blob: 3f0a6d9faf6077fc17d0b7a59477f6a9dc73c130 [file] [log] [blame]
Renato Botelho do Coutoead1e532019-10-31 13:31:07 -05001#!/usr/bin/env python3
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +02002""" ACL plugin extended stateful tests """
3
4import unittest
Klement Sekerab23ffd72021-05-31 16:08:53 +02005from config import config
Dave Wallace8800f732023-08-31 00:47:44 -04006from framework import VppTestCase
Andrew Yourtchenkob639b592017-08-09 11:28:02 +02007from scapy.layers.inet import IP, UDP, TCP
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +02008from scapy.packet import Packet
Dave Wallace8800f732023-08-31 00:47:44 -04009from socket import AF_INET, AF_INET6
10from scapy.layers.inet6 import IPv6
Andrew Yourtchenko92dc12a2017-09-07 13:22:24 +020011from util import L4_Conn
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010012from ipaddress import ip_network
13
14from vpp_acl import AclRule, VppAcl, VppAclInterface
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020015
16
17def to_acl_rule(self, is_permit, wildcard_sport=False):
18 p = self
19 rule_family = AF_INET6 if p.haslayer(IPv6) else AF_INET
20 rule_prefix_len = 128 if p.haslayer(IPv6) else 32
21 rule_l3_layer = IPv6 if p.haslayer(IPv6) else IP
22 rule_l4_sport = p.sport
23 rule_l4_dport = p.dport
24 if p.haslayer(IPv6):
25 rule_l4_proto = p[IPv6].nh
26 else:
27 rule_l4_proto = p[IP].proto
28
29 if wildcard_sport:
30 rule_l4_sport_first = 0
31 rule_l4_sport_last = 65535
32 else:
33 rule_l4_sport_first = rule_l4_sport
34 rule_l4_sport_last = rule_l4_sport
35
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020036 new_rule = AclRule(
37 is_permit=is_permit,
38 proto=rule_l4_proto,
39 src_prefix=ip_network((p[rule_l3_layer].src, rule_prefix_len)),
40 dst_prefix=ip_network((p[rule_l3_layer].dst, rule_prefix_len)),
41 sport_from=rule_l4_sport_first,
42 sport_to=rule_l4_sport_last,
43 dport_from=rule_l4_dport,
44 dport_to=rule_l4_dport,
45 )
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010046
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020047 return new_rule
48
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010049
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020050Packet.to_acl_rule = to_acl_rule
51
52
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020053class IterateWithSleep:
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020054 def __init__(self, testcase, n_iters, description, sleep_sec):
55 self.curr = 0
56 self.testcase = testcase
57 self.n_iters = n_iters
58 self.sleep_sec = sleep_sec
59 self.description = description
60
61 def __iter__(self):
62 for x in range(0, self.n_iters):
63 yield x
64 self.testcase.sleep(self.sleep_sec)
65
66
Andrew Yourtchenko92dc12a2017-09-07 13:22:24 +020067class Conn(L4_Conn):
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020068 def apply_acls(self, reflect_side, acl_side):
69 pkts = []
70 pkts.append(self.pkt(0))
71 pkts.append(self.pkt(1))
72 pkt = pkts[reflect_side]
73
74 r = []
75 r.append(pkt.to_acl_rule(2, wildcard_sport=True))
76 r.append(self.wildcard_rule(0))
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010077 reflect_acl = VppAcl(self.testcase, r)
78 reflect_acl.add_vpp_config()
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020079
80 r = []
81 r.append(self.wildcard_rule(0))
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010082 deny_acl = VppAcl(self.testcase, r)
83 deny_acl.add_vpp_config()
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020084
85 if reflect_side == acl_side:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020086 acl_if0 = VppAclInterface(
87 self.testcase,
88 self.ifs[acl_side].sw_if_index,
89 [reflect_acl, deny_acl],
90 n_input=1,
91 )
92 acl_if1 = VppAclInterface(
93 self.testcase, self.ifs[1 - acl_side].sw_if_index, [], n_input=0
94 )
Jakub Grajciar2f8cd912020-03-27 06:55:06 +010095 acl_if0.add_vpp_config()
96 acl_if1.add_vpp_config()
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +020097 else:
Klement Sekerad9b0c6f2022-04-26 19:02:15 +020098 acl_if0 = VppAclInterface(
