xref: /freebsd/sys/netinet/libalias/alias.c (revision edca4938f74db18d091868237592abbf7e718669)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2001 Charles Mott <cm@linktel.net>
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31 
32 /*
33     Alias.c provides supervisory control for the functions of the
34     packet aliasing software.  It consists of routines to monitor
35     TCP connection state, protocol-specific aliasing routines,
36     fragment handling and the following outside world functional
37     interfaces: SaveFragmentPtr, GetFragmentPtr, FragmentAliasIn,
38     PacketAliasIn and PacketAliasOut.
39 
40     The other C program files are briefly described. The data
41     structure framework which holds information needed to translate
42     packets is encapsulated in alias_db.c.  Data is accessed by
43     function calls, so other segments of the program need not know
44     about the underlying data structures.  Alias_ftp.c contains
45     special code for modifying the ftp PORT command used to establish
46     data connections, while alias_irc.c does the same for IRC
47     DCC. Alias_util.c contains a few utility routines.
48 
49     Version 1.0 August, 1996  (cjm)
50 
51     Version 1.1 August 20, 1996  (cjm)
52 	PPP host accepts incoming connections for ports 0 to 1023.
53 	(Gary Roberts pointed out the need to handle incoming
54 	 connections.)
55 
56     Version 1.2 September 7, 1996 (cjm)
57 	Fragment handling error in alias_db.c corrected.
58 	(Tom Torrance helped fix this problem.)
59 
60     Version 1.4 September 16, 1996 (cjm)
61 	- A more generalized method for handling incoming
62 	  connections, without the 0-1023 restriction, is
63 	  implemented in alias_db.c
64 	- Improved ICMP support in alias.c.  Traceroute
65 	  packet streams can now be correctly aliased.
66 	- TCP connection closing logic simplified in
67 	  alias.c and now allows for additional 1 minute
68 	  "grace period" after FIN or RST is observed.
69 
70     Version 1.5 September 17, 1996 (cjm)
71 	Corrected error in handling incoming UDP packets with 0 checksum.
72 	(Tom Torrance helped fix this problem.)
73 
74     Version 1.6 September 18, 1996 (cjm)
75 	Simplified ICMP aliasing scheme.  Should now support
76 	traceroute from Win95 as well as FreeBSD.
77 
78     Version 1.7 January 9, 1997 (cjm)
79 	- Out-of-order fragment handling.
80 	- IP checksum error fixed for ftp transfers
81 	  from aliasing host.
82 	- Integer return codes added to all
83 	  aliasing/de-aliasing functions.
84 	- Some obsolete comments cleaned up.
85 	- Differential checksum computations for
86 	  IP header (TCP, UDP and ICMP were already
87 	  differential).
88 
89     Version 2.1 May 1997 (cjm)
90 	- Added support for outgoing ICMP error
91 	  messages.
92 	- Added two functions PacketAliasIn2()
93 	  and PacketAliasOut2() for dynamic address
94 	  control (e.g. round-robin allocation of
95 	  incoming packets).
96 
97     Version 2.2 July 1997 (cjm)
98 	- Rationalized API function names to begin
99 	  with "PacketAlias..."
100 	- Eliminated PacketAliasIn2() and
101 	  PacketAliasOut2() as poorly conceived.
102 
103     Version 2.3 Dec 1998 (dillon)
104 	- Major bounds checking additions, see FreeBSD/CVS
105 
106     Version 3.1 May, 2000 (salander)
107 	- Added hooks to handle PPTP.
108 
109     Version 3.2 July, 2000 (salander and satoh)
110 	- Added PacketUnaliasOut routine.
111 	- Added hooks to handle RTSP/RTP.
112 
113     See HISTORY file for additional revisions.
114 */
115 
116 #ifdef _KERNEL
117 #include <sys/param.h>
118 #include <sys/systm.h>
119 #include <sys/mbuf.h>
120 #include <sys/sysctl.h>
121 #else
122 #include <sys/types.h>
123 #include <stdlib.h>
124 #include <stdio.h>
125 #include <ctype.h>
126 #include <dlfcn.h>
127 #include <errno.h>
128 #include <string.h>
129 #endif
130 
131 #include <netinet/in_systm.h>
132 #include <netinet/in.h>
133 #include <netinet/ip.h>
134 #include <netinet/ip_icmp.h>
135 #include <netinet/tcp.h>
136 #include <netinet/udp.h>
137 
138 #ifdef _KERNEL
139 #include <netinet/libalias/alias.h>
140 #include <netinet/libalias/alias_local.h>
141 #include <netinet/libalias/alias_mod.h>
142 #else
143 #include <err.h>
144 #include "alias.h"
145 #include "alias_local.h"
146 #include "alias_mod.h"
147 #endif
148 
149 /*
150  * Define libalias SYSCTL Node
151  */
152 #ifdef SYSCTL_NODE
153 
154 SYSCTL_DECL(_net_inet);
155 SYSCTL_DECL(_net_inet_ip);
156 SYSCTL_NODE(_net_inet_ip, OID_AUTO, alias, CTLFLAG_RW, NULL, "Libalias sysctl API");
157 
158 #endif
159 
160 static __inline int
161 twowords(void *p)
162 {
163 	uint8_t *c = p;
164 
165 #if BYTE_ORDER == LITTLE_ENDIAN
166 	uint16_t s1 = ((uint16_t)c[1] << 8) + (uint16_t)c[0];
167 	uint16_t s2 = ((uint16_t)c[3] << 8) + (uint16_t)c[2];
168 #else
169 	uint16_t s1 = ((uint16_t)c[0] << 8) + (uint16_t)c[1];
170 	uint16_t s2 = ((uint16_t)c[2] << 8) + (uint16_t)c[3];
171 #endif
172 	return (s1 + s2);
173 }
174 
175 /* TCP Handling Routines
176 
177     TcpMonitorIn()  -- These routines monitor TCP connections, and
178     TcpMonitorOut()    delete a link when a connection is closed.
179 
180 These routines look for SYN, FIN and RST flags to determine when TCP
181 connections open and close.  When a TCP connection closes, the data
182 structure containing packet aliasing information is deleted after
183 a timeout period.
184 */
185 
186 /* Local prototypes */
187 static void	TcpMonitorIn(u_char, struct alias_link *);
188 
189 static void	TcpMonitorOut(u_char, struct alias_link *);
190 
191 
192 static void
193 TcpMonitorIn(u_char th_flags, struct alias_link *lnk)
194 {
195 
196 	switch (GetStateIn(lnk)) {
197 	case ALIAS_TCP_STATE_NOT_CONNECTED:
198 		if (th_flags & TH_RST)
199 			SetStateIn(lnk, ALIAS_TCP_STATE_DISCONNECTED);
200 		else if (th_flags & TH_SYN)
201 			SetStateIn(lnk, ALIAS_TCP_STATE_CONNECTED);
202 		break;
203 	case ALIAS_TCP_STATE_CONNECTED:
204 		if (th_flags & (TH_FIN | TH_RST))
205 			SetStateIn(lnk, ALIAS_TCP_STATE_DISCONNECTED);
206 		break;
207 	}
208 }
209 
210 static void
211 TcpMonitorOut(u_char th_flags, struct alias_link *lnk)
212 {
213 
214 	switch (GetStateOut(lnk)) {
215 	case ALIAS_TCP_STATE_NOT_CONNECTED:
216 		if (th_flags & TH_RST)
217 			SetStateOut(lnk, ALIAS_TCP_STATE_DISCONNECTED);
218 		else if (th_flags & TH_SYN)
219 			SetStateOut(lnk, ALIAS_TCP_STATE_CONNECTED);
220 		break;
221 	case ALIAS_TCP_STATE_CONNECTED:
222 		if (th_flags & (TH_FIN | TH_RST))
223 			SetStateOut(lnk, ALIAS_TCP_STATE_DISCONNECTED);
224 		break;
225 	}
226 }
227 
228 
229 
230 
231 
232 /* Protocol Specific Packet Aliasing Routines
233 
234     IcmpAliasIn(), IcmpAliasIn1(), IcmpAliasIn2()
235     IcmpAliasOut(), IcmpAliasOut1(), IcmpAliasOut2()
236     ProtoAliasIn(), ProtoAliasOut()
237     UdpAliasIn(), UdpAliasOut()
238     TcpAliasIn(), TcpAliasOut()
239 
240 These routines handle protocol specific details of packet aliasing.
241 One may observe a certain amount of repetitive arithmetic in these
242 functions, the purpose of which is to compute a revised checksum
243 without actually summing over the entire data packet, which could be
244 unnecessarily time consuming.
