2014-05-15 10:29:10 +00:00
|
|
|
/* $Id: pcpserver.c,v 1.32 2014/05/15 10:27:36 nanard Exp $ */
|
2013-07-09 13:36:53 +00:00
|
|
|
/* MiniUPnP project
|
|
|
|
* Website : http://miniupnp.free.fr/
|
|
|
|
* Author : Peter Tatrai
|
|
|
|
|
|
|
|
Copyright (c) 2013 by Cisco Systems, Inc.
|
|
|
|
All rights reserved.
|
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions are met:
|
|
|
|
|
|
|
|
* Redistributions of source code must retain the above copyright notice,
|
|
|
|
this list of conditions and the following disclaimer.
|
|
|
|
* Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
this list of conditions and the following disclaimer in the documentation
|
|
|
|
and/or other materials provided with the distribution.
|
|
|
|
* The name of the author may not be used to endorse or promote products
|
|
|
|
derived from this software without specific prior written permission.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
/* Current assumptions:
|
|
|
|
- IPv4 is always NATted (internal -> external)
|
|
|
|
- IPv6 is always firewalled (this may need some work, NAT6* do exist)
|
|
|
|
|
2014-05-08 17:11:29 +00:00
|
|
|
- we make the judgement based on (in order, picking first one available):
|
|
|
|
- third party adress
|
|
|
|
- internal client address
|
2014-05-03 07:13:25 +00:00
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
TODO : handle NAT46, NAT64, NPT66. In addition, beyond FW/NAT
|
|
|
|
choice, should also add for proxy (=as much as possible transparent
|
|
|
|
pass-through to one or more servers).
|
2014-05-13 10:24:32 +00:00
|
|
|
|
|
|
|
TODO: IPv6 permission handling (for the time being, we just assume
|
|
|
|
anyone on IPv6 is a good guy, but fixing that would include
|
|
|
|
upnppermissions rewrite to be AF neutral).
|
2014-05-03 07:13:25 +00:00
|
|
|
*/
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#ifdef ENABLE_PCP
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/time.h>
|
2014-02-28 19:26:02 +00:00
|
|
|
#include <netinet/in.h>
|
2013-07-09 13:36:53 +00:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
|
|
|
|
#include "pcpserver.h"
|
2014-03-24 11:07:31 +00:00
|
|
|
#include "natpmp.h"
|
2013-07-09 13:36:53 +00:00
|
|
|
#include "macros.h"
|
|
|
|
#include "upnpglobalvars.h"
|
|
|
|
#include "pcplearndscp.h"
|
|
|
|
#include "upnpredirect.h"
|
|
|
|
#include "commonrdr.h"
|
|
|
|
#include "getifaddr.h"
|
2014-02-25 10:15:30 +00:00
|
|
|
#include "asyncsendto.h"
|
2014-03-24 11:07:31 +00:00
|
|
|
#include "upnputils.h"
|
2014-04-13 06:14:11 +00:00
|
|
|
#include "portinuse.h"
|
2013-07-09 13:36:53 +00:00
|
|
|
#include "pcp_msg_struct.h"
|
2014-05-10 12:30:58 +00:00
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
|
|
|
#include "upnppinhole.h"
|
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_PEER
|
2013-12-13 16:01:41 +00:00
|
|
|
/* TODO make this platform independent */
|
2014-05-15 10:29:10 +00:00
|
|
|
#ifdef USE_NETFILTER
|
2013-07-09 13:36:53 +00:00
|
|
|
#include "netfilter/iptcrdr.h"
|
2014-05-15 10:29:10 +00:00
|
|
|
#else
|
|
|
|
#error "PCP Peer is only supported with NETFILTER"
|
|
|
|
#endif /* USE_NETFILTER */
|
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
/* server specific information */
|
|
|
|
struct pcp_server_info {
|
|
|
|
uint8_t server_version;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* default server settings, highest version supported is the default */
|
2013-12-16 16:04:45 +00:00
|
|
|
static struct pcp_server_info this_server_info = {2};
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-10 13:33:34 +00:00
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
/* structure holding information from PCP msg*/
|
|
|
|
/* all variables are in host byte order except IP addresses */
|
|
|
|
typedef struct pcp_info {
|
|
|
|
uint8_t version;
|
|
|
|
uint8_t opcode;
|
|
|
|
uint8_t result_code;
|
|
|
|
uint32_t lifetime; /* lifetime of the mapping */
|
|
|
|
uint32_t epochtime;
|
|
|
|
/* both MAP and PEER opcode specific information */
|
2014-03-24 09:21:26 +00:00
|
|
|
uint32_t nonce[3]; /* random value generated by client */
|
2013-07-09 13:36:53 +00:00
|
|
|
uint8_t protocol;
|
|
|
|
uint16_t int_port;
|
|
|
|
const struct in6_addr *int_ip; /* in network order */
|
|
|
|
uint16_t ext_port;
|
|
|
|
const struct in6_addr *ext_ip; /* Suggested external IP in network order*/
|
|
|
|
/* PEER specific information */
|
|
|
|
#ifdef PCP_PEER
|
|
|
|
uint16_t peer_port;
|
|
|
|
const struct in6_addr *peer_ip; /* Destination IP in network order */
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
/* SADSCP specific information */
|
|
|
|
uint8_t delay_tolerance;
|
|
|
|
uint8_t loss_tolerance;
|
|
|
|
uint8_t jitter_tolerance;
|
|
|
|
uint8_t app_name_len;
|
|
|
|
const char* app_name;
|
|
|
|
uint8_t sadscp_dscp;
|
|
|
|
uint8_t matched_name;
|
|
|
|
int8_t is_sadscp_op;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef PCP_FLOWP
|
|
|
|
uint8_t dscp_up;
|
|
|
|
uint8_t dscp_down;
|
|
|
|
int flowp_present;
|
|
|
|
#endif
|
|
|
|
uint8_t is_map_op;
|
|
|
|
uint8_t is_peer_op;
|
2014-05-03 04:04:45 +00:00
|
|
|
const struct in6_addr *thirdp_ip;
|
2014-05-08 17:11:29 +00:00
|
|
|
const struct in6_addr *mapped_ip;
|
2014-05-10 13:33:34 +00:00
|
|
|
char mapped_str[INET6_ADDRSTRLEN];
|
2013-07-09 13:36:53 +00:00
|
|
|
int pfailure_present;
|
2014-05-03 04:28:40 +00:00
|
|
|
struct in6_addr sender_ip;
|
2014-05-03 07:13:25 +00:00
|
|
|
int is_fw; /* is this firewall operation? if not, nat. */
|
2014-05-08 17:11:29 +00:00
|
|
|
char desc[64];
|
2013-12-16 16:04:45 +00:00
|
|
|
} pcp_info_t;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
int get_dscp_value(pcp_info_t *pcp_msg_info) {
|
|
|
|
|
|
|
|
unsigned int ind;
|
|
|
|
|
|
|
|
for (ind = 0; ind < num_dscp_values; ind++) {
|
|
|
|
|
|
|
|
if ((dscp_values_list[ind].app_name) &&
|
2014-05-10 13:33:34 +00:00
|
|
|
(!strcmp(dscp_values_list[ind].app_name,
|
|
|
|
pcp_msg_info->app_name)) &&
|
2013-07-09 13:36:53 +00:00
|
|
|
(pcp_msg_info->delay_tolerance == dscp_values_list[ind].delay) &&
|
|
|
|
(pcp_msg_info->loss_tolerance == dscp_values_list[ind].loss) &&
|
|
|
|
(pcp_msg_info->jitter_tolerance == dscp_values_list[ind].jitter)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
pcp_msg_info->sadscp_dscp = dscp_values_list[ind].dscp_value;
|
|
|
|
pcp_msg_info->matched_name = 1;
|
|
|
|
return 0;
|
|
|
|
} else
|
|
|
|
if ((pcp_msg_info->app_name_len==0) &&
|
|
|
|
(dscp_values_list[ind].app_name_len==0) &&
|
|
|
|
(pcp_msg_info->delay_tolerance == dscp_values_list[ind].delay) &&
|
|
|
|
(pcp_msg_info->loss_tolerance == dscp_values_list[ind].loss) &&
|
|
|
|
(pcp_msg_info->jitter_tolerance == dscp_values_list[ind].jitter)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
pcp_msg_info->sadscp_dscp = dscp_values_list[ind].dscp_value;
|
|
|
|
pcp_msg_info->matched_name = 0;
|
|
|
|
return 0;
|
|
|
|
} else
|
|
|
|
if ((dscp_values_list[ind].app_name_len==0) &&
|
|
|
|
(pcp_msg_info->delay_tolerance == dscp_values_list[ind].delay) &&
|
|
|
|
(pcp_msg_info->loss_tolerance == dscp_values_list[ind].loss) &&
|
|
|
|
(pcp_msg_info->jitter_tolerance == dscp_values_list[ind].jitter)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
pcp_msg_info->sadscp_dscp = dscp_values_list[ind].dscp_value;
|
|
|
|
pcp_msg_info->matched_name = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
//if nothing matched return Default value i.e. 0
|
|
|
|
pcp_msg_info->sadscp_dscp = 0;
|
|
|
|
pcp_msg_info->matched_name = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/*
|
|
|
|
* Function extracting information from common_req (common request header)
|
|
|
|
* into pcp_msg_info.
|
|
|
|
* @return : when no problem occurred 0 is returned, 1 otherwise and appropriate
|
|
|
|
* result code is assigned to pcp_msg_info->result_code to indicate
|
|
|
|
* what kind of error occurred
|
|
|
|
*/
|
2014-03-24 09:23:07 +00:00
|
|
|
static int parseCommonRequestHeader(const pcp_request_t *common_req, pcp_info_t *pcp_msg_info)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
pcp_msg_info->version = common_req->ver ;
|
2014-03-24 09:23:07 +00:00
|
|
|
pcp_msg_info->opcode = common_req->r_opcode & 0x7f;
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->lifetime = ntohl(common_req->req_lifetime);
|
2013-12-16 16:04:00 +00:00
|
|
|
pcp_msg_info->int_ip = &common_req->ip;
|
2014-05-08 17:11:29 +00:00
|
|
|
pcp_msg_info->mapped_ip = &common_req->ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
|
|
|
|
if ( (common_req->ver > this_server_info.server_version) ) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_VERSION;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pcp_msg_info->lifetime > max_lifetime ) {
|
|
|
|
pcp_msg_info->lifetime = max_lifetime;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( (pcp_msg_info->lifetime < min_lifetime) && (pcp_msg_info->lifetime != 0) ) {
|
|
|
|
pcp_msg_info->lifetime = min_lifetime;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
2014-03-24 09:23:07 +00:00
|
|
|
static void printMAPOpcodeVersion1(const pcp_map_v1_t *map_buf)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
char map_addr[INET6_ADDRSTRLEN];
|
|
|
|
syslog(LOG_DEBUG, "PCP MAP: v1 Opcode specific information. \n");
|
|
|
|
syslog(LOG_DEBUG, "MAP protocol: \t\t %d\n",map_buf->protocol );
|
|
|
|
syslog(LOG_DEBUG, "MAP int port: \t\t %d\n", ntohs(map_buf->int_port) );
|
|
|
|
syslog(LOG_DEBUG, "MAP ext port: \t\t %d\n", ntohs(map_buf->ext_port) );
|
|
|
|
syslog(LOG_DEBUG, "MAP Ext IP: \t\t %s\n", inet_ntop(AF_INET6,
|
2013-12-16 16:04:00 +00:00
|
|
|
&map_buf->ext_ip, map_addr, INET6_ADDRSTRLEN));
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
static void printMAPOpcodeVersion2(const pcp_map_v2_t *map_buf)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
char map_addr[INET6_ADDRSTRLEN];
|
2014-03-24 09:21:26 +00:00
|
|
|
syslog(LOG_DEBUG, "PCP MAP: v2 Opcode specific information.");
|
|
|
|
syslog(LOG_DEBUG, "MAP nonce: \t%08x%08x%08x",
|
|
|
|
map_buf->nonce[0], map_buf->nonce[1], map_buf->nonce[2]);
|
|
|
|
syslog(LOG_DEBUG, "MAP protocol:\t%d", map_buf->protocol);
|
|
|
|
syslog(LOG_DEBUG, "MAP int port:\t%d", ntohs(map_buf->int_port));
|
|
|
|
syslog(LOG_DEBUG, "MAP ext port:\t%d", ntohs(map_buf->ext_port));
|
|
|
|
syslog(LOG_DEBUG, "MAP Ext IP: \t%s", inet_ntop(AF_INET6,
|
2013-12-16 16:04:00 +00:00
|
|
|
&map_buf->ext_ip, map_addr, INET6_ADDRSTRLEN));
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
static int parsePCPMAP_version1(const pcp_map_v1_t *map_v1,
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
pcp_msg_info->is_map_op = 1;
|
|
|
|
pcp_msg_info->protocol = map_v1->protocol;
|
|
|
|
pcp_msg_info->int_port = ntohs(map_v1->int_port);
|
|
|
|
pcp_msg_info->ext_port = ntohs(map_v1->ext_port);
|
|
|
|
|
2013-12-16 16:04:00 +00:00
|
|
|
pcp_msg_info->ext_ip = &(map_v1->ext_ip);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port !=0 ){
|
|
|
|
syslog(LOG_ERR, "PCP MAP: Protocol was ZERO, but internal port has non-ZERO value.");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-03-24 09:21:26 +00:00
|
|
|
static int parsePCPMAP_version2(const pcp_map_v2_t *map_v2,
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
pcp_msg_info->is_map_op = 1;
|
2014-03-24 09:21:26 +00:00
|
|
|
memcpy(pcp_msg_info->nonce, map_v2->nonce, 12);
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->protocol = map_v2->protocol;
|
|
|
|
pcp_msg_info->int_port = ntohs(map_v2->int_port);
|
|
|
|
pcp_msg_info->ext_port = ntohs(map_v2->ext_port);
|
|
|
|
|
2013-12-16 16:04:00 +00:00
|
|
|
pcp_msg_info->ext_ip = &(map_v2->ext_ip);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port !=0 ) {
|
|
|
|
syslog(LOG_ERR, "PCP MAP: Protocol was ZERO, but internal port has non-ZERO value.");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef PCP_PEER
|
|
|
|
#ifdef DEBUG
|
|
|
|
static void printPEEROpcodeVersion1(pcp_peer_v1_t *peer_buf)
|
|
|
|
{
|
|
|
|
char ext_addr[INET6_ADDRSTRLEN];
|
|
|
|
char peer_addr[INET6_ADDRSTRLEN];
|
|
|
|
syslog(LOG_DEBUG, "PCP PEER: v1 Opcode specific information. \n");
|
|
|
|
syslog(LOG_DEBUG, "Protocol: \t\t %d\n",peer_buf->protocol );
|
|
|
|
syslog(LOG_DEBUG, "Internal port: \t\t %d\n", ntohs(peer_buf->int_port) );
|
2014-01-27 11:07:54 +00:00
|
|
|
syslog(LOG_DEBUG, "External IP: \t\t %s\n", inet_ntop(AF_INET6, &peer_buf->ext_ip,
|
2013-07-09 13:36:53 +00:00
|
|
|
ext_addr,INET6_ADDRSTRLEN));
|
|
|
|
syslog(LOG_DEBUG, "External port port: \t\t %d\n", ntohs(peer_buf->ext_port) );
|
2014-01-27 11:07:54 +00:00
|
|
|
syslog(LOG_DEBUG, "PEER IP: \t\t %s\n", inet_ntop(AF_INET6, &peer_buf->peer_ip,
|
2013-07-09 13:36:53 +00:00
|
|
|
peer_addr,INET6_ADDRSTRLEN));
|
|
|
|
syslog(LOG_DEBUG, "PEER port port: \t\t %d\n", ntohs(peer_buf->peer_port) );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void printPEEROpcodeVersion2(pcp_peer_v2_t *peer_buf)
|
|
|
|
{
|
|
|
|
char ext_addr[INET6_ADDRSTRLEN];
|
|
|
|
char peer_addr[INET6_ADDRSTRLEN];
|
|
|
|
|
2014-03-24 09:21:26 +00:00
|
|
|
syslog(LOG_DEBUG, "PCP PEER: v2 Opcode specific information.");
|
|
|
|
syslog(LOG_DEBUG, "nonce: \t%08x%08x%08x",
|
2014-05-10 12:55:43 +00:00
|
|
|
peer_buf->nonce[0], peer_buf->nonce[1], peer_buf->nonce[2]);
|
2014-03-24 09:21:26 +00:00
|
|
|
syslog(LOG_DEBUG, "Protocol: \t%d",peer_buf->protocol );
|
|
|
|
syslog(LOG_DEBUG, "Internal port:\t%d", ntohs(peer_buf->int_port) );
|
|
|
|
syslog(LOG_DEBUG, "External IP: \t%s", inet_ntop(AF_INET6, &peer_buf->ext_ip,
|
2013-07-09 13:36:53 +00:00
|
|
|
ext_addr,INET6_ADDRSTRLEN));
|
2014-03-24 09:21:26 +00:00
|
|
|
syslog(LOG_DEBUG, "External port:\t%d", ntohs(peer_buf->ext_port) );
|
|
|
|
syslog(LOG_DEBUG, "PEER IP: \t%s", inet_ntop(AF_INET6, &peer_buf->peer_ip,
|
2013-07-09 13:36:53 +00:00
|
|
|
peer_addr,INET6_ADDRSTRLEN));
|
2014-03-24 09:21:26 +00:00
|
|
|
syslog(LOG_DEBUG, "PEER port: \t%d", ntohs(peer_buf->peer_port) );
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Function extracting information from peer_buf to pcp_msg_info
|
|
|
|
* @return : when no problem occurred 0 is returned, 1 otherwise
|
|
|
|
*/
|
|
|
|
static int parsePCPPEER_version1(pcp_peer_v1_t *peer_buf, \
|
|
|
|
pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
pcp_msg_info->is_peer_op = 1;
|
|
|
|
pcp_msg_info->protocol = peer_buf->protocol;
|
|
|
|
pcp_msg_info->int_port = ntohs(peer_buf->int_port);
|
|
|
|
pcp_msg_info->ext_port = ntohs(peer_buf->ext_port);
|
|
|
|
pcp_msg_info->peer_port = ntohs(peer_buf->peer_port);
|
|
|
|
|
2014-01-27 11:07:54 +00:00
|
|
|
pcp_msg_info->ext_ip = &peer_buf->ext_ip;
|
|
|
|
pcp_msg_info->peer_ip = &peer_buf->peer_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port !=0 ){
|
|
|
|
syslog(LOG_ERR, "PCP PEER: protocol was ZERO, but internal port has non-ZERO value.");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Function extracting information from peer_buf to pcp_msg_info
|
|
|
|
* @return : when no problem occurred 0 is returned, 1 otherwise
|
|
|
|
*/
|
|
|
|
static int parsePCPPEER_version2(pcp_peer_v2_t *peer_buf, \
|
|
|
|
pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
pcp_msg_info->is_peer_op = 1;
|
2014-03-24 09:21:26 +00:00
|
|
|
memcpy(pcp_msg_info->nonce, peer_buf->nonce, 12);
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->protocol = peer_buf->protocol;
