summaryrefslogtreecommitdiff
path: root/sys
diff options
context:
space:
mode:
authorRyan Thomas McBride <mcbride@cvs.openbsd.org>2009-03-05 03:09:38 +0000
committerRyan Thomas McBride <mcbride@cvs.openbsd.org>2009-03-05 03:09:38 +0000
commit90b8e75ce78657a7a89cef0d69d3cd932d3c52d2 (patch)
treeecbbe407b6fd8b8bab590b4e84d2a090af7267e9 /sys
parent5338b27c43e7c92ea8f689acb789f3b2f871e4ce (diff)
Stricter state checking for ICMP and ICMPv6 packets: include the ICMP type
in one port of the state key, using the type to determine which side should be the id, and which should be the type. Also: - Handle ICMP6 messages which are typically sent to multicast addresses but recieve unicast replies, by doing fallthrough lookups against the correct multicast address. - Clear up some mistaken assumptions in the PF code: - Not all ICMP packets have an icmp_id, so simulate one based on other data if we can, otherwise set it to 0. - Don't modify the icmp id field in NAT unless it's echo - Use the full range of possible id's when NATing icmp6 echoy ok henning marco testing matthieu todd
Diffstat (limited to 'sys')
-rw-r--r--sys/net/pf.c418
-rw-r--r--sys/net/pf_lb.c11
2 files changed, 334 insertions, 95 deletions
diff --git a/sys/net/pf.c b/sys/net/pf.c
index cfc455474b6..35163548410 100644
--- a/sys/net/pf.c
+++ b/sys/net/pf.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: pf.c,v 1.634 2009/02/27 12:37:45 henning Exp $ */
+/* $OpenBSD: pf.c,v 1.635 2009/03/05 03:09:37 mcbride Exp $ */
/*
* Copyright (c) 2001 Daniel Hartmeier
@@ -143,6 +143,8 @@ int pf_modulate_sack(struct mbuf *, int, struct pf_pdesc *,
void pf_change_a6(struct pf_addr *, u_int16_t *,
struct pf_addr *, u_int8_t);
#endif /* INET6 */
+int pf_icmp_mapping(struct pf_pdesc *, u_int8_t, int *,
+ int *, u_int16_t *, u_int16_t *);
void pf_change_icmp(struct pf_addr *, u_int16_t *,
struct pf_addr *, struct pf_addr *, u_int16_t,
u_int16_t *, u_int16_t *, u_int16_t *,
@@ -186,6 +188,10 @@ int pf_test_state_tcp(struct pf_state **, int,
int pf_test_state_udp(struct pf_state **, int,
struct pfi_kif *, struct mbuf *, int,
void *, struct pf_pdesc *);
+int pf_icmp_state_lookup(struct pf_state_key_cmp *,
+ struct pf_pdesc *, struct pf_state **, struct mbuf *,
+ int, struct pfi_kif *, u_int16_t, u_int16_t,
+ int, int *, int);
int pf_test_state_icmp(struct pf_state **, int,
struct pfi_kif *, struct mbuf *, int,
void *, struct pf_pdesc *, u_short *);
@@ -231,6 +237,9 @@ struct pf_pool_limit pf_pool_limits[PF_LIMIT_MAX] = {
{ &pfr_kentry_pl, PFR_KENTRY_HIWAT }
};
+enum { PF_ICMP_MULTI_NONE, PF_ICMP_MULTI_SOLICITED, PF_ICMP_MULTI_LINK };
+
+
#define STATE_LOOKUP(i, k, d, s, m) \
do { \
s = pf_find_state(i, k, d, m); \
@@ -1548,6 +1557,154 @@ pf_change_a6(struct pf_addr *a, u_int16_t *c, struct pf_addr *an, u_int8_t u)
}
#endif /* INET6 */
+int
+pf_icmp_mapping(struct pf_pdesc *pd, u_int8_t type,
+ int *icmp_dir, int *multi, u_int16_t *icmpid, u_int16_t *icmptype)
+{
+ /*
+ * ICMP types marked with PF_OUT are typically responses to
+ * PF_IN, and will match states in the opposite direction.
+ * PF_IN ICMP types need to match a state with that type.
+ */
+ *icmp_dir = PF_OUT;
+ *multi = PF_ICMP_MULTI_LINK;
+ /* Queries (and responses) */
+ switch (type) {
+ case ICMP_ECHO:
+ *icmp_dir = PF_IN;
+ case ICMP_ECHOREPLY:
+ *icmptype = ICMP_ECHO;
+ *icmpid = pd->hdr.icmp->icmp_id;
+ break;
+
+ case ICMP_TSTAMP:
+ *icmp_dir = PF_IN;
+ case ICMP_TSTAMPREPLY:
+ *icmptype = ICMP_TSTAMP;
+ *icmpid = 0; /* Time is not a secret. */
+ break;
+
+ case ICMP_IREQ:
+ *icmp_dir = PF_IN;
+ case ICMP_IREQREPLY:
+ *icmptype = ICMP_IREQ;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case ICMP_MASKREQ:
+ *icmp_dir = PF_IN;
+ case ICMP_MASKREPLY:
+ *icmptype = ICMP_MASKREQ;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case ICMP_IPV6_WHEREAREYOU:
+ *icmp_dir = PF_IN;
+ case ICMP_IPV6_IAMHERE:
+ *icmptype = ICMP_IPV6_WHEREAREYOU;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case ICMP_MOBILE_REGREQUEST:
+ *icmp_dir = PF_IN;
+ case ICMP_MOBILE_REGREPLY:
+ *icmptype = ICMP_MOBILE_REGREQUEST;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case ICMP_ROUTERSOLICIT:
+ *icmp_dir = PF_IN;
+ case ICMP_ROUTERADVERT:
+ *icmptype = ICMP_ROUTERSOLICIT;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+#ifdef INET6
+ case ICMP6_ECHO_REQUEST:
+ *icmp_dir = PF_IN;
+ case ICMP6_ECHO_REPLY:
+ *icmptype = ICMP6_ECHO_REQUEST;
+ *icmpid = pd->hdr.icmp6->icmp6_id;
+ break;
+
+ case MLD_LISTENER_QUERY:
+ *icmp_dir = PF_IN;
+ case MLD_LISTENER_REPORT: {
+ struct mld_hdr *mld = (void *)pd->hdr.icmp6;
+
+ *icmptype = MLD_LISTENER_QUERY;
+ /* generate fake id for these messages */
+ *icmpid = (mld->mld_addr.s6_addr32[0] ^
+ mld->mld_addr.s6_addr32[1] ^
+ mld->mld_addr.s6_addr32[2] ^
+ mld->mld_addr.s6_addr32[3]) & 0xffff;
+ break;
+ }
+
+ /* ICMP6_FQDN and ICMP6_NI query/reply are the same type as ICMP6_WRU */
+ case ICMP6_WRUREQUEST:
+ *icmp_dir = PF_IN;
+ case ICMP6_WRUREPLY:
+ *icmptype = ICMP6_WRUREQUEST;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case MLD_MTRACE:
+ *icmp_dir = PF_IN;
+ case MLD_MTRACE_RESP:
+ *icmptype = MLD_MTRACE;
+ *icmpid = 0; /* Nothing sane to match on! */
+ break;
+
+ case ND_NEIGHBOR_SOLICIT:
+ *icmp_dir = PF_IN;
+ case ND_NEIGHBOR_ADVERT: {
+ struct nd_neighbor_solicit *nd = (void *)pd->hdr.icmp6;
+
+ *icmptype = ND_NEIGHBOR_SOLICIT;
+ *multi = PF_ICMP_MULTI_SOLICITED;
+ /* generate fake id for these messages */
+ *icmpid = (nd->nd_ns_target.s6_addr32[0] ^
+ nd->nd_ns_target.s6_addr32[1] ^
+ nd->nd_ns_target.s6_addr32[2] ^
+ nd->nd_ns_target.s6_addr32[3]) & 0xffff;
+ break;
+ }
+
+#endif /* INET6 */
+ /* These ICMP types map to other connections */
+ case ICMP_UNREACH:
+ case ICMP_SOURCEQUENCH:
+ case ICMP_REDIRECT:
+ case ICMP_TIMXCEED:
+ case ICMP_PARAMPROB:
+#ifdef INET6
+ /*
+ * ICMP6_TIME_EXCEEDED is the same type as ICMP_UNREACH
+ * ND_REDIRECT can't be in this list because the triggering packet
+ * header is optional.
