xref: /freebsd/sbin/natd/natd.c (revision a0ee8cc6)
1 /*
2  * natd - Network Address Translation Daemon for FreeBSD.
3  *
4  * This software is provided free of charge, with no
5  * warranty of any kind, either expressed or implied.
6  * Use at your own risk.
7  *
8  * You may copy, modify and distribute this software (natd.c) freely.
9  *
10  * Ari Suutari <suutari@iki.fi>
11  */
12 
13 #include <sys/cdefs.h>
14 __FBSDID("$FreeBSD$");
15 
16 #define SYSLOG_NAMES
17 
18 #include <sys/types.h>
19 #include <sys/socket.h>
20 #include <sys/sysctl.h>
21 #include <sys/time.h>
22 #include <sys/queue.h>
23 
24 #include <netinet/in.h>
25 #include <netinet/in_systm.h>
26 #include <netinet/ip.h>
27 #include <machine/in_cksum.h>
28 #include <netinet/tcp.h>
29 #include <netinet/udp.h>
30 #include <netinet/ip_icmp.h>
31 #include <net/if.h>
32 #include <net/if_dl.h>
33 #include <net/route.h>
34 #include <arpa/inet.h>
35 
36 #include <alias.h>
37 #include <ctype.h>
38 #include <err.h>
39 #include <errno.h>
40 #include <netdb.h>
41 #include <signal.h>
42 #include <stdio.h>
43 #include <stdlib.h>
44 #include <string.h>
45 #include <syslog.h>
46 #include <unistd.h>
47 
48 #include "natd.h"
49 
50 struct instance {
51 	const char		*name;
52 	struct libalias		*la;
53 	LIST_ENTRY(instance)	list;
54 
55 	int			ifIndex;
56 	int			assignAliasAddr;
57 	char*			ifName;
58 	int			logDropped;
59 	u_short			inPort;
60 	u_short			outPort;
61 	u_short			inOutPort;
62 	struct in_addr		aliasAddr;
63 	int			ifMTU;
64 	int			aliasOverhead;
65 	int			dropIgnoredIncoming;
66 	int			divertIn;
67 	int			divertOut;
68 	int			divertInOut;
69 };
70 
71 static LIST_HEAD(, instance) root = LIST_HEAD_INITIALIZER(root);
72 
73 struct libalias *mla;
74 static struct instance *mip;
75 static int ninstance = 1;
76 
77 /*
78  * Default values for input and output
79  * divert socket ports.
80  */
81 
82 #define	DEFAULT_SERVICE	"natd"
83 
84 /*
85  * Definition of a port range, and macros to deal with values.
86  * FORMAT:  HI 16-bits == first port in range, 0 == all ports.
87  *          LO 16-bits == number of ports in range
88  * NOTES:   - Port values are not stored in network byte order.
89  */
90 
91 typedef u_long port_range;
92 
93 #define GETLOPORT(x)     ((x) >> 0x10)
94 #define GETNUMPORTS(x)   ((x) & 0x0000ffff)
95 #define GETHIPORT(x)     (GETLOPORT((x)) + GETNUMPORTS((x)))
96 
97 /* Set y to be the low-port value in port_range variable x. */
98 #define SETLOPORT(x,y)   ((x) = ((x) & 0x0000ffff) | ((y) << 0x10))
99 
100 /* Set y to be the number of ports in port_range variable x. */
101 #define SETNUMPORTS(x,y) ((x) = ((x) & 0xffff0000) | (y))
102 
103 /*
104  * Function prototypes.
105  */
106 
107 static void	DoAliasing (int fd, int direction);
108 static void	DaemonMode (void);
109 static void	HandleRoutingInfo (int fd);
110 static void	Usage (void);
111 static char*	FormatPacket (struct ip*);
112 static void	PrintPacket (struct ip*);
113 static void	SyslogPacket (struct ip*, int priority, const char *label);
114 static int	SetAliasAddressFromIfName (const char *ifName);
115 static void	InitiateShutdown (int);
116 static void	Shutdown (int);
117 static void	RefreshAddr (int);
118 static void	ParseOption (const char* option, const char* parms);
119 static void	ReadConfigFile (const char* fileName);
120 static void	SetupPortRedirect (const char* parms);
121 static void	SetupProtoRedirect(const char* parms);
122 static void	SetupAddressRedirect (const char* parms);
123 static void	StrToAddr (const char* str, struct in_addr* addr);
124 static u_short  StrToPort (const char* str, const char* proto);
125 static int      StrToPortRange (const char* str, const char* proto, port_range *portRange);
126 static int 	StrToProto (const char* str);
127 static int      StrToAddrAndPortRange (char* str, struct in_addr* addr, char* proto, port_range *portRange);
128 static void	ParseArgs (int argc, char** argv);
129 static void	SetupPunchFW(const char *strValue);
130 static void	SetupSkinnyPort(const char *strValue);
131 static void	NewInstance(const char *name);
132 static void	DoGlobal (int fd);
133 static int	CheckIpfwRulenum(unsigned int rnum);
134 
135 /*
136  * Globals.
137  */
138 
139 static	int			verbose;
140 static 	int			background;
141 static	int			running;
142 static	int			logFacility;
143 
144 static 	int			dynamicMode;
145 static 	int			icmpSock;
146 static	int			logIpfwDenied;
147 static	const char*		pidName;
148 static	int			routeSock;
149 static	int			globalPort;
150 static	int			divertGlobal;
151 static	int			exitDelay;
152 
153 
154 int main (int argc, char** argv)
155 {
156 	struct sockaddr_in	addr;
157 	fd_set			readMask;
158 	int			fdMax;
159 	int			rval;
160 /*
161  * Initialize packet aliasing software.
162  * Done already here to be able to alter option bits
163  * during command line and configuration file processing.
164  */
165 	NewInstance("default");
166 
167 /*
168  * Parse options.
169  */
170 	verbose 		= 0;
171 	background		= 0;
172 	running			= 1;
173 	dynamicMode		= 0;
174  	logFacility		= LOG_DAEMON;
175 	logIpfwDenied		= -1;
176 	pidName			= PIDFILE;
177 	routeSock 		= -1;
178 	icmpSock 		= -1;
179 	fdMax	 		= -1;
180 	divertGlobal		= -1;
181 	exitDelay		= EXIT_DELAY;
182 
183 	ParseArgs (argc, argv);
184 /*
185  * Log ipfw(8) denied packets by default in verbose mode.
186  */
187 	if (logIpfwDenied == -1)
188 		logIpfwDenied = verbose;
189 /*
190  * Open syslog channel.
191  */
192 	openlog ("natd", LOG_CONS | LOG_PID | (verbose ? LOG_PERROR : 0),
193 		 logFacility);
194 
195 	LIST_FOREACH(mip, &root, list) {
196 		mla = mip->la;
197 /*
198  * If not doing the transparent proxying only,
199  * check that valid aliasing address has been given.
200  */
201 		if (mip->aliasAddr.s_addr == INADDR_NONE && mip->ifName == NULL &&
202 		    !(LibAliasSetMode(mla, 0,0) & PKT_ALIAS_PROXY_ONLY))
203 			errx (1, "instance %s: aliasing address not given", mip->name);
204 
205 		if (mip->aliasAddr.s_addr != INADDR_NONE && mip->ifName != NULL)
206 			errx (1, "both alias address and interface "
207 				 "name are not allowed");
208 /*
209  * Check that valid port number is known.
210  */
211 		if (mip->inPort != 0 || mip->outPort != 0)
212 			if (mip->inPort == 0 || mip->outPort == 0)
213 				errx (1, "both input and output ports are required");
214 
215 		if (mip->inPort == 0 && mip->outPort == 0 && mip->inOutPort == 0)
216 			ParseOption ("port", DEFAULT_SERVICE);
217 
218 /*
219  * Check if ignored packets should be dropped.
220  */
221 		mip->dropIgnoredIncoming = LibAliasSetMode (mla, 0, 0);
222 		mip->dropIgnoredIncoming &= PKT_ALIAS_DENY_INCOMING;
223 /*
224  * Create divert sockets. Use only one socket if -p was specified
225  * on command line. Otherwise, create separate sockets for
226  * outgoing and incoming connections.
227  */
228 		if (mip->inOutPort) {
229 
230 			mip->divertInOut = socket (PF_INET, SOCK_RAW, IPPROTO_DIVERT);
231 			if (mip->divertInOut == -1)
232 				Quit ("Unable to create divert socket.");
233 			if (mip->divertInOut > fdMax)
234 				fdMax = mip->divertInOut;
235 
236 			mip->divertIn  = -1;
237 			mip->divertOut = -1;
238 /*
239  * Bind socket.
240  */
241 
242 			addr.sin_family		= AF_INET;
243 			addr.sin_addr.s_addr	= INADDR_ANY;
244 			addr.sin_port		= mip->inOutPort;
245 
246 			if (bind (mip->divertInOut,
247 				  (struct sockaddr*) &addr,
248 				  sizeof addr) == -1)
249 				Quit ("Unable to bind divert socket.");
250 		}
251 		else {
252 
253 			mip->divertIn = socket (PF_INET, SOCK_RAW, IPPROTO_DIVERT);
254 			if (mip->divertIn == -1)
255 				Quit ("Unable to create incoming divert socket.");
256 			if (mip->divertIn > fdMax)
257 				fdMax = mip->divertIn;
258 
259 
260 			mip->divertOut = socket (PF_INET, SOCK_RAW, IPPROTO_DIVERT);
261 			if (mip->divertOut == -1)
262 				Quit ("Unable to create outgoing divert socket.");
263 			if (mip->divertOut > fdMax)
264 				fdMax = mip->divertOut;
265 
266 			mip->divertInOut = -1;
267 
268 /*
269  * Bind divert sockets.
270  */
271 
272 			addr.sin_family		= AF_INET;
273 			addr.sin_addr.s_addr	= INADDR_ANY;
274 			addr.sin_port		= mip->inPort;
275 
276 			if (bind (mip->divertIn,
277 				  (struct sockaddr*) &addr,
278 				  sizeof addr) == -1)
279 				Quit ("Unable to bind incoming divert socket.");
280 
281 			addr.sin_family		= AF_INET;
282 			addr.sin_addr.s_addr	= INADDR_ANY;
283 			addr.sin_port		= mip->outPort;
284 
285 			if (bind (mip->divertOut,
286 				  (struct sockaddr*) &addr,
287 				  sizeof addr) == -1)
288 				Quit ("Unable to bind outgoing divert socket.");
289 		}
290 /*
291  * Create routing socket if interface name specified and in dynamic mode.
292  */
293 		if (mip->ifName) {
294 			if (dynamicMode) {
295 
296 				if (routeSock == -1)
297 					routeSock = socket (PF_ROUTE, SOCK_RAW, 0);
298 				if (routeSock == -1)
299 					Quit ("Unable to create routing info socket.");
300 				if (routeSock > fdMax)
301 					fdMax = routeSock;
302 
303 				mip->assignAliasAddr = 1;
304 			}
305 			else {
306 				do {
307 					rval = SetAliasAddressFromIfName (mip->ifName);
308 					if (background == 0 || dynamicMode == 0)
309 						break;
310 					if (rval == EAGAIN)
311 						sleep(1);
312 				} while (rval == EAGAIN);
313 				if (rval != 0)
314 					exit(1);
315 			}
316 		}
317 
318 	}
319 	if (globalPort) {
320 
321 		divertGlobal = socket (PF_INET, SOCK_RAW, IPPROTO_DIVERT);
322 		if (divertGlobal == -1)
323 			Quit ("Unable to create divert socket.");
324 		if (divertGlobal > fdMax)
325 			fdMax = divertGlobal;
326 
327 /*
328 * Bind socket.
329 */
330 
331 		addr.sin_family		= AF_INET;
332 		addr.sin_addr.s_addr	= INADDR_ANY;
333 		addr.sin_port		= globalPort;
334 
335 		if (bind (divertGlobal,
336 			  (struct sockaddr*) &addr,
337 			  sizeof addr) == -1)
338 			Quit ("Unable to bind global divert socket.");
339 	}
340 /*
341  * Create socket for sending ICMP messages.
342  */
343 	icmpSock = socket (AF_INET, SOCK_RAW, IPPROTO_ICMP);
344 	if (icmpSock == -1)
345 		Quit ("Unable to create ICMP socket.");
346 
347 /*
348  * And disable reads for the socket, otherwise it slowly fills
349  * up with received icmps which we do not use.
350  */
351 	shutdown(icmpSock, SHUT_RD);
352 
353 /*
354  * Become a daemon unless verbose mode was requested.
355  */
356 	if (!verbose)
357 		DaemonMode ();
358 /*
359  * Catch signals to manage shutdown and
360  * refresh of interface address.
361  */
362 	siginterrupt(SIGTERM, 1);
363 	siginterrupt(SIGHUP, 1);
364 	if (exitDelay)
365 		signal(SIGTERM, InitiateShutdown);
366 	else
367 		signal(SIGTERM, Shutdown);
368 	signal (SIGHUP, RefreshAddr);
369 /*
370  * Set alias address if it has been given.
371  */
372 	mip = LIST_FIRST(&root);	/* XXX: simon */
373 	LIST_FOREACH(mip, &root, list) {
374 		mla = mip->la;
375 		if (mip->aliasAddr.s_addr != INADDR_NONE)
376 			LibAliasSetAddress (mla, mip->aliasAddr);
377 	}
378 
379 	while (running) {
380 		mip = LIST_FIRST(&root);	/* XXX: simon */
381 
382 		if (mip->divertInOut != -1 && !mip->ifName && ninstance == 1) {
383 /*
384  * When using only one socket, just call
385  * DoAliasing repeatedly to process packets.
386  */
387 			DoAliasing (mip->divertInOut, DONT_KNOW);
388 			continue;
389 		}
390 /*
391  * Build read mask from socket descriptors to select.
392  */
393 		FD_ZERO (&readMask);
394 /*
395  * Check if new packets are available.
396  */
397 		LIST_FOREACH(mip, &root, list) {
398 			if (mip->divertIn != -1)
399 				FD_SET (mip->divertIn, &readMask);
400 
401 			if (mip->divertOut != -1)
402 				FD_SET (mip->divertOut, &readMask);
403 
404 			if (mip->divertInOut != -1)
405 				FD_SET (mip->divertInOut, &readMask);
406 		}
407 /*
408  * Routing info is processed always.
409  */
410 		if (routeSock != -1)
411 			FD_SET (routeSock, &readMask);
412 
413 		if (divertGlobal != -1)
414 			FD_SET (divertGlobal, &readMask);
415 
416 		if (select (fdMax + 1,
417 			    &readMask,
418 			    NULL,
419 			    NULL,
420 			    NULL) == -1) {
421 
422 			if (errno == EINTR)
423 				continue;
424 
425 			Quit ("Select failed.");
426 		}
427 
428 		if (divertGlobal != -1)
429 			if (FD_ISSET (divertGlobal, &readMask))
430 				DoGlobal (divertGlobal);
431 		LIST_FOREACH(mip, &root, list) {
432 			mla = mip->la;
433 			if (mip->divertIn != -1)
434 				if (FD_ISSET (mip->divertIn, &readMask))
435 					DoAliasing (mip->divertIn, INPUT);
436 
437 			if (mip->divertOut != -1)
438 				if (FD_ISSET (mip->divertOut, &readMask))
439 					DoAliasing (mip->divertOut, OUTPUT);
440 
441 			if (mip->divertInOut != -1)
442 				if (FD_ISSET (mip->divertInOut, &readMask))
443 					DoAliasing (mip->divertInOut, DONT_KNOW);
444 
445 		}
446 		if (routeSock != -1)
447 			if (FD_ISSET (routeSock, &readMask))
448 				HandleRoutingInfo (routeSock);
449 	}
450 
451 	if (background)
452 		unlink (pidName);
453 
454 	return 0;
455 }
456 
457 static void DaemonMode(void)
458 {
459 	FILE*	pidFile;
460 
461 	daemon (0, 0);
462 	background = 1;
463 
464 	pidFile = fopen (pidName, "w");
465 	if (pidFile) {
466 
467 		fprintf (pidFile, "%d\n", getpid ());
468 		fclose (pidFile);
469 	}
470 }
471 
472 static void ParseArgs (int argc, char** argv)
473 {
474 	int		arg;
475 	char*		opt;
476 	char		parmBuf[256];
477 	int		len; /* bounds checking */
478 
479 	for (arg = 1; arg < argc; arg++) {
480 
481 		opt  = argv[arg];
482 		if (*opt != '-') {
483 
484 			warnx ("invalid option %s", opt);
485 			Usage ();
486 		}
487 
488 		parmBuf[0] = '\0';
489 		len = 0;
490 
491 		while (arg < argc - 1) {
492 
493 			if (argv[arg + 1][0] == '-')
494 				break;
495 
496 			if (len) {
497 				strncat (parmBuf, " ", sizeof(parmBuf) - (len + 1));
498 				len += strlen(parmBuf + len);
499 			}
500 
501 			++arg;
502 			strncat (parmBuf, argv[arg], sizeof(parmBuf) - (len + 1));
503 			len += strlen(parmBuf + len);
504 
505 		}
506 
507 		ParseOption (opt + 1, (len ? parmBuf : NULL));
508 
509 	}
510 }
511 
512 static void DoGlobal (int fd)
513 {
514 	int			bytes;
515 	int			origBytes;
516 	char			buf[IP_MAXPACKET];
517 	struct sockaddr_in	addr;
518 	int			wrote;
519 	socklen_t		addrSize;
520 	struct ip*		ip;
521 	char			msgBuf[80];
522 
523 /*
524  * Get packet from socket.