|
|
|
|
pcp_msg_info->int_port = ntohs(peer_buf->int_port);
|
|
|
|
pcp_msg_info->ext_port = ntohs(peer_buf->ext_port);
|
|
|
|
pcp_msg_info->peer_port = ntohs(peer_buf->peer_port);
|
|
|
|
|
2014-01-27 11:07:54 +00:00
|
|
|
pcp_msg_info->ext_ip = &peer_buf->ext_ip;
|
|
|
|
pcp_msg_info->peer_ip = &peer_buf->peer_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port !=0 ){
|
|
|
|
syslog(LOG_ERR, "PCP PEER: protocol was ZERO, but internal port has non-ZERO value.");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
#ifdef DEBUG
|
|
|
|
static void printSADSCPOpcode(pcp_sadscp_req_t *sadscp) {
|
|
|
|
unsigned char sadscp_tol;
|
|
|
|
sadscp_tol = sadscp->tolerance_fields;
|
|
|
|
|
|
|
|
syslog(LOG_DEBUG, "PCP SADSCP: Opcode specific information.\n");
|
|
|
|
syslog(LOG_DEBUG, "Delay tolerance %d \n", (sadscp_tol>>6)&3 );
|
|
|
|
syslog(LOG_DEBUG, "Loss tolerance %d \n", (sadscp_tol>>4)&3);
|
|
|
|
syslog(LOG_DEBUG, "Jitter tolerance %d \n", (sadscp_tol>>2)&3);
|
|
|
|
syslog(LOG_DEBUG, "RRR %d \n", sadscp_tol&3);
|
|
|
|
syslog(LOG_DEBUG, "AppName Length %d \n", sadscp->app_name_length);
|
|
|
|
if (sadscp->app_name) {
|
|
|
|
syslog(LOG_DEBUG, "Application name %.*s \n", sadscp->app_name_length,
|
|
|
|
sadscp->app_name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif //DEBUG
|
|
|
|
|
|
|
|
static int parseSADSCP(pcp_sadscp_req_t *sadscp, pcp_info_t *pcp_msg_info) {
|
|
|
|
|
|
|
|
pcp_msg_info->delay_tolerance = (sadscp->tolerance_fields>>6)&3;
|
|
|
|
pcp_msg_info->loss_tolerance = (sadscp->tolerance_fields>>4)&3;
|
|
|
|
pcp_msg_info->jitter_tolerance = (sadscp->tolerance_fields>>2)&3;
|
|
|
|
|
|
|
|
if (pcp_msg_info->delay_tolerance == 3 ) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if ( pcp_msg_info->loss_tolerance == 3 ) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if ( pcp_msg_info->jitter_tolerance == 3 ) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pcp_msg_info->app_name = sadscp->app_name;
|
|
|
|
pcp_msg_info->app_name_len = sadscp->app_name_length;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
static int parsePCPOption(void* pcp_buf, int remain, pcp_info_t *pcp_msg_info)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
#ifdef DEBUG
|
|
|
|
char third_addr[INET6_ADDRSTRLEN];
|
|
|
|
#endif
|
|
|
|
unsigned short option_length;
|
|
|
|
|
|
|
|
pcp_3rd_party_option_t* opt_3rd;
|
|
|
|
#ifdef PCP_FLOWP
|
|
|
|
pcp_flow_priority_option_t* opt_flp;
|
|
|
|
#endif
|
|
|
|
pcp_filter_option_t* opt_filter;
|
|
|
|
pcp_prefer_fail_option_t* opt_prefail;
|
|
|
|
pcp_options_hdr_t* opt_hdr;
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
opt_hdr = (pcp_options_hdr_t*)pcp_buf;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
/* Do centralized option sanity checks here. */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
if (remain < (int)sizeof(*opt_hdr)) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
|
|
|
return 0;
|
|
|
|
}
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
option_length = ntohs(opt_hdr->len) + 4;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
if (remain < option_length) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (opt_hdr->code) {
|
|
|
|
|
|
|
|
case PCP_OPTION_3RD_PARTY:
|
|
|
|
|
|
|
|
opt_3rd = (pcp_3rd_party_option_t*)pcp_buf;
|
|
|
|
if ( option_length != sizeof(*opt_3rd) ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
|
|
syslog(LOG_DEBUG, "PCP OPTION: \t Third party \n");
|
|
|
|
syslog(LOG_DEBUG, "Third PARTY IP: \t %s\n", inet_ntop(AF_INET6,
|
2013-12-16 16:04:00 +00:00
|
|
|
&(opt_3rd->ip), third_addr, INET6_ADDRSTRLEN));
|
2013-07-09 13:36:53 +00:00
|
|
|
#endif
|
2014-05-03 04:04:45 +00:00
|
|
|
if (pcp_msg_info->thirdp_ip ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
syslog(LOG_ERR, "PCP: THIRD PARTY OPTION was already present. \n");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
else {
|
2014-05-08 17:11:29 +00:00
|
|
|
pcp_msg_info->thirdp_ip = &opt_3rd->ip;
|
|
|
|
pcp_msg_info->mapped_ip = &opt_3rd->ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PCP_OPTION_PREF_FAIL:
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
opt_prefail = (pcp_prefer_fail_option_t*)pcp_buf;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
if ( option_length != sizeof(*opt_prefail) ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
|
|
syslog(LOG_DEBUG, "PCP OPTION: \t Prefer failure \n");
|
|
|
|
#endif
|
|
|
|
if (pcp_msg_info->opcode != PCP_OPCODE_MAP) {
|
|
|
|
syslog(LOG_DEBUG, "PCP: Unsupported OPTION for given OPCODE.\n");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
}
|
|
|
|
if (pcp_msg_info->pfailure_present != 0 ) {
|
|
|
|
syslog(LOG_DEBUG, "PCP: PREFER FAILURE OPTION was already present. \n");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
pcp_msg_info->pfailure_present = 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PCP_OPTION_FILTER:
|
2013-12-13 16:01:41 +00:00
|
|
|
/* TODO fully implement filter */
|
2014-05-03 07:13:25 +00:00
|
|
|
opt_filter = (pcp_filter_option_t*)pcp_buf;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
if ( option_length != sizeof(*opt_filter) ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
|
|
syslog(LOG_DEBUG, "PCP OPTION: \t Filter\n");
|
|
|
|
#endif
|
|
|
|
if (pcp_msg_info->opcode != PCP_OPCODE_MAP) {
|
|
|
|
syslog(LOG_ERR, "PCP: Unsupported OPTION for given OPCODE.\n");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
#ifdef PCP_FLOWP
|
|
|
|
case PCP_OPTION_FLOW_PRIORITY:
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
syslog(LOG_DEBUG, "PCP OPTION: \t Flow priority\n");
|
|
|
|
#endif
|
2014-05-03 07:13:25 +00:00
|
|
|
opt_flp = (pcp_flow_priority_option_t*)pcp_buf;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
if ( option_length != sizeof (*flp) ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
syslog(LOG_ERR, "PCP: Error processing DSCP. sizeof %d and remaining %d . flow len %d \n",
|
|
|
|
(int)sizeof(pcp_flow_priority_option_t), remain, opt_flp->len);
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
2014-05-03 07:13:25 +00:00
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
syslog(LOG_DEBUG, "DSCP UP: \t %d \n", opt_flp->dscp_up);
|
|
|
|
syslog(LOG_DEBUG, "DSCP DOWN: \t %d \n", opt_flp->dscp_down);
|
|
|
|
#endif
|
|
|
|
pcp_msg_info->dscp_up = opt_flp->dscp_up;
|
|
|
|
pcp_msg_info->dscp_down = opt_flp->dscp_down;
|
|
|
|
pcp_msg_info->flowp_present = 1;
|
|
|
|
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
2014-05-03 07:13:25 +00:00
|
|
|
if (opt_hdr->code < 128) {
|
|
|
|
syslog(LOG_ERR, "PCP: Unrecognized mandatory PCP OPTION: %d \n", opt_hdr->code);
|
|
|
|
/* Mandatory to understand */
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPTION;
|
|
|
|
remain = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* TODO - log optional not understood options? */
|
2013-07-09 13:36:53 +00:00
|
|
|
break;
|
|
|
|
}
|
2014-05-03 07:13:25 +00:00
|
|
|
return option_length;
|
|
|
|
}
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
static void parsePCPOptions(void* pcp_buf, int remain, pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
int option_length;
|
|
|
|
|
|
|
|
while (remain > 0) {
|
|
|
|
option_length = parsePCPOption(pcp_buf, remain, pcp_msg_info);
|
|
|
|
if (!option_length)
|
|
|
|
break;
|
|
|
|
remain -= option_length;
|
|
|
|
pcp_buf += option_length;
|
|
|
|
}
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-04-21 17:31:32 +00:00
|
|
|
/* CheckExternalAddress()
|
|
|
|
* Check that suggested external address in request match a real external
|
|
|
|
* IP address.
|
|
|
|
* Suggested address can also be 0 IPv4 or IPv6 address.
|
|
|
|
* (see http://tools.ietf.org/html/rfc6887#section-10 )
|
|
|
|
* return values :
|
|
|
|
* 0 : check is OK
|
|
|
|
* -1 : check failed */
|
2013-07-09 13:36:53 +00:00
|
|
|
static int CheckExternalAddress(pcp_info_t* pcp_msg_info)
|
|
|
|
{
|
2014-03-13 09:00:42 +00:00
|
|
|
/* can contain a IPv4-mapped IPv6 address */
|
2013-07-09 13:36:53 +00:00
|
|
|
static struct in6_addr external_addr;
|
2014-05-03 07:13:25 +00:00
|
|
|
int af;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-08 17:11:29 +00:00
|
|
|
af = IN6_IS_ADDR_V4MAPPED(pcp_msg_info->mapped_ip)
|
2014-05-03 07:13:25 +00:00
|
|
|
? AF_INET : AF_INET6;
|
|
|
|
|
|
|
|
pcp_msg_info->is_fw = af == AF_INET6;
|
|
|
|
|
|
|
|
if (pcp_msg_info->is_fw) {
|
2014-05-08 17:11:29 +00:00
|
|
|
external_addr = *pcp_msg_info->mapped_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
} else {
|
2014-05-03 07:13:25 +00:00
|
|
|
/* TODO : be able to handle case with multiple
|
|
|
|
* external addresses */
|
|
|
|
if(use_ext_ip_addr) {
|
|
|
|
if (inet_pton(AF_INET, use_ext_ip_addr,
|
|
|
|
((uint32_t*)external_addr.s6_addr)+3) == 1) {
|
|
|
|
((uint32_t*)external_addr.s6_addr)[0] = 0;
|
|
|
|
((uint32_t*)external_addr.s6_addr)[1] = 0;
|
|
|
|
((uint32_t*)external_addr.s6_addr)[2] = htonl(0xFFFF);
|
|
|
|
} else if (inet_pton(AF_INET6, use_ext_ip_addr, external_addr.s6_addr)
|
|
|
|
!= 1) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NETWORK_FAILURE;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if(!ext_if_name || ext_if_name[0]=='\0') {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NETWORK_FAILURE;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(getifaddr_in6(ext_if_name, af, &external_addr) < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NETWORK_FAILURE;
|
|
|
|
return -1;
|
|
|
|
}
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
}
|
2014-04-21 17:32:09 +00:00
|
|
|
if (pcp_msg_info->ext_ip == NULL ||
|
|
|
|
IN6_IS_ADDR_UNSPECIFIED(pcp_msg_info->ext_ip) ||
|
|
|
|
(IN6_IS_ADDR_V4MAPPED(pcp_msg_info->ext_ip)
|
|
|
|
&& ((uint32_t *)pcp_msg_info->ext_ip->s6_addr)[3] == INADDR_ANY)) {
|
|
|
|
/* no suggested external address : use real external address */
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->ext_ip = &external_addr;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!IN6_ARE_ADDR_EQUAL(pcp_msg_info->ext_ip, &external_addr)) {
|
|
|
|
syslog(LOG_ERR,
|
2014-05-03 07:13:25 +00:00
|
|
|
"PCP: External IP in request didn't match interface IP \n");
|
2013-07-09 13:36:53 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
char s[INET6_ADDRSTRLEN];
|
|
|
|
syslog(LOG_DEBUG, "Interface IP %s \n",
|
|
|
|
inet_ntop(AF_INET6, &external_addr.s6_addr, s, sizeof(s)));
|
|
|
|
syslog(LOG_DEBUG, "IP in the PCP request %s \n",
|
|
|
|
inet_ntop(AF_INET6, pcp_msg_info->ext_ip, s, sizeof(s)));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (pcp_msg_info->pfailure_present) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_CANNOT_PROVIDE_EXTERNAL;
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
pcp_msg_info->ext_ip = &external_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
static const char* inet_n46top(const struct in6_addr* in,
|
|
|
|
char* buf, size_t buf_len)
|
2014-05-10 13:33:34 +00:00
|
|
|
{
|
|
|
|
if (IN6_IS_ADDR_V4MAPPED(in)) {
|
|
|
|
return inet_ntop(AF_INET, ((uint32_t*)(in->s6_addr))+3, buf, buf_len);
|
|
|
|
} else {
|
|
|
|
return inet_ntop(AF_INET6, in, buf, buf_len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
#ifdef PCP_PEER
|
|
|
|
static void FillSA(struct sockaddr *sa, const struct in6_addr *in6,
|
|
|
|
uint16_t port)
|
|
|
|
{
|
|
|
|
if (IN6_IS_ADDR_V4MAPPED(in6)) {
|
|
|
|
struct sockaddr_in *sa4 = (struct sockaddr_in *)sa;
|
|
|
|
sa4->sin_family = AF_INET;
|
|
|
|
sa4->sin_addr.s_addr = ((uint32_t*)(in6)->s6_addr)[3];
|
|
|
|
sa4->sin_port = htons(port);
|
|
|
|
} else {
|
|
|
|
struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *)sa;
|
|
|
|
sa6->sin6_family = AF_INET6;
|
2013-12-16 16:04:00 +00:00
|
|
|
sa6->sin6_addr = *in6;
|
2013-07-09 13:36:53 +00:00
|
|
|
sa6->sin6_port = htons(port);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char* inet_satop(struct sockaddr* sa, char* buf, size_t buf_len)
|
|
|
|
{
|
|
|
|
if (sa->sa_family == AF_INET) {
|
|
|
|
return inet_ntop(AF_INET, &(((struct sockaddr_in*)sa)->sin_addr), buf, buf_len);
|
|
|
|
} else {
|
|
|
|
return inet_ntop(AF_INET6, &(((struct sockaddr_in6*)sa)->sin6_addr), buf, buf_len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
static int CreatePCPPeer_NAT(pcp_info_t *pcp_msg_info)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
struct sockaddr_storage intip;
|
|
|
|
struct sockaddr_storage peerip;
|
|
|
|
struct sockaddr_storage extip;
|
|
|
|
struct sockaddr_storage ret_extip;
|
|
|
|
|
|
|
|
uint8_t proto = pcp_msg_info->protocol;
|
|
|
|
|
|
|
|
uint16_t eport = pcp_msg_info->ext_port; /* public port */
|
|
|
|
|
2014-05-10 13:33:34 +00:00
|
|
|
char peerip_s[INET6_ADDRSTRLEN], extip_s[INET6_ADDRSTRLEN];
|
2014-05-13 10:15:06 +00:00
|
|
|
time_t timestamp = time(NULL) + pcp_msg_info->lifetime;
|
|
|
|
int r;
|
2014-05-10 12:30:58 +00:00
|
|
|
|
2014-05-08 17:11:29 +00:00
|
|
|
FillSA((struct sockaddr*)&intip, pcp_msg_info->mapped_ip,
|
2014-05-10 12:30:58 +00:00
|
|
|
pcp_msg_info->int_port);
|
2013-07-09 13:36:53 +00:00
|
|
|
FillSA((struct sockaddr*)&peerip, pcp_msg_info->peer_ip,
|
2014-05-10 12:30:58 +00:00
|
|
|
pcp_msg_info->peer_port);
|
2013-07-09 13:36:53 +00:00
|
|
|
FillSA((struct sockaddr*)&extip, pcp_msg_info->ext_ip,
|
2014-05-10 12:30:58 +00:00
|
|
|
eport);
|
|
|
|
|
|
|
|
inet_satop((struct sockaddr*)&peerip, peerip_s, sizeof(peerip_s));
|
|
|
|
inet_satop((struct sockaddr*)&extip, extip_s, sizeof(extip_s));
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
/* check if connection with given peer exists, if it was */
|
|
|
|
/* already established use this external port */
|
|
|
|
if (get_nat_ext_addr( (struct sockaddr*)&intip, (struct sockaddr*)&peerip,
|
|
|
|
proto, (struct sockaddr*)&ret_extip) == 1) {
|
|
|
|
if (ret_extip.ss_family == AF_INET) {
|
|
|
|
struct sockaddr_in* ret_ext4 = (struct sockaddr_in*)&ret_extip;
|
|
|
|
uint16_t ret_eport = ntohs(ret_ext4->sin_port);
|
|
|
|
eport = ret_eport;
|
|
|
|
} else if (ret_extip.ss_family == AF_INET6) {
|
|
|
|
struct sockaddr_in6* ret_ext6 = (struct sockaddr_in6*)&ret_extip;
|
|
|
|
uint16_t ret_eport = ntohs(ret_ext6->sin6_port);
|
|
|
|
eport = ret_eport;
|
|
|
|
} else {
|
|
|
|
return PCP_ERR_CANNOT_PROVIDE_EXTERNAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Create Peer Mapping */
|
|
|
|
if (eport == 0) {
|
|
|
|
eport = pcp_msg_info->int_port;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef PCP_FLOWP
|
|
|
|
if (pcp_msg_info->flowp_present && pcp_msg_info->dscp_up) {
|
|
|
|
if (add_peer_dscp_rule2(ext_if_name, peerip_s,
|
|
|
|
pcp_msg_info->peer_port, pcp_msg_info->dscp_up,
|
|
|
|
pcp_msg_info->mapped_str, pcp_msg_info->int_port,
|
|
|
|
proto, pcp_msg_info->desc, timestamp) < 0 ) {
|
|
|
|
syslog(LOG_ERR, "PCP: failed to add flowp upstream mapping %s:%hu->%s:%hu '%s'",
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
peerip_s,
|
|
|
|
pcp_msg_info->peer_port,
|
|
|
|
pcp_msg_info->desc);
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pcp_msg_info->flowp_present && pcp_msg_info->dscp_down) {
|
|
|
|
if (add_peer_dscp_rule2(ext_if_name, pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port, pcp_msg_info->dscp_down,
|
|
|
|
peerip_s, pcp_msg_info->peer_port, proto, pcp_msg_info->desc, timestamp)
|
|
|
|
< 0 ) {
|
|
|
|
syslog(LOG_ERR, "PCP: failed to add flowp downstream mapping %s:%hu->%s:%hu '%s'",
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
peerip_s,
|
|
|
|
pcp_msg_info->peer_port,
|
|
|
|
pcp_msg_info->desc);
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NO_RESOURCES;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
r = add_peer_redirect_rule2(ext_if_name,
|
|
|
|
peerip_s,
|
|
|
|
pcp_msg_info->peer_port,
|
|
|
|
extip_s,
|
|
|
|
eport,
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->protocol,
|
|
|
|
pcp_msg_info->desc,
|
|
|
|
timestamp);
|
|
|
|
if (r < 0)
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
pcp_msg_info->ext_port = eport;
|
|
|
|
return PCP_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void CreatePCPPeer(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
char peerip_s[INET6_ADDRSTRLEN];
|
|
|
|
int r = -1;
|
|
|
|
|
|
|
|
if (!inet_n46top(pcp_msg_info->peer_ip, peerip_s, sizeof(peerip_s))) {
|
|
|
|
syslog(LOG_ERR, "inet_n46top(peer_ip): %m");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-05-10 12:30:58 +00:00
|
|
|
if (pcp_msg_info->is_fw) {
|
2014-05-10 13:33:34 +00:00
|
|
|
#if 0
|
|
|
|
/* Someday, something like this is available.. and we're ready! */
|
2014-05-10 12:30:58 +00:00
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
