1 1.2 darrenr /* $NetBSD: ip_nat6.c,v 1.2 2012/07/22 14:27:35 darrenr Exp $ */ 2 1.1 christos 3 1.1 christos /* 4 1.2 darrenr * Copyright (C) 2012 by Darren Reed. 5 1.1 christos * 6 1.1 christos * See the IPFILTER.LICENCE file for details on licencing. 7 1.1 christos */ 8 1.1 christos #if defined(KERNEL) || defined(_KERNEL) 9 1.1 christos # undef KERNEL 10 1.1 christos # undef ipf_nat6_KERNEL 11 1.1 christos # define KERNEL 1 12 1.1 christos # define ipf_nat6_KERNEL 1 13 1.1 christos #endif 14 1.1 christos #include <sys/errno.h> 15 1.1 christos #include <sys/types.h> 16 1.1 christos #include <sys/param.h> 17 1.1 christos #include <sys/time.h> 18 1.1 christos #include <sys/file.h> 19 1.1 christos #if defined(_KERNEL) && defined(__NetBSD_Version__) && \ 20 1.1 christos (__NetBSD_Version__ >= 399002000) 21 1.1 christos # include <sys/kauth.h> 22 1.1 christos #endif 23 1.1 christos #if !defined(_KERNEL) 24 1.1 christos # include <stdio.h> 25 1.1 christos # include <string.h> 26 1.1 christos # include <stdlib.h> 27 1.1 christos # define ipf_nat6_KERNEL 28 1.1 christos # ifdef ipf_nat6__OpenBSD__ 29 1.1 christos struct file; 30 1.1 christos # endif 31 1.1 christos # include <sys/uio.h> 32 1.1 christos # undef ipf_nat6_KERNEL 33 1.1 christos #endif 34 1.1 christos #if defined(_KERNEL) && (__FreeBSD_version >= 220000) 35 1.1 christos # include <sys/filio.h> 36 1.1 christos # include <sys/fcntl.h> 37 1.1 christos #else 38 1.1 christos # include <sys/ioctl.h> 39 1.1 christos #endif 40 1.1 christos #if !defined(AIX) 41 1.1 christos # include <sys/fcntl.h> 42 1.1 christos #endif 43 1.1 christos #if !defined(linux) 44 1.1 christos # include <sys/protosw.h> 45 1.1 christos #endif 46 1.1 christos #include <sys/socket.h> 47 1.1 christos #if defined(_KERNEL) 48 1.1 christos # include <sys/systm.h> 49 1.1 christos # if !defined(__SVR4) && !defined(__svr4__) 50 1.1 christos # include <sys/mbuf.h> 51 1.1 christos # endif 52 1.1 christos #endif 53 1.1 christos #if defined(__SVR4) || defined(__svr4__) 54 1.1 christos # include <sys/filio.h> 55 1.1 christos # include <sys/byteorder.h> 56 1.1 christos # ifdef ipf_nat6_KERNEL 57 1.1 christos # include <sys/dditypes.h> 58 1.1 christos # endif 59 1.1 christos # include <sys/stream.h> 60 1.1 christos # include <sys/kmem.h> 61 1.1 christos #endif 62 1.1 christos #if ipf_nat6__FreeBSD_version >= 300000 63 1.1 christos # include <sys/queue.h> 64 1.1 christos #endif 65 1.1 christos #include <net/if.h> 66 1.1 christos #if ipf_nat6__FreeBSD_version >= 300000 67 1.1 christos # include <net/if_var.h> 68 1.1 christos #endif 69 1.1 christos #ifdef sun 70 1.1 christos # include <net/af.h> 71 1.1 christos #endif 72 1.1 christos #include <net/route.h> 73 1.1 christos #include <netinet/in.h> 74 1.1 christos #include <netinet/in_systm.h> 75 1.1 christos #include <netinet/ip.h> 76 1.1 christos 77 1.1 christos #ifdef RFC1825 78 1.1 christos # include <vpn/md5.h> 79 1.1 christos # include <vpn/ipsec.h> 80 1.1 christos extern struct ifnet vpnif; 81 1.1 christos #endif 82 1.1 christos 83 1.1 christos #if !defined(linux) 84 1.1 christos # include <netinet/ip_var.h> 85 1.1 christos #endif 86 1.1 christos #include <netinet/tcp.h> 87 1.1 christos #include <netinet/udp.h> 88 1.1 christos #include <netinet/ip_icmp.h> 89 1.1 christos #include "netinet/ip_compat.h" 90 1.1 christos #include <netinet/tcpip.h> 91 1.1 christos #include "netinet/ip_fil.h" 92 1.1 christos #include "netinet/ip_nat.h" 93 1.1 christos #include "netinet/ip_frag.h" 94 1.1 christos #include "netinet/ip_state.h" 95 1.1 christos #include "netinet/ip_proxy.h" 96 1.1 christos #include "netinet/ip_lookup.h" 97 1.1 christos #include "netinet/ip_dstlist.h" 98 1.1 christos #include "netinet/ip_sync.h" 99 1.1 christos #if (__FreeBSD_version >= 300000) 100 1.1 christos # include <sys/malloc.h> 101 1.1 christos #endif 102 1.1 christos #ifdef HAS_SYS_MD5_H 103 1.1 christos # include <sys/md5.h> 104 1.1 christos #else 105 1.1 christos # include "md5.h" 106 1.1 christos #endif 107 1.1 christos /* END OF INCLUDES */ 108 1.1 christos 109 1.1 christos #undef SOCKADDR_IN 110 1.1 christos #define SOCKADDR_IN struct sockaddr_in 111 1.1 christos 112 1.1 christos #if !defined(lint) 113 1.2 darrenr static const char rcsid[] = "@(#)Id: ip_nat6.c,v 1.1.1.2 2012/07/22 13:44:21 darrenr Exp $"; 114 1.1 christos #endif 115 1.1 christos 116 1.1 christos #ifdef USE_INET6 117 1.1 christos static struct hostmap *ipf_nat6_hostmap __P((ipf_nat_softc_t *, ipnat_t *, 118 1.1 christos i6addr_t *, i6addr_t *, 119 1.1 christos i6addr_t *, u_32_t)); 120 1.1 christos static int ipf_nat6_match __P((fr_info_t *, ipnat_t *)); 121 1.1 christos static void ipf_nat6_tabmove __P((ipf_nat_softc_t *, nat_t *)); 122 1.1 christos static int ipf_nat6_decap __P((fr_info_t *, nat_t *)); 123 1.1 christos static int ipf_nat6_nextaddr __P((fr_info_t *, nat_addr_t *, i6addr_t *, 124 1.1 christos i6addr_t *)); 125 1.1 christos static int ipf_nat6_icmpquerytype __P((int)); 126 1.1 christos static int ipf_nat6_out __P((fr_info_t *, nat_t *, int, u_32_t)); 127 1.1 christos static int ipf_nat6_in __P((fr_info_t *, nat_t *, int, u_32_t)); 128 1.1 christos static int ipf_nat6_builddivertmp __P((ipf_nat_softc_t *, ipnat_t *)); 129 1.1 christos static int ipf_nat6_nextaddrinit __P((ipf_main_softc_t *, char *, 130 1.1 christos nat_addr_t *, int, void *)); 131 1.1 christos static int ipf_nat6_insert __P((ipf_main_softc_t *, ipf_nat_softc_t *, 132 1.1 christos nat_t *)); 133 1.1 christos 134 1.1 christos 135 1.1 christos #define NINCLSIDE6(y,x) ATOMIC_INCL(softn->ipf_nat_stats.ns_side6[y].x) 136 1.2 darrenr #define NBUMPSIDE(y,x) softn->ipf_nat_stats.ns_side[y].x++ 137 1.1 christos #define NBUMPSIDE6(y,x) softn->ipf_nat_stats.ns_side6[y].x++ 138 1.1 christos #define NBUMPSIDE6D(y,x) \ 139 1.1 christos do { \ 140 1.1 christos softn->ipf_nat_stats.ns_side6[y].x++; \ 141 1.1 christos DT(x); \ 142 1.1 christos } while (0) 143 1.1 christos #define NBUMPSIDE6DX(y,x,z) \ 144 1.1 christos do { \ 145 1.1 christos softn->ipf_nat_stats.ns_side6[y].x++; \ 146 1.1 christos DT(z); \ 147 1.1 christos } while (0) 148 1.1 christos 149 1.1 christos 150 1.1 christos /* ------------------------------------------------------------------------ */ 151 1.1 christos /* Function: ipf_nat6_ruleaddrinit */ 152 1.1 christos /* Returns: int - 0 == success, else failure */ 153 1.1 christos /* Parameters: in(I) - NAT rule that requires address fields to be init'd */ 154 1.1 christos /* */ 155 1.1 christos /* For each of the source/destination address fields in a NAT rule, call */ 156 1.1 christos /* ipf_nat6_nextaddrinit() to prepare the structure for active duty. Other */ 157 1.1 christos /* IPv6 specific actions can also be taken care of here. */ 158 1.1 christos /* ------------------------------------------------------------------------ */ 159 1.1 christos int 160 1.1 christos ipf_nat6_ruleaddrinit(softc, softn, n) 161 1.1 christos ipf_main_softc_t *softc; 162 1.1 christos ipf_nat_softc_t *softn; 163 1.1 christos ipnat_t *n; 164 1.1 christos { 165 1.1 christos int idx, error; 166 1.1 christos 167 1.1 christos if (n->in_redir == NAT_BIMAP) { 168 1.1 christos n->in_ndstip6 = n->in_osrcip6; 169 1.1 christos n->in_ndstmsk6 = n->in_osrcmsk6; 170 1.1 christos n->in_odstip6 = n->in_nsrcip6; 171 1.1 christos n->in_odstmsk6 = n->in_nsrcmsk6; 172 1.1 christos 173 1.1 christos } 174 1.1 christos 175 1.1 christos if (n->in_redir & NAT_REDIRECT) 176 1.1 christos idx = 1; 177 1.1 christos else 178 1.1 christos idx = 0; 179 1.1 christos /* 180 1.1 christos * Initialise all of the address fields. 181 1.1 christos */ 182 1.1 christos error = ipf_nat6_nextaddrinit(softc, n->in_names, &n->in_osrc, 1, 183 1.1 christos n->in_ifps[idx]); 184 1.1 christos if (error != 0) 185 1.1 christos return error; 186 1.1 christos 187 1.1 christos error = ipf_nat6_nextaddrinit(softc, n->in_names, &n->in_odst, 1, 188 1.1 christos n->in_ifps[idx]); 189 1.1 christos if (error != 0) 190 1.1 christos return error; 191 1.1 christos 192 1.1 christos error = ipf_nat6_nextaddrinit(softc, n->in_names, &n->in_nsrc, 1, 193 1.1 christos n->in_ifps[idx]); 194 1.1 christos if (error != 0) 195 1.1 christos return error; 196 1.1 christos 197 1.1 christos error = ipf_nat6_nextaddrinit(softc, n->in_names, &n->in_ndst, 1, 198 1.1 christos n->in_ifps[idx]); 199 1.1 christos if (error != 0) 200 1.1 christos return error; 201 1.1 christos 202 1.2 darrenr if (n->in_redir & NAT_DIVERTUDP) 203 1.1 christos ipf_nat6_builddivertmp(softn, n); 204 1.1 christos return 0; 205 1.1 christos } 206 1.1 christos 207 1.1 christos 208 1.1 christos /* ------------------------------------------------------------------------ */ 209 1.1 christos /* Function: ipf_nat6_addrdr */ 210 1.1 christos /* Returns: Nil */ 211 1.1 christos /* Parameters: n(I) - pointer to NAT rule to add */ 212 1.1 christos /* */ 213 1.1 christos /* Adds a redirect rule to the hash table of redirect rules and the list of */ 214 1.1 christos /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */ 215 1.1 christos /* use by redirect rules. */ 216 1.1 christos /* ------------------------------------------------------------------------ */ 217 1.1 christos void 218 1.1 christos ipf_nat6_addrdr(softn, n) 219 1.1 christos ipf_nat_softc_t *softn; 220 1.1 christos ipnat_t *n; 221 1.1 christos { 222 1.2 darrenr i6addr_t *mask; 223 1.1 christos ipnat_t **np; 224 1.1 christos i6addr_t j; 225 1.1 christos u_int hv; 226 1.1 christos int k; 227 1.1 christos 228 1.2 darrenr if ((n->in_redir & NAT_BIMAP) == NAT_BIMAP) { 229 1.1 christos k = count6bits(n->in_nsrcmsk6.i6); 230 1.2 darrenr mask = &n->in_nsrcmsk6; 231 1.1 christos IP6_AND(&n->in_odstip6, &n->in_odstmsk6, &j); 232 1.1 christos hv = NAT_HASH_FN6(&j, 0, softn->ipf_nat_rdrrules_sz); 233 1.1 christos 234 1.1 christos } else if (n->in_odstatype == FRI_NORMAL) { 235 1.1 christos k = count6bits(n->in_odstmsk6.i6); 236 1.2 darrenr mask = &n->in_odstmsk6; 237 1.1 christos IP6_AND(&n->in_odstip6, &n->in_odstmsk6, &j); 238 1.1 christos hv = NAT_HASH_FN6(&j, 0, softn->ipf_nat_rdrrules_sz); 239 1.1 christos } else { 240 1.2 darrenr k = 0; 241 1.1 christos hv = 0; 242 1.2 darrenr mask = NULL; 243 1.1 christos } 244 1.2 darrenr ipf_inet6_mask_add(k, mask, &softn->ipf_nat6_rdr_mask); 245 1.2 darrenr 246 1.1 christos np = softn->ipf_nat_rdr_rules + hv; 247 1.1 christos while (*np != NULL) 248 1.1 christos np = &(*np)->in_rnext; 249 1.1 christos n->in_rnext = NULL; 250 1.1 christos n->in_prnext = np; 251 1.1 christos n->in_hv[0] = hv; 252 1.2 darrenr n->in_use++; 253 1.1 christos *np = n; 254 1.1 christos } 255 1.1 christos 256 1.1 christos 257 1.1 christos /* ------------------------------------------------------------------------ */ 258 1.1 christos /* Function: ipf_nat6_addmap */ 259 1.1 christos /* Returns: Nil */ 260 1.1 christos /* Parameters: n(I) - pointer to NAT rule to add */ 261 1.1 christos /* */ 262 1.1 christos /* Adds a NAT map rule to the hash table of rules and the list of loaded */ 263 1.1 christos /* NAT rules. Updates the bitmask indicating which netmasks are in use by */ 264 1.1 christos /* redirect rules. */ 265 1.1 christos /* ------------------------------------------------------------------------ */ 266 1.1 christos void 267 1.1 christos ipf_nat6_addmap(softn, n) 268 1.1 christos ipf_nat_softc_t *softn; 269 1.1 christos ipnat_t *n; 270 1.1 christos { 271 1.2 darrenr i6addr_t *mask; 272 1.1 christos ipnat_t **np; 273 1.1 christos i6addr_t j; 274 1.1 christos u_int hv; 275 1.1 christos int k; 276 1.1 christos 277 1.1 christos if (n->in_osrcatype == FRI_NORMAL) { 278 1.1 christos k = count6bits(n->in_osrcmsk6.i6); 279 1.2 darrenr mask = &n->in_osrcmsk6; 280 1.1 christos IP6_AND(&n->in_osrcip6, &n->in_osrcmsk6, &j); 281 1.1 christos hv = NAT_HASH_FN6(&j, 0, softn->ipf_nat_maprules_sz); 282 1.1 christos } else { 283 1.2 darrenr k = 0; 284 1.1 christos hv = 0; 285 1.2 darrenr mask = NULL; 286 1.1 christos } 287 1.2 darrenr ipf_inet6_mask_add(k, mask, &softn->ipf_nat6_map_mask); 288 1.2 darrenr 289 1.1 christos np = softn->ipf_nat_map_rules + hv; 290 1.1 christos while (*np != NULL) 291 1.1 christos np = &(*np)->in_mnext; 292 1.1 christos n->in_mnext = NULL; 293 1.1 christos n->in_pmnext = np; 294 1.1 christos n->in_hv[1] = hv; 295 1.2 darrenr n->in_use++; 296 1.1 christos *np = n; 297 1.1 christos } 298 1.1 christos 299 1.1 christos 300 1.1 christos /* ------------------------------------------------------------------------ */ 301 1.1 christos /* Function: ipf_nat6_del_rdr */ 302 1.1 christos /* Returns: Nil */ 303 1.1 christos /* Parameters: n(I) - pointer to NAT rule to delete */ 304 1.1 christos /* */ 305 1.1 christos /* Removes a NAT rdr rule from the hash table of NAT rdr rules. */ 306 1.1 christos /* ------------------------------------------------------------------------ */ 307 1.2 darrenr void 308 1.1 christos ipf_nat6_delrdr(softn, n) 309 1.1 christos ipf_nat_softc_t *softn; 310 1.1 christos ipnat_t *n; 311 1.1 christos { 312 1.2 darrenr i6addr_t *mask; 313 1.1 christos int k; 314 1.1 christos 315 1.2 darrenr if ((n->in_redir & NAT_BIMAP) == NAT_BIMAP) { 316 1.2 darrenr k = count6bits(n->in_nsrcmsk6.i6); 317 1.2 darrenr mask = &n->in_nsrcmsk6; 318 1.2 darrenr } else if (n->in_odstatype == FRI_NORMAL) { 319 1.2 darrenr k = count6bits(n->in_odstmsk6.i6); 320 1.2 darrenr mask = &n->in_odstmsk6; 321 1.1 christos } else { 322 1.1 christos k = 0; 323 1.2 darrenr mask = NULL; 324 1.1 christos } 325 1.2 darrenr ipf_inet6_mask_del(k, mask, &softn->ipf_nat6_rdr_mask); 326 1.1 christos 327 1.2 darrenr if (n->in_rnext != NULL) 328 1.2 darrenr n->in_rnext->in_prnext = n->in_prnext; 329 1.2 darrenr *n->in_prnext = n->in_rnext; 330 1.2 darrenr n->in_use--; 331 1.1 christos } 332 1.1 christos 333 1.1 christos 334 1.1 christos /* ------------------------------------------------------------------------ */ 335 1.1 christos /* Function: ipf_nat6_delmap */ 336 1.1 christos /* Returns: Nil */ 337 1.1 christos /* Parameters: n(I) - pointer to NAT rule to delete */ 338 1.1 christos /* */ 339 1.1 christos /* Removes a NAT map rule from the hash table of NAT map rules. */ 340 1.1 christos /* ------------------------------------------------------------------------ */ 341 1.2 darrenr void 342 1.1 christos ipf_nat6_delmap(softn, n) 343 1.1 christos ipf_nat_softc_t *softn; 344 1.1 christos ipnat_t *n; 345 1.1 christos { 346 1.2 darrenr i6addr_t *mask; 347 1.1 christos int k; 348 1.1 christos 349 1.1 christos if (n->in_osrcatype == FRI_NORMAL) { 350 1.2 darrenr k = count6bits(n->in_osrcmsk6.i6); 351 1.2 darrenr mask = &n->in_osrcmsk6; 352 1.1 christos } else { 353 1.1 christos k = 0; 354 1.2 darrenr mask = NULL; 355 1.1 christos } 356 1.2 darrenr ipf_inet6_mask_del(k, mask, &softn->ipf_nat6_map_mask); 357 1.1 christos 358 1.1 christos if (n->in_mnext != NULL) 359 1.1 christos n->in_mnext->in_pmnext = n->in_pmnext; 360 1.1 christos *n->in_pmnext = n->in_mnext; 361 1.2 darrenr n->in_use--; 362 1.1 christos } 363 1.1 christos 364 1.1 christos 365 1.1 christos /* ------------------------------------------------------------------------ */ 366 1.1 christos /* Function: ipf_nat6_hostmap */ 367 1.1 christos /* Returns: struct hostmap* - NULL if no hostmap could be created, */ 368 1.1 christos /* else a pointer to the hostmapping to use */ 369 1.1 christos /* Parameters: np(I) - pointer to NAT rule */ 370 1.1 christos /* real(I) - real IP address */ 371 1.1 christos /* map(I) - mapped IP address */ 372 1.1 christos /* port(I) - destination port number */ 373 1.1 christos /* Write Locks: ipf_nat */ 374 1.1 christos /* */ 375 1.1 christos /* Check if an ip address has already been allocated for a given mapping */ 376 1.1 christos /* that is not doing port based translation. If is not yet allocated, then */ 377 1.1 christos /* create a new entry if a non-NULL NAT rule pointer has been supplied. */ 378 1.1 christos /* ------------------------------------------------------------------------ */ 379 1.1 christos static struct hostmap * 380 1.1 christos ipf_nat6_hostmap(softn, np, src, dst, map, port) 381 1.1 christos ipf_nat_softc_t *softn; 382 1.1 christos ipnat_t *np; 383 1.1 christos i6addr_t *src, *dst, *map; 384 1.1 christos u_32_t port; 385 1.1 christos { 386 1.1 christos hostmap_t *hm; 387 1.1 christos u_int hv; 388 1.1 christos 389 1.1 christos hv = (src->i6[3] ^ dst->i6[3]); 390 1.1 christos hv += (src->i6[2] ^ dst->i6[2]); 391 1.1 christos hv += (src->i6[1] ^ dst->i6[1]); 392 1.1 christos hv += (src->i6[0] ^ dst->i6[0]); 393 1.1 christos hv += src->i6[3]; 394 1.1 christos hv += src->i6[2]; 395 1.1 christos hv += src->i6[1]; 396 1.1 christos hv += src->i6[0]; 397 1.1 christos hv += dst->i6[3]; 398 1.1 christos hv += dst->i6[2]; 399 1.1 christos hv += dst->i6[1]; 400 1.1 christos hv += dst->i6[0]; 401 1.1 christos hv %= HOSTMAP_SIZE; 402 1.1 christos for (hm = softn->ipf_hm_maptable[hv]; hm; hm = hm->hm_next) 403 1.1 christos if (IP6_EQ(&hm->hm_osrc6, src) && 404 1.1 christos IP6_EQ(&hm->hm_odst6, dst) && 405 1.1 christos ((np == NULL) || (np == hm->hm_ipnat)) && 406 1.1 christos ((port == 0) || (port == hm->hm_port))) { 407 1.1 christos softn->ipf_nat_stats.ns_hm_addref++; 408 1.1 christos hm->hm_ref++; 409 1.1 christos return hm; 410 1.1 christos } 411 1.1 christos 412 1.1 christos if (np == NULL) { 413 1.1 christos softn->ipf_nat_stats.ns_hm_nullnp++; 414 1.1 christos return NULL; 415 1.1 christos } 416 1.1 christos 417 1.1 christos KMALLOC(hm, hostmap_t *); 418 1.1 christos if (hm) { 419 1.1 christos hm->hm_next = softn->ipf_hm_maplist; 420 1.1 christos hm->hm_pnext = &softn->ipf_hm_maplist; 421 1.1 christos if (softn->ipf_hm_maplist != NULL) 422 1.1 christos softn->ipf_hm_maplist->hm_pnext = &hm->hm_next; 423 1.1 christos softn->ipf_hm_maplist = hm; 424 1.1 christos hm->hm_hnext = softn->ipf_hm_maptable[hv]; 425 1.1 christos hm->hm_phnext = softn->ipf_hm_maptable + hv; 426 1.1 christos if (softn->ipf_hm_maptable[hv] != NULL) 427 1.1 christos softn->ipf_hm_maptable[hv]->hm_phnext = &hm->hm_hnext; 428 1.1 christos softn->ipf_hm_maptable[hv] = hm; 429 1.1 christos hm->hm_ipnat = np; 430 1.2 darrenr np->in_use++; 431 1.1 christos hm->hm_osrcip6 = *src; 432 1.1 christos hm->hm_odstip6 = *dst; 433 1.1 christos hm->hm_nsrcip6 = *map; 434 1.1 christos hm->hm_ndstip6.i6[0] = 0; 435 1.1 christos hm->hm_ndstip6.i6[1] = 0; 436 1.1 christos hm->hm_ndstip6.i6[2] = 0; 437 1.1 christos hm->hm_ndstip6.i6[3] = 0; 438 1.1 christos hm->hm_ref = 1; 439 1.1 christos hm->hm_port = port; 440 1.1 christos hm->hm_hv = hv; 441 1.1 christos hm->hm_v = 6; 442 1.1 christos softn->ipf_nat_stats.ns_hm_new++; 443 1.1 christos } else { 444 1.1 christos softn->ipf_nat_stats.ns_hm_newfail++; 445 1.1 christos } 446 1.1 christos return hm; 447 1.1 christos } 448 1.1 christos 449 1.1 christos 450 1.1 christos /* ------------------------------------------------------------------------ */ 451 1.1 christos /* Function: ipf_nat6_newmap */ 452 1.1 christos /* Returns: int - -1 == error, 0 == success */ 453 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 454 1.1 christos /* nat(I) - pointer to NAT entry */ 455 1.1 christos /* ni(I) - pointer to structure with misc. information needed */ 456 1.1 christos /* to create new NAT entry. */ 457 1.1 christos /* */ 458 1.1 christos /* Given an empty NAT structure, populate it with new information about a */ 459 1.1 christos /* new NAT session, as defined by the matching NAT rule. */ 460 1.1 christos /* ni.nai_ip is passed in uninitialised and must be set, in host byte order,*/ 461 1.1 christos /* to the new IP address for the translation. */ 462 1.1 christos /* ------------------------------------------------------------------------ */ 463 1.1 christos int 464 1.1 christos ipf_nat6_newmap(fin, nat, ni) 465 1.1 christos fr_info_t *fin; 466 1.1 christos nat_t *nat; 467 1.1 christos natinfo_t *ni; 468 1.1 christos { 469 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 470 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 471 1.1 christos u_short st_port, dport, sport, port, sp, dp; 472 1.1 christos i6addr_t in, st_ip; 473 1.1 christos hostmap_t *hm; 474 1.1 christos u_32_t flags; 475 1.1 christos ipnat_t *np; 476 1.1 christos nat_t *natl; 477 1.1 christos int l; 478 1.1 christos 479 1.1 christos /* 480 1.1 christos * If it's an outbound packet which doesn't match any existing 481 1.1 christos * record, then create a new port 482 1.1 christos */ 483 1.1 christos l = 0; 484 1.1 christos hm = NULL; 485 1.1 christos np = ni->nai_np; 486 1.1 christos st_ip = np->in_snip6; 487 1.1 christos st_port = np->in_spnext; 488 1.1 christos flags = nat->nat_flags; 489 1.1 christos 490 1.1 christos if (flags & IPN_ICMPQUERY) { 491 1.1 christos sport = fin->fin_data[1]; 492 1.1 christos dport = 0; 493 1.1 christos } else { 494 1.1 christos sport = htons(fin->fin_data[0]); 495 1.1 christos dport = htons(fin->fin_data[1]); 496 1.1 christos } 497 1.1 christos 498 1.1 christos /* 499 1.1 christos * Do a loop until we either run out of entries to try or we find 500 1.1 christos * a NAT mapping that isn't currently being used. This is done 501 1.1 christos * because the change to the source is not (usually) being fixed. 502 1.1 christos */ 503 1.1 christos do { 504 1.1 christos port = 0; 505 1.1 christos in = np->in_nsrc.na_nextaddr; 506 1.1 christos if (l == 0) { 507 1.1 christos /* 508 1.1 christos * Check to see if there is an existing NAT 509 1.1 christos * setup for this IP address pair. 510 1.1 christos */ 511 1.1 christos hm = ipf_nat6_hostmap(softn, np, &fin->fin_src6, 512 1.1 christos &fin->fin_dst6, &in, 0); 513 1.1 christos if (hm != NULL) 514 1.1 christos in = hm->hm_nsrcip6; 515 1.1 christos } else if ((l == 1) && (hm != NULL)) { 516 1.2 darrenr ipf_nat_hostmapdel(softc, &hm); 517 1.1 christos } 518 1.1 christos 519 1.1 christos nat->nat_hm = hm; 520 1.1 christos 521 1.1 christos if (IP6_ISONES(&np->in_nsrcmsk6) && (np->in_spnext == 0)) { 522 1.1 christos if (l > 0) { 523 1.1 christos NBUMPSIDE6DX(1, ns_exhausted, ns_exhausted_1); 524 1.1 christos return -1; 525 1.1 christos } 526 1.1 christos } 527 1.1 christos 528 1.1 christos if ((np->in_redir == NAT_BIMAP) && 529 1.1 christos IP6_EQ(&np->in_osrcmsk6, &np->in_nsrcmsk6)) { 530 1.1 christos i6addr_t temp; 531 1.1 christos /* 532 1.1 christos * map the address block in a 1:1 fashion 533 1.1 christos */ 534 1.1 christos temp.i6[0] = fin->fin_src6.i6[0] & 535 1.1 christos ~np->in_osrcmsk6.i6[0]; 536 1.1 christos temp.i6[1] = fin->fin_src6.i6[1] & 537 1.1 christos ~np->in_osrcmsk6.i6[1]; 538 1.1 christos temp.i6[2] = fin->fin_src6.i6[2] & 539 1.1 christos ~np->in_osrcmsk6.i6[0]; 540 1.1 christos temp.i6[3] = fin->fin_src6.i6[3] & 541 1.1 christos ~np->in_osrcmsk6.i6[3]; 542 1.1 christos in = np->in_nsrcip6; 543 1.1 christos IP6_MERGE(&in, &temp, &np->in_osrc); 544 1.1 christos 545 1.1 christos #ifdef NEED_128BIT_MATH 546 1.1 christos } else if (np->in_redir & NAT_MAPBLK) { 547 1.1 christos if ((l >= np->in_ppip) || ((l > 0) && 548 1.1 christos !(flags & IPN_TCPUDP))) { 549 1.1 christos NBUMPSIDE6DX(1, ns_exhausted, ns_exhausted_2); 550 1.1 christos return -1; 551 1.1 christos } 552 1.1 christos /* 553 1.1 christos * map-block - Calculate destination address. 554 1.1 christos */ 555 1.1 christos IP6_MASK(&in, &fin->fin_src6, &np->in_osrcmsk6); 556 1.1 christos in = ntohl(in); 557 1.1 christos inb = in; 558 1.1 christos in.s_addr /= np->in_ippip; 559 1.1 christos in.s_addr &= ntohl(~np->in_nsrcmsk6); 560 1.1 christos in.s_addr += ntohl(np->in_nsrcaddr6); 561 1.1 christos /* 562 1.1 christos * Calculate destination port. 563 1.1 christos */ 564 1.1 christos if ((flags & IPN_TCPUDP) && 565 1.1 christos (np->in_ppip != 0)) { 566 1.1 christos port = ntohs(sport) + l; 567 1.1 christos port %= np->in_ppip; 568 1.1 christos port += np->in_ppip * 569 1.1 christos (inb.s_addr % np->in_ippip); 570 1.1 christos port += MAPBLK_MINPORT; 571 1.1 christos port = htons(port); 572 1.1 christos } 573 1.1 christos #endif 574 1.1 christos 575 1.1 christos } else if (IP6_ISZERO(&np->in_nsrcaddr) && 576 1.1 christos IP6_ISONES(&np->in_nsrcmsk)) { 577 1.1 christos /* 578 1.1 christos * 0/32 - use the interface's IP address. 579 1.1 christos */ 580 1.1 christos if ((l > 0) || 581 1.1 christos ipf_ifpaddr(softc, 6, FRI_NORMAL, fin->fin_ifp, 582 1.1 christos &in, NULL) == -1) { 583 1.1 christos NBUMPSIDE6DX(1, ns_new_ifpaddr, 584 1.1 christos ns_new_ifpaddr_1); 585 1.1 christos return -1; 586 1.1 christos } 587 1.1 christos 588 1.1 christos } else if (IP6_ISZERO(&np->in_nsrcip6) && 589 1.1 christos IP6_ISZERO(&np->in_nsrcmsk6)) { 590 1.1 christos /* 591 1.1 christos * 0/0 - use the original source address/port. 592 1.1 christos */ 593 1.1 christos if (l > 0) { 594 1.1 christos NBUMPSIDE6DX(1, ns_exhausted, ns_exhausted_3); 595 1.1 christos return -1; 596 1.1 christos } 597 1.1 christos in = fin->fin_src6; 598 1.1 christos 599 1.1 christos } else if (!IP6_ISONES(&np->in_nsrcmsk6) && 600 1.1 christos (np->in_spnext == 0) && ((l > 0) || (hm == NULL))) { 601 1.1 christos IP6_INC(&np->in_snip6); 602 1.1 christos } 603 1.1 christos 604 1.1 christos natl = NULL; 605 1.1 christos 606 1.1 christos if ((flags & IPN_TCPUDP) && 607 1.1 christos ((np->in_redir & NAT_MAPBLK) == 0) && 608 1.1 christos (np->in_flags & IPN_AUTOPORTMAP)) { 609 1.1 christos #ifdef NEED_128BIT_MATH 610 1.1 christos /* 611 1.1 christos * "ports auto" (without map-block) 612 1.1 christos */ 613 1.1 christos if ((l > 0) && (l % np->in_ppip == 0)) { 614 1.1 christos if ((l > np->in_ppip) && 615 1.1 christos !IP6_ISONES(&np->in_nsrcmsk)) { 616 1.1 christos IP6_INC(&np->in_snip6) 617 1.1 christos } 618 1.1 christos } 619 1.1 christos if (np->in_ppip != 0) { 620 1.1 christos port = ntohs(sport); 621 1.1 christos port += (l % np->in_ppip); 622 1.1 christos port %= np->in_ppip; 623 1.1 christos port += np->in_ppip * 624 1.1 christos (ntohl(fin->fin_src6) % 625 1.1 christos np->in_ippip); 626 1.1 christos port += MAPBLK_MINPORT; 627 1.1 christos port = htons(port); 628 1.1 christos } 629 1.1 christos #endif 630 1.1 christos 631 1.1 christos } else if (((np->in_redir & NAT_MAPBLK) == 0) && 632 1.1 christos (flags & IPN_TCPUDPICMP) && (np->in_spnext != 0)) { 633 1.1 christos /* 634 1.1 christos * Standard port translation. Select next port. 635 1.1 christos */ 636 1.1 christos if (np->in_flags & IPN_SEQUENTIAL) { 637 1.1 christos port = np->in_spnext; 638 1.1 christos } else { 639 1.1 christos port = ipf_random() % (np->in_spmax - 640 1.1 christos np->in_spmin + 1); 641 1.1 christos port += np->in_spmin; 642 1.1 christos } 643 1.1 christos port = htons(port); 644 1.1 christos np->in_spnext++; 645 1.1 christos 646 1.1 christos if (np->in_spnext > np->in_spmax) { 647 1.1 christos np->in_spnext = np->in_spmin; 648 1.1 christos if (!IP6_ISONES(&np->in_nsrcmsk6)) { 649 1.1 christos IP6_INC(&np->in_snip6); 650 1.1 christos } 651 1.1 christos } 652 1.1 christos } 653 1.1 christos 654 1.1 christos if (np->in_flags & IPN_SIPRANGE) { 655 1.1 christos if (IP6_GT(&np->in_snip, &np->in_nsrcmsk)) 656 1.1 christos np->in_snip6 = np->in_nsrcip6; 657 1.1 christos } else { 658 1.1 christos i6addr_t a1, a2; 659 1.1 christos 660 1.1 christos a1 = np->in_snip6; 661 1.1 christos IP6_INC(&a1); 662 1.1 christos IP6_AND(&a1, &np->in_nsrcmsk6, &a2); 663 1.1 christos 664 1.1 christos if (!IP6_ISONES(&np->in_nsrcmsk6) && 665 1.1 christos IP6_GT(&a2, &np->in_nsrcip6)) { 666 1.1 christos IP6_ADD(&np->in_nsrcip6, 1, &np->in_snip6); 667 1.1 christos } 668 1.1 christos } 669 1.1 christos 670 1.1 christos if ((port == 0) && (flags & (IPN_TCPUDPICMP|IPN_ICMPQUERY))) 671 1.1 christos port = sport; 672 1.1 christos 673 1.1 christos /* 674 1.1 christos * Here we do a lookup of the connection as seen from 675 1.1 christos * the outside. If an IP# pair already exists, try 676 1.1 christos * again. So if you have A->B becomes C->B, you can 677 1.1 christos * also have D->E become C->E but not D->B causing 678 1.1 christos * another C->B. Also take protocol and ports into 679 1.1 christos * account when determining whether a pre-existing 680 1.1 christos * NAT setup will cause an external conflict where 681 1.1 christos * this is appropriate. 682 1.1 christos */ 683 1.1 christos sp = fin->fin_data[0]; 684 1.1 christos dp = fin->fin_data[1]; 685 1.1 christos fin->fin_data[0] = fin->fin_data[1]; 686 1.1 christos fin->fin_data[1] = ntohs(port); 687 1.1 christos natl = ipf_nat6_inlookup(fin, flags & ~(SI_WILDP|NAT_SEARCH), 688 1.1 christos (u_int)fin->fin_p, &fin->fin_dst6.in6, 689 1.1 christos &in.in6); 690 1.1 christos fin->fin_data[0] = sp; 691 1.1 christos fin->fin_data[1] = dp; 692 1.1 christos 693 1.1 christos /* 694 1.1 christos * Has the search wrapped around and come back to the 695 1.1 christos * start ? 696 1.1 christos */ 697 1.1 christos if ((natl != NULL) && 698 1.1 christos (np->in_spnext != 0) && (st_port == np->in_spnext) && 699 1.1 christos (!IP6_ISZERO(&np->in_snip6) && 700 1.1 christos IP6_EQ(&st_ip, &np->in_snip6))) { 701 1.1 christos NBUMPSIDE6D(1, ns_wrap); 702 1.1 christos return -1; 703 1.1 christos } 704 1.1 christos l++; 705 1.1 christos } while (natl != NULL); 706 1.1 christos 707 1.1 christos /* Setup the NAT table */ 708 1.1 christos nat->nat_osrc6 = fin->fin_src6; 709 1.1 christos nat->nat_nsrc6 = in; 710 1.1 christos nat->nat_odst6 = fin->fin_dst6; 711 1.1 christos nat->nat_ndst6 = fin->fin_dst6; 712 1.1 christos if (nat->nat_hm == NULL) 713 1.1 christos nat->nat_hm = ipf_nat6_hostmap(softn, np, &fin->fin_src6, 714 1.1 christos &fin->fin_dst6, 715 1.1 christos &nat->nat_nsrc6, 0); 716 1.1 christos 717 1.1 christos if (flags & IPN_TCPUDP) { 718 1.1 christos nat->nat_osport = sport; 719 1.1 christos nat->nat_nsport = port; /* sport */ 720 1.1 christos nat->nat_odport = dport; 721 1.1 christos nat->nat_ndport = dport; 722 1.1 christos ((tcphdr_t *)fin->fin_dp)->th_sport = port; 723 1.1 christos } else if (flags & IPN_ICMPQUERY) { 724 1.1 christos nat->nat_oicmpid = fin->fin_data[1]; 725 1.1 christos ((struct icmp6_hdr *)fin->fin_dp)->icmp6_id = port; 726 1.1 christos nat->nat_nicmpid = port; 727 1.1 christos } 728 1.1 christos return 0; 729 1.1 christos } 730 1.1 christos 731 1.1 christos 732 1.1 christos /* ------------------------------------------------------------------------ */ 733 1.1 christos /* Function: ipf_nat6_newrdr */ 734 1.1 christos /* Returns: int - -1 == error, 0 == success (no move), 1 == success and */ 735 1.1 christos /* allow rule to be moved if IPN_ROUNDR is set. */ 736 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 737 1.1 christos /* nat(I) - pointer to NAT entry */ 738 1.1 christos /* ni(I) - pointer to structure with misc. information needed */ 739 1.1 christos /* to create new NAT entry. */ 740 1.1 christos /* */ 741 1.1 christos /* ni.nai_ip is passed in uninitialised and must be set, in host byte order,*/ 742 1.1 christos /* to the new IP address for the translation. */ 743 1.1 christos /* ------------------------------------------------------------------------ */ 744 1.1 christos int 745 1.1 christos ipf_nat6_newrdr(fin, nat, ni) 746 1.1 christos fr_info_t *fin; 747 1.1 christos nat_t *nat; 748 1.1 christos natinfo_t *ni; 749 1.1 christos { 750 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 751 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 752 1.1 christos u_short nport, dport, sport; 753 1.1 christos u_short sp, dp; 754 1.1 christos hostmap_t *hm; 755 1.1 christos u_32_t flags; 756 1.1 christos i6addr_t in; 757 1.1 christos ipnat_t *np; 758 1.1 christos nat_t *natl; 759 1.1 christos int move; 760 1.1 christos 761 1.1 christos move = 1; 762 1.1 christos hm = NULL; 763 1.1 christos in.i6[0] = 0; 764 1.1 christos in.i6[1] = 0; 765 1.1 christos in.i6[2] = 0; 766 1.1 christos in.i6[3] = 0; 767 1.1 christos np = ni->nai_np; 768 1.1 christos flags = nat->nat_flags; 769 1.1 christos 770 1.1 christos if (flags & IPN_ICMPQUERY) { 771 1.1 christos dport = fin->fin_data[1]; 772 1.1 christos sport = 0; 773 1.1 christos } else { 774 1.1 christos sport = htons(fin->fin_data[0]); 775 1.1 christos dport = htons(fin->fin_data[1]); 776 1.1 christos } 777 1.1 christos 778 1.1 christos /* TRACE sport, dport */ 779 1.1 christos 780 1.1 christos 781 1.1 christos /* 782 1.1 christos * If the matching rule has IPN_STICKY set, then we want to have the 783 1.1 christos * same rule kick in as before. Why would this happen? If you have 784 1.1 christos * a collection of rdr rules with "round-robin sticky", the current 785 1.1 christos * packet might match a different one to the previous connection but 786 1.1 christos * we want the same destination to be used. 787 1.1 christos */ 788 1.1 christos if (((np->in_flags & (IPN_ROUNDR|IPN_SPLIT)) != 0) && 789 1.1 christos ((np->in_flags & IPN_STICKY) != 0)) { 790 1.1 christos hm = ipf_nat6_hostmap(softn, NULL, &fin->fin_src6, 791 1.1 christos &fin->fin_dst6, &in, (u_32_t)dport); 792 1.1 christos if (hm != NULL) { 793 1.1 christos in = hm->hm_ndstip6; 794 1.1 christos np = hm->hm_ipnat; 795 1.1 christos ni->nai_np = np; 796 1.1 christos move = 0; 797 1.1 christos } 798 1.1 christos } 799 1.1 christos 800 1.1 christos /* 801 1.1 christos * Otherwise, it's an inbound packet. Most likely, we don't 802 1.1 christos * want to rewrite source ports and source addresses. Instead, 803 1.1 christos * we want to rewrite to a fixed internal address and fixed 804 1.1 christos * internal port. 805 1.1 christos */ 806 1.1 christos if (np->in_flags & IPN_SPLIT) { 807 1.1 christos in = np->in_dnip6; 808 1.1 christos 809 1.1 christos if ((np->in_flags & (IPN_ROUNDR|IPN_STICKY)) == IPN_STICKY) { 810 1.1 christos hm = ipf_nat6_hostmap(softn, NULL, &fin->fin_src6, 811 1.1 christos &fin->fin_dst6, &in, 812 1.1 christos (u_32_t)dport); 813 1.1 christos if (hm != NULL) { 814 1.1 christos in = hm->hm_ndstip6; 815 1.1 christos move = 0; 816 1.1 christos } 817 1.1 christos } 818 1.1 christos 819 1.1 christos if (hm == NULL || hm->hm_ref == 1) { 820 1.1 christos if (IP6_EQ(&np->in_ndstip6, &in)) { 821 1.1 christos np->in_dnip6 = np->in_ndstmsk6; 822 1.1 christos move = 0; 823 1.1 christos } else { 824 1.1 christos np->in_dnip6 = np->in_ndstip6; 825 1.1 christos } 826 1.1 christos } 827 1.1 christos 828 1.1 christos } else if (IP6_ISZERO(&np->in_ndstaddr) && 829 1.1 christos IP6_ISONES(&np->in_ndstmsk)) { 830 1.1 christos /* 831 1.1 christos * 0/32 - use the interface's IP address. 832 1.1 christos */ 833 1.1 christos if (ipf_ifpaddr(softc, 6, FRI_NORMAL, fin->fin_ifp, 834 1.1 christos &in, NULL) == -1) { 835 1.1 christos NBUMPSIDE6DX(0, ns_new_ifpaddr, ns_new_ifpaddr_2); 836 1.1 christos return -1; 837 1.1 christos } 838 1.1 christos 839 1.1 christos } else if (IP6_ISZERO(&np->in_ndstip6) && 840 1.1 christos IP6_ISZERO(&np->in_ndstmsk6)) { 841 1.1 christos /* 842 1.1 christos * 0/0 - use the original destination address/port. 843 1.1 christos */ 844 1.1 christos in = fin->fin_dst6; 845 1.1 christos 846 1.1 christos } else if (np->in_redir == NAT_BIMAP && 847 1.1 christos IP6_EQ(&np->in_ndstmsk6, &np->in_odstmsk6)) { 848 1.1 christos i6addr_t temp; 849 1.1 christos /* 850 1.1 christos * map the address block in a 1:1 fashion 851 1.1 christos */ 852 1.1 christos temp.i6[0] = fin->fin_dst6.i6[0] & ~np->in_osrcmsk6.i6[0]; 853 1.1 christos temp.i6[1] = fin->fin_dst6.i6[1] & ~np->in_osrcmsk6.i6[1]; 854 1.1 christos temp.i6[2] = fin->fin_dst6.i6[2] & ~np->in_osrcmsk6.i6[0]; 855 1.1 christos temp.i6[3] = fin->fin_dst6.i6[3] & ~np->in_osrcmsk6.i6[3]; 856 1.1 christos in = np->in_ndstip6; 857 1.1 christos IP6_MERGE(&in, &temp, &np->in_ndstmsk6); 858 1.1 christos } else { 859 1.1 christos in = np->in_ndstip6; 860 1.1 christos } 861 1.1 christos 862 1.1 christos if ((np->in_dpnext == 0) || ((flags & NAT_NOTRULEPORT) != 0)) 863 1.1 christos nport = dport; 864 1.1 christos else { 865 1.1 christos /* 866 1.1 christos * Whilst not optimized for the case where 867 1.1 christos * pmin == pmax, the gain is not significant. 868 1.1 christos */ 869 1.1 christos if (((np->in_flags & IPN_FIXEDDPORT) == 0) && 870 1.1 christos (np->in_odport != np->in_dtop)) { 871 1.1 christos nport = ntohs(dport) - np->in_odport + np->in_dpmax; 872 1.1 christos nport = htons(nport); 873 1.1 christos } else { 874 1.1 christos nport = htons(np->in_dpnext); 875 1.1 christos np->in_dpnext++; 876 1.1 christos if (np->in_dpnext > np->in_dpmax) 877 1.1 christos np->in_dpnext = np->in_dpmin; 878 1.1 christos } 879 1.1 christos } 880 1.1 christos 881 1.1 christos /* 882 1.1 christos * When the redirect-to address is set to 0.0.0.0, just 883 1.1 christos * assume a blank `forwarding' of the packet. We don't 884 1.1 christos * setup any translation for this either. 885 1.1 christos */ 886 1.1 christos if (IP6_ISZERO(&in)) { 887 1.1 christos if (nport == dport) { 888 1.1 christos NBUMPSIDE6D(0, ns_xlate_null); 889 1.1 christos return -1; 890 1.1 christos } 891 1.1 christos in = fin->fin_dst6; 892 1.1 christos } 893 1.1 christos 894 1.1 christos /* 895 1.1 christos * Check to see if this redirect mapping already exists and if 896 1.1 christos * it does, return "failure" (allowing it to be created will just 897 1.1 christos * cause one or both of these "connections" to stop working.) 898 1.1 christos */ 899 1.1 christos sp = fin->fin_data[0]; 900 1.1 christos dp = fin->fin_data[1]; 901 1.1 christos fin->fin_data[1] = fin->fin_data[0]; 902 1.1 christos fin->fin_data[0] = ntohs(nport); 903 1.1 christos natl = ipf_nat6_outlookup(fin, flags & ~(SI_WILDP|NAT_SEARCH), 904 1.1 christos (u_int)fin->fin_p, &in.in6, 905 1.1 christos &fin->fin_src6.in6); 906 1.1 christos fin->fin_data[0] = sp; 907 1.1 christos fin->fin_data[1] = dp; 908 1.1 christos if (natl != NULL) { 909 1.1 christos NBUMPSIDE6D(0, ns_xlate_exists); 910 1.1 christos return -1; 911 1.1 christos } 912 1.1 christos 913 1.1 christos nat->nat_ndst6 = in; 914 1.1 christos nat->nat_odst6 = fin->fin_dst6; 915 1.1 christos nat->nat_nsrc6 = fin->fin_src6; 916 1.1 christos nat->nat_osrc6 = fin->fin_src6; 917 1.1 christos if ((nat->nat_hm == NULL) && ((np->in_flags & IPN_STICKY) != 0)) 918 1.1 christos nat->nat_hm = ipf_nat6_hostmap(softn, np, &fin->fin_src6, 919 1.1 christos &fin->fin_dst6, &in, 920 1.1 christos (u_32_t)dport); 921 1.1 christos 922 1.1 christos if (flags & IPN_TCPUDP) { 923 1.1 christos nat->nat_odport = dport; 924 1.1 christos nat->nat_ndport = nport; 925 1.1 christos nat->nat_osport = sport; 926 1.1 christos nat->nat_nsport = sport; 927 1.1 christos ((tcphdr_t *)fin->fin_dp)->th_dport = nport; 928 1.1 christos } else if (flags & IPN_ICMPQUERY) { 929 1.1 christos nat->nat_oicmpid = fin->fin_data[1]; 930 1.1 christos ((struct icmp6_hdr *)fin->fin_dp)->icmp6_id = nport; 931 1.1 christos nat->nat_nicmpid = nport; 932 1.1 christos } 933 1.1 christos 934 1.1 christos return move; 935 1.1 christos } 936 1.1 christos 937 1.1 christos /* ------------------------------------------------------------------------ */ 938 1.1 christos /* Function: ipf_nat6_add */ 939 1.1 christos /* Returns: nat6_t* - NULL == failure to create new NAT structure, */ 940 1.1 christos /* else pointer to new NAT structure */ 941 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 942 1.1 christos /* np(I) - pointer to NAT rule */ 943 1.1 christos /* natsave(I) - pointer to where to store NAT struct pointer */ 944 1.1 christos /* flags(I) - flags describing the current packet */ 945 1.1 christos /* direction(I) - direction of packet (in/out) */ 946 1.1 christos /* Write Lock: ipf_nat */ 947 1.1 christos /* */ 948 1.1 christos /* Attempts to create a new NAT entry. Does not actually change the packet */ 949 1.1 christos /* in any way. */ 950 1.1 christos /* */ 951 1.1 christos /* This fucntion is in three main parts: (1) deal with creating a new NAT */ 952 1.1 christos /* structure for a "MAP" rule (outgoing NAT translation); (2) deal with */ 953 1.1 christos /* creating a new NAT structure for a "RDR" rule (incoming NAT translation) */ 954 1.1 christos /* and (3) building that structure and putting it into the NAT table(s). */ 955 1.1 christos /* */ 956 1.1 christos /* NOTE: natsave should NOT be used top point back to an ipstate_t struct */ 957 1.1 christos /* as it can result in memory being corrupted. */ 958 1.1 christos /* ------------------------------------------------------------------------ */ 959 1.1 christos nat_t * 960 1.1 christos ipf_nat6_add(fin, np, natsave, flags, direction) 961 1.1 christos fr_info_t *fin; 962 1.1 christos ipnat_t *np; 963 1.1 christos nat_t **natsave; 964 1.1 christos u_int flags; 965 1.1 christos int direction; 966 1.1 christos { 967 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 968 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 969 1.1 christos hostmap_t *hm = NULL; 970 1.1 christos nat_t *nat, *natl; 971 1.2 darrenr natstat_t *nsp; 972 1.1 christos u_int nflags; 973 1.1 christos natinfo_t ni; 974 1.1 christos int move; 975 1.1 christos #if SOLARIS && defined(_KERNEL) && (SOLARIS2 >= 6) && defined(ICK_M_CTL_MAGIC) 976 1.1 christos qpktinfo_t *qpi = fin->fin_qpi; 977 1.1 christos #endif 978 1.1 christos 979 1.2 darrenr nsp = &softn->ipf_nat_stats; 980 1.2 darrenr 981 1.2 darrenr if ((nsp->ns_active * 100 / softn->ipf_nat_table_max) > 982 1.1 christos softn->ipf_nat_table_wm_high) { 983 1.1 christos softn->ipf_nat_doflush = 1; 984 1.1 christos } 985 1.1 christos 986 1.2 darrenr if (nsp->ns_active >= softn->ipf_nat_table_max) { 987 1.1 christos NBUMPSIDE6(fin->fin_out, ns_table_max); 988 1.1 christos return NULL; 989 1.1 christos } 990 1.1 christos 991 1.1 christos move = 1; 992 1.1 christos nflags = np->in_flags & flags; 993 1.1 christos nflags &= NAT_FROMRULE; 994 1.1 christos 995 1.1 christos ni.nai_np = np; 996 1.1 christos ni.nai_dport = 0; 997 1.1 christos ni.nai_sport = 0; 998 1.1 christos 999 1.1 christos /* Give me a new nat */ 1000 1.1 christos KMALLOC(nat, nat_t *); 1001 1.1 christos if (nat == NULL) { 1002 1.1 christos NBUMPSIDE6(fin->fin_out, ns_memfail); 1003 1.1 christos /* 1004 1.1 christos * Try to automatically tune the max # of entries in the 1005 1.1 christos * table allowed to be less than what will cause kmem_alloc() 1006 1.1 christos * to fail and try to eliminate panics due to out of memory 1007 1.1 christos * conditions arising. 1008 1.1 christos */ 1009 1.1 christos if ((softn->ipf_nat_table_max > softn->ipf_nat_table_sz) && 1010 1.2 darrenr (nsp->ns_active > 100)) { 1011 1.2 darrenr softn->ipf_nat_table_max = nsp->ns_active - 100; 1012 1.1 christos printf("table_max reduced to %d\n", 1013 1.1 christos softn->ipf_nat_table_max); 1014 1.1 christos } 1015 1.1 christos return NULL; 1016 1.1 christos } 1017 1.1 christos 1018 1.1 christos if (flags & IPN_ICMPQUERY) { 1019 1.1 christos /* 1020 1.1 christos * In the ICMP query NAT code, we translate the ICMP id fields 1021 1.1 christos * to make them unique. This is indepedent of the ICMP type 1022 1.1 christos * (e.g. in the unlikely event that a host sends an echo and 1023 1.1 christos * an tstamp request with the same id, both packets will have 1024 1.1 christos * their ip address/id field changed in the same way). 