File: | programs/pluto/ikev1.c |
Warning: | line 3245, column 4 Value stored to 'c' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* State machine for IKEv1 |
2 | * |
3 | * Copyright (C) 1997 Angelos D. Keromytis. |
4 | * Copyright (C) 1998-2010,2013-2016 D. Hugh Redelmeier <hugh@mimosa.com> |
5 | * Copyright (C) 2003-2008 Michael Richardson <mcr@xelerance.com> |
6 | * Copyright (C) 2008-2009 David McCullough <david_mccullough@securecomputing.com> |
7 | * Copyright (C) 2008-2010 Paul Wouters <paul@xelerance.com> |
8 | * Copyright (C) 2011 Avesh Agarwal <avagarwa@redhat.com> |
9 | * Copyright (C) 2008 Hiren Joshi <joshihirenn@gmail.com> |
10 | * Copyright (C) 2009 Anthony Tong <atong@TrustedCS.com> |
11 | * Copyright (C) 2012-2019 Paul Wouters <pwouters@redhat.com> |
12 | * Copyright (C) 2013 Wolfgang Nothdurft <wolfgang@linogate.de> |
13 | * Copyright (C) 2019-2019 Andrew Cagney <cagney@gnu.org> |
14 | * |
15 | * This program is free software; you can redistribute it and/or modify it |
16 | * under the terms of the GNU General Public License as published by the |
17 | * Free Software Foundation; either version 2 of the License, or (at your |
18 | * option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>. |
19 | * |
20 | * This program is distributed in the hope that it will be useful, but |
21 | * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY |
22 | * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
23 | * for more details. |
24 | * |
25 | */ |
26 | |
27 | /* Ordering Constraints on Payloads |
28 | * |
29 | * rfc2409: The Internet Key Exchange (IKE) |
30 | * |
31 | * 5 Exchanges: |
32 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." |
33 | * |
34 | * "Except where otherwise noted, there are no requirements for ISAKMP |
35 | * payloads in any message to be in any particular order." |
36 | * |
37 | * 5.3 Phase 1 Authenticated With a Revised Mode of Public Key Encryption: |
38 | * |
39 | * "If the HASH payload is sent it MUST be the first payload of the |
40 | * second message exchange and MUST be followed by the encrypted |
41 | * nonce. If the HASH payload is not sent, the first payload of the |
42 | * second message exchange MUST be the encrypted nonce." |
43 | * |
44 | * "Save the requirements on the location of the optional HASH payload |
45 | * and the mandatory nonce payload there are no further payload |
46 | * requirements. All payloads-- in whatever order-- following the |
47 | * encrypted nonce MUST be encrypted with Ke_i or Ke_r depending on the |
48 | * direction." |
49 | * |
50 | * 5.5 Phase 2 - Quick Mode |
51 | * |
52 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP |
53 | * header and a SA payload MUST immediately follow the HASH." |
54 | * [NOTE: there may be more than one SA payload, so this is not |
55 | * totally reasonable. Probably all SAs should be so constrained.] |
56 | * |
57 | * "If ISAKMP is acting as a client negotiator on behalf of another |
58 | * party, the identities of the parties MUST be passed as IDci and |
59 | * then IDcr." |
60 | * |
61 | * "With the exception of the HASH, SA, and the optional ID payloads, |
62 | * there are no payload ordering restrictions on Quick Mode." |
63 | */ |
64 | |
65 | /* Unfolding of Identity -- a central mystery |
66 | * |
67 | * This concerns Phase 1 identities, those of the IKE hosts. |
68 | * These are the only ones that are authenticated. Phase 2 |
69 | * identities are for IPsec SAs. |
70 | * |
71 | * There are three case of interest: |
72 | * |
73 | * (1) We initiate, based on a whack command specifying a Connection. |
74 | * We know the identity of the peer from the Connection. |
75 | * |
76 | * (2) (to be implemented) we initiate based on a flow from our client |
77 | * to some IP address. |
78 | * We immediately know one of the peer's client IP addresses from |
79 | * the flow. We must use this to figure out the peer's IP address |
80 | * and Id. To be solved. |
81 | * |
82 | * (3) We respond to an IKE negotiation. |
83 | * We immediately know the peer's IP address. |
84 | * We get an ID Payload in Main I2. |
85 | * |
86 | * Unfortunately, this is too late for a number of things: |
87 | * - the ISAKMP SA proposals have already been made (Main I1) |
88 | * AND one accepted (Main R1) |
89 | * - the SA includes a specification of the type of ID |
90 | * authentication so this is negotiated without being told the ID. |
91 | * - with Preshared Key authentication, Main I2 is encrypted |
92 | * using the key, so it cannot be decoded to reveal the ID |
93 | * without knowing (or guessing) which key to use. |
94 | * |
95 | * There are three reasonable choices here for the responder: |
96 | * + assume that the initiator is making wise offers since it |
97 | * knows the IDs involved. We can balk later (but not gracefully) |
98 | * when we find the actual initiator ID |
99 | * + attempt to infer identity by IP address. Again, we can balk |
100 | * when the true identity is revealed. Actually, it is enough |
101 | * to infer properties of the identity (eg. SA properties and |
102 | * PSK, if needed). |
103 | * + make all properties universal so discrimination based on |
104 | * identity isn't required. For example, always accept the same |
105 | * kinds of encryption. Accept Public Key Id authentication |
106 | * since the Initiator presumably has our public key and thinks |
107 | * we must have / can find peers. This approach is weakest |
108 | * for preshared key since the actual key must be known to |
109 | * decrypt the Initiator's ID Payload. |
110 | * These choices can be blended. For example, a class of Identities |
111 | * can be inferred, sufficient to select a preshared key but not |
112 | * sufficient to infer a unique identity. |
113 | */ |
114 | |
115 | #include <stdio.h> |
116 | #include <stdlib.h> |
117 | #include <stddef.h> |
118 | #include <string.h> |
119 | #include <unistd.h> |
120 | #include <errno(*__errno_location ()).h> |
121 | #include <sys/types.h> |
122 | #include <sys/socket.h> |
123 | #include <netinet/in.h> |
124 | #include <arpa/inet.h> |
125 | |
126 | |
127 | #include "sysdep.h" |
128 | #include "constants.h" |
129 | |
130 | #include "defs.h" |
131 | #include "ike_spi.h" |
132 | #include "id.h" |
133 | #include "x509.h" |
134 | #include "pluto_x509.h" |
135 | #include "certs.h" |
136 | #include "connections.h" /* needs id.h */ |
137 | #include "state.h" |
138 | #include "ikev1_msgid.h" |
139 | #include "packet.h" |
140 | #include "crypto.h" |
141 | #include "ike_alg.h" |
142 | #include "log.h" |
143 | #include "demux.h" /* needs packet.h */ |
144 | #include "ikev1.h" |
145 | #include "ipsec_doi.h" /* needs demux.h and state.h */ |
146 | #include "ikev1_quick.h" |
147 | #include "timer.h" |
148 | #include "whack.h" /* requires connections.h */ |
149 | #include "server.h" |
150 | #include "send.h" |
151 | #include "ikev1_send.h" |
152 | #include "ikev1_xauth.h" |
153 | #include "retransmit.h" |
154 | #include "nat_traversal.h" |
155 | #include "ikev1_nat.h" |
156 | #include "vendor.h" |
157 | #include "ikev1_dpd.h" |
158 | #include "host_pair.h" |
159 | #include "ip_address.h" |
160 | #include "ikev1_hash.h" |
161 | #include "ike_alg_encrypt_ops.h" /* XXX: oops */ |
162 | #include "ikev1_states.h" |
163 | #include "initiate.h" |
164 | #include "iface.h" |
165 | #include "ip_selector.h" |
166 | #include "unpack.h" |
167 | #include "pending.h" |
168 | #include "state_db.h" |
169 | |
170 | #ifdef HAVE_NM1 |
171 | #include "kernel.h" |
172 | #endif |
173 | |
174 | #include "pluto_stats.h" |
175 | |
176 | /* |
177 | * state_v1_microcode is a tuple of information parameterizing certain |
178 | * centralized processing of a packet. For example, it roughly |
179 | * specifies what payloads are expected in this message. The |
180 | * microcode is selected primarily based on the state. In Phase 1, |
181 | * the payload structure often depends on the authentication |
182 | * technique, so that too plays a part in selecting the |
183 | * state_v1_microcode to use. |
184 | */ |
185 | |
186 | struct state_v1_microcode { |
187 | enum state_kind state, next_state; |
188 | lset_t flags; |
189 | lset_t req_payloads; /* required payloads (allows just one) */ |
190 | lset_t opt_payloads; /* optional payloads (any number) */ |
191 | enum event_type timeout_event; |
192 | ikev1_state_transition_fn *processor; |
193 | const char *message; |
194 | enum v1_hash_type hash_type; |
195 | }; |
196 | |
197 | void jam_v1_transition(struct jambuf *buf, const struct state_v1_microcode *transition) |
198 | { |
199 | if (transition == NULL((void*)0)) { |
200 | jam(buf, "NULL"); |
201 | } else { |
202 | jam(buf, "%s->%s", |
203 | finite_states[transition->state]->short_name, |
204 | finite_states[transition->next_state]->short_name); |
205 | } |
206 | } |
207 | |
208 | /* State Microcode Flags, in several groups */ |
209 | |
210 | /* Oakley Auth values: to which auth values does this entry apply? |
211 | * Most entries will use SMF_ALL_AUTH because they apply to all. |
212 | * Note: SMF_ALL_AUTH matches 0 for those circumstances when no auth |
213 | * has been set. |
214 | * |
215 | * The IKEv1 state machine then uses the auth type (SMF_*_AUTH flags) |
216 | * to select the exact state transition. For states where auth |
217 | * (SMF_*_AUTH flags) don't apply (.e.g, child states) |
218 | * flags|=SMF_ALL_AUTH so the first transition always matches. |
219 | * |
220 | * Once a transition is selected, the containing payloads are checked |
221 | * against what is allowed. For instance, in STATE_MAIN_R2 -> |
222 | * STATE_MAIN_R3 with SMF_DS_AUTH requires P(SIG). |
223 | * |
224 | * In IKEv2, it is the message header and payload types that select |
225 | * the state. As for how the IKEv1 'from state' is selected, look for |
226 | * a big nasty magic switch. |
227 | * |
228 | * XXX: the state transition table is littered with STATE_UNDEFINED / |
229 | * SMF_ALL_AUTH / unexpected() entries. These are to catch things |
230 | * like unimplemented auth cases, and unexpected packets. For the |
231 | * latter, they seem to be place holders so that the table contains at |
232 | * least one entry for the state. |
233 | * |
234 | * XXX: Some of the SMF flags specify attributes of the current state |
235 | * (e.g., SMF_RETRANSMIT_ON_DUPLICATE), some apply to the state |
236 | * transition (e.g., SMF_REPLY), and some can be interpreted as either |
237 | * (.e.g., SMF_INPUT_ENCRYPTED). |
238 | */ |
239 | #define SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) LRANGE(0, OAKLEY_AUTH_ROOF - 1)(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) |
240 | #define SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) LELEM(OAKLEY_PRESHARED_KEY)((lset_t)1 << (OAKLEY_PRESHARED_KEY)) |
241 | #define SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) (LELEM(OAKLEY_DSS_SIG)((lset_t)1 << (OAKLEY_DSS_SIG)) | LELEM(OAKLEY_RSA_SIG)((lset_t)1 << (OAKLEY_RSA_SIG))) |
242 | #define SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) LELEM(OAKLEY_RSA_ENC)((lset_t)1 << (OAKLEY_RSA_ENC)) |
243 | #define SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) LELEM(OAKLEY_RSA_REVISED_MODE)((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) |
244 | |
245 | /* misc flags */ |
246 | #define SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) LELEM(OAKLEY_AUTH_ROOF + 0)((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) |
247 | #define SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) LELEM(OAKLEY_AUTH_ROOF + 1)((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) |
248 | #define SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) LELEM(OAKLEY_AUTH_ROOF + 2)((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) |
249 | #define SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) LELEM(OAKLEY_AUTH_ROOF + 3)((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) |
250 | #define SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) LELEM(OAKLEY_AUTH_ROOF + 4)((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) |
251 | |
252 | #define SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) (SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) |
253 | |
254 | /* this state generates a reply message */ |
255 | #define SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) LELEM(OAKLEY_AUTH_ROOF + 5)((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) |
256 | |
257 | /* this state completes P1, so any pending P2 negotiations should start */ |
258 | #define SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) LELEM(OAKLEY_AUTH_ROOF + 6)((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) |
259 | |
260 | /* if we have canoncalized the authentication from XAUTH mode */ |
261 | #define SMF_XAUTH_AUTH((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) LELEM(OAKLEY_AUTH_ROOF + 7)((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) |
262 | |
263 | /* end of flags */ |
264 | |
265 | static ikev1_state_transition_fn unexpected; /* forward declaration */ |
266 | static ikev1_state_transition_fn informational; /* forward declaration */ |
267 | |
268 | /* |
269 | * v1_state_microcode_table is a table of all state_v1_microcode |
270 | * tuples. It must be in order of state (the first element). After |
271 | * initialization, ike_microcode_index[s] points to the first entry in |
272 | * v1_state_microcode_table for state s. Remember that each state |
273 | * name in Main or Quick Mode describes what has happened in the past, |
274 | * not what this message is. |
275 | */ |
276 | |
277 | static const struct state_v1_microcode v1_state_microcode_table[] = { |
278 | |
279 | #define P(n) LELEM(ISAKMP_NEXT_ ##n)((lset_t)1 << (ISAKMP_NEXT_ ##n)) |
280 | #define FM(F) .processor = F, .message = #F |
281 | |
282 | /***** Phase 1 Main Mode *****/ |
283 | |
284 | /* No state for main_outI1: --> HDR, SA */ |
285 | |
286 | /* STATE_MAIN_R0: I1 --> R1 |
287 | * HDR, SA --> HDR, SA |
288 | */ |
289 | { STATE_MAIN_R0, STATE_MAIN_R1, |
290 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
291 | P(SA), P(VID) | P(CR), |
292 | EVENT_SA_DISCARD, |
293 | FM(main_inI1_outR1), |
294 | .hash_type = V1_HASH_NONE, }, |
295 | |
296 | /* STATE_MAIN_I1: R1 --> I2 |
297 | * HDR, SA --> auth dependent |
298 | * SMF_PSK_AUTH, SMF_DS_AUTH: --> HDR, KE, Ni |
299 | * SMF_PKE_AUTH: |
300 | * --> HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r |
301 | * SMF_RPKE_AUTH: |
302 | * --> HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] |
303 | * Note: since we don't know auth at start, we cannot differentiate |
304 | * microcode entries based on it. |
305 | */ |
306 | { STATE_MAIN_I1, STATE_MAIN_I2, |
307 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
308 | P(SA), P(VID) | P(CR), |
309 | EVENT_RETRANSMIT, |
310 | FM(main_inR1_outI2), |
311 | .hash_type = V1_HASH_NONE, }, |
312 | |
313 | /* STATE_MAIN_R1: I2 --> R2 |
314 | * SMF_PSK_AUTH, SMF_DS_AUTH: HDR, KE, Ni --> HDR, KE, Nr |
315 | * SMF_PKE_AUTH: HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r |
316 | * --> HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i |
317 | * SMF_RPKE_AUTH: |
318 | * HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] |
319 | * --> HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r |
320 | */ |
321 | { STATE_MAIN_R1, STATE_MAIN_R2, |
322 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
323 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), |
324 | EVENT_RETRANSMIT, |
325 | FM(main_inI2_outR2), |
326 | .hash_type = V1_HASH_NONE, }, |
327 | |
328 | { STATE_MAIN_R1, STATE_UNDEFINED, |
329 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
330 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR) | P(HASH), |
331 | EVENT_RETRANSMIT, |
332 | FM(unexpected) /* ??? not yet implemented */, |
333 | .hash_type = V1_HASH_NONE, }, |
334 | |
335 | { STATE_MAIN_R1, STATE_UNDEFINED, |
336 | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
337 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR) | P(HASH) | P(CERT), |
338 | EVENT_RETRANSMIT, |
339 | FM(unexpected) /* ??? not yet implemented */, |
340 | .hash_type = V1_HASH_NONE, }, |
341 | |
342 | /* for states from here on, output message must be encrypted */ |
343 | |
344 | /* STATE_MAIN_I2: R2 --> I3 |
345 | * SMF_PSK_AUTH: HDR, KE, Nr --> HDR*, IDi1, HASH_I |
346 | * SMF_DS_AUTH: HDR, KE, Nr --> HDR*, IDi1, [ CERT, ] SIG_I |
347 | * SMF_PKE_AUTH: HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i |
348 | * --> HDR*, HASH_I |
349 | * SMF_RPKE_AUTH: HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r |
350 | * --> HDR*, HASH_I |
351 | */ |
352 | { STATE_MAIN_I2, STATE_MAIN_I3, |
353 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
354 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), |
355 | EVENT_RETRANSMIT, |
356 | FM(main_inR2_outI3), |
357 | /* calls main_mode_hash() after DH */ |
358 | .hash_type = V1_HASH_NONE, }, |
359 | |
360 | { STATE_MAIN_I2, STATE_UNDEFINED, |
361 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
362 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR), |
363 | EVENT_RETRANSMIT, |
364 | FM(unexpected) /* ??? not yet implemented */, |
365 | .hash_type = V1_HASH_NONE, }, |
366 | |
367 | { STATE_MAIN_I2, STATE_UNDEFINED, |
368 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
369 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR), |
370 | EVENT_RETRANSMIT, |
371 | FM(unexpected) /* ??? not yet implemented */, |
372 | .hash_type = V1_HASH_NONE, }, |
373 | |
374 | /* for states from here on, input message must be encrypted */ |
375 | |
376 | /* STATE_MAIN_R2: I3 --> R3 |
377 | * SMF_PSK_AUTH: HDR*, IDi1, HASH_I --> HDR*, IDr1, HASH_R |
378 | * SMF_DS_AUTH: HDR*, IDi1, [ CERT, ] SIG_I --> HDR*, IDr1, [ CERT, ] SIG_R |
379 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_I --> HDR*, HASH_R |
380 | */ |
381 | { STATE_MAIN_R2, STATE_MAIN_R3, |
382 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |
383 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
384 | P(ID) | P(HASH), P(VID) | P(CR), |
385 | EVENT_SA_REPLACE, |
386 | FM(main_inI3_outR3), |
387 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
388 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption |
389 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ |
390 | .hash_type = V1_HASH_NONE, }, |
391 | |
392 | { STATE_MAIN_R2, STATE_MAIN_R3, |
393 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |
394 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
395 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), |
396 | EVENT_SA_REPLACE, |
397 | FM(main_inI3_outR3), |
398 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
399 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures |
400 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) |
401 | SIG_I = SIGN(HASH_I) *", |
402 | SIG_I = SIGN(HASH_I) */ |
403 | .hash_type = V1_HASH_NONE, }, |
404 | |
405 | { STATE_MAIN_R2, STATE_UNDEFINED, |
406 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | |
407 | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |
408 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
409 | P(HASH), P(VID) | P(CR), |
410 | EVENT_SA_REPLACE, |
411 | FM(unexpected) /* ??? not yet implemented */, |
412 | .hash_type = V1_HASH_NONE, }, |
413 | |
414 | /* STATE_MAIN_I3: R3 --> done |
415 | * SMF_PSK_AUTH: HDR*, IDr1, HASH_R --> done |
416 | * SMF_DS_AUTH: HDR*, IDr1, [ CERT, ] SIG_R --> done |
417 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_R --> done |
418 | * May initiate quick mode by calling quick_outI1 |
419 | */ |
420 | { STATE_MAIN_I3, STATE_MAIN_I4, |
421 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | |
422 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
423 | P(ID) | P(HASH), P(VID) | P(CR), |
424 | EVENT_SA_REPLACE, |
425 | FM(main_inR3), |
426 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
427 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption |
428 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ |
429 | .hash_type = V1_HASH_NONE, }, |
430 | |
431 | { STATE_MAIN_I3, STATE_MAIN_I4, |
432 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | |
433 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
434 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), |
435 | EVENT_SA_REPLACE, |
436 | FM(main_inR3), |
437 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
438 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures |
439 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) |
440 | SIG_R = SIGN(HASH_R) */ |
441 | .hash_type = V1_HASH_NONE, }, |
442 | |
443 | { STATE_MAIN_I3, STATE_UNDEFINED, |
444 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | |
445 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
446 | P(HASH), P(VID) | P(CR), |
447 | EVENT_SA_REPLACE, |
448 | FM(unexpected) /* ??? not yet implemented */, |
449 | .hash_type = V1_HASH_NONE, }, |
450 | |
451 | /* STATE_MAIN_R3: can only get here due to packet loss */ |
452 | { STATE_MAIN_R3, STATE_UNDEFINED, |
453 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
454 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
455 | EVENT_NULL, |
456 | FM(unexpected), |
457 | .hash_type = V1_HASH_NONE, }, |
458 | |
459 | /* STATE_MAIN_I4: can only get here due to packet loss */ |
460 | { STATE_MAIN_I4, STATE_UNDEFINED, |
461 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
462 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
463 | EVENT_NULL, |
464 | FM(unexpected), |
465 | .hash_type = V1_HASH_NONE, }, |
466 | |
467 | /***** Phase 1 Aggressive Mode *****/ |
468 | |
469 | /* No initial state for aggr_outI1: |
470 | * SMF_DS_AUTH (RFC 2409 5.1) and SMF_PSK_AUTH (RFC 2409 5.4): |
471 | * -->HDR, SA, KE, Ni, IDii |
472 | * |
473 | * Not implemented: |
474 | * RFC 2409 5.2: --> HDR, SA, [ HASH(1),] KE, <IDii_b>Pubkey_r, <Ni_b>Pubkey_r |
475 | * RFC 2409 5.3: --> HDR, SA, [ HASH(1),] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] |
476 | */ |
477 | |
478 | /* STATE_AGGR_R0: |
479 | * SMF_PSK_AUTH: HDR, SA, KE, Ni, IDii |
480 | * --> HDR, SA, KE, Nr, IDir, HASH_R |
481 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDii |
482 | * --> HDR, SA, KE, Nr, IDir, [CERT,] SIG_R |
483 | */ |
484 | { STATE_AGGR_R0, STATE_AGGR_R1, |
485 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
486 | P(SA) | P(KE) | P(NONCE) | P(ID), P(VID) | P(NATD_RFC), |
487 | EVENT_SA_DISCARD, |
488 | FM(aggr_inI1_outR1), |
489 | /* N/A */ |
490 | .hash_type = V1_HASH_NONE, }, |
491 | |
492 | /* STATE_AGGR_I1: |
493 | * SMF_PSK_AUTH: HDR, SA, KE, Nr, IDir, HASH_R |
494 | * --> HDR*, HASH_I |
495 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDir, [CERT,] SIG_R |
496 | * --> HDR*, [CERT,] SIG_I |
497 | */ |
498 | { STATE_AGGR_I1, STATE_AGGR_I2, |
499 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | |
500 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
501 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(HASH), P(VID) | P(NATD_RFC), |
502 | EVENT_SA_REPLACE, |
503 | FM(aggr_inR1_outI2), |
504 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ |
505 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption |
506 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ |
507 | .hash_type = V1_HASH_NONE, }, |
508 | |
509 | { STATE_AGGR_I1, STATE_AGGR_I2, |
510 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | |
511 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
512 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(SIG), P(VID) | P(NATD_RFC), |
513 | EVENT_SA_REPLACE, |
514 | FM(aggr_inR1_outI2), |
515 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ |
516 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures |
517 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) |
518 | SIG_R = SIGN(HASH_R) */ |
519 | .hash_type = V1_HASH_NONE, }, |
520 | |
521 | /* STATE_AGGR_R1: |
522 | * SMF_PSK_AUTH: HDR*, HASH_I --> done |
523 | * SMF_DS_AUTH: HDR*, SIG_I --> done |
524 | */ |
525 | { STATE_AGGR_R1, STATE_AGGR_R2, |
526 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | |
527 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | |
528 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
529 | P(HASH), P(VID) | P(NATD_RFC), |
530 | EVENT_SA_REPLACE, |
531 | FM(aggr_inI2), |
532 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
533 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption |
534 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ |
535 | .hash_type = V1_HASH_NONE, }, |
536 | |
537 | { STATE_AGGR_R1, STATE_AGGR_R2, |
538 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | |
539 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | |
540 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
541 | P(SIG), P(VID) | P(NATD_RFC), |
542 | EVENT_SA_REPLACE, |
543 | FM(aggr_inI2), |
544 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ |
545 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures |
546 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) |
547 | SIG_I = SIGN(HASH_I) */ |
548 | .hash_type = V1_HASH_NONE, }, |
549 | |
550 | /* STATE_AGGR_I2: can only get here due to packet loss */ |
551 | { STATE_AGGR_I2, STATE_UNDEFINED, |
552 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
553 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, |
554 | FM(unexpected), |
555 | .hash_type = V1_HASH_NONE, }, |
556 | |
557 | /* STATE_AGGR_R2: can only get here due to packet loss */ |
558 | { STATE_AGGR_R2, STATE_UNDEFINED, |
559 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), |
560 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, |
561 | FM(unexpected), |
562 | .hash_type = V1_HASH_NONE, }, |
563 | |
564 | /***** Phase 2 Quick Mode *****/ |
565 | |
566 | /* No state for quick_outI1: |
567 | * --> HDR*, HASH(1), SA, Nr [, KE ] [, IDci, IDcr ] |
568 | */ |
569 | |
570 | /* STATE_QUICK_R0: |
571 | * HDR*, HASH(1), SA, Ni [, KE ] [, IDci, IDcr ] --> |
572 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] |
573 | * Installs inbound IPsec SAs. |
574 | * Because it may suspend for asynchronous DNS, first_out_payload |
575 | * is set to NONE to suppress early emission of HDR*. |
576 | * ??? it is legal to have multiple SAs, but we don't support it yet. |
577 | */ |
578 | { STATE_QUICK_R0, STATE_QUICK_R1, |
579 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
580 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), |
581 | EVENT_RETRANSMIT, |
582 | FM(quick_inI1_outR1), |
583 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: |
584 | HASH(1) = prf(SKEYID_a, M-ID | <rest>) */ |
585 | .hash_type = V1_HASH_1, }, |
586 | |
587 | /* STATE_QUICK_I1: |
588 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] --> |
589 | * HDR*, HASH(3) |
590 | * Installs inbound and outbound IPsec SAs, routing, etc. |
591 | * ??? it is legal to have multiple SAs, but we don't support it yet. |
592 | */ |
593 | { STATE_QUICK_I1, STATE_QUICK_I2, |
594 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
595 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), |
596 | EVENT_SA_REPLACE, |
597 | FM(quick_inR1_outI2), |
598 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: |
599 | HASH(2) = prf(SKEYID_a, M-ID | Ni_b | <rest>) */ |
600 | .hash_type = V1_HASH_2, }, |
601 | |
602 | /* STATE_QUICK_R1: HDR*, HASH(3) --> done |
603 | * Installs outbound IPsec SAs, routing, etc. |
604 | */ |
605 | { STATE_QUICK_R1, STATE_QUICK_R2, |
606 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
607 | P(HASH), LEMPTY((lset_t)0), |
608 | EVENT_SA_REPLACE, |
609 | FM(quick_inI2), |
610 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: |
611 | HASH(3) = prf(SKEYID_a, 0 | M-ID | Ni_b | Nr_b) */ |
612 | .hash_type = V1_HASH_3, }, |
613 | |
614 | /* STATE_QUICK_I2: can only happen due to lost packet */ |
615 | { STATE_QUICK_I2, STATE_UNDEFINED, |
616 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |
617 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), |
618 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
619 | EVENT_NULL, |
620 | FM(unexpected), |
621 | .hash_type = V1_HASH_NONE, }, |
622 | |
623 | /* STATE_QUICK_R2: can only happen due to lost packet */ |
624 | { STATE_QUICK_R2, STATE_UNDEFINED, |
625 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
626 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
627 | EVENT_NULL, |
628 | FM(unexpected), |
629 | .hash_type = V1_HASH_NONE, }, |
630 | |
631 | /***** informational messages *****/ |
632 | |
633 | /* Informational Exchange (RFC 2408 4.8): |
634 | * HDR N/D |
635 | * Unencrypted: must not occur after ISAKMP Phase 1 exchange of keying material. |
636 | */ |
637 | /* STATE_INFO: */ |
638 | { STATE_INFO, STATE_UNDEFINED, |
639 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), |
640 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
641 | EVENT_NULL, |
642 | FM(informational), |
643 | .hash_type = V1_HASH_NONE, }, |
644 | |
645 | /* Informational Exchange (RFC 2408 4.8): |
646 | * HDR* N/D |
647 | */ |
648 | /* STATE_INFO_PROTECTED: */ |
649 | { STATE_INFO_PROTECTED, STATE_UNDEFINED, |
650 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
651 | P(HASH), LEMPTY((lset_t)0), |
652 | EVENT_NULL, |
653 | FM(informational), |
654 | /* RFC 2409: 5.7 ISAKMP Informational Exchanges: |
655 | HASH(1) = prf(SKEYID_a, M-ID | N/D) */ |
656 | .hash_type = V1_HASH_1, }, |
657 | |
658 | { STATE_XAUTH_R0, STATE_XAUTH_R1, |
659 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
660 | P(MCFG_ATTR) | P(HASH), P(VID), |
661 | EVENT_NULL, |
662 | FM(xauth_inR0), |
663 | /* RFC ????: */ |
664 | .hash_type = V1_HASH_1, }, /* Re-transmit may be done by previous state */ |
665 | |
666 | { STATE_XAUTH_R1, STATE_MAIN_R3, |
667 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
668 | P(MCFG_ATTR) | P(HASH), P(VID), |
669 | EVENT_SA_REPLACE, |
670 | FM(xauth_inR1), |
671 | /* RFC ????: */ |
672 | .hash_type = V1_HASH_1, }, |
673 | |
674 | #if 0 |
675 | /* for situation where there is XAUTH + ModeCFG */ |
676 | { STATE_XAUTH_R2, STATE_XAUTH_R3, |
677 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
678 | P(MCFG_ATTR) | P(HASH), P(VID), |
679 | EVENT_SA_REPLACE, |
680 | FM(xauth_inR2), }, |
681 | |
682 | { STATE_XAUTH_R3, STATE_MAIN_R3, |
683 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
684 | P(MCFG_ATTR) | P(HASH), P(VID), |
685 | EVENT_SA_REPLACE, |
686 | FM(xauth_inR3), }, |
687 | #endif |
688 | |
689 | /* MODE_CFG_x: |
690 | * Case R0: Responder -> Initiator |
691 | * <- Req(addr=0) |
692 | * Reply(ad=x) -> |
693 | * |
694 | * Case R1: Set(addr=x) -> |
695 | * <- Ack(ok) |
696 | */ |
697 | |
698 | { STATE_MODE_CFG_R0, STATE_MODE_CFG_R1, |
699 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), |
700 | P(MCFG_ATTR) | P(HASH), P(VID), |
701 | EVENT_SA_REPLACE, |
702 | FM(modecfg_inR0), |
703 | /* RFC ????: */ |
704 | .hash_type = V1_HASH_1, }, |
705 | |
706 | { STATE_MODE_CFG_R1, STATE_MODE_CFG_R2, |
707 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
708 | P(MCFG_ATTR) | P(HASH), P(VID), |
709 | EVENT_SA_REPLACE, |
710 | FM(modecfg_inR1), |
711 | /* RFC ????: */ |
712 | .hash_type = V1_HASH_1, }, |
713 | |
714 | { STATE_MODE_CFG_R2, STATE_UNDEFINED, |
715 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), |
716 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
717 | EVENT_NULL, |
718 | FM(unexpected), |
719 | .hash_type = V1_HASH_NONE, }, |
720 | |
721 | { STATE_MODE_CFG_I1, STATE_MAIN_I4, |
722 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
723 | P(MCFG_ATTR) | P(HASH), P(VID), |
724 | EVENT_SA_REPLACE, |
725 | FM(modecfg_inR1), |
726 | /* RFC ????: */ |
727 | .hash_type = V1_HASH_1, }, |
728 | |
729 | { STATE_XAUTH_I0, STATE_XAUTH_I1, |
730 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
731 | P(MCFG_ATTR) | P(HASH), P(VID), |
732 | EVENT_RETRANSMIT, |
733 | FM(xauth_inI0), |
734 | /* RFC ????: */ |
735 | .hash_type = V1_HASH_1, }, |
736 | |
737 | { STATE_XAUTH_I1, STATE_MAIN_I4, |
738 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), |
739 | P(MCFG_ATTR) | P(HASH), P(VID), |
740 | EVENT_RETRANSMIT, |
741 | FM(xauth_inI1), |
742 | /* RFC ????: */ |
743 | .hash_type = V1_HASH_1, }, |
744 | |
745 | { STATE_IKEv1_ROOF, STATE_IKEv1_ROOF, |
746 | LEMPTY((lset_t)0), |
747 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), |
748 | EVENT_NULL, NULL((void*)0), |
749 | .hash_type = V1_HASH_NONE, }, |
750 | |
751 | #undef FM |
752 | #undef P |
753 | }; |
754 | |
755 | void init_ikev1(struct logger *logger) |
756 | { |
757 | dbg("checking IKEv1 state table"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("checking IKEv1 state table"); } }; |
758 | |
759 | /* |
760 | * Fill in FINITE_STATES[]. |
761 | * |
762 | * This is a hack until each finite-state is a separate object |
763 | * with corresponding edges (aka microcodes). |
764 | * |
765 | * XXX: Long term goal is to have a constant FINITE_STATES[] |
766 | * contain constant pointers and this static writeable array |
767 | * to just go away. |
768 | */ |
769 | for (enum state_kind kind = STATE_IKEv1_FLOOR; kind < STATE_IKEv1_ROOF; kind++) { |
770 | /* fill in using static struct */ |
771 | const struct finite_state *fs = &v1_states[kind - STATE_IKEv1_FLOOR]; |
772 | passert(fs->kind == kind)({ _Bool assertion__ = fs->kind == kind; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 772, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "fs->kind == kind"); } (void) 1; }); |
773 | passert(finite_states[kind] == NULL)({ _Bool assertion__ = finite_states[kind] == ((void*)0); if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 773, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "finite_states[kind] == ((void*)0)" ); } (void) 1; }); |
774 | finite_states[kind] = fs; |
775 | } |
776 | |
777 | /* |
778 | * Go through the state transition table filling in details |
779 | * and checking for inconsistencies. |
780 | */ |
781 | for (const struct state_v1_microcode *t = v1_state_microcode_table; |
782 | t->state < STATE_IKEv1_ROOF; t++) { |
783 | |
784 | passert(t->state >= STATE_IKEv1_FLOOR)({ _Bool assertion__ = t->state >= STATE_IKEv1_FLOOR; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 784, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "t->state >= STATE_IKEv1_FLOOR" ); } (void) 1; }); |
785 | passert(t->state < STATE_IKEv1_ROOF)({ _Bool assertion__ = t->state < STATE_IKEv1_ROOF; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 785, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "t->state < STATE_IKEv1_ROOF" ); } (void) 1; }); |
786 | struct finite_state *from = &v1_states[t->state - STATE_IKEv1_FLOOR]; |
787 | |
788 | /* |
789 | * Deal with next_state == STATE_UNDEFINED. |
790 | * |
791 | * XXX: STATE_UNDEFINED is used when a state |
792 | * transitions back to the same state; such |
793 | * transitions should instead explicitly specify that |
794 | * same state. |
795 | */ |
796 | enum state_kind next_state = (t->next_state == STATE_UNDEFINED ? |
797 | t->state : t->next_state); |
798 | passert(STATE_IKEv1_FLOOR <= next_state &&({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }) |
799 | next_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }); |
800 | const struct finite_state *to = finite_states[next_state]; |
801 | passert(to != NULL)({ _Bool assertion__ = to != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 801, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "to != ((void*)0)"); } (void) 1; }); |
802 | |
803 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
804 | if (from->nr_transitions == 0) { |
805 | LSWLOG_DEBUG(buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (; buf != ((void*) 0); jambuf_to_logger(buf, &failsafe_logger, DEBUG_STREAM) , buf = ((void*)0)) { |
806 | jam_string(buf, " "); |
807 | lswlog_finite_state(buf, from); |
808 | jam_string(buf, ":"); |
809 | } |
810 | } |
811 | DBG_log(" -> %s %s (%s)", to->short_name, |
812 | enum_name_short(&event_type_names, |
813 | t->timeout_event), |
814 | t->message); |
815 | } |
816 | |
817 | /* |
818 | * Point .fs_v1_transitions at to the first entry in |
819 | * v1_state_microcode_table for that state. All other |
820 | * transitions for that state should follow |
821 | * immediately after (or to put it another way, the |
822 | * previous transition's state should be the same as |
823 | * this). |
824 | */ |
825 | if (from->v1_transitions == NULL((void*)0)) { |
826 | from->v1_transitions = t; |
827 | } else { |
828 | passert(t[-1].state == t->state)({ _Bool assertion__ = t[-1].state == t->state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 828, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "t[-1].state == t->state" ); } (void) 1; }); |
829 | } |
830 | from->nr_transitions++; |
831 | |
832 | if (t->message == NULL((void*)0)) { |
833 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 833, }; &here; }), "transition %s -> %s missing .message", |
834 | from->short_name, to->short_name); |