525  */
526 	addrSize  = sizeof addr;
527 	origBytes = recvfrom (fd,
528 			      buf,
529 			      sizeof buf,
530 			      0,
531 			      (struct sockaddr*) &addr,
532 			      &addrSize);
533 
534 	if (origBytes == -1) {
535 
536 		if (errno != EINTR)
537 			Warn ("read from divert socket failed");
538 
539 		return;
540 	}
541 
542 #if 0
543 	if (mip->assignAliasAddr) {
544 		if (SetAliasAddressFromIfName (mip->ifName) != 0)
545 			exit(1);
546 		mip->assignAliasAddr = 0;
547 	}
548 #endif
549 /*
550  * This is an IP packet.
551  */
552 	ip = (struct ip*) buf;
553 
554 	if (verbose) {
555 /*
556  * Print packet direction and protocol type.
557  */
558 		printf ("Glb ");
559 
560 		switch (ip->ip_p) {
561 		case IPPROTO_TCP:
562 			printf ("[TCP]  ");
563 			break;
564 
565 		case IPPROTO_UDP:
566 			printf ("[UDP]  ");
567 			break;
568 
569 		case IPPROTO_ICMP:
570 			printf ("[ICMP] ");
571 			break;
572 
573 		default:
574 			printf ("[%d]    ", ip->ip_p);
575 			break;
576 		}
577 /*
578  * Print addresses.
579  */
580 		PrintPacket (ip);
581 	}
582 
583 	LIST_FOREACH(mip, &root, list) {
584 		mla = mip->la;
585 		if (LibAliasOutTry (mla, buf, IP_MAXPACKET, 0) != PKT_ALIAS_IGNORED)
586 			break;
587 	}
588 /*
589  * Length might have changed during aliasing.
590  */
591 	bytes = ntohs (ip->ip_len);
592 /*
593  * Update alias overhead size for outgoing packets.
594  */
595 	if (mip != NULL && bytes - origBytes > mip->aliasOverhead)
596 		mip->aliasOverhead = bytes - origBytes;
597 
598 	if (verbose) {
599 
600 /*
601  * Print addresses after aliasing.
602  */
603 		printf (" aliased to\n");
604 		printf ("           ");
605 		PrintPacket (ip);
606 		printf ("\n");
607 	}
608 
609 /*
610  * Put packet back for processing.
611  */
612 	wrote = sendto (fd,
613 		        buf,
614 	    		bytes,
615 	    		0,
616 	    		(struct sockaddr*) &addr,
617 	    		sizeof addr);
618 
619 	if (wrote != bytes) {
620 
621 		if (errno == EMSGSIZE) {
622 
623 			if (mip->ifMTU != -1)
624 				SendNeedFragIcmp (icmpSock,
625 						  (struct ip*) buf,
626 						  mip->ifMTU - mip->aliasOverhead);
627 		}
628 		else if (errno == EACCES && logIpfwDenied) {
629 
630 			sprintf (msgBuf, "failed to write packet back");
631 			Warn (msgBuf);
632 		}
633 	}
634 }
635 
636 
637 static void DoAliasing (int fd, int direction)
638 {
639 	int			bytes;
640 	int			origBytes;
641 	char			buf[IP_MAXPACKET];
642 	struct sockaddr_in	addr;
643 	int			wrote;
644 	int			status;
645 	socklen_t		addrSize;
646 	struct ip*		ip;
647 	char			msgBuf[80];
648 	int			rval;
649 
650 	if (mip->assignAliasAddr) {
651 		do {
652 			rval = SetAliasAddressFromIfName (mip->ifName);
653 			if (background == 0 || dynamicMode == 0)
654 				break;
655 			if (rval == EAGAIN)
656 				sleep(1);
657 		} while (rval == EAGAIN);
658 		if (rval != 0)
659 			exit(1);
660 		mip->assignAliasAddr = 0;
661 	}
662 /*
663  * Get packet from socket.
664  */
665 	addrSize  = sizeof addr;
666 	origBytes = recvfrom (fd,
667 			      buf,
668 			      sizeof buf,
669 			      0,
670 			      (struct sockaddr*) &addr,
671 			      &addrSize);
672 
673 	if (origBytes == -1) {
674 
675 		if (errno != EINTR)
676 			Warn ("read from divert socket failed");
677 
678 		return;
679 	}
680 /*
681  * This is an IP packet.
682  */
683 	ip = (struct ip*) buf;
684 	if (direction == DONT_KNOW) {
685 		if (addr.sin_addr.s_addr == INADDR_ANY)
686 			direction = OUTPUT;
687 		else
688 			direction = INPUT;
689 	}
690 
691 	if (verbose) {
692 /*
693  * Print packet direction and protocol type.
694  */
695 		printf (direction == OUTPUT ? "Out " : "In  ");
696 		if (ninstance > 1)
697 			printf ("{%s}", mip->name);
698 
699 		switch (ip->ip_p) {
700 		case IPPROTO_TCP:
701 			printf ("[TCP]  ");
702 			break;
703 
704 		case IPPROTO_UDP:
705 			printf ("[UDP]  ");
706 			break;
707 
708 		case IPPROTO_ICMP:
709 			printf ("[ICMP] ");
710 			break;
711 
712 		default:
713 			printf ("[%d]    ", ip->ip_p);
714 			break;
715 		}
716 /*
717  * Print addresses.
718  */
719 		PrintPacket (ip);
720 	}
721 
722 	if (direction == OUTPUT) {
723 /*
724  * Outgoing packets. Do aliasing.
725  */
726 		LibAliasOut (mla, buf, IP_MAXPACKET);
727 	}
728 	else {
729 
730 /*
731  * Do aliasing.
732  */
733 		status = LibAliasIn (mla, buf, IP_MAXPACKET);
734 		if (status == PKT_ALIAS_IGNORED &&
735 		    mip->dropIgnoredIncoming) {
736 
737 			if (verbose)
738 				printf (" dropped.\n");
739 
740 			if (mip->logDropped)
741 				SyslogPacket (ip, LOG_WARNING, "denied");
742 
743 			return;
744 		}
745 	}
746 /*
747  * Length might have changed during aliasing.
748  */
749 	bytes = ntohs (ip->ip_len);
750 /*
751  * Update alias overhead size for outgoing packets.
752  */
753 	if (direction == OUTPUT &&
754 	    bytes - origBytes > mip->aliasOverhead)
755 		mip->aliasOverhead = bytes - origBytes;
756 
757 	if (verbose) {
758 
759 /*
760  * Print addresses after aliasing.
761  */
762 		printf (" aliased to\n");
763 		printf ("           ");
764 		PrintPacket (ip);
765 		printf ("\n");
766 	}
767 
768 /*
769  * Put packet back for processing.