245 
246 The purpose of the packet aliasing routines is to replace the source
247 address of the outgoing packet and then correctly put it back for
248 any incoming packets.  For TCP and UDP, ports are also re-mapped.
249 
250 For ICMP echo/timestamp requests and replies, the following scheme
251 is used: the ID number is replaced by an alias for the outgoing
252 packet.
253 
254 ICMP error messages are handled by looking at the IP fragment
255 in the data section of the message.
256 
257 For TCP and UDP protocols, a port number is chosen for an outgoing
258 packet, and then incoming packets are identified by IP address and
259 port numbers.  For TCP packets, there is additional logic in the event
260 that sequence and ACK numbers have been altered (as in the case for
261 FTP data port commands).
262 
263 The port numbers used by the packet aliasing module are not true
264 ports in the Unix sense.  No sockets are actually bound to ports.
265 They are more correctly thought of as placeholders.
266 
267 All packets go through the aliasing mechanism, whether they come from
268 the gateway machine or other machines on a local area network.
269 */
270 
271 
272 /* Local prototypes */
273 static int	IcmpAliasIn1(struct libalias *, struct ip *);
274 static int	IcmpAliasIn2(struct libalias *, struct ip *);
275 static int	IcmpAliasIn(struct libalias *, struct ip *);
276 
277 static int	IcmpAliasOut1(struct libalias *, struct ip *, int create);
278 static int	IcmpAliasOut2(struct libalias *, struct ip *);
279 static int	IcmpAliasOut(struct libalias *, struct ip *, int create);
280 
281 static int	ProtoAliasIn(struct libalias *la, struct in_addr ip_src,
282 		    struct in_addr *ip_dst, u_char ip_p, u_short *ip_sum);
283 static int	ProtoAliasOut(struct libalias *la, struct in_addr *ip_src,
284 		    struct in_addr ip_dst, u_char ip_p, u_short *ip_sum,
285 		    int create);
286 
287 static int	UdpAliasIn(struct libalias *, struct ip *);
288 static int	UdpAliasOut(struct libalias *, struct ip *, int, int create);
289 
290 static int	TcpAliasIn(struct libalias *, struct ip *);
291 static int	TcpAliasOut(struct libalias *, struct ip *, int, int create);
292 
293 
294 static int
295 IcmpAliasIn1(struct libalias *la, struct ip *pip)
296 {
297 
298 	LIBALIAS_LOCK_ASSERT(la);
299 /*
300     De-alias incoming echo and timestamp replies.
301     Alias incoming echo and timestamp requests.
302 */
303 	struct alias_link *lnk;
304 	struct icmp *ic;
305 
306 	ic = (struct icmp *)ip_next(pip);
307 
308 /* Get source address from ICMP data field and restore original data */
309 	lnk = FindIcmpIn(la, pip->ip_src, pip->ip_dst, ic->icmp_id, 1);
310 	if (lnk != NULL) {
311 		u_short original_id;
312 		int accumulate;
313 
314 		original_id = GetOriginalPort(lnk);
315 
316 /* Adjust ICMP checksum */
317 		accumulate = ic->icmp_id;
318 		accumulate -= original_id;
319 		ADJUST_CHECKSUM(accumulate, ic->icmp_cksum);
320 
321 /* Put original sequence number back in */
322 		ic->icmp_id = original_id;
323 
324 /* Put original address back into IP header */
325 		{
326 			struct in_addr original_address;
327 
328 			original_address = GetOriginalAddress(lnk);
329 			DifferentialChecksum(&pip->ip_sum,
330 			    &original_address, &pip->ip_dst, 2);
331 			pip->ip_dst = original_address;
332 		}
333 
334 		return (PKT_ALIAS_OK);
335 	}
336 	return (PKT_ALIAS_IGNORED);
337 }
338 
339 static int
340 IcmpAliasIn2(struct libalias *la, struct ip *pip)
341 {
342 
343 	LIBALIAS_LOCK_ASSERT(la);
344 /*
345     Alias incoming ICMP error messages containing
346     IP header and first 64 bits of datagram.
347 */
348 	struct ip *ip;
349 	struct icmp *ic, *ic2;
350 	struct udphdr *ud;
351 	struct tcphdr *tc;
352 	struct alias_link *lnk;
353 
354 	ic = (struct icmp *)ip_next(pip);
355 	ip = &ic->icmp_ip;
356 
357 	ud = (struct udphdr *)ip_next(ip);
358 	tc = (struct tcphdr *)ip_next(ip);
359 	ic2 = (struct icmp *)ip_next(ip);
360 
361 	if (ip->ip_p == IPPROTO_UDP)
362 		lnk = FindUdpTcpIn(la, ip->ip_dst, ip->ip_src,
363 		    ud->uh_dport, ud->uh_sport,
364 		    IPPROTO_UDP, 0);
365 	else if (ip->ip_p == IPPROTO_TCP)
366 		lnk = FindUdpTcpIn(la, ip->ip_dst, ip->ip_src,
367 		    tc->th_dport, tc->th_sport,
368 		    IPPROTO_TCP, 0);
369 	else if (ip->ip_p == IPPROTO_ICMP) {
370 		if (ic2->icmp_type == ICMP_ECHO || ic2->icmp_type == ICMP_TSTAMP)
371 			lnk = FindIcmpIn(la, ip->ip_dst, ip->ip_src, ic2->icmp_id, 0);
372 		else
373 			lnk = NULL;
374 	} else
375 		lnk = NULL;
376 
377 	if (lnk != NULL) {
378 		if (ip->ip_p == IPPROTO_UDP || ip->ip_p == IPPROTO_TCP) {
379 			int accumulate, accumulate2;
380 			struct in_addr original_address;
381 			u_short original_port;
382 
383 			original_address = GetOriginalAddress(lnk);
384 			original_port = GetOriginalPort(lnk);
385 
386 /* Adjust ICMP checksum */
387 			accumulate = twowords(&ip->ip_src);
388 			accumulate -= twowords(&original_address);
389 			accumulate += ud->uh_sport;
390 			accumulate -= original_port;
391 			accumulate2 = accumulate;
392 			accumulate2 += ip->ip_sum;
393 			ADJUST_CHECKSUM(accumulate, ip->ip_sum);
394 			accumulate2 -= ip->ip_sum;
395 			ADJUST_CHECKSUM(accumulate2, ic->icmp_cksum);
396 
397 /* Un-alias address in IP header */
398 			DifferentialChecksum(&pip->ip_sum,
399 			    &original_address, &pip->ip_dst, 2);
400 			pip->ip_dst = original_address;
401 
402 /* Un-alias address and port number of original IP packet
403 fragment contained in ICMP data section */
404 			ip->ip_src = original_address;
405 			ud->uh_sport = original_port;
406 		} else if (ip->ip_p == IPPROTO_ICMP) {
407 			int accumulate, accumulate2;
408 			struct in_addr original_address;
409 			u_short original_id;
410 
411 			original_address = GetOriginalAddress(lnk);
412 			original_id = GetOriginalPort(lnk);
413 
414 /* Adjust ICMP checksum */
415 			accumulate = twowords(&ip->ip_src);
416 			accumulate -= twowords(&original_address);
417 			accumulate += ic2->icmp_id;
418 			accumulate -= original_id;
419 			accumulate2 = accumulate;
420 			accumulate2 += ip->ip_sum;
421 			ADJUST_CHECKSUM(accumulate, ip->ip_sum);
422 			accumulate2 -= ip->ip_sum;
423 			ADJUST_CHECKSUM(accumulate2, ic->icmp_cksum);
424 
425 /* Un-alias address in IP header */
426 			DifferentialChecksum(&pip->ip_sum,
427 			    &original_address, &pip->ip_dst, 2);
428 			pip->ip_dst = original_address;
429 
430 /* Un-alias address of original IP packet and sequence number of
431    embedded ICMP datagram */
432 			ip->ip_src = original_address;
433 			ic2->icmp_id = original_id;
434 		}
435 		return (PKT_ALIAS_OK);
436 	}
437 	return (PKT_ALIAS_IGNORED);
438 }
439 
440 
441 static int
442 IcmpAliasIn(struct libalias *la, struct ip *pip)
443 {
444 	int iresult;
445 	struct icmp *ic;
446 
447 	LIBALIAS_LOCK_ASSERT(la);
448 /* Return if proxy-only mode is enabled */
449 	if (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY)
450 		return (PKT_ALIAS_OK);
451 
452 	ic = (struct icmp *)ip_next(pip);
453 
454 	iresult = PKT_ALIAS_IGNORED;
455 	switch (ic->icmp_type) {
456 	case ICMP_ECHOREPLY:
457 	case ICMP_TSTAMPREPLY:
458 		if (ic->icmp_code == 0) {
459 			iresult = IcmpAliasIn1(la, pip);
460 		}
461 		break;
462 	case ICMP_UNREACH:
463 	case ICMP_SOURCEQUENCH:
464 	case ICMP_TIMXCEED:
465 	case ICMP_PARAMPROB:
466 		iresult = IcmpAliasIn2(la, pip);
467 		break;
468 	case ICMP_ECHO:
469 	case ICMP_TSTAMP:
470 		iresult = IcmpAliasIn1(la, pip);
471 		break;
472 	}
473 	return (iresult);
