implemented IKEv2 force_encap connection parameter
[strongswan.git] / src / stroke / stroke.c
1 /* Stroke for charon is the counterpart to whack from pluto
2 * Copyright (C) 2006 Martin Willi - Hochschule fuer Technik Rapperswil
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms of the GNU General Public License as published by the
6 * Free Software Foundation; either version 2 of the License, or (at your
7 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
11 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * for more details.
13 */
14
15 #include <stdlib.h>
16 #include <sys/types.h>
17 #include <sys/stat.h>
18 #include <sys/socket.h>
19 #include <sys/un.h>
20 #include <sys/fcntl.h>
21 #include <unistd.h>
22 #include <dirent.h>
23 #include <errno.h>
24 #include <stdio.h>
25 #include <stddef.h>
26
27 #include "stroke.h"
28 #include "stroke_keywords.h"
29
30 struct stroke_token {
31 char *name;
32 stroke_keyword_t kw;
33 };
34
35 static char* push_string(stroke_msg_t *msg, char *string)
36 {
37 unsigned long string_start = msg->length;
38
39 if (string == NULL || msg->length + strlen(string) >= sizeof(stroke_msg_t))
40 {
41 return NULL;
42 }
43 else
44 {
45 msg->length += strlen(string) + 1;
46 strcpy((char*)msg + string_start, string);
47 return (char*)string_start;
48 }
49 }
50
51 static int send_stroke_msg (stroke_msg_t *msg)
52 {
53 struct sockaddr_un ctl_addr = { AF_UNIX, STROKE_SOCKET };
54 int sock;
55 char buffer[64];
56 int byte_count;
57
58 msg->output_verbosity = 1; /* CONTROL */
59
60 sock = socket(AF_UNIX, SOCK_STREAM, 0);
61 if (sock < 0)
62 {
63 fprintf(stderr, "Opening unix socket %s: %s\n", STROKE_SOCKET, strerror(errno));
64 return -1;
65 }
66 if (connect(sock, (struct sockaddr *)&ctl_addr,
67 offsetof(struct sockaddr_un, sun_path) + strlen(ctl_addr.sun_path)) < 0)
68 {
69 fprintf(stderr, "Connect to socket failed: %s\n", strerror(errno));
70 close(sock);
71 return -1;
72 }
73
74 /* send message */
75 if (write(sock, msg, msg->length) != msg->length)
76 {
77 fprintf(stderr, "writing to socket failed: %s\n", strerror(errno));
78 close(sock);
79 return -1;
80 }
81
82 while ((byte_count = read(sock, buffer, sizeof(buffer)-1)) > 0)
83 {
84 buffer[byte_count] = '\0';
85 printf("%s", buffer);
86 }
87 if (byte_count < 0)
88 {
89 fprintf(stderr, "reading from socket failed: %s\n", strerror(errno));
90 }
91
92 close(sock);
93 return 0;
94 }
95
96 static int add_connection(char *name,
97 char *my_id, char *other_id,
98 char *my_addr, char *other_addr,
99 char *my_net, char *other_net,
100 u_int my_netmask, u_int other_netmask)
101 {
102 stroke_msg_t msg;
103
104 msg.length = offsetof(stroke_msg_t, buffer);
105 msg.type = STR_ADD_CONN;
106
107 msg.add_conn.name = push_string(&msg, name);
108 msg.add_conn.ikev2 = 1;
109 msg.add_conn.auth_method = 2;
110 msg.add_conn.eap_type = 0;
111 msg.add_conn.mode = 1;
112 msg.add_conn.mobike = 1;
113 msg.add_conn.force_encap = 0;
114
115 msg.add_conn.rekey.reauth = 0;