770  */
771 	wrote = sendto (fd,
772 		        buf,
773 	    		bytes,
774 	    		0,
775 	    		(struct sockaddr*) &addr,
776 	    		sizeof addr);
777 
778 	if (wrote != bytes) {
779 
780 		if (errno == EMSGSIZE) {
781 
782 			if (direction == OUTPUT &&
783 			    mip->ifMTU != -1)
784 				SendNeedFragIcmp (icmpSock,
785 						  (struct ip*) buf,
786 						  mip->ifMTU - mip->aliasOverhead);
787 		}
788 		else if (errno == EACCES && logIpfwDenied) {
789 
790 			sprintf (msgBuf, "failed to write packet back");
791 			Warn (msgBuf);
792 		}
793 	}
794 }
795 
796 static void HandleRoutingInfo (int fd)
797 {
798 	int			bytes;
799 	struct if_msghdr	ifMsg;
800 /*
801  * Get packet from socket.
802  */
803 	bytes = read (fd, &ifMsg, sizeof ifMsg);
804 	if (bytes == -1) {
805 
806 		Warn ("read from routing socket failed");
807 		return;
808 	}
809 
810 	if (ifMsg.ifm_version != RTM_VERSION) {
811 
812 		Warn ("unexpected packet read from routing socket");
813 		return;
814 	}
815 
816 	if (verbose)
817 		printf ("Routing message %#x received.\n", ifMsg.ifm_type);
818 
819 	if ((ifMsg.ifm_type == RTM_NEWADDR || ifMsg.ifm_type == RTM_IFINFO)) {
820 		LIST_FOREACH(mip, &root, list) {
821 			mla = mip->la;
822 			if (ifMsg.ifm_index == mip->ifIndex) {
823 				if (verbose)
824 					printf("Interface address/MTU has probably changed.\n");
825 				mip->assignAliasAddr = 1;
826 			}
827 		}
828 	}
829 }
830 
831 static void PrintPacket (struct ip* ip)
832 {
833 	printf ("%s", FormatPacket (ip));
834 }
835 
836 static void SyslogPacket (struct ip* ip, int priority, const char *label)
837 {
838 	syslog (priority, "%s %s", label, FormatPacket (ip));
839 }
840 
841 static char* FormatPacket (struct ip* ip)
842 {
843 	static char	buf[256];
844 	struct tcphdr*	tcphdr;
845 	struct udphdr*	udphdr;
846 	struct icmp*	icmphdr;
847 	char		src[20];
848 	char		dst[20];
849 
850 	strcpy (src, inet_ntoa (ip->ip_src));
851 	strcpy (dst, inet_ntoa (ip->ip_dst));
852 
853 	switch (ip->ip_p) {
854 	case IPPROTO_TCP:
855 		tcphdr = (struct tcphdr*) ((char*) ip + (ip->ip_hl << 2));
856 		sprintf (buf, "[TCP] %s:%d -> %s:%d",
857 			      src,
858 			      ntohs (tcphdr->th_sport),
859 			      dst,
860 			      ntohs (tcphdr->th_dport));
861 		break;
862 
863 	case IPPROTO_UDP:
864 		udphdr = (struct udphdr*) ((char*) ip + (ip->ip_hl << 2));
865 		sprintf (buf, "[UDP] %s:%d -> %s:%d",
866 			      src,
867 			      ntohs (udphdr->uh_sport),
868 			      dst,
869 			      ntohs (udphdr->uh_dport));
870 		break;
871 
872 	case IPPROTO_ICMP:
873 		icmphdr = (struct icmp*) ((char*) ip + (ip->ip_hl << 2));
874 		sprintf (buf, "[ICMP] %s -> %s %u(%u)",
875 			      src,
876 			      dst,
877 			      icmphdr->icmp_type,
878 			      icmphdr->icmp_code);
879 		break;
880 
881 	default:
882 		sprintf (buf, "[%d] %s -> %s ", ip->ip_p, src, dst);
883 		break;
884 	}
885 
886 	return buf;
887 }
888 
889 static int
890 SetAliasAddressFromIfName(const char *ifn)
891 {
892 	size_t needed;
893 	int mib[6];
894 	char *buf, *lim, *next;
895 	struct if_msghdr *ifm;
896 	struct ifa_msghdr *ifam;
897 	struct sockaddr_dl *sdl;
898 	struct sockaddr_in *sin;
899 
900 	mib[0] = CTL_NET;
901 	mib[1] = PF_ROUTE;
902 	mib[2] = 0;
903 	mib[3] = AF_INET;	/* Only IP addresses please */
904 	mib[4] = NET_RT_IFLIST;
905 	mib[5] = 0;		/* ifIndex??? */
906 /*
907  * Get interface data.
908  */
909 	if (sysctl(mib, 6, NULL, &needed, NULL, 0) == -1)
910 		err(1, "iflist-sysctl-estimate");
911 	if ((buf = malloc(needed)) == NULL)
912 		errx(1, "malloc failed");
913 	if (sysctl(mib, 6, buf, &needed, NULL, 0) == -1 && errno != ENOMEM)
914 		err(1, "iflist-sysctl-get");
915 	lim = buf + needed;
916 /*
917  * Loop through interfaces until one with
918  * given name is found. This is done to
919  * find correct interface index for routing
920  * message processing.
921  */
922 	mip->ifIndex	= 0;
923 	next = buf;
924 	while (next < lim) {
925 		ifm = (struct if_msghdr *)next;
926 		next += ifm->ifm_msglen;
927 		if (ifm->ifm_version != RTM_VERSION) {
928 			if (verbose)
929 				warnx("routing message version %d "
930 				      "not understood", ifm->ifm_version);
931 			continue;
932 		}
933 		if (ifm->ifm_type == RTM_IFINFO) {
934 			sdl = (struct sockaddr_dl *)(ifm + 1);
935 			if (strlen(ifn) == sdl->sdl_nlen &&
936 			    strncmp(ifn, sdl->sdl_data, sdl->sdl_nlen) == 0) {
937 				mip->ifIndex = ifm->ifm_index;
938 				mip->ifMTU = ifm->ifm_data.ifi_mtu;
939 				break;
940 			}
941 		}
942 	}
943 	if (!mip->ifIndex)
944 		errx(1, "unknown interface name %s", ifn);
945 /*
946  * Get interface address.
947  */
948 	sin = NULL;
949 	while (next < lim) {
950 		ifam = (struct ifa_msghdr *)next;
951 		next += ifam->ifam_msglen;
952 		if (ifam->ifam_version != RTM_VERSION) {
953 			if (verbose)
954 				warnx("routing message version %d "
955 				      "not understood", ifam->ifam_version);
956 			continue;
957 		}
958 		if (ifam->ifam_type != RTM_NEWADDR)
959 			break;
960 		if (ifam->ifam_addrs & RTA_IFA) {
961 			int i;
962 			char *cp = (char *)(ifam + 1);
963 
964 			for (i = 1; i < RTA_IFA; i <<= 1)
965 				if (ifam->ifam_addrs & i)
966 					cp += SA_SIZE((struct sockaddr *)cp);
967 			if (((struct sockaddr *)cp)->sa_family == AF_INET) {
968 				sin = (struct sockaddr_in *)cp;
969 				break;
970 			}
971 		}
972 	}
973 	if (sin == NULL) {
974 		warnx("%s: cannot get interface address", ifn);
975 		free(buf);
976 		return EAGAIN;
977 	}
978 
979 	LibAliasSetAddress(mla, sin->sin_addr);
980 	syslog(LOG_INFO, "Aliasing to %s, mtu %d bytes",
981 	       inet_ntoa(sin->sin_addr), mip->ifMTU);
982 
983 	free(buf);
984 
985 	return 0;
986 }
987 
988 void Quit (const char* msg)
989 {
990 	Warn (msg);
991 	exit (1);
992 }
993 
994 void Warn (const char* msg)
995 {
996 	if (background)
997 		syslog (LOG_ALERT, "%s (%m)", msg);
998 	else
999 		warn ("%s", msg);
1000 }
1001 
1002 static void RefreshAddr (int sig __unused)
1003 {
1004 	LibAliasRefreshModules();
1005 	if (mip != NULL && mip->ifName != NULL)
1006 		mip->assignAliasAddr = 1;
1007 }
1008 
1009 static void InitiateShutdown (int sig __unused)
1010 {
1011 /*
1012  * Start timer to allow kernel gracefully
1013  * shutdown existing connections when system
1014  * is shut down.
1015  */
1016 	siginterrupt(SIGALRM, 1);
1017 	signal (SIGALRM, Shutdown);
1018 	ualarm(exitDelay*1000, 1000);
1019 }
1020 
1021 static void Shutdown (int sig __unused)
1022 {
1023 	running = 0;
1024 }
1025 
1026 /*
1027  * Different options recognized by this program.
1028  */
1029 
1030 enum Option {
1031 
1032 	LibAliasOption,
1033 	Instance,
1034 	Verbose,
1035 	InPort,
1036 	OutPort,
1037 	Port,
1038 	GlobalPort,
1039 	AliasAddress,
1040 	TargetAddress,
1041 	InterfaceName,
1042 	RedirectPort,
1043 	RedirectProto,
1044 	RedirectAddress,
1045 	ConfigFile,
1046 	DynamicMode,
1047 	ProxyRule,
1048  	LogDenied,
1049  	LogFacility,
1050 	PunchFW,
1051 	SkinnyPort,
1052 	LogIpfwDenied,
1053 	PidFile,
1054 	ExitDelay
1055 };
1056 
1057 enum Param {
1058 
1059 	YesNo,
1060 	Numeric,
1061 	String,
1062 	None,
1063 	Address,
1064 	Service
1065 };
1066 
1067 /*
1068  * Option information structure (used by ParseOption).
1069  */
1070 
1071 struct OptionInfo {
1072 
1073 	enum Option		type;
1074 	int			packetAliasOpt;
1075 	enum Param		parm;
1076 	const char*		parmDescription;
1077 	const char*		description;
1078 	const char*		name;
1079 	const char*		shortName;
1080 };
1081 
1082 /*
1083  * Table of known options.
1084  */
1085 
1086 static struct OptionInfo optionTable[] = {
1087 
1088 	{ LibAliasOption,
1089 		PKT_ALIAS_UNREGISTERED_ONLY,
1090 		YesNo,
1091 		"[yes|no]",
1092 		"alias only unregistered addresses",
1093 		"unregistered_only",
1094 		"u" },
1095 
1096 	{ LibAliasOption,
1097 		PKT_ALIAS_LOG,
1098 		YesNo,
1099 		"[yes|no]",
1100 		"enable logging",
1101 		"log",
1102 		"l" },
1103 
1104 	{ LibAliasOption,
1105 		PKT_ALIAS_PROXY_ONLY,
1106 		YesNo,
1107 		"[yes|no]",
1108 		"proxy only",
1109 		"proxy_only",
1110 		NULL },
1111 
1112 	{ LibAliasOption,
1113 		PKT_ALIAS_REVERSE,
1114 		YesNo,
1115 		"[yes|no]",
1116 		"operate in reverse mode",
1117 		"reverse",
1118 		NULL },
1119 
1120 	{ LibAliasOption,
1121 		PKT_ALIAS_DENY_INCOMING,
1122 		YesNo,
1123 		"[yes|no]",
1124 		"allow incoming connections",
1125 		"deny_incoming",
1126 		"d" },
1127 
1128 	{ LibAliasOption,
1129 		PKT_ALIAS_USE_SOCKETS,
1130 		YesNo,
1131 		"[yes|no]",
1132 		"use sockets to inhibit port conflict",
1133 		"use_sockets",
1134 		"s" },
1135 
1136 	{ LibAliasOption,
1137 		PKT_ALIAS_SAME_PORTS,
1138 		YesNo,
1139 		"[yes|no]",
1140 		"try to keep original port numbers for connections",
1141 		"same_ports",
1142 		"m" },
1143 
1144 	{ Verbose,
1145 		0,
1146 		YesNo,
1147 		"[yes|no]",
1148 		"verbose mode, dump packet information",
1149 		"verbose",
1150 		"v" },
1151 
1152 	{ DynamicMode,
1153 		0,
1154 		YesNo,
1155 		"[yes|no]",
1156 		"dynamic mode, automatically detect interface address changes",
1157 		"dynamic",
1158 		NULL },
1159 
1160 	{ InPort,
1161 		0,
1162 		Service,
1163 		"number|service_name",
1164 		"set port for incoming packets",
1165 		"in_port",
1166 		"i" },
1167 
1168 	{ OutPort,
1169 		0,
1170 		Service,
1171 		"number|service_name",
1172 		"set port for outgoing packets",
1173 		"out_port",
1174 		"o" },
1175 
1176 	{ Port,
1177 		0,
1178 		Service,
1179 		"number|service_name",
1180 		"set port (defaults to natd/divert)",
1181 		"port",
1182 		"p" },
1183 
1184 	{ GlobalPort,
1185 		0,
1186 		Service,
1187 		"number|service_name",
1188 		"set globalport",
1189 		"globalport",
1190 		NULL },
1191 
1192 	{ AliasAddress,
1193 		0,
1194 		Address,
1195 		"x.x.x.x",
1196 		"address to use for aliasing",
1197 		"alias_address",
1198 		"a" },
1199 
1200 	{ TargetAddress,
1201 		0,
1202 		Address,
1203 		"x.x.x.x",
1204 		"address to use for incoming sessions",
1205 		"target_address",
1206 		"t" },
1207 
1208 	{ InterfaceName,
1209 		0,
1210 		String,
1211 	        "network_if_name",
1212 		"take aliasing address from interface",
1213 		"interface",
1214 		"n" },
1215 
1216 	{ ProxyRule,
1217 		0,
1218 		String,
1219 	        "[type encode_ip_hdr|encode_tcp_stream] port xxxx server "
1220 		"a.b.c.d:yyyy",
1221 		"add transparent proxying / destination NAT",
1222 		"proxy_rule",
1223 		NULL },
1224 
1225 	{ RedirectPort,
1226 		0,
1227 		String,
1228 	        "tcp|udp local_addr:local_port_range[,...] [public_addr:]public_port_range"
1229 	 	" [remote_addr[:remote_port_range]]",
1230 		"redirect a port (or ports) for incoming traffic",
1231 		"redirect_port",
1232 		NULL },
1233 
1234 	{ RedirectProto,
1235 		0,
1236 		String,
1237 	        "proto local_addr [public_addr] [remote_addr]",
1238 		"redirect packets of a given proto",
1239 		"redirect_proto",
1240 		NULL },
1241 
1242 	{ RedirectAddress,
1243 		0,
1244 		String,
1245 	        "local_addr[,...] public_addr",
1246 		"define mapping between local and public addresses",
1247 		"redirect_address",
1248 		NULL },
1249 
1250 	{ ConfigFile,
1251 		0,
1252 		String,
1253 		"file_name",
1254 		"read options from configuration file",
1255 		"config",
1256 		"f" },
1257 
1258 	{ LogDenied,
1259 		0,
1260 		YesNo,
1261 	        "[yes|no]",
1262 		"enable logging of denied incoming packets",
1263 		"log_denied",
1264 		NULL },
1265 
1266 	{ LogFacility,
1267 		0,
1268 		String,
1269 	        "facility",
1270 		"name of syslog facility to use for logging",
1271 		"log_facility",
1272 		NULL },
1273 
1274 	{ PunchFW,
1275 		0,
1276 		String,
1277 	        "basenumber:count",
1278 		"punch holes in the firewall for incoming FTP/IRC DCC connections",
1279 		"punch_fw",
1280 		NULL },
1281 
1282 	{ SkinnyPort,
1283 		0,
1284 		String,
1285 		"port",
1286 		"set the TCP port for use with the Skinny Station protocol",
1287 		"skinny_port",
1288 		NULL },
1289 
1290 	{ LogIpfwDenied,
1291 		0,
1292 		YesNo,
1293 	        "[yes|no]",
1294 		"log packets converted by natd, but denied by ipfw",
1295 		"log_ipfw_denied",
1296 		NULL },
1297 
1298 	{ PidFile,
1299 		0,
1300 		String,
1301 		"file_name",
1302 		"store PID in an alternate file",
1303 		"pid_file",
1304 		"P" },
1305 	{ Instance,
1306 		0,
1307 		String,
1308 		"instance name",
1309 		"name of aliasing engine instance",
1310 		"instance",
1311 		NULL },
1312 	{ ExitDelay,
1313 		0,
1314 		Numeric,
1315 		"ms",
1316 		"delay in ms before daemon exit after signal",
1317 		"exit_delay",
1318 		NULL },
1319 };
1320 
1321 static void ParseOption (const char* option, const char* parms)
1322 {
1323 	int			i;
1324 	struct OptionInfo*	info;
1325 	int			yesNoValue;
1326 	int			aliasValue;
1327 	int			numValue;
1328 	u_short			uNumValue;
1329 	const char*		strValue;
1330 	struct in_addr		addrValue;
1331 	int			max;
1332 	char*			end;
1333 	const CODE* 		fac_record = NULL;
1334 /*
1335  * Find option from table.
