1#- 2# SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3# 4# Copyright (c) 2019 Ahsan Barkati 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions 8# are met: 9# 1. Redistributions of source code must retain the above copyright 10# notice, this list of conditions and the following disclaimer. 11# 2. Redistributions in binary form must reproduce the above copyright 12# notice, this list of conditions and the following disclaimer in the 13# documentation and/or other materials provided with the distribution. 14# 15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25# SUCH DAMAGE. 26# 27# $FreeBSD$ 28# 29 30. $(atf_get_srcdir)/utils.subr 31. $(atf_get_srcdir)/runner.subr 32 33v4_head() 34{ 35 atf_set descr 'Basic forwarding test' 36 atf_set require.user root 37 atf_set require.progs scapy 38} 39 40v4_body() 41{ 42 firewall=$1 43 if [ "$(atf_config_get ci false)" = "true" ] && \ 44 [ "$(uname -p)" = "i386" ] && [ "${firewall}" = "pf" ]; then 45 atf_skip "https://bugs.freebsd.org/240085" 46 fi 47 firewall_init $firewall 48 49 epair_send=$(vnet_mkepair) 50 ifconfig ${epair_send}a 192.0.2.1/24 up 51 52 epair_recv=$(vnet_mkepair) 53 ifconfig ${epair_recv}a up 54 55 vnet_mkjail iron ${epair_send}b ${epair_recv}b 56 jexec iron ifconfig ${epair_send}b 192.0.2.2/24 up 57 jexec iron ifconfig ${epair_recv}b 198.51.100.2/24 up 58 jexec iron sysctl net.inet.ip.forwarding=1 59 jexec iron arp -s 198.51.100.3 00:01:02:03:04:05 60 route add -net 198.51.100.0/24 192.0.2.2 61 62 63 atf_check -s exit:0 $(atf_get_srcdir)/pft_ping.py \ 64 --sendif ${epair_send}a \ 65 --to 198.51.100.3 \ 66 --recvif ${epair_recv}a 67 68 firewall_config "iron" ${firewall} \ 69 "pf" \ 70 "block in" \ 71 "ipfw" \ 72 "ipfw -q add 100 deny all from any to any in" \ 73 "ipf" \ 74 "block in all" \ 75 76 atf_check -s exit:1 $(atf_get_srcdir)/pft_ping.py \ 77 --sendif ${epair_send}a \ 78 --to 198.51.100.3 \ 79 --recvif ${epair_recv}a 80 81 firewall_config "iron" ${firewall} \ 82 "pf" \ 83 "block out" \ 84 "ipfw" \ 85 "ipfw -q add 100 deny all from any to any out" \ 86 "ipf" \ 87 "block out all" \ 88 89 atf_check -s exit:1 $(atf_get_srcdir)/pft_ping.py \ 90 --sendif ${epair_send}a \ 91 --to 198.51.100.3 \ 92 --recv ${epair_recv}a 93} 94 95v4_cleanup() 96{ 97 firewall=$1 98 firewall_cleanup $firewall 99} 100 101setup_tests \ 102 v4 \ 103 pf \ 104 ipfw \ 105 ipf 106