474 }
475 
476 
477 static int
478 IcmpAliasOut1(struct libalias *la, struct ip *pip, int create)
479 {
480 /*
481     Alias outgoing echo and timestamp requests.
482     De-alias outgoing echo and timestamp replies.
483 */
484 	struct alias_link *lnk;
485 	struct icmp *ic;
486 
487 	LIBALIAS_LOCK_ASSERT(la);
488 	ic = (struct icmp *)ip_next(pip);
489 
490 /* Save overwritten data for when echo packet returns */
491 	lnk = FindIcmpOut(la, pip->ip_src, pip->ip_dst, ic->icmp_id, create);
492 	if (lnk != NULL) {
493 		u_short alias_id;
494 		int accumulate;
495 
496 		alias_id = GetAliasPort(lnk);
497 
498 /* Since data field is being modified, adjust ICMP checksum */
499 		accumulate = ic->icmp_id;
500 		accumulate -= alias_id;
501 		ADJUST_CHECKSUM(accumulate, ic->icmp_cksum);
502 
503 /* Alias sequence number */
504 		ic->icmp_id = alias_id;
505 
506 /* Change source address */
507 		{
508 			struct in_addr alias_address;
509 
510 			alias_address = GetAliasAddress(lnk);
511 			DifferentialChecksum(&pip->ip_sum,
512 			    &alias_address, &pip->ip_src, 2);
513 			pip->ip_src = alias_address;
514 		}
515 
516 		return (PKT_ALIAS_OK);
517 	}
518 	return (PKT_ALIAS_IGNORED);
519 }
520 
521 
522 static int
523 IcmpAliasOut2(struct libalias *la, struct ip *pip)
524 {
525 /*
526     Alias outgoing ICMP error messages containing
527     IP header and first 64 bits of datagram.
528 */
529 	struct ip *ip;
530 	struct icmp *ic, *ic2;
531 	struct udphdr *ud;
532 	struct tcphdr *tc;
533 	struct alias_link *lnk;
534 
535 	LIBALIAS_LOCK_ASSERT(la);
536 	ic = (struct icmp *)ip_next(pip);
537 	ip = &ic->icmp_ip;
538 
539 	ud = (struct udphdr *)ip_next(ip);
540 	tc = (struct tcphdr *)ip_next(ip);
541 	ic2 = (struct icmp *)ip_next(ip);
542 
543 	if (ip->ip_p == IPPROTO_UDP)
544 		lnk = FindUdpTcpOut(la, ip->ip_dst, ip->ip_src,
545 		    ud->uh_dport, ud->uh_sport,
546 		    IPPROTO_UDP, 0);
547 	else if (ip->ip_p == IPPROTO_TCP)
548 		lnk = FindUdpTcpOut(la, ip->ip_dst, ip->ip_src,
549 		    tc->th_dport, tc->th_sport,
550 		    IPPROTO_TCP, 0);
551 	else if (ip->ip_p == IPPROTO_ICMP) {
552 		if (ic2->icmp_type == ICMP_ECHO || ic2->icmp_type == ICMP_TSTAMP)
553 			lnk = FindIcmpOut(la, ip->ip_dst, ip->ip_src, ic2->icmp_id, 0);
554 		else
555 			lnk = NULL;
556 	} else
557 		lnk = NULL;
558 
559 	if (lnk != NULL) {
560 		if (ip->ip_p == IPPROTO_UDP || ip->ip_p == IPPROTO_TCP) {
561 			int accumulate;
562 			struct in_addr alias_address;
563 			u_short alias_port;
564 
565 			alias_address = GetAliasAddress(lnk);
566 			alias_port = GetAliasPort(lnk);
567 
568 /* Adjust ICMP checksum */
569 			accumulate = twowords(&ip->ip_dst);
570 			accumulate -= twowords(&alias_address);
571 			accumulate += ud->uh_dport;
572 			accumulate -= alias_port;
573 			ADJUST_CHECKSUM(accumulate, ic->icmp_cksum);
574 
575 /*
576  * Alias address in IP header if it comes from the host
577  * the original TCP/UDP packet was destined for.
578  */
579 			if (pip->ip_src.s_addr == ip->ip_dst.s_addr) {
580 				DifferentialChecksum(&pip->ip_sum,
581 				    &alias_address, &pip->ip_src, 2);
582 				pip->ip_src = alias_address;
583 			}
584 /* Alias address and port number of original IP packet
585 fragment contained in ICMP data section */
586 			ip->ip_dst = alias_address;
587 			ud->uh_dport = alias_port;
588 		} else if (ip->ip_p == IPPROTO_ICMP) {
589 			int accumulate;
590 			struct in_addr alias_address;
591 			u_short alias_id;
592 
593 			alias_address = GetAliasAddress(lnk);
594 			alias_id = GetAliasPort(lnk);
595 
596 /* Adjust ICMP checksum */
597 			accumulate = twowords(&ip->ip_dst);
598 			accumulate -= twowords(&alias_address);
599 			accumulate += ic2->icmp_id;
600 			accumulate -= alias_id;
601 			ADJUST_CHECKSUM(accumulate, ic->icmp_cksum);
602 
603 /*
604  * Alias address in IP header if it comes from the host
605  * the original ICMP message was destined for.
606  */
607 			if (pip->ip_src.s_addr == ip->ip_dst.s_addr) {
608 				DifferentialChecksum(&pip->ip_sum,
609 				    &alias_address, &pip->ip_src, 2);
610 				pip->ip_src = alias_address;
611 			}
612 /* Alias address of original IP packet and sequence number of
613    embedded ICMP datagram */
614 			ip->ip_dst = alias_address;
615 			ic2->icmp_id = alias_id;
616 		}
617 		return (PKT_ALIAS_OK);
618 	}
619 	return (PKT_ALIAS_IGNORED);
620 }
621 
622 
623 static int
624 IcmpAliasOut(struct libalias *la, struct ip *pip, int create)
625 {
626 	int iresult;
627 	struct icmp *ic;
628 
629 	LIBALIAS_LOCK_ASSERT(la);
630 	(void)create;
631 
632 /* Return if proxy-only mode is enabled */
633 	if (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY)
634 		return (PKT_ALIAS_OK);
635 
636 	ic = (struct icmp *)ip_next(pip);
637 
638 	iresult = PKT_ALIAS_IGNORED;
639 	switch (ic->icmp_type) {
640 	case ICMP_ECHO:
641 	case ICMP_TSTAMP:
642 		if (ic->icmp_code == 0) {
643 			iresult = IcmpAliasOut1(la, pip, create);
644 		}
645 		break;
646 	case ICMP_UNREACH:
647 	case ICMP_SOURCEQUENCH:
648 	case ICMP_TIMXCEED:
649 	case ICMP_PARAMPROB:
650 		iresult = IcmpAliasOut2(la, pip);
651 		break;
652 	case ICMP_ECHOREPLY:
653 	case ICMP_TSTAMPREPLY:
654 		iresult = IcmpAliasOut1(la, pip, create);
655 	}
656 	return (iresult);
657 }
658 
659 static int
660 ProtoAliasIn(struct libalias *la, struct in_addr ip_src,
661     struct in_addr *ip_dst, u_char ip_p, u_short *ip_sum)
662 {
663 /*
664   Handle incoming IP packets. The
665   only thing which is done in this case is to alias
666   the dest IP address of the packet to our inside
667   machine.
668 */
669 	struct alias_link *lnk;
670 
671 	LIBALIAS_LOCK_ASSERT(la);
672 /* Return if proxy-only mode is enabled */
673 	if (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY)
674 		return (PKT_ALIAS_OK);
675 
676 	lnk = FindProtoIn(la, ip_src, *ip_dst, ip_p);
677 	if (lnk != NULL) {
678 		struct in_addr original_address;
679 
680 		original_address = GetOriginalAddress(lnk);
681 
682 /* Restore original IP address */
683 		DifferentialChecksum(ip_sum,
684 		    &original_address, ip_dst, 2);
685 		*ip_dst = original_address;
686 
687 		return (PKT_ALIAS_OK);
688 	}
689 	return (PKT_ALIAS_IGNORED);
690 }
691 
692 static int
693 ProtoAliasOut(struct libalias *la, struct in_addr *ip_src,
694     struct in_addr ip_dst, u_char ip_p, u_short *ip_sum, int create)
695 {
696 /*
697   Handle outgoing IP packets. The
698   only thing which is done in this case is to alias
699   the source IP address of the packet.
