1import pytest 2import ctypes 3import socket 4import ipaddress 5import re 6from atf_python.sys.net.tools import ToolsHelper 7from atf_python.sys.net.vnet import VnetTestTemplate 8 9import time 10 11SCTP_UNORDERED = 0x0400 12 13SCTP_NODELAY = 0x00000004 14SCTP_SET_PEER_PRIMARY_ADDR = 0x00000006 15SCTP_PRIMARY_ADDR = 0x00000007 16 17SCTP_BINDX_ADD_ADDR = 0x00008001 18SCTP_BINDX_REM_ADDR = 0x00008002 19 20class sockaddr_in(ctypes.Structure): 21 _fields_ = [ 22 ('sin_len', ctypes.c_uint8), 23 ('sin_family', ctypes.c_uint8), 24 ('sin_port', ctypes.c_uint16), 25 ('sin_addr', ctypes.c_uint32), 26 ('sin_zero', ctypes.c_int8 * 8) 27 ] 28 29class sockaddr_in6(ctypes.Structure): 30 _fields_ = [ 31 ('sin6_len', ctypes.c_uint8), 32 ('sin6_family', ctypes.c_uint8), 33 ('sin6_port', ctypes.c_uint16), 34 ('sin6_flowinfo', ctypes.c_uint32), 35 ('sin6_addr', ctypes.c_uint8 * 16), 36 ('sin6_scope_id', ctypes.c_uint32) 37 ] 38 39class sockaddr_storage(ctypes.Union): 40 _fields_ = [ 41 ("v4", sockaddr_in), 42 ("v6", sockaddr_in6) 43 ] 44 45class sctp_sndrcvinfo(ctypes.Structure): 46 _fields_ = [ 47 ('sinfo_stream', ctypes.c_uint16), 48 ('sinfo_ssn', ctypes.c_uint16), 49 ('sinfo_flags', ctypes.c_uint16), 50 ('sinfo_ppid', ctypes.c_uint32), 51 ('sinfo_context', ctypes.c_uint32), 52 ('sinfo_timetolive', ctypes.c_uint32), 53 ('sinfo_tsn', ctypes.c_uint32), 54 ('sinfo_cumtsn', ctypes.c_uint32), 55 ('sinfo_assoc_id', ctypes.c_uint32), 56 ] 57 58class sctp_setprim(ctypes.Structure): 59 _fields_ = [ 60 ('ssp_addr', sockaddr_storage), 61 ('ssp_pad', ctypes.c_int8 * (128 - 16)), 62 ('ssp_assoc_id', ctypes.c_uint32), 63 ('ssp_padding', ctypes.c_uint32) 64 ] 65 66def to_sockaddr(ip, port): 67 ip = ipaddress.ip_address(ip) 68 69 if ip.version == 4: 70 addr = sockaddr_in() 71 addr.sin_len = ctypes.sizeof(addr) 72 addr.sin_family = socket.AF_INET 73 addr.sin_port = socket.htons(port) 74 addr.sin_addr = socket.htonl(int.from_bytes(ip.packed, byteorder='big')) 75 else: 76 assert ip.version == 6 77 78 addr = sockaddr_in6() 79 addr.sin6_len = ctypes.sizeof(addr) 80 addr.sin6_family = socket.AF_INET6 81 addr.sin6_port = socket.htons(port) 82 for i in range(0, 16): 83 addr.sin6_addr[i] = ip.packed[i] 84 85 return addr 86 87class SCTPServer: 88 def __init__(self, family, port=1234): 89 self._libc = ctypes.CDLL("libc.so.7", use_errno=True) 90 91 self._listen_fd = self._libc.socket(family, socket.SOCK_STREAM, socket.IPPROTO_SCTP) 92 if self._listen_fd == -1: 93 raise Exception("Failed to create socket") 94 95 if family == socket.AF_INET: 96 srvaddr = sockaddr_in() 97 srvaddr.sin_len = ctypes.sizeof(srvaddr) 98 srvaddr.sin_family = socket.AF_INET 99 srvaddr.sin_port = socket.htons(port) 100 srvaddr.sin_addr = socket.INADDR_ANY 101 else: 102 srvaddr = sockaddr_in6() 103 srvaddr.sin6_len = ctypes.sizeof(srvaddr) 104 srvaddr.sin6_family = family 105 srvaddr.sin6_port = socket.htons(port) 106 # Leave sin_addr empty, because ANY is zero 107 108 ret = self._libc.bind(self._listen_fd, ctypes.pointer(srvaddr), 109 ctypes.sizeof(srvaddr)) 