map: fix map port calculation for ICMP

type should be used to get ICMP type instead of code.

Type: fix
Signed-off-by: Vladimir Isaev <visaev@netgate.com>
Change-Id: Iabf4ae38befde18309caff8efd9e1d956a2fde82
This commit is contained in:
Vladimir Isaev
2020-02-26 14:41:46 +03:00
committed by Dave Barach
parent f13830ce76
commit 9251131111
4 changed files with 78 additions and 14 deletions
+2 -2
View File
@@ -524,11 +524,11 @@ ip4_map_t_classify (vlib_buffer_t * p0, map_domain_t * d0,
*next0 = IP4_MAPT_NEXT_MAPT_ICMP;
if (d0->ea_bits_len == 0 && d0->rules)
*dst_port0 = 0;
else if (((icmp46_header_t *) u8_ptr_add (ip40, sizeof (*ip40)))->code
else if (((icmp46_header_t *) u8_ptr_add (ip40, sizeof (*ip40)))->type
== ICMP4_echo_reply
|| ((icmp46_header_t *)
u8_ptr_add (ip40,
sizeof (*ip40)))->code == ICMP4_echo_request)
sizeof (*ip40)))->type == ICMP4_echo_request)
*dst_port0 = l4_dst_port;
}
else
+2 -2
View File
@@ -603,12 +603,12 @@ ip6_map_t (vlib_main_t * vm, vlib_node_runtime_t * node, vlib_frame_t * frame)
next0 = IP6_MAPT_NEXT_MAPT_ICMP;
if (((icmp46_header_t *)
u8_ptr_add (ip60,
vnet_buffer (p0)->map_t.v6.l4_offset))->code ==
vnet_buffer (p0)->map_t.v6.l4_offset))->type ==
ICMP6_echo_reply
|| ((icmp46_header_t *)
u8_ptr_add (ip60,
vnet_buffer (p0)->map_t.v6.l4_offset))->
code == ICMP6_echo_request)
type == ICMP6_echo_request)
map_port0 = l4_src_port;
}
else
+51 -10
View File
@@ -438,14 +438,14 @@ class TestMAP(VppTestCase):
def validate(self, rx, expected):
self.assertEqual(rx, expected.__class__(scapy.compat.raw(expected)))
def validate_frag(self, p6_frag, p_ip6_expected):
def validate_frag6(self, p6_frag, p_ip6_expected):
self.assertFalse(p6_frag.haslayer(IP))
self.assertTrue(p6_frag.haslayer(IPv6))
self.assertTrue(p6_frag.haslayer(IPv6ExtHdrFragment))
self.assertEqual(p6_frag[IPv6].src, p_ip6_expected.src)
self.assertEqual(p6_frag[IPv6].dst, p_ip6_expected.dst)
def validate_frag_payload_len(self, rx, proto, payload_len_expected):
def validate_frag_payload_len6(self, rx, proto, payload_len_expected):
payload_total = 0
for p in rx:
payload_total += p[IPv6].plen
@@ -458,6 +458,23 @@ class TestMAP(VppTestCase):
self.assertEqual(payload_total, payload_len_expected)
def validate_frag4(self, p4_frag, p_ip4_expected):
self.assertFalse(p4_frag.haslayer(IPv6))
self.assertTrue(p4_frag.haslayer(IP))
self.assertTrue(p4_frag[IP].frag != 0 or p4_frag[IP].flags.MF)
self.assertEqual(p4_frag[IP].src, p_ip4_expected.src)
self.assertEqual(p4_frag[IP].dst, p_ip4_expected.dst)
def validate_frag_payload_len4(self, rx, proto, payload_len_expected):
payload_total = 0
for p in rx:
payload_total += len(p[IP].payload)
# First fragment has proto
payload_total -= len(proto())
self.assertEqual(payload_total, payload_len_expected)
def payload(self, len):
return 'x' * len
@@ -612,11 +629,12 @@ class TestMAP(VppTestCase):
p_ip6_translated = IPv6(src='1234:5678:90ab:cdef:ac:1001:200:0',
dst='2001:db8:1e0::c0a8:1:e')
for p in rx:
self.validate_frag(p, p_ip6_translated)
self.validate_frag6(p, p_ip6_translated)
