4 from socket import AF_INET6
6 from framework import VppTestCase, VppTestRunner
7 from vpp_sub_interface import VppSubInterface, VppDot1QSubint
8 from vpp_pg_interface import is_ipv6_misc
9 from vpp_neighbor import find_nbr
10 from vpp_ip_route import VppIpRoute, VppRoutePath
12 from scapy.packet import Raw
13 from scapy.layers.l2 import Ether, Dot1Q
14 from scapy.layers.inet6 import IPv6, UDP, ICMPv6ND_NS, ICMPv6ND_RS, \
15 ICMPv6ND_RA, ICMPv6NDOptSrcLLAddr, getmacbyip6, ICMPv6MRD_Solicitation, \
16 ICMPv6NDOptMTU, ICMPv6NDOptSrcLLAddr, ICMPv6NDOptPrefixInfo, \
17 ICMPv6ND_NA, ICMPv6NDOptDstLLAddr, ICMPv6DestUnreach, icmp6types
20 from scapy.utils6 import in6_getnsma, in6_getnsmac, in6_ptop, in6_islladdr, \
21 in6_mactoifaceid, in6_ismaddr
22 from scapy.utils import inet_pton, inet_ntop
26 euid = in6_mactoifaceid(mac)
27 addr = "fe80::" + euid
31 class TestIPv6ND(VppTestCase):
32 def validate_ra(self, intf, rx, dst_ip=None):
34 dst_ip = intf.remote_ip6
36 # unicasted packets must come to the unicast mac
37 self.assertEqual(rx[Ether].dst, intf.remote_mac)
39 # and from the router's MAC
40 self.assertEqual(rx[Ether].src, intf.local_mac)
42 # the rx'd RA should be addressed to the sender's source
43 self.assertTrue(rx.haslayer(ICMPv6ND_RA))
44 self.assertEqual(in6_ptop(rx[IPv6].dst),
47 # and come from the router's link local
48 self.assertTrue(in6_islladdr(rx[IPv6].src))
49 self.assertEqual(in6_ptop(rx[IPv6].src),
50 in6_ptop(mk_ll_addr(intf.local_mac)))
52 def validate_na(self, intf, rx, dst_ip=None, tgt_ip=None):
54 dst_ip = intf.remote_ip6
56 dst_ip = intf.local_ip6
58 # unicasted packets must come to the unicast mac
59 self.assertEqual(rx[Ether].dst, intf.remote_mac)
61 # and from the router's MAC
62 self.assertEqual(rx[Ether].src, intf.local_mac)
64 # the rx'd NA should be addressed to the sender's source
65 self.assertTrue(rx.haslayer(ICMPv6ND_NA))
66 self.assertEqual(in6_ptop(rx[IPv6].dst),
69 # and come from the target address
70 self.assertEqual(in6_ptop(rx[IPv6].src), in6_ptop(tgt_ip))
72 # Dest link-layer options should have the router's MAC
73 dll = rx[ICMPv6NDOptDstLLAddr]
74 self.assertEqual(dll.lladdr, intf.local_mac)
76 def send_and_expect_ra(self, intf, pkts, remark, dst_ip=None,
77 filter_out_fn=is_ipv6_misc):
79 self.pg0.add_stream(pkts)
80 self.pg_enable_capture(self.pg_interfaces)
82 rx = intf.get_capture(1, filter_out_fn=filter_out_fn)
84 self.assertEqual(len(rx), 1)
86 self.validate_ra(intf, rx, dst_ip)
88 def send_and_assert_no_replies(self, intf, pkts, remark):
90 self.pg_enable_capture(self.pg_interfaces)
92 intf.assert_nothing_captured(remark=remark)
95 class TestIPv6(TestIPv6ND):
96 """ IPv6 Test Case """
100 super(TestIPv6, cls).setUpClass()
104 Perform test setup before test case.
107 - create 3 pg interfaces
108 - untagged pg0 interface
109 - Dot1Q subinterface on pg1
110 - Dot1AD subinterface on pg2
112 - put it into UP state
114 - resolve neighbor address using NDP
115 - configure 200 fib entries
117 :ivar list interfaces: pg interfaces and subinterfaces.
118 :ivar dict flows: IPv4 packet flows in test.
119 :ivar list pg_if_packet_sizes: packet sizes in test.