1336  */
1337 	max = sizeof (optionTable) / sizeof (struct OptionInfo);
1338 	for (i = 0, info = optionTable; i < max; i++, info++) {
1339 
1340 		if (!strcmp (info->name, option))
1341 			break;
1342 
1343 		if (info->shortName)
1344 			if (!strcmp (info->shortName, option))
1345 				break;
1346 	}
1347 
1348 	if (i >= max) {
1349 
1350 		warnx ("unknown option %s", option);
1351 		Usage ();
1352 	}
1353 
1354 	uNumValue	= 0;
1355 	yesNoValue	= 0;
1356 	numValue	= 0;
1357 	strValue	= NULL;
1358 /*
1359  * Check parameters.
1360  */
1361 	switch (info->parm) {
1362 	case YesNo:
1363 		if (!parms)
1364 			parms = "yes";
1365 
1366 		if (!strcmp (parms, "yes"))
1367 			yesNoValue = 1;
1368 		else
1369 			if (!strcmp (parms, "no"))
1370 				yesNoValue = 0;
1371 			else
1372 				errx (1, "%s needs yes/no parameter", option);
1373 		break;
1374 
1375 	case Service:
1376 		if (!parms)
1377 			errx (1, "%s needs service name or "
1378 				 "port number parameter",
1379 				 option);
1380 
1381 		uNumValue = StrToPort (parms, "divert");
1382 		break;
1383 
1384 	case Numeric:
1385 		if (parms)
1386 			numValue = strtol (parms, &end, 10);
1387 		else
1388 			end = NULL;
1389 
1390 		if (end == parms)
1391 			errx (1, "%s needs numeric parameter", option);
1392 		break;
1393 
1394 	case String:
1395 		strValue = parms;
1396 		if (!strValue)
1397 			errx (1, "%s needs parameter", option);
1398 		break;
1399 
1400 	case None:
1401 		if (parms)
1402 			errx (1, "%s does not take parameters", option);
1403 		break;
1404 
1405 	case Address:
1406 		if (!parms)
1407 			errx (1, "%s needs address/host parameter", option);
1408 
1409 		StrToAddr (parms, &addrValue);
1410 		break;
1411 	}
1412 
1413 	switch (info->type) {
1414 	case LibAliasOption:
1415 
1416 		aliasValue = yesNoValue ? info->packetAliasOpt : 0;
1417 		LibAliasSetMode (mla, aliasValue, info->packetAliasOpt);
1418 		break;
1419 
1420 	case Verbose:
1421 		verbose = yesNoValue;
1422 		break;
1423 
1424 	case DynamicMode:
1425 		dynamicMode = yesNoValue;
1426 		break;
1427 
1428 	case InPort:
1429 		mip->inPort = uNumValue;
1430 		break;
1431 
1432 	case OutPort:
1433 		mip->outPort = uNumValue;
1434 		break;
1435 
1436 	case Port:
1437 		mip->inOutPort = uNumValue;
1438 		break;
1439 
1440 	case GlobalPort:
1441 		globalPort = uNumValue;
1442 		break;
1443 
1444 	case AliasAddress:
1445 		memcpy (&mip->aliasAddr, &addrValue, sizeof (struct in_addr));
1446 		break;
1447 
1448 	case TargetAddress:
1449 		LibAliasSetTarget(mla, addrValue);
1450 		break;
1451 
1452 	case RedirectPort:
1453 		SetupPortRedirect (strValue);
1454 		break;
1455 
1456 	case RedirectProto:
1457 		SetupProtoRedirect(strValue);
1458 		break;
1459 
1460 	case RedirectAddress:
1461 		SetupAddressRedirect (strValue);
1462 		break;
1463 
1464 	case ProxyRule:
1465 		LibAliasProxyRule (mla, strValue);
1466 		break;
1467 
1468 	case InterfaceName:
1469 		if (mip->ifName)
1470 			free (mip->ifName);
1471 
1472 		mip->ifName = strdup (strValue);
1473 		break;
1474 
1475 	case ConfigFile:
1476 		ReadConfigFile (strValue);
1477 		break;
1478 
1479 	case LogDenied:
1480 		mip->logDropped = yesNoValue;
1481 		break;
1482 
1483 	case LogFacility:
1484 
1485 		fac_record = facilitynames;
1486 		while (fac_record->c_name != NULL) {
1487 
1488 			if (!strcmp (fac_record->c_name, strValue)) {
1489 
1490 				logFacility = fac_record->c_val;
1491 				break;
1492 
1493 			}
1494 			else
1495 				fac_record++;
1496 		}
1497 
1498 		if(fac_record->c_name == NULL)
1499 			errx(1, "Unknown log facility name: %s", strValue);
1500 
1501 		break;
1502 
1503 	case PunchFW:
1504 		SetupPunchFW(strValue);
1505 		break;
1506 
1507 	case SkinnyPort:
1508 		SetupSkinnyPort(strValue);
1509 		break;
1510 
1511 	case LogIpfwDenied:
1512 		logIpfwDenied = yesNoValue;
1513 		break;
1514 
1515 	case PidFile:
1516 		pidName = strdup (strValue);
1517 		break;
1518 	case Instance:
1519 		NewInstance(strValue);
1520 		break;
1521 	case ExitDelay:
1522 		if (numValue < 0 || numValue > MAX_EXIT_DELAY)
1523 			errx(1, "Incorrect exit delay: %d", numValue);
1524 		exitDelay = numValue;
1525 		break;
1526 	}
1527 }
1528 
1529 void ReadConfigFile (const char* fileName)
1530 {
1531 	FILE*	file;
1532 	char	*buf;
1533 	size_t	len;
1534 	char	*ptr, *p;
1535 	char*	option;
1536 
1537 	file = fopen (fileName, "r");
1538 	if (!file)
1539 		err(1, "cannot open config file %s", fileName);
1540 
1541 	while ((buf = fgetln(file, &len)) != NULL) {
1542 		if (buf[len - 1] == '\n')
1543 			buf[len - 1] = '\0';
1544 		else
1545 			errx(1, "config file format error: "
1546 				"last line should end with newline");
1547 
1548 /*
1549  * Check for comments, strip off trailing spaces.
1550  */
1551 		if ((ptr = strchr(buf, '#')))
1552 			*ptr = '\0';
1553 		for (ptr = buf; isspace(*ptr); ++ptr)
1554 			continue;
1555 		if (*ptr == '\0')
1556 			continue;
1557 		for (p = strchr(buf, '\0'); isspace(*--p);)
1558 			continue;
1559 		*++p = '\0';
1560 
1561 /*
1562  * Extract option name.
1563  */
1564 		option = ptr;
1565 		while (*ptr && !isspace (*ptr))
1566 			++ptr;
1567 
1568 		if (*ptr != '\0') {
1569 
1570 			*ptr = '\0';
1571 			++ptr;
1572 		}
1573 /*
1574  * Skip white space between name and parms.
1575  */
1576 		while (*ptr && isspace (*ptr))
1577 			++ptr;
1578 
1579 		ParseOption (option, *ptr ? ptr : NULL);
1580 	}
1581 
1582 	fclose (file);
1583 }
1584 
1585 static void Usage(void)
1586 {
1587 	int			i;
1588 	int			max;
1589 	struct OptionInfo*	info;
1590 
1591 	fprintf (stderr, "Recognized options:\n\n");
1592 
1593 	max = sizeof (optionTable) / sizeof (struct OptionInfo);
1594 	for (i = 0, info = optionTable; i < max; i++, info++) {
1595 
1596 		fprintf (stderr, "-%-20s %s\n", info->name,
1597 						info->parmDescription);
1598 
1599 		if (info->shortName)
1600 			fprintf (stderr, "-%-20s %s\n", info->shortName,
1601 							info->parmDescription);
1602 
1603 		fprintf (stderr, "      %s\n\n", info->description);
1604 	}
1605 
1606 	exit (1);
1607 }
1608 
1609 void SetupPortRedirect (const char* parms)
1610 {
1611 	char		*buf;
1612 	char*		ptr;
1613 	char*		serverPool;
1614 	struct in_addr	localAddr;
1615 	struct in_addr	publicAddr;
1616 	struct in_addr	remoteAddr;
1617 	port_range      portRange;
1618 	u_short         localPort      = 0;
1619 	u_short         publicPort     = 0;
1620 	u_short         remotePort     = 0;
1621 	u_short         numLocalPorts  = 0;
1622 	u_short         numPublicPorts = 0;
1623 	u_short         numRemotePorts = 0;
1624 	int		proto;
1625 	char*		protoName;
1626 	char*		separator;
1627 	int             i;
1628 	struct alias_link *aliaslink = NULL;
1629 
1630 	buf = strdup (parms);
1631 	if (!buf)
1632 		errx (1, "redirect_port: strdup() failed");
1633 /*
1634  * Extract protocol.
1635  */
1636 	protoName = strtok (buf, " \t");
1637 	if (!protoName)
1638 		errx (1, "redirect_port: missing protocol");
1639 
1640 	proto = StrToProto (protoName);
1641 /*
1642  * Extract local address.
1643  */
1644 	ptr = strtok (NULL, " \t");
1645 	if (!ptr)
1646 		errx (1, "redirect_port: missing local address");
1647 
1648 	separator = strchr(ptr, ',');
1649 	if (separator) {		/* LSNAT redirection syntax. */
1650 		localAddr.s_addr = INADDR_NONE;
1651 		localPort = ~0;
1652 		numLocalPorts = 1;
1653 		serverPool = ptr;
1654 	} else {
1655 		if ( StrToAddrAndPortRange (ptr, &localAddr, protoName, &portRange) != 0 )
1656 			errx (1, "redirect_port: invalid local port range");
1657 
1658 		localPort     = GETLOPORT(portRange);
1659 		numLocalPorts = GETNUMPORTS(portRange);
1660 		serverPool = NULL;
1661 	}
1662 
1663 /*
1664  * Extract public port and optionally address.
1665  */
1666 	ptr = strtok (NULL, " \t");
1667 	if (!ptr)
1668 		errx (1, "redirect_port: missing public port");
1669 
1670 	separator = strchr (ptr, ':');
1671 	if (separator) {
1672 	        if (StrToAddrAndPortRange (ptr, &publicAddr, protoName, &portRange) != 0 )
1673 		        errx (1, "redirect_port: invalid public port range");
1674 	}
1675 	else {
1676 		publicAddr.s_addr = INADDR_ANY;
1677 		if (StrToPortRange (ptr, protoName, &portRange) != 0)
1678 		        errx (1, "redirect_port: invalid public port range");
1679 	}
1680 
1681 	publicPort     = GETLOPORT(portRange);
1682 	numPublicPorts = GETNUMPORTS(portRange);
1683 
1684 /*
1685  * Extract remote address and optionally port.
1686  */
1687 	ptr = strtok (NULL, " \t");
1688 	if (ptr) {
1689 		separator = strchr (ptr, ':');
1690 		if (separator) {
1691 		        if (StrToAddrAndPortRange (ptr, &remoteAddr, protoName, &portRange) != 0)
1692 			        errx (1, "redirect_port: invalid remote port range");
1693 		} else {
1694 		        SETLOPORT(portRange, 0);
1695 			SETNUMPORTS(portRange, 1);
1696 			StrToAddr (ptr, &remoteAddr);
1697 		}
1698 	}
1699 	else {
1700 	        SETLOPORT(portRange, 0);
1701 		SETNUMPORTS(portRange, 1);
1702 		remoteAddr.s_addr = INADDR_ANY;
1703 	}
1704 
1705 	remotePort     = GETLOPORT(portRange);
1706 	numRemotePorts = GETNUMPORTS(portRange);
1707 
1708 /*
1709  * Make sure port ranges match up, then add the redirect ports.
1710  */
1711 	if (numLocalPorts != numPublicPorts)
1712 	        errx (1, "redirect_port: port ranges must be equal in size");
1713 
1714 	/* Remote port range is allowed to be '0' which means all ports. */
1715 	if (numRemotePorts != numLocalPorts && (numRemotePorts != 1 || remotePort != 0))
1716 	        errx (1, "redirect_port: remote port must be 0 or equal to local port range in size");
1717 
1718 	for (i = 0 ; i < numPublicPorts ; ++i) {
1719 	        /* If remotePort is all ports, set it to 0. */
1720 	        u_short remotePortCopy = remotePort + i;
1721 	        if (numRemotePorts == 1 && remotePort == 0)
1722 		        remotePortCopy = 0;
1723 
1724 		aliaslink = LibAliasRedirectPort (mla, localAddr,
1725 						htons(localPort + i),
1726 						remoteAddr,
1727 						htons(remotePortCopy),
1728 						publicAddr,
1729 						htons(publicPort + i),
1730 						proto);
1731 	}
1732 
1733 /*
1734  * Setup LSNAT server pool.
1735  */
1736 	if (serverPool != NULL && aliaslink != NULL) {
1737 		ptr = strtok(serverPool, ",");
1738 		while (ptr != NULL) {
1739 			if (StrToAddrAndPortRange(ptr, &localAddr, protoName, &portRange) != 0)
1740 				errx(1, "redirect_port: invalid local port range");
1741 
1742 			localPort = GETLOPORT(portRange);
1743 			if (GETNUMPORTS(portRange) != 1)
1744 				errx(1, "redirect_port: local port must be single in this context");
1745 			LibAliasAddServer(mla, aliaslink, localAddr, htons(localPort));
1746 			ptr = strtok(NULL, ",");
1747 		}
1748 	}
1749 
1750 	free (buf);
1751 }
1752 
1753 void
1754 SetupProtoRedirect(const char* parms)
1755 {
1756 	char		*buf;
1757 	char*		ptr;
1758 	struct in_addr	localAddr;
1759 	struct in_addr	publicAddr;
1760 	struct in_addr	remoteAddr;
1761 	int		proto;
1762 	char*		protoName;
1763 	struct protoent *protoent;
1764 
1765 	buf = strdup (parms);
1766 	if (!buf)
1767 		errx (1, "redirect_port: strdup() failed");
1768 /*
1769  * Extract protocol.
1770  */
1771 	protoName = strtok(buf, " \t");
1772 	if (!protoName)
1773 		errx(1, "redirect_proto: missing protocol");
1774 
1775 	protoent = getprotobyname(protoName);
1776 	if (protoent == NULL)
1777 		errx(1, "redirect_proto: unknown protocol %s", protoName);
1778 	else
1779 		proto = protoent->p_proto;
1780 /*
1781  * Extract local address.
1782  */
1783 	ptr = strtok(NULL, " \t");
1784 	if (!ptr)
1785 		errx(1, "redirect_proto: missing local address");
1786 	else
1787 		StrToAddr(ptr, &localAddr);
1788 /*
1789  * Extract optional public address.
1790  */
1791 	ptr = strtok(NULL, " \t");
1792 	if (ptr)
1793 		StrToAddr(ptr, &publicAddr);
1794 	else
1795 		publicAddr.s_addr = INADDR_ANY;
1796 /*
1797  * Extract optional remote address.
1798  */
1799 	ptr = strtok(NULL, " \t");
1800 	if (ptr)
1801 		StrToAddr(ptr, &remoteAddr);
1802 	else
1803 		remoteAddr.s_addr = INADDR_ANY;
1804 /*
1805  * Create aliasing link.
