ip4_frag_1.c revision 1.2 1 1.2 rmind /* $NetBSD: ip4_frag_1.c,v 1.2 2010/10/03 19:41:25 rmind Exp $ */
2 1.1 rmind
3 1.1 rmind /*-
4 1.1 rmind * Copyright (c) 2010 The NetBSD Foundation, Inc.
5 1.1 rmind * All rights reserved.
6 1.1 rmind *
7 1.1 rmind * This code is derived from software developed for The NetBSD Foundation
8 1.1 rmind * by Mindaugas Rasiukevicius <rmind at NetBSD org>.
9 1.1 rmind *
10 1.1 rmind * Redistribution and use in source and binary forms, with or without
11 1.1 rmind * modification, are permitted provided that the following conditions
12 1.1 rmind * are met:
13 1.1 rmind * 1. Redistributions of source code must retain the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer.
15 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 rmind * notice, this list of conditions and the following disclaimer in the
17 1.1 rmind * documentation and/or other materials provided with the distribution.
18 1.1 rmind *
19 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
30 1.1 rmind */
31 1.1 rmind
32 1.1 rmind /*
33 1.1 rmind * Test various cases of IPv4 reassembly.
34 1.1 rmind */
35 1.1 rmind
36 1.1 rmind #include <sys/cdefs.h>
37 1.1 rmind
38 1.1 rmind #include <stdio.h>
39 1.1 rmind #include <stdlib.h>
40 1.1 rmind #include <string.h>
41 1.1 rmind #include <stddef.h>
42 1.1 rmind #include <unistd.h>
43 1.1 rmind #include <netdb.h>
44 1.1 rmind #include <assert.h>
45 1.1 rmind #include <err.h>
46 1.1 rmind
47 1.1 rmind #include <sys/socket.h>
48 1.1 rmind #include <netinet/in_systm.h>
49 1.1 rmind #include <netinet/in.h>
50 1.1 rmind #include <netinet/ip.h>
51 1.1 rmind #include <netinet/udp.h>
52 1.1 rmind #include <netinet/ip_icmp.h>
53 1.1 rmind #include <arpa/inet.h>
54 1.1 rmind
55 1.1 rmind #define IP_SIZE sizeof(struct ip)
56 1.1 rmind #define ICMP_SIZE offsetof(struct icmp, icmp_ip)
57 1.1 rmind
58 1.1 rmind static void *
59 1.1 rmind xalloc(size_t sz)
60 1.1 rmind {
61 1.1 rmind void *ptr = calloc(1, sz);
62 1.1 rmind
63 1.1 rmind if (ptr == NULL) {
64 1.1 rmind err(EXIT_FAILURE, "calloc");
65 1.1 rmind }
66 1.1 rmind return ptr;
67 1.1 rmind }
68 1.1 rmind
69 1.1 rmind static int
70 1.1 rmind create_socket(void)
71 1.1 rmind {
72 1.1 rmind int s, val = 1;
73 1.1 rmind
74 1.1 rmind s = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
75 1.1 rmind if (s == -1) {
76 1.1 rmind err(EXIT_FAILURE, "socket");
77 1.1 rmind }
78 1.1 rmind if (setsockopt(s, IPPROTO_IP, IP_HDRINCL, &val, sizeof(val)) == -1) {
79 1.1 rmind err(EXIT_FAILURE, "setsockopt");
80 1.1 rmind }
81 1.1 rmind return s;
82 1.1 rmind }
83 1.1 rmind
84 1.1 rmind void *
85 1.1 rmind create_ip_packet(in_addr_t target, int foff, size_t addlen)
86 1.1 rmind {
87 1.1 rmind struct ip *ip;
88 1.1 rmind unsigned int n;
89 1.1 rmind uint8_t *data;
90 1.1 rmind int first;
91 1.1 rmind
92 1.1 rmind /* Header at zero offset - first fragment. */
93 1.1 rmind first = ((foff & IP_MF) == 0);
94 1.1 rmind if (first) {
95 1.1 rmind assert(addlen >= ICMP_SIZE);
96 1.1 rmind addlen -= ICMP_SIZE;
97 1.1 rmind }
98 1.1 rmind ip = xalloc(IP_SIZE + addlen);
99 1.1 rmind
100 1.1 rmind /*
101 1.1 rmind * IP header.
102 1.1 rmind * Note: ip_len and ip_off shall be in host byte order.
103 1.1 rmind */
104 1.1 rmind ip->ip_v = IPVERSION;
105 1.1 rmind ip->ip_hl = 5;
106 1.1 rmind ip->ip_tos = 0;
107 1.1 rmind ip->ip_len = (5 << 2) + addlen;
108 1.1 rmind ip->ip_id = htons(1);
109 1.1 rmind ip->ip_off = foff;
110 1.1 rmind ip->ip_ttl = 64;
111 1.1 rmind ip->ip_p = IPPROTO_ICMP;
112 1.1 rmind ip->ip_sum = 0;
113 1.1 rmind
114 1.1 rmind ip->ip_src.s_addr = INADDR_ANY;
115 1.1 rmind ip->ip_dst.s_addr = target;
116 1.1 rmind
117 1.1 rmind /* Fill in some data. */
118 1.1 rmind data = (void *)(ip + 1);
119 1.1 rmind if (first) {
120 1.1 rmind struct icmp *icmp = (void *)data;
121 1.1 rmind icmp->icmp_type = ICMP_ECHO;
122 1.1 rmind icmp->icmp_code = 0;
123 1.1 rmind icmp->icmp_cksum = 0;
124 1.1 rmind n = ICMP_SIZE;
125 1.1 rmind } else {
126 1.1 rmind n = 0;
127 1.1 rmind }
128 1.1 rmind for (data += n; n < addlen; n++) {
129 1.2 rmind *data = (0xf & n);
130 1.2 rmind data++;
131 1.1 rmind }
132 1.1 rmind return (void *)ip;
133 1.1 rmind }
134 1.1 rmind
135 1.1 rmind void
136 1.1 rmind send_packet(int s, void *p, in_addr_t target)
137 1.1 rmind {
138 1.1 rmind struct ip *ip = (struct ip *)p;
139 1.1 rmind struct sockaddr_in addr;
140 1.1 rmind ssize_t ret;
141 1.1 rmind
142 1.1 rmind memset(&addr, 0, sizeof(addr));
143 1.1 rmind addr.sin_family = AF_INET;
144 1.1 rmind addr.sin_addr.s_addr = target;
145 1.1 rmind
146 1.1 rmind /* Note: total length was set host byte-order. */
147 1.1 rmind ret = sendto(s, p, ip->ip_len, 0,
148 1.1 rmind (struct sockaddr *)&addr, sizeof(struct sockaddr_in));
149 1.1 rmind if (ret == -1) {
150 1.1 rmind err(EXIT_FAILURE, "sendto");
151 1.1 rmind }
152 1.1 rmind free(p);
153 1.1 rmind }
154 1.1 rmind
155 1.1 rmind void
156 1.1 rmind test_case_0(int sock, in_addr_t target)
157 1.1 rmind {
158 1.1 rmind void *p;
159 1.1 rmind
160 1.1 rmind /*
161 1.1 rmind * Case 0: normal reassembly.
162 1.1 rmind * => IP_STAT_FRAGMENTS
163 1.1 rmind */
164 1.1 rmind
165 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 1480);
166 1.1 rmind send_packet(sock, p, target);
167 1.1 rmind
168 1.1 rmind p = create_ip_packet(target, 185, 1480);
169 1.1 rmind send_packet(sock, p, target);
170 1.1 rmind }
171 1.1 rmind
172 1.1 rmind void
173 1.1 rmind test_case_1(int sock, in_addr_t target)
174 1.1 rmind {
175 1.1 rmind void *p;
176 1.1 rmind
177 1.1 rmind /*
178 1.1 rmind * Case 1: ip_len of the first fragment and ip_off + hlen of other
179 1.1 rmind * fragments should be at least 68 (IP_MINFRAGSIZE - 1) bytes.
180 1.1 rmind * => IP_STAT_BADFRAGS (malformed)
181 1.1 rmind */
182 1.1 rmind
183 1.1 rmind /* 20 + 48 == 68, OK */
184 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 48);
185 1.1 rmind send_packet(sock, p, target);
186 1.1 rmind
187 1.1 rmind /* 20 + (5 * 8) = 60 < 68, ERR */
188 1.1 rmind p = create_ip_packet(target, 6 - 1, 8);
189 1.1 rmind send_packet(sock, p, target);
190 1.1 rmind }
191 1.1 rmind
192 1.1 rmind void
193 1.1 rmind test_case_2(int sock, in_addr_t target)
194 1.1 rmind {
195 1.1 rmind void *p;
196 1.1 rmind struct ip *ip;
197 1.1 rmind
198 1.1 rmind /*
199 1.1 rmind * Case 2: mismatch of TOS.
200 1.1 rmind * => IP_STAT_BADFRAGS (malformed)
201 1.1 rmind */
202 1.1 rmind
203 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 48);
204 1.1 rmind ip = (struct ip *)p;
205 1.1 rmind ip->ip_tos = 123;
206 1.1 rmind send_packet(sock, p, target);
207 1.1 rmind
208 1.1 rmind p = create_ip_packet(target, 6, 48);
209 1.1 rmind send_packet(sock, p, target);
210 1.1 rmind }
211 1.1 rmind
212 1.1 rmind void
213 1.1 rmind test_case_3(int sock, in_addr_t target)
214 1.1 rmind {
215 1.1 rmind void *p;
216 1.1 rmind
217 1.1 rmind /*
218 1.1 rmind * Case 3: data length is not multiple of 8 bytes.
