# # SPDX-License-Identifier: BSD-2-Clause # # Copyright (c) 2018 Kristof Provost # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF # SUCH DAMAGE. . $(atf_get_srcdir)/utils.subr common_dir=$(atf_get_srcdir)/../common # We need to somehow test if the random algorithm of pf_map_addr() is working. # The table or prefix contains multiple IP next-hop addresses, for each one try # to establish up to 10 connections. Fail the test if with this many attempts # the "good" target has not been chosen. However this choice is random, # the check might still ocasionally fail. check_random() { if [ "$1" = "IPv4" ]; then ping_from="${net_clients_4}.1" ping_to="${host_server_4}" else ping_from="${net_clients_6}::1" ping_to="${host_server_6}" fi good_targets="$2" bad_targets="$3" port=42000 states=$(mktemp) || exit 1 for good_target in $good_targets; do found="no" for attempt in $(seq 1 10); do port=$(( port + 1 )) jexec router pfctl -Fs atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${ping_from} --to ${ping_to} \ --ping-type=tcp3way --send-sport=${port} jexec router pfctl -qvvss | normalize_pfctl_s > $states cat $states if [ -n "${bad_targets}" ]; then for bad_target in $bad_targets; do if grep -qE "route-to: ${bad_target}@" $states; then atf_fail "Bad target ${bad_target} selected!" fi done fi; if grep -qE "route-to: ${good_target}@" $states; then found=yes break fi done if [ "${found}" = "no" ]; then atf_fail "Target ${good_target} not selected after ${attempt} attempts!" fi done } pf_map_addr_common() { setup_router_server_nat64 # Clients will connect from another network behind the router. # This allows for using multiple source addresses. jexec router route add -6 ${net_clients_6}::/${net_clients_6_mask} ${net_tester_6_host_tester} jexec router route add ${net_clients_4}.0/${net_clients_4_mask} ${net_tester_4_host_tester} # The servers are reachable over additional IP addresses for # testing of tables and subnets. The addresses are noncontinougnus # for pf_map_addr() counter tests. for i in 0 1 4 5; do a1=$((24 + i)) jexec server1 ifconfig ${epair_server1}b inet ${net_server1_4}.${a1}/32 alias jexec server1 ifconfig ${epair_server1}b inet6 ${net_server1_6}::42:${i}/128 alias a2=$((40 + i)) jexec server2 ifconfig ${epair_server2}b inet ${net_server2_4}.${a2}/32 alias jexec server2 ifconfig ${epair_server2}b inet6 ${net_server2_6}::42:${i}/128 alias done } atf_test_case "v4" "cleanup" v4_head() { atf_set descr 'Basic route-to test' atf_set require.user root } v4_body() { pft_init epair_send=$(vnet_mkepair) ifconfig ${epair_send}a 192.0.2.1/24 up epair_route=$(vnet_mkepair) ifconfig ${epair_route}a 203.0.113.1/24 up vnet_mkjail alcatraz ${epair_send}b ${epair_route}b jexec alcatraz ifconfig ${epair_send}b 192.0.2.2/24 up jexec alcatraz ifconfig ${epair_route}b 203.0.113.2/24 up jexec alcatraz route add -net 198.51.100.0/24 192.0.2.1 jexec alcatraz pfctl -e # Attempt to provoke PR 228782 pft_set_rules alcatraz "block all" "pass user 2" \ "pass out route-to (${epair_route}b 203.0.113.1) from 192.0.2.2 to 198.51.100.1 no state" jexec alcatraz nc -w 3 -s 192.0.2.2 198.51.100.1 22 # atf wants us to not return an error, but our netcat will fail true } v4_cleanup() { pft_cleanup } atf_test_case "v6" "cleanup" v6_head() { atf_set descr 'Basic route-to test (IPv6)' atf_set require.user root } v6_body() { pft_init epair_send=$(vnet_mkepair) ifconfig ${epair_send}a inet6 2001:db8:42::1/64 up no_dad -ifdisabled epair_route=$(vnet_mkepair) ifconfig ${epair_route}a inet6 2001:db8:43::1/64 up no_dad -ifdisabled vnet_mkjail alcatraz ${epair_send}b ${epair_route}b jexec alcatraz ifconfig ${epair_send}b inet6 2001:db8:42::2/64 up no_dad jexec alcatraz ifconfig ${epair_route}b inet6 2001:db8:43::2/64 up no_dad jexec alcatraz route add -6 2001:db8:666::/64 2001:db8:42::2 jexec alcatraz pfctl -e # Attempt to provoke PR 228782 pft_set_rules alcatraz "block all" "pass user 2" \ "pass out route-to (${epair_route}b 2001:db8:43::1) from 2001:db8:42::2 to 2001:db8:666::1 no state" jexec alcatraz nc -6 -w 3 -s 2001:db8:42::2 2001:db8:666::1 22 # atf wants us to not return an error, but our netcat will fail true } v6_cleanup() { pft_cleanup } atf_test_case "multiwan" "cleanup" multiwan_head() { atf_set descr 'Multi-WAN redirection / reply-to test' atf_set require.user root } multiwan_body() { pft_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) epair_cl_one=$(vnet_mkepair) epair_cl_two=$(vnet_mkepair) vnet_mkjail srv ${epair_one}b ${epair_two}b vnet_mkjail wan_one ${epair_one}a ${epair_cl_one}b vnet_mkjail wan_two ${epair_two}a ${epair_cl_two}b vnet_mkjail client ${epair_cl_one}a ${epair_cl_two}a jexec client ifconfig ${epair_cl_one}a 203.0.113.1/25 jexec wan_one ifconfig ${epair_cl_one}b 203.0.113.2/25 jexec wan_one ifconfig ${epair_one}a 192.0.2.1/24 up jexec wan_one sysctl net.inet.ip.forwarding=1 jexec srv ifconfig ${epair_one}b 192.0.2.2/24 up jexec client route add 192.0.2.0/24 203.0.113.2 jexec client ifconfig ${epair_cl_two}a 203.0.113.128/25 jexec wan_two ifconfig ${epair_cl_two}b 203.0.113.129/25 jexec wan_two ifconfig ${epair_two}a 198.51.100.1/24 up jexec wan_two sysctl net.inet.ip.forwarding=1 jexec srv ifconfig ${epair_two}b 198.51.100.2/24 up jexec client route add 198.51.100.0/24 203.0.113.129 jexec srv ifconfig lo0 127.0.0.1/8 up jexec srv route add default 192.0.2.1 jexec srv sysctl net.inet.ip.forwarding=1 # Run echo server in srv jail jexec srv /usr/sbin/inetd -p ${PWD}/multiwan.pid $(atf_get_srcdir)/echo_inetd.conf jexec srv