1d8aa10ccSGleb Smirnoff /*-
2fe267a55SPedro F. Giffuni * SPDX-License-Identifier: BSD-2-Clause
3fe267a55SPedro F. Giffuni *
43b3a8eb9SGleb Smirnoff * Copyright (c) 2001 Daniel Hartmeier
53b3a8eb9SGleb Smirnoff * Copyright (c) 2002 - 2008 Henning Brauer
63b3a8eb9SGleb Smirnoff * All rights reserved.
73b3a8eb9SGleb Smirnoff *
83b3a8eb9SGleb Smirnoff * Redistribution and use in source and binary forms, with or without
93b3a8eb9SGleb Smirnoff * modification, are permitted provided that the following conditions
103b3a8eb9SGleb Smirnoff * are met:
113b3a8eb9SGleb Smirnoff *
123b3a8eb9SGleb Smirnoff * - Redistributions of source code must retain the above copyright
133b3a8eb9SGleb Smirnoff * notice, this list of conditions and the following disclaimer.
143b3a8eb9SGleb Smirnoff * - Redistributions in binary form must reproduce the above
153b3a8eb9SGleb Smirnoff * copyright notice, this list of conditions and the following
163b3a8eb9SGleb Smirnoff * disclaimer in the documentation and/or other materials provided
173b3a8eb9SGleb Smirnoff * with the distribution.
183b3a8eb9SGleb Smirnoff *
193b3a8eb9SGleb Smirnoff * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
203b3a8eb9SGleb Smirnoff * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
213b3a8eb9SGleb Smirnoff * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
223b3a8eb9SGleb Smirnoff * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
233b3a8eb9SGleb Smirnoff * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
243b3a8eb9SGleb Smirnoff * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
253b3a8eb9SGleb Smirnoff * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
263b3a8eb9SGleb Smirnoff * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
273b3a8eb9SGleb Smirnoff * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
283b3a8eb9SGleb Smirnoff * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
293b3a8eb9SGleb Smirnoff * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
303b3a8eb9SGleb Smirnoff * POSSIBILITY OF SUCH DAMAGE.
313b3a8eb9SGleb Smirnoff *
323b3a8eb9SGleb Smirnoff * Effort sponsored in part by the Defense Advanced Research Projects
333b3a8eb9SGleb Smirnoff * Agency (DARPA) and Air Force Research Laboratory, Air Force
343b3a8eb9SGleb Smirnoff * Materiel Command, USAF, under agreement number F30602-01-2-0537.
353b3a8eb9SGleb Smirnoff *
36d8aa10ccSGleb Smirnoff * $OpenBSD: pf_lb.c,v 1.2 2009/02/12 02:13:15 sthen Exp $
373b3a8eb9SGleb Smirnoff */
383b3a8eb9SGleb Smirnoff
393b3a8eb9SGleb Smirnoff #include <sys/cdefs.h>
403b3a8eb9SGleb Smirnoff #include "opt_pf.h"
413b3a8eb9SGleb Smirnoff #include "opt_inet.h"
423b3a8eb9SGleb Smirnoff #include "opt_inet6.h"
433b3a8eb9SGleb Smirnoff
443b3a8eb9SGleb Smirnoff #include <sys/param.h>
4576039bc8SGleb Smirnoff #include <sys/lock.h>
4676039bc8SGleb Smirnoff #include <sys/mbuf.h>
473b3a8eb9SGleb Smirnoff #include <sys/socket.h>
483b3a8eb9SGleb Smirnoff #include <sys/sysctl.h>
493b3a8eb9SGleb Smirnoff
50bc830a1aSKristof Provost #include <crypto/siphash/siphash.h>
51bc830a1aSKristof Provost
523b3a8eb9SGleb Smirnoff #include <net/if.h>
53fcdb520cSKristof Provost #include <net/if_var.h>
5476039bc8SGleb Smirnoff #include <net/vnet.h>
553b3a8eb9SGleb Smirnoff #include <net/pfvar.h>
563b3a8eb9SGleb Smirnoff #include <net/if_pflog.h>
573b3a8eb9SGleb Smirnoff
58fcdb520cSKristof Provost #ifdef INET
59fcdb520cSKristof Provost #include <netinet/in_var.h>
60fcdb520cSKristof Provost #endif
61fcdb520cSKristof Provost
62fcdb520cSKristof Provost #ifdef INET6
63fcdb520cSKristof Provost #include <netinet6/in6_var.h>
64fcdb520cSKristof Provost #endif
65fcdb520cSKristof Provost
66fcdb520cSKristof Provost
67339a1977SMark Johnston /*
68339a1977SMark Johnston * Limit the amount of work we do to find a free source port for redirects that
69339a1977SMark Johnston * introduce a state conflict.
70339a1977SMark Johnston */
71339a1977SMark Johnston #define V_pf_rdr_srcport_rewrite_tries VNET(pf_rdr_srcport_rewrite_tries)
72339a1977SMark Johnston VNET_DEFINE_STATIC(int, pf_rdr_srcport_rewrite_tries) = 16;
73339a1977SMark Johnston
743b3a8eb9SGleb Smirnoff #define DPFPRINTF(n, x) if (V_pf_status.debug >= (n)) printf x
753b3a8eb9SGleb Smirnoff
76c2346c3dSKristof Provost static uint64_t pf_hash(struct pf_addr *, struct pf_addr *,
773b3a8eb9SGleb Smirnoff struct pf_poolhashkey *, sa_family_t);
789a405864SKristof Provost static struct pf_krule *pf_match_translation(struct pf_pdesc *,
792d7e68d5SKristof Provost int, struct pf_kanchor_stackframe *);
802d7e68d5SKristof Provost static int pf_get_sport(struct pf_pdesc *, struct pf_krule *,
8107e070efSKajetan Staszkiewicz struct pf_addr *, uint16_t *, uint16_t, uint16_t,
8207e070efSKajetan Staszkiewicz struct pf_ksrc_node **, struct pf_srchash **,
8307e070efSKajetan Staszkiewicz struct pf_kpool *, struct pf_udp_mapping **,
8407e070efSKajetan Staszkiewicz pf_sn_types_t);
857d381d0aSKristof Provost static bool pf_islinklocal(const sa_family_t, const struct pf_addr *);
863b3a8eb9SGleb Smirnoff
87c2346c3dSKristof Provost static uint64_t
pf_hash(struct pf_addr * inaddr,struct pf_addr * hash,struct pf_poolhashkey * key,sa_family_t af)883b3a8eb9SGleb Smirnoff pf_hash(struct pf_addr *inaddr, struct pf_addr *hash,
893b3a8eb9SGleb Smirnoff struct pf_poolhashkey *key, sa_family_t af)
903b3a8eb9SGleb Smirnoff {
91bc830a1aSKristof Provost SIPHASH_CTX ctx;
92bc830a1aSKristof Provost #ifdef INET6
93bc830a1aSKristof Provost union {
94bc830a1aSKristof Provost uint64_t hash64;
95bc830a1aSKristof Provost uint32_t hash32[2];
96bc830a1aSKristof Provost } h;
97bc830a1aSKristof Provost #endif
98c2346c3dSKristof Provost uint64_t res = 0;
99bc830a1aSKristof Provost
100bc830a1aSKristof Provost _Static_assert(sizeof(*key) >= SIPHASH_KEY_LENGTH, "");
1013b3a8eb9SGleb Smirnoff
1023b3a8eb9SGleb Smirnoff switch (af) {
1033b3a8eb9SGleb Smirnoff #ifdef INET
1043b3a8eb9SGleb Smirnoff case AF_INET:
105c2346c3dSKristof Provost res = SipHash24(&ctx, (const uint8_t *)key,
106bc830a1aSKristof Provost &inaddr->addr32[0], sizeof(inaddr->addr32[0]));
107c2346c3dSKristof Provost hash->addr32[0] = res;
1083b3a8eb9SGleb Smirnoff break;
1093b3a8eb9SGleb Smirnoff #endif /* INET */
1103b3a8eb9SGleb Smirnoff #ifdef INET6
1113b3a8eb9SGleb Smirnoff case AF_INET6:
112c2346c3dSKristof Provost res = SipHash24(&ctx, (const uint8_t *)key,
113bc830a1aSKristof Provost &inaddr->addr32[0], 4 * sizeof(inaddr->addr32[0]));
114c2346c3dSKristof Provost h.hash64 = res;
115bc830a1aSKristof Provost hash->addr32[0] = h.hash32[0];
116bc830a1aSKristof Provost hash->addr32[1] = h.hash32[1];
117bc830a1aSKristof Provost /*
118bc830a1aSKristof Provost * siphash isn't big enough, but flipping it around is
119bc830a1aSKristof Provost * good enough here.
