1098c7bfb7
4.1.33 - Release 16 August 2009 2837931 wrong mode selected in ipf program for hash-entries 2826168 load_http can make ippool core dump 2825150 IPL_LOGMAX used to index some arrays 2825084 ipv6 fragments should not be allowed past 64k 2824713 ipfstat top output alternates between entries and nothing 2824712 ipfstat top output is shows negative ttl 2820965 a single bad ipv6 extension header should not impact others 2818197 ignored fragment bits defined as being reserved 2817667 IPv6 fragment header verification needs attention 2817098 fr_getrulen() finds the wrong rule 2817096 fr_rulen is unused 2741019 Lingering states (Established/Listen - 5/0) in state table 2702887 use of PBR/fastroute causes panic with ipv6 2671913 regression test in7 fails to execute 2598625 parsing empty config file results in an error 2698656 test parsing empty config files 2597956 not all pointers in a clone are reset 2543934 nat_t gets assigned ifp too early 2535795 No need to always bump fr_ref 2535778 Bad IPv6 packets droped by default 2031730 4.1.31 Nat drops fragmented packets after the first 2214661 ipf does not handle IPv6 fragments 2473273 NAT removed before RST/ICMP sent 2216500 fin_state serves no purpose 2424604 adding random MD5 data causes panic 2304435 Ineffecient lock usage in logging 2216491 fin_nat serves little purpose 2055619 duplicating a free-d packet will fail 2042949 Excessive locking when creating nat_t 2035610 nat_update does not need to get locks 2214658 ipf mostly ignores locking in NetBSD 1979427 Memory leak in user utilities - token never freed (rel br) * SunOS4 does not have a curproc, but it does have u. * The fix for 2020447 generated random port numbers but not within the range specified in the map rule. Add in a regression test to verify that the "random" part works. 2020447 NAT can undo name server random port selection 1988795 NetBSD does not build with kernel malloc stats 1988782 fr_movequeue can take a short cut 1988669 first nat creation failure prevents further success 1988668 hostmap searching does not work properly * on some 64bit architectures (such as alpha), the addrfamily_t is packed differently, throwing off the calculations for adf_len * one too many READ_ENTERs in ip_sync code. * clean up fr_fastroute a little by removing some #ifdefs and pushing the code around a bit to use the same variables (NetBSD) * more recent NetBSDs use VOP related macros differently
436 lines
8.0 KiB
C
436 lines
8.0 KiB
C
/* $NetBSD: ip_irc_pxy.c,v 1.1.1.7 2009/08/19 08:28:58 darrenr Exp $ */
|
|
|
|
/*
|
|
* Copyright (C) 2000-2003 Darren Reed
|
|
*
|
|
* See the IPFILTER.LICENCE file for details on licencing.
|
|
*
|
|
* Id: ip_irc_pxy.c,v 2.39.2.9 2008/11/06 21:18:34 darrenr Exp
|
|
*/
|
|
|
|
#define IPF_IRC_PROXY
|
|
|
|
#define IPF_IRCBUFSZ 96 /* This *MUST* be >= 64! */
|
|
|
|
|
|
int ippr_irc_init __P((void));
|
|
void ippr_irc_fini __P((void));
|
|
int ippr_irc_new __P((fr_info_t *, ap_session_t *, nat_t *));
|
|
int ippr_irc_out __P((fr_info_t *, ap_session_t *, nat_t *));
|
|
int ippr_irc_send __P((fr_info_t *, nat_t *));
|
|
int ippr_irc_complete __P((ircinfo_t *, char *, size_t));
|
|
u_short ipf_irc_atoi __P((char **));
|
|
|
|
static frentry_t ircnatfr;
|
|
|
|
int irc_proxy_init = 0;
|
|
|
|
|
|
/*
|
|
* Initialize local structures.
|
|
*/
|
|
int ippr_irc_init()
|
|
{
|
|
bzero((char *)&ircnatfr, sizeof(ircnatfr));
|
|
ircnatfr.fr_ref = 1;
|
|
ircnatfr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE;
|
|
MUTEX_INIT(&ircnatfr.fr_lock, "IRC proxy rule lock");
|
|
irc_proxy_init = 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void ippr_irc_fini()
|
|
{
|
|
if (irc_proxy_init == 1) {
|
|
MUTEX_DESTROY(&ircnatfr.fr_lock);
|
|
irc_proxy_init = 0;
|
|
}
|
|
}
|
|
|
|
|
|
const char *ippr_irc_dcctypes[] = {
|
|
"CHAT ", /* CHAT chat ipnumber portnumber */
|
|
"SEND ", /* SEND filename ipnumber portnumber */
|
|
"MOVE ",
|
|
"TSEND ",
|
|
"SCHAT ",
|
|
NULL,
|
|
};
|
|
|
|
|
|
/*
|
|
* :A PRIVMSG B :^ADCC CHAT chat 0 0^A\r\n
|
|
* PRIVMSG B ^ADCC CHAT chat 0 0^A\r\n
|
|
*/
|
|
|
|
|
|
int ippr_irc_complete(ircp, buf, len)
|
|
ircinfo_t *ircp;
|
|
char *buf;
|
|
size_t len;
|
|
{
|
|
register char *s, c;
|
|
register size_t i;
|
|
u_32_t l;
|
|
int j, k;
|
|
|
|
ircp->irc_ipnum = 0;
|
|
ircp->irc_port = 0;
|
|
|
|
if (len < 31)
|
|
return 0;
|
|
s = buf;
|
|
c = *s++;
|
|
i = len - 1;
|
|
|
|
if ((c != ':') && (c != 'P'))
|
|
return 0;
|
|
|
|
if (c == ':') {
|
|
/*
|
|
* Loosely check that the source is a nickname of some sort
|
|
*/
|
|
s++;
|
|
c = *s;
|
|
ircp->irc_snick = s;
|
|
if (!ISALPHA(c))
|
|
return 0;
|
|
i--;
|
|
for (c = *s; !ISSPACE(c) && (i > 0); i--)
|
|
c = *s++;
|
|
if (i < 31)
|
|
return 0;
|
|
if (c != 'P')
|
|
return 0;
|
|
} else
|
|
ircp->irc_snick = NULL;
|
|
|
|
/*
|
|
* Check command string
|
|
*/
|
|
if (strncmp(s, "PRIVMSG ", 8))
|
|
return 0;
|
|
i -= 8;
|
|
s += 8;
|
|
c = *s;
|
|
ircp->irc_dnick = s;
|
|
|
|
/*
|
|
* Loosely check that the destination is a nickname of some sort
|
|
*/
|
|
if (!ISALPHA(c))
|
|
return 0;
|
|
for (; !ISSPACE(c) && (i > 0); i--)
|
|
c = *s++;
|
|
if (i < 20)
|
|
return 0;
|
|
s++,
|
|
i--;
|
|
|
|
/*
|
|
* Look for a ^A to start the DCC
|
|
*/
|
|
c = *s;
|
|
if (c == ':') {
|
|
s++;
|
|
c = *s;
|
|
}
|
|
|
|
if (strncmp(s, "\001DCC ", 4))
|
|
return 0;
|
|
|
|
i -= 4;
|
|
s += 4;
|
|
|
|
/*
|
|
* Check for a recognised DCC command
|
|
*/
|
|
for (j = 0, k = 0; ippr_irc_dcctypes[j]; j++) {
|
|
k = MIN(strlen(ippr_irc_dcctypes[j]), i);
|
|
if (!strncmp(ippr_irc_dcctypes[j], s, k))
|
|
break;
|
|
}
|
|
if (!ippr_irc_dcctypes[j])
|
|
return 0;
|
|
|
|
ircp->irc_type = s;
|
|
i -= k;
|
|
s += k;
|
|
|
|
if (i < 11)
|
|
return 0;
|
|
|
|
/*
|
|
* Check for the arg
|
|
*/
|
|
c = *s;
|
|
if (ISSPACE(c))
|
|
return 0;
|
|
ircp->irc_arg = s;
|
|
for (; (c != ' ') && (c != '\001') && (i > 0); i--)
|
|
c = *s++;
|
|
|
|
if (c == '\001') /* In reality a ^A can quote another ^A...*/
|
|
return 0;
|
|
|
|
if (i < 5)
|
|
return 0;
|
|
|
|
s++;
|
|
i--;
|
|
c = *s;
|
|
if (!ISDIGIT(c))
|
|
return 0;
|
|
ircp->irc_addr = s;
|
|
/*
|
|
* Get the IP#
|
|
*/
|
|
for (l = 0; ISDIGIT(c) && (i > 0); i--) {
|
|
l *= 10;
|
|
l += c - '0';
|
|
c = *s++;
|
|
}
|
|
|
|
if (i < 4)
|
|
return 0;
|
|
|
|
if (c != ' ')
|
|
return 0;
|
|
|
|
ircp->irc_ipnum = l;
|
|
s++;
|
|
i--;
|
|
c = *s;
|
|
if (!ISDIGIT(c))
|
|
return 0;
|
|
/*
|
|
* Get the port#
|
|
*/
|
|
for (l = 0; ISDIGIT(c) && (i > 0); i--) {
|
|
l *= 10;
|
|
l += c - '0';
|
|
c = *s++;
|
|
}
|
|
if (i < 3)
|
|
return 0;
|
|
if (strncmp(s, "\001\r\n", 3))
|
|
return 0;
|
|
s += 3;
|
|
ircp->irc_len = s - buf;
|
|
ircp->irc_port = l;
|
|
return 1;
|
|
}
|
|
|
|
|
|
int ippr_irc_new(fin, aps, nat)
|
|
fr_info_t *fin;
|
|
ap_session_t *aps;
|
|
nat_t *nat;
|
|
{
|
|
ircinfo_t *irc;
|
|
|
|
KMALLOC(irc, ircinfo_t *);
|
|
if (irc == NULL)
|
|
return -1;
|
|
|
|
fin = fin; /* LINT */
|
|
nat = nat; /* LINT */
|
|
|
|
aps->aps_data = irc;
|
|
aps->aps_psiz = sizeof(ircinfo_t);
|
|
|
|
bzero((char *)irc, sizeof(*irc));
|
|
return 0;
|
|
}
|
|
|
|
|
|
int ippr_irc_send(fin, nat)
|
|
fr_info_t *fin;
|
|
nat_t *nat;
|
|
{
|
|
char ctcpbuf[IPF_IRCBUFSZ], newbuf[IPF_IRCBUFSZ];
|
|
tcphdr_t *tcp, tcph, *tcp2 = &tcph;
|
|
int off, inc = 0, i, dlen;
|
|
size_t nlen = 0, olen;
|
|
struct in_addr swip;
|
|
u_short a5, sp;
|
|
ircinfo_t *irc;
|
|
fr_info_t fi;
|
|
nat_t *nat2;
|
|
u_int a1;
|
|
ip_t *ip;
|
|
mb_t *m;
|
|
#ifdef MENTAT
|
|
mb_t *m1;
|
|
#endif
|
|
|
|
m = fin->fin_m;
|
|
ip = fin->fin_ip;
|
|
tcp = (tcphdr_t *)fin->fin_dp;
|
|
bzero(ctcpbuf, sizeof(ctcpbuf));
|
|
off = (char *)tcp - (char *)ip + (TCP_OFF(tcp) << 2) + fin->fin_ipoff;
|
|
|
|
#ifdef __sgi
|
|
dlen = fin->fin_plen - off;
|
|
#else
|
|
dlen = MSGDSIZE(m) - off;
|
|
#endif
|
|
if (dlen <= 0)
|
|
return 0;
|
|
COPYDATA(m, off, MIN(sizeof(ctcpbuf), dlen), ctcpbuf);
|
|
|
|
if (dlen <= 0)
|
|
return 0;
|
|
ctcpbuf[sizeof(ctcpbuf) - 1] = '\0';
|
|
*newbuf = '\0';
|
|
|
|
irc = nat->nat_aps->aps_data;
|
|
if (ippr_irc_complete(irc, ctcpbuf, dlen) == 0)
|
|
return 0;
|
|
|
|
/*
|
|
* check that IP address in the PORT/PASV reply is the same as the
|
|
* sender of the command - prevents using PORT for port scanning.
|
|
*/
|
|
if (irc->irc_ipnum != ntohl(nat->nat_inip.s_addr))
|
|
return 0;
|
|
|
|
a5 = irc->irc_port;
|
|
|
|
/*
|
|
* Calculate new address parts for the DCC command
|
|
*/
|
|
a1 = ntohl(ip->ip_src.s_addr);
|
|
olen = irc->irc_len;
|
|
i = irc->irc_addr - ctcpbuf;
|
|
i++;
|
|
(void) strncpy(newbuf, ctcpbuf, i);
|
|
/* DO NOT change these! */
|
|
#if defined(SNPRINTF) && defined(KERNEL)
|
|
SNPRINTF(newbuf, sizeof(newbuf) - i, "%u %u\001\r\n", a1, a5);
|
|
#else
|
|
(void) sprintf(newbuf, "%u %u\001\r\n", a1, a5);
|
|
#endif
|
|
|
|
nlen = strlen(newbuf);
|
|
inc = nlen - olen;
|
|
|
|
if ((inc + ip->ip_len) > 65535)
|
|
return 0;
|
|
|
|
#ifdef MENTAT
|
|
for (m1 = m; m1->b_cont; m1 = m1->b_cont)
|
|
;
|
|
if ((inc > 0) && (m1->b_datap->db_lim - m1->b_wptr < inc)) {
|
|
mblk_t *nm;
|
|
|
|
/* alloc enough to keep same trailer space for lower driver */
|
|
nm = allocb(nlen, BPRI_MED);
|
|
PANIC((!nm),("ippr_irc_out: allocb failed"));
|
|
|
|
nm->b_band = m1->b_band;
|
|
nm->b_wptr += nlen;
|
|
|
|
m1->b_wptr -= olen;
|
|
PANIC((m1->b_wptr < m1->b_rptr),
|
|
("ippr_irc_out: cannot handle fragmented data block"));
|
|
|
|
linkb(m1, nm);
|
|
} else {
|
|
# if SOLARIS && defined(ICK_VALID)
|
|
if (m1->b_datap->db_struiolim == m1->b_wptr)
|
|
m1->b_datap->db_struiolim += inc;
|
|
m1->b_datap->db_struioflag &= ~STRUIO_IP;
|
|
# endif
|
|
m1->b_wptr += inc;
|
|
}
|
|
#else
|
|
if (inc < 0)
|
|
m_adj(m, inc);
|
|
/* the mbuf chain will be extended if necessary by m_copyback() */
|
|
#endif
|
|
COPYBACK(m, off, nlen, newbuf);
|
|
|
|
if (inc != 0) {
|
|
#if defined(MENTAT) || defined(__sgi)
|
|
register u_32_t sum1, sum2;
|
|
|
|
sum1 = ip->ip_len;
|
|
sum2 = ip->ip_len + inc;
|
|
|
|
/* Because ~1 == -2, We really need ~1 == -1 */
|
|
if (sum1 > sum2)
|
|
sum2--;
|
|
sum2 -= sum1;
|
|
sum2 = (sum2 & 0xffff) + (sum2 >> 16);
|
|
|
|
fix_outcksum(fin, &ip->ip_sum, sum2);
|
|
#endif
|
|
ip->ip_len += inc;
|
|
}
|
|
|
|
/*
|
|
* Add skeleton NAT entry for connection which will come back the
|
|
* other way.
|
|
*/
|
|
sp = htons(a5);
|
|
/*
|
|
* Don't allow the PORT command to specify a port < 1024 due to
|
|
* security crap.
|
|
*/
|
|
if (ntohs(sp) < 1024)
|
|
return 0;
|
|
|
|
/*
|
|
* The server may not make the connection back from port 20, but
|
|
* it is the most likely so use it here to check for a conflicting
|
|
* mapping.
|
|
*/
|
|
bcopy((caddr_t)fin, (caddr_t)&fi, sizeof(fi));
|
|
fi.fin_data[0] = sp;
|
|
fi.fin_data[1] = fin->fin_data[1];
|
|
nat2 = nat_outlookup(fin, IPN_TCP, nat->nat_p, nat->nat_inip,
|
|
ip->ip_dst);
|
|
if (nat2 == NULL) {
|
|
bcopy((caddr_t)fin, (caddr_t)&fi, sizeof(fi));
|
|
bzero((char *)tcp2, sizeof(*tcp2));
|
|
tcp2->th_win = htons(8192);
|
|
tcp2->th_sport = sp;
|
|
tcp2->th_dport = 0; /* XXX - don't specify remote port */
|
|
fi.fin_data[0] = ntohs(sp);
|
|
fi.fin_data[1] = 0;
|
|
fi.fin_dp = (char *)tcp2;
|
|
fi.fin_fr = &ircnatfr;
|
|
fi.fin_dlen = sizeof(*tcp2);
|
|
fi.fin_plen = fi.fin_hlen + sizeof(*tcp2);
|
|
swip = ip->ip_src;
|
|
ip->ip_src = nat->nat_inip;
|
|
MUTEX_ENTER(&ipf_nat_new);
|
|
nat2 = nat_new(&fi, nat->nat_ptr, NULL,
|
|
NAT_SLAVE|IPN_TCP|SI_W_DPORT, NAT_OUTBOUND);
|
|
MUTEX_EXIT(&ipf_nat_new);
|
|
if (nat2 != NULL) {
|
|
(void) nat_proto(&fi, nat2, 0);
|
|
MUTEX_ENTER(&nat2->nat_lock);
|
|
nat_update(&fi, nat2);
|
|
MUTEX_EXIT(&nat2->nat_lock);
|
|
|
|
(void) fr_addstate(&fi, NULL, SI_W_DPORT);
|
|
}
|
|
ip->ip_src = swip;
|
|
}
|
|
return inc;
|
|
}
|
|
|
|
|
|
int ippr_irc_out(fin, aps, nat)
|
|
fr_info_t *fin;
|
|
ap_session_t *aps;
|
|
nat_t *nat;
|
|
{
|
|
aps = aps; /* LINT */
|
|
return ippr_irc_send(fin, nat);
|
|
}
|