diff options
Diffstat (limited to 'src/charon/network/socket.c')
-rw-r--r-- | src/charon/network/socket.c | 538 |
1 files changed, 246 insertions, 292 deletions
diff --git a/src/charon/network/socket.c b/src/charon/network/socket.c index 89e21a267..dc5aff8d0 100644 --- a/src/charon/network/socket.c +++ b/src/charon/network/socket.c @@ -6,6 +6,7 @@ */ /* + * Copyright (C) 2006 Tobias Brunner, Daniel Roethlisberger * Copyright (C) 2005 Jan Hutter, Martin Willi * Hochschule fuer Technik Rapperswil * Copyright (C) 1998-2002 D. Hugh Redelmeier. @@ -32,9 +33,11 @@ #include <unistd.h> #include <stdlib.h> #include <fcntl.h> -#include <net/if.h> #include <sys/ioctl.h> #include <netinet/in.h> +#include <netinet/ip.h> +#include <netinet/udp.h> +#include <linux/ipsec.h> #include <linux/filter.h> #include "socket.h" @@ -42,66 +45,20 @@ #include <daemon.h> #include <utils/logger_manager.h> - -#define IP_HEADER_LENGTH 20 -#define UDP_HEADER_LENGTH 8 - - -/** - * This filter code filters out all non-IKEv2 traffic on - * a SOCK_RAW IP_PROTP_UDP socket. Handling of other - * IKE versions is done in pluto. - */ -struct sock_filter ikev2_filter_code[] = -{ - /* Protocol must be UDP */ - BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 9), - BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, IPPROTO_UDP, 0, 7), - /* Destination Port must be 500 */ - BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 22), - BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 500, 0, 5), - /* IKE version must be 2.0 */ - BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 45), - BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x20, 0, 3), - /* packet length is length in IKEv2 header + ip header + udp header */ - BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 52), - BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, IP_HEADER_LENGTH + UDP_HEADER_LENGTH), - BPF_STMT(BPF_RET+BPF_A, 0), - /* packet doesn't match IKEv2, ignore */ - BPF_STMT(BPF_RET+BPF_K, 0), -}; - -/** - * Filter struct to use with setsockopt - */ -struct sock_fprog ikev2_filter = { - sizeof(ikev2_filter_code) / sizeof(struct sock_filter), - ikev2_filter_code -}; - - -typedef struct interface_t interface_t; - -/** - * An interface on which we listen. - */ -struct interface_t { - - /** - * Name of the interface - */ - char name[IFNAMSIZ]; - - /** - * Associated socket - */ - int socket_fd; - - /** - * Host with listening address - */ - host_t *address; -}; +/* constants for packet handling */ +#define IP_LEN sizeof(struct iphdr) +#define UDP_LEN sizeof(struct udphdr) +#define MARKER_LEN sizeof(u_int32_t) + +/* offsets for packet handling */ +#define IP 0 +#define UDP IP + IP_LEN +#define IKE UDP + UDP_LEN + +/* from linux/in.h */ +#ifndef IP_IPSEC_POLICY +#define IP_IPSEC_POLICY 16 +#endif /*IP_IPSEC_POLICY*/ typedef struct private_socket_t private_socket_t; @@ -113,21 +70,52 @@ struct private_socket_t{ * public functions */ socket_t public; - + /** - * Master socket + * regular port */ - int master_fd; + int port; + + /** + * port used for nat-t + */ + int natt_port; /** - * List of all socket to listen + * raw socket (receiver) */ - linked_list_t* interfaces; + int raw_fd; + + /** + * send socket on regular port + */ + int send_fd; + + /** + * send socket on nat-t port + */ + int natt_fd; /** * logger for this socket */ logger_t *logger; + + /** + * Setup a send socket + * + * @param this calling object + * @param port the port + * @param send_fd returns the file descriptor of this new socket + */ + status_t (*setup_send_socket) (private_socket_t *this, u_int16_t port, int *send_fd); + + /** + * Initialize + * + * @param this calling object + */ + status_t (*initialize) (private_socket_t *this); }; /** @@ -138,96 +126,51 @@ static status_t receiver(private_socket_t *this, packet_t **packet) char buffer[MAX_PACKET]; chunk_t data; packet_t *pkt; + struct iphdr *ip; + struct udphdr *udp; host_t *source, *dest; int bytes_read = 0; + int data_offset, oldstate; - - while (bytes_read >= 0) + this->logger->log(this->logger, CONTROL|LEVEL1, "receive from raw socket"); + /* allow cancellation while blocking on recv() */ + pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &oldstate); + bytes_read = recv(this->raw_fd, buffer, MAX_PACKET, 0); + pthread_setcancelstate(oldstate, NULL); + + if (bytes_read < 0) { - int max_fd = 1; - fd_set readfds; - iterator_t *iterator; - int oldstate; - interface_t *interface; - - /* build fd_set */ - FD_ZERO(&readfds); - iterator = this->interfaces->create_iterator(this->interfaces, TRUE); - while (iterator->has_next(iterator)) - { - iterator->current(iterator, (void**)&interface); - FD_SET(interface->socket_fd, &readfds); - if (interface->socket_fd > max_fd) - { - max_fd = interface->socket_fd + 1; - } - } - iterator->destroy(iterator); - - this->logger->log(this->logger, CONTROL|LEVEL1, "waiting on sockets"); - - /* allow cancellation while select()-ing */ - pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &oldstate); - bytes_read = select(max_fd, &readfds, NULL, NULL, NULL); - pthread_setcancelstate(oldstate, NULL); - - /* read on the first nonblocking socket */ - bytes_read = 0; - iterator = this->interfaces->create_iterator(this->interfaces, TRUE); - while (iterator->has_next(iterator)) - { - iterator->current(iterator, (void**)&interface); - if (FD_ISSET(interface->socket_fd, &readfds)) - { - /* do the read */ - bytes_read = recv(interface->socket_fd, buffer, MAX_PACKET, 0); - break; - } - } - iterator->destroy(iterator); - - if (bytes_read < 0) - { - this->logger->log(this->logger, ERROR, "error reading from socket: %s", strerror(errno)); - continue; - } - /* insert a delay to simulate small bandwith/RTT */ -#ifdef PACKET_RECV_DELAY - usleep(PACKET_RECV_DELAY * 1000); -#endif - /* simulate packet loss of every PACKET_RECV_LOSS'th packet */ -#ifdef PACKET_RECV_LOSS - srandom(time(NULL) + getpid()); - if (random() % PACKET_RECV_LOSS == 0) - { - return SUCCESS; - } -#endif - if (bytes_read > IP_HEADER_LENGTH + UDP_HEADER_LENGTH) - { - /* read source/dest from raw IP/UDP header */ - chunk_t source_chunk = {buffer + 12, 4}; - chunk_t dest_chunk = {buffer + 16, 4}; - u_int16_t source_port = ntohs(*(u_int16_t*)(buffer + 20)); - u_int16_t dest_port = ntohs(*(u_int16_t*)(buffer + 22)); - source = host_create_from_chunk(AF_INET, source_chunk, source_port); - dest = host_create_from_chunk(AF_INET, dest_chunk, dest_port); - pkt = packet_create(); - pkt->set_source(pkt, source); - pkt->set_destination(pkt, dest); - break; - } - this->logger->log(this->logger, ERROR|LEVEL1, "too short packet received"); + this->logger->log(this->logger, ERROR, "error reading from socket: %s", strerror(errno)); + return FAILED; } + + /* read source/dest from raw IP/UDP header */ + ip = (struct iphdr*) buffer; + udp = (struct udphdr*) (buffer + IP_LEN); + source = host_create_from_hdr(ip->saddr, udp->source); + dest = host_create_from_hdr(ip->daddr, udp->dest); + + pkt = packet_create(); + pkt->set_source(pkt, source); + pkt->set_destination(pkt, dest); + this->logger->log(this->logger, CONTROL, "received packet: from %s:%d to %s:%d", source->get_address(source), source->get_port(source), dest->get_address(dest), dest->get_port(dest)); + data_offset = IP_LEN + UDP_LEN; + + /* remove non esp marker */ + if (dest->get_port(dest) == this->natt_port) + { + data_offset += MARKER_LEN; + } + /* fill in packet */ - data.len = bytes_read - IP_HEADER_LENGTH - UDP_HEADER_LENGTH; + data.len = bytes_read - data_offset; data.ptr = malloc(data.len); - memcpy(data.ptr, buffer + IP_HEADER_LENGTH + UDP_HEADER_LENGTH, data.len); + memcpy(data.ptr, buffer + data_offset, data.len); pkt->set_data(pkt, data); /* return packet */ @@ -241,8 +184,9 @@ static status_t receiver(private_socket_t *this, packet_t **packet) */ status_t sender(private_socket_t *this, packet_t *packet) { + int sport, fd; ssize_t bytes_sent; - chunk_t data; + chunk_t data, marked; host_t *src, *dst; src = packet->get_source(packet); @@ -252,20 +196,39 @@ status_t sender(private_socket_t *this, packet_t *packet) this->logger->log(this->logger, CONTROL, "sending packet: from %s:%d to %s:%d", src->get_address(src), src->get_port(src), dst->get_address(dst), dst->get_port(dst)); - /* insert a delay to simulate small bandwith/RTT */ -#ifdef PACKET_SEND_DELAY - usleep(PACKET_SEND_DELAY * 1000); -#endif - /* simulate packet loss of every PACKET_LOSS'th packet */ -#ifdef PACKET_SEND_LOSS - srandom(time(NULL) + getpid()); - if (random() % PACKET_SEND_LOSS == 0) + + /* send data */ + sport = src->get_port(src); + if (sport == this->port) { - return SUCCESS; + fd = this->send_fd; } -#endif - /* send data */ - bytes_sent = sendto(this->master_fd, data.ptr, data.len, 0, + else if (sport == this->natt_port) + { + fd = this->natt_fd; + /* NAT keepalives without marker */ + if (data.len != 1 || data.ptr[0] != 0xFF) + { + /* add non esp marker to packet */ + if (data.len > MAX_PACKET - MARKER_LEN) + { + this->logger->log(this->logger, ERROR, "unable to send packet: it's too big"); + return FAILED; + } + marked = chunk_alloc(data.len + MARKER_LEN); + memset(marked.ptr, 0, MARKER_LEN); + memcpy(marked.ptr + MARKER_LEN, data.ptr, data.len); + packet->set_data(packet, marked); /* let the packet do the clean up for us */ + data = marked; + } + } + else + { + this->logger->log(this->logger, ERROR, "unable to locate a send socket for port: %d", sport); + return FAILED; + } + + bytes_sent = sendto(fd, data.ptr, data.len, 0, dst->get_sockaddr(dst), *(dst->get_sockaddr_len(dst))); if (bytes_sent != data.len) @@ -273,160 +236,153 @@ status_t sender(private_socket_t *this, packet_t *packet) this->logger->log(this->logger, ERROR, "error writing to socket: %s", strerror(errno)); return FAILED; } + return SUCCESS; } /** - * Find all suitable interfaces, bind them and add them to the list + * setup a send socket on a specified port */ -static status_t build_interface_list(private_socket_t *this, u_int16_t port) -{ +static status_t setup_send_socket(private_socket_t *this, u_int16_t port, int *send_fd) { int on = TRUE; - int i; struct sockaddr_in addr; - struct ifconf ifconf; - struct ifreq buf[300]; - - /* master socket for querying socket for a specific interfaces */ - this->master_fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); - if (this->master_fd == -1) + int fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); + if (fd < 0) { - this->logger->log(this->logger, ERROR, "could not open IPv4 master socket!"); + this->logger->log(this->logger, ERROR, "could not open IPv4 send socket!"); return FAILED; } - /* allow binding of multiplo sockets */ - if (setsockopt(this->master_fd, SOL_SOCKET, SO_REUSEADDR, (void*)&on, sizeof(on)) < 0) + if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&on, sizeof(on)) < 0) { - this->logger->log(this->logger, ERROR, "unable to set SO_REUSEADDR on master socket!"); + this->logger->log(this->logger, ERROR, "unable to set SO_REUSEADDR on send socket!"); + close(fd); return FAILED; } + + struct sadb_x_policy policy; + int level, opt; - /* bind the master socket */ - addr.sin_family = AF_INET; - addr.sin_addr.s_addr = INADDR_ANY; - addr.sin_port = htons(port); - if (bind(this->master_fd,(struct sockaddr*)&addr, sizeof(addr)) < 0) + policy.sadb_x_policy_len = sizeof(policy) / sizeof(u_int64_t); + policy.sadb_x_policy_exttype = SADB_X_EXT_POLICY; + policy.sadb_x_policy_type = IPSEC_POLICY_BYPASS; + policy.sadb_x_policy_dir = IPSEC_DIR_INBOUND; + policy.sadb_x_policy_reserved = 0; + policy.sadb_x_policy_id = 0; + + /* ipv6 + * level = IPPROTO_IPV6; + * opt = IPV6_IPSEC_POLICY; + */ + level = IPPROTO_IP; + opt = IP_IPSEC_POLICY; + + if (setsockopt(fd, level, opt, &policy, sizeof(policy)) < 0) { - this->logger->log(this->logger, ERROR, "unable to bind master socket: %s!", strerror(errno)); + this->logger->log(this->logger, ERROR, "unable to set IPSEC_POLICY on send socket!"); + close(fd); return FAILED; } - /* get all interfaces */ - ifconf.ifc_len = sizeof(buf); - ifconf.ifc_buf = (void*) buf; - memset(buf, 0, sizeof(buf)); - if (ioctl(this->master_fd, SIOCGIFCONF, &ifconf) == -1) + policy.sadb_x_policy_dir = IPSEC_DIR_OUTBOUND; + + if (setsockopt(fd, level, opt, &policy, sizeof(policy)) < 0) { - this->logger->log(this->logger, ERROR, "unable to get interfaces!"); + this->logger->log(this->logger, ERROR, "unable to set IPSEC_POLICY on send socket!"); + close(fd); return FAILED; } - /* add every interesting interfaces to our interface list */ - for (i = 0; (i+1) * sizeof(*buf) <= (size_t)ifconf.ifc_len; i++) - { - struct sockaddr_in *current = (struct sockaddr_in*) &buf[i].ifr_addr; - struct ifreq auxinfo; - int skt; - interface_t *interface; - - if (current->sin_family != AF_INET && current->sin_family != AF_INET6) - { - /* ignore all but IPv4 and IPv6 interfaces */ - continue; - } - - /* get auxilary info about socket */ - memset(&auxinfo, 0, sizeof(auxinfo)); - memcpy(auxinfo.ifr_name, buf[i].ifr_name, IFNAMSIZ); - if (ioctl(this->master_fd, SIOCGIFFLAGS, &auxinfo) == -1) - { - this->logger->log(this->logger, ERROR, "unable to SIOCGIFFLAGS master socket!"); - continue; - } - if (!(auxinfo.ifr_flags & IFF_UP)) - { - /* ignore an interface that isn't up */ - continue; - } - if (current->sin_addr.s_addr == 0) - { - /* ignore unconfigured interfaces */ - continue; - } - - /* set up interface socket */ - skt = socket(current->sin_family, SOCK_RAW, IPPROTO_UDP); - if (socket < 0) - { - this->logger->log(this->logger, ERROR, "unable to open interface socket!"); - continue; - } - if (setsockopt(skt, SOL_SOCKET, SO_REUSEADDR, (void*)&on, sizeof(on)) < 0) - { - this->logger->log(this->logger, ERROR, "unable to set SO_REUSEADDR on interface socket!"); - close(skt); - continue; - } - current->sin_port = htons(port); - - if (bind(skt, (struct sockaddr*)current, sizeof(struct sockaddr_in)) < 0) - { - this->logger->log(this->logger, ERROR, "unable to bind interface socket!"); - close(skt); - continue; - } - - if (setsockopt(skt, SOL_SOCKET, SO_ATTACH_FILTER, &ikev2_filter, sizeof(ikev2_filter)) < 0) - { - this->logger->log(this->logger, ERROR, "unable to attack IKEv2 filter to interface socket!"); - close(skt); - continue; - } - - /* add socket with interface name to list */ - interface = malloc_thing(interface_t); - strncpy(interface->name, buf[i].ifr_name, IFNAMSIZ); - interface->socket_fd = skt; - interface->address = host_create_from_sockaddr((struct sockaddr*)current); - this->logger->log(this->logger, CONTROL, "listening on %s (%s)", - interface->name, interface->address->get_address(interface->address)); - this->interfaces->insert_last(this->interfaces, (void*)interface); - } - - if (this->interfaces->get_count(this->interfaces) == 0) + /* bind the send socket */ + addr.sin_family = AF_INET; + addr.sin_addr.s_addr = INADDR_ANY; + addr.sin_port = htons(port); + if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) < 0) { - this->logger->log(this->logger, ERROR, "unable to find any usable interface!"); + this->logger->log(this->logger, ERROR, "unable to bind send socket: %s!", strerror(errno)); return FAILED; } + + *send_fd = fd; return SUCCESS; } /** - * implementation of socket_t.is_listening_on + * Initialize all sub sockets */ -static bool is_listening_on(private_socket_t *this, host_t *host) +static status_t initialize(private_socket_t *this) { - iterator_t *iterator; - - /* listening on wildcard 0.0.0.0 is always FALSE */ - if (host->is_anyaddr(host)) - return FALSE; + /* This filter code filters out all non-IKEv2 traffic on + * a SOCK_RAW IP_PROTP_UDP socket. Handling of other + * IKE versions is done in pluto. + */ + struct sock_filter ikev2_filter_code[] = + { + /* Protocol must be UDP */ + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, IP + 9), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, IPPROTO_UDP, 0, 15), + /* Destination Port must be either port or natt_port */ + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, UDP + 2), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, this->port, 1, 0), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, this->natt_port, 5, 12), + /* port */ + /* IKE version must be 2.0 */ + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, IKE + 17), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x20, 