xref: /freebsd/sys/netpfil/ipfw/nat64/nat64_translate.h (revision 95ee2897e98f5d444f26ed2334cc7c439f9c16c6)
1d8caf56eSAndrey V. Elsukov /*-
2*4d846d26SWarner Losh  * SPDX-License-Identifier: BSD-2-Clause
3002cae78SAndrey V. Elsukov  *
4002cae78SAndrey V. Elsukov  * Copyright (c) 2015-2019 Yandex LLC
5002cae78SAndrey V. Elsukov  * Copyright (c) 2015-2019 Andrey V. Elsukov <ae@FreeBSD.org>
6d8caf56eSAndrey V. Elsukov  *
7d8caf56eSAndrey V. Elsukov  * Redistribution and use in source and binary forms, with or without
8d8caf56eSAndrey V. Elsukov  * modification, are permitted provided that the following conditions
9d8caf56eSAndrey V. Elsukov  * are met:
10d8caf56eSAndrey V. Elsukov  *
11d8caf56eSAndrey V. Elsukov  * 1. Redistributions of source code must retain the above copyright
12d8caf56eSAndrey V. Elsukov  *    notice, this list of conditions and the following disclaimer.
13d8caf56eSAndrey V. Elsukov  * 2. Redistributions in binary form must reproduce the above copyright
14d8caf56eSAndrey V. Elsukov  *    notice, this list of conditions and the following disclaimer in the
15d8caf56eSAndrey V. Elsukov  *    documentation and/or other materials provided with the distribution.
16d8caf56eSAndrey V. Elsukov  *
17d8caf56eSAndrey V. Elsukov  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18d8caf56eSAndrey V. Elsukov  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19d8caf56eSAndrey V. Elsukov  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20d8caf56eSAndrey V. Elsukov  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21d8caf56eSAndrey V. Elsukov  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22d8caf56eSAndrey V. Elsukov  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23d8caf56eSAndrey V. Elsukov  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24d8caf56eSAndrey V. Elsukov  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25d8caf56eSAndrey V. Elsukov  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26d8caf56eSAndrey V. Elsukov  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27d8caf56eSAndrey V. Elsukov  */
28d8caf56eSAndrey V. Elsukov 
29d8caf56eSAndrey V. Elsukov #ifndef	_IP_FW_NAT64_TRANSLATE_H_
30d8caf56eSAndrey V. Elsukov #define	_IP_FW_NAT64_TRANSLATE_H_
31d8caf56eSAndrey V. Elsukov 
32782360deSAndrey V. Elsukov struct nat64_stats {
33782360deSAndrey V. Elsukov 	uint64_t	opcnt64;	/* 6to4 of packets translated */
34782360deSAndrey V. Elsukov 	uint64_t	opcnt46;	/* 4to6 of packets translated */
35782360deSAndrey V. Elsukov 	uint64_t	ofrags;		/* number of fragments generated */
36782360deSAndrey V. Elsukov 	uint64_t	ifrags;		/* number of fragments received */
37782360deSAndrey V. Elsukov 	uint64_t	oerrors;	/* number of output errors */
38782360deSAndrey V. Elsukov 	uint64_t	noroute4;
39782360deSAndrey V. Elsukov 	uint64_t	noroute6;
40782360deSAndrey V. Elsukov 	uint64_t	nomatch4;	/* No addr/port match */
41782360deSAndrey V. Elsukov 	uint64_t	noproto;	/* Protocol not supported */
42782360deSAndrey V. Elsukov 	uint64_t	nomem;		/* mbufs allocation failed */
43782360deSAndrey V. Elsukov 	uint64_t	dropped;	/* number of packets silently
44782360deSAndrey V. Elsukov 					 * dropped due to some errors/
45782360deSAndrey V. Elsukov 					 * unsupported/etc.
