1*00b67f09SDavid van Moolenbroek /* $NetBSD: iptable.c,v 1.5 2014/12/10 04:37:58 christos Exp $ */
2*00b67f09SDavid van Moolenbroek
3*00b67f09SDavid van Moolenbroek /*
4*00b67f09SDavid van Moolenbroek * Copyright (C) 2007-2009, 2013 Internet Systems Consortium, Inc. ("ISC")
5*00b67f09SDavid van Moolenbroek *
6*00b67f09SDavid van Moolenbroek * Permission to use, copy, modify, and/or distribute this software for any
7*00b67f09SDavid van Moolenbroek * purpose with or without fee is hereby granted, provided that the above
8*00b67f09SDavid van Moolenbroek * copyright notice and this permission notice appear in all copies.
9*00b67f09SDavid van Moolenbroek *
10*00b67f09SDavid van Moolenbroek * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
11*00b67f09SDavid van Moolenbroek * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
12*00b67f09SDavid van Moolenbroek * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
13*00b67f09SDavid van Moolenbroek * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
14*00b67f09SDavid van Moolenbroek * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
15*00b67f09SDavid van Moolenbroek * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
16*00b67f09SDavid van Moolenbroek * PERFORMANCE OF THIS SOFTWARE.
17*00b67f09SDavid van Moolenbroek */
18*00b67f09SDavid van Moolenbroek
19*00b67f09SDavid van Moolenbroek /* Id: iptable.c,v 1.15 2009/02/18 23:47:48 tbox Exp */
20*00b67f09SDavid van Moolenbroek
21*00b67f09SDavid van Moolenbroek #include <config.h>
22*00b67f09SDavid van Moolenbroek
23*00b67f09SDavid van Moolenbroek #include <isc/mem.h>
24*00b67f09SDavid van Moolenbroek #include <isc/radix.h>
25*00b67f09SDavid van Moolenbroek
26*00b67f09SDavid van Moolenbroek #include <dns/acl.h>
27*00b67f09SDavid van Moolenbroek
28*00b67f09SDavid van Moolenbroek static void destroy_iptable(dns_iptable_t *dtab);
29*00b67f09SDavid van Moolenbroek
30*00b67f09SDavid van Moolenbroek /*
31*00b67f09SDavid van Moolenbroek * Create a new IP table and the underlying radix structure
32*00b67f09SDavid van Moolenbroek */
33*00b67f09SDavid van Moolenbroek isc_result_t
dns_iptable_create(isc_mem_t * mctx,dns_iptable_t ** target)34*00b67f09SDavid van Moolenbroek dns_iptable_create(isc_mem_t *mctx, dns_iptable_t **target) {
35*00b67f09SDavid van Moolenbroek isc_result_t result;
36*00b67f09SDavid van Moolenbroek dns_iptable_t *tab;
37*00b67f09SDavid van Moolenbroek
38*00b67f09SDavid van Moolenbroek tab = isc_mem_get(mctx, sizeof(*tab));
39*00b67f09SDavid van Moolenbroek if (tab == NULL)
40*00b67f09SDavid van Moolenbroek return (ISC_R_NOMEMORY);
41*00b67f09SDavid van Moolenbroek tab->mctx = NULL;
42*00b67f09SDavid van Moolenbroek isc_mem_attach(mctx, &tab->mctx);
43*00b67f09SDavid van Moolenbroek isc_refcount_init(&tab->refcount, 1);
44*00b67f09SDavid van Moolenbroek tab->radix = NULL;
45*00b67f09SDavid van Moolenbroek tab->magic = DNS_IPTABLE_MAGIC;
46*00b67f09SDavid van Moolenbroek
47*00b67f09SDavid van Moolenbroek result = isc_radix_create(mctx, &tab->radix, RADIX_MAXBITS);
48*00b67f09SDavid van Moolenbroek if (result != ISC_R_SUCCESS)
49*00b67f09SDavid van Moolenbroek goto cleanup;
50*00b67f09SDavid van Moolenbroek
51*00b67f09SDavid van Moolenbroek *target = tab;
52*00b67f09SDavid van Moolenbroek return (ISC_R_SUCCESS);
53*00b67f09SDavid van Moolenbroek
54*00b67f09SDavid van Moolenbroek cleanup:
55*00b67f09SDavid van Moolenbroek dns_iptable_detach(&tab);
56*00b67f09SDavid van Moolenbroek return (result);
57*00b67f09SDavid van Moolenbroek }
58*00b67f09SDavid van Moolenbroek
59*00b67f09SDavid van Moolenbroek isc_boolean_t dns_iptable_neg = ISC_FALSE;
60*00b67f09SDavid van Moolenbroek isc_boolean_t dns_iptable_pos = ISC_TRUE;
61*00b67f09SDavid van Moolenbroek
62*00b67f09SDavid van Moolenbroek /*
63*00b67f09SDavid van Moolenbroek * Add an IP prefix to an existing IP table
64*00b67f09SDavid van Moolenbroek */
65*00b67f09SDavid van Moolenbroek isc_result_t
dns_iptable_addprefix(dns_iptable_t * tab,isc_netaddr_t * addr,isc_uint16_t bitlen,isc_boolean_t pos)66*00b67f09SDavid van Moolenbroek dns_iptable_addprefix(dns_iptable_t *tab, isc_netaddr_t *addr,
67*00b67f09SDavid van Moolenbroek isc_uint16_t bitlen, isc_boolean_t pos)
68*00b67f09SDavid van Moolenbroek {
69*00b67f09SDavid van Moolenbroek isc_result_t result;
70*00b67f09SDavid van Moolenbroek isc_prefix_t pfx;
71*00b67f09SDavid van Moolenbroek isc_radix_node_t *node = NULL;
72*00b67f09SDavid van Moolenbroek int family;
73*00b67f09SDavid van Moolenbroek
74*00b67f09SDavid van Moolenbroek INSIST(DNS_IPTABLE_VALID(tab));
75*00b67f09SDavid van Moolenbroek INSIST(tab->radix);
76*00b67f09SDavid van Moolenbroek
77*00b67f09SDavid van Moolenbroek NETADDR_TO_PREFIX_T(addr, pfx, bitlen);
78*00b67f09SDavid van Moolenbroek
79*00b67f09SDavid van Moolenbroek result = isc_radix_insert(tab->radix, &node, NULL, &pfx);
80*00b67f09SDavid van Moolenbroek if (result != ISC_R_SUCCESS) {
81*00b67f09SDavid van Moolenbroek isc_refcount_destroy(&pfx.refcount);
82*00b67f09SDavid van Moolenbroek return(result);
83*00b67f09SDavid van Moolenbroek }
84*00b67f09SDavid van Moolenbroek
85*00b67f09SDavid van Moolenbroek /* If a node already contains data, don't overwrite it */
86*00b67f09SDavid van Moolenbroek family = pfx.family;
87*00b67f09SDavid van Moolenbroek if (family == AF_UNSPEC) {
88*00b67f09SDavid van Moolenbroek /* "any" or "none" */
89*00b67f09SDavid van Moolenbroek INSIST(pfx.bitlen == 0);
90*00b67f09SDavid van Moolenbroek if (pos) {
91*00b67f09SDavid van Moolenbroek if (node->data[0] == NULL)
92*00b67f09SDavid van Moolenbroek node->data[0] = &dns_iptable_pos;
