1## 2# SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3# 4# Copyright (c) 2022 Rubicon Communications, LLC ("Netgate") 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions 8# are met: 9# 1. Redistributions of source code must retain the above copyright 10# notice, this list of conditions and the following disclaimer. 11# 2. Redistributions in binary form must reproduce the above copyright 12# notice, this list of conditions and the following disclaimer in the 13# documentation and/or other materials provided with the distribution. 14# 15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25# SUCH DAMAGE. 26 27. $(atf_get_srcdir)/utils.subr 28. $(atf_get_srcdir)/../../netpfil/pf/utils.subr 29 30atf_test_case "4in4" "cleanup" 314in4_head() 32{ 33 atf_set descr 'IPv4 in IPv4 tunnel' 34 atf_set require.user root 35 atf_set require.progs openvpn 36} 37 384in4_body() 39{ 40 ovpn_init 41 42 l=$(vnet_mkepair) 43 44 vnet_mkjail a ${l}a 45 jexec a ifconfig ${l}a 192.0.2.1/24 up 46 vnet_mkjail b ${l}b 47 jexec b ifconfig ${l}b 192.0.2.2/24 up 48 49 # Sanity check 50 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 51 52 ovpn_start a " 53 dev ovpn0 54 dev-type tun 55 proto udp4 56 57 cipher AES-256-GCM 58 auth SHA256 59 60 local 192.0.2.1 61 server 198.51.100.0 255.255.255.0 62 ca $(atf_get_srcdir)/ca.crt 63 cert $(atf_get_srcdir)/server.crt 64 key $(atf_get_srcdir)/server.key 65 dh $(atf_get_srcdir)/dh.pem 66 67 mode server 68 script-security 2 69 auth-user-pass-verify /usr/bin/true via-env 70 topology subnet 71 72 keepalive 100 600 73 " 74 ovpn_start b " 75 dev tun0 76 dev-type tun 77 78 client 79 80 remote 192.0.2.1 81 auth-user-pass $(atf_get_srcdir)/user.pass 82 83 ca $(atf_get_srcdir)/ca.crt 84 cert $(atf_get_srcdir)/client.crt 85 key $(atf_get_srcdir)/client.key 86 dh $(atf_get_srcdir)/dh.pem 87 88 keepalive 100 600 89 " 90 91 # Give the tunnel time to come up 92 sleep 10 93 94 atf_check -s exit:0 -o ignore jexec b ping -c 1 198.51.100.1 95 96 echo 'foo' | jexec b nc -u -w 2 192.0.2.1 1194 97 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 98} 99 1004in4_cleanup() 101{ 102 ovpn_cleanup 103} 104 105atf_test_case "4mapped" "cleanup" 1064mapped_head() 107{ 108 atf_set descr 'IPv4 mapped addresses' 109 atf_set require.user root 110 atf_set require.progs openvpn 111} 112 1134mapped_body() 114{ 115 ovpn_init 116 117 l=$(vnet_mkepair) 118 119 vnet_mkjail a ${l}a 120 jexec a ifconfig ${l}a 192.0.2.1/24 up 121 vnet_mkjail b ${l}b 122 jexec b ifconfig ${l}b 192.0.2.2/24 up 123 124 # Sanity check 125 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 126 127 #jexec a ifconfig ${l}a 128 129 ovpn_start a " 130 dev ovpn0 131 dev-type tun 132 133 cipher AES-256-GCM 134 auth SHA256 135 136 server 198.51.100.0 255.255.255.0 137 ca $(atf_get_srcdir)/ca.crt 138 cert $(atf_get_srcdir)/server.crt 139 key $(atf_get_srcdir)/server.key 140 dh $(atf_get_srcdir)/dh.pem 141 142 mode server 143 script-security 2 144 auth-user-pass-verify /usr/bin/true via-env 145 topology subnet 146 147 keepalive 100 600 148 " 149 ovpn_start b " 150 dev tun0 151 dev-type tun 152 153 client 154 155 remote 192.0.2.1 156 auth-user-pass $(atf_get_srcdir)/user.pass 