pfctl.c revision 1.1.1.1 1 /* $OpenBSD: pfctl.c,v 1.213 2004/03/20 09:31:42 david Exp $ */
2
3 /*
4 * Copyright (c) 2001 Daniel Hartmeier
5 * Copyright (c) 2002,2003 Henning Brauer
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * - Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * - Redistributions in binary form must reproduce the above
15 * copyright notice, this list of conditions and the following
16 * disclaimer in the documentation and/or other materials provided
17 * with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
22 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
25 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
27 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
29 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
32 */
33
34 #include <sys/types.h>
35 #include <sys/ioctl.h>
36 #include <sys/socket.h>
37
38 #include <net/if.h>
39 #include <netinet/in.h>
40 #include <net/pfvar.h>
41 #include <arpa/inet.h>
42 #include <altq/altq.h>
43
44 #include <err.h>
45 #include <errno.h>
46 #include <fcntl.h>
47 #include <limits.h>
48 #include <netdb.h>
49 #include <stdio.h>
50 #include <stdlib.h>
51 #include <string.h>
52 #include <unistd.h>
53
54 #include "pfctl_parser.h"
55 #include "pfctl.h"
56
57 void usage(void);
58 int pfctl_enable(int, int);
59 int pfctl_disable(int, int);
60 int pfctl_clear_stats(int, int);
61 int pfctl_clear_rules(int, int, char *, char *);
62 int pfctl_clear_nat(int, int, char *, char *);
63 int pfctl_clear_altq(int, int);
64 int pfctl_clear_src_nodes(int, int);
65 int pfctl_clear_states(int, const char *, int);
66 int pfctl_kill_states(int, const char *, int);
67 int pfctl_get_pool(int, struct pf_pool *, u_int32_t, u_int32_t, int,
68 char *, char *);
69 void pfctl_print_rule_counters(struct pf_rule *, int);
70 int pfctl_show_rules(int, int, int, char *, char *);
71 int pfctl_show_nat(int, int, char *, char *);
72 int pfctl_show_src_nodes(int, int);
73 int pfctl_show_states(int, const char *, int);
74 int pfctl_show_status(int, int);
75 int pfctl_show_timeouts(int, int);
76 int pfctl_show_limits(int, int);
77 int pfctl_debug(int, u_int32_t, int);
78 int pfctl_clear_rule_counters(int, int);
79 int pfctl_test_altqsupport(int, int);
80 int pfctl_show_anchors(int, int, char *);
81 const char *pfctl_lookup_option(char *, const char **);
82
83 const char *clearopt;
84 char *rulesopt;
85 const char *showopt;
86 const char *debugopt;
87 char *anchoropt;
88 char *pf_device = "/dev/pf";
89 char *ifaceopt;
90 char *tableopt;
91 const char *tblcmdopt;
92 int state_killers;
93 char *state_kill[2];
94 int loadopt;
95 int altqsupport;
96
97 int dev = -1;
98 int first_title = 1;
99 int labels = 0;
100
101 const char *infile;
102
103 static const struct {
104 const char *name;
105 int index;
106 } pf_limits[] = {
107 { "states", PF_LIMIT_STATES },
108 { "src-nodes", PF_LIMIT_SRC_NODES },
109 { "frags", PF_LIMIT_FRAGS },
110 { NULL, 0 }
111 };
112
113 struct pf_hint {
114 const char *name;
115 int timeout;
116 };
117 static const struct pf_hint pf_hint_normal[] = {
118 { "tcp.first", 2 * 60 },
119 { "tcp.opening", 30 },
120 { "tcp.established", 24 * 60 * 60 },
121 { "tcp.closing", 15 * 60 },
122 { "tcp.finwait", 45 },
123 { "tcp.closed", 90 },
124 { NULL, 0 }
125 };
126 static const struct pf_hint pf_hint_satellite[] = {
127 { "tcp.first", 3 * 60 },
128 { "tcp.opening", 30 + 5 },
129 { "tcp.established", 24 * 60 * 60 },
130 { "tcp.closing", 15 * 60 + 5 },
131 { "tcp.finwait", 45 + 5 },
132 { "tcp.closed", 90 + 5 },
133 { NULL, 0 }
134 };
135 static const struct pf_hint pf_hint_conservative[] = {
136 { "tcp.first", 60 * 60 },
137 { "tcp.opening", 15 * 60 },
138 { "tcp.established", 5 * 24 * 60 * 60 },
139 { "tcp.closing", 60 * 60 },
140 { "tcp.finwait", 10 * 60 },
141 { "tcp.closed", 3 * 60 },
142 { NULL, 0 }
143 };
144 static const struct pf_hint pf_hint_aggressive[] = {
145 { "tcp.first", 30 },
146 { "tcp.opening", 5 },
147 { "tcp.established", 5 * 60 * 60 },
148 { "tcp.closing", 60 },
149 { "tcp.finwait", 30 },
150 { "tcp.closed", 30 },
151 { NULL, 0 }
152 };
153
154 static const struct {
155 const char *name;
156 const struct pf_hint *hint;
157 } pf_hints[] = {
158 { "normal", pf_hint_normal },
159 { "satellite", pf_hint_satellite },
160 { "high-latency", pf_hint_satellite },
161 { "conservative", pf_hint_conservative },
162 { "aggressive", pf_hint_aggressive },
163 { NULL, NULL }
164 };
165
166 static const char *clearopt_list[] = {
167 "nat", "queue", "rules", "Sources",
168 "state", "info", "Tables", "osfp", "all", NULL
169 };
170
171 static const char *showopt_list[] = {
172 "nat", "queue", "rules", "Anchors", "Sources", "state", "info",
173 "Interfaces", "labels", "timeouts", "memory", "Tables", "osfp",
174 "all", NULL
175 };
176
177 static const char *tblcmdopt_list[] = {
178 "kill", "flush", "add", "delete", "load", "replace", "show",
179 "test", "zero", NULL
180 };
181
182 static const char *debugopt_list[] = {
183 "none", "urgent", "misc", "loud", NULL
184 };
185
186
187 void
188 usage(void)
189 {
190 extern char *__progname;
191
192 fprintf(stderr, "usage: %s [-AdeghNnOqRrvz] ", __progname);
193 fprintf(stderr, "[-a anchor[:ruleset]] [-D macro=value]\n");
194 fprintf(stderr, " ");
195 fprintf(stderr, "[-F modifier] [-f file] [-i interface] ");
196 fprintf(stderr, "[-k host] [-p device]\n");
197 fprintf(stderr, " ");
198 fprintf(stderr, "[-s modifier] [-T command [address ...]] ");
199 fprintf(stderr, "[-t table] [-x level]\n");
200 exit(1);
201 }
202
203 int
204 pfctl_enable(int dev, int opts)
205 {
206 if (ioctl(dev, DIOCSTART)) {
207 if (errno == EEXIST)
208 errx(1, "pf already enabled");
209 else
210 err(1, "DIOCSTART");
211 }
212 if ((opts & PF_OPT_QUIET) == 0)
213 fprintf(stderr, "pf enabled\n");
214
215 if (altqsupport && ioctl(dev, DIOCSTARTALTQ))
216 if (errno != EEXIST)
217 err(1, "DIOCSTARTALTQ");
218
219 return (0);
220 }
221
222 int
223 pfctl_disable(int dev, int opts)
224 {
225 if (ioctl(dev, DIOCSTOP)) {
226 if (errno == ENOENT)
227 errx(1, "pf not enabled");
228 else
229 err(1, "DIOCSTOP");
230 }
231 if ((opts & PF_OPT_QUIET) == 0)
232 fprintf(stderr, "pf disabled\n");
233
234 if (altqsupport && ioctl(dev, DIOCSTOPALTQ))
235 if (errno != ENOENT)
236 err(1, "DIOCSTOPALTQ");
237
238 return (0);
239 }
240
241 int
242 pfctl_clear_stats(int dev, int opts)
243 {
244 if (ioctl(dev, DIOCCLRSTATUS))
245 err(1, "DIOCCLRSTATUS");
246 if ((opts & PF_OPT_QUIET) == 0)
247 fprintf(stderr, "pf: statistics cleared\n");
248 return (0);
249 }
250
251 int
252 pfctl_clear_rules(int dev, int opts, char *anchorname, char *rulesetname)
253 {
254 struct pfr_buffer t;
255
256 if (*anchorname && !*rulesetname) {
257 struct pfioc_ruleset pr;
258 int mnr, nr, r;
259
260 memset(&pr, 0, sizeof(pr));
261 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
262 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
263 if (errno == EINVAL)
264 fprintf(stderr, "No rulesets in anchor '%s'.\n",
265 anchorname);
266 else
267 err(1, "DIOCGETRULESETS");
268 return (-1);
269 }
270 mnr = pr.nr;
271 for (nr = mnr - 1; nr >= 0; --nr) {
272 pr.nr = nr;
273 if (ioctl(dev, DIOCGETRULESET, &pr))
274 err(1, "DIOCGETRULESET");
275 r = pfctl_clear_rules(dev, opts | PF_OPT_QUIET,
276 anchorname, pr.name);
277 if (r)
278 return (r);
279 }
280 if ((opts & PF_OPT_QUIET) == 0)
281 fprintf(stderr, "rules cleared\n");
282 return (0);
283 }
284 memset(&t, 0, sizeof(t));
285 t.pfrb_type = PFRB_TRANS;
286 if (pfctl_add_trans(&t, PF_RULESET_SCRUB, anchorname, rulesetname) ||
287 pfctl_add_trans(&t, PF_RULESET_FILTER, anchorname, rulesetname) ||
288 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
289 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
290 err(1, "pfctl_clear_rules");
291 if ((opts & PF_OPT_QUIET) == 0)
292 fprintf(stderr, "rules cleared\n");
293 return (0);
294 }
295
296 int
297 pfctl_clear_nat(int dev, int opts, char *anchorname, char *rulesetname)
298 {
299 struct pfr_buffer t;
300
301 if (*anchorname && !*rulesetname) {
302 struct pfioc_ruleset pr;
303 int mnr, nr, r;
304
305 memset(&pr, 0, sizeof(pr));
306 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
307 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
308 if (errno == EINVAL)
309 fprintf(stderr, "No rulesets in anchor '%s'.\n",
310 anchorname);
311 else
312 err(1, "DIOCGETRULESETS");
313 return (-1);
314 }
315 mnr = pr.nr;
316 for (nr = mnr - 1; nr >= 0; --nr) {
317 pr.nr = nr;
318 if (ioctl(dev, DIOCGETRULESET, &pr))
319 err(1, "DIOCGETRULESET");
320 r = pfctl_clear_nat(dev, opts | PF_OPT_QUIET,
321 anchorname, pr.name);
322 if (r)
323 return (r);
324 }
325 if ((opts & PF_OPT_QUIET) == 0)
326 fprintf(stderr, "nat cleared\n");
327 return (0);
328 }
329 memset(&t, 0, sizeof(t));
330 t.pfrb_type = PFRB_TRANS;
331 if (pfctl_add_trans(&t, PF_RULESET_NAT, anchorname, rulesetname) ||
332 pfctl_add_trans(&t, PF_RULESET_BINAT, anchorname, rulesetname) ||
333 pfctl_add_trans(&t, PF_RULESET_RDR, anchorname, rulesetname) ||
334 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
335 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
336 err(1, "pfctl_clear_nat");
337 if ((opts & PF_OPT_QUIET) == 0)
338 fprintf(stderr, "nat cleared\n");
339 return (0);
340 }
341
342 int
343 pfctl_clear_altq(int dev, int opts)
344 {
345 struct pfr_buffer t;
346
347 if (!altqsupport)
348 return (-1);
349 memset(&t, 0, sizeof(t));
350 t.pfrb_type = PFRB_TRANS;
351 if (pfctl_add_trans(&t, PF_RULESET_ALTQ, "", "") ||
352 pfctl_trans(dev, &t, DIOCXBEGIN, 0) ||
353 pfctl_trans(dev, &t, DIOCXCOMMIT, 0))
354 err(1, "pfctl_clear_altq");
355 if ((opts & PF_OPT_QUIET) == 0)
356 fprintf(stderr, "altq cleared\n");
357 return (0);
358 }
359
360 int
361 pfctl_clear_src_nodes(int dev, int opts)
362 {
363 if (ioctl(dev, DIOCCLRSRCNODES))
364 err(1, "DIOCCLRSRCNODES");
365 if ((opts & PF_OPT_QUIET) == 0)
366 fprintf(stderr, "source tracking entries cleared\n");
367 return (0);
368 }
369
370 int
371 pfctl_clear_states(int dev, const char *iface, int opts)
372 {
373 struct pfioc_state_kill psk;
374
375 memset(&psk, 0, sizeof(psk));
376 if (iface != NULL && strlcpy(psk.psk_ifname, iface,
377 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname))
378 errx(1, "invalid interface: %s", iface);
379
380 if (ioctl(dev, DIOCCLRSTATES, &psk))
381 err(1, "DIOCCLRSTATES");
382 if ((opts & PF_OPT_QUIET) == 0)
383 fprintf(stderr, "%d states cleared\n", psk.psk_af);
384 return (0);
385 }
386
387 int
388 pfctl_kill_states(int dev, const char *iface, int opts)
389 {
390 struct pfioc_state_kill psk;
391 struct addrinfo *res[2], *resp[2];
392 struct sockaddr last_src, last_dst;
393 int killed, sources, dests;
394 int ret_ga;
395
396 killed = sources = dests = 0;
397
398 memset(&psk, 0, sizeof(psk));
399 memset(&psk.psk_src.addr.v.a.mask, 0xff,
400 sizeof(psk.psk_src.addr.v.a.mask));
401 memset(&last_src, 0xff, sizeof(last_src));
402 memset(&last_dst, 0xff, sizeof(last_dst));
403 if (iface != NULL && strlcpy(psk.psk_ifname, iface,
404 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname))
405 errx(1, "invalid interface: %s", iface);
406
407 if ((ret_ga = getaddrinfo(state_kill[0], NULL, NULL, &res[0]))) {
408 errx(1, "getaddrinfo: %s", gai_strerror(ret_ga));
409 /* NOTREACHED */
410 }
411 for (resp[0] = res[0]; resp[0]; resp[0] = resp[0]->ai_next) {
412 if (resp[0]->ai_addr == NULL)
413 continue;
414 /* We get lots of duplicates. Catch the easy ones */
415 if (memcmp(&last_src, resp[0]->ai_addr, sizeof(last_src)) == 0)
416 continue;
417 last_src = *(struct sockaddr *)resp[0]->ai_addr;
418
419 psk.psk_af = resp[0]->ai_family;
