Added a hook to send unencrypted notifies in established IKE_SAs
authorMartin Willi <martin@revosec.ch>
Tue, 9 Nov 2010 08:59:56 +0000 (09:59 +0100)
committerMartin Willi <martin@revosec.ch>
Wed, 5 Jan 2011 15:45:42 +0000 (16:45 +0100)
src/conftest/Makefile.am
src/conftest/hooks/unencrypted_notify.c [new file with mode: 0644]

index 3cffce3..7764e7f 100644 (file)
@@ -4,7 +4,7 @@ AM_CFLAGS = -rdynamic
 
 conftest_SOURCES = conftest.c conftest.h config.c config.h actions.c actions.h \
        hooks/hook.h hooks/ike_auth_fill.c hooks/unsort_message.c \
-       hooks/add_notify.c
+       hooks/add_notify.c hooks/unencrypted_notify.c
 
 INCLUDES = \
        -I$(top_srcdir)/src/libstrongswan \
diff --git a/src/conftest/hooks/unencrypted_notify.c b/src/conftest/hooks/unencrypted_notify.c
new file mode 100644 (file)
index 0000000..7db9296
--- /dev/null
@@ -0,0 +1,153 @@
+/*
+ * Copyright (C) 2010 Martin Willi
+ * Copyright (C) 2010 revosec AG
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * for more details.
+ */
+
+#include "hook.h"
+
+typedef struct private_unencrypted_notify_t private_unencrypted_notify_t;
+
+/**
+ * Private data of an unencrypted_notify_t object.
+ */
+struct private_unencrypted_notify_t {
+
+       /**
+        * Implements the hook_t interface.
+        */
+       hook_t hook;
+
+       /**
+        * ID of message send.
+        */
+       int id;
+
+       /**
+        * Notify type
+        */
+       char *type;
+
+       /**
+        * Notify data
+        */
+       char *data;
+
+       /**
+        * SPI of notify
+        */
+       int spi;
+
+       /**
+        * TRUE for a ESP protocol notify, FALSE for IKE
+        */
+       bool esp;
+};
+
+METHOD(listener_t, ike_updown, bool,
+       private_unencrypted_notify_t *this, ike_sa_t *ike_sa, bool up)
+{
+       if (up)
+       {
+               message_t *message;
+               host_t *host;
+               notify_type_t type;
+               notify_payload_t *notify;
+               chunk_t data = chunk_empty;
+               packet_t *packet;
+
+               type = atoi(this->type);
+               if (!type)
+               {
+                       type = enum_from_name(notify_type_names, this->type);
+                       if (type == -1)
+                       {
+                               DBG1(DBG_CFG, "unknown notify: '%s', skipped", this->type);
+                               return TRUE;
+                       }
+               }
+               if (strncasecmp(this->data, "0x", 2) == 0)
+               {
+                       data = chunk_skip(chunk_create(this->data, strlen(this->data)), 2);
+                       data = chunk_from_hex(data, NULL);
+               }
+               else if (data.len)
+               {
+                       data = chunk_clone(chunk_create(this->data, strlen(this->data)));
+               }
+               notify = notify_payload_create_from_protocol_and_type(
+                                                                       this->esp ? PROTO_ESP : PROTO_IKE, type);
+               notify->set_spi(notify, this->spi);
+               if (data.len)
+               {
+                       notify->set_notification_data(notify, data);
+                       free(data.ptr);
+               }
+
+               DBG1(DBG_CFG, "injecting unencrypted INFORMATIONAL message");
+
+               message = message_create();
+               message->set_message_id(message, this->id);
+               message->set_ike_sa_id(message, ike_sa->get_id(ike_sa));
+               message->set_exchange_type(message, INFORMATIONAL);
+               message->set_request(message, TRUE);
+               host = ike_sa->get_my_host(ike_sa);
+               message->set_source(message, host->clone(host));
+               host = ike_sa->get_other_host(ike_sa);
+               message->set_destination(message, host->clone(host));
+               message->add_payload(message, &notify->payload_interface);
+               if (message->generate(message, NULL, &packet) != SUCCESS)
+               {
+                       DBG1(DBG_CFG, "generating message failed");
+                       message->destroy(message);
+                       return TRUE;
+               }
+               message->destroy(message);
+               charon->sender->send(charon->sender, packet);
+       }
+       return TRUE;
+}
+
+METHOD(hook_t, destroy, void,
+       private_unencrypted_notify_t *this)
+{
+       free(this);
+}
+
+/**
+ * Create the IKE_AUTH fill hook
+ */
+hook_t *unencrypted_notify_hook_create(void)
+{
+       private_unencrypted_notify_t *this;
+
+       INIT(this,
+               .hook = {
+                       .listener = {
+                               .ike_updown = _ike_updown,
+                       },
+                       .destroy = _destroy,
+               },
+               .id = conftest->test->get_int(conftest->test,
+                                                                               "hooks.unencrypted_notify.id", 2),
+               .type = conftest->test->get_str(conftest->test,
+                                                                               "hooks.unencrypted_notify.type", ""),
+               .data = conftest->test->get_str(conftest->test,
+                                                                               "hooks.unencrypted_notify.data", ""),
+               .spi = conftest->test->get_int(conftest->test,
+                                                                               "hooks.unencrypted_notify.spi", 0),
+               .esp = conftest->test->get_bool(conftest->test,
+                                                                               "hooks.unencrypted_notify.esp", FALSE),
+       );
+
+       return &this->hook;
+}