40c18ac3ff
Server Return mode, where not all packets would be visible to the load balancer or gateway. This commit should be reverted when we merge future pf versions. The benefit it would provide is that this version does not break any existing public interface and thus won't be a problem if we want to MFC it to earlier FreeBSD releases. Discussed with: mlaier Obtained from: OpenBSD Sponsored by: iXsystems, Inc. MFC after: 1 month
1715 lines
43 KiB
C
1715 lines
43 KiB
C
/* $OpenBSD: pfctl_parser.c,v 1.234 2006/10/31 23:46:24 mcbride Exp $ */
|
|
|
|
/*
|
|
* Copyright (c) 2001 Daniel Hartmeier
|
|
* Copyright (c) 2002,2003 Henning Brauer
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* - Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* - Redistributions in binary form must reproduce the above
|
|
* copyright notice, this list of conditions and the following
|
|
* disclaimer in the documentation and/or other materials provided
|
|
* with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/param.h>
|
|
#include <sys/proc.h>
|
|
#include <net/if.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip_icmp.h>
|
|
#include <netinet/icmp6.h>
|
|
#include <net/pfvar.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <limits.h>
|
|
#include <netdb.h>
|
|
#include <stdarg.h>
|
|
#include <errno.h>
|
|
#include <err.h>
|
|
#include <ifaddrs.h>
|
|
#include <unistd.h>
|
|
|
|
#include "pfctl_parser.h"
|
|
#include "pfctl.h"
|
|
|
|
void print_op (u_int8_t, const char *, const char *);
|
|
void print_port (u_int8_t, u_int16_t, u_int16_t, const char *);
|
|
void print_ugid (u_int8_t, unsigned, unsigned, const char *, unsigned);
|
|
void print_flags (u_int8_t);
|
|
void print_fromto(struct pf_rule_addr *, pf_osfp_t,
|
|
struct pf_rule_addr *, u_int8_t, u_int8_t, int);
|
|
int ifa_skip_if(const char *filter, struct node_host *p);
|
|
|
|
struct node_host *ifa_grouplookup(const char *, int);
|
|
struct node_host *host_if(const char *, int);
|
|
struct node_host *host_v4(const char *, int);
|
|
struct node_host *host_v6(const char *, int);
|
|
struct node_host *host_dns(const char *, int, int);
|
|
|
|
const char *tcpflags = "FSRPAUEW";
|
|
|
|
static const struct icmptypeent icmp_type[] = {
|
|
{ "echoreq", ICMP_ECHO },
|
|
{ "echorep", ICMP_ECHOREPLY },
|
|
{ "unreach", ICMP_UNREACH },
|
|
{ "squench", ICMP_SOURCEQUENCH },
|
|
{ "redir", ICMP_REDIRECT },
|
|
{ "althost", ICMP_ALTHOSTADDR },
|
|
{ "routeradv", ICMP_ROUTERADVERT },
|
|
{ "routersol", ICMP_ROUTERSOLICIT },
|
|
{ "timex", ICMP_TIMXCEED },
|
|
{ "paramprob", ICMP_PARAMPROB },
|
|
{ "timereq", ICMP_TSTAMP },
|
|
{ "timerep", ICMP_TSTAMPREPLY },
|
|
{ "inforeq", ICMP_IREQ },
|
|
{ "inforep", ICMP_IREQREPLY },
|
|
{ "maskreq", ICMP_MASKREQ },
|
|
{ "maskrep", ICMP_MASKREPLY },
|
|
{ "trace", ICMP_TRACEROUTE },
|
|
{ "dataconv", ICMP_DATACONVERR },
|
|
{ "mobredir", ICMP_MOBILE_REDIRECT },
|
|
{ "ipv6-where", ICMP_IPV6_WHEREAREYOU },
|
|
{ "ipv6-here", ICMP_IPV6_IAMHERE },
|
|
{ "mobregreq", ICMP_MOBILE_REGREQUEST },
|
|
{ "mobregrep", ICMP_MOBILE_REGREPLY },
|
|
{ "skip", ICMP_SKIP },
|
|
{ "photuris", ICMP_PHOTURIS }
|
|
};
|
|
|
|
static const struct icmptypeent icmp6_type[] = {
|
|
{ "unreach", ICMP6_DST_UNREACH },
|
|
{ "toobig", ICMP6_PACKET_TOO_BIG },
|
|
{ "timex", ICMP6_TIME_EXCEEDED },
|
|
{ "paramprob", ICMP6_PARAM_PROB },
|
|
{ "echoreq", ICMP6_ECHO_REQUEST },
|
|
{ "echorep", ICMP6_ECHO_REPLY },
|
|
{ "groupqry", ICMP6_MEMBERSHIP_QUERY },
|
|
{ "listqry", MLD_LISTENER_QUERY },
|
|
{ "grouprep", ICMP6_MEMBERSHIP_REPORT },
|
|
{ "listenrep", MLD_LISTENER_REPORT },
|
|
{ "groupterm", ICMP6_MEMBERSHIP_REDUCTION },
|
|
{ "listendone", MLD_LISTENER_DONE },
|
|
{ "routersol", ND_ROUTER_SOLICIT },
|
|
{ "routeradv", ND_ROUTER_ADVERT },
|
|
{ "neighbrsol", ND_NEIGHBOR_SOLICIT },
|
|
{ "neighbradv", ND_NEIGHBOR_ADVERT },
|
|
{ "redir", ND_REDIRECT },
|
|
{ "routrrenum", ICMP6_ROUTER_RENUMBERING },
|
|
{ "wrureq", ICMP6_WRUREQUEST },
|
|
{ "wrurep", ICMP6_WRUREPLY },
|
|
{ "fqdnreq", ICMP6_FQDN_QUERY },
|
|
{ "fqdnrep", ICMP6_FQDN_REPLY },
|
|
{ "niqry", ICMP6_NI_QUERY },
|
|
{ "nirep", ICMP6_NI_REPLY },
|
|
{ "mtraceresp", MLD_MTRACE_RESP },
|
|
{ "mtrace", MLD_MTRACE }
|
|
};
|
|
|
|
static const struct icmpcodeent icmp_code[] = {
|
|
{ "net-unr", ICMP_UNREACH, ICMP_UNREACH_NET },
|
|
{ "host-unr", ICMP_UNREACH, ICMP_UNREACH_HOST },
|
|
{ "proto-unr", ICMP_UNREACH, ICMP_UNREACH_PROTOCOL },
|
|
{ "port-unr", ICMP_UNREACH, ICMP_UNREACH_PORT },
|
|
{ "needfrag", ICMP_UNREACH, ICMP_UNREACH_NEEDFRAG },
|
|
{ "srcfail", ICMP_UNREACH, ICMP_UNREACH_SRCFAIL },
|
|
{ "net-unk", ICMP_UNREACH, ICMP_UNREACH_NET_UNKNOWN },
|
|
{ "host-unk", ICMP_UNREACH, ICMP_UNREACH_HOST_UNKNOWN },
|
|
{ "isolate", ICMP_UNREACH, ICMP_UNREACH_ISOLATED },
|
|
{ "net-prohib", ICMP_UNREACH, ICMP_UNREACH_NET_PROHIB },
|
|
{ "host-prohib", ICMP_UNREACH, ICMP_UNREACH_HOST_PROHIB },
|
|
{ "net-tos", ICMP_UNREACH, ICMP_UNREACH_TOSNET },
|
|
{ "host-tos", ICMP_UNREACH, ICMP_UNREACH_TOSHOST },
|
|
{ "filter-prohib", ICMP_UNREACH, ICMP_UNREACH_FILTER_PROHIB },
|
|
{ "host-preced", ICMP_UNREACH, ICMP_UNREACH_HOST_PRECEDENCE },
|
|
{ "cutoff-preced", ICMP_UNREACH, ICMP_UNREACH_PRECEDENCE_CUTOFF },
|
|
{ "redir-net", ICMP_REDIRECT, ICMP_REDIRECT_NET },
|
|
{ "redir-host", ICMP_REDIRECT, ICMP_REDIRECT_HOST },
|
|
{ "redir-tos-net", ICMP_REDIRECT, ICMP_REDIRECT_TOSNET },
|
|
{ "redir-tos-host", ICMP_REDIRECT, ICMP_REDIRECT_TOSHOST },
|
|
{ "normal-adv", ICMP_ROUTERADVERT, ICMP_ROUTERADVERT_NORMAL },
|
|
{ "common-adv", ICMP_ROUTERADVERT, ICMP_ROUTERADVERT_NOROUTE_COMMON },
|
|
{ "transit", ICMP_TIMXCEED, ICMP_TIMXCEED_INTRANS },
|
|
{ "reassemb", ICMP_TIMXCEED, ICMP_TIMXCEED_REASS },
|
|
{ "badhead", ICMP_PARAMPROB, ICMP_PARAMPROB_ERRATPTR },
|
|
{ "optmiss", ICMP_PARAMPROB, ICMP_PARAMPROB_OPTABSENT },
|
|
{ "badlen", ICMP_PARAMPROB, ICMP_PARAMPROB_LENGTH },
|
|
{ "unknown-ind", ICMP_PHOTURIS, ICMP_PHOTURIS_UNKNOWN_INDEX },
|
|
{ "auth-fail", ICMP_PHOTURIS, ICMP_PHOTURIS_AUTH_FAILED },
|
|
{ "decrypt-fail", ICMP_PHOTURIS, ICMP_PHOTURIS_DECRYPT_FAILED }
|
|
};
|
|
|
|
static const struct icmpcodeent icmp6_code[] = {
|
|
{ "admin-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_ADMIN },
|
|
{ "noroute-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOROUTE },
|
|
{ "notnbr-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOTNEIGHBOR },
|
|
{ "beyond-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_BEYONDSCOPE },
|
|
{ "addr-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_ADDR },
|
|
{ "port-unr", ICMP6_DST_UNREACH, ICMP6_DST_UNREACH_NOPORT },
|
|
{ "transit", ICMP6_TIME_EXCEEDED, ICMP6_TIME_EXCEED_TRANSIT },
|
|
{ "reassemb", ICMP6_TIME_EXCEEDED, ICMP6_TIME_EXCEED_REASSEMBLY },
|
|
{ "badhead", ICMP6_PARAM_PROB, ICMP6_PARAMPROB_HEADER },
|
|
{ "nxthdr", ICMP6_PARAM_PROB, ICMP6_PARAMPROB_NEXTHEADER },
|
|
{ "redironlink", ND_REDIRECT, ND_REDIRECT_ONLINK },
|
|
{ "redirrouter", ND_REDIRECT, ND_REDIRECT_ROUTER }
|
|
};
|
|
|
|
const struct pf_timeout pf_timeouts[] = {
|
|
{ "tcp.first", PFTM_TCP_FIRST_PACKET },
|
|
{ "tcp.opening", PFTM_TCP_OPENING },
|
|
{ "tcp.established", PFTM_TCP_ESTABLISHED },
|
|
{ "tcp.closing", PFTM_TCP_CLOSING },
|
|
{ "tcp.finwait", PFTM_TCP_FIN_WAIT },
|
|
{ "tcp.closed", PFTM_TCP_CLOSED },
|
|
{ "tcp.tsdiff", PFTM_TS_DIFF },
|
|
{ "udp.first", PFTM_UDP_FIRST_PACKET },
|
|
{ "udp.single", PFTM_UDP_SINGLE },
|
|
{ "udp.multiple", PFTM_UDP_MULTIPLE },
|
|
{ "icmp.first", PFTM_ICMP_FIRST_PACKET },
|
|
{ "icmp.error", PFTM_ICMP_ERROR_REPLY },
|
|
{ "other.first", PFTM_OTHER_FIRST_PACKET },
|
|
{ "other.single", PFTM_OTHER_SINGLE },
|
|
{ "other.multiple", PFTM_OTHER_MULTIPLE },
|
|
{ "frag", PFTM_FRAG },
|
|
{ "interval", PFTM_INTERVAL },
|
|
{ "adaptive.start", PFTM_ADAPTIVE_START },
|
|
{ "adaptive.end", PFTM_ADAPTIVE_END },
|
|
{ "src.track", PFTM_SRC_NODE },
|
|
{ NULL, 0 }
|
|
};
|
|
|
|
const struct icmptypeent *
|
|
geticmptypebynumber(u_int8_t type, sa_family_t af)
|
|
{
|
|
unsigned int i;
|
|
|
|
if (af != AF_INET6) {
|
|
for (i=0; i < (sizeof (icmp_type) / sizeof(icmp_type[0]));
|
|
i++) {
|
|
if (type == icmp_type[i].type)
|
|
return (&icmp_type[i]);
|
|
}
|
|
} else {
|
|
for (i=0; i < (sizeof (icmp6_type) /
|
|
sizeof(icmp6_type[0])); i++) {
|
|
if (type == icmp6_type[i].type)
|
|
return (&icmp6_type[i]);
|
|
}
|
|
}
|
|
return (NULL);
|
|
}
|
|
|
|
const struct icmptypeent *
|
|
geticmptypebyname(char *w, sa_family_t af)
|
|
{
|
|
unsigned int i;
|
|
|
|
if (af != AF_INET6) {
|
|
for (i=0; i < (sizeof (icmp_type) / sizeof(icmp_type[0]));
|
|
i++) {
|
|
if (!strcmp(w, icmp_type[i].name))
|
|
return (&icmp_type[i]);
|
|
}
|
|
} else {
|
|
for (i=0; i < (sizeof (icmp6_type) /
|
|
sizeof(icmp6_type[0])); i++) {
|
|
if (!strcmp(w, icmp6_type[i].name))
|
|
return (&icmp6_type[i]);
|
|
}
|
|
}
|
|
return (NULL);
|
|
}
|
|
|
|
const struct icmpcodeent *
|
|
geticmpcodebynumber(u_int8_t type, u_int8_t code, sa_family_t af)
|
|
{
|
|
unsigned int i;
|
|
|
|
if (af != AF_INET6) {
|
|
for (i=0; i < (sizeof (icmp_code) / sizeof(icmp_code[0]));
|
|
i++) {
|
|
if (type == icmp_code[i].type &&
|
|
code == icmp_code[i].code)
|
|
return (&icmp_code[i]);
|
|
}
|
|
} else {
|
|
for (i=0; i < (sizeof (icmp6_code) /
|
|
sizeof(icmp6_code[0])); i++) {
|
|
if (type == icmp6_code[i].type &&
|
|
code == icmp6_code[i].code)
|
|
return (&icmp6_code[i]);
|
|
}
|
|
}
|
|
return (NULL);
|
|
}
|
|
|
|
const struct icmpcodeent *
|
|
geticmpcodebyname(u_long type, char *w, sa_family_t af)
|
|
{
|
|
unsigned int i;
|
|
|
|
if (af != AF_INET6) {
|
|
for (i=0; i < (sizeof (icmp_code) / sizeof(icmp_code[0]));
|
|
i++) {
|
|
if (type == icmp_code[i].type &&
|
|
!strcmp(w, icmp_code[i].name))
|
|
return (&icmp_code[i]);
|
|
}
|
|
} else {
|
|
for (i=0; i < (sizeof (icmp6_code) /
|
|
sizeof(icmp6_code[0])); i++) {
|
|
if (type == icmp6_code[i].type &&
|
|
!strcmp(w, icmp6_code[i].name))
|
|
return (&icmp6_code[i]);
|
|
}
|
|
}
|
|
return (NULL);
|
|
}
|
|
|
|
void
|
|
print_op(u_int8_t op, const char *a1, const char *a2)
|
|
{
|
|
if (op == PF_OP_IRG)
|
|
printf(" %s >< %s", a1, a2);
|
|
else if (op == PF_OP_XRG)
|
|
printf(" %s <> %s", a1, a2);
|
|
else if (op == PF_OP_EQ)
|
|
printf(" = %s", a1);
|
|
else if (op == PF_OP_NE)
|
|
printf(" != %s", a1);
|
|
else if (op == PF_OP_LT)
|
|
printf(" < %s", a1);
|
|
else if (op == PF_OP_LE)
|
|
printf(" <= %s", a1);
|
|
else if (op == PF_OP_GT)
|
|
printf(" > %s", a1);
|
|
else if (op == PF_OP_GE)
|
|
printf(" >= %s", a1);
|
|
else if (op == PF_OP_RRG)
|
|
printf(" %s:%s", a1, a2);
|
|
}
|
|
|
|
void
|
|
print_port(u_int8_t op, u_int16_t p1, u_int16_t p2, const char *proto)
|
|
{
|
|
char a1[6], a2[6];
|
|
struct servent *s;
|
|
|
|
s = getservbyport(p1, proto);
|
|
p1 = ntohs(p1);
|
|
p2 = ntohs(p2);
|
|
snprintf(a1, sizeof(a1), "%u", p1);
|
|
snprintf(a2, sizeof(a2), "%u", p2);
|
|
printf(" port");
|
|
if (s != NULL && (op == PF_OP_EQ || op == PF_OP_NE))
|
|
print_op(op, s->s_name, a2);
|
|
else
|
|
print_op(op, a1, a2);
|
|
}
|
|
|
|
void
|
|
print_ugid(u_int8_t op, unsigned u1, unsigned u2, const char *t, unsigned umax)
|
|
{
|
|
char a1[11], a2[11];
|
|
|
|
snprintf(a1, sizeof(a1), "%u", u1);
|
|
snprintf(a2, sizeof(a2), "%u", u2);
|
|
printf(" %s", t);
|
|
if (u1 == umax && (op == PF_OP_EQ || op == PF_OP_NE))
|
|
print_op(op, "unknown", a2);
|
|
else
|
|
print_op(op, a1, a2);
|
|
}
|
|
|
|
void
|
|
print_flags(u_int8_t f)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; tcpflags[i]; ++i)
|
|
if (f & (1 << i))
|
|
printf("%c", tcpflags[i]);
|
|
}
|
|
|
|
void
|
|
print_fromto(struct pf_rule_addr *src, pf_osfp_t osfp, struct pf_rule_addr *dst,
|
|
sa_family_t af, u_int8_t proto, int verbose)
|
|
{
|
|
char buf[PF_OSFP_LEN*3];
|
|