pfctl -e pft_set_rules srv \ "nat on ${epair_one}b inet from 127.0.0.0/8 to any -> (${epair_one}b)" \ "nat on ${epair_two}b inet from 127.0.0.0/8 to any -> (${epair_two}b)" \ "rdr on ${epair_one}b inet proto tcp from any to 192.0.2.2 port 7 -> 127.0.0.1 port 7" \ "rdr on ${epair_two}b inet proto tcp from any to 198.51.100.2 port 7 -> 127.0.0.1 port 7" \ "block in" \ "block out" \ "pass in quick on ${epair_one}b reply-to (${epair_one}b 192.0.2.1) inet proto tcp from any to 127.0.0.1 port 7" \ "pass in quick on ${epair_two}b reply-to (${epair_two}b 198.51.100.1) inet proto tcp from any to 127.0.0.1 port 7" # These will always succeed, because we don't change interface to route # correctly here. result=$(echo "one" | jexec wan_one nc -N -w 3 192.0.2.2 7) if [ "${result}" != "one" ]; then atf_fail "Redirect on one failed" fi result=$(echo "two" | jexec wan_two nc -N -w 3 198.51.100.2 7) if [ "${result}" != "two" ]; then atf_fail "Redirect on two failed" fi result=$(echo "one" | jexec client nc -N -w 3 192.0.2.2 7) if [ "${result}" != "one" ]; then atf_fail "Redirect from client on one failed" fi # This should trigger the issue fixed in 829a69db855b48ff7e8242b95e193a0783c489d9 result=$(echo "two" | jexec client nc -N -w 3 198.51.100.2 7) if [ "${result}" != "two" ]; then atf_fail "Redirect from client on two failed" fi } multiwan_cleanup() { pft_cleanup } atf_test_case "multiwanlocal" "cleanup" multiwanlocal_head() { atf_set descr 'Multi-WAN local origin source-based redirection / route-to test' atf_set require.user root } multiwanlocal_body() { pft_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) epair_cl_one=$(vnet_mkepair) epair_cl_two=$(vnet_mkepair) vnet_mkjail srv1 ${epair_one}b vnet_mkjail srv2 ${epair_two}b vnet_mkjail wan_one ${epair_one}a ${epair_cl_one}b vnet_mkjail wan_two ${epair_two}a ${epair_cl_two}b vnet_mkjail client ${epair_cl_one}a ${epair_cl_two}a jexec client ifconfig ${epair_cl_one}a 203.0.113.1/25 jexec wan_one ifconfig ${epair_cl_one}b 203.0.113.2/25 jexec wan_one ifconfig ${epair_one}a 192.0.2.1/24 up jexec wan_one sysctl net.inet.ip.forwarding=1 jexec srv1 ifconfig ${epair_one}b 192.0.2.2/24 up jexec client ifconfig ${epair_cl_two}a 203.0.113.128/25 jexec wan_two ifconfig ${epair_cl_two}b 203.0.113.129/25 jexec wan_two ifconfig ${epair_two}a 198.51.100.1/24 up jexec wan_two sysctl net.inet.ip.forwarding=1 jexec srv2 ifconfig ${epair_two}b 198.51.100.2/24 up jexec client route add default 203.0.113.2 jexec srv1 route add default 192.0.2.1 jexec srv2 route add default 198.51.100.1 # Run data source in srv1 and srv2 jexec srv1 sh -c 'dd if=/dev/zero bs=1024 count=100 | nc -l 7 -w 2 -N &' jexec srv2 sh -c 'dd if=/dev/zero bs=1024 count=100 | nc -l 7 -w 2 -N &' jexec client pfctl -e pft_set_rules client \ "block in" \ "block out" \ "pass out quick route-to (${epair_cl_two}a 203.0.113.129) inet proto tcp from 203.0.113.128 to any port 7" \ "pass out on ${epair_cl_one}a inet proto tcp from any to any port 7" \ "set skip on lo" # This should work result=$(jexec client nc -N -w 1 192.0.2.2 7 | wc -c) if [ ${result} -ne 102400 ]; then jexec client pfctl -ss atf_fail "Redirect from client on one failed: ${result}" fi # This should trigger the issue result=$(jexec client nc -N -w 1 -s 203.0.113.128 198.51.100.2 7 | wc -c) jexec client pfctl -ss if [ ${result} -ne 102400 ]; then atf_fail "Redirect from client on two failed: ${result}" fi } multiwanlocal_cleanup() { pft_cleanup } atf_test_case "icmp_nat" "cleanup" icmp_nat_head() { atf_set descr 'Test that ICMP packets are correct for route-to + NAT' atf_set require.user root atf_set require.progs python3 scapy } icmp_nat_body() { pft_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) epair_three=$(vnet_mkepair) vnet_mkjail gw ${epair_one}b ${epair_two}a ${epair_three}a vnet_mkjail srv ${epair_two}b vnet_mkjail srv2 ${epair_three}b ifconfig ${epair_one}a 192.0.2.2/24 up route add -net 198.51.100.0/24 192.0.2.1 jexec gw sysctl net.inet.ip.forwarding=1 jexec gw ifconfig ${epair_one}b 192.0.2.1/24 up jexec gw ifconfig ${epair_two}a 198.51.100.1/24 up jexec gw ifconfig ${epair_three}a 203.0.113.1/24 up mtu 500 jexec srv ifconfig ${epair_two}b 198.51.100.2/24 up jexec srv route add default 198.51.100.1 jexec srv2 ifconfig ${epair_three}b 203.0.113.2/24 up mtu 500 jexec srv2 route add default 203.0.113.1 # Sanity check atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2 jexec gw pfctl -e pft_set_rules gw \ "nat on ${epair_two}a inet from 192.0.2.0/24 to any -> (${epair_two}a)" \ "nat on ${epair_three}a inet from 192.0.2.0/24 to any -> (${epair_three}a)" \ "pass out route-to (${epair_three}a 203.0.113.2) proto icmp icmp-type echoreq" # Now ensure that we get an ICMP error with the correct IP addresses in it. atf_check -s exit:0 ${common_dir}/pft_icmp_check.py \ --to 198.51.100.2 \ --fromaddr 192.0.2.2 \ --recvif ${epair_one}a \ --sendif ${epair_one}a # ping reports the ICMP error, so check of that too. atf_check -s exit:2 -o match:'frag needed and DF set' \ ping -D -c 1 -s 1000 198.51.100.2 } icmp_nat_cleanup() { pft_cleanup } atf_test_case "dummynet" "cleanup" dummynet_head() { atf_set descr 'Test that dummynet applies to route-to packets' atf_set require.user root } dummynet_body() { dummynet_init epair_srv=$(vnet_mkepair) epair_gw=$(vnet_mkepair) vnet_mkjail srv ${epair_srv}a jexec srv ifconfig ${epair_srv}a 192.0.2.1/24 up jexec srv route add default 192.0.2.2 vnet_mkjail gw ${epair_srv}b ${epair_gw}a jexec gw ifconfig ${epair_srv}b 192.0.2.2/24 up jexec gw ifconfig ${epair_gw}a 198.51.100.1/24 up jexec gw sysctl net.inet.ip.forwarding=1 ifconfig ${epair_gw}b 198.51.100.2/24 up route add -net 192.0.2.0/24 198.51.100.1 # Sanity check atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.1 jexec gw dnctl pipe 1 config delay 1200 pft_set_rules gw \ "pass out route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe 1" jexec gw pfctl -e # The ping request will pass, but take 1.2 seconds # So this works: atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 # But this times out: atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 # return path dummynet pft_set_rules gw \ "pass out route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe (0, 1)" # The ping request will pass, but take 1.2 seconds # So this works: atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 # But this times out: atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 } dummynet_cleanup() { pft_cleanup } atf_test_case "dummynet_in" "cleanup" dummynet_in_head() { atf_set descr 'Thest that dummynet works as expected on pass in route-to packets' atf_set require.user root } dummynet_in_body() { dummynet_init epair_srv=$(vnet_mkepair) epair_gw=$(vnet_mkepair) vnet_mkjail srv ${epair_srv}a jexec srv ifconfig ${epair_srv}a 192.0.2.1/24 up jexec srv route add default 192.0.2.2 vnet_mkjail gw ${epair_srv}b ${epair_gw}a jexec gw ifconfig ${epair_srv}b 192.0.2.2/24 up jexec gw ifconfig ${epair_gw}a 198.51.100.1/24 up jexec gw sysctl net.inet.ip.forwarding=1 ifconfig ${epair_gw}b 198.51.100.2/24 up route add -net 192.0.2.0/24 198.51.100.1 # Sanity check atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.1 jexec gw dnctl pipe 1 config delay 1200 pft_set_rules gw \ "pass in route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe 1" jexec gw pfctl -e # The ping request will pass, but take 1.2 seconds # So this works: echo "Expect 1.2 s" ping -c 1 192.0.2.1 atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 # But this times out: atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 # return path dummynet pft_set_rules gw \ "pass in route-to (${epair_srv}b 192.0.2.1) to 192.0.2.1 dnpipe (0, 1)" # The ping request will pass, but take 1.2 seconds # So this works: echo "Expect 1.2 s" ping -c 1 192.0.2.1 atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 # But this times out: atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 } dummynet_in_cleanup() { pft_cleanup } atf_test_case "ifbound" "cleanup" ifbound_head() { atf_set descr 'Test that route-to states bind the expected interface' atf_set require.user root } ifbound_body() { pft_init j="route_to:ifbound" epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}b up vnet_mkjail ${j}2 ${epair_two}b jexec ${j}2 ifconfig ${epair_two}b inet 198.51.100.2/24 up jexec ${j}2 ifconfig ${epair_two}b inet alias 203.0.113.1/24 jexec ${j}2 route add default 198.51.100.1 vnet_mkjail $j ${epair_one}a ${epair_two}a jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up jexec $j route add default 192.0.2.2 jexec $j pfctl -e pft_set_rules $j \ "set state-policy if-bound" \ "block" \ "pass out route-to (${epair_two}a 198.51.100.2)" atf_check -s exit:0 -o ignore \ jexec $j ping -c 3 203.0.113.1 } ifbound_cleanup() { pft_cleanup } atf_test_case "ifbound_v6" "cleanup" ifbound_v6_head() { atf_set descr 'Test that route-to states for IPv6 bind the expected interface' atf_set require.user root } ifbound_v6_body() { pft_init j="route_to:ifbound_v6" epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}b up vnet_mkjail ${j}2 ${epair_two}b jexec ${j}2 ifconfig ${epair_two}b inet6 2001:db8:1::2/64 up no_dad jexec ${j}2 ifconfig ${epair_two}b inet6 alias 2001:db8:2::1/64 no_dad jexec ${j}2 route -6 add default 2001:db8:1::1 vnet_mkjail $j ${epair_one}a ${epair_two}a jexec $j ifconfig ${epair_one}a inet6 2001:db8::1/64 up no_dad jexec $j ifconfig ${epair_two}a inet6 2001:db8:1::1/64 up no_dad jexec $j route -6 add default 2001:db8::2 jexec $j ping6 -c 3 2001:db8:1::2 jexec $j pfctl -e pft_set_rules $j \ "set state-policy if-bound" \ "block" \ "pass inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \ "pass out route-to (${epair_two}a 2001:db8:1::2)" atf_check -s exit:0 -o ignore \ jexec $j ping6 -c 3 2001:db8:2::1 } ifbound_v6_cleanup() { pft_cleanup } atf_test_case "ifbound_reply_to" "cleanup" ifbound_reply_to_head() { atf_set descr 'Test that reply-to states bind to the expected interface' atf_set require.user root atf_set require.progs python3 scapy } ifbound_reply_to_body() { pft_init j="route_to:ifbound_reply_to" epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}b inet 192.0.2.2/24 up ifconfig ${epair_two}b up vnet_mkjail $j ${epair_one}a ${epair_two}a jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up jexec $j route add default 198.51.100.254 jexec $j pfctl -e pft_set_rules $j \ "set state-policy if-bound" \ "block" \ "pass in on ${epair_one}a reply-to (${epair_one}a 192.0.2.2) inet from any to 192.0.2.0/24 keep state" atf_check -s exit:0 -o ignore \ ping -c 3 192.0.2.1 atf_check -s exit:0 \ ${common_dir}/pft_ping.py \ --to 192.0.2.1 \ --from 203.0.113.2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b # pft_ping uses the same ID every time, so this will look like more traffic in the same state atf_check -s exit:0 \ ${common_dir}/pft_ping.py \ --to 192.0.2.1 \ --from 203.0.113.2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b jexec $j pfctl -ss -vv } ifbound_reply_to_cleanup() { pft_cleanup } atf_test_case "ifbound_reply_to_v6" "cleanup" ifbound_reply_to_v6_head() { atf_set descr 'Test that reply-to states bind to the expected interface for IPv6' atf_set require.user root atf_set require.progs python3 scapy } ifbound_reply_to_v6_body() { pft_init j="route_to:ifbound_reply_to_v6" epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) vnet_mkjail ${j}s ${epair_one}b ${epair_two}b jexec ${j}s ifconfig ${epair_one}b inet6 2001:db8::2/64 up no_dad jexec ${j}s ifconfig ${epair_two}b up #jexec ${j}s route -6 add default 2001:db8::1 vnet_mkjail $j ${epair_one}a ${epair_two}a jexec $j ifconfig ${epair_one}a inet6 2001:db8::1/64 up no_dad jexec $j ifconfig ${epair_two}a inet6 2001:db8:1::1/64 up no_dad jexec $j route -6 add default 2001:db8:1::254 jexec $j pfctl -e pft_set_rules $j \ "set state-policy if-bound" \ "block" \ "pass quick inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \ "pass in on ${epair_one}a reply-to (${epair_one}a 2001:db8::2) inet6 from any to 2001:db8::/64 keep state" atf_check -s exit:0 -o ignore \ jexec ${j}s ping6 -c 3 2001:db8::1 atf_check -s exit:0 \ jexec ${j}s ${common_dir}/pft_ping.py \ --to 2001:db8::1 \ --from 2001:db8:2::2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b # pft_ping uses the same ID every time, so this will look like more traffic in the same state atf_check -s exit:0 \ jexec ${j}s ${common_dir}/pft_ping.py \ --to 2001:db8::1 \ --from 2001:db8:2::2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b jexec $j pfctl -ss -vv } ifbound_reply_to_v6_cleanup() { pft_cleanup } atf_test_case "ifbound_reply_to_rdr_dummynet" "cleanup" ifbound_reply_to_rdr_dummynet_head() { atf_set descr 'Test that reply-to states bind to the expected non-default-route interface after rdr and dummynet' atf_set require.user root atf_set require.progs python3 scapy } ifbound_reply_to_rdr_dummynet_body() { dummynet_init j="route_to:ifbound_reply_to_rdr_dummynet" epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}b inet 192.0.2.2/24 up ifconfig ${epair_two}b up vnet_mkjail $j ${epair_one}a ${epair_two}a jexec $j ifconfig lo0 inet 127.0.0.1/8 up jexec $j ifconfig ${epair_one}a 192.0.2.1/24 up jexec $j ifconfig ${epair_two}a 198.51.100.1/24 up jexec $j route add default 198.51.100.254 jexec $j pfctl -e jexec $j dnctl pipe 1 config delay 1 pft_set_rules $j \ "set state-policy if-bound" \ "rdr on ${epair_one}a proto icmp from any to 192.0.2.1 -> 127.0.0.1" \ "rdr on ${epair_two}a proto icmp from any to 198.51.100.1 -> 127.0.0.1" \ "match in on ${epair_one}a inet all dnpipe (1, 1)" \ "pass in on ${epair_one}a reply-to (${epair_one}a 192.0.2.2) inet from any to 127.0.0.1 keep state" atf_check -s exit:0 -o ignore \ ping -c 3 192.0.2.1 atf_check -s exit:0 \ ${common_dir}/pft_ping.py \ --to 192.0.2.1 \ --from 203.0.113.2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b # pft_ping uses the same ID every time, so this will look like more traffic in the same state atf_check -s exit:0 \ ${common_dir}/pft_ping.py \ --to 192.0.2.1 \ --from 203.0.113.2 \ --sendif ${epair_one}b \ --replyif ${epair_one}b jexec $j pfctl -sr -vv jexec $j pfctl -ss -vv } ifbound_reply_to_rdr_dummynet_cleanup() { pft_cleanup } atf_test_case "dummynet_frag" "cleanup" dummynet_frag_head() { atf_set descr 'Test fragmentation with route-to and dummynet' atf_set require.user root } dummynet_frag_body() { pft_init dummynet_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}a 192.0.2.1/24 up vnet_mkjail alcatraz ${epair_one}b ${epair_two}a jexec alcatraz ifconfig ${epair_one}b 192.0.2.2/24 up jexec alcatraz ifconfig ${epair_two}a 198.51.100.1/24 up jexec alcatraz sysctl net.inet.ip.forwarding=1 vnet_mkjail singsing ${epair_two}b jexec singsing ifconfig ${epair_two}b 198.51.100.2/24 up jexec singsing route add default 198.51.100.1 route add 198.51.100.0/24 192.0.2.2 jexec alcatraz dnctl pipe 1 config bw 1000Byte/s burst 4500 jexec alcatraz dnctl pipe 2 config # This second pipe ensures that the pf_test(PF_OUT) call in pf_route() doesn't # delay packets in dummynet (by inheriting pipe 1 from the input rule). jexec alcatraz pfctl -e pft_set_rules alcatraz \ "set reassemble yes" \ "pass in route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq dnpipe 1" \ "pass out dnpipe 2" atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2 atf_check -s exit:0 -o ignore ping -c 1 -s 4000 198.51.100.2 } dummynet_frag_cleanup() { pft_cleanup } atf_test_case "dummynet_double" "cleanup" dummynet_double_head() { atf_set descr 'Ensure dummynet is not applied multiple times' atf_set require.user root } dummynet_double_body() { pft_init dummynet_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}a 192.0.2.1/24 up vnet_mkjail alcatraz ${epair_one}b ${epair_two}a jexec alcatraz ifconfig ${epair_one}b 192.0.2.2/24 up jexec alcatraz ifconfig ${epair_two}a 198.51.100.1/24 up jexec alcatraz sysctl net.inet.ip.forwarding=1 vnet_mkjail singsing ${epair_two}b jexec singsing ifconfig ${epair_two}b 198.51.100.2/24 up jexec singsing route add default 198.51.100.1 route add 198.51.100.0/24 192.0.2.2 jexec alcatraz dnctl pipe 1 config delay 800 jexec alcatraz pfctl -e pft_set_rules alcatraz \ "set reassemble yes" \ "nat on ${epair_two}a from 192.0.2.0/24 -> (${epair_two}a)" \ "pass in route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq dnpipe (1, 1)" \ "pass out route-to (${epair_two}a 198.51.100.2) inet proto icmp all icmp-type echoreq" ping -c 1 198.51.100.2 jexec alcatraz pfctl -sr -vv jexec alcatraz pfctl -ss -vv # We expect to be delayed 1.6 seconds, so timeout of two