ip_raudio_pxy.c revision 259128
1/*	$FreeBSD: releng/10.0/sys/contrib/ipfilter/netinet/ip_raudio_pxy.c 259128 2013-12-09 13:44:07Z gjb $	*/
2
3/*
4 * Copyright (C) 2012 by Darren Reed.
5 *
6 * See the IPFILTER.LICENCE file for details on licencing.
7 *
8 * $Id: ip_raudio_pxy.c,v 1.40.2.4 2006/07/14 06:12:17 darrenr Exp $
9 */
10
11#define	IPF_RAUDIO_PROXY
12
13
14void ipf_p_raudio_main_load __P((void));
15void ipf_p_raudio_main_unload __P((void));
16int ipf_p_raudio_new __P((void *, fr_info_t *, ap_session_t *, nat_t *));
17int ipf_p_raudio_in __P((void *, fr_info_t *, ap_session_t *, nat_t *));
18int ipf_p_raudio_out __P((void *, fr_info_t *, ap_session_t *, nat_t *));
19
20static	frentry_t	raudiofr;
21
22int	raudio_proxy_init = 0;
23
24
25/*
26 * Real Audio application proxy initialization.
27 */
28void
29ipf_p_raudio_main_load()
30{
31	bzero((char *)&raudiofr, sizeof(raudiofr));
32	raudiofr.fr_ref = 1;
33	raudiofr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE;
34	MUTEX_INIT(&raudiofr.fr_lock, "Real Audio proxy rule lock");
35	raudio_proxy_init = 1;
36}
37
38
39void
40ipf_p_raudio_main_unload()
41{
42	if (raudio_proxy_init == 1) {
43		MUTEX_DESTROY(&raudiofr.fr_lock);
44		raudio_proxy_init = 0;
45	}
46}
47
48
49/*
50 * Setup for a new proxy to handle Real Audio.
51 */
52int
53ipf_p_raudio_new(arg, fin, aps, nat)
54	void *arg;
55	fr_info_t *fin;
56	ap_session_t *aps;
57	nat_t *nat;
58{
59	raudio_t *rap;
60
61	nat = nat;	/* LINT */
62
63	if (fin->fin_v != 4)
64		return -1;
65
66	KMALLOCS(aps->aps_data, void *, sizeof(raudio_t));
67	if (aps->aps_data == NULL)
68		return -1;
69
70	bzero(aps->aps_data, sizeof(raudio_t));
71	rap = aps->aps_data;
72	aps->aps_psiz = sizeof(raudio_t);
73	rap->rap_mode = RAP_M_TCP;	/* default is for TCP */
74	return 0;
75}
76
77
78
79int
80ipf_p_raudio_out(arg, fin, aps, nat)
81	void *arg;
82	fr_info_t *fin;
83	ap_session_t *aps;
84	nat_t *nat;
85{
86	raudio_t *rap = aps->aps_data;
87	unsigned char membuf[512 + 1], *s;
88	u_short id = 0;
89	tcphdr_t *tcp;
90	int off, dlen;
91	int len = 0;
92	mb_t *m;
93
94	nat = nat;	/* LINT */
95
96	/*
97	 * If we've already processed the start messages, then nothing left
98	 * for the proxy to do.
99	 */
100	if (rap->rap_eos == 1)
101		return 0;
102
103	m = fin->fin_m;
104	tcp = (tcphdr_t *)fin->fin_dp;
105	off = (char *)tcp - (char *)fin->fin_ip;
106	off += (TCP_OFF(tcp) << 2) + fin->fin_ipoff;
107
108#ifdef __sgi
109	dlen = fin->fin_plen - off;
110#else
111	dlen = MSGDSIZE(m) - off;
112#endif
113	if (dlen <= 0)
114		return 0;
115
116	if (dlen > sizeof(membuf))
117		dlen = sizeof(membuf);
118
119	bzero((char *)membuf, sizeof(membuf));
120	COPYDATA(m, off, dlen, (char *)membuf);
121	/*
122	 * In all the startup parsing, ensure that we don't go outside
123	 * the packet buffer boundary.
124	 */
125	/*
126	 * Look for the start of connection "PNA" string if not seen yet.
127	 */
128	if (rap->rap_seenpna == 0) {
129		s = (u_char *)memstr("PNA", (char *)membuf, 3, dlen);
130		if (s == NULL)
131			return 0;
132		s += 3;
133		rap->rap_seenpna = 1;
134	} else
135		s = membuf;
136
137	/*
138	 * Directly after the PNA will be the version number of this
139	 * connection.
140	 */
141	if (rap->rap_seenpna == 1 && rap->rap_seenver == 0) {
142		if ((s + 1) - membuf < dlen) {
143			rap->rap_version = (*s << 8) | *(s + 1);
144			s += 2;
145			rap->rap_seenver = 1;
146		} else
147			return 0;
148	}
149
150	/*
151	 * Now that we've been past the PNA and version number, we're into the
152	 * startup messages block.  This ends when a message with an ID of 0.
153	 */
154	while ((rap->rap_eos == 0) && ((s + 1) - membuf < dlen)) {
155		if (rap->rap_gotid == 0) {
156			id = (*s << 8) | *(s + 1);
157			s += 2;
158			rap->rap_gotid = 1;
159			if (id == RA_ID_END) {
160				rap->rap_eos = 1;
161				break;
162			}
163		} else if (rap->rap_gotlen == 0) {
164			len = (*s << 8) | *(s + 1);
165			s += 2;
166			rap->rap_gotlen = 1;
167		}
168
169		if (rap->rap_gotid == 1 && rap->rap_gotlen == 1) {
170			if (id == RA_ID_UDP) {
171				rap->rap_mode &= ~RAP_M_TCP;
172				rap->rap_mode |= RAP_M_UDP;
173				rap->rap_plport = (*s << 8) | *(s + 1);
174			} else if (id == RA_ID_ROBUST) {
175				rap->rap_mode |= RAP_M_ROBUST;
176				rap->rap_prport = (*s << 8) | *(s + 1);
177			}
178			s += len;
179			rap->rap_gotlen = 0;
180			rap->rap_gotid = 0;
181		}
182	}
183	return 0;
184}
185
186
187int
188ipf_p_raudio_in(arg, fin, aps, nat)
189	void *arg;
190	fr_info_t *fin;
191	ap_session_t *aps;
192	nat_t *nat;
193{
194	unsigned char membuf[IPF_MAXPORTLEN + 1], *s;
195	tcphdr_t *tcp, tcph, *tcp2 = &tcph;
196	raudio_t *rap = aps->aps_data;
197	ipf_main_softc_t *softc;
198	ipf_nat_softc_t *softn;
199	struct in_addr swa, swb;
200	int off, dlen, slen;
201	int a1, a2, a3, a4;
202	u_short sp, dp;
203	fr_info_t fi;
204	tcp_seq seq;
205	nat_t *nat2;
206	u_char swp;
207	ip_t *ip;
208	mb_t *m;
209
210	softc = fin->fin_main_soft;
211	softn = softc->ipf_nat_soft;
212	/*
213	 * Wait until we've seen the end of the start messages and even then
214	 * only proceed further if we're using UDP.  If they want to use TCP
215	 * then data is sent back on the same channel that is already open.
216	 */
217	if (rap->rap_sdone != 0)
218		return 0;
219
220	m = fin->fin_m;
221	tcp = (tcphdr_t *)fin->fin_dp;
222	off = (char *)tcp - (char *)fin->fin_ip;
223	off += (TCP_OFF(tcp) << 2) + fin->fin_ipoff;
224
225#ifdef __sgi
226	dlen = fin->fin_plen - off;
227#else
228	dlen = MSGDSIZE(m) - off;
229#endif
230	if (dlen <= 0)
231		return 0;
232
233	if (dlen > sizeof(membuf))
234		dlen = sizeof(membuf);
235
236	bzero((char *)membuf, sizeof(membuf));
237	COPYDATA(m, off, dlen, (char *)membuf);
238
239	seq = ntohl(tcp->th_seq);
240	/*
241	 * Check to see if the data in this packet is of interest to us.
242	 * We only care for the first 19 bytes coming back from the server.
243	 */
244	if (rap->rap_sseq == 0) {
245		s = (u_char *)memstr("PNA", (char *)membuf, 3, dlen);
246		if (s == NULL)
247			return 0;
248		a1 = s - membuf;
249		dlen -= a1;
250		a1 = 0;
251		rap->rap_sseq = seq;
252		a2 = MIN(dlen, sizeof(rap->rap_svr));
253	} else if (seq <= rap->rap_sseq + sizeof(rap->rap_svr)) {
254		/*
255		 * seq # which is the start of data and from that the offset
256		 * into the buffer array.
