1 /* 2 * Copyright (C) 1993-2001, 2003 by Darren Reed. 3 * 4 * See the IPFILTER.LICENCE file for details on licencing. 5 * 6 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 7 * Use is subject to license terms. 8 */ 9 10 #pragma ident "%Z%%M% %I% %E% SMI" 11 12 #ifdef __FreeBSD__ 13 # ifndef __FreeBSD_cc_version 14 # include <osreldate.h> 15 # else 16 # if __FreeBSD_cc_version < 430000 17 # include <osreldate.h> 18 # endif 19 # endif 20 #endif 21 #include <sys/ioctl.h> 22 #include <fcntl.h> 23 #ifdef linux 24 # include <linux/a.out.h> 25 #else 26 # include <nlist.h> 27 #endif 28 #include <ctype.h> 29 #if defined(sun) && (defined(__svr4__) || defined(__SVR4)) 30 # include <stddef.h> 31 #endif 32 #include "ipf.h" 33 #include "netinet/ipl.h" 34 #if defined(STATETOP) 35 # if defined(_BSDI_VERSION) 36 # undef STATETOP 37 # endif 38 # if defined(__FreeBSD__) && \ 39 (!defined(__FreeBSD_version) || (__FreeBSD_version < 430000)) 40 # undef STATETOP 41 # endif 42 # if defined(__NetBSD_Version__) && (__NetBSD_Version__ < 105000000) 43 # undef STATETOP 44 # endif 45 # if defined(sun) 46 # if defined(__svr4__) || defined(__SVR4) 47 # include <sys/select.h> 48 # else 49 # undef STATETOP /* NOT supported on SunOS4 */ 50 # endif 51 # endif 52 #endif 53 #if defined(STATETOP) && !defined(linux) 54 # include <netinet/ip_var.h> 55 # include <netinet/tcp_fsm.h> 56 #endif 57 #ifdef STATETOP 58 # include <ctype.h> 59 # include <signal.h> 60 # if SOLARIS || defined(__NetBSD__) || defined(_BSDI_VERSION) || \ 61 defined(__sgi) 62 # ifdef ERR 63 # undef ERR 64 # endif 65 # undef ISASCII 66 # undef ISPRINT 67 # include <curses.h> 68 # else /* SOLARIS */ 69 # include <ncurses.h> 70 # endif /* SOLARIS */ 71 #endif /* STATETOP */ 72 #include "kmem.h" 73 #if defined(__NetBSD__) || (__OpenBSD__) 74 # include <paths.h> 75 #endif 76 77 #if !defined(lint) 78 static const char sccsid[] = "@(#)fils.c 1.21 4/20/96 (C) 1993-2000 Darren Reed"; 79 static const char rcsid[] = "@(#)$Id: ipfstat.c,v 1.44.2.12 2005/06/12 07:18:46 darrenr Exp $"; 80 #endif 81 82 #ifdef __hpux 83 # define nlist nlist64 84 #endif 85 86 extern char *optarg; 87 extern int optind; 88 extern int opterr; 89 90 #define PRINTF (void)printf 91 #define FPRINTF (void)fprintf 92 #define F_IN 0 93 #define F_OUT 1 94 #define F_ACIN 2 95 #define F_ACOUT 3 96 static char *filters[4] = { "ipfilter(in)", "ipfilter(out)", 97 "ipacct(in)", "ipacct(out)" }; 98 static int state_logging = -1; 99 100 int opts = 0; 101 int use_inet6 = 0; 102 int live_kernel = 1; 103 int state_fd = -1; 104 int ipf_fd = -1; 105 106 #ifdef STATETOP 107 #define STSTRSIZE 80 108 #define STGROWSIZE 16 109 #define HOSTNMLEN 40 110 111 #define STSORT_PR 0 112 #define STSORT_PKTS 1 113 #define STSORT_BYTES 2 114 #define STSORT_TTL 3 115 #define STSORT_SRCIP 4 116 #define STSORT_SRCPT 5 117 #define STSORT_DSTIP 6 118 #define STSORT_DSTPT 7 119 #define STSORT_MAX STSORT_DSTPT 120 #define STSORT_DEFAULT STSORT_BYTES 121 122 123 typedef struct statetop { 124 i6addr_t st_src; 125 i6addr_t st_dst; 126 u_short st_sport; 127 u_short st_dport; 128 u_char st_p; 129 u_char st_v; 130 u_char st_state[2]; 131 U_QUAD_T st_pkts; 132 U_QUAD_T st_bytes; 133 u_long st_age; 134 } statetop_t; 135 #endif 136 137 int main __P((int, char *[])); 138 139 static void showstats __P((friostat_t *, u_32_t)); 140 static void showfrstates __P((ipfrstat_t *)); 141 static void showlist __P((friostat_t *)); 142 static void showipstates __P((ips_stat_t *)); 143 static void showauthstates __P((fr_authstat_t *)); 144 static void showgroups __P((friostat_t *)); 145 static void usage __P((char *)); 146 static void printlist __P((frentry_t *, char *)); 147 static void parse_ipportstr __P((const char *, i6addr_t *, int *)); 148 static void ipfstate_live __P((char *, friostat_t **, ips_stat_t **, 149 ipfrstat_t **, fr_authstat_t **, u_32_t *)); 150 static void ipfstate_dead __P((char *, friostat_t **, ips_stat_t **, 151 ipfrstat_t **, fr_authstat_t **, u_32_t *)); 152 #ifdef STATETOP 153 static void topipstates __P((i6addr_t, i6addr_t, int, int, int, 154 int, int, int)); 155 static void sig_break __P((int)); 156 static void sig_resize __P((int)); 157 static char *getip __P((int, i6addr_t *)); 158 static char *ttl_to_string __P((long)); 159 static int sort_p __P((const void *, const void *)); 160 static int sort_pkts __P((const void *, const void *)); 161 static int sort_bytes __P((const void *, const void *)); 162 static int sort_ttl __P((const void *, const void *)); 163 static int sort_srcip __P((const void *, const void *)); 164 static int sort_srcpt __P((const void *, const void *)); 165 static int sort_dstip __P((const void *, const void *)); 166 static int sort_dstpt __P((const void *, const void *)); 167 #endif 168 169 170 static void usage(name) 171 char *name; 172 { 173 #ifdef USE_INET6 174 fprintf(stderr, "Usage: %s [-6aAdfghIilnoRsv]\n", name); 175 #else 176 fprintf(stderr, "Usage: %s [-aAdfghIilnoRsv]\n", name); 177 #endif 178 fprintf(stderr, " %s [-M corefile] [-N symbol-list]\n", name); 179 #ifdef USE_INET6 180 fprintf(stderr, " %s -t [-6C] ", name); 181 #else 182 fprintf(stderr, " %s -t [-C] ", name); 183 #endif 184 fprintf(stderr, "[-D destination address] [-P protocol] [-S source address] [-T refresh time]\n"); 185 exit(1); 186 } 187 188 189 int main(argc,argv) 190 int argc; 191 char *argv[]; 192 { 193 fr_authstat_t frauthst; 194 fr_authstat_t *frauthstp = &frauthst; 195 friostat_t fio; 196 friostat_t *fiop = &fio; 197 ips_stat_t ipsst; 198 ips_stat_t *ipsstp = &ipsst; 199 ipfrstat_t ifrst; 200 ipfrstat_t *ifrstp = &ifrst; 201 char *device = IPL_NAME, *memf = NULL; 202 char *options, *kern = NULL; 203 int c, myoptind; 204 205 int protocol = -1; /* -1 = wild card for any protocol */ 206 int refreshtime = 1; /* default update time */ 207 int sport = -1; /* -1 = wild card for any source port */ 208 int dport = -1; /* -1 = wild card for any dest port */ 209 int topclosed = 0; /* do