120bc830a1aSKristof Provost */
121bc830a1aSKristof Provost hash->addr32[2] = ~h.hash32[1];
122bc830a1aSKristof Provost hash->addr32[3] = ~h.hash32[0];
1233b3a8eb9SGleb Smirnoff break;
1243b3a8eb9SGleb Smirnoff #endif /* INET6 */
1253b3a8eb9SGleb Smirnoff }
126c2346c3dSKristof Provost return (res);
1273b3a8eb9SGleb Smirnoff }
1283b3a8eb9SGleb Smirnoff
129e86bddeaSKristof Provost static struct pf_krule *
pf_match_translation(struct pf_pdesc * pd,int rs_num,struct pf_kanchor_stackframe * anchor_stack)1309a405864SKristof Provost pf_match_translation(struct pf_pdesc *pd,
1312d7e68d5SKristof Provost int rs_num, struct pf_kanchor_stackframe *anchor_stack)
1323b3a8eb9SGleb Smirnoff {
133e86bddeaSKristof Provost struct pf_krule *r, *rm = NULL;
134e86bddeaSKristof Provost struct pf_kruleset *ruleset = NULL;
1353b3a8eb9SGleb Smirnoff int tag = -1;
1363b3a8eb9SGleb Smirnoff int rtableid = -1;
1373b3a8eb9SGleb Smirnoff int asd = 0;
1383b3a8eb9SGleb Smirnoff
1393b3a8eb9SGleb Smirnoff r = TAILQ_FIRST(pf_main_ruleset.rules[rs_num].active.ptr);
1406b94546aSMateusz Guzik while (r != NULL) {
1413b3a8eb9SGleb Smirnoff struct pf_rule_addr *src = NULL, *dst = NULL;
1423b3a8eb9SGleb Smirnoff struct pf_addr_wrap *xdst = NULL;
1433b3a8eb9SGleb Smirnoff
144f2064dd1SKajetan Staszkiewicz if (r->action == PF_BINAT && pd->dir == PF_IN) {
1453b3a8eb9SGleb Smirnoff src = &r->dst;
146e11dacbfSKristof Provost if (r->rdr.cur != NULL)
147e11dacbfSKristof Provost xdst = &r->rdr.cur->addr;
1483b3a8eb9SGleb Smirnoff } else {
1493b3a8eb9SGleb Smirnoff src = &r->src;
1503b3a8eb9SGleb Smirnoff dst = &r->dst;
1513b3a8eb9SGleb Smirnoff }
1523b3a8eb9SGleb Smirnoff
15302cf67ccSMateusz Guzik pf_counter_u64_add(&r->evaluations, 1);
154b4a42589SKristof Provost if (pfi_kkif_match(r->kif, pd->kif) == r->ifnot)
155e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_IFP];
156f2064dd1SKajetan Staszkiewicz else if (r->direction && r->direction != pd->dir)
157e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_DIR];
1583b3a8eb9SGleb Smirnoff else if (r->af && r->af != pd->af)
159e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_AF];
1603b3a8eb9SGleb Smirnoff else if (r->proto && r->proto != pd->proto)
161e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_PROTO];
1622d7e68d5SKristof Provost else if (PF_MISMATCHAW(&src->addr, &pd->nsaddr, pd->af,
1639a405864SKristof Provost src->neg, pd->kif, M_GETFIB(pd->m)))
1643b3a8eb9SGleb Smirnoff r = r->skip[src == &r->src ? PF_SKIP_SRC_ADDR :
165e5c64b26SKajetan Staszkiewicz PF_SKIP_DST_ADDR];
1663b3a8eb9SGleb Smirnoff else if (src->port_op && !pf_match_port(src->port_op,
1672d7e68d5SKristof Provost src->port[0], src->port[1], pd->nsport))
1683b3a8eb9SGleb Smirnoff r = r->skip[src == &r->src ? PF_SKIP_SRC_PORT :
169e5c64b26SKajetan Staszkiewicz PF_SKIP_DST_PORT];
1703b3a8eb9SGleb Smirnoff else if (dst != NULL &&
1712d7e68d5SKristof Provost PF_MISMATCHAW(&dst->addr, &pd->ndaddr, pd->af, dst->neg, NULL,
1729a405864SKristof Provost M_GETFIB(pd->m)))
173e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_DST_ADDR];
1742d7e68d5SKristof Provost else if (xdst != NULL && PF_MISMATCHAW(xdst, &pd->ndaddr, pd->af,
1759a405864SKristof Provost 0, NULL, M_GETFIB(pd->m)))
1763b3a8eb9SGleb Smirnoff r = TAILQ_NEXT(r, entries);
1773b3a8eb9SGleb Smirnoff else if (dst != NULL && dst->port_op &&
1783b3a8eb9SGleb Smirnoff !pf_match_port(dst->port_op, dst->port[0],
1792d7e68d5SKristof Provost dst->port[1], pd->ndport))
180e5c64b26SKajetan Staszkiewicz r = r->skip[PF_SKIP_DST_PORT];
1819a405864SKristof Provost else if (r->match_tag && !pf_match_tag(pd->m, r, &tag,
1823b3a8eb9SGleb Smirnoff pd->pf_mtag ? pd->pf_mtag->tag : 0))
1833b3a8eb9SGleb Smirnoff r = TAILQ_NEXT(r, entries);
1843b3a8eb9SGleb Smirnoff else if (r->os_fingerprint != PF_OSFP_ANY && (pd->proto !=
1859a405864SKristof Provost IPPROTO_TCP || !pf_osfp_match(pf_osfp_fingerprint(pd,
186739731b8SKristof Provost &pd->hdr.tcp), r->os_fingerprint)))
1873b3a8eb9SGleb Smirnoff r = TAILQ_NEXT(r, entries);
1883b3a8eb9SGleb Smirnoff else {
1893b3a8eb9SGleb Smirnoff if (r->tag)
1903b3a8eb9SGleb Smirnoff tag = r->tag;
1913b3a8eb9SGleb Smirnoff if (r->rtableid >= 0)
1923b3a8eb9SGleb Smirnoff rtableid = r->rtableid;
1933b3a8eb9SGleb Smirnoff if (r->anchor == NULL) {
1943b3a8eb9SGleb Smirnoff rm = r;
1956b94546aSMateusz Guzik if (rm->action == PF_NONAT ||
1966b94546aSMateusz Guzik rm->action == PF_NORDR ||
1976b94546aSMateusz Guzik rm->action == PF_NOBINAT) {
1986b94546aSMateusz Guzik rm = NULL;
1996b94546aSMateusz Guzik }
2006b94546aSMateusz Guzik break;
2013b3a8eb9SGleb Smirnoff } else
2021d6139c0SGleb Smirnoff pf_step_into_anchor(anchor_stack, &asd,
20330ab6e82SKristof Provost &ruleset, rs_num, &r, NULL);
2043b3a8eb9SGleb Smirnoff }
2053b3a8eb9SGleb Smirnoff if (r == NULL)
2061d6139c0SGleb Smirnoff pf_step_out_of_anchor(anchor_stack, &asd, &ruleset,
2071d6139c0SGleb Smirnoff rs_num, &r, NULL, NULL);
2083b3a8eb9SGleb Smirnoff }
2093b3a8eb9SGleb Smirnoff
2109a405864SKristof Provost if (tag > 0 && pf_tag_packet(pd, tag))
2113b3a8eb9SGleb Smirnoff return (NULL);
2123b3a8eb9SGleb Smirnoff if (rtableid >= 0)
2139a405864SKristof Provost M_SETFIB(pd->m, rtableid);
2143b3a8eb9SGleb Smirnoff
2153b3a8eb9SGleb Smirnoff return (rm);
2163b3a8eb9SGleb Smirnoff }
2173b3a8eb9SGleb Smirnoff
2183b3a8eb9SGleb Smirnoff static int
pf_get_sport(struct pf_pdesc * pd,struct pf_krule * r,struct pf_addr * naddr,uint16_t * nport,uint16_t low,uint16_t high,struct pf_ksrc_node ** sn,struct pf_srchash ** sh,struct pf_kpool * rpool,struct pf_udp_mapping ** udp_mapping,pf_sn_types_t sn_type)2192d7e68d5SKristof Provost pf_get_sport(struct pf_pdesc *pd, struct pf_krule *r,
2202d7e68d5SKristof Provost struct pf_addr *naddr, uint16_t *nport, uint16_t low,
2212d7e68d5SKristof Provost uint16_t high, struct pf_ksrc_node **sn,
222fcdb520cSKristof Provost struct pf_srchash **sh, struct pf_kpool *rpool,
22307e070efSKajetan Staszkiewicz struct pf_udp_mapping **udp_mapping, pf_sn_types_t sn_type)
2243b3a8eb9SGleb Smirnoff {
2253b3a8eb9SGleb Smirnoff struct pf_state_key_cmp key;
2263b3a8eb9SGleb Smirnoff struct pf_addr init_addr;
2273b3a8eb9SGleb Smirnoff
2283b3a8eb9SGleb Smirnoff bzero(&init_addr, sizeof(init_addr));
229390dc369STom Jones
230fcdb520cSKristof Provost if (udp_mapping) {
231390dc369STom Jones MPASS(*udp_mapping == NULL);
232fcdb520cSKristof Provost }
233390dc369STom Jones
234390dc369STom Jones /*
235390dc369STom Jones * If we are UDP and have an existing mapping we can get source port
236390dc369STom Jones * from the mapping. In this case we have to look up the src_node as
237390dc369STom Jones * pf_map_addr would.
238390dc369STom Jones */
239daea7039SKajetan Staszkiewicz if (pd->proto == IPPROTO_UDP && (rpool->opts & PF_POOL_ENDPI)) {
240390dc369STom Jones struct pf_udp_endpoint_cmp udp_source;
241390dc369STom Jones
242390dc369STom Jones bzero(&udp_source, sizeof(udp_source));
2432d7e68d5SKristof Provost udp_source.af = pd->af;
2442d7e68d5SKristof Provost PF_ACPY(&udp_source.addr, &pd->nsaddr, pd->af);
2452d7e68d5SKristof Provost udp_source.port = pd->nsport;
246fcdb520cSKristof Provost if (udp_mapping) {
247390dc369STom Jones *udp_mapping = pf_udp_mapping_find(&udp_source);
248390dc369STom Jones if (*udp_mapping) {
2492d7e68d5SKristof Provost PF_ACPY(naddr, &(*udp_mapping)->endpoints[1].addr, pd->af);
250390dc369STom Jones *nport = (*udp_mapping)->endpoints[1].port;
251390dc369STom Jones /* Try to find a src_node as per pf_map_addr(). */
252daea7039SKajetan Staszkiewicz if (*sn == NULL && rpool->opts & PF_POOL_STICKYADDR &&
253daea7039SKajetan Staszkiewicz (rpool->opts & PF_POOL_TYPEMASK) != PF_POOL_NONE)
25407e070efSKajetan Staszkiewicz *sn = pf_find_src_node(&pd->nsaddr, r,
25507e070efSKajetan Staszkiewicz pd->af, sh, sn_type, false);
256b9c0321dSKajetan Staszkiewicz if (*sn != NULL)
257b9c0321dSKajetan Staszkiewicz PF_SRC_NODE_UNLOCK(*sn);
258390dc369STom Jones return (0);
259390dc369STom Jones } else {
2602d7e68d5SKristof Provost *udp_mapping = pf_udp_mapping_create(pd->af, &pd->nsaddr,
2612d7e68d5SKristof Provost pd->nsport, &init_addr, 0);
262390dc369STom Jones if (*udp_mapping == NULL)
2633b3a8eb9SGleb Smirnoff return (1);
264390dc369STom Jones }
265390dc369STom Jones }
266fcdb520cSKristof Provost }
267390dc369STom Jones
268daea7039SKajetan Staszkiewicz if (pf_map_addr_sn(pd->naf, r, &pd->nsaddr, naddr, NULL, &init_addr,
26907e070efSKajetan Staszkiewicz sn, sh, rpool, sn_type))
270390dc369STom Jones goto failed;
2713b3a8eb9SGleb Smirnoff
2722d7e68d5SKristof Provost if (pd->proto == IPPROTO_ICMP) {
273534ee17eSKristof Provost if (*nport == htons(ICMP_ECHO)) {
274534ee17eSKristof Provost low = 1;
275534ee17eSKristof Provost high = 65535;
276534ee17eSKristof Provost } else
277534ee17eSKristof Provost return (0); /* Don't try to modify non-echo ICMP */
278534ee17eSKristof Provost }
279534ee17eSKristof Provost #ifdef INET6
2802d7e68d5SKristof Provost if (pd->proto == IPPROTO_ICMPV6) {
281534ee17eSKristof Provost if (*nport == htons(ICMP6_ECHO_REQUEST)) {
282534ee17eSKristof Provost low = 1;
283534ee17eSKristof Provost high = 65535;
284534ee17eSKristof Provost } else
285534ee17eSKristof Provost return (0); /* Don't try to modify non-echo ICMP */
286534ee17eSKristof Provost }
287534ee17eSKristof Provost #endif /* INET6 */
288534ee17eSKristof Provost
2898fc6e19cSGleb Smirnoff bzero(&key, sizeof(key));
290fcdb520cSKristof Provost key.af = pd->naf;
2912d7e68d5SKristof Provost key.proto = pd->proto;
2922d7e68d5SKristof Provost key.port[0] = pd->ndport;
2932d7e68d5SKristof Provost PF_ACPY(&key.addr[0], &pd->ndaddr, key.af);
2948fc6e19cSGleb Smirnoff
2958fc6e19cSGleb Smirnoff do {
2968fc6e19cSGleb Smirnoff PF_ACPY(&key.addr[1], naddr, key.af);
297fcdb520cSKristof Provost if (udp_mapping && *udp_mapping)
2982d7e68d5SKristof Provost PF_ACPY(&(*udp_mapping)->endpoints[1].addr, naddr, pd->af);
2993b3a8eb9SGleb Smirnoff
3003b3a8eb9SGleb Smirnoff /*
3013b3a8eb9SGleb Smirnoff * port search; start random, step;
3023b3a8eb9SGleb Smirnoff * similar 2 portloop in in_pcbbind
3033b3a8eb9SGleb Smirnoff */
3042d7e68d5SKristof Provost if (pd->proto == IPPROTO_SCTP) {
3052d7e68d5SKristof Provost key.port[1] = pd->nsport;
3066053adafSKristof Provost if (!pf_find_state_all_exists(&key, PF_IN)) {
3072d7e68d5SKristof Provost *nport = pd->nsport;
3086053adafSKristof Provost return (0);
3096053adafSKristof Provost } else {
3106053adafSKristof Provost return (1); /* Fail mapping. */
3116053adafSKristof Provost }
3122d7e68d5SKristof Provost } else if (!(pd->proto == IPPROTO_TCP || pd->proto == IPPROTO_UDP ||
3132d7e68d5SKristof Provost pd->proto == IPPROTO_ICMP) || (low == 0 && high == 0)) {
3148fc6e19cSGleb Smirnoff /*
3158fc6e19cSGleb Smirnoff * XXX bug: icmp states don't use the id on both sides.
