2 * Asterisk -- A telephony toolkit for Linux.
4 * Various sorts of access control
6 * Copyright (C) 1999, Mark Spencer
8 * Mark Spencer <markster@linux-support.net>
10 * This program is free software, distributed under the terms of
11 * the GNU General Public License
22 #include <asterisk/acl.h>
23 #include <asterisk/logger.h>
24 #include <asterisk/channel.h>
25 #include <arpa/inet.h>
26 #include <sys/socket.h>
29 #include <netinet/in_systm.h>
30 #include <netinet/ip.h>
31 #include <sys/ioctl.h>
34 #include <net/route.h>
36 static ast_mutex_t routeseq_lock = AST_MUTEX_INITIALIZER;
39 #define AST_SENSE_DENY 0
40 #define AST_SENSE_ALLOW 1
43 /* Host access rule */
44 struct in_addr netaddr;
45 struct in_addr netmask;
50 /* Default IP - if not otherwise set, don't breathe garbage */
51 static struct in_addr __ourip = { 0x00000000 };
54 char ifrn_name[IFNAMSIZ]; /* Interface name, e.g. "eth0", "ppp0", etc. */
55 struct sockaddr_in ifru_addr;
58 void ast_free_ha(struct ast_ha *ha)
68 struct ast_ha *ast_append_ha(char *sense, char *stuff, struct ast_ha *path)
70 struct ast_ha *ha = malloc(sizeof(struct ast_ha));
73 struct ast_ha *prev = NULL;
81 strncpy(tmp, stuff, sizeof(tmp) - 1);
82 nm = strchr(tmp, '/');
84 nm = "255.255.255.255";
89 if (!inet_aton(tmp, &ha->netaddr)) {
90 ast_log(LOG_WARNING, "%s not a valid IP\n", tmp);
94 if (!inet_aton(nm, &ha->netmask)) {
95 ast_log(LOG_WARNING, "%s not a valid netmask\n", nm);
99 ha->netaddr.s_addr &= ha->netmask.s_addr;
100 if (!strncasecmp(sense, "p", 1)) {
101 ha->sense = AST_SENSE_ALLOW;
103 ha->sense = AST_SENSE_DENY;
114 int ast_apply_ha(struct ast_ha *ha, struct sockaddr_in *sin)
116 /* Start optimistic */
117 int res = AST_SENSE_ALLOW;
119 /* For each rule, if this address and the netmask = the net address
120 apply the current rule */
121 if ((sin->sin_addr.s_addr & ha->netmask.s_addr) == (ha->netaddr.s_addr))
128 int ast_get_ip(struct sockaddr_in *sin, char *value)
131 hp = gethostbyname(value);
133 memcpy(&sin->sin_addr, hp->h_addr, sizeof(sin->sin_addr));
135 ast_log(LOG_WARNING, "Unable to lookup '%s'\n", value);
141 int inaddrcmp(struct sockaddr_in *sin1, struct sockaddr_in *sin2)
143 return ((sin1->sin_addr.s_addr != sin2->sin_addr.s_addr )
144 || (sin1->sin_port != sin2->sin_port));
147 /* iface is the interface (e.g. eth0); address is the return value */
148 int ast_lookup_iface(char *iface, struct in_addr *address) {
150 struct my_ifreq ifreq;
152 memset(&ifreq, 0, sizeof(ifreq));
153 strncpy(ifreq.ifrn_name,iface,sizeof(ifreq.ifrn_name) - 1);
155 mysock = socket(PF_INET,SOCK_DGRAM,IPPROTO_IP);
156 res = ioctl(mysock,SIOCGIFADDR,&ifreq);
160 ast_log(LOG_WARNING, "Unable to get IP of %s: %s\n", iface, strerror(errno));
161 memcpy((char *)address,(char *)&__ourip,sizeof(__ourip));
164 memcpy((char *)address,(char *)&ifreq.ifru_addr.sin_addr,sizeof(ifreq.ifru_addr.sin_addr));
169 int ast_ouraddrfor(struct in_addr *them, struct in_addr *us)
172 struct sockaddr_in *sin;
175 struct rt_msghdr m_rtm;
178 char *cp, *p = ast_strdupa(inet_ntoa(*them));
179 int i, l, s, seq, flags;
180 pid_t pid = getpid();
181 static int routeseq; /* Protected by "routeseq_lock" mutex */