157 158 ca $(atf_get_srcdir)/ca.crt 159 cert $(atf_get_srcdir)/client.crt 160 key $(atf_get_srcdir)/client.key 161 dh $(atf_get_srcdir)/dh.pem 162 163 keepalive 100 600 164 " 165 166 # Give the tunnel time to come up 167 sleep 10 168 169 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 170} 171 1724mapped_cleanup() 173{ 174 ovpn_cleanup 175} 176 177atf_test_case "6in4" "cleanup" 1786in4_head() 179{ 180 atf_set descr 'IPv6 in IPv4 tunnel' 181 atf_set require.user root 182 atf_set require.progs openvpn 183} 184 1856in4_body() 186{ 187 ovpn_init 188 189 l=$(vnet_mkepair) 190 191 vnet_mkjail a ${l}a 192 jexec a ifconfig ${l}a 192.0.2.1/24 up 193 vnet_mkjail b ${l}b 194 jexec b ifconfig ${l}b 192.0.2.2/24 up 195 196 # Sanity check 197 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 198 199 ovpn_start a " 200 dev ovpn0 201 dev-type tun 202 proto udp 203 204 cipher AES-256-GCM 205 auth SHA256 206 207 local 192.0.2.1 208 server-ipv6 2001:db8:1::/64 209 210 ca $(atf_get_srcdir)/ca.crt 211 cert $(atf_get_srcdir)/server.crt 212 key $(atf_get_srcdir)/server.key 213 dh $(atf_get_srcdir)/dh.pem 214 215 mode server 216 script-security 2 217 auth-user-pass-verify /usr/bin/true via-env 218 topology subnet 219 220 keepalive 100 600 221 " 222 ovpn_start b " 223 dev tun0 224 dev-type tun 225 226 client 227 228 remote 192.0.2.1 229 auth-user-pass $(atf_get_srcdir)/user.pass 230 231 ca $(atf_get_srcdir)/ca.crt 232 cert $(atf_get_srcdir)/client.crt 233 key $(atf_get_srcdir)/client.key 234 dh $(atf_get_srcdir)/dh.pem 235 236 keepalive 100 600 237 " 238 239 # Give the tunnel time to come up 240 sleep 10 241 242 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 2001:db8:1::1 243} 244 2456in4_cleanup() 246{ 247 ovpn_cleanup 248} 249 250atf_test_case "4in6" "cleanup" 2514in6_head() 252{ 253 atf_set descr 'IPv4 in IPv6 tunnel' 254 atf_set require.user root 255 atf_set require.progs openvpn 256} 257 2584in6_body() 259{ 260 ovpn_init 261 262 l=$(vnet_mkepair) 263 264 vnet_mkjail a ${l}a 265 jexec a ifconfig ${l}a inet6 2001:db8::1/64 up no_dad 266 vnet_mkjail b ${l}b 267 jexec b ifconfig ${l}b inet6 2001:db8::2/64 up no_dad 268 269 # Sanity check 270 atf_check -s exit:0 -o ignore jexec a ping6 -c 1 2001:db8::2 271 272 ovpn_start a " 273 dev ovpn0 274 dev-type tun 275 proto udp6 276 277 cipher AES-256-GCM 278 auth SHA256 279 280 local 2001:db8::1 281 server 198.51.100.0 255.255.255.0 282 ca $(atf_get_srcdir)/ca.crt 283 cert $(atf_get_srcdir)/server.crt 284 key $(atf_get_srcdir)/server.key 285 dh $(atf_get_srcdir)/dh.pem 286 287 mode server 288 script-security 2 289 auth-user-pass-verify /usr/bin/true via-env 290 topology subnet 291 292 keepalive 100 600 293 " 294 ovpn_start b " 295 dev tun0 296 dev-type tun 297 298 client 299 300 remote 2001:db8::1 301 auth-user-pass $(atf_get_srcdir)/user.pass 302 303 ca $(atf_get_srcdir)/ca.crt 304 cert $(atf_get_srcdir)/client.crt 305 key $(atf_get_srcdir)/client.key 306 dh $(atf_get_srcdir)/dh.pem 307 308 keepalive 100 600 309 " 310 311 # Give the tunnel time to come up 312 sleep 10 313 314 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 315} 316 3174in6_cleanup() 318{ 319 ovpn_cleanup 320} 321 322atf_test_case "6in6" "cleanup" 3236in6_head() 324{ 325 atf_set descr 'IPv6 in IPv6 tunnel' 326 atf_set require.user root 327 atf_set require.progs openvpn 328} 329 3306in6_body() 331{ 332 ovpn_init 333 334 l=$(vnet_mkepair) 335 336 vnet_mkjail a ${l}a 337 jexec a ifconfig ${l}a inet6 2001:db8::1/64 up no_dad 338 vnet_mkjail b ${l}b 339 jexec b ifconfig ${l}b inet6 2001:db8::2/64 up no_dad 340 341 # Sanity check 342 atf_check -s exit:0 -o ignore jexec a ping6 -c 1 2001:db8::2 343 344 ovpn_start a " 345 dev ovpn0 346 dev-type tun 347 proto udp6 348 349 cipher AES-256-GCM 350 auth SHA256 351 352 local 2001:db8::1 353 server-ipv6 2001:db8:1::/64 354 355 ca $(atf_get_srcdir)/ca.crt 356 cert $(atf_get_srcdir)/server.crt 357 key $(atf_get_srcdir)/server.key 358 dh $(atf_get_srcdir)/dh.pem 359 360 mode server 361 script-security 2 362 auth-user-pass-verify /usr/bin/true via-env 363 topology subnet 364 365 keepalive 100 600 366 " 367 ovpn_start b " 368 dev tun0 369 dev-type tun 370 371 client 372 373 remote 2001:db8::1 374 auth-user-pass $(atf_get_srcdir)/user.pass 375 376 ca $(atf_get_srcdir)/ca.crt 377 cert $(atf_get_srcdir)/client.crt 378 key $(atf_get_srcdir)/client.key 379 dh $(atf_get_srcdir)/dh.pem 380 381 keepalive 100 600 382 " 383 384 # Give the tunnel time to come up 385 sleep 10 386 387 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 2001:db8:1::1 388 atf_check -s exit:0 -o ignore jexec b ping6 -c 3 -z 16 2001:db8:1::1 389} 390 3916in6_cleanup() 392{ 393 ovpn_cleanup 394} 395 396atf_test_case "timeout_client" "cleanup" 397timeout_client_head() 398{ 399 atf_set descr 'IPv4 in IPv4 tunnel' 400 atf_set require.user root 401 atf_set require.progs openvpn 402} 403 404timeout_client_body() 405{ 406 ovpn_init 407 408 l=$(vnet_mkepair) 409 410 vnet_mkjail a ${l}a 411 jexec a ifconfig ${l}a 192.0.2.1/24 up 412 jexec a ifconfig lo0 127.0.0.1/8 up 413 vnet_mkjail b ${l}b 414 jexec b ifconfig ${l}b 192.0.2.2/24 up 415 416 # Sanity check 417 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 418 419 ovpn_start a " 420 dev ovpn0 421 dev-type tun 422 proto udp4 423 424 cipher AES-256-GCM 425 auth SHA256 426 427 local 192.0.2.1 428 server 198.51.100.0 255.255.255.0 429 ca $(atf_get_srcdir)/ca.crt 430 cert $(atf_get_srcdir)/server.crt 431 key $(atf_get_srcdir)/server.key 432 dh $(atf_get_srcdir)/dh.pem 433 434 mode server 435 script-security 2 436 auth-user-pass-verify /usr/bin/true via-env 437 topology subnet 438 439 keepalive 2 10 440 441 management 192.0.2.1 1234 442 " 443 ovpn_start b " 444 dev tun0 445 dev-type tun 446 447 client 448 449 remote 192.0.2.1 450 auth-user-pass $(atf_get_srcdir)/user.pass 451 452 ca $(atf_get_srcdir)/ca.crt 453 cert $(atf_get_srcdir)/client.crt 454 key $(atf_get_srcdir)/client.key 455 dh $(atf_get_srcdir)/dh.pem 456 457 keepalive 2 10 458 " 459 460 # Give the tunnel time to come up 461 sleep 10 462 463 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 464 465 # Kill the client 466 jexec b killall openvpn 467 468 # Now wait for the server to notice 469 sleep 15 470 471 while echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; do 472 echo "Client disconnect not discovered" 473 sleep 1 474 done 475} 