1 2 /* 3 * Copyright (C) 2012 by Darren Reed. 4 * 5 * See the IPFILTER.LICENCE file for details on licencing. 6 */ 7 #if defined(KERNEL) || defined(_KERNEL) 8 # undef KERNEL 9 # undef _KERNEL 10 # define KERNEL 1 11 # define _KERNEL 1 12 #endif 13 #include <sys/errno.h> 14 #include <sys/types.h> 15 #include <sys/param.h> 16 #include <sys/time.h> 17 #include <sys/file.h> 18 #if defined(_KERNEL) && \ 19 (defined(__NetBSD_Version) && (__NetBSD_Version >= 399002000)) 20 # include <sys/kauth.h> 21 #endif 22 #if !defined(_KERNEL) 23 # include <stdio.h> 24 # include <string.h> 25 # include <stdlib.h> 26 # define KERNEL 27 # ifdef _OpenBSD__ 28 struct file; 29 # endif 30 # include <sys/uio.h> 31 # undef KERNEL 32 #endif 33 #if defined(_KERNEL) && defined(__FreeBSD__) 34 # include <sys/filio.h> 35 # include <sys/fcntl.h> 36 #else 37 # include <sys/ioctl.h> 38 #endif 39 # include <sys/fcntl.h> 40 # include <sys/protosw.h> 41 #include <sys/socket.h> 42 #if defined(_KERNEL) 43 # include <sys/systm.h> 44 # if defined(__FreeBSD__) 45 # include <sys/jail.h> 46 # endif 47 # if !defined(__SVR4) 48 # include <sys/mbuf.h> 49 # endif 50 #endif 51 #if defined(__SVR4) 52 # include <sys/filio.h> 53 # include <sys/byteorder.h> 54 # ifdef KERNEL 55 # include <sys/dditypes.h> 56 # endif 57 # include <sys/stream.h> 58 # include <sys/kmem.h> 59 #endif 60 #if defined(__FreeBSD__) 61 # include <sys/queue.h> 62 #endif 63 #include <net/if.h> 64 #if defined(__FreeBSD__) 65 # include <net/if_var.h> 66 #endif 67 #ifdef sun 68 # include <net/af.h> 69 #endif 70 #include <netinet/in.h> 71 #include <netinet/in_systm.h> 72 #include <netinet/ip.h> 73 74 #ifdef RFC1825 75 # include <vpn/md5.h> 76 # include <vpn/ipsec.h> 77 extern struct ifnet vpnif; 78 #endif 79 80 # include <netinet/ip_var.h> 81 #include <netinet/tcp.h> 82 #include <netinet/udp.h> 83 #include <netinet/ip_icmp.h> 84 #include "netinet/ip_compat.h" 85 #include <netinet/tcpip.h> 86 #include "netinet/ipl.h" 87 #include "netinet/ip_fil.h" 88 #include "netinet/ip_nat.h" 89 #include "netinet/ip_frag.h" 90 #include "netinet/ip_state.h" 91 #include "netinet/ip_proxy.h" 92 #include "netinet/ip_lookup.h" 93 #include "netinet/ip_dstlist.h" 94 #include "netinet/ip_sync.h" 95 #if defined(__FreeBSD__) 96 # include <sys/malloc.h> 97 #endif 98 #ifdef HAS_SYS_MD5_H 99 # include <sys/md5.h> 100 #else 101 # include "md5.h" 102 #endif 103 /* END OF INCLUDES */ 104 105 #undef SOCKADDR_IN 106 #define SOCKADDR_IN struct sockaddr_in 107 108 109 110 #define NATFSUM(n,v,f) ((v) == 4 ? (n)->f.in4.s_addr : (n)->f.i6[0] + \ 111 (n)->f.i6[1] + (n)->f.i6[2] + (n)->f.i6[3]) 112 #define NBUMP(x) softn->(x)++ 113 #define NBUMPD(x, y) do { \ 114 softn->x.y++; \ 115 DT(y); \ 116 } while (0) 117 #define NBUMPSIDE(y,x) softn->ipf_nat_stats.ns_side[y].x++ 118 #define NBUMPSIDED(y,x) do { softn->ipf_nat_stats.ns_side[y].x++; \ 119 DT(x); } while (0) 120 #define NBUMPSIDEX(y,x,z) \ 121 do { softn->ipf_nat_stats.ns_side[y].x++; \ 122 DT(z); } while (0) 123 #define NBUMPSIDEDF(y,x)do { softn->ipf_nat_stats.ns_side[y].x++; \ 124 DT1(x, fr_info_t *, fin); } while (0) 125 126 static ipftuneable_t ipf_nat_tuneables[] = { 127 /* nat */ 128 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_lock) }, 129 "nat_lock", 0, 1, 130 stsizeof(ipf_nat_softc_t, ipf_nat_lock), 131 IPFT_RDONLY, NULL, NULL }, 132 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_table_sz) }, 133 "nat_table_size", 1, 0x7fffffff, 134 stsizeof(ipf_nat_softc_t, ipf_nat_table_sz), 135 0, NULL, ipf_nat_rehash }, 136 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_table_max) }, 137 "nat_table_max", 1, 0x7fffffff, 138 stsizeof(ipf_nat_softc_t, ipf_nat_table_max), 139 0, NULL, NULL }, 140 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_maprules_sz) }, 141 "nat_rules_size", 1, 0x7fffffff, 142 stsizeof(ipf_nat_softc_t, ipf_nat_maprules_sz), 143 0, NULL, ipf_nat_rehash_rules }, 144 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_rdrrules_sz) }, 145 "rdr_rules_size", 1, 0x7fffffff, 146 stsizeof(ipf_nat_softc_t, ipf_nat_rdrrules_sz), 147 0, NULL, ipf_nat_rehash_rules }, 148 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_hostmap_sz) }, 149 "hostmap_size", 1, 0x7fffffff, 150 stsizeof(ipf_nat_softc_t, ipf_nat_hostmap_sz), 151 0, NULL, ipf_nat_hostmap_rehash }, 152 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_maxbucket) }, 153 "nat_maxbucket",1, 0x7fffffff, 154 stsizeof(ipf_nat_softc_t, ipf_nat_maxbucket), 155 0, NULL, NULL }, 156 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_logging) }, 157 "nat_logging", 0, 1, 158 stsizeof(ipf_nat_softc_t, ipf_nat_logging), 159 0, NULL, NULL }, 160 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_doflush) }, 161 "nat_doflush", 0, 1, 162 stsizeof(ipf_nat_softc_t, ipf_nat_doflush), 163 0, NULL, NULL }, 164 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_table_wm_low) }, 165 "nat_table_wm_low", 1, 99, 166 stsizeof(ipf_nat_softc_t, ipf_nat_table_wm_low), 167 0, NULL, NULL }, 168 { { (void *)offsetof(ipf_nat_softc_t, ipf_nat_table_wm_high) }, 169 "nat_table_wm_high", 2, 100, 170 stsizeof(ipf_nat_softc_t, ipf_nat_table_wm_high), 171 0, NULL, NULL }, 172 { { 0 }, 173 NULL, 0, 0, 174 0, 175 0, NULL, NULL } 176 }; 177 178 /* ======================================================================== */ 179 /* How the NAT is organised and works. */ 180 /* */ 181 /* Inside (interface y) NAT Outside (interface x) */ 182 /* -------------------- -+- ------------------------------------- */ 183 /* Packet going | out, processed by ipf_nat_checkout() for x */ 184 /* ------------> | ------------> */ 185 /* src=10.1.1.1 | src=192.1.1.1 */ 186 /* | */ 187 /* | in, processed by ipf_nat_checkin() for x */ 188 /* <------------ | <------------ */ 189 /* dst=10.1.1.1 | dst=192.1.1.1 */ 190 /* -------------------- -+- ------------------------------------- */ 191 /* ipf_nat_checkout() - changes ip_src and if required, sport */ 192 /* - creates a new mapping, if required. */ 193 /* ipf_nat_checkin() - changes ip_dst and if required, dport */ 194 /* */ 195 /* In the NAT table, internal source is recorded as "in" and externally */ 196 /* seen as "out". */ 197 /* ======================================================================== */ 198 199 200 #if SOLARIS && !defined(INSTANCES) 201 extern int pfil_delayed_copy; 202 #endif 203 204 static int ipf_nat_flush_entry(ipf_main_softc_t *, void *); 205 static int ipf_nat_getent(ipf_main_softc_t *, caddr_t, int); 206 static int ipf_nat_getsz(ipf_main_softc_t *, caddr_t, int); 207 static int ipf_nat_putent(ipf_main_softc_t *, caddr_t, int); 208 static void ipf_nat_addmap(ipf_nat_softc_t *, ipnat_t *); 209 static void ipf_nat_addrdr(ipf_nat_softc_t *, ipnat_t *); 210 static int ipf_nat_builddivertmp(ipf_nat_softc_t *, ipnat_t *); 211 static int ipf_nat_clearlist(ipf_main_softc_t *, ipf_nat_softc_t *); 212 static int ipf_nat_cmp_rules(ipnat_t *, ipnat_t *); 213 static int ipf_nat_decap(fr_info_t *, nat_t *); 214 static void ipf_nat_delrule(ipf_main_softc_t *, ipf_nat_softc_t *, 215 ipnat_t *, int); 216 static int ipf_nat_extraflush(ipf_main_softc_t *, ipf_nat_softc_t *, int); 217 static int ipf_nat_finalise(fr_info_t *, nat_t *); 218 static int ipf_nat_flushtable(ipf_main_softc_t *, ipf_nat_softc_t *); 219 static int ipf_nat_getnext(ipf_main_softc_t *, ipftoken_t *, 220 ipfgeniter_t *, ipfobj_t *); 221 static int ipf_nat_gettable(ipf_main_softc_t *, ipf_nat_softc_t *, 222 char *); 223 static hostmap_t *ipf_nat_hostmap(ipf_nat_softc_t *, ipnat_t *, 224 struct in_addr, struct in_addr, 225 struct in_addr, u_32_t); 226 static int ipf_nat_icmpquerytype(int); 227 static int ipf_nat_iterator(ipf_main_softc_t *, ipftoken_t *, 228 ipfgeniter_t *, ipfobj_t *); 229 static int ipf_nat_match(fr_info_t *, ipnat_t *); 230 static int ipf_nat_matcharray(nat_t *, int *, u_long); 231 static int ipf_nat_matchflush(ipf_main_softc_t *, ipf_nat_softc_t *, 232 caddr_t); 233 static void ipf_nat_mssclamp(tcphdr_t *, u_32_t, fr_info_t *, 234 u_short *); 235 static int ipf_nat_newmap(fr_info_t *, nat_t *, natinfo_t *); 236 static int ipf_nat_newdivert(fr_info_t *, nat_t *, natinfo_t *); 237 static int ipf_nat_newrdr(fr_info_t *, nat_t *, natinfo_t *); 238 static int ipf_nat_newrewrite(fr_info_t *, nat_t *, natinfo_t *); 239 static int ipf_nat_nextaddr(fr_info_t *, nat_addr_t *, u_32_t *, 240 u_32_t *); 241 static int ipf_nat_nextaddrinit(ipf_main_softc_t *, char *, 242 nat_addr_t *, int, void *); 243 static int ipf_nat_resolverule(ipf_main_softc_t *, ipnat_t *); 244 static int ipf_nat_ruleaddrinit(ipf_main_softc_t *, 245 ipf_nat_softc_t *, ipnat_t *); 246 static void ipf_nat_rule_fini(ipf_main_softc_t *, ipnat_t *); 247 static int ipf_nat_rule_init(ipf_main_softc_t *, ipf_nat_softc_t *, 248 ipnat_t *); 249 static int ipf_nat_siocaddnat(ipf_main_softc_t *, ipf_nat_softc_t *, 250 ipnat_t *, int); 251 static void ipf_nat_siocdelnat(ipf_main_softc_t *, ipf_nat_softc_t *, 252 ipnat_t *, int); 253 static void ipf_nat_tabmove(ipf_nat_softc_t *, nat_t *); 254 255 /* ------------------------------------------------------------------------ */ 256 /* Function: ipf_nat_main_load */ 257 /* Returns: int - 0 == success, -1 == failure */ 258 /* Parameters: Nil */ 259 /* */ 260 /* The only global NAT structure that needs to be initialised is the filter */ 261 /* rule that is used with blocking packets. */ 262 /* ------------------------------------------------------------------------ */ 263 int ipf_nat_main_load(void)264 ipf_nat_main_load(void) 265 { 266 267 return (0); 268 } 269 270 271 /* ------------------------------------------------------------------------ */ 272 /* Function: ipf_nat_main_unload */ 273 /* Returns: int - 0 == success, -1 == failure */ 274 /* Parameters: Nil */ 275 /* */ 276 /* A null-op function that exists as a placeholder so that the flow in */ 277 /* other functions is obvious. */ 278 /* ------------------------------------------------------------------------ */ 279 int ipf_nat_main_unload(void)280 ipf_nat_main_unload(void) 281 { 282 return (0); 283 } 284 285 286 /* ------------------------------------------------------------------------ */ 287 /* Function: ipf_nat_soft_create */ 288 /* Returns: void * - NULL = failure, else pointer to NAT context */ 289 /* Parameters: softc(I) - pointer to soft context main structure */ 290 /* */ 291 /* Allocate the initial soft context structure for NAT and populate it with */ 292 /* some default values. Creating the tables is left until we call _init so */ 293 /* that sizes can be changed before we get under way. */ 294 /* ------------------------------------------------------------------------ */ 295 void * ipf_nat_soft_create(ipf_main_softc_t * softc)296 ipf_nat_soft_create(ipf_main_softc_t *softc) 297 { 298 ipf_nat_softc_t *softn; 299 300 KMALLOC(softn, ipf_nat_softc_t *); 301 if (softn == NULL) 302 return (NULL); 303 304 bzero((char *)softn, sizeof(*softn)); 305 306 softn->ipf_nat_tune = ipf_tune_array_copy(softn, 307 sizeof(ipf_nat_tuneables), 308 ipf_nat_tuneables); 309 if (softn->ipf_nat_tune == NULL) { 310 ipf_nat_soft_destroy(softc, softn); 311 return (NULL); 312 } 313 if (ipf_tune_array_link(softc, softn->ipf_nat_tune) == -1) { 314 ipf_nat_soft_destroy(softc, softn); 315 return (NULL); 316 } 317 318 softn->ipf_nat_list_tail = &softn->ipf_nat_list; 319 320 if (softc->ipf_large_nat) { 321 softn->ipf_nat_table_max = NAT_TABLE_MAX_LARGE; 322 softn->ipf_nat_table_sz = NAT_TABLE_SZ_LARGE; 323 softn->ipf_nat_maprules_sz = NAT_SIZE_LARGE; 324 softn->ipf_nat_rdrrules_sz = RDR_SIZE_LARGE; 325 softn->ipf_nat_hostmap_sz = HOSTMAP_SIZE_LARGE; 326 } else { 327 softn->ipf_nat_table_max = NAT_TABLE_MAX_NORMAL; 328 softn->ipf_nat_table_sz = NAT_TABLE_SZ_NORMAL; 329 softn->ipf_nat_maprules_sz = NAT_SIZE_NORMAL; 330 softn->ipf_nat_rdrrules_sz = RDR_SIZE_NORMAL; 331 softn->ipf_nat_hostmap_sz = HOSTMAP_SIZE_NORMAL; 332 } 333 softn->ipf_nat_doflush = 0; 334 #ifdef IPFILTER_LOG 335 softn->ipf_nat_logging = 1; 336 #else 337 softn->ipf_nat_logging = 0; 338 #endif 339 340 softn->ipf_nat_defage = DEF_NAT_AGE; 341 softn->ipf_nat_defipage = IPF_TTLVAL(60); 342 softn->ipf_nat_deficmpage = IPF_TTLVAL(3); 343 softn->ipf_nat_table_wm_high = 99; 344 softn->ipf_nat_table_wm_low = 90; 345 346 return (softn); 347 } 348 349 /* ------------------------------------------------------------------------ */ 350 /* Function: ipf_nat_soft_destroy */ 351 /* Returns: Nil */ 352 /* Parameters: softc(I) - pointer to soft context main structure */ 353 /* */ 354 /* ------------------------------------------------------------------------ */ 355 void ipf_nat_soft_destroy(ipf_main_softc_t * softc,void * arg)356 ipf_nat_soft_destroy(ipf_main_softc_t *softc, void *arg) 357 { 358 ipf_nat_softc_t *softn = arg; 359 360 if (softn->ipf_nat_tune != NULL) { 361 ipf_tune_array_unlink(softc, softn->ipf_nat_tune); 362 KFREES(softn->ipf_nat_tune, sizeof(ipf_nat_tuneables)); 363 softn->ipf_nat_tune = NULL; 364 } 365 366 KFREE(softn); 367 } 368 369 370 /* ------------------------------------------------------------------------ */ 371 /* Function: ipf_nat_init */ 372 /* Returns: int - 0 == success, -1 == failure */ 373 /* Parameters: softc(I) - pointer to soft context main structure */ 374 /* */ 375 /* Initialise all of the NAT locks, tables and other structures. */ 376 /* ------------------------------------------------------------------------ */ 377 int ipf_nat_soft_init(ipf_main_softc_t * softc,void * arg)378 ipf_nat_soft_init(ipf_main_softc_t *softc, void *arg) 379 { 380 ipf_nat_softc_t *softn = arg; 381 ipftq_t *tq; 382 int i; 383 384 KMALLOCS(softn->ipf_nat_table[0], nat_t **, \ 385 sizeof(nat_t *) * softn->ipf_nat_table_sz); 386 387 if (softn->ipf_nat_table[0] != NULL) { 388 bzero((char *)softn->ipf_nat_table[0], 389 softn->ipf_nat_table_sz * sizeof(nat_t *)); 390 } else { 391 return (-1); 392 } 393 394 KMALLOCS(softn->ipf_nat_table[1], nat_t **, \ 395 sizeof(nat_t *) * softn->ipf_nat_table_sz); 396 397 if (softn->ipf_nat_table[1] != NULL) { 398 bzero((char *)softn->ipf_nat_table[1], 399 softn->ipf_nat_table_sz * sizeof(nat_t *)); 400 } else { 401 return (-2); 402 } 403 404 KMALLOCS(softn->ipf_nat_map_rules, ipnat_t **, \ 405 sizeof(ipnat_t *) * softn->ipf_nat_maprules_sz); 406 407 if (softn->ipf_nat_map_rules != NULL) { 408 bzero((char *)softn->ipf_nat_map_rules, 409 softn->ipf_nat_maprules_sz * sizeof(ipnat_t *)); 410 } else { 411 return (-3); 412 } 413 414 KMALLOCS(softn->ipf_nat_rdr_rules, ipnat_t **, \ 415 sizeof(ipnat_t *) * softn->ipf_nat_rdrrules_sz); 416 417 if (softn->ipf_nat_rdr_rules != NULL) { 418 bzero((char *)softn->ipf_nat_rdr_rules, 419 softn->ipf_nat_rdrrules_sz * sizeof(ipnat_t *)); 420 } else { 421 return (-4); 422 } 423 424 KMALLOCS(softn->ipf_hm_maptable, hostmap_t **, \ 425 sizeof(hostmap_t *) * softn->ipf_nat_hostmap_sz); 426 427 if (softn->ipf_hm_maptable != NULL) { 428 bzero((char *)softn->ipf_hm_maptable, 429 sizeof(hostmap_t *) * softn->ipf_nat_hostmap_sz); 430 } else { 431 return (-5); 432 } 433 softn->ipf_hm_maplist = NULL; 434 435 KMALLOCS(softn->ipf_nat_stats.ns_side[0].ns_bucketlen, u_int *, 436 softn->ipf_nat_table_sz * sizeof(u_int)); 437 438 if (softn->ipf_nat_stats.ns_side[0].ns_bucketlen == NULL) { 439 return (-6); 440 } 441 bzero((char *)softn->ipf_nat_stats.ns_side[0].ns_bucketlen, 442 softn->ipf_nat_table_sz * sizeof(u_int)); 443 444 KMALLOCS(softn->ipf_nat_stats.ns_side[1].ns_bucketlen, u_int *, 445 softn->ipf_nat_table_sz * sizeof(u_int)); 446 447 if (softn->ipf_nat_stats.ns_side[1].ns_bucketlen == NULL) { 448 return (-7); 449 } 450 451 bzero((char *)softn->ipf_nat_stats.ns_side[1].ns_bucketlen, 452 softn->ipf_nat_table_sz * sizeof(u_int)); 453 454 if (softn->ipf_nat_maxbucket == 0) { 455 for (i = softn->ipf_nat_table_sz; i > 0; i >>= 1) 456 softn->ipf_nat_maxbucket++; 457 softn->ipf_nat_maxbucket *= 2; 458 } 459 460 ipf_sttab_init(softc, softn->ipf_nat_tcptq); 461 /* 462 * Increase this because we may have "keep state" following this too 463 * and packet storms can occur if this is removed too quickly. 464 */ 465 softn->ipf_nat_tcptq[IPF_TCPS_CLOSED].ifq_ttl = softc->ipf_tcplastack; 466 softn->ipf_nat_tcptq[IPF_TCP_NSTATES - 1].ifq_next = 467 &softn->ipf_nat_udptq; 468 469 IPFTQ_INIT(&softn->ipf_nat_udptq, softn->ipf_nat_defage, 470 "nat ipftq udp tab"); 471 softn->ipf_nat_udptq.ifq_next = &softn->ipf_nat_udpacktq; 472 473 IPFTQ_INIT(&softn->ipf_nat_udpacktq, softn->ipf_nat_defage, 474 "nat ipftq udpack tab"); 475 softn->ipf_nat_udpacktq.ifq_next = &softn->ipf_nat_icmptq; 476 477 IPFTQ_INIT(&softn->ipf_nat_icmptq, softn->ipf_nat_deficmpage, 478 "nat icmp ipftq tab"); 479 softn->ipf_nat_icmptq.ifq_next = &softn->ipf_nat_icmpacktq; 480 481 IPFTQ_INIT(&softn->ipf_nat_icmpacktq, softn->ipf_nat_defage, 482 "nat icmpack ipftq tab"); 483 softn->ipf_nat_icmpacktq.ifq_next = &softn->ipf_nat_iptq; 484 485 IPFTQ_INIT(&softn->ipf_nat_iptq, softn->ipf_nat_defipage, 486 "nat ip ipftq tab"); 487 softn->ipf_nat_iptq.ifq_next = &softn->ipf_nat_pending; 488 489 IPFTQ_INIT(&softn->ipf_nat_pending, 1, "nat pending ipftq tab"); 490 softn->ipf_nat_pending.ifq_next = NULL; 491 492 for (i = 0, tq = softn->ipf_nat_tcptq; i < IPF_TCP_NSTATES; i++, tq++) { 493 if (tq->ifq_ttl < softn->ipf_nat_deficmpage) 494 tq->ifq_ttl = softn->ipf_nat_deficmpage; 495 else if (tq->ifq_ttl > softn->ipf_nat_defage && softc->ipf_large_nat) 496 tq->ifq_ttl = softn->ipf_nat_defage; 497 } 498 499 /* 500 * Increase this because we may have "keep state" following 501 * this too and packet storms can occur if this is removed 502 * too quickly. 503 */ 504 softn->ipf_nat_tcptq[IPF_TCPS_CLOSED].ifq_ttl = softc->ipf_tcplastack; 505 506 MUTEX_INIT(&softn->ipf_nat_new, "ipf nat new mutex"); 507 MUTEX_INIT(&softn->ipf_nat_io, "ipf nat io mutex"); 508 509 softn->ipf_nat_inited = 1; 510 511 return (0); 512 } 513 514 515 /* ------------------------------------------------------------------------ */ 516 /* Function: ipf_nat_soft_fini */ 517 /* Returns: Nil */ 518 /* Parameters: softc(I) - pointer to soft context main structure */ 519 /* */ 520 /* Free all memory used by NAT structures allocated at runtime. */ 521 /* ------------------------------------------------------------------------ */ 522 int ipf_nat_soft_fini(ipf_main_softc_t * softc,void * arg)523 ipf_nat_soft_fini(ipf_main_softc_t *softc, void *arg) 524 { 525 ipf_nat_softc_t *softn = arg; 526 ipftq_t *ifq, *ifqnext; 527 528 (void) ipf_nat_clearlist(softc, softn); 529 (void) ipf_nat_flushtable(softc, softn); 530 531 /* 532 * Proxy timeout queues are not cleaned here because although they 533 * exist on the NAT list, ipf_proxy_unload is called after unload 534 * and the proxies actually are responsible for them being created. 535 * Should the proxy timeouts have their own list? There's no real 536 * justification as this is the only complication. 537 */ 538 for (ifq = softn->ipf_nat_utqe; ifq != NULL; ifq = ifqnext) { 539 ifqnext = ifq->ifq_next; 540 if (ipf_deletetimeoutqueue(ifq) == 0) 541 ipf_freetimeoutqueue(softc, ifq); 542 } 543 544 if (softn->ipf_nat_table[0] != NULL) { 545 KFREES(softn->ipf_nat_table[0], 546 sizeof(nat_t *) * softn->ipf_nat_table_sz); 547 softn->ipf_nat_table[0] = NULL; 548 } 549 if (softn->ipf_nat_table[1] != NULL) { 550 KFREES(softn->ipf_nat_table[1], 551 sizeof(nat_t *) * softn->ipf_nat_table_sz); 552 softn->ipf_nat_table[1] = NULL; 553 } 554 if (softn->ipf_nat_map_rules != NULL) { 555 KFREES(softn->ipf_nat_map_rules, 556 sizeof(ipnat_t *) * softn->ipf_nat_maprules_sz); 557 softn->ipf_nat_map_rules = NULL; 558 } 559 if (softn->ipf_nat_rdr_rules != NULL) { 560 KFREES(softn->ipf_nat_rdr_rules, 561 sizeof(ipnat_t *) * softn->ipf_nat_rdrrules_sz); 562 softn->ipf_nat_rdr_rules = NULL; 563 } 564 if (softn->ipf_hm_maptable != NULL) { 565 KFREES(softn->ipf_hm_maptable, 566 sizeof(hostmap_t *) * softn->ipf_nat_hostmap_sz); 567 softn->ipf_hm_maptable = NULL; 568 } 569 if (softn->ipf_nat_stats.ns_side[0].ns_bucketlen != NULL) { 570 KFREES(softn->ipf_nat_stats.ns_side[0].ns_bucketlen, 571 sizeof(u_int) * softn->ipf_nat_table_sz); 572 softn->ipf_nat_stats.ns_side[0].ns_bucketlen = NULL; 573 } 574 if (softn->ipf_nat_stats.ns_side[1].ns_bucketlen != NULL) { 575 KFREES(softn->ipf_nat_stats.ns_side[1].ns_bucketlen, 576 sizeof(u_int) * softn->ipf_nat_table_sz); 577 softn->ipf_nat_stats.ns_side[1].ns_bucketlen = NULL; 578 } 579 580 if (softn->ipf_nat_inited == 1) { 581 softn->ipf_nat_inited = 0; 582 ipf_sttab_destroy(softn->ipf_nat_tcptq); 583 584 MUTEX_DESTROY(&softn->ipf_nat_new); 585 MUTEX_DESTROY(&softn->ipf_nat_io); 586 587 MUTEX_DESTROY(&softn->ipf_nat_udptq.ifq_lock); 588 MUTEX_DESTROY(&softn->ipf_nat_udpacktq.ifq_lock); 589 MUTEX_DESTROY(&softn->ipf_nat_icmptq.ifq_lock); 590 MUTEX_DESTROY(&softn->ipf_nat_icmpacktq.ifq_lock); 591 MUTEX_DESTROY(&softn->ipf_nat_iptq.ifq_lock); 592 MUTEX_DESTROY(&softn->ipf_nat_pending.ifq_lock); 593 } 594 595 return (0); 596 } 597 598 599 /* ------------------------------------------------------------------------ */ 600 /* Function: ipf_nat_setlock */ 601 /* Returns: Nil */ 602 /* Parameters: arg(I) - pointer to soft state information */ 603 /* tmp(I) - new lock value */ 604 /* */ 605 /* Set the "lock status" of NAT to the value in tmp. */ 606 /* ------------------------------------------------------------------------ */ 607 void ipf_nat_setlock(void * arg,int tmp)608 ipf_nat_setlock(void *arg, int tmp) 609 { 610 ipf_nat_softc_t *softn = arg; 611 612 softn->ipf_nat_lock = tmp; 613 } 614 615 616 /* ------------------------------------------------------------------------ */ 617 /* Function: ipf_nat_addrdr */ 618 /* Returns: Nil */ 619 /* Parameters: n(I) - pointer to NAT rule to add */ 620 /* */ 621 /* Adds a redirect rule to the hash table of redirect rules and the list of */ 622 /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */ 623 /* use by redirect rules. */ 624 /* ------------------------------------------------------------------------ */ 625 static void ipf_nat_addrdr(ipf_nat_softc_t * softn,ipnat_t * n)626 ipf_nat_addrdr(ipf_nat_softc_t *softn, ipnat_t *n) 627 { 628 ipnat_t **np; 629 u_32_t j; 630 u_int hv; 631 u_int rhv; 632 int k; 633 634 if (n->in_odstatype == FRI_NORMAL) { 635 k = count4bits(n->in_odstmsk); 636 ipf_inet_mask_add(k, &softn->ipf_nat_rdr_mask); 637 j = (n->in_odstaddr & n->in_odstmsk); 638 rhv = NAT_HASH_FN(j, 0, 0xffffffff); 639 } else { 640 ipf_inet_mask_add(0, &softn->ipf_nat_rdr_mask); 641 j = 0; 642 rhv = 0; 643 } 644 hv = rhv % softn->ipf_nat_rdrrules_sz; 645 np = softn->ipf_nat_rdr_rules + hv; 646 while (*np != NULL) 647 np = &(*np)->in_rnext; 648 n->in_rnext = NULL; 649 n->in_prnext = np; 650 n->in_hv[0] = hv; 651 n->in_use++; 652 *np = n; 653 } 654 655 656 /* ------------------------------------------------------------------------ */ 657 /* Function: ipf_nat_addmap */ 658 /* Returns: Nil */ 659 /* Parameters: n(I) - pointer to NAT rule to add */ 660 /* */ 661 /* Adds a NAT map rule to the hash table of rules and the list of loaded */ 662 /* NAT rules. Updates the bitmask indicating which netmasks are in use by */ 663 /* redirect rules. */ 664 /* ------------------------------------------------------------------------ */ 665 static void ipf_nat_addmap(ipf_nat_softc_t * softn,ipnat_t * n)666 ipf_nat_addmap(ipf_nat_softc_t *softn, ipnat_t *n) 667 { 668 ipnat_t **np; 669 u_32_t j; 670 u_int hv; 671 u_int rhv; 672 int k; 673 674 if (n->in_osrcatype == FRI_NORMAL) { 675 k = count4bits(n->in_osrcmsk); 676 ipf_inet_mask_add(k, &softn->ipf_nat_map_mask); 677 j = (n->in_osrcaddr & n->in_osrcmsk); 678 rhv = NAT_HASH_FN(j, 0, 0xffffffff); 679 } else { 680 ipf_inet_mask_add(0, &softn->ipf_nat_map_mask); 681 j = 0; 682 rhv = 0; 683 } 684 hv = rhv % softn->ipf_nat_maprules_sz; 685 np = softn->ipf_nat_map_rules + hv; 686 while (*np != NULL) 687 np = &(*np)->in_mnext; 688 n->in_mnext = NULL; 689 n->in_pmnext = np; 690 n->in_hv[1] = rhv; 691 n->in_use++; 692 *np = n; 693 } 694 695 696 /* ------------------------------------------------------------------------ */ 697 /* Function: ipf_nat_delrdr */ 698 /* Returns: Nil */ 699 /* Parameters: n(I) - pointer to NAT rule to delete */ 700 /* */ 701 /* Removes a redirect rule from the hash table of redirect rules. */ 702 /* ------------------------------------------------------------------------ */ 703 void ipf_nat_delrdr(ipf_nat_softc_t * softn,ipnat_t * n)704 ipf_nat_delrdr(ipf_nat_softc_t *softn, ipnat_t *n) 705 { 706 if (n->in_odstatype == FRI_NORMAL) { 707 int k = count4bits(n->in_odstmsk); 708 ipf_inet_mask_del(k, &softn->ipf_nat_rdr_mask); 709 } else { 710 ipf_inet_mask_del(0, &softn->ipf_nat_rdr_mask); 711 } 712 if (n->in_rnext) 713 n->in_rnext->in_prnext = n->in_prnext; 714 *n->in_prnext = n->in_rnext; 715 n->in_use--; 716 } 717 718 719 /* ------------------------------------------------------------------------ */ 720 /* Function: ipf_nat_delmap */ 721 /* Returns: Nil */ 722 /* Parameters: n(I) - pointer to NAT rule to delete */ 723 /* */ 724 /* Removes a NAT map rule from the hash table of NAT map rules. */ 725 /* ------------------------------------------------------------------------ */ 726 void ipf_nat_delmap(ipf_nat_softc_t * softn,ipnat_t * n)727 ipf_nat_delmap(ipf_nat_softc_t *softn, ipnat_t *n) 728 { 729 if (n->in_osrcatype == FRI_NORMAL) { 730 int k = count4bits(n->in_osrcmsk); 731 ipf_inet_mask_del(k, &softn->ipf_nat_map_mask); 732 } else { 733 ipf_inet_mask_del(0, &softn->ipf_nat_map_mask); 734 } 735 if (n->in_mnext != NULL) 736 n->in_mnext->in_pmnext = n->in_pmnext; 737 *n->in_pmnext = n->in_mnext; 738 n->in_use--; 739 } 740 741 742 /* ------------------------------------------------------------------------ */ 743 /* Function: ipf_nat_hostmap */ 744 /* Returns: struct hostmap* - NULL if no hostmap could be created, */ 745 /* else a pointer to the hostmapping to use */ 746 /* Parameters: np(I) - pointer to NAT rule */ 747 /* real(I) - real IP address */ 748 /* map(I) - mapped IP address */ 749 /* port(I) - destination port number */ 750 /* Write Locks: ipf_nat */ 751 /* */ 752 /* Check if an ip address has already been allocated for a given mapping */ 753 /* that is not doing port based translation. If is not yet allocated, then */ 754 /* create a new entry if a non-NULL NAT rule pointer has been supplied. */ 755 /* ------------------------------------------------------------------------ */ 756 static struct hostmap * ipf_nat_hostmap(ipf_nat_softc_t * softn,ipnat_t * np,struct in_addr src,struct in_addr dst,struct in_addr map,u_32_t port)757 ipf_nat_hostmap(ipf_nat_softc_t *softn, ipnat_t *np, struct in_addr src, 758 struct in_addr dst, struct in_addr map, u_32_t port) 759 { 760 hostmap_t *hm; 761 u_int hv, rhv; 762 763 hv = (src.s_addr ^ dst.s_addr); 764 hv += src.s_addr; 765 hv += dst.s_addr; 766 rhv = hv; 767 hv %= softn->ipf_nat_hostmap_sz; 768 for (hm = softn->ipf_hm_maptable[hv]; hm; hm = hm->hm_hnext) 769 if ((hm->hm_osrcip.s_addr == src.s_addr) && 770 (hm->hm_odstip.s_addr == dst.s_addr) && 771 ((np == NULL) || (np == hm->hm_ipnat)) && 772 ((port == 0) || (port == hm->hm_port))) { 773 softn->ipf_nat_stats.ns_hm_addref++; 774 hm->hm_ref++; 775 return (hm); 776 } 777 778 if (np == NULL) { 779 softn->ipf_nat_stats.ns_hm_nullnp++; 780 return (NULL); 781 } 782 783 KMALLOC(hm, hostmap_t *); 784 if (hm) { 785 hm->hm_next = softn->ipf_hm_maplist; 786 hm->hm_pnext = &softn->ipf_hm_maplist; 787 if (softn->ipf_hm_maplist != NULL) 788 softn->ipf_hm_maplist->hm_pnext = &hm->hm_next; 789 softn->ipf_hm_maplist = hm; 790 hm->hm_hnext = softn->ipf_hm_maptable[hv]; 791 hm->hm_phnext = softn->ipf_hm_maptable + hv; 792 if (softn->ipf_hm_maptable[hv] != NULL) 793 softn->ipf_hm_maptable[hv]->hm_phnext = &hm->hm_hnext; 794 softn->ipf_hm_maptable[hv] = hm; 795 hm->hm_ipnat = np; 796 np->in_use++; 797 hm->hm_osrcip = src; 798 hm->hm_odstip = dst; 799 hm->hm_nsrcip = map; 800 hm->hm_ndstip.s_addr = 0; 801 hm->hm_ref = 1; 802 hm->hm_port = port; 803 hm->hm_hv = rhv; 804 hm->hm_v = 4; 805 softn->ipf_nat_stats.ns_hm_new++; 806 } else { 807 softn->ipf_nat_stats.ns_hm_newfail++; 808 } 809 return (hm); 810 } 811 812 813 /* ------------------------------------------------------------------------ */ 814 /* Function: ipf_nat_hostmapdel */ 815 /* Returns: Nil */ 816 /* Parameters: hmp(I) - pointer to hostmap structure pointer */ 817 /* Write Locks: ipf_nat */ 818 /* */ 819 /* Decrement the references to this hostmap structure by one. If this */ 820 /* reaches zero then remove it and free it. */ 821 /* ------------------------------------------------------------------------ */ 822 void ipf_nat_hostmapdel(ipf_main_softc_t * softc,struct hostmap ** hmp)823 ipf_nat_hostmapdel(ipf_main_softc_t *softc, struct hostmap **hmp) 824 { 825 struct hostmap *hm; 826 827 hm = *hmp; 828 *hmp = NULL; 829 830 hm->hm_ref--; 831 if (hm->hm_ref == 0) { 832 ipf_nat_rule_deref(softc, &hm->hm_ipnat); 833 if (hm->hm_hnext) 834 hm->hm_hnext->hm_phnext = hm->hm_phnext; 835 *hm->hm_phnext = hm->hm_hnext; 836 if (hm->hm_next) 837 hm->hm_next->hm_pnext = hm->hm_pnext; 838 *hm->hm_pnext = hm->hm_next; 839 KFREE(hm); 840 } 841 } 842 843 844 /* ------------------------------------------------------------------------ */ 845 /* Function: ipf_fix_outcksum */ 846 /* Returns: Nil */ 847 /* Parameters: cksum(I) - ipf_cksum_t, value of fin_cksum */ 848 /* sp(I) - location of 16bit checksum to update */ 849 /* n(I) - amount to adjust checksum by */ 850 /* partial(I) - partial checksum */ 851 /* */ 852 /* Adjusts the 16bit checksum by "n" for packets going out. */ 853 /* ------------------------------------------------------------------------ */ 854 void ipf_fix_outcksum(int cksum,u_short * sp,u_32_t n,u_32_t partial)855 ipf_fix_outcksum(int cksum, u_short *sp, u_32_t n, u_32_t partial) 856 { 857 u_short sumshort; 858 u_32_t sum1; 859 860 if (n == 0) 861 return; 862 863 if (cksum == 4) { 864 *sp = 0; 865 return; 866 } 867 if (cksum == 2) { 868 sum1 = partial; 869 sum1 = (sum1 & 0xffff) + (sum1 >> 16); 870 *sp = htons(sum1); 871 return; 872 } 873 sum1 = (~ntohs(*sp)) & 0xffff; 874 sum1 += (n); 875 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 876 /* Again */ 877 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 878 sumshort = ~(u_short)sum1; 879 *(sp) = htons(sumshort); 880 } 881 882 883 /* ------------------------------------------------------------------------ */ 884 /* Function: ipf_fix_incksum */ 885 /* Returns: Nil */ 886 /* Parameters: cksum(I) - ipf_cksum_t, value of fin_cksum */ 887 /* sp(I) - location of 16bit checksum to update */ 888 /* n(I) - amount to adjust checksum by */ 889 /* partial(I) - partial checksum */ 890 /* */ 891 /* Adjusts the 16bit checksum by "n" for packets going in. */ 892 /* ------------------------------------------------------------------------ */ 893 void ipf_fix_incksum(int cksum,u_short * sp,u_32_t n,u_32_t partial)894 ipf_fix_incksum(int cksum, u_short *sp, u_32_t n, u_32_t partial) 895 { 896 u_short sumshort; 897 u_32_t sum1; 898 899 if (n == 0) 900 return; 901 902 if (cksum == 4) { 903 *sp = 0; 904 return; 905 } 906 if (cksum == 2) { 907 sum1 = partial; 908 sum1 = (sum1 & 0xffff) + (sum1 >> 16); 909 *sp = htons(sum1); 910 return; 911 } 912 913 sum1 = (~ntohs(*sp)) & 0xffff; 914 sum1 += ~(n) & 0xffff; 915 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 916 /* Again */ 917 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 918 sumshort = ~(u_short)sum1; 919 *(sp) = htons(sumshort); 920 } 921 922 923 /* ------------------------------------------------------------------------ */ 924 /* Function: ipf_fix_datacksum */ 925 /* Returns: Nil */ 926 /* Parameters: sp(I) - location of 16bit checksum to update */ 927 /* n(I) - amount to adjust checksum by */ 928 /* */ 929 /* Fix_datacksum is used *only* for the adjustments of checksums in the */ 930 /* data section of an IP packet. */ 931 /* */ 932 /* The only situation in which you need to do this is when NAT'ing an */ 933 /* ICMP error message. Such a message, contains in its body the IP header */ 934 /* of the original IP packet, that causes the error. */ 935 /* */ 936 /* You can't use fix_incksum or fix_outcksum in that case, because for the */ 937 /* kernel the data section of the ICMP error is just data, and no special */ 938 /* processing like hardware cksum or ntohs processing have been done by the */ 939 /* kernel on the data section. */ 940 /* ------------------------------------------------------------------------ */ 941 void ipf_fix_datacksum(u_short * sp,u_32_t n)942 ipf_fix_datacksum(u_short *sp, u_32_t n) 943 { 944 u_short sumshort; 945 u_32_t sum1; 946 947 if (n == 0) 948 return; 949 950 sum1 = (~ntohs(*sp)) & 0xffff; 951 sum1 += (n); 952 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 953 /* Again */ 954 sum1 = (sum1 >> 16) + (sum1 & 0xffff); 955 sumshort = ~(u_short)sum1; 956 *(sp) = htons(sumshort); 957 } 958 959 960 /* ------------------------------------------------------------------------ */ 961 /* Function: ipf_nat_ioctl */ 962 /* Returns: int - 0 == success, != 0 == failure */ 963 /* Parameters: softc(I) - pointer to soft context main structure */ 964 /* data(I) - pointer to ioctl data */ 965 /* cmd(I) - ioctl command integer */ 966 /* mode(I) - file mode bits used with open */ 967 /* uid(I) - uid of calling process */ 968 /* ctx(I) - pointer used as key for finding context */ 969 /* */ 970 /* Processes an ioctl call made to operate on the IP Filter NAT device. */ 971 /* ------------------------------------------------------------------------ */ 972 int ipf_nat_ioctl(ipf_main_softc_t * softc,caddr_t data,ioctlcmd_t cmd,int mode,int uid,void * ctx)973 ipf_nat_ioctl(ipf_main_softc_t *softc, caddr_t data, ioctlcmd_t cmd, 974 int mode, int uid, void *ctx) 975 { 976 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 977 int error = 0, ret, arg, getlock; 978 ipnat_t *nat, *nt, *n; 979 ipnat_t natd; 980 SPL_INT(s); 981 982 #if !SOLARIS && defined(_KERNEL) 983 # if NETBSD_GE_REV(399002000) 984 if ((mode & FWRITE) && 985 kauth_authorize_network(curlwp->l_cred, KAUTH_NETWORK_FIREWALL, 986 KAUTH_REQ_NETWORK_FIREWALL_FW, 987 NULL, NULL, NULL)) 988 # else 989 # if defined(__FreeBSD__) 990 if (securelevel_ge(curthread->td_ucred, 3) && (mode & FWRITE)) 991 # else 992 if ((securelevel >= 3) && (mode & FWRITE)) 993 # endif 994 # endif 995 { 996 IPFERROR(60001); 997 return (EPERM); 998 } 999 # if defined(__FreeBSD__) 1000 if (jailed_without_vnet(curthread->td_ucred)) { 1001 IPFERROR(60076); 1002 return (EOPNOTSUPP); 1003 } 1004 # endif 1005 #endif 1006 1007 getlock = (mode & NAT_LOCKHELD) ? 