Lines Matching +full:route +full:- +full:up

2 # SPDX-License-Identifier: BSD-2-Clause
34 atf_set descr 'Test CVE-2019-5598'
45 ifconfig ${epair_in}a 192.0.2.1/24 up
46 ifconfig ${epair_out}a up
49 jexec alcatraz ifconfig ${epair_in}b 192.0.2.2/24 up
50 jexec alcatraz ifconfig ${epair_out}b 198.51.100.2/24 up
52 jexec alcatraz arp -s 198.51.100.3 00:01:02:03:04:05
53 jexec alcatraz route add default 198.51.100.3
54 route add -net 198.51.100.0/24 192.0.2.2
56 jexec alcatraz pfctl -e
61 atf_check -s exit:0 env PYTHONPATH=${common_dir} \
62 $(atf_get_srcdir)/CVE-2019-5598.py \
63 --sendif ${epair_in}a \
64 --recvif ${epair_out}a \
65 --src 192.0.2.1 \
66 --to 198.51.100.3
90 jexec srv ifconfig ${epair_srv}a 192.0.2.1/24 up
91 jexec srv route add default 192.0.2.2
95 jexec int ifconfig ${epair_srv}b 192.0.2.2/24 up
96 jexec int ifconfig ${epair_int}a 203.0.113.2/24 up
99 jexec nat ifconfig ${epair_int}b 203.0.113.1/24 up
100 jexec nat ifconfig ${epair_cl}b 198.51.100.2/24 up
102 jexec nat route add default 203.0.113.2
105 jexec cl ifconfig ${epair_cl}a 198.51.100.1/24 up
106 jexec cl route add default 198.51.100.2
108 jexec nat pfctl -e
110 "nat on ${epair_int}b from 198.51.100.0/24 -> (${epair_int}b)" \
113 "pass inet proto icmp icmp-type { echoreq }"
116 atf_check -s exit:0 -o ignore \
117 jexec cl ping -c 1 198.51.100.2
118 atf_check -s exit:0 -o ignore \
119 jexec cl ping -c 1 203.0.113.1
120 atf_check -s exit:0 -o ignore \
121 jexec cl ping -c 1 203.0.113.2
122 atf_check -s exit:0 -o ignore \
123 jexec cl ping -c 1 192.0.2.1
126 atf_check -s exit:0 -e ignore -o match:".*203.0.113.2.*" \
128 jexec nat pfctl -Fs
131 atf_check -s exit:0 -e ignore -o match:".*203.0.113.2.*" \
132 jexec cl traceroute -I 192.0.2.1