46782360deSAndrey V. Elsukov 					 */
47782360deSAndrey V. Elsukov 
48b11efc1eSAndrey V. Elsukov 	uint64_t	jrequests;	/* jobs requests queued */
49b11efc1eSAndrey V. Elsukov 	uint64_t	jcalls;		/* jobs handler calls */
50b11efc1eSAndrey V. Elsukov 	uint64_t	jhostsreq;	/* hosts requests */
51b11efc1eSAndrey V. Elsukov 	uint64_t	jportreq;	/* PG allocation requests */
52b11efc1eSAndrey V. Elsukov 	uint64_t	jhostfails;	/* hosts requests failed */
53b11efc1eSAndrey V. Elsukov 	uint64_t	jportfails;	/* PG allocation failed */
54782360deSAndrey V. Elsukov 	uint64_t	jmaxlen;
55782360deSAndrey V. Elsukov 	uint64_t	jnomem;
56782360deSAndrey V. Elsukov 	uint64_t	jreinjected;
57782360deSAndrey V. Elsukov 
58782360deSAndrey V. Elsukov 	uint64_t	screated;
59782360deSAndrey V. Elsukov 	uint64_t	sdeleted;
60782360deSAndrey V. Elsukov 	uint64_t	spgcreated;
61782360deSAndrey V. Elsukov 	uint64_t	spgdeleted;
62782360deSAndrey V. Elsukov };
63782360deSAndrey V. Elsukov 
64782360deSAndrey V. Elsukov #define	IPFW_NAT64_VERSION	1
65782360deSAndrey V. Elsukov #define	NAT64STATS	(sizeof(struct nat64_stats) / sizeof(uint64_t))
66782360deSAndrey V. Elsukov struct nat64_counters {
67782360deSAndrey V. Elsukov 	counter_u64_t		cnt[NAT64STATS];
68782360deSAndrey V. Elsukov };
69782360deSAndrey V. Elsukov #define	NAT64STAT_ADD(s, f, v)		\
70782360deSAndrey V. Elsukov     counter_u64_add((s)->cnt[		\
71782360deSAndrey V. Elsukov 	offsetof(struct nat64_stats, f) / sizeof(uint64_t)], (v))
72782360deSAndrey V. Elsukov #define	NAT64STAT_INC(s, f)	NAT64STAT_ADD(s, f, 1)
73782360deSAndrey V. Elsukov #define	NAT64STAT_FETCH(s, f)		\
74782360deSAndrey V. Elsukov     counter_u64_fetch((s)->cnt[	\
75782360deSAndrey V. Elsukov 	offsetof(struct nat64_stats, f) / sizeof(uint64_t)])
76782360deSAndrey V. Elsukov 
77782360deSAndrey V. Elsukov #define	L3HDR(_ip, _t)	((_t)((uint32_t *)(_ip) + (_ip)->ip_hl))
78782360deSAndrey V. Elsukov #define	TCP(p)		((struct tcphdr *)(p))
79782360deSAndrey V. Elsukov #define	UDP(p)		((struct udphdr *)(p))
80782360deSAndrey V. Elsukov #define	ICMP(p)		((struct icmphdr *)(p))
81782360deSAndrey V. Elsukov #define	ICMP6(p)	((struct icmp6_hdr *)(p))
82782360deSAndrey V. Elsukov 
83782360deSAndrey V. Elsukov #define	NAT64SKIP	0
84782360deSAndrey V. Elsukov #define	NAT64RETURN	1
85782360deSAndrey V. Elsukov #define	NAT64MFREE	-1
86782360deSAndrey V. Elsukov 
87b11efc1eSAndrey V. Elsukov /*
88b11efc1eSAndrey V. Elsukov  * According to RFC6877:
89b11efc1eSAndrey V. Elsukov  *  PLAT is provider-side translator (XLAT) that translates N:1 global
90b11efc1eSAndrey V. Elsukov  *  IPv6 addresses to global IPv4 addresses, and vice versa.
91b11efc1eSAndrey V. Elsukov  *
92b11efc1eSAndrey V. Elsukov  *  CLAT is customer-side translator (XLAT) that algorithmically
93b11efc1eSAndrey V. Elsukov  *  translates 1:1 private IPv4 addresses to global IPv6 addresses,
94b11efc1eSAndrey V. Elsukov  *  and vice versa.
