|
@@ -8,6 +8,8 @@ import (
|
|
|
"testing"
|
|
"testing"
|
|
|
"time"
|
|
"time"
|
|
|
|
|
|
|
|
|
|
+ "github.com/gaissmai/bart"
|
|
|
|
|
+ "github.com/sirupsen/logrus"
|
|
|
"github.com/slackhq/nebula/cert"
|
|
"github.com/slackhq/nebula/cert"
|
|
|
"github.com/slackhq/nebula/config"
|
|
"github.com/slackhq/nebula/config"
|
|
|
"github.com/slackhq/nebula/firewall"
|
|
"github.com/slackhq/nebula/firewall"
|
|
@@ -68,66 +70,117 @@ func TestFirewall_AddRule(t *testing.T) {
|
|
|
ti, err := netip.ParsePrefix("1.2.3.4/32")
|
|
ti, err := netip.ParsePrefix("1.2.3.4/32")
|
|
|
require.NoError(t, err)
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoTCP, 1, 1, []string{}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ ti6, err := netip.ParsePrefix("fd12::34/128")
|
|
|
|
|
+ require.NoError(t, err)
|
|
|
|
|
+
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoTCP, 1, 1, []string{}, "", "", "", "", ""))
|
|
|
// An empty rule is any
|
|
// An empty rule is any
|
|
|
assert.True(t, fw.InRules.TCP[1].Any.Any.Any)
|
|
assert.True(t, fw.InRules.TCP[1].Any.Any.Any)
|
|
|
assert.Empty(t, fw.InRules.TCP[1].Any.Groups)
|
|
assert.Empty(t, fw.InRules.TCP[1].Any.Groups)
|
|
|
assert.Empty(t, fw.InRules.TCP[1].Any.Hosts)
|
|
assert.Empty(t, fw.InRules.TCP[1].Any.Hosts)
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", "", "", "", ""))
|
|
|
assert.Nil(t, fw.InRules.UDP[1].Any.Any)
|
|
assert.Nil(t, fw.InRules.UDP[1].Any.Any)
|
|
|
assert.Contains(t, fw.InRules.UDP[1].Any.Groups[0].Groups, "g1")
|
|
assert.Contains(t, fw.InRules.UDP[1].Any.Groups[0].Groups, "g1")
|
|
|
assert.Empty(t, fw.InRules.UDP[1].Any.Hosts)
|
|
assert.Empty(t, fw.InRules.UDP[1].Any.Hosts)
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoICMP, 1, 1, []string{}, "h1", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoICMP, 1, 1, []string{}, "h1", "", "", "", ""))
|
|
|
assert.Nil(t, fw.InRules.ICMP[1].Any.Any)
|
|
assert.Nil(t, fw.InRules.ICMP[1].Any.Any)
|
|
|
assert.Empty(t, fw.InRules.ICMP[1].Any.Groups)
|
|
assert.Empty(t, fw.InRules.ICMP[1].Any.Groups)
|
|
|
assert.Contains(t, fw.InRules.ICMP[1].Any.Hosts, "h1")
|
|
assert.Contains(t, fw.InRules.ICMP[1].Any.Hosts, "h1")
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", ti, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", ti.String(), "", "", ""))
|
|
|
assert.Nil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
assert.Nil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
|
_, ok := fw.OutRules.AnyProto[1].Any.CIDR.Get(ti)
|
|
_, ok := fw.OutRules.AnyProto[1].Any.CIDR.Get(ti)
|
|
|
assert.True(t, ok)
|
|
assert.True(t, ok)
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", netip.Prefix{}, ti, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", ti6.String(), "", "", ""))
|
|
|
|
|
+ assert.Nil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
|
|
|
+ _, ok = fw.OutRules.AnyProto[1].Any.CIDR.Get(ti6)
|
|
|
|
|
+ assert.True(t, ok)
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", "", ti.String(), "", ""))
|
|
|
|
|
+ assert.NotNil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
|
|
|
+ ok = fw.OutRules.AnyProto[1].Any.Any.LocalCIDR.Get(ti)
|
|
|
|
|
+ assert.True(t, ok)
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 1, 1, []string{}, "", "", ti6.String(), "", ""))
|
|
|
assert.NotNil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
assert.NotNil(t, fw.OutRules.AnyProto[1].Any.Any)
|
|
|
- _, ok = fw.OutRules.AnyProto[1].Any.Any.LocalCIDR.Get(ti)
|
|
|
|
|
|
|
+ ok = fw.OutRules.AnyProto[1].Any.Any.LocalCIDR.Get(ti6)
|
|
|
assert.True(t, ok)
|
|
assert.True(t, ok)
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", netip.Prefix{}, netip.Prefix{}, "ca-name", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", "", "", "ca-name", ""))
|
|
|
assert.Contains(t, fw.InRules.UDP[1].CANames, "ca-name")
|
|
assert.Contains(t, fw.InRules.UDP[1].CANames, "ca-name")
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", netip.Prefix{}, netip.Prefix{}, "", "ca-sha"))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoUDP, 1, 1, []string{"g1"}, "", "", "", "", "ca-sha"))
|
|
|
assert.Contains(t, fw.InRules.UDP[1].CAShas, "ca-sha")
|
|
assert.Contains(t, fw.InRules.UDP[1].CAShas, "ca-sha")
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "any", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "any", "", "", "", ""))
|
|
|
assert.True(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
assert.True(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
|
|
|
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
anyIp, err := netip.ParsePrefix("0.0.0.0/0")
|
|
anyIp, err := netip.ParsePrefix("0.0.0.0/0")
|
|
|
require.NoError(t, err)
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
- require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", anyIp, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", anyIp.String(), "", "", ""))
|
|
|
|
|
+ assert.Nil(t, fw.OutRules.AnyProto[0].Any.Any)
|
|
|
|
|
+ table, ok := fw.OutRules.AnyProto[0].Any.CIDR.Lookup(netip.MustParseAddr("1.1.1.1"))
|
|
|
|
|
+ assert.True(t, table.Any)
|
|
|
|
|
+ table, ok = fw.OutRules.AnyProto[0].Any.CIDR.Lookup(netip.MustParseAddr("9::9"))
|
|
|
|
|
+ assert.False(t, ok)
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ anyIp6, err := netip.ParsePrefix("::/0")
|
|
|
|
|
+ require.NoError(t, err)
|
|
|
|
|
+
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", anyIp6.String(), "", "", ""))
|
|
|
|
|
+ assert.Nil(t, fw.OutRules.AnyProto[0].Any.Any)
|
|
|
|
|
+ table, ok = fw.OutRules.AnyProto[0].Any.CIDR.Lookup(netip.MustParseAddr("9::9"))
