Support multiple virtual IPs on peer_cfg and ike_sa classes
[strongswan.git] / src / libcharon / sa / ikev2 / tasks / ike_config.c
1 /*
2 * Copyright (C) 2007 Martin Willi
3 * Copyright (C) 2006-2007 Fabian Hartmann, Noah Heusser
4 * Hochschule fuer Technik Rapperswil
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 *
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14 * for more details.
15 */
16
17 #include "ike_config.h"
18
19 #include <daemon.h>
20 #include <hydra.h>
21 #include <encoding/payloads/cp_payload.h>
22
23 typedef struct private_ike_config_t private_ike_config_t;
24
25 /**
26 * Private members of a ike_config_t task.
27 */
28 struct private_ike_config_t {
29
30 /**
31 * Public methods and task_t interface.
32 */
33 ike_config_t public;
34
35 /**
36 * Assigned IKE_SA.
37 */
38 ike_sa_t *ike_sa;
39
40 /**
41 * Are we the initiator?
42 */
43 bool initiator;
44
45 /**
46 * virtual ip
47 */
48 host_t *virtual_ip;
49
50 /**
51 * list of attributes requested and its handler, entry_t
52 */
53 linked_list_t *requested;
54 };
55
56 /**
57 * Entry for a requested attribute and the requesting handler
58 */
59 typedef struct {
60 /** attribute requested */
61 configuration_attribute_type_t type;
62 /** handler requesting this attribute */
63 attribute_handler_t *handler;
64 } entry_t;
65
66 /**
67 * build INTERNAL_IPV4/6_ADDRESS attribute from virtual ip
68 */
69 static configuration_attribute_t *build_vip(host_t *vip)
70 {
71 configuration_attribute_type_t type;
72 chunk_t chunk, prefix;
73
74 if (vip->get_family(vip) == AF_INET)
75 {
76 type = INTERNAL_IP4_ADDRESS;
77 if (vip->is_anyaddr(vip))
78 {
79 chunk = chunk_empty;
80 }
81 else
82 {
83 chunk = vip->get_address(vip);
84 }
85 }
86 else
87 {
88 type = INTERNAL_IP6_ADDRESS;
89 if (vip->is_anyaddr(vip))
90 {
91 chunk = chunk_empty;
92 }
93 else
94 {
95 prefix = chunk_alloca(1);
96 *prefix.ptr = 64;
97 chunk = vip->get_address(vip);
98 chunk = chunk_cata("cc", chunk, prefix);
99 }
100 }
101 return configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
102 type, chunk);
103 }
104
105 /**
106 * Handle a received attribute as initiator
107 */
108 static void handle_attribute(private_ike_config_t *this,
109 configuration_attribute_t *ca)
110 {
111 attribute_handler_t *handler = NULL;
112 enumerator_t *enumerator;
113 entry_t *entry;
114
115 /* find the handler which requested this attribute */
116 enumerator = this->requested->create_enumerator(this->requested);
117 while (enumerator->enumerate(enumerator, &entry))
118 {
119 if (entry->type == ca->get_type(ca))
120 {
121 handler = entry->handler;
122 this->requested->remove_at(this->requested, enumerator);
123 free(entry);
124 break;
125 }
126 }
127 enumerator->destroy(enumerator);
128
129 /* and pass it to the handle function */
130 handler = hydra->attributes->handle(hydra->attributes,
131 this->ike_sa->get_other_id(this->ike_sa), handler,
132 ca->get_type(ca), ca->get_chunk(ca));
133 if (handler)
134 {
135 this->ike_sa->add_configuration_attribute(this->ike_sa,
136 handler, ca->get_type(ca), ca->get_chunk(ca));
137 }
138 }
139
140 /**
141 * process a single configuration attribute
142 */
143 static void process_attribute(private_ike_config_t *this,
144 configuration_attribute_t *ca)
145 {
146 host_t *ip;
147 chunk_t addr;
148 int family = AF_INET6;
149
150 switch (ca->get_type(ca))
151 {
152 case INTERNAL_IP4_ADDRESS:
153 family = AF_INET;
154 /* fall */
155 case INTERNAL_IP6_ADDRESS:
156 {
157 addr = ca->get_chunk(ca);
158 if (addr.len == 0)
159 {
160 ip = host_create_any(family);
161 }
162 else
163 {
164 /* skip prefix byte in IPv6 payload*/
165 if (family == AF_INET6)
166 {
167 addr.len--;
168 }
169 ip = host_create_from_chunk(family, addr, 0);
