xref: /freebsd/tests/sys/netpfil/pf/ridentifier.sh (revision 093cf790569775b80662926efea6d9d3464bde94)
1# $FreeBSD$
2#
3# SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4#
5# Copyright (c) 2021 Rubicon Communications, LLC (Netgate)
6#
7# Redistribution and use in source and binary forms, with or without
8# modification, are permitted provided that the following conditions
9# are met:
10# 1. Redistributions of source code must retain the above copyright
11#    notice, this list of conditions and the following disclaimer.
12# 2. Redistributions in binary form must reproduce the above copyright
13#    notice, this list of conditions and the following disclaimer in the
14#    documentation and/or other materials provided with the distribution.
15#
16# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26# SUCH DAMAGE.
27
28. $(atf_get_srcdir)/utils.subr
29
30atf_test_case "basic" "cleanup"
31basic_head()
32{
33	atf_set descr 'Test ridentifier keyword'
34	atf_set require.user root
35}
36
37basic_body()
38{
39	pft_init
40	pflog_init
41
42	epair=$(vnet_mkepair)
43
44	ifconfig ${epair}a 192.0.2.1/24 up
45
46	vnet_mkjail alcatraz ${epair}b
47	jexec alcatraz ifconfig lo0 up
48	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
49	jexec alcatraz /usr/sbin/inetd -p inetd-alcatraz.pid $(atf_get_srcdir)/echo_inetd.conf
50
51	# Sanity check
52	atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
53
54	jexec alcatraz pfctl -e
55	jexec alcatraz ifconfig pflog0 up
56	pft_set_rules alcatraz \
57		"pass in log" \
58		"pass in log proto tcp ridentifier 1234"
59
60	jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > tcpdump.log &
61	sleep 1
62
63	echo "test" | nc -N 192.0.2.2 7
64	atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
65
66	sleep 1
67	jexec alcatraz killall tcpdump
68
69	# Make sure we spotted the ridentifier
70	atf_check -s exit:0 -o ignore \
71	    grep 'rule 1/0.*ridentifier 1234' tcpdump.log
72	# But not on the !TCP traffic
73	atf_check -s exit:1 -o ignore \
74	    grep 'rule 0/0.*ridentifier' tcpdump.log
75
76	# Now try with antispoof rules
77	pft_set_rules alcatraz \
78		"pass in log" \
79		"antispoof log for ${epair}b ridentifier 4321"
80
81	jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > tcpdump.log &
82	sleep 1
83
84	# Without explicit rules for lo0 we're going to drop packets to ourself
85	atf_check -s exit:2 -o ignore -e ignore \
86	    jexec alcatraz ping -c 1 -t 1 192.0.2.2
87
88	sleep 1
89	jexec alcatraz killall tcpdump
90
91	cat tcpdump.log
92
93	# Make sure we spotted the ridentifier
94	atf_check -s exit:0 -o ignore \
95	    grep 'rule 2/0.*ridentifier 4321' tcpdump.log
96}
97
98basic_cleanup()
99{
100	pft_cleanup
101	rm -f inetd-alcatraz.pid
102	rm -f tcpdump.log
103}
104
105atf_init_test_cases()
106{
107	atf_add_test_case "basic"
108}
109