700 */
701 	struct alias_link *lnk;
702 
703 	LIBALIAS_LOCK_ASSERT(la);
704 
705 /* Return if proxy-only mode is enabled */
706 	if (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY)
707 		return (PKT_ALIAS_OK);
708 
709 	if (!create)
710 		return (PKT_ALIAS_IGNORED);
711 
712 	lnk = FindProtoOut(la, *ip_src, ip_dst, ip_p);
713 	if (lnk != NULL) {
714 		struct in_addr alias_address;
715 
716 		alias_address = GetAliasAddress(lnk);
717 
718 /* Change source address */
719 		DifferentialChecksum(ip_sum,
720 		    &alias_address, ip_src, 2);
721 		*ip_src = alias_address;
722 
723 		return (PKT_ALIAS_OK);
724 	}
725 	return (PKT_ALIAS_IGNORED);
726 }
727 
728 
729 static int
730 UdpAliasIn(struct libalias *la, struct ip *pip)
731 {
732 	struct udphdr *ud;
733 	struct alias_link *lnk;
734 
735 	LIBALIAS_LOCK_ASSERT(la);
736 
737 	ud = (struct udphdr *)ip_next(pip);
738 
739 	lnk = FindUdpTcpIn(la, pip->ip_src, pip->ip_dst,
740 	    ud->uh_sport, ud->uh_dport,
741 	    IPPROTO_UDP, !(la->packetAliasMode & PKT_ALIAS_PROXY_ONLY));
742 	if (lnk != NULL) {
743 		struct in_addr alias_address;
744 		struct in_addr original_address;
745 		struct in_addr proxy_address;
746 		u_short alias_port;
747 		u_short proxy_port;
748 		int accumulate;
749 		int error;
750 		struct alias_data ad = {
751 			.lnk = lnk,
752 			.oaddr = &original_address,
753 			.aaddr = &alias_address,
754 			.aport = &alias_port,
755 			.sport = &ud->uh_sport,
756 			.dport = &ud->uh_dport,
757 			.maxpktsize = 0
758 		};
759 
760 		alias_address = GetAliasAddress(lnk);
761 		original_address = GetOriginalAddress(lnk);
762 		proxy_address = GetProxyAddress(lnk);
763 		alias_port = ud->uh_dport;
764 		ud->uh_dport = GetOriginalPort(lnk);
765 		proxy_port = GetProxyPort(lnk);
766 
767 		/* Walk out chain. */
768 		error = find_handler(IN, UDP, la, pip, &ad);
769 		/* If we cannot figure out the packet, ignore it. */
770 		if (error < 0)
771 			return (PKT_ALIAS_IGNORED);
772 
773 /* If UDP checksum is not zero, then adjust since destination port */
774 /* is being unaliased and destination address is being altered.    */
775 		if (ud->uh_sum != 0) {
776 			accumulate = alias_port;
777 			accumulate -= ud->uh_dport;
778 			accumulate += twowords(&alias_address);
779 			accumulate -= twowords(&original_address);
780 
781 /* If this is a proxy packet, modify checksum because of source change.*/
782         		if (proxy_port != 0) {
783 		                accumulate += ud->uh_sport;
784 		                accumulate -= proxy_port;
785 	                }
786 
787 	                if (proxy_address.s_addr != 0) {
788 				accumulate += twowords(&pip->ip_src);
789 				accumulate -= twowords(&proxy_address);
790 	                }
791 
792 			ADJUST_CHECKSUM(accumulate, ud->uh_sum);
793 		}
794 /* XXX: Could the two if's below be concatenated to one ? */
795 /* Restore source port and/or address in case of proxying*/
796 
797     		if (proxy_port != 0)
798         		ud->uh_sport = proxy_port;
799 
800     		if (proxy_address.s_addr != 0) {
801         		DifferentialChecksum(&pip->ip_sum,
802                 	    &proxy_address, &pip->ip_src, 2);
803 	        	pip->ip_src = proxy_address;
804     		}
805 
806 /* Restore original IP address */
807 		DifferentialChecksum(&pip->ip_sum,
808 		    &original_address, &pip->ip_dst, 2);
809 		pip->ip_dst = original_address;
810 
811 		return (PKT_ALIAS_OK);
812 	}
813 	return (PKT_ALIAS_IGNORED);
814 }
815 
816 static int
817 UdpAliasOut(struct libalias *la, struct ip *pip, int maxpacketsize, int create)
818 {
819 	struct udphdr *ud;
820 	struct alias_link *lnk;
821 	struct in_addr dest_address;
822 	struct in_addr proxy_server_address;
823 	u_short dest_port;
824 	u_short proxy_server_port;
825 	int proxy_type;
826 	int error;
827 
828 	LIBALIAS_LOCK_ASSERT(la);
829 
830 /* Return if proxy-only mode is enabled and not proxyrule found.*/
831 	ud = (struct udphdr *)ip_next(pip);
832 	proxy_type = ProxyCheck(la, &proxy_server_address,
833 		&proxy_server_port, pip->ip_src, pip->ip_dst,
834 		ud->uh_dport, pip->ip_p);
835 	if (proxy_type == 0 && (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY))
836 		return (PKT_ALIAS_OK);
837 
838 /* If this is a transparent proxy, save original destination,
839  * then alter the destination and adjust checksums */
840 	dest_port = ud->uh_dport;
841 	dest_address = pip->ip_dst;
842 
843 	if (proxy_type != 0) {
844 	        int accumulate;
845 
846 		accumulate = twowords(&pip->ip_dst);
847 		accumulate -= twowords(&proxy_server_address);
848 
849 	        ADJUST_CHECKSUM(accumulate, pip->ip_sum);
850 
851 		if (ud->uh_sum != 0) {
852 			accumulate = twowords(&pip->ip_dst);
853 			accumulate -= twowords(&proxy_server_address);
854     			accumulate += ud->uh_dport;
855 	        	accumulate -= proxy_server_port;
856 	    		ADJUST_CHECKSUM(accumulate, ud->uh_sum);
857 		}
858 	        pip->ip_dst = proxy_server_address;
859 	        ud->uh_dport = proxy_server_port;
860 	}
861 	lnk = FindUdpTcpOut(la, pip->ip_src, pip->ip_dst,
862 	    ud->uh_sport, ud->uh_dport,
863 	    IPPROTO_UDP, create);
864 	if (lnk != NULL) {
865 		u_short alias_port;
866 		struct in_addr alias_address;
867 		struct alias_data ad = {
868 			.lnk = lnk,
869 			.oaddr = NULL,
870 			.aaddr = &alias_address,
871 			.aport = &alias_port,
872 			.sport = &ud->uh_sport,
873 			.dport = &ud->uh_dport,
874 			.maxpktsize = 0
875 		};
876 
877 /* Save original destination address, if this is a proxy packet.
878  * Also modify packet to include destination encoding.  This may
879  * change the size of IP header. */
880 		if (proxy_type != 0) {
881 	                SetProxyPort(lnk, dest_port);
882 	                SetProxyAddress(lnk, dest_address);
883 	                ProxyModify(la, lnk, pip, maxpacketsize, proxy_type);
884 	                ud = (struct udphdr *)ip_next(pip);
885 	        }
886 
887 		alias_address = GetAliasAddress(lnk);
888 		alias_port = GetAliasPort(lnk);
889 
890 		/* Walk out chain. */
891 		error = find_handler(OUT, UDP, la, pip, &ad);
892 
893 /* If UDP checksum is not zero, adjust since source port is */
894 /* being aliased and source address is being altered        */
895 		if (ud->uh_sum != 0) {
896 			int accumulate;
897 
898 			accumulate = ud->uh_sport;
899 			accumulate -= alias_port;
900 			accumulate += twowords(&pip->ip_src);
901 			accumulate -= twowords(&alias_address);
902 			ADJUST_CHECKSUM(accumulate, ud->uh_sum);
903 		}
904 /* Put alias port in UDP header */
905 		ud->uh_sport = alias_port;
906 
907 /* Change source address */
908 		DifferentialChecksum(&pip->ip_sum,
909 		    &alias_address, &pip->ip_src, 2);
910 		pip->ip_src = alias_address;
911 
912 		return (PKT_ALIAS_OK);
913 	}
914 	return (PKT_ALIAS_IGNORED);
915 }
916 
917 
918 
919 static int
920 TcpAliasIn(struct libalias *la, struct ip *pip)
921 {
922 	struct tcphdr *tc;
923 	struct alias_link *lnk;
924 
925 	LIBALIAS_LOCK_ASSERT(la);
926 	tc = (struct tcphdr *)ip_next(pip);
927 
928 	lnk = FindUdpTcpIn(la, pip->ip_src, pip->ip_dst,
929 	    tc->th_sport, tc->th_dport,
930 	    IPPROTO_TCP,
931 	    !(la->packetAliasMode & PKT_ALIAS_PROXY_ONLY));
932 	if (lnk != NULL) {
933 		struct in_addr alias_address;
934 		struct in_addr original_address;
935 		struct in_addr proxy_address;
936 		u_short alias_port;
937 		u_short proxy_port;
938 		int accumulate, error;
939 
940 		/*
941 		 * The init of MANY vars is a bit below, but aliashandlepptpin
942 		 * seems to need the destination port that came within the
943 		 * packet and not the original one looks below [*].
