/* * Copyright (C) 2007-2009 Tobias Brunner * Copyright (C) 2005-2007 Martin Willi * Copyright (C) 2005 Jan Hutter * Hochschule fuer Technik Rapperswil * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include #include #include #include #include "traffic_selector.h" #include #include #include #define NON_SUBNET_ADDRESS_RANGE 255 ENUM(ts_type_name, TS_IPV4_ADDR_RANGE, TS_IPV6_ADDR_RANGE, "TS_IPV4_ADDR_RANGE", "TS_IPV6_ADDR_RANGE", ); typedef struct private_traffic_selector_t private_traffic_selector_t; /** * Private data of an traffic_selector_t object */ struct private_traffic_selector_t { /** * Public part */ traffic_selector_t public; /** * Type of address */ ts_type_t type; /** * IP protocol (UDP, TCP, ICMP, ...) */ u_int8_t protocol; /** * narrow this traffic selector to hosts external ip * if set, from and to have no meaning until set_address() is called */ bool dynamic; /** * subnet size in CIDR notation, 255 means a non-subnet address range */ u_int8_t netbits; /** * begin of address range, network order */ union { /** dummy char for common address manipulation */ char from[0]; /** IPv4 address */ u_int32_t from4[1]; /** IPv6 address */ u_int32_t from6[4]; }; /** * end of address range, network order */ union { /** dummy char for common address manipulation */ char to[0]; /** IPv4 address */ u_int32_t to4[1]; /** IPv6 address */ u_int32_t to6[4]; }; /** * begin of port range */ u_int16_t from_port; /** * end of port range */ u_int16_t to_port; }; /** * calculate the "to"-address for the "from" address and a subnet size */ static void calc_range(private_traffic_selector_t *this, u_int8_t netbits) { size_t len; int bytes, bits; u_int8_t mask; this->netbits = netbits; len = (this->type == TS_IPV4_ADDR_RANGE) ? 4 : 16; bytes = (netbits + 7)/8; bits = (bytes * 8) - netbits; mask = bits ? (1 << bits) - 1 : 0; memcpy(this->to, this->from, bytes); memset(this->from + bytes, 0x00, len - bytes); memset(this->to + bytes, 0xff, len - bytes); this->from[bytes-1] &= ~mask; this->to[bytes-1] |= mask; } /** * calculate the subnet size from the "to" and "from" addresses */ static u_int8_t calc_netbits(private_traffic_selector_t *this) { int byte, bit; u_int8_t netbits; size_t size = (this->type == TS_IPV4_ADDR_RANGE) ? 4 : 16; bool prefix = TRUE; /* a perfect match results in a single address with a /32 or /128 netmask */ netbits = (size * 8); this->netbits = netbits; /* go through all bits of the addresses, beginning in the front. * as long as they are equal, the subnet gets larger */ for (byte = 0; byte < size; byte++) { for (bit = 7; bit >= 0; bit--) { u_int8_t bitmask = 1 << bit; if (prefix) { if ((bitmask & this->from[byte]) != (bitmask & this->to[byte])) { /* store the common prefix which might be a true subnet */ netbits = (7 - bit) + (byte * 8); this->netbits = netbits; prefix = FALSE; } } else { if ((bitmask & this->from[byte]) || !(bitmask & this->to[byte])) { this->netbits = NON_SUBNET_ADDRESS_RANGE; return netbits; /* return a pseudo subnet */ } } } } return netbits; /* return a true subnet */ } /** * internal generic constructor */ static private_traffic_selector_t *traffic_selector_create(u_int8_t protocol, ts_type_t type, u_int16_t from_port, u_int16_t to_port); /** * Check if TS contains "opaque" ports */ static bool is_opaque(private_traffic_selector_t *this) { return this->from_port == 0xffff && this->to_port == 0; } /** * Check if TS contains "any" ports */ static bool is_any(private_traffic_selector_t *this) { return this->from_port == 0 && this->to_port == 0xffff; } /** * Described in header. */ int traffic_selector_printf_hook(printf_hook_data_t *data, printf_hook_spec_t *spec, const void *const *args) { private_traffic_selector_t *this = *((private_traffic_selector_t**)(args[0])); linked_list_t *list = *((linked_list_t**)(args[0])); enumerator_t *enumerator; char from_str[INET6_ADDRSTRLEN] = ""; char to_str[INET6_ADDRSTRLEN] = ""; char *serv_proto = NULL; bool has_proto; bool has_ports; size_t written = 0; u_int32_t from[4], to[4]; if (this == NULL) { return print_in_hook(data, "(null)"); } if (spec->hash) { enumerator = list->create_enumerator(list); while (enumerator->enumerate(enumerator, (void**)&this)) { /* call recursivly */ written += print_in_hook(data, "%R ", this); } enumerator->destroy(enumerator); return written; } memset(from, 0, sizeof(from)); memset(to, 0xFF, sizeof(to)); if (this->dynamic && memeq(this->from, from, this->type == TS_IPV4_ADDR_RANGE ? 4 : 16) && memeq(this->to, to, this->type == TS_IPV4_ADDR_RANGE ? 4 : 16)) { written += print_in_hook(data, "dynamic"); } else { if (this->type == TS_IPV4_ADDR_RANGE) { inet_ntop(AF_INET, &this->from4, from_str, sizeof(from_str)); } else { inet_ntop(AF_INET6, &this->from6, from_str, sizeof(from_str)); } if (this->netbits == NON_SUBNET_ADDRESS_RANGE) { if (this->type == TS_IPV4_ADDR_RANGE) { inet_ntop(AF_INET, &this->to4, to_str, sizeof(to_str)); } else { inet_ntop(AF_INET6, &this->to6, to_str, sizeof(to_str)); } written += print_in_hook(data, "%s..%s", from_str, to_str); } else { written += print_in_hook(data, "%s/%d", from_str, this->netbits); } } /* check if we have protocol and/or port selectors */ has_proto = this->protocol != 0; has_ports = !is_any(this); if (!has_proto && !has_ports) { return written; } written += print_in_hook(data, "["); /* build protocol string */ if (has_proto) { struct protoent *proto = getprotobynumber(this->protocol); if (proto) { written += print_in_hook(data, "%s", proto->p_name); serv_proto = proto->p_name; } else { written += print_in_hook(data, "%d", this->protocol); } } if (has_proto && has_ports) { written += print_in_hook(data, "/"); } /* build port string */ if (has_ports) { if (this->from_port == this->to_port) { struct servent *serv; serv = getservbyport(htons(this->from_port), serv_proto); if (serv) { written += print_in_hook(data, "%s", serv->s_name); } else { written += print_in_hook(data, "%d", this->from_port); } } else if (is_opaque(this)) { written += print_in_hook(data, "OPAQUE"); } else { written += print_in_hook(data, "%d-%d", this->from_port, this->to_port); } } written += print_in_hook(data, "]"); return written; } METHOD(traffic_selector_t, get_subset, traffic_selector_t*, private_traffic_selector_t *this, traffic_selector_t *other_public) { private_traffic_selector_t *other, *subset; u_int16_t from_port, to_port; u_char *from, *to; u_int8_t protocol; size_t size; other = (private_traffic_selector_t*)other_public; if (this->dynamic || other->dynamic) { /* no set_address() applied, TS has no subset */ return NULL; } if (this->type != other->type) { return NULL; } switch (this->type) { case TS_IPV4_ADDR_RANGE: size = sizeof(this->from4); break; case TS_IPV6_ADDR_RANGE: size = sizeof(this->from6); break; default: return NULL; } if (this->protocol != other->protocol && this->protocol != 0 && other->protocol != 0) { return NULL; } /* select protocol, which is not zero */ protocol = max(this->protocol, other->protocol); if ((is_opaque(this) && is_opaque(other)) || (is_opaque(this) && is_any(other)) || (is_opaque(other) && is_any(this))) { from_port = 0xffff; to_port = 0; } else { /* calculate the maximum port range allowed for both */ from_port = max(this->from_port, other->from_port); to_port = min(this->to_port, other->to_port); if (from_port > to_port) { return NULL; } } /* get higher from-address */ if (memcmp(this->from, other->from, size) > 0) { from = this->from; } else { from = other->from; } /* get lower to-address */ if (memcmp(this->to, other->to, size) > 0) { to = other->to; } else { to = this->to; } /* if "from" > "to", we don't have a match */ if (memcmp(from, to, size) > 0) { return NULL; } /* we have a match in protocol, port, and address: return it... */ subset = traffic_selector_create(protocol, this->type, from_port, to_port); memcpy(subset->from, from, size); memcpy(subset->to, to, size); calc_netbits(subset); return &subset->public; } METHOD(traffic_selector_t, equals, bool, private_traffic_selector_t *this, traffic_selector_t *other_public) { private_traffic_selector_t *other; other = (private_traffic_selector_t*)other_public; if (this->type != other->type) { return FALSE; } if (!(this->from_port == other->from_port && this->to_port == other->to_port && this->protocol == other->protocol)) { return FALSE; } switch (this->type) { case TS_IPV4_ADDR_RANGE: if (memeq(this->from4, other->from4, sizeof(this->from4)) && memeq(this->to4, other->to4, sizeof(this->to4))) { return TRUE; } break; case TS_IPV6_ADDR_RANGE: if (memeq(this->from6, other->from6, sizeof(this->from6)) && memeq(this->to6, other->to6, sizeof(this->to6))) { return TRUE; } break; default: break; } return FALSE; } METHOD(traffic_selector_t, get_from_address, chunk_t, private_traffic_selector_t *this) { switch (this->type) { case TS_IPV4_ADDR_RANGE: return chunk_create(this->from, sizeof(this->from4)); case TS_IPV6_ADDR_RANGE: return chunk_create(this->from, sizeof(this->from6)); default: return chunk_empty; } } METHOD(traffic_selector_t, get_to_address, chunk_t, private_traffic_selector_t *this) { switch (this->type) { case TS_IPV4_ADDR_RANGE: return chunk_create(this->to, sizeof(this->to4)); case TS_IPV6_ADDR_RANGE: return chunk_create(this->to, sizeof(this->to6)); default: return chunk_empty; } } METHOD(traffic_selector_t, get_from_port, u_int16_t, private_traffic_selector_t *this) { return this->from_port; } METHOD(traffic_selector_t, get_to_port, u_int16_t, private_traffic_selector_t *this) { return this->to_port; } METHOD(traffic_selector_t, get_type, ts_type_t, private_traffic_selector_t *this) { return this->type; } METHOD(traffic_selector_t, get_protocol, u_int8_t, private_traffic_selector_t *this) { return this->protocol; } METHOD(traffic_selector_t, is_host, bool, private_traffic_selector_t *this, host_t *host) { if (host) { chunk_t addr; int family = host->get_family(host); if ((family == AF_INET && this->type == TS_IPV4_ADDR_RANGE) || (family == AF_INET6 && this->type == TS_IPV6_ADDR_RANGE)) { addr = host->get_address(host); if (memeq(addr.ptr, this->from, addr.len) && memeq(addr.ptr, this->to, addr.len)) { return TRUE; } } } else { size_t length = (this->type == TS_IPV4_ADDR_RANGE) ? 