99 self.testcase,
100 self.ifs[acl_side].sw_if_index,
101 [deny_acl, reflect_acl],
102 n_input=1,
103 )
104 acl_if1 = VppAclInterface(
105 self.testcase, self.ifs[1 - acl_side].sw_if_index, [], n_input=0
106 )
Jakub Grajciar2f8cd912020-03-27 06:55:06 +0100107 acl_if0.add_vpp_config()
108 acl_if1.add_vpp_config()
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200109
110 def wildcard_rule(self, is_permit):
111 any_addr = ["0.0.0.0", "::"]
112 rule_family = self.address_family
113 is_ip6 = 1 if rule_family == AF_INET6 else 0
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200114 new_rule = AclRule(
115 is_permit=is_permit,
116 proto=0,
117 src_prefix=ip_network((any_addr[is_ip6], 0)),
118 dst_prefix=ip_network((any_addr[is_ip6], 0)),
119 sport_from=0,
120 sport_to=65535,
121 dport_from=0,
122 dport_to=65535,
123 )
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200124 return new_rule
125
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200126
Klement Sekerab23ffd72021-05-31 16:08:53 +0200127@unittest.skipUnless(config.extended, "part of extended tests")
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200128class ACLPluginConnTestCase(VppTestCase):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200129 """ACL plugin connection-oriented extended testcases"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200130
131 @classmethod
Paul Vinciguerrac29a0ea2018-11-24 21:57:08 -0800132 def setUpClass(cls):
133 super(ACLPluginConnTestCase, cls).setUpClass()
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200134 # create pg0 and pg1
Paul Vinciguerrac29a0ea2018-11-24 21:57:08 -0800135 cls.create_pg_interfaces(range(2))
Andrew Yourtchenko1c6e5cf2018-02-05 17:27:57 +0100136 cmd = "set acl-plugin session table event-trace 1"
Paul Vinciguerrac29a0ea2018-11-24 21:57:08 -0800137 cls.logger.info(cls.vapi.cli(cmd))
138 for i in cls.pg_interfaces:
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200139 i.admin_up()
140 i.config_ip4()
141 i.config_ip6()
142 i.resolve_arp()
143 i.resolve_ndp()
144
Paul Vinciguerra8d991d92019-01-25 14:05:48 -0800145 @classmethod
146 def tearDownClass(cls):
147 super(ACLPluginConnTestCase, cls).tearDownClass()
148
Andrew Yourtchenko7f4d5772017-05-24 13:20:47 +0200149 def tearDown(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200150 """Run standard test teardown and log various show commands"""
Andrew Yourtchenko7f4d5772017-05-24 13:20:47 +0200151 super(ACLPluginConnTestCase, self).tearDown()
Paul Vinciguerra90cf21b2019-03-13 09:23:05 -0700152
153 def show_commands_at_teardown(self):
Neale Rannscbe25aa2019-09-30 10:53:31 +0000154 self.logger.info(self.vapi.cli("show ip neighbors"))
Paul Vinciguerra90cf21b2019-03-13 09:23:05 -0700155 self.logger.info(self.vapi.cli("show ip6 neighbors"))
156 self.logger.info(self.vapi.cli("show acl-plugin sessions"))
157 self.logger.info(self.vapi.cli("show acl-plugin acl"))
158 self.logger.info(self.vapi.cli("show acl-plugin interface"))
159 self.logger.info(self.vapi.cli("show acl-plugin tables"))
160 self.logger.info(self.vapi.cli("show event-logger all"))
Andrew Yourtchenko7f4d5772017-05-24 13:20:47 +0200161
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200162 def run_basic_conn_test(self, af, acl_side):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200163 """Basic conn timeout test"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200164 conn1 = Conn(self, self.pg0, self.pg1, af, UDP, 42001, 4242)
165 conn1.apply_acls(0, acl_side)
166 conn1.send_through(0)
167 # the return packets should pass
168 conn1.send_through(1)
169 # send some packets on conn1, ensure it doesn't go away
170 for i in IterateWithSleep(self, 20, "Keep conn active", 0.3):
171 conn1.send_through(1)
172 # allow the conn to time out
173 for i in IterateWithSleep(self, 30, "Wait for timeout", 0.1):
174 pass
175 # now try to send a packet on the reflected side
176 try:
177 p2 = conn1.send_through(1).command()
178 except:
179 # If we asserted while waiting, it's good.