110 if ret == -1: 111 raise Exception("Failed to bind: %d" % ctypes.get_errno()) 112 113 ret = self._libc.listen(self._listen_fd, 2) 114 if ret == -1: 115 raise Exception("Failed to listen") 116 117 def _to_string(self, buf): 118 return ''.join([chr(int.from_bytes(i, byteorder='big')) for i in buf]).rstrip('\x00') 119 120 def accept(self, vnet): 121 fd = self._libc.accept(self._listen_fd, 0, 0) 122 if fd < 0: 123 raise Exception("Failed to accept") 124 125 print("SCTPServer: connection opened") 126 while True: 127 rcvinfo = sctp_sndrcvinfo() 128 flags = ctypes.c_int() 129 buf = ctypes.create_string_buffer(128) 130 131 # Receive a single message, and inform the other vnet about it. 132 ret = self._libc.sctp_recvmsg(fd, ctypes.cast(buf, ctypes.c_void_p), 128, 133 0, 0, ctypes.pointer(rcvinfo), ctypes.pointer(flags)) 134 if ret < 0: 135 print("SCTPServer: connection closed") 136 return 137 if ret == 0: 138 continue 139 140 rcvd = {} 141 rcvd['ppid'] = socket.ntohl(rcvinfo.sinfo_ppid) 142 rcvd['data'] = self._to_string(buf) 143 rcvd['len'] = ret 144 print(rcvd) 145 vnet.pipe.send(rcvd) 146 147class SCTPClient: 148 def __init__(self, ip, port=1234, fromaddr=None): 149 self._libc = ctypes.CDLL("libc.so.7", use_errno=True) 150 151 if ipaddress.ip_address(ip).version == 4: 152 family = socket.AF_INET 153 else: 154 family = socket.AF_INET6 155 156 self._fd = self._libc.socket(family, socket.SOCK_STREAM, 157 socket.IPPROTO_SCTP) 158 if self._fd == -1: 159 raise Exception("Failed to open socket") 160 161 if fromaddr is not None: 162 addr = to_sockaddr(fromaddr, 0) 163 164 ret = self._libc.bind(self._fd, ctypes.pointer(addr), ctypes.sizeof(addr)) 165 if ret != 0: 166 print("bind() => %d", ctypes.get_errno()) 167 raise 168 169 addr = to_sockaddr(ip, port) 170 ret = self._libc.connect(self._fd, ctypes.pointer(addr), ctypes.sizeof(addr)) 171 if ret == -1: 172 raise Exception("Failed to connect") 173 174 # Enable NODELAY, because otherwise the sending host may wait for SACK 175 # on a data chunk we've removed 176 enable = ctypes.c_int(1) 177 ret = self._libc.setsockopt(self._fd, socket.IPPROTO_SCTP, 178 SCTP_NODELAY, ctypes.pointer(enable), 4) 179 180 def newpeer(self, addr): 181 print("newpeer(%s)" % (addr)) 182 183 setp = sctp_setprim() 184 a = to_sockaddr(addr, 0) 185 if type(a) is sockaddr_in: 186 setp.ssp_addr.v4 = a 187 else: 188 assert type(a) is sockaddr_in6 189 setp.ssp_addr.v6 = a 190 191 ret = self._libc.setsockopt(self._fd, socket.IPPROTO_SCTP, 192 SCTP_PRIMARY_ADDR, ctypes.pointer(setp), ctypes.sizeof(setp)) 193 if ret != 0: 194 print("errno %d" % ctypes.get_errno()) 195 raise Exception(ctypes.get_errno()) 196 197 def newprimary(self, addr): 198 print("newprimary(%s)" % (addr)) 199 200 # Strictly speaking needs to be struct sctp_setpeerprim, but that's 201 # identical to sctp_setprim 202 setp = sctp_setprim() 203 a = to_sockaddr(addr, 0) 204 if type(a) is sockaddr_in: 205 setp.ssp_addr.v4 = a 206 else: 207 assert type(a) is sockaddr_in6 208 setp.ssp_addr.v6 = a 209 210 ret = self._libc.setsockopt(self._fd, socket.IPPROTO_SCTP, 211 SCTP_SET_PEER_PRIMARY_ADDR, ctypes.pointer(setp), ctypes.sizeof(setp)) 212 if ret != 0: 213 print("errno %d" % ctypes.get_errno()) 214 raise 215 216 def bindx(self, addr, add): 217 print("bindx(%s, %s)" % (addr, add)) 218 219 addr = to_sockaddr(addr, 0) 220 221 if add: 222 flag = SCTP_BINDX_ADD_ADDR 223 else: 224 flag = SCTP_BINDX_REM_ADDR 225 ret = self._libc.sctp_bindx(self._fd, ctypes.pointer(addr), 1, flag) 226 if ret != 0: 227 print("sctp_bindx() errno %d" % ctypes.get_errno()) 228 raise 229 230 def send(self, buf, ppid, ordered=False): 231 flags = 0 232 233 if not ordered: 234 flags = SCTP_UNORDERED 235 236 ppid = socket.htonl(ppid) 237 ret = self._libc.sctp_sendmsg(self._fd, ctypes.c_char_p(buf), len(buf), 238 ctypes.c_void_p(0), 0, ppid, flags, 0, 0, 0) 239 if ret < 0: 240 raise Exception("Failed to send message") 241 242 def close(self): 243 self._libc.close(self._fd) 244 self._fd = -1 245 246class TestSCTP(VnetTestTemplate): 247 REQUIRED_MODULES = ["sctp", "pf"] 248 TOPOLOGY = { 249 "vnet1": {"ifaces": ["if1"]}, 250 "vnet2": {"ifaces": ["if1"]}, 251 "if1": {"prefixes4": [("192.0.2.1/24", "192.0.2.2/24")]}, 252 } 253 254 def vnet2_handler(self, vnet): 255 # Give ourself a second IP address, for multihome testing 256 ifname = vnet.iface_alias_map["if1"].name 257 ToolsHelper.print_output("/sbin/ifconfig %s inet alias 192.0.2.3/24" % ifname) 258 259 # Start an SCTP server process, pipe the ppid + data back to the other vnet? 260 srv = SCTPServer(socket.AF_INET, port=1234) 261 while True: 262 srv.accept(vnet) 263 264 @pytest.mark.require_user("root") 265 def test_multihome(self): 266 srv_vnet = self.vnet_map["vnet2"] 267 268 ToolsHelper.print_output("/sbin/pfctl -e") 269 ToolsHelper.pf_rules([ 270 "block proto sctp", 271 "pass inet proto sctp to 192.0.2.0/24", 272 "pass on lo"]) 273 274 # Give the server some time to come up 275 time.sleep(3) 276 277 # Sanity check, we can communicate with the primary address. 278 client = SCTPClient("192.0.2.3", 1234) 279 client.send(b"hello", 0) 280 rcvd = self.wait_object(srv_vnet.pipe) 281 print(rcvd) 282 assert rcvd['ppid'] == 0 283 assert rcvd['data'] == "hello" 284 285 try: 286 client.newpeer("192.0.2.2") 287 client.send(b"world", 0) 288 rcvd = self.wait_object(srv_vnet.pipe) 289 print(rcvd) 290 assert rcvd['ppid'] == 0 291 assert rcvd['data'] == "world" 292 finally: 293 # Debug output 294 ToolsHelper.print_output("/sbin/pfctl -ss") 295 ToolsHelper.print_output("/sbin/pfctl -sr -vv") 296 297 # Check that we have a state for 192.0.2.3 and 192.0.2.2 to 192.0.2.1 298 states = ToolsHelper.get_output("/sbin/pfctl -ss") 299 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.3:1234", states) 300 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.2:1234", states) 301 302 @pytest.mark.require_user("root") 303 def test_multihome_asconf(self): 304 srv_vnet = self.vnet_map["vnet2"] 305 306 # Assign a second IP to ourselves 307 ToolsHelper.print_output("/sbin/ifconfig %s inet alias 192.0.2.10/24" 308 % self.vnet.iface_alias_map["if1"].name) 309 ToolsHelper.print_output("/sbin/pfctl -e") 310 ToolsHelper.pf_rules([ 311 "block proto sctp", 312 "pass on lo", 313 "pass inet proto sctp from 192.0.2.0/24"]) 314 315 # Give the server some time to come up 316 time.sleep(3) 317 318 # Sanity check, we can communicate with the primary address. 