116 msg.add_conn.rekey.ipsec_lifetime = 0;
117 msg.add_conn.rekey.ike_lifetime = 0;
118 msg.add_conn.rekey.margin = 0;
119 msg.add_conn.rekey.tries = 0;
120 msg.add_conn.rekey.fuzz = 0;
121
122 msg.add_conn.algorithms.ike = NULL;
123 msg.add_conn.algorithms.esp = NULL;
124
125 msg.add_conn.dpd.delay = 0;
126 msg.add_conn.dpd.action = 1;
127
128 msg.add_conn.me.id = push_string(&msg, my_id);
129 msg.add_conn.me.address = push_string(&msg, my_addr);
130 msg.add_conn.me.subnet = push_string(&msg, my_net);
131 msg.add_conn.me.subnet_mask = my_netmask;
132 msg.add_conn.me.sourceip = NULL;
133 msg.add_conn.me.virtual_ip = 0;
134 msg.add_conn.me.cert = NULL;
135 msg.add_conn.me.ca = NULL;
136 msg.add_conn.me.sendcert = 1;
137 msg.add_conn.me.hostaccess = 0;
138 msg.add_conn.me.tohost = 0;
139 msg.add_conn.me.protocol = 0;
140 msg.add_conn.me.port = 0;
141
142 msg.add_conn.other.id = push_string(&msg, other_id);
143 msg.add_conn.other.address = push_string(&msg, other_addr);
144 msg.add_conn.other.subnet = push_string(&msg, other_net);
145 msg.add_conn.other.subnet_mask = other_netmask;
146 msg.add_conn.other.sourceip = NULL;
147 msg.add_conn.other.virtual_ip = 0;
148 msg.add_conn.other.cert = NULL;
149 msg.add_conn.other.ca = NULL;
150 msg.add_conn.other.sendcert = 1;
151 msg.add_conn.other.hostaccess = 0;
152 msg.add_conn.other.tohost = 0;
153 msg.add_conn.other.protocol = 0;
154 msg.add_conn.other.port = 0;
155
156 return send_stroke_msg(&msg);
157 }
158
159 static int del_connection(char *name)
160 {
161 stroke_msg_t msg;
162
163 msg.length = offsetof(stroke_msg_t, buffer);
164 msg.type = STR_DEL_CONN;
165 msg.initiate.name = push_string(&msg, name);
166 return send_stroke_msg(&msg);
167 }
168
169 static int initiate_connection(char *name)
170 {
171 stroke_msg_t msg;
172
173 msg.length = offsetof(stroke_msg_t, buffer);
174 msg.type = STR_INITIATE;
175 msg.initiate.name = push_string(&msg, name);
176 return send_stroke_msg(&msg);
177 }
178
179 static int terminate_connection(char *name)
180 {
181 stroke_msg_t msg;
182
183 msg.type = STR_TERMINATE;
184 msg.length = offsetof(stroke_msg_t, buffer);
185 msg.initiate.name = push_string(&msg, name);
186 return send_stroke_msg(&msg);
187 }
188
189 static int route_connection(char *name)
190 {
191 stroke_msg_t msg;
192
193 msg.type = STR_ROUTE;
194 msg.length = offsetof(stroke_msg_t, buffer);
195 msg.route.name = push_string(&msg, name);
196 return send_stroke_msg(&msg);
197 }
198
199 static int unroute_connection(char *name)
200 {
201 stroke_msg_t msg;
202
203 msg.type = STR_UNROUTE;
204 msg.length = offsetof(stroke_msg_t, buffer);
205 msg.unroute.name = push_string(&msg, name);
206 return send_stroke_msg(&msg);
207 }
208
209 static int show_status(stroke_keyword_t kw, char *connection)
210 {
211 stroke_msg_t msg;
212
213 msg.type = (kw == STROKE_STATUS)? STR_STATUS:STR_STATUS_ALL;
214 msg.length = offsetof(stroke_msg_t, buffer);
215 msg.status.name = push_string(&msg, connection);