183 memset(us, 0, sizeof(struct in_addr));
185 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
186 m_rtmsg.m_rtm.rtm_type = RTM_GET;
187 m_rtmsg.m_rtm.rtm_flags = RTF_UP | RTF_HOST;
188 m_rtmsg.m_rtm.rtm_version = RTM_VERSION;
189 ast_mutex_lock(&routeseq_lock);
191 ast_mutex_unlock(&routeseq_lock);
192 m_rtmsg.m_rtm.rtm_seq = seq;
193 m_rtmsg.m_rtm.rtm_addrs = RTA_IFA | RTA_DST;
194 m_rtmsg.m_rtm.rtm_msglen = sizeof(struct rt_msghdr) + sizeof(struct sockaddr_in);
195 sin = (struct sockaddr_in *)m_rtmsg.m_space;
196 sin->sin_family = AF_INET;
197 sin->sin_len = sizeof(struct sockaddr_in);
198 sin->sin_addr = *them;
200 if ((s = socket(PF_ROUTE, SOCK_RAW, 0)) < 0) {
201 ast_log(LOG_ERROR, "Error opening routing socket\n");
204 flags = fcntl(s, F_GETFL);
205 fcntl(s, F_SETFL, flags | O_NONBLOCK);
206 if (write(s, (char *)&m_rtmsg, m_rtmsg.m_rtm.rtm_msglen) < 0) {
207 ast_log(LOG_ERROR, "Error writing to routing socket: %s\n", strerror(errno));
212 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
213 } while (l > 0 && (m_rtmsg.m_rtm.rtm_seq != 1 || m_rtmsg.m_rtm.rtm_pid != pid));
216 ast_log(LOG_ERROR, "Error reading from routing socket\n");
222 if (m_rtmsg.m_rtm.rtm_version != RTM_VERSION) {
223 ast_log(LOG_ERROR, "Unsupported route socket protocol version\n");
227 if (m_rtmsg.m_rtm.rtm_msglen != l)
228 ast_log(LOG_WARNING, "Message length mismatch, in packet %d, returned %d\n",
229 m_rtmsg.m_rtm.rtm_msglen, l);
231 if (m_rtmsg.m_rtm.rtm_errno) {
232 ast_log(LOG_ERROR, "RTM_GET got %s (%d)\n",
233 strerror(m_rtmsg.m_rtm.rtm_errno), m_rtmsg.m_rtm.rtm_errno);
237 cp = (char *)m_rtmsg.m_space;
238 if (m_rtmsg.m_rtm.rtm_addrs)
239 for (i = 1; i; i <<= 1)
240 if (m_rtmsg.m_rtm.rtm_addrs & i) {
241 sa = (struct sockaddr *)cp;
242 if (i == RTA_IFA && sa->sa_family == AF_INET) {
243 sin = (struct sockaddr_in *)sa;
245 ast_log(LOG_DEBUG, "Found route to %s, output from our address %s.\n", p, inet_ntoa(*us));
248 cp += sa->sa_len > 0 ?
249 (1 + ((sa->sa_len - 1) | (sizeof(long) - 1))) :
253 ast_log(LOG_DEBUG, "No route found for address %s!\n", p);
257 unsigned int remote_ip;
260 remote_ip = them->s_addr;
262 PROC = fopen("/proc/net/route","r");
264 bzero(us,sizeof(struct in_addr));
267 /* First line contains headers */
268 fgets(line,sizeof(line),PROC);
270 while (!feof(PROC)) {
272 unsigned int dest, gateway, mask;
276 fgets(line,sizeof(line),PROC);
279 for (i=0;i<sizeof(line);i++) {
282 fields[fieldnum++] = line + i;
283 offset = strchr(line + i,'\t');
284 if (offset == NULL) {
287 } else if (fieldnum >= 9) {
288 /* Short-circuit: can't break at 8, since the end of field 7 is figured when fieldnum=8 */
296 sscanf(fields[0],"%s",iface);
297 sscanf(fields[1],"%x",&dest);
298 sscanf(fields[2],"%x",&gateway);
299 sscanf(fields[7],"%x",&mask);
301 printf("Addr: %s %08x Dest: %08x Mask: %08x\n", inet_ntoa(*them), remote_ip, dest, mask);
303 /* Looks simple, but here is the magic */
304 if (((remote_ip & mask) ^ dest) == 0) {
305 res = ast_lookup_iface(iface,us);
311 ast_log(LOG_WARNING, "Yikes! No default route?!!\n");
312 bzero(us,sizeof(struct in_addr));
315 /* We've already warned in subroutine */