xfrm_policy.sh 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486
  1. #!/bin/bash
  2. # SPDX-License-Identifier: GPL-2.0
  3. #
  4. # Check xfrm policy resolution. Topology:
  5. #
  6. # 1.2 1.1 3.1 3.10 2.1 2.2
  7. # eth1 eth1 veth0 veth0 eth1 eth1
  8. # ns1 ---- ns3 ----- ns4 ---- ns2
  9. #
  10. # ns3 and ns4 are connected via ipsec tunnel.
  11. # pings from ns1 to ns2 (and vice versa) are supposed to work like this:
  12. # ns1: ping 10.0.2.2: passes via ipsec tunnel.
  13. # ns2: ping 10.0.1.2: passes via ipsec tunnel.
  14. # ns1: ping 10.0.1.253: passes via ipsec tunnel (direct policy)
  15. # ns2: ping 10.0.2.253: passes via ipsec tunnel (direct policy)
  16. #
  17. # ns1: ping 10.0.2.254: does NOT pass via ipsec tunnel (exception)
  18. # ns2: ping 10.0.1.254: does NOT pass via ipsec tunnel (exception)
  19. # Kselftest framework requirement - SKIP code is 4.
  20. ksft_skip=4
  21. ret=0
  22. policy_checks_ok=1
  23. KEY_SHA=0xdeadbeef1234567890abcdefabcdefabcdefabcd
  24. KEY_AES=0x0123456789abcdef0123456789012345
  25. SPI1=0x1
  26. SPI2=0x2
  27. do_esp_policy() {
  28. local ns=$1
  29. local me=$2
  30. local remote=$3
  31. local lnet=$4
  32. local rnet=$5
  33. # to encrypt packets as they go out (includes forwarded packets that need encapsulation)
  34. ip -net $ns xfrm policy add src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
  35. # to fwd decrypted packets after esp processing:
  36. ip -net $ns xfrm policy add src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
  37. }
  38. do_esp() {
  39. local ns=$1
  40. local me=$2
  41. local remote=$3
  42. local lnet=$4
  43. local rnet=$5
  44. local spi_out=$6
  45. local spi_in=$7
  46. ip -net $ns xfrm state add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $rnet dst $lnet
  47. ip -net $ns xfrm state add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunnel sel src $lnet dst $rnet
  48. do_esp_policy $ns $me $remote $lnet $rnet
  49. }
  50. # add policies with different netmasks, to make sure kernel carries
  51. # the policies contained within new netmask over when search tree is
  52. # re-built.
  53. # peer netns that are supposed to be encapsulated via esp have addresses
  54. # in the 10.0.1.0/24 and 10.0.2.0/24 subnets, respectively.
  55. #
  56. # Adding a policy for '10.0.1.0/23' will make it necessary to
  57. # alter the prefix of 10.0.1.0 subnet.
  58. # In case new prefix overlaps with existing node, the node and all
  59. # policies it carries need to be merged with the existing one(s).
  60. #
  61. # Do that here.
  62. do_overlap()
  63. {
  64. local ns=$1
  65. # adds new nodes to tree (neither network exists yet in policy database).
  66. ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
  67. # adds a new node in the 10.0.0.0/24 tree (dst node exists).
  68. ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block
  69. # adds a 10.2.0.0/23 node, but for different dst.
  70. ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block
  71. # dst now overlaps with the 10.0.1.0/24 ESP policy in fwd.
  72. # kernel must 'promote' existing one (10.0.0.0/24) to 10.0.0.0/23.
  73. # But 10.0.0.0/23 also includes existing 10.0.1.0/24, so that node
  74. # also has to be merged too, including source-sorted subtrees.