0 : 1; 1008 1009 n = NULL; 1010 nt = NULL; 1011 nat = NULL; 1012 1013 if ((cmd == (ioctlcmd_t)SIOCADNAT) || (cmd == (ioctlcmd_t)SIOCRMNAT) || 1014 (cmd == (ioctlcmd_t)SIOCPURGENAT)) { 1015 if (mode & NAT_SYSSPACE) { 1016 bcopy(data, (char *)&natd, sizeof(natd)); 1017 nat = &natd; 1018 error = 0; 1019 } else { 1020 bzero(&natd, sizeof(natd)); 1021 error = ipf_inobj(softc, data, NULL, &natd, 1022 IPFOBJ_IPNAT); 1023 if (error != 0) 1024 goto done; 1025 1026 if (natd.in_size < sizeof(ipnat_t)) { 1027 error = EINVAL; 1028 goto done; 1029 } 1030 KMALLOCS(nt, ipnat_t *, natd.in_size); 1031 if (nt == NULL) { 1032 IPFERROR(60070); 1033 error = ENOMEM; 1034 goto done; 1035 } 1036 bzero(nt, natd.in_size); 1037 error = ipf_inobjsz(softc, data, nt, IPFOBJ_IPNAT, 1038 natd.in_size); 1039 if (error) 1040 goto done; 1041 nat = nt; 1042 } 1043 1044 /* 1045 * For add/delete, look to see if the NAT entry is 1046 * already present 1047 */ 1048 nat->in_flags &= IPN_USERFLAGS; 1049 if ((nat->in_redir & NAT_MAPBLK) == 0) { 1050 if (nat->in_osrcatype == FRI_NORMAL || 1051 nat->in_osrcatype == FRI_NONE) 1052 nat->in_osrcaddr &= nat->in_osrcmsk; 1053 if (nat->in_odstatype == FRI_NORMAL || 1054 nat->in_odstatype == FRI_NONE) 1055 nat->in_odstaddr &= nat->in_odstmsk; 1056 if ((nat->in_flags & (IPN_SPLIT|IPN_SIPRANGE)) == 0) { 1057 if (nat->in_nsrcatype == FRI_NORMAL) 1058 nat->in_nsrcaddr &= nat->in_nsrcmsk; 1059 if (nat->in_ndstatype == FRI_NORMAL) 1060 nat->in_ndstaddr &= nat->in_ndstmsk; 1061 } 1062 } 1063 1064 error = ipf_nat_rule_init(softc, softn, nat); 1065 if (error != 0) 1066 goto done; 1067 1068 MUTEX_ENTER(&softn->ipf_nat_io); 1069 for (n = softn->ipf_nat_list; n != NULL; n = n->in_next) 1070 if (ipf_nat_cmp_rules(nat, n) == 0) 1071 break; 1072 } 1073 1074 switch (cmd) 1075 { 1076 #ifdef IPFILTER_LOG 1077 case SIOCIPFFB : 1078 { 1079 int tmp; 1080 1081 if (!(mode & FWRITE)) { 1082 IPFERROR(60002); 1083 error = EPERM; 1084 } else { 1085 tmp = ipf_log_clear(softc, IPL_LOGNAT); 1086 error = BCOPYOUT(&tmp, data, sizeof(tmp)); 1087 if (error != 0) { 1088 IPFERROR(60057); 1089 error = EFAULT; 1090 } 1091 } 1092 break; 1093 } 1094 1095 case SIOCSETLG : 1096 if (!(mode & FWRITE)) { 1097 IPFERROR(60003); 1098 error = EPERM; 1099 } else { 1100 error = BCOPYIN(data, &softn->ipf_nat_logging, 1101 sizeof(softn->ipf_nat_logging)); 1102 if (error != 0) 1103 error = EFAULT; 1104 } 1105 break; 1106 1107 case SIOCGETLG : 1108 error = BCOPYOUT(&softn->ipf_nat_logging, data, 1109 sizeof(softn->ipf_nat_logging)); 1110 if (error != 0) { 1111 IPFERROR(60004); 1112 error = EFAULT; 1113 } 1114 break; 1115 1116 case FIONREAD : 1117 arg = ipf_log_bytesused(softc, IPL_LOGNAT); 1118 error = BCOPYOUT(&arg, data, sizeof(arg)); 1119 if (error != 0) { 1120 IPFERROR(60005); 1121 error = EFAULT; 1122 } 1123 break; 1124 #endif 1125 case SIOCADNAT : 1126 if (!(mode & FWRITE)) { 1127 IPFERROR(60006); 1128 error = EPERM; 1129 } else if (n != NULL) { 1130 natd.in_flineno = n->in_flineno; 1131 (void) ipf_outobj(softc, data, &natd, IPFOBJ_IPNAT); 1132 IPFERROR(60007); 1133 error = EEXIST; 1134 } else if (nt == NULL) { 1135 IPFERROR(60008); 1136 error = ENOMEM; 1137 } 1138 if (error != 0) { 1139 MUTEX_EXIT(&softn->ipf_nat_io); 1140 break; 1141 } 1142 if (nat != nt) 1143 bcopy((char *)nat, (char *)nt, sizeof(*n)); 1144 error = ipf_nat_siocaddnat(softc, softn, nt, getlock); 1145 MUTEX_EXIT(&softn->ipf_nat_io); 1146 if (error == 0) { 1147 nat = NULL; 1148 nt = NULL; 1149 } 1150 break; 1151 1152 case SIOCRMNAT : 1153 case SIOCPURGENAT : 1154 if (!(mode & FWRITE)) { 1155 IPFERROR(60009); 1156 error = EPERM; 1157 n = NULL; 1158 } else if (n == NULL) { 1159 IPFERROR(60010); 1160 error = ESRCH; 1161 } 1162 1163 if (error != 0) { 1164 MUTEX_EXIT(&softn->ipf_nat_io); 1165 break; 1166 } 1167 if (cmd == (ioctlcmd_t)SIOCPURGENAT) { 1168 error = ipf_outobjsz(softc, data, n, IPFOBJ_IPNAT, 1169 n->in_size); 1170 if (error) { 1171 MUTEX_EXIT(&softn->ipf_nat_io); 1172 goto done; 1173 } 1174 n->in_flags |= IPN_PURGE; 1175 } 1176 ipf_nat_siocdelnat(softc, softn, n, getlock); 1177 1178 MUTEX_EXIT(&softn->ipf_nat_io); 1179 n = NULL; 1180 break; 1181 1182 case SIOCGNATS : 1183 { 1184 natstat_t *nsp = &softn->ipf_nat_stats; 1185 1186 nsp->ns_side[0].ns_table = softn->ipf_nat_table[0]; 1187 nsp->ns_side[1].ns_table = softn->ipf_nat_table[1]; 1188 nsp->ns_list = softn->ipf_nat_list; 1189 nsp->ns_maptable = softn->ipf_hm_maptable; 1190 nsp->ns_maplist = softn->ipf_hm_maplist; 1191 nsp->ns_nattab_sz = softn->ipf_nat_table_sz; 1192 nsp->ns_nattab_max = softn->ipf_nat_table_max; 1193 nsp->ns_rultab_sz = softn->ipf_nat_maprules_sz; 1194 nsp->ns_rdrtab_sz = softn->ipf_nat_rdrrules_sz; 1195 nsp->ns_hostmap_sz = softn->ipf_nat_hostmap_sz; 1196 nsp->ns_instances = softn->ipf_nat_instances; 1197 nsp->ns_ticks = softc->ipf_ticks; 1198 #ifdef IPFILTER_LOGGING 1199 nsp->ns_log_ok = ipf_log_logok(softc, IPF_LOGNAT); 1200 nsp->ns_log_fail = ipf_log_failures(softc, IPF_LOGNAT); 1201 #else 1202 nsp->ns_log_ok = 0; 1203 nsp->ns_log_fail = 0; 1204 #endif 1205 error = ipf_outobj(softc, data, nsp, IPFOBJ_NATSTAT); 1206 break; 1207 } 1208 1209 case SIOCGNATL : 1210 { 1211 natlookup_t nl; 1212 1213 error = ipf_inobj(softc, data, NULL, &nl, IPFOBJ_NATLOOKUP); 1214 if (error == 0) { 1215 void *ptr; 1216 1217 if (getlock) { 1218 READ_ENTER(&softc->ipf_nat); 1219 } 1220 1221 switch (nl.nl_v) 1222 { 1223 case 4 : 1224 ptr = ipf_nat_lookupredir(&nl); 1225 break; 1226 #ifdef USE_INET6 1227 case 6 : 1228 ptr = ipf_nat6_lookupredir(&nl); 1229 break; 1230 #endif 1231 default: 1232 ptr = NULL; 1233 break; 1234 } 1235 1236 if (getlock) { 1237 RWLOCK_EXIT(&softc->ipf_nat); 1238 } 1239 if (ptr != NULL) { 1240 error = ipf_outobj(softc, data, &nl, 1241 IPFOBJ_NATLOOKUP); 1242 } else { 1243 IPFERROR(60011); 1244 error = ESRCH; 1245 } 1246 } 1247 break; 1248 } 1249 1250 case SIOCIPFFL : /* old SIOCFLNAT & SIOCCNATL */ 1251 if (!(mode & FWRITE)) { 1252 IPFERROR(60012); 1253 error = EPERM; 1254 break; 1255 } 1256 if (getlock) { 1257 WRITE_ENTER(&softc->ipf_nat); 1258 } 1259 1260 error = BCOPYIN(data, &arg, sizeof(arg)); 1261 if (error != 0) { 1262 IPFERROR(60013); 1263 error = EFAULT; 1264 } else { 1265 if (arg == 0) 1266 ret = ipf_nat_flushtable(softc, softn); 1267 else if (arg == 1) 1268 ret = ipf_nat_clearlist(softc, softn); 1269 else 1270 ret = ipf_nat_extraflush(softc, softn, arg); 1271 ipf_proxy_flush(softc->ipf_proxy_soft, arg); 1272 } 1273 1274 if (getlock) { 1275 RWLOCK_EXIT(&softc->ipf_nat); 1276 } 1277 if (error == 0) { 1278 error = BCOPYOUT(&ret, data, sizeof(ret)); 1279 } 1280 break; 1281 1282 case SIOCMATCHFLUSH : 1283 if (!(mode & FWRITE)) { 1284 IPFERROR(60014); 1285 error = EPERM; 1286 break; 1287 } 1288 if (getlock) { 1289 WRITE_ENTER(&softc->ipf_nat); 1290 } 1291 1292 error = ipf_nat_matchflush(softc, softn, data); 1293 1294 if (getlock) { 1295 RWLOCK_EXIT(&softc->ipf_nat); 1296 } 1297 break; 1298 1299 case SIOCPROXY : 1300 error = ipf_proxy_ioctl(softc, data, cmd, mode, ctx); 1301 break; 1302 1303 case SIOCSTLCK : 1304 if (!(mode & FWRITE)) { 1305 IPFERROR(60015); 1306 error = EPERM; 1307 } else { 1308 error = ipf_lock(data, &softn->ipf_nat_lock); 1309 } 1310 break; 1311 1312 case SIOCSTPUT : 1313 if ((mode & FWRITE) != 0) { 1314 error = ipf_nat_putent(softc, data, getlock); 1315 } else { 1316 IPFERROR(60016); 1317 error = EACCES; 1318 } 1319 break; 1320 1321 case SIOCSTGSZ : 1322 if (softn->ipf_nat_lock) { 1323 error = ipf_nat_getsz(softc, data, getlock); 1324 } else { 1325 IPFERROR(60017); 1326 error = EACCES; 1327 } 1328 break; 1329 1330 case SIOCSTGET : 1331 if (softn->ipf_nat_lock) { 1332 error = ipf_nat_getent(softc, data, getlock); 1333 } else { 1334 IPFERROR(60018); 1335 error = EACCES; 1336 } 1337 break; 1338 1339 case SIOCGENITER : 1340 { 1341 ipfgeniter_t iter; 1342 ipftoken_t *token; 1343 ipfobj_t obj; 1344 1345 error = ipf_inobj(softc, data, &obj, &iter, IPFOBJ_GENITER); 1346 if (error != 0) 1347 break; 1348 1349 SPL_SCHED(s); 1350 token = ipf_token_find(softc, iter.igi_type, uid, ctx); 1351 if (token != NULL) { 1352 error = ipf_nat_iterator(softc, token, &iter, &obj); 1353 WRITE_ENTER(&softc->ipf_tokens); 1354 ipf_token_deref(softc, token); 1355 RWLOCK_EXIT(&softc->ipf_tokens); 1356 } 1357 SPL_X(s); 1358 break; 1359 } 1360 1361 case SIOCIPFDELTOK : 1362 error = BCOPYIN(data, &arg, sizeof(arg)); 1363 if (error == 0) { 1364 SPL_SCHED(s); 1365 error = ipf_token_del(softc, arg, uid, ctx); 1366 SPL_X(s); 1367 } else { 1368 IPFERROR(60019); 1369 error = EFAULT; 1370 } 1371 break; 1372 1373 case SIOCGTQTAB : 1374 error = ipf_outobj(softc, data, softn->ipf_nat_tcptq, 1375 IPFOBJ_STATETQTAB); 1376 break; 1377 1378 case SIOCGTABL : 1379 error = ipf_nat_gettable(softc, softn, data); 1380 break; 1381 1382 default : 1383 IPFERROR(60020); 1384 error = EINVAL; 1385 break; 1386 } 1387 done: 1388 if (nat != NULL) 1389 ipf_nat_rule_fini(softc, nat); 1390 if (nt != NULL) 1391 KFREES(nt, nt->in_size); 1392 return (error); 1393 } 1394 1395 1396 /* ------------------------------------------------------------------------ */ 1397 /* Function: ipf_nat_siocaddnat */ 1398 /* Returns: int - 0 == success, != 0 == failure */ 1399 /* Parameters: softc(I) - pointer to soft context main structure */ 1400 /* softn(I) - pointer to NAT context structure */ 1401 /* n(I) - pointer to new NAT rule */ 1402 /* np(I) - pointer to where to insert new NAT rule */ 1403 /* getlock(I) - flag indicating if lock on is held */ 1404 /* Mutex Locks: ipf_nat_io */ 1405 /* */ 1406 /* Handle SIOCADNAT. Resolve and calculate details inside the NAT rule */ 1407 /* from information passed to the kernel, then add it to the appropriate */ 1408 /* NAT rule table(s). */ 1409 /* ------------------------------------------------------------------------ */ 1410 static int ipf_nat_siocaddnat(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,ipnat_t * n,int getlock)1411 ipf_nat_siocaddnat(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, ipnat_t *n, 1412 int getlock) 1413 { 1414 int error = 0; 1415 1416 if (ipf_nat_resolverule(softc, n) != 0) { 1417 IPFERROR(60022); 1418 return (ENOENT); 1419 } 1420 1421 if ((n->in_age[0] == 0) && (n->in_age[1] != 0)) { 1422 IPFERROR(60023); 1423 return (EINVAL); 1424 } 1425 1426 if (n->in_redir == (NAT_DIVERTUDP|NAT_MAP)) { 1427 /* 1428 * Prerecord whether or not the destination of the divert 1429 * is local or not to the interface the packet is going 1430 * to be sent out. 1431 */ 1432 n->in_dlocal = ipf_deliverlocal(softc, n->in_v[1], 1433 n->in_ifps[1], &n->in_ndstip6); 1434 } 1435 1436 if (getlock) { 1437 WRITE_ENTER(&softc->ipf_nat); 1438 } 1439 n->in_next = NULL; 1440 n->in_pnext = softn->ipf_nat_list_tail; 1441 *n->in_pnext = n; 1442 softn->ipf_nat_list_tail = &n->in_next; 1443 n->in_use++; 1444 1445 if (n->in_redir & NAT_REDIRECT) { 1446 n->in_flags &= ~IPN_NOTDST; 1447 switch (n->in_v[0]) 1448 { 1449 case 4 : 1450 ipf_nat_addrdr(softn, n); 1451 break; 1452 #ifdef USE_INET6 1453 case 6 : 1454 ipf_nat6_addrdr(softn, n); 1455 break; 1456 #endif 1457 default : 1458 break; 1459 } 1460 ATOMIC_INC32(softn->ipf_nat_stats.ns_rules_rdr); 1461 } 1462 1463 if (n->in_redir & (NAT_MAP|NAT_MAPBLK)) { 1464 n->in_flags &= ~IPN_NOTSRC; 1465 switch (n->in_v[0]) 1466 { 1467 case 4 : 1468 ipf_nat_addmap(softn, n); 1469 break; 1470 #ifdef USE_INET6 1471 case 6 : 1472 ipf_nat6_addmap(softn, n); 1473 break; 1474 #endif 1475 default : 1476 break; 1477 } 1478 ATOMIC_INC32(softn->ipf_nat_stats.ns_rules_map); 1479 } 1480 1481 if (n->in_age[0] != 0) 1482 n->in_tqehead[0] = ipf_addtimeoutqueue(softc, 1483 &softn->ipf_nat_utqe, 1484 n->in_age[0]); 1485 1486 if (n->in_age[1] != 0) 1487 n->in_tqehead[1] = ipf_addtimeoutqueue(softc, 1488 &softn->ipf_nat_utqe, 1489 n->in_age[1]); 1490 1491 MUTEX_INIT(&n->in_lock, "ipnat rule lock"); 1492 1493 n = NULL; 1494 ATOMIC_INC32(softn->ipf_nat_stats.ns_rules); 1495 #if SOLARIS && !defined(INSTANCES) 1496 pfil_delayed_copy = 0; 1497 #endif 1498 if (getlock) { 1499 RWLOCK_EXIT(&softc->ipf_nat); /* WRITE */ 1500 } 1501 1502 return (error); 1503 } 1504 1505 1506 /* ------------------------------------------------------------------------ */ 1507 /* Function: ipf_nat_ruleaddrinit */ 1508 /* Parameters: softc(I) - pointer to soft context main structure */ 1509 /* softn(I) - pointer to NAT context structure */ 1510 /* n(I) - pointer to NAT rule */ 1511 /* */ 1512 /* Initialise all of the NAT address structures in a NAT rule. */ 1513 /* ------------------------------------------------------------------------ */ 1514 static int ipf_nat_ruleaddrinit(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,ipnat_t * n)1515 ipf_nat_ruleaddrinit(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, 1516 ipnat_t *n) 1517 { 1518 int idx, error; 1519 1520 if ((n->in_ndst.na_atype == FRI_LOOKUP) && 1521 (n->in_ndst.na_type != IPLT_DSTLIST)) { 1522 IPFERROR(60071); 1523 return (EINVAL); 1524 } 1525 if ((n->in_nsrc.na_atype == FRI_LOOKUP) && 1526 (n->in_nsrc.na_type != IPLT_DSTLIST)) { 1527 IPFERROR(60069); 1528 return (EINVAL); 1529 } 1530 1531 if (n->in_redir == NAT_BIMAP) { 1532 n->in_ndstaddr = n->in_osrcaddr; 1533 n->in_ndstmsk = n->in_osrcmsk; 1534 n->in_odstaddr = n->in_nsrcaddr; 1535 n->in_odstmsk = n->in_nsrcmsk; 1536 1537 } 1538 1539 if (n->in_redir & NAT_REDIRECT) 1540 idx = 1; 1541 else 1542 idx = 0; 1543 /* 1544 * Initialise all of the address fields. 1545 */ 1546 error = ipf_nat_nextaddrinit(softc, n->in_names, &n->in_osrc, 1, 1547 n->in_ifps[idx]); 1548 if (error != 0) 1549 return (error); 1550 1551 error = ipf_nat_nextaddrinit(softc, n->in_names, &n->in_odst, 1, 1552 n->in_ifps[idx]); 1553 if (error != 0) 1554 return (error); 1555 1556 error = ipf_nat_nextaddrinit(softc, n->in_names, &n->in_nsrc, 1, 1557 n->in_ifps[idx]); 1558 if (error != 0) 1559 return (error); 1560 1561 error = ipf_nat_nextaddrinit(softc, n->in_names, &n->in_ndst, 1, 1562 n->in_ifps[idx]); 1563 if (error != 0) 1564 return (error); 1565 1566 if (n->in_redir & NAT_DIVERTUDP) 1567 ipf_nat_builddivertmp(softn, n); 1568 1569 return (0); 1570 } 1571 1572 1573 /* ------------------------------------------------------------------------ */ 1574 /* Function: ipf_nat_resolvrule */ 1575 /* Returns: Nil */ 1576 /* Parameters: softc(I) - pointer to soft context main structure */ 1577 /* n(I) - pointer to NAT rule */ 1578 /* */ 1579 /* Handle SIOCADNAT. Resolve and calculate details inside the NAT rule */ 1580 /* from information passed to the kernel, then add it to the appropriate */ 1581 /* NAT rule table(s). */ 1582 /* ------------------------------------------------------------------------ */ 1583 static int ipf_nat_resolverule(ipf_main_softc_t * softc,ipnat_t * n)1584 ipf_nat_resolverule(ipf_main_softc_t *softc, ipnat_t *n) 1585 { 1586 char *base; 1587 1588 base = n->in_names; 1589 1590 n->in_ifps[0] = ipf_resolvenic(softc, base + n->in_ifnames[0], 1591 n->in_v[0]); 1592 1593 if (n->in_ifnames[1] == -1) { 1594 n->in_ifnames[1] = n->in_ifnames[0]; 1595 n->in_ifps[1] = n->in_ifps[0]; 1596 } else { 1597 n->in_ifps[1] = ipf_resolvenic(softc, base + n->in_ifnames[1], 1598 n->in_v[1]); 1599 } 1600 1601 if (n->in_plabel != -1) { 1602 if (n->in_redir & NAT_REDIRECT) 1603 n->in_apr = ipf_proxy_lookup(softc->ipf_proxy_soft, 1604 n->in_pr[0], 1605 base + n->in_plabel); 1606 else 1607 n->in_apr = ipf_proxy_lookup(softc->ipf_proxy_soft, 1608 n->in_pr[1], 1609 base + n->in_plabel); 1610 if (n->in_apr == NULL) 1611 return (-1); 1612 } 1613 return (0); 1614 } 1615 1616 1617 /* ------------------------------------------------------------------------ */ 1618 /* Function: ipf_nat_siocdelnat */ 1619 /* Returns: int - 0 == success, != 0 == failure */ 1620 /* Parameters: softc(I) - pointer to soft context main structure */ 1621 /* softn(I) - pointer to NAT context structure */ 1622 /* n(I) - pointer to new NAT rule */ 1623 /* getlock(I) - flag indicating if lock on is held */ 1624 /* Mutex Locks: ipf_nat_io */ 1625 /* */ 1626 /* Handle SIOCADNAT. Resolve and calculate details inside the NAT rule */ 1627 /* from information passed to the kernel, then add it to the appropriate */ 1628 /* NAT rule table(s). */ 1629 /* ------------------------------------------------------------------------ */ 1630 static void ipf_nat_siocdelnat(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,ipnat_t * n,int getlock)1631 ipf_nat_siocdelnat(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, ipnat_t *n, 1632 int getlock) 1633 { 1634 if (getlock) { 1635 WRITE_ENTER(&softc->ipf_nat); 1636 } 1637 1638 ipf_nat_delrule(softc, softn, n, 1); 1639 1640 if (getlock) { 1641 RWLOCK_EXIT(&softc->ipf_nat); /* READ/WRITE */ 1642 } 1643 } 1644 1645 1646 /* ------------------------------------------------------------------------ */ 1647 /* Function: ipf_nat_getsz */ 1648 /* Returns: int - 0 == success, != 0 is the error value. */ 1649 /* Parameters: softc(I) - pointer to soft context main structure */ 1650 /* data(I) - pointer to natget structure with kernel */ 1651 /* pointer get the size of. */ 1652 /* getlock(I) - flag indicating whether or not the caller */ 1653 /* holds a lock on ipf_nat */ 1654 /* */ 1655 /* Handle SIOCSTGSZ. */ 1656 /* Return the size of the nat list entry to be copied back to user space. */ 1657 /* The size of the entry is stored in the ng_sz field and the enture natget */ 1658 /* structure is copied back to the user. */ 1659 /* ------------------------------------------------------------------------ */ 1660 static int ipf_nat_getsz(ipf_main_softc_t * softc,caddr_t data,int getlock)1661 ipf_nat_getsz(ipf_main_softc_t *softc, caddr_t data, int getlock) 1662 { 1663 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1664 ap_session_t *aps; 1665 nat_t *nat, *n; 1666 natget_t ng; 1667 int error; 1668 1669 error = BCOPYIN(data, &ng, sizeof(ng)); 1670 if (error != 0) { 1671 IPFERROR(60024); 1672 return (EFAULT); 1673 } 1674 1675 if (getlock) { 1676 READ_ENTER(&softc->ipf_nat); 1677 } 1678 1679 nat = ng.ng_ptr; 1680 if (!nat) { 1681 nat = softn->ipf_nat_instances; 1682 ng.ng_sz = 0; 1683 /* 1684 * Empty list so the size returned is 0. Simple. 1685 */ 1686 if (nat == NULL) { 1687 if (getlock) { 1688 RWLOCK_EXIT(&softc->ipf_nat); 1689 } 1690 error = BCOPYOUT(&ng, data, sizeof(ng)); 1691 if (error != 0) { 1692 IPFERROR(60025); 1693 return (EFAULT); 1694 } 1695 return (0); 1696 } 1697 } else { 1698 /* 1699 * Make sure the pointer we're copying from exists in the 1700 * current list of entries. Security precaution to prevent 1701 * copying of random kernel data. 1702 */ 1703 for (n = softn->ipf_nat_instances; n; n = n->nat_next) 1704 if (n == nat) 1705 break; 1706 if (n == NULL) { 1707 if (getlock) { 1708 RWLOCK_EXIT(&softc->ipf_nat); 1709 } 1710 IPFERROR(60026); 1711 return (ESRCH); 1712 } 1713 } 1714 1715 /* 1716 * Include any space required for proxy data structures. 1717 */ 1718 ng.ng_sz = sizeof(nat_save_t); 1719 aps = nat->nat_aps; 1720 if (aps != NULL) { 1721 ng.ng_sz += sizeof(ap_session_t) - 4; 1722 if (aps->aps_data != 0) 1723 ng.ng_sz += aps->aps_psiz; 1724 } 1725 if (getlock) { 1726 RWLOCK_EXIT(&softc->ipf_nat); 1727 } 1728 1729 error = BCOPYOUT(&ng, data, sizeof(ng)); 1730 if (error != 0) { 1731 IPFERROR(60027); 1732 return (EFAULT); 1733 } 1734 return (0); 1735 } 1736 1737 1738 /* ------------------------------------------------------------------------ */ 1739 /* Function: ipf_nat_getent */ 1740 /* Returns: int - 0 == success, != 0 is the error value. */ 1741 /* Parameters: softc(I) - pointer to soft context main structure */ 1742 /* data(I) - pointer to natget structure with kernel pointer*/ 1743 /* to NAT structure to copy out. */ 1744 /* getlock(I) - flag indicating whether or not the caller */ 1745 /* holds a lock on ipf_nat */ 1746 /* */ 1747 /* Handle SIOCSTGET. */ 1748 /* Copies out NAT entry to user space. Any additional data held for a */ 1749 /* proxy is also copied, as to is the NAT rule which was responsible for it */ 1750 /* ------------------------------------------------------------------------ */ 1751 static int ipf_nat_getent(ipf_main_softc_t * softc,caddr_t data,int getlock)1752 ipf_nat_getent(ipf_main_softc_t *softc, caddr_t data, int getlock) 1753 { 1754 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1755 int error, outsize; 1756 ap_session_t *aps; 1757 nat_save_t *ipn, ipns; 1758 nat_t *n, *nat; 1759 1760 error = ipf_inobj(softc, data, NULL, &ipns, IPFOBJ_NATSAVE); 1761 if (error != 0) 1762 return (error); 1763 1764 if ((ipns.ipn_dsize < sizeof(ipns)) || (ipns.ipn_dsize > 81920)) { 1765 IPFERROR(60028); 1766 return (EINVAL); 1767 } 1768 1769 KMALLOCS(ipn, nat_save_t *, ipns.ipn_dsize); 1770 if (ipn == NULL) { 1771 IPFERROR(60029); 1772 return (ENOMEM); 1773 } 1774 1775 if (getlock) { 1776 READ_ENTER(&softc->ipf_nat); 1777 } 1778 1779 ipn->ipn_dsize = ipns.ipn_dsize; 1780 nat = ipns.ipn_next; 1781 if (nat == NULL) { 1782 nat = softn->ipf_nat_instances; 1783 if (nat == NULL) { 1784 if (softn->ipf_nat_instances == NULL) { 1785 IPFERROR(60030); 1786 error = ENOENT; 1787 } 1788 goto finished; 1789 } 1790 } else { 1791 /* 1792 * Make sure the pointer we're copying from exists in the 1793 * current list of entries. Security precaution to prevent 1794 * copying of random kernel data. 1795 */ 1796 for (n = softn->ipf_nat_instances; n; n = n->nat_next) 1797 if (n == nat) 1798 break; 1799 if (n == NULL) { 1800 IPFERROR(60031); 1801 error = ESRCH; 1802 goto finished; 1803 } 1804 } 1805 ipn->ipn_next = nat->nat_next; 1806 1807 /* 1808 * Copy the NAT structure. 1809 */ 1810 bcopy((char *)nat, &ipn->ipn_nat, sizeof(*nat)); 1811 1812 /* 1813 * If we have a pointer to the NAT rule it belongs to, save that too. 1814 */ 1815 if (nat->nat_ptr != NULL) 1816 bcopy((char *)nat->nat_ptr, (char *)&ipn->ipn_ipnat, 1817 sizeof(nat->nat_ptr)); 1818 1819 /* 1820 * If we also know the NAT entry has an associated filter rule, 1821 * save that too. 1822 */ 1823 if (nat->nat_fr != NULL) 1824 bcopy((char *)nat->nat_fr, (char *)&ipn->ipn_fr, 1825 sizeof(ipn->ipn_fr)); 1826 1827 /* 1828 * Last but not least, if there is an application proxy session set 1829 * up for this NAT entry, then copy that out too, including any 1830 * private data saved along side it by the proxy. 1831 */ 1832 aps = nat->nat_aps; 1833 outsize = ipn->ipn_dsize - sizeof(*ipn) + sizeof(ipn->ipn_data); 1834 if (aps != NULL) { 1835 char *s; 1836 1837 if (outsize < sizeof(*aps)) { 1838 IPFERROR(60032); 1839 error = ENOBUFS; 1840 goto finished; 1841 } 1842 1843 s = ipn->ipn_data; 1844 bcopy((char *)aps, s, sizeof(*aps)); 1845 s += sizeof(*aps); 1846 outsize -= sizeof(*aps); 1847 if ((aps->aps_data != NULL) && (outsize >= aps->aps_psiz)) 1848 bcopy(aps->aps_data, s, aps->aps_psiz); 1849 else { 1850 IPFERROR(60033); 1851 error = ENOBUFS; 1852 } 1853 } 1854 if (error == 0) { 1855 error = ipf_outobjsz(softc, data, ipn, IPFOBJ_NATSAVE, 1856 ipns.ipn_dsize); 1857 } 1858 1859 finished: 1860 if (ipn != NULL) { 1861 KFREES(ipn, ipns.ipn_dsize); 1862 } 1863 if (getlock) { 1864 RWLOCK_EXIT(&softc->ipf_nat); 1865 } 1866 return (error); 1867 } 1868 1869 1870 /* ------------------------------------------------------------------------ */ 1871 /* Function: ipf_nat_putent */ 1872 /* Returns: int - 0 == success, != 0 is the error value. */ 1873 /* Parameters: softc(I) - pointer to soft context main structure */ 1874 /* data(I) - pointer to natget structure with NAT */ 1875 /* structure information to load into the kernel */ 1876 /* getlock(I) - flag indicating whether or not a write lock */ 1877 /* on is already held. */ 1878 /* */ 1879 /* Handle SIOCSTPUT. */ 1880 /* Loads a NAT table entry from user space, including a NAT rule, proxy and */ 1881 /* firewall rule data structures, if pointers to them indicate so. */ 1882 /* ------------------------------------------------------------------------ */ 1883 static int ipf_nat_putent(ipf_main_softc_t * softc,caddr_t data,int getlock)1884 ipf_nat_putent(ipf_main_softc_t *softc, caddr_t data, int getlock) 1885 { 1886 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 1887 nat_save_t ipn, *ipnn; 1888 ap_session_t *aps; 1889 nat_t *n, *nat; 1890 frentry_t *fr; 1891 fr_info_t fin; 1892 ipnat_t *in; 1893 int error; 1894 1895 error = ipf_inobj(softc, data, NULL, &ipn, IPFOBJ_NATSAVE); 1896 if (error != 0) 1897 return (error); 1898 1899 /* 1900 * Initialise early because of code at junkput label. 1901 */ 1902 n = NULL; 1903 in = NULL; 1904 aps = NULL; 1905 nat = NULL; 1906 ipnn = NULL; 1907 fr = NULL; 1908 1909 /* 1910 * New entry, copy in the rest of the NAT entry if it's size is more 1911 * than just the nat_t structure. 1912 */ 1913 if (ipn.ipn_dsize > sizeof(ipn)) { 1914 if (ipn.ipn_dsize > 81920) { 1915 IPFERROR(60034); 1916 error = ENOMEM; 1917 goto junkput; 1918 } 1919 1920 KMALLOCS(ipnn, nat_save_t *, ipn.ipn_dsize); 1921 if (ipnn == NULL) { 1922 IPFERROR(60035); 1923 return (ENOMEM); 1924 } 1925 1926 bzero(ipnn, ipn.ipn_dsize); 1927 error = ipf_inobjsz(softc, data, ipnn, IPFOBJ_NATSAVE, 1928 ipn.ipn_dsize); 1929 if (error != 0) { 1930 goto junkput; 1931 } 1932 } else 1933 ipnn = &ipn; 1934 1935 KMALLOC(nat, nat_t *); 1936 if (nat == NULL) { 1937 IPFERROR(60037); 1938 error = ENOMEM; 1939 goto junkput; 1940 } 1941 1942 bcopy((char *)&ipnn->ipn_nat, (char *)nat, sizeof(*nat)); 1943 1944 switch (nat->nat_v[0]) 1945 { 1946 case 4: 1947 #ifdef USE_INET6 1948 case 6 : 1949 #endif 1950 break; 1951 default : 1952 IPFERROR(60061); 1953 error = EPROTONOSUPPORT; 1954 goto junkput; 1955 /*NOTREACHED*/ 1956 } 1957 1958 /* 1959 * Initialize all these so that ipf_nat_delete() doesn't cause a crash. 1960 */ 1961 bzero((char *)nat, offsetof(struct nat, nat_tqe)); 1962 nat->nat_tqe.tqe_pnext = NULL; 1963 nat->nat_tqe.tqe_next = NULL; 1964 nat->nat_tqe.tqe_ifq = NULL; 1965 nat->nat_tqe.tqe_parent = nat; 1966 1967 /* 1968 * Restore the rule associated with this nat session 1969 */ 1970 in = ipnn->ipn_nat.nat_ptr; 1971 if (in != NULL) { 1972 KMALLOCS(in, ipnat_t *, ipnn->ipn_ipnat.in_size); 1973 nat->nat_ptr = in; 1974 if (in == NULL) { 1975 IPFERROR(60038); 1976 error = ENOMEM; 1977 goto junkput; 1978 } 1979 bcopy((char *)&ipnn->ipn_ipnat, (char *)in, 1980 ipnn->ipn_ipnat.in_size); 1981 in->in_use = 1; 1982 in->in_flags |= IPN_DELETE; 1983 1984 ATOMIC_INC32(softn->ipf_nat_stats.ns_rules); 1985 1986 if (ipf_nat_resolverule(softc, in) != 0) { 1987 IPFERROR(60039); 1988 error = ESRCH; 1989 goto junkput; 1990 } 1991 } 1992 1993 /* 1994 * Check that the NAT entry doesn't already exist in the kernel. 1995 * 1996 * For NAT_OUTBOUND, we're lookup for a duplicate MAP entry. To do 1997 * this, we check to see if the inbound combination of addresses and 1998 * ports is already known. Similar logic is applied for NAT_INBOUND. 1999 * 2000 */ 2001 bzero((char *)&fin, sizeof(fin)); 2002 fin.fin_v = nat->nat_v[0]; 2003 fin.fin_p = nat->nat_pr[0]; 2004 fin.fin_rev = nat->nat_rev; 2005 fin.fin_ifp = nat->nat_ifps[0]; 2006 fin.fin_data[0] = ntohs(nat->nat_ndport); 2007 fin.fin_data[1] = ntohs(nat->nat_nsport); 2008 2009 switch (nat->nat_dir) 2010 { 2011 case NAT_OUTBOUND : 2012 case NAT_DIVERTOUT : 2013 if (getlock) { 2014 READ_ENTER(&softc->ipf_nat); 2015 } 2016 2017 fin.fin_v = nat->nat_v[1]; 2018 if (nat->nat_v[1] == 4) { 2019 n = ipf_nat_inlookup(&fin, nat->nat_flags, fin.fin_p, 2020 nat->nat_ndstip, nat->nat_nsrcip); 2021 #ifdef USE_INET6 2022 } else if (nat->nat_v[1] == 6) { 2023 n = ipf_nat6_inlookup(&fin, nat->nat_flags, fin.fin_p, 2024 &nat->nat_ndst6.in6, 2025 &nat->nat_nsrc6.in6); 2026 #endif 2027 } 2028 2029 if (getlock) { 2030 RWLOCK_EXIT(&softc->ipf_nat); 2031 } 2032 if (n != NULL) { 2033 IPFERROR(60040); 2034 error = EEXIST; 2035 goto junkput; 2036 } 2037 break; 2038 2039 case NAT_INBOUND : 2040 case NAT_DIVERTIN : 2041 if (getlock) { 2042 READ_ENTER(&softc->ipf_nat); 2043 } 2044 2045 if (fin.fin_v == 4) { 2046 n = ipf_nat_outlookup(&fin, nat->nat_flags, fin.fin_p, 2047 nat->nat_ndstip, 2048 nat->nat_nsrcip); 2049 #ifdef USE_INET6 2050 } else if (fin.fin_v == 6) { 2051 n = ipf_nat6_outlookup(&fin, nat->nat_flags, fin.fin_p, 2052 &nat->nat_ndst6.in6, 2053 &nat->nat_nsrc6.in6); 2054 #endif 2055 } 2056 2057 if (getlock) { 2058 RWLOCK_EXIT(&softc->ipf_nat); 2059 } 2060 if (n != NULL) { 2061 IPFERROR(60041); 2062 error = EEXIST; 2063 goto junkput; 2064 } 2065 break; 2066 2067 default : 2068 IPFERROR(60042); 2069 error = EINVAL; 2070 goto junkput; 2071 } 2072 2073 /* 2074 * Restore ap_session_t structure. Include the private data allocated 2075 * if it was there. 