| File: | programs/pluto/ikev1.c |
| Warning: | line 2106, column 25 Access to field 'st_logger' results in a dereference of a null pointer (loaded from variable 'st') |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* State machine for IKEv1 | |||
| 2 | * | |||
| 3 | * Copyright (C) 1997 Angelos D. Keromytis. | |||
| 4 | * Copyright (C) 1998-2010,2013-2016 D. Hugh Redelmeier <hugh@mimosa.com> | |||
| 5 | * Copyright (C) 2003-2008 Michael Richardson <mcr@xelerance.com> | |||
| 6 | * Copyright (C) 2008-2009 David McCullough <david_mccullough@securecomputing.com> | |||
| 7 | * Copyright (C) 2008-2010 Paul Wouters <paul@xelerance.com> | |||
| 8 | * Copyright (C) 2011 Avesh Agarwal <avagarwa@redhat.com> | |||
| 9 | * Copyright (C) 2008 Hiren Joshi <joshihirenn@gmail.com> | |||
| 10 | * Copyright (C) 2009 Anthony Tong <atong@TrustedCS.com> | |||
| 11 | * Copyright (C) 2012-2019 Paul Wouters <pwouters@redhat.com> | |||
| 12 | * Copyright (C) 2013 Wolfgang Nothdurft <wolfgang@linogate.de> | |||
| 13 | * Copyright (C) 2019-2019 Andrew Cagney <cagney@gnu.org> | |||
| 14 | * | |||
| 15 | * This program is free software; you can redistribute it and/or modify it | |||
| 16 | * under the terms of the GNU General Public License as published by the | |||
| 17 | * Free Software Foundation; either version 2 of the License, or (at your | |||
| 18 | * option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>. | |||
| 19 | * | |||
| 20 | * This program is distributed in the hope that it will be useful, but | |||
| 21 | * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY | |||
| 22 | * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |||
| 23 | * for more details. | |||
| 24 | * | |||
| 25 | */ | |||
| 26 | ||||
| 27 | /* Ordering Constraints on Payloads | |||
| 28 | * | |||
| 29 | * rfc2409: The Internet Key Exchange (IKE) | |||
| 30 | * | |||
| 31 | * 5 Exchanges: | |||
| 32 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." | |||
| 33 | * | |||
| 34 | * "Except where otherwise noted, there are no requirements for ISAKMP | |||
| 35 | * payloads in any message to be in any particular order." | |||
| 36 | * | |||
| 37 | * 5.3 Phase 1 Authenticated With a Revised Mode of Public Key Encryption: | |||
| 38 | * | |||
| 39 | * "If the HASH payload is sent it MUST be the first payload of the | |||
| 40 | * second message exchange and MUST be followed by the encrypted | |||
| 41 | * nonce. If the HASH payload is not sent, the first payload of the | |||
| 42 | * second message exchange MUST be the encrypted nonce." | |||
| 43 | * | |||
| 44 | * "Save the requirements on the location of the optional HASH payload | |||
| 45 | * and the mandatory nonce payload there are no further payload | |||
| 46 | * requirements. All payloads-- in whatever order-- following the | |||
| 47 | * encrypted nonce MUST be encrypted with Ke_i or Ke_r depending on the | |||
| 48 | * direction." | |||
| 49 | * | |||
| 50 | * 5.5 Phase 2 - Quick Mode | |||
| 51 | * | |||
| 52 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP | |||
| 53 | * header and a SA payload MUST immediately follow the HASH." | |||
| 54 | * [NOTE: there may be more than one SA payload, so this is not | |||
| 55 | * totally reasonable. Probably all SAs should be so constrained.] | |||
| 56 | * | |||
| 57 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
| 58 | * party, the identities of the parties MUST be passed as IDci and | |||
| 59 | * then IDcr." | |||
| 60 | * | |||
| 61 | * "With the exception of the HASH, SA, and the optional ID payloads, | |||
| 62 | * there are no payload ordering restrictions on Quick Mode." | |||
| 63 | */ | |||
| 64 | ||||
| 65 | /* Unfolding of Identity -- a central mystery | |||
| 66 | * | |||
| 67 | * This concerns Phase 1 identities, those of the IKE hosts. | |||
| 68 | * These are the only ones that are authenticated. Phase 2 | |||
| 69 | * identities are for IPsec SAs. | |||
| 70 | * | |||
| 71 | * There are three case of interest: | |||
| 72 | * | |||
| 73 | * (1) We initiate, based on a whack command specifying a Connection. | |||
| 74 | * We know the identity of the peer from the Connection. | |||
| 75 | * | |||
| 76 | * (2) (to be implemented) we initiate based on a flow from our client | |||
| 77 | * to some IP address. | |||
| 78 | * We immediately know one of the peer's client IP addresses from | |||
| 79 | * the flow. We must use this to figure out the peer's IP address | |||
| 80 | * and Id. To be solved. | |||
| 81 | * | |||
| 82 | * (3) We respond to an IKE negotiation. | |||
| 83 | * We immediately know the peer's IP address. | |||
| 84 | * We get an ID Payload in Main I2. | |||
| 85 | * | |||
| 86 | * Unfortunately, this is too late for a number of things: | |||
| 87 | * - the ISAKMP SA proposals have already been made (Main I1) | |||
| 88 | * AND one accepted (Main R1) | |||
| 89 | * - the SA includes a specification of the type of ID | |||
| 90 | * authentication so this is negotiated without being told the ID. | |||
| 91 | * - with Preshared Key authentication, Main I2 is encrypted | |||
| 92 | * using the key, so it cannot be decoded to reveal the ID | |||
| 93 | * without knowing (or guessing) which key to use. | |||
| 94 | * | |||
| 95 | * There are three reasonable choices here for the responder: | |||
| 96 | * + assume that the initiator is making wise offers since it | |||
| 97 | * knows the IDs involved. We can balk later (but not gracefully) | |||
| 98 | * when we find the actual initiator ID | |||
| 99 | * + attempt to infer identity by IP address. Again, we can balk | |||
| 100 | * when the true identity is revealed. Actually, it is enough | |||
| 101 | * to infer properties of the identity (eg. SA properties and | |||
| 102 | * PSK, if needed). | |||
| 103 | * + make all properties universal so discrimination based on | |||
| 104 | * identity isn't required. For example, always accept the same | |||
| 105 | * kinds of encryption. Accept Public Key Id authentication | |||
| 106 | * since the Initiator presumably has our public key and thinks | |||
| 107 | * we must have / can find peers. This approach is weakest | |||
| 108 | * for preshared key since the actual key must be known to | |||
| 109 | * decrypt the Initiator's ID Payload. | |||
| 110 | * These choices can be blended. For example, a class of Identities | |||
| 111 | * can be inferred, sufficient to select a preshared key but not | |||
| 112 | * sufficient to infer a unique identity. | |||
| 113 | */ | |||
| 114 | ||||
| 115 | #include <stdio.h> | |||
| 116 | #include <stdlib.h> | |||
| 117 | #include <stddef.h> | |||
| 118 | #include <string.h> | |||
| 119 | #include <unistd.h> | |||
| 120 | #include <errno(*__errno_location ()).h> | |||
| 121 | #include <sys/types.h> | |||
| 122 | #include <sys/socket.h> | |||
| 123 | #include <netinet/in.h> | |||
| 124 | #include <arpa/inet.h> | |||
| 125 | ||||
| 126 | ||||
| 127 | #include "sysdep.h" | |||
| 128 | #include "constants.h" | |||
| 129 | ||||
| 130 | #include "defs.h" | |||
| 131 | #include "ike_spi.h" | |||
| 132 | #include "id.h" | |||
| 133 | #include "x509.h" | |||
| 134 | #include "pluto_x509.h" | |||
| 135 | #include "certs.h" | |||
| 136 | #include "connections.h" /* needs id.h */ | |||
| 137 | #include "state.h" | |||
| 138 | #include "ikev1_msgid.h" | |||
| 139 | #include "packet.h" | |||
| 140 | #include "crypto.h" | |||
| 141 | #include "ike_alg.h" | |||
| 142 | #include "log.h" | |||
| 143 | #include "demux.h" /* needs packet.h */ | |||
| 144 | #include "ikev1.h" | |||
| 145 | #include "ipsec_doi.h" /* needs demux.h and state.h */ | |||
| 146 | #include "ikev1_quick.h" | |||
| 147 | #include "timer.h" | |||
| 148 | #include "whack.h" /* requires connections.h */ | |||
| 149 | #include "server.h" | |||
| 150 | #include "send.h" | |||
| 151 | #include "ikev1_send.h" | |||
| 152 | #include "ikev1_xauth.h" | |||
| 153 | #include "retransmit.h" | |||
| 154 | #include "nat_traversal.h" | |||
| 155 | #include "ikev1_nat.h" | |||
| 156 | #include "vendor.h" | |||
| 157 | #include "ikev1_dpd.h" | |||
| 158 | #include "host_pair.h" | |||
| 159 | #include "ip_address.h" | |||
| 160 | #include "ikev1_hash.h" | |||
| 161 | #include "ike_alg_encrypt_ops.h" /* XXX: oops */ | |||
| 162 | #include "ikev1_states.h" | |||
| 163 | #include "initiate.h" | |||
| 164 | #include "iface.h" | |||
| 165 | #include "ip_selector.h" | |||
| 166 | #include "unpack.h" | |||
| 167 | #include "pending.h" | |||
| 168 | #include "state_db.h" | |||
| 169 | ||||
| 170 | #ifdef HAVE_NM1 | |||
| 171 | #include "kernel.h" | |||
| 172 | #endif | |||
| 173 | ||||
| 174 | #include "pluto_stats.h" | |||
| 175 | ||||
| 176 | /* | |||
| 177 | * state_v1_microcode is a tuple of information parameterizing certain | |||
| 178 | * centralized processing of a packet. For example, it roughly | |||
| 179 | * specifies what payloads are expected in this message. The | |||
| 180 | * microcode is selected primarily based on the state. In Phase 1, | |||
| 181 | * the payload structure often depends on the authentication | |||
| 182 | * technique, so that too plays a part in selecting the | |||
| 183 | * state_v1_microcode to use. | |||
| 184 | */ | |||
| 185 | ||||
| 186 | struct state_v1_microcode { | |||
| 187 | enum state_kind state, next_state; | |||
| 188 | lset_t flags; | |||
| 189 | lset_t req_payloads; /* required payloads (allows just one) */ | |||
| 190 | lset_t opt_payloads; /* optional payloads (any number) */ | |||
| 191 | enum event_type timeout_event; | |||
| 192 | ikev1_state_transition_fn *processor; | |||
| 193 | const char *message; | |||
| 194 | enum v1_hash_type hash_type; | |||
| 195 | }; | |||
| 196 | ||||
| 197 | void jam_v1_transition(struct jambuf *buf, const struct state_v1_microcode *transition) | |||
| 198 | { | |||
| 199 | if (transition == NULL((void*)0)) { | |||
| 200 | jam(buf, "NULL"); | |||
| 201 | } else { | |||
| 202 | jam(buf, "%s->%s", | |||
| 203 | finite_states[transition->state]->short_name, | |||
| 204 | finite_states[transition->next_state]->short_name); | |||
| 205 | } | |||
| 206 | } | |||
| 207 | ||||
| 208 | /* State Microcode Flags, in several groups */ | |||
| 209 | ||||
| 210 | /* Oakley Auth values: to which auth values does this entry apply? | |||
| 211 | * Most entries will use SMF_ALL_AUTH because they apply to all. | |||
| 212 | * Note: SMF_ALL_AUTH matches 0 for those circumstances when no auth | |||
| 213 | * has been set. | |||
| 214 | * | |||
| 215 | * The IKEv1 state machine then uses the auth type (SMF_*_AUTH flags) | |||
| 216 | * to select the exact state transition. For states where auth | |||
| 217 | * (SMF_*_AUTH flags) don't apply (.e.g, child states) | |||
| 218 | * flags|=SMF_ALL_AUTH so the first transition always matches. | |||
| 219 | * | |||
| 220 | * Once a transition is selected, the containing payloads are checked | |||
| 221 | * against what is allowed. For instance, in STATE_MAIN_R2 -> | |||
| 222 | * STATE_MAIN_R3 with SMF_DS_AUTH requires P(SIG). | |||
| 223 | * | |||
| 224 | * In IKEv2, it is the message header and payload types that select | |||
| 225 | * the state. As for how the IKEv1 'from state' is selected, look for | |||
| 226 | * a big nasty magic switch. | |||
| 227 | * | |||
| 228 | * XXX: the state transition table is littered with STATE_UNDEFINED / | |||
| 229 | * SMF_ALL_AUTH / unexpected() entries. These are to catch things | |||
| 230 | * like unimplemented auth cases, and unexpected packets. For the | |||
| 231 | * latter, they seem to be place holders so that the table contains at | |||
| 232 | * least one entry for the state. | |||
| 233 | * | |||
| 234 | * XXX: Some of the SMF flags specify attributes of the current state | |||
| 235 | * (e.g., SMF_RETRANSMIT_ON_DUPLICATE), some apply to the state | |||
| 236 | * transition (e.g., SMF_REPLY), and some can be interpreted as either | |||
| 237 | * (.e.g., SMF_INPUT_ENCRYPTED). | |||
| 238 | */ | |||
| 239 | #define SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) LRANGE(0, OAKLEY_AUTH_ROOF - 1)(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | |||
| 240 | #define SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) LELEM(OAKLEY_PRESHARED_KEY)((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | |||
| 241 | #define SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) (LELEM(OAKLEY_DSS_SIG)((lset_t)1 << (OAKLEY_DSS_SIG)) | LELEM(OAKLEY_RSA_SIG)((lset_t)1 << (OAKLEY_RSA_SIG))) | |||
| 242 | #define SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) LELEM(OAKLEY_RSA_ENC)((lset_t)1 << (OAKLEY_RSA_ENC)) | |||
| 243 | #define SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) LELEM(OAKLEY_RSA_REVISED_MODE)((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | |||
| 244 | ||||
| 245 | /* misc flags */ | |||
| 246 | #define SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) LELEM(OAKLEY_AUTH_ROOF + 0)((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | |||
| 247 | #define SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) LELEM(OAKLEY_AUTH_ROOF + 1)((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | |||
| 248 | #define SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) LELEM(OAKLEY_AUTH_ROOF + 2)((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | |||
| 249 | #define SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) LELEM(OAKLEY_AUTH_ROOF + 3)((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | |||
| 250 | #define SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) LELEM(OAKLEY_AUTH_ROOF + 4)((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) | |||
| 251 | ||||
| 252 | #define SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) (SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |||
| 253 | ||||
| 254 | /* this state generates a reply message */ | |||
| 255 | #define SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) LELEM(OAKLEY_AUTH_ROOF + 5)((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | |||
| 256 | ||||
| 257 | /* this state completes P1, so any pending P2 negotiations should start */ | |||
| 258 | #define SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) LELEM(OAKLEY_AUTH_ROOF + 6)((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | |||
| 259 | ||||
| 260 | /* if we have canoncalized the authentication from XAUTH mode */ | |||
| 261 | #define SMF_XAUTH_AUTH((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) LELEM(OAKLEY_AUTH_ROOF + 7)((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) | |||
| 262 | ||||
| 263 | /* end of flags */ | |||
| 264 | ||||
| 265 | static ikev1_state_transition_fn unexpected; /* forward declaration */ | |||
| 266 | static ikev1_state_transition_fn informational; /* forward declaration */ | |||
| 267 | ||||
| 268 | /* | |||
| 269 | * v1_state_microcode_table is a table of all state_v1_microcode | |||
| 270 | * tuples. It must be in order of state (the first element). After | |||
| 271 | * initialization, ike_microcode_index[s] points to the first entry in | |||
| 272 | * v1_state_microcode_table for state s. Remember that each state | |||
| 273 | * name in Main or Quick Mode describes what has happened in the past, | |||
| 274 | * not what this message is. | |||
| 275 | */ | |||
| 276 | ||||
| 277 | static const struct state_v1_microcode v1_state_microcode_table[] = { | |||
| 278 | ||||
| 279 | #define P(n) LELEM(ISAKMP_NEXT_ ##n)((lset_t)1 << (ISAKMP_NEXT_ ##n)) | |||
| 280 | #define FM(F) .processor = F, .message = #F | |||
| 281 | ||||
| 282 | /***** Phase 1 Main Mode *****/ | |||
| 283 | ||||
| 284 | /* No state for main_outI1: --> HDR, SA */ | |||
| 285 | ||||
| 286 | /* STATE_MAIN_R0: I1 --> R1 | |||
| 287 | * HDR, SA --> HDR, SA | |||
| 288 | */ | |||
| 289 | { STATE_MAIN_R0, STATE_MAIN_R1, | |||
| 290 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 291 | P(SA), P(VID) | P(CR), | |||
| 292 | EVENT_SA_DISCARD, | |||
| 293 | FM(main_inI1_outR1), | |||
| 294 | .hash_type = V1_HASH_NONE, }, | |||
| 295 | ||||
| 296 | /* STATE_MAIN_I1: R1 --> I2 | |||
| 297 | * HDR, SA --> auth dependent | |||
| 298 | * SMF_PSK_AUTH, SMF_DS_AUTH: --> HDR, KE, Ni | |||
| 299 | * SMF_PKE_AUTH: | |||
| 300 | * --> HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r | |||
| 301 | * SMF_RPKE_AUTH: | |||
| 302 | * --> HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] | |||
| 303 | * Note: since we don't know auth at start, we cannot differentiate | |||
| 304 | * microcode entries based on it. | |||
| 305 | */ | |||
| 306 | { STATE_MAIN_I1, STATE_MAIN_I2, | |||
| 307 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 308 | P(SA), P(VID) | P(CR), | |||
| 309 | EVENT_RETRANSMIT, | |||
| 310 | FM(main_inR1_outI2), | |||
| 311 | .hash_type = V1_HASH_NONE, }, | |||
| 312 | ||||
| 313 | /* STATE_MAIN_R1: I2 --> R2 | |||
| 314 | * SMF_PSK_AUTH, SMF_DS_AUTH: HDR, KE, Ni --> HDR, KE, Nr | |||
| 315 | * SMF_PKE_AUTH: HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r | |||
| 316 | * --> HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i | |||
| 317 | * SMF_RPKE_AUTH: | |||
| 318 | * HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] | |||
| 319 | * --> HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r | |||
| 320 | */ | |||
| 321 | { STATE_MAIN_R1, STATE_MAIN_R2, | |||
| 322 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 323 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), | |||
| 324 | EVENT_RETRANSMIT, | |||
| 325 | FM(main_inI2_outR2), | |||
| 326 | .hash_type = V1_HASH_NONE, }, | |||
| 327 | ||||
| 328 | { STATE_MAIN_R1, STATE_UNDEFINED, | |||
| 329 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 330 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR) | P(HASH), | |||
| 331 | EVENT_RETRANSMIT, | |||
| 332 | FM(unexpected) /* ??? not yet implemented */, | |||
| 333 | .hash_type = V1_HASH_NONE, }, | |||
| 334 | ||||
| 335 | { STATE_MAIN_R1, STATE_UNDEFINED, | |||
| 336 | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 337 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR) | P(HASH) | P(CERT), | |||
| 338 | EVENT_RETRANSMIT, | |||
| 339 | FM(unexpected) /* ??? not yet implemented */, | |||
| 340 | .hash_type = V1_HASH_NONE, }, | |||
| 341 | ||||
| 342 | /* for states from here on, output message must be encrypted */ | |||
| 343 | ||||
| 344 | /* STATE_MAIN_I2: R2 --> I3 | |||
| 345 | * SMF_PSK_AUTH: HDR, KE, Nr --> HDR*, IDi1, HASH_I | |||
| 346 | * SMF_DS_AUTH: HDR, KE, Nr --> HDR*, IDi1, [ CERT, ] SIG_I | |||
| 347 | * SMF_PKE_AUTH: HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i | |||
| 348 | * --> HDR*, HASH_I | |||
| 349 | * SMF_RPKE_AUTH: HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r | |||
| 350 | * --> HDR*, HASH_I | |||
| 351 | */ | |||
| 352 | { STATE_MAIN_I2, STATE_MAIN_I3, | |||
| 353 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 354 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), | |||
| 355 | EVENT_RETRANSMIT, | |||
| 356 | FM(main_inR2_outI3), | |||
| 357 | /* calls main_mode_hash() after DH */ | |||
| 358 | .hash_type = V1_HASH_NONE, }, | |||
| 359 | ||||
| 360 | { STATE_MAIN_I2, STATE_UNDEFINED, | |||
| 361 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 362 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR), | |||
| 363 | EVENT_RETRANSMIT, | |||
| 364 | FM(unexpected) /* ??? not yet implemented */, | |||
| 365 | .hash_type = V1_HASH_NONE, }, | |||
| 366 | ||||
| 367 | { STATE_MAIN_I2, STATE_UNDEFINED, | |||
| 368 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 369 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR), | |||
| 370 | EVENT_RETRANSMIT, | |||
| 371 | FM(unexpected) /* ??? not yet implemented */, | |||
| 372 | .hash_type = V1_HASH_NONE, }, | |||
| 373 | ||||
| 374 | /* for states from here on, input message must be encrypted */ | |||
| 375 | ||||
| 376 | /* STATE_MAIN_R2: I3 --> R3 | |||
| 377 | * SMF_PSK_AUTH: HDR*, IDi1, HASH_I --> HDR*, IDr1, HASH_R | |||
| 378 | * SMF_DS_AUTH: HDR*, IDi1, [ CERT, ] SIG_I --> HDR*, IDr1, [ CERT, ] SIG_R | |||
| 379 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_I --> HDR*, HASH_R | |||
| 380 | */ | |||
| 381 | { STATE_MAIN_R2, STATE_MAIN_R3, | |||
| 382 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
| 383 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 384 | P(ID) | P(HASH), P(VID) | P(CR), | |||
| 385 | EVENT_SA_REPLACE, | |||
| 386 | FM(main_inI3_outR3), | |||
| 387 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 388 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
| 389 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ | |||
| 390 | .hash_type = V1_HASH_NONE, }, | |||
| 391 | ||||
| 392 | { STATE_MAIN_R2, STATE_MAIN_R3, | |||
| 393 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
| 394 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 395 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), | |||
| 396 | EVENT_SA_REPLACE, | |||
| 397 | FM(main_inI3_outR3), | |||
| 398 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 399 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
| 400 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) | |||
| 401 | SIG_I = SIGN(HASH_I) *", | |||
| 402 | SIG_I = SIGN(HASH_I) */ | |||
| 403 | .hash_type = V1_HASH_NONE, }, | |||
| 404 | ||||
| 405 | { STATE_MAIN_R2, STATE_UNDEFINED, | |||
| 406 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
| 407 | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
| 408 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 409 | P(HASH), P(VID) | P(CR), | |||
| 410 | EVENT_SA_REPLACE, | |||
| 411 | FM(unexpected) /* ??? not yet implemented */, | |||
| 412 | .hash_type = V1_HASH_NONE, }, | |||
| 413 | ||||
| 414 | /* STATE_MAIN_I3: R3 --> done | |||
| 415 | * SMF_PSK_AUTH: HDR*, IDr1, HASH_R --> done | |||
| 416 | * SMF_DS_AUTH: HDR*, IDr1, [ CERT, ] SIG_R --> done | |||
| 417 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_R --> done | |||
| 418 | * May initiate quick mode by calling quick_outI1 | |||
