File: [local] / src / sbin / ipsecctl / ike.c (download)
Revision 1.84, Mon Aug 7 04:10:08 2023 UTC (9 months, 3 weeks ago) by dlg
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4, HEAD Changes since 1.83: +29 -16 lines
add support route based ipsec vpn negotiation with sec(4) via isakmpd.
this adds "interface secX" to the grammar that you can use instead
of specifying tunnel/transport modes and traffic selectors.
if you have config like "ike interface sec0 local ... peer ...",
ipsecctl will generate the right config for isakmpd to negotiate
esp tunnels for all traffic between 0.0.0.0/0 and 0.0.0.0/0. however,
this also specifies that they should be set up as interface SAs in
the kernel for use with sec(4).
this supports route-based instead of policy based ipsec encapsulation,
and allows us to more easily operate with other vendors and products
that also offer route-based vpns with opinions about the negotiated
policy that doesnt fit with the SPD.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
|
/* $OpenBSD: ike.c,v 1.84 2023/08/07 04:10:08 dlg Exp $ */
/*
* Copyright (c) 2005 Hans-Joerg Hoexer <hshoexer@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/queue.h>
#include <netinet/in.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <err.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <limits.h>
#include "ipsecctl.h"
static void ike_section_general(struct ipsec_rule *, FILE *);
static void ike_section_peer(struct ipsec_rule *, FILE *);
static void ike_section_ids(struct ipsec_rule *, FILE *);
static void ike_section_ipsec(struct ipsec_rule *, FILE *);
static int ike_section_p1(struct ipsec_rule *, FILE *);
static int ike_section_p2(struct ipsec_rule *, FILE *);
static void ike_section_p2ids(struct ipsec_rule *, FILE *);
static int ike_connect(struct ipsec_rule *, FILE *);
static int ike_gen_config(struct ipsec_rule *, FILE *);
static int ike_delete_config(struct ipsec_rule *, FILE *);
static void ike_setup_ids(struct ipsec_rule *);
int ike_print_config(struct ipsec_rule *, int);
int ike_ipsec_establish(int, struct ipsec_rule *, const char *);
#define SET "C set "
#define ADD "C add "
#define DELETE "C rms "
#define RMV "C rmv "
#define CONF_DFLT_DYNAMIC_DPD_CHECK_INTERVAL 5
#define CONF_DFLT_DYNAMIC_CHECK_INTERVAL 30
char *ike_id_types[] = {
"", "", "IPV4_ADDR", "IPV6_ADDR", "FQDN", "USER_FQDN"
};
static void
ike_section_general(struct ipsec_rule *r, FILE *fd)
{
if (r->ikemode == IKE_DYNAMIC) {
fprintf(fd, SET "[General]:Check-interval=%d force\n",
CONF_DFLT_DYNAMIC_CHECK_INTERVAL);
fprintf(fd, SET "[General]:DPD-check-interval=%d force\n",
CONF_DFLT_DYNAMIC_DPD_CHECK_INTERVAL);
}
}
static void
ike_section_peer(struct ipsec_rule *r, FILE *fd)
{
if (r->peer)