2076 */ 2077 aps = nat->nat_aps; 2078 if (aps != NULL) { 2079 KMALLOC(aps, ap_session_t *); 2080 nat->nat_aps = aps; 2081 if (aps == NULL) { 2082 IPFERROR(60043); 2083 error = ENOMEM; 2084 goto junkput; 2085 } 2086 bcopy(ipnn->ipn_data, (char *)aps, sizeof(*aps)); 2087 if (in != NULL) 2088 aps->aps_apr = in->in_apr; 2089 else 2090 aps->aps_apr = NULL; 2091 if (aps->aps_psiz != 0) { 2092 if (aps->aps_psiz > 81920) { 2093 IPFERROR(60044); 2094 error = ENOMEM; 2095 goto junkput; 2096 } 2097 KMALLOCS(aps->aps_data, void *, aps->aps_psiz); 2098 if (aps->aps_data == NULL) { 2099 IPFERROR(60045); 2100 error = ENOMEM; 2101 goto junkput; 2102 } 2103 bcopy(ipnn->ipn_data + sizeof(*aps), aps->aps_data, 2104 aps->aps_psiz); 2105 } else { 2106 aps->aps_psiz = 0; 2107 aps->aps_data = NULL; 2108 } 2109 } 2110 2111 /* 2112 * If there was a filtering rule associated with this entry then 2113 * build up a new one. 2114 */ 2115 fr = nat->nat_fr; 2116 if (fr != NULL) { 2117 if ((nat->nat_flags & SI_NEWFR) != 0) { 2118 KMALLOC(fr, frentry_t *); 2119 nat->nat_fr = fr; 2120 if (fr == NULL) { 2121 IPFERROR(60046); 2122 error = ENOMEM; 2123 goto junkput; 2124 } 2125 ipnn->ipn_nat.nat_fr = fr; 2126 fr->fr_ref = 1; 2127 (void) ipf_outobj(softc, data, ipnn, IPFOBJ_NATSAVE); 2128 bcopy((char *)&ipnn->ipn_fr, (char *)fr, sizeof(*fr)); 2129 2130 fr->fr_ref = 1; 2131 fr->fr_dsize = 0; 2132 fr->fr_data = NULL; 2133 fr->fr_type = FR_T_NONE; 2134 2135 MUTEX_NUKE(&fr->fr_lock); 2136 MUTEX_INIT(&fr->fr_lock, "nat-filter rule lock"); 2137 } else { 2138 if (getlock) { 2139 READ_ENTER(&softc->ipf_nat); 2140 } 2141 for (n = softn->ipf_nat_instances; n; n = n->nat_next) 2142 if (n->nat_fr == fr) 2143 break; 2144 2145 if (n != NULL) { 2146 MUTEX_ENTER(&fr->fr_lock); 2147 fr->fr_ref++; 2148 MUTEX_EXIT(&fr->fr_lock); 2149 } 2150 if (getlock) { 2151 RWLOCK_EXIT(&softc->ipf_nat); 2152 } 2153 2154 if (n == NULL) { 2155 IPFERROR(60047); 2156 error = ESRCH; 2157 goto junkput; 2158 } 2159 } 2160 } 2161 2162 if (ipnn != &ipn) { 2163 KFREES(ipnn, ipn.ipn_dsize); 2164 ipnn = NULL; 2165 } 2166 2167 if (getlock) { 2168 WRITE_ENTER(&softc->ipf_nat); 2169 } 2170 2171 if (fin.fin_v == 4) 2172 error = ipf_nat_finalise(&fin, nat); 2173 #ifdef USE_INET6 2174 else 2175 error = ipf_nat6_finalise(&fin, nat); 2176 #endif 2177 2178 if (getlock) { 2179 RWLOCK_EXIT(&softc->ipf_nat); 2180 } 2181 2182 if (error == 0) 2183 return (0); 2184 2185 IPFERROR(60048); 2186 error = ENOMEM; 2187 2188 junkput: 2189 if (fr != NULL) { 2190 (void) ipf_derefrule(softc, &fr); 2191 } 2192 2193 if ((ipnn != NULL) && (ipnn != &ipn)) { 2194 KFREES(ipnn, ipn.ipn_dsize); 2195 } 2196 if (nat != NULL) { 2197 if (aps != NULL) { 2198 if (aps->aps_data != NULL) { 2199 KFREES(aps->aps_data, aps->aps_psiz); 2200 } 2201 KFREE(aps); 2202 } 2203 if (in != NULL) { 2204 if (in->in_apr) 2205 ipf_proxy_deref(in->in_apr); 2206 KFREES(in, in->in_size); 2207 } 2208 KFREE(nat); 2209 } 2210 return (error); 2211 } 2212 2213 2214 /* ------------------------------------------------------------------------ */ 2215 /* Function: ipf_nat_delete */ 2216 /* Returns: Nil */ 2217 /* Parameters: softc(I) - pointer to soft context main structure */ 2218 /* nat(I) - pointer to NAT structure to delete */ 2219 /* logtype(I) - type of LOG record to create before deleting */ 2220 /* Write Lock: ipf_nat */ 2221 /* */ 2222 /* Delete a nat entry from the various lists and table. If NAT logging is */ 2223 /* enabled then generate a NAT log record for this event. */ 2224 /* ------------------------------------------------------------------------ */ 2225 void ipf_nat_delete(ipf_main_softc_t * softc,struct nat * nat,int logtype)2226 ipf_nat_delete(ipf_main_softc_t *softc, struct nat *nat, int logtype) 2227 { 2228 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2229 int madeorphan = 0, bkt, removed = 0; 2230 nat_stat_side_t *nss; 2231 struct ipnat *ipn; 2232 2233 if (logtype != 0 && softn->ipf_nat_logging != 0) 2234 ipf_nat_log(softc, softn, nat, logtype); 2235 2236 /* 2237 * Take it as a general indication that all the pointers are set if 2238 * nat_pnext is set. 2239 */ 2240 if (nat->nat_pnext != NULL) { 2241 removed = 1; 2242 2243 bkt = nat->nat_hv[0] % softn->ipf_nat_table_sz; 2244 nss = &softn->ipf_nat_stats.ns_side[0]; 2245 if (nss->ns_bucketlen[bkt] > 0) 2246 nss->ns_bucketlen[bkt]--; 2247 if (nss->ns_bucketlen[bkt] == 0) { 2248 nss->ns_inuse--; 2249 } 2250 2251 bkt = nat->nat_hv[1] % softn->ipf_nat_table_sz; 2252 nss = &softn->ipf_nat_stats.ns_side[1]; 2253 if (nss->ns_bucketlen[bkt] > 0) 2254 nss->ns_bucketlen[bkt]--; 2255 if (nss->ns_bucketlen[bkt] == 0) { 2256 nss->ns_inuse--; 2257 } 2258 2259 *nat->nat_pnext = nat->nat_next; 2260 if (nat->nat_next != NULL) { 2261 nat->nat_next->nat_pnext = nat->nat_pnext; 2262 nat->nat_next = NULL; 2263 } 2264 nat->nat_pnext = NULL; 2265 2266 *nat->nat_phnext[0] = nat->nat_hnext[0]; 2267 if (nat->nat_hnext[0] != NULL) { 2268 nat->nat_hnext[0]->nat_phnext[0] = nat->nat_phnext[0]; 2269 nat->nat_hnext[0] = NULL; 2270 } 2271 nat->nat_phnext[0] = NULL; 2272 2273 *nat->nat_phnext[1] = nat->nat_hnext[1]; 2274 if (nat->nat_hnext[1] != NULL) { 2275 nat->nat_hnext[1]->nat_phnext[1] = nat->nat_phnext[1]; 2276 nat->nat_hnext[1] = NULL; 2277 } 2278 nat->nat_phnext[1] = NULL; 2279 2280 if ((nat->nat_flags & SI_WILDP) != 0) { 2281 ATOMIC_DEC32(softn->ipf_nat_stats.ns_wilds); 2282 } 2283 madeorphan = 1; 2284 } 2285 2286 if (nat->nat_me != NULL) { 2287 *nat->nat_me = NULL; 2288 nat->nat_me = NULL; 2289 nat->nat_ref--; 2290 ASSERT(nat->nat_ref >= 0); 2291 } 2292 2293 if (nat->nat_tqe.tqe_ifq != NULL) { 2294 /* 2295 * No call to ipf_freetimeoutqueue() is made here, they are 2296 * garbage collected in ipf_nat_expire(). 2297 */ 2298 (void) ipf_deletequeueentry(&nat->nat_tqe); 2299 } 2300 2301 if (nat->nat_sync) { 2302 ipf_sync_del_nat(softc->ipf_sync_soft, nat->nat_sync); 2303 nat->nat_sync = NULL; 2304 } 2305 2306 if (logtype == NL_EXPIRE) 2307 softn->ipf_nat_stats.ns_expire++; 2308 2309 MUTEX_ENTER(&nat->nat_lock); 2310 /* 2311 * NL_DESTROY should only be passed in when we've got nat_ref >= 2. 2312 * This happens when a nat'd packet is blocked and we want to throw 2313 * away the NAT session. 2314 */ 2315 if (logtype == NL_DESTROY) { 2316 if (nat->nat_ref > 2) { 2317 nat->nat_ref -= 2; 2318 MUTEX_EXIT(&nat->nat_lock); 2319 if (removed) 2320 softn->ipf_nat_stats.ns_orphans++; 2321 return; 2322 } 2323 } else if (nat->nat_ref > 1) { 2324 nat->nat_ref--; 2325 MUTEX_EXIT(&nat->nat_lock); 2326 if (madeorphan == 1) 2327 softn->ipf_nat_stats.ns_orphans++; 2328 return; 2329 } 2330 ASSERT(nat->nat_ref >= 0); 2331 MUTEX_EXIT(&nat->nat_lock); 2332 2333 nat->nat_ref = 0; 2334 2335 if (madeorphan == 0) 2336 softn->ipf_nat_stats.ns_orphans--; 2337 2338 /* 2339 * At this point, nat_ref can be either 0 or -1 2340 */ 2341 softn->ipf_nat_stats.ns_proto[nat->nat_pr[0]]--; 2342 2343 if (nat->nat_fr != NULL) { 2344 (void) ipf_derefrule(softc, &nat->nat_fr); 2345 } 2346 2347 if (nat->nat_hm != NULL) { 2348 ipf_nat_hostmapdel(softc, &nat->nat_hm); 2349 } 2350 2351 /* 2352 * If there is an active reference from the nat entry to its parent 2353 * rule, decrement the rule's reference count and free it too if no 2354 * longer being used. 2355 */ 2356 ipn = nat->nat_ptr; 2357 nat->nat_ptr = NULL; 2358 2359 if (ipn != NULL) { 2360 ipn->in_space++; 2361 ipf_nat_rule_deref(softc, &ipn); 2362 } 2363 2364 if (nat->nat_aps != NULL) { 2365 ipf_proxy_free(softc, nat->nat_aps); 2366 nat->nat_aps = NULL; 2367 } 2368 2369 MUTEX_DESTROY(&nat->nat_lock); 2370 2371 softn->ipf_nat_stats.ns_active--; 2372 2373 /* 2374 * If there's a fragment table entry too for this nat entry, then 2375 * dereference that as well. This is after nat_lock is released 2376 * because of Tru64. 2377 */ 2378 ipf_frag_natforget(softc, (void *)nat); 2379 2380 KFREE(nat); 2381 } 2382 2383 2384 /* ------------------------------------------------------------------------ */ 2385 /* Function: ipf_nat_flushtable */ 2386 /* Returns: int - number of NAT rules deleted */ 2387 /* Parameters: softc(I) - pointer to soft context main structure */ 2388 /* softn(I) - pointer to NAT context structure */ 2389 /* Write Lock: ipf_nat */ 2390 /* */ 2391 /* Deletes all currently active NAT sessions. In deleting each NAT entry a */ 2392 /* log record should be emitted in ipf_nat_delete() if NAT logging is */ 2393 /* enabled. */ 2394 /* ------------------------------------------------------------------------ */ 2395 /* 2396 * nat_flushtable - clear the NAT table of all mapping entries. 2397 */ 2398 static int ipf_nat_flushtable(ipf_main_softc_t * softc,ipf_nat_softc_t * softn)2399 ipf_nat_flushtable(ipf_main_softc_t *softc, ipf_nat_softc_t *softn) 2400 { 2401 nat_t *nat; 2402 int j = 0; 2403 2404 /* 2405 * ALL NAT mappings deleted, so lets just make the deletions 2406 * quicker. 2407 */ 2408 if (softn->ipf_nat_table[0] != NULL) 2409 bzero((char *)softn->ipf_nat_table[0], 2410 sizeof(softn->ipf_nat_table[0]) * 2411 softn->ipf_nat_table_sz); 2412 if (softn->ipf_nat_table[1] != NULL) 2413 bzero((char *)softn->ipf_nat_table[1], 2414 sizeof(softn->ipf_nat_table[1]) * 2415 softn->ipf_nat_table_sz); 2416 2417 while ((nat = softn->ipf_nat_instances) != NULL) { 2418 ipf_nat_delete(softc, nat, NL_FLUSH); 2419 j++; 2420 } 2421 2422 return (j); 2423 } 2424 2425 2426 /* ------------------------------------------------------------------------ */ 2427 /* Function: ipf_nat_clearlist */ 2428 /* Returns: int - number of NAT/RDR rules deleted */ 2429 /* Parameters: softc(I) - pointer to soft context main structure */ 2430 /* softn(I) - pointer to NAT context structure */ 2431 /* */ 2432 /* Delete all rules in the current list of rules. There is nothing elegant */ 2433 /* about this cleanup: simply free all entries on the list of rules and */ 2434 /* clear out the tables used for hashed NAT rule lookups. */ 2435 /* ------------------------------------------------------------------------ */ 2436 static int ipf_nat_clearlist(ipf_main_softc_t * softc,ipf_nat_softc_t * softn)2437 ipf_nat_clearlist(ipf_main_softc_t *softc, ipf_nat_softc_t *softn) 2438 { 2439 ipnat_t *n; 2440 int i = 0; 2441 2442 if (softn->ipf_nat_map_rules != NULL) { 2443 bzero((char *)softn->ipf_nat_map_rules, 2444 sizeof(*softn->ipf_nat_map_rules) * 2445 softn->ipf_nat_maprules_sz); 2446 } 2447 if (softn->ipf_nat_rdr_rules != NULL) { 2448 bzero((char *)softn->ipf_nat_rdr_rules, 2449 sizeof(*softn->ipf_nat_rdr_rules) * 2450 softn->ipf_nat_rdrrules_sz); 2451 } 2452 2453 while ((n = softn->ipf_nat_list) != NULL) { 2454 ipf_nat_delrule(softc, softn, n, 0); 2455 i++; 2456 } 2457 #if SOLARIS && !defined(INSTANCES) 2458 pfil_delayed_copy = 1; 2459 #endif 2460 return (i); 2461 } 2462 2463 2464 /* ------------------------------------------------------------------------ */ 2465 /* Function: ipf_nat_delrule */ 2466 /* Returns: Nil */ 2467 /* Parameters: softc(I) - pointer to soft context main structure */ 2468 /* softn(I) - pointer to NAT context structure */ 2469 /* np(I) - pointer to NAT rule to delete */ 2470 /* purge(I) - 1 == allow purge, 0 == prevent purge */ 2471 /* Locks: WRITE(ipf_nat) */ 2472 /* */ 2473 /* Preventing "purge" from occuring is allowed because when all of the NAT */ 2474 /* rules are being removed, allowing the "purge" to walk through the list */ 2475 /* of NAT sessions, possibly multiple times, would be a large performance */ 2476 /* hit, on the order of O(N^2). */ 2477 /* ------------------------------------------------------------------------ */ 2478 static void ipf_nat_delrule(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,ipnat_t * np,int purge)2479 ipf_nat_delrule(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, ipnat_t *np, 2480 int purge) 2481 { 2482 2483 if (np->in_pnext != NULL) { 2484 *np->in_pnext = np->in_next; 2485 if (np->in_next != NULL) 2486 np->in_next->in_pnext = np->in_pnext; 2487 if (softn->ipf_nat_list_tail == &np->in_next) 2488 softn->ipf_nat_list_tail = np->in_pnext; 2489 } 2490 2491 if ((purge == 1) && ((np->in_flags & IPN_PURGE) != 0)) { 2492 nat_t *next; 2493 nat_t *nat; 2494 2495 for (next = softn->ipf_nat_instances; (nat = next) != NULL;) { 2496 next = nat->nat_next; 2497 if (nat->nat_ptr == np) 2498 ipf_nat_delete(softc, nat, NL_PURGE); 2499 } 2500 } 2501 2502 if ((np->in_flags & IPN_DELETE) == 0) { 2503 if (np->in_redir & NAT_REDIRECT) { 2504 switch (np->in_v[0]) 2505 { 2506 case 4 : 2507 ipf_nat_delrdr(softn, np); 2508 break; 2509 #ifdef USE_INET6 2510 case 6 : 2511 ipf_nat6_delrdr(softn, np); 2512 break; 2513 #endif 2514 } 2515 } 2516 if (np->in_redir & (NAT_MAPBLK|NAT_MAP)) { 2517 switch (np->in_v[0]) 2518 { 2519 case 4 : 2520 ipf_nat_delmap(softn, np); 2521 break; 2522 #ifdef USE_INET6 2523 case 6 : 2524 ipf_nat6_delmap(softn, np); 2525 break; 2526 #endif 2527 } 2528 } 2529 } 2530 2531 np->in_flags |= IPN_DELETE; 2532 ipf_nat_rule_deref(softc, &np); 2533 } 2534 2535 2536 /* ------------------------------------------------------------------------ */ 2537 /* Function: ipf_nat_newmap */ 2538 /* Returns: int - -1 == error, 0 == success */ 2539 /* Parameters: fin(I) - pointer to packet information */ 2540 /* nat(I) - pointer to NAT entry */ 2541 /* ni(I) - pointer to structure with misc. information needed */ 2542 /* to create new NAT entry. */ 2543 /* */ 2544 /* Given an empty NAT structure, populate it with new information about a */ 2545 /* new NAT session, as defined by the matching NAT rule. */ 2546 /* ni.nai_ip is passed in uninitialised and must be set, in host byte order,*/ 2547 /* to the new IP address for the translation. */ 2548 /* ------------------------------------------------------------------------ */ 2549 static int ipf_nat_newmap(fr_info_t * fin,nat_t * nat,natinfo_t * ni)2550 ipf_nat_newmap(fr_info_t *fin, nat_t *nat, natinfo_t *ni) 2551 { 2552 ipf_main_softc_t *softc = fin->fin_main_soft; 2553 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2554 u_short st_port, dport, sport, port, sp, dp; 2555 struct in_addr in, inb; 2556 hostmap_t *hm; 2557 u_32_t flags; 2558 u_32_t st_ip; 2559 ipnat_t *np; 2560 nat_t *natl; 2561 int l; 2562 2563 /* 2564 * If it's an outbound packet which doesn't match any existing 2565 * record, then create a new port 2566 */ 2567 l = 0; 2568 hm = NULL; 2569 np = ni->nai_np; 2570 st_ip = np->in_snip; 2571 st_port = np->in_spnext; 2572 flags = nat->nat_flags; 2573 2574 if (flags & IPN_ICMPQUERY) { 2575 sport = fin->fin_data[1]; 2576 dport = 0; 2577 } else { 2578 sport = htons(fin->fin_data[0]); 2579 dport = htons(fin->fin_data[1]); 2580 } 2581 2582 /* 2583 * Do a loop until we either run out of entries to try or we find 2584 * a NAT mapping that isn't currently being used. This is done 2585 * because the change to the source is not (usually) being fixed. 2586 */ 2587 do { 2588 port = 0; 2589 in.s_addr = htonl(np->in_snip); 2590 if (l == 0) { 2591 /* 2592 * Check to see if there is an existing NAT 2593 * setup for this IP address pair. 2594 */ 2595 hm = ipf_nat_hostmap(softn, np, fin->fin_src, 2596 fin->fin_dst, in, 0); 2597 if (hm != NULL) 2598 in.s_addr = hm->hm_nsrcip.s_addr; 2599 } else if ((l == 1) && (hm != NULL)) { 2600 ipf_nat_hostmapdel(softc, &hm); 2601 } 2602 in.s_addr = ntohl(in.s_addr); 2603 2604 nat->nat_hm = hm; 2605 2606 if ((np->in_nsrcmsk == 0xffffffff) && (np->in_spnext == 0)) { 2607 if (l > 0) { 2608 NBUMPSIDEX(1, ns_exhausted, ns_exhausted_1); 2609 DT4(ns_exhausted_1, fr_info_t *, fin, nat_t *, nat, natinfo_t *, ni, ipnat_t *, np); 2610 return (-1); 2611 } 2612 } 2613 2614 if (np->in_redir == NAT_BIMAP && 2615 np->in_osrcmsk == np->in_nsrcmsk) { 2616 /* 2617 * map the address block in a 1:1 fashion 2618 */ 2619 in.s_addr = np->in_nsrcaddr; 2620 in.s_addr |= fin->fin_saddr & ~np->in_osrcmsk; 2621 in.s_addr = ntohl(in.s_addr); 2622 2623 } else if (np->in_redir & NAT_MAPBLK) { 2624 if ((l >= np->in_ppip) || ((l > 0) && 2625 !(flags & IPN_TCPUDP))) { 2626 NBUMPSIDEX(1, ns_exhausted, ns_exhausted_2); 2627 DT4(ns_exhausted_2, fr_info_t *, fin, nat_t *, nat, natinfo_t *, ni, ipnat_t *, np); 2628 return (-1); 2629 } 2630 /* 2631 * map-block - Calculate destination address. 2632 */ 2633 in.s_addr = ntohl(fin->fin_saddr); 2634 in.s_addr &= ntohl(~np->in_osrcmsk); 2635 inb.s_addr = in.s_addr; 2636 in.s_addr /= np->in_ippip; 2637 in.s_addr &= ntohl(~np->in_nsrcmsk); 2638 in.s_addr += ntohl(np->in_nsrcaddr); 2639 /* 2640 * Calculate destination port. 2641 */ 2642 if ((flags & IPN_TCPUDP) && 2643 (np->in_ppip != 0)) { 2644 port = ntohs(sport) + l; 2645 port %= np->in_ppip; 2646 port += np->in_ppip * 2647 (inb.s_addr % np->in_ippip); 2648 port += MAPBLK_MINPORT; 2649 port = htons(port); 2650 } 2651 2652 } else if ((np->in_nsrcaddr == 0) && 2653 (np->in_nsrcmsk == 0xffffffff)) { 2654 i6addr_t in6; 2655 2656 /* 2657 * 0/32 - use the interface's IP address. 2658 */ 2659 if ((l > 0) || 2660 ipf_ifpaddr(softc, 4, FRI_NORMAL, fin->fin_ifp, 2661 &in6, NULL) == -1) { 2662 NBUMPSIDEX(1, ns_new_ifpaddr, ns_new_ifpaddr_1); 2663 DT4(ns_new_ifpaddr_1, fr_info_t *, fin, nat_t *, nat, natinfo_t *, ni, ipnat_t *, np); 2664 return (-1); 2665 } 2666 in.s_addr = ntohl(in6.in4.s_addr); 2667 2668 } else if ((np->in_nsrcaddr == 0) && (np->in_nsrcmsk == 0)) { 2669 /* 2670 * 0/0 - use the original source address/port. 2671 */ 2672 if (l > 0) { 2673 NBUMPSIDEX(1, ns_exhausted, ns_exhausted_3); 2674 DT4(ns_exhausted_3, fr_info_t *, fin, nat_t *, nat, natinfo_t *, ni, ipnat_t *, np); 2675 return (-1); 2676 } 2677 in.s_addr = ntohl(fin->fin_saddr); 2678 2679 } else if ((np->in_nsrcmsk != 0xffffffff) && 2680 (np->in_spnext == 0) && ((l > 0) || (hm == NULL))) 2681 np->in_snip++; 2682 2683 natl = NULL; 2684 2685 if ((flags & IPN_TCPUDP) && 2686 ((np->in_redir & NAT_MAPBLK) == 0) && 2687 (np->in_flags & IPN_AUTOPORTMAP)) { 2688 /* 2689 * "ports auto" (without map-block) 2690 */ 2691 if ((l > 0) && (l % np->in_ppip == 0)) { 2692 if ((l > np->in_ppip) && 2693 np->in_nsrcmsk != 0xffffffff) 2694 np->in_snip++; 2695 } 2696 if (np->in_ppip != 0) { 2697 port = ntohs(sport); 2698 port += (l % np->in_ppip); 2699 port %= np->in_ppip; 2700 port += np->in_ppip * 2701 (ntohl(fin->fin_saddr) % 2702 np->in_ippip); 2703 port += MAPBLK_MINPORT; 2704 port = htons(port); 2705 } 2706 2707 } else if (((np->in_redir & NAT_MAPBLK) == 0) && 2708 (flags & IPN_TCPUDPICMP) && (np->in_spnext != 0)) { 2709 /* 2710 * Standard port translation. Select next port. 2711 */ 2712 if (np->in_flags & IPN_SEQUENTIAL) { 2713 port = np->in_spnext; 2714 } else { 2715 port = ipf_random() % (np->in_spmax - 2716 np->in_spmin + 1); 2717 port += np->in_spmin; 2718 } 2719 port = htons(port); 2720 np->in_spnext++; 2721 2722 if (np->in_spnext > np->in_spmax) { 2723 np->in_spnext = np->in_spmin; 2724 if (np->in_nsrcmsk != 0xffffffff) 2725 np->in_snip++; 2726 } 2727 } 2728 2729 if (np->in_flags & IPN_SIPRANGE) { 2730 if (np->in_snip > ntohl(np->in_nsrcmsk)) 2731 np->in_snip = ntohl(np->in_nsrcaddr); 2732 } else { 2733 if ((np->in_nsrcmsk != 0xffffffff) && 2734 ((np->in_snip + 1) & ntohl(np->in_nsrcmsk)) > 2735 ntohl(np->in_nsrcaddr)) 2736 np->in_snip = ntohl(np->in_nsrcaddr) + 1; 2737 } 2738 2739 if ((port == 0) && (flags & (IPN_TCPUDPICMP|IPN_ICMPQUERY))) 2740 port = sport; 2741 2742 /* 2743 * Here we do a lookup of the connection as seen from 2744 * the outside. If an IP# pair already exists, try 2745 * again. So if you have A->B becomes C->B, you can 2746 * also have D->E become C->E but not D->B causing 2747 * another C->B. Also take protocol and ports into 2748 * account when determining whether a pre-existing 2749 * NAT setup will cause an external conflict where 2750 * this is appropriate. 2751 */ 2752 inb.s_addr = htonl(in.s_addr); 2753 sp = fin->fin_data[0]; 2754 dp = fin->fin_data[1]; 2755 fin->fin_data[0] = fin->fin_data[1]; 2756 fin->fin_data[1] = ntohs(port); 2757 natl = ipf_nat_inlookup(fin, flags & ~(SI_WILDP|NAT_SEARCH), 2758 (u_int)fin->fin_p, fin->fin_dst, inb); 2759 fin->fin_data[0] = sp; 2760 fin->fin_data[1] = dp; 2761 2762 /* 2763 * Has the search wrapped around and come back to the 2764 * start ? 2765 */ 2766 if ((natl != NULL) && 2767 (np->in_spnext != 0) && (st_port == np->in_spnext) && 2768 (np->in_snip != 0) && (st_ip == np->in_snip)) { 2769 NBUMPSIDED(1, ns_wrap); 2770 DT4(ns_wrap, fr_info_t *, fin, nat_t *, nat, natinfo_t *, ni, ipnat_t *, np); 2771 return (-1); 2772 } 2773 l++; 2774 } while (natl != NULL); 2775 2776 /* Setup the NAT table */ 2777 nat->nat_osrcip = fin->fin_src; 2778 nat->nat_nsrcaddr = htonl(in.s_addr); 2779 nat->nat_odstip = fin->fin_dst; 2780 nat->nat_ndstip = fin->fin_dst; 2781 if (nat->nat_hm == NULL) 2782 nat->nat_hm = ipf_nat_hostmap(softn, np, fin->fin_src, 2783 fin->fin_dst, nat->nat_nsrcip, 2784 0); 2785 2786 if (flags & IPN_TCPUDP) { 2787 nat->nat_osport = sport; 2788 nat->nat_nsport = port; /* sport */ 2789 nat->nat_odport = dport; 2790 nat->nat_ndport = dport; 2791 ((tcphdr_t *)fin->fin_dp)->th_sport = port; 2792 } else if (flags & IPN_ICMPQUERY) { 2793 nat->nat_oicmpid = fin->fin_data[1]; 2794 ((icmphdr_t *)fin->fin_dp)->icmp_id = port; 2795 nat->nat_nicmpid = port; 2796 } 2797 return (0); 2798 } 2799 2800 2801 /* ------------------------------------------------------------------------ */ 2802 /* Function: ipf_nat_newrdr */ 2803 /* Returns: int - -1 == error, 0 == success (no move), 1 == success and */ 2804 /* allow rule to be moved if IPN_ROUNDR is set. */ 2805 /* Parameters: fin(I) - pointer to packet information */ 2806 /* nat(I) - pointer to NAT entry */ 2807 /* ni(I) - pointer to structure with misc. information needed */ 2808 /* to create new NAT entry. */ 2809 /* */ 2810 /* ni.nai_ip is passed in uninitialised and must be set, in host byte order,*/ 2811 /* to the new IP address for the translation. */ 2812 /* ------------------------------------------------------------------------ */ 2813 static int ipf_nat_newrdr(fr_info_t * fin,nat_t * nat,natinfo_t * ni)2814 ipf_nat_newrdr(fr_info_t *fin, nat_t *nat, natinfo_t *ni) 2815 { 2816 ipf_main_softc_t *softc = fin->fin_main_soft; 2817 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 2818 u_short nport, dport, sport; 2819 struct in_addr in, inb; 2820 u_short sp, dp; 2821 hostmap_t *hm; 2822 u_32_t flags; 2823 ipnat_t *np; 2824 nat_t *natl; 2825 int move; 2826 2827 move = 1; 2828 hm = NULL; 2829 in.s_addr = 0; 2830 np = ni->nai_np; 2831 flags = nat->nat_flags; 2832 2833 if (flags & IPN_ICMPQUERY) { 2834 dport = fin->fin_data[1]; 2835 sport = 0; 2836 } else { 2837 sport = htons(fin->fin_data[0]); 2838 dport = htons(fin->fin_data[1]); 2839 } 2840 2841 /* TRACE sport, dport */ 2842 2843 2844 /* 2845 * If the matching rule has IPN_STICKY set, then we want to have the 2846 * same rule kick in as before. Why would this happen? If you have 2847 * a collection of rdr rules with "round-robin sticky", the current 2848 * packet might match a different one to the previous connection but 2849 * we want the same destination to be used. 2850 */ 2851 if (((np->in_flags & (IPN_ROUNDR|IPN_SPLIT)) != 0) && 2852 ((np->in_flags & IPN_STICKY) != 0)) { 2853 hm = ipf_nat_hostmap(softn, NULL, fin->fin_src, fin->fin_dst, 2854 in, (u_32_t)dport); 2855 if (hm != NULL) { 2856 in.s_addr = ntohl(hm->hm_ndstip.s_addr); 2857 np = hm->hm_ipnat; 2858 ni->nai_np = np; 2859 move = 0; 2860 ipf_nat_hostmapdel(softc, &hm); 2861 } 2862 } 2863 2864 /* 2865 * Otherwise, it's an inbound packet. Most likely, we don't 2866 * want to rewrite source ports and source addresses. Instead, 2867 * we want to rewrite to a fixed internal address and fixed 2868 * internal port. 2869 */ 2870 if (np->in_flags & IPN_SPLIT) { 2871 in.s_addr = np->in_dnip; 2872 inb.s_addr = htonl(in.s_addr); 2873 2874 if ((np->in_flags & (IPN_ROUNDR|IPN_STICKY)) == IPN_STICKY) { 2875 hm = ipf_nat_hostmap(softn, NULL, fin->fin_src, 2876 fin->fin_dst, inb, (u_32_t)dport); 2877 if (hm != NULL) { 2878 in.s_addr = hm->hm_ndstip.s_addr; 2879 move = 0; 2880 } 2881 } 2882 2883 if (hm == NULL || hm->hm_ref == 1) { 2884 if (np->in_ndstaddr == htonl(in.s_addr)) { 2885 np->in_dnip = ntohl(np->in_ndstmsk); 2886 move = 0; 2887 } else { 2888 np->in_dnip = ntohl(np->in_ndstaddr); 2889 } 2890 } 2891 if (hm != NULL) 2892 ipf_nat_hostmapdel(softc, &hm); 2893 2894 } else if ((np->in_ndstaddr == 0) && (np->in_ndstmsk == 0xffffffff)) { 2895 i6addr_t in6; 2896 2897 /* 2898 * 0/32 - use the interface's IP address. 2899 */ 2900 if (ipf_ifpaddr(softc, 4, FRI_NORMAL, fin->fin_ifp, 2901 &in6, NULL) == -1) { 2902 NBUMPSIDEX(0, ns_new_ifpaddr, ns_new_ifpaddr_2); 2903 DT3(ns_new_ifpaddr_2, fr_info_t *, fin, nat_t *, nat, natinfo_t, ni); 2904 return (-1); 2905 } 2906 in.s_addr = ntohl(in6.in4.s_addr); 2907 2908 } else if ((np->in_ndstaddr == 0) && (np->in_ndstmsk== 0)) { 2909 /* 2910 * 0/0 - use the original destination address/port. 2911 */ 2912 in.s_addr = ntohl(fin->fin_daddr); 2913 2914 } else if (np->in_redir == NAT_BIMAP && 2915 np->in_ndstmsk == np->in_odstmsk) { 2916 /* 2917 * map the address block in a 1:1 fashion 2918 */ 2919 in.s_addr = np->in_ndstaddr; 2920 in.s_addr |= fin->fin_daddr & ~np->in_ndstmsk; 2921 in.s_addr = ntohl(in.s_addr); 2922 } else { 2923 in.s_addr = ntohl(np->in_ndstaddr); 2924 } 2925 2926 if ((np->in_dpnext == 0) || ((flags & NAT_NOTRULEPORT) != 0)) 2927 nport = dport; 2928 else { 2929 /* 2930 * Whilst not optimized for the case where 2931 * pmin == pmax, the gain is not significant. 2932 */ 2933 if (((np->in_flags & IPN_FIXEDDPORT) == 0) && 2934 (np->in_odport != np->in_dtop)) { 2935 nport = ntohs(dport) - np->in_odport + np->in_dpmax; 2936 nport = htons(nport); 2937 } else { 2938 nport = htons(np->in_dpnext); 2939 np->in_dpnext++; 2940 if (np->in_dpnext > np->in_dpmax) 2941 np->in_dpnext = np->in_dpmin; 2942 } 2943 } 2944 2945 /* 2946 * When the redirect-to address is set to 0.0.0.0, just 2947 * assume a blank `forwarding' of the packet. We don't 2948 * setup any translation for this either. 2949 */ 2950 if (in.s_addr == 0) { 2951 if (nport == dport) { 2952 NBUMPSIDED(0, ns_xlate_null); 2953 return (-1); 2954 } 2955 in.s_addr = ntohl(fin->fin_daddr); 2956 } 2957 2958 /* 2959 * Check to see if this redirect mapping already exists and if 2960 * it does, return "failure" (allowing it to be created will just 2961 * cause one or both of these "connections" to stop working.) 2962 */ 2963 inb.s_addr = htonl(in.s_addr); 2964 sp = fin->fin_data[0]; 2965 dp = fin->fin_data[1]; 2966 fin->fin_data[1] = fin->fin_data[0]; 2967 fin->fin_data[0] = ntohs(nport); 2968 natl = ipf_nat_outlookup(fin, flags & ~(SI_WILDP|NAT_SEARCH), 2969 (u_int)fin->fin_p, inb, fin->fin_src); 2970 fin->fin_data[0] = sp; 2971 fin->fin_data[1] = dp; 2972 if (natl != NULL) { 2973 DT2(ns_new_xlate_exists, fr_info_t *, fin, nat_t *, natl); 2974 NBUMPSIDE(0, ns_xlate_exists); 2975 return (-1); 2976 } 2977 2978 inb.s_addr = htonl(in.s_addr); 2979 nat->nat_ndstaddr = htonl(in.s_addr); 2980 nat->nat_odstip = fin->fin_dst; 2981 nat->nat_nsrcip = fin->fin_src; 2982 nat->nat_osrcip = fin->fin_src; 2983 if ((nat->nat_hm == NULL) && ((np->in_flags & IPN_STICKY) != 0)) 2984 nat->nat_hm = ipf_nat_hostmap(softn, np, fin->fin_src, 2985 fin->fin_dst, inb, (u_32_t)dport); 2986 2987 if (flags & IPN_TCPUDP) { 2988 nat->nat_odport = dport; 2989 nat->nat_ndport = nport; 2990 nat->nat_osport = sport; 2991 nat->nat_nsport = sport; 2992 ((tcphdr_t *)fin->fin_dp)->th_dport = nport; 2993 } else if (flags & IPN_ICMPQUERY) { 2994 nat->nat_oicmpid = fin->fin_data[1]; 2995 ((icmphdr_t *)fin->fin_dp)->icmp_id = nport; 2996 nat->nat_nicmpid = nport; 2997 } 2998 2999 return (move); 3000 } 3001 3002 /* ------------------------------------------------------------------------ */ 3003 /* Function: ipf_nat_add */ 3004 /* Returns: nat_t* - NULL == failure to create new NAT structure, */ 3005 /* else pointer to new NAT structure */ 3006 /* Parameters: fin(I) - pointer to packet information */ 3007 /* np(I) - pointer to NAT rule */ 3008 /* natsave(I) - pointer to where to store NAT struct pointer */ 3009 /* flags(I) - flags describing the current packet */ 3010 /* direction(I) - direction of packet (in/out) */ 3011 /* Write Lock: ipf_nat */ 3012 /* */ 3013 /* Attempts to create a new NAT entry. Does not actually change the packet */ 3014 /* in any way. */ 3015 /* */ 3016 /* This function is in three main parts: (1) deal with creating a new NAT */ 3017 /* structure for a "MAP" rule (outgoing NAT translation); (2) deal with */ 3018 /* creating a new NAT structure for a "RDR" rule (incoming NAT translation) */ 3019 /* and (3) building that structure and putting it into the NAT table(s). */ 3020 /* */ 3021 /* NOTE: natsave should NOT be used to point back to an ipstate_t struct */ 3022 /* as it can result in memory being corrupted. */ 3023 /* ------------------------------------------------------------------------ */ 3024 nat_t * ipf_nat_add(fr_info_t * fin,ipnat_t * np,nat_t ** natsave,u_int flags,int direction)3025 ipf_nat_add(fr_info_t *fin, ipnat_t *np, nat_t **natsave, u_int flags, 3026 int direction) 3027 { 3028 ipf_main_softc_t *softc = fin->fin_main_soft; 3029 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3030 hostmap_t *hm = NULL; 3031 nat_t *nat, *natl; 3032 natstat_t *nsp; 3033 u_int nflags; 3034 natinfo_t ni; 3035 int move; 3036 3037 nsp = &softn->ipf_nat_stats; 3038 3039 if ((nsp->ns_active * 100 / softn->ipf_nat_table_max) > 3040 softn->ipf_nat_table_wm_high) { 3041 softn->ipf_nat_doflush = 1; 3042 } 3043 3044 if (nsp->ns_active >= softn->ipf_nat_table_max) { 3045 NBUMPSIDED(fin->fin_out, ns_table_max); 3046 DT2(ns_table_max, nat_stat_t *, nsp, ipf_nat_softc_t *, softn); 3047 return (NULL); 3048 } 3049 3050 move = 1; 3051 nflags = np->in_flags & flags; 3052 nflags &= NAT_FROMRULE; 3053 3054 ni.nai_np = np; 3055 ni.nai_dport = 0; 3056 ni.nai_sport = 0; 3057 3058 /* Give me a new nat */ 3059 KMALLOC(nat, nat_t *); 3060 if (nat == NULL) { 3061 DT(ns_memfail); 3062 NBUMPSIDED(fin->fin_out, ns_memfail); 3063 /* 3064 * Try to automatically tune the max # of entries in the 3065 * table allowed to be less than what will cause kmem_alloc() 3066 * to fail and try to eliminate panics due to out of memory 3067 * conditions arising. 3068 */ 3069 if ((softn->ipf_nat_table_max > softn->ipf_nat_table_sz) && 3070 (nsp->ns_active > 100)) { 3071 softn->ipf_nat_table_max = nsp->ns_active - 100; 3072 printf("table_max reduced to %d\n", 3073 softn->ipf_nat_table_max); 3074 } 3075 return (NULL); 3076 } 3077 3078 if (flags & IPN_ICMPQUERY) { 3079 /* 3080 * In the ICMP query NAT code, we translate the ICMP id fields 3081 * to make them unique. This is indepedent of the ICMP type 3082 * (e.g. in the unlikely event that a host sends an echo and 3083 * an tstamp request with the same id, both packets will have 3084 * their ip address/id field changed in the same way). 3085 */ 3086 /* The icmp_id field is used by the sender to identify the 3087 * process making the icmp request. (the receiver justs 3088 * copies it back in its response). So, it closely matches 3089 * the concept of source port. We overlay sport, so we can 3090 * maximally reuse the existing code. 3091 */ 3092 ni.nai_sport = fin->fin_data[1]; 3093 ni.nai_dport = 0; 3094 } 3095 3096 bzero((char *)nat, sizeof(*nat)); 3097 nat->nat_flags = flags; 3098 nat->nat_redir = np->in_redir; 3099 nat->nat_dir = direction; 3100 nat->nat_pr[0] = fin->fin_p; 3101 nat->nat_pr[1] = fin->fin_p; 3102 3103 /* 3104 * Search the current table for a match and create a new mapping 3105 * if there is none found. 3106 */ 3107 if (np->in_redir & NAT_DIVERTUDP) { 3108 move = ipf_nat_newdivert(fin, nat, &ni); 3109 3110 } else if (np->in_redir & NAT_REWRITE) { 3111 move = ipf_nat_newrewrite(fin, nat, &ni); 3112 3113 } else if (direction == NAT_OUTBOUND) { 3114 /* 3115 * We can now arrange to call this for the same connection 3116 * because ipf_nat_new doesn't protect the code path into 3117 * this function. 