2014-05-13 10:15:06 +00:00
|
|
|
pcp_msg_info->ext_port = pcp_msg_info->int_port;
|
2014-05-10 13:33:34 +00:00
|
|
|
r = upnp_add_outbound_pinhole(peerip_s,
|
|
|
|
pcp_msg_info->peer_port,
|
|
|
|
pcp_msg_info->mapped_str,
|
2014-05-13 10:15:06 +00:00
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->protocol,
|
2014-05-10 13:33:34 +00:00
|
|
|
pcp_msg_info->desc,
|
|
|
|
pcp_msg_info->lifetime, NULL);
|
2014-05-10 12:30:58 +00:00
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
2014-05-10 13:33:34 +00:00
|
|
|
#else
|
2014-05-13 10:15:06 +00:00
|
|
|
r = PCP_ERR_UNSUPP_OPCODE;
|
2014-05-10 13:33:34 +00:00
|
|
|
#endif /* 0 */
|
2014-05-10 12:30:58 +00:00
|
|
|
} else {
|
2014-05-13 10:15:06 +00:00
|
|
|
r = CreatePCPPeer_NAT(pcp_msg_info);
|
2014-05-10 12:30:58 +00:00
|
|
|
}
|
|
|
|
/* TODO: add upnp function for PI */
|
2014-05-13 10:15:06 +00:00
|
|
|
pcp_msg_info->result_code = r;
|
|
|
|
syslog(LOG_ERR, "PCP PEER: %s peer mapping %s %s:%hu(%hu)->%s:%hu '%s'",
|
|
|
|
r == PCP_SUCCESS ? "added" : "failed to add",
|
|
|
|
(pcp_msg_info->protocol==IPPROTO_TCP)?"TCP":"UDP",
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->ext_port,
|
|
|
|
peerip_s,
|
|
|
|
pcp_msg_info->peer_port,
|
|
|
|
pcp_msg_info->desc);
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void DeletePCPPeer(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
uint16_t iport = pcp_msg_info->int_port; /* private port */
|
|
|
|
uint16_t rport = pcp_msg_info->peer_port; /* private port */
|
|
|
|
uint8_t proto = pcp_msg_info->protocol;
|
|
|
|
char rhost[INET6_ADDRSTRLEN];
|
2014-05-10 13:33:34 +00:00
|
|
|
int r = -1;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
/* remove requested mappings for this client */
|
|
|
|
int index = 0;
|
|
|
|
unsigned short eport2, iport2, rport2;
|
|
|
|
char iaddr2[INET6_ADDRSTRLEN], rhost2[INET6_ADDRSTRLEN];
|
|
|
|
int proto2;
|
|
|
|
char desc[64];
|
|
|
|
unsigned int timestamp;
|
2014-05-10 13:33:34 +00:00
|
|
|
#if 0
|
2014-05-10 12:30:58 +00:00
|
|
|
int uid;
|
2014-05-10 13:33:34 +00:00
|
|
|
#endif /* 0 */
|
|
|
|
|
|
|
|
if (pcp_msg_info->is_fw) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPCODE;
|
|
|
|
return;
|
|
|
|
}
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
inet_n46top((struct in6_addr*)pcp_msg_info->peer_ip, rhost, sizeof(rhost));
|
|
|
|
|
2014-05-10 12:30:58 +00:00
|
|
|
for (index = 0 ;
|
|
|
|
(!pcp_msg_info->is_fw &&
|
|
|
|
get_peer_rule_by_index(index, 0,
|
|
|
|
&eport2, iaddr2, sizeof(iaddr2),
|
|
|
|
&iport2, &proto2,
|
|
|
|
desc, sizeof(desc),
|
|
|
|
rhost2, sizeof(rhost2), &rport2,
|
|
|
|
×tamp, 0, 0) >= 0)
|
2014-05-10 13:33:34 +00:00
|
|
|
#if 0
|
|
|
|
/* Some day if outbound pinholes are supported.. */
|
|
|
|
||
|
|
|
|
(pcp_msg_info->is_fw &&
|
|
|
|
(uid=upnp_get_pinhole_uid_by_index(index))>=0 &&
|
|
|
|
upnp_get_pinhole_info((unsigned short)uid,
|
|
|
|
rhost2, sizeof(rhost2), &rport2,
|
|
|
|
iaddr2, sizeof(iaddr2), &iport2,
|
|
|
|
&proto2, desc, sizeof(desc),
|
|
|
|
×tamp, NULL) > 0)
|
|
|
|
#endif /* 0 */
|
|
|
|
;
|
|
|
|
index++)
|
|
|
|
if((0 == strcmp(iaddr2, pcp_msg_info->mapped_str))
|
|
|
|
&& (0 == strcmp(rhost2, rhost))
|
2014-05-10 12:30:58 +00:00
|
|
|
&& (proto2==proto)
|
|
|
|
&& 0 == strcmp(desc, pcp_msg_info->desc)
|
|
|
|
&& (iport2==iport) && (rport2==rport)) {
|
|
|
|
if (!pcp_msg_info->is_fw)
|
|
|
|
r = _upnp_delete_redir(eport2, proto2);
|
2014-05-10 13:33:34 +00:00
|
|
|
#if 0
|
2014-05-10 12:30:58 +00:00
|
|
|
else
|
2014-05-10 13:33:34 +00:00
|
|
|
r = upnp_delete_outboundpinhole(uid);
|
|
|
|
#endif /* 0 */
|
2013-07-09 13:36:53 +00:00
|
|
|
if(r<0) {
|
|
|
|
syslog(LOG_ERR, "PCP PEER: failed to remove peer mapping");
|
|
|
|
} else {
|
|
|
|
syslog(LOG_INFO, "PCP PEER: %s port %hu peer mapping removed",
|
|
|
|
proto2==IPPROTO_TCP?"TCP":"UDP", eport2);
|
|
|
|
}
|
2014-05-10 12:30:58 +00:00
|
|
|
return;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
if (r==-1) {
|
2014-05-10 12:30:58 +00:00
|
|
|
syslog(LOG_ERR, "PCP PEER: Failed to find PCP mapping internal port %hu, protocol %s",
|
2013-07-09 13:36:53 +00:00
|
|
|
iport, (pcp_msg_info->protocol == IPPROTO_TCP)?"TCP":"UDP");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NO_RESOURCES;
|
|
|
|
}
|
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
static int CreatePCPMap_NAT(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
char iaddr_old[INET6_ADDRSTRLEN];
|
|
|
|
uint16_t iport_old, eport_first = 0;
|
|
|
|
int any_eport_allowed = 0;
|
|
|
|
unsigned int timestamp = time(NULL) + pcp_msg_info->lifetime;
|
|
|
|
|
|
|
|
if (pcp_msg_info->ext_port == 0) {
|
|
|
|
pcp_msg_info->ext_port = pcp_msg_info->int_port;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: Support non-TCP/UDP */
|
|
|
|
if (pcp_msg_info->ext_port == 0) {
|
|
|
|
return PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (eport_first == 0) { /* first time in loop */
|
|
|
|
eport_first = pcp_msg_info->ext_port;
|
|
|
|
} else if (pcp_msg_info->ext_port == eport_first) { /* no eport available */
|
|
|
|
/* all eports rejected by permissions? */
|
|
|
|
if (any_eport_allowed == 0)
|
|
|
|
return PCP_ERR_NOT_AUTHORIZED;
|
|
|
|
/* at least one eport allowed (but none available) */
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
}
|
|
|
|
if ((IN6_IS_ADDR_V4MAPPED(pcp_msg_info->mapped_ip) &&
|
|
|
|
(!check_upnp_rule_against_permissions(upnppermlist,
|
|
|
|
num_upnpperm, pcp_msg_info->ext_port,
|
|
|
|
((struct in_addr*)pcp_msg_info->mapped_ip->s6_addr)[3],
|
|
|
|
pcp_msg_info->int_port)))) {
|
|
|
|
if (pcp_msg_info->pfailure_present) {
|
|
|
|
return PCP_ERR_CANNOT_PROVIDE_EXTERNAL;
|
|
|
|
}
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
if (pcp_msg_info->ext_port == 0) { /* skip port zero */
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
any_eport_allowed = 1;
|
|
|
|
#ifdef CHECK_PORTINUSE
|
|
|
|
if (port_in_use(ext_if_name, pcp_msg_info->ext_port, pcp_msg_info->protocol,
|
|
|
|
pcp_msg_info->mapped_str, pcp_msg_info->int_port) > 0) {
|
|
|
|
syslog(LOG_INFO, "port %hu protocol %s already in use",
|
|
|
|
pcp_msg_info->ext_port,
|
|
|
|
(pcp_msg_info->protocol==IPPROTO_TCP)?"tcp":"udp");
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
if (pcp_msg_info->ext_port == 0) { /* skip port zero */
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
r = get_redirect_rule(ext_if_name,
|
|
|
|
pcp_msg_info->ext_port,
|
|
|
|
pcp_msg_info->protocol,
|
|
|
|
iaddr_old, sizeof(iaddr_old),
|
|
|
|
&iport_old, 0, 0, 0, 0,
|
|
|
|
×tamp, 0, 0);
|
|
|
|
|
|
|
|
if(r==0) {
|
|
|
|
if((strcmp(pcp_msg_info->mapped_str, iaddr_old)!=0)
|
|
|
|
|| (pcp_msg_info->int_port != iport_old)) {
|
|
|
|
/* redirection already existing */
|
|
|
|
if (pcp_msg_info->pfailure_present) {
|
|
|
|
return PCP_ERR_CANNOT_PROVIDE_EXTERNAL;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
syslog(LOG_INFO, "port %hu %s already redirected to %s:%hu, replacing",
|
|
|
|
pcp_msg_info->ext_port, (pcp_msg_info->protocol==IPPROTO_TCP)?"tcp":"udp",
|
|
|
|
iaddr_old, iport_old);
|
|
|
|
/* remove and then add again */
|
|
|
|
if (_upnp_delete_redir(pcp_msg_info->ext_port,
|
|
|
|
pcp_msg_info->protocol)==0) {
|
|
|
|
break;
|
|
|
|
} else if (pcp_msg_info->pfailure_present) {
|
|
|
|
return PCP_ERR_CANNOT_PROVIDE_EXTERNAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
if (pcp_msg_info->ext_port == 0) { /* skip port zero */
|
|
|
|
pcp_msg_info->ext_port++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} while (r==0);
|
|
|
|
|
|
|
|
r = upnp_redirect_internal(NULL,
|
|
|
|
pcp_msg_info->ext_port,
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->protocol,
|
|
|
|
pcp_msg_info->desc,
|
|
|
|
timestamp);
|
|
|
|
if (r < 0)
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
return PCP_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int CreatePCPMap_FW(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
|
|
|
int uid;
|
|
|
|
int r = upnp_add_inboundpinhole(NULL, 0,
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->protocol,
|
|
|
|
pcp_msg_info->desc,
|
|
|
|
pcp_msg_info->lifetime,
|
|
|
|
&uid);
|
|
|
|
if (r < 0)
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
return PCP_SUCCESS;
|
|
|
|
#else
|
|
|
|
return PCP_ERR_NO_RESOURCES;
|
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-24 09:24:41 +00:00
|
|
|
/* internal external PCP remote peer actual remote peer
|
|
|
|
* -------- ------- --------------- ------------------
|
|
|
|
* IPv4 firewall IPv4 IPv4 IPv4 IPv4
|
|
|
|
* IPv6 firewall IPv6 IPv6 IPv6 IPv6
|
|
|
|
* NAT44 IPv4 IPv4 IPv4 IPv4
|
|
|
|
* NAT46 IPv4 IPv6 IPv4 IPv6
|
|
|
|
* NAT64 IPv6 IPv4 IPv6 IPv4
|
|
|
|
* NPTv6 IPv6 IPv6 IPv6 IPv6
|
|
|
|
*
|
|
|
|
* Address Families with MAP and PEER
|
|
|
|
*
|
|
|
|
* The 'internal' address is implicitly the same as the source IP
|
|
|
|
* address of the PCP request, except when the THIRD_PARTY option is
|
|
|
|
* used.
|
|
|
|
*
|
|
|
|
* The 'external' address is the Suggested External Address field of the
|
|
|
|
* MAP or PEER request, and its address family is usually the same as
|
|
|
|
* the 'internal' address family, except when technologies like NAT64
|
|
|
|
* are used.
|
|
|
|
*
|
|
|
|
* The 'remote peer' address is the remote peer IP address of the PEER
|
|
|
|
* request or the FILTER option of the MAP request, and is always the
|
|
|
|
* same address family as the 'internal' address, even when NAT64 is
|
|
|
|
* used. In NAT64, the IPv6 PCP client is not necessarily aware of the
|
|
|
|
* NAT64 or aware of the actual IPv4 address of the remote peer, so it
|
|
|
|
* expresses the IPv6 address from its perspective. */
|
|
|
|
|
2014-05-13 10:15:06 +00:00
|
|
|
/* TODO: Support more than basic NAT44 / IPv6 firewall cases. */
|
2013-07-09 13:36:53 +00:00
|
|
|
static void CreatePCPMap(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
2014-05-13 10:15:06 +00:00
|
|
|
int r;
|
|
|
|
|
|
|
|
if (pcp_msg_info->is_fw)
|
|
|
|
r = CreatePCPMap_FW(pcp_msg_info);
|
|
|
|
else
|
|
|
|
r = CreatePCPMap_NAT(pcp_msg_info);
|
|
|
|
pcp_msg_info->result_code = r;
|
|
|
|
syslog(LOG_ERR, "PCP MAP: %s mapping %s %hu->%s:%hu '%s'",
|
|
|
|
r == PCP_SUCCESS ? "added" : "failed to add",
|
|
|
|
(pcp_msg_info->protocol==IPPROTO_TCP)?"TCP":"UDP",
|
|
|
|
pcp_msg_info->ext_port,
|
|
|
|
pcp_msg_info->mapped_str,
|
|
|
|
pcp_msg_info->int_port,
|
|
|
|
pcp_msg_info->desc);
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void DeletePCPMap(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
uint16_t iport = pcp_msg_info->int_port; /* private port */
|
|
|
|
uint8_t proto = pcp_msg_info->protocol;
|
|
|
|
int r=-1;
|
|
|
|
/* remove the mapping */
|
|
|
|
/* remove all the mappings for this client */
|
2014-05-10 13:33:34 +00:00
|
|
|
int index;
|
2013-07-09 13:36:53 +00:00
|
|
|
unsigned short eport2, iport2;
|
|
|
|
char iaddr2[16];
|
|
|
|
int proto2;
|
|
|
|
char desc[64];
|
|
|
|
unsigned int timestamp;
|
2014-05-10 13:33:34 +00:00
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
|
|
|
int uid = -1;
|
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2013-12-13 16:01:41 +00:00
|
|
|
/* iterate through all rules and delete the requested ones */
|
2014-05-10 13:33:34 +00:00
|
|
|
for (index = 0 ;
|
|
|
|
(!pcp_msg_info->is_fw &&
|
|
|
|
get_redirect_rule_by_index(index, 0,
|
|
|
|
&eport2, iaddr2, sizeof(iaddr2),
|
|
|
|
&iport2, &proto2,
|
|
|
|
desc, sizeof(desc),
|
|
|
|
0, 0, ×tamp, 0, 0) >= 0)
|
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
|
|
|
||
|
|
|
|
(pcp_msg_info->is_fw &&
|
|
|
|
(uid=upnp_get_pinhole_uid_by_index(index))>=0 &&
|
|
|
|
upnp_get_pinhole_info((unsigned short)uid,
|
|
|
|
NULL, 0, NULL,
|
|
|
|
iaddr2, sizeof(iaddr2), &iport2,
|
|
|
|
&proto2, desc, sizeof(desc),
|
|
|
|
×tamp, NULL) > 0)
|
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
|
|
|
;
|
|
|
|
index++)
|
|
|
|
if(0 == strcmp(iaddr2, pcp_msg_info->mapped_str)
|
|
|
|
&& (proto2==proto)
|
|
|
|
&& 0 == strcmp(desc, pcp_msg_info->desc)
|
|
|
|
&& ((iport2==iport) || (iport==0))) {
|
|
|
|
if (!pcp_msg_info->is_fw) {
|
|
|
|
r = _upnp_delete_redir(eport2, proto2);
|
2013-07-09 13:36:53 +00:00
|
|
|
} else {
|
2014-05-10 13:33:34 +00:00
|
|
|
#ifdef ENABLE_UPNPPINHOLE
|
|
|
|
r = upnp_delete_inboundpinhole(uid);
|
|
|
|
#endif /* ENABLE_UPNPPINHOLE */
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
2014-05-10 13:33:34 +00:00
|
|
|
break;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
2014-05-10 13:33:34 +00:00
|
|
|
if (r >= 0) {
|
|
|
|
syslog(LOG_INFO, "PCP: %s port %hu mapping removed",
|
|
|
|
proto2==IPPROTO_TCP?"TCP":"UDP", eport2);
|
|
|
|
} else {
|
2013-07-09 13:36:53 +00:00
|
|
|
syslog(LOG_ERR, "Failed to remove PCP mapping internal port %hu, protocol %s",
|
|
|
|
iport, (pcp_msg_info->protocol == IPPROTO_TCP)?"TCP":"UDP");
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_NO_RESOURCES;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ValidatePCPMsg(pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
if (pcp_msg_info->result_code) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-19 10:23:21 +00:00
|
|
|
/* RFC 6887, section 8.2: MUST return address mismatch if NAT
|
|
|
|
* in middle. */
|
|
|
|
if (memcmp(pcp_msg_info->int_ip,
|
|
|
|
&pcp_msg_info->sender_ip,
|
|
|
|
sizeof(pcp_msg_info->sender_ip)) != 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_ADDRESS_MISMATCH;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-03 05:54:13 +00:00
|
|
|
if (pcp_msg_info->thirdp_ip) {
|
|
|
|
if (!GETFLAG(PCP_ALLOWTHIRDPARTYMASK)) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPTION;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* RFC687, section 13.1 - if sender ip == THIRD_PARTY,
|
|
|
|
* it's an error. */
|
|
|
|
if (memcmp(pcp_msg_info->thirdp_ip,
|
|
|
|
&pcp_msg_info->sender_ip,
|
|
|
|
sizeof(pcp_msg_info->sender_ip)) == 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-05-03 05:36:32 +00:00
|
|
|
}
|
|
|
|
|
2014-05-10 12:30:58 +00:00
|
|
|
/* Produce mapped_str for future use. */
|
2014-05-10 13:33:34 +00:00
|
|
|
if (!inet_n46top(pcp_msg_info->mapped_ip, pcp_msg_info->mapped_str,
|
|
|
|
sizeof(pcp_msg_info->mapped_str))) {
|
2014-05-10 12:30:58 +00:00
|
|
|
syslog(LOG_ERR, "inet_ntop(pcpserver): %m");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-03-24 09:24:41 +00:00
|
|
|
/* protocol zero means 'all protocols' : internal port MUST be zero */
|
|
|
|
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port != 0) {
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pcp_msg_info->pfailure_present) {
|
|
|
|
if ( (IN6_IS_ADDR_UNSPECIFIED(pcp_msg_info->ext_ip) ||
|
|
|
|
((IN6_IS_ADDR_V4MAPPED(pcp_msg_info->ext_ip)) &&
|
|
|
|
(((uint32_t*)pcp_msg_info->ext_ip->s6_addr)[3] == 0))) &&
|
|
|
|
(pcp_msg_info->ext_port == 0)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (CheckExternalAddress(pcp_msg_info)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-08 17:11:29 +00:00
|
|
|
/* Fill in the desc that describes uniquely what flow we're
|
|
|
|
* dealing with (same code used in both create + delete of
|
|
|
|
* MAP/PEER) */
|
|
|
|
switch (pcp_msg_info->opcode) {
|
|
|
|
case PCP_OPCODE_MAP:
|
|
|
|
case PCP_OPCODE_PEER:
|
|
|
|
snprintf(pcp_msg_info->desc, sizeof(pcp_msg_info->desc),
|
|
|
|
"PCP %s %08x%08x%08x",
|
|
|
|
pcp_msg_info->opcode == PCP_OPCODE_MAP ? "MAP":"PEER",
|
|
|
|
pcp_msg_info->nonce[0],
|
|
|
|
pcp_msg_info->nonce[1], pcp_msg_info->nonce[2]);
|
|
|
|
break;
|
|
|
|
}
|
2013-07-09 13:36:53 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* return value indicates whether the request is valid or not.
|
|
|
|
* Based on the return value simple response can be formed.
|
|
|
|
*/
|
|
|
|
static int processPCPRequest(void * req, int req_size, pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
int remainingSize;
|
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
const pcp_map_v1_t* map_v1;
|
|
|
|
const pcp_map_v2_t* map_v2;
|
2013-07-09 13:36:53 +00:00
|
|
|
#ifdef PCP_PEER
|
|
|
|
pcp_peer_v1_t* peer_v1;
|
|
|
|
pcp_peer_v2_t* peer_v2;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
pcp_sadscp_req_t* sadscp;
|
|
|
|
#endif
|
2013-12-13 16:01:41 +00:00
|
|
|
/* start with PCP_SUCCESS as result code, if everything is OK value will be unchanged */
|
2013-07-09 13:36:53 +00:00
|
|
|
pcp_msg_info->result_code = PCP_SUCCESS;
|
|
|
|
|
|
|
|
remainingSize = req_size;
|
|
|
|
|
2013-12-13 16:01:41 +00:00
|
|
|
/* discard request that exceeds maximal length,
|
2014-02-03 09:49:59 +00:00
|
|
|
or that is shorter than PCP_MIN_LEN (=24)
|
2013-12-13 16:01:41 +00:00
|
|
|
or that is not the multiple of 4 */
|
2014-02-03 09:49:59 +00:00
|
|
|
if (req_size < 3)
|
2013-12-13 16:01:41 +00:00
|
|
|
return 0; /* ignore msg */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-02-03 09:49:59 +00:00
|
|
|
if (req_size < PCP_MIN_LEN) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return 1; /* send response */
|
|
|
|
}
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
if ( (req_size > PCP_MAX_LEN) || ( (req_size & 3) != 0)) {
|
|
|
|
syslog(LOG_ERR, "PCP: Size of PCP packet(%d) is larger than %d bytes or "
|
|
|
|
"the size is not multiple of 4.\n", req_size, PCP_MAX_LEN);
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
2013-12-13 16:01:41 +00:00
|
|
|
return 1; /* send response */
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
/* first parse request header */
|
|
|
|
if (parseCommonRequestHeader((pcp_request_t*)req, pcp_msg_info) ) {
|
2013-07-09 13:36:53 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
remainingSize -= sizeof(pcp_request_t);
|
2014-05-03 07:13:25 +00:00
|
|
|
req += sizeof(pcp_request_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
if (pcp_msg_info->version == 1) {
|
2014-02-03 09:49:59 +00:00
|
|
|
/* legacy PCP version 1 support */
|
2014-03-24 09:23:07 +00:00
|
|
|
switch (pcp_msg_info->opcode) {
|
2013-07-09 13:36:53 +00:00
|
|
|
case PCP_OPCODE_MAP:
|
|
|
|
|
|
|
|
remainingSize -= sizeof(pcp_map_v1_t);
|
|
|
|
if (remainingSize < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
map_v1 = (pcp_map_v1_t*)req;
|
2013-07-09 13:36:53 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
printMAPOpcodeVersion1(map_v1);
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
if ( parsePCPMAP_version1(map_v1, pcp_msg_info) ) {
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
req += sizeof(pcp_map_v1_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
parsePCPOptions(req, remainingSize, pcp_msg_info);
|
2013-07-09 13:36:53 +00:00
|
|
|
if (ValidatePCPMsg(pcp_msg_info)) {
|
|
|
|
if (pcp_msg_info->lifetime == 0) {
|
|
|
|
DeletePCPMap(pcp_msg_info);
|
|
|
|
} else {
|
|
|
|
CreatePCPMap(pcp_msg_info);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR, "PCP: Invalid PCP v1 MAP message.");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
#ifdef PCP_PEER
|
|
|
|
case PCP_OPCODE_PEER:
|
|
|
|
|
|
|
|
remainingSize -= sizeof(pcp_peer_v1_t);
|
|
|
|
if (remainingSize < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
2014-05-15 08:57:10 +00:00
|
|
|
peer_v1 = (pcp_peer_v1_t*)req;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
printPEEROpcodeVersion1(peer_v1);
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
if ( parsePCPPEER_version1(peer_v1, pcp_msg_info) ) {
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
req += sizeof(pcp_peer_v1_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
parsePCPOptions(req, remainingSize, pcp_msg_info);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (ValidatePCPMsg(pcp_msg_info)) {
|
|
|
|
if (pcp_msg_info->lifetime == 0) {
|
|
|
|
DeletePCPPeer(pcp_msg_info);
|
|
|
|
} else {
|
|
|
|
CreatePCPPeer(pcp_msg_info);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR, "PCP: Invalid PCP v1 PEER message.");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
break;
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
default:
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPCODE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-03-24 09:23:07 +00:00
|
|
|
} else if (pcp_msg_info->version == 2) {
|
2014-02-03 09:49:59 +00:00
|
|
|
/* RFC 6887 PCP support
|
|
|
|
* http://tools.ietf.org/html/rfc6887 */
|
2014-03-24 09:23:07 +00:00
|
|
|
switch (pcp_msg_info->opcode) {
|
2014-02-03 09:50:29 +00:00
|
|
|
case PCP_OPCODE_ANNOUNCE:
|
|
|
|
/* should check PCP Client's IP Address in request */
|
|
|
|
/* see http://tools.ietf.org/html/rfc6887#section-14.1 */
|
|
|
|
break;
|
2013-07-09 13:36:53 +00:00
|
|
|
case PCP_OPCODE_MAP:
|
|
|
|
|
|
|
|
remainingSize -= sizeof(pcp_map_v2_t);
|
|
|
|
if (remainingSize < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
map_v2 = (pcp_map_v2_t*)req;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
printMAPOpcodeVersion2(map_v2);
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (parsePCPMAP_version2(map_v2, pcp_msg_info) ) {
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
2014-05-03 07:13:25 +00:00
|
|
|
req += sizeof(pcp_map_v2_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
parsePCPOptions(req, remainingSize, pcp_msg_info);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (ValidatePCPMsg(pcp_msg_info)) {
|
|
|
|
if (pcp_msg_info->lifetime == 0) {
|
|
|
|
DeletePCPMap(pcp_msg_info);
|
|
|
|
} else {
|
|
|
|
CreatePCPMap(pcp_msg_info);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR, "PCP: Invalid PCP v2 MAP message.");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
#ifdef PCP_PEER
|
|
|
|
case PCP_OPCODE_PEER:
|
|
|
|
|
|
|
|
remainingSize -= sizeof(pcp_peer_v2_t);
|
|
|
|
if (remainingSize < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
2014-05-03 07:13:25 +00:00
|
|
|
peer_v2 = (pcp_peer_v2_t*)req;
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
printPEEROpcodeVersion2(peer_v2);
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* DEBUG */
|
2013-07-09 13:36:53 +00:00
|
|
|
parsePCPPEER_version2(peer_v2, pcp_msg_info);
|
2014-05-03 07:13:25 +00:00
|
|
|
req += sizeof(pcp_peer_v2_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (pcp_msg_info->result_code != 0) {
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
parsePCPOptions(req, remainingSize, pcp_msg_info);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (ValidatePCPMsg(pcp_msg_info)) {
|
|
|
|
if (pcp_msg_info->lifetime == 0) {
|
|
|
|
DeletePCPPeer(pcp_msg_info);
|
|
|
|
} else {
|
|
|
|
CreatePCPPeer(pcp_msg_info);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
syslog(LOG_ERR, "PCP: Invalid PCP v2 PEER message.");
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
case PCP_OPCODE_SADSCP:
|
|
|
|
remainingSize -= sizeof(pcp_sadscp_req_t);
|
|
|
|
if (remainingSize < 0) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:13:25 +00:00
|
|
|
sadscp = (pcp_sadscp_req_t*)req;
|
2014-05-10 13:33:34 +00:00
|
|
|
req += sizeof(pcp_sadscp_req_t);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if (sadscp->app_name_length > remainingSize) {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_MALFORMED_OPTION;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
printSADSCPOpcode(sadscp);
|
|
|
|
#endif
|
|
|
|
if (parseSADSCP(sadscp, pcp_msg_info)) {
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
|
|
|
|
get_dscp_value(pcp_msg_info);
|
|
|
|
|
|
|
|
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPCODE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
pcp_msg_info->result_code = PCP_ERR_UNSUPP_VERSION;
|
|
|
|
return pcp_msg_info->result_code;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void createPCPResponse(unsigned char *response, pcp_info_t *pcp_msg_info)
|
|
|
|
{
|
|
|
|
pcp_response_t *resp = (pcp_response_t*)response;
|
|
|
|
|
|
|
|
resp->reserved = 0;
|
|
|
|
resp->reserved1[0]=0;
|
|
|
|
resp->reserved1[1]=0;
|
|
|
|
resp->reserved1[2]=0;
|
|
|
|
if (pcp_msg_info->result_code == PCP_ERR_UNSUPP_VERSION ) {
|
|
|
|
/* highest supported version */
|