not show closed tcp sessions */ 210 i6addr_t saddr, daddr; 211 u_32_t frf; 212 213 #ifdef USE_INET6 214 options = "6aACdfghIilnostvD:M:N:P:RS:T:"; 215 #else 216 options = "aACdfghIilnostvD:M:N:P:RS:T:"; 217 #endif 218 219 saddr.in4.s_addr = INADDR_ANY; /* default any v4 source addr */ 220 daddr.in4.s_addr = INADDR_ANY; /* default any v4 dest addr */ 221 #ifdef USE_INET6 222 saddr.in6 = in6addr_any; /* default any v6 source addr */ 223 daddr.in6 = in6addr_any; /* default any v6 dest addr */ 224 #endif 225 226 /* Don't warn about invalid flags when we run getopt for the 1st time */ 227 opterr = 0; 228 229 /* 230 * Parse these two arguments now lest there be any buffer overflows 231 * in the parsing of the rest. 232 */ 233 myoptind = optind; 234 while ((c = getopt(argc, argv, options)) != -1) { 235 switch (c) 236 { 237 case 'M' : 238 memf = optarg; 239 live_kernel = 0; 240 break; 241 case 'N' : 242 kern = optarg; 243 live_kernel = 0; 244 break; 245 } 246 } 247 optind = myoptind; 248 249 if (live_kernel == 1) { 250 if ((state_fd = open(IPSTATE_NAME, O_RDONLY)) == -1) { 251 perror("open(IPSTATE_NAME)"); 252 exit(-1); 253 } 254 if ((ipf_fd = open(device, O_RDONLY)) == -1) { 255 fprintf(stderr, "open(%s)", device); 256 perror(""); 257 exit(-1); 258 } 259 } 260 261 if (kern != NULL || memf != NULL) { 262 (void)setgid(getgid()); 263 (void)setreuid(getuid(), getuid()); 264 } 265 266 if (live_kernel == 1) 267 (void) checkrev(device); 268 if (openkmem(kern, memf) == -1) 269 exit(-1); 270 271 (void)setgid(getgid()); 272 (void)setreuid(getuid(), getuid()); 273 274 opterr = 1; 275 276 while ((c = getopt(argc, argv, options)) != -1) 277 { 278 switch (c) 279 { 280 #ifdef USE_INET6 281 case '6' : 282 use_inet6 = 1; 283 break; 284 #endif 285 case 'a' : 286 opts |= OPT_ACCNT|OPT_SHOWLIST; 287 break; 288 case 'A' : 289 opts |= OPT_AUTHSTATS; 290 break; 291 case 'C' : 292 topclosed = 1; 293 break; 294 case 'd' : 295 opts |= OPT_DEBUG; 296 break; 297 case 'D' : 298 parse_ipportstr(optarg, &daddr, &dport); 299 break; 300 case 'f' : 301 opts |= OPT_FRSTATES; 302 break; 303 case 'g' : 304 opts |= OPT_GROUPS; 305 break; 306 case 'h' : 307 opts |= OPT_HITS; 308 break; 309 case 'i' : 310 opts |= OPT_INQUE|OPT_SHOWLIST; 311 break; 312 case 'I' : 313 opts |= OPT_INACTIVE; 314 break; 315 case 'l' : 316 opts |= OPT_SHOWLIST; 317 break; 318 case 'M' : 319 break; 320 case 'N' : 321 break; 322 case 'n' : 323 opts |= OPT_SHOWLINENO; 324 break; 325 case 'o' : 326 opts |= OPT_OUTQUE|OPT_SHOWLIST; 327 break; 328 case 'P' : 329 protocol = getproto(optarg); 330 if (protocol == -1) { 331 fprintf(stderr, "%s: Invalid protocol: %s\n", 332 argv[0], optarg); 333 exit(-2); 334 } 335 break; 336 case 'R' : 337 opts |= OPT_NORESOLVE; 338 break; 339 case 's' : 340 opts |= OPT_IPSTATES; 341 break; 342 case 'S' : 343 parse_ipportstr(optarg, &saddr, &sport); 344 break; 345 case 't' : 346 #ifdef STATETOP 347 opts |= OPT_STATETOP; 348 break; 349 #else 350 fprintf(stderr, 351 "%s: state top facility not compiled in\n", 352 argv[0]); 353 exit(-2); 354 #endif 355 case 'T' : 356 if (!sscanf(optarg, "%d", &refreshtime) || 357 (refreshtime <= 0)) { 358 fprintf(stderr, 359 "%s: Invalid refreshtime < 1 : %s\n", 360 argv[0], optarg); 361 exit(-2); 362 } 363 break; 364 case 'v' : 365 opts |= OPT_VERBOSE; 366 opts |= OPT_UNDEF; 367 break; 368 default : 369 usage(argv[0]); 370 break; 371 } 372 } 373 374 if (live_kernel == 1) { 375 bzero((char *)&fio, sizeof(fio)); 376 bzero((char *)&ipsst, sizeof(ipsst)); 377 bzero((char *)&ifrst, sizeof(ifrst)); 378 379 ipfstate_live(device, &fiop, &ipsstp, &ifrstp, 380 &frauthstp, &frf); 381 } else 382 ipfstate_dead(kern, &fiop, &ipsstp, &ifrstp, &frauthstp, &frf); 383 384 if (opts & OPT_IPSTATES) { 385 showipstates(ipsstp); 386 } else if (opts & OPT_SHOWLIST) { 387 showlist(fiop); 388 if ((opts & OPT_OUTQUE) && (opts & OPT_INQUE)){ 389 opts &= ~OPT_OUTQUE; 390 showlist(fiop); 391 } 392 } else if (opts & OPT_FRSTATES) 393 showfrstates(ifrstp); 394 #ifdef STATETOP 395 else if (opts & OPT_STATETOP) 396 topipstates(saddr, daddr, sport, dport, protocol, 397 use_inet6 ? 6 : 4, refreshtime, topclosed); 398 #endif 399 else if (opts & OPT_AUTHSTATS) 400 showauthstates(frauthstp); 401 else if (opts & OPT_GROUPS) 402 showgroups(fiop); 403 else 404 showstats(fiop, frf); 405 406 return 0; 407 } 408 409 410 /* 411 * Fill in the stats structures from the live kernel, using a combination 412 * of ioctl's and copying directly from kernel memory. 413 */ 414 static void ipfstate_live(device, fiopp, ipsstpp, ifrstpp, frauthstpp, frfp) 415 char *device; 416 friostat_t **fiopp; 417 ips_stat_t **ipsstpp; 418 ipfrstat_t **ifrstpp; 419 fr_authstat_t **frauthstpp; 420 u_32_t *frfp; 421 { 422 ipfobj_t ipfo; 423 424 if (checkrev(device) == -1) { 425 fprintf(stderr, "User/kernel version check failed\n"); 426 exit(1); 427 } 428 429 if ((opts & OPT_AUTHSTATS) == 0) { 430 bzero((caddr_t)&ipfo, sizeof(ipfo)); 431 ipfo.ipfo_rev = IPFILTER_VERSION; 432 ipfo.ipfo_size = sizeof(friostat_t); 433 ipfo.ipfo_ptr = (void *)*fiopp; 434 ipfo.ipfo_type = IPFOBJ_IPFSTAT; 435 436 if (ioctl(ipf_fd, SIOCGETFS, &ipfo) == -1) { 437 perror("ioctl(ipf:SIOCGETFS)"); 438 exit(-1); 439 } 440 441 if (ioctl(ipf_fd, SIOCGETFF, frfp) == -1) 442 perror("ioctl(SIOCGETFF)"); 443 } 444 445 if ((opts & OPT_IPSTATES) != 0) { 446 447 bzero((caddr_t)&ipfo, sizeof(ipfo)); 448 ipfo.ipfo_rev = IPFILTER_VERSION; 449 ipfo.ipfo_size = sizeof(ips_stat_t); 450 ipfo.ipfo_ptr = (void *)*ipsstpp; 451 ipfo.ipfo_type = IPFOBJ_STATESTAT; 452 453 if ((ioctl(state_fd, SIOCGETFS, &ipfo) == -1)) { 454 perror("ioctl(state:SIOCGETFS)"); 455 exit(-1); 456 } 457 if (ioctl(state_fd, SIOCGETLG, &state_logging) == -1) { 458 perror("ioctl(state:SIOCGETLG)"); 459 exit(-1); 460 } 461 } 462 463 if ((opts & OPT_FRSTATES) != 0) { 464 bzero((caddr_t)&ipfo, sizeof(ipfo)); 465 ipfo.ipfo_rev = IPFILTER_VERSION; 466 ipfo.ipfo_size = sizeof(ipfrstat_t); 467 ipfo.ipfo_ptr = (void *)*ifrstpp; 468 ipfo.ipfo_type = IPFOBJ_FRAGSTAT; 469 470 if (ioctl(ipf_fd, SIOCGFRST, &ipfo) == -1) { 471 perror("ioctl(SIOCGFRST)"); 472 exit(-1); 473 } 474 } 475 476 if (opts & OPT_VERBOSE) 477 PRINTF("opts %#x name %s\n", opts, device); 478 479 if ((opts & OPT_AUTHSTATS) != 0) { 480 if (ipf_fd >= 0) { 481 close(ipf_fd); 482 ipf_fd = -1; 483 } 484 device = IPAUTH_NAME; 485 if ((ipf_fd = open(device, O_RDONLY)) == -1) { 486 perror("open"); 487 exit(-1); 488 } 489 490 bzero((caddr_t)&ipfo, sizeof(ipfo)); 491 ipfo.ipfo_rev = IPFILTER_VERSION; 492 ipfo.ipfo_size = sizeof(fr_authstat_t); 493 ipfo.ipfo_ptr = (void *)*frauthstpp; 494 ipfo.ipfo_type = IPFOBJ_AUTHSTAT; 495 496 if (ioctl(ipf_fd, SIOCATHST, &ipfo) == -1) { 497 perror("ioctl(SIOCATHST)"); 498 exit(-1); 499 } 500 } 501 } 502 503 504 /* 505 * Build up the stats structures from data held in the "core" memory. 506 * This is mainly useful when looking at data in crash dumps and ioctl's 507 * just won't work any more. 508 */ 509 static void ipfstate_dead(kernel, fiopp, ipsstpp, ifrstpp, frauthstpp, frfp) 510 char *kernel; 511 friostat_t **fiopp; 512 ips_stat_t **ipsstpp; 513 ipfrstat_t **ifrstpp; 514 fr_authstat_t **frauthstpp; 515 u_32_t *frfp; 516 { 517 static fr_authstat_t frauthst, *frauthstp; 518 static ips_stat_t ipsst, *ipsstp; 519 static ipfrstat_t ifrst, *ifrstp; 520 static friostat_t fio, *fiop; 521 int temp; 522 523 void *rules[2][2]; 524 struct nlist deadlist[43] = { 525 { "fr_authstats" }, /* 0 */ 526 { "fae_list" }, 527 { "ipauth" }, 528 { "fr_authlist" }, 529 { "fr_authstart" }, 530 { "fr_authend" }, /* 5 */ 531 { "fr_authnext" }, 532 { "fr_auth" }, 533 { "fr_authused" }, 534 { "fr_authsize" }, 535 { "fr_defaultauthage" }, /* 10 */ 536 { "fr_authpkts" }, 537 { "fr_auth_lock" }, 538 { "frstats" }, 539 { "ips_stats" }, 540 { "ips_num" }, /* 15 */ 541 { "ips_wild" }, 542 { "ips_list" }, 543 { "ips_table" }, 544 { "fr_statemax" }, 545 { "fr_statesize" }, /* 20 */ 546 { "fr_state_doflush" }, 547 { "fr_state_lock" }, 548 { "ipfr_heads" }, 549 { "ipfr_nattab" }, 550 { "ipfr_stats" }, /* 25 */ 551 { "ipfr_inuse" }, 552 { "fr_ipfrttl" }, 553 { "fr_frag_lock" }, 554 { "ipfr_timer_id" }, 555 { "fr_nat_lock" }, /* 30 */ 556 { "ipfilter" }, 557 { "ipfilter6" }, 558 { "ipacct" }, 559 { "ipacct6" }, 560 { "ipl_frouteok" }, /* 35 */ 561 { "fr_running" }, 562 { "ipfgroups" }, 563 { "fr_active" }, 564 { "fr_pass" }, 565 { "fr_flags" }, /* 40 */ 566 { "ipstate_logging" }, 567 { NULL } 568 }; 569 570 571 frauthstp = &frauthst; 572 ipsstp = &ipsst; 573 ifrstp = &ifrst; 574 fiop = &fio; 575 576 *frfp = 0; 577 *fiopp = fiop; 578 *ipsstpp = ipsstp; 579 *ifrstpp = ifrstp; 580 *frauthstpp = frauthstp; 581 582 bzero((char *)fiop, sizeof(*fiop)); 583 bzero((char *)ipsstp, sizeof(*ipsstp)); 584 bzero((char *)ifrstp, sizeof(*ifrstp)); 585 bzero((char *)frauthstp, sizeof(*frauthstp)); 586 587 if (nlist(kernel, deadlist) == -1) { 588 fprintf(stderr, "nlist error\n"); 589 return; 590 } 591 592 /* 593 * This is for SIOCGETFF. 594 */ 595 kmemcpy((char *)frfp, (u_long)deadlist[40].n_value, sizeof(*frfp)); 596 597 /* 598 * f_locks is a combination of the lock variable from each part of 599 * ipfilter (state, auth, nat, fragments). 600 */ 601 kmemcpy((char *)fiop, (u_long)deadlist[13].n_value, sizeof(*fiop)); 602 kmemcpy((char *)&fiop->f_locks[0], (u_long)deadlist[22].n_value, 603 sizeof(fiop->f_locks[0])); 604 kmemcpy((char *)&fiop->f_locks[0], (u_long)deadlist[30].n_value, 605 sizeof(fiop->f_locks[1])); 606 kmemcpy((char *)&fiop->f_locks[2], (u_long)deadlist[28].n_value, 607 sizeof(fiop->f_locks[2])); 608 kmemcpy((char *)&fiop->f_locks[3], (u_long)deadlist[12].n_value, 609 sizeof(fiop->f_locks[3])); 610 611 /* 612 * Get pointers to each list of rules (active, inactive, in, out) 613 */ 614 kmemcpy((char *)&rules, (u_long)deadlist[31].n_value, sizeof(rules)); 615 fiop->f_fin[0] = rules[0][0]; 616 fiop->f_fin[1] = rules[0][1]; 617 fiop->f_fout[0] = rules[1][0]; 618 fiop->f_fout[1] = rules[1][1]; 619 620 /* 621 * Same for IPv6, except make them null if support for it is not 622 * being compiled in. 623 */ 624 #ifdef USE_INET6 625 kmemcpy((char *)&rules, (u_long)deadlist[32].n_value, sizeof(rules)); 626 fiop->f_fin6[0] = rules[0][0]; 627 fiop->f_fin6[1] = rules[0][1]; 628 fiop->f_fout6[0] = rules[1][0]; 629 fiop->f_fout6[1] = rules[1][1]; 630 #else 631 fiop->f_fin6[0] = NULL; 632 fiop->f_fin6[1] = NULL; 633 fiop->f_fout6[0] = NULL; 634 fiop->f_fout6[1] = NULL; 635 #endif 636 637 /* 638 * Now get accounting rules pointers. 639 */ 640 kmemcpy((char *)&rules, (u_long)deadlist[33].n_value, sizeof(rules)); 641 fiop->f_acctin[0] = rules[0][0]; 642 fiop->f_acctin[1] = rules[0][1]; 643 fiop->f_acctout[0] = rules[1][0]; 644 fiop->f_acctout[1] = rules[1][1]; 645 646 #ifdef USE_INET6 647 kmemcpy((char *)&rules, (u_long)deadlist[34].n_value, sizeof(rules)); 648 fiop->f_acctin6[0] = rules[0][0]; 649 fiop->f_acctin6[1] = rules[0][1]; 650 fiop->f_acctout6[0] = rules[1][0]; 651 fiop->f_acctout6[1] = rules[1][1]; 652 #else 653 fiop->f_acctin6[0] = NULL; 654 fiop->f_acctin6[1] = NULL; 655 fiop->f_acctout6[0] = NULL; 656 fiop->f_acctout6[1] = NULL; 657 #endif 658 659 /* 660 * A collection of "global" variables used inside the kernel which 661 * are all collected in friostat_t via ioctl. 662 */ 663 kmemcpy((char *)&fiop->f_froute, (u_long)deadlist[35].n_value, 664 sizeof(fiop->f_froute)); 665 kmemcpy((char *)&fiop->f_running, (u_long)deadlist[36].n_value, 666 sizeof(fiop->f_running)); 667 kmemcpy((char *)&fiop->f_groups, (u_long)deadlist[37].n_value, 668 sizeof(fiop->f_groups)); 669 kmemcpy((char *)&fiop->f_active, (u_long)deadlist[38].n_value, 670 sizeof(fiop->f_active)); 671 kmemcpy((char *)&fiop->f_defpass, (u_long)deadlist[39].n_value, 672 sizeof(fiop->f_defpass)); 673 674 /* 675 * Build up the state information stats structure. 