1025 1.1 christos */ 1026 1.1 christos /* The icmp6_id field is used by the sender to identify the 1027 1.1 christos * process making the icmp request. (the receiver justs 1028 1.1 christos * copies it back in its response). So, it closely matches 1029 1.1 christos * the concept of source port. We overlay sport, so we can 1030 1.1 christos * maximally reuse the existing code. 1031 1.1 christos */ 1032 1.1 christos ni.nai_sport = fin->fin_data[1]; 1033 1.1 christos ni.nai_dport = 0; 1034 1.1 christos } 1035 1.1 christos 1036 1.1 christos bzero((char *)nat, sizeof(*nat)); 1037 1.1 christos nat->nat_flags = flags; 1038 1.1 christos nat->nat_redir = np->in_redir; 1039 1.1 christos nat->nat_dir = direction; 1040 1.1 christos nat->nat_pr[0] = fin->fin_p; 1041 1.1 christos nat->nat_pr[1] = fin->fin_p; 1042 1.1 christos 1043 1.1 christos /* 1044 1.1 christos * Search the current table for a match and create a new mapping 1045 1.1 christos * if there is none found. 1046 1.1 christos */ 1047 1.2 darrenr if (np->in_redir & NAT_DIVERTUDP) { 1048 1.1 christos move = ipf_nat6_newdivert(fin, nat, &ni); 1049 1.1 christos 1050 1.1 christos } else if (np->in_redir & NAT_REWRITE) { 1051 1.1 christos move = ipf_nat6_newrewrite(fin, nat, &ni); 1052 1.1 christos 1053 1.1 christos } else if (direction == NAT_OUTBOUND) { 1054 1.1 christos /* 1055 1.1 christos * We can now arrange to call this for the same connection 1056 1.1 christos * because ipf_nat6_new doesn't protect the code path into 1057 1.1 christos * this function. 1058 1.1 christos */ 1059 1.1 christos natl = ipf_nat6_outlookup(fin, nflags, (u_int)fin->fin_p, 1060 1.1 christos &fin->fin_src6.in6, 1061 1.1 christos &fin->fin_dst6.in6); 1062 1.1 christos if (natl != NULL) { 1063 1.1 christos KFREE(nat); 1064 1.1 christos nat = natl; 1065 1.1 christos goto done; 1066 1.1 christos } 1067 1.1 christos 1068 1.1 christos move = ipf_nat6_newmap(fin, nat, &ni); 1069 1.1 christos } else { 1070 1.1 christos /* 1071 1.1 christos * NAT_INBOUND is used for redirects rules 1072 1.1 christos */ 1073 1.1 christos natl = ipf_nat6_inlookup(fin, nflags, (u_int)fin->fin_p, 1074 1.1 christos &fin->fin_src6.in6, 1075 1.1 christos &fin->fin_dst6.in6); 1076 1.1 christos if (natl != NULL) { 1077 1.1 christos KFREE(nat); 1078 1.1 christos nat = natl; 1079 1.1 christos goto done; 1080 1.1 christos } 1081 1.1 christos 1082 1.1 christos move = ipf_nat6_newrdr(fin, nat, &ni); 1083 1.1 christos } 1084 1.1 christos if (move == -1) 1085 1.1 christos goto badnat; 1086 1.1 christos 1087 1.1 christos np = ni.nai_np; 1088 1.1 christos 1089 1.1 christos nat->nat_mssclamp = np->in_mssclamp; 1090 1.1 christos nat->nat_me = natsave; 1091 1.1 christos nat->nat_fr = fin->fin_fr; 1092 1.1 christos nat->nat_rev = fin->fin_rev; 1093 1.1 christos nat->nat_ptr = np; 1094 1.2 darrenr nat->nat_dlocal = np->in_dlocal; 1095 1.1 christos 1096 1.2 darrenr if ((np->in_apr != NULL) && ((nat->nat_flags & NAT_SLAVE) == 0)) { 1097 1.2 darrenr if (ipf_proxy_new(fin, nat) == -1) { 1098 1.2 darrenr NBUMPSIDE6D(fin->fin_out, ns_appr_fail); 1099 1.1 christos goto badnat; 1100 1.2 darrenr } 1101 1.2 darrenr } 1102 1.1 christos 1103 1.1 christos nat->nat_ifps[0] = np->in_ifps[0]; 1104 1.1 christos if (np->in_ifps[0] != NULL) { 1105 1.1 christos COPYIFNAME(np->in_v[0], np->in_ifps[0], nat->nat_ifnames[0]); 1106 1.1 christos } 1107 1.1 christos 1108 1.1 christos nat->nat_ifps[1] = np->in_ifps[1]; 1109 1.1 christos if (np->in_ifps[1] != NULL) { 1110 1.1 christos COPYIFNAME(np->in_v[1], np->in_ifps[1], nat->nat_ifnames[1]); 1111 1.1 christos } 1112 1.1 christos 1113 1.1 christos if (ipf_nat6_finalise(fin, nat) == -1) { 1114 1.1 christos goto badnat; 1115 1.1 christos } 1116 1.1 christos 1117 1.1 christos np->in_use++; 1118 1.1 christos 1119 1.1 christos if ((move == 1) && (np->in_flags & IPN_ROUNDR)) { 1120 1.1 christos if ((np->in_redir & (NAT_REDIRECT|NAT_MAP)) == NAT_REDIRECT) { 1121 1.1 christos ipf_nat6_delrdr(softn, np); 1122 1.1 christos ipf_nat6_addrdr(softn, np); 1123 1.1 christos } else if ((np->in_redir & (NAT_REDIRECT|NAT_MAP)) == NAT_MAP) { 1124 1.1 christos ipf_nat6_delmap(softn, np); 1125 1.1 christos ipf_nat6_addmap(softn, np); 1126 1.1 christos } 1127 1.1 christos } 1128 1.1 christos 1129 1.1 christos if (flags & SI_WILDP) 1130 1.2 darrenr nsp->ns_wilds++; 1131 1.1 christos softn->ipf_nat_stats.ns_proto[nat->nat_pr[0]]++; 1132 1.1 christos 1133 1.1 christos goto done; 1134 1.1 christos badnat: 1135 1.1 christos NBUMPSIDE6(fin->fin_out, ns_badnatnew); 1136 1.1 christos if ((hm = nat->nat_hm) != NULL) 1137 1.2 darrenr ipf_nat_hostmapdel(softc, &hm); 1138 1.1 christos KFREE(nat); 1139 1.1 christos nat = NULL; 1140 1.1 christos done: 1141 1.2 darrenr if (nat != NULL && np != NULL) 1142 1.2 darrenr np->in_hits++; 1143 1.2 darrenr if (natsave != NULL) 1144 1.2 darrenr *natsave = nat; 1145 1.1 christos return nat; 1146 1.1 christos } 1147 1.1 christos 1148 1.1 christos 1149 1.1 christos /* ------------------------------------------------------------------------ */ 1150 1.1 christos /* Function: ipf_nat6_finalise */ 1151 1.1 christos /* Returns: int - 0 == sucess, -1 == failure */ 1152 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 1153 1.1 christos /* nat(I) - pointer to NAT entry */ 1154 1.1 christos /* Write Lock: ipf_nat */ 1155 1.1 christos /* */ 1156 1.1 christos /* This is the tail end of constructing a new NAT entry and is the same */ 1157 1.1 christos /* for both IPv4 and IPv6. */ 1158 1.1 christos /* ------------------------------------------------------------------------ */ 1159 1.1 christos /*ARGSUSED*/ 1160 1.1 christos int 1161 1.1 christos ipf_nat6_finalise(fin, nat) 1162 1.1 christos fr_info_t *fin; 1163 1.1 christos nat_t *nat; 1164 1.1 christos { 1165 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 1166 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1167 1.1 christos u_32_t sum1, sum2, sumd; 1168 1.1 christos frentry_t *fr; 1169 1.1 christos u_32_t flags; 1170 1.1 christos 1171 1.1 christos flags = nat->nat_flags; 1172 1.1 christos 1173 1.1 christos switch (fin->fin_p) 1174 1.1 christos { 1175 1.1 christos case IPPROTO_ICMPV6 : 1176 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_osrc6); 1177 1.2 darrenr sum1 += ntohs(nat->nat_oicmpid); 1178 1.2 darrenr sum2 = LONG_SUM6(&nat->nat_nsrc6); 1179 1.2 darrenr sum2 += ntohs(nat->nat_nicmpid); 1180 1.1 christos CALC_SUMD(sum1, sum2, sumd); 1181 1.1 christos nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 1182 1.1 christos 1183 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_odst6); 1184 1.2 darrenr sum2 = LONG_SUM6(&nat->nat_ndst6); 1185 1.2 darrenr CALC_SUMD(sum1, sum2, sumd); 1186 1.2 darrenr nat->nat_sumd[0] += (sumd & 0xffff) + (sumd >> 16); 1187 1.1 christos break; 1188 1.1 christos 1189 1.2 darrenr case IPPROTO_TCP : 1190 1.2 darrenr case IPPROTO_UDP : 1191 1.1 christos sum1 = LONG_SUM6(&nat->nat_osrc6); 1192 1.1 christos sum1 += ntohs(nat->nat_osport); 1193 1.1 christos sum2 = LONG_SUM6(&nat->nat_nsrc6); 1194 1.1 christos sum2 += ntohs(nat->nat_nsport); 1195 1.1 christos CALC_SUMD(sum1, sum2, sumd); 1196 1.1 christos nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 1197 1.1 christos 1198 1.1 christos sum1 = LONG_SUM6(&nat->nat_odst6); 1199 1.1 christos sum1 += ntohs(nat->nat_odport); 1200 1.1 christos sum2 = LONG_SUM6(&nat->nat_ndst6); 1201 1.1 christos sum2 += ntohs(nat->nat_ndport); 1202 1.1 christos CALC_SUMD(sum1, sum2, sumd); 1203 1.1 christos nat->nat_sumd[0] += (sumd & 0xffff) + (sumd >> 16); 1204 1.1 christos break; 1205 1.2 darrenr 1206 1.2 darrenr default : 1207 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_osrc6); 1208 1.2 darrenr sum2 = LONG_SUM6(&nat->nat_nsrc6); 1209 1.2 darrenr CALC_SUMD(sum1, sum2, sumd); 1210 1.2 darrenr nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 1211 1.2 darrenr 1212 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_odst6); 1213 1.2 darrenr sum2 = LONG_SUM6(&nat->nat_ndst6); 1214 1.2 darrenr CALC_SUMD(sum1, sum2, sumd); 1215 1.2 darrenr nat->nat_sumd[0] += (sumd & 0xffff) + (sumd >> 16); 1216 1.2 darrenr break; 1217 1.1 christos } 1218 1.1 christos 1219 1.2 darrenr /* 1220 1.2 darrenr * Compute the partial checksum, just in case. 1221 1.2 darrenr * This is only ever placed into outbound packets so care needs 1222 1.2 darrenr * to be taken over which pair of addresses are used. 1223 1.2 darrenr */ 1224 1.2 darrenr if (nat->nat_dir == NAT_OUTBOUND) { 1225 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_nsrc6); 1226 1.2 darrenr sum1 += LONG_SUM6(&nat->nat_ndst6); 1227 1.2 darrenr } else { 1228 1.2 darrenr sum1 = LONG_SUM6(&nat->nat_osrc6); 1229 1.2 darrenr sum1 += LONG_SUM6(&nat->nat_odst6); 1230 1.2 darrenr } 1231 1.2 darrenr sum1 += nat->nat_pr[1]; 1232 1.2 darrenr nat->nat_sumd[1] = (sum1 & 0xffff) + (sum1 >> 16); 1233 1.1 christos 1234 1.1 christos if ((nat->nat_flags & SI_CLONE) == 0) 1235 1.1 christos nat->nat_sync = ipf_sync_new(softc, SMC_NAT, fin, nat); 1236 1.1 christos 1237 1.1 christos if ((nat->nat_ifps[0] != NULL) && (nat->nat_ifps[0] != (void *)-1)) { 1238 1.1 christos nat->nat_mtu[0] = GETIFMTU_6(nat->nat_ifps[0]); 1239 1.1 christos } 1240 1.1 christos 1241 1.1 christos if ((nat->nat_ifps[1] != NULL) && (nat->nat_ifps[1] != (void *)-1)) { 1242 1.1 christos nat->nat_mtu[1] = GETIFMTU_6(nat->nat_ifps[1]); 1243 1.1 christos } 1244 1.1 christos 1245 1.1 christos nat->nat_v[0] = 6; 1246 1.1 christos nat->nat_v[1] = 6; 1247 1.1 christos 1248 1.1 christos if (ipf_nat6_insert(softc, softn, nat) == 0) { 1249 1.1 christos if (softn->ipf_nat_logging) 1250 1.1 christos ipf_nat_log(softc, softn, nat, NL_NEW); 1251 1.1 christos fr = nat->nat_fr; 1252 1.1 christos if (fr != NULL) { 1253 1.1 christos MUTEX_ENTER(&fr->fr_lock); 1254 1.1 christos fr->fr_ref++; 1255 1.1 christos MUTEX_EXIT(&fr->fr_lock); 1256 1.1 christos } 1257 1.1 christos return 0; 1258 1.1 christos } 1259 1.1 christos 1260 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_unfinalised); 1261 1.1 christos /* 1262 1.1 christos * nat6_insert failed, so cleanup time... 1263 1.1 christos */ 1264 1.2 darrenr if (nat->nat_sync != NULL) 1265 1.2 darrenr ipf_sync_del_nat(softc->ipf_sync_soft, nat->nat_sync); 1266 1.1 christos return -1; 1267 1.1 christos } 1268 1.1 christos 1269 1.1 christos 1270 1.1 christos /* ------------------------------------------------------------------------ */ 1271 1.2 darrenr /* Function: ipf_nat6_insert */ 1272 1.2 darrenr /* Returns: int - 0 == sucess, -1 == failure */ 1273 1.2 darrenr /* Parameters: softc(I) - pointer to soft context main structure */ 1274 1.2 darrenr /* softn(I) - pointer to NAT context structure */ 1275 1.2 darrenr /* nat(I) - pointer to NAT structure */ 1276 1.2 darrenr /* Write Lock: ipf_nat */ 1277 1.1 christos /* */ 1278 1.1 christos /* Insert a NAT entry into the hash tables for searching and add it to the */ 1279 1.1 christos /* list of active NAT entries. Adjust global counters when complete. */ 1280 1.1 christos /* ------------------------------------------------------------------------ */ 1281 1.1 christos static int 1282 1.1 christos ipf_nat6_insert(softc, softn, nat) 1283 1.1 christos ipf_main_softc_t *softc; 1284 1.1 christos ipf_nat_softc_t *softn; 1285 1.1 christos nat_t *nat; 1286 1.1 christos { 1287 1.1 christos u_int hv1, hv2; 1288 1.2 darrenr u_32_t sp, dp; 1289 1.1 christos ipnat_t *in; 1290 1.1 christos 1291 1.1 christos /* 1292 1.1 christos * Try and return an error as early as possible, so calculate the hash 1293 1.1 christos * entry numbers first and then proceed. 1294 1.1 christos */ 1295 1.1 christos if ((nat->nat_flags & (SI_W_SPORT|SI_W_DPORT)) == 0) { 1296 1.2 darrenr if ((nat->nat_flags & IPN_TCPUDP) != 0) { 1297 1.2 darrenr sp = nat->nat_osport; 1298 1.2 darrenr dp = nat->nat_odport; 1299 1.2 darrenr } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 1300 1.2 darrenr sp = 0; 1301 1.2 darrenr dp = nat->nat_oicmpid; 1302 1.2 darrenr } else { 1303 1.2 darrenr sp = 0; 1304 1.2 darrenr dp = 0; 1305 1.2 darrenr } 1306 1.2 darrenr hv1 = NAT_HASH_FN6(&nat->nat_osrc6, sp, 0xffffffff); 1307 1.2 darrenr hv1 = NAT_HASH_FN6(&nat->nat_odst6, hv1 + dp, 1308 1.1 christos softn->ipf_nat_table_sz); 1309 1.1 christos 1310 1.1 christos /* 1311 1.1 christos * TRACE nat6_osrc6, nat6_osport, nat6_odst6, 1312 1.1 christos * nat6_odport, hv1 1313 1.1 christos */ 1314 1.1 christos 1315 1.2 darrenr if ((nat->nat_flags & IPN_TCPUDP) != 0) { 1316 1.2 darrenr sp = nat->nat_nsport; 1317 1.2 darrenr dp = nat->nat_ndport; 1318 1.2 darrenr } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 1319 1.2 darrenr sp = 0; 1320 1.2 darrenr dp = nat->nat_nicmpid; 1321 1.2 darrenr } else { 1322 1.2 darrenr sp = 0; 1323 1.2 darrenr dp = 0; 1324 1.2 darrenr } 1325 1.2 darrenr hv2 = NAT_HASH_FN6(&nat->nat_nsrc6, sp, 0xffffffff); 1326 1.2 darrenr hv2 = NAT_HASH_FN6(&nat->nat_ndst6, hv2 + dp, 1327 1.1 christos softn->ipf_nat_table_sz); 1328 1.1 christos /* 1329 1.1 christos * TRACE nat6_nsrcaddr, nat6_nsport, nat6_ndstaddr, 1330 1.1 christos * nat6_ndport, hv1 1331 1.1 christos */ 1332 1.1 christos } else { 1333 1.1 christos hv1 = NAT_HASH_FN6(&nat->nat_osrc6, 0, 0xffffffff); 1334 1.1 christos hv1 = NAT_HASH_FN6(&nat->nat_odst6, hv1, 1335 1.1 christos softn->ipf_nat_table_sz); 1336 1.1 christos /* TRACE nat6_osrcip6, nat6_odstip6, hv1 */ 1337 1.1 christos 1338 1.1 christos hv2 = NAT_HASH_FN6(&nat->nat_nsrc6, 0, 0xffffffff); 1339 1.1 christos hv2 = NAT_HASH_FN6(&nat->nat_ndst6, hv2, 1340 1.1 christos softn->ipf_nat_table_sz); 1341 1.1 christos /* TRACE nat6_nsrcip6, nat6_ndstip6, hv2 */ 1342 1.1 christos } 1343 1.1 christos 1344 1.1 christos nat->nat_hv[0] = hv1; 1345 1.1 christos nat->nat_hv[1] = hv2; 1346 1.1 christos 1347 1.1 christos MUTEX_INIT(&nat->nat_lock, "nat entry lock"); 1348 1.1 christos 1349 1.1 christos in = nat->nat_ptr; 1350 1.2 darrenr nat->nat_ref = nat->nat_me ? 2 : 1; 1351 1.1 christos 1352 1.1 christos nat->nat_ifnames[0][LIFNAMSIZ - 1] = '\0'; 1353 1.1 christos nat->nat_ifps[0] = ipf_resolvenic(softc, nat->nat_ifnames[0], 1354 1.1 christos nat->nat_v[0]); 1355 1.1 christos 1356 1.1 christos if (nat->nat_ifnames[1][0] != '\0') { 1357 1.1 christos nat->nat_ifnames[1][LIFNAMSIZ - 1] = '\0'; 1358 1.1 christos nat->nat_ifps[1] = ipf_resolvenic(softc, nat->nat_ifnames[1], 1359 1.1 christos nat->nat_v[1]); 1360 1.1 christos } else if (in->in_ifnames[1] != -1) { 1361 1.1 christos char *name; 1362 1.1 christos 1363 1.1 christos name = in->in_names + in->in_ifnames[1]; 1364 1.1 christos if (name[1] != '\0' && name[0] != '-' && name[0] != '*') { 1365 1.1 christos (void) strncpy(nat->nat_ifnames[1], 1366 1.1 christos nat->nat_ifnames[0], LIFNAMSIZ); 1367 1.1 christos nat->nat_ifnames[1][LIFNAMSIZ - 1] = '\0'; 1368 1.1 christos nat->nat_ifps[1] = nat->nat_ifps[0]; 1369 1.1 christos } 1370 1.1 christos } 1371 1.1 christos if ((nat->nat_ifps[0] != NULL) && (nat->nat_ifps[0] != (void *)-1)) { 1372 1.1 christos nat->nat_mtu[0] = GETIFMTU_6(nat->nat_ifps[0]); 1373 1.1 christos } 1374 1.1 christos if ((nat->nat_ifps[1] != NULL) && (nat->nat_ifps[1] != (void *)-1)) { 1375 1.1 christos nat->nat_mtu[1] = GETIFMTU_6(nat->nat_ifps[1]); 1376 1.1 christos } 1377 1.1 christos 1378 1.2 darrenr return ipf_nat_hashtab_add(softc, softn, nat); 1379 1.1 christos } 1380 1.1 christos 1381 1.1 christos 1382 1.1 christos /* ------------------------------------------------------------------------ */ 1383 1.1 christos /* Function: ipf_nat6_icmperrorlookup */ 1384 1.1 christos /* Returns: nat6_t* - point to matching NAT structure */ 1385 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 1386 1.1 christos /* dir(I) - direction of packet (in/out) */ 1387 1.1 christos /* */ 1388 1.1 christos /* Check if the ICMP error message is related to an existing TCP, UDP or */ 1389 1.1 christos /* ICMP query nat entry. It is assumed that the packet is already of the */ 1390 1.1 christos /* the required length. */ 1391 1.1 christos /* ------------------------------------------------------------------------ */ 1392 1.1 christos nat_t * 1393 1.1 christos ipf_nat6_icmperrorlookup(fin, dir) 1394 1.1 christos fr_info_t *fin; 1395 1.1 christos int dir; 1396 1.1 christos { 1397 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 1398 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1399 1.1 christos struct icmp6_hdr *icmp6, *orgicmp; 1400 1.1 christos int flags = 0, type, minlen; 1401 1.1 christos nat_stat_side_t *nside; 1402 1.1 christos tcphdr_t *tcp = NULL; 1403 1.1 christos u_short data[2]; 1404 1.1 christos ip6_t *oip6; 1405 1.1 christos nat_t *nat; 1406 1.1 christos u_int p; 1407 1.1 christos 1408 1.1 christos minlen = 40; 1409 1.1 christos icmp6 = fin->fin_dp; 1410 1.1 christos type = icmp6->icmp6_type; 1411 1.1 christos nside = &softn->ipf_nat_stats.ns_side6[fin->fin_out]; 1412 1.1 christos /* 1413 1.1 christos * Does it at least have the return (basic) IP header ? 1414 1.1 christos * Only a basic IP header (no options) should be with an ICMP error 1415 1.1 christos * header. Also, if it's not an error type, then return. 1416 1.1 christos */ 1417 1.1 christos if (!(fin->fin_flx & FI_ICMPERR)) { 1418 1.1 christos ATOMIC_INCL(nside->ns_icmp_basic); 1419 1.1 christos return NULL; 1420 1.1 christos } 1421 1.1 christos 1422 1.1 christos /* 1423 1.1 christos * Check packet size 1424 1.1 christos */ 1425 1.1 christos if (fin->fin_plen < ICMP6ERR_IPICMPHLEN) { 1426 1.1 christos ATOMIC_INCL(nside->ns_icmp_size); 1427 1.1 christos return NULL; 1428 1.1 christos } 1429 1.1 christos oip6 = (ip6_t *)((char *)fin->fin_dp + 8); 1430 1.1 christos 1431 1.1 christos /* 1432 1.1 christos * Is the buffer big enough for all of it ? It's the size of the IP 1433 1.1 christos * header claimed in the encapsulated part which is of concern. It 1434 1.1 christos * may be too big to be in this buffer but not so big that it's 1435 1.1 christos * outside the ICMP packet, leading to TCP deref's causing problems. 1436 1.1 christos * This is possible because we don't know how big oip_hl is when we 1437 1.1 christos * do the pullup early in ipf_check() and thus can't gaurantee it is 1438 1.1 christos * all here now. 1439 1.1 christos */ 1440 1.1 christos #ifdef ipf_nat6_KERNEL 1441 1.1 christos { 1442 1.1 christos mb_t *m; 1443 1.1 christos 1444 1.1 christos m = fin->fin_m; 1445 1.1 christos # if defined(MENTAT) 1446 1.1 christos if ((char *)oip6 + fin->fin_dlen - ICMPERR_ICMPHLEN > 1447 1.1 christos (char *)m->b_wptr) { 1448 1.1 christos ATOMIC_INCL(nside->ns_icmp_mbuf); 1449 1.1 christos return NULL; 1450 1.1 christos } 1451 1.1 christos # else 1452 1.1 christos if ((char *)oip6 + fin->fin_dlen - ICMPERR_ICMPHLEN > 1453 1.1 christos (char *)fin->fin_ip + M_LEN(m)) { 1454 1.1 christos ATOMIC_INCL(nside->ns_icmp_mbuf); 1455 1.1 christos return NULL; 1456 1.1 christos } 1457 1.1 christos # endif 1458 1.1 christos } 1459 1.1 christos #endif 1460 1.1 christos 1461 1.1 christos if (IP6_NEQ(&fin->fin_dst6, &oip6->ip6_src)) { 1462 1.1 christos ATOMIC_INCL(nside->ns_icmp_address); 1463 1.1 christos return NULL; 1464 1.1 christos } 1465 1.1 christos 1466 1.1 christos p = oip6->ip6_nxt; 1467 1.1 christos if (p == IPPROTO_TCP) 1468 1.1 christos flags = IPN_TCP; 1469 1.1 christos else if (p == IPPROTO_UDP) 1470 1.1 christos flags = IPN_UDP; 1471 1.1 christos else if (p == IPPROTO_ICMPV6) { 1472 1.1 christos orgicmp = (struct icmp6_hdr *)(oip6 + 1); 1473 1.1 christos 1474 1.1 christos /* see if this is related to an ICMP query */ 1475 1.1 christos if (ipf_nat6_icmpquerytype(orgicmp->icmp6_type)) { 1476 1.1 christos data[0] = fin->fin_data[0]; 1477 1.1 christos data[1] = fin->fin_data[1]; 1478 1.1 christos fin->fin_data[0] = 0; 1479 1.1 christos fin->fin_data[1] = orgicmp->icmp6_id; 1480 1.1 christos 1481 1.1 christos flags = IPN_ICMPERR|IPN_ICMPQUERY; 1482 1.1 christos /* 1483 1.1 christos * NOTE : dir refers to the direction of the original 1484 1.1 christos * ip packet. By definition the icmp error 1485 1.1 christos * message flows in the opposite direction. 1486 1.1 christos */ 1487 1.1 christos if (dir == NAT_INBOUND) 1488 1.1 christos nat = ipf_nat6_inlookup(fin, flags, p, 1489 1.1 christos &oip6->ip6_dst, 1490 1.1 christos &oip6->ip6_src); 1491 1.1 christos else 1492 1.1 christos nat = ipf_nat6_outlookup(fin, flags, p, 1493 1.1 christos &oip6->ip6_dst, 1494 1.1 christos &oip6->ip6_src); 1495 1.1 christos fin->fin_data[0] = data[0]; 1496 1.1 christos fin->fin_data[1] = data[1]; 1497 1.1 christos return nat; 1498 1.1 christos } 1499 1.1 christos } 1500 1.1 christos 1501 1.1 christos if (flags & IPN_TCPUDP) { 1502 1.1 christos minlen += 8; /* + 64bits of data to get ports */ 1503 1.1 christos /* TRACE (fin,minlen) */ 1504 1.1 christos if (fin->fin_plen < ICMPERR_IPICMPHLEN + minlen) { 1505 1.1 christos ATOMIC_INCL(nside->ns_icmp_short); 1506 1.1 christos return NULL; 1507 1.1 christos } 1508 1.1 christos 1509 1.1 christos data[0] = fin->fin_data[0]; 1510 1.1 christos data[1] = fin->fin_data[1]; 1511 1.1 christos tcp = (tcphdr_t *)(oip6 + 1); 1512 1.1 christos fin->fin_data[0] = ntohs(tcp->th_dport); 1513 1.1 christos fin->fin_data[1] = ntohs(tcp->th_sport); 1514 1.1 christos 1515 1.1 christos if (dir == NAT_INBOUND) { 1516 1.1 christos nat = ipf_nat6_inlookup(fin, flags, p, &oip6->ip6_dst, 1517 1.1 christos &oip6->ip6_src); 1518 1.1 christos } else { 1519 1.1 christos nat = ipf_nat6_outlookup(fin, flags, p, &oip6->ip6_dst, 1520 1.1 christos &oip6->ip6_src); 1521 1.1 christos } 1522 1.1 christos fin->fin_data[0] = data[0]; 1523 1.1 christos fin->fin_data[1] = data[1]; 1524 1.1 christos return nat; 1525 1.1 christos } 1526 1.1 christos if (dir == NAT_INBOUND) 1527 1.1 christos nat = ipf_nat6_inlookup(fin, 0, p, &oip6->ip6_dst, 1528 1.1 christos &oip6->ip6_src); 1529 1.1 christos else 1530 1.1 christos nat = ipf_nat6_outlookup(fin, 0, p, &oip6->ip6_dst, 1531 1.1 christos &oip6->ip6_src); 1532 1.1 christos 1533 1.1 christos return nat; 1534 1.1 christos } 1535 1.1 christos 1536 1.1 christos 1537 1.1 christos /* result = ip1 - ip2 */ 1538 1.1 christos u_32_t 1539 1.1 christos ipf_nat6_ip6subtract(ip1, ip2) 1540 1.1 christos i6addr_t *ip1, *ip2; 1541 1.1 christos { 1542 1.1 christos i6addr_t l1, l2, d; 1543 1.1 christos u_short *s1, *s2, *ds; 1544 1.1 christos u_32_t r; 1545 1.1 christos int i, neg; 1546 1.1 christos 1547 1.1 christos neg = 0; 1548 1.1 christos l1 = *ip1; 1549 1.1 christos l2 = *ip2; 1550 1.1 christos s1 = (u_short *)&l1; 1551 1.1 christos s2 = (u_short *)&l2; 1552 1.1 christos ds = (u_short *)&d; 1553 1.1 christos 1554 1.1 christos for (i = 7; i > 0; i--) { 1555 1.1 christos if (s1[i] > s2[i]) { 1556 1.1 christos ds[i] = s2[i] + 0x10000 - s1[i]; 1557 1.1 christos s2[i - 1] += 0x10000; 1558 1.1 christos } else { 1559 1.1 christos ds[i] = s2[i] - s1[i]; 1560 1.1 christos } 1561 1.1 christos } 1562 1.1 christos if (s2[0] > s1[0]) { 1563 1.1 christos ds[0] = s2[0] + 0x10000 - s1[0]; 1564 1.1 christos neg = 1; 1565 1.1 christos } else { 1566 1.1 christos ds[0] = s2[0] - s1[0]; 1567 1.1 christos } 1568 1.1 christos 1569 1.1 christos for (i = 0, r = 0; i < 8; i++) { 1570 1.1 christos r += ds[i]; 1571 1.1 christos } 1572 1.1 christos 1573 1.1 christos return r; 1574 1.1 christos } 1575 1.1 christos 1576 1.1 christos 1577 1.1 christos /* ------------------------------------------------------------------------ */ 1578 1.1 christos /* Function: ipf_nat6_icmperror */ 1579 1.1 christos /* Returns: nat6_t* - point to matching NAT structure */ 1580 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 1581 1.1 christos /* nflags(I) - NAT flags for this packet */ 1582 1.1 christos /* dir(I) - direction of packet (in/out) */ 1583 1.1 christos /* */ 1584 1.1 christos /* Fix up an ICMP packet which is an error message for an existing NAT */ 1585 1.1 christos /* session. This will correct both packet header data and checksums. */ 1586 1.1 christos /* */ 1587 1.1 christos /* This should *ONLY* be used for incoming ICMP error packets to make sure */ 1588 1.1 christos /* a NAT'd ICMP packet gets correctly recognised. */ 1589 1.1 christos /* ------------------------------------------------------------------------ */ 1590 1.1 christos nat_t * 1591 1.1 christos ipf_nat6_icmperror(fin, nflags, dir) 1592 1.1 christos fr_info_t *fin; 1593 1.1 christos u_int *nflags; 1594 1.1 christos int dir; 1595 1.1 christos { 1596 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 1597 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1598 1.1 christos u_32_t sum1, sum2, sumd, sumd2; 1599 1.1 christos i6addr_t a1, a2, a3, a4; 1600 1.1 christos struct icmp6_hdr *icmp6; 1601 1.1 christos int flags, dlen, odst; 1602 1.1 christos u_short *csump; 1603 1.1 christos tcphdr_t *tcp; 1604 1.1 christos ip6_t *oip6; 1605 1.1 christos nat_t *nat; 1606 1.1 christos void *dp; 1607 1.1 christos 1608 1.1 christos if ((fin->fin_flx & (FI_SHORT|FI_FRAGBODY))) { 1609 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_icmp_short); 1610 1.1 christos return NULL; 1611 1.1 christos } 1612 1.1 christos 1613 1.1 christos /* 1614 1.1 christos * ipf_nat6_icmperrorlookup() will return NULL for `defective' packets. 1615 1.1 christos */ 1616 1.1 christos if ((fin->fin_v != 6) || !(nat = ipf_nat6_icmperrorlookup(fin, dir))) { 1617 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_icmp_notfound); 1618 1.1 christos return NULL; 1619 1.1 christos } 1620 1.1 christos 1621 1.1 christos tcp = NULL; 1622 1.1 christos csump = NULL; 1623 1.1 christos flags = 0; 1624 1.1 christos sumd2 = 0; 1625 1.1 christos *nflags = IPN_ICMPERR; 1626 1.1 christos icmp6 = fin->fin_dp; 1627 1.1 christos oip6 = (ip6_t *)((u_char *)icmp6 + sizeof(*icmp6)); 1628 1.1 christos dp = (u_char *)oip6 + sizeof(*oip6); 1629 1.1 christos if (oip6->ip6_nxt == IPPROTO_TCP) { 1630 1.1 christos tcp = (tcphdr_t *)dp; 1631 1.1 christos csump = (u_short *)&tcp->th_sum; 1632 1.1 christos flags = IPN_TCP; 1633 1.1 christos } else if (oip6->ip6_nxt == IPPROTO_UDP) { 1634 1.1 christos udphdr_t *udp; 1635 1.1 christos 1636 1.1 christos udp = (udphdr_t *)dp; 1637 1.1 christos tcp = (tcphdr_t *)dp; 1638 1.1 christos csump = (u_short *)&udp->uh_sum; 1639 1.1 christos flags = IPN_UDP; 1640 1.1 christos } else if (oip6->ip6_nxt == IPPROTO_ICMPV6) 1641 1.1 christos flags = IPN_ICMPQUERY; 1642 1.1 christos dlen = fin->fin_plen - ((char *)dp - (char *)fin->fin_ip); 1643 1.1 christos 1644 1.1 christos /* 1645 1.1 christos * Need to adjust ICMP header to include the real IP#'s and 1646 1.1 christos * port #'s. Only apply a checksum change relative to the 1647 1.1 christos * IP address change as it will be modified again in ipf_nat6_checkout 1648 1.1 christos * for both address and port. Two checksum changes are 1649 1.1 christos * necessary for the two header address changes. Be careful 1650 1.1 christos * to only modify the checksum once for the port # and twice 1651 1.1 christos * for the IP#. 1652 1.1 christos */ 1653 1.1 christos 1654 1.1 christos /* 1655 1.1 christos * Step 1 1656 1.1 christos * Fix the IP addresses in the offending IP packet. You also need 1657 1.1 christos * to adjust the IP header checksum of that offending IP packet. 1658 1.1 christos * 1659 1.1 christos * Normally, you would expect that the ICMP checksum of the 1660 1.1 christos * ICMP error message needs to be adjusted as well for the 1661 1.1 christos * IP address change in oip. 1662 1.1 christos * However, this is a NOP, because the ICMP checksum is 1663 1.1 christos * calculated over the complete ICMP packet, which includes the 1664 1.1 christos * changed oip IP addresses and oip6->ip6_sum. However, these 1665 1.1 christos * two changes cancel each other out (if the delta for 1666 1.1 christos * the IP address is x, then the delta for ip_sum is minus x), 1667 1.1 christos * so no change in the icmp_cksum is necessary. 1668 1.1 christos * 1669 1.1 christos * Inbound ICMP 1670 1.1 christos * ------------ 1671 1.1 christos * MAP rule, SRC=a,DST=b -> SRC=c,DST=b 1672 1.1 christos * - response to outgoing packet (a,b)=>(c,b) (OIP_SRC=c,OIP_DST=b) 1673 1.1 christos * - OIP_SRC(c)=nat6_newsrcip, OIP_DST(b)=nat6_newdstip 1674 1.1 christos *=> OIP_SRC(c)=nat6_oldsrcip, OIP_DST(b)=nat6_olddstip 1675 1.1 christos * 1676 1.1 christos * RDR rule, SRC=a,DST=b -> SRC=a,DST=c 1677 1.1 christos * - response to outgoing packet (c,a)=>(b,a) (OIP_SRC=b,OIP_DST=a) 1678 1.1 christos * - OIP_SRC(b)=nat6_olddstip, OIP_DST(a)=nat6_oldsrcip 1679 1.1 christos *=> OIP_SRC(b)=nat6_newdstip, OIP_DST(a)=nat6_newsrcip 1680 1.1 christos * 1681 1.1 christos * REWRITE out rule, SRC=a,DST=b -> SRC=c,DST=d 1682 1.1 christos * - response to outgoing packet (a,b)=>(c,d) (OIP_SRC=c,OIP_DST=d) 1683 1.1 christos * - OIP_SRC(c)=nat6_newsrcip, OIP_DST(d)=nat6_newdstip 1684 1.1 christos *=> OIP_SRC(c)=nat6_oldsrcip, OIP_DST(d)=nat6_olddstip 1685 1.1 christos * 1686 1.1 christos * REWRITE in rule, SRC=a,DST=b -> SRC=c,DST=d 1687 1.1 christos * - response to outgoing packet (d,c)=>(b,a) (OIP_SRC=b,OIP_DST=a) 1688 1.1 christos * - OIP_SRC(b)=nat6_olddstip, OIP_DST(a)=nat6_oldsrcip 1689 1.1 christos *=> OIP_SRC(b)=nat6_newdstip, OIP_DST(a)=nat6_newsrcip 1690 1.1 christos * 1691 1.1 christos * Outbound ICMP 1692 1.1 christos * ------------- 1693 1.1 christos * MAP rule, SRC=a,DST=b -> SRC=c,DST=b 1694 1.1 christos * - response to incoming packet (b,c)=>(b,a) (OIP_SRC=b,OIP_DST=a) 1695 1.1 christos * - OIP_SRC(b)=nat6_olddstip, OIP_DST(a)=nat6_oldsrcip 1696 1.1 christos *=> OIP_SRC(b)=nat6_newdstip, OIP_DST(a)=nat6_newsrcip 1697 1.1 christos * 1698 1.1 christos * RDR rule, SRC=a,DST=b -> SRC=a,DST=c 1699 1.1 christos * - response to incoming packet (a,b)=>(a,c) (OIP_SRC=a,OIP_DST=c) 1700 1.1 christos * - OIP_SRC(a)=nat6_newsrcip, OIP_DST(c)=nat6_newdstip 1701 1.1 christos *=> OIP_SRC(a)=nat6_oldsrcip, OIP_DST(c)=nat6_olddstip 1702 1.1 christos * 1703 1.1 christos * REWRITE out rule, SRC=a,DST=b -> SRC=c,DST=d 1704 1.1 christos * - response to incoming packet (d,c)=>(b,a) (OIP_SRC=c,OIP_DST=d) 1705 1.1 christos * - OIP_SRC(c)=nat6_olddstip, OIP_DST(d)=nat6_oldsrcip 1706 1.1 christos *=> OIP_SRC(b)=nat6_newdstip, OIP_DST(a)=nat6_newsrcip 1707 1.1 christos * 1708 1.1 christos * REWRITE in rule, SRC=a,DST=b -> SRC=c,DST=d 1709 1.1 christos * - response to incoming packet (a,b)=>(c,d) (OIP_SRC=b,OIP_DST=a) 1710 1.1 christos * - OIP_SRC(b)=nat6_newsrcip, OIP_DST(a)=nat6_newdstip 1711 1.1 christos *=> OIP_SRC(a)=nat6_oldsrcip, OIP_DST(c)=nat6_olddstip 1712 1.1 christos */ 1713 1.1 christos 1714 1.1 christos if (((fin->fin_out == 0) && ((nat->nat_redir & NAT_MAP) != 0)) || 1715 1.1 christos ((fin->fin_out == 1) && ((nat->nat_redir & NAT_REDIRECT) != 0))) { 1716 1.1 christos a1 = nat->nat_osrc6; 1717 1.1 christos a4.in6 = oip6->ip6_src; 1718 1.1 christos a3 = nat->nat_odst6; 1719 1.1 christos a2.in6 = oip6->ip6_dst; 1720 1.1 christos oip6->ip6_src = a1.in6; 1721 1.1 christos oip6->ip6_dst = a3.in6; 1722 1.1 christos odst = 1; 1723 1.1 christos } else { 1724 1.1 christos a1 = nat->nat_ndst6; 1725 1.1 christos a2.in6 = oip6->ip6_dst; 1726 1.1 christos a3 = nat->nat_nsrc6; 1727 1.1 christos a4.in6 = oip6->ip6_src; 1728 1.1 christos oip6->ip6_dst = a3.in6; 1729 1.1 christos oip6->ip6_src = a1.in6; 1730 1.1 christos odst = 0; 1731 1.1 christos } 1732 1.1 christos 1733 1.1 christos sumd = 0; 1734 1.1 christos if (IP6_NEQ(&a3, &a2) || IP6_NEQ(&a1, &a4)) { 1735 1.1 christos if (IP6_GT(&a3, &a2)) { 1736 1.1 christos sumd = ipf_nat6_ip6subtract(&a2, &a3); 1737 1.1 christos sumd--; 1738 1.1 christos } else { 1739 1.1 christos sumd = ipf_nat6_ip6subtract(&a2, &a3); 1740 1.1 christos } 1741 1.1 christos if (IP6_GT(&a1, &a4)) { 1742 1.1 christos sumd += ipf_nat6_ip6subtract(&a4, &a1); 1743 1.1 christos sumd--; 1744 1.1 christos } else { 1745 1.1 christos sumd += ipf_nat6_ip6subtract(&a4, &a1); 1746 1.1 christos } 1747 1.1 christos sumd = ~sumd; 1748 1.1 christos } 1749 1.1 christos 1750 1.1 christos sumd2 = sumd; 1751 1.1 christos sum1 = 0; 1752 1.1 christos sum2 = 0; 1753 1.1 christos 1754 1.1 christos /* 1755 1.1 christos * Fix UDP pseudo header checksum to compensate for the 1756 1.1 christos * IP address change. 1757 1.1 christos */ 1758 1.1 christos if (((flags & IPN_TCPUDP) != 0) && (dlen >= 4)) { 1759 1.1 christos u_32_t sum3, sum4; 1760 1.1 christos /* 1761 1.1 christos * Step 2 : 1762 1.1 christos * For offending TCP/UDP IP packets, translate the ports as 1763 1.1 christos * well, based on the NAT specification. Of course such 1764 1.1 christos * a change may be reflected in the ICMP checksum as well. 1765 1.1 christos * 1766 1.1 christos * Since the port fields are part of the TCP/UDP checksum 1767 1.1 christos * of the offending IP packet, you need to adjust that checksum 1768 1.1 christos * as well... except that the change in the port numbers should 1769 1.1 christos * be offset by the checksum change. However, the TCP/UDP 1770 1.1 christos * checksum will also need to change if there has been an 1771 1.1 christos * IP address change. 1772 1.1 christos */ 1773 1.1 christos if (odst == 1) { 1774 1.1 christos sum1 = ntohs(nat->nat_osport); 1775 1.1 christos sum4 = ntohs(tcp->th_sport); 1776 1.1 christos sum3 = ntohs(nat->nat_odport); 1777 1.1 christos sum2 = ntohs(tcp->th_dport); 1778 1.1 christos 1779 1.1 christos tcp->th_sport = htons(sum1); 1780 1.1 christos tcp->th_dport = htons(sum3); 1781 1.1 christos } else { 1782 1.1 christos sum1 = ntohs(nat->nat_ndport); 1783 1.1 christos sum2 = ntohs(tcp->th_dport); 1784 1.1 christos sum3 = ntohs(nat->nat_nsport); 1785 1.1 christos sum4 = ntohs(tcp->th_sport); 1786 1.1 christos 1787 1.1 christos tcp->th_dport = htons(sum3); 1788 1.1 christos tcp->th_sport = htons(sum1); 1789 1.1 christos } 1790 1.1 christos sumd += sum1 - sum4; 1791 1.1 christos sumd += sum3 - sum2; 1792 1.1 christos 1793 1.1 christos if (sumd != 0 || sumd2 != 0) { 1794 1.1 christos /* 1795 1.1 christos * At this point, sumd is the delta to apply to the 1796 1.1 christos * TCP/UDP header, given the changes in both the IP 1797 1.1 christos * address and the ports and sumd2 is the delta to 1798 1.1 christos * apply to the ICMP header, given the IP address 1799 1.1 christos * change delta that may need to be applied to the 1800 1.1 christos * TCP/UDP checksum instead. 1801 1.1 christos * 1802 1.1 christos * If we will both the IP and TCP/UDP checksums 1803 1.1 christos * then the ICMP checksum changes by the address 1804 1.1 christos * delta applied to the TCP/UDP checksum. If we 1805 1.1 christos * do not change the TCP/UDP checksum them we 1806 1.1 christos * apply the delta in ports to the ICMP checksum. 1807 1.1 christos */ 1808 1.1 christos if (oip6->ip6_nxt == IPPROTO_UDP) { 1809 1.1 christos if ((dlen >= 8) && (*csump != 0)) { 1810 1.1 christos ipf_fix_datacksum(csump, sumd); 1811 1.1 christos } else { 1812 1.1 christos sumd2 = sum4 - sum1; 1813 1.1 christos if (sum1 > sum4) 1814 1.1 christos sumd2--; 1815 1.1 christos sumd2 += sum2 - sum3; 1816 1.1 christos if (sum3 > sum2) 1817 1.1 christos sumd2--; 1818 1.1 christos } 1819 1.1 christos } else if (oip6->ip6_nxt == IPPROTO_TCP) { 1820 1.1 christos if (dlen >= 18) { 1821 1.1 christos ipf_fix_datacksum(csump, sumd); 1822 1.1 christos } else { 1823 1.1 christos sumd2 = sum4 - sum1; 1824 1.1 christos if (sum1 > sum4) 1825 1.1 christos sumd2--; 1826 1.1 christos sumd2 += sum2 - sum3; 1827 1.1 christos if (sum3 > sum2) 1828 1.1 christos sumd2--; 1829 1.1 christos } 1830 1.1 christos } 1831 1.1 christos if (sumd2 != 0) { 1832 1.1 christos sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 1833 1.1 christos sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 1834 1.1 christos sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 1835 1.2 darrenr ipf_fix_incksum(0, &icmp6->icmp6_cksum, 1836 1.2 darrenr sumd2, 0); 1837 1.1 christos } 1838 1.1 christos } 1839 1.1 christos } else if (((flags & IPN_ICMPQUERY) != 0) && (dlen >= 8)) { 1840 1.1 christos struct icmp6_hdr *orgicmp; 1841 1.1 christos 1842 1.1 christos /* 1843 1.1 christos * XXX - what if this is bogus hl and we go off the end ? 1844 1.1 christos * In this case, ipf_nat6_icmperrorlookup() will have 1845 1.1 christos * returned NULL. 1846 1.1 christos */ 1847 1.1 christos orgicmp = (struct icmp6_hdr *)dp; 1848 1.1 christos 1849 1.1 christos if (odst == 1) { 1850 1.1 christos if (orgicmp->icmp6_id != nat->nat_osport) { 1851 1.1 christos 1852 1.1 christos /* 1853 1.1 christos * Fix ICMP checksum (of the offening ICMP 1854 1.1 christos * query packet) to compensate the change 1855 1.1 christos * in the ICMP id of the offending ICMP 1856 1.1 christos * packet. 1857 1.1 christos * 1858 1.1 christos * Since you modify orgicmp->icmp6_id with 1859 1.1 christos * a delta (say x) and you compensate that 1860 1.1 christos * in origicmp->icmp6_cksum with a delta 1861 1.1 christos * minus x, you don't have to adjust the 1862 1.1 christos * overall icmp->icmp6_cksum 1863 1.1 christos */ 1864 1.1 christos sum1 = ntohs(orgicmp->icmp6_id); 1865 1.1 christos sum2 = ntohs(nat->nat_osport); 1866 1.1 christos CALC_SUMD(sum1, sum2, sumd); 1867 1.1 christos orgicmp->icmp6_id = nat->nat_oicmpid; 1868 1.1 christos ipf_fix_datacksum(&orgicmp->icmp6_cksum, sumd); 1869 1.1 christos } 1870 1.1 christos } /* nat6_dir == NAT_INBOUND is impossible for icmp queries */ 1871 1.1 christos } 1872 1.1 christos return nat; 1873 1.1 christos } 1874 1.1 christos 1875 1.1 christos 1876 1.1 christos /* 1877 1.1 christos * MAP-IN MAP-OUT RDR-IN RDR-OUT 1878 1.1 christos * osrc X == src == src X 1879 1.1 christos * odst X == dst == dst X 1880 1.1 christos * nsrc == dst X X == dst 1881 1.1 christos * ndst == src X X == src 1882 1.1 christos * MAP = NAT_OUTBOUND, RDR = NAT_INBOUND 1883 1.1 christos */ 1884 1.1 christos /* 1885 1.1 christos * NB: these lookups don't lock access to the list, it assumed that it has 1886 1.1 christos * already been done! 1887 1.1 christos */ 1888 1.1 christos /* ------------------------------------------------------------------------ */ 1889 1.1 christos /* Function: ipf_nat6_inlookup */ 1890 1.1 christos /* Returns: nat6_t* - NULL == no match, */ 1891 1.1 christos /* else pointer to matching NAT entry */ 1892 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 1893 1.1 christos /* flags(I) - NAT flags for this packet */ 1894 1.1 christos /* p(I) - protocol for this packet */ 1895 1.1 christos /* src(I) - source IP address */ 1896 1.1 christos /* mapdst(I) - destination IP address */ 1897 1.1 christos /* */ 1898 1.1 christos /* Lookup a nat entry based on the mapped destination ip address/port and */ 1899 1.1 christos /* real source address/port. We use this lookup when receiving a packet, */ 1900 1.1 christos /* we're looking for a table entry, based on the destination address. */ 1901 1.1 christos /* */ 1902 1.1 christos /* NOTE: THE PACKET BEING CHECKED (IF FOUND) HAS A MAPPING ALREADY. */ 1903 1.1 christos /* */ 1904 1.1 christos /* NOTE: IT IS ASSUMED THAT IS ONLY HELD WITH A READ LOCK WHEN */ 1905 1.1 christos /* THIS FUNCTION IS CALLED WITH NAT_SEARCH SET IN nflags. */ 1906 1.1 christos /* */ 1907 1.1 christos /* flags -> relevant are IPN_UDP/IPN_TCP/IPN_ICMPQUERY that indicate if */ 1908 1.1 christos /* the packet is of said protocol */ 1909 1.1 christos /* ------------------------------------------------------------------------ */ 1910 1.1 christos nat_t * 1911 1.1 christos ipf_nat6_inlookup(fin, flags, p, src, mapdst) 1912 1.1 christos fr_info_t *fin; 1913 1.1 christos u_int flags, p; 1914 1.1 christos struct in6_addr *src , *mapdst; 1915 1.1 christos { 1916 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 1917 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1918 1.1 christos u_short sport, dport; 1919 1.1 christos grehdr_t *gre; 1920 1.1 christos ipnat_t *ipn; 1921 1.1 christos u_int sflags; 1922 1.1 christos nat_t *nat; 1923 1.1 christos int nflags; 1924 1.1 christos i6addr_t dst; 1925 1.1 christos void *ifp; 1926 1.1 christos u_int hv; 1927 1.1 christos 1928 1.1 christos ifp = fin->fin_ifp; 1929 1.1 christos sport = 0; 1930 1.1 christos dport = 0; 1931 1.1 christos gre = NULL; 1932 1.1 christos dst.in6 = *mapdst; 1933 1.1 christos sflags = flags & NAT_TCPUDPICMP; 1934 1.1 christos 1935 1.1 christos switch (p) 1936 1.1 christos { 1937 1.1 christos case IPPROTO_TCP : 1938 1.1 christos case IPPROTO_UDP : 1939 1.1 christos sport = htons(fin->fin_data[0]); 1940 1.1 christos dport = htons(fin->fin_data[1]); 1941 1.1 christos break; 1942 1.1 christos case IPPROTO_ICMPV6 : 1943 1.1 christos if (flags & IPN_ICMPERR) 1944 1.1 christos sport = fin->fin_data[1]; 1945 1.1 christos else 1946 1.1 christos dport = fin->fin_data[1]; 1947 1.1 christos break; 1948 1.1 christos default : 1949 1.1 christos break; 1950 1.1 christos } 1951 1.1 christos 1952 1.1 christos 1953 1.1 christos if ((flags & SI_WILDP) != 0) 1954 1.1 christos goto find_in_wild_ports; 1955 1.1 christos 1956 1.1 christos hv = NAT_HASH_FN6(&dst, dport, 0xffffffff); 1957 1.1 christos hv = NAT_HASH_FN6(src, hv + sport, softn->ipf_nat_table_sz); 1958 1.1 christos nat = softn->ipf_nat_table[1][hv]; 1959 1.1 christos /* TRACE dst, dport, src, sport, hv, nat */ 1960 1.1 christos 1961 1.1 christos for (; nat; nat = nat->nat_hnext[1]) { 1962 1.1 christos if (nat->nat_ifps[0] != NULL) { 1963 1.1 christos if ((ifp != NULL) && (ifp != nat->nat_ifps[0])) 1964 1.1 christos continue; 1965 1.1 christos } 1966 1.1 christos 1967 1.1 christos if (nat->nat_pr[0] != p) 1968 1.1 christos continue; 1969 1.1 christos 1970 1.1 christos switch (nat->nat_dir) 1971 1.1 christos { 1972 1.1 christos case NAT_INBOUND : 1973 1.1 christos if (nat->nat_v[0] != 6) 1974 1.1 christos continue; 1975 1.1 christos if (IP6_NEQ(&nat->nat_osrc6, src) || 1976 1.1 christos IP6_NEQ(&nat->nat_odst6, &dst)) 1977 1.1 christos continue; 1978 1.1 christos if ((nat->nat_flags & IPN_TCPUDP) != 0) { 1979 1.1 christos if (nat->nat_osport != sport) 1980 1.1 christos continue; 1981 1.1 christos if (nat->nat_odport != dport) 1982 1.1 christos continue; 1983 1.1 christos 1984 1.1 christos } else if (p == IPPROTO_ICMPV6) { 1985 1.1 christos if (nat->nat_osport != dport) { 1986 1.1 christos continue; 1987 1.1 christos } 1988 1.1 christos } 1989 1.1 christos break; 1990 1.1 christos case NAT_OUTBOUND : 1991 1.1 christos if (nat->nat_v[1] != 6) 1992 1.1 christos continue; 1993 1.1 christos if (IP6_NEQ(&nat->nat_ndst6, src) || 1994 1.1 christos IP6_NEQ(&nat->nat_nsrc6, &dst)) 1995 1.1 christos continue; 1996 1.1 christos if ((nat->nat_flags & IPN_TCPUDP) != 0) { 1997 1.1 christos if (nat->nat_ndport != sport) 1998 1.1 christos continue; 1999 1.1 christos if (nat->nat_nsport != dport) 2000 1.1 christos continue; 2001 1.1 christos 2002 1.1 christos } else if (p == IPPROTO_ICMPV6) { 2003 1.1 christos if (nat->nat_osport != dport) { 2004 1.1 christos continue; 2005 1.1 christos } 2006 1.1 christos } 2007 1.1 christos break; 2008 1.1 christos } 2009 1.1 christos 2010 1.1 christos 2011 1.1 christos if ((nat->nat_flags & IPN_TCPUDP) != 0) { 2012 1.1 christos ipn = nat->nat_ptr; 2013 1.1 christos #ifdef IPF_V6_PROXIES 2014 1.1 christos if ((ipn != NULL) && (nat->nat_aps != NULL)) 2015 1.1 christos if (appr_match(fin, nat) != 0) 2016 1.1 christos continue; 2017 1.1 christos #endif 2018 1.1 christos } 2019 1.1 christos if ((nat->nat_ifps[0] == NULL) && (ifp != NULL)) { 2020 1.1 christos nat->nat_ifps[0] = ifp; 2021 1.1 christos nat->nat_mtu[0] = GETIFMTU_6(ifp); 2022 1.1 christos } 2023 1.1 christos return nat; 2024 1.1 christos } 2025 1.1 christos 2026 1.1 christos /* 2027 1.1 christos * So if we didn't find it but there are wildcard members in the hash 2028 1.1 christos * table, go back and look for them. We do this search and update here 2029 1.1 christos * because it is modifying the NAT table and we want to do this only 2030 1.1 christos * for the first packet that matches. The exception, of course, is 2031 1.1 christos * for "dummy" (FI_IGNORE) lookups. 