216 return send_stroke_msg(&msg);
217 }
218
219 static int list_flags[] = {
220 LIST_CERTS,
221 LIST_CACERTS,
222 LIST_OCSPCERTS,
223 LIST_AACERTS,
224 LIST_ACERTS,
225 LIST_GROUPS,
226 LIST_CAINFOS,
227 LIST_CRLS,
228 LIST_OCSP,
229 LIST_ALL
230 };
231
232 static int list(stroke_keyword_t kw, int utc)
233 {
234 stroke_msg_t msg;
235
236 msg.type = STR_LIST;
237 msg.length = offsetof(stroke_msg_t, buffer);
238 msg.list.utc = utc;
239 msg.list.flags = list_flags[kw - STROKE_LIST_FIRST];
240 return send_stroke_msg(&msg);
241 }
242
243 static int reread_flags[] = {
244 REREAD_SECRETS,
245 REREAD_CACERTS,
246 REREAD_OCSPCERTS,
247 REREAD_AACERTS,
248 REREAD_ACERTS,
249 REREAD_CRLS,
250 REREAD_ALL
251 };
252
253 static int reread(stroke_keyword_t kw)
254 {
255 stroke_msg_t msg;
256
257 msg.type = STR_REREAD;
258 msg.length = offsetof(stroke_msg_t, buffer);
259 msg.reread.flags = reread_flags[kw - STROKE_REREAD_FIRST];
260 return send_stroke_msg(&msg);
261 }
262
263 static int purge_flags[] = {
264 PURGE_OCSP
265 };
266
267 static int purge(stroke_keyword_t kw)
268 {
269 stroke_msg_t msg;
270
271 msg.type = STR_PURGE;
272 msg.length = offsetof(stroke_msg_t, buffer);
273 msg.purge.flags = purge_flags[kw - STROKE_PURGE_FIRST];
274 return send_stroke_msg(&msg);
275 }
276
277 static int set_loglevel(char *type, u_int level)
278 {
279 stroke_msg_t msg;
280
281 msg.type = STR_LOGLEVEL;
282 msg.length = offsetof(stroke_msg_t, buffer);
283 msg.loglevel.type = push_string(&msg, type);
284 msg.loglevel.level = level;
285 return send_stroke_msg(&msg);
286 }
287
288 static void exit_error(char *error)
289 {
290 if (error)
291 {
292 fprintf(stderr, "%s\n", error);
293 }
294 exit(-1);
295 }
296
297 static void exit_usage(char *error)
298 {
299 printf("Usage:\n");
300 printf(" Add a connection:\n");
301 printf(" stroke add NAME MY_ID OTHER_ID MY_ADDR OTHER_ADDR\\\n");
302 printf(" MY_NET OTHER_NET MY_NETBITS OTHER_NETBITS\n");
303 printf(" where: ID is any IKEv2 ID \n");
304 printf(" ADDR is a IPv4 address\n");
305 printf(" NET is a IPv4 address of the subnet to tunnel\n");
306 printf(" NETBITS is the size of the subnet, as the \"24\" in 192.168.0.0/24\n");
307 printf(" Delete a connection:\n");
308 printf(" stroke delete NAME\n");
309 printf(" where: NAME is a connection name added with \"stroke add\"\n");
310 printf(" Initiate a connection:\n");
311 printf(" stroke up NAME\n");
312 printf(" where: NAME is a connection name added with \"stroke add\"\n");
313 printf(" Terminate a connection:\n");
314 printf(" stroke down NAME\n");
315 printf(" where: NAME is a connection name added with \"stroke add\"\n");
316 printf(" Set loglevel for a logging type:\n");
317 printf(" stroke loglevel TYPE LEVEL\n");
318 printf(" where: TYPE is any|dmn|mgr|ike|chd|job|cfg|knl|net|enc|lib\n");
319 printf(" LEVEL is -1|0|1|2|3|4\n");
320 printf(" Show connection status:\n");
321 printf(" stroke status\n");
322 printf(" Show list of authority and attribute certificates:\n");
323 printf(" stroke listcacerts|listocspcerts|listaacerts|listacerts\n");
324 printf(" Show list of end entity certificates, ca info records and crls:\n");
325 printf(" stroke listcerts|listcainfos|listcrls|listall\n");
326 printf(" Reload authority and attribute certificates:\n");
327 printf(" stroke rereadcacerts|rereadocspcerts|rereadaacerts|rereadacerts\n");
328 printf(" Reload secrets and crls:\n");
329 printf(" stroke rereadsecrets|rereadcrls|rereadall\n");
330 printf(" Purge ocsp cache entries:\n");
331 printf(" stroke purgeocsp\n");
332 exit_error(error);
333 }
334
335 int main(int argc, char *argv[])
336 {
337 const stroke_token_t *token;
338 int res = 0;
339
340 if (argc < 2)
341 {
342 exit_usage(NULL);
343 }
344
345 token = in_word_set(argv[1], strlen(argv[1]));
346
347 if (token == NULL)
348 {
349 exit_usage("unknown keyword");
350 }
351
352 switch (token->kw)
353 {
354 case STROKE_ADD:
355 if (argc < 11)
356 {
357 exit_usage("\"add\" needs more parameters...");
358 }
359 res = add_connection(argv[2],
360 argv[3], argv[4],
361 argv[5], argv[6],
362 argv[7], argv[8],
363 atoi(argv[9]), atoi(argv[10]));
364 break;
365 case STROKE_DELETE:
366 case STROKE_DEL:
367 if (argc < 3)
368 {
369 exit_usage("\"delete\" needs a connection name");
370 }
371 res = del_connection(argv[2]);
372 break;
373 case STROKE_UP:
374 if (argc < 3)
375 {
376 exit_usage("\"up\" needs a connection name");
377 }
378 res = initiate_connection(argv[2]);
379 break;
380 case STROKE_DOWN:
381 if (argc < 3)
382 {
383 exit_usage("\"down\" needs a connection name");
384 }
385 res = terminate_connection(argv[2]);
386 break;
387 case STROKE_ROUTE:
388 if (argc < 3)
389 {
390 exit_usage("\"route\" needs a connection name");
391 }
392 res = route_connection(argv[2]);
393 break;
394 case STROKE_UNROUTE:
395 if (argc < 3)
396 {
397 exit_usage("\"unroute\" needs a connection name");
398 }
399 res = unroute_connection(argv[2]);
400 break;
401 case STROKE_LOGLEVEL:
402 if (argc < 4)
403 {
404 exit_usage("\"logtype\" needs more parameters...");
405 }
406 res = set_loglevel(argv[2], atoi(argv[3]));
407 break;
408 case STROKE_STATUS:
409 case STROKE_STATUSALL:
410 res = show_status(token->kw, argc > 2 ? argv[2] : NULL);
411 break;
412 case STROKE_LIST_CERTS:
413 case STROKE_LIST_CACERTS:
414 case STROKE_LIST_OCSPCERTS:
415 case STROKE_LIST_AACERTS:
416 case STROKE_LIST_ACERTS:
417 case STROKE_LIST_CAINFOS:
418 case STROKE_LIST_CRLS:
419 case STROKE_LIST_OCSP:
420 case STROKE_LIST_ALL:
421 res = list(token->kw, argc > 2 && strcmp(argv[2], "--utc") == 0);
422 break;
423 case STROKE_REREAD_SECRETS:
424 case STROKE_REREAD_CACERTS:
425 case STROKE_REREAD_OCSPCERTS:
426 case STROKE_REREAD_AACERTS:
427 case STROKE_REREAD_ACERTS:
428 case STROKE_REREAD_CRLS:
429 case STROKE_REREAD_ALL:
430 res = reread(token->kw);
431 break;
432 case STROKE_PURGE_OCSP:
433 res = purge(token->kw);
434 break;
435 default:
436 exit_usage(NULL);
437 }
438 return res;
439 }