| import unittest |
| import socket |
| import copy |
| |
| from scapy.layers.ipsec import SecurityAssociation, ESP |
| from scapy.layers.l2 import Ether, GRE, Dot1Q |
| from scapy.packet import Raw, bind_layers, Padding |
| from scapy.layers.inet import IP, UDP, ICMP |
| from scapy.layers.inet6 import IPv6, ICMPv6EchoRequest |
| from scapy.contrib.mpls import MPLS |
| from asfframework import VppTestRunner, tag_fixme_vpp_workers |
| from template_ipsec import ( |
| TemplateIpsec, |
| IpsecTun4Tests, |
| IpsecTun6Tests, |
| IpsecTun4, |
| IpsecTun6, |
| IpsecTcpTests, |
| mk_scapy_crypt_key, |
| IpsecTun6HandoffTests, |
| IpsecTun4HandoffTests, |
| config_tun_params, |
| ) |
| from vpp_gre_interface import VppGreInterface |
| from vpp_ipip_tun_interface import VppIpIpTunInterface |
| from vpp_ip_route import ( |
| VppIpRoute, |
| VppRoutePath, |
| DpoProto, |
| VppMplsLabel, |
| VppMplsTable, |
| VppMplsRoute, |
| FibPathProto, |
| ) |
| from vpp_ipsec import VppIpsecSA, VppIpsecTunProtect, VppIpsecInterface |
| from vpp_l2 import VppBridgeDomain, VppBridgeDomainPort |
| from vpp_sub_interface import L2_VTR_OP, VppDot1QSubint |
| from vpp_teib import VppTeib |
| from util import ppp |
| from vpp_papi import VppEnum |
| from vpp_papi_provider import CliFailedCommandError |
| from vpp_acl import AclRule, VppAcl, VppAclInterface |
| from vpp_policer import PolicerAction, VppPolicer, Dir |
| from config import config |
| |
| |
| def config_tun_params(p, encryption_type, tun_if, src=None, dst=None): |
| ip_class_by_addr_type = {socket.AF_INET: IP, socket.AF_INET6: IPv6} |
| esn_en = bool( |
| p.flags & (VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_USE_ESN) |
| ) |
| crypt_key = mk_scapy_crypt_key(p) |
| if tun_if: |
| p.tun_dst = tun_if.remote_ip |
| p.tun_src = tun_if.local_ip |
| else: |
| p.tun_dst = dst |
| p.tun_src = src |
| |
| if p.nat_header: |
| is_default_port = p.nat_header.dport == 4500 |
| else: |
| is_default_port = True |
| |
| if is_default_port: |
| outbound_nat_header = p.nat_header |
| else: |
| outbound_nat_header = UDP(sport=p.nat_header.dport, dport=p.nat_header.sport) |
| bind_layers(UDP, ESP, dport=p.nat_header.dport) |
| |
| p.scapy_tun_sa = SecurityAssociation( |
| encryption_type, |
| spi=p.scapy_tun_spi, |
| crypt_algo=p.crypt_algo, |
| crypt_key=crypt_key, |
| auth_algo=p.auth_algo, |
| auth_key=p.auth_key, |
| tunnel_header=ip_class_by_addr_type[p.addr_type](src=p.tun_dst, dst=p.tun_src), |
| nat_t_header=outbound_nat_header, |
| esn_en=esn_en, |
| ) |
| p.vpp_tun_sa = SecurityAssociation( |
| encryption_type, |
| spi=p.vpp_tun_spi, |
| crypt_algo=p.crypt_algo, |
| crypt_key=crypt_key, |
| auth_algo=p.auth_algo, |
| auth_key=p.auth_key, |
| tunnel_header=ip_class_by_addr_type[p.addr_type](dst=p.tun_dst, src=p.tun_src), |
| nat_t_header=p.nat_header, |
| esn_en=esn_en, |
| ) |
| |
| |
| def config_tra_params(p, encryption_type, tun_if): |
| ip_class_by_addr_type = {socket.AF_INET: IP, socket.AF_INET6: IPv6} |
| esn_en = bool( |
| p.flags & (VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_USE_ESN) |
| ) |
| crypt_key = mk_scapy_crypt_key(p) |
| p.tun_dst = tun_if.remote_ip |
| p.tun_src = tun_if.local_ip |
| |
| if p.nat_header: |
| is_default_port = p.nat_header.dport == 4500 |
| else: |
| is_default_port = True |
| |
| if is_default_port: |
| outbound_nat_header = p.nat_header |
| else: |
| outbound_nat_header = UDP(sport=p.nat_header.dport, dport=p.nat_header.sport) |
| bind_layers(UDP, ESP, dport=p.nat_header.dport) |
| |
| p.scapy_tun_sa = SecurityAssociation( |
| encryption_type, |
| spi=p.scapy_tun_spi, |
| crypt_algo=p.crypt_algo, |
| crypt_key=crypt_key, |
| auth_algo=p.auth_algo, |
| auth_key=p.auth_key, |
| esn_en=esn_en, |
| nat_t_header=outbound_nat_header, |
| ) |
| p.vpp_tun_sa = SecurityAssociation( |
| encryption_type, |
| spi=p.vpp_tun_spi, |
| crypt_algo=p.crypt_algo, |
| crypt_key=crypt_key, |
| auth_algo=p.auth_algo, |
| auth_key=p.auth_key, |
| esn_en=esn_en, |
| nat_t_header=p.nat_header, |
| ) |
| |
| |
| class TemplateIpsec4TunProtect(object): |
| """IPsec IPv4 Tunnel protect""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| tun4_input_node = "ipsec4-tun-input" |
| |
| def config_sa_tra(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_sa_tun(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.tun_if.local_addr[p.addr_type], |
| self.tun_if.remote_addr[p.addr_type], |
| flags=p.flags, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.tun_if.remote_addr[p.addr_type], |
| self.tun_if.local_addr[p.addr_type], |
| flags=p.flags, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_protect(self, p): |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| def config_network(self, p): |
| if hasattr(p, "tun_dst"): |
| tun_dst = p.tun_dst |
| else: |
| tun_dst = self.pg0.remote_ip4 |
| p.tun_if = VppIpIpTunInterface(self, self.pg0, self.pg0.local_ip4, tun_dst) |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| p.tun_if.config_ip6() |
| |
| p.route = VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 32, |
| [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)], |
| ) |
| p.route.add_vpp_config() |
| r = VppIpRoute( |
| self, |
| p.remote_tun_if_host6, |
| 128, |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, 0xFFFFFFFF, proto=DpoProto.DPO_PROTO_IP6 |
| ) |
| ], |
| ) |
| r.add_vpp_config() |
| |
| def unconfig_network(self, p): |
| p.route.remove_vpp_config() |
| p.tun_if.remove_vpp_config() |
| |
| def unconfig_protect(self, p): |
| p.tun_protect.remove_vpp_config() |
| |
| def unconfig_sa(self, p): |
| p.tun_sa_out.remove_vpp_config() |
| p.tun_sa_in.remove_vpp_config() |
| |
| |
| class TemplateIpsec4TunIfEsp(TemplateIpsec4TunProtect, TemplateIpsec): |
| """IPsec tunnel interface tests""" |
| |
| encryption_type = ESP |
| |
| @classmethod |
| def setUpClass(cls): |
| super(TemplateIpsec4TunIfEsp, cls).setUpClass() |
| |
| @classmethod |
| def tearDownClass(cls): |
| super(TemplateIpsec4TunIfEsp, cls).tearDownClass() |
| |
| def setUp(self): |
| super(TemplateIpsec4TunIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TemplateIpsec4TunIfEsp, self).tearDown() |
| |
| |
| class TemplateIpsec4TunIfEspUdp(TemplateIpsec4TunProtect, TemplateIpsec): |
| """IPsec UDP tunnel interface tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| @classmethod |
| def setUpClass(cls): |
| super(TemplateIpsec4TunIfEspUdp, cls).setUpClass() |
| |
| @classmethod |
| def tearDownClass(cls): |
| super(TemplateIpsec4TunIfEspUdp, cls).tearDownClass() |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| # ensure the UDP ports are correct before we decrypt |
| # which strips them |
| self.assertTrue(rx.haslayer(UDP)) |
| self.assert_equal(rx[UDP].sport, p.nat_header.sport) |
| self.assert_equal(rx[UDP].dport, p.nat_header.dport) |
| |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, "1.1.1.1") |
| self.assert_equal(pkt[IP].src, self.pg1.remote_ip4) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def config_sa_tra(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| udp_src=p.nat_header.sport, |
| udp_dst=p.nat_header.dport, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags |
| | VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_IS_INBOUND, |
| udp_src=p.nat_header.sport, |
| udp_dst=p.nat_header.dport, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def setUp(self): |
| super(TemplateIpsec4TunIfEspUdp, self).setUp() |
| |
| p = self.ipv4_params |
| p.flags = VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_UDP_ENCAP |
| p.nat_header = UDP(sport=5454, dport=4500) |
| |
| self.tun_if = self.pg0 |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TemplateIpsec4TunIfEspUdp, self).tearDown() |
| |
| |
| class TemplateIpsec4TunTfc: |
| """IPsec IPv4 tunnel with TFC""" |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=54): |
| pkt = ( |
| IP(src=src, dst=dst, len=28 + payload_size) |
| / ICMP() |
| / Raw(b"X" * payload_size) |
| / Padding(b"Y" * 100) |
| ) |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) / sa.encrypt(pkt) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[IP].src, p.remote_tun_if_host) |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| self.assert_equal(rx[IP].len, len(rx[IP])) |
| self.assert_packet_checksums_valid(rx) |
| |
| |
| class TestIpsec4TunIfEsp1(TemplateIpsec4TunIfEsp, IpsecTun4Tests): |
| """Ipsec ESP - TUN tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def test_tun_basic64(self): |
| """ipsec 6o4 tunnel basic test""" |
| self.tun4_encrypt_node_name = "esp4-encrypt-tun" |
| |
| self.verify_tun_64(self.params[socket.AF_INET], count=1) |
| |
| def test_tun_burst64(self): |
| """ipsec 6o4 tunnel basic test""" |
| self.tun4_encrypt_node_name = "esp4-encrypt-tun" |
| |
| self.verify_tun_64(self.params[socket.AF_INET], count=257) |
| |
| def test_tun_basic_frag44(self): |
| """ipsec 4o4 tunnel frag basic test""" |
| self.tun4_encrypt_node_name = "esp4-encrypt-tun" |
| |
| p = self.ipv4_params |
| |
| self.vapi.sw_interface_set_mtu(p.tun_if.sw_if_index, [1500, 0, 0, 0]) |
| self.verify_tun_44( |
| self.params[socket.AF_INET], count=1, payload_size=1800, n_rx=2 |
| ) |
| self.vapi.sw_interface_set_mtu(p.tun_if.sw_if_index, [9000, 0, 0, 0]) |
| |
| |
| class TestIpsec4TunIfEspUdp(TemplateIpsec4TunIfEspUdp, IpsecTun4Tests): |
| """Ipsec ESP UDP tests""" |
| |
| tun4_input_node = "ipsec4-tun-input" |
| |
| def setUp(self): |
| super(TestIpsec4TunIfEspUdp, self).setUp() |
| |
| def test_keepalive(self): |
| """IPSEC NAT Keepalive""" |