219 1.1 rmind * => IP_STAT_BADFRAGS (malformed)
220 1.1 rmind */
221 1.1 rmind
222 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 48);
223 1.1 rmind send_packet(sock, p, target);
224 1.1 rmind
225 1.1 rmind /* (48 + 1) & 0x7 != 0, ERR */
226 1.1 rmind p = create_ip_packet(target, 6, 48 + 1);
227 1.1 rmind send_packet(sock, p, target);
228 1.1 rmind }
229 1.1 rmind
230 1.1 rmind void
231 1.1 rmind test_case_4(int sock, in_addr_t target)
232 1.1 rmind {
233 1.1 rmind void *p;
234 1.1 rmind
235 1.1 rmind /*
236 1.1 rmind * Case 4: fragment covering previous (duplicate).
237 1.1 rmind * => IP_STAT_FRAGDROPPED (dup, out of space)
238 1.1 rmind */
239 1.1 rmind
240 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 48);
241 1.1 rmind send_packet(sock, p, target);
242 1.1 rmind
243 1.1 rmind p = create_ip_packet(target, 6 | IP_MF, 96);
244 1.1 rmind send_packet(sock, p, target);
245 1.1 rmind
246 1.1 rmind p = create_ip_packet(target, 6, 48);
247 1.1 rmind send_packet(sock, p, target);
248 1.1 rmind }
249 1.1 rmind
250 1.1 rmind void
251 1.1 rmind test_case_5(int sock, in_addr_t target)
252 1.1 rmind {
253 1.1 rmind void *p;
254 1.1 rmind int cnt, left, off;
255 1.1 rmind
256 1.1 rmind /*
257 1.1 rmind * Case 5: construct packet larger than IP_MAXPACKET.
258 1.1 rmind * => IP_STAT_TOOLONG (with length > max ip packet size)
259 1.1 rmind */
260 1.1 rmind
261 1.1 rmind /*
262 1.1 rmind * Assumptions:
263 1.1 rmind * - 1500 MTU. Minus IP header - 1480.
264 1.1 rmind * - Bytes left: 65535 - (1480 * 44) = 415.
265 1.1 rmind */
266 1.1 rmind cnt = IP_MAXPACKET / 1480;
267 1.1 rmind left = IP_MAXPACKET - (1480 * cnt);
268 1.1 rmind left = (left / 8) * 8;
269 1.1 rmind
270 1.1 rmind for (off = 0; cnt != 0; cnt--) {
271 1.1 rmind p = create_ip_packet(target, off | IP_MF, 1480);
272 1.1 rmind send_packet(sock, p, target);
273 1.1 rmind off += (1480 >> 3);
274 1.1 rmind }
275 1.1 rmind /* Add 8 bytes and thus cross IP_MAXPACKET limit. */
276 1.1 rmind p = create_ip_packet(target, off, left + 8);
277 1.1 rmind send_packet(sock, p, target);
278 1.1 rmind }
279 1.1 rmind
280 1.1 rmind void
281 1.1 rmind test_case_6(int sock, in_addr_t target)
282 1.1 rmind {
283 1.1 rmind struct ip *ip;
284 1.1 rmind void *p;
285 1.1 rmind
286 1.1 rmind /*
287 1.1 rmind * Case 6: cause a fragment timeout.
288 1.1 rmind * => IP_STAT_FRAGTIMEOUT (fragments dropped after timeout)
289 1.1 rmind */
290 1.1 rmind
291 1.1 rmind p = create_ip_packet(target, 0 | IP_MF, 48);
292 1.1 rmind ip = (struct ip *)p;
293 1.1 rmind ip->ip_id = htons(321);
294 1.1 rmind send_packet(sock, p, target);
295 1.1 rmind /*
296 1.1 rmind * Missing non-MF packet - timeout.
297 1.1 rmind */
298 1.1 rmind }
299 1.1 rmind
300 1.1 rmind int
301 1.1 rmind main(int argc, char **argv)
302 1.1 rmind {
303 1.1 rmind struct hostent *he;
304 1.1 rmind in_addr_t target;
305 1.1 rmind int sock;
306 1.1 rmind
307 1.1 rmind if (argc < 2) {
308 1.1 rmind printf("%s: <target host>\n", argv[0]);
309 1.1 rmind exit(EXIT_SUCCESS);
310 1.1 rmind }
311 1.1 rmind
312 1.1 rmind he = gethostbyname(argv[1]);
313 1.1 rmind if (he == NULL) {
314 1.1 rmind err(EXIT_FAILURE, "gethostbyname");
315 1.1 rmind }
316 1.1 rmind memcpy(&target, he->h_addr, sizeof(target));
317 1.1 rmind
318 1.1 rmind sock = create_socket();
319 1.1 rmind
320 1.1 rmind test_case_0(sock, target);
321 1.1 rmind test_case_1(sock, target);
322 1.1 rmind test_case_2(sock, target);
323 1.1 rmind test_case_3(sock, target);
324 1.1 rmind test_case_4(sock, target);
325 1.1 rmind test_case_5(sock, target);
326 1.1 rmind test_case_6(sock, target);
327 1.1 rmind
328 1.1 rmind close(sock);
329 1.1 rmind
330 1.1 rmind return 0;
331 1.1 rmind }
332