420 sources++;
421
422 if (psk.psk_af == AF_INET)
423 psk.psk_src.addr.v.a.addr.v4 =
424 ((struct sockaddr_in *)resp[0]->ai_addr)->sin_addr;
425 else if (psk.psk_af == AF_INET6)
426 psk.psk_src.addr.v.a.addr.v6 =
427 ((struct sockaddr_in6 *)resp[0]->ai_addr)->
428 sin6_addr;
429 else
430 errx(1, "Unknown address family %d", psk.psk_af);
431
432 if (state_killers > 1) {
433 dests = 0;
434 memset(&psk.psk_dst.addr.v.a.mask, 0xff,
435 sizeof(psk.psk_dst.addr.v.a.mask));
436 memset(&last_dst, 0xff, sizeof(last_dst));
437 if ((ret_ga = getaddrinfo(state_kill[1], NULL, NULL,
438 &res[1]))) {
439 errx(1, "getaddrinfo: %s",
440 gai_strerror(ret_ga));
441 /* NOTREACHED */
442 }
443 for (resp[1] = res[1]; resp[1];
444 resp[1] = resp[1]->ai_next) {
445 if (resp[1]->ai_addr == NULL)
446 continue;
447 if (psk.psk_af != resp[1]->ai_family)
448 continue;
449
450 if (memcmp(&last_dst, resp[1]->ai_addr,
451 sizeof(last_dst)) == 0)
452 continue;
453 last_dst = *(struct sockaddr *)resp[1]->ai_addr;
454
455 dests++;
456
457 if (psk.psk_af == AF_INET)
458 psk.psk_dst.addr.v.a.addr.v4 =
459 ((struct sockaddr_in *)resp[1]->
460 ai_addr)->sin_addr;
461 else if (psk.psk_af == AF_INET6)
462 psk.psk_dst.addr.v.a.addr.v6 =
463 ((struct sockaddr_in6 *)resp[1]->
464 ai_addr)->sin6_addr;
465 else
466 errx(1, "Unknown address family %d",
467 psk.psk_af);
468
469 if (ioctl(dev, DIOCKILLSTATES, &psk))
470 err(1, "DIOCKILLSTATES");
471 killed += psk.psk_af;
472 /* fixup psk.psk_af */
473 psk.psk_af = resp[1]->ai_family;
474 }
475 freeaddrinfo(res[1]);
476 } else {
477 if (ioctl(dev, DIOCKILLSTATES, &psk))
478 err(1, "DIOCKILLSTATES");
479 killed += psk.psk_af;
480 /* fixup psk.psk_af */
481 psk.psk_af = res[0]->ai_family;
482 }
483 }
484
485 freeaddrinfo(res[0]);
486
487 if ((opts & PF_OPT_QUIET) == 0)
488 fprintf(stderr, "killed %d states from %d sources and %d "
489 "destinations\n", killed, sources, dests);
490 return (0);
491 }
492
493 int
494 pfctl_get_pool(int dev, struct pf_pool *pool, u_int32_t nr,
495 u_int32_t ticket, int r_action, char *anchorname, char *rulesetname)
496 {
497 struct pfioc_pooladdr pp;
498 struct pf_pooladdr *pa;
499 u_int32_t pnr, mpnr;
500
501 memset(&pp, 0, sizeof(pp));
502 memcpy(pp.anchor, anchorname, sizeof(pp.anchor));
503 memcpy(pp.ruleset, rulesetname, sizeof(pp.ruleset));
504 pp.r_action = r_action;
505 pp.r_num = nr;
506 pp.ticket = ticket;
507 if (ioctl(dev, DIOCGETADDRS, &pp)) {
508 warn("DIOCGETADDRS");
509 return (-1);
510 }
511 mpnr = pp.nr;
512 TAILQ_INIT(&pool->list);
513 for (pnr = 0; pnr < mpnr; ++pnr) {
514 pp.nr = pnr;
515 if (ioctl(dev, DIOCGETADDR, &pp)) {
516 warn("DIOCGETADDR");
517 return (-1);
518 }
519 pa = calloc(1, sizeof(struct pf_pooladdr));
520 if (pa == NULL)
521 err(1, "calloc");
522 bcopy(&pp.addr, pa, sizeof(struct pf_pooladdr));
523 TAILQ_INSERT_TAIL(&pool->list, pa, entries);
524 }
525
526 return (0);
527 }
528
529 void
530 pfctl_clear_pool(struct pf_pool *pool)
531 {
532 struct pf_pooladdr *pa;
533
534 while ((pa = TAILQ_FIRST(&pool->list)) != NULL) {
535 TAILQ_REMOVE(&pool->list, pa, entries);
536 free(pa);
537 }
538 }
539
540 void
541 pfctl_print_rule_counters(struct pf_rule *rule, int opts)
542 {
543 if (opts & PF_OPT_DEBUG) {
544 const char *t[PF_SKIP_COUNT] = { "i", "d", "f",
545 "p", "sa", "sp", "da", "dp" };
546 int i;
547
548 printf(" [ Skip steps: ");
549 for (i = 0; i < PF_SKIP_COUNT; ++i) {
550 if (rule->skip[i].nr == rule->nr + 1)
551 continue;
552 printf("%s=", t[i]);
553 if (rule->skip[i].nr == -1)
554 printf("end ");
555 else
556 printf("%u ", rule->skip[i].nr);
557 }
558 printf("]\n");
559
560 printf(" [ queue: qname=%s qid=%u pqname=%s pqid=%u ]\n",
561 rule->qname, rule->qid, rule->pqname, rule->pqid);
562 }
563 if (opts & PF_OPT_VERBOSE)
564 printf(" [ Evaluations: %-8llu Packets: %-8llu "
565 "Bytes: %-10llu States: %-6u]\n",
566 (unsigned long long)rule->evaluations,
567 (unsigned long long)rule->packets,
568 (unsigned long long)rule->bytes, rule->states);
569 }
570
571 void
572 pfctl_print_title(char *title)
573 {
574 if (!first_title)
575 printf("\n");
576 first_title = 0;
577 printf("%s\n", title);
578 }
579
580 int
581 pfctl_show_rules(int dev, int opts, int format, char *anchorname,
582 char *rulesetname)
583 {
584 struct pfioc_rule pr;
585 u_int32_t nr, mnr, header = 0;
586 int rule_numbers = opts & (PF_OPT_VERBOSE2 | PF_OPT_DEBUG);
587
588 if (*anchorname && !*rulesetname) {
589 struct pfioc_ruleset pr;
590 int r;
591
592 memset(&pr, 0, sizeof(pr));
593 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
594 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
595 if (errno == EINVAL)
596 fprintf(stderr, "No rulesets in anchor '%s'.\n",
597 anchorname);
598 else
599 err(1, "DIOCGETRULESETS");
600 return (-1);
601 }
602 if (opts & PF_OPT_SHOWALL && pr.nr)
603 pfctl_print_title("FILTER RULES:");
604 mnr = pr.nr;
605 for (nr = 0; nr < mnr; ++nr) {
606 pr.nr = nr;
607 if (ioctl(dev, DIOCGETRULESET, &pr))
608 err(1, "DIOCGETRULESET");
609 r = pfctl_show_rules(dev, opts, format, anchorname,
610 pr.name);
611 if (r)
612 return (r);
613 }
614 return (0);
615 }
616
617 memset(&pr, 0, sizeof(pr));
618 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
619 memcpy(pr.ruleset, rulesetname, sizeof(pr.ruleset));
620 if (opts & PF_OPT_SHOWALL) {
621 pr.rule.action = PF_PASS;
622 if (ioctl(dev, DIOCGETRULES, &pr)) {
623 warn("DIOCGETRULES");
624 return (-1);
625 }
626 header++;
627 }
628 pr.rule.action = PF_SCRUB;
629 if (ioctl(dev, DIOCGETRULES, &pr)) {
630 warn("DIOCGETRULES");
631 return (-1);
632 }
633 if (opts & PF_OPT_SHOWALL) {
634 if (format == 0 && (pr.nr > 0 || header))
635 pfctl_print_title("FILTER RULES:");
636 else if (format == 1 && labels)
637 pfctl_print_title("LABEL COUNTERS:");
638 }
639 mnr = pr.nr;
640 for (nr = 0; nr < mnr; ++nr) {