2032 1.1 christos */ 2033 1.1 christos find_in_wild_ports: 2034 1.1 christos if (!(flags & NAT_TCPUDP) || !(flags & NAT_SEARCH)) { 2035 1.1 christos NBUMPSIDE6DX(0, ns_lookup_miss, ns_lookup_miss_1); 2036 1.1 christos return NULL; 2037 1.1 christos } 2038 1.2 darrenr if (softn->ipf_nat_stats.ns_wilds == 0 || (fin->fin_flx & FI_NOWILD)) { 2039 1.1 christos NBUMPSIDE6D(0, ns_lookup_nowild); 2040 1.1 christos return NULL; 2041 1.1 christos } 2042 1.1 christos 2043 1.1 christos RWLOCK_EXIT(&softc->ipf_nat); 2044 1.1 christos 2045 1.1 christos hv = NAT_HASH_FN6(&dst, 0, 0xffffffff); 2046 1.1 christos hv = NAT_HASH_FN6(src, hv, softn->ipf_nat_table_sz); 2047 1.1 christos WRITE_ENTER(&softc->ipf_nat); 2048 1.1 christos 2049 1.1 christos nat = softn->ipf_nat_table[1][hv]; 2050 1.1 christos /* TRACE dst, src, hv, nat */ 2051 1.1 christos for (; nat; nat = nat->nat_hnext[1]) { 2052 1.1 christos if (nat->nat_ifps[0] != NULL) { 2053 1.1 christos if ((ifp != NULL) && (ifp != nat->nat_ifps[0])) 2054 1.1 christos continue; 2055 1.1 christos } 2056 1.1 christos 2057 1.1 christos if (nat->nat_pr[0] != fin->fin_p) 2058 1.1 christos continue; 2059 1.1 christos 2060 1.1 christos switch (nat->nat_dir) 2061 1.1 christos { 2062 1.1 christos case NAT_INBOUND : 2063 1.1 christos if (nat->nat_v[0] != 6) 2064 1.1 christos continue; 2065 1.1 christos if (IP6_NEQ(&nat->nat_osrc6, src) || 2066 1.1 christos IP6_NEQ(&nat->nat_odst6, &dst)) 2067 1.1 christos continue; 2068 1.1 christos break; 2069 1.1 christos case NAT_OUTBOUND : 2070 1.1 christos if (nat->nat_v[1] != 6) 2071 1.1 christos continue; 2072 1.1 christos if (IP6_NEQ(&nat->nat_ndst6, src) || 2073 1.1 christos IP6_NEQ(&nat->nat_nsrc6, &dst)) 2074 1.1 christos continue; 2075 1.1 christos break; 2076 1.1 christos } 2077 1.1 christos 2078 1.1 christos nflags = nat->nat_flags; 2079 1.1 christos if (!(nflags & (NAT_TCPUDP|SI_WILDP))) 2080 1.1 christos continue; 2081 1.1 christos 2082 1.1 christos if (ipf_nat_wildok(nat, (int)sport, (int)dport, nflags, 2083 1.1 christos NAT_INBOUND) == 1) { 2084 1.1 christos if ((fin->fin_flx & FI_IGNORE) != 0) 2085 1.1 christos break; 2086 1.1 christos if ((nflags & SI_CLONE) != 0) { 2087 1.1 christos nat = ipf_nat_clone(fin, nat); 2088 1.1 christos if (nat == NULL) 2089 1.1 christos break; 2090 1.1 christos } else { 2091 1.1 christos MUTEX_ENTER(&softn->ipf_nat_new); 2092 1.1 christos softn->ipf_nat_stats.ns_wilds--; 2093 1.1 christos MUTEX_EXIT(&softn->ipf_nat_new); 2094 1.1 christos } 2095 1.1 christos 2096 1.1 christos if (nat->nat_dir == NAT_INBOUND) { 2097 1.1 christos if (nat->nat_osport == 0) { 2098 1.1 christos nat->nat_osport = sport; 2099 1.1 christos nat->nat_nsport = sport; 2100 1.1 christos } 2101 1.1 christos if (nat->nat_odport == 0) { 2102 1.1 christos nat->nat_odport = dport; 2103 1.1 christos nat->nat_ndport = dport; 2104 1.1 christos } 2105 1.1 christos } else { 2106 1.1 christos if (nat->nat_osport == 0) { 2107 1.1 christos nat->nat_osport = dport; 2108 1.1 christos nat->nat_nsport = dport; 2109 1.1 christos } 2110 1.1 christos if (nat->nat_odport == 0) { 2111 1.1 christos nat->nat_odport = sport; 2112 1.1 christos nat->nat_ndport = sport; 2113 1.1 christos } 2114 1.1 christos } 2115 1.1 christos if ((nat->nat_ifps[0] == NULL) && (ifp != NULL)) { 2116 1.1 christos nat->nat_ifps[0] = ifp; 2117 1.1 christos nat->nat_mtu[0] = GETIFMTU_6(ifp); 2118 1.1 christos } 2119 1.1 christos nat->nat_flags &= ~(SI_W_DPORT|SI_W_SPORT); 2120 1.1 christos ipf_nat6_tabmove(softn, nat); 2121 1.1 christos break; 2122 1.1 christos } 2123 1.1 christos } 2124 1.1 christos 2125 1.1 christos MUTEX_DOWNGRADE(&softc->ipf_nat); 2126 1.1 christos 2127 1.1 christos if (nat == NULL) { 2128 1.1 christos NBUMPSIDE6DX(0, ns_lookup_miss, ns_lookup_miss_2); 2129 1.1 christos } 2130 1.1 christos return nat; 2131 1.1 christos } 2132 1.1 christos 2133 1.1 christos 2134 1.1 christos /* ------------------------------------------------------------------------ */ 2135 1.1 christos /* Function: ipf_nat6_tabmove */ 2136 1.1 christos /* Returns: Nil */ 2137 1.1 christos /* Parameters: nat(I) - pointer to NAT structure */ 2138 1.1 christos /* Write Lock: ipf_nat */ 2139 1.1 christos /* */ 2140 1.1 christos /* This function is only called for TCP/UDP NAT table entries where the */ 2141 1.1 christos /* original was placed in the table without hashing on the ports and we now */ 2142 1.1 christos /* want to include hashing on port numbers. */ 2143 1.1 christos /* ------------------------------------------------------------------------ */ 2144 1.1 christos static void 2145 1.1 christos ipf_nat6_tabmove(softn, nat) 2146 1.1 christos ipf_nat_softc_t *softn; 2147 1.1 christos nat_t *nat; 2148 1.1 christos { 2149 1.1 christos nat_t **natp; 2150 1.1 christos u_int hv0, hv1; 2151 1.1 christos 2152 1.1 christos if (nat->nat_flags & SI_CLONE) 2153 1.1 christos return; 2154 1.1 christos 2155 1.1 christos /* 2156 1.1 christos * Remove the NAT entry from the old location 2157 1.1 christos */ 2158 1.1 christos if (nat->nat_hnext[0]) 2159 1.1 christos nat->nat_hnext[0]->nat_phnext[0] = nat->nat_phnext[0]; 2160 1.1 christos *nat->nat_phnext[0] = nat->nat_hnext[0]; 2161 1.1 christos softn->ipf_nat_stats.ns_side[0].ns_bucketlen[nat->nat_hv[0]]--; 2162 1.1 christos 2163 1.1 christos if (nat->nat_hnext[1]) 2164 1.1 christos nat->nat_hnext[1]->nat_phnext[1] = nat->nat_phnext[1]; 2165 1.1 christos *nat->nat_phnext[1] = nat->nat_hnext[1]; 2166 1.1 christos softn->ipf_nat_stats.ns_side[1].ns_bucketlen[nat->nat_hv[1]]--; 2167 1.1 christos 2168 1.1 christos /* 2169 1.1 christos * Add into the NAT table in the new position 2170 1.1 christos */ 2171 1.1 christos hv0 = NAT_HASH_FN6(&nat->nat_osrc6, nat->nat_osport, 0xffffffff); 2172 1.1 christos hv0 = NAT_HASH_FN6(&nat->nat_odst6, hv0 + nat->nat_odport, 2173 1.1 christos softn->ipf_nat_table_sz); 2174 1.1 christos hv1 = NAT_HASH_FN6(&nat->nat_nsrc6, nat->nat_nsport, 0xffffffff); 2175 1.1 christos hv1 = NAT_HASH_FN6(&nat->nat_ndst6, hv1 + nat->nat_ndport, 2176 1.1 christos softn->ipf_nat_table_sz); 2177 1.1 christos 2178 1.2 darrenr if (nat->nat_dir == NAT_INBOUND || nat->nat_dir == NAT_DIVERTIN) { 2179 1.1 christos u_int swap; 2180 1.1 christos 2181 1.1 christos swap = hv0; 2182 1.1 christos hv0 = hv1; 2183 1.1 christos hv1 = swap; 2184 1.1 christos } 2185 1.1 christos 2186 1.1 christos /* TRACE nat_osrc6, nat_osport, nat_odst6, nat_odport, hv0 */ 2187 1.1 christos /* TRACE nat_nsrc6, nat_nsport, nat_ndst6, nat_ndport, hv1 */ 2188 1.1 christos 2189 1.1 christos nat->nat_hv[0] = hv0; 2190 1.1 christos natp = &softn->ipf_nat_table[0][hv0]; 2191 1.1 christos if (*natp) 2192 1.1 christos (*natp)->nat_phnext[0] = &nat->nat_hnext[0]; 2193 1.1 christos nat->nat_phnext[0] = natp; 2194 1.1 christos nat->nat_hnext[0] = *natp; 2195 1.1 christos *natp = nat; 2196 1.1 christos softn->ipf_nat_stats.ns_side[0].ns_bucketlen[hv0]++; 2197 1.1 christos 2198 1.1 christos nat->nat_hv[1] = hv1; 2199 1.1 christos natp = &softn->ipf_nat_table[1][hv1]; 2200 1.1 christos if (*natp) 2201 1.1 christos (*natp)->nat_phnext[1] = &nat->nat_hnext[1]; 2202 1.1 christos nat->nat_phnext[1] = natp; 2203 1.1 christos nat->nat_hnext[1] = *natp; 2204 1.1 christos *natp = nat; 2205 1.1 christos softn->ipf_nat_stats.ns_side[1].ns_bucketlen[hv1]++; 2206 1.1 christos } 2207 1.1 christos 2208 1.1 christos 2209 1.1 christos /* ------------------------------------------------------------------------ */ 2210 1.1 christos /* Function: ipf_nat6_outlookup */ 2211 1.1 christos /* Returns: nat6_t* - NULL == no match, */ 2212 1.1 christos /* else pointer to matching NAT entry */ 2213 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 2214 1.1 christos /* flags(I) - NAT flags for this packet */ 2215 1.1 christos /* p(I) - protocol for this packet */ 2216 1.1 christos /* src(I) - source IP address */ 2217 1.1 christos /* dst(I) - destination IP address */ 2218 1.1 christos /* rw(I) - 1 == write lock on held, 0 == read lock. */ 2219 1.1 christos /* */ 2220 1.1 christos /* Lookup a nat entry based on the source 'real' ip address/port and */ 2221 1.1 christos /* destination address/port. We use this lookup when sending a packet out, */ 2222 1.1 christos /* we're looking for a table entry, based on the source address. */ 2223 1.1 christos /* */ 2224 1.1 christos /* NOTE: THE PACKET BEING CHECKED (IF FOUND) HAS A MAPPING ALREADY. */ 2225 1.1 christos /* */ 2226 1.1 christos /* NOTE: IT IS ASSUMED THAT IS ONLY HELD WITH A READ LOCK WHEN */ 2227 1.1 christos /* THIS FUNCTION IS CALLED WITH NAT_SEARCH SET IN nflags. */ 2228 1.1 christos /* */ 2229 1.1 christos /* flags -> relevant are IPN_UDP/IPN_TCP/IPN_ICMPQUERY that indicate if */ 2230 1.1 christos /* the packet is of said protocol */ 2231 1.1 christos /* ------------------------------------------------------------------------ */ 2232 1.1 christos nat_t * 2233 1.1 christos ipf_nat6_outlookup(fin, flags, p, src, dst) 2234 1.1 christos fr_info_t *fin; 2235 1.1 christos u_int flags, p; 2236 1.1 christos struct in6_addr *src , *dst; 2237 1.1 christos { 2238 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 2239 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2240 1.1 christos u_short sport, dport; 2241 1.1 christos u_int sflags; 2242 1.1 christos ipnat_t *ipn; 2243 1.1 christos nat_t *nat; 2244 1.1 christos void *ifp; 2245 1.1 christos u_int hv; 2246 1.1 christos 2247 1.1 christos ifp = fin->fin_ifp; 2248 1.1 christos sflags = flags & IPN_TCPUDPICMP; 2249 1.1 christos sport = 0; 2250 1.1 christos dport = 0; 2251 1.1 christos 2252 1.1 christos switch (p) 2253 1.1 christos { 2254 1.1 christos case IPPROTO_TCP : 2255 1.1 christos case IPPROTO_UDP : 2256 1.1 christos sport = htons(fin->fin_data[0]); 2257 1.1 christos dport = htons(fin->fin_data[1]); 2258 1.1 christos break; 2259 1.1 christos case IPPROTO_ICMPV6 : 2260 1.1 christos if (flags & IPN_ICMPERR) 2261 1.1 christos sport = fin->fin_data[1]; 2262 1.1 christos else 2263 1.1 christos dport = fin->fin_data[1]; 2264 1.1 christos break; 2265 1.1 christos default : 2266 1.1 christos break; 2267 1.1 christos } 2268 1.1 christos 2269 1.1 christos if ((flags & SI_WILDP) != 0) 2270 1.1 christos goto find_out_wild_ports; 2271 1.1 christos 2272 1.1 christos hv = NAT_HASH_FN6(src, sport, 0xffffffff); 2273 1.1 christos hv = NAT_HASH_FN6(dst, hv + dport, softn->ipf_nat_table_sz); 2274 1.1 christos nat = softn->ipf_nat_table[0][hv]; 2275 1.1 christos 2276 1.1 christos /* TRACE src, sport, dst, dport, hv, nat */ 2277 1.1 christos 2278 1.1 christos for (; nat; nat = nat->nat_hnext[0]) { 2279 1.1 christos if (nat->nat_ifps[1] != NULL) { 2280 1.1 christos if ((ifp != NULL) && (ifp != nat->nat_ifps[1])) 2281 1.1 christos continue; 2282 1.1 christos } 2283 1.1 christos 2284 1.1 christos if (nat->nat_pr[1] != p) 2285 1.1 christos continue; 2286 1.1 christos 2287 1.1 christos switch (nat->nat_dir) 2288 1.1 christos { 2289 1.1 christos case NAT_INBOUND : 2290 1.1 christos if (nat->nat_v[1] != 6) 2291 1.1 christos continue; 2292 1.1 christos if (IP6_NEQ(&nat->nat_ndst6, src) || 2293 1.1 christos IP6_NEQ(&nat->nat_nsrc6, dst)) 2294 1.1 christos continue; 2295 1.1 christos 2296 1.1 christos if ((nat->nat_flags & IPN_TCPUDP) != 0) { 2297 1.1 christos if (nat->nat_ndport != sport) 2298 1.1 christos continue; 2299 1.1 christos if (nat->nat_nsport != dport) 2300 1.1 christos continue; 2301 1.1 christos 2302 1.1 christos } else if (p == IPPROTO_ICMPV6) { 2303 1.1 christos if (nat->nat_osport != dport) { 2304 1.1 christos continue; 2305 1.1 christos } 2306 1.1 christos } 2307 1.1 christos break; 2308 1.1 christos case NAT_OUTBOUND : 2309 1.1 christos if (nat->nat_v[0] != 6) 2310 1.1 christos continue; 2311 1.1 christos if (IP6_NEQ(&nat->nat_osrc6, src) || 2312 1.1 christos IP6_NEQ(&nat->nat_odst6, dst)) 2313 1.1 christos continue; 2314 1.1 christos 2315 1.1 christos if ((nat->nat_flags & IPN_TCPUDP) != 0) { 2316 1.1 christos if (nat->nat_odport != dport) 2317 1.1 christos continue; 2318 1.1 christos if (nat->nat_osport != sport) 2319 1.1 christos continue; 2320 1.1 christos 2321 1.1 christos } else if (p == IPPROTO_ICMPV6) { 2322 1.1 christos if (nat->nat_osport != dport) { 2323 1.1 christos continue; 2324 1.1 christos } 2325 1.1 christos } 2326 1.1 christos break; 2327 1.1 christos } 2328 1.1 christos 2329 1.1 christos ipn = nat->nat_ptr; 2330 1.1 christos #ifdef IPF_V6_PROXIES 2331 1.1 christos if ((ipn != NULL) && (nat->nat_aps != NULL)) 2332 1.1 christos if (appr_match(fin, nat) != 0) 2333 1.1 christos continue; 2334 1.1 christos #endif 2335 1.1 christos 2336 1.1 christos if ((nat->nat_ifps[1] == NULL) && (ifp != NULL)) { 2337 1.1 christos nat->nat_ifps[1] = ifp; 2338 1.1 christos nat->nat_mtu[1] = GETIFMTU_6(ifp); 2339 1.1 christos } 2340 1.1 christos return nat; 2341 1.1 christos } 2342 1.1 christos 2343 1.1 christos /* 2344 1.1 christos * So if we didn't find it but there are wildcard members in the hash 2345 1.1 christos * table, go back and look for them. We do this search and update here 2346 1.1 christos * because it is modifying the NAT table and we want to do this only 2347 1.1 christos * for the first packet that matches. The exception, of course, is 2348 1.1 christos * for "dummy" (FI_IGNORE) lookups. 2349 1.1 christos */ 2350 1.1 christos find_out_wild_ports: 2351 1.1 christos if (!(flags & NAT_TCPUDP) || !(flags & NAT_SEARCH)) { 2352 1.1 christos NBUMPSIDE6DX(1, ns_lookup_miss, ns_lookup_miss_3); 2353 1.1 christos return NULL; 2354 1.1 christos } 2355 1.2 darrenr if (softn->ipf_nat_stats.ns_wilds == 0 || (fin->fin_flx & FI_NOWILD)) { 2356 1.1 christos NBUMPSIDE6D(1, ns_lookup_nowild); 2357 1.1 christos return NULL; 2358 1.1 christos } 2359 1.1 christos 2360 1.1 christos RWLOCK_EXIT(&softc->ipf_nat); 2361 1.1 christos 2362 1.1 christos hv = NAT_HASH_FN6(src, 0, 0xffffffff); 2363 1.1 christos hv = NAT_HASH_FN6(dst, hv, softn->ipf_nat_table_sz); 2364 1.1 christos 2365 1.1 christos WRITE_ENTER(&softc->ipf_nat); 2366 1.1 christos 2367 1.1 christos nat = softn->ipf_nat_table[0][hv]; 2368 1.1 christos for (; nat; nat = nat->nat_hnext[0]) { 2369 1.1 christos if (nat->nat_ifps[1] != NULL) { 2370 1.1 christos if ((ifp != NULL) && (ifp != nat->nat_ifps[1])) 2371 1.1 christos continue; 2372 1.1 christos } 2373 1.1 christos 2374 1.1 christos if (nat->nat_pr[1] != fin->fin_p) 2375 1.1 christos continue; 2376 1.1 christos 2377 1.1 christos switch (nat->nat_dir) 2378 1.1 christos { 2379 1.1 christos case NAT_INBOUND : 2380 1.1 christos if (nat->nat_v[1] != 6) 2381 1.1 christos continue; 2382 1.1 christos if (IP6_NEQ(&nat->nat_ndst6, src) || 2383 1.1 christos IP6_NEQ(&nat->nat_nsrc6, dst)) 2384 1.1 christos continue; 2385 1.1 christos break; 2386 1.1 christos case NAT_OUTBOUND : 2387 1.1 christos if (nat->nat_v[0] != 6) 2388 1.1 christos continue; 2389 1.1 christos if (IP6_NEQ(&nat->nat_osrc6, src) || 2390 1.1 christos IP6_NEQ(&nat->nat_odst6, dst)) 2391 1.1 christos continue; 2392 1.1 christos break; 2393 1.1 christos } 2394 1.1 christos 2395 1.1 christos if (!(nat->nat_flags & (NAT_TCPUDP|SI_WILDP))) 2396 1.1 christos continue; 2397 1.1 christos 2398 1.1 christos if (ipf_nat_wildok(nat, (int)sport, (int)dport, nat->nat_flags, 2399 1.1 christos NAT_OUTBOUND) == 1) { 2400 1.1 christos if ((fin->fin_flx & FI_IGNORE) != 0) 2401 1.1 christos break; 2402 1.1 christos if ((nat->nat_flags & SI_CLONE) != 0) { 2403 1.1 christos nat = ipf_nat_clone(fin, nat); 2404 1.1 christos if (nat == NULL) 2405 1.1 christos break; 2406 1.1 christos } else { 2407 1.1 christos MUTEX_ENTER(&softn->ipf_nat_new); 2408 1.1 christos softn->ipf_nat_stats.ns_wilds--; 2409 1.1 christos MUTEX_EXIT(&softn->ipf_nat_new); 2410 1.1 christos } 2411 1.1 christos 2412 1.1 christos if (nat->nat_dir == NAT_OUTBOUND) { 2413 1.1 christos if (nat->nat_osport == 0) { 2414 1.1 christos nat->nat_osport = sport; 2415 1.1 christos nat->nat_nsport = sport; 2416 1.1 christos } 2417 1.1 christos if (nat->nat_odport == 0) { 2418 1.1 christos nat->nat_odport = dport; 2419 1.1 christos nat->nat_ndport = dport; 2420 1.1 christos } 2421 1.1 christos } else { 2422 1.1 christos if (nat->nat_osport == 0) { 2423 1.1 christos nat->nat_osport = dport; 2424 1.1 christos nat->nat_nsport = dport; 2425 1.1 christos } 2426 1.1 christos if (nat->nat_odport == 0) { 2427 1.1 christos nat->nat_odport = sport; 2428 1.1 christos nat->nat_ndport = sport; 2429 1.1 christos } 2430 1.1 christos } 2431 1.1 christos if ((nat->nat_ifps[1] == NULL) && (ifp != NULL)) { 2432 1.1 christos nat->nat_ifps[1] = ifp; 2433 1.1 christos nat->nat_mtu[1] = GETIFMTU_6(ifp); 2434 1.1 christos } 2435 1.1 christos nat->nat_flags &= ~(SI_W_DPORT|SI_W_SPORT); 2436 1.1 christos ipf_nat6_tabmove(softn, nat); 2437 1.1 christos break; 2438 1.1 christos } 2439 1.1 christos } 2440 1.1 christos 2441 1.1 christos MUTEX_DOWNGRADE(&softc->ipf_nat); 2442 1.1 christos 2443 1.1 christos if (nat == NULL) { 2444 1.1 christos NBUMPSIDE6DX(1, ns_lookup_miss, ns_lookup_miss_4); 2445 1.1 christos } 2446 1.1 christos return nat; 2447 1.1 christos } 2448 1.1 christos 2449 1.1 christos 2450 1.1 christos /* ------------------------------------------------------------------------ */ 2451 1.1 christos /* Function: ipf_nat6_lookupredir */ 2452 1.1 christos /* Returns: nat6_t* - NULL == no match, */ 2453 1.1 christos /* else pointer to matching NAT entry */ 2454 1.1 christos /* Parameters: np(I) - pointer to description of packet to find NAT table */ 2455 1.1 christos /* entry for. */ 2456 1.1 christos /* */ 2457 1.1 christos /* Lookup the NAT tables to search for a matching redirect */ 2458 1.1 christos /* The contents of natlookup_t should imitate those found in a packet that */ 2459 1.1 christos /* would be translated - ie a packet coming in for RDR or going out for MAP.*/ 2460 1.1 christos /* We can do the lookup in one of two ways, imitating an inbound or */ 2461 1.1 christos /* outbound packet. By default we assume outbound, unless IPN_IN is set. */ 2462 1.1 christos /* For IN, the fields are set as follows: */ 2463 1.1 christos /* nl_real* = source information */ 2464 1.1 christos /* nl_out* = destination information (translated) */ 2465 1.1 christos /* For an out packet, the fields are set like this: */ 2466 1.1 christos /* nl_in* = source information (untranslated) */ 2467 1.1 christos /* nl_out* = destination information (translated) */ 2468 1.1 christos /* ------------------------------------------------------------------------ */ 2469 1.1 christos nat_t * 2470 1.1 christos ipf_nat6_lookupredir(np) 2471 1.1 christos natlookup_t *np; 2472 1.1 christos { 2473 1.1 christos fr_info_t fi; 2474 1.1 christos nat_t *nat; 2475 1.1 christos 2476 1.1 christos bzero((char *)&fi, sizeof(fi)); 2477 1.1 christos if (np->nl_flags & IPN_IN) { 2478 1.1 christos fi.fin_data[0] = ntohs(np->nl_realport); 2479 1.1 christos fi.fin_data[1] = ntohs(np->nl_outport); 2480 1.1 christos } else { 2481 1.1 christos fi.fin_data[0] = ntohs(np->nl_inport); 2482 1.1 christos fi.fin_data[1] = ntohs(np->nl_outport); 2483 1.1 christos } 2484 1.1 christos if (np->nl_flags & IPN_TCP) 2485 1.1 christos fi.fin_p = IPPROTO_TCP; 2486 1.1 christos else if (np->nl_flags & IPN_UDP) 2487 1.1 christos fi.fin_p = IPPROTO_UDP; 2488 1.1 christos else if (np->nl_flags & (IPN_ICMPERR|IPN_ICMPQUERY)) 2489 1.1 christos fi.fin_p = IPPROTO_ICMPV6; 2490 1.1 christos 2491 1.1 christos /* 2492 1.1 christos * We can do two sorts of lookups: 2493 1.1 christos * - IPN_IN: we have the `real' and `out' address, look for `in'. 2494 1.1 christos * - default: we have the `in' and `out' address, look for `real'. 