seconds passes, but # timeout of 1 does not. atf_check -s exit:0 -o ignore ping -t 2 -c 1 198.51.100.2 atf_check -s exit:2 -o ignore ping -t 1 -c 1 198.51.100.2 } dummynet_double_cleanup() { pft_cleanup } atf_test_case "sticky" "cleanup" sticky_head() { atf_set descr 'Set and retrieve a rule with sticky-address' atf_set require.user root } sticky_body() { pft_init vnet_mkjail alcatraz pft_set_rules alcatraz \ "pass in quick log on n_test_h_rtr route-to (n_srv_h_rtr ) sticky-address from any to keep state" jexec alcatraz pfctl -qvvsr } sticky_cleanup() { pft_cleanup } atf_test_case "ttl" "cleanup" ttl_head() { atf_set descr 'Ensure we decrement TTL on route-to' atf_set require.user root } ttl_body() { pft_init epair_one=$(vnet_mkepair) epair_two=$(vnet_mkepair) ifconfig ${epair_one}b 192.0.2.2/24 up route add default 192.0.2.1 vnet_mkjail alcatraz ${epair_one}a ${epair_two}a jexec alcatraz ifconfig ${epair_one}a 192.0.2.1/24 up jexec alcatraz ifconfig ${epair_two}a 198.51.100.1/24 up jexec alcatraz sysctl net.inet.ip.forwarding=1 vnet_mkjail singsing ${epair_two}b jexec singsing ifconfig ${epair_two}b 198.51.100.2/24 up jexec singsing route add default 198.51.100.1 # Sanity check atf_check -s exit:0 -o ignore \ ping -c 3 198.51.100.2 jexec alcatraz pfctl -e pft_set_rules alcatraz \ "pass out" \ "pass in route-to (${epair_two}a 198.51.100.2)" atf_check -s exit:0 -o ignore \ ping -c 3 198.51.100.2 atf_check -s exit:2 -o ignore \ ping -m 1 -c 3 198.51.100.2 } ttl_cleanup() { pft_cleanup } atf_test_case "empty_pool" "cleanup" empty_pool_head() { atf_set descr 'Route-to with empty pool' atf_set require.user root atf_set require.progs python3 scapy } empty_pool_body() { pft_init setup_router_server_ipv6 pft_set_rules router \ "block" \ "pass inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \ "pass in on ${epair_tester}b route-to (${epair_server}a ) inet6 from any to ${net_server_host_server}" \ "pass out on ${epair_server}a" # pf_map_addr_sn() won't be able to pick a target address, because # the table used in redireciton pool is empty. Packet will not be # forwarded, error counter will be increased. ping_server_check_reply exit:1 # Ignore warnings about not-loaded ALTQ atf_check -o "match:map-failed +1 +" -x "jexec router pfctl -qvvsi 2> /dev/null" } empty_pool_cleanup() { pft_cleanup } atf_test_case "table_loop" "cleanup" table_loop_head() { atf_set descr 'Check that iterating over tables poperly loops' atf_set require.user root atf_set require.progs python3 scapy } table_loop_body() { pf_map_addr_common jexec router pfctl -e pft_set_rules router \ "set debug loud" \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server1_6}::42:4/127 ${net_server1_6}::42:0/127 }" \ "table { ${net_server2_6}::42:4/127 }" \ "pass in on ${epair_tester}b \ route-to { \ (${epair_server1}a ) \ (${epair_server2}a ) \ (${epair_server2}a ) \ } \ inet6 proto tcp \ keep state" # Both hosts of the pool are tables. Each table gets iterated over once, # then the pool iterates to the next host, which is also iterated, # then the pool loops back to the 1st host. If an empty table is found, # it is skipped. Unless that's the only table, that is tested by # the "empty_pool" test. for port in $(seq 1 7); do port=$((4200 + port)) atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=${port} done states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states cat $states for state_regexp in \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4201\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4202\] .* route-to: ${net_server1_6}::42:1@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4203\] .* route-to: ${net_server1_6}::42:4@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4204\] .* route-to: ${net_server1_6}::42:5@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4205\] .* route-to: ${net_server2_6}::42:4@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4206\] .* route-to: ${net_server2_6}::42:5@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4207\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done } table_loop_cleanup() { pft_cleanup } atf_test_case "roundrobin" "cleanup" roundrobin_head() { atf_set descr 'multiple gateways of mixed AF, including prefixes and tables, for IPv6 packets' atf_set require.user root atf_set require.progs python3 scapy } roundrobin_body() { pf_map_addr_common # The rule is defined as "inet6 proto tcp" so directly given IPv4 hosts # will be removed from the pool by pfctl. Tables will still be loaded # and pf_map_addr() will only use IPv6 addresses from them. It will # iterate over members of the pool and inside of tables and prefixes. jexec router pfctl -e pft_set_rules router \ "set debug loud" \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 ${net_server2_6}::42:0/127 ${net_server2_6}::42:4 }" \ "pass in on ${epair_tester}b \ route-to { \ (${epair_server1}a ${net_server1_4_host_server}) \ (${epair_server2}a ) \ (${epair_server1}a ${net_server1_6}::42:0/127) \ (${epair_server2}a ) \ (${epair_server2}a ) \ } \ inet6 proto tcp \ keep state" for port in $(seq 1 6); do port=$((4200 + port)) atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=${port} done states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states for state_regexp in \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4201\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4202\] .* route-to: ${net_server1_6}::42:1@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4203\] .