  75. # old:
  76. # 10.0.0.0/24 (node 1 in dst tree of the bin)
  77. # 10.1.0.0/24 (node in src tree of dst node 1)
  78. # 10.2.0.0/24 (node in src tree of dst node 1)
  79. # 10.0.1.0/24 (node 2 in dst tree of the bin)
  80. # 10.0.2.0/24 (node in src tree of dst node 2)
  81. # 10.2.0.0/24 (node in src tree of dst node 2)
  82. #
  83. # The next 'policy add' adds dst '10.0.0.0/23', which means
  84. # that dst node 1 and dst node 2 have to be merged including
  85. # the sub-tree. As no duplicates are allowed, policies in
  86. # the two '10.0.2.0/24' are also merged.
  87. #
  88. # after the 'add', internal search tree should look like this:
  89. # 10.0.0.0/23 (node in dst tree of bin)
  90. # 10.0.2.0/24 (node in src tree of dst node)
  91. # 10.1.0.0/24 (node in src tree of dst node)
  92. # 10.2.0.0/24 (node in src tree of dst node)
  93. #
  94. # 10.0.0.0/24 and 10.0.1.0/24 nodes have been merged as 10.0.0.0/23.
  95. ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block
  96. # similar to above: add policies (with partially random address), with shrinking prefixes.
  97. for p in 29 28 27;do
  98. for k in $(seq 1 32); do
  99. ip -net $ns xfrm policy add src 10.253.1.$((RANDOM%255))/$p dst 10.254.1.$((RANDOM%255))/$p dir fwd priority $((200+k)) action block 2>/dev/null
  100. done
  101. done
  102. }
  103. do_esp_policy_get_check() {
  104. local ns=$1
  105. local lnet=$2
  106. local rnet=$3
  107. ip -net $ns xfrm policy get src $lnet dst $rnet dir out > /dev/null
  108. if [ $? -ne 0 ] && [ $policy_checks_ok -eq 1 ] ;then
  109. policy_checks_ok=0
  110. echo "FAIL: ip -net $ns xfrm policy get src $lnet dst $rnet dir out"
  111. ret=1
  112. fi
  113. ip -net $ns xfrm policy get src $rnet dst $lnet dir fwd > /dev/null
  114. if [ $? -ne 0 ] && [ $policy_checks_ok -eq 1 ] ;then
  115. policy_checks_ok=0
  116. echo "FAIL: ip -net $ns xfrm policy get src $rnet dst $lnet dir fwd"
  117. ret=1
  118. fi
  119. }
  120. do_exception() {
  121. local ns=$1
  122. local me=$2
  123. local remote=$3
  124. local encryptip=$4
  125. local plain=$5
  126. # network $plain passes without tunnel
  127. ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
  128. # direct policy for $encryptip, use tunnel, higher prio takes precedence
  129. ip -net $ns xfrm policy add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
  130. }
  131. # policies that are not supposed to match any packets generated in this test.
  132. do_dummies4() {
  133. local ns=$1
  134. for i in $(seq 10 16);do
  135. # dummy policy with wildcard src/dst.
  136. echo netns exec $ns ip xfrm policy add src 0.0.0.0/0 dst 10.$i.99.0/30 dir out action block
  137. echo netns exec $ns ip xfrm policy add src 10.$i.99.0/30 dst 0.0.0.0/0 dir out action block
  138. for j in $(seq 32 64);do
  139. echo netns exec $ns ip xfrm policy add src 10.$i.1.0/30 dst 10.$i.$j.0/30 dir out action block
  140. # silly, as it encompasses the one above too, but its allowed:
  141. echo netns exec $ns ip xfrm policy add src 10.$i.1.0/29 dst 10.$i.$j.0/29 dir out action block
  142. # and yet again, even more broad one.
  143. echo netns exec $ns ip xfrm policy add src 10.$i.1.0/24 dst 10.$i.$j.0/24 dir out action block
  144. echo netns exec $ns ip xfrm policy add src 10.$i.$j.0/24 dst 10.$i.1.0/24 dir fwd action block
  145. done
  146. done | ip -batch /dev/stdin
  147. }
  148. do_dummies6() {
  149. local ns=$1
  150. for i in $(seq 10 16);do
  151. for j in $(seq 32 64);do
  152. echo netns exec $ns ip xfrm policy add src dead:$i::/64 dst dead:$i:$j::/64 dir out action block
  153. echo netns exec $ns ip xfrm policy add src dead:$i:$j::/64 dst dead:$i::/24 dir fwd action block
  154. done
  155. done | ip -batch /dev/stdin
  156. }
  157. check_ipt_policy_count()
  158. {
  159. ns=$1
  160. ip netns exec $ns iptables-save -c |grep policy | ( read c rest
  161. ip netns exec $ns iptables -Z
  162. if [ x"$c" = x'[0:0]' ]; then
  163. exit 0
  164. elif [ x"$c" = x ]; then
  165. echo "ERROR: No counters"
  166. ret=1
  167. exit 111
  168. else
  169. exit 1
  170. fi
  171. )
  172. }
  173. check_xfrm() {
  174. # 0: iptables -m policy rule count == 0
  175. # 1: iptables -m policy rule count != 0
  176. rval=$1
  177. ip=$2
  178. local lret=0
  179. ip netns exec ns1 ping -q -c 1 10.0.2.$ip > /dev/null
  180. check_ipt_policy_count ns3
  181. if [ $? -ne $rval ] ; then
  182. lret=1
  183. fi
  184. check_ipt_policy_count ns4
  185. if [ $? -ne $rval ] ; then
  186. lret=1
  187. fi
  188. ip netns exec ns2 ping -q -c 1 10.0.1.$ip > /dev/null
  189. check_ipt_policy_count ns3
  190. if [ $? -ne $rval ] ; then
  191. lret=1
  192. fi
  193. check_ipt_policy_count ns4
  194. if [ $? -ne $rval ] ; then
  195. lret=1
  196. fi
  197. return $lret
  198. }
  199. check_exceptions()
  200. {
  201. logpostfix="$1"
  202. local lret=0
  203. # ping to .254 should be excluded from the tunnel (exception is in place).
  204. check_xfrm 0 254
  205. if [ $? -ne 0 ]; then
  206. echo "FAIL: expected ping to .254 to fail ($logpostfix)"
  207. lret=1
  208. else
  209. echo "PASS: ping to .254 bypassed ipsec tunnel ($logpostfix)"
  210. fi
  211. # ping to .253 should use use ipsec due to direct policy exception.
  212. check_xfrm 1 253
  213. if [ $? -ne 0 ]; then
  214. echo "FAIL: expected ping to .253 to use ipsec tunnel ($logpostfix)"
  215. lret=1
  216. else
  217. echo "PASS: direct policy matches ($logpostfix)"
  218. fi
  219. # ping to .2 should use ipsec.
  220. check_xfrm 1 2
  221. if [ $? -ne 0 ]; then
  222. echo "FAIL: expected ping to .2 to use ipsec tunnel ($logpostfix)"
  223. lret=1
  224. else
  225. echo "PASS: policy matches ($logpostfix)"
  226. fi
  227. return $lret
  228. }
  229. check_hthresh_repeat()
  230. {
  231. local log=$1
  232. i=0
  233. for i in $(seq 1 10);do
  234. ip -net ns1 xfrm policy update src e000:0001::0000 dst ff01::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
  235. ip -net ns1 xfrm policy set hthresh6 0 28 || break
  236. ip -net ns1 xfrm policy update src e000:0001::0000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
  237. ip -net ns1 xfrm policy set hthresh6 0 28 || break
  238. done
  239. if [ $i -ne 10 ] ;then
  240. echo "FAIL: $log" 1>&2
  241. ret=1
  242. return 1
  243. fi
  244. echo "PASS: $log"
  245. return 0
  246. }
  247. # insert non-overlapping policies in a random order and check that
  248. # all of them can be fetched using the traffic selectors.
