diff options
author | Martin Willi <martin@revosec.ch> | 2013-09-04 17:12:23 +0200 |
---|---|---|
committer | Martin Willi <martin@revosec.ch> | 2013-09-13 13:56:43 +0200 |
commit | 96136a12298e0804e8bd5f5b2d2d68e508da9810 (patch) | |
tree | d872b7946604db44b7bf9994144cf72ad769c88a /src/libipsec/ipsec_processor.c | |
parent | 791fde166998fa1f48c837576ec155e38bcdd1be (diff) | |
download | strongswan-96136a12298e0804e8bd5f5b2d2d68e508da9810.tar.bz2 strongswan-96136a12298e0804e8bd5f5b2d2d68e508da9810.tar.xz |
libipsec: check for a policy with the reqid of the SA on decapsulation
To prevent a client from sending a packet with a source address of a different
client, we require a policy bound via reqid to the decapsulating SA.
Diffstat (limited to 'src/libipsec/ipsec_processor.c')
-rw-r--r-- | src/libipsec/ipsec_processor.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/src/libipsec/ipsec_processor.c b/src/libipsec/ipsec_processor.c index e142157f8..eae2ed2f1 100644 --- a/src/libipsec/ipsec_processor.c +++ b/src/libipsec/ipsec_processor.c @@ -93,7 +93,7 @@ static job_requeue_t process_inbound(private_ipsec_processor_t *this) esp_packet_t *packet; ipsec_sa_t *sa; u_int8_t next_header; - u_int32_t spi; + u_int32_t spi, reqid; packet = (esp_packet_t*)this->inbound_queue->dequeue(this->inbound_queue); @@ -126,6 +126,7 @@ static job_requeue_t process_inbound(private_ipsec_processor_t *this) packet->destroy(packet); return JOB_REQUEUE_DIRECT; } + reqid = sa->get_reqid(sa); ipsec->sas->checkin(ipsec->sas, sa); next_header = packet->get_next_header(packet); @@ -139,7 +140,7 @@ static job_requeue_t process_inbound(private_ipsec_processor_t *this) ip_packet = packet->get_payload(packet); policy = ipsec->policies->find_by_packet(ipsec->policies, - ip_packet, TRUE); + ip_packet, TRUE, reqid); if (policy) { /* TODO-IPSEC: update policy/sa stats? */ deliver_inbound(this, packet); @@ -193,7 +194,7 @@ static job_requeue_t process_outbound(private_ipsec_processor_t *this) packet = (ip_packet_t*)this->outbound_queue->dequeue(this->outbound_queue); - policy = ipsec->policies->find_by_packet(ipsec->policies, packet, FALSE); + policy = ipsec->policies->find_by_packet(ipsec->policies, packet, FALSE, 0); if (!policy) { DBG2(DBG_ESP, "no matching outbound IPsec policy for %H == %H", |