* route-to: ${net_server2_6}::42:0@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4204\] .* route-to: ${net_server2_6}::42:1@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4205\] .* route-to: ${net_server2_6}::42:4@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4206\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done } roundrobin_cleanup() { pft_cleanup } atf_test_case "random_table" "cleanup" random_table_head() { atf_set descr 'Pool with random flag and a table for IPv6' atf_set require.user root atf_set require.progs python3 scapy } random_table_body() { pf_map_addr_common # The "random" flag will pick random hosts from the table but will # not dive into prefixes, always choosing the 0th address. # Proper address family will be choosen. jexec router pfctl -e pft_set_rules router \ "set debug loud" \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 ${net_server2_6}::42:0/127 ${net_server2_6}::42:4 }" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ) } random \ inet6 proto tcp \ keep state" good_targets="${net_server2_6}::42:0 ${net_server2_6}::42:4" bad_targets="${net_server2_6}::42:1" check_random IPv6 "${good_targets}" "${bad_targets}" } random_table_cleanup() { pft_cleanup } atf_test_case "random_prefix" "cleanup" random_prefix_head() { atf_set descr 'Pool with random flag and a table for IPv4' atf_set require.user root atf_set require.progs python3 scapy } random_prefix_body() { pf_map_addr_common # The "random" flag will pick random hosts from given prefix. # The choice being random makes testing it non-trivial. We do 10 # attempts to have each target chosen. Hopefully this is enough to have # this test pass often enough. jexec router pfctl -e pft_set_rules router \ "set debug loud" \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ${net_server2_6}::42:0/127) } random \ inet6 proto tcp \ keep state" good_targets="${net_server2_6}::42:0 ${net_server2_6}::42:1" check_random IPv6 "${good_targets}" } random_prefix_cleanup() { pft_cleanup } atf_test_case "prefer_ipv6_nexthop_single_ipv4" "cleanup" prefer_ipv6_nexthop_single_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for a single IPv4 gateway' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_single_ipv4_body() { pf_map_addr_common # Basic forwarding test for prefer-ipv6-nexthop pool option. # A single IPv4 gateway will work only for IPv4 traffic. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to (${epair_server1}a ${net_server1_4_host_server}) prefer-ipv6-nexthop \ proto tcp \ keep state" atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_4}.1 --to ${host_server_4} \ --ping-type=tcp3way --send-sport=4201 \ atf_check -s exit:1 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=4202 states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states for state_regexp in \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4201 .* route-to: ${net_server1_4_host_server}@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done # The IPv6 packet could not have been routed over IPv4 gateway. atf_check -o "match:map-failed +1 +" -x "jexec router pfctl -qvvsi 2> /dev/null" } prefer_ipv6_nexthop_single_ipv4_cleanup() { pft_cleanup } atf_test_case "prefer_ipv6_nexthop_single_ipv6" "cleanup" prefer_ipv6_nexthop_single_ipv6_head() { atf_set descr 'prefer-ipv6-nexthop option for a single IPv6 gateway' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_single_ipv6_body() { pf_map_addr_common # Basic forwarding test for prefer-ipv6-nexthop pool option. # A single IPve gateway will work both for IPv4 and IPv6 traffic. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to (${epair_server1}a ${net_server1_6_host_server}) prefer-ipv6-nexthop \ proto tcp \ keep state" atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_4}.1 --to ${host_server_4} \ --ping-type=tcp3way --send-sport=4201 \ atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=4202 states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states for state_regexp in \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4201 .* route-to: ${net_server1_6_host_server}@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4202\] .* route-to: ${net_server1_6_host_server}@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done } prefer_ipv6_nexthop_single_ipv6_cleanup() { pft_cleanup } atf_test_case "prefer_ipv6_nexthop_mixed_af_roundrobin_ipv4" "cleanup" prefer_ipv6_nexthop_mixed_af_roundrobin_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for multiple gateways of mixed AF with prefixes and tables, round robin selection, for IPv4 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_mixed_af_roundrobin_ipv4_body() { pf_map_addr_common # pf_map_addr() starts iterating over hosts of the pool from the 2nd # host. This behaviour was here before adding prefer-ipv6-nexthop # support, we test for it. Some targets are hosts and some are tables. # Those are iterated too. Finally the iteration loops back # to the beginning of the pool. Send out IPv4 probes. They will use all # IPv4 and IPv6 addresses from the pool. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 ${net_server2_6}::42:4/127 }" \ "pass in on ${epair_tester}b \ route-to { \ (${epair_server1}a ${net_server1_6_host_server}) \ (${epair_server1}a ${net_server1_6}::42:0/127) \ (${epair_server2}a ${net_server2_4_host_server}) \ (${epair_server2}a ) \ (${epair_server1}a ${net_server1_4}.24/31) \ (${epair_server2}a ) \ } prefer-ipv6-nexthop \ proto tcp \ keep state" for port in $(seq 1 12); do port=$((4200 + port)) atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_4}.1 --to ${host_server_4} \ --ping-type=tcp3way --send-sport=${port} done states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states for state_regexp in \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4201 .