3168fc6e19cSGleb Smirnoff * (traceroute -I through nat)
3178fc6e19cSGleb Smirnoff */
3182d7e68d5SKristof Provost key.port[1] = pd->nsport;
31919d6e29bSMateusz Guzik if (!pf_find_state_all_exists(&key, PF_IN)) {
3202d7e68d5SKristof Provost *nport = pd->nsport;
3213b3a8eb9SGleb Smirnoff return (0);
3228fc6e19cSGleb Smirnoff }
3233b3a8eb9SGleb Smirnoff } else if (low == high) {
3248fc6e19cSGleb Smirnoff key.port[1] = htons(low);
32519d6e29bSMateusz Guzik if (!pf_find_state_all_exists(&key, PF_IN)) {
326fcdb520cSKristof Provost if (udp_mapping && *udp_mapping != NULL) {
327390dc369STom Jones (*udp_mapping)->endpoints[1].port = htons(low);
328390dc369STom Jones if (pf_udp_mapping_insert(*udp_mapping) == 0) {
3293b3a8eb9SGleb Smirnoff *nport = htons(low);
3303b3a8eb9SGleb Smirnoff return (0);
3313b3a8eb9SGleb Smirnoff }
3323b3a8eb9SGleb Smirnoff } else {
333390dc369STom Jones *nport = htons(low);
334390dc369STom Jones return (0);
335390dc369STom Jones }
336390dc369STom Jones }
337390dc369STom Jones } else {
3387f3ad018SKristof Provost uint32_t tmp;
3397f3ad018SKristof Provost uint16_t cut;
3403b3a8eb9SGleb Smirnoff
3413b3a8eb9SGleb Smirnoff if (low > high) {
3423b3a8eb9SGleb Smirnoff tmp = low;
3433b3a8eb9SGleb Smirnoff low = high;
3443b3a8eb9SGleb Smirnoff high = tmp;
3453b3a8eb9SGleb Smirnoff }
3463b3a8eb9SGleb Smirnoff /* low < high */
347e4e01d9cSGleb Smirnoff cut = arc4random() % (1 + high - low) + low;
3483b3a8eb9SGleb Smirnoff /* low <= cut <= high */
3497f3ad018SKristof Provost for (tmp = cut; tmp <= high && tmp <= 0xffff; ++tmp) {
350fcdb520cSKristof Provost if (udp_mapping && *udp_mapping != NULL) {
351390dc369STom Jones (*udp_mapping)->endpoints[1].port = htons(tmp);
352390dc369STom Jones if (pf_udp_mapping_insert(*udp_mapping) == 0) {
353390dc369STom Jones *nport = htons(tmp);
354390dc369STom Jones return (0);
355390dc369STom Jones }
356390dc369STom Jones } else {
3578fc6e19cSGleb Smirnoff key.port[1] = htons(tmp);
35819d6e29bSMateusz Guzik if (!pf_find_state_all_exists(&key, PF_IN)) {
3593b3a8eb9SGleb Smirnoff *nport = htons(tmp);
3603b3a8eb9SGleb Smirnoff return (0);
3613b3a8eb9SGleb Smirnoff }
3623b3a8eb9SGleb Smirnoff }
363390dc369STom Jones }
3647f3ad018SKristof Provost tmp = cut;
3657f3ad018SKristof Provost for (tmp -= 1; tmp >= low && tmp <= 0xffff; --tmp) {
3662d7e68d5SKristof Provost if (pd->proto == IPPROTO_UDP &&
367daea7039SKajetan Staszkiewicz (rpool->opts & PF_POOL_ENDPI &&
368fcdb520cSKristof Provost udp_mapping != NULL)) {
369390dc369STom Jones (*udp_mapping)->endpoints[1].port = htons(tmp);
370390dc369STom Jones if (pf_udp_mapping_insert(*udp_mapping) == 0) {
371390dc369STom Jones *nport = htons(tmp);
372390dc369STom Jones return (0);
373390dc369STom Jones }
374390dc369STom Jones } else {
3758fc6e19cSGleb Smirnoff key.port[1] = htons(tmp);
37619d6e29bSMateusz Guzik if (!pf_find_state_all_exists(&key, PF_IN)) {
3773b3a8eb9SGleb Smirnoff *nport = htons(tmp);
3783b3a8eb9SGleb Smirnoff return (0);
3793b3a8eb9SGleb Smirnoff }
3803b3a8eb9SGleb Smirnoff }
3813b3a8eb9SGleb Smirnoff }
382390dc369STom Jones }
3833b3a8eb9SGleb Smirnoff
384daea7039SKajetan Staszkiewicz switch (rpool->opts & PF_POOL_TYPEMASK) {
3853b3a8eb9SGleb Smirnoff case PF_POOL_RANDOM:
3863b3a8eb9SGleb Smirnoff case PF_POOL_ROUNDROBIN:
3872b0a4ffaSKristof Provost /*
3882b0a4ffaSKristof Provost * pick a different source address since we're out
3892b0a4ffaSKristof Provost * of free port choices for the current one.
3902b0a4ffaSKristof Provost */
391b9c0321dSKajetan Staszkiewicz (*sn) = NULL;
392daea7039SKajetan Staszkiewicz if (pf_map_addr_sn(pd->naf, r, &pd->nsaddr, naddr, NULL,
39307e070efSKajetan Staszkiewicz &init_addr, sn, sh, rpool, sn_type))
3943b3a8eb9SGleb Smirnoff return (1);
3953b3a8eb9SGleb Smirnoff break;
3963b3a8eb9SGleb Smirnoff case PF_POOL_NONE:
3973b3a8eb9SGleb Smirnoff case PF_POOL_SRCHASH:
3983b3a8eb9SGleb Smirnoff case PF_POOL_BITMASK:
3993b3a8eb9SGleb Smirnoff default:
4003b3a8eb9SGleb Smirnoff return (1);
4013b3a8eb9SGleb Smirnoff }
402fcdb520cSKristof Provost } while (! PF_AEQ(&init_addr, naddr, pd->naf) );
403390dc369STom Jones
404390dc369STom Jones failed:
405fcdb520cSKristof Provost if (udp_mapping) {
406390dc369STom Jones uma_zfree(V_pf_udp_mapping_z, *udp_mapping);
407390dc369STom Jones *udp_mapping = NULL;
408fcdb520cSKristof Provost }
409fcdb520cSKristof Provost
4103b3a8eb9SGleb Smirnoff return (1); /* none available */
4113b3a8eb9SGleb Smirnoff }
4123b3a8eb9SGleb Smirnoff
4137d381d0aSKristof Provost static bool
pf_islinklocal(const sa_family_t af,const struct pf_addr * addr)4147d381d0aSKristof Provost pf_islinklocal(const sa_family_t af, const struct pf_addr *addr)
4157d381d0aSKristof Provost {
4167d381d0aSKristof Provost if (af == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&addr->v6))
4177d381d0aSKristof Provost return (true);
4187d381d0aSKristof Provost return (false);
4197d381d0aSKristof Provost }
4207d381d0aSKristof Provost
4212aa21096SKurosawa Takahiro static int
pf_get_mape_sport(struct pf_pdesc * pd,struct pf_krule * r,struct pf_addr * naddr,uint16_t * nport,struct pf_ksrc_node ** sn,struct pf_srchash ** sh,struct pf_udp_mapping ** udp_mapping)4222d7e68d5SKristof Provost pf_get_mape_sport(struct pf_pdesc *pd, struct pf_krule *r,
4232d7e68d5SKristof Provost struct pf_addr *naddr, uint16_t *nport,
424b9c0321dSKajetan Staszkiewicz struct pf_ksrc_node **sn, struct pf_srchash **sh,
425b9c0321dSKajetan Staszkiewicz struct pf_udp_mapping **udp_mapping)
4262aa21096SKurosawa Takahiro {
4272aa21096SKurosawa Takahiro uint16_t psmask, low, highmask;
4282aa21096SKurosawa Takahiro uint16_t i, ahigh, cut;
4292aa21096SKurosawa Takahiro int ashift, psidshift;
4302aa21096SKurosawa Takahiro
431e11dacbfSKristof Provost ashift = 16 - r->rdr.mape.offset;
432e11dacbfSKristof Provost psidshift = ashift - r->rdr.mape.psidlen;
433e11dacbfSKristof Provost psmask = r->rdr.mape.psid & ((1U << r->rdr.mape.psidlen) - 1);
4342aa21096SKurosawa Takahiro psmask = psmask << psidshift;
4352aa21096SKurosawa Takahiro highmask = (1U << psidshift) - 1;
4362aa21096SKurosawa Takahiro
437e11dacbfSKristof Provost ahigh = (1U << r->rdr.mape.offset) - 1;
4382aa21096SKurosawa Takahiro cut = arc4random() & ahigh;
4392aa21096SKurosawa Takahiro if (cut == 0)
4402aa21096SKurosawa Takahiro cut = 1;
4412aa21096SKurosawa Takahiro
4422aa21096SKurosawa Takahiro for (i = cut; i <= ahigh; i++) {
4432aa21096SKurosawa Takahiro low = (i << ashift) | psmask;
4442d7e68d5SKristof Provost if (!pf_get_sport(pd, r,
445fcdb520cSKristof Provost naddr, nport, low, low | highmask, sn, sh, &r->rdr,
44607e070efSKajetan Staszkiewicz udp_mapping, PF_SN_NAT))
4472aa21096SKurosawa Takahiro return (0);
4482aa21096SKurosawa Takahiro }
4492aa21096SKurosawa Takahiro for (i = cut - 1; i > 0; i--) {
4502aa21096SKurosawa Takahiro low = (i << ashift) | psmask;
4512d7e68d5SKristof Provost if (!pf_get_sport(pd, r,
452fcdb520cSKristof Provost naddr, nport, low, low | highmask, sn, sh, &r->rdr,
45307e070efSKajetan Staszkiewicz udp_mapping, PF_SN_NAT))
4542aa21096SKurosawa Takahiro return (0);
4552aa21096SKurosawa Takahiro }
4562aa21096SKurosawa Takahiro return (1);
4572aa21096SKurosawa Takahiro }
4582aa21096SKurosawa Takahiro
45916303d2bSKajetan Staszkiewicz u_short
pf_map_addr(sa_family_t af,struct pf_krule * r,struct pf_addr * saddr,struct pf_addr * naddr,struct pfi_kkif ** nkif,struct pf_addr * init_addr,struct pf_kpool * rpool)460e86bddeaSKristof Provost pf_map_addr(sa_family_t af, struct pf_krule *r, struct pf_addr *saddr,
461fcdb520cSKristof Provost struct pf_addr *naddr, struct pfi_kkif **nkif, struct pf_addr *init_addr,
462fcdb520cSKristof Provost struct pf_kpool *rpool)
4633b3a8eb9SGleb Smirnoff {
4649569fdddSMark Johnston u_short reason = PFRES_MATCH;
4653b3a8eb9SGleb Smirnoff struct pf_addr *raddr = NULL, *rmask = NULL;
466c2346c3dSKristof Provost uint64_t hashidx;
467c2346c3dSKristof Provost int cnt;
4683b3a8eb9SGleb Smirnoff
4695f5e32f1SKristof Provost mtx_lock(&rpool->mtx);
470e85343b1SGleb Smirnoff /* Find the route using chosen algorithm. Store the found route
471e85343b1SGleb Smirnoff in src_node if it was given or found. */
4725f5e32f1SKristof Provost if (rpool->cur->addr.type == PF_ADDR_NOROUTE) {
47316303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
47416303d2bSKajetan Staszkiewicz goto done_pool_mtx;
4755f5e32f1SKristof Provost }
4763b3a8eb9SGleb Smirnoff if (rpool->cur->addr.type == PF_ADDR_DYNIFTL) {
4773b3a8eb9SGleb Smirnoff switch (af) {
4783b3a8eb9SGleb Smirnoff #ifdef INET
4793b3a8eb9SGleb Smirnoff case AF_INET:
4803b3a8eb9SGleb Smirnoff if (rpool->cur->addr.p.dyn->pfid_acnt4 < 1 &&
481c2346c3dSKristof Provost !PF_POOL_DYNTYPE(rpool->opts)) {
48216303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
48316303d2bSKajetan Staszkiewicz goto done_pool_mtx;
4845f5e32f1SKristof Provost }
4853b3a8eb9SGleb Smirnoff raddr = &rpool->cur->addr.p.dyn->pfid_addr4;
4863b3a8eb9SGleb Smirnoff rmask = &rpool->cur->addr.p.dyn->pfid_mask4;
4873b3a8eb9SGleb Smirnoff break;
4883b3a8eb9SGleb Smirnoff #endif /* INET */
4893b3a8eb9SGleb Smirnoff #ifdef INET6
4903b3a8eb9SGleb Smirnoff case AF_INET6:
4913b3a8eb9SGleb Smirnoff if (rpool->cur->addr.p.dyn->pfid_acnt6 < 1 &&
492c2346c3dSKristof Provost !PF_POOL_DYNTYPE(rpool->opts)) {
49316303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
49416303d2bSKajetan Staszkiewicz goto done_pool_mtx;
4955f5e32f1SKristof Provost }
4963b3a8eb9SGleb Smirnoff raddr = &rpool->cur->addr.p.dyn->pfid_addr6;
4973b3a8eb9SGleb Smirnoff rmask = &rpool->cur->addr.p.dyn->pfid_mask6;
4983b3a8eb9SGleb Smirnoff break;
4993b3a8eb9SGleb Smirnoff #endif /* INET6 */
5003b3a8eb9SGleb Smirnoff }
5013b3a8eb9SGleb Smirnoff } else if (rpool->cur->addr.type == PF_ADDR_TABLE) {
502c2346c3dSKristof Provost if (!PF_POOL_DYNTYPE(rpool->opts)) {
50316303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
50416303d2bSKajetan Staszkiewicz goto done_pool_mtx; /* unsupported */
5055f5e32f1SKristof Provost }
5063b3a8eb9SGleb Smirnoff } else {
5073b3a8eb9SGleb Smirnoff raddr = &rpool->cur->addr.v.a.addr;
5083b3a8eb9SGleb Smirnoff rmask = &rpool->cur->addr.v.a.mask;
5093b3a8eb9SGleb Smirnoff }
5103b3a8eb9SGleb Smirnoff
5113b3a8eb9SGleb Smirnoff switch (rpool->opts & PF_POOL_TYPEMASK) {
5123b3a8eb9SGleb Smirnoff case PF_POOL_NONE:
5133b3a8eb9SGleb Smirnoff PF_ACPY(naddr, raddr, af);
5143b3a8eb9SGleb Smirnoff break;
5153b3a8eb9SGleb Smirnoff case PF_POOL_BITMASK:
5163b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr, raddr, rmask, saddr, af);
5173b3a8eb9SGleb Smirnoff break;
5183b3a8eb9SGleb Smirnoff case PF_POOL_RANDOM:
519c2346c3dSKristof Provost if (rpool->cur->addr.type == PF_ADDR_TABLE) {
520c2346c3dSKristof Provost cnt = rpool->cur->addr.p.tbl->pfrkt_cnt;
521a373ea07SKristof Provost if (cnt == 0)
522a373ea07SKristof Provost rpool->tblidx = 0;
523a373ea07SKristof Provost else
524c2346c3dSKristof Provost rpool->tblidx = (int)arc4random_uniform(cnt);
525c2346c3dSKristof Provost memset(&rpool->counter, 0, sizeof(rpool->counter));
526c2346c3dSKristof Provost if (pfr_pool_get(rpool->cur->addr.p.tbl,
527c2346c3dSKristof Provost &rpool->tblidx, &rpool->counter, af, NULL)) {
528c2346c3dSKristof Provost reason = PFRES_MAPFAILED;
529c2346c3dSKristof Provost goto done_pool_mtx; /* unsupported */
530c2346c3dSKristof Provost }
531c2346c3dSKristof Provost PF_ACPY(naddr, &rpool->counter, af);
532c2346c3dSKristof Provost } else if (rpool->cur->addr.type == PF_ADDR_DYNIFTL) {
533c2346c3dSKristof Provost cnt = rpool->cur->addr.p.dyn->pfid_kt->pfrkt_cnt;
534a373ea07SKristof Provost if (cnt == 0)
535a373ea07SKristof Provost rpool->tblidx = 0;
536a373ea07SKristof Provost else
537c2346c3dSKristof Provost rpool->tblidx = (int)arc4random_uniform(cnt);
538c2346c3dSKristof Provost memset(&rpool->counter, 0, sizeof(rpool->counter));
539c2346c3dSKristof Provost if (pfr_pool_get(rpool->cur->addr.p.dyn->pfid_kt,
540c2346c3dSKristof Provost &rpool->tblidx, &rpool->counter, af,
541c2346c3dSKristof Provost pf_islinklocal)) {
542c2346c3dSKristof Provost reason = PFRES_MAPFAILED;
543c2346c3dSKristof Provost goto done_pool_mtx; /* unsupported */
544c2346c3dSKristof Provost }
545c2346c3dSKristof Provost PF_ACPY(naddr, &rpool->counter, af);
546c2346c3dSKristof Provost } else if (init_addr != NULL && PF_AZERO(init_addr, af)) {
5473b3a8eb9SGleb Smirnoff switch (af) {
5483b3a8eb9SGleb Smirnoff #ifdef INET
5493b3a8eb9SGleb Smirnoff case AF_INET:
5503b3a8eb9SGleb Smirnoff rpool->counter.addr32[0] = htonl(arc4random());
5513b3a8eb9SGleb Smirnoff break;
5523b3a8eb9SGleb Smirnoff #endif /* INET */
5533b3a8eb9SGleb Smirnoff #ifdef INET6
5543b3a8eb9SGleb Smirnoff case AF_INET6:
5553b3a8eb9SGleb Smirnoff if (rmask->addr32[3] != 0xffffffff)
5563b3a8eb9SGleb Smirnoff rpool->counter.addr32[3] =
5573b3a8eb9SGleb Smirnoff htonl(arc4random());
5583b3a8eb9SGleb Smirnoff else
5593b3a8eb9SGleb Smirnoff break;
5603b3a8eb9SGleb Smirnoff if (rmask->addr32[2] != 0xffffffff)
5613b3a8eb9SGleb Smirnoff rpool->counter.addr32[2] =
5623b3a8eb9SGleb Smirnoff htonl(arc4random());
5633b3a8eb9SGleb Smirnoff else
5643b3a8eb9SGleb Smirnoff break;
5653b3a8eb9SGleb Smirnoff if (rmask->addr32[1] != 0xffffffff)
5663b3a8eb9SGleb Smirnoff rpool->counter.addr32[1] =
5673b3a8eb9SGleb Smirnoff htonl(arc4random());
5683b3a8eb9SGleb Smirnoff else
5693b3a8eb9SGleb Smirnoff break;
5703b3a8eb9SGleb Smirnoff if (rmask->addr32[0] != 0xffffffff)
5713b3a8eb9SGleb Smirnoff rpool->counter.addr32[0] =
5723b3a8eb9SGleb Smirnoff htonl(arc4random());
5733b3a8eb9SGleb Smirnoff break;
5743b3a8eb9SGleb Smirnoff #endif /* INET6 */
5753b3a8eb9SGleb Smirnoff }
5763b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr, raddr, rmask, &rpool->counter, af);
5773b3a8eb9SGleb Smirnoff PF_ACPY(init_addr, naddr, af);
5783b3a8eb9SGleb Smirnoff
5793b3a8eb9SGleb Smirnoff } else {
5803b3a8eb9SGleb Smirnoff PF_AINC(&rpool->counter, af);
5813b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr, raddr, rmask, &rpool->counter, af);