if (src->addr.type == PF_ADDR_ADDRMASK &&
|
|
dst->addr.type == PF_ADDR_ADDRMASK &&
|
|
PF_AZERO(&src->addr.v.a.addr, AF_INET6) &&
|
|
PF_AZERO(&src->addr.v.a.mask, AF_INET6) &&
|
|
PF_AZERO(&dst->addr.v.a.addr, AF_INET6) &&
|
|
PF_AZERO(&dst->addr.v.a.mask, AF_INET6) &&
|
|
!src->neg && !dst->neg &&
|
|
!src->port_op && !dst->port_op &&
|
|
osfp == PF_OSFP_ANY)
|
|
printf(" all");
|
|
else {
|
|
printf(" from ");
|
|
if (src->neg)
|
|
printf("! ");
|
|
print_addr(&src->addr, af, verbose);
|
|
if (src->port_op)
|
|
print_port(src->port_op, src->port[0],
|
|
src->port[1],
|
|
proto == IPPROTO_TCP ? "tcp" : "udp");
|
|
if (osfp != PF_OSFP_ANY)
|
|
printf(" os \"%s\"", pfctl_lookup_fingerprint(osfp, buf,
|
|
sizeof(buf)));
|
|
|
|
printf(" to ");
|
|
if (dst->neg)
|
|
printf("! ");
|
|
print_addr(&dst->addr, af, verbose);
|
|
if (dst->port_op)
|
|
print_port(dst->port_op, dst->port[0],
|
|
dst->port[1],
|
|
proto == IPPROTO_TCP ? "tcp" : "udp");
|
|
}
|
|
}
|
|
|
|
void
|
|
print_pool(struct pf_pool *pool, u_int16_t p1, u_int16_t p2,
|
|
sa_family_t af, int id)
|
|
{
|
|
struct pf_pooladdr *pooladdr;
|
|
|
|
if ((TAILQ_FIRST(&pool->list) != NULL) &&
|
|
TAILQ_NEXT(TAILQ_FIRST(&pool->list), entries) != NULL)
|
|
printf("{ ");
|
|
TAILQ_FOREACH(pooladdr, &pool->list, entries){
|
|
switch (id) {
|
|
case PF_NAT:
|
|
case PF_RDR:
|
|
case PF_BINAT:
|
|
print_addr(&pooladdr->addr, af, 0);
|
|
break;
|
|
case PF_PASS:
|
|
if (PF_AZERO(&pooladdr->addr.v.a.addr, af))
|
|
printf("%s", pooladdr->ifname);
|
|
else {
|
|
printf("(%s ", pooladdr->ifname);
|
|
print_addr(&pooladdr->addr, af, 0);
|
|
printf(")");
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
if (TAILQ_NEXT(pooladdr, entries) != NULL)
|
|
printf(", ");
|
|
else if (TAILQ_NEXT(TAILQ_FIRST(&pool->list), entries) != NULL)
|
|
printf(" }");
|
|
}
|
|
switch (id) {
|
|
case PF_NAT:
|
|
if ((p1 != PF_NAT_PROXY_PORT_LOW ||
|
|
p2 != PF_NAT_PROXY_PORT_HIGH) && (p1 != 0 || p2 != 0)) {
|
|
if (p1 == p2)
|
|
printf(" port %u", p1);
|
|
else
|
|
printf(" port %u:%u", p1, p2);
|
|
}
|
|
break;
|
|
case PF_RDR:
|
|
if (p1) {
|
|
printf(" port %u", p1);
|
|
if (p2 && (p2 != p1))
|
|
printf(":%u", p2);
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
switch (pool->opts & PF_POOL_TYPEMASK) {
|
|
case PF_POOL_NONE:
|
|
break;
|
|
case PF_POOL_BITMASK:
|
|
printf(" bitmask");
|
|
break;
|
|
case PF_POOL_RANDOM:
|
|
printf(" random");
|
|
break;
|
|
case PF_POOL_SRCHASH:
|
|
printf(" source-hash 0x%08x%08x%08x%08x",
|
|
pool->key.key32[0], pool->key.key32[1],
|
|
pool->key.key32[2], pool->key.key32[3]);
|
|
break;
|
|
case PF_POOL_ROUNDROBIN:
|
|
printf(" round-robin");
|
|
break;
|
|
}
|
|
if (pool->opts & PF_POOL_STICKYADDR)
|
|
printf(" sticky-address");
|
|
if (id == PF_NAT && p1 == 0 && p2 == 0)
|
|
printf(" static-port");
|
|
}
|
|
|
|
const char *pf_reasons[PFRES_MAX+1] = PFRES_NAMES;
|
|
const char *pf_lcounters[LCNT_MAX+1] = LCNT_NAMES;
|
|
const char *pf_fcounters[FCNT_MAX+1] = FCNT_NAMES;
|
|
const char *pf_scounters[FCNT_MAX+1] = FCNT_NAMES;
|
|
|
|
void
|
|
print_status(struct pf_status *s, int opts)
|
|
{
|
|
char statline[80], *running;
|
|
time_t runtime;
|
|
int i;
|
|
char buf[PF_MD5_DIGEST_LENGTH * 2 + 1];
|
|
static const char hex[] = "0123456789abcdef";
|
|
|
|
runtime = time(NULL) - s->since;
|
|
running = s->running ? "Enabled" : "Disabled";
|
|
|
|
if (s->since) {
|
|
unsigned sec, min, hrs, day = runtime;
|
|
|
|
sec = day % 60;
|
|
day /= 60;
|
|
min = day % 60;
|
|
day /= 60;
|
|
hrs = day % 24;
|
|
day /= 24;
|
|
snprintf(statline, sizeof(statline),
|
|
"Status: %s for %u days %.2u:%.2u:%.2u",
|
|
running, day, hrs, min, sec);
|
|
} else
|
|
snprintf(statline, sizeof(statline), "Status: %s", running);
|
|
printf("%-44s", statline);
|
|
switch (s->debug) {
|
|
case PF_DEBUG_NONE:
|
|
printf("%15s\n\n", "Debug: None");
|
|
break;
|
|
case PF_DEBUG_URGENT:
|
|
printf("%15s\n\n", "Debug: Urgent");
|
|
break;
|
|
case PF_DEBUG_MISC:
|
|
printf("%15s\n\n", "Debug: Misc");
|
|
break;
|
|
case PF_DEBUG_NOISY:
|
|
printf("%15s\n\n", "Debug: Loud");
|
|
break;
|
|
}
|
|
|
|
if (opts & PF_OPT_VERBOSE) {
|
|
printf("Hostid: 0x%08x\n", ntohl(s->hostid));
|
|
|
|
for (i = 0; i < PF_MD5_DIGEST_LENGTH; i++) {
|
|
buf[i + i] = hex[s->pf_chksum[i] >> 4];
|
|
buf[i + i + 1] = hex[s->pf_chksum[i] & 0x0f];
|
|
}
|
|
buf[i + i] = '\0';
|
|
printf("Checksum: 0x%s\n\n", buf);
|
|
}
|
|
|
|
if (s->ifname[0] != 0) {
|
|
printf("Interface Stats for %-16s %5s %16s\n",
|
|
s->ifname, "IPv4", "IPv6");
|
|
printf(" %-25s %14llu %16llu\n", "Bytes In",
|
|
(unsigned long long)s->bcounters[0][0],
|
|
(unsigned long long)s->bcounters[1][0]);
|
|
printf(" %-25s %14llu %16llu\n", "Bytes Out",
|
|
(unsigned long long)s->bcounters[0][1],
|
|
(unsigned long long)s->bcounters[1][1]);
|
|
printf(" Packets In\n");
|
|
printf(" %-23s %14llu %16llu\n", "Passed",
|
|
(unsigned long long)s->pcounters[0][0][PF_PASS],
|
|
(unsigned long long)s->pcounters[1][0][PF_PASS]);
|
|
printf(" %-23s %14llu %16llu\n", "Blocked",
|
|
(unsigned long long)s->pcounters[0][0][PF_DROP],
|
|
(unsigned long long)s->pcounters[1][0][PF_DROP]);
|
|
printf(" Packets Out\n");
|
|
printf(" %-23s %14llu %16llu\n", "Passed",
|
|
(unsigned long long)s->pcounters[0][1][PF_PASS],
|
|
(unsigned long long)s->pcounters[1][1][PF_PASS]);
|
|
printf(" %-23s %14llu %16llu\n\n", "Blocked",
|
|
(unsigned long long)s->pcounters[0][1][PF_DROP],
|
|
(unsigned long long)s->pcounters[1][1][PF_DROP]);
|
|
}
|
|
printf("%-27s %14s %16s\n", "State Table", "Total", "Rate");
|
|
printf(" %-25s %14u %14s\n", "current entries", s->states, "");
|
|
for (i = 0; i < FCNT_MAX; i++) {
|
|
printf(" %-25s %14llu ", pf_fcounters[i],
|
|
(unsigned long long)s->fcounters[i]);
|
|
if (runtime > 0)
|
|
printf("%14.1f/s\n",
|
|
(double)s->fcounters[i] / (double)runtime);
|
|
else
|
|
printf("%14s\n", "");
|
|
}
|
|