  249. check_random_order()
  250. {
  251. local ns=$1
  252. local log=$2
  253. for i in $(seq 100); do
  254. ip -net $ns xfrm policy flush
  255. for j in $(seq 0 16 255 | sort -R); do
  256. ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow
  257. done
  258. for j in $(seq 0 16 255); do
  259. if ! ip -net $ns xfrm policy get dst $j.0.0.0/24 dir out > /dev/null; then
  260. echo "FAIL: $log" 1>&2
  261. return 1
  262. fi
  263. done
  264. done
  265. for i in $(seq 100); do
  266. ip -net $ns xfrm policy flush
  267. for j in $(seq 0 16 255 | sort -R); do
  268. local addr=$(printf "e000:0000:%02x00::/56" $j)
  269. ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
  270. done
  271. for j in $(seq 0 16 255); do
  272. local addr=$(printf "e000:0000:%02x00::/56" $j)
  273. if ! ip -net $ns xfrm policy get dst $addr dir out > /dev/null; then
  274. echo "FAIL: $log" 1>&2
  275. return 1
  276. fi
  277. done
  278. done
  279. ip -net $ns xfrm policy flush
  280. echo "PASS: $log"
  281. return 0
  282. }
  283. #check for needed privileges
  284. if [ "$(id -u)" -ne 0 ];then
  285. echo "SKIP: Need root privileges"
  286. exit $ksft_skip
  287. fi
  288. ip -Version 2>/dev/null >/dev/null
  289. if [ $? -ne 0 ];then
  290. echo "SKIP: Could not run test without the ip tool"
  291. exit $ksft_skip
  292. fi
  293. # needed to check if policy lookup got valid ipsec result
  294. iptables --version 2>/dev/null >/dev/null
  295. if [ $? -ne 0 ];then
  296. echo "SKIP: Could not run test without iptables tool"
  297. exit $ksft_skip
  298. fi
  299. for i in 1 2 3 4; do
  300. ip netns add ns$i
  301. ip -net ns$i link set lo up
  302. done
  303. DEV=veth0
  304. ip link add $DEV netns ns1 type veth peer name eth1 netns ns3
  305. ip link add $DEV netns ns2 type veth peer name eth1 netns ns4
  306. ip link add $DEV netns ns3 type veth peer name veth0 netns ns4
  307. DEV=veth0
  308. for i in 1 2; do
  309. ip -net ns$i link set $DEV up
  310. ip -net ns$i addr add 10.0.$i.2/24 dev $DEV
  311. ip -net ns$i addr add dead:$i::2/64 dev $DEV
  312. ip -net ns$i addr add 10.0.$i.253 dev $DEV
  313. ip -net ns$i addr add 10.0.$i.254 dev $DEV
  314. ip -net ns$i addr add dead:$i::fd dev $DEV
  315. ip -net ns$i addr add dead:$i::fe dev $DEV
  316. done
  317. for i in 3 4; do
  318. ip -net ns$i link set eth1 up
  319. ip -net ns$i link set veth0 up
  320. done
  321. ip -net ns1 route add default via 10.0.1.1
  322. ip -net ns2 route add default via 10.0.2.1
  323. ip -net ns3 addr add 10.0.1.1/24 dev eth1
  324. ip -net ns3 addr add 10.0.3.1/24 dev veth0
  325. ip -net ns3 addr add 2001:1::1/64 dev eth1
  326. ip -net ns3 addr add 2001:3::1/64 dev veth0
  327. ip -net ns3 route add default via 10.0.3.10
  328. ip -net ns4 addr add 10.0.2.1/24 dev eth1
  329. ip -net ns4 addr add 10.0.3.10/24 dev veth0
  330. ip -net ns4 addr add 2001:2::1/64 dev eth1
  331. ip -net ns4 addr add 2001:3::10/64 dev veth0
  332. ip -net ns4 route add default via 10.0.3.1
  333. for j in 4 6; do
  334. for i in 3 4;do
  335. ip netns exec ns$i sysctl net.ipv$j.conf.eth1.forwarding=1 > /dev/null