|
|
|
|
|
+ assert.True(t, table.Any)
|
|
|
|
|
+ table, ok = fw.OutRules.AnyProto[0].Any.CIDR.Lookup(netip.MustParseAddr("1.1.1.1"))
|
|
|
|
|
+ assert.False(t, ok)
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", "any", "", "", ""))
|
|
|
|
|
+ assert.True(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", "", anyIp.String(), "", ""))
|
|
|
|
|
+ assert.False(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
|
|
|
+ assert.True(t, fw.OutRules.AnyProto[0].Any.Any.LocalCIDR.Lookup(netip.MustParseAddr("1.1.1.1")))
|
|
|
|
|
+ assert.False(t, fw.OutRules.AnyProto[0].Any.Any.LocalCIDR.Lookup(netip.MustParseAddr("9::9")))
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", "", anyIp6.String(), "", ""))
|
|
|
|
|
+ assert.False(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
|
|
|
+ assert.True(t, fw.OutRules.AnyProto[0].Any.Any.LocalCIDR.Lookup(netip.MustParseAddr("9::9")))
|
|
|
|
|
+ assert.False(t, fw.OutRules.AnyProto[0].Any.Any.LocalCIDR.Lookup(netip.MustParseAddr("1.1.1.1")))
|
|
|
|
|
+
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(false, firewall.ProtoAny, 0, 0, []string{}, "", "", "any", "", ""))
|
|
|
assert.True(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
assert.True(t, fw.OutRules.AnyProto[0].Any.Any.Any)
|
|
|
|
|
|
|
|
// Test error conditions
|
|
// Test error conditions
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c)
|
|
|
- require.Error(t, fw.AddRule(true, math.MaxUint8, 0, 0, []string{}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
- require.Error(t, fw.AddRule(true, firewall.ProtoAny, 10, 0, []string{}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.Error(t, fw.AddRule(true, math.MaxUint8, 0, 0, []string{}, "", "", "", "", ""))
|
|
|
|
|
+ require.Error(t, fw.AddRule(true, firewall.ProtoAny, 10, 0, []string{}, "", "", "", "", ""))
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
func TestFirewall_Drop(t *testing.T) {
|
|
func TestFirewall_Drop(t *testing.T) {
|
|
|
l := test.NewLogger()
|
|
l := test.NewLogger()
|
|
|
ob := &bytes.Buffer{}
|
|
ob := &bytes.Buffer{}
|
|
|
l.SetOutput(ob)
|
|
l.SetOutput(ob)
|
|
|
-
|
|
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("1.1.1.1/8"))
|
|
|
p := firewall.Packet{
|
|
p := firewall.Packet{
|
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
|
RemoteAddr: netip.MustParseAddr("1.2.3.4"),
|
|
RemoteAddr: netip.MustParseAddr("1.2.3.4"),
|
|
@@ -152,10 +205,10 @@ func TestFirewall_Drop(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{netip.MustParseAddr("1.2.3.4")},
|
|
vpnAddrs: []netip.Addr{netip.MustParseAddr("1.2.3.4")},
|
|
|
}
|
|
}
|
|
|
- h.buildNetworks(c.networks, c.unsafeNetworks)
|
|
|
|
|
|
|
+ h.buildNetworks(myVpnNetworksTable, &c)
|
|
|
|
|
|
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", "", "", "", ""))
|
|
|
cp := cert.NewCAPool()
|
|
cp := cert.NewCAPool()
|
|
|
|
|
|
|
|
// Drop outbound
|
|
// Drop outbound
|
|
@@ -174,28 +227,107 @@ func TestFirewall_Drop(t *testing.T) {
|
|
|
|
|
|
|
|
// ensure signer doesn't get in the way of group checks
|
|
// ensure signer doesn't get in the way of group checks
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", netip.Prefix{}, netip.Prefix{}, "", "signer-shasum"))
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", netip.Prefix{}, netip.Prefix{}, "", "signer-shasum-bad"))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "", "signer-shasum"))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "", "signer-shasum-bad"))
|
|
|
assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
|
|
|
|
|
|
// test caSha doesn't drop on match
|
|
// test caSha doesn't drop on match
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", netip.Prefix{}, netip.Prefix{}, "", "signer-shasum-bad"))
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", netip.Prefix{}, netip.Prefix{}, "", "signer-shasum"))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "", "signer-shasum-bad"))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "", "signer-shasum"))
|
|
|
require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
|
|
|
|
|
// ensure ca name doesn't get in the way of group checks
|
|
// ensure ca name doesn't get in the way of group checks
|
|
|
cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", netip.Prefix{}, netip.Prefix{}, "ca-good", ""))
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", netip.Prefix{}, netip.Prefix{}, "ca-good-bad", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "ca-good", ""))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "ca-good-bad", ""))
|
|
|
assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
|
|
|
|
|
|
// test caName doesn't drop on match
|
|
// test caName doesn't drop on match
|
|
|
cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", netip.Prefix{}, netip.Prefix{}, "ca-good-bad", ""))
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", netip.Prefix{}, netip.Prefix{}, "ca-good", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "ca-good-bad", ""))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "ca-good", ""))
|
|
|
|
|
+ require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func TestFirewall_DropV6(t *testing.T) {
|
|
|
|
|
+ l := test.NewLogger()
|
|
|
|
|
+ ob := &bytes.Buffer{}
|
|
|
|
|
+ l.SetOutput(ob)
|
|
|
|
|
+
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("fd00::/7"))
|
|
|
|
|
+
|
|
|
|
|
+ p := firewall.Packet{
|
|
|
|
|
+ LocalAddr: netip.MustParseAddr("fd12::34"),
|
|
|
|
|
+ RemoteAddr: netip.MustParseAddr("fd12::34"),
|
|
|
|
|
+ LocalPort: 10,
|
|
|
|
|
+ RemotePort: 90,
|
|
|
|
|
+ Protocol: firewall.ProtoUDP,