1806  */
1807 	(void)LibAliasRedirectProto(mla, localAddr, remoteAddr, publicAddr,
1808 				       proto);
1809 
1810 	free (buf);
1811 }
1812 
1813 void SetupAddressRedirect (const char* parms)
1814 {
1815 	char		*buf;
1816 	char*		ptr;
1817 	char*		separator;
1818 	struct in_addr	localAddr;
1819 	struct in_addr	publicAddr;
1820 	char*		serverPool;
1821 	struct alias_link *aliaslink;
1822 
1823 	buf = strdup (parms);
1824 	if (!buf)
1825 		errx (1, "redirect_port: strdup() failed");
1826 /*
1827  * Extract local address.
1828  */
1829 	ptr = strtok (buf, " \t");
1830 	if (!ptr)
1831 		errx (1, "redirect_address: missing local address");
1832 
1833 	separator = strchr(ptr, ',');
1834 	if (separator) {		/* LSNAT redirection syntax. */
1835 		localAddr.s_addr = INADDR_NONE;
1836 		serverPool = ptr;
1837 	} else {
1838 		StrToAddr (ptr, &localAddr);
1839 		serverPool = NULL;
1840 	}
1841 /*
1842  * Extract public address.
1843  */
1844 	ptr = strtok (NULL, " \t");
1845 	if (!ptr)
1846 		errx (1, "redirect_address: missing public address");
1847 
1848 	StrToAddr (ptr, &publicAddr);
1849 	aliaslink = LibAliasRedirectAddr(mla, localAddr, publicAddr);
1850 
1851 /*
1852  * Setup LSNAT server pool.
1853  */
1854 	if (serverPool != NULL && aliaslink != NULL) {
1855 		ptr = strtok(serverPool, ",");
1856 		while (ptr != NULL) {
1857 			StrToAddr(ptr, &localAddr);
1858 			LibAliasAddServer(mla, aliaslink, localAddr, htons(~0));
1859 			ptr = strtok(NULL, ",");
1860 		}
1861 	}
1862 
1863 	free (buf);
1864 }
1865 
1866 void StrToAddr (const char* str, struct in_addr* addr)
1867 {
1868 	struct hostent* hp;
1869 
1870 	if (inet_aton (str, addr))
1871 		return;
1872 
1873 	hp = gethostbyname (str);
1874 	if (!hp)
1875 		errx (1, "unknown host %s", str);
1876 
1877 	memcpy (addr, hp->h_addr, sizeof (struct in_addr));
1878 }
1879 
1880 u_short StrToPort (const char* str, const char* proto)
1881 {
1882 	u_short		port;
1883 	struct servent*	sp;
1884 	char*		end;
1885 
1886 	port = strtol (str, &end, 10);
1887 	if (end != str)
1888 		return htons (port);
1889 
1890 	sp = getservbyname (str, proto);
1891 	if (!sp)
1892 		errx (1, "%s/%s: unknown service", str, proto);
1893 
1894 	return sp->s_port;
1895 }
1896 
1897 int StrToPortRange (const char* str, const char* proto, port_range *portRange)
1898 {
1899 	const char*	sep;
1900 	struct servent*	sp;
1901 	char*		end;
1902 	u_short         loPort;
1903 	u_short         hiPort;
1904 
1905 	/* First see if this is a service, return corresponding port if so. */
1906 	sp = getservbyname (str,proto);
1907 	if (sp) {
1908 	        SETLOPORT(*portRange, ntohs(sp->s_port));
1909 		SETNUMPORTS(*portRange, 1);
1910 		return 0;
1911 	}
1912 
1913 	/* Not a service, see if it's a single port or port range. */
1914 	sep = strchr (str, '-');
1915 	if (sep == NULL) {
1916 	        SETLOPORT(*portRange, strtol(str, &end, 10));
1917 		if (end != str) {
1918 		        /* Single port. */
1919 		        SETNUMPORTS(*portRange, 1);
1920 			return 0;
1921 		}
1922 
1923 		/* Error in port range field. */
1924 		errx (1, "%s/%s: unknown service", str, proto);
1925 	}
1926 
1927 	/* Port range, get the values and sanity check. */
1928 	sscanf (str, "%hu-%hu", &loPort, &hiPort);
1929 	SETLOPORT(*portRange, loPort);
1930 	SETNUMPORTS(*portRange, 0);	/* Error by default */
1931 	if (loPort <= hiPort)
1932 	        SETNUMPORTS(*portRange, hiPort - loPort + 1);
1933 
1934 	if (GETNUMPORTS(*portRange) == 0)
1935 	        errx (1, "invalid port range %s", str);
1936 
1937 	return 0;
1938 }
1939 
1940 
1941 static int
1942 StrToProto (const char* str)
1943 {
1944 	if (!strcmp (str, "tcp"))
1945 		return IPPROTO_TCP;
1946 
1947 	if (!strcmp (str, "udp"))
1948 		return IPPROTO_UDP;
1949 
1950 	errx (1, "unknown protocol %s. Expected tcp or udp", str);
1951 }
1952 
1953 static int
1954 StrToAddrAndPortRange (char* str, struct in_addr* addr, char* proto, port_range *portRange)
1955 {
1956 	char*	ptr;
1957 
1958 	ptr = strchr (str, ':');
1959 	if (!ptr)
1960 		errx (1, "%s is missing port number", str);
1961 
1962 	*ptr = '\0';
1963 	++ptr;
1964 
1965 	StrToAddr (str, addr);
1966 	return StrToPortRange (ptr, proto, portRange);
1967 }
1968 
1969 static void
1970 SetupPunchFW(const char *strValue)
1971 {
1972 	unsigned int base, num;
1973 
1974 	if (sscanf(strValue, "%u:%u", &base, &num) != 2)
1975 		errx(1, "punch_fw: basenumber:count parameter required");
1976 
1977 	if (CheckIpfwRulenum(base + num - 1) == -1)
1978 		errx(1, "punch_fw: basenumber:count parameter should fit "
1979 			"the maximum allowed rule numbers");
1980 
1981 	LibAliasSetFWBase(mla, base, num);
1982 	(void)LibAliasSetMode(mla, PKT_ALIAS_PUNCH_FW, PKT_ALIAS_PUNCH_FW);
1983 }
1984 
1985 static void
1986 SetupSkinnyPort(const char *strValue)
1987 {
1988 	unsigned int port;
1989 
1990 	if (sscanf(strValue, "%u", &port) != 1)
1991 		errx(1, "skinny_port: port parameter required");
1992 
1993 	LibAliasSetSkinnyPort(mla, port);
1994 }
1995 
1996 static void
1997 NewInstance(const char *name)
1998 {
1999 	struct instance *ip;
2000 
2001 	LIST_FOREACH(ip, &root, list) {
2002 		if (!strcmp(ip->name, name)) {
2003 			mla = ip->la;
2004 			mip = ip;
2005 			return;
2006 		}
2007 	}
2008 	ninstance++;
2009 	ip = calloc(sizeof *ip, 1);
2010 	ip->name = strdup(name);
2011 	ip->la = LibAliasInit (ip->la);
2012 	ip->assignAliasAddr	= 0;
2013 	ip->ifName		= NULL;
2014  	ip->logDropped		= 0;
2015 	ip->inPort		= 0;
2016 	ip->outPort		= 0;
2017 	ip->inOutPort		= 0;
2018 	ip->aliasAddr.s_addr	= INADDR_NONE;
2019 	ip->ifMTU		= -1;
2020 	ip->aliasOverhead	= 12;
2021 	LIST_INSERT_HEAD(&root, ip, list);
2022 	mla = ip->la;
2023 	mip = ip;
2024 }
2025 
2026 static int
2027 CheckIpfwRulenum(unsigned int rnum)
2028 {
2029 	unsigned int default_rule;
2030 	size_t len = sizeof(default_rule);
2031 
2032 	if (sysctlbyname("net.inet.ip.fw.default_rule", &default_rule, &len,
2033 		NULL, 0) == -1) {
2034 		warn("Failed to get the default ipfw rule number, using "
2035 		     "default historical value 65535.  The reason was");
2036 		default_rule = 65535;
2037 	}
2038 	if (rnum >= default_rule) {
2039 		return -1;
2040 	}
2041 
2042 	return 0;
2043 }
2044