5 from scapy.layers.inet import IP, ICMP, TCP, UDP
6 from scapy.layers.ipsec import SecurityAssociation, ESP
7 from scapy.layers.l2 import Ether
8 from scapy.packet import Raw
9 from scapy.layers.inet6 import IPv6, ICMPv6EchoRequest, IPv6ExtHdrHopByHop, \
10 IPv6ExtHdrFragment, IPv6ExtHdrDestOpt
13 from framework import VppTestCase, VppTestRunner
14 from util import ppp, reassemble4, fragment_rfc791, fragment_rfc8200
15 from vpp_papi import VppEnum
18 class IPsecIPv4Params(object):
20 addr_type = socket.AF_INET
22 addr_bcast = "255.255.255.255"
27 self.remote_tun_if_host = '1.1.1.1'
28 self.remote_tun_if_host6 = '1111::1'
30 self.scapy_tun_sa_id = 10
31 self.scapy_tun_spi = 1001
32 self.vpp_tun_sa_id = 20
33 self.vpp_tun_spi = 1000
35 self.scapy_tra_sa_id = 30
36 self.scapy_tra_spi = 2001
37 self.vpp_tra_sa_id = 40
38 self.vpp_tra_spi = 2000
40 self.auth_algo_vpp_id = (VppEnum.vl_api_ipsec_integ_alg_t.
41 IPSEC_API_INTEG_ALG_SHA1_96)
42 self.auth_algo = 'HMAC-SHA1-96' # scapy name
43 self.auth_key = b'C91KUR9GYMm5GfkEvNjX'
45 self.crypt_algo_vpp_id = (VppEnum.vl_api_ipsec_crypto_alg_t.
46 IPSEC_API_CRYPTO_ALG_AES_CBC_128)
47 self.crypt_algo = 'AES-CBC' # scapy name
48 self.crypt_key = b'JPjyOWBeVEQiMe7h'
51 self.nat_header = None
54 class IPsecIPv6Params(object):
56 addr_type = socket.AF_INET6
58 addr_bcast = "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"
63 self.remote_tun_if_host = '1111:1111:1111:1111:1111:1111:1111:1111'
64 self.remote_tun_if_host4 = '1.1.1.1'
66 self.scapy_tun_sa_id = 50
67 self.scapy_tun_spi = 3001
68 self.vpp_tun_sa_id = 60
69 self.vpp_tun_spi = 3000
71 self.scapy_tra_sa_id = 70
72 self.scapy_tra_spi = 4001
73 self.vpp_tra_sa_id = 80
74 self.vpp_tra_spi = 4000
76 self.auth_algo_vpp_id = (VppEnum.vl_api_ipsec_integ_alg_t.
77 IPSEC_API_INTEG_ALG_SHA1_96)
78 self.auth_algo = 'HMAC-SHA1-96' # scapy name
79 self.auth_key = b'C91KUR9GYMm5GfkEvNjX'
81 self.crypt_algo_vpp_id = (VppEnum.vl_api_ipsec_crypto_alg_t.
82 IPSEC_API_CRYPTO_ALG_AES_CBC_128)
83 self.crypt_algo = 'AES-CBC' # scapy name
84 self.crypt_key = b'JPjyOWBeVEQiMe7h'
87 self.nat_header = None
90 def mk_scapy_crypt_key(p):
91 if p.crypt_algo == "AES-GCM":
92 return p.crypt_key + struct.pack("!I", p.salt)
97 def config_tun_params(p, encryption_type, tun_if):
98 ip_class_by_addr_type = {socket.AF_INET: IP, socket.AF_INET6: IPv6}
99 esn_en = bool(p.flags & (VppEnum.vl_api_ipsec_sad_flags_t.
100 IPSEC_API_SAD_FLAG_USE_ESN))
101 p.tun_dst = tun_if.remote_addr[p.addr_type]
102 p.tun_src = tun_if.local_addr[p.addr_type]
103 crypt_key = mk_scapy_crypt_key(p)
104 p.scapy_tun_sa = SecurityAssociation(
105 encryption_type, spi=p.vpp_tun_spi,
106 crypt_algo=p.crypt_algo,
108 auth_algo=p.auth_algo, auth_key=p.auth_key,
109 tunnel_header=ip_class_by_addr_type[p.addr_type](
112 nat_t_header=p.nat_header,
114 p.vpp_tun_sa = SecurityAssociation(
115 encryption_type, spi=p.scapy_tun_spi,
116 crypt_algo=p.crypt_algo,
118 auth_algo=p.auth_algo, auth_key=p.auth_key,
119 tunnel_header=ip_class_by_addr_type[p.addr_type](
122 nat_t_header=p.nat_header,
126 def config_tra_params(p, encryption_type):
127 esn_en = bool(p.flags & (VppEnum.vl_api_ipsec_sad_flags_t.
128 IPSEC_API_SAD_FLAG_USE_ESN))
129 crypt_key = mk_scapy_crypt_key(p)
130 p.scapy_tra_sa = SecurityAssociation(
133 crypt_algo=p.crypt_algo,
135 auth_algo=p.auth_algo,
137 nat_t_header=p.nat_header,
139 p.vpp_tra_sa = SecurityAssociation(
142 crypt_algo=p.crypt_algo,
144 auth_algo=p.auth_algo,
146 nat_t_header=p.nat_header,
150 class TemplateIpsec(VppTestCase):
155 |tra_if| <-------> |VPP|
160 ------ encrypt --- plain ---
161 |tun_if| <------- |VPP| <------ |pg1|
164 ------ decrypt --- plain ---
165 |tun_if| -------> |VPP| ------> |pg1|
171 def ipsec_select_backend(self):
172 """ empty method to be overloaded when necessary """
177 super(TemplateIpsec, cls).setUpClass()
180 def tearDownClass(cls):
181 super(TemplateIpsec, cls).tearDownClass()
183 def setup_params(self):
184 self.ipv4_params = IPsecIPv4Params()
185 self.ipv6_params = IPsecIPv6Params()
186 self.params = {self.ipv4_params.addr_type: self.ipv4_params,
187 self.ipv6_params.addr_type: self.ipv6_params}
189 def config_interfaces(self):
190 self.create_pg_interfaces(range(3))
191 self.interfaces = list(self.pg_interfaces)
192 for i in self.interfaces:
200 super(TemplateIpsec, self).setUp()
204 self.vpp_esp_protocol = (VppEnum.vl_api_ipsec_proto_t.
