xref: /freebsd/tests/sys/netpfil/pf/ridentifier.sh (revision 734e82fe33aa764367791a7d603b383996c6b40b)
1#
2# SPDX-License-Identifier: BSD-2-Clause
3#
4# Copyright (c) 2021 Rubicon Communications, LLC (Netgate)
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25# SUCH DAMAGE.
26
27. $(atf_get_srcdir)/utils.subr
28
29atf_test_case "basic" "cleanup"
30basic_head()
31{
32	atf_set descr 'Test ridentifier keyword'
33	atf_set require.user root
34}
35
36basic_body()
37{
38	pft_init
39	pflog_init
40
41	epair=$(vnet_mkepair)
42
43	ifconfig ${epair}a 192.0.2.1/24 up
44
45	vnet_mkjail alcatraz ${epair}b
46	jexec alcatraz ifconfig lo0 up
47	jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up
48	jexec alcatraz /usr/sbin/inetd -p inetd-alcatraz.pid $(atf_get_srcdir)/echo_inetd.conf
49
50	# Sanity check
51	atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
52
53	jexec alcatraz pfctl -e
54	jexec alcatraz ifconfig pflog0 up
55	pft_set_rules alcatraz \
56		"pass in log" \
57		"pass in log proto tcp ridentifier 1234"
58
59	jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > tcpdump.log &
60	sleep 1
61
62	echo "test" | nc -N 192.0.2.2 7
63	atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
64
65	sleep 1
66	jexec alcatraz killall tcpdump
67
68	# Make sure we spotted the ridentifier
69	atf_check -s exit:0 -o ignore \
70	    grep 'rule 1/0.*ridentifier 1234' tcpdump.log
71	# But not on the !TCP traffic
72	atf_check -s exit:1 -o ignore \
73	    grep 'rule 0/0.*ridentifier' tcpdump.log
74
75	# Now try with antispoof rules
76	pft_set_rules alcatraz \
77		"pass in log" \
78		"antispoof log for ${epair}b ridentifier 4321"
79
80	jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > tcpdump.log &
81	sleep 1
82
83	# Without explicit rules for lo0 we're going to drop packets to ourself
84	atf_check -s exit:2 -o ignore -e ignore \
85	    jexec alcatraz ping -c 1 -t 1 192.0.2.2
86
87	sleep 1
88	jexec alcatraz killall tcpdump
89
90	cat tcpdump.log
91
92	# Make sure we spotted the ridentifier
93	atf_check -s exit:0 -o ignore \
94	    grep 'rule 2/0.*ridentifier 4321' tcpdump.log
95}
96
97basic_cleanup()
98{
99	pft_cleanup
100	rm -f inetd-alcatraz.pid
101	rm -f tcpdump.log
102}
103
104atf_init_test_cases()
105{
106	atf_add_test_case "basic"
107}
108