nat_cmd.c revision 134789
1/*-
2 * Copyright (c) 2001 Charles Mott <cm@linktel.net>
3 *                    Brian Somers <brian@Awfulhak.org>
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 *    notice, this list of conditions and the following disclaimer in the
13 *    documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 * SUCH DAMAGE.
26 *
27 * $FreeBSD: head/usr.sbin/ppp/nat_cmd.c 134789 2004-09-05 01:46:52Z brian $
28 */
29
30#include <sys/param.h>
31#include <netinet/in.h>
32#include <arpa/inet.h>
33#include <netdb.h>
34#include <netinet/in_systm.h>
35#include <netinet/in.h>
36#include <netinet/ip.h>
37#include <sys/socket.h>
38#include <sys/un.h>
39
40#include <stdarg.h>
41#include <stdio.h>
42#include <stdlib.h>
43#include <string.h>
44#include <termios.h>
45
46#ifdef LOCALNAT
47#include "alias.h"
48#else
49#include <alias.h>
50#endif
51
52#include "layer.h"
53#include "proto.h"
54#include "defs.h"
55#include "command.h"
56#include "log.h"
57#include "nat_cmd.h"
58#include "descriptor.h"
59#include "prompt.h"
60#include "timer.h"
61#include "fsm.h"
62#include "slcompress.h"
63#include "throughput.h"
64#include "iplist.h"
65#include "mbuf.h"
66#include "lqr.h"
67#include "hdlc.h"
68#include "ncpaddr.h"
69#include "ip.h"
70#include "ipcp.h"
71#include "ipv6cp.h"
72#include "lcp.h"
73#include "ccp.h"
74#include "link.h"
75#include "mp.h"
76#include "filter.h"
77#ifndef NORADIUS
78#include "radius.h"
79#endif
80#include "ncp.h"
81#include "bundle.h"
82
83
84#define NAT_EXTRABUF (13)
85
86static int StrToAddr(const char *, struct in_addr *);
87static int StrToPortRange(const char *, u_short *, u_short *, const char *);
88static int StrToAddrAndPort(const char *, struct in_addr *, u_short *,
89                            u_short *, const char *);
90
91static void
92lowhigh(u_short *a, u_short *b)
93{
94  if (a > b) {
95    u_short c;
96
97    c = *b;
98    *b = *a;
99    *a = c;
100  }
101}
102
103int
104nat_RedirectPort(struct cmdargs const *arg)
105{
106  if (!arg->bundle->NatEnabled) {
107    prompt_Printf(arg->prompt, "Alias not enabled\n");
108    return 1;
109  } else if (arg->argc == arg->argn + 3 || arg->argc == arg->argn + 4) {
110    char proto_constant;
111    const char *proto;
112    struct in_addr localaddr;
113    u_short hlocalport, llocalport;
114    struct in_addr aliasaddr;
115    u_short haliasport, laliasport;
116    struct in_addr remoteaddr;
117    u_short hremoteport, lremoteport;
118    struct alias_link *link;
119    int error;
120
121    proto = arg->argv[arg->argn];
122    if (strcmp(proto, "tcp") == 0) {
123      proto_constant = IPPROTO_TCP;
124    } else if (strcmp(proto, "udp") == 0) {
125      proto_constant = IPPROTO_UDP;
126    } else {
127      prompt_Printf(arg->prompt, "port redirect: protocol must be"
128                    " tcp or udp\n");
129      return -1;
130    }
131
132    error = StrToAddrAndPort(arg->argv[arg->argn+1], &localaddr, &llocalport,
133                             &hlocalport, proto);
134    if (error) {
135      prompt_Printf(arg->prompt, "nat port: error reading localaddr:port\n");
136      return -1;
137    }
138
139    error = StrToPortRange(arg->argv[arg->argn+2], &laliasport, &haliasport,
140                           proto);
141    if (error) {
142      prompt_Printf(arg->prompt, "nat port: error reading alias port\n");
143      return -1;
144    }
145    aliasaddr.s_addr = INADDR_ANY;
146
147    if (arg->argc == arg->argn + 4) {
148      error = StrToAddrAndPort(arg->argv[arg->argn+3], &remoteaddr,
149                               &lremoteport, &hremoteport, proto);
150      if (error) {
151        prompt_Printf(arg->prompt, "nat port: error reading "
152                      "remoteaddr:port\n");
153        return -1;
154      }
155    } else {
156      remoteaddr.s_addr = INADDR_ANY;
157      lremoteport = hremoteport = 0;
158    }
159
160    lowhigh(&llocalport, &hlocalport);
161    lowhigh(&laliasport, &haliasport);
162    lowhigh(&lremoteport, &hremoteport);
163