206 self.vpp_ah_protocol = (VppEnum.vl_api_ipsec_proto_t.
209 self.config_interfaces()
211 self.ipsec_select_backend()
213 def unconfig_interfaces(self):
214 for i in self.interfaces:
220 super(TemplateIpsec, self).tearDown()
222 self.unconfig_interfaces()
224 def show_commands_at_teardown(self):
225 self.logger.info(self.vapi.cli("show hardware"))
227 def gen_encrypt_pkts(self, sa, sw_intf, src, dst, count=1,
229 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
230 sa.encrypt(IP(src=src, dst=dst) /
231 ICMP() / Raw(b'X' * payload_size))
232 for i in range(count)]
234 def gen_encrypt_pkts6(self, sa, sw_intf, src, dst, count=1,
236 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
237 sa.encrypt(IPv6(src=src, dst=dst) /
238 ICMPv6EchoRequest(id=0, seq=1,
239 data='X' * payload_size))
240 for i in range(count)]
242 def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=54):
243 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
244 IP(src=src, dst=dst) / ICMP() / Raw(b'X' * payload_size)
245 for i in range(count)]
247 def gen_pkts6(self, sw_intf, src, dst, count=1, payload_size=54):
248 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
249 IPv6(src=src, dst=dst) /
250 ICMPv6EchoRequest(id=0, seq=1, data='X' * payload_size)
251 for i in range(count)]
254 class IpsecTcp(object):
255 def verify_tcp_checksum(self):
256 self.vapi.cli("test http server")
257 p = self.params[socket.AF_INET]
258 send = (Ether(src=self.tun_if.remote_mac, dst=self.tun_if.local_mac) /
259 p.scapy_tun_sa.encrypt(IP(src=p.remote_tun_if_host,
260 dst=self.tun_if.local_ip4) /
261 TCP(flags='S', dport=80)))
262 self.logger.debug(ppp("Sending packet:", send))
263 recv = self.send_and_expect(self.tun_if, [send], self.tun_if)
265 decrypted = p.vpp_tun_sa.decrypt(recv[IP])
266 self.assert_packet_checksums_valid(decrypted)
269 class IpsecTcpTests(IpsecTcp):
270 def test_tcp_checksum(self):
271 """ verify checksum correctness for vpp generated packets """
272 self.verify_tcp_checksum()
275 class IpsecTra4(object):
276 """ verify methods for Transport v4 """
277 def verify_tra_anti_replay(self):
278 p = self.params[socket.AF_INET]
279 esn_en = p.vpp_tra_sa.esn_en
281 seq_cycle_node_name = ('/err/%s/sequence number cycled' %
282 self.tra4_encrypt_node_name)
283 replay_node_name = ('/err/%s/SA replayed packet' %
284 self.tra4_decrypt_node_name)
285 if ESP == self.encryption_type and p.crypt_algo == "AES-GCM":
286 hash_failed_node_name = ('/err/%s/ESP decryption failed' %
287 self.tra4_decrypt_node_name)
289 hash_failed_node_name = ('/err/%s/Integrity check failed' %
290 self.tra4_decrypt_node_name)
291 replay_count = self.statistics.get_err_counter(replay_node_name)
292 hash_failed_count = self.statistics.get_err_counter(
293 hash_failed_node_name)
294 seq_cycle_count = self.statistics.get_err_counter(seq_cycle_node_name)
296 if ESP == self.encryption_type:
297 undersize_node_name = ('/err/%s/undersized packet' %
298 self.tra4_decrypt_node_name)
299 undersize_count = self.statistics.get_err_counter(
303 # send packets with seq numbers 1->34
304 # this means the window size is still in Case B (see RFC4303
307 # for reasons i haven't investigated Scapy won't create a packet with
310 pkts = [(Ether(src=self.tra_if.remote_mac,
311 dst=self.tra_if.local_mac) /
312 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
313 dst=self.tra_if.local_ip4) /
316 for seq in range(1, 34)]
317 recv_pkts = self.send_and_expect(self.tra_if, pkts, self.tra_if)
319 # replayed packets are dropped
320 self.send_and_assert_no_replies(self.tra_if, pkts)
321 replay_count += len(pkts)
322 self.assert_error_counter_equal(replay_node_name, replay_count)
325 # now send a batch of packets all with the same sequence number
326 # the first packet in the batch is legitimate, the rest bogus
328 pkts = (Ether(src=self.tra_if.remote_mac,
329 dst=self.tra_if.local_mac) /
330 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
331 dst=self.tra_if.local_ip4) /
334 recv_pkts = self.send_and_expect(self.tra_if, pkts * 8,
337 self.assert_error_counter_equal(replay_node_name, replay_count)
340 # now move the window over to 257 (more than one byte) and into Case A
342 pkt = (Ether(src=self.tra_if.remote_mac,
343 dst=self.tra_if.local_mac) /
344 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
345 dst=self.tra_if.local_ip4) /
348 recv_pkts = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
350 # replayed packets are dropped
351 self.send_and_assert_no_replies(self.tra_if, pkt * 3)
353 self.assert_error_counter_equal(replay_node_name, replay_count)
355 # the window size is 64 packets
356 # in window are still accepted
357 pkt = (Ether(src=self.tra_if.remote_mac,
358 dst=self.tra_if.local_mac) /
359 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
360 dst=self.tra_if.local_ip4) /
363 recv_pkts = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
365 # a packet that does not decrypt does not move the window forward
366 bogus_sa = SecurityAssociation(self.encryption_type,
368 crypt_algo=p.crypt_algo,
369 crypt_key=mk_scapy_crypt_key(p)[::-1],
370 auth_algo=p.auth_algo,
371 auth_key=p.auth_key[::-1])
372 pkt = (Ether(src=self.tra_if.remote_mac,