476 477timeout_client_cleanup() 478{ 479 ovpn_cleanup 480} 481 482atf_test_case "explicit_exit" "cleanup" 483explicit_exit_head() 484{ 485 atf_set descr 'Test explicit exit notification' 486 atf_set require.user root 487 atf_set require.progs openvpn 488} 489 490explicit_exit_body() 491{ 492 ovpn_init 493 494 l=$(vnet_mkepair) 495 496 vnet_mkjail a ${l}a 497 jexec a ifconfig ${l}a 192.0.2.1/24 up 498 jexec a ifconfig lo0 127.0.0.1/8 up 499 vnet_mkjail b ${l}b 500 jexec b ifconfig ${l}b 192.0.2.2/24 up 501 502 # Sanity check 503 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 504 505 ovpn_start a " 506 dev ovpn0 507 dev-type tun 508 proto udp4 509 510 cipher AES-256-GCM 511 auth SHA256 512 513 local 192.0.2.1 514 server 198.51.100.0 255.255.255.0 515 ca $(atf_get_srcdir)/ca.crt 516 cert $(atf_get_srcdir)/server.crt 517 key $(atf_get_srcdir)/server.key 518 dh $(atf_get_srcdir)/dh.pem 519 520 mode server 521 script-security 2 522 auth-user-pass-verify /usr/bin/true via-env 523 topology subnet 524 525 management 192.0.2.1 1234 526 " 527 ovpn_start b " 528 dev tun0 529 dev-type tun 530 531 client 532 533 remote 192.0.2.1 534 auth-user-pass $(atf_get_srcdir)/user.pass 535 536 ca $(atf_get_srcdir)/ca.crt 537 cert $(atf_get_srcdir)/client.crt 538 key $(atf_get_srcdir)/client.key 539 dh $(atf_get_srcdir)/dh.pem 540 541 explicit-exit-notify 542 " 543 544 # Give the tunnel time to come up 545 sleep 10 546 547 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 548 549 if ! echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; then 550 atf_fail "Client not found in status list!" 551 fi 552 553 # Kill the client 554 jexec b killall openvpn 555 556 while echo "status" | jexec a nc -N 192.0.2.1 1234 | grep 192.0.2.2; do 557 jexec a ps auxf 558 echo "Client disconnect not discovered" 559 sleep 1 560 done 561} 562 563explicit_exit_cleanup() 564{ 565 ovpn_cleanup 566} 567 568atf_test_case "multi_client" "cleanup" 569multi_client_head() 570{ 571 atf_set descr 'Multiple simultaneous clients' 572 atf_set require.user root 573 atf_set require.progs openvpn 574} 575 576multi_client_body() 577{ 578 ovpn_init 579 580 bridge=$(vnet_mkbridge) 581 srv=$(vnet_mkepair) 582 one=$(vnet_mkepair) 583 two=$(vnet_mkepair) 584 585 ifconfig ${bridge} up 586 587 ifconfig ${srv}a up 588 ifconfig ${bridge} addm ${srv}a 589 ifconfig ${one}a up 590 ifconfig ${bridge} addm ${one}a 591 ifconfig ${two}a up 592 ifconfig ${bridge} addm ${two}a 593 594 vnet_mkjail srv ${srv}b 595 jexec srv ifconfig ${srv}b 192.0.2.1/24 up 596 vnet_mkjail one ${one}b 597 jexec one ifconfig ${one}b 192.0.2.2/24 up 598 vnet_mkjail two ${two}b 599 jexec two ifconfig ${two}b 192.0.2.3/24 up 600 jexec two ifconfig lo0 127.0.0.1/8 up 601 jexec two ifconfig lo0 inet alias 203.0.113.1/24 602 603 # Sanity checks 604 atf_check -s exit:0 -o ignore jexec one ping -c 1 192.0.2.1 605 atf_check -s exit:0 -o ignore jexec two ping -c 1 192.0.2.1 606 607 jexec srv sysctl net.inet.ip.forwarding=1 608 609 ovpn_start srv " 610 dev ovpn0 611 dev-type tun 612 proto udp4 613 614 cipher AES-256-GCM 615 auth SHA256 616 617 local 192.0.2.1 618 server 198.51.100.0 255.255.255.0 619 620 push \"route 203.0.113.0 