xref: /freebsd/sys/net80211/ieee80211_acl.c (revision 3b2324c3a800d7599f348c408f01908d0cef05a0)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2004-2008 Sam Leffler, Errno Consulting
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26  */
27 
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
30 
31 /*
32  * IEEE 802.11 MAC ACL support.
33  *
34  * When this module is loaded the sender address of each auth mgt
35  * frame is passed to the iac_check method and the module indicates
36  * if the frame should be accepted or rejected.  If the policy is
37  * set to ACL_POLICY_OPEN then all frames are accepted w/o checking
38  * the address.  Otherwise, the address is looked up in the database
39  * and if found the frame is either accepted (ACL_POLICY_ALLOW)
40  * or rejected (ACL_POLICY_DENT).
41  */
42 #include "opt_wlan.h"
43 
44 #include <sys/param.h>
45 #include <sys/kernel.h>
46 #include <sys/systm.h>
47 #include <sys/malloc.h>
48 #include <sys/mbuf.h>
49 #include <sys/module.h>
50 #include <sys/queue.h>
51 
52 #include <sys/socket.h>
53 
54 #include <net/if.h>
55 #include <net/if_media.h>
56 #include <net/ethernet.h>
57 #include <net/route.h>
58 
59 #include <net80211/ieee80211_var.h>
60 
61 enum {
62 	ACL_POLICY_OPEN		= 0,	/* open, don't check ACL's */
63 	ACL_POLICY_ALLOW	= 1,	/* allow traffic from MAC */
64 	ACL_POLICY_DENY		= 2,	/* deny traffic from MAC */
65 	/*
66 	 * NB: ACL_POLICY_RADIUS must be the same value as
67 	 *     IEEE80211_MACCMD_POLICY_RADIUS because of the way
68 	 *     acl_getpolicy() works.
69 	 */
70 	ACL_POLICY_RADIUS	= 7,	/* defer to RADIUS ACL server */
71 };
72 
73 #define	ACL_HASHSIZE	32
74 
75 struct acl {
76 	TAILQ_ENTRY(acl)	acl_list;
77 	LIST_ENTRY(acl)		acl_hash;
78 	uint8_t			acl_macaddr[IEEE80211_ADDR_LEN];
79 };
80 struct aclstate {
81 	acl_lock_t		as_lock;
82 	int			as_policy;
83 	uint32_t		as_nacls;
84 	TAILQ_HEAD(, acl)	as_list;	/* list of all ACL's */
85 	LIST_HEAD(, acl)	as_hash[ACL_HASHSIZE];
86 	struct ieee80211vap	*as_vap;
87 };
88 
89 /* simple hash is enough for variation of macaddr */
90 #define	ACL_HASH(addr)	\
91 	(((const uint8_t *)(addr))[IEEE80211_ADDR_LEN - 1] % ACL_HASHSIZE)
92 
93 static MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl");
94 
95 static	int acl_free_all(struct ieee80211vap *);
96 
97 /* number of references from net80211 layer */
98 static	int nrefs = 0;
99 
100 static int
101 acl_attach(struct ieee80211vap *vap)
102 {
103 	struct aclstate *as;
104 
105 	as = (struct aclstate *) IEEE80211_MALLOC(sizeof(struct aclstate),
106 		M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
107 	if (as == NULL)
108 		return 0;
109 	ACL_LOCK_INIT(as, "acl");
110 	TAILQ_INIT(&as->as_list);
111 	as->as_policy = ACL_POLICY_OPEN;
112 	as->as_vap = vap;
113 	vap->iv_as = as;
114 	nrefs++;			/* NB: we assume caller locking */
115 	return 1;
116 }
117 
118 static void
119 acl_detach(struct ieee80211vap *vap)
120 {
121 	struct aclstate *as = vap->iv_as;
122 
123 	KASSERT(nrefs > 0, ("imbalanced attach/detach"));
124 	nrefs--;			/* NB: we assume caller locking */
125 
126 	acl_free_all(vap);
127 	vap->iv_as = NULL;
128 	ACL_LOCK_DESTROY(as);
129 	IEEE80211_FREE(as, M_80211_ACL);
130 }
131 
132 static __inline struct acl *
133 _find_acl(struct aclstate *as, const uint8_t *macaddr)
134 {
135 	struct acl *acl;
136 	int hash;
137 
138 	hash = ACL_HASH(macaddr);
139 	LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
140 		if (IEEE80211_ADDR_EQ(acl->acl_macaddr, macaddr))
141 			return acl;
142 	}
143 	return NULL;
144 }
145 
146 static void
147 _acl_free(struct aclstate *as, struct acl *acl)
148 {
149 	ACL_LOCK_ASSERT(as);
150 
151 	TAILQ_REMOVE(&as->as_list, acl, acl_list);
152 	LIST_REMOVE(acl, acl_hash);
153 	IEEE80211_FREE(acl, M_80211_ACL);
154 	as->as_nacls--;
155 }
156 
157 static int
158 acl_check(struct ieee80211vap *vap, const struct ieee80211_frame *wh)
159 {
160 	struct aclstate *as = vap->iv_as;
161 
162 	switch (as->as_policy) {
163 	case ACL_POLICY_OPEN:
164 	case ACL_POLICY_RADIUS:
165 		return 1;
166 	case ACL_POLICY_ALLOW:
167 		return _find_acl(as, wh->i_addr2) != NULL;
168 	case ACL_POLICY_DENY:
169 		return _find_acl(as, wh->i_addr2) == NULL;
170 	}
171 	return 0;		/* should not happen */
172 }
173 
174 static int
175 acl_add(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
176 {
177 	struct aclstate *as = vap->iv_as;
178 	struct acl *acl, *new;
179 	int hash;
180 
181 	new = (struct acl *) IEEE80211_MALLOC(sizeof(struct acl),