2495 1.1 christos */ 2496 1.1 christos if (np->nl_flags & IPN_IN) { 2497 1.1 christos if ((nat = ipf_nat6_inlookup(&fi, np->nl_flags, fi.fin_p, 2498 1.1 christos &np->nl_realip6, 2499 1.1 christos &np->nl_outip6))) { 2500 1.1 christos np->nl_inip6 = nat->nat_odst6.in6; 2501 1.1 christos np->nl_inport = nat->nat_odport; 2502 1.1 christos } 2503 1.1 christos } else { 2504 1.1 christos /* 2505 1.1 christos * If nl_inip is non null, this is a lookup based on the real 2506 1.1 christos * ip address. Else, we use the fake. 2507 1.1 christos */ 2508 1.1 christos if ((nat = ipf_nat6_outlookup(&fi, np->nl_flags, fi.fin_p, 2509 1.1 christos &np->nl_inip6, &np->nl_outip6))) { 2510 1.1 christos 2511 1.1 christos if ((np->nl_flags & IPN_FINDFORWARD) != 0) { 2512 1.1 christos fr_info_t fin; 2513 1.1 christos bzero((char *)&fin, sizeof(fin)); 2514 1.1 christos fin.fin_p = nat->nat_pr[0]; 2515 1.1 christos fin.fin_data[0] = ntohs(nat->nat_ndport); 2516 1.1 christos fin.fin_data[1] = ntohs(nat->nat_nsport); 2517 1.1 christos if (ipf_nat6_inlookup(&fin, np->nl_flags, 2518 1.1 christos fin.fin_p, 2519 1.1 christos &nat->nat_ndst6.in6, 2520 1.1 christos &nat->nat_nsrc6.in6) != 2521 1.1 christos NULL) { 2522 1.1 christos np->nl_flags &= ~IPN_FINDFORWARD; 2523 1.1 christos } 2524 1.1 christos } 2525 1.1 christos 2526 1.1 christos np->nl_realip6 = nat->nat_ndst6.in6; 2527 1.1 christos np->nl_realport = nat->nat_ndport; 2528 1.1 christos } 2529 1.1 christos } 2530 1.1 christos 2531 1.1 christos return nat; 2532 1.1 christos } 2533 1.1 christos 2534 1.1 christos 2535 1.1 christos /* ------------------------------------------------------------------------ */ 2536 1.1 christos /* Function: ipf_nat6_match */ 2537 1.1 christos /* Returns: int - 0 == no match, 1 == match */ 2538 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 2539 1.1 christos /* np(I) - pointer to NAT rule */ 2540 1.1 christos /* */ 2541 1.1 christos /* Pull the matching of a packet against a NAT rule out of that complex */ 2542 1.1 christos /* loop inside ipf_nat6_checkin() and lay it out properly in its own */ 2543 1.1 christos /* function. */ 2544 1.1 christos /* ------------------------------------------------------------------------ */ 2545 1.1 christos static int 2546 1.1 christos ipf_nat6_match(fin, np) 2547 1.1 christos fr_info_t *fin; 2548 1.1 christos ipnat_t *np; 2549 1.1 christos { 2550 1.1 christos frtuc_t *ft; 2551 1.1 christos int match; 2552 1.1 christos 2553 1.1 christos match = 0; 2554 1.1 christos switch (np->in_osrcatype) 2555 1.1 christos { 2556 1.1 christos case FRI_NORMAL : 2557 1.1 christos match = IP6_MASKNEQ(&fin->fin_src6, &np->in_osrcmsk6, 2558 1.1 christos &np->in_osrcip6); 2559 1.1 christos break; 2560 1.1 christos case FRI_LOOKUP : 2561 1.1 christos match = (*np->in_osrcfunc)(fin->fin_main_soft, np->in_osrcptr, 2562 1.1 christos 6, &fin->fin_src6, fin->fin_plen); 2563 1.1 christos break; 2564 1.1 christos } 2565 1.1 christos match ^= ((np->in_flags & IPN_NOTSRC) != 0); 2566 1.1 christos if (match) 2567 1.1 christos return 0; 2568 1.1 christos 2569 1.1 christos match = 0; 2570 1.1 christos switch (np->in_odstatype) 2571 1.1 christos { 2572 1.1 christos case FRI_NORMAL : 2573 1.1 christos match = IP6_MASKNEQ(&fin->fin_dst6, &np->in_odstmsk6, 2574 1.1 christos &np->in_odstip6); 2575 1.1 christos break; 2576 1.1 christos case FRI_LOOKUP : 2577 1.1 christos match = (*np->in_odstfunc)(fin->fin_main_soft, np->in_odstptr, 2578 1.1 christos 6, &fin->fin_dst6, fin->fin_plen); 2579 1.1 christos break; 2580 1.1 christos } 2581 1.1 christos 2582 1.1 christos match ^= ((np->in_flags & IPN_NOTDST) != 0); 2583 1.1 christos if (match) 2584 1.1 christos return 0; 2585 1.1 christos 2586 1.1 christos ft = &np->in_tuc; 2587 1.1 christos if (!(fin->fin_flx & FI_TCPUDP) || 2588 1.1 christos (fin->fin_flx & (FI_SHORT|FI_FRAGBODY))) { 2589 1.1 christos if (ft->ftu_scmp || ft->ftu_dcmp) 2590 1.1 christos return 0; 2591 1.1 christos return 1; 2592 1.1 christos } 2593 1.1 christos 2594 1.1 christos return ipf_tcpudpchk(&fin->fin_fi, ft); 2595 1.1 christos } 2596 1.1 christos 2597 1.1 christos 2598 1.1 christos /* ------------------------------------------------------------------------ */ 2599 1.1 christos /* Function: ipf_nat6_checkout */ 2600 1.1 christos /* Returns: int - -1 == packet failed NAT checks so block it, */ 2601 1.1 christos /* 0 == no packet translation occurred, */ 2602 1.1 christos /* 1 == packet was successfully translated. */ 2603 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 2604 1.1 christos /* passp(I) - pointer to filtering result flags */ 2605 1.1 christos /* */ 2606 1.1 christos /* Check to see if an outcoming packet should be changed. ICMP packets are */ 2607 1.1 christos /* first checked to see if they match an existing entry (if an error), */ 2608 1.1 christos /* otherwise a search of the current NAT table is made. If neither results */ 2609 1.1 christos /* in a match then a search for a matching NAT rule is made. Create a new */ 2610 1.1 christos /* NAT entry if a we matched a NAT rule. Lastly, actually change the */ 2611 1.1 christos /* packet header(s) as required. */ 2612 1.1 christos /* ------------------------------------------------------------------------ */ 2613 1.1 christos int 2614 1.1 christos ipf_nat6_checkout(fin, passp) 2615 1.1 christos fr_info_t *fin; 2616 1.1 christos u_32_t *passp; 2617 1.1 christos { 2618 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 2619 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2620 1.1 christos struct icmp6_hdr *icmp6 = NULL; 2621 1.1 christos struct ifnet *ifp, *sifp; 2622 1.1 christos tcphdr_t *tcp = NULL; 2623 1.1 christos int rval, natfailed; 2624 1.1 christos ipnat_t *np = NULL; 2625 1.1 christos u_int nflags = 0; 2626 1.1 christos i6addr_t ipa, iph; 2627 1.1 christos int natadd = 1; 2628 1.1 christos frentry_t *fr; 2629 1.1 christos nat_t *nat; 2630 1.1 christos 2631 1.1 christos if (softn->ipf_nat_stats.ns_rules == 0 || softn->ipf_nat_lock != 0) 2632 1.1 christos return 0; 2633 1.1 christos 2634 1.2 darrenr icmp6 = NULL; 2635 1.1 christos natfailed = 0; 2636 1.1 christos fr = fin->fin_fr; 2637 1.1 christos sifp = fin->fin_ifp; 2638 1.1 christos if (fr != NULL) { 2639 1.1 christos ifp = fr->fr_tifs[fin->fin_rev].fd_ptr; 2640 1.1 christos if ((ifp != NULL) && (ifp != (void *)-1)) 2641 1.1 christos fin->fin_ifp = ifp; 2642 1.1 christos } 2643 1.1 christos ifp = fin->fin_ifp; 2644 1.1 christos 2645 1.1 christos if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 2646 1.1 christos switch (fin->fin_p) 2647 1.1 christos { 2648 1.1 christos case IPPROTO_TCP : 2649 1.1 christos nflags = IPN_TCP; 2650 1.1 christos break; 2651 1.1 christos case IPPROTO_UDP : 2652 1.1 christos nflags = IPN_UDP; 2653 1.1 christos break; 2654 1.1 christos case IPPROTO_ICMPV6 : 2655 1.1 christos icmp6 = fin->fin_dp; 2656 1.1 christos 2657 1.1 christos /* 2658 1.2 darrenr * Apart from ECHO request and reply, all other 2659 1.2 darrenr * informational messages should not be translated 2660 1.2 darrenr * so as to keep IPv6 working. 2661 1.2 darrenr */ 2662 1.2 darrenr if (icmp6->icmp6_type > ICMP6_ECHO_REPLY) 2663 1.2 darrenr return 0; 2664 1.2 darrenr 2665 1.2 darrenr /* 2666 1.1 christos * This is an incoming packet, so the destination is 2667 1.1 christos * the icmp6_id and the source port equals 0 2668 1.1 christos */ 2669 1.1 christos if ((fin->fin_flx & FI_ICMPQUERY) != 0) 2670 1.1 christos nflags = IPN_ICMPQUERY; 2671 1.1 christos break; 2672 1.1 christos default : 2673 1.1 christos break; 2674 1.1 christos } 2675 1.1 christos 2676 1.1 christos if ((nflags & IPN_TCPUDP)) 2677 1.1 christos tcp = fin->fin_dp; 2678 1.1 christos } 2679 1.1 christos 2680 1.1 christos ipa = fin->fin_src6; 2681 1.1 christos 2682 1.1 christos READ_ENTER(&softc->ipf_nat); 2683 1.1 christos 2684 1.1 christos if ((fin->fin_p == IPPROTO_ICMPV6) && !(nflags & IPN_ICMPQUERY) && 2685 1.1 christos (nat = ipf_nat6_icmperror(fin, &nflags, NAT_OUTBOUND))) 2686 1.1 christos /*EMPTY*/; 2687 1.1 christos else if ((fin->fin_flx & FI_FRAG) && (nat = ipf_frag_natknown(fin))) 2688 1.1 christos natadd = 0; 2689 1.1 christos else if ((nat = ipf_nat6_outlookup(fin, nflags|NAT_SEARCH, 2690 1.1 christos (u_int)fin->fin_p, 2691 1.1 christos &fin->fin_src6.in6, 2692 1.1 christos &fin->fin_dst6.in6))) { 2693 1.1 christos nflags = nat->nat_flags; 2694 1.1 christos } else if (fin->fin_off == 0) { 2695 1.1 christos u_32_t hv, nmsk = 0; 2696 1.1 christos i6addr_t *msk; 2697 1.1 christos 2698 1.1 christos /* 2699 1.1 christos * If there is no current entry in the nat table for this IP#, 2700 1.1 christos * create one for it (if there is a matching rule). 2701 1.1 christos */ 2702 1.1 christos maskloop: 2703 1.1 christos msk = &softn->ipf_nat6_map_active_masks[nmsk]; 2704 1.1 christos IP6_AND(&ipa, msk, &iph); 2705 1.1 christos hv = NAT_HASH_FN6(&iph, 0, softn->ipf_nat_maprules_sz); 2706 1.1 christos for (np = softn->ipf_nat_map_rules[hv]; np; np = np->in_mnext) { 2707 1.1 christos if ((np->in_ifps[1] && (np->in_ifps[1] != ifp))) 2708 1.1 christos continue; 2709 1.1 christos if (np->in_v[0] != 6) 2710 1.1 christos continue; 2711 1.1 christos if (np->in_pr[1] && (np->in_pr[1] != fin->fin_p)) 2712 1.1 christos continue; 2713 1.1 christos if ((np->in_flags & IPN_RF) && 2714 1.1 christos !(np->in_flags & nflags)) 2715 1.1 christos continue; 2716 1.1 christos if (np->in_flags & IPN_FILTER) { 2717 1.1 christos switch (ipf_nat6_match(fin, np)) 2718 1.1 christos { 2719 1.1 christos case 0 : 2720 1.1 christos continue; 2721 1.1 christos case -1 : 2722 1.1 christos rval = -1; 2723 1.1 christos goto outmatchfail; 2724 1.1 christos case 1 : 2725 1.1 christos default : 2726 1.1 christos break; 2727 1.1 christos } 2728 1.1 christos } else if (!IP6_MASKEQ(&ipa, &np->in_osrcmsk, 2729 1.1 christos &np->in_osrcip6)) 2730 1.1 christos continue; 2731 1.1 christos 2732 1.1 christos if ((fr != NULL) && 2733 1.1 christos !ipf_matchtag(&np->in_tag, &fr->fr_nattag)) 2734 1.1 christos continue; 2735 1.1 christos 2736 1.1 christos #ifdef IPF_V6_PROXIES 2737 1.1 christos if (np->in_plabel != -1) { 2738 1.1 christos if (((np->in_flags & IPN_FILTER) == 0) && 2739 1.1 christos (np->in_odport != fin->fin_data[1])) 2740 1.1 christos continue; 2741 1.1 christos if (appr_ok(fin, tcp, np) == 0) 2742 1.1 christos continue; 2743 1.1 christos } 2744 1.1 christos #endif 2745 1.1 christos 2746 1.1 christos if (np->in_flags & IPN_NO) { 2747 1.1 christos np->in_hits++; 2748 1.1 christos break; 2749 1.1 christos } 2750 1.1 christos 2751 1.1 christos MUTEX_ENTER(&softn->ipf_nat_new); 2752 1.1 christos nat = ipf_nat6_add(fin, np, NULL, nflags, NAT_OUTBOUND); 2753 1.1 christos MUTEX_EXIT(&softn->ipf_nat_new); 2754 1.1 christos if (nat != NULL) { 2755 1.1 christos np->in_hits++; 2756 1.1 christos break; 2757 1.1 christos } 2758 1.1 christos natfailed = -1; 2759 1.1 christos } 2760 1.1 christos if ((np == NULL) && (nmsk < softn->ipf_nat6_map_max)) { 2761 1.1 christos nmsk++; 2762 1.1 christos goto maskloop; 2763 1.1 christos } 2764 1.1 christos } 2765 1.1 christos 2766 1.1 christos if (nat != NULL) { 2767 1.1 christos rval = ipf_nat6_out(fin, nat, natadd, nflags); 2768 1.1 christos if (rval == 1) { 2769 1.1 christos MUTEX_ENTER(&nat->nat_lock); 2770 1.1 christos ipf_nat_update(fin, nat); 2771 1.1 christos nat->nat_bytes[1] += fin->fin_plen; 2772 1.1 christos nat->nat_pkts[1]++; 2773 1.1 christos MUTEX_EXIT(&nat->nat_lock); 2774 1.1 christos } 2775 1.1 christos } else 2776 1.1 christos rval = natfailed; 2777 1.1 christos outmatchfail: 2778 1.1 christos RWLOCK_EXIT(&softc->ipf_nat); 2779 1.1 christos 2780 1.1 christos switch (rval) 2781 1.1 christos { 2782 1.1 christos case -1 : 2783 1.1 christos if (passp != NULL) { 2784 1.1 christos NBUMPSIDE6D(1, ns_drop); 2785 1.1 christos *passp = FR_BLOCK; 2786 1.2 darrenr fin->fin_reason = FRB_NATV6; 2787 1.1 christos } 2788 1.1 christos fin->fin_flx |= FI_BADNAT; 2789 1.1 christos NBUMPSIDE6D(1, ns_badnat); 2790 1.1 christos break; 2791 1.1 christos case 0 : 2792 1.1 christos NBUMPSIDE6D(1, ns_ignored); 2793 1.1 christos break; 2794 1.1 christos case 1 : 2795 1.1 christos NBUMPSIDE6D(1, ns_translated); 2796 1.1 christos break; 2797 1.1 christos } 2798 1.1 christos fin->fin_ifp = sifp; 2799 1.1 christos return rval; 2800 1.1 christos } 2801 1.1 christos 2802 1.1 christos /* ------------------------------------------------------------------------ */ 2803 1.1 christos /* Function: ipf_nat6_out */ 2804 1.1 christos /* Returns: int - -1 == packet failed NAT checks so block it, */ 2805 1.1 christos /* 1 == packet was successfully translated. */ 2806 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 2807 1.1 christos /* nat(I) - pointer to NAT structure */ 2808 1.1 christos /* natadd(I) - flag indicating if it is safe to add frag cache */ 2809 1.1 christos /* nflags(I) - NAT flags set for this packet */ 2810 1.1 christos /* */ 2811 1.1 christos /* Translate a packet coming "out" on an interface. */ 2812 1.1 christos /* ------------------------------------------------------------------------ */ 2813 1.1 christos static int 2814 1.1 christos ipf_nat6_out(fin, nat, natadd, nflags) 2815 1.1 christos fr_info_t *fin; 2816 1.1 christos nat_t *nat; 2817 1.1 christos int natadd; 2818 1.1 christos u_32_t nflags; 2819 1.1 christos { 2820 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 2821 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2822 1.1 christos struct icmp6_hdr *icmp6; 2823 1.1 christos tcphdr_t *tcp; 2824 1.1 christos ipnat_t *np; 2825 1.1 christos int skip; 2826 1.1 christos int i; 2827 1.1 christos 2828 1.1 christos tcp = NULL; 2829 1.1 christos icmp6 = NULL; 2830 1.1 christos np = nat->nat_ptr; 2831 1.1 christos 2832 1.1 christos if ((natadd != 0) && (fin->fin_flx & FI_FRAG) && (np != NULL)) 2833 1.1 christos (void) ipf_frag_natnew(softc, fin, 0, nat); 2834 1.1 christos 2835 1.1 christos /* 2836 1.1 christos * Address assignment is after the checksum modification because 2837 1.1 christos * we are using the address in the packet for determining the 2838 1.1 christos * correct checksum offset (the ICMP error could be coming from 2839 1.1 christos * anyone...) 2840 1.1 christos */ 2841 1.1 christos switch (nat->nat_dir) 2842 1.1 christos { 2843 1.1 christos case NAT_OUTBOUND : 2844 1.1 christos fin->fin_ip6->ip6_src = nat->nat_nsrc6.in6; 2845 1.1 christos fin->fin_src6 = nat->nat_nsrc6; 2846 1.1 christos fin->fin_ip6->ip6_dst = nat->nat_ndst6.in6; 2847 1.1 christos fin->fin_dst6 = nat->nat_ndst6; 2848 1.1 christos break; 2849 1.1 christos 2850 1.1 christos case NAT_INBOUND : 2851 1.1 christos fin->fin_ip6->ip6_src = nat->nat_odst6.in6; 2852 1.1 christos fin->fin_src6 = nat->nat_ndst6; 2853 1.1 christos fin->fin_ip6->ip6_dst = nat->nat_osrc6.in6; 2854 1.1 christos fin->fin_dst6 = nat->nat_nsrc6; 2855 1.1 christos break; 2856 1.1 christos 2857 1.1 christos case NAT_DIVERTIN : 2858 1.1 christos { 2859 1.1 christos mb_t *m; 2860 1.1 christos 2861 1.1 christos skip = ipf_nat6_decap(fin, nat); 2862 1.1 christos if (skip <= 0) { 2863 1.1 christos NBUMPSIDE6D(1, ns_decap_fail); 2864 1.1 christos return -1; 2865 1.1 christos } 2866 1.1 christos 2867 1.1 christos m = fin->fin_m; 2868 1.1 christos 2869 1.1 christos #if defined(MENTAT) && defined(_KERNEL) 2870 1.1 christos m->b_rptr += skip; 2871 1.1 christos #else 2872 1.1 christos m->m_data += skip; 2873 1.1 christos m->m_len -= skip; 2874 1.1 christos 2875 1.1 christos # ifdef M_PKTHDR 2876 1.1 christos if (m->m_flags & M_PKTHDR) 2877 1.1 christos m->m_pkthdr.len -= skip; 2878 1.1 christos # endif 2879 1.1 christos #endif 2880 1.1 christos 2881 1.1 christos MUTEX_ENTER(&nat->nat_lock); 2882 1.1 christos ipf_nat_update(fin, nat); 2883 1.1 christos MUTEX_EXIT(&nat->nat_lock); 2884 1.1 christos fin->fin_flx |= FI_NATED; 2885 1.1 christos if (np != NULL && np->in_tag.ipt_num[0] != 0) 2886 1.1 christos fin->fin_nattag = &np->in_tag; 2887 1.1 christos return 1; 2888 1.1 christos /* NOTREACHED */ 2889 1.1 christos } 2890 1.1 christos 2891 1.1 christos case NAT_DIVERTOUT : 2892 1.1 christos { 2893 1.1 christos udphdr_t *uh; 2894 1.1 christos ip6_t *ip6; 2895 1.1 christos mb_t *m; 2896 1.1 christos 2897 1.1 christos m = M_DUP(np->in_divmp); 2898 1.1 christos if (m == NULL) { 2899 1.1 christos NBUMPSIDE6D(1, ns_divert_dup); 2900 1.1 christos return -1; 2901 1.1 christos } 2902 1.1 christos 2903 1.1 christos ip6 = MTOD(m, ip6_t *); 2904 1.1 christos 2905 1.1 christos ip6->ip6_plen = htons(fin->fin_plen + 8); 2906 1.1 christos 2907 1.1 christos uh = (udphdr_t *)(ip6 + 1); 2908 1.1 christos uh->uh_ulen = htons(fin->fin_plen); 2909 1.1 christos 2910 1.1 christos PREP_MB_T(fin, m); 2911 1.1 christos 2912 1.1 christos fin->fin_ip6 = ip6; 2913 1.1 christos fin->fin_plen += sizeof(ip6_t) + 8; /* UDP + new IPv4 hdr */ 2914 1.1 christos fin->fin_dlen += sizeof(ip6_t) + 8; /* UDP + old IPv4 hdr */ 2915 1.1 christos 2916 1.1 christos nflags &= ~IPN_TCPUDPICMP; 2917 1.1 christos 2918 1.1 christos break; 2919 1.1 christos } 2920 1.1 christos 2921 1.1 christos default : 2922 1.1 christos break; 2923 1.1 christos } 2924 1.1 christos 2925 1.1 christos if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 2926 1.2 darrenr u_short *csump; 2927 1.2 darrenr 2928 1.1 christos if ((nat->nat_nsport != 0) && (nflags & IPN_TCPUDP)) { 2929 1.1 christos tcp = fin->fin_dp; 2930 1.1 christos 2931 1.1 christos switch (nat->nat_dir) 2932 1.1 christos { 2933 1.1 christos case NAT_OUTBOUND : 2934 1.1 christos tcp->th_sport = nat->nat_nsport; 2935 1.1 christos fin->fin_data[0] = ntohs(nat->nat_nsport); 2936 1.1 christos tcp->th_dport = nat->nat_ndport; 2937 1.2 darrenr fin->fin_data[1] = ntohs(nat->nat_ndport); 2938 1.1 christos break; 2939 1.1 christos 2940 1.1 christos case NAT_INBOUND : 2941 1.1 christos tcp->th_sport = nat->nat_odport; 2942 1.1 christos fin->fin_data[0] = ntohs(nat->nat_odport); 2943 1.1 christos tcp->th_dport = nat->nat_osport; 2944 1.2 darrenr fin->fin_data[1] = ntohs(nat->nat_osport); 2945 1.1 christos break; 2946 1.1 christos } 2947 1.1 christos } 2948 1.1 christos 2949 1.1 christos if ((nat->nat_nsport != 0) && (nflags & IPN_ICMPQUERY)) { 2950 1.1 christos icmp6 = fin->fin_dp; 2951 1.1 christos icmp6->icmp6_id = nat->nat_nicmpid; 2952 1.1 christos } 2953 1.1 christos 2954 1.1 christos csump = ipf_nat_proto(fin, nat, nflags); 2955 1.2 darrenr 2956 1.2 darrenr /* 2957 1.2 darrenr * The above comments do not hold for layer 4 (or higher) 2958 1.2 darrenr * checksums... 2959 1.2 darrenr */ 2960 1.2 darrenr if (csump != NULL) { 2961 1.2 darrenr if (nat->nat_dir == NAT_OUTBOUND) 2962 1.2 darrenr ipf_fix_outcksum(fin->fin_cksum, csump, 2963 1.2 darrenr nat->nat_sumd[0], 2964 1.2 darrenr nat->nat_sumd[1] + 2965 1.2 darrenr fin->fin_dlen); 2966 1.2 darrenr else 2967 1.2 darrenr ipf_fix_incksum(fin->fin_cksum, csump, 2968 1.2 darrenr nat->nat_sumd[0], 2969 1.2 darrenr nat->nat_sumd[1] + 2970 1.2 darrenr fin->fin_dlen); 2971 1.2 darrenr } 2972 1.1 christos } 2973 1.1 christos 2974 1.1 christos ipf_sync_update(softc, SMC_NAT, fin, nat->nat_sync); 2975 1.1 christos /* ------------------------------------------------------------- */ 2976 1.2 darrenr /* A few quick notes: */ 2977 1.2 darrenr /* Following are test conditions prior to calling the */ 2978 1.2 darrenr /* ipf_proxy_check routine. */ 2979 1.2 darrenr /* */ 2980 1.2 darrenr /* A NULL tcp indicates a non TCP/UDP packet. When dealing */ 2981 1.2 darrenr /* with a redirect rule, we attempt to match the packet's */ 2982 1.2 darrenr /* source port against in_dport, otherwise we'd compare the */ 2983 1.2 darrenr /* packet's destination. */ 2984 1.1 christos /* ------------------------------------------------------------- */ 2985 1.1 christos if ((np != NULL) && (np->in_apr != NULL)) { 2986 1.2 darrenr i = ipf_proxy_check(fin, nat); 2987 1.2 darrenr if (i == 0) { 2988 1.1 christos i = 1; 2989 1.2 darrenr } else if (i == -1) { 2990 1.2 darrenr NBUMPSIDE6D(1, ns_ipf_proxy_fail); 2991 1.1 christos } 2992 1.1 christos } else { 2993 1.1 christos i = 1; 2994 1.1 christos } 2995 1.1 christos fin->fin_flx |= FI_NATED; 2996 1.1 christos return i; 2997 1.1 christos } 2998 1.1 christos 2999 1.1 christos 3000 1.1 christos /* ------------------------------------------------------------------------ */ 3001 1.1 christos /* Function: ipf_nat6_checkin */ 3002 1.1 christos /* Returns: int - -1 == packet failed NAT checks so block it, */ 3003 1.1 christos /* 0 == no packet translation occurred, */ 3004 1.1 christos /* 1 == packet was successfully translated. */ 3005 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3006 1.1 christos /* passp(I) - pointer to filtering result flags */ 3007 1.1 christos /* */ 3008 1.1 christos /* Check to see if an incoming packet should be changed. ICMP packets are */ 3009 1.1 christos /* first checked to see if they match an existing entry (if an error), */ 3010 1.1 christos /* otherwise a search of the current NAT table is made. If neither results */ 3011 1.1 christos /* in a match then a search for a matching NAT rule is made. Create a new */ 3012 1.1 christos /* NAT entry if a we matched a NAT rule. Lastly, actually change the */ 3013 1.1 christos /* packet header(s) as required. */ 3014 1.1 christos /* ------------------------------------------------------------------------ */ 3015 1.1 christos int 3016 1.1 christos ipf_nat6_checkin(fin, passp) 3017 1.1 christos fr_info_t *fin; 3018 1.1 christos u_32_t *passp; 3019 1.1 christos { 3020 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 3021 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3022 1.1 christos struct icmp6_hdr *icmp6; 3023 1.1 christos u_int nflags, natadd; 3024 1.1 christos int rval, natfailed; 3025 1.1 christos struct ifnet *ifp; 3026 1.1 christos i6addr_t ipa, iph; 3027 1.1 christos tcphdr_t *tcp; 3028 1.1 christos u_short dport; 3029 1.1 christos ipnat_t *np; 3030 1.1 christos nat_t *nat; 3031 1.1 christos 3032 1.1 christos if (softn->ipf_nat_stats.ns_rules == 0 || softn->ipf_nat_lock != 0) 3033 1.1 christos return 0; 3034 1.1 christos 3035 1.1 christos tcp = NULL; 3036 1.1 christos icmp6 = NULL; 3037 1.1 christos dport = 0; 3038 1.1 christos natadd = 1; 3039 1.1 christos nflags = 0; 3040 1.1 christos natfailed = 0; 3041 1.1 christos ifp = fin->fin_ifp; 3042 1.1 christos 3043 1.1 christos if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 3044 1.1 christos switch (fin->fin_p) 3045 1.1 christos { 3046 1.1 christos case IPPROTO_TCP : 3047 1.1 christos nflags = IPN_TCP; 3048 1.1 christos break; 3049 1.1 christos case IPPROTO_UDP : 3050 1.1 christos nflags = IPN_UDP; 3051 1.1 christos break; 3052 1.1 christos case IPPROTO_ICMPV6 : 3053 1.1 christos icmp6 = fin->fin_dp; 3054 1.1 christos 3055 1.1 christos /* 3056 1.2 darrenr * Apart from ECHO request and reply, all other 3057 1.2 darrenr * informational messages should not be translated 3058 1.2 darrenr * so as to keep IPv6 working. 