/* * Copyright (C) 2008 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ // #define LOG_NDEBUG 0 #include <stdlib.h> #include <errno.h> #include <sys/socket.h> #include <sys/stat.h> #include <sys/wait.h> #include <fcntl.h> #include <netinet/in.h> #include <arpa/inet.h> #include <string.h> #include <cutils/properties.h> #define LOG_TAG "NatController" #include <cutils/log.h> #include <logwrap/logwrap.h> #include "NatController.h" #include "SecondaryTableController.h" #include "NetdConstants.h" const char* NatController::LOCAL_FORWARD = "natctrl_FORWARD"; const char* NatController::LOCAL_NAT_POSTROUTING = "natctrl_nat_POSTROUTING"; NatController::NatController(SecondaryTableController *ctrl) { secondaryTableCtrl = ctrl; } NatController::~NatController() { } struct CommandsAndArgs { /* The array size doesn't really matter as the compiler will barf if too many initializers are specified. */ const char *cmd[32]; bool checkRes; }; int NatController::runCmd(int argc, const char **argv) { int res; res = android_fork_execvp(argc, (char **)argv, NULL, false, false); ALOGV("runCmd() res=%d", res); return res; } int NatController::setupIptablesHooks() { setDefaults(); return 0; } int NatController::setDefaults() { struct CommandsAndArgs defaultCommands[] = { {{IPTABLES_PATH, "-F", "natctrl_FORWARD",}, 1}, {{IPTABLES_PATH, "-A", "natctrl_FORWARD", "-j", "DROP"}, 1}, {{IPTABLES_PATH, "-t", "nat", "-F", "natctrl_nat_POSTROUTING"}, 1}, {{IP_PATH, "rule", "flush"}, 0}, {{IP_PATH, "-6", "rule", "flush"}, 0}, {{IP_PATH, "rule", "add", "from", "all", "lookup", "default", "prio", "32767"}, 0}, {{IP_PATH, "rule", "add", "from", "all", "lookup", "main", "prio", "32766"}, 0}, {{IP_PATH, "-6", "rule", "add", "from", "all", "lookup", "default", "prio", "32767"}, 0}, {{IP_PATH, "-6", "rule", "add", "from", "all", "lookup", "main", "prio", "32766"}, 0}, {{IP_PATH, "route", "flush", "cache"}, 0}, }; for (unsigned int cmdNum = 0; cmdNum < ARRAY_SIZE(defaultCommands); cmdNum++) { if (runCmd(ARRAY_SIZE(defaultCommands[cmdNum].cmd), defaultCommands[cmdNum].cmd) && defaultCommands[cmdNum].checkRes) { return -1; } } natCount = 0; return 0; } bool NatController::checkInterface(const char *iface) { if (strlen(iface) > IFNAMSIZ) return false; return true; } int NatController::routesOp(bool add, const char *intIface, const char *extIface, char **argv, int addrCount) { int tableNumber = secondaryTableCtrl->findTableNumber(extIface); int ret = 0; if (tableNumber != -1) { for (int i = 0; i < addrCount; i++) { if (add) { ret |= secondaryTableCtrl->modifyFromRule(tableNumber, ADD, argv[5+i]); ret |= secondaryTableCtrl->modifyLocalRoute(tableNumber, ADD, intIface, argv[5+i]); } else { ret |= secondaryTableCtrl->modifyLocalRoute(tableNumber, DEL, intIface, argv[5+i]); ret |= secondaryTableCtrl->modifyFromRule(tableNumber, DEL, argv[5+i]); } } const char *cmd[] = { IP_PATH, "route", "flush", "cache" }; runCmd(ARRAY_SIZE(cmd), cmd); } return ret; } // 0 1 2 3 4 5 // nat enable intface extface addrcnt nated-ipaddr/prelength int NatController::enableNat(const int argc, char **argv) { int i; int addrCount = atoi(argv[4]); const char *intIface = argv[2]; const char *extIface = argv[3]; int tableNumber; if (!checkInterface(intIface) || !checkInterface(extIface)) { ALOGE("Invalid interface specified"); errno = ENODEV; return -1; } if (argc < 5 + addrCount) { ALOGE("Missing Argument"); errno = EINVAL; return -1; } if (routesOp(true, intIface, extIface, argv, addrCount)) { ALOGE("Error setting route rules"); routesOp(false, intIface, extIface, argv, addrCount); errno = ENODEV; return -1; } // add this if we are the first added nat if (natCount == 0) { const char *cmd[] = { IPTABLES_PATH, "-t", "nat", "-A", "natctrl_nat_POSTROUTING", "-o", extIface, "-j", "MASQUERADE" }; if (runCmd(ARRAY_SIZE(cmd), cmd)) { ALOGE("Error seting postroute rule: iface=%s", extIface); // unwind what's been done, but don't care about success - what more could we do? routesOp(false, intIface, extIface, argv, addrCount); setDefaults(); return -1; } } if (setForwardRules(true, intIface, extIface) != 0) { ALOGE("Error setting forward rules"); routesOp(false, intIface, extIface, argv, addrCount); if (natCount == 0) { setDefaults(); } errno = ENODEV; return -1; } /* Always make sure the drop rule is at the end */ const char *cmd1[] = { IPTABLES_PATH, "-D", "natctrl_FORWARD", "-j", "DROP" }; runCmd(ARRAY_SIZE(cmd1), cmd1); const char *cmd2[] = { IPTABLES_PATH, "-A", "natctrl_FORWARD", "-j", "DROP" }; runCmd(ARRAY_SIZE(cmd2), cmd2); natCount++; return 0; } int NatController::setForwardRules(bool add, const char *intIface, const char * extIface) { const char *cmd1[] = { IPTABLES_PATH, add ? "-A" : "-D", "natctrl_FORWARD", "-i", extIface, "-o", intIface, "-m", "state", "--state", "ESTABLISHED,RELATED", "-j", "RETURN" }; int rc = 0; if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) { return -1; } const char *cmd2[] = { IPTABLES_PATH, add ? "-A" : "-D", "natctrl_FORWARD", "-i", intIface, "-o", extIface, "-m", "state", "--state", "INVALID", "-j", "DROP" }; const char *cmd3[] = { IPTABLES_PATH, add ? "-A" : "-D", "natctrl_FORWARD", "-i", intIface, "-o", extIface, "-j", "RETURN" }; if (runCmd(ARRAY_SIZE(cmd2), cmd2) && add) { // bail on error, but only if adding rc = -1; goto err_invalid_drop; } if (runCmd(ARRAY_SIZE(cmd3), cmd3) && add) { // unwind what's been done, but don't care about success - what more could we do? rc = -1; goto err_return; } return 0; err_return: cmd2[1] = "-D"; runCmd(ARRAY_SIZE(cmd2), cmd2); err_invalid_drop: cmd1[1] = "-D"; runCmd(ARRAY_SIZE(cmd1), cmd1); return rc; } // nat disable intface extface // 0 1 2 3 4 5 // nat enable intface extface addrcnt nated-ipaddr/prelength int NatController::disableNat(const int argc, char **argv) { int i; int addrCount = atoi(argv[4]); const char *intIface = argv[2]; const char *extIface = argv[3]; int tableNumber; if (!checkInterface(intIface) || !checkInterface(extIface)) { ALOGE("Invalid interface specified"); errno = ENODEV; return -1; } if (argc < 5 + addrCount) { ALOGE("Missing Argument"); errno = EINVAL; return -1; } setForwardRules(false, intIface, extIface); routesOp(false, intIface, extIface, argv, addrCount); if (--natCount <= 0) { // handle decrement to 0 case (do reset to defaults) and erroneous dec below 0 setDefaults(); } return 0; }