• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 1982, 1986, 1988, 1990, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  *	@(#)udp_usrreq.c	8.4 (Berkeley) 1/21/94
30  * udp_usrreq.c,v 1.4 1994/10/02 17:48:45 phk Exp
31  */
32 
33 /*
34  * Changes and additions relating to SLiRP
35  * Copyright (c) 1995 Danny Gasparovski.
36  *
37  * Please read the file COPYRIGHT for the
38  * terms and conditions of the copyright.
39  */
40 
41 #include <slirp.h>
42 #include "ip_icmp.h"
43 #define SLIRP_COMPILATION  1
44 #include "sockets.h"
45 
46 #ifdef LOG_ENABLED
47 struct udpstat udpstat;
48 #endif
49 
50 /* Keeps track of the number of DNS requests.  Used to implement the firewall
51  * option that restricts the number of DNS requests (-max_dns_conns). */
52 u_int dns_num_conns;
53 
54 struct socket udb;
55 
56 static u_int8_t udp_tos(struct socket *so);
57 static void udp_emu(struct socket *so, struct mbuf *m);
58 
59 /*
60  * UDP protocol implementation.
61  * Per RFC 768, August, 1980.
62  */
63 #ifndef	COMPAT_42
64 #define UDPCKSUM 1
65 #else
66 #define UDPCKSUM 0 /* XXX */
67 #endif
68 
69 struct	socket *udp_last_so = &udb;
70 
71 void
udp_init(void)72 udp_init(void)
73 {
74 	udb.so_next = udb.so_prev = &udb;
75 	dns_num_conns = 0;
76 }
77 /* m->m_data  points at ip packet header
78  * m->m_len   length ip packet
79  * ip->ip_len length data (IPDU)
80  */
81 void
udp_input(register struct mbuf * m,int iphlen)82 udp_input(register struct mbuf *m, int iphlen)
83 {
84 	register struct ip *ip;
85 	register struct udphdr *uh;
86 /*	struct mbuf *opts = 0;*/
87 	int len;
88 	struct ip save_ip;
89 	struct socket *so;
90 
91 	DEBUG_CALL("udp_input");
92 	DEBUG_ARG("m = %lx", (long)m);
93 	DEBUG_ARG("iphlen = %d", iphlen);
94 
95 	STAT(udpstat.udps_ipackets++);
96 
97 	/*
98 	 * Strip IP options, if any; should skip this,
99 	 * make available to user, and use on returned packets,
100 	 * but we don't yet have a way to check the checksum
101 	 * with options still present.
102 	 */
103 	if(iphlen > sizeof(struct ip)) {
104 		ip_stripoptions(m, (struct mbuf *)0);
105 		iphlen = sizeof(struct ip);
106 	}
107 
108 	/*
109 	 * Get IP and UDP header together in first mbuf.
110 	 */
111 	ip = mtod(m, struct ip *);
112 	uh = (struct udphdr *)((caddr_t)ip + iphlen);
113 
114 	/*
115 	 * Make mbuf data length reflect UDP length.
116 	 * If not enough data to reflect UDP length, drop.
117 	 */
118 	len = ntohs((u_int16_t)uh->uh_ulen);
119 
120 	if (ip->ip_len != len) {
121 		if (len > ip->ip_len) {
122 			STAT(udpstat.udps_badlen++);
123 			goto bad;
124 		}
125 		m_adj(m, len - ip->ip_len);
126 		ip->ip_len = len;
127 	}
128 
129 	/* ------------------------------------------------------*/
130 	/* User mode network stack restrictions */
131 	/* slirp_should_drop requires host byte ordering in arguments */
132 	time_t timestamp = time(NULL);
133 
134 	if (slirp_should_drop(ntohl(ip->ip_dst.addr), ntohs(uh->uh_dport.port),
135 	                      IPPROTO_UDP)) {
136 	  slirp_drop_log(
137 	    "Dropped UDP: src: 0x%08lx:0x%04x dst: 0x%08lx:0x%04x %ld\n",
138 	    ntohl(ip->ip_src.addr),
139 	    ntohs(uh->uh_sport.port),
140 	    ntohl(ip->ip_dst.addr),
141 	    ntohs(uh->uh_dport.port),
142 	    timestamp
143 	  );
144 	  goto bad; /* drop the packet */
145 	}
146 	else {
147 	  slirp_drop_log(
148 	    "Allowed UDP: src: 0x%08lx:0x%04x dst: 0x%08lx:0x%04x %ld\n",
149 	    ntohl(ip->ip_src.addr),
150 	    ntohs(uh->uh_sport.port),
151 	    ntohl(ip->ip_dst.addr),
152 	    ntohs(uh->uh_dport.port),
153 	    timestamp
154 	  );
155 	}
156   /* ------------------------------------------------------*/
157 
158 
159 
160 	/*
161 	 * Save a copy of the IP header in case we want restore it
162 	 * for sending an ICMP error message in response.
163 	 */
164 	save_ip = *ip;
165 	save_ip.ip_len+= iphlen;         /* tcp_input subtracts this */
166 
167 	/*
168 	 * Checksum extended UDP header and data.
169 	 */
170 	if (UDPCKSUM && uh->uh_sum) {
171       memset(&((struct ipovly *)ip)->ih_mbuf, 0, sizeof(struct mbuf_ptr));
172 	  ((struct ipovly *)ip)->ih_x1 = 0;
173 	  ((struct ipovly *)ip)->ih_len = uh->uh_ulen;
174 	  /* keep uh_sum for ICMP reply
175 	   * uh->uh_sum = cksum(m, len + sizeof (struct ip));
176 	   * if (uh->uh_sum) {
177 	   */
178 	  if(cksum(m, len + sizeof(struct ip))) {
179 	    STAT(udpstat.udps_badsum++);
180 	    goto bad;
181 	  }
182 	}
183 
184         /*
185          *  handle DHCP/BOOTP
186          */
187         if (port_geth(uh->uh_dport) == BOOTP_SERVER) {
188             bootp_input(m);
189             goto bad;
190         }
191 
192         if (slirp_restrict)
193             goto bad;
194 
195         /*
196          *  handle TFTP
197          */
198         if (port_geth(uh->uh_dport) == TFTP_SERVER) {
199             tftp_input(m);
200             goto bad;
201         }
202 
203         // DNS logging and FW rules
204         if (ntohs(uh->uh_dport.port) == 53) {
205             if (!slirp_dump_dns(m)) {
206                 DEBUG_MISC((dfd,"Error logging DNS packet"));
207             }
208             dns_num_conns++;
209             if (slirp_get_max_dns_conns() != -1 &&
210                 dns_num_conns > slirp_get_max_dns_conns())
211                 goto bad;
212         }
213 
214 
215 	/*
216 	 * Locate pcb for datagram.
217 	 */
218 	so = udp_last_so;
219 	if (so->so_laddr_port != port_geth(uh->uh_sport) ||
220 	    so->so_laddr_ip   != ip_geth(ip->ip_src)) {
221 		struct socket *tmp;
222 
223 		for (tmp = udb.so_next; tmp != &udb; tmp = tmp->so_next) {
224 			if (tmp->so_laddr_port == port_geth(uh->uh_sport) &&
225 			    tmp->so_laddr_ip   == ip_geth(ip->ip_src)) {
226 				tmp->so_faddr_ip   = ip_geth(ip->ip_dst);
227 				tmp->so_faddr_port = port_geth(uh->uh_dport);
228 				so = tmp;
229 				break;
230 			}
231 		}
232 		if (tmp == &udb) {
233 		  so = NULL;
234 		} else {
235 		  STAT(udpstat.udpps_pcbcachemiss++);
236 		  udp_last_so = so;
237 		}
238 	}
239 
240 	if (so == NULL) {
241 	  /*
242 	   * If there's no socket for this packet,
243 	   * create one
244 	   */
245 	  if ((so = socreate()) == NULL) goto bad;
246 	  if(udp_attach(so) == -1) {
247 	    DEBUG_MISC((dfd," udp_attach errno = %d-%s\n",
248 			errno,errno_str));
249 	    sofree(so);
250 	    goto bad;
251 	  }
252 
253 	  /*
254 	   * Setup fields
255 	   */
256 	  /* udp_last_so = so; */
257 	  so->so_laddr_ip   = ip_geth(ip->ip_src);
258 	  so->so_laddr_port = port_geth(uh->uh_sport);
259 
260 	  if ((so->so_iptos = udp_tos(so)) == 0)
261 	    so->so_iptos = ip->ip_tos;
262 
263 	  /*
264 	   * XXXXX Here, check if it's in udpexec_list,
265 	   * and if it is, do the fork_exec() etc.
266 	   */
267 	}
268 
269         so->so_faddr_ip   = ip_geth(ip->ip_dst); /* XXX */
270         so->so_faddr_port = port_geth(uh->uh_dport); /* XXX */
271 
272 	iphlen += sizeof(struct udphdr);
273 	m->m_len -= iphlen;
274 	m->m_data += iphlen;
275 
276 	/*
277 	 * Now we sendto() the packet.
