# $NetBSD: t_basic.sh,v 1.6 2024/10/08 02:29:40 riastradh Exp $ # # Copyright (c) 2018 Ryota Ozaki # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # BUS=bus SOCK_LOCAL=unix://wg_local SOCK_PEER=unix://wg_peer SOCK_PEER2=unix://wg_peer2 check_ping_payload() { local proto=$1 local ip=$2 local ping= size= if [ $proto = inet ]; then ping="atf_check -s exit:0 -o ignore rump.ping -n -c 1 -w 1" else ping="atf_check -s exit:0 -o ignore rump.ping6 -n -c 1 -X 1" fi for size in $(seq 1 100) $(seq 450 550) $(seq 1400 1500); do $ping -s $size $ip done } check_badudp() { local proto=$1 local ip=$2 local port=51820 # XXX parametrize more clearly if [ $proto = inet ]; then atf_check -o ignore -e ignore \ $HIJACKING nc -4uv -w1 $ip $port $outfile $DEBUG && cat $outfile $ping $ip_wg_peer extract_new_packets $BUS > $outfile $DEBUG && cat $outfile $ping $ip_wg_peer2 extract_new_packets $BUS > $outfile $DEBUG && cat $outfile export RUMP_SERVER=$SOCK_LOCAL $ifconfig wg0 destroy $ifconfig wg1 destroy export RUMP_SERVER=$SOCK_PEER $ifconfig wg0 destroy export RUMP_SERVER=$SOCK_PEER2 $ifconfig wg0 destroy } wg_multiple_interfaces_cleanup() { $DEBUG && dump cleanup } atf_test_case wg_multiple_peers cleanup wg_multiple_peers_head() { atf_set "descr" "tests multiple wg(4) peers" atf_set "require.progs" "rump_server" "wgconfig" "wg-keygen" } wg_multiple_peers_body() { local ifconfig="atf_check -s exit:0 rump.ifconfig" local ping="atf_check -s exit:0 -o ignore rump.ping -n -i 0.1 -c 3 -w 1" local ping_fail="atf_check -s not-exit:0 -o ignore rump.ping -n -c 1 -w 1" local key_priv_peer2= local key_pub_peer2= local ip_local=192.168.1.1 local ip_peer=192.168.1.2 local ip_peer2=192.168.1.3 local ip_wg_local=10.0.0.1 local ip_wg_peer=10.0.0.2 local ip_wg_peer2=10.0.0.3 local port=51820 local outfile=./out setup_servers rump_server_add_iface $SOCK_LOCAL shmif1 $BUS rump_server_crypto_start $SOCK_PEER2 netinet6 wg rump_server_add_iface $SOCK_PEER2 shmif0 $BUS # It sets key_priv_local key_pub_local key_priv_peer key_pub_peer generate_keys key_priv_peer2=$(wg-keygen) key_pub_peer2=$(echo $key_priv_peer2| wg-keygen --pub) export RUMP_SERVER=$SOCK_LOCAL setup_common shmif0 inet $ip_local 24 setup_wg_common wg0 inet $ip_wg_local 24 $port "$key_priv_local" add_peer wg0 peer0 $key_pub_peer $ip_peer:$port $ip_wg_peer/32 add_peer wg0 peer1 $key_pub_peer2 $ip_peer2:$port $ip_wg_peer2/32 $ifconfig -w 10 export RUMP_SERVER=$SOCK_PEER setup_common shmif0 inet $ip_peer 24 setup_wg_common wg0 inet $ip_wg_peer 24 $port "$key_priv_peer" add_peer wg0 peer0 $key_pub_local $ip_local:$port $ip_wg_local/32 $ifconfig -w 10 export RUMP_SERVER=$SOCK_PEER2 setup_common shmif0 inet $ip_peer2 24 setup_wg_common wg0 inet $ip_wg_peer2 24 $port "$key_priv_peer2" add_peer wg0 peer0 $key_pub_local $ip_local:$port $ip_wg_local/32 $ifconfig -w 10 export RUMP_SERVER=$SOCK_LOCAL extract_new_packets $BUS > $outfile $DEBUG && cat $outfile $ping $ip_wg_peer extract_new_packets $BUS > $outfile $DEBUG && cat $outfile $ping $ip_wg_peer2 extract_new_packets $BUS > $outfile $DEBUG && cat $outfile export RUMP_SERVER=$SOCK_LOCAL $ifconfig wg0 destroy export RUMP_SERVER=$SOCK_PEER $ifconfig wg0 destroy export RUMP_SERVER=$SOCK_PEER2 $ifconfig wg0 destroy } wg_multiple_peers_cleanup() { $DEBUG && dump cleanup } atf_init_test_cases() { add_badudp_test ipv4 ipv4 add_badudp_test ipv4 ipv6 add_badudp_test ipv6 ipv4 add_badudp_test ipv6 ipv6 add_basic_test ipv4 ipv4 add_basic_test ipv4 ipv6 add_basic_test ipv6 ipv4 add_basic_test ipv6 ipv6 add_payload_sizes_test ipv4 ipv4 add_payload_sizes_test ipv4 ipv6 add_payload_sizes_test ipv6 ipv4 add_payload_sizes_test ipv6 ipv6 atf_add_test_case wg_create_destroy atf_add_test_case wg_create_destroy_peers_ipv4 atf_add_test_case wg_create_destroy_peers_ipv6 atf_add_test_case wg_multiple_interfaces atf_add_test_case wg_multiple_peers }