1/*- 2 * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 * 26 * $FreeBSD$ 27 */ 28#include <sys/types.h> 29#include <netipsec/ipsec.h> 30#include <netipsec/ah_var.h> 31#include <netipsec/esp_var.h> 32#include <stdint.h> 33#include <stdio.h> 34 35struct alg { 36 int a; 37 const char *name; 38}; 39static const struct alg aalgs[] = { 40 { SADB_AALG_NONE, "none", }, 41 { SADB_AALG_MD5HMAC, "hmac-md5", }, 42 { SADB_AALG_SHA1HMAC, "hmac-sha1", }, 43 { SADB_X_AALG_MD5, "md5", }, 44 { SADB_X_AALG_SHA, "sha", }, 45 { SADB_X_AALG_NULL, "null", }, 46 { SADB_X_AALG_SHA2_256, "hmac-sha2-256", }, 47 { SADB_X_AALG_SHA2_384, "hmac-sha2-384", }, 48 { SADB_X_AALG_SHA2_512, "hmac-sha2-512", }, 49}; 50static const struct alg espalgs[] = { 51 { SADB_EALG_NONE, "none", }, 52 { SADB_EALG_DESCBC, "des-cbc", }, 53 { SADB_EALG_3DESCBC, "3des-cbc", }, 54 { SADB_EALG_NULL, "null", }, 55 { SADB_X_EALG_CAST128CBC, "cast128-cbc", }, 56 { SADB_X_EALG_BLOWFISHCBC, "blowfish-cbc", }, 57 { SADB_X_EALG_RIJNDAELCBC, "rijndael-cbc", }, 58}; 59static const struct alg ipcompalgs[] = { 60 { SADB_X_CALG_NONE, "none", }, 61 { SADB_X_CALG_OUI, "oui", }, 62 { SADB_X_CALG_DEFLATE, "deflate", }, 63 { SADB_X_CALG_LZS, "lzs", }, 64}; 65#define N(a) (sizeof(a)/sizeof(a[0])) 66 67static const char* 68algname(int a, const struct alg algs[], int nalgs) 69{ 70 static char buf[80]; 71 int i; 72 73 for (i = 0; i < nalgs; i++) 74 if (algs[i].a == a) 75 return algs[i].name; 76 snprintf(buf, sizeof(buf), "alg#%u", a); 77 return buf; 78} 79 80/* 81 * Little program to dump the statistics block for fast ipsec. 82 */ 83int 84main(int argc, char *argv[]) 85{ 86#define STAT(x,fmt) if (x) printf(fmt "\n", (uintmax_t)x) 87 struct ipsecstat ips; 88 struct ahstat ahs; 89 struct espstat esps; 90 size_t slen; 91 int i; 92 93 slen = sizeof (ips); 94 if (sysctlbyname("net.inet.ipsec.ipsecstats", &ips, &slen, NULL, NULL) < 0) 95 err(1, "net.inet.ipsec.ipsecstats"); 96 slen = sizeof (ahs); 97 if (sysctlbyname("net.inet.ah.stats", &ahs, &slen, NULL, NULL) < 0) 98 err(1, "net.inet.ah.stats"); 99 slen = sizeof (esps); 100 if (sysctlbyname("net.inet.esp.stats", &esps, &slen, NULL, NULL) < 0) 101 err(1, "net.inet.esp.stats"); 102 103#define AHSTAT(x,fmt) if (x) printf("ah " fmt ": %ju\n", (uintmax_t)x) 104 AHSTAT(ahs.ahs_input, "input packets processed"); 105 AHSTAT(ahs.ahs_output, "output packets processed"); 106 AHSTAT(ahs.ahs_hdrops, "headers too short"); 107 AHSTAT(ahs.ahs_nopf, "headers for unsupported address family"); 108 AHSTAT(ahs.ahs_notdb, "packets with no SA"); 109 AHSTAT(ahs.ahs_badkcr, "packets with bad kcr"); 110 AHSTAT(ahs.ahs_badauth, "packets with bad authentication"); 111 AHSTAT(ahs.ahs_noxform, "packets with no xform"); 112 AHSTAT(ahs.ahs_qfull, "packets dropped packet 'cuz queue full"); 113 AHSTAT(ahs.ahs_wrap, "packets dropped for replace counter wrap"); 114 AHSTAT(ahs.ahs_replay, "packets dropped for possible replay"); 115 AHSTAT(ahs.ahs_badauthl, "packets dropped for bad authenticator length"); 116 