180 # the conn should have timed out.
181 p2 = None
182 self.assert_equal(p2, None, "packet on long-idle conn")
183
184 def run_active_conn_test(self, af, acl_side):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200185 """Idle connection behind active connection test"""
186 base = 10000 + 1000 * acl_side
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200187 conn1 = Conn(self, self.pg0, self.pg1, af, UDP, base + 1, 2323)
188 conn2 = Conn(self, self.pg0, self.pg1, af, UDP, base + 2, 2323)
189 conn3 = Conn(self, self.pg0, self.pg1, af, UDP, base + 3, 2323)
190 conn1.apply_acls(0, acl_side)
191 conn1.send(0)
192 conn1.recv(1)
193 # create and check that the conn2/3 work
194 self.sleep(0.1)
195 conn2.send_pingpong(0)
196 self.sleep(0.1)
197 conn3.send_pingpong(0)
198 # send some packets on conn1, keep conn2/3 idle
199 for i in IterateWithSleep(self, 20, "Keep conn active", 0.2):
200 conn1.send_through(1)
201 try:
202 p2 = conn2.send_through(1).command()
203 except:
204 # If we asserted while waiting, it's good.
205 # the conn should have timed out.
206 p2 = None
207 # We should have not received the packet on a long-idle
208 # connection, because it should have timed out
209 # If it didn't - it is a problem
210 self.assert_equal(p2, None, "packet on long-idle conn")
211
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200212 def run_clear_conn_test(self, af, acl_side):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200213 """Clear the connections via CLI"""
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200214 conn1 = Conn(self, self.pg0, self.pg1, af, UDP, 42001, 4242)
215 conn1.apply_acls(0, acl_side)
216 conn1.send_through(0)
217 # the return packets should pass
218 conn1.send_through(1)
219 # send some packets on conn1, ensure it doesn't go away
220 for i in IterateWithSleep(self, 20, "Keep conn active", 0.3):
221 conn1.send_through(1)
222 # clear all connections
223 self.vapi.ppcli("clear acl-plugin sessions")
224 # now try to send a packet on the reflected side
225 try:
226 p2 = conn1.send_through(1).command()
227 except:
228 # If we asserted while waiting, it's good.
229 # the conn should have timed out.
230 p2 = None
231 self.assert_equal(p2, None, "packet on supposedly deleted conn")
232
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200233 def run_tcp_transient_setup_conn_test(self, af, acl_side):
234 conn1 = Conn(self, self.pg0, self.pg1, af, TCP, 53001, 5151)
235 conn1.apply_acls(0, acl_side)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200236 conn1.send_through(0, "S")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200237 # the return packets should pass
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200238 conn1.send_through(1, "SA")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200239 # allow the conn to time out
240 for i in IterateWithSleep(self, 30, "Wait for timeout", 0.1):
241 pass
242 # ensure conn times out
243 try:
244 p2 = conn1.send_through(1).command()
245 except:
246 # If we asserted while waiting, it's good.
247 # the conn should have timed out.
248 p2 = None
249 self.assert_equal(p2, None, "packet on supposedly deleted conn")
250
251 def run_tcp_established_conn_test(self, af, acl_side):
252 conn1 = Conn(self, self.pg0, self.pg1, af, TCP, 53002, 5052)
253 conn1.apply_acls(0, acl_side)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200254 conn1.send_through(0, "S")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200255 # the return packets should pass
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200256 conn1.send_through(1, "SA")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200257 # complete the threeway handshake
258 # (NB: sequence numbers not tracked, so not set!)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200259 conn1.send_through(0, "A")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200260 # allow the conn to time out if it's in embryonic timer
261 for i in IterateWithSleep(self, 30, "Wait for transient timeout", 0.1):
262 pass
263 # Try to send the packet from the "forbidden" side - it must pass
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200264 conn1.send_through(1, "A")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200265 # ensure conn times out for real
266 for i in IterateWithSleep(self, 130, "Wait for timeout", 0.1):
267 pass
268 try:
269 p2 = conn1.send_through(1).command()
270 except:
271 # If we asserted while waiting, it's good.
272 # the conn should have timed out.
273 p2 = None
274 self.assert_equal(p2, None, "packet on supposedly deleted conn")
275
276 def run_tcp_transient_teardown_conn_test(self, af, acl_side):
277 conn1 = Conn(self, self.pg0, self.pg1, af, TCP, 53002, 5052)
278 conn1.apply_acls(0, acl_side)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200279 conn1.send_through(0, "S")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200280 # the return packets should pass
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200281 conn1.send_through(1, "SA")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200282 # complete the threeway handshake
283 # (NB: sequence numbers not tracked, so not set!)
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200284 conn1.send_through(0, "A")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200285 # allow the conn to time out if it's in embryonic timer
286 for i in IterateWithSleep(self, 30, "Wait for transient timeout", 0.1):
287 pass
288 # Try to send the packet from the "forbidden" side - it must pass
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200289 conn1.send_through(1, "A")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200290 # Send the FIN to bounce the session out of established
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200291 conn1.send_through(1, "FA")
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200292 # If conn landed on transient timer it will time out here
293 for i in IterateWithSleep(self, 30, "Wait for transient timeout", 0.1):
294 pass
295 # Now it should have timed out already
296 try:
297 p2 = conn1.send_through(1).command()
298 except:
299 # If we asserted while waiting, it's good.
300 # the conn should have timed out.
301 p2 = None
302 self.assert_equal(p2, None, "packet on supposedly deleted conn")
303
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200304 def test_0000_conn_prepare_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200305 """Prepare the settings"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200306 self.vapi.ppcli("set acl-plugin session timeout udp idle 1")
307
308 def test_0001_basic_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200309 """IPv4: Basic conn timeout test reflect on ingress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200310 self.run_basic_conn_test(AF_INET, 0)
311
312 def test_0002_basic_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200313 """IPv4: Basic conn timeout test reflect on egress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200314 self.run_basic_conn_test(AF_INET, 1)
315
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200316 def test_0005_clear_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200317 """IPv4: reflect egress, clear conn"""
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200318 self.run_clear_conn_test(AF_INET, 1)
319
320 def test_0006_clear_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200321 """IPv4: reflect ingress, clear conn"""
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200322 self.run_clear_conn_test(AF_INET, 0)
323
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200324 def test_0011_active_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200325 """IPv4: Idle conn behind active conn, reflect on ingress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200326 self.run_active_conn_test(AF_INET, 0)
327
328 def test_0012_active_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200329 """IPv4: Idle conn behind active conn, reflect on egress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200330 self.run_active_conn_test(AF_INET, 1)
331
