blob: 06555b1eb0538edb90d4f620b979a4e0acd46cd8 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
|
# $OpenBSD: Makefile,v 1.25 2019/05/10 02:22:34 bluhm Exp $
# The following ports must be installed:
#
# python-2.7 interpreted object-oriented programming language
# scapy powerful interactive packet manipulation in python
.if ! exists(/usr/local/bin/python2.7) || ! exists(/usr/local/bin/scapy)
.BEGIN:
@true
regress:
@echo Install python and the scapy module for additional tests.
@echo SKIPPED
.endif
# This test needs a manual setup of two machines
# Set up machines: LOCAL REMOTE
# LOCAL is the machine where this makefile is running.
# REMOTE is running OpenBSD with or without pf to test fragment reassemly
# Enable echo udp6 in inetd.conf on REMOTE to test UDP fragments.
# REMOTE_SSH is used to login and enable or disable pf automatically.
# Configure addresses on the machines.
# Adapt interface and addresse variables to your local setup.
LOCAL_IF ?= em1
LOCAL_MAC ?= 00:1b:21:0e:6e:8e
REMOTE_MAC ?= 00:04:23:b0:68:8e
LOCAL_ADDR6 ?= fdd7:e83e:66bc:81::21
REMOTE_ADDR6 ?= fdd7:e83e:66bc:81::22
REMOTE_SSH ?=
.if empty (LOCAL_IF) || empty (LOCAL_MAC) || empty (REMOTE_MAC) || \
empty (LOCAL_ADDR6) || empty (REMOTE_ADDR6) || empty (REMOTE_SSH)
.BEGIN:
@true
regress:
@echo This tests needs a remote machine to operate on.
@echo LOCAL_IF LOCAL_MAC REMOTE_MAC LOCAL_ADDR6 REMOTE_ADDR6 REMOTE_SSH
@echo Fill out these variables for additional tests.
@echo SKIPPED
.endif
.MAIN: all
.if make (regress) || make (all)
.BEGIN:
@echo
${SUDO} true
ssh -t ${REMOTE_SSH} ${SUDO} true
rm -f stamp-stack stamp-pf
.endif
# Create python include file containing the addresses.
addr.py: Makefile
rm -f $@ $@.tmp
echo 'LOCAL_IF = "${LOCAL_IF}"' >>$@.tmp
echo 'LOCAL_MAC = "${LOCAL_MAC}"' >>$@.tmp
echo 'REMOTE_MAC = "${REMOTE_MAC}"' >>$@.tmp
.for var in LOCAL_ADDR REMOTE_ADDR
echo '${var}6 = "${${var}6}"' >>$@.tmp
.endfor
mv $@.tmp $@
# Set variables so that make runs with and without obj directory.
# Only do that if necessary to keep visible output short.
.if ${.CURDIR} == ${.OBJDIR}
PYTHON = python2.7 -u ./
.else
PYTHON = PYTHONPATH=${.OBJDIR} python2.7 -u ${.CURDIR}/
.endif
stamp-stack:
@echo '\n======== $@ ========'
rm -f stamp-stack stamp-pf
-ssh ${REMOTE_SSH} ${SUDO} pfctl -d
ssh ${REMOTE_SSH} ${SUDO} pfctl -a regress -Fr
date >$@
stamp-pf: addr.py pf.conf
@echo '\n======== $@ ========'
rm -f stamp-stack stamp-pf
cat addr.py ${.CURDIR}/pf.conf | pfctl -n -f -
cat addr.py ${.CURDIR}/pf.conf | \
ssh ${REMOTE_SSH} ${SUDO} pfctl -a regress -f -
-ssh ${REMOTE_SSH} ${SUDO} pfctl -e
date >$@
FRAG6_SCRIPTS !!= cd ${.CURDIR} && ls -1 frag6*.py
run-stack-frag6_queuelimit.py:
@echo '\n======== $@ ========'
# the stack does not limit the amount of fragments during reassembly
@echo DISABLED
.for sp in stack pf
# Ping all addresses. This ensures that the ip addresses are configured
# and all routing table are set up to allow bidirectional packet flow.
${sp}: run-${sp}-ping6
REGRESS_TARGETS += run-${sp}-ping6
run-${sp}-ping6: stamp-${sp}
@echo '\n======== $@ ========'
.for ip in LOCAL_ADDR REMOTE_ADDR
@echo Check ping6 ${ip}6:
ping6 -n -c 1 ${${ip}6}
.endfor
# Ping all addresses again but with 5000 bytes payload. These large
# packets get fragmented by LOCAL and must be handled by REMOTE.
${sp}: run-${sp}-fragping6
REGRESS_TARGETS += run-${sp}-fragping6
run-${sp}-fragping6: stamp-${sp}
@echo '\n======== $@ ========'
.for ip in LOCAL_ADDR REMOTE_ADDR
@echo Check ping6 ${ip}6:
ping6 -n -c 1 -s 5000 -m ${${ip}6}
.endfor
.for s in ${FRAG6_SCRIPTS}
${sp}: run-${sp}-${s}
REGRESS_TARGETS += run-${sp}-${s}
run-${sp}-${s}: addr.py stamp-${sp}
@echo '\n======== $@ ========'
${SUDO} ${PYTHON}${s}
.endfor
.endfor
# After running the tests, turn on pf on remote machine.
# This is the expected default configuration.
REGRESS_CLEANUP += cleanup-pf
cleanup-pf:
rm -f stamp-stack stamp-pf
ssh ${REMOTE_SSH} ${SUDO} pfctl -a regress -Fa
-ssh ${REMOTE_SSH} ${SUDO} pfctl -e || true
CLEANFILES += addr.py *.pyc *.log stamp-*
.PHONY: check-setup check-setup-local check-setup-remote
# Check wether the address, route and remote setup is correct
check-setup: check-setup-local check-setup-remote
check-setup-local:
@echo '\n======== $@ ========'
ping6 -n -c 1 ${LOCAL_ADDR6} # LOCAL_ADDR6
route -n get -inet6 ${LOCAL_ADDR6} |\
grep -q 'flags: .*LOCAL' # LOCAL_ADDR6
ping6 -n -c 1 ${REMOTE_ADDR6} # REMOTE_ADDR6
route -n get -inet6 ${REMOTE_ADDR6} |\
grep -q 'interface: ${LOCAL_IF}$$' # REMOTE_ADDR6 LOCAL_IF
ndp -n ${REMOTE_ADDR6} |\
grep -q ' ${REMOTE_MAC} ' # REMOTE_ADDR6 REMOTE_MAC
check-setup-remote:
@echo '\n======== $@ ========'
ssh ${REMOTE_SSH} ping6 -n -c 1 ${REMOTE_ADDR6} # REMOTE_ADDR6
ssh ${REMOTE_SSH} route -n get -inet6 ${REMOTE_ADDR6} |\
grep -q 'flags: .*LOCAL' # REMOTE_ADDR6
ssh ${REMOTE_SSH} ping6 -n -c 1 ${LOCAL_ADDR6} # LOCAL_ADDR6
ssh ${REMOTE_SSH} ndp -n ${LOCAL_ADDR6} |\
grep -q ' ${LOCAL_MAC} ' # LOCAL_ADDR6 LOCAL_MAC
ssh ${REMOTE_SSH} route -n get -inet6 ${FAKE_NET_ADDR6} |\
grep -q 'gateway: ${LOCAL_ADDR6}' # FAKE_NET_ADDR6 LOCAL_ADDR6
ssh ${REMOTE_SSH} netstat -na -f inet6 -p udp | fgrep ' *.7 '
.include <bsd.regress.mk>
|