Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automated tests for policy evaluation & traffic attribution #45

Open
dma opened this issue Sep 9, 2017 · 4 comments
Open

Automated tests for policy evaluation & traffic attribution #45

dma opened this issue Sep 9, 2017 · 4 comments

Comments

@dma
Copy link
Contributor

dma commented Sep 9, 2017

As Subgraph Firewall's complexity and scope grows, we more than ever need automated tests for FW policy evaluation and traffic source identification. This will help us clearly define & articulate the policy logic as well as the limits of SGFW.

Tests objectives:

Verifying policy decision in as many different cases as possible:

Create or generate test case allow/deny rules. Simulate connections/packets of different types, policy code evaluates packet against test rules, test pass if policy decision against expected result.

Accurately attributing traffic origin:

Simulates traffic from:

  • Processes (/proc)
  • Proxy ports (Tor, i2p, ssh socks5 proxy)
  • Sandboxes (oz-daemon, cleranet bridge..)

Test pass if fw-daemon's identified traffic origin matches expected result.

@dma dma changed the title Automated tests for policy evaluation Automated tests for policy evaluation & traffic attribution Sep 9, 2017
@dma
Copy link
Contributor Author

dma commented Sep 11, 2017

Another thing to test: testing the parser, i.e., validating that rules read from disk match expected results

@dma
Copy link
Contributor Author

dma commented Oct 1, 2017

Yet more testing: address globbing / wildcards vs. traffic and expected filter matches.

@dma
Copy link
Contributor Author

dma commented Oct 1, 2017

Extensive testing of TLSGuard: all versions and various types of TLS handshakes, including injection of TLS alerts, session resumption, and other things that can occur that we may not have expected.

@dma
Copy link
Contributor Author

dma commented Oct 1, 2017

Also testing onioncircuits style tracking of circuits vs. the attempt at forcing stream isolation in the SOCKS proxy, this could be automated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant