#!/bin/sh
# $FreeBSD$
sysctl security.mac.portacl >/dev/null 2>&1
if [ $? -ne 0 ]; then
echo "1..0 # SKIP MAC_PORTACL is unavailable."
exit 0
fi
if [ $(id -u) -ne 0 ]; then
echo "1..0 # SKIP testcases must be run as root"
exit 0
fi
ntest=1
check_bind() {
local host idtype name proto port udpflag
host="127.0.0.1"
timeout=1
idtype=${1}
name=${2}
proto=${3}
port=${4}
[ "${proto}" = "udp" ] && udpflag="-u"
out=$(
case "${idtype}" in
uid|gid)
( echo -n | su -m ${name} -c "nc ${udpflag} -l -w ${timeout} $host $port" 2>&1 ) &
;;
jail)
kill $$
;;
*)
kill $$
esac
sleep 0.3
echo | nc ${udpflag} -w ${timeout} $host $port >/dev/null 2>&1
wait
)
case "${out}" in
"nc: Permission denied"*|"nc: Operation not permitted"*)
echo fl
;;
"")
echo ok
;;
*)
echo ${out}
;;
esac
}
bind_test() {
local expect_without_rule expect_with_rule idtype name proto port
expect_without_rule=${1}
expect_with_rule=${2}
idtype=${3}
name=${4}
proto=${5}
port=${6}
sysctl security.mac.portacl.rules= >/dev/null
out=$(check_bind ${idtype} ${name} ${proto} ${port})
if [ "${out}" = "${expect_without_rule}" ]; then
echo "ok ${ntest}"
elif [ "${out}" = "ok" -o "${out}" = "fl" ]; then
echo "not ok ${ntest} # '${out}' != '${expect_without_rule}'"
else
echo "not ok ${ntest} # unexpected output: '${out}'"
fi
: $(( ntest += 1 ))
if [ "${idtype}" = "uid" ]; then
idstr=$(id -u ${name})
elif [ "${idtype}" = "gid" ]; then
idstr=$(id -g ${name})
else
idstr=${name}
fi
sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null
out=$(check_bind ${idtype} ${name} ${proto} ${port})
if [ "${out}" = "${expect_with_rule}" ]; then
echo "ok ${ntest}"
elif [ "${out}" = "ok" -o "${out}" = "fl" ]; then
echo "not ok ${ntest} # '${out}' != '${expect_with_rule}'"
else
echo "not ok ${ntest} # unexpected output: '${out}'"
fi
: $(( ntest += 1 ))
sysctl security.mac.portacl.rules= >/dev/null
}
reserved_high=$(sysctl -n net.inet.ip.portrange.reservedhigh)
suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt)
port_high=$(sysctl -n security.mac.portacl.port_high)
restore_settings() {
sysctl -n net.inet.ip.portrange.reservedhigh=${reserved_high} >/dev/null
sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null
sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null
}