1/* $NetBSD: ip_dns_pxy.c,v 1.3 2012/07/22 14:27:51 darrenr Exp $ */
2
3/*
4 * Copyright (C) 2012 by Darren Reed.
5 *
6 * See the IPFILTER.LICENCE file for details on licencing.
7 *
8 * Id: ip_dns_pxy.c,v 1.1.1.2 2012/07/22 13:45:10 darrenr Exp
9 */
10
11#define IPF_DNS_PROXY
12
13/*
14 * map ... proxy port dns/udp 53 { block .cnn.com; }
15 */
16typedef struct ipf_dns_filter {
17 struct ipf_dns_filter *idns_next;
18 char *idns_name;
19 int idns_namelen;
20 int idns_pass;
21} ipf_dns_filter_t;
22
23
24typedef struct ipf_dns_softc_s {
25 ipf_dns_filter_t *ipf_p_dns_list;
26 ipfrwlock_t ipf_p_dns_rwlock;
27 u_long ipf_p_dns_compress;
28 u_long ipf_p_dns_toolong;
29 u_long ipf_p_dns_nospace;
30} ipf_dns_softc_t;
31
32int ipf_p_dns_allow_query(ipf_dns_softc_t *, dnsinfo_t *);
33int ipf_p_dns_ctl(ipf_main_softc_t *, void *, ap_ctl_t *);
34int ipf_p_dns_del(ipf_main_softc_t *, ap_session_t *);
35int ipf_p_dns_get_name(ipf_dns_softc_t *, char *, int, char *, int);
36int ipf_p_dns_inout(void *, fr_info_t *, ap_session_t *, nat_t *);
37int ipf_p_dns_match(fr_info_t *, ap_session_t *, nat_t *);
38int ipf_p_dns_match_names(ipf_dns_filter_t *, char *, int);
39int ipf_p_dns_new(void *, fr_info_t *, ap_session_t *, nat_t *);
40void *ipf_p_dns_soft_create(ipf_main_softc_t *);
41void ipf_p_dns_soft_destroy(ipf_main_softc_t *, void *);
42
43typedef struct {
44 u_char dns_id[2];
45 u_short dns_ctlword;
46 u_short dns_qdcount;
47 u_short dns_ancount;
48 u_short dns_nscount;
49 u_short dns_arcount;
50} ipf_dns_hdr_t;
51
52#define DNS_QR(x) ((ntohs(x) & 0x8000) >> 15)
53#define DNS_OPCODE(x) ((ntohs(x) & 0x7800) >> 11)
54#define DNS_AA(x) ((ntohs(x) & 0x0400) >> 10)
55#define DNS_TC(x) ((ntohs(x) & 0x0200) >> 9)
56#define DNS_RD(x) ((ntohs(x) & 0x0100) >> 8)
57#define DNS_RA(x) ((ntohs(x) & 0x0080) >> 7)
58#define DNS_Z(x) ((ntohs(x) & 0x0070) >> 4)
59#define DNS_RCODE(x) ((ntohs(x) & 0x000f) >> 0)
60
61
62void *
63ipf_p_dns_soft_create(ipf_main_softc_t *softc)
64{
65 ipf_dns_softc_t *softd;
66
67 KMALLOC(softd, ipf_dns_softc_t *);
68 if (softd == NULL)
69 return NULL;
70
71 bzero((char *)softd, sizeof(*softd));
72 RWLOCK_INIT(&softd->ipf_p_dns_rwlock, "ipf dns rwlock");
73
74 return softd;
75}
76
77
78void
79ipf_p_dns_soft_destroy(ipf_main_softc_t *softc, void *arg)
80{
81 ipf_dns_softc_t *softd = arg;
82 ipf_dns_filter_t *idns;
83
84 while ((idns = softd->ipf_p_dns_list) != NULL) {
85 KFREES(idns->idns_name, idns->idns_namelen);
86 idns->idns_name = NULL;
87 idns->idns_namelen = 0;
88 softd->ipf_p_dns_list = idns->idns_next;
89 KFREE(idns);
90 }
91 RW_DESTROY(&softd->ipf_p_dns_rwlock);
92
93 KFREE(softd);
94}
95
96
97int
98ipf_p_dns_ctl(ipf_main_softc_t *softc, void *arg, ap_ctl_t *ctl)
99{
100 ipf_dns_softc_t *softd = arg;
101 ipf_dns_filter_t *tmp, *idns, **idnsp;
102 int error = 0;
103
104 /*
105 * To make locking easier.
106 */
107 KMALLOC(tmp, ipf_dns_filter_t *);
108
109 WRITE_ENTER(&softd->ipf_p_dns_rwlock);
110 for (idnsp = &softd->ipf_p_dns_list; (idns = *idnsp) != NULL;
111 idnsp = &idns->idns_next) {
112 if (idns->idns_namelen != ctl->apc_dsize)
113 continue;
114 if (!strncmp(ctl->apc_data, idns->idns_name,
115 idns->idns_namelen))
116 break;
117 }
118
119 switch (ctl->apc_cmd)
120 {
121 case APC_CMD_DEL :
122 if (idns == NULL) {
123 IPFERROR(80006);
124 error = ESRCH;
125 break;
126 }
127 *idnsp = idns->idns_next;
128 idns->idns_next = NULL;
129 KFREES(idns->idns_name, idns->idns_namelen);
130 idns->idns_name = NULL;
131 idns->idns_namelen = 0;
132 KFREE(idns);
133 break;
134 case APC_CMD_ADD :
135 if (idns != NULL) {
136 IPFERROR(80007);
137 error = EEXIST;
138 break;
139 }
140 if (tmp == NULL) {
141 IPFERROR(80008);
142 error = ENOMEM;
143 break;
144 }
145 idns = tmp;
146 tmp = NULL;
147 idns->idns_namelen = ctl->apc_dsize;
148 idns->idns_name = ctl->apc_data;
149 idns->idns_pass = ctl->apc_arg;
150 idns->idns_next = NULL;
151 *idnsp = idns;
152 ctl->apc_data = NULL;
153 ctl->apc_dsize = 0;
154 break;
155 default :
156 IPFERROR(80009);
157 error = EINVAL;
158 break;
159 }
160 RWLOCK_EXIT(&softd->ipf_p_dns_rwlock);
161
162 if (tmp != NULL) {
163 KFREE(tmp);
164 tmp = NULL;
165 }
166
167 return error;
168}
169
170
171/* ARGSUSED */
172int
173ipf_p_dns_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
174{
175 dnsinfo_t *di;
176 int dlen;
177
178 if (fin->fin_v != 4)
179 return -1;
180
181 dlen = fin->fin_dlen - sizeof(udphdr_t);
182 if (dlen < sizeof(ipf_dns_hdr_t)) {
183 /*
184 * No real DNS packet is smaller than that.
185 */
186 return -1;
187 }
188
189 aps->aps_psiz = sizeof(dnsinfo_t);
190 KMALLOCS(di, dnsinfo_t *, sizeof(dnsinfo_t));
191 if (di == NULL) {
192 printf("ipf_dns_new:KMALLOCS(%zu) failed\n", sizeof(*di));
193 return -1;
194 }
195
196 MUTEX_INIT(&di->dnsi_lock, "dns lock");
197
198 aps->aps_data = di;
199
200 dlen = fin->fin_dlen - sizeof(udphdr_t);
201 COPYDATA(fin->fin_m, fin->fin_hlen + sizeof(udphdr_t),
202 MIN(dlen, sizeof(di->dnsi_buffer)), di->dnsi_buffer);
203 di->dnsi_id = (di->dnsi_buffer[0] << 8) | di->dnsi_buffer[1];
204 return 0;
205}
206
207
208/* ARGSUSED */
209int
210ipf_p_dns_del(ipf_main_softc_t *softc, ap_session_t *aps)
211{
212#ifdef USE_MUTEXES
213 dnsinfo_t *di = aps->aps_data;
214
215 MUTEX_DESTROY(&di->dnsi_lock);
216#endif
217 KFREES(aps->aps_data, aps->aps_psiz);
218 aps->aps_data = NULL;
219 aps->aps_psiz = 0;
220 return 0;
221}
222
223
224/*
225 * Tries to match the base string (in our ACL) with the query from a packet.
226 */
227int
228ipf_p_dns_match_names(ipf_dns_filter_t *idns, char *query, int qlen)
229{
230 int blen;
231 char *base;
232
233 blen = idns->idns_namelen;
234 base = idns->idns_name;
235
236 if (blen > qlen)
237 return 1;
238
239 if (blen == qlen)
240 return strncasecmp(base, query, qlen);
241
242 /*
243 * If the base string string is shorter than the query, allow the
244 * tail of the base to match the same length tail of the query *if*:
245 * - the base string starts with a '*' (*cnn.com)
246 * - the base string represents a domain (.cnn.com)
247 * as otherwise it would not be possible to block just "cnn.com"
248 * without also impacting "foocnn.com", etc.
249 */
250 if (*base == '*') {
251 base++;
252 blen--;
253 } else if (*base != '.')
254 return 1;
255
256 return strncasecmp(base, query + qlen - blen, blen);
257}
258
259
260int
261ipf_p_dns_get_name(ipf_dns_softc_t *softd, char *start, int len, char *buffer,
262 int buflen)
263{
264 char *s, *t, clen;
265 int slen, blen;
266
267 s = start;
268 t = buffer;
269 slen = len;
270 blen = buflen - 1; /* Always make room for trailing \0 */
271
272 while (*s != '\0') {
273 clen = *s;
274 if ((clen & 0xc0) == 0xc0) { /* Doesn't do compression */
275 softd->ipf_p_dns_compress++;
276 return 0;
277 }
278 if (clen > slen) {
279 softd->ipf_p_dns_toolong++;
280 return 0; /* Does the name run off the end? */
281 }
282 if ((clen + 1) > blen) {
283 softd->ipf_p_dns_nospace++;
284 return 0; /* Enough room for name+.? */
285 }
286 s++;
287 bcopy(s, t, clen);
288 t += clen;
289 s += clen;
290 *t++ = '.';
291 slen -= clen;
292 blen -= (clen + 1);
293 }
294
295 *(t - 1) = '\0';
296 return s - start;
297}
298
299
300int
301ipf_p_dns_allow_query(ipf_dns_softc_t *softd, dnsinfo_t *dnsi)
302{
303 ipf_dns_filter_t *idns;
304 int len;
305
306 len = strlen(dnsi->dnsi_buffer);
307
308 for (idns = softd->ipf_p_dns_list; idns != NULL; idns = idns->idns_next)
309 if (ipf_p_dns_match_names(idns, dnsi->dnsi_buffer, len) == 0)
310 return idns->idns_pass;
311 return 0;
312}
313
314
315/* ARGSUSED */
316int
317ipf_p_dns_inout(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
318{
319 ipf_dns_softc_t *softd = arg;
320 ipf_dns_hdr_t *dns;
321 dnsinfo_t *di;
322 char *data;
323 int dlen, q, rc = 0;
324
325 if (fin->fin_dlen < sizeof(*dns))
326 return APR_ERR(1);
327
328 dns = (ipf_dns_hdr_t *)((char *)fin->fin_dp + sizeof(udphdr_t));
329
330 q = dns->dns_qdcount;
331
332 data = (char *)(dns + 1);
333 dlen = fin->fin_dlen - sizeof(*dns) - sizeof(udphdr_t);
334
335 di = aps->aps_data;
336
337 READ_ENTER(&softd->ipf_p_dns_rwlock);
338 MUTEX_ENTER(&di->dnsi_lock);
339
340 for (; (dlen > 0) && (q > 0); q--) {
341 int len;
342
343 len = ipf_p_dns_get_name(softd, data, dlen, di->dnsi_buffer,
344 sizeof(di->dnsi_buffer));
345 if (len == 0) {
346 rc = 1;
347 break;
348 }
349 rc = ipf_p_dns_allow_query(softd, di);
350 if (rc != 0)
351 break;
352 data += len;
353 dlen -= len;
354 }
355 MUTEX_EXIT(&di->dnsi_lock);
356 RWLOCK_EXIT(&softd->ipf_p_dns_rwlock);
357
358 return APR_ERR(rc);
359}
360
361
362/* ARGSUSED */
363int
364ipf_p_dns_match(fr_info_t *fin, ap_session_t *aps, nat_t *nat)
365{
366 dnsinfo_t *di = aps->aps_data;
367 ipf_dns_hdr_t *dnh;
368
369 if ((fin->fin_dlen < sizeof(u_short)) || (fin->fin_flx & FI_FRAG))
370 return -1;
371
372 dnh = (ipf_dns_hdr_t *)((char *)fin->fin_dp + sizeof(udphdr_t));
373 if (((dnh->dns_id[0] << 8) | dnh->dns_id[1]) != di->dnsi_id)
374 return -1;
375 return 0;
376}
377