Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Jul 2021 11:46:49 GMT
From:      Kristof Provost <kp@FreeBSD.org>
To:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org
Subject:   git: 4aa52f90f71e - stable/13 - pf tests: ensure syncookie does not create state
Message-ID:  <202107271146.16RBknSv067891@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch stable/13 has been updated by kp:

URL: https://cgit.FreeBSD.org/src/commit/?id=4aa52f90f71eb7d710da46e587354190d6df5566

commit 4aa52f90f71eb7d710da46e587354190d6df5566
Author:     Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2021-06-30 13:27:46 +0000
Commit:     Kristof Provost <kp@FreeBSD.org>
CommitDate: 2021-07-27 07:44:06 +0000

    pf tests: ensure syncookie does not create state
    
    Test that with syncookies enabled pf does not create state for
    connections before the remote peer has replied to the SYN|ACK message.
    
    MFC after:      1 week
    Sponsored by:   Modirum MDPay
    Differential Revision:  https://reviews.freebsd.org/D31142
    
    (cherry picked from commit 27ab791a55191c0b6503391d411303b042b41047)
---
 tests/sys/netpfil/pf/syncookie.sh | 49 +++++++++++++++++++++++++++++++++++++++
 1 file changed, 49 insertions(+)

diff --git a/tests/sys/netpfil/pf/syncookie.sh b/tests/sys/netpfil/pf/syncookie.sh
index 7bd045249be6..49acd9fab11d 100644
--- a/tests/sys/netpfil/pf/syncookie.sh
+++ b/tests/sys/netpfil/pf/syncookie.sh
@@ -27,6 +27,8 @@
 
 . $(atf_get_srcdir)/utils.subr
 
+common_dir=$(atf_get_srcdir)/../common
+
 atf_test_case "forward" "cleanup"
 forward_head()
 {
@@ -78,7 +80,54 @@ forward_cleanup()
 	pft_cleanup
 }
 
+atf_test_case "nostate" "cleanup"
+nostate_head()
+{
+	atf_set descr 'Ensure that we do not create until SYN|ACK'
+	atf_set require.user root
+	atf_set require.progs scapy
+}
+
+nostate_body()
+{
+	pft_init
+
+	epair=$(vnet_mkepair)
+	ifconfig ${epair}a 192.0.2.2/24 up
+
+	vnet_mkjail alcatraz ${epair}b
+	jexec alcatraz ifconfig ${epair}b 192.0.2.1/24 up
+
+	jexec alcatraz pfctl -e
+	pft_set_rules alcatraz \
+		"set syncookies always" \
+		"pass in" \
+		"pass out"
+
+	# Sanity check
+	atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1
+
+	# Now syn flood to create many states
+	${common_dir}/pft_synflood.py \
+		--sendif ${epair}a \
+		--to 192.0.2.2 \
+		--count 20
+
+	states=$(jexec alcatraz pfctl -ss | grep tcp)
+	if [ -n "$states" ];
+	then
+		echo "$states"
+		atf_fail "Found unexpected state"
+	fi
+}
+
+nostate_cleanup()
+{
+	pft_cleanup
+}
+
 atf_init_test_cases()
 {
 	atf_add_test_case "forward"
+	atf_add_test_case "nostate"
 }



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202107271146.16RBknSv067891>