|
|
|
|
|
+ Fragment: false,
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ c := dummyCert{
|
|
|
|
|
+ name: "host1",
|
|
|
|
|
+ networks: []netip.Prefix{netip.MustParsePrefix("fd12::34/120")},
|
|
|
|
|
+ groups: []string{"default-group"},
|
|
|
|
|
+ issuer: "signer-shasum",
|
|
|
|
|
+ }
|
|
|
|
|
+ h := HostInfo{
|
|
|
|
|
+ ConnectionState: &ConnectionState{
|
|
|
|
|
+ peerCert: &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &c,
|
|
|
|
|
+ InvertedGroups: map[string]struct{}{"default-group": {}},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ vpnAddrs: []netip.Addr{netip.MustParseAddr("fd12::34")},
|
|
|
|
|
+ }
|
|
|
|
|
+ h.buildNetworks(myVpnNetworksTable, &c)
|
|
|
|
|
+
|
|
|
|
|
+ fw := NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", "", "", "", ""))
|
|
|
|
|
+ cp := cert.NewCAPool()
|
|
|
|
|
+
|
|
|
|
|
+ // Drop outbound
|
|
|
|
|
+ assert.Equal(t, ErrNoMatchingRule, fw.Drop(p, false, &h, cp, nil))
|
|
|
|
|
+ // Allow inbound
|
|
|
|
|
+ resetConntrack(fw)
|
|
|
|
|
+ require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
|
|
+ // Allow outbound because conntrack
|
|
|
|
|
+ require.NoError(t, fw.Drop(p, false, &h, cp, nil))
|
|
|
|
|
+
|
|
|
|
|
+ // test remote mismatch
|
|
|
|
|
+ oldRemote := p.RemoteAddr
|
|
|
|
|
+ p.RemoteAddr = netip.MustParseAddr("fd12::56")
|
|
|
|
|
+ assert.Equal(t, fw.Drop(p, false, &h, cp, nil), ErrInvalidRemoteIP)
|
|
|
|
|
+ p.RemoteAddr = oldRemote
|
|
|
|
|
+
|
|
|
|
|
+ // ensure signer doesn't get in the way of group checks
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "", "signer-shasum"))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "", "signer-shasum-bad"))
|
|
|
|
|
+ assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
|
|
|
+
|
|
|
|
|
+ // test caSha doesn't drop on match
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "", "signer-shasum-bad"))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "", "signer-shasum"))
|
|
|
|
|
+ require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
|
|
+
|
|
|
|
|
+ // ensure ca name doesn't get in the way of group checks
|
|
|
|
|
+ cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "ca-good", ""))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "ca-good-bad", ""))
|
|
|
|
|
+ assert.Equal(t, fw.Drop(p, true, &h, cp, nil), ErrNoMatchingRule)
|
|
|
|
|
+
|
|
|
|
|
+ // test caName doesn't drop on match
|
|
|
|
|
+ cp.CAs["signer-shasum"] = &cert.CachedCertificate{Certificate: &dummyCert{name: "ca-good"}}
|
|
|
|
|
+ fw = NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"nope"}, "", "", "", "ca-good-bad", ""))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group"}, "", "", "", "ca-good", ""))
|
|
|
require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -206,8 +338,12 @@ func BenchmarkFirewallTable_match(b *testing.B) {
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
pfix := netip.MustParsePrefix("172.1.1.1/32")
|
|
pfix := netip.MustParsePrefix("172.1.1.1/32")
|
|
|
- _ = ft.TCP.addRule(f, 10, 10, []string{"good-group"}, "good-host", pfix, netip.Prefix{}, "", "")
|
|
|
|
|
- _ = ft.TCP.addRule(f, 100, 100, []string{"good-group"}, "good-host", netip.Prefix{}, pfix, "", "")
|
|
|
|
|
|
|
+ _ = ft.TCP.addRule(f, 10, 10, []string{"good-group"}, "good-host", pfix.String(), "", "", "")
|
|
|
|
|
+ _ = ft.TCP.addRule(f, 100, 100, []string{"good-group"}, "good-host", "", pfix.String(), "", "")
|
|
|
|
|
+
|
|
|
|
|
+ pfix6 := netip.MustParsePrefix("fd11::11/128")
|
|
|
|
|
+ _ = ft.TCP.addRule(f, 10, 10, []string{"good-group"}, "good-host", pfix6.String(), "", "", "")
|
|
|
|
|
+ _ = ft.TCP.addRule(f, 100, 100, []string{"good-group"}, "good-host", "", pfix6.String(), "", "")
|
|
|
cp := cert.NewCAPool()
|
|
cp := cert.NewCAPool()
|
|
|
|
|
|
|
|
b.Run("fail on proto", func(b *testing.B) {
|
|
b.Run("fail on proto", func(b *testing.B) {
|
|
@@ -239,6 +375,15 @@ func BenchmarkFirewallTable_match(b *testing.B) {
|
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: ip.Addr()}, true, c, cp))
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: ip.Addr()}, true, c, cp))
|
|
|
}
|
|
}
|
|
|
})
|
|
})
|
|
|
|
|
+ b.Run("pass proto, port, fail on local CIDRv6", func(b *testing.B) {
|
|
|
|
|
+ c := &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{},
|
|
|
|
|
+ }
|
|
|
|
|
+ ip := netip.MustParsePrefix("fd99::99/128")
|
|
|
|
|
+ for n := 0; n < b.N; n++ {
|
|
|
|
|
+ assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: ip.Addr()}, true, c, cp))
|
|
|
|
|
+ }
|
|
|
|
|
+ })
|
|
|
|
|
|
|
|
b.Run("pass proto, port, any local CIDR, fail all group, name, and cidr", func(b *testing.B) {
|
|
b.Run("pass proto, port, any local CIDR, fail all group, name, and cidr", func(b *testing.B) {
|
|
|
c := &cert.CachedCertificate{
|
|
c := &cert.CachedCertificate{
|
|
@@ -252,6 +397,18 @@ func BenchmarkFirewallTable_match(b *testing.B) {
|
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 10}, true, c, cp))
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 10}, true, c, cp))
|
|
|
}
|
|
}
|
|
|
})
|
|
})
|
|
|
|
|
+ b.Run("pass proto, port, any local CIDRv6, fail all group, name, and cidr", func(b *testing.B) {
|
|
|
|
|
+ c := &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "nope",
|
|
|
|
|
+ networks: []netip.Prefix{netip.MustParsePrefix("fd99::99/128")},
|
|
|
|
|
+ },
|
|
|
|
|
+ InvertedGroups: map[string]struct{}{"nope": {}},
|
|
|
|
|
+ }
|
|
|
|
|
+ for n := 0; n < b.N; n++ {
|
|
|
|
|
+ assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 10}, true, c, cp))
|
|
|
|
|
+ }
|
|
|
|
|
+ })
|
|
|
|
|