3059 1.2 darrenr */ 3060 1.2 darrenr if (icmp6->icmp6_type > ICMP6_ECHO_REPLY) 3061 1.2 darrenr return 0; 3062 1.2 darrenr 3063 1.2 darrenr /* 3064 1.1 christos * This is an incoming packet, so the destination is 3065 1.1 christos * the icmp6_id and the source port equals 0 3066 1.1 christos */ 3067 1.1 christos if ((fin->fin_flx & FI_ICMPQUERY) != 0) { 3068 1.1 christos nflags = IPN_ICMPQUERY; 3069 1.1 christos dport = icmp6->icmp6_id; 3070 1.1 christos } break; 3071 1.1 christos default : 3072 1.1 christos break; 3073 1.1 christos } 3074 1.1 christos 3075 1.1 christos if ((nflags & IPN_TCPUDP)) { 3076 1.1 christos tcp = fin->fin_dp; 3077 1.1 christos dport = fin->fin_data[1]; 3078 1.1 christos } 3079 1.1 christos } 3080 1.1 christos 3081 1.1 christos ipa = fin->fin_dst6; 3082 1.1 christos 3083 1.1 christos READ_ENTER(&softc->ipf_nat); 3084 1.1 christos 3085 1.1 christos if ((fin->fin_p == IPPROTO_ICMPV6) && !(nflags & IPN_ICMPQUERY) && 3086 1.1 christos (nat = ipf_nat6_icmperror(fin, &nflags, NAT_INBOUND))) 3087 1.1 christos /*EMPTY*/; 3088 1.1 christos else if ((fin->fin_flx & FI_FRAG) && (nat = ipf_frag_natknown(fin))) 3089 1.1 christos natadd = 0; 3090 1.1 christos else if ((nat = ipf_nat6_inlookup(fin, nflags|NAT_SEARCH, 3091 1.1 christos (u_int)fin->fin_p, 3092 1.1 christos &fin->fin_src6.in6, &ipa.in6))) { 3093 1.1 christos nflags = nat->nat_flags; 3094 1.1 christos } else if (fin->fin_off == 0) { 3095 1.1 christos u_32_t hv, rmsk = 0; 3096 1.1 christos i6addr_t *msk; 3097 1.1 christos 3098 1.1 christos /* 3099 1.1 christos * If there is no current entry in the nat table for this IP#, 3100 1.1 christos * create one for it (if there is a matching rule). 3101 1.1 christos */ 3102 1.1 christos maskloop: 3103 1.1 christos msk = &softn->ipf_nat6_rdr_active_masks[rmsk]; 3104 1.1 christos IP6_AND(&ipa, msk, &iph); 3105 1.1 christos hv = NAT_HASH_FN6(&iph, 0, softn->ipf_nat_rdrrules_sz); 3106 1.1 christos for (np = softn->ipf_nat_rdr_rules[hv]; np; np = np->in_rnext) { 3107 1.1 christos if (np->in_ifps[0] && (np->in_ifps[0] != ifp)) 3108 1.1 christos continue; 3109 1.1 christos if (np->in_v[0] != 6) 3110 1.1 christos continue; 3111 1.1 christos if (np->in_pr[0] && (np->in_pr[0] != fin->fin_p)) 3112 1.1 christos continue; 3113 1.1 christos if ((np->in_flags & IPN_RF) && !(np->in_flags & nflags)) 3114 1.1 christos continue; 3115 1.1 christos if (np->in_flags & IPN_FILTER) { 3116 1.1 christos switch (ipf_nat6_match(fin, np)) 3117 1.1 christos { 3118 1.1 christos case 0 : 3119 1.1 christos continue; 3120 1.1 christos case -1 : 3121 1.1 christos rval = -1; 3122 1.1 christos goto inmatchfail; 3123 1.1 christos case 1 : 3124 1.1 christos default : 3125 1.1 christos break; 3126 1.1 christos } 3127 1.1 christos } else { 3128 1.1 christos if (!IP6_MASKEQ(&ipa, &np->in_odstmsk6, 3129 1.1 christos &np->in_odstip6)) { 3130 1.1 christos continue; 3131 1.1 christos } 3132 1.1 christos if (np->in_odport && 3133 1.1 christos ((np->in_dtop < dport) || 3134 1.1 christos (dport < np->in_odport))) 3135 1.1 christos continue; 3136 1.1 christos } 3137 1.1 christos 3138 1.1 christos #ifdef IPF_V6_PROXIES 3139 1.1 christos if (np->in_plabel != -1) { 3140 1.1 christos if (!appr_ok(fin, tcp, np)) { 3141 1.1 christos continue; 3142 1.1 christos } 3143 1.1 christos } 3144 1.1 christos #endif 3145 1.1 christos 3146 1.1 christos if (np->in_flags & IPN_NO) { 3147 1.1 christos np->in_hits++; 3148 1.1 christos break; 3149 1.1 christos } 3150 1.1 christos 3151 1.1 christos MUTEX_ENTER(&softn->ipf_nat_new); 3152 1.1 christos nat = ipf_nat6_add(fin, np, NULL, nflags, NAT_INBOUND); 3153 1.1 christos MUTEX_EXIT(&softn->ipf_nat_new); 3154 1.1 christos if (nat != NULL) { 3155 1.1 christos np->in_hits++; 3156 1.1 christos break; 3157 1.1 christos } 3158 1.1 christos natfailed = -1; 3159 1.1 christos } 3160 1.1 christos 3161 1.1 christos if ((np == NULL) && (rmsk < softn->ipf_nat6_rdr_max)) { 3162 1.1 christos rmsk++; 3163 1.1 christos goto maskloop; 3164 1.1 christos } 3165 1.1 christos } 3166 1.1 christos if (nat != NULL) { 3167 1.1 christos rval = ipf_nat6_in(fin, nat, natadd, nflags); 3168 1.1 christos if (rval == 1) { 3169 1.1 christos MUTEX_ENTER(&nat->nat_lock); 3170 1.1 christos ipf_nat_update(fin, nat); 3171 1.1 christos nat->nat_bytes[0] += fin->fin_plen; 3172 1.1 christos nat->nat_pkts[0]++; 3173 1.1 christos MUTEX_EXIT(&nat->nat_lock); 3174 1.1 christos } 3175 1.1 christos } else 3176 1.1 christos rval = natfailed; 3177 1.1 christos inmatchfail: 3178 1.1 christos RWLOCK_EXIT(&softc->ipf_nat); 3179 1.1 christos 3180 1.1 christos switch (rval) 3181 1.1 christos { 3182 1.1 christos case -1 : 3183 1.1 christos if (passp != NULL) { 3184 1.1 christos NBUMPSIDE6D(0, ns_drop); 3185 1.1 christos *passp = FR_BLOCK; 3186 1.2 darrenr fin->fin_reason = FRB_NATV6; 3187 1.1 christos } 3188 1.1 christos fin->fin_flx |= FI_BADNAT; 3189 1.1 christos NBUMPSIDE6D(0, ns_badnat); 3190 1.1 christos break; 3191 1.1 christos case 0 : 3192 1.1 christos NBUMPSIDE6D(0, ns_ignored); 3193 1.1 christos break; 3194 1.1 christos case 1 : 3195 1.1 christos NBUMPSIDE6D(0, ns_translated); 3196 1.1 christos break; 3197 1.1 christos } 3198 1.1 christos return rval; 3199 1.1 christos } 3200 1.1 christos 3201 1.1 christos 3202 1.1 christos /* ------------------------------------------------------------------------ */ 3203 1.1 christos /* Function: ipf_nat6_in */ 3204 1.1 christos /* Returns: int - -1 == packet failed NAT checks so block it, */ 3205 1.1 christos /* 1 == packet was successfully translated. */ 3206 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3207 1.1 christos /* nat(I) - pointer to NAT structure */ 3208 1.1 christos /* natadd(I) - flag indicating if it is safe to add frag cache */ 3209 1.1 christos /* nflags(I) - NAT flags set for this packet */ 3210 1.1 christos /* Locks Held: (READ) */ 3211 1.1 christos /* */ 3212 1.1 christos /* Translate a packet coming "in" on an interface. */ 3213 1.1 christos /* ------------------------------------------------------------------------ */ 3214 1.1 christos static int 3215 1.1 christos ipf_nat6_in(fin, nat, natadd, nflags) 3216 1.1 christos fr_info_t *fin; 3217 1.1 christos nat_t *nat; 3218 1.1 christos int natadd; 3219 1.1 christos u_32_t nflags; 3220 1.1 christos { 3221 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 3222 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3223 1.1 christos struct icmp6_hdr *icmp6; 3224 1.1 christos u_short *csump; 3225 1.1 christos tcphdr_t *tcp; 3226 1.1 christos ipnat_t *np; 3227 1.1 christos int skip; 3228 1.2 darrenr int i; 3229 1.1 christos 3230 1.1 christos tcp = NULL; 3231 1.1 christos csump = NULL; 3232 1.1 christos np = nat->nat_ptr; 3233 1.1 christos fin->fin_fr = nat->nat_fr; 3234 1.1 christos 3235 1.1 christos if (np != NULL) { 3236 1.1 christos if ((natadd != 0) && (fin->fin_flx & FI_FRAG)) 3237 1.1 christos (void) ipf_frag_natnew(softc, fin, 0, nat); 3238 1.1 christos 3239 1.1 christos /* ------------------------------------------------------------- */ 3240 1.2 darrenr /* A few quick notes: */ 3241 1.2 darrenr /* Following are test conditions prior to calling the */ 3242 1.2 darrenr /* ipf_proxy_check routine. */ 3243 1.2 darrenr /* */ 3244 1.2 darrenr /* A NULL tcp indicates a non TCP/UDP packet. When dealing */ 3245 1.2 darrenr /* with a map rule, we attempt to match the packet's */ 3246 1.2 darrenr /* source port against in_dport, otherwise we'd compare the */ 3247 1.2 darrenr /* packet's destination. */ 3248 1.1 christos /* ------------------------------------------------------------- */ 3249 1.1 christos if (np->in_apr != NULL) { 3250 1.2 darrenr i = ipf_proxy_check(fin, nat); 3251 1.1 christos if (i == -1) { 3252 1.2 darrenr NBUMPSIDE6D(0, ns_ipf_proxy_fail); 3253 1.1 christos return -1; 3254 1.1 christos } 3255 1.1 christos } 3256 1.1 christos } 3257 1.1 christos 3258 1.1 christos ipf_sync_update(softc, SMC_NAT, fin, nat->nat_sync); 3259 1.1 christos 3260 1.1 christos /* 3261 1.1 christos * Fix up checksums, not by recalculating them, but 3262 1.1 christos * simply computing adjustments. 3263 1.1 christos * Why only do this for some platforms on inbound packets ? 3264 1.1 christos * Because for those that it is done, IP processing is yet to happen 3265 1.1 christos * and so the IPv4 header checksum has not yet been evaluated. 3266 1.1 christos * Perhaps it should always be done for the benefit of things like 3267 1.1 christos * fast forwarding (so that it doesn't need to be recomputed) but with 3268 1.1 christos * header checksum offloading, perhaps it is a moot point. 3269 1.1 christos */ 3270 1.1 christos 3271 1.1 christos switch (nat->nat_dir) 3272 1.1 christos { 3273 1.1 christos case NAT_INBOUND : 3274 1.1 christos if ((fin->fin_flx & FI_ICMPERR) == 0) { 3275 1.1 christos fin->fin_ip6->ip6_src = nat->nat_nsrc6.in6; 3276 1.1 christos fin->fin_src6 = nat->nat_nsrc6; 3277 1.1 christos } 3278 1.1 christos fin->fin_ip6->ip6_dst = nat->nat_ndst6.in6; 3279 1.1 christos fin->fin_dst6 = nat->nat_ndst6; 3280 1.1 christos break; 3281 1.1 christos 3282 1.1 christos case NAT_OUTBOUND : 3283 1.1 christos if ((fin->fin_flx & FI_ICMPERR) == 0) { 3284 1.1 christos fin->fin_ip6->ip6_src = nat->nat_odst6.in6; 3285 1.1 christos fin->fin_src6 = nat->nat_odst6; 3286 1.1 christos } 3287 1.1 christos fin->fin_ip6->ip6_dst = nat->nat_osrc6.in6; 3288 1.1 christos fin->fin_dst6 = nat->nat_osrc6; 3289 1.1 christos break; 3290 1.1 christos 3291 1.1 christos case NAT_DIVERTIN : 3292 1.1 christos { 3293 1.1 christos udphdr_t *uh; 3294 1.1 christos ip6_t *ip6; 3295 1.1 christos mb_t *m; 3296 1.1 christos 3297 1.1 christos m = M_DUP(np->in_divmp); 3298 1.1 christos if (m == NULL) { 3299 1.1 christos NBUMPSIDE6D(0, ns_divert_dup); 3300 1.1 christos return -1; 3301 1.1 christos } 3302 1.1 christos 3303 1.1 christos ip6 = MTOD(m, ip6_t *); 3304 1.1 christos ip6->ip6_plen = htons(fin->fin_plen + sizeof(udphdr_t)); 3305 1.1 christos 3306 1.1 christos uh = (udphdr_t *)(ip6 + 1); 3307 1.1 christos uh->uh_ulen = ntohs(fin->fin_plen); 3308 1.1 christos 3309 1.1 christos PREP_MB_T(fin, m); 3310 1.1 christos 3311 1.1 christos fin->fin_ip6 = ip6; 3312 1.1 christos fin->fin_plen += sizeof(ip6_t) + 8; /* UDP + new IPv6 hdr */ 3313 1.1 christos fin->fin_dlen += sizeof(ip6_t) + 8; /* UDP + old IPv6 hdr */ 3314 1.1 christos 3315 1.1 christos nflags &= ~IPN_TCPUDPICMP; 3316 1.1 christos 3317 1.1 christos break; 3318 1.1 christos } 3319 1.1 christos 3320 1.1 christos case NAT_DIVERTOUT : 3321 1.1 christos { 3322 1.1 christos mb_t *m; 3323 1.1 christos 3324 1.1 christos skip = ipf_nat6_decap(fin, nat); 3325 1.1 christos if (skip <= 0) { 3326 1.1 christos NBUMPSIDE6D(0, ns_decap_fail); 3327 1.1 christos return -1; 3328 1.1 christos } 3329 1.1 christos 3330 1.1 christos m = fin->fin_m; 3331 1.1 christos 3332 1.1 christos #if defined(MENTAT) && defined(_KERNEL) 3333 1.1 christos m->b_rptr += skip; 3334 1.1 christos #else 3335 1.1 christos m->m_data += skip; 3336 1.1 christos m->m_len -= skip; 3337 1.1 christos 3338 1.1 christos # ifdef M_PKTHDR 3339 1.1 christos if (m->m_flags & M_PKTHDR) 3340 1.1 christos m->m_pkthdr.len -= skip; 3341 1.1 christos # endif 3342 1.1 christos #endif 3343 1.1 christos 3344 1.1 christos ipf_nat_update(fin, nat); 3345 1.1 christos fin->fin_flx |= FI_NATED; 3346 1.1 christos if (np != NULL && np->in_tag.ipt_num[0] != 0) 3347 1.1 christos fin->fin_nattag = &np->in_tag; 3348 1.1 christos return 1; 3349 1.1 christos /* NOTREACHED */ 3350 1.1 christos } 3351 1.1 christos } 3352 1.1 christos if (nflags & IPN_TCPUDP) 3353 1.1 christos tcp = fin->fin_dp; 3354 1.1 christos 3355 1.1 christos if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 3356 1.1 christos if ((nat->nat_odport != 0) && (nflags & IPN_TCPUDP)) { 3357 1.1 christos switch (nat->nat_dir) 3358 1.1 christos { 3359 1.1 christos case NAT_INBOUND : 3360 1.1 christos tcp->th_sport = nat->nat_nsport; 3361 1.1 christos fin->fin_data[0] = ntohs(nat->nat_nsport); 3362 1.1 christos tcp->th_dport = nat->nat_ndport; 3363 1.1 christos fin->fin_data[1] = ntohs(nat->nat_ndport); 3364 1.1 christos break; 3365 1.1 christos 3366 1.1 christos case NAT_OUTBOUND : 3367 1.1 christos tcp->th_sport = nat->nat_odport; 3368 1.1 christos fin->fin_data[0] = ntohs(nat->nat_odport); 3369 1.1 christos tcp->th_dport = nat->nat_osport; 3370 1.1 christos fin->fin_data[1] = ntohs(nat->nat_osport); 3371 1.1 christos break; 3372 1.1 christos } 3373 1.1 christos } 3374 1.1 christos 3375 1.1 christos 3376 1.1 christos if ((nat->nat_odport != 0) && (nflags & IPN_ICMPQUERY)) { 3377 1.1 christos icmp6 = fin->fin_dp; 3378 1.1 christos 3379 1.1 christos icmp6->icmp6_id = nat->nat_nicmpid; 3380 1.1 christos } 3381 1.1 christos 3382 1.1 christos csump = ipf_nat_proto(fin, nat, nflags); 3383 1.1 christos } 3384 1.1 christos 3385 1.1 christos /* 3386 1.1 christos * The above comments do not hold for layer 4 (or higher) checksums... 3387 1.1 christos */ 3388 1.1 christos if (csump != NULL) { 3389 1.1 christos if (nat->nat_dir == NAT_OUTBOUND) 3390 1.2 darrenr ipf_fix_incksum(0, csump, nat->nat_sumd[0], 0); 3391 1.1 christos else 3392 1.2 darrenr ipf_fix_outcksum(0, csump, nat->nat_sumd[0], 0); 3393 1.1 christos } 3394 1.1 christos fin->fin_flx |= FI_NATED; 3395 1.1 christos if (np != NULL && np->in_tag.ipt_num[0] != 0) 3396 1.1 christos fin->fin_nattag = &np->in_tag; 3397 1.1 christos return 1; 3398 1.1 christos } 3399 1.1 christos 3400 1.1 christos 3401 1.1 christos /* ------------------------------------------------------------------------ */ 3402 1.1 christos /* Function: ipf_nat6_newrewrite */ 3403 1.1 christos /* Returns: int - -1 == error, 0 == success (no move), 1 == success and */ 3404 1.1 christos /* allow rule to be moved if IPN_ROUNDR is set. */ 3405 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3406 1.1 christos /* nat(I) - pointer to NAT entry */ 3407 1.1 christos /* ni(I) - pointer to structure with misc. information needed */ 3408 1.1 christos /* to create new NAT entry. */ 3409 1.1 christos /* Write Lock: ipf_nat */ 3410 1.1 christos /* */ 3411 1.1 christos /* This function is responsible for setting up an active NAT session where */ 3412 1.1 christos /* we are changing both the source and destination parameters at the same */ 3413 1.1 christos /* time. The loop in here works differently to elsewhere - each iteration */ 3414 1.1 christos /* is responsible for changing a single parameter that can be incremented. */ 3415 1.1 christos /* So one pass may increase the source IP#, next source port, next dest. IP#*/ 3416 1.1 christos /* and the last destination port for a total of 4 iterations to try each. */ 3417 1.1 christos /* This is done to try and exhaustively use the translation space available.*/ 3418 1.1 christos /* ------------------------------------------------------------------------ */ 3419 1.1 christos int 3420 1.1 christos ipf_nat6_newrewrite(fin, nat, nai) 3421 1.1 christos fr_info_t *fin; 3422 1.1 christos nat_t *nat; 3423 1.1 christos natinfo_t *nai; 3424 1.1 christos { 3425 1.1 christos int src_search = 1; 3426 1.1 christos int dst_search = 1; 3427 1.1 christos fr_info_t frnat; 3428 1.1 christos u_32_t flags; 3429 1.1 christos u_short swap; 3430 1.1 christos ipnat_t *np; 3431 1.1 christos nat_t *natl; 3432 1.1 christos int l = 0; 3433 1.1 christos int changed; 3434 1.1 christos 3435 1.1 christos natl = NULL; 3436 1.1 christos changed = -1; 3437 1.1 christos np = nai->nai_np; 3438 1.1 christos flags = nat->nat_flags; 3439 1.1 christos bcopy((char *)fin, (char *)&frnat, sizeof(*fin)); 3440 1.1 christos 3441 1.1 christos nat->nat_hm = NULL; 3442 1.1 christos 3443 1.1 christos do { 3444 1.1 christos changed = -1; 3445 1.1 christos /* TRACE (l, src_search, dst_search, np) */ 3446 1.1 christos 3447 1.1 christos if ((src_search == 0) && (np->in_spnext == 0) && 3448 1.1 christos (dst_search == 0) && (np->in_dpnext == 0)) { 3449 1.1 christos if (l > 0) 3450 1.1 christos return -1; 3451 1.1 christos } 3452 1.1 christos 3453 1.1 christos /* 3454 1.1 christos * Find a new source address 3455 1.1 christos */ 3456 1.1 christos if (ipf_nat6_nextaddr(fin, &np->in_nsrc, &frnat.fin_src6, 3457 1.1 christos &frnat.fin_src6) == -1) { 3458 1.1 christos return -1; 3459 1.1 christos } 3460 1.1 christos 3461 1.1 christos if (IP6_ISZERO(&np->in_nsrcip6) && 3462 1.1 christos IP6_ISONES(&np->in_nsrcmsk6)) { 3463 1.1 christos src_search = 0; 3464 1.1 christos if (np->in_stepnext == 0) 3465 1.1 christos np->in_stepnext = 1; 3466 1.1 christos 3467 1.1 christos } else if (IP6_ISZERO(&np->in_nsrcip6) && 3468 1.1 christos IP6_ISZERO(&np->in_nsrcmsk6)) { 3469 1.1 christos src_search = 0; 3470 1.1 christos if (np->in_stepnext == 0) 3471 1.1 christos np->in_stepnext = 1; 3472 1.1 christos 3473 1.1 christos } else if (IP6_ISONES(&np->in_nsrcmsk)) { 3474 1.1 christos src_search = 0; 3475 1.1 christos if (np->in_stepnext == 0) 3476 1.1 christos np->in_stepnext = 1; 3477 1.1 christos 3478 1.1 christos } else if (!IP6_ISONES(&np->in_nsrcmsk6)) { 3479 1.1 christos if (np->in_stepnext == 0 && changed == -1) { 3480 1.1 christos IP6_INC(&np->in_snip); 3481 1.1 christos np->in_stepnext++; 3482 1.1 christos changed = 0; 3483 1.1 christos } 3484 1.1 christos } 3485 1.1 christos 3486 1.1 christos if ((flags & IPN_TCPUDPICMP) != 0) { 3487 1.1 christos if (np->in_spnext != 0) 3488 1.1 christos frnat.fin_data[0] = np->in_spnext; 3489 1.1 christos 3490 1.1 christos /* 3491 1.1 christos * Standard port translation. Select next port. 3492 1.1 christos */ 3493 1.1 christos if ((flags & IPN_FIXEDSPORT) != 0) { 3494 1.1 christos np->in_stepnext = 2; 3495 1.1 christos } else if ((np->in_stepnext == 1) && 3496 1.1 christos (changed == -1) && (natl != NULL)) { 3497 1.1 christos np->in_spnext++; 3498 1.1 christos np->in_stepnext++; 3499 1.1 christos changed = 1; 3500 1.1 christos if (np->in_spnext > np->in_spmax) 3501 1.1 christos np->in_spnext = np->in_spmin; 3502 1.1 christos } 3503 1.1 christos } else { 3504 1.1 christos np->in_stepnext = 2; 3505 1.1 christos } 3506 1.1 christos np->in_stepnext &= 0x3; 3507 1.1 christos 3508 1.1 christos /* 3509 1.1 christos * Find a new destination address 3510 1.1 christos */ 3511 1.1 christos /* TRACE (fin, np, l, frnat) */ 3512 1.1 christos 3513 1.1 christos if (ipf_nat6_nextaddr(fin, &np->in_ndst, &frnat.fin_dst6, 3514 1.1 christos &frnat.fin_dst6) == -1) 3515 1.1 christos return -1; 3516 1.1 christos 3517 1.1 christos if (IP6_ISZERO(&np->in_ndstip6) && 3518 1.1 christos IP6_ISONES(&np->in_ndstmsk6)) { 3519 1.1 christos dst_search = 0; 3520 1.1 christos if (np->in_stepnext == 2) 3521 1.1 christos np->in_stepnext = 3; 3522 1.1 christos 3523 1.1 christos } else if (IP6_ISZERO(&np->in_ndstip6) && 3524 1.1 christos IP6_ISZERO(&np->in_ndstmsk6)) { 3525 1.1 christos dst_search = 0; 3526 1.1 christos if (np->in_stepnext == 2) 3527 1.1 christos np->in_stepnext = 3; 3528 1.1 christos 3529 1.1 christos } else if (IP6_ISONES(&np->in_ndstmsk6)) { 3530 1.1 christos dst_search = 0; 3531 1.1 christos if (np->in_stepnext == 2) 3532 1.1 christos np->in_stepnext = 3; 3533 1.1 christos 3534 1.1 christos } else if (!IP6_ISONES(&np->in_ndstmsk6)) { 3535 1.1 christos if ((np->in_stepnext == 2) && (changed == -1) && 3536 1.1 christos (natl != NULL)) { 3537 1.1 christos changed = 2; 3538 1.1 christos np->in_stepnext++; 3539 1.1 christos IP6_INC(&np->in_dnip6); 3540 1.1 christos } 3541 1.1 christos } 3542 1.1 christos 3543 1.1 christos if ((flags & IPN_TCPUDPICMP) != 0) { 3544 1.1 christos if (np->in_dpnext != 0) 3545 1.1 christos frnat.fin_data[1] = np->in_dpnext; 3546 1.1 christos 3547 1.1 christos /* 3548 1.1 christos * Standard port translation. Select next port. 3549 1.1 christos */ 3550 1.1 christos if ((flags & IPN_FIXEDDPORT) != 0) { 3551 1.1 christos np->in_stepnext = 0; 3552 1.1 christos } else if (np->in_stepnext == 3 && changed == -1) { 3553 1.1 christos np->in_dpnext++; 3554 1.1 christos np->in_stepnext++; 3555 1.1 christos changed = 3; 3556 1.1 christos if (np->in_dpnext > np->in_dpmax) 3557 1.1 christos np->in_dpnext = np->in_dpmin; 3558 1.1 christos } 3559 1.1 christos } else { 3560 1.1 christos if (np->in_stepnext == 3) 3561 1.1 christos np->in_stepnext = 0; 3562 1.1 christos } 3563 1.1 christos 3564 1.1 christos /* TRACE (frnat) */ 3565 1.1 christos 3566 1.1 christos /* 3567 1.1 christos * Here we do a lookup of the connection as seen from 3568 1.1 christos * the outside. If an IP# pair already exists, try 3569 1.1 christos * again. So if you have A->B becomes C->B, you can 3570 1.1 christos * also have D->E become C->E but not D->B causing 3571 1.1 christos * another C->B. Also take protocol and ports into 3572 1.1 christos * account when determining whether a pre-existing 3573 1.1 christos * NAT setup will cause an external conflict where 3574 1.1 christos * this is appropriate. 