255.255.255.0 198.51.100.1\" 621 622 ca $(atf_get_srcdir)/ca.crt 623 cert $(atf_get_srcdir)/server.crt 624 key $(atf_get_srcdir)/server.key 625 dh $(atf_get_srcdir)/dh.pem 626 627 mode server 628 duplicate-cn 629 script-security 2 630 auth-user-pass-verify /usr/bin/true via-env 631 topology subnet 632 633 keepalive 100 600 634 635 client-config-dir $(atf_get_srcdir)/ccd 636 " 637 ovpn_start one " 638 dev tun0 639 dev-type tun 640 641 client 642 643 remote 192.0.2.1 644 auth-user-pass $(atf_get_srcdir)/user.pass 645 646 ca $(atf_get_srcdir)/ca.crt 647 cert $(atf_get_srcdir)/client.crt 648 key $(atf_get_srcdir)/client.key 649 dh $(atf_get_srcdir)/dh.pem 650 651 keepalive 100 600 652 " 653 ovpn_start two " 654 dev tun0 655 dev-type tun 656 657 client 658 659 remote 192.0.2.1 660 auth-user-pass $(atf_get_srcdir)/user.pass 661 662 ca $(atf_get_srcdir)/ca.crt 663 cert $(atf_get_srcdir)/client2.crt 664 key $(atf_get_srcdir)/client2.key 665 dh $(atf_get_srcdir)/dh.pem 666 667 keepalive 100 600 668 " 669 670 # Give the tunnel time to come up 671 sleep 10 672 673 atf_check -s exit:0 -o ignore jexec one ping -c 3 198.51.100.1 674 atf_check -s exit:0 -o ignore jexec two ping -c 3 198.51.100.1 675 676 # Client-to-client communication 677 atf_check -s exit:0 -o ignore jexec one ping -c 3 198.51.100.3 678 atf_check -s exit:0 -o ignore jexec two ping -c 3 198.51.100.2 679 680 # iroute test 681 atf_check -s exit:0 -o ignore jexec one ping -c 3 203.0.113.1 682} 683 684multi_client_cleanup() 685{ 686 ovpn_cleanup 687} 688 689atf_test_case "route_to" "cleanup" 690route_to_head() 691{ 692 atf_set descr "Test pf's route-to with OpenVPN tunnels" 693 atf_set require.user root 694 atf_set require.progs openvpn 695} 696 697route_to_body() 698{ 699 pft_init 700 ovpn_init 701 702 l=$(vnet_mkepair) 703 n=$(vnet_mkepair) 704 705 vnet_mkjail a ${l}a 706 jexec a ifconfig ${l}a 192.0.2.1/24 up 707 vnet_mkjail b ${l}b ${n}a 708 jexec b ifconfig ${l}b 192.0.2.2/24 up 709 jexec b ifconfig ${n}a up 710 711 # Sanity check 712 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 713 714 ovpn_start a " 715 dev ovpn0 716 dev-type tun 717 proto udp4 718 719 cipher AES-256-GCM 720 auth SHA256 721 722 local 192.0.2.1 723 server 198.51.100.0 255.255.255.0 724 ca $(atf_get_srcdir)/ca.crt 725 cert $(atf_get_srcdir)/server.crt 726 key $(atf_get_srcdir)/server.key 727 dh $(atf_get_srcdir)/dh.pem 728 729 mode server 730 script-security 2 731 auth-user-pass-verify /usr/bin/true via-env 732 topology subnet 733 734 keepalive 100 600 735 " 736 ovpn_start b " 737 dev tun0 738 dev-type tun 739 740 client 741 742 remote 192.0.2.1 743 auth-user-pass $(atf_get_srcdir)/user.pass 744 745 ca $(atf_get_srcdir)/ca.crt 746 cert $(atf_get_srcdir)/client.crt 747 key $(atf_get_srcdir)/client.key 748 dh $(atf_get_srcdir)/dh.pem 749 750 keepalive 100 600 751 " 752 753 # Give the tunnel time to come up 754 sleep 10 755 jexec a ifconfig ovpn0 inet alias 198.51.100.254/24 756 757 # Check the tunnel 758 atf_check -s exit:0 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.1 759 atf_check -s exit:0 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.254 760 761 # Break our route to .254 so that we need a route-to to make things work. 762 jexec b ifconfig ${n}a 203.0.113.1/24 up 763 jexec b route add 198.51.100.254 -interface ${n}a 764 765 # Make sure it's broken. 766 atf_check -s exit:2 -o ignore jexec b ping -c 1 -S 198.51.100.2 198.51.100.254 767 768 jexec b pfctl -e 769 pft_set_rules b \ 770 "pass out route-to (tun0 198.51.100.1) proto icmp from 198.51.100.2 " 771 atf_check -s exit:0 -o ignore jexec b ping -c 3 -S 198.51.100.2 198.51.100.254 772} 773 774route_to_cleanup() 775{ 776 ovpn_cleanup 777 pft_cleanup 778} 779 780atf_test_case "ra" "cleanup" 781ra_head() 782{ 783 atf_set descr 'Remote access with multiple clients' 784 atf_set require.user root 785 atf_set require.progs openvpn 786} 787 788ra_body() 789{ 790 ovpn_init 791 792 bridge=$(vnet_mkbridge) 793 srv=$(vnet_mkepair) 794 lan=$(vnet_mkepair) 795 one=$(vnet_mkepair) 796 two=$(vnet_mkepair) 797 798 ifconfig ${bridge} up 799 800 ifconfig ${srv}a up 801 ifconfig ${bridge} addm ${srv}a 802 ifconfig ${one}a up 803 ifconfig ${bridge} addm ${one}a 804 ifconfig ${two}a up 805 ifconfig ${bridge} addm ${two}a 806 807 vnet_mkjail srv ${srv}b ${lan}a 808 jexec srv ifconfig ${srv}b 192.0.2.1/24 up 809 jexec srv ifconfig ${lan}a 203.0.113.1/24 up 810 vnet_mkjail lan ${lan}b 811 jexec lan ifconfig ${lan}b 203.0.113.2/24 up 812 jexec lan route add default 203.0.113.1 813 vnet_mkjail one ${one}b 814 jexec one ifconfig ${one}b 192.0.2.2/24 up 815 vnet_mkjail two ${two}b 816 jexec two ifconfig ${two}b 192.0.2.3/24 up 817 818 # Sanity checks 819 atf_check -s exit:0 -o ignore jexec one ping -c 1 192.0.2.1 820 atf_check -s exit:0 -o ignore jexec two ping -c 1 192.0.2.1 821 atf_check -s exit:0 -o ignore jexec srv ping -c 1 203.0.113.2 822 823 jexec srv sysctl net.inet.ip.forwarding=1 824 825 ovpn_start srv " 826 dev ovpn0 827 dev-type tun 828 proto udp4 829 830 cipher AES-256-GCM 831 auth SHA256 832 833 local 192.0.2.1 834 server 198.51.100.0 255.255.255.0 835 836 push \"route 203.0.113.0 255.255.255.0\" 837 838 ca $(atf_get_srcdir)/ca.crt 839 cert $(atf_get_srcdir)/server.crt 840 key $(atf_get_srcdir)/server.key 841 dh $(atf_get_srcdir)/dh.pem 842 843 mode server 844 duplicate-cn 845 script-security 2 846 auth-user-pass-verify /usr/bin/true via-env 847 topology subnet 848 849 keepalive 100 600 850 " 851 ovpn_start one " 852 dev tun0 853 dev-type tun 854 855 client 856 857 remote 192.0.2.1 858 auth-user-pass $(atf_get_srcdir)/user.pass 859 860 ca $(atf_get_srcdir)/ca.crt 861 cert $(atf_get_srcdir)/client.crt 862 key $(atf_get_srcdir)/client.key 863 dh $(atf_get_srcdir)/dh.pem 864 865 keepalive 100 600 866 " 867 sleep 2 868 ovpn_start two " 869 dev tun0 870 dev-type tun 871 872 client 873 874 remote 192.0.2.1 875 auth-user-pass $(atf_get_srcdir)/user.pass 876 877 ca $(atf_get_srcdir)/ca.crt 878 cert $(atf_get_srcdir)/client2.crt 879 key $(atf_get_srcdir)/client2.key 880 dh $(atf_get_srcdir)/dh.pem 881 882 keepalive 100 600 883 " 884 885 # Give the tunnel time to come up 886 sleep 10 887 888 atf_check -s exit:0 -o ignore jexec one ping -c 1 198.51.100.1 889 atf_check -s exit:0 -o ignore jexec two ping -c 1 198.51.100.1 890 891 # Client-to-client communication 892 atf_check -s exit:0 -o