944 		 */
945 
946 		struct alias_data ad = {
947 			.lnk = lnk,
948 			.oaddr = NULL,
949 			.aaddr = NULL,
950 			.aport = NULL,
951 			.sport = &tc->th_sport,
952 			.dport = &tc->th_dport,
953 			.maxpktsize = 0
954 		};
955 
956 		/* Walk out chain. */
957 		error = find_handler(IN, TCP, la, pip, &ad);
958 
959 		alias_address = GetAliasAddress(lnk);
960 		original_address = GetOriginalAddress(lnk);
961 		proxy_address = GetProxyAddress(lnk);
962 		alias_port = tc->th_dport;
963 		tc->th_dport = GetOriginalPort(lnk);
964 		proxy_port = GetProxyPort(lnk);
965 
966 		/*
967 		 * Look above, if anyone is going to add find_handler AFTER
968 		 * this aliashandlepptpin/point, please redo alias_data too.
969 		 * Uncommenting the piece here below should be enough.
970 		 */
971 #if 0
972 				 struct alias_data ad = {
973 					.lnk = lnk,
974 					.oaddr = &original_address,
975 					.aaddr = &alias_address,
976 					.aport = &alias_port,
977 					.sport = &ud->uh_sport,
978 					.dport = &ud->uh_dport,
979 					.maxpktsize = 0
980 				};
981 
982 				/* Walk out chain. */
983 				error = find_handler(la, pip, &ad);
984 				if (error == EHDNOF)
985 					printf("Protocol handler not found\n");
986 #endif
987 
988 /* Adjust TCP checksum since destination port is being unaliased */
989 /* and destination port is being altered.                        */
990 		accumulate = alias_port;
991 		accumulate -= tc->th_dport;
992 		accumulate += twowords(&alias_address);
993 		accumulate -= twowords(&original_address);
994 
995 /* If this is a proxy, then modify the TCP source port and
996    checksum accumulation */
997 		if (proxy_port != 0) {
998 			accumulate += tc->th_sport;
999 			tc->th_sport = proxy_port;
1000 			accumulate -= tc->th_sport;
1001 			accumulate += twowords(&pip->ip_src);
1002 			accumulate -= twowords(&proxy_address);
1003 		}
1004 /* See if ACK number needs to be modified */
1005 		if (GetAckModified(lnk) == 1) {
1006 			int delta;
1007 
1008 			tc = (struct tcphdr *)ip_next(pip);
1009 			delta = GetDeltaAckIn(tc->th_ack, lnk);
1010 			if (delta != 0) {
1011 				accumulate += twowords(&tc->th_ack);
1012 				tc->th_ack = htonl(ntohl(tc->th_ack) - delta);
1013 				accumulate -= twowords(&tc->th_ack);
1014 			}
1015 		}
1016 		ADJUST_CHECKSUM(accumulate, tc->th_sum);
1017 
1018 /* Restore original IP address */
1019 		accumulate = twowords(&pip->ip_dst);
1020 		pip->ip_dst = original_address;
1021 		accumulate -= twowords(&pip->ip_dst);
1022 
1023 /* If this is a transparent proxy packet, then modify the source
1024    address */
1025 		if (proxy_address.s_addr != 0) {
1026 			accumulate += twowords(&pip->ip_src);
1027 			pip->ip_src = proxy_address;
1028 			accumulate -= twowords(&pip->ip_src);
1029 		}
1030 		ADJUST_CHECKSUM(accumulate, pip->ip_sum);
1031 
1032 /* Monitor TCP connection state */
1033 		tc = (struct tcphdr *)ip_next(pip);
1034 		TcpMonitorIn(tc->th_flags, lnk);
1035 
1036 		return (PKT_ALIAS_OK);
1037 	}
1038 	return (PKT_ALIAS_IGNORED);
1039 }
1040 
1041 static int
1042 TcpAliasOut(struct libalias *la, struct ip *pip, int maxpacketsize, int create)
1043 {
1044 	int proxy_type, error;
1045 	u_short dest_port;
1046 	u_short proxy_server_port;
1047 	struct in_addr dest_address;
1048 	struct in_addr proxy_server_address;
1049 	struct tcphdr *tc;
1050 	struct alias_link *lnk;
1051 
1052 	LIBALIAS_LOCK_ASSERT(la);
1053 	tc = (struct tcphdr *)ip_next(pip);
1054 
1055 	if (create)
1056 		proxy_type = ProxyCheck(la, &proxy_server_address,
1057 		    &proxy_server_port, pip->ip_src, pip->ip_dst,
1058 		    tc->th_dport, pip->ip_p);
1059 	else
1060 		proxy_type = 0;
1061 
1062 	if (proxy_type == 0 && (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY))
1063 		return (PKT_ALIAS_OK);
1064 
1065 /* If this is a transparent proxy, save original destination,
1066    then alter the destination and adjust checksums */
1067 	dest_port = tc->th_dport;
1068 	dest_address = pip->ip_dst;
1069 	if (proxy_type != 0) {
1070 		int accumulate;
1071 
1072 		accumulate = tc->th_dport;
1073 		tc->th_dport = proxy_server_port;
1074 		accumulate -= tc->th_dport;
1075 		accumulate += twowords(&pip->ip_dst);
1076 		accumulate -= twowords(&proxy_server_address);
1077 		ADJUST_CHECKSUM(accumulate, tc->th_sum);
1078 
1079 		accumulate = twowords(&pip->ip_dst);
1080 		pip->ip_dst = proxy_server_address;
1081 		accumulate -= twowords(&pip->ip_dst);
1082 		ADJUST_CHECKSUM(accumulate, pip->ip_sum);
1083 	}
1084 	lnk = FindUdpTcpOut(la, pip->ip_src, pip->ip_dst,
1085 	    tc->th_sport, tc->th_dport,
1086 	    IPPROTO_TCP, create);
1087 	if (lnk == NULL)
1088 		return (PKT_ALIAS_IGNORED);
1089 	if (lnk != NULL) {
1090 		u_short alias_port;
1091 		struct in_addr alias_address;
1092 		int accumulate;
1093 		struct alias_data ad = {
1094 			.lnk = lnk,
1095 			.oaddr = NULL,
1096 			.aaddr = &alias_address,
1097 			.aport = &alias_port,
1098 			.sport = &tc->th_sport,
1099 			.dport = &tc->th_dport,
1100 			.maxpktsize = maxpacketsize
1101 		};
1102 
1103 /* Save original destination address, if this is a proxy packet.
