printaps.c revision 1.1 1 /* $NetBSD: printaps.c,v 1.1 2012/03/23 21:20:09 christos Exp $ */
2
3 /*
4 * Copyright (C) 2012 by Darren Reed.
5 *
6 * See the IPFILTER.LICENCE file for details on licencing.
7 *
8 * Added redirect stuff and a variety of bug fixes. (mcn (at) EnGarde.com)
9 */
10
11 #include "ipf.h"
12 #include "kmem.h"
13
14
15 #if !defined(lint)
16 static const char rcsid[] = "@(#)Id";
17 #endif
18
19
20 void
21 printaps(aps, opts, proto)
22 ap_session_t *aps;
23 int opts, proto;
24 {
25 ipsec_pxy_t ipsec;
26 ap_session_t ap;
27 ftpinfo_t ftp;
28 aproxy_t apr;
29 raudio_t ra;
30
31 if (kmemcpy((char *)&ap, (long)aps, sizeof(ap)))
32 return;
33 if (kmemcpy((char *)&apr, (long)ap.aps_apr, sizeof(apr)))
34 return;
35 PRINTF("\tproxy %s/%d use %d flags %x\n", apr.apr_label,
36 apr.apr_p, apr.apr_ref, apr.apr_flags);
37 #ifdef USE_QUAD_T
38 PRINTF("%"PRIu64" pkts %"PRIu64"", (unsigned long long)ap.aps_bytes,
39 (unsigned long long)ap.aps_pkts);
40 #else
41 PRINTF("%lu pkts %lu", ap.aps_bytes, ap.aps_pkts);
42 #endif
43 PRINTF(" data %s\n", ap.aps_data ? "YES" : "NO");
44 if ((proto == IPPROTO_TCP) && (opts & OPT_VERBOSE)) {
45 PRINTF("\t\tstate[%u,%u], sel[%d,%d]\n",
46 ap.aps_state[0], ap.aps_state[1],
47 ap.aps_sel[0], ap.aps_sel[1]);
48 #if (defined(NetBSD) && (NetBSD >= 199905) && (NetBSD < 1991011)) || \
49 (__FreeBSD_version >= 300000) || defined(OpenBSD)
50 PRINTF("\t\tseq: off %hd/%hd min %x/%x\n",
51 ap.aps_seqoff[0], ap.aps_seqoff[1],
52 ap.aps_seqmin[0], ap.aps_seqmin[1]);
53 PRINTF("\t\tack: off %hd/%hd min %x/%x\n",
54 ap.aps_ackoff[0], ap.aps_ackoff[1],
55 ap.aps_ackmin[0], ap.aps_ackmin[1]);
56 #else
57 PRINTF("\t\tseq: off %hd/%hd min %lx/%lx\n",
58 ap.aps_seqoff[0], ap.aps_seqoff[1],
59 ap.aps_seqmin[0], ap.aps_seqmin[1]);
60 PRINTF("\t\tack: off %hd/%hd min %lx/%lx\n",
61 ap.aps_ackoff[0], ap.aps_ackoff[1],
62 ap.aps_ackmin[0], ap.aps_ackmin[1]);
63 #endif
64 }
65
66 if (!strcmp(apr.apr_label, "raudio") && ap.aps_psiz == sizeof(ra)) {
67 if (kmemcpy((char *)&ra, (long)ap.aps_data, sizeof(ra)))
68 return;
69 PRINTF("\tReal Audio Proxy:\n");
70 PRINTF("\t\tSeen PNA: %d\tVersion: %d\tEOS: %d\n",
71 ra.rap_seenpna, ra.rap_version, ra.rap_eos);
72 PRINTF("\t\tMode: %#x\tSBF: %#x\n", ra.rap_mode, ra.rap_sbf);
73 PRINTF("\t\tPorts:pl %hu, pr %hu, sr %hu\n",
74 ra.rap_plport, ra.rap_prport, ra.rap_srport);
75 } else if (!strcmp(apr.apr_label, "ftp") &&
76 (ap.aps_psiz == sizeof(ftp))) {
77 if (kmemcpy((char *)&ftp, (long)ap.aps_data, sizeof(ftp)))
78 return;
79 PRINTF("\tFTP Proxy:\n");
80 PRINTF("\t\tpassok: %d\n", ftp.ftp_passok);
81 ftp.ftp_side[0].ftps_buf[FTP_BUFSZ - 1] = '\0';
82 ftp.ftp_side[1].ftps_buf[FTP_BUFSZ - 1] = '\0';
83 PRINTF("\tClient:\n");
84 PRINTF("\t\tseq %x (ack %x) len %d junk %d cmds %d\n",
85 ftp.ftp_side[0].ftps_seq[0],
86 ftp.ftp_side[0].ftps_seq[1],
87 ftp.ftp_side[0].ftps_len, ftp.ftp_side[0].ftps_junk,
88 ftp.ftp_side[0].ftps_cmds);
89 PRINTF("\t\tbuf [");
90 printbuf(ftp.ftp_side[0].ftps_buf, FTP_BUFSZ, 1);
91 PRINTF("]\n\tServer:\n");
92 PRINTF("\t\tseq %x (ack %x) len %d junk %d cmds %d\n",
93 ftp.ftp_side[1].ftps_seq[0],
94 ftp.ftp_side[1].ftps_seq[1],
95 ftp.ftp_side[1].ftps_len, ftp.ftp_side[1].ftps_junk,
96 ftp.ftp_side[1].ftps_cmds);
97 PRINTF("\t\tbuf [");
98 printbuf(ftp.ftp_side[1].ftps_buf, FTP_BUFSZ, 1);
99 PRINTF("]\n");
100 } else if (!strcmp(apr.apr_label, "ipsec") &&
101 (ap.aps_psiz == sizeof(ipsec))) {
102 if (kmemcpy((char *)&ipsec, (long)ap.aps_data, sizeof(ipsec)))
103 return;
104 PRINTF("\tIPSec Proxy:\n");
105 PRINTF("\t\tICookie %08x%08x RCookie %08x%08x %s\n",
106 (u_int)ntohl(ipsec.ipsc_icookie[0]),
107 (u_int)ntohl(ipsec.ipsc_icookie[1]),
108 (u_int)ntohl(ipsec.ipsc_rcookie[0]),
109 (u_int)ntohl(ipsec.ipsc_rcookie[1]),
110 ipsec.ipsc_rckset ? "(Set)" : "(Not set)");
111 }
112 }
113