0, 10), + /* packet length is length in IKEv2 header + ip header + udp header */ + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, IKE + 24), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, IP_LEN + UDP_LEN), + BPF_STMT(BPF_RET+BPF_A, 0), + /* natt_port */ + /* nat-t: check for marker */ + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, IKE), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0, 0, 5), + /* nat-t: IKE version must be 2.0 */ + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, IKE + MARKER_LEN + 17), + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x20, 0, 3), + /* nat-t: packet length is length in IKEv2 header + ip header + udp header + non esp marker */ + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, IKE + MARKER_LEN + 24), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, IP_LEN + UDP_LEN + MARKER_LEN), + BPF_STMT(BPF_RET+BPF_A, 0), + /* packet doesn't match, ignore */ + BPF_STMT(BPF_RET+BPF_K, 0), + }; + + /* Filter struct to use with setsockopt */ + struct sock_fprog ikev2_filter = { + sizeof(ikev2_filter_code) / sizeof(struct sock_filter), + ikev2_filter_code + }; + + /* set up raw socket */ + this->raw_fd = socket(PF_INET, SOCK_RAW, IPPROTO_UDP); + if (this->raw_fd < 0) + { + this->logger->log(this->logger, ERROR, "unable to create raw socket!"); + return FAILED; + } - /* compare host with all interfaces */ - iterator = this->interfaces->create_iterator(this->interfaces, TRUE); - while (iterator->has_next(iterator)) + if (setsockopt(this->raw_fd, SOL_SOCKET, SO_ATTACH_FILTER, &ikev2_filter, sizeof(ikev2_filter)) < 0) { - interface_t *interface; - iterator->current(iterator, (void**)&interface); - if (host->equals(host, interface->address)) - { - iterator->destroy(iterator); - return TRUE; - } + this->logger->log(this->logger, ERROR, "unable to attach IKEv2 filter to raw socket!"); + close(this->raw_fd); + return FAILED; + } + + /* setup the send sockets */ + if (this->setup_send_socket(this, this->port, &this->send_fd) != SUCCESS) + { + this->logger->log(this->logger, ERROR, "unable to setup send socket on port %d!", this->port); + return FAILED; + } + + if (this->setup_send_socket(this, this->natt_port, &this->natt_fd) != SUCCESS) + { + this->logger->log(this->logger, ERROR, "unable to setup send socket on port %d!", this->natt_port); + return FAILED; } - iterator->destroy(iterator); - return FALSE; + + return SUCCESS; } /** @@ -434,39 +390,37 @@ static bool is_listening_on(private_socket_t *this, host_t *host) */ static void destroy(private_socket_t *this) { - interface_t *interface; - while (this->interfaces->remove_last(this->interfaces, (void**)&interface) == SUCCESS) - { - interface->address->destroy(interface->address); - close(interface->socket_fd); - free(interface); - } - this->interfaces->destroy(this->interfaces); - close(this->master_fd); + close(this->natt_fd); + close(this->send_fd); + close(this->raw_fd); free(this); } /* * See header for description */ -socket_t *socket_create(u_int16_t port) +socket_t *socket_create(u_int16_t port, u_int16_t natt_port) { private_socket_t *this = malloc_thing(private_socket_t); + /* private functions */ + this->initialize = (status_t(*)(private_socket_t*))initialize; + this->setup_send_socket = (status_t(*)(private_socket_t*,u_int16_t, int*))setup_send_socket; + /* public functions */ this->public.send = (status_t(*)(socket_t*, packet_t*))sender; this->public.receive = (status_t(*)(socket_t*, packet_t**))receiver; - this->public.is_listening_on = (bool (*)(socket_t*,host_t*))is_listening_on; this->public.destroy = (void(*)(socket_t*)) destroy; - + this->logger = logger_manager->get_logger(logger_manager, SOCKET); - this->interfaces = linked_list_create(); - if (build_interface_list(this, port) != SUCCESS) + this->port = port; + this->natt_port = natt_port; + + if (this->initialize(this) != SUCCESS) { - this->interfaces->destroy(this->interfaces); free(this); - charon->kill(charon, "could not bind any interface!"); + charon->kill(charon, "could not init socket!"); } return (socket_t*)this; |