1104    Also modify packet to include destination encoding.  This may
1105    change the size of IP header. */
1106 		if (proxy_type != 0) {
1107 			SetProxyPort(lnk, dest_port);
1108 			SetProxyAddress(lnk, dest_address);
1109 			ProxyModify(la, lnk, pip, maxpacketsize, proxy_type);
1110 			tc = (struct tcphdr *)ip_next(pip);
1111 		}
1112 /* Get alias address and port */
1113 		alias_port = GetAliasPort(lnk);
1114 		alias_address = GetAliasAddress(lnk);
1115 
1116 /* Monitor TCP connection state */
1117 		tc = (struct tcphdr *)ip_next(pip);
1118 		TcpMonitorOut(tc->th_flags, lnk);
1119 
1120 		/* Walk out chain. */
1121 		error = find_handler(OUT, TCP, la, pip, &ad);
1122 
1123 /* Adjust TCP checksum since source port is being aliased */
1124 /* and source address is being altered                    */
1125 		accumulate = tc->th_sport;
1126 		tc->th_sport = alias_port;
1127 		accumulate -= tc->th_sport;
1128 		accumulate += twowords(&pip->ip_src);
1129 		accumulate -= twowords(&alias_address);
1130 
1131 /* Modify sequence number if necessary */
1132 		if (GetAckModified(lnk) == 1) {
1133 			int delta;
1134 
1135 			tc = (struct tcphdr *)ip_next(pip);
1136 			delta = GetDeltaSeqOut(tc->th_seq, lnk);
1137 			if (delta != 0) {
1138 				accumulate += twowords(&tc->th_seq);
1139 				tc->th_seq = htonl(ntohl(tc->th_seq) + delta);
1140 				accumulate -= twowords(&tc->th_seq);
1141 			}
1142 		}
1143 		ADJUST_CHECKSUM(accumulate, tc->th_sum);
1144 
1145 /* Change source address */
1146 		accumulate = twowords(&pip->ip_src);
1147 		pip->ip_src = alias_address;
1148 		accumulate -= twowords(&pip->ip_src);
1149 		ADJUST_CHECKSUM(accumulate, pip->ip_sum);
1150 
1151 		return (PKT_ALIAS_OK);
1152 	}
1153 	return (PKT_ALIAS_IGNORED);
1154 }
1155 
1156 
1157 
1158 
1159 /* Fragment Handling
1160 
1161     FragmentIn()
1162     FragmentOut()
1163 
1164 The packet aliasing module has a limited ability for handling IP
1165 fragments.  If the ICMP, TCP or UDP header is in the first fragment
1166 received, then the ID number of the IP packet is saved, and other
1167 fragments are identified according to their ID number and IP address
1168 they were sent from.  Pointers to unresolved fragments can also be
1169 saved and recalled when a header fragment is seen.
1170 */
1171 
1172 /* Local prototypes */
1173 static int	FragmentIn(struct libalias *la, struct in_addr ip_src,
1174 		    struct in_addr *ip_dst, u_short ip_id, u_short *ip_sum);
1175 static int	FragmentOut(struct libalias *, struct in_addr *ip_src,
1176 		    u_short *ip_sum);
1177 
1178 static int
1179 FragmentIn(struct libalias *la, struct in_addr ip_src, struct in_addr *ip_dst,
1180     u_short ip_id, u_short *ip_sum)
1181 {
1182 	struct alias_link *lnk;
1183 
1184 	LIBALIAS_LOCK_ASSERT(la);
1185 	lnk = FindFragmentIn2(la, ip_src, *ip_dst, ip_id);
1186 	if (lnk != NULL) {
1187 		struct in_addr original_address;
1188 
1189 		GetFragmentAddr(lnk, &original_address);
1190 		DifferentialChecksum(ip_sum,
1191 		    &original_address, ip_dst, 2);
1192 		*ip_dst = original_address;
1193 
1194 		return (PKT_ALIAS_OK);
1195 	}
1196 	return (PKT_ALIAS_UNRESOLVED_FRAGMENT);
1197 }
1198 
1199 static int
1200 FragmentOut(struct libalias *la, struct in_addr *ip_src, u_short *ip_sum)
1201 {
1202 	struct in_addr alias_address;
1203 
1204 	LIBALIAS_LOCK_ASSERT(la);
1205 	alias_address = FindAliasAddress(la, *ip_src);
1206 	DifferentialChecksum(ip_sum,
1207 	    &alias_address, ip_src, 2);
1208 	*ip_src = alias_address;
1209 
1210 	return (PKT_ALIAS_OK);
1211 }
1212 
1213 
1214 
1215 
1216 
1217 
1218 /* Outside World Access
1219 
1220 	PacketAliasSaveFragment()
1221 	PacketAliasGetFragment()
1222 	PacketAliasFragmentIn()
1223 	PacketAliasIn()
1224 	PacketAliasOut()
1225 	PacketUnaliasOut()
1226 
1227 (prototypes in alias.h)
1228 */
1229 
1230 int
1231 LibAliasSaveFragment(struct libalias *la, char *ptr)
1232 {
1233 	int iresult;
1234 	struct alias_link *lnk;
1235 	struct ip *pip;
1236 
1237 	LIBALIAS_LOCK(la);
1238 	pip = (struct ip *)ptr;
1239 	lnk = AddFragmentPtrLink(la, pip->ip_src, pip->ip_id);
1240 	iresult = PKT_ALIAS_ERROR;
1241 	if (lnk != NULL) {
1242 		SetFragmentPtr(lnk, ptr);
1243 		iresult = PKT_ALIAS_OK;
1244 	}
1245 	LIBALIAS_UNLOCK(la);
1246 	return (iresult);
1247 }
1248 
1249 char           *
1250 LibAliasGetFragment(struct libalias *la, char *ptr)
1251 {
1252 	struct alias_link *lnk;
1253 	char *fptr;
1254 	struct ip *pip;
1255 
1256 	LIBALIAS_LOCK(la);
1257 	pip = (struct ip *)ptr;
1258 	lnk = FindFragmentPtr(la, pip->ip_src, pip->ip_id);
1259 	if (lnk != NULL) {
1260 		GetFragmentPtr(lnk, &fptr);
1261 		SetFragmentPtr(lnk, NULL);
1262 		SetExpire(lnk, 0);	/* Deletes link */
1263 	} else
1264 		fptr = NULL;
1265 
1266 	LIBALIAS_UNLOCK(la);
1267 	return (fptr);
1268 }
1269 
1270 void
1271 LibAliasFragmentIn(struct libalias *la, char *ptr,	/* Points to correctly
1272 							 * de-aliased header
1273 							 * fragment */
1274     char *ptr_fragment		/* Points to fragment which must be
1275 				 * de-aliased   */
1276 )
1277 {
1278 	struct ip *pip;
1279 	struct ip *fpip;
1280 
1281 	LIBALIAS_LOCK(la);
1282 	(void)la;
1283 	pip = (struct ip *)ptr;
1284 	fpip = (struct ip *)ptr_fragment;
1285 
1286 	DifferentialChecksum(&fpip->ip_sum,
1287 	    &pip->ip_dst, &fpip->ip_dst, 2);
1288 	fpip->ip_dst = pip->ip_dst;
1289 	LIBALIAS_UNLOCK(la);
1290 }
1291 
1292 /* Local prototypes */
1293 static int
1294 LibAliasOutLocked(struct libalias *la, char *ptr,
1295 		  int maxpacketsize, int create);
1296 static int
1297 LibAliasInLocked(struct libalias *la, char *ptr,
1298 		  int maxpacketsize);
1299 
1300 int
1301 LibAliasIn(struct libalias *la, char *ptr, int maxpacketsize)
1302 {
1303 	int res;
1304 
1305 	LIBALIAS_LOCK(la);
1306 	res = LibAliasInLocked(la, ptr, maxpacketsize);
1307 	LIBALIAS_UNLOCK(la);
1308 	return (res);
1309 }
1310 
1311 static int
1312 LibAliasInLocked(struct libalias *la, char *ptr, int maxpacketsize)
1313 {
1314 	struct in_addr alias_addr;
1315 	struct ip *pip;
1316 	int iresult;
1317 
1318 	if (la->packetAliasMode & PKT_ALIAS_REVERSE) {
1319 		la->packetAliasMode &= ~PKT_ALIAS_REVERSE;
1320 		iresult = LibAliasOutLocked(la, ptr, maxpacketsize, 1);
1321 		la->packetAliasMode |= PKT_ALIAS_REVERSE;
1322 		goto getout;
1323 	}
1324 	HouseKeeping(la);
1325 	ClearCheckNewLink(la);
1326 	pip = (struct ip *)ptr;
1327 	alias_addr = pip->ip_dst;