835 | } |
836 | |
837 | /* |
838 | * Copy (actually merge) the flags that apply to the |
839 | * state; and not the state transition. |
840 | * |
841 | * The original code used something like state |
842 | * .microcode .flags after the state transition had |
843 | * completed. I.e., use the flags from a |
844 | * not-yet-taken potential future state transition and |
845 | * not the previous one. |
846 | * |
847 | * This is just trying to extract them and |
848 | * check they are consistent. |
849 | * |
850 | * XXX: this is confusing |
851 | * |
852 | * Should fs_flags and SMF_RETRANSMIT_ON_DUPLICATE |
853 | * should be replaced by SMF_RESPONDING in the |
854 | * transition flags? |
855 | * |
856 | * Or is this more like .fs_timeout_event which is |
857 | * always true of a state? |
858 | */ |
859 | if ((t->flags & from->flags) != from->flags) { |
860 | DBGF(DBG_BASE, "transition %s -> %s (%s) missing flags 0x%"PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } |
861 | from->short_name, to->short_name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } |
862 | t->message, from->flags){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } }; |
863 | } |
864 | from->flags |= t->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)); |
865 | |
866 | if (!(t->flags & SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) && |
867 | (t->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) && |
868 | t->processor != unexpected) { |
869 | /* |
870 | * The first encrypted message carries |
871 | * authentication information so isn't |
872 | * applicable. Other encrypted messages |
873 | * require integrity via the HASH payload. |
874 | */ |
875 | if (!(t->req_payloads & LELEM(ISAKMP_NEXT_HASH)((lset_t)1 << (ISAKMP_NEXT_HASH)))) { |
876 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 876, }; &here; }), |
877 | "transition %s -> %s (%s) missing HASH payload", |
878 | from->short_name, to->short_name, |
879 | t->message); |
880 | } |
881 | if (t->hash_type == V1_HASH_NONE) { |
882 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 882, }; &here; }), |
883 | "transition %s -> %s (%s) missing HASH protection", |
884 | from->short_name, to->short_name, |
885 | t->message); |
886 | } |
887 | } |
888 | } |
889 | } |
890 | |
891 | static stf_status unexpected(struct state *st, struct msg_digest *md UNUSED__attribute__ ((unused))) |
892 | { |
893 | log_state(RC_LOG_SERIOUS, st, "unexpected message received in state %s", |
894 | st->st_state->name); |
895 | return STF_IGNORE; |
896 | } |
897 | |
898 | /* |
899 | * RFC 2408 Section 4.6 |
900 | * |
901 | * # Initiator Direction Responder NOTE |
902 | * (1) HDR*; N/D => Error Notification or Deletion |
903 | */ |
904 | static stf_status informational(struct state *st, struct msg_digest *md) |
905 | { |
906 | /* |
907 | * XXX: Danger: ST is deleted midway through this function. |
908 | */ |
909 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 909, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); |
910 | st = md->v1_st; /* may be NULL */ |
911 | |
912 | struct payload_digest *const n_pld = md->chain[ISAKMP_NEXT_N]; |
913 | |
914 | /* If the Notification Payload is not null... */ |
915 | if (n_pld != NULL((void*)0)) { |
916 | pb_stream *const n_pbs = &n_pld->pbs; |
917 | struct isakmp_notification *const n = |
918 | &n_pld->payload.notification; |
919 | |
920 | /* Switch on Notification Type (enum) */ |
921 | /* note that we _can_ get notification payloads unencrypted |
922 | * once we are at least in R3/I4. |
923 | * and that the handler is expected to treat them suspiciously. |
924 | */ |
925 | dbg("processing informational %s (%d)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } |
926 | enum_name(&ikev1_notify_names, n->isan_type),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } |
927 | n->isan_type){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } }; |
928 | |
929 | pstats(ikev1_recv_notifies_e, n->isan_type){ const unsigned __pstat = (n->isan_type); if (__pstat < (sizeof(pstats_ikev1_recv_notifies_e) / sizeof(*(pstats_ikev1_recv_notifies_e )))) { pstats_ikev1_recv_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_recv_notifies_e", __pstat); } }; |
930 | |
931 | switch (n->isan_type) { |
932 | /* |
933 | * We answer DPD probes even if they claimed not to support |
934 | * Dead Peer Detection. |
935 | * We would have to send some kind of reply anyway to prevent |
936 | * a retransmit, so rather then send an error, we might as |
937 | * well just send a DPD reply |
938 | */ |
939 | case R_U_THERE: |
940 | if (st == NULL((void*)0)) { |
941 | llog(RC_LOG, md->md_logger, |
942 | "received bogus R_U_THERE informational message"); |
943 | return STF_IGNORE; |
944 | } |
945 | return dpd_inI_outR(st, n, n_pbs); |
946 | |
947 | case R_U_THERE_ACK: |
948 | if (st == NULL((void*)0)) { |
949 | llog(RC_LOG, md->md_logger, |
950 | "received bogus R_U_THERE_ACK informational message"); |
951 | return STF_IGNORE; |
952 | } |
953 | return dpd_inR(st, n, n_pbs); |
954 | |
955 | case PAYLOAD_MALFORMED: |
956 | if (st != NULL((void*)0)) { |
957 | st->hidden_variables.st_malformed_received++; |
958 | |
959 | log_state(RC_LOG, st, "received %u malformed payload notifies", |
960 | st->hidden_variables.st_malformed_received); |
961 | |
962 | if (st->hidden_variables.st_malformed_sent > |
963 | MAXIMUM_MALFORMED_NOTIFY16 / 2 && |
964 | ((st->hidden_variables.st_malformed_sent + |
965 | st->hidden_variables. |
966 | st_malformed_received) > |
967 | MAXIMUM_MALFORMED_NOTIFY16)) { |
968 | log_state(RC_LOG, st, "too many malformed payloads (we sent %u and received %u", |
969 | st->hidden_variables.st_malformed_sent, |
970 | st->hidden_variables.st_malformed_received); |
971 | delete_state(st); |
972 | md->v1_st = st = NULL((void*)0); |
973 | } |
974 | } |
975 | |
976 | return STF_IGNORE; |
977 | |
978 | case ISAKMP_N_CISCO_LOAD_BALANCE: |
979 | /* |
980 | * ??? what the heck is in the payload? |
981 | * We take the peer's new IP address from the last 4 octets. |
982 | * Is anything else possible? Expected? Documented? |
983 | */ |
984 | if (st == NULL((void*)0) || !IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
985 | llog(RC_LOG, md->md_logger, |
986 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with for unestablished state."); |
987 | } else if (pbs_left(n_pbs)((size_t)((n_pbs)->roof - (n_pbs)->cur)) < 4) { |
988 | log_state(RC_LOG_SERIOUS, st, |
989 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message without IPv4 address"); |
990 | } else { |
991 | /* |
992 | * Copy (not cast) the last 4 bytes |
993 | * (size of an IPv4) address from the |
994 | * end of the notification into IN |
995 | * (can't cast as can't assume that |
996 | * ->roof-4 is correctly aligned). |
997 | */ |
998 | struct in_addr in; |
999 | memcpy(&in, n_pbs->roof - sizeof(in), sizeof(in)); |
1000 | ip_address new_peer = address_from_in_addr(&in); |
1001 | |
1002 | /* is all zeros? */ |
1003 | if (address_is_any(new_peer)) { |
1004 | ipstr_buf b; |
1005 | |
1006 | log_state(RC_LOG_SERIOUS, st, |
1007 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with invalid IPv4 address %s", |
1008 | ipstr(&new_peer, &b)); |
1009 | return false0; /* XXX: STF_*? */ |
1010 | } |
1011 | |
1012 | /* Saving connection name and whack sock id */ |
1013 | const char *tmp_name = st->st_connection->name; |
1014 | struct fd *tmp_whack_sock = fd_dup(st->st_logger->object_whackfd, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1014, }; &here; })); |
1015 | |
1016 | /* deleting ISAKMP SA with the current remote peer */ |
1017 | delete_state(st); |
1018 | md->v1_st = st = NULL((void*)0); |
1019 | |
1020 | /* to find and store the connection associated with tmp_name */ |
1021 | /* ??? how do we know that tmp_name hasn't been freed? */ |
1022 | struct connection *tmp_c = conn_by_name(tmp_name, false0/*!strict*/); |
1023 | |
1024 | if (tmp_c == NULL((void*)0)) |
1025 | return STF_IGNORE; |
1026 | |
1027 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
1028 | address_buf npb; |
1029 | DBG_log("new peer address: %s", |
1030 | str_address(&new_peer, &npb)); |
1031 | |
1032 | /* Current remote peer info */ |
1033 | int count_spd = 1; |
1034 | for (const struct spd_route *tmp_spd = &tmp_c->spd; |
1035 | tmp_spd != NULL((void*)0); tmp_spd = tmp_spd->spd_next) { |
1036 | address_buf b; |
1037 | |
1038 | DBG_log("spd route number: %d", |
1039 | count_spd++); |
1040 | |
1041 | /**that info**/ |
1042 | DBG_log("that id kind: %d", |
1043 | tmp_spd->that.id.kind); |
1044 | DBG_log("that id ipaddr: %s", |
1045 | str_address(&tmp_spd->that.id.ip_addr, &b)); |
1046 | if (tmp_spd->that.id.name.ptr != NULL((void*)0)) { |
1047 | DBG_dump_hunk("that id name",{ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); } |
1048 | tmp_spd->that.id. name){ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); }; |
1049 | } |
1050 | DBG_log("that host_addr: %s", |
1051 | str_address(&tmp_spd->that.host_addr, &b)); |
1052 | DBG_log("that nexthop: %s", |
1053 | str_address(&tmp_spd->that.host_nexthop, &b)); |
1054 | DBG_log("that srcip: %s", |
1055 | str_address(&tmp_spd->that.host_srcip, &b)); |
1056 | selector_buf sb; |
1057 | DBG_log("that client: %s", |
1058 | str_selector(&tmp_spd->that.client, &sb)); |
1059 | DBG_log("that has_client: %d", |
1060 | tmp_spd->that.has_client); |
1061 | DBG_log("that has_port_wildcard: %d", |
1062 | tmp_spd->that.has_port_wildcard); |
1063 | DBG_log("that has_id_wildcards: %d", |
1064 | tmp_spd->that.has_id_wildcards); |
1065 | } |
1066 | |
1067 | if (tmp_c->interface != NULL((void*)0)) { |
1068 | endpoint_buf b; |
1069 | DBG_log("Current interface_addr: %s", |
1070 | str_endpoint(&tmp_c->interface->local_endpoint, &b)); |
1071 | } |
1072 | } |
1073 | |
1074 | /* save peer's old address for comparison purposes */ |
1075 | ip_address old_addr = tmp_c->spd.that.host_addr; |
1076 | |
1077 | /* update peer's address */ |
1078 | tmp_c->spd.that.host_addr = new_peer; |
1079 | |
1080 | /* Modifying connection info to store the redirected remote peer info */ |
1081 | dbg("Old host_addr_name : %s", tmp_c->spd.that.host_addr_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Old host_addr_name : %s", tmp_c->spd.that. host_addr_name); } }; |
1082 | tmp_c->spd.that.host_addr_name = NULL((void*)0); |
1083 | |
1084 | /* ??? do we know the id.kind has an ip_addr? */ |
1085 | tmp_c->spd.that.id.ip_addr = new_peer; |
1086 | |
1087 | /* update things that were the old peer */ |
1088 | if (address_eq_address(tmp_c->spd.this.host_nexthop, old_addr)) { |
1089 | address_buf ob, nb; |
1090 | dbg("local next hop %s is the same as the old remote addr, changing local next hop to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1091 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1092 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; |
1093 | tmp_c->spd.this.host_nexthop = new_peer; |
1094 | } |
1095 | |
1096 | if (address_eq_address(tmp_c->spd.that.host_srcip, old_addr)) { |
1097 | address_buf ob, nb; |
1098 | dbg("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1099 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1100 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; |
1101 | tmp_c->spd.that.host_srcip = new_peer; |
1102 | } |
1103 | |
1104 | /* |
1105 | * XXX: should this also check that |
1106 | * the client is a single address? |
1107 | */ |
1108 | ip_address client_prefix = selector_prefix(tmp_c->spd.that.client); |
1109 | if (address_eq_address(client_prefix, old_addr)) { |
1110 | address_buf ob, nb; |
1111 | dbg("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1112 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } |
1113 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; |
1114 | tmp_c->spd.that.client = selector_from_address(new_peer); |
1115 | } |
1116 | |
1117 | /* |
1118 | * ??? is this wise? This may changes |
1119 | * a lot of other connections. |
1120 | */ |
1121 | tmp_c->host_pair->remote = new_peer; |
1122 | |
1123 | /* Initiating connection to the redirected peer */ |
1124 | struct logger logger[] = { GLOBAL_LOGGER(tmp_whack_sock)(struct logger) { .where = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1124, }; &here; }), .global_whackfd = tmp_whack_sock, .object = ((void*)0), .object_vec = &logger_global_vec, }, }; /*placeholder*/ |
1125 | initiate_connections_by_name(tmp_name, /*remote-name*/NULL((void*)0), |
1126 | /*background?*/tmp_whack_sock == NULL((void*)0)/*guess*/, |
1127 | logger); |
1128 | close_any(&tmp_whack_sock)close_any_fd((&tmp_whack_sock), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1128, }; &here; })); |
1129 | } |
1130 | return STF_IGNORE; |
1131 | default: |
1132 | { |
1133 | struct logger *logger = st != NULL((void*)0) ? st->st_logger : |
1134 | md->md_logger; |
1135 | llog(RC_LOG_SERIOUS, logger, |
1136 | "received and ignored notification payload: %s", |
1137 | enum_name(&ikev1_notify_names, n->isan_type)); |
1138 | return STF_IGNORE; |
1139 | } |
1140 | } |
1141 | } else { |
1142 | /* warn if we didn't find any Delete or Notify payload in packet */ |
1143 | if (md->chain[ISAKMP_NEXT_D] == NULL((void*)0)) { |
1144 | const struct logger *logger = (st != NULL((void*)0) ? st->st_logger : |
1145 | md != NULL((void*)0) ? md->md_logger : |
1146 | &failsafe_logger); |
1147 | llog(RC_LOG_SERIOUS, logger, |
1148 | "received and ignored empty informational notification payload"); |
1149 | } |
1150 | return STF_IGNORE; |
1151 | } |
1152 | } |
1153 | |
1154 | /* |
1155 | * create output HDR as replica of input HDR - IKEv1 only; return the body |
1156 | */ |
1157 | void ikev1_init_pbs_out_from_md_hdr(struct msg_digest *md, bool_Bool enc, |
1158 | struct pbs_outpacket_byte_stream *output_stream, uint8_t *output_buffer, |
1159 | size_t sizeof_output_buffer, |
1160 | struct pbs_outpacket_byte_stream *rbody, |
1161 | struct logger *logger) |
1162 | { |
1163 | struct isakmp_hdr hdr = md->hdr; /* mostly same as incoming header */ |
1164 | |
1165 | /* make sure we start with a clean buffer */ |
1166 | *output_stream = open_pbs_out("reply packet", output_buffer, sizeof_output_buffer, logger); |
1167 | |
1168 | hdr.isa_flags = 0; /* zero all flags */ |
1169 | if (enc) |
1170 | hdr.isa_flags |= ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX); |
1171 | |
1172 | if (impair.send_bogus_isakmp_flag) { |
1173 | hdr.isa_flags |= ISAKMP_FLAGS_RESERVED_BIT6(1<<ISAKMP_FLAGS_RESERVED_BIT6_IX); |
1174 | } |
1175 | |
1176 | /* there is only one IKEv1 version, and no new one will ever come - no need to set version */ |
1177 | hdr.isa_np = 0; |
1178 | /* surely must have room and be well-formed */ |
1179 | passert(out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody))({ _Bool assertion__ = out_struct(&hdr, &isakmp_hdr_desc , output_stream, rbody); if (!assertion__) { where_t here = ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1179, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody)" ); } (void) 1; }); |
1180 | } |
1181 | |
1182 | /* |
1183 | * Recognise and, if necesssary, respond to an IKEv1 duplicate. |
1184 | * |
1185 | * Use .st_state, which is the true current state, and not MD |
1186 | * .FROM_STATE (which is derived from some convoluted magic) when |
1187 | * determining if the duplicate should or should not get a response. |
1188 | */ |
1189 | static bool_Bool ikev1_duplicate(struct state *st, struct msg_digest *md) |
1190 | { |
1191 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1191, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); |
1192 | if (st->st_v1_rpacket.ptr != NULL((void*)0) && |
1193 | st->st_v1_rpacket.len == pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)) && |
1194 | memeq(st->st_v1_rpacket.ptr, md->packet_pbs.start,(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0) |
1195 | st->st_v1_rpacket.len)(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0)) { |
1196 | /* |
1197 | * Duplicate. Drop or retransmit? |
1198 | * |
1199 | * Only re-transmit when the last state transition |
1200 | * (triggered by this packet the first time) included |
1201 | * a reply. |
1202 | * |
1203 | * XXX: is SMF_RETRANSMIT_ON_DUPLICATE useful or |
1204 | * correct? |
1205 | */ |
1206 | bool_Bool replied = (st->st_v1_last_transition != NULL((void*)0) && |
1207 | (st->st_v1_last_transition->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)))); |
1208 | bool_Bool retransmit_on_duplicate = |
1209 | (st->st_state->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4))); |
1210 | if (replied && retransmit_on_duplicate) { |
1211 | /* |
1212 | * Transitions with EVENT_SA_DISCARD should |
1213 | * always respond to re-transmits (why?); else |
1214 | * cap. |
1215 | */ |
1216 | if (st->st_v1_last_transition->timeout_event == EVENT_SA_DISCARD || |
1217 | count_duplicate(st, MAXIMUM_v1_ACCEPTED_DUPLICATES2)) { |
1218 | log_state(RC_RETRANSMISSION, st, |
1219 | "retransmitting in response to duplicate packet; already %s", |
1220 | st->st_state->name); |
1221 | resend_recorded_v1_ike_msg(st, "retransmit in response to duplicate"); |
1222 | } else { |
1223 | log_state(RC_LOG_SERIOUS, st, |
1224 | "discarding duplicate packet -- exhausted retransmission; already %s", |
1225 | st->st_state->name); |
1226 | } |
1227 | } else { |
1228 | dbg("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } |
1229 | st->st_serialno, st->st_state->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } |
1230 | bool_str(replied), bool_str(retransmit_on_duplicate)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } }; |
1231 | } |
1232 | return true1; |
1233 | } |
1234 | return false0; |
1235 | } |
1236 | |
1237 | /* process an input packet, possibly generating a reply. |
1238 | * |
1239 | * If all goes well, this routine eventually calls a state-specific |
1240 | * transition function. |
1241 | * |
1242 | * This routine will not release_any_md(mdp). It is expected that its |
1243 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks |
1244 | * **mdp should not be freed. So the caller should be prepared for |
1245 | * *mdp being set to NULL. |
1246 | */ |
1247 | void process_v1_packet(struct msg_digest *md) |
1248 | { |
1249 | bool_Bool new_iv_set = false0; |
1250 | struct state *st = NULL((void*)0); |
1251 | enum state_kind from_state = STATE_UNDEFINED; /* state we started in */ |
1252 | |
1253 | #define SEND_NOTIFICATION(t){ { const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, t); else send_notification_from_md(md, t); } \ |
1254 | { \ |
1255 | pstats(ikev1_sent_notifies_e, t){ const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; \ |
1256 | if (st != NULL((void*)0)) \ |
1257 | send_notification_from_state(st, from_state, t); \ |
1258 | else \ |
1259 | send_notification_from_md(md, t); \ |
1260 | } |
1261 | |
1262 | #define LOG_PACKET(RC, ...){ if (st != ((void*)0)) { log_state(RC, st, ...); } else { llog (RC, md->md_logger, ...); } } \ |
1263 | { \ |
1264 | if (st != NULL((void*)0)) { \ |
1265 | log_state(RC, st, __VA_ARGS__); \ |
1266 | } else { \ |
1267 | llog(RC, md->md_logger, __VA_ARGS__); \ |
1268 | } \ |
1269 | } |
1270 | #define LOG_PACKET_JAMBUF(RC_FLAGS, BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) \ |
1271 | LLOG_JAMBUF(RC_FLAGS, (st != NULL ? st->st_logger : md->md_logger), BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) |
1272 | |
1273 | switch (md->hdr.isa_xchg) { |
1274 | case ISAKMP_XCHG_AGGR: |
1275 | case ISAKMP_XCHG_IDPROT: /* part of a Main Mode exchange */ |
1276 | if (md->hdr.isa_msgid != v1_MAINMODE_MSGID((msgid_t) 0)) { |
1277 | LOG_PACKET(RC_LOG, "Message ID was 0x%08" PRIx32 " but should be zero in phase 1",{ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } } |
1278 | md->hdr.isa_msgid){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } }; |
1279 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; |
1280 | return; |
1281 | } |
1282 | |
1283 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { |
1284 | LOG_PACKET(RC_LOG, "Initiator Cookie must not be zero in phase 1 message"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Initiator Cookie must not be zero in phase 1 message" ); } else { llog(RC_LOG, md->md_logger, "Initiator Cookie must not be zero in phase 1 message" ); } }; |
1285 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; |
1286 | return; |
1287 | } |
1288 | |
1289 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { |
1290 | /* |
1291 | * initial message from initiator |
1292 | */ |
1293 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { |
1294 | LOG_PACKET(RC_LOG, "initial phase 1 message is invalid: its Encrypted Flag is on"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } else { llog(RC_LOG, md->md_logger, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } }; |
1295 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; |
1296 | return; |
1297 | } |
1298 | |
1299 | /* |
1300 | * If there is already an existing state with |
1301 | * this ICOOKIE, assume it is some sort of |
1302 | * re-transmit. |
1303 | */ |
1304 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, |
1305 | md->hdr.isa_msgid); |
1306 | if (st != NULL((void*)0)) { |
1307 | if (!ikev1_duplicate(st, md)) { |
1308 | /* |
1309 | * Not a duplicate for the |
1310 | * current state; assume that |
1311 | * this a really old |
1312 | * re-transmit for an earlier |
1313 | * state that should be |
1314 | * discarded. |
1315 | */ |
1316 | log_state(RC_LOG, st, "discarding initial packet; already %s", |
1317 | st->st_state->name); |
1318 | } |
1319 | return; |
1320 | } |
1321 | passert(st == NULL)({ _Bool assertion__ = st == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1321, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st == ((void*)0)"); } (void) 1; }); /* new state needed */ |
1322 | /* don't build a state until the message looks tasty */ |
1323 | from_state = (md->hdr.isa_xchg == ISAKMP_XCHG_IDPROT ? |
1324 | STATE_MAIN_R0 : STATE_AGGR_R0); |
1325 | } else { |
1326 | /* not an initial message */ |
1327 | |
1328 | st = find_state_ikev1(&md->hdr.isa_ike_spis, |
1329 | md->hdr.isa_msgid); |
1330 | |
1331 | if (st == NULL((void*)0)) { |
1332 | /* |
1333 | * perhaps this is a first message |
1334 | * from the responder and contains a |
1335 | * responder cookie that we've not yet |
1336 | * seen. |
1337 | */ |
1338 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, |
1339 | md->hdr.isa_msgid); |
1340 | |
1341 | if (st == NULL((void*)0)) { |
1342 | llog(RC_LOG, md->md_logger, |
1343 | "phase 1 message is part of an unknown exchange"); |
1344 | /* XXX Could send notification back */ |
1345 | return; |
1346 | } |
1347 | } |
1348 | from_state = st->st_state->kind; |
1349 | } |
1350 | break; |
1351 | |
1352 | case ISAKMP_XCHG_INFO: /* an informational exchange */ |
1353 | st = find_v1_info_state(&md->hdr.isa_ike_spis, |
1354 | v1_MAINMODE_MSGID((msgid_t) 0)); |
1355 | |
1356 | if (st == NULL((void*)0)) { |
1357 | /* |
1358 | * might be an informational response to our |
1359 | * first message, in which case, we don't know |
1360 | * the rcookie yet. |
1361 | */ |
1362 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, |
1363 | v1_MAINMODE_MSGID((msgid_t) 0)); |
1364 | } |
1365 | |
1366 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { |
1367 | bool_Bool quiet = (st == NULL((void*)0)); |
1368 | |
1369 | if (st == NULL((void*)0)) { |
1370 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
1371 | DBG_log("Informational Exchange is for an unknown (expired?) SA with MSGID:0x%08" PRIx32"x", |
1372 | md->hdr.isa_msgid); |
1373 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)) |
1374 | md->hdr.isa_ike_initiator_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)); |
1375 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)) |
1376 | md->hdr.isa_ike_responder_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)); |
1377 | } |
1378 | |
1379 | /* XXX Could send notification back */ |
1380 | return; |
1381 | } |
1382 | |
1383 | if (!IS_V1_ISAKMP_ENCRYPTED(st->st_state->kind)((((lset_t)1 << (st->st_state->kind)) & ((((lset_t )1 << (STATE_MAIN_I4)) - ((lset_t)1 << (STATE_MAIN_R2 )) + ((lset_t)1 << (STATE_MAIN_I4))) | (((lset_t)1 << (STATE_AGGR_R2)) - ((lset_t)1 << (STATE_AGGR_R1)) + (( lset_t)1 << (STATE_AGGR_R2))) | (((lset_t)1 << (STATE_QUICK_R2 )) - ((lset_t)1 << (STATE_QUICK_R0)) + ((lset_t)1 << (STATE_QUICK_R2))) | ((lset_t)1 << (STATE_INFO_PROTECTED )) | (((lset_t)1 << (STATE_XAUTH_I1)) - ((lset_t)1 << (STATE_XAUTH_R0)) + ((lset_t)1 << (STATE_XAUTH_I1))))) != ((lset_t)0))) { |
1384 | if (!quiet) { |
1385 | log_state(RC_LOG_SERIOUS, st, |
1386 | "encrypted Informational Exchange message is invalid because no key is known"); |
1387 | } |
1388 | /* XXX Could send notification back */ |
1389 | return; |
1390 | } |
1391 | |
1392 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { |
1393 | if (!quiet) { |
1394 | log_state(RC_LOG_SERIOUS, st, |
1395 | "Informational Exchange message is invalid because it has a Message ID of 0"); |
1396 | } |
1397 | /* XXX Could send notification back */ |
1398 | return; |
1399 | } |
1400 | |
1401 | if (!unique_msgid(st, md->hdr.isa_msgid)) { |
1402 | if (!quiet) { |
1403 | log_state(RC_LOG_SERIOUS, st, |
1404 | "Informational Exchange message is invalid because it has a previously used Message ID (0x%08" PRIx32"x" " )", |
1405 | md->hdr.isa_msgid); |
1406 | } |
1407 | /* XXX Could send notification back */ |
1408 | return; |
1409 | } |
1410 | st->st_v1_msgid.reserved = false0; |
1411 | |
1412 | init_phase2_iv(st, &md->hdr.isa_msgid); |
1413 | new_iv_set = true1; |
1414 | |
1415 | from_state = STATE_INFO_PROTECTED; |
1416 | } else { |
1417 | if (st != NULL((void*)0) && |
1418 | IS_V1_ISAKMP_AUTHENTICATED(st->st_state)(STATE_MAIN_R3 <= ((st->st_state)->kind) && STATE_AGGR_R0 != ((st->st_state)->kind) && STATE_AGGR_I1 != ( (st->st_state)->kind))) { |
1419 | log_state(RC_LOG_SERIOUS, st, |
1420 | "Informational Exchange message must be encrypted"); |
1421 | /* XXX Could send notification back */ |
1422 | return; |
1423 | } |
1424 | from_state = STATE_INFO; |
1425 | } |
1426 | break; |
1427 | |
1428 | case ISAKMP_XCHG_QUICK: /* part of a Quick Mode exchange */ |
1429 | |
1430 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { |
1431 | dbg("Quick Mode message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has an Initiator Cookie of 0" ); } }; |
1432 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; |
1433 | return; |
1434 | } |
1435 | |
1436 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { |
1437 | dbg("Quick Mode message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Responder Cookie of 0" ); } }; |
1438 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; |
1439 | return; |
1440 | } |
1441 | |
1442 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { |
1443 | dbg("Quick Mode message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Message ID of 0" ); } }; |
1444 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; |
1445 | return; |
1446 | } |
1447 | |
1448 | st = find_state_ikev1(&md->hdr.isa_ike_spis, |
1449 | md->hdr.isa_msgid); |
1450 | |
1451 | if (st == NULL((void*)0)) { |
1452 | /* No appropriate Quick Mode state. |
1453 | * See if we have a Main Mode state. |
1454 | * ??? what if this is a duplicate of another message? |
1455 | */ |
1456 | st = find_state_ikev1(&md->hdr.isa_ike_spis, |
1457 | v1_MAINMODE_MSGID((msgid_t) 0)); |
1458 | |
1459 | if (st == NULL((void*)0)) { |
1460 | dbg("Quick Mode message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is for a non-existent (expired?) ISAKMP SA" ); } }; |
1461 | /* XXX Could send notification back */ |
1462 | return; |
1463 | } |
1464 | |
1465 | if (st->st_oakley.doing_xauth) { |
1466 | dbg("Cannot do Quick Mode until XAUTH done."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Cannot do Quick Mode until XAUTH done."); } }; |
1467 | return; |
1468 | } |
1469 | |
1470 | /* Have we just given an IP address to peer? */ |
1471 | if (st->st_state->kind == STATE_MODE_CFG_R2) { |
1472 | /* ISAKMP is up... */ |
1473 | change_state(st, STATE_MAIN_R3); |
1474 | } |
1475 | |
1476 | #ifdef SOFTREMOTE_CLIENT_WORKAROUND |
1477 | /* See: http://popoludnica.pl/?id=10100110 */ |
1478 | if (st->st_state->kind == STATE_MODE_CFG_R1) { |
1479 | log_state(RC_LOG, st, |
1480 | "SoftRemote workaround: Cannot do Quick Mode until MODECFG done."); |
1481 | return; |
1482 | } |
1483 | #endif |
1484 | |
1485 | |
1486 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
1487 | log_state(RC_LOG_SERIOUS, st, |
1488 | "Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA"); |
1489 | SEND_NOTIFICATION(PAYLOAD_MALFORMED /* XXX ? */){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
1490 | return; |
1491 | } |
1492 | |
1493 | if (!unique_msgid(st, md->hdr.isa_msgid)) { |
1494 | log_state(RC_LOG_SERIOUS, st, |
1495 | "Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x%08" PRIx32"x" " (perhaps this is a duplicated packet)", |
1496 | md->hdr.isa_msgid); |
1497 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; |
1498 | return; |
1499 | } |
1500 | st->st_v1_msgid.reserved = false0; |
1501 | |
1502 | /* Quick Mode Initial IV */ |
1503 | init_phase2_iv(st, &md->hdr.isa_msgid); |
1504 | new_iv_set = true1; |
1505 | |
1506 | from_state = STATE_QUICK_R0; |
1507 | } else { |
1508 | if (st->st_oakley.doing_xauth) { |
1509 | log_state(RC_LOG, st, "Cannot do Quick Mode until XAUTH done."); |
1510 | return; |
1511 | } |
1512 | from_state = st->st_state->kind; |
1513 | } |
1514 | |
1515 | break; |
1516 | |
1517 | case ISAKMP_XCHG_MODE_CFG: |
1518 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { |
1519 | dbg("Mode Config message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has an Initiator Cookie of 0" ); } }; |
1520 | /* XXX Could send notification back */ |
1521 | return; |
1522 | } |
1523 | |
1524 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { |
1525 | dbg("Mode Config message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Responder Cookie of 0" ); } }; |
1526 | /* XXX Could send notification back */ |
1527 | return; |
1528 | } |
1529 | |
1530 | if (md->hdr.isa_msgid == 0) { |
1531 | dbg("Mode Config message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Message ID of 0" ); } }; |
1532 | /* XXX Could send notification back */ |
1533 | return; |
1534 | } |
1535 | |
1536 | st = find_v1_info_state(&md->hdr.isa_ike_spis, md->hdr.isa_msgid); |
1537 | |
1538 | if (st == NULL((void*)0)) { |
1539 | /* No appropriate Mode Config state. |
1540 | * See if we have a Main Mode state. |
1541 | * ??? what if this is a duplicate of another message? |
1542 | */ |
1543 | dbg("No appropriate Mode Config state yet. See if we have a Main Mode state"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("No appropriate Mode Config state yet. See if we have a Main Mode state" ); } }; |
1544 | |
1545 | st = find_v1_info_state(&md->hdr.isa_ike_spis, 0); |
1546 | |
1547 | if (st == NULL((void*)0)) { |
1548 | dbg("Mode Config message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is for a non-existent (expired?) ISAKMP SA" ); } }; |
1549 | /* XXX Could send notification back */ |
1550 | /* ??? ought to log something (not just DBG)? */ |
1551 | return; |
1552 | } |
1553 | |
1554 | |
1555 | const struct end *this = &st->st_connection->spd.this; |
1556 | esb_buf b; |
1557 | dbg(" processing received isakmp_xchg_type %s; this is a%s%s%s%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } |
1558 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } |
1559 | this->xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } |
1560 | this->xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } |
1561 | this->modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } |
1562 | this->modecfg_client ? " modecfgclient" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } }; |
1563 | |
1564 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
1565 | dbg("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } } |
1566 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } }; |
1567 | /* XXX Could send notification back */ |
1568 | return; |
1569 | } |
1570 | dbg(" call init_phase2_iv"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" call init_phase2_iv"); } }; |
1571 | init_phase2_iv(st, &md->hdr.isa_msgid); |
1572 | new_iv_set = true1; |
1573 | |
1574 | /* |
1575 | * okay, now we have to figure out if we are receiving a bogus |
1576 | * new message in an outstanding XAUTH server conversation |
1577 | * (i.e. a reply to our challenge) |
1578 | * (this occurs with some broken other implementations). |
1579 | * |
1580 | * or if receiving for the first time, an XAUTH challenge. |
1581 | * |
1582 | * or if we are getting a MODECFG request. |
1583 | * |
1584 | * we distinguish these states because we cannot both be an |
1585 | * XAUTH server and client, and our policy tells us which |
1586 | * one we are. |
1587 | * |
1588 | * to complicate further, it is normal to start a new msgid |
1589 | * when going from one state to another, or when restarting |
1590 | * the challenge. |
1591 | * |
1592 | */ |
1593 | |
1594 | if (this->xauth_server && |
1595 | st->st_state->kind == STATE_XAUTH_R1 && |
1596 | st->quirks.xauth_ack_msgid) { |
1597 | from_state = STATE_XAUTH_R1; |
1598 | dbg(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } } |
1599 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } }; |
1600 | } else if (this->xauth_client && |
1601 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { |
1602 | from_state = STATE_XAUTH_I0; |
1603 | dbg(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } } |
1604 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; |
1605 | } else if (this->xauth_client && |
1606 | st->st_state->kind == STATE_XAUTH_I1) { |
1607 | /* |
1608 | * in this case, we got a new MODECFG message after I0, maybe |
1609 | * because it wants to start over again. |
1610 | */ |
1611 | from_state = STATE_XAUTH_I0; |
1612 | dbg(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } } |
1613 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } }; |
1614 | } else if (this->modecfg_server && |
1615 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { |
1616 | from_state = STATE_MODE_CFG_R0; |
1617 | dbg(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } } |
1618 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } }; |
1619 | } else if (this->modecfg_client && |
1620 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { |
1621 | from_state = STATE_MODE_CFG_R1; |
1622 | dbg(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } } |
1623 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; |
1624 | } else { |
1625 | esb_buf b; |
1626 | dbg("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1627 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1628 | st->st_connection ->spd.this.xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1629 | st->st_connection->spd.this.xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1630 | st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1631 | st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } |
1632 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } }; |
1633 | return; |
1634 | } |
1635 | } else { |
1636 | if (st->st_connection->spd.this.xauth_server && |
1637 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { |
1638 | /* Switch from Phase1 to Mode Config */ |
1639 | dbg("We were in phase 1, with no state, so we went to XAUTH_R0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We were in phase 1, with no state, so we went to XAUTH_R0" ); } }; |
1640 | change_state(st, STATE_XAUTH_R0); |
1641 | } |
1642 | |
1643 | /* otherwise, this is fine, we continue in the state we are in */ |
1644 | from_state = st->st_state->kind; |
1645 | } |
1646 | |
1647 | break; |
1648 | |
1649 | case ISAKMP_XCHG_NONE: |
1650 | case ISAKMP_XCHG_BASE: |
1651 | case ISAKMP_XCHG_AO: |
1652 | case ISAKMP_XCHG_NGRP: |
1653 | default: |
1654 | { |
1655 | esb_buf b; |
1656 | dbg("unsupported exchange type %s in message",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } } |
1657 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } }; |
1658 | SEND_NOTIFICATION(UNSUPPORTED_EXCHANGE_TYPE){ { const unsigned __pstat = (UNSUPPORTED_EXCHANGE_TYPE); if ( __pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(* (pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, UNSUPPORTED_EXCHANGE_TYPE); else send_notification_from_md (md, UNSUPPORTED_EXCHANGE_TYPE); }; |
1659 | return; |
1660 | } |
1661 | } |
1662 | |
1663 | /* We have found a from_state, and perhaps a state object. |
1664 | * If we need to build a new state object, |
1665 | * we wait until the packet has been sanity checked. |
1666 | */ |
1667 | |
1668 | /* We don't support the Commit Flag. It is such a bad feature. |
1669 | * It isn't protected -- neither encrypted nor authenticated. |
1670 | * A man in the middle turns it on, leading to DoS. |
1671 | * We just ignore it, with a warning. |
1672 | */ |
1673 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_COMMIT(1<<ISAKMP_FLAGS_v1_COMMIT_IX)) |
1674 | dbg("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag" ); } }; |
1675 | |
1676 | /* Handle IKE fragmentation payloads */ |
1677 | if (md->hdr.isa_np == ISAKMP_NEXT_IKE_FRAGMENTATION) { |
1678 | struct isakmp_ikefrag fraghdr; |
1679 | int last_frag_index = 0; /* index of the last fragment */ |
1680 | pb_stream frag_pbs; |
1681 | |
1682 | if (st == NULL((void*)0)) { |
1683 | dbg("received IKE fragment, but have no state. Ignoring packet."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment, but have no state. Ignoring packet." ); } }; |
1684 | return; |
1685 | } |
1686 | |
1687 | if ((st->st_connection->policy & POLICY_IKE_FRAG_ALLOW((lset_t)1 << (POLICY_IKE_FRAG_ALLOW_IX))) == 0) { |
1688 | dbg("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)" ); } }; |
1689 | return; |
1690 | } |
1691 | |
1692 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ikefrag_desc, |
1693 | &fraghdr, sizeof(fraghdr), &frag_pbs); |
1694 | if (d != NULL((void*)0)) { |
1695 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); |
1696 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
1697 | return; |
1698 | } |
1699 | if (pbs_room(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->start )) != fraghdr.isafrag_length || |
1700 | fraghdr.isafrag_np != ISAKMP_NEXT_NONE || |
1701 | fraghdr.isafrag_number == 0 || |
1702 | fraghdr.isafrag_number > 16) { |
1703 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
1704 | return; |
1705 | } |
1706 | |
1707 | dbg("received IKE fragment id '%d', number '%u'%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } |
1708 | fraghdr.isafrag_id,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } |
1709 | fraghdr.isafrag_number,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } |
1710 | (fraghdr.isafrag_flags == 1) ? "(last)" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } }; |
1711 | |
1712 | struct v1_ike_rfrag *ike_frag = alloc_thing(struct v1_ike_rfrag, "ike_frag")((struct v1_ike_rfrag*) alloc_bytes(sizeof(struct v1_ike_rfrag ), ("ike_frag"))); |
1713 | ike_frag->md = md_addref(md, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1713, }; &here; })); |
1714 | ike_frag->index = fraghdr.isafrag_number; |
1715 | ike_frag->last = (fraghdr.isafrag_flags & 1); |
1716 | ike_frag->size = pbs_left(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->cur) ); |
1717 | ike_frag->data = frag_pbs.cur; |
1718 | |
1719 | /* Add the fragment to the state */ |
1720 | struct v1_ike_rfrag **i = &st->st_v1_rfrags; |
1721 | for (;;) { |
1722 | if (ike_frag != NULL((void*)0)) { |
1723 | /* Still looking for a place to insert ike_frag */ |
1724 | if (*i == NULL((void*)0) || |
1725 | (*i)->index > ike_frag->index) { |
1726 | ike_frag->next = *i; |
1727 | *i = ike_frag; |
1728 | ike_frag = NULL((void*)0); |
1729 | } else if ((*i)->index == ike_frag->index) { |
1730 | /* Replace fragment with same index */ |
1731 | struct v1_ike_rfrag *old = *i; |
1732 | |
1733 | ike_frag->next = old->next; |
1734 | *i = ike_frag; |
1735 | pexpect(old->md != NULL)({ _Bool assertion__ = old->md != ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1735, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "old->md != ((void*)0)" ); } assertion__; }); |
1736 | release_any_md(&old->md)md_delref(&old->md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1736, }; &here; })); |
1737 | pfree(old); |
1738 | ike_frag = NULL((void*)0); |
1739 | } |
1740 | } |
1741 | |
1742 | if (*i == NULL((void*)0)) |
1743 | break; |
1744 | |
1745 | if ((*i)->last) |
1746 | last_frag_index = (*i)->index; |
1747 | |
1748 | i = &(*i)->next; |
1749 | } |
1750 | |
1751 | /* We have the last fragment, reassemble if complete */ |
1752 | if (last_frag_index != 0) { |
1753 | size_t size = 0; |
1754 | int prev_index = 0; |
1755 | |
1756 | for (struct v1_ike_rfrag *frag = st->st_v1_rfrags; frag; frag = frag->next) { |
1757 | size += frag->size; |
1758 | if (frag->index != ++prev_index) { |
1759 | break; /* fragment list incomplete */ |
1760 | } else if (frag->index == last_frag_index) { |
1761 | struct msg_digest *whole_md = alloc_md(frag->md->iface, |
1762 | &frag->md->sender, |
1763 | HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1763, }; &here; })); |
1764 | uint8_t *buffer = alloc_bytes(size, |
1765 | "IKE fragments buffer"); |
1766 | size_t offset = 0; |
1767 | |
1768 | /* Reassemble fragments in buffer */ |
1769 | frag = st->st_v1_rfrags; |
1770 | while (frag != NULL((void*)0) && |
1771 | frag->index <= last_frag_index) |
1772 | { |
1773 | passert(offset + frag->size <=({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }) |
1774 | size)({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }); |
1775 | memcpy(buffer + offset, |
1776 | frag->data, frag->size); |
1777 | offset += frag->size; |
1778 | frag = frag->next; |
1779 | } |
1780 | |
1781 | init_pbs(&whole_md->packet_pbs, buffer, size, |
1782 | "packet"); |
1783 | |
1784 | process_packet(&whole_md); |
1785 | release_any_md(&whole_md)md_delref(&whole_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1785 , }; &here; })); |
1786 | free_v1_message_queues(st); |
1787 | /* optimize: if receiving fragments, immediately respond with fragments too */ |
1788 | st->st_v1_seen_fragments = true1; |
1789 | dbg(" updated IKE fragment state to respond using fragments without waiting for re-transmits"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" updated IKE fragment state to respond using fragments without waiting for re-transmits" ); } }; |
1790 | break; |
1791 | } |
1792 | } |
1793 | } |
1794 | |
1795 | return; |
1796 | } |
1797 | |
1798 | /* |
1799 | * Set smc to describe this state's properties. |
1800 | * |
1801 | * Look up the appropriate microcode based on state and |
1802 | * possibly Oakley Auth type. |
1803 | */ |
1804 | passert(STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1804, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF" ); } (void) 1; }); |
1805 | const struct finite_state *fs = finite_states[from_state]; |
1806 | passert(fs != NULL)({ _Bool assertion__ = fs != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1806, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "fs != ((void*)0)"); } (void) 1; }); |
1807 | const struct state_v1_microcode *smc = fs->v1_transitions; |
1808 | passert(smc != NULL)({ _Bool assertion__ = smc != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1808, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc != ((void*)0)"); } ( void) 1; }); |
1809 | |
1810 | /* |
1811 | * Find the state's the state transitions that has matching |
1812 | * authentication. |
1813 | * |
1814 | * For states where this makes no sense (eg, quick states |
1815 | * creating a CHILD_SA), .flags|=SMF_ALL_AUTH so the first |
1816 | * (only) one always matches. |
1817 | * |
1818 | * XXX: The code assumes that when there is always a match (if |
1819 | * there isn't the passert() triggers. If needed, bogus |
1820 | * transitions that log/drop the packet are added to the |
1821 | * table? Would simply dropping the packets be easier. |
1822 | */ |
1823 | if (st != NULL((void*)0)) { |
1824 | oakley_auth_t baseauth = |
1825 | xauth_calcbaseauth(st->st_oakley.auth); |
1826 | |
1827 | while (!LHAS(smc->flags, baseauth)(((smc->flags) & ((lset_t)1 << (baseauth))) != ( (lset_t)0))) { |
1828 | smc++; |
1829 | passert(smc->state == from_state)({ _Bool assertion__ = smc->state == from_state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1829, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc->state == from_state" ); } (void) 1; }); |
1830 | } |
1831 | } |
1832 | |
1833 | /* |
1834 | * XXX: do this earlier? */ |
1835 | if (verbose_state_busy(st)) |
1836 | return; |
1837 | |
1838 | /* |
1839 | * Detect and handle duplicated packets. This won't work for |
1840 | * the initial packet of an exchange because we won't have a |
1841 | * state object to remember it. If we are in a non-receiving |
1842 | * state (terminal), and the preceding state did transmit, |
1843 | * then the duplicate may indicate that that transmission |
1844 | * wasn't received -- retransmit it. Otherwise, just discard |
1845 | * it. ??? Notification packets are like exchanges -- I hope |
1846 | * that they are idempotent! |
1847 | * |
1848 | * XXX: do this earlier? |
1849 | */ |
1850 | if (st != NULL((void*)0) && ikev1_duplicate(st, md)) { |
1851 | return; |
1852 | } |
1853 | |
1854 | /* save values for use in resumption of processing below. |
1855 | * (may be suspended due to crypto operation not yet complete) |
1856 | */ |
1857 | md->v1_st = st; |
1858 | md->smc = smc; |
1859 | md->new_iv_set = new_iv_set; |
1860 | |
1861 | /* |
1862 | * look for encrypt packets. We cannot handle them if we have not |
1863 | * yet calculated the skeyids. We will just store the packet in |
1864 | * the suspended state, since the calculation is likely underway. |
1865 | * |
1866 | * note that this differs from above, because skeyid is calculated |
1867 | * in between states. (or will be, once DH is async) |
1868 | * |
1869 | */ |
1870 | if ((md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) && |
1871 | st != NULL((void*)0) && |
1872 | !st->hidden_variables.st_skeyid_calculated) { |
1873 | endpoint_buf b; |
1874 | dbg("received encrypted packet from %s but exponentiation still in progress",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } } |
1875 | str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } }; |
1876 | |
1877 | /* |
1878 | * if there was a previous packet, let it go, and go |
1879 | * with most recent one. |
1880 | */ |
1881 | if (st->st_suspended_md != NULL((void*)0)) { |
1882 | dbg("releasing suspended operation before completion: %p",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } } |
1883 | st->st_suspended_md){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } }; |
1884 | release_any_md(&st->st_suspended_md)md_delref(&st->st_suspended_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 1884, }; &here; })); |
1885 | } |
1886 | suspend_any_md(st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (st)->st_serialno, md); } }; ({ _Bool assertion__ = (st) ->st_suspended_md == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1886, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "(st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (st)->st_suspended_md = md_addref(md, ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, }; &here; })); ( st)->st_suspended_md_func = __func__; (st)->st_suspended_md_line = 1886; ({ _Bool assertion__ = state_is_busy(st); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "state_is_busy(st)"); } ( void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; |
1887 | return; |
1888 | } |
1889 | |
1890 | process_packet_tail(md); |
1891 | /* our caller will release_any_md(mdp); */ |
1892 | } |
1893 | |
1894 | /* |
1895 | * This routine will not release_any_md(mdp). It is expected that its |
1896 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks |
1897 | * **mdp should not be freed. So the caller should be prepared for |
1898 | * *mdp being set to NULL. |
1899 | */ |
1900 | void process_packet_tail(struct msg_digest *md) |
1901 | { |
1902 | struct state *st = md->v1_st; |
1903 | const struct state_v1_microcode *smc = md->smc; |
1904 | enum state_kind from_state = smc->state; |
1905 | bool_Bool new_iv_set = md->new_iv_set; |
1906 | bool_Bool self_delete = false0; |
1907 | |
1908 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { |
1909 | |
1910 | endpoint_buf b; |
1911 | dbg("received encrypted packet from %s", str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s", str_endpoint (&md->sender, &b)); } }; |
1912 | |
1913 | if (st == NULL((void*)0)) { |
1914 | LOG_PACKET(RC_LOG,{ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } } |
1915 | "discarding encrypted message for an unknown ISAKMP SA"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } }; |
1916 | return; |
1917 | } |
1918 | if (st->st_skeyid_e_nssst_skey_ei_nss == NULL((void*)0)) { |
1919 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } } |
1920 | "discarding encrypted message because we haven't yet negotiated keying material"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } }; |
1921 | return; |
1922 | } |
1923 | |
1924 | /* Mark as encrypted */ |
1925 | md->encrypted = true1; |
1926 | |
1927 | /* do the specified decryption |
1928 | * |
1929 | * IV is from st->st_iv or (if new_iv_set) st->st_new_iv. |
1930 | * The new IV is placed in st->st_new_iv |
1931 | * |
1932 | * See RFC 2409 "IKE" Appendix B |
1933 | * |
1934 | * XXX The IV should only be updated really if the packet |
1935 | * is successfully processed. |
1936 | * We should keep this value, check for a success return |
1937 | * value from the parsing routines and then replace. |
1938 | * |
1939 | * Each post phase 1 exchange generates IVs from |
1940 | * the last phase 1 block, not the last block sent. |
1941 | */ |
1942 | const struct encrypt_desc *e = st->st_oakley.ta_encrypt; |
1943 | |
1944 | if (pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) % e->enc_blocksize != 0) { |
1945 | LOG_PACKET(RC_LOG_SERIOUS, "malformed message: not a multiple of encryption blocksize"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed message: not a multiple of encryption blocksize" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed message: not a multiple of encryption blocksize" ); } }; |
1946 | return; |
1947 | } |
1948 | |
1949 | /* XXX Detect weak keys */ |
1950 | |
1951 | /* grab a copy of raw packet (for duplicate packet detection) */ |
1952 | md->raw_packet = clone_bytes_as_chunk(md->packet_pbs.start, |
1953 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), |
1954 | "raw packet"); |
1955 | |
1956 | /* Decrypt everything after header */ |
1957 | if (!new_iv_set) { |
1958 | if (st->st_v1_iv.len == 0) { |
1959 | init_phase2_iv(st, &md->hdr.isa_msgid); |
1960 | } else { |
1961 | /* use old IV */ |
1962 | restore_new_iv(st, st->st_v1_iv){ (st)->st_v1_new_iv = (st->st_v1_iv); }; |
1963 | } |
1964 | } |
1965 | |
1966 | passert(st->st_v1_new_iv.len >= e->enc_blocksize)({ _Bool assertion__ = st->st_v1_new_iv.len >= e->enc_blocksize ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1966, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_v1_new_iv.len >= e->enc_blocksize" ); } (void) 1; }); |
1967 | st->st_v1_new_iv.len = e->enc_blocksize; /* truncate */ |
1968 | |
1969 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { |
1970 | DBG_log("decrypting %u bytes using algorithm %s", |
1971 | (unsigned) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), |
1972 | st->st_oakley.ta_encrypt->common.fqn); |
1973 | DBG_dump_hunk("IV before:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV before:", hunk_.ptr, hunk_.len); }; |
1974 | } |
1975 | e->encrypt_ops->do_crypt(e, md->message_pbs.cur, |
1976 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), |
1977 | st->st_enc_key_nss, |
1978 | st->st_v1_new_iv.ptr, false0, |
1979 | st->st_logger); |
1980 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { |
1981 | DBG_dump_hunk("IV after:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV after:", hunk_.ptr, hunk_.len); }; |
1982 | DBG_log("decrypted payload (starts at offset %td):", |
1983 | md->message_pbs.cur - md->message_pbs.roof); |
1984 | DBG_dump(NULL((void*)0), md->message_pbs.start, |
1985 | md->message_pbs.roof - md->message_pbs.start); |
1986 | } |
1987 | } else { |
1988 | /* packet was not encryped -- should it have been? */ |
1989 | |
1990 | if (smc->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) { |
1991 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } } |
1992 | "packet rejected: should have been encrypted"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } }; |
1993 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; |
1994 | return; |
1995 | } |
1996 | } |
1997 | |
1998 | /* Digest the message. |
1999 | * Padding must be removed to make hashing work. |
2000 | * Padding comes from encryption (so this code must be after decryption). |
2001 | * Padding rules are described before the definition of |
2002 | * struct isakmp_hdr in packet.h. |
2003 | */ |
2004 | { |
2005 | enum next_payload_types_ikev1 np = md->hdr.isa_np; |
2006 | lset_t needed = smc->req_payloads; |
2007 | const char *excuse = |
2008 | LIN(SMF_PSK_AUTH | SMF_FIRST_ENCRYPTED_INPUT,(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) |
2009 | smc->flags)(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) ? |
2010 | "probable authentication failure (mismatch of preshared secrets?): " |
2011 | : |
2012 | ""; |
2013 | |
2014 | while (np != ISAKMP_NEXT_NONE) { |
2015 | struct_desc *sd = v1_payload_desc(np); |
2016 | |
2017 | if (md->digest_roof >= elemsof(md->digest)(sizeof(md->digest) / sizeof(*(md->digest)))) { |
2018 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } |
2019 | "more than %zu payloads in message; ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } |
2020 | elemsof(md->digest)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } }; |
2021 | if (!md->encrypted) { |
2022 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2023 | } |
2024 | return; |
2025 | } |
2026 | struct payload_digest *const pd = md->digest + md->digest_roof; |
2027 | |
2028 | /* |
2029 | * only do this in main mode. In aggressive mode, there |
2030 | * is no negotiation of NAT-T method. Get it right. |
2031 | */ |
2032 | if (st != NULL((void*)0) && st->st_connection != NULL((void*)0) && |
2033 | (st->st_connection->policy & POLICY_AGGRESSIVE((lset_t)1 << (POLICY_AGGRESSIVE_IX))) == LEMPTY((lset_t)0)) |
2034 | { |
2035 | switch (np) { |
2036 | case ISAKMP_NEXT_NATD_RFC: |
2037 | case ISAKMP_NEXT_NATOA_RFC: |
2038 | if ((st->hidden_variables.st_nat_traversal & NAT_T_WITH_RFC_VALUES((lset_t)1 << (NAT_TRAVERSAL_METHOD_IETF_RFC))) == LEMPTY((lset_t)0)) { |
2039 | /* |
2040 | * don't accept NAT-D/NAT-OA reloc directly in message, |
2041 | * unless we're using NAT-T RFC |
2042 | */ |
2043 | lset_buf lb; |
2044 | dbg("st_nat_traversal was: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } |
2045 | str_lset(&natt_method_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } |
2046 | st->hidden_variables.st_nat_traversal,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } |
2047 | &lb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } }; |
2048 | sd = NULL((void*)0); |
2049 | } |
2050 | break; |
2051 | default: |
2052 | break; |
2053 | } |
2054 | } |
2055 | |
2056 | if (sd == NULL((void*)0)) { |
2057 | /* payload type is out of range or requires special handling */ |
2058 | switch (np) { |
2059 | case ISAKMP_NEXT_ID: |
2060 | /* ??? two kinds of ID payloads */ |
2061 | sd = (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || |
2062 | IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) ? |
2063 | &isakmp_identification_desc : |
2064 | &isakmp_ipsec_identification_desc; |
2065 | break; |
2066 | |
2067 | case ISAKMP_NEXT_NATD_DRAFTS: /* out of range */ |
2068 | /* |
2069 | * ISAKMP_NEXT_NATD_DRAFTS was a private use type before RFC-3947. |
2070 | * Since it has the same format as ISAKMP_NEXT_NATD_RFC, |
2071 | * just rewrite np and sd, and carry on. |
2072 | */ |
2073 | np = ISAKMP_NEXT_NATD_RFC; |
2074 | sd = &isakmp_nat_d_drafts; |
2075 | break; |
2076 | |
2077 | case ISAKMP_NEXT_NATOA_DRAFTS: /* out of range */ |
2078 | /* NAT-OA was a private use type before RFC-3947 -- same format */ |
2079 | np = ISAKMP_NEXT_NATOA_RFC; |
2080 | sd = &isakmp_nat_oa_drafts; |
2081 | break; |
2082 | |
2083 | case ISAKMP_NEXT_SAK: /* or ISAKMP_NEXT_NATD_BADDRAFTS */ |
2084 | /* |
2085 | * Official standards say that this is ISAKMP_NEXT_SAK, |
2086 | * a part of Group DOI, something we don't implement. |
2087 | * Old non-updated Cisco gear abused this number in ancient NAT drafts. |
2088 | * We ignore (rather than reject) this in support of people |
2089 | * with crufty Cisco machines. |
2090 | */ |
2091 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } |
2092 | "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } |
2093 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } }; |
2094 | /* |
2095 | * Hack to discard payload, whatever it was. |
2096 | * Since we are skipping the rest of the loop |
2097 | * body we must do some things ourself: |
2098 | * - demarshall the payload |
2099 | * - grab the next payload number (np) |
2100 | * - don't keep payload (don't increment pd) |
2101 | * - skip rest of loop body |
2102 | */ |
2103 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ignore_desc, |
2104 | &pd->payload, sizeof(pd->payload), &pd->pbs); |
2105 | if (d != NULL((void*)0)) { |
2106 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); |
2107 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } |
2108 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } |
2109 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; |
2110 | if (!md->encrypted) { |
2111 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2112 | } |
2113 | return; |
2114 | } |
2115 | np = pd->payload.generic.isag_np; |
2116 | /* NOTE: we do not increment pd! */ |
2117 | continue; /* skip rest of the loop */ |
2118 | |
2119 | default: |
2120 | { |
2121 | esb_buf b; |
2122 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } |
2123 | "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } |
2124 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } |
2125 | enum_show(&ikev1_payload_names, np, &b)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } }; |
2126 | if (!md->encrypted) { |
2127 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; |
2128 | } |
2129 | return; |
2130 | } |
2131 | } |
2132 | passert(sd != NULL)({ _Bool assertion__ = sd != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2132, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "sd != ((void*)0)"); } (void) 1; }); |
2133 | } |
2134 | |
2135 | passert(np < LELEM_ROOF)({ _Bool assertion__ = np < 64; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2135, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "np < 64"); } (void) 1; }); |
2136 | |
2137 | { |
2138 | lset_t s = LELEM(np)((lset_t)1 << (np)); |
2139 | |
2140 | if (LDISJOINT(s,(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2141 | needed | smc->opt_payloads |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2142 | LELEM(ISAKMP_NEXT_VID) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2143 | LELEM(ISAKMP_NEXT_N) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2144 | LELEM(ISAKMP_NEXT_D) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2145 | LELEM(ISAKMP_NEXT_CR) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) |
2146 | LELEM(ISAKMP_NEXT_CERT))(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) )) { |
2147 | esb_buf b; |
2148 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } |
2149 | "%smessage ignored because it contains a payload type (%s) unexpected by state %s",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } |
2150 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } |
2151 | enum_show(&ikev1_payload_names, np, &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } |
2152 | finite_states[smc->state]->name){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } }; |
2153 | if (!md->encrypted) { |
2154 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; |
2155 | } |
2156 | return; |
2157 | } |
2158 | |
2159 | esb_buf b; |
2160 | dbg("got payload 0x%" PRIxLSET" (%s) needed: 0x%" PRIxLSET " opt: 0x%" PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } |
2161 | s, enum_show(&ikev1_payload_names, np, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } |
2162 | needed, smc->opt_payloads){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } }; |
2163 | needed &= ~s; |
2164 | } |
2165 | |
2166 | /* |
2167 | * Read in the payload recording what type it |
2168 | * should be |
2169 | */ |
2170 | pd->payload_type = np; |
2171 | diag_t d = pbs_in_struct(&md->message_pbs, sd, |
2172 | &pd->payload, sizeof(pd->payload), |
2173 | &pd->pbs); |
2174 | if (d != NULL((void*)0)) { |
2175 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); |
2176 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } |
2177 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } |
2178 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; |
2179 | if (!md->encrypted) { |
2180 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2181 | } |
2182 | return; |
2183 | } |
2184 | |
2185 | /* do payload-type specific debugging */ |
2186 | switch (np) { |
2187 | case ISAKMP_NEXT_ID: |
2188 | case ISAKMP_NEXT_NATOA_RFC: |
2189 | /* dump ID section */ |
2190 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
2191 | DBG_dump(" obj: ", pd->pbs.cur, |
2192 | pbs_left(&pd->pbs)((size_t)((&pd->pbs)->roof - (&pd->pbs)-> cur))); |
2193 | } |
2194 | break; |
2195 | default: |
2196 | break; |
2197 | } |
2198 | |
2199 | |
2200 | /* |
2201 | * Place payload at the end of the chain for this type. |
2202 | * This code appears in ikev1.c and ikev2.c. |
2203 | */ |
2204 | { |
2205 | /* np is a proper subscript for chain[] */ |
2206 | passert(np < elemsof(md->chain))({ _Bool assertion__ = np < (sizeof(md->chain) / sizeof (*(md->chain))); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 2206, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "np < (sizeof(md->chain) / sizeof(*(md->chain)))" ); } (void) 1; }); |
2207 | struct payload_digest **p = &md->chain[np]; |
2208 | |
2209 | while (*p != NULL((void*)0)) |
2210 | p = &(*p)->next; |
2211 | *p = pd; |
2212 | pd->next = NULL((void*)0); |
2213 | } |
2214 | |
2215 | np = pd->payload.generic.isag_np; |
2216 | md->digest_roof++; |
2217 | |
2218 | /* since we've digested one payload happily, it is probably |
2219 | * the case that any decryption worked. So we will not suggest |
2220 | * encryption failure as an excuse for subsequent payload |
2221 | * problems. |
2222 | */ |
2223 | excuse = ""; |
2224 | } |
2225 | |
2226 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX)))) && |
2227 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) != 0) { |
2228 | DBG_log("removing %d bytes of padding", |
2229 | (int) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur))); |
2230 | } |
2231 | |
2232 | md->message_pbs.roof = md->message_pbs.cur; |
2233 | |
2234 | /* check that all mandatory payloads appeared */ |
2235 | |
2236 | if (needed != 0) { |
2237 | LOG_PACKET_JAMBUF(RC_LOG_SERIOUS, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((RC_LOG_SERIOUS ) & NO_PREFIX) == ((lset_t)0) && (((RC_LOG_SERIOUS ) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & ( ((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void *)0) ? st->st_logger : md->md_logger))->object_vec-> jam_object_prefix(buf, ((st != ((void*)0) ? st->st_logger : md->md_logger))->object); } }); buf != ((void*)0); jambuf_to_logger (buf, ((st != ((void*)0) ? st->st_logger : md->md_logger )), RC_LOG_SERIOUS), buf = ((void*)0)) { |
2238 | jam(buf, "message for %s is missing payloads ", |
2239 | finite_states[from_state]->name); |
2240 | jam_lset_short(buf, &ikev1_payload_names, "+", needed); |
2241 | } |
2242 | if (!md->encrypted) { |
2243 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2244 | } |
2245 | return; |
2246 | } |
2247 | } |
2248 | |
2249 | if (!check_v1_HASH(smc->hash_type, smc->message, st, md)) { |
2250 | /*SEND_NOTIFICATION(INVALID_HASH_INFORMATION);*/ |
2251 | return; |
2252 | } |
2253 | |
2254 | /* more sanity checking: enforce most ordering constraints */ |
2255 | |
2256 | if (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) { |
2257 | /* rfc2409: The Internet Key Exchange (IKE), 5 Exchanges: |
2258 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." |
2259 | */ |
2260 | if (md->chain[ISAKMP_NEXT_SA] != NULL((void*)0) && |
2261 | md->hdr.isa_np != ISAKMP_NEXT_SA) { |
2262 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } } |
2263 | "malformed Phase 1 message: does not start with an SA payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } }; |
2264 | if (!md->encrypted) { |
2265 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2266 | } |
2267 | return; |
2268 | } |
2269 | } else if (IS_V1_QUICK(from_state)(STATE_QUICK_R0 <= (from_state) && (from_state) <= STATE_QUICK_R2)) { |
2270 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode |
2271 | * |
2272 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP |
2273 | * header and a SA payload MUST immediately follow the HASH." |
2274 | * [NOTE: there may be more than one SA payload, so this is not |
2275 | * totally reasonable. Probably all SAs should be so constrained.] |
2276 | * |
2277 | * "If ISAKMP is acting as a client negotiator on behalf of another |
2278 | * party, the identities of the parties MUST be passed as IDci and |
2279 | * then IDcr." |
2280 | * |
2281 | * "With the exception of the HASH, SA, and the optional ID payloads, |
2282 | * there are no payload ordering restrictions on Quick Mode." |
2283 | */ |
2284 | |
2285 | if (md->hdr.isa_np != ISAKMP_NEXT_HASH) { |
2286 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } } |
2287 | "malformed Quick Mode message: does not start with a HASH payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } }; |
2288 | if (!md->encrypted) { |
2289 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2290 | } |
2291 | return; |
2292 | } |
2293 | |
2294 | { |
2295 | struct payload_digest *p; |
2296 | int i; |
2297 | |
2298 | p = md->chain[ISAKMP_NEXT_SA]; |
2299 | i = 1; |
2300 | while (p != NULL((void*)0)) { |
2301 | if (p != &md->digest[i]) { |
2302 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } } |
2303 | "malformed Quick Mode message: SA payload is in wrong position"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } }; |
2304 | if (!md->encrypted) { |
2305 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2306 | } |
2307 | return; |
2308 | } |
2309 | p = p->next; |
2310 | i++; |
2311 | } |
2312 | } |
2313 | |
2314 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode: |
2315 | * "If ISAKMP is acting as a client negotiator on behalf of another |
2316 | * party, the identities of the parties MUST be passed as IDci and |
2317 | * then IDcr." |
2318 | */ |
2319 | { |
2320 | struct payload_digest *id = md->chain[ISAKMP_NEXT_ID]; |
2321 | |
2322 | if (id != NULL((void*)0)) { |
2323 | if (id->next == NULL((void*)0) || |
2324 | id->next->next != NULL((void*)0)) { |
2325 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } } |
2326 | "malformed Quick Mode message: if any ID payload is present, there must be exactly two"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } }; |
2327 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2328 | return; |
2329 | } |
2330 | if (id + 1 != id->next) { |
2331 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } } |
2332 | "malformed Quick Mode message: the ID payloads are not adjacent"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } }; |
2333 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; |
2334 | return; |
2335 | } |
2336 | } |
2337 | } |
2338 | } |
2339 | |
2340 | /* |
2341 | * Ignore payloads that we don't handle: |
2342 | */ |
2343 | /* XXX Handle Notifications */ |
2344 | { |
2345 | struct payload_digest *p = md->chain[ISAKMP_NEXT_N]; |
2346 | |
2347 | while (p != NULL((void*)0)) { |
2348 | switch (p->payload.notification.isan_type) { |
2349 | case R_U_THERE: |
2350 | case R_U_THERE_ACK: |
2351 | case ISAKMP_N_CISCO_LOAD_BALANCE: |
2352 | case PAYLOAD_MALFORMED: |
2353 | case INVALID_MESSAGE_ID: |
2354 | case IPSEC_RESPONDER_LIFETIME: |
2355 | if (md->hdr.isa_xchg == ISAKMP_XCHG_INFO) { |
2356 | /* these are handled later on in informational() */ |
2357 | break; |
2358 | } |
2359 | /* FALL THROUGH */ |
2360 | default: |
2361 | if (st == NULL((void*)0)) { |
2362 | esb_buf b; |
2363 | dbg("ignoring informational payload %s, no corresponding state",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } |
2364 | enum_show(& ikev1_notify_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } |
2365 | p->payload.notification.isan_type, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } }; |
2366 | } else { |
2367 | esb_buf b; |
2368 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2369 | "ignoring informational payload %s, msgid=%08" PRIx32 ", length=%d",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2370 | enum_show(&ikev1_notify_names,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2371 | p->payload.notification.isan_type,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2372 | &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2373 | st->st_v1_msgid.id,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } |
2374 | p->payload.notification.isan_length){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } }; |
2375 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
2376 | DBG_dump_pbs(&p->pbs)DBG_dump((&p->pbs)->name, (&p->pbs)->start , ((size_t)((&p->pbs)->cur - (&p->pbs)->start ))); |
2377 | } |
2378 | } |
2379 | } |
2380 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
2381 | DBG_dump("info:", p->pbs.cur, |
2382 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); |
2383 | } |
2384 | |
2385 | p = p->next; |
2386 | } |
2387 | |
2388 | p = md->chain[ISAKMP_NEXT_D]; |
2389 | while (p != NULL((void*)0)) { |
2390 | self_delete |= accept_delete(md, p); |
2391 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
2392 | DBG_dump("del:", p->pbs.cur, |
2393 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); |
2394 | } |
2395 | if (md->v1_st != st) { |
2396 | pexpect(md->v1_st == NULL)({ _Bool assertion__ = md->v1_st == ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2396, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "md->v1_st == ((void*)0)" ); } assertion__; }); |
2397 | dbg("zapping ST as accept_delete() zapped MD.ST"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("zapping ST as accept_delete() zapped MD.ST"); } }; |
2398 | st = md->v1_st; |
2399 | } |
2400 | p = p->next; |
2401 | } |
2402 | |
2403 | p = md->chain[ISAKMP_NEXT_VID]; |
2404 | while (p != NULL((void*)0)) { |
2405 | handle_vendorid(md, (char *)p->pbs.cur, |
2406 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur )), false0, |
2407 | st != NULL((void*)0) ? st->st_logger : md->md_logger); |
2408 | p = p->next; |
2409 | } |
2410 | } |
2411 | |
2412 | if (self_delete) { |
2413 | accept_self_delete(md); |
2414 | st = md->v1_st; |
2415 | /* note: st ought to be NULL from here on */ |
2416 | } |
2417 | |
2418 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2418, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); |
2419 | statetime_t start = statetime_start(md->v1_st); |
2420 | /* |
2421 | * XXX: danger - the .informational() processor deletes ST; |
2422 | * and then tunnels this loss through MD.ST. |
2423 | */ |
2424 | stf_status e =smc->processor(st, md); |
2425 | complete_v1_state_transition(md->v1_st, md, e); |
2426 | statetime_stop(&start, "%s()", __func__); |
2427 | /* our caller will release_any_md(mdp); */ |
2428 | } |
2429 | |
2430 | /* |
2431 | * replace previous receive packet with latest, to update |
2432 | * our notion of a retransmitted packet. This is important |
2433 | * to do, even for failing transitions, and suspended transitions |
2434 | * because the sender may well retransmit their request. |
2435 | * We had better be idempotent since we can be called |
2436 | * multiple times in handling a packet due to crypto helper logic. |
2437 | */ |
2438 | static void remember_received_packet(struct state *st, struct msg_digest *md) |
2439 | { |
2440 | if (md->encrypted) { |
2441 | /* if encrypted, duplication already done */ |
2442 | if (md->raw_packet.ptr != NULL((void*)0)) { |
2443 | pfreeany(st->st_v1_rpacket.ptr){ typeof(st->st_v1_rpacket.ptr) *pp_ = &(st->st_v1_rpacket .ptr); if (*pp_ != ((void*)0)) { pfree(*pp_); *pp_ = ((void*) 0); } }; |
2444 | st->st_v1_rpacket = md->raw_packet; |
2445 | md->raw_packet = EMPTY_CHUNK((const chunk_t) { .ptr = ((void*)0), .len = 0 }); |
2446 | } |
2447 | } else { |
2448 | /* this may be a repeat, but it will work */ |
2449 | replace_chunk(&st->st_v1_rpacket, |
2450 | clone_bytes_as_chunk(md->packet_pbs.start, |
2451 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), |
2452 | "raw packet")); |
2453 | } |
2454 | } |
2455 | |
2456 | static void jam_v1_ipsec_details(struct jambuf *buf, struct state *st) |
2457 | { |
2458 | struct connection *const c = st->st_connection; |
2459 | jam_string(buf, c->policy & POLICY_TUNNEL((lset_t)1 << (POLICY_TUNNEL_IX)) ? "tunnel mode" : "transport mode"); |
2460 | jam(buf, " "); |
2461 | jam_child_sa_details(buf, st); |
2462 | } |
2463 | |
