1# 2# SPDX-License-Identifier: BSD-2-Clause 3# 4# Copyright (c) 2021 Rubicon Communications, LLC (Netgate) 5# 6# Redistribution and use in source and binary forms, with or without 7# modification, are permitted provided that the following conditions 8# are met: 9# 1. Redistributions of source code must retain the above copyright 10# notice, this list of conditions and the following disclaimer. 11# 2. Redistributions in binary form must reproduce the above copyright 12# notice, this list of conditions and the following disclaimer in the 13# documentation and/or other materials provided with the distribution. 14# 15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25# SUCH DAMAGE. 26 27. $(atf_get_srcdir)/utils.subr 28 29atf_test_case "basic" "cleanup" 30basic_head() 31{ 32 atf_set descr 'Test ridentifier keyword' 33 atf_set require.user root 34} 35 36basic_body() 37{ 38 pft_init 39 pflog_init 40 41 epair=$(vnet_mkepair) 42 43 ifconfig ${epair}a 192.0.2.1/24 up 44 45 vnet_mkjail alcatraz ${epair}b 46 jexec alcatraz ifconfig lo0 up 47 jexec alcatraz ifconfig ${epair}b 192.0.2.2/24 up 48 jexec alcatraz /usr/sbin/inetd -p ${PWD}/inetd-alcatraz.pid $(atf_get_srcdir)/echo_inetd.conf 49 50 # Sanity check 51 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 52 53 jexec alcatraz pfctl -e 54 jexec alcatraz ifconfig pflog0 up 55 pft_set_rules alcatraz \ 56 "pass in log" \ 57 "pass in log proto tcp ridentifier 1234" 58 59 jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > ${PWD}/tcpdump.log & 60 sleep 1 61 62 echo "test" | nc -N 192.0.2.2 7 63 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 64 65 sleep 1 66 jexec alcatraz killall tcpdump 67 68 # Make sure we spotted the ridentifier 69 atf_check -s exit:0 -o ignore \ 70 grep 'rule 1/0.*ridentifier 1234' ${PWD}/tcpdump.log 71 # But not on the !TCP traffic 72 atf_check -s exit:1 -o ignore \ 73 grep 'rule 0/0.*ridentifier' ${PWD}/tcpdump.log 74 75 # Now try with antispoof rules 76 pft_set_rules alcatraz \ 77 "pass in log" \ 78 "antispoof log for ${epair}b ridentifier 4321" 79 80 jexec alcatraz tcpdump --immediate-mode -n -e -i pflog0 > ${PWD}/tcpdump.log & 81 sleep 1 82 83 # Without explicit rules for lo0 we're going to drop packets to ourself 84 atf_check -s exit:2 -o ignore -e ignore \ 85 jexec alcatraz ping -c 1 -t 1 192.0.2.2 86 87 sleep 1 88 jexec alcatraz killall tcpdump 89 90 cat ${PWD}/tcpdump.log 91 92 # Make sure we spotted the ridentifier 93 atf_check -s exit:0 -o ignore \ 94 grep 'rule 2/0.*ridentifier 4321' ${PWD}/tcpdump.log 95} 96 97basic_cleanup() 98{ 99 pft_cleanup 100} 101 102atf_init_test_cases() 103{ 104 atf_add_test_case "basic" 105} 106