| 419 | */ | |||
| 420 | { STATE_MAIN_I3, STATE_MAIN_I4, | |||
| 421 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
| 422 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 423 | P(ID) | P(HASH), P(VID) | P(CR), | |||
| 424 | EVENT_SA_REPLACE, | |||
| 425 | FM(main_inR3), | |||
| 426 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 427 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
| 428 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ | |||
| 429 | .hash_type = V1_HASH_NONE, }, | |||
| 430 | ||||
| 431 | { STATE_MAIN_I3, STATE_MAIN_I4, | |||
| 432 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
| 433 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 434 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), | |||
| 435 | EVENT_SA_REPLACE, | |||
| 436 | FM(main_inR3), | |||
| 437 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 438 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
| 439 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) | |||
| 440 | SIG_R = SIGN(HASH_R) */ | |||
| 441 | .hash_type = V1_HASH_NONE, }, | |||
| 442 | ||||
| 443 | { STATE_MAIN_I3, STATE_UNDEFINED, | |||
| 444 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
| 445 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 446 | P(HASH), P(VID) | P(CR), | |||
| 447 | EVENT_SA_REPLACE, | |||
| 448 | FM(unexpected) /* ??? not yet implemented */, | |||
| 449 | .hash_type = V1_HASH_NONE, }, | |||
| 450 | ||||
| 451 | /* STATE_MAIN_R3: can only get here due to packet loss */ | |||
| 452 | { STATE_MAIN_R3, STATE_UNDEFINED, | |||
| 453 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 454 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 455 | EVENT_NULL, | |||
| 456 | FM(unexpected), | |||
| 457 | .hash_type = V1_HASH_NONE, }, | |||
| 458 | ||||
| 459 | /* STATE_MAIN_I4: can only get here due to packet loss */ | |||
| 460 | { STATE_MAIN_I4, STATE_UNDEFINED, | |||
| 461 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 462 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 463 | EVENT_NULL, | |||
| 464 | FM(unexpected), | |||
| 465 | .hash_type = V1_HASH_NONE, }, | |||
| 466 | ||||
| 467 | /***** Phase 1 Aggressive Mode *****/ | |||
| 468 | ||||
| 469 | /* No initial state for aggr_outI1: | |||
| 470 | * SMF_DS_AUTH (RFC 2409 5.1) and SMF_PSK_AUTH (RFC 2409 5.4): | |||
| 471 | * -->HDR, SA, KE, Ni, IDii | |||
| 472 | * | |||
| 473 | * Not implemented: | |||
| 474 | * RFC 2409 5.2: --> HDR, SA, [ HASH(1),] KE, <IDii_b>Pubkey_r, <Ni_b>Pubkey_r | |||
| 475 | * RFC 2409 5.3: --> HDR, SA, [ HASH(1),] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] | |||
| 476 | */ | |||
| 477 | ||||
| 478 | /* STATE_AGGR_R0: | |||
| 479 | * SMF_PSK_AUTH: HDR, SA, KE, Ni, IDii | |||
| 480 | * --> HDR, SA, KE, Nr, IDir, HASH_R | |||
| 481 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDii | |||
| 482 | * --> HDR, SA, KE, Nr, IDir, [CERT,] SIG_R | |||
| 483 | */ | |||
| 484 | { STATE_AGGR_R0, STATE_AGGR_R1, | |||
| 485 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 486 | P(SA) | P(KE) | P(NONCE) | P(ID), P(VID) | P(NATD_RFC), | |||
| 487 | EVENT_SA_DISCARD, | |||
| 488 | FM(aggr_inI1_outR1), | |||
| 489 | /* N/A */ | |||
| 490 | .hash_type = V1_HASH_NONE, }, | |||
| 491 | ||||
| 492 | /* STATE_AGGR_I1: | |||
| 493 | * SMF_PSK_AUTH: HDR, SA, KE, Nr, IDir, HASH_R | |||
| 494 | * --> HDR*, HASH_I | |||
| 495 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDir, [CERT,] SIG_R | |||
| 496 | * --> HDR*, [CERT,] SIG_I | |||
| 497 | */ | |||
| 498 | { STATE_AGGR_I1, STATE_AGGR_I2, | |||
| 499 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | | |||
| 500 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 501 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(HASH), P(VID) | P(NATD_RFC), | |||
| 502 | EVENT_SA_REPLACE, | |||
| 503 | FM(aggr_inR1_outI2), | |||
| 504 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 505 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
| 506 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ | |||
| 507 | .hash_type = V1_HASH_NONE, }, | |||
| 508 | ||||
| 509 | { STATE_AGGR_I1, STATE_AGGR_I2, | |||
| 510 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | | |||
| 511 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 512 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(SIG), P(VID) | P(NATD_RFC), | |||
| 513 | EVENT_SA_REPLACE, | |||
| 514 | FM(aggr_inR1_outI2), | |||
| 515 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 516 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
| 517 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) | |||
| 518 | SIG_R = SIGN(HASH_R) */ | |||
| 519 | .hash_type = V1_HASH_NONE, }, | |||
| 520 | ||||
| 521 | /* STATE_AGGR_R1: | |||
| 522 | * SMF_PSK_AUTH: HDR*, HASH_I --> done | |||
| 523 | * SMF_DS_AUTH: HDR*, SIG_I --> done | |||
| 524 | */ | |||
| 525 | { STATE_AGGR_R1, STATE_AGGR_R2, | |||
| 526 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
| 527 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | | |||
| 528 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 529 | P(HASH), P(VID) | P(NATD_RFC), | |||
| 530 | EVENT_SA_REPLACE, | |||
| 531 | FM(aggr_inI2), | |||
| 532 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 533 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
| 534 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ | |||
| 535 | .hash_type = V1_HASH_NONE, }, | |||
| 536 | ||||
| 537 | { STATE_AGGR_R1, STATE_AGGR_R2, | |||
| 538 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
| 539 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | | |||
| 540 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 541 | P(SIG), P(VID) | P(NATD_RFC), | |||
| 542 | EVENT_SA_REPLACE, | |||
| 543 | FM(aggr_inI2), | |||
| 544 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
| 545 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
| 546 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) | |||
| 547 | SIG_I = SIGN(HASH_I) */ | |||
| 548 | .hash_type = V1_HASH_NONE, }, | |||
| 549 | ||||
| 550 | /* STATE_AGGR_I2: can only get here due to packet loss */ | |||
| 551 | { STATE_AGGR_I2, STATE_UNDEFINED, | |||
| 552 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 553 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, | |||
| 554 | FM(unexpected), | |||
| 555 | .hash_type = V1_HASH_NONE, }, | |||
| 556 | ||||
| 557 | /* STATE_AGGR_R2: can only get here due to packet loss */ | |||
| 558 | { STATE_AGGR_R2, STATE_UNDEFINED, | |||
| 559 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), | |||
| 560 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, | |||
| 561 | FM(unexpected), | |||
| 562 | .hash_type = V1_HASH_NONE, }, | |||
| 563 | ||||
| 564 | /***** Phase 2 Quick Mode *****/ | |||
| 565 | ||||
| 566 | /* No state for quick_outI1: | |||
| 567 | * --> HDR*, HASH(1), SA, Nr [, KE ] [, IDci, IDcr ] | |||
| 568 | */ | |||
| 569 | ||||
| 570 | /* STATE_QUICK_R0: | |||
| 571 | * HDR*, HASH(1), SA, Ni [, KE ] [, IDci, IDcr ] --> | |||
| 572 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] | |||
| 573 | * Installs inbound IPsec SAs. | |||
| 574 | * Because it may suspend for asynchronous DNS, first_out_payload | |||
| 575 | * is set to NONE to suppress early emission of HDR*. | |||
| 576 | * ??? it is legal to have multiple SAs, but we don't support it yet. | |||
| 577 | */ | |||
| 578 | { STATE_QUICK_R0, STATE_QUICK_R1, | |||
| 579 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 580 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), | |||
| 581 | EVENT_RETRANSMIT, | |||
| 582 | FM(quick_inI1_outR1), | |||
| 583 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
| 584 | HASH(1) = prf(SKEYID_a, M-ID | <rest>) */ | |||
| 585 | .hash_type = V1_HASH_1, }, | |||
| 586 | ||||
| 587 | /* STATE_QUICK_I1: | |||
| 588 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] --> | |||
| 589 | * HDR*, HASH(3) | |||
| 590 | * Installs inbound and outbound IPsec SAs, routing, etc. | |||
| 591 | * ??? it is legal to have multiple SAs, but we don't support it yet. | |||
| 592 | */ | |||
| 593 | { STATE_QUICK_I1, STATE_QUICK_I2, | |||
| 594 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 595 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), | |||
| 596 | EVENT_SA_REPLACE, | |||
| 597 | FM(quick_inR1_outI2), | |||
| 598 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
| 599 | HASH(2) = prf(SKEYID_a, M-ID | Ni_b | <rest>) */ | |||
| 600 | .hash_type = V1_HASH_2, }, | |||
| 601 | ||||
| 602 | /* STATE_QUICK_R1: HDR*, HASH(3) --> done | |||
| 603 | * Installs outbound IPsec SAs, routing, etc. | |||
| 604 | */ | |||
| 605 | { STATE_QUICK_R1, STATE_QUICK_R2, | |||
| 606 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 607 | P(HASH), LEMPTY((lset_t)0), | |||
| 608 | EVENT_SA_REPLACE, | |||
| 609 | FM(quick_inI2), | |||
| 610 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
| 611 | HASH(3) = prf(SKEYID_a, 0 | M-ID | Ni_b | Nr_b) */ | |||
| 612 | .hash_type = V1_HASH_3, }, | |||
| 613 | ||||
| 614 | /* STATE_QUICK_I2: can only happen due to lost packet */ | |||
| 615 | { STATE_QUICK_I2, STATE_UNDEFINED, | |||
| 616 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
| 617 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
| 618 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 619 | EVENT_NULL, | |||
| 620 | FM(unexpected), | |||
| 621 | .hash_type = V1_HASH_NONE, }, | |||
| 622 | ||||
| 623 | /* STATE_QUICK_R2: can only happen due to lost packet */ | |||
| 624 | { STATE_QUICK_R2, STATE_UNDEFINED, | |||
| 625 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 626 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 627 | EVENT_NULL, | |||
| 628 | FM(unexpected), | |||
| 629 | .hash_type = V1_HASH_NONE, }, | |||
| 630 | ||||
| 631 | /***** informational messages *****/ | |||
| 632 | ||||
| 633 | /* Informational Exchange (RFC 2408 4.8): | |||
| 634 | * HDR N/D | |||
| 635 | * Unencrypted: must not occur after ISAKMP Phase 1 exchange of keying material. | |||
| 636 | */ | |||
| 637 | /* STATE_INFO: */ | |||
| 638 | { STATE_INFO, STATE_UNDEFINED, | |||
| 639 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), | |||
| 640 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 641 | EVENT_NULL, | |||
| 642 | FM(informational), | |||
| 643 | .hash_type = V1_HASH_NONE, }, | |||
| 644 | ||||
| 645 | /* Informational Exchange (RFC 2408 4.8): | |||
| 646 | * HDR* N/D | |||
| 647 | */ | |||
| 648 | /* STATE_INFO_PROTECTED: */ | |||
| 649 | { STATE_INFO_PROTECTED, STATE_UNDEFINED, | |||
| 650 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 651 | P(HASH), LEMPTY((lset_t)0), | |||
| 652 | EVENT_NULL, | |||
| 653 | FM(informational), | |||
| 654 | /* RFC 2409: 5.7 ISAKMP Informational Exchanges: | |||
| 655 | HASH(1) = prf(SKEYID_a, M-ID | N/D) */ | |||
| 656 | .hash_type = V1_HASH_1, }, | |||
| 657 | ||||
| 658 | { STATE_XAUTH_R0, STATE_XAUTH_R1, | |||
| 659 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 660 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 661 | EVENT_NULL, | |||
| 662 | FM(xauth_inR0), | |||
| 663 | /* RFC ????: */ | |||
| 664 | .hash_type = V1_HASH_1, }, /* Re-transmit may be done by previous state */ | |||
| 665 | ||||
| 666 | { STATE_XAUTH_R1, STATE_MAIN_R3, | |||
| 667 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 668 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 669 | EVENT_SA_REPLACE, | |||
| 670 | FM(xauth_inR1), | |||
| 671 | /* RFC ????: */ | |||
| 672 | .hash_type = V1_HASH_1, }, | |||
| 673 | ||||
| 674 | #if 0 | |||
| 675 | /* for situation where there is XAUTH + ModeCFG */ | |||
| 676 | { STATE_XAUTH_R2, STATE_XAUTH_R3, | |||
| 677 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 678 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 679 | EVENT_SA_REPLACE, | |||
| 680 | FM(xauth_inR2), }, | |||
| 681 | ||||
| 682 | { STATE_XAUTH_R3, STATE_MAIN_R3, | |||
| 683 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 684 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 685 | EVENT_SA_REPLACE, | |||
| 686 | FM(xauth_inR3), }, | |||
| 687 | #endif | |||
| 688 | ||||
| 689 | /* MODE_CFG_x: | |||
| 690 | * Case R0: Responder -> Initiator | |||
| 691 | * <- Req(addr=0) | |||
| 692 | * Reply(ad=x) -> | |||
| 693 | * | |||
| 694 | * Case R1: Set(addr=x) -> | |||
| 695 | * <- Ack(ok) | |||
| 696 | */ | |||
| 697 | ||||
| 698 | { STATE_MODE_CFG_R0, STATE_MODE_CFG_R1, | |||
| 699 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
| 700 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 701 | EVENT_SA_REPLACE, | |||
| 702 | FM(modecfg_inR0), | |||
| 703 | /* RFC ????: */ | |||
| 704 | .hash_type = V1_HASH_1, }, | |||
| 705 | ||||
| 706 | { STATE_MODE_CFG_R1, STATE_MODE_CFG_R2, | |||
| 707 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 708 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 709 | EVENT_SA_REPLACE, | |||
| 710 | FM(modecfg_inR1), | |||
| 711 | /* RFC ????: */ | |||
| 712 | .hash_type = V1_HASH_1, }, | |||
| 713 | ||||
| 714 | { STATE_MODE_CFG_R2, STATE_UNDEFINED, | |||
| 715 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
| 716 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 717 | EVENT_NULL, | |||
| 718 | FM(unexpected), | |||
| 719 | .hash_type = V1_HASH_NONE, }, | |||
| 720 | ||||
| 721 | { STATE_MODE_CFG_I1, STATE_MAIN_I4, | |||
| 722 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 723 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 724 | EVENT_SA_REPLACE, | |||
| 725 | FM(modecfg_inR1), | |||
| 726 | /* RFC ????: */ | |||
| 727 | .hash_type = V1_HASH_1, }, | |||
| 728 | ||||
| 729 | { STATE_XAUTH_I0, STATE_XAUTH_I1, | |||
| 730 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 731 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 732 | EVENT_RETRANSMIT, | |||
| 733 | FM(xauth_inI0), | |||
| 734 | /* RFC ????: */ | |||
| 735 | .hash_type = V1_HASH_1, }, | |||
| 736 | ||||
| 737 | { STATE_XAUTH_I1, STATE_MAIN_I4, | |||
| 738 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
| 739 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
| 740 | EVENT_RETRANSMIT, | |||
| 741 | FM(xauth_inI1), | |||
| 742 | /* RFC ????: */ | |||
| 743 | .hash_type = V1_HASH_1, }, | |||
| 744 | ||||
| 745 | { STATE_IKEv1_ROOF, STATE_IKEv1_ROOF, | |||
| 746 | LEMPTY((lset_t)0), | |||
| 747 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
| 748 | EVENT_NULL, NULL((void*)0), | |||
| 749 | .hash_type = V1_HASH_NONE, }, | |||
| 750 | ||||
| 751 | #undef FM | |||
| 752 | #undef P | |||
| 753 | }; | |||
| 754 | ||||
| 755 | void init_ikev1(struct logger *logger) | |||
| 756 | { | |||
| 757 | dbg("checking IKEv1 state table"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("checking IKEv1 state table"); } }; | |||
| 758 | ||||
| 759 | /* | |||
| 760 | * Fill in FINITE_STATES[]. | |||
| 761 | * | |||
| 762 | * This is a hack until each finite-state is a separate object | |||
| 763 | * with corresponding edges (aka microcodes). | |||
| 764 | * | |||
| 765 | * XXX: Long term goal is to have a constant FINITE_STATES[] | |||
| 766 | * contain constant pointers and this static writeable array | |||
| 767 | * to just go away. | |||
| 768 | */ | |||
| 769 | for (enum state_kind kind = STATE_IKEv1_FLOOR; kind < STATE_IKEv1_ROOF; kind++) { | |||
| 770 | /* fill in using static struct */ | |||
| 771 | const struct finite_state *fs = &v1_states[kind - STATE_IKEv1_FLOOR]; | |||
| 772 | passert(fs->kind == kind)({ _Bool assertion__ = fs->kind == kind; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 772, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "fs->kind == kind"); } (void) 1; }); | |||
| 773 | passert(finite_states[kind] == NULL)({ _Bool assertion__ = finite_states[kind] == ((void*)0); if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 773, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "finite_states[kind] == ((void*)0)" ); } (void) 1; }); | |||
| 774 | finite_states[kind] = fs; | |||
| 775 | } | |||
| 776 | ||||
| 777 | /* | |||
| 778 | * Go through the state transition table filling in details | |||
| 779 | * and checking for inconsistencies. | |||
| 780 | */ | |||
| 781 | for (const struct state_v1_microcode *t = v1_state_microcode_table; | |||
| 782 | t->state < STATE_IKEv1_ROOF; t++) { | |||
| 783 | ||||
| 784 | passert(t->state >= STATE_IKEv1_FLOOR)({ _Bool assertion__ = t->state >= STATE_IKEv1_FLOOR; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 784, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "t->state >= STATE_IKEv1_FLOOR" ); } (void) 1; }); | |||
| 785 | passert(t->state < STATE_IKEv1_ROOF)({ _Bool assertion__ = t->state < STATE_IKEv1_ROOF; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 785, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "t->state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
| 786 | struct finite_state *from = &v1_states[t->state - STATE_IKEv1_FLOOR]; | |||
| 787 | ||||
| 788 | /* | |||
| 789 | * Deal with next_state == STATE_UNDEFINED. | |||
| 790 | * | |||
| 791 | * XXX: STATE_UNDEFINED is used when a state | |||
| 792 | * transitions back to the same state; such | |||
| 793 | * transitions should instead explicitly specify that | |||
| 794 | * same state. | |||
| 795 | */ | |||
| 796 | enum state_kind next_state = (t->next_state == STATE_UNDEFINED ? | |||
| 797 | t->state : t->next_state); | |||
| 798 | passert(STATE_IKEv1_FLOOR <= next_state &&({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }) | |||
| 799 | next_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
| 800 | const struct finite_state *to = finite_states[next_state]; | |||
| 801 | passert(to != NULL)({ _Bool assertion__ = to != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 801, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "to != ((void*)0)"); } (void) 1; }); | |||
| 802 | ||||
| 803 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 804 | if (from->nr_transitions == 0) { | |||
| 805 | LSWLOG_DEBUG(buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (; buf != ((void*) 0); jambuf_to_logger(buf, &failsafe_logger, DEBUG_STREAM) , buf = ((void*)0)) { | |||
| 806 | jam_string(buf, " "); | |||
| 807 | lswlog_finite_state(buf, from); | |||
| 808 | jam_string(buf, ":"); | |||
| 809 | } | |||
| 810 | } | |||
| 811 | DBG_log(" -> %s %s (%s)", to->short_name, | |||
| 812 | enum_name_short(&event_type_names, | |||
| 813 | t->timeout_event), | |||
| 814 | t->message); | |||
| 815 | } | |||
| 816 | ||||
| 817 | /* | |||
| 818 | * Point .fs_v1_transitions at to the first entry in | |||
| 819 | * v1_state_microcode_table for that state. All other | |||
| 820 | * transitions for that state should follow | |||
| 821 | * immediately after (or to put it another way, the | |||
| 822 | * previous transition's state should be the same as | |||
| 823 | * this). | |||
| 824 | */ | |||
| 825 | if (from->v1_transitions == NULL((void*)0)) { | |||
| 826 | from->v1_transitions = t; | |||
| 827 | } else { | |||
| 828 | passert(t[-1].state == t->state)({ _Bool assertion__ = t[-1].state == t->state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 828, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "t[-1].state == t->state" ); } (void) 1; }); | |||
| 829 | } | |||
| 830 | from->nr_transitions++; | |||
| 831 | ||||
| 832 | if (t->message == NULL((void*)0)) { | |||
| 833 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 833, }; &here; }), "transition %s -> %s missing .message", | |||
| 834 | from->short_name, to->short_name); | |||
| 835 | } | |||
| 836 | ||||
| 837 | /* | |||
| 838 | * Copy (actually merge) the flags that apply to the | |||
| 839 | * state; and not the state transition. | |||
| 840 | * | |||
| 841 | * The original code used something like state | |||
| 842 | * .microcode .flags after the state transition had | |||
| 843 | * completed. I.e., use the flags from a | |||
| 844 | * not-yet-taken potential future state transition and | |||
| 845 | * not the previous one. | |||
| 846 | * | |||
| 847 | * This is just trying to extract them and | |||
| 848 | * check they are consistent. | |||
| 849 | * | |||
| 850 | * XXX: this is confusing | |||
| 851 | * | |||
| 852 | * Should fs_flags and SMF_RETRANSMIT_ON_DUPLICATE | |||
| 853 | * should be replaced by SMF_RESPONDING in the | |||
| 854 | * transition flags? | |||
| 855 | * | |||
| 856 | * Or is this more like .fs_timeout_event which is | |||
| 857 | * always true of a state? | |||
| 858 | */ | |||
| 859 | if ((t->flags & from->flags) != from->flags) { | |||
| 860 | DBGF(DBG_BASE, "transition %s -> %s (%s) missing flags 0x%"PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } | |||
| 861 | from->short_name, to->short_name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } | |||
| 862 | t->message, from->flags){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } }; | |||
| 863 | } | |||
| 864 | from->flags |= t->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)); | |||
| 865 | ||||
| 866 | if (!(t->flags & SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) && | |||
| 867 | (t->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) && | |||
| 868 | t->processor != unexpected) { | |||
| 869 | /* | |||
| 870 | * The first encrypted message carries | |||
| 871 | * authentication information so isn't | |||
| 872 | * applicable. Other encrypted messages | |||
| 873 | * require integrity via the HASH payload. | |||
| 874 | */ | |||
| 875 | if (!(t->req_payloads & LELEM(ISAKMP_NEXT_HASH)((lset_t)1 << (ISAKMP_NEXT_HASH)))) { | |||
| 876 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 876, }; &here; }), | |||
| 877 | "transition %s -> %s (%s) missing HASH payload", | |||
| 878 | from->short_name, to->short_name, | |||
| 879 | t->message); | |||
| 880 | } | |||
| 881 | if (t->hash_type == V1_HASH_NONE) { | |||
| 882 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 882, }; &here; }), | |||
| 883 | "transition %s -> %s (%s) missing HASH protection", | |||
| 884 | from->short_name, to->short_name, | |||
| 885 | t->message); | |||
| 886 | } | |||
| 887 | } | |||
| 888 | } | |||
| 889 | } | |||
| 890 | ||||
| 891 | static stf_status unexpected(struct state *st, struct msg_digest *md UNUSED__attribute__ ((unused))) | |||
| 892 | { | |||
| 893 | log_state(RC_LOG_SERIOUS, st, "unexpected message received in state %s", | |||
| 894 | st->st_state->name); | |||
| 895 | return STF_IGNORE; | |||
| 896 | } | |||
| 897 | ||||
| 898 | /* | |||
| 899 | * RFC 2408 Section 4.6 | |||
| 900 | * | |||
| 901 | * # Initiator Direction Responder NOTE | |||
| 902 | * (1) HDR*; N/D => Error Notification or Deletion | |||
| 903 | */ | |||
| 904 | static stf_status informational(struct state *st, struct msg_digest *md) | |||
| 905 | { | |||
| 906 | /* | |||
| 907 | * XXX: Danger: ST is deleted midway through this function. | |||
| 908 | */ | |||
| 909 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 909, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); | |||
| 910 | st = md->v1_st; /* may be NULL */ | |||
| 911 | ||||
| 912 | struct payload_digest *const n_pld = md->chain[ISAKMP_NEXT_N]; | |||
| 913 | ||||
| 914 | /* If the Notification Payload is not null... */ | |||
| 915 | if (n_pld != NULL((void*)0)) { | |||
| 916 | pb_stream *const n_pbs = &n_pld->pbs; | |||
| 917 | struct isakmp_notification *const n = | |||
| 918 | &n_pld->payload.notification; | |||
| 919 | ||||
| 920 | /* Switch on Notification Type (enum) */ | |||
| 921 | /* note that we _can_ get notification payloads unencrypted | |||
| 922 | * once we are at least in R3/I4. | |||
| 923 | * and that the handler is expected to treat them suspiciously. | |||
| 924 | */ | |||
| 925 | dbg("processing informational %s (%d)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } | |||
| 926 | enum_name(&ikev1_notify_names, n->isan_type),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } | |||
| 927 | n->isan_type){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } }; | |||
| 928 | ||||
| 929 | pstats(ikev1_recv_notifies_e, n->isan_type){ const unsigned __pstat = (n->isan_type); if (__pstat < (sizeof(pstats_ikev1_recv_notifies_e) / sizeof(*(pstats_ikev1_recv_notifies_e )))) { pstats_ikev1_recv_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_recv_notifies_e", __pstat); } }; | |||
| 930 | ||||
| 931 | switch (n->isan_type) { | |||
| 932 | /* | |||
| 933 | * We answer DPD probes even if they claimed not to support | |||
| 934 | * Dead Peer Detection. | |||
| 935 | * We would have to send some kind of reply anyway to prevent | |||
| 936 | * a retransmit, so rather then send an error, we might as | |||
| 937 | * well just send a DPD reply | |||
| 938 | */ | |||
| 939 | case R_U_THERE: | |||
| 940 | if (st == NULL((void*)0)) { | |||
| 941 | llog(RC_LOG, md->md_logger, | |||
| 942 | "received bogus R_U_THERE informational message"); | |||
| 943 | return STF_IGNORE; | |||
| 944 | } | |||
| 945 | return dpd_inI_outR(st, n, n_pbs); | |||
| 946 | ||||
| 947 | case R_U_THERE_ACK: | |||
| 948 | if (st == NULL((void*)0)) { | |||
| 949 | llog(RC_LOG, md->md_logger, | |||
| 950 | "received bogus R_U_THERE_ACK informational message"); | |||
| 951 | return STF_IGNORE; | |||
| 952 | } | |||
| 953 | return dpd_inR(st, n, n_pbs); | |||
| 954 | ||||
| 955 | case PAYLOAD_MALFORMED: | |||
| 956 | if (st != NULL((void*)0)) { | |||
| 957 | st->hidden_variables.st_malformed_received++; | |||
| 958 | ||||
| 959 | log_state(RC_LOG, st, "received %u malformed payload notifies", | |||
| 960 | st->hidden_variables.st_malformed_received); | |||
| 961 | ||||
| 962 | if (st->hidden_variables.st_malformed_sent > | |||
| 963 | MAXIMUM_MALFORMED_NOTIFY16 / 2 && | |||
| 964 | ((st->hidden_variables.st_malformed_sent + | |||
| 965 | st->hidden_variables. | |||
| 966 | st_malformed_received) > | |||
| 967 | MAXIMUM_MALFORMED_NOTIFY16)) { | |||
| 968 | log_state(RC_LOG, st, "too many malformed payloads (we sent %u and received %u", | |||
| 969 | st->hidden_variables.st_malformed_sent, | |||
| 970 | st->hidden_variables.st_malformed_received); | |||
| 971 | delete_state(st); | |||
| 972 | md->v1_st = st = NULL((void*)0); | |||
| 973 | } | |||
| 974 | } | |||
| 975 | ||||
| 976 | return STF_IGNORE; | |||
| 977 | ||||
| 978 | case ISAKMP_N_CISCO_LOAD_BALANCE: | |||
| 979 | /* | |||
| 980 | * ??? what the heck is in the payload? | |||
| 981 | * We take the peer's new IP address from the last 4 octets. | |||
| 982 | * Is anything else possible? Expected? Documented? | |||
| 983 | */ | |||
| 984 | if (st == NULL((void*)0) || !IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 985 | llog(RC_LOG, md->md_logger, | |||
| 986 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with for unestablished state."); | |||
| 987 | } else if (pbs_left(n_pbs)((size_t)((n_pbs)->roof - (n_pbs)->cur)) < 4) { | |||
| 988 | log_state(RC_LOG_SERIOUS, st, | |||
| 989 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message without IPv4 address"); | |||
| 990 | } else { | |||
| 991 | /* | |||
| 992 | * Copy (not cast) the last 4 bytes | |||
| 993 | * (size of an IPv4) address from the | |||
| 994 | * end of the notification into IN | |||
| 995 | * (can't cast as can't assume that | |||
| 996 | * ->roof-4 is correctly aligned). | |||
| 997 | */ | |||
| 998 | struct in_addr in; | |||
| 999 | memcpy(&in, n_pbs->roof - sizeof(in), sizeof(in)); | |||
| 1000 | ip_address new_peer = address_from_in_addr(&in); | |||
| 1001 | ||||
| 1002 | /* is all zeros? */ | |||
| 1003 | if (address_is_any(new_peer)) { | |||
| 1004 | ipstr_buf b; | |||
| 1005 | ||||
| 1006 | log_state(RC_LOG_SERIOUS, st, | |||
| 1007 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with invalid IPv4 address %s", | |||
| 1008 | ipstr(&new_peer, &b)); | |||
| 1009 | return false0; /* XXX: STF_*? */ | |||
| 1010 | } | |||
| 1011 | ||||
| 1012 | /* Saving connection name and whack sock id */ | |||
| 1013 | const char *tmp_name = st->st_connection->name; | |||
| 1014 | struct fd *tmp_whack_sock = fd_dup(st->st_logger->object_whackfd, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1014, }; &here; })); | |||
| 1015 | ||||
| 1016 | /* deleting ISAKMP SA with the current remote peer */ | |||
| 1017 | delete_state(st); | |||
| 1018 | md->v1_st = st = NULL((void*)0); | |||
| 1019 | ||||
| 1020 | /* to find and store the connection associated with tmp_name */ | |||
| 1021 | /* ??? how do we know that tmp_name hasn't been freed? */ | |||
| 1022 | struct connection *tmp_c = conn_by_name(tmp_name, false0/*!strict*/); | |||
| 1023 | ||||
| 1024 | if (tmp_c == NULL((void*)0)) | |||
| 1025 | return STF_IGNORE; | |||
| 1026 | ||||
| 1027 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 1028 | address_buf npb; | |||
| 1029 | DBG_log("new peer address: %s", | |||
| 1030 | str_address(&new_peer, &npb)); | |||
| 1031 | ||||
| 1032 | /* Current remote peer info */ | |||
| 1033 | int count_spd = 1; | |||
| 1034 | for (const struct spd_route *tmp_spd = &tmp_c->spd; | |||
| 1035 | tmp_spd != NULL((void*)0); tmp_spd = tmp_spd->spd_next) { | |||
| 1036 | address_buf b; | |||
| 1037 | ||||
| 1038 | DBG_log("spd route number: %d", | |||
| 1039 | count_spd++); | |||
| 1040 | ||||
| 1041 | /**that info**/ | |||
| 1042 | DBG_log("that id kind: %d", | |||
| 1043 | tmp_spd->that.id.kind); | |||
| 1044 | DBG_log("that id ipaddr: %s", | |||
| 1045 | str_address(&tmp_spd->that.id.ip_addr, &b)); | |||
| 1046 | if (tmp_spd->that.id.name.ptr != NULL((void*)0)) { | |||
| 1047 | DBG_dump_hunk("that id name",{ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); } | |||
| 1048 | tmp_spd->that.id. name){ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); }; | |||
| 1049 | } | |||
| 1050 | DBG_log("that host_addr: %s", | |||
| 1051 | str_address(&tmp_spd->that.host_addr, &b)); | |||
| 1052 | DBG_log("that nexthop: %s", | |||
| 1053 | str_address(&tmp_spd->that.host_nexthop, &b)); | |||
| 1054 | DBG_log("that srcip: %s", | |||
| 1055 | str_address(&tmp_spd->that.host_srcip, &b)); | |||
| 1056 | selector_buf sb; | |||
| 1057 | DBG_log("that client: %s", | |||
| 1058 | str_selector(&tmp_spd->that.client, &sb)); | |||
| 1059 | DBG_log("that has_client: %d", | |||
| 1060 | tmp_spd->that.has_client); | |||
| 1061 | DBG_log("that has_port_wildcard: %d", | |||
| 1062 | tmp_spd->that.has_port_wildcard); | |||
| 1063 | DBG_log("that has_id_wildcards: %d", | |||
| 1064 | tmp_spd->that.has_id_wildcards); | |||
| 1065 | } | |||
| 1066 | ||||
| 1067 | if (tmp_c->interface != NULL((void*)0)) { | |||
| 1068 | endpoint_buf b; | |||
| 1069 | DBG_log("Current interface_addr: %s", | |||
| 1070 | str_endpoint(&tmp_c->interface->local_endpoint, &b)); | |||
| 1071 | } | |||
| 1072 | } | |||
| 1073 | ||||
| 1074 | /* save peer's old address for comparison purposes */ | |||
| 1075 | ip_address old_addr = tmp_c->spd.that.host_addr; | |||
| 1076 | ||||
| 1077 | /* update peer's address */ | |||
| 1078 | tmp_c->spd.that.host_addr = new_peer; | |||
| 1079 | ||||
| 1080 | /* Modifying connection info to store the redirected remote peer info */ | |||
| 1081 | dbg("Old host_addr_name : %s", tmp_c->spd.that.host_addr_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Old host_addr_name : %s", tmp_c->spd.that. host_addr_name); } }; | |||
| 1082 | tmp_c->spd.that.host_addr_name = NULL((void*)0); | |||
| 1083 | ||||
| 1084 | /* ??? do we know the id.kind has an ip_addr? */ | |||
| 1085 | tmp_c->spd.that.id.ip_addr = new_peer; | |||
| 1086 | ||||
| 1087 | /* update things that were the old peer */ | |||
| 1088 | if (address_eq_address(tmp_c->spd.this.host_nexthop, old_addr)) { | |||
| 1089 | address_buf ob, nb; | |||
| 1090 | dbg("local next hop %s is the same as the old remote addr, changing local next hop to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1091 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1092 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
| 1093 | tmp_c->spd.this.host_nexthop = new_peer; | |||
| 1094 | } | |||
| 1095 | ||||
| 1096 | if (address_eq_address(tmp_c->spd.that.host_srcip, old_addr)) { | |||
| 1097 | address_buf ob, nb; | |||
| 1098 | dbg("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1099 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1100 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
| 1101 | tmp_c->spd.that.host_srcip = new_peer; | |||
| 1102 | } | |||
| 1103 | ||||
| 1104 | /* | |||
| 1105 | * XXX: should this also check that | |||
| 1106 | * the client is a single address? | |||
| 1107 | */ | |||
| 1108 | ip_address client_prefix = selector_prefix(tmp_c->spd.that.client); | |||
| 1109 | if (address_eq_address(client_prefix, old_addr)) { | |||
| 1110 | address_buf ob, nb; | |||
| 1111 | dbg("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1112 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
| 1113 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
| 1114 | tmp_c->spd.that.client = selector_from_address(new_peer); | |||
| 1115 | } | |||
| 1116 | ||||
| 1117 | /* | |||
| 1118 | * ??? is this wise? This may changes | |||
| 1119 | * a lot of other connections. | |||
| 1120 | */ | |||
| 1121 | tmp_c->host_pair->remote = new_peer; | |||
| 1122 | ||||
| 1123 | /* Initiating connection to the redirected peer */ | |||
| 1124 | struct logger logger[] = { GLOBAL_LOGGER(tmp_whack_sock)(struct logger) { .where = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1124, }; &here; }), .global_whackfd = tmp_whack_sock, .object = ((void*)0), .object_vec = &logger_global_vec, }, }; /*placeholder*/ | |||
| 1125 | initiate_connections_by_name(tmp_name, /*remote-name*/NULL((void*)0), | |||
| 1126 | /*background?*/tmp_whack_sock == NULL((void*)0)/*guess*/, | |||
| 1127 | logger); | |||
| 1128 | close_any(&tmp_whack_sock)close_any_fd((&tmp_whack_sock), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1128, }; &here; })); | |||
| 1129 | } | |||
| 1130 | return STF_IGNORE; | |||
| 1131 | default: | |||
| 1132 | { | |||
| 1133 | struct logger *logger = st != NULL((void*)0) ? st->st_logger : | |||
| 1134 | md->md_logger; | |||
| 1135 | llog(RC_LOG_SERIOUS, logger, | |||
| 1136 | "received and ignored notification payload: %s", | |||
| 1137 | enum_name(&ikev1_notify_names, n->isan_type)); | |||
| 1138 | return STF_IGNORE; | |||
| 1139 | } | |||
| 1140 | } | |||
| 1141 | } else { | |||
| 1142 | /* warn if we didn't find any Delete or Notify payload in packet */ | |||
| 1143 | if (md->chain[ISAKMP_NEXT_D] == NULL((void*)0)) { | |||
| 1144 | const struct logger *logger = (st != NULL((void*)0) ? st->st_logger : | |||
| 1145 | md != NULL((void*)0) ? md->md_logger : | |||
| 1146 | &failsafe_logger); | |||
| 1147 | llog(RC_LOG_SERIOUS, logger, | |||
| 1148 | "received and ignored empty informational notification payload"); | |||
| 1149 | } | |||
| 1150 | return STF_IGNORE; | |||
| 1151 | } | |||
| 1152 | } | |||
| 1153 | ||||
| 1154 | /* | |||
| 1155 | * create output HDR as replica of input HDR - IKEv1 only; return the body | |||
| 1156 | */ | |||
| 1157 | void ikev1_init_pbs_out_from_md_hdr(struct msg_digest *md, bool_Bool enc, | |||
| 1158 | struct pbs_outpacket_byte_stream *output_stream, uint8_t *output_buffer, | |||
| 1159 | size_t sizeof_output_buffer, | |||
| 1160 | struct pbs_outpacket_byte_stream *rbody, | |||
| 1161 | struct logger *logger) | |||
| 1162 | { | |||
| 1163 | struct isakmp_hdr hdr = md->hdr; /* mostly same as incoming header */ | |||
| 1164 | ||||
| 1165 | /* make sure we start with a clean buffer */ | |||
| 1166 | *output_stream = open_pbs_out("reply packet", output_buffer, sizeof_output_buffer, logger); | |||
| 1167 | ||||
| 1168 | hdr.isa_flags = 0; /* zero all flags */ | |||
| 1169 | if (enc) | |||
| 1170 | hdr.isa_flags |= ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX); | |||
| 1171 | ||||
| 1172 | if (impair.send_bogus_isakmp_flag) { | |||
| 1173 | hdr.isa_flags |= ISAKMP_FLAGS_RESERVED_BIT6(1<<ISAKMP_FLAGS_RESERVED_BIT6_IX); | |||
| 1174 | } | |||
| 1175 | ||||
| 1176 | /* there is only one IKEv1 version, and no new one will ever come - no need to set version */ | |||
| 1177 | hdr.isa_np = 0; | |||
| 1178 | /* surely must have room and be well-formed */ | |||
| 1179 | passert(out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody))({ _Bool assertion__ = out_struct(&hdr, &isakmp_hdr_desc , output_stream, rbody); if (!assertion__) { where_t here = ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1179, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody)" ); } (void) 1; }); | |||
| 1180 | } | |||
| 1181 | ||||
| 1182 | /* | |||
| 1183 | * Recognise and, if necesssary, respond to an IKEv1 duplicate. | |||
| 1184 | * | |||
| 1185 | * Use .st_state, which is the true current state, and not MD | |||
| 1186 | * .FROM_STATE (which is derived from some convoluted magic) when | |||
| 1187 | * determining if the duplicate should or should not get a response. | |||
| 1188 | */ | |||
| 1189 | static bool_Bool ikev1_duplicate(struct state *st, struct msg_digest *md) | |||
| 1190 | { | |||
| 1191 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1191, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
| 1192 | if (st->st_v1_rpacket.ptr != NULL((void*)0) && | |||
| 1193 | st->st_v1_rpacket.len == pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)) && | |||
| 1194 | memeq(st->st_v1_rpacket.ptr, md->packet_pbs.start,(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0) | |||
| 1195 | st->st_v1_rpacket.len)(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0)) { | |||
| 1196 | /* | |||
| 1197 | * Duplicate. Drop or retransmit? | |||
| 1198 | * | |||
| 1199 | * Only re-transmit when the last state transition | |||
| 1200 | * (triggered by this packet the first time) included | |||
| 1201 | * a reply. | |||
| 1202 | * | |||
| 1203 | * XXX: is SMF_RETRANSMIT_ON_DUPLICATE useful or | |||
| 1204 | * correct? | |||
| 1205 | */ | |||
| 1206 | bool_Bool replied = (st->st_v1_last_transition != NULL((void*)0) && | |||
| 1207 | (st->st_v1_last_transition->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)))); | |||
| 1208 | bool_Bool retransmit_on_duplicate = | |||
| 1209 | (st->st_state->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4))); | |||
| 1210 | if (replied && retransmit_on_duplicate) { | |||
| 1211 | /* | |||
| 1212 | * Transitions with EVENT_SA_DISCARD should | |||
| 1213 | * always respond to re-transmits (why?); else | |||
| 1214 | * cap. | |||
| 1215 | */ | |||
| 1216 | if (st->st_v1_last_transition->timeout_event == EVENT_SA_DISCARD || | |||
| 1217 | count_duplicate(st, MAXIMUM_v1_ACCEPTED_DUPLICATES2)) { | |||
| 1218 | log_state(RC_RETRANSMISSION, st, | |||
| 1219 | "retransmitting in response to duplicate packet; already %s", | |||
| 1220 | st->st_state->name); | |||
| 1221 | resend_recorded_v1_ike_msg(st, "retransmit in response to duplicate"); | |||
| 1222 | } else { | |||
| 1223 | log_state(RC_LOG_SERIOUS, st, | |||
| 1224 | "discarding duplicate packet -- exhausted retransmission; already %s", | |||
| 1225 | st->st_state->name); | |||
| 1226 | } | |||
| 1227 | } else { | |||
| 1228 | dbg("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } | |||
| 1229 | st->st_serialno, st->st_state->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } | |||
| 1230 | bool_str(replied), bool_str(retransmit_on_duplicate)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } }; | |||
| 1231 | } | |||
| 1232 | return true1; | |||
| 1233 | } | |||
| 1234 | return false0; | |||
| 1235 | } | |||
| 1236 | ||||
| 1237 | /* process an input packet, possibly generating a reply. | |||
| 1238 | * | |||
| 1239 | * If all goes well, this routine eventually calls a state-specific | |||
| 1240 | * transition function. | |||
| 1241 | * | |||
| 1242 | * This routine will not release_any_md(mdp). It is expected that its | |||
| 1243 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
| 1244 | * **mdp should not be freed. So the caller should be prepared for | |||
| 1245 | * *mdp being set to NULL. | |||
| 1246 | */ | |||
| 1247 | void process_v1_packet(struct msg_digest *md) | |||
| 1248 | { | |||
| 1249 | bool_Bool new_iv_set = false0; | |||
| 1250 | struct state *st = NULL((void*)0); | |||
| 1251 | enum state_kind from_state = STATE_UNDEFINED; /* state we started in */ | |||
| 1252 | ||||
| 1253 | #define SEND_NOTIFICATION(t){ { const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, t); else send_notification_from_md(md, t); } \ | |||
| 1254 | { \ | |||
| 1255 | pstats(ikev1_sent_notifies_e, t){ const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; \ | |||
| 1256 | if (st != NULL((void*)0)) \ | |||
| 1257 | send_notification_from_state(st, from_state, t); \ | |||
| 1258 | else \ | |||
| 1259 | send_notification_from_md(md, t); \ | |||
| 1260 | } | |||
| 1261 | ||||
| 1262 | #define LOG_PACKET(RC, ...){ if (st != ((void*)0)) { log_state(RC, st, ...); } else { llog (RC, md->md_logger, ...); } } \ | |||
| 1263 | { \ | |||
| 1264 | if (st != NULL((void*)0)) { \ | |||
| 1265 | log_state(RC, st, __VA_ARGS__); \ | |||
| 1266 | } else { \ | |||
| 1267 | llog(RC, md->md_logger, __VA_ARGS__); \ | |||
| 1268 | } \ | |||
| 1269 | } | |||
| 1270 | #define LOG_PACKET_JAMBUF(RC_FLAGS, BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) \ | |||
| 1271 | LLOG_JAMBUF(RC_FLAGS, (st != NULL ? st->st_logger : md->md_logger), BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) | |||
| 1272 | ||||
| 1273 | switch (md->hdr.isa_xchg) { | |||
| 1274 | case ISAKMP_XCHG_AGGR: | |||
| 1275 | case ISAKMP_XCHG_IDPROT: /* part of a Main Mode exchange */ | |||
| 1276 | if (md->hdr.isa_msgid != v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
| 1277 | LOG_PACKET(RC_LOG, "Message ID was 0x%08" PRIx32 " but should be zero in phase 1",{ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } } | |||
| 1278 | md->hdr.isa_msgid){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } }; | |||
| 1279 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
| 1280 | return; | |||
| 1281 | } | |||
| 1282 | ||||
| 1283 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
| 1284 | LOG_PACKET(RC_LOG, "Initiator Cookie must not be zero in phase 1 message"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Initiator Cookie must not be zero in phase 1 message" ); } else { llog(RC_LOG, md->md_logger, "Initiator Cookie must not be zero in phase 1 message" ); } }; | |||
| 1285 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
| 1286 | return; | |||
| 1287 | } | |||
| 1288 | ||||
| 1289 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
| 1290 | /* | |||
| 1291 | * initial message from initiator | |||
| 1292 | */ | |||
| 1293 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
| 1294 | LOG_PACKET(RC_LOG, "initial phase 1 message is invalid: its Encrypted Flag is on"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } else { llog(RC_LOG, md->md_logger, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } }; | |||
| 1295 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; | |||
| 1296 | return; | |||
| 1297 | } | |||
| 1298 | ||||
| 1299 | /* | |||
| 1300 | * If there is already an existing state with | |||
| 1301 | * this ICOOKIE, assume it is some sort of | |||
| 1302 | * re-transmit. | |||
| 1303 | */ | |||
| 1304 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
| 1305 | md->hdr.isa_msgid); | |||
| 1306 | if (st != NULL((void*)0)) { | |||
| 1307 | if (!ikev1_duplicate(st, md)) { | |||
| 1308 | /* | |||
| 1309 | * Not a duplicate for the | |||
| 1310 | * current state; assume that | |||
| 1311 | * this a really old | |||
| 1312 | * re-transmit for an earlier | |||
| 1313 | * state that should be | |||
| 1314 | * discarded. | |||
| 1315 | */ | |||
| 1316 | log_state(RC_LOG, st, "discarding initial packet; already %s", | |||
| 1317 | st->st_state->name); | |||
| 1318 | } | |||
| 1319 | return; | |||
| 1320 | } | |||
| 1321 | passert(st == NULL)({ _Bool assertion__ = st == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1321, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st == ((void*)0)"); } (void) 1; }); /* new state needed */ | |||
| 1322 | /* don't build a state until the message looks tasty */ | |||
| 1323 | from_state = (md->hdr.isa_xchg == ISAKMP_XCHG_IDPROT ? | |||
| 1324 | STATE_MAIN_R0 : STATE_AGGR_R0); | |||
| 1325 | } else { | |||
| 1326 | /* not an initial message */ | |||
| 1327 | ||||
| 1328 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
| 1329 | md->hdr.isa_msgid); | |||
| 1330 | ||||
| 1331 | if (st == NULL((void*)0)) { | |||
| 1332 | /* | |||
| 1333 | * perhaps this is a first message | |||
| 1334 | * from the responder and contains a | |||
| 1335 | * responder cookie that we've not yet | |||
| 1336 | * seen. | |||
| 1337 | */ | |||
| 1338 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
| 1339 | md->hdr.isa_msgid); | |||
| 1340 | ||||
| 1341 | if (st == NULL((void*)0)) { | |||
| 1342 | llog(RC_LOG, md->md_logger, | |||
| 1343 | "phase 1 message is part of an unknown exchange"); | |||
| 1344 | /* XXX Could send notification back */ | |||
| 1345 | return; | |||
| 1346 | } | |||
| 1347 | } | |||
| 1348 | from_state = st->st_state->kind; | |||
| 1349 | } | |||
| 1350 | break; | |||
| 1351 | ||||
| 1352 | case ISAKMP_XCHG_INFO: /* an informational exchange */ | |||
| 1353 | st = find_v1_info_state(&md->hdr.isa_ike_spis, | |||
| 1354 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
| 1355 | ||||
| 1356 | if (st == NULL((void*)0)) { | |||
| 1357 | /* | |||
| 1358 | * might be an informational response to our | |||
| 1359 | * first message, in which case, we don't know | |||
| 1360 | * the rcookie yet. | |||
| 1361 | */ | |||
| 1362 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
| 1363 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
| 1364 | } | |||
| 1365 | ||||
| 1366 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
| 1367 | bool_Bool quiet = (st == NULL((void*)0)); | |||
| 1368 | ||||
| 1369 | if (st == NULL((void*)0)) { | |||
| 1370 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 1371 | DBG_log("Informational Exchange is for an unknown (expired?) SA with MSGID:0x%08" PRIx32"x", | |||
| 1372 | md->hdr.isa_msgid); | |||
| 1373 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)) | |||
| 1374 | md->hdr.isa_ike_initiator_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)); | |||
| 1375 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)) | |||
| 1376 | md->hdr.isa_ike_responder_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)); | |||
| 1377 | } | |||
| 1378 | ||||
| 1379 | /* XXX Could send notification back */ | |||
| 1380 | return; | |||
| 1381 | } | |||
| 1382 | ||||
| 1383 | if (!IS_V1_ISAKMP_ENCRYPTED(st->st_state->kind)((((lset_t)1 << (st->st_state->kind)) & ((((lset_t )1 << (STATE_MAIN_I4)) - ((lset_t)1 << (STATE_MAIN_R2 )) + ((lset_t)1 << (STATE_MAIN_I4))) | (((lset_t)1 << (STATE_AGGR_R2)) - ((lset_t)1 << (STATE_AGGR_R1)) + (( lset_t)1 << (STATE_AGGR_R2))) | (((lset_t)1 << (STATE_QUICK_R2 )) - ((lset_t)1 << (STATE_QUICK_R0)) + ((lset_t)1 << (STATE_QUICK_R2))) | ((lset_t)1 << (STATE_INFO_PROTECTED )) | (((lset_t)1 << (STATE_XAUTH_I1)) - ((lset_t)1 << (STATE_XAUTH_R0)) + ((lset_t)1 << (STATE_XAUTH_I1))))) != ((lset_t)0))) { | |||
| 1384 | if (!quiet) { | |||
| 1385 | log_state(RC_LOG_SERIOUS, st, | |||
| 1386 | "encrypted Informational Exchange message is invalid because no key is known"); | |||
| 1387 | } | |||
| 1388 | /* XXX Could send notification back */ | |||
| 1389 | return; | |||
| 1390 | } | |||
| 1391 | ||||
| 1392 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
| 1393 | if (!quiet) { | |||
| 1394 | log_state(RC_LOG_SERIOUS, st, | |||
| 1395 | "Informational Exchange message is invalid because it has a Message ID of 0"); | |||
| 1396 | } | |||
| 1397 | /* XXX Could send notification back */ | |||
| 1398 | return; | |||
| 1399 | } | |||
| 1400 | ||||
| 1401 | if (!unique_msgid(st, md->hdr.isa_msgid)) { | |||
| 1402 | if (!quiet) { | |||
| 1403 | log_state(RC_LOG_SERIOUS, st, | |||
| 1404 | "Informational Exchange message is invalid because it has a previously used Message ID (0x%08" PRIx32"x" " )", | |||
| 1405 | md->hdr.isa_msgid); | |||
| 1406 | } | |||
| 1407 | /* XXX Could send notification back */ | |||
| 1408 | return; | |||
| 1409 | } | |||
| 1410 | st->st_v1_msgid.reserved = false0; | |||
| 1411 | ||||
| 1412 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
| 1413 | new_iv_set = true1; | |||
| 1414 | ||||
| 1415 | from_state = STATE_INFO_PROTECTED; | |||
| 1416 | } else { | |||
| 1417 | if (st != NULL((void*)0) && | |||
| 1418 | IS_V1_ISAKMP_AUTHENTICATED(st->st_state)(STATE_MAIN_R3 <= ((st->st_state)->kind) && STATE_AGGR_R0 != ((st->st_state)->kind) && STATE_AGGR_I1 != ( (st->st_state)->kind))) { | |||
| 1419 | log_state(RC_LOG_SERIOUS, st, | |||
| 1420 | "Informational Exchange message must be encrypted"); | |||
| 1421 | /* XXX Could send notification back */ | |||
| 1422 | return; | |||
| 1423 | } | |||
| 1424 | from_state = STATE_INFO; | |||
| 1425 | } | |||
| 1426 | break; | |||
| 1427 | ||||
| 1428 | case ISAKMP_XCHG_QUICK: /* part of a Quick Mode exchange */ | |||
| 1429 | ||||
| 1430 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
| 1431 | dbg("Quick Mode message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has an Initiator Cookie of 0" ); } }; | |||
| 1432 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
| 1433 | return; | |||
| 1434 | } | |||
| 1435 | ||||
| 1436 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
| 1437 | dbg("Quick Mode message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Responder Cookie of 0" ); } }; | |||
| 1438 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
| 1439 | return; | |||
| 1440 | } | |||
| 1441 | ||||
| 1442 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
| 1443 | dbg("Quick Mode message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Message ID of 0" ); } }; | |||
| 1444 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
| 1445 | return; | |||
| 1446 | } | |||
| 1447 | ||||
| 1448 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
| 1449 | md->hdr.isa_msgid); | |||
| 1450 | ||||
| 1451 | if (st == NULL((void*)0)) { | |||
| 1452 | /* No appropriate Quick Mode state. | |||
| 1453 | * See if we have a Main Mode state. | |||
| 1454 | * ??? what if this is a duplicate of another message? | |||
| 1455 | */ | |||
| 1456 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
| 1457 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
| 1458 | ||||
| 1459 | if (st == NULL((void*)0)) { | |||
| 1460 | dbg("Quick Mode message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is for a non-existent (expired?) ISAKMP SA" ); } }; | |||
| 1461 | /* XXX Could send notification back */ | |||
| 1462 | return; | |||
| 1463 | } | |||
| 1464 | ||||
| 1465 | if (st->st_oakley.doing_xauth) { | |||
| 1466 | dbg("Cannot do Quick Mode until XAUTH done."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Cannot do Quick Mode until XAUTH done."); } }; | |||
| 1467 | return; | |||
| 1468 | } | |||
| 1469 | ||||
| 1470 | /* Have we just given an IP address to peer? */ | |||
| 1471 | if (st->st_state->kind == STATE_MODE_CFG_R2) { | |||
| 1472 | /* ISAKMP is up... */ | |||
| 1473 | change_state(st, STATE_MAIN_R3); | |||
| 1474 | } | |||
| 1475 | ||||
| 1476 | #ifdef SOFTREMOTE_CLIENT_WORKAROUND | |||
| 1477 | /* See: http://popoludnica.pl/?id=10100110 */ | |||
| 1478 | if (st->st_state->kind == STATE_MODE_CFG_R1) { | |||
| 1479 | log_state(RC_LOG, st, | |||
| 1480 | "SoftRemote workaround: Cannot do Quick Mode until MODECFG done."); | |||
| 1481 | return; | |||
| 1482 | } | |||
| 1483 | #endif | |||
| 1484 | ||||
| 1485 | ||||
| 1486 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 1487 | log_state(RC_LOG_SERIOUS, st, | |||
| 1488 | "Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA"); | |||
| 1489 | SEND_NOTIFICATION(PAYLOAD_MALFORMED /* XXX ? */){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 1490 | return; | |||
| 1491 | } | |||
| 1492 | ||||
| 1493 | if (!unique_msgid(st, md->hdr.isa_msgid)) { | |||
| 1494 | log_state(RC_LOG_SERIOUS, st, | |||
| 1495 | "Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x%08" PRIx32"x" " (perhaps this is a duplicated packet)", | |||
| 1496 | md->hdr.isa_msgid); | |||
| 1497 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
| 1498 | return; | |||
| 1499 | } | |||
| 1500 | st->st_v1_msgid.reserved = false0; | |||
| 1501 | ||||
| 1502 | /* Quick Mode Initial IV */ | |||
| 1503 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
| 1504 | new_iv_set = true1; | |||
| 1505 | ||||
| 1506 | from_state = STATE_QUICK_R0; | |||
| 1507 | } else { | |||
| 1508 | if (st->st_oakley.doing_xauth) { | |||
| 1509 | log_state(RC_LOG, st, "Cannot do Quick Mode until XAUTH done."); | |||
| 1510 | return; | |||
| 1511 | } | |||
| 1512 | from_state = st->st_state->kind; | |||
| 1513 | } | |||
| 1514 | ||||
| 1515 | break; | |||
| 1516 | ||||
| 1517 | case ISAKMP_XCHG_MODE_CFG: | |||
| 1518 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
| 1519 | dbg("Mode Config message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has an Initiator Cookie of 0" ); } }; | |||
| 1520 | /* XXX Could send notification back */ | |||
| 1521 | return; | |||
| 1522 | } | |||
| 1523 | ||||
| 1524 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
| 1525 | dbg("Mode Config message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Responder Cookie of 0" ); } }; | |||
| 1526 | /* XXX Could send notification back */ | |||
| 1527 | return; | |||
| 1528 | } | |||
| 1529 | ||||
| 1530 | if (md->hdr.isa_msgid == 0) { | |||
| 1531 | dbg("Mode Config message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Message ID of 0" ); } }; | |||
| 1532 | /* XXX Could send notification back */ | |||
| 1533 | return; | |||
| 1534 | } | |||
| 1535 | ||||
| 1536 | st = find_v1_info_state(&md->hdr.isa_ike_spis, md->hdr.isa_msgid); | |||
| 1537 | ||||
| 1538 | if (st == NULL((void*)0)) { | |||
| 1539 | /* No appropriate Mode Config state. | |||
| 1540 | * See if we have a Main Mode state. | |||
| 1541 | * ??? what if this is a duplicate of another message? | |||
| 1542 | */ | |||
| 1543 | dbg("No appropriate Mode Config state yet. See if we have a Main Mode state"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("No appropriate Mode Config state yet. See if we have a Main Mode state" ); } }; | |||
| 1544 | ||||
| 1545 | st = find_v1_info_state(&md->hdr.isa_ike_spis, 0); | |||
| 1546 | ||||
| 1547 | if (st == NULL((void*)0)) { | |||
| 1548 | dbg("Mode Config message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is for a non-existent (expired?) ISAKMP SA" ); } }; | |||
| 1549 | /* XXX Could send notification back */ | |||
| 1550 | /* ??? ought to log something (not just DBG)? */ | |||
| 1551 | return; | |||
| 1552 | } | |||
| 1553 | ||||
| 1554 | ||||
| 1555 | const struct end *this = &st->st_connection->spd.this; | |||
| 1556 | esb_buf b; | |||
| 1557 | dbg(" processing received isakmp_xchg_type %s; this is a%s%s%s%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
| 1558 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
| 1559 | this->xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
| 1560 | this->xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
| 1561 | this->modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
| 1562 | this->modecfg_client ? " modecfgclient" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } }; | |||
| 1563 | ||||
| 1564 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 1565 | dbg("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } } | |||
| 1566 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } }; | |||
| 1567 | /* XXX Could send notification back */ | |||
| 1568 | return; | |||
| 1569 | } | |||
| 1570 | dbg(" call init_phase2_iv"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" call init_phase2_iv"); } }; | |||
| 1571 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
| 1572 | new_iv_set = true1; | |||
| 1573 | ||||
| 1574 | /* | |||
| 1575 | * okay, now we have to figure out if we are receiving a bogus | |||
| 1576 | * new message in an outstanding XAUTH server conversation | |||
| 1577 | * (i.e. a reply to our challenge) | |||
| 1578 | * (this occurs with some broken other implementations). | |||
| 1579 | * | |||
| 1580 | * or if receiving for the first time, an XAUTH challenge. | |||
| 1581 | * | |||
| 1582 | * or if we are getting a MODECFG request. | |||
| 1583 | * | |||
| 1584 | * we distinguish these states because we cannot both be an | |||
| 1585 | * XAUTH server and client, and our policy tells us which | |||
| 1586 | * one we are. | |||
| 1587 | * | |||
| 1588 | * to complicate further, it is normal to start a new msgid | |||
| 1589 | * when going from one state to another, or when restarting | |||
| 1590 | * the challenge. | |||
| 1591 | * | |||
| 1592 | */ | |||
| 1593 | ||||
| 1594 | if (this->xauth_server && | |||
| 1595 | st->st_state->kind == STATE_XAUTH_R1 && | |||
| 1596 | st->quirks.xauth_ack_msgid) { | |||
| 1597 | from_state = STATE_XAUTH_R1; | |||
| 1598 | dbg(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } } | |||
| 1599 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } }; | |||
| 1600 | } else if (this->xauth_client && | |||
| 1601 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
| 1602 | from_state = STATE_XAUTH_I0; | |||
| 1603 | dbg(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
| 1604 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
| 1605 | } else if (this->xauth_client && | |||
| 1606 | st->st_state->kind == STATE_XAUTH_I1) { | |||
| 1607 | /* | |||
| 1608 | * in this case, we got a new MODECFG message after I0, maybe | |||
| 1609 | * because it wants to start over again. | |||
| 1610 | */ | |||
| 1611 | from_state = STATE_XAUTH_I0; | |||
| 1612 | dbg(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } } | |||
| 1613 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } }; | |||
| 1614 | } else if (this->modecfg_server && | |||
| 1615 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
| 1616 | from_state = STATE_MODE_CFG_R0; | |||
| 1617 | dbg(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
| 1618 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
| 1619 | } else if (this->modecfg_client && | |||
| 1620 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
| 1621 | from_state = STATE_MODE_CFG_R1; | |||
| 1622 | dbg(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
| 1623 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
| 1624 | } else { | |||
| 1625 | esb_buf b; | |||
| 1626 | dbg("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1627 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1628 | st->st_connection ->spd.this.xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1629 | st->st_connection->spd.this.xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1630 | st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1631 | st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
| 1632 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } }; | |||
| 1633 | return; | |||
| 1634 | } | |||
| 1635 | } else { | |||
| 1636 | if (st->st_connection->spd.this.xauth_server && | |||
| 1637 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
| 1638 | /* Switch from Phase1 to Mode Config */ | |||
| 1639 | dbg("We were in phase 1, with no state, so we went to XAUTH_R0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We were in phase 1, with no state, so we went to XAUTH_R0" ); } }; | |||
| 1640 | change_state(st, STATE_XAUTH_R0); | |||
| 1641 | } | |||
| 1642 | ||||
| 1643 | /* otherwise, this is fine, we continue in the state we are in */ | |||
| 1644 | from_state = st->st_state->kind; | |||
| 1645 | } | |||
| 1646 | ||||
| 1647 | break; | |||
| 1648 | ||||
| 1649 | case ISAKMP_XCHG_NONE: | |||
| 1650 | case ISAKMP_XCHG_BASE: | |||
| 1651 | case ISAKMP_XCHG_AO: | |||
| 1652 | case ISAKMP_XCHG_NGRP: | |||
| 1653 | default: | |||
| 1654 | { | |||
| 1655 | esb_buf b; | |||
| 1656 | dbg("unsupported exchange type %s in message",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } } | |||
| 1657 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } }; | |||
| 1658 | SEND_NOTIFICATION(UNSUPPORTED_EXCHANGE_TYPE){ { const unsigned __pstat = (UNSUPPORTED_EXCHANGE_TYPE); if ( __pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(* (pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, UNSUPPORTED_EXCHANGE_TYPE); else send_notification_from_md (md, UNSUPPORTED_EXCHANGE_TYPE); }; | |||
| 1659 | return; | |||
| 1660 | } | |||
| 1661 | } | |||
| 1662 | ||||
| 1663 | /* We have found a from_state, and perhaps a state object. | |||
| 1664 | * If we need to build a new state object, | |||
| 1665 | * we wait until the packet has been sanity checked. | |||
| 1666 | */ | |||
| 1667 | ||||
| 1668 | /* We don't support the Commit Flag. It is such a bad feature. | |||
| 1669 | * It isn't protected -- neither encrypted nor authenticated. | |||
| 1670 | * A man in the middle turns it on, leading to DoS. | |||
| 1671 | * We just ignore it, with a warning. | |||
| 1672 | */ | |||
| 1673 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_COMMIT(1<<ISAKMP_FLAGS_v1_COMMIT_IX)) | |||
| 1674 | dbg("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag" ); } }; | |||
| 1675 | ||||
| 1676 | /* Handle IKE fragmentation payloads */ | |||
| 1677 | if (md->hdr.isa_np == ISAKMP_NEXT_IKE_FRAGMENTATION) { | |||
| 1678 | struct isakmp_ikefrag fraghdr; | |||
| 1679 | int last_frag_index = 0; /* index of the last fragment */ | |||
| 1680 | pb_stream frag_pbs; | |||
| 1681 | ||||
| 1682 | if (st == NULL((void*)0)) { | |||
| 1683 | dbg("received IKE fragment, but have no state. Ignoring packet."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment, but have no state. Ignoring packet." ); } }; | |||
| 1684 | return; | |||
| 1685 | } | |||
| 1686 | ||||
| 1687 | if ((st->st_connection->policy & POLICY_IKE_FRAG_ALLOW((lset_t)1 << (POLICY_IKE_FRAG_ALLOW_IX))) == 0) { | |||
| 1688 | dbg("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)" ); } }; | |||
| 1689 | return; | |||
| 1690 | } | |||
| 1691 | ||||
| 1692 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ikefrag_desc, | |||
| 1693 | &fraghdr, sizeof(fraghdr), &frag_pbs); | |||
| 1694 | if (d != NULL((void*)0)) { | |||
| 1695 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
| 1696 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 1697 | return; | |||
| 1698 | } | |||
| 1699 | if (pbs_room(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->start )) != fraghdr.isafrag_length || | |||
| 1700 | fraghdr.isafrag_np != ISAKMP_NEXT_NONE || | |||
| 1701 | fraghdr.isafrag_number == 0 || | |||
| 1702 | fraghdr.isafrag_number > 16) { | |||
| 1703 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 1704 | return; | |||
| 1705 | } | |||
| 1706 | ||||
| 1707 | dbg("received IKE fragment id '%d', number '%u'%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
| 1708 | fraghdr.isafrag_id,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
| 1709 | fraghdr.isafrag_number,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
| 1710 | (fraghdr.isafrag_flags == 1) ? "(last)" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } }; | |||
| 1711 | ||||
| 1712 | struct v1_ike_rfrag *ike_frag = alloc_thing(struct v1_ike_rfrag, "ike_frag")((struct v1_ike_rfrag*) alloc_bytes(sizeof(struct v1_ike_rfrag ), ("ike_frag"))); | |||
| 1713 | ike_frag->md = md_addref(md, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1713, }; &here; })); | |||
| 1714 | ike_frag->index = fraghdr.isafrag_number; | |||
| 1715 | ike_frag->last = (fraghdr.isafrag_flags & 1); | |||
| 1716 | ike_frag->size = pbs_left(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->cur) ); | |||
| 1717 | ike_frag->data = frag_pbs.cur; | |||
| 1718 | ||||
| 1719 | /* Add the fragment to the state */ | |||
| 1720 | struct v1_ike_rfrag **i = &st->st_v1_rfrags; | |||
| 1721 | for (;;) { | |||
| 1722 | if (ike_frag != NULL((void*)0)) { | |||
| 1723 | /* Still looking for a place to insert ike_frag */ | |||
| 1724 | if (*i == NULL((void*)0) || | |||
| 1725 | (*i)->index > ike_frag->index) { | |||
| 1726 | ike_frag->next = *i; | |||
| 1727 | *i = ike_frag; | |||
| 1728 | ike_frag = NULL((void*)0); | |||
| 1729 | } else if ((*i)->index == ike_frag->index) { | |||
| 1730 | /* Replace fragment with same index */ | |||
| 1731 | struct v1_ike_rfrag *old = *i; | |||
| 1732 | ||||
| 1733 | ike_frag->next = old->next; | |||
| 1734 | *i = ike_frag; | |||
| 1735 | pexpect(old->md != NULL)({ _Bool assertion__ = old->md != ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1735, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "old->md != ((void*)0)" ); } assertion__; }); | |||
| 1736 | release_any_md(&old->md)md_delref(&old->md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1736, }; &here; })); | |||
| 1737 | pfree(old); | |||
| 1738 | ike_frag = NULL((void*)0); | |||
| 1739 | } | |||
| 1740 | } | |||
| 1741 | ||||
| 1742 | if (*i == NULL((void*)0)) | |||
| 1743 | break; | |||
| 1744 | ||||
| 1745 | if ((*i)->last) | |||
| 1746 | last_frag_index = (*i)->index; | |||
| 1747 | ||||
| 1748 | i = &(*i)->next; | |||
| 1749 | } | |||
| 1750 | ||||
| 1751 | /* We have the last fragment, reassemble if complete */ | |||
| 1752 | if (last_frag_index != 0) { | |||
| 1753 | size_t size = 0; | |||
| 1754 | int prev_index = 0; | |||
| 1755 | ||||
| 1756 | for (struct v1_ike_rfrag *frag = st->st_v1_rfrags; frag; frag = frag->next) { | |||
| 1757 | size += frag->size; | |||
| 1758 | if (frag->index != ++prev_index) { | |||
| 1759 | break; /* fragment list incomplete */ | |||
| 1760 | } else if (frag->index == last_frag_index) { | |||
| 1761 | struct msg_digest *whole_md = alloc_md(frag->md->iface, | |||
| 1762 | &frag->md->sender, | |||
| 1763 | HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1763, }; &here; })); | |||
| 1764 | uint8_t *buffer = alloc_bytes(size, | |||
| 1765 | "IKE fragments buffer"); | |||
| 1766 | size_t offset = 0; | |||
| 1767 | ||||
| 1768 | /* Reassemble fragments in buffer */ | |||
| 1769 | frag = st->st_v1_rfrags; | |||
| 1770 | while (frag != NULL((void*)0) && | |||
| 1771 | frag->index <= last_frag_index) | |||
| 1772 | { | |||
| 1773 | passert(offset + frag->size <=({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }) | |||
| 1774 | size)({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }); | |||
| 1775 | memcpy(buffer + offset, | |||
| 1776 | frag->data, frag->size); | |||
| 1777 | offset += frag->size; | |||
| 1778 | frag = frag->next; | |||
| 1779 | } | |||
| 1780 | ||||
| 1781 | init_pbs(&whole_md->packet_pbs, buffer, size, | |||
| 1782 | "packet"); | |||
| 1783 | ||||
| 1784 | process_packet(&whole_md); | |||
| 1785 | release_any_md(&whole_md)md_delref(&whole_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1785 , }; &here; })); | |||
| 1786 | free_v1_message_queues(st); | |||
| 1787 | /* optimize: if receiving fragments, immediately respond with fragments too */ | |||
| 1788 | st->st_v1_seen_fragments = true1; | |||
| 1789 | dbg(" updated IKE fragment state to respond using fragments without waiting for re-transmits"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" updated IKE fragment state to respond using fragments without waiting for re-transmits" ); } }; | |||
| 1790 | break; | |||
| 1791 | } | |||
| 1792 | } | |||
| 1793 | } | |||
| 1794 | ||||
| 1795 | return; | |||
| 1796 | } | |||
| 1797 | ||||
| 1798 | /* | |||
| 1799 | * Set smc to describe this state's properties. | |||
| 1800 | * | |||
| 1801 | * Look up the appropriate microcode based on state and | |||
| 1802 | * possibly Oakley Auth type. | |||
| 1803 | */ | |||
| 1804 | passert(STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1804, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
| 1805 | const struct finite_state *fs = finite_states[from_state]; | |||
| 1806 | passert(fs != NULL)({ _Bool assertion__ = fs != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1806, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "fs != ((void*)0)"); } (void) 1; }); | |||
| 1807 | const struct state_v1_microcode *smc = fs->v1_transitions; | |||
| 1808 | passert(smc != NULL)({ _Bool assertion__ = smc != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1808, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc != ((void*)0)"); } ( void) 1; }); | |||
| 1809 | ||||
| 1810 | /* | |||
| 1811 | * Find the state's the state transitions that has matching | |||
| 1812 | * authentication. | |||
| 1813 | * | |||
| 1814 | * For states where this makes no sense (eg, quick states | |||
| 1815 | * creating a CHILD_SA), .flags|=SMF_ALL_AUTH so the first | |||
| 1816 | * (only) one always matches. | |||
| 1817 | * | |||
| 1818 | * XXX: The code assumes that when there is always a match (if | |||
| 1819 | * there isn't the passert() triggers. If needed, bogus | |||
| 1820 | * transitions that log/drop the packet are added to the | |||
| 1821 | * table? Would simply dropping the packets be easier. | |||
| 1822 | */ | |||
| 1823 | if (st != NULL((void*)0)) { | |||
| 1824 | oakley_auth_t baseauth = | |||
| 1825 | xauth_calcbaseauth(st->st_oakley.auth); | |||
| 1826 | ||||
| 1827 | while (!LHAS(smc->flags, baseauth)(((smc->flags) & ((lset_t)1 << (baseauth))) != ( (lset_t)0))) { | |||
| 1828 | smc++; | |||
| 1829 | passert(smc->state == from_state)({ _Bool assertion__ = smc->state == from_state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1829, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc->state == from_state" ); } (void) 1; }); | |||
| 1830 | } | |||
| 1831 | } | |||
| 1832 | ||||
| 1833 | /* | |||
| 1834 | * XXX: do this earlier? */ | |||
| 1835 | if (verbose_state_busy(st)) | |||
| 1836 | return; | |||
| 1837 | ||||
| 1838 | /* | |||
| 1839 | * Detect and handle duplicated packets. This won't work for | |||
| 1840 | * the initial packet of an exchange because we won't have a | |||
| 1841 | * state object to remember it. If we are in a non-receiving | |||
| 1842 | * state (terminal), and the preceding state did transmit, | |||
| 1843 | * then the duplicate may indicate that that transmission | |||
| 1844 | * wasn't received -- retransmit it. Otherwise, just discard | |||
| 1845 | * it. ??? Notification packets are like exchanges -- I hope | |||
| 1846 | * that they are idempotent! | |||
| 1847 | * | |||
| 1848 | * XXX: do this earlier? | |||
| 1849 | */ | |||
| 1850 | if (st != NULL((void*)0) && ikev1_duplicate(st, md)) { | |||
| 1851 | return; | |||
| 1852 | } | |||
| 1853 | ||||
| 1854 | /* save values for use in resumption of processing below. | |||
| 1855 | * (may be suspended due to crypto operation not yet complete) | |||
| 1856 | */ | |||
| 1857 | md->v1_st = st; | |||
| 1858 | md->smc = smc; | |||
| 1859 | md->new_iv_set = new_iv_set; | |||
| 1860 | ||||
| 1861 | /* | |||
| 1862 | * look for encrypt packets. We cannot handle them if we have not | |||
| 1863 | * yet calculated the skeyids. We will just store the packet in | |||
| 1864 | * the suspended state, since the calculation is likely underway. | |||
| 1865 | * | |||
| 1866 | * note that this differs from above, because skeyid is calculated | |||
| 1867 | * in between states. (or will be, once DH is async) | |||
| 1868 | * | |||
| 1869 | */ | |||
| 1870 | if ((md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) && | |||
| 1871 | st != NULL((void*)0) && | |||
| 1872 | !st->hidden_variables.st_skeyid_calculated) { | |||
| 1873 | endpoint_buf b; | |||
| 1874 | dbg("received encrypted packet from %s but exponentiation still in progress",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } } | |||
| 1875 | str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } }; | |||
| 1876 | ||||
| 1877 | /* | |||
| 1878 | * if there was a previous packet, let it go, and go | |||
| 1879 | * with most recent one. | |||
| 1880 | */ | |||
| 1881 | if (st->st_suspended_md != NULL((void*)0)) { | |||
| 1882 | dbg("releasing suspended operation before completion: %p",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } } | |||
| 1883 | st->st_suspended_md){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } }; | |||
| 1884 | release_any_md(&st->st_suspended_md)md_delref(&st->st_suspended_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 1884, }; &here; })); | |||
| 1885 | } | |||
| 1886 | suspend_any_md(st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (st)->st_serialno, md); } }; ({ _Bool assertion__ = (st) ->st_suspended_md == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1886, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "(st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (st)->st_suspended_md = md_addref(md, ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, }; &here; })); ( st)->st_suspended_md_func = __func__; (st)->st_suspended_md_line = 1886; ({ _Bool assertion__ = state_is_busy(st); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "state_is_busy(st)"); } ( void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; | |||
| 1887 | return; | |||
| 1888 | } | |||
| 1889 | ||||
| 1890 | process_packet_tail(md); | |||
| 1891 | /* our caller will release_any_md(mdp); */ | |||
| 1892 | } | |||
| 1893 | ||||
| 1894 | /* | |||
| 1895 | * This routine will not release_any_md(mdp). It is expected that its | |||
| 1896 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
| 1897 | * **mdp should not be freed. So the caller should be prepared for | |||
| 1898 | * *mdp being set to NULL. | |||
| 1899 | */ | |||
| 1900 | void process_packet_tail(struct msg_digest *md) | |||
| 1901 | { | |||
| 1902 | struct state *st = md->v1_st; | |||
| ||||
| 1903 | const struct state_v1_microcode *smc = md->smc; | |||
| 1904 | enum state_kind from_state = smc->state; | |||
| 1905 | bool_Bool new_iv_set = md->new_iv_set; | |||
| 1906 | bool_Bool self_delete = false0; | |||
| 1907 | ||||
| 1908 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
| 1909 | ||||
| 1910 | endpoint_buf b; | |||
| 1911 | dbg("received encrypted packet from %s", str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s", str_endpoint (&md->sender, &b)); } }; | |||
| 1912 | ||||
| 1913 | if (st == NULL((void*)0)) { | |||
| 1914 | LOG_PACKET(RC_LOG,{ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } } | |||
| 1915 | "discarding encrypted message for an unknown ISAKMP SA"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } }; | |||
| 1916 | return; | |||
| 1917 | } | |||
| 1918 | if (st->st_skeyid_e_nssst_skey_ei_nss == NULL((void*)0)) { | |||
| 1919 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } } | |||
| 1920 | "discarding encrypted message because we haven't yet negotiated keying material"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } }; | |||
| 1921 | return; | |||
| 1922 | } | |||
| 1923 | ||||
| 1924 | /* Mark as encrypted */ | |||
| 1925 | md->encrypted = true1; | |||
| 1926 | ||||
| 1927 | /* do the specified decryption | |||
| 1928 | * | |||
| 1929 | * IV is from st->st_iv or (if new_iv_set) st->st_new_iv. | |||
| 1930 | * The new IV is placed in st->st_new_iv | |||
| 1931 | * | |||
| 1932 | * See RFC 2409 "IKE" Appendix B | |||
| 1933 | * | |||
| 1934 | * XXX The IV should only be updated really if the packet | |||
| 1935 | * is successfully processed. | |||
| 1936 | * We should keep this value, check for a success return | |||
| 1937 | * value from the parsing routines and then replace. | |||
| 1938 | * | |||
| 1939 | * Each post phase 1 exchange generates IVs from | |||
| 1940 | * the last phase 1 block, not the last block sent. | |||
| 1941 | */ | |||
| 1942 | const struct encrypt_desc *e = st->st_oakley.ta_encrypt; | |||
| 1943 | ||||
| 1944 | if (pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) % e->enc_blocksize != 0) { | |||
| 1945 | LOG_PACKET(RC_LOG_SERIOUS, "malformed message: not a multiple of encryption blocksize"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed message: not a multiple of encryption blocksize" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed message: not a multiple of encryption blocksize" ); } }; | |||
| 1946 | return; | |||
| 1947 | } | |||
| 1948 | ||||
| 1949 | /* XXX Detect weak keys */ | |||
| 1950 | ||||
| 1951 | /* grab a copy of raw packet (for duplicate packet detection) */ | |||
| 1952 | md->raw_packet = clone_bytes_as_chunk(md->packet_pbs.start, | |||
| 1953 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), | |||
| 1954 | "raw packet"); | |||
| 1955 | ||||
| 1956 | /* Decrypt everything after header */ | |||
| 1957 | if (!new_iv_set) { | |||
| 1958 | if (st->st_v1_iv.len == 0) { | |||
| 1959 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
| 1960 | } else { | |||
| 1961 | /* use old IV */ | |||
| 1962 | restore_new_iv(st, st->st_v1_iv){ (st)->st_v1_new_iv = (st->st_v1_iv); }; | |||
| 1963 | } | |||
| 1964 | } | |||
| 1965 | ||||
| 1966 | passert(st->st_v1_new_iv.len >= e->enc_blocksize)({ _Bool assertion__ = st->st_v1_new_iv.len >= e->enc_blocksize ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1966, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_v1_new_iv.len >= e->enc_blocksize" ); } (void) 1; }); | |||
| 1967 | st->st_v1_new_iv.len = e->enc_blocksize; /* truncate */ | |||
| 1968 | ||||
| 1969 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { | |||
| 1970 | DBG_log("decrypting %u bytes using algorithm %s", | |||
| 1971 | (unsigned) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), | |||
| 1972 | st->st_oakley.ta_encrypt->common.fqn); | |||
| 1973 | DBG_dump_hunk("IV before:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV before:", hunk_.ptr, hunk_.len); }; | |||
| 1974 | } | |||
| 1975 | e->encrypt_ops->do_crypt(e, md->message_pbs.cur, | |||
| 1976 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), | |||
| 1977 | st->st_enc_key_nss, | |||
| 1978 | st->st_v1_new_iv.ptr, false0, | |||
| 1979 | st->st_logger); | |||
| 1980 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { | |||
| 1981 | DBG_dump_hunk("IV after:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV after:", hunk_.ptr, hunk_.len); }; | |||
| 1982 | DBG_log("decrypted payload (starts at offset %td):", | |||
| 1983 | md->message_pbs.cur - md->message_pbs.roof); | |||
| 1984 | DBG_dump(NULL((void*)0), md->message_pbs.start, | |||
| 1985 | md->message_pbs.roof - md->message_pbs.start); | |||
| 1986 | } | |||
| 1987 | } else { | |||
| 1988 | /* packet was not encryped -- should it have been? */ | |||
| 1989 | ||||
| 1990 | if (smc->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) { | |||
| 1991 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } } | |||
| 1992 | "packet rejected: should have been encrypted"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } }; | |||
| 1993 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; | |||
| 1994 | return; | |||
| 1995 | } | |||
| 1996 | } | |||
| 1997 | ||||
| 1998 | /* Digest the message. | |||
| 1999 | * Padding must be removed to make hashing work. | |||
| 2000 | * Padding comes from encryption (so this code must be after decryption). | |||
| 2001 | * Padding rules are described before the definition of | |||
| 2002 | * struct isakmp_hdr in packet.h. | |||
| 2003 | */ | |||
| 2004 | { | |||
| 2005 | enum next_payload_types_ikev1 np = md->hdr.isa_np; | |||
| 2006 | lset_t needed = smc->req_payloads; | |||
| 2007 | const char *excuse = | |||
| 2008 | LIN(SMF_PSK_AUTH | SMF_FIRST_ENCRYPTED_INPUT,(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) | |||
| 2009 | smc->flags)(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) ? | |||
| 2010 | "probable authentication failure (mismatch of preshared secrets?): " | |||
| 2011 | : | |||
| 2012 | ""; | |||
| 2013 | ||||
| 2014 | while (np != ISAKMP_NEXT_NONE) { | |||
| 2015 | struct_desc *sd = v1_payload_desc(np); | |||
| 2016 | ||||
| 2017 | if (md->digest_roof >= elemsof(md->digest)(sizeof(md->digest) / sizeof(*(md->digest)))) { | |||
| 2018 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } | |||
| 2019 | "more than %zu payloads in message; ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } | |||
| 2020 | elemsof(md->digest)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } }; | |||
| 2021 | if (!md->encrypted) { | |||
| 2022 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2023 | } | |||
| 2024 | return; | |||
| 2025 | } | |||
| 2026 | struct payload_digest *const pd = md->digest + md->digest_roof; | |||
| 2027 | ||||
| 2028 | /* | |||
| 2029 | * only do this in main mode. In aggressive mode, there | |||
| 2030 | * is no negotiation of NAT-T method. Get it right. | |||
| 2031 | */ | |||
| 2032 | if (st != NULL((void*)0) && st->st_connection != NULL((void*)0) && | |||
| 2033 | (st->st_connection->policy & POLICY_AGGRESSIVE((lset_t)1 << (POLICY_AGGRESSIVE_IX))) == LEMPTY((lset_t)0)) | |||
| 2034 | { | |||
| 2035 | switch (np) { | |||
| 2036 | case ISAKMP_NEXT_NATD_RFC: | |||
| 2037 | case ISAKMP_NEXT_NATOA_RFC: | |||
| 2038 | if ((st->hidden_variables.st_nat_traversal & NAT_T_WITH_RFC_VALUES((lset_t)1 << (NAT_TRAVERSAL_METHOD_IETF_RFC))) == LEMPTY((lset_t)0)) { | |||
| 2039 | /* | |||
| 2040 | * don't accept NAT-D/NAT-OA reloc directly in message, | |||
| 2041 | * unless we're using NAT-T RFC | |||
| 2042 | */ | |||
| 2043 | lset_buf lb; | |||
| 2044 | dbg("st_nat_traversal was: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
| 2045 | str_lset(&natt_method_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
| 2046 | st->hidden_variables.st_nat_traversal,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
| 2047 | &lb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } }; | |||
| 2048 | sd = NULL((void*)0); | |||
| 2049 | } | |||
| 2050 | break; | |||
| 2051 | default: | |||
| 2052 | break; | |||
| 2053 | } | |||
| 2054 | } | |||
| 2055 | ||||
| 2056 | if (sd == NULL((void*)0)) { | |||
| 2057 | /* payload type is out of range or requires special handling */ | |||
| 2058 | switch (np) { | |||
| 2059 | case ISAKMP_NEXT_ID: | |||
| 2060 | /* ??? two kinds of ID payloads */ | |||
| 2061 | sd = (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || | |||
| 2062 | IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) ? | |||
| 2063 | &isakmp_identification_desc : | |||
| 2064 | &isakmp_ipsec_identification_desc; | |||
| 2065 | break; | |||
| 2066 | ||||
| 2067 | case ISAKMP_NEXT_NATD_DRAFTS: /* out of range */ | |||
| 2068 | /* | |||
| 2069 | * ISAKMP_NEXT_NATD_DRAFTS was a private use type before RFC-3947. | |||
| 2070 | * Since it has the same format as ISAKMP_NEXT_NATD_RFC, | |||
| 2071 | * just rewrite np and sd, and carry on. | |||
| 2072 | */ | |||
| 2073 | np = ISAKMP_NEXT_NATD_RFC; | |||
| 2074 | sd = &isakmp_nat_d_drafts; | |||
| 2075 | break; | |||
| 2076 | ||||
| 2077 | case ISAKMP_NEXT_NATOA_DRAFTS: /* out of range */ | |||
| 2078 | /* NAT-OA was a private use type before RFC-3947 -- same format */ | |||
| 2079 | np = ISAKMP_NEXT_NATOA_RFC; | |||
| 2080 | sd = &isakmp_nat_oa_drafts; | |||
| 2081 | break; | |||
| 2082 | ||||
| 2083 | case ISAKMP_NEXT_SAK: /* or ISAKMP_NEXT_NATD_BADDRAFTS */ | |||
| 2084 | /* | |||
| 2085 | * Official standards say that this is ISAKMP_NEXT_SAK, | |||
| 2086 | * a part of Group DOI, something we don't implement. | |||
| 2087 | * Old non-updated Cisco gear abused this number in ancient NAT drafts. | |||
| 2088 | * We ignore (rather than reject) this in support of people | |||
| 2089 | * with crufty Cisco machines. | |||
| 2090 | */ | |||
| 2091 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } | |||
| 2092 | "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } | |||
| 2093 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } }; | |||
| 2094 | /* | |||
| 2095 | * Hack to discard payload, whatever it was. | |||
| 2096 | * Since we are skipping the rest of the loop | |||
| 2097 | * body we must do some things ourself: | |||
| 2098 | * - demarshall the payload | |||
| 2099 | * - grab the next payload number (np) | |||
| 2100 | * - don't keep payload (don't increment pd) | |||
| 2101 | * - skip rest of loop body | |||
| 2102 | */ | |||
| 2103 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ignore_desc, | |||
| 2104 | &pd->payload, sizeof(pd->payload), &pd->pbs); | |||
| 2105 | if (d != NULL((void*)0)) { | |||
| 2106 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
| ||||
| 2107 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
| 2108 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
| 2109 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; | |||
| 2110 | if (!md->encrypted) { | |||
| 2111 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2112 | } | |||
| 2113 | return; | |||
| 2114 | } | |||
| 2115 | np = pd->payload.generic.isag_np; | |||
| 2116 | /* NOTE: we do not increment pd! */ | |||
| 2117 | continue; /* skip rest of the loop */ | |||
| 2118 | ||||
| 2119 | default: | |||
| 2120 | { | |||
| 2121 | esb_buf b; | |||
| 2122 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
| 2123 | "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
| 2124 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
| 2125 | enum_show(&ikev1_payload_names, np, &b)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } }; | |||
| 2126 | if (!md->encrypted) { | |||
| 2127 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; | |||
| 2128 | } | |||
| 2129 | return; | |||
| 2130 | } | |||
| 2131 | } | |||
| 2132 | passert(sd != NULL)({ _Bool assertion__ = sd != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2132, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "sd != ((void*)0)"); } (void) 1; }); | |||
| 2133 | } | |||
| 2134 | ||||
| 2135 | passert(np < LELEM_ROOF)({ _Bool assertion__ = np < 64; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2135, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "np < 64"); } (void) 1; }); | |||
| 2136 | ||||
| 2137 | { | |||
| 2138 | lset_t s = LELEM(np)((lset_t)1 << (np)); | |||
| 2139 | ||||
| 2140 | if (LDISJOINT(s,(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2141 | needed | smc->opt_payloads |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2142 | LELEM(ISAKMP_NEXT_VID) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2143 | LELEM(ISAKMP_NEXT_N) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2144 | LELEM(ISAKMP_NEXT_D) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2145 | LELEM(ISAKMP_NEXT_CR) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
| 2146 | LELEM(ISAKMP_NEXT_CERT))(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) )) { | |||
| 2147 | esb_buf b; | |||
| 2148 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
| 2149 | "%smessage ignored because it contains a payload type (%s) unexpected by state %s",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
| 2150 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
| 2151 | enum_show(&ikev1_payload_names, np, &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
| 2152 | finite_states[smc->state]->name){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } }; | |||
| 2153 | if (!md->encrypted) { | |||
| 2154 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; | |||
| 2155 | } | |||
| 2156 | return; | |||
| 2157 | } | |||
| 2158 | ||||
| 2159 | esb_buf b; | |||
| 2160 | dbg("got payload 0x%" PRIxLSET" (%s) needed: 0x%" PRIxLSET " opt: 0x%" PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } | |||
| 2161 | s, enum_show(&ikev1_payload_names, np, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } | |||
| 2162 | needed, smc->opt_payloads){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } }; | |||
| 2163 | needed &= ~s; | |||
| 2164 | } | |||
| 2165 | ||||
| 2166 | /* | |||
| 2167 | * Read in the payload recording what type it | |||
| 2168 | * should be | |||
| 2169 | */ | |||