641 pr.nr = nr;
642 if (ioctl(dev, DIOCGETRULE, &pr)) {
643 warn("DIOCGETRULE");
644 return (-1);
645 }
646
647 if (pfctl_get_pool(dev, &pr.rule.rpool,
648 nr, pr.ticket, PF_SCRUB, anchorname, rulesetname) != 0)
649 return (-1);
650
651 switch (format) {
652 case 1:
653 if (pr.rule.label[0]) {
654 printf("%s ", pr.rule.label);
655 printf("%llu %llu %llu\n",
656 (unsigned long long)pr.rule.evaluations,
657 (unsigned long long)pr.rule.packets,
658 (unsigned long long)pr.rule.bytes);
659 }
660 break;
661 default:
662 if (pr.rule.label[0] && (opts & PF_OPT_SHOWALL))
663 labels = 1;
664 print_rule(&pr.rule, rule_numbers);
665 pfctl_print_rule_counters(&pr.rule, opts);
666 }
667 pfctl_clear_pool(&pr.rule.rpool);
668 }
669 pr.rule.action = PF_PASS;
670 if (ioctl(dev, DIOCGETRULES, &pr)) {
671 warn("DIOCGETRULES");
672 return (-1);
673 }
674 mnr = pr.nr;
675 for (nr = 0; nr < mnr; ++nr) {
676 pr.nr = nr;
677 if (ioctl(dev, DIOCGETRULE, &pr)) {
678 warn("DIOCGETRULE");
679 return (-1);
680 }
681
682 if (pfctl_get_pool(dev, &pr.rule.rpool,
683 nr, pr.ticket, PF_PASS, anchorname, rulesetname) != 0)
684 return (-1);
685
686 switch (format) {
687 case 1:
688 if (pr.rule.label[0]) {
689 printf("%s ", pr.rule.label);
690 printf("%llu %llu %llu\n",
691 (unsigned long long)pr.rule.evaluations,
692 (unsigned long long)pr.rule.packets,
693 (unsigned long long)pr.rule.bytes);
694 }
695 break;
696 default:
697 if (pr.rule.label[0] && (opts & PF_OPT_SHOWALL))
698 labels = 1;
699 print_rule(&pr.rule, rule_numbers);
700 pfctl_print_rule_counters(&pr.rule, opts);
701 }
702 pfctl_clear_pool(&pr.rule.rpool);
703 }
704 return (0);
705 }
706
707 int
708 pfctl_show_nat(int dev, int opts, char *anchorname, char *rulesetname)
709 {
710 struct pfioc_rule pr;
711 u_int32_t mnr, nr;
712 static int nattype[3] = { PF_NAT, PF_RDR, PF_BINAT };
713 int i, dotitle = opts & PF_OPT_SHOWALL;
714
715 if (*anchorname && !*rulesetname) {
716 struct pfioc_ruleset pr;
717 int r;
718
719 memset(&pr, 0, sizeof(pr));
720 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
721 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
722 if (errno == EINVAL)
723 fprintf(stderr, "No rulesets in anchor '%s'.\n",
724 anchorname);
725 else
726 err(1, "DIOCGETRULESETS");
727 return (-1);
728 }
729 mnr = pr.nr;
730 for (nr = 0; nr < mnr; ++nr) {
731 pr.nr = nr;
732 if (ioctl(dev, DIOCGETRULESET, &pr))
733 err(1, "DIOCGETRULESET");
734 r = pfctl_show_nat(dev, opts, anchorname, pr.name);
735 if (r)
736 return (r);
737 }
738 return (0);
739 }
740
741 memset(&pr, 0, sizeof(pr));
742 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
743 memcpy(pr.ruleset, rulesetname, sizeof(pr.ruleset));
744 for (i = 0; i < 3; i++) {
745 pr.rule.action = nattype[i];
746 if (ioctl(dev, DIOCGETRULES, &pr)) {
747 warn("DIOCGETRULES");
748 return (-1);
749 }
750 mnr = pr.nr;
751 for (nr = 0; nr < mnr; ++nr) {
752 pr.nr = nr;
753 if (ioctl(dev, DIOCGETRULE, &pr)) {
754 warn("DIOCGETRULE");
755 return (-1);
756 }
757 if (pfctl_get_pool(dev, &pr.rule.rpool, nr,
758 pr.ticket, nattype[i], anchorname,
759 rulesetname) != 0)
760 return (-1);
761 if (dotitle) {
762 pfctl_print_title("TRANSLATION RULES:");
763 dotitle = 0;
764 }
765 print_rule(&pr.rule, opts & PF_OPT_VERBOSE2);
766 pfctl_print_rule_counters(&pr.rule, opts);
767 pfctl_clear_pool(&pr.rule.rpool);
768 }
769 }
770 return (0);
771 }
772
773 int
774 pfctl_show_src_nodes(int dev, int opts)
775 {
776 struct pfioc_src_nodes psn;
777 struct pf_src_node *p;
778 char *inbuf = NULL, *newinbuf = NULL;
779 unsigned len = 0;
780 int i;
781
782 memset(&psn, 0, sizeof(psn));
783 for (;;) {
784 psn.psn_len = len;
785 if (len) {
786 newinbuf = realloc(inbuf, len);
787 if (newinbuf == NULL)
788 err(1, "realloc");
789 psn.psn_buf = inbuf = newinbuf;
790 }
791 if (ioctl(dev, DIOCGETSRCNODES, &psn) < 0) {
792 warn("DIOCGETSRCNODES");
793 return (-1);
794 }
795 if (psn.psn_len + sizeof(struct pfioc_src_nodes) < len)
796 break;
797 if (len == 0 && psn.psn_len == 0)
798 return (0);
799 if (len == 0 && psn.psn_len != 0)
800 len = psn.psn_len;
801 if (psn.psn_len == 0)
802 return (0); /* no src_nodes */
803 len *= 2;
804 }
805 p = psn.psn_src_nodes;
806 if (psn.psn_len > 0 && (opts & PF_OPT_SHOWALL))
807 pfctl_print_title("SOURCE TRACKING NODES:");
808 for (i = 0; i < psn.psn_len; i += sizeof(*p)) {
809 print_src_node(p, opts);
810 p++;
811 }
812 return (0);
813 }
814
815 int
816 pfctl_show_states(int dev, const char *iface, int opts)
817 {
818 struct pfioc_states ps;
819 struct pf_state *p;
820 char *inbuf = NULL, *newinbuf = NULL;
821 unsigned len = 0;
822 int i, dotitle = (opts & PF_OPT_SHOWALL);
823
824 memset(&ps, 0, sizeof(ps));
825 for (;;) {
826 ps.ps_len = len;
827 if (len) {
828 newinbuf = realloc(inbuf, len);
829 if (newinbuf == NULL)
830 err(1, "realloc");
831 ps.ps_buf = inbuf = newinbuf;
832 }
833 if (ioctl(dev, DIOCGETSTATES, &ps) < 0) {
834 warn("DIOCGETSTATES");
835 return (-1);
836 }
837 if (ps.ps_len + sizeof(struct pfioc_states) < len)
838 break;
839 if (len == 0 && ps.ps_len == 0)
840 return (0);
841 if (len == 0 && ps.ps_len != 0)
842 len = ps.ps_len;
843 if (ps.ps_len == 0)
844 return (0); /* no states */
845 len *= 2;
846 }
847 p = ps.ps_states;
848 for (i = 0; i < ps.ps_len; i += sizeof(*p), p++) {
849 if (iface != NULL && strcmp(p->u.ifname, iface))
850 continue;
851 if (dotitle) {
852 pfctl_print_title("STATES:");
853 dotitle = 0;
854 }
855 print_state(p, opts);
856 }
857 return (0);
858 }
859
860 int
861 pfctl_show_status(int dev, int opts)
862 {
863 struct pf_status status;
864
865 if (ioctl(dev, DIOCGETSTATUS, &status)) {
866 warn("DIOCGETSTATUS");
867 return (-1);
868 }
869 if (opts & PF_OPT_SHOWALL)
870 pfctl_print_title("INFO:");
871 print_status(&status, opts);
872 return (0);
873 }
874
875 int