fprintf(fd, SET "[Phase 1]:%s=%s force\n", r->peer->name,
r->p1name);
else
fprintf(fd, SET "[Phase 1]:Default=%s force\n", r->p1name);
fprintf(fd, SET "[%s]:Phase=1 force\n", r->p1name);
if (r->peer)
fprintf(fd, SET "[%s]:Address=%s force\n", r->p1name,
r->peer->name);
if (r->local)
fprintf(fd, SET "[%s]:Local-address=%s force\n", r->p1name,
r->local->name);
if (r->ikeauth->type == IKE_AUTH_PSK)
fprintf(fd, SET "[%s]:Authentication=%s force\n", r->p1name,
r->ikeauth->string);
}
static void
ike_section_ids(struct ipsec_rule *r, FILE *fd)
{
char myname[HOST_NAME_MAX+1];
if (r->auth == NULL)
return;
if (r->ikemode == IKE_DYNAMIC && r->auth->srcid == NULL) {
if (gethostname(myname, sizeof(myname)) == -1)
err(1, "ike_section_ids: gethostname");
if ((r->auth->srcid = strdup(myname)) == NULL)
err(1, "ike_section_ids: strdup");
r->auth->srcid_type = ID_FQDN;
}
if (r->auth->srcid) {
fprintf(fd, SET "[%s]:ID=id-%s force\n", r->p1name,
r->auth->srcid);
fprintf(fd, SET "[id-%s]:ID-type=%s force\n", r->auth->srcid,
ike_id_types[r->auth->srcid_type]);
if (r->auth->srcid_type == ID_IPV4 ||
r->auth->srcid_type == ID_IPV6)
fprintf(fd, SET "[id-%s]:Address=%s force\n",
r->auth->srcid, r->auth->srcid);
else
fprintf(fd, SET "[id-%s]:Name=%s force\n",
r->auth->srcid, r->auth->srcid);
}
if (r->auth->dstid) {
fprintf(fd, SET "[%s]:Remote-ID=id-%s force\n", r->p1name,
r->auth->dstid);
fprintf(fd, SET "[id-%s]:ID-type=%s force\n", r->auth->dstid,
ike_id_types[r->auth->dstid_type]);
if (r->auth->dstid_type == ID_IPV4 ||
r->auth->dstid_type == ID_IPV6)
fprintf(fd, SET "[id-%s]:Address=%s force\n",
r->auth->dstid, r->auth->dstid);
else
fprintf(fd, SET "[id-%s]:Name=%s force\n",
r->auth->dstid, r->auth->dstid);
}
}
static void
ike_section_ipsec(struct ipsec_rule *r, FILE *fd)
{
fprintf(fd, SET "[%s]:Phase=2 force\n", r->p2name);
fprintf(fd, SET "[%s]:ISAKMP-peer=%s force\n", r->p2name, r->p1name);
fprintf(fd, SET "[%s]:Configuration=phase2-%s force\n", r->p2name,
r->p2name);
fprintf(fd, SET "[%s]:Local-ID=%s force\n", r->p2name, r->p2lid);
if (r->p2nid)
fprintf(fd, SET "[%s]:NAT-ID=%s force\n", r->p2name, r->p2nid);
fprintf(fd, SET "[%s]:Remote-ID=%s force\n", r->p2name, r->p2rid);
if (r->tag)
fprintf(fd, SET "[%s]:PF-Tag=%s force\n", r->p2name, r->tag);
if (r->flags & IPSEC_RULE_F_IFACE) {
fprintf(fd, SET "[%s]:Interface=%u force\n", r->p2name,
r->iface);
}
}
static int
ike_section_p2(struct ipsec_rule *r, FILE *fd)
{
char *exchange_type, *key_length, *transform, *p;
char *enc_alg, *auth_alg, *group_desc, *encap;
int needauth = 1;
int num_print = 0;
switch (r->p2ie) {
case IKE_QM:
exchange_type = "QUICK_MODE";
break;
default:
warnx("illegal phase 2 ike mode %d", r->p2ie);
return (-1);
}
