aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorKristof Provost <kp@FreeBSD.org>2018-07-14 21:32:32 +0000
committerKristof Provost <kp@FreeBSD.org>2018-07-14 21:32:32 +0000
commit6e0bca03bd838aef7d5c64cd0fdf3068c66f8eb0 (patch)
tree0801698f641ca868a0e876a10087b8757ac60136 /tests
parentafeed44dc57e9aef89d97cf52dbf27ae2ae0e873 (diff)
downloadsrc-6e0bca03bd838aef7d5c64cd0fdf3068c66f8eb0.tar.gz
src-6e0bca03bd838aef7d5c64cd0fdf3068c66f8eb0.zip
pf tests: Basic synproxy test
A very basic syncproxy test: set up a connection via a synproxy rule. This triggeres the panic fixed in r336273.
Notes
Notes: svn path=/head/; revision=336297
Diffstat (limited to 'tests')
-rw-r--r--tests/sys/netpfil/pf/Makefile4
-rw-r--r--tests/sys/netpfil/pf/echo_inetd.conf6
-rwxr-xr-xtests/sys/netpfil/pf/synproxy.sh59
3 files changed, 68 insertions, 1 deletions
diff --git a/tests/sys/netpfil/pf/Makefile b/tests/sys/netpfil/pf/Makefile
index 5ea5a8d68075..f159ff351076 100644
--- a/tests/sys/netpfil/pf/Makefile
+++ b/tests/sys/netpfil/pf/Makefile
@@ -9,9 +9,11 @@ ATF_TESTS_SH+= pass_block \
forward \
fragmentation \
set_tos \
- route_to
+ route_to \
+ synproxy
${PACKAGE}FILES+= utils.subr \
+ echo_inetd.conf \
pft_ping.py
${PACKAGE}FILESMODE_pft_ping.py= 0555
diff --git a/tests/sys/netpfil/pf/echo_inetd.conf b/tests/sys/netpfil/pf/echo_inetd.conf
new file mode 100644
index 000000000000..bacad82e8bb1
--- /dev/null
+++ b/tests/sys/netpfil/pf/echo_inetd.conf
@@ -0,0 +1,6 @@
+# $FreeBSD$
+
+echo stream tcp nowait root internal
+echo stream tcp6 nowait root internal
+echo dgram udp wait root internal
+echo dgram udp6 wait root internal
diff --git a/tests/sys/netpfil/pf/synproxy.sh b/tests/sys/netpfil/pf/synproxy.sh
new file mode 100755
index 000000000000..5d79dbac9d11
--- /dev/null
+++ b/tests/sys/netpfil/pf/synproxy.sh
@@ -0,0 +1,59 @@
+# $FreeBSD$
+
+. $(atf_get_srcdir)/utils.subr
+
+atf_test_case "synproxy" "cleanup"
+synproxy_head()
+{
+ atf_set descr 'Basic synproxy test'
+ atf_set require.user root
+}
+
+synproxy_body()
+{
+ pft_init
+
+ epair=$(pft_mkepair)
+ ifconfig ${epair}a 192.0.2.1/24 up
+ route add -net 198.51.100.0/24 192.0.2.2
+
+ link=$(pft_mkepair)
+
+ pft_mkjail alcatraz ${epair}b ${link}a
+ jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
+ jexec alcatraz ifconfig ${link}a 198.51.100.1/24 up
+ jexec alcatraz sysctl net.inet.ip.forwarding=1
+
+ pft_mkjail singsing ${link}b
+ jexec singsing ifconfig ${link}b 198.51.100.2/24 up
+ jexec singsing route add default 198.51.100.1
+
+ jexec singsing /usr/sbin/inetd $(atf_get_srcdir)/echo_inetd.conf
+
+ jexec alcatraz pfctl -e
+ pft_set_rules alcatraz "set fail-policy return" \
+ "scrub in all fragment reassemble" \
+ "pass out quick on ${epair}b all no state allow-opts" \
+ "pass in quick on ${epair}b proto tcp from any to any port 7 synproxy state" \
+ "pass in quick on ${epair}b all no state"
+
+ # Sanity check, can we ping singing
+ atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2
+
+ # Check that we can talk to the singsing jail, after synproxying
+ reply=$(echo ping | nc -N 198.51.100.2 7)
+ if [ "${reply}" != "ping" ];
+ then
+ atf_fail "echo failed"
+ fi
+}
+
+synproxy_cleanup()
+{
+ pft_cleanup
+}
+
+atf_init_test_cases()
+{
+ atf_add_test_case "synproxy"
+}