ipfw2.c revision 248505
198943Sluigi/* 2117328Sluigi * Copyright (c) 2002-2003 Luigi Rizzo 398943Sluigi * Copyright (c) 1996 Alex Nash, Paul Traina, Poul-Henning Kamp 498943Sluigi * Copyright (c) 1994 Ugen J.S.Antsilevich 598943Sluigi * 698943Sluigi * Idea and grammar partially left from: 798943Sluigi * Copyright (c) 1993 Daniel Boulet 898943Sluigi * 998943Sluigi * Redistribution and use in source forms, with and without modification, 1098943Sluigi * are permitted provided that this entire comment appears intact. 1198943Sluigi * 1298943Sluigi * Redistribution in binary form may occur without any restrictions. 1398943Sluigi * Obviously, it would be nice if you gave credit where credit is due 1498943Sluigi * but requiring it would be too onerous. 1598943Sluigi * 1698943Sluigi * This software is provided ``AS IS'' without any warranties of any kind. 1798943Sluigi * 1898943Sluigi * NEW command line interface for IP firewall facility 1998943Sluigi * 2098943Sluigi * $FreeBSD: stable/9/sbin/ipfw/ipfw2.c 248505 2013-03-19 13:29:01Z melifaro $ 2198943Sluigi */ 2298943Sluigi 23187604Sluigi#include <sys/types.h> 24223262Sbenl#include <sys/param.h> 2598943Sluigi#include <sys/socket.h> 2698943Sluigi#include <sys/sockio.h> 2798943Sluigi#include <sys/sysctl.h> 2898943Sluigi 29187767Sluigi#include "ipfw2.h" 30187767Sluigi 3198943Sluigi#include <ctype.h> 3298943Sluigi#include <err.h> 3398943Sluigi#include <errno.h> 3498943Sluigi#include <grp.h> 3598943Sluigi#include <netdb.h> 3698943Sluigi#include <pwd.h> 3798943Sluigi#include <stdio.h> 3898943Sluigi#include <stdlib.h> 3998943Sluigi#include <string.h> 4098943Sluigi#include <sysexits.h> 41187983Sluigi#include <time.h> /* ctime */ 42187604Sluigi#include <timeconv.h> /* _long_to_time */ 43136071Sgreen#include <unistd.h> 44136071Sgreen#include <fcntl.h> 45234597Smelifaro#include <stddef.h> /* offsetof */ 4698943Sluigi 47169424Smaxim#include <net/ethernet.h> 48187983Sluigi#include <net/if.h> /* only IFNAMSIZ */ 4998943Sluigi#include <netinet/in.h> 50187983Sluigi#include <netinet/in_systm.h> /* only n_short, n_long */ 5198943Sluigi#include <netinet/ip.h> 5298943Sluigi#include <netinet/ip_icmp.h> 5398943Sluigi#include <netinet/ip_fw.h> 5498943Sluigi#include <netinet/tcp.h> 5598943Sluigi#include <arpa/inet.h> 5698943Sluigi 57187767Sluigistruct cmdline_opts co; /* global options */ 5898943Sluigi 59187767Sluigiint resvd_set_number = RESVD_SET; 60187764Sluigi 61234597Smelifaroint ipfw_socket = -1; 62234597Smelifaro 63234597Smelifaro#ifndef s6_addr32 64234597Smelifaro#define s6_addr32 __u6_addr.__u6_addr32 65234597Smelifaro#endif 66234597Smelifaro 67248505Smelifaro#define CHECK_LENGTH(v, len) do { \ 68248505Smelifaro if ((v) < (len)) \ 69248505Smelifaro errx(EX_DATAERR, "Rule too long"); \ 70248505Smelifaro } while (0) 71248505Smelifaro/* 72248505Smelifaro * Check if we have enough space in cmd buffer. Note that since 73248505Smelifaro * first 8? u32 words are reserved by reserved header, full cmd 74248505Smelifaro * buffer can't be used, so we need to protect from buffer overrun 75248505Smelifaro * only. At the beginnig, cblen is less than actual buffer size by 76248505Smelifaro * size of ipfw_insn_u32 instruction + 1 u32 work. This eliminates need 77248505Smelifaro * for checking small instructions fitting in given range. 78248505Smelifaro * We also (ab)use the fact that ipfw_insn is always the first field 79248505Smelifaro * for any custom instruction. 80248505Smelifaro */ 81248505Smelifaro#define CHECK_CMDLEN CHECK_LENGTH(cblen, F_LEN((ipfw_insn *)cmd)) 82248505Smelifaro 83159636Soleg#define GET_UINT_ARG(arg, min, max, tok, s_x) do { \ 84204591Sluigi if (!av[0]) \ 85159636Soleg errx(EX_USAGE, "%s: missing argument", match_value(s_x, tok)); \ 86159636Soleg if (_substrcmp(*av, "tablearg") == 0) { \ 87159636Soleg arg = IP_FW_TABLEARG; \ 88159636Soleg break; \ 89159636Soleg } \ 90159636Soleg \ 91159636Soleg { \ 92204591Sluigi long _xval; \ 93159636Soleg char *end; \ 94159636Soleg \ 95204591Sluigi _xval = strtol(*av, &end, 10); \ 96159636Soleg \ 97204591Sluigi if (!isdigit(**av) || *end != '\0' || (_xval == 0 && errno == EINVAL)) \ 98159636Soleg errx(EX_DATAERR, "%s: invalid argument: %s", \ 99159636Soleg match_value(s_x, tok), *av); \ 100159636Soleg \ 101204591Sluigi if (errno == ERANGE || _xval < min || _xval > max) \ 102159636Soleg errx(EX_DATAERR, "%s: argument is out of range (%u..%u): %s", \ 103159636Soleg match_value(s_x, tok), min, max, *av); \ 104159636Soleg \ 105204591Sluigi if (_xval == IP_FW_TABLEARG) \ 106159636Soleg errx(EX_DATAERR, "%s: illegal argument value: %s", \ 107159636Soleg match_value(s_x, tok), *av); \ 108204591Sluigi arg = _xval; \ 109159636Soleg } \ 110158879Soleg} while (0) 111158879Soleg 112187762Sluigistatic void 113187762SluigiPRINT_UINT_ARG(const char *str, uint32_t arg) 114187762Sluigi{ 115187762Sluigi if (str != NULL) 116187762Sluigi printf("%s",str); 117187762Sluigi if (arg == IP_FW_TABLEARG) 118187762Sluigi printf("tablearg"); 119187762Sluigi else 120187762Sluigi printf("%u", arg); 121187762Sluigi} 122159636Soleg 12398943Sluigistatic struct _s_x f_tcpflags[] = { 12498943Sluigi { "syn", TH_SYN }, 12598943Sluigi { "fin", TH_FIN }, 12698943Sluigi { "ack", TH_ACK }, 12798943Sluigi { "psh", TH_PUSH }, 12898943Sluigi { "rst", TH_RST }, 12998943Sluigi { "urg", TH_URG }, 13098943Sluigi { "tcp flag", 0 }, 13198943Sluigi { NULL, 0 } 13298943Sluigi}; 13398943Sluigi 13498943Sluigistatic struct _s_x f_tcpopts[] = { 13598943Sluigi { "mss", IP_FW_TCPOPT_MSS }, 13698943Sluigi { "maxseg", IP_FW_TCPOPT_MSS }, 13798943Sluigi { "window", IP_FW_TCPOPT_WINDOW }, 13898943Sluigi { "sack", IP_FW_TCPOPT_SACK }, 13998943Sluigi { "ts", IP_FW_TCPOPT_TS }, 14098943Sluigi { "timestamp", IP_FW_TCPOPT_TS }, 14198943Sluigi { "cc", IP_FW_TCPOPT_CC }, 14298943Sluigi { "tcp option", 0 }, 14398943Sluigi { NULL, 0 } 14498943Sluigi}; 14598943Sluigi 14698943Sluigi/* 14798943Sluigi * IP options span the range 0 to 255 so we need to remap them 14898943Sluigi * (though in fact only the low 5 bits are significant). 14998943Sluigi */ 15098943Sluigistatic struct _s_x f_ipopts[] = { 15198943Sluigi { "ssrr", IP_FW_IPOPT_SSRR}, 15298943Sluigi { "lsrr", IP_FW_IPOPT_LSRR}, 15398943Sluigi { "rr", IP_FW_IPOPT_RR}, 15498943Sluigi { "ts", IP_FW_IPOPT_TS}, 15598943Sluigi { "ip option", 0 }, 15698943Sluigi { NULL, 0 } 15798943Sluigi}; 15898943Sluigi 15998943Sluigistatic struct _s_x f_iptos[] = { 16098943Sluigi { "lowdelay", IPTOS_LOWDELAY}, 16198943Sluigi { "throughput", IPTOS_THROUGHPUT}, 16298943Sluigi { "reliability", IPTOS_RELIABILITY}, 16398943Sluigi { "mincost", IPTOS_MINCOST}, 164172801Srpaulo { "congestion", IPTOS_ECN_CE}, 165172801Srpaulo { "ecntransport", IPTOS_ECN_ECT0}, 16698943Sluigi { "ip tos option", 0}, 16798943Sluigi { NULL, 0 } 16898943Sluigi}; 16998943Sluigi 17098943Sluigistatic struct _s_x limit_masks[] = { 17198943Sluigi {"all", DYN_SRC_ADDR|DYN_SRC_PORT|DYN_DST_ADDR|DYN_DST_PORT}, 17298943Sluigi {"src-addr", DYN_SRC_ADDR}, 17398943Sluigi {"src-port", DYN_SRC_PORT}, 17498943Sluigi {"dst-addr", DYN_DST_ADDR}, 17598943Sluigi {"dst-port", DYN_DST_PORT}, 17698943Sluigi {NULL, 0} 17798943Sluigi}; 17898943Sluigi 17998943Sluigi/* 18098943Sluigi * we use IPPROTO_ETHERTYPE as a fake protocol id to call the print routines 18198943Sluigi * This is only used in this code. 18298943Sluigi */ 18398943Sluigi#define IPPROTO_ETHERTYPE 0x1000 18498943Sluigistatic struct _s_x ether_types[] = { 18598943Sluigi /* 18698943Sluigi * Note, we cannot use "-:&/" in the names because they are field 18798943Sluigi * separators in the type specifications. Also, we use s = NULL as 18898943Sluigi * end-delimiter, because a type of 0 can be legal. 18998943Sluigi */ 19098943Sluigi { "ip", 0x0800 }, 19198943Sluigi { "ipv4", 0x0800 }, 19298943Sluigi { "ipv6", 0x86dd }, 19398943Sluigi { "arp", 0x0806 }, 19498943Sluigi { "rarp", 0x8035 }, 19598943Sluigi { "vlan", 0x8100 }, 19698943Sluigi { "loop", 0x9000 }, 19798943Sluigi { "trail", 0x1000 }, 19898943Sluigi { "at", 0x809b }, 19998943Sluigi { "atalk", 0x809b }, 20098943Sluigi { "aarp", 0x80f3 }, 20198943Sluigi { "pppoe_disc", 0x8863 }, 20298943Sluigi { "pppoe_sess", 0x8864 }, 20398943Sluigi { "ipx_8022", 0x00E0 }, 20498943Sluigi { "ipx_8023", 0x0000 }, 20598943Sluigi { "ipx_ii", 0x8137 }, 20698943Sluigi { "ipx_snap", 0x8137 }, 20798943Sluigi { "ipx", 0x8137 }, 20898943Sluigi { "ns", 0x0600 }, 20998943Sluigi { NULL, 0 } 21098943Sluigi}; 21198943Sluigi 21298943Sluigi 213187769Sluigistatic struct _s_x rule_actions[] = { 21498943Sluigi { "accept", TOK_ACCEPT }, 21598943Sluigi { "pass", TOK_ACCEPT }, 21698943Sluigi { "allow", TOK_ACCEPT }, 21798943Sluigi { "permit", TOK_ACCEPT }, 21898943Sluigi { "count", TOK_COUNT }, 21998943Sluigi { "pipe", TOK_PIPE }, 22098943Sluigi { "queue", TOK_QUEUE }, 22198943Sluigi { "divert", TOK_DIVERT }, 22298943Sluigi { "tee", TOK_TEE }, 223141351Sglebius { "netgraph", TOK_NETGRAPH }, 224141351Sglebius { "ngtee", TOK_NGTEE }, 22598943Sluigi { "fwd", TOK_FORWARD }, 22698943Sluigi { "forward", TOK_FORWARD }, 22798943Sluigi { "skipto", TOK_SKIPTO }, 22898943Sluigi { "deny", TOK_DENY }, 22998943Sluigi { "drop", TOK_DENY }, 23098943Sluigi { "reject", TOK_REJECT }, 231149020Sbz { "reset6", TOK_RESET6 }, 23298943Sluigi { "reset", TOK_RESET }, 233149020Sbz { "unreach6", TOK_UNREACH6 }, 23499475Sluigi { "unreach", TOK_UNREACH }, 23598943Sluigi { "check-state", TOK_CHECKSTATE }, 236117469Sluigi { "//", TOK_COMMENT }, 237220802Sglebius { "nat", TOK_NAT }, 238190633Spiso { "reass", TOK_REASS }, 239178888Sjulian { "setfib", TOK_SETFIB }, 240223666Sae { "call", TOK_CALL }, 241223666Sae { "return", TOK_RETURN }, 242117328Sluigi { NULL, 0 } /* terminator */ 24398943Sluigi}; 24498943Sluigi 245187769Sluigistatic struct _s_x rule_action_params[] = { 246136071Sgreen { "altq", TOK_ALTQ }, 247136071Sgreen { "log", TOK_LOG }, 248158879Soleg { "tag", TOK_TAG }, 249158879Soleg { "untag", TOK_UNTAG }, 250136071Sgreen { NULL, 0 } /* terminator */ 251136071Sgreen}; 252136071Sgreen 253200567Sluigi/* 254200567Sluigi * The 'lookup' instruction accepts one of the following arguments. 255200567Sluigi * -1 is a terminator for the list. 256200567Sluigi * Arguments are passed as v[1] in O_DST_LOOKUP options. 257200567Sluigi */ 258200567Sluigistatic int lookup_key[] = { 259200567Sluigi TOK_DSTIP, TOK_SRCIP, TOK_DSTPORT, TOK_SRCPORT, 260205169Sluigi TOK_UID, TOK_JAIL, TOK_DSCP, -1 }; 261200567Sluigi 262187769Sluigistatic struct _s_x rule_options[] = { 263158879Soleg { "tagged", TOK_TAGGED }, 26498943Sluigi { "uid", TOK_UID }, 26598943Sluigi { "gid", TOK_GID }, 266133600Scsjp { "jail", TOK_JAIL }, 26798943Sluigi { "in", TOK_IN }, 26898943Sluigi { "limit", TOK_LIMIT }, 26998943Sluigi { "keep-state", TOK_KEEPSTATE }, 27098943Sluigi { "bridged", TOK_LAYER2 }, 27198943Sluigi { "layer2", TOK_LAYER2 }, 27298943Sluigi { "out", TOK_OUT }, 273136073Sgreen { "diverted", TOK_DIVERTED }, 274136073Sgreen { "diverted-loopback", TOK_DIVERTEDLOOPBACK }, 275136073Sgreen { "diverted-output", TOK_DIVERTEDOUTPUT }, 27698943Sluigi { "xmit", TOK_XMIT }, 27798943Sluigi { "recv", TOK_RECV }, 27898943Sluigi { "via", TOK_VIA }, 27998943Sluigi { "fragment", TOK_FRAG }, 28098943Sluigi { "frag", TOK_FRAG }, 281178888Sjulian { "fib", TOK_FIB }, 28298943Sluigi { "ipoptions", TOK_IPOPTS }, 28398943Sluigi { "ipopts", TOK_IPOPTS }, 28498943Sluigi { "iplen", TOK_IPLEN }, 28598943Sluigi { "ipid", TOK_IPID }, 28698943Sluigi { "ipprecedence", TOK_IPPRECEDENCE }, 287205169Sluigi { "dscp", TOK_DSCP }, 28898943Sluigi { "iptos", TOK_IPTOS }, 28998943Sluigi { "ipttl", TOK_IPTTL }, 29098943Sluigi { "ipversion", TOK_IPVER }, 29198943Sluigi { "ipver", TOK_IPVER }, 29298943Sluigi { "estab", TOK_ESTAB }, 29398943Sluigi { "established", TOK_ESTAB }, 29498943Sluigi { "setup", TOK_SETUP }, 295215179Sluigi { "sockarg", TOK_SOCKARG }, 296136075Sgreen { "tcpdatalen", TOK_TCPDATALEN }, 29798943Sluigi { "tcpflags", TOK_TCPFLAGS }, 29898943Sluigi { "tcpflgs", TOK_TCPFLAGS }, 29998943Sluigi { "tcpoptions", TOK_TCPOPTS }, 30098943Sluigi { "tcpopts", TOK_TCPOPTS }, 30198943Sluigi { "tcpseq", TOK_TCPSEQ }, 30298943Sluigi { "tcpack", TOK_TCPACK }, 30398943Sluigi { "tcpwin", TOK_TCPWIN }, 30499909Sluigi { "icmptype", TOK_ICMPTYPES }, 30598943Sluigi { "icmptypes", TOK_ICMPTYPES }, 306102087Sluigi { "dst-ip", TOK_DSTIP }, 307102087Sluigi { "src-ip", TOK_SRCIP }, 308102087Sluigi { "dst-port", TOK_DSTPORT }, 309102087Sluigi { "src-port", TOK_SRCPORT }, 310102087Sluigi { "proto", TOK_PROTO }, 311102087Sluigi { "MAC", TOK_MAC }, 312102087Sluigi { "mac", TOK_MAC }, 313102087Sluigi { "mac-type", TOK_MACTYPE }, 314112250Scjc { "verrevpath", TOK_VERREVPATH }, 315128575Sandre { "versrcreach", TOK_VERSRCREACH }, 316133387Sandre { "antispoof", TOK_ANTISPOOF }, 317117241Sluigi { "ipsec", TOK_IPSEC }, 318145246Sbrooks { "icmp6type", TOK_ICMP6TYPES }, 319145246Sbrooks { "icmp6types", TOK_ICMP6TYPES }, 320145246Sbrooks { "ext6hdr", TOK_EXT6HDR}, 321145246Sbrooks { "flow-id", TOK_FLOWID}, 322145246Sbrooks { "ipv6", TOK_IPV6}, 323145246Sbrooks { "ip6", TOK_IPV6}, 324146894Smlaier { "ipv4", TOK_IPV4}, 325146894Smlaier { "ip4", TOK_IPV4}, 326145246Sbrooks { "dst-ipv6", TOK_DSTIP6}, 327145246Sbrooks { "dst-ip6", TOK_DSTIP6}, 328145246Sbrooks { "src-ipv6", TOK_SRCIP6}, 329145246Sbrooks { "src-ip6", TOK_SRCIP6}, 330200567Sluigi { "lookup", TOK_LOOKUP}, 331117469Sluigi { "//", TOK_COMMENT }, 33298943Sluigi 33398943Sluigi { "not", TOK_NOT }, /* pseudo option */ 33498943Sluigi { "!", /* escape ? */ TOK_NOT }, /* pseudo option */ 33598943Sluigi { "or", TOK_OR }, /* pseudo option */ 33698943Sluigi { "|", /* escape */ TOK_OR }, /* pseudo option */ 337101641Sluigi { "{", TOK_STARTBRACE }, /* pseudo option */ 338101641Sluigi { "(", TOK_STARTBRACE }, /* pseudo option */ 339101641Sluigi { "}", TOK_ENDBRACE }, /* pseudo option */ 340101641Sluigi { ")", TOK_ENDBRACE }, /* pseudo option */ 341117328Sluigi { NULL, 0 } /* terminator */ 34298943Sluigi}; 34398943Sluigi 344206843Sluigi/* 345206843Sluigi * Helper routine to print a possibly unaligned uint64_t on 346206843Sluigi * various platform. If width > 0, print the value with 347206843Sluigi * the desired width, followed by a space; 348206843Sluigi * otherwise, return the required width. 349187787Sluigi */ 350206843Sluigiint 351206843Sluigipr_u64(uint64_t *pd, int width) 352187787Sluigi{ 353206843Sluigi#ifdef TCC 354206843Sluigi#define U64_FMT "I64" 355206843Sluigi#else 356206843Sluigi#define U64_FMT "llu" 357206843Sluigi#endif 358206846Sluigi uint64_t u; 359206846Sluigi unsigned long long d; 360115793Sticso 361206846Sluigi bcopy (pd, &u, sizeof(u)); 362206846Sluigi d = u; 363206843Sluigi return (width > 0) ? 364206843Sluigi printf("%*" U64_FMT " ", width, d) : 365206843Sluigi snprintf(NULL, 0, "%" U64_FMT, d) ; 366206843Sluigi#undef U64_FMT 367129389Sstefanf} 368115793Sticso 369187767Sluigivoid * 370187716Sluigisafe_calloc(size_t number, size_t size) 371187716Sluigi{ 372187716Sluigi void *ret = calloc(number, size); 373187716Sluigi 374187716Sluigi if (ret == NULL) 375187716Sluigi err(EX_OSERR, "calloc"); 376187716Sluigi return ret; 377187716Sluigi} 378187716Sluigi 379187767Sluigivoid * 380187716Sluigisafe_realloc(void *ptr, size_t size) 381187716Sluigi{ 382187716Sluigi void *ret = realloc(ptr, size); 383187716Sluigi 384187716Sluigi if (ret == NULL) 385187716Sluigi err(EX_OSERR, "realloc"); 386187716Sluigi return ret; 387187716Sluigi} 388187716Sluigi 389117328Sluigi/* 390117328Sluigi * conditionally runs the command. 391204591Sluigi * Selected options or negative -> getsockopt 392117328Sluigi */ 393187769Sluigiint 394119740Stmmdo_cmd(int optname, void *optval, uintptr_t optlen) 395117328Sluigi{ 396117328Sluigi int i; 397117577Sluigi 398187764Sluigi if (co.test_only) 399117328Sluigi return 0; 400117328Sluigi 401234597Smelifaro if (ipfw_socket == -1) 402234597Smelifaro ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW); 403234597Smelifaro if (ipfw_socket < 0) 404117328Sluigi err(EX_UNAVAILABLE, "socket"); 405117328Sluigi 406117328Sluigi if (optname == IP_FW_GET || optname == IP_DUMMYNET_GET || 407234597Smelifaro optname == IP_FW_ADD || optname == IP_FW3 || 408220802Sglebius optname == IP_FW_NAT_GET_CONFIG || 409204591Sluigi optname < 0 || 410204591Sluigi optname == IP_FW_NAT_GET_LOG) { 411204591Sluigi if (optname < 0) 412204591Sluigi optname = -optname; 413234597Smelifaro i = getsockopt(ipfw_socket, IPPROTO_IP, optname, optval, 414117328Sluigi (socklen_t *)optlen); 415204591Sluigi } else { 416234597Smelifaro i = setsockopt(ipfw_socket, IPPROTO_IP, optname, optval, optlen); 417204591Sluigi } 418117328Sluigi return i; 419117328Sluigi} 420117328Sluigi 421234597Smelifaro/* 422234597Smelifaro * do_setcmd3 - pass ipfw control cmd to kernel 423234597Smelifaro * @optname: option name 424234597Smelifaro * @optval: pointer to option data 425234597Smelifaro * @optlen: option length 426234597Smelifaro * 427234597Smelifaro * Function encapsulates option value in IP_FW3 socket option 428234597Smelifaro * and calls setsockopt(). 429234597Smelifaro * Function returns 0 on success or -1 otherwise. 430234597Smelifaro */ 431234597Smelifaroint 432234597Smelifarodo_setcmd3(int optname, void *optval, socklen_t optlen) 433234597Smelifaro{ 434234597Smelifaro socklen_t len; 435234597Smelifaro ip_fw3_opheader *op3; 436234597Smelifaro 437234597Smelifaro if (co.test_only) 438234597Smelifaro return (0); 439234597Smelifaro 440234597Smelifaro if (ipfw_socket == -1) 441234597Smelifaro ipfw_socket = socket(AF_INET, SOCK_RAW, IPPROTO_RAW); 442234597Smelifaro if (ipfw_socket < 0) 443234597Smelifaro err(EX_UNAVAILABLE, "socket"); 444234597Smelifaro 445234597Smelifaro len = sizeof(ip_fw3_opheader) + optlen; 446234597Smelifaro op3 = alloca(len); 447234597Smelifaro /* Zero reserved fields */ 448234597Smelifaro memset(op3, 0, sizeof(ip_fw3_opheader)); 449234597Smelifaro memcpy(op3 + 1, optval, optlen); 450234597Smelifaro op3->opcode = optname; 451234597Smelifaro 452234597Smelifaro return setsockopt(ipfw_socket, IPPROTO_IP, IP_FW3, op3, len); 453234597Smelifaro} 454234597Smelifaro 45598943Sluigi/** 45698943Sluigi * match_token takes a table and a string, returns the value associated 457117328Sluigi * with the string (-1 in case of failure). 45898943Sluigi */ 459187769Sluigiint 46098943Sluigimatch_token(struct _s_x *table, char *string) 46198943Sluigi{ 46298943Sluigi struct _s_x *pt; 463117469Sluigi uint i = strlen(string); 46498943Sluigi 46598943Sluigi for (pt = table ; i && pt->s != NULL ; pt++) 46698943Sluigi if (strlen(pt->s) == i && !bcmp(string, pt->s, i)) 46798943Sluigi return pt->x; 46898943Sluigi return -1; 469129389Sstefanf} 47098943Sluigi 471117328Sluigi/** 472117328Sluigi * match_value takes a table and a value, returns the string associated 473117328Sluigi * with the value (NULL in case of failure). 474117328Sluigi */ 475187770Sluigichar const * 476117469Sluigimatch_value(struct _s_x *p, int value) 47798943Sluigi{ 47898943Sluigi for (; p->s != NULL; p++) 47998943Sluigi if (p->x == value) 48098943Sluigi return p->s; 48198943Sluigi return NULL; 48298943Sluigi} 48398943Sluigi 48498943Sluigi/* 485140271Sbrooks * _substrcmp takes two strings and returns 1 if they do not match, 486140271Sbrooks * and 0 if they match exactly or the first string is a sub-string 487140271Sbrooks * of the second. A warning is printed to stderr in the case that the 488140271Sbrooks * first string is a sub-string of the second. 489140271Sbrooks * 490140271Sbrooks * This function will be removed in the future through the usual 491140271Sbrooks * deprecation process. 492140271Sbrooks */ 493187767Sluigiint 494140271Sbrooks_substrcmp(const char *str1, const char* str2) 495140271Sbrooks{ 496220804Sglebius 497140271Sbrooks if (strncmp(str1, str2, strlen(str1)) != 0) 498140271Sbrooks return 1; 499140271Sbrooks 500140271Sbrooks if (strlen(str1) != strlen(str2)) 501140271Sbrooks warnx("DEPRECATED: '%s' matched '%s' as a sub-string", 502140271Sbrooks str1, str2); 503140271Sbrooks return 0; 504140271Sbrooks} 505140271Sbrooks 506140271Sbrooks/* 507140271Sbrooks * _substrcmp2 takes three strings and returns 1 if the first two do not match, 508140271Sbrooks * and 0 if they match exactly or the second string is a sub-string 509140271Sbrooks * of the first. A warning is printed to stderr in the case that the 510140271Sbrooks * first string does not match the third. 511140271Sbrooks * 512140271Sbrooks * This function exists to warn about the bizzare construction 513140271Sbrooks * strncmp(str, "by", 2) which is used to allow people to use a shotcut 514140271Sbrooks * for "bytes". The problem is that in addition to accepting "by", 515140271Sbrooks * "byt", "byte", and "bytes", it also excepts "by_rabid_dogs" and any 516140271Sbrooks * other string beginning with "by". 517140271Sbrooks * 518140271Sbrooks * This function will be removed in the future through the usual 519140271Sbrooks * deprecation process. 520140271Sbrooks */ 521187769Sluigiint 522140271Sbrooks_substrcmp2(const char *str1, const char* str2, const char* str3) 523140271Sbrooks{ 524220804Sglebius 525140271Sbrooks if (strncmp(str1, str2, strlen(str2)) != 0) 526140271Sbrooks return 1; 527140271Sbrooks 528140271Sbrooks if (strcmp(str1, str3) != 0) 529140271Sbrooks warnx("DEPRECATED: '%s' matched '%s'", 530140271Sbrooks str1, str3); 531140271Sbrooks return 0; 532140271Sbrooks} 533140271Sbrooks 534140271Sbrooks/* 53598943Sluigi * prints one port, symbolic or numeric 53698943Sluigi */ 53798943Sluigistatic void 538117328Sluigiprint_port(int proto, uint16_t port) 53998943Sluigi{ 54098943Sluigi 54198943Sluigi if (proto == IPPROTO_ETHERTYPE) { 542117469Sluigi char const *s; 54398943Sluigi 544187764Sluigi if (co.do_resolv && (s = match_value(ether_types, port)) ) 54598943Sluigi printf("%s", s); 54698943Sluigi else 54798943Sluigi printf("0x%04x", port); 54898943Sluigi } else { 54998943Sluigi struct servent *se = NULL; 550187764Sluigi if (co.do_resolv) { 55198943Sluigi struct protoent *pe = getprotobynumber(proto); 55298943Sluigi 55398943Sluigi se = getservbyport(htons(port), pe ? pe->p_name : NULL); 55498943Sluigi } 55598943Sluigi if (se) 55698943Sluigi printf("%s", se->s_name); 55798943Sluigi else 55898943Sluigi printf("%d", port); 55998943Sluigi } 56098943Sluigi} 56198943Sluigi 562187769Sluigistatic struct _s_x _port_name[] = { 563117328Sluigi {"dst-port", O_IP_DSTPORT}, 564117328Sluigi {"src-port", O_IP_SRCPORT}, 565117328Sluigi {"ipid", O_IPID}, 566117328Sluigi {"iplen", O_IPLEN}, 567117328Sluigi {"ipttl", O_IPTTL}, 568117328Sluigi {"mac-type", O_MAC_TYPE}, 569136075Sgreen {"tcpdatalen", O_TCPDATALEN}, 570234278Sglebius {"tcpwin", O_TCPWIN}, 571158879Soleg {"tagged", O_TAGGED}, 572117328Sluigi {NULL, 0} 573117328Sluigi}; 574117328Sluigi 57598943Sluigi/* 576117328Sluigi * Print the values in a list 16-bit items of the types above. 57798943Sluigi * XXX todo: add support for mask. 57898943Sluigi */ 57998943Sluigistatic void 580102087Sluigiprint_newports(ipfw_insn_u16 *cmd, int proto, int opcode) 58198943Sluigi{ 582117328Sluigi uint16_t *p = cmd->ports; 58398943Sluigi int i; 584117469Sluigi char const *sep; 58598943Sluigi 586116690Sluigi if (opcode != 0) { 587117328Sluigi sep = match_value(_port_name, opcode); 588117328Sluigi if (sep == NULL) 589116690Sluigi sep = "???"; 590116690Sluigi printf (" %s", sep); 591116690Sluigi } 592116690Sluigi sep = " "; 59398943Sluigi for (i = F_LEN((ipfw_insn *)cmd) - 1; i > 0; i--, p += 2) { 594193702Sluigi printf("%s", sep); 59598943Sluigi print_port(proto, p[0]); 59698943Sluigi if (p[0] != p[1]) { 59798943Sluigi printf("-"); 59898943Sluigi print_port(proto, p[1]); 59998943Sluigi } 60098943Sluigi sep = ","; 60198943Sluigi } 60298943Sluigi} 60398943Sluigi 60498943Sluigi/* 60598943Sluigi * Like strtol, but also translates service names into port numbers 60698943Sluigi * for some protocols. 60798943Sluigi * In particular: 60898943Sluigi * proto == -1 disables the protocol check; 60998943Sluigi * proto == IPPROTO_ETHERTYPE looks up an internal table 61098943Sluigi * proto == <some value in /etc/protocols> matches the values there. 611101628Sluigi * Returns *end == s in case the parameter is not found. 61298943Sluigi */ 61398943Sluigistatic int 61498943Sluigistrtoport(char *s, char **end, int base, int proto) 61598943Sluigi{ 616101628Sluigi char *p, *buf; 617101628Sluigi char *s1; 61898943Sluigi int i; 61998943Sluigi 620101628Sluigi *end = s; /* default - not found */ 621117577Sluigi if (*s == '\0') 622101628Sluigi return 0; /* not found */ 623106505Smaxim 62498943Sluigi if (isdigit(*s)) 62598943Sluigi return strtol(s, end, base); 62698943Sluigi 62798943Sluigi /* 628101628Sluigi * find separator. '\\' escapes the next char. 62998943Sluigi */ 630101628Sluigi for (s1 = s; *s1 && (isalnum(*s1) || *s1 == '\\') ; s1++) 631101628Sluigi if (*s1 == '\\' && s1[1] != '\0') 632101628Sluigi s1++; 63398943Sluigi 634187716Sluigi buf = safe_calloc(s1 - s + 1, 1); 635101628Sluigi 636101628Sluigi /* 637101628Sluigi * copy into a buffer skipping backslashes 638101628Sluigi */ 639101628Sluigi for (p = s, i = 0; p != s1 ; p++) 640117577Sluigi if (*p != '\\') 641101628Sluigi buf[i++] = *p; 642101628Sluigi buf[i++] = '\0'; 643101628Sluigi 64498943Sluigi if (proto == IPPROTO_ETHERTYPE) { 645101628Sluigi i = match_token(ether_types, buf); 646101628Sluigi free(buf); 647101628Sluigi if (i != -1) { /* found */ 64898943Sluigi *end = s1; 64998943Sluigi return i; 65098943Sluigi } 65198943Sluigi } else { 65298943Sluigi struct protoent *pe = NULL; 65398943Sluigi struct servent *se; 65498943Sluigi 65598943Sluigi if (proto != 0) 65698943Sluigi pe = getprotobynumber(proto); 65798943Sluigi setservent(1); 658101628Sluigi se = getservbyname(buf, pe ? pe->p_name : NULL); 659101628Sluigi free(buf); 66098943Sluigi if (se != NULL) { 66198943Sluigi *end = s1; 66298943Sluigi return ntohs(se->s_port); 66398943Sluigi } 66498943Sluigi } 665101628Sluigi return 0; /* not found */ 66698943Sluigi} 66798943Sluigi 66898943Sluigi/* 669117328Sluigi * Fill the body of the command with the list of port ranges. 67098943Sluigi */ 67198943Sluigistatic int 672248505Smelifarofill_newports(ipfw_insn_u16 *cmd, char *av, int proto, int cblen) 67398943Sluigi{ 674117328Sluigi uint16_t a, b, *p = cmd->ports; 67598943Sluigi int i = 0; 676102087Sluigi char *s = av; 67798943Sluigi 678102087Sluigi while (*s) { 67998943Sluigi a = strtoport(av, &s, 0, proto); 680159636Soleg if (s == av) /* empty or invalid argument */ 681159636Soleg return (0); 682159636Soleg 683248505Smelifaro CHECK_LENGTH(cblen, i + 2); 684248505Smelifaro 685159636Soleg switch (*s) { 686159636Soleg case '-': /* a range */ 687159636Soleg av = s + 1; 68898943Sluigi b = strtoport(av, &s, 0, proto); 689159636Soleg /* Reject expressions like '1-abc' or '1-2-3'. */ 690159636Soleg if (s == av || (*s != ',' && *s != '\0')) 691159636Soleg return (0); 69298943Sluigi p[0] = a; 69398943Sluigi p[1] = b; 694159636Soleg break; 695159636Soleg case ',': /* comma separated list */ 696159636Soleg case '\0': 69798943Sluigi p[0] = p[1] = a; 698159636Soleg break; 699159636Soleg default: 700159636Soleg warnx("port list: invalid separator <%c> in <%s>", 701101978Sluigi *s, av); 702159636Soleg return (0); 703159636Soleg } 704159636Soleg 705102087Sluigi i++; 706102087Sluigi p += 2; 707159636Soleg av = s + 1; 70898943Sluigi } 70998943Sluigi if (i > 0) { 710159636Soleg if (i + 1 > F_LEN_MASK) 711102087Sluigi errx(EX_DATAERR, "too many ports/ranges\n"); 712159636Soleg cmd->o.len |= i + 1; /* leave F_NOT and F_OR untouched */ 71398943Sluigi } 714159636Soleg return (i); 71598943Sluigi} 71698943Sluigi 71798943Sluigistatic struct _s_x icmpcodes[] = { 71898943Sluigi { "net", ICMP_UNREACH_NET }, 71998943Sluigi { "host", ICMP_UNREACH_HOST }, 72098943Sluigi { "protocol", ICMP_UNREACH_PROTOCOL }, 72198943Sluigi { "port", ICMP_UNREACH_PORT }, 72298943Sluigi { "needfrag", ICMP_UNREACH_NEEDFRAG }, 72398943Sluigi { "srcfail", ICMP_UNREACH_SRCFAIL }, 72498943Sluigi { "net-unknown", ICMP_UNREACH_NET_UNKNOWN }, 72598943Sluigi { "host-unknown", ICMP_UNREACH_HOST_UNKNOWN }, 72698943Sluigi { "isolated", ICMP_UNREACH_ISOLATED }, 72798943Sluigi { "net-prohib", ICMP_UNREACH_NET_PROHIB }, 72898943Sluigi { "host-prohib", ICMP_UNREACH_HOST_PROHIB }, 72998943Sluigi { "tosnet", ICMP_UNREACH_TOSNET }, 73098943Sluigi { "toshost", ICMP_UNREACH_TOSHOST }, 73198943Sluigi { "filter-prohib", ICMP_UNREACH_FILTER_PROHIB }, 73298943Sluigi { "host-precedence", ICMP_UNREACH_HOST_PRECEDENCE }, 73398943Sluigi { "precedence-cutoff", ICMP_UNREACH_PRECEDENCE_CUTOFF }, 73498943Sluigi { NULL, 0 } 73598943Sluigi}; 73698943Sluigi 73798943Sluigistatic void 73898943Sluigifill_reject_code(u_short *codep, char *str) 73998943Sluigi{ 74098943Sluigi int val; 74198943Sluigi char *s; 74298943Sluigi 74398943Sluigi val = strtoul(str, &s, 0); 74498943Sluigi if (s == str || *s != '\0' || val >= 0x100) 74598943Sluigi val = match_token(icmpcodes, str); 746102087Sluigi if (val < 0) 74798943Sluigi errx(EX_DATAERR, "unknown ICMP unreachable code ``%s''", str); 74898943Sluigi *codep = val; 74998943Sluigi return; 75098943Sluigi} 75198943Sluigi 75298943Sluigistatic void 753117328Sluigiprint_reject_code(uint16_t code) 75498943Sluigi{ 755117469Sluigi char const *s = match_value(icmpcodes, code); 75698943Sluigi 75798943Sluigi if (s != NULL) 75899475Sluigi printf("unreach %s", s); 75998943Sluigi else 76099475Sluigi printf("unreach %u", code); 76198943Sluigi} 76298943Sluigi 76398943Sluigi/* 76498943Sluigi * Returns the number of bits set (from left) in a contiguous bitmask, 76598943Sluigi * or -1 if the mask is not contiguous. 76698943Sluigi * XXX this needs a proper fix. 76798943Sluigi * This effectively works on masks in big-endian (network) format. 76898943Sluigi * when compiled on little endian architectures. 76998943Sluigi * 77098943Sluigi * First bit is bit 7 of the first byte -- note, for MAC addresses, 77198943Sluigi * the first bit on the wire is bit 0 of the first byte. 77298943Sluigi * len is the max length in bits. 77398943Sluigi */ 774187770Sluigiint 775117577Sluigicontigmask(uint8_t *p, int len) 77698943Sluigi{ 77798943Sluigi int i, n; 778117577Sluigi 77998943Sluigi for (i=0; i<len ; i++) 78098943Sluigi if ( (p[i/8] & (1 << (7 - (i%8)))) == 0) /* first bit unset */ 78198943Sluigi break; 78298943Sluigi for (n=i+1; n < len; n++) 78398943Sluigi if ( (p[n/8] & (1 << (7 - (n%8)))) != 0) 78498943Sluigi return -1; /* mask not contiguous */ 78598943Sluigi return i; 78698943Sluigi} 78798943Sluigi 78898943Sluigi/* 78998943Sluigi * print flags set/clear in the two bitmasks passed as parameters. 79098943Sluigi * There is a specialized check for f_tcpflags. 79198943Sluigi */ 79298943Sluigistatic void 793117469Sluigiprint_flags(char const *name, ipfw_insn *cmd, struct _s_x *list) 79498943Sluigi{ 795117469Sluigi char const *comma = ""; 79698943Sluigi int i; 797117577Sluigi uint8_t set = cmd->arg1 & 0xff; 798117577Sluigi uint8_t clear = (cmd->arg1 >> 8) & 0xff; 79998943Sluigi 80098943Sluigi if (list == f_tcpflags && set == TH_SYN && clear == TH_ACK) { 80198943Sluigi printf(" setup"); 80298943Sluigi return; 80398943Sluigi } 80498943Sluigi 80598943Sluigi printf(" %s ", name); 80698943Sluigi for (i=0; list[i].x != 0; i++) { 80798943Sluigi if (set & list[i].x) { 80898943Sluigi set &= ~list[i].x; 80998943Sluigi printf("%s%s", comma, list[i].s); 81098943Sluigi comma = ","; 81198943Sluigi } 81298943Sluigi if (clear & list[i].x) { 81398943Sluigi clear &= ~list[i].x; 81498943Sluigi printf("%s!%s", comma, list[i].s); 81598943Sluigi comma = ","; 81698943Sluigi } 81798943Sluigi } 81898943Sluigi} 81998943Sluigi 82098943Sluigi/* 82198943Sluigi * Print the ip address contained in a command. 82298943Sluigi */ 82398943Sluigistatic void 824117469Sluigiprint_ip(ipfw_insn_ip *cmd, char const *s) 82598943Sluigi{ 82698943Sluigi struct hostent *he = NULL; 827204591Sluigi uint32_t len = F_LEN((ipfw_insn *)cmd); 828117328Sluigi uint32_t *a = ((ipfw_insn_u32 *)cmd)->d; 82998943Sluigi 830200567Sluigi if (cmd->o.opcode == O_IP_DST_LOOKUP && len > F_INSN_SIZE(ipfw_insn_u32)) { 831200567Sluigi uint32_t d = a[1]; 832200567Sluigi const char *arg = "<invalid>"; 833200567Sluigi 834200567Sluigi if (d < sizeof(lookup_key)/sizeof(lookup_key[0])) 835200567Sluigi arg = match_value(rule_options, lookup_key[d]); 836200567Sluigi printf("%s lookup %s %d", cmd->o.len & F_NOT ? " not": "", 837200567Sluigi arg, cmd->o.arg1); 838200567Sluigi return; 839200567Sluigi } 840102087Sluigi printf("%s%s ", cmd->o.len & F_NOT ? " not": "", s); 84198943Sluigi 84298943Sluigi if (cmd->o.opcode == O_IP_SRC_ME || cmd->o.opcode == O_IP_DST_ME) { 84398943Sluigi printf("me"); 84498943Sluigi return; 84598943Sluigi } 846130281Sru if (cmd->o.opcode == O_IP_SRC_LOOKUP || 847130281Sru cmd->o.opcode == O_IP_DST_LOOKUP) { 848130281Sru printf("table(%u", ((ipfw_insn *)cmd)->arg1); 849130281Sru if (len == F_INSN_SIZE(ipfw_insn_u32)) 850130281Sru printf(",%u", *a); 851130281Sru printf(")"); 852130281Sru return; 853130281Sru } 85498943Sluigi if (cmd->o.opcode == O_IP_SRC_SET || cmd->o.opcode == O_IP_DST_SET) { 855117328Sluigi uint32_t x, *map = (uint32_t *)&(cmd->mask); 856116716Sluigi int i, j; 85798943Sluigi char comma = '{'; 85898943Sluigi 85998943Sluigi x = cmd->o.arg1 - 1; 86098943Sluigi x = htonl( ~x ); 86198943Sluigi cmd->addr.s_addr = htonl(cmd->addr.s_addr); 86298943Sluigi printf("%s/%d", inet_ntoa(cmd->addr), 863117577Sluigi contigmask((uint8_t *)&x, 32)); 86498943Sluigi x = cmd->addr.s_addr = htonl(cmd->addr.s_addr); 86598943Sluigi x &= 0xff; /* base */ 866116716Sluigi /* 867116716Sluigi * Print bits and ranges. 868116716Sluigi * Locate first bit set (i), then locate first bit unset (j). 869116716Sluigi * If we have 3+ consecutive bits set, then print them as a 870116716Sluigi * range, otherwise only print the initial bit and rescan. 871116716Sluigi */ 87298943Sluigi for (i=0; i < cmd->o.arg1; i++) 873117328Sluigi if (map[i/32] & (1<<(i & 31))) { 874116716Sluigi for (j=i+1; j < cmd->o.arg1; j++) 875117328Sluigi if (!(map[ j/32] & (1<<(j & 31)))) 876116716Sluigi break; 87798943Sluigi printf("%c%d", comma, i+x); 878116716Sluigi if (j>i+2) { /* range has at least 3 elements */ 879116716Sluigi printf("-%d", j-1+x); 880116716Sluigi i = j-1; 881116716Sluigi } 88298943Sluigi comma = ','; 88398943Sluigi } 88498943Sluigi printf("}"); 88598943Sluigi return; 88698943Sluigi } 887117328Sluigi /* 888117328Sluigi * len == 2 indicates a single IP, whereas lists of 1 or more 889117328Sluigi * addr/mask pairs have len = (2n+1). We convert len to n so we 890117328Sluigi * use that to count the number of entries. 891117328Sluigi */ 892117328Sluigi for (len = len / 2; len > 0; len--, a += 2) { 893117328Sluigi int mb = /* mask length */ 894117328Sluigi (cmd->o.opcode == O_IP_SRC || cmd->o.opcode == O_IP_DST) ? 895117577Sluigi 32 : contigmask((uint8_t *)&(a[1]), 32); 896187764Sluigi if (mb == 32 && co.do_resolv) 897117328Sluigi he = gethostbyaddr((char *)&(a[0]), sizeof(u_long), AF_INET); 89898943Sluigi if (he != NULL) /* resolved to name */ 89998943Sluigi printf("%s", he->h_name); 90098943Sluigi else if (mb == 0) /* any */ 90198943Sluigi printf("any"); 90298943Sluigi else { /* numeric IP followed by some kind of mask */ 903117328Sluigi printf("%s", inet_ntoa( *((struct in_addr *)&a[0]) ) ); 90498943Sluigi if (mb < 0) 905117328Sluigi printf(":%s", inet_ntoa( *((struct in_addr *)&a[1]) ) ); 90698943Sluigi else if (mb < 32) 90798943Sluigi printf("/%d", mb); 90898943Sluigi } 909117328Sluigi if (len > 1) 910117328Sluigi printf(","); 911117328Sluigi } 91298943Sluigi} 91398943Sluigi 91498943Sluigi/* 91598943Sluigi * prints a MAC address/mask pair 91698943Sluigi */ 91798943Sluigistatic void 918117577Sluigiprint_mac(uint8_t *addr, uint8_t *mask) 91998943Sluigi{ 92098943Sluigi int l = contigmask(mask, 48); 92198943Sluigi 92298943Sluigi if (l == 0) 92398943Sluigi printf(" any"); 92498943Sluigi else { 92598943Sluigi printf(" %02x:%02x:%02x:%02x:%02x:%02x", 92698943Sluigi addr[0], addr[1], addr[2], addr[3], addr[4], addr[5]); 92798943Sluigi if (l == -1) 92898943Sluigi printf("&%02x:%02x:%02x:%02x:%02x:%02x", 92998943Sluigi mask[0], mask[1], mask[2], 93098943Sluigi mask[3], mask[4], mask[5]); 93198943Sluigi else if (l < 48) 93298943Sluigi printf("/%d", l); 93398943Sluigi } 93498943Sluigi} 93598943Sluigi 93699475Sluigistatic void 93799475Sluigifill_icmptypes(ipfw_insn_u32 *cmd, char *av) 93899475Sluigi{ 939117328Sluigi uint8_t type; 94098943Sluigi 94199475Sluigi cmd->d[0] = 0; 94299475Sluigi while (*av) { 94399475Sluigi if (*av == ',') 94499475Sluigi av++; 94599475Sluigi 94699475Sluigi type = strtoul(av, &av, 0); 94799475Sluigi 94899475Sluigi if (*av != ',' && *av != '\0') 94999475Sluigi errx(EX_DATAERR, "invalid ICMP type"); 95099475Sluigi 95199475Sluigi if (type > 31) 95299475Sluigi errx(EX_DATAERR, "ICMP type out of range"); 95399475Sluigi 95499475Sluigi cmd->d[0] |= 1 << type; 95599475Sluigi } 95699475Sluigi cmd->o.opcode = O_ICMPTYPE; 95799475Sluigi cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32); 95899475Sluigi} 95999475Sluigi 96099475Sluigistatic void 96199475Sluigiprint_icmptypes(ipfw_insn_u32 *cmd) 96299475Sluigi{ 96399475Sluigi int i; 96499475Sluigi char sep= ' '; 96599475Sluigi 96699475Sluigi printf(" icmptypes"); 96799475Sluigi for (i = 0; i < 32; i++) { 96899475Sluigi if ( (cmd->d[0] & (1 << (i))) == 0) 96999475Sluigi continue; 97099475Sluigi printf("%c%d", sep, i); 97199475Sluigi sep = ','; 97299475Sluigi } 97399475Sluigi} 97499475Sluigi 97598943Sluigi/* 97698943Sluigi * show_ipfw() prints the body of an ipfw rule. 97798943Sluigi * Because the standard rule has at least proto src_ip dst_ip, we use 97898943Sluigi * a helper function to produce these entries if not provided explicitly. 979102087Sluigi * The first argument is the list of fields we have, the second is 980102087Sluigi * the list of fields we want to be printed. 981101978Sluigi * 982102087Sluigi * Special cases if we have provided a MAC header: 983102087Sluigi * + if the rule does not contain IP addresses/ports, do not print them; 984102087Sluigi * + if the rule does not contain an IP proto, print "all" instead of "ip"; 985102087Sluigi * 986102087Sluigi * Once we have 'have_options', IP header fields are printed as options. 98798943Sluigi */ 988101978Sluigi#define HAVE_PROTO 0x0001 989101978Sluigi#define HAVE_SRCIP 0x0002 990101978Sluigi#define HAVE_DSTIP 0x0004 991169139Smaxim#define HAVE_PROTO4 0x0008 992169139Smaxim#define HAVE_PROTO6 0x0010 993205179Sluigi#define HAVE_IP 0x0100 994102087Sluigi#define HAVE_OPTIONS 0x8000 99598943Sluigi 99698943Sluigistatic void 997187477Sluigishow_prerequisites(int *flags, int want, int cmd __unused) 99898943Sluigi{ 999187764Sluigi if (co.comment_only) 1000123495Sluigi return; 1001102087Sluigi if ( (*flags & HAVE_IP) == HAVE_IP) 1002102087Sluigi *flags |= HAVE_OPTIONS; 1003102087Sluigi 1004102087Sluigi if ( !(*flags & HAVE_OPTIONS)) { 1005187477Sluigi if ( !(*flags & HAVE_PROTO) && (want & HAVE_PROTO)) { 1006146894Smlaier if ( (*flags & HAVE_PROTO4)) 1007146894Smlaier printf(" ip4"); 1008146894Smlaier else if ( (*flags & HAVE_PROTO6)) 1009146894Smlaier printf(" ip6"); 1010146894Smlaier else 1011146894Smlaier printf(" ip"); 1012187477Sluigi } 1013102087Sluigi if ( !(*flags & HAVE_SRCIP) && (want & HAVE_SRCIP)) 1014102087Sluigi printf(" from any"); 1015102087Sluigi if ( !