1328 
1329 	/* Defense against mangled packets */
1330 	if (ntohs(pip->ip_len) > maxpacketsize
1331 	    || (pip->ip_hl << 2) > maxpacketsize) {
1332 		iresult = PKT_ALIAS_IGNORED;
1333 		goto getout;
1334 	}
1335 
1336 	iresult = PKT_ALIAS_IGNORED;
1337 	if ((ntohs(pip->ip_off) & IP_OFFMASK) == 0) {
1338 		switch (pip->ip_p) {
1339 		case IPPROTO_ICMP:
1340 			iresult = IcmpAliasIn(la, pip);
1341 			break;
1342 		case IPPROTO_UDP:
1343 			iresult = UdpAliasIn(la, pip);
1344 			break;
1345 		case IPPROTO_TCP:
1346 			iresult = TcpAliasIn(la, pip);
1347 			break;
1348 #ifdef _KERNEL
1349 		case IPPROTO_SCTP:
1350 		  iresult = SctpAlias(la, pip, SN_TO_LOCAL);
1351 			break;
1352 #endif
1353  		case IPPROTO_GRE: {
1354 			int error;
1355 			struct alias_data ad = {
1356 				.lnk = NULL,
1357 				.oaddr = NULL,
1358 				.aaddr = NULL,
1359 				.aport = NULL,
1360 				.sport = NULL,
1361 				.dport = NULL,
1362 				.maxpktsize = 0
1363 			};
1364 
1365 			/* Walk out chain. */
1366 			error = find_handler(IN, IP, la, pip, &ad);
1367 			if (error ==  0)
1368 				iresult = PKT_ALIAS_OK;
1369 			else
1370 				iresult = ProtoAliasIn(la, pip->ip_src,
1371 				    &pip->ip_dst, pip->ip_p, &pip->ip_sum);
1372 		}
1373  			break;
1374 		default:
1375 			iresult = ProtoAliasIn(la, pip->ip_src, &pip->ip_dst,
1376 			    pip->ip_p, &pip->ip_sum);
1377 			break;
1378 		}
1379 
1380 		if (ntohs(pip->ip_off) & IP_MF) {
1381 			struct alias_link *lnk;
1382 
1383 			lnk = FindFragmentIn1(la, pip->ip_src, alias_addr, pip->ip_id);
1384 			if (lnk != NULL) {
1385 				iresult = PKT_ALIAS_FOUND_HEADER_FRAGMENT;
1386 				SetFragmentAddr(lnk, pip->ip_dst);
1387 			} else {
1388 				iresult = PKT_ALIAS_ERROR;
1389 			}
1390 		}
1391 	} else {
1392 		iresult = FragmentIn(la, pip->ip_src, &pip->ip_dst, pip->ip_id,
1393 		    &pip->ip_sum);
1394 	}
1395 
1396 getout:
1397 	return (iresult);
1398 }
1399 
1400 
1401 
1402 /* Unregistered address ranges */
1403 
1404 /* 10.0.0.0   ->   10.255.255.255 */
1405 #define UNREG_ADDR_A_LOWER 0x0a000000
1406 #define UNREG_ADDR_A_UPPER 0x0affffff
1407 
1408 /* 172.16.0.0  ->  172.31.255.255 */
1409 #define UNREG_ADDR_B_LOWER 0xac100000
1410 #define UNREG_ADDR_B_UPPER 0xac1fffff
1411 
1412 /* 192.168.0.0 -> 192.168.255.255 */
1413 #define UNREG_ADDR_C_LOWER 0xc0a80000
1414 #define UNREG_ADDR_C_UPPER 0xc0a8ffff
1415 
1416 int
1417 LibAliasOut(struct libalias *la, char *ptr, int maxpacketsize)
1418 {
1419 	int res;
1420 
1421 	LIBALIAS_LOCK(la);
1422 	res = LibAliasOutLocked(la, ptr, maxpacketsize, 1);
1423 	LIBALIAS_UNLOCK(la);
1424 	return (res);
1425 }
1426 
1427 int
1428 LibAliasOutTry(struct libalias *la, char *ptr, int maxpacketsize, int create)
1429 {
1430 	int res;
1431 
1432 	LIBALIAS_LOCK(la);
1433 	res = LibAliasOutLocked(la, ptr, maxpacketsize, create);
1434 	LIBALIAS_UNLOCK(la);
1435 	return (res);
1436 }
1437 
1438 static int
1439 LibAliasOutLocked(struct libalias *la, char *ptr,	/* valid IP packet */
1440     int maxpacketsize,		/* How much the packet data may grow (FTP
1441 				 * and IRC inline changes) */
1442     int create                  /* Create new entries ? */
1443 )
1444 {
1445 	int iresult;
1446 	struct in_addr addr_save;
1447 	struct ip *pip;
1448 
1449 	if (la->packetAliasMode & PKT_ALIAS_REVERSE) {
1450 		la->packetAliasMode &= ~PKT_ALIAS_REVERSE;
1451 		iresult = LibAliasInLocked(la, ptr, maxpacketsize);
1452 		la->packetAliasMode |= PKT_ALIAS_REVERSE;
1453 		goto getout;
1454 	}
1455 	HouseKeeping(la);
1456 	ClearCheckNewLink(la);
1457 	pip = (struct ip *)ptr;
1458 
1459 	/* Defense against mangled packets */
1460 	if (ntohs(pip->ip_len) > maxpacketsize
1461 	    || (pip->ip_hl << 2) > maxpacketsize) {
1462 		iresult = PKT_ALIAS_IGNORED;
1463 		goto getout;
1464 	}
1465 
1466 	addr_save = GetDefaultAliasAddress(la);
1467 	if (la->packetAliasMode & PKT_ALIAS_UNREGISTERED_ONLY) {
1468 		u_long addr;
1469 		int iclass;
1470 
1471 		iclass = 0;
1472 		addr = ntohl(pip->ip_src.s_addr);
1473 		if (addr >= UNREG_ADDR_C_LOWER && addr <= UNREG_ADDR_C_UPPER)
1474 			iclass = 3;
1475 		else if (addr >= UNREG_ADDR_B_LOWER && addr <= UNREG_ADDR_B_UPPER)
1476 			iclass = 2;
1477 		else if (addr >= UNREG_ADDR_A_LOWER && addr <= UNREG_ADDR_A_UPPER)
1478 			iclass = 1;
1479 
1480 		if (iclass == 0) {
1481 			SetDefaultAliasAddress(la, pip->ip_src);
1482 		}
1483 	} else if (la->packetAliasMode & PKT_ALIAS_PROXY_ONLY) {
1484 		SetDefaultAliasAddress(la, pip->ip_src);
1485 	}
1486 	iresult = PKT_ALIAS_IGNORED;
1487 	if ((ntohs(pip->ip_off) & IP_OFFMASK) == 0) {
1488 		switch (pip->ip_p) {
1489 		case IPPROTO_ICMP:
1490 			iresult = IcmpAliasOut(la, pip, create);
1491 			break;
1492 		case IPPROTO_UDP:
1493 			iresult = UdpAliasOut(la, pip, maxpacketsize, create);
1494 			break;
1495 		case IPPROTO_TCP:
1496 			iresult = TcpAliasOut(la, pip, maxpacketsize, create);
1497 			break;
1498 #ifdef _KERNEL
1499 		case IPPROTO_SCTP:
1500 		  iresult = SctpAlias(la, pip, SN_TO_GLOBAL);
1501 			break;
1502 #endif
1503 		case IPPROTO_GRE: {
1504 			int error;
1505 			struct alias_data ad = {
1506 				.lnk = NULL,
1507 				.oaddr = NULL,
1508 				.aaddr = NULL,
1509 				.aport = NULL,
1510 				.sport = NULL,
1511 				.dport = NULL,
1512 				.maxpktsize = 0
1513 			};
1514 			/* Walk out chain. */
1515 			error = find_handler(OUT, IP, la, pip, &ad);
1516 			if (error == 0)
1517  				iresult = PKT_ALIAS_OK;
1518  			else
1519  				iresult = ProtoAliasOut(la, &pip->ip_src,
1520 				    pip->ip_dst, pip->ip_p, &pip->ip_sum, create);
1521 		}
1522  			break;
1523 		default:
1524 			iresult = ProtoAliasOut(la, &pip->ip_src,
1525 			    pip->ip_dst, pip->ip_p, &pip->ip_sum, create);
1526 			break;
1527 		}
1528 	} else {
1529 		iresult = FragmentOut(la, &pip->ip_src, &pip->ip_sum);
1530 	}
1531 
1532 	SetDefaultAliasAddress(la, addr_save);
1533 getout:
1534 	return (iresult);
1535 }
1536 
1537 int
1538 LibAliasUnaliasOut(struct libalias *la, char *ptr,	/* valid IP packet */
1539     int maxpacketsize		/* for error checking */
1540 )
1541 {
1542 	struct ip *pip;
1543 	struct icmp *ic;
1544 	struct udphdr *ud;
1545 	struct tcphdr *tc;
1546 	struct alias_link *lnk;
1547 	int iresult = PKT_ALIAS_IGNORED;
1548 
1549 	LIBALIAS_LOCK(la);
1550 	pip = (struct ip *)ptr;
1551 
1552 	/* Defense against mangled packets */
1553 	if (ntohs(pip->ip_len) > maxpacketsize
1554 	    || (pip->ip_hl << 2) > maxpacketsize)