|
|
|
b.Run("pass proto, port, specific local CIDR, fail all group, name, and cidr", func(b *testing.B) {
|
|
b.Run("pass proto, port, specific local CIDR, fail all group, name, and cidr", func(b *testing.B) {
|
|
|
c := &cert.CachedCertificate{
|
|
c := &cert.CachedCertificate{
|
|
@@ -265,6 +422,18 @@ func BenchmarkFirewallTable_match(b *testing.B) {
|
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix.Addr()}, true, c, cp))
|
|
assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix.Addr()}, true, c, cp))
|
|
|
}
|
|
}
|
|
|
})
|
|
})
|
|
|
|
|
+ b.Run("pass proto, port, specific local CIDRv6, fail all group, name, and cidr", func(b *testing.B) {
|
|
|
|
|
+ c := &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "nope",
|
|
|
|
|
+ networks: []netip.Prefix{netip.MustParsePrefix("fd99::99/128")},
|
|
|
|
|
+ },
|
|
|
|
|
+ InvertedGroups: map[string]struct{}{"nope": {}},
|
|
|
|
|
+ }
|
|
|
|
|
+ for n := 0; n < b.N; n++ {
|
|
|
|
|
+ assert.False(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix6.Addr()}, true, c, cp))
|
|
|
|
|
+ }
|
|
|
|
|
+ })
|
|
|
|
|
|
|
|
b.Run("pass on group on any local cidr", func(b *testing.B) {
|
|
b.Run("pass on group on any local cidr", func(b *testing.B) {
|
|
|
c := &cert.CachedCertificate{
|
|
c := &cert.CachedCertificate{
|
|
@@ -289,6 +458,17 @@ func BenchmarkFirewallTable_match(b *testing.B) {
|
|
|
assert.True(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix.Addr()}, true, c, cp))
|
|
assert.True(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix.Addr()}, true, c, cp))
|
|
|
}
|
|
}
|
|
|
})
|
|
})
|
|
|
|
|
+ b.Run("pass on group on specific local cidr6", func(b *testing.B) {
|
|
|
|
|
+ c := &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "nope",
|
|
|
|
|
+ },
|
|
|
|
|
+ InvertedGroups: map[string]struct{}{"good-group": {}},
|
|
|
|
|
+ }
|
|
|
|
|
+ for n := 0; n < b.N; n++ {
|
|
|
|
|
+ assert.True(b, ft.match(firewall.Packet{Protocol: firewall.ProtoTCP, LocalPort: 100, LocalAddr: pfix6.Addr()}, true, c, cp))
|
|
|
|
|
+ }
|
|
|
|
|
+ })
|
|
|
|
|
|
|
|
b.Run("pass on name", func(b *testing.B) {
|
|
b.Run("pass on name", func(b *testing.B) {
|
|
|
c := &cert.CachedCertificate{
|
|
c := &cert.CachedCertificate{
|
|
@@ -307,6 +487,8 @@ func TestFirewall_Drop2(t *testing.T) {
|
|
|
l := test.NewLogger()
|
|
l := test.NewLogger()
|
|
|
ob := &bytes.Buffer{}
|
|
ob := &bytes.Buffer{}
|
|
|
l.SetOutput(ob)
|
|
l.SetOutput(ob)
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("1.1.1.1/8"))
|
|
|
|
|
|
|
|
p := firewall.Packet{
|
|
p := firewall.Packet{
|
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
@@ -332,7 +514,7 @@ func TestFirewall_Drop2(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
}
|
|
}
|
|
|
- h.buildNetworks(c.Certificate.Networks(), c.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h.buildNetworks(myVpnNetworksTable, c.Certificate)
|
|
|
|
|
|
|
|
c1 := cert.CachedCertificate{
|
|
c1 := cert.CachedCertificate{
|
|
|
Certificate: &dummyCert{
|
|
Certificate: &dummyCert{
|
|
@@ -347,10 +529,10 @@ func TestFirewall_Drop2(t *testing.T) {
|
|
|
peerCert: &c1,
|
|
peerCert: &c1,
|
|
|
},
|
|
},
|
|
|
}
|
|
}
|
|
|
- h1.buildNetworks(c1.Certificate.Networks(), c1.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h1.buildNetworks(myVpnNetworksTable, c1.Certificate)
|
|
|
|
|
|
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group", "test-group"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"default-group", "test-group"}, "", "", "", "", ""))
|
|
|
cp := cert.NewCAPool()
|
|
cp := cert.NewCAPool()
|
|
|
|
|
|
|
|
// h1/c1 lacks the proper groups
|
|
// h1/c1 lacks the proper groups
|
|
@@ -364,6 +546,8 @@ func TestFirewall_Drop3(t *testing.T) {
|
|
|
l := test.NewLogger()
|
|
l := test.NewLogger()
|
|
|
ob := &bytes.Buffer{}
|
|
ob := &bytes.Buffer{}
|
|
|
l.SetOutput(ob)
|
|
l.SetOutput(ob)
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("1.1.1.1/8"))
|
|
|
|
|
|
|
|
p := firewall.Packet{
|
|
p := firewall.Packet{
|
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
@@ -395,7 +579,7 @@ func TestFirewall_Drop3(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
}
|
|
}
|
|
|
- h1.buildNetworks(c1.Certificate.Networks(), c1.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h1.buildNetworks(myVpnNetworksTable, c1.Certificate)
|
|
|
|
|
|
|
|
c2 := cert.CachedCertificate{
|
|
c2 := cert.CachedCertificate{
|
|
|
Certificate: &dummyCert{
|
|
Certificate: &dummyCert{
|
|
@@ -410,7 +594,7 @@ func TestFirewall_Drop3(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
}
|
|
}
|
|
|
- h2.buildNetworks(c2.Certificate.Networks(), c2.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h2.buildNetworks(myVpnNetworksTable, c2.Certificate)
|
|
|
|
|
|
|
|
c3 := cert.CachedCertificate{
|
|
c3 := cert.CachedCertificate{
|
|
|
Certificate: &dummyCert{
|
|
Certificate: &dummyCert{
|
|
@@ -425,11 +609,11 @@ func TestFirewall_Drop3(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
}
|
|
}
|
|
|
- h3.buildNetworks(c3.Certificate.Networks(), c3.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h3.buildNetworks(myVpnNetworksTable, c3.Certificate)
|
|
|
|
|
|
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "host1", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", netip.Prefix{}, netip.Prefix{}, "", "signer-sha"))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "host1", "", "", "", ""))
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", "", "", "", "signer-sha"))
|
|
|
cp := cert.NewCAPool()
|
|
cp := cert.NewCAPool()
|
|
|
|
|
|
|
|
// c1 should pass because host match
|