373 dst=self.tra_if.local_mac) /
374 bogus_sa.encrypt(IP(src=self.tra_if.remote_ip4,
375 dst=self.tra_if.local_ip4) /
378 self.send_and_assert_no_replies(self.tra_if, pkt * 17)
380 hash_failed_count += 17
381 self.assert_error_counter_equal(hash_failed_node_name,
384 # a malformed 'runt' packet
385 # created by a mis-constructed SA
386 if (ESP == self.encryption_type and p.crypt_algo != "NULL"):
387 bogus_sa = SecurityAssociation(self.encryption_type,
389 pkt = (Ether(src=self.tra_if.remote_mac,
390 dst=self.tra_if.local_mac) /
391 bogus_sa.encrypt(IP(src=self.tra_if.remote_ip4,
392 dst=self.tra_if.local_ip4) /
395 self.send_and_assert_no_replies(self.tra_if, pkt * 17)
397 undersize_count += 17
398 self.assert_error_counter_equal(undersize_node_name,
401 # which we can determine since this packet is still in the window
402 pkt = (Ether(src=self.tra_if.remote_mac,
403 dst=self.tra_if.local_mac) /
404 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
405 dst=self.tra_if.local_ip4) /
408 self.send_and_expect(self.tra_if, [pkt], self.tra_if)
411 # out of window are dropped
412 # this is Case B. So VPP will consider this to be a high seq num wrap
413 # and so the decrypt attempt will fail
415 pkt = (Ether(src=self.tra_if.remote_mac,
416 dst=self.tra_if.local_mac) /
417 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
418 dst=self.tra_if.local_ip4) /
421 self.send_and_assert_no_replies(self.tra_if, pkt * 17)
424 # an out of window error with ESN looks like a high sequence
425 # wrap. but since it isn't then the verify will fail.
426 hash_failed_count += 17
427 self.assert_error_counter_equal(hash_failed_node_name,
432 self.assert_error_counter_equal(replay_node_name,
435 # valid packet moves the window over to 258
436 pkt = (Ether(src=self.tra_if.remote_mac,
437 dst=self.tra_if.local_mac) /
438 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
439 dst=self.tra_if.local_ip4) /
442 rx = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
443 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
446 # move VPP's SA TX seq-num to just before the seq-number wrap.
447 # then fire in a packet that VPP should drop on TX because it
448 # causes the TX seq number to wrap; unless we're using extened sequence
451 self.vapi.cli("test ipsec sa %d seq 0xffffffff" % p.scapy_tra_sa_id)
452 self.logger.info(self.vapi.ppcli("show ipsec sa 0"))
453 self.logger.info(self.vapi.ppcli("show ipsec sa 1"))
455 pkts = [(Ether(src=self.tra_if.remote_mac,
456 dst=self.tra_if.local_mac) /
457 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
458 dst=self.tra_if.local_ip4) /
461 for seq in range(259, 280)]
464 rxs = self.send_and_expect(self.tra_if, pkts, self.tra_if)
467 # in order for scapy to decrypt its SA's high order number needs
470 p.vpp_tra_sa.seq_num = 0x100000000
472 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
475 # wrap scapy's TX high sequence number. VPP is in case B, so it
476 # will consider this a high seq wrap also.
477 # The low seq num we set it to will place VPP's RX window in Case A
479 p.scapy_tra_sa.seq_num = 0x100000005
480 pkt = (Ether(src=self.tra_if.remote_mac,
481 dst=self.tra_if.local_mac) /
482 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
483 dst=self.tra_if.local_ip4) /
485 seq_num=0x100000005))
486 rx = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
487 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
490 # A packet that has seq num between (2^32-64) and 5 is within
493 p.scapy_tra_sa.seq_num = 0xfffffffd
494 pkt = (Ether(src=self.tra_if.remote_mac,
495 dst=self.tra_if.local_mac) /
496 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
497 dst=self.tra_if.local_ip4) /
500 rx = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
501 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
504 # While in case A we cannot wrap the high sequence number again
505 # becuase VPP will consider this packet to be one that moves the
508 pkt = (Ether(src=self.tra_if.remote_mac,
509 dst=self.tra_if.local_mac) /
510 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
511 dst=self.tra_if.local_ip4) /
513 seq_num=0x200000999))
514 self.send_and_assert_no_replies(self.tra_if, [pkt], self.tra_if)
516 hash_failed_count += 1
517 self.assert_error_counter_equal(hash_failed_node_name,
521 # but if we move the wondow forward to case B, then we can wrap
524 p.scapy_tra_sa.seq_num = 0x100000555
525 pkt = (Ether(src=self.tra_if.remote_mac,
526 dst=self.tra_if.local_mac) /
527 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
528 dst=self.tra_if.local_ip4) /
530 seq_num=0x100000555))
531 rx = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
532 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
534 p.scapy_tra_sa.seq_num = 0x200000444
535 pkt = (Ether(src=self.tra_if.remote_mac,
536 dst=self.tra_if.local_mac) /
537 p.scapy_tra_sa.encrypt(IP(src=self.tra_if.remote_ip4,
538 dst=self.tra_if.local_ip4) /
540 seq_num=0x200000444))
541 rx = self.send_and_expect(self.tra_if, [pkt], self.tra_if)
542 decrypted = p.vpp_tra_sa.decrypt(rx[0][IP])
546 # without ESN TX sequence numbers can't wrap and packets are
547 # dropped from here on out.
