ipnat.c revision 145511
1/* $NetBSD$ */ 2 3/* 4 * Copyright (C) 1993-2001 by Darren Reed. 5 * 6 * See the IPFILTER.LICENCE file for details on licencing. 7 * 8 * Added redirect stuff and a variety of bug fixes. (mcn@EnGarde.com) 9 */ 10#include <stdio.h> 11#include <string.h> 12#include <fcntl.h> 13#include <errno.h> 14#include <sys/types.h> 15#if !defined(__SVR4) && !defined(__svr4__) 16#include <strings.h> 17#else 18#include <sys/byteorder.h> 19#endif 20#include <sys/time.h> 21#include <sys/param.h> 22#include <stdlib.h> 23#include <unistd.h> 24#include <stddef.h> 25#include <sys/file.h> 26#define _KERNEL 27#include <sys/uio.h> 28#undef _KERNEL 29#include <sys/socket.h> 30#include <sys/ioctl.h> 31#if defined(sun) && (defined(__svr4__) || defined(__SVR4)) 32# include <sys/ioccom.h> 33# include <sys/sysmacros.h> 34#endif 35#include <netinet/in.h> 36#include <netinet/in_systm.h> 37#include <netinet/ip.h> 38#include <netinet/tcp.h> 39#include <net/if.h> 40#if __FreeBSD_version >= 300000 41# include <net/if_var.h> 42#endif 43#include <netdb.h> 44#include <arpa/nameser.h> 45#include <arpa/inet.h> 46#include <resolv.h> 47#include <ctype.h> 48#if defined(linux) 49# include <linux/a.out.h> 50#else 51# include <nlist.h> 52#endif 53#include "ipf.h" 54#include "ipl.h" 55#include "kmem.h" 56 57#ifdef __hpux 58# define nlist nlist64 59#endif 60 61#if defined(sun) && !SOLARIS2 62# define STRERROR(x) sys_errlist[x] 63extern char *sys_errlist[]; 64#else 65# define STRERROR(x) strerror(x) 66#endif 67 68#if !defined(lint) 69static const char sccsid[] ="@(#)ipnat.c 1.9 6/5/96 (C) 1993 Darren Reed"; 70static const char rcsid[] = "@(#)Id: ipnat.c,v 1.24.2.1 2004/04/28 17:56:22 darrenr Exp"; 71#endif 72 73 74#if SOLARIS 75#define bzero(a,b) memset(a,0,b) 76#endif 77int use_inet6 = 0; 78char thishost[MAXHOSTNAMELEN]; 79 80extern char *optarg; 81 82void dostats __P((natstat_t *, int)), flushtable __P((int, int)); 83void usage __P((char *)); 84int main __P((int, char*[])); 85void showhostmap __P((natstat_t *nsp)); 86void natstat_dead __P((natstat_t *, char *)); 87 88int opts; 89 90void usage(name) 91char *name; 92{ 93 fprintf(stderr, "Usage: %s [-CFhlnrRsv] [-f filename]\n", name); 94 exit(1); 95} 96 97 98int main(argc, argv) 99int argc; 100char *argv[]; 101{ 102 char *file, *core, *kernel; 103 natstat_t ns, *nsp; 104 int fd, c, mode; 105 ipfobj_t obj; 106 107 fd = -1; 108 opts = 0; 109 nsp = &ns; 110 file = NULL; 111 core = NULL; 112 kernel = NULL; 113 mode = O_RDWR; 114 115 while ((c = getopt(argc, argv, "CdFf:hlM:N:nrRsv")) != -1) 116 switch (c) 117 { 118 case 'C' : 119 opts |= OPT_CLEAR; 120 break; 121 case 'd' : 122 opts |= OPT_DEBUG; 123 break; 124 case 'f' : 125 file = optarg; 126 break; 127 case 'F' : 128 opts |= OPT_FLUSH; 129 break; 130 case 'h' : 131 opts |=OPT_HITS; 132 break; 133 case 'l' : 134 opts |= OPT_LIST; 135 mode = O_RDONLY; 136 break; 137 case 'M' : 138 core = optarg; 139 break; 140 case 'N' : 141 kernel = optarg; 142 break; 143 case 'n' : 144 opts |= OPT_DONOTHING; 145 mode = O_RDONLY; 146 break; 147 case 'R' : 148 opts |= OPT_NORESOLVE; 