93*00b67f09SDavid van Moolenbroek if (node->data[1] == NULL)
94*00b67f09SDavid van Moolenbroek node->data[1] = &dns_iptable_pos;
95*00b67f09SDavid van Moolenbroek } else {
96*00b67f09SDavid van Moolenbroek if (node->data[0] == NULL)
97*00b67f09SDavid van Moolenbroek node->data[0] = &dns_iptable_neg;
98*00b67f09SDavid van Moolenbroek if (node->data[1] == NULL)
99*00b67f09SDavid van Moolenbroek node->data[1] = &dns_iptable_neg;
100*00b67f09SDavid van Moolenbroek }
101*00b67f09SDavid van Moolenbroek } else {
102*00b67f09SDavid van Moolenbroek /* any other prefix */
103*00b67f09SDavid van Moolenbroek if (node->data[ISC_IS6(family)] == NULL) {
104*00b67f09SDavid van Moolenbroek if (pos)
105*00b67f09SDavid van Moolenbroek node->data[ISC_IS6(family)] = &dns_iptable_pos;
106*00b67f09SDavid van Moolenbroek else
107*00b67f09SDavid van Moolenbroek node->data[ISC_IS6(family)] = &dns_iptable_neg;
108*00b67f09SDavid van Moolenbroek }
109*00b67f09SDavid van Moolenbroek }
110*00b67f09SDavid van Moolenbroek
111*00b67f09SDavid van Moolenbroek isc_refcount_destroy(&pfx.refcount);
112*00b67f09SDavid van Moolenbroek return (ISC_R_SUCCESS);
113*00b67f09SDavid van Moolenbroek }
114*00b67f09SDavid van Moolenbroek
115*00b67f09SDavid van Moolenbroek /*
116*00b67f09SDavid van Moolenbroek * Merge one IP table into another one.
117*00b67f09SDavid van Moolenbroek */
118*00b67f09SDavid van Moolenbroek isc_result_t
dns_iptable_merge(dns_iptable_t * tab,dns_iptable_t * source,isc_boolean_t pos)119*00b67f09SDavid van Moolenbroek dns_iptable_merge(dns_iptable_t *tab, dns_iptable_t *source, isc_boolean_t pos)
120*00b67f09SDavid van Moolenbroek {
121*00b67f09SDavid van Moolenbroek isc_result_t result;
122*00b67f09SDavid van Moolenbroek isc_radix_node_t *node, *new_node;
123*00b67f09SDavid van Moolenbroek int max_node = 0;
124*00b67f09SDavid van Moolenbroek
125*00b67f09SDavid van Moolenbroek RADIX_WALK (source->radix->head, node) {
126*00b67f09SDavid van Moolenbroek new_node = NULL;
127*00b67f09SDavid van Moolenbroek result = isc_radix_insert (tab->radix, &new_node, node, NULL);
128*00b67f09SDavid van Moolenbroek
129*00b67f09SDavid van Moolenbroek if (result != ISC_R_SUCCESS)
130*00b67f09SDavid van Moolenbroek return(result);
131*00b67f09SDavid van Moolenbroek
132*00b67f09SDavid van Moolenbroek /*
133*00b67f09SDavid van Moolenbroek * If we're negating a nested ACL, then we should
134*00b67f09SDavid van Moolenbroek * reverse the sense of every node. However, this
135*00b67f09SDavid van Moolenbroek * could lead to a negative node in a nested ACL
136*00b67f09SDavid van Moolenbroek * becoming a positive match in the parent, which
137*00b67f09SDavid van Moolenbroek * could be a security risk. To prevent this, we
138*00b67f09SDavid van Moolenbroek * just leave the negative nodes negative.