549 self.send_and_assert_no_replies(self.tra_if, pkts)
550 seq_cycle_count += len(pkts)
551 self.assert_error_counter_equal(seq_cycle_node_name,
554 # move the security-associations seq number on to the last we used
555 self.vapi.cli("test ipsec sa %d seq 0x15f" % p.scapy_tra_sa_id)
556 p.scapy_tra_sa.seq_num = 351
557 p.vpp_tra_sa.seq_num = 351
559 def verify_tra_basic4(self, count=1):
560 """ ipsec v4 transport basic test """
561 self.vapi.cli("clear errors")
562 self.vapi.cli("clear ipsec sa")
564 p = self.params[socket.AF_INET]
565 send_pkts = self.gen_encrypt_pkts(p.scapy_tra_sa, self.tra_if,
566 src=self.tra_if.remote_ip4,
567 dst=self.tra_if.local_ip4,
569 recv_pkts = self.send_and_expect(self.tra_if, send_pkts,
572 self.assertEqual(len(rx) - len(Ether()), rx[IP].len)
573 self.assert_packet_checksums_valid(rx)
575 decrypted = p.vpp_tra_sa.decrypt(rx[IP])
576 self.assert_packet_checksums_valid(decrypted)
578 self.logger.debug(ppp("Unexpected packet:", rx))
581 self.logger.info(self.vapi.ppcli("show error"))
582 self.logger.info(self.vapi.ppcli("show ipsec all"))
584 pkts = p.tra_sa_in.get_stats()['packets']
585 self.assertEqual(pkts, count,
586 "incorrect SA in counts: expected %d != %d" %
588 pkts = p.tra_sa_out.get_stats()['packets']
589 self.assertEqual(pkts, count,
590 "incorrect SA out counts: expected %d != %d" %
593 self.assert_packet_counter_equal(self.tra4_encrypt_node_name, count)
594 self.assert_packet_counter_equal(self.tra4_decrypt_node_name, count)
597 class IpsecTra4Tests(IpsecTra4):
598 """ UT test methods for Transport v4 """
599 def test_tra_anti_replay(self):
600 """ ipsec v4 transport anti-reply test """
601 self.verify_tra_anti_replay()
603 def test_tra_basic(self, count=1):
604 """ ipsec v4 transport basic test """
605 self.verify_tra_basic4(count=1)
607 def test_tra_burst(self):
608 """ ipsec v4 transport burst test """
609 self.verify_tra_basic4(count=257)
612 class IpsecTra6(object):
613 """ verify methods for Transport v6 """
614 def verify_tra_basic6(self, count=1):
615 self.vapi.cli("clear errors")
617 p = self.params[socket.AF_INET6]
618 send_pkts = self.gen_encrypt_pkts6(p.scapy_tra_sa, self.tra_if,
619 src=self.tra_if.remote_ip6,
620 dst=self.tra_if.local_ip6,
622 recv_pkts = self.send_and_expect(self.tra_if, send_pkts,
625 self.assertEqual(len(rx) - len(Ether()) - len(IPv6()),
628 decrypted = p.vpp_tra_sa.decrypt(rx[IPv6])
629 self.assert_packet_checksums_valid(decrypted)
631 self.logger.debug(ppp("Unexpected packet:", rx))
634 self.logger.info(self.vapi.ppcli("show error"))
635 self.logger.info(self.vapi.ppcli("show ipsec all"))
637 pkts = p.tra_sa_in.get_stats()['packets']
638 self.assertEqual(pkts, count,
639 "incorrect SA in counts: expected %d != %d" %
641 pkts = p.tra_sa_out.get_stats()['packets']
642 self.assertEqual(pkts, count,
643 "incorrect SA out counts: expected %d != %d" %
645 self.assert_packet_counter_equal(self.tra6_encrypt_node_name, count)
646 self.assert_packet_counter_equal(self.tra6_decrypt_node_name, count)
648 def gen_encrypt_pkts_ext_hdrs6(self, sa, sw_intf, src, dst, count=1,
650 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
651 sa.encrypt(IPv6(src=src, dst=dst) /
652 ICMPv6EchoRequest(id=0, seq=1,
653 data='X' * payload_size))
654 for i in range(count)]
656 def gen_pkts_ext_hdrs6(self, sw_intf, src, dst, count=1, payload_size=54):
657 return [Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) /
658 IPv6(src=src, dst=dst) /
659 IPv6ExtHdrHopByHop() /
660 IPv6ExtHdrFragment(id=2, offset=200) /
662 for i in range(count)]
664 def verify_tra_encrypted6(self, p, sa, rxs):
667 self.assert_packet_checksums_valid(rx)
669 decrypt_pkt = p.vpp_tra_sa.decrypt(rx[IPv6])
670 decrypted.append(decrypt_pkt)
671 self.assert_equal(decrypt_pkt.src, self.tra_if.local_ip6)
672 self.assert_equal(decrypt_pkt.dst, self.tra_if.remote_ip6)
674 self.logger.debug(ppp("Unexpected packet:", rx))
676 self.logger.debug(ppp("Decrypted packet:", decrypt_pkt))
682 def verify_tra_66_ext_hdrs(self, p):
686 # check we can decrypt with options
688 tx = self.gen_encrypt_pkts_ext_hdrs6(p.scapy_tra_sa, self.tra_if,
689 src=self.tra_if.remote_ip6,
690 dst=self.tra_if.local_ip6,
692 self.send_and_expect(self.tra_if, tx, self.tra_if)
695 # injecting a packet from ourselves to be routed of box is a hack
696 # but it matches an outbout policy, alors je ne regrette rien
699 # one extension before ESP
700 tx = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) /
701 IPv6(src=self.tra_if.local_ip6,
702 dst=self.tra_if.remote_ip6) /
703 IPv6ExtHdrFragment(id=2, offset=200) /
706 rxs = self.send_and_expect(self.pg2, [tx], self.tra_if)
707 dcs = self.verify_tra_encrypted6(p, p.vpp_tra_sa, rxs)
710 # for reasons i'm not going to investigate scapy does not
711 # created the correct headers after decrypt. but reparsing
712 # the ipv6 packet fixes it
713 dc = IPv6(raw(dc[IPv6]))
714 self.assert_equal(dc[IPv6ExtHdrFragment].id, 2)
716 # two extensions before ESP
717 tx = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) /
718 IPv6(src=self.tra_if.local_ip6,
719 dst=self.tra_if.remote_ip6) /
720 IPv6ExtHdrHopByHop() /
721 IPv6ExtHdrFragment(id=2, offset=200) /
724 rxs = self.send_and_expect(self.pg2, [tx], self.tra_if)
725 dcs = self.verify_tra_encrypted6(p, p.vpp_tra_sa, rxs)
728 dc = IPv6(raw(dc[IPv6]))
729 self.assertTrue(dc[IPv6ExtHdrHopByHop])
730 self.assert_equal(dc[IPv6ExtHdrFragment].id, 2)
732 # two extensions before ESP, one after
733 tx = (Ether(src=self.pg2.remote_mac, dst=self.pg2.local_mac) /
734 IPv6(src=self.tra_if.local_ip6,
735 dst=self.tra_if.remote_ip6) /
736 IPv6ExtHdrHopByHop() /
737 IPv6ExtHdrFragment(id=2, offset=200) /
738 IPv6ExtHdrDestOpt() /
741 rxs = self.send_and_expect(self.pg2, [tx], self.tra_if)
742 dcs = self.verify_tra_encrypted6(p, p.vpp_tra_sa, rxs)
745 dc = IPv6(raw(dc[IPv6]))
746 self.assertTrue(dc[IPv6ExtHdrDestOpt])
747 self.assertTrue(dc[IPv6ExtHdrHopByHop])
748 self.assert_equal(dc[IPv6ExtHdrFragment].id, 2)
751 class IpsecTra6Tests(IpsecTra6):
752 """ UT test methods for Transport v6 """
753 def test_tra_basic6(self):
754 """ ipsec v6 transport basic test """
755 self.verify_tra_basic6(count=1)
757 def test_tra_burst6(self):
758 """ ipsec v6 transport burst test """
759 self.verify_tra_basic6(count=257)
762 class IpsecTra6ExtTests(IpsecTra6):
763 def test_tra_ext_hdrs_66(self):
764 """ ipsec 6o6 tra extension headers test """
765 self.verify_tra_66_ext_hdrs(self.params[socket.AF_INET6])
768 class IpsecTra46Tests(IpsecTra4Tests, IpsecTra6Tests):
769 """ UT test methods for Transport v6 and v4"""
773 class IpsecTun4(object):
774 """ verify methods for Tunnel v4 """
775 def verify_counters4(self, p, count, n_frags=None, worker=None):
778 if (hasattr(p, "spd_policy_in_any")):
779 pkts = p.spd_policy_in_any.get_stats(worker)['packets']
780 self.assertEqual(pkts, count,
781 "incorrect SPD any policy: expected %d != %d" %
784 if (hasattr(p, "tun_sa_in")):
785 pkts = p.tun_sa_in.get_stats(worker)['packets']
786 self.assertEqual(pkts, count,
787 "incorrect SA in counts: expected %d != %d" %
789 pkts = p.tun_sa_out.get_stats(worker)['packets']
790 self.assertEqual(pkts, count,
791 "incorrect SA out counts: expected %d != %d" %
794 self.assert_packet_counter_equal(self.tun4_encrypt_node_name, n_frags)
795 self.assert_packet_counter_equal(self.tun4_decrypt_node_name, count)
797 def verify_decrypted(self, p, rxs):
799 self.assert_equal(rx[IP].src, p.remote_tun_if_host)
800 self.assert_equal(rx[IP].dst, self.pg1.remote_ip4)
801 self.assert_packet_checksums_valid(rx)
803 def verify_encrypted(self, p, sa, rxs):
807 self.assertEqual(rx[UDP].dport, 4500)
808 self.assert_packet_checksums_valid(rx)
809 self.assertEqual(len(rx) - len(Ether()), rx[IP].len)
811 decrypt_pkt = p.vpp_tun_sa.decrypt(rx[IP])
812 if not decrypt_pkt.haslayer(IP):
813 decrypt_pkt = IP(decrypt_pkt[Raw].load)
814 decrypt_pkts.append(decrypt_pkt)
815 self.assert_equal(decrypt_pkt.src, self.pg1.remote_ip4)
816 self.assert_equal(decrypt_pkt.dst, p.remote_tun_if_host)
818 self.logger.debug(ppp("Unexpected packet:", rx))
820 self.logger.debug(ppp("Decrypted packet:", decrypt_pkt))
824 pkts = reassemble4(decrypt_pkts)
826 self.assert_packet_checksums_valid(pkt)
828 def verify_tun_44(self, p, count=1, payload_size=64, n_rx=None):
829 self.vapi.cli("clear errors")
830 self.vapi.cli("clear ipsec counters")
834 send_pkts = self.gen_encrypt_pkts(p.scapy_tun_sa, self.tun_if,
835 src=p.remote_tun_if_host,
836 dst=self.pg1.remote_ip4,
838 recv_pkts = self.send_and_expect(self.tun_if, send_pkts, self.pg1)
839 self.verify_decrypted(p, recv_pkts)
841 send_pkts = self.gen_pkts(self.pg1, src=self.pg1.remote_ip4,
842 dst=p.remote_tun_if_host, count=count,
843 payload_size=payload_size)