182 	    M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
183 	if (new == NULL) {
184 		IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
185 			"ACL: add %s failed, no memory\n", ether_sprintf(mac));
186 		/* XXX statistic */
187 		return ENOMEM;
188 	}
189 
190 	ACL_LOCK(as);
191 	hash = ACL_HASH(mac);
192 	LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
193 		if (IEEE80211_ADDR_EQ(acl->acl_macaddr, mac)) {
194 			ACL_UNLOCK(as);
195 			IEEE80211_FREE(new, M_80211_ACL);
196 			IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
197 				"ACL: add %s failed, already present\n",
198 				ether_sprintf(mac));
199 			return EEXIST;
200 		}
201 	}
202 	IEEE80211_ADDR_COPY(new->acl_macaddr, mac);
203 	TAILQ_INSERT_TAIL(&as->as_list, new, acl_list);
204 	LIST_INSERT_HEAD(&as->as_hash[hash], new, acl_hash);
205 	as->as_nacls++;
206 	ACL_UNLOCK(as);
207 
208 	IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
209 		"ACL: add %s\n", ether_sprintf(mac));
210 	return 0;
211 }
212 
213 static int
214 acl_remove(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
215 {
216 	struct aclstate *as = vap->iv_as;
217 	struct acl *acl;
218 
219 	ACL_LOCK(as);
220 	acl = _find_acl(as, mac);
221 	if (acl != NULL)
222 		_acl_free(as, acl);
223 	ACL_UNLOCK(as);
224 
225 	IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
226 		"ACL: remove %s%s\n", ether_sprintf(mac),
227 		acl == NULL ? ", not present" : "");
228 
229 	return (acl == NULL ? ENOENT : 0);
230 }
231 
232 static int
233 acl_free_all(struct ieee80211vap *vap)
234 {
235 	struct aclstate *as = vap->iv_as;
236 	struct acl *acl;
237 
238 	IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL, "ACL: %s\n", "free all");
239 
240 	ACL_LOCK(as);
241 	while ((acl = TAILQ_FIRST(&as->as_list)) != NULL)
242 		_acl_free(as, acl);
243 	ACL_UNLOCK(as);
244 
245 	return 0;
246 }
247 
248 static int
249 acl_setpolicy(struct ieee80211vap *vap, int policy)
250 {
251 	struct aclstate *as = vap->iv_as;
252 
253 	IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
254 		"ACL: set policy to %u\n", policy);
255 
256 	switch (policy) {
257 	case IEEE80211_MACCMD_POLICY_OPEN:
258 		as->as_policy = ACL_POLICY_OPEN;
259 		break;
260 	case IEEE80211_MACCMD_POLICY_ALLOW:
261 		as->as_policy = ACL_POLICY_ALLOW;
262 		break;
263 	case IEEE80211_MACCMD_POLICY_DENY:
264 		as->as_policy = ACL_POLICY_DENY;
265 		break;
266 	case IEEE80211_MACCMD_POLICY_RADIUS:
267 		as->as_policy = ACL_POLICY_RADIUS;
268 		break;
269 	default:
270 		return EINVAL;
271 	}
272 	return 0;
273 }
274 
275 static int
276 acl_getpolicy(struct ieee80211vap *vap)
277 {
278 	struct aclstate *as = vap->iv_as;
279 
280 	return as->as_policy;
281 }
282 
283 static int
284 acl_setioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
285 {
286 
287 	return EINVAL;
288 }
289 
290 static int
291 acl_getioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
292 {
293 	struct aclstate *as = vap->iv_as;
294 	struct acl *acl;
295 	struct ieee80211req_maclist *ap;
296 	int error;
297 	uint32_t i, space;
298 
299 	switch (ireq->i_val) {
300 	case IEEE80211_MACCMD_POLICY:
301 		ireq->i_val = as->as_policy;
302 		return 0;
303 	case IEEE80211_MACCMD_LIST:
304 		space = as->as_nacls * IEEE80211_ADDR_LEN;
305 		if (ireq->i_len == 0) {
306 			ireq->i_len = space;	/* return required space */
307 			return 0;		/* NB: must not error */
308 		}
309 		ap = (struct ieee80211req_maclist *) IEEE80211_MALLOC(space,
310 		    M_TEMP, IEEE80211_M_NOWAIT);
311 		if (ap == NULL)
312 			return ENOMEM;
313 		i = 0;
314 		ACL_LOCK(as);
315 		TAILQ_FOREACH(acl, &as->as_list, acl_list) {
316 			IEEE80211_ADDR_COPY(ap[i].ml_macaddr, acl->acl_macaddr);
317 			i++;
318 		}
319 		ACL_UNLOCK(as);
320 		if (ireq->i_len >= space) {
321 			error = copyout(ap, ireq->i_data, space);
322 			ireq->i_len = space;
323 		} else
324 			error = copyout(ap, ireq->i_data, ireq->i_len);
325 		IEEE80211_FREE(ap, M_TEMP);
326 		return error;
327 	}
328 	return EINVAL;
329 }
330 
331 static const struct ieee80211_aclator mac = {
332 	.iac_name	= "mac",
333 	.iac_attach	= acl_attach,
334 	.iac_detach	= acl_detach,
335 	.iac_check	= acl_check,
336 	.iac_add	= acl_add,
337 	.iac_remove	= acl_remove,
338 	.iac_flush	= acl_free_all,
339 	.iac_setpolicy	= acl_setpolicy,
340 	.iac_getpolicy	= acl_getpolicy,
341 	.iac_setioctl	= acl_setioctl,
342 	.iac_getioctl	= acl_getioctl,
343 };
344 IEEE80211_ACL_MODULE(wlan_acl, mac, 1);
345