1 1.5 martin /* $NetBSD: ip_rcmd_pxy.c,v 1.5 2013/09/14 12:06:19 martin Exp $ */ 2 1.1 christos 3 1.1 christos /* 4 1.3 darrenr * Copyright (C) 2012 by Darren Reed. 5 1.1 christos * 6 1.1 christos * See the IPFILTER.LICENCE file for details on licencing. 7 1.1 christos * 8 1.3 darrenr * Id: ip_rcmd_pxy.c,v 1.1.1.2 2012/07/22 13:45:33 darrenr Exp 9 1.1 christos * 10 1.1 christos * Simple RCMD transparent proxy for in-kernel use. For use with the NAT 11 1.1 christos * code. 12 1.1 christos */ 13 1.1 christos 14 1.2 christos #include <sys/cdefs.h> 15 1.5 martin __KERNEL_RCSID(1, "$NetBSD: ip_rcmd_pxy.c,v 1.5 2013/09/14 12:06:19 martin Exp $"); 16 1.2 christos 17 1.1 christos #define IPF_RCMD_PROXY 18 1.1 christos 19 1.3 darrenr typedef struct rcmdinfo { 20 1.3 darrenr u_32_t rcmd_port; /* Port number seen */ 21 1.3 darrenr u_32_t rcmd_portseq; /* Sequence number where port is first seen */ 22 1.3 darrenr ipnat_t *rcmd_rule; /* Template rule for back connection */ 23 1.3 darrenr } rcmdinfo_t; 24 1.3 darrenr 25 1.2 christos void ipf_p_rcmd_main_load(void); 26 1.2 christos void ipf_p_rcmd_main_unload(void); 27 1.1 christos 28 1.2 christos int ipf_p_rcmd_init(void); 29 1.2 christos void ipf_p_rcmd_fini(void); 30 1.2 christos void ipf_p_rcmd_del(ipf_main_softc_t *, ap_session_t *); 31 1.2 christos int ipf_p_rcmd_new(void *, fr_info_t *, ap_session_t *, nat_t *); 32 1.2 christos int ipf_p_rcmd_out(void *, fr_info_t *, ap_session_t *, nat_t *); 33 1.2 christos int ipf_p_rcmd_in(void *, fr_info_t *, ap_session_t *, nat_t *); 34 1.2 christos u_short ipf_rcmd_atoi(char *); 35 1.2 christos int ipf_p_rcmd_portmsg(fr_info_t *, ap_session_t *, nat_t *); 36 1.1 christos 37 1.1 christos static frentry_t rcmdfr; 38 1.1 christos 39 1.1 christos static int rcmd_proxy_init = 0; 40 1.1 christos 41 1.1 christos 42 1.1 christos /* 43 1.1 christos * RCMD application proxy initialization. 44 1.1 christos */ 45 1.1 christos void 46 1.2 christos ipf_p_rcmd_main_load(void) 47 1.1 christos { 48 1.1 christos bzero((char *)&rcmdfr, sizeof(rcmdfr)); 49 1.1 christos rcmdfr.fr_ref = 1; 50 1.1 christos rcmdfr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE; 51 1.1 christos MUTEX_INIT(&rcmdfr.fr_lock, "RCMD proxy rule lock"); 52 1.1 christos rcmd_proxy_init = 1; 53 1.1 christos } 54 1.1 christos 55 1.1 christos 56 1.1 christos void 57 1.2 christos ipf_p_rcmd_main_unload(void) 58 1.1 christos { 59 1.1 christos if (rcmd_proxy_init == 1) { 60 1.1 christos MUTEX_DESTROY(&rcmdfr.fr_lock); 61 1.1 christos rcmd_proxy_init = 0; 62 1.1 christos } 63 1.1 christos } 64 1.1 christos 65 1.1 christos 66 1.1 christos /* 67 1.1 christos * Setup for a new RCMD proxy. 68 1.1 christos */ 69 1.1 christos int 70 1.2 christos ipf_p_rcmd_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 71 1.1 christos { 72 1.1 christos tcphdr_t *tcp = (tcphdr_t *)fin->fin_dp; 73 1.1 christos rcmdinfo_t *rc; 74 1.1 christos ipnat_t *ipn; 75 1.1 christos 76 1.1 christos fin = fin; /* LINT */ 77 1.1 christos 78 1.3 darrenr KMALLOC(rc, rcmdinfo_t *); 79 1.1 christos if (rc == NULL) { 80 1.2 christos printf("ipf_p_rcmd_new:KMALLOCS(%zu) failed\n", sizeof(*rc)); 81 1.1 christos return -1; 82 1.1 christos } 83 1.3 darrenr aps->aps_sport = tcp->th_sport; 84 1.3 darrenr aps->aps_dport = tcp->th_dport; 85 1.3 darrenr 86 1.3 darrenr ipn = ipf_proxy_rule_rev(nat); 87 1.3 darrenr if (ipn == NULL) { 88 1.3 darrenr KFREE(rc); 89 1.3 darrenr return -1; 90 1.3 darrenr } 91 1.1 christos 92 1.1 christos aps->aps_data = rc; 93 1.3 darrenr aps->aps_psiz = sizeof(*rc); 94 1.1 christos bzero((char *)rc, sizeof(*rc)); 95 1.1 christos 96 1.3 darrenr rc->rcmd_rule = ipn; 97 1.1 christos 98 1.1 christos return 0; 99 1.1 christos } 100 1.1 christos 101 1.1 christos 102 1.1 christos void 103 1.2 christos ipf_p_rcmd_del(ipf_main_softc_t *softc, ap_session_t *aps) 104 1.1 christos { 105 1.1 christos rcmdinfo_t *rci; 106 1.1 christos 107 1.1 christos rci = aps->aps_data; 108 1.1 christos if (rci != NULL) { 109 1.3 darrenr rci->rcmd_rule->in_flags |= IPN_DELETE; 110 1.3 darrenr ipf_nat_rule_deref(softc, &rci->rcmd_rule); 111 1.1 christos } 112 1.1 christos } 113 1.1 christos 114 1.1 christos 115 1.1 christos /* 116 1.1 christos * ipf_rcmd_atoi - implement a simple version of atoi 117 1.1 christos */ 118 1.1 christos u_short 119 1.2 christos ipf_rcmd_atoi(char *ptr) 120 1.1 christos { 121 1.2 christos char *s = ptr, c; 122 1.2 christos u_short i = 0; 123 1.1 christos 124 1.1 christos while (((c = *s++) != '\0') && ISDIGIT(c)) { 125 1.1 christos i *= 10; 126 1.1 christos i += c - '0'; 127 1.1 christos } 128 1.1 christos return i; 129 1.1 christos } 130 1.1 christos 131 1.1 christos 132 1.1 christos int 133 1.2 christos ipf_p_rcmd_portmsg(fr_info_t *fin, ap_session_t *aps, nat_t *nat) 134 1.1 christos { 135 1.1 christos tcphdr_t *tcp, tcph, *tcp2 = &tcph; 136 1.1 christos int off, dlen, nflags, direction; 137 1.1 christos ipf_main_softc_t *softc; 138 1.3 darrenr ipf_nat_softc_t *softn; 139 1.1 christos char portbuf[8], *s; 140 1.1 christos rcmdinfo_t *rc; 141 1.1 christos fr_info_t fi; 142 1.1 christos u_short sp; 143 1.1 christos nat_t *nat2; 144 1.4 pgoyette #ifdef USE_INET6 145 1.3 darrenr ip6_t *ip6; 146 1.4 pgoyette #endif 147 1.3 darrenr int tcpsz; 148 1.4 pgoyette int slen = 0; 149 1.1 christos ip_t *ip; 150 1.1 christos mb_t *m; 151 1.1 christos 152 1.1 christos tcp = (tcphdr_t *)fin->fin_dp; 153 1.1 christos 154 1.1 christos m = fin->fin_m; 155 1.1 christos ip = fin->fin_ip; 156 1.3 darrenr tcpsz = TCP_OFF(tcp) << 2; 157 1.4 pgoyette #ifdef USE_INET6 158 1.3 darrenr ip6 = (ip6_t *)fin->fin_ip; 159 1.4 pgoyette #endif 160 1.3 darrenr softc = fin->fin_main_soft; 161 1.3 darrenr softn = softc->ipf_nat_soft; 162 1.3 darrenr off = (char *)tcp - (char *)ip + tcpsz + fin->fin_ipoff; 163 1.1 christos 164 1.3 darrenr dlen = fin->fin_dlen - tcpsz; 165 1.1 christos if (dlen <= 0) 166 1.1 christos return 0; 167 1.1 christos 168 1.1 christos rc = (rcmdinfo_t *)aps->aps_data; 169 1.1 christos if ((rc->rcmd_portseq != 