257		 */
258		a1 = seq - rap->rap_sseq;
259		a2 = MIN(dlen, sizeof(rap->rap_svr));
260		a2 -= a1;
261		s = membuf;
262	} else
263		return 0;
264
265	for (a3 = a1, a4 = a2; (a4 > 0) && (a3 < 19) && (a3 >= 0); a4--,a3++) {
266		rap->rap_sbf |= (1 << a3);
267		rap->rap_svr[a3] = *s++;
268	}
269
270	if ((rap->rap_sbf != 0x7ffff) || (!rap->rap_eos))	/* 19 bits */
271		return 0;
272	rap->rap_sdone = 1;
273
274	s = (u_char *)rap->rap_svr + 11;
275	if (((*s << 8) | *(s + 1)) == RA_ID_ROBUST) {
276		s += 2;
277		rap->rap_srport = (*s << 8) | *(s + 1);
278	}
279
280	ip = fin->fin_ip;
281	swp = ip->ip_p;
282	swa = ip->ip_src;
283	swb = ip->ip_dst;
284
285	ip->ip_p = IPPROTO_UDP;
286	ip->ip_src = nat->nat_ndstip;
287	ip->ip_dst = nat->nat_odstip;
288
289	bcopy((char *)fin, (char *)&fi, sizeof(fi));
290	bzero((char *)tcp2, sizeof(*tcp2));
291	TCP_OFF_A(tcp2, 5);
292	fi.fin_flx |= FI_IGNORE;
293	fi.fin_dp = (char *)tcp2;
294	fi.fin_fr = &raudiofr;
295	fi.fin_dlen = sizeof(*tcp2);
296	fi.fin_plen = fi.fin_hlen + sizeof(*tcp2);
297	tcp2->th_win = htons(8192);
298	slen = ip->ip_len;
299	ip->ip_len = htons(fin->fin_hlen + sizeof(*tcp));
300
301	if (((rap->rap_mode & RAP_M_UDP_ROBUST) == RAP_M_UDP_ROBUST) &&
302	    (rap->rap_srport != 0)) {
303		dp = rap->rap_srport;
304		sp = rap->rap_prport;
305		tcp2->th_sport = htons(sp);
306		tcp2->th_dport = htons(dp);
307		fi.fin_data[0] = dp;
308		fi.fin_data[1] = sp;
309		fi.fin_out = 0;
310		MUTEX_ENTER(&softn->ipf_nat_new);
311		nat2 = ipf_nat_add(&fi, nat->nat_ptr, NULL,
312			       NAT_SLAVE|IPN_UDP | (sp ? 0 : SI_W_SPORT),
313			       NAT_OUTBOUND);
314		MUTEX_EXIT(&softn->ipf_nat_new);
315		if (nat2 != NULL) {
316			(void) ipf_nat_proto(&fi, nat2, IPN_UDP);
317			MUTEX_ENTER(&nat2->nat_lock);
318			ipf_nat_update(&fi, nat2);
319			MUTEX_EXIT(&nat2->nat_lock);
320
321			(void) ipf_state_add(softc, &fi, NULL,
322					     (sp ? 0 : SI_W_SPORT));
323		}
324	}
325
326	if ((rap->rap_mode & RAP_M_UDP) == RAP_M_UDP) {
327		sp = rap->rap_plport;
328		tcp2->th_sport = htons(sp);
329		tcp2->th_dport = 0; /* XXX - don't specify remote port */
330		fi.fin_data[0] = sp;
331		fi.fin_data[1] = 0;
332		fi.fin_out = 1;
333		MUTEX_ENTER(&softn->ipf_nat_new);
334		nat2 = ipf_nat_add(&fi, nat->nat_ptr, NULL,
335			       NAT_SLAVE|IPN_UDP|SI_W_DPORT,
336			       NAT_OUTBOUND);
337		MUTEX_EXIT(&softn->ipf_nat_new);
338		if (nat2 != NULL) {
339			(void) ipf_nat_proto(&fi, nat2, IPN_UDP);
340			MUTEX_ENTER(&nat2->nat_lock);
341			ipf_nat_update(&fi, nat2);
342			MUTEX_EXIT(&nat2->nat_lock);
343
344			(void) ipf_state_add(softc, &fi, NULL, SI_W_DPORT);
345		}
346	}
347
348	ip->ip_p = swp;
349	ip->ip_len = slen;
350	ip->ip_src = swa;
351	ip->ip_dst = swb;
352	return 0;
353}
354