319 client = SCTPClient("192.0.2.3", 1234, "192.0.2.1") 320 client.send(b"hello", 0) 321 rcvd = self.wait_object(srv_vnet.pipe) 322 print(rcvd) 323 assert rcvd['ppid'] == 0 324 assert rcvd['data'] == "hello" 325 326 # Now add our second address to the connection 327 client.bindx("192.0.2.10", True) 328 329 # We can still communicate 330 client.send(b"world", 0) 331 rcvd = self.wait_object(srv_vnet.pipe) 332 print(rcvd) 333 assert rcvd['ppid'] == 0 334 assert rcvd['data'] == "world" 335 336 # Now change to a different peer address 337 try: 338 client.newprimary("192.0.2.10") 339 client.send(b"!", 0) 340 rcvd = self.wait_object(srv_vnet.pipe, 5) 341 print(rcvd) 342 assert rcvd['ppid'] == 0 343 assert rcvd['data'] == "!" 344 finally: 345 # Debug output 346 ToolsHelper.print_output("/sbin/pfctl -ss -vv") 347 348 # Ensure we have the states we'd expect 349 states = ToolsHelper.get_output("/sbin/pfctl -ss") 350 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.3:1234", states) 351 assert re.search(r"all sctp 192.0.2.10:.*192.0.2.3:1234", states) 352 353 # Now remove 192.0.2.1 as an address 354 client.bindx("192.0.2.1", False) 355 356 # We can still communicate 357 try: 358 client.send(b"More data", 0) 359 rcvd = self.wait_object(srv_vnet.pipe, 5) 360 print(rcvd) 361 assert rcvd['ppid'] == 0 362 assert rcvd['data'] =="More data" 363 finally: 364 # Debug output 365 ToolsHelper.print_output("/sbin/pfctl -ss -vv") 366 367 # Verify that state is closing 368 states = ToolsHelper.get_output("/sbin/pfctl -ss") 369 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.3:1234.*SHUTDOWN", states) 370 371 372 @pytest.mark.require_user("root") 373 def test_permutation_if_bound(self): 374 # Test that we generate all permutations of src/dst addresses. 375 # Assign two addresses to each end, and check for the expected states 376 srv_vnet = self.vnet_map["vnet2"] 377 378 ifname = self.vnet_map["vnet1"].iface_alias_map["if1"].name 379 ToolsHelper.print_output("/sbin/ifconfig %s inet alias 192.0.2.4/24" % ifname) 380 381 ToolsHelper.print_output("/sbin/pfctl -e") 382 ToolsHelper.pf_rules([ 383 "set state-policy if-bound", 384 "block proto sctp", 385 "pass on lo", 386 "pass inet proto sctp to 192.0.2.0/24"]) 387 388 # Give the server some time to come up 389 time.sleep(3) 390 391 # Sanity check, we can communicate with the primary address. 392 client = SCTPClient("192.0.2.3", 1234) 393 client.send(b"hello", 0) 394 rcvd = self.wait_object(srv_vnet.pipe) 395 print(rcvd) 396 assert rcvd['ppid'] == 0 397 assert rcvd['data'] == "hello" 398 399 # Check that we have a state for 192.0.2.3 and 192.0.2.2 to 192.0.2.1, but also to 192.0.2.4 400 states = ToolsHelper.get_output("/sbin/pfctl -ss") 401 print(states) 402 assert re.search(r"epair.*sctp 192.0.2.1:.*192.0.2.3:1234", states) 403 assert re.search(r"epair.*sctp 192.0.2.1:.*192.0.2.2:1234", states) 404 assert re.search(r"epair.*sctp 192.0.2.4:.*192.0.2.3:1234", states) 405 assert re.search(r"epair.*sctp 192.0.2.4:.*192.0.2.2:1234", states) 406 407 @pytest.mark.require_user("root") 408 def test_permutation_floating(self): 409 # Test that we generate all permutations of src/dst addresses. 410 # Assign two addresses to each end, and check for the expected states 411 srv_vnet = self.vnet_map["vnet2"] 412 413 ifname = self.vnet_map["vnet1"].iface_alias_map["if1"].name 414 ToolsHelper.print_output("/sbin/ifconfig %s inet alias 192.0.2.4/24" % ifname) 415 416 ToolsHelper.print_output("/sbin/pfctl -e") 417 ToolsHelper.pf_rules([ 418 "block proto sctp", 419 "pass on lo", 420 "pass inet proto sctp to 192.0.2.0/24"]) 421 422 # Give the server some time to come up 423 time.sleep(3) 424 425 # Sanity check, we can communicate with the primary address. 426 client = SCTPClient("192.0.2.3", 1234) 427 client.send(b"hello", 0) 428 rcvd = self.wait_object(srv_vnet.pipe) 429 print(rcvd) 430 assert rcvd['ppid'] == 0 431 assert rcvd['data'] == "hello" 432 433 # Check that we have a state for 192.0.2.3 and 192.0.2.2 to 192.0.2.1, but also to 192.0.2.4 434 states = ToolsHelper.get_output("/sbin/pfctl -ss") 435 print(states) 436 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.3:1234", states) 437 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.2:1234", states) 438 assert re.search(r"all sctp 192.0.2.4:.*192.0.2.3:1234", states) 439 assert re.search(r"all sctp 192.0.2.4:.*192.0.2.2:1234", states) 440 441 @pytest.mark.require_user("root") 442 def test_limit_addresses(self): 443 srv_vnet = self.vnet_map["vnet2"] 444 445 ifname = self.vnet_map["vnet1"].iface_alias_map["if1"].name 446 for i in range(0, 16): 447 ToolsHelper.print_output("/sbin/ifconfig %s inet alias 192.0.2.%d/24" % (ifname, 4 + i)) 448 449 ToolsHelper.print_output("/sbin/pfctl -e") 450 ToolsHelper.pf_rules([ 451 "block proto sctp", 452 "pass on lo", 453 "pass inet proto sctp to 192.0.2.0/24"]) 454 455 # Give the server some time to come up 456 time.sleep(3) 457 458 # Set up a connection, which will try to create states for all addresses 459 # we have assigned 460 client = SCTPClient("192.0.2.3", 1234) 461 client.send(b"hello", 0) 462 rcvd = self.wait_object(srv_vnet.pipe) 463 print(rcvd) 464 assert rcvd['ppid'] == 0 465 assert rcvd['data'] == "hello" 466 467 # But the number should be limited to 9 (original + 8 extra) 468 states = ToolsHelper.get_output("/sbin/pfctl -ss | grep 192.0.2.2") 469 print(states) 470 assert(states.count('\n') <= 9) 471 472 @pytest.mark.require_user("root") 473 def test_disallow_related(self): 474 srv_vnet = self.vnet_map["vnet2"] 475 476 ToolsHelper.print_output("/sbin/pfctl -e") 477 ToolsHelper.pf_rules([ 478 "block proto sctp", 479 "pass inet proto sctp to 192.0.2.3", 480 "pass on lo"]) 481 482 # Give the server some time to come up 483 time.sleep(3) 484 485 # Sanity check, we can communicate with the primary address. 