2464 | static void jam_v1_isakmp_details(struct jambuf *buf, struct state *st) |
2465 | { |
2466 | jam_parent_sa_details(buf, st); |
2467 | } |
2468 | |
2469 | /* complete job started by the state-specific state transition function |
2470 | * |
2471 | * This routine will not release_any_md(mdp). It is expected that its |
2472 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks |
2473 | * **mdp should not be freed. So the caller should be prepared for |
2474 | * *mdp being set to NULL. |
2475 | * |
2476 | * md is used to: |
2477 | * - find st |
2478 | * - find from_state (st might be gone) |
2479 | * - find note for STF_FAIL (might not be part of result (STF_FAIL+note)) |
2480 | * - find note for STF_INTERNAL_ERROR |
2481 | * - record md->event_already_set |
2482 | * - remember_received_packet(st, md); |
2483 | * - nat_traversal_change_port_lookup(md, st); |
2484 | * - smc for smc->next_state |
2485 | * - smc for smc->flags & SMF_REPLY to trigger a reply |
2486 | * - smc for smc->timeout_event |
2487 | * - smc for !(smc->flags & SMF_INITIATOR) for Contivity mode |
2488 | * - smc for smc->flags & SMF_RELEASE_PENDING_P2 to trigger unpend call |
2489 | * - smc for smc->flags & SMF_INITIATOR to adjust retransmission |
2490 | * - fragvid, dpd, nortel |
2491 | */ |
2492 | void complete_v1_state_transition(struct state *st, struct msg_digest *md, stf_status result) |
2493 | { |
2494 | /* handle oddball/meta results now */ |
2495 | |
2496 | /* |
2497 | * statistics; lump all FAILs together |
2498 | * |
2499 | * Fun fact: using min() stupidly fails (at least in GCC 8.1.1 with -Werror=sign-compare) |
2500 | * error: comparison of integer expressions of different signedness: `stf_status' {aka `enum <anonymous>'} and `int' |
2501 | */ |
2502 | pstats(ike_stf, PMIN(result, STF_FAIL)){ const unsigned __pstat = (((result) <= (STF_FAIL) ? (result ) : (STF_FAIL))); if (__pstat < (sizeof(pstats_ike_stf) / sizeof (*(pstats_ike_stf)))) { pstats_ike_stf[__pstat]++; } else if ( (cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ike_stf", __pstat); } }; |
2503 | |
2504 | dbg("complete v1 state transition with %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } |
2505 | result > STF_FAIL ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } |
2506 | enum_name(&ikev1_notify_names, result - STF_FAIL) :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } |
2507 | enum_name(&stf_status_names, result)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } }; |
2508 | |
2509 | switch (result) { |
2510 | case STF_SUSPEND: |
2511 | /* |
2512 | * If this transition was triggered by an incoming |
2513 | * packet, save it. |
2514 | * |
2515 | * XXX: some initiator code creates a fake MD (there |
2516 | * isn't a real one); save that as well. |
2517 | */ |
2518 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2518, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); |
2519 | suspend_any_md(md->v1_st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (md->v1_st)->st_serialno, md); } }; ({ _Bool assertion__ = (md->v1_st)->st_suspended_md == ((void*)0); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "(md->v1_st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (md->v1_st)->st_suspended_md = md_addref (md, ({ static const struct where here = { .func = __func__, . file = "programs/pluto/ikev1.c", .line = 2519, }; &here; } )); (md->v1_st)->st_suspended_md_func = __func__; (md-> v1_st)->st_suspended_md_line = 2519; ({ _Bool assertion__ = state_is_busy(md->v1_st); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "state_is_busy(md->v1_st)"); } (void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; |
2520 | return; |
2521 | case STF_IGNORE: |
2522 | /* note: md might be NULL */ |
2523 | return; |
2524 | default: |
2525 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2525, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); |
2526 | break; |
2527 | } |
2528 | |
2529 | /* safe to refer to *md */ |
2530 | |
2531 | enum state_kind from_state = md->smc->state; |
2532 | st = md->v1_st; |
2533 | |
2534 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2534, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); |
2535 | pexpect(!state_is_busy(st))({ _Bool assertion__ = !state_is_busy(st); if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2535, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "!state_is_busy(st)"); } assertion__; }); |
2536 | |
2537 | if (result > STF_OK) { |
2538 | linux_audit_conn(md->v1_st, IS_V1_ISAKMP_SA_ESTABLISHED(md->v1_st)((((lset_t)1 << ((md->v1_st)->st_state->kind)) & (((lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4)) | ((lset_t)1 << (STATE_AGGR_I2)) | (( lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0 )) | ((lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0)) | ((lset_t)1 << (STATE_MODE_CFG_R1 )) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1)) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) ? LAK_CHILD_FAIL : LAK_PARENT_FAIL); |
2539 | } |
2540 | |
2541 | switch (result) { |
2542 | case STF_OK: |
2543 | { |
2544 | /* advance the state */ |
2545 | const struct state_v1_microcode *smc = md->smc; |
2546 | |
2547 | dbg("doing_xauth:%s, t_xauth_client_done:%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } |
2548 | bool_str(st->st_oakley.doing_xauth),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } |
2549 | bool_str(st->hidden_variables.st_xauth_client_done)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } }; |
2550 | |
2551 | /* accept info from VID because we accept this message */ |
2552 | |
2553 | /* |
2554 | * Most of below VIDs only appear Main/Aggr mode, not Quick mode, |
2555 | * so why are we checking them for each state transition? |
2556 | */ |
2557 | |
2558 | if (md->fragvid) { |
2559 | dbg("peer supports fragmentation"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports fragmentation"); } }; |
2560 | st->st_seen_fragmentation_supported = true1; |
2561 | } |
2562 | |
2563 | if (md->dpd) { |
2564 | dbg("peer supports DPD"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports DPD"); } }; |
2565 | st->hidden_variables.st_peer_supports_dpd = true1; |
2566 | if (dpd_active_locally(st)) { |
2567 | dbg("DPD is configured locally"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("DPD is configured locally"); } }; |
2568 | } |
2569 | } |
2570 | |
2571 | /* If state has VID_NORTEL, import it to activate workaround */ |
2572 | if (md->nortel) { |
2573 | dbg("peer requires Nortel Contivity workaround"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer requires Nortel Contivity workaround"); } }; |
2574 | st->st_seen_nortel_vid = true1; |
2575 | } |
2576 | |
2577 | if (!st->st_v1_msgid.reserved && |
2578 | IS_CHILD_SA(st)((st)->st_clonedfrom != 0) && |
2579 | st->st_v1_msgid.id != v1_MAINMODE_MSGID((msgid_t) 0)) { |
2580 | struct state *p1st = state_with_serialno( |
2581 | st->st_clonedfrom); |
2582 | |
2583 | if (p1st != NULL((void*)0)) { |
2584 | /* do message ID reservation */ |
2585 | reserve_msgid(p1st, st->st_v1_msgid.id); |
2586 | } |
2587 | |
2588 | st->st_v1_msgid.reserved = true1; |
2589 | } |
2590 | |
2591 | dbg("IKEv1: transition from state %s to state %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } |
2592 | finite_states[from_state]->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } |
2593 | finite_states[smc->next_state]->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } }; |
2594 | |
2595 | change_state(st, smc->next_state); |
2596 | |
2597 | /* |
2598 | * XAUTH negotiation without ModeCFG cannot follow the regular |
2599 | * state machine change as it cannot be determined if the CFG |
2600 | * payload is "XAUTH OK, no ModeCFG" or "XAUTH OK, expect |
2601 | * ModeCFG". To the smc, these two cases look identical. So we |
2602 | * have an ad hoc state change here for the case where |
2603 | * we have XAUTH but not ModeCFG. We move it to the established |
2604 | * state, so the regular state machine picks up the Quick Mode. |
2605 | */ |
2606 | if (st->st_connection->spd.this.xauth_client && |
2607 | st->hidden_variables.st_xauth_client_done && |
2608 | !st->st_connection->spd.this.modecfg_client && |
2609 | st->st_state->kind == STATE_XAUTH_I1) |
2610 | { |
2611 | bool_Bool aggrmode = LHAS(st->st_connection->policy, POLICY_AGGRESSIVE_IX)(((st->st_connection->policy) & ((lset_t)1 << (POLICY_AGGRESSIVE_IX))) != ((lset_t)0)); |
2612 | |
2613 | log_state(RC_LOG, st, "XAUTH completed; ModeCFG skipped as per configuration"); |
2614 | change_state(st, aggrmode ? STATE_AGGR_I2 : STATE_MAIN_I4); |
2615 | st->st_v1_msgid.phase15 = v1_MAINMODE_MSGID((msgid_t) 0); |
2616 | } |
2617 | |
2618 | /* Schedule for whatever timeout is specified */ |
2619 | if (!md->event_already_set) { |
2620 | /* |
2621 | * This md variable is hardly ever set. |
2622 | * Only deals with v1 <-> v2 switching |
2623 | * which will be removed in the near future anyway |
2624 | * (PW 2017 Oct 8) |
2625 | */ |
2626 | dbg("event_already_set, deleting event"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("event_already_set, deleting event"); } }; |
2627 | /* |
2628 | * Delete previous retransmission event. |
2629 | * New event will be scheduled below. |
2630 | */ |
2631 | delete_event(st); |
2632 | clear_retransmits(st); |
2633 | } |
2634 | |
2635 | /* Delete IKE fragments */ |
2636 | free_v1_message_queues(st); |
2637 | |
2638 | /* scrub the previous packet exchange */ |
2639 | free_chunk_content(&st->st_v1_rpacket); |
2640 | free_chunk_content(&st->st_v1_tpacket); |
2641 | |
2642 | /* in aggressive mode, there will be no reply packet in transition |
2643 | * from STATE_AGGR_R1 to STATE_AGGR_R2 |
2644 | */ |
2645 | if (nat_traversal_enabled && st->st_connection->ikev1_natt != NATT_NONE) { |
2646 | /* adjust our destination port if necessary */ |
2647 | nat_traversal_change_port_lookup(md, st); |
2648 | v1_maybe_natify_initiator_endpoints(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2648, }; &here; })); |
2649 | } |
2650 | |
2651 | /* |
2652 | * Save both the received packet, and this |
2653 | * state-transition. |
2654 | * |
2655 | * Only when the (last) state transition was a "reply" |
2656 | * should a duplicate packet trigger a retransmit |
2657 | * (else they get discarded). |
2658 | * |
2659 | * XXX: .st_state .fs_flags & SMF_REPLY can't |
2660 | * be used because it contains flags for the new state |
2661 | * not the old-to-new state transition. |
2662 | */ |
2663 | remember_received_packet(st, md); |
2664 | st->st_v1_last_transition = md->smc; |
2665 | |
2666 | /* if requested, send the new reply packet */ |
2667 | if (smc->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5))) { |
2668 | endpoint_buf b; |
2669 | endpoint_buf b2; |
2670 | pexpect_st_local_endpoint(st); |
2671 | dbg("sending reply packet to %s (from %s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } |
2672 | str_endpoint(&st->st_remote_endpoint, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } |
2673 | str_endpoint(&st->st_interface->local_endpoint, &b2)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } }; |
2674 | |
2675 | close_output_pbs(&reply_stream); /* good form, but actually a no-op */ |
2676 | |
2677 | if (st->st_state->kind == STATE_MAIN_R2 && |
2678 | impair.send_no_main_r2) { |
2679 | /* record-only so we properly emulate packet drop */ |
2680 | record_outbound_v1_ike_msg(st, &reply_stream, |
2681 | finite_states[from_state]->name); |
2682 | log_state(RC_LOG, st, "IMPAIR: Skipped sending STATE_MAIN_R2 response packet"); |
2683 | } else { |
2684 | record_and_send_v1_ike_msg(st, &reply_stream, |
2685 | finite_states[from_state]->name); |
2686 | } |
2687 | } |
2688 | |
2689 | /* Schedule for whatever timeout is specified */ |
2690 | if (!md->event_already_set) { |
2691 | dbg("!event_already_set at reschedule"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("!event_already_set at reschedule"); } }; |
2692 | intmax_t delay_ms; /* delay is in milliseconds here */ |
2693 | enum event_type kind = smc->timeout_event; |
2694 | bool_Bool agreed_time = false0; |
2695 | struct connection *c = st->st_connection; |
2696 | |
2697 | /* fixup in case of state machine jump for xauth without modecfg */ |
2698 | if (c->spd.this.xauth_client && |
2699 | st->hidden_variables.st_xauth_client_done && |
2700 | !c->spd.this.modecfg_client && |
2701 | (st->st_state->kind == STATE_MAIN_I4 || st->st_state->kind == STATE_AGGR_I2)) |
2702 | { |
2703 | dbg("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE" ); } }; |
2704 | kind = EVENT_SA_REPLACE; |
2705 | } |
2706 | |
2707 | switch (kind) { |
2708 | case EVENT_RETRANSMIT: /* Retransmit packet */ |
2709 | start_retransmits(st); |
2710 | break; |
2711 | |
2712 | case EVENT_SA_REPLACE: /* SA replacement event */ |
2713 | if (IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2) || |
2714 | IS_V1_PHASE15(st->st_state->kind)(STATE_XAUTH_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_XAUTH_I1)) { |
2715 | /* Note: we will defer to the "negotiated" (dictated) |
2716 | * lifetime if we are POLICY_DONT_REKEY. |
2717 | * This allows the other side to dictate |
2718 | * a time we would not otherwise accept |
2719 | * but it prevents us from having to initiate |
2720 | * rekeying. The negative consequences seem |
2721 | * minor. |
2722 | */ |
2723 | delay_ms = deltamillisecs(c->sa_ike_life_seconds); |
2724 | if ((c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX))) || |
2725 | delay_ms >= deltamillisecs(st->st_oakley.life_seconds)) |
2726 | { |
2727 | agreed_time = true1; |
2728 | delay_ms = deltamillisecs(st->st_oakley.life_seconds); |
2729 | } |
2730 | } else { |
2731 | /* Delay is min of up to four things: |
2732 | * each can limit the lifetime. |
2733 | */ |
2734 | time_t delay = deltasecs(c->sa_ipsec_life_seconds); |
2735 | |
2736 | #define clamp_delay(trans) { \ |
2737 | if (st->trans.present && \ |
2738 | delay >= deltasecs(st->trans.attrs.life_seconds)) { \ |
2739 | agreed_time = true1; \ |
2740 | delay = deltasecs(st->trans.attrs.life_seconds); \ |
2741 | } \ |
2742 | } |
2743 | clamp_delay(st_ah); |
2744 | clamp_delay(st_esp); |
2745 | clamp_delay(st_ipcomp); |
2746 | delay_ms = delay * 1000; |
2747 | #undef clamp_delay |
2748 | } |
2749 | |
2750 | /* By default, we plan to rekey. |
2751 | * |
2752 | * If there isn't enough time to rekey, plan to |
2753 | * expire. |
2754 | * |
2755 | * If we are --dontrekey, a lot more rules apply. |
2756 | * If we are the Initiator, use REPLACE_IF_USED. |
2757 | * If we are the Responder, and the dictated time |
2758 | * was unacceptable (too large), plan to REPLACE |
2759 | * (the only way to ratchet down the time). |
2760 | * If we are the Responder, and the dictated time |
2761 | * is acceptable, plan to EXPIRE. |
2762 | * |
2763 | * Important policy lies buried here. |
2764 | * For example, we favour the initiator over the |
2765 | * responder by making the initiator start rekeying |
2766 | * sooner. Also, fuzz is only added to the |
2767 | * initiator's margin. |
2768 | * |
2769 | * Note: for ISAKMP SA, we let the negotiated |
2770 | * time stand (implemented by earlier logic). |
2771 | */ |
2772 | if (agreed_time && |
2773 | (c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX)))) { |
2774 | kind = (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) ? |
2775 | EVENT_v1_REPLACE_IF_USED : |
2776 | EVENT_SA_EXPIRE; |
2777 | } |
2778 | if (kind != EVENT_SA_EXPIRE) { |
2779 | time_t marg = |
2780 | deltasecs(c->sa_rekey_margin); |
2781 | |
2782 | if (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) { |
2783 | marg += marg * |
2784 | c->sa_rekey_fuzz / |
2785 | 100.E0 * |
2786 | (rand() / |
2787 | (RAND_MAX2147483647 + 1.E0)); |
2788 | } else { |
2789 | marg /= 2; |
2790 | } |
2791 | |
2792 | if (delay_ms > marg * 1000) { |
2793 | delay_ms -= marg * 1000; |
2794 | st->st_replace_margin = deltatime(marg); |
2795 | } else { |
2796 | kind = EVENT_SA_EXPIRE; |
2797 | } |
2798 | } |
2799 | /* XXX: DELAY_MS should be a deltatime_t */ |
2800 | event_schedule(kind, deltatime_ms(delay_ms), st); |
2801 | break; |
2802 | |
2803 | case EVENT_SA_DISCARD: |
2804 | event_schedule(EVENT_SA_DISCARD, c->config->retransmit_timeout, st); |
2805 | break; |
2806 | |
2807 | default: |
2808 | bad_case(kind)libreswan_bad_case("kind", (kind), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2808, }; &here; })); |
2809 | } |
2810 | } |
2811 | |
2812 | /* tell whack and log of progress */ |
2813 | { |
2814 | enum rc_type w; |
2815 | void (*jam_details)(struct jambuf *buf, struct state *st); |
2816 | |
2817 | if (IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) { |
2818 | pstat_sa_established(st); |
2819 | jam_details = jam_v1_ipsec_details; |
2820 | w = RC_SUCCESS; /* log our success */ |
2821 | } else if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
2822 | pstat_sa_established(st); |
2823 | jam_details = jam_v1_isakmp_details; |
2824 | w = RC_SUCCESS; /* log our success */ |
2825 | } else { |
2826 | jam_details = NULL((void*)0); |
2827 | w = RC_NEW_V1_STATE + st->st_state->kind; |
2828 | } |
2829 | |
2830 | passert(st->st_state->kind < STATE_IKEv1_ROOF)({ _Bool assertion__ = st->st_state->kind < STATE_IKEv1_ROOF ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2830, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_state->kind < STATE_IKEv1_ROOF" ); } (void) 1; }); |
2831 | |
2832 | /* tell whack and logs our progress */ |
2833 | LLOG_JAMBUF(w, st->st_logger, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((w) & NO_PREFIX) == ((lset_t)0) && (((w) & STREAM_MASK ) != DEBUG_STREAM || (cur_debugging & (((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { (st->st_logger)->object_vec ->jam_object_prefix(buf, (st->st_logger)->object); } }); buf != ((void*)0); jambuf_to_logger(buf, (st->st_logger ), w), buf = ((void*)0)) { |
2834 | jam(buf, "%s", st->st_state->story); |
2835 | /* document SA details for admin's pleasure */ |
2836 | if (jam_details != NULL((void*)0)) { |
2837 | jam(buf, " "); |
2838 | jam_details(buf, st); |
2839 | } |
2840 | } |
2841 | } |
2842 | |
2843 | /* |
2844 | * make sure that a DPD event gets created for a new phase 1 |
2845 | * SA. |
2846 | * Why do we need a DPD event on an IKE SA??? |
2847 | */ |
2848 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
2849 | if (dpd_init(st) != STF_OK) { |
2850 | log_state(RC_LOG_SERIOUS, st, |
2851 | "DPD initialization failed - continuing without DPD"); |
2852 | } |
2853 | } |
2854 | |
2855 | /* Special case for XAUTH server */ |
2856 | if (st->st_connection->spd.this.xauth_server) { |
2857 | if (st->st_oakley.doing_xauth && |
2858 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { |
2859 | dbg("XAUTH: Sending XAUTH Login/Password Request"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH: Sending XAUTH Login/Password Request") ; } }; |
2860 | event_schedule(EVENT_v1_SEND_XAUTH, |
2861 | deltatime_ms(EVENT_v1_SEND_XAUTH_DELAY_MS80), |
2862 | st); |
2863 | break; |
2864 | } |
2865 | } |
2866 | |
2867 | /* |
2868 | * for XAUTH client, we are also done, because we need to |
2869 | * stay in this state, and let the server query us |
2870 | */ |
2871 | if (!IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2) && |
2872 | st->st_connection->spd.this.xauth_client && |
2873 | !st->hidden_variables.st_xauth_client_done) { |
2874 | dbg("XAUTH client is not yet authenticated"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH client is not yet authenticated"); } }; |
2875 | break; |
2876 | } |
2877 | |
2878 | /* |
2879 | * when talking to some vendors, we need to initiate a mode |
2880 | * cfg request to get challenged, but there is also an |
2881 | * override in the form of a policy bit. |
2882 | */ |
2883 | dbg("modecfg pull: %s policy:%s %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2884 | (st->quirks.modecfg_pull_mode ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2885 | "quirk-poll" : "noquirk"),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2886 | (st->st_connection->policy & POLICY_MODECFG_PULL) ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2887 | "pull" : "push",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2888 | (st->st_connection->spd.this.modecfg_client ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } |
2889 | "modecfg-client" : "not-client")){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } }; |
2890 | |
2891 | if (st->st_connection->spd.this.modecfg_client && |
2892 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && |
2893 | (st->quirks.modecfg_pull_mode || |
2894 | st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX))) && |
2895 | !st->hidden_variables.st_modecfg_started) { |
2896 | dbg("modecfg client is starting due to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } |
2897 | st->quirks.modecfg_pull_mode ? "quirk" :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } |
2898 | "policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } }; |
2899 | modecfg_send_request(st); |
2900 | break; |
2901 | } |
2902 | |
2903 | /* Should we set the peer's IP address regardless? */ |
2904 | if (st->st_connection->spd.this.modecfg_server && |
2905 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && |
2906 | !st->hidden_variables.st_modecfg_vars_set && |
2907 | !(st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX)))) { |
2908 | change_state(st, STATE_MODE_CFG_R1); |
2909 | log_state(RC_LOG, st, "Sending MODE CONFIG set"); |
2910 | /* |
2911 | * ??? we ignore the result of modecfg. |
2912 | * But surely, if it fails, we ought to terminate this exchange. |
2913 | * What do the RFCs say? |
2914 | */ |
2915 | modecfg_start_set(st); |
2916 | break; |
2917 | } |
2918 | |
2919 | /* |
2920 | * If we are the responder and the client is in "Contivity mode", |
2921 | * we need to initiate Quick mode |
2922 | */ |
2923 | if (!(smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) && |
2924 | IS_V1_MODE_CFG_ESTABLISHED(st->st_state)(((st->st_state)->kind) == STATE_MODE_CFG_R2) && |
2925 | (st->st_seen_nortel_vid)) { |
2926 | log_state(RC_LOG, st, "Nortel 'Contivity Mode' detected, starting Quick Mode"); |
2927 | change_state(st, STATE_MAIN_R3); /* ISAKMP is up... */ |
2928 | quick_outI1(st->st_logger->object_whackfd, st, st->st_connection, |
2929 | st->st_connection->policy, 1, SOS_NOBODY0, null_shunk); |
2930 | break; |
2931 | } |
2932 | |
2933 | /* wait for modecfg_set */ |
2934 | if (st->st_connection->spd.this.modecfg_client && |
2935 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && |
2936 | !st->hidden_variables.st_modecfg_vars_set) { |
2937 | dbg("waiting for modecfg set from server"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("waiting for modecfg set from server"); } }; |
2938 | break; |
2939 | } |
2940 | |
2941 | dbg("phase 1 is done, looking for phase 2 to unpend"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("phase 1 is done, looking for phase 2 to unpend" ); } }; |
2942 | |
2943 | if (smc->flags & SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6))) { |
2944 | /* Initiate any Quick Mode negotiations that |
2945 | * were waiting to piggyback on this Keying Channel. |
2946 | * |
2947 | * ??? there is a potential race condition |
2948 | * if we are the responder: the initial Phase 2 |
2949 | * message might outrun the final Phase 1 message. |
2950 | * |
2951 | * so, instead of actually sending the traffic now, |
2952 | * we schedule an event to do so. |
2953 | * |
2954 | * but, in fact, quick_mode will enqueue a cryptographic operation |
2955 | * anyway, which will get done "later" anyway, so maybe it is just fine |
2956 | * as it is. |
2957 | * |
2958 | */ |
2959 | unpend(pexpect_ike_sa(st), NULL((void*)0)); |
2960 | } |
2961 | |
2962 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) || |
2963 | IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) |
2964 | release_any_whack(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2964, }; &here; }), "IKEv1 transitions finished"); |
2965 | |
2966 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) |
2967 | break; |
2968 | |
2969 | break; |
2970 | } |
2971 | |
2972 | case STF_INTERNAL_ERROR: |
2973 | /* update the previous packet history */ |
2974 | remember_received_packet(st, md); |
2975 | log_state(RC_INTERNALERR + md->v1_note, st, |
2976 | "state transition function for %s had internal error", |
2977 | st->st_state->name); |
2978 | release_pending_whacks(st, "internal error"); |
2979 | break; |
2980 | |
2981 | case STF_FATAL: |
2982 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2982, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); |
2983 | /* update the previous packet history */ |
2984 | remember_received_packet(st, md); |
2985 | log_state(RC_FATAL, st, "encountered fatal error in state %s", |
2986 | st->st_state->name); |
2987 | #ifdef HAVE_NM1 |
2988 | if (st->st_connection->remotepeertype == CISCO && |
2989 | st->st_connection->nmconfigured) { |
2990 | if (!do_command(st->st_connection, |
2991 | &st->st_connection->spd, |
2992 | "disconnectNM", |
2993 | st, st->st_logger)) |
2994 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; |
2995 | } |
2996 | #endif |
2997 | release_pending_whacks(st, "fatal error"); |
2998 | delete_state(st); |
2999 | md->v1_st = st = NULL((void*)0); |
3000 | break; |
3001 | |
3002 | default: /* a shortcut to STF_FAIL, setting md->note */ |
3003 | passert(result > STF_FAIL)({ _Bool assertion__ = result > STF_FAIL; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3003, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "result > STF_FAIL"); } (void) 1; }); |
3004 | md->v1_note = result - STF_FAIL; |
3005 | /* FALL THROUGH */ |
3006 | case STF_FAIL: |
3007 | { |
3008 | /* As it is, we act as if this message never happened: |
3009 | * whatever retrying was in place, remains in place. |
3010 | */ |
3011 | /* |
3012 | * Try to convert the notification into a non-NULL |
3013 | * string. For NOTHING_WRONG, be vague (at the time |
3014 | * of writing the enum_names didn't contain |
3015 | * NOTHING_WRONG, and even if it did "nothing wrong" |
3016 | * wouldn't exactly help here :-). |
3017 | */ |
3018 | const char *notify_name = (md->v1_note == NOTHING_WRONG ? "failed" : |
3019 | enum_name(&ikev1_notify_names, md->v1_note)); |
3020 | if (notify_name == NULL((void*)0)) { |
3021 | notify_name = "internal error"; |
3022 | } |
3023 | /* |
3024 | * ??? why no call of remember_received_packet? |
3025 | * Perhaps because the message hasn't been authenticated? |
3026 | * But then then any duplicate would lose too, I would think. |
3027 | */ |
3028 | |
3029 | if (md->v1_note != NOTHING_WRONG) { |
3030 | /* this will log */ |
3031 | SEND_NOTIFICATION(md->v1_note){ { const unsigned __pstat = (md->v1_note); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, md->v1_note ); else send_notification_from_md(md, md->v1_note); }; |
3032 | } else { |
3033 | /* XXX: why whack only? */ |
3034 | log_state(WHACK_STREAM | (RC_NOTIFICATION + md->v1_note), st, |
3035 | "state transition failed: %s", notify_name); |
3036 | } |
3037 | |
3038 | dbg("state transition function for %s failed: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } } |
3039 | st->st_state->name, notify_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } }; |
3040 | |
3041 | #ifdef HAVE_NM1 |
3042 | if (st->st_connection->remotepeertype == CISCO && |
3043 | st->st_connection->nmconfigured) { |
3044 | if (!do_command(st->st_connection, |
3045 | &st->st_connection->spd, |
3046 | "disconnectNM", |
3047 | st, st->st_logger)) |
3048 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; |
3049 | } |
3050 | #endif |
3051 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) { |
3052 | delete_state(st); |
3053 | /* wipe out dangling pointer to st */ |
3054 | md->v1_st = NULL((void*)0); |
3055 | } |
3056 | break; |
3057 | } |
3058 | } |
3059 | } |
3060 | |
3061 | /* |
3062 | * note: may change which connection is referenced by md->v1_st->st_connection. |
3063 | * But only if we are a Main Mode Responder. |
3064 | */ |
3065 | bool_Bool ikev1_decode_peer_id(struct msg_digest *md, bool_Bool initiator, bool_Bool aggrmode) |
3066 | { |
3067 | struct state *const st = md->v1_st; |
3068 | struct connection *c = st->st_connection; |
3069 | const struct payload_digest *const id_pld = md->chain[ISAKMP_NEXT_ID]; |
3070 | const struct isakmp_id *const id = &id_pld->payload.id; |
3071 | |
3072 | /* |
3073 | * I think that RFC2407 (IPSEC DOI) 4.6.2 is confused. |
3074 | * It talks about the protocol ID and Port fields of the ID |
3075 | * Payload, but they don't exist as such in Phase 1. |
3076 | * We use more appropriate names. |
3077 | * isaid_doi_specific_a is in place of Protocol ID. |
3078 | * isaid_doi_specific_b is in place of Port. |
3079 | * Besides, there is no good reason for allowing these to be |
3080 | * other than 0 in Phase 1. |
3081 | */ |
3082 | if (st->hidden_variables.st_nat_traversal != LEMPTY((lset_t)0) && |
3083 | id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && |
3084 | (id->isaid_doi_specific_b == 0 || |
3085 | id->isaid_doi_specific_b == NAT_IKE_UDP_PORT4500)) { |
3086 | dbg("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } } |
3087 | id->isaid_doi_specific_a, id->isaid_doi_specific_b){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } }; |
3088 | } else if (!(id->isaid_doi_specific_a == 0 && |
3089 | id->isaid_doi_specific_b == 0) && |
3090 | !(id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && |
3091 | id->isaid_doi_specific_b == IKE_UDP_PORT500)) |
3092 | { |
3093 | log_state(RC_LOG_SERIOUS, st, |
3094 | "protocol/port in Phase 1 ID Payload MUST be 0/0 or %d/%d but are %d/%d (attempting to continue)", |
3095 | IPPROTO_UDPIPPROTO_UDP, IKE_UDP_PORT500, |
3096 | id->isaid_doi_specific_a, |
3097 | id->isaid_doi_specific_b); |
3098 | /* |
3099 | * We have turned this into a warning because of bugs in other |
3100 | * vendors' products. Specifically CISCO VPN3000. |
3101 | */ |
3102 | /* return false; */ |
3103 | } |
3104 | |
3105 | struct id peer; |
3106 | |
3107 | diag_t d = unpack_peer_id(id->isaid_idtype, &peer, &id_pld->pbs); |
3108 | if (d != NULL((void*)0)) { |
3109 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); |
3110 | return false0; |
3111 | } |
3112 | |
3113 | if (c->spd.that.id.kind == ID_FROMCERT) { |
3114 | /* breaks API, connection modified by %fromcert */ |
3115 | duplicate_id(&c->spd.that.id, &peer); |
3116 | } |
3117 | |
3118 | /* |
3119 | * For interop with SoftRemote/aggressive mode we need to remember some |
3120 | * things for checking the hash |
3121 | */ |
3122 | st->st_peeridentity_protocol = id->isaid_doi_specific_a; |
3123 | st->st_peeridentity_port = ntohs(id->isaid_doi_specific_b); |
3124 | |
3125 | { |
3126 | id_buf buf; |
3127 | esb_buf b; |
3128 | log_state(RC_LOG, st, "Peer ID is %s: '%s'", |
3129 | enum_show(&ike_id_type_names, id->isaid_idtype, &b), |
3130 | str_id(&peer, &buf)str_id_bytes(&peer, jam_raw_bytes, &buf)); |
3131 | } |
3132 | |
3133 | /* check for certificates */ |
3134 | if (!v1_verify_certs(md)) { |
3135 | log_state(RC_LOG, st, "X509: CERT payload does not match connection ID"); |
3136 | if (initiator || aggrmode) { |
3137 | /* cannot switch connection so fail */ |
3138 | return false0; |
3139 | } |
3140 | } |
3141 | |
3142 | /* check for certificate requests */ |
3143 | ikev1_decode_cr(md, st->st_logger); |
3144 | |
3145 | /* |
3146 | * Now that we've decoded the ID payload, let's see if we |
3147 | * need to switch connections. |
3148 | * Aggressive mode cannot switch connections. |
3149 | * We must not switch horses if we initiated: |
3150 | * - if the initiation was explicit, we'd be ignoring user's intent |
3151 | * - if opportunistic, we'll lose our HOLD info |
3152 | */ |
3153 | |
3154 | if (initiator) { |
3155 | if (!st->st_v1_peer_alt_id && |
3156 | !same_id(&c->spd.that.id, &peer) && |
3157 | c->spd.that.id.kind != ID_FROMCERT) { |
3158 | id_buf expect; |
3159 | id_buf found; |
3160 | |
3161 | log_state(RC_LOG_SERIOUS, st, |
3162 | "we require IKEv1 peer to have ID '%s', but peer declares '%s'", |
3163 | str_id(&c->spd.that.id, &expect)str_id_bytes(&c->spd.that.id, jam_raw_bytes, &expect ), |
3164 | str_id(&peer, &found)str_id_bytes(&peer, jam_raw_bytes, &found)); |
3165 | return false0; |
3166 | } else if (c->spd.that.id.kind == ID_FROMCERT) { |
3167 | if (peer.kind != ID_DER_ASN1_DN) { |
3168 | log_state(RC_LOG_SERIOUS, st, |
3169 | "peer ID is not a certificate type"); |
3170 | return false0; |
3171 | } |
3172 | duplicate_id(&c->spd.that.id, &peer); |
3173 | } |
3174 | } else if (!aggrmode) { |
3175 | /* Main Mode Responder */ |
3176 | uint16_t auth = xauth_calcbaseauth(st->st_oakley.auth); |
3177 | lset_t auth_policy; |
3178 | |
3179 | switch (auth) { |
3180 | case OAKLEY_PRESHARED_KEY: |
3181 | auth_policy = POLICY_PSK((lset_t)1 << (POLICY_PSK_IX)); |
3182 | break; |
3183 | case OAKLEY_RSA_SIG: |
3184 | auth_policy = POLICY_RSASIG((lset_t)1 << (POLICY_RSASIG_IX)); |
3185 | break; |
3186 | /* Not implemented */ |
3187 | case OAKLEY_DSS_SIG: |
3188 | case OAKLEY_RSA_ENC: |
3189 | case OAKLEY_RSA_REVISED_MODE: |
3190 | case OAKLEY_ECDSA_P256: |
3191 | case OAKLEY_ECDSA_P384: |
3192 | case OAKLEY_ECDSA_P521: |
3193 | default: |
3194 | dbg("ikev1 ike_decode_peer_id bad_case due to not supported policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ikev1 ike_decode_peer_id bad_case due to not supported policy" ); } }; |
3195 | return false0; |
3196 | } |
3197 | |
3198 | bool_Bool fromcert; |
3199 | struct connection *r = |
3200 | refine_host_connection_on_responder(st, &peer, |
3201 | NULL((void*)0), /* IKEv1 does not support 'you Tarzan, me Jane' */ |
3202 | auth_policy, |
3203 | AUTHBY_UNSET, /* ikev2 only */ |
3204 | &fromcert); |
3205 | |
3206 | if (r == NULL((void*)0)) { |
3207 | id_buf buf; |
3208 | dbg("no more suitable connection for peer '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } } |
3209 | str_id(&peer, &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } }; |
3210 | /* can we continue with what we had? */ |
3211 | if (!md->v1_st->st_v1_peer_alt_id && |
3212 | !same_id(&c->spd.that.id, &peer) && |
3213 | c->spd.that.id.kind != ID_FROMCERT) { |
3214 | log_state(RC_LOG, md->v1_st, "Peer mismatch on first found connection and no better connection found"); |
3215 | return false0; |
3216 | } else { |
3217 | dbg("Peer ID matches and no better connection found - continuing with existing connection"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Peer ID matches and no better connection found - continuing with existing connection" ); } }; |
3218 | r = c; |
3219 | } |
3220 | } |
3221 | |
3222 | dn_buf buf; |
3223 | dbg("offered CA: '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } } |
3224 | str_dn_or_null(r->spd.this.ca, "%none", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } }; |
3225 | |
3226 | if (r != c) { |
3227 | /* |
3228 | * We are changing st->st_connection! |
3229 | * Our caller might be surprised! |
3230 | */ |
3231 | connection_buf b1, b2; |
3232 | |
3233 | /* apparently, r is an improvement on c -- replace */ |
3234 | log_state(RC_LOG, st, "switched from "PRI_CONNECTION"\"%s\"%s"" to "PRI_CONNECTION"\"%s\"%s""", |
3235 | pri_connection(c, &b1)(c)->name, str_connection_instance(c, &b1), pri_connection(r, &b2)(r)->name, str_connection_instance(r, &b2)); |
3236 | |
3237 | if (r->kind == CK_TEMPLATE || r->kind == CK_GROUP) { |
3238 | /* instantiate it, filling in peer's ID */ |
3239 | r = rw_instantiate(r, &c->spd.that.host_addr, |
3240 | NULL((void*)0), |
3241 | &peer); |
3242 | } |
3243 | |
3244 | update_state_connection(st, r); |
3245 | c = r; /* c not subsequently used */ |
Value stored to 'c' is never read | |
3246 | /* redo from scratch so we read and check CERT payload */ |
3247 | dbg("retrying ike_decode_peer_id() with new conn"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("retrying ike_decode_peer_id() with new conn") ; } }; |
3248 | passert(!initiator && !aggrmode)({ _Bool assertion__ = !initiator && !aggrmode; if (! assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3248, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "!initiator && !aggrmode" ); } (void) 1; }); |
3249 | return ikev1_decode_peer_id(md, false0, false0); |
3250 | } else if (c->spd.that.has_id_wildcards) { |
3251 | duplicate_id(&c->spd.that.id, &peer); |
3252 | c->spd.that.has_id_wildcards = false0; |
3253 | } else if (fromcert) { |
3254 | dbg("copying ID for fromcert"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("copying ID for fromcert"); } }; |
3255 | duplicate_id(&c->spd.that.id, &peer); |
3256 | } |
3257 | } |
3258 | |
3259 | return true1; |
3260 | } |
3261 | |
3262 | bool_Bool ikev1_ship_chain(chunk_t *chain, int n, pb_stream *outs, |
3263 | uint8_t type) |
3264 | { |
3265 | for (int i = 0; i < n; i++) { |
3266 | if (!ikev1_ship_CERT(type, HUNK_AS_SHUNK(chain[i])({ typeof(chain[i]) