1 /*	$NetBSD: ip_dns_pxy.c,v 1.3 2012/07/22 14:27:51 darrenr Exp $	*/
2 
3 /*
4  * Copyright (C) 2012 by Darren Reed.
5  *
6  * See the IPFILTER.LICENCE file for details on licencing.
7  *
8  * Id: ip_dns_pxy.c,v 1.1.1.2 2012/07/22 13:45:10 darrenr Exp
9  */
10 
11 #define	IPF_DNS_PROXY
12 
13 /*
14  * map ... proxy port dns/udp 53 { block .cnn.com; }
15  */
16 typedef	struct	ipf_dns_filter	{
17 	struct	ipf_dns_filter	*idns_next;
18 	char			*idns_name;
19 	int			idns_namelen;
20 	int			idns_pass;
21 } ipf_dns_filter_t;
22 
23 
24 typedef struct ipf_dns_softc_s {
25 	ipf_dns_filter_t	*ipf_p_dns_list;
26 	ipfrwlock_t		ipf_p_dns_rwlock;
27 	u_long			ipf_p_dns_compress;
28 	u_long			ipf_p_dns_toolong;
29 	u_long			ipf_p_dns_nospace;
30 } ipf_dns_softc_t;
31 
32 int ipf_p_dns_allow_query(ipf_dns_softc_t *, dnsinfo_t *);
33 int ipf_p_dns_ctl(ipf_main_softc_t *, void *, ap_ctl_t *);
34 int ipf_p_dns_del(ipf_main_softc_t *, ap_session_t *);
35 int ipf_p_dns_get_name(ipf_dns_softc_t *, char *, int, char *, int);
36 int ipf_p_dns_inout(void *, fr_info_t *, ap_session_t *, nat_t *);
37 int ipf_p_dns_match(fr_info_t *, ap_session_t *, nat_t *);
38 int ipf_p_dns_match_names(ipf_dns_filter_t *, char *, int);
39 int ipf_p_dns_new(void *, fr_info_t *, ap_session_t *, nat_t *);
40 void *ipf_p_dns_soft_create(ipf_main_softc_t *);
41 void ipf_p_dns_soft_destroy(ipf_main_softc_t *, void *);
42 
43 typedef struct {
44 	u_char		dns_id[2];
45 	u_short		dns_ctlword;
46 	u_short		dns_qdcount;
47 	u_short		dns_ancount;
48 	u_short		dns_nscount;
49 	u_short		dns_arcount;
50 } ipf_dns_hdr_t;
51 
52 #define	DNS_QR(x)	((ntohs(x) & 0x8000) >> 15)
53 #define	DNS_OPCODE(x)	((ntohs(x) & 0x7800) >> 11)
54 #define	DNS_AA(x)	((ntohs(x) & 0x0400) >> 10)
55 #define	DNS_TC(x)	((ntohs(x) & 0x0200) >> 9)
56 #define	DNS_RD(x)	((ntohs(x) & 0x0100) >> 8)
57 #define	DNS_RA(x)	((ntohs(x) & 0x0080) >> 7)
58 #define	DNS_Z(x)	((ntohs(x) & 0x0070) >> 4)
59 #define	DNS_RCODE(x)	((ntohs(x) & 0x000f) >> 0)
60 
61 
62 void *
ipf_p_dns_soft_create(ipf_main_softc_t * softc)63 ipf_p_dns_soft_create(ipf_main_softc_t *softc)
64 {
65 	ipf_dns_softc_t *softd;
66 
67 	KMALLOC(softd, ipf_dns_softc_t *);
68 	if (softd == NULL)
69 		return NULL;
70 
71 	bzero((char *)softd, sizeof(*softd));
72 	RWLOCK_INIT(&softd->ipf_p_dns_rwlock, "ipf dns rwlock");
73 
74 	return softd;
75 }
76 
77 
78 void
ipf_p_dns_soft_destroy(ipf_main_softc_t * softc,void * arg)79 ipf_p_dns_soft_destroy(ipf_main_softc_t *softc, void *arg)
80 {
81 	ipf_dns_softc_t *softd = arg;
82 	ipf_dns_filter_t *idns;
83 
84 	while ((idns = softd->ipf_p_dns_list) != NULL) {
85 		KFREES(idns->idns_name, idns->idns_namelen);
86 		idns->idns_name = NULL;
87 		idns->idns_namelen = 0;
88 		softd->ipf_p_dns_list = idns->idns_next;
89 		KFREE(idns);
90 	}
91 	RW_DESTROY(&softd->ipf_p_dns_rwlock);
92 
93 	KFREE(softd);
94 }
95 
96 
97 int
ipf_p_dns_ctl(ipf_main_softc_t * softc,void * arg,ap_ctl_t * ctl)98 ipf_p_dns_ctl(ipf_main_softc_t *softc, void *arg, ap_ctl_t *ctl)
99 {
100 	ipf_dns_softc_t *softd = arg;
101 	ipf_dns_filter_t *tmp, *idns, **idnsp;
102 	int error = 0;
103 
104 	/*
105 	 * To make locking easier.