164    if (haliasport - laliasport != hlocalport - llocalport) {
165      prompt_Printf(arg->prompt, "nat port: local & alias port ranges "
166                    "are not equal\n");
167      return -1;
168    }
169
170    if (hremoteport && hremoteport - lremoteport != hlocalport - llocalport) {
171      prompt_Printf(arg->prompt, "nat port: local & remote port ranges "
172                    "are not equal\n");
173      return -1;
174    }
175
176    while (laliasport <= haliasport) {
177      link = PacketAliasRedirectPort(localaddr, htons(llocalport),
178				     remoteaddr, htons(lremoteport),
179                                     aliasaddr, htons(laliasport),
180				     proto_constant);
181
182      if (link == NULL) {
183        prompt_Printf(arg->prompt, "nat port: %d: error %d\n", laliasport,
184                      error);
185        return 1;
186      }
187      llocalport++;
188      laliasport++;
189      if (hremoteport)
190        lremoteport++;
191    }
192
193    return 0;
194  }
195
196  return -1;
197}
198
199
200int
201nat_RedirectAddr(struct cmdargs const *arg)
202{
203  if (!arg->bundle->NatEnabled) {
204    prompt_Printf(arg->prompt, "nat not enabled\n");
205    return 1;
206  } else if (arg->argc == arg->argn+2) {
207    int error;
208    struct in_addr localaddr, aliasaddr;
209    struct alias_link *link;
210
211    error = StrToAddr(arg->argv[arg->argn], &localaddr);
212    if (error) {
213      prompt_Printf(arg->prompt, "address redirect: invalid local address\n");
214      return 1;
215    }
216    error = StrToAddr(arg->argv[arg->argn+1], &aliasaddr);
217    if (error) {
218      prompt_Printf(arg->prompt, "address redirect: invalid alias address\n");
219      prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name,
220                    arg->cmd->syntax);
221      return 1;
222    }
223    link = PacketAliasRedirectAddr(localaddr, aliasaddr);
224    if (link == NULL) {
225      prompt_Printf(arg->prompt, "address redirect: packet aliasing"
226                    " engine error\n");
227      prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name,
228                    arg->cmd->syntax);
229    }
230  } else
231    return -1;
232
233  return 0;
234}
235
236
237int
238nat_RedirectProto(struct cmdargs const *arg)
239{
240  if (!arg->bundle->NatEnabled) {
241    prompt_Printf(arg->prompt, "nat not enabled\n");
242    return 1;
243  } else if (arg->argc >= arg->argn + 2 && arg->argc <= arg->argn + 4) {
244    struct in_addr localIP, publicIP, remoteIP;
245    struct alias_link *link;
246    struct protoent *pe;
247    int error;
248    unsigned len;
249
250    len = strlen(arg->argv[arg->argn]);
251    if (len == 0) {
252      prompt_Printf(arg->prompt, "proto redirect: invalid protocol\n");
253      return 1;
254    }
255    if (strspn(arg->argv[arg->argn], "01234567") == len)
256      pe = getprotobynumber(atoi(arg->argv[arg->argn]));
257    else
258      pe = getprotobyname(arg->argv[arg->argn]);
259    if (pe == NULL) {
260      prompt_Printf(arg->prompt, "proto redirect: invalid protocol\n");
261      return 1;
262    }
263
264    error = StrToAddr(arg->argv[arg->argn + 1], &localIP);
265    if (error) {
266      prompt_Printf(arg->prompt, "proto redirect: invalid src address\n");
267      return 1;
268    }
269
270    if (arg->argc >= arg->argn + 3) {
271      error = StrToAddr(arg->argv[arg->argn + 2], &publicIP);
272      if (error) {
273        prompt_Printf(arg->prompt, "proto redirect: invalid alias address\n");
274        prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name,
275                      arg->cmd->syntax);
276        return 1;
277      }
278    } else
279      publicIP.s_addr = INADDR_ANY;
280
281    if (arg->argc == arg->argn + 4) {
282      error = StrToAddr(arg->argv[arg->argn + 2], &remoteIP);
283      if (error) {
284        prompt_Printf(arg->prompt, "proto redirect: invalid dst address\n");
285        prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name,
286                      arg->cmd->syntax);
