miniupnpd/pcpserver.c: Added checks for third-party allowed for it to be used.
If allowed, checking it against source address, with inverse logic from that of non-thirdparty case.
This commit is contained in:
parent
5e5a9d39eb
commit
d058fd3f36
|
@ -1049,14 +1049,30 @@ static int ValidatePCPMsg(pcp_info_t *pcp_msg_info)
|
|||
return 0;
|
||||
}
|
||||
|
||||
if (pcp_msg_info->thirdp_ip) {
|
||||
if (!GETFLAG(PCP_ALLOWTHIRDPARTYMASK)) {
|
||||
pcp_msg_info->result_code = PCP_ERR_UNSUPP_OPTION;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* RFC687, section 13.1 - if sender ip == THIRD_PARTY,
|
||||
* it's an error. */
|
||||
if (memcmp(pcp_msg_info->thirdp_ip,
|
||||
&pcp_msg_info->sender_ip,
|
||||
sizeof(pcp_msg_info->sender_ip)) == 0) {
|
||||
pcp_msg_info->result_code = PCP_ERR_MALFORMED_REQUEST;
|
||||
return 0;
|
||||
}
|
||||
} else {
|
||||
/* RFC 6887, section 8.2: MUST return address mismatch if NAT
|
||||
* in middle. (XXX n/a in thirdparty case) */
|
||||
* in middle. */
|
||||
if (memcmp(pcp_msg_info->int_ip,
|
||||
&pcp_msg_info->sender_ip,
|
||||
sizeof(pcp_msg_info->sender_ip)) != 0) {
|
||||
pcp_msg_info->result_code = PCP_ERR_ADDRESS_MISMATCH;
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
/* protocol zero means 'all protocols' : internal port MUST be zero */
|
||||
if (pcp_msg_info->protocol == 0 && pcp_msg_info->int_port != 0) {
|
||||
|
|
Loading…
Reference in New Issue