+ */
+ case ICMP6_PACKET_TOO_BIG:
+#endif /* INET6 */
+ /* These will not be used, but set them anyways */
+ *icmp_dir = PF_IN;
+ *icmptype = htons(type);
+ *icmpid = 0;
+ return (1); /* These types are matched to other state */
+ /*
+ * All remaining ICMP types get their own states,
+ * and will only match in one direction.
+ */
+ default:
+ *icmp_dir = PF_IN;
+ *icmptype = type;
+ *icmpid = 0;
+ break;
+ }
+ HTONS(*icmptype);
+ return (0);
+}
+
void
pf_change_icmp(struct pf_addr *ia, u_int16_t *ip, struct pf_addr *oa,
struct pf_addr *na, u_int16_t np, u_int16_t *pc, u_int16_t *h2c,
@@ -2458,8 +2615,8 @@ pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction,
int tag = -1, rtableid = -1;
int asd = 0;
int match = 0;
- int state_icmp = 0;
- u_int16_t sport, dport;
+ int state_icmp = 0, icmp_dir, multi;
+ u_int16_t sport, dport, virtual_type, virtual_id;
u_int16_t bproto_sum = 0, bip_sum;
u_int8_t icmptype = 0, icmpcode = 0;
@@ -2484,33 +2641,36 @@ pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction,
case IPPROTO_ICMP:
if (pd->af != AF_INET)
break;
- sport = dport = pd->hdr.icmp->icmp_id;
hdrlen = sizeof(*pd->hdr.icmp);
icmptype = pd->hdr.icmp->icmp_type;
icmpcode = pd->hdr.icmp->icmp_code;
-
- if (icmptype == ICMP_UNREACH ||
- icmptype == ICMP_SOURCEQUENCH ||
- icmptype == ICMP_REDIRECT ||
- icmptype == ICMP_TIMXCEED ||
- icmptype == ICMP_PARAMPROB)
- state_icmp++;
+ state_icmp = pf_icmp_mapping(pd, icmptype,
+ &icmp_dir, &multi, &virtual_id, &virtual_type);
+ if (icmp_dir == PF_IN) {
+ sport = virtual_id;
+ dport = virtual_type;
+ } else {
+ sport = virtual_type;
+ dport = virtual_id;
+ }
break;
#endif /* INET */
#ifdef INET6
case IPPROTO_ICMPV6:
if (af != AF_INET6)
break;
- sport = dport = pd->hdr.icmp6->icmp6_id;
hdrlen = sizeof(*pd->hdr.icmp6);
icmptype = pd->hdr.icmp6->icmp6_type;
icmpcode = pd->hdr.icmp6->icmp6_code;
-
- if (icmptype == ICMP6_DST_UNREACH ||
- icmptype == ICMP6_PACKET_TOO_BIG ||
- icmptype == ICMP6_TIME_EXCEEDED ||
- icmptype == ICMP6_PARAM_PROB)
- state_icmp++;
+ state_icmp = pf_icmp_mapping(pd, icmptype,
+ &icmp_dir, &multi, &virtual_id, &virtual_type);
+ if (icmp_dir == PF_IN) {
+ sport = virtual_id;
+ dport = virtual_type;
+ } else {
+ sport = virtual_type;
+ dport = virtual_id;
+ }
break;
#endif /* INET6 */
default:
@@ -2582,7 +2742,6 @@ pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction,
break;
#ifdef INET
case IPPROTO_ICMP:
- nk->port[0] = nk->port[1];