ignore jexec one ping -c 1 198.51.100.3 893 atf_check -s exit:0 -o ignore jexec two ping -c 1 198.51.100.2 894 895 # RA test 896 atf_check -s exit:0 -o ignore jexec one ping -c 1 203.0.113.1 897 atf_check -s exit:0 -o ignore jexec two ping -c 1 203.0.113.1 898 899 atf_check -s exit:0 -o ignore jexec srv ping -c 1 -S 203.0.113.1 198.51.100.2 900 atf_check -s exit:0 -o ignore jexec srv ping -c 1 -S 203.0.113.1 198.51.100.3 901 902 atf_check -s exit:0 -o ignore jexec one ping -c 1 203.0.113.2 903 atf_check -s exit:0 -o ignore jexec two ping -c 1 203.0.113.2 904 905 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.1 906 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.2 907 atf_check -s exit:0 -o ignore jexec lan ping -c 1 198.51.100.3 908 atf_check -s exit:2 -o ignore jexec lan ping -c 1 198.51.100.4 909} 910 911ra_cleanup() 912{ 913 ovpn_cleanup 914} 915 916ovpn_algo_body() 917{ 918 algo=$1 919 920 ovpn_init 921 922 l=$(vnet_mkepair) 923 924 vnet_mkjail a ${l}a 925 jexec a ifconfig ${l}a 192.0.2.1/24 up 926 vnet_mkjail b ${l}b 927 jexec b ifconfig ${l}b 192.0.2.2/24 up 928 929 # Sanity check 930 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 931 932 ovpn_start a " 933 dev ovpn0 934 dev-type tun 935 proto udp4 936 937 cipher ${algo} 938 data-ciphers ${algo} 939 auth SHA256 940 941 local 192.0.2.1 942 server 198.51.100.0 255.255.255.0 943 ca $(atf_get_srcdir)/ca.crt 944 cert $(atf_get_srcdir)/server.crt 945 key $(atf_get_srcdir)/server.key 946 dh $(atf_get_srcdir)/dh.pem 947 948 mode server 949 script-security 2 950 auth-user-pass-verify /usr/bin/true via-env 951 topology subnet 952 953 keepalive 100 600 954 " 955 ovpn_start b " 956 dev tun0 957 dev-type tun 958 959 client 960 961 cipher ${algo} 962 data-ciphers ${algo} 963 964 remote 192.0.2.1 965 auth-user-pass $(atf_get_srcdir)/user.pass 966 967 ca $(atf_get_srcdir)/ca.crt 968 cert $(atf_get_srcdir)/client.crt 969 key $(atf_get_srcdir)/client.key 970 dh $(atf_get_srcdir)/dh.pem 971 972 keepalive 100 600 973 " 974 975 # Give the tunnel time to come up 976 sleep 10 977 978 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 979} 980 981atf_test_case "chacha" "cleanup" 982chacha_head() 983{ 984 atf_set descr 'Test DCO with the chacha algorithm' 985 atf_set require.user root 986 atf_set require.progs openvpn 987} 988 989chacha_body() 990{ 991 ovpn_algo_body CHACHA20-POLY1305 992} 993 994chacha_cleanup() 995{ 996 ovpn_cleanup 997} 998 999atf_test_case "gcm_128" "cleanup" 1000gcm_128_head() 1001{ 1002 atf_set descr 'Test DCO with AES-128-GCM' 1003 atf_set require.user root 1004 atf_set require.progs openvpn 1005} 1006 1007gcm_128_body() 1008{ 1009 ovpn_algo_body AES-128-GCM 1010} 1011 1012gcm_128_cleanup() 1013{ 1014 ovpn_cleanup 1015} 1016 1017atf_init_test_cases() 1018{ 1019 atf_add_test_case "4in4" 1020 atf_add_test_case "4mapped" 1021 atf_add_test_case "6in4" 1022 atf_add_test_case "6in6" 1023 atf_add_test_case "4in6" 1024 atf_add_test_case "timeout_client" 1025 atf_add_test_case "explicit_exit" 1026 atf_add_test_case "multi_client" 1027 atf_add_test_case "route_to" 1028 atf_add_test_case "ra" 1029 atf_add_test_case "chacha" 1030 atf_add_test_case "gcm_128" 1031} 1032