676 */ 677 kmemcpy((char *)ipsstp, (u_long)deadlist[14].n_value, sizeof(*ipsstp)); 678 kmemcpy((char *)&temp, (u_long)deadlist[15].n_value, sizeof(temp)); 679 ipsstp->iss_active = temp; 680 ipsstp->iss_table = (void *)deadlist[18].n_value; 681 ipsstp->iss_list = (void *)deadlist[17].n_value; 682 683 /* 684 * Build up the authentiation information stats structure. 685 */ 686 kmemcpy((char *)frauthstp, (u_long)deadlist[0].n_value, 687 sizeof(*frauthstp)); 688 frauthstp->fas_faelist = (void *)deadlist[1].n_value; 689 690 /* 691 * Build up the fragment information stats structure. 692 */ 693 kmemcpy((char *)ifrstp, (u_long)deadlist[25].n_value, 694 sizeof(*ifrstp)); 695 ifrstp->ifs_table = (void *)deadlist[23].n_value; 696 ifrstp->ifs_nattab = (void *)deadlist[24].n_value; 697 kmemcpy((char *)&ifrstp->ifs_inuse, (u_long)deadlist[26].n_value, 698 sizeof(ifrstp->ifs_inuse)); 699 700 /* 701 * Get logging on/off switches 702 */ 703 kmemcpy((char *)&state_logging, (u_long)deadlist[41].n_value, 704 sizeof(state_logging)); 705 } 706 707 708 /* 709 * Display the kernel stats for packets blocked and passed and other 710 * associated running totals which are kept. 711 */ 712 static void showstats(fp, frf) 713 struct friostat *fp; 714 u_32_t frf; 715 { 716 717 PRINTF("bad packets:\t\tin %lu\tout %lu\n", 718 fp->f_st[0].fr_bad, fp->f_st[1].fr_bad); 719 #ifdef USE_INET6 720 PRINTF(" IPv6 packets:\t\tin %lu out %lu\n", 721 fp->f_st[0].fr_ipv6, fp->f_st[1].fr_ipv6); 722 #endif 723 PRINTF(" input packets:\t\tblocked %lu passed %lu nomatch %lu", 724 fp->f_st[0].fr_block, fp->f_st[0].fr_pass, 725 fp->f_st[0].fr_nom); 726 PRINTF(" counted %lu short %lu\n", 727 fp->f_st[0].fr_acct, fp->f_st[0].fr_short); 728 PRINTF("output packets:\t\tblocked %lu passed %lu nomatch %lu", 729 fp->f_st[1].fr_block, fp->f_st[1].fr_pass, 730 fp->f_st[1].fr_nom); 731 PRINTF(" counted %lu short %lu\n", 732 fp->f_st[1].fr_acct, fp->f_st[1].fr_short); 733 PRINTF(" input packets logged:\tblocked %lu passed %lu\n", 734 fp->f_st[0].fr_bpkl, fp->f_st[0].fr_ppkl); 735 PRINTF("output packets logged:\tblocked %lu passed %lu\n", 736 fp->f_st[1].fr_bpkl, fp->f_st[1].fr_ppkl); 737 PRINTF(" packets logged:\tinput %lu output %lu\n", 738 fp->f_st[0].fr_pkl, fp->f_st[1].fr_pkl); 739 PRINTF(" log failures:\t\tinput %lu output %lu\n", 740 fp->f_st[0].fr_skip, fp->f_st[1].fr_skip); 741 PRINTF("fragment state(in):\tkept %lu\tlost %lu\tnot fragmented %lu\n", 742 fp->f_st[0].fr_nfr, fp->f_st[0].fr_bnfr, 743 fp->f_st[0].fr_cfr); 744 PRINTF("fragment state(out):\tkept %lu\tlost %lu\tnot fragmented %lu\n", 745 fp->f_st[1].fr_nfr, fp->f_st[1].fr_bnfr, 746 fp->f_st[0].fr_cfr); 747 PRINTF("packet state(in):\tkept %lu\tlost %lu\n", 748 fp->f_st[0].fr_ads, fp->f_st[0].fr_bads); 749 PRINTF("packet state(out):\tkept %lu\tlost %lu\n", 750 fp->f_st[1].fr_ads, fp->f_st[1].fr_bads); 751 PRINTF("ICMP replies:\t%lu\tTCP RSTs sent:\t%lu\n", 752 fp->f_st[0].fr_ret, fp->f_st[1].fr_ret); 753 PRINTF("Invalid source(in):\t%lu\n", fp->f_st[0].fr_badsrc); 754 PRINTF("Result cache hits(in):\t%lu\t(out):\t%lu\n", 755 fp->f_st[0].fr_chit, fp->f_st[1].fr_chit); 756 PRINTF("IN Pullups succeeded:\t%lu\tfailed:\t%lu\n", 757 fp->f_st[0].fr_pull[0], fp->f_st[0].fr_pull[1]); 758 PRINTF("OUT Pullups succeeded:\t%lu\tfailed:\t%lu\n", 759 fp->f_st[1].fr_pull[0], fp->f_st[1].fr_pull[1]); 760 PRINTF("Fastroute successes:\t%lu\tfailures:\t%lu\n", 761 fp->f_froute[0], fp->f_froute[1]); 762 PRINTF("TCP cksum fails(in):\t%lu\t(out):\t%lu\n", 763 fp->f_st[0].fr_tcpbad, fp->f_st[1].fr_tcpbad); 764 PRINTF("IPF Ticks:\t%lu\n", fp->f_ticks); 765 766 PRINTF("Packet log flags set: (%#x)\n", frf); 767 if (frf & FF_LOGPASS) 768 PRINTF("\tpackets passed through filter\n"); 769 if (frf & FF_LOGBLOCK) 770 PRINTF("\tpackets blocked by filter\n"); 771 if (frf & FF_LOGNOMATCH) 772 PRINTF("\tpackets not matched by filter\n"); 773 if (!frf) 774 PRINTF("\tnone\n"); 775 } 776 777 778 /* 779 * Print out a list of rules from the kernel, starting at the one passed. 780 */ 781 static void printlist(fp, comment) 782 frentry_t *fp; 783 char *comment; 784 { 785 struct frentry fb, *fg; 786 char *data; 787 u_32_t type; 788 int n; 789 790 for (n = 1; fp; n++) { 791 if (kmemcpy((char *)&fb, (u_long)fp, sizeof(fb)) == -1) { 792 perror("kmemcpy"); 793 return; 794 } 795 fp = &fb; 796 if (opts & (OPT_HITS|OPT_VERBOSE)) 797 #ifdef USE_QUAD_T 798 PRINTF("%qu ", (unsigned long long) fp->fr_hits); 799 #else 800 PRINTF("%lu ", fp->fr_hits); 801 #endif 802 if (opts & (OPT_ACCNT|OPT_VERBOSE)) 803 #ifdef USE_QUAD_T 804 PRINTF("%qu ", (unsigned long long) fp->fr_bytes); 805 #else 806 PRINTF("%lu ", fp->fr_bytes); 807 #endif 808 if (opts & OPT_SHOWLINENO) 809 PRINTF("@%d ", n); 810 data = NULL; 811 type = fp->fr_type & ~FR_T_BUILTIN; 812 if (type == FR_T_IPF || type == FR_T_BPFOPC) { 813 if (fp->fr_dsize) { 814 data = malloc(fp->fr_dsize); 815 if (data == NULL) { 816 perror("malloc"); 817 exit(1); 818 } 819 820 if (kmemcpy(data, (u_long)fp->fr_data, 821 fp->fr_dsize) == -1) { 822 perror("kmemcpy"); 823 return; 824 } 825 fp->fr_data = data; 826 } 827 } 828 829 printfr(fp, ioctl); 830 if (opts & OPT_DEBUG) { 831 binprint(fp, sizeof(*fp)); 832 if (fp->fr_data != NULL && fp->fr_dsize > 0) 833 binprint(fp->fr_data, fp->fr_dsize); 834 } 835 if (data != NULL) 836 free(data); 837 if (fp->fr_grp != NULL) { 838 if (!kmemcpy((char *)&fg, (u_long)fp->fr_grp, 839 sizeof(fg))) 840 printlist(fg, comment); 841 } 842 if (type == FR_T_CALLFUNC) { 843 printlist(fp->fr_data, "# callfunc: "); 844 } 845 fp = fp->fr_next; 846 } 847 } 848 849 /* 850 * print out all of the asked for rule sets, using the stats struct as 851 * the base from which to get the pointers. 