95b11efc1eSAndrey V. Elsukov  */
96782360deSAndrey V. Elsukov struct nat64_config {
97b11efc1eSAndrey V. Elsukov 	struct in6_addr		clat_prefix;
98b11efc1eSAndrey V. Elsukov 	struct in6_addr		plat_prefix;
99782360deSAndrey V. Elsukov 	uint32_t		flags;
100b11efc1eSAndrey V. Elsukov #define	NAT64_WKPFX		0x00010000	/* prefix is well-known */
101b11efc1eSAndrey V. Elsukov #define	NAT64_CLATPFX		0x00020000	/* dst prefix is configured */
102b11efc1eSAndrey V. Elsukov #define	NAT64_PLATPFX		0x00040000	/* src prefix is configured */
103b11efc1eSAndrey V. Elsukov 	uint8_t			clat_plen;
104b11efc1eSAndrey V. Elsukov 	uint8_t			plat_plen;
105782360deSAndrey V. Elsukov 
106782360deSAndrey V. Elsukov 	struct nat64_counters	stats;
107782360deSAndrey V. Elsukov };
108782360deSAndrey V. Elsukov 
109d8caf56eSAndrey V. Elsukov static inline int
nat64_check_ip6(struct in6_addr * addr)110d8caf56eSAndrey V. Elsukov nat64_check_ip6(struct in6_addr *addr)
111d8caf56eSAndrey V. Elsukov {
112d8caf56eSAndrey V. Elsukov 
113d8caf56eSAndrey V. Elsukov 	/* XXX: We should really check /8 */
114d8caf56eSAndrey V. Elsukov 	if (addr->s6_addr16[0] == 0 || /* 0000::/8 Reserved by IETF */
115d8caf56eSAndrey V. Elsukov 	    IN6_IS_ADDR_MULTICAST(addr) || IN6_IS_ADDR_LINKLOCAL(addr))
116d8caf56eSAndrey V. Elsukov 		return (1);
117d8caf56eSAndrey V. Elsukov 	return (0);
118d8caf56eSAndrey V. Elsukov }
119d8caf56eSAndrey V. Elsukov 
120d8caf56eSAndrey V. Elsukov static inline int
nat64_check_ip4(in_addr_t ia)121d8caf56eSAndrey V. Elsukov nat64_check_ip4(in_addr_t ia)
122d8caf56eSAndrey V. Elsukov {
123d8caf56eSAndrey V. Elsukov 
1246c1c6ae5SRodney W. Grimes 	/* These checks are ordered from most likely to least */
1256c1c6ae5SRodney W. Grimes 	if (IN_MULTICAST(ntohl(ia)) || IN_LOOPBACK(ntohl(ia)) ||
1266c1c6ae5SRodney W. Grimes 	    IN_LINKLOCAL(ntohl(ia)) || IN_EXPERIMENTAL(ntohl(ia)))
127d8caf56eSAndrey V. Elsukov 		return (1);
128d8caf56eSAndrey V. Elsukov 	return (0);
129d8caf56eSAndrey V. Elsukov }
130d8caf56eSAndrey V. Elsukov 
131782360deSAndrey V. Elsukov /* Well-known prefix 64:ff9b::/96 */
132782360deSAndrey V. Elsukov #define	IPV6_ADDR_INT32_WKPFX	htonl(0x64ff9b)
133782360deSAndrey V. Elsukov #define	IN6_IS_ADDR_WKPFX(a)	\
134782360deSAndrey V. Elsukov     ((a)->s6_addr32[0] == IPV6_ADDR_INT32_WKPFX && \
135782360deSAndrey V. Elsukov 	(a)->s6_addr32[1] == 0 && (a)->s6_addr32[2] == 0)
136d8caf56eSAndrey V. Elsukov 
137782360deSAndrey V. Elsukov int nat64_check_private_ip4(const struct nat64_config *cfg, in_addr_t ia);
138b11efc1eSAndrey V. Elsukov int nat64_check_prefixlen(int length);
139782360deSAndrey V. Elsukov int nat64_check_prefix6(const struct in6_addr *prefix, int length);
140d8caf56eSAndrey V. Elsukov int nat64_getlasthdr(struct mbuf *m, int *offset);
141d8caf56eSAndrey V. Elsukov int nat64_do_handle_ip4(struct mbuf *m, struct in6_addr *saddr,
142782360deSAndrey V. Elsukov     struct in6_addr *daddr, uint16_t lport, struct nat64_config *cfg,
143d8caf56eSAndrey V. Elsukov     void *logdata);
144d8caf56eSAndrey V. Elsukov int nat64_do_handle_ip6(struct mbuf *m, uint32_t aaddr, uint16_t aport,
145782360deSAndrey V. Elsukov     struct nat64_config *cfg, void *logdata);
146782360deSAndrey V. Elsukov int nat64_handle_icmp6(struct mbuf *m, int hlen, uint32_t aaddr,
147782360deSAndrey V. Elsukov     uint16_t aport, struct nat64_config *cfg, void *logdata);
148b11efc1eSAndrey V. Elsukov void nat64_embed_ip4(struct in6_addr *ip6, int plen, in_addr_t ia);
149b11efc1eSAndrey V. Elsukov in_addr_t nat64_extract_ip4(const struct in6_addr *ip6, int plen);
150d8caf56eSAndrey V. Elsukov 
151aa271561SAndrey V. Elsukov void nat64_set_output_method(int);
152aa271561SAndrey V. Elsukov int nat64_get_output_method(void);
153aa271561SAndrey V. Elsukov 
154d8caf56eSAndrey V. Elsukov #endif
155