(*flags & HAVE_DSTIP) && (want & HAVE_DSTIP)) 1016102087Sluigi printf(" to any"); 1017102087Sluigi } 101898943Sluigi *flags |= want; 101998943Sluigi} 102098943Sluigi 102198943Sluigistatic void 1022112189Smaximshow_ipfw(struct ip_fw *rule, int pcwidth, int bcwidth) 102398943Sluigi{ 1024107291Skeramida static int twidth = 0; 102598943Sluigi int l; 1026158879Soleg ipfw_insn *cmd, *tagptr = NULL; 1027187477Sluigi const char *comment = NULL; /* ptr to comment if we have one */ 102898943Sluigi int proto = 0; /* default */ 102998943Sluigi int flags = 0; /* prerequisites */ 103098943Sluigi ipfw_insn_log *logptr = NULL; /* set if we find an O_LOG */ 1031136071Sgreen ipfw_insn_altq *altqptr = NULL; /* set if we find an O_ALTQ */ 103298943Sluigi int or_block = 0; /* we are in an or block */ 1033117328Sluigi uint32_t set_disable; 103498943Sluigi 1035115793Sticso bcopy(&rule->next_rule, &set_disable, sizeof(set_disable)); 1036101628Sluigi 1037101628Sluigi if (set_disable & (1 << rule->set)) { /* disabled */ 1038187764Sluigi if (!co.show_sets) 1039101628Sluigi return; 1040101628Sluigi else 1041101628Sluigi printf("# DISABLED "); 1042101628Sluigi } 104398943Sluigi printf("%05u ", rule->rulenum); 104498943Sluigi 1045206843Sluigi if (pcwidth > 0 || bcwidth > 0) { 1046206843Sluigi pr_u64(&rule->pcnt, pcwidth); 1047206843Sluigi pr_u64(&rule->bcnt, bcwidth); 1048206843Sluigi } 104998943Sluigi 1050187764Sluigi if (co.do_time == 2) 1051117472Sluigi printf("%10u ", rule->timestamp); 1052187764Sluigi else if (co.do_time == 1) { 1053107291Skeramida char timestr[30]; 1054107291Skeramida time_t t = (time_t)0; 1055107291Skeramida 1056107291Skeramida if (twidth == 0) { 1057107291Skeramida strcpy(timestr, ctime(&t)); 1058107291Skeramida *strchr(timestr, '\n') = '\0'; 1059107291Skeramida twidth = strlen(timestr); 1060107291Skeramida } 106198943Sluigi if (rule->timestamp) { 1062107291Skeramida t = _long_to_time(rule->timestamp); 106398943Sluigi 106498943Sluigi strcpy(timestr, ctime(&t)); 106598943Sluigi *strchr(timestr, '\n') = '\0'; 106698943Sluigi printf("%s ", timestr); 106798943Sluigi } else { 1068107291Skeramida printf("%*s", twidth, " "); 106998943Sluigi } 107098943Sluigi } 107198943Sluigi 1072187764Sluigi if (co.show_sets) 1073101628Sluigi printf("set %d ", rule->set); 1074101628Sluigi 107598943Sluigi /* 1076107289Sluigi * print the optional "match probability" 1077107289Sluigi */ 1078107289Sluigi if (rule->cmd_len > 0) { 1079107289Sluigi cmd = rule->cmd ; 1080107289Sluigi if (cmd->opcode == O_PROB) { 1081107289Sluigi ipfw_insn_u32 *p = (ipfw_insn_u32 *)cmd; 1082107289Sluigi double d = 1.0 * p->d[0]; 1083107289Sluigi 1084107289Sluigi d = (d / 0x7fffffff); 1085107289Sluigi printf("prob %f ", d); 1086107289Sluigi } 1087107289Sluigi } 1088107289Sluigi 1089107289Sluigi /* 109098943Sluigi * first print actions 109198943Sluigi */ 1092220802Sglebius for (l = rule->cmd_len - rule->act_ofs, cmd = ACTION_PTR(rule); 109398943Sluigi l > 0 ; l -= F_LEN(cmd), cmd += F_LEN(cmd)) { 109498943Sluigi switch(cmd->opcode) { 109598943Sluigi case O_CHECK_STATE: 109698943Sluigi printf("check-state"); 1097205179Sluigi /* avoid printing anything else */ 1098205179Sluigi flags = HAVE_PROTO | HAVE_SRCIP | 1099205179Sluigi HAVE_DSTIP | HAVE_IP; 110098943Sluigi break; 110198943Sluigi 110298943Sluigi case O_ACCEPT: 110398943Sluigi printf("allow"); 110498943Sluigi break; 110598943Sluigi 110698943Sluigi case O_COUNT: 110798943Sluigi printf("count"); 110898943Sluigi break; 110998943Sluigi 111098943Sluigi case O_DENY: 111198943Sluigi printf("deny"); 111298943Sluigi break; 111398943Sluigi 111499475Sluigi case O_REJECT: 111599475Sluigi if (cmd->arg1 == ICMP_REJECT_RST) 111699475Sluigi printf("reset"); 111799475Sluigi else if (cmd->arg1 == ICMP_UNREACH_HOST) 111899475Sluigi printf("reject"); 111999475Sluigi else 112099475Sluigi print_reject_code(cmd->arg1); 112199475Sluigi break; 112299475Sluigi 1123149020Sbz case O_UNREACH6: 1124149020Sbz if (cmd->arg1 == ICMP6_UNREACH_RST) 1125149020Sbz printf("reset6"); 1126149020Sbz else 1127149020Sbz print_unreach6_code(cmd->arg1); 1128149020Sbz break; 1129149020Sbz 1130159636Soleg case O_SKIPTO: 1131159636Soleg PRINT_UINT_ARG("skipto ", cmd->arg1); 113298943Sluigi break; 113398943Sluigi 113498943Sluigi case O_PIPE: 1135159636Soleg PRINT_UINT_ARG("pipe ", cmd->arg1); 1136159636Soleg break; 1137159636Soleg 113898943Sluigi case O_QUEUE: 1139159636Soleg PRINT_UINT_ARG("queue ", cmd->arg1); 1140159636Soleg break; 1141159636Soleg 114298943Sluigi case O_DIVERT: 1143159636Soleg PRINT_UINT_ARG("divert ", cmd->arg1); 1144159636Soleg break; 1145159636Soleg 114698943Sluigi case O_TEE: 1147159636Soleg PRINT_UINT_ARG("tee ", cmd->arg1); 1148159636Soleg break; 1149159636Soleg 1150141351Sglebius case O_NETGRAPH: 1151159636Soleg PRINT_UINT_ARG("netgraph ", cmd->arg1); 1152159636Soleg break; 1153159636Soleg 1154141351Sglebius case O_NGTEE: 1155159636Soleg PRINT_UINT_ARG("ngtee ", cmd->arg1); 1156159636Soleg break; 1157141351Sglebius 115898943Sluigi case O_FORWARD_IP: 115998943Sluigi { 116098943Sluigi ipfw_insn_sa *s = (ipfw_insn_sa *)cmd; 116198943Sluigi 1162161424Sjulian if (s->sa.sin_addr.s_addr == INADDR_ANY) { 1163161424Sjulian printf("fwd tablearg"); 1164161424Sjulian } else { 1165161424Sjulian printf("fwd %s", inet_ntoa(s->sa.sin_addr)); 1166161424Sjulian } 116798943Sluigi if (s->sa.sin_port) 1168103241Sluigi printf(",%d", s->sa.sin_port); 116998943Sluigi } 117098943Sluigi break; 117198943Sluigi 1172225044Sbz case O_FORWARD_IP6: 1173225044Sbz { 1174225044Sbz char buf[4 + INET6_ADDRSTRLEN + 1]; 1175225044Sbz ipfw_insn_sa6 *s = (ipfw_insn_sa6 *)cmd; 1176225044Sbz 1177225044Sbz printf("fwd %s", inet_ntop(AF_INET6, &s->sa.sin6_addr, 1178225044Sbz buf, sizeof(buf))); 1179225044Sbz if (s->sa.sin6_port) 1180225044Sbz printf(",%d", s->sa.sin6_port); 1181225044Sbz } 1182225044Sbz break; 1183225044Sbz 118498943Sluigi case O_LOG: /* O_LOG is printed last */ 118598943Sluigi logptr = (ipfw_insn_log *)cmd; 118698943Sluigi break; 118798943Sluigi 1188136071Sgreen case O_ALTQ: /* O_ALTQ is printed after O_LOG */ 1189136071Sgreen altqptr = (ipfw_insn_altq *)cmd; 1190136071Sgreen break; 1191136071Sgreen 1192158879Soleg case O_TAG: 1193158879Soleg tagptr = cmd; 1194158879Soleg break; 1195158879Soleg 1196165648Spiso case O_NAT: 1197223080Sae if (cmd->arg1 != 0) 1198223080Sae PRINT_UINT_ARG("nat ", cmd->arg1); 1199223080Sae else 1200223080Sae printf("nat global"); 1201223080Sae break; 1202220804Sglebius 1203178888Sjulian case O_SETFIB: 1204178888Sjulian PRINT_UINT_ARG("setfib ", cmd->arg1); 1205178888Sjulian break; 1206190633Spiso 1207190633Spiso case O_REASS: 1208190633Spiso printf("reass"); 1209190633Spiso break; 1210220804Sglebius 1211223666Sae case O_CALLRETURN: 1212223666Sae if (cmd->len & F_NOT) 1213223666Sae printf("return"); 1214223666Sae else 1215223666Sae PRINT_UINT_ARG("call ", cmd->arg1); 1216223666Sae break; 1217223666Sae 121898943Sluigi default: 1219136071Sgreen printf("** unrecognized action %d len %d ", 122098943Sluigi cmd->opcode, cmd->len); 122198943Sluigi } 122298943Sluigi } 122398943Sluigi if (logptr) { 122498943Sluigi if (logptr->max_log > 0) 122599909Sluigi printf(" log logamount %d", logptr->max_log); 122698943Sluigi else 122799909Sluigi printf(" log"); 122898943Sluigi } 1229204591Sluigi#ifndef NO_ALTQ 1230136071Sgreen if (altqptr) { 1231187983Sluigi print_altq_cmd(altqptr); 1232136071Sgreen } 1233204591Sluigi#endif 1234158879Soleg if (tagptr) { 1235158879Soleg if (tagptr->len & F_NOT) 1236159636Soleg PRINT_UINT_ARG(" untag ", tagptr->arg1); 1237158879Soleg else 1238159636Soleg PRINT_UINT_ARG(" tag ", tagptr->arg1); 1239158879Soleg } 1240136071Sgreen 124198943Sluigi /* 1242102087Sluigi * then print the body. 124398943Sluigi */ 1244220802Sglebius for (l = rule->act_ofs, cmd = rule->cmd ; 1245146894Smlaier l > 0 ; l -= F_LEN(cmd) , cmd += F_LEN(cmd)) { 1246146894Smlaier if ((cmd->len & F_OR) || (cmd->len & F_NOT)) 1247146894Smlaier continue; 1248146894Smlaier if (cmd->opcode == O_IP4) { 1249146894Smlaier flags |= HAVE_PROTO4; 1250146894Smlaier break; 1251146894Smlaier } else if (cmd->opcode == O_IP6) { 1252146894Smlaier flags |= HAVE_PROTO6; 1253146894Smlaier break; 1254220804Sglebius } 1255146894Smlaier } 1256102087Sluigi if (rule->_pad & 1) { /* empty rules before options */ 1257187764Sluigi if (!co.do_compact) { 1258146894Smlaier show_prerequisites(&flags, HAVE_PROTO, 0); 1259146894Smlaier printf(" from any to any"); 1260146894Smlaier } 1261205179Sluigi flags |= HAVE_IP | HAVE_OPTIONS | HAVE_PROTO | 1262205179Sluigi HAVE_SRCIP | HAVE_DSTIP; 1263102087Sluigi } 1264102087Sluigi 1265187764Sluigi if (co.comment_only) 1266123495Sluigi comment = "..."; 1267123495Sluigi 1268220802Sglebius for (l = rule->act_ofs, cmd = rule->cmd ; 126998943Sluigi l > 0 ; l -= F_LEN(cmd) , cmd += F_LEN(cmd)) { 127099475Sluigi /* useful alias */ 127199475Sluigi ipfw_insn_u32 *cmd32 = (ipfw_insn_u32 *)cmd; 127298943Sluigi 1273187764Sluigi if (co.comment_only) { 1274123495Sluigi if (cmd->opcode != O_NOP) 1275123495Sluigi continue; 1276123495Sluigi printf(" // %s\n", (char *)(cmd + 1)); 1277123495Sluigi return; 1278123495Sluigi } 1279123495Sluigi 1280102087Sluigi show_prerequisites(&flags, 0, cmd->opcode); 1281102087Sluigi 128298943Sluigi switch(cmd->opcode) { 1283117577Sluigi case O_PROB: 1284107289Sluigi break; /* done already */ 1285107289Sluigi 128698943Sluigi case O_PROBE_STATE: 128798943Sluigi break; /* no need to print anything here */ 128898943Sluigi 128998943Sluigi case O_IP_SRC: 1290130281Sru case O_IP_SRC_LOOKUP: 129198943Sluigi case O_IP_SRC_MASK: 129298943Sluigi case O_IP_SRC_ME: 129398943Sluigi case O_IP_SRC_SET: 1294102087Sluigi show_prerequisites(&flags, HAVE_PROTO, 0); 129598943Sluigi if (!(flags & HAVE_SRCIP)) 129698943Sluigi printf(" from"); 129798943Sluigi if ((cmd->len & F_OR) && !or_block) 129898943Sluigi printf(" {"); 1299102087Sluigi print_ip((ipfw_insn_ip *)cmd, 1300102087Sluigi (flags & HAVE_OPTIONS) ? " src-ip" : ""); 130198943Sluigi flags |= HAVE_SRCIP; 130298943Sluigi break; 130398943Sluigi 130498943Sluigi case O_IP_DST: 1305130281Sru case O_IP_DST_LOOKUP: 130698943Sluigi case O_IP_DST_MASK: 130798943Sluigi case O_IP_DST_ME: 130898943Sluigi case O_IP_DST_SET: 1309102087Sluigi show_prerequisites(&flags, HAVE_PROTO|HAVE_SRCIP, 0); 131098943Sluigi if (!(flags & HAVE_DSTIP)) 131198943Sluigi printf(" to"); 131298943Sluigi if ((cmd->len & F_OR) && !or_block) 131398943Sluigi printf(" {"); 1314102087Sluigi print_ip((ipfw_insn_ip *)cmd, 1315102087Sluigi (flags & HAVE_OPTIONS) ? " dst-ip" : ""); 131698943Sluigi flags |= HAVE_DSTIP; 131798943Sluigi break; 131898943Sluigi 1319145246Sbrooks case O_IP6_SRC: 1320145246Sbrooks case O_IP6_SRC_MASK: 1321145246Sbrooks case O_IP6_SRC_ME: 1322147105Smlaier show_prerequisites(&flags, HAVE_PROTO, 0); 1323145246Sbrooks if (!(flags & HAVE_SRCIP)) 1324145246Sbrooks printf(" from"); 1325145246Sbrooks if ((cmd->len & F_OR) && !or_block) 1326145246Sbrooks printf(" {"); 1327145246Sbrooks print_ip6((ipfw_insn_ip6 *)cmd, 1328145246Sbrooks (flags & HAVE_OPTIONS) ? " src-ip6" : ""); 1329145246Sbrooks flags |= HAVE_SRCIP | HAVE_PROTO; 1330145246Sbrooks break; 1331145246Sbrooks 1332145246Sbrooks case O_IP6_DST: 1333145246Sbrooks case O_IP6_DST_MASK: 1334145246Sbrooks case O_IP6_DST_ME: 1335145246Sbrooks show_prerequisites(&flags, HAVE_PROTO|HAVE_SRCIP, 0); 1336145246Sbrooks if (!(flags & HAVE_DSTIP)) 1337145246Sbrooks printf(" to"); 1338145246Sbrooks if ((cmd->len & F_OR) && !or_block) 1339145246Sbrooks printf(" {"); 1340145246Sbrooks print_ip6((ipfw_insn_ip6 *)cmd, 1341145246Sbrooks (flags & HAVE_OPTIONS) ? " dst-ip6" : ""); 1342145246Sbrooks flags |= HAVE_DSTIP; 1343145246Sbrooks break; 1344145246Sbrooks 1345145246Sbrooks case O_FLOW6ID: 1346145246Sbrooks print_flow6id( (ipfw_insn_u32 *) cmd ); 1347145246Sbrooks flags |= HAVE_OPTIONS; 1348145246Sbrooks break; 1349145246Sbrooks 135098943Sluigi case O_IP_DSTPORT: 1351205179Sluigi show_prerequisites(&flags, 1352205179Sluigi HAVE_PROTO | HAVE_SRCIP | 1353205179Sluigi HAVE_DSTIP | HAVE_IP, 0); 135498943Sluigi case O_IP_SRCPORT: 1355224942Sjhb if (flags & HAVE_DSTIP) 1356224942Sjhb flags |= HAVE_IP; 1357205179Sluigi show_prerequisites(&flags, 1358205179Sluigi HAVE_PROTO | HAVE_SRCIP, 0); 1359101641Sluigi if ((cmd->len & F_OR) && !or_block) 1360101641Sluigi printf(" {"); 1361172306Smaxim if (cmd->len & F_NOT) 1362172306Smaxim printf(" not"); 1363102087Sluigi print_newports((ipfw_insn_u16 *)cmd, proto, 1364102087Sluigi (flags & HAVE_OPTIONS) ? cmd->opcode : 0); 136598943Sluigi break; 136698943Sluigi 136798943Sluigi case O_PROTO: { 1368145246Sbrooks struct protoent *pe = NULL; 136998943Sluigi 137098943Sluigi if ((cmd->len & F_OR) && !or_block) 137198943Sluigi printf(" {"); 137298943Sluigi if (cmd->len & F_NOT) 137398943Sluigi printf(" not"); 137498943Sluigi proto = cmd->arg1; 1375145567Sbrooks pe = getprotobynumber(cmd->arg1); 1376146894Smlaier if ((flags & (HAVE_PROTO4 | HAVE_PROTO6)) && 1377146894Smlaier !(flags & HAVE_PROTO)) 1378146894Smlaier show_prerequisites(&flags, 1379205179Sluigi HAVE_PROTO | HAVE_IP | HAVE_SRCIP | 1380205179Sluigi HAVE_DSTIP | HAVE_OPTIONS, 0); 1381102087Sluigi if (flags & HAVE_OPTIONS) 1382102087Sluigi printf(" proto"); 138398943Sluigi if (pe) 138498943Sluigi printf(" %s", pe->p_name); 138598943Sluigi else 138698943Sluigi printf(" %u", cmd->arg1); 138798943Sluigi } 138898943Sluigi flags |= HAVE_PROTO; 138998943Sluigi break; 1390106505Smaxim 139198943Sluigi default: /*options ... */ 1392146894Smlaier if (!(cmd->len & (F_OR|F_NOT))) 1393146894Smlaier if (((cmd->opcode == O_IP6) && 1394146894Smlaier (flags & HAVE_PROTO6)) || 1395146894Smlaier ((cmd->opcode == O_IP4) && 1396146894Smlaier (flags & HAVE_PROTO4))) 1397146894Smlaier break; 1398205179Sluigi show_prerequisites(&flags, HAVE_PROTO | HAVE_SRCIP | 1399205179Sluigi HAVE_DSTIP | HAVE_IP | HAVE_OPTIONS, 0); 140098943Sluigi if ((cmd->len & F_OR) && !or_block) 140198943Sluigi printf(" {"); 140298943Sluigi if (cmd->len & F_NOT && cmd->opcode != O_IN) 140398943Sluigi printf(" not"); 140498943Sluigi switch(cmd->opcode) { 1405169139Smaxim case O_MACADDR2: { 1406169139Smaxim ipfw_insn_mac *m = (ipfw_insn_mac *)cmd; 1407169139Smaxim 1408169139Smaxim printf(" MAC"); 1409169139Smaxim print_mac(m->addr, m->mask); 1410169139Smaxim print_mac(m->addr + 6, m->mask + 6); 1411169139Smaxim } 1412169139Smaxim break; 1413169139Smaxim 1414169139Smaxim case O_MAC_TYPE: 1415169139Smaxim print_newports((ipfw_insn_u16 *)cmd, 1416169139Smaxim IPPROTO_ETHERTYPE, cmd->opcode); 1417169139Smaxim break; 1418169139Smaxim 1419169139Smaxim 142098943Sluigi case O_FRAG: 142198943Sluigi printf(" frag"); 142298943Sluigi break; 142398943Sluigi 1424178888Sjulian case O_FIB: 1425178888Sjulian printf(" fib %u", cmd->arg1 ); 1426178888Sjulian break; 1427215179Sluigi case O_SOCKARG: 1428215179Sluigi printf(" sockarg"); 1429215179Sluigi break; 1430178888Sjulian 143198943Sluigi case O_IN: 143298943Sluigi printf(cmd->len & F_NOT ? " out" : " in"); 143398943Sluigi break; 143498943Sluigi 1435136073Sgreen case O_DIVERTED: 1436136073Sgreen switch (cmd->arg1) { 1437136073Sgreen case 3: 1438136073Sgreen printf(" diverted"); 1439136073Sgreen break; 1440136073Sgreen case 1: 1441136073Sgreen printf(" diverted-loopback"); 1442136073Sgreen break; 1443136073Sgreen case 2: 1444136073Sgreen printf(" diverted-output"); 1445136073Sgreen break; 1446136073Sgreen default: 1447136073Sgreen printf(" diverted-?<%u>", cmd->arg1); 1448136073Sgreen break; 1449136073Sgreen } 1450136073Sgreen break; 1451136073Sgreen 145298943Sluigi case O_LAYER2: 145398943Sluigi printf(" layer2"); 145498943Sluigi break; 145598943Sluigi case O_XMIT: 145698943Sluigi case O_RECV: 1457140423Sglebius case O_VIA: 1458140423Sglebius { 1459117469Sluigi char const *s; 146098943Sluigi ipfw_insn_if *cmdif = (ipfw_insn_if *)cmd; 146198943Sluigi 146298943Sluigi if (cmd->opcode == O_XMIT) 146398943Sluigi s = "xmit"; 146498943Sluigi else if (cmd->opcode == O_RECV) 146598943Sluigi s = "recv"; 1466117469Sluigi else /* if (cmd->opcode == O_VIA) */ 146798943Sluigi s = "via"; 146898943Sluigi if (cmdif->name[0] == '\0') 146999475Sluigi printf(" %s %s", s, 147099475Sluigi inet_ntoa(cmdif->p.ip)); 1471234597Smelifaro else if (cmdif->name[0] == '\1') /* interface table */ 1472234597Smelifaro printf(" %s table(%d)", s, cmdif->p.glob); 1473140423Sglebius else 1474140423Sglebius printf(" %s %s", s, cmdif->name); 1475140423Sglebius 147698943Sluigi break; 1477140423Sglebius } 147898943Sluigi case O_IPID: 1479116690Sluigi if (F_LEN(cmd) == 1) 1480116690Sluigi printf(" ipid %u", cmd->arg1 ); 1481116690Sluigi else 1482116690Sluigi print_newports((ipfw_insn_u16 *)cmd, 0, 1483116690Sluigi O_IPID); 148498943Sluigi break; 148598943Sluigi 148698943Sluigi case O_IPTTL: 1487116690Sluigi if (F_LEN(cmd) == 1) 1488116690Sluigi printf(" ipttl %u", cmd->arg1 ); 1489116690Sluigi else 1490116690Sluigi print_newports((ipfw_insn_u16 *)cmd, 0, 1491116690Sluigi O_IPTTL); 149298943Sluigi break; 149398943Sluigi 149498943Sluigi case O_IPVER: 149598943Sluigi printf(" ipver %u", cmd->arg1 ); 149698943Sluigi break; 149798943Sluigi 149899475Sluigi case O_IPPRECEDENCE: 149999475Sluigi printf(" ipprecedence %u", (cmd->arg1) >> 5 ); 150099475Sluigi break; 150199475Sluigi 150298943Sluigi case O_IPLEN: 1503116690Sluigi if (F_LEN(cmd) == 1) 1504116690Sluigi printf(" iplen %u", cmd->arg1 ); 1505116690Sluigi else 1506116690Sluigi print_newports((ipfw_insn_u16 *)cmd, 0, 1507116690Sluigi O_IPLEN); 150898943Sluigi break; 150998943Sluigi 1510101116Sluigi case O_IPOPT: 151198943Sluigi print_flags("ipoptions", cmd, f_ipopts); 151298943Sluigi break; 151398943Sluigi 151499475Sluigi case O_IPTOS: 151599475Sluigi print_flags("iptos", cmd, f_iptos); 151699475Sluigi break; 151799475Sluigi 151899475Sluigi case O_ICMPTYPE: 151999475Sluigi print_icmptypes((ipfw_insn_u32 *)cmd); 152099475Sluigi break; 152199475Sluigi 152298943Sluigi case O_ESTAB: 152398943Sluigi printf(" established"); 152498943Sluigi break; 152598943Sluigi 1526136075Sgreen case O_TCPDATALEN: 1527136075Sgreen if (F_LEN(cmd) == 1) 1528136075Sgreen printf(" tcpdatalen %u", cmd->arg1 ); 1529136075Sgreen else 1530136075Sgreen print_newports((ipfw_insn_u16 *)cmd, 0, 1531136075Sgreen O_TCPDATALEN); 1532136075Sgreen break; 1533136075Sgreen 153498943Sluigi case O_TCPFLAGS: 153598943Sluigi print_flags("tcpflags", cmd, f_tcpflags); 153698943Sluigi break; 153798943Sluigi 153898943Sluigi case O_TCPOPTS: 153998943Sluigi print_flags("tcpoptions", cmd, f_tcpopts); 154098943Sluigi break; 154198943Sluigi 154298943Sluigi case O_TCPWIN: 1543234278Sglebius if (F_LEN(cmd) == 1) 1544234278Sglebius printf(" tcpwin %u", cmd->arg1); 1545234278Sglebius else 1546234278Sglebius print_newports((ipfw_insn_u16 *)cmd, 0, 1547234278Sglebius O_TCPWIN); 154898943Sluigi break; 154998943Sluigi 155098943Sluigi case O_TCPACK: 155198943Sluigi printf(" tcpack %d", ntohl(cmd32->d[0])); 155298943Sluigi break; 155398943Sluigi 155498943Sluigi case O_TCPSEQ: 155598943Sluigi printf(" tcpseq %d", ntohl(cmd32->d[0])); 155698943Sluigi break; 155798943Sluigi 155898943Sluigi case O_UID: 155998943Sluigi { 156098943Sluigi struct passwd *pwd = getpwuid(cmd32->d[0]); 156198943Sluigi 156298943Sluigi if (pwd) 156398943Sluigi printf(" uid %s", pwd->pw_name); 156498943Sluigi else 156598943Sluigi printf(" uid %u", cmd32->d[0]); 156698943Sluigi } 156798943Sluigi break; 156898943Sluigi 156998943Sluigi case O_GID: 157098943Sluigi { 157198943Sluigi struct group *grp = getgrgid(cmd32->d[0]); 157298943Sluigi 157398943Sluigi if (grp) 157498943Sluigi printf(" gid %s", grp->gr_name); 157598943Sluigi else 157698943Sluigi printf(" gid %u", cmd32->d[0]); 157798943Sluigi } 157898943Sluigi break; 157998943Sluigi 1580133600Scsjp case O_JAIL: 1581133600Scsjp printf(" jail %d", cmd32->d[0]); 1582133600Scsjp break; 1583133600Scsjp 1584112250Scjc case O_VERREVPATH: 1585112250Scjc printf(" verrevpath"); 1586112250Scjc break; 1587116919Sluigi 1588128575Sandre case O_VERSRCREACH: 1589128575Sandre printf(" versrcreach"); 1590128575Sandre break; 1591128575Sandre 1592133387Sandre case O_ANTISPOOF: 1593133387Sandre printf(" antispoof"); 1594133387Sandre break; 1595133387Sandre 1596117241Sluigi case O_IPSEC: 1597117241Sluigi printf(" ipsec"); 1598117241Sluigi break; 1599117241Sluigi 1600117469Sluigi case O_NOP: 1601117626Sluigi comment = (char *)(cmd + 1); 1602117469Sluigi break; 1603117469Sluigi 160498943Sluigi case O_KEEP_STATE: 160598943Sluigi printf(" keep-state"); 160698943Sluigi break; 160798943Sluigi 1608159636Soleg case O_LIMIT: { 160998943Sluigi struct _s_x *p = limit_masks; 161098943Sluigi ipfw_insn_limit *c = (ipfw_insn_limit *)cmd; 1611117328Sluigi uint8_t x = c->limit_mask; 1612117469Sluigi char const *comma = " "; 161398943Sluigi 161498943Sluigi printf(" limit"); 1615117577Sluigi for (; p->x != 0 ; p++) 161699909Sluigi if ((x & p->x) == p->x) { 161798943Sluigi x &= ~p->x; 161898943Sluigi printf("%s%s", comma, p->s); 161998943Sluigi comma = ","; 162098943Sluigi } 1621159636Soleg PRINT_UINT_ARG(" ", c->conn_limit); 162298943Sluigi break; 1623159636Soleg } 162498943Sluigi 1625146894Smlaier case O_IP6: 1626152923Sume printf(" ip6"); 1627145246Sbrooks break; 1628145246Sbrooks 1629146894Smlaier case O_IP4: 1630152923Sume printf(" ip4"); 1631146894Smlaier break; 1632146894Smlaier 1633145246Sbrooks case O_ICMP6TYPE: 1634145246Sbrooks print_icmp6types((ipfw_insn_u32 *)cmd); 1635145246Sbrooks break; 1636145246Sbrooks 1637145246Sbrooks case O_EXT_HDR: 1638145246Sbrooks print_ext6hdr( (ipfw_insn *) cmd ); 1639145246Sbrooks break; 1640145246Sbrooks 1641158879Soleg case O_TAGGED: 1642158879Soleg if (F_LEN(cmd) == 1) 1643159636Soleg PRINT_UINT_ARG(" tagged ", cmd->arg1); 1644158879Soleg else 1645159636Soleg print_newports((ipfw_insn_u16 *)cmd, 0, 1646159636Soleg O_TAGGED); 1647158879Soleg break; 1648158879Soleg 164998943Sluigi default: 165098943Sluigi printf(" [opcode %d len %d]", 165198943Sluigi cmd->opcode, cmd->len); 165298943Sluigi } 165398943Sluigi } 165498943Sluigi if (cmd->len & F_OR) { 165598943Sluigi printf(" or"); 165698943Sluigi or_block = 1; 165798943Sluigi } else if (or_block) { 165898943Sluigi printf(" }"); 165998943Sluigi or_block = 0; 166098943Sluigi } 166198943Sluigi } 1662205179Sluigi show_prerequisites(&flags, HAVE_PROTO | HAVE_SRCIP | HAVE_DSTIP 1663220802Sglebius | HAVE_IP, 0); 1664117626Sluigi if (comment) 1665117626Sluigi printf(" // %s", comment); 166698943Sluigi printf("\n"); 166798943Sluigi} 166898943Sluigi 166998943Sluigistatic void 1670112189Smaximshow_dyn_ipfw(ipfw_dyn_rule *d, int pcwidth, int bcwidth) 167198943Sluigi{ 167298943Sluigi struct protoent *pe; 167398943Sluigi struct in_addr a; 1674115793Sticso uint16_t rulenum; 1675159160Smlaier char buf[INET6_ADDRSTRLEN]; 167698943Sluigi 1677187764Sluigi if (!co.do_expired) { 167898943Sluigi if (!d->expire && !(d->dyn_type == O_LIMIT_PARENT)) 167998943Sluigi return; 168098943Sluigi } 1681115793Sticso bcopy(&d->rule, &rulenum, sizeof(rulenum)); 1682117328Sluigi printf("%05d", rulenum); 1683206843Sluigi if (pcwidth > 0 || bcwidth > 0) { 1684206843Sluigi printf(" "); 1685206843Sluigi pr_u64(&d->pcnt, pcwidth); 1686206843Sluigi pr_u64(&d->bcnt, bcwidth); 1687206843Sluigi printf("(%ds)", d->expire); 1688206843Sluigi } 168998943Sluigi switch (d->dyn_type) { 169098943Sluigi case O_LIMIT_PARENT: 169198943Sluigi printf(" PARENT %d", d->count); 169298943Sluigi break; 169398943Sluigi case O_LIMIT: 169498943Sluigi printf(" LIMIT"); 169598943Sluigi break; 169698943Sluigi case O_KEEP_STATE: /* bidir, no mask */ 1697106505Smaxim printf(" STATE"); 169898943Sluigi break; 169998943Sluigi } 170098943Sluigi 170198943Sluigi if ((pe = getprotobynumber(d->id.proto)) != NULL) 170298943Sluigi printf(" %s", pe->p_name); 170398943Sluigi else 170498943Sluigi printf(" proto %u", d->id.proto); 170598943Sluigi 1706159160Smlaier if (d->id.addr_type == 4) { 1707159160Smlaier a.s_addr = htonl(d->id.src_ip); 1708159160Smlaier printf(" %s %d", inet_ntoa(a), d->id.src_port); 170998943Sluigi 1710159160Smlaier a.s_addr = htonl(d->id.dst_ip); 1711159160Smlaier printf(" <-> %s %d", inet_ntoa(a), d->id.dst_port); 1712159160Smlaier } else if (d->id.addr_type == 6) { 1713159160Smlaier printf(" %s %d", inet_ntop(AF_INET6, &d->id.src_ip6, buf, 1714159160Smlaier sizeof(buf)), d->id.src_port); 1715159160Smlaier printf(" <-> %s %d", inet_ntop(AF_INET6, &d->id.dst_ip6, buf, 1716159160Smlaier sizeof(buf)), d->id.dst_port); 1717159160Smlaier } else 1718159160Smlaier printf(" UNKNOWN <-> UNKNOWN\n"); 1719220804Sglebius 172098943Sluigi printf("\n"); 172198943Sluigi} 172298943Sluigi 1723101978Sluigi/* 1724101978Sluigi * This one handles all set-related commands 1725101978Sluigi * ipfw set { show | enable | disable } 1726101978Sluigi * ipfw set swap X Y 1727101978Sluigi * ipfw set move X to Y 1728101978Sluigi * ipfw set move rule X to Y 1729101978Sluigi */ 1730187767Sluigivoid 1731204591Sluigiipfw_sets_handler(char *av[]) 1732101978Sluigi{ 1733117328Sluigi uint32_t set_disable, masks[2]; 1734101978Sluigi int i, nbytes; 1735117328Sluigi uint16_t rulenum; 1736117328Sluigi uint8_t cmd, new_set; 1737101978Sluigi 1738101978Sluigi av++; 1739101978Sluigi 1740204591Sluigi if (av[0] == NULL) 1741101978Sluigi errx(EX_USAGE, "set needs command"); 1742140271Sbrooks if (_substrcmp(*av, "show") == 0) { 1743204717Sluigi void *data = NULL; 1744117469Sluigi char const *msg; 1745204717Sluigi int nalloc; 1746101978Sluigi 1747204717Sluigi nalloc = nbytes = sizeof(struct ip_fw); 1748204717Sluigi while (nbytes >= nalloc) { 1749204717Sluigi if (data) 1750204717Sluigi free(data); 1751204717Sluigi nalloc = nalloc * 2 + 200; 1752204717Sluigi nbytes = nalloc; 1753206843Sluigi data = safe_calloc(1, nbytes); 1754206843Sluigi if (do_cmd(IP_FW_GET, data, (uintptr_t)&nbytes) < 0) 1755206843Sluigi err(EX_OSERR, "getsockopt(IP_FW_GET)"); 1756204717Sluigi } 1757204717Sluigi 1758115793Sticso bcopy(&((struct ip_fw *)data)->next_rule, 1759115793Sticso &set_disable, sizeof(set_disable)); 1760101978Sluigi 1761117655Sluigi for (i = 0, msg = "disable" ; i < RESVD_SET; i++) 1762117577Sluigi if ((set_disable & (1<<i))) { 1763101978Sluigi printf("%s %d", msg, i); 1764101978Sluigi msg = ""; 1765101978Sluigi } 1766101978Sluigi msg = (set_disable) ? " enable" : "enable"; 1767117655Sluigi for (i = 0; i < RESVD_SET; i++) 1768117577Sluigi if (!(set_disable & (1<<i))) { 1769101978Sluigi printf("%s %d", msg, i); 1770101978Sluigi msg = ""; 1771101978Sluigi } 1772101978Sluigi printf("\n"); 1773140271Sbrooks } else if (_substrcmp(*av, "swap") == 0) { 1774204591Sluigi av++; 1775204591Sluigi if ( av[0] == NULL || av[1] == NULL ) 1776101978Sluigi errx(EX_USAGE, "set swap needs 2 set numbers\n"); 1777101978Sluigi rulenum = atoi(av[0]); 1778101978Sluigi new_set = atoi(av[1]); 1779117655Sluigi if (!isdigit(*(av[0])) || rulenum > RESVD_SET) 1780101978Sluigi errx(EX_DATAERR, "invalid set number %s\n", av[0]); 1781117655Sluigi if (!isdigit(*(av[1])) || new_set > RESVD_SET) 1782101978Sluigi errx(EX_DATAERR, "invalid set number %s\n", av[1]); 1783101978Sluigi masks[0] = (4 << 24) | (new_set << 16) | (rulenum); 1784117328Sluigi i = do_cmd(IP_FW_DEL, masks, sizeof(uint32_t)); 1785140271Sbrooks } else if (_substrcmp(*av, "move") == 0) { 1786204591Sluigi av++; 1787204717Sluigi if (av[0] && _substrcmp(*av, "rule") == 0) { 1788101978Sluigi cmd = 2; 1789204591Sluigi av++; 1790101978Sluigi } else 1791101978Sluigi cmd = 3; 1792204591Sluigi if (av[0] == NULL || av[1] == NULL || av[2] == NULL || 1793204591Sluigi av[3] != NULL || _substrcmp(av[1], "to") != 0) 1794101978Sluigi errx(EX_USAGE, "syntax: set move [rule] X to Y\n"); 1795101978Sluigi rulenum = atoi(av[0]); 1796101978Sluigi new_set = atoi(av[2]); 1797117655Sluigi if (!isdigit(*(av[0])) || (cmd == 3 && rulenum > RESVD_SET) || 1798182823Srik (cmd == 2 && rulenum == IPFW_DEFAULT_RULE) ) 1799101978Sluigi errx(EX_DATAERR, "invalid source number %s\n", av[0]); 1800117655Sluigi if (!isdigit(*(av[2])) || new_set > RESVD_SET) 1801101978Sluigi errx(EX_DATAERR, "invalid dest. set %s\n", av[1]); 1802101978Sluigi masks[0] = (cmd << 24) | (new_set << 16) | (rulenum); 1803117328Sluigi i = do_cmd(IP_FW_DEL, masks, sizeof(uint32_t)); 1804140271Sbrooks } else if (_substrcmp(*av, "disable") == 0 || 1805140271Sbrooks _substrcmp(*av, "enable") == 0 ) { 1806140271Sbrooks int which = _substrcmp(*av, "enable") == 0 ? 1 : 0; 1807101978Sluigi 1808204591Sluigi av++; 1809101978Sluigi masks[0] = masks[1] = 0; 1810101978Sluigi 1811204717Sluigi while (av[0]) { 1812101978Sluigi if (isdigit(**av)) { 1813101978Sluigi i = atoi(*av); 1814117655Sluigi if (i < 0 || i > RESVD_SET) 1815101978Sluigi errx(EX_DATAERR, 1816101978Sluigi "invalid set number %d\n", i); 1817101978Sluigi masks[which] |= (1<<i); 1818140271Sbrooks } else if (_substrcmp(*av, "disable") == 0) 1819101978Sluigi which = 0; 1820140271Sbrooks else if (_substrcmp(*av, "enable") == 0) 1821101978Sluigi which = 1; 1822101978Sluigi else 1823101978Sluigi errx(EX_DATAERR, 1824101978Sluigi "invalid set command %s\n", *av); 1825204591Sluigi av++; 1826101978Sluigi } 1827101978Sluigi if ( (masks[0] & masks[1]) != 0 ) 1828101978Sluigi errx(EX_DATAERR, 1829101978Sluigi "cannot enable and disable the same set\n"); 1830101978Sluigi 1831117328Sluigi i = do_cmd(IP_FW_DEL, masks, sizeof(masks)); 1832101978Sluigi if (i) 1833101978Sluigi warn("set enable/disable: setsockopt(IP_FW_DEL)"); 1834101978Sluigi } else 1835101978Sluigi errx(EX_USAGE, "invalid set command %s\n", *av); 1836101978Sluigi} 1837101978Sluigi 1838187767Sluigivoid 1839204591Sluigiipfw_sysctl_handler(char *av[], int which) 1840109126Sdillon{ 1841109126Sdillon av++; 1842109126Sdillon 1843204591Sluigi if (av[0] == NULL) { 1844109126Sdillon warnx("missing keyword to enable/disable\n"); 1845140271Sbrooks } else if (_substrcmp(*av, "firewall") == 0) { 1846116770Sluigi sysctlbyname("net.inet.ip.fw.enable", NULL, 0, 1847116770Sluigi &which, sizeof(which)); 1848206266Sume sysctlbyname("net.inet6.ip6.fw.enable", NULL, 0, 1849206266Sume &which, sizeof(which)); 1850140271Sbrooks } else if (_substrcmp(*av, "one_pass") == 0) { 1851116770Sluigi sysctlbyname("net.inet.ip.fw.one_pass", NULL, 0, 1852116770Sluigi &which, sizeof(which)); 1853140271Sbrooks } else if (_substrcmp(*av, "debug") == 0) { 1854116770Sluigi sysctlbyname("net.inet.ip.fw.debug", NULL, 0, 1855116770Sluigi &which, sizeof(which)); 1856140271Sbrooks } else if (_substrcmp(*av, "verbose") == 0) { 1857116770Sluigi sysctlbyname("net.inet.ip.fw.verbose", NULL, 0, 1858116770Sluigi &which, sizeof(which)); 1859140271Sbrooks } else if (_substrcmp(*av, "dyn_keepalive") == 0) { 1860116770Sluigi sysctlbyname("net.inet.ip.fw.dyn_keepalive", NULL, 0, 1861116770Sluigi &which, sizeof(which)); 1862204591Sluigi#ifndef NO_ALTQ 1863140271Sbrooks } else if (_substrcmp(*av, "altq") == 0) { 1864136071Sgreen altq_set_enabled(which); 1865204591Sluigi#endif 1866109126Sdillon } else { 1867109126Sdillon warnx("unrecognize enable/disable keyword: %s\n", *av); 1868109126Sdillon } 1869109126Sdillon} 1870109126Sdillon 1871187767Sluigivoid 1872187767Sluigiipfw_list(int ac, char *av[], int show_counters) 187398943Sluigi{ 187498943Sluigi struct ip_fw *r; 187598943Sluigi ipfw_dyn_rule *dynrules, *d; 187698943Sluigi 1877117469Sluigi#define NEXT(r) ((struct ip_fw *)((char *)r + RULESIZE(r))) 1878117469Sluigi char *lim; 1879117469Sluigi void *data = NULL; 1880112189Smaxim int bcwidth, n, nbytes, nstat, ndyn, pcwidth, width; 188198943Sluigi int exitval = EX_OK; 188298943Sluigi int lac; 188398943Sluigi char **lav; 1884117469Sluigi u_long rnum, last; 188598943Sluigi char *endptr; 188698943Sluigi int seen = 0; 1887170923Smaxim uint8_t set; 188898943Sluigi 1889187764Sluigi const int ocmd = co.do_pipe ? IP_DUMMYNET_GET : IP_FW_GET; 189098943Sluigi int nalloc = 1024; /* start somewhere... */ 189198943Sluigi 1892135036Smaxim last = 0; 1893135036Smaxim 1894187764Sluigi if (co.test_only) { 1895117328Sluigi fprintf(stderr, "Testing only, list disabled\n"); 1896117328Sluigi return; 1897117328Sluigi } 1898204591Sluigi if (co.do_pipe) { 1899204591Sluigi dummynet_list(ac, av, show_counters); 1900204591Sluigi return; 1901204591Sluigi } 1902117328Sluigi 190398943Sluigi ac--; 190498943Sluigi av++; 190598943Sluigi 190698943Sluigi /* get rules or pipes from kernel, resizing array as necessary */ 190798943Sluigi nbytes = nalloc; 190898943Sluigi 190998943Sluigi while (nbytes >= nalloc) { 191098943Sluigi nalloc = nalloc * 2 + 200; 191198943Sluigi nbytes = nalloc; 1912187716Sluigi data = safe_realloc(data, nbytes); 1913119740Stmm if (do_cmd(ocmd, data, (uintptr_t)&nbytes) < 0) 191498943Sluigi err(EX_OSERR, "getsockopt(IP_%s_GET)", 1915187764Sluigi co.do_pipe ? "DUMMYNET" : "FW"); 191698943Sluigi } 191798943Sluigi 191898943Sluigi /* 191998943Sluigi * Count static rules. They have variable size so we 192098943Sluigi * need to scan the list to count them. 192198943Sluigi */ 1922117469Sluigi for (nstat = 1, r = data, lim = (char *)data + nbytes; 1923182823Srik r->rulenum < IPFW_DEFAULT_RULE && (char *)r < lim; 1924117469Sluigi ++nstat, r = NEXT(r) ) 192598943Sluigi ; /* nothing */ 192698943Sluigi 192798943Sluigi /* 192898943Sluigi * Count dynamic rules. This is easier as they have 192998943Sluigi * fixed size. 193098943Sluigi */ 1931117469Sluigi r = NEXT(r); 193298943Sluigi dynrules = (ipfw_dyn_rule *)r ; 1933117469Sluigi n = (char *)r - (char *)data; 193498943Sluigi ndyn = (nbytes - n) / sizeof *dynrules; 193598943Sluigi 1936112189Smaxim /* if showing stats, figure out column widths ahead of time */ 1937112189Smaxim bcwidth = pcwidth = 0; 1938117469Sluigi if (show_counters) { 1939117469Sluigi for (n = 0, r = data; n < nstat; n++, r = NEXT(r)) { 1940170923Smaxim /* skip rules from another set */ 1941187764Sluigi if (co.use_set && r->set != co.use_set - 1) 1942170923Smaxim continue; 1943170923Smaxim 1944112189Smaxim /* packet counter */ 1945206843Sluigi width = pr_u64(&r->pcnt, 0); 1946112189Smaxim if (width > pcwidth) 1947112189Smaxim pcwidth = width; 1948112189Smaxim 1949112189Smaxim /* byte counter */ 1950206843Sluigi width = pr_u64(&r->bcnt, 0); 1951112189Smaxim if (width > bcwidth) 1952112189Smaxim bcwidth = width; 1953112189Smaxim } 1954112189Smaxim } 1955187764Sluigi if (co.do_dynamic && ndyn) { 1956112189Smaxim for (n = 0, d = dynrules; n < ndyn; n++, d++) { 1957187764Sluigi if (co.use_set) { 1958170923Smaxim /* skip rules from another set */ 1959171989Smaxim bcopy((char *)&d->rule + sizeof(uint16_t), 1960170923Smaxim &set, sizeof(uint8_t)); 1961187764Sluigi if (set != co.use_set - 1) 1962170923Smaxim continue; 1963170923Smaxim } 1964206843Sluigi width = pr_u64(&d->pcnt, 0); 1965112189Smaxim if (width > pcwidth) 1966112189Smaxim pcwidth = width; 1967112189Smaxim 1968206843Sluigi width = pr_u64(&d->bcnt, 0); 1969112189Smaxim if (width > bcwidth) 1970112189Smaxim bcwidth = width; 1971112189Smaxim } 1972112189Smaxim } 197398943Sluigi /* if no rule numbers were specified, list all rules */ 197498943Sluigi if (ac == 0) { 1975170923Smaxim for (n = 0, r = data; n < nstat; n++, r = NEXT(r)) { 1976187764Sluigi if (co.use_set && r->set != co.use_set - 1) 1977170923Smaxim continue; 1978112189Smaxim show_ipfw(r, pcwidth, bcwidth); 1979170923Smaxim } 198098943Sluigi 1981187764Sluigi if (co.do_dynamic && ndyn) { 198298943Sluigi printf("## Dynamic rules (%d):\n", ndyn); 1983170923Smaxim for (n = 0, d = dynrules; n < ndyn; n++, d++) { 1984187764Sluigi if (co.use_set) { 1985171989Smaxim bcopy((char *)&d->rule + sizeof(uint16_t), 1986170923Smaxim &set, sizeof(uint8_t)); 1987187764Sluigi if (set != co.use_set - 1) 1988170923Smaxim continue; 1989170923Smaxim } 1990112189Smaxim show_dyn_ipfw(d, pcwidth, bcwidth); 199198943Sluigi } 1992170923Smaxim } 199398943Sluigi goto done; 199498943Sluigi } 199598943Sluigi 199698943Sluigi /* display specific rules requested on command line */ 199798943Sluigi 199898943Sluigi for (lac = ac, lav = av; lac != 0; lac--) { 199998943Sluigi /* convert command line rule # */ 2000117469Sluigi last = rnum = strtoul(*lav++, &endptr, 10); 2001117469Sluigi if (*endptr == '-') 2002117469Sluigi last = strtoul(endptr+1, &endptr, 10); 200398943Sluigi if (*endptr) { 200498943Sluigi exitval = EX_USAGE; 200598943Sluigi warnx("invalid rule number: %s", *(lav - 1)); 200698943Sluigi continue; 200798943Sluigi } 2008117469Sluigi for (n = seen = 0, r = data; n < nstat; n++, r = NEXT(r) ) { 2009117469Sluigi if (r->rulenum > last) 201098943Sluigi break; 2011187764Sluigi if (co.use_set && r->set != co.use_set - 1) 2012170923Smaxim continue; 2013117469Sluigi if (r->rulenum >= rnum && r->rulenum <= last) { 2014112189Smaxim show_ipfw(r, pcwidth, bcwidth); 201598943Sluigi seen = 1; 201698943Sluigi } 201798943Sluigi } 201898943Sluigi if (!seen) { 201998943Sluigi /* give precedence to other error(s) */ 202098943Sluigi if (exitval == EX_OK) 202198943Sluigi exitval = EX_UNAVAILABLE; 202298943Sluigi warnx("rule %lu does not exist", rnum); 202398943Sluigi } 202498943Sluigi } 202598943Sluigi 2026187764Sluigi if (co.do_dynamic && ndyn) { 202798943Sluigi printf("## Dynamic rules:\n"); 202898943Sluigi for (lac = ac, lav = av; lac != 0; lac--) { 2029145246Sbrooks last = rnum = strtoul(*lav++, &endptr, 10); 2030117469Sluigi if (*endptr == '-') 2031117469Sluigi last = strtoul(endptr+1, &endptr, 10); 203298943Sluigi if (*endptr) 203398943Sluigi /* already warned */ 203498943Sluigi continue; 203598943Sluigi for (n = 0, d = dynrules; n < ndyn; n++, d++) { 2036115793Sticso uint16_t rulenum; 2037115793Sticso 2038115793Sticso bcopy(&d->rule, &rulenum, sizeof(rulenum)); 2039115793Sticso if (rulenum > rnum) 204098943Sluigi break; 2041187764Sluigi if (co.use_set) { 2042171989Smaxim bcopy((char *)&d->rule + sizeof(uint16_t), 2043170923Smaxim &set, sizeof(uint8_t)); 2044187764Sluigi if (set != co.use_set - 1) 2045170923Smaxim continue; 2046170923Smaxim } 2047117469Sluigi if (r->rulenum >= rnum && r->rulenum <= last) 2048112189Smaxim show_dyn_ipfw(d, pcwidth, bcwidth); 204998943Sluigi } 205098943Sluigi } 205198943Sluigi } 205298943Sluigi 205398943Sluigi ac = 0; 205498943Sluigi 205598943Sluigidone: 205698943Sluigi free(data); 205798943Sluigi 205898943Sluigi if (exitval != EX_OK) 205998943Sluigi exit(exitval); 2060117469Sluigi#undef NEXT 206198943Sluigi} 206298943Sluigi 206398943Sluigistatic int 206498943Sluigilookup_host (char *host, struct in_addr *ipaddr) 206598943Sluigi{ 206698943Sluigi struct hostent *he; 206798943Sluigi 206898943Sluigi if (!inet_aton(host, ipaddr)) { 206998943Sluigi if ((he = gethostbyname(host)) == NULL) 207098943Sluigi return(-1); 207198943Sluigi *ipaddr = *(struct in_addr *)he->h_addr_list[0]; 207298943Sluigi } 207398943Sluigi return(0); 207498943Sluigi} 207598943Sluigi 207698943Sluigi/* 207798943Sluigi * fills the addr and mask fields in the instruction as appropriate from av. 207898943Sluigi * Update length as appropriate. 207998943Sluigi * The following formats are allowed: 208098943Sluigi * me returns O_IP_*_ME 208198943Sluigi * 1.2.3.4 single IP address 208298943Sluigi * 1.2.3.4:5.6.7.8 address:mask 208398943Sluigi * 1.2.3.4/24 address/mask 208498943Sluigi * 1.2.3.4/26{1,6,5,4,23} set of addresses in a subnet 2085117328Sluigi * We can have multiple comma-separated address/mask entries. 208698943Sluigi */ 208798943Sluigistatic void 2088248505Smelifarofill_ip(ipfw_insn_ip *cmd, char *av, int cblen) 208998943Sluigi{ 2090117328Sluigi int len = 0; 2091117328Sluigi uint32_t *d = ((ipfw_insn_u32 *)cmd)->d; 209298943Sluigi 209398943Sluigi cmd->o.len &= ~F_LEN_MASK; /* zero len */ 209498943Sluigi 2095140271Sbrooks if (_substrcmp(av, "any") == 0) 209698943Sluigi return; 209798943Sluigi 2098140271Sbrooks if (_substrcmp(av, "me") == 0) { 209998943Sluigi cmd->o.len |= F_INSN_SIZE(ipfw_insn); 210098943Sluigi return; 210198943Sluigi } 210298943Sluigi 2103140271Sbrooks if (strncmp(av, "table(", 6) == 0) { 2104130281Sru char *p = strchr(av + 6, ','); 2105130281Sru 2106130281Sru if (p) 2107130281Sru *p++ = '\0'; 2108130281Sru cmd->o.opcode = O_IP_DST_LOOKUP; 2109130281Sru cmd->o.arg1 = strtoul(av + 6, NULL, 0); 2110130281Sru if (p) { 2111130281Sru cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32); 2112130281Sru d[0] = strtoul(p, NULL, 0); 2113130281Sru } else 2114130281Sru cmd->o.len |= F_INSN_SIZE(ipfw_insn); 2115130281Sru return; 2116130281Sru } 2117130281Sru 2118117328Sluigi while (av) { 2119117328Sluigi /* 2120117328Sluigi * After the address we can have '/' or ':' indicating a mask, 2121117328Sluigi * ',' indicating another address follows, '{' indicating a 2122117328Sluigi * set of addresses of unspecified size. 2123117328Sluigi */ 2124165851Smlaier char *t = NULL, *p = strpbrk(av, "/:,{"); 2125117328Sluigi int masklen; 2126187477Sluigi char md, nd = '\0'; 2127117328Sluigi 2128248505Smelifaro CHECK_LENGTH(cblen, F_INSN_SIZE(ipfw_insn) + 2 + len); 2129248505Smelifaro 213098943Sluigi if (p) { 213198943Sluigi md = *p; 213298943Sluigi *p++ = '\0'; 2133165851Smlaier if ((t = strpbrk(p, ",{")) != NULL) { 2134165851Smlaier nd = *t; 2135165851Smlaier *t = '\0'; 2136165851Smlaier } 2137117328Sluigi } else 2138117328Sluigi md = '\0'; 213998943Sluigi 2140117328Sluigi if (lookup_host(av, (struct in_addr *)&d[0]) != 0) 214198943Sluigi errx(EX_NOHOST, "hostname ``%s'' unknown", av); 214298943Sluigi switch (md) { 214398943Sluigi case ':': 2144117328Sluigi if (!inet_aton(p, (struct in_addr *)&d[1])) 214598943Sluigi errx(EX_DATAERR, "bad netmask ``%s''", p); 214698943Sluigi break; 214798943Sluigi case '/': 2148117328Sluigi masklen = atoi(p); 2149117328Sluigi if (masklen == 0) 2150117328Sluigi d[1] = htonl(0); /* mask */ 2151117328Sluigi else if (masklen > 32) 215298943Sluigi errx(EX_DATAERR, "bad width ``%s''", p); 215398943Sluigi else 2154117328Sluigi d[1] = htonl(~0 << (32 - masklen)); 215598943Sluigi break; 2156117328Sluigi case '{': /* no mask, assume /24 and put back the '{' */ 2157117328Sluigi d[1] = htonl(~0 << (32 - 24)); 2158117328Sluigi *(--p) = md; 2159117328Sluigi break; 2160117328Sluigi 2161117328Sluigi case ',': /* single address plus continuation */ 2162117328Sluigi *(--p) = md; 2163117328Sluigi /* FALLTHROUGH */ 2164117328Sluigi case 0: /* initialization value */ 216598943Sluigi default: 2166117328Sluigi d[1] = htonl(~0); /* force /32 */ 216798943Sluigi break; 216898943Sluigi } 2169117328Sluigi d[0] &= d[1]; /* mask base address with mask */ 2170165851Smlaier if (t) 2171165851Smlaier *t = nd; 2172117328Sluigi /* find next separator */ 217398943Sluigi if (p) 2174117328Sluigi p = strpbrk(p, ",{"); 2175117328Sluigi if (p && *p == '{') { 2176117328Sluigi /* 2177117328Sluigi * We have a set of addresses. They are stored as follows: 2178117328Sluigi * arg1 is the set size (powers of 2, 2..256) 2179117328Sluigi * addr is the base address IN HOST FORMAT 2180117328Sluigi * mask.. is an array of arg1 bits (rounded up to 2181117328Sluigi * the next multiple of 32) with bits set 2182117328Sluigi * for each host in the map. 2183117328Sluigi */ 2184117328Sluigi uint32_t *map = (uint32_t *)&cmd->mask; 218598943Sluigi int low, high; 2186117577Sluigi int i = contigmask((uint8_t *)&(d[1]), 32); 218798943Sluigi 2188117328Sluigi if (len > 0) 2189117328Sluigi errx(EX_DATAERR, "address set cannot be in a list"); 2190117328Sluigi if (i < 24 || i > 31) 2191117328Sluigi errx(EX_DATAERR, "invalid set with mask %d\n", i); 2192117328Sluigi cmd->o.arg1 = 1<<(32-i); /* map length */ 2193117328Sluigi d[0] = ntohl(d[0]); /* base addr in host format */ 219498943Sluigi cmd->o.opcode = O_IP_DST_SET; /* default */ 219598943Sluigi cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32) + (cmd->o.arg1+31)/32; 2196101117Sluigi for (i = 0; i < (cmd->o.arg1+31)/32 ; i++) 2197117328Sluigi map[i] = 0; /* clear map */ 219898943Sluigi 2199117328Sluigi av = p + 1; 2200117328Sluigi low = d[0] & 0xff; 220198943Sluigi high = low + cmd->o.arg1 - 1; 2202117328Sluigi /* 2203117328Sluigi * Here, i stores the previous value when we specify a range 2204117328Sluigi * of addresses within a mask, e.g. 45-63. i = -1 means we 2205117328Sluigi * have no previous value. 2206117328Sluigi */ 2207116716Sluigi i = -1; /* previous value in a range */ 220898943Sluigi while (isdigit(*av)) { 220998943Sluigi char *s; 2210117328Sluigi int a = strtol(av, &s, 0); 221198943Sluigi 2212117328Sluigi if (s == av) { /* no parameter */ 2213117328Sluigi if (*av != '}') 2214117328Sluigi errx(EX_DATAERR, "set not closed\n"); 2215117328Sluigi if (i != -1) 2216117328Sluigi errx(EX_DATAERR, "incomplete range %d-", i); 2217117328Sluigi break; 2218117328Sluigi } 2219117328Sluigi if (a < low || a > high) 2220117328Sluigi errx(EX_DATAERR, "addr %d out of range [%d-%d]\n", 222198943Sluigi a, low, high); 222298943Sluigi a -= low; 2223116716Sluigi if (i == -1) /* no previous in range */ 2224116716Sluigi i = a; 2225116716Sluigi else { /* check that range is valid */ 2226116716Sluigi if (i > a) 2227116716Sluigi errx(EX_DATAERR, "invalid range %d-%d", 2228116716Sluigi i+low, a+low); 2229116716Sluigi if (*s == '-') 2230116716Sluigi errx(EX_DATAERR, "double '-' in range"); 2231116716Sluigi } 2232116716Sluigi for (; i <= a; i++) 2233117328Sluigi map[i/32] |= 1<<(i & 31); 2234116716Sluigi i = -1; 2235116716Sluigi if (*s == '-') 2236116716Sluigi i = a; 2237117328Sluigi else if (*s == '}') 2238116716Sluigi break; 223998943Sluigi av = s+1; 224098943Sluigi } 224198943Sluigi return; 224298943Sluigi } 2243117328Sluigi av = p; 2244117328Sluigi if (av) /* then *av must be a ',' */ 2245117328Sluigi av++; 224698943Sluigi 2247117328Sluigi /* Check this entry */ 2248117328Sluigi if (d[1] == 0) { /* "any", specified as x.x.x.x/0 */ 2249117328Sluigi /* 2250117328Sluigi * 'any' turns the entire list into a NOP. 2251117328Sluigi * 'not any' never matches, so it is removed from the 2252117328Sluigi * list unless it is the only item, in which case we 2253117328Sluigi * report an error. 2254117328Sluigi */ 2255117328Sluigi if (cmd->o.len & F_NOT) { /* "not any" never matches */ 2256117328Sluigi if (av == NULL && len == 0) /* only this entry */ 2257117328Sluigi errx(EX_DATAERR, "not any never matches"); 2258117328Sluigi } 2259117328Sluigi /* else do nothing and skip this entry */ 2260128067Smaxim return; 2261117328Sluigi } 2262117328Sluigi /* A single IP can be stored in an optimized format */ 2263204591Sluigi if (d[1] == (uint32_t)~0 && av == NULL && len == 0) { 226498943Sluigi cmd->o.len |= F_INSN_SIZE(ipfw_insn_u32); 2265117328Sluigi return; 2266117328Sluigi } 2267117328Sluigi len += 2; /* two words... */ 2268117328Sluigi d += 2; 2269117328Sluigi } /* end while */ 2270162363Sjhay if (len + 1 > F_LEN_MASK) 2271162363Sjhay errx(EX_DATAERR, "address list too long"); 2272117328Sluigi cmd->o.len |= len+1; 227398943Sluigi} 227498943Sluigi 227598943Sluigi 2276145246Sbrooks/* n2mask sets n bits of the mask */ 2277187769Sluigivoid 2278145246Sbrooksn2mask(struct in6_addr *mask, int n) 2279145246Sbrooks{ 2280145246Sbrooks static int minimask[9] = 2281145246Sbrooks { 0x00, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe, 0xff }; 2282145246Sbrooks u_char *p; 2283145246Sbrooks 2284145246Sbrooks memset(mask, 0, sizeof(struct in6_addr)); 2285145246Sbrooks p = (u_char *) mask; 2286145246Sbrooks for (; n > 0; p++, n -= 8) { 2287145246Sbrooks if (n >= 8) 2288145246Sbrooks *p = 0xff; 2289145246Sbrooks else 2290145246Sbrooks *p = minimask[n]; 2291145246Sbrooks } 2292145246Sbrooks return; 2293145246Sbrooks} 2294145246Sbrooks 229598943Sluigi/* 229698943Sluigi * helper function to process a set of flags and set bits in the 229798943Sluigi * appropriate masks. 229898943Sluigi */ 229998943Sluigistatic void 230098943Sluigifill_flags(ipfw_insn *cmd, enum ipfw_opcodes opcode, 230198943Sluigi struct _s_x *flags, char *p) 230298943Sluigi{ 2303117328Sluigi uint8_t set=0, clear=0; 230498943Sluigi 230598943Sluigi while (p && *p) { 230698943Sluigi char *q; /* points to the separator */ 230798943Sluigi int val; 2308117328Sluigi uint8_t *which; /* mask we are working on */ 230998943Sluigi 231098943Sluigi if (*p == '!') { 231198943Sluigi p++; 231298943Sluigi which = &clear; 231398943Sluigi } else 231498943Sluigi which = &set; 231598943Sluigi q = strchr(p, ','); 231698943Sluigi if (q) 231798943Sluigi *q++ = '\0'; 231898943Sluigi val = match_token(flags, p); 231998943Sluigi if (val <= 0) 232098943Sluigi errx(EX_DATAERR, "invalid flag %s", p); 2321117328Sluigi *which |= (uint8_t)val; 232298943Sluigi p = q; 232398943Sluigi } 2324220802Sglebius cmd->opcode = opcode; 2325220802Sglebius cmd->len = (cmd->len & (F_NOT | F_OR)) | 1; 2326220802Sglebius cmd->arg1 = (set & 0xff) | ( (clear & 0xff) << 8); 232798943Sluigi} 232898943Sluigi 232998943Sluigi 2330187767Sluigivoid 2331204591Sluigiipfw_delete(char *av[]) 233298943Sluigi{ 2333117328Sluigi uint32_t rulenum; 233498943Sluigi int i; 233598943Sluigi int exitval = EX_OK; 2336101628Sluigi int do_set = 0; 233798943Sluigi 2338204591Sluigi av++; 2339130013Scsjp NEED1("missing rule specification"); 2340204591Sluigi if ( *av && _substrcmp(*av, "set") == 0) { 2341170923Smaxim /* Do not allow using the following syntax: 2342170923Smaxim * ipfw set N delete set M 2343170923Smaxim */ 2344187764Sluigi if (co.use_set) 2345170923Smaxim errx(EX_DATAERR, "invalid syntax"); 2346101978Sluigi do_set = 1; /* delete set */ 2347204591Sluigi av++; 2348101978Sluigi } 234998943Sluigi 235098943Sluigi /* Rule number */ 2351204591Sluigi while (*av && isdigit(**av)) { 2352204591Sluigi i = atoi(*av); av++; 2353187764Sluigi if (co.do_nat) { 2354165648Spiso exitval = do_cmd(IP_FW_NAT_DEL, &i, sizeof i); 2355165648Spiso if (exitval) { 2356165648Spiso exitval = EX_UNAVAILABLE; 2357165648Spiso warn("rule %u not available", i); 2358165648Spiso } 2359187764Sluigi } else if (co.do_pipe) { 2360187769Sluigi exitval = ipfw_delete_pipe(co.do_pipe, i); 236198943Sluigi } else { 2362187764Sluigi if (co.use_set) 2363170923Smaxim rulenum = (i & 0xffff) | (5 << 24) | 2364187764Sluigi ((co.use_set - 1) << 16); 2365170923Smaxim else 2366101978Sluigi rulenum = (i & 0xffff) | (do_set << 24); 2367117328Sluigi i = do_cmd(IP_FW_DEL, &rulenum, sizeof rulenum); 236898943Sluigi if (i) { 236998943Sluigi exitval = EX_UNAVAILABLE; 237098943Sluigi warn("rule %u: setsockopt(IP_FW_DEL)", 237198943Sluigi rulenum); 237298943Sluigi } 237398943Sluigi } 237498943Sluigi } 237598943Sluigi if (exitval != EX_OK) 237698943Sluigi exit(exitval); 237798943Sluigi} 237898943Sluigi 237998943Sluigi 238098943Sluigi/* 238198943Sluigi * fill the interface structure. We do not check the name as we can 238298943Sluigi * create interfaces dynamically, so checking them at insert time 238398943Sluigi * makes relatively little sense. 2384220802Sglebius * Interface names containing '*', '?', or '[' are assumed to be shell 2385121816Sbrooks * patterns which match interfaces. 238698943Sluigi */ 238798943Sluigistatic void 2388248505Smelifarofill_iface(ipfw_insn_if *cmd, char *arg, int cblen) 238998943Sluigi{ 239098943Sluigi cmd->name[0] = '\0'; 239198943Sluigi cmd->o.len |= F_INSN_SIZE(ipfw_insn_if); 239298943Sluigi 2393248505Smelifaro CHECK_CMDLEN; 2394248505Smelifaro 239598943Sluigi /* Parse the interface or address */ 2396140271Sbrooks if (strcmp(arg, "any") == 0) 239798943Sluigi cmd->o.len = 0; /* effectively ignore this command */ 2398234597Smelifaro else if (strncmp(arg, "table(", 6) == 0) { 2399234597Smelifaro char *p = strchr(arg + 6, ','); 2400234597Smelifaro if (p) 2401234597Smelifaro *p++ = '\0'; 2402234597Smelifaro cmd->name[0] = '\1'; /* Special value indicating table */ 2403234597Smelifaro cmd->p.glob = strtoul(arg + 6, NULL, 0); 2404234597Smelifaro } else if (!isdigit(*arg)) { 2405121816Sbrooks strlcpy(cmd->name, arg, sizeof(cmd->name)); 2406121816Sbrooks cmd->p.glob = strpbrk(arg, "*?[") != NULL ? 1 : 0; 240798943Sluigi } else if (!inet_aton(arg, &cmd->p.ip)) 240898943Sluigi errx(EX_DATAERR, "bad ip address ``%s''", arg); 240998943Sluigi} 241098943Sluigi 241198943Sluigistatic void 2412169424Smaximget_mac_addr_mask(const char *p, uint8_t *addr, uint8_t *mask) 241398943Sluigi{ 2414204591Sluigi int i; 2415204591Sluigi size_t l; 2416169424Smaxim char *ap, *ptr, *optr; 2417169424Smaxim struct ether_addr *mac; 2418169424Smaxim const char *macset = "0123456789abcdefABCDEF:"; 241998943Sluigi 2420169424Smaxim if (strcmp(p, "any") == 0) { 2421169424Smaxim for (i = 0; i < ETHER_ADDR_LEN; i++) 2422169424Smaxim addr[i] = mask[i] = 0; 242398943Sluigi return; 2424169424Smaxim } 242598943Sluigi 2426169424Smaxim optr = ptr = strdup(p); 2427169424Smaxim if ((ap = strsep(&ptr, "&/")) != NULL && *ap != 0) { 2428169424Smaxim l = strlen(ap); 2429169424Smaxim if (strspn(ap, macset) != l || (mac = ether_aton(ap)) == NULL) 2430169424Smaxim errx(EX_DATAERR, "Incorrect MAC address"); 2431169424Smaxim bcopy(mac, addr, ETHER_ADDR_LEN); 2432169424Smaxim } else 2433169424Smaxim errx(EX_DATAERR, "Incorrect MAC address"); 2434169424Smaxim 2435169424Smaxim if (ptr != NULL) { /* we have mask? */ 2436169424Smaxim if (p[ptr - optr - 1] == '/') { /* mask len */ 2437204591Sluigi long ml = strtol(ptr, &ap, 10); 2438204591Sluigi if (*ap != 0 || ml > ETHER_ADDR_LEN * 8 || ml < 0) 2439169424Smaxim errx(EX_DATAERR, "Incorrect mask length"); 2440204591Sluigi for (i = 0; ml > 0 && i < ETHER_ADDR_LEN; ml -= 8, i++) 2441204591Sluigi mask[i] = (ml >= 8) ? 0xff: (~0) << (8 - ml); 2442169424Smaxim } else { /* mask */ 2443169424Smaxim l = strlen(ptr); 2444169424Smaxim if (strspn(ptr, macset) != l || 2445169424Smaxim (mac = ether_aton(ptr)) == NULL) 2446169424Smaxim errx(EX_DATAERR, "Incorrect mask"); 2447169424Smaxim bcopy(mac, mask, ETHER_ADDR_LEN); 244898943Sluigi } 2449169424Smaxim } else { /* default mask: ff:ff:ff:ff:ff:ff */ 2450169424Smaxim for (i = 0; i < ETHER_ADDR_LEN; i++) 245198943Sluigi mask[i] = 0xff; 245298943Sluigi } 2453169424Smaxim for (i = 0; i < ETHER_ADDR_LEN; i++) 245498943Sluigi addr[i] &= mask[i]; 2455169424Smaxim 2456169424Smaxim free(optr); 245798943Sluigi} 245898943Sluigi 245998943Sluigi/* 246098943Sluigi * helper function, updates the pointer to cmd with the length 246198943Sluigi * of the current command, and also cleans up the first word of 246298943Sluigi * the new command in case it has been clobbered before. 246398943Sluigi */ 246498943Sluigistatic ipfw_insn * 2465248505Smelifaronext_cmd(ipfw_insn *cmd, int *len) 246698943Sluigi{ 2467248505Smelifaro *len -= F_LEN(cmd); 2468248505Smelifaro CHECK_LENGTH(*len, 0); 246998943Sluigi cmd += F_LEN(cmd); 247098943Sluigi bzero(cmd, sizeof(*cmd)); 247198943Sluigi return cmd; 247298943Sluigi} 247398943Sluigi 247498943Sluigi/* 2475117469Sluigi * Takes arguments and copies them into a comment 2476117469Sluigi */ 2477117469Sluigistatic void 2478248505Smelifarofill_comment(ipfw_insn *cmd, char **av, int cblen) 2479117469Sluigi{ 2480117469Sluigi int i, l; 2481117469Sluigi char *p = (char *)(cmd + 1); 2482117577Sluigi 2483117469Sluigi cmd->opcode = O_NOP; 2484117469Sluigi cmd->len = (cmd->len & (F_NOT | F_OR)); 2485117469Sluigi 2486117469Sluigi /* Compute length of comment string. */ 2487204591Sluigi for (i = 0, l = 0; av[i] != NULL; i++) 2488117469Sluigi l += strlen(av[i]) + 1; 2489117469Sluigi if (l == 0) 2490117469Sluigi return; 2491117469Sluigi if (l > 84) 2492117469Sluigi errx(EX_DATAERR, 2493117469Sluigi "comment too long (max 80 chars)"); 2494117469Sluigi l = 1 + (l+3)/4; 2495117469Sluigi cmd->len = (cmd->len & (F_NOT | F_OR)) | l; 2496248505Smelifaro CHECK_CMDLEN; 2497248505Smelifaro 2498204591Sluigi for (i = 0; av[i] != NULL; i++) { 2499117469Sluigi strcpy(p, av[i]); 2500117469Sluigi p += strlen(av[i]); 2501117469Sluigi *p++ = ' '; 2502117469Sluigi } 2503117469Sluigi *(--p) = '\0'; 2504117469Sluigi} 2505117577Sluigi 2506117469Sluigi/* 250798943Sluigi * A function to fill simple commands of size 1. 250898943Sluigi * Existing flags are preserved. 250998943Sluigi */ 251098943Sluigistatic void 2511117328Sluigifill_cmd(ipfw_insn *cmd, enum ipfw_opcodes opcode, int flags, uint16_t arg) 251298943Sluigi{ 251398943Sluigi cmd->opcode = opcode; 251498943Sluigi cmd->len = ((cmd->len | flags) & (F_NOT | F_OR)) | 1; 251598943Sluigi cmd->arg1 = arg; 251698943Sluigi} 251798943Sluigi 251898943Sluigi/* 251998943Sluigi * Fetch and add the MAC address and type, with masks. This generates one or 252098943Sluigi * two microinstructions, and returns the pointer to the last one. 252198943Sluigi */ 252298943Sluigistatic ipfw_insn * 2523248505Smelifaroadd_mac(ipfw_insn *cmd, char *av[], int cblen) 252498943Sluigi{ 2525102087Sluigi ipfw_insn_mac *mac; 252698943Sluigi 2527204591Sluigi if ( ( av[0] == NULL ) || ( av[1] == NULL ) ) 2528102098Sluigi errx(EX_DATAERR, "MAC dst src"); 252998943Sluigi 253098943Sluigi cmd->opcode = O_MACADDR2; 253198943Sluigi cmd->len = (cmd->len & (F_NOT | F_OR)) | F_INSN_SIZE(ipfw_insn_mac); 2532248505Smelifaro CHECK_CMDLEN; 253398943Sluigi 253498943Sluigi mac = (ipfw_insn_mac *)cmd; 2535101978Sluigi get_mac_addr_mask(av[0], mac->addr, mac->mask); /* dst */ 2536169424Smaxim get_mac_addr_mask(av[1], &(mac->addr[ETHER_ADDR_LEN]), 2537169424Smaxim &(mac->mask[ETHER_ADDR_LEN])); /* src */ 2538102087Sluigi return cmd; 2539102087Sluigi} 254098943Sluigi 2541102087Sluigistatic ipfw_insn * 2542248505Smelifaroadd_mactype(ipfw_insn *cmd, char *av, int cblen) 2543102087Sluigi{ 2544204591Sluigi if (!av) 2545102087Sluigi errx(EX_DATAERR, "missing MAC type"); 2546102087Sluigi if (strcmp(av, "any") != 0) { /* we have a non-null type */ 2547248505Smelifaro fill_newports((ipfw_insn_u16 *)cmd, av, IPPROTO_ETHERTYPE, 2548248505Smelifaro cblen); 254998943Sluigi cmd->opcode = O_MAC_TYPE; 2550102087Sluigi return cmd; 2551102087Sluigi } else 2552102087Sluigi return NULL; 2553102087Sluigi} 255498943Sluigi 2555102087Sluigistatic ipfw_insn * 2556152923Sumeadd_proto0(ipfw_insn *cmd, char *av, u_char *protop) 2557102087Sluigi{ 2558102087Sluigi struct protoent *pe; 2559152923Sume char *ep; 2560152923Sume int proto; 2561102087Sluigi 2562156315Sume proto = strtol(av, &ep, 10); 2563156315Sume if (*ep != '\0' || proto <= 0) { 2564152923Sume if ((pe = getprotobyname(av)) == NULL) 2565152923Sume return NULL; 2566152923Sume proto = pe->p_proto; 2567152923Sume } 2568145246Sbrooks 2569152923Sume fill_cmd(cmd, O_PROTO, 0, proto); 2570152923Sume *protop = proto; 2571152923Sume return cmd; 2572152923Sume} 2573152923Sume 2574152923Sumestatic ipfw_insn * 2575152923Sumeadd_proto(ipfw_insn *cmd, char *av, u_char *protop) 2576152923Sume{ 2577152923Sume u_char proto = IPPROTO_IP; 2578152923Sume 2579156315Sume if (_substrcmp(av, "all") == 0 || strcmp(av, "ip") == 0) 2580146894Smlaier ; /* do not set O_IP4 nor O_IP6 */ 2581152923Sume else if (strcmp(av, "ip4") == 0) 2582152923Sume /* explicit "just IPv4" rule */ 2583152923Sume fill_cmd(cmd, O_IP4, 0, 0); 2584152923Sume else if (strcmp(av, "ip6") == 0) { 2585152923Sume /* explicit "just IPv6" rule */ 2586152923Sume proto = IPPROTO_IPV6; 2587152923Sume fill_cmd(cmd, O_IP6, 0, 0); 2588152923Sume } else 2589152923Sume return add_proto0(cmd, av, protop); 2590152923Sume 2591152923Sume *protop = proto; 2592152923Sume return cmd; 2593152923Sume} 2594152923Sume 2595152923Sumestatic ipfw_insn * 2596152923Sumeadd_proto_compat(ipfw_insn *cmd, char *av, u_char *protop) 2597152923Sume{ 2598152923Sume u_char proto = IPPROTO_IP; 2599152923Sume 2600152923Sume if (_substrcmp(av, "all") == 0 || strcmp(av, "ip") == 0) 2601152923Sume ; /* do not set O_IP4 nor O_IP6 */ 2602146894Smlaier else if (strcmp(av, "ipv4") == 0 || strcmp(av, "ip4") == 0) 2603146894Smlaier /* explicit "just IPv4" rule */ 2604146894Smlaier fill_cmd(cmd, O_IP4, 0, 0); 2605146894Smlaier else if (strcmp(av, "ipv6") == 0 || strcmp(av, "ip6") == 0) { 2606146894Smlaier /* explicit "just IPv6" rule */ 2607152923Sume proto = IPPROTO_IPV6; 2608146894Smlaier fill_cmd(cmd, O_IP6, 0, 0); 2609152923Sume } else 2610152923Sume return add_proto0(cmd, av, protop); 2611145246Sbrooks 2612152923Sume *protop = proto; 261398943Sluigi return cmd; 261498943Sluigi} 261598943Sluigi 2616102087Sluigistatic ipfw_insn * 2617248505Smelifaroadd_srcip(ipfw_insn *cmd, char *av, int cblen) 2618102087Sluigi{ 2619248505Smelifaro fill_ip((ipfw_insn_ip *)cmd, av, cblen); 2620102087Sluigi if (cmd->opcode == O_IP_DST_SET) /* set */ 2621102087Sluigi cmd->opcode = O_IP_SRC_SET; 2622130281Sru else if (cmd->opcode == O_IP_DST_LOOKUP) /* table */ 2623130281Sru cmd->opcode = O_IP_SRC_LOOKUP; 2624102087Sluigi else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn)) /* me */ 2625102087Sluigi cmd->opcode = O_IP_SRC_ME; 2626102087Sluigi else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn_u32)) /* one IP */ 2627102087Sluigi cmd->opcode = O_IP_SRC; 2628117328Sluigi else /* addr/mask */ 2629102087Sluigi cmd->opcode = O_IP_SRC_MASK; 2630102087Sluigi return cmd; 2631102087Sluigi} 2632102087Sluigi 2633102087Sluigistatic ipfw_insn * 2634248505Smelifaroadd_dstip(ipfw_insn *cmd, char *av, int cblen) 2635102087Sluigi{ 2636248505Smelifaro fill_ip((ipfw_insn_ip *)cmd, av, cblen); 2637102087Sluigi if (cmd->opcode == O_IP_DST_SET) /* set */ 2638102087Sluigi ; 2639130281Sru else if (cmd->opcode == O_IP_DST_LOOKUP) /* table */ 2640130281Sru ; 2641102087Sluigi else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn)) /* me */ 2642102087Sluigi cmd->opcode = O_IP_DST_ME; 2643102087Sluigi else if (F_LEN(cmd) == F_INSN_SIZE(ipfw_insn_u32)) /* one IP */ 2644102087Sluigi cmd->opcode = O_IP_DST; 2645117328Sluigi else /* addr/mask */ 2646102087Sluigi cmd->opcode = O_IP_DST_MASK; 2647102087Sluigi return cmd; 2648102087Sluigi} 2649102087Sluigi 2650102087Sluigistatic ipfw_insn * 2651248505Smelifaroadd_ports(ipfw_insn *cmd, char *av, u_char proto, int opcode, int cblen) 2652102087Sluigi{ 2653204591Sluigi /* XXX "any" is trapped before. Perhaps "to" */ 2654140271Sbrooks if (_substrcmp(av, "any") == 0) { 2655102087Sluigi return NULL; 2656248505Smelifaro } else if (fill_newports((ipfw_insn_u16 *)cmd, av, proto, cblen)) { 2657102087Sluigi /* XXX todo: check that we have a protocol with ports */ 2658102087Sluigi cmd->opcode = opcode; 2659102087Sluigi return cmd; 2660102087Sluigi } 2661102087Sluigi return NULL; 2662102087Sluigi} 2663102087Sluigi 2664145246Sbrooksstatic ipfw_insn * 2665248505Smelifaroadd_src(ipfw_insn *cmd, char *av, u_char proto, int cblen) 2666145246Sbrooks{ 2667145246Sbrooks struct in6_addr a; 2668158553Smlaier char *host, *ch; 2669158553Smlaier ipfw_insn *ret = NULL; 2670145246Sbrooks 2671158553Smlaier if ((host = strdup(av)) == NULL) 2672158553Smlaier return NULL; 2673158553Smlaier if ((ch = strrchr(host, '/')) != NULL) 2674158553Smlaier *ch = '\0'; 2675158553Smlaier 2676145246Sbrooks if (proto == IPPROTO_IPV6 || strcmp(av, "me6") == 0 || 2677204591Sluigi inet_pton(AF_INET6, host, &a) == 1) 2678248505Smelifaro ret = add_srcip6(cmd, av, cblen); 2679145246Sbrooks /* XXX: should check for IPv4, not !IPv6 */ 2680161483Sdwmalone if (ret == NULL && (proto == IPPROTO_IP || strcmp(av, "me") == 0 || 2681204591Sluigi inet_pton(AF_INET6, host, &a) != 1)) 2682248505Smelifaro ret = add_srcip(cmd, av, cblen); 2683161483Sdwmalone if (ret == NULL && strcmp(av, "any") != 0) 2684158553Smlaier ret = cmd; 2685145246Sbrooks 2686158553Smlaier free(host); 2687158553Smlaier return ret; 2688145246Sbrooks} 2689145246Sbrooks 2690145246Sbrooksstatic ipfw_insn * 2691248505Smelifaroadd_dst(ipfw_insn *cmd, char *av, u_char proto, int cblen) 2692145246Sbrooks{ 2693145246Sbrooks struct in6_addr a; 2694158553Smlaier char *host, *ch; 2695158553Smlaier ipfw_insn *ret = NULL; 2696145246Sbrooks 2697158553Smlaier if ((host = strdup(av)) == NULL) 2698158553Smlaier return NULL; 2699158553Smlaier if ((ch = strrchr(host, '/')) != NULL) 2700158553Smlaier *ch = '\0'; 2701158553Smlaier 2702145246Sbrooks if (proto == IPPROTO_IPV6 || strcmp(av, "me6") == 0 || 2703204591Sluigi inet_pton(AF_INET6, host, &a) == 1) 2704248505Smelifaro ret = add_dstip6(cmd, av, cblen); 2705145246Sbrooks /* XXX: should check for IPv4, not !IPv6 */ 2706161483Sdwmalone if (ret == NULL && (proto == IPPROTO_IP || strcmp(av, "me") == 0 || 2707204591Sluigi inet_pton(AF_INET6, host, &a) != 1)) 2708248505Smelifaro ret = add_dstip(cmd, av, cblen); 2709161483Sdwmalone if (ret == NULL && strcmp(av, "any") != 0) 2710158553Smlaier ret = cmd; 2711145246Sbrooks 2712158553Smlaier free(host); 2713158553Smlaier return ret; 2714145246Sbrooks} 2715145246Sbrooks 271698943Sluigi/* 271798943Sluigi * Parse arguments and assemble the microinstructions which make up a rule. 271898943Sluigi * Rules are added into the 'rulebuf' and then copied in the correct order 271998943Sluigi * into the actual rule. 272098943Sluigi * 2721136071Sgreen * The syntax for a rule starts with the action, followed by 2722136071Sgreen * optional action parameters, and the various match patterns. 2723108533Sschweikh * In the assembled microcode, the first opcode must be an O_PROBE_STATE 272498943Sluigi * (generated if the rule includes a keep-state option), then the 2725136071Sgreen * various match patterns, log/altq actions, and the actual action. 2726106505Smaxim * 272798943Sluigi */ 2728187767Sluigivoid 2729204591Sluigiipfw_add(char *av[]) 273098943Sluigi{ 273198943Sluigi /* 273298943Sluigi * rules are added into the 'rulebuf' and then copied in 273398943Sluigi * the correct order into the actual rule. 273498943Sluigi * Some things that need to go out of order (prob, action etc.) 273598943Sluigi * go into actbuf[]. 273698943Sluigi */ 2737117328Sluigi static uint32_t rulebuf[255], actbuf[255], cmdbuf[255]; 2738248505Smelifaro int rblen, ablen, cblen; 273998943Sluigi 2740117469Sluigi ipfw_insn *src, *dst, *cmd, *action, *prev=NULL; 2741102087Sluigi ipfw_insn *first_cmd; /* first match pattern */ 274298943Sluigi 274398943Sluigi struct ip_fw *rule; 274498943Sluigi 274598943Sluigi /* 274698943Sluigi * various flags used to record that we entered some fields. 274798943Sluigi */ 2748101116Sluigi ipfw_insn *have_state = NULL; /* check-state or keep-state */ 2749158879Soleg ipfw_insn *have_log = NULL, *have_altq = NULL, *have_tag = NULL; 2750134475Smaxim size_t len; 275198943Sluigi 275298943Sluigi int i; 275398943Sluigi 275498943Sluigi int open_par = 0; /* open parenthesis ( */ 275598943Sluigi 275698943Sluigi /* proto is here because it is used to fetch ports */ 275798943Sluigi u_char proto = IPPROTO_IP; /* default protocol */ 275898943Sluigi 2759107289Sluigi double match_prob = 1; /* match probability, default is always match */ 2760107289Sluigi 276198943Sluigi bzero(actbuf, sizeof(actbuf)); /* actions go here */ 276298943Sluigi bzero(cmdbuf, sizeof(cmdbuf)); 276398943Sluigi bzero(rulebuf, sizeof(rulebuf)); 276498943Sluigi 276598943Sluigi rule = (struct ip_fw *)rulebuf; 276698943Sluigi cmd = (ipfw_insn *)cmdbuf; 276798943Sluigi action = (ipfw_insn *)actbuf; 276898943Sluigi 2769248505Smelifaro rblen = sizeof(rulebuf) / sizeof(rulebuf[0]); 2770248505Smelifaro rblen -= offsetof(struct ip_fw, cmd) / sizeof(rulebuf[0]); 2771248505Smelifaro ablen = sizeof(actbuf) / sizeof(actbuf[0]); 2772248505Smelifaro cblen = sizeof(cmdbuf) / sizeof(cmdbuf[0]); 2773248505Smelifaro cblen -= F_INSN_SIZE(ipfw_insn_u32) + 1; 2774248505Smelifaro 2775248505Smelifaro#define CHECK_RBUFLEN(len) { CHECK_LENGTH(rblen, len); rblen -= len; } 2776248505Smelifaro#define CHECK_ACTLEN CHECK_LENGTH(ablen, action->len) 2777248505Smelifaro 2778204591Sluigi av++; 277998943Sluigi 278098943Sluigi /* [rule N] -- Rule number optional */ 2781204591Sluigi if (av[0] && isdigit(**av)) { 278298943Sluigi rule->rulenum = atoi(*av); 278398943Sluigi av++; 278498943Sluigi } 278598943Sluigi 2786117655Sluigi /* [set N] -- set number (0..RESVD_SET), optional */ 2787205631Sluigi if (av[0] && av[1] && _substrcmp(*av, "set") == 0) { 2788101628Sluigi int set = strtoul(av[1], NULL, 10); 2789117655Sluigi if (set < 0 || set > RESVD_SET) 2790101628Sluigi errx(EX_DATAERR, "illegal set %s", av[1]); 2791101628Sluigi rule->set = set; 2792204591Sluigi av += 2; 2793101628Sluigi } 2794101628Sluigi 279598943Sluigi /* [prob D] -- match probability, optional */ 2796204591Sluigi if (av[0] && av[1] && _substrcmp(*av, "prob") == 0) { 2797107289Sluigi match_prob = strtod(av[1], NULL); 279898943Sluigi 2799107289Sluigi if (match_prob <= 0 || match_prob > 1) 280098943Sluigi errx(EX_DATAERR, "illegal match prob. %s", av[1]); 2801204591Sluigi av += 2; 280298943Sluigi } 280398943Sluigi 280498943Sluigi /* action -- mandatory */ 280598943Sluigi NEED1("missing action"); 280698943Sluigi i = match_token(rule_actions, *av); 2807204591Sluigi av++; 280898943Sluigi action->len = 1; /* default */ 2809248505Smelifaro CHECK_ACTLEN; 281098943Sluigi switch(i) { 281198943Sluigi case TOK_CHECKSTATE: 2812101116Sluigi have_state = action; 281398943Sluigi action->opcode = O_CHECK_STATE; 281498943Sluigi break; 281598943Sluigi 281698943Sluigi case TOK_ACCEPT: 281798943Sluigi action->opcode = O_ACCEPT; 281898943Sluigi break; 281998943Sluigi 282098943Sluigi case TOK_DENY: 282198943Sluigi action->opcode = O_DENY; 282299475Sluigi action->arg1 = 0; 282398943Sluigi break; 282498943Sluigi 282599475Sluigi case TOK_REJECT: 282699475Sluigi action->opcode = O_REJECT; 282799475Sluigi action->arg1 = ICMP_UNREACH_HOST; 282899475Sluigi break; 282999475Sluigi 283099475Sluigi case TOK_RESET: 283199475Sluigi action->opcode = O_REJECT; 283299475Sluigi action->arg1 = ICMP_REJECT_RST; 283399475Sluigi break; 283499475Sluigi 2835149020Sbz case TOK_RESET6: 2836149020Sbz action->opcode = O_UNREACH6; 2837149020Sbz action->arg1 = ICMP6_UNREACH_RST; 2838149020Sbz break; 2839149020Sbz 284099475Sluigi case TOK_UNREACH: 284199475Sluigi action->opcode = O_REJECT; 284299475Sluigi NEED1("missing reject code"); 284399475Sluigi fill_reject_code(&action->arg1, *av); 2844204591Sluigi av++; 284599475Sluigi break; 284699475Sluigi 2847149020Sbz case TOK_UNREACH6: 2848149020Sbz action->opcode = O_UNREACH6; 2849149020Sbz NEED1("missing unreach code"); 2850149020Sbz fill_unreach6_code(&action->arg1, *av); 2851204591Sluigi av++; 2852149020Sbz break; 2853149020Sbz 285498943Sluigi case TOK_COUNT: 285598943Sluigi action->opcode = O_COUNT; 285698943Sluigi break; 285798943Sluigi 2858176517Spiso case TOK_NAT: 2859223080Sae action->opcode = O_NAT; 2860223080Sae action->len = F_INSN_SIZE(ipfw_insn_nat); 2861248505Smelifaro CHECK_ACTLEN; 2862223080Sae if (_substrcmp(*av, "global") == 0) { 2863223080Sae action->arg1 = 0; 2864223080Sae av++; 2865223080Sae break; 2866223080Sae } else 2867223080Sae goto chkarg; 2868178888Sjulian 286998943Sluigi case TOK_QUEUE: 2870153374Sglebius action->opcode = O_QUEUE; 2871153374Sglebius goto chkarg; 287298943Sluigi case TOK_PIPE: 2873153374Sglebius action->opcode = O_PIPE; 2874153374Sglebius goto chkarg; 287598943Sluigi case TOK_SKIPTO: 2876153374Sglebius action->opcode = O_SKIPTO; 2877153374Sglebius goto chkarg; 2878153374Sglebius case TOK_NETGRAPH: 2879153374Sglebius action->opcode = O_NETGRAPH; 2880153374Sglebius goto chkarg; 2881153374Sglebius case TOK_NGTEE: 2882153374Sglebius action->opcode = O_NGTEE; 2883153374Sglebius goto chkarg; 288498943Sluigi case TOK_DIVERT: 2885153374Sglebius action->opcode = O_DIVERT; 2886153374Sglebius goto chkarg; 288798943Sluigi case TOK_TEE: 2888153374Sglebius action->opcode = O_TEE; 2889223666Sae goto chkarg; 2890223666Sae case TOK_CALL: 2891223666Sae action->opcode = O_CALLRETURN; 2892220804Sglebiuschkarg: 2893204591Sluigi if (!av[0]) 2894153374Sglebius errx(EX_USAGE, "missing argument for %s", *(av - 1)); 2895153374Sglebius if (isdigit(**av)) { 2896153374Sglebius action->arg1 = strtoul(*av, NULL, 10); 2897153374Sglebius if (action->arg1 <= 0 || action->arg1 >= IP_FW_TABLEARG) 2898153374Sglebius errx(EX_DATAERR, "illegal argument for %s", 2899153374Sglebius *(av - 1)); 2900187762Sluigi } else if (_substrcmp(*av, "tablearg") == 0) { 2901153374Sglebius action->arg1 = IP_FW_TABLEARG; 2902153374Sglebius } else if (i == TOK_DIVERT || i == TOK_TEE) { 290398943Sluigi struct servent *s; 290498943Sluigi setservent(1); 290598943Sluigi s = getservbyname(av[0], "divert"); 290698943Sluigi if (s != NULL) 290798943Sluigi action->arg1 = ntohs(s->s_port); 290898943Sluigi else 290998943Sluigi errx(EX_DATAERR, "illegal divert/tee port"); 2910153374Sglebius } else 2911153374Sglebius errx(EX_DATAERR, "illegal argument for %s", *(av - 1)); 2912204591Sluigi av++; 291398943Sluigi break; 291498943Sluigi 291598943Sluigi case TOK_FORWARD: { 2916225044Sbz /* 2917225044Sbz * Locate the address-port separator (':' or ','). 2918225044Sbz * Could be one of the following: 2919225044Sbz * hostname:port 2920225044Sbz * IPv4 a.b.c.d,port 2921225044Sbz * IPv4 a.b.c.d:port 2922225044Sbz * IPv6 w:x:y::z,port 2923225044Sbz * The ':' can only be used with hostname and IPv4 address. 2924225044Sbz * XXX-BZ Should we also support [w:x:y::z]:port? 2925225044Sbz */ 2926225044Sbz struct sockaddr_storage result; 2927225044Sbz struct addrinfo *res; 292898943Sluigi char *s, *end; 2929225044Sbz int family; 2930225044Sbz u_short port_number; 293198943Sluigi 293298943Sluigi NEED1("missing forward address[:port]"); 293398943Sluigi 2934188005Sluigi /* 293598943Sluigi * locate the address-port separator (':' or ',') 293698943Sluigi */ 2937225044Sbz s = strchr(*av, ','); 2938225044Sbz if (s == NULL) { 2939225044Sbz /* Distinguish between IPv4:port and IPv6 cases. */ 2940225044Sbz s = strchr(*av, ':'); 2941225044Sbz if (s && strchr(s+1, ':')) 2942225044Sbz s = NULL; /* no port */ 2943225044Sbz } 2944225044Sbz 2945225044Sbz port_number = 0; 294698943Sluigi if (s != NULL) { 2947225044Sbz /* Terminate host portion and set s to start of port. */ 294898943Sluigi *(s++) = '\0'; 294998943Sluigi i = strtoport(s, &end, 0 /* base */, 0 /* proto */); 295098943Sluigi if (s == end) 295198943Sluigi errx(EX_DATAERR, 295298943Sluigi "illegal forwarding port ``%s''", s); 2953225044Sbz port_number = (u_short)i; 295498943Sluigi } 2955225044Sbz 2956225044Sbz if (_substrcmp(*av, "tablearg") == 0) { 2957225044Sbz family = PF_INET; 2958225044Sbz ((struct sockaddr_in*)&result)->sin_addr.s_addr = 2959225044Sbz INADDR_ANY; 2960225044Sbz } else { 2961225044Sbz /* 2962225044Sbz * Resolve the host name or address to a family and a 2963225044Sbz * network representation of the addres. 2964225044Sbz */ 2965225044Sbz if (getaddrinfo(*av, NULL, NULL, &res)) 2966225044Sbz errx(EX_DATAERR, NULL); 2967225044Sbz /* Just use the first host in the answer. */ 2968225044Sbz family = res->ai_family; 2969225044Sbz memcpy(&result, res->ai_addr, res->ai_addrlen); 2970225044Sbz freeaddrinfo(res); 2971225044Sbz } 2972225044Sbz 2973225044Sbz if (family == PF_INET) { 2974225044Sbz ipfw_insn_sa *p = (ipfw_insn_sa *)action; 2975225044Sbz 2976225044Sbz action->opcode = O_FORWARD_IP; 2977225044Sbz action->len = F_INSN_SIZE(ipfw_insn_sa); 2978248505Smelifaro CHECK_ACTLEN; 2979225044Sbz 2980225044Sbz /* 2981225044Sbz * In the kernel we assume AF_INET and use only 2982225044Sbz * sin_port and sin_addr. Remember to set sin_len as 2983225044Sbz * the routing code seems to use it too. 2984225044Sbz */ 2985225044Sbz p->sa.sin_len = sizeof(struct sockaddr_in); 2986225044Sbz p->sa.sin_family = AF_INET; 2987225044Sbz p->sa.sin_port = port_number; 2988225044Sbz p->sa.sin_addr.s_addr = 2989225044Sbz ((struct sockaddr_in *)&result)->sin_addr.s_addr; 2990225044Sbz } else if (family == PF_INET6) { 2991225044Sbz ipfw_insn_sa6 *p = (ipfw_insn_sa6 *)action; 2992225044Sbz 2993225044Sbz action->opcode = O_FORWARD_IP6; 2994225044Sbz action->len = F_INSN_SIZE(ipfw_insn_sa6); 2995248505Smelifaro CHECK_ACTLEN; 2996225044Sbz 2997225044Sbz p->sa.sin6_len = sizeof(struct sockaddr_in6); 2998225044Sbz p->sa.sin6_family = AF_INET6; 2999225044Sbz p->sa.sin6_port = port_number; 3000225044Sbz p->sa.sin6_flowinfo = 0; 3001225044Sbz p->sa.sin6_scope_id = 0; 3002225044Sbz /* No table support for v6 yet. */ 3003225044Sbz bcopy(&((struct sockaddr_in6*)&result)->sin6_addr, 3004225044Sbz &p->sa.sin6_addr, sizeof(p->sa.sin6_addr)); 3005225044Sbz } else { 3006225044Sbz errx(EX_DATAERR, "Invalid address family in forward action"); 3007225044Sbz } 3008204591Sluigi av++; 300998943Sluigi break; 3010161424Sjulian } 3011117469Sluigi case TOK_COMMENT: 3012117469Sluigi /* pretend it is a 'count' rule followed by the comment */ 3013117469Sluigi action->opcode = O_COUNT; 3014204591Sluigi av--; /* go back... */ 3015117469Sluigi break; 3016178888Sjulian 3017178888Sjulian case TOK_SETFIB: 3018178888Sjulian { 3019178888Sjulian int numfibs; 3020178916Sjulian size_t intsize = sizeof(int); 3021178888Sjulian 3022178888Sjulian action->opcode = O_SETFIB; 3023222473Sae NEED1("missing fib number"); 3024222473Sae if (_substrcmp(*av, "tablearg") == 0) { 3025222473Sae action->arg1 = IP_FW_TABLEARG; 3026222473Sae } else { 3027222473Sae action->arg1 = strtoul(*av, NULL, 10); 3028222473Sae if (sysctlbyname("net.fibs", &numfibs, &intsize, 3029222473Sae NULL, 0) == -1) 3030222473Sae errx(EX_DATAERR, "fibs not suported.\n"); 3031222473Sae if (action->arg1 >= numfibs) /* Temporary */ 3032222473Sae errx(EX_DATAERR, "fib too large.\n"); 3033222473Sae } 3034222473Sae av++; 3035222473Sae break; 3036178888Sjulian } 3037190633Spiso 3038190633Spiso case TOK_REASS: 3039190633Spiso action->opcode = O_REASS; 3040190633Spiso break; 3041220804Sglebius 3042223666Sae case TOK_RETURN: 3043223666Sae fill_cmd(action, O_CALLRETURN, F_NOT, 0); 3044223666Sae break; 3045223666Sae 304698943Sluigi default: 3047102087Sluigi errx(EX_DATAERR, "invalid action %s\n", av[-1]); 304898943Sluigi } 3049248505Smelifaro action = next_cmd(action, &ablen); 305098943Sluigi 305198943Sluigi /* 3052136071Sgreen * [altq queuename] -- altq tag, optional 305398943Sluigi * [log [logamount N]] -- log, optional 305498943Sluigi * 3055136071Sgreen * If they exist, it go first in the cmdbuf, but then it is 305698943Sluigi * skipped in the copy section to the end of the buffer. 305798943Sluigi */ 3058204591Sluigi while (av[0] != NULL && (i = match_token(rule_action_params, *av)) != -1) { 3059204591Sluigi av++; 3060136071Sgreen switch (i) { 3061136071Sgreen case TOK_LOG: 3062136071Sgreen { 3063136071Sgreen ipfw_insn_log *c = (ipfw_insn_log *)cmd; 3064136071Sgreen int l; 306598943Sluigi 3066136071Sgreen if (have_log) 3067136071Sgreen errx(EX_DATAERR, 3068136071Sgreen "log cannot be specified more than once"); 3069136071Sgreen have_log = (ipfw_insn *)c; 3070136071Sgreen cmd->len = F_INSN_SIZE(ipfw_insn_log); 3071248505Smelifaro CHECK_CMDLEN; 3072136071Sgreen cmd->opcode = O_LOG; 3073204591Sluigi if (av[0] && _substrcmp(*av, "logamount") == 0) { 3074204591Sluigi av++; 3075136071Sgreen NEED1("logamount requires argument"); 3076136071Sgreen l = atoi(*av); 3077136071Sgreen if (l < 0) 3078136071Sgreen errx(EX_DATAERR, 3079136071Sgreen "logamount must be positive"); 3080136071Sgreen c->max_log = l; 3081204591Sluigi av++; 3082136071Sgreen } else { 3083136071Sgreen len = sizeof(c->max_log); 3084136071Sgreen if (sysctlbyname("net.inet.ip.fw.verbose_limit", 3085248505Smelifaro &c->max_log, &len, NULL, 0) == -1) { 3086248505Smelifaro if (co.test_only) { 3087248505Smelifaro c->max_log = 0; 3088248505Smelifaro break; 3089248505Smelifaro } 3090136071Sgreen errx(1, "sysctlbyname(\"%s\")", 3091136071Sgreen "net.inet.ip.fw.verbose_limit"); 3092248505Smelifaro } 3093136071Sgreen } 3094136071Sgreen } 3095136071Sgreen break; 3096136071Sgreen 3097204591Sluigi#ifndef NO_ALTQ 3098136071Sgreen case TOK_ALTQ: 3099136071Sgreen { 3100136071Sgreen ipfw_insn_altq *a = (ipfw_insn_altq *)cmd; 3101136071Sgreen 3102136071Sgreen NEED1("missing altq queue name"); 3103136071Sgreen if (have_altq) 3104136071Sgreen errx(EX_DATAERR, 3105136071Sgreen "altq cannot be specified more than once"); 3106136071Sgreen have_altq = (ipfw_insn *)a; 3107136071Sgreen cmd->len = F_INSN_SIZE(ipfw_insn_altq); 3108248505Smelifaro CHECK_CMDLEN; 3109136071Sgreen cmd->opcode = O_ALTQ; 3110187983Sluigi a->qid = altq_name_to_qid(*av); 3111204591Sluigi av++; 3112136071Sgreen } 3113136071Sgreen break; 3114204591Sluigi#endif 3115136071Sgreen 3116158879Soleg case TOK_TAG: 3117159636Soleg case TOK_UNTAG: { 3118159636Soleg uint16_t tag; 3119159636Soleg 3120158879Soleg if (have_tag) 3121159636Soleg errx(EX_USAGE, "tag and untag cannot be " 3122159636Soleg "specified more than once"); 3123193516Sluigi GET_UINT_ARG(tag, IPFW_ARG_MIN, IPFW_ARG_MAX, i, 3124182823Srik rule_action_params); 3125158879Soleg have_tag = cmd; 3126159636Soleg fill_cmd(cmd, O_TAG, (i == TOK_TAG) ? 0: F_NOT, tag); 3127204591Sluigi av++; 3128158879Soleg break; 3129159636Soleg } 3130158879Soleg 3131136071Sgreen default: 3132136071Sgreen abort(); 313398943Sluigi } 3134248505Smelifaro cmd = next_cmd(cmd, &cblen); 313598943Sluigi } 313698943Sluigi 3137101116Sluigi if (have_state) /* must be a check-state, we are done */ 313898943Sluigi goto done; 313998943Sluigi 314098943Sluigi#define OR_START(target) \ 3141204591Sluigi if (av[0] && (*av[0] == '(' || *av[0] == '{')) { \ 314298943Sluigi if (open_par) \ 314398943Sluigi errx(EX_USAGE, "nested \"(\" not allowed\n"); \ 3144101641Sluigi prev = NULL; \ 314598943Sluigi open_par = 1; \ 314698943Sluigi if ( (av[0])[1] == '\0') { \ 3147204591Sluigi av++; \ 314898943Sluigi } else \ 314998943Sluigi (*av)++; \ 315098943Sluigi } \ 315198943Sluigi target: \ 315298943Sluigi 315398943Sluigi 315498943Sluigi#define CLOSE_PAR \ 315598943Sluigi if (open_par) { \ 3156204591Sluigi if (av[0] && ( \ 3157140271Sbrooks strcmp(*av, ")") == 0 || \ 3158140271Sbrooks strcmp(*av, "}") == 0)) { \ 3159101641Sluigi prev = NULL; \ 316098943Sluigi open_par = 0; \ 3161204591Sluigi av++; \ 316298943Sluigi } else \ 316398943Sluigi errx(EX_USAGE, "missing \")\"\n"); \ 316498943Sluigi } 3165106505Smaxim 316698943Sluigi#define NOT_BLOCK \ 3167204591Sluigi if (av[0] && _substrcmp(*av, "not") == 0) { \ 316898943Sluigi if (cmd->len & F_NOT) \ 316998943Sluigi errx(EX_USAGE, "double \"not\" not allowed\n"); \ 317098943Sluigi cmd->len |= F_NOT; \ 3171204591Sluigi av++; \ 317298943Sluigi } 317398943Sluigi 317498943Sluigi#define OR_BLOCK(target) \ 3175204591Sluigi if (av[0] && _substrcmp(*av, "or") == 0) { \ 317698943Sluigi if (prev == NULL || open_par == 0) \ 317798943Sluigi errx(EX_DATAERR, "invalid OR block"); \ 317898943Sluigi prev->len |= F_OR; \ 3179204591Sluigi av++; \ 318098943Sluigi goto target; \ 318198943Sluigi } \ 318298943Sluigi CLOSE_PAR; 318398943Sluigi 3184102087Sluigi first_cmd = cmd; 3185102098Sluigi 3186102098Sluigi#if 0 318798943Sluigi /* 3188102087Sluigi * MAC addresses, optional. 