Home | History | Annotate | Line # | Download | only in ipsec
t_ipsec_transport.sh revision 1.1.6.2
      1  1.1.6.2  pgoyette #	$NetBSD: t_ipsec_transport.sh,v 1.1.6.2 2017/05/19 00:22:59 pgoyette Exp $
      2      1.1     ozaki #
      3      1.1     ozaki # Copyright (c) 2017 Internet Initiative Japan Inc.
      4      1.1     ozaki # All rights reserved.
      5      1.1     ozaki #
      6      1.1     ozaki # Redistribution and use in source and binary forms, with or without
      7      1.1     ozaki # modification, are permitted provided that the following conditions
      8      1.1     ozaki # are met:
      9      1.1     ozaki # 1. Redistributions of source code must retain the above copyright
     10      1.1     ozaki #    notice, this list of conditions and the following disclaimer.
     11      1.1     ozaki # 2. Redistributions in binary form must reproduce the above copyright
     12      1.1     ozaki #    notice, this list of conditions and the following disclaimer in the
     13      1.1     ozaki #    documentation and/or other materials provided with the distribution.
     14      1.1     ozaki #
     15      1.1     ozaki # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     16      1.1     ozaki # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     17      1.1     ozaki # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     18      1.1     ozaki # PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     19      1.1     ozaki # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     20      1.1     ozaki # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     21      1.1     ozaki # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     22      1.1     ozaki # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     23      1.1     ozaki # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     24      1.1     ozaki # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     25      1.1     ozaki # POSSIBILITY OF SUCH DAMAGE.
     26      1.1     ozaki #
     27      1.1     ozaki 
     28      1.1     ozaki SOCK_LOCAL=unix://ipsec_local
     29      1.1     ozaki SOCK_PEER=unix://ipsec_peer
     30      1.1     ozaki BUS=./bus_ipsec
     31      1.1     ozaki 
     32      1.1     ozaki DEBUG=${DEBUG:-false}
     33      1.1     ozaki 
     34      1.1     ozaki test_ipsec4_transport()
     35      1.1     ozaki {
     36      1.1     ozaki 	local proto=$1
     37      1.1     ozaki 	local algo=$2
     38      1.1     ozaki 	local ip_local=10.0.0.1
     39      1.1     ozaki 	local ip_peer=10.0.0.2
     40      1.1     ozaki 	local tmpfile=./tmp
     41      1.1     ozaki 	local outfile=./out
     42  1.1.6.2  pgoyette 	local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
     43  1.1.6.2  pgoyette 	local algo_args="$(generate_algo_args $proto $algo)"
     44      1.1     ozaki 
     45      1.1     ozaki 	rump_server_crypto_start $SOCK_LOCAL netipsec
     46      1.1     ozaki 	rump_server_crypto_start $SOCK_PEER netipsec
     47      1.1     ozaki 	rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
     48      1.1     ozaki 	rump_server_add_iface $SOCK_PEER shmif0 $BUS
     49      1.1     ozaki 
     50      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
     51      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig shmif0 $ip_local/24
     52      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig -w 10
     53      1.1     ozaki 
     54      1.1     ozaki 	export RUMP_SERVER=$SOCK_PEER
     55      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig shmif0 $ip_peer/24
     56      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig -w 10
     57      1.1     ozaki 
     58      1.1     ozaki 	extract_new_packets $BUS > $outfile
     59      1.1     ozaki 
     60      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
     61      1.1     ozaki 	atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
     62      1.1     ozaki 
     63      1.1     ozaki 	extract_new_packets $BUS > $outfile
     64      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP echo request" \
     65      1.1     ozaki 	    cat $outfile
     66      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP echo reply" \
     67      1.1     ozaki 	    cat $outfile
     68      1.1     ozaki 
     69      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
     70      1.1     ozaki 	# from https://www.netbsd.org/docs/network/ipsec/
     71      1.1     ozaki 	cat > $tmpfile <<-EOF
     72  1.1.6.2  pgoyette 	add $ip_local $ip_peer $proto 10000 $algo_args;
     73  1.1.6.2  pgoyette 	add $ip_peer $ip_local $proto 10001 $algo_args;
     74      1.1     ozaki 	spdadd $ip_local $ip_peer any -P out ipsec $proto/transport//require;
     75      1.1     ozaki 	EOF
     76      1.1     ozaki 	$DEBUG && cat $tmpfile
     77      1.1     ozaki 	atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
     78  1.1.6.1  pgoyette 	check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
     79      1.1     ozaki 
     80      1.1     ozaki 	export RUMP_SERVER=$SOCK_PEER
     81      1.1     ozaki 	cat > $tmpfile <<-EOF
     82  1.1.6.2  pgoyette 	add $ip_local $ip_peer $proto 10000 $algo_args;
     83  1.1.6.2  pgoyette 	add $ip_peer $ip_local $proto 10001 $algo_args;
     84      1.1     ozaki 	spdadd $ip_peer $ip_local any -P out ipsec $proto/transport//require;
     85      1.1     ozaki 	EOF
     86      1.1     ozaki 	$DEBUG && cat $tmpfile
     87      1.1     ozaki 	atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
     88  1.1.6.1  pgoyette 	check_sa_entries $SOCK_PEER $ip_local $ip_peer
     89      1.1     ozaki 
     90      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
     91      1.1     ozaki 	atf_check -s exit:0 -o ignore rump.ping -c 1 -n -w 3 $ip_peer
     92      1.1     ozaki 
     93      1.1     ozaki 	extract_new_packets $BUS > $outfile
     94      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
     95      1.1     ozaki 	    cat $outfile
     96      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
     97      1.1     ozaki 	    cat $outfile
     98  1.1.6.1  pgoyette 
     99  1.1.6.1  pgoyette 	test_flush_entries $SOCK_LOCAL
    100  1.1.6.1  pgoyette 	test_flush_entries $SOCK_PEER
    101      1.1     ozaki }
    102      1.1     ozaki 
    103      1.1     ozaki test_ipsec6_transport()
    104      1.1     ozaki {
    105      1.1     ozaki 	local proto=$1
    106      1.1     ozaki 	local algo=$2
    107      1.1     ozaki 	local ip_local=fd00::1
    108      1.1     ozaki 	local ip_peer=fd00::2
    109      1.1     ozaki 	local tmpfile=./tmp
    110      1.1     ozaki 	local outfile=./out
    111  1.1.6.2  pgoyette 	local proto_cap=$(echo $proto | tr 'a-z' 'A-Z')
    112  1.1.6.2  pgoyette 	local algo_args="$(generate_algo_args $proto $algo)"
    113      1.1     ozaki 
    114      1.1     ozaki 	rump_server_crypto_start $SOCK_LOCAL netinet6 netipsec
    115      1.1     ozaki 	rump_server_crypto_start $SOCK_PEER netinet6 netipsec
    116      1.1     ozaki 	rump_server_add_iface $SOCK_LOCAL shmif0 $BUS
    117      1.1     ozaki 	rump_server_add_iface $SOCK_PEER shmif0 $BUS
    118      1.1     ozaki 
    119      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
    120      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_local
    121      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig -w 10
    122      1.1     ozaki 
    123      1.1     ozaki 	export RUMP_SERVER=$SOCK_PEER
    124      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig shmif0 inet6 $ip_peer
    125      1.1     ozaki 	atf_check -s exit:0 rump.ifconfig -w 10
    126      1.1     ozaki 
    127      1.1     ozaki 	extract_new_packets $BUS > $outfile
    128      1.1     ozaki 
    129      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
    130      1.1     ozaki 	atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
    131      1.1     ozaki 
    132      1.1     ozaki 	extract_new_packets $BUS > $outfile
    133      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_local > $ip_peer: ICMP6, echo request" \
    134      1.1     ozaki 	    cat $outfile
    135      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_peer > $ip_local: ICMP6, echo reply" \
    136      1.1     ozaki 	    cat $outfile
    137      1.1     ozaki 
    138      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
    139      1.1     ozaki 	# from https://www.netbsd.org/docs/network/ipsec/
    140      1.1     ozaki 	cat > $tmpfile <<-EOF
    141  1.1.6.2  pgoyette 	add $ip_local $ip_peer $proto 10000 $algo_args;
    142  1.1.6.2  pgoyette 	add $ip_peer $ip_local $proto 10001 $algo_args;
    143      1.1     ozaki 	spdadd $ip_local $ip_peer any -P out ipsec $proto/transport//require;
    144      1.1     ozaki 	EOF
    145      1.1     ozaki 	$DEBUG && cat $tmpfile
    146      1.1     ozaki 	atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
    147  1.1.6.1  pgoyette 	check_sa_entries $SOCK_LOCAL $ip_local $ip_peer
    148      1.1     ozaki 
    149      1.1     ozaki 	export RUMP_SERVER=$SOCK_PEER
    150      1.1     ozaki 	cat > $tmpfile <<-EOF
    151  1.1.6.2  pgoyette 	add $ip_local $ip_peer $proto 10000 $algo_args;
    152  1.1.6.2  pgoyette 	add $ip_peer $ip_local $proto 10001 $algo_args;
    153      1.1     ozaki 	spdadd $ip_peer $ip_local any -P out ipsec $proto/transport//require;
    154      1.1     ozaki 	EOF
    155      1.1     ozaki 	$DEBUG && cat $tmpfile
    156      1.1     ozaki 	atf_check -s exit:0 -o empty $HIJACKING setkey -c < $tmpfile
    157  1.1.6.1  pgoyette 	check_sa_entries $SOCK_PEER $ip_local $ip_peer
    158      1.1     ozaki 
    159      1.1     ozaki 	export RUMP_SERVER=$SOCK_LOCAL
    160      1.1     ozaki 	atf_check -s exit:0 -o ignore rump.ping6 -c 1 -n -X 3 $ip_peer
    161      1.1     ozaki 
    162      1.1     ozaki 	extract_new_packets $BUS > $outfile
    163      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_local > $ip_peer: $proto_cap" \
    164      1.1     ozaki 	    cat $outfile
    165      1.1     ozaki 	atf_check -s exit:0 -o match:"$ip_peer > $ip_local: $proto_cap" \
    166      1.1     ozaki 	    cat $outfile
    167  1.1.6.1  pgoyette 
    168  1.1.6.1  pgoyette 	test_flush_entries $SOCK_LOCAL
    169  1.1.6.1  pgoyette 	test_flush_entries $SOCK_PEER
    170      1.1     ozaki }
    171      1.1     ozaki 
    172      1.1     ozaki test_transport_common()
    173      1.1     ozaki {
    174      1.1     ozaki 	local ipproto=$1
    175      1.1     ozaki 	local proto=$2
    176      1.1     ozaki 	local algo=$3
    177      1.1     ozaki 
    178      1.1     ozaki 	if [ $ipproto = ipv4 ]; then
    179      1.1     ozaki 		test_ipsec4_transport $proto $algo
    180      1.1     ozaki 	else
    181      1.1     ozaki 		test_ipsec6_transport $proto $algo
    182      1.1     ozaki 	fi
    183      1.1     ozaki }
    184      1.1     ozaki 
    185      1.1     ozaki add_test_transport_mode()
    186      1.1     ozaki {
    187      1.1     ozaki 	local ipproto=$1
    188      1.1     ozaki 	local proto=$2
    189      1.1     ozaki 	local algo=$3
    190      1.1     ozaki 	local _algo=$(echo $algo | sed 's/-//g')
    191      1.1     ozaki 	local name= desc=
    192      1.1     ozaki 
    193      1.1     ozaki 	name="ipsec_transport_${ipproto}_${proto}_${_algo}"
    194      1.1     ozaki 	desc="Tests of IPsec ($ipproto) transport mode with $proto ($algo)"
    195      1.1     ozaki 
    196      1.1     ozaki 	atf_test_case ${name} cleanup
    197      1.1     ozaki 	eval "								\
    198      1.1     ozaki 	    ${name}_head() {						\
    199      1.1     ozaki 	        atf_set \"descr\" \"$desc\";				\
    200      1.1     ozaki 	        atf_set \"require.progs\" \"rump_server\" \"setkey\";	\
    201      1.1     ozaki 	    };								\
    202      1.1     ozaki 	    ${name}_body() {						\
    203      1.1     ozaki 	        test_transport_common $ipproto $proto $algo;		\
    204      1.1     ozaki 	        rump_server_destroy_ifaces;				\
    205      1.1     ozaki 	    };								\
    206      1.1     ozaki 	    ${name}_cleanup() {						\
    207      1.1     ozaki 	        $DEBUG && dump;						\
    208      1.1     ozaki 	        cleanup;						\
    209      1.1     ozaki 	    }								\
    210      1.1     ozaki 	"
    211      1.1     ozaki 	atf_add_test_case ${name}
    212      1.1     ozaki }
    213      1.1     ozaki 
    214      1.1     ozaki atf_init_test_cases()
    215      1.1     ozaki {
    216      1.1     ozaki 	local algo=
    217      1.1     ozaki 
    218      1.1     ozaki 	for algo in $ESP_ENCRYPTION_ALGORITHMS; do
    219      1.1     ozaki 		add_test_transport_mode ipv4 esp $algo
    220      1.1     ozaki 		add_test_transport_mode ipv6 esp $algo
    221      1.1     ozaki 	done
    222      1.1     ozaki 	for algo in $AH_AUTHENTICATION_ALGORITHMS; do
    223      1.1     ozaki 		add_test_transport_mode ipv4 ah $algo
    224      1.1     ozaki 		add_test_transport_mode ipv6 ah $algo
    225      1.1     ozaki 	done
    226      1.1     ozaki }
    227