1555 		goto getout;
1556 
1557 	ud = (struct udphdr *)ip_next(pip);
1558 	tc = (struct tcphdr *)ip_next(pip);
1559 	ic = (struct icmp *)ip_next(pip);
1560 
1561 	/* Find a link */
1562 	if (pip->ip_p == IPPROTO_UDP)
1563 		lnk = FindUdpTcpIn(la, pip->ip_dst, pip->ip_src,
1564 		    ud->uh_dport, ud->uh_sport,
1565 		    IPPROTO_UDP, 0);
1566 	else if (pip->ip_p == IPPROTO_TCP)
1567 		lnk = FindUdpTcpIn(la, pip->ip_dst, pip->ip_src,
1568 		    tc->th_dport, tc->th_sport,
1569 		    IPPROTO_TCP, 0);
1570 	else if (pip->ip_p == IPPROTO_ICMP)
1571 		lnk = FindIcmpIn(la, pip->ip_dst, pip->ip_src, ic->icmp_id, 0);
1572 	else
1573 		lnk = NULL;
1574 
1575 	/* Change it from an aliased packet to an unaliased packet */
1576 	if (lnk != NULL) {
1577 		if (pip->ip_p == IPPROTO_UDP || pip->ip_p == IPPROTO_TCP) {
1578 			int accumulate;
1579 			struct in_addr original_address;
1580 			u_short original_port;
1581 
1582 			original_address = GetOriginalAddress(lnk);
1583 			original_port = GetOriginalPort(lnk);
1584 
1585 			/* Adjust TCP/UDP checksum */
1586 			accumulate = twowords(&pip->ip_src);
1587 			accumulate -= twowords(&original_address);
1588 
1589 			if (pip->ip_p == IPPROTO_UDP) {
1590 				accumulate += ud->uh_sport;
1591 				accumulate -= original_port;
1592 				ADJUST_CHECKSUM(accumulate, ud->uh_sum);
1593 			} else {
1594 				accumulate += tc->th_sport;
1595 				accumulate -= original_port;
1596 				ADJUST_CHECKSUM(accumulate, tc->th_sum);
1597 			}
1598 
1599 			/* Adjust IP checksum */
1600 			DifferentialChecksum(&pip->ip_sum,
1601 			    &original_address, &pip->ip_src, 2);
1602 
1603 			/* Un-alias source address and port number */
1604 			pip->ip_src = original_address;
1605 			if (pip->ip_p == IPPROTO_UDP)
1606 				ud->uh_sport = original_port;
1607 			else
1608 				tc->th_sport = original_port;
1609 
1610 			iresult = PKT_ALIAS_OK;
1611 
1612 		} else if (pip->ip_p == IPPROTO_ICMP) {
1613 
1614 			int accumulate;
1615 			struct in_addr original_address;
1616 			u_short original_id;
1617 
1618 			original_address = GetOriginalAddress(lnk);
1619 			original_id = GetOriginalPort(lnk);
1620 
1621 			/* Adjust ICMP checksum */
1622 			accumulate = twowords(&pip->ip_src);
1623 			accumulate -= twowords(&original_address);
1624 			accumulate += ic->icmp_id;
1625 			accumulate -= original_id;
1626 			ADJUST_CHECKSUM(accumulate, ic->icmp_cksum);
1627 
1628 			/* Adjust IP checksum */
1629 			DifferentialChecksum(&pip->ip_sum,
1630 			    &original_address, &pip->ip_src, 2);
1631 
1632 			/* Un-alias source address and port number */
1633 			pip->ip_src = original_address;
1634 			ic->icmp_id = original_id;
1635 
1636 			iresult = PKT_ALIAS_OK;
1637 		}
1638 	}
1639 getout:
1640 	LIBALIAS_UNLOCK(la);
1641 	return (iresult);
1642 
1643 }
1644 
1645 #ifndef _KERNEL
1646 
1647 int
1648 LibAliasRefreshModules(void)
1649 {
1650 	char buf[256], conf[] = "/etc/libalias.conf";
1651 	FILE *fd;
1652 	int i, len;
1653 
1654 	fd = fopen(conf, "r");
1655 	if (fd == NULL)
1656 		err(1, "fopen(%s)", conf);
1657 
1658 	LibAliasUnLoadAllModule();
1659 
1660 	for (;;) {
1661 		fgets(buf, 256, fd);
1662 		if (feof(fd))
1663 		        break;
1664 		len = strlen(buf);
1665 		if (len > 1) {
1666 			for (i = 0; i < len; i++)
1667 				if (!isspace(buf[i]))
1668 					break;
1669 			if (buf[i] == '#')
1670 				continue;
1671 			buf[len - 1] = '\0';
1672 			LibAliasLoadModule(buf);
1673 		}
1674 	}
1675 	fclose(fd);
1676 	return (0);
1677 }
1678 
1679 int
1680 LibAliasLoadModule(char *path)
1681 {
1682 	struct dll *t;
1683 	void *handle;
1684 	struct proto_handler *m;
1685         const char *error;
1686 	moduledata_t *p;
1687 
1688         handle = dlopen (path, RTLD_LAZY);
1689         if (!handle) {
1690 		fprintf(stderr, "%s\n", dlerror());
1691 		return (EINVAL);
1692         }
1693 
1694 	p = dlsym(handle, "alias_mod");
1695         if ((error = dlerror()) != NULL)  {
1696 		fprintf(stderr, "%s\n", dlerror());
1697 		return (EINVAL);
1698         }
1699 
1700 	t = malloc(sizeof(struct dll));
1701 	if (t == NULL)
1702 		return (ENOMEM);
1703 	strncpy(t->name, p->name, DLL_LEN);
1704 	t->handle = handle;
1705 	if (attach_dll(t) == EEXIST) {
1706 		free(t);
1707 		fprintf(stderr, "dll conflict\n");
1708 		return (EEXIST);
1709 	}
1710 
1711         m = dlsym(t->handle, "handlers");
1712         if ((error = dlerror()) != NULL)  {
1713 		fprintf(stderr, "%s\n", error);
1714 		return (EINVAL);
1715 	}
1716 
1717 	LibAliasAttachHandlers(m);
1718 	return (0);
1719 }
1720 
1721 int
1722 LibAliasUnLoadAllModule(void)
1723 {
1724 	struct dll *t;
1725 	struct proto_handler *p;
1726 
1727 	/* Unload all modules then reload everything. */
1728 	while ((p = first_handler()) != NULL) {
1729 		LibAliasDetachHandlers(p);
1730 	}
1731 	while ((t = walk_dll_chain()) != NULL) {
1732 		dlclose(t->handle);
1733 		free(t);
1734 	}
1735 	return (1);
1736 }
1737 
1738 #endif
1739 
1740 #ifdef _KERNEL
1741 /*
1742  * m_megapullup() - this function is a big hack.
1743  * Thankfully, it's only used in ng_nat and ipfw+nat.
1744  *
1745  * It allocates an mbuf with cluster and copies the specified part of the chain
1746  * into cluster, so that it is all contiguous and can be accessed via a plain
1747  * (char *) pointer. This is required, because libalias doesn't know how to
1748  * handle mbuf chains.
1749  *
1750  * On success, m_megapullup returns an mbuf (possibly with cluster) containing
1751  * the input packet, on failure NULL. The input packet is always consumed.
1752  */
1753 struct mbuf *
1754 m_megapullup(struct mbuf *m, int len)
1755 {
1756 	struct mbuf *mcl;
1757 
1758 	if (len > m->m_pkthdr.len)
1759 		goto bad;
1760 
1761 	if (m->m_next == NULL && M_WRITABLE(m))
1762 		return (m);
1763 
1764 	if (len <= MJUMPAGESIZE)
1765 		mcl = m_get2(len, M_NOWAIT, MT_DATA, M_PKTHDR);
1766 	else if (len <= MJUM9BYTES)
1767 		mcl = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, MJUM9BYTES);
1768 	else if (len <= MJUM16BYTES)
1769 		mcl = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, MJUM16BYTES);
1770 	else
1771 		goto bad;
1772 	if (mcl == NULL)
1773 		goto bad;
1774 	m_align(mcl, len);
1775 	m_move_pkthdr(mcl, m);
1776 	m_copydata(m, 0, len, mtod(mcl, caddr_t));
1777 	mcl->m_len = mcl->m_pkthdr.len = len;
1778 	m_freem(m);
1779 
1780 	return (mcl);
1781 bad:
1782 	m_freem(m);
1783 	return (NULL);
1784 }
1785 #endif
1786