3189102087Sluigi * If we have this, we skip the part "proto from src to dst" 3190102087Sluigi * and jump straight to the option parsing. 3191102087Sluigi */ 3192102087Sluigi NOT_BLOCK; 3193102087Sluigi NEED1("missing protocol"); 3194140271Sbrooks if (_substrcmp(*av, "MAC") == 0 || 3195140271Sbrooks _substrcmp(*av, "mac") == 0) { 3196204591Sluigi av++; /* the "MAC" keyword */ 3197204591Sluigi add_mac(cmd, av); /* exits in case of errors */ 3198102087Sluigi cmd = next_cmd(cmd); 3199204591Sluigi av += 2; /* dst-mac and src-mac */ 3200102087Sluigi NOT_BLOCK; 3201102087Sluigi NEED1("missing mac type"); 3202204591Sluigi if (add_mactype(cmd, av[0])) 3203102087Sluigi cmd = next_cmd(cmd); 3204204591Sluigi av++; /* any or mac-type */ 3205102087Sluigi goto read_options; 3206102087Sluigi } 3207102098Sluigi#endif 3208102087Sluigi 3209102087Sluigi /* 321098943Sluigi * protocol, mandatory 321198943Sluigi */ 321298943Sluigi OR_START(get_proto); 321398943Sluigi NOT_BLOCK; 321498943Sluigi NEED1("missing protocol"); 3215152923Sume if (add_proto_compat(cmd, *av, &proto)) { 3216204591Sluigi av++; 3217147105Smlaier if (F_LEN(cmd) != 0) { 3218102087Sluigi prev = cmd; 3219248505Smelifaro cmd = next_cmd(cmd, &cblen); 3220102087Sluigi } 3221102098Sluigi } else if (first_cmd != cmd) { 3222116438Smaxim errx(EX_DATAERR, "invalid protocol ``%s''", *av); 3223102098Sluigi } else 3224102098Sluigi goto read_options; 322598943Sluigi OR_BLOCK(get_proto); 322698943Sluigi 322798943Sluigi /* 3228102087Sluigi * "from", mandatory 322998943Sluigi */ 3230204591Sluigi if ((av[0] == NULL) || _substrcmp(*av, "from") != 0) 323198943Sluigi errx(EX_USAGE, "missing ``from''"); 3232204591Sluigi av++; 323398943Sluigi 323498943Sluigi /* 323598943Sluigi * source IP, mandatory 323698943Sluigi */ 323798943Sluigi OR_START(source_ip); 323898943Sluigi NOT_BLOCK; /* optional "not" */ 323998943Sluigi NEED1("missing source address"); 3240248505Smelifaro if (add_src(cmd, *av, proto, cblen)) { 3241204591Sluigi av++; 3242102087Sluigi if (F_LEN(cmd) != 0) { /* ! any */ 3243102087Sluigi prev = cmd; 3244248505Smelifaro cmd = next_cmd(cmd, &cblen); 3245102087Sluigi } 3246145246Sbrooks } else 3247145246Sbrooks errx(EX_USAGE, "bad source address %s", *av); 324898943Sluigi OR_BLOCK(source_ip); 324998943Sluigi 325098943Sluigi /* 325198943Sluigi * source ports, optional 325298943Sluigi */ 325398943Sluigi NOT_BLOCK; /* optional "not" */ 3254204591Sluigi if ( av[0] != NULL ) { 3255140271Sbrooks if (_substrcmp(*av, "any") == 0 || 3256248505Smelifaro add_ports(cmd, *av, proto, O_IP_SRCPORT, cblen)) { 3257204591Sluigi av++; 3258102087Sluigi if (F_LEN(cmd) != 0) 3259248505Smelifaro cmd = next_cmd(cmd, &cblen); 3260101641Sluigi } 326198943Sluigi } 326298943Sluigi 326398943Sluigi /* 3264102087Sluigi * "to", mandatory 326598943Sluigi */ 3266204591Sluigi if ( (av[0] == NULL) || _substrcmp(*av, "to") != 0 ) 326798943Sluigi errx(EX_USAGE, "missing ``to''"); 3268204591Sluigi av++; 326998943Sluigi 327098943Sluigi /* 327198943Sluigi * destination, mandatory 327298943Sluigi */ 327398943Sluigi OR_START(dest_ip); 327498943Sluigi NOT_BLOCK; /* optional "not" */ 327598943Sluigi NEED1("missing dst address"); 3276248505Smelifaro if (add_dst(cmd, *av, proto, cblen)) { 3277204591Sluigi av++; 3278102087Sluigi if (F_LEN(cmd) != 0) { /* ! any */ 3279102087Sluigi prev = cmd; 3280248505Smelifaro cmd = next_cmd(cmd, &cblen); 3281102087Sluigi } 3282145246Sbrooks } else 3283145246Sbrooks errx( EX_USAGE, "bad destination address %s", *av); 328498943Sluigi OR_BLOCK(dest_ip); 328598943Sluigi 328698943Sluigi /* 328798943Sluigi * dest. ports, optional 328898943Sluigi */ 328998943Sluigi NOT_BLOCK; /* optional "not" */ 3290204591Sluigi if (av[0]) { 3291140271Sbrooks if (_substrcmp(*av, "any") == 0 || 3292248505Smelifaro add_ports(cmd, *av, proto, O_IP_DSTPORT, cblen)) { 3293204591Sluigi av++; 3294102087Sluigi if (F_LEN(cmd) != 0) 3295248505Smelifaro cmd = next_cmd(cmd, &cblen); 3296101641Sluigi } 329798943Sluigi } 329898943Sluigi 329998943Sluigiread_options: 3300204591Sluigi if (av[0] && first_cmd == cmd) { 3301102087Sluigi /* 3302102087Sluigi * nothing specified so far, store in the rule to ease 3303102087Sluigi * printout later. 3304102087Sluigi */ 3305102087Sluigi rule->_pad = 1; 3306102087Sluigi } 330798943Sluigi prev = NULL; 3308204591Sluigi while ( av[0] != NULL ) { 3309101641Sluigi char *s; 3310101641Sluigi ipfw_insn_u32 *cmd32; /* alias for cmd */ 331198943Sluigi 3312101641Sluigi s = *av; 3313101641Sluigi cmd32 = (ipfw_insn_u32 *)cmd; 3314101641Sluigi 331598943Sluigi if (*s == '!') { /* alternate syntax for NOT */ 331698943Sluigi if (cmd->len & F_NOT) 331798943Sluigi errx(EX_USAGE, "double \"not\" not allowed\n"); 331898943Sluigi cmd->len = F_NOT; 331998943Sluigi s++; 332098943Sluigi } 332198943Sluigi i = match_token(rule_options, s); 3322204591Sluigi av++; 332398943Sluigi switch(i) { 332498943Sluigi case TOK_NOT: 332598943Sluigi if (cmd->len & F_NOT) 332698943Sluigi errx(EX_USAGE, "double \"not\" not allowed\n"); 332798943Sluigi cmd->len = F_NOT; 332898943Sluigi break; 332998943Sluigi 333098943Sluigi case TOK_OR: 3331101641Sluigi if (open_par == 0 || prev == NULL) 333298943Sluigi errx(EX_USAGE, "invalid \"or\" block\n"); 333398943Sluigi prev->len |= F_OR; 333498943Sluigi break; 3335101641Sluigi 3336101641Sluigi case TOK_STARTBRACE: 3337101641Sluigi if (open_par) 3338101641Sluigi errx(EX_USAGE, "+nested \"(\" not allowed\n"); 3339101641Sluigi open_par = 1; 3340101641Sluigi break; 3341101641Sluigi 3342101641Sluigi case TOK_ENDBRACE: 3343101641Sluigi if (!open_par) 3344101641Sluigi errx(EX_USAGE, "+missing \")\"\n"); 3345101641Sluigi open_par = 0; 3346102087Sluigi prev = NULL; 3347220802Sglebius break; 3348101641Sluigi 334998943Sluigi case TOK_IN: 335098943Sluigi fill_cmd(cmd, O_IN, 0, 0); 335198943Sluigi break; 335298943Sluigi 335398943Sluigi case TOK_OUT: 335498943Sluigi cmd->len ^= F_NOT; /* toggle F_NOT */ 335598943Sluigi fill_cmd(cmd, O_IN, 0, 0); 335698943Sluigi break; 335798943Sluigi 3358136073Sgreen case TOK_DIVERTED: 3359136073Sgreen fill_cmd(cmd, O_DIVERTED, 0, 3); 3360136073Sgreen break; 3361136073Sgreen 3362136073Sgreen case TOK_DIVERTEDLOOPBACK: 3363136073Sgreen fill_cmd(cmd, O_DIVERTED, 0, 1); 3364136073Sgreen break; 3365136073Sgreen 3366136073Sgreen case TOK_DIVERTEDOUTPUT: 3367136073Sgreen fill_cmd(cmd, O_DIVERTED, 0, 2); 3368136073Sgreen break; 3369136073Sgreen 337098943Sluigi case TOK_FRAG: 337198943Sluigi fill_cmd(cmd, O_FRAG, 0, 0); 337298943Sluigi break; 337398943Sluigi 337498943Sluigi case TOK_LAYER2: 337598943Sluigi fill_cmd(cmd, O_LAYER2, 0, 0); 337698943Sluigi break; 337798943Sluigi 337898943Sluigi case TOK_XMIT: 337998943Sluigi case TOK_RECV: 338098943Sluigi case TOK_VIA: 338198943Sluigi NEED1("recv, xmit, via require interface name" 338298943Sluigi " or address"); 3383248505Smelifaro fill_iface((ipfw_insn_if *)cmd, av[0], cblen); 3384204591Sluigi av++; 338598943Sluigi if (F_LEN(cmd) == 0) /* not a valid address */ 338698943Sluigi break; 338798943Sluigi if (i == TOK_XMIT) 338898943Sluigi cmd->opcode = O_XMIT; 338998943Sluigi else if (i == TOK_RECV) 339098943Sluigi cmd->opcode = O_RECV; 339198943Sluigi else if (i == TOK_VIA) 339298943Sluigi cmd->opcode = O_VIA; 339398943Sluigi break; 339498943Sluigi 339599475Sluigi case TOK_ICMPTYPES: 339699475Sluigi NEED1("icmptypes requires list of types"); 339799475Sluigi fill_icmptypes((ipfw_insn_u32 *)cmd, *av); 3398204591Sluigi av++; 339999475Sluigi break; 3400220804Sglebius 3401145246Sbrooks case TOK_ICMP6TYPES: 3402145246Sbrooks NEED1("icmptypes requires list of types"); 3403248505Smelifaro fill_icmp6types((ipfw_insn_icmp6 *)cmd, *av, cblen); 3404204591Sluigi av++; 3405145246Sbrooks break; 340699475Sluigi 340798943Sluigi case TOK_IPTTL: 340898943Sluigi NEED1("ipttl requires TTL"); 3409116690Sluigi if (strpbrk(*av, "-,")) { 3410248505Smelifaro if (!add_ports(cmd, *av, 0, O_IPTTL, cblen)) 3411116690Sluigi errx(EX_DATAERR, "invalid ipttl %s", *av); 3412116690Sluigi } else 3413116690Sluigi fill_cmd(cmd, O_IPTTL, 0, strtoul(*av, NULL, 0)); 3414204591Sluigi av++; 341598943Sluigi break; 341698943Sluigi 341798943Sluigi case TOK_IPID: 3418116690Sluigi NEED1("ipid requires id"); 3419116690Sluigi if (strpbrk(*av, "-,")) { 3420248505Smelifaro if (!add_ports(cmd, *av, 0, O_IPID, cblen)) 3421116690Sluigi errx(EX_DATAERR, "invalid ipid %s", *av); 3422116690Sluigi } else 3423116690Sluigi fill_cmd(cmd, O_IPID, 0, strtoul(*av, NULL, 0)); 3424204591Sluigi av++; 342598943Sluigi break; 342698943Sluigi 342798943Sluigi case TOK_IPLEN: 342898943Sluigi NEED1("iplen requires length"); 3429116690Sluigi if (strpbrk(*av, "-,")) { 3430248505Smelifaro if (!add_ports(cmd, *av, 0, O_IPLEN, cblen)) 3431116690Sluigi errx(EX_DATAERR, "invalid ip len %s", *av); 3432116690Sluigi } else 3433116690Sluigi fill_cmd(cmd, O_IPLEN, 0, strtoul(*av, NULL, 0)); 3434204591Sluigi av++; 343598943Sluigi break; 343698943Sluigi 343798943Sluigi case TOK_IPVER: 343898943Sluigi NEED1("ipver requires version"); 343998943Sluigi fill_cmd(cmd, O_IPVER, 0, strtoul(*av, NULL, 0)); 3440204591Sluigi av++; 344198943Sluigi break; 344298943Sluigi 344399475Sluigi case TOK_IPPRECEDENCE: 344499475Sluigi NEED1("ipprecedence requires value"); 344599475Sluigi fill_cmd(cmd, O_IPPRECEDENCE, 0, 344699475Sluigi (strtoul(*av, NULL, 0) & 7) << 5); 3447204591Sluigi av++; 344899475Sluigi break; 344999475Sluigi 345098943Sluigi case TOK_IPOPTS: 345198943Sluigi NEED1("missing argument for ipoptions"); 3452101116Sluigi fill_flags(cmd, O_IPOPT, f_ipopts, *av); 3453204591Sluigi av++; 345498943Sluigi break; 345598943Sluigi 345699475Sluigi case TOK_IPTOS: 345799475Sluigi NEED1("missing argument for iptos"); 3458101116Sluigi fill_flags(cmd, O_IPTOS, f_iptos, *av); 3459204591Sluigi av++; 346099475Sluigi break; 346199475Sluigi 346298943Sluigi case TOK_UID: 346398943Sluigi NEED1("uid requires argument"); 346498943Sluigi { 346598943Sluigi char *end; 346698943Sluigi uid_t uid; 346798943Sluigi struct passwd *pwd; 346898943Sluigi 346998943Sluigi cmd->opcode = O_UID; 347098943Sluigi uid = strtoul(*av, &end, 0); 347198943Sluigi pwd = (*end == '\0') ? getpwuid(uid) : getpwnam(*av); 347298943Sluigi if (pwd == NULL) 347398943Sluigi errx(EX_DATAERR, "uid \"%s\" nonexistent", *av); 3474106504Smaxim cmd32->d[0] = pwd->pw_uid; 3475135089Scsjp cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 3476204591Sluigi av++; 347798943Sluigi } 347898943Sluigi break; 347998943Sluigi 348098943Sluigi case TOK_GID: 348198943Sluigi NEED1("gid requires argument"); 348298943Sluigi { 348398943Sluigi char *end; 348498943Sluigi gid_t gid; 348598943Sluigi struct group *grp; 348698943Sluigi 348798943Sluigi cmd->opcode = O_GID; 348898943Sluigi gid = strtoul(*av, &end, 0); 348998943Sluigi grp = (*end == '\0') ? getgrgid(gid) : getgrnam(*av); 349098943Sluigi if (grp == NULL) 349198943Sluigi errx(EX_DATAERR, "gid \"%s\" nonexistent", *av); 3492106504Smaxim cmd32->d[0] = grp->gr_gid; 3493135089Scsjp cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 3494204591Sluigi av++; 349598943Sluigi } 349698943Sluigi break; 349798943Sluigi 3498133600Scsjp case TOK_JAIL: 3499133600Scsjp NEED1("jail requires argument"); 3500133600Scsjp { 3501133600Scsjp char *end; 3502133600Scsjp int jid; 3503133600Scsjp 3504133600Scsjp cmd->opcode = O_JAIL; 3505133600Scsjp jid = (int)strtol(*av, &end, 0); 3506133600Scsjp if (jid < 0 || *end != '\0') 3507133600Scsjp errx(EX_DATAERR, "jail requires prison ID"); 3508135554Scsjp cmd32->d[0] = (uint32_t)jid; 3509135089Scsjp cmd->len |= F_INSN_SIZE(ipfw_insn_u32); 3510204591Sluigi av++; 3511133600Scsjp } 3512133600Scsjp break; 3513133600Scsjp 351498943Sluigi case TOK_ESTAB: 351598943Sluigi fill_cmd(cmd, O_ESTAB, 0, 0); 351698943Sluigi break; 351798943Sluigi 351898943Sluigi case TOK_SETUP: 351998943Sluigi fill_cmd(cmd, O_TCPFLAGS, 0, 352098943Sluigi (TH_SYN) | ( (TH_ACK) & 0xff) <<8 ); 352198943Sluigi break; 352298943Sluigi 3523136075Sgreen case TOK_TCPDATALEN: 3524136075Sgreen NEED1("tcpdatalen requires length"); 3525136075Sgreen if (strpbrk(*av, "-,")) { 3526248505Smelifaro if (!add_ports(cmd, *av, 0, O_TCPDATALEN, cblen)) 3527136075Sgreen errx(EX_DATAERR, "invalid tcpdata len %s", *av); 3528136075Sgreen } else 3529136075Sgreen fill_cmd(cmd, O_TCPDATALEN, 0, 3530136075Sgreen strtoul(*av, NULL, 0)); 3531204591Sluigi av++; 3532136075Sgreen break; 3533136075Sgreen 353498943Sluigi case TOK_TCPOPTS: 353598943Sluigi NEED1("missing argument for tcpoptions"); 353698943Sluigi fill_flags(cmd, O_TCPOPTS, f_tcpopts, *av); 3537204591Sluigi av++; 353898943Sluigi break; 353998943Sluigi 354098943Sluigi case TOK_TCPSEQ: 354198943Sluigi case TOK_TCPACK: 354298943Sluigi NEED1("tcpseq/tcpack requires argument"); 354398943Sluigi cmd->len = F_INSN_SIZE(ipfw_insn_u32); 354498943Sluigi cmd->opcode = (i == TOK_TCPSEQ) ? O_TCPSEQ : O_TCPACK; 354598943Sluigi cmd32->d[0] = htonl(strtoul(*av, NULL, 0)); 3546204591Sluigi av++; 354798943Sluigi break; 354898943Sluigi 354998943Sluigi case TOK_TCPWIN: 355098943Sluigi NEED1("tcpwin requires length"); 3551234278Sglebius if (strpbrk(*av, "-,")) { 3552248505Smelifaro if (!add_ports(cmd, *av, 0, O_TCPWIN, cblen)) 3553234278Sglebius errx(EX_DATAERR, "invalid tcpwin len %s", *av); 3554234278Sglebius } else 3555234278Sglebius fill_cmd(cmd, O_TCPWIN, 0, 3556234278Sglebius strtoul(*av, NULL, 0)); 3557204591Sluigi av++; 355898943Sluigi break; 355998943Sluigi 356098943Sluigi case TOK_TCPFLAGS: 356198943Sluigi NEED1("missing argument for tcpflags"); 356298943Sluigi cmd->opcode = O_TCPFLAGS; 356398943Sluigi fill_flags(cmd, O_TCPFLAGS, f_tcpflags, *av); 3564204591Sluigi av++; 356598943Sluigi break; 356698943Sluigi 356798943Sluigi case TOK_KEEPSTATE: 3568101641Sluigi if (open_par) 3569101641Sluigi errx(EX_USAGE, "keep-state cannot be part " 3570101641Sluigi "of an or block"); 357199909Sluigi if (have_state) 3572101116Sluigi errx(EX_USAGE, "only one of keep-state " 357399909Sluigi "and limit is allowed"); 3574101116Sluigi have_state = cmd; 357598943Sluigi fill_cmd(cmd, O_KEEP_STATE, 0, 0); 357698943Sluigi break; 357798943Sluigi 3578159636Soleg case TOK_LIMIT: { 3579159636Soleg ipfw_insn_limit *c = (ipfw_insn_limit *)cmd; 3580159636Soleg int val; 3581159636Soleg 3582101641Sluigi if (open_par) 3583159636Soleg errx(EX_USAGE, 3584159636Soleg "limit cannot be part of an or block"); 358599909Sluigi if (have_state) 3586168819Smaxim errx(EX_USAGE, "only one of keep-state and " 3587159636Soleg "limit is allowed"); 3588101116Sluigi have_state = cmd; 358998943Sluigi 359098943Sluigi cmd->len = F_INSN_SIZE(ipfw_insn_limit); 3591248505Smelifaro CHECK_CMDLEN; 359298943Sluigi cmd->opcode = O_LIMIT; 3593159636Soleg c->limit_mask = c->conn_limit = 0; 359498943Sluigi 3595204591Sluigi while ( av[0] != NULL ) { 3596159636Soleg if ((val = match_token(limit_masks, *av)) <= 0) 359798943Sluigi break; 359898943Sluigi c->limit_mask |= val; 3599204591Sluigi av++; 360098943Sluigi } 3601159636Soleg 360298943Sluigi if (c->limit_mask == 0) 3603159636Soleg errx(EX_USAGE, "limit: missing limit mask"); 3604159636Soleg 3605193516Sluigi GET_UINT_ARG(c->conn_limit, IPFW_ARG_MIN, IPFW_ARG_MAX, 3606182823Srik TOK_LIMIT, rule_options); 3607159636Soleg 3608204591Sluigi av++; 360998943Sluigi break; 3610159636Soleg } 361198943Sluigi 3612102087Sluigi case TOK_PROTO: 3613102087Sluigi NEED1("missing protocol"); 3614145246Sbrooks if (add_proto(cmd, *av, &proto)) { 3615204591Sluigi av++; 3616102098Sluigi } else 3617116438Smaxim errx(EX_DATAERR, "invalid protocol ``%s''", 3618116438Smaxim *av); 3619102087Sluigi break; 3620106505Smaxim 3621102087Sluigi case TOK_SRCIP: 3622102087Sluigi NEED1("missing source IP"); 3623248505Smelifaro if (add_srcip(cmd, *av, cblen)) { 3624204591Sluigi av++; 3625102087Sluigi } 3626102087Sluigi break; 3627102087Sluigi 3628102087Sluigi case TOK_DSTIP: 3629102087Sluigi NEED1("missing destination IP"); 3630248505Smelifaro if (add_dstip(cmd, *av, cblen)) { 3631204591Sluigi av++; 3632102087Sluigi } 3633102087Sluigi break; 3634102087Sluigi 3635145246Sbrooks case TOK_SRCIP6: 3636145246Sbrooks NEED1("missing source IP6"); 3637248505Smelifaro if (add_srcip6(cmd, *av, cblen)) { 3638204591Sluigi av++; 3639145246Sbrooks } 3640145246Sbrooks break; 3641220804Sglebius 3642145246Sbrooks case TOK_DSTIP6: 3643145246Sbrooks NEED1("missing destination IP6"); 3644248505Smelifaro if (add_dstip6(cmd, *av, cblen)) { 3645204591Sluigi av++; 3646145246Sbrooks } 3647145246Sbrooks break; 3648145246Sbrooks 3649102087Sluigi case TOK_SRCPORT: 3650102087Sluigi NEED1("missing source port"); 3651140271Sbrooks if (_substrcmp(*av, "any") == 0 || 3652248505Smelifaro add_ports(cmd, *av, proto, O_IP_SRCPORT, cblen)) { 3653204591Sluigi av++; 3654102087Sluigi } else 3655102087Sluigi errx(EX_DATAERR, "invalid source port %s", *av); 3656102087Sluigi break; 3657102087Sluigi 3658102087Sluigi case TOK_DSTPORT: 3659102087Sluigi NEED1("missing destination port"); 3660140271Sbrooks if (_substrcmp(*av, "any") == 0 || 3661248505Smelifaro add_ports(cmd, *av, proto, O_IP_DSTPORT, cblen)) { 3662204591Sluigi av++; 3663102087Sluigi } else 3664102087Sluigi errx(EX_DATAERR, "invalid destination port %s", 3665102087Sluigi *av); 3666102087Sluigi break; 3667102087Sluigi 3668102087Sluigi case TOK_MAC: 3669248505Smelifaro if (add_mac(cmd, av, cblen)) 3670204591Sluigi av += 2; 3671102087Sluigi break; 3672102087Sluigi 3673102087Sluigi case TOK_MACTYPE: 3674102087Sluigi NEED1("missing mac type"); 3675248505Smelifaro if (!add_mactype(cmd, *av, cblen)) 3676116438Smaxim errx(EX_DATAERR, "invalid mac type %s", *av); 3677204591Sluigi av++; 3678102087Sluigi break; 3679102087Sluigi 3680112250Scjc case TOK_VERREVPATH: 3681112250Scjc fill_cmd(cmd, O_VERREVPATH, 0, 0); 3682112250Scjc break; 3683116919Sluigi 3684128575Sandre case TOK_VERSRCREACH: 3685128575Sandre fill_cmd(cmd, O_VERSRCREACH, 0, 0); 3686128575Sandre break; 3687128575Sandre 3688133387Sandre case TOK_ANTISPOOF: 3689133387Sandre fill_cmd(cmd, O_ANTISPOOF, 0, 0); 3690133387Sandre break; 3691133387Sandre 3692117241Sluigi case TOK_IPSEC: 3693117241Sluigi fill_cmd(cmd, O_IPSEC, 0, 0); 3694117241Sluigi break; 3695117241Sluigi 3696145246Sbrooks case TOK_IPV6: 3697145246Sbrooks fill_cmd(cmd, O_IP6, 0, 0); 3698145246Sbrooks break; 3699145246Sbrooks 3700146894Smlaier case TOK_IPV4: 3701146894Smlaier fill_cmd(cmd, O_IP4, 0, 0); 3702146894Smlaier break; 3703146894Smlaier 3704145246Sbrooks case TOK_EXT6HDR: 3705145246Sbrooks fill_ext6hdr( cmd, *av ); 3706204591Sluigi av++; 3707145246Sbrooks break; 3708145246Sbrooks 3709145246Sbrooks case TOK_FLOWID: 3710145246Sbrooks if (proto != IPPROTO_IPV6 ) 3711145246Sbrooks errx( EX_USAGE, "flow-id filter is active " 3712145246Sbrooks "only for ipv6 protocol\n"); 3713248505Smelifaro fill_flow6( (ipfw_insn_u32 *) cmd, *av, cblen); 3714204591Sluigi av++; 3715145246Sbrooks break; 3716145246Sbrooks 3717117469Sluigi case TOK_COMMENT: 3718248505Smelifaro fill_comment(cmd, av, cblen); 3719204591Sluigi av[0]=NULL; 3720117469Sluigi break; 3721117469Sluigi 3722158879Soleg case TOK_TAGGED: 3723204591Sluigi if (av[0] && strpbrk(*av, "-,")) { 3724248505Smelifaro if (!add_ports(cmd, *av, 0, O_TAGGED, cblen)) 3725159636Soleg errx(EX_DATAERR, "tagged: invalid tag" 3726159636Soleg " list: %s", *av); 3727158879Soleg } 3728159636Soleg else { 3729159636Soleg uint16_t tag; 3730159636Soleg 3731193516Sluigi GET_UINT_ARG(tag, IPFW_ARG_MIN, IPFW_ARG_MAX, 3732182823Srik TOK_TAGGED, rule_options); 3733159636Soleg fill_cmd(cmd, O_TAGGED, 0, tag); 3734159636Soleg } 3735204591Sluigi av++; 3736158879Soleg break; 3737158879Soleg 3738178888Sjulian case TOK_FIB: 3739178888Sjulian NEED1("fib requires fib number"); 3740178888Sjulian fill_cmd(cmd, O_FIB, 0, strtoul(*av, NULL, 0)); 3741204591Sluigi av++; 3742178888Sjulian break; 3743215179Sluigi case TOK_SOCKARG: 3744215179Sluigi fill_cmd(cmd, O_SOCKARG, 0, 0); 3745215179Sluigi break; 3746178888Sjulian 3747200567Sluigi case TOK_LOOKUP: { 3748200567Sluigi ipfw_insn_u32 *c = (ipfw_insn_u32 *)cmd; 3749200567Sluigi char *p; 3750200567Sluigi int j; 3751200567Sluigi 3752205169Sluigi if (!av[0] || !av[1]) 3753200567Sluigi errx(EX_USAGE, "format: lookup argument tablenum"); 3754200567Sluigi cmd->opcode = O_IP_DST_LOOKUP; 3755200567Sluigi cmd->len |= F_INSN_SIZE(ipfw_insn) + 2; 3756200567Sluigi i = match_token(rule_options, *av); 3757200567Sluigi for (j = 0; lookup_key[j] >= 0 ; j++) { 3758200567Sluigi if (i == lookup_key[j]) 3759200567Sluigi break; 3760200567Sluigi } 3761200567Sluigi if (lookup_key[j] <= 0) 3762200567Sluigi errx(EX_USAGE, "format: cannot lookup on %s", *av); 3763223262Sbenl __PAST_END(c->d, 1) = j; // i converted to option 3764204591Sluigi av++; 3765200567Sluigi cmd->arg1 = strtoul(*av, &p, 0); 3766200567Sluigi if (p && *p) 3767200567Sluigi errx(EX_USAGE, "format: lookup argument tablenum"); 3768204591Sluigi av++; 3769200567Sluigi } 3770200567Sluigi break; 3771200567Sluigi 377298943Sluigi default: 377398943Sluigi errx(EX_USAGE, "unrecognised option [%d] %s\n", i, s); 377498943Sluigi } 377598943Sluigi if (F_LEN(cmd) > 0) { /* prepare to advance */ 377698943Sluigi prev = cmd; 3777248505Smelifaro cmd = next_cmd(cmd, &cblen); 377898943Sluigi } 377998943Sluigi } 378098943Sluigi 378198943Sluigidone: 378298943Sluigi /* 378398943Sluigi * Now copy stuff into the rule. 378498943Sluigi * If we have a keep-state option, the first instruction 378598943Sluigi * must be a PROBE_STATE (which is generated here). 