in.h revision 19035
1/* 2 * Copyright (c) 1982, 1986, 1990, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)in.h 8.3 (Berkeley) 1/3/94 34 * $Id: in.h,v 1.20 1996/08/21 21:36:53 sos Exp $ 35 */ 36 37#ifndef _NETINET_IN_H_ 38#define _NETINET_IN_H_ 39 40/* 41 * Constants and structures defined by the internet system, 42 * Per RFC 790, September 1981, and numerous additions. 43 */ 44 45/* 46 * Protocols 47 */ 48#define IPPROTO_IP 0 /* dummy for IP */ 49#define IPPROTO_ICMP 1 /* control message protocol */ 50#define IPPROTO_IGMP 2 /* group mgmt protocol */ 51#define IPPROTO_GGP 3 /* gateway^2 (deprecated) */ 52#define IPPROTO_IPIP 4 /* IP encapsulation in IP */ 53#define IPPROTO_TCP 6 /* tcp */ 54#define IPPROTO_EGP 8 /* exterior gateway protocol */ 55#define IPPROTO_PUP 12 /* pup */ 56#define IPPROTO_UDP 17 /* user datagram protocol */ 57#define IPPROTO_IDP 22 /* xns idp */ 58#define IPPROTO_TP 29 /* tp-4 w/ class negotiation */ 59#define IPPROTO_RSVP 46 /* resource reservation */ 60#define IPPROTO_EON 80 /* ISO cnlp */ 61#define IPPROTO_ENCAP 98 /* encapsulation header */ 62 63#define IPPROTO_DIVERT 254 /* divert pseudo-protocol */ 64#define IPPROTO_RAW 255 /* raw IP packet */ 65#define IPPROTO_MAX 256 66 67 68/* 69 * Local port number conventions: 70 * 71 * When a user does a bind(2) or connect(2) with a port number of zero, 72 * a non-conflicting local port address is chosen. 73 * The default range is IPPORT_RESERVED through 74 * IPPORT_USERRESERVED, although that is settable by sysctl. 75 * 76 * A user may set the IPPROTO_IP option IP_PORTRANGE to change this 77 * default assignment range. 78 * 79 * The value IP_PORTRANGE_DEFAULT causes the default behavior. 80 * 81 * The value IP_PORTRANGE_HIGH changes the range of candidate port numbers 82 * into the "high" range. These are reserved for client outbound connections 83 * which do not want to be filtered by any firewalls. 84 * 85 * The value IP_PORTRANGE_LOW changes the range to the "low" are 86 * that is (by convention) restricted to privileged processes. This 87 * convention is based on "vouchsafe" principles only. It is only secure 88 * if you trust the remote host to restrict these ports. 89 * 90 * The default range of ports and the high range can be changed by 91 * sysctl(3). (net.inet.ip.port{hi,low}{first,last}_auto) 92 * 93 * Changing those values has bad security implications if you are 94 * using a a stateless firewall that is allowing packets outside of that 95 * range in order to allow transparent outgoing connections. 96 * 97 * Such a firewall configuration will generally depend on the use of these 98 * default values. If you change them, you may find your Security 99 * Administrator looking for you with a heavy object. 100 */ 101 102/* 103 * Ports < IPPORT_RESERVED are reserved for 104 * privileged processes (e.g. root). (IP_PORTRANGE_LOW) 105 * Ports > IPPORT_USERRESERVED are reserved 106 * for servers, not necessarily privileged. (IP_PORTRANGE_DEFAULT) 107 */ 108#define IPPORT_RESERVED 1024 109#define IPPORT_USERRESERVED 5000 110 111/* 112 * Default local port range to use by setting IP_PORTRANGE_HIGH 113 */ 114#define IPPORT_HIFIRSTAUTO 40000 115#define IPPORT_HILASTAUTO 44999 116 117/* 118 * Scanning for a free reserved port return a value below IPPORT_RESERVED, 119 * but higher than IPPORT_RESERVEDSTART. Traditionally the start value was 120 * 512, but that conflicts with some well-known-services that firewalls may 121 * have a fit if we use. 122 */ 123#define IPPORT_RESERVEDSTART 600 124 125/* 126 * Internet address (a structure for historical reasons) 127 */ 128struct in_addr { 129 u_long s_addr; 130}; 131 132/* 133 * Definitions of bits in internet address integers. 