t_ipsec_natt.sh revision 1.4 1 # $NetBSD: t_ipsec_natt.sh,v 1.4 2020/06/01 04:38:37 martin Exp $
2 #
3 # Copyright (c) 2018 Internet Initiative Japan Inc.
4 # All rights reserved.
5 #
6 # Redistribution and use in source and binary forms, with or without
7 # modification, are permitted provided that the following conditions
8 # are met:
9 # 1. Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
11 # 2. Redistributions in binary form must reproduce the above copyright
12 # notice, this list of conditions and the following disclaimer in the
13 # documentation and/or other materials provided with the distribution.
14 #
15 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 # POSSIBILITY OF SUCH DAMAGE.
26 #
27
28 SOCK_LOCAL_A=unix://ipsec_natt_local_a
29 SOCK_LOCAL_B=unix://ipsec_natt_local_b
30 SOCK_NAT=unix://ipsec_natt_nat
31 SOCK_REMOTE=unix://ipsec_natt_remote
32 BUS_LOCAL=./bus_ipsec_natt_local
33 BUS_NAT=./bus_ipsec_natt_nat
34
35 DEBUG=${DEBUG:-false}
36 HIJACKING_NPF="${HIJACKING},blanket=/dev/npf"
37
38 setup_servers()
39 {
40
41 rump_server_crypto_start $SOCK_LOCAL_A netipsec ipsec
42 rump_server_crypto_start $SOCK_LOCAL_B netipsec ipsec
43 rump_server_npf_start $SOCK_NAT
44 rump_server_crypto_start $SOCK_REMOTE netipsec ipsec
45 rump_server_add_iface $SOCK_LOCAL_A shmif0 $BUS_LOCAL
46 rump_server_add_iface $SOCK_LOCAL_B shmif0 $BUS_LOCAL
47 rump_server_add_iface $SOCK_NAT shmif0 $BUS_LOCAL
48 rump_server_add_iface $SOCK_NAT shmif1 $BUS_NAT
49 rump_server_add_iface $SOCK_REMOTE shmif0 $BUS_NAT
50 }
51
52 setup_ipsecif()
53 {
54 local sock=$1
55 local ifid=$2
56 local src_ip=$3
57 local src_port=$4
58 local dst_ip=$5
59 local dst_port=$6
60 local ipsecif_ip=$7
61 local peer_ip=$8
62
63 export RUMP_SERVER=$sock
64 rump_server_add_iface $sock ipsec$ifid
65 atf_check -s exit:0 rump.ifconfig ipsec$ifid link0 # enable NAT-T
66 atf_check -s exit:0 rump.ifconfig ipsec$ifid tunnel ${src_ip},${src_port} ${dst_ip},${dst_port}
67 atf_check -s exit:0 rump.ifconfig ipsec$ifid ${ipsecif_ip}/32
68 atf_check -s exit:0 -o ignore \
69 rump.route -n add ${peer_ip}/32 $ipsecif_ip
70 }
71
72 add_sa()
73 {
74 local sock=$1
75 local proto=$2
76 local algo_args="$3"
77 local src_ip=$4
78 local src_port=$5
79 local dst_ip=$6
80 local dst_port=$7
81 local out_spi=$8
82 local in_spi=$9
83 local tmpfile=./tmp
84
85 export RUMP_SERVER=$sock
86 cat > $tmpfile <<-EOF
87 add $src_ip [$src_port] $dst_ip [$dst_port] $proto $out_spi -m transport $algo_args;
88 add $dst_ip [$dst_port] $src_ip [$src_port] $proto $in_spi -m transport $algo_args;
89 EOF
90 $DEBUG && cat $tmpfile
91 atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
92 # XXX it can be expired if $lifetime is very short
93 #check_sa_entries $SOCK_LOCAL $ip_local $ip_remote
94 }
95
96 prepare_file()
97 {
98 local file=$1
99 local data="0123456789"
100
101 touch $file
102 for i in `seq 1 512`
103 do
104 echo $data >> $file
105 done
106 }
107
108 build_npf_conf()
109 {
110 local outfile=$1
111 local localnet=$2
112
113 cat > $outfile <<-EOF
114 set bpf.jit off
115 \$int_if = inet4(shmif0)
116 \$ext_if = inet4(shmif1)
117 \$localnet = { $localnet }
118 map \$ext_if dynamic \$localnet -> \$ext_if
119 group "external" on \$ext_if {
120 pass stateful out final all
121 }
122 group "internal" on \$int_if {
123 block in all
124 pass in final from \$localnet
125 pass out final all
126 }
127 group default {
128 pass final on lo0 all
129 block all
130 }
131 EOF
132 }
133
134 PIDSFILE=./terminator.pids
135 start_natt_terminator()
136 {
137 local sock=$1
138 local ip=$2
139 local port=$3
140 local pidsfile=$4
141 local backup=$RUMP_SERVER
142 local pid=
143 local terminator="$(atf_get_srcdir)/../ipsec/natt_terminator"
144
145 export RUMP_SERVER=$sock
146
147 env LD_PRELOAD=/usr/lib/librumphijack.so \
148 $terminator $ip $port &
149 pid=$!
150 if [ ! -f $PIDSFILE ]; then
151 touch $PIDSFILE
152 fi
153 echo $pid >> $PIDSFILE
154
155 $DEBUG && rump.netstat -a -f inet
156
157 export RUMP_SERVER=$backup
158
159 sleep 1
160 }
161
162 stop_natt_terminators()
163 {
164 local pid=
165
166 if [ ! -f $PIDSFILE ]; then
167 return
168 fi
169
170 for pid in $(cat $PIDSFILE); do
171 kill -9 $pid
172 done
173 rm -f $PIDSFILE
174 }
175
176 check_ping_packets()
177 {
178 local sock=$1
179 local bus=$2
180 local from_ip=$3
181 local to_ip=$4
182
183 local outfile=./out.ping
184
185 extract_new_packets $bus > $outfile
186
187 export RUMP_SERVER=$sock
188 atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $to_ip
189
190 extract_new_packets $bus > $outfile
191 $DEBUG && cat $outfile
192 atf_check -s exit:0 \
193 -o match:"$from_ip > $to_ip: ICMP echo request" \
194 cat $outfile
195 atf_check -s exit:0 \
196 -o match:"$to_ip > $from_ip: ICMP echo reply" \
197 cat $outfile
198 }
199
200 check_ping_packets_over_ipsecif()
201 {
202 local sock=$1
203 local bus=$2
204 local to_ip=$3
205 local nat_from_ip=$4
206 local nat_from_port=$5
207 local nat_to_ip=$6
208 local nat_to_port=$7
209
210 local outfile=./out.ping_over_ipsecif
211
212 extract_new_packets $bus > $outfile
213
214 export RUMP_SERVER=$sock
215 atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 7 $to_ip
216
217 # Check both ports and UDP encapsulation
218 extract_new_packets $bus > $outfile
219 $DEBUG && cat $outfile
220 atf_check -s exit:0 \
221 -o match:"${nat_from_ip}\.$nat_from_port > ${nat_to_ip}\.${nat_to_port}: UDP-encap" \
222 cat $outfile
223 atf_check -s exit:0 \
224 -o match:"${nat_to_ip}\.${nat_to_port} > ${nat_from_ip}\.${nat_from_port}: UDP-encap" \
225 cat $outfile
226 }
227
228 check_tcp_com_prepare()
229 {
230 local server_sock=$1
231 local client_sock=$2
232 local bus=$3
233 local to_ip=$4
234 local nat_from_ip=$5
235 local nat_to_ip=$6
236
237 local outfile=./out.prepare
238 local file_send=./file.send.prepare
239 local file_recv=./file.recv.prepare
240
241 extract_new_packets $bus > $outfile
242
243 start_nc_server $server_sock 4501 $file_recv ipv4
244
245 prepare_file $file_send
246 export RUMP_SERVER=$client_sock
247 atf_check -s exit:0 $HIJACKING nc -w 3 $to_ip 4501 < $file_send
248 atf_check -s exit:0 diff -q $file_send $file_recv
249 extract_new_packets $bus > $outfile
250 $DEBUG && cat $outfile
251 atf_check -s exit:0 \
252 -o match:"${nat_from_ip}\.[0-9]+ > ${nat_to_ip}\.4501" \
253 cat $outfile
254 atf_check -s exit:0 \
255 -o match:"${nat_to_ip}\.4501 > ${nat_from_ip}\.[0-9]+" \
256 cat $outfile
257
258 stop_nc_server
259 }
260
261 check_tcp_com_over_ipsecif()
262 {
263 local server_sock=$1
264 local client_sock=$2
265 local bus=$3
266 local to_ip=$4
267 local nat_from_ip=$5
268 local nat_from_port=$6
269 local nat_to_ip=$7
270 local nat_to_port=$8
271
272 local outfile=./out.ipsecif
273 local file_send=./file.send.ipsecif
274 local file_recv=./file.recv.ipsecif
275
276 extract_new_packets $bus > $outfile
277
278 start_nc_server $server_sock 4501 $file_recv ipv4
279 prepare_file $file_send
280 export RUMP_SERVER=$client_sock
281 atf_check -s exit:0 -o ignore $HIJACKING nc -w 7 $to_ip 4501 < $file_send
282 atf_check -s exit:0 diff -q $file_send $file_recv