|
// c1 should pass because host match
|
|
@@ -443,14 +627,54 @@ func TestFirewall_Drop3(t *testing.T) {
|
|
|
|
|
|
|
|
// Test a remote address match
|
|
// Test a remote address match
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", netip.MustParsePrefix("1.2.3.4/24"), netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", "1.2.3.4/24", "", "", ""))
|
|
|
require.NoError(t, fw.Drop(p, true, &h1, cp, nil))
|
|
require.NoError(t, fw.Drop(p, true, &h1, cp, nil))
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
+func TestFirewall_Drop3V6(t *testing.T) {
|
|
|
|
|
+ l := test.NewLogger()
|
|
|
|
|
+ ob := &bytes.Buffer{}
|
|
|
|
|
+ l.SetOutput(ob)
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("fd00::/7"))
|
|
|
|
|
+
|
|
|
|
|
+ p := firewall.Packet{
|
|
|
|
|
+ LocalAddr: netip.MustParseAddr("fd12::34"),
|
|
|
|
|
+ RemoteAddr: netip.MustParseAddr("fd12::34"),
|
|
|
|
|
+ LocalPort: 1,
|
|
|
|
|
+ RemotePort: 1,
|
|
|
|
|
+ Protocol: firewall.ProtoUDP,
|
|
|
|
|
+ Fragment: false,
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ network := netip.MustParsePrefix("fd12::34/120")
|
|
|
|
|
+ c := cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "host-owner",
|
|
|
|
|
+ networks: []netip.Prefix{network},
|
|
|
|
|
+ },
|
|
|
|
|
+ }
|
|
|
|
|
+ h := HostInfo{
|
|
|
|
|
+ ConnectionState: &ConnectionState{
|
|
|
|
|
+ peerCert: &c,
|
|
|
|
|
+ },
|
|
|
|
|
+ vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
|
|
+ }
|
|
|
|
|
+ h.buildNetworks(myVpnNetworksTable, c.Certificate)
|
|
|
|
|
+
|
|
|
|
|
+ // Test a remote address match
|
|
|
|
|
+ fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
|
|
+ cp := cert.NewCAPool()
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", "fd12::34/120", "", "", ""))
|
|
|
|
|
+ require.NoError(t, fw.Drop(p, true, &h, cp, nil))
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
|
l := test.NewLogger()
|
|
l := test.NewLogger()
|
|
|
ob := &bytes.Buffer{}
|
|
ob := &bytes.Buffer{}
|
|
|
l.SetOutput(ob)
|
|
l.SetOutput(ob)
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("1.1.1.1/8"))
|
|
|
|
|
|
|
|
p := firewall.Packet{
|
|
p := firewall.Packet{
|
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
LocalAddr: netip.MustParseAddr("1.2.3.4"),
|
|
@@ -477,10 +701,10 @@ func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
|
},
|
|
},
|
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
vpnAddrs: []netip.Addr{network.Addr()},
|
|
|
}
|
|
}
|
|
|
- h.buildNetworks(c.Certificate.Networks(), c.Certificate.UnsafeNetworks())
|
|
|
|
|
|
|
+ h.buildNetworks(myVpnNetworksTable, c.Certificate)
|
|
|
|
|
|
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", "", "", "", ""))
|
|
|
cp := cert.NewCAPool()
|
|
cp := cert.NewCAPool()
|
|
|
|
|
|
|
|
// Drop outbound
|
|
// Drop outbound
|
|
@@ -493,7 +717,7 @@ func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
|
|
|
|
|
|
oldFw := fw
|
|
oldFw := fw
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 10, 10, []string{"any"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 10, 10, []string{"any"}, "", "", "", "", ""))
|
|
|
fw.Conntrack = oldFw.Conntrack
|
|
fw.Conntrack = oldFw.Conntrack
|
|
|
fw.rulesVersion = oldFw.rulesVersion + 1
|
|
fw.rulesVersion = oldFw.rulesVersion + 1
|
|
|
|
|
|
|
@@ -502,7 +726,7 @@ func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
|
|
|
|
|
|
oldFw = fw
|
|
oldFw = fw
|
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
fw = NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
- require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 11, 11, []string{"any"}, "", netip.Prefix{}, netip.Prefix{}, "", ""))
|
|
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 11, 11, []string{"any"}, "", "", "", "", ""))
|
|
|
fw.Conntrack = oldFw.Conntrack
|
|
fw.Conntrack = oldFw.Conntrack
|
|
|
fw.rulesVersion = oldFw.rulesVersion + 1
|
|
fw.rulesVersion = oldFw.rulesVersion + 1
|
|
|
|
|
|
|
@@ -510,6 +734,52 @@ func TestFirewall_DropConntrackReload(t *testing.T) {
|
|
|
assert.Equal(t, fw.Drop(p, false, &h, cp, nil), ErrNoMatchingRule)
|
|
assert.Equal(t, fw.Drop(p, false, &h, cp, nil), ErrNoMatchingRule)
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
+func TestFirewall_DropIPSpoofing(t *testing.T) {
|
|
|
|
|
+ l := test.NewLogger()
|
|
|
|
|
+ ob := &bytes.Buffer{}
|
|
|
|
|
+ l.SetOutput(ob)
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ myVpnNetworksTable.Insert(netip.MustParsePrefix("192.0.2.1/24"))
|
|
|
|
|
+
|
|
|
|
|
+ c := cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "host-owner",
|
|
|
|
|
+ networks: []netip.Prefix{netip.MustParsePrefix("192.0.2.1/24")},
|
|
|
|
|
+ },
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ c1 := cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &dummyCert{
|
|
|
|
|
+ name: "host",
|
|
|
|
|
+ networks: []netip.Prefix{netip.MustParsePrefix("192.0.2.2/24")},
|
|
|
|
|
+ unsafeNetworks: []netip.Prefix{netip.MustParsePrefix("198.51.100.0/24")},
|
|
|
|
|
+ },
|
|
|
|
|
+ }
|
|
|
|
|
+ h1 := HostInfo{
|
|
|
|
|
+ ConnectionState: &ConnectionState{
|
|
|
|
|
+ peerCert: &c1,
|
|
|
|
|
+ },
|
|
|
|
|
+ vpnAddrs: []netip.Addr{c1.Certificate.Networks()[0].Addr()},
|
|
|
|
|
+ }
|
|
|
|
|
+ h1.buildNetworks(myVpnNetworksTable, c1.Certificate)
|
|
|
|
|
+
|
|
|
|
|
+ fw := NewFirewall(l, time.Second, time.Minute, time.Hour, c.Certificate)
|
|
|
|
|
+
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 1, 1, []string{}, "", "", "", "", ""))
|
|
|
|
|
+ cp := cert.NewCAPool()
|
|
|
|
|
+
|
|
|
|
|
+ // Packet spoofed by `c1`. Note that the remote addr is not a valid one.
|
|
|
|
|
+ p := firewall.Packet{
|
|
|
|
|
+ LocalAddr: netip.MustParseAddr("192.0.2.1"),
|
|
|
|
|
+ RemoteAddr: netip.MustParseAddr("192.0.2.3"),
|
|
|
|
|
+ LocalPort: 1,
|
|
|
|
|
+ RemotePort: 1,
|
|
|
|
|
+ Protocol: firewall.ProtoUDP,
|
|
|
|
|
+ Fragment: false,
|
|
|
|
|
+ }
|
|
|
|
|
+ assert.Equal(t, fw.Drop(p, true, &h1, cp, nil), ErrInvalidRemoteIP)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
func BenchmarkLookup(b *testing.B) {
|
|
func BenchmarkLookup(b *testing.B) {
|
|
|
ml := func(m map[string]struct{}, a [][]string) {
|
|
ml := func(m map[string]struct{}, a [][]string) {
|
|
|
for n := 0; n < b.N; n++ {
|
|
for n := 0; n < b.N; n++ {
|
|
@@ -689,28 +959,28 @@ func TestAddFirewallRulesFromConfig(t *testing.T) {
|
|
|
mf := &mockFirewall{}
|
|
mf := &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "tcp", "host": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "tcp", "host": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoTCP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoTCP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding udp rule
|
|
// Test adding udp rule
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "udp", "host": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "udp", "host": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoUDP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoUDP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding icmp rule
|
|
// Test adding icmp rule
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "icmp", "host": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"outbound": []any{map[string]any{"port": "1", "proto": "icmp", "host": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, false, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoICMP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: false, proto: firewall.ProtoICMP, startPort: 1, endPort: 1, groups: nil, host: "a", ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding any rule
|
|
// Test adding any rule
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "host": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "host": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, host: "a", ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, host: "a", ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding rule with cidr
|
|
// Test adding rule with cidr
|
|
|
cidr := netip.MustParsePrefix("10.0.0.0/8")
|
|
cidr := netip.MustParsePrefix("10.0.0.0/8")
|
|
@@ -718,49 +988,90 @@ func TestAddFirewallRulesFromConfig(t *testing.T) {
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "cidr": cidr.String()}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "cidr": cidr.String()}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: cidr, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: cidr.String(), localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding rule with local_cidr
|
|
// Test adding rule with local_cidr
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "local_cidr": cidr.String()}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "local_cidr": cidr.String()}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: netip.Prefix{}, localIp: cidr}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: "", localIp: cidr.String()}, mf.lastCall)
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with cidr ipv6
|
|
|
|
|
+ cidr6 := netip.MustParsePrefix("fd00::/8")
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "cidr": cidr6.String()}}}
|
|
|
|
|
+ require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: cidr6.String(), localIp: ""}, mf.lastCall)
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with any cidr
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "cidr": "any"}}}
|
|
|
|
|
+ require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: "any", localIp: ""}, mf.lastCall)
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with junk cidr
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "cidr": "junk/junk"}}}
|
|
|
|
|
+ require.EqualError(t, AddFirewallRulesFromConfig(l, true, conf, mf), "firewall.inbound rule #0; cidr did not parse; netip.ParsePrefix(\"junk/junk\"): ParseAddr(\"junk\"): unable to parse IP")
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with local_cidr ipv6
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "local_cidr": cidr6.String()}}}
|
|
|
|
|
+ require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: "", localIp: cidr6.String()}, mf.lastCall)
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with any local_cidr
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "local_cidr": "any"}}}
|
|
|
|
|
+ require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, localIp: "any"}, mf.lastCall)
|
|
|
|
|
+
|
|
|
|
|
+ // Test adding rule with junk local_cidr
|
|
|
|
|
+ conf = config.NewC(l)
|
|
|
|
|
+ mf = &mockFirewall{}
|
|
|
|
|
+ conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "local_cidr": "junk/junk"}}}
|
|
|
|
|
+ require.EqualError(t, AddFirewallRulesFromConfig(l, true, conf, mf), "firewall.inbound rule #0; local_cidr did not parse; netip.ParsePrefix(\"junk/junk\"): ParseAddr(\"junk\"): unable to parse IP")
|
|
|
|
|
|
|
|
// Test adding rule with ca_sha
|
|
// Test adding rule with ca_sha
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "ca_sha": "12312313123"}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "ca_sha": "12312313123"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: netip.Prefix{}, localIp: netip.Prefix{}, caSha: "12312313123"}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: "", localIp: "", caSha: "12312313123"}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test adding rule with ca_name
|
|
// Test adding rule with ca_name
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "ca_name": "root01"}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "ca_name": "root01"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: netip.Prefix{}, localIp: netip.Prefix{}, caName: "root01"}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: nil, ip: "", localIp: "", caName: "root01"}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test single group
|
|
// Test single group
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "group": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "group": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a"}, ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a"}, ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test single groups
|
|
// Test single groups
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "groups": "a"}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "groups": "a"}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a"}, ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a"}, ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test multiple AND groups
|
|
// Test multiple AND groups
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
|
mf = &mockFirewall{}
|
|
mf = &mockFirewall{}
|
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "groups": []string{"a", "b"}}}}
|
|
conf.Settings["firewall"] = map[string]any{"inbound": []any{map[string]any{"port": "1", "proto": "any", "groups": []string{"a", "b"}}}}
|
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
require.NoError(t, AddFirewallRulesFromConfig(l, true, conf, mf))
|
|
|
- assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a", "b"}, ip: netip.Prefix{}, localIp: netip.Prefix{}}, mf.lastCall)
|
|
|
|
|
|
|
+ assert.Equal(t, addRuleCall{incoming: true, proto: firewall.ProtoAny, startPort: 1, endPort: 1, groups: []string{"a", "b"}, ip: "", localIp: ""}, mf.lastCall)
|
|
|
|
|
|
|
|
// Test Add error
|
|
// Test Add error
|
|
|
conf = config.NewC(l)
|
|
conf = config.NewC(l)
|
|
@@ -783,7 +1094,7 @@ func TestFirewall_convertRule(t *testing.T) {
|
|
|
r, err := convertRule(l, c, "test", 1)
|
|
r, err := convertRule(l, c, "test", 1)
|
|
|
assert.Contains(t, ob.String(), "test rule #1; group was an array with a single value, converting to simple value")
|
|
assert.Contains(t, ob.String(), "test rule #1; group was an array with a single value, converting to simple value")
|
|
|
require.NoError(t, err)
|
|
require.NoError(t, err)
|
|
|
- assert.Equal(t, "group1", r.Group)
|
|
|
|
|
|
|
+ assert.Equal(t, []string{"group1"}, r.Groups)
|
|
|
|
|
|
|
|
// Ensure group array of > 1 is errord
|
|
// Ensure group array of > 1 is errord
|
|
|
ob.Reset()
|
|
ob.Reset()
|
|
@@ -803,7 +1114,228 @@ func TestFirewall_convertRule(t *testing.T) {
|
|
|
|
|
|
|
|
r, err = convertRule(l, c, "test", 1)
|
|
r, err = convertRule(l, c, "test", 1)
|
|
|
require.NoError(t, err)
|
|
require.NoError(t, err)
|
|
|
- assert.Equal(t, "group1", r.Group)
|
|
|
|
|
|
|
+ assert.Equal(t, []string{"group1"}, r.Groups)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func TestFirewall_convertRuleSanity(t *testing.T) {
|
|
|
|
|
+ l := test.NewLogger()
|
|
|
|
|
+ ob := &bytes.Buffer{}
|
|
|
|
|
+ l.SetOutput(ob)
|
|
|
|
|
+
|
|
|
|
|
+ noWarningPlease := []map[string]any{
|
|
|
|
|
+ {"group": "group1"},
|
|
|
|
|
+ {"groups": []any{"group2"}},
|
|
|
|
|
+ {"host": "bob"},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "host": "bob"},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ }
|
|
|
|
|
+ for _, c := range noWarningPlease {
|
|
|
|
|
+ r, err := convertRule(l, c, "test", 1)
|
|
|
|
|
+ require.NoError(t, err)
|
|
|
|
|
+ require.NoError(t, r.sanity(), "should not generate a sanity warning, %+v", c)
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ yesWarningPlease := []map[string]any{
|
|
|
|
|
+ {"group": "group1"},
|
|
|
|
|
+ {"groups": []any{"group2"}},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "host": "bob"},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ }
|
|
|
|
|
+ for _, c := range yesWarningPlease {
|
|
|
|
|
+ c["host"] = "any"
|
|
|
|
|
+ r, err := convertRule(l, c, "test", 1)
|
|
|
|
|
+ require.NoError(t, err)
|
|
|
|
|
+ err = r.sanity()
|
|
|
|
|
+ require.Error(t, err, "I wanted a warning: %+v", c)
|
|
|
|
|
+ }
|
|
|
|
|
+ //reset the list
|
|
|
|
|
+ yesWarningPlease = []map[string]any{
|
|
|
|
|
+ {"group": "group1"},
|
|
|
|
|
+ {"groups": []any{"group2"}},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "host": "bob"},
|
|
|
|
|
+ {"cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1"},
|
|
|
|
|
+ {"groups": []any{"group2"}, "cidr": "1.1.1.1/1", "host": "bob"},
|
|
|
|
|
+ }
|
|
|
|
|
+ for _, c := range yesWarningPlease {
|
|
|
|
|
+ r, err := convertRule(l, c, "test", 1)
|
|
|
|
|
+ require.NoError(t, err)
|
|
|
|
|
+ r.Groups = append(r.Groups, "any")
|
|
|
|
|
+ err = r.sanity()
|
|
|
|
|
+ require.Error(t, err, "I wanted a warning: %+v", c)
|
|
|
|
|
+ }
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+type testcase struct {
|
|
|
|
|
+ h *HostInfo
|
|
|
|
|
+ p firewall.Packet
|
|
|
|
|
+ c cert.Certificate
|
|
|
|
|
+ err error
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func (c *testcase) Test(t *testing.T, fw *Firewall) {
|
|
|
|
|
+ t.Helper()
|
|
|
|
|
+ cp := cert.NewCAPool()
|
|
|
|
|
+ resetConntrack(fw)
|
|
|
|
|
+ err := fw.Drop(c.p, true, c.h, cp, nil)
|
|
|
|
|
+ if c.err == nil {
|
|
|
|
|
+ require.NoError(t, err, "failed to not drop remote address %s", c.p.RemoteAddr)
|
|
|
|
|
+ } else {
|
|
|
|
|
+ require.ErrorIs(t, c.err, err, "failed to drop remote address %s", c.p.RemoteAddr)
|
|
|
|
|
+ }
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func buildTestCase(setup testsetup, err error, theirPrefixes ...netip.Prefix) testcase {
|
|
|
|
|
+ c1 := dummyCert{
|
|
|
|
|
+ name: "host1",
|
|
|
|
|
+ networks: theirPrefixes,
|
|
|
|
|
+ groups: []string{"default-group"},
|
|
|
|
|
+ issuer: "signer-shasum",
|
|
|
|
|
+ }
|
|
|
|
|
+ h := HostInfo{
|
|
|
|
|
+ ConnectionState: &ConnectionState{
|
|
|
|
|
+ peerCert: &cert.CachedCertificate{
|
|
|
|
|
+ Certificate: &c1,
|
|
|
|
|
+ InvertedGroups: map[string]struct{}{"default-group": {}},
|
|
|
|
|
+ },
|
|
|
|
|
+ },
|
|
|
|
|
+ vpnAddrs: make([]netip.Addr, len(theirPrefixes)),
|
|
|
|
|
+ }
|
|
|
|
|
+ for i := range theirPrefixes {
|
|
|
|
|
+ h.vpnAddrs[i] = theirPrefixes[i].Addr()
|
|
|
|
|
+ }
|
|
|
|
|
+ h.buildNetworks(setup.myVpnNetworksTable, &c1)
|
|
|
|
|
+ p := firewall.Packet{
|
|
|
|
|
+ LocalAddr: setup.c.Networks()[0].Addr(), //todo?
|
|
|
|
|
+ RemoteAddr: theirPrefixes[0].Addr(),
|
|
|
|
|
+ LocalPort: 10,
|
|
|
|
|
+ RemotePort: 90,
|
|
|
|
|
+ Protocol: firewall.ProtoUDP,
|
|
|
|
|
+ Fragment: false,
|
|
|
|
|
+ }
|
|
|
|
|
+ return testcase{
|
|
|
|
|
+ h: &h,
|
|
|
|
|
+ p: p,
|
|
|
|
|
+ c: &c1,
|
|
|
|
|
+ err: err,
|
|
|
|
|
+ }
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+type testsetup struct {
|
|
|
|
|
+ c dummyCert
|
|
|
|
|
+ myVpnNetworksTable *bart.Lite
|
|
|
|
|
+ fw *Firewall
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func newSetup(t *testing.T, l *logrus.Logger, myPrefixes ...netip.Prefix) testsetup {
|
|
|
|
|
+ c := dummyCert{
|
|
|
|
|
+ name: "me",
|
|
|
|
|
+ networks: myPrefixes,
|
|
|
|
|
+ groups: []string{"default-group"},
|
|
|
|
|
+ issuer: "signer-shasum",
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ return newSetupFromCert(t, l, c)
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func newSetupFromCert(t *testing.T, l *logrus.Logger, c dummyCert) testsetup {
|
|
|
|
|
+ myVpnNetworksTable := new(bart.Lite)
|
|
|
|
|
+ for _, prefix := range c.Networks() {
|
|
|
|
|
+ myVpnNetworksTable.Insert(prefix)
|
|
|
|
|
+ }
|
|
|
|
|
+ fw := NewFirewall(l, time.Second, time.Minute, time.Hour, &c)
|
|
|
|
|
+ require.NoError(t, fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", "", "", "", ""))
|
|
|
|
|
+
|
|
|
|
|
+ return testsetup{
|
|
|
|
|
+ c: c,
|
|
|
|
|
+ fw: fw,
|
|
|
|
|
+ myVpnNetworksTable: myVpnNetworksTable,
|
|
|
|
|
+ }
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+func TestFirewall_Drop_EnforceIPMatch(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ l := test.NewLogger()
|
|
|
|
|
+ ob := &bytes.Buffer{}
|
|
|
|
|
+ l.SetOutput(ob)
|
|
|
|
|
+
|
|
|
|
|
+ myPrefix := netip.MustParsePrefix("1.1.1.1/8")
|
|
|
|
|
+ // for now, it's okay that these are all "incoming", the logic this test tries to check doesn't care about in/out
|
|
|
|
|
+ t.Run("allow inbound all matching", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, nil, netip.MustParsePrefix("1.2.3.4/24"))
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("allow inbound local matching", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, ErrInvalidLocalIP, netip.MustParsePrefix("1.2.3.4/24"))
|
|
|
|
|
+ tc.p.LocalAddr = netip.MustParseAddr("1.2.3.8")
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("block inbound remote mismatched", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, ErrInvalidRemoteIP, netip.MustParsePrefix("1.2.3.4/24"))
|
|
|
|
|
+ tc.p.RemoteAddr = netip.MustParseAddr("9.9.9.9")
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("Block a vpn peer packet", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, ErrPeerRejected, netip.MustParsePrefix("2.2.2.2/24"))
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ twoPrefixes := []netip.Prefix{
|
|
|
|
|
+ netip.MustParsePrefix("1.2.3.4/24"), netip.MustParsePrefix("2.2.2.2/24"),
|
|
|
|
|
+ }
|
|
|
|
|
+ t.Run("allow inbound one matching", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, nil, twoPrefixes...)
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("block inbound multimismatch", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup := newSetup(t, l, myPrefix)
|
|
|
|
|
+ tc := buildTestCase(setup, ErrInvalidRemoteIP, twoPrefixes...)
|
|
|
|
|
+ tc.p.RemoteAddr = netip.MustParseAddr("9.9.9.9")
|
|
|
|
|
+ tc.Test(t, setup.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("allow inbound 2nd one matching", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ setup2 := newSetup(t, l, netip.MustParsePrefix("2.2.2.1/24"))
|
|
|
|
|
+ tc := buildTestCase(setup2, nil, twoPrefixes...)
|
|
|
|
|
+ tc.p.RemoteAddr = twoPrefixes[1].Addr()
|
|
|
|
|
+ tc.Test(t, setup2.fw)
|
|
|
|
|
+ })
|
|
|
|
|
+ t.Run("allow inbound unsafe route", func(t *testing.T) {
|
|
|
|
|
+ t.Parallel()
|
|
|
|
|
+ unsafePrefix := netip.MustParsePrefix("192.168.0.0/24")
|
|
|
|
|
+ c := dummyCert{
|
|
|
|
|
+ name: "me",
|
|
|
|
|
+ networks: []netip.Prefix{myPrefix},
|
|
|
|
|
+ unsafeNetworks: []netip.Prefix{unsafePrefix},
|
|
|
|
|
+ groups: []string{"default-group"},
|
|
|
|
|
+ issuer: "signer-shasum",
|
|
|
|
|
+ }
|
|
|
|
|
+ unsafeSetup := newSetupFromCert(t, l, c)
|
|
|
|
|
+ tc := buildTestCase(unsafeSetup, nil, twoPrefixes...)
|
|
|
|
|
+ tc.p.LocalAddr = netip.MustParseAddr("192.168.0.3")
|
|
|
|
|
+ tc.err = ErrNoMatchingRule
|
|
|
|
|
+ tc.Test(t, unsafeSetup.fw) //should hit firewall and bounce off
|
|
|
|
|
+ require.NoError(t, unsafeSetup.fw.AddRule(true, firewall.ProtoAny, 0, 0, []string{"any"}, "", "", unsafePrefix.String(), "", ""))
|
|
|
|
|
+ tc.err = nil
|
|
|
|
|
+ tc.Test(t, unsafeSetup.fw) //should pass
|
|
|
|
|
+ })
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
type addRuleCall struct {
|
|
type addRuleCall struct {
|
|
@@ -813,8 +1345,8 @@ type addRuleCall struct {
|
|
|
endPort int32
|
|
endPort int32
|
|
|
groups []string
|
|
groups []string
|
|
|
host string
|
|
host string
|
|
|
- ip netip.Prefix
|
|
|
|
|
- localIp netip.Prefix
|
|
|
|
|
|
|
+ ip string
|
|
|
|
|
+ localIp string
|
|
|
caName string
|
|
caName string
|
|
|
caSha string
|
|
caSha string
|
|
|
}
|
|
}
|
|
@@ -824,7 +1356,7 @@ type mockFirewall struct {
|
|
|
nextCallReturn error
|
|
nextCallReturn error
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
-func (mf *mockFirewall) AddRule(incoming bool, proto uint8, startPort int32, endPort int32, groups []string, host string, ip netip.Prefix, localIp netip.Prefix, caName string, caSha string) error {
|
|
|
|
|
|
|
+func (mf *mockFirewall) AddRule(incoming bool, proto uint8, startPort int32, endPort int32, groups []string, host string, ip, localIp, caName string, caSha string) error {
|
|
|
mf.lastCall = addRuleCall{
|
|
mf.lastCall = addRuleCall{
|
|
|
incoming: incoming,
|
|
incoming: incoming,
|
|
|
proto: proto,
|
|
proto: proto,
|