xref: /freebsd/tests/sys/netpfil/pf/forward.sh (revision 61e21613)
1#
2# SPDX-License-Identifier: BSD-2-Clause
3#
4# Copyright (c) 2017 Kristof Provost <kp@FreeBSD.org>
5#
6# Redistribution and use in source and binary forms, with or without
7# modification, are permitted provided that the following conditions
8# are met:
9# 1. Redistributions of source code must retain the above copyright
10#    notice, this list of conditions and the following disclaimer.
11# 2. Redistributions in binary form must reproduce the above copyright
12#    notice, this list of conditions and the following disclaimer in the
13#    documentation and/or other materials provided with the distribution.
14#
15# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25# SUCH DAMAGE.
26
27. $(atf_get_srcdir)/utils.subr
28
29common_dir=$(atf_get_srcdir)/../common
30
31atf_test_case "v4" "cleanup"
32v4_head()
33{
34	atf_set descr 'Basic forwarding test'
35	atf_set require.user root
36
37	# We need scapy to be installed for out test scripts to work
38	atf_set require.progs scapy
39}
40
41v4_body()
42{
43	pft_init
44
45	epair_send=$(vnet_mkepair)
46	ifconfig ${epair_send}a 192.0.2.1/24 up
47
48	epair_recv=$(vnet_mkepair)
49	ifconfig ${epair_recv}a up
50
51	vnet_mkjail alcatraz ${epair_send}b ${epair_recv}b
52	jexec alcatraz ifconfig ${epair_send}b 192.0.2.2/24 up
53	jexec alcatraz ifconfig ${epair_recv}b 198.51.100.2/24 up
54	jexec alcatraz sysctl net.inet.ip.forwarding=1
55	jexec alcatraz arp -s 198.51.100.3 00:01:02:03:04:05
56	route add -net 198.51.100.0/24 192.0.2.2
57
58	# Sanity check, can we forward ICMP echo requests without pf?
59	atf_check -s exit:0 ${common_dir}/pft_ping.py \
60		--sendif ${epair_send}a \
61		--to 198.51.100.3 \
62		--recvif ${epair_recv}a
63
64	jexec alcatraz pfctl -e
65
66	# Forward with pf enabled
67	pft_set_rules alcatraz "block in"
68	atf_check -s exit:1 ${common_dir}/pft_ping.py \
69		--sendif ${epair_send}a \
70		--to 198.51.100.3 \
71		--recvif ${epair_recv}a
72
73	pft_set_rules alcatraz "block out"
74	atf_check -s exit:1 ${common_dir}/pft_ping.py \
75		--sendif ${epair_send}a \
76		--to 198.51.100.3 \
77		--recv ${epair_recv}a
78
79	# Allow ICMP
80	pft_set_rules alcatraz "block in" "pass in proto icmp"
81	atf_check -s exit:0 ${common_dir}/pft_ping.py \
82		--sendif ${epair_send}a \
83		--to 198.51.100.3 \
84		--recvif ${epair_recv}a
85}
86
87v4_cleanup()
88{
89	pft_cleanup
90}
91
92atf_test_case "v6" "cleanup"
93v6_head()
94{
95	atf_set descr 'Basic IPv6 forwarding test'
96	atf_set require.user root
97	atf_set require.progs scapy
98}
99
100v6_body()
101{
102	pft_init
103
104	if [ "$(atf_config_get ci false)" = "true" ]; then
105		atf_skip "https://bugs.freebsd.org/260460"
106	fi
107
108	epair_send=$(vnet_mkepair)
109	epair_recv=$(vnet_mkepair)
110
111	ifconfig ${epair_send}a inet6 2001:db8:42::1/64 up no_dad -ifdisabled
112	ifconfig ${epair_recv}a up
113
114	vnet_mkjail alcatraz ${epair_send}b ${epair_recv}b
115
116	jexec alcatraz ifconfig ${epair_send}b inet6 2001:db8:42::2/64 up no_dad
117	jexec alcatraz ifconfig ${epair_recv}b inet6 2001:db8:43::2/64 up no_dad
118	jexec alcatraz sysctl net.inet6.ip6.forwarding=1
119	jexec alcatraz ndp -s 2001:db8:43::3 00:01:02:03:04:05
120	route add -6 2001:db8:43::/64 2001:db8:42::2
121
122	# Sanity check, can we forward ICMP echo requests without pf?
123	atf_check -s exit:0 ${common_dir}/pft_ping.py \
124		--sendif ${epair_send}a \
125		--to 2001:db8:43::3 \
126		--recvif ${epair_recv}a
127
128	jexec alcatraz pfctl -e
129
130	# Block incoming echo request packets
131	pft_set_rules alcatraz \
132		"block in inet6 proto icmp6 icmp6-type echoreq"
133	atf_check -s exit:1 ${common_dir}/pft_ping.py \
134		--sendif ${epair_send}a \
135		--to 2001:db8:43::3 \
136		--recvif ${epair_recv}a
137
138	# Block outgoing echo request packets
139	pft_set_rules alcatraz \
140		"block out inet6 proto icmp6 icmp6-type echoreq"
141	atf_check -s exit:1 -e ignore ${common_dir}/pft_ping.py \
142		--sendif ${epair_send}a \
143		--to 2001:db8:43::3 \
144		--recvif ${epair_recv}a
145
146	# Allow ICMPv6 but nothing else
147	pft_set_rules alcatraz \
148		"block out" \
149		"pass out inet6 proto icmp6"
150	atf_check -s exit:0 ${common_dir}/pft_ping.py \
151		--sendif ${epair_send}a \
152		--to 2001:db8:43::3 \
153		--recvif ${epair_recv}a
154
155	# Allowing ICMPv4 does not allow ICMPv6
156	pft_set_rules alcatraz \
157		"block out inet6 proto icmp6 icmp6-type echoreq" \
158		"pass in proto icmp"
159	atf_check -s exit:1 ${common_dir}/pft_ping.py \
160		--sendif ${epair_send}a \
161		--to 2001:db8:43::3 \
162		--recvif ${epair_recv}a
163}
164
165v6_cleanup()
166{
167	pft_cleanup
168}
169
170atf_init_test_cases()
171{
172	atf_add_test_case "v4"
173	atf_add_test_case "v6"
174}
175