876 pfctl_show_timeouts(int dev, int opts)
877 {
878 struct pfioc_tm pt;
879 int i;
880
881 if (opts & PF_OPT_SHOWALL)
882 pfctl_print_title("TIMEOUTS:");
883 memset(&pt, 0, sizeof(pt));
884 for (i = 0; pf_timeouts[i].name; i++) {
885 pt.timeout = pf_timeouts[i].timeout;
886 if (ioctl(dev, DIOCGETTIMEOUT, &pt))
887 err(1, "DIOCGETTIMEOUT");
888 printf("%-20s %10d", pf_timeouts[i].name, pt.seconds);
889 if (i >= PFTM_ADAPTIVE_START && i <= PFTM_ADAPTIVE_END)
890 printf(" states");
891 else
892 printf("s");
893 printf("\n");
894 }
895 return (0);
896
897 }
898
899 int
900 pfctl_show_limits(int dev, int opts)
901 {
902 struct pfioc_limit pl;
903 int i;
904
905 if (opts & PF_OPT_SHOWALL)
906 pfctl_print_title("LIMITS:");
907 memset(&pl, 0, sizeof(pl));
908 for (i = 0; pf_limits[i].name; i++) {
909 pl.index = pf_limits[i].index;
910 if (ioctl(dev, DIOCGETLIMIT, &pl))
911 err(1, "DIOCGETLIMIT");
912 printf("%-10s ", pf_limits[i].name);
913 if (pl.limit == UINT_MAX)
914 printf("unlimited\n");
915 else
916 printf("hard limit %6u\n", pl.limit);
917 }
918 return (0);
919 }
920
921 /* callbacks for rule/nat/rdr/addr */
922 int
923 pfctl_add_pool(struct pfctl *pf, struct pf_pool *p, sa_family_t af)
924 {
925 struct pf_pooladdr *pa;
926
927 if ((pf->opts & PF_OPT_NOACTION) == 0) {
928 if (ioctl(pf->dev, DIOCBEGINADDRS, &pf->paddr))
929 err(1, "DIOCBEGINADDRS");
930 }
931
932 pf->paddr.af = af;
933 TAILQ_FOREACH(pa, &p->list, entries) {
934 memcpy(&pf->paddr.addr, pa, sizeof(struct pf_pooladdr));
935 if ((pf->opts & PF_OPT_NOACTION) == 0) {
936 if (ioctl(pf->dev, DIOCADDADDR, &pf->paddr))
937 err(1, "DIOCADDADDR");
938 }
939 }
940 return (0);
941 }
942
943 int
944 pfctl_add_rule(struct pfctl *pf, struct pf_rule *r)
945 {
946 u_int8_t rs_num;
947 struct pfioc_rule pr;
948
949 switch (r->action) {
950 case PF_SCRUB:
951 if ((loadopt & PFCTL_FLAG_FILTER) == 0)
952 return (0);
953 rs_num = PF_RULESET_SCRUB;
954 break;
955 case PF_DROP:
956 case PF_PASS:
957 if ((loadopt & PFCTL_FLAG_FILTER) == 0)
958 return (0);
959 rs_num = PF_RULESET_FILTER;
960 break;
961 case PF_NAT:
962 case PF_NONAT:
963 if ((loadopt & PFCTL_FLAG_NAT) == 0)
964 return (0);
965 rs_num = PF_RULESET_NAT;
966 break;
967 case PF_RDR:
968 case PF_NORDR:
969 if ((loadopt & PFCTL_FLAG_NAT) == 0)
970 return (0);
971 rs_num = PF_RULESET_RDR;
972 break;
973 case PF_BINAT:
974 case PF_NOBINAT:
975 if ((loadopt & PFCTL_FLAG_NAT) == 0)
976 return (0);
977 rs_num = PF_RULESET_BINAT;
978 break;
979 default:
980 errx(1, "Invalid rule type");
981 break;
982 }
983
984 if ((pf->opts & PF_OPT_NOACTION) == 0) {
985 bzero(&pr, sizeof(pr));
986 if (strlcpy(pr.anchor, pf->anchor, sizeof(pr.anchor)) >=
987 sizeof(pr.anchor) ||
988 strlcpy(pr.ruleset, pf->ruleset, sizeof(pr.ruleset)) >=
989 sizeof(pr.ruleset))
990 errx(1, "pfctl_add_rule: strlcpy");
991 if (pfctl_add_pool(pf, &r->rpool, r->af))
992 return (1);
993 pr.ticket = pfctl_get_ticket(pf->trans, rs_num, pf->anchor,
994 pf->ruleset);
995 pr.pool_ticket = pf->paddr.ticket;
996 memcpy(&pr.rule, r, sizeof(pr.rule));
997 if (ioctl(pf->dev, DIOCADDRULE, &pr))
998 err(1, "DIOCADDRULE");
999 }
1000 if (pf->opts & PF_OPT_VERBOSE)
1001 print_rule(r, pf->opts & PF_OPT_VERBOSE2);
1002 pfctl_clear_pool(&r->rpool);
1003 return (0);
1004 }
1005
1006 int
1007 pfctl_add_altq(struct pfctl *pf, struct pf_altq *a)
1008 {
1009 if (altqsupport &&
1010 (loadopt & PFCTL_FLAG_ALTQ) != 0) {
1011 memcpy(&pf->paltq->altq, a, sizeof(struct pf_altq));
1012 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1013 if (ioctl(pf->dev, DIOCADDALTQ, pf->paltq)) {
1014 if (errno == ENXIO)
1015 errx(1, "qtype not configured");
1016 else if (errno == ENODEV)
1017 errx(1, "%s: driver does not support "
1018 "altq", a->ifname);
1019 else
1020 err(1, "DIOCADDALTQ");
1021 }
1022 }
1023 pfaltq_store(&pf->paltq->altq);
1024 }
1025 return (0);
1026 }
1027
1028 int
1029 pfctl_rules(int dev, char *filename, int opts, char *anchorname,
1030 char *rulesetname, struct pfr_buffer *trans)
1031 {
1032 #define ERR(x) do { warn(x); goto _error; } while(0)
1033 #define ERRX(x) do { warnx(x); goto _error; } while(0)
1034
1035 FILE *fin;
1036 struct pfr_buffer *t, buf;
1037 struct pfioc_altq pa;
1038 struct pfctl pf;
1039 struct pfr_table trs;
1040 int osize;
1041
1042 if (trans == NULL) {
1043 bzero(&buf, sizeof(buf));
1044 buf.pfrb_type = PFRB_TRANS;
1045 t = &buf;
1046 osize = 0;
1047 } else {
1048 t = trans;
1049 osize = t->pfrb_size;
1050 }
1051
1052 memset(&pa, 0, sizeof(pa));
1053 memset(&pf, 0, sizeof(pf));
1054 memset(&trs, 0, sizeof(trs));
1055 if (strlcpy(trs.pfrt_anchor, anchorname,
1056 sizeof(trs.pfrt_anchor)) >= sizeof(trs.pfrt_anchor) ||
1057 strlcpy(trs.pfrt_ruleset, rulesetname,
1058 sizeof(trs.pfrt_ruleset)) >= sizeof(trs.pfrt_ruleset))
1059 ERRX("pfctl_rules: strlcpy");
1060 if (strcmp(filename, "-") == 0) {
1061 fin = stdin;
1062 infile = "stdin";
1063 } else {
1064 if ((fin = fopen(filename, "r")) == NULL) {
1065 warn("%s", filename);
1066 return (1);
1067 }
1068 infile = filename;
1069 }
1070 pf.dev = dev;
1071 pf.opts = opts;
1072 pf.loadopt = loadopt;
1073 if (anchorname[0])
1074 pf.loadopt &= ~PFCTL_FLAG_ALTQ;
1075 pf.paltq = &pa;
1076 pf.trans = t;
1077 pf.rule_nr = 0;
1078 pf.anchor = anchorname;
1079 pf.ruleset = rulesetname;
1080
1081 if ((opts & PF_OPT_NOACTION) == 0) {
1082 if ((pf.loadopt & PFCTL_FLAG_NAT) != 0) {
1083 if (pfctl_add_trans(t, PF_RULESET_NAT, anchorname,
1084 rulesetname) ||
1085 pfctl_add_trans(t, PF_RULESET_BINAT, anchorname,
1086 rulesetname) ||
1087 pfctl_add_trans(t, PF_RULESET_RDR, anchorname,
1088 rulesetname))
1089 ERR("pfctl_rules");
1090 }
1091 if (((altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ) != 0))) {
1092 if (pfctl_add_trans(t, PF_RULESET_ALTQ, anchorname,
1093 rulesetname))
1094 ERR("pfctl_rules");