if (opts & PF_OPT_VERBOSE) {
|
|
printf("Source Tracking Table\n");
|
|
printf(" %-25s %14u %14s\n", "current entries",
|
|
s->src_nodes, "");
|
|
for (i = 0; i < SCNT_MAX; i++) {
|
|
printf(" %-25s %14lld ", pf_scounters[i],
|
|
(unsigned long long)s->scounters[i]);
|
|
if (runtime > 0)
|
|
printf("%14.1f/s\n",
|
|
(double)s->scounters[i] / (double)runtime);
|
|
else
|
|
printf("%14s\n", "");
|
|
}
|
|
}
|
|
printf("Counters\n");
|
|
for (i = 0; i < PFRES_MAX; i++) {
|
|
printf(" %-25s %14llu ", pf_reasons[i],
|
|
(unsigned long long)s->counters[i]);
|
|
if (runtime > 0)
|
|
printf("%14.1f/s\n",
|
|
(double)s->counters[i] / (double)runtime);
|
|
else
|
|
printf("%14s\n", "");
|
|
}
|
|
if (opts & PF_OPT_VERBOSE) {
|
|
printf("Limit Counters\n");
|
|
for (i = 0; i < LCNT_MAX; i++) {
|
|
printf(" %-25s %14lld ", pf_lcounters[i],
|
|
#ifdef __FreeBSD__
|
|
(unsigned long long)s->lcounters[i]);
|
|
#else
|
|
s->lcounters[i]);
|
|
#endif
|
|
if (runtime > 0)
|
|
printf("%14.1f/s\n",
|
|
(double)s->lcounters[i] / (double)runtime);
|
|
else
|
|
printf("%14s\n", "");
|
|
}
|
|
}
|
|
}
|
|
|
|
void
|
|
print_src_node(struct pf_src_node *sn, int opts)
|
|
{
|
|
struct pf_addr_wrap aw;
|
|
int min, sec;
|
|
|
|
memset(&aw, 0, sizeof(aw));
|
|
if (sn->af == AF_INET)
|
|
aw.v.a.mask.addr32[0] = 0xffffffff;
|
|
else
|
|
memset(&aw.v.a.mask, 0xff, sizeof(aw.v.a.mask));
|
|
|
|
aw.v.a.addr = sn->addr;
|
|
print_addr(&aw, sn->af, opts & PF_OPT_VERBOSE2);
|
|
printf(" -> ");
|
|
aw.v.a.addr = sn->raddr;
|
|
print_addr(&aw, sn->af, opts & PF_OPT_VERBOSE2);
|
|
printf(" ( states %u, connections %u, rate %u.%u/%us )\n", sn->states,
|
|
sn->conn, sn->conn_rate.count / 1000,
|
|
(sn->conn_rate.count % 1000) / 100, sn->conn_rate.seconds);
|
|
if (opts & PF_OPT_VERBOSE) {
|
|
sec = sn->creation % 60;
|
|
sn->creation /= 60;
|
|
min = sn->creation % 60;
|
|
sn->creation /= 60;
|
|
printf(" age %.2u:%.2u:%.2u", sn->creation, min, sec);
|
|
if (sn->states == 0) {
|
|
sec = sn->expire % 60;
|
|
sn->expire /= 60;
|
|
min = sn->expire % 60;
|
|
sn->expire /= 60;
|
|
printf(", expires in %.2u:%.2u:%.2u",
|
|
sn->expire, min, sec);
|
|
}
|
|
printf(", %llu pkts, %llu bytes",
|
|
#ifdef __FreeBSD__
|
|
(unsigned long long)(sn->packets[0] + sn->packets[1]),
|
|
(unsigned long long)(sn->bytes[0] + sn->bytes[1]));
|
|
#else
|
|
sn->packets[0] + sn->packets[1],
|
|
sn->bytes[0] + sn->bytes[1]);
|
|
#endif
|
|
switch (sn->ruletype) {
|
|
case PF_NAT:
|
|
if (sn->rule.nr != -1)
|
|
printf(", nat rule %u", sn->rule.nr);
|
|
break;
|
|
case PF_RDR:
|
|
if (sn->rule.nr != -1)
|
|
printf(", rdr rule %u", sn->rule.nr);
|
|
break;
|
|
case PF_PASS:
|
|
if (sn->rule.nr != -1)
|
|
printf(", filter rule %u", sn->rule.nr);
|
|
break;
|
|
}
|
|
printf("\n");
|
|
}
|
|
}
|
|
|
|
void
|
|
print_rule(struct pf_rule *r, const char *anchor_call, int verbose)
|
|
{
|
|
static const char *actiontypes[] = { "pass", "block", "scrub",
|
|
"no scrub", "nat", "no nat", "binat", "no binat", "rdr", "no rdr" };
|
|
static const char *anchortypes[] = { "anchor", "anchor", "anchor",
|
|
"anchor", "nat-anchor", "nat-anchor", "binat-anchor",
|
|
"binat-anchor", "rdr-anchor", "rdr-anchor" };
|
|
int i, opts;
|
|
|
|
if (verbose)
|
|
printf("@%d ", r->nr);
|
|
if (r->action > PF_NORDR)
|
|
printf("action(%d)", r->action);
|
|
else if (anchor_call[0]) {
|
|
if (anchor_call[0] == '_') {
|
|
printf("%s", anchortypes[r->action]);
|
|
} else
|
|
printf("%s \"%s\"", anchortypes[r->action],
|
|
anchor_call);
|
|
} else {
|
|
printf("%s", actiontypes[r->action]);
|
|
if (r->natpass)
|
|
printf(" pass");
|
|
}
|
|
if (r->action == PF_DROP) {
|
|
if (r->rule_flag & PFRULE_RETURN)
|
|
printf(" return");
|
|
else if (r->rule_flag & PFRULE_RETURNRST) {
|
|
if (!r->return_ttl)
|
|
printf(" return-rst");
|
|
else
|
|
printf(" return-rst(ttl %d)", r->return_ttl);
|
|
} else if (r->rule_flag & PFRULE_RETURNICMP) {
|
|
const struct icmpcodeent *ic, *ic6;
|
|
|
|
ic = geticmpcodebynumber(r->return_icmp >> 8,
|
|
r->return_icmp & 255, AF_INET);
|
|
ic6 = geticmpcodebynumber(r->return_icmp6 >> 8,
|
|
r->return_icmp6 & 255, AF_INET6);
|
|
|
|
switch (r->af) {
|
|
case AF_INET:
|
|
printf(" return-icmp");
|
|
if (ic == NULL)
|
|
printf("(%u)", r->return_icmp & 255);
|
|
else
|
|
printf("(%s)", ic->name);
|
|
break;
|
|
case AF_INET6:
|
|
printf(" return-icmp6");
|
|
if (ic6 == NULL)
|
|
printf("(%u)", r->return_icmp6 & 255);
|
|
else
|
|
printf("(%s)", ic6->name);
|
|
break;
|
|
default:
|
|
printf(" return-icmp");
|
|
if (ic == NULL)
|
|
printf("(%u, ", r->return_icmp & 255);
|
|
else
|
|
printf("(%s, ", ic->name);
|
|
if (ic6 == NULL)
|
|
printf("%u)", r->return_icmp6 & 255);
|
|
else
|
|
printf("%s)", ic6->name);
|
|
break;
|
|
}
|
|
} else
|
|
printf(" drop");
|
|
}
|
|
if (r->direction == PF_IN)
|
|
printf(" in");
|
|
else if (r->direction == PF_OUT)
|
|
printf(" out");
|
|
if (r->log) {
|
|
printf(" log");
|
|
if (r->log & ~PF_LOG || r->logif) {
|
|
int count = 0;
|
|
|
|
printf(" (");
|
|
if (r->log & PF_LOG_ALL)
|
|
printf("%sall", count++ ? ", " : "");
|
|
if (r->log & PF_LOG_SOCKET_LOOKUP)
|
|
printf("%suser", count++ ? ", " : "");
|
|
if (r->logif)
|
|
printf("%sto pflog%u", count++ ? ", " : "",
|
|
r->logif);
|
|
printf(")");
|
|
}
|
|
}
|
|
if (r->quick)
|
|
printf(" quick");
|
|
if (r->ifname[0]) {
|
|
if (r->ifnot)
|
|
printf(" on ! %s", r->ifname);
|
|
else
|
|
printf(" on %s", r->ifname);
|
|
}
|
|
if (r->rt) {
|
|
if (r->rt == PF_ROUTETO)
|
|
printf(" route-to");
|
|
else if (r->rt == PF_REPLYTO)
|
|
printf(" reply-to");
|
|
else if (r->rt == PF_DUPTO)
|
|
printf(" dup-to");
|
|
else if (r->rt == PF_FASTROUTE)
|
|
printf(" fastroute");
|
|
if (r->rt != PF_FASTROUTE) {
|
|
printf(" ");
|
|
print_pool(&r->rpool, 0, 0, r->af, PF_PASS);
|
|
}
|
|
}
|
|
if (r->af) {
|
|
if (r->af == AF_INET)
|
|
printf(" inet");
|
|
else
|
|
printf(" inet6");
|
|
