| .TH ipftest 1 |
| .SH NAME |
| ipftest \- test packet filter rules with arbitrary input. |
| .SH SYNOPSIS |
| .B ipftest |
| [ |
| .B \-6bdDNovxX |
| ] [ |
| .B \-F |
| input-format |
| ] [ |
| .B \-I |
| interface |
| ] |
| .B \-r |
| <filename> |
| [ |
| .B \-i |
| <filename> |
| ] |
| .SH DESCRIPTION |
| .PP |
| \fBipftest\fP is provided for the purpose of being able to test a set of |
| filter rules without having to put them in place, in operation and proceed |
| to test their effectiveness. The hope is that this minimises disruptions |
| in providing a secure IP environment. |
| .PP |
| \fBipftest\fP will parse any standard ruleset for use with \fBipf\fP |
| and apply input, returning output as to the result. However, \fBipftest\fP |
| will return one of three values for packets passed through the filter: |
| pass, block or nomatch. This is intended to give the operator a better |
| idea of what is happening with packets passing through their filter |
| ruleset. |
| .PP |
| When used without either of \fB\-S\fP, \fB\-T\fP or \fB\-E\fP, |
| \fBipftest\fP uses its own text input format to generate "fake" IP packets. |
| The format used is as follows: |
| .nf |
| "in"|"out" "on" if ["tcp"|"udp"|"icmp"] |
| srchost[,srcport] dsthost[,destport] [FSRPAU] |
| .fi |
| .PP |
| This allows for a packet going "in" or "out" of an interface (if) to be |
| generated, being one of the three main protocols (optionally), and if |
| either TCP or UDP, a port parameter is also expected. If TCP is selected, |
| it is possible to (optionally) supply TCP flags at the end. Some examples |
| are: |
| .nf |
| # a UDP packet coming in on le0 |
| in on le0 udp 10.1.1.1,2210 10.2.1.5,23 |
| # an IP packet coming in on le0 from localhost - hmm :) |
| in on le0 localhost 10.4.12.1 |
| # a TCP packet going out of le0 with the SYN flag set. |
| out on le0 tcp 10.4.12.1,2245 10.1.1.1,23 S |
| .fi |
| .SH OPTIONS |
| .TP |
| .B \-v |
| Verbose mode. This provides more information about which parts of rule |
| matching the input packet passes and fails. |
| .TP |
| .B \-d |
| Turn on filter rule debugging. Currently, this only shows you what caused |
| the rule to not match in the IP header checking (addresses/netmasks, etc). |
| .TP |
| .B \-b |
| Cause the output to be a brief summary (one-word) of the result of passing |
| the packet through the filter; either "pass", "block" or "nomatch". |
| This is used in the regression testing. |
| .TP |
| .BR \-I \0<interface> |
| Set the interface name (used in rule matching) to be the name supplied. |
| This is useful with the \fB\-P, \-S, \-T\fP and \fB\-E\fP options, where it is |
| not otherwise possible to associate a packet with an interface. Normal |
| "text packets" can override this setting. |
| .TP |
| .B \-F |
| This option is used to select which input format the input file is in. |
| The following formats are available: etherfind, hex, pcap, snoop, tcpdump. |
| .RS |
| .TP |
| .B etherfind |
| The input file is to be text output from etherfind. The text formats which |
| are currently supported are those which result from the following etherfind |
| option combinations: |
| .PP |
| .nf |
| etherfind -n |
| etherfind -n -t |
| .fi |
| .TP |
| .B hex |
| The input file is to be hex digits, representing the binary makeup of the |
| packet. No length correction is made, if an incorrect length is put in |
| the IP header. A packet may be broken up over several lines of hex digits, |
| a blank line indicating the end of the packet. It is possible to specify |
| both the interface name and direction of the packet (for filtering purposes) |
| at the start of the line using this format: [direction,interface] To define |
| a packet going in on le0, we would use \fB[in,le0]\fP - the []'s are required |
| and part of the input syntax. |
| .HP |
| .B pcap |
| The input file specified by \fB\-i\fP is a binary file produced using libpcap |
| (i.e., tcpdump version 3). Packets are read from this file as being input |
| (for rule purposes). An interface maybe specified using \fB\-I\fP. |
| .TP |
| .B snoop |
| The input file is to be in "snoop" format (see RFC 1761). Packets are read |
| from this file and used as input from any interface. This is perhaps the |
| most useful input type, currently. |
| .TP |
| .B tcpdump |
| The input file is to be text output from tcpdump. The text formats which |
| are currently supported are those which result from the following tcpdump |
| option combinations: |
| .PP |
| .nf |
| tcpdump -n |
| tcpdump -nq |
| tcpdump -nqt |
| tcpdump -nqtt |
| tcpdump -nqte |
| .fi |
| .LP |
| .RE |
| .DT |
| .TP |
| .B \-X |
| The input file is composed of text descriptions of IP packets. |
| .TP |
| .BR \-i \0<filename> |
| Specify the filename from which to take input. Default is stdin. |
| .TP |
| .BR \-r \0<filename> |
| Specify the filename from which to read filter rules. |
| .SH SEE ALSO |
| ipf(5), ipf(8), snoop(1m), tcpdump(8), etherfind(8c) |
| .SH BUGS |
| Not all of the input formats are sufficiently capable of introducing a |
| wide enough variety of packets for them to be all useful in testing. |