3575 1.1 christos * 3576 1.1 christos * fin_data[] is swapped around because we are doing a 3577 1.1 christos * lookup of the packet is if it were moving in the opposite 3578 1.1 christos * direction of the one we are working with now. 3579 1.1 christos */ 3580 1.1 christos if (flags & IPN_TCPUDP) { 3581 1.1 christos swap = frnat.fin_data[0]; 3582 1.1 christos frnat.fin_data[0] = frnat.fin_data[1]; 3583 1.1 christos frnat.fin_data[1] = swap; 3584 1.1 christos } 3585 1.1 christos if (fin->fin_out == 1) { 3586 1.1 christos natl = ipf_nat6_inlookup(&frnat, 3587 1.1 christos flags & ~(SI_WILDP|NAT_SEARCH), 3588 1.1 christos (u_int)frnat.fin_p, 3589 1.1 christos &frnat.fin_dst6.in6, 3590 1.1 christos &frnat.fin_src6.in6); 3591 1.1 christos 3592 1.1 christos } else { 3593 1.1 christos natl = ipf_nat6_outlookup(&frnat, 3594 1.1 christos flags & ~(SI_WILDP|NAT_SEARCH), 3595 1.1 christos (u_int)frnat.fin_p, 3596 1.1 christos &frnat.fin_dst6.in6, 3597 1.1 christos &frnat.fin_src6.in6); 3598 1.1 christos } 3599 1.1 christos if (flags & IPN_TCPUDP) { 3600 1.1 christos swap = frnat.fin_data[0]; 3601 1.1 christos frnat.fin_data[0] = frnat.fin_data[1]; 3602 1.1 christos frnat.fin_data[1] = swap; 3603 1.1 christos } 3604 1.1 christos 3605 1.1 christos /* TRACE natl, in_stepnext, l */ 3606 1.1 christos 3607 1.1 christos if ((natl != NULL) && (l > 8)) /* XXX 8 is arbitrary */ 3608 1.1 christos return -1; 3609 1.1 christos 3610 1.1 christos np->in_stepnext &= 0x3; 3611 1.1 christos 3612 1.1 christos l++; 3613 1.1 christos changed = -1; 3614 1.1 christos } while (natl != NULL); 3615 1.1 christos nat->nat_osrc6 = fin->fin_src6; 3616 1.1 christos nat->nat_odst6 = fin->fin_dst6; 3617 1.1 christos nat->nat_nsrc6 = frnat.fin_src6; 3618 1.1 christos nat->nat_ndst6 = frnat.fin_dst6; 3619 1.1 christos 3620 1.2 darrenr if ((flags & IPN_TCPUDP) != 0) { 3621 1.1 christos nat->nat_osport = htons(fin->fin_data[0]); 3622 1.1 christos nat->nat_odport = htons(fin->fin_data[1]); 3623 1.1 christos nat->nat_nsport = htons(frnat.fin_data[0]); 3624 1.1 christos nat->nat_ndport = htons(frnat.fin_data[1]); 3625 1.2 darrenr } else if ((flags & IPN_ICMPQUERY) != 0) { 3626 1.2 darrenr nat->nat_oicmpid = fin->fin_data[1]; 3627 1.2 darrenr nat->nat_nicmpid = frnat.fin_data[1]; 3628 1.1 christos } 3629 1.1 christos 3630 1.1 christos return 0; 3631 1.1 christos } 3632 1.1 christos 3633 1.1 christos 3634 1.1 christos /* ------------------------------------------------------------------------ */ 3635 1.1 christos /* Function: ipf_nat6_newdivert */ 3636 1.1 christos /* Returns: int - -1 == error, 0 == success */ 3637 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3638 1.1 christos /* nat(I) - pointer to NAT entry */ 3639 1.1 christos /* ni(I) - pointer to structure with misc. information needed */ 3640 1.1 christos /* to create new NAT entry. */ 3641 1.1 christos /* Write Lock: ipf_nat */ 3642 1.1 christos /* */ 3643 1.2 darrenr /* Create a new NAT divert session as defined by the NAT rule. This is */ 3644 1.2 darrenr /* somewhat different to other NAT session creation routines because we */ 3645 1.1 christos /* do not iterate through either port numbers or IP addresses, searching */ 3646 1.1 christos /* for a unique mapping, however, a complimentary duplicate check is made. */ 3647 1.1 christos /* ------------------------------------------------------------------------ */ 3648 1.1 christos int 3649 1.1 christos ipf_nat6_newdivert(fin, nat, nai) 3650 1.1 christos fr_info_t *fin; 3651 1.1 christos nat_t *nat; 3652 1.1 christos natinfo_t *nai; 3653 1.1 christos { 3654 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 3655 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3656 1.1 christos fr_info_t frnat; 3657 1.1 christos ipnat_t *np; 3658 1.1 christos nat_t *natl; 3659 1.1 christos int p; 3660 1.1 christos 3661 1.1 christos np = nai->nai_np; 3662 1.1 christos bcopy((char *)fin, (char *)&frnat, sizeof(*fin)); 3663 1.1 christos 3664 1.1 christos nat->nat_pr[0] = 0; 3665 1.1 christos nat->nat_osrc6 = fin->fin_src6; 3666 1.1 christos nat->nat_odst6 = fin->fin_dst6; 3667 1.1 christos nat->nat_osport = htons(fin->fin_data[0]); 3668 1.1 christos nat->nat_odport = htons(fin->fin_data[1]); 3669 1.1 christos frnat.fin_src6 = np->in_snip6; 3670 1.1 christos frnat.fin_dst6 = np->in_dnip6; 3671 1.1 christos 3672 1.1 christos if (np->in_redir & NAT_DIVERTUDP) { 3673 1.1 christos frnat.fin_data[0] = np->in_spnext; 3674 1.1 christos frnat.fin_data[1] = np->in_dpnext; 3675 1.1 christos frnat.fin_flx |= FI_TCPUDP; 3676 1.1 christos p = IPPROTO_UDP; 3677 1.1 christos } else { 3678 1.1 christos frnat.fin_flx &= ~FI_TCPUDP; 3679 1.1 christos p = IPPROTO_IPIP; 3680 1.1 christos } 3681 1.1 christos 3682 1.1 christos if (fin->fin_out == 1) { 3683 1.1 christos natl = ipf_nat6_inlookup(&frnat, 0, p, &frnat.fin_dst6.in6, 3684 1.1 christos &frnat.fin_src6.in6); 3685 1.1 christos 3686 1.1 christos } else { 3687 1.1 christos natl = ipf_nat6_outlookup(&frnat, 0, p, &frnat.fin_dst6.in6, 3688 1.1 christos &frnat.fin_src6.in6); 3689 1.1 christos } 3690 1.1 christos 3691 1.1 christos if (natl != NULL) { 3692 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_divert_exist); 3693 1.1 christos return -1; 3694 1.1 christos } 3695 1.1 christos 3696 1.1 christos nat->nat_nsrc6 = frnat.fin_src6; 3697 1.1 christos nat->nat_ndst6 = frnat.fin_dst6; 3698 1.1 christos if (np->in_redir & NAT_DIVERTUDP) { 3699 1.1 christos nat->nat_nsport = htons(frnat.fin_data[0]); 3700 1.1 christos nat->nat_ndport = htons(frnat.fin_data[1]); 3701 1.1 christos } 3702 1.1 christos nat->nat_pr[fin->fin_out] = fin->fin_p; 3703 1.1 christos nat->nat_pr[1 - fin->fin_out] = p; 3704 1.1 christos 3705 1.2 darrenr if (np->in_redir & NAT_REDIRECT) 3706 1.2 darrenr nat->nat_dir = NAT_DIVERTIN; 3707 1.2 darrenr else 3708 1.2 darrenr nat->nat_dir = NAT_DIVERTOUT; 3709 1.1 christos 3710 1.1 christos return 0; 3711 1.1 christos } 3712 1.1 christos 3713 1.1 christos 3714 1.1 christos /* ------------------------------------------------------------------------ */ 3715 1.1 christos /* Function: nat6_builddivertmp */ 3716 1.1 christos /* Returns: int - -1 == error, 0 == success */ 3717 1.1 christos /* Parameters: np(I) - pointer to a NAT rule */ 3718 1.1 christos /* */ 3719 1.2 darrenr /* For divert rules, a skeleton packet representing what will be prepended */ 3720 1.2 darrenr /* to the real packet is created. Even though we don't have the full */ 3721 1.2 darrenr /* packet here, a checksum is calculated that we update later when we */ 3722 1.1 christos /* fill in the final details. At present a 0 checksum for UDP is being set */ 3723 1.1 christos /* here because it is expected that divert will be used for localhost. */ 3724 1.1 christos /* ------------------------------------------------------------------------ */ 3725 1.1 christos static int 3726 1.1 christos ipf_nat6_builddivertmp(softn, np) 3727 1.1 christos ipf_nat_softc_t *softn; 3728 1.1 christos ipnat_t *np; 3729 1.1 christos { 3730 1.1 christos udphdr_t *uh; 3731 1.1 christos size_t len; 3732 1.1 christos ip6_t *ip6; 3733 1.1 christos 3734 1.1 christos if ((np->in_redir & NAT_DIVERTUDP) != 0) 3735 1.1 christos len = sizeof(ip6_t) + sizeof(udphdr_t); 3736 1.1 christos else 3737 1.1 christos len = sizeof(ip6_t); 3738 1.1 christos 3739 1.1 christos ALLOC_MB_T(np->in_divmp, len); 3740 1.1 christos if (np->in_divmp == NULL) { 3741 1.1 christos ATOMIC_INCL(softn->ipf_nat_stats.ns_divert_build); 3742 1.1 christos return -1; 3743 1.1 christos } 3744 1.1 christos 3745 1.1 christos /* 3746 1.1 christos * First, the header to get the packet diverted to the new destination 3747 1.1 christos */ 3748 1.1 christos ip6 = MTOD(np->in_divmp, ip6_t *); 3749 1.1 christos ip6->ip6_vfc = 0x60; 3750 1.1 christos if ((np->in_redir & NAT_DIVERTUDP) != 0) 3751 1.1 christos ip6->ip6_nxt = IPPROTO_UDP; 3752 1.1 christos else 3753 1.1 christos ip6->ip6_nxt = IPPROTO_IPIP; 3754 1.1 christos ip6->ip6_hlim = 255; 3755 1.1 christos ip6->ip6_plen = 0; 3756 1.1 christos ip6->ip6_src = np->in_snip6.in6; 3757 1.1 christos ip6->ip6_dst = np->in_dnip6.in6; 3758 1.1 christos 3759 1.1 christos if (np->in_redir & NAT_DIVERTUDP) { 3760 1.1 christos uh = (udphdr_t *)((u_char *)ip6 + sizeof(*ip6)); 3761 1.1 christos uh->uh_sum = 0; 3762 1.1 christos uh->uh_ulen = 8; 3763 1.1 christos uh->uh_sport = htons(np->in_spnext); 3764 1.1 christos uh->uh_dport = htons(np->in_dpnext); 3765 1.1 christos } 3766 1.1 christos 3767 1.1 christos return 0; 3768 1.1 christos } 3769 1.1 christos 3770 1.1 christos 3771 1.1 christos #define MINDECAP (sizeof(ip6_t) + sizeof(udphdr_t) + sizeof(ip6_t)) 3772 1.1 christos 3773 1.1 christos /* ------------------------------------------------------------------------ */ 3774 1.1 christos /* Function: nat6_decap */ 3775 1.1 christos /* Returns: int - -1 == error, 0 == success */ 3776 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3777 1.1 christos /* nat(I) - pointer to current NAT session */ 3778 1.1 christos /* */ 3779 1.1 christos /* This function is responsible for undoing a packet's encapsulation in the */ 3780 1.1 christos /* reverse of an encap/divert rule. After removing the outer encapsulation */ 3781 1.1 christos /* it is necessary to call ipf_makefrip() again so that the contents of 'fin'*/ 3782 1.1 christos /* match the "new" packet as it may still be used by IPFilter elsewhere. */ 3783 1.1 christos /* We use "dir" here as the basis for some of the expectations about the */ 3784 1.1 christos /* outer header. If we return an error, the goal is to leave the original */ 3785 1.1 christos /* packet information undisturbed - this falls short at the end where we'd */ 3786 1.1 christos /* need to back a backup copy of "fin" - expensive. */ 3787 1.1 christos /* ------------------------------------------------------------------------ */ 3788 1.1 christos static int 3789 1.1 christos ipf_nat6_decap(fin, nat) 3790 1.1 christos fr_info_t *fin; 3791 1.1 christos nat_t *nat; 3792 1.1 christos { 3793 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 3794 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3795 1.1 christos char *hdr; 3796 1.1 christos int skip; 3797 1.1 christos mb_t *m; 3798 1.1 christos 3799 1.1 christos if ((fin->fin_flx & FI_ICMPERR) != 0) { 3800 1.1 christos return 0; 3801 1.1 christos } 3802 1.1 christos 3803 1.1 christos m = fin->fin_m; 3804 1.1 christos skip = fin->fin_hlen; 3805 1.1 christos 3806 1.1 christos switch (nat->nat_dir) 3807 1.1 christos { 3808 1.1 christos case NAT_DIVERTIN : 3809 1.1 christos case NAT_DIVERTOUT : 3810 1.1 christos if (fin->fin_plen < MINDECAP) 3811 1.1 christos return -1; 3812 1.1 christos skip += sizeof(udphdr_t); 3813 1.1 christos break; 3814 1.1 christos 3815 1.1 christos case NAT_ENCAPIN : 3816 1.1 christos case NAT_ENCAPOUT : 3817 1.1 christos if (fin->fin_plen < (skip + sizeof(ip6_t))) 3818 1.1 christos return -1; 3819 1.1 christos break; 3820 1.1 christos default : 3821 1.1 christos return -1; 3822 1.1 christos /* NOTREACHED */ 3823 1.1 christos } 3824 1.1 christos 3825 1.1 christos /* 3826 1.1 christos * The aim here is to keep the original packet details in "fin" for 3827 1.1 christos * as long as possible so that returning with an error is for the 3828 1.1 christos * original packet and there is little undoing work to do. 3829 1.1 christos */ 3830 1.1 christos if (M_LEN(m) < skip + sizeof(ip6_t)) { 3831 1.1 christos if (ipf_pr_pullup(fin, skip + sizeof(ip6_t)) == -1) 3832 1.1 christos return -1; 3833 1.1 christos } 3834 1.1 christos 3835 1.1 christos hdr = MTOD(fin->fin_m, char *); 3836 1.1 christos fin->fin_ip6 = (ip6_t *)(hdr + skip); 3837 1.1 christos 3838 1.1 christos if (ipf_pr_pullup(fin, skip + sizeof(ip6_t)) == -1) { 3839 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_decap_pullup); 3840 1.1 christos return -1; 3841 1.1 christos } 3842 1.1 christos 3843 1.1 christos fin->fin_hlen = sizeof(ip6_t); 3844 1.1 christos fin->fin_dlen -= skip; 3845 1.1 christos fin->fin_plen -= skip; 3846 1.1 christos fin->fin_ipoff += skip; 3847 1.1 christos 3848 1.1 christos if (ipf_makefrip(sizeof(ip6_t), (ip_t *)hdr, fin) == -1) { 3849 1.1 christos NBUMPSIDE6D(fin->fin_out, ns_decap_bad); 3850 1.1 christos return -1; 3851 1.1 christos } 3852 1.1 christos 3853 1.1 christos return skip; 3854 1.1 christos } 3855 1.1 christos 3856 1.1 christos 3857 1.1 christos /* ------------------------------------------------------------------------ */ 3858 1.1 christos /* Function: nat6_nextaddr */ 3859 1.1 christos /* Returns: int - -1 == bad input (no new address), */ 3860 1.1 christos /* 0 == success and dst has new address */ 3861 1.1 christos /* Parameters: fin(I) - pointer to packet information */ 3862 1.1 christos /* na(I) - how to generate new address */ 3863 1.1 christos /* old(I) - original address being replaced */ 3864 1.1 christos /* dst(O) - where to put the new address */ 3865 1.1 christos /* Write Lock: ipf_nat */ 3866 1.1 christos /* */ 3867 1.1 christos /* This function uses the contents of the "na" structure, in combination */ 3868 1.1 christos /* with "old" to produce a new address to store in "dst". Not all of the */ 3869 1.1 christos /* possible uses of "na" will result in a new address. */ 3870 1.1 christos /* ------------------------------------------------------------------------ */ 3871 1.1 christos static int 3872 1.1 christos ipf_nat6_nextaddr(fin, na, old, dst) 3873 1.1 christos fr_info_t *fin; 3874 1.1 christos nat_addr_t *na; 3875 1.1 christos i6addr_t *old, *dst; 3876 1.1 christos { 3877 1.1 christos ipf_main_softc_t *softc = fin->fin_main_soft; 3878 1.1 christos ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3879 1.1 christos i6addr_t newip, new; 3880 1.1 christos u_32_t amin, amax; 3881 1.1 christos int error; 3882 1.1 christos 3883 1.1 christos new.i6[0] = 0; 3884 1.1 christos new.i6[1] = 0; 3885 1.1 christos new.i6[2] = 0; 3886 1.1 christos new.i6[3] = 0; 3887 1.1 christos amin = na->na_addr[0].in4.s_addr; 3888 1.1 christos 3889 1.1 christos switch (na->na_atype) 3890 1.1 christos { 3891 1.1 christos case FRI_RANGE : 3892 1.1 christos amax = na->na_addr[1].in4.s_addr; 3893 1.1 christos break; 3894 1.1 christos 3895 1.1 christos case FRI_NETMASKED : 3896 1.1 christos case FRI_DYNAMIC : 3897 1.1 christos case FRI_NORMAL : 3898 1.1 christos /* 3899 1.1 christos * Compute the maximum address by adding the inverse of the 3900 1.1 christos * netmask to the minimum address. 3901 1.1 christos */ 3902 1.1 christos amax = ~na->na_addr[1].in4.s_addr; 3903 1.1 christos amax |= amin; 3904 1.1 christos break; 3905 1.1 christos 3906 1.1 christos case FRI_LOOKUP : 3907 1.1 christos break; 3908 1.1 christos 3909 1.1 christos case FRI_BROADCAST : 3910 1.1 christos case FRI_PEERADDR : 3911 1.1 christos case FRI_NETWORK : 3912 1.1 christos default : 3913 1.1 christos return -1; 3914 1.1 christos } 3915 1.1 christos 3916 1.1 christos error = -1; 3917 1.1 christos switch (na->na_function) 3918 1.1 christos { 3919 1.1 christos case IPLT_DSTLIST : 3920 1.1 christos error = ipf_dstlist_select_node(fin, na->na_ptr, dst->i6, 3921 1.1 christos NULL); 3922 1.1 christos break; 3923 1.1 christos 3924 1.1 christos case IPLT_NONE : 3925 1.1 christos /* 3926 1.1 christos * 0/0 as the new address means leave it alone. 3927 1.1 christos */ 3928 1.1 christos if (na->na_addr[0].in4.s_addr == 0 && 3929 1.1 christos na->na_addr[1].in4.s_addr == 0) { 3930 1.1 christos new = *old; 3931 1.1 christos 3932 1.1 christos /* 3933 1.1 christos * 0/32 means get the interface's address 3934 1.1 christos */ 3935 1.1 christos } else if (IP6_ISZERO(&na->na_addr[0].in6) && 3936 1.1 christos IP6_ISONES(&na->na_addr[1].in6)) { 3937 1.1 christos if (ipf_ifpaddr(softc, 6, na->na_atype, 3938 1.1 christos fin->fin_ifp, &newip, NULL) == -1) { 3939 1.1 christos NBUMPSIDE6(fin->fin_out, ns_ifpaddrfail); 3940 1.1 christos return -1; 3941 1.1 christos } 3942 1.1 christos new = newip; 3943 1.1 christos } else { 3944 1.1 christos new.in6 = na->na_nextip6; 3945 1.1 christos } 3946 1.1 christos *dst = new; 3947 1.2 darrenr error = 0; 3948 1.1 christos break; 3949 1.1 christos 3950 1.1 christos default : 3951 1.1 christos NBUMPSIDE6(fin->fin_out, ns_badnextaddr); 3952 1.1 christos break; 3953 1.1 christos } 3954 1.1 christos 3955 1.1 christos return error; 3956 1.1 christos } 3957 1.1 christos 3958 1.1 christos 3959 1.1 christos /* ------------------------------------------------------------------------ */ 3960 1.1 christos /* Function: ipf_nat6_nextaddrinit */ 3961 1.1 christos /* Returns: int - 0 == success, else error number */ 3962 1.1 christos /* Parameters: na(I) - NAT address information for generating new addr*/ 3963 1.1 christos /* base(I) - start of where to find strings */ 3964 1.1 christos /* initial(I) - flag indicating if it is the first call for */ 3965 1.1 christos /* this "na" structure. */ 3966 1.1 christos /* ifp(I) - network interface to derive address */ 3967 1.1 christos /* information from. */ 3968 1.1 christos /* */ 3969 1.1 christos /* This function is expected to be called in two scenarious: when a new NAT */ 3970 1.1 christos /* rule is loaded into the kernel and when the list of NAT rules is sync'd */ 3971 1.1 christos /* up with the valid network interfaces (possibly due to them changing.) */ 3972 1.1 christos /* To distinguish between these, the "initial" parameter is used. If it is */ 3973 1.1 christos /* 1 then this indicates the rule has just been reloaded and 0 for when we */ 3974 1.1 christos /* are updating information. This difference is important because in */ 3975 1.1 christos /* instances where we are not updating address information associated with */ 3976 1.1 christos /* a network interface, we don't want to disturb what the "next" address to */ 3977 1.1 christos /* come out of ipf_nat6_nextaddr() will be. */ 3978 1.1 christos /* ------------------------------------------------------------------------ */ 3979 1.1 christos static int 3980 1.1 christos ipf_nat6_nextaddrinit(softc, base, na, initial, ifp) 3981 1.1 christos ipf_main_softc_t *softc; 3982 1.1 christos char *base; 3983 1.1 christos nat_addr_t *na; 3984 1.1 christos int initial; 3985 1.1 christos void *ifp; 3986 1.1 christos { 3987 1.1 christos switch (na->na_atype) 3988 1.1 christos { 3989 1.1 christos case FRI_LOOKUP : 3990 1.1 christos if (na->na_subtype == 0) { 3991 1.1 christos na->na_ptr = ipf_lookup_res_num(softc, IPL_LOGNAT, 3992 1.1 christos na->na_type, 3993 1.1 christos na->na_num, 3994 1.1 christos &na->na_func); 3995 1.1 christos } else if (na->na_subtype == 1) { 3996 1.1 christos na->na_ptr = ipf_lookup_res_name(softc, IPL_LOGNAT, 3997 1.1 christos na->na_type, 3998 1.1 christos base + na->na_num, 3999 1.1 christos &na->na_func); 4000 1.1 christos } 4001 1.1 christos if (na->na_func == NULL) { 4002 1.1 christos IPFERROR(60072); 4003 1.1 christos return ESRCH; 4004 1.1 christos } 4005 1.1 christos if (na->na_ptr == NULL) { 4006 1.1 christos IPFERROR(60073); 4007 1.1 christos return ESRCH; 4008 1.1 christos } 4009 1.1 christos break; 4010 1.1 christos case FRI_DYNAMIC : 4011 1.1 christos case FRI_BROADCAST : 4012 1.1 christos case FRI_NETWORK : 4013 1.1 christos case FRI_NETMASKED : 4014 1.1 christos case FRI_PEERADDR : 4015 1.1 christos if (ifp != NULL) 4016 1.1 christos (void )ipf_ifpaddr(softc, 6, na->na_atype, ifp, 4017 1.1 christos &na->na_addr[0], 4018 1.1 christos &na->na_addr[1]); 4019 1.1 christos break; 4020 1.1 christos 4021 1.1 christos case FRI_SPLIT : 4022 1.1 christos case FRI_RANGE : 4023 1.1 christos if (initial) 4024 1.1 christos na->na_nextip6 = na->na_addr[0].in6; 4025 1.1 christos break; 4026 1.1 christos 4027 1.1 christos case FRI_NONE : 4028 1.1 christos IP6_ANDASSIGN(&na->na_addr[0].in6, &na->na_addr[1].in6); 4029 1.1 christos return 0; 4030 1.1 christos 4031 1.1 christos case FRI_NORMAL : 4032 1.1 christos IP6_ANDASSIGN(&na->na_addr[0].in6, &na->na_addr[1].in6); 4033 1.1 christos break; 4034 1.1 christos 4035 1.1 christos default : 4036 1.1 christos IPFERROR(60074); 4037 1.1 christos return EINVAL; 4038 1.1 christos } 4039 1.1 christos 4040 1.1 christos if (initial && (na->na_atype == FRI_NORMAL)) { 4041 1.1 christos if (IP6_ISZERO(&na->na_addr[0].in6)) { 4042 1.1 christos if (IP6_ISONES(&na->na_addr[1].in6) || 4043 1.1 christos IP6_ISZERO(&na->na_addr[1].in6)) { 4044 1.1 christos return 0; 4045 1.1 christos } 4046 1.1 christos } 4047 1.1 christos 4048 1.1 christos na->na_nextip6 = na->na_addr[0].in6; 4049 1.1 christos if (!IP6_ISONES(&na->na_addr[1].in6)) { 4050 1.1 christos IP6_INC(&na->na_nextip6); 4051 1.1 christos } 4052 1.1 christos } 4053 1.1 christos 4054 1.1 christos return 0; 4055 1.1 christos } 4056 1.1 christos 4057 1.1 christos 4058 1.1 christos /* ------------------------------------------------------------------------ */ 4059 1.1 christos /* Function: ipf_nat6_icmpquerytype */ 4060 1.1 christos /* Returns: int - 1 == success, 0 == failure */ 4061 1.1 christos /* Parameters: icmptype(I) - ICMP type number */ 4062 1.1 christos /* */ 4063 1.1 christos /* Tests to see if the ICMP type number passed is a query/response type or */ 4064 1.1 christos /* not. */ 4065 1.1 christos /* ------------------------------------------------------------------------ */ 4066 1.1 christos static int 4067 1.1 christos ipf_nat6_icmpquerytype(icmptype) 4068 1.1 christos int icmptype; 4069 1.1 christos { 4070 1.1 christos 4071 1.1 christos /* 4072 1.1 christos * For the ICMP query NAT code, it is essential that both the query 4073 1.1 christos * and the reply match on the NAT rule. Because the NAT structure 4074 1.1 christos * does not keep track of the icmptype, and a single NAT structure 4075 1.1 christos * is used for all icmp types with the same src, dest and id, we 4076 1.1 christos * simply define the replies as queries as well. The funny thing is, 4077 1.1 christos * altough it seems silly to call a reply a query, this is exactly 4078 1.1 christos * as it is defined in the IPv4 specification 4079 1.1 christos */ 4080 1.1 christos 4081 1.1 christos switch (icmptype) 4082 1.1 christos { 4083 1.1 christos 4084 1.1 christos case ICMP6_ECHO_REPLY: 4085 1.1 christos case ICMP6_ECHO_REQUEST: 4086 1.1 christos /* route aedvertisement/solliciation is currently unsupported: */ 4087 1.1 christos /* it would require rewriting the ICMP data section */ 4088 1.1 christos case ICMP6_MEMBERSHIP_QUERY: 4089 1.1 christos case ICMP6_MEMBERSHIP_REPORT: 4090 1.1 christos case ICMP6_MEMBERSHIP_REDUCTION: 4091 1.1 christos case ICMP6_WRUREQUEST: 4092 1.1 christos case ICMP6_WRUREPLY: 4093 1.1 christos case MLD6_MTRACE_RESP: 4094 1.1 christos case MLD6_MTRACE: 4095 1.1 christos return 1; 4096 1.1 christos default: 4097 1.1 christos return 0; 4098 1.1 christos } 4099 1.1 christos } 4100 1.1 christos #endif /* USE_INET6 */ 4101