378698943Sluigi * If we have a LOG option, it was stored as the first command, 378798943Sluigi * and now must be moved to the top of the action part. 378898943Sluigi */ 378998943Sluigi dst = (ipfw_insn *)rule->cmd; 379098943Sluigi 379198943Sluigi /* 3792107289Sluigi * First thing to write into the command stream is the match probability. 3793107289Sluigi */ 3794107289Sluigi if (match_prob != 1) { /* 1 means always match */ 3795107289Sluigi dst->opcode = O_PROB; 3796107289Sluigi dst->len = 2; 3797107289Sluigi *((int32_t *)(dst+1)) = (int32_t)(match_prob * 0x7fffffff); 3798107289Sluigi dst += dst->len; 3799107289Sluigi } 3800107289Sluigi 3801107289Sluigi /* 380298943Sluigi * generate O_PROBE_STATE if necessary 380398943Sluigi */ 3804101116Sluigi if (have_state && have_state->opcode != O_CHECK_STATE) { 380598943Sluigi fill_cmd(dst, O_PROBE_STATE, 0, 0); 3806248505Smelifaro dst = next_cmd(dst, &rblen); 380798943Sluigi } 3808158879Soleg 3809158879Soleg /* copy all commands but O_LOG, O_KEEP_STATE, O_LIMIT, O_ALTQ, O_TAG */ 381098943Sluigi for (src = (ipfw_insn *)cmdbuf; src != cmd; src += i) { 381198943Sluigi i = F_LEN(src); 3812248505Smelifaro CHECK_RBUFLEN(i); 381398943Sluigi 3814101116Sluigi switch (src->opcode) { 3815101116Sluigi case O_LOG: 3816101116Sluigi case O_KEEP_STATE: 3817101116Sluigi case O_LIMIT: 3818136071Sgreen case O_ALTQ: 3819158879Soleg case O_TAG: 3820101116Sluigi break; 3821101116Sluigi default: 3822117328Sluigi bcopy(src, dst, i * sizeof(uint32_t)); 382398943Sluigi dst += i; 382498943Sluigi } 382598943Sluigi } 382698943Sluigi 382798943Sluigi /* 3828101116Sluigi * put back the have_state command as last opcode 3829101116Sluigi */ 3830101295Sluigi if (have_state && have_state->opcode != O_CHECK_STATE) { 3831101116Sluigi i = F_LEN(have_state); 3832248505Smelifaro CHECK_RBUFLEN(i); 3833117328Sluigi bcopy(have_state, dst, i * sizeof(uint32_t)); 3834101116Sluigi dst += i; 3835101116Sluigi } 3836101116Sluigi /* 383798943Sluigi * start action section 383898943Sluigi */ 383998943Sluigi rule->act_ofs = dst - rule->cmd; 384098943Sluigi 3841158879Soleg /* put back O_LOG, O_ALTQ, O_TAG if necessary */ 3842136071Sgreen if (have_log) { 3843136071Sgreen i = F_LEN(have_log); 3844248505Smelifaro CHECK_RBUFLEN(i); 3845136071Sgreen bcopy(have_log, dst, i * sizeof(uint32_t)); 384698943Sluigi dst += i; 384798943Sluigi } 3848136071Sgreen if (have_altq) { 3849136071Sgreen i = F_LEN(have_altq); 3850248505Smelifaro CHECK_RBUFLEN(i); 3851136071Sgreen bcopy(have_altq, dst, i * sizeof(uint32_t)); 3852136071Sgreen dst += i; 3853136071Sgreen } 3854158879Soleg if (have_tag) { 3855158879Soleg i = F_LEN(have_tag); 3856248505Smelifaro CHECK_RBUFLEN(i); 3857158879Soleg bcopy(have_tag, dst, i * sizeof(uint32_t)); 3858158879Soleg dst += i; 3859158879Soleg } 3860248505Smelifaro 386198943Sluigi /* 386298943Sluigi * copy all other actions 386398943Sluigi */ 386498943Sluigi for (src = (ipfw_insn *)actbuf; src != action; src += i) { 386598943Sluigi i = F_LEN(src); 3866248505Smelifaro CHECK_RBUFLEN(i); 3867117328Sluigi bcopy(src, dst, i * sizeof(uint32_t)); 386898943Sluigi dst += i; 386998943Sluigi } 387098943Sluigi 3871117328Sluigi rule->cmd_len = (uint32_t *)dst - (uint32_t *)(rule->cmd); 3872117469Sluigi i = (char *)dst - (char *)rule; 3873119740Stmm if (do_cmd(IP_FW_ADD, rule, (uintptr_t)&i) == -1) 387498943Sluigi err(EX_UNAVAILABLE, "getsockopt(%s)", "IP_FW_ADD"); 3875187764Sluigi if (!co.do_quiet) 3876117469Sluigi show_ipfw(rule, 0, 0); 387798943Sluigi} 387898943Sluigi 3879187767Sluigi/* 3880187767Sluigi * clear the counters or the log counters. 3881187767Sluigi */ 3882187767Sluigivoid 3883187767Sluigiipfw_zero(int ac, char *av[], int optname /* 0 = IP_FW_ZERO, 1 = IP_FW_RESETLOG */) 388498943Sluigi{ 3885170923Smaxim uint32_t arg, saved_arg; 388698943Sluigi int failed = EX_OK; 3887170923Smaxim char const *errstr; 3888187767Sluigi char const *name = optname ? "RESETLOG" : "ZERO"; 388998943Sluigi 3890187767Sluigi optname = optname ? IP_FW_RESETLOG : IP_FW_ZERO; 3891187767Sluigi 389298943Sluigi av++; ac--; 389398943Sluigi 389498943Sluigi if (!ac) { 389598943Sluigi /* clear all entries */ 3896117328Sluigi if (do_cmd(optname, NULL, 0) < 0) 3897117328Sluigi err(EX_UNAVAILABLE, "setsockopt(IP_FW_%s)", name); 3898187764Sluigi if (!co.do_quiet) 3899117328Sluigi printf("%s.\n", optname == IP_FW_ZERO ? 3900117328Sluigi "Accounting cleared":"Logging counts reset"); 390198943Sluigi 390298943Sluigi return; 390398943Sluigi } 390498943Sluigi 390598943Sluigi while (ac) { 390698943Sluigi /* Rule number */ 390798943Sluigi if (isdigit(**av)) { 3908170923Smaxim arg = strtonum(*av, 0, 0xffff, &errstr); 3909170923Smaxim if (errstr) 3910170923Smaxim errx(EX_DATAERR, 3911170923Smaxim "invalid rule number %s\n", *av); 3912170923Smaxim saved_arg = arg; 3913187764Sluigi if (co.use_set) 3914187764Sluigi arg |= (1 << 24) | ((co.use_set - 1) << 16); 391598943Sluigi av++; 391698943Sluigi ac--; 3917170923Smaxim if (do_cmd(optname, &arg, sizeof(arg))) { 3918117328Sluigi warn("rule %u: setsockopt(IP_FW_%s)", 3919170923Smaxim saved_arg, name); 392098943Sluigi failed = EX_UNAVAILABLE; 3921187764Sluigi } else if (!co.do_quiet) 3922170923Smaxim printf("Entry %d %s.\n", saved_arg, 3923117328Sluigi optname == IP_FW_ZERO ? 3924117328Sluigi "cleared" : "logging count reset"); 392598943Sluigi } else { 392698943Sluigi errx(EX_USAGE, "invalid rule number ``%s''", *av); 392798943Sluigi } 392898943Sluigi } 392998943Sluigi if (failed != EX_OK) 393098943Sluigi exit(failed); 393198943Sluigi} 393298943Sluigi 3933187767Sluigivoid 3934187767Sluigiipfw_flush(int force) 393598943Sluigi{ 3936187764Sluigi int cmd = co.do_pipe ? IP_DUMMYNET_FLUSH : IP_FW_FLUSH; 393798943Sluigi 3938187764Sluigi if (!force && !co.do_quiet) { /* need to ask user */ 393998943Sluigi int c; 394098943Sluigi 394198943Sluigi printf("Are you sure? [yn] "); 394298943Sluigi fflush(stdout); 394398943Sluigi do { 394498943Sluigi c = toupper(getc(stdin)); 394598943Sluigi while (c != '\n' && getc(stdin) != '\n') 394698943Sluigi if (feof(stdin)) 394798943Sluigi return; /* and do not flush */ 394898943Sluigi } while (c != 'Y' && c != 'N'); 394998943Sluigi printf("\n"); 395098943Sluigi if (c == 'N') /* user said no */ 395198943Sluigi return; 395298943Sluigi } 3953204591Sluigi if (co.do_pipe) { 3954204591Sluigi dummynet_flush(); 3955204591Sluigi return; 3956204591Sluigi } 3957170923Smaxim /* `ipfw set N flush` - is the same that `ipfw delete set N` */ 3958187764Sluigi if (co.use_set) { 3959187764Sluigi uint32_t arg = ((co.use_set - 1) & 0xffff) | (1 << 24); 3960170923Smaxim if (do_cmd(IP_FW_DEL, &arg, sizeof(arg)) < 0) 3961170923Smaxim err(EX_UNAVAILABLE, "setsockopt(IP_FW_DEL)"); 3962170923Smaxim } else if (do_cmd(cmd, NULL, 0) < 0) 396398943Sluigi err(EX_UNAVAILABLE, "setsockopt(IP_%s_FLUSH)", 3964187764Sluigi co.do_pipe ? "DUMMYNET" : "FW"); 3965187764Sluigi if (!co.do_quiet) 3966187764Sluigi printf("Flushed all %s.\n", co.do_pipe ? "pipes" : "rules"); 396798943Sluigi} 396898943Sluigi 3969117544Sluigi 3970234597Smelifarostatic void table_list(uint16_t num, int need_header); 3971248505Smelifarostatic void table_fill_xentry(char *arg, ipfw_table_xentry *xent); 3972183228Srik 3973117544Sluigi/* 3974130281Sru * This one handles all table-related commands 3975130281Sru * ipfw table N add addr[/masklen] [value] 3976130281Sru * ipfw table N delete addr[/masklen] 3977183407Srik * ipfw table {N | all} flush 3978183407Srik * ipfw table {N | all} list 3979130281Sru */ 3980187767Sluigivoid 3981187767Sluigiipfw_table_handler(int ac, char *av[]) 3982130281Sru{ 3983234597Smelifaro ipfw_table_xentry xent; 3984130281Sru int do_add; 3985183407Srik int is_all; 3986183241Srik size_t len; 3987248505Smelifaro uint32_t a; 3988183241Srik uint32_t tables_max; 3989130281Sru 3990183263Skeramida len = sizeof(tables_max); 3991183241Srik if (sysctlbyname("net.inet.ip.fw.tables_max", &tables_max, &len, 3992248505Smelifaro NULL, 0) == -1) { 3993248505Smelifaro if (co.test_only) 3994248505Smelifaro tables_max = 128; /* Old conservative default */ 3995248505Smelifaro else 3996248505Smelifaro errx(1, "Can't determine maximum number of ipfw tables." 3997248505Smelifaro " Perhaps you forgot to load ipfw module?"); 3998248505Smelifaro } 3999183241Srik 4000234597Smelifaro memset(&xent, 0, sizeof(xent)); 4001234597Smelifaro 4002130281Sru ac--; av++; 4003130281Sru if (ac && isdigit(**av)) { 4004234597Smelifaro xent.tbl = atoi(*av); 4005183407Srik is_all = 0; 4006130281Sru ac--; av++; 4007183407Srik } else if (ac && _substrcmp(*av, "all") == 0) { 4008234597Smelifaro xent.tbl = 0; 4009183407Srik is_all = 1; 4010183407Srik ac--; av++; 4011130281Sru } else 4012183407Srik errx(EX_USAGE, "table number or 'all' keyword required"); 4013234597Smelifaro if (xent.tbl >= tables_max) 4014183241Srik errx(EX_USAGE, "The table number exceeds the maximum allowed " 4015183241Srik "value (%d)", tables_max - 1); 4016130281Sru NEED1("table needs command"); 4017183407Srik if (is_all && _substrcmp(*av, "list") != 0 4018183407Srik && _substrcmp(*av, "flush") != 0) 4019183407Srik errx(EX_USAGE, "table number required"); 4020183407Srik 4021140271Sbrooks if (_substrcmp(*av, "add") == 0 || 4022140271Sbrooks _substrcmp(*av, "delete") == 0) { 4023130281Sru do_add = **av == 'a'; 4024130281Sru ac--; av++; 4025130281Sru if (!ac) 4026234597Smelifaro errx(EX_USAGE, "address required"); 4027234597Smelifaro 4028248505Smelifaro table_fill_xentry(*av, &xent); 4029234597Smelifaro 4030130281Sru ac--; av++; 4031161424Sjulian if (do_add && ac) { 4032161424Sjulian unsigned int tval; 4033161424Sjulian /* isdigit is a bit of a hack here.. */ 4034161424Sjulian if (strchr(*av, (int)'.') == NULL && isdigit(**av)) { 4035234597Smelifaro xent.value = strtoul(*av, NULL, 0); 4036161424Sjulian } else { 4037220802Sglebius if (lookup_host(*av, (struct in_addr *)&tval) == 0) { 4038161424Sjulian /* The value must be stored in host order * 4039161424Sjulian * so that the values < 65k can be distinguished */ 4040234597Smelifaro xent.value = ntohl(tval); 4041161424Sjulian } else { 4042161424Sjulian errx(EX_NOHOST, "hostname ``%s'' unknown", *av); 4043161424Sjulian } 4044161424Sjulian } 4045161424Sjulian } else 4046234597Smelifaro xent.value = 0; 4047234597Smelifaro if (do_setcmd3(do_add ? IP_FW_TABLE_XADD : IP_FW_TABLE_XDEL, 4048234597Smelifaro &xent, xent.len) < 0) { 4049155639Sjulian /* If running silent, don't bomb out on these errors. */ 4050187764Sluigi if (!(co.do_quiet && (errno == (do_add ? EEXIST : ESRCH)))) 4051155639Sjulian err(EX_OSERR, "setsockopt(IP_FW_TABLE_%s)", 4052234597Smelifaro do_add ? "XADD" : "XDEL"); 4053155639Sjulian /* In silent mode, react to a failed add by deleting */ 4054157332Sjulian if (do_add) { 4055234597Smelifaro do_setcmd3(IP_FW_TABLE_XDEL, &xent, xent.len); 4056234597Smelifaro if (do_setcmd3(IP_FW_TABLE_XADD, &xent, xent.len) < 0) 4057155639Sjulian err(EX_OSERR, 4058234597Smelifaro "setsockopt(IP_FW_TABLE_XADD)"); 4059157332Sjulian } 4060157335Sjulian } 4061140271Sbrooks } else if (_substrcmp(*av, "flush") == 0) { 4062234597Smelifaro a = is_all ? tables_max : (uint32_t)(xent.tbl + 1); 4063183407Srik do { 4064234597Smelifaro if (do_cmd(IP_FW_TABLE_FLUSH, &xent.tbl, 4065234597Smelifaro sizeof(xent.tbl)) < 0) 4066183407Srik err(EX_OSERR, "setsockopt(IP_FW_TABLE_FLUSH)"); 4067234597Smelifaro } while (++xent.tbl < a); 4068140271Sbrooks } else if (_substrcmp(*av, "list") == 0) { 4069234597Smelifaro a = is_all ? tables_max : (uint32_t)(xent.tbl + 1); 4070183407Srik do { 4071234597Smelifaro table_list(xent.tbl, is_all); 4072234597Smelifaro } while (++xent.tbl < a); 4073183228Srik } else 4074183228Srik errx(EX_USAGE, "invalid table command %s", *av); 4075183228Srik} 4076183205Srik 4077183228Srikstatic void 4078248505Smelifarotable_fill_xentry(char *arg, ipfw_table_xentry *xent) 4079248505Smelifaro{ 4080248505Smelifaro int addrlen, mask, masklen, type; 4081248505Smelifaro struct in6_addr *paddr; 4082248505Smelifaro uint32_t *pkey; 4083248505Smelifaro char *p; 4084248505Smelifaro uint32_t key; 4085248505Smelifaro 4086248505Smelifaro mask = 0; 4087248505Smelifaro type = 0; 4088248505Smelifaro addrlen = 0; 4089248505Smelifaro masklen = 0; 4090248505Smelifaro 4091248505Smelifaro /* 4092248505Smelifaro * Let's try to guess type by agrument. 4093248505Smelifaro * Possible types: 4094248505Smelifaro * 1) IPv4[/mask] 4095248505Smelifaro * 2) IPv6[/mask] 4096248505Smelifaro * 3) interface name 4097248505Smelifaro * 4) port, uid/gid or other u32 key (base 10 format) 4098248505Smelifaro * 5) hostname 4099248505Smelifaro */ 4100248505Smelifaro paddr = &xent->k.addr6; 4101248505Smelifaro if (ishexnumber(*arg) != 0 || *arg == ':') { 4102248505Smelifaro /* Remove / if exists */ 4103248505Smelifaro if ((p = strchr(arg, '/')) != NULL) { 4104248505Smelifaro *p = '\0'; 4105248505Smelifaro mask = atoi(p + 1); 4106248505Smelifaro } 4107248505Smelifaro 4108248505Smelifaro if (inet_pton(AF_INET, arg, paddr) == 1) { 4109248505Smelifaro if (p != NULL && mask > 32) 4110248505Smelifaro errx(EX_DATAERR, "bad IPv4 mask width: %s", 4111248505Smelifaro p + 1); 4112248505Smelifaro 4113248505Smelifaro type = IPFW_TABLE_CIDR; 4114248505Smelifaro masklen = p ? mask : 32; 4115248505Smelifaro addrlen = sizeof(struct in_addr); 4116248505Smelifaro } else if (inet_pton(AF_INET6, arg, paddr) == 1) { 4117248505Smelifaro if (IN6_IS_ADDR_V4COMPAT(paddr)) 4118248505Smelifaro errx(EX_DATAERR, 4119248505Smelifaro "Use IPv4 instead of v4-compatible"); 4120248505Smelifaro if (p != NULL && mask > 128) 4121248505Smelifaro errx(EX_DATAERR, "bad IPv6 mask width: %s", 4122248505Smelifaro p + 1); 4123248505Smelifaro 4124248505Smelifaro type = IPFW_TABLE_CIDR; 4125248505Smelifaro masklen = p ? mask : 128; 4126248505Smelifaro addrlen = sizeof(struct in6_addr); 4127248505Smelifaro } else { 4128248505Smelifaro /* Port or any other key */ 4129248505Smelifaro key = strtol(arg, &p, 10); 4130248505Smelifaro /* Skip non-base 10 entries like 'fa1' */ 4131248505Smelifaro if (p != arg) { 4132248505Smelifaro pkey = (uint32_t *)paddr; 4133248505Smelifaro *pkey = htonl(key); 4134248505Smelifaro type = IPFW_TABLE_CIDR; 4135248505Smelifaro addrlen = sizeof(uint32_t); 4136248505Smelifaro } 4137248505Smelifaro } 4138248505Smelifaro } 4139248505Smelifaro 4140248505Smelifaro if (type == 0 && strchr(arg, '.') == NULL) { 4141248505Smelifaro /* Assume interface name. Copy significant data only */ 4142248505Smelifaro mask = MIN(strlen(arg), IF_NAMESIZE - 1); 4143248505Smelifaro memcpy(xent->k.iface, arg, mask); 4144248505Smelifaro /* Set mask to exact match */ 4145248505Smelifaro masklen = 8 * IF_NAMESIZE; 4146248505Smelifaro type = IPFW_TABLE_INTERFACE; 4147248505Smelifaro addrlen = IF_NAMESIZE; 4148248505Smelifaro } 4149248505Smelifaro 4150248505Smelifaro if (type == 0) { 4151248505Smelifaro if (lookup_host(arg, (struct in_addr *)paddr) != 0) 4152248505Smelifaro errx(EX_NOHOST, "hostname ``%s'' unknown", arg); 4153248505Smelifaro 4154248505Smelifaro masklen = 32; 4155248505Smelifaro type = IPFW_TABLE_CIDR; 4156248505Smelifaro addrlen = sizeof(struct in_addr); 4157248505Smelifaro } 4158248505Smelifaro 4159248505Smelifaro xent->type = type; 4160248505Smelifaro xent->masklen = masklen; 4161248505Smelifaro xent->len = offsetof(ipfw_table_xentry, k) + addrlen; 4162248505Smelifaro} 4163248505Smelifaro 4164248505Smelifarostatic void 4165234597Smelifarotable_list(uint16_t num, int need_header) 4166183228Srik{ 4167234597Smelifaro ipfw_xtable *tbl; 4168234597Smelifaro ipfw_table_xentry *xent; 4169183228Srik socklen_t l; 4170234597Smelifaro uint32_t *a, sz, tval; 4171234597Smelifaro char tbuf[128]; 4172234597Smelifaro struct in6_addr *addr6; 4173234597Smelifaro ip_fw3_opheader *op3; 4174183205Srik 4175234597Smelifaro /* Prepend value with IP_FW3 header */ 4176234597Smelifaro l = sizeof(ip_fw3_opheader) + sizeof(uint32_t); 4177234597Smelifaro op3 = alloca(l); 4178234597Smelifaro /* Zero reserved fields */ 4179234597Smelifaro memset(op3, 0, sizeof(ip_fw3_opheader)); 4180234597Smelifaro a = (uint32_t *)(op3 + 1); 4181234597Smelifaro *a = num; 4182234597Smelifaro op3->opcode = IP_FW_TABLE_XGETSIZE; 4183234597Smelifaro if (do_cmd(IP_FW3, op3, (uintptr_t)&l) < 0) 4184234597Smelifaro err(EX_OSERR, "getsockopt(IP_FW_TABLE_XGETSIZE)"); 4185183228Srik 4186183228Srik /* If a is zero we have nothing to do, the table is empty. */ 4187234597Smelifaro if (*a == 0) 4188183228Srik return; 4189183228Srik 4190234597Smelifaro l = *a; 4191187716Sluigi tbl = safe_calloc(1, l); 4192234597Smelifaro tbl->opheader.opcode = IP_FW_TABLE_XLIST; 4193234597Smelifaro tbl->tbl = num; 4194234597Smelifaro if (do_cmd(IP_FW3, tbl, (uintptr_t)&l) < 0) 4195234597Smelifaro err(EX_OSERR, "getsockopt(IP_FW_TABLE_XLIST)"); 4196183407Srik if (tbl->cnt && need_header) 4197183407Srik printf("---table(%d)---\n", tbl->tbl); 4198234597Smelifaro sz = tbl->size - sizeof(ipfw_xtable); 4199234597Smelifaro xent = &tbl->xent[0]; 4200234597Smelifaro while (sz > 0) { 4201234597Smelifaro switch (tbl->type) { 4202234597Smelifaro case IPFW_TABLE_CIDR: 4203234597Smelifaro /* IPv4 or IPv6 prefixes */ 4204234597Smelifaro tval = xent->value; 4205234597Smelifaro addr6 = &xent->k.addr6; 4206234597Smelifaro 4207248505Smelifaro 4208248505Smelifaro if (IN6_IS_ADDR_V4COMPAT(addr6)) { 4209234597Smelifaro /* IPv4 address */ 4210234597Smelifaro inet_ntop(AF_INET, &addr6->s6_addr32[3], tbuf, sizeof(tbuf)); 4211234597Smelifaro } else { 4212234597Smelifaro /* IPv6 address */ 4213234597Smelifaro inet_ntop(AF_INET6, addr6, tbuf, sizeof(tbuf)); 4214234597Smelifaro } 4215234597Smelifaro 4216234597Smelifaro if (co.do_value_as_ip) { 4217234597Smelifaro tval = htonl(tval); 4218234597Smelifaro printf("%s/%u %s\n", tbuf, xent->masklen, 4219234597Smelifaro inet_ntoa(*(struct in_addr *)&tval)); 4220234597Smelifaro } else 4221234597Smelifaro printf("%s/%u %u\n", tbuf, xent->masklen, tval); 4222234597Smelifaro break; 4223234597Smelifaro case IPFW_TABLE_INTERFACE: 4224234597Smelifaro /* Interface names */ 4225234597Smelifaro tval = xent->value; 4226234597Smelifaro if (co.do_value_as_ip) { 4227234597Smelifaro tval = htonl(tval); 4228234597Smelifaro printf("%s %s\n", xent->k.iface, 4229234597Smelifaro inet_ntoa(*(struct in_addr *)&tval)); 4230234597Smelifaro } else 4231234597Smelifaro printf("%s %u\n", xent->k.iface, tval); 4232130281Sru } 4233234597Smelifaro 4234234597Smelifaro if (sz < xent->len) 4235234597Smelifaro break; 4236234597Smelifaro sz -= xent->len; 4237234597Smelifaro xent = (void *)xent + xent->len; 4238183228Srik } 4239234597Smelifaro 4240183228Srik free(tbl); 4241130281Sru} 4242