121 *TODO:* Create AD sub interface
123 super(TestIPv6, self).setUp()
125 # create 3 pg interfaces
126 self.create_pg_interfaces(range(3))
128 # create 2 subinterfaces for p1 and pg2
129 self.sub_interfaces = [
130 VppDot1QSubint(self, self.pg1, 100),
131 VppDot1QSubint(self, self.pg2, 200)
132 # TODO: VppDot1ADSubint(self, self.pg2, 200, 300, 400)
135 # packet flows mapping pg0 -> pg1.sub, pg2.sub, etc.
137 self.flows[self.pg0] = [self.pg1.sub_if, self.pg2.sub_if]
138 self.flows[self.pg1.sub_if] = [self.pg0, self.pg2.sub_if]
139 self.flows[self.pg2.sub_if] = [self.pg0, self.pg1.sub_if]
142 self.pg_if_packet_sizes = [64, 512, 1518, 9018]
143 self.sub_if_packet_sizes = [64, 512, 1518 + 4, 9018 + 4]
145 self.interfaces = list(self.pg_interfaces)
146 self.interfaces.extend(self.sub_interfaces)
148 # setup all interfaces
149 for i in self.interfaces:
154 # config 2M FIB entries
155 self.config_fib_entries(200)
158 """Run standard test teardown and log ``show ip6 neighbors``."""
159 for i in self.sub_interfaces:
163 i.remove_vpp_config()
165 super(TestIPv6, self).tearDown()
166 if not self.vpp_dead:
167 self.logger.info(self.vapi.cli("show ip6 neighbors"))
168 # info(self.vapi.cli("show ip6 fib")) # many entries
170 def config_fib_entries(self, count):
171 """For each interface add to the FIB table *count* routes to
172 "fd02::1/128" destination with interface's local address as next-hop
175 :param int count: Number of FIB entries.
177 - *TODO:* check if the next-hop address shouldn't be remote address
178 instead of local address.
180 n_int = len(self.interfaces)
183 dest_addr = inet_pton(AF_INET6, "fd02::1")
185 for i in self.interfaces:
186 next_hop_address = i.local_ip6n
187 for j in range(count / n_int):
188 self.vapi.ip_add_del_route(
189 dest_addr, dest_addr_len, next_hop_address, is_ipv6=1)
191 if counter / count * 100 > percent:
192 self.logger.info("Configure %d FIB entries .. %d%% done" %
196 def create_stream(self, src_if, packet_sizes):
197 """Create input packet stream for defined interface.
199 :param VppInterface src_if: Interface to create packet stream for.
200 :param list packet_sizes: Required packet sizes.
203 for i in range(0, 257):
204 dst_if = self.flows[src_if][i % 2]
205 info = self.create_packet_info(src_if, dst_if)
206 payload = self.info_to_payload(info)
207 p = (Ether(dst=src_if.local_mac, src=src_if.remote_mac) /
208 IPv6(src=src_if.remote_ip6, dst=dst_if.remote_ip6) /
209 UDP(sport=1234, dport=1234) /
212 if isinstance(src_if, VppSubInterface):
213 p = src_if.add_dot1_layer(p)
214 size = packet_sizes[(i // 2) % len(packet_sizes)]
215 self.extend_packet(p, size)
219 def verify_capture(self, dst_if, capture):
220 """Verify captured input packet stream for defined interface.
222 :param VppInterface dst_if: Interface to verify captured packet stream
224 :param list capture: Captured packet stream.