844 recv_pkts = self.send_and_expect(self.pg1, send_pkts,
846 self.verify_encrypted(p, p.vpp_tun_sa, recv_pkts)
849 self.assertEqual(rx[IP].src, p.tun_src)
850 self.assertEqual(rx[IP].dst, p.tun_dst)
853 self.logger.info(self.vapi.ppcli("show error"))
854 self.logger.info(self.vapi.ppcli("show ipsec all"))
856 self.logger.info(self.vapi.ppcli("show ipsec sa 0"))
857 self.logger.info(self.vapi.ppcli("show ipsec sa 4"))
858 self.verify_counters4(p, count, n_rx)
860 """ verify methods for Transport v4 """
861 def verify_tun_44_bad_packet_sizes(self, p):
862 # with a buffer size of 2048, 1989 bytes of payload
863 # means there isn't space to insert the ESP header
865 for p_siz in [1989, 8500]:
866 send_pkts = self.gen_encrypt_pkts(p.scapy_tun_sa, self.tun_if,
867 src=p.remote_tun_if_host,
868 dst=self.pg1.remote_ip4,
871 self.send_and_assert_no_replies(self.tun_if, send_pkts)
872 send_pkts = self.gen_pkts(self.pg1, src=self.pg1.remote_ip4,
873 dst=p.remote_tun_if_host, count=N_PKTS,
875 self.send_and_assert_no_replies(self.pg1, send_pkts,
878 # both large packets on decrpyt count against chained buffers
879 # the 9000 bytes one does on encrypt
880 self.assertEqual(2 * N_PKTS,
881 self.statistics.get_err_counter(
882 '/err/%s/chained buffers (packet dropped)' %
883 self.tun4_decrypt_node_name))
884 self.assertEqual(N_PKTS,
885 self.statistics.get_err_counter(
886 '/err/%s/chained buffers (packet dropped)' %
887 self.tun4_encrypt_node_name))
889 # on encrypt the 1989 size is no trailer space
890 self.assertEqual(N_PKTS,
891 self.statistics.get_err_counter(
892 '/err/%s/no trailer space (packet dropped)' %
893 self.tun4_encrypt_node_name))
895 def verify_tun_reass_44(self, p):
896 self.vapi.cli("clear errors")
897 self.vapi.ip_reassembly_enable_disable(
898 sw_if_index=self.tun_if.sw_if_index, enable_ip4=True)
901 send_pkts = self.gen_encrypt_pkts(p.scapy_tun_sa, self.tun_if,
902 src=p.remote_tun_if_host,
903 dst=self.pg1.remote_ip4,
906 send_pkts = fragment_rfc791(send_pkts[0], 1400)
907 recv_pkts = self.send_and_expect(self.tun_if, send_pkts,
909 self.verify_decrypted(p, recv_pkts)
911 send_pkts = self.gen_pkts(self.pg1, src=self.pg1.remote_ip4,
912 dst=p.remote_tun_if_host, count=1)
913 recv_pkts = self.send_and_expect(self.pg1, send_pkts,
915 self.verify_encrypted(p, p.vpp_tun_sa, recv_pkts)
918 self.logger.info(self.vapi.ppcli("show error"))
919 self.logger.info(self.vapi.ppcli("show ipsec all"))
921 self.verify_counters4(p, 1, 1)
922 self.vapi.ip_reassembly_enable_disable(
923 sw_if_index=self.tun_if.sw_if_index, enable_ip4=False)
925 def verify_tun_64(self, p, count=1):
926 self.vapi.cli("clear errors")
928 send_pkts = self.gen_encrypt_pkts6(p.scapy_tun_sa, self.tun_if,
929 src=p.remote_tun_if_host6,
930 dst=self.pg1.remote_ip6,
932 recv_pkts = self.send_and_expect(self.tun_if, send_pkts, self.pg1)
933 for recv_pkt in recv_pkts:
934 self.assert_equal(recv_pkt[IPv6].src, p.remote_tun_if_host6)
935 self.assert_equal(recv_pkt[IPv6].dst, self.pg1.remote_ip6)
936 self.assert_packet_checksums_valid(recv_pkt)
937 send_pkts = self.gen_pkts6(self.pg1, src=self.pg1.remote_ip6,
938 dst=p.remote_tun_if_host6, count=count)
939 recv_pkts = self.send_and_expect(self.pg1, send_pkts, self.tun_if)
940 for recv_pkt in recv_pkts:
942 decrypt_pkt = p.vpp_tun_sa.decrypt(recv_pkt[IP])
943 if not decrypt_pkt.haslayer(IPv6):
944 decrypt_pkt = IPv6(decrypt_pkt[Raw].load)
945 self.assert_equal(decrypt_pkt.src, self.pg1.remote_ip6)
946 self.assert_equal(decrypt_pkt.dst, p.remote_tun_if_host6)
947 self.assert_packet_checksums_valid(decrypt_pkt)
949 self.logger.error(ppp("Unexpected packet:", recv_pkt))
952 ppp("Decrypted packet:", decrypt_pkt))
957 self.logger.info(self.vapi.ppcli("show error"))
958 self.logger.info(self.vapi.ppcli("show ipsec all"))
960 self.verify_counters4(p, count)
962 def verify_keepalive(self, p):
963 pkt = (Ether(src=self.tun_if.remote_mac, dst=self.tun_if.local_mac) /
964 IP(src=p.remote_tun_if_host, dst=self.tun_if.local_ip4) /
965 UDP(sport=333, dport=4500) /
967 self.send_and_assert_no_replies(self.tun_if, pkt*31)
968 self.assert_error_counter_equal(
969 '/err/%s/NAT Keepalive' % self.tun4_input_node, 31)
971 pkt = (Ether(src=self.tun_if.remote_mac, dst=self.tun_if.local_mac) /
972 IP(src=p.remote_tun_if_host, dst=self.tun_if.local_ip4) /
973 UDP(sport=333, dport=4500) /