3118 */ 3119 natl = ipf_nat_outlookup(fin, nflags, (u_int)fin->fin_p, 3120 fin->fin_src, fin->fin_dst); 3121 if (natl != NULL) { 3122 KFREE(nat); 3123 nat = natl; 3124 goto done; 3125 } 3126 3127 move = ipf_nat_newmap(fin, nat, &ni); 3128 } else { 3129 /* 3130 * NAT_INBOUND is used for redirects rules 3131 */ 3132 natl = ipf_nat_inlookup(fin, nflags, (u_int)fin->fin_p, 3133 fin->fin_src, fin->fin_dst); 3134 if (natl != NULL) { 3135 KFREE(nat); 3136 nat = natl; 3137 goto done; 3138 } 3139 3140 move = ipf_nat_newrdr(fin, nat, &ni); 3141 } 3142 if (move == -1) 3143 goto badnat; 3144 3145 np = ni.nai_np; 3146 3147 nat->nat_mssclamp = np->in_mssclamp; 3148 nat->nat_me = natsave; 3149 nat->nat_fr = fin->fin_fr; 3150 nat->nat_rev = fin->fin_rev; 3151 nat->nat_ptr = np; 3152 nat->nat_dlocal = np->in_dlocal; 3153 3154 if ((np->in_apr != NULL) && ((nat->nat_flags & NAT_SLAVE) == 0)) { 3155 if (ipf_proxy_new(fin, nat) == -1) { 3156 NBUMPSIDED(fin->fin_out, ns_appr_fail); 3157 DT3(ns_appr_fail, fr_info_t *, fin, nat_t *, nat, ipnat_t *, np); 3158 goto badnat; 3159 } 3160 } 3161 3162 nat->nat_ifps[0] = np->in_ifps[0]; 3163 if (np->in_ifps[0] != NULL) { 3164 COPYIFNAME(np->in_v[0], np->in_ifps[0], nat->nat_ifnames[0]); 3165 } 3166 3167 nat->nat_ifps[1] = np->in_ifps[1]; 3168 if (np->in_ifps[1] != NULL) { 3169 COPYIFNAME(np->in_v[1], np->in_ifps[1], nat->nat_ifnames[1]); 3170 } 3171 3172 if (ipf_nat_finalise(fin, nat) == -1) { 3173 goto badnat; 3174 } 3175 3176 np->in_use++; 3177 3178 if ((move == 1) && (np->in_flags & IPN_ROUNDR)) { 3179 if ((np->in_redir & (NAT_REDIRECT|NAT_MAP)) == NAT_REDIRECT) { 3180 ipf_nat_delrdr(softn, np); 3181 ipf_nat_addrdr(softn, np); 3182 } else if ((np->in_redir & (NAT_REDIRECT|NAT_MAP)) == NAT_MAP) { 3183 ipf_nat_delmap(softn, np); 3184 ipf_nat_addmap(softn, np); 3185 } 3186 } 3187 3188 if (flags & SI_WILDP) 3189 nsp->ns_wilds++; 3190 nsp->ns_proto[nat->nat_pr[0]]++; 3191 3192 goto done; 3193 badnat: 3194 DT3(ns_badnatnew, fr_info_t *, fin, nat_t *, nat, ipnat_t *, np); 3195 NBUMPSIDE(fin->fin_out, ns_badnatnew); 3196 if ((hm = nat->nat_hm) != NULL) 3197 ipf_nat_hostmapdel(softc, &hm); 3198 KFREE(nat); 3199 nat = NULL; 3200 done: 3201 if (nat != NULL && np != NULL) 3202 np->in_hits++; 3203 if (natsave != NULL) 3204 *natsave = nat; 3205 return (nat); 3206 } 3207 3208 3209 /* ------------------------------------------------------------------------ */ 3210 /* Function: ipf_nat_finalise */ 3211 /* Returns: int - 0 == sucess, -1 == failure */ 3212 /* Parameters: fin(I) - pointer to packet information */ 3213 /* nat(I) - pointer to NAT entry */ 3214 /* Write Lock: ipf_nat */ 3215 /* */ 3216 /* This is the tail end of constructing a new NAT entry and is the same */ 3217 /* for both IPv4 and IPv6. */ 3218 /* ------------------------------------------------------------------------ */ 3219 /*ARGSUSED*/ 3220 static int ipf_nat_finalise(fr_info_t * fin,nat_t * nat)3221 ipf_nat_finalise(fr_info_t *fin, nat_t *nat) 3222 { 3223 ipf_main_softc_t *softc = fin->fin_main_soft; 3224 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3225 u_32_t sum1, sum2, sumd; 3226 frentry_t *fr; 3227 u_32_t flags; 3228 #if SOLARIS && defined(_KERNEL) && defined(ICK_M_CTL_MAGIC) 3229 qpktinfo_t *qpi = fin->fin_qpi; 3230 #endif 3231 3232 flags = nat->nat_flags; 3233 3234 switch (nat->nat_pr[0]) 3235 { 3236 case IPPROTO_ICMP : 3237 sum1 = LONG_SUM(ntohs(nat->nat_oicmpid)); 3238 sum2 = LONG_SUM(ntohs(nat->nat_nicmpid)); 3239 CALC_SUMD(sum1, sum2, sumd); 3240 nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 3241 3242 break; 3243 3244 default : 3245 sum1 = LONG_SUM(ntohl(nat->nat_osrcaddr) + \ 3246 ntohs(nat->nat_osport)); 3247 sum2 = LONG_SUM(ntohl(nat->nat_nsrcaddr) + \ 3248 ntohs(nat->nat_nsport)); 3249 CALC_SUMD(sum1, sum2, sumd); 3250 nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 3251 3252 sum1 = LONG_SUM(ntohl(nat->nat_odstaddr) + \ 3253 ntohs(nat->nat_odport)); 3254 sum2 = LONG_SUM(ntohl(nat->nat_ndstaddr) + \ 3255 ntohs(nat->nat_ndport)); 3256 CALC_SUMD(sum1, sum2, sumd); 3257 nat->nat_sumd[0] += (sumd & 0xffff) + (sumd >> 16); 3258 break; 3259 } 3260 3261 /* 3262 * Compute the partial checksum, just in case. 3263 * This is only ever placed into outbound packets so care needs 3264 * to be taken over which pair of addresses are used. 3265 */ 3266 if (nat->nat_dir == NAT_OUTBOUND) { 3267 sum1 = LONG_SUM(ntohl(nat->nat_nsrcaddr)); 3268 sum1 += LONG_SUM(ntohl(nat->nat_ndstaddr)); 3269 } else { 3270 sum1 = LONG_SUM(ntohl(nat->nat_osrcaddr)); 3271 sum1 += LONG_SUM(ntohl(nat->nat_odstaddr)); 3272 } 3273 sum1 += nat->nat_pr[1]; 3274 nat->nat_sumd[1] = (sum1 & 0xffff) + (sum1 >> 16); 3275 3276 sum1 = LONG_SUM(ntohl(nat->nat_osrcaddr)); 3277 sum2 = LONG_SUM(ntohl(nat->nat_nsrcaddr)); 3278 CALC_SUMD(sum1, sum2, sumd); 3279 nat->nat_ipsumd = (sumd & 0xffff) + (sumd >> 16); 3280 3281 sum1 = LONG_SUM(ntohl(nat->nat_odstaddr)); 3282 sum2 = LONG_SUM(ntohl(nat->nat_ndstaddr)); 3283 CALC_SUMD(sum1, sum2, sumd); 3284 nat->nat_ipsumd += (sumd & 0xffff) + (sumd >> 16); 3285 3286 nat->nat_v[0] = 4; 3287 nat->nat_v[1] = 4; 3288 3289 if ((nat->nat_ifps[0] != NULL) && (nat->nat_ifps[0] != (void *)-1)) { 3290 nat->nat_mtu[0] = GETIFMTU_4(nat->nat_ifps[0]); 3291 } 3292 3293 if ((nat->nat_ifps[1] != NULL) && (nat->nat_ifps[1] != (void *)-1)) { 3294 nat->nat_mtu[1] = GETIFMTU_4(nat->nat_ifps[1]); 3295 } 3296 3297 if ((nat->nat_flags & SI_CLONE) == 0) 3298 nat->nat_sync = ipf_sync_new(softc, SMC_NAT, fin, nat); 3299 3300 if (ipf_nat_insert(softc, softn, nat) == 0) { 3301 if (softn->ipf_nat_logging) 3302 ipf_nat_log(softc, softn, nat, NL_NEW); 3303 fr = nat->nat_fr; 3304 if (fr != NULL) { 3305 MUTEX_ENTER(&fr->fr_lock); 3306 fr->fr_ref++; 3307 MUTEX_EXIT(&fr->fr_lock); 3308 } 3309 return (0); 3310 } 3311 3312 NBUMPSIDED(fin->fin_out, ns_unfinalised); 3313 DT2(ns_unfinalised, fr_info_t *, fin, nat_t *, nat); 3314 /* 3315 * nat_insert failed, so cleanup time... 3316 */ 3317 if (nat->nat_sync != NULL) 3318 ipf_sync_del_nat(softc->ipf_sync_soft, nat->nat_sync); 3319 return (-1); 3320 } 3321 3322 3323 /* ------------------------------------------------------------------------ */ 3324 /* Function: ipf_nat_insert */ 3325 /* Returns: int - 0 == sucess, -1 == failure */ 3326 /* Parameters: softc(I) - pointer to soft context main structure */ 3327 /* softn(I) - pointer to NAT context structure */ 3328 /* nat(I) - pointer to NAT structure */ 3329 /* Write Lock: ipf_nat */ 3330 /* */ 3331 /* Insert a NAT entry into the hash tables for searching and add it to the */ 3332 /* list of active NAT entries. Adjust global counters when complete. */ 3333 /* ------------------------------------------------------------------------ */ 3334 int ipf_nat_insert(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,nat_t * nat)3335 ipf_nat_insert(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, nat_t *nat) 3336 { 3337 u_int hv0, hv1; 3338 u_int sp, dp; 3339 ipnat_t *in; 3340 int ret; 3341 3342 /* 3343 * Try and return an error as early as possible, so calculate the hash 3344 * entry numbers first and then proceed. 3345 */ 3346 if ((nat->nat_flags & (SI_W_SPORT|SI_W_DPORT)) == 0) { 3347 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 3348 sp = nat->nat_osport; 3349 dp = nat->nat_odport; 3350 } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 3351 sp = 0; 3352 dp = nat->nat_oicmpid; 3353 } else { 3354 sp = 0; 3355 dp = 0; 3356 } 3357 hv0 = NAT_HASH_FN(nat->nat_osrcaddr, sp, 0xffffffff); 3358 hv0 = NAT_HASH_FN(nat->nat_odstaddr, hv0 + dp, 0xffffffff); 3359 /* 3360 * TRACE nat_osrcaddr, nat_osport, nat_odstaddr, 3361 * nat_odport, hv0 3362 */ 3363 3364 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 3365 sp = nat->nat_nsport; 3366 dp = nat->nat_ndport; 3367 } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 3368 sp = 0; 3369 dp = nat->nat_nicmpid; 3370 } else { 3371 sp = 0; 3372 dp = 0; 3373 } 3374 hv1 = NAT_HASH_FN(nat->nat_nsrcaddr, sp, 0xffffffff); 3375 hv1 = NAT_HASH_FN(nat->nat_ndstaddr, hv1 + dp, 0xffffffff); 3376 /* 3377 * TRACE nat_nsrcaddr, nat_nsport, nat_ndstaddr, 3378 * nat_ndport, hv1 3379 */ 3380 } else { 3381 hv0 = NAT_HASH_FN(nat->nat_osrcaddr, 0, 0xffffffff); 3382 hv0 = NAT_HASH_FN(nat->nat_odstaddr, hv0, 0xffffffff); 3383 /* TRACE nat_osrcaddr, nat_odstaddr, hv0 */ 3384 3385 hv1 = NAT_HASH_FN(nat->nat_nsrcaddr, 0, 0xffffffff); 3386 hv1 = NAT_HASH_FN(nat->nat_ndstaddr, hv1, 0xffffffff); 3387 /* TRACE nat_nsrcaddr, nat_ndstaddr, hv1 */ 3388 } 3389 3390 nat->nat_hv[0] = hv0; 3391 nat->nat_hv[1] = hv1; 3392 3393 MUTEX_INIT(&nat->nat_lock, "nat entry lock"); 3394 3395 in = nat->nat_ptr; 3396 nat->nat_ref = nat->nat_me ? 2 : 1; 3397 3398 nat->nat_ifnames[0][LIFNAMSIZ - 1] = '\0'; 3399 nat->nat_ifps[0] = ipf_resolvenic(softc, nat->nat_ifnames[0], 4); 3400 3401 if (nat->nat_ifnames[1][0] != '\0') { 3402 nat->nat_ifnames[1][LIFNAMSIZ - 1] = '\0'; 3403 nat->nat_ifps[1] = ipf_resolvenic(softc, 3404 nat->nat_ifnames[1], 4); 3405 } else if (in->in_ifnames[1] != -1) { 3406 char *name; 3407 3408 name = in->in_names + in->in_ifnames[1]; 3409 if (name[1] != '\0' && name[0] != '-' && name[0] != '*') { 3410 (void) strncpy(nat->nat_ifnames[1], 3411 nat->nat_ifnames[0], LIFNAMSIZ); 3412 nat->nat_ifnames[1][LIFNAMSIZ - 1] = '\0'; 3413 nat->nat_ifps[1] = nat->nat_ifps[0]; 3414 } 3415 } 3416 if ((nat->nat_ifps[0] != NULL) && (nat->nat_ifps[0] != (void *)-1)) { 3417 nat->nat_mtu[0] = GETIFMTU_4(nat->nat_ifps[0]); 3418 } 3419 if ((nat->nat_ifps[1] != NULL) && (nat->nat_ifps[1] != (void *)-1)) { 3420 nat->nat_mtu[1] = GETIFMTU_4(nat->nat_ifps[1]); 3421 } 3422 3423 ret = ipf_nat_hashtab_add(softc, softn, nat); 3424 if (ret == -1) 3425 MUTEX_DESTROY(&nat->nat_lock); 3426 return (ret); 3427 } 3428 3429 3430 /* ------------------------------------------------------------------------ */ 3431 /* Function: ipf_nat_hashtab_add */ 3432 /* Returns: int - 0 == sucess, -1 == failure */ 3433 /* Parameters: softc(I) - pointer to soft context main structure */ 3434 /* softn(I) - pointer to NAT context structure */ 3435 /* nat(I) - pointer to NAT structure */ 3436 /* */ 3437 /* Handle the insertion of a NAT entry into the table/list. */ 3438 /* ------------------------------------------------------------------------ */ 3439 int ipf_nat_hashtab_add(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,nat_t * nat)3440 ipf_nat_hashtab_add(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, 3441 nat_t *nat) 3442 { 3443 nat_t **natp; 3444 u_int hv0; 3445 u_int hv1; 3446 3447 if (nat->nat_dir == NAT_INBOUND || nat->nat_dir == NAT_DIVERTIN) { 3448 hv1 = nat->nat_hv[0] % softn->ipf_nat_table_sz; 3449 hv0 = nat->nat_hv[1] % softn->ipf_nat_table_sz; 3450 } else { 3451 hv0 = nat->nat_hv[0] % softn->ipf_nat_table_sz; 3452 hv1 = nat->nat_hv[1] % softn->ipf_nat_table_sz; 3453 } 3454 3455 if (softn->ipf_nat_stats.ns_side[0].ns_bucketlen[hv0] >= 3456 softn->ipf_nat_maxbucket) { 3457 DT1(ns_bucket_max_0, int, 3458 softn->ipf_nat_stats.ns_side[0].ns_bucketlen[hv0]); 3459 NBUMPSIDE(0, ns_bucket_max); 3460 return (-1); 3461 } 3462 3463 if (softn->ipf_nat_stats.ns_side[1].ns_bucketlen[hv1] >= 3464 softn->ipf_nat_maxbucket) { 3465 DT1(ns_bucket_max_1, int, 3466 softn->ipf_nat_stats.ns_side[1].ns_bucketlen[hv1]); 3467 NBUMPSIDE(1, ns_bucket_max); 3468 return (-1); 3469 } 3470 3471 /* 3472 * The ordering of operations in the list and hash table insertion 3473 * is very important. The last operation for each task should be 3474 * to update the top of the list, after all the "nexts" have been 3475 * done so that walking the list while it is being done does not 3476 * find strange pointers. 3477 * 3478 * Global list of NAT instances 3479 */ 3480 nat->nat_next = softn->ipf_nat_instances; 3481 nat->nat_pnext = &softn->ipf_nat_instances; 3482 if (softn->ipf_nat_instances) 3483 softn->ipf_nat_instances->nat_pnext = &nat->nat_next; 3484 softn->ipf_nat_instances = nat; 3485 3486 /* 3487 * Inbound hash table. 3488 */ 3489 natp = &softn->ipf_nat_table[0][hv0]; 3490 nat->nat_phnext[0] = natp; 3491 nat->nat_hnext[0] = *natp; 3492 if (*natp) { 3493 (*natp)->nat_phnext[0] = &nat->nat_hnext[0]; 3494 } else { 3495 NBUMPSIDE(0, ns_inuse); 3496 } 3497 *natp = nat; 3498 NBUMPSIDE(0, ns_bucketlen[hv0]); 3499 3500 /* 3501 * Outbound hash table. 3502 */ 3503 natp = &softn->ipf_nat_table[1][hv1]; 3504 nat->nat_phnext[1] = natp; 3505 nat->nat_hnext[1] = *natp; 3506 if (*natp) 3507 (*natp)->nat_phnext[1] = &nat->nat_hnext[1]; 3508 else { 3509 NBUMPSIDE(1, ns_inuse); 3510 } 3511 *natp = nat; 3512 NBUMPSIDE(1, ns_bucketlen[hv1]); 3513 3514 ipf_nat_setqueue(softc, softn, nat); 3515 3516 if (nat->nat_dir & NAT_OUTBOUND) { 3517 NBUMPSIDE(1, ns_added); 3518 } else { 3519 NBUMPSIDE(0, ns_added); 3520 } 3521 softn->ipf_nat_stats.ns_active++; 3522 return (0); 3523 } 3524 3525 3526 /* ------------------------------------------------------------------------ */ 3527 /* Function: ipf_nat_icmperrorlookup */ 3528 /* Returns: nat_t* - point to matching NAT structure */ 3529 /* Parameters: fin(I) - pointer to packet information */ 3530 /* dir(I) - direction of packet (in/out) */ 3531 /* */ 3532 /* Check if the ICMP error message is related to an existing TCP, UDP or */ 3533 /* ICMP query nat entry. It is assumed that the packet is already of the */ 3534 /* the required length. */ 3535 /* ------------------------------------------------------------------------ */ 3536 nat_t * ipf_nat_icmperrorlookup(fr_info_t * fin,int dir)3537 ipf_nat_icmperrorlookup(fr_info_t *fin, int dir) 3538 { 3539 ipf_main_softc_t *softc = fin->fin_main_soft; 3540 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3541 int flags = 0, type, minlen; 3542 icmphdr_t *icmp, *orgicmp; 3543 nat_stat_side_t *nside; 3544 tcphdr_t *tcp = NULL; 3545 u_short data[2]; 3546 nat_t *nat; 3547 ip_t *oip; 3548 u_int p; 3549 3550 icmp = fin->fin_dp; 3551 type = icmp->icmp_type; 3552 nside = &softn->ipf_nat_stats.ns_side[fin->fin_out]; 3553 /* 3554 * Does it at least have the return (basic) IP header ? 3555 * Only a basic IP header (no options) should be with an ICMP error 3556 * header. Also, if it's not an error type, then return. 3557 */ 3558 if ((fin->fin_hlen != sizeof(ip_t)) || !(fin->fin_flx & FI_ICMPERR)) { 3559 ATOMIC_INCL(nside->ns_icmp_basic); 3560 return (NULL); 3561 } 3562 3563 /* 3564 * Check packet size 3565 */ 3566 oip = (ip_t *)((char *)fin->fin_dp + 8); 3567 minlen = IP_HL(oip) << 2; 3568 if ((minlen < sizeof(ip_t)) || 3569 (fin->fin_plen < ICMPERR_IPICMPHLEN + minlen)) { 3570 ATOMIC_INCL(nside->ns_icmp_size); 3571 return (NULL); 3572 } 3573 3574 /* 3575 * Is the buffer big enough for all of it ? It's the size of the IP 3576 * header claimed in the encapsulated part which is of concern. It 3577 * may be too big to be in this buffer but not so big that it's 3578 * outside the ICMP packet, leading to TCP deref's causing problems. 3579 * This is possible because we don't know how big oip_hl is when we 3580 * do the pullup early in ipf_check() and thus can't gaurantee it is 3581 * all here now. 3582 */ 3583 #ifdef ipf_nat_KERNEL 3584 { 3585 mb_t *m; 3586 3587 m = fin->fin_m; 3588 # if SOLARIS 3589 if ((char *)oip + fin->fin_dlen - ICMPERR_ICMPHLEN > 3590 (char *)m->b_wptr) { 3591 ATOMIC_INCL(nside->ns_icmp_mbuf); 3592 return (NULL); 3593 } 3594 # else 3595 if ((char *)oip + fin->fin_dlen - ICMPERR_ICMPHLEN > 3596 (char *)fin->fin_ip + M_LEN(m)) { 3597 ATOMIC_INCL(nside->ns_icmp_mbuf); 3598 return (NULL); 3599 } 3600 # endif 3601 } 3602 #endif 3603 3604 if (fin->fin_daddr != oip->ip_src.s_addr) { 3605 ATOMIC_INCL(nside->ns_icmp_address); 3606 return (NULL); 3607 } 3608 3609 p = oip->ip_p; 3610 if (p == IPPROTO_TCP) 3611 flags = IPN_TCP; 3612 else if (p == IPPROTO_UDP) 3613 flags = IPN_UDP; 3614 else if (p == IPPROTO_ICMP) { 3615 orgicmp = (icmphdr_t *)((char *)oip + (IP_HL(oip) << 2)); 3616 3617 /* see if this is related to an ICMP query */ 3618 if (ipf_nat_icmpquerytype(orgicmp->icmp_type)) { 3619 data[0] = fin->fin_data[0]; 3620 data[1] = fin->fin_data[1]; 3621 fin->fin_data[0] = 0; 3622 fin->fin_data[1] = orgicmp->icmp_id; 3623 3624 flags = IPN_ICMPERR|IPN_ICMPQUERY; 3625 /* 3626 * NOTE : dir refers to the direction of the original 3627 * ip packet. By definition the icmp error 3628 * message flows in the opposite direction. 3629 */ 3630 if (dir == NAT_INBOUND) 3631 nat = ipf_nat_inlookup(fin, flags, p, 3632 oip->ip_dst, 3633 oip->ip_src); 3634 else 3635 nat = ipf_nat_outlookup(fin, flags, p, 3636 oip->ip_dst, 3637 oip->ip_src); 3638 fin->fin_data[0] = data[0]; 3639 fin->fin_data[1] = data[1]; 3640 return (nat); 3641 } 3642 } 3643 3644 if (flags & IPN_TCPUDP) { 3645 minlen += 8; /* + 64bits of data to get ports */ 3646 /* TRACE (fin,minlen) */ 3647 if (fin->fin_plen < ICMPERR_IPICMPHLEN + minlen) { 3648 ATOMIC_INCL(nside->ns_icmp_short); 3649 return (NULL); 3650 } 3651 3652 data[0] = fin->fin_data[0]; 3653 data[1] = fin->fin_data[1]; 3654 tcp = (tcphdr_t *)((char *)oip + (IP_HL(oip) << 2)); 3655 fin->fin_data[0] = ntohs(tcp->th_dport); 3656 fin->fin_data[1] = ntohs(tcp->th_sport); 3657 3658 if (dir == NAT_INBOUND) { 3659 nat = ipf_nat_inlookup(fin, flags, p, oip->ip_dst, 3660 oip->ip_src); 3661 } else { 3662 nat = ipf_nat_outlookup(fin, flags, p, oip->ip_dst, 3663 oip->ip_src); 3664 } 3665 fin->fin_data[0] = data[0]; 3666 fin->fin_data[1] = data[1]; 3667 return (nat); 3668 } 3669 if (dir == NAT_INBOUND) 3670 nat = ipf_nat_inlookup(fin, 0, p, oip->ip_dst, oip->ip_src); 3671 else 3672 nat = ipf_nat_outlookup(fin, 0, p, oip->ip_dst, oip->ip_src); 3673 3674 return (nat); 3675 } 3676 3677 3678 /* ------------------------------------------------------------------------ */ 3679 /* Function: ipf_nat_icmperror */ 3680 /* Returns: nat_t* - point to matching NAT structure */ 3681 /* Parameters: fin(I) - pointer to packet information */ 3682 /* nflags(I) - NAT flags for this packet */ 3683 /* dir(I) - direction of packet (in/out) */ 3684 /* */ 3685 /* Fix up an ICMP packet which is an error message for an existing NAT */ 3686 /* session. This will correct both packet header data and checksums. */ 3687 /* */ 3688 /* This should *ONLY* be used for incoming ICMP error packets to make sure */ 3689 /* a NAT'd ICMP packet gets correctly recognised. */ 3690 /* ------------------------------------------------------------------------ */ 3691 nat_t * ipf_nat_icmperror(fr_info_t * fin,u_int * nflags,int dir)3692 ipf_nat_icmperror(fr_info_t *fin, u_int *nflags, int dir) 3693 { 3694 ipf_main_softc_t *softc = fin->fin_main_soft; 3695 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 3696 u_32_t sum1, sum2, sumd, sumd2; 3697 struct in_addr a1, a2, a3, a4; 3698 int flags, dlen, odst; 3699 icmphdr_t *icmp; 3700 u_short *csump; 3701 tcphdr_t *tcp; 3702 nat_t *nat; 3703 ip_t *oip; 3704 void *dp; 3705 3706 if ((fin->fin_flx & (FI_SHORT|FI_FRAGBODY))) { 3707 NBUMPSIDED(fin->fin_out, ns_icmp_short); 3708 return (NULL); 3709 } 3710 3711 /* 3712 * ipf_nat_icmperrorlookup() will return NULL for `defective' packets. 3713 */ 3714 if ((fin->fin_v != 4) || !(nat = ipf_nat_icmperrorlookup(fin, dir))) { 3715 NBUMPSIDED(fin->fin_out, ns_icmp_notfound); 3716 return (NULL); 3717 } 3718 3719 tcp = NULL; 3720 csump = NULL; 3721 flags = 0; 3722 sumd2 = 0; 3723 *nflags = IPN_ICMPERR; 3724 icmp = fin->fin_dp; 3725 oip = (ip_t *)&icmp->icmp_ip; 3726 dp = (((char *)oip) + (IP_HL(oip) << 2)); 3727 if (oip->ip_p == IPPROTO_TCP) { 3728 tcp = (tcphdr_t *)dp; 3729 csump = (u_short *)&tcp->th_sum; 3730 flags = IPN_TCP; 3731 } else if (oip->ip_p == IPPROTO_UDP) { 3732 udphdr_t *udp; 3733 3734 udp = (udphdr_t *)dp; 3735 tcp = (tcphdr_t *)dp; 3736 csump = (u_short *)&udp->uh_sum; 3737 flags = IPN_UDP; 3738 } else if (oip->ip_p == IPPROTO_ICMP) 3739 flags = IPN_ICMPQUERY; 3740 dlen = fin->fin_plen - ((char *)dp - (char *)fin->fin_ip); 3741 3742 /* 3743 * Need to adjust ICMP header to include the real IP#'s and 3744 * port #'s. Only apply a checksum change relative to the 3745 * IP address change as it will be modified again in ipf_nat_checkout 3746 * for both address and port. Two checksum changes are 3747 * necessary for the two header address changes. Be careful 3748 * to only modify the checksum once for the port # and twice 3749 * for the IP#. 3750 */ 3751 3752 /* 3753 * Step 1 3754 * Fix the IP addresses in the offending IP packet. You also need 3755 * to adjust the IP header checksum of that offending IP packet. 3756 * 3757 * Normally, you would expect that the ICMP checksum of the 3758 * ICMP error message needs to be adjusted as well for the 3759 * IP address change in oip. 3760 * However, this is a NOP, because the ICMP checksum is 3761 * calculated over the complete ICMP packet, which includes the 3762 * changed oip IP addresses and oip->ip_sum. However, these 3763 * two changes cancel each other out (if the delta for 3764 * the IP address is x, then the delta for ip_sum is minus x), 3765 * so no change in the icmp_cksum is necessary. 3766 * 3767 * Inbound ICMP 3768 * ------------ 3769 * MAP rule, SRC=a,DST=b -> SRC=c,DST=b 3770 * - response to outgoing packet (a,b)=>(c,b) (OIP_SRC=c,OIP_DST=b) 3771 * - OIP_SRC(c)=nat_newsrcip, OIP_DST(b)=nat_newdstip 3772 *=> OIP_SRC(c)=nat_oldsrcip, OIP_DST(b)=nat_olddstip 3773 * 3774 * RDR rule, SRC=a,DST=b -> SRC=a,DST=c 3775 * - response to outgoing packet (c,a)=>(b,a) (OIP_SRC=b,OIP_DST=a) 3776 * - OIP_SRC(b)=nat_olddstip, OIP_DST(a)=nat_oldsrcip 3777 *=> OIP_SRC(b)=nat_newdstip, OIP_DST(a)=nat_newsrcip 3778 * 3779 * REWRITE out rule, SRC=a,DST=b -> SRC=c,DST=d 3780 * - response to outgoing packet (a,b)=>(c,d) (OIP_SRC=c,OIP_DST=d) 3781 * - OIP_SRC(c)=nat_newsrcip, OIP_DST(d)=nat_newdstip 3782 *=> OIP_SRC(c)=nat_oldsrcip, OIP_DST(d)=nat_olddstip 3783 * 3784 * REWRITE in rule, SRC=a,DST=b -> SRC=c,DST=d 3785 * - response to outgoing packet (d,c)=>(b,a) (OIP_SRC=b,OIP_DST=a) 3786 * - OIP_SRC(b)=nat_olddstip, OIP_DST(a)=nat_oldsrcip 3787 *=> OIP_SRC(b)=nat_newdstip, OIP_DST(a)=nat_newsrcip 3788 * 3789 * Outbound ICMP 3790 * ------------- 3791 * MAP rule, SRC=a,DST=b -> SRC=c,DST=b 3792 * - response to incoming packet (b,c)=>(b,a) (OIP_SRC=b,OIP_DST=a) 3793 * - OIP_SRC(b)=nat_olddstip, OIP_DST(a)=nat_oldsrcip 3794 *=> OIP_SRC(b)=nat_newdstip, OIP_DST(a)=nat_newsrcip 3795 * 3796 * RDR rule, SRC=a,DST=b -> SRC=a,DST=c 3797 * - response to incoming packet (a,b)=>(a,c) (OIP_SRC=a,OIP_DST=c) 3798 * - OIP_SRC(a)=nat_newsrcip, OIP_DST(c)=nat_newdstip 3799 *=> OIP_SRC(a)=nat_oldsrcip, OIP_DST(c)=nat_olddstip 3800 * 3801 * REWRITE out rule, SRC=a,DST=b -> SRC=c,DST=d 3802 * - response to incoming packet (d,c)=>(b,a) (OIP_SRC=c,OIP_DST=d) 3803 * - OIP_SRC(c)=nat_olddstip, OIP_DST(d)=nat_oldsrcip 3804 *=> OIP_SRC(b)=nat_newdstip, OIP_DST(a)=nat_newsrcip 3805 * 3806 * REWRITE in rule, SRC=a,DST=b -> SRC=c,DST=d 3807 * - response to incoming packet (a,b)=>(c,d) (OIP_SRC=b,OIP_DST=a) 3808 * - OIP_SRC(b)=nat_newsrcip, OIP_DST(a)=nat_newdstip 3809 *=> OIP_SRC(a)=nat_oldsrcip, OIP_DST(c)=nat_olddstip 3810 */ 3811 3812 if (((fin->fin_out == 0) && ((nat->nat_redir & NAT_MAP) != 0)) || 3813 ((fin->fin_out == 1) && ((nat->nat_redir & NAT_REDIRECT) != 0))) { 3814 a1.s_addr = ntohl(nat->nat_osrcaddr); 3815 a4.s_addr = ntohl(oip->ip_src.s_addr); 3816 a3.s_addr = ntohl(nat->nat_odstaddr); 3817 a2.s_addr = ntohl(oip->ip_dst.s_addr); 3818 oip->ip_src.s_addr = htonl(a1.s_addr); 3819 oip->ip_dst.s_addr = htonl(a3.s_addr); 3820 odst = 1; 3821 } else { 3822 a1.s_addr = ntohl(nat->nat_ndstaddr); 3823 a2.s_addr = ntohl(oip->ip_dst.s_addr); 3824 a3.s_addr = ntohl(nat->nat_nsrcaddr); 3825 a4.s_addr = ntohl(oip->ip_src.s_addr); 3826 oip->ip_dst.s_addr = htonl(a3.s_addr); 3827 oip->ip_src.s_addr = htonl(a1.s_addr); 3828 odst = 0; 3829 } 3830 sum1 = 0; 3831 sum2 = 0; 3832 sumd = 0; 3833 CALC_SUMD(a2.s_addr, a3.s_addr, sum1); 3834 CALC_SUMD(a4.s_addr, a1.s_addr, sum2); 3835 sumd = sum2 + sum1; 3836 if (sumd != 0) 3837 ipf_fix_datacksum(&oip->ip_sum, sumd); 3838 3839 sumd2 = sumd; 3840 sum1 = 0; 3841 sum2 = 0; 3842 3843 /* 3844 * Fix UDP pseudo header checksum to compensate for the 3845 * IP address change. 3846 */ 3847 if (((flags & IPN_TCPUDP) != 0) && (dlen >= 4)) { 3848 u_32_t sum3, sum4, sumt; 3849 3850 /* 3851 * Step 2 : 3852 * For offending TCP/UDP IP packets, translate the ports as 3853 * well, based on the NAT specification. Of course such 3854 * a change may be reflected in the ICMP checksum as well. 3855 * 3856 * Since the port fields are part of the TCP/UDP checksum 3857 * of the offending IP packet, you need to adjust that checksum 3858 * as well... except that the change in the port numbers should 3859 * be offset by the checksum change. However, the TCP/UDP 3860 * checksum will also need to change if there has been an 3861 * IP address change. 3862 */ 3863 if (odst == 1) { 3864 sum1 = ntohs(nat->nat_osport); 3865 sum4 = ntohs(tcp->th_sport); 3866 sum3 = ntohs(nat->nat_odport); 3867 sum2 = ntohs(tcp->th_dport); 3868 3869 tcp->th_sport = htons(sum1); 3870 tcp->th_dport = htons(sum3); 3871 } else { 3872 sum1 = ntohs(nat->nat_ndport); 3873 sum2 = ntohs(tcp->th_dport); 3874 sum3 = ntohs(nat->nat_nsport); 3875 sum4 = ntohs(tcp->th_sport); 3876 3877 tcp->th_dport = htons(sum3); 3878 tcp->th_sport = htons(sum1); 3879 } 3880 CALC_SUMD(sum4, sum1, sumt); 3881 sumd += sumt; 3882 CALC_SUMD(sum2, sum3, sumt); 3883 sumd += sumt; 3884 3885 if (sumd != 0 || sumd2 != 0) { 3886 /* 3887 * At this point, sumd is the delta to apply to the 3888 * TCP/UDP header, given the changes in both the IP 3889 * address and the ports and sumd2 is the delta to 3890 * apply to the ICMP header, given the IP address 3891 * change delta that may need to be applied to the 3892 * TCP/UDP checksum instead. 3893 * 3894 * If we will both the IP and TCP/UDP checksums 3895 * then the ICMP checksum changes by the address 3896 * delta applied to the TCP/UDP checksum. If we 3897 * do not change the TCP/UDP checksum them we 3898 * apply the delta in ports to the ICMP checksum. 3899 */ 3900 if (oip->ip_p == IPPROTO_UDP) { 3901 if ((dlen >= 8) && (*csump != 0)) { 3902 ipf_fix_datacksum(csump, sumd); 3903 } else { 3904 CALC_SUMD(sum1, sum4, sumd2); 3905 CALC_SUMD(sum3, sum2, sumt); 3906 sumd2 += sumt; 3907 } 3908 } else if (oip->ip_p == IPPROTO_TCP) { 3909 if (dlen >= 18) { 3910 ipf_fix_datacksum(csump, sumd); 3911 } else { 3912 CALC_SUMD(sum1, sum4, sumd2); 3913 CALC_SUMD(sum3, sum2, sumt); 3914 sumd2 += sumt; 3915 } 3916 } 3917 if (sumd2 != 0) { 3918 sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 3919 sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 3920 sumd2 = (sumd2 & 0xffff) + (sumd2 >> 16); 3921 ipf_fix_incksum(0, &icmp->icmp_cksum, sumd2, 0); 3922 } 3923 } 3924 } else if (((flags & IPN_ICMPQUERY) != 0) && (dlen >= 8)) { 3925 icmphdr_t *orgicmp; 3926 3927 /* 3928 * XXX - what if this is bogus hl and we go off the end ? 3929 * In this case, ipf_nat_icmperrorlookup() will have 3930 * returned NULL. 3931 */ 3932 orgicmp = (icmphdr_t *)dp; 3933 3934 if (odst == 1) { 3935 if (orgicmp->icmp_id != nat->nat_osport) { 3936 3937 /* 3938 * Fix ICMP checksum (of the offening ICMP 3939 * query packet) to compensate the change 3940 * in the ICMP id of the offending ICMP 3941 * packet. 3942 * 3943 * Since you modify orgicmp->icmp_id with 3944 * a delta (say x) and you compensate that 3945 * in origicmp->icmp_cksum with a delta 3946 * minus x, you don't have to adjust the 3947 * overall icmp->icmp_cksum 3948 */ 3949 sum1 = ntohs(orgicmp->icmp_id); 3950 sum2 = ntohs(nat->nat_oicmpid); 3951 CALC_SUMD(sum1, sum2, sumd); 3952 orgicmp->icmp_id = nat->nat_oicmpid; 3953 ipf_fix_datacksum(&orgicmp->icmp_cksum, sumd); 3954 } 3955 } /* nat_dir == NAT_INBOUND is impossible for icmp queries */ 3956 } 3957 return (nat); 3958 } 3959 3960 3961 /* 3962 * MAP-IN MAP-OUT RDR-IN RDR-OUT 3963 * osrc X == src == src X 3964 * odst X == dst == dst X 3965 * nsrc == dst X X == dst 3966 * ndst == src X X == src 3967 * MAP = NAT_OUTBOUND, RDR = NAT_INBOUND 3968 */ 3969 /* 3970 * NB: these lookups don't lock access to the list, it assumed that it has 3971 * already been done! 3972 */ 3973 /* ------------------------------------------------------------------------ */ 3974 /* Function: ipf_nat_inlookup */ 3975 /* Returns: nat_t* - NULL == no match, */ 3976 /* else pointer to matching NAT entry */ 3977 /* Parameters: fin(I) - pointer to packet information */ 3978 /* flags(I) - NAT flags for this packet */ 3979 /* p(I) - protocol for this packet */ 3980 /* src(I) - source IP address */ 3981 /* mapdst(I) - destination IP address */ 3982 /* */ 3983 /* Lookup a nat entry based on the mapped destination ip address/port and */ 3984 /* real source address/port. We use this lookup when receiving a packet, */ 3985 /* we're looking for a table entry, based on the destination address. */ 3986 /* */ 3987 /* NOTE: THE PACKET BEING CHECKED (IF FOUND) HAS A MAPPING ALREADY. */ 3988 /* */ 3989 /* NOTE: IT IS ASSUMED THAT IS ONLY HELD WITH A READ LOCK WHEN */ 3990 /* THIS FUNCTION IS CALLED WITH NAT_SEARCH SET IN nflags. */ 3991 /* */ 3992 /* flags -> relevant are IPN_UDP/IPN_TCP/IPN_ICMPQUERY that indicate if */ 3993 /* the packet is of said protocol */ 3994 /* ------------------------------------------------------------------------ */ 3995 nat_t * ipf_nat_inlookup(fr_info_t * fin,u_int flags,u_int p,struct in_addr src,struct in_addr mapdst)3996 ipf_nat_inlookup(fr_info_t *fin, u_int flags, u_int p, 3997 struct in_addr src , struct in_addr mapdst) 3998 { 3999 ipf_main_softc_t *softc = fin->fin_main_soft; 4000 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 4001 u_short sport, dport; 4002 grehdr_t *gre; 4003 ipnat_t *ipn; 4004 u_int sflags; 4005 nat_t *nat; 4006 int nflags; 4007 u_32_t dst; 4008 void *ifp; 4009 u_int hv, rhv; 4010 4011 ifp = fin->fin_ifp; 4012 gre = NULL; 4013 dst = mapdst.s_addr; 4014 sflags = flags & NAT_TCPUDPICMP; 4015 4016 switch (p) 4017 { 4018 case IPPROTO_TCP : 4019 case IPPROTO_UDP : 4020 sport = htons(fin->fin_data[0]); 4021 dport = htons(fin->fin_data[1]); 4022 break; 4023 case IPPROTO_ICMP : 4024 sport = 0; 4025 dport = fin->fin_data[1]; 4026 break; 4027 default : 4028 sport = 0; 4029 dport = 0; 4030 break; 4031 } 4032 4033 4034 if ((flags & SI_WILDP) != 0) 4035 goto find_in_wild_ports; 4036 4037 rhv = NAT_HASH_FN(dst, dport, 0xffffffff); 4038 rhv = NAT_HASH_FN(src.s_addr, rhv + sport, 0xffffffff); 4039 hv = rhv % softn->ipf_nat_table_sz; 4040 nat = softn->ipf_nat_table[1][hv]; 4041 /* TRACE dst, dport, src, sport, hv, nat */ 4042 4043 for (; nat; nat = nat->nat_hnext[1]) { 4044 if (nat->nat_ifps[0] != NULL) { 4045 if ((ifp != NULL) && (ifp != nat->nat_ifps[0])) 4046 continue; 4047 } 4048 4049 if (nat->nat_pr[0] != p) 4050 continue; 4051 4052 switch (nat->nat_dir) 4053 { 4054 case NAT_INBOUND : 4055 case NAT_DIVERTIN : 4056 if (nat->nat_v[0] != 4) 4057 continue; 4058 if (nat->nat_osrcaddr != src.s_addr || 4059 nat->nat_odstaddr != dst) 4060 continue; 4061 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 4062 if (nat->nat_osport != sport) 4063 continue; 4064 if (nat->nat_odport != dport) 4065 continue; 4066 4067 } else if (p == IPPROTO_ICMP) { 4068 if (nat->nat_osport != dport) { 4069 continue; 4070 } 4071 } 4072 break; 4073 case NAT_DIVERTOUT : 4074 if (nat->nat_dlocal) 4075 continue; 4076 case NAT_OUTBOUND : 4077 if (nat->nat_v[1] != 4) 4078 continue; 4079 if (nat->nat_dlocal) 4080 continue; 4081 if (nat->nat_dlocal) 4082 continue; 4083 if (nat->nat_ndstaddr != src.s_addr || 4084 nat->nat_nsrcaddr != dst) 4085 continue; 4086 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 4087 if (nat->nat_ndport != sport) 4088 continue; 4089 if (nat->nat_nsport != dport) 4090 continue; 4091 4092 } else if (p == IPPROTO_ICMP) { 4093 if (nat->nat_osport != dport) { 4094 continue; 4095 } 4096 } 4097 break; 4098 } 4099 4100 4101 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 4102 ipn = nat->nat_ptr; 4103 if ((ipn != NULL) && (nat->nat_aps != NULL)) 4104 if (ipf_proxy_match(fin, nat) != 0) 4105 continue; 4106 } 4107 if ((nat->nat_ifps[0] == NULL) && (ifp != NULL)) { 4108 nat->nat_ifps[0] = ifp; 4109 nat->nat_mtu[0] = GETIFMTU_4(ifp); 4110 } 4111 return (nat); 4112 } 4113 4114 /* 4115 * So if we didn't find it but there are wildcard members in the hash 4116 * table, go back and look for them. We do this search and update here 4117 * because it is modifying the NAT table and we want to do this only 4118 * for the first packet that matches. The exception, of course, is 4119 * for "dummy" (FI_IGNORE) lookups. 4120 */ 4121 find_in_wild_ports: 4122 if (!(flags & NAT_TCPUDP) || !(flags & NAT_SEARCH)) { 4123 NBUMPSIDEX(0, ns_lookup_miss, ns_lookup_miss_0); 4124 return (NULL); 4125 } 4126 if (softn->ipf_nat_stats.ns_wilds == 0 || (fin->fin_flx & FI_NOWILD)) { 4127 NBUMPSIDEX(0, ns_lookup_nowild, ns_lookup_nowild_0); 4128 return (NULL); 4129 } 4130 4131 RWLOCK_EXIT(&softc->ipf_nat); 4132 4133 hv = NAT_HASH_FN(dst, 0, 0xffffffff); 4134 hv = NAT_HASH_FN(src.s_addr, hv, softn->ipf_nat_table_sz); 4135 WRITE_ENTER(&softc->ipf_nat); 4136 4137 nat = softn->ipf_nat_table[1][hv]; 4138 /* TRACE dst, src, hv, nat */ 4139 for (; nat; nat = nat->nat_hnext[1]) { 4140 if (nat->nat_ifps[0] != NULL) { 4141 if ((ifp != NULL) && (ifp != nat->nat_ifps[0])) 4142 continue; 4143 } 4144 4145 if (nat->nat_pr[0] != fin->fin_p) 4146 continue; 4147 4148 switch (nat->nat_dir & (NAT_INBOUND|NAT_OUTBOUND)) 4149 { 4150 case NAT_INBOUND : 4151 if (nat->nat_v[0] != 4) 4152 continue; 4153 if (nat->nat_osrcaddr != src.s_addr || 4154 nat->nat_odstaddr != dst) 4155 continue; 4156 break; 4157 case NAT_OUTBOUND : 4158 if (nat->nat_v[1] != 4) 4159 continue; 4160 if (nat->nat_ndstaddr != src.s_addr || 4161 nat->nat_nsrcaddr != dst) 4162 continue; 4163 break; 4164 } 4165 4166 nflags = nat->nat_flags; 4167 if (!