| self.verify_keepalive(self.ipv4_params) |
| |
| |
| class TestIpsec4TunIfEspUdpGCM(TemplateIpsec4TunIfEspUdp, IpsecTun4Tests): |
| """Ipsec ESP UDP GCM tests""" |
| |
| tun4_input_node = "ipsec4-tun-input" |
| |
| def setUp(self): |
| super(TestIpsec4TunIfEspUdpGCM, self).setUp() |
| p = self.ipv4_params |
| p.auth_algo_vpp_id = VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| p.crypt_algo_vpp_id = ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_256 |
| ) |
| p.crypt_algo = "AES-GCM" |
| p.auth_algo = "NULL" |
| p.crypt_key = b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h" |
| p.salt = 0 |
| |
| |
| class TestIpsec4TunIfEspUdpUpdate(TemplateIpsec4TunIfEspUdp, IpsecTun4Tests): |
| """Ipsec ESP UDP update tests""" |
| |
| tun4_input_node = "ipsec4-tun-input" |
| |
| def setUp(self): |
| super(TestIpsec4TunIfEspUdpUpdate, self).setUp() |
| p = self.ipv4_params |
| p.nat_header = UDP(sport=6565, dport=7676) |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| p.tun_sa_in.update_vpp_config( |
| udp_src=p.nat_header.dport, udp_dst=p.nat_header.sport |
| ) |
| p.tun_sa_out.update_vpp_config( |
| udp_src=p.nat_header.sport, udp_dst=p.nat_header.dport |
| ) |
| |
| |
| class TestIpsec4TunIfEsp2(TemplateIpsec4TunIfEsp, IpsecTcpTests): |
| """Ipsec ESP - TCP tests""" |
| |
| pass |
| |
| |
| class TemplateIpsec6TunProtect(object): |
| """IPsec IPv6 Tunnel protect""" |
| |
| def config_sa_tra(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_sa_tun(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.tun_if.local_addr[p.addr_type], |
| self.tun_if.remote_addr[p.addr_type], |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.tun_if.remote_addr[p.addr_type], |
| self.tun_if.local_addr[p.addr_type], |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_protect(self, p): |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| def config_network(self, p): |
| if hasattr(p, "tun_dst"): |
| tun_dst = p.tun_dst |
| else: |
| tun_dst = self.pg0.remote_ip6 |
| p.tun_if = VppIpIpTunInterface(self, self.pg0, self.pg0.local_ip6, tun_dst) |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip6() |
| p.tun_if.config_ip4() |
| |
| p.route = VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 128, |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, 0xFFFFFFFF, proto=DpoProto.DPO_PROTO_IP6 |
| ) |
| ], |
| ) |
| p.route.add_vpp_config() |
| r = VppIpRoute( |
| self, |
| p.remote_tun_if_host4, |
| 32, |
| [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)], |
| ) |
| r.add_vpp_config() |
| |
| def unconfig_network(self, p): |
| p.route.remove_vpp_config() |
| p.tun_if.remove_vpp_config() |
| |
| def unconfig_protect(self, p): |
| p.tun_protect.remove_vpp_config() |
| |
| def unconfig_sa(self, p): |
| p.tun_sa_out.remove_vpp_config() |
| p.tun_sa_in.remove_vpp_config() |
| |
| |
| class TemplateIpsec6TunIfEsp(TemplateIpsec6TunProtect, TemplateIpsec): |
| """IPsec tunnel interface tests""" |
| |
| encryption_type = ESP |
| |
| def setUp(self): |
| super(TemplateIpsec6TunIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv6_params |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TemplateIpsec6TunIfEsp, self).tearDown() |
| |
| |
| class TemplateIpsec6TunIfEspUdp(TemplateIpsec6TunProtect, TemplateIpsec): |
| """IPsec6 UDP tunnel interface tests""" |
| |
| tun4_encrypt_node_name = "esp6-encrypt-tun" |
| tun4_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| @classmethod |
| def setUpClass(cls): |
| super(TemplateIpsec6TunIfEspUdp, cls).setUpClass() |
| |
| @classmethod |
| def tearDownClass(cls): |
| super(TemplateIpsec6TunIfEspUdp, cls).tearDownClass() |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| # ensure the UDP ports are correct before we decrypt |
| # which strips them |
| self.assertTrue(rx.haslayer(UDP)) |
| self.assert_equal(rx[UDP].sport, p.nat_header.sport) |
| self.assert_equal(rx[UDP].dport, p.nat_header.dport) |
| |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal( |
| pkt[IP].dst, "1111:1111:1111:1111:1111:1111:1111:1111" |
| ) |
| self.assert_equal(pkt[IP].src, self.pg1.remote_ip6) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def config_sa_tra(self, p): |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| udp_src=p.nat_header.sport, |
| udp_dst=p.nat_header.dport, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags |
| | VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_IS_INBOUND, |
| udp_src=p.nat_header.sport, |
| udp_dst=p.nat_header.dport, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def setUp(self): |
| super(TemplateIpsec6TunIfEspUdp, self).setUp() |
| |
| p = self.ipv6_params |
| p.flags = VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_UDP_ENCAP |
| p.nat_header = UDP(sport=5454, dport=4500) |
| |
| self.tun_if = self.pg0 |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TemplateIpsec6TunIfEspUdp, self).tearDown() |
| |
| |
| class TemplateIpsec6TunTfc: |
| """IPsec IPv6 tunnel with TFC""" |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=54): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IPv6(src=src, dst=dst, hlim=p.inner_hop_limit, fl=p.inner_flow_label) |
| / ICMPv6EchoRequest(id=0, seq=1, data="X" * payload_size) |
| / Padding(b"Y" * 100) |
| ) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted6(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[IPv6].src, p.remote_tun_if_host) |
| self.assert_equal(rx[IPv6].dst, self.pg1.remote_ip6) |
| self.assert_equal(rx[IPv6].plen, len(rx[IPv6].payload)) |
| self.assert_packet_checksums_valid(rx) |
| |
| |
| class TestIpsec6TunIfEspUdp(TemplateIpsec6TunIfEspUdp, IpsecTun6Tests): |
| """Ipsec ESP 6 UDP tests""" |
| |
| tun6_input_node = "ipsec6-tun-input" |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6TunIfEspUdp, self).setUp() |
| |
| def test_keepalive(self): |
| """IPSEC6 NAT Keepalive""" |
| self.verify_keepalive(self.ipv6_params) |
| |
| |
| class TestIpsec6TunIfEspUdpGCM(TemplateIpsec6TunIfEspUdp, IpsecTun6Tests): |
| """Ipsec ESP 6 UDP GCM tests""" |
| |
| tun6_input_node = "ipsec6-tun-input" |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6TunIfEspUdpGCM, self).setUp() |
| p = self.ipv6_params |
| p.auth_algo_vpp_id = VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| p.crypt_algo_vpp_id = ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_256 |
| ) |
| p.crypt_algo = "AES-GCM" |
| p.auth_algo = "NULL" |
| p.crypt_key = b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h" |
| p.salt = 0 |
| |
| |
| class TestIpsec6TunIfEsp1(TemplateIpsec6TunIfEsp, IpsecTun6Tests): |
| """Ipsec ESP - TUN tests""" |
| |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def test_tun_basic46(self): |
| """ipsec 4o6 tunnel basic test""" |
| self.tun6_encrypt_node_name = "esp6-encrypt-tun" |
| self.verify_tun_46(self.params[socket.AF_INET6], count=1) |
| |
| def test_tun_burst46(self): |
| """ipsec 4o6 tunnel burst test""" |
| self.tun6_encrypt_node_name = "esp6-encrypt-tun" |
| self.verify_tun_46(self.params[socket.AF_INET6], count=257) |
| |
| |
| class TestIpsec6TunIfEspHandoff(TemplateIpsec6TunIfEsp, IpsecTun6HandoffTests): |
| """Ipsec ESP 6 Handoff tests""" |
| |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def test_tun_handoff_66_police(self): |
| """ESP 6o6 tunnel with policer worker hand-off test""" |
| self.vapi.cli("clear errors") |
| self.vapi.cli("clear ipsec sa") |
| |
| N_PKTS = 15 |
| p = self.params[socket.AF_INET6] |
| |
| action_tx = PolicerAction( |
| VppEnum.vl_api_sse2_qos_action_type_t.SSE2_QOS_ACTION_API_TRANSMIT, 0 |
| ) |
| policer = VppPolicer( |
| self, |
| "pol1", |
| 80, |
| 0, |
| 1000, |
| 0, |
| conform_action=action_tx, |
| exceed_action=action_tx, |
| violate_action=action_tx, |
| ) |
| policer.add_vpp_config() |
| |
| # Start policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, True) |
| |
| for pol_bind in [1, 0]: |
| policer.bind_vpp_config(pol_bind, True) |
| |
| # inject alternately on worker 0 and 1. |
| for worker in [0, 1, 0, 1]: |
| send_pkts = self.gen_encrypt_pkts6( |
| p, |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip6, |
| count=N_PKTS, |
| ) |
| recv_pkts = self.send_and_expect( |
| self.tun_if, send_pkts, self.pg1, worker=worker |
| ) |
| self.verify_decrypted6(p, recv_pkts) |
| self.logger.debug(self.vapi.cli("show trace max 100")) |
| |
| stats = policer.get_stats() |
| stats0 = policer.get_stats(worker=0) |
| stats1 = policer.get_stats(worker=1) |
| |
| if pol_bind == 1: |
| # First pass: Worker 1, should have done all the policing |
| self.assertEqual(stats, stats1) |
| |
| # Worker 0, should have handed everything off |
| self.assertEqual(stats0["conform_packets"], 0) |
| self.assertEqual(stats0["exceed_packets"], 0) |
| self.assertEqual(stats0["violate_packets"], 0) |
| else: |
| # Second pass: both workers should have policed equal amounts |
| self.assertGreater(stats1["conform_packets"], 0) |
| self.assertEqual(stats1["exceed_packets"], 0) |
| self.assertGreater(stats1["violate_packets"], 0) |
| |
| self.assertGreater(stats0["conform_packets"], 0) |
| self.assertEqual(stats0["exceed_packets"], 0) |
| self.assertGreater(stats0["violate_packets"], 0) |
| |
| self.assertEqual( |
| stats0["conform_packets"] + stats0["violate_packets"], |
| stats1["conform_packets"] + stats1["violate_packets"], |
| ) |
| |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, False) |
| policer.remove_vpp_config() |
| |
| |
| class TestIpsec4TunIfEspHandoff(TemplateIpsec4TunIfEsp, IpsecTun4HandoffTests): |
| """Ipsec ESP 4 Handoff tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def test_tun_handoff_44_police(self): |
| """ESP 4o4 tunnel with policer worker hand-off test""" |
| self.vapi.cli("clear errors") |
| self.vapi.cli("clear ipsec sa") |
| |
| N_PKTS = 15 |
| p = self.params[socket.AF_INET] |
| |
| action_tx = PolicerAction( |
| VppEnum.vl_api_sse2_qos_action_type_t.SSE2_QOS_ACTION_API_TRANSMIT, 0 |
| ) |
| policer = VppPolicer( |
| self, |
| "pol1", |
| 80, |
| 0, |
| 1000, |
| 0, |
| conform_action=action_tx, |
| exceed_action=action_tx, |
| violate_action=action_tx, |
| ) |
| policer.add_vpp_config() |
| |
| # Start policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, True) |
| |
| for pol_bind in [1, 0]: |
| policer.bind_vpp_config(pol_bind, True) |
| |
| # inject alternately on worker 0 and 1. |
| for worker in [0, 1, 0, 1]: |
| send_pkts = self.gen_encrypt_pkts( |
| p, |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip4, |
| count=N_PKTS, |
| ) |
| recv_pkts = self.send_and_expect( |
| self.tun_if, send_pkts, self.pg1, worker=worker |
| ) |
| self.verify_decrypted(p, recv_pkts) |
| self.logger.debug(self.vapi.cli("show trace max 100")) |
| |
| stats = policer.get_stats() |
| stats0 = policer.get_stats(worker=0) |
| stats1 = policer.get_stats(worker=1) |
| |
| if pol_bind == 1: |
| # First pass: Worker 1, should have done all the policing |
| self.assertEqual(stats, stats1) |
| |
| # Worker 0, should have handed everything off |
| self.assertEqual(stats0["conform_packets"], 0) |
| self.assertEqual(stats0["exceed_packets"], 0) |
| self.assertEqual(stats0["violate_packets"], 0) |
| else: |
| # Second pass: both workers should have policed equal amounts |
| self.assertGreater(stats1["conform_packets"], 0) |
| self.assertEqual(stats1["exceed_packets"], 0) |
| self.assertGreater(stats1["violate_packets"], 0) |
| |
| self.assertGreater(stats0["conform_packets"], 0) |
| self.assertEqual(stats0["exceed_packets"], 0) |
| self.assertGreater(stats0["violate_packets"], 0) |
| |
| self.assertEqual( |
| stats0["conform_packets"] + stats0["violate_packets"], |
| stats1["conform_packets"] + stats1["violate_packets"], |
| ) |
| |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, False) |
| policer.remove_vpp_config() |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec4MultiTunIfEsp(TemplateIpsec4TunProtect, TemplateIpsec, IpsecTun4): |
| """IPsec IPv4 Multi Tunnel interface""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec4MultiTunIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| self.multi_params = [] |
| self.pg0.generate_remote_hosts(10) |
| self.pg0.configure_ipv4_neighbors() |
| |
| for ii in range(10): |
| p = copy.copy(self.ipv4_params) |
| |
| p.remote_tun_if_host = "1.1.1.%d" % (ii + 1) |
| p.scapy_tun_sa_id = p.scapy_tun_sa_id + ii |
| p.scapy_tun_spi = p.scapy_tun_spi + ii |
| p.vpp_tun_sa_id = p.vpp_tun_sa_id + ii |
| p.vpp_tun_spi = p.vpp_tun_spi + ii |
| |
| p.scapy_tra_sa_id = p.scapy_tra_sa_id + ii |
| p.scapy_tra_spi = p.scapy_tra_spi + ii |
| p.vpp_tra_sa_id = p.vpp_tra_sa_id + ii |
| p.vpp_tra_spi = p.vpp_tra_spi + ii |
| p.tun_dst = self.pg0.remote_hosts[ii].ip4 |
| |
| self.multi_params.append(p) |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TestIpsec4MultiTunIfEsp, self).tearDown() |
| |
| def test_tun_44(self): |
| """Multiple IPSEC tunnel interfaces""" |
| for p in self.multi_params: |
| self.verify_tun_44(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| def test_tun_rr_44(self): |
| """Round-robin packets acrros multiple interface""" |
| tx = [] |
| for p in self.multi_params: |
| tx = tx + self.gen_encrypt_pkts( |
| p, |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip4, |
| ) |
| rxs = self.send_and_expect(self.tun_if, tx, self.pg1) |
| |
| for rx, p in zip(rxs, self.multi_params): |
| self.verify_decrypted(p, [rx]) |
| |
| tx = [] |
| for p in self.multi_params: |
| tx = tx + self.gen_pkts( |
| self.pg1, src=self.pg1.remote_ip4, dst=p.remote_tun_if_host |
| ) |
| rxs = self.send_and_expect(self.pg1, tx, self.tun_if) |
| |
| for rx, p in zip(rxs, self.multi_params): |
| self.verify_encrypted(p, p.vpp_tun_sa, [rx]) |
| |
| |
| class TestIpsec4TunIfEspAll(TemplateIpsec4TunProtect, TemplateIpsec, IpsecTun4): |
| """IPsec IPv4 Tunnel interface all Algos""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec4TunIfEspAll, self).setUp() |
| |
| self.tun_if = self.pg0 |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| self.unconfig_protect(p) |
| self.unconfig_network(p) |
| self.unconfig_sa(p) |
| |
| super(TestIpsec4TunIfEspAll, self).tearDown() |
| |
| def rekey(self, p): |
| # |
| # change the key and the SPI |
| # |
| np = copy.copy(p) |
| p.crypt_key = b"X" + p.crypt_key[1:] |
| p.scapy_tun_spi += 1 |
| p.scapy_tun_sa_id += 1 |
| p.vpp_tun_spi += 1 |
| p.vpp_tun_sa_id += 1 |
| p.tun_if.local_spi = p.vpp_tun_spi |
| p.tun_if.remote_spi = p.scapy_tun_spi |
| |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| salt=p.salt, |
| ) |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| salt=p.salt, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| p.tun_sa_out.add_vpp_config() |
| |
| self.config_protect(p) |
| np.tun_sa_out.remove_vpp_config() |
| np.tun_sa_in.remove_vpp_config() |
| self.logger.info(self.vapi.cli("sh ipsec sa")) |
| |
| def test_tun_44(self): |
| """IPSEC tunnel all algos""" |
| |
| # foreach VPP crypto engine |
| engines = ["ia32", "ipsecmb", "openssl"] |
| |
| # foreach crypto algorithm |
| algos = [ |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_128 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| ), |
| "scapy-crypto": "AES-GCM", |
| "scapy-integ": "NULL", |
| "key": b"JPjyOWBeVEQiMe7h", |
| "salt": 3333, |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_192 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| ), |
| "scapy-crypto": "AES-GCM", |
| "scapy-integ": "NULL", |
| "key": b"JPjyOWBeVEQiMe7hJPjyOWBe", |
| "salt": 0, |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_GCM_256 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| ), |
| "scapy-crypto": "AES-GCM", |
| "scapy-integ": "NULL", |
| "key": b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h", |
| "salt": 9999, |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_128 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 |
| ), |
| "scapy-crypto": "AES-CBC", |
| "scapy-integ": "HMAC-SHA1-96", |
| "salt": 0, |
| "key": b"JPjyOWBeVEQiMe7h", |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_192 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA_512_256 |
| ), |
| "scapy-crypto": "AES-CBC", |
| "scapy-integ": "SHA2-512-256", |
| "salt": 0, |
| "key": b"JPjyOWBeVEQiMe7hJPjyOWBe", |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_AES_CBC_256 |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA_256_128 |
| ), |
| "scapy-crypto": "AES-CBC", |
| "scapy-integ": "SHA2-256-128", |
| "salt": 0, |
| "key": b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h", |
| }, |
| { |
| "vpp-crypto": ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_NONE |
| ), |
| "vpp-integ": ( |
| VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_SHA1_96 |
| ), |
| "scapy-crypto": "NULL", |
| "scapy-integ": "HMAC-SHA1-96", |
| "salt": 0, |
| "key": b"JPjyOWBeVEQiMe7hJPjyOWBeVEQiMe7h", |
| }, |
| ] |
| |
| for engine in engines: |
| self.vapi.cli("set crypto handler all %s" % engine) |
| |
| # |
| # loop through each of the algorithms |
| # |
| for algo in algos: |
| # with self.subTest(algo=algo['scapy']): |
| |
| p = self.ipv4_params |
| p.auth_algo_vpp_id = algo["vpp-integ"] |
| p.crypt_algo_vpp_id = algo["vpp-crypto"] |
| p.crypt_algo = algo["scapy-crypto"] |
| p.auth_algo = algo["scapy-integ"] |
| p.crypt_key = algo["key"] |
| p.salt = algo["salt"] |
| |
| # |
| # rekey the tunnel |
| # |
| self.rekey(p) |
| self.verify_tun_44(p, count=127) |
| |
| |
| class TestIpsec4TunIfEspNoAlgo(TemplateIpsec4TunProtect, TemplateIpsec, IpsecTun4): |
| """IPsec IPv4 Tunnel interface no Algos""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec4TunIfEspNoAlgo, self).setUp() |
| |
| self.tun_if = self.pg0 |
| p = self.ipv4_params |
| p.auth_algo_vpp_id = VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| p.auth_algo = "NULL" |
| p.auth_key = [] |
| |
| p.crypt_algo_vpp_id = ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_NONE |
| ) |
| p.crypt_algo = "NULL" |
| p.crypt_key = [] |
| |
| def tearDown(self): |
| super(TestIpsec4TunIfEspNoAlgo, self).tearDown() |
| |
| def test_tun_44(self): |
| """IPSec SA with NULL algos""" |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| tx = self.gen_pkts( |
| self.pg1, src=self.pg1.remote_ip4, dst=p.remote_tun_if_host, count=127 |
| ) |
| self.send_and_assert_no_replies(self.pg1, tx) |
| |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| def test_tun_44_async(self): |
| """IPSec SA with NULL algos using async crypto""" |
| p = self.ipv4_params |
| |
| self.vapi.ipsec_set_async_mode(async_enable=True) |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| tx = self.gen_pkts( |
| self.pg1, src=self.pg1.remote_ip4, dst=p.remote_tun_if_host, count=127 |
| ) |
| self.send_and_assert_no_replies(self.pg1, tx) |
| |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| self.vapi.ipsec_set_async_mode(async_enable=False) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec6MultiTunIfEsp(TemplateIpsec6TunProtect, TemplateIpsec, IpsecTun6): |
| """IPsec IPv6 Multi Tunnel interface""" |
| |