0) && 170 1.1 christos (tcp->th_seq != rc->rcmd_portseq)) 171 1.1 christos return 0; 172 1.1 christos 173 1.1 christos bzero(portbuf, sizeof(portbuf)); 174 1.1 christos COPYDATA(m, off, MIN(sizeof(portbuf), dlen), portbuf); 175 1.1 christos 176 1.1 christos portbuf[sizeof(portbuf) - 1] = '\0'; 177 1.1 christos s = portbuf; 178 1.1 christos sp = ipf_rcmd_atoi(s); 179 1.1 christos if (sp == 0) { 180 1.1 christos #ifdef IP_RCMD_PROXY_DEBUG 181 1.1 christos printf("ipf_p_rcmd_portmsg:sp == 0 dlen %d [%s]\n", 182 1.1 christos dlen, portbuf); 183 1.1 christos #endif 184 1.1 christos return 0; 185 1.1 christos } 186 1.1 christos 187 1.1 christos if (rc->rcmd_port != 0 && sp != rc->rcmd_port) { 188 1.1 christos #ifdef IP_RCMD_PROXY_DEBUG 189 1.1 christos printf("ipf_p_rcmd_portmsg:sp(%d) != rcmd_port(%d)\n", 190 1.1 christos sp, rc->rcmd_port); 191 1.1 christos #endif 192 1.1 christos return 0; 193 1.1 christos } 194 1.1 christos 195 1.1 christos rc->rcmd_port = sp; 196 1.1 christos rc->rcmd_portseq = tcp->th_seq; 197 1.1 christos 198 1.1 christos /* 199 1.1 christos * Initialise the packet info structure so we can search the NAT 200 1.1 christos * table to see if there already is soemthing present that matches 201 1.1 christos * up with what we want to add. 202 1.1 christos */ 203 1.1 christos bcopy((char *)fin, (char *)&fi, sizeof(fi)); 204 1.1 christos fi.fin_flx |= FI_IGNORE; 205 1.1 christos fi.fin_data[0] = 0; 206 1.1 christos fi.fin_data[1] = sp; 207 1.3 darrenr fi.fin_src6 = nat->nat_ndst6; 208 1.3 darrenr fi.fin_dst6 = nat->nat_nsrc6; 209 1.1 christos 210 1.3 darrenr if (nat->nat_v[0] == 6) { 211 1.3 darrenr #ifdef USE_INET6 212 1.3 darrenr if (nat->nat_dir == NAT_OUTBOUND) { 213 1.3 darrenr nat2 = ipf_nat6_outlookup(&fi, NAT_SEARCH|IPN_TCP, 214 1.3 darrenr nat->nat_pr[1], 215 1.3 darrenr &nat->nat_osrc6.in6, 216 1.3 darrenr &nat->nat_odst6.in6); 217 1.3 darrenr } else { 218 1.3 darrenr nat2 = ipf_nat6_inlookup(&fi, NAT_SEARCH|IPN_TCP, 219 1.3 darrenr nat->nat_pr[0], 220 1.3 darrenr &nat->nat_osrc6.in6, 221 1.3 darrenr &nat->nat_odst6.in6); 222 1.3 darrenr } 223 1.3 darrenr #else 224 1.3 darrenr nat2 = (void *)-1; 225 1.3 darrenr #endif 226 1.1 christos } else { 227 1.3 darrenr if (nat->nat_dir == NAT_OUTBOUND) { 228 1.3 darrenr nat2 = ipf_nat_outlookup(&fi, NAT_SEARCH|IPN_TCP, 229 1.3 darrenr nat->nat_pr[1], 230 1.3 darrenr nat->nat_osrcip, 231 1.3 darrenr nat->nat_odstip); 232 1.3 darrenr } else { 233 1.3 darrenr nat2 = ipf_nat_inlookup(&fi, NAT_SEARCH|IPN_TCP, 234 1.3 darrenr nat->nat_pr[0], 235 1.3 darrenr nat->nat_osrcip, 236 1.3 darrenr nat->nat_odstip); 237 1.3 darrenr } 238 1.1 christos } 239 1.3 darrenr if (nat2 != NULL) 240 1.3 darrenr return APR_ERR(1); 241 1.1 christos 242 1.3 darrenr /* 243 1.3 darrenr * Add skeleton NAT entry for connection which will come 244 1.3 darrenr * back the other way. 245 1.3 darrenr */ 246 1.3 darrenr 247 1.3 darrenr if (nat->nat_v[0] == 6) { 248 1.3 darrenr #ifdef USE_INET6 249 1.3 darrenr slen = ip6->ip6_plen; 250 1.3 darrenr ip6->ip6_plen = htons(sizeof(*tcp)); 251 1.1 christos #endif 252 1.3 darrenr } else { 253 1.1 christos slen = ip->ip_len; 254 1.1 christos ip->ip_len = htons(fin->fin_hlen + sizeof(*tcp)); 255 1.3 darrenr } 256 1.1 christos 257 1.3 darrenr /* 258 1.3 darrenr * Fill out the fake TCP header with a few fields that ipfilter 259 1.3 darrenr * considers to be important. 