if (PF_ANEQ(saddr, &nk->addr[pd->sidx], AF_INET))
pf_change_a(&saddr->v4.s_addr, pd->ip_sum,
nk->addr[pd->sidx].v4.s_addr, 0);
@@ -2591,11 +2750,12 @@ pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction,
pf_change_a(&daddr->v4.s_addr, pd->ip_sum,
nk->addr[pd->didx].v4.s_addr, 0);
- if (nk->port[1] != pd->hdr.icmp->icmp_id) {
+ if (virtual_type == ICMP_ECHO &&
+ nk->port[pd->sidx] != pd->hdr.icmp->icmp_id) {
pd->hdr.icmp->icmp_cksum = pf_cksum_fixup(
pd->hdr.icmp->icmp_cksum, sport,
- nk->port[1], 0);
- pd->hdr.icmp->icmp_id = nk->port[1];
+ nk->port[pd->sidx], 0);
+ pd->hdr.icmp->icmp_id = nk->port[pd->sidx];
pd->sport = &pd->hdr.icmp->icmp_id;
}
m_copyback(m, off, ICMP_MINLEN, pd->hdr.icmp);
@@ -2603,7 +2763,6 @@ pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction,
#endif /* INET */
#ifdef INET6
case IPPROTO_ICMPV6:
- nk->port[0] = nk->port[1];
if (PF_ANEQ(saddr, &nk->addr[pd->sidx], AF_INET6))
pf_change_a6(saddr, &pd->hdr.icmp6->icmp6_cksum,
&nk->addr[pd->sidx], 0);
@@ -3794,13 +3953,66 @@ pf_test_state_udp(struct pf_state **state, int direction, struct pfi_kif *kif,
}
int
+pf_icmp_state_lookup(struct pf_state_key_cmp *key, struct pf_pdesc *pd,
+ struct pf_state **state, struct mbuf *m, int direction, struct pfi_kif *kif,
+ u_int16_t icmpid, u_int16_t type, int icmp_dir, int *iidx, int multi)
+{
+ key->af = pd->af;
+ key->proto = pd->proto;
+ if (icmp_dir == PF_IN) {
+ *iidx = pd->sidx;
+ key->port[pd->sidx] = icmpid;
+ key->port[pd->didx] = type;
+ } else {
+ *iidx = pd->didx;
+ key->port[pd->sidx] = type;
+ key->port[pd->didx] = icmpid;
+ }
+ if (pd->af == AF_INET6 && multi != PF_ICMP_MULTI_NONE) {
+ switch (multi) {
+ case PF_ICMP_MULTI_SOLICITED:
+ key->addr[pd->sidx].addr32[0] = IPV6_ADDR_INT32_MLL;
+ key->addr[pd->sidx].addr32[1] = 0;
+ key->addr[pd->sidx].addr32[2] = IPV6_ADDR_INT32_ONE;
+ key->addr[pd->sidx].addr32[3] = pd->src->addr32[3];
+ key->addr[pd->sidx].addr8[12] = 0xff;
+ break;
+ case PF_ICMP_MULTI_LINK:
+ key->addr[pd->sidx].addr32[0] = IPV6_ADDR_INT32_MLL;
+ key->addr[pd->sidx].addr32[1] = 0;
+ key->addr[pd->sidx].addr32[2] = 0;
+ key->addr[pd->sidx].addr32[3] = IPV6_ADDR_INT32_ONE;
+ break;
+ }
+ } else
+ PF_ACPY(&key->addr[pd->sidx], pd->src, key->af);
+ PF_ACPY(&key->addr[pd->didx], pd->dst, key->af);
+
+ STATE_LOOKUP(kif, key, direction, *state, m);
+
+ /* Is this ICMP message flowing in right direction? */
+ if ((*state)->rule.ptr->type &&
+ (((*state)->direction == direction) ?
+ PF_IN : PF_OUT) != icmp_dir) {
+ if (pf_status.debug >= PF_DEBUG_MISC) {
+ printf("pf: icmp type %d in wrong direction (%d): ",
+ icmp_dir);
+ pf_print_state(*state);
+ printf("\n");
+ }
+ return (PF_DROP);
+ }
+ return (-1);
+}
+
+int
pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
struct mbuf *m, int off, void *h, struct pf_pdesc *pd, u_short *reason)
{
struct pf_addr *saddr = pd->src, *daddr = pd->dst;
- u_int16_t icmpid, *icmpsum;
+ u_int16_t icmpid, *icmpsum, virtual_id, virtual_type;
u_int8_t icmptype;
- int state_icmp = 0;
+ int icmp_dir, iidx, ret, multi;
struct pf_state_key_cmp key;
switch (pd->proto) {
@@ -3809,13 +4021,6 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
icmptype = pd->hdr.icmp->icmp_type;
icmpid = pd->hdr.icmp->icmp_id;
icmpsum = &pd->hdr.icmp->icmp_cksum;
-
- if (icmptype == ICMP_UNREACH ||
- icmptype == ICMP_SOURCEQUENCH ||
- icmptype == ICMP_REDIRECT ||
- icmptype == ICMP_TIMXCEED ||
- icmptype == ICMP_PARAMPROB)
- state_icmp++;
break;
#endif /* INET */
#ifdef INET6
@@ -3823,35 +4028,31 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
icmptype = pd->hdr.icmp6->icmp6_type;
icmpid = pd->hdr.icmp6->icmp6_id;
icmpsum = &pd->hdr.icmp6->icmp6_cksum;
-
- if (icmptype == ICMP6_DST_UNREACH ||
- icmptype == ICMP6_PACKET_TOO_BIG ||
- icmptype == ICMP6_TIME_EXCEEDED ||
- icmptype == ICMP6_PARAM_PROB)
- state_icmp++;
break;
#endif /* INET6 */
}
-
- if (!state_icmp) {
-
+
+ if (pf_icmp_mapping(pd, icmptype, &icmp_dir, &multi,
+ &virtual_id, &virtual_type) == 0) {
/*
* ICMP query/reply message not related to a TCP/UDP packet.
* Search for an ICMP state.
*/
- key.af = pd->af;
- key.proto = pd->proto;
- key.port[0] = key.port[1] = icmpid;
- if (direction == PF_IN) { /* wire side, straight */
- PF_ACPY(&key.addr[0], pd->src, key.af);
- PF_ACPY(&key.addr[1], pd->dst, key.af);
- } else { /* stack side, reverse */
- PF_ACPY(&key.addr[1], pd->src, key.af);
- PF_ACPY(&key.addr[0], pd->dst, key.af);
+ ret = pf_icmp_state_lookup(&key, pd, state, m, direction,
+ kif, virtual_id, virtual_type, icmp_dir, &iidx,
+ PF_ICMP_MULTI_NONE);
+ if (ret >= 0) {
+ if (ret == PF_DROP && pd->af == AF_INET6 &&
+ icmp_dir == PF_OUT) {
+ ret = pf_icmp_state_lookup(&key, pd, state, m,
+ direction, kif, virtual_id, virtual_type,
+ icmp_dir, &iidx, multi);
+ if (ret >= 0)
+ return (ret);
+ } else
+ return (ret);
}
- STATE_LOOKUP(kif, &key, direction, *state, m);
-
(*state)->expire = time_second;
(*state)->timeout = PFTM_ICMP_ERROR_REPLY;
@@ -3874,14 +4075,13 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
pd->ip_sum,
nk->addr[pd->didx].v4.s_addr, 0);
- if (nk->port[0] !=
+ if (nk->port[iidx] !=
pd->hdr.icmp->icmp_id) {
pd->hdr.icmp->icmp_cksum =
pf_cksum_fixup(
pd->hdr.icmp->icmp_cksum, icmpid,
- nk->port[pd->sidx], 0);
- pd->hdr.icmp->icmp_id =
- nk->port[pd->sidx];
+ nk->port[iidx], 0);
+ pd->hdr.icmp->icmp_id = nk->port[iidx];
}
m_copyback(m, off, ICMP_MINLEN,
@@ -4231,13 +4431,15 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
return (PF_DROP);
}
- key.af = pd2.af;
- key.proto = IPPROTO_ICMP;
- PF_ACPY(&key.addr[pd2.sidx], pd2.src, key.af);
- PF_ACPY(&key.addr[pd2.didx], pd2.dst, key.af);
- key.port[0] = key.port[1] = iih.icmp_id;
+ icmpid = iih.icmp_id;
+ pf_icmp_mapping(&pd2, iih.icmp_type,
+ &icmp_dir, &multi, &virtual_id, &virtual_type);
- STATE_LOOKUP(kif, &key, direction, *state, m);
+ ret = pf_icmp_state_lookup(&key, &pd2, state, m,
+ direction, kif, virtual_id, virtual_type,
+ icmp_dir, &iidx, PF_ICMP_MULTI_NONE);
+ if (ret >= 0)
+ return (ret);
/* translate source/destination address, if necessary */
if ((*state)->key[PF_SK_WIRE] !=
@@ -4247,20 +4449,21 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
if (PF_ANEQ(pd2.src,
&nk->addr[pd2.sidx], pd2.af) ||
- nk->port[pd2.sidx] != iih.icmp_id)
- pf_change_icmp(pd2.src, &iih.icmp_id,
+ (virtual_type == ICMP_ECHO &&
+ nk->port[iidx] != iih.icmp_id))
+ pf_change_icmp(pd2.src,
+ (virtual_type == ICMP_ECHO) ?
+ &iih.icmp_id : NULL,
daddr, &nk->addr[pd2.sidx],
- nk->port[pd2.sidx], NULL,
+ (virtual_type == ICMP_ECHO) ?
+ nk->port[iidx] : NULL, NULL,
pd2.ip_sum, icmpsum,
pd->ip_sum, 0, AF_INET);
if (PF_ANEQ(pd2.dst,
- &nk->addr[pd2.didx], pd2.af) ||
- nk->port[pd2.didx] != iih.icmp_id)
- pf_change_icmp(pd2.dst, &iih.icmp_id,
- NULL, /* XXX Inbound NAT? */
- &nk->addr[pd2.didx],
- nk->port[pd2.didx], NULL,
+ &nk->addr[pd2.didx], pd2.af))
+ pf_change_icmp(pd2.dst, NULL, NULL,
+ &nk->addr[pd2.didx], 0, NULL,
pd2.ip_sum, icmpsum,
pd->ip_sum, 0, AF_INET);
@@ -4284,13 +4487,23 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
return (PF_DROP);
}
- key.af = pd2.af;
- key.proto = IPPROTO_ICMPV6;
- PF_ACPY(&key.addr[pd2.sidx], pd2.src, key.af);
- PF_ACPY(&key.addr[pd2.didx], pd2.dst, key.af);
- key.port[0] = key.port[1] = iih.icmp6_id;
-
- STATE_LOOKUP(kif, &key, direction, *state, m);
+ pf_icmp_mapping(&pd2, iih.icmp6_type,
+ &icmp_dir, &multi, &virtual_id, &virtual_type);
+ ret = pf_icmp_state_lookup(&key, &pd2, state, m,
+ direction, kif, virtual_id, virtual_type,
+ icmp_dir, &iidx, PF_ICMP_MULTI_NONE);
+ if (ret >= 0) {
+ if (ret == PF_DROP && pd->af == AF_INET6 &&
+ icmp_dir == PF_OUT) {
+ ret = pf_icmp_state_lookup(&key, pd,
+ state, m, direction, kif,
+ virtual_id, virtual_type,
+ icmp_dir, &iidx, multi);
+ if (ret >= 0)
+ return (ret);
+ } else
+ return (ret);
+ }
/* translate source/destination address, if necessary */
if ((*state)->key[PF_SK_WIRE] !=
@@ -4300,20 +4513,21 @@ pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif,
if (PF_ANEQ(pd2.src,
&nk->addr[pd2.sidx], pd2.af) ||
- nk->port[pd2.sidx] != iih.icmp6_id)
- pf_change_icmp(pd2.src, &iih.icmp6_id,
+ ((virtual_type == ICMP6_ECHO_REQUEST) &&
+ nk->port[pd2.sidx] != iih.icmp6_id))
+ pf_change_icmp(pd2.src,
+ (virtual_type == ICMP6_ECHO_REQUEST)
+ ? &iih.icmp6_id : NULL,
daddr, &nk->addr[pd2.sidx],
- nk->port[pd2.sidx], NULL,
+ (virtual_type == ICMP6_ECHO_REQUEST)
+ ? nk->port[iidx] : NULL, NULL,
pd2.ip_sum, icmpsum,
pd->ip_sum, 0, AF_INET6);
if (PF_ANEQ(pd2.dst,
- &nk->addr[pd2.didx], pd2.af) ||
- nk->port[pd2.didx] != iih.icmp6_id)
- pf_change_icmp(pd2.dst, &iih.icmp6_id,
- NULL, /* XXX Inbound NAT? */
- &nk->addr[pd2.didx],
- nk->port[pd2.didx], NULL,
+ &nk->addr[pd2.didx], pd2.af))
+ pf_change_icmp(pd2.dst, NULL, NULL,
+ &nk->addr[pd2.didx], 0, NULL,
pd2.ip_sum, icmpsum,
pd->ip_sum, 0, AF_INET6);
@@ -5598,10 +5812,32 @@ pf_test6(int dir, struct ifnet *ifp, struct mbuf **m0,
}
case IPPROTO_ICMPV6: {
- struct icmp6_hdr ih;
-
- pd.hdr.icmp6 = &ih;
- if (!pf_pull_hdr(m, off, &ih, sizeof(ih),
+ union {
+ struct icmp6_hdr icmp6;
+ struct mld_hdr mld;
+ struct nd_neighbor_solicit nd;
+ } ih;
+ size_t icmp_hlen = sizeof(struct icmp6_hdr);
+
+ pd.hdr.icmp6 = &ih.icmp6;
+ if (!pf_pull_hdr(m, off, &ih, icmp_hlen,
+ &action, &reason, AF_INET6)) {
+ log = action != PF_PASS;
+ goto done;
+ }
+ /* ICMP headers we look further into to match state */
+ switch (ih.icmp6.icmp6_type) {
+ case MLD_LISTENER_QUERY:
+ case MLD_LISTENER_REPORT:
+ icmp_hlen = sizeof(struct mld_hdr);
+ break;
+ case ND_NEIGHBOR_SOLICIT:
+ case ND_NEIGHBOR_ADVERT:
+ icmp_hlen = sizeof(struct nd_neighbor_solicit);
+ break;
+ }
+ if (icmp_hlen > sizeof(struct icmp6_hdr) &&
+ !pf_pull_hdr(m, off, &ih, icmp_hlen,
&action, &reason, AF_INET6)) {
log = action != PF_PASS;
goto done;
diff --git a/sys/net/pf_lb.c b/sys/net/pf_lb.c
index b826f6a3556..fb432b7fbdd 100644
--- a/sys/net/pf_lb.c
+++ b/sys/net/pf_lb.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: pf_lb.c,v 1.3 2009/02/18 20:06:23 henning Exp $ */
+/* $OpenBSD: pf_lb.c,v 1.4 2009/03/05 03:09:37 mcbride Exp $ */
/*
* Copyright (c) 2001 Daniel Hartmeier
@@ -262,9 +262,12 @@ pf_get_sport(sa_family_t af, u_int8_t proto, struct pf_rule *r,
if (pf_map_addr(af, r, saddr, naddr, &init_addr, sn))
return (1);
- if (proto == IPPROTO_ICMP) {
- low = 1;
- high = 65535;
+ if (proto == IPPROTO_ICMP || proto == IPPROTO_ICMPV6) {
+ if (dport == ICMP6_ECHO_REQUEST || dport == ICMP_ECHO) {
+ low = 1;
+ high = 65535;
+ } else
+ return (0); /* Don't try to modify non-echo ICMP */
}
do {