| encryption_type = ESP |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6MultiTunIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| self.multi_params = [] |
| self.pg0.generate_remote_hosts(10) |
| self.pg0.configure_ipv6_neighbors() |
| |
| for ii in range(10): |
| p = copy.copy(self.ipv6_params) |
| |
| p.remote_tun_if_host = "1111::%d" % (ii + 1) |
| p.scapy_tun_sa_id = p.scapy_tun_sa_id + ii |
| p.scapy_tun_spi = p.scapy_tun_spi + ii |
| p.vpp_tun_sa_id = p.vpp_tun_sa_id + ii |
| p.vpp_tun_spi = p.vpp_tun_spi + ii |
| |
| p.scapy_tra_sa_id = p.scapy_tra_sa_id + ii |
| p.scapy_tra_spi = p.scapy_tra_spi + ii |
| p.vpp_tra_sa_id = p.vpp_tra_sa_id + ii |
| p.vpp_tra_spi = p.vpp_tra_spi + ii |
| p.tun_dst = self.pg0.remote_hosts[ii].ip6 |
| |
| self.multi_params.append(p) |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| super(TestIpsec6MultiTunIfEsp, self).tearDown() |
| |
| def test_tun_66(self): |
| """Multiple IPSEC tunnel interfaces""" |
| for p in self.multi_params: |
| self.verify_tun_66(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreTebIfEsp(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE TEB ESP - TUN tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| omac = "00:11:22:33:44:55" |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.omac) |
| self.assert_equal(rx[IP].dst, "1.1.1.2") |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[Ether] |
| self.assertEqual(e[Ether].dst, self.omac) |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreTebIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.remote_ip4, |
| self.pg0.local_ip4, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| type=(VppEnum.vl_api_gre_tunnel_type_t.GRE_API_TUNNEL_TYPE_TEB), |
| ) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| VppBridgeDomainPort(self, bd1, p.tun_if).add_vpp_config() |
| VppBridgeDomainPort(self, bd1, self.pg1).add_vpp_config() |
| |
| self.vapi.cli("clear ipsec sa") |
| self.vapi.cli("sh adj") |
| self.vapi.cli("sh ipsec tun") |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreTebIfEsp, self).tearDown() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreTebVlanIfEsp(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE TEB ESP - TUN tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| omac = "00:11:22:33:44:55" |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(dst=self.omac) |
| / Dot1Q(vlan=11) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.omac) |
| self.assert_equal(rx[Dot1Q].vlan, 11) |
| self.assert_equal(rx[IP].dst, "1.1.1.2") |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[Ether] |
| self.assertEqual(e[Ether].dst, self.omac) |
| self.assertFalse(e.haslayer(Dot1Q)) |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreTebVlanIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| self.pg1_11 = VppDot1QSubint(self, self.pg1, 11) |
| self.vapi.l2_interface_vlan_tag_rewrite( |
| sw_if_index=self.pg1_11.sw_if_index, |
| vtr_op=L2_VTR_OP.L2_POP_1, |
| push_dot1q=11, |
| ) |
| self.pg1_11.admin_up() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.remote_ip4, |
| self.pg0.local_ip4, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| type=(VppEnum.vl_api_gre_tunnel_type_t.GRE_API_TUNNEL_TYPE_TEB), |
| ) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| VppBridgeDomainPort(self, bd1, p.tun_if).add_vpp_config() |
| VppBridgeDomainPort(self, bd1, self.pg1_11).add_vpp_config() |
| |
| self.vapi.cli("clear ipsec sa") |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreTebVlanIfEsp, self).tearDown() |
| self.pg1_11.admin_down() |
| self.pg1_11.remove_vpp_config() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreTebIfEspTra(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE TEB ESP - Tra tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| omac = "00:11:22:33:44:55" |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.omac) |
| self.assert_equal(rx[IP].dst, "1.1.1.2") |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[Ether] |
| self.assertEqual(e[Ether].dst, self.omac) |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreTebIfEspTra, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| type=(VppEnum.vl_api_gre_tunnel_type_t.GRE_API_TUNNEL_TYPE_TEB), |
| ) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| |
| VppBridgeDomainPort(self, bd1, p.tun_if).add_vpp_config() |
| VppBridgeDomainPort(self, bd1, self.pg1).add_vpp_config() |
| |
| self.vapi.cli("clear ipsec sa") |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreTebIfEspTra, self).tearDown() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreTebUdpIfEspTra(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE TEB UDP ESP - Tra tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| omac = "00:11:22:33:44:55" |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(dst=self.omac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.omac) |
| self.assert_equal(rx[IP].dst, "1.1.1.2") |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| self.assertTrue(rx.haslayer(UDP)) |
| self.assertEqual(rx[UDP].dport, 4545) |
| self.assertEqual(rx[UDP].sport, 5454) |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[Ether] |
| self.assertEqual(e[Ether].dst, self.omac) |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreTebUdpIfEspTra, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| p = self.ipv4_params |
| p.flags = VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_UDP_ENCAP |
| p.nat_header = UDP(sport=5454, dport=4545) |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=p.flags, |
| udp_src=5454, |
| udp_dst=4545, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| flags=( |
| p.flags | VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_IS_INBOUND |
| ), |
| udp_src=4545, |
| udp_dst=5454, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| type=(VppEnum.vl_api_gre_tunnel_type_t.GRE_API_TUNNEL_TYPE_TEB), |
| ) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| |
| VppBridgeDomainPort(self, bd1, p.tun_if).add_vpp_config() |
| VppBridgeDomainPort(self, bd1, self.pg1).add_vpp_config() |
| |
| self.vapi.cli("clear ipsec sa") |
| self.logger.info(self.vapi.cli("sh ipsec sa 0")) |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreTebUdpIfEspTra, self).tearDown() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreIfEsp(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE ESP - TUN tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / IP(src=self.pg1.local_ip4, dst=self.pg1.remote_ip4) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[GRE] |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreIfEsp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.local_ip4, |
| self.pg0.remote_ip4, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.remote_ip4, |
| self.pg0.local_ip4, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface(self, self.pg0.local_ip4, self.pg0.remote_ip4) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tun_params(p, self.encryption_type, p.tun_if) |
| |
| VppIpRoute( |
| self, "1.1.1.2", 32, [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)] |
| ).add_vpp_config() |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreIfEsp, self).tearDown() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGreIfEspTra(TemplateIpsec, IpsecTun4Tests): |
| """Ipsec GRE ESP - TRA tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / IP(src=self.pg1.local_ip4, dst=self.pg1.remote_ip4) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_encrypt_non_ip_pkts(self, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg0.remote_ip4, dst=self.pg0.local_ip4) |
| / GRE() |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IP(src="1.1.1.1", dst="1.1.1.2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[GRE] |
| self.assertEqual(e[IP].dst, "1.1.1.2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGreIfEspTra, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface(self, self.pg0.local_ip4, self.pg0.remote_ip4) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| |
| VppIpRoute( |
| self, "1.1.1.2", 32, [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)] |
| ).add_vpp_config() |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecGreIfEspTra, self).tearDown() |
| |
| def test_gre_non_ip(self): |
| p = self.ipv4_params |
| tx = self.gen_encrypt_non_ip_pkts( |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip6, |
| ) |
| self.send_and_assert_no_replies(self.tun_if, tx) |
| node_name = "/err/%s/unsup_payload" % self.tun4_decrypt_node_name[0] |
| self.assertEqual(1, self.statistics.get_err_counter(node_name)) |
| err = p.tun_sa_in.get_err("unsup_payload") |
| self.assertEqual(err, 1) |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecGre6IfEspTra(TemplateIpsec, IpsecTun6Tests): |
| """Ipsec GRE ESP - TRA tests""" |
| |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IPv6(src=self.pg0.remote_ip6, dst=self.pg0.local_ip6) |
| / GRE() |
| / IPv6(src=self.pg1.local_ip6, dst=self.pg1.remote_ip6) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts6(self, p, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IPv6(src="1::1", dst="1::2") |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted6(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IPv6].dst, self.pg1.remote_ip6) |
| |
| def verify_encrypted6(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IPv6]) |
| if not pkt.haslayer(IPv6): |
| pkt = IPv6(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[GRE] |
| self.assertEqual(e[IPv6].dst, "1::2") |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecGre6IfEspTra, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv6_params |
