
Added plugin vpp-swan is a plugin that helps offloading
Strongswan IPsec ESP process from Linux Kernel to VPP.
Type: feature
Signed-off-by: Gabriel Oginski <gabrielx.oginski@intel.com>
Change-Id: Iec77945892453fac1890d3c49d7d86fc6b09c893
(cherry picked from commit 4e88e041ad
)
1752 lines
44 KiB
C
1752 lines
44 KiB
C
/*
|
|
* Copyright (c) 2022 Intel and/or its affiliates.
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <daemon.h>
|
|
#include <utils/debug.h>
|
|
#include <vlibapi/api.h>
|
|
#include <vlibmemory/api.h>
|
|
#include <vnet/ipsec/ipsec.h>
|
|
#include <vnet/vnet.h>
|
|
#include <collections/hashtable.h>
|
|
#include <threading/mutex.h>
|
|
#include <processing/jobs/callback_job.h>
|
|
#include <vpp-api/client/stat_client.h>
|
|
|
|
#define vl_typedefs
|
|
#define vl_endianfun
|
|
/* Include the (first) vlib-api API definition layer */
|
|
#include <vlibmemory/vl_memory_api_h.h>
|
|
/* Include the current layer (third) vpp API definition layer */
|
|
#include <vpp/api/vpe_types.api.h>
|
|
#include <vpp/api/vpe.api.h>
|
|
|
|
#include <vnet/ip-neighbor/ip_neighbor.api_enum.h>
|
|
#include <vnet/ip-neighbor/ip_neighbor.api_types.h>
|
|
#include <vnet/ipsec/ipsec.api_enum.h>
|
|
#include <vnet/ipsec/ipsec.api_types.h>
|
|
#include <vnet/interface.api_enum.h>
|
|
#include <vnet/interface.api_types.h>
|
|
#undef vl_typedefs
|
|
#undef vl_endianfun
|
|
|
|
#include "kernel_vpp_ipsec.h"
|
|
#include "kernel_vpp_shared.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/ioctl.h>
|
|
#include <net/if.h>
|
|
#include <net/route.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <sys/types.h>
|
|
#include <net/if_arp.h>
|
|
#include <sys/stat.h>
|
|
#include <dirent.h>
|
|
|
|
#define PRIO_BASE 384
|
|
|
|
u32 natt_port;
|
|
|
|
/**
|
|
* One and only instance of the daemon.
|
|
*/
|
|
daemon_t *charon;
|
|
|
|
typedef struct private_kernel_vpp_ipsec_t private_kernel_vpp_ipsec_t;
|
|
|
|
/**
|
|
* Private variables of kernel_vpp_ipsec class.
|
|
*/
|
|
struct private_kernel_vpp_ipsec_t
|
|
{
|
|
|
|
/**
|
|
* Public interface
|
|
*/
|
|
kernel_vpp_ipsec_t public;
|
|
|
|
/**
|
|
* Next security association database entry ID to allocate
|
|
*/
|
|
refcount_t next_sad_id;
|
|
|
|
/**
|
|
* Next security policy database entry ID to allocate
|
|
*/
|
|
refcount_t next_spd_id;
|
|
|
|
/**
|
|
* Mutex to lock access to installed policies
|
|
*/
|
|
mutex_t *mutex;
|
|
|
|
/**
|
|
* Hash table of instaled SA, as kernel_ipsec_sa_id_t => sa_t
|
|
*/
|
|
hashtable_t *sas;
|
|
|
|
/**
|
|
* Hash table of security policy databases, as nterface => spd_t
|
|
*/
|
|
hashtable_t *spds;
|
|
|
|
/**
|
|
* Linked list of installed routes
|
|
*/
|
|
linked_list_t *routes;
|
|
|
|
/**
|
|
* Next SPI to allocate
|
|
*/
|
|
refcount_t nextspi;
|
|
|
|
/**
|
|
* Mix value to distribute SPI allocation randomly
|
|
*/
|
|
uint32_t mixspi;
|
|
|
|
/**
|
|
* Whether to install routes along policies
|
|
*/
|
|
bool install_routes;
|
|
};
|
|
|
|
/**
|
|
* Security association entry
|
|
*/
|
|
typedef struct
|
|
{
|
|
/** VPP SA ID */
|
|
uint32_t sa_id;
|
|
uint32_t stat_index;
|
|
} sa_t;
|
|
|
|
/**
|
|
* Security policy database
|
|
*/
|
|
typedef struct
|
|
{
|
|
/** VPP SPD ID */
|
|
uint32_t spd_id;
|
|
/** Networking interface ID restricting policy */
|
|
uint32_t sw_if_index;
|
|
/** Policy count for this SPD */
|
|
refcount_t policy_num;
|
|
} spd_t;
|
|
|
|
/**
|
|
* Installed route
|
|
*/
|
|
typedef struct
|
|
{
|
|
/** Name of the interface the route is bound to */
|
|
char *if_name;
|
|
/** Gateway of route */
|
|
host_t *gateway;
|
|
/** Destination network of route */
|
|
host_t *dst_net;
|
|
/** Prefix length of dst_net */
|
|
uint8_t prefixlen;
|
|
/** References for route */
|
|
refcount_t refs;
|
|
} route_entry_t;
|
|
|
|
#define htonll(x) \
|
|
((1 == htonl (1)) ? \
|
|
(x) : \
|
|
((uint64_t) htonl ((x) &0xFFFFFFFF) << 32) | htonl ((x) >> 32))
|
|
#define ntohll(x) \
|
|
((1 == ntohl (1)) ? \
|
|
(x) : \
|
|
((uint64_t) ntohl ((x) &0xFFFFFFFF) << 32) | ntohl ((x) >> 32))
|
|
|
|
CALLBACK (route_equals, bool, route_entry_t *a, va_list args)
|
|
{
|
|
host_t *dst_net, *gateway;
|
|
uint8_t *prefixlen;
|
|
char *if_name;
|
|
|
|
VA_ARGS_VGET (args, if_name, gateway, dst_net, prefixlen);
|
|
|
|
return a->if_name && if_name && streq (a->if_name, if_name) &&
|
|
a->gateway->ip_equals (a->gateway, gateway) &&
|
|
a->dst_net->ip_equals (a->dst_net, dst_net) &&
|
|
a->prefixlen == *prefixlen;
|
|
}
|
|
|
|
/**
|
|
* Clean up a route entry
|
|
*/
|
|
static void
|
|
route_destroy (route_entry_t *this)
|
|
{
|
|
this->dst_net->destroy (this->dst_net);
|
|
this->gateway->destroy (this->gateway);
|
|
free (this->if_name);
|
|
free (this);
|
|
}
|
|
|
|
static uint32_t get_sw_if_index ();
|
|
|
|
static int
|
|
set_arp (char *ipStr, char *if_name, bool add)
|
|
{
|
|
char *out = NULL;
|
|
int out_len = 0;
|
|
vl_api_ip_neighbor_add_del_t *mp;
|
|
vl_api_ip_neighbor_add_del_reply_t *rmp;
|
|
int rc = SUCCESS;
|
|
uint32_t sw_if_index = ~0;
|
|
|
|
FILE *fp;
|
|
int nread = 0;
|
|
ssize_t len = 0;
|
|
char *buffer = NULL;
|
|
char buf[2][20];
|
|
char *file = "/proc/net/arp";
|
|
unsigned char mac[8] = {
|
|
0,
|
|
};
|
|
uint32_t addr;
|
|
|
|
if (if_name == NULL || ipStr == NULL)
|
|
{
|
|
DBG2 (DBG_KNL, "para is null\n");
|
|
rc = FAILED;
|
|
}
|
|
DBG2 (DBG_KNL, "from kernel read mac\n");
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
sw_if_index = get_sw_if_index (if_name);
|
|
if (sw_if_index == ~0)
|
|
{
|
|
DBG1 (DBG_KNL, "sw_if_index for %s not found", if_name);
|
|
goto error;
|
|
}
|
|
|
|
fp = fopen (file, "rb");
|
|
while ((nread = getline (&buffer, &len, fp)) != -1)
|
|
{
|
|
sscanf (buffer, "%s %*s %*s %s %*s %*s", &buf[0], &buf[1]);
|
|
inet_aton (&buf[0], &addr);
|
|
|
|
if (addr == *((u32 *) (ipStr)))
|
|
{
|
|
sscanf (buf[1], "%02x:%02x:%02x:%02x:%02x:%02x", &mac[0], &mac[1],
|
|
&mac[2], &mac[3], &mac[4], &mac[5]);
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ip_neighbor_add_del_0607c257");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = add;
|
|
memcpy (mp->neighbor.ip_address.un.ip4, (u8 *) &addr, sizeof (addr));
|
|
mp->neighbor.ip_address.af = 0;
|
|
memcpy (mp->neighbor.mac_address, mac, 6);
|
|
mp->neighbor.sw_if_index = htonl (sw_if_index);
|
|
mp->neighbor.flags = 1;
|
|
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s neighbor entry",
|
|
add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s neighbor add rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
fclose (fp);
|
|
return rc;
|
|
}
|
|
}
|
|
return rc;
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
add_Route (char *ipAddr, int len, char *mask, char *gateWay)
|
|
{
|
|
int fd;
|
|
int rc = SUCCESS;
|
|
struct sockaddr_in _sin;
|
|
struct sockaddr_in *sin = &_sin;
|
|
struct rtentry rt;
|
|
|
|
do
|
|
{
|
|
fd = socket (AF_INET, SOCK_DGRAM, 0);
|
|
if (fd < 0)
|
|
{
|
|
DBG2 (DBG_KNL, "addRoute: socket error\n");
|
|
rc = FAILED;
|
|
break;
|
|
}
|
|
memset (&rt, 0, sizeof (struct rtentry));
|
|
memset (sin, 0, sizeof (struct sockaddr_in));
|
|
sin->sin_family = AF_INET;
|
|
sin->sin_port = 0;
|
|
|
|
if (inet_aton (gateWay, &sin->sin_addr) < 0)
|
|
{
|
|
rc = FAILED;
|
|
break;
|
|
}
|
|
memcpy (&rt.rt_gateway, sin, sizeof (struct sockaddr_in));
|
|
|
|
((struct sockaddr_in *) &rt.rt_dst)->sin_family = AF_INET;
|
|
memcpy (&((struct sockaddr_in *) &rt.rt_dst)->sin_addr, ipAddr, len);
|
|
|
|
((struct sockaddr_in *) &rt.rt_genmask)->sin_family = AF_INET;
|
|
if (inet_aton (mask,
|
|
&((struct sockaddr_in *) &rt.rt_genmask)->sin_addr) < 0)
|
|
{
|
|
rc = FAILED;
|
|
break;
|
|
}
|
|
rt.rt_flags = RTF_GATEWAY;
|
|
if (ioctl (fd, SIOCADDRT, &rt) < 0)
|
|
{
|
|
rc = FAILED;
|
|
}
|
|
}
|
|
while (0);
|
|
|
|
close (fd);
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
set_address (u32 ipAddr, u32 sw_if_index, bool add)
|
|
{
|
|
char *out = NULL;
|
|
int out_len = 0;
|
|
vl_api_sw_interface_add_del_address_t *mp;
|
|
vl_api_sw_interface_add_del_address_reply_t *rmp;
|
|
|
|
int rc = SUCCESS;
|
|
|
|
uint32_t addr;
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "sw_interface_add_del_address_5463d73b");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = add;
|
|
memcpy (mp->prefix.address.un.ip4, (u8 *) &ipAddr, sizeof (ipAddr));
|
|
mp->prefix.len = 24;
|
|
mp->sw_if_index = sw_if_index;
|
|
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG2 (DBG_KNL, "vac %s neighbor entry", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG2 (DBG_KNL, "%s neighbor add rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
return rc;
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return rc;
|
|
}
|
|
|
|
/**
|
|
* (Un)-install a single route
|
|
*/
|
|
static void
|
|
manage_route (private_kernel_vpp_ipsec_t *this, bool add,
|
|
traffic_selector_t *dst_ts, host_t *src, host_t *dst)
|
|
{
|
|
host_t *dst_net, *gateway;
|
|
uint8_t prefixlen;
|
|
char *if_name;
|
|
route_entry_t *route;
|
|
bool route_exist = FALSE;
|
|
|
|
char *netmask = "255.255.255.0";
|
|
char *tap_gateway = "1.1.1.1";
|
|
int arp_rc = 0;
|
|
if (dst->is_anyaddr (dst))
|
|
{
|
|
return;
|
|
}
|
|
gateway =
|
|
charon->kernel->get_nexthop (charon->kernel, dst, -1, NULL, &if_name);
|
|
dst_ts->to_subnet (dst_ts, &dst_net, &prefixlen);
|
|
if (!if_name)
|
|
{
|
|
if (src->is_anyaddr (src))
|
|
{
|
|
return;
|
|
}
|
|
if (!charon->kernel->get_interface (charon->kernel, src, &if_name))
|
|
{
|
|
return;
|
|
}
|
|
}
|
|
route_exist =
|
|
this->routes->find_first (this->routes, route_equals, (void **) &route,
|
|
if_name, gateway, dst_net, &prefixlen);
|
|
if (add)
|
|
{
|
|
DBG2 (DBG_KNL, "installing route: %H/%d via %H dev %s", dst_net,
|
|
prefixlen, gateway, if_name);
|
|
if (route_exist)
|
|
{
|
|
unsigned int refs_num = ref_get (&route->refs);
|
|
DBG2 (DBG_KNL, "add route but it exist %d", refs_num);
|
|
}
|
|
else
|
|
{
|
|
INIT (route, .if_name = strdup (if_name),
|
|
.gateway = gateway->clone (gateway),
|
|
.dst_net = dst_net->clone (dst_net), .prefixlen = prefixlen,
|
|
.refs = 1, );
|
|
this->routes->insert_last (this->routes, route);
|
|
charon->kernel->add_route (charon->kernel,
|
|
dst_net->get_address (dst_net), prefixlen,
|
|
gateway, dst, if_name, 1);
|
|
}
|
|
|
|
add_Route (dst_net->get_address (dst_net).ptr,
|
|
dst_net->get_address (dst_net).len, netmask, tap_gateway);
|
|
|
|
arp_rc = set_arp (gateway->get_address (gateway).ptr, if_name, TRUE);
|
|
if (arp_rc)
|
|
DBG2 (DBG_KNL, "arpGet success!\n");
|
|
}
|
|
else
|
|
{
|
|
DBG2 (DBG_KNL, "uninstalling route: %H/%d via %H dev %s", dst_net,
|
|
prefixlen, gateway, if_name);
|
|
if (!route_exist)
|
|
{
|
|
DBG2 (DBG_KNL, "del route but it not exist");
|
|
return;
|
|
}
|
|
if (ref_put (&route->refs))
|
|
{
|
|
this->routes->remove (this->routes, route, NULL);
|
|
route_destroy (route);
|
|
charon->kernel->del_route (charon->kernel,
|
|
dst_net->get_address (dst_net), prefixlen,
|
|
gateway, dst, if_name, 1);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Hash function for IPsec SA
|
|
*/
|
|
static u_int
|
|
sa_hash (kernel_ipsec_sa_id_t *sa)
|
|
{
|
|
return chunk_hash_inc (
|
|
sa->src->get_address (sa->src),
|
|
chunk_hash_inc (
|
|
sa->dst->get_address (sa->dst),
|
|
chunk_hash_inc (chunk_from_thing (sa->spi),
|
|
chunk_hash (chunk_from_thing (sa->proto)))));
|
|
}
|
|
|
|
/**
|
|
* Equality function for IPsec SA
|
|
*/
|
|
static bool
|
|
sa_equals (kernel_ipsec_sa_id_t *sa, kernel_ipsec_sa_id_t *other_sa)
|
|
{
|
|
return sa->src->ip_equals (sa->src, other_sa->src) &&
|
|
sa->dst->ip_equals (sa->dst, other_sa->dst) &&
|
|
sa->spi == other_sa->spi && sa->proto == other_sa->proto;
|
|
}
|
|
|
|
/**
|
|
* Hash function for interface
|
|
*/
|
|
static u_int
|
|
interface_hash (char *interface)
|
|
{
|
|
return chunk_hash (chunk_from_str (interface));
|
|
}
|
|
|
|
/**
|
|
* Equality function for interface
|
|
*/
|
|
static bool
|
|
interface_equals (char *interface1, char *interface2)
|
|
{
|
|
return streq (interface1, interface2);
|
|
}
|
|
|
|
/**
|
|
* Map an integer x with a one-to-one function using quadratic residues
|
|
*/
|
|
static u_int
|
|
permute (u_int x, u_int p)
|
|
{
|
|
u_int qr;
|
|
|
|
x = x % p;
|
|
qr = ((uint64_t) x * x) % p;
|
|
if (x <= p / 2)
|
|
{
|
|
return qr;
|
|
}
|
|
return p - qr;
|
|
}
|
|
|
|
/**
|
|
* Initialize seeds for SPI generation
|
|
*/
|
|
static bool
|
|
init_spi (private_kernel_vpp_ipsec_t *this)
|
|
{
|
|
bool ok = TRUE;
|
|
rng_t *rng;
|
|
|
|
rng = lib->crypto->create_rng (lib->crypto, RNG_STRONG);
|
|
if (!rng)
|
|
{
|
|
return FALSE;
|
|
}
|
|
ok =
|
|
rng->get_bytes (rng, sizeof (this->nextspi), (uint8_t *) &this->nextspi);
|
|
if (ok)
|
|
{
|
|
ok =
|
|
rng->get_bytes (rng, sizeof (this->mixspi), (uint8_t *) &this->mixspi);
|
|
}
|
|
rng->destroy (rng);
|
|
return ok;
|
|
}
|
|
|
|
/**
|
|
* Calculate policy priority
|
|
*/
|
|
static uint32_t
|
|
calculate_priority (policy_priority_t policy_priority, traffic_selector_t *src,
|
|
traffic_selector_t *dst)
|
|
{
|
|
uint32_t priority = PRIO_BASE;
|
|
uint16_t port;
|
|
uint8_t mask, proto;
|
|
host_t *net;
|
|
|
|
switch (policy_priority)
|
|
{
|
|
case POLICY_PRIORITY_FALLBACK:
|
|
priority <<= 1;
|
|
/* fall-through */
|
|
case POLICY_PRIORITY_ROUTED:
|
|
priority <<= 1;
|
|
/* fall-through */
|
|
case POLICY_PRIORITY_DEFAULT:
|
|
priority <<= 1;
|
|
/* fall-through */
|
|
case POLICY_PRIORITY_PASS:
|
|
break;
|
|
}
|
|
/* calculate priority based on selector size, small size = high prio */
|
|
src->to_subnet (src, &net, &mask);
|
|
priority -= mask;
|
|
proto = src->get_protocol (src);
|
|
port = net->get_port (net);
|
|
net->destroy (net);
|
|
|
|
dst->to_subnet (dst, &net, &mask);
|
|
priority -= mask;
|
|
proto = max (proto, dst->get_protocol (dst));
|
|
port = max (port, net->get_port (net));
|
|
net->destroy (net);
|
|
|
|
priority <<= 2; /* make some room for the two flags */
|
|
priority += port ? 0 : 2;
|
|
priority += proto ? 0 : 1;
|
|
return priority;
|
|
}
|
|
|
|
/**
|
|
* Get sw_if_index from interface name
|
|
*/
|
|
static uint32_t
|
|
get_sw_if_index (char *interface)
|
|
{
|
|
char *out = NULL;
|
|
int out_len, name_filter_len = 0, msg_len = 0;
|
|
vl_api_sw_interface_dump_t *mp;
|
|
vl_api_sw_interface_details_t *rmp;
|
|
uint32_t sw_if_index = ~0;
|
|
|
|
name_filter_len = strlen (interface);
|
|
msg_len = sizeof (*mp) + name_filter_len;
|
|
mp = vl_msg_api_alloc (msg_len);
|
|
clib_memset (mp, 0, msg_len);
|
|
u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "sw_interface_dump_aa610c27");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->name_filter_valid = TRUE;
|
|
mp->name_filter.length = htonl (name_filter_len);
|
|
memcpy ((char *) mp->name_filter.buf, interface, name_filter_len);
|
|
|
|
if (vac->send (vac, (char *) mp, msg_len, &out, &out_len))
|
|
{
|
|
goto error;
|
|
}
|
|
if (!out_len)
|
|
{
|
|
goto error;
|
|
}
|
|
rmp = (vl_api_sw_interface_details_t *) out;
|
|
sw_if_index = ntohl (rmp->sw_if_index);
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return sw_if_index;
|
|
}
|
|
/**
|
|
* (Un)-install a security policy database
|
|
*/
|
|
static status_t
|
|
spd_add_del (bool add, uint32_t spd_id)
|
|
{
|
|
char *out = NULL;
|
|
int out_len;
|
|
vl_api_ipsec_spd_add_del_t *mp;
|
|
vl_api_ipsec_spd_add_del_reply_t *rmp;
|
|
status_t rv = FAILED;
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
|
|
u16 msg_id = vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_add_del_20e89a95");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = add;
|
|
mp->spd_id = htonl (spd_id);
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
rv = SUCCESS;
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return rv;
|
|
}
|
|
|
|
/**
|
|
* Enable or disable SPD on an insterface
|
|
*/
|
|
static status_t
|
|
interface_add_del_spd (bool add, uint32_t spd_id, uint32_t sw_if_index)
|
|
{
|
|
char *out = NULL;
|
|
int out_len;
|
|
vl_api_ipsec_interface_add_del_spd_t *mp;
|
|
vl_api_ipsec_interface_add_del_spd_reply_t *rmp;
|
|
status_t rv = FAILED;
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_interface_add_del_spd_80f80cbb");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = add;
|
|
mp->spd_id = htonl (spd_id);
|
|
mp->sw_if_index = htonl (sw_if_index);
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s interface SPD failed",
|
|
add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s interface SPD failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
rv = SUCCESS;
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return rv;
|
|
}
|
|
|
|
static int
|
|
bypass_all (bool add, uint32_t spd_id, uint32_t sa_id)
|
|
{
|
|
vl_api_ipsec_spd_entry_add_del_t *mp;
|
|
vl_api_ipsec_spd_entry_add_del_reply_t *rmp;
|
|
char *out = NULL;
|
|
int out_len;
|
|
status_t rv = FAILED;
|
|
|
|
DBG2 (DBG_KNL, "bypass_all [%s] spd_id %d sa_id %d", add ? "ADD" : "DEL",
|
|
spd_id, sa_id);
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411");
|
|
mp->_vl_msg_id = ntohs (msg_id);
|
|
mp->is_add = add;
|
|
mp->entry.sa_id = ntohl (sa_id);
|
|
mp->entry.spd_id = ntohl (spd_id);
|
|
mp->entry.priority = ntohl (INT_MAX - POLICY_PRIORITY_PASS - 1);
|
|
mp->entry.is_outbound = 0;
|
|
mp->entry.policy = ntohl (IPSEC_API_SPD_ACTION_BYPASS);
|
|
memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16);
|
|
memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16);
|
|
mp->entry.remote_port_start = mp->entry.local_port_start = ntohs (0);
|
|
mp->entry.remote_port_stop = mp->entry.local_port_stop = ntohs (0xFFFF);
|
|
mp->entry.protocol = IP_API_PROTO_ESP;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
mp->entry.is_outbound = 1;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
mp->entry.is_outbound = 0;
|
|
mp->entry.protocol = IP_API_PROTO_AH;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
mp->entry.is_outbound = 1;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
|
|
rv = SUCCESS;
|
|
|
|
error:
|
|
if (out)
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
|
|
return rv;
|
|
}
|
|
|
|
static int
|
|
bypass_port (bool add, uint32_t spd_id, uint32_t sa_id, uint16_t port)
|
|
{
|
|
vl_api_ipsec_spd_entry_add_del_t *mp;
|
|
vl_api_ipsec_spd_entry_add_del_reply_t *rmp;
|
|
char *out = NULL;
|
|
int out_len;
|
|
status_t rv = FAILED;
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411");
|
|
mp->_vl_msg_id = ntohs (msg_id);
|
|
mp->is_add = add;
|
|
mp->entry.sa_id = ntohl (sa_id);
|
|
mp->entry.spd_id = ntohl (spd_id);
|
|
mp->entry.priority = ntohl (INT_MAX - POLICY_PRIORITY_PASS - 1);
|
|
mp->entry.policy = ntohl (IPSEC_API_SPD_ACTION_BYPASS);
|
|
memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16);
|
|
memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16);
|
|
mp->entry.is_outbound = 0;
|
|
mp->entry.remote_port_start = mp->entry.local_port_start = ntohs (0);
|
|
mp->entry.remote_port_stop = mp->entry.local_port_stop = ntohs (0xFFFF);
|
|
mp->entry.protocol = IP_API_PROTO_HOPOPT;
|
|
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
mp->entry.is_outbound = 1;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
rv = SUCCESS;
|
|
|
|
error:
|
|
if (out)
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
|
|
return rv;
|
|
}
|
|
|
|
/**
|
|
* Add or remove a bypass policy
|
|
*/
|
|
static status_t
|
|
manage_bypass (bool add, uint32_t spd_id, uint32_t sa_id)
|
|
{
|
|
uint16_t port;
|
|
status_t rv;
|
|
|
|
bypass_all (add, spd_id, sa_id);
|
|
|
|
port =
|
|
lib->settings->get_int (lib->settings, "%s.port", IKEV2_UDP_PORT, lib->ns);
|
|
|
|
if (port)
|
|
{
|
|
rv = bypass_port (add, spd_id, sa_id, port);
|
|
if (rv != SUCCESS)
|
|
{
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
port = lib->settings->get_int (lib->settings, "%s.port_nat_t",
|
|
IKEV2_NATT_PORT, lib->ns);
|
|
if (port)
|
|
{
|
|
rv = bypass_port (add, spd_id, sa_id, port);
|
|
if (rv != SUCCESS)
|
|
{
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
return SUCCESS;
|
|
}
|
|
|
|
/**
|
|
* Add or remove a policy
|
|
*/
|
|
static status_t
|
|
manage_policy (private_kernel_vpp_ipsec_t *this, bool add,
|
|
kernel_ipsec_policy_id_t *id,
|
|
kernel_ipsec_manage_policy_t *data)
|
|
{
|
|
spd_t *spd;
|
|
char *out = NULL, *interface = NULL;
|
|
int out_len;
|
|
uint32_t sw_if_index, spd_id = ~0, sad_id = ~0;
|
|
status_t rv = FAILED;
|
|
uint32_t priority, auto_priority;
|
|
chunk_t src_from, src_to, dst_from, dst_to;
|
|
host_t *src, *dst, *addr;
|
|
vl_api_ipsec_spd_entry_add_del_t *mp;
|
|
vl_api_ipsec_spd_entry_add_del_reply_t *rmp;
|
|
bool n_spd = false;
|
|
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
|
|
this->mutex->lock (this->mutex);
|
|
if (!id->interface)
|
|
{
|
|
addr = id->dir == POLICY_IN ? data->dst : data->src;
|
|
for (int i = 0; i < 5; i++)
|
|
{
|
|
if (!charon->kernel->get_interface (charon->kernel, addr,
|
|
&interface))
|
|
{
|
|
DBG1 (DBG_KNL, "policy no interface %H", addr);
|
|
interface = NULL;
|
|
sleep (1);
|
|
}
|
|
|
|
if (interface)
|
|
{
|
|
DBG1 (DBG_KNL, "policy have interface %H", addr);
|
|
break;
|
|
}
|
|
}
|
|
if (!interface)
|
|
goto error;
|
|
id->interface = interface;
|
|
}
|
|
|
|
DBG2 (DBG_KNL, "manage policy [%s] interface [%s]", add ? "ADD" : "DEL",
|
|
id->interface);
|
|
|
|
spd = this->spds->get (this->spds, id->interface);
|
|
if (!spd)
|
|
{
|
|
if (!add)
|
|
{
|
|
DBG1 (DBG_KNL, "SPD for %s not found, should not be deleted",
|
|
id->interface);
|
|
goto error;
|
|
}
|
|
sw_if_index = get_sw_if_index (id->interface);
|
|
DBG1 (DBG_KNL, "firstly created, spd for %s found sw_if_index is %d",
|
|
id->interface, sw_if_index);
|
|
if (sw_if_index == ~0)
|
|
{
|
|
DBG1 (DBG_KNL, "sw_if_index for %s not found", id->interface);
|
|
goto error;
|
|
}
|
|
spd_id = ref_get (&this->next_spd_id);
|
|
if (spd_add_del (TRUE, spd_id))
|
|
{
|
|
DBG1 (DBG_KNL, "spd_add_del %d failed!!!!!", spd_id);
|
|
goto error;
|
|
}
|
|
if (interface_add_del_spd (TRUE, spd_id, sw_if_index))
|
|
{
|
|
DBG1 (DBG_KNL, "interface_add_del_spd %d %d failed!!!!!", spd_id,
|
|
sw_if_index);
|
|
goto error;
|
|
}
|
|
INIT (spd, .spd_id = spd_id, .sw_if_index = sw_if_index,
|
|
.policy_num = 0, );
|
|
this->spds->put (this->spds, id->interface, spd);
|
|
n_spd = true;
|
|
}
|
|
|
|
auto_priority = calculate_priority (data->prio, id->src_ts, id->dst_ts);
|
|
priority = data->manual_prio ? data->manual_prio : auto_priority;
|
|
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_spd_entry_add_del_338b7411");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = add;
|
|
mp->entry.spd_id = htonl (spd->spd_id);
|
|
mp->entry.priority = htonl (INT_MAX - POLICY_PRIORITY_PASS);
|
|
mp->entry.is_outbound = id->dir == POLICY_OUT;
|
|
switch (data->type)
|
|
{
|
|
case POLICY_IPSEC:
|
|
mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_PROTECT);
|
|
break;
|
|
case POLICY_PASS:
|
|
mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_BYPASS);
|
|
break;
|
|
case POLICY_DROP:
|
|
mp->entry.policy = htonl (IPSEC_API_SPD_ACTION_DISCARD);
|
|
break;
|
|
}
|
|
if ((data->type == POLICY_IPSEC) && data->sa)
|
|
{
|
|
kernel_ipsec_sa_id_t id = {
|
|
.src = data->src,
|
|
.dst = data->dst,
|
|
.proto = data->sa->esp.use ? IPPROTO_ESP : IPPROTO_AH,
|
|
.spi = data->sa->esp.use ? data->sa->esp.spi : data->sa->ah.spi,
|
|
};
|
|
sa_t *sa = NULL;
|
|
sa = this->sas->get (this->sas, &id);
|
|
if (!sa)
|
|
{
|
|
DBG1 (DBG_KNL, "SA ID not found");
|
|
goto error;
|
|
}
|
|
sad_id = sa->sa_id;
|
|
if (n_spd)
|
|
{
|
|
if (manage_bypass (TRUE, spd_id, ~0))
|
|
{
|
|
DBG1 (DBG_KNL, "manage_bypass %d failed!!!!", spd_id);
|
|
goto error;
|
|
}
|
|
}
|
|
}
|
|
|
|
mp->entry.sa_id = htonl (sad_id);
|
|
|
|
bool is_ipv6 = false;
|
|
if (id->src_ts->get_type (id->src_ts) == TS_IPV6_ADDR_RANGE)
|
|
{
|
|
is_ipv6 = true;
|
|
mp->entry.local_address_start.af = htonl (ADDRESS_IP6);
|
|
mp->entry.local_address_stop.af = htonl (ADDRESS_IP6);
|
|
mp->entry.remote_address_start.af = htonl (ADDRESS_IP6);
|
|
mp->entry.remote_address_stop.af = htonl (ADDRESS_IP6);
|
|
}
|
|
else
|
|
{
|
|
mp->entry.local_address_start.af = htonl (ADDRESS_IP4);
|
|
mp->entry.local_address_stop.af = htonl (ADDRESS_IP4);
|
|
mp->entry.remote_address_start.af = htonl (ADDRESS_IP4);
|
|
mp->entry.remote_address_stop.af = htonl (ADDRESS_IP4);
|
|
}
|
|
mp->entry.protocol = id->src_ts->get_protocol (id->src_ts);
|
|
|
|
if (id->dir == POLICY_OUT)
|
|
{
|
|
src_from = id->src_ts->get_from_address (id->src_ts);
|
|
src_to = id->src_ts->get_to_address (id->src_ts);
|
|
src = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, src_to, 0);
|
|
dst_from = id->dst_ts->get_from_address (id->dst_ts);
|
|
dst_to = id->dst_ts->get_to_address (id->dst_ts);
|
|
dst = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, dst_to, 0);
|
|
}
|
|
else
|
|
{
|
|
dst_from = id->src_ts->get_from_address (id->src_ts);
|
|
dst_to = id->src_ts->get_to_address (id->src_ts);
|
|
dst = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, dst_from, 0);
|
|
src_from = id->dst_ts->get_from_address (id->dst_ts);
|
|
src_to = id->dst_ts->get_to_address (id->dst_ts);
|
|
src = host_create_from_chunk (is_ipv6 ? AF_INET6 : AF_INET, src_from, 0);
|
|
}
|
|
|
|
if (src->is_anyaddr (src) && dst->is_anyaddr (dst))
|
|
{
|
|
memset (mp->entry.local_address_stop.un.ip6, 0xFF, 16);
|
|
memset (mp->entry.remote_address_stop.un.ip6, 0xFF, 16);
|
|
}
|
|
else
|
|
{
|
|
memcpy (is_ipv6 ? mp->entry.local_address_start.un.ip6 :
|
|
mp->entry.local_address_start.un.ip4,
|
|
src_from.ptr, src_from.len);
|
|
memcpy (is_ipv6 ? mp->entry.local_address_stop.un.ip6 :
|
|
mp->entry.local_address_stop.un.ip4,
|
|
src_to.ptr, src_to.len);
|
|
memcpy (is_ipv6 ? mp->entry.remote_address_start.un.ip6 :
|
|
mp->entry.remote_address_start.un.ip4,
|
|
dst_from.ptr, dst_from.len);
|
|
memcpy (is_ipv6 ? mp->entry.remote_address_stop.un.ip6 :
|
|
mp->entry.remote_address_stop.un.ip4,
|
|
dst_to.ptr, dst_to.len);
|
|
}
|
|
mp->entry.local_port_start = htons (id->src_ts->get_from_port (id->src_ts));
|
|
mp->entry.local_port_stop = htons (id->src_ts->get_to_port (id->src_ts));
|
|
mp->entry.remote_port_start = htons (id->dst_ts->get_from_port (id->dst_ts));
|
|
mp->entry.remote_port_stop = htons (id->dst_ts->get_to_port (id->dst_ts));
|
|
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac %s SPD entry failed", add ? "adding" : "removing");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "%s SPD entry failed rv:%d", add ? "add" : "remove",
|
|
ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
|
|
if (add)
|
|
{
|
|
ref_get (&spd->policy_num);
|
|
}
|
|
else
|
|
{
|
|
if (ref_put (&spd->policy_num))
|
|
{
|
|
DBG1 (
|
|
DBG_KNL,
|
|
"policy_num's ref is 0, delete spd_id %d sw_if_index %d sad_id %x",
|
|
spd->spd_id, spd->sw_if_index, sad_id);
|
|
interface_add_del_spd (FALSE, spd->spd_id, spd->sw_if_index);
|
|
manage_bypass (FALSE, spd->spd_id, sad_id);
|
|
spd_add_del (FALSE, spd->spd_id);
|
|
this->spds->remove (this->spds, id->interface);
|
|
}
|
|
}
|
|
|
|
if (this->install_routes && id->dir == POLICY_OUT && !mp->entry.protocol)
|
|
{
|
|
if (data->type == POLICY_IPSEC && data->sa->mode != MODE_TRANSPORT)
|
|
{
|
|
manage_route (this, add, id->dst_ts, data->src, data->dst);
|
|
}
|
|
}
|
|
rv = SUCCESS;
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
this->mutex->unlock (this->mutex);
|
|
return rv;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, get_features, kernel_feature_t,
|
|
private_kernel_vpp_ipsec_t *this)
|
|
{
|
|
return KERNEL_ESP_V3_TFC;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, get_spi, status_t, private_kernel_vpp_ipsec_t *this,
|
|
host_t *src, host_t *dst, uint8_t protocol, uint32_t *spi)
|
|
{
|
|
static const u_int p = 268435399, offset = 0xc0000000;
|
|
|
|
*spi = htonl (offset + permute (ref_get (&this->nextspi) ^ this->mixspi, p));
|
|
return SUCCESS;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, get_cpi, status_t, private_kernel_vpp_ipsec_t *this,
|
|
host_t *src, host_t *dst, uint16_t *cpi)
|
|
{
|
|
DBG1 (DBG_KNL, "get_cpi is not supported!!!!!!!!!!!!!!!!!!!!!!!!");
|
|
return NOT_SUPPORTED;
|
|
}
|
|
|
|
/**
|
|
* Helper struct for expiration events
|
|
*/
|
|
typedef struct
|
|
{
|
|
|
|
private_kernel_vpp_ipsec_t *manager;
|
|
|
|
kernel_ipsec_sa_id_t *sa_id;
|
|
|
|
/**
|
|
* 0 if this is a hard expire, otherwise the offset in s (soft->hard)
|
|
*/
|
|
uint32_t hard_offset;
|
|
|
|
} vpp_sa_expired_t;
|
|
|
|
/**
|
|
* Callback for expiration events
|
|
*/
|
|
static job_requeue_t
|
|
sa_expired (vpp_sa_expired_t *expired)
|
|
{
|
|
private_kernel_vpp_ipsec_t *this = expired->manager;
|
|
sa_t *sa;
|
|
kernel_ipsec_sa_id_t *id = expired->sa_id;
|
|
|
|
this->mutex->lock (this->mutex);
|
|
sa = this->sas->get (this->sas, id);
|
|
|
|
if (sa)
|
|
{
|
|
charon->kernel->expire (charon->kernel, id->proto, id->spi, id->dst,
|
|
FALSE);
|
|
}
|
|
|
|
free (id);
|
|
this->mutex->unlock (this->mutex);
|
|
return JOB_REQUEUE_NONE;
|
|
}
|
|
|
|
/**
|
|
* Schedule a job to handle IPsec SA expiration
|
|
*/
|
|
static void
|
|
schedule_expiration (private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_add_sa_t *entry,
|
|
kernel_ipsec_sa_id_t *entry2)
|
|
{
|
|
lifetime_cfg_t *lifetime = entry->lifetime;
|
|
vpp_sa_expired_t *expired;
|
|
callback_job_t *job;
|
|
uint32_t timeout;
|
|
kernel_ipsec_sa_id_t *id;
|
|
|
|
if (!lifetime->time.life)
|
|
{ /* no expiration at all */
|
|
return;
|
|
}
|
|
|
|
INIT (id, .src = entry2->src->clone (entry2->src),
|
|
.dst = entry2->dst->clone (entry2->dst), .spi = entry2->spi,
|
|
.proto = entry2->proto, );
|
|
|
|
INIT (expired, .manager = this, .sa_id = id, );
|
|
|
|
/* schedule a rekey first, a hard timeout will be scheduled then, if any */
|
|
expired->hard_offset = lifetime->time.life - lifetime->time.rekey;
|
|
timeout = lifetime->time.rekey;
|
|
|
|
if (lifetime->time.life <= lifetime->time.rekey || lifetime->time.rekey == 0)
|
|
{ /* no rekey, schedule hard timeout */
|
|
expired->hard_offset = 0;
|
|
timeout = lifetime->time.life;
|
|
}
|
|
|
|
job = callback_job_create ((callback_job_cb_t) sa_expired, expired,
|
|
(callback_job_cleanup_t) free, NULL);
|
|
lib->scheduler->schedule_job (lib->scheduler, (job_t *) job, timeout);
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, add_sa, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_sa_id_t *id, kernel_ipsec_add_sa_t *data)
|
|
{
|
|
char *out = NULL;
|
|
int out_len;
|
|
vl_api_ipsec_sad_entry_add_del_t *mp;
|
|
vl_api_ipsec_sad_entry_add_del_reply_t *rmp;
|
|
uint32_t sad_id = ref_get (&this->next_sad_id);
|
|
uint8_t ca = 0, ia = 0;
|
|
status_t rv = FAILED;
|
|
chunk_t src, dst;
|
|
kernel_ipsec_sa_id_t *sa_id;
|
|
sa_t *sa;
|
|
int key_len = data->enc_key.len;
|
|
|
|
if ((data->enc_alg == ENCR_AES_CTR) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV8) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV12) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV16))
|
|
{
|
|
static const int SALT_SIZE =
|
|
4; /* See how enc_size is calculated at keymat_v2.derive_child_keys */
|
|
key_len = key_len - SALT_SIZE;
|
|
}
|
|
natt_port = lib->settings->get_int (
|
|
lib->settings, "%s.plugins.socket-default.natt", IKEV2_NATT_PORT, lib->ns);
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->is_add = 1;
|
|
mp->entry.sad_id = htonl (sad_id);
|
|
mp->entry.spi = id->spi;
|
|
mp->entry.protocol = id->proto == IPPROTO_ESP ? htonl (IPSEC_API_PROTO_ESP) :
|
|
htonl (IPSEC_API_PROTO_AH);
|
|
|
|
switch (data->enc_alg)
|
|
{
|
|
case ENCR_NULL:
|
|
ca = IPSEC_API_CRYPTO_ALG_NONE;
|
|
break;
|
|
case ENCR_AES_CBC:
|
|
switch (key_len * 8)
|
|
{
|
|
case 128:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CBC_128;
|
|
break;
|
|
case 192:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CBC_192;
|
|
break;
|
|
case 256:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CBC_256;
|
|
break;
|
|
default:
|
|
DBG1 (DBG_KNL, "Key length %d is not supported by VPP!",
|
|
key_len * 8);
|
|
goto error;
|
|
}
|
|
break;
|
|
case ENCR_AES_CTR:
|
|
switch (key_len * 8)
|
|
{
|
|
case 128:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CTR_128;
|
|
break;
|
|
case 192:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CTR_192;
|
|
break;
|
|
case 256:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_CTR_256;
|
|
break;
|
|
default:
|
|
DBG1 (DBG_KNL, "Key length %d is not supported by VPP!",
|
|
key_len * 8);
|
|
goto error;
|
|
}
|
|
break;
|
|
case ENCR_AES_GCM_ICV8:
|
|
case ENCR_AES_GCM_ICV12:
|
|
case ENCR_AES_GCM_ICV16:
|
|
switch (key_len * 8)
|
|
{
|
|
case 128:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_GCM_128;
|
|
break;
|
|
case 192:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_GCM_192;
|
|
break;
|
|
case 256:
|
|
ca = IPSEC_API_CRYPTO_ALG_AES_GCM_256;
|
|
break;
|
|
default:
|
|
DBG1 (DBG_KNL, "Key length %d is not supported by VPP!",
|
|
key_len * 8);
|
|
goto error;
|
|
}
|
|
break;
|
|
case ENCR_DES:
|
|
ca = IPSEC_API_CRYPTO_ALG_DES_CBC;
|
|
break;
|
|
case ENCR_3DES:
|
|
ca = IPSEC_API_CRYPTO_ALG_3DES_CBC;
|
|
break;
|
|
default:
|
|
DBG1 (DBG_KNL, "algorithm %N not supported by VPP!",
|
|
encryption_algorithm_names, data->enc_alg);
|
|
goto error;
|
|
}
|
|
mp->entry.crypto_algorithm = htonl (ca);
|
|
mp->entry.crypto_key.length = key_len < 128 ? key_len : 128;
|
|
memcpy (mp->entry.crypto_key.data, data->enc_key.ptr,
|
|
mp->entry.crypto_key.length);
|
|
|
|
/* copy salt for AEAD algorithms */
|
|
if ((data->enc_alg == ENCR_AES_CTR) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV8) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV12) ||
|
|
(data->enc_alg == ENCR_AES_GCM_ICV16))
|
|
{
|
|
memcpy (&mp->entry.salt, data->enc_key.ptr + mp->entry.crypto_key.length,
|
|
4);
|
|
}
|
|
|
|
switch (data->int_alg)
|
|
{
|
|
case AUTH_UNDEFINED:
|
|
ia = IPSEC_API_INTEG_ALG_NONE;
|
|
break;
|
|
case AUTH_HMAC_MD5_96:
|
|
ia = IPSEC_API_INTEG_ALG_MD5_96;
|
|
break;
|
|
case AUTH_HMAC_SHA1_96:
|
|
ia = IPSEC_API_INTEG_ALG_SHA1_96;
|
|
break;
|
|
case AUTH_HMAC_SHA2_256_96:
|
|
ia = IPSEC_API_INTEG_ALG_SHA_256_96;
|
|
break;
|
|
case AUTH_HMAC_SHA2_256_128:
|
|
ia = IPSEC_API_INTEG_ALG_SHA_256_128;
|
|
break;
|
|
case AUTH_HMAC_SHA2_384_192:
|
|
ia = IPSEC_API_INTEG_ALG_SHA_384_192;
|
|
break;
|
|
case AUTH_HMAC_SHA2_512_256:
|
|
ia = IPSEC_API_INTEG_ALG_SHA_512_256;
|
|
break;
|
|
default:
|
|
DBG1 (DBG_KNL, "algorithm %N not supported by VPP!",
|
|
integrity_algorithm_names, data->int_alg);
|
|
goto error;
|
|
break;
|
|
}
|
|
mp->entry.integrity_algorithm = htonl (ia);
|
|
mp->entry.integrity_key.length =
|
|
data->int_key.len < 128 ? data->int_key.len : 128;
|
|
memcpy (mp->entry.integrity_key.data, data->int_key.ptr,
|
|
mp->entry.integrity_key.length);
|
|
|
|
int flags = IPSEC_API_SAD_FLAG_NONE;
|
|
if (data->esn)
|
|
flags |= IPSEC_API_SAD_FLAG_USE_ESN;
|
|
if (data->mode == MODE_TUNNEL)
|
|
{
|
|
if (id->src->get_family (id->src) == AF_INET6)
|
|
flags |= IPSEC_API_SAD_FLAG_IS_TUNNEL_V6;
|
|
else
|
|
flags |= IPSEC_API_SAD_FLAG_IS_TUNNEL;
|
|
}
|
|
if (data->encap)
|
|
{
|
|
DBG1 (DBG_KNL, "UDP encap!!!!!!!!!!!!!!!!!!!!");
|
|
flags |= IPSEC_API_SAD_FLAG_UDP_ENCAP;
|
|
}
|
|
mp->entry.flags = htonl (flags);
|
|
|
|
bool is_ipv6 = false;
|
|
if (id->src->get_family (id->src) == AF_INET6)
|
|
{
|
|
is_ipv6 = true;
|
|
mp->entry.tunnel_src.af = htonl (ADDRESS_IP6);
|
|
mp->entry.tunnel_dst.af = htonl (ADDRESS_IP6);
|
|
}
|
|
else
|
|
{
|
|
mp->entry.tunnel_src.af = htonl (ADDRESS_IP4);
|
|
mp->entry.tunnel_dst.af = htonl (ADDRESS_IP4);
|
|
}
|
|
src = id->src->get_address (id->src);
|
|
memcpy (is_ipv6 ? mp->entry.tunnel_src.un.ip6 : mp->entry.tunnel_src.un.ip4,
|
|
src.ptr, src.len);
|
|
dst = id->dst->get_address (id->dst);
|
|
memcpy (is_ipv6 ? mp->entry.tunnel_dst.un.ip6 : mp->entry.tunnel_dst.un.ip4,
|
|
dst.ptr, dst.len);
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac adding SA failed");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "add SA failed rv:%d", ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
|
|
this->mutex->lock (this->mutex);
|
|
INIT (sa_id, .src = id->src->clone (id->src),
|
|
.dst = id->dst->clone (id->dst), .spi = id->spi, .proto = id->proto, );
|
|
INIT (sa, .sa_id = sad_id, .stat_index = ntohl (rmp->stat_index), );
|
|
DBG4 (DBG_KNL, "put sa by its sa_id %x !!!!!!", sad_id);
|
|
this->sas->put (this->sas, sa_id, sa);
|
|
schedule_expiration (this, data, id);
|
|
this->mutex->unlock (this->mutex);
|
|
rv = SUCCESS;
|
|
|
|
error:
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
return rv;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, update_sa, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_sa_id_t *id, kernel_ipsec_update_sa_t *data)
|
|
{
|
|
DBG1 (DBG_KNL,
|
|
"update sa not supported!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!");
|
|
return NOT_SUPPORTED;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, query_sa, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_sa_id_t *id, kernel_ipsec_query_sa_t *data,
|
|
uint64_t *bytes, uint64_t *packets, time_t *time)
|
|
{
|
|
status_t rv = FAILED;
|
|
sa_t *sa;
|
|
u32 *dir;
|
|
int i, k;
|
|
stat_segment_data_t *res;
|
|
u8 **pattern = 0;
|
|
uint64_t res_bytes = 0;
|
|
uint64_t res_packets = 0;
|
|
|
|
this->mutex->lock (this->mutex);
|
|
sa = this->sas->get (this->sas, id);
|
|
this->mutex->unlock (this->mutex);
|
|
if (!sa)
|
|
{
|
|
DBG1 (DBG_KNL, "SA not found");
|
|
return NOT_FOUND;
|
|
}
|
|
|
|
int rv_stat = stat_segment_connect ("/run/vpp/stats.sock");
|
|
if (rv_stat != 0)
|
|
{
|
|
DBG1 (DBG_KNL, "Not connecting with stats segmentation");
|
|
return NOT_FOUND;
|
|
}
|
|
vec_add1 (pattern, (u8 *) "/net/ipsec/sa");
|
|
dir = stat_segment_ls ((u8 **) pattern);
|
|
res = stat_segment_dump (dir);
|
|
/* i-loop for each results find by pattern - here two:
|
|
* 1. /net/ipsec/sa
|
|
* 2. /net/ipsec/sa/lost
|
|
*/
|
|
for (i = 0; i < vec_len (res); i++)
|
|
{
|
|
switch (res[i].type)
|
|
{
|
|
/* type for how many packets are lost */
|
|
case STAT_DIR_TYPE_COUNTER_VECTOR_SIMPLE:
|
|
if (res[i].simple_counter_vec == 0)
|
|
continue;
|
|
break;
|
|
/* type for counter for each SA */
|
|
case STAT_DIR_TYPE_COUNTER_VECTOR_COMBINED:
|
|
if (res[i].combined_counter_vec == 0)
|
|
continue;
|
|
/* k-loop for each threads - that you run VPP */
|
|
for (k = 0; k < vec_len (res[i].combined_counter_vec); k++)
|
|
{
|
|
if (sa->stat_index <= vec_len (res[i].combined_counter_vec[k]))
|
|
{
|
|
DBG4 (DBG_KNL, "Thread: %d, Packets: %lu, Bytes: %lu", k,
|
|
res[i].combined_counter_vec[k][sa->stat_index].packets,
|
|
res[i].combined_counter_vec[k][sa->stat_index].bytes);
|
|
res_bytes +=
|
|
res[i].combined_counter_vec[k][sa->stat_index].bytes;
|
|
res_packets +=
|
|
res[i].combined_counter_vec[k][sa->stat_index].packets;
|
|
}
|
|
}
|
|
break;
|
|
case STAT_DIR_TYPE_NAME_VECTOR:
|
|
if (res[i].name_vector == 0)
|
|
continue;
|
|
break;
|
|
}
|
|
}
|
|
stat_segment_data_free (res);
|
|
stat_segment_disconnect ();
|
|
|
|
vec_free (pattern);
|
|
vec_free (dir);
|
|
|
|
if (bytes)
|
|
{
|
|
*bytes = res_bytes;
|
|
}
|
|
if (packets)
|
|
{
|
|
*packets = res_packets;
|
|
}
|
|
if (time)
|
|
{
|
|
*time = 0;
|
|
}
|
|
|
|
rv = SUCCESS;
|
|
return rv;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, del_sa, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_sa_id_t *id, kernel_ipsec_del_sa_t *data)
|
|
{
|
|
char *out = NULL;
|
|
int out_len;
|
|
vl_api_ipsec_sad_entry_add_del_t *mp;
|
|
vl_api_ipsec_sad_entry_add_del_reply_t *rmp;
|
|
status_t rv = FAILED;
|
|
sa_t *sa;
|
|
|
|
this->mutex->lock (this->mutex);
|
|
sa = this->sas->get (this->sas, id);
|
|
if (!sa)
|
|
{
|
|
DBG1 (DBG_KNL, "SA not found");
|
|
rv = NOT_FOUND;
|
|
goto error;
|
|
}
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
mp->is_add = 0;
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->entry.sad_id = htonl (sa->sa_id);
|
|
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "vac removing SA failed");
|
|
goto error;
|
|
}
|
|
rmp = (void *) out;
|
|
if (rmp->retval)
|
|
{
|
|
DBG1 (DBG_KNL, "del SA failed rv:%d", ntohl (rmp->retval));
|
|
goto error;
|
|
}
|
|
|
|
vl_msg_api_free (mp);
|
|
this->sas->remove (this->sas, id);
|
|
rv = SUCCESS;
|
|
error:
|
|
free (out);
|
|
this->mutex->unlock (this->mutex);
|
|
return rv;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, flush_sas, status_t, private_kernel_vpp_ipsec_t *this)
|
|
{
|
|
enumerator_t *enumerator;
|
|
int out_len;
|
|
char *out;
|
|
vl_api_ipsec_sad_entry_add_del_t *mp;
|
|
sa_t *sa = NULL;
|
|
|
|
this->mutex->lock (this->mutex);
|
|
enumerator = this->sas->create_enumerator (this->sas);
|
|
while (enumerator->enumerate (enumerator, sa, NULL))
|
|
{
|
|
mp = vl_msg_api_alloc (sizeof (*mp));
|
|
memset (mp, 0, sizeof (*mp));
|
|
u16 msg_id =
|
|
vl_msg_api_get_msg_index ((u8 *) "ipsec_sad_entry_add_del_ab64b5c6");
|
|
mp->_vl_msg_id = htons (msg_id);
|
|
mp->entry.sad_id = htonl (sa->sa_id);
|
|
mp->is_add = 0;
|
|
if (vac->send (vac, (char *) mp, sizeof (*mp), &out, &out_len))
|
|
{
|
|
DBG1 (DBG_KNL, "flush_sas failed!!!!");
|
|
return FALSE;
|
|
}
|
|
free (out);
|
|
vl_msg_api_free (mp);
|
|
this->sas->remove_at (this->sas, enumerator);
|
|
}
|
|
enumerator->destroy (enumerator);
|
|
this->mutex->unlock (this->mutex);
|
|
|
|
return SUCCESS;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, add_policy, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_policy_id_t *id, kernel_ipsec_manage_policy_t *data)
|
|
{
|
|
return manage_policy (this, TRUE, id, data);
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, query_policy, status_t,
|
|
private_kernel_vpp_ipsec_t *this, kernel_ipsec_policy_id_t *id,
|
|
kernel_ipsec_query_policy_t *data, time_t *use_time)
|
|
{
|
|
return NOT_SUPPORTED;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, del_policy, status_t, private_kernel_vpp_ipsec_t *this,
|
|
kernel_ipsec_policy_id_t *id, kernel_ipsec_manage_policy_t *data)
|
|
{
|
|
return manage_policy (this, FALSE, id, data);
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, flush_policies, status_t,
|
|
private_kernel_vpp_ipsec_t *this)
|
|
{
|
|
return NOT_SUPPORTED;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, bypass_socket, bool, private_kernel_vpp_ipsec_t *this,
|
|
int fd, int family)
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, enable_udp_decap, bool,
|
|
private_kernel_vpp_ipsec_t *this, int fd, int family, u_int16_t port)
|
|
{
|
|
DBG1 (DBG_KNL, "enable_udp_decap not supported!!!!!!!!!!!!!!!!!!!!!!!!!");
|
|
return FALSE;
|
|
}
|
|
|
|
METHOD (kernel_ipsec_t, destroy, void, private_kernel_vpp_ipsec_t *this)
|
|
{
|
|
this->mutex->destroy (this->mutex);
|
|
this->sas->destroy (this->sas);
|
|
this->spds->destroy (this->spds);
|
|
this->routes->destroy (this->routes);
|
|
free (this);
|
|
}
|
|
|
|
kernel_vpp_ipsec_t *
|
|
kernel_vpp_ipsec_create ()
|
|
{
|
|
private_kernel_vpp_ipsec_t *this;
|
|
|
|
INIT(this,
|
|
.public = {
|
|
.interface = {
|
|
.get_features = _get_features,
|
|
.get_spi = _get_spi,
|
|
.get_cpi = _get_cpi,
|
|
.add_sa = _add_sa,
|
|
.update_sa = _update_sa,
|
|
.query_sa = _query_sa,
|
|
.del_sa = _del_sa,
|
|
.flush_sas = _flush_sas,
|
|
.add_policy = _add_policy,
|
|
.query_policy = _query_policy,
|
|
.del_policy = _del_policy,
|
|
.flush_policies = _flush_policies,
|
|
.bypass_socket = _bypass_socket,
|
|
.enable_udp_decap = _enable_udp_decap,
|
|
.destroy = _destroy,
|
|
},
|
|
},
|
|
.next_sad_id = 0,
|
|
.next_spd_id = 0,
|
|
.mutex = mutex_create(MUTEX_TYPE_DEFAULT),
|
|
.sas = hashtable_create((hashtable_hash_t)sa_hash,
|
|
(hashtable_equals_t)sa_equals, 32),
|
|
.spds = hashtable_create((hashtable_hash_t)interface_hash,
|
|
(hashtable_equals_t)interface_equals, 4),
|
|
.routes = linked_list_create(),
|
|
.install_routes = lib->settings->get_bool(lib->settings,
|
|
"%s.install_routes", TRUE, lib->ns),
|
|
);
|
|
|
|
if (!init_spi (this))
|
|
{
|
|
destroy (this);
|
|
return NULL;
|
|
}
|
|
|
|
return &this->public;
|
|
}
|