852 */ 853 static void showlist(fiop) 854 struct friostat *fiop; 855 { 856 struct frentry *fp = NULL; 857 int i, set; 858 859 set = fiop->f_active; 860 if (opts & OPT_INACTIVE) 861 set = 1 - set; 862 if (opts & OPT_ACCNT) { 863 #ifdef USE_INET6 864 if ((use_inet6) && (opts & OPT_OUTQUE)) { 865 i = F_ACOUT; 866 fp = (struct frentry *)fiop->f_acctout6[set]; 867 } else if ((use_inet6) && (opts & OPT_INQUE)) { 868 i = F_ACIN; 869 fp = (struct frentry *)fiop->f_acctin6[set]; 870 } else 871 #endif 872 if (opts & OPT_OUTQUE) { 873 i = F_ACOUT; 874 fp = (struct frentry *)fiop->f_acctout[set]; 875 } else if (opts & OPT_INQUE) { 876 i = F_ACIN; 877 fp = (struct frentry *)fiop->f_acctin[set]; 878 } else { 879 FPRINTF(stderr, "No -i or -o given with -a\n"); 880 return; 881 } 882 } else { 883 #ifdef USE_INET6 884 if ((use_inet6) && (opts & OPT_OUTQUE)) { 885 i = F_OUT; 886 fp = (struct frentry *)fiop->f_fout6[set]; 887 } else if ((use_inet6) && (opts & OPT_INQUE)) { 888 i = F_IN; 889 fp = (struct frentry *)fiop->f_fin6[set]; 890 } else 891 #endif 892 if (opts & OPT_OUTQUE) { 893 i = F_OUT; 894 fp = (struct frentry *)fiop->f_fout[set]; 895 } else if (opts & OPT_INQUE) { 896 i = F_IN; 897 fp = (struct frentry *)fiop->f_fin[set]; 898 } else 899 return; 900 } 901 if (opts & OPT_VERBOSE) 902 FPRINTF(stderr, "showlist:opts %#x i %d\n", opts, i); 903 904 if (opts & OPT_VERBOSE) 905 PRINTF("fp %p set %d\n", fp, set); 906 if (!fp) { 907 FPRINTF(stderr, "empty list for %s%s\n", 908 (opts & OPT_INACTIVE) ? "inactive " : "", filters[i]); 909 return; 910 } 911 printlist(fp, NULL); 912 } 913 914 915 /* 916 * Display ipfilter stateful filtering information 917 */ 918 static void showipstates(ipsp) 919 ips_stat_t *ipsp; 920 { 921 u_long minlen, maxlen, totallen, *buckets; 922 int i, sz; 923 924 sz = sizeof(*buckets) * ipsp->iss_statesize; 925 buckets = (u_long *)malloc(sz); 926 if (buckets == NULL) { 927 perror("malloc"); 928 exit(1); 929 } 930 if (kmemcpy((char *)buckets, (u_long)ipsp->iss_bucketlen, sz)) { 931 free(buckets); 932 return; 933 } 934 935 /* 936 * If a list of states hasn't been asked for, only print out stats 937 */ 938 if (!(opts & OPT_SHOWLIST)) { 939 PRINTF("IP states added:\n\t%lu TCP\n\t%lu UDP\n\t%lu ICMP\n", 940 ipsp->iss_tcp, ipsp->iss_udp, ipsp->iss_icmp); 941 PRINTF("\t%lu hits\n\t%lu misses\n", ipsp->iss_hits, 942 ipsp->iss_miss); 943 PRINTF("\t%lu maximum\n\t%lu no memory\n\t%lu max bucket\n", 944 ipsp->iss_max, ipsp->iss_nomem, ipsp->iss_bucketfull); 945 PRINTF("\t%lu maximum\n\t%lu no memory\n\t%lu bkts in use\n", 946 ipsp->iss_max, ipsp->iss_nomem, ipsp->iss_inuse); 947 PRINTF("\t%lu active\n\t%lu expired\n\t%lu closed\n", 948 ipsp->iss_active, ipsp->iss_expire, ipsp->iss_fin); 949 950 PRINTF("State logging %sabled\n", 951 state_logging ? "en" : "dis"); 952 953 PRINTF("\nState table bucket statistics:\n"); 954 PRINTF("\t%lu in use\t\n", ipsp->iss_inuse); 955 956 minlen = ipsp->iss_max; 957 totallen = 0; 958 maxlen = 0; 959 960 for (i = 0; i < ipsp->iss_statesize; i++) { 961 if (buckets[i] > maxlen) 962 maxlen = buckets[i]; 963 if (buckets[i] < minlen) 964 minlen = buckets[i]; 965 totallen += buckets[i]; 966 } 967 968 PRINTF("\t%2.2f%% bucket usage\n\t%lu minimal length\n", 969 ((float)ipsp->iss_inuse / ipsp->iss_statesize) * 100.0, 970 minlen); 971 PRINTF("\t%lu maximal length\n\t%.3f average length\n", 972 maxlen, 973 ipsp->iss_inuse ? (float) totallen/ ipsp->iss_inuse : 974 0.0); 975 976 #define ENTRIES_PER_LINE 5 977 978 if (opts & OPT_VERBOSE) { 979 PRINTF("\nCurrent bucket sizes :\n"); 980 for (i = 0; i < ipsp->iss_statesize; i++) { 981 if ((i % ENTRIES_PER_LINE) == 0) 982 PRINTF("\t"); 983 PRINTF("%4d -> %4lu", i, buckets[i]); 984 if ((i % ENTRIES_PER_LINE) == 985 (ENTRIES_PER_LINE - 1)) 986 PRINTF("\n"); 987 else 988 PRINTF(" "); 989 } 990 PRINTF("\n"); 991 } 992 PRINTF("\n"); 993 994 free(buckets); 995 return; 996 } 997 998 /* 999 * Print out all the state information currently held in the kernel. 1000 */ 1001 while (ipsp->iss_list != NULL) { 1002 ipsp->iss_list = printstate(ipsp->iss_list, opts, 1003 ipsp->iss_ticks); 1004 } 1005 1006 free(buckets); 1007 } 1008 1009 1010 #ifdef STATETOP 1011 static int handle_resize = 0, handle_break = 0; 1012 1013 static void topipstates(saddr, daddr, sport, dport, protocol, ver, 1014 refreshtime, topclosed) 1015 i6addr_t saddr; 1016 i6addr_t daddr; 1017 int sport; 1018 int dport; 1019 int protocol; 1020 int ver; 1021 int refreshtime; 1022 int topclosed; 1023 { 1024 char str1[STSTRSIZE], str2[STSTRSIZE], str3[STSTRSIZE], str4[STSTRSIZE]; 1025 int maxtsentries = 0, reverse = 0, sorting = STSORT_DEFAULT; 1026 int i, j, winy, tsentry, maxx, maxy, redraw = 0, ret = 0; 1027 int len, srclen, dstlen, forward = 1, c = 0; 1028 ips_stat_t ipsst, *ipsstp = &ipsst; 1029 statetop_t *tstable = NULL, *tp; 1030 const char *errstr = ""; 1031 ipstate_t ips; 1032 ipfobj_t ipfo; 1033 struct timeval selecttimeout; 1034 char hostnm[HOSTNMLEN]; 1035 struct protoent *proto; 1036 fd_set readfd; 1037 time_t t; 1038 1039 /* install signal handlers */ 1040 signal(SIGINT, sig_break); 1041 signal(SIGQUIT, sig_break); 1042 signal(SIGTERM, sig_break); 1043 signal(SIGWINCH, sig_resize); 1044 1045 /* init ncurses stuff */ 1046 initscr(); 1047 cbreak(); 1048 noecho(); 1049 curs_set(0); 1050 timeout(0); 1051 getmaxyx(stdscr, maxy, maxx); 1052 1053 /* init hostname */ 1054 gethostname(hostnm, sizeof(hostnm) - 1); 1055 hostnm[sizeof(hostnm) - 1] = '\0'; 1056 1057 /* init ipfobj_t stuff */ 1058 bzero((caddr_t)&ipfo, sizeof(ipfo)); 1059 ipfo.ipfo_rev = IPFILTER_VERSION; 1060 ipfo.ipfo_size = sizeof(*ipsstp); 1061 ipfo.ipfo_ptr = (void *)ipsstp; 1062 ipfo.ipfo_type = IPFOBJ_STATESTAT; 1063 1064 /* repeat until user aborts */ 1065 while ( 1 ) { 1066 1067 /* get state table */ 1068 bzero((char *)&ipsst, sizeof(ipsst)); 1069 if ((ioctl(state_fd, SIOCGETFS, &ipfo) == -1)) { 1070 errstr = "ioctl(SIOCGETFS)"; 1071 ret = -1; 1072 goto out; 1073 } 1074 1075 /* clear the history */ 1076 tsentry = -1; 1077 1078 /* reset max str len */ 1079 srclen = dstlen = 0; 1080 1081 /* read the state table and store in tstable */ 1082 for (; ipsstp->iss_list; ipsstp->iss_list = ips.is_next) { 1083 1084 if (kmemcpy((char *)&ips, (u_long)ipsstp->iss_list, 1085 sizeof(ips))) 1086 break; 1087 1088 if (ips.is_v != ver) 1089 