149 break; 150 case 'r' : 151 opts |= OPT_REMOVE; 152 break; 153 case 's' : 154 opts |= OPT_STAT; 155 mode = O_RDONLY; 156 break; 157 case 'v' : 158 opts |= OPT_VERBOSE; 159 break; 160 default : 161 usage(argv[0]); 162 } 163 164 initparse(); 165 166 if ((kernel != NULL) || (core != NULL)) { 167 (void) setgid(getgid()); 168 (void) setuid(getuid()); 169 } 170 171 bzero((char *)&ns, sizeof(ns)); 172 173 if ((opts & OPT_DONOTHING) == 0) { 174 if (checkrev(IPL_NAME) == -1) { 175 fprintf(stderr, "User/kernel version check failed\n"); 176 exit(1); 177 } 178 } 179 180 181 if (!(opts & OPT_DONOTHING) && (kernel == NULL) && (core == NULL)) { 182 if (openkmem(kernel, core) == -1) 183 exit(1); 184 185 if (((fd = open(IPNAT_NAME, mode)) == -1) && 186 ((fd = open(IPNAT_NAME, O_RDONLY)) == -1)) { 187 (void) fprintf(stderr, "%s: open: %s\n", IPNAT_NAME, 188 STRERROR(errno)); 189 exit(1); 190 } 191 192 bzero((char *)&obj, sizeof(obj)); 193 obj.ipfo_rev = IPFILTER_VERSION; 194 obj.ipfo_size = sizeof(*nsp); 195 obj.ipfo_type = IPFOBJ_NATSTAT; 196 obj.ipfo_ptr = (void *)nsp; 197 if (ioctl(fd, SIOCGNATS, &obj) == -1) { 198 perror("ioctl(SIOCGNATS)"); 199 exit(1); 200 } 201 (void) setgid(getgid()); 202 (void) setuid(getuid()); 203 } else if ((kernel != NULL) || (core != NULL)) { 204 if (openkmem(kernel, core) == -1) 205 exit(1); 206 207 natstat_dead(nsp, kernel); 208 if (opts & (OPT_LIST|OPT_STAT)) 209 dostats(nsp, opts); 210 exit(0); 211 } 212 213 if (opts & (OPT_FLUSH|OPT_CLEAR)) 214 flushtable(fd, opts); 215 if (file) { 216 ipnat_parsefile(fd, ipnat_addrule, ioctl, file); 217 } 218 if (opts & (OPT_LIST|OPT_STAT)) 219 dostats(nsp, opts); 220 return 0; 221} 222 223 224/* 225 * Read NAT statistic information in using a symbol table and memory file 226 * rather than doing ioctl's. 227 */ 228void natstat_dead(nsp, kernel) 229natstat_t *nsp; 230char *kernel; 231{ 232 struct nlist nat_nlist[10] = { 233 { "nat_table" }, /* 0 */ 234 { "nat_list" }, 235 { "maptable" }, 236 { "ipf_nattable_sz" }, 237 { "ipf_natrules_sz" }, 238 { "ipf_rdrrules_sz" }, /* 5 */ 239 { "ipf_hostmap_sz" }, 240 { "nat_instances" }, 241 { "ap_sess_list" }, 242 { NULL } 243 }; 244 void *tables[2]; 245 246 if (nlist(kernel, nat_nlist) == -1) { 247 fprintf(stderr, "nlist error\n"); 248 return; 249 } 250 251 /* 252 * Normally the ioctl copies all of these values into the structure 253 * for us, before returning it to userland, so here we must copy each 254 * one in individually. 255 */ 256 kmemcpy((char *)&tables, nat_nlist[0].n_value, sizeof(tables)); 257 nsp->ns_table[0] = tables[0]; 258 nsp->ns_table[1] = tables[1]; 259 260 kmemcpy((char *)&nsp->ns_list, nat_nlist[1].n_value, 261 sizeof(nsp->ns_list)); 262 kmemcpy((char *)&nsp->ns_maptable, nat_nlist[2].n_value, 263 sizeof(nsp->ns_maptable)); 264 kmemcpy((char *)&nsp->ns_nattab_sz, nat_nlist[3].n_value, 265 sizeof(nsp->ns_nattab_sz)); 266 kmemcpy((char *)&nsp->ns_rultab_sz, nat_nlist[4].n_value, 267 sizeof(nsp->ns_rultab_sz)); 268 kmemcpy((char *)&nsp->ns_rdrtab_sz, nat_nlist[5].n_value, 269 sizeof(nsp->ns_rdrtab_sz)); 270 kmemcpy((char *)&nsp->ns_hostmap_sz, nat_nlist[6].n_value, 271 sizeof(nsp->ns_hostmap_sz)); 272 kmemcpy((char *)&nsp->ns_instances, nat_nlist[7].n_value, 273 sizeof(nsp->ns_instances)); 274 kmemcpy((char *)&nsp->ns_apslist, nat_nlist[8].n_value, 275 sizeof(nsp->ns_apslist)); 276} 277 278 279/* 280 * Display NAT statistics. 281 */ 282void dostats(nsp, opts) 283natstat_t *nsp; 284int opts; 285{ 286 nat_t *np, nat; 287 ipnat_t ipn; 288 289 /* 290 * Show statistics ? 291 */ 292 if (opts & OPT_STAT) { 293 printf("mapped\tin\t%lu\tout\t%lu\n", 294 nsp->ns_mapped[0], nsp->ns_mapped[1]); 295 printf("added\t%lu\texpired\t%lu\n", 296 nsp->ns_added, nsp->ns_expire); 297 printf("no memory\t%lu\tbad nat\t%lu\n", 298 nsp->ns_memfail, nsp->ns_badnat); 299 printf("inuse\t%lu\nrules\t%lu\n", 300 nsp->ns_inuse, nsp->ns_rules); 301 printf("wilds\t%u\n", nsp->ns_wilds); 302 if (opts & OPT_VERBOSE) 303 printf("table %p list %p\n", 304 nsp->ns_table, nsp->ns_list); 305 } 306 307 /* 308 * Show list of NAT rules and NAT sessions ? 309 */ 310 if (opts & OPT_LIST) { 311 printf("List of active MAP/Redirect filters:\n"); 312 while (nsp->ns_list) { 313 if (kmemcpy((char *)&ipn, (long)nsp->ns_list, 314 sizeof(ipn))) { 315 perror("kmemcpy"); 316 break; 317 } 318 if (opts & OPT_HITS) 319 printf("%lu ", ipn.in_hits); 320 printnat(&ipn, opts & (OPT_DEBUG|OPT_VERBOSE)); 321 nsp->ns_list = ipn.in_next; 322 } 323 324 printf("\nList of active sessions:\n"); 325 326 for (np = nsp->ns_instances; np; np = nat.nat_next) { 327 if (kmemcpy((char *)&nat, (long)np, sizeof(nat))) 328 break; 329 printactivenat(&nat, opts); 330 if (nat.nat_aps) 331 printaps(nat.nat_aps, opts); 332 } 333 334 if (opts & OPT_VERBOSE) 335 showhostmap(nsp); 336 } 337} 338 339 340/* 341 * Display the active host mapping table. 342 */ 343void showhostmap(nsp) 344natstat_t *nsp; 345{ 346 hostmap_t hm, *hmp, **maptable; 347 u_int hv; 348 349 printf("\nList of active host mappings:\n"); 350 351 maptable = (hostmap_t **)malloc(sizeof(hostmap_t *) * 352 nsp->ns_hostmap_sz); 353 if (kmemcpy((char *)maptable, (u_long)nsp->ns_maptable, 354 sizeof(hostmap_t *) * nsp->ns_hostmap_sz)) { 355 perror("kmemcpy (maptable)"); 356 return; 357 } 358 359 for (hv = 0; hv < nsp->ns_hostmap_sz; hv++) { 360 hmp = maptable[hv]; 361 362 while (hmp) { 363 if (kmemcpy((char *)&hm, (u_long)hmp, sizeof(hm))) { 364 perror("kmemcpy (hostmap)"); 365 return; 366 } 367 368 printhostmap(&hm, hv); 369 hmp = hm.hm_next; 370 } 371 } 372 free(maptable); 373} 374 375 376/* 377 * Issue an ioctl to flush either the NAT rules table or the active mapping 378 * table or both. 379 */ 380void flushtable(fd, opts) 381int fd, opts; 382{ 383 int n = 0; 384 385 if (opts & OPT_FLUSH) { 386 n = 0; 387 if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1) 388 perror("ioctl(SIOCFLNAT)"); 389 else 390 printf("%d entries flushed from NAT table\n", n); 391 } 392 393 if (opts & OPT_CLEAR) { 394 n = 1; 395 if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1) 396 perror("ioctl(SIOCCNATL)"); 397 else 398 printf("%d entries flushed from NAT list\n", n); 399 } 400} 401