4 : 16; if (this->dynamic) { return TRUE; } if (memeq(this->from, this->to, length)) { return TRUE; } } return FALSE; } METHOD(traffic_selector_t, is_dynamic, bool, private_traffic_selector_t *this) { return this->dynamic; } METHOD(traffic_selector_t, set_address, void, private_traffic_selector_t *this, host_t *host) { if (is_host(this, NULL)) { this->type = host->get_family(host) == AF_INET ? TS_IPV4_ADDR_RANGE : TS_IPV6_ADDR_RANGE; if (host->is_anyaddr(host)) { memset(this->from6, 0x00, sizeof(this->from6)); memset(this->to6, 0xFF, sizeof(this->to6)); this->netbits = 0; } else { chunk_t from = host->get_address(host); memcpy(this->from, from.ptr, from.len); memcpy(this->to, from.ptr, from.len); this->netbits = from.len * 8; } this->dynamic = FALSE; } } METHOD(traffic_selector_t, is_contained_in, bool, private_traffic_selector_t *this, traffic_selector_t *other) { private_traffic_selector_t *subset; bool contained_in = FALSE; subset = (private_traffic_selector_t*)get_subset(this, other); if (subset) { if (equals(subset, &this->public)) { contained_in = TRUE; } free(subset); } return contained_in; } METHOD(traffic_selector_t, includes, bool, private_traffic_selector_t *this, host_t *host) { chunk_t addr; int family = host->get_family(host); if ((family == AF_INET && this->type == TS_IPV4_ADDR_RANGE) || (family == AF_INET6 && this->type == TS_IPV6_ADDR_RANGE)) { addr = host->get_address(host); return memcmp(this->from, addr.ptr, addr.len) <= 0 && memcmp(this->to, addr.ptr, addr.len) >= 0; } return FALSE; } METHOD(traffic_selector_t, to_subnet, bool, private_traffic_selector_t *this, host_t **net, u_int8_t *mask) { /* there is no way to do this cleanly, as the address range may * be anything else but a subnet. We use from_addr as subnet * and try to calculate a usable subnet mask. */ int family, non_zero_bytes; u_int16_t port = 0; chunk_t net_chunk; *mask = (this->netbits == NON_SUBNET_ADDRESS_RANGE) ? calc_netbits(this) : this->netbits; switch (this->type) { case TS_IPV4_ADDR_RANGE: family = AF_INET; net_chunk.len = sizeof(this->from4); break; case TS_IPV6_ADDR_RANGE: family = AF_INET6; net_chunk.len = sizeof(this->from6); break; default: /* unreachable */ return FALSE; } net_chunk.ptr = malloc(net_chunk.len); memset(net_chunk.ptr, 0x00, net_chunk.len); if (*mask) { non_zero_bytes = (*mask + 7) / 8; memcpy(net_chunk.ptr, this->from, non_zero_bytes); net_chunk.ptr[non_zero_bytes-1] &= 0xFF << (8 * non_zero_bytes - *mask); } if (this->to_port == this->from_port) { port = this->to_port; } *net = host_create_from_chunk(family, net_chunk, port); chunk_free(&net_chunk); return this->netbits != NON_SUBNET_ADDRESS_RANGE; } METHOD(traffic_selector_t, clone_, traffic_selector_t*, private_traffic_selector_t *this) { private_traffic_selector_t *clone; clone = traffic_selector_create(this->protocol, this->type, this->from_port, this->to_port); clone->netbits = this->netbits; clone->dynamic = this->dynamic; switch (clone->type) { case TS_IPV4_ADDR_RANGE: memcpy(clone->from4, this->from4, sizeof(this->from4)); memcpy(clone->to4, this->to4, sizeof(this->to4)); return &clone->public; case TS_IPV6_ADDR_RANGE: memcpy(clone->from6, this->from6, sizeof(this->from6)); memcpy(clone->to6, this->to6, sizeof(this->to6)); return &clone->public; default: /* unreachable */ return &clone->public; } } METHOD(traffic_selector_t, destroy, void, private_traffic_selector_t *this) { free(this); } /* * see header */ traffic_selector_t *traffic_selector_create_from_bytes(u_int8_t protocol, ts_type_t type, chunk_t from, u_int16_t from_port, chunk_t to, u_int16_t to_port) { private_traffic_selector_t *this = traffic_selector_create(protocol, type, from_port, to_port); switch (type) { case TS_IPV4_ADDR_RANGE: if (from.len != 4 || to.len != 4) { free(this); return NULL; } memcpy(this->from4, from.ptr, from.len); memcpy(this->to4, to.ptr, to.len); break; case TS_IPV6_ADDR_RANGE: if (from.len != 16 || to.len != 16) { free(this); return NULL; } memcpy(this->from6, from.ptr, from.len); memcpy(this->to6, to.ptr, to.len); break; default: free(this); return