134 * On subnets, the decomposition of addresses to host and net parts 135 * is done according to subnet mask, not the masks here. 136 */ 137#define IN_CLASSA(i) (((long)(i) & 0x80000000) == 0) 138#define IN_CLASSA_NET 0xff000000 139#define IN_CLASSA_NSHIFT 24 140#define IN_CLASSA_HOST 0x00ffffff 141#define IN_CLASSA_MAX 128 142 143#define IN_CLASSB(i) (((long)(i) & 0xc0000000) == 0x80000000) 144#define IN_CLASSB_NET 0xffff0000 145#define IN_CLASSB_NSHIFT 16 146#define IN_CLASSB_HOST 0x0000ffff 147#define IN_CLASSB_MAX 65536 148 149#define IN_CLASSC(i) (((long)(i) & 0xe0000000) == 0xc0000000) 150#define IN_CLASSC_NET 0xffffff00 151#define IN_CLASSC_NSHIFT 8 152#define IN_CLASSC_HOST 0x000000ff 153 154#define IN_CLASSD(i) (((long)(i) & 0xf0000000) == 0xe0000000) 155#define IN_CLASSD_NET 0xf0000000 /* These ones aren't really */ 156#define IN_CLASSD_NSHIFT 28 /* net and host fields, but */ 157#define IN_CLASSD_HOST 0x0fffffff /* routing needn't know. */ 158#define IN_MULTICAST(i) IN_CLASSD(i) 159 160#define IN_EXPERIMENTAL(i) (((long)(i) & 0xf0000000) == 0xf0000000) 161#define IN_BADCLASS(i) (((long)(i) & 0xf0000000) == 0xf0000000) 162 163#define INADDR_ANY (u_long)0x00000000 164#define INADDR_BROADCAST (u_long)0xffffffff /* must be masked */ 165#ifndef KERNEL 166#define INADDR_NONE 0xffffffff /* -1 return */ 167#endif 168 169#define INADDR_UNSPEC_GROUP (u_long)0xe0000000 /* 224.0.0.0 */ 170#define INADDR_ALLHOSTS_GROUP (u_long)0xe0000001 /* 224.0.0.1 */ 171#define INADDR_ALLRTRS_GROUP (u_long)0xe0000002 /* 224.0.0.2 */ 172#define INADDR_MAX_LOCAL_GROUP (u_long)0xe00000ff /* 224.0.0.255 */ 173 174#define IN_LOOPBACKNET 127 /* official! */ 175 176/* 177 * Socket address, internet style. 178 */ 179struct sockaddr_in { 180 u_char sin_len; 181 u_char sin_family; 182 u_short sin_port; 183 struct in_addr sin_addr; 184 char sin_zero[8]; 185}; 186 187/* 188 * Structure used to describe IP options. 189 * Used to store options internally, to pass them to a process, 190 * or to restore options retrieved earlier. 191 * The ip_dst is used for the first-hop gateway when using a source route 192 * (this gets put into the header proper). 193 */ 194struct ip_opts { 195 struct in_addr ip_dst; /* first hop, 0 w/o src rt */ 196 char ip_opts[40]; /* actually variable in size */ 197}; 198 199/* 200 * Options for use with [gs]etsockopt at the IP level. 201 * First word of comment is data type; bool is stored in int. 202 */ 203#define IP_OPTIONS 1 /* buf/ip_opts; set/get IP options */ 204#define IP_HDRINCL 2 /* int; header is included with data */ 205#define IP_TOS 3 /* int; IP type of service and preced. */ 206#define IP_TTL 4 /* int; IP time to live */ 207#define IP_RECVOPTS 5 /* bool; receive all IP opts w/dgram */ 208#define IP_RECVRETOPTS 6 /* bool; receive IP opts for response */ 209#define IP_RECVDSTADDR 7 /* bool; receive IP dst addr w/dgram */ 210#define IP_RETOPTS 8 /* ip_opts; set/get IP options */ 211#define IP_MULTICAST_IF 9 /* u_char; set/get IP multicast i/f */ 212#define IP_MULTICAST_TTL 10 /* u_char; set/get IP multicast ttl */ 213#define IP_MULTICAST_LOOP 11 /* u_char; set/get IP multicast loopback */ 214#define IP_ADD_MEMBERSHIP 12 /* ip_mreq; add an IP group membership */ 215#define IP_DROP_MEMBERSHIP 13 /* ip_mreq; drop an IP group membership */ 216#define IP_MULTICAST_VIF 14 /* set/get IP mcast virt. iface */ 217#define IP_RSVP_ON 15 /* enable RSVP in kernel */ 218#define IP_RSVP_OFF 16 /* disable RSVP in kernel */ 219#define IP_RSVP_VIF_ON 17 /* set RSVP per-vif socket */ 220#define IP_RSVP_VIF_OFF 18 /* unset RSVP per-vif socket */ 221#define IP_PORTRANGE 19 /* int; range to choose for unspec port */ 222 223#define IP_FW_ADD 50 /* add a firewall rule to chain */ 224#define IP_FW_DEL 51 /* delete a firewall rule from chain */ 225#define IP_FW_FLUSH 52 /* flush firewall rule chain */ 226#define IP_FW_ZERO 53 /* clear single/all firewall counter(s) */ 227#define IP_FW_GET 54 /* get entire firewall rule chain */ 228#define IP_NAT 55 /* set/get NAT opts */ 229 230/* 231 * Defaults and limits for options 232 */ 233#define IP_DEFAULT_MULTICAST_TTL 1 /* normally limit m'casts to 1 hop */ 234#define IP_DEFAULT_MULTICAST_LOOP 1 /* normally hear sends if a member */ 235#define IP_MAX_MEMBERSHIPS 20 /* per socket */ 236 237/* 238 * Argument structure for IP_ADD_MEMBERSHIP and IP_DROP_MEMBERSHIP. 239 */ 240struct ip_mreq { 241 struct in_addr imr_multiaddr; /* IP multicast address of group */ 242 struct in_addr imr_interface; /* local IP address of interface */ 243}; 244 245/* 246 * Argument for IP_PORTRANGE: 247 * - which range to search when port is unspecified at bind() or connect() 248 */ 249#define IP_PORTRANGE_DEFAULT 0 /* default range */ 250#define IP_PORTRANGE_HIGH 1 /* "high" - request firewall bypass */ 251#define IP_PORTRANGE_LOW 2 /* "low" - vouchsafe security */ 252 253/* 254 * Definitions for inet sysctl operations. 255 * 256 * Third level is protocol number. 257 * Fourth level is desired variable within that protocol. 258 */ 259#define IPPROTO_MAXID (IPPROTO_IDP + 1) /* don't list to IPPROTO_MAX */ 260 261#define CTL_IPPROTO_NAMES { \ 262 { "ip", CTLTYPE_NODE }, \ 263 { "icmp", CTLTYPE_NODE }, \ 264 { "igmp", CTLTYPE_NODE }, \ 265 { "ggp", CTLTYPE_NODE }, \ 266 { 0, 0 }, \ 267 { 0, 0 }, \ 268 { "tcp", CTLTYPE_NODE }, \ 269 { 0, 0 }, \ 270 { "egp", CTLTYPE_NODE }, \ 271 { 0, 0 }, \ 272 { 0, 0 }, \ 273 { 0, 0 }, \ 274 { "pup", CTLTYPE_NODE }, \ 275 { 0, 0 }, \ 276 { 0, 0 }, \ 277 { 0, 0 }, \ 278 { 0, 0 }, \ 279 { "udp", CTLTYPE_NODE }, \ 280 { 0, 0 }, \ 281 { 0, 0 }, \ 282 { 0, 0 }, \ 283 { 0, 0 }, \ 284 { "idp", CTLTYPE_NODE }, \ 285} 286 287/* 288 * Names for IP sysctl objects 289 */ 290#define IPCTL_FORWARDING 1 /* act as router */ 291#define IPCTL_SENDREDIRECTS 2 /* may send redirects when forwarding */ 292#define IPCTL_DEFTTL 3 /* default TTL */ 293#ifdef notyet 294#define IPCTL_DEFMTU 4 /* default MTU */ 295#endif 296#define IPCTL_RTEXPIRE 5 /* cloned route expiration time */ 297#define IPCTL_RTMINEXPIRE 6 /* min value for expiration time */ 298#define IPCTL_RTMAXCACHE 7 /* trigger level for dynamic expire */ 299#define IPCTL_SOURCEROUTE 8 /* may perform source routes */ 300#define IPCTL_DIRECTEDBROADCAST 9 /* may re-broadcast received packets */ 301#define IPCTL_INTRQMAXLEN 10 /* max length of netisr queue */ 302#define IPCTL_INTRQDROPS 11 /* number of netisr q drops */ 303#define IPCTL_MAXID 12 304 305#define IPCTL_NAMES { \ 306 { 0, 0 }, \ 307 { "forwarding", CTLTYPE_INT }, \ 308 { "redirect", CTLTYPE_INT }, \ 309 { "ttl", CTLTYPE_INT }, \ 310 { "mtu", CTLTYPE_INT }, \ 311 { "rtexpire", CTLTYPE_INT }, \ 312 { "rtminexpire", CTLTYPE_INT }, \ 313 { "rtmaxcache", CTLTYPE_INT }, \ 314 { "sourceroute", CTLTYPE_INT }, \ 315 { "directed-broadcast", CTLTYPE_INT }, \ 316 { "intr-queue-maxlen", CTLTYPE_INT }, \ 317 { "intr-queue-drops", CTLTYPE_INT }, \ 318} 319 320 321#ifdef KERNEL 322struct ifnet; struct mbuf; /* forward declarations for Standard C */ 323 324int in_broadcast __P((struct in_addr, struct ifnet *)); 325int in_canforward __P((struct in_addr)); 326int in_cksum __P((struct mbuf *, int)); 327int in_localaddr __P((struct in_addr)); 328char *inet_ntoa __P((struct in_addr)); /* in libkern */ 329 330/* Firewall hooks */ 331struct ip; 332typedef int ip_fw_chk_t __P((struct ip**, int, struct ifnet*, int, struct mbuf**)); 333typedef int ip_fw_ctl_t __P((int, struct mbuf**)); 334extern ip_fw_chk_t *ip_fw_chk_ptr; 335extern ip_fw_ctl_t *ip_fw_ctl_ptr; 336 337/* IP NAT hooks */ 338typedef int ip_nat_t __P((struct ip**, struct mbuf**, int)); 339typedef int ip_nat_ctl_t __P((int, struct mbuf**)); 340extern ip_nat_t *ip_nat_ptr; 341extern ip_nat_ctl_t *ip_nat_ctl_ptr; 342#define IP_NAT_IN 0x00000001 343#define IP_NAT_OUT 0x00000002 344 345#endif /* KERNEL */ 346 347#endif 348