486 client = SCTPClient("192.0.2.3", 1234) 487 client.send(b"hello", 0) 488 rcvd = self.wait_object(srv_vnet.pipe) 489 print(rcvd) 490 assert rcvd['ppid'] == 0 491 assert rcvd['data'] == "hello" 492 493 # This shouldn't work 494 success=False 495 try: 496 client.newpeer("192.0.2.2") 497 client.send(b"world", 0) 498 rcvd = self.wait_object(srv_vnet.pipe) 499 print(rcvd) 500 assert rcvd['ppid'] == 0 501 assert rcvd['data'] == "world" 502 success=True 503 except: 504 success=False 505 assert not success 506 507 # Check that we have a state for 192.0.2.3, but not 192.0.2.2 to 192.0.2.1 508 states = ToolsHelper.get_output("/sbin/pfctl -ss") 509 assert re.search(r"all sctp 192.0.2.1:.*192.0.2.3:1234", states) 510 assert not re.search(r"all sctp 192.0.2.1:.*192.0.2.2:1234", states) 511 512 @pytest.mark.require_user("root") 513 def test_allow_related(self): 514 srv_vnet = self.vnet_map["vnet2"] 515 516 ToolsHelper.print_output("/sbin/pfctl -e") 517 ToolsHelper.pf_rules([ 518 "set state-policy if-bound", 519 "block proto sctp", 520 "pass inet proto sctp to 192.0.2.3 keep state (allow-related)", 521 "pass on lo"]) 522 523 # Give the server some time to come up 524 time.sleep(3) 525 526 # Sanity check, we can communicate with the primary address. 527 client = SCTPClient("192.0.2.3", 1234) 528 client.send(b"hello", 0) 529 rcvd = self.wait_object(srv_vnet.pipe) 530 print(rcvd) 531 assert rcvd['ppid'] == 0 532 assert rcvd['data'] == "hello" 533 534 success=False 535 try: 536 client.newpeer("192.0.2.2") 537 client.send(b"world", 0) 538 rcvd = self.wait_object(srv_vnet.pipe) 539 print(rcvd) 540 assert rcvd['ppid'] == 0 541 assert rcvd['data'] == "world" 542 success=True 543 finally: 544 # Debug output 545 ToolsHelper.print_output("/sbin/pfctl -ss") 546 ToolsHelper.print_output("/sbin/pfctl -sr -vv") 547 assert success 548 549 # Check that we have a state for 192.0.2.3 and 192.0.2.2 to 192.0.2.1 550 states = ToolsHelper.get_output("/sbin/pfctl -ss") 551 assert re.search(r"epair.*sctp 192.0.2.1:.*192.0.2.3:1234", states) 552 assert re.search(r"epair.*sctp 192.0.2.1:.*192.0.2.2:1234", states) 553 554class TestSCTPv6(VnetTestTemplate): 555 REQUIRED_MODULES = ["sctp", "pf"] 556 TOPOLOGY = { 557 "vnet1": {"ifaces": ["if1"]}, 558 "vnet2": {"ifaces": ["if1"]}, 559 "if1": {"prefixes6": [("2001:db8::1/64", "2001:db8::2/64")]}, 560 } 561 562 def vnet2_handler(self, vnet): 563 # Give ourself a second IP address, for multihome testing 564 ifname = vnet.iface_alias_map["if1"].name 565 ToolsHelper.print_output("/sbin/ifconfig %s inet6 alias 2001:db8::3/64" % ifname) 566 567 # Start an SCTP server process, pipe the ppid + data back to the other vnet? 568 srv = SCTPServer(socket.AF_INET6, port=1234) 569 while True: 570 srv.accept(vnet) 571 572 @pytest.mark.require_user("root") 573 def test_multihome(self): 574 srv_vnet = self.vnet_map["vnet2"] 575 576 ToolsHelper.print_output("/sbin/pfctl -e") 577 ToolsHelper.pf_rules([ 578 "block proto sctp", 579 "pass on lo", 580 "pass inet6 proto sctp to 2001:db8::0/64"]) 581 582 # Give the server some time to come up 583 time.sleep(3) 584 585 # Sanity check, we can communicate with the primary address. 586 client = SCTPClient("2001:db8::3", 1234) 587 client.send(b"hello", 0) 588 rcvd = self.wait_object(srv_vnet.pipe) 589 print(rcvd) 590 assert rcvd['ppid'] == 0 591 assert rcvd['data'] == "hello" 592 593 # Now change to a different peer address 594 try: 595 client.newpeer("2001:db8::2") 596 client.send(b"world", 0) 597 rcvd = self.wait_object(srv_vnet.pipe) 598 print(rcvd) 599 assert rcvd['ppid'] == 0 600 assert rcvd['data'] == "world" 601 finally: 602 # Debug output 603 ToolsHelper.print_output("/sbin/pfctl -ss -vv") 604 605 # Check that we have the expected states 606 states = ToolsHelper.get_output("/sbin/pfctl -ss") 607 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::3\[1234\]", states) 608 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::2\[1234\]", states) 609 610 @pytest.mark.require_user("root") 611 def test_multihome_asconf(self): 612 srv_vnet = self.vnet_map["vnet2"] 613 614 # Assign a second IP to ourselves 615 ToolsHelper.print_output("/sbin/ifconfig %s inet6 alias 2001:db8::10/64" 616 % self.vnet.iface_alias_map["if1"].name) 617 ToolsHelper.print_output("/sbin/pfctl -e") 618 ToolsHelper.pf_rules([ 619 "block proto sctp", 620 "pass on lo", 621 "pass inet6 proto sctp from 2001:db8::/64"]) 622 623 # Give the server some time to come up 624 time.sleep(3) 625 626 # Sanity check, we can communicate with the primary address. 627 client = SCTPClient("2001:db8::3", 1234, "2001:db8::1") 628 client.send(b"hello", 0) 629 rcvd = self.wait_object(srv_vnet.pipe) 630 print(rcvd) 631 assert rcvd['ppid'] == 0 632 assert rcvd['data'] == "hello" 633 634 # Now add our second address to the connection 635 client.bindx("2001:db8::10", True) 636 637 # We can still communicate 638 client.send(b"world", 0) 639 rcvd = self.wait_object(srv_vnet.pipe) 640 print(rcvd) 641 assert rcvd['ppid'] == 0 642 assert rcvd['data'] == "world" 643 644 # Now change to a different peer address 645 try: 646 client.newprimary("2001:db8::10") 647 client.send(b"!", 0) 648 rcvd = self.wait_object(srv_vnet.pipe, 5) 649 print(rcvd) 650 assert rcvd['ppid'] == 0 651 assert rcvd['data'] == "!" 652 finally: 653 # Debug output 654 ToolsHelper.print_output("/sbin/pfctl -ss -vv") 655 656 # Check that we have the expected states 657 states = ToolsHelper.get_output("/sbin/pfctl -ss") 658 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::3\[1234\]", states) 659 assert re.search(r"all sctp 2001:db8::10\[.*2001:db8::3\[1234\]", states) 660 661 # Now remove 2001:db8::1 as an address 662 client.bindx("2001:db8::1", False) 663 664 # Wecan still communicate 665 try: 666 client.send(b"More data", 0) 667 rcvd = self.wait_object(srv_vnet.pipe, 5) 668 print(rcvd) 669 assert rcvd['ppid'] == 0 670 assert rcvd['data'] == "More data" 671 finally: 672 # Debug output 673 ToolsHelper.print_output("/sbin/pfctl -ss -vv") 674 675 # Verify that the state is closing 676 states = ToolsHelper.get_output("/sbin/pfctl -ss") 677 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::3\[1234\].