}
|
|
if (r->proto) {
|
|
struct protoent *p;
|
|
|
|
if ((p = getprotobynumber(r->proto)) != NULL)
|
|
printf(" proto %s", p->p_name);
|
|
else
|
|
printf(" proto %u", r->proto);
|
|
}
|
|
print_fromto(&r->src, r->os_fingerprint, &r->dst, r->af, r->proto,
|
|
verbose);
|
|
if (r->uid.op)
|
|
print_ugid(r->uid.op, r->uid.uid[0], r->uid.uid[1], "user",
|
|
UID_MAX);
|
|
if (r->gid.op)
|
|
print_ugid(r->gid.op, r->gid.gid[0], r->gid.gid[1], "group",
|
|
GID_MAX);
|
|
if (r->flags || r->flagset) {
|
|
printf(" flags ");
|
|
print_flags(r->flags);
|
|
printf("/");
|
|
print_flags(r->flagset);
|
|
} else if (r->action == PF_PASS &&
|
|
(!r->proto || r->proto == IPPROTO_TCP) &&
|
|
!(r->rule_flag & PFRULE_FRAGMENT) &&
|
|
!anchor_call[0] && r->keep_state)
|
|
printf(" flags any");
|
|
if (r->type) {
|
|
const struct icmptypeent *it;
|
|
|
|
it = geticmptypebynumber(r->type-1, r->af);
|
|
if (r->af != AF_INET6)
|
|
printf(" icmp-type");
|
|
else
|
|
printf(" icmp6-type");
|
|
if (it != NULL)
|
|
printf(" %s", it->name);
|
|
else
|
|
printf(" %u", r->type-1);
|
|
if (r->code) {
|
|
const struct icmpcodeent *ic;
|
|
|
|
ic = geticmpcodebynumber(r->type-1, r->code-1, r->af);
|
|
if (ic != NULL)
|
|
printf(" code %s", ic->name);
|
|
else
|
|
printf(" code %u", r->code-1);
|
|
}
|
|
}
|
|
if (r->tos)
|
|
printf(" tos 0x%2.2x", r->tos);
|
|
if (!r->keep_state && r->action == PF_PASS && !anchor_call[0])
|
|
printf(" no state");
|
|
else if (r->keep_state == PF_STATE_NORMAL)
|
|
printf(" keep state");
|
|
else if (r->keep_state == PF_STATE_MODULATE)
|
|
printf(" modulate state");
|
|
else if (r->keep_state == PF_STATE_SYNPROXY)
|
|
printf(" synproxy state");
|
|
if (r->prob) {
|
|
char buf[20];
|
|
|
|
snprintf(buf, sizeof(buf), "%f", r->prob*100.0/(UINT_MAX+1.0));
|
|
for (i = strlen(buf)-1; i > 0; i--) {
|
|
if (buf[i] == '0')
|
|
buf[i] = '\0';
|
|
else {
|
|
if (buf[i] == '.')
|
|
buf[i] = '\0';
|
|
break;
|
|
}
|
|
}
|
|
printf(" probability %s%%", buf);
|
|
}
|
|
opts = 0;
|
|
if (r->max_states || r->max_src_nodes || r->max_src_states)
|
|
opts = 1;
|
|
if (r->rule_flag & PFRULE_NOSYNC)
|
|
opts = 1;
|
|
if (r->rule_flag & PFRULE_SRCTRACK)
|
|
opts = 1;
|
|
if (r->rule_flag & PFRULE_IFBOUND)
|
|
opts = 1;
|
|
if (r->rule_flag & PFRULE_STATESLOPPY)
|
|
opts = 1;
|
|
for (i = 0; !opts && i < PFTM_MAX; ++i)
|
|
if (r->timeout[i])
|
|
opts = 1;
|
|
if (opts) {
|
|
printf(" (");
|
|
if (r->max_states) {
|
|
printf("max %u", r->max_states);
|
|
opts = 0;
|
|
}
|
|
if (r->rule_flag & PFRULE_NOSYNC) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("no-sync");
|
|
opts = 0;
|
|
}
|
|
if (r->rule_flag & PFRULE_SRCTRACK) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("source-track");
|
|
if (r->rule_flag & PFRULE_RULESRCTRACK)
|
|
printf(" rule");
|
|
else
|
|
printf(" global");
|
|
opts = 0;
|
|
}
|
|
if (r->max_src_states) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("max-src-states %u", r->max_src_states);
|
|
opts = 0;
|
|
}
|
|
if (r->max_src_conn) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("max-src-conn %u", r->max_src_conn);
|
|
opts = 0;
|
|
}
|
|
if (r->max_src_conn_rate.limit) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("max-src-conn-rate %u/%u",
|
|
r->max_src_conn_rate.limit,
|
|
r->max_src_conn_rate.seconds);
|
|
opts = 0;
|
|
}
|
|
if (r->max_src_nodes) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("max-src-nodes %u", r->max_src_nodes);
|
|
opts = 0;
|
|
}
|
|
if (r->overload_tblname[0]) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("overload <%s>", r->overload_tblname);
|
|
if (r->flush)
|
|
printf(" flush");
|
|
if (r->flush & PF_FLUSH_GLOBAL)
|
|
printf(" global");
|
|
}
|
|
if (r->rule_flag & PFRULE_IFBOUND) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("if-bound");
|
|
opts = 0;
|
|
}
|
|
if (r->rule_flag & PFRULE_STATESLOPPY) {
|
|
if (!opts)
|
|
printf(", ");
|
|
printf("sloppy");
|
|
opts = 0;
|
|
}
|
|
for (i = 0; i < PFTM_MAX; ++i)
|
|
if (r->timeout[i]) {
|
|
int j;
|
|
|
|
if (!opts)
|
|
printf(", ");
|
|
opts = 0;
|
|
for (j = 0; pf_timeouts[j].name != NULL;
|
|
++j)
|
|
if (pf_timeouts[j].timeout == i)
|
|
break;
|
|
printf("%s %u", pf_timeouts[j].name == NULL ?
|
|
"inv.timeout" : pf_timeouts[j].name,
|
|
r->timeout[i]);
|
|
}
|
|
printf(")");
|
|
}
|
|
if (r->rule_flag & PFRULE_FRAGMENT)
|
|
printf(" fragment");
|
|
if (r->rule_flag & PFRULE_NODF)
|
|
printf(" no-df");
|
|
if (r->rule_flag & PFRULE_RANDOMID)
|
|
printf(" random-id");
|
|
if (r->min_ttl)
|
|
printf(" min-ttl %d", r->min_ttl);
|
|
if (r->max_mss)
|
|
printf(" max-mss %d", r->max_mss);
|
|
if (r->allow_opts)
|
|
printf(" allow-opts");
|
|
if (r->action == PF_SCRUB) {
|
|
if (r->rule_flag & PFRULE_REASSEMBLE_TCP)
|
|
printf(" reassemble tcp");
|
|
|
|
if (r->rule_flag & PFRULE_FRAGDROP)
|
|
printf(" fragment drop-ovl");
|
|
else if (r->rule_flag & PFRULE_FRAGCROP)
|
|
printf(" fragment crop");
|
|
else
|
|
printf(" fragment reassemble");
|
|
}
|
|
if (r->label[0])
|
|
printf(" label \"%s\"", r->label);
|
|
if (r->qname[0] && r->pqname[0])
|
|
printf(" queue(%s, %s)", r->qname, r->pqname);
|
|
else if (r->qname[0])
|
|
printf(" queue %s", r->qname);
|
|
if (r->tagname[0])
|
|
printf(" tag %s", r->tagname);
|
|
if (r->match_tagname[0]) {
|
|
if (r->match_tag_not)
|
|
printf(" !");
|
|
printf(" tagged %s", r->match_tagname);
|
|
}
|
|
if (r->rtableid != -1)
|
|
printf(" rtable %u", r->rtableid);
|
|
if (!anchor_call[0] && (r->action == PF_NAT ||
|
|
r->action == PF_BINAT || r->action == PF_RDR)) {
|
|
printf(" -> ");
|
|
print_pool(&r->rpool, r->rpool.proxy_port[0],
|
|
r->rpool.proxy_port[1], r->af, r->action);
|
|
}
|
|
}
|
|
|
|
void
|
|
print_tabledef(const char *name, int flags, int addrs,
|
|
struct node_tinithead *nodes)
|
|
{
|
|
struct node_tinit *ti, *nti;
|
|
struct node_host *h;
|
|
|
|
printf("table <%s>", name);
|
|
if (flags & PFR_TFLAG_CONST)
|
|
printf(" const");
|
|
if (flags & PFR_TFLAG_PERSIST)
|
|
printf(" persist");
|
|
SIMPLEQ_FOREACH(ti, nodes, entries) {
|
|
if (ti->file) {
|
|
printf(" file \"%s\"", ti->file);
|
|
continue;
|
|
}
|
|
printf(" {");
|
|
for (;;) {
|
|
for (h = ti->host; h != NULL; h = h->next) {
|
|
printf(h->not ? " !" : " ");
|
|
print_addr(&h->addr, h->af, 0);
|
|
}
|
|
nti = SIMPLEQ_NEXT(ti, entries);
|
|
if (nti != NULL && nti->file == NULL)
|
|
ti = nti; /* merge lists */
|
|
else
|
|
break;
|
|
}
|
|
printf(" }");
|
|
}
|
|
if (addrs && SIMPLEQ_EMPTY(nodes))
|
|
printf(" { }");
|
|
printf("\n");
|
|
}
|
|
|
|
int
|
|
parse_flags(char *s)
|
|
{
|
|
char *p, *q;
|
|
u_int8_t f = 0;
|
|
|
|
for (p = s; *p; p++) {
|
|
if ((q = strchr(tcpflags, *p)) == NULL)
|
|
return -1;
|
|
else
|
|
f |= 1 << (q - tcpflags);
|
|
}
|
|
return (f ? f : PF_TH_ALL);
|
|
}
|
|
|
|
void
|
|
set_ipmask(struct node_host *h, u_int8_t b)
|
|
{
|
|
struct pf_addr *m, *n;
|
|
int i, j = 0;
|
|
|
|
m = &h->addr.v.a.mask;
|
|
memset(m, 0, sizeof(*m));
|
|
|
|
while (b >= 32) {
|
|
m->addr32[j++] = 0xffffffff;
|
|
b -= 32;
|
|
}
|
|
for (i = 31; i > 31-b; --i)
|
|
m->addr32[j] |= (1 << i);
|
|
if (b)
|
|
m->addr32[j] = htonl(m->addr32[j]);
|
|
|
|
/* Mask off bits of the address that will never be used. */
|
|
n = &h->addr.v.a.addr;
|
|
if (h->addr.type == PF_ADDR_ADDRMASK)
|
|
for (i = 0; i < 4; i++)
|
|
n->addr32[i] = n->addr32[i] & m->addr32[i];
|
|
}
|
|
|
|
int
|
|
check_netmask(struct node_host *h, sa_family_t af)
|
|
{
|
|
struct node_host *n = NULL;
|
|
struct pf_addr *m;
|
|
|
|
for (n = h; n != NULL; n = n->next) {
|
|
if (h->addr.type == PF_ADDR_TABLE)
|
|
continue;
|
|
m = &h->addr.v.a.mask;
|
|
/* fix up netmask for dynaddr */
|
|
if (af == AF_INET && h->addr.type == PF_ADDR_DYNIFTL &&
|
|
unmask(m, AF_INET6) > 32)
|
|
set_ipmask(n, 32);
|
|
/* netmasks > 32 bit are invalid on v4 */
|
|
if (af == AF_INET &&
|
|
(m->addr32[1] || m->addr32[2] || m->addr32[3])) {
|
|
fprintf(stderr, "netmask %u invalid for IPv4 address\n",
|
|
unmask(m, AF_INET6));
|
|
return (1);
|
|
}
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
/* interface lookup routines */
|
|
|
|
struct node_host *iftab;
|
|
|
|
void
|
|
ifa_load(void)
|
|
{
|
|
struct ifaddrs *ifap, *ifa;
|
|
struct node_host *n = NULL, *h = NULL;
|
|
|
|
if (getifaddrs(&ifap) < 0)
|
|
err(1, "getifaddrs");
|
|
|
|
for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
|
|
if (!(ifa->ifa_addr->sa_family == AF_INET ||
|
|
ifa->ifa_addr->sa_family == AF_INET6 ||
|
|
ifa->ifa_addr->sa_family == AF_LINK))
|
|
continue;
|
|
n = calloc(1, sizeof(struct node_host));
|
|
if (n == NULL)
|
|
err(1, "address: calloc");
|
|
n->af = ifa->ifa_addr->sa_family;
|
|
n->ifa_flags = ifa->ifa_flags;
|
|
#ifdef __KAME__
|
|
if (n->af == AF_INET6 &&
|
|
IN6_IS_ADDR_LINKLOCAL(&((struct sockaddr_in6 *)
|
|
ifa->ifa_addr)->sin6_addr) &&
|
|
((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_scope_id ==
|
|
0) {
|
|
struct sockaddr_in6 *sin6;
|
|
|
|
sin6 = (struct sockaddr_in6 *)ifa->ifa_addr;
|
|
sin6->sin6_scope_id = sin6->sin6_addr.s6_addr[2] << 8 |
|
|
sin6->sin6_addr.s6_addr[3];
|
|
sin6->sin6_addr.s6_addr[2] = 0;
|
|
sin6->sin6_addr.s6_addr[3] = 0;
|
|
}
|
|
#endif
|
|
n->ifindex = 0;
|
|
if (n->af == AF_INET) {
|
|
memcpy(&n->addr.v.a.addr, &((struct sockaddr_in *)
|
|
ifa->ifa_addr)->sin_addr.s_addr,
|
|
sizeof(struct in_addr));
|
|
memcpy(&n->addr.v.a.mask, &((struct sockaddr_in *)
|
|
ifa->ifa_netmask)->sin_addr.s_addr,
|
|
sizeof(struct in_addr));
|
|
if (ifa->ifa_broadaddr != NULL)
|
|
memcpy(&n->bcast, &((struct sockaddr_in *)
|
|
ifa->ifa_broadaddr)->sin_addr.s_addr,
|
|
sizeof(struct in_addr));
|
|
if (ifa->ifa_dstaddr != NULL)
|
|
memcpy(&n->peer, &((struct sockaddr_in *)
|
|
ifa->ifa_dstaddr)->sin_addr.s_addr,
|
|
sizeof(struct in_addr));
|
|
} else if (n->af == AF_INET6) {
|
|
memcpy(&n->addr.v.a.addr, &((struct sockaddr_in6 *)
|
|
ifa->ifa_addr)->sin6_addr.s6_addr,
|
|
sizeof(struct in6_addr));
|
|
memcpy(&n->addr.v.a.mask, &((struct sockaddr_in6 *)
|
|
ifa->ifa_netmask)->sin6_addr.s6_addr,
|
|
sizeof(struct in6_addr));
|
|
if (ifa->ifa_broadaddr != NULL)
|
|
memcpy(&n->bcast, &((struct sockaddr_in6 *)
|
|
ifa->ifa_broadaddr)->sin6_addr.s6_addr,
|
|
sizeof(struct in6_addr));
|
|
if (ifa->ifa_dstaddr != NULL)
|
|
memcpy(&n->peer, &((struct sockaddr_in6 *)
|
|
ifa->ifa_dstaddr)->sin6_addr.s6_addr,
|
|
sizeof(struct in6_addr));
|
|
n->ifindex = ((struct sockaddr_in6 *)
|
|
ifa->ifa_addr)->sin6_scope_id;
|
|
}
|
|
if ((n->ifname = strdup(ifa->ifa_name)) == NULL)
|
|
err(1, "ifa_load: strdup");
|
|
n->next = NULL;
|
|
n->tail = n;
|
|
if (h == NULL)
|
|
h = n;
|
|
else {
|
|
h->tail->next = n;
|
|
h->tail = n;
|
|
}
|
|
}
|
|
|
|
iftab = h;
|
|
freeifaddrs(ifap);
|
|
}
|
|
|
|
struct node_host *
|
|
ifa_exists(const char *ifa_name)
|
|
{
|
|
struct node_host *n;
|
|
struct ifgroupreq ifgr;
|
|
int s;
|
|
|
|
if (iftab == NULL)
|
|
ifa_load();
|
|
|
|
/* check wether this is a group */
|
|
if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1)
|
|
err(1, "socket");
|
|
bzero(&ifgr, sizeof(ifgr));
|
|
strlcpy(ifgr.ifgr_name, ifa_name, sizeof(ifgr.ifgr_name));
|
|
if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == 0) {
|
|
/* fake a node_host */
|
|
if ((n = calloc(1, sizeof(*n))) == NULL)
|
|
err(1, "calloc");
|
|
if ((n->ifname = strdup(ifa_name)) == NULL)
|
|
err(1, "strdup");
|
|
close(s);
|
|
return (n);
|
|
}
|
|
close(s);
|
|
|
|
for (n = iftab; n; n = n->next) {
|
|
if (n->af == AF_LINK && !strncmp(n->ifname, ifa_name, IFNAMSIZ))
|
|
return (n);
|
|
}
|
|
|
|
return (NULL);
|
|
}
|
|
|
|
struct node_host *
|
|
ifa_grouplookup(const char *ifa_name, int flags)
|
|
{
|
|
struct ifg_req *ifg;
|
|
struct ifgroupreq ifgr;
|
|
int s, len;
|
|
struct node_host *n, *h = NULL;
|
|
|
|
if ((s = socket(AF_INET, SOCK_DGRAM, 0)) == -1)