|
|
|
resp->ver = this_server_info.server_version;
|
|
|
|
} else {
|
|
|
|
resp->ver = pcp_msg_info->version;
|
|
|
|
}
|
|
|
|
|
|
|
|
resp->r_opcode |= 0x80;
|
|
|
|
resp->result_code = pcp_msg_info->result_code;
|
|
|
|
resp->epochtime = htonl(time(NULL) - startup_time);
|
|
|
|
switch (pcp_msg_info->result_code) {
|
2013-12-13 16:01:41 +00:00
|
|
|
/*long lifetime errors*/
|
2013-07-09 13:36:53 +00:00
|
|
|
case PCP_ERR_UNSUPP_VERSION:
|
|
|
|
case PCP_ERR_NOT_AUTHORIZED:
|
|
|
|
case PCP_ERR_MALFORMED_REQUEST:
|
|
|
|
case PCP_ERR_UNSUPP_OPCODE:
|
|
|
|
case PCP_ERR_UNSUPP_OPTION:
|
|
|
|
case PCP_ERR_MALFORMED_OPTION:
|
|
|
|
case PCP_ERR_UNSUPP_PROTOCOL:
|
|
|
|
case PCP_ERR_ADDRESS_MISMATCH:
|
|
|
|
case PCP_ERR_CANNOT_PROVIDE_EXTERNAL:
|
|
|
|
case PCP_ERR_EXCESSIVE_REMOTE_PEERS:
|
|
|
|
resp->lifetime = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PCP_ERR_NETWORK_FAILURE:
|
|
|
|
case PCP_ERR_NO_RESOURCES:
|
|
|
|
case PCP_ERR_USER_EX_QUOTA:
|
|
|
|
resp->lifetime = htonl(30);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PCP_SUCCESS:
|
|
|
|
default:
|
|
|
|
resp->lifetime = htonl(pcp_msg_info->lifetime);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (resp->r_opcode == 0x81) { /* MAP response */
|
|
|
|
if (resp->ver == 1 ) {
|
|
|
|
pcp_map_v1_t *mapr = (pcp_map_v1_t *)resp->next_data;
|
2013-12-16 16:04:00 +00:00
|
|
|
mapr->ext_ip = *pcp_msg_info->ext_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
mapr->ext_port = htons(pcp_msg_info->ext_port);
|
|
|
|
mapr->int_port = htons(pcp_msg_info->int_port);
|
|
|
|
}
|
|
|
|
else if (resp->ver == 2 ) {
|
|
|
|
pcp_map_v2_t *mapr = (pcp_map_v2_t *)resp->next_data;
|
2013-12-16 16:04:00 +00:00
|
|
|
mapr->ext_ip = *pcp_msg_info->ext_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
mapr->ext_port = htons(pcp_msg_info->ext_port);
|
|
|
|
mapr->int_port = htons(pcp_msg_info->int_port);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#ifdef PCP_PEER
|
|
|
|
else if (resp->r_opcode == 0x82) { /* PEER response */
|
|
|
|
if (resp->ver == 1 ){
|
|
|
|
pcp_peer_v1_t* peer_resp = (pcp_peer_v1_t*)resp->next_data;
|
|
|
|
peer_resp->ext_port = htons(pcp_msg_info->ext_port);
|
|
|
|
peer_resp->int_port = htons(pcp_msg_info->int_port);
|
|
|
|
peer_resp->peer_port = htons(pcp_msg_info->peer_port);
|
2014-01-27 11:07:54 +00:00
|
|
|
peer_resp->ext_ip = *pcp_msg_info->ext_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
else if (resp->ver == 2 ){
|
|
|
|
pcp_peer_v2_t* peer_resp = (pcp_peer_v2_t*)resp->next_data;
|
|
|
|
peer_resp->ext_port = htons(pcp_msg_info->ext_port);
|
|
|
|
peer_resp->int_port = htons(pcp_msg_info->int_port);
|
|
|
|
peer_resp->peer_port = htons(pcp_msg_info->peer_port);
|
2014-01-27 11:07:54 +00:00
|
|
|
peer_resp->ext_ip = *pcp_msg_info->ext_ip;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_PEER */
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
#ifdef PCP_SADSCP
|
|
|
|
else if (resp->r_opcode == 0x83) { /*SADSCP response*/
|
|
|
|
pcp_sadscp_resp_t *sadscp_resp = (pcp_sadscp_resp_t*)resp->next_data;
|
|
|
|
sadscp_resp->a_r_dscp_value = pcp_msg_info->matched_name<<7;
|
|
|
|
sadscp_resp->a_r_dscp_value &= ~(1<<6);
|
|
|
|
sadscp_resp->a_r_dscp_value |= (pcp_msg_info->sadscp_dscp & PCP_SADSCP_MASK);
|
|
|
|
memset(sadscp_resp->reserved, 0, sizeof(sadscp_resp->reserved));
|
|
|
|
}
|
2013-12-13 16:01:41 +00:00
|
|
|
#endif /* PCP_SADSCP */
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
|
|
|
|
2013-12-13 16:01:41 +00:00
|
|
|
int ProcessIncomingPCPPacket(int s, unsigned char *buff, int len,
|
2014-05-19 13:27:34 +00:00
|
|
|
const struct sockaddr *senderaddr,
|
|
|
|
const struct sockaddr_in6 *receiveraddr)
|
2013-07-09 13:36:53 +00:00
|
|
|
{
|
|
|
|
pcp_info_t pcp_msg_info;
|
2014-03-24 14:03:12 +00:00
|
|
|
struct lan_addr_s * lan_addr;
|
2014-03-24 11:07:31 +00:00
|
|
|
char addr_str[64];
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
memset(&pcp_msg_info, 0, sizeof(pcp_info_t));
|
|
|
|
|
2014-03-24 11:07:31 +00:00
|
|
|
if(senderaddr->sa_family == AF_INET) {
|
2014-05-10 12:30:58 +00:00
|
|
|
const struct sockaddr_in * senderaddr_v4 =
|
|
|
|
(const struct sockaddr_in *)senderaddr;
|
2014-05-03 04:28:40 +00:00
|
|
|
pcp_msg_info.sender_ip.s6_addr[11] = 0xff;
|
|
|
|
pcp_msg_info.sender_ip.s6_addr[10] = 0xff;
|
|
|
|
memcpy(pcp_msg_info.sender_ip.s6_addr+12,
|
|
|
|
&senderaddr_v4->sin_addr, 4);
|
|
|
|
} else if(senderaddr->sa_family == AF_INET6) {
|
2014-05-10 12:30:58 +00:00
|
|
|
const struct sockaddr_in6 * senderaddr_v6 =
|
|
|
|
(const struct sockaddr_in6 *)senderaddr;
|
2014-05-03 04:28:40 +00:00
|
|
|
pcp_msg_info.sender_ip = senderaddr_v6->sin6_addr;
|
|
|
|
} else {
|
|
|
|
syslog(LOG_WARNING, "unknown PCP packet sender address family %d",
|
|
|
|
senderaddr->sa_family);
|
|
|
|
return 0;
|
2013-07-09 13:36:53 +00:00
|
|
|
}
|
2014-05-03 04:28:40 +00:00
|
|
|
|
2014-03-24 11:07:31 +00:00
|
|
|
if(sockaddr_to_string(senderaddr, addr_str, sizeof(addr_str)))
|
|
|
|
syslog(LOG_DEBUG, "PCP request received from %s %dbytes",
|
|
|
|
addr_str, len);
|
2013-07-09 13:36:53 +00:00
|
|
|
|
|
|
|
if(buff[1] & 128) {
|
|
|
|
/* discarding PCP responses silently */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-13 10:27:27 +00:00
|
|
|
/* If we're in allow third party-mode, we probably don't care
|
|
|
|
* about locality either. Let's hope firewall is ok. */
|
|
|
|
if (!GETFLAG(PCP_ALLOWTHIRDPARTYMASK)) {
|
|
|
|
lan_addr = get_lan_for_peer(senderaddr);
|
|
|
|
if(lan_addr == NULL) {
|
|
|
|
syslog(LOG_WARNING, "PCP packet sender %s not from a LAN, ignoring",
|
|
|
|
addr_str);
|
|
|
|
return 0;
|
|
|
|
}
|
2014-03-24 14:03:12 +00:00
|
|
|
}
|
|
|
|
|
2013-07-09 13:36:53 +00:00
|
|
|
if (processPCPRequest(buff, len, &pcp_msg_info) ) {
|
|
|
|
|
|
|
|
createPCPResponse(buff, &pcp_msg_info);
|
|
|
|
|
2014-02-03 09:49:59 +00:00
|
|
|
if(len < PCP_MIN_LEN)
|
|
|
|
len = PCP_MIN_LEN;
|
|
|
|
else
|
|
|
|
len = (len + 3) & ~3; /* round up resp. length to multiple of 4 */
|
2014-05-19 13:27:34 +00:00
|
|
|
/* TODO : send using receiveraddr as source address */
|
2014-03-24 11:15:50 +00:00
|
|
|
len = sendto_or_schedule(s, buff, len, 0, senderaddr,
|
|
|
|
(senderaddr->sa_family == AF_INET) ?
|
|
|
|
sizeof(struct sockaddr_in) :
|
|
|
|
sizeof(struct sockaddr_in6) );
|
2013-07-09 13:36:53 +00:00
|
|
|
if( len < 0 ) {
|
|
|
|
syslog(LOG_ERR, "sendto(pcpserver): %m");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2014-03-24 11:07:31 +00:00
|
|
|
|
|
|
|
#ifdef ENABLE_IPV6
|
|
|
|
int OpenAndConfPCPv6Socket(void)
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
int i = 1;
|
|
|
|
struct sockaddr_in6 addr;
|
|
|
|
s = socket(PF_INET6, SOCK_DGRAM, 0/*IPPROTO_UDP*/);
|
|
|
|
if(s < 0) {
|
|
|
|
syslog(LOG_ERR, "%s: socket(): %m", "OpenAndConfPCPv6Socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i)) < 0) {
|
|
|
|
syslog(LOG_WARNING, "%s: setsockopt(SO_REUSEADDR): %m",
|
|
|
|
"OpenAndConfPCPv6Socket");
|
|
|
|
}
|
|
|
|
#ifdef IPV6_V6ONLY
|
|
|
|
/* force IPV6 only for IPV6 socket.
|
|
|
|
* see http://www.ietf.org/rfc/rfc3493.txt section 5.3 */
|
|
|
|
if(setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &i, sizeof(i)) < 0) {
|
|
|
|
syslog(LOG_WARNING, "%s: setsockopt(IPV6_V6ONLY): %m",
|
|
|
|
"OpenAndConfPCPv6Socket");
|
|
|
|
}
|
2014-05-19 13:27:34 +00:00
|
|
|
#endif
|
|
|
|
#ifdef IPV6_RECVPKTINFO
|
|
|
|
/* see RFC3542 */
|
|
|
|
if(setsockopt(s, IPPROTO_IPV6, IPV6_RECVPKTINFO, &i, sizeof(i)) < 0) {
|
|
|
|
syslog(LOG_WARNING, "%s: setsockopt(IPV6_RECVPKTINFO): %m",
|
|
|
|
"OpenAndConfPCPv6Socket");
|
|
|
|
}
|
2014-03-24 11:07:31 +00:00
|
|
|
#endif
|
|
|
|
if(!set_non_blocking(s)) {
|
|
|
|
syslog(LOG_WARNING, "%s: set_non_blocking(): %m",
|
|
|
|
"OpenAndConfPCPv6Socket");
|
|
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
|
|
addr.sin6_family = AF_INET6;
|
|
|
|
addr.sin6_port = htons(NATPMP_PORT);
|
|
|
|
addr.sin6_addr = in6addr_any;
|
|
|
|
if(bind(s, (struct sockaddr *)&addr, sizeof(addr)) < 0) {
|
|
|
|
syslog(LOG_ERR, "%s: bind(): %m", "OpenAndConfPCPv6Socket");
|
|
|
|
close(s);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
#endif /*ENABLE_IPV6*/
|
2013-07-09 13:36:53 +00:00
|
|
|
#endif /*ENABLE_PCP*/
|