fprintf(fd, SET "[phase2-%s]:EXCHANGE_TYPE=%s force\n", r->p2name,
exchange_type);
fprintf(fd, SET "[phase2-%s]:Suites=phase2-suite-%s force\n", r->p2name,
r->p2name);
fprintf(fd, SET "[phase2-suite-%s]:Protocols=phase2-protocol-%s "
"force\n", r->p2name, r->p2name);
fprintf(fd, SET "[phase2-protocol-%s]:PROTOCOL_ID=", r->p2name);
switch (r->satype) {
case IPSEC_ESP:
fprintf(fd, "IPSEC_ESP");
break;
case IPSEC_AH:
fprintf(fd, "IPSEC_AH");
break;
default:
warnx("illegal satype %d", r->satype);
return (-1);
}
fprintf(fd, " force\n");
key_length = NULL;
enc_alg = NULL;
if (r->p2xfs && r->p2xfs->encxf) {
if (r->satype == IPSEC_ESP) {
switch (r->p2xfs->encxf->id) {
case ENCXF_3DES_CBC:
enc_alg = "3DES";
break;
case ENCXF_AES:
enc_alg = "AES";
key_length = "128,128:256";
break;
case ENCXF_AES_128:
enc_alg = "AES";
key_length = "128,128:128";
break;
case ENCXF_AES_192:
enc_alg = "AES";
key_length = "192,192:192";
break;
case ENCXF_AES_256:
enc_alg = "AES";
key_length = "256,256:256";
break;
case ENCXF_AESCTR:
enc_alg = "AES_CTR";
key_length = "128,128:128";
break;
case ENCXF_AES_128_CTR:
enc_alg = "AES_CTR";
key_length = "128,128:128";
break;
case ENCXF_AES_192_CTR:
enc_alg = "AES_CTR";
key_length = "192,192:192";
break;
case ENCXF_AES_256_CTR:
enc_alg = "AES_CTR";
key_length = "256,256:256";
break;
case ENCXF_AES_128_GCM:
enc_alg = "AES_GCM_16";
key_length = "128,128:128";
needauth = 0;
break;
case ENCXF_AES_192_GCM:
enc_alg = "AES_GCM_16";
key_length = "192,192:192";
needauth = 0;
break;
case ENCXF_AES_256_GCM:
enc_alg = "AES_GCM_16";
key_length = "256,256:256";
needauth = 0;
break;
case ENCXF_AES_128_GMAC:
enc_alg = "AES_GMAC";
key_length = "128,128:128";
needauth = 0;
break;
case ENCXF_AES_192_GMAC:
enc_alg = "AES_GMAC";
key_length = "192,192:192";
needauth = 0;
break;
case ENCXF_AES_256_GMAC:
enc_alg = "AES_GMAC";
key_length = "256,256:256";
needauth = 0;
break;
case ENCXF_BLOWFISH:
enc_alg = "BLOWFISH";
key_length = "128,96:192";
break;
case ENCXF_CAST128:
enc_alg = "CAST";
break;
case ENCXF_NULL:
enc_alg = "NULL";
needauth = 0;
break;
default:
warnx("illegal transform %s",
r->p2xfs->encxf->name);
return (-1);
}
} else {
warnx("illegal transform %s", r->p2xfs->encxf->name);
return (-1);
}
} else if (r->satype == IPSEC_ESP) {
enc_alg = "AES";
key_length = "128,128:256";
}
switch (r->tmode) {
case IPSEC_TUNNEL:
encap = "TUNNEL";
break;
case IPSEC_TRANSPORT:
encap = "TRANSPORT";
break;
default:
warnx("illegal encapsulation mode %d", r->tmode);
return (-1);
}
auth_alg = NULL;
if (r->p2xfs && r->p2xfs->authxf) {
switch (r->p2xfs->authxf->id) {
case AUTHXF_HMAC_MD5:
auth_alg = "MD5";
break;
case AUTHXF_HMAC_SHA1:
auth_alg = "SHA";
break;
case AUTHXF_HMAC_RIPEMD160:
auth_alg = "RIPEMD";
break;
case AUTHXF_HMAC_SHA2_256:
auth_alg = "SHA2_256";
break;
case AUTHXF_HMAC_SHA2_384:
auth_alg = "SHA2_384";
break;
case AUTHXF_HMAC_SHA2_512:
auth_alg = "SHA2_512";
break;
default:
warnx("illegal transform %s", r->p2xfs->authxf->name);
return (-1);
}
} else if (needauth)
auth_alg = "SHA2_256";
group_desc = NULL;
if (r->p2xfs && r->p2xfs->groupxf) {
switch (r->p2xfs->groupxf->id) {
case GROUPXF_NONE:
break;
case GROUPXF_1:
group_desc = "MODP_768";
break;
case GROUPXF_2:
group_desc = "MODP_1024";
break;
case GROUPXF_5:
group_desc = "MODP_1536";
break;
case GROUPXF_14:
group_desc = "MODP_2048";
break;
case GROUPXF_15:
group_desc = "MODP_3072";
break;
case GROUPXF_16:
group_desc = "MODP_4096";
break;
case GROUPXF_17:
group_desc = "MODP_6144";
break;
case GROUPXF_18:
group_desc = "MODP_8192";
break;
case GROUPXF_19:
group_desc = "ECP_256";
break;
case GROUPXF_20:
group_desc = "ECP_384";
break;
case GROUPXF_21:
group_desc = "ECP_521";
break;
case GROUPXF_25:
group_desc = "ECP_192";
break;
case GROUPXF_26:
group_desc = "ECP_224";
break;
case GROUPXF_27:
group_desc = "BP_224";
break;
case GROUPXF_28:
group_desc = "BP_256";
break;
case GROUPXF_29:
group_desc = "BP_384";
break;
case GROUPXF_30:
group_desc = "BP_512";
break;
default:
warnx("illegal group %s", r->p2xfs->groupxf->name);
return (-1);
}
} else
group_desc = "MODP_3072";
/* the transform name must not include "," */
if (key_length && (p = strchr(key_length, ',')) != NULL)
num_print = p - key_length;
/*
* create a unique transform name, otherwise we cannot have
* multiple transforms per p2name.
*/
if (asprintf(&transform, "phase2-transform-%s-%s%.*s-%s-%s-%s",
r->p2name,
enc_alg ? enc_alg : "NONE",
num_print, key_length ? key_length : "",
auth_alg ? auth_alg : "NONE",
group_desc ? group_desc : "NONE",
encap) == -1)
errx(1, "asprintf phase2-transform");
fprintf(fd, SET "[phase2-protocol-%s]:Transforms=%s force\n",
r->p2name, transform);
fprintf(fd, SET "[%s]:TRANSFORM_ID=%s force\n", transform,
r->satype == IPSEC_AH ? auth_alg : enc_alg);
if (key_length)
fprintf(fd, SET "[%s]:KEY_LENGTH=%s force\n", transform,
key_length);
fprintf(fd, SET "[%s]:ENCAPSULATION_MODE=%s force\n", transform, encap);
if (auth_alg)
fprintf(fd, SET "[%s]:AUTHENTICATION_ALGORITHM=HMAC_%s force\n",
transform, auth_alg);
if (group_desc)
fprintf(fd, SET "[%s]:GROUP_DESCRIPTION=%s force\n", transform,
group_desc);
if (r->p2life && r->p2life->lt_seconds != -1) {
fprintf(fd, SET "[%s]:Life=%s-life force\n",
transform, transform);
fprintf(fd, SET "[%s-life]:LIFE_TYPE=SECONDS force\n",
transform);
fprintf(fd, SET "[%s-life]:LIFE_DURATION=%d force\n",
transform, r->p2life->lt_seconds);
} else
fprintf(fd, SET "[%s]:Life=LIFE_QUICK_MODE force\n",
transform);
free(transform);
return (0);
}
static int
ike_section_p1(struct ipsec_rule *r, FILE *fd)
{
char *exchange_type, *key_length, *transform, *p;
char *enc_alg, *auth_alg, *group_desc, *auth_method;
int num_print = 0;
switch (r->p1ie) {
case IKE_MM:
exchange_type = "ID_PROT";
break;
case IKE_AM:
exchange_type = "AGGRESSIVE";
break;
default:
warnx("illegal phase 1 ike mode %d", r->p1ie);
return (-1);
}
fprintf(fd, SET "[%s]:Configuration=phase1-%s force\n", r->p1name,
r->p1name);
fprintf(fd, SET "[phase1-%s]:EXCHANGE_TYPE=%s force\n", r->p1name,
exchange_type);
key_length = NULL;
if (r->p1xfs && r->p1xfs->encxf) {
switch (r->p1xfs->encxf->id) {
case ENCXF_3DES_CBC:
enc_alg = "3DES";
break;
case ENCXF_AES:
enc_alg = "AES";
key_length = "128,128:256";
break;
case ENCXF_AES_128:
enc_alg = "AES";
key_length = "128,128:128";
break;
case ENCXF_AES_192:
enc_alg = "AES";
key_length = "192,192:192";
break;
case ENCXF_AES_256:
enc_alg = "AES";
key_length = "256,256:256";
break;
case ENCXF_BLOWFISH:
enc_alg = "BLOWFISH";
key_length = "128,96:192";
break;
case ENCXF_CAST128:
enc_alg = "CAST";
break;
default:
warnx("illegal transform %s", r->p1xfs->encxf->name);
return (-1);
}
} else {
enc_alg = "AES";
key_length = "128,128:256";
}
if (r->p1xfs && r->p1xfs->authxf) {
switch (r->p1xfs->authxf->id) {
case AUTHXF_HMAC_MD5:
auth_alg = "MD5";
break;
case AUTHXF_HMAC_SHA1:
auth_alg = "SHA";
break;
case AUTHXF_HMAC_SHA2_256:
auth_alg = "SHA2_256";
break;
case AUTHXF_HMAC_SHA2_384:
auth_alg = "SHA2_384";
break;
case AUTHXF_HMAC_SHA2_512:
auth_alg = "SHA2_512";
break;
default:
warnx("illegal transform %s", r->p1xfs->authxf->name);
return (-1);
}
} else
auth_alg = "SHA";
if (r->p1xfs && r->p1xfs->groupxf) {
switch (r->p1xfs->groupxf->id) {
case GROUPXF_1:
group_desc = "MODP_768";
break;
case GROUPXF_2:
group_desc = "MODP_1024";
break;
case GROUPXF_5:
group_desc = "MODP_1536";
break;
case GROUPXF_14:
group_desc = "MODP_2048";
break;
case GROUPXF_15:
group_desc = "MODP_3072";
break;
case GROUPXF_16:
group_desc = "MODP_4096";
break;
case GROUPXF_17:
group_desc = "MODP_6144";
break;
case GROUPXF_18:
group_desc = "MODP_8192";
break;
case GROUPXF_19:
group_desc = "ECP_256";
break;
case GROUPXF_20:
group_desc = "ECP_384";
break;
case GROUPXF_21:
group_desc = "ECP_521";
break;
case GROUPXF_25:
group_desc = "ECP_192";
break;
case GROUPXF_26:
group_desc = "ECP_224";
break;
case GROUPXF_27:
group_desc = "BP_224";
break;
case GROUPXF_28:
group_desc = "BP_256";
break;
case GROUPXF_29:
group_desc = "BP_384";
break;
case GROUPXF_30:
group_desc = "BP_512";
break;
default:
warnx("illegal group %s", r->p1xfs->groupxf->name);
return (-1);
}
} else
group_desc = "MODP_3072";
switch (r->ikeauth->type) {
case IKE_AUTH_PSK:
auth_method = "PRE_SHARED";
break;
case IKE_AUTH_RSA:
auth_method = "RSA_SIG";
break;
default:
warnx("illegal authentication method %u", r->ikeauth->type);
return (-1);
}
/* the transform name must not include "," */
if (key_length && (p = strchr(key_length, ',')) != NULL)
num_print = p - key_length;
/* create unique name for transform, see also ike_section_p2() */
if (asprintf(&transform, "phase1-transform-%s-%s-%s-%s%.*s-%s",
r->p1name, auth_method, auth_alg, enc_alg,
num_print, key_length ? key_length : "",
group_desc) == -1)
errx(1, "asprintf phase1-transform");
fprintf(fd, ADD "[phase1-%s]:Transforms=%s force\n", r->p1name,
transform);
fprintf(fd, SET "[%s]:AUTHENTICATION_METHOD=%s force\n", transform,
auth_method);
fprintf(fd, SET "[%s]:HASH_ALGORITHM=%s force\n", transform, auth_alg);
fprintf(fd, SET "[%s]:ENCRYPTION_ALGORITHM=%s_CBC force\n", transform,
enc_alg);
if (key_length)
fprintf(fd, SET "[%s]:KEY_LENGTH=%s force\n", transform,
key_length);
fprintf(fd, SET "[%s]:GROUP_DESCRIPTION=%s force\n", transform,
group_desc);
if (r->p1life && r->p1life->lt_seconds != -1) {
fprintf(fd, SET "[%s]:Life=%s-life force\n",
transform, transform);
fprintf(fd, SET "[%s-life]:LIFE_TYPE=SECONDS force\n",
transform);
fprintf(fd, SET "[%s-life]:LIFE_DURATION=%d force\n",
transform, r->p1life->lt_seconds);
} else
fprintf(fd, SET "[%s]:Life=LIFE_MAIN_MODE force\n", transform);
free(transform);
return (0);
}
static void
ike_section_p2ids_net(struct ipsec_addr *iamask, sa_family_t af, char *name,
char *p2xid, FILE *fd)
{
char mask[NI_MAXHOST], *network, *p;
struct sockaddr_storage sas;
struct sockaddr *sa = (struct sockaddr *)&sas;
bzero(&sas, sizeof(struct sockaddr_storage));
bzero(mask, sizeof(mask));
sa->sa_family = af;
switch (af) {
case AF_INET:
sa->sa_len = sizeof(struct sockaddr_in);
bcopy(&iamask->ipa,
&((struct sockaddr_in *)(sa))->sin_addr,
sizeof(struct in_addr));
break;
case AF_INET6:
sa->sa_len = sizeof(struct sockaddr_in6);
bcopy(&iamask->ipa,
&((struct sockaddr_in6 *)(sa))->sin6_addr,
sizeof(struct in6_addr));
break;
}
if (getnameinfo(sa, sa->sa_len, mask, sizeof(mask), NULL, 0,
NI_NUMERICHOST))
errx(1, "could not get a numeric mask");
if ((network = strdup(name)) == NULL)
err(1, "ike_section_p2ids: strdup");
if ((p = strrchr(network, '/')) != NULL)
*p = '\0';
fprintf(fd, SET "[%s]:ID-type=IPV%d_ADDR_SUBNET force\n",
p2xid, ((af == AF_INET) ? 4 : 6));
fprintf(fd, SET "[%s]:Network=%s force\n", p2xid, network);
fprintf(fd, SET "[%s]:Netmask=%s force\n", p2xid, mask);
free(network);
}
static void
ike_section_p2ids(struct ipsec_rule *r, FILE *fd)
{
char *p;
struct ipsec_addr_wrap *src = r->src;
struct ipsec_addr_wrap *dst = r->dst;
if (src->netaddress) {
ike_section_p2ids_net(&src->mask, src->af, src->name,
r->p2lid, fd);
} else {
fprintf(fd, SET "[%s]:ID-type=IPV%d_ADDR force\n",
r->p2lid, ((src->af == AF_INET) ? 4 : 6));
if ((p = strrchr(src->name, '/')) != NULL)
*p = '\0';
fprintf(fd, SET "[%s]:Address=%s force\n", r->p2lid,
src->name);
}
if (src->srcnat && src->srcnat->netaddress) {
ike_section_p2ids_net(&src->srcnat->mask, src->af, src->srcnat->name,
r->p2nid, fd);
} else if (src->srcnat) {
fprintf(fd, SET "[%s]:ID-type=IPV%d_ADDR force\n",
r->p2nid, ((src->af == AF_INET) ? 4 : 6));
if ((p = strrchr(src->srcnat->name, '/')) != NULL)
*p = '\0';
fprintf(fd, SET "[%s]:Address=%s force\n", r->p2nid,
src->srcnat->name);
}
if (dst->netaddress) {
ike_section_p2ids_net(&dst->mask, dst->af, dst->name,
r->p2rid, fd);
} else {
fprintf(fd, SET "[%s]:ID-type=IPV%d_ADDR force\n",
r->p2rid, ((dst->af == AF_INET) ? 4 : 6));
if ((p = strrchr(dst->name, '/')) != NULL)
*p = '\0';
fprintf(fd, SET "[%s]:Address=%s force\n", r->p2rid,
dst->name);
}
if (r->proto) {
fprintf(fd, SET "[%s]:Protocol=%d force\n",
r->p2lid, r->proto);
fprintf(fd, SET "[%s]:Protocol=%d force\n",
r->p2rid, r->proto);
}
if (r->sport)
fprintf(fd, SET "[%s]:Port=%d force\n", r->p2lid,
ntohs(r->sport));
if (r->dport)
fprintf(fd, SET "[%s]:Port=%d force\n", r->p2rid,
ntohs(r->dport));
}
static int
ike_connect(struct ipsec_rule *r, FILE *fd)
{
switch (r->ikemode) {
case IKE_ACTIVE:
case IKE_DYNAMIC:
fprintf(fd, ADD "[Phase 2]:Connections=%s\n", r->p2name);
break;
case IKE_PASSIVE:
fprintf(fd, ADD "[Phase 2]:Passive-Connections=%s\n",
r->p2name);
break;
default:
return (-1);
}
return (0);
}
static int
ike_gen_config(struct ipsec_rule *r, FILE *fd)
{
ike_setup_ids(r);
ike_section_general(r, fd);
ike_section_peer(r, fd);
if (ike_section_p1(r, fd) == -1) {
return (-1);
}
ike_section_ids(r, fd);
ike_section_ipsec(r, fd);
if (ike_section_p2(r, fd) == -1) {
return (-1);
}
ike_section_p2ids(r, fd);
if (ike_connect(r, fd) == -1)
return (-1);
return (0);
}
static int
ike_delete_config(struct ipsec_rule *r, FILE *fd)
{
ike_setup_ids(r);
#if 0
switch (r->ikemode) {
case IKE_ACTIVE:
case IKE_DYNAMIC:
fprintf(fd, "t %s\n", r->p2name);
break;
case IKE_PASSIVE:
fprintf(fd, DELETE "[Phase 2]\n");
fprintf(fd, "t %s\n", r->p2name);
break;
default:
return (-1);
}
if (r->peer) {
fprintf(fd, DELETE "[%s]\n", r->p1name);
fprintf(fd, DELETE "[phase1-%s]\n", r->p1name);
}
if (r->auth) {
if (r->auth->srcid)
fprintf(fd, DELETE "[%s-ID]\n", r->auth->srcid);
if (r->auth->dstid)
fprintf(fd, DELETE "[%s-ID]\n", r->auth->dstid);
}
fprintf(fd, DELETE "[%s]\n", r->p2name);
fprintf(fd, DELETE "[phase2-%s]\n", r->p2name);
fprintf(fd, DELETE "[%s]\n", r->p2lid);
fprintf(fd, DELETE "[%s]\n", r->p2rid);
#else
fprintf(fd, "t %s\n", r->p2name);
switch (r->ikemode) {
case IKE_ACTIVE:
case IKE_DYNAMIC:
fprintf(fd, RMV "[Phase 2]:Connections=%s\n", r->p2name);
break;
case IKE_PASSIVE:
fprintf(fd, RMV "[Phase 2]:Passive-Connections=%s\n",
r->p2name);
break;
default:
return (-1);
}
fprintf(fd, DELETE "[%s]\n", r->p2name);
fprintf(fd, DELETE "[phase2-%s]\n", r->p2name);
#endif
return (0);
}
static void
ike_setup_ids(struct ipsec_rule *r)
{
char sproto[10], ssport[10], sdport[10];
/* phase 1 name is peer and local address */
if (r->peer) {
if (r->local) {
/* peer-dstaddr-local-srcaddr */
if (asprintf(&r->p1name, "peer-%s-local-%s",
r->peer->name, r->local->name) == -1)
err(1, "ike_setup_ids");
} else
/* peer-dstaddr */
if (asprintf(&r->p1name, "peer-%s",
r->peer->name) == -1)
err(1, "ike_setup_ids");
} else
if ((r->p1name = strdup("peer-default")) == NULL)
err(1, "ike_setup_ids");
/* Phase 2 name is from and to network, protocol, port*/
if (r->flags & IPSEC_RULE_F_IFACE) {
if (asprintf(&r->p2lid, "from-sec%u", r->iface) == -1)
err(1, "ike_setup_ids");
if (asprintf(&r->p2rid, "to-sec%u", r->iface) == -1)
err(1, "ike_setup_ids");
} else {
sproto[0] = ssport[0] = sdport[0] = 0;
if (r->proto)
snprintf(sproto, sizeof sproto, "=%u", r->proto);
if (r->sport)
snprintf(ssport, sizeof ssport, ":%u", ntohs(r->sport));
if (r->dport)
snprintf(sdport, sizeof sdport, ":%u", ntohs(r->dport));
/* from-network/masklen=proto:port */
if (asprintf(&r->p2lid, "from-%s%s%s", r->src->name,
sproto, ssport) == -1)
err(1, "ike_setup_ids");
/* to-network/masklen=proto:port */
if (asprintf(&r->p2rid, "to-%s%s%s", r->dst->name,
sproto, sdport) == -1)
err(1, "ike_setup_ids");
}
/* from-network/masklen=proto:port-to-network/masklen=proto:port */
if (asprintf(&r->p2name, "%s-%s", r->p2lid , r->p2rid) == -1)
err(1, "ike_setup_ids");
/* nat-network/masklen=proto:port */
if (r->src->srcnat && r->src->srcnat->name) {
if (asprintf(&r->p2nid, "nat-%s%s%s", r->src->srcnat->name, sproto,
ssport) == -1)
err(1, "ike_setup_ids");
}
}
int
ike_print_config(struct ipsec_rule *r, int opts)
{
if (opts & IPSECCTL_OPT_DELETE)
return (ike_delete_config(r, stdout));
else
return (ike_gen_config(r, stdout));
}
int
ike_ipsec_establish(int action, struct ipsec_rule *r, const char *fifo)
{
struct stat sb;
FILE *fdp;
int fd, ret = 0;
if ((fd = open(fifo, O_WRONLY)) == -1)
err(1, "ike_ipsec_establish: open(%s)", fifo);
if (fstat(fd, &sb) == -1)
err(1, "ike_ipsec_establish: fstat(%s)", fifo);
if (!S_ISFIFO(sb.st_mode))
errx(1, "ike_ipsec_establish: %s not a fifo", fifo);
if ((fdp = fdopen(fd, "w")) == NULL)
err(1, "ike_ipsec_establish: fdopen(%s)", fifo);
switch (action) {
case ACTION_ADD:
ret = ike_gen_config(r, fdp);
break;
case ACTION_DELETE:
ret = ike_delete_config(r, fdp);
break;
default:
ret = -1;
}
fclose(fdp);
return (ret);
}