|
|
err(1, "socket");
|
|
bzero(&ifgr, sizeof(ifgr));
|
|
strlcpy(ifgr.ifgr_name, ifa_name, sizeof(ifgr.ifgr_name));
|
|
if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1) {
|
|
close(s);
|
|
return (NULL);
|
|
}
|
|
|
|
len = ifgr.ifgr_len;
|
|
if ((ifgr.ifgr_groups = calloc(1, len)) == NULL)
|
|
err(1, "calloc");
|
|
if (ioctl(s, SIOCGIFGMEMB, (caddr_t)&ifgr) == -1)
|
|
err(1, "SIOCGIFGMEMB");
|
|
|
|
for (ifg = ifgr.ifgr_groups; ifg && len >= sizeof(struct ifg_req);
|
|
ifg++) {
|
|
len -= sizeof(struct ifg_req);
|
|
if ((n = ifa_lookup(ifg->ifgrq_member, flags)) == NULL)
|
|
continue;
|
|
if (h == NULL)
|
|
h = n;
|
|
else {
|
|
h->tail->next = n;
|
|
h->tail = n->tail;
|
|
}
|
|
}
|
|
free(ifgr.ifgr_groups);
|
|
close(s);
|
|
|
|
return (h);
|
|
}
|
|
|
|
struct node_host *
|
|
ifa_lookup(const char *ifa_name, int flags)
|
|
{
|
|
struct node_host *p = NULL, *h = NULL, *n = NULL;
|
|
int got4 = 0, got6 = 0;
|
|
const char *last_if = NULL;
|
|
|
|
if ((h = ifa_grouplookup(ifa_name, flags)) != NULL)
|
|
return (h);
|
|
|
|
if (!strncmp(ifa_name, "self", IFNAMSIZ))
|
|
ifa_name = NULL;
|
|
|
|
if (iftab == NULL)
|
|
ifa_load();
|
|
|
|
for (p = iftab; p; p = p->next) {
|
|
if (ifa_skip_if(ifa_name, p))
|
|
continue;
|
|
if ((flags & PFI_AFLAG_BROADCAST) && p->af != AF_INET)
|
|
continue;
|
|
if ((flags & PFI_AFLAG_BROADCAST) &&
|
|
!(p->ifa_flags & IFF_BROADCAST))
|
|
continue;
|
|
if ((flags & PFI_AFLAG_PEER) &&
|
|
!(p->ifa_flags & IFF_POINTOPOINT))
|
|
continue;
|
|
if ((flags & PFI_AFLAG_NETWORK) && p->ifindex > 0)
|
|
continue;
|
|
if (last_if == NULL || strcmp(last_if, p->ifname))
|
|
got4 = got6 = 0;
|
|
last_if = p->ifname;
|
|
if ((flags & PFI_AFLAG_NOALIAS) && p->af == AF_INET && got4)
|
|
continue;
|
|
if ((flags & PFI_AFLAG_NOALIAS) && p->af == AF_INET6 && got6)
|
|
continue;
|
|
if (p->af == AF_INET)
|
|
got4 = 1;
|
|
else
|
|
got6 = 1;
|
|
n = calloc(1, sizeof(struct node_host));
|
|
if (n == NULL)
|
|
err(1, "address: calloc");
|
|
n->af = p->af;
|
|
if (flags & PFI_AFLAG_BROADCAST)
|
|
memcpy(&n->addr.v.a.addr, &p->bcast,
|
|
sizeof(struct pf_addr));
|
|
else if (flags & PFI_AFLAG_PEER)
|
|
memcpy(&n->addr.v.a.addr, &p->peer,
|
|
sizeof(struct pf_addr));
|
|
else
|
|
memcpy(&n->addr.v.a.addr, &p->addr.v.a.addr,
|
|
sizeof(struct pf_addr));
|
|
if (flags & PFI_AFLAG_NETWORK)
|
|
set_ipmask(n, unmask(&p->addr.v.a.mask, n->af));
|
|
else {
|
|
if (n->af == AF_INET) {
|
|
if (p->ifa_flags & IFF_LOOPBACK &&
|
|
p->ifa_flags & IFF_LINK1)
|
|
memcpy(&n->addr.v.a.mask,
|
|
&p->addr.v.a.mask,
|
|
sizeof(struct pf_addr));
|
|
else
|
|
set_ipmask(n, 32);
|
|
} else
|
|
set_ipmask(n, 128);
|
|
}
|
|
n->ifindex = p->ifindex;
|
|
|
|
n->next = NULL;
|
|
n->tail = n;
|
|
if (h == NULL)
|
|
h = n;
|
|
else {
|
|
h->tail->next = n;
|
|
h->tail = n;
|
|
}
|
|
}
|
|
return (h);
|
|
}
|
|
|
|
int
|
|
ifa_skip_if(const char *filter, struct node_host *p)
|
|
{
|
|
int n;
|
|
|
|
if (p->af != AF_INET && p->af != AF_INET6)
|
|
return (1);
|
|
if (filter == NULL || !*filter)
|
|
return (0);
|
|
if (!strcmp(p->ifname, filter))
|
|
return (0); /* exact match */
|
|
n = strlen(filter);
|
|
if (n < 1 || n >= IFNAMSIZ)
|
|
return (1); /* sanity check */
|
|
if (filter[n-1] >= '0' && filter[n-1] <= '9')
|
|
return (1); /* only do exact match in that case */
|
|
if (strncmp(p->ifname, filter, n))
|
|
return (1); /* prefix doesn't match */
|
|
return (p->ifname[n] < '0' || p->ifname[n] > '9');
|
|
}
|
|
|
|
|
|
struct node_host *
|
|
host(const char *s)
|
|
{
|
|
struct node_host *h = NULL;
|
|
int mask, v4mask, v6mask, cont = 1;
|
|
char *p, *q, *ps;
|
|
|
|
if ((p = strrchr(s, '/')) != NULL) {
|
|
mask = strtol(p+1, &q, 0);
|
|
if (!q || *q || mask > 128 || q == (p+1)) {
|
|
fprintf(stderr, "invalid netmask '%s'\n", p);
|
|
return (NULL);
|
|
}
|
|
if ((ps = malloc(strlen(s) - strlen(p) + 1)) == NULL)
|
|
err(1, "host: malloc");
|
|
strlcpy(ps, s, strlen(s) - strlen(p) + 1);
|
|
v4mask = v6mask = mask;
|
|
} else {
|
|
if ((ps = strdup(s)) == NULL)
|
|
err(1, "host: strdup");
|
|
v4mask = 32;
|
|
v6mask = 128;
|
|
mask = -1;
|
|
}
|
|
|
|
/* interface with this name exists? */
|
|
if (cont && (h = host_if(ps, mask)) != NULL)
|
|
cont = 0;
|
|
|
|
/* IPv4 address? */
|
|
if (cont && (h = host_v4(s, mask)) != NULL)
|
|
cont = 0;
|
|
|
|
/* IPv6 address? */
|
|
if (cont && (h = host_v6(ps, v6mask)) != NULL)
|
|
cont = 0;
|
|
|
|
/* dns lookup */
|
|
if (cont && (h = host_dns(ps, v4mask, v6mask)) != NULL)
|
|
cont = 0;
|
|
free(ps);
|
|
|
|
if (h == NULL || cont == 1) {
|
|
fprintf(stderr, "no IP address found for %s\n", s);
|
|
return (NULL);
|
|
}
|
|
return (h);
|
|
}
|
|
|
|
struct node_host *
|
|
host_if(const char *s, int mask)
|
|
{
|
|
struct node_host *n, *h = NULL;
|
|
char *p, *ps;
|
|
int flags = 0;
|
|
|
|
if ((ps = strdup(s)) == NULL)
|
|
err(1, "host_if: strdup");
|
|
while ((p = strrchr(ps, ':')) != NULL) {
|
|
if (!strcmp(p+1, "network"))
|
|
flags |= PFI_AFLAG_NETWORK;
|
|
else if (!strcmp(p+1, "broadcast"))
|
|
flags |= PFI_AFLAG_BROADCAST;
|
|
else if (!strcmp(p+1, "peer"))
|
|
flags |= PFI_AFLAG_PEER;
|
|
else if (!strcmp(p+1, "0"))
|
|
flags |= PFI_AFLAG_NOALIAS;
|
|
else {
|
|
free(ps);
|
|
return (NULL);
|
|
}
|
|
*p = '\0';
|
|
}
|
|
if (flags & (flags - 1) & PFI_AFLAG_MODEMASK) { /* Yep! */
|
|
fprintf(stderr, "illegal combination of interface modifiers\n");
|
|
free(ps);
|
|
return (NULL);
|
|
}
|
|
if ((flags & (PFI_AFLAG_NETWORK|PFI_AFLAG_BROADCAST)) && mask > -1) {
|
|
fprintf(stderr, "network or broadcast lookup, but "
|
|
"extra netmask given\n");
|
|
free(ps);
|
|
return (NULL);
|
|
}
|
|
if (ifa_exists(ps) || !strncmp(ps, "self", IFNAMSIZ)) {
|
|
/* interface with this name exists */
|
|
h = ifa_lookup(ps, flags);
|
|
for (n = h; n != NULL && mask > -1; n = n->next)
|
|
set_ipmask(n, mask);
|
|
}
|
|
|
|
free(ps);
|
|
return (h);
|
|