(nflags & (NAT_TCPUDP|SI_WILDP))) 4168 continue; 4169 4170 if (ipf_nat_wildok(nat, (int)sport, (int)dport, nflags, 4171 NAT_INBOUND) == 1) { 4172 if ((fin->fin_flx & FI_IGNORE) != 0) 4173 break; 4174 if ((nflags & SI_CLONE) != 0) { 4175 nat = ipf_nat_clone(fin, nat); 4176 if (nat == NULL) 4177 break; 4178 } else { 4179 MUTEX_ENTER(&softn->ipf_nat_new); 4180 softn->ipf_nat_stats.ns_wilds--; 4181 MUTEX_EXIT(&softn->ipf_nat_new); 4182 } 4183 4184 if (nat->nat_dir == NAT_INBOUND) { 4185 if (nat->nat_osport == 0) { 4186 nat->nat_osport = sport; 4187 nat->nat_nsport = sport; 4188 } 4189 if (nat->nat_odport == 0) { 4190 nat->nat_odport = dport; 4191 nat->nat_ndport = dport; 4192 } 4193 } else if (nat->nat_dir == NAT_OUTBOUND) { 4194 if (nat->nat_osport == 0) { 4195 nat->nat_osport = dport; 4196 nat->nat_nsport = dport; 4197 } 4198 if (nat->nat_odport == 0) { 4199 nat->nat_odport = sport; 4200 nat->nat_ndport = sport; 4201 } 4202 } 4203 if ((nat->nat_ifps[0] == NULL) && (ifp != NULL)) { 4204 nat->nat_ifps[0] = ifp; 4205 nat->nat_mtu[0] = GETIFMTU_4(ifp); 4206 } 4207 nat->nat_flags &= ~(SI_W_DPORT|SI_W_SPORT); 4208 ipf_nat_tabmove(softn, nat); 4209 break; 4210 } 4211 } 4212 4213 MUTEX_DOWNGRADE(&softc->ipf_nat); 4214 4215 if (nat == NULL) { 4216 NBUMPSIDE(0, ns_lookup_miss); 4217 } 4218 return (nat); 4219 } 4220 4221 4222 /* ------------------------------------------------------------------------ */ 4223 /* Function: ipf_nat_tabmove */ 4224 /* Returns: Nil */ 4225 /* Parameters: softn(I) - pointer to NAT context structure */ 4226 /* nat(I) - pointer to NAT structure */ 4227 /* Write Lock: ipf_nat */ 4228 /* */ 4229 /* This function is only called for TCP/UDP NAT table entries where the */ 4230 /* original was placed in the table without hashing on the ports and we now */ 4231 /* want to include hashing on port numbers. */ 4232 /* ------------------------------------------------------------------------ */ 4233 static void ipf_nat_tabmove(ipf_nat_softc_t * softn,nat_t * nat)4234 ipf_nat_tabmove(ipf_nat_softc_t *softn, nat_t *nat) 4235 { 4236 u_int hv0, hv1, rhv0, rhv1; 4237 natstat_t *nsp; 4238 nat_t **natp; 4239 4240 if (nat->nat_flags & SI_CLONE) 4241 return; 4242 4243 nsp = &softn->ipf_nat_stats; 4244 /* 4245 * Remove the NAT entry from the old location 4246 */ 4247 if (nat->nat_hnext[0]) 4248 nat->nat_hnext[0]->nat_phnext[0] = nat->nat_phnext[0]; 4249 *nat->nat_phnext[0] = nat->nat_hnext[0]; 4250 nsp->ns_side[0].ns_bucketlen[nat->nat_hv[0] % 4251 softn->ipf_nat_table_sz]--; 4252 4253 if (nat->nat_hnext[1]) 4254 nat->nat_hnext[1]->nat_phnext[1] = nat->nat_phnext[1]; 4255 *nat->nat_phnext[1] = nat->nat_hnext[1]; 4256 nsp->ns_side[1].ns_bucketlen[nat->nat_hv[1] % 4257 softn->ipf_nat_table_sz]--; 4258 4259 /* 4260 * Add into the NAT table in the new position 4261 */ 4262 rhv0 = NAT_HASH_FN(nat->nat_osrcaddr, nat->nat_osport, 0xffffffff); 4263 rhv0 = NAT_HASH_FN(nat->nat_odstaddr, rhv0 + nat->nat_odport, 4264 0xffffffff); 4265 rhv1 = NAT_HASH_FN(nat->nat_nsrcaddr, nat->nat_nsport, 0xffffffff); 4266 rhv1 = NAT_HASH_FN(nat->nat_ndstaddr, rhv1 + nat->nat_ndport, 4267 0xffffffff); 4268 4269 hv0 = rhv0 % softn->ipf_nat_table_sz; 4270 hv1 = rhv1 % softn->ipf_nat_table_sz; 4271 4272 if (nat->nat_dir == NAT_INBOUND || nat->nat_dir == NAT_DIVERTIN) { 4273 u_int swap; 4274 4275 swap = hv0; 4276 hv0 = hv1; 4277 hv1 = swap; 4278 } 4279 4280 /* TRACE nat_osrcaddr, nat_osport, nat_odstaddr, nat_odport, hv0 */ 4281 /* TRACE nat_nsrcaddr, nat_nsport, nat_ndstaddr, nat_ndport, hv1 */ 4282 4283 nat->nat_hv[0] = rhv0; 4284 natp = &softn->ipf_nat_table[0][hv0]; 4285 if (*natp) 4286 (*natp)->nat_phnext[0] = &nat->nat_hnext[0]; 4287 nat->nat_phnext[0] = natp; 4288 nat->nat_hnext[0] = *natp; 4289 *natp = nat; 4290 nsp->ns_side[0].ns_bucketlen[hv0]++; 4291 4292 nat->nat_hv[1] = rhv1; 4293 natp = &softn->ipf_nat_table[1][hv1]; 4294 if (*natp) 4295 (*natp)->nat_phnext[1] = &nat->nat_hnext[1]; 4296 nat->nat_phnext[1] = natp; 4297 nat->nat_hnext[1] = *natp; 4298 *natp = nat; 4299 nsp->ns_side[1].ns_bucketlen[hv1]++; 4300 } 4301 4302 4303 /* ------------------------------------------------------------------------ */ 4304 /* Function: ipf_nat_outlookup */ 4305 /* Returns: nat_t* - NULL == no match, */ 4306 /* else pointer to matching NAT entry */ 4307 /* Parameters: fin(I) - pointer to packet information */ 4308 /* flags(I) - NAT flags for this packet */ 4309 /* p(I) - protocol for this packet */ 4310 /* src(I) - source IP address */ 4311 /* dst(I) - destination IP address */ 4312 /* rw(I) - 1 == write lock on held, 0 == read lock. */ 4313 /* */ 4314 /* Lookup a nat entry based on the source 'real' ip address/port and */ 4315 /* destination address/port. We use this lookup when sending a packet out, */ 4316 /* we're looking for a table entry, based on the source address. */ 4317 /* */ 4318 /* NOTE: THE PACKET BEING CHECKED (IF FOUND) HAS A MAPPING ALREADY. */ 4319 /* */ 4320 /* NOTE: IT IS ASSUMED THAT IS ONLY HELD WITH A READ LOCK WHEN */ 4321 /* THIS FUNCTION IS CALLED WITH NAT_SEARCH SET IN nflags. */ 4322 /* */ 4323 /* flags -> relevant are IPN_UDP/IPN_TCP/IPN_ICMPQUERY that indicate if */ 4324 /* the packet is of said protocol */ 4325 /* ------------------------------------------------------------------------ */ 4326 nat_t * ipf_nat_outlookup(fr_info_t * fin,u_int flags,u_int p,struct in_addr src,struct in_addr dst)4327 ipf_nat_outlookup(fr_info_t *fin, u_int flags, u_int p, 4328 struct in_addr src , struct in_addr dst) 4329 { 4330 ipf_main_softc_t *softc = fin->fin_main_soft; 4331 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 4332 u_short sport, dport; 4333 u_int sflags; 4334 ipnat_t *ipn; 4335 nat_t *nat; 4336 void *ifp; 4337 u_int hv; 4338 4339 ifp = fin->fin_ifp; 4340 sflags = flags & IPN_TCPUDPICMP; 4341 4342 switch (p) 4343 { 4344 case IPPROTO_TCP : 4345 case IPPROTO_UDP : 4346 sport = htons(fin->fin_data[0]); 4347 dport = htons(fin->fin_data[1]); 4348 break; 4349 case IPPROTO_ICMP : 4350 sport = 0; 4351 dport = fin->fin_data[1]; 4352 break; 4353 default : 4354 sport = 0; 4355 dport = 0; 4356 break; 4357 } 4358 4359 if ((flags & SI_WILDP) != 0) 4360 goto find_out_wild_ports; 4361 4362 hv = NAT_HASH_FN(src.s_addr, sport, 0xffffffff); 4363 hv = NAT_HASH_FN(dst.s_addr, hv + dport, softn->ipf_nat_table_sz); 4364 nat = softn->ipf_nat_table[0][hv]; 4365 4366 /* TRACE src, sport, dst, dport, hv, nat */ 4367 4368 for (; nat; nat = nat->nat_hnext[0]) { 4369 if (nat->nat_ifps[1] != NULL) { 4370 if ((ifp != NULL) && (ifp != nat->nat_ifps[1])) 4371 continue; 4372 } 4373 4374 if (nat->nat_pr[1] != p) 4375 continue; 4376 4377 switch (nat->nat_dir) 4378 { 4379 case NAT_INBOUND : 4380 case NAT_DIVERTIN : 4381 if (nat->nat_v[1] != 4) 4382 continue; 4383 if (nat->nat_ndstaddr != src.s_addr || 4384 nat->nat_nsrcaddr != dst.s_addr) 4385 continue; 4386 4387 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 4388 if (nat->nat_ndport != sport) 4389 continue; 4390 if (nat->nat_nsport != dport) 4391 continue; 4392 4393 } else if (p == IPPROTO_ICMP) { 4394 if (nat->nat_osport != dport) { 4395 continue; 4396 } 4397 } 4398 break; 4399 case NAT_OUTBOUND : 4400 case NAT_DIVERTOUT : 4401 if (nat->nat_v[0] != 4) 4402 continue; 4403 if (nat->nat_osrcaddr != src.s_addr || 4404 nat->nat_odstaddr != dst.s_addr) 4405 continue; 4406 4407 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 4408 if (nat->nat_odport != dport) 4409 continue; 4410 if (nat->nat_osport != sport) 4411 continue; 4412 4413 } else if (p == IPPROTO_ICMP) { 4414 if (nat->nat_osport != dport) { 4415 continue; 4416 } 4417 } 4418 break; 4419 } 4420 4421 ipn = nat->nat_ptr; 4422 if ((ipn != NULL) && (nat->nat_aps != NULL)) 4423 if (ipf_proxy_match(fin, nat) != 0) 4424 continue; 4425 4426 if ((nat->nat_ifps[1] == NULL) && (ifp != NULL)) { 4427 nat->nat_ifps[1] = ifp; 4428 nat->nat_mtu[1] = GETIFMTU_4(ifp); 4429 } 4430 return (nat); 4431 } 4432 4433 /* 4434 * So if we didn't find it but there are wildcard members in the hash 4435 * table, go back and look for them. We do this search and update here 4436 * because it is modifying the NAT table and we want to do this only 4437 * for the first packet that matches. The exception, of course, is 4438 * for "dummy" (FI_IGNORE) lookups. 4439 */ 4440 find_out_wild_ports: 4441 if (!(flags & NAT_TCPUDP) || !(flags & NAT_SEARCH)) { 4442 NBUMPSIDEX(1, ns_lookup_miss, ns_lookup_miss_1); 4443 return (NULL); 4444 } 4445 if (softn->ipf_nat_stats.ns_wilds == 0 || (fin->fin_flx & FI_NOWILD)) { 4446 NBUMPSIDEX(1, ns_lookup_nowild, ns_lookup_nowild_1); 4447 return (NULL); 4448 } 4449 4450 RWLOCK_EXIT(&softc->ipf_nat); 4451 4452 hv = NAT_HASH_FN(src.s_addr, 0, 0xffffffff); 4453 hv = NAT_HASH_FN(dst.s_addr, hv, softn->ipf_nat_table_sz); 4454 4455 WRITE_ENTER(&softc->ipf_nat); 4456 4457 nat = softn->ipf_nat_table[0][hv]; 4458 for (; nat; nat = nat->nat_hnext[0]) { 4459 if (nat->nat_ifps[1] != NULL) { 4460 if ((ifp != NULL) && (ifp != nat->nat_ifps[1])) 4461 continue; 4462 } 4463 4464 if (nat->nat_pr[1] != fin->fin_p) 4465 continue; 4466 4467 switch (nat->nat_dir & (NAT_INBOUND|NAT_OUTBOUND)) 4468 { 4469 case NAT_INBOUND : 4470 if (nat->nat_v[1] != 4) 4471 continue; 4472 if (nat->nat_ndstaddr != src.s_addr || 4473 nat->nat_nsrcaddr != dst.s_addr) 4474 continue; 4475 break; 4476 case NAT_OUTBOUND : 4477 if (nat->nat_v[0] != 4) 4478 continue; 4479 if (nat->nat_osrcaddr != src.s_addr || 4480 nat->nat_odstaddr != dst.s_addr) 4481 continue; 4482 break; 4483 } 4484 4485 if (!(nat->nat_flags & (NAT_TCPUDP|SI_WILDP))) 4486 continue; 4487 4488 if (ipf_nat_wildok(nat, (int)sport, (int)dport, nat->nat_flags, 4489 NAT_OUTBOUND) == 1) { 4490 if ((fin->fin_flx & FI_IGNORE) != 0) 4491 break; 4492 if ((nat->nat_flags & SI_CLONE) != 0) { 4493 nat = ipf_nat_clone(fin, nat); 4494 if (nat == NULL) 4495 break; 4496 } else { 4497 MUTEX_ENTER(&softn->ipf_nat_new); 4498 softn->ipf_nat_stats.ns_wilds--; 4499 MUTEX_EXIT(&softn->ipf_nat_new); 4500 } 4501 4502 if (nat->nat_dir == NAT_OUTBOUND) { 4503 if (nat->nat_osport == 0) { 4504 nat->nat_osport = sport; 4505 nat->nat_nsport = sport; 4506 } 4507 if (nat->nat_odport == 0) { 4508 nat->nat_odport = dport; 4509 nat->nat_ndport = dport; 4510 } 4511 } else if (nat->nat_dir == NAT_INBOUND) { 4512 if (nat->nat_osport == 0) { 4513 nat->nat_osport = dport; 4514 nat->nat_nsport = dport; 4515 } 4516 if (nat->nat_odport == 0) { 4517 nat->nat_odport = sport; 4518 nat->nat_ndport = sport; 4519 } 4520 } 4521 if ((nat->nat_ifps[1] == NULL) && (ifp != NULL)) { 4522 nat->nat_ifps[1] = ifp; 4523 nat->nat_mtu[1] = GETIFMTU_4(ifp); 4524 } 4525 nat->nat_flags &= ~(SI_W_DPORT|SI_W_SPORT); 4526 ipf_nat_tabmove(softn, nat); 4527 break; 4528 } 4529 } 4530 4531 MUTEX_DOWNGRADE(&softc->ipf_nat); 4532 4533 if (nat == NULL) { 4534 NBUMPSIDE(1, ns_lookup_miss); 4535 } 4536 return (nat); 4537 } 4538 4539 4540 /* ------------------------------------------------------------------------ */ 4541 /* Function: ipf_nat_lookupredir */ 4542 /* Returns: nat_t* - NULL == no match, */ 4543 /* else pointer to matching NAT entry */ 4544 /* Parameters: np(I) - pointer to description of packet to find NAT table */ 4545 /* entry for. */ 4546 /* */ 4547 /* Lookup the NAT tables to search for a matching redirect */ 4548 /* The contents of natlookup_t should imitate those found in a packet that */ 4549 /* would be translated - ie a packet coming in for RDR or going out for MAP.*/ 4550 /* We can do the lookup in one of two ways, imitating an inbound or */ 4551 /* outbound packet. By default we assume outbound, unless IPN_IN is set. */ 4552 /* For IN, the fields are set as follows: */ 4553 /* nl_real* = source information */ 4554 /* nl_out* = destination information (translated) */ 4555 /* For an out packet, the fields are set like this: */ 4556 /* nl_in* = source information (untranslated) */ 4557 /* nl_out* = destination information (translated) */ 4558 /* ------------------------------------------------------------------------ */ 4559 nat_t * ipf_nat_lookupredir(natlookup_t * np)4560 ipf_nat_lookupredir(natlookup_t *np) 4561 { 4562 fr_info_t fi; 4563 nat_t *nat; 4564 4565 bzero((char *)&fi, sizeof(fi)); 4566 if (np->nl_flags & IPN_IN) { 4567 fi.fin_data[0] = ntohs(np->nl_realport); 4568 fi.fin_data[1] = ntohs(np->nl_outport); 4569 } else { 4570 fi.fin_data[0] = ntohs(np->nl_inport); 4571 fi.fin_data[1] = ntohs(np->nl_outport); 4572 } 4573 if (np->nl_flags & IPN_TCP) 4574 fi.fin_p = IPPROTO_TCP; 4575 else if (np->nl_flags & IPN_UDP) 4576 fi.fin_p = IPPROTO_UDP; 4577 else if (np->nl_flags & (IPN_ICMPERR|IPN_ICMPQUERY)) 4578 fi.fin_p = IPPROTO_ICMP; 4579 4580 /* 4581 * We can do two sorts of lookups: 4582 * - IPN_IN: we have the `real' and `out' address, look for `in'. 4583 * - default: we have the `in' and `out' address, look for `real'. 4584 */ 4585 if (np->nl_flags & IPN_IN) { 4586 if ((nat = ipf_nat_inlookup(&fi, np->nl_flags, fi.fin_p, 4587 np->nl_realip, np->nl_outip))) { 4588 np->nl_inip = nat->nat_odstip; 4589 np->nl_inport = nat->nat_odport; 4590 } 4591 } else { 4592 /* 4593 * If nl_inip is non null, this is a lookup based on the real 4594 * ip address. Else, we use the fake. 4595 */ 4596 if ((nat = ipf_nat_outlookup(&fi, np->nl_flags, fi.fin_p, 4597 np->nl_inip, np->nl_outip))) { 4598 4599 if ((np->nl_flags & IPN_FINDFORWARD) != 0) { 4600 fr_info_t fin; 4601 bzero((char *)&fin, sizeof(fin)); 4602 fin.fin_p = nat->nat_pr[0]; 4603 fin.fin_data[0] = ntohs(nat->nat_ndport); 4604 fin.fin_data[1] = ntohs(nat->nat_nsport); 4605 if (ipf_nat_inlookup(&fin, np->nl_flags, 4606 fin.fin_p, nat->nat_ndstip, 4607 nat->nat_nsrcip) != NULL) { 4608 np->nl_flags &= ~IPN_FINDFORWARD; 4609 } 4610 } 4611 4612 np->nl_realip = nat->nat_odstip; 4613 np->nl_realport = nat->nat_odport; 4614 } 4615 } 4616 4617 return (nat); 4618 } 4619 4620 4621 /* ------------------------------------------------------------------------ */ 4622 /* Function: ipf_nat_match */ 4623 /* Returns: int - 0 == no match, 1 == match */ 4624 /* Parameters: fin(I) - pointer to packet information */ 4625 /* np(I) - pointer to NAT rule */ 4626 /* */ 4627 /* Pull the matching of a packet against a NAT rule out of that complex */ 4628 /* loop inside ipf_nat_checkin() and lay it out properly in its own function. */ 4629 /* ------------------------------------------------------------------------ */ 4630 static int ipf_nat_match(fr_info_t * fin,ipnat_t * np)4631 ipf_nat_match(fr_info_t *fin, ipnat_t *np) 4632 { 4633 ipf_main_softc_t *softc = fin->fin_main_soft; 4634 frtuc_t *ft; 4635 int match; 4636 4637 match = 0; 4638 switch (np->in_osrcatype) 4639 { 4640 case FRI_NORMAL : 4641 match = ((fin->fin_saddr & np->in_osrcmsk) != np->in_osrcaddr); 4642 break; 4643 case FRI_LOOKUP : 4644 match = (*np->in_osrcfunc)(softc, np->in_osrcptr, 4645 4, &fin->fin_saddr, fin->fin_plen); 4646 break; 4647 } 4648 match ^= ((np->in_flags & IPN_NOTSRC) != 0); 4649 if (match) 4650 return (0); 4651 4652 match = 0; 4653 switch (np->in_odstatype) 4654 { 4655 case FRI_NORMAL : 4656 match = ((fin->fin_daddr & np->in_odstmsk) != np->in_odstaddr); 4657 break; 4658 case FRI_LOOKUP : 4659 match = (*np->in_odstfunc)(softc, np->in_odstptr, 4660 4, &fin->fin_daddr, fin->fin_plen); 4661 break; 4662 } 4663 4664 match ^= ((np->in_flags & IPN_NOTDST) != 0); 4665 if (match) 4666 return (0); 4667 4668 ft = &np->in_tuc; 4669 if (!(fin->fin_flx & FI_TCPUDP) || 4670 (fin->fin_flx & (FI_SHORT|FI_FRAGBODY))) { 4671 if (ft->ftu_scmp || ft->ftu_dcmp) 4672 return (0); 4673 return (1); 4674 } 4675 4676 return (ipf_tcpudpchk(&fin->fin_fi, ft)); 4677 } 4678 4679 4680 /* ------------------------------------------------------------------------ */ 4681 /* Function: ipf_nat_update */ 4682 /* Returns: Nil */ 4683 /* Parameters: fin(I) - pointer to packet information */ 4684 /* nat(I) - pointer to NAT structure */ 4685 /* */ 4686 /* Updates the lifetime of a NAT table entry for non-TCP packets. Must be */ 4687 /* called with fin_rev updated - i.e. after calling ipf_nat_proto(). */ 4688 /* */ 4689 /* This *MUST* be called after ipf_nat_proto() as it expects fin_rev to */ 4690 /* already be set. */ 4691 /* ------------------------------------------------------------------------ */ 4692 void ipf_nat_update(fr_info_t * fin,nat_t * nat)4693 ipf_nat_update(fr_info_t *fin, nat_t *nat) 4694 { 4695 ipf_main_softc_t *softc = fin->fin_main_soft; 4696 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 4697 ipftq_t *ifq, *ifq2; 4698 ipftqent_t *tqe; 4699 ipnat_t *np = nat->nat_ptr; 4700 4701 tqe = &nat->nat_tqe; 4702 ifq = tqe->tqe_ifq; 4703 4704 /* 4705 * We allow over-riding of NAT timeouts from NAT rules, even for 4706 * TCP, however, if it is TCP and there is no rule timeout set, 4707 * then do not update the timeout here. 4708 */ 4709 if (np != NULL) { 4710 np->in_bytes[fin->fin_rev] += fin->fin_plen; 4711 ifq2 = np->in_tqehead[fin->fin_rev]; 4712 } else { 4713 ifq2 = NULL; 4714 } 4715 4716 if (nat->nat_pr[0] == IPPROTO_TCP && ifq2 == NULL) { 4717 (void) ipf_tcp_age(&nat->nat_tqe, fin, softn->ipf_nat_tcptq, 4718 0, 2); 4719 } else { 4720 if (ifq2 == NULL) { 4721 if (nat->nat_pr[0] == IPPROTO_UDP) 4722 ifq2 = fin->fin_rev ? &softn->ipf_nat_udpacktq : 4723 &softn->ipf_nat_udptq; 4724 else if (nat->nat_pr[0] == IPPROTO_ICMP || 4725 nat->nat_pr[0] == IPPROTO_ICMPV6) 4726 ifq2 = fin->fin_rev ? &softn->ipf_nat_icmpacktq: 4727 &softn->ipf_nat_icmptq; 4728 else 4729 ifq2 = &softn->ipf_nat_iptq; 4730 } 4731 4732 ipf_movequeue(softc->ipf_ticks, tqe, ifq, ifq2); 4733 } 4734 } 4735 4736 4737 /* ------------------------------------------------------------------------ */ 4738 /* Function: ipf_nat_checkout */ 4739 /* Returns: int - -1 == packet failed NAT checks so block it, */ 4740 /* 0 == no packet translation occurred, */ 4741 /* 1 == packet was successfully translated. */ 4742 /* Parameters: fin(I) - pointer to packet information */ 4743 /* passp(I) - pointer to filtering result flags */ 4744 /* */ 4745 /* Check to see if an outcoming packet should be changed. ICMP packets are */ 4746 /* first checked to see if they match an existing entry (if an error), */ 4747 /* otherwise a search of the current NAT table is made. If neither results */ 4748 /* in a match then a search for a matching NAT rule is made. Create a new */ 4749 /* NAT entry if a we matched a NAT rule. Lastly, actually change the */ 4750 /* packet header(s) as required. */ 4751 /* ------------------------------------------------------------------------ */ 4752 int ipf_nat_checkout(fr_info_t * fin,u_32_t * passp)4753 ipf_nat_checkout(fr_info_t *fin, u_32_t *passp) 4754 { 4755 ipnat_t *np = NULL, *npnext; 4756 struct ifnet *ifp, *sifp; 4757 ipf_main_softc_t *softc; 4758 ipf_nat_softc_t *softn; 4759 icmphdr_t *icmp = NULL; 4760 tcphdr_t *tcp = NULL; 4761 int rval, natfailed; 4762 u_int nflags = 0; 4763 u_32_t ipa, iph; 4764 int natadd = 1; 4765 frentry_t *fr; 4766 nat_t *nat; 4767 4768 if (fin->fin_v == 6) { 4769 #ifdef USE_INET6 4770 return (ipf_nat6_checkout(fin, passp)); 4771 #else 4772 return (0); 4773 #endif 4774 } 4775 4776 softc = fin->fin_main_soft; 4777 softn = softc->ipf_nat_soft; 4778 4779 if (softn->ipf_nat_lock != 0) 4780 return (0); 4781 if (softn->ipf_nat_stats.ns_rules == 0 && 4782 softn->ipf_nat_instances == NULL) 4783 return (0); 4784 4785 natfailed = 0; 4786 fr = fin->fin_fr; 4787 sifp = fin->fin_ifp; 4788 if (fr != NULL) { 4789 ifp = fr->fr_tifs[fin->fin_rev].fd_ptr; 4790 if ((ifp != NULL) && (ifp != (void *)-1)) 4791 fin->fin_ifp = ifp; 4792 } 4793 ifp = fin->fin_ifp; 4794 4795 if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 4796 switch (fin->fin_p) 4797 { 4798 case IPPROTO_TCP : 4799 nflags = IPN_TCP; 4800 break; 4801 case IPPROTO_UDP : 4802 nflags = IPN_UDP; 4803 break; 4804 case IPPROTO_ICMP : 4805 icmp = fin->fin_dp; 4806 4807 /* 4808 * This is an incoming packet, so the destination is 4809 * the icmp_id and the source port equals 0 4810 */ 4811 if ((fin->fin_flx & FI_ICMPQUERY) != 0) 4812 nflags = IPN_ICMPQUERY; 4813 break; 4814 default : 4815 break; 4816 } 4817 4818 if ((nflags & IPN_TCPUDP)) 4819 tcp = fin->fin_dp; 4820 } 4821 4822 ipa = fin->fin_saddr; 4823 4824 READ_ENTER(&softc->ipf_nat); 4825 4826 if ((fin->fin_p == IPPROTO_ICMP) && !(nflags & IPN_ICMPQUERY) && 4827 (nat = ipf_nat_icmperror(fin, &nflags, NAT_OUTBOUND))) 4828 /*EMPTY*/; 4829 else if ((fin->fin_flx & FI_FRAG) && (nat = ipf_frag_natknown(fin))) 4830 natadd = 0; 4831 else if ((nat = ipf_nat_outlookup(fin, nflags|NAT_SEARCH, 4832 (u_int)fin->fin_p, fin->fin_src, 4833 fin->fin_dst))) { 4834 nflags = nat->nat_flags; 4835 } else if (fin->fin_off == 0) { 4836 u_32_t hv, msk, nmsk = 0; 4837 4838 /* 4839 * If there is no current entry in the nat table for this IP#, 4840 * create one for it (if there is a matching rule). 4841 */ 4842 maskloop: 4843 msk = softn->ipf_nat_map_active_masks[nmsk]; 4844 iph = ipa & msk; 4845 hv = NAT_HASH_FN(iph, 0, softn->ipf_nat_maprules_sz); 4846 retry_roundrobin: 4847 for (np = softn->ipf_nat_map_rules[hv]; np; np = npnext) { 4848 npnext = np->in_mnext; 4849 if ((np->in_ifps[1] && (np->in_ifps[1] != ifp))) 4850 continue; 4851 if (np->in_v[0] != 4) 4852 continue; 4853 if (np->in_pr[1] && (np->in_pr[1] != fin->fin_p)) 4854 continue; 4855 if ((np->in_flags & IPN_RF) && 4856 !(np->in_flags & nflags)) 4857 continue; 4858 if (np->in_flags & IPN_FILTER) { 4859 switch (ipf_nat_match(fin, np)) 4860 { 4861 case 0 : 4862 continue; 4863 case -1 : 4864 rval = -3; 4865 goto outmatchfail; 4866 case 1 : 4867 default : 4868 break; 4869 } 4870 } else if ((ipa & np->in_osrcmsk) != np->in_osrcaddr) 4871 continue; 4872 4873 if ((fr != NULL) && 4874 !ipf_matchtag(&np->in_tag, &fr->fr_nattag)) 4875 continue; 4876 4877 if (np->in_plabel != -1) { 4878 if (((np->in_flags & IPN_FILTER) == 0) && 4879 (np->in_odport != fin->fin_data[1])) 4880 continue; 4881 if (ipf_proxy_ok(fin, tcp, np) == 0) 4882 continue; 4883 } 4884 4885 if (np->in_flags & IPN_NO) { 4886 np->in_hits++; 4887 break; 4888 } 4889 MUTEX_ENTER(&softn->ipf_nat_new); 4890 /* 4891 * If we've matched a round-robin rule but it has 4892 * moved in the list since we got it, start over as 4893 * this is now no longer correct. 4894 */ 4895 if (npnext != np->in_mnext) { 4896 if ((np->in_flags & IPN_ROUNDR) != 0) { 4897 MUTEX_EXIT(&softn->ipf_nat_new); 4898 goto retry_roundrobin; 4899 } 4900 npnext = np->in_mnext; 4901 } 4902 4903 nat = ipf_nat_add(fin, np, NULL, nflags, NAT_OUTBOUND); 4904 MUTEX_EXIT(&softn->ipf_nat_new); 4905 if (nat != NULL) { 4906 natfailed = 0; 4907 break; 4908 } 4909 natfailed = -2; 4910 } 4911 if ((np == NULL) && (nmsk < softn->ipf_nat_map_max)) { 4912 nmsk++; 4913 goto maskloop; 4914 } 4915 } 4916 4917 if (nat != NULL) { 4918 rval = ipf_nat_out(fin, nat, natadd, nflags); 4919 if (rval == 1) { 4920 MUTEX_ENTER(&nat->nat_lock); 4921 ipf_nat_update(fin, nat); 4922 nat->nat_bytes[1] += fin->fin_plen; 4923 nat->nat_pkts[1]++; 4924 fin->fin_pktnum = nat->nat_pkts[1]; 4925 MUTEX_EXIT(&nat->nat_lock); 4926 } 4927 } else 4928 rval = natfailed; 4929 outmatchfail: 4930 RWLOCK_EXIT(&softc->ipf_nat); 4931 4932 switch (rval) 4933 { 4934 case -3 : 4935 /* ipf_nat_match() failure */ 4936 /* FALLTHROUGH */ 4937 case -2 : 4938 /* retry_roundrobin loop failure */ 4939 /* FALLTHROUGH */ 4940 case -1 : 4941 /* proxy failure detected by ipf_nat_out() */ 4942 if (passp != NULL) { 4943 DT2(frb_natv4out, fr_info_t *, fin, int, rval); 4944 NBUMPSIDED(1, ns_drop); 4945 *passp = FR_BLOCK; 4946 fin->fin_reason = FRB_NATV4; 4947 } 4948 fin->fin_flx |= FI_BADNAT; 4949 NBUMPSIDED(1, ns_badnat); 4950 rval = -1; /* We only return -1 on error. */ 4951 break; 4952 case 0 : 4953 NBUMPSIDE(1, ns_ignored); 4954 break; 4955 case 1 : 4956 NBUMPSIDE(1, ns_translated); 4957 break; 4958 } 4959 fin->fin_ifp = sifp; 4960 return (rval); 4961 } 4962 4963 /* ------------------------------------------------------------------------ */ 4964 /* Function: ipf_nat_out */ 4965 /* Returns: int - -1 == packet failed NAT checks so block it, */ 4966 /* 1 == packet was successfully translated. */ 4967 /* Parameters: fin(I) - pointer to packet information */ 4968 /* nat(I) - pointer to NAT structure */ 4969 /* natadd(I) - flag indicating if it is safe to add frag cache */ 4970 /* nflags(I) - NAT flags set for this packet */ 4971 /* */ 4972 /* Translate a packet coming "out" on an interface. */ 4973 /* ------------------------------------------------------------------------ */ 4974 int ipf_nat_out(fr_info_t * fin,nat_t * nat,int natadd,u_32_t nflags)4975 ipf_nat_out(fr_info_t *fin, nat_t *nat, int natadd, u_32_t nflags) 4976 { 4977 ipf_main_softc_t *softc = fin->fin_main_soft; 4978 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 4979 icmphdr_t *icmp; 4980 tcphdr_t *tcp; 4981 ipnat_t *np; 4982 int skip; 4983 int i; 4984 4985 tcp = NULL; 4986 icmp = NULL; 4987 np = nat->nat_ptr; 4988 4989 if ((natadd != 0) && (fin->fin_flx & FI_FRAG) && (np != NULL)) 4990 (void) ipf_frag_natnew(softc, fin, 0, nat); 4991 4992 /* 4993 * Fix up checksums, not by recalculating them, but 4994 * simply computing adjustments. 4995 * This is only done for STREAMS based IP implementations where the 4996 * checksum has already been calculated by IP. In all other cases, 4997 * IPFilter is called before the checksum needs calculating so there 4998 * is no call to modify whatever is in the header now. 4999 */ 5000 if (nflags == IPN_ICMPERR) { 5001 u_32_t s1, s2, sumd, msumd; 5002 5003 s1 = LONG_SUM(ntohl(fin->fin_saddr)); 5004 if (nat->nat_dir == NAT_OUTBOUND) { 5005 s2 = LONG_SUM(ntohl(nat->nat_nsrcaddr)); 5006 } else { 5007 s2 = LONG_SUM(ntohl(nat->nat_odstaddr)); 5008 } 5009 CALC_SUMD(s1, s2, sumd); 5010 msumd = sumd; 5011 5012 s1 = LONG_SUM(ntohl(fin->fin_daddr)); 5013 if (nat->nat_dir == NAT_OUTBOUND) { 5014 s2 = LONG_SUM(ntohl(nat->nat_ndstaddr)); 5015 } else { 5016 s2 = LONG_SUM(ntohl(nat->nat_osrcaddr)); 5017 } 5018 CALC_SUMD(s1, s2, sumd); 5019 msumd += sumd; 5020 5021 ipf_fix_outcksum(0, &fin->fin_ip->ip_sum, msumd, 0); 5022 } 5023 #if !defined(_KERNEL) || SOLARIS || \ 5024 defined(BRIDGE_IPF) || defined(__FreeBSD__) 5025 else { 5026 /* 5027 * We always do this on FreeBSD because this code doesn't 5028 * exist in fastforward. 5029 */ 5030 switch (nat->nat_dir) 5031 { 5032 case NAT_OUTBOUND : 5033 ipf_fix_outcksum(fin->fin_cksum & FI_CK_L4PART, 5034 &fin->fin_ip->ip_sum, 5035 nat->nat_ipsumd, 0); 5036 break; 5037 5038 case NAT_INBOUND : 5039 ipf_fix_incksum(fin->fin_cksum & FI_CK_L4PART, 5040 &fin->fin_ip->ip_sum, 5041 nat->nat_ipsumd, 0); 5042 break; 5043 5044 default : 5045 break; 5046 } 5047 } 5048 #endif 5049 5050 /* 5051 * Address assignment is after the checksum modification because 5052 * we are using the address in the packet for determining the 5053 * correct checksum offset (the ICMP error could be coming from 5054 * anyone...) 5055 */ 5056 switch (nat->nat_dir) 5057 { 5058 case NAT_OUTBOUND : 5059 fin->fin_ip->ip_src = nat->nat_nsrcip; 5060 fin->fin_saddr = nat->nat_nsrcaddr; 5061 fin->fin_ip->ip_dst = nat->nat_ndstip; 5062 fin->fin_daddr = nat->nat_ndstaddr; 5063 break; 5064 5065 case NAT_INBOUND : 5066 fin->fin_ip->ip_src = nat->nat_odstip; 5067 fin->fin_saddr = nat->nat_ndstaddr; 5068 fin->fin_ip->ip_dst = nat->nat_osrcip; 5069 fin->fin_daddr = nat->nat_nsrcaddr; 5070 break; 5071 5072 case NAT_DIVERTIN : 5073 { 5074 mb_t *m; 5075 5076 skip = ipf_nat_decap(fin, nat); 5077 if (skip <= 0) { 5078 NBUMPSIDED(1, ns_decap_fail); 5079 return (-1); 5080 } 5081 5082 m = fin->fin_m; 5083 5084 #if SOLARIS && defined(_KERNEL) 5085 m->b_rptr += skip; 5086 #else 5087 m->m_data += skip; 5088 m->m_len -= skip; 5089 5090 # ifdef M_PKTHDR 5091 if (m->m_flags & M_PKTHDR) 5092 m->m_pkthdr.len -= skip; 5093 # endif 5094 #endif 5095 5096 MUTEX_ENTER(&nat->nat_lock); 5097 ipf_nat_update(fin, nat); 5098 MUTEX_EXIT(&nat->nat_lock); 5099 fin->fin_flx |= FI_NATED; 5100 if (np != NULL && np->in_tag.ipt_num[0] != 0) 5101 fin->fin_nattag = &np->in_tag; 5102 return (1); 5103 /* NOTREACHED */ 5104 } 5105 5106 case NAT_DIVERTOUT : 5107 { 5108 u_32_t s1, s2, sumd; 5109 udphdr_t *uh; 5110 ip_t *ip; 5111 mb_t *m; 5112 5113 m = M_DUP(np->in_divmp); 5114 if (m == NULL) { 5115 NBUMPSIDED(1, ns_divert_dup); 5116 return (-1); 5117 } 5118 5119 ip = MTOD(m, ip_t *); 5120 ip_fillid(ip, V_ip_random_id); 5121 s2 = ntohs(ip->ip_id); 5122 5123 s1 = ip->ip_len; 5124 ip->ip_len = ntohs(ip->ip_len); 5125 ip->ip_len += fin->fin_plen; 5126 ip->ip_len = htons(ip->ip_len); 5127 s2 += ntohs(ip->ip_len); 5128 CALC_SUMD(s1, s2, sumd); 5129 5130 uh = (udphdr_t *)(ip + 1); 5131 uh->uh_ulen += fin->fin_plen; 5132 uh->uh_ulen = htons(uh->uh_ulen); 5133 #if !defined(_KERNEL) || SOLARIS || \ 5134 defined(BRIDGE_IPF) || defined(__FreeBSD__) 5135 ipf_fix_outcksum(0, &ip->ip_sum, sumd, 0); 5136 #endif 5137 5138 PREP_MB_T(fin, m); 5139 5140 fin->fin_src = ip->ip_src; 5141 fin->fin_dst = ip->ip_dst; 5142 fin->fin_ip = ip; 5143 fin->fin_plen += sizeof(ip_t) + 8; /* UDP + IPv4 hdr */ 5144 fin->fin_dlen += sizeof(ip_t) + 8; /* UDP + IPv4 hdr */ 5145 5146 nflags &= ~IPN_TCPUDPICMP; 5147 5148 break; 5149 } 5150 5151 default : 5152 break; 5153 } 5154 5155 if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 5156 u_short *csump; 5157 5158 if ((nat->nat_nsport != 0) && (nflags & IPN_TCPUDP)) { 5159 tcp = fin->fin_dp; 5160 5161 switch (nat->nat_dir) 5162 { 5163 case NAT_OUTBOUND : 5164 tcp->th_sport = nat->nat_nsport; 5165 fin->fin_data[0] = ntohs(nat->nat_nsport); 5166 tcp->th_dport = nat->nat_ndport; 5167 fin->fin_data[1] = ntohs(nat->nat_ndport); 5168 break; 5169 5170 case NAT_INBOUND : 5171 tcp->th_sport = nat->nat_odport; 5172 fin->fin_data[0] = ntohs(nat->nat_odport); 5173 tcp->th_dport = nat->nat_osport; 5174 fin->fin_data[1] = ntohs(nat->nat_osport); 5175 break; 5176 } 5177 } 5178 5179 if ((nat->nat_nsport != 0) && (nflags & IPN_ICMPQUERY)) { 5180 icmp = fin->fin_dp; 5181 icmp->icmp_id = nat->nat_nicmpid; 5182 } 5183 5184 csump = ipf_nat_proto(fin, nat, nflags); 5185 5186 /* 5187 * The above comments do not hold for layer 4 (or higher) 5188 * checksums... 5189 */ 5190 if (csump != NULL) { 5191 if (nat->nat_dir == NAT_OUTBOUND) 5192 ipf_fix_outcksum(fin->fin_cksum, csump, 5193 nat->nat_sumd[0], 5194 nat->nat_sumd[1] + 5195 fin->fin_dlen); 5196 else 5197 ipf_fix_incksum(fin->fin_cksum, csump, 5198 nat->nat_sumd[0], 5199 nat->nat_sumd[1] + 5200 fin->fin_dlen); 5201 } 5202 } 5203 5204 ipf_sync_update(softc, SMC_NAT, fin, nat->nat_sync); 5205 /* ------------------------------------------------------------- */ 5206 /* A few quick notes: */ 5207 /* Following are test conditions prior to calling the */ 5208 /* ipf_proxy_check routine. */ 5209 /* */ 5210 /* A NULL tcp indicates a non TCP/UDP packet. When dealing */ 5211 /* with a redirect rule, we attempt to match the packet's */ 5212 /* source port against in_dport, otherwise we'd compare the */ 5213 /* packet's destination. */ 5214 /* ------------------------------------------------------------- */ 5215 if ((np != NULL) && (np->in_apr != NULL)) { 5216 i = ipf_proxy_check(fin, nat); 5217 if (i == -1) { 5218 NBUMPSIDED(1, ns_ipf_proxy_fail); 5219 } 5220 } else { 5221 i = 1; 5222 } 5223 fin->fin_flx |= FI_NATED; 5224 return (i); 5225 } 5226 5227 5228 /* ------------------------------------------------------------------------ */ 5229 /* Function: ipf_nat_checkin */ 5230 /* Returns: int - -1 == packet failed NAT checks so block it, */ 5231 /* 0 == no packet translation occurred, */ 5232 /* 1 == packet was successfully translated. */ 5233 /* Parameters: fin(I) - pointer to packet information */ 5234 /* passp(I) - pointer to filtering result flags */ 5235 /* */ 5236 /* Check to see if an incoming packet should be changed. ICMP packets are */ 5237 /* first checked to see if they match an existing entry (if an error), */ 5238 /* otherwise a search of the current NAT table is made. If neither results */ 5239 /* in a match then a search for a matching NAT rule is made. Create a new */ 5240 /* NAT entry if a we matched a NAT rule. Lastly, actually change the */ 5241 /* packet header(s) as required. */ 5242 /* ------------------------------------------------------------------------ */ 5243 int ipf_nat_checkin(fr_info_t * fin,u_32_t * passp)5244 ipf_nat_checkin(fr_info_t *fin, u_32_t *passp) 5245 { 5246 ipf_main_softc_t *softc; 5247 ipf_nat_softc_t *softn; 5248 u_int nflags, natadd; 5249 ipnat_t *np, *npnext; 5250 int rval, natfailed; 5251 struct ifnet *ifp; 5252 struct in_addr in; 5253 icmphdr_t *icmp; 5254 tcphdr_t *tcp; 5255 u_short dport; 5256 nat_t *nat; 5257 u_32_t iph; 5258 5259 softc = fin->fin_main_soft; 5260 softn = softc->ipf_nat_soft; 5261 5262 if (softn->ipf_nat_lock != 0) 5263 return (0); 5264 if (softn->ipf_nat_stats.ns_rules == 0 && 5265 softn->ipf_nat_instances == NULL) 5266 return (0); 5267 5268 tcp = NULL; 5269 icmp = NULL; 5270 dport = 0; 5271 natadd = 1; 5272 nflags = 0; 5273 natfailed = 0; 5274 ifp = fin->fin_ifp; 5275 5276 if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 5277 switch (fin->fin_p) 5278 { 5279 case IPPROTO_TCP : 5280 nflags = IPN_TCP; 5281 break; 5282 case IPPROTO_UDP : 5283 nflags = IPN_UDP; 5284 break; 5285 case IPPROTO_ICMP : 5286 icmp = fin->fin_dp; 5287 5288 /* 5289 * This is an incoming packet, so the destination is 5290 * the icmp_id and the source port equals 0 5291 */ 5292 if ((fin->fin_flx & FI_ICMPQUERY) != 0) { 5293 nflags = IPN_ICMPQUERY; 5294 dport = icmp->icmp_id; 5295 } break; 5296 default : 5297 break; 5298 } 5299 5300 if ((nflags & IPN_TCPUDP)) { 5301 tcp = fin->fin_dp; 5302 dport = fin->fin_data[1]; 5303 } 5304 } 5305 5306 in = fin->fin_dst; 5307 5308 READ_ENTER(&softc->ipf_nat); 5309 5310 if ((fin->fin_p == IPPROTO_ICMP) && !(nflags & IPN_ICMPQUERY) && 5311 (nat = ipf_nat_icmperror(fin, &nflags, NAT_INBOUND))) 5312 /*EMPTY*/; 5313 else if ((fin->fin_flx & FI_FRAG) && (nat = ipf_frag_natknown(fin))) 5314 natadd = 0; 5315 else if ((nat = ipf_nat_inlookup(fin, nflags|NAT_SEARCH, 5316 (u_int)fin->fin_p, 5317 fin->fin_src, in))) { 5318 nflags = nat->nat_flags; 5319 } else if (fin->fin_off == 0) { 5320 u_32_t hv, msk, rmsk = 0; 5321 5322 /* 5323 * If there is no current entry in the nat table for this IP#, 5324 * create one for it (if there is a matching rule). 5325 */ 5326 maskloop: 5327 msk = softn->ipf_nat_rdr_active_masks[rmsk]; 5328 iph = in.s_addr & msk; 5329 hv = NAT_HASH_FN(iph, 0, softn->ipf_nat_rdrrules_sz); 5330 retry_roundrobin: 5331 /* TRACE (iph,msk,rmsk,hv,softn->ipf_nat_rdrrules_sz) */ 5332 for (np = softn->ipf_nat_rdr_rules[hv]; np; np = npnext) { 5333 npnext = np->in_rnext; 5334 if (np->in_ifps[0] && (np->in_ifps[0] != ifp)) 5335 continue; 5336 if (np->in_v[0] != 4) 5337 continue; 5338 if (np->in_pr[0] && (np->in_pr[0] != fin->fin_p)) 5339 continue; 5340 if ((np->in_flags & IPN_RF) && !(np->in_flags & nflags)) 5341 continue; 5342 if (np->in_flags & IPN_FILTER) { 5343 switch (ipf_nat_match(fin, np)) 5344 { 5345 case 0 : 5346 continue; 5347 case -1 : 5348 rval = -3; 5349 goto inmatchfail; 5350 case 1 : 5351 default : 5352 break; 5353 } 5354 } else { 5355 if ((in.s_addr & np->in_odstmsk) != 5356 np->in_odstaddr) 5357 continue; 5358 if (np->in_odport && 5359 ((np->in_dtop < dport) || 5360 (dport < np->in_odport))) 5361 continue; 5362 } 5363 5364 if (np->in_plabel != -1) { 5365 if (!ipf_proxy_ok(fin, tcp, np)) { 5366 continue; 5367 } 5368 } 5369 5370 if (np->in_flags & IPN_NO) { 5371 np->in_hits++; 5372 break; 5373 } 5374 5375 MUTEX_ENTER(&softn->ipf_nat_new); 5376 /* 5377 * If we've matched a round-robin rule but it has 5378 * moved in the list since we got it, start over as 5379 * this is now no longer correct. 5380 */ 5381 if (npnext != np->in_rnext) { 5382 if ((np->in_flags & IPN_ROUNDR) != 0) { 5383 MUTEX_EXIT(&softn->ipf_nat_new); 5384 goto retry_roundrobin; 5385 } 5386 npnext = np->in_rnext; 5387 } 5388 5389 nat = ipf_nat_add(fin, np, NULL, nflags, NAT_INBOUND); 5390 MUTEX_EXIT(&softn->ipf_nat_new); 5391 if (nat != NULL) { 5392 natfailed = 0; 5393 break; 5394 } 5395 natfailed = -2; 5396 } 5397 if ((np == NULL) && (rmsk < softn->ipf_nat_rdr_max)) { 5398 rmsk++; 5399 goto maskloop; 5400 } 5401 } 5402 5403 if (nat != NULL) { 5404 rval = ipf_nat_in(fin, nat, natadd, nflags); 5405 if (rval == 1) { 5406 MUTEX_ENTER(&nat->nat_lock); 5407 ipf_nat_update(fin, nat); 5408 nat->nat_bytes[0] += fin->fin_plen; 5409 nat->nat_pkts[0]++; 5410 fin->fin_pktnum = nat->nat_pkts[0]; 5411 MUTEX_EXIT(&nat->nat_lock); 5412 } 5413 } else 5414 rval = natfailed; 5415 inmatchfail: 5416 RWLOCK_EXIT(&softc->ipf_nat); 5417 5418 DT2(frb_natv4in, fr_info_t *, fin, int, rval); 5419 switch (rval) 5420 { 5421 case -3 : 5422 /* ipf_nat_match() failure */ 5423 /* FALLTHROUGH */ 5424 case -2 : 5425 /* retry_roundrobin loop failure */ 5426 /* FALLTHROUGH */ 5427 case -1 : 5428 /* proxy failure detected by ipf_nat_in() */ 5429 if (passp != NULL) { 5430 NBUMPSIDED(0, ns_drop); 5431 *passp = FR_BLOCK; 5432 fin->fin_reason = FRB_NATV4; 5433 } 5434 fin->fin_flx |= FI_BADNAT; 5435 NBUMPSIDED(0, ns_badnat); 5436 rval = -1; /* We only return -1 on error. */ 5437 break; 5438 case 0 : 5439 NBUMPSIDE(0, ns_ignored); 5440 break; 5441 case 1 : 5442 NBUMPSIDE(0, ns_translated); 5443 break; 5444 } 5445 return (rval); 5446 } 5447 5448 5449 /* ------------------------------------------------------------------------ */ 5450 /* Function: ipf_nat_in */ 5451 /* Returns: int - -1 == packet failed NAT checks so block it, */ 5452 /* 1 == packet was successfully translated. */ 5453 /* Parameters: fin(I) - pointer to packet information */ 5454 /* nat(I) - pointer to NAT structure */ 5455 /* natadd(I) - flag indicating if it is safe to add frag cache */ 5456 /* nflags(I) - NAT flags set for this packet */ 5457 /* Locks Held: ipf_nat(READ) */ 5458 /* */ 5459 /* Translate a packet coming "in" on an interface. */ 5460 /* ------------------------------------------------------------------------ */ 5461 int ipf_nat_in(fr_info_t * fin,nat_t * nat,int natadd,u_32_t nflags)5462 ipf_nat_in(fr_info_t *fin, nat_t *nat, int natadd, u_32_t nflags) 5463 { 5464 ipf_main_softc_t *softc = fin->fin_main_soft; 5465 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 5466 u_32_t sumd, ipsumd, sum1, sum2; 5467 icmphdr_t *icmp; 5468 tcphdr_t *tcp; 5469 ipnat_t *np; 5470 int skip; 5471 int i; 5472 5473 tcp = NULL; 5474 np = nat->nat_ptr; 5475 fin->fin_fr = nat->nat_fr; 5476 5477 if (np != NULL) { 5478 if ((natadd != 0) && (fin->fin_flx & FI_FRAG)) 5479 (void) ipf_frag_natnew(softc, fin, 0, nat); 5480 5481 /* ------------------------------------------------------------- */ 5482 /* A few quick notes: */ 5483 /* Following are test conditions prior to calling the */ 5484 /* ipf_proxy_check routine. */ 5485 /* */ 5486 /* A NULL tcp indicates a non TCP/UDP packet. When dealing */ 5487 /* with a map rule, we attempt to match the packet's */ 5488 /* source port against in_dport, otherwise we'd compare the */ 5489 /* packet's destination. */ 5490 /* ------------------------------------------------------------- */ 5491 if (np->in_apr != NULL) { 5492 i = ipf_proxy_check(fin, nat); 5493 if (i == -1) { 5494 NBUMPSIDED(0, ns_ipf_proxy_fail); 5495 return (-1); 5496 } 5497 } 5498 } 5499 5500 ipf_sync_update(softc, SMC_NAT, fin, nat->nat_sync); 5501 5502 ipsumd = nat->nat_ipsumd; 5503 /* 5504 * Fix up checksums, not by recalculating them, but 5505 * simply computing adjustments. 5506 * Why only do this for some platforms on inbound packets ? 5507 * Because for those that it is done, IP processing is yet to happen 5508 * and so the IPv4 header checksum has not yet been evaluated. 5509 * Perhaps it should always be done for the benefit of things like 5510 * fast forwarding (so that it doesn't need to be recomputed) but with 5511 * header checksum offloading, perhaps it is a moot point. 5512 */ 5513 5514 switch (nat->nat_dir) 5515 { 5516 case NAT_INBOUND : 5517 if ((fin->fin_flx & FI_ICMPERR) == 0) { 5518 fin->fin_ip->ip_src = nat->nat_nsrcip; 5519 fin->fin_saddr = nat->nat_nsrcaddr; 5520 } else { 5521 sum1 = nat->nat_osrcaddr; 5522 sum2 = nat->nat_nsrcaddr; 5523 CALC_SUMD(sum1, sum2, sumd); 5524 ipsumd -= sumd; 5525 } 5526 fin->fin_ip->ip_dst = nat->nat_ndstip; 5527 fin->fin_daddr = nat->nat_ndstaddr; 5528 #if !defined(_KERNEL) || SOLARIS 5529 ipf_fix_outcksum(0, &fin->fin_ip->ip_sum, ipsumd, 0); 5530 #endif 5531 break; 5532 5533 case NAT_OUTBOUND : 5534 if ((fin->fin_flx & FI_ICMPERR) == 0) { 5535 fin->fin_ip->ip_src = nat->nat_odstip; 5536 fin->fin_saddr = nat->nat_odstaddr; 5537 } else { 5538 sum1 = nat->nat_odstaddr; 5539 sum2 = nat->nat_ndstaddr; 5540 CALC_SUMD(sum1, sum2, sumd); 5541 ipsumd -= sumd; 5542 } 5543 fin->fin_ip->ip_dst = nat->nat_osrcip; 5544 fin->fin_daddr = nat->nat_osrcaddr; 5545 #if !defined(_KERNEL) || SOLARIS 5546 ipf_fix_incksum(0, &fin->fin_ip->ip_sum, ipsumd, 0); 5547 #endif 5548 break; 5549 5550 case NAT_DIVERTIN : 5551 { 5552 udphdr_t *uh; 5553 ip_t *ip; 5554 mb_t *m; 5555 5556 m = M_DUP(np->in_divmp); 5557 if (m == NULL) { 5558 NBUMPSIDED(0, ns_divert_dup); 5559 return (-1); 5560 } 5561 5562 ip = MTOD(m, ip_t *); 5563 ip_fillid(ip, V_ip_random_id); 5564 sum1 = ntohs(ip->ip_len); 5565 ip->ip_len = ntohs(ip->ip_len); 5566 ip->ip_len += fin->fin_plen; 5567 ip->ip_len = htons(ip->ip_len); 5568 5569 uh = (udphdr_t *)(ip + 1); 5570 uh->uh_ulen += fin->fin_plen; 5571 uh->uh_ulen = htons(uh->uh_ulen); 5572 5573 sum2 = ntohs(ip->ip_id) + ntohs(ip->ip_len); 5574 sum2 += ntohs(ip->ip_off) & IP_DF; 5575 CALC_SUMD(sum1, sum2, sumd); 5576 5577 #if !defined(_KERNEL) || SOLARIS 5578 ipf_fix_outcksum(0, &ip->ip_sum, sumd, 0); 5579 #endif 5580 PREP_MB_T(fin, m); 5581 5582 fin->fin_ip = ip; 5583 fin->fin_plen += sizeof(ip_t) + 8; /* UDP + new IPv4 hdr */ 5584 fin->fin_dlen += sizeof(ip_t) + 8; /* UDP + old IPv4 hdr */ 5585 5586 nflags &= ~IPN_TCPUDPICMP; 5587 5588 break; 5589 } 5590 5591 case NAT_DIVERTOUT : 5592 { 5593 mb_t *m; 5594 5595 skip = ipf_nat_decap(fin, nat); 5596 if (skip <= 0) { 5597 NBUMPSIDED(0, ns_decap_fail); 5598 return (-1); 5599 } 5600 5601 m = fin->fin_m; 5602 5603 #if SOLARIS && defined(_KERNEL) 5604 m->b_rptr += skip; 5605 #else 5606 m->m_data += skip; 5607 m->m_len -= skip; 5608 5609 # ifdef M_PKTHDR 5610 if (m->m_flags & M_PKTHDR) 5611 m->m_pkthdr.len -= skip; 5612 # endif 5613 #endif 5614 5615 ipf_nat_update(fin, nat); 5616 nflags &= ~IPN_TCPUDPICMP; 5617 fin->fin_flx |= FI_NATED; 5618 if (np != NULL && np->in_tag.ipt_num[0] != 0) 5619 fin->fin_nattag = &np->in_tag; 5620 return (1); 5621 /* NOTREACHED */ 5622 } 5623 } 5624 if (nflags & IPN_TCPUDP) 5625 tcp = fin->fin_dp; 5626 5627 if (!(fin->fin_flx & FI_SHORT) && (fin->fin_off == 0)) { 5628 u_short *csump; 5629 5630 if ((nat->nat_odport != 0) && (nflags & IPN_TCPUDP)) { 5631 switch (nat->nat_dir) 5632 { 5633 case NAT_INBOUND : 5634 tcp->th_sport = nat->nat_nsport; 5635 fin->fin_data[0] = ntohs(nat->nat_nsport); 5636 tcp->th_dport = nat->nat_ndport; 5637 fin->fin_data[1] = ntohs(nat->nat_ndport); 5638 break; 5639 5640 case NAT_OUTBOUND : 5641 tcp->th_sport = nat->nat_odport; 5642 fin->fin_data[0] = ntohs(nat->nat_odport); 5643 tcp->th_dport = nat->nat_osport; 5644 fin->fin_data[1] = ntohs(nat->nat_osport); 5645 break; 5646 } 5647 } 5648 5649 5650 if ((nat->nat_odport != 0) && (nflags & IPN_ICMPQUERY)) { 5651 icmp = fin->fin_dp; 5652 5653 icmp->icmp_id = nat->nat_nicmpid; 5654 } 5655 5656 csump = ipf_nat_proto(fin, nat, nflags); 5657 5658 /* 5659 * The above comments do not hold for layer 4 (or higher) 5660 * checksums... 5661 */ 5662 if (csump != NULL) { 5663 if (nat->nat_dir == NAT_OUTBOUND) 5664 ipf_fix_incksum(0, csump, nat->nat_sumd[0], 0); 5665 else 5666 ipf_fix_outcksum(0, csump, nat->nat_sumd[0], 0); 5667 } 5668 } 5669 5670 fin->fin_flx |= FI_NATED; 5671 if (np != NULL && np->in_tag.ipt_num[0] != 0) 5672 fin->fin_nattag = &np->in_tag; 5673 return (1); 5674 } 5675 5676 5677 /* ------------------------------------------------------------------------ */ 5678 /* Function: ipf_nat_proto */ 5679 /* Returns: u_short* - pointer to transport header checksum to update, */ 5680 /* NULL if the transport protocol is not recognised */ 5681 /* as needing a checksum update. */ 5682 /* Parameters: fin(I) - pointer to packet information */ 5683 /* nat(I) - pointer to NAT structure */ 5684 /* nflags(I) - NAT flags set for this packet */ 5685 /* */ 5686 /* Return the pointer to the checksum field for each protocol so understood.*/ 5687 /* If support for making other changes to a protocol header is required, */ 5688 /* that is not strictly 'address' translation, such as clamping the MSS in */ 5689 /* TCP down to a specific value, then do it from here. */ 5690 /* ------------------------------------------------------------------------ */ 5691 u_short * ipf_nat_proto(fr_info_t * fin,nat_t * nat,u_int nflags)5692 ipf_nat_proto(fr_info_t *fin, nat_t *nat, u_int nflags) 5693 { 5694 icmphdr_t *icmp; 5695 u_short *csump; 5696 tcphdr_t *tcp; 5697 udphdr_t *udp; 5698 5699 csump = NULL; 5700 if (fin->fin_out == 0) { 5701 fin->fin_rev = (nat->nat_dir & NAT_OUTBOUND); 5702 } else { 5703 fin->fin_rev = ((nat->nat_dir & NAT_OUTBOUND) == 0); 5704 } 5705 5706 switch (fin->fin_p) 5707 { 5708 case IPPROTO_TCP : 5709 tcp = fin->fin_dp; 5710 5711 if ((nflags & IPN_TCP) != 0) 5712 csump = &tcp->th_sum; 5713 5714 /* 5715 * Do a MSS CLAMPING on a SYN packet, 5716 * only deal IPv4 for now. 5717 */ 5718 if ((nat->nat_mssclamp != 0) && (tcp_get_flags(tcp) & TH_SYN) != 0) 5719 ipf_nat_mssclamp(tcp, nat->nat_mssclamp, fin, csump); 5720 5721 break; 5722 5723 case IPPROTO_UDP : 5724 udp = fin->fin_dp; 5725 5726 if ((nflags & IPN_UDP) != 0) { 5727 if (udp->uh_sum != 0) 5728 csump = &udp->uh_sum; 5729 } 5730 break; 5731 5732 case IPPROTO_ICMP : 5733 icmp = fin->fin_dp; 5734 5735 if ((nflags & IPN_ICMPQUERY) != 0) { 5736 if (icmp->icmp_cksum != 0) 5737 csump = &icmp->icmp_cksum; 5738 } 5739 break; 5740 5741 #ifdef USE_INET6 5742 case IPPROTO_ICMPV6 : 5743 { 5744 struct icmp6_hdr *icmp6 = (struct icmp6_hdr *)fin->fin_dp; 5745 5746 icmp6 = fin->fin_dp; 5747 5748 if ((nflags & IPN_ICMPQUERY) != 0) { 5749 if (icmp6->icmp6_cksum != 0) 5750 csump = &icmp6->icmp6_cksum; 5751 } 5752 break; 5753 } 5754 #endif 5755 } 5756 return (csump); 5757 } 5758 5759 5760 /* ------------------------------------------------------------------------ */ 5761 /* Function: ipf_nat_expire */ 5762 /* Returns: Nil */ 5763 /* Parameters: softc(I) - pointer to soft context main structure */ 5764 /* */ 5765 /* Check all of the timeout queues for entries at the top which need to be */ 5766 /* expired. */ 5767 /* ------------------------------------------------------------------------ */ 5768 void ipf_nat_expire(ipf_main_softc_t * softc)5769 ipf_nat_expire(ipf_main_softc_t *softc) 5770 { 5771 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 5772 ipftq_t *ifq, *ifqnext; 5773 ipftqent_t *tqe, *tqn; 5774 int i; 5775 SPL_INT(s); 5776 5777 SPL_NET(s); 5778 WRITE_ENTER(&softc->ipf_nat); 5779 for (ifq = softn->ipf_nat_tcptq, i = 0; ifq != NULL; 5780 ifq = ifq->ifq_next) { 5781 for (tqn = ifq->ifq_head; ((tqe = tqn) != NULL); i++) { 5782 if (tqe->tqe_die > softc->ipf_ticks) 5783 break; 5784 tqn = tqe->tqe_next; 5785 ipf_nat_delete(softc, tqe->tqe_parent, NL_EXPIRE); 5786 } 5787 } 5788 5789 for (ifq = softn->ipf_nat_utqe; ifq != NULL; ifq = ifq->ifq_next) { 5790 for (tqn = ifq->ifq_head; ((tqe = tqn) != NULL); i++) { 5791 if (tqe->tqe_die > softc->ipf_ticks) 5792 break; 5793 tqn = tqe->tqe_next; 5794 ipf_nat_delete(softc, tqe->tqe_parent, NL_EXPIRE); 5795 } 5796 } 5797 5798 for (ifq = softn->ipf_nat_utqe; ifq != NULL; ifq = ifqnext) { 5799 ifqnext = ifq->ifq_next; 5800 5801 if (((ifq->ifq_flags & IFQF_DELETE) != 0) && 5802 (ifq->ifq_ref == 0)) { 5803 ipf_freetimeoutqueue(softc, ifq); 5804 } 5805 } 5806 5807 if (softn->ipf_nat_doflush != 0) { 5808 ipf_nat_extraflush(softc, softn, 2); 5809 softn->ipf_nat_doflush = 0; 5810 } 5811 5812 RWLOCK_EXIT(&softc->ipf_nat); 5813 SPL_X(s); 5814 } 5815 5816 5817 /* ------------------------------------------------------------------------ */ 5818 /* Function: ipf_nat_sync */ 5819 /* Returns: Nil */ 5820 /* Parameters: softc(I) - pointer to soft context main structure */ 5821 /* ifp(I) - pointer to network interface */ 5822 /* */ 5823 /* Walk through all of the currently active NAT sessions, looking for those */ 5824 /* which need to have their translated address updated. */ 5825 /* ------------------------------------------------------------------------ */ 5826 void ipf_nat_sync(ipf_main_softc_t * softc,void * ifp)5827 ipf_nat_sync(ipf_main_softc_t *softc, void *ifp) 5828 { 5829 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 5830 u_32_t sum1, sum2, sumd; 5831 i6addr_t in; 5832 ipnat_t *n; 5833 nat_t *nat; 5834 void *ifp2; 5835 int idx; 5836 SPL_INT(s); 5837 5838 if (softc->ipf_running <= 0) 5839 return; 5840 5841 /* 5842 * Change IP addresses for NAT sessions for any protocol except TCP 5843 * since it will break the TCP connection anyway. The only rules 5844 * which will get changed are those which are "map ... -> 0/32", 5845 * where the rule specifies the address is taken from the interface. 5846 */ 5847 SPL_NET(s); 5848 WRITE_ENTER(&softc->ipf_nat); 5849 5850 if (softc->ipf_running <= 0) { 5851 RWLOCK_EXIT(&softc->ipf_nat); 5852 return; 5853 } 5854 5855 for (nat = softn->ipf_nat_instances; nat; nat = nat->nat_next) { 5856 if ((nat->nat_flags & IPN_TCP) != 0) 5857 continue; 5858 5859 n = nat->nat_ptr; 5860 if (n != NULL) { 5861 if (n->in_v[1] == 4) { 5862 if (n->in_redir & NAT_MAP) { 5863 if ((n->in_nsrcaddr != 0) || 5864 (n->in_nsrcmsk != 0xffffffff)) 5865 continue; 5866 } else if (n->in_redir & NAT_REDIRECT) { 5867 if ((n->in_ndstaddr != 0) || 5868 (n->in_ndstmsk != 0xffffffff)) 5869 continue; 5870 } 5871 } 5872 #ifdef USE_INET6 5873 if (n->in_v[1] == 4) { 5874 if (n->in_redir & NAT_MAP) { 5875 if (!IP6_ISZERO(&n->in_nsrcaddr) || 5876 !IP6_ISONES(&n->in_nsrcmsk)) 5877 continue; 5878 } else if (n->in_redir & NAT_REDIRECT) { 5879 if (!IP6_ISZERO(&n->in_ndstaddr) || 5880 !IP6_ISONES(&n->in_ndstmsk)) 5881 continue; 5882 } 5883 } 5884 #endif 5885 } 5886 5887 if (((ifp == NULL) || (ifp == nat->nat_ifps[0]) || 5888 (ifp == nat->nat_ifps[1]))) { 5889 nat->nat_ifps[0] = GETIFP(nat->nat_ifnames[0], 5890 nat->nat_v[0]); 5891 if ((nat->nat_ifps[0] != NULL) && 5892 (nat->nat_ifps[0] != (void *)-1)) { 5893 nat->nat_mtu[0] = GETIFMTU_4(nat->nat_ifps[0]); 5894 } 5895 if (nat->nat_ifnames[1][0] != '\0') { 5896 nat->nat_ifps[1] = GETIFP(nat->nat_ifnames[1], 5897 nat->nat_v[1]); 5898 } else { 5899 nat->nat_ifps[1] = nat->nat_ifps[0]; 5900 } 5901 if ((nat->nat_ifps[1] != NULL) && 5902 (nat->nat_ifps[1] != (void *)-1)) { 5903 nat->nat_mtu[1] = GETIFMTU_4(nat->nat_ifps[1]); 5904 } 5905 ifp2 = nat->nat_ifps[0]; 5906 if (ifp2 == NULL) 5907 continue; 5908 5909 /* 5910 * Change the map-to address to be the same as the 5911 * new one. 5912 */ 5913 sum1 = NATFSUM(nat, nat->nat_v[1], nat_nsrc6); 5914 if (ipf_ifpaddr(softc, nat->nat_v[0], FRI_NORMAL, ifp2, 5915 &in, NULL) != -1) { 5916 if (nat->nat_v[0] == 4) 5917 nat->nat_nsrcip = in.in4; 5918 } 5919 sum2 = NATFSUM(nat, nat->nat_v[1], nat_nsrc6); 5920 5921 if (sum1 == sum2) 5922 continue; 5923 /* 5924 * Readjust the checksum adjustment to take into 5925 * account the new IP#. 5926 */ 5927 CALC_SUMD(sum1, sum2, sumd); 5928 /* XXX - dont change for TCP when solaris does 5929 * hardware checksumming. 5930 */ 5931 sumd += nat->nat_sumd[0]; 5932 nat->nat_sumd[0] = (sumd & 0xffff) + (sumd >> 16); 5933 nat->nat_sumd[1] = nat->nat_sumd[0]; 5934 } 5935 } 5936 5937 for (n = softn->ipf_nat_list; (n != NULL); n = n->in_next) { 5938 char *base = n->in_names; 5939 5940 if ((ifp == NULL) || (n->in_ifps[0] == ifp)) 5941 n->in_ifps[0] = ipf_resolvenic(softc, 5942 base + n->in_ifnames[0], 5943 n->in_v[0]); 5944 if ((ifp == NULL) || (n->in_ifps[1] == ifp)) 5945 n->in_ifps[1] = ipf_resolvenic(softc, 5946 base + n->in_ifnames[1], 5947 n->in_v[1]); 5948 5949 if (n->in_redir & NAT_REDIRECT) 5950 idx = 1; 5951 else 5952 idx = 0; 5953 5954 if (((ifp == NULL) || (n->in_ifps[idx] == ifp)) && 5955 (n->in_ifps[idx] != NULL && 5956 n->in_ifps[idx] != (void *)-1)) { 5957 5958 ipf_nat_nextaddrinit(softc, n->in_names, &n->in_osrc, 5959 0, n->in_ifps[idx]); 5960 ipf_nat_nextaddrinit(softc, n->in_names, &n->in_odst, 5961 0, n->in_ifps[idx]); 5962 ipf_nat_nextaddrinit(softc, n->in_names, &n->in_nsrc, 5963 0, n->in_ifps[idx]); 5964 ipf_nat_nextaddrinit(softc, n->in_names, &n->in_ndst, 5965 0, n->in_ifps[idx]); 5966 } 5967 } 5968 RWLOCK_EXIT(&softc->ipf_nat); 5969 SPL_X(s); 5970 } 5971 5972 5973 /* ------------------------------------------------------------------------ */ 5974 /* Function: ipf_nat_icmpquerytype */ 5975 /* Returns: int - 1 == success, 0 == failure */ 5976 /* Parameters: icmptype(I) - ICMP type number */ 5977 /* */ 5978 /* Tests to see if the ICMP type number passed is a query/response type or */ 5979 /* not. */ 5980 /* ------------------------------------------------------------------------ */ 5981 static int ipf_nat_icmpquerytype(int icmptype)5982 ipf_nat_icmpquerytype(int icmptype) 5983 { 5984 5985 /* 5986 * For the ICMP query NAT code, it is essential that both the query 5987 * and the reply match on the NAT rule. Because the NAT structure 5988 * does not keep track of the icmptype, and a single NAT structure 5989 * is used for all icmp types with the same src, dest and id, we 5990 * simply define the replies as queries as well. The funny thing is, 5991 * altough it seems silly to call a reply a query, this is exactly 5992 * as it is defined in the IPv4 specification 5993 */ 5994 switch (icmptype) 5995 { 5996 case ICMP_ECHOREPLY: 5997 case ICMP_ECHO: 5998 /* route advertisement/solicitation is currently unsupported: */ 5999 /* it would require rewriting the ICMP data section */ 6000 case ICMP_TSTAMP: 6001 case ICMP_TSTAMPREPLY: 6002 case ICMP_IREQ: 6003 case ICMP_IREQREPLY: 6004 case ICMP_MASKREQ: 6005 case ICMP_MASKREPLY: 6006 return (1); 6007 default: 6008 return (0); 6009 } 6010 } 6011 6012 6013 /* ------------------------------------------------------------------------ */ 6014 /* Function: nat_log */ 6015 /* Returns: Nil */ 6016 /* Parameters: softc(I) - pointer to soft context main structure */ 6017 /* softn(I) - pointer to NAT context structure */ 6018 /* nat(I) - pointer to NAT structure */ 6019 /* action(I) - action related to NAT structure being performed */ 6020 /* */ 6021 /* Creates a NAT log entry. */ 6022 /* ------------------------------------------------------------------------ */ 6023 void ipf_nat_log(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,struct nat * nat,u_int action)6024 ipf_nat_log(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, struct nat *nat, 6025 u_int action) 6026 { 6027 #ifdef IPFILTER_LOG 6028 struct ipnat *np; 6029 int rulen; 6030 struct natlog natl; 6031 void *items[1]; 6032 size_t sizes[1]; 6033 int types[1]; 6034 6035 bcopy((char *)&nat->nat_osrc6, (char *)&natl.nl_osrcip, 6036 sizeof(natl.nl_osrcip)); 6037 bcopy((char *)&nat->nat_nsrc6, (char *)&natl.nl_nsrcip, 6038 sizeof(natl.nl_nsrcip)); 6039 bcopy((char *)&nat->nat_odst6, (char *)&natl.nl_odstip, 6040 sizeof(natl.nl_odstip)); 6041 bcopy((char *)&nat->nat_ndst6, (char *)&natl.nl_ndstip, 6042 sizeof(natl.nl_ndstip)); 6043 6044 natl.nl_bytes[0] = nat->nat_bytes[0]; 6045 natl.nl_bytes[1] = nat->nat_bytes[1]; 6046 natl.nl_pkts[0] = nat->nat_pkts[0]; 6047 natl.nl_pkts[1] = nat->nat_pkts[1]; 6048 natl.nl_odstport = nat->nat_odport; 6049 natl.nl_osrcport = nat->nat_osport; 6050 natl.nl_nsrcport = nat->nat_nsport; 6051 natl.nl_ndstport = nat->nat_ndport; 6052 natl.nl_p[0] = nat->nat_pr[0]; 6053 natl.nl_p[1] = nat->nat_pr[1]; 6054 natl.nl_v[0] = nat->nat_v[0]; 6055 natl.nl_v[1] = nat->nat_v[1]; 6056 natl.nl_type = nat->nat_redir; 6057 natl.nl_action = action; 6058 natl.nl_rule = -1; 6059 6060 bcopy(nat->nat_ifnames[0], natl.nl_ifnames[0], 6061 sizeof(nat->nat_ifnames[0])); 6062 bcopy(nat->nat_ifnames[1], natl.nl_ifnames[1], 6063 sizeof(nat->nat_ifnames[1])); 6064 6065 if (softc->ipf_large_nat && nat->nat_ptr != NULL) { 6066 for (rulen = 0, np = softn->ipf_nat_list; np != NULL; 6067 np = np->in_next, rulen++) 6068 if (np == nat->nat_ptr) { 6069 natl.nl_rule = rulen; 6070 break; 6071 } 6072 } 6073 items[0] = &natl; 6074 sizes[0] = sizeof(natl); 6075 types[0] = 0; 6076 6077 (void) ipf_log_items(softc, IPL_LOGNAT, NULL, items, sizes, types, 1); 6078 #endif 6079 } 6080 6081 6082 6083 6084 /* ------------------------------------------------------------------------ */ 6085 /* Function: ipf_nat_rule_deref */ 6086 /* Returns: Nil */ 6087 /* Parameters: softc(I) - pointer to soft context main structure */ 6088 /* inp(I) - pointer to pointer to NAT rule */ 6089 /* Write Locks: ipf_nat */ 6090 /* */ 6091 /* Dropping the refernce count for a rule means that whatever held the */ 6092 /* pointer to this rule (*inp) is no longer interested in it and when the */ 6093 /* reference count drops to zero, any resources allocated for the rule can */ 6094 /* be released and the rule itself free'd. */ 6095 /* ------------------------------------------------------------------------ */ 6096 void ipf_nat_rule_deref(ipf_main_softc_t * softc,ipnat_t ** inp)6097 ipf_nat_rule_deref(ipf_main_softc_t *softc, ipnat_t **inp) 6098 { 6099 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 6100 ipnat_t *n; 6101 6102 n = *inp; 6103 *inp = NULL; 6104 n->in_use--; 6105 if (n->in_use > 0) 6106 return; 6107 6108 if (n->in_apr != NULL) 6109 ipf_proxy_deref(n->in_apr); 6110 6111 ipf_nat_rule_fini(softc, n); 6112 6113 if (n->in_redir & NAT_REDIRECT) { 6114 if ((n->in_flags & IPN_PROXYRULE) == 0) { 6115 ATOMIC_DEC32(softn->ipf_nat_stats.ns_rules_rdr); 6116 } 6117 } 6118 if (n->in_redir & (NAT_MAP|NAT_MAPBLK)) { 6119 if ((n->in_flags & IPN_PROXYRULE) == 0) { 6120 ATOMIC_DEC32(softn->ipf_nat_stats.ns_rules_map); 6121 } 6122 } 6123 6124 if (n->in_tqehead[0] != NULL) { 6125 if (ipf_deletetimeoutqueue(n->in_tqehead[0]) == 0) { 6126 ipf_freetimeoutqueue(softc, n->in_tqehead[0]); 6127 } 6128 } 6129 6130 if (n->in_tqehead[1] != NULL) { 6131 if (ipf_deletetimeoutqueue(n->in_tqehead[1]) == 0) { 6132 ipf_freetimeoutqueue(softc, n->in_tqehead[1]); 6133 } 6134 } 6135 6136 if ((n->in_flags & IPN_PROXYRULE) == 0) { 6137 ATOMIC_DEC32(softn->ipf_nat_stats.ns_rules); 6138 } 6139 6140 MUTEX_DESTROY(&n->in_lock); 6141 6142 KFREES(n, n->in_size); 6143 6144 #if SOLARIS && !defined(INSTANCES) 6145 if (softn->ipf_nat_stats.ns_rules == 0) 6146 pfil_delayed_copy = 1; 6147 #endif 6148 } 6149 6150 6151 /* ------------------------------------------------------------------------ */ 6152 /* Function: ipf_nat_deref */ 6153 /* Returns: Nil */ 6154 /* Parameters: softc(I) - pointer to soft context main structure */ 6155 /* natp(I) - pointer to pointer to NAT table entry */ 6156 /* */ 6157 /* Decrement the reference counter for this NAT table entry and free it if */ 6158 /* there are no more things using it. */ 6159 /* */ 6160 /* IF nat_ref == 1 when this function is called, then we have an orphan nat */ 6161 /* structure *because* it only gets called on paths _after_ nat_ref has been*/ 6162 /* incremented. If nat_ref == 1 then we shouldn't decrement it here */ 6163 /* because nat_delete() will do that and send nat_ref to -1. */ 6164 /* */ 6165 /* Holding the lock on nat_lock is required to serialise nat_delete() being */ 6166 /* called from a NAT flush ioctl with a deref happening because of a packet.*/ 6167 /* ------------------------------------------------------------------------ */ 6168 void ipf_nat_deref(ipf_main_softc_t * softc,nat_t ** natp)6169 ipf_nat_deref(ipf_main_softc_t *softc, nat_t **natp) 6170 { 6171 nat_t *nat; 6172 6173 nat = *natp; 6174 *natp = NULL; 6175 6176 MUTEX_ENTER(&nat->nat_lock); 6177 if (nat->nat_ref > 1) { 6178 nat->nat_ref--; 6179 ASSERT(nat->nat_ref >= 0); 6180 MUTEX_EXIT(&nat->nat_lock); 6181 return; 6182 } 6183 MUTEX_EXIT(&nat->nat_lock); 6184 6185 WRITE_ENTER(&softc->ipf_nat); 6186 ipf_nat_delete(softc, nat, NL_EXPIRE); 6187 RWLOCK_EXIT(&softc->ipf_nat); 6188 } 6189 6190 6191 /* ------------------------------------------------------------------------ */ 6192 /* Function: ipf_nat_clone */ 6193 /* Returns: ipstate_t* - NULL == cloning failed, */ 6194 /* else pointer to new state structure */ 6195 /* Parameters: fin(I) - pointer to packet information */ 6196 /* is(I) - pointer to master state structure */ 6197 /* Write Lock: ipf_nat */ 6198 /* */ 6199 /* Create a "duplcate" state table entry from the master. */ 6200 /* ------------------------------------------------------------------------ */ 6201 nat_t * ipf_nat_clone(fr_info_t * fin,nat_t * nat)6202 ipf_nat_clone(fr_info_t *fin, nat_t *nat) 6203 { 6204 ipf_main_softc_t *softc = fin->fin_main_soft; 6205 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 6206 frentry_t *fr; 6207 nat_t *clone; 6208 ipnat_t *np; 6209 6210 KMALLOC(clone, nat_t *); 6211 if (clone == NULL) { 6212 NBUMPSIDED(fin->fin_out, ns_clone_nomem); 6213 return (NULL); 6214 } 6215 bcopy((char *)nat, (char *)clone, sizeof(*clone)); 6216 6217 MUTEX_NUKE(&clone->nat_lock); 6218 6219 clone->nat_rev = fin->fin_rev; 6220 clone->nat_aps = NULL; 6221 /* 6222 * Initialize all these so that ipf_nat_delete() doesn't cause a crash. 6223 */ 6224 clone->nat_tqe.tqe_pnext = NULL; 6225 clone->nat_tqe.tqe_next = NULL; 6226 clone->nat_tqe.tqe_ifq = NULL; 6227 clone->nat_tqe.tqe_parent = clone; 6228 6229 clone->nat_flags &= ~SI_CLONE; 6230 clone->nat_flags |= SI_CLONED; 6231 6232 if (clone->nat_hm) 6233 clone->nat_hm->hm_ref++; 6234 6235 if (ipf_nat_insert(softc, softn, clone) == -1) { 6236 KFREE(clone); 6237 NBUMPSIDED(fin->fin_out, ns_insert_fail); 6238 return (NULL); 6239 } 6240 6241 np = clone->nat_ptr; 6242 if (np != NULL) { 6243 if (softn->ipf_nat_logging) 6244 ipf_nat_log(softc, softn, clone, NL_CLONE); 6245 np->in_use++; 6246 } 6247 fr = clone->nat_fr; 6248 if (fr != NULL) { 6249 MUTEX_ENTER(&fr->fr_lock); 6250 fr->fr_ref++; 6251 MUTEX_EXIT(&fr->fr_lock); 6252 } 6253 6254 6255 /* 6256 * Because the clone is created outside the normal loop of things and 6257 * TCP has special needs in terms of state, initialise the timeout 6258 * state of the new NAT from here. 6259 */ 6260 if (clone->nat_pr[0] == IPPROTO_TCP) { 6261 (void) ipf_tcp_age(&clone->nat_tqe, fin, softn->ipf_nat_tcptq, 6262 clone->nat_flags, 2); 6263 } 6264 clone->nat_sync = ipf_sync_new(softc, SMC_NAT, fin, clone); 6265 if (softn->ipf_nat_logging) 6266 ipf_nat_log(softc, softn, clone, NL_CLONE); 6267 return (clone); 6268 } 6269 6270 6271 /* ------------------------------------------------------------------------ */ 6272 /* Function: ipf_nat_wildok */ 6273 /* Returns: int - 1 == packet's ports match wildcards */ 6274 /* 0 == packet's ports don't match wildcards */ 6275 /* Parameters: nat(I) - NAT entry */ 6276 /* sport(I) - source port */ 6277 /* dport(I) - destination port */ 6278 /* flags(I) - wildcard flags */ 6279 /* dir(I) - packet direction */ 6280 /* */ 6281 /* Use NAT entry and packet direction to determine which combination of */ 6282 /* wildcard flags should be used. */ 6283 /* ------------------------------------------------------------------------ */ 6284 int ipf_nat_wildok(nat_t * nat,int sport,int dport,int flags,int dir)6285 ipf_nat_wildok(nat_t *nat, int sport, int dport, int flags, int dir) 6286 { 6287 /* 6288 * When called by dir is set to 6289 * nat_inlookup NAT_INBOUND (0) 6290 * nat_outlookup NAT_OUTBOUND (1) 6291 * 6292 * We simply combine the packet's direction in dir with the original 6293 * "intended" direction of that NAT entry in nat->nat_dir to decide 6294 * which combination of wildcard flags to allow. 