278 	 */
279 	if (so->so_emu)
280 	   udp_emu(so, m);
281 
282 	if(sosendto(so,m) == -1) {
283 	  m->m_len += iphlen;
284 	  m->m_data -= iphlen;
285 	  *ip=save_ip;
286 	  DEBUG_MISC((dfd,"udp tx errno = %d-%s\n",errno, errno_str));
287 	  icmp_error(m, ICMP_UNREACH,ICMP_UNREACH_NET, 0,errno_str);
288 	}
289 
290 	m_free(so->so_m);   /* used for ICMP if error on sorecvfrom */
291 
292 	/* restore the orig mbuf packet */
293 	m->m_len += iphlen;
294 	m->m_data -= iphlen;
295 	*ip=save_ip;
296 	so->so_m=m;         /* ICMP backup */
297 
298 	return;
299 bad:
300 	m_freem(m);
301 	/* if (opts) m_freem(opts); */
302 	return;
303 }
304 
udp_output2_(struct socket * so,struct mbuf * m,const SockAddress * saddr,const SockAddress * daddr,int iptos)305 int udp_output2_(struct socket *so, struct mbuf *m,
306                  const SockAddress*  saddr,
307                  const SockAddress*  daddr,
308                  int iptos)
309 {
310     register struct udpiphdr *ui;
311     uint32_t  saddr_ip = sock_address_get_ip(saddr);
312     uint32_t  daddr_ip = sock_address_get_ip(daddr);
313     int       saddr_port = sock_address_get_port(saddr);
314     int       daddr_port = sock_address_get_port(daddr);
315     int error = 0;
316 
317     DEBUG_CALL("udp_output");
318 	DEBUG_ARG("so = %lx", (long)so);
319 	DEBUG_ARG("m = %lx", (long)m);
320     DEBUG_ARG("saddr = %lx", (long) saddr_ip);
321     DEBUG_ARG("daddr = %lx", (long) daddr_ip);
322 
323 	/*
324 	 * Adjust for header
325 	 */
326 	m->m_data -= sizeof(struct udpiphdr);
327 	m->m_len += sizeof(struct udpiphdr);
328 
329 	/*
330 	 * Fill in mbuf with extended UDP header
331 	 * and addresses and length put into network format.
332 	 */
333 	ui = mtod(m, struct udpiphdr *);
334     memset(&ui->ui_i.ih_mbuf, 0 , sizeof(struct mbuf_ptr));
335 	ui->ui_x1 = 0;
336 	ui->ui_pr = IPPROTO_UDP;
337 	ui->ui_len = htons(m->m_len - sizeof(struct ip)); /* + sizeof (struct udphdr)); */
338 	/* XXXXX Check for from-one-location sockets, or from-any-location sockets */
339     ui->ui_src   = ip_seth(saddr_ip);
340     ui->ui_dst   = ip_seth(daddr_ip);
341     ui->ui_sport = port_seth(saddr_port);
342     ui->ui_dport = port_seth(daddr_port);
343 	ui->ui_ulen = ui->ui_len;
344 
345 	/*
346 	 * Stuff checksum and output datagram.
347 	 */
348 	ui->ui_sum = 0;
349 	if (UDPCKSUM) {
350 	    if ((ui->ui_sum = cksum(m, /* sizeof (struct udpiphdr) + */ m->m_len)) == 0)
351 		ui->ui_sum = 0xffff;
352 	}
353 	((struct ip *)ui)->ip_len = m->m_len;
354 
355 	((struct ip *)ui)->ip_ttl = IPDEFTTL;
356 	((struct ip *)ui)->ip_tos = iptos;
357 
358 	STAT(udpstat.udps_opackets++);
359 
360 	//  DNS logging
361 	if (so != NULL && so->so_faddr_port == 53) {  /*so has host byte order */
362 	  if (!slirp_dump_dns(m)) {
363 	    DEBUG_MISC((dfd,"Error logging DNS packet"));
364 	  }
365 	}
366 
367 	error = ip_output(so, m);
368 
369 	return (error);
370 }
371 
udp_output_(struct socket * so,struct mbuf * m,SockAddress * from)372 int udp_output_(struct socket *so, struct mbuf *m,
373                SockAddress* from)
374 {
375     SockAddress  saddr, daddr;
376     uint32_t     saddr_ip;
377     uint16_t     saddr_port;
378 
379     saddr_ip   = sock_address_get_ip(from);
380     saddr_port = sock_address_get_port(from);
381 
382     if ((so->so_faddr_ip & 0xffffff00) == special_addr_ip) {
383         saddr_ip = so->so_faddr_ip;
384         if ((so->so_faddr_ip & 0x000000ff) == 0xff)
385             saddr_ip = alias_addr_ip;
386     }
387 
388     sock_address_init_inet( &saddr, saddr_ip, saddr_port );
389     sock_address_init_inet( &daddr, so->so_laddr_ip, so->so_laddr_port );
390 
391     return udp_output2_(so, m, &saddr, &daddr, so->so_iptos);