170 }
171 if (ip)
172 {
173 DESTROY_IF(this->virtual_ip);
174 this->virtual_ip = ip;
175 }
176 break;
177 }
178 case INTERNAL_IP4_SERVER:
179 case INTERNAL_IP6_SERVER:
180 /* assume it's a Windows client if we see proprietary attributes */
181 this->ike_sa->enable_extension(this->ike_sa, EXT_MS_WINDOWS);
182 /* fall */
183 default:
184 {
185 if (this->initiator)
186 {
187 handle_attribute(this, ca);
188 }
189 }
190 }
191 }
192
193 /**
194 * Scan for configuration payloads and attributes
195 */
196 static void process_payloads(private_ike_config_t *this, message_t *message)
197 {
198 enumerator_t *enumerator, *attributes;
199 payload_t *payload;
200
201 enumerator = message->create_payload_enumerator(message);
202 while (enumerator->enumerate(enumerator, &payload))
203 {
204 if (payload->get_type(payload) == CONFIGURATION)
205 {
206 cp_payload_t *cp = (cp_payload_t*)payload;
207 configuration_attribute_t *ca;
208
209 switch (cp->get_type(cp))
210 {
211 case CFG_REQUEST:
212 case CFG_REPLY:
213 {
214 attributes = cp->create_attribute_enumerator(cp);
215 while (attributes->enumerate(attributes, &ca))
216 {
217 DBG2(DBG_IKE, "processing %N attribute",
218 configuration_attribute_type_names, ca->get_type(ca));
219 process_attribute(this, ca);
220 }
221 attributes->destroy(attributes);
222 break;
223 }
224 default:
225 DBG1(DBG_IKE, "ignoring %N config payload",
226 config_type_names, cp->get_type(cp));
227 break;
228 }
229 }
230 }
231 enumerator->destroy(enumerator);
232 }
233
234 METHOD(task_t, build_i, status_t,
235 private_ike_config_t *this, message_t *message)
236 {
237 if (message->get_message_id(message) == 1)
238 { /* in first IKE_AUTH only */
239 cp_payload_t *cp = NULL;
240 enumerator_t *enumerator;
241 attribute_handler_t *handler;
242 peer_cfg_t *config;
243 configuration_attribute_type_t type;
244 chunk_t data;
245 host_t *vip;
246
247 /* reuse virtual IP if we already have one */
248 enumerator = this->ike_sa->create_virtual_ip_enumerator(this->ike_sa,
249 TRUE);
250 if (!enumerator->enumerate(enumerator, &vip))
251 {
252 enumerator->destroy(enumerator);
253 config = this->ike_sa->get_peer_cfg(this->ike_sa);
254 enumerator = config->create_virtual_ip_enumerator(config);
255 if (!enumerator->enumerate(enumerator, &vip))
256 {
257 vip = NULL;
258 }
259 }
260 enumerator->destroy(enumerator);
261 if (vip)
262 {
263 cp = cp_payload_create_type(CONFIGURATION, CFG_REQUEST);
264 cp->add_attribute(cp, build_vip(vip));
265 }
266
267 enumerator = hydra->attributes->create_initiator_enumerator(hydra->attributes,
268 this->ike_sa->get_other_id(this->ike_sa), vip);
269 while (enumerator->enumerate(enumerator, &handler, &type, &data))
270 {
271 configuration_attribute_t *ca;
272 entry_t *entry;
273
274 /* create configuration attribute */
275 DBG2(DBG_IKE, "building %N attribute",
276 configuration_attribute_type_names, type);
277 ca = configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
278 type, data);
279 if (!cp)
280 {
281 cp = cp_payload_create_type(CONFIGURATION, CFG_REQUEST);
282 }
283 cp->add_attribute(cp, ca);
284
285 /* save handler along with requested type */
286 entry = malloc_thing(entry_t);
287 entry->type = type;
288 entry->handler = handler;
289
290 this->requested->insert_last(this->requested, entry);
291 }
292 enumerator->destroy(enumerator);
293
294 if (cp)
295 {
296 message->add_payload(message, (payload_t*)cp);
297 }
298 }
299 return NEED_MORE;
300 }
301
302 METHOD(task_t, process_r, status_t,
303 private_ike_config_t *this, message_t *message)
304 {
305 if (message->get_message_id(message) == 1)
306 { /* in first IKE_AUTH only */
307 process_payloads(this, message);
308 }
309 return NEED_MORE;
310 }
311
