pf tests: Test multi-wan rdr

This replicates an issue observed on pfSense: https://redmine.pfsense.org/issues/11436

In essence, reply-to is needed to ensure that connections always leave
the WAN interface they came in on, but this confused the state tracking.

MFC after:	2 week
Sponsored by:	Rubicon Communications, LLC ("Netgate")
This commit is contained in:
Kristof Provost 2021-04-06 13:25:49 +02:00
parent 6d786845cf
commit f37667e235

View File

@ -99,8 +99,91 @@ v6_cleanup()
pft_cleanup
}
atf_test_case "multiwan" "cleanup"
multiwan_head()
{
atf_set descr 'Multi-WAN redirection / reply-to test'
atf_set require.user root
}
multiwan_body()
{
pft_init
epair_one=$(vnet_mkepair)
epair_two=$(vnet_mkepair)
epair_cl_one=$(vnet_mkepair)
epair_cl_two=$(vnet_mkepair)
vnet_mkjail srv ${epair_one}b ${epair_two}b
vnet_mkjail wan_one ${epair_one}a ${epair_cl_one}b
vnet_mkjail wan_two ${epair_two}a ${epair_cl_two}b
vnet_mkjail client ${epair_cl_one}a ${epair_cl_two}a
jexec client ifconfig ${epair_cl_one}a 203.0.113.1/25
jexec wan_one ifconfig ${epair_cl_one}b 203.0.113.2/25
jexec wan_one ifconfig ${epair_one}a 192.0.2.1/24 up
jexec wan_one sysctl net.inet.ip.forwarding=1
jexec srv ifconfig ${epair_one}b 192.0.2.2/24 up
jexec client route add 192.0.2.0/24 203.0.113.2
jexec client ifconfig ${epair_cl_two}a 203.0.113.128/25
jexec wan_two ifconfig ${epair_cl_two}b 203.0.113.129/25
jexec wan_two ifconfig ${epair_two}a 198.51.100.1/24 up
jexec wan_two sysctl net.inet.ip.forwarding=1
jexec srv ifconfig ${epair_two}b 198.51.100.2/24 up
jexec client route add 198.51.100.0/24 203.0.113.129
jexec srv ifconfig lo0 127.0.0.1/8 up
jexec srv route add default 192.0.2.1
jexec srv sysctl net.inet.ip.forwarding=1
# Run echo server in srv jail
jexec srv /usr/sbin/inetd -p multiwan.pid $(atf_get_srcdir)/echo_inetd.conf
jexec srv pfctl -e
pft_set_rules srv \
"nat on ${epair_one}b inet from 127.0.0.0/8 to any -> (${epair_one}b)" \
"nat on ${epair_two}b inet from 127.0.0.0/8 to any -> (${epair_two}b)" \
"rdr on ${epair_one}b inet proto tcp from any to 192.0.2.2 port 7 -> 127.0.0.1 port 7" \
"rdr on ${epair_two}b inet proto tcp from any to 198.51.100.2 port 7 -> 127.0.0.1 port 7" \
"block in" \
"block out" \
"pass in quick on ${epair_one}b reply-to (${epair_one}b 192.0.2.1) inet proto tcp from any to 127.0.0.1 port 7" \
"pass in quick on ${epair_two}b reply-to (${epair_two}b 198.51.100.1) inet proto tcp from any to 127.0.0.1 port 7"
# These will always succeed, because we don't change interface to route
# correctly here.
result=$(echo "one" | jexec wan_one nc -N -w 3 192.0.2.2 7)
if [ "${result}" != "one" ]; then
atf_fail "Redirect on one failed"
fi
result=$(echo "two" | jexec wan_two nc -N -w 3 198.51.100.2 7)
if [ "${result}" != "two" ]; then
atf_fail "Redirect on two failed"
fi
result=$(echo "one" | jexec client nc -N -w 3 192.0.2.2 7)
if [ "${result}" != "one" ]; then
atf_fail "Redirect from client on one failed"
fi
# This should trigger the issue fixed in 829a69db855b48ff7e8242b95e193a0783c489d9
result=$(echo "two" | jexec client nc -N -w 3 198.51.100.2 7)
if [ "${result}" != "two" ]; then
atf_fail "Redirect from client on two failed"
fi
}
multiwan_cleanup()
{
rm -f multiwan.pid
pft_cleanup
}
atf_init_test_cases()
{
atf_add_test_case "v4"
atf_add_test_case "v6"
atf_add_test_case "multiwan"
}