392 }
393 
394 int
udp_attach(struct socket * so)395 udp_attach(struct socket *so)
396 {
397   so->s = socket_anyaddr_server( 0, SOCKET_DGRAM );
398   if (so->s != -1) {
399       /* success, insert in queue */
400       so->so_expire = curtime + SO_EXPIRE;
401       insque(so,&udb);
402   }
403   return(so->s);
404 }
405 
406 void
udp_detach(struct socket * so)407 udp_detach(struct socket *so)
408 {
409 	socket_close(so->s);
410 	/* if (so->so_m) m_free(so->so_m);    done by sofree */
411 
412 	sofree(so);
413 }
414 
415 static const struct tos_t udptos[] = {
416 	{0, 53, IPTOS_LOWDELAY, 0},			/* DNS */
417 	{517, 517, IPTOS_LOWDELAY, EMU_TALK},	/* talk */
418 	{518, 518, IPTOS_LOWDELAY, EMU_NTALK},	/* ntalk */
419 	{0, 7648, IPTOS_LOWDELAY, EMU_CUSEEME},	/* Cu-Seeme */
420 	{0, 0, 0, 0}
421 };
422 
423 static u_int8_t
udp_tos(struct socket * so)424 udp_tos(struct socket *so)
425 {
426 	int i = 0;
427 
428 	while(udptos[i].tos) {
429 		if ((udptos[i].fport && so->so_faddr_port == udptos[i].fport) ||
430 		    (udptos[i].lport && so->so_laddr_port == udptos[i].lport)) {
431 		    	so->so_emu = udptos[i].emu;
432 			return udptos[i].tos;
433 		}
434 		i++;
435 	}
436 
437 	return 0;
438 }
439 
440 
441 /*
442  * Here, talk/ytalk/ntalk requests must be emulated
443  */
444 static void
udp_emu(struct socket * so,struct mbuf * m)445 udp_emu(struct socket *so, struct mbuf *m)
446 {
447         SockAddress  sockaddr;
448 
449 struct cu_header {
450 	uint16_t	d_family;		// destination family
451 	uint16_t	d_port;			// destination port
452 	uint32_t	d_addr;			// destination address
453 	uint16_t	s_family;		// source family
454 	uint16_t	s_port;			// source port
455 	uint32_t	so_addr;		// source address
456 	uint32_t	seqn;			// sequence number
457 	uint16_t	message;		// message
458 	uint16_t	data_type;		// data type
459 	uint16_t	pkt_len;		// packet length
460 } *cu_head;
461 
462 	switch(so->so_emu) {
463 
464 	case EMU_CUSEEME:
465 
466 		/*
467 		 * Cu-SeeMe emulation.
468 		 * Hopefully the packet is more that 16 bytes long. We don't
469 		 * do any other tests, just replace the address and port
470 		 * fields.
471 		 */
472 		if (m->m_len >= sizeof (*cu_head)) {
473 			if (socket_get_address(so->s, &sockaddr) < 0)
474                             return;
475 
476 			cu_head = mtod(m, struct cu_header *);
477 			cu_head->s_port  = htons( sock_address_get_port(&sockaddr));
478 			cu_head->so_addr = htonl( sock_address_get_ip(&sockaddr));
479 		}
480 
481 		return;
482 	}
483 }
484 
485 struct socket *
udp_listen(u_int port,u_int32_t laddr,u_int lport,int flags)486 udp_listen(u_int port, u_int32_t laddr, u_int lport, int flags)
487 {
488 	struct socket *so;
489 	SockAddress    addr;
490 	uint32_t       addr_ip;
491 
492 	if ((so = socreate()) == NULL) {
493 		free(so);
494 		return NULL;
495 	}
496 	so->s = socket_anyaddr_server( port, SOCKET_DGRAM );
497 	so->so_expire = curtime + SO_EXPIRE;
498     so->so_haddr_port = port;
499 	insque(so,&udb);
500 
501 	if (so->s < 0) {
502 		udp_detach(so);
503 		return NULL;
504 	}
505 
506         socket_get_address(so->s, &addr);
507 
508 	so->so_faddr_port = sock_address_get_port(&addr);
509 	addr_ip = sock_address_get_ip(&addr);
510 
511 	if (addr_ip == 0 || addr_ip == loopback_addr_ip)
512 	   so->so_faddr_ip = alias_addr_ip;
513 	else
514 	   so->so_faddr_ip = addr_ip;
515 
516 	so->so_laddr_port = lport;
517 	so->so_laddr_ip   = laddr;
518 	if (flags != SS_FACCEPTONCE)
519 	   so->so_expire = 0;
520 
521 	so->so_state = SS_ISFCONNECTED;
522 
523 	return so;
524 }
525 
udp_unlisten(u_int port)526 int udp_unlisten (u_int port)
527 {
528 	return slirp_unredir(1, port);
529 }
530