7 $to_ip
+
+       # Check both ports and UDP encapsulation
+       extract_new_packets $bus > $outfile
+       $DEBUG && cat $outfile
+       atf_check -s exit:0 \
+           -o match:"${nat_from_ip}\.$nat_from_port > ${nat_to_ip}\.${nat_to_port}: UDP-encap" \
+           cat $outfile
+       atf_check -s exit:0 \
+           -o match:"${nat_to_ip}\.${nat_to_port} > ${nat_from_ip}\.${nat_from_port}: UDP-encap" \
+           cat $outfile
+}
+
+check_tcp_com_prepare()
+{
+       local server_sock=$1
+       local client_sock=$2
+       local bus=$3
+       local to_ip=$4
+       local nat_from_ip=$5
+       local nat_to_ip=$6
+
+       local outfile=./out.prepare
+       local file_send=./file.send.prepare
+       local file_recv=./file.recv.prepare
+
+       extract_new_packets $bus > $outfile
+
+       start_nc_server $server_sock 4501 $file_recv ipv4
+
+       prepare_file $file_send
+       export RUMP_SERVER=$client_sock
+       atf_check -s exit:0 $HIJACKING nc -w 3 $to_ip 4501 < $file_send
+       atf_check -s exit:0 diff -q $file_send $file_recv
+       extract_new_packets $bus > $outfile
+       $DEBUG && cat $outfile
+       atf_check -s exit:0 \
+           -o match:"${nat_from_ip}\.[0-9]+ > ${nat_to_ip}\.4501" \
+           cat $outfile
+       atf_check -s exit:0 \
+           -o match:"${nat_to_ip}\.4501 > ${nat_from_ip}\.[0-9]+" \
+           cat $outfile
+
+       stop_nc_server
+}
+
+check_tcp_com_over_ipsecif()
+{
+       local server_sock=$1
+       local client_sock=$2
+       local bus=$3



Home | Main Index | Thread Index | Old Index