283 stop_nc_server
284
285 # Check both ports and UDP encapsulation
286 extract_new_packets $bus > $outfile
287 $DEBUG && cat $outfile
288 atf_check -s exit:0 \
289 -o match:"${nat_from_ip}\.$nat_from_port > ${nat_to_ip}\.${nat_to_port}: UDP-encap" \
290 cat $outfile
291 atf_check -s exit:0 \
292 -o match:"${nat_to_ip}\.${nat_to_port} > ${nat_from_ip}\.${nat_from_port}: UDP-encap" \
293 cat $outfile
294 }
295
296 test_ipsecif_natt_transport()
297 {
298 local algo=$1
299 local ip_local_a=192.168.0.2
300 local ip_local_b=192.168.0.3
301 local ip_nat_local=192.168.0.1
302 local ip_nat_remote=10.0.0.1
303 local ip_remote=10.0.0.2
304 local subnet_local=192.168.0.0
305 local ip_local_ipsecif_a=172.16.100.1
306 local ip_local_ipsecif_b=172.16.110.1
307 local ip_remote_ipsecif_a=172.16.10.1
308 local ip_remote_ipsecif_b=172.16.11.1
309
310 local npffile=./npf.conf
311 local file_send=./file.send
312 local algo_args="$(generate_algo_args esp-udp $algo)"
313 local pid= port_a= port_b=
314
315 setup_servers
316
317 export RUMP_SERVER=$SOCK_LOCAL_A
318 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
319 atf_check -s exit:0 rump.ifconfig shmif0 $ip_local_a/24
320 atf_check -s exit:0 -o ignore \
321 rump.route -n add default $ip_nat_local
322
323 export RUMP_SERVER=$SOCK_LOCAL_B
324 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
325 atf_check -s exit:0 rump.ifconfig shmif0 $ip_local_b/24
326 atf_check -s exit:0 -o ignore \
327 rump.route -n add default $ip_nat_local
328
329 export RUMP_SERVER=$SOCK_NAT
330 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
331 atf_check -s exit:0 rump.ifconfig shmif0 $ip_nat_local/24
332 atf_check -s exit:0 rump.ifconfig shmif1 $ip_nat_remote/24
333 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=1
334
335 export RUMP_SERVER=$SOCK_REMOTE
336 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.dad_count=0
337 atf_check -s exit:0 rump.ifconfig shmif0 $ip_remote/24
338 atf_check -s exit:0 -o ignore \
339 rump.route -n add -net $subnet_local $ip_nat_remote
340
341 # There is no NAT/NAPT. ping should just work.
342 check_ping_packets $SOCK_LOCAL_A $BUS_NAT $ip_local_a $ip_remote
343 check_ping_packets $SOCK_LOCAL_B $BUS_NAT $ip_local_b $ip_remote
344
345 # Setup an NAPT with npf
346 build_npf_conf $npffile "$subnet_local/24"
347
348 export RUMP_SERVER=$SOCK_NAT
349 atf_check -s exit:0 $HIJACKING_NPF npfctl reload $npffile
350 atf_check -s exit:0 $HIJACKING_NPF npfctl start
351 $DEBUG && ${HIJACKING},"blanket=/dev/npf" npfctl show
352
353 # There is an NAPT. ping works but source IP/port are translated
354 check_ping_packets $SOCK_LOCAL_A $BUS_NAT $ip_nat_remote $ip_remote
355 check_ping_packets $SOCK_LOCAL_B $BUS_NAT $ip_nat_remote $ip_remote
356
357 # Try TCP communications just in case
358 check_tcp_com_prepare $SOCK_REMOTE $SOCK_LOCAL_A $BUS_NAT \
359 $ip_remote $ip_nat_remote $ip_remote
360 check_tcp_com_prepare $SOCK_REMOTE $SOCK_LOCAL_B $BUS_NAT \
361 $ip_remote $ip_nat_remote $ip_remote
362
363 # Launch a nc server as a terminator of NAT-T on outside the NAPT
364 start_natt_terminator $SOCK_REMOTE $ip_remote 4500
365 echo zzz > $file_send
366
367 #################### Test for primary ipsecif(4) NAT-T.
368
369 export RUMP_SERVER=$SOCK_LOCAL_A
370 # Send a UDP packet to the remote server at port 4500 from the local
371 # host of port 4500. This makes a mapping on the NAPT between them
372 atf_check -s exit:0 $HIJACKING \
373 nc -u -w 3 -p 4500 $ip_remote 4500 < $file_send
374 # Launch a nc server as a terminator of NAT-T on inside the NAPT,
375 # taking over port 4500 of the local host.
376 start_natt_terminator $SOCK_LOCAL_A $ip_local_a 4500
377
378 # We need to keep the servers for NAT-T
379
380 export RUMP_SERVER=$SOCK_LOCAL_A
381 $DEBUG && rump.netstat -na -f inet
382 export RUMP_SERVER=$SOCK_REMOTE
383 $DEBUG && rump.netstat -na -f inet
384
385 # Get a translated port number from 4500 on the NAPT
386 export RUMP_SERVER=$SOCK_NAT
387 $DEBUG && $HIJACKING_NPF npfctl list
388 # 192.168.0.2:4500 10.0.0.2:4500 via shmif1:65248
389 port_a=$($HIJACKING_NPF npfctl list | grep $ip_local_a | awk -F 'shmif1:' '/4500/ {print $2;}')
390 $DEBUG && echo port_a=$port_a
391 if [ -z "$port_a" ]; then
392 atf_fail "Failed to get a translated port on NAPT"
393 fi
394
395 # Setup ESP-UDP ipsecif(4) for first client under NAPT
396 setup_ipsecif $SOCK_LOCAL_A 0 $ip_local_a 4500 $ip_remote 4500 \
397 $ip_local_ipsecif_a $ip_remote_ipsecif_a
398 setup_ipsecif $SOCK_REMOTE 0 $ip_remote 4500 $ip_nat_remote $port_a \
399 $ip_remote_ipsecif_a $ip_local_ipsecif_a
400
401 add_sa $SOCK_LOCAL_A "esp-udp" "$algo_args" \
402 $ip_local_a 4500 $ip_remote 4500 10000 10001
403 add_sa $SOCK_REMOTE "esp-udp" "$algo_args" \
404 $ip_remote 4500 $ip_nat_remote $port_a 10001 10000
405
406 export RUMP_SERVER=$SOCK_LOCAL_A
407 # ping should still work
408 atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_remote
409
410 # Try ping over the ESP-UDP ipsecif(4)
411 check_ping_packets_over_ipsecif $SOCK_LOCAL_A $BUS_NAT \
412 $ip_remote_ipsecif_a $ip_nat_remote $port_a $ip_remote 4500
413
414 # Try TCP communications over the ESP-UDP ipsecif(4)
415 check_tcp_com_over_ipsecif $SOCK_REMOTE $SOCK_LOCAL_A $BUS_NAT \
416 $ip_remote_ipsecif_a $ip_nat_remote $port_a $ip_remote 4500
417
418 #################### Test for secondary ipsecif(4) NAT-T.
419
420 export RUMP_SERVER=$SOCK_REMOTE
421 $HIJACKING setkey -D
422 $HIJACKING setkey -DP
423
424 export RUMP_SERVER=$SOCK_LOCAL_B
425 # Send a UDP packet to the remote server at port 4500 from the local
426 # host of port 4500. This makes a mapping on the NAPT between them
427 atf_check -s exit:0 $HIJACKING \
428 nc -u -w 3 -p 4500 $ip_remote 4500 < $file_send
429 # Launch a nc server as a terminator of NAT-T on inside the NAPT,
430 # taking over port 4500 of the local host.
431 start_natt_terminator $SOCK_LOCAL_B $ip_local_b 4500
432
433 # We need to keep the servers for NAT-T
434
435 export RUMP_SERVER=$SOCK_LOCAL_B
436 $DEBUG && rump.netstat -na -f inet
437 export RUMP_SERVER=$SOCK_REMOTE
438 $DEBUG && rump.netstat -na -f inet
439
440 # Get a translated port number from 4500 on the NAPT
441 export RUMP_SERVER=$SOCK_NAT
442 $DEBUG && $HIJACKING_NPF npfctl list
443 # 192.168.0.2:4500 10.0.0.2:4500 via shmif1:65248
444 port_b=$($HIJACKING_NPF npfctl list | grep $ip_local_b | awk -F 'shmif1:' '/4500/ {print $2;}')
445 $DEBUG && echo port_b=$port_b
446 if [ -z "$port_b" ]; then
447 atf_fail "Failed to get a translated port on NAPT"
448 fi
449
450 # Setup ESP-UDP ipsecif(4) for first client under NAPT
451 setup_ipsecif $SOCK_LOCAL_B 0 $ip_local_b 4500 $ip_remote 4500 \
452 $ip_local_ipsecif_b $ip_remote_ipsecif_b
453 setup_ipsecif $SOCK_REMOTE 1 $ip_remote 4500 $ip_nat_remote $port_b \
454 $ip_remote_ipsecif_b $ip_local_ipsecif_b
455
456 check_ping_packets_over_ipsecif $SOCK_LOCAL_A $BUS_NAT \
457 $ip_remote_ipsecif_a $ip_nat_remote $port_a $ip_remote 4500
458
459 add_sa $SOCK_LOCAL_B "esp-udp" "$algo_args" \
460 $ip_local_b 4500 $ip_remote 4500 11000 11001
461 add_sa $SOCK_REMOTE "esp-udp" "$algo_args" \
462 $ip_remote 4500 $ip_nat_remote $port_b 11001 11000
463
464 export RUMP_SERVER=$SOCK_LOCAL_B
465 # ping should still work
466 atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_remote
467
468 # Try ping over the ESP-UDP ipsecif(4)
469 check_ping_packets_over_ipsecif $SOCK_LOCAL_B $BUS_NAT \
470 $ip_remote_ipsecif_b $ip_nat_remote $port_b $ip_remote 4500
471
472
473 # Try TCP communications over the ESP-UDP ipsecif(4)
474 check_tcp_com_over_ipsecif $SOCK_REMOTE $SOCK_LOCAL_B $BUS_NAT \
475 $ip_remote_ipsecif_b $ip_nat_remote $port_b $ip_remote 4500
476
477 # Try ping over the ESP-UDP ipsecif(4) for primary again
478 check_ping_packets_over_ipsecif $SOCK_LOCAL_A $BUS_NAT \
479 $ip_remote_ipsecif_a $ip_nat_remote $port_a $ip_remote 4500
480
481 # Try TCP communications over the ESP-UDP ipsecif(4) for primary again
482 check_tcp_com_over_ipsecif $SOCK_REMOTE $SOCK_LOCAL_A $BUS_NAT \
483 $ip_remote_ipsecif_a $ip_nat_remote $port_a $ip_remote 4500
484
485 # Kill the NAT-T terminator
486 stop_natt_terminators
487 }
488
489 add_test_ipsecif_natt_transport()
490 {
491 local algo=$1
492 local _algo=$(echo $algo | sed 's/-//g')
493 local name= desc=
494
495 desc="Test ipsecif(4) NAT-T ($algo)"
496 name="ipsecif_natt_transport_${_algo}"
497
498 atf_test_case ${name} cleanup
499 eval "
500 ${name}_head() {
501 atf_set descr \"$desc\"
502 atf_set require.progs rump_server setkey nc
503 }
504 ${name}_body() {
505 test_ipsecif_natt_transport $algo
506 rump_server_destroy_ifaces
507 }
508 ${name}_cleanup() {
509 stop_nc_server
510 stop_natt_terminators
511 \$DEBUG && dump
512 cleanup
513 }
514 "
515 atf_add_test_case ${name}
516 }
517
518 atf_init_test_cases()
519 {
520 local algo=
521
522 for algo in $ESP_ENCRYPTION_ALGORITHMS_MINIMUM; do
523 add_test_ipsecif_natt_transport $algo
524 done
525 }
526