continue; 1090 1091 /* check v4 src/dest addresses */ 1092 if (ips.is_v == 4) { 1093 if ((saddr.in4.s_addr != INADDR_ANY && 1094 saddr.in4.s_addr != ips.is_saddr) || 1095 (daddr.in4.s_addr != INADDR_ANY && 1096 daddr.in4.s_addr != ips.is_daddr)) 1097 continue; 1098 } 1099 #ifdef USE_INET6 1100 /* check v6 src/dest addresses */ 1101 if (ips.is_v == 6) { 1102 if ((IP6_NEQ(&saddr, &in6addr_any) && 1103 IP6_NEQ(&saddr, &ips.is_src)) || 1104 (IP6_NEQ(&daddr, &in6addr_any) && 1105 IP6_NEQ(&daddr, &ips.is_dst))) 1106 continue; 1107 } 1108 #endif 1109 /* check protocol */ 1110 if (protocol > 0 && protocol != ips.is_p) 1111 continue; 1112 1113 /* check ports if protocol is TCP or UDP */ 1114 if (((ips.is_p == IPPROTO_TCP) || 1115 (ips.is_p == IPPROTO_UDP)) && 1116 (((sport > 0) && (htons(sport) != ips.is_sport)) || 1117 ((dport > 0) && (htons(dport) != ips.is_dport)))) 1118 continue; 1119 1120 /* show closed TCP sessions ? */ 1121 if ((topclosed == 0) && (ips.is_p == IPPROTO_TCP) && 1122 (ips.is_state[0] >= IPF_TCPS_LAST_ACK) && 1123 (ips.is_state[1] >= IPF_TCPS_LAST_ACK)) 1124 continue; 1125 1126 /* 1127 * if necessary make room for this state 1128 * entry 1129 */ 1130 tsentry++; 1131 if (!maxtsentries || tsentry == maxtsentries) { 1132 maxtsentries += STGROWSIZE; 1133 tstable = realloc(tstable, 1134 maxtsentries * sizeof(statetop_t)); 1135 if (tstable == NULL) { 1136 perror("realloc"); 1137 exit(-1); 1138 } 1139 } 1140 1141 /* get max src/dest address string length */ 1142 len = strlen(getip(ips.is_v, &ips.is_src)); 1143 if (srclen < len) 1144 srclen = len; 1145 len = strlen(getip(ips.is_v, &ips.is_dst)); 1146 if (dstlen < len) 1147 dstlen = len; 1148 1149 /* fill structure */ 1150 tp = tstable + tsentry; 1151 tp->st_src = ips.is_src; 1152 tp->st_dst = ips.is_dst; 1153 tp->st_p = ips.is_p; 1154 tp->st_v = ips.is_v; 1155 tp->st_state[0] = ips.is_state[0]; 1156 tp->st_state[1] = ips.is_state[1]; 1157 if (forward) { 1158 tp->st_pkts = ips.is_pkts[0]+ips.is_pkts[1]; 1159 tp->st_bytes = ips.is_bytes[0]+ips.is_bytes[1]; 1160 } else { 1161 tp->st_pkts = ips.is_pkts[2]+ips.is_pkts[3]; 1162 tp->st_bytes = ips.is_bytes[2]+ips.is_bytes[3]; 1163 } 1164 tp->st_age = ips.is_die - ipsstp->iss_ticks; 1165 if ((ips.is_p == IPPROTO_TCP) || 1166 (ips.is_p == IPPROTO_UDP)) { 1167 tp->st_sport = ips.is_sport; 1168 tp->st_dport = ips.is_dport; 1169 } 1170 } 1171 1172 1173 /* sort the array */ 1174 if (tsentry != -1) { 1175 switch (sorting) 1176 { 1177 case STSORT_PR: 1178 qsort(tstable, tsentry + 1, 1179 sizeof(statetop_t), sort_p); 1180 break; 1181 case STSORT_PKTS: 1182 qsort(tstable, tsentry + 1, 1183 sizeof(statetop_t), sort_pkts); 1184 break; 1185 case STSORT_BYTES: 1186 qsort(tstable, tsentry + 1, 1187 sizeof(statetop_t), sort_bytes); 1188 break; 1189 case STSORT_TTL: 1190 qsort(tstable, tsentry + 1, 1191 sizeof(statetop_t), sort_ttl); 1192 break; 1193 case STSORT_SRCIP: 1194 qsort(tstable, tsentry + 1, 1195 sizeof(statetop_t), sort_srcip); 1196 break; 1197 case STSORT_SRCPT: 1198 qsort(tstable, tsentry +1, 1199 sizeof(statetop_t), sort_srcpt); 1200 break; 1201 case STSORT_DSTIP: 1202 qsort(tstable, tsentry + 1, 1203 sizeof(statetop_t), sort_dstip); 1204 break; 1205 case STSORT_DSTPT: 1206 qsort(tstable, tsentry + 1, 1207 sizeof(statetop_t), sort_dstpt); 1208 break; 1209 default: 1210 break; 1211 } 1212 } 1213 1214 /* handle window resizes */ 1215 if (handle_resize) { 1216 endwin(); 1217 initscr(); 1218 cbreak(); 1219 noecho(); 1220 curs_set(0); 1221 timeout(0); 1222 getmaxyx(stdscr, maxy, maxx); 1223 redraw = 1; 1224 handle_resize = 0; 1225 } 1226 1227 /* stop program? */ 1228 if (handle_break) 1229 break; 1230 1231 /* print title */ 1232 erase(); 1233 attron(A_BOLD); 1234 winy = 0; 1235 move(winy,0); 1236 sprintf(str1, "%s - %s - state top", hostnm, IPL_VERSION); 1237 for (j = 0 ; j < (maxx - 8 - strlen(str1)) / 2; j++) 1238 printw(" "); 1239 printw("%s", str1); 1240 attroff(A_BOLD); 1241 1242 /* just for fun add a clock */ 1243 move(winy, maxx - 8); 1244 t = time(NULL); 1245 strftime(str1, 80, "%T", localtime(&t)); 1246 printw("%s\n", str1); 1247 1248 /* 1249 * print the display filters, this is placed in the loop, 1250 * because someday I might add code for changing these 1251 * while the programming is running :-) 1252 */ 1253 if (sport >= 0) 1254 sprintf(str1, "%s,%d", getip(ver, &saddr), sport); 1255 else 1256 sprintf(str1, "%s", getip(ver, &saddr)); 1257 1258 if (dport >= 0) 1259 sprintf(str2, "%s,%d", getip(ver, &daddr), dport); 1260 else 1261 sprintf(str2, "%s", getip(ver, &daddr)); 1262 1263 if (protocol < 0) 1264 strcpy(str3, "any"); 1265 else if ((proto = getprotobynumber(protocol)) != NULL) 1266 sprintf(str3, "%s", proto->p_name); 1267 else 1268 sprintf(str3, "%d", protocol); 1269 1270 switch (sorting) 1271 { 1272 case STSORT_PR: 1273 sprintf(str4, "proto"); 1274 break; 1275 case STSORT_PKTS: 1276 sprintf(str4, "# pkts"); 1277 break; 1278 case STSORT_BYTES: 1279 sprintf(str4, "# bytes"); 1280 break; 1281 case STSORT_TTL: 1282 sprintf(str4, "ttl"); 1283 break; 1284 case STSORT_SRCIP: 1285 sprintf(str4, "src ip"); 1286 break; 1287 case STSORT_SRCPT: 1288 sprintf(str4, "src port"); 1289 break; 1290 case STSORT_DSTIP: 1291 sprintf(str4, "dest ip"); 1292 break; 1293 case STSORT_DSTPT: 1294 sprintf(str4, "dest port"); 1295 break; 1296 default: 1297 sprintf(str4, "unknown"); 1298 break; 1299 } 1300 1301 if (reverse) 1302 strcat(str4, " (reverse)"); 1303 1304 winy += 2; 1305 move(winy,0); 1306 printw("Src: %s, Dest: %s, Proto: %s, Sorted by: %s\n\n", 1307 str1, str2, str3, str4); 1308 1309 /* 1310 * For an IPv4 IP address we need at most 15 characters, 1311 * 4 tuples of 3 digits, separated by 3 dots. Enforce this 1312 * length, so the colums do not change positions based 1313 * on the size of the IP address. This length makes the 1314 * output fit in a 80 column terminal. 