xref: /freebsd/contrib/unbound/daemon/acl_list.c (revision 9268022b74279434ed6300244e3f977e56a8ceb5)
1 /*
2  * daemon/acl_list.h - client access control storage for the server.
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 /**
37  * \file
38  *
39  * This file helps the server keep out queries from outside sources, that
40  * should not be answered.
41  */
42 #include "config.h"
43 #include "daemon/acl_list.h"
44 #include "util/regional.h"
45 #include "util/log.h"
46 #include "util/config_file.h"
47 #include "util/net_help.h"
48 
49 struct acl_list*
50 acl_list_create(void)
51 {
52 	struct acl_list* acl = (struct acl_list*)calloc(1,
53 		sizeof(struct acl_list));
54 	if(!acl)
55 		return NULL;
56 	acl->region = regional_create();
57 	if(!acl->region) {
58 		acl_list_delete(acl);
59 		return NULL;
60 	}
61 	return acl;
62 }
63 
64 void
65 acl_list_delete(struct acl_list* acl)
66 {
67 	if(!acl)
68 		return;
69 	regional_destroy(acl->region);
70 	free(acl);
71 }
72 
73 /** insert new address into acl_list structure */
74 static int
75 acl_list_insert(struct acl_list* acl, struct sockaddr_storage* addr,
76 	socklen_t addrlen, int net, enum acl_access control,
77 	int complain_duplicates)
78 {
79 	struct acl_addr* node = regional_alloc(acl->region,
80 		sizeof(struct acl_addr));
81 	if(!node)
82 		return 0;
83 	node->control = control;
84 	if(!addr_tree_insert(&acl->tree, &node->node, addr, addrlen, net)) {
85 		if(complain_duplicates)
86 			verbose(VERB_QUERY, "duplicate acl address ignored.");
87 	}
88 	return 1;
89 }
90 
91 /** apply acl_list string */
92 static int
93 acl_list_str_cfg(struct acl_list* acl, const char* str, const char* s2,
94 	int complain_duplicates)
95 {
96 	struct sockaddr_storage addr;
97 	int net;
98 	socklen_t addrlen;
99 	enum acl_access control;
100 	if(strcmp(s2, "allow") == 0)
101 		control = acl_allow;
102 	else if(strcmp(s2, "deny") == 0)
103 		control = acl_deny;
104 	else if(strcmp(s2, "refuse") == 0)
105 		control = acl_refuse;
106 	else if(strcmp(s2, "deny_non_local") == 0)
107 		control = acl_deny_non_local;
108 	else if(strcmp(s2, "refuse_non_local") == 0)
109 		control = acl_refuse_non_local;
110 	else if(strcmp(s2, "allow_snoop") == 0)
111 		control = acl_allow_snoop;
112 	else {
113 		log_err("access control type %s unknown", str);
114 		return 0;
115 	}
116 	if(!netblockstrtoaddr(str, UNBOUND_DNS_PORT, &addr, &addrlen, &net)) {
117 		log_err("cannot parse access control: %s %s", str, s2);
118 		return 0;
119 	}
120 	if(!acl_list_insert(acl, &addr, addrlen, net, control,
121 		complain_duplicates)) {
122 		log_err("out of memory");
123 		return 0;
124 	}
125 	return 1;
126 }
127 
128 /** read acl_list config */
129 static int
130 read_acl_list(struct acl_list* acl, struct config_file* cfg)
131 {
132 	struct config_str2list* p;
133 	for(p = cfg->acls; p; p = p->next) {
134 		log_assert(p->str && p->str2);
135 		if(!acl_list_str_cfg(acl, p->str, p->str2, 1))
136 			return 0;
137 	}
138 	return 1;
139 }
140 
141 int
142 acl_list_apply_cfg(struct acl_list* acl, struct config_file* cfg)
143 {
144 	regional_free_all(acl->region);
145 	addr_tree_init(&acl->tree);
146 	if(!read_acl_list(acl, cfg))
147 		return 0;
148 	/* insert defaults, with '0' to ignore them if they are duplicates */
149 	if(!acl_list_str_cfg(acl, "0.0.0.0/0", "refuse", 0))
150 		return 0;
151 	if(!acl_list_str_cfg(acl, "127.0.0.0/8", "allow", 0))
152 		return 0;
153 	if(cfg->do_ip6) {
154 		if(!acl_list_str_cfg(acl, "::0/0", "refuse", 0))
155 			return 0;
156 		if(!acl_list_str_cfg(acl, "::1", "allow", 0))
157 			return 0;
158 		if(!acl_list_str_cfg(acl, "::ffff:127.0.0.1", "allow", 0))
159 			return 0;
160 	}
161 	addr_tree_init_parents(&acl->tree);
162 	return 1;
163 }
164 
165 enum acl_access
166 acl_list_lookup(struct acl_list* acl, struct sockaddr_storage* addr,
167         socklen_t addrlen)
168 {
169 	struct acl_addr* r = (struct acl_addr*)addr_tree_lookup(&acl->tree,
170 		addr, addrlen);
171 	if(r) return r->control;
172 	return acl_deny;
173 }
174 
175 size_t
176 acl_list_get_mem(struct acl_list* acl)
177 {
178 	if(!acl) return 0;
179 	return sizeof(*acl) + regional_get_mem(acl->region);
180 }
181