226 self.logger.info("Verifying capture on interface %s" % dst_if.name)
228 for i in self.interfaces:
229 last_info[i.sw_if_index] = None
231 dst_sw_if_index = dst_if.sw_if_index
232 if hasattr(dst_if, 'parent'):
234 for packet in capture:
236 # Check VLAN tags and Ethernet header
237 packet = dst_if.remove_dot1_layer(packet)
238 self.assertTrue(Dot1Q not in packet)
242 payload_info = self.payload_to_info(str(packet[Raw]))
243 packet_index = payload_info.index
244 self.assertEqual(payload_info.dst, dst_sw_if_index)
246 "Got packet on port %s: src=%u (id=%u)" %
247 (dst_if.name, payload_info.src, packet_index))
248 next_info = self.get_next_packet_info_for_interface2(
249 payload_info.src, dst_sw_if_index,
250 last_info[payload_info.src])
251 last_info[payload_info.src] = next_info
252 self.assertTrue(next_info is not None)
253 self.assertEqual(packet_index, next_info.index)
254 saved_packet = next_info.data
255 # Check standard fields
256 self.assertEqual(ip.src, saved_packet[IPv6].src)
257 self.assertEqual(ip.dst, saved_packet[IPv6].dst)
258 self.assertEqual(udp.sport, saved_packet[UDP].sport)
259 self.assertEqual(udp.dport, saved_packet[UDP].dport)
261 self.logger.error(ppp("Unexpected or invalid packet:", packet))
263 for i in self.interfaces:
264 remaining_packet = self.get_next_packet_info_for_interface2(
265 i.sw_if_index, dst_sw_if_index, last_info[i.sw_if_index])
266 self.assertTrue(remaining_packet is None,
267 "Interface %s: Packet expected from interface %s "
268 "didn't arrive" % (dst_if.name, i.name))
274 - Create IPv6 stream for pg0 interface
275 - Create IPv6 tagged streams for pg1's and pg2's subinterface.
276 - Send and verify received packets on each interface.
279 pkts = self.create_stream(self.pg0, self.pg_if_packet_sizes)
280 self.pg0.add_stream(pkts)
282 for i in self.sub_interfaces:
283 pkts = self.create_stream(i, self.sub_if_packet_sizes)
284 i.parent.add_stream(pkts)
286 self.pg_enable_capture(self.pg_interfaces)
289 pkts = self.pg0.get_capture()
290 self.verify_capture(self.pg0, pkts)
292 for i in self.sub_interfaces:
293 pkts = i.parent.get_capture()
294 self.verify_capture(i, pkts)
297 """ IPv6 Neighbour Solicitation Exceptions
300 - Send an NS Sourced from an address not covered by the link sub-net
301 - Send an NS to an mcast address the router has not joined
302 - Send NS for a target address the router does not onn.
306 # An NS from a non link source address
308 nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
309 d = inet_ntop(AF_INET6, nsma)
311 p = (Ether(dst=in6_getnsmac(nsma)) /
312 IPv6(dst=d, src="2002::2") /
313 ICMPv6ND_NS(tgt=self.pg0.local_ip6) /
314 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac))
317 self.send_and_assert_no_replies(
319 "No response to NS source by address not on sub-net")
322 # An NS for sent to a solicited mcast group the router is
323 # not a member of FAILS
326 nsma = in6_getnsma(inet_pton(AF_INET6, "fd::ffff"))
327 d = inet_ntop(AF_INET6, nsma)
329 p = (Ether(dst=in6_getnsmac(nsma)) /
330 IPv6(dst=d, src=self.pg0.remote_ip6) /
331 ICMPv6ND_NS(tgt=self.pg0.local_ip6) /
332 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac))
335 self.send_and_assert_no_replies(
337 "No response to NS sent to unjoined mcast address")
340 # An NS whose target address is one the router does not own
342 nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
343 d = inet_ntop(AF_INET6, nsma)
345 p = (Ether(dst=in6_getnsmac(nsma)) /
346 IPv6(dst=d, src=self.pg0.remote_ip6) /
347 ICMPv6ND_NS(tgt="fd::ffff") /
348 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac))
351 self.send_and_assert_no_replies(self.pg0, pkts,
352 "No response to NS for unknown target")
354 def validate_ra(self, intf, rx, dst_ip=None, mtu=9000, pi_opt=None):
356 dst_ip = intf.remote_ip6
358 # unicasted packets must come to the unicast mac
359 self.assertEqual(rx[Ether].dst, intf.remote_mac)
361 # and from the router's MAC
362 self.assertEqual(rx[Ether].src, intf.local_mac)
364 # the rx'd RA should be addressed to the sender's source
365 self.assertTrue(rx.haslayer(ICMPv6ND_RA))
366 self.assertEqual(in6_ptop(rx[IPv6].dst),
369 # and come from the router's link local
370 self.assertTrue(in6_islladdr(rx[IPv6].src))
371 self.assertEqual(in6_ptop(rx[IPv6].src),
372 in6_ptop(mk_ll_addr(intf.local_mac)))
374 # it should contain the links MTU
376 self.assertEqual(ra[ICMPv6NDOptMTU].mtu, mtu)
378 # it should contain the source's link layer address option
379 sll = ra[ICMPv6NDOptSrcLLAddr]
380 self.assertEqual(sll.lladdr, intf.local_mac)
383 # the RA should not contain prefix information
384 self.assertFalse(ra.haslayer(ICMPv6NDOptPrefixInfo))
386 raos = rx.getlayer(ICMPv6NDOptPrefixInfo, 1)
388 # the options are nested in the scapy packet in way that i cannot
389 # decipher how to decode. this 1st layer of option always returns
390 # nested classes, so a direct obj1=obj2 comparison always fails.
391 # however, the getlayer(.., 2) does give one instnace.
392 # so we cheat here and construct a new opt instnace for comparison
393 rd = ICMPv6NDOptPrefixInfo(prefixlen=raos.prefixlen,
397 if type(pi_opt) is list:
398 for ii in range(len(pi_opt)):
399 self.assertEqual(pi_opt[ii], rd)
400 rd = rx.getlayer(ICMPv6NDOptPrefixInfo, ii+2)
402 self.assertEqual(pi_opt, raos)
404 def send_and_expect_ra(self, intf, pkts, remark, dst_ip=None,
405 filter_out_fn=is_ipv6_misc,
407 intf.add_stream(pkts)
408 self.pg_enable_capture(self.pg_interfaces)
410 rx = intf.get_capture(1, filter_out_fn=filter_out_fn)
412 self.assertEqual(len(rx), 1)
414 self.validate_ra(intf, rx, dst_ip, pi_opt=opt)
417 """ IPv6 Router Solicitation Exceptions
423 # Before we begin change the IPv6 RA responses to use the unicast
424 # address - that way we will not confuse them with the periodic
425 # RAs which go to the mcast address
426 # Sit and wait for the first periodic RA.
430 self.pg0.ip6_ra_config(send_unicast=1)
433 # An RS from a link source address
434 # - expect an RA in return
436 p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
437 IPv6(dst=self.pg0.local_ip6, src=self.pg0.remote_ip6) /
440 self.send_and_expect_ra(self.pg0, pkts, "Genuine RS")
443 # For the next RS sent the RA should be rate limited
445 self.send_and_assert_no_replies(self.pg0, pkts, "RA rate limited")
448 # When we reconfiure the IPv6 RA config, we reset the RA rate limiting,
449 # so we need to do this before each test below so as not to drop
450 # packets for rate limiting reasons. Test this works here.
452 self.pg0.ip6_ra_config(send_unicast=1)
453 self.send_and_expect_ra(self.pg0, pkts, "Rate limit reset RS")
456 # An RS sent from a non-link local source
458 self.pg0.ip6_ra_config(send_unicast=1)
459 p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
460 IPv6(dst=self.pg0.local_ip6, src="2002::ffff") /
463 self.send_and_assert_no_replies(self.pg0, pkts,
464 "RS from non-link source")
467 # Source an RS from a link local address
469 self.pg0.ip6_ra_config(send_unicast=1)
470 ll = mk_ll_addr(self.pg0.remote_mac)
471 p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
472 IPv6(dst=self.pg0.local_ip6, src=ll) /
475 self.send_and_expect_ra(self.pg0, pkts,
476 "RS sourced from link-local",
480 # Send the RS multicast
482 self.pg0.ip6_ra_config(send_unicast=1)
483 dmac = in6_getnsmac(inet_pton(AF_INET6, "ff02::2"))
484 ll = mk_ll_addr(self.pg0.remote_mac)
485 p = (Ether(dst=dmac, src=self.pg0.remote_mac) /
486 IPv6(dst="ff02::2", src=ll) /
489 self.send_and_expect_ra(self.pg0, pkts,
490 "RS sourced from link-local",
494 # Source from the unspecified address ::. This happens when the RS
495 # is sent before the host has a configured address/sub-net,
496 # i.e. auto-config. Since the sender has no IP address, the reply
497 # comes back mcast - so the capture needs to not filter this.
