1#- 2# SPDX-License-Identifier: BSD-2-Clause 3# 4# Copyright (c) 2019 Ahsan Barkati 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions 8# are met: 9# 1. Redistributions of source code must retain the above copyright 10# notice, this list of conditions and the following disclaimer. 11# 2. Redistributions in binary form must reproduce the above copyright 12# notice, this list of conditions and the following disclaimer in the 13# documentation and/or other materials provided with the distribution. 14# 15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25# SUCH DAMAGE. 26# 27# 28 29. $(atf_get_srcdir)/utils.subr 30. $(atf_get_srcdir)/runner.subr 31 32fragments_head() 33{ 34 atf_set descr 'Too many fragments test' 35 atf_set require.user root 36} 37 38fragments_body() 39{ 40 firewall=$1 41 firewall_init $firewall 42 43 epair=$(vnet_mkepair) 44 ifconfig ${epair}b inet 192.0.2.1/24 up 45 46 vnet_mkjail iron ${epair}a 47 jexec iron ifconfig ${epair}a 192.0.2.2/24 up 48 49 ifconfig ${epair}b mtu 200 50 jexec iron ifconfig ${epair}a mtu 200 51 52 firewall_config "iron" ${firewall} \ 53 "pf" \ 54 "scrub all fragment reassemble" \ 55 "ipfw" \ 56 "ipfw -q add 100 reass all from any to any in" \ 57 "ipf" \ 58 "pass in all with frags" 59 60 jexec iron sysctl net.inet.ip.maxfragsperpacket=1024 61 62 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 63 atf_check -s exit:0 -o ignore ping -c 1 -s 800 192.0.2.2 64 65 # Too many fragments should fail 66 atf_check -s exit:2 -o ignore ping -c 1 -s 20000 192.0.2.2 67} 68 69fragments_cleanup() 70{ 71 firewall=$1 72 firewall_cleanup $firewall 73} 74 75setup_tests \ 76 "fragments" \ 77 "pf" \ 78 "ipfw" \ 79 "ipf" 80