975 self.send_and_assert_no_replies(self.tun_if, pkt*31)
976 self.assert_error_counter_equal(
977 '/err/%s/Too Short' % self.tun4_input_node, 31)
980 class IpsecTun4Tests(IpsecTun4):
981 """ UT test methods for Tunnel v4 """
982 def test_tun_basic44(self):
983 """ ipsec 4o4 tunnel basic test """
984 self.verify_tun_44(self.params[socket.AF_INET], count=1)
985 self.tun_if.admin_down()
986 self.tun_if.resolve_arp()
987 self.tun_if.admin_up()
988 self.verify_tun_44(self.params[socket.AF_INET], count=1)
990 def test_tun_reass_basic44(self):
991 """ ipsec 4o4 tunnel basic reassembly test """
992 self.verify_tun_reass_44(self.params[socket.AF_INET])
994 def test_tun_burst44(self):
995 """ ipsec 4o4 tunnel burst test """
996 self.verify_tun_44(self.params[socket.AF_INET], count=127)
999 class IpsecTunEsp4Tests(IpsecTun4):
1000 def test_tun_bad_packet_sizes(self):
1001 """ ipsec v4 tunnel bad packet size """
1002 self.verify_tun_44_bad_packet_sizes(self.params[socket.AF_INET])
1005 class IpsecTun6(object):
1006 """ verify methods for Tunnel v6 """
1007 def verify_counters6(self, p_in, p_out, count, worker=None):
1008 if (hasattr(p_in, "tun_sa_in")):
1009 pkts = p_in.tun_sa_in.get_stats(worker)['packets']
1010 self.assertEqual(pkts, count,
1011 "incorrect SA in counts: expected %d != %d" %
1013 if (hasattr(p_out, "tun_sa_out")):
1014 pkts = p_out.tun_sa_out.get_stats(worker)['packets']
1015 self.assertEqual(pkts, count,
1016 "incorrect SA out counts: expected %d != %d" %
1018 self.assert_packet_counter_equal(self.tun6_encrypt_node_name, count)
1019 self.assert_packet_counter_equal(self.tun6_decrypt_node_name, count)
1021 def verify_decrypted6(self, p, rxs):
1023 self.assert_equal(rx[IPv6].src, p.remote_tun_if_host)
1024 self.assert_equal(rx[IPv6].dst, self.pg1.remote_ip6)
1025 self.assert_packet_checksums_valid(rx)
1027 def verify_encrypted6(self, p, sa, rxs):
1029 self.assert_packet_checksums_valid(rx)
1030 self.assertEqual(len(rx) - len(Ether()) - len(IPv6()),
1033 decrypt_pkt = p.vpp_tun_sa.decrypt(rx[IPv6])
1034 if not decrypt_pkt.haslayer(IPv6):
1035 decrypt_pkt = IPv6(decrypt_pkt[Raw].load)
1036 self.assert_packet_checksums_valid(decrypt_pkt)
1037 self.assert_equal(decrypt_pkt.src, self.pg1.remote_ip6)
1038 self.assert_equal(decrypt_pkt.dst, p.remote_tun_if_host)
1040 self.logger.debug(ppp("Unexpected packet:", rx))
1042 self.logger.debug(ppp("Decrypted packet:", decrypt_pkt))
1047 def verify_drop_tun_66(self, p_in, count=1, payload_size=64):
1048 self.vapi.cli("clear errors")
1049 self.vapi.cli("clear ipsec sa")
1051 send_pkts = self.gen_encrypt_pkts6(p_in.scapy_tun_sa, self.tun_if,
1052 src=p_in.remote_tun_if_host,
1053 dst=self.pg1.remote_ip6,
1055 self.send_and_assert_no_replies(self.tun_if, send_pkts)
1056 self.logger.info(self.vapi.cli("sh punt stats"))
1058 def verify_tun_66(self, p_in, p_out=None, count=1, payload_size=64):
1059 self.vapi.cli("clear errors")
1060 self.vapi.cli("clear ipsec sa")
1064 send_pkts = self.gen_encrypt_pkts6(p_in.scapy_tun_sa, self.tun_if,
1065 src=p_in.remote_tun_if_host,
1066 dst=self.pg1.remote_ip6,
1068 recv_pkts = self.send_and_expect(self.tun_if, send_pkts, self.pg1)
1069 self.verify_decrypted6(p_in, recv_pkts)
1071 send_pkts = self.gen_pkts6(self.pg1, src=self.pg1.remote_ip6,
1072 dst=p_out.remote_tun_if_host,
1074 payload_size=payload_size)
1075 recv_pkts = self.send_and_expect(self.pg1, send_pkts, self.tun_if)
1076 self.verify_encrypted6(p_out, p_out.vpp_tun_sa, recv_pkts)
1078 for rx in recv_pkts:
1079 self.assertEqual(rx[IPv6].src, p_out.tun_src)
1080 self.assertEqual(rx[IPv6].dst, p_out.tun_dst)
1083 self.logger.info(self.vapi.ppcli("show error"))
1084 self.logger.info(self.vapi.ppcli("show ipsec all"))
1085 self.verify_counters6(p_in, p_out, count)
1087 def verify_tun_reass_66(self, p):
1088 self.vapi.cli("clear errors")
1089 self.vapi.ip_reassembly_enable_disable(
1090 sw_if_index=self.tun_if.sw_if_index, enable_ip6=True)
1093 send_pkts = self.gen_encrypt_pkts6(p.scapy_tun_sa, self.tun_if,
1094 src=p.remote_tun_if_host,
1095 dst=self.pg1.remote_ip6,
1098 send_pkts = fragment_rfc8200(send_pkts[0], 1, 1400, self.logger)
1099 recv_pkts = self.send_and_expect(self.tun_if, send_pkts,
1101 self.verify_decrypted6(p, recv_pkts)
1103 send_pkts = self.gen_pkts6(self.pg1, src=self.pg1.remote_ip6,
1104 dst=p.remote_tun_if_host,
1107 recv_pkts = self.send_and_expect(self.pg1, send_pkts,
1109 self.verify_encrypted6(p, p.vpp_tun_sa, recv_pkts)
1111 self.logger.info(self.vapi.ppcli("show error"))
1112 self.logger.info(self.vapi.ppcli("show ipsec all"))
1113 self.verify_counters6(p, p, 1)
1114 self.vapi.ip_reassembly_enable_disable(
1115 sw_if_index=self.tun_if.sw_if_index, enable_ip6=False)
1117 def verify_tun_46(self, p, count=1):
1118 """ ipsec 4o6 tunnel basic test """
1119 self.vapi.cli("clear errors")
1121 send_pkts = self.gen_encrypt_pkts(p.scapy_tun_sa, self.tun_if,
1122 src=p.remote_tun_if_host4,
1123 dst=self.pg1.remote_ip4,
1125 recv_pkts = self.send_and_expect(self.tun_if, send_pkts, self.pg1)
1126 for recv_pkt in recv_pkts:
1127 self.assert_equal(recv_pkt[IP].src, p.remote_tun_if_host4)
1128 self.assert_equal(recv_pkt[IP].dst, self.pg1.remote_ip4)
1129 self.assert_packet_checksums_valid(recv_pkt)
1130 send_pkts = self.gen_pkts(self.pg1, src=self.pg1.remote_ip4,
1131 dst=p.remote_tun_if_host4,
1133 recv_pkts = self.send_and_expect(self.pg1, send_pkts, self.tun_if)
1134 for recv_pkt in recv_pkts:
1136 decrypt_pkt = p.vpp_tun_sa.decrypt(recv_pkt[IPv6])
1137 if not decrypt_pkt.haslayer(IP):
1138 decrypt_pkt = IP(decrypt_pkt[Raw].load)
1139 self.assert_equal(decrypt_pkt.src, self.pg1.remote_ip4)
1140 self.assert_equal(decrypt_pkt.dst, p.remote_tun_if_host4)
1141 self.assert_packet_checksums_valid(decrypt_pkt)
1143 self.logger.debug(ppp("Unexpected packet:", recv_pkt))
1145 self.logger.debug(ppp("Decrypted packet:",
1151 self.logger.info(self.vapi.ppcli("show error"))
1152 self.logger.info(self.vapi.ppcli("show ipsec all"))
1153 self.verify_counters6(p, p, count)
1156 class IpsecTun6Tests(IpsecTun6):
1157 """ UT test methods for Tunnel v6 """
1159 def test_tun_basic66(self):
1160 """ ipsec 6o6 tunnel basic test """
1161 self.verify_tun_66(self.params[socket.AF_INET6], count=1)
1163 def test_tun_reass_basic66(self):
1164 """ ipsec 6o6 tunnel basic reassembly test """
1165 self.verify_tun_reass_66(self.params[socket.AF_INET6])
1167 def test_tun_burst66(self):
1168 """ ipsec 6o6 tunnel burst test """
1169 self.verify_tun_66(self.params[socket.AF_INET6], count=257)
1172 class IpsecTun6HandoffTests(IpsecTun6):
1173 """ UT test methods for Tunnel v6 with multiple workers """
1174 worker_config = "workers 2"
1176 def test_tun_handoff_66(self):
1177 """ ipsec 6o6 tunnel worker hand-off test """
1179 p = self.params[socket.AF_INET6]
1181 # inject alternately on worker 0 and 1. all counts on the SA
1182 # should be against worker 0
1183 for worker in [0, 1, 0, 1]:
1184 send_pkts = self.gen_encrypt_pkts6(p.scapy_tun_sa, self.tun_if,
1185 src=p.remote_tun_if_host,
1186 dst=self.pg1.remote_ip6,
1188 recv_pkts = self.send_and_expect(self.tun_if, send_pkts,
1189 self.pg1, worker=worker)
1190 self.verify_decrypted6(p, recv_pkts)
1192 send_pkts = self.gen_pkts6(self.pg1, src=self.pg1.remote_ip6,
1193 dst=p.remote_tun_if_host,
1195 recv_pkts = self.send_and_expect(self.pg1, send_pkts,
1196 self.tun_if, worker=worker)
1197 self.verify_encrypted6(p, p.vpp_tun_sa, recv_pkts)
1199 # all counts against the first worker that was used
1200 self.verify_counters6(p, p, 4*N_PKTS, worker=0)
1203 class IpsecTun4HandoffTests(IpsecTun4):
1204 """ UT test methods for Tunnel v4 with multiple workers """
1205 worker_config = "workers 2"
1207 def test_tun_handooff_44(self):
1208 """ ipsec 4o4 tunnel worker hand-off test """
1210 p = self.params[socket.AF_INET]
1212 # inject alternately on worker 0 and 1. all counts on the SA
1213 # should be against worker 0
1214 for worker in [0, 1, 0, 1]:
1215 send_pkts = self.gen_encrypt_pkts(p.scapy_tun_sa, self.tun_if,
1216 src=p.remote_tun_if_host,
1217 dst=self.pg1.remote_ip4,
1219 recv_pkts = self.send_and_expect(self.tun_if, send_pkts,
1220 self.pg1, worker=worker)
1221 self.verify_decrypted(p, recv_pkts)
1223 send_pkts = self.gen_pkts(self.pg1, src=self.pg1.remote_ip4,
1224 dst=p.remote_tun_if_host,
1226 recv_pkts = self.send_and_expect(self.pg1, send_pkts,
1227 self.tun_if, worker=worker)
1228 self.verify_encrypted(p, p.vpp_tun_sa, recv_pkts)
1230 # all counts against the first worker that was used
1231 self.verify_counters4(p, 4*N_PKTS, worker=0)
1234 class IpsecTun46Tests(IpsecTun4Tests, IpsecTun6Tests):
1235 """ UT test methods for Tunnel v6 & v4 """
1239 if __name__ == '__main__':
1240 unittest.main(testRunner=VppTestRunner)