106 	 */
107 	KMALLOC(tmp, ipf_dns_filter_t *);
108 
109 	WRITE_ENTER(&softd->ipf_p_dns_rwlock);
110 	for (idnsp = &softd->ipf_p_dns_list; (idns = *idnsp) != NULL;
111 	     idnsp = &idns->idns_next) {
112 		if (idns->idns_namelen != ctl->apc_dsize)
113 			continue;
114 		if (!strncmp(ctl->apc_data, idns->idns_name,
115 		    idns->idns_namelen))
116 			break;
117 	}
118 
119 	switch (ctl->apc_cmd)
120 	{
121 	case APC_CMD_DEL :
122 		if (idns == NULL) {
123 			IPFERROR(80006);
124 			error = ESRCH;
125 			break;
126 		}
127 		*idnsp = idns->idns_next;
128 		idns->idns_next = NULL;
129 		KFREES(idns->idns_name, idns->idns_namelen);
130 		idns->idns_name = NULL;
131 		idns->idns_namelen = 0;
132 		KFREE(idns);
133 		break;
134 	case APC_CMD_ADD :
135 		if (idns != NULL) {
136 			IPFERROR(80007);
137 			error = EEXIST;
138 			break;
139 		}
140 		if (tmp == NULL) {
141 			IPFERROR(80008);
142 			error = ENOMEM;
143 			break;
144 		}
145 		idns = tmp;
146 		tmp = NULL;
147 		idns->idns_namelen = ctl->apc_dsize;
148 		idns->idns_name = ctl->apc_data;
149 		idns->idns_pass = ctl->apc_arg;
150 		idns->idns_next = NULL;
151 		*idnsp = idns;
152 		ctl->apc_data = NULL;
153 		ctl->apc_dsize = 0;
154 		break;
155 	default :
156 		IPFERROR(80009);
157 		error = EINVAL;
158 		break;
159 	}
160 	RWLOCK_EXIT(&softd->ipf_p_dns_rwlock);
161 
162 	if (tmp != NULL) {
163 		KFREE(tmp);
164 		tmp = NULL;
165 	}
166 
167 	return error;
168 }
169 
170 
171 /* ARGSUSED */
172 int
ipf_p_dns_new(void * arg,fr_info_t * fin,ap_session_t * aps,nat_t * nat)173 ipf_p_dns_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
174 {
175 	dnsinfo_t *di;
176 	int dlen;
177 
178 	if (fin->fin_v != 4)
179 		return -1;
180 
181 	dlen = fin->fin_dlen - sizeof(udphdr_t);
182 	if (dlen < sizeof(ipf_dns_hdr_t)) {
183 		/*
184 		 * No real DNS packet is smaller than that.
185 		 */
186 		return -1;
187 	}
188 
189 	aps->aps_psiz = sizeof(dnsinfo_t);
190 	KMALLOCS(di, dnsinfo_t *, sizeof(dnsinfo_t));
191 	if (di == NULL) {
192 		printf("ipf_dns_new:KMALLOCS(%zu) failed\n", sizeof(*di));
193 		return -1;
194         }
195 
196 	MUTEX_INIT(&di->dnsi_lock, "dns lock");
197 
198 	aps->aps_data = di;
199 
200 	dlen = fin->fin_dlen - sizeof(udphdr_t);
201 	COPYDATA(fin->fin_m, fin->fin_hlen + sizeof(udphdr_t),
202 		 MIN(dlen, sizeof(di->dnsi_buffer)), di->dnsi_buffer);
203 	di->dnsi_id = (di->dnsi_buffer[0] << 8) | di->dnsi_buffer[1];
204 	return 0;
205 }
206 
207 
208 /* ARGSUSED */
209 int
ipf_p_dns_del(ipf_main_softc_t * softc,ap_session_t * aps)210 ipf_p_dns_del(ipf_main_softc_t *softc, ap_session_t *aps)
211 {
212 #ifdef USE_MUTEXES
213 	dnsinfo_t *di = aps->aps_data;
214 
215 	MUTEX_DESTROY(&di->dnsi_lock);
216 #endif
217 	KFREES(aps->aps_data, aps->aps_psiz);
218 	aps->aps_data = NULL;
219 	aps->aps_psiz = 0;
220 	return 0;
221 }
222 
223 
224 /*
225  * Tries to match the base string (in our ACL) with the query from a packet.
226  */
227 int
ipf_p_dns_match_names(ipf_dns_filter_t * idns,char * query,int qlen)228 ipf_p_dns_match_names(ipf_dns_filter_t *idns, char *query, int qlen)
229 {
230 	int blen;
231 	char *base;
232 
233 	blen = idns->idns_namelen;
234 	base = idns->idns_name;
235 
236 	if (blen > qlen)
237 		return 1;
238 
239 	if (blen == qlen)
240 		return strncasecmp(base, query, qlen);
241 
242 	/*
243 	 * If the base string string is shorter than the query, allow the
244 	 * tail of the base to match the same length tail of the query *if*:
245 	 * - the base string starts with a '*' (*cnn.com)
246 	 * - the base string represents a domain (.cnn.com)
247 	 * as otherwise it would not be possible to block just "cnn.com"
248 	 * without also impacting "foocnn.com", etc.