5823b3a8eb9SGleb Smirnoff }
5833b3a8eb9SGleb Smirnoff break;
5843b3a8eb9SGleb Smirnoff case PF_POOL_SRCHASH:
5853b3a8eb9SGleb Smirnoff {
5863b3a8eb9SGleb Smirnoff unsigned char hash[16];
5873b3a8eb9SGleb Smirnoff
588c2346c3dSKristof Provost hashidx =
5893b3a8eb9SGleb Smirnoff pf_hash(saddr, (struct pf_addr *)&hash, &rpool->key, af);
590c2346c3dSKristof Provost if (rpool->cur->addr.type == PF_ADDR_TABLE) {
591c2346c3dSKristof Provost cnt = rpool->cur->addr.p.tbl->pfrkt_cnt;
592a373ea07SKristof Provost if (cnt == 0)
593a373ea07SKristof Provost rpool->tblidx = 0;
594a373ea07SKristof Provost else
595c2346c3dSKristof Provost rpool->tblidx = (int)(hashidx % cnt);
596c2346c3dSKristof Provost memset(&rpool->counter, 0, sizeof(rpool->counter));
597c2346c3dSKristof Provost if (pfr_pool_get(rpool->cur->addr.p.tbl,
598c2346c3dSKristof Provost &rpool->tblidx, &rpool->counter, af, NULL)) {
599c2346c3dSKristof Provost reason = PFRES_MAPFAILED;
600c2346c3dSKristof Provost goto done_pool_mtx; /* unsupported */
601c2346c3dSKristof Provost }
602c2346c3dSKristof Provost PF_ACPY(naddr, &rpool->counter, af);
603c2346c3dSKristof Provost } else if (rpool->cur->addr.type == PF_ADDR_DYNIFTL) {
604c2346c3dSKristof Provost cnt = rpool->cur->addr.p.dyn->pfid_kt->pfrkt_cnt;
605a373ea07SKristof Provost if (cnt == 0)
606a373ea07SKristof Provost rpool->tblidx = 0;
607a373ea07SKristof Provost else
608c2346c3dSKristof Provost rpool->tblidx = (int)(hashidx % cnt);
609c2346c3dSKristof Provost memset(&rpool->counter, 0, sizeof(rpool->counter));
610c2346c3dSKristof Provost if (pfr_pool_get(rpool->cur->addr.p.dyn->pfid_kt,
611c2346c3dSKristof Provost &rpool->tblidx, &rpool->counter, af,
612c2346c3dSKristof Provost pf_islinklocal)) {
613c2346c3dSKristof Provost reason = PFRES_MAPFAILED;
614c2346c3dSKristof Provost goto done_pool_mtx; /* unsupported */
615c2346c3dSKristof Provost }
616c2346c3dSKristof Provost PF_ACPY(naddr, &rpool->counter, af);
617c2346c3dSKristof Provost } else {
618c2346c3dSKristof Provost PF_POOLMASK(naddr, raddr, rmask,
619c2346c3dSKristof Provost (struct pf_addr *)&hash, af);
620c2346c3dSKristof Provost }
6213b3a8eb9SGleb Smirnoff break;
6223b3a8eb9SGleb Smirnoff }
6233b3a8eb9SGleb Smirnoff case PF_POOL_ROUNDROBIN:
6243b3a8eb9SGleb Smirnoff {
625320c1116SKristof Provost struct pf_kpooladdr *acur = rpool->cur;
6263b3a8eb9SGleb Smirnoff
6273b3a8eb9SGleb Smirnoff if (rpool->cur->addr.type == PF_ADDR_TABLE) {
6283b3a8eb9SGleb Smirnoff if (!pfr_pool_get(rpool->cur->addr.p.tbl,
6297d381d0aSKristof Provost &rpool->tblidx, &rpool->counter, af, NULL))
6303b3a8eb9SGleb Smirnoff goto get_addr;
6313b3a8eb9SGleb Smirnoff } else if (rpool->cur->addr.type == PF_ADDR_DYNIFTL) {
6323b3a8eb9SGleb Smirnoff if (!pfr_pool_get(rpool->cur->addr.p.dyn->pfid_kt,
6337d381d0aSKristof Provost &rpool->tblidx, &rpool->counter, af, pf_islinklocal))
6343b3a8eb9SGleb Smirnoff goto get_addr;
6353b3a8eb9SGleb Smirnoff } else if (pf_match_addr(0, raddr, rmask, &rpool->counter, af))
6363b3a8eb9SGleb Smirnoff goto get_addr;
6373b3a8eb9SGleb Smirnoff
6383b3a8eb9SGleb Smirnoff try_next:
6393b3a8eb9SGleb Smirnoff if (TAILQ_NEXT(rpool->cur, entries) == NULL)
6403b3a8eb9SGleb Smirnoff rpool->cur = TAILQ_FIRST(&rpool->list);
6413b3a8eb9SGleb Smirnoff else
6423b3a8eb9SGleb Smirnoff rpool->cur = TAILQ_NEXT(rpool->cur, entries);
6433b3a8eb9SGleb Smirnoff if (rpool->cur->addr.type == PF_ADDR_TABLE) {
6443b3a8eb9SGleb Smirnoff if (pfr_pool_get(rpool->cur->addr.p.tbl,
6457d381d0aSKristof Provost &rpool->tblidx, &rpool->counter, af, NULL)) {
6463b3a8eb9SGleb Smirnoff /* table contains no address of type 'af' */
6473b3a8eb9SGleb Smirnoff if (rpool->cur != acur)
6483b3a8eb9SGleb Smirnoff goto try_next;
64916303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
65016303d2bSKajetan Staszkiewicz goto done_pool_mtx;
6513b3a8eb9SGleb Smirnoff }
6523b3a8eb9SGleb Smirnoff } else if (rpool->cur->addr.type == PF_ADDR_DYNIFTL) {
6533b3a8eb9SGleb Smirnoff rpool->tblidx = -1;
6543b3a8eb9SGleb Smirnoff if (pfr_pool_get(rpool->cur->addr.p.dyn->pfid_kt,
6557d381d0aSKristof Provost &rpool->tblidx, &rpool->counter, af, pf_islinklocal)) {
6563b3a8eb9SGleb Smirnoff /* table contains no address of type 'af' */
6573b3a8eb9SGleb Smirnoff if (rpool->cur != acur)
6583b3a8eb9SGleb Smirnoff goto try_next;
65916303d2bSKajetan Staszkiewicz reason = PFRES_MAPFAILED;
66016303d2bSKajetan Staszkiewicz goto done_pool_mtx;
6613b3a8eb9SGleb Smirnoff }
6623b3a8eb9SGleb Smirnoff } else {
6633b3a8eb9SGleb Smirnoff raddr = &rpool->cur->addr.v.a.addr;
6643b3a8eb9SGleb Smirnoff rmask = &rpool->cur->addr.v.a.mask;
6653b3a8eb9SGleb Smirnoff PF_ACPY(&rpool->counter, raddr, af);
6663b3a8eb9SGleb Smirnoff }
6673b3a8eb9SGleb Smirnoff
6683b3a8eb9SGleb Smirnoff get_addr:
6693b3a8eb9SGleb Smirnoff PF_ACPY(naddr, &rpool->counter, af);
6703b3a8eb9SGleb Smirnoff if (init_addr != NULL && PF_AZERO(init_addr, af))
6713b3a8eb9SGleb Smirnoff PF_ACPY(init_addr, naddr, af);
6723b3a8eb9SGleb Smirnoff PF_AINC(&rpool->counter, af);
6733b3a8eb9SGleb Smirnoff break;
6743b3a8eb9SGleb Smirnoff }
6753b3a8eb9SGleb Smirnoff }
676d10de21fSKajetan Staszkiewicz
677d10de21fSKajetan Staszkiewicz if (nkif)
678d10de21fSKajetan Staszkiewicz *nkif = rpool->cur->kif;
679d10de21fSKajetan Staszkiewicz
6808e3d2529SKajetan Staszkiewicz done_pool_mtx:
6818e3d2529SKajetan Staszkiewicz mtx_unlock(&rpool->mtx);
6828e3d2529SKajetan Staszkiewicz
6838e3d2529SKajetan Staszkiewicz if (reason) {
6848e3d2529SKajetan Staszkiewicz counter_u64_add(V_pf_status.counters[reason], 1);
6858e3d2529SKajetan Staszkiewicz }
6868e3d2529SKajetan Staszkiewicz
6878e3d2529SKajetan Staszkiewicz return (reason);
6888e3d2529SKajetan Staszkiewicz }
6898e3d2529SKajetan Staszkiewicz
6908e3d2529SKajetan Staszkiewicz u_short
pf_map_addr_sn(sa_family_t af,struct pf_krule * r,struct pf_addr * saddr,struct pf_addr * naddr,struct pfi_kkif ** nkif,struct pf_addr * init_addr,struct pf_ksrc_node ** sn,struct pf_srchash ** sh,struct pf_kpool * rpool,pf_sn_types_t sn_type)6918e3d2529SKajetan Staszkiewicz pf_map_addr_sn(sa_family_t af, struct pf_krule *r, struct pf_addr *saddr,
6928e3d2529SKajetan Staszkiewicz struct pf_addr *naddr, struct pfi_kkif **nkif, struct pf_addr *init_addr,
69307e070efSKajetan Staszkiewicz struct pf_ksrc_node **sn, struct pf_srchash **sh, struct pf_kpool *rpool,
69407e070efSKajetan Staszkiewicz pf_sn_types_t sn_type)
6958e3d2529SKajetan Staszkiewicz {
6968e3d2529SKajetan Staszkiewicz u_short reason = 0;
6978e3d2529SKajetan Staszkiewicz
698c49c9da2SKajetan Staszkiewicz KASSERT(*sn == NULL, ("*sn not NULL"));
699c49c9da2SKajetan Staszkiewicz
700b9c0321dSKajetan Staszkiewicz /*
701c49c9da2SKajetan Staszkiewicz * If this is a sticky-address rule, try to find an existing src_node.
702c49c9da2SKajetan Staszkiewicz * Request the sh to be unlocked if sn was not found, as we never
703c49c9da2SKajetan Staszkiewicz * insert a new sn when parsing the ruleset.