}
|
|
|
|
struct node_host *
|
|
host_v4(const char *s, int mask)
|
|
{
|
|
struct node_host *h = NULL;
|
|
struct in_addr ina;
|
|
int bits = 32;
|
|
|
|
memset(&ina, 0, sizeof(struct in_addr));
|
|
if (strrchr(s, '/') != NULL) {
|
|
if ((bits = inet_net_pton(AF_INET, s, &ina, sizeof(ina))) == -1)
|
|
return (NULL);
|
|
} else {
|
|
if (inet_pton(AF_INET, s, &ina) != 1)
|
|
return (NULL);
|
|
}
|
|
|
|
h = calloc(1, sizeof(struct node_host));
|
|
if (h == NULL)
|
|
err(1, "address: calloc");
|
|
h->ifname = NULL;
|
|
h->af = AF_INET;
|
|
h->addr.v.a.addr.addr32[0] = ina.s_addr;
|
|
set_ipmask(h, bits);
|
|
h->next = NULL;
|
|
h->tail = h;
|
|
|
|
return (h);
|
|
}
|
|
|
|
struct node_host *
|
|
host_v6(const char *s, int mask)
|
|
{
|
|
struct addrinfo hints, *res;
|
|
struct node_host *h = NULL;
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = AF_INET6;
|
|
hints.ai_socktype = SOCK_DGRAM; /*dummy*/
|
|
hints.ai_flags = AI_NUMERICHOST;
|
|
if (getaddrinfo(s, "0", &hints, &res) == 0) {
|
|
h = calloc(1, sizeof(struct node_host));
|
|
if (h == NULL)
|
|
err(1, "address: calloc");
|
|
h->ifname = NULL;
|
|
h->af = AF_INET6;
|
|
memcpy(&h->addr.v.a.addr,
|
|
&((struct sockaddr_in6 *)res->ai_addr)->sin6_addr,
|
|
sizeof(h->addr.v.a.addr));
|
|
h->ifindex =
|
|
((struct sockaddr_in6 *)res->ai_addr)->sin6_scope_id;
|
|
set_ipmask(h, mask);
|
|
freeaddrinfo(res);
|
|
h->next = NULL;
|
|
h->tail = h;
|
|
}
|
|
|
|
return (h);
|
|
}
|
|
|
|
struct node_host *
|
|
host_dns(const char *s, int v4mask, int v6mask)
|
|
{
|
|
struct addrinfo hints, *res0, *res;
|
|
struct node_host *n, *h = NULL;
|
|
int error, noalias = 0;
|
|
int got4 = 0, got6 = 0;
|
|
char *p, *ps;
|
|
|
|
if ((ps = strdup(s)) == NULL)
|
|
err(1, "host_dns: strdup");
|
|
if ((p = strrchr(ps, ':')) != NULL && !strcmp(p, ":0")) {
|
|
noalias = 1;
|
|
*p = '\0';
|
|
}
|
|
memset(&hints, 0, sizeof(hints));
|
|
hints.ai_family = PF_UNSPEC;
|
|
hints.ai_socktype = SOCK_STREAM; /* DUMMY */
|
|
error = getaddrinfo(ps, NULL, &hints, &res0);
|
|
if (error) {
|
|
free(ps);
|
|
return (h);
|
|
}
|
|
|
|
for (res = res0; res; res = res->ai_next) {
|
|
if (res->ai_family != AF_INET &&
|
|
res->ai_family != AF_INET6)
|
|
continue;
|
|
if (noalias) {
|
|
if (res->ai_family == AF_INET) {
|
|
if (got4)
|
|
continue;
|
|
got4 = 1;
|
|
} else {
|
|
if (got6)
|
|
continue;
|
|
got6 = 1;
|
|
}
|
|
}
|
|
n = calloc(1, sizeof(struct node_host));
|
|
if (n == NULL)
|
|
err(1, "host_dns: calloc");
|
|
n->ifname = NULL;
|
|
n->af = res->ai_family;
|
|
if (res->ai_family == AF_INET) {
|
|
memcpy(&n->addr.v.a.addr,
|
|
&((struct sockaddr_in *)
|
|
res->ai_addr)->sin_addr.s_addr,
|
|
sizeof(struct in_addr));
|
|
set_ipmask(n, v4mask);
|
|
} else {
|
|
memcpy(&n->addr.v.a.addr,
|
|
&((struct sockaddr_in6 *)
|
|
res->ai_addr)->sin6_addr.s6_addr,
|
|
sizeof(struct in6_addr));
|
|
n->ifindex =
|
|
((struct sockaddr_in6 *)
|
|
res->ai_addr)->sin6_scope_id;
|
|
set_ipmask(n, v6mask);
|
|
}
|
|
n->next = NULL;
|
|
n->tail = n;
|
|
if (h == NULL)
|
|
h = n;
|
|
else {
|
|
h->tail->next = n;
|
|
h->tail = n;
|
|
}
|
|
}
|
|
freeaddrinfo(res0);
|
|
free(ps);
|
|
|
|
return (h);
|
|
}
|
|
|
|
/*
|
|
* convert a hostname to a list of addresses and put them in the given buffer.
|
|
* test:
|
|
* if set to 1, only simple addresses are accepted (no netblock, no "!").
|
|
*/
|
|
int
|
|
append_addr(struct pfr_buffer *b, char *s, int test)
|
|
{
|
|
char *r;
|
|
struct node_host *h, *n;
|
|
int rv, not = 0;
|
|
|
|
for (r = s; *r == '!'; r++)
|
|
not = !not;
|
|
if ((n = host(r)) == NULL) {
|
|
errno = 0;
|
|
return (-1);
|
|
}
|
|
rv = append_addr_host(b, n, test, not);
|
|
do {
|
|
h = n;
|
|
n = n->next;
|
|
free(h);
|
|
} while (n != NULL);
|
|
return (rv);
|
|
}
|
|
|
|
/*
|
|
* same as previous function, but with a pre-parsed input and the ability
|
|
* to "negate" the result. Does not free the node_host list.
|
|
* not:
|
|
* setting it to 1 is equivalent to adding "!" in front of parameter s.
|
|
*/
|
|
int
|
|
append_addr_host(struct pfr_buffer *b, struct node_host *n, int test, int not)
|
|
{
|
|
int bits;
|
|
struct pfr_addr addr;
|
|
|
|
do {
|
|
bzero(&addr, sizeof(addr));
|
|
addr.pfra_not = n->not ^ not;
|
|
addr.pfra_af = n->af;
|
|
addr.pfra_net = unmask(&n->addr.v.a.mask, n->af);
|
|
switch (n->af) {
|
|
case AF_INET:
|
|
addr.pfra_ip4addr.s_addr = n->addr.v.a.addr.addr32[0];
|
|
bits = 32;
|
|
break;
|
|
case AF_INET6:
|
|
memcpy(&addr.pfra_ip6addr, &n->addr.v.a.addr.v6,
|
|
sizeof(struct in6_addr));
|
|
bits = 128;
|
|
break;
|
|
default:
|
|
errno = EINVAL;
|
|
return (-1);
|
|
}
|
|
if ((test && (not || addr.pfra_net != bits)) ||
|
|
addr.pfra_net > bits) {
|
|
errno = EINVAL;
|
|
return (-1);
|
|
}
|
|
if (pfr_buf_add(b, &addr))
|
|
return (-1);
|
|
} while ((n = n->next) != NULL);
|
|
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
pfctl_add_trans(struct pfr_buffer *buf, int rs_num, const char *anchor)
|
|
{
|
|
struct pfioc_trans_e trans;
|
|
|
|
bzero(&trans, sizeof(trans));
|
|
trans.rs_num = rs_num;
|
|
if (strlcpy(trans.anchor, anchor,
|
|
sizeof(trans.anchor)) >= sizeof(trans.anchor))
|
|
errx(1, "pfctl_add_trans: strlcpy");
|
|
|
|
return pfr_buf_add(buf, &trans);
|
|
}
|
|
|
|
u_int32_t
|
|
pfctl_get_ticket(struct pfr_buffer *buf, int rs_num, const char *anchor)
|
|
{
|
|
struct pfioc_trans_e *p;
|
|
|
|
PFRB_FOREACH(p, buf)
|
|
if (rs_num == p->rs_num && !strcmp(anchor, p->anchor))
|
|
return (p->ticket);
|
|
errx(1, "pfctl_get_ticket: assertion failed");
|
|
}
|
|
|
|
int
|
|
pfctl_trans(int dev, struct pfr_buffer *buf, u_long cmd, int from)
|
|
{
|
|
struct pfioc_trans trans;
|
|
|
|
bzero(&trans, sizeof(trans));
|
|
trans.size = buf->pfrb_size - from;
|
|
trans.esize = sizeof(struct pfioc_trans_e);
|
|
trans.array = ((struct pfioc_trans_e *)buf->pfrb_caddr) + from;
|
|
return ioctl(dev, cmd, &trans);
|
|
}
|