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4202 .* route-to: ${net_server1_6}::42:1@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4203 .* route-to: ${net_server2_4_host_server}@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4204 .* route-to: ${net_server1_4}.24@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4205 .* route-to: ${net_server1_4}.25@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4206 .* route-to: ${net_server2_6}::42:4@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4207 .* route-to: ${net_server2_6}::42:5@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4208 .* route-to: ${net_server2_4}.40@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4209 .* route-to: ${net_server2_4}.41@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4210 .* route-to: ${net_server2_4}.44@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4211 .* route-to: ${net_server1_6_host_server}@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_4}:9 <- ${net_clients_4}.1:4212 .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done } prefer_ipv6_nexthop_mixed_af_roundrobin_ipv4_cleanup() { pft_cleanup } prefer_ipv6_nexthop_mixed_af_roundrobin_ipv6_head() { atf_set descr 'prefer-ipv6-nexthop option for multiple gateways of mixed AF with prefixes and tables, round-robin selection, for IPv6 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_mixed_af_roundrobin_ipv6_body() { pf_map_addr_common # The "random" flag will pick random hosts from the table but will # not dive into prefixes, always choosing the 0th address. # Proper address family will be choosen. The choice being random makes # testing it non-trivial. We do 10 attempts to have each target chosen. # Hopefully this is enough to have this test pass often enough. # pf_map_addr() starts iterating over hosts of the pool from the 2nd # host. This behaviour was here before adding prefer-ipv6-nexthop # support, we test for it. Some targets are hosts and some are tables. # Those are iterated too. Finally the iteration loops back # to the beginning of the pool. Send out IPv6 probes. They will use only # IPv6 addresses from the pool. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 ${net_server2_6}::42:4/127 }" \ "pass in on ${epair_tester}b \ route-to { \ (${epair_server1}a ${net_server1_6_host_server}) \ (${epair_server1}a ${net_server1_6}::42:0/127) \ (${epair_server2}a ${net_server2_4_host_server}) \ (${epair_server2}a ) \ (${epair_server1}a ${net_server1_4}.24/31) \ (${epair_server2}a ) \ } prefer-ipv6-nexthop \ proto tcp \ keep state" for port in $(seq 1 6); do port=$((4200 + port)) atf_check -s exit:0 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=${port} done states=$(mktemp) || exit 1 jexec router pfctl -qvvss | normalize_pfctl_s > $states for state_regexp in \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4201\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4202\] .* route-to: ${net_server1_6}::42:1@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4203\] .* route-to: ${net_server2_6}::42:4@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4204\] .* route-to: ${net_server2_6}::42:5@${epair_server2}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4205\] .* route-to: ${net_server1_6_host_server}@${epair_server1}a" \ "${epair_tester}b tcp ${host_server_6}\[9\] <- ${net_clients_6}::1\[4206\] .* route-to: ${net_server1_6}::42:0@${epair_server1}a" \ ; do grep -qE "${state_regexp}" $states || atf_fail "State not found for '${state_regexp}'" done } prefer_ipv6_nexthop_mixed_af_roundrobin_ipv6_cleanup() { pft_cleanup } atf_test_case "prefer_ipv6_nexthop_mixed_af_random_ipv4" "cleanup" prefer_ipv6_nexthop_mixed_af_random_table_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for a mixed-af table with random selection for IPv4 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_mixed_af_random_table_ipv4_body() { pf_map_addr_common # Similarly to the test "random_table" the algorithm will choose # IP addresses from the table not diving into prefixes. # *prefer*-ipv6-nexthop means that IPv6 nexthops are preferred, # so IPv4 ones will not be chosen as long as there are IPv6 ones # available. With this tested there is no need for a test for IPv6-only # next-hops table. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 ${net_server2_6}::42:0/127 ${net_server2_6}::42:4 }" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ) } random prefer-ipv6-nexthop \ proto tcp \ keep state" good_targets="${net_server2_6}::42:0 ${net_server2_6}::42:4" bad_targets="${net_server2_4}.40 ${net_server2_4}.41 ${net_server2_4}.44 ${net_server2_6}::42:1" check_random IPv4 "${good_targets}" "${bad_targets}" } prefer_ipv6_nexthop_mixed_af_random_table_ipv4_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv4_random_table_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv4-only table with random selection for IPv4 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv4_random_table_ipv4_body() { pf_map_addr_common # Similarly to the test pf_map_addr:random_table the algorithm will # choose IP addresses from the table not diving into prefixes. # There are no IPv6 nexthops in the table, so the algorithm will # fall back to IPv4. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 }" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ) } random prefer-ipv6-nexthop \ proto tcp \ keep state" good_targets="${net_server2_4}.40 ${net_server2_4}.44" bad_targets="${net_server2_4}.41" check_random IPv4 "${good_targets}" "${bad_targets}" } prefer_ipv6_nexthop_ipv4_random_table_ipv4_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv4_random_table_ipv6_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv4-only table with random selection for IPv6 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv4_random_table_ipv6_body() { pf_map_addr_common # IPv6 packets can't be forwarded over IPv4 next-hops. # The failure happens in pf_map_addr() and increases the respective # error counter. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "table { ${net_server2_4}.40/31 ${net_server2_4}.44 }" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ) } random prefer-ipv6-nexthop \ proto tcp \ keep state" atf_check -s exit:1 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=4201 atf_check -o "match:map-failed +1 +" -x "jexec router pfctl -qvvsi 2> /dev/null" } prefer_ipv6_nexthop_ipv4_random_table_ipv6_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv6_random_prefix_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv6 prefix with random selection for IPv4 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv6_random_prefix_ipv4_body() { pf_map_addr_common jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ${net_server2_6}::42:0/127) } random prefer-ipv6-nexthop \ proto tcp \ keep state" good_targets="${net_server2_6}::42:0 ${net_server2_6}::42:1" check_random IPv4 "${good_targets}" } prefer_ipv6_nexthop_ipv6_random_prefix_ipv4_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv6_random_prefix_ipv6_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv6 prefix with random selection for IPv6 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv6_random_prefix_ipv6_body() { pf_map_addr_common jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ${net_server2_6}::42:0/127) } random prefer-ipv6-nexthop \ proto tcp \ keep state" good_targets="${net_server2_6}::42:0 ${net_server2_6}::42:1" check_random IPv6 "${good_targets}" } prefer_ipv6_nexthop_ipv6_random_prefix_ipv6_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv4_random_prefix_ipv4_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv4 prefix with random selection for IPv4 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv4_random_prefix_ipv4_body() { pf_map_addr_common jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ${net_server2_4}.40/31) } random prefer-ipv6-nexthop \ proto tcp \ keep state" good_targets="${net_server2_4}.40 ${net_server2_4}.41" check_random IPv4 "${good_targets}" } prefer_ipv6_nexthop_ipv4_random_prefix_ipv4_cleanup() { pft_cleanup } prefer_ipv6_nexthop_ipv4_random_prefix_ipv6_head() { atf_set descr 'prefer-ipv6-nexthop option for an IPv4 prefix with random selection for IPv6 packets' atf_set require.user root atf_set require.progs python3 scapy } prefer_ipv6_nexthop_ipv4_random_prefix_ipv6_body() { pf_map_addr_common # IPv6 packets can't be forwarded over IPv4 next-hops. # The failure happens in pf_map_addr() and increases the respective # error counter. jexec router pfctl -e pft_set_rules router \ "set reassemble yes" \ "set state-policy if-bound" \ "pass in on ${epair_tester}b \ route-to { (${epair_server2}a ${net_server2_4}.40/31) } random prefer-ipv6-nexthop \ proto tcp \ keep state" atf_check -s exit:1 ${common_dir}/pft_ping.py \ --sendif ${epair_tester}a --replyif ${epair_tester}a \ --fromaddr ${net_clients_6}::1 --to ${host_server_6} \ --ping-type=tcp3way --send-sport=4201 atf_check -o "match:map-failed +1 +" -x "jexec router pfctl -qvvsi 2> /dev/null" } prefer_ipv6_nexthop_ipv4_random_prefix_ipv6_cleanup() { pft_cleanup } atf_init_test_cases() { atf_add_test_case "v4" atf_add_test_case "v6" atf_add_test_case "multiwan" atf_add_test_case "multiwanlocal" atf_add_test_case "icmp_nat" atf_add_test_case "dummynet" atf_add_test_case "dummynet_in" atf_add_test_case "ifbound" atf_add_test_case "ifbound_v6" atf_add_test_case "ifbound_reply_to" atf_add_test_case "ifbound_reply_to_v6" atf_add_test_case "ifbound_reply_to_rdr_dummynet" atf_add_test_case "dummynet_frag" atf_add_test_case "dummynet_double" atf_add_test_case "sticky" atf_add_test_case "ttl" atf_add_test_case "empty_pool" # Tests for pf_map_addr() without prefer-ipv6-nexthop atf_add_test_case "table_loop" atf_add_test_case "roundrobin" atf_add_test_case "random_table" atf_add_test_case "random_prefix" # Tests for pf_map_addr() without prefer-ipv6-nexthop # Next hop is a Single IP address atf_add_test_case "prefer_ipv6_nexthop_single_ipv4" atf_add_test_case "prefer_ipv6_nexthop_single_ipv6" # Next hop is tables and prefixes, accessed by the round-robin algorithm atf_add_test_case "prefer_ipv6_nexthop_mixed_af_roundrobin_ipv4" atf_add_test_case "prefer_ipv6_nexthop_mixed_af_roundrobin_ipv6" # Next hop is a table, accessed by the random algorithm atf_add_test_case "prefer_ipv6_nexthop_mixed_af_random_table_ipv4" atf_add_test_case "prefer_ipv6_nexthop_ipv4_random_table_ipv4" atf_add_test_case "prefer_ipv6_nexthop_ipv4_random_table_ipv6" # Next hop is a prefix, accessed by the random algorithm atf_add_test_case "prefer_ipv6_nexthop_ipv6_random_prefix_ipv4" atf_add_test_case "prefer_ipv6_nexthop_ipv6_random_prefix_ipv6" atf_add_test_case "prefer_ipv6_nexthop_ipv4_random_prefix_ipv4" atf_add_test_case "prefer_ipv6_nexthop_ipv4_random_prefix_ipv6" }