704b9c0321dSKajetan Staszkiewicz */
705daea7039SKajetan Staszkiewicz if (rpool->opts & PF_POOL_STICKYADDR &&
706daea7039SKajetan Staszkiewicz (rpool->opts & PF_POOL_TYPEMASK) != PF_POOL_NONE)
70707e070efSKajetan Staszkiewicz *sn = pf_find_src_node(saddr, r, af, sh, sn_type, false);
7088e3d2529SKajetan Staszkiewicz
709c49c9da2SKajetan Staszkiewicz if (*sn != NULL) {
710b9c0321dSKajetan Staszkiewicz PF_SRC_NODE_LOCK_ASSERT(*sn);
711b9c0321dSKajetan Staszkiewicz
7128e3d2529SKajetan Staszkiewicz /* If the supplied address is the same as the current one we've
7138e3d2529SKajetan Staszkiewicz * been asked before, so tell the caller that there's no other
7148e3d2529SKajetan Staszkiewicz * address to be had. */
7158e3d2529SKajetan Staszkiewicz if (PF_AEQ(naddr, &(*sn)->raddr, af)) {
7168e3d2529SKajetan Staszkiewicz reason = PFRES_MAPFAILED;
7178e3d2529SKajetan Staszkiewicz goto done;
7188e3d2529SKajetan Staszkiewicz }
7198e3d2529SKajetan Staszkiewicz
7208e3d2529SKajetan Staszkiewicz PF_ACPY(naddr, &(*sn)->raddr, af);
7218e3d2529SKajetan Staszkiewicz if (nkif)
7228e3d2529SKajetan Staszkiewicz *nkif = (*sn)->rkif;
7238e3d2529SKajetan Staszkiewicz if (V_pf_status.debug >= PF_DEBUG_NOISY) {
7248e3d2529SKajetan Staszkiewicz printf("pf_map_addr: src tracking maps ");
7258e3d2529SKajetan Staszkiewicz pf_print_host(saddr, 0, af);
7268e3d2529SKajetan Staszkiewicz printf(" to ");
7278e3d2529SKajetan Staszkiewicz pf_print_host(naddr, 0, af);
7288e3d2529SKajetan Staszkiewicz if (nkif)
7298e3d2529SKajetan Staszkiewicz printf("@%s", (*nkif)->pfik_name);
7308e3d2529SKajetan Staszkiewicz printf("\n");
7318e3d2529SKajetan Staszkiewicz }
7328e3d2529SKajetan Staszkiewicz goto done;
7338e3d2529SKajetan Staszkiewicz }
7348e3d2529SKajetan Staszkiewicz
7358e3d2529SKajetan Staszkiewicz /*
7368e3d2529SKajetan Staszkiewicz * Source node has not been found. Find a new address and store it
7378e3d2529SKajetan Staszkiewicz * in variables given by the caller.
7388e3d2529SKajetan Staszkiewicz */
739fcdb520cSKristof Provost if (pf_map_addr(af, r, saddr, naddr, nkif, init_addr, rpool) != 0) {
7408e3d2529SKajetan Staszkiewicz /* pf_map_addr() sets reason counters on its own */
7418e3d2529SKajetan Staszkiewicz goto done;
7428e3d2529SKajetan Staszkiewicz }
7438e3d2529SKajetan Staszkiewicz
744498cca14SKristof Provost if (V_pf_status.debug >= PF_DEBUG_NOISY &&
7453b3a8eb9SGleb Smirnoff (rpool->opts & PF_POOL_TYPEMASK) != PF_POOL_NONE) {
7463b3a8eb9SGleb Smirnoff printf("pf_map_addr: selected address ");
7473b3a8eb9SGleb Smirnoff pf_print_host(naddr, 0, af);
748d10de21fSKajetan Staszkiewicz if (nkif)
749d10de21fSKajetan Staszkiewicz printf("@%s", (*nkif)->pfik_name);
7503b3a8eb9SGleb Smirnoff printf("\n");
7513b3a8eb9SGleb Smirnoff }
7523b3a8eb9SGleb Smirnoff
75316303d2bSKajetan Staszkiewicz done:
754b9c0321dSKajetan Staszkiewicz if ((*sn) != NULL)
755b9c0321dSKajetan Staszkiewicz PF_SRC_NODE_UNLOCK(*sn);
756b9c0321dSKajetan Staszkiewicz
75716303d2bSKajetan Staszkiewicz if (reason) {
75816303d2bSKajetan Staszkiewicz counter_u64_add(V_pf_status.counters[reason], 1);
75916303d2bSKajetan Staszkiewicz }
76016303d2bSKajetan Staszkiewicz
76116303d2bSKajetan Staszkiewicz return (reason);
7623b3a8eb9SGleb Smirnoff }
7633b3a8eb9SGleb Smirnoff
7647e65cfc9SMark Johnston u_short
pf_get_translation(struct pf_pdesc * pd,int off,struct pf_state_key ** skp,struct pf_state_key ** nkp,struct pf_kanchor_stackframe * anchor_stack,struct pf_krule ** rp,struct pf_udp_mapping ** udp_mapping)7659a405864SKristof Provost pf_get_translation(struct pf_pdesc *pd, int off,
7662d7e68d5SKristof Provost struct pf_state_key **skp, struct pf_state_key **nkp,
767b9c0321dSKajetan Staszkiewicz struct pf_kanchor_stackframe *anchor_stack, struct pf_krule **rp,
768390dc369STom Jones struct pf_udp_mapping **udp_mapping)
7693b3a8eb9SGleb Smirnoff {
770e86bddeaSKristof Provost struct pf_krule *r = NULL;
7713b3a8eb9SGleb Smirnoff struct pf_addr *naddr;
772b9c0321dSKajetan Staszkiewicz struct pf_ksrc_node *sn = NULL;
773b9c0321dSKajetan Staszkiewicz struct pf_srchash *sh = NULL;
7749897a669SMark Johnston uint16_t *nportp;
7752aa21096SKurosawa Takahiro uint16_t low, high;
7767e65cfc9SMark Johnston u_short reason;
7773b3a8eb9SGleb Smirnoff
7783b3a8eb9SGleb Smirnoff PF_RULES_RASSERT();
7793b3a8eb9SGleb Smirnoff KASSERT(*skp == NULL, ("*skp not NULL"));
7803b3a8eb9SGleb Smirnoff KASSERT(*nkp == NULL, ("*nkp not NULL"));
7813b3a8eb9SGleb Smirnoff
7827e65cfc9SMark Johnston *rp = NULL;
7837e65cfc9SMark Johnston
784f2064dd1SKajetan Staszkiewicz if (pd->dir == PF_OUT) {
7852d7e68d5SKristof Provost r = pf_match_translation(pd, PF_RULESET_BINAT, anchor_stack);
7863b3a8eb9SGleb Smirnoff if (r == NULL)
7872d7e68d5SKristof Provost r = pf_match_translation(pd, PF_RULESET_NAT, anchor_stack);
7883b3a8eb9SGleb Smirnoff } else {
7892d7e68d5SKristof Provost r = pf_match_translation(pd, PF_RULESET_RDR, anchor_stack);
7903b3a8eb9SGleb Smirnoff if (r == NULL)
7912d7e68d5SKristof Provost r = pf_match_translation(pd, PF_RULESET_BINAT, anchor_stack);
7923b3a8eb9SGleb Smirnoff }
7933b3a8eb9SGleb Smirnoff
7943b3a8eb9SGleb Smirnoff if (r == NULL)
7957e65cfc9SMark Johnston return (PFRES_MAX);
7963b3a8eb9SGleb Smirnoff
7973b3a8eb9SGleb Smirnoff switch (r->action) {
7983b3a8eb9SGleb Smirnoff case PF_NONAT:
7993b3a8eb9SGleb Smirnoff case PF_NOBINAT:
8003b3a8eb9SGleb Smirnoff case PF_NORDR:
8017e65cfc9SMark Johnston return (PFRES_MAX);
8023b3a8eb9SGleb Smirnoff }
8033b3a8eb9SGleb Smirnoff
804fcdb520cSKristof Provost if (pf_state_key_setup(pd, pd->nsport, pd->ndport, skp, nkp))
8057e65cfc9SMark Johnston return (PFRES_MEMORY);
8063b3a8eb9SGleb Smirnoff
8073b3a8eb9SGleb Smirnoff naddr = &(*nkp)->addr[1];
8089897a669SMark Johnston nportp = &(*nkp)->port[1];
8093b3a8eb9SGleb Smirnoff
8103b3a8eb9SGleb Smirnoff switch (r->action) {
8113b3a8eb9SGleb Smirnoff case PF_NAT:
8122aa21096SKurosawa Takahiro if (pd->proto == IPPROTO_ICMP) {
8132aa21096SKurosawa Takahiro low = 1;
8142aa21096SKurosawa Takahiro high = 65535;
8152aa21096SKurosawa Takahiro } else {
816e11dacbfSKristof Provost low = r->rdr.proxy_port[0];
817e11dacbfSKristof Provost high = r->rdr.proxy_port[1];
8182aa21096SKurosawa Takahiro }
819e11dacbfSKristof Provost if (r->rdr.mape.offset > 0) {
8202d7e68d5SKristof Provost if (pf_get_mape_sport(pd, r, naddr, nportp, &sn,
8212d7e68d5SKristof Provost &sh, udp_mapping)) {
8222aa21096SKurosawa Takahiro DPFPRINTF(PF_DEBUG_MISC,
8232aa21096SKurosawa Takahiro ("pf: MAP-E port allocation (%u/%u/%u)"
8242aa21096SKurosawa Takahiro " failed\n",
825e11dacbfSKristof Provost r->rdr.mape.offset,
826e11dacbfSKristof Provost r->rdr.mape.psidlen,
827e11dacbfSKristof Provost r->rdr.mape.psid));
8287e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8292aa21096SKurosawa Takahiro goto notrans;
8302aa21096SKurosawa Takahiro }
8312d7e68d5SKristof Provost } else if (pf_get_sport(pd, r, naddr, nportp, low, high, &sn,
83207e070efSKajetan Staszkiewicz &sh, &r->rdr, udp_mapping, PF_SN_NAT)) {
8333b3a8eb9SGleb Smirnoff DPFPRINTF(PF_DEBUG_MISC,
8343b3a8eb9SGleb Smirnoff ("pf: NAT proxy port allocation (%u-%u) failed\n",
835e11dacbfSKristof Provost r->rdr.proxy_port[0], r->rdr.proxy_port[1]));
8367e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8373b3a8eb9SGleb Smirnoff goto notrans;
8383b3a8eb9SGleb Smirnoff }
8393b3a8eb9SGleb Smirnoff break;
8403b3a8eb9SGleb Smirnoff case PF_BINAT:
841f2064dd1SKajetan Staszkiewicz switch (pd->dir) {
8423b3a8eb9SGleb Smirnoff case PF_OUT:
843e11dacbfSKristof Provost if (r->rdr.cur->addr.type == PF_ADDR_DYNIFTL){
8443b3a8eb9SGleb Smirnoff switch (pd->af) {
8453b3a8eb9SGleb Smirnoff #ifdef INET
8463b3a8eb9SGleb Smirnoff case AF_INET:
847e11dacbfSKristof Provost if (r->rdr.cur->addr.p.dyn->
8487e65cfc9SMark Johnston pfid_acnt4 < 1) {
8497e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8503b3a8eb9SGleb Smirnoff goto notrans;
8517e65cfc9SMark Johnston }
8523b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr,
853e11dacbfSKristof Provost &r->rdr.cur->addr.p.dyn->
8543b3a8eb9SGleb Smirnoff pfid_addr4,
855e11dacbfSKristof Provost &r->rdr.cur->addr.p.dyn->
8562d7e68d5SKristof Provost pfid_mask4, &pd->nsaddr, AF_INET);
8573b3a8eb9SGleb Smirnoff break;
8583b3a8eb9SGleb Smirnoff #endif /* INET */
8593b3a8eb9SGleb Smirnoff #ifdef INET6
8603b3a8eb9SGleb Smirnoff case AF_INET6:
861e11dacbfSKristof Provost if (r->rdr.cur->addr.p.dyn->
8627e65cfc9SMark Johnston pfid_acnt6 < 1) {
8637e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8643b3a8eb9SGleb Smirnoff goto notrans;
8657e65cfc9SMark Johnston }
8663b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr,
867e11dacbfSKristof Provost &r->rdr.cur->addr.p.dyn->
8683b3a8eb9SGleb Smirnoff pfid_addr6,
869e11dacbfSKristof Provost &r->rdr.cur->addr.p.dyn->
8702d7e68d5SKristof Provost pfid_mask6, &pd->nsaddr, AF_INET6);
8713b3a8eb9SGleb Smirnoff break;
8723b3a8eb9SGleb Smirnoff #endif /* INET6 */
8733b3a8eb9SGleb Smirnoff }
8743b3a8eb9SGleb Smirnoff } else
8753b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr,
876e11dacbfSKristof Provost &r->rdr.cur->addr.v.a.addr,
8772d7e68d5SKristof Provost &r->rdr.cur->addr.v.a.mask, &pd->nsaddr,
8783b3a8eb9SGleb Smirnoff pd->af);
8793b3a8eb9SGleb Smirnoff break;
8803b3a8eb9SGleb Smirnoff case PF_IN:
8813b3a8eb9SGleb Smirnoff if (r->src.addr.type == PF_ADDR_DYNIFTL) {
8823b3a8eb9SGleb Smirnoff switch (pd->af) {
8833b3a8eb9SGleb Smirnoff #ifdef INET
8843b3a8eb9SGleb Smirnoff case AF_INET:
8857e65cfc9SMark Johnston if (r->src.addr.p.dyn->pfid_acnt4 < 1) {
8867e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8873b3a8eb9SGleb Smirnoff goto notrans;
8887e65cfc9SMark Johnston }
8893b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr,
8903b3a8eb9SGleb Smirnoff &r->src.addr.p.dyn->pfid_addr4,
8913b3a8eb9SGleb Smirnoff &r->src.addr.p.dyn->pfid_mask4,
8922d7e68d5SKristof Provost &pd->ndaddr, AF_INET);
8933b3a8eb9SGleb Smirnoff break;
8943b3a8eb9SGleb Smirnoff #endif /* INET */
8953b3a8eb9SGleb Smirnoff #ifdef INET6
8963b3a8eb9SGleb Smirnoff case AF_INET6:
8977e65cfc9SMark Johnston if (r->src.addr.p.dyn->pfid_acnt6 < 1) {
8987e65cfc9SMark Johnston reason = PFRES_MAPFAILED;
8993b3a8eb9SGleb Smirnoff goto notrans;
9007e65cfc9SMark Johnston }
9013b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr,
9023b3a8eb9SGleb Smirnoff &r->src.addr.p.dyn->pfid_addr6,
9033b3a8eb9SGleb Smirnoff &r->src.addr.p.dyn->pfid_mask6,
9042d7e68d5SKristof Provost &pd->ndaddr, AF_INET6);
9053b3a8eb9SGleb Smirnoff break;
9063b3a8eb9SGleb Smirnoff #endif /* INET6 */
9073b3a8eb9SGleb Smirnoff }
9083b3a8eb9SGleb Smirnoff } else
9093b3a8eb9SGleb Smirnoff PF_POOLMASK(naddr, &r->src.addr.v.a.addr,
9102d7e68d5SKristof Provost &r->src.addr.v.a.mask, &pd->ndaddr, pd->af);
9113b3a8eb9SGleb Smirnoff break;
9123b3a8eb9SGleb Smirnoff }
9133b3a8eb9SGleb Smirnoff break;
9143b3a8eb9SGleb Smirnoff case PF_RDR: {
9159897a669SMark Johnston struct pf_state_key_cmp key;
916339a1977SMark Johnston int tries;
9179897a669SMark Johnston uint16_t cut, low, high, nport;
9189897a669SMark Johnston
9192d7e68d5SKristof Provost reason = pf_map_addr_sn(pd->af, r, &pd->nsaddr, naddr, NULL,
92007e070efSKajetan Staszkiewicz NULL, &sn, &sh, &r->rdr, PF_SN_NAT);
9217e65cfc9SMark Johnston if (reason != 0)
9223b3a8eb9SGleb Smirnoff goto notrans;
923e11dacbfSKristof Provost if ((r->rdr.opts & PF_POOL_TYPEMASK) == PF_POOL_BITMASK)
924e11dacbfSKristof Provost PF_POOLMASK(naddr, naddr, &r->rdr.cur->addr.v.a.mask,
9252d7e68d5SKristof Provost &pd->ndaddr, pd->af);
9263b3a8eb9SGleb Smirnoff
9276053adafSKristof Provost /* Do not change SCTP ports. */
9286053adafSKristof Provost if (pd->proto == IPPROTO_SCTP)
9296053adafSKristof Provost break;
9306053adafSKristof Provost
931e11dacbfSKristof Provost if (r->rdr.proxy_port[1]) {
9323b3a8eb9SGleb Smirnoff uint32_t tmp_nport;
9333b3a8eb9SGleb Smirnoff
9342d7e68d5SKristof Provost tmp_nport = ((ntohs(pd->ndport) - ntohs(r->dst.port[0])) %
935e11dacbfSKristof Provost (r->rdr.proxy_port[1] - r->rdr.proxy_port[0] +
936e11dacbfSKristof Provost 1)) + r->rdr.proxy_port[0];
9373b3a8eb9SGleb Smirnoff
9383b3a8eb9SGleb Smirnoff /* Wrap around if necessary. */
9393b3a8eb9SGleb Smirnoff if (tmp_nport > 65535)
9403b3a8eb9SGleb Smirnoff tmp_nport -= 65535;
9419897a669SMark Johnston nport = htons((uint16_t)tmp_nport);
942e11dacbfSKristof Provost } else if (r->rdr.proxy_port[0])
943e11dacbfSKristof Provost nport = htons(r->rdr.proxy_port[0]);
9449897a669SMark Johnston else
9452d7e68d5SKristof Provost nport = pd->ndport;
9469897a669SMark Johnston
9479897a669SMark Johnston /*
9489897a669SMark Johnston * Update the destination port.
9499897a669SMark Johnston */
9509897a669SMark Johnston *nportp = nport;
9519897a669SMark Johnston
9529897a669SMark Johnston /*
9539897a669SMark Johnston * Do we have a source port conflict in the stack state? Try to
9549897a669SMark Johnston * modulate the source port if so. Note that this is racy since
9559897a669SMark Johnston * the state lookup may not find any matches here but will once
9569897a669SMark Johnston * pf_create_state() actually instantiates the state.
9579897a669SMark Johnston */
9589897a669SMark Johnston bzero(&key, sizeof(key));
9599897a669SMark Johnston key.af = pd->af;
9609897a669SMark Johnston key.proto = pd->proto;
9612d7e68d5SKristof Provost key.port[0] = pd->nsport;
9622d7e68d5SKristof Provost PF_ACPY(&key.addr[0], &pd->nsaddr, key.af);
9639897a669SMark Johnston key.port[1] = nport;
9649897a669SMark Johnston PF_ACPY(&key.addr[1], naddr, key.af);
9659897a669SMark Johnston
9669897a669SMark Johnston if (!pf_find_state_all_exists(&key, PF_OUT))
9679897a669SMark Johnston break;
9689897a669SMark Johnston
969339a1977SMark Johnston tries = 0;
970339a1977SMark Johnston
9719897a669SMark Johnston low = 50001; /* XXX-MJ PF_NAT_PROXY_PORT_LOW/HIGH */
9729897a669SMark Johnston high = 65535;
9739897a669SMark Johnston cut = arc4random() % (1 + high - low) + low;
9749897a669SMark Johnston for (uint32_t tmp = cut;
975339a1977SMark Johnston tmp <= high && tmp <= UINT16_MAX &&
976339a1977SMark Johnston tries < V_pf_rdr_srcport_rewrite_tries;
977339a1977SMark Johnston tmp++, tries++) {
9789897a669SMark Johnston key.port[0] = htons(tmp);
9799897a669SMark Johnston if (!pf_find_state_all_exists(&key, PF_OUT)) {
9809897a669SMark Johnston /* Update the source port. */
9819897a669SMark Johnston (*nkp)->port[0] = htons(tmp);
9829897a669SMark Johnston goto out;
9839897a669SMark Johnston }
9849897a669SMark Johnston }
985339a1977SMark Johnston for (uint32_t tmp = cut - 1;
986339a1977SMark Johnston tmp >= low && tries < V_pf_rdr_srcport_rewrite_tries;
987339a1977SMark Johnston tmp--, tries++) {
9889897a669SMark Johnston key.port[0] = htons(tmp);
9899897a669SMark Johnston if (!pf_find_state_all_exists(&key, PF_OUT)) {
9909897a669SMark Johnston /* Update the source port. */
9919897a669SMark Johnston (*nkp)->port[0] = htons(tmp);
9929897a669SMark Johnston goto out;
9939897a669SMark Johnston }
9949897a669SMark Johnston }
9959897a669SMark Johnston
9969569fdddSMark Johnston /*
9979569fdddSMark Johnston * We failed to find a match. Push on ahead anyway, let
9989569fdddSMark Johnston * pf_state_insert() be the arbiter of whether the state
9999569fdddSMark Johnston * conflict is tolerable. In particular, with TCP connections
10009569fdddSMark Johnston * the state may be reused if the TCP state is terminal.
