xref: /freebsd/tests/sys/netpfil/pf/tcp.sh (revision 02e9120893770924227138ba49df1edb3896112a)
1#
2# SPDX-License-Identifier: BSD-2-Clause
3#
4# Copyright (c) 2023 Rubicon Communications, LLC (Netgate)
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25# SUCH DAMAGE.
26
27. $(atf_get_srcdir)/utils.subr
28
29common_dir=$(atf_get_srcdir)/../common
30
31atf_test_case "rst" "cleanup"
32rst_head()
33{
34	atf_set descr 'Check sequence number validation in RST packets'
35	atf_set require.user root
36	atf_set require.progs scapy
37}
38
39rst_body()
40{
41	pft_init
42
43	epair_srv=$(vnet_mkepair)
44	epair_cl=$(vnet_mkepair)
45	epair_attack=$(vnet_mkepair)
46
47	br=$(vnet_mkbridge)
48	ifconfig ${br} addm ${epair_srv}a
49	ifconfig ${epair_srv}a up
50	ifconfig ${br} addm ${epair_cl}a
51	ifconfig ${epair_cl}a up
52	ifconfig ${br} addm ${epair_attack}a
53	ifconfig ${epair_attack}a up
54	ifconfig ${br} up
55
56	vnet_mkjail srv ${epair_srv}b
57	jexec srv ifconfig ${epair_srv}b 192.0.2.1/24 up
58	jexec srv ifconfig lo0 inet 127.0.0.1/8 up
59
60	vnet_mkjail cl ${epair_cl}b
61	jexec cl ifconfig ${epair_cl}b 192.0.2.2/24 up
62	jexec cl ifconfig lo0 inet 127.0.0.1/8 up
63
64	jexec cl pfctl -e
65	pft_set_rules cl \
66		"pass keep state"
67
68	# Not required, but pf should log the bad RST packet with this set.
69	jexec cl pfctl -x loud
70
71	vnet_mkjail attack ${epair_attack}b
72	jexec attack ifconfig ${epair_attack}b 192.0.2.3/24 up
73
74	# Sanity check
75	atf_check -s exit:0 -o ignore \
76	    jexec cl ping -c 1 192.0.2.1
77
78	echo "bar" | jexec srv nc -l 1234 &
79	# Allow server time to start
80	sleep 1
81
82	echo "foo" | jexec cl nc -p 4321 192.0.2.1 1234 &
83	# Allow connection time to set up
84	sleep 1
85
86	# Connection should be established now
87	atf_check -s exit:0 -e ignore \
88	    -o match:"ESTABLISHED:ESTABLISHED" \
89	    jexec cl pfctl -ss -v
90
91	# Now insert a fake RST
92	atf_check -s exit:0 -o ignore \
93	    jexec attack ${common_dir}/pft_rst.py 192.0.2.1 1234 192.0.2.2 4321
94
95	# Connection should remain established
96	atf_check -s exit:0 -e ignore \
97	    -o match:"ESTABLISHED:ESTABLISHED" \
98	    jexec cl pfctl -ss -v
99}
100
101rst_cleanup()
102{
103	pft_cleanup
104}
105
106atf_init_test_cases()
107{
108	atf_add_test_case "rst"
109}
110