1315 * We are lacking a good solution for IPv6 addresses (that 1316 * can be longer that 15 characters), so we do not enforce 1317 * a maximum on the IP field size. 1318 */ 1319 if (srclen < 15) 1320 srclen = 15; 1321 if (dstlen < 15) 1322 dstlen = 15; 1323 1324 /* print column description */ 1325 winy += 2; 1326 move(winy,0); 1327 attron(A_BOLD); 1328 printw("%-*s %-*s %3s %4s %7s %9s %9s\n", 1329 srclen + 6, "Source IP", dstlen + 6, "Destination IP", 1330 "ST", "PR", "#pkts", "#bytes", "ttl"); 1331 attroff(A_BOLD); 1332 1333 /* print all the entries */ 1334 tp = tstable; 1335 if (reverse) 1336 tp += tsentry; 1337 1338 if (tsentry > maxy - 6) 1339 tsentry = maxy - 6; 1340 for (i = 0; i <= tsentry; i++) { 1341 /* print src/dest and port */ 1342 if ((tp->st_p == IPPROTO_TCP) || 1343 (tp->st_p == IPPROTO_UDP)) { 1344 sprintf(str1, "%s,%hu", 1345 getip(tp->st_v, &tp->st_src), 1346 ntohs(tp->st_sport)); 1347 sprintf(str2, "%s,%hu", 1348 getip(tp->st_v, &tp->st_dst), 1349 ntohs(tp->st_dport)); 1350 } else { 1351 sprintf(str1, "%s", getip(tp->st_v, 1352 &tp->st_src)); 1353 sprintf(str2, "%s", getip(tp->st_v, 1354 &tp->st_dst)); 1355 } 1356 winy++; 1357 move(winy, 0); 1358 printw("%-*s %-*s", srclen + 6, str1, dstlen + 6, str2); 1359 1360 /* print state */ 1361 sprintf(str1, "%X/%X", tp->st_state[0], 1362 tp->st_state[1]); 1363 printw(" %3s", str1); 1364 1365 /* print protocol */ 1366 proto = getprotobynumber(tp->st_p); 1367 if (proto) { 1368 strncpy(str1, proto->p_name, 4); 1369 str1[4] = '\0'; 1370 } else { 1371 sprintf(str1, "%d", tp->st_p); 1372 } 1373 /* just print icmp for IPv6-ICMP */ 1374 if (tp->st_p == IPPROTO_ICMPV6) 1375 strcpy(str1, "icmp"); 1376 printw(" %4s", str1); 1377 1378 /* print #pkt/#bytes */ 1379 #ifdef USE_QUAD_T 1380 printw(" %7qu %9qu", (unsigned long long) tp->st_pkts, 1381 (unsigned long long) tp->st_bytes); 1382 #else 1383 printw(" %7lu %9lu", tp->st_pkts, tp->st_bytes); 1384 #endif 1385 printw(" %9s", ttl_to_string(tp->st_age)); 1386 1387 if (reverse) 1388 tp--; 1389 else 1390 tp++; 1391 } 1392 1393 /* screen data structure is filled, now update the screen */ 1394 if (redraw) 1395 clearok(stdscr,1); 1396 1397 if (refresh() == ERR) 1398 break; 1399 if (redraw) { 1400 clearok(stdscr,0); 1401 redraw = 0; 1402 } 1403 1404 /* wait for key press or a 1 second time out period */ 1405 selecttimeout.tv_sec = refreshtime; 1406 selecttimeout.tv_usec = 0; 1407 FD_ZERO(&readfd); 1408 FD_SET(0, &readfd); 1409 select(1, &readfd, NULL, NULL, &selecttimeout); 1410 1411 /* if key pressed, read all waiting keys */ 1412 if (FD_ISSET(0, &readfd)) { 1413 c = wgetch(stdscr); 1414 if (c == ERR) 1415 continue; 1416 1417 if (ISALPHA(c) && ISUPPER(c)) 1418 c = TOLOWER(c); 1419 if (c == 'l') { 1420 redraw = 1; 1421 } else if (c == 'q') { 1422 break; 1423 } else if (c == 'r') { 1424 reverse = !reverse; 1425 } else if (c == 'b') { 1426 forward = 0; 1427 } else if (c == 'f') { 1428 forward = 1; 1429 } else if (c == 's') { 1430 if (++sorting > STSORT_MAX) 1431 sorting = 0; 1432 } 1433 } 1434 } /* while */ 1435 1436 out: 1437 printw("\n"); 1438 curs_set(1); 1439 nocbreak(); 1440 endwin(); 1441 1442 free(tstable); 1443 if (ret != 0) 1444 perror(errstr); 1445 } 1446 #endif 1447 1448 1449 /* 1450 * Show fragment cache information that's held in the kernel. 1451 */ 1452 static void showfrstates(ifsp) 1453 ipfrstat_t *ifsp; 1454 { 1455 struct ipfr *ipfrtab[IPFT_SIZE], ifr; 1456 int i; 1457 1458 /* 1459 * print out the numeric statistics 1460 */ 1461 PRINTF("IP fragment states:\n\t%lu new\n\t%lu expired\n\t%lu hits\n", 1462 ifsp->ifs_new, ifsp->ifs_expire, ifsp->ifs_hits); 1463 PRINTF("\t%lu retrans\n\t%lu too short\n", 1464 ifsp->ifs_retrans0, ifsp->ifs_short); 1465 PRINTF("\t%lu no memory\n\t%lu already exist\n", 1466 ifsp->ifs_nomem, ifsp->ifs_exists); 1467 PRINTF("\t%lu inuse\n", ifsp->ifs_inuse); 1468 if (kmemcpy((char *)ipfrtab, (u_long)ifsp->ifs_table, sizeof(ipfrtab))) 1469 return; 1470 1471 /* 1472 * Print out the contents (if any) of the fragment cache table. 1473 */ 1474 PRINTF("\n"); 1475 for (i = 0; i < IPFT_SIZE; i++) 1476 while (ipfrtab[i] != NULL) { 1477 if (kmemcpy((char *)&ifr, (u_long)ipfrtab[i], 1478 sizeof(ifr)) == -1) 1479 break; 1480 printfraginfo("", &ifr); 1481 ipfrtab[i] = ifr.ipfr_next; 1482 } 1483 /* 1484 * Print out the contents (if any) of the NAT fragment cache table. 1485 */ 1486 if (kmemcpy((char *)ipfrtab, (u_long)ifsp->ifs_nattab,sizeof(ipfrtab))) 1487 return; 1488 for (i = 0; i < IPFT_SIZE; i++) 1489 while (ipfrtab[i] != NULL) { 1490 if (kmemcpy((char *)&ifr, (u_long)ipfrtab[i], 1491 sizeof(ifr)) == -1) 1492 break; 1493 printfraginfo("NAT: ", &ifr); 1494 ipfrtab[i] = ifr.ipfr_next; 1495 } 1496 } 1497 1498 1499 /* 1500 * Show stats on how auth within IPFilter has been used 1501 */ 1502 static void showauthstates(asp) 1503 fr_authstat_t *asp; 1504 { 1505 frauthent_t *frap, fra; 1506 1507 #ifdef USE_QUAD_T 1508 printf("Authorisation hits: %qu\tmisses %qu\n", 1509 (unsigned long long) asp->fas_hits, 1510 (unsigned long long) asp->fas_miss); 1511 #else 1512 printf("Authorisation hits: %ld\tmisses %ld\n", asp->fas_hits, 1513 asp->fas_miss); 1514 #endif 1515 printf("nospace %ld\nadded %ld\nsendfail %ld\nsendok %ld\n", 1516 asp->fas_nospace, asp->fas_added, asp->fas_sendfail, 1517 asp->fas_sendok); 1518 printf("queok %ld\nquefail %ld\nexpire %ld\n", 1519 asp->fas_queok, asp->fas_quefail, asp->fas_expire); 1520 1521 frap = asp->fas_faelist; 1522 while (frap) { 1523 if (kmemcpy((char *)&fra, (u_long)frap, sizeof(fra)) == -1) 1524 break; 1525 1526 printf("age %ld\t", fra.fae_age); 1527 printfr(&fra.fae_fr, ioctl); 1528 frap = fra.fae_next; 1529 } 1530 } 1531 1532 1533 /* 1534 * Display groups used for each of filter rules, accounting rules and 1535 * authentication, separately. 1536 */ 1537 static void showgroups(fiop) 1538 struct friostat *fiop; 1539 { 1540 static char *gnames[3] = { "Filter", "Accounting", "Authentication" }; 1541 static int gnums[3] = { IPL_LOGIPF, IPL_LOGCOUNT, IPL_LOGAUTH }; 1542 frgroup_t *fp, grp; 1543 int on, off, i; 1544 1545 on = fiop->f_active; 1546 off = 1 - on; 1547 1548 for (i = 0; i < 3; i++) { 1549 printf("%s groups (active):\n", gnames[i]); 1550 for (fp = fiop->f_groups[gnums[i]][on]; fp != NULL; 1551 fp = grp.fg_next) 1552 if (kmemcpy((char *)&grp, (u_long)fp, sizeof(grp))) 1553 break; 1554 else 1555 printf("%s\n", grp.fg_name); 1556 printf("%s groups (inactive):\n", gnames[i]); 1557 for (fp = fiop->f_groups[gnums[i]][off]; fp != NULL; 1558 fp = grp.fg_next) 1559 if (kmemcpy((char *)&grp, (u_long)fp, sizeof(grp))) 1560 break; 1561 else 1562 printf("%s\n", grp.fg_name); 1563 } 1564 } 1565 1566 static void parse_ipportstr(argument, ip, port) 1567 const char *argument; 1568 i6addr_t *ip; 1569 int *port; 1570 { 1571 char *s, *comma; 1572 int ok = 0; 1573 1574 /* make working copy of argument, Theoretically you must be able 1575 * to write to optarg, but that seems very ugly to me.... 1576 */ 1577 s = strdup(argument); 1578 if (s == NULL) 1579 return; 1580 1581 /* get port */ 1582 if ((comma = strchr(s, ',')) != NULL) { 1583 if (!strcasecmp(comma + 1, "any")) { 1584 *port = -1; 1585 } else if (!sscanf(comma + 1, "%d", port) || 1586 (*port < 0) || (*port > 65535)) { 1587 fprintf(stderr, "Invalid port specfication in %s\n", 1588 argument); 1589 free(s); 1590 exit(-2); 1591 } 1592 *comma = '\0'; 1593 } 1594 1595 1596 /* get ip address */ 1597 if (!strcasecmp(s, "any")) { 1598 ip->in4.s_addr = INADDR_ANY; 1599 #ifdef USE_INET6 1600 ip->in6 = in6addr_any; 1601 } else if (use_inet6 && inet_pton(AF_INET6, s, &ip->in6)) { 1602 ok = 1; 1603 #endif 1604 } else if (inet_aton(s, &ip->in4)) 1605 ok = 1; 1606 1607 if (ok == 0) { 1608 fprintf(stderr, "Invalid IP address: %s\n", s); 1609 free(s); 1610 exit(-2); 1611 } 1612 1613 /* free allocated memory */ 1614 free(s); 1615 } 1616 1617 1618 #ifdef STATETOP 1619 static void sig_resize(s) 1620 int s; 1621 { 1622 handle_resize = 1; 1623 } 1624 1625 static void sig_break(s) 1626 int s; 1627 { 1628 handle_break = 1; 1629 } 1630 1631 static char *getip(v, addr) 1632 int v; 1633 i6addr_t *addr; 1634 { 1635 #ifdef USE_INET6 1636 static char hostbuf[MAXHOSTNAMELEN+1]; 1637 #endif 1638 1639 if (v == 4) 1640 return inet_ntoa(addr->in4); 1641 1642 #ifdef USE_INET6 1643 (void) inet_ntop(AF_INET6, &addr->in6, hostbuf, sizeof(hostbuf) - 1); 1644 hostbuf[MAXHOSTNAMELEN] = '\0'; 1645 return hostbuf; 1646 #else 1647 return "IPv6"; 1648 #endif 1649 } 1650 1651 1652 static char *ttl_to_string(ttl) 1653 long int ttl; 1654 { 1655 static char ttlbuf[STSTRSIZE]; 1656 int hours, minutes, seconds; 1657 1658 /* ttl is in half seconds */ 1659 ttl /= 2; 1660 1661 hours = ttl / 3600; 1662 ttl = ttl % 3600; 1663 minutes = ttl / 60; 1664 seconds = ttl % 60; 1665 1666 if (hours > 0) 1667 sprintf(ttlbuf, "%2d:%02d:%02d", hours, minutes, seconds); 1668 else 1669 sprintf(ttlbuf, "%2d:%02d", minutes, seconds); 1670 return ttlbuf; 1671 } 1672 1673 1674 static int sort_pkts(a, b) 1675 const void *a; 1676 const void *b; 1677 { 1678 1679 register const statetop_t *ap = a; 1680 register const statetop_t *bp = b; 1681 1682 if (ap->st_pkts == bp->st_pkts) 1683 return 0; 1684 else if (ap->st_pkts < bp->st_pkts) 1685 return 1; 1686 return -1; 1687 } 1688 1689 1690 static int sort_bytes(a, b) 1691 const void *a; 1692 const void *b; 1693 { 1694 register const statetop_t *ap = a; 1695 register const statetop_t *bp = b; 1696 1697 if (ap->st_bytes == bp->st_bytes) 1698 return 0; 1699 else if (ap->st_bytes < bp->st_bytes) 1700 return 1; 1701 return -1; 1702 } 1703 1704 1705 static int sort_p(a, b) 1706 const void *a; 1707 const void *b; 1708 { 1709 register const statetop_t *ap = a; 1710 register const statetop_t *bp = b; 1711 1712 if (ap->st_p == bp->st_p) 1713 return 0; 1714 else if (ap->st_p < bp->st_p) 1715 return 1; 1716 return -1; 1717 } 1718 1719 1720 static int sort_ttl(a, b) 1721 const void *a; 1722 const void *b; 1723 { 1724 register const statetop_t *ap = a; 1725 register const statetop_t *bp = b; 1726 1727 if (ap->st_age == bp->st_age) 1728 return 0; 1729 else if (ap->st_age < bp->st_age) 1730 return 1; 1731 return -1; 1732 } 1733 1734 static int sort_srcip(a, b) 1735 const void *a; 1736 const void *b; 1737 { 1738 register const statetop_t *ap = a; 1739 register const statetop_t *bp = b; 1740 1741 #ifdef USE_INET6 1742 if (use_inet6) { 1743 if (IP6_EQ(&ap->st_src, &bp->st_src)) 1744 return 0; 1745 else if (IP6_GT(&ap->st_src, &bp->st_src)) 1746 return 1; 1747 } else 1748 #endif 1749 { 1750 if (ntohl(ap->st_src.in4.s_addr) == 1751 ntohl(bp->st_src.in4.s_addr)) 1752 return 0; 1753 else if (ntohl(ap->st_src.in4.s_addr) > 1754 ntohl(bp->st_src.in4.s_addr)) 1755 return 1; 1756 } 1757 return -1; 1758 } 1759 1760 static int sort_srcpt(a, b) 1761 const void *a; 1762 const void *b; 1763 { 1764 register const statetop_t *ap = a; 1765 register const statetop_t *bp = b; 1766 1767 if (htons(ap->st_sport) == htons(bp->st_sport)) 1768 return 0; 1769 else if (htons(ap->st_sport) > htons(bp->st_sport)) 1770 return 1; 1771 return -1; 1772 } 1773 1774 static int sort_dstip(a, b) 1775 const void *a; 1776 const void *b; 1777 { 1778 register const statetop_t *ap = a; 1779 register const statetop_t *bp = b; 1780 1781 #ifdef USE_INET6 1782 if (use_inet6) { 1783 if (IP6_EQ(&ap->st_dst, &bp->st_dst)) 1784 return 0; 1785 else if (IP6_GT(&ap->st_dst, &bp->st_dst)) 1786 return 1; 1787 } else 1788 #endif 1789 { 1790 if (ntohl(ap->st_dst.in4.s_addr) == 1791 ntohl(bp->st_dst.in4.s_addr)) 1792 return 0; 1793 else if (ntohl(ap->st_dst.in4.s_addr) > 1794 ntohl(bp->st_dst.in4.s_addr)) 1795 return 1; 1796 } 1797 return -1; 1798 } 1799 1800 static int sort_dstpt(a, b) 1801 const void *a; 1802 const void *b; 1803 { 1804 register const statetop_t *ap = a; 1805 register const statetop_t *bp = b; 1806 1807 if (htons(ap->st_dport) == htons(bp->st_dport)) 1808 return 0; 1809 else if (htons(ap->st_dport) > htons(bp->st_dport)) 1810 return 1; 1811 return -1; 1812 } 1813 1814 #endif 1815