6295 */ 6296 switch ((dir << 1) | (nat->nat_dir & (NAT_INBOUND|NAT_OUTBOUND))) 6297 { 6298 case 3: /* outbound packet / outbound entry */ 6299 if (((nat->nat_osport == sport) || 6300 (flags & SI_W_SPORT)) && 6301 ((nat->nat_odport == dport) || 6302 (flags & SI_W_DPORT))) 6303 return (1); 6304 break; 6305 case 2: /* outbound packet / inbound entry */ 6306 if (((nat->nat_osport == dport) || 6307 (flags & SI_W_SPORT)) && 6308 ((nat->nat_odport == sport) || 6309 (flags & SI_W_DPORT))) 6310 return (1); 6311 break; 6312 case 1: /* inbound packet / outbound entry */ 6313 if (((nat->nat_osport == dport) || 6314 (flags & SI_W_SPORT)) && 6315 ((nat->nat_odport == sport) || 6316 (flags & SI_W_DPORT))) 6317 return (1); 6318 break; 6319 case 0: /* inbound packet / inbound entry */ 6320 if (((nat->nat_osport == sport) || 6321 (flags & SI_W_SPORT)) && 6322 ((nat->nat_odport == dport) || 6323 (flags & SI_W_DPORT))) 6324 return (1); 6325 break; 6326 default: 6327 break; 6328 } 6329 6330 return (0); 6331 } 6332 6333 6334 /* ------------------------------------------------------------------------ */ 6335 /* Function: nat_mssclamp */ 6336 /* Returns: Nil */ 6337 /* Parameters: tcp(I) - pointer to TCP header */ 6338 /* maxmss(I) - value to clamp the TCP MSS to */ 6339 /* fin(I) - pointer to packet information */ 6340 /* csump(I) - pointer to TCP checksum */ 6341 /* */ 6342 /* Check for MSS option and clamp it if necessary. If found and changed, */ 6343 /* then the TCP header checksum will be updated to reflect the change in */ 6344 /* the MSS. */ 6345 /* ------------------------------------------------------------------------ */ 6346 static void ipf_nat_mssclamp(tcphdr_t * tcp,u_32_t maxmss,fr_info_t * fin,u_short * csump)6347 ipf_nat_mssclamp(tcphdr_t *tcp, u_32_t maxmss, fr_info_t *fin, u_short *csump) 6348 { 6349 u_char *cp, *ep, opt; 6350 int hlen, advance; 6351 u_32_t mss, sumd; 6352 6353 hlen = TCP_OFF(tcp) << 2; 6354 if (hlen > sizeof(*tcp)) { 6355 cp = (u_char *)tcp + sizeof(*tcp); 6356 ep = (u_char *)tcp + hlen; 6357 6358 while (cp < ep) { 6359 opt = cp[0]; 6360 if (opt == TCPOPT_EOL) 6361 break; 6362 else if (opt == TCPOPT_NOP) { 6363 cp++; 6364 continue; 6365 } 6366 6367 if (cp + 1 >= ep) 6368 break; 6369 advance = cp[1]; 6370 if ((cp + advance > ep) || (advance <= 0)) 6371 break; 6372 switch (opt) 6373 { 6374 case TCPOPT_MAXSEG: 6375 if (advance != 4) 6376 break; 6377 mss = cp[2] * 256 + cp[3]; 6378 if (mss > maxmss) { 6379 cp[2] = maxmss / 256; 6380 cp[3] = maxmss & 0xff; 6381 CALC_SUMD(mss, maxmss, sumd); 6382 ipf_fix_outcksum(0, csump, sumd, 0); 6383 } 6384 break; 6385 default: 6386 /* ignore unknown options */ 6387 break; 6388 } 6389 6390 cp += advance; 6391 } 6392 } 6393 } 6394 6395 6396 /* ------------------------------------------------------------------------ */ 6397 /* Function: ipf_nat_setqueue */ 6398 /* Returns: Nil */ 6399 /* Parameters: softc(I) - pointer to soft context main structure */ 6400 /* softn(I) - pointer to NAT context structure */ 6401 /* nat(I)- pointer to NAT structure */ 6402 /* Locks: ipf_nat (read or write) */ 6403 /* */ 6404 /* Put the NAT entry on its default queue entry, using rev as a helped in */ 6405 /* determining which queue it should be placed on. */ 6406 /* ------------------------------------------------------------------------ */ 6407 void ipf_nat_setqueue(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,nat_t * nat)6408 ipf_nat_setqueue(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, nat_t *nat) 6409 { 6410 ipftq_t *oifq, *nifq; 6411 int rev = nat->nat_rev; 6412 6413 if (nat->nat_ptr != NULL) 6414 nifq = nat->nat_ptr->in_tqehead[rev]; 6415 else 6416 nifq = NULL; 6417 6418 if (nifq == NULL) { 6419 switch (nat->nat_pr[0]) 6420 { 6421 case IPPROTO_UDP : 6422 nifq = &softn->ipf_nat_udptq; 6423 break; 6424 case IPPROTO_ICMP : 6425 nifq = &softn->ipf_nat_icmptq; 6426 break; 6427 case IPPROTO_TCP : 6428 nifq = softn->ipf_nat_tcptq + 6429 nat->nat_tqe.tqe_state[rev]; 6430 break; 6431 default : 6432 nifq = &softn->ipf_nat_iptq; 6433 break; 6434 } 6435 } 6436 6437 oifq = nat->nat_tqe.tqe_ifq; 6438 /* 6439 * If it's currently on a timeout queue, move it from one queue to 6440 * another, else put it on the end of the newly determined queue. 6441 */ 6442 if (oifq != NULL) 6443 ipf_movequeue(softc->ipf_ticks, &nat->nat_tqe, oifq, nifq); 6444 else 6445 ipf_queueappend(softc->ipf_ticks, &nat->nat_tqe, nifq, nat); 6446 return; 6447 } 6448 6449 6450 /* ------------------------------------------------------------------------ */ 6451 /* Function: nat_getnext */ 6452 /* Returns: int - 0 == ok, else error */ 6453 /* Parameters: softc(I) - pointer to soft context main structure */ 6454 /* t(I) - pointer to ipftoken structure */ 6455 /* itp(I) - pointer to ipfgeniter_t structure */ 6456 /* */ 6457 /* Fetch the next nat/ipnat structure pointer from the linked list and */ 6458 /* copy it out to the storage space pointed to by itp_data. The next item */ 6459 /* in the list to look at is put back in the ipftoken struture. */ 6460 /* ------------------------------------------------------------------------ */ 6461 static int ipf_nat_getnext(ipf_main_softc_t * softc,ipftoken_t * t,ipfgeniter_t * itp,ipfobj_t * objp)6462 ipf_nat_getnext(ipf_main_softc_t *softc, ipftoken_t *t, ipfgeniter_t *itp, 6463 ipfobj_t *objp) 6464 { 6465 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 6466 hostmap_t *hm, *nexthm = NULL, zerohm; 6467 ipnat_t *ipn, *nextipnat = NULL, zeroipn; 6468 nat_t *nat, *nextnat = NULL, zeronat; 6469 int error = 0; 6470 void *nnext; 6471 6472 if (itp->igi_nitems != 1) { 6473 IPFERROR(60075); 6474 return (ENOSPC); 6475 } 6476 6477 READ_ENTER(&softc->ipf_nat); 6478 6479 switch (itp->igi_type) 6480 { 6481 case IPFGENITER_HOSTMAP : 6482 hm = t->ipt_data; 6483 if (hm == NULL) { 6484 nexthm = softn->ipf_hm_maplist; 6485 } else { 6486 nexthm = hm->hm_next; 6487 } 6488 if (nexthm != NULL) { 6489 ATOMIC_INC32(nexthm->hm_ref); 6490 t->ipt_data = nexthm; 6491 } else { 6492 bzero(&zerohm, sizeof(zerohm)); 6493 nexthm = &zerohm; 6494 t->ipt_data = NULL; 6495 } 6496 nnext = nexthm->hm_next; 6497 break; 6498 6499 case IPFGENITER_IPNAT : 6500 ipn = t->ipt_data; 6501 if (ipn == NULL) { 6502 nextipnat = softn->ipf_nat_list; 6503 } else { 6504 nextipnat = ipn->in_next; 6505 } 6506 if (nextipnat != NULL) { 6507 ATOMIC_INC32(nextipnat->in_use); 6508 t->ipt_data = nextipnat; 6509 } else { 6510 bzero(&zeroipn, sizeof(zeroipn)); 6511 nextipnat = &zeroipn; 6512 t->ipt_data = NULL; 6513 } 6514 nnext = nextipnat->in_next; 6515 break; 6516 6517 case IPFGENITER_NAT : 6518 nat = t->ipt_data; 6519 if (nat == NULL) { 6520 nextnat = softn->ipf_nat_instances; 6521 } else { 6522 nextnat = nat->nat_next; 6523 } 6524 if (nextnat != NULL) { 6525 MUTEX_ENTER(&nextnat->nat_lock); 6526 nextnat->nat_ref++; 6527 MUTEX_EXIT(&nextnat->nat_lock); 6528 t->ipt_data = nextnat; 6529 } else { 6530 bzero(&zeronat, sizeof(zeronat)); 6531 nextnat = &zeronat; 6532 t->ipt_data = NULL; 6533 } 6534 nnext = nextnat->nat_next; 6535 break; 6536 6537 default : 6538 RWLOCK_EXIT(&softc->ipf_nat); 6539 IPFERROR(60055); 6540 return (EINVAL); 6541 } 6542 6543 RWLOCK_EXIT(&softc->ipf_nat); 6544 6545 objp->ipfo_ptr = itp->igi_data; 6546 6547 switch (itp->igi_type) 6548 { 6549 case IPFGENITER_HOSTMAP : 6550 error = COPYOUT(nexthm, objp->ipfo_ptr, sizeof(*nexthm)); 6551 if (error != 0) { 6552 IPFERROR(60049); 6553 error = EFAULT; 6554 } 6555 if (hm != NULL) { 6556 WRITE_ENTER(&softc->ipf_nat); 6557 ipf_nat_hostmapdel(softc, &hm); 6558 RWLOCK_EXIT(&softc->ipf_nat); 6559 } 6560 break; 6561 6562 case IPFGENITER_IPNAT : 6563 objp->ipfo_size = nextipnat->in_size; 6564 objp->ipfo_type = IPFOBJ_IPNAT; 6565 error = ipf_outobjk(softc, objp, nextipnat); 6566 if (ipn != NULL) { 6567 WRITE_ENTER(&softc->ipf_nat); 6568 ipf_nat_rule_deref(softc, &ipn); 6569 RWLOCK_EXIT(&softc->ipf_nat); 6570 } 6571 break; 6572 6573 case IPFGENITER_NAT : 6574 objp->ipfo_size = sizeof(nat_t); 6575 objp->ipfo_type = IPFOBJ_NAT; 6576 error = ipf_outobjk(softc, objp, nextnat); 6577 if (nat != NULL) 6578 ipf_nat_deref(softc, &nat); 6579 6580 break; 6581 } 6582 6583 if (nnext == NULL) 6584 ipf_token_mark_complete(t); 6585 6586 return (error); 6587 } 6588 6589 6590 /* ------------------------------------------------------------------------ */ 6591 /* Function: nat_extraflush */ 6592 /* Returns: int - 0 == success, -1 == failure */ 6593 /* Parameters: softc(I) - pointer to soft context main structure */ 6594 /* softn(I) - pointer to NAT context structure */ 6595 /* which(I) - how to flush the active NAT table */ 6596 /* Write Locks: ipf_nat */ 6597 /* */ 6598 /* Flush nat tables. Three actions currently defined: */ 6599 /* which == 0 : flush all nat table entries */ 6600 /* which == 1 : flush TCP connections which have started to close but are */ 6601 /* stuck for some reason. */ 6602 /* which == 2 : flush TCP connections which have been idle for a long time, */ 6603 /* starting at > 4 days idle and working back in successive half-*/ 6604 /* days to at most 12 hours old. If this fails to free enough */ 6605 /* slots then work backwards in half hour slots to 30 minutes. */ 6606 /* If that too fails, then work backwards in 30 second intervals */ 6607 /* for the last 30 minutes to at worst 30 seconds idle. */ 6608 /* ------------------------------------------------------------------------ */ 6609 static int ipf_nat_extraflush(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,int which)6610 ipf_nat_extraflush(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, int which) 6611 { 6612 nat_t *nat, **natp; 6613 ipftqent_t *tqn; 6614 ipftq_t *ifq; 6615 int removed; 6616 SPL_INT(s); 6617 6618 removed = 0; 6619 6620 SPL_NET(s); 6621 switch (which) 6622 { 6623 case 0 : 6624 softn->ipf_nat_stats.ns_flush_all++; 6625 /* 6626 * Style 0 flush removes everything... 6627 */ 6628 for (natp = &softn->ipf_nat_instances; 6629 ((nat = *natp) != NULL); ) { 6630 ipf_nat_delete(softc, nat, NL_FLUSH); 6631 removed++; 6632 } 6633 break; 6634 6635 case 1 : 6636 softn->ipf_nat_stats.ns_flush_closing++; 6637 /* 6638 * Since we're only interested in things that are closing, 6639 * we can start with the appropriate timeout queue. 6640 */ 6641 for (ifq = softn->ipf_nat_tcptq + IPF_TCPS_CLOSE_WAIT; 6642 ifq != NULL; ifq = ifq->ifq_next) { 6643 6644 for (tqn = ifq->ifq_head; tqn != NULL; ) { 6645 nat = tqn->tqe_parent; 6646 tqn = tqn->tqe_next; 6647 if (nat->nat_pr[0] != IPPROTO_TCP || 6648 nat->nat_pr[1] != IPPROTO_TCP) 6649 break; 6650 ipf_nat_delete(softc, nat, NL_EXPIRE); 6651 removed++; 6652 } 6653 } 6654 6655 /* 6656 * Also need to look through the user defined queues. 6657 */ 6658 for (ifq = softn->ipf_nat_utqe; ifq != NULL; 6659 ifq = ifq->ifq_next) { 6660 for (tqn = ifq->ifq_head; tqn != NULL; ) { 6661 nat = tqn->tqe_parent; 6662 tqn = tqn->tqe_next; 6663 if (nat->nat_pr[0] != IPPROTO_TCP || 6664 nat->nat_pr[1] != IPPROTO_TCP) 6665 continue; 6666 6667 if ((nat->nat_tcpstate[0] > 6668 IPF_TCPS_ESTABLISHED) && 6669 (nat->nat_tcpstate[1] > 6670 IPF_TCPS_ESTABLISHED)) { 6671 ipf_nat_delete(softc, nat, NL_EXPIRE); 6672 removed++; 6673 } 6674 } 6675 } 6676 break; 6677 6678 /* 6679 * Args 5-11 correspond to flushing those particular states 6680 * for TCP connections. 6681 */ 6682 case IPF_TCPS_CLOSE_WAIT : 6683 case IPF_TCPS_FIN_WAIT_1 : 6684 case IPF_TCPS_CLOSING : 6685 case IPF_TCPS_LAST_ACK : 6686 case IPF_TCPS_FIN_WAIT_2 : 6687 case IPF_TCPS_TIME_WAIT : 6688 case IPF_TCPS_CLOSED : 6689 softn->ipf_nat_stats.ns_flush_state++; 6690 tqn = softn->ipf_nat_tcptq[which].ifq_head; 6691 while (tqn != NULL) { 6692 nat = tqn->tqe_parent; 6693 tqn = tqn->tqe_next; 6694 ipf_nat_delete(softc, nat, NL_FLUSH); 6695 removed++; 6696 } 6697 break; 6698 6699 default : 6700 if (which < 30) 6701 break; 6702 6703 softn->ipf_nat_stats.ns_flush_timeout++; 6704 /* 6705 * Take a large arbitrary number to mean the number of seconds 6706 * for which which consider to be the maximum value we'll allow 6707 * the expiration to be. 6708 */ 6709 which = IPF_TTLVAL(which); 6710 for (natp = &softn->ipf_nat_instances; 6711 ((nat = *natp) != NULL); ) { 6712 if (softc->ipf_ticks - nat->nat_touched > which) { 6713 ipf_nat_delete(softc, nat, NL_FLUSH); 6714 removed++; 6715 } else 6716 natp = &nat->nat_next; 6717 } 6718 break; 6719 } 6720 6721 if (which != 2) { 6722 SPL_X(s); 6723 return (removed); 6724 } 6725 6726 softn->ipf_nat_stats.ns_flush_queue++; 6727 6728 /* 6729 * Asked to remove inactive entries because the table is full, try 6730 * again, 3 times, if first attempt failed with a different criteria 6731 * each time. The order tried in must be in decreasing age. 6732 * Another alternative is to implement random drop and drop N entries 6733 * at random until N have been freed up. 6734 */ 6735 if (softc->ipf_ticks - softn->ipf_nat_last_force_flush > 6736 IPF_TTLVAL(5)) { 6737 softn->ipf_nat_last_force_flush = softc->ipf_ticks; 6738 6739 removed = ipf_queueflush(softc, ipf_nat_flush_entry, 6740 softn->ipf_nat_tcptq, 6741 softn->ipf_nat_utqe, 6742 &softn->ipf_nat_stats.ns_active, 6743 softn->ipf_nat_table_sz, 6744 softn->ipf_nat_table_wm_low); 6745 } 6746 6747 SPL_X(s); 6748 return (removed); 6749 } 6750 6751 6752 /* ------------------------------------------------------------------------ */ 6753 /* Function: ipf_nat_flush_entry */ 6754 /* Returns: 0 - always succeeds */ 6755 /* Parameters: softc(I) - pointer to soft context main structure */ 6756 /* entry(I) - pointer to NAT entry */ 6757 /* Write Locks: ipf_nat */ 6758 /* */ 6759 /* This function is a stepping stone between ipf_queueflush() and */ 6760 /* nat_dlete(). It is used so we can provide a uniform interface via the */ 6761 /* ipf_queueflush() function. Since the nat_delete() function returns void */ 6762 /* we translate that to mean it always succeeds in deleting something. */ 6763 /* ------------------------------------------------------------------------ */ 6764 static int ipf_nat_flush_entry(ipf_main_softc_t * softc,void * entry)6765 ipf_nat_flush_entry(ipf_main_softc_t *softc, void *entry) 6766 { 6767 ipf_nat_delete(softc, entry, NL_FLUSH); 6768 return (0); 6769 } 6770 6771 6772 /* ------------------------------------------------------------------------ */ 6773 /* Function: ipf_nat_iterator */ 6774 /* Returns: int - 0 == ok, else error */ 6775 /* Parameters: softc(I) - pointer to soft context main structure */ 6776 /* token(I) - pointer to ipftoken structure */ 6777 /* itp(I) - pointer to ipfgeniter_t structure */ 6778 /* obj(I) - pointer to data description structure */ 6779 /* */ 6780 /* This function acts as a handler for the SIOCGENITER ioctls that use a */ 6781 /* generic structure to iterate through a list. There are three different */ 6782 /* linked lists of NAT related information to go through: NAT rules, active */ 6783 /* NAT mappings and the NAT fragment cache. */ 6784 /* ------------------------------------------------------------------------ */ 6785 static int ipf_nat_iterator(ipf_main_softc_t * softc,ipftoken_t * token,ipfgeniter_t * itp,ipfobj_t * obj)6786 ipf_nat_iterator(ipf_main_softc_t *softc, ipftoken_t *token, ipfgeniter_t *itp, 6787 ipfobj_t *obj) 6788 { 6789 int error; 6790 6791 if (itp->igi_data == NULL) { 6792 IPFERROR(60052); 6793 return (EFAULT); 6794 } 6795 6796 switch (itp->igi_type) 6797 { 6798 case IPFGENITER_HOSTMAP : 6799 case IPFGENITER_IPNAT : 6800 case IPFGENITER_NAT : 6801 error = ipf_nat_getnext(softc, token, itp, obj); 6802 break; 6803 6804 case IPFGENITER_NATFRAG : 6805 error = ipf_frag_nat_next(softc, token, itp); 6806 break; 6807 default : 6808 IPFERROR(60053); 6809 error = EINVAL; 6810 break; 6811 } 6812 6813 return (error); 6814 } 6815 6816 6817 /* ------------------------------------------------------------------------ */ 6818 /* Function: ipf_nat_setpending */ 6819 /* Returns: Nil */ 6820 /* Parameters: softc(I) - pointer to soft context main structure */ 6821 /* nat(I) - pointer to NAT structure */ 6822 /* Locks: ipf_nat (read or write) */ 6823 /* */ 6824 /* Put the NAT entry on to the pending queue - this queue has a very short */ 6825 /* lifetime where items are put that can't be deleted straight away because */ 6826 /* of locking issues but we want to delete them ASAP, anyway. In calling */ 6827 /* this function, it is assumed that the owner (if there is one, as shown */ 6828 /* by nat_me) is no longer interested in it. */ 6829 /* ------------------------------------------------------------------------ */ 6830 void ipf_nat_setpending(ipf_main_softc_t * softc,nat_t * nat)6831 ipf_nat_setpending(ipf_main_softc_t *softc, nat_t *nat) 6832 { 6833 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 6834 ipftq_t *oifq; 6835 6836 oifq = nat->nat_tqe.tqe_ifq; 6837 if (oifq != NULL) 6838 ipf_movequeue(softc->ipf_ticks, &nat->nat_tqe, oifq, 6839 &softn->ipf_nat_pending); 6840 else 6841 ipf_queueappend(softc->ipf_ticks, &nat->nat_tqe, 6842 &softn->ipf_nat_pending, nat); 6843 6844 if (nat->nat_me != NULL) { 6845 *nat->nat_me = NULL; 6846 nat->nat_me = NULL; 6847 nat->nat_ref--; 6848 ASSERT(nat->nat_ref >= 0); 6849 } 6850 } 6851 6852 6853 /* ------------------------------------------------------------------------ */ 6854 /* Function: nat_newrewrite */ 6855 /* Returns: int - -1 == error, 0 == success (no move), 1 == success and */ 6856 /* allow rule to be moved if IPN_ROUNDR is set. */ 6857 /* Parameters: fin(I) - pointer to packet information */ 6858 /* nat(I) - pointer to NAT entry */ 6859 /* ni(I) - pointer to structure with misc. information needed */ 6860 /* to create new NAT entry. */ 6861 /* Write Lock: ipf_nat */ 6862 /* */ 6863 /* This function is responsible for setting up an active NAT session where */ 6864 /* we are changing both the source and destination parameters at the same */ 6865 /* time. The loop in here works differently to elsewhere - each iteration */ 6866 /* is responsible for changing a single parameter that can be incremented. */ 6867 /* So one pass may increase the source IP#, next source port, next dest. IP#*/ 6868 /* and the last destination port for a total of 4 iterations to try each. */ 6869 /* This is done to try and exhaustively use the translation space available.*/ 6870 /* ------------------------------------------------------------------------ */ 6871 static int ipf_nat_newrewrite(fr_info_t * fin,nat_t * nat,natinfo_t * nai)6872 ipf_nat_newrewrite(fr_info_t *fin, nat_t *nat, natinfo_t *nai) 6873 { 6874 int src_search = 1; 6875 int dst_search = 1; 6876 fr_info_t frnat; 6877 u_32_t flags; 6878 u_short swap; 6879 ipnat_t *np; 6880 nat_t *natl; 6881 int l = 0; 6882 int changed; 6883 6884 natl = NULL; 6885 changed = -1; 6886 np = nai->nai_np; 6887 flags = nat->nat_flags; 6888 bcopy((char *)fin, (char *)&frnat, sizeof(*fin)); 6889 6890 nat->nat_hm = NULL; 6891 6892 do { 6893 changed = -1; 6894 /* TRACE (l, src_search, dst_search, np) */ 6895 DT4(ipf_nat_rewrite_1, int, l, int, src_search, int, dst_search, ipnat_t *, np); 6896 6897 if ((src_search == 0) && (np->in_spnext == 0) && 6898 (dst_search == 0) && (np->in_dpnext == 0)) { 6899 if (l > 0) 6900 return (-1); 6901 } 6902 6903 /* 6904 * Find a new source address 6905 */ 6906 if (ipf_nat_nextaddr(fin, &np->in_nsrc, &frnat.fin_saddr, 6907 &frnat.fin_saddr) == -1) { 6908 return (-1); 6909 } 6910 6911 if ((np->in_nsrcaddr == 0) && (np->in_nsrcmsk == 0xffffffff)) { 6912 src_search = 0; 6913 if (np->in_stepnext == 0) 6914 np->in_stepnext = 1; 6915 6916 } else if ((np->in_nsrcaddr == 0) && (np->in_nsrcmsk == 0)) { 6917 src_search = 0; 6918 if (np->in_stepnext == 0) 6919 np->in_stepnext = 1; 6920 6921 } else if (np->in_nsrcmsk == 0xffffffff) { 6922 src_search = 0; 6923 if (np->in_stepnext == 0) 6924 np->in_stepnext = 1; 6925 6926 } else if (np->in_nsrcmsk != 0xffffffff) { 6927 if (np->in_stepnext == 0 && changed == -1) { 6928 np->in_snip++; 6929 np->in_stepnext++; 6930 changed = 0; 6931 } 6932 } 6933 6934 if ((flags & IPN_TCPUDPICMP) != 0) { 6935 if (np->in_spnext != 0) 6936 frnat.fin_data[0] = np->in_spnext; 6937 6938 /* 6939 * Standard port translation. Select next port. 6940 */ 6941 if ((flags & IPN_FIXEDSPORT) != 0) { 6942 np->in_stepnext = 2; 6943 } else if ((np->in_stepnext == 1) && 6944 (changed == -1) && (natl != NULL)) { 6945 np->in_spnext++; 6946 np->in_stepnext++; 6947 changed = 1; 6948 if (np->in_spnext > np->in_spmax) 6949 np->in_spnext = np->in_spmin; 6950 } 6951 } else { 6952 np->in_stepnext = 2; 6953 } 6954 np->in_stepnext &= 0x3; 6955 6956 /* 6957 * Find a new destination address 6958 */ 6959 /* TRACE (fin, np, l, frnat) */ 6960 DT4(ipf_nat_rewrite_2, frinfo_t *, fin, ipnat_t *, np, int, l, frinfo_t *, &frnat); 6961 6962 if (ipf_nat_nextaddr(fin, &np->in_ndst, &frnat.fin_daddr, 6963 &frnat.fin_daddr) == -1) 6964 return (-1); 6965 if ((np->in_ndstaddr == 0) && (np->in_ndstmsk == 0xffffffff)) { 6966 dst_search = 0; 6967 if (np->in_stepnext == 2) 6968 np->in_stepnext = 3; 6969 6970 } else if ((np->in_ndstaddr == 0) && (np->in_ndstmsk == 0)) { 6971 dst_search = 0; 6972 if (np->in_stepnext == 2) 6973 np->in_stepnext = 3; 6974 6975 } else if (np->in_ndstmsk == 0xffffffff) { 6976 dst_search = 0; 6977 if (np->in_stepnext == 2) 6978 np->in_stepnext = 3; 6979 6980 } else if (np->in_ndstmsk != 0xffffffff) { 6981 if ((np->in_stepnext == 2) && (changed == -1) && 6982 (natl != NULL)) { 6983 changed = 2; 6984 np->in_stepnext++; 6985 np->in_dnip++; 6986 } 6987 } 6988 6989 if ((flags & IPN_TCPUDPICMP) != 0) { 6990 if (np->in_dpnext != 0) 6991 frnat.fin_data[1] = np->in_dpnext; 6992 6993 /* 6994 * Standard port translation. Select next port. 6995 */ 6996 if ((flags & IPN_FIXEDDPORT) != 0) { 6997 np->in_stepnext = 0; 6998 } else if (np->in_stepnext == 3 && changed == -1) { 6999 np->in_dpnext++; 7000 np->in_stepnext++; 7001 changed = 3; 7002 if (np->in_dpnext > np->in_dpmax) 7003 np->in_dpnext = np->in_dpmin; 7004 } 7005 } else { 7006 if (np->in_stepnext == 3) 7007 np->in_stepnext = 0; 7008 } 7009 7010 /* TRACE (frnat) */ 7011 DT1(ipf_nat_rewrite_3, frinfo_t *, &frnat); 7012 7013 /* 7014 * Here we do a lookup of the connection as seen from 7015 * the outside. If an IP# pair already exists, try 7016 * again. So if you have A->B becomes C->B, you can 7017 * also have D->E become C->E but not D->B causing 7018 * another C->B. Also take protocol and ports into 7019 * account when determining whether a pre-existing 7020 * NAT setup will cause an external conflict where 7021 * this is appropriate. 7022 * 7023 * fin_data[] is swapped around because we are doing a 7024 * lookup of the packet is if it were moving in the opposite 7025 * direction of the one we are working with now. 7026 */ 7027 if (flags & IPN_TCPUDP) { 7028 swap = frnat.fin_data[0]; 7029 frnat.fin_data[0] = frnat.fin_data[1]; 7030 frnat.fin_data[1] = swap; 7031 } 7032 if (fin->fin_out == 1) { 7033 natl = ipf_nat_inlookup(&frnat, 7034 flags & ~(SI_WILDP|NAT_SEARCH), 7035 (u_int)frnat.fin_p, 7036 frnat.fin_dst, frnat.fin_src); 7037 7038 } else { 7039 natl = ipf_nat_outlookup(&frnat, 7040 flags & ~(SI_WILDP|NAT_SEARCH), 7041 (u_int)frnat.fin_p, 7042 frnat.fin_dst, frnat.fin_src); 7043 } 7044 if (flags & IPN_TCPUDP) { 7045 swap = frnat.fin_data[0]; 7046 frnat.fin_data[0] = frnat.fin_data[1]; 7047 frnat.fin_data[1] = swap; 7048 } 7049 7050 /* TRACE natl, in_stepnext, l */ 7051 DT3(ipf_nat_rewrite_2, nat_t *, natl, ipnat_t *, np , int, l); 7052 7053 if ((natl != NULL) && (l > 8)) /* XXX 8 is arbitrary */ 7054 return (-1); 7055 7056 np->in_stepnext &= 0x3; 7057 7058 l++; 7059 changed = -1; 7060 } while (natl != NULL); 7061 7062 nat->nat_osrcip = fin->fin_src; 7063 nat->nat_odstip = fin->fin_dst; 7064 nat->nat_nsrcip = frnat.fin_src; 7065 nat->nat_ndstip = frnat.fin_dst; 7066 7067 if ((flags & IPN_TCPUDP) != 0) { 7068 nat->nat_osport = htons(fin->fin_data[0]); 7069 nat->nat_odport = htons(fin->fin_data[1]); 7070 nat->nat_nsport = htons(frnat.fin_data[0]); 7071 nat->nat_ndport = htons(frnat.fin_data[1]); 7072 } else if ((flags & IPN_ICMPQUERY) != 0) { 7073 nat->nat_oicmpid = fin->fin_data[1]; 7074 nat->nat_nicmpid = frnat.fin_data[1]; 7075 } 7076 7077 return (0); 7078 } 7079 7080 7081 /* ------------------------------------------------------------------------ */ 7082 /* Function: nat_newdivert */ 7083 /* Returns: int - -1 == error, 0 == success */ 7084 /* Parameters: fin(I) - pointer to packet information */ 7085 /* nat(I) - pointer to NAT entry */ 7086 /* ni(I) - pointer to structure with misc. information needed */ 7087 /* to create new NAT entry. */ 7088 /* Write Lock: ipf_nat */ 7089 /* */ 7090 /* Create a new NAT divert session as defined by the NAT rule. This is */ 7091 /* somewhat different to other NAT session creation routines because we */ 7092 /* do not iterate through either port numbers or IP addresses, searching */ 7093 /* for a unique mapping, however, a complimentary duplicate check is made. */ 7094 /* ------------------------------------------------------------------------ */ 7095 static int ipf_nat_newdivert(fr_info_t * fin,nat_t * nat,natinfo_t * nai)7096 ipf_nat_newdivert(fr_info_t *fin, nat_t *nat, natinfo_t *nai) 7097 { 7098 ipf_main_softc_t *softc = fin->fin_main_soft; 7099 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 7100 fr_info_t frnat; 7101 ipnat_t *np; 7102 nat_t *natl; 7103 int p; 7104 7105 np = nai->nai_np; 7106 bcopy((char *)fin, (char *)&frnat, sizeof(*fin)); 7107 7108 nat->nat_pr[0] = 0; 7109 nat->nat_osrcaddr = fin->fin_saddr; 7110 nat->nat_odstaddr = fin->fin_daddr; 7111 frnat.fin_saddr = htonl(np->in_snip); 7112 frnat.fin_daddr = htonl(np->in_dnip); 7113 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 7114 nat->nat_osport = htons(fin->fin_data[0]); 7115 nat->nat_odport = htons(fin->fin_data[1]); 7116 } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 7117 nat->nat_oicmpid = fin->fin_data[1]; 7118 } 7119 7120 if (np->in_redir & NAT_DIVERTUDP) { 7121 frnat.fin_data[0] = np->in_spnext; 7122 frnat.fin_data[1] = np->in_dpnext; 7123 frnat.fin_flx |= FI_TCPUDP; 7124 p = IPPROTO_UDP; 7125 } else { 7126 frnat.fin_flx &= ~FI_TCPUDP; 7127 p = IPPROTO_IPIP; 7128 } 7129 7130 if (fin->fin_out == 1) { 7131 natl = ipf_nat_inlookup(&frnat, 0, p, 7132 frnat.fin_dst, frnat.fin_src); 7133 7134 } else { 7135 natl = ipf_nat_outlookup(&frnat, 0, p, 7136 frnat.fin_dst, frnat.fin_src); 7137 } 7138 7139 if (natl != NULL) { 7140 NBUMPSIDED(fin->fin_out, ns_divert_exist); 7141 DT3(ns_divert_exist, fr_info_t *, fin, nat_t *, nat, natinfo_t, nai); 7142 return (-1); 7143 } 7144 7145 nat->nat_nsrcaddr = frnat.fin_saddr; 7146 nat->nat_ndstaddr = frnat.fin_daddr; 7147 if ((nat->nat_flags & IPN_TCPUDP) != 0) { 7148 nat->nat_nsport = htons(frnat.fin_data[0]); 7149 nat->nat_ndport = htons(frnat.fin_data[1]); 7150 } else if ((nat->nat_flags & IPN_ICMPQUERY) != 0) { 7151 nat->nat_nicmpid = frnat.fin_data[1]; 7152 } 7153 7154 nat->nat_pr[fin->fin_out] = fin->fin_p; 7155 nat->nat_pr[1 - fin->fin_out] = p; 7156 7157 if (np->in_redir & NAT_REDIRECT) 7158 nat->nat_dir = NAT_DIVERTIN; 7159 else 7160 nat->nat_dir = NAT_DIVERTOUT; 7161 7162 return (0); 7163 } 7164 7165 7166 /* ------------------------------------------------------------------------ */ 7167 /* Function: nat_builddivertmp */ 7168 /* Returns: int - -1 == error, 0 == success */ 7169 /* Parameters: softn(I) - pointer to NAT context structure */ 7170 /* np(I) - pointer to a NAT rule */ 7171 /* */ 7172 /* For divert rules, a skeleton packet representing what will be prepended */ 7173 /* to the real packet is created. Even though we don't have the full */ 7174 /* packet here, a checksum is calculated that we update later when we */ 7175 /* fill in the final details. At present a 0 checksum for UDP is being set */ 7176 /* here because it is expected that divert will be used for localhost. */ 7177 /* ------------------------------------------------------------------------ */ 7178 static int ipf_nat_builddivertmp(ipf_nat_softc_t * softn,ipnat_t * np)7179 ipf_nat_builddivertmp(ipf_nat_softc_t *softn, ipnat_t *np) 7180 { 7181 udphdr_t *uh; 7182 size_t len; 7183 ip_t *ip; 7184 7185 if ((np->in_redir & NAT_DIVERTUDP) != 0) 7186 len = sizeof(ip_t) + sizeof(udphdr_t); 7187 else 7188 len = sizeof(ip_t); 7189 7190 ALLOC_MB_T(np->in_divmp, len); 7191 if (np->in_divmp == NULL) { 7192 NBUMPD(ipf_nat_stats, ns_divert_build); 7193 return (-1); 7194 } 7195 7196 /* 7197 * First, the header to get the packet diverted to the new destination 7198 */ 7199 ip = MTOD(np->in_divmp, ip_t *); 7200 IP_V_A(ip, 4); 7201 IP_HL_A(ip, 5); 7202 ip->ip_tos = 0; 7203 if ((np->in_redir & NAT_DIVERTUDP) != 0) 7204 ip->ip_p = IPPROTO_UDP; 7205 else 7206 ip->ip_p = IPPROTO_IPIP; 7207 ip->ip_ttl = 255; 7208 ip->ip_off = 0; 7209 ip->ip_sum = 0; 7210 ip->ip_len = htons(len); 7211 ip->ip_id = 0; 7212 ip->ip_src.s_addr = htonl(np->in_snip); 7213 ip->ip_dst.s_addr = htonl(np->in_dnip); 7214 ip->ip_sum = ipf_cksum((u_short *)ip, sizeof(*ip)); 7215 7216 if (np->in_redir & NAT_DIVERTUDP) { 7217 uh = (udphdr_t *)(ip + 1); 7218 uh->uh_sum = 0; 7219 uh->uh_ulen = 8; 7220 uh->uh_sport = htons(np->in_spnext); 7221 uh->uh_dport = htons(np->in_dpnext); 7222 } 7223 7224 return (0); 7225 } 7226 7227 7228 #define MINDECAP (sizeof(ip_t) + sizeof(udphdr_t) + sizeof(ip_t)) 7229 7230 /* ------------------------------------------------------------------------ */ 7231 /* Function: nat_decap */ 7232 /* Returns: int - -1 == error, 0 == success */ 7233 /* Parameters: fin(I) - pointer to packet information */ 7234 /* nat(I) - pointer to current NAT session */ 7235 /* */ 7236 /* This function is responsible for undoing a packet's encapsulation in the */ 7237 /* reverse of an encap/divert rule. After removing the outer encapsulation */ 7238 /* it is necessary to call ipf_makefrip() again so that the contents of 'fin'*/ 7239 /* match the "new" packet as it may still be used by IPFilter elsewhere. */ 7240 /* We use "dir" here as the basis for some of the expectations about the */ 7241 /* outer header. If we return an error, the goal is to leave the original */ 7242 /* packet information undisturbed - this falls short at the end where we'd */ 7243 /* need to back a backup copy of "fin" - expensive. */ 7244 /* ------------------------------------------------------------------------ */ 7245 static int ipf_nat_decap(fr_info_t * fin,nat_t * nat)7246 ipf_nat_decap(fr_info_t *fin, nat_t *nat) 7247 { 7248 ipf_main_softc_t *softc = fin->fin_main_soft; 7249 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 7250 char *hdr; 7251 int hlen; 7252 int skip; 7253 mb_t *m; 7254 7255 if ((fin->fin_flx & FI_ICMPERR) != 0) { 7256 /* 7257 * ICMP packets don't get decapsulated, instead what we need 7258 * to do is change the ICMP reply from including (in the data 7259 * portion for errors) the encapsulated packet that we sent 7260 * out to something that resembles the original packet prior 7261 * to encapsulation. This isn't done here - all we're doing 7262 * here is changing the outer address to ensure that it gets 7263 * targetted back to the correct system. 7264 */ 7265 7266 if (nat->nat_dir & NAT_OUTBOUND) { 7267 u_32_t sum1, sum2, sumd; 7268 7269 sum1 = ntohl(fin->fin_daddr); 7270 sum2 = ntohl(nat->nat_osrcaddr); 7271 CALC_SUMD(sum1, sum2, sumd); 7272 fin->fin_ip->ip_dst = nat->nat_osrcip; 7273 fin->fin_daddr = nat->nat_osrcaddr; 7274 #if !defined(_KERNEL) || SOLARIS 7275 ipf_fix_outcksum(0, &fin->fin_ip->ip_sum, sumd, 0); 7276 #endif 7277 } 7278 return (0); 7279 } 7280 7281 m = fin->fin_m; 7282 skip = fin->fin_hlen; 7283 7284 switch (nat->nat_dir) 7285 { 7286 case NAT_DIVERTIN : 7287 case NAT_DIVERTOUT : 7288 if (fin->fin_plen < MINDECAP) 7289 return (-1); 7290 skip += sizeof(udphdr_t); 7291 break; 7292 7293 case NAT_ENCAPIN : 7294 case NAT_ENCAPOUT : 7295 if (fin->fin_plen < (skip + sizeof(ip_t))) 7296 return (-1); 7297 break; 7298 default : 7299 return (-1); 7300 /* NOTREACHED */ 7301 } 7302 7303 /* 7304 * The aim here is to keep the original packet details in "fin" for 7305 * as long as possible so that returning with an error is for the 7306 * original packet and there is little undoing work to do. 7307 */ 7308 if (M_LEN(m) < skip + sizeof(ip_t)) { 7309 if (ipf_pr_pullup(fin, skip + sizeof(ip_t)) == -1) 7310 return (-1); 7311 } 7312 7313 hdr = MTOD(fin->fin_m, char *); 7314 fin->fin_ip = (ip_t *)(hdr + skip); 7315 hlen = IP_HL(fin->fin_ip) << 2; 7316 7317 if (ipf_pr_pullup(fin, skip + hlen) == -1) { 7318 NBUMPSIDED(fin->fin_out, ns_decap_pullup); 7319 return (-1); 7320 } 7321 7322 fin->fin_hlen = hlen; 7323 fin->fin_dlen -= skip; 7324 fin->fin_plen -= skip; 7325 fin->fin_ipoff += skip; 7326 7327 if (ipf_makefrip(hlen, (ip_t *)hdr, fin) == -1) { 7328 NBUMPSIDED(fin->fin_out, ns_decap_bad); 7329 return (-1); 7330 } 7331 7332 return (skip); 7333 } 7334 7335 7336 /* ------------------------------------------------------------------------ */ 7337 /* Function: nat_nextaddr */ 7338 /* Returns: int - -1 == bad input (no new address), */ 7339 /* 0 == success and dst has new address */ 7340 /* Parameters: fin(I) - pointer to packet information */ 7341 /* na(I) - how to generate new address */ 7342 /* old(I) - original address being replaced */ 7343 /* dst(O) - where to put the new address */ 7344 /* Write Lock: ipf_nat */ 7345 /* */ 7346 /* This function uses the contents of the "na" structure, in combination */ 7347 /* with "old" to produce a new address to store in "dst". Not all of the */ 7348 /* possible uses of "na" will result in a new address. */ 7349 /* ------------------------------------------------------------------------ */ 7350 static int ipf_nat_nextaddr(fr_info_t * fin,nat_addr_t * na,u_32_t * old,u_32_t * dst)7351 ipf_nat_nextaddr(fr_info_t *fin, nat_addr_t *na, u_32_t *old, u_32_t *dst) 7352 { 7353 ipf_main_softc_t *softc = fin->fin_main_soft; 7354 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 7355 u_32_t amin, amax, new; 7356 i6addr_t newip; 7357 int error; 7358 7359 new = 0; 7360 amin = na->na_addr[0].in4.s_addr; 7361 7362 switch (na->na_atype) 7363 { 7364 case FRI_RANGE : 7365 amax = na->na_addr[1].in4.s_addr; 7366 break; 7367 7368 case FRI_NETMASKED : 7369 case FRI_DYNAMIC : 7370 case FRI_NORMAL : 7371 /* 7372 * Compute the maximum address by adding the inverse of the 7373 * netmask to the minimum address. 