260 1.3 darrenr */ 261 1.3 darrenr bzero((char *)tcp2, sizeof(*tcp2)); 262 1.3 darrenr tcp2->th_win = htons(8192); 263 1.3 darrenr TCP_OFF_A(tcp2, 5); 264 1.3 darrenr tcp2->th_flags = TH_SYN; 265 1.3 darrenr 266 1.3 darrenr fi.fin_dp = (char *)tcp2; 267 1.3 darrenr fi.fin_fr = &rcmdfr; 268 1.3 darrenr fi.fin_dlen = sizeof(*tcp2); 269 1.3 darrenr fi.fin_plen = fi.fin_hlen + sizeof(*tcp2); 270 1.3 darrenr fi.fin_flx &= FI_LOWTTL|FI_FRAG|FI_TCPUDP|FI_OPTIONS|FI_IGNORE; 271 1.1 christos 272 1.3 darrenr if (nat->nat_dir == NAT_OUTBOUND) { 273 1.3 darrenr fi.fin_out = 0; 274 1.3 darrenr direction = NAT_INBOUND; 275 1.3 darrenr } else { 276 1.3 darrenr fi.fin_out = 1; 277 1.3 darrenr direction = NAT_OUTBOUND; 278 1.3 darrenr } 279 1.3 darrenr nflags = SI_W_SPORT|NAT_SLAVE|IPN_TCP; 280 1.1 christos 281 1.3 darrenr MUTEX_ENTER(&softn->ipf_nat_new); 282 1.3 darrenr if (fin->fin_v == 4) 283 1.3 darrenr nat2 = ipf_nat_add(&fi, rc->rcmd_rule, NULL, nflags, 284 1.1 christos direction); 285 1.3 darrenr #ifdef USE_INET6 286 1.3 darrenr else 287 1.3 darrenr nat2 = ipf_nat6_add(&fi, rc->rcmd_rule, NULL, nflags, 288 1.3 darrenr direction); 289 1.3 darrenr #endif 290 1.3 darrenr MUTEX_EXIT(&softn->ipf_nat_new); 291 1.1 christos 292 1.3 darrenr if (nat2 != NULL) { 293 1.3 darrenr (void) ipf_nat_proto(&fi, nat2, IPN_TCP); 294 1.3 darrenr MUTEX_ENTER(&nat2->nat_lock); 295 1.3 darrenr ipf_nat_update(&fi, nat2); 296 1.3 darrenr MUTEX_EXIT(&nat2->nat_lock); 297 1.3 darrenr fi.fin_ifp = NULL; 298 1.3 darrenr if (nat2->nat_dir == NAT_INBOUND) 299 1.3 darrenr fi.fin_dst6 = nat->nat_osrc6; 300 1.3 darrenr (void) ipf_state_add(softc, &fi, NULL, SI_W_SPORT); 301 1.3 darrenr } 302 1.3 darrenr if (nat->nat_v[0] == 6) { 303 1.3 darrenr #ifdef USE_INET6 304 1.3 darrenr ip6->ip6_plen = slen; 305 1.3 darrenr #endif 306 1.3 darrenr } else { 307 1.1 christos ip->ip_len = slen; 308 1.1 christos } 309 1.3 darrenr if (nat2 == NULL) 310 1.3 darrenr return APR_ERR(1); 311 1.1 christos return 0; 312 1.1 christos } 313 1.1 christos 314 1.1 christos 315 1.1 christos int 316 1.2 christos ipf_p_rcmd_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 317 1.1 christos { 318 1.1 christos if (nat->nat_dir == NAT_OUTBOUND) 319 1.1 christos return ipf_p_rcmd_portmsg(fin, aps, nat); 320 1.1 christos return 0; 321 1.1 christos } 322 1.1 christos 323 1.1 christos 324 1.1 christos int 325 1.2 christos ipf_p_rcmd_in(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 326 1.1 christos { 327 1.1 christos if (nat->nat_dir == NAT_INBOUND) 328 1.1 christos return ipf_p_rcmd_portmsg(fin, aps, nat); 329 1.1 christos return 0; 330 1.1 christos } 331