287        return 1;
288      }
289    } else
290      remoteIP.s_addr = INADDR_ANY;
291
292    link = PacketAliasRedirectProto(localIP, remoteIP, publicIP, pe->p_proto);
293    if (link == NULL) {
294      prompt_Printf(arg->prompt, "proto redirect: packet aliasing"
295                    " engine error\n");
296      prompt_Printf(arg->prompt, "usage: nat %s %s\n", arg->cmd->name,
297                    arg->cmd->syntax);
298    }
299  } else
300    return -1;
301
302  return 0;
303}
304
305
306static int
307StrToAddr(const char *str, struct in_addr *addr)
308{
309  struct hostent *hp;
310
311  if (inet_aton(str, addr))
312    return 0;
313
314  hp = gethostbyname(str);
315  if (!hp) {
316    log_Printf(LogWARN, "StrToAddr: Unknown host %s.\n", str);
317    return -1;
318  }
319  *addr = *((struct in_addr *) hp->h_addr);
320  return 0;
321}
322
323
324static int
325StrToPort(const char *str, u_short *port, const char *proto)
326{
327  struct servent *sp;
328  char *end;
329
330  *port = strtol(str, &end, 10);
331  if (*end != '\0') {
332    sp = getservbyname(str, proto);
333    if (sp == NULL) {
334      log_Printf(LogWARN, "StrToAddr: Unknown port or service %s/%s.\n",
335	        str, proto);
336      return -1;
337    }
338    *port = ntohs(sp->s_port);
339  }
340
341  return 0;
342}
343
344static int
345StrToPortRange(const char *str, u_short *low, u_short *high, const char *proto)
346{
347  char *minus;
348  int res;
349
350  minus = strchr(str, '-');
351  if (minus)
352    *minus = '\0';		/* Cheat the const-ness ! */
353
354  res = StrToPort(str, low, proto);
355
356  if (minus)
357    *minus = '-';		/* Cheat the const-ness ! */
358
359  if (res == 0) {
360    if (minus)
361      res = StrToPort(minus + 1, high, proto);
362    else
363      *high = *low;
364  }
365
366  return res;
367}
368
369static int
370StrToAddrAndPort(const char *str, struct in_addr *addr, u_short *low,
371                 u_short *high, const char *proto)
372{
373  char *colon;
374  int res;
375
376  colon = strchr(str, ':');
377  if (!colon) {
378    log_Printf(LogWARN, "StrToAddrAndPort: %s is missing port number.\n", str);
379    return -1;
380  }
381
382  *colon = '\0';		/* Cheat the const-ness ! */
383  res = StrToAddr(str, addr);
384  *colon = ':';			/* Cheat the const-ness ! */
385  if (res != 0)
386    return -1;
387
388  return StrToPortRange(colon + 1, low, high, proto);
389}
390
391int
392nat_ProxyRule(struct cmdargs const *arg)
393{
394  char cmd[LINE_LEN];
395  int f, pos;
396  size_t len;
397
398  if (arg->argn >= arg->argc)
399    return -1;
400
401  for (f = arg->argn, pos = 0; f < arg->argc; f++) {
402    len = strlen(arg->argv[f]);
403    if (sizeof cmd - pos < len + (len ? 1 : 0))
404      break;
405    if (len)
406      cmd[pos++] = ' ';
407    strcpy(cmd + pos, arg->argv[f]);
408    pos += len;
409  }
410
411  return PacketAliasProxyRule(cmd);
412}
413
414int
415nat_SetTarget(struct cmdargs const *arg)
416{
417  struct in_addr addr;
418
419  if (arg->argc == arg->argn) {
420    addr.s_addr = INADDR_ANY;
421    PacketAliasSetTarget(addr);
422    return 0;
423  }
424
425  if (arg->argc != arg->argn + 1)
426    return -1;
427
428  if (!strcasecmp(arg->argv[arg->argn], "MYADDR")) {
429    addr.s_addr = INADDR_ANY;
430    PacketAliasSetTarget(addr);
431    return 0;
432  }
433
434  addr = GetIpAddr(arg->argv[arg->argn]);
435  if (addr.s_addr == INADDR_NONE) {
436    log_Printf(LogWARN, "%s: invalid address\n", arg->argv[arg->argn]);
437    return 1;
438  }
439
440  PacketAliasSetTarget(addr);
441  return 0;
442}
443
444#ifndef NO_FW_PUNCH
445int
446nat_PunchFW(struct cmdargs const *arg)
447{
448  char *end;
449  long base, count;
450
451  if (arg->argc == arg->argn) {
452    PacketAliasSetMode(0, PKT_ALIAS_PUNCH_FW);
453    return 0;
454  }
455
456  if (arg->argc != arg->argn + 2)
457    return -1;
458
459  base = strtol(arg->argv[arg->argn], &end, 10);
460  if (*end != '\0' || base < 0)
461    return -1;
462
463  count = strtol(arg->argv[arg->argn + 1], &end, 10);
464  if (*end != '\0' || count < 0)
465    return -1;
466
467  PacketAliasSetFWBase(base, count);
468  PacketAliasSetMode(PKT_ALIAS_PUNCH_FW, PKT_ALIAS_PUNCH_FW);
469
470  return 0;
471}
472#endif
473
474int
475nat_SkinnyPort(struct cmdargs const *arg)
476{
477  char *end;
478  long port;
479
480  if (arg->argc == arg->argn) {
481    PacketAliasSetSkinnyPort(0);
482    return 0;
483  }
484
485  if (arg->argc != arg->argn + 1)
486    return -1;
487
488  port = strtol(arg->argv[arg->argn], &end, 10);
489  if (*end != '\0' || port < 0)
490    return -1;
491
492  PacketAliasSetSkinnyPort(port);
493
494  return 0;
495}
496
497static struct mbuf *
498nat_LayerPush(struct bundle *bundle, struct link *l __unused, struct mbuf *bp,
499                int pri __unused, u_short *proto)
500{
501  if (!bundle->NatEnabled || *proto != PROTO_IP)
502    return bp;
503
504  log_Printf(LogDEBUG, "nat_LayerPush: PROTO_IP -> PROTO_IP\n");
505  m_settype(bp, MB_NATOUT);
506  /* Ensure there's a bit of extra buffer for the NAT code... */
507  bp = m_pullup(m_append(bp, NULL, NAT_EXTRABUF));
508  PacketAliasOut(MBUF_CTOP(bp), bp->m_len);
509  bp->m_len = ntohs(((struct ip *)MBUF_CTOP(bp))->ip_len);
510
511  return bp;
512}
513
514static struct mbuf *
515nat_LayerPull(struct bundle *bundle, struct link *l __unused, struct mbuf *bp,
516                u_short *proto)
517{
518  static int gfrags;
519  int ret, len, nfrags;
520  struct mbuf **last;
521  char *fptr;
522
523  if (!bundle->NatEnabled || *proto != PROTO_IP)
524    return bp;
525
526  log_Printf(LogDEBUG, "nat_LayerPull: PROTO_IP -> PROTO_IP\n");
527  m_settype(bp, MB_NATIN);
528  /* Ensure there's a bit of extra buffer for the NAT code... */
529  bp = m_pullup(m_append(bp, NULL, NAT_EXTRABUF));
530  ret = PacketAliasIn(MBUF_CTOP(bp), bp->m_len);
531
532  bp->m_len = ntohs(((struct ip *)MBUF_CTOP(bp))->ip_len);
533  if (bp->m_len > MAX_MRU) {
534    log_Printf(LogWARN, "nat_LayerPull: Problem with IP header length (%lu)\n",
535               (unsigned long)bp->m_len);
536    m_freem(bp);
537    return NULL;
538  }
539
540  switch (ret) {
541    case PKT_ALIAS_OK:
542      break;
543
544    case PKT_ALIAS_UNRESOLVED_FRAGMENT:
545      /* Save the data for later */
546      fptr = malloc(bp->m_len);
547      bp = mbuf_Read(bp, fptr, bp->m_len);
548      PacketAliasSaveFragment(fptr);
549      log_Printf(LogDEBUG, "Store another frag (%lu) - now %d\n",
550                 (unsigned long)((struct ip *)fptr)->ip_id, ++gfrags);
551      break;
552
553    case PKT_ALIAS_FOUND_HEADER_FRAGMENT:
554      /* Fetch all the saved fragments and chain them on the end of `bp' */
555      last = &bp->m_nextpkt;
556      nfrags = 0;
557      while ((fptr = PacketAliasGetFragment(MBUF_CTOP(bp))) != NULL) {
558        nfrags++;
559        PacketAliasFragmentIn(MBUF_CTOP(bp), fptr);
560        len = ntohs(((struct ip *)fptr)->ip_len);
561        *last = m_get(len, MB_NATIN);
562        memcpy(MBUF_CTOP(*last), fptr, len);
563        free(fptr);
564        last = &(*last)->m_nextpkt;
565      }
566      gfrags -= nfrags;
567      log_Printf(LogDEBUG, "Found a frag header (%lu) - plus %d more frags (no"
568                 "w %d)\n", (unsigned long)((struct ip *)MBUF_CTOP(bp))->ip_id,
569                 nfrags, gfrags);
570      break;
571
572    case PKT_ALIAS_IGNORED:
573      if (PacketAliasSetMode(0, 0) & PKT_ALIAS_DENY_INCOMING) {
574        log_Printf(LogTCPIP, "NAT engine denied data:\n");
575        m_freem(bp);
576        bp = NULL;
577      } else if (log_IsKept(LogTCPIP)) {
578        log_Printf(LogTCPIP, "NAT engine ignored data:\n");
579        PacketCheck(bundle, AF_INET, MBUF_CTOP(bp), bp->m_len, NULL,
580                    NULL, NULL);
581      }
582      break;
583
584    default:
585      log_Printf(LogWARN, "nat_LayerPull: Dropped a packet (%d)....\n", ret);
586      m_freem(bp);
587      bp = NULL;
588      break;
589  }
590
591  return bp;
592}
593
594struct layer natlayer =
595  { LAYER_NAT, "nat", nat_LayerPush, nat_LayerPull };
596