self.validate_frag_payload_len(rx, UDP, payload_len)
self.validate_frag_payload_len6(rx, UDP, payload_len)
# UDP packet fragmentation send fragments
payload_len = 1453
payload = UDP(sport=40000, dport=4000) / self.payload(payload_len)
p4 = (p_ether / p_ip4 / payload)
frags = fragment_rfc791(p4, fragsize=1000)
@@ -626,9 +644,32 @@ class TestMAP(VppTestCase):
rx = self.pg1.get_capture(2)
for p in rx:
self.validate_frag(p, p_ip6_translated)
self.validate_frag6(p, p_ip6_translated)
self.validate_frag_payload_len(rx, UDP, payload_len)
self.validate_frag_payload_len6(rx, UDP, payload_len)
# Send back an fragmented IPv6 UDP packet that will be "untranslated"
payload = UDP(sport=4000, dport=40000) / self.payload(payload_len)
p_ether6 = Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
p_ip6 = IPv6(src='2001:db8:1e0::c0a8:1:e',
dst='1234:5678:90ab:cdef:ac:1001:200:0')
p6 = (p_ether6 / p_ip6 / payload)
frags6 = fragment_rfc8200(p6, identification=0xdcba, fragsize=1000)
p_ip4_translated = IP(src='192.168.0.1', dst=self.pg0.remote_ip4)
p4_translated = (p_ip4_translated / payload)
p4_translated.id = 0
p4_translated.ttl -= 1
self.pg_enable_capture()
self.pg1.add_stream(frags6)
self.pg_start()
rx = self.pg0.get_capture(2)
for p in rx:
self.validate_frag4(p, p4_translated)
self.validate_frag_payload_len4(rx, UDP, payload_len)
# ICMP packet fragmentation
payload = ICMP(id=6529) / self.payload(payload_len)
@@ -641,9 +682,9 @@ class TestMAP(VppTestCase):
p_ip6_translated = IPv6(src='1234:5678:90ab:cdef:ac:1001:200:0',
dst='2001:db8:160::c0a8:1:6')
for p in rx:
self.validate_frag(p, p_ip6_translated)
self.validate_frag6(p, p_ip6_translated)
self.validate_frag_payload_len(rx, ICMPv6EchoRequest, payload_len)
self.validate_frag_payload_len6(rx, ICMPv6EchoRequest, payload_len)
# ICMP packet fragmentation send fragments
payload = ICMP(id=6529) / self.payload(payload_len)
@@ -655,9 +696,9 @@ class TestMAP(VppTestCase):
rx = self.pg1.get_capture(2)
for p in rx:
self.validate_frag(p, p_ip6_translated)
self.validate_frag6(p, p_ip6_translated)
self.validate_frag_payload_len(rx, ICMPv6EchoRequest, payload_len)
self.validate_frag_payload_len6(rx, ICMPv6EchoRequest, payload_len)
# TCP MSS clamping
self.vapi.map_param_set_tcp(1300)
+23
View File
@@ -503,6 +503,29 @@ class TestMAPBR(VppTestCase):
self.pg0.get_capture(0, timeout=1)
self.pg0.assert_nothing_captured("Should drop IPv6 spoof port PSID")
#
# Spoofed IPv6 ICMP ID PSID v6 -> v4 direction
# Send a packet with a wrong IPv6 IMCP ID PSID
# The BR should drop the packet.
#
def test_map_t_spoof_icmp_id_psid_ip6_to_ip4(self):
""" MAP-T spoof ICMP id psid IPv6 -> IPv4 """
eth = Ether(src=self.pg1.remote_mac,
dst=self.pg1.local_mac)
ip = IPv6(src=self.ipv6_cpe_address,
dst=self.ipv6_map_address)
icmp = ICMPv6EchoRequest()
icmp.id = self.ipv6_udp_or_tcp_spoof_port
payload = "H" * 10
tx_pkt = eth / ip / icmp / payload
self.pg_send(self.pg1, tx_pkt * 1)
self.pg0.get_capture(0, timeout=1)
self.pg0.assert_nothing_captured("Should drop IPv6 spoof port PSID")
#
# Map to Map - same rule, different address
#