AHSTAT(ahs.ahs_invalid, "packets with an invalid SA"); 117 AHSTAT(ahs.ahs_toobig, "packets too big"); 118 AHSTAT(ahs.ahs_pdrops, "packets dropped due to policy"); 119 AHSTAT(ahs.ahs_crypto, "failed crypto requests"); 120 AHSTAT(ahs.ahs_tunnel, "tunnel sanity check failures"); 121 for (i = 0; i < AH_ALG_MAX; i++) 122 if (ahs.ahs_hist[i]) 123 printf("ah packets with %s: %ju\n" 124 , algname(i, aalgs, N(aalgs)) 125 , (uintmax_t)ahs.ahs_hist[i] 126 ); 127 AHSTAT(ahs.ahs_ibytes, "bytes received"); 128 AHSTAT(ahs.ahs_obytes, "bytes transmitted"); 129#undef AHSTAT 130 131#define ESPSTAT(x,fmt) if (x) printf("esp " fmt ": %ju\n", (uintmax_t)x) 132 ESPSTAT(esps.esps_input, "input packets processed"); 133 ESPSTAT(esps.esps_output, "output packets processed"); 134 ESPSTAT(esps.esps_hdrops, "headers too short"); 135 ESPSTAT(esps.esps_nopf, "headers for unsupported address family"); 136 ESPSTAT(esps.esps_notdb, "packets with no SA"); 137 ESPSTAT(esps.esps_badkcr, "packets with bad kcr"); 138 ESPSTAT(esps.esps_qfull, "packets dropped packet 'cuz queue full"); 139 ESPSTAT(esps.esps_noxform, "packets with no xform"); 140 ESPSTAT(esps.esps_badilen, "packets with bad ilen"); 141 ESPSTAT(esps.esps_badenc, "packets with bad encryption"); 142 ESPSTAT(esps.esps_badauth, "packets with bad authentication"); 143 ESPSTAT(esps.esps_wrap, "packets dropped for replay counter wrap"); 144 ESPSTAT(esps.esps_replay, "packets dropped for possible replay"); 145 ESPSTAT(esps.esps_invalid, "packets with an invalid SA"); 146 ESPSTAT(esps.esps_toobig, "packets too big"); 147 ESPSTAT(esps.esps_pdrops, "packets dropped due to policy"); 148 ESPSTAT(esps.esps_crypto, "failed crypto requests"); 149 ESPSTAT(esps.esps_tunnel, "tunnel sanity check failures"); 150 for (i = 0; i < ESP_ALG_MAX; i++) 151 if (esps.esps_hist[i]) 152 printf("esp packets with %s: %ju\n" 153 , algname(i, espalgs, N(espalgs)) 154 , (uintmax_t)esps.esps_hist[i] 155 ); 156 ESPSTAT(esps.esps_ibytes, "bytes received"); 157 ESPSTAT(esps.esps_obytes, "bytes transmitted"); 158#undef ESPSTAT 159 160 printf("\n"); 161 if (ips.ips_in_polvio+ips.ips_out_polvio) 162 printf("policy violations: input %ju output %ju\n", 163 (uintmax_t)ips.ips_in_polvio, 164 (uintmax_t)ips.ips_out_polvio); 165 STAT(ips.ips_out_nosa, "no SA found %ju (output)"); 166 STAT(ips.ips_out_nomem, "no memory available %ju (output)"); 167 STAT(ips.ips_out_noroute, "no route available %ju (output)"); 168 STAT(ips.ips_out_inval, "generic error %ju (output)"); 169 STAT(ips.ips_out_bundlesa, "bundled SA processed %ju (output)"); 170 printf("m_clone processing: %ju mbufs + %ju clusters coalesced\n", 171 (uintmax_t)ips.ips_mbcoalesced, (uintmax_t)ips.ips_clcoalesced); 172 STAT(ips.ips_clcopied, "m_clone processing: %ju clusters copied\n"); 173 STAT(ips.ips_mbinserted, "m_makespace: %ju mbufs inserted\n"); 174 printf("header position [front/middle/end]: %ju/%ju/%ju\n", 175 (uintmax_t)ips.ips_input_front, (uintmax_t)ips.ips_input_middle, 176 (uintmax_t)ips.ips_input_end); 177 return 0; 178} 179