| 2170 | pd->payload_type = np; | |||
| 2171 | diag_t d = pbs_in_struct(&md->message_pbs, sd, | |||
| 2172 | &pd->payload, sizeof(pd->payload), | |||
| 2173 | &pd->pbs); | |||
| 2174 | if (d != NULL((void*)0)) { | |||
| 2175 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
| 2176 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
| 2177 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
| 2178 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; | |||
| 2179 | if (!md->encrypted) { | |||
| 2180 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2181 | } | |||
| 2182 | return; | |||
| 2183 | } | |||
| 2184 | ||||
| 2185 | /* do payload-type specific debugging */ | |||
| 2186 | switch (np) { | |||
| 2187 | case ISAKMP_NEXT_ID: | |||
| 2188 | case ISAKMP_NEXT_NATOA_RFC: | |||
| 2189 | /* dump ID section */ | |||
| 2190 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 2191 | DBG_dump(" obj: ", pd->pbs.cur, | |||
| 2192 | pbs_left(&pd->pbs)((size_t)((&pd->pbs)->roof - (&pd->pbs)-> cur))); | |||
| 2193 | } | |||
| 2194 | break; | |||
| 2195 | default: | |||
| 2196 | break; | |||
| 2197 | } | |||
| 2198 | ||||
| 2199 | ||||
| 2200 | /* | |||
| 2201 | * Place payload at the end of the chain for this type. | |||
| 2202 | * This code appears in ikev1.c and ikev2.c. | |||
| 2203 | */ | |||
| 2204 | { | |||
| 2205 | /* np is a proper subscript for chain[] */ | |||
| 2206 | passert(np < elemsof(md->chain))({ _Bool assertion__ = np < (sizeof(md->chain) / sizeof (*(md->chain))); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 2206, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "np < (sizeof(md->chain) / sizeof(*(md->chain)))" ); } (void) 1; }); | |||
| 2207 | struct payload_digest **p = &md->chain[np]; | |||
| 2208 | ||||
| 2209 | while (*p != NULL((void*)0)) | |||
| 2210 | p = &(*p)->next; | |||
| 2211 | *p = pd; | |||
| 2212 | pd->next = NULL((void*)0); | |||
| 2213 | } | |||
| 2214 | ||||
| 2215 | np = pd->payload.generic.isag_np; | |||
| 2216 | md->digest_roof++; | |||
| 2217 | ||||
| 2218 | /* since we've digested one payload happily, it is probably | |||
| 2219 | * the case that any decryption worked. So we will not suggest | |||
| 2220 | * encryption failure as an excuse for subsequent payload | |||
| 2221 | * problems. | |||
| 2222 | */ | |||
| 2223 | excuse = ""; | |||
| 2224 | } | |||
| 2225 | ||||
| 2226 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX)))) && | |||
| 2227 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) != 0) { | |||
| 2228 | DBG_log("removing %d bytes of padding", | |||
| 2229 | (int) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur))); | |||
| 2230 | } | |||
| 2231 | ||||
| 2232 | md->message_pbs.roof = md->message_pbs.cur; | |||
| 2233 | ||||
| 2234 | /* check that all mandatory payloads appeared */ | |||
| 2235 | ||||
| 2236 | if (needed != 0) { | |||
| 2237 | LOG_PACKET_JAMBUF(RC_LOG_SERIOUS, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((RC_LOG_SERIOUS ) & NO_PREFIX) == ((lset_t)0) && (((RC_LOG_SERIOUS ) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & ( ((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void *)0) ? st->st_logger : md->md_logger))->object_vec-> jam_object_prefix(buf, ((st != ((void*)0) ? st->st_logger : md->md_logger))->object); } }); buf != ((void*)0); jambuf_to_logger (buf, ((st != ((void*)0) ? st->st_logger : md->md_logger )), RC_LOG_SERIOUS), buf = ((void*)0)) { | |||
| 2238 | jam(buf, "message for %s is missing payloads ", | |||
| 2239 | finite_states[from_state]->name); | |||
| 2240 | jam_lset_short(buf, &ikev1_payload_names, "+", needed); | |||
| 2241 | } | |||
| 2242 | if (!md->encrypted) { | |||
| 2243 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2244 | } | |||
| 2245 | return; | |||
| 2246 | } | |||
| 2247 | } | |||
| 2248 | ||||
| 2249 | if (!check_v1_HASH(smc->hash_type, smc->message, st, md)) { | |||
| 2250 | /*SEND_NOTIFICATION(INVALID_HASH_INFORMATION);*/ | |||
| 2251 | return; | |||
| 2252 | } | |||
| 2253 | ||||
| 2254 | /* more sanity checking: enforce most ordering constraints */ | |||
| 2255 | ||||
| 2256 | if (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) { | |||
| 2257 | /* rfc2409: The Internet Key Exchange (IKE), 5 Exchanges: | |||
| 2258 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." | |||
| 2259 | */ | |||
| 2260 | if (md->chain[ISAKMP_NEXT_SA] != NULL((void*)0) && | |||
| 2261 | md->hdr.isa_np != ISAKMP_NEXT_SA) { | |||
| 2262 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } } | |||
| 2263 | "malformed Phase 1 message: does not start with an SA payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } }; | |||
| 2264 | if (!md->encrypted) { | |||
| 2265 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2266 | } | |||
| 2267 | return; | |||
| 2268 | } | |||
| 2269 | } else if (IS_V1_QUICK(from_state)(STATE_QUICK_R0 <= (from_state) && (from_state) <= STATE_QUICK_R2)) { | |||
| 2270 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode | |||
| 2271 | * | |||
| 2272 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP | |||
| 2273 | * header and a SA payload MUST immediately follow the HASH." | |||
| 2274 | * [NOTE: there may be more than one SA payload, so this is not | |||
| 2275 | * totally reasonable. Probably all SAs should be so constrained.] | |||
| 2276 | * | |||
| 2277 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
| 2278 | * party, the identities of the parties MUST be passed as IDci and | |||
| 2279 | * then IDcr." | |||
| 2280 | * | |||
| 2281 | * "With the exception of the HASH, SA, and the optional ID payloads, | |||
| 2282 | * there are no payload ordering restrictions on Quick Mode." | |||
| 2283 | */ | |||
| 2284 | ||||
| 2285 | if (md->hdr.isa_np != ISAKMP_NEXT_HASH) { | |||
| 2286 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } } | |||
| 2287 | "malformed Quick Mode message: does not start with a HASH payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } }; | |||
| 2288 | if (!md->encrypted) { | |||
| 2289 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2290 | } | |||
| 2291 | return; | |||
| 2292 | } | |||
| 2293 | ||||
| 2294 | { | |||
| 2295 | struct payload_digest *p; | |||
| 2296 | int i; | |||
| 2297 | ||||
| 2298 | p = md->chain[ISAKMP_NEXT_SA]; | |||
| 2299 | i = 1; | |||
| 2300 | while (p != NULL((void*)0)) { | |||
| 2301 | if (p != &md->digest[i]) { | |||
| 2302 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } } | |||
| 2303 | "malformed Quick Mode message: SA payload is in wrong position"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } }; | |||
| 2304 | if (!md->encrypted) { | |||
| 2305 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2306 | } | |||
| 2307 | return; | |||
| 2308 | } | |||
| 2309 | p = p->next; | |||
| 2310 | i++; | |||
| 2311 | } | |||
| 2312 | } | |||
| 2313 | ||||
| 2314 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode: | |||
| 2315 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
| 2316 | * party, the identities of the parties MUST be passed as IDci and | |||
| 2317 | * then IDcr." | |||
| 2318 | */ | |||
| 2319 | { | |||
| 2320 | struct payload_digest *id = md->chain[ISAKMP_NEXT_ID]; | |||
| 2321 | ||||
| 2322 | if (id != NULL((void*)0)) { | |||
| 2323 | if (id->next == NULL((void*)0) || | |||
| 2324 | id->next->next != NULL((void*)0)) { | |||
| 2325 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } } | |||
| 2326 | "malformed Quick Mode message: if any ID payload is present, there must be exactly two"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } }; | |||
| 2327 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2328 | return; | |||
| 2329 | } | |||
| 2330 | if (id + 1 != id->next) { | |||
| 2331 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } } | |||
| 2332 | "malformed Quick Mode message: the ID payloads are not adjacent"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } }; | |||
| 2333 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
| 2334 | return; | |||
| 2335 | } | |||
| 2336 | } | |||
| 2337 | } | |||
| 2338 | } | |||
| 2339 | ||||
| 2340 | /* | |||
| 2341 | * Ignore payloads that we don't handle: | |||
| 2342 | */ | |||
| 2343 | /* XXX Handle Notifications */ | |||
| 2344 | { | |||
| 2345 | struct payload_digest *p = md->chain[ISAKMP_NEXT_N]; | |||
| 2346 | ||||
| 2347 | while (p != NULL((void*)0)) { | |||
| 2348 | switch (p->payload.notification.isan_type) { | |||
| 2349 | case R_U_THERE: | |||
| 2350 | case R_U_THERE_ACK: | |||
| 2351 | case ISAKMP_N_CISCO_LOAD_BALANCE: | |||
| 2352 | case PAYLOAD_MALFORMED: | |||
| 2353 | case INVALID_MESSAGE_ID: | |||
| 2354 | case IPSEC_RESPONDER_LIFETIME: | |||
| 2355 | if (md->hdr.isa_xchg == ISAKMP_XCHG_INFO) { | |||
| 2356 | /* these are handled later on in informational() */ | |||
| 2357 | break; | |||
| 2358 | } | |||
| 2359 | /* FALL THROUGH */ | |||
| 2360 | default: | |||
| 2361 | if (st == NULL((void*)0)) { | |||
| 2362 | esb_buf b; | |||
| 2363 | dbg("ignoring informational payload %s, no corresponding state",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } | |||
| 2364 | enum_show(& ikev1_notify_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } | |||
| 2365 | p->payload.notification.isan_type, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } }; | |||
| 2366 | } else { | |||
| 2367 | esb_buf b; | |||
| 2368 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2369 | "ignoring informational payload %s, msgid=%08" PRIx32 ", length=%d",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2370 | enum_show(&ikev1_notify_names,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2371 | p->payload.notification.isan_type,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2372 | &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2373 | st->st_v1_msgid.id,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
| 2374 | p->payload.notification.isan_length){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } }; | |||
| 2375 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 2376 | DBG_dump_pbs(&p->pbs)DBG_dump((&p->pbs)->name, (&p->pbs)->start , ((size_t)((&p->pbs)->cur - (&p->pbs)->start ))); | |||
| 2377 | } | |||
| 2378 | } | |||
| 2379 | } | |||
| 2380 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 2381 | DBG_dump("info:", p->pbs.cur, | |||
| 2382 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); | |||
| 2383 | } | |||
| 2384 | ||||
| 2385 | p = p->next; | |||
| 2386 | } | |||
| 2387 | ||||
| 2388 | p = md->chain[ISAKMP_NEXT_D]; | |||
| 2389 | while (p != NULL((void*)0)) { | |||
| 2390 | self_delete |= accept_delete(md, p); | |||
| 2391 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 2392 | DBG_dump("del:", p->pbs.cur, | |||
| 2393 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); | |||
| 2394 | } | |||
| 2395 | if (md->v1_st != st) { | |||
| 2396 | pexpect(md->v1_st == NULL)({ _Bool assertion__ = md->v1_st == ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2396, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "md->v1_st == ((void*)0)" ); } assertion__; }); | |||
| 2397 | dbg("zapping ST as accept_delete() zapped MD.ST"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("zapping ST as accept_delete() zapped MD.ST"); } }; | |||
| 2398 | st = md->v1_st; | |||
| 2399 | } | |||
| 2400 | p = p->next; | |||
| 2401 | } | |||
| 2402 | ||||
| 2403 | p = md->chain[ISAKMP_NEXT_VID]; | |||
| 2404 | while (p != NULL((void*)0)) { | |||
| 2405 | handle_vendorid(md, (char *)p->pbs.cur, | |||
| 2406 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur )), false0, | |||
| 2407 | st != NULL((void*)0) ? st->st_logger : md->md_logger); | |||
| 2408 | p = p->next; | |||
| 2409 | } | |||
| 2410 | } | |||
| 2411 | ||||
| 2412 | if (self_delete) { | |||
| 2413 | accept_self_delete(md); | |||
| 2414 | st = md->v1_st; | |||
| 2415 | /* note: st ought to be NULL from here on */ | |||
| 2416 | } | |||
| 2417 | ||||
| 2418 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2418, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); | |||
| 2419 | statetime_t start = statetime_start(md->v1_st); | |||
| 2420 | /* | |||
| 2421 | * XXX: danger - the .informational() processor deletes ST; | |||
| 2422 | * and then tunnels this loss through MD.ST. | |||
| 2423 | */ | |||
| 2424 | stf_status e =smc->processor(st, md); | |||
| 2425 | complete_v1_state_transition(md->v1_st, md, e); | |||
| 2426 | statetime_stop(&start, "%s()", __func__); | |||
| 2427 | /* our caller will release_any_md(mdp); */ | |||
| 2428 | } | |||
| 2429 | ||||
| 2430 | /* | |||
| 2431 | * replace previous receive packet with latest, to update | |||
| 2432 | * our notion of a retransmitted packet. This is important | |||
| 2433 | * to do, even for failing transitions, and suspended transitions | |||
| 2434 | * because the sender may well retransmit their request. | |||
| 2435 | * We had better be idempotent since we can be called | |||
| 2436 | * multiple times in handling a packet due to crypto helper logic. | |||
| 2437 | */ | |||
| 2438 | static void remember_received_packet(struct state *st, struct msg_digest *md) | |||
| 2439 | { | |||
| 2440 | if (md->encrypted) { | |||
| 2441 | /* if encrypted, duplication already done */ | |||
| 2442 | if (md->raw_packet.ptr != NULL((void*)0)) { | |||
| 2443 | pfreeany(st->st_v1_rpacket.ptr){ typeof(st->st_v1_rpacket.ptr) *pp_ = &(st->st_v1_rpacket .ptr); if (*pp_ != ((void*)0)) { pfree(*pp_); *pp_ = ((void*) 0); } }; | |||
| 2444 | st->st_v1_rpacket = md->raw_packet; | |||
| 2445 | md->raw_packet = EMPTY_CHUNK((const chunk_t) { .ptr = ((void*)0), .len = 0 }); | |||
| 2446 | } | |||
| 2447 | } else { | |||
| 2448 | /* this may be a repeat, but it will work */ | |||
| 2449 | replace_chunk(&st->st_v1_rpacket, | |||
| 2450 | clone_bytes_as_chunk(md->packet_pbs.start, | |||
| 2451 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), | |||
| 2452 | "raw packet")); | |||
| 2453 | } | |||
| 2454 | } | |||
| 2455 | ||||
| 2456 | static void jam_v1_ipsec_details(struct jambuf *buf, struct state *st) | |||
| 2457 | { | |||
| 2458 | struct connection *const c = st->st_connection; | |||
| 2459 | jam_string(buf, c->policy & POLICY_TUNNEL((lset_t)1 << (POLICY_TUNNEL_IX)) ? "tunnel mode" : "transport mode"); | |||
| 2460 | jam(buf, " "); | |||
| 2461 | jam_child_sa_details(buf, st); | |||
| 2462 | } | |||
| 2463 | ||||
| 2464 | static void jam_v1_isakmp_details(struct jambuf *buf, struct state *st) | |||
| 2465 | { | |||
| 2466 | jam_parent_sa_details(buf, st); | |||
| 2467 | } | |||
| 2468 | ||||
| 2469 | /* complete job started by the state-specific state transition function | |||
| 2470 | * | |||
| 2471 | * This routine will not release_any_md(mdp). It is expected that its | |||
| 2472 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
| 2473 | * **mdp should not be freed. So the caller should be prepared for | |||
| 2474 | * *mdp being set to NULL. | |||
| 2475 | * | |||
| 2476 | * md is used to: | |||
| 2477 | * - find st | |||
| 2478 | * - find from_state (st might be gone) | |||
| 2479 | * - find note for STF_FAIL (might not be part of result (STF_FAIL+note)) | |||
| 2480 | * - find note for STF_INTERNAL_ERROR | |||
| 2481 | * - record md->event_already_set | |||
| 2482 | * - remember_received_packet(st, md); | |||
| 2483 | * - nat_traversal_change_port_lookup(md, st); | |||
| 2484 | * - smc for smc->next_state | |||
| 2485 | * - smc for smc->flags & SMF_REPLY to trigger a reply | |||
| 2486 | * - smc for smc->timeout_event | |||
| 2487 | * - smc for !(smc->flags & SMF_INITIATOR) for Contivity mode | |||
| 2488 | * - smc for smc->flags & SMF_RELEASE_PENDING_P2 to trigger unpend call | |||
| 2489 | * - smc for smc->flags & SMF_INITIATOR to adjust retransmission | |||
| 2490 | * - fragvid, dpd, nortel | |||
| 2491 | */ | |||
| 2492 | void complete_v1_state_transition(struct state *st, struct msg_digest *md, stf_status result) | |||
| 2493 | { | |||
| 2494 | /* handle oddball/meta results now */ | |||
| 2495 | ||||
| 2496 | /* | |||
| 2497 | * statistics; lump all FAILs together | |||
| 2498 | * | |||
| 2499 | * Fun fact: using min() stupidly fails (at least in GCC 8.1.1 with -Werror=sign-compare) | |||
| 2500 | * error: comparison of integer expressions of different signedness: `stf_status' {aka `enum <anonymous>'} and `int' | |||
| 2501 | */ | |||
| 2502 | pstats(ike_stf, PMIN(result, STF_FAIL)){ const unsigned __pstat = (((result) <= (STF_FAIL) ? (result ) : (STF_FAIL))); if (__pstat < (sizeof(pstats_ike_stf) / sizeof (*(pstats_ike_stf)))) { pstats_ike_stf[__pstat]++; } else if ( (cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ike_stf", __pstat); } }; | |||
| 2503 | ||||
| 2504 | dbg("complete v1 state transition with %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
| 2505 | result > STF_FAIL ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
| 2506 | enum_name(&ikev1_notify_names, result - STF_FAIL) :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
| 2507 | enum_name(&stf_status_names, result)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } }; | |||
| 2508 | ||||
| 2509 | switch (result) { | |||
| 2510 | case STF_SUSPEND: | |||
| 2511 | /* | |||
| 2512 | * If this transition was triggered by an incoming | |||
| 2513 | * packet, save it. | |||
| 2514 | * | |||
| 2515 | * XXX: some initiator code creates a fake MD (there | |||
| 2516 | * isn't a real one); save that as well. | |||
| 2517 | */ | |||
| 2518 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2518, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); | |||
| 2519 | suspend_any_md(md->v1_st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (md->v1_st)->st_serialno, md); } }; ({ _Bool assertion__ = (md->v1_st)->st_suspended_md == ((void*)0); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "(md->v1_st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (md->v1_st)->st_suspended_md = md_addref (md, ({ static const struct where here = { .func = __func__, . file = "programs/pluto/ikev1.c", .line = 2519, }; &here; } )); (md->v1_st)->st_suspended_md_func = __func__; (md-> v1_st)->st_suspended_md_line = 2519; ({ _Bool assertion__ = state_is_busy(md->v1_st); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "state_is_busy(md->v1_st)"); } (void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; | |||
| 2520 | return; | |||
| 2521 | case STF_IGNORE: | |||
| 2522 | /* note: md might be NULL */ | |||
| 2523 | return; | |||
| 2524 | default: | |||
| 2525 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2525, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); | |||
| 2526 | break; | |||
| 2527 | } | |||
| 2528 | ||||
| 2529 | /* safe to refer to *md */ | |||
| 2530 | ||||
| 2531 | enum state_kind from_state = md->smc->state; | |||
| 2532 | st = md->v1_st; | |||
| 2533 | ||||
| 2534 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2534, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
| 2535 | pexpect(!state_is_busy(st))({ _Bool assertion__ = !state_is_busy(st); if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2535, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "!state_is_busy(st)"); } assertion__; }); | |||
| 2536 | ||||
| 2537 | if (result > STF_OK) { | |||
| 2538 | linux_audit_conn(md->v1_st, IS_V1_ISAKMP_SA_ESTABLISHED(md->v1_st)((((lset_t)1 << ((md->v1_st)->st_state->kind)) & (((lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4)) | ((lset_t)1 << (STATE_AGGR_I2)) | (( lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0 )) | ((lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0)) | ((lset_t)1 << (STATE_MODE_CFG_R1 )) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1)) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) ? LAK_CHILD_FAIL : LAK_PARENT_FAIL); | |||
| 2539 | } | |||
| 2540 | ||||
| 2541 | switch (result) { | |||
| 2542 | case STF_OK: | |||
| 2543 | { | |||
| 2544 | /* advance the state */ | |||
| 2545 | const struct state_v1_microcode *smc = md->smc; | |||
| 2546 | ||||
| 2547 | dbg("doing_xauth:%s, t_xauth_client_done:%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } | |||
| 2548 | bool_str(st->st_oakley.doing_xauth),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } | |||
| 2549 | bool_str(st->hidden_variables.st_xauth_client_done)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } }; | |||
| 2550 | ||||
| 2551 | /* accept info from VID because we accept this message */ | |||
| 2552 | ||||
| 2553 | /* | |||
| 2554 | * Most of below VIDs only appear Main/Aggr mode, not Quick mode, | |||
| 2555 | * so why are we checking them for each state transition? | |||
| 2556 | */ | |||
| 2557 | ||||
| 2558 | if (md->fragvid) { | |||
| 2559 | dbg("peer supports fragmentation"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports fragmentation"); } }; | |||
| 2560 | st->st_seen_fragmentation_supported = true1; | |||
| 2561 | } | |||
| 2562 | ||||
| 2563 | if (md->dpd) { | |||
| 2564 | dbg("peer supports DPD"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports DPD"); } }; | |||
| 2565 | st->hidden_variables.st_peer_supports_dpd = true1; | |||
| 2566 | if (dpd_active_locally(st)) { | |||
| 2567 | dbg("DPD is configured locally"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("DPD is configured locally"); } }; | |||
| 2568 | } | |||
| 2569 | } | |||
| 2570 | ||||
| 2571 | /* If state has VID_NORTEL, import it to activate workaround */ | |||
| 2572 | if (md->nortel) { | |||
| 2573 | dbg("peer requires Nortel Contivity workaround"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer requires Nortel Contivity workaround"); } }; | |||
| 2574 | st->st_seen_nortel_vid = true1; | |||
| 2575 | } | |||
| 2576 | ||||
| 2577 | if (!st->st_v1_msgid.reserved && | |||
| 2578 | IS_CHILD_SA(st)((st)->st_clonedfrom != 0) && | |||
| 2579 | st->st_v1_msgid.id != v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
| 2580 | struct state *p1st = state_with_serialno( | |||
| 2581 | st->st_clonedfrom); | |||
| 2582 | ||||
| 2583 | if (p1st != NULL((void*)0)) { | |||
| 2584 | /* do message ID reservation */ | |||
| 2585 | reserve_msgid(p1st, st->st_v1_msgid.id); | |||
| 2586 | } | |||
| 2587 | ||||
| 2588 | st->st_v1_msgid.reserved = true1; | |||
| 2589 | } | |||
| 2590 | ||||
| 2591 | dbg("IKEv1: transition from state %s to state %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } | |||
| 2592 | finite_states[from_state]->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } | |||
| 2593 | finite_states[smc->next_state]->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } }; | |||
| 2594 | ||||
| 2595 | change_state(st, smc->next_state); | |||
| 2596 | ||||
| 2597 | /* | |||
| 2598 | * XAUTH negotiation without ModeCFG cannot follow the regular | |||
| 2599 | * state machine change as it cannot be determined if the CFG | |||
| 2600 | * payload is "XAUTH OK, no ModeCFG" or "XAUTH OK, expect | |||
| 2601 | * ModeCFG". To the smc, these two cases look identical. So we | |||
| 2602 | * have an ad hoc state change here for the case where | |||
| 2603 | * we have XAUTH but not ModeCFG. We move it to the established | |||
| 2604 | * state, so the regular state machine picks up the Quick Mode. | |||
| 2605 | */ | |||
| 2606 | if (st->st_connection->spd.this.xauth_client && | |||
| 2607 | st->hidden_variables.st_xauth_client_done && | |||
| 2608 | !st->st_connection->spd.this.modecfg_client && | |||
| 2609 | st->st_state->kind == STATE_XAUTH_I1) | |||
| 2610 | { | |||
| 2611 | bool_Bool aggrmode = LHAS(st->st_connection->policy, POLICY_AGGRESSIVE_IX)(((st->st_connection->policy) & ((lset_t)1 << (POLICY_AGGRESSIVE_IX))) != ((lset_t)0)); | |||
| 2612 | ||||
| 2613 | log_state(RC_LOG, st, "XAUTH completed; ModeCFG skipped as per configuration"); | |||
| 2614 | change_state(st, aggrmode ? STATE_AGGR_I2 : STATE_MAIN_I4); | |||
| 2615 | st->st_v1_msgid.phase15 = v1_MAINMODE_MSGID((msgid_t) 0); | |||
| 2616 | } | |||
| 2617 | ||||
| 2618 | /* Schedule for whatever timeout is specified */ | |||
| 2619 | if (!md->event_already_set) { | |||
| 2620 | /* | |||
| 2621 | * This md variable is hardly ever set. | |||
| 2622 | * Only deals with v1 <-> v2 switching | |||
| 2623 | * which will be removed in the near future anyway | |||
| 2624 | * (PW 2017 Oct 8) | |||
| 2625 | */ | |||
| 2626 | dbg("event_already_set, deleting event"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("event_already_set, deleting event"); } }; | |||
| 2627 | /* | |||
| 2628 | * Delete previous retransmission event. | |||
| 2629 | * New event will be scheduled below. | |||
| 2630 | */ | |||
| 2631 | delete_event(st); | |||
| 2632 | clear_retransmits(st); | |||
| 2633 | } | |||
| 2634 | ||||
| 2635 | /* Delete IKE fragments */ | |||
| 2636 | free_v1_message_queues(st); | |||
| 2637 | ||||
| 2638 | /* scrub the previous packet exchange */ | |||
| 2639 | free_chunk_content(&st->st_v1_rpacket); | |||
| 2640 | free_chunk_content(&st->st_v1_tpacket); | |||
| 2641 | ||||
| 2642 | /* in aggressive mode, there will be no reply packet in transition | |||
| 2643 | * from STATE_AGGR_R1 to STATE_AGGR_R2 | |||
| 2644 | */ | |||
| 2645 | if (nat_traversal_enabled && st->st_connection->ikev1_natt != NATT_NONE) { | |||
| 2646 | /* adjust our destination port if necessary */ | |||
| 2647 | nat_traversal_change_port_lookup(md, st); | |||
| 2648 | v1_maybe_natify_initiator_endpoints(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2648, }; &here; })); | |||
| 2649 | } | |||
| 2650 | ||||
| 2651 | /* | |||
| 2652 | * Save both the received packet, and this | |||
| 2653 | * state-transition. | |||
| 2654 | * | |||
| 2655 | * Only when the (last) state transition was a "reply" | |||
| 2656 | * should a duplicate packet trigger a retransmit | |||
| 2657 | * (else they get discarded). | |||
| 2658 | * | |||
| 2659 | * XXX: .st_state .fs_flags & SMF_REPLY can't | |||
| 2660 | * be used because it contains flags for the new state | |||
| 2661 | * not the old-to-new state transition. | |||
| 2662 | */ | |||
| 2663 | remember_received_packet(st, md); | |||
| 2664 | st->st_v1_last_transition = md->smc; | |||
| 2665 | ||||
| 2666 | /* if requested, send the new reply packet */ | |||
| 2667 | if (smc->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5))) { | |||
| 2668 | endpoint_buf b; | |||
| 2669 | endpoint_buf b2; | |||
| 2670 | pexpect_st_local_endpoint(st); | |||
| 2671 | dbg("sending reply packet to %s (from %s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } | |||
| 2672 | str_endpoint(&st->st_remote_endpoint, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } | |||
| 2673 | str_endpoint(&st->st_interface->local_endpoint, &b2)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } }; | |||
| 2674 | ||||
| 2675 | close_output_pbs(&reply_stream); /* good form, but actually a no-op */ | |||
| 2676 | ||||
| 2677 | if (st->st_state->kind == STATE_MAIN_R2 && | |||
| 2678 | impair.send_no_main_r2) { | |||
| 2679 | /* record-only so we properly emulate packet drop */ | |||
| 2680 | record_outbound_v1_ike_msg(st, &reply_stream, | |||
| 2681 | finite_states[from_state]->name); | |||
| 2682 | log_state(RC_LOG, st, "IMPAIR: Skipped sending STATE_MAIN_R2 response packet"); | |||
| 2683 | } else { | |||
| 2684 | record_and_send_v1_ike_msg(st, &reply_stream, | |||
| 2685 | finite_states[from_state]->name); | |||
| 2686 | } | |||
| 2687 | } | |||
| 2688 | ||||
| 2689 | /* Schedule for whatever timeout is specified */ | |||
| 2690 | if (!md->event_already_set) { | |||
| 2691 | dbg("!event_already_set at reschedule"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("!event_already_set at reschedule"); } }; | |||
| 2692 | intmax_t delay_ms; /* delay is in milliseconds here */ | |||
| 2693 | enum event_type kind = smc->timeout_event; | |||
| 2694 | bool_Bool agreed_time = false0; | |||
| 2695 | struct connection *c = st->st_connection; | |||
| 2696 | ||||
| 2697 | /* fixup in case of state machine jump for xauth without modecfg */ | |||
| 2698 | if (c->spd.this.xauth_client && | |||
| 2699 | st->hidden_variables.st_xauth_client_done && | |||
| 2700 | !c->spd.this.modecfg_client && | |||
| 2701 | (st->st_state->kind == STATE_MAIN_I4 || st->st_state->kind == STATE_AGGR_I2)) | |||
| 2702 | { | |||
| 2703 | dbg("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE" ); } }; | |||
| 2704 | kind = EVENT_SA_REPLACE; | |||
| 2705 | } | |||
| 2706 | ||||
| 2707 | switch (kind) { | |||
| 2708 | case EVENT_RETRANSMIT: /* Retransmit packet */ | |||
| 2709 | start_retransmits(st); | |||
| 2710 | break; | |||
| 2711 | ||||
| 2712 | case EVENT_SA_REPLACE: /* SA replacement event */ | |||
| 2713 | if (IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2) || | |||
| 2714 | IS_V1_PHASE15(st->st_state->kind)(STATE_XAUTH_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_XAUTH_I1)) { | |||
| 2715 | /* Note: we will defer to the "negotiated" (dictated) | |||
| 2716 | * lifetime if we are POLICY_DONT_REKEY. | |||
| 2717 | * This allows the other side to dictate | |||
| 2718 | * a time we would not otherwise accept | |||
| 2719 | * but it prevents us from having to initiate | |||
| 2720 | * rekeying. The negative consequences seem | |||
| 2721 | * minor. | |||
| 2722 | */ | |||
| 2723 | delay_ms = deltamillisecs(c->sa_ike_life_seconds); | |||
| 2724 | if ((c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX))) || | |||
| 2725 | delay_ms >= deltamillisecs(st->st_oakley.life_seconds)) | |||
| 2726 | { | |||
| 2727 | agreed_time = true1; | |||
| 2728 | delay_ms = deltamillisecs(st->st_oakley.life_seconds); | |||
| 2729 | } | |||
| 2730 | } else { | |||
| 2731 | /* Delay is min of up to four things: | |||
| 2732 | * each can limit the lifetime. | |||
| 2733 | */ | |||
| 2734 | time_t delay = deltasecs(c->sa_ipsec_life_seconds); | |||
| 2735 | ||||
| 2736 | #define clamp_delay(trans) { \ | |||
| 2737 | if (st->trans.present && \ | |||
| 2738 | delay >= deltasecs(st->trans.attrs.life_seconds)) { \ | |||
| 2739 | agreed_time = true1; \ | |||
| 2740 | delay = deltasecs(st->trans.attrs.life_seconds); \ | |||
| 2741 | } \ | |||
| 2742 | } | |||
| 2743 | clamp_delay(st_ah); | |||
| 2744 | clamp_delay(st_esp); | |||
| 2745 | clamp_delay(st_ipcomp); | |||
| 2746 | delay_ms = delay * 1000; | |||
| 2747 | #undef clamp_delay | |||
| 2748 | } | |||
| 2749 | ||||
| 2750 | /* By default, we plan to rekey. | |||
| 2751 | * | |||
| 2752 | * If there isn't enough time to rekey, plan to | |||
| 2753 | * expire. | |||
| 2754 | * | |||
| 2755 | * If we are --dontrekey, a lot more rules apply. | |||
| 2756 | * If we are the Initiator, use REPLACE_IF_USED. | |||
| 2757 | * If we are the Responder, and the dictated time | |||
| 2758 | * was unacceptable (too large), plan to REPLACE | |||
| 2759 | * (the only way to ratchet down the time). | |||
| 2760 | * If we are the Responder, and the dictated time | |||
| 2761 | * is acceptable, plan to EXPIRE. | |||
| 2762 | * | |||
| 2763 | * Important policy lies buried here. | |||
| 2764 | * For example, we favour the initiator over the | |||
| 2765 | * responder by making the initiator start rekeying | |||
| 2766 | * sooner. Also, fuzz is only added to the | |||
| 2767 | * initiator's margin. | |||
| 2768 | * | |||
| 2769 | * Note: for ISAKMP SA, we let the negotiated | |||
| 2770 | * time stand (implemented by earlier logic). | |||
| 2771 | */ | |||
| 2772 | if (agreed_time && | |||
| 2773 | (c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX)))) { | |||
| 2774 | kind = (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) ? | |||
| 2775 | EVENT_v1_REPLACE_IF_USED : | |||
| 2776 | EVENT_SA_EXPIRE; | |||
| 2777 | } | |||
| 2778 | if (kind != EVENT_SA_EXPIRE) { | |||
| 2779 | time_t marg = | |||
| 2780 | deltasecs(c->sa_rekey_margin); | |||
| 2781 | ||||
| 2782 | if (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) { | |||
| 2783 | marg += marg * | |||
| 2784 | c->sa_rekey_fuzz / | |||
| 2785 | 100.E0 * | |||
| 2786 | (rand() / | |||
| 2787 | (RAND_MAX2147483647 + 1.E0)); | |||
| 2788 | } else { | |||
| 2789 | marg /= 2; | |||
| 2790 | } | |||
| 2791 | ||||
| 2792 | if (delay_ms > marg * 1000) { | |||
| 2793 | delay_ms -= marg * 1000; | |||
| 2794 | st->st_replace_margin = deltatime(marg); | |||
| 2795 | } else { | |||
| 2796 | kind = EVENT_SA_EXPIRE; | |||
| 2797 | } | |||
| 2798 | } | |||
| 2799 | /* XXX: DELAY_MS should be a deltatime_t */ | |||
| 2800 | event_schedule(kind, deltatime_ms(delay_ms), st); | |||
| 2801 | break; | |||
| 2802 | ||||
| 2803 | case EVENT_SA_DISCARD: | |||
| 2804 | event_schedule(EVENT_SA_DISCARD, c->config->retransmit_timeout, st); | |||
| 2805 | break; | |||
| 2806 | ||||
| 2807 | default: | |||
| 2808 | bad_case(kind)libreswan_bad_case("kind", (kind), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2808, }; &here; })); | |||
| 2809 | } | |||
| 2810 | } | |||
| 2811 | ||||
| 2812 | /* tell whack and log of progress */ | |||
| 2813 | { | |||
| 2814 | enum rc_type w; | |||
| 2815 | void (*jam_details)(struct jambuf *buf, struct state *st); | |||
| 2816 | ||||
| 2817 | if (IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) { | |||
| 2818 | pstat_sa_established(st); | |||
| 2819 | jam_details = jam_v1_ipsec_details; | |||
| 2820 | w = RC_SUCCESS; /* log our success */ | |||
| 2821 | } else if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 2822 | pstat_sa_established(st); | |||
| 2823 | jam_details = jam_v1_isakmp_details; | |||
| 2824 | w = RC_SUCCESS; /* log our success */ | |||
| 2825 | } else { | |||
| 2826 | jam_details = NULL((void*)0); | |||
| 2827 | w = RC_NEW_V1_STATE + st->st_state->kind; | |||
| 2828 | } | |||
| 2829 | ||||
| 2830 | passert(st->st_state->kind < STATE_IKEv1_ROOF)({ _Bool assertion__ = st->st_state->kind < STATE_IKEv1_ROOF ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2830, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_state->kind < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
| 2831 | ||||
| 2832 | /* tell whack and logs our progress */ | |||
| 2833 | LLOG_JAMBUF(w, st->st_logger, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((w) & NO_PREFIX) == ((lset_t)0) && (((w) & STREAM_MASK ) != DEBUG_STREAM || (cur_debugging & (((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { (st->st_logger)->object_vec ->jam_object_prefix(buf, (st->st_logger)->object); } }); buf != ((void*)0); jambuf_to_logger(buf, (st->st_logger ), w), buf = ((void*)0)) { | |||
| 2834 | jam(buf, "%s", st->st_state->story); | |||
| 2835 | /* document SA details for admin's pleasure */ | |||
| 2836 | if (jam_details != NULL((void*)0)) { | |||
| 2837 | jam(buf, " "); | |||
| 2838 | jam_details(buf, st); | |||
| 2839 | } | |||
| 2840 | } | |||
| 2841 | } | |||
| 2842 | ||||
| 2843 | /* | |||
| 2844 | * make sure that a DPD event gets created for a new phase 1 | |||
| 2845 | * SA. | |||
| 2846 | * Why do we need a DPD event on an IKE SA??? | |||
| 2847 | */ | |||
| 2848 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 2849 | if (dpd_init(st) != STF_OK) { | |||
| 2850 | log_state(RC_LOG_SERIOUS, st, | |||
| 2851 | "DPD initialization failed - continuing without DPD"); | |||
| 2852 | } | |||
| 2853 | } | |||
| 2854 | ||||
| 2855 | /* Special case for XAUTH server */ | |||
| 2856 | if (st->st_connection->spd.this.xauth_server) { | |||
| 2857 | if (st->st_oakley.doing_xauth && | |||
| 2858 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
| 2859 | dbg("XAUTH: Sending XAUTH Login/Password Request"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH: Sending XAUTH Login/Password Request") ; } }; | |||
| 2860 | event_schedule(EVENT_v1_SEND_XAUTH, | |||
| 2861 | deltatime_ms(EVENT_v1_SEND_XAUTH_DELAY_MS80), | |||
| 2862 | st); | |||
| 2863 | break; | |||
| 2864 | } | |||
| 2865 | } | |||
| 2866 | ||||
| 2867 | /* | |||
| 2868 | * for XAUTH client, we are also done, because we need to | |||
| 2869 | * stay in this state, and let the server query us | |||
| 2870 | */ | |||
| 2871 | if (!IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2) && | |||
| 2872 | st->st_connection->spd.this.xauth_client && | |||
| 2873 | !st->hidden_variables.st_xauth_client_done) { | |||
| 2874 | dbg("XAUTH client is not yet authenticated"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH client is not yet authenticated"); } }; | |||
| 2875 | break; | |||
| 2876 | } | |||
| 2877 | ||||
| 2878 | /* | |||
| 2879 | * when talking to some vendors, we need to initiate a mode | |||
| 2880 | * cfg request to get challenged, but there is also an | |||
| 2881 | * override in the form of a policy bit. | |||
| 2882 | */ | |||
| 2883 | dbg("modecfg pull: %s policy:%s %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2884 | (st->quirks.modecfg_pull_mode ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2885 | "quirk-poll" : "noquirk"),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2886 | (st->st_connection->policy & POLICY_MODECFG_PULL) ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2887 | "pull" : "push",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2888 | (st->st_connection->spd.this.modecfg_client ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
| 2889 | "modecfg-client" : "not-client")){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } }; | |||
| 2890 | ||||
| 2891 | if (st->st_connection->spd.this.modecfg_client && | |||
| 2892 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
| 2893 | (st->quirks.modecfg_pull_mode || | |||
| 2894 | st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX))) && | |||
| 2895 | !st->hidden_variables.st_modecfg_started) { | |||
| 2896 | dbg("modecfg client is starting due to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } | |||
| 2897 | st->quirks.modecfg_pull_mode ? "quirk" :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } | |||
| 2898 | "policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } }; | |||
| 2899 | modecfg_send_request(st); | |||
| 2900 | break; | |||
| 2901 | } | |||
| 2902 | ||||
| 2903 | /* Should we set the peer's IP address regardless? */ | |||
| 2904 | if (st->st_connection->spd.this.modecfg_server && | |||
| 2905 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
| 2906 | !st->hidden_variables.st_modecfg_vars_set && | |||
| 2907 | !(st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX)))) { | |||
| 2908 | change_state(st, STATE_MODE_CFG_R1); | |||
| 2909 | log_state(RC_LOG, st, "Sending MODE CONFIG set"); | |||
| 2910 | /* | |||
| 2911 | * ??? we ignore the result of modecfg. | |||
| 2912 | * But surely, if it fails, we ought to terminate this exchange. | |||
| 2913 | * What do the RFCs say? | |||
| 2914 | */ | |||
| 2915 | modecfg_start_set(st); | |||
| 2916 | break; | |||
| 2917 | } | |||
| 2918 | ||||
| 2919 | /* | |||
| 2920 | * If we are the responder and the client is in "Contivity mode", | |||
| 2921 | * we need to initiate Quick mode | |||
| 2922 | */ | |||
| 2923 | if (!(smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) && | |||
| 2924 | IS_V1_MODE_CFG_ESTABLISHED(st->st_state)(((st->st_state)->kind) == STATE_MODE_CFG_R2) && | |||
| 2925 | (st->st_seen_nortel_vid)) { | |||
| 2926 | log_state(RC_LOG, st, "Nortel 'Contivity Mode' detected, starting Quick Mode"); | |||
| 2927 | change_state(st, STATE_MAIN_R3); /* ISAKMP is up... */ | |||
| 2928 | quick_outI1(st->st_logger->object_whackfd, st, st->st_connection, | |||
| 2929 | st->st_connection->policy, 1, SOS_NOBODY0, null_shunk); | |||
| 2930 | break; | |||
| 2931 | } | |||
| 2932 | ||||
| 2933 | /* wait for modecfg_set */ | |||
| 2934 | if (st->st_connection->spd.this.modecfg_client && | |||
| 2935 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
| 2936 | !st->hidden_variables.st_modecfg_vars_set) { | |||
| 2937 | dbg("waiting for modecfg set from server"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("waiting for modecfg set from server"); } }; | |||
| 2938 | break; | |||
| 2939 | } | |||
| 2940 | ||||
| 2941 | dbg("phase 1 is done, looking for phase 2 to unpend"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("phase 1 is done, looking for phase 2 to unpend" ); } }; | |||
| 2942 | ||||
| 2943 | if (smc->flags & SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6))) { | |||
| 2944 | /* Initiate any Quick Mode negotiations that | |||
| 2945 | * were waiting to piggyback on this Keying Channel. | |||
| 2946 | * | |||
| 2947 | * ??? there is a potential race condition | |||
| 2948 | * if we are the responder: the initial Phase 2 | |||
| 2949 | * message might outrun the final Phase 1 message. | |||
| 2950 | * | |||
| 2951 | * so, instead of actually sending the traffic now, | |||
| 2952 | * we schedule an event to do so. | |||
| 2953 | * | |||
| 2954 | * but, in fact, quick_mode will enqueue a cryptographic operation | |||
| 2955 | * anyway, which will get done "later" anyway, so maybe it is just fine | |||
| 2956 | * as it is. | |||
| 2957 | * | |||
| 2958 | */ | |||
| 2959 | unpend(pexpect_ike_sa(st), NULL((void*)0)); | |||
| 2960 | } | |||
| 2961 | ||||
| 2962 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) || | |||
| 2963 | IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) | |||
| 2964 | release_any_whack(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2964, }; &here; }), "IKEv1 transitions finished"); | |||
| 2965 | ||||
| 2966 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) | |||
| 2967 | break; | |||
| 2968 | ||||
| 2969 | break; | |||
| 2970 | } | |||
| 2971 | ||||
| 2972 | case STF_INTERNAL_ERROR: | |||
| 2973 | /* update the previous packet history */ | |||
| 2974 | remember_received_packet(st, md); | |||
| 2975 | log_state(RC_INTERNALERR + md->v1_note, st, | |||
| 2976 | "state transition function for %s had internal error", | |||
| 2977 | st->st_state->name); | |||
| 2978 | release_pending_whacks(st, "internal error"); | |||
| 2979 | break; | |||
| 2980 | ||||
| 2981 | case STF_FATAL: | |||
| 2982 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2982, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
| 2983 | /* update the previous packet history */ | |||
| 2984 | remember_received_packet(st, md); | |||
| 2985 | log_state(RC_FATAL, st, "encountered fatal error in state %s", | |||
| 2986 | st->st_state->name); | |||
| 2987 | #ifdef HAVE_NM1 | |||
| 2988 | if (st->st_connection->remotepeertype == CISCO && | |||
| 2989 | st->st_connection->nmconfigured) { | |||
| 2990 | if (!do_command(st->st_connection, | |||
| 2991 | &st->st_connection->spd, | |||
| 2992 | "disconnectNM", | |||
| 2993 | st, st->st_logger)) | |||
| 2994 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; | |||
| 2995 | } | |||
| 2996 | #endif | |||
| 2997 | release_pending_whacks(st, "fatal error"); | |||
| 2998 | delete_state(st); | |||
| 2999 | md->v1_st = st = NULL((void*)0); | |||
| 3000 | break; | |||
| 3001 | ||||
| 3002 | default: /* a shortcut to STF_FAIL, setting md->note */ | |||
| 3003 | passert(result > STF_FAIL)({ _Bool assertion__ = result > STF_FAIL; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3003, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "result > STF_FAIL"); } (void) 1; }); | |||
| 3004 | md->v1_note = result - STF_FAIL; | |||
| 3005 | /* FALL THROUGH */ | |||
| 3006 | case STF_FAIL: | |||
| 3007 | { | |||
| 3008 | /* As it is, we act as if this message never happened: | |||
| 3009 | * whatever retrying was in place, remains in place. | |||
| 3010 | */ | |||
| 3011 | /* | |||
| 3012 | * Try to convert the notification into a non-NULL | |||
| 3013 | * string. For NOTHING_WRONG, be vague (at the time | |||
| 3014 | * of writing the enum_names didn't contain | |||
| 3015 | * NOTHING_WRONG, and even if it did "nothing wrong" | |||
| 3016 | * wouldn't exactly help here :-). | |||
| 3017 | */ | |||
| 3018 | const char *notify_name = (md->v1_note == NOTHING_WRONG ? "failed" : | |||
| 3019 | enum_name(&ikev1_notify_names, md->v1_note)); | |||
| 3020 | if (notify_name == NULL((void*)0)) { | |||
| 3021 | notify_name = "internal error"; | |||
| 3022 | } | |||
| 3023 | /* | |||
| 3024 | * ??? why no call of remember_received_packet? | |||
| 3025 | * Perhaps because the message hasn't been authenticated? | |||
| 3026 | * But then then any duplicate would lose too, I would think. | |||
| 3027 | */ | |||
| 3028 | ||||
| 3029 | if (md->v1_note != NOTHING_WRONG) { | |||
| 3030 | /* this will log */ | |||
| 3031 | SEND_NOTIFICATION(md->v1_note){ { const unsigned __pstat = (md->v1_note); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, md->v1_note ); else send_notification_from_md(md, md->v1_note); }; | |||
| 3032 | } else { | |||
| 3033 | /* XXX: why whack only? */ | |||
| 3034 | log_state(WHACK_STREAM | (RC_NOTIFICATION + md->v1_note), st, | |||
| 3035 | "state transition failed: %s", notify_name); | |||
| 3036 | } | |||
| 3037 | ||||
| 3038 | dbg("state transition function for %s failed: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } } | |||
| 3039 | st->st_state->name, notify_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } }; | |||
| 3040 | ||||
| 3041 | #ifdef HAVE_NM1 | |||
| 3042 | if (st->st_connection->remotepeertype == CISCO && | |||
| 3043 | st->st_connection->nmconfigured) { | |||
| 3044 | if (!do_command(st->st_connection, | |||
| 3045 | &st->st_connection->spd, | |||
| 3046 | "disconnectNM", | |||
| 3047 | st, st->st_logger)) | |||
| 3048 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; | |||
| 3049 | } | |||
| 3050 | #endif | |||
| 3051 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) { | |||
| 3052 | delete_state(st); | |||
| 3053 | /* wipe out dangling pointer to st */ | |||
| 3054 | md->v1_st = NULL((void*)0); | |||
| 3055 | } | |||
| 3056 | break; | |||
| 3057 | } | |||
| 3058 | } | |||
| 3059 | } | |||
| 3060 | ||||
| 3061 | /* | |||
| 3062 | * note: may change which connection is referenced by md->v1_st->st_connection. | |||
| 3063 | * But only if we are a Main Mode Responder. | |||
| 3064 | */ | |||
| 3065 | bool_Bool ikev1_decode_peer_id(struct msg_digest *md, bool_Bool initiator, bool_Bool aggrmode) | |||
| 3066 | { | |||
| 3067 | struct state *const st = md->v1_st; | |||
| 3068 | struct connection *c = st->st_connection; | |||
| 3069 | const struct payload_digest *const id_pld = md->chain[ISAKMP_NEXT_ID]; | |||
| 3070 | const struct isakmp_id *const id = &id_pld->payload.id; | |||
| 3071 | ||||
| 3072 | /* | |||
| 3073 | * I think that RFC2407 (IPSEC DOI) 4.6.2 is confused. | |||
| 3074 | * It talks about the protocol ID and Port fields of the ID | |||
| 3075 | * Payload, but they don't exist as such in Phase 1. | |||
| 3076 | * We use more appropriate names. | |||
| 3077 | * isaid_doi_specific_a is in place of Protocol ID. | |||
| 3078 | * isaid_doi_specific_b is in place of Port. | |||
| 3079 | * Besides, there is no good reason for allowing these to be | |||
| 3080 | * other than 0 in Phase 1. | |||
| 3081 | */ | |||
| 3082 | if (st->hidden_variables.st_nat_traversal != LEMPTY((lset_t)0) && | |||
| 3083 | id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && | |||
| 3084 | (id->isaid_doi_specific_b == 0 || | |||
| 3085 | id->isaid_doi_specific_b == NAT_IKE_UDP_PORT4500)) { | |||
| 3086 | dbg("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } } | |||
| 3087 | id->isaid_doi_specific_a, id->isaid_doi_specific_b){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } }; | |||
| 3088 | } else if (!(id->isaid_doi_specific_a == 0 && | |||
| 3089 | id->isaid_doi_specific_b == 0) && | |||
| 3090 | !(id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && | |||
| 3091 | id->isaid_doi_specific_b == IKE_UDP_PORT500)) | |||
| 3092 | { | |||
| 3093 | log_state(RC_LOG_SERIOUS, st, | |||
| 3094 | "protocol/port in Phase 1 ID Payload MUST be 0/0 or %d/%d but are %d/%d (attempting to continue)", | |||
| 3095 | IPPROTO_UDPIPPROTO_UDP, IKE_UDP_PORT500, | |||
| 3096 | id->isaid_doi_specific_a, | |||
| 3097 | id->isaid_doi_specific_b); | |||
| 3098 | /* | |||
| 3099 | * We have turned this into a warning because of bugs in other | |||
| 3100 | * vendors' products. Specifically CISCO VPN3000. | |||
| 3101 | */ | |||
| 3102 | /* return false; */ | |||
| 3103 | } | |||
| 3104 | ||||
| 3105 | struct id peer; | |||
| 3106 | ||||
| 3107 | diag_t d = unpack_peer_id(id->isaid_idtype, &peer, &id_pld->pbs); | |||
| 3108 | if (d != NULL((void*)0)) { | |||
| 3109 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
| 3110 | return false0; | |||
| 3111 | } | |||
| 3112 | ||||
| 3113 | if (c->spd.that.id.kind == ID_FROMCERT) { | |||
| 3114 | /* breaks API, connection modified by %fromcert */ | |||
| 3115 | duplicate_id(&c->spd.that.id, &peer); | |||
| 3116 | } | |||
| 3117 | ||||
| 3118 | /* | |||
| 3119 | * For interop with SoftRemote/aggressive mode we need to remember some | |||
| 3120 | * things for checking the hash | |||
| 3121 | */ | |||
| 3122 | st->st_peeridentity_protocol = id->isaid_doi_specific_a; | |||
| 3123 | st->st_peeridentity_port = ntohs(id->isaid_doi_specific_b); | |||
| 3124 | ||||
| 3125 | { | |||
| 3126 | id_buf buf; | |||
| 3127 | esb_buf b; | |||
| 3128 | log_state(RC_LOG, st, "Peer ID is %s: '%s'", | |||
| 3129 | enum_show(&ike_id_type_names, id->isaid_idtype, &b), | |||
| 3130 | str_id(&peer, &buf)str_id_bytes(&peer, jam_raw_bytes, &buf)); | |||
| 3131 | } | |||
| 3132 | ||||
| 3133 | /* check for certificates */ | |||
| 3134 | if (!v1_verify_certs(md)) { | |||
| 3135 | log_state(RC_LOG, st, "X509: CERT payload does not match connection ID"); | |||
| 3136 | if (initiator || aggrmode) { | |||
| 3137 | /* cannot switch connection so fail */ | |||
| 3138 | return false0; | |||
| 3139 | } | |||
| 3140 | } | |||
| 3141 | ||||
| 3142 | /* check for certificate requests */ | |||
| 3143 | ikev1_decode_cr(md, st->st_logger); | |||
| 3144 | ||||
| 3145 | /* | |||
| 3146 | * Now that we've decoded the ID payload, let's see if we | |||
| 3147 | * need to switch connections. | |||
| 3148 | * Aggressive mode cannot switch connections. | |||
| 3149 | * We must not switch horses if we initiated: | |||
| 3150 | * - if the initiation was explicit, we'd be ignoring user's intent | |||
| 3151 | * - if opportunistic, we'll lose our HOLD info | |||
| 3152 | */ | |||
| 3153 | ||||
| 3154 | if (initiator) { | |||
| 3155 | if (!st->st_v1_peer_alt_id && | |||
| 3156 | !same_id(&c->spd.that.id, &peer) && | |||
| 3157 | c->spd.that.id.kind != ID_FROMCERT) { | |||
| 3158 | id_buf expect; | |||
| 3159 | id_buf found; | |||
| 3160 | ||||
| 3161 | log_state(RC_LOG_SERIOUS, st, | |||
| 3162 | "we require IKEv1 peer to have ID '%s', but peer declares '%s'", | |||
| 3163 | str_id(&c->spd.that.id, &expect)str_id_bytes(&c->spd.that.id, jam_raw_bytes, &expect ), | |||
| 3164 | str_id(&peer, &found)str_id_bytes(&peer, jam_raw_bytes, &found)); | |||
| 3165 | return false0; | |||
| 3166 | } else if (c->spd.that.id.kind == ID_FROMCERT) { | |||
| 3167 | if (peer.kind != ID_DER_ASN1_DN) { | |||
| 3168 | log_state(RC_LOG_SERIOUS, st, | |||
| 3169 | "peer ID is not a certificate type"); | |||
| 3170 | return false0; | |||
| 3171 | } | |||
| 3172 | duplicate_id(&c->spd.that.id, &peer); | |||
| 3173 | } | |||
| 3174 | } else if (!aggrmode) { | |||
| 3175 | /* Main Mode Responder */ | |||
| 3176 | uint16_t auth = xauth_calcbaseauth(st->st_oakley.auth); | |||
| 3177 | lset_t auth_policy; | |||
| 3178 | ||||
| 3179 | switch (auth) { | |||
| 3180 | case OAKLEY_PRESHARED_KEY: | |||
| 3181 | auth_policy = POLICY_PSK((lset_t)1 << (POLICY_PSK_IX)); | |||
| 3182 | break; | |||
| 3183 | case OAKLEY_RSA_SIG: | |||
| 3184 | auth_policy = POLICY_RSASIG((lset_t)1 << (POLICY_RSASIG_IX)); | |||
| 3185 | break; | |||
| 3186 | /* Not implemented */ | |||
| 3187 | case OAKLEY_DSS_SIG: | |||
| 3188 | case OAKLEY_RSA_ENC: | |||
| 3189 | case OAKLEY_RSA_REVISED_MODE: | |||
| 3190 | case OAKLEY_ECDSA_P256: | |||
| 3191 | case OAKLEY_ECDSA_P384: | |||
| 3192 | case OAKLEY_ECDSA_P521: | |||
| 3193 | default: | |||
| 3194 | dbg("ikev1 ike_decode_peer_id bad_case due to not supported policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ikev1 ike_decode_peer_id bad_case due to not supported policy" ); } }; | |||
| 3195 | return false0; | |||
| 3196 | } | |||
| 3197 | ||||
| 3198 | bool_Bool fromcert; | |||
| 3199 | struct connection *r = | |||
| 3200 | refine_host_connection_on_responder(st, &peer, | |||
| 3201 | NULL((void*)0), /* IKEv1 does not support 'you Tarzan, me Jane' */ | |||
| 3202 | auth_policy, | |||
| 3203 | AUTHBY_UNSET, /* ikev2 only */ | |||
| 3204 | &fromcert); | |||
| 3205 | ||||
| 3206 | if (r == NULL((void*)0)) { | |||
| 3207 | id_buf buf; | |||
| 3208 | dbg("no more suitable connection for peer '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } } | |||
| 3209 | str_id(&peer, &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } }; | |||
| 3210 | /* can we continue with what we had? */ | |||
| 3211 | if (!md->v1_st->st_v1_peer_alt_id && | |||
| 3212 | !same_id(&c->spd.that.id, &peer) && | |||
| 3213 | c->spd.that.id.kind != ID_FROMCERT) { | |||
| 3214 | log_state(RC_LOG, md->v1_st, "Peer mismatch on first found connection and no better connection found"); | |||
| 3215 | return false0; | |||
| 3216 | } else { | |||
| 3217 | dbg("Peer ID matches and no better connection found - continuing with existing connection"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Peer ID matches and no better connection found - continuing with existing connection" ); } }; | |||
| 3218 | r = c; | |||
| 3219 | } | |||
| 3220 | } | |||
| 3221 | ||||
| 3222 | dn_buf buf; | |||
| 3223 | dbg("offered CA: '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } } | |||
| 3224 | str_dn_or_null(r->spd.this.ca, "%none", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } }; | |||
| 3225 | ||||
| 3226 | if (r != c) { | |||
| 3227 | /* | |||
| 3228 | * We are changing st->st_connection! | |||
| 3229 | * Our caller might be surprised! | |||
| 3230 | */ | |||
| 3231 | connection_buf b1, b2; | |||
| 3232 | ||||
| 3233 | /* apparently, r is an improvement on c -- replace */ | |||
| 3234 | log_state(RC_LOG, st, "switched from "PRI_CONNECTION"\"%s\"%s"" to "PRI_CONNECTION"\"%s\"%s""", | |||
| 3235 | pri_connection(c, &b1)(c)->name, str_connection_instance(c, &b1), pri_connection(r, &b2)(r)->name, str_connection_instance(r, &b2)); | |||
| 3236 | ||||
| 3237 | if (r->kind == CK_TEMPLATE || r->kind == CK_GROUP) { | |||
| 3238 | /* instantiate it, filling in peer's ID */ | |||
| 3239 | r = rw_instantiate(r, &c->spd.that.host_addr, | |||
| 3240 | NULL((void*)0), | |||
| 3241 | &peer); | |||
| 3242 | } | |||
| 3243 | ||||
| 3244 | update_state_connection(st, r); | |||
| 3245 | c = r; /* c not subsequently used */ | |||
| 3246 | /* redo from scratch so we read and check CERT payload */ | |||
| 3247 | dbg("retrying ike_decode_peer_id() with new conn"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("retrying ike_decode_peer_id() with new conn") ; } }; | |||
| 3248 | passert(!initiator && !aggrmode)({ _Bool assertion__ = !initiator && !aggrmode; if (! assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3248, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "!initiator && !aggrmode" ); } (void) 1; }); | |||
| 3249 | return ikev1_decode_peer_id(md, false0, false0); | |||
| 3250 | } else if (c->spd.that.has_id_wildcards) { | |||
| 3251 | duplicate_id(&c->spd.that.id, &peer); | |||
| 3252 | c->spd.that.has_id_wildcards = false0; | |||
| 3253 | } else if (fromcert) { | |||
| 3254 | dbg("copying ID for fromcert"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("copying ID for fromcert"); } }; | |||
| 3255 | duplicate_id(&c->spd.that.id, &peer); | |||
| 3256 | } | |||
| 3257 | } | |||
| 3258 | ||||
| 3259 | return true1; | |||
| 3260 | } | |||
| 3261 | ||||
| 3262 | bool_Bool ikev1_ship_chain(chunk_t *chain, int n, pb_stream *outs, | |||
| 3263 | uint8_t type) | |||
| 3264 | { | |||
| 3265 | for (int i = 0; i < n; i++) { | |||
| 3266 | if (!ikev1_ship_CERT(type, HUNK_AS_SHUNK(chain[i])({ typeof(chain[i]) h_ = (chain[i]); shunk2(h_.ptr, h_.len); } ), outs)) | |||
| 3267 | return false0; | |||
| 3268 | } | |||
| 3269 | ||||
| 3270 | return true1; | |||
| 3271 | } | |||
| 3272 | ||||
| 3273 | void doi_log_cert_thinking(uint16_t auth, | |||
| 3274 | enum ike_cert_type certtype, | |||
| 3275 | enum certpolicy policy, | |||
| 3276 | bool_Bool gotcertrequest, | |||
| 3277 | bool_Bool send_cert, | |||
| 3278 | bool_Bool send_chain) | |||
| 3279 | { | |||
| 3280 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
| 3281 | DBG_log("thinking about whether to send my certificate:"); | |||
| 3282 | ||||
| 3283 | esb_buf oan; | |||
| 3284 | esb_buf ictn; | |||
| 3285 | DBG_log(" I have RSA key: %s cert.type: %s ", | |||
| 3286 | enum_show(&oakley_auth_names, auth, &oan), | |||
| 3287 | enum_show(&ike_cert_type_names, certtype, &ictn)); | |||
| 3288 | ||||
| 3289 | esb_buf cptn; | |||
| 3290 | DBG_log(" sendcert: %s and I did%s get a certificate request ", | |||
| 3291 | enum_show(&certpolicy_type_names, policy, &cptn), | |||
| 3292 | gotcertrequest ? "" : " not"); | |||
| 3293 | ||||
| 3294 | DBG_log(" so %ssend cert.", send_cert ? "" : "do not "); | |||
| 3295 | ||||
| 3296 | if (!send_cert) { | |||
| 3297 | if (auth == OAKLEY_PRESHARED_KEY) { | |||
| 3298 | DBG_log("I did not send a certificate because digital signatures are not being used. (PSK)"); | |||
| 3299 | } else if (certtype == CERT_NONE) { | |||
| 3300 | DBG_log("I did not send a certificate because I do not have one."); | |||
| 3301 | } else if (policy == CERT_SENDIFASKED) { | |||
| 3302 | DBG_log("I did not send my certificate because I was not asked to."); | |||
| 3303 | } else { | |||
| 3304 | DBG_log("INVALID AUTH SETTING: %d", auth); | |||
| 3305 | } | |||
| 3306 | } | |||
| 3307 | if (send_chain) | |||
| 3308 | DBG_log("Sending one or more authcerts"); | |||
| 3309 | } | |||
| 3310 | } | |||
| 3311 | ||||
| 3312 | /* | |||
| 3313 | * an ISAKMP SA has been established. | |||
| 3314 | * Note the serial number, and release any connections with | |||
| 3315 | * the same peer ID but different peer IP address. | |||
| 3316 | * | |||
| 3317 | * Called by IKEv1 and IKEv2 when the IKE SA is established. | |||
| 3318 | * It checks if the freshly established connection needs is | |||
| 3319 | * replacing an established version of itself. | |||
| 3320 | * | |||
| 3321 | * The use of uniqueIDs is mostly historic and might be removed | |||
| 3322 | * in a future version. It is ignored for PSK based connections, | |||
| 3323 | * which only act based on being a "server using PSK". | |||
| 3324 | * | |||
| 3325 | * IKEv1 code does not send or process INITIAL_CONTACT | |||
| 3326 | * IKEv2 codes does so we take it into account. | |||
| 3327 | */ | |||
| 3328 | ||||
| 3329 | void ISAKMP_SA_established(const struct ike_sa *ike) | |||
| 3330 | { | |||
| 3331 | struct connection *c = ike->sa.st_connection; | |||
| 3332 | bool_Bool authnull = (LIN(POLICY_AUTH_NULL, c->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (c->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || c->spd.that.authby == AUTHBY_NULL); | |||
| 3333 | ||||
| 3334 | if (c->spd.this.xauth_server && LIN(POLICY_PSK, c->policy)(((((lset_t)1 << (POLICY_PSK_IX))) & (c->policy) ) == (((lset_t)1 << (POLICY_PSK_IX))))) { | |||
| 3335 | /* | |||
| 3336 | * If we are a server and use PSK, all clients use the same group ID | |||
| 3337 | * Note that "xauth_server" also refers to IKEv2 CP | |||
| 3338 | */ | |||
| 3339 | dbg("We are a server using PSK and clients are using a group ID"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We are a server using PSK and clients are using a group ID" ); } }; | |||
| 3340 | } else if (!uniqueIDs) { | |||
| 3341 | dbg("uniqueIDs disabled, not contemplating releasing older self"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("uniqueIDs disabled, not contemplating releasing older self" ); } }; | |||
| 3342 | } else { | |||
| 3343 | /* | |||
| 3344 | * for all existing connections: if the same Phase 1 IDs are used, | |||
| 3345 | * unorient the (old) connection (if different from current connection) | |||
| 3346 | * Only do this for connections with the same name (can be shared ike sa) | |||
| 3347 | */ | |||
| 3348 | struct connection_query cq = { .where = HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3348, }; &here; }), .c = NULL((void*)0), }; | |||
| 3349 | while (new2old_connection(&cq)) { | |||
| 3350 | struct connection *d = cq.c; | |||
| 3351 | ||||
| 3352 | /* if old IKE SA is same as new IKE sa and non-auth isn't overwrting auth */ | |||
| 3353 | if (c != d && c->kind == d->kind && streq(c->name, d->name)(strcmp((c->name), (d->name)) == 0) && | |||
| 3354 | same_id(&c->spd.this.id, &d->spd.this.id) && | |||
| 3355 | same_id(&c->spd.that.id, &d->spd.that.id)) | |||
| 3356 | { | |||
| 3357 | bool_Bool old_is_nullauth = (LIN(POLICY_AUTH_NULL, d->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (d->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || d->spd.that.authby == AUTHBY_NULL); | |||
| 3358 | bool_Bool same_remote_ip = sameaddr(&c->spd.that.host_addr, &d->spd.that.host_addr); | |||
| 3359 | ||||
| 3360 | if (same_remote_ip && (!old_is_nullauth && authnull)) { | |||
| 3361 | log_state(RC_LOG, &ike->sa, "cannot replace old authenticated connection with authnull connection"); | |||
| 3362 | } else if (!same_remote_ip && old_is_nullauth && authnull) { | |||
| 3363 | log_state(RC_LOG, &ike->sa, "NULL auth ID for different IP's cannot replace each other"); | |||
| 3364 | } else { | |||
| 3365 | dbg("unorienting old connection with same IDs"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unorienting old connection with same IDs"); } }; | |||
| 3366 | /* | |||
| 3367 | * When replacing an old | |||
| 3368 | * existing connection, | |||
| 3369 | * suppress sending delete | |||
| 3370 | * notify | |||
| 3371 | */ | |||
| 3372 | suppress_delete_notify(ike, "ISAKMP", d->newest_ike_sa); | |||
| 3373 | suppress_delete_notify(ike, "IKE", d->newest_ipsec_sa); | |||
| 3374 | /* | |||
| 3375 | * XXX: Assume this call | |||
| 3376 | * doesn't want to log to | |||
| 3377 | * whack? Even though the IKE | |||
| 3378 | * SA may have whack attached, | |||
| 3379 | * don't transfer it to the | |||
| 3380 | * old connection. | |||
| 3381 | */ | |||
| 3382 | if (d->kind == CK_INSTANCE) { | |||
| 3383 | delete_connection(&d, /*relations?*/false0); | |||
| 3384 | } else { | |||
| 3385 | release_connection(d, /*relations?*/false0); /* this deletes the states */ | |||
| 3386 | } | |||
| 3387 | } | |||
| 3388 | } | |||
| 3389 | } | |||
| 3390 | ||||
| 3391 | /* | |||
| 3392 | * This only affects IKEv2, since we don't store any | |||
| 3393 | * received INITIAL_CONTACT for IKEv1. | |||
| 3394 | * We don't do this on IKEv1, because it seems to | |||
| 3395 | * confuse various third parties (Windows, Cisco VPN 300, | |||
| 3396 | * and juniper | |||
| 3397 | * likely because this would be called before the IPsec SA | |||
| 3398 | * of QuickMode is installed, so the remote endpoints view | |||
| 3399 | * this IKE SA still as the active one? | |||
| 3400 | */ | |||
| 3401 | if (ike->sa.st_ike_seen_v2n_initial_contact) { | |||
| 3402 | if (c->newest_ike_sa != SOS_NOBODY0 && | |||
| 3403 | c->newest_ike_sa != ike->sa.st_serialno) { | |||
| 3404 | struct state *old_p1 = state_by_serialno(c->newest_ike_sa); | |||
| 3405 | ||||
| 3406 | dbg("deleting replaced IKE state for %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } } | |||
| 3407 | old_p1->st_connection->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } }; | |||
| 3408 | old_p1->st_send_delete = DONT_SEND_DELETE; | |||
| 3409 | event_force(EVENT_SA_EXPIRE, old_p1); | |||
| 3410 | } | |||
| 3411 | ||||
| 3412 | if (c->newest_ipsec_sa != SOS_NOBODY0) { | |||
| 3413 | struct state *old_p2 = state_by_serialno(c->newest_ipsec_sa); | |||
| 3414 | struct connection *d = old_p2 == NULL((void*)0) ? NULL((void*)0) : old_p2->st_connection; | |||
| 3415 | ||||
| 3416 | if (c == d && same_id(&c->spd.that.id, &d->spd.that.id)) { | |||
| 3417 | dbg("Initial Contact received, deleting old state #%lu from connection '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } } | |||
| 3418 | c->newest_ipsec_sa, c->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } }; | |||
| 3419 | old_p2->st_send_delete = DONT_SEND_DELETE; | |||
| 3420 | event_force(EVENT_SA_EXPIRE, old_p2); | |||
| 3421 | } | |||
| 3422 | } | |||
| 3423 | } | |||
| 3424 | } | |||
| 3425 | ||||
| 3426 | c->newest_ike_sa = ike->sa.st_serialno; | |||
| 3427 | } | |||
| 3428 | ||||
| 3429 | /* | |||
| 3430 | * Reply messages are built in this nasty evil global buffer. | |||
| 3431 | * | |||
| 3432 | * Only one packet can be built at a time. That should be ok as | |||
| 3433 | * packets are only built on the main thread and code and a packet is | |||
| 3434 | * created using a single operation. | |||
| 3435 | * | |||
| 3436 | * In the good old days code would partially construct a packet, | |||
| 3437 | * wonder off to do crypto and process other packets, and then assume | |||
| 3438 | * things could be picked up where they were left off. Code to make | |||
| 3439 | * that work (saving restoring the buffer, re-initializing the buffer | |||
| 3440 | * in strange places, ....) has all been removed. | |||
| 3441 | * | |||
| 3442 | * Something else that should go is global access to REPLY_STREAM. | |||
| 3443 | * Instead all code should use open_reply_stream() and a reference | |||
| 3444 | * with only local scope. This should reduce the odds of code | |||
| 3445 | * meddling in reply_stream on the sly. | |||
| 3446 | * | |||
| 3447 | * Another possibility is to move the buffer onto the stack. However, | |||
| 3448 | * the PBS is 64K and that isn't so good for small machines. Then | |||
| 3449 | * again the send.[hc] and demux[hc] code both allocate 64K stack | |||
| 3450 | * buffers already. Oops. | |||
| 3451 | */ | |||
| 3452 | ||||
| 3453 | pb_stream reply_stream; |