1095 }
1096 if ((pf.loadopt & PFCTL_FLAG_FILTER) != 0) {
1097 if (pfctl_add_trans(t, PF_RULESET_SCRUB, anchorname,
1098 rulesetname) ||
1099 pfctl_add_trans(t, PF_RULESET_FILTER, anchorname,
1100 rulesetname))
1101 ERR("pfctl_rules");
1102 }
1103 if (pf.loadopt & PFCTL_FLAG_TABLE) {
1104 if (pfctl_add_trans(t, PF_RULESET_TABLE, anchorname,
1105 rulesetname))
1106 ERR("pfctl_rules");
1107 }
1108 if (pfctl_trans(dev, t, DIOCXBEGIN, osize))
1109 ERR("DIOCXBEGIN");
1110 if (altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ))
1111 pa.ticket = pfctl_get_ticket(t, PF_RULESET_ALTQ,
1112 anchorname, rulesetname);
1113 if (pf.loadopt & PFCTL_FLAG_TABLE)
1114 pf.tticket = pfctl_get_ticket(t, PF_RULESET_TABLE,
1115 anchorname, rulesetname);
1116 }
1117 if (parse_rules(fin, &pf) < 0) {
1118 if ((opts & PF_OPT_NOACTION) == 0)
1119 ERRX("Syntax error in config file: "
1120 "pf rules not loaded");
1121 else
1122 goto _error;
1123 }
1124 if ((altqsupport && (pf.loadopt & PFCTL_FLAG_ALTQ) != 0))
1125 if (check_commit_altq(dev, opts) != 0)
1126 ERRX("errors in altq config");
1127 if (fin != stdin)
1128 fclose(fin);
1129
1130 /* process "load anchor" directives */
1131 if (!anchorname[0] && !rulesetname[0])
1132 if (pfctl_load_anchors(dev, opts, t) == -1)
1133 ERRX("load anchors");
1134
1135 if (trans == NULL && (opts & PF_OPT_NOACTION) == 0)
1136 if (pfctl_trans(dev, t, DIOCXCOMMIT, 0))
1137 ERR("DIOCXCOMMIT");
1138 return (0);
1139
1140 _error:
1141 if (trans == NULL) { /* main ruleset */
1142 if ((opts & PF_OPT_NOACTION) == 0)
1143 if (pfctl_trans(dev, t, DIOCXROLLBACK, 0))
1144 err(1, "DIOCXROLLBACK");
1145 exit(1);
1146 } else /* sub ruleset */
1147 return (-1);
1148
1149 #undef ERR
1150 #undef ERRX
1151 }
1152
1153 int
1154 pfctl_set_limit(struct pfctl *pf, const char *opt, unsigned int limit)
1155 {
1156 struct pfioc_limit pl;
1157 int i;
1158
1159 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1160 return (0);
1161
1162 memset(&pl, 0, sizeof(pl));
1163 for (i = 0; pf_limits[i].name; i++) {
1164 if (strcasecmp(opt, pf_limits[i].name) == 0) {
1165 pl.index = pf_limits[i].index;
1166 pl.limit = limit;
1167 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1168 if (ioctl(pf->dev, DIOCSETLIMIT, &pl)) {
1169 if (errno == EBUSY) {
1170 warnx("Current pool "
1171 "size exceeds requested "
1172 "hard limit");
1173 return (1);
1174 } else
1175 err(1, "DIOCSETLIMIT");
1176 }
1177 }
1178 break;
1179 }
1180 }
1181 if (pf_limits[i].name == NULL) {
1182 warnx("Bad pool name.");
1183 return (1);
1184 }
1185
1186 if (pf->opts & PF_OPT_VERBOSE)
1187 printf("set limit %s %d\n", opt, limit);
1188
1189 return (0);
1190 }
1191
1192 int
1193 pfctl_set_timeout(struct pfctl *pf, const char *opt, int seconds, int quiet)
1194 {
1195 struct pfioc_tm pt;
1196 int i;
1197
1198 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1199 return (0);
1200
1201 memset(&pt, 0, sizeof(pt));
1202 for (i = 0; pf_timeouts[i].name; i++) {
1203 if (strcasecmp(opt, pf_timeouts[i].name) == 0) {
1204 pt.timeout = pf_timeouts[i].timeout;
1205 break;
1206 }
1207 }
1208
1209 if (pf_timeouts[i].name == NULL) {
1210 warnx("Bad timeout name.");
1211 return (1);
1212 }
1213
1214 pt.seconds = seconds;
1215 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1216 if (ioctl(pf->dev, DIOCSETTIMEOUT, &pt))
1217 err(1, "DIOCSETTIMEOUT");
1218 }
1219
1220 if (pf->opts & PF_OPT_VERBOSE && ! quiet)
1221 printf("set timeout %s %d\n", opt, seconds);
1222
1223 return (0);
1224 }
1225
1226 int
1227 pfctl_set_optimization(struct pfctl *pf, const char *opt)
1228 {
1229 const struct pf_hint *hint;
1230 int i, r;
1231
1232 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1233 return (0);
1234
1235 for (i = 0; pf_hints[i].name; i++)
1236 if (strcasecmp(opt, pf_hints[i].name) == 0)
1237 break;
1238
1239 hint = pf_hints[i].hint;
1240 if (hint == NULL) {
1241 warnx("Bad hint name.");
1242 return (1);
1243 }
1244
1245 for (i = 0; hint[i].name; i++)
1246 if ((r = pfctl_set_timeout(pf, hint[i].name,
1247 hint[i].timeout, 1)))
1248 return (r);
1249
1250 if (pf->opts & PF_OPT_VERBOSE)
1251 printf("set optimization %s\n", opt);
1252
1253 return (0);
1254 }
1255
1256 int
1257 pfctl_set_logif(struct pfctl *pf, char *ifname)
1258 {
1259 struct pfioc_if pi;
1260
1261 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1262 return (0);
1263
1264 memset(&pi, 0, sizeof(pi));
1265 if ((pf->opts & PF_OPT_NOACTION) == 0) {
1266 if (!strcmp(ifname, "none"))
1267 bzero(pi.ifname, sizeof(pi.ifname));
1268 else {
1269 if (strlcpy(pi.ifname, ifname,
1270 sizeof(pi.ifname)) >= sizeof(pi.ifname))
1271 errx(1, "pfctl_set_logif: strlcpy");
1272 }
1273 if (ioctl(pf->dev, DIOCSETSTATUSIF, &pi))
1274 err(1, "DIOCSETSTATUSIF");
1275 }
1276
1277 if (pf->opts & PF_OPT_VERBOSE)
1278 printf("set loginterface %s\n", ifname);
1279
1280 return (0);
1281 }
1282
1283 int
1284 pfctl_set_hostid(struct pfctl *pf, u_int32_t hostid)
1285 {
1286 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1287 return (0);
1288
1289 HTONL(hostid);
1290
1291 if ((pf->opts & PF_OPT_NOACTION) == 0)
1292 if (ioctl(dev, DIOCSETHOSTID, &hostid))
1293 err(1, "DIOCSETHOSTID");
1294
1295 if (pf->opts & PF_OPT_VERBOSE)
1296 printf("set hostid 0x%08x\n", ntohl(hostid));
1297
1298 return (0);
1299 }
1300
1301 int
1302 pfctl_set_debug(struct pfctl *pf, char *d)
1303 {
1304 u_int32_t level;
1305
1306 if ((loadopt & PFCTL_FLAG_OPTION) == 0)
1307 return (0);
1308
1309 if (!strcmp(d, "none"))
1310 level = PF_DEBUG_NONE;
1311 else if (!strcmp(d, "urgent"))
1312 level = PF_DEBUG_URGENT;
1313 else if (!strcmp(d, "misc"))
1314 level = PF_DEBUG_MISC;
1315 else if (!strcmp(d, "loud"))
1316 level = PF_DEBUG_NOISY;
1317 else {
1318 warnx("unknown debug level \"%s\"", d);
1319 return (-1);
1320 }
1321
1322 if ((pf->opts & PF_OPT_NOACTION) == 0)
1323 if (ioctl(dev, DIOCSETDEBUG, &level))
1324 err(1, "DIOCSETDEBUG");
1325
1326 if (pf->opts & PF_OPT_VERBOSE)
1327 printf("set debug %s\n", d);
1328
1329 return (0);
1330 }
1331
1332 int
1333 pfctl_debug(int dev, u_int32_t level, int opts)
1334 {
1335 if (ioctl(dev, DIOCSETDEBUG, &level))
1336 err(1, "DIOCSETDEBUG");
1337 if ((opts & PF_OPT_QUIET) == 0) {
1338 fprintf(stderr, "debug level set to '");
1339 switch (level) {
1340 case PF_DEBUG_NONE:
1341 fprintf(stderr, "none");
1342 break;
1343 case PF_DEBUG_URGENT:
1344 fprintf(stderr, "urgent");
1345 break;
1346 case PF_DEBUG_MISC:
1347 fprintf(stderr, "misc");
1348 break;
1349 case PF_DEBUG_NOISY:
1350 fprintf(stderr, "loud");
1351 break;
1352 default:
1353 fprintf(stderr, "<invalid>");
1354 break;
1355 }
1356 fprintf(stderr, "'\n");
1357 }
1358 return (0);
1359 }
1360
1361 int
1362 pfctl_clear_rule_counters(int dev, int opts)
1363 {
1364 if (ioctl(dev, DIOCCLRRULECTRS))
1365 err(1, "DIOCCLRRULECTRS");
1366 if ((opts & PF_OPT_QUIET) == 0)
1367 fprintf(stderr, "pf: rule counters cleared\n");
1368 return (0);
1369 }
1370
1371 int
1372 pfctl_test_altqsupport(int dev, int opts)
1373 {
1374 struct pfioc_altq pa;
1375
1376 if (ioctl(dev, DIOCGETALTQS, &pa)) {
1377 if (errno == ENODEV) {
1378 if (!(opts & PF_OPT_QUIET))
1379 fprintf(stderr, "No ALTQ support in kernel\n"
1380 "ALTQ related functions disabled\n");
1381 return (0);
1382 } else
1383 err(1, "DIOCGETALTQS");
1384 }
1385 return (1);
1386 }
1387
1388 int
1389 pfctl_show_anchors(int dev, int opts, char *anchorname)
1390 {
1391 u_int32_t nr, mnr;
1392
1393 if (!*anchorname) {
1394 struct pfioc_anchor pa;
1395
1396 memset(&pa, 0, sizeof(pa));
1397 if (ioctl(dev, DIOCGETANCHORS, &pa)) {
1398 warn("DIOCGETANCHORS");
1399 return (-1);
1400 }
1401 mnr = pa.nr;
1402 for (nr = 0; nr < mnr; ++nr) {
1403 pa.nr = nr;
1404 if (ioctl(dev, DIOCGETANCHOR, &pa)) {
1405 warn("DIOCGETANCHOR");
1406 return (-1);
1407 }
1408 if (!(opts & PF_OPT_VERBOSE) &&
1409 !strcmp(pa.name, PF_RESERVED_ANCHOR))
1410 continue;
1411 printf(" %s\n", pa.name);
1412 }
1413 } else {
1414 struct pfioc_ruleset pr;
1415
1416 memset(&pr, 0, sizeof(pr));
1417 memcpy(pr.anchor, anchorname, sizeof(pr.anchor));
1418 if (ioctl(dev, DIOCGETRULESETS, &pr)) {
1419 if (errno == EINVAL)
1420 fprintf(stderr, "No rulesets in anchor '%s'.\n",
1421 anchorname);
1422 else
1423 err(1, "DIOCGETRULESETS");
1424 return (-1);
1425 }
1426 mnr = pr.nr;
1427 for (nr = 0; nr < mnr; ++nr) {
1428 pr.nr = nr;
1429 if (ioctl(dev, DIOCGETRULESET, &pr))
1430 err(1, "DIOCGETRULESET");
1431 printf(" %s:%s\n", pr.anchor, pr.name);
1432 }
1433 }
1434 return (0);
1435 }
1436
1437 const char *
1438 pfctl_lookup_option(char *cmd, const char **list)
1439 {
1440 if (cmd != NULL && *cmd)
1441 for (; *list; list++)
1442 if (!strncmp(cmd, *list, strlen(cmd)))
1443 return (*list);
1444 return (NULL);
1445 }
1446
1447 int
1448 main(int argc, char *argv[])
1449 {
1450 int error = 0;
1451 int ch;
1452 int mode = O_RDONLY;
1453 int opts = 0;
1454 char anchorname[PF_ANCHOR_NAME_SIZE];
1455 char rulesetname[PF_RULESET_NAME_SIZE];
1456
1457 if (argc < 2)
1458 usage();
1459
1460 while ((ch = getopt(argc, argv,
1461 "a:AdD:eqf:F:ghi:k:nNOp:rRs:t:T:vx:z")) != -1) {
1462 switch (ch) {
1463 case 'a':
1464 anchoropt = optarg;
1465 break;
1466 case 'd':
1467 opts |= PF_OPT_DISABLE;
1468 mode = O_RDWR;
1469 break;
1470 case 'D':
1471 if (pfctl_cmdline_symset(optarg) < 0)
1472 warnx("could not parse macro definition %s",
1473 optarg);
1474 break;
1475 case 'e':
1476 opts |= PF_OPT_ENABLE;
1477 mode = O_RDWR;
1478 break;
1479 case 'q':
1480 opts |= PF_OPT_QUIET;
1481 break;
1482 case 'F':
1483 clearopt = pfctl_lookup_option(optarg, clearopt_list);
1484 if (clearopt == NULL) {
1485 warnx("Unknown flush modifier '%s'", optarg);
1486 usage();
1487 }
1488 mode = O_RDWR;
1489 break;
1490 case 'i':
1491 ifaceopt = optarg;
1492 break;
1493 case 'k':
1494 if (state_killers >= 2) {
1495 warnx("can only specify -k twice");
1496 usage();
1497 /* NOTREACHED */
1498 }
1499 state_kill[state_killers++] = optarg;
1500 mode = O_RDWR;
1501 break;
1502 case 'n':
1503 opts |= PF_OPT_NOACTION;
1504 break;
1505 case 'N':
1506 loadopt |= PFCTL_FLAG_NAT;
1507 break;
1508 case 'r':
1509 opts |= PF_OPT_USEDNS;
1510 break;
1511 case 'f':
1512 rulesopt = optarg;
1513 mode = O_RDWR;
1514 break;
1515 case 'g':
1516 opts |= PF_OPT_DEBUG;
1517 break;
1518 case 'A':
1519 loadopt |= PFCTL_FLAG_ALTQ;
1520 break;
1521 case 'R':
1522 loadopt |= PFCTL_FLAG_FILTER;
1523 break;
1524 case 'O':
1525 loadopt |= PFCTL_FLAG_OPTION;
1526 break;
1527 case 'p':
1528 pf_device = optarg;
1529 break;
1530 case 's':
1531 showopt = pfctl_lookup_option(optarg, showopt_list);
1532 if (showopt == NULL) {
1533 warnx("Unknown show modifier '%s'", optarg);
1534 usage();
1535 }
1536 break;
1537 case 't':
1538 tableopt = optarg;
1539 break;
1540 case 'T':
1541 tblcmdopt = pfctl_lookup_option(optarg, tblcmdopt_list);
1542 if (tblcmdopt == NULL) {
1543 warnx("Unknown table command '%s'", optarg);
1544 usage();
1545 }
1546 break;
1547 case 'v':
1548 if (opts & PF_OPT_VERBOSE)
1549 opts |= PF_OPT_VERBOSE2;
1550 opts |= PF_OPT_VERBOSE;
1551 break;
1552 case 'x':
1553 debugopt = pfctl_lookup_option(optarg, debugopt_list);
1554 if (debugopt == NULL) {
1555 warnx("Unknown debug level '%s'", optarg);
1556 usage();
1557 }
1558 mode = O_RDWR;
1559 break;
1560 case 'z':
1561 opts |= PF_OPT_CLRRULECTRS;
1562 mode = O_RDWR;
1563 break;
1564 case 'h':
1565 /* FALLTHROUGH */
1566 default:
1567 usage();
1568 /* NOTREACHED */
1569 }
1570 }
1571
1572 if (tblcmdopt != NULL) {
1573 argc -= optind;
1574 argv += optind;
1575 ch = *tblcmdopt;
1576 if (ch == 'l') {
1577 loadopt |= PFCTL_FLAG_TABLE;
1578 tblcmdopt = NULL;
1579 } else
1580 mode = strchr("acdfkrz", ch) ? O_RDWR : O_RDONLY;
1581 } else if (argc != optind) {
1582 warnx("unknown command line argument: %s ...", argv[optind]);
1583 usage();
1584 /* NOTREACHED */
1585 }
1586 if (loadopt == 0)
1587 loadopt = ~0;
1588
1589 memset(anchorname, 0, sizeof(anchorname));
1590 memset(rulesetname, 0, sizeof(rulesetname));
1591 if (anchoropt != NULL) {
1592 char *t;
1593
1594 if ((t = strchr(anchoropt, ':')) == NULL) {
1595 if (strlcpy(anchorname, anchoropt,
1596 sizeof(anchorname)) >= sizeof(anchorname))
1597 errx(1, "anchor name '%s' too long",
1598 anchoropt);
1599 } else {
1600 char *p;
1601
1602 if ((p = strdup(anchoropt)) == NULL)
1603 err(1, "anchoropt: strdup");
1604 t = strsep(&p, ":");
1605 if (*t == '\0' || *p == '\0')
1606 errx(1, "anchor '%s' invalid", anchoropt);
1607 if (strlcpy(anchorname, t, sizeof(anchorname)) >=
1608 sizeof(anchorname))
1609 errx(1, "anchor name '%s' too long", t);
1610 if (strlcpy(rulesetname, p, sizeof(rulesetname)) >=
1611 sizeof(rulesetname))
1612 errx(1, "ruleset name '%s' too long", p);
1613 free(t); /* not p */
1614 }
1615 loadopt &= PFCTL_FLAG_FILTER|PFCTL_FLAG_NAT|PFCTL_FLAG_TABLE;
1616 }
1617
1618 if ((opts & PF_OPT_NOACTION) == 0) {
1619 dev = open(pf_device, mode);
1620 if (dev == -1)
1621 err(1, "%s", pf_device);
1622 altqsupport = pfctl_test_altqsupport(dev, opts);
1623 } else {
1624 dev = open(pf_device, O_RDONLY);
1625 if (dev >= 0)
1626 opts |= PF_OPT_DUMMYACTION;
1627 /* turn off options */
1628 opts &= ~ (PF_OPT_DISABLE | PF_OPT_ENABLE);
1629 clearopt = showopt = debugopt = NULL;
1630 altqsupport = 1;
1631 }
1632
1633 if (opts & PF_OPT_DISABLE)
1634 if (pfctl_disable(dev, opts))
1635 error = 1;
1636
1637 if (showopt != NULL) {
1638 switch (*showopt) {
1639 case 'A':
1640 pfctl_show_anchors(dev, opts, anchorname);
1641 break;
1642 case 'r':
1643 pfctl_load_fingerprints(dev, opts);
1644 pfctl_show_rules(dev, opts, 0, anchorname,
1645 rulesetname);
1646 break;
1647 case 'l':
1648 pfctl_load_fingerprints(dev, opts);
1649 pfctl_show_rules(dev, opts, 1, anchorname,
1650 rulesetname);
1651 break;
1652 case 'n':
1653 pfctl_load_fingerprints(dev, opts);
1654 pfctl_show_nat(dev, opts, anchorname, rulesetname);
1655 break;
1656 case 'q':
1657 pfctl_show_altq(dev, ifaceopt, opts,
1658 opts & PF_OPT_VERBOSE2);
1659 break;
1660 case 's':
1661 pfctl_show_states(dev, ifaceopt, opts);
1662 break;
1663 case 'S':
1664 pfctl_show_src_nodes(dev, opts);
1665 break;
1666 case 'i':
1667 pfctl_show_status(dev, opts);
1668 break;
1669 case 't':
1670 pfctl_show_timeouts(dev, opts);
1671 break;
1672 case 'm':
1673 pfctl_show_limits(dev, opts);
1674 break;
1675 case 'a':
1676 opts |= PF_OPT_SHOWALL;
1677 pfctl_load_fingerprints(dev, opts);
1678
1679 pfctl_show_nat(dev, opts, anchorname, rulesetname);
1680 pfctl_show_rules(dev, opts, 0, anchorname,
1681 rulesetname);
1682 pfctl_show_altq(dev, ifaceopt, opts, 0);
1683 pfctl_show_states(dev, ifaceopt, opts);
1684 pfctl_show_src_nodes(dev, opts);
1685 pfctl_show_status(dev, opts);
1686 pfctl_show_rules(dev, opts, 1, anchorname, rulesetname);
1687 pfctl_show_timeouts(dev, opts);
1688 pfctl_show_limits(dev, opts);
1689 pfctl_show_tables(anchorname, rulesetname, opts);
1690 pfctl_show_fingerprints(opts);
1691 break;
1692 case 'T':
1693 pfctl_show_tables(anchorname, rulesetname, opts);
1694 break;
1695 case 'o':
1696 pfctl_load_fingerprints(dev, opts);
1697 pfctl_show_fingerprints(opts);
1698 break;
1699 case 'I':
1700 pfctl_show_ifaces(ifaceopt, opts);
1701 break;
1702 }
1703 }
1704
1705 if (clearopt != NULL) {
1706 switch (*clearopt) {
1707 case 'r':
1708 pfctl_clear_rules(dev, opts, anchorname, rulesetname);
1709 break;
1710 case 'n':
1711 pfctl_clear_nat(dev, opts, anchorname, rulesetname);
1712 break;
1713 case 'q':
1714 pfctl_clear_altq(dev, opts);
1715 break;
1716 case 's':
1717 pfctl_clear_states(dev, ifaceopt, opts);
1718 break;
1719 case 'S':
1720 pfctl_clear_src_nodes(dev, opts);
1721 break;
1722 case 'i':
1723 pfctl_clear_stats(dev, opts);
1724 break;
1725 case 'a':
1726 pfctl_clear_rules(dev, opts, anchorname, rulesetname);
1727 pfctl_clear_nat(dev, opts, anchorname, rulesetname);
1728 pfctl_clear_tables(anchorname, rulesetname, opts);
1729 if (!*anchorname && !*rulesetname) {
1730 pfctl_clear_altq(dev, opts);
1731 pfctl_clear_states(dev, ifaceopt, opts);
1732 pfctl_clear_src_nodes(dev, opts);
1733 pfctl_clear_stats(dev, opts);
1734 pfctl_clear_fingerprints(dev, opts);
1735 }
1736 break;
1737 case 'o':
1738 pfctl_clear_fingerprints(dev, opts);
1739 break;
1740 case 'T':
1741 pfctl_clear_tables(anchorname, rulesetname, opts);
1742 break;
1743 }
1744 }
1745 if (state_killers)
1746 pfctl_kill_states(dev, ifaceopt, opts);
1747
1748 if (tblcmdopt != NULL) {
1749 error = pfctl_command_tables(argc, argv, tableopt,
1750 tblcmdopt, rulesopt, anchorname, rulesetname, opts);
1751 rulesopt = NULL;
1752 }
1753
1754 if (rulesopt != NULL)
1755 if (pfctl_file_fingerprints(dev, opts, PF_OSFP_FILE))
1756 error = 1;
1757
1758 if (rulesopt != NULL) {
1759 if (pfctl_rules(dev, rulesopt, opts, anchorname, rulesetname,
1760 NULL))
1761 error = 1;
1762 else if (!(opts & PF_OPT_NOACTION) &&
1763 (loadopt & PFCTL_FLAG_TABLE))
1764 warn_namespace_collision(NULL);
1765 }
1766
1767 if (opts & PF_OPT_ENABLE)
1768 if (pfctl_enable(dev, opts))
1769 error = 1;
1770
1771 if (debugopt != NULL) {
1772 switch (*debugopt) {
1773 case 'n':
1774 pfctl_debug(dev, PF_DEBUG_NONE, opts);
1775 break;
1776 case 'u':
1777 pfctl_debug(dev, PF_DEBUG_URGENT, opts);
1778 break;
1779 case 'm':
1780 pfctl_debug(dev, PF_DEBUG_MISC, opts);
1781 break;
1782 case 'l':
1783 pfctl_debug(dev, PF_DEBUG_NOISY, opts);
1784 break;
1785 }
1786 }
1787
1788 if (opts & PF_OPT_CLRRULECTRS) {
1789 if (pfctl_clear_rule_counters(dev, opts))
1790 error = 1;
1791 }
1792 exit(error);
1793 }
1794