498 # If we happen to pick up the periodic RA at this point then so be it,
501 self.pg0.ip6_ra_config(send_unicast=1, suppress=1)
502 p = (Ether(dst=dmac, src=self.pg0.remote_mac) /
503 IPv6(dst="ff02::2", src="::") /
506 self.send_and_expect_ra(self.pg0, pkts,
507 "RS sourced from unspecified",
512 # Configure The RA to announce the links prefix
514 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
515 self.pg0.local_ip6_prefix_len)
518 # RAs should now contain the prefix information option
520 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
521 prefix=self.pg0.local_ip6,
525 self.pg0.ip6_ra_config(send_unicast=1)
526 ll = mk_ll_addr(self.pg0.remote_mac)
527 p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
528 IPv6(dst=self.pg0.local_ip6, src=ll) /
530 self.send_and_expect_ra(self.pg0, p,
531 "RA with prefix-info",
536 # Change the prefix info to not off-link
539 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
540 self.pg0.local_ip6_prefix_len,
543 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
544 prefix=self.pg0.local_ip6,
548 self.pg0.ip6_ra_config(send_unicast=1)
549 self.send_and_expect_ra(self.pg0, p,
550 "RA with Prefix info with L-flag=0",
555 # Change the prefix info to not off-link, no-autoconfig
556 # L and A flag are clear in the advert
558 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
559 self.pg0.local_ip6_prefix_len,
563 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
564 prefix=self.pg0.local_ip6,
568 self.pg0.ip6_ra_config(send_unicast=1)
569 self.send_and_expect_ra(self.pg0, p,
570 "RA with Prefix info with A & L-flag=0",
575 # Change the flag settings back to the defaults
576 # L and A flag are set in the advert
578 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
579 self.pg0.local_ip6_prefix_len)
581 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
582 prefix=self.pg0.local_ip6,
586 self.pg0.ip6_ra_config(send_unicast=1)
587 self.send_and_expect_ra(self.pg0, p,
588 "RA with Prefix info",
593 # Change the prefix info to not off-link, no-autoconfig
594 # L and A flag are clear in the advert
596 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
597 self.pg0.local_ip6_prefix_len,
601 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
602 prefix=self.pg0.local_ip6,
606 self.pg0.ip6_ra_config(send_unicast=1)
607 self.send_and_expect_ra(self.pg0, p,
608 "RA with Prefix info with A & L-flag=0",
613 # Use the reset to defults option to revert to defaults
614 # L and A flag are clear in the advert
616 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
617 self.pg0.local_ip6_prefix_len,
620 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
621 prefix=self.pg0.local_ip6,
625 self.pg0.ip6_ra_config(send_unicast=1)
626 self.send_and_expect_ra(self.pg0, p,
627 "RA with Prefix reverted to defaults",
632 # Advertise Another prefix. With no L-flag/A-flag
634 self.pg0.ip6_ra_prefix(self.pg1.local_ip6n,
635 self.pg1.local_ip6_prefix_len,
639 opt = [ICMPv6NDOptPrefixInfo(prefixlen=self.pg0.local_ip6_prefix_len,
640 prefix=self.pg0.local_ip6,
643 ICMPv6NDOptPrefixInfo(prefixlen=self.pg1.local_ip6_prefix_len,
644 prefix=self.pg1.local_ip6,
648 self.pg0.ip6_ra_config(send_unicast=1)
649 ll = mk_ll_addr(self.pg0.remote_mac)
650 p = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
651 IPv6(dst=self.pg0.local_ip6, src=ll) /
653 self.send_and_expect_ra(self.pg0, p,
654 "RA with multiple Prefix infos",
659 # Remove the first refix-info - expect the second is still in the
662 self.pg0.ip6_ra_prefix(self.pg0.local_ip6n,
663 self.pg0.local_ip6_prefix_len,
666 opt = ICMPv6NDOptPrefixInfo(prefixlen=self.pg1.local_ip6_prefix_len,
667 prefix=self.pg1.local_ip6,
671 self.pg0.ip6_ra_config(send_unicast=1)
672 self.send_and_expect_ra(self.pg0, p,
673 "RA with Prefix reverted to defaults",
678 # Remove the second prefix-info - expect no prefix-info i nthe adverts
680 self.pg0.ip6_ra_prefix(self.pg1.local_ip6n,
681 self.pg1.local_ip6_prefix_len,
684 self.pg0.ip6_ra_config(send_unicast=1)
685 self.send_and_expect_ra(self.pg0, p,
686 "RA with Prefix reverted to defaults",
690 # Reset the periodic advertisements back to default values
692 self.pg0.ip6_ra_config(no=1, suppress=1, send_unicast=0)
695 class IPv6NDProxyTest(TestIPv6ND):
696 """ IPv6 ND ProxyTest Case """
699 super(IPv6NDProxyTest, self).setUp()
701 # create 3 pg interfaces
702 self.create_pg_interfaces(range(3))
704 # pg0 is the master interface, with the configured subnet
706 self.pg0.config_ip6()
707 self.pg0.resolve_ndp()
709 self.pg1.ip6_enable()
710 self.pg2.ip6_enable()
713 super(IPv6NDProxyTest, self).tearDown()
715 def test_nd_proxy(self):
716 """ IPv6 Proxy ND """
719 # Generate some hosts in the subnet that we are proxying
721 self.pg0.generate_remote_hosts(8)
723 nsma = in6_getnsma(inet_pton(AF_INET6, self.pg0.local_ip6))
724 d = inet_ntop(AF_INET6, nsma)
727 # Send an NS for one of those remote hosts on one of the proxy links
728 # expect no response since it's from an address that is not
729 # on the link that has the prefix configured
731 ns_pg1 = (Ether(dst=in6_getnsmac(nsma), src=self.pg1.remote_mac) /
732 IPv6(dst=d, src=self.pg0._remote_hosts[2].ip6) /
733 ICMPv6ND_NS(tgt=self.pg0.local_ip6) /
734 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0._remote_hosts[2].mac))
736 self.send_and_assert_no_replies(self.pg1, ns_pg1, "Off link NS")
739 # Add proxy support for the host
741 self.vapi.ip6_nd_proxy(
742 inet_pton(AF_INET6, self.pg0._remote_hosts[2].ip6),
743 self.pg1.sw_if_index)
746 # try that NS again. this time we expect an NA back
748 self.pg1.add_stream(ns_pg1)
749 self.pg_enable_capture(self.pg_interfaces)
751 rx = self.pg1.get_capture(1)
753 self.validate_na(self.pg1, rx[0],
754 dst_ip=self.pg0._remote_hosts[2].ip6,
755 tgt_ip=self.pg0.local_ip6)
758 # ... and that we have an entry in the ND cache
760 self.assertTrue(find_nbr(self,
761 self.pg1.sw_if_index,
762 self.pg0._remote_hosts[2].ip6,
766 # ... and we can route traffic to it
768 t = (Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac) /
769 IPv6(dst=self.pg0._remote_hosts[2].ip6,
770 src=self.pg0.remote_ip6) /
771 UDP(sport=10000, dport=20000) /
774 self.pg0.add_stream(t)
775 self.pg_enable_capture(self.pg_interfaces)
777 rx = self.pg1.get_capture(1)
780 self.assertEqual(rx[Ether].dst, self.pg0._remote_hosts[2].mac)
781 self.assertEqual(rx[Ether].src, self.pg1.local_mac)
783 self.assertEqual(rx[IPv6].src, t[IPv6].src)
784 self.assertEqual(rx[IPv6].dst, t[IPv6].dst)
787 # Test we proxy for the host on the main interface
789 ns_pg0 = (Ether(dst=in6_getnsmac(nsma), src=self.pg0.remote_mac) /
790 IPv6(dst=d, src=self.pg0.remote_ip6) /
791 ICMPv6ND_NS(tgt=self.pg0._remote_hosts[2].ip6) /
792 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0.remote_mac))
794 self.pg0.add_stream(ns_pg0)
795 self.pg_enable_capture(self.pg_interfaces)
797 rx = self.pg0.get_capture(1)
799 self.validate_na(self.pg0, rx[0],
800 tgt_ip=self.pg0._remote_hosts[2].ip6,
801 dst_ip=self.pg0.remote_ip6)
804 # Setup and resolve proxy for another host on another interface
806 ns_pg2 = (Ether(dst=in6_getnsmac(nsma), src=self.pg2.remote_mac) /
807 IPv6(dst=d, src=self.pg0._remote_hosts[3].ip6) /
808 ICMPv6ND_NS(tgt=self.pg0.local_ip6) /
809 ICMPv6NDOptSrcLLAddr(lladdr=self.pg0._remote_hosts[2].mac))
811 self.vapi.ip6_nd_proxy(
812 inet_pton(AF_INET6, self.pg0._remote_hosts[3].ip6),
813 self.pg2.sw_if_index)
815 self.pg2.add_stream(ns_pg2)
816 self.pg_enable_capture(self.pg_interfaces)
818 rx = self.pg2.get_capture(1)
820 self.validate_na(self.pg2, rx[0],
821 dst_ip=self.pg0._remote_hosts[3].ip6,
822 tgt_ip=self.pg0.local_ip6)
824 self.assertTrue(find_nbr(self,
825 self.pg2.sw_if_index,
826 self.pg0._remote_hosts[3].ip6,
830 # hosts can communicate. pg2->pg1
832 t2 = (Ether(dst=self.pg2.local_mac,
833 src=self.pg0.remote_hosts[3].mac) /
834 IPv6(dst=self.pg0._remote_hosts[2].ip6,
835 src=self.pg0._remote_hosts[3].ip6) /
836 UDP(sport=10000, dport=20000) /
839 self.pg2.add_stream(t2)
840 self.pg_enable_capture(self.pg_interfaces)
842 rx = self.pg1.get_capture(1)
845 self.assertEqual(rx[Ether].dst, self.pg0._remote_hosts[2].mac)
846 self.assertEqual(rx[Ether].src, self.pg1.local_mac)
848 self.assertEqual(rx[IPv6].src, t2[IPv6].src)
849 self.assertEqual(rx[IPv6].dst, t2[IPv6].dst)
852 # remove the proxy configs
854 self.vapi.ip6_nd_proxy(
855 inet_pton(AF_INET6, self.pg0._remote_hosts[2].ip6),
856 self.pg1.sw_if_index,
858 self.vapi.ip6_nd_proxy(
859 inet_pton(AF_INET6, self.pg0._remote_hosts[3].ip6),
860 self.pg2.sw_if_index,
863 self.assertFalse(find_nbr(self,
864 self.pg2.sw_if_index,
865 self.pg0._remote_hosts[3].ip6,
867 self.assertFalse(find_nbr(self,
868 self.pg1.sw_if_index,
869 self.pg0._remote_hosts[2].ip6,
873 # no longer proxy-ing...
875 self.send_and_assert_no_replies(self.pg0, ns_pg0, "Proxy unconfigured")
876 self.send_and_assert_no_replies(self.pg1, ns_pg1, "Proxy unconfigured")
877 self.send_and_assert_no_replies(self.pg2, ns_pg2, "Proxy unconfigured")
880 # no longer forwarding. traffic generates NS out of the glean/main
883 self.pg2.add_stream(t2)
884 self.pg_enable_capture(self.pg_interfaces)
887 rx = self.pg0.get_capture(1)
889 self.assertTrue(rx[0].haslayer(ICMPv6ND_NS))
892 class TestIPNull(VppTestCase):
893 """ IPv6 routes via NULL """
896 super(TestIPNull, self).setUp()
898 # create 2 pg interfaces
899 self.create_pg_interfaces(range(1))
901 for i in self.pg_interfaces:
907 super(TestIPNull, self).tearDown()
908 for i in self.pg_interfaces:
912 def test_ip_null(self):
913 """ IP NULL route """
915 p = (Ether(src=self.pg0.remote_mac,
916 dst=self.pg0.local_mac) /
917 IPv6(src=self.pg0.remote_ip6, dst="2001::1") /
918 UDP(sport=1234, dport=1234) /
922 # A route via IP NULL that will reply with ICMP unreachables
924 ip_unreach = VppIpRoute(self, "2001::", 64, [], is_unreach=1, is_ip6=1)
925 ip_unreach.add_vpp_config()
927 self.pg0.add_stream(p)
928 self.pg_enable_capture(self.pg_interfaces)
931 rx = self.pg0.get_capture(1)
933 icmp = rx[ICMPv6DestUnreach]
935 # 0 = "No route to destination"
936 self.assertEqual(icmp.code, 0)
938 # ICMP is rate limited. pause a bit
942 # A route via IP NULL that will reply with ICMP prohibited
944 ip_prohibit = VppIpRoute(self, "2001::1", 128, [],
945 is_prohibit=1, is_ip6=1)
946 ip_prohibit.add_vpp_config()
948 self.pg0.add_stream(p)
949 self.pg_enable_capture(self.pg_interfaces)
952 rx = self.pg0.get_capture(1)
954 icmp = rx[ICMPv6DestUnreach]
956 # 1 = "Communication with destination administratively prohibited"
957 self.assertEqual(icmp.code, 1)
960 if __name__ == '__main__':
961 unittest.main(testRunner=VppTestRunner)