*SHUTDOWN", states) 678 679 @pytest.mark.require_user("root") 680 def test_permutation(self): 681 # Test that we generate all permutations of src/dst addresses. 682 # Assign two addresses to each end, and check for the expected states 683 srv_vnet = self.vnet_map["vnet2"] 684 685 ifname = self.vnet_map["vnet1"].iface_alias_map["if1"].name 686 ToolsHelper.print_output("/sbin/ifconfig %s inet6 alias 2001:db8::4/64" % ifname) 687 688 ToolsHelper.print_output("/sbin/pfctl -e") 689 ToolsHelper.pf_rules([ 690 "set state-policy if-bound", 691 "block proto sctp", 692 "pass on lo", 693 "pass inet6 proto sctp to 2001:db8::0/64"]) 694 695 # Give the server some time to come up 696 time.sleep(3) 697 698 # Sanity check, we can communicate with the primary address. 699 client = SCTPClient("2001:db8::3", 1234) 700 client.send(b"hello", 0) 701 rcvd = self.wait_object(srv_vnet.pipe) 702 print(rcvd) 703 assert rcvd['ppid'] == 0 704 assert rcvd['data'] == "hello" 705 706 # Check that we have a state for 2001:db8::3 and 2001:db8::2 to 2001:db8::1, but also to 2001:db8::4 707 states = ToolsHelper.get_output("/sbin/pfctl -ss") 708 print(states) 709 assert re.search(r"epair.*sctp 2001:db8::1\[.*2001:db8::2\[1234\]", states) 710 assert re.search(r"epair.*sctp 2001:db8::1\[.*2001:db8::3\[1234\]", states) 711 assert re.search(r"epair.*sctp 2001:db8::4\[.*2001:db8::2\[1234\]", states) 712 assert re.search(r"epair.*sctp 2001:db8::4\[.*2001:db8::3\[1234\]", states) 713 714 @pytest.mark.require_user("root") 715 def test_permutation_floating(self): 716 # Test that we generate all permutations of src/dst addresses. 717 # Assign two addresses to each end, and check for the expected states 718 srv_vnet = self.vnet_map["vnet2"] 719 720 ifname = self.vnet_map["vnet1"].iface_alias_map["if1"].name 721 ToolsHelper.print_output("/sbin/ifconfig %s inet6 alias 2001:db8::4/64" % ifname) 722 723 ToolsHelper.print_output("/sbin/pfctl -e") 724 ToolsHelper.pf_rules([ 725 "block proto sctp", 726 "pass on lo", 727 "pass inet6 proto sctp to 2001:db8::0/64"]) 728 729 # Give the server some time to come up 730 time.sleep(3) 731 732 # Sanity check, we can communicate with the primary address. 733 client = SCTPClient("2001:db8::3", 1234) 734 client.send(b"hello", 0) 735 rcvd = self.wait_object(srv_vnet.pipe) 736 print(rcvd) 737 assert rcvd['ppid'] == 0 738 assert rcvd['data'] == "hello" 739 740 # Check that we have a state for 2001:db8::3 and 2001:db8::2 to 2001:db8::1, but also to 2001:db8::4 741 states = ToolsHelper.get_output("/sbin/pfctl -ss") 742 print(states) 743 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::2\[1234\]", states) 744 assert re.search(r"all sctp 2001:db8::1\[.*2001:db8::3\[1234\]", states) 745 assert re.search(r"all sctp 2001:db8::4\[.*2001:db8::2\[1234\]", states) 746 assert re.search(r"all sctp 2001:db8::4\[.*2001:db8::3\[1234\]", states) 747