nat_cmd.c revision 134789
1/*- 2 * Copyright (c) 2001 Charles Mott <cm@linktel.net> 3 * Brian Somers <brian@Awfulhak.org> 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25 * SUCH DAMAGE. 26 * 27 * $FreeBSD: head/usr.sbin/ppp/nat_cmd.c 134789 2004-09-05 01:46:52Z brian $ 28 */ 29 30#include <sys/param.h> 31#include <netinet/in.h> 32#include <arpa/inet.h> 33#include <netdb.h> 34#include <netinet/in_systm.h> 35#include <netinet/in.h> 36#include <netinet/ip.h> 37#include <sys/socket.h> 38#include <sys/un.h> 39 40#include <stdarg.h> 41#include <stdio.h> 42#include <stdlib.h> 43#include <string.h> 44#include <termios.h> 45 46#ifdef LOCALNAT 47#include "alias.h" 48#else 49#include <alias.h> 50#endif 51 52#include "layer.h" 53#include "proto.h" 54#include "defs.h" 55#include "command.h" 56#include "log.h" 57#include "nat_cmd.h" 58#include "descriptor.h" 59#include "prompt.h" 60#include "timer.h" 61#include "fsm.h" 62#include "slcompress.h" 63#include "throughput.h" 64#include "iplist.h" 65#include "mbuf.h" 66#include "lqr.h" 67#include "hdlc.h" 68#include "ncpaddr.h" 69#include "ip.h" 70#include "ipcp.h" 71#include "ipv6cp.h" 72#include "lcp.h" 73#include "ccp.h" 74#include "link.h" 75#include "mp.h" 76#include "filter.h" 77#ifndef NORADIUS 78#include "radius.h" 79#endif 80#include "ncp.h" 81#include "bundle.h" 82 83 84#define NAT_EXTRABUF (13) 85 86static int StrToAddr(const char *, struct in_addr *); 87static int StrToPortRange(const char *, u_short *, u_short *, const char *); 88static int StrToAddrAndPort(const char *, struct in_addr *, u_short *, 89 u_short *, const char *); 90 91static void 92lowhigh(u_short *a, u_short *b) 93{ 94 if (a > b) { 95 u_short c; 96 97 c = *b; 98 *b = *a; 99 *a = c; 100 } 101} 102 103int 104nat_RedirectPort(struct cmdargs const *arg) 105{ 106 if (!arg->bundle->NatEnabled) { 107 prompt_Printf(arg->prompt, "Alias not enabled\n"); 108 return 1; 109 } else if (arg->argc == arg->argn + 3 || arg->argc == arg->argn + 4) { 110 char proto_constant; 111 const char *proto; 112 struct in_addr localaddr; 113 u_short hlocalport, llocalport; 114 struct in_addr aliasaddr; 115 u_short haliasport, laliasport; 116 struct in_addr remoteaddr; 117 u_short hremoteport, lremoteport; 118 struct alias_link *link; 119 int error; 120 121 proto = arg->argv[arg->argn]; 122 if (strcmp(proto, "tcp") == 0) { 123 proto_constant = IPPROTO_TCP; 124 } else if (strcmp(proto, "udp") == 0) { 125 proto_constant = IPPROTO_UDP; 126 } else { 127 prompt_Printf(arg->prompt, "port redirect: protocol must be" 128 " tcp or udp\n"); 129 return -1; 130 } 131 132 error = StrToAddrAndPort(arg->argv[arg->argn+1], &localaddr, &llocalport, 133 &hlocalport, proto); 134 if (error) { 135 prompt_Printf(arg->prompt, "nat port: error reading localaddr:port\n"); 136 return -1; 137 } 138 139 error = StrToPortRange(arg->argv[arg->argn+2], &laliasport, &haliasport, 140 proto); 141 if (error) { 142 prompt_Printf(arg->prompt, "nat port: error reading alias port\n"); 143 return -1; 144 } 145 aliasaddr.s_addr = INADDR_ANY; 146 147 if (arg->argc == arg->argn + 4) { 148 error = StrToAddrAndPort(arg->argv[arg->argn+3], &remoteaddr, 149 &lremoteport, &hremoteport, proto); 150 if (error) { 151 prompt_Printf(arg->prompt, "nat port: error reading " 152 "remoteaddr:port\n"); 153 return -1; 154 } 155 } else { 156 remoteaddr.s_addr = INADDR_ANY; 157 lremoteport = hremoteport = 0; 158 } 159 160 lowhigh(&llocalport, &hlocalport); 161 lowhigh(&laliasport, &haliasport); 162 lowhigh(&lremoteport, &hremoteport); 163 164 if (haliasport - laliasport != hlocalport - llocalport) { 165 prompt_Printf(arg->prompt, "nat port: local & alias port ranges " 166 "are not equal\n"); 167 return -1; 168 } 169 170 if (hremoteport && hremoteport - lremoteport != hlocalport - llocalport) { 171 prompt_Printf(arg->prompt, "nat port: local & remote port ranges " 172 "are not equal\n"); 173 return -1; 174 } 175 176 while (laliasport <= haliasport) { 177 link = PacketAliasRedirectPort(localaddr, htons(llocalport), 178 remoteaddr, htons(lremoteport), 179 aliasaddr, htons(laliasport), 180 proto_constant); 181 182 if (link == NULL) { 183 prompt_Printf(arg->prompt, "nat port: %d: error %d\n", laliasport, 184 error); 185 return 1; 186 } 187 llocalport++; 188 laliasport++; 189 if (hremoteport) 190 lremoteport++; 191 } 192 193 return 0; 194 } 195 196 return -1; 197} 198 199 200int 201nat_RedirectAddr(struct cmdargs const *arg) 202{ 203 if (!arg->bundle->NatEnabled) { 204 prompt_Printf(arg->prompt, "nat not enabled\n"); 205 return 1; 206 } else if (arg->argc == arg->argn+2) { 207 int error; 208 struct in_addr localaddr, aliasaddr; 209 struct alias_link *link; 210 211 error = StrToAddr(arg->argv[arg->argn], &localaddr); 212 if (error) { 213 prompt_Printf(arg->prompt, "address redirect: invalid local address\n"); 214 return 1; 215 } 216 error = StrToAddr(arg->argv[arg->argn+1], &aliasaddr); 217 if (error) { 218 prompt_Printf(arg->prompt, "address redirect: invalid alias address\n"); 219 prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name, 220 arg->cmd->syntax); 221 return 1; 222 } 223 link = PacketAliasRedirectAddr(localaddr, aliasaddr); 224 if (link == NULL) { 225 prompt_Printf(arg->prompt, "address redirect: packet aliasing" 226 " engine error\n"); 227 prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name, 228 arg->cmd->syntax); 229 } 230 } else 231 return -1; 232 233 return 0; 234} 235 236 237int 238nat_RedirectProto(struct cmdargs const *arg) 239{ 240 if (!arg->bundle->NatEnabled) { 241 prompt_Printf(arg->prompt, "nat not enabled\n"); 242 return 1; 243 } else if (arg->argc >= arg->argn + 2 && arg->argc <= arg->argn + 4) { 244 struct in_addr localIP, publicIP, remoteIP; 245 struct alias_link *link; 246 struct protoent *pe; 247 int error; 248 unsigned len; 249 250 len = strlen(arg->argv[arg->argn]); 251 if (len == 0) { 252 prompt_Printf(arg->prompt, "proto redirect: invalid protocol\n"); 253 return 1; 254 } 255 if (strspn(arg->argv[arg->argn], "01234567") == len) 256 pe = getprotobynumber(atoi(arg->argv[arg->argn])); 257 else 258 pe = getprotobyname(arg->argv[arg->argn]); 259 if (pe == NULL) { 260 prompt_Printf(arg->prompt, "proto redirect: invalid protocol\n"); 261 return 1; 262 } 263 264 error = StrToAddr(arg->argv[arg->argn + 1], &localIP); 265 if (error) { 266 prompt_Printf(arg->prompt, "proto redirect: invalid src address\n"); 267 return 1; 268 } 269 270 if (arg->argc >= arg->argn + 3) { 271 error = StrToAddr(arg->argv[arg->argn + 2], &publicIP); 272 if (error) { 273 prompt_Printf(arg->prompt, "proto redirect: invalid alias address\n"); 274 prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name, 275 arg->cmd->syntax); 276 return 1; 277 } 278 } else 279 publicIP.s_addr = INADDR_ANY; 280 281 if (arg->argc == arg->argn + 4) { 282 error = StrToAddr(arg->argv[arg->argn + 2], &remoteIP); 283 if (error) { 284 prompt_Printf(arg->prompt, "proto redirect: invalid dst address\n"); 285 prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name, 286 arg->cmd->syntax); 287 return 1; 288 } 289 } else 290 remoteIP.s_addr = INADDR_ANY; 291 292 link = PacketAliasRedirectProto(localIP, remoteIP, publicIP, pe->p_proto); 293 if (link == NULL) { 294 prompt_Printf(arg->prompt, "proto redirect: packet aliasing" 295 " engine error\n"); 296 prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name, 297 arg->cmd->syntax); 298 } 299 } else 300 return -1; 301 302 return 0; 303} 304 305 306static int 307StrToAddr(const char *str, struct in_addr *addr) 308{ 309 struct hostent *hp; 310 311 if (inet_aton(str, addr)) 312 return 0; 313 314 hp = gethostbyname(str); 315 if (!hp) { 316 log_Printf(LogWARN, "StrToAddr: Unknown host %s.\n", str); 317 return -1; 318 } 319 *addr = *((struct in_addr *) hp->h_addr); 320 return 0; 321} 322 323 324static int 325StrToPort(const char *str, u_short *port, const char *proto) 326{ 327 struct servent *sp; 328 char *end; 329 330 *port = strtol(str, &end, 10); 331 if (*end != '\0') { 332 sp = getservbyname(str, proto); 333 if (sp == NULL) { 334 log_Printf(LogWARN, "StrToAddr: Unknown port or service %s/%s.\n", 335 str, proto); 336 return -1; 337 } 338 *port = ntohs(sp->s_port); 339 } 340 341 return 0; 342} 343 344static int 345StrToPortRange(const char *str, u_short *low, u_short *high, const char *proto) 346{ 347 char *minus; 348 int res; 349 350 minus = strchr(str, '-'); 351 if (minus) 352 *minus = '\0'; /* Cheat the const-ness ! */ 353 354 res = StrToPort(str, low, proto); 355 356 if (minus) 357 *minus = '-'; /* Cheat the const-ness ! */ 358 359 if (res == 0) { 360 if (minus) 361 res = StrToPort(minus + 1, high, proto); 362 else 363 *high = *low; 364 } 365 366 return res; 367} 368 369static int 370StrToAddrAndPort(const char *str, struct in_addr *addr, u_short *low, 371 u_short *high, const char *proto) 372{ 373 char *colon; 374 int res; 375 376 colon = strchr(str, ':'); 377 if (!colon) { 378 log_Printf(LogWARN, "StrToAddrAndPort: %s is missing port number.\n", str); 379 return -1; 380 } 381 382 *colon = '\0'; /* Cheat the const-ness ! */ 383 res = StrToAddr(str, addr); 384 *colon = ':'; /* Cheat the const-ness ! */ 385 if (res != 0) 386 return -1; 387 388 return StrToPortRange(colon + 1, low, high, proto); 389} 390 391int 392nat_ProxyRule(struct cmdargs const *arg) 393{ 394 char cmd[LINE_LEN]; 395 int f, pos; 396 size_t len; 397 398 if (arg->argn >= arg->argc) 399 return -1; 400 401 for (f = arg->argn, pos = 0; f < arg->argc; f++) { 402 len = strlen(arg->argv[f]); 403 if (sizeof cmd - pos < len + (len ? 1 : 0)) 404 break; 405 if (len) 406 cmd[pos++] = ' '; 407 strcpy(cmd + pos, arg->argv[f]); 408 pos += len; 409 } 410 411 return PacketAliasProxyRule(cmd); 412} 413 414int 415nat_SetTarget(struct cmdargs const *arg) 416{ 417 struct in_addr addr; 418 419 if (arg->argc == arg->argn) { 420 addr.s_addr = INADDR_ANY; 421 PacketAliasSetTarget(addr); 422 return 0; 423 } 424 425 if (arg->argc != arg->argn + 1) 426 return -1; 427 428 if (!strcasecmp(arg->argv[arg->argn], "MYADDR")) { 429 addr.s_addr = INADDR_ANY; 430 PacketAliasSetTarget(addr); 431 return 0; 432 } 433 434 addr = GetIpAddr(arg->argv[arg->argn]); 435 if (addr.s_addr == INADDR_NONE) { 436 log_Printf(LogWARN, "%s: invalid address\n", arg->argv[arg->argn]); 437 return 1; 438 } 439 440 PacketAliasSetTarget(addr); 441 return 0; 442} 443 444#ifndef NO_FW_PUNCH 445int 446nat_PunchFW(struct cmdargs const *arg) 447{ 448 char *end; 449 long base, count; 450 451 if (arg->argc == arg->argn) { 452 PacketAliasSetMode(0, PKT_ALIAS_PUNCH_FW); 453 return 0; 454 } 455 456 if (arg->argc != arg->argn + 2) 457 return -1; 458 459 base = strtol(arg->argv[arg->argn], &end, 10); 460 if (*end != '\0' || base < 0) 461 return -1; 462 463 count = strtol(arg->argv[arg->argn + 1], &end, 10); 464 if (*end != '\0' || count < 0) 465 return -1; 466 467 PacketAliasSetFWBase(base, count); 468 PacketAliasSetMode(PKT_ALIAS_PUNCH_FW, PKT_ALIAS_PUNCH_FW); 469 470 return 0; 471} 472#endif 473 474int 475nat_SkinnyPort(struct cmdargs const *arg) 476{ 477 char *end; 478 long port; 479 480 if (arg->argc == arg->argn) { 481 PacketAliasSetSkinnyPort(0); 482 return 0; 483 } 484 485 if (arg->argc != arg->argn + 1) 486 return -1; 487 488 port = strtol(arg->argv[arg->argn], &end, 10); 489 if (*end != '\0' || port < 0) 490 return -1; 491 492 PacketAliasSetSkinnyPort(port); 493 494 return 0; 495} 496 497static struct mbuf * 498nat_LayerPush(struct bundle *bundle, struct link *l __unused, struct mbuf *bp, 499 int pri __unused, u_short *proto) 500{ 501 if (!bundle->NatEnabled || *proto != PROTO_IP) 502 return bp; 503 504 log_Printf(LogDEBUG, "nat_LayerPush: PROTO_IP -> PROTO_IP\n"); 505 m_settype(bp, MB_NATOUT); 506 /* Ensure there's a bit of extra buffer for the NAT code... */ 507 bp = m_pullup(m_append(bp, NULL, NAT_EXTRABUF)); 508 PacketAliasOut(MBUF_CTOP(bp), bp->m_len); 509 bp->m_len = ntohs(((struct ip *)MBUF_CTOP(bp))->ip_len); 510 511 return bp; 512} 513 514static struct mbuf * 515nat_LayerPull(struct bundle *bundle, struct link *l __unused, struct mbuf *bp, 516 u_short *proto) 517{ 518 static int gfrags; 519 int ret, len, nfrags; 520 struct mbuf **last; 521 char *fptr; 522 523 if (!bundle->NatEnabled || *proto != PROTO_IP) 524 return bp; 525 526 log_Printf(LogDEBUG, "nat_LayerPull: PROTO_IP -> PROTO_IP\n"); 527 m_settype(bp, MB_NATIN); 528 /* Ensure there's a bit of extra buffer for the NAT code... */ 529 bp = m_pullup(m_append(bp, NULL, NAT_EXTRABUF)); 530 ret = PacketAliasIn(MBUF_CTOP(bp), bp->m_len); 531 532 bp->m_len = ntohs(((struct ip *)MBUF_CTOP(bp))->ip_len); 533 if (bp->m_len > MAX_MRU) { 534 log_Printf(LogWARN, "nat_LayerPull: Problem with IP header length (%lu)\n", 535 (unsigned long)bp->m_len); 536 m_freem(bp); 537 return NULL; 538 } 539 540 switch (ret) { 541 case PKT_ALIAS_OK: 542 break; 543 544 case PKT_ALIAS_UNRESOLVED_FRAGMENT: 545 /* Save the data for later */ 546 fptr = malloc(bp->m_len); 547 bp = mbuf_Read(bp, fptr, bp->m_len); 548 PacketAliasSaveFragment(fptr); 549 log_Printf(LogDEBUG, "Store another frag (%lu) - now %d\n", 550 (unsigned long)((struct ip *)fptr)->ip_id, ++gfrags); 551 break; 552 553 case PKT_ALIAS_FOUND_HEADER_FRAGMENT: 554 /* Fetch all the saved fragments and chain them on the end of `bp' */ 555 last = &bp->m_nextpkt; 556 nfrags = 0; 557 while ((fptr = PacketAliasGetFragment(MBUF_CTOP(bp))) != NULL) { 558 nfrags++; 559 PacketAliasFragmentIn(MBUF_CTOP(bp), fptr); 560 len = ntohs(((struct ip *)fptr)->ip_len); 561 *last = m_get(len, MB_NATIN); 562 memcpy(MBUF_CTOP(*last), fptr, len); 563 free(fptr); 564 last = &(*last)->m_nextpkt; 565 } 566 gfrags -= nfrags; 567 log_Printf(LogDEBUG, "Found a frag header (%lu) - plus %d more frags (no" 568 "w %d)\n", (unsigned long)((struct ip *)MBUF_CTOP(bp))->ip_id, 569 nfrags, gfrags); 570 break; 571 572 case PKT_ALIAS_IGNORED: 573 if (PacketAliasSetMode(0, 0) & PKT_ALIAS_DENY_INCOMING) { 574 log_Printf(LogTCPIP, "NAT engine denied data:\n"); 575 m_freem(bp); 576 bp = NULL; 577 } else if (log_IsKept(LogTCPIP)) { 578 log_Printf(LogTCPIP, "NAT engine ignored data:\n"); 579 PacketCheck(bundle, AF_INET, MBUF_CTOP(bp), bp->m_len, NULL, 580 NULL, NULL); 581 } 582 break; 583 584 default: 585 log_Printf(LogWARN, "nat_LayerPull: Dropped a packet (%d)....\n", ret); 586 m_freem(bp); 587 bp = NULL; 588 break; 589 } 590 591 return bp; 592} 593 594struct layer natlayer = 595 { LAYER_NAT, "nat", nat_LayerPush, nat_LayerPull }; 596