From fe20eadb23bf0364751bef04e9a2bcc197b3eca6 Mon Sep 17 00:00:00 2001 From: ozaki-r Date: Mon, 15 May 2017 09:58:22 +0000 Subject: [PATCH] Add test cases for SA lifetime --- distrib/sets/lists/tests/mi | 3 +- tests/net/ipsec/Makefile | 6 +- tests/net/ipsec/t_ipsec_misc.sh | 313 ++++++++++++++++++++++++++++++++ 3 files changed, 318 insertions(+), 4 deletions(-) create mode 100644 tests/net/ipsec/t_ipsec_misc.sh diff --git a/distrib/sets/lists/tests/mi b/distrib/sets/lists/tests/mi index 0dcf9c98d32f..84142b78ca2e 100644 --- a/distrib/sets/lists/tests/mi +++ b/distrib/sets/lists/tests/mi @@ -1,4 +1,4 @@ -# $NetBSD: mi,v 1.742 2017/05/15 09:56:12 ozaki-r Exp $ +# $NetBSD: mi,v 1.743 2017/05/15 09:58:22 ozaki-r Exp $ # # Note: don't delete entries from here - mark them as "obsolete" instead. # @@ -3302,6 +3302,7 @@ ./usr/tests/net/ipsec/t_ipsec_esp_keys tests-net-tests atf,rump ./usr/tests/net/ipsec/t_ipsec_gif tests-net-tests atf,rump ./usr/tests/net/ipsec/t_ipsec_l2tp tests-net-tests atf,rump +./usr/tests/net/ipsec/t_ipsec_misc tests-net-tests atf,rump ./usr/tests/net/ipsec/t_ipsec_sysctl tests-net-tests atf,rump ./usr/tests/net/ipsec/t_ipsec_transport tests-net-tests atf,rump ./usr/tests/net/ipsec/t_ipsec_tunnel tests-net-tests atf,rump diff --git a/tests/net/ipsec/Makefile b/tests/net/ipsec/Makefile index f1715dbb6be6..69a827032608 100644 --- a/tests/net/ipsec/Makefile +++ b/tests/net/ipsec/Makefile @@ -1,12 +1,12 @@ -# $NetBSD: Makefile,v 1.5 2017/05/10 09:08:25 ozaki-r Exp $ +# $NetBSD: Makefile,v 1.6 2017/05/15 09:58:22 ozaki-r Exp $ # .include TESTSDIR= ${TESTSBASE}/net/ipsec -.for name in ipsec_ah_keys ipsec_esp_keys ipsec_gif ipsec_l2tp ipsec_sysctl \ - ipsec_transport ipsec_tunnel ipsec_tunnel_odd +.for name in ipsec_ah_keys ipsec_esp_keys ipsec_gif ipsec_l2tp ipsec_misc \ + ipsec_sysctl ipsec_transport ipsec_tunnel ipsec_tunnel_odd TESTS_SH+= t_${name} TESTS_SH_SRC_t_${name}= ../net_common.sh ./common.sh ./algorithms.sh \ t_${name}.sh diff --git a/tests/net/ipsec/t_ipsec_misc.sh b/tests/net/ipsec/t_ipsec_misc.sh new file mode 100644 index 000000000000..9420b381aa3f --- /dev/null +++ b/tests/net/ipsec/t_ipsec_misc.sh @@ -0,0 +1,313 @@ +# $NetBSD: t_ipsec_misc.sh,v 1.1 2017/05/15 09:58:22 ozaki-r Exp $ +# +# Copyright (c) 2017 Internet Initiative Japan Inc. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS +# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS +# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR +# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF +# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS +# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN +# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) +# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE +# POSSIBILITY OF SUCH DAMAGE. +# + +SOCK_LOCAL=unix://ipsec_local +SOCK_PEER=unix://ipsec_peer +BUS=./bus_ipsec + +DEBUG=${DEBUG:-false} + +setup_sasp() +{ + local proto=$1 + local algo_args="$2" + local ip_local=$3 + local ip_peer=$4 + local lifetime=$5 + local tmpfile=./tmp + + export RUMP_SERVER=$SOCK_LOCAL + cat > $tmpfile <<-EOF + add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args; + add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args; + spdadd $ip_local $ip_peer any -P out ipsec $proto/transport//require; + EOF + $DEBUG && cat $tmpfile + atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile + check_sa_entries $SOCK_LOCAL $ip_local $ip_peer + + export RUMP_SERVER=$SOCK_PEER + cat > $tmpfile <<-EOF + add $ip_local $ip_peer $proto 10000 -lh $lifetime -ls $lifetime $algo_args; + add $ip_peer $ip_local $proto 10001 -lh $lifetime -ls $lifetime $algo_args; + spdadd $ip_peer $ip_local any -P out ipsec $proto/transport//require; + EOF + $DEBUG && cat $tmpfile + atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile + check_sa_entries $SOCK_PEER $ip_local $ip_peer +} + +test_ipsec4_lifetime() +{ + local proto=$1 + local algo=$2 + local ip_local=10.0.0.1 + local ip_peer=10.0.0.2 + local outfile=./out + local proto_cap=$(echo $proto | tr 'a-z' 'A-Z') + local algo_args="$(generate_algo_args $proto $algo)" + local lifetime=3 + + rump_server_crypto_start $SOCK_LOCAL netipsec + rump_server_crypto_start $SOCK_PEER netipsec + rump_server_add_iface $SOCK_LOCAL shmif0 $BUS + rump_server_add_iface $SOCK_PEER shmif0 $BUS + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 + atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24 + #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff + + export RUMP_SERVER=$SOCK_PEER + atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0 + atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24 + #atf_check -s exit:0 -o ignore rump.sysctl -w net.key.debug=0xff + + extract_new_packets $BUS > $outfile + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer + + extract_new_packets $BUS > $outfile + atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP echo request" \ + cat $outfile + atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP echo reply" \ + cat $outfile + + # Set up SAs with lifetime 1 sec. + setup_sasp $proto "$algo_args" $ip_local $ip_peer 1 + + # Wait for the SAs to be expired + atf_check -s exit:0 sleep 2 + + # Check the SAs have been expired + export RUMP_SERVER=$SOCK_LOCAL + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D + export RUMP_SERVER=$SOCK_PEER + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D + + # Clean up SPs + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o empty $HIJACKING setkey -F -P + export RUMP_SERVER=$SOCK_PEER + atf_check -s exit:0 -o empty $HIJACKING setkey -F -P + + # Set up SAs with lifetime with $lifetime + setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime + + # Use the SAs; this will create a reference from an SP to an SA + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer + + extract_new_packets $BUS > $outfile + atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \ + cat $outfile + atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \ + cat $outfile + + atf_check -s exit:0 sleep $((lifetime + 1)) + + export RUMP_SERVER=$SOCK_LOCAL + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o empty $HIJACKING setkey -D + # The SA on output remain because sp/isr still refers it + atf_check -s exit:0 -o match:"$ip_local $ip_peer" \ + $HIJACKING setkey -D -a + atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \ + $HIJACKING setkey -D -a + + export RUMP_SERVER=$SOCK_PEER + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o empty $HIJACKING setkey -D + atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \ + $HIJACKING setkey -D -a + # The SA on output remain because sp/isr still refers it + atf_check -s exit:0 -o match:"$ip_peer $ip_local" \ + $HIJACKING setkey -D -a + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s not-exit:0 -o match:'0 packets received' \ + rump.ping -c 1 -n -w 1 $ip_peer + + test_flush_entries $SOCK_LOCAL + test_flush_entries $SOCK_PEER +} + +test_ipsec6_lifetime() +{ + local proto=$1 + local algo=$2 + local ip_local=fd00::1 + local ip_peer=fd00::2 + local tmpfile=./tmp + local outfile=./out + local proto_cap=$(echo $proto | tr 'a-z' 'A-Z') + local algo_args="$(generate_algo_args $proto $algo)" + local lifetime=3 + + rump_server_crypto_start $SOCK_LOCAL netinet6 netipsec + rump_server_crypto_start $SOCK_PEER netinet6 netipsec + rump_server_add_iface $SOCK_LOCAL shmif0 $BUS + rump_server_add_iface $SOCK_PEER shmif0 $BUS + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 + atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local + + export RUMP_SERVER=$SOCK_PEER + atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.dad_count=0 + atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_peer + + extract_new_packets $BUS > $outfile + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer + + extract_new_packets $BUS > $outfile + atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP6, echo request" \ + cat $outfile + atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP6, echo reply" \ + cat $outfile + + # Set up SAs with lifetime 1 sec. + setup_sasp $proto "$algo_args" $ip_local $ip_peer 1 + + # Wait for the SAs to be expired + atf_check -s exit:0 sleep 2 + + # Check the SAs have been expired + export RUMP_SERVER=$SOCK_LOCAL + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D + export RUMP_SERVER=$SOCK_PEER + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o match:'No SAD entries.' $HIJACKING setkey -D + + # Clean up SPs + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o empty $HIJACKING setkey -F -P + export RUMP_SERVER=$SOCK_PEER + atf_check -s exit:0 -o empty $HIJACKING setkey -F -P + + # Set up SAs with lifetime with $lifetime + setup_sasp $proto "$algo_args" $ip_local $ip_peer $lifetime + + # Use the SAs; this will create a reference from an SP to an SA + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer + + extract_new_packets $BUS > $outfile + atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \ + cat $outfile + atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \ + cat $outfile + + atf_check -s exit:0 sleep $((lifetime + 1)) + + export RUMP_SERVER=$SOCK_LOCAL + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o empty $HIJACKING setkey -D + # The SA on output remain because sp/isr still refers it + atf_check -s exit:0 -o match:"$ip_local $ip_peer" \ + $HIJACKING setkey -D -a + atf_check -s exit:0 -o not-match:"$ip_peer $ip_local" \ + $HIJACKING setkey -D -a + + export RUMP_SERVER=$SOCK_PEER + $DEBUG && $HIJACKING setkey -D + atf_check -s exit:0 -o empty $HIJACKING setkey -D + atf_check -s exit:0 -o not-match:"$ip_local $ip_peer" \ + $HIJACKING setkey -D -a + # The SA on output remain because sp/isr still refers it + atf_check -s exit:0 -o match:"$ip_peer $ip_local" \ + $HIJACKING setkey -D -a + + export RUMP_SERVER=$SOCK_LOCAL + atf_check -s not-exit:0 -o match:'0 packets received' \ + rump.ping6 -c 1 -n -X 1 $ip_peer + + test_flush_entries $SOCK_LOCAL + test_flush_entries $SOCK_PEER +} + +test_lifetime_common() +{ + local ipproto=$1 + local proto=$2 + local algo=$3 + + if [ $ipproto = ipv4 ]; then + test_ipsec4_lifetime $proto $algo + else + test_ipsec6_lifetime $proto $algo + fi +} + +add_test_lifetime() +{ + local ipproto=$1 + local proto=$2 + local algo=$3 + local _algo=$(echo $algo | sed 's/-//g') + local name= desc= + + name="ipsec_lifetime_${ipproto}_${proto}_${_algo}" + desc="Tests of lifetime of IPsec ($ipproto) with $proto ($algo)" + + atf_test_case ${name} cleanup + eval " \ + ${name}_head() { \ + atf_set \"descr\" \"$desc\"; \ + atf_set \"require.progs\" \"rump_server\" \"setkey\"; \ + }; \ + ${name}_body() { \ + test_lifetime_common $ipproto $proto $algo; \ + rump_server_destroy_ifaces; \ + }; \ + ${name}_cleanup() { \ + $DEBUG && dump; \ + cleanup; \ + } \ + " + atf_add_test_case ${name} +} + +atf_init_test_cases() +{ + local algo= + + for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do + add_test_lifetime ipv4 esp $algo + add_test_lifetime ipv6 esp $algo + done + for algo in $AH_AUTHENTICATION_ALGORITHMS_MINIMUM; do + add_test_lifetime ipv4 ah $algo + add_test_lifetime ipv6 ah $algo + done +}