7374 */ 7375 amax = ~na->na_addr[1].in4.s_addr; 7376 amax |= amin; 7377 break; 7378 7379 case FRI_LOOKUP : 7380 break; 7381 7382 case FRI_BROADCAST : 7383 case FRI_PEERADDR : 7384 case FRI_NETWORK : 7385 default : 7386 DT4(ns_na_atype, fr_info_t *, fin, nat_addr_t *, na, u_32_t *, old, u_32_t *, new); 7387 return (-1); 7388 } 7389 7390 error = -1; 7391 7392 if (na->na_atype == FRI_LOOKUP) { 7393 if (na->na_type == IPLT_DSTLIST) { 7394 error = ipf_dstlist_select_node(fin, na->na_ptr, dst, 7395 NULL); 7396 } else { 7397 NBUMPSIDE(fin->fin_out, ns_badnextaddr); 7398 DT4(ns_badnextaddr_1, fr_info_t *, fin, nat_addr_t *, na, u_32_t *, old, u_32_t *, new); 7399 } 7400 7401 } else if (na->na_atype == IPLT_NONE) { 7402 /* 7403 * 0/0 as the new address means leave it alone. 7404 */ 7405 if (na->na_addr[0].in4.s_addr == 0 && 7406 na->na_addr[1].in4.s_addr == 0) { 7407 new = *old; 7408 7409 /* 7410 * 0/32 means get the interface's address 7411 */ 7412 } else if (na->na_addr[0].in4.s_addr == 0 && 7413 na->na_addr[1].in4.s_addr == 0xffffffff) { 7414 if (ipf_ifpaddr(softc, 4, na->na_atype, 7415 fin->fin_ifp, &newip, NULL) == -1) { 7416 NBUMPSIDED(fin->fin_out, ns_ifpaddrfail); 7417 DT4(ns_ifpaddrfail, fr_info_t *, fin, nat_addr_t *, na, u_32_t *, old, u_32_t *, new); 7418 return (-1); 7419 } 7420 new = newip.in4.s_addr; 7421 } else { 7422 new = htonl(na->na_nextip); 7423 } 7424 *dst = new; 7425 error = 0; 7426 7427 } else { 7428 NBUMPSIDE(fin->fin_out, ns_badnextaddr); 7429 DT4(ns_badnextaddr_2, fr_info_t *, fin, nat_addr_t *, na, u_32_t *, old, u_32_t *, new); 7430 } 7431 7432 return (error); 7433 } 7434 7435 7436 /* ------------------------------------------------------------------------ */ 7437 /* Function: nat_nextaddrinit */ 7438 /* Returns: int - 0 == success, else error number */ 7439 /* Parameters: softc(I) - pointer to soft context main structure */ 7440 /* na(I) - NAT address information for generating new addr*/ 7441 /* initial(I) - flag indicating if it is the first call for */ 7442 /* this "na" structure. */ 7443 /* ifp(I) - network interface to derive address */ 7444 /* information from. */ 7445 /* */ 7446 /* This function is expected to be called in two scenarious: when a new NAT */ 7447 /* rule is loaded into the kernel and when the list of NAT rules is sync'd */ 7448 /* up with the valid network interfaces (possibly due to them changing.) */ 7449 /* To distinguish between these, the "initial" parameter is used. If it is */ 7450 /* 1 then this indicates the rule has just been reloaded and 0 for when we */ 7451 /* are updating information. This difference is important because in */ 7452 /* instances where we are not updating address information associated with */ 7453 /* a network interface, we don't want to disturb what the "next" address to */ 7454 /* come out of ipf_nat_nextaddr() will be. */ 7455 /* ------------------------------------------------------------------------ */ 7456 static int ipf_nat_nextaddrinit(ipf_main_softc_t * softc,char * base,nat_addr_t * na,int initial,void * ifp)7457 ipf_nat_nextaddrinit(ipf_main_softc_t *softc, char *base, nat_addr_t *na, 7458 int initial, void *ifp) 7459 { 7460 7461 switch (na->na_atype) 7462 { 7463 case FRI_LOOKUP : 7464 if (na->na_subtype == 0) { 7465 na->na_ptr = ipf_lookup_res_num(softc, IPL_LOGNAT, 7466 na->na_type, 7467 na->na_num, 7468 &na->na_func); 7469 } else if (na->na_subtype == 1) { 7470 na->na_ptr = ipf_lookup_res_name(softc, IPL_LOGNAT, 7471 na->na_type, 7472 base + na->na_num, 7473 &na->na_func); 7474 } 7475 if (na->na_func == NULL) { 7476 IPFERROR(60060); 7477 return (ESRCH); 7478 } 7479 if (na->na_ptr == NULL) { 7480 IPFERROR(60056); 7481 return (ESRCH); 7482 } 7483 break; 7484 7485 case FRI_DYNAMIC : 7486 case FRI_BROADCAST : 7487 case FRI_NETWORK : 7488 case FRI_NETMASKED : 7489 case FRI_PEERADDR : 7490 if (ifp != NULL) 7491 (void )ipf_ifpaddr(softc, 4, na->na_atype, ifp, 7492 &na->na_addr[0], &na->na_addr[1]); 7493 break; 7494 7495 case FRI_SPLIT : 7496 case FRI_RANGE : 7497 if (initial) 7498 na->na_nextip = ntohl(na->na_addr[0].in4.s_addr); 7499 break; 7500 7501 case FRI_NONE : 7502 na->na_addr[0].in4.s_addr &= na->na_addr[1].in4.s_addr; 7503 return (0); 7504 7505 case FRI_NORMAL : 7506 na->na_addr[0].in4.s_addr &= na->na_addr[1].in4.s_addr; 7507 break; 7508 7509 default : 7510 IPFERROR(60054); 7511 return (EINVAL); 7512 } 7513 7514 if (initial && (na->na_atype == FRI_NORMAL)) { 7515 if (na->na_addr[0].in4.s_addr == 0) { 7516 if ((na->na_addr[1].in4.s_addr == 0xffffffff) || 7517 (na->na_addr[1].in4.s_addr == 0)) { 7518 return (0); 7519 } 7520 } 7521 7522 if (na->na_addr[1].in4.s_addr == 0xffffffff) { 7523 na->na_nextip = ntohl(na->na_addr[0].in4.s_addr); 7524 } else { 7525 na->na_nextip = ntohl(na->na_addr[0].in4.s_addr) + 1; 7526 } 7527 } 7528 7529 return (0); 7530 } 7531 7532 7533 /* ------------------------------------------------------------------------ */ 7534 /* Function: ipf_nat_matchflush */ 7535 /* Returns: int - -1 == error, 0 == success */ 7536 /* Parameters: softc(I) - pointer to soft context main structure */ 7537 /* softn(I) - pointer to NAT context structure */ 7538 /* nat(I) - pointer to current NAT session */ 7539 /* */ 7540 /* ------------------------------------------------------------------------ */ 7541 static int ipf_nat_matchflush(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,caddr_t data)7542 ipf_nat_matchflush(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, 7543 caddr_t data) 7544 { 7545 int *array, flushed, error; 7546 nat_t *nat, *natnext; 7547 ipfobj_t obj; 7548 7549 error = ipf_matcharray_load(softc, data, &obj, &array); 7550 if (error != 0) 7551 return (error); 7552 7553 flushed = 0; 7554 7555 for (nat = softn->ipf_nat_instances; nat != NULL; nat = natnext) { 7556 natnext = nat->nat_next; 7557 if (ipf_nat_matcharray(nat, array, softc->ipf_ticks) == 0) { 7558 ipf_nat_delete(softc, nat, NL_FLUSH); 7559 flushed++; 7560 } 7561 } 7562 7563 obj.ipfo_retval = flushed; 7564 error = BCOPYOUT(&obj, data, sizeof(obj)); 7565 7566 KFREES(array, array[0] * sizeof(*array)); 7567 7568 return (error); 7569 } 7570 7571 7572 /* ------------------------------------------------------------------------ */ 7573 /* Function: ipf_nat_matcharray */ 7574 /* Returns: int - -1 == error, 0 == success */ 7575 /* Parameters: fin(I) - pointer to packet information */ 7576 /* nat(I) - pointer to current NAT session */ 7577 /* */ 7578 /* ------------------------------------------------------------------------ */ 7579 static int ipf_nat_matcharray(nat_t * nat,int * array,u_long ticks)7580 ipf_nat_matcharray(nat_t *nat, int *array, u_long ticks) 7581 { 7582 int i, n, *x, e, p; 7583 7584 e = 0; 7585 n = array[0]; 7586 x = array + 1; 7587 7588 for (; n > 0; x += 3 + x[2]) { 7589 if (x[0] == IPF_EXP_END) 7590 break; 7591 e = 0; 7592 7593 n -= x[2] + 3; 7594 if (n < 0) 7595 break; 7596 7597 p = x[0] >> 16; 7598 if (p != 0 && p != nat->nat_pr[1]) 7599 break; 7600 7601 switch (x[0]) 7602 { 7603 case IPF_EXP_IP_PR : 7604 for (i = 0; !e && i < x[2]; i++) { 7605 e |= (nat->nat_pr[1] == x[i + 3]); 7606 } 7607 break; 7608 7609 case IPF_EXP_IP_SRCADDR : 7610 if (nat->nat_v[0] == 4) { 7611 for (i = 0; !e && i < x[2]; i++) { 7612 e |= ((nat->nat_osrcaddr & x[i + 4]) == 7613 x[i + 3]); 7614 } 7615 } 7616 if (nat->nat_v[1] == 4) { 7617 for (i = 0; !e && i < x[2]; i++) { 7618 e |= ((nat->nat_nsrcaddr & x[i + 4]) == 7619 x[i + 3]); 7620 } 7621 } 7622 break; 7623 7624 case IPF_EXP_IP_DSTADDR : 7625 if (nat->nat_v[0] == 4) { 7626 for (i = 0; !e && i < x[2]; i++) { 7627 e |= ((nat->nat_odstaddr & x[i + 4]) == 7628 x[i + 3]); 7629 } 7630 } 7631 if (nat->nat_v[1] == 4) { 7632 for (i = 0; !e && i < x[2]; i++) { 7633 e |= ((nat->nat_ndstaddr & x[i + 4]) == 7634 x[i + 3]); 7635 } 7636 } 7637 break; 7638 7639 case IPF_EXP_IP_ADDR : 7640 for (i = 0; !e && i < x[2]; i++) { 7641 if (nat->nat_v[0] == 4) { 7642 e |= ((nat->nat_osrcaddr & x[i + 4]) == 7643 x[i + 3]); 7644 } 7645 if (nat->nat_v[1] == 4) { 7646 e |= ((nat->nat_nsrcaddr & x[i + 4]) == 7647 x[i + 3]); 7648 } 7649 if (nat->nat_v[0] == 4) { 7650 e |= ((nat->nat_odstaddr & x[i + 4]) == 7651 x[i + 3]); 7652 } 7653 if (nat->nat_v[1] == 4) { 7654 e |= ((nat->nat_ndstaddr & x[i + 4]) == 7655 x[i + 3]); 7656 } 7657 } 7658 break; 7659 7660 #ifdef USE_INET6 7661 case IPF_EXP_IP6_SRCADDR : 7662 if (nat->nat_v[0] == 6) { 7663 for (i = 0; !e && i < x[3]; i++) { 7664 e |= IP6_MASKEQ(&nat->nat_osrc6, 7665 x + i + 7, x + i + 3); 7666 } 7667 } 7668 if (nat->nat_v[1] == 6) { 7669 for (i = 0; !e && i < x[3]; i++) { 7670 e |= IP6_MASKEQ(&nat->nat_nsrc6, 7671 x + i + 7, x + i + 3); 7672 } 7673 } 7674 break; 7675 7676 case IPF_EXP_IP6_DSTADDR : 7677 if (nat->nat_v[0] == 6) { 7678 for (i = 0; !e && i < x[3]; i++) { 7679 e |= IP6_MASKEQ(&nat->nat_odst6, 7680 x + i + 7, 7681 x + i + 3); 7682 } 7683 } 7684 if (nat->nat_v[1] == 6) { 7685 for (i = 0; !e && i < x[3]; i++) { 7686 e |= IP6_MASKEQ(&nat->nat_ndst6, 7687 x + i + 7, 7688 x + i + 3); 7689 } 7690 } 7691 break; 7692 7693 case IPF_EXP_IP6_ADDR : 7694 for (i = 0; !e && i < x[3]; i++) { 7695 if (nat->nat_v[0] == 6) { 7696 e |= IP6_MASKEQ(&nat->nat_osrc6, 7697 x + i + 7, 7698 x + i + 3); 7699 } 7700 if (nat->nat_v[0] == 6) { 7701 e |= IP6_MASKEQ(&nat->nat_odst6, 7702 x + i + 7, 7703 x + i + 3); 7704 } 7705 if (nat->nat_v[1] == 6) { 7706 e |= IP6_MASKEQ(&nat->nat_nsrc6, 7707 x + i + 7, 7708 x + i + 3); 7709 } 7710 if (nat->nat_v[1] == 6) { 7711 e |= IP6_MASKEQ(&nat->nat_ndst6, 7712 x + i + 7, 7713 x + i + 3); 7714 } 7715 } 7716 break; 7717 #endif 7718 7719 case IPF_EXP_UDP_PORT : 7720 case IPF_EXP_TCP_PORT : 7721 for (i = 0; !e && i < x[2]; i++) { 7722 e |= (nat->nat_nsport == x[i + 3]) || 7723 (nat->nat_ndport == x[i + 3]); 7724 } 7725 break; 7726 7727 case IPF_EXP_UDP_SPORT : 7728 case IPF_EXP_TCP_SPORT : 7729 for (i = 0; !e && i < x[2]; i++) { 7730 e |= (nat->nat_nsport == x[i + 3]); 7731 } 7732 break; 7733 7734 case IPF_EXP_UDP_DPORT : 7735 case IPF_EXP_TCP_DPORT : 7736 for (i = 0; !e && i < x[2]; i++) { 7737 e |= (nat->nat_ndport == x[i + 3]); 7738 } 7739 break; 7740 7741 case IPF_EXP_TCP_STATE : 7742 for (i = 0; !e && i < x[2]; i++) { 7743 e |= (nat->nat_tcpstate[0] == x[i + 3]) || 7744 (nat->nat_tcpstate[1] == x[i + 3]); 7745 } 7746 break; 7747 7748 case IPF_EXP_IDLE_GT : 7749 e |= (ticks - nat->nat_touched > x[3]); 7750 break; 7751 } 7752 e ^= x[1]; 7753 7754 if (!e) 7755 break; 7756 } 7757 7758 return (e); 7759 } 7760 7761 7762 /* ------------------------------------------------------------------------ */ 7763 /* Function: ipf_nat_gettable */ 7764 /* Returns: int - 0 = success, else error */ 7765 /* Parameters: softc(I) - pointer to soft context main structure */ 7766 /* softn(I) - pointer to NAT context structure */ 7767 /* data(I) - pointer to ioctl data */ 7768 /* */ 7769 /* This function handles ioctl requests for tables of nat information. */ 7770 /* At present the only table it deals with is the hash bucket statistics. */ 7771 /* ------------------------------------------------------------------------ */ 7772 static int ipf_nat_gettable(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,char * data)7773 ipf_nat_gettable(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, char *data) 7774 { 7775 ipftable_t table; 7776 int error; 7777 7778 error = ipf_inobj(softc, data, NULL, &table, IPFOBJ_GTABLE); 7779 if (error != 0) 7780 return (error); 7781 7782 switch (table.ita_type) 7783 { 7784 case IPFTABLE_BUCKETS_NATIN : 7785 error = COPYOUT(softn->ipf_nat_stats.ns_side[0].ns_bucketlen, 7786 table.ita_table, 7787 softn->ipf_nat_table_sz * sizeof(u_int)); 7788 break; 7789 7790 case IPFTABLE_BUCKETS_NATOUT : 7791 error = COPYOUT(softn->ipf_nat_stats.ns_side[1].ns_bucketlen, 7792 table.ita_table, 7793 softn->ipf_nat_table_sz * sizeof(u_int)); 7794 break; 7795 7796 default : 7797 IPFERROR(60058); 7798 return (EINVAL); 7799 } 7800 7801 if (error != 0) { 7802 IPFERROR(60059); 7803 error = EFAULT; 7804 } 7805 return (error); 7806 } 7807 7808 7809 /* ------------------------------------------------------------------------ */ 7810 /* Function: ipf_nat_settimeout */ 7811 /* Returns: int - 0 = success, else failure */ 7812 /* Parameters: softc(I) - pointer to soft context main structure */ 7813 /* t(I) - pointer to tunable */ 7814 /* p(I) - pointer to new tuning data */ 7815 /* */ 7816 /* Apply the timeout change to the NAT timeout queues. */ 7817 /* ------------------------------------------------------------------------ */ 7818 int ipf_nat_settimeout(struct ipf_main_softc_s * softc,ipftuneable_t * t,ipftuneval_t * p)7819 ipf_nat_settimeout(struct ipf_main_softc_s *softc, ipftuneable_t *t, 7820 ipftuneval_t *p) 7821 { 7822 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 7823 7824 if (!strncmp(t->ipft_name, "tcp_", 4)) 7825 return (ipf_settimeout_tcp(t, p, softn->ipf_nat_tcptq)); 7826 7827 if (!strcmp(t->ipft_name, "udp_timeout")) { 7828 ipf_apply_timeout(&softn->ipf_nat_udptq, p->ipftu_int); 7829 } else if (!strcmp(t->ipft_name, "udp_ack_timeout")) { 7830 ipf_apply_timeout(&softn->ipf_nat_udpacktq, p->ipftu_int); 7831 } else if (!strcmp(t->ipft_name, "icmp_timeout")) { 7832 ipf_apply_timeout(&softn->ipf_nat_icmptq, p->ipftu_int); 7833 } else if (!strcmp(t->ipft_name, "icmp_ack_timeout")) { 7834 ipf_apply_timeout(&softn->ipf_nat_icmpacktq, p->ipftu_int); 7835 } else if (!strcmp(t->ipft_name, "ip_timeout")) { 7836 ipf_apply_timeout(&softn->ipf_nat_iptq, p->ipftu_int); 7837 } else { 7838 IPFERROR(60062); 7839 return (ESRCH); 7840 } 7841 return (0); 7842 } 7843 7844 7845 /* ------------------------------------------------------------------------ */ 7846 /* Function: ipf_nat_rehash */ 7847 /* Returns: int - 0 = success, else failure */ 7848 /* Parameters: softc(I) - pointer to soft context main structure */ 7849 /* t(I) - pointer to tunable */ 7850 /* p(I) - pointer to new tuning data */ 7851 /* */ 7852 /* To change the size of the basic NAT table, we need to first allocate the */ 7853 /* new tables (lest it fails and we've got nowhere to store all of the NAT */ 7854 /* sessions currently active) and then walk through the entire list and */ 7855 /* insert them into the table. There are two tables here: an inbound one */ 7856 /* and an outbound one. Each NAT entry goes into each table once. */ 7857 /* ------------------------------------------------------------------------ */ 7858 int ipf_nat_rehash(ipf_main_softc_t * softc,ipftuneable_t * t,ipftuneval_t * p)7859 ipf_nat_rehash(ipf_main_softc_t *softc, ipftuneable_t *t, ipftuneval_t *p) 7860 { 7861 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 7862 nat_t **newtab[2], *nat, **natp; 7863 u_int *bucketlens[2]; 7864 u_int maxbucket; 7865 u_int newsize; 7866 int error; 7867 u_int hv; 7868 int i; 7869 7870 newsize = p->ipftu_int; 7871 /* 7872 * In case there is nothing to do... 7873 */ 7874 if (newsize == softn->ipf_nat_table_sz) 7875 return (0); 7876 7877 newtab[0] = NULL; 7878 newtab[1] = NULL; 7879 bucketlens[0] = NULL; 7880 bucketlens[1] = NULL; 7881 /* 7882 * 4 tables depend on the NAT table size: the inbound looking table, 7883 * the outbound lookup table and the hash chain length for each. 7884 */ 7885 KMALLOCS(newtab[0], nat_t **, newsize * sizeof(nat_t *)); 7886 if (newtab[0] == NULL) { 7887 error = 60063; 7888 goto badrehash; 7889 } 7890 7891 KMALLOCS(newtab[1], nat_t **, newsize * sizeof(nat_t *)); 7892 if (newtab[1] == NULL) { 7893 error = 60064; 7894 goto badrehash; 7895 } 7896 7897 KMALLOCS(bucketlens[0], u_int *, newsize * sizeof(u_int)); 7898 if (bucketlens[0] == NULL) { 7899 error = 60065; 7900 goto badrehash; 7901 } 7902 7903 KMALLOCS(bucketlens[1], u_int *, newsize * sizeof(u_int)); 7904 if (bucketlens[1] == NULL) { 7905 error = 60066; 7906 goto badrehash; 7907 } 7908 7909 /* 7910 * Recalculate the maximum length based on the new size. 7911 */ 7912 for (maxbucket = 0, i = newsize; i > 0; i >>= 1) 7913 maxbucket++; 7914 maxbucket *= 2; 7915 7916 bzero((char *)newtab[0], newsize * sizeof(nat_t *)); 7917 bzero((char *)newtab[1], newsize * sizeof(nat_t *)); 7918 bzero((char *)bucketlens[0], newsize * sizeof(u_int)); 7919 bzero((char *)bucketlens[1], newsize * sizeof(u_int)); 7920 7921 WRITE_ENTER(&softc->ipf_nat); 7922 7923 if (softn->ipf_nat_table[0] != NULL) { 7924 KFREES(softn->ipf_nat_table[0], 7925 softn->ipf_nat_table_sz * 7926 sizeof(*softn->ipf_nat_table[0])); 7927 } 7928 softn->ipf_nat_table[0] = newtab[0]; 7929 7930 if (softn->ipf_nat_table[1] != NULL) { 7931 KFREES(softn->ipf_nat_table[1], 7932 softn->ipf_nat_table_sz * 7933 sizeof(*softn->ipf_nat_table[1])); 7934 } 7935 softn->ipf_nat_table[1] = newtab[1]; 7936 7937 if (softn->ipf_nat_stats.ns_side[0].ns_bucketlen != NULL) { 7938 KFREES(softn->ipf_nat_stats.ns_side[0].ns_bucketlen, 7939 softn->ipf_nat_table_sz * sizeof(u_int)); 7940 } 7941 softn->ipf_nat_stats.ns_side[0].ns_bucketlen = bucketlens[0]; 7942 7943 if (softn->ipf_nat_stats.ns_side[1].ns_bucketlen != NULL) { 7944 KFREES(softn->ipf_nat_stats.ns_side[1].ns_bucketlen, 7945 softn->ipf_nat_table_sz * sizeof(u_int)); 7946 } 7947 softn->ipf_nat_stats.ns_side[1].ns_bucketlen = bucketlens[1]; 7948 7949 #ifdef USE_INET6 7950 if (softn->ipf_nat_stats.ns_side6[0].ns_bucketlen != NULL) { 7951 KFREES(softn->ipf_nat_stats.ns_side6[0].ns_bucketlen, 7952 softn->ipf_nat_table_sz * sizeof(u_int)); 7953 } 7954 softn->ipf_nat_stats.ns_side6[0].ns_bucketlen = bucketlens[0]; 7955 7956 if (softn->ipf_nat_stats.ns_side6[1].ns_bucketlen != NULL) { 7957 KFREES(softn->ipf_nat_stats.ns_side6[1].ns_bucketlen, 7958 softn->ipf_nat_table_sz * sizeof(u_int)); 7959 } 7960 softn->ipf_nat_stats.ns_side6[1].ns_bucketlen = bucketlens[1]; 7961 #endif 7962 7963 softn->ipf_nat_maxbucket = maxbucket; 7964 softn->ipf_nat_table_sz = newsize; 7965 /* 7966 * Walk through the entire list of NAT table entries and put them 7967 * in the new NAT table, somewhere. Because we have a new table, 7968 * we need to restart the counter of how many chains are in use. 7969 */ 7970 softn->ipf_nat_stats.ns_side[0].ns_inuse = 0; 7971 softn->ipf_nat_stats.ns_side[1].ns_inuse = 0; 7972 #ifdef USE_INET6 7973 softn->ipf_nat_stats.ns_side6[0].ns_inuse = 0; 7974 softn->ipf_nat_stats.ns_side6[1].ns_inuse = 0; 7975 #endif 7976 7977 for (nat = softn->ipf_nat_instances; nat != NULL; nat = nat->nat_next) { 7978 nat->nat_hnext[0] = NULL; 7979 nat->nat_phnext[0] = NULL; 7980 hv = nat->nat_hv[0] % softn->ipf_nat_table_sz; 7981 7982 natp = &softn->ipf_nat_table[0][hv]; 7983 if (*natp) { 7984 (*natp)->nat_phnext[0] = &nat->nat_hnext[0]; 7985 } else { 7986 NBUMPSIDE(0, ns_inuse); 7987 } 7988 nat->nat_phnext[0] = natp; 7989 nat->nat_hnext[0] = *natp; 7990 *natp = nat; 7991 NBUMPSIDE(0, ns_bucketlen[hv]); 7992 7993 nat->nat_hnext[1] = NULL; 7994 nat->nat_phnext[1] = NULL; 7995 hv = nat->nat_hv[1] % softn->ipf_nat_table_sz; 7996 7997 natp = &softn->ipf_nat_table[1][hv]; 7998 if (*natp) { 7999 (*natp)->nat_phnext[1] = &nat->nat_hnext[1]; 8000 } else { 8001 NBUMPSIDE(1, ns_inuse); 8002 } 8003 nat->nat_phnext[1] = natp; 8004 nat->nat_hnext[1] = *natp; 8005 *natp = nat; 8006 NBUMPSIDE(1, ns_bucketlen[hv]); 8007 } 8008 RWLOCK_EXIT(&softc->ipf_nat); 8009 8010 return (0); 8011 8012 badrehash: 8013 if (bucketlens[1] != NULL) { 8014 KFREES(bucketlens[0], newsize * sizeof(u_int)); 8015 } 8016 if (bucketlens[0] != NULL) { 8017 KFREES(bucketlens[0], newsize * sizeof(u_int)); 8018 } 8019 if (newtab[0] != NULL) { 8020 KFREES(newtab[0], newsize * sizeof(nat_t *)); 8021 } 8022 if (newtab[1] != NULL) { 8023 KFREES(newtab[1], newsize * sizeof(nat_t *)); 8024 } 8025 IPFERROR(error); 8026 return (ENOMEM); 8027 } 8028 8029 8030 /* ------------------------------------------------------------------------ */ 8031 /* Function: ipf_nat_rehash_rules */ 8032 /* Returns: int - 0 = success, else failure */ 8033 /* Parameters: softc(I) - pointer to soft context main structure */ 8034 /* t(I) - pointer to tunable */ 8035 /* p(I) - pointer to new tuning data */ 8036 /* */ 8037 /* All of the NAT rules hang off of a hash table that is searched with a */ 8038 /* hash on address after the netmask is applied. There is a different table*/ 8039 /* for both inbound rules (rdr) and outbound (map.) The resizing will only */ 8040 /* affect one of these two tables. */ 8041 /* ------------------------------------------------------------------------ */ 8042 int ipf_nat_rehash_rules(ipf_main_softc_t * softc,ipftuneable_t * t,ipftuneval_t * p)8043 ipf_nat_rehash_rules(ipf_main_softc_t *softc, ipftuneable_t *t, 8044 ipftuneval_t *p) 8045 { 8046 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 8047 ipnat_t **newtab, *np, ***old, **npp; 8048 u_int newsize; 8049 u_int mask; 8050 u_int hv; 8051 8052 newsize = p->ipftu_int; 8053 /* 8054 * In case there is nothing to do... 8055 */ 8056 if (newsize == *t->ipft_pint) 8057 return (0); 8058 8059 /* 8060 * All inbound rules have the NAT_REDIRECT bit set in in_redir and 8061 * all outbound rules have either NAT_MAP or MAT_MAPBLK set. 8062 * This if statement allows for some more generic code to be below, 8063 * rather than two huge gobs of code that almost do the same thing. 8064 */ 8065 if (t->ipft_pint == &softn->ipf_nat_rdrrules_sz) { 8066 old = &softn->ipf_nat_rdr_rules; 8067 mask = NAT_REDIRECT; 8068 } else { 8069 old = &softn->ipf_nat_map_rules; 8070 mask = NAT_MAP|NAT_MAPBLK; 8071 } 8072 8073 KMALLOCS(newtab, ipnat_t **, newsize * sizeof(ipnat_t *)); 8074 if (newtab == NULL) { 8075 IPFERROR(60067); 8076 return (ENOMEM); 8077 } 8078 8079 bzero((char *)newtab, newsize * sizeof(ipnat_t *)); 8080 8081 WRITE_ENTER(&softc->ipf_nat); 8082 8083 if (*old != NULL) { 8084 KFREES(*old, *t->ipft_pint * sizeof(ipnat_t **)); 8085 } 8086 *old = newtab; 8087 *t->ipft_pint = newsize; 8088 8089 for (np = softn->ipf_nat_list; np != NULL; np = np->in_next) { 8090 if ((np->in_redir & mask) == 0) 8091 continue; 8092 8093 if (np->in_redir & NAT_REDIRECT) { 8094 np->in_rnext = NULL; 8095 hv = np->in_hv[0] % newsize; 8096 for (npp = newtab + hv; *npp != NULL; ) 8097 npp = &(*npp)->in_rnext; 8098 np->in_prnext = npp; 8099 *npp = np; 8100 } 8101 if (np->in_redir & NAT_MAP) { 8102 np->in_mnext = NULL; 8103 hv = np->in_hv[1] % newsize; 8104 for (npp = newtab + hv; *npp != NULL; ) 8105 npp = &(*npp)->in_mnext; 8106 np->in_pmnext = npp; 8107 *npp = np; 8108 } 8109 8110 } 8111 RWLOCK_EXIT(&softc->ipf_nat); 8112 8113 return (0); 8114 } 8115 8116 8117 /* ------------------------------------------------------------------------ */ 8118 /* Function: ipf_nat_hostmap_rehash */ 8119 /* Returns: int - 0 = success, else failure */ 8120 /* Parameters: softc(I) - pointer to soft context main structure */ 8121 /* t(I) - pointer to tunable */ 8122 /* p(I) - pointer to new tuning data */ 8123 /* */ 8124 /* Allocate and populate a new hash table that will contain a reference to */ 8125 /* all of the active IP# translations currently in place. */ 8126 /* ------------------------------------------------------------------------ */ 8127 int ipf_nat_hostmap_rehash(ipf_main_softc_t * softc,ipftuneable_t * t,ipftuneval_t * p)8128 ipf_nat_hostmap_rehash(ipf_main_softc_t *softc, ipftuneable_t *t, 8129 ipftuneval_t *p) 8130 { 8131 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 8132 hostmap_t *hm, **newtab; 8133 u_int newsize; 8134 u_int hv; 8135 8136 newsize = p->ipftu_int; 8137 /* 8138 * In case there is nothing to do... 8139 */ 8140 if (newsize == *t->ipft_pint) 8141 return (0); 8142 8143 KMALLOCS(newtab, hostmap_t **, newsize * sizeof(hostmap_t *)); 8144 if (newtab == NULL) { 8145 IPFERROR(60068); 8146 return (ENOMEM); 8147 } 8148 8149 bzero((char *)newtab, newsize * sizeof(hostmap_t *)); 8150 8151 WRITE_ENTER(&softc->ipf_nat); 8152 if (softn->ipf_hm_maptable != NULL) { 8153 KFREES(softn->ipf_hm_maptable, 8154 softn->ipf_nat_hostmap_sz * sizeof(hostmap_t *)); 8155 } 8156 softn->ipf_hm_maptable = newtab; 8157 softn->ipf_nat_hostmap_sz = newsize; 8158 8159 for (hm = softn->ipf_hm_maplist; hm != NULL; hm = hm->hm_next) { 8160 hv = hm->hm_hv % softn->ipf_nat_hostmap_sz; 8161 hm->hm_hnext = softn->ipf_hm_maptable[hv]; 8162 hm->hm_phnext = softn->ipf_hm_maptable + hv; 8163 if (softn->ipf_hm_maptable[hv] != NULL) 8164 softn->ipf_hm_maptable[hv]->hm_phnext = &hm->hm_hnext; 8165 softn->ipf_hm_maptable[hv] = hm; 8166 } 8167 RWLOCK_EXIT(&softc->ipf_nat); 8168 8169 return (0); 8170 } 8171 8172 8173 /* ------------------------------------------------------------------------ */ 8174 /* Function: ipf_nat_add_tq */ 8175 /* Parameters: softc(I) - pointer to soft context main structure */ 8176 /* */ 8177 /* ------------------------------------------------------------------------ */ 8178 ipftq_t * ipf_nat_add_tq(ipf_main_softc_t * softc,int ttl)8179 ipf_nat_add_tq(ipf_main_softc_t *softc, int ttl) 8180 { 8181 ipf_nat_softc_t *softs = softc->ipf_nat_soft; 8182 8183 return (ipf_addtimeoutqueue(softc, &softs->ipf_nat_utqe, ttl)); 8184 } 8185 8186 /* ------------------------------------------------------------------------ */ 8187 /* Function: ipf_nat_uncreate */ 8188 /* Returns: Nil */ 8189 /* Parameters: fin(I) - pointer to packet information */ 8190 /* */ 8191 /* This function is used to remove a NAT entry from the NAT table when we */ 8192 /* decide that the create was actually in error. It is thus assumed that */ 8193 /* fin_flx will have both FI_NATED and FI_NATNEW set. Because we're dealing */ 8194 /* with the translated packet (not the original), we have to reverse the */ 8195 /* lookup. Although doing the lookup is expensive (relatively speaking), it */ 8196 /* is not anticipated that this will be a frequent occurance for normal */ 8197 /* traffic patterns. */ 8198 /* ------------------------------------------------------------------------ */ 8199 void ipf_nat_uncreate(fr_info_t * fin)8200 ipf_nat_uncreate(fr_info_t *fin) 8201 { 8202 ipf_main_softc_t *softc = fin->fin_main_soft; 8203 ipf_nat_softc_t *softn = softc->ipf_nat_soft; 8204 int nflags; 8205 nat_t *nat; 8206 8207 switch (fin->fin_p) 8208 { 8209 case IPPROTO_TCP : 8210 nflags = IPN_TCP; 8211 break; 8212 case IPPROTO_UDP : 8213 nflags = IPN_UDP; 8214 break; 8215 default : 8216 nflags = 0; 8217 break; 8218 } 8219 8220 WRITE_ENTER(&softc->ipf_nat); 8221 8222 if (fin->fin_out == 0) { 8223 nat = ipf_nat_outlookup(fin, nflags, (u_int)fin->fin_p, 8224 fin->fin_dst, fin->fin_src); 8225 } else { 8226 nat = ipf_nat_inlookup(fin, nflags, (u_int)fin->fin_p, 8227 fin->fin_src, fin->fin_dst); 8228 } 8229 8230 if (nat != NULL) { 8231 NBUMPSIDE(fin->fin_out, ns_uncreate[0]); 8232 ipf_nat_delete(softc, nat, NL_DESTROY); 8233 } else { 8234 NBUMPSIDE(fin->fin_out, ns_uncreate[1]); 8235 } 8236 8237 RWLOCK_EXIT(&softc->ipf_nat); 8238 } 8239 8240 8241 /* ------------------------------------------------------------------------ */ 8242 /* Function: ipf_nat_cmp_rules */ 8243 /* Returns: int - 0 == success, else rules do not match. */ 8244 /* Parameters: n1(I) - first rule to compare */ 8245 /* n2(I) - first rule to compare */ 8246 /* */ 8247 /* Compare two rules using pointers to each rule. A straight bcmp will not */ 8248 /* work as some fields (such as in_dst, in_pkts) actually do change once */ 8249 /* the rule has been loaded into the kernel. Whilst this function returns */ 8250 /* various non-zero returns, they're strictly to aid in debugging. Use of */ 8251 /* this function should simply care if the result is zero or not. */ 8252 /* ------------------------------------------------------------------------ */ 8253 static int ipf_nat_cmp_rules(ipnat_t * n1,ipnat_t * n2)8254 ipf_nat_cmp_rules(ipnat_t *n1, ipnat_t *n2) 8255 { 8256 if (n1->in_size != n2->in_size) 8257 return (1); 8258 8259 if (bcmp((char *)&n1->in_v, (char *)&n2->in_v, 8260 offsetof(ipnat_t, in_ndst) - offsetof(ipnat_t, in_v)) != 0) 8261 return (2); 8262 8263 if (bcmp((char *)&n1->in_tuc, (char *)&n2->in_tuc, 8264 n1->in_size - offsetof(ipnat_t, in_tuc)) != 0) 8265 return (3); 8266 if (n1->in_ndst.na_atype != n2->in_ndst.na_atype) 8267 return (5); 8268 if (n1->in_ndst.na_function != n2->in_ndst.na_function) 8269 return (6); 8270 if (bcmp((char *)&n1->in_ndst.na_addr, (char *)&n2->in_ndst.na_addr, 8271 sizeof(n1->in_ndst.na_addr))) 8272 return (7); 8273 if (n1->in_nsrc.na_atype != n2->in_nsrc.na_atype) 8274 return (8); 8275 if (n1->in_nsrc.na_function != n2->in_nsrc.na_function) 8276 return (9); 8277 if (bcmp((char *)&n1->in_nsrc.na_addr, (char *)&n2->in_nsrc.na_addr, 8278 sizeof(n1->in_nsrc.na_addr))) 8279 return (10); 8280 if (n1->in_odst.na_atype != n2->in_odst.na_atype) 8281 return (11); 8282 if (n1->in_odst.na_function != n2->in_odst.na_function) 8283 return (12); 8284 if (bcmp((char *)&n1->in_odst.na_addr, (char *)&n2->in_odst.na_addr, 8285 sizeof(n1->in_odst.na_addr))) 8286 return (13); 8287 if (n1->in_osrc.na_atype != n2->in_osrc.na_atype) 8288 return (14); 8289 if (n1->in_osrc.na_function != n2->in_osrc.na_function) 8290 return (15); 8291 if (bcmp((char *)&n1->in_osrc.na_addr, (char *)&n2->in_osrc.na_addr, 8292 sizeof(n1->in_osrc.na_addr))) 8293 return (16); 8294 return (0); 8295 } 8296 8297 8298 /* ------------------------------------------------------------------------ */ 8299 /* Function: ipf_nat_rule_init */ 8300 /* Returns: int - 0 == success, else rules do not match. */ 8301 /* Parameters: softc(I) - pointer to soft context main structure */ 8302 /* softn(I) - pointer to NAT context structure */ 8303 /* n(I) - first rule to compare */ 8304 /* */ 8305 /* ------------------------------------------------------------------------ */ 8306 static int ipf_nat_rule_init(ipf_main_softc_t * softc,ipf_nat_softc_t * softn,ipnat_t * n)8307 ipf_nat_rule_init(ipf_main_softc_t *softc, ipf_nat_softc_t *softn, 8308 ipnat_t *n) 8309 { 8310 int error = 0; 8311 8312 if ((n->in_flags & IPN_SIPRANGE) != 0) 8313 n->in_nsrcatype = FRI_RANGE; 8314 8315 if ((n->in_flags & IPN_DIPRANGE) != 0) 8316 n->in_ndstatype = FRI_RANGE; 8317 8318 if ((n->in_flags & IPN_SPLIT) != 0) 8319 n->in_ndstatype = FRI_SPLIT; 8320 8321 if ((n->in_redir & (NAT_MAP|NAT_REWRITE|NAT_DIVERTUDP)) != 0) 8322 n->in_spnext = n->in_spmin; 8323 8324 if ((n->in_redir & (NAT_REWRITE|NAT_DIVERTUDP)) != 0) { 8325 n->in_dpnext = n->in_dpmin; 8326 } else if (n->in_redir == NAT_REDIRECT) { 8327 n->in_dpnext = n->in_dpmin; 8328 } 8329 8330 n->in_stepnext = 0; 8331 8332 switch (n->in_v[0]) 8333 { 8334 case 4 : 8335 error = ipf_nat_ruleaddrinit(softc, softn, n); 8336 if (error != 0) 8337 return (error); 8338 break; 8339 #ifdef USE_INET6 8340 case 6 : 8341 error = ipf_nat6_ruleaddrinit(softc, softn, n); 8342 if (error != 0) 8343 return (error); 8344 break; 8345 #endif 8346 default : 8347 break; 8348 } 8349 8350 if (n->in_redir == (NAT_DIVERTUDP|NAT_MAP)) { 8351 /* 8352 * Prerecord whether or not the destination of the divert 8353 * is local or not to the interface the packet is going 8354 * to be sent out. 8355 */ 8356 n->in_dlocal = ipf_deliverlocal(softc, n->in_v[1], 8357 n->in_ifps[1], &n->in_ndstip6); 8358 } 8359 8360 return (error); 8361 } 8362 8363 8364 /* ------------------------------------------------------------------------ */ 8365 /* Function: ipf_nat_rule_fini */ 8366 /* Returns: int - 0 == success, else rules do not match. */ 8367 /* Parameters: softc(I) - pointer to soft context main structure */ 8368 /* n(I) - rule to work on */ 8369 /* */ 8370 /* This function is used to release any objects that were referenced during */ 8371 /* the rule initialisation. This is useful both when free'ing the rule and */ 8372 /* when handling ioctls that need to initialise these fields but not */ 8373 /* actually use them after the ioctl processing has finished. */ 8374 /* ------------------------------------------------------------------------ */ 8375 static void ipf_nat_rule_fini(ipf_main_softc_t * softc,ipnat_t * n)8376 ipf_nat_rule_fini(ipf_main_softc_t *softc, ipnat_t *n) 8377 { 8378 if (n->in_odst.na_atype == FRI_LOOKUP && n->in_odst.na_ptr != NULL) 8379 ipf_lookup_deref(softc, n->in_odst.na_type, n->in_odst.na_ptr); 8380 8381 if (n->in_osrc.na_atype == FRI_LOOKUP && n->in_osrc.na_ptr != NULL) 8382 ipf_lookup_deref(softc, n->in_osrc.na_type, n->in_osrc.na_ptr); 8383 8384 if (n->in_ndst.na_atype == FRI_LOOKUP && n->in_ndst.na_ptr != NULL) 8385 ipf_lookup_deref(softc, n->in_ndst.na_type, n->in_ndst.na_ptr); 8386 8387 if (n->in_nsrc.na_atype == FRI_LOOKUP && n->in_nsrc.na_ptr != NULL) 8388 ipf_lookup_deref(softc, n->in_nsrc.na_type, n->in_nsrc.na_ptr); 8389 8390 if (n->in_divmp != NULL) 8391 FREE_MB_T(n->in_divmp); 8392 } 8393