NULL; } calc_netbits(this); return (&this->public); } /* * see header */ traffic_selector_t *traffic_selector_create_from_rfc3779_format(ts_type_t type, chunk_t from, chunk_t to) { size_t len; private_traffic_selector_t *this = traffic_selector_create(0, type, 0, 65535); switch (type) { case TS_IPV4_ADDR_RANGE: len = 4; break; case TS_IPV6_ADDR_RANGE: len = 16; break; default: free(this); return NULL; } memset(this->from, 0x00, len); memset(this->to , 0xff, len); if (from.len > 1) { memcpy(this->from, from.ptr+1, from.len-1); } if (to.len > 1) { u_int8_t mask = to.ptr[0] ? (1 << to.ptr[0]) - 1 : 0; memcpy(this->to, to.ptr+1, to.len-1); this->to[to.len-2] |= mask; } this->netbits = chunk_equals(from, to) ? (from.len-1)*8 - from.ptr[0] : NON_SUBNET_ADDRESS_RANGE; return (&this->public); } /* * see header */ traffic_selector_t *traffic_selector_create_from_subnet(host_t *net, u_int8_t netbits, u_int8_t protocol, u_int16_t from_port, u_int16_t to_port) { private_traffic_selector_t *this; chunk_t from; this = traffic_selector_create(protocol, 0, from_port, to_port); switch (net->get_family(net)) { case AF_INET: this->type = TS_IPV4_ADDR_RANGE; break; case AF_INET6: this->type = TS_IPV6_ADDR_RANGE; break; default: net->destroy(net); free(this); return NULL; } from = net->get_address(net); memcpy(this->from, from.ptr, from.len); netbits = min(netbits, this->type == TS_IPV4_ADDR_RANGE ? 32 : 128); calc_range(this, netbits); net->destroy(net); return &this->public; } /* * see header */ traffic_selector_t *traffic_selector_create_from_string( u_int8_t protocol, ts_type_t type, char *from_addr, u_int16_t from_port, char *to_addr, u_int16_t to_port) { private_traffic_selector_t *this; int family; switch (type) { case TS_IPV4_ADDR_RANGE: family = AF_INET; break; case TS_IPV6_ADDR_RANGE: family = AF_INET6; break; default: return NULL; } this = traffic_selector_create(protocol, type, from_port, to_port); if (inet_pton(family, from_addr, this->from) != 1 || inet_pton(family, to_addr, this->to) != 1) { free(this); return NULL; } calc_netbits(this); return &this->public; } /* * see header */ traffic_selector_t *traffic_selector_create_from_cidr( char *string, u_int8_t protocol, u_int16_t from_port, u_int16_t to_port) { host_t *net; int bits; net = host_create_from_subnet(string, &bits); if (net) { return traffic_selector_create_from_subnet(net, bits, protocol, from_port, to_port); } return NULL; } /* * see header */ traffic_selector_t *traffic_selector_create_dynamic(u_int8_t protocol, u_int16_t from_port, u_int16_t to_port) { private_traffic_selector_t *this = traffic_selector_create( protocol, TS_IPV4_ADDR_RANGE, from_port, to_port); memset(this->from6, 0, sizeof(this->from6)); memset(this->to6, 0xFF, sizeof(this->to6)); this->netbits = 0; this->dynamic = TRUE; return &this->public; } /* * see declaration */ static private_traffic_selector_t *traffic_selector_create(u_int8_t protocol, ts_type_t type, u_int16_t from_port, u_int16_t to_port) { private_traffic_selector_t *this; INIT(this, .public = { .get_subset = _get_subset, .equals = _equals, .get_from_address = _get_from_address, .get_to_address = _get_to_address, .get_from_port = _get_from_port, .get_to_port = _get_to_port, .get_type = _get_type, .get_protocol = _get_protocol, .is_host = _is_host, .is_dynamic = _is_dynamic, .is_contained_in = _is_contained_in, .includes = _includes, .set_address = _set_address, .to_subnet = _to_subnet, .clone = _clone_, .destroy = _destroy, }, .from_port = from_port, .to_port = to_port, .protocol = protocol, .type = type, ); return this; }