332 def test_1001_basic_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200333 """IPv6: Basic conn timeout test reflect on ingress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200334 self.run_basic_conn_test(AF_INET6, 0)
335
336 def test_1002_basic_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200337 """IPv6: Basic conn timeout test reflect on egress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200338 self.run_basic_conn_test(AF_INET6, 1)
339
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200340 def test_1005_clear_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200341 """IPv6: reflect egress, clear conn"""
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200342 self.run_clear_conn_test(AF_INET6, 1)
343
344 def test_1006_clear_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200345 """IPv6: reflect ingress, clear conn"""
Andrew Yourtchenkoeb467542017-06-21 11:24:25 +0200346 self.run_clear_conn_test(AF_INET6, 0)
347
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200348 def test_1011_active_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200349 """IPv6: Idle conn behind active conn, reflect on ingress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200350 self.run_active_conn_test(AF_INET6, 0)
351
352 def test_1012_active_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200353 """IPv6: Idle conn behind active conn, reflect on egress"""
Andrew Yourtchenko57d7dbc2017-05-02 20:08:51 +0200354 self.run_active_conn_test(AF_INET6, 1)
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200355
356 def test_2000_prepare_for_tcp_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200357 """Prepare for TCP session tests"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200358 # ensure the session hangs on if it gets treated as UDP
359 self.vapi.ppcli("set acl-plugin session timeout udp idle 200")
360 # let the TCP connection time out at 5 seconds
361 self.vapi.ppcli("set acl-plugin session timeout tcp idle 10")
362 self.vapi.ppcli("set acl-plugin session timeout tcp transient 1")
363
364 def test_2001_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200365 """IPv4: transient TCP session (incomplete 3WHS), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200366 self.run_tcp_transient_setup_conn_test(AF_INET, 0)
367
368 def test_2002_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200369 """IPv4: transient TCP session (incomplete 3WHS), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200370 self.run_tcp_transient_setup_conn_test(AF_INET, 1)
371
372 def test_2003_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200373 """IPv4: established TCP session (complete 3WHS), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200374 self.run_tcp_established_conn_test(AF_INET, 0)
375
376 def test_2004_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200377 """IPv4: established TCP session (complete 3WHS), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200378 self.run_tcp_established_conn_test(AF_INET, 1)
379
380 def test_2005_tcp_transient_teardown_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200381 """IPv4: transient TCP session (3WHS,ACK,FINACK), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200382 self.run_tcp_transient_teardown_conn_test(AF_INET, 0)
383
384 def test_2006_tcp_transient_teardown_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200385 """IPv4: transient TCP session (3WHS,ACK,FINACK), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200386 self.run_tcp_transient_teardown_conn_test(AF_INET, 1)
387
388 def test_3001_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200389 """IPv6: transient TCP session (incomplete 3WHS), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200390 self.run_tcp_transient_setup_conn_test(AF_INET6, 0)
391
392 def test_3002_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200393 """IPv6: transient TCP session (incomplete 3WHS), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200394 self.run_tcp_transient_setup_conn_test(AF_INET6, 1)
395
396 def test_3003_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200397 """IPv6: established TCP session (complete 3WHS), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200398 self.run_tcp_established_conn_test(AF_INET6, 0)
399
400 def test_3004_tcp_transient_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200401 """IPv6: established TCP session (complete 3WHS), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200402 self.run_tcp_established_conn_test(AF_INET6, 1)
403
404 def test_3005_tcp_transient_teardown_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200405 """IPv6: transient TCP session (3WHS,ACK,FINACK), ref. on ingress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200406 self.run_tcp_transient_teardown_conn_test(AF_INET6, 0)
407
408 def test_3006_tcp_transient_teardown_conn_test(self):
Klement Sekerad9b0c6f2022-04-26 19:02:15 +0200409 """IPv6: transient TCP session (3WHS,ACK,FINACK), ref. on egress"""
Andrew Yourtchenkob639b592017-08-09 11:28:02 +0200410 self.run_tcp_transient_teardown_conn_test(AF_INET6, 1)