10019569fdddSMark Johnston */
10029897a669SMark Johnston DPFPRINTF(PF_DEBUG_MISC,
10039897a669SMark Johnston ("pf: RDR source port allocation failed\n"));
10049569fdddSMark Johnston break;
10057e65cfc9SMark Johnston
10069897a669SMark Johnston out:
10079897a669SMark Johnston DPFPRINTF(PF_DEBUG_MISC,
10089897a669SMark Johnston ("pf: RDR source port allocation %u->%u\n",
10092d7e68d5SKristof Provost ntohs(pd->nsport), ntohs((*nkp)->port[0])));
10103b3a8eb9SGleb Smirnoff break;
10113b3a8eb9SGleb Smirnoff }
10123b3a8eb9SGleb Smirnoff default:
10133b3a8eb9SGleb Smirnoff panic("%s: unknown action %u", __func__, r->action);
10143b3a8eb9SGleb Smirnoff }
10153b3a8eb9SGleb Smirnoff
10163b3a8eb9SGleb Smirnoff /* Return success only if translation really happened. */
10177e65cfc9SMark Johnston if (bcmp(*skp, *nkp, sizeof(struct pf_state_key_cmp))) {
10187e65cfc9SMark Johnston *rp = r;
10197e65cfc9SMark Johnston return (PFRES_MATCH);
10207e65cfc9SMark Johnston }
10213b3a8eb9SGleb Smirnoff
10227e65cfc9SMark Johnston reason = PFRES_MAX;
10233b3a8eb9SGleb Smirnoff notrans:
10243b3a8eb9SGleb Smirnoff uma_zfree(V_pf_state_key_z, *nkp);
10253b3a8eb9SGleb Smirnoff uma_zfree(V_pf_state_key_z, *skp);
10263b3a8eb9SGleb Smirnoff *skp = *nkp = NULL;
10273b3a8eb9SGleb Smirnoff
10287e65cfc9SMark Johnston return (reason);
10293b3a8eb9SGleb Smirnoff }
1030fcdb520cSKristof Provost
1031fcdb520cSKristof Provost int
pf_get_transaddr_af(struct pf_krule * r,struct pf_pdesc * pd)1032fcdb520cSKristof Provost pf_get_transaddr_af(struct pf_krule *r, struct pf_pdesc *pd)
1033fcdb520cSKristof Provost {
1034fcdb520cSKristof Provost #if defined(INET) && defined(INET6)
1035fcdb520cSKristof Provost struct pf_addr ndaddr, nsaddr, naddr;
1036fcdb520cSKristof Provost u_int16_t nport = 0;
1037fcdb520cSKristof Provost int prefixlen = 96;
1038fcdb520cSKristof Provost struct pf_srchash *sh = NULL;
1039fcdb520cSKristof Provost struct pf_ksrc_node *sns = NULL;
1040fcdb520cSKristof Provost
10414be8e29eSKristof Provost bzero(&nsaddr, sizeof(nsaddr));
10424be8e29eSKristof Provost bzero(&ndaddr, sizeof(ndaddr));
10434be8e29eSKristof Provost
1044fcdb520cSKristof Provost if (V_pf_status.debug >= PF_DEBUG_MISC) {
1045fcdb520cSKristof Provost printf("pf: af-to %s %s, ",
1046fcdb520cSKristof Provost pd->naf == AF_INET ? "inet" : "inet6",
1047fcdb520cSKristof Provost TAILQ_EMPTY(&r->rdr.list) ? "nat" : "rdr");
1048fcdb520cSKristof Provost pf_print_host(&pd->nsaddr, pd->nsport, pd->af);
1049fcdb520cSKristof Provost printf(" -> ");
1050fcdb520cSKristof Provost pf_print_host(&pd->ndaddr, pd->ndport, pd->af);
1051fcdb520cSKristof Provost printf("\n");
1052fcdb520cSKristof Provost }
1053fcdb520cSKristof Provost
1054fcdb520cSKristof Provost if (TAILQ_EMPTY(&r->nat.list))
1055fcdb520cSKristof Provost panic("pf_get_transaddr_af: no nat pool for source address");
1056fcdb520cSKristof Provost
1057fcdb520cSKristof Provost /* get source address and port */
1058fcdb520cSKristof Provost if (pf_get_sport(pd, r, &nsaddr, &nport,
105907e070efSKajetan Staszkiewicz r->nat.proxy_port[0], r->nat.proxy_port[1], &sns, &sh, &r->nat,
106007e070efSKajetan Staszkiewicz NULL, PF_SN_NAT)) {
1061fcdb520cSKristof Provost DPFPRINTF(PF_DEBUG_MISC,
1062fcdb520cSKristof Provost ("pf: af-to NAT proxy port allocation (%u-%u) failed",
1063fcdb520cSKristof Provost r->nat.proxy_port[0], r->nat.proxy_port[1]));
1064fcdb520cSKristof Provost return (-1);
1065fcdb520cSKristof Provost }
1066fcdb520cSKristof Provost
1067fcdb520cSKristof Provost if (pd->proto == IPPROTO_ICMPV6 && pd->naf == AF_INET) {
1068*4cdcdf0eSKristof Provost pd->ndport = ntohs(pd->ndport);
1069fcdb520cSKristof Provost if (pd->ndport == ICMP6_ECHO_REQUEST)
1070fcdb520cSKristof Provost pd->ndport = ICMP_ECHO;
1071fcdb520cSKristof Provost else if (pd->ndport == ICMP6_ECHO_REPLY)
1072fcdb520cSKristof Provost pd->ndport = ICMP_ECHOREPLY;
1073*4cdcdf0eSKristof Provost pd->ndport = htons(pd->ndport);
1074fcdb520cSKristof Provost } else if (pd->proto == IPPROTO_ICMP && pd->naf == AF_INET6) {
1075*4cdcdf0eSKristof Provost pd->nsport = ntohs(pd->nsport);
1076fcdb520cSKristof Provost if (pd->ndport == ICMP_ECHO)
1077fcdb520cSKristof Provost pd->ndport = ICMP6_ECHO_REQUEST;
1078fcdb520cSKristof Provost else if (pd->ndport == ICMP_ECHOREPLY)
1079fcdb520cSKristof Provost pd->ndport = ICMP6_ECHO_REPLY;
1080*4cdcdf0eSKristof Provost pd->nsport = htons(pd->nsport);
1081fcdb520cSKristof Provost }
1082fcdb520cSKristof Provost
1083fcdb520cSKristof Provost /* get the destination address and port */
1084fcdb520cSKristof Provost if (! TAILQ_EMPTY(&r->rdr.list)) {
1085fcdb520cSKristof Provost if (pf_map_addr_sn(pd->naf, r, &nsaddr, &naddr, NULL, NULL,
108607e070efSKajetan Staszkiewicz &sns, NULL, &r->rdr, PF_SN_NAT))
1087fcdb520cSKristof Provost return (-1);
1088fcdb520cSKristof Provost if (r->rdr.proxy_port[0])
1089fcdb520cSKristof Provost pd->ndport = htons(r->rdr.proxy_port[0]);
1090fcdb520cSKristof Provost
1091fcdb520cSKristof Provost if (pd->naf == AF_INET) {
1092fcdb520cSKristof Provost /* The prefix is the IPv4 rdr address */
1093fcdb520cSKristof Provost prefixlen = in_mask2len(
1094fcdb520cSKristof Provost (struct in_addr *)&r->rdr.cur->addr.v.a.mask);
1095fcdb520cSKristof Provost inet_nat46(pd->naf, &pd->ndaddr, &ndaddr, &naddr,
1096fcdb520cSKristof Provost prefixlen);
1097fcdb520cSKristof Provost } else {
1098fcdb520cSKristof Provost /* The prefix is the IPv6 rdr address */
1099fcdb520cSKristof Provost prefixlen = in6_mask2len(
1100fcdb520cSKristof Provost (struct in6_addr *)&r->rdr.cur->addr.v.a.mask, NULL);
1101fcdb520cSKristof Provost inet_nat64(pd->naf, &pd->ndaddr, &ndaddr, &naddr,
1102fcdb520cSKristof Provost prefixlen);
1103fcdb520cSKristof Provost }
1104fcdb520cSKristof Provost } else {
1105fcdb520cSKristof Provost if (pd->naf == AF_INET) {
1106fcdb520cSKristof Provost /* The prefix is the IPv6 dst address */
1107fcdb520cSKristof Provost prefixlen = in6_mask2len(
1108fcdb520cSKristof Provost (struct in6_addr *)&r->dst.addr.v.a.mask, NULL);
1109fcdb520cSKristof Provost if (prefixlen < 32)
1110fcdb520cSKristof Provost prefixlen = 96;
1111fcdb520cSKristof Provost inet_nat64(pd->naf, &pd->ndaddr, &ndaddr, &pd->ndaddr,
1112fcdb520cSKristof Provost prefixlen);
1113fcdb520cSKristof Provost } else {
1114fcdb520cSKristof Provost /*
1115fcdb520cSKristof Provost * The prefix is the IPv6 nat address
1116fcdb520cSKristof Provost * (that was stored in pd->nsaddr)
1117fcdb520cSKristof Provost */
1118fcdb520cSKristof Provost prefixlen = in6_mask2len(
1119fcdb520cSKristof Provost (struct in6_addr *)&r->nat.cur->addr.v.a.mask, NULL);
1120fcdb520cSKristof Provost if (prefixlen > 96)
1121fcdb520cSKristof Provost prefixlen = 96;
1122fcdb520cSKristof Provost inet_nat64(pd->naf, &pd->ndaddr, &ndaddr, &nsaddr,
1123fcdb520cSKristof Provost prefixlen);
1124fcdb520cSKristof Provost }
1125fcdb520cSKristof Provost }
1126fcdb520cSKristof Provost
1127fcdb520cSKristof Provost PF_ACPY(&pd->nsaddr, &nsaddr, pd->naf);
1128fcdb520cSKristof Provost PF_ACPY(&pd->ndaddr, &ndaddr, pd->naf);
1129fcdb520cSKristof Provost
1130fcdb520cSKristof Provost if (V_pf_status.debug >= PF_DEBUG_MISC) {
1131fcdb520cSKristof Provost printf("pf: af-to %s done, prefixlen %d, ",
1132fcdb520cSKristof Provost pd->naf == AF_INET ? "inet" : "inet6",
1133fcdb520cSKristof Provost prefixlen);
1134fcdb520cSKristof Provost pf_print_host(&pd->nsaddr, pd->nsport, pd->naf);
1135fcdb520cSKristof Provost printf(" -> ");
1136fcdb520cSKristof Provost pf_print_host(&pd->ndaddr, pd->ndport, pd->naf);
1137fcdb520cSKristof Provost printf("\n");
1138fcdb520cSKristof Provost }
1139fcdb520cSKristof Provost
1140fcdb520cSKristof Provost return (0);
1141fcdb520cSKristof Provost #else
1142fcdb520cSKristof Provost return (-1);
1143fcdb520cSKristof Provost #endif
1144fcdb520cSKristof Provost }
1145