312 METHOD(task_t, build_r, status_t,
313 private_ike_config_t *this, message_t *message)
314 {
315 if (this->ike_sa->get_state(this->ike_sa) == IKE_ESTABLISHED)
316 { /* in last IKE_AUTH exchange */
317 enumerator_t *enumerator;
318 configuration_attribute_type_t type;
319 chunk_t value;
320 host_t *vip = NULL;
321 cp_payload_t *cp = NULL;
322 peer_cfg_t *config;
323 identification_t *id;
324
325 id = this->ike_sa->get_other_eap_id(this->ike_sa);
326
327 config = this->ike_sa->get_peer_cfg(this->ike_sa);
328 if (this->virtual_ip)
329 {
330 DBG1(DBG_IKE, "peer requested virtual IP %H", this->virtual_ip);
331 if (config->get_pool(config))
332 {
333 vip = hydra->attributes->acquire_address(hydra->attributes,
334 config->get_pool(config), id, this->virtual_ip);
335 }
336 if (vip == NULL)
337 {
338 DBG1(DBG_IKE, "no virtual IP found, sending %N",
339 notify_type_names, INTERNAL_ADDRESS_FAILURE);
340 message->add_notify(message, FALSE, INTERNAL_ADDRESS_FAILURE,
341 chunk_empty);
342 return SUCCESS;
343 }
344 DBG1(DBG_IKE, "assigning virtual IP %H to peer '%Y'", vip, id);
345 this->ike_sa->add_virtual_ip(this->ike_sa, FALSE, vip);
346
347 cp = cp_payload_create_type(CONFIGURATION, CFG_REPLY);
348 cp->add_attribute(cp, build_vip(vip));
349 }
350
351 /* query registered providers for additional attributes to include */
352 enumerator = hydra->attributes->create_responder_enumerator(
353 hydra->attributes, config->get_pool(config), id, vip);
354 while (enumerator->enumerate(enumerator, &type, &value))
355 {
356 if (!cp)
357 {
358 cp = cp_payload_create_type(CONFIGURATION, CFG_REPLY);
359 }
360 DBG2(DBG_IKE, "building %N attribute",
361 configuration_attribute_type_names, type);
362 cp->add_attribute(cp,
363 configuration_attribute_create_chunk(CONFIGURATION_ATTRIBUTE,
364 type, value));
365 }
366 enumerator->destroy(enumerator);
367
368 if (cp)
369 {
370 message->add_payload(message, (payload_t*)cp);
371 }
372 DESTROY_IF(vip);
373 return SUCCESS;
374 }
375 return NEED_MORE;
376 }
377
378 METHOD(task_t, process_i, status_t,
379 private_ike_config_t *this, message_t *message)
380 {
381 if (this->ike_sa->get_state(this->ike_sa) == IKE_ESTABLISHED)
382 { /* in last IKE_AUTH exchange */
383
384 process_payloads(this, message);
385
386 if (this->virtual_ip &&
387 !this->virtual_ip->is_anyaddr(this->virtual_ip))
388 {
389 this->ike_sa->add_virtual_ip(this->ike_sa, TRUE, this->virtual_ip);
390 }
391 return SUCCESS;
392 }
393 return NEED_MORE;
394 }
395
396 METHOD(task_t, get_type, task_type_t,
397 private_ike_config_t *this)
398 {
399 return TASK_IKE_CONFIG;
400 }
401
402 METHOD(task_t, migrate, void,
403 private_ike_config_t *this, ike_sa_t *ike_sa)
404 {
405 DESTROY_IF(this->virtual_ip);
406
407 this->ike_sa = ike_sa;
408 this->virtual_ip = NULL;
409 this->requested->destroy_function(this->requested, free);
410 this->requested = linked_list_create();
411 }
412
413 METHOD(task_t, destroy, void,
414 private_ike_config_t *this)
415 {
416 DESTROY_IF(this->virtual_ip);
417 this->requested->destroy_function(this->requested, free);
418 free(this);
419 }
420
421 /*
422 * Described in header.
423 */
424 ike_config_t *ike_config_create(ike_sa_t *ike_sa, bool initiator)
425 {
426 private_ike_config_t *this;
427
428 INIT(this,
429 .public = {
430 .task = {
431 .get_type = _get_type,
432 .migrate = _migrate,
433 .destroy = _destroy,
434 },
435 },
436 .initiator = initiator,
437 .ike_sa = ike_sa,
438 .requested = linked_list_create(),
439 );
440
441 if (initiator)
442 {
443 this->public.task.build = _build_i;
444 this->public.task.process = _process_i;
445 }
446 else
447 {
448 this->public.task.build = _build_r;
449 this->public.task.process = _process_r;
450 }
451
452 return &this->public;
453 }