249 	 */
250 	if (*base == '*') {
251 		base++;
252 		blen--;
253 	} else if (*base != '.')
254 		return 1;
255 
256 	return strncasecmp(base, query + qlen - blen, blen);
257 }
258 
259 
260 int
ipf_p_dns_get_name(ipf_dns_softc_t * softd,char * start,int len,char * buffer,int buflen)261 ipf_p_dns_get_name(ipf_dns_softc_t *softd, char *start, int len, char *buffer,
262     int buflen)
263 {
264 	char *s, *t, clen;
265 	int slen, blen;
266 
267 	s = start;
268 	t = buffer;
269 	slen = len;
270 	blen = buflen - 1;	/* Always make room for trailing \0 */
271 
272 	while (*s != '\0') {
273 		clen = *s;
274 		if ((clen & 0xc0) == 0xc0) {	/* Doesn't do compression */
275 			softd->ipf_p_dns_compress++;
276 			return 0;
277 		}
278 		if (clen > slen) {
279 			softd->ipf_p_dns_toolong++;
280 			return 0;	/* Does the name run off the end? */
281 		}
282 		if ((clen + 1) > blen) {
283 			softd->ipf_p_dns_nospace++;
284 			return 0;	/* Enough room for name+.? */
285 		}
286 		s++;
287 		bcopy(s, t, clen);
288 		t += clen;
289 		s += clen;
290 		*t++ = '.';
291 		slen -= clen;
292 		blen -= (clen + 1);
293 	}
294 
295 	*(t - 1) = '\0';
296 	return s - start;
297 }
298 
299 
300 int
ipf_p_dns_allow_query(ipf_dns_softc_t * softd,dnsinfo_t * dnsi)301 ipf_p_dns_allow_query(ipf_dns_softc_t *softd, dnsinfo_t *dnsi)
302 {
303 	ipf_dns_filter_t *idns;
304 	int len;
305 
306 	len = strlen(dnsi->dnsi_buffer);
307 
308 	for (idns = softd->ipf_p_dns_list; idns != NULL; idns = idns->idns_next)
309 		if (ipf_p_dns_match_names(idns, dnsi->dnsi_buffer, len) == 0)
310 			return idns->idns_pass;
311 	return 0;
312 }
313 
314 
315 /* ARGSUSED */
316 int
ipf_p_dns_inout(void * arg,fr_info_t * fin,ap_session_t * aps,nat_t * nat)317 ipf_p_dns_inout(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
318 {
319 	ipf_dns_softc_t *softd = arg;
320 	ipf_dns_hdr_t *dns;
321 	dnsinfo_t *di;
322 	char *data;
323 	int dlen, q, rc = 0;
324 
325 	if (fin->fin_dlen < sizeof(*dns))
326 		return APR_ERR(1);
327 
328 	dns = (ipf_dns_hdr_t *)((char *)fin->fin_dp + sizeof(udphdr_t));
329 
330 	q = dns->dns_qdcount;
331 
332 	data = (char *)(dns + 1);
333 	dlen = fin->fin_dlen - sizeof(*dns) - sizeof(udphdr_t);
334 
335 	di = aps->aps_data;
336 
337 	READ_ENTER(&softd->ipf_p_dns_rwlock);
338 	MUTEX_ENTER(&di->dnsi_lock);
339 
340 	for (; (dlen > 0) && (q > 0); q--) {
341 		int len;
342 
343 		len = ipf_p_dns_get_name(softd, data, dlen, di->dnsi_buffer,
344 					 sizeof(di->dnsi_buffer));
345 		if (len == 0) {
346 			rc = 1;
347 			break;
348 		}
349 		rc = ipf_p_dns_allow_query(softd, di);
350 		if (rc != 0)
351 			break;
352 		data += len;
353 		dlen -= len;
354 	}
355 	MUTEX_EXIT(&di->dnsi_lock);
356 	RWLOCK_EXIT(&softd->ipf_p_dns_rwlock);
357 
358 	return APR_ERR(rc);
359 }
360 
361 
362 /* ARGSUSED */
363 int
ipf_p_dns_match(fr_info_t * fin,ap_session_t * aps,nat_t * nat)364 ipf_p_dns_match(fr_info_t *fin, ap_session_t *aps, nat_t *nat)
365 {
366 	dnsinfo_t *di = aps->aps_data;
367 	ipf_dns_hdr_t *dnh;
368 
369 	if ((fin->fin_dlen < sizeof(u_short)) || (fin->fin_flx & FI_FRAG))
370                 return -1;
371 
372 	dnh = (ipf_dns_hdr_t *)((char *)fin->fin_dp + sizeof(udphdr_t));
373 	if (((dnh->dns_id[0] << 8) | dnh->dns_id[1]) != di->dnsi_id)
374 		return -1;
375 	return 0;
376 }
377