  336. ip netns exec ns$i sysctl net.ipv$j.conf.veth0.forwarding=1 > /dev/null
  337. done
  338. done
  339. # abuse iptables rule counter to check if ping matches a policy
  340. ip netns exec ns3 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
  341. ip netns exec ns4 iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
  342. if [ $? -ne 0 ];then
  343. echo "SKIP: Could not insert iptables rule"
  344. for i in 1 2 3 4;do ip netns del ns$i;done
  345. exit $ksft_skip
  346. fi
  347. # localip remoteip localnet remotenet
  348. do_esp ns3 10.0.3.1 10.0.3.10 10.0.1.0/24 10.0.2.0/24 $SPI1 $SPI2
  349. do_esp ns3 dead:3::1 dead:3::10 dead:1::/64 dead:2::/64 $SPI1 $SPI2
  350. do_esp ns4 10.0.3.10 10.0.3.1 10.0.2.0/24 10.0.1.0/24 $SPI2 $SPI1
  351. do_esp ns4 dead:3::10 dead:3::1 dead:2::/64 dead:1::/64 $SPI2 $SPI1
  352. do_dummies4 ns3
  353. do_dummies6 ns4
  354. do_esp_policy_get_check ns3 10.0.1.0/24 10.0.2.0/24
  355. do_esp_policy_get_check ns4 10.0.2.0/24 10.0.1.0/24
  356. do_esp_policy_get_check ns3 dead:1::/64 dead:2::/64
  357. do_esp_policy_get_check ns4 dead:2::/64 dead:1::/64
  358. # ping to .254 should use ipsec, exception is not installed.
  359. check_xfrm 1 254
  360. if [ $? -ne 0 ]; then
  361. echo "FAIL: expected ping to .254 to use ipsec tunnel"
  362. ret=1
  363. else
  364. echo "PASS: policy before exception matches"
  365. fi
  366. # installs exceptions
  367. # localip remoteip encryptdst plaindst
  368. do_exception ns3 10.0.3.1 10.0.3.10 10.0.2.253 10.0.2.240/28
  369. do_exception ns4 10.0.3.10 10.0.3.1 10.0.1.253 10.0.1.240/28
  370. do_exception ns3 dead:3::1 dead:3::10 dead:2::fd dead:2:f0::/96
  371. do_exception ns4 dead:3::10 dead:3::1 dead:1::fd dead:1:f0::/96
  372. check_exceptions "exceptions"
  373. if [ $? -ne 0 ]; then
  374. ret=1
  375. fi
  376. # insert block policies with adjacent/overlapping netmasks
  377. do_overlap ns3
  378. check_exceptions "exceptions and block policies"
  379. if [ $? -ne 0 ]; then
  380. ret=1
  381. fi
  382. for n in ns3 ns4;do
  383. ip -net $n xfrm policy set hthresh4 28 24 hthresh6 126 125
  384. sleep $((RANDOM%5))
  385. done
  386. check_exceptions "exceptions and block policies after hresh changes"
  387. # full flush of policy db, check everything gets freed incl. internal meta data
  388. ip -net ns3 xfrm policy flush
  389. do_esp_policy ns3 10.0.3.1 10.0.3.10 10.0.1.0/24 10.0.2.0/24
  390. do_exception ns3 10.0.3.1 10.0.3.10 10.0.2.253 10.0.2.240/28
  391. # move inexact policies to hash table
  392. ip -net ns3 xfrm policy set hthresh4 16 16
  393. sleep $((RANDOM%5))
  394. check_exceptions "exceptions and block policies after hthresh change in ns3"
  395. # restore original hthresh settings -- move policies back to tables
  396. for n in ns3 ns4;do
  397. ip -net $n xfrm policy set hthresh4 32 32 hthresh6 128 128
  398. sleep $((RANDOM%5))
  399. done
  400. check_exceptions "exceptions and block policies after htresh change to normal"
  401. check_hthresh_repeat "policies with repeated htresh change"
  402. check_random_order ns3 "policies inserted in random order"
  403. for i in 1 2 3 4;do ip netns del ns$i;done
  404. exit $ret