2 * Asterisk -- A telephony toolkit for Linux.
4 * Various sorts of access control
6 * Copyright (C) 1999, Mark Spencer
8 * Mark Spencer <markster@linux-support.net>
10 * This program is free software, distributed under the terms of
11 * the GNU General Public License
22 #include <asterisk/acl.h>
23 #include <asterisk/logger.h>
24 #include <asterisk/channel.h>
25 #include <arpa/inet.h>
26 #include <sys/socket.h>
29 #include <netinet/in_systm.h>
30 #include <netinet/ip.h>
31 #include <sys/ioctl.h>
33 #include <net/route.h>
35 static ast_mutex_t routeseq_lock = AST_MUTEX_INITIALIZER;
38 #define AST_SENSE_DENY 0
39 #define AST_SENSE_ALLOW 1
42 /* Host access rule */
43 struct in_addr netaddr;
44 struct in_addr netmask;
49 /* Default IP - if not otherwise set, don't breathe garbage */
50 static struct in_addr __ourip = { 0x00000000 };
53 char ifrn_name[IFNAMSIZ]; /* Interface name, e.g. "eth0", "ppp0", etc. */
54 struct sockaddr_in ifru_addr;
57 void ast_free_ha(struct ast_ha *ha)
67 struct ast_ha *ast_append_ha(char *sense, char *stuff, struct ast_ha *path)
69 struct ast_ha *ha = malloc(sizeof(struct ast_ha));
71 struct ast_ha *prev = NULL;
81 strsep(&stringp, "/");
82 nm = strsep(&stringp, "/");
84 nm = "255.255.255.255";
85 if (!inet_aton(stuff, &ha->netaddr)) {
86 ast_log(LOG_WARNING, "%s not a valid IP\n", stuff);
90 if (!inet_aton(nm, &ha->netmask)) {
91 ast_log(LOG_WARNING, "%s not a valid netmask\n", nm);
95 ha->netaddr.s_addr &= ha->netmask.s_addr;
96 if (!strncasecmp(sense, "p", 1)) {
97 ha->sense = AST_SENSE_ALLOW;
99 ha->sense = AST_SENSE_DENY;
110 int ast_apply_ha(struct ast_ha *ha, struct sockaddr_in *sin)
112 /* Start optimistic */
113 int res = AST_SENSE_ALLOW;
115 /* For each rule, if this address and the netmask = the net address
116 apply the current rule */
117 if ((sin->sin_addr.s_addr & ha->netmask.s_addr) == (ha->netaddr.s_addr))
124 int ast_get_ip(struct sockaddr_in *sin, char *value)
127 hp = gethostbyname(value);
129 memcpy(&sin->sin_addr, hp->h_addr, sizeof(sin->sin_addr));
131 ast_log(LOG_WARNING, "Unable to lookup '%s'\n", value);
137 int inaddrcmp(struct sockaddr_in *sin1, struct sockaddr_in *sin2)
139 return ((sin1->sin_addr.s_addr != sin2->sin_addr.s_addr )
140 || (sin1->sin_port != sin2->sin_port));
143 /* iface is the interface (e.g. eth0); address is the return value */
144 int ast_lookup_iface(char *iface, struct in_addr *address) {
146 struct my_ifreq ifreq;
148 memset(&ifreq, 0, sizeof(ifreq));
149 strncpy(ifreq.ifrn_name,iface,sizeof(ifreq.ifrn_name) - 1);
151 mysock = socket(PF_INET,SOCK_DGRAM,IPPROTO_IP);
152 res = ioctl(mysock,SIOCGIFADDR,&ifreq);
156 ast_log(LOG_WARNING, "Unable to get IP of %s: %s\n", iface, strerror(errno));
157 memcpy((char *)address,(char *)&__ourip,sizeof(__ourip));
160 memcpy((char *)address,(char *)&ifreq.ifru_addr.sin_addr,sizeof(ifreq.ifru_addr.sin_addr));
165 int ast_ouraddrfor(struct in_addr *them, struct in_addr *us)
168 struct sockaddr_in *sin;
171 struct rt_msghdr m_rtm;
174 char *cp, *p = ast_strdupa(inet_ntoa(*them));
176 pid_t pid = getpid();
177 static int routeseq; /* Protected by "routeseq_lock" mutex */
179 memset(us, 0, sizeof(struct in_addr));
181 memset(&m_rtmsg, 0, sizeof(m_rtmsg));
182 m_rtmsg.m_rtm.rtm_type = RTM_GET;
183 m_rtmsg.m_rtm.rtm_flags = RTF_UP | RTF_HOST;
184 m_rtmsg.m_rtm.rtm_version = RTM_VERSION;
185 ast_mutex_lock(&routeseq_lock);
187 ast_mutex_unlock(&routeseq_lock);
188 m_rtmsg.m_rtm.rtm_seq = seq;
189 m_rtmsg.m_rtm.rtm_addrs = RTA_IFA | RTA_DST;
190 m_rtmsg.m_rtm.rtm_msglen = sizeof(struct rt_msghdr) + sizeof(struct sockaddr_in);
191 sin = (struct sockaddr_in *)m_rtmsg.m_space;
192 sin->sin_family = AF_INET;
193 sin->sin_len = sizeof(struct sockaddr_in);
194 sin->sin_addr = *them;
196 if ((s = socket(PF_ROUTE, SOCK_RAW, 0)) < 0) {
197 ast_log(LOG_ERROR, "Error opening routing socket\n");
200 if (write(s, (char *)&m_rtmsg, m_rtmsg.m_rtm.rtm_msglen) < 0) {
201 ast_log(LOG_ERROR, "Error writing to routing socket: %s\n", strerror(errno));
206 l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
207 } while (l > 0 && (m_rtmsg.m_rtm.rtm_seq != 1 || m_rtmsg.m_rtm.rtm_pid != pid));
210 ast_log(LOG_ERROR, "Error reading from routing socket\n");
214 if (m_rtmsg.m_rtm.rtm_version != RTM_VERSION) {
215 ast_log(LOG_ERROR, "Unsupported route socket protocol version\n");
219 if (m_rtmsg.m_rtm.rtm_msglen != l)
220 ast_log(LOG_WARNING, "Message length mismatch, in packet %d, returned %d\n",
221 m_rtmsg.m_rtm.rtm_msglen, l);
223 if (m_rtmsg.m_rtm.rtm_errno) {
224 ast_log(LOG_ERROR, "RTM_GET got %s (%d)\n",
225 strerror(m_rtmsg.m_rtm.rtm_errno), m_rtmsg.m_rtm.rtm_errno);
229 cp = (char *)m_rtmsg.m_space;
230 if (m_rtmsg.m_rtm.rtm_addrs)
231 for (i = 1; i; i <<= 1)
232 if (m_rtmsg.m_rtm.rtm_addrs & i) {
233 sa = (struct sockaddr *)cp;
234 if (i == RTA_IFA && sa->sa_family == AF_INET) {
235 sin = (struct sockaddr_in *)sa;
237 ast_log(LOG_DEBUG, "Found route to %s, output from our address %s.\n", p, inet_ntoa(*us));
240 cp += sa->sa_len > 0 ?
241 (1 + ((sa->sa_len - 1) | (sizeof(long) - 1))) :
245 ast_log(LOG_DEBUG, "No route found for address %s!\n", p);
249 unsigned int remote_ip;
252 remote_ip = them->s_addr;
254 PROC = fopen("/proc/net/route","r");
256 bzero(us,sizeof(struct in_addr));
259 /* First line contains headers */
260 fgets(line,sizeof(line),PROC);
262 while (!feof(PROC)) {
264 unsigned int dest, gateway, mask;
268 fgets(line,sizeof(line),PROC);
271 for (i=0;i<sizeof(line);i++) {
274 fields[fieldnum++] = line + i;
275 offset = strchr(line + i,'\t');
276 if (offset == NULL) {
279 } else if (fieldnum >= 9) {
280 /* Short-circuit: can't break at 8, since the end of field 7 is figured when fieldnum=8 */
288 sscanf(fields[0],"%s",iface);
289 sscanf(fields[1],"%x",&dest);
290 sscanf(fields[2],"%x",&gateway);
291 sscanf(fields[7],"%x",&mask);
293 printf("Addr: %s %08x Dest: %08x Mask: %08x\n", inet_ntoa(*them), remote_ip, dest, mask);
295 /* Looks simple, but here is the magic */
296 if (((remote_ip & mask) ^ dest) == 0) {
297 res = ast_lookup_iface(iface,us);
303 ast_log(LOG_WARNING, "Yikes! No default route?!!\n");
304 bzero(us,sizeof(struct in_addr));
307 /* We've already warned in subroutine */