139*00b67f09SDavid van Moolenbroek */
140*00b67f09SDavid van Moolenbroek if (!pos) {
141*00b67f09SDavid van Moolenbroek if (node->data[0] &&
142*00b67f09SDavid van Moolenbroek *(isc_boolean_t *) node->data[0] == ISC_TRUE)
143*00b67f09SDavid van Moolenbroek new_node->data[0] = &dns_iptable_neg;
144*00b67f09SDavid van Moolenbroek
145*00b67f09SDavid van Moolenbroek if (node->data[1] &&
146*00b67f09SDavid van Moolenbroek *(isc_boolean_t *) node->data[1] == ISC_TRUE)
147*00b67f09SDavid van Moolenbroek new_node->data[1] = &dns_iptable_neg;
148*00b67f09SDavid van Moolenbroek }
149*00b67f09SDavid van Moolenbroek
150*00b67f09SDavid van Moolenbroek if (node->node_num[0] > max_node)
151*00b67f09SDavid van Moolenbroek max_node = node->node_num[0];
152*00b67f09SDavid van Moolenbroek if (node->node_num[1] > max_node)
153*00b67f09SDavid van Moolenbroek max_node = node->node_num[1];
154*00b67f09SDavid van Moolenbroek } RADIX_WALK_END;
155*00b67f09SDavid van Moolenbroek
156*00b67f09SDavid van Moolenbroek tab->radix->num_added_node += max_node;
157*00b67f09SDavid van Moolenbroek return (ISC_R_SUCCESS);
158*00b67f09SDavid van Moolenbroek }
159*00b67f09SDavid van Moolenbroek
160*00b67f09SDavid van Moolenbroek void
dns_iptable_attach(dns_iptable_t * source,dns_iptable_t ** target)161*00b67f09SDavid van Moolenbroek dns_iptable_attach(dns_iptable_t *source, dns_iptable_t **target) {
162*00b67f09SDavid van Moolenbroek REQUIRE(DNS_IPTABLE_VALID(source));
163*00b67f09SDavid van Moolenbroek isc_refcount_increment(&source->refcount, NULL);
164*00b67f09SDavid van Moolenbroek *target = source;
165*00b67f09SDavid van Moolenbroek }
166*00b67f09SDavid van Moolenbroek
167*00b67f09SDavid van Moolenbroek void
dns_iptable_detach(dns_iptable_t ** tabp)168*00b67f09SDavid van Moolenbroek dns_iptable_detach(dns_iptable_t **tabp) {
169*00b67f09SDavid van Moolenbroek dns_iptable_t *tab = *tabp;
170*00b67f09SDavid van Moolenbroek unsigned int refs;
171*00b67f09SDavid van Moolenbroek REQUIRE(DNS_IPTABLE_VALID(tab));
172*00b67f09SDavid van Moolenbroek isc_refcount_decrement(&tab->refcount, &refs);
173*00b67f09SDavid van Moolenbroek if (refs == 0)
174*00b67f09SDavid van Moolenbroek destroy_iptable(tab);
175*00b67f09SDavid van Moolenbroek *tabp = NULL;
176*00b67f09SDavid van Moolenbroek }
177*00b67f09SDavid van Moolenbroek
178*00b67f09SDavid van Moolenbroek static void
destroy_iptable(dns_iptable_t * dtab)179*00b67f09SDavid van Moolenbroek destroy_iptable(dns_iptable_t *dtab) {
180*00b67f09SDavid van Moolenbroek
181*00b67f09SDavid van Moolenbroek REQUIRE(DNS_IPTABLE_VALID(dtab));
182*00b67f09SDavid van Moolenbroek
183*00b67f09SDavid van Moolenbroek if (dtab->radix != NULL) {
184*00b67f09SDavid van Moolenbroek isc_radix_destroy(dtab->radix, NULL);
185*00b67f09SDavid van Moolenbroek dtab->radix = NULL;
186*00b67f09SDavid van Moolenbroek }
187*00b67f09SDavid van Moolenbroek
188*00b67f09SDavid van Moolenbroek isc_refcount_destroy(&dtab->refcount);
189*00b67f09SDavid van Moolenbroek dtab->magic = 0;
190*00b67f09SDavid van Moolenbroek isc_mem_putanddetach(&dtab->mctx, dtab, sizeof(*dtab));
191*00b67f09SDavid van Moolenbroek }
192