| |
| bd1 = VppBridgeDomain(self, 1) |
| bd1.add_vpp_config() |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_if = VppGreInterface(self, self.pg0.local_ip6, self.pg0.remote_ip6) |
| p.tun_if.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| p.tun_if.admin_up() |
| p.tun_if.config_ip6() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| |
| r = VppIpRoute( |
| self, |
| "1::2", |
| 128, |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, 0xFFFFFFFF, proto=DpoProto.DPO_PROTO_IP6 |
| ) |
| ], |
| ) |
| r.add_vpp_config() |
| |
| def tearDown(self): |
| p = self.ipv6_params |
| p.tun_if.unconfig_ip6() |
| super(TestIpsecGre6IfEspTra, self).tearDown() |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecMGreIfEspTra4(TemplateIpsec, IpsecTun4): |
| """Ipsec mGRE ESP v4 TRA tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=p.tun_dst, dst=self.pg0.local_ip4) |
| / GRE() |
| / IP(src=self.pg1.local_ip4, dst=self.pg1.remote_ip4) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IP(src="1.1.1.1", dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[GRE] |
| self.assertEqual(e[IP].dst, p.remote_tun_if_host) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecMGreIfEspTra4, self).setUp() |
| |
| N_NHS = 16 |
| self.tun_if = self.pg0 |
| p = self.ipv4_params |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip4, |
| "0.0.0.0", |
| mode=(VppEnum.vl_api_tunnel_mode_t.TUNNEL_API_MODE_MP), |
| ) |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| p.tun_if.generate_remote_hosts(N_NHS) |
| self.pg0.generate_remote_hosts(N_NHS) |
| self.pg0.configure_ipv4_neighbors() |
| |
| # setup some SAs for several next-hops on the interface |
| self.multi_params = [] |
| |
| for ii in range(N_NHS): |
| p = copy.copy(self.ipv4_params) |
| |
| p.remote_tun_if_host = "1.1.1.%d" % (ii + 1) |
| p.scapy_tun_sa_id = p.scapy_tun_sa_id + ii |
| p.scapy_tun_spi = p.scapy_tun_spi + ii |
| p.vpp_tun_sa_id = p.vpp_tun_sa_id + ii |
| p.vpp_tun_spi = p.vpp_tun_spi + ii |
| |
| p.scapy_tra_sa_id = p.scapy_tra_sa_id + ii |
| p.scapy_tra_spi = p.scapy_tra_spi + ii |
| p.vpp_tra_sa_id = p.vpp_tra_sa_id + ii |
| p.vpp_tra_spi = p.vpp_tra_spi + ii |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect( |
| self, |
| p.tun_if, |
| p.tun_sa_out, |
| [p.tun_sa_in], |
| nh=p.tun_if.remote_hosts[ii].ip4, |
| ) |
| p.tun_protect.add_vpp_config() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| self.multi_params.append(p) |
| |
| VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 32, |
| [VppRoutePath(p.tun_if.remote_hosts[ii].ip4, p.tun_if.sw_if_index)], |
| ).add_vpp_config() |
| |
| # in this v4 variant add the teibs after the protect |
| p.teib = VppTeib( |
| self, |
| p.tun_if, |
| p.tun_if.remote_hosts[ii].ip4, |
| self.pg0.remote_hosts[ii].ip4, |
| ).add_vpp_config() |
| p.tun_dst = self.pg0.remote_hosts[ii].ip4 |
| self.logger.info(self.vapi.cli("sh ipsec protect-hash")) |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecMGreIfEspTra4, self).tearDown() |
| |
| def test_tun_44(self): |
| """mGRE IPSEC 44""" |
| N_PKTS = 63 |
| for p in self.multi_params: |
| self.verify_tun_44(p, count=N_PKTS) |
| p.teib.remove_vpp_config() |
| self.verify_tun_dropped_44(p, count=N_PKTS) |
| p.teib.add_vpp_config() |
| self.verify_tun_44(p, count=N_PKTS) |
| |
| |
| @unittest.skipIf( |
| "gre" in config.excluded_plugins, "Exclude tests depending on GRE plugin" |
| ) |
| class TestIpsecMGreIfEspTra6(TemplateIpsec, IpsecTun6): |
| """Ipsec mGRE ESP v6 TRA tests""" |
| |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IPv6(src=p.tun_dst, dst=self.pg0.local_ip6) |
| / GRE() |
| / IPv6(src=self.pg1.local_ip6, dst=self.pg1.remote_ip6) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts6(self, p, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IPv6(src="1::1", dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted6(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IPv6].dst, self.pg1.remote_ip6) |
| |
| def verify_encrypted6(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IPv6]) |
| if not pkt.haslayer(IPv6): |
| pkt = IPv6(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assertTrue(pkt.haslayer(GRE)) |
| e = pkt[GRE] |
| self.assertEqual(e[IPv6].dst, p.remote_tun_if_host) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecMGreIfEspTra6, self).setUp() |
| |
| self.vapi.cli("set logging class ipsec level debug") |
| |
| N_NHS = 16 |
| self.tun_if = self.pg0 |
| p = self.ipv6_params |
| p.tun_if = VppGreInterface( |
| self, |
| self.pg0.local_ip6, |
| "::", |
| mode=(VppEnum.vl_api_tunnel_mode_t.TUNNEL_API_MODE_MP), |
| ) |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip6() |
| p.tun_if.generate_remote_hosts(N_NHS) |
| self.pg0.generate_remote_hosts(N_NHS) |
| self.pg0.configure_ipv6_neighbors() |
| |
| # setup some SAs for several next-hops on the interface |
| self.multi_params = [] |
| |
| for ii in range(N_NHS): |
| p = copy.copy(self.ipv6_params) |
| |
| p.remote_tun_if_host = "1::%d" % (ii + 1) |
| p.scapy_tun_sa_id = p.scapy_tun_sa_id + ii |
| p.scapy_tun_spi = p.scapy_tun_spi + ii |
| p.vpp_tun_sa_id = p.vpp_tun_sa_id + ii |
| p.vpp_tun_spi = p.vpp_tun_spi + ii |
| |
| p.scapy_tra_sa_id = p.scapy_tra_sa_id + ii |
| p.scapy_tra_spi = p.scapy_tra_spi + ii |
| p.vpp_tra_sa_id = p.vpp_tra_sa_id + ii |
| p.vpp_tra_spi = p.vpp_tra_spi + ii |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| # in this v6 variant add the teibs first then the protection |
| p.tun_dst = self.pg0.remote_hosts[ii].ip6 |
| VppTeib( |
| self, p.tun_if, p.tun_if.remote_hosts[ii].ip6, p.tun_dst |
| ).add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect( |
| self, |
| p.tun_if, |
| p.tun_sa_out, |
| [p.tun_sa_in], |
| nh=p.tun_if.remote_hosts[ii].ip6, |
| ) |
| p.tun_protect.add_vpp_config() |
| config_tra_params(p, self.encryption_type, p.tun_if) |
| self.multi_params.append(p) |
| |
| VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 128, |
| [VppRoutePath(p.tun_if.remote_hosts[ii].ip6, p.tun_if.sw_if_index)], |
| ).add_vpp_config() |
| p.tun_dst = self.pg0.remote_hosts[ii].ip6 |
| |
| self.logger.info(self.vapi.cli("sh log")) |
| self.logger.info(self.vapi.cli("sh ipsec protect-hash")) |
| self.logger.info(self.vapi.cli("sh adj 41")) |
| |
| def tearDown(self): |
| p = self.ipv6_params |
| p.tun_if.unconfig_ip6() |
| super(TestIpsecMGreIfEspTra6, self).tearDown() |
| |
| def test_tun_66(self): |
| """mGRE IPSec 66""" |
| for p in self.multi_params: |
| self.verify_tun_66(p, count=63) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec4TunProtect(TemplateIpsec, TemplateIpsec4TunProtect, IpsecTun4): |
| """IPsec IPv4 Tunnel protect - transport mode""" |
| |
| def setUp(self): |
| super(TestIpsec4TunProtect, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec4TunProtect, self).tearDown() |
| |
| def test_tun_44(self): |
| """IPSEC tunnel protect""" |
| |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| self.verify_tun_44(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| self.vapi.cli("clear ipsec sa") |
| self.verify_tun_64(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 254) |
| self.assertEqual(p.tun_if.get_tx_stats(), 254) |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tra(np) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_44(np, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 381) |
| self.assertEqual(p.tun_if.get_tx_stats(), 381) |
| |
| # teardown |
| self.unconfig_protect(np) |
| self.unconfig_sa(np) |
| self.unconfig_network(p) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec4TunProtectTfc(TemplateIpsec4TunTfc, TestIpsec4TunProtect): |
| """IPsec IPv4 Tunnel protect with TFC - transport mode""" |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec4TunProtectUdp(TemplateIpsec, TemplateIpsec4TunProtect, IpsecTun4): |
| """IPsec IPv4 UDP Tunnel protect - transport mode""" |
| |
| def setUp(self): |
| super(TestIpsec4TunProtectUdp, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| p = self.ipv4_params |
| p.flags = VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_UDP_ENCAP |
| p.nat_header = UDP(sport=4500, dport=4500) |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| super(TestIpsec4TunProtectUdp, self).tearDown() |
| |
| def verify_encrypted(self, p, sa, rxs): |
| # ensure encrypted packets are recieved with the default UDP ports |
| for rx in rxs: |
| self.assertEqual(rx[UDP].sport, 4500) |
| self.assertEqual(rx[UDP].dport, 4500) |
| super(TestIpsec4TunProtectUdp, self).verify_encrypted(p, sa, rxs) |
| |
| def test_tun_44(self): |
| """IPSEC UDP tunnel protect""" |
| |
| p = self.ipv4_params |
| |
| self.verify_tun_44(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| def test_keepalive(self): |
| """IPSEC NAT Keepalive""" |
| self.verify_keepalive(self.ipv4_params) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec4TunProtectUdpTfc(TemplateIpsec4TunTfc, TestIpsec4TunProtectUdp): |
| """IPsec IPv4 UDP Tunnel protect with TFC - transport mode""" |
| |
| |
| @tag_fixme_vpp_workers |
| @unittest.skipIf( |
| "acl" in config.excluded_plugins, "Exclude tests depending on ACL plugin" |
| ) |
| class TestIpsec4TunProtectTun(TemplateIpsec, TemplateIpsec4TunProtect, IpsecTun4): |
| """IPsec IPv4 Tunnel protect - tunnel mode""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec4TunProtectTun, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec4TunProtectTun, self).tearDown() |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=sw_intf.remote_ip4, dst=sw_intf.local_ip4) |
| / IP(src=src, dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IP(src=src, dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| self.assert_equal(rx[IP].src, p.remote_tun_if_host) |
| self.assert_packet_checksums_valid(rx) |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IP].dst, self.pg0.remote_ip4) |
| self.assert_equal(pkt[IP].src, self.pg0.local_ip4) |
| inner = pkt[IP].payload |
| self.assertEqual(inner[IP][IP].dst, p.remote_tun_if_host) |
| |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def test_tun_44(self): |
| """IPSEC tunnel protect""" |
| |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tun(p) |
| self.config_protect(p) |
| |
| # also add an output features on the tunnel and physical interface |
| # so we test they still work |
| r_all = AclRule(True, src_prefix="0.0.0.0/0", dst_prefix="0.0.0.0/0", proto=0) |
| a = VppAcl(self, [r_all]).add_vpp_config() |
| |
| VppAclInterface(self, self.pg0.sw_if_index, [a]).add_vpp_config() |
| VppAclInterface(self, p.tun_if.sw_if_index, [a]).add_vpp_config() |
| |
| self.verify_tun_44(p, count=127) |
| |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tun(np) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_44(np, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 254) |
| self.assertEqual(p.tun_if.get_tx_stats(), 254) |
| |
| # teardown |
| self.unconfig_protect(np) |
| self.unconfig_sa(np) |
| self.unconfig_network(p) |
| |
| |
| class TestIpsec4TunProtectTunDrop(TemplateIpsec, TemplateIpsec4TunProtect, IpsecTun4): |
| """IPsec IPv4 Tunnel protect - tunnel mode - drop""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec4TunProtectTunDrop, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec4TunProtectTunDrop, self).tearDown() |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=sw_intf.remote_ip4, dst="5.5.5.5") |
| / IP(src=src, dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def test_tun_drop_44(self): |
| """IPSEC tunnel protect bogus tunnel header""" |
| |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tun(p) |
| self.config_protect(p) |
| |
| tx = self.gen_encrypt_pkts( |
| p, |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip4, |
| count=63, |
| ) |
| self.send_and_assert_no_replies(self.tun_if, tx) |
| |
| # teardown |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec6TunProtect(TemplateIpsec, TemplateIpsec6TunProtect, IpsecTun6): |
| """IPsec IPv6 Tunnel protect - transport mode""" |
| |
| encryption_type = ESP |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6TunProtect, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec6TunProtect, self).tearDown() |
| |
| def test_tun_66(self): |
| """IPSEC tunnel protect 6o6""" |
| |
| p = self.ipv6_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| self.verify_tun_66(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tra(np) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_66(np, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 254) |
| self.assertEqual(p.tun_if.get_tx_stats(), 254) |
| |
| # bounce the interface state |
| p.tun_if.admin_down() |
| self.verify_drop_tun_66(np, count=127) |
| node = "/err/ipsec6-tun-input/disabled" |
| self.assertEqual(127, self.statistics.get_err_counter(node)) |
| p.tun_if.admin_up() |
| self.verify_tun_66(np, count=127) |
| |
| # 3 phase rekey |
| # 1) add two input SAs [old, new] |
| # 2) swap output SA to [new] |
| # 3) use only [new] input SA |
| np3 = copy.copy(np) |
| np3.crypt_key = b"Z" + p.crypt_key[1:] |
| np3.scapy_tun_spi += 100 |
| np3.scapy_tun_sa_id += 1 |
| np3.vpp_tun_spi += 100 |
| np3.vpp_tun_sa_id += 1 |
| np3.tun_if.local_spi = p.vpp_tun_spi |
| np3.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tra(np3) |
| |
| # step 1; |
| p.tun_protect.update_vpp_config(np.tun_sa_out, [np.tun_sa_in, np3.tun_sa_in]) |
| self.verify_tun_66(np, np, count=127) |
| self.verify_tun_66(np3, np, count=127) |
| |
| # step 2; |
| p.tun_protect.update_vpp_config(np3.tun_sa_out, [np.tun_sa_in, np3.tun_sa_in]) |
| self.verify_tun_66(np, np3, count=127) |
| self.verify_tun_66(np3, np3, count=127) |
| |
| # step 1; |
| p.tun_protect.update_vpp_config(np3.tun_sa_out, [np3.tun_sa_in]) |
| self.verify_tun_66(np3, np3, count=127) |
| self.verify_drop_tun_rx_66(np, count=127) |
| |
| self.assertEqual(p.tun_if.get_rx_stats(), 127 * 9) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127 * 8) |
| self.unconfig_sa(np) |
| |
| # teardown |
| self.unconfig_protect(np3) |
| self.unconfig_sa(np3) |
| self.unconfig_network(p) |
| |
| def test_tun_46(self): |
| """IPSEC tunnel protect 4o6""" |
| |
| p = self.ipv6_params |
| |
| self.config_network(p) |
| self.config_sa_tra(p) |
| self.config_protect(p) |
| |
| self.verify_tun_46(p, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| # teardown |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec6TunProtectTfc(TemplateIpsec6TunTfc, TestIpsec6TunProtect): |
| """IPsec IPv6 Tunnel protect with TFC - transport mode""" |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsec6TunProtectTun(TemplateIpsec, TemplateIpsec6TunProtect, IpsecTun6): |
| """IPsec IPv6 Tunnel protect - tunnel mode""" |
| |
| encryption_type = ESP |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6TunProtectTun, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec6TunProtectTun, self).tearDown() |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IPv6(src=sw_intf.remote_ip6, dst=sw_intf.local_ip6) |
| / IPv6(src=src, dst=dst) |
| / UDP(sport=1166, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts6(self, p, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IPv6(src=src, dst=dst) |
| / UDP(sport=1166, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted6(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[IPv6].dst, self.pg1.remote_ip6) |
| self.assert_equal(rx[IPv6].src, p.remote_tun_if_host) |
| self.assert_packet_checksums_valid(rx) |
| |
| def verify_encrypted6(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IPv6]) |
| if not pkt.haslayer(IPv6): |
| pkt = IPv6(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[IPv6].dst, self.pg0.remote_ip6) |
| self.assert_equal(pkt[IPv6].src, self.pg0.local_ip6) |
| inner = pkt[IPv6].payload |
| self.assertEqual(inner[IPv6][IPv6].dst, p.remote_tun_if_host) |
| |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def test_tun_66(self): |
| """IPSEC tunnel protect""" |
| |
| p = self.ipv6_params |
| |
| self.config_network(p) |
| self.config_sa_tun(p) |
| self.config_protect(p) |
| |
| self.verify_tun_66(p, count=127) |
| |
| self.assertEqual(p.tun_if.get_rx_stats(), 127) |
| self.assertEqual(p.tun_if.get_tx_stats(), 127) |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tun(np) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_66(np, count=127) |
| self.assertEqual(p.tun_if.get_rx_stats(), 254) |
| self.assertEqual(p.tun_if.get_tx_stats(), 254) |
| |
| # teardown |
| self.unconfig_protect(np) |
| self.unconfig_sa(np) |
| self.unconfig_network(p) |
| |
| |
| class TestIpsec6TunProtectTunDrop(TemplateIpsec, TemplateIpsec6TunProtect, IpsecTun6): |
| """IPsec IPv6 Tunnel protect - tunnel mode - drop""" |
| |
| encryption_type = ESP |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| |
| def setUp(self): |
| super(TestIpsec6TunProtectTunDrop, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsec6TunProtectTunDrop, self).tearDown() |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| # the IP destination of the revelaed packet does not match |
| # that assigned to the tunnel |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IPv6(src=sw_intf.remote_ip6, dst="5::5") |
| / IPv6(src=src, dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def test_tun_drop_66(self): |
| """IPSEC 6 tunnel protect bogus tunnel header""" |
| |
| p = self.ipv6_params |
| |
| self.config_network(p) |
| self.config_sa_tun(p) |
| self.config_protect(p) |
| |
| tx = self.gen_encrypt_pkts6( |
| p, |
| p.scapy_tun_sa, |
| self.tun_if, |
| src=p.remote_tun_if_host, |
| dst=self.pg1.remote_ip6, |
| count=63, |
| ) |
| self.send_and_assert_no_replies(self.tun_if, tx) |
| |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| class TemplateIpsecItf4(object): |
| """IPsec Interface IPv4""" |
| |
| encryption_type = ESP |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| tun4_input_node = "ipsec4-tun-input" |
| |
| def config_sa_tun(self, p, src, dst): |
| config_tun_params(p, self.encryption_type, None, src, dst) |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| src, |
| dst, |
| flags=p.flags, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| dst, |
| src, |
| flags=p.flags |
| | VppEnum.vl_api_ipsec_sad_flags_t.IPSEC_API_SAD_FLAG_IS_INBOUND, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_protect(self, p): |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| def config_network(self, p, instance=0xFFFFFFFF): |
| p.tun_if = VppIpsecInterface(self, instance=instance) |
| |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| p.tun_if.config_ip6() |
| |
| p.route = VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 32, |
| [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)], |
| ) |
| p.route.add_vpp_config() |
| r = VppIpRoute( |
| self, |
| p.remote_tun_if_host6, |
| 128, |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, 0xFFFFFFFF, proto=DpoProto.DPO_PROTO_IP6 |
| ) |
| ], |
| ) |
| r.add_vpp_config() |
| |
| def unconfig_network(self, p): |
| p.route.remove_vpp_config() |
| p.tun_if.remove_vpp_config() |
| |
| def unconfig_protect(self, p): |
| p.tun_protect.remove_vpp_config() |
| |
| def unconfig_sa(self, p): |
| p.tun_sa_out.remove_vpp_config() |
| p.tun_sa_in.remove_vpp_config() |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsecItf4(TemplateIpsec, TemplateIpsecItf4, IpsecTun4): |
| """IPsec Interface IPv4""" |
| |
| def setUp(self): |
| super(TestIpsecItf4, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsecItf4, self).tearDown() |
| |
| def test_tun_instance_44(self): |
| p = self.ipv4_params |
| self.config_network(p, instance=3) |
| |
| with self.assertRaises(CliFailedCommandError): |
| self.vapi.cli("show interface ipsec0") |
| |
| output = self.vapi.cli("show interface ipsec3") |
| self.assertTrue("unknown" not in output) |
| |
| self.unconfig_network(p) |
| |
| def test_tun_44(self): |
| """IPSEC interface IPv4""" |
| |
| n_pkts = 127 |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| config_tun_params( |
| p, self.encryption_type, None, self.pg0.local_ip4, self.pg0.remote_ip4 |
| ) |
| self.verify_tun_dropped_44(p, count=n_pkts) |
| self.config_sa_tun(p, self.pg0.local_ip4, self.pg0.remote_ip4) |
| self.config_protect(p) |
| |
| self.verify_tun_44(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| p.tun_if.admin_down() |
| self.verify_tun_dropped_44(p, count=n_pkts) |
| p.tun_if.admin_up() |
| self.verify_tun_44(p, count=n_pkts) |
| |
| self.assertEqual(p.tun_if.get_rx_stats(), 3 * n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), 2 * n_pkts) |
| |
| # it's a v6 packet when its encrypted |
| self.tun4_encrypt_node_name = "esp6-encrypt-tun" |
| |
| self.verify_tun_64(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), 4 * n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), 3 * n_pkts) |
| |
| self.tun4_encrypt_node_name = "esp4-encrypt-tun" |
| |
| # update the SA tunnel |
| config_tun_params( |
| p, self.encryption_type, None, self.pg2.local_ip4, self.pg2.remote_ip4 |
| ) |
| p.tun_sa_in.update_vpp_config( |
| is_tun=True, tun_src=self.pg2.remote_ip4, tun_dst=self.pg2.local_ip4 |
| ) |
| p.tun_sa_out.update_vpp_config( |
| is_tun=True, tun_src=self.pg2.local_ip4, tun_dst=self.pg2.remote_ip4 |
| ) |
| self.verify_tun_44(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), 5 * n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), 4 * n_pkts) |
| |
| self.vapi.cli("clear interfaces") |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| |
| self.config_sa_tun(np, self.pg0.local_ip4, self.pg0.remote_ip4) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_44(np, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| # teardown |
| self.unconfig_protect(np) |
| self.unconfig_sa(np) |
| self.unconfig_network(p) |
| |
| def test_tun_44_null(self): |
| """IPSEC interface IPv4 NULL auth/crypto""" |
| |
| n_pkts = 127 |
| p = copy.copy(self.ipv4_params) |
| |
| p.auth_algo_vpp_id = VppEnum.vl_api_ipsec_integ_alg_t.IPSEC_API_INTEG_ALG_NONE |
| p.crypt_algo_vpp_id = ( |
| VppEnum.vl_api_ipsec_crypto_alg_t.IPSEC_API_CRYPTO_ALG_NONE |
| ) |
| p.crypt_algo = "NULL" |
| p.auth_algo = "NULL" |
| |
| self.config_network(p) |
| self.config_sa_tun(p, self.pg0.local_ip4, self.pg0.remote_ip4) |
| self.config_protect(p) |
| |
| self.logger.info(self.vapi.cli("sh ipsec sa")) |
| self.verify_tun_44(p, count=n_pkts) |
| |
| # teardown |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| def test_tun_44_police(self): |
| """IPSEC interface IPv4 with input policer""" |
| n_pkts = 127 |
| p = self.ipv4_params |
| |
| self.config_network(p) |
| self.config_sa_tun(p, self.pg0.local_ip4, self.pg0.remote_ip4) |
| self.config_protect(p) |
| |
| action_tx = PolicerAction( |
| VppEnum.vl_api_sse2_qos_action_type_t.SSE2_QOS_ACTION_API_TRANSMIT, 0 |
| ) |
| policer = VppPolicer( |
| self, |
| "pol1", |
| 80, |
| 0, |
| 1000, |
| 0, |
| conform_action=action_tx, |
| exceed_action=action_tx, |
| violate_action=action_tx, |
| ) |
| policer.add_vpp_config() |
| |
| # Start policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, True) |
| |
| self.verify_tun_44(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| stats = policer.get_stats() |
| |
| # Single rate, 2 colour policer - expect conform, violate but no exceed |
| self.assertGreater(stats["conform_packets"], 0) |
| self.assertEqual(stats["exceed_packets"], 0) |
| self.assertGreater(stats["violate_packets"], 0) |
| |
| # Stop policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, False) |
| self.verify_tun_44(p, count=n_pkts) |
| |
| # No new policer stats |
| statsnew = policer.get_stats() |
| self.assertEqual(stats, statsnew) |
| |
| # teardown |
| policer.remove_vpp_config() |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsecItf4Tfc(TemplateIpsec4TunTfc, TestIpsecItf4): |
| """IPsec Interface IPv4 with TFC""" |
| |
| |
| class TestIpsecItf4MPLS(TemplateIpsec, TemplateIpsecItf4, IpsecTun4): |
| """IPsec Interface MPLSoIPv4""" |
| |
| tun4_encrypt_node_name = "esp-mpls-encrypt-tun" |
| |
| def setUp(self): |
| super(TestIpsecItf4MPLS, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsecItf4MPLS, self).tearDown() |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| MPLS(label=44, ttl=3) |
| / IP(src=src, dst=dst) |
| / UDP(sport=1166, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[MPLS].label, 44) |
| self.assert_equal(pkt[IP].dst, p.remote_tun_if_host) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def test_tun_mpls_o_ip4(self): |
| """IPSEC interface MPLS over IPv4""" |
| |
| n_pkts = 127 |
| p = self.ipv4_params |
| f = FibPathProto |
| |
| tbl = VppMplsTable(self, 0) |
| tbl.add_vpp_config() |
| |
| self.config_network(p) |
| # deag MPLS routes from the tunnel |
| r4 = VppMplsRoute( |
| self, 44, 1, [VppRoutePath(self.pg1.remote_ip4, self.pg1.sw_if_index)] |
| ).add_vpp_config() |
| p.route.modify( |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip4, p.tun_if.sw_if_index, labels=[VppMplsLabel(44)] |
| ) |
| ] |
| ) |
| p.tun_if.enable_mpls() |
| |
| self.config_sa_tun(p, self.pg0.local_ip4, self.pg0.remote_ip4) |
| self.config_protect(p) |
| |
| self.verify_tun_44(p, count=n_pkts) |
| |
| # cleanup |
| p.tun_if.disable_mpls() |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| class TemplateIpsecItf6(object): |
| """IPsec Interface IPv6""" |
| |
| encryption_type = ESP |
| tun6_encrypt_node_name = "esp6-encrypt-tun" |
| tun6_decrypt_node_name = ["esp6-decrypt-tun", "esp6-decrypt-tun-post"] |
| tun6_input_node = "ipsec6-tun-input" |
| |
| def config_sa_tun(self, p, src, dst): |
| config_tun_params(p, self.encryption_type, None, src, dst) |
| |
| if not hasattr(p, "tun_flags"): |
| p.tun_flags = None |
| if not hasattr(p, "hop_limit"): |
| p.hop_limit = 255 |
| |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| src, |
| dst, |
| flags=p.flags, |
| tun_flags=p.tun_flags, |
| hop_limit=p.hop_limit, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| dst, |
| src, |
| flags=p.flags, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| def config_protect(self, p): |
| p.tun_protect = VppIpsecTunProtect(self, p.tun_if, p.tun_sa_out, [p.tun_sa_in]) |
| p.tun_protect.add_vpp_config() |
| |
| def config_network(self, p): |
| p.tun_if = VppIpsecInterface(self) |
| |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| p.tun_if.config_ip6() |
| |
| r = VppIpRoute( |
| self, |
| p.remote_tun_if_host4, |
| 32, |
| [VppRoutePath(p.tun_if.remote_ip4, 0xFFFFFFFF)], |
| ) |
| r.add_vpp_config() |
| |
| p.route = VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 128, |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, 0xFFFFFFFF, proto=DpoProto.DPO_PROTO_IP6 |
| ) |
| ], |
| ) |
| p.route.add_vpp_config() |
| |
| def unconfig_network(self, p): |
| p.route.remove_vpp_config() |
| p.tun_if.remove_vpp_config() |
| |
| def unconfig_protect(self, p): |
| p.tun_protect.remove_vpp_config() |
| |
| def unconfig_sa(self, p): |
| p.tun_sa_out.remove_vpp_config() |
| p.tun_sa_in.remove_vpp_config() |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsecItf6(TemplateIpsec, TemplateIpsecItf6, IpsecTun6): |
| """IPsec Interface IPv6""" |
| |
| def setUp(self): |
| super(TestIpsecItf6, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsecItf6, self).tearDown() |
| |
| def test_tun_66(self): |
| """IPSEC interface IPv6""" |
| |
| tf = VppEnum.vl_api_tunnel_encap_decap_flags_t |
| n_pkts = 127 |
| p = self.ipv6_params |
| p.inner_hop_limit = 24 |
| p.outer_hop_limit = 23 |
| p.outer_flow_label = 243224 |
| p.tun_flags = tf.TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_HOP_LIMIT |
| |
| self.config_network(p) |
| config_tun_params( |
| p, self.encryption_type, None, self.pg0.local_ip6, self.pg0.remote_ip6 |
| ) |
| self.verify_drop_tun_66(p, count=n_pkts) |
| self.config_sa_tun(p, self.pg0.local_ip6, self.pg0.remote_ip6) |
| self.config_protect(p) |
| |
| self.verify_tun_66(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| p.tun_if.admin_down() |
| self.verify_drop_tun_66(p, count=n_pkts) |
| p.tun_if.admin_up() |
| self.verify_tun_66(p, count=n_pkts) |
| |
| self.assertEqual(p.tun_if.get_rx_stats(), 3 * n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), 2 * n_pkts) |
| |
| # it's a v4 packet when its encrypted |
| self.tun6_encrypt_node_name = "esp4-encrypt-tun" |
| |
| self.verify_tun_46(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), 4 * n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), 3 * n_pkts) |
| |
| self.tun6_encrypt_node_name = "esp6-encrypt-tun" |
| |
| self.vapi.cli("clear interfaces") |
| |
| # rekey - create new SAs and update the tunnel protection |
| np = copy.copy(p) |
| np.crypt_key = b"X" + p.crypt_key[1:] |
| np.scapy_tun_spi += 100 |
| np.scapy_tun_sa_id += 1 |
| np.vpp_tun_spi += 100 |
| np.vpp_tun_sa_id += 1 |
| np.tun_if.local_spi = p.vpp_tun_spi |
| np.tun_if.remote_spi = p.scapy_tun_spi |
| np.inner_hop_limit = 24 |
| np.outer_hop_limit = 128 |
| np.inner_flow_label = 0xABCDE |
| np.outer_flow_label = 0xABCDE |
| np.hop_limit = 128 |
| np.tun_flags = tf.TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_FLOW_LABEL |
| |
| self.config_sa_tun(np, self.pg0.local_ip6, self.pg0.remote_ip6) |
| self.config_protect(np) |
| self.unconfig_sa(p) |
| |
| self.verify_tun_66(np, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| # teardown |
| self.unconfig_protect(np) |
| self.unconfig_sa(np) |
| self.unconfig_network(p) |
| |
| def test_tun_66_police(self): |
| """IPSEC interface IPv6 with input policer""" |
| tf = VppEnum.vl_api_tunnel_encap_decap_flags_t |
| n_pkts = 127 |
| p = self.ipv6_params |
| p.inner_hop_limit = 24 |
| p.outer_hop_limit = 23 |
| p.outer_flow_label = 243224 |
| p.tun_flags = tf.TUNNEL_API_ENCAP_DECAP_FLAG_ENCAP_COPY_HOP_LIMIT |
| |
| self.config_network(p) |
| self.config_sa_tun(p, self.pg0.local_ip6, self.pg0.remote_ip6) |
| self.config_protect(p) |
| |
| action_tx = PolicerAction( |
| VppEnum.vl_api_sse2_qos_action_type_t.SSE2_QOS_ACTION_API_TRANSMIT, 0 |
| ) |
| policer = VppPolicer( |
| self, |
| "pol1", |
| 80, |
| 0, |
| 1000, |
| 0, |
| conform_action=action_tx, |
| exceed_action=action_tx, |
| violate_action=action_tx, |
| ) |
| policer.add_vpp_config() |
| |
| # Start policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, True) |
| |
| self.verify_tun_66(p, count=n_pkts) |
| self.assertEqual(p.tun_if.get_rx_stats(), n_pkts) |
| self.assertEqual(p.tun_if.get_tx_stats(), n_pkts) |
| |
| stats = policer.get_stats() |
| |
| # Single rate, 2 colour policer - expect conform, violate but no exceed |
| self.assertGreater(stats["conform_packets"], 0) |
| self.assertEqual(stats["exceed_packets"], 0) |
| self.assertGreater(stats["violate_packets"], 0) |
| |
| # Stop policing on tun |
| policer.apply_vpp_config(p.tun_if.sw_if_index, Dir.RX, False) |
| self.verify_tun_66(p, count=n_pkts) |
| |
| # No new policer stats |
| statsnew = policer.get_stats() |
| self.assertEqual(stats, statsnew) |
| |
| # teardown |
| policer.remove_vpp_config() |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| @tag_fixme_vpp_workers |
| class TestIpsecItf6Tfc(TemplateIpsec6TunTfc, TestIpsecItf6): |
| """IPsec Interface IPv6 with TFC""" |
| |
| |
| @unittest.skipIf( |
| "acl" in config.excluded_plugins, "Exclude tests depending on ACL plugin" |
| ) |
| class TestIpsecMIfEsp4(TemplateIpsec, IpsecTun4): |
| """Ipsec P2MP ESP v4 tests""" |
| |
| tun4_encrypt_node_name = "esp4-encrypt-tun" |
| tun4_decrypt_node_name = ["esp4-decrypt-tun", "esp4-decrypt-tun-post"] |
| encryption_type = ESP |
| |
| def gen_encrypt_pkts(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| IP(src=self.pg1.local_ip4, dst=self.pg1.remote_ip4) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def gen_pkts(self, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / IP(src="1.1.1.1", dst=dst) |
| / UDP(sport=1144, dport=2233) |
| / Raw(b"X" * payload_size) |
| for i in range(count) |
| ] |
| |
| def verify_decrypted(self, p, rxs): |
| for rx in rxs: |
| self.assert_equal(rx[Ether].dst, self.pg1.remote_mac) |
| self.assert_equal(rx[IP].dst, self.pg1.remote_ip4) |
| |
| def verify_encrypted(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| self.assertEqual( |
| rx[IP].tos, VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_EF << 2 |
| ) |
| self.assertEqual(rx[IP].ttl, p.hop_limit) |
| pkt = sa.decrypt(rx[IP]) |
| if not pkt.haslayer(IP): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| e = pkt[IP] |
| self.assertEqual(e[IP].dst, p.remote_tun_if_host) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def setUp(self): |
| super(TestIpsecMIfEsp4, self).setUp() |
| |
| N_NHS = 16 |
| self.tun_if = self.pg0 |
| p = self.ipv4_params |
| p.tun_if = VppIpsecInterface( |
| self, mode=(VppEnum.vl_api_tunnel_mode_t.TUNNEL_API_MODE_MP) |
| ) |
| p.tun_if.add_vpp_config() |
| p.tun_if.admin_up() |
| p.tun_if.config_ip4() |
| p.tun_if.unconfig_ip4() |
| p.tun_if.config_ip4() |
| p.tun_if.generate_remote_hosts(N_NHS) |
| self.pg0.generate_remote_hosts(N_NHS) |
| self.pg0.configure_ipv4_neighbors() |
| |
| r_all = AclRule(True, src_prefix="0.0.0.0/0", dst_prefix="0.0.0.0/0", proto=0) |
| a = VppAcl(self, [r_all]).add_vpp_config() |
| |
| VppAclInterface(self, self.pg0.sw_if_index, [a]).add_vpp_config() |
| VppAclInterface(self, p.tun_if.sw_if_index, [a]).add_vpp_config() |
| |
| # setup some SAs for several next-hops on the interface |
| self.multi_params = [] |
| |
| for ii in range(N_NHS): |
| p = copy.copy(self.ipv4_params) |
| |
| p.remote_tun_if_host = "1.1.1.%d" % (ii + 1) |
| p.scapy_tun_sa_id = p.scapy_tun_sa_id + ii |
| p.scapy_tun_spi = p.scapy_tun_spi + ii |
| p.vpp_tun_sa_id = p.vpp_tun_sa_id + ii |
| p.vpp_tun_spi = p.vpp_tun_spi + ii |
| |
| p.scapy_tra_sa_id = p.scapy_tra_sa_id + ii |
| p.scapy_tra_spi = p.scapy_tra_spi + ii |
| p.vpp_tra_sa_id = p.vpp_tra_sa_id + ii |
| p.vpp_tra_spi = p.vpp_tra_spi + ii |
| p.hop_limit = ii + 10 |
| p.tun_sa_out = VppIpsecSA( |
| self, |
| p.vpp_tun_sa_id, |
| p.vpp_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.local_ip4, |
| self.pg0.remote_hosts[ii].ip4, |
| dscp=VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_EF, |
| hop_limit=p.hop_limit, |
| ) |
| p.tun_sa_out.add_vpp_config() |
| |
| p.tun_sa_in = VppIpsecSA( |
| self, |
| p.scapy_tun_sa_id, |
| p.scapy_tun_spi, |
| p.auth_algo_vpp_id, |
| p.auth_key, |
| p.crypt_algo_vpp_id, |
| p.crypt_key, |
| self.vpp_esp_protocol, |
| self.pg0.remote_hosts[ii].ip4, |
| self.pg0.local_ip4, |
| dscp=VppEnum.vl_api_ip_dscp_t.IP_API_DSCP_EF, |
| hop_limit=p.hop_limit, |
| ) |
| p.tun_sa_in.add_vpp_config() |
| |
| p.tun_protect = VppIpsecTunProtect( |
| self, |
| p.tun_if, |
| p.tun_sa_out, |
| [p.tun_sa_in], |
| nh=p.tun_if.remote_hosts[ii].ip4, |
| ) |
| p.tun_protect.add_vpp_config() |
| config_tun_params( |
| p, |
| self.encryption_type, |
| None, |
| self.pg0.local_ip4, |
| self.pg0.remote_hosts[ii].ip4, |
| ) |
| self.multi_params.append(p) |
| |
| p.via_tun_route = VppIpRoute( |
| self, |
| p.remote_tun_if_host, |
| 32, |
| [VppRoutePath(p.tun_if.remote_hosts[ii].ip4, p.tun_if.sw_if_index)], |
| ).add_vpp_config() |
| |
| p.tun_dst = self.pg0.remote_hosts[ii].ip4 |
| |
| def tearDown(self): |
| p = self.ipv4_params |
| p.tun_if.unconfig_ip4() |
| super(TestIpsecMIfEsp4, self).tearDown() |
| |
| def test_tun_44(self): |
| """P2MP IPSEC 44""" |
| N_PKTS = 63 |
| for p in self.multi_params: |
| self.verify_tun_44(p, count=N_PKTS) |
| |
| # remove one tunnel protect, the rest should still work |
| self.multi_params[0].tun_protect.remove_vpp_config() |
| self.verify_tun_dropped_44(self.multi_params[0], count=N_PKTS) |
| self.multi_params[0].via_tun_route.remove_vpp_config() |
| self.verify_tun_dropped_44(self.multi_params[0], count=N_PKTS) |
| |
| for p in self.multi_params[1:]: |
| self.verify_tun_44(p, count=N_PKTS) |
| |
| self.multi_params[0].tun_protect.add_vpp_config() |
| self.multi_params[0].via_tun_route.add_vpp_config() |
| |
| for p in self.multi_params: |
| self.verify_tun_44(p, count=N_PKTS) |
| |
| |
| class TestIpsecItf6MPLS(TemplateIpsec, TemplateIpsecItf6, IpsecTun6): |
| """IPsec Interface MPLSoIPv6""" |
| |
| tun6_encrypt_node_name = "esp-mpls-encrypt-tun" |
| |
| def setUp(self): |
| super(TestIpsecItf6MPLS, self).setUp() |
| |
| self.tun_if = self.pg0 |
| |
| def tearDown(self): |
| super(TestIpsecItf6MPLS, self).tearDown() |
| |
| def gen_encrypt_pkts6(self, p, sa, sw_intf, src, dst, count=1, payload_size=100): |
| return [ |
| Ether(src=sw_intf.remote_mac, dst=sw_intf.local_mac) |
| / sa.encrypt( |
| MPLS(label=66, ttl=3) |
| / IPv6(src=src, dst=dst) |
| / UDP(sport=1166, dport=2233) |
| / Raw(b"X" * payload_size) |
| ) |
| for i in range(count) |
| ] |
| |
| def verify_encrypted6(self, p, sa, rxs): |
| for rx in rxs: |
| try: |
| pkt = sa.decrypt(rx[IPv6]) |
| if not pkt.haslayer(IPv6): |
| pkt = IP(pkt[Raw].load) |
| self.assert_packet_checksums_valid(pkt) |
| self.assert_equal(pkt[MPLS].label, 66) |
| self.assert_equal(pkt[IPv6].dst, p.remote_tun_if_host) |
| except (IndexError, AssertionError): |
| self.logger.debug(ppp("Unexpected packet:", rx)) |
| try: |
| self.logger.debug(ppp("Decrypted packet:", pkt)) |
| except: |
| pass |
| raise |
| |
| def test_tun_mpls_o_ip6(self): |
| """IPSEC interface MPLS over IPv6""" |
| |
| n_pkts = 127 |
| p = self.ipv6_params |
| f = FibPathProto |
| |
| tbl = VppMplsTable(self, 0) |
| tbl.add_vpp_config() |
| |
| self.config_network(p) |
| # deag MPLS routes from the tunnel |
| r6 = VppMplsRoute( |
| self, |
| 66, |
| 1, |
| [VppRoutePath(self.pg1.remote_ip6, self.pg1.sw_if_index)], |
| eos_proto=f.FIB_PATH_NH_PROTO_IP6, |
| ).add_vpp_config() |
| p.route.modify( |
| [ |
| VppRoutePath( |
| p.tun_if.remote_ip6, p.tun_if.sw_if_index, labels=[VppMplsLabel(66)] |
| ) |
| ] |
| ) |
| p.tun_if.enable_mpls() |
| |
| self.config_sa_tun(p, self.pg0.local_ip6, self.pg0.remote_ip6) |
| self.config_protect(p) |
| |
| self.verify_tun_66(p, count=n_pkts) |
| |
| # cleanup |
| p.tun_if.disable_mpls() |
| self.unconfig_protect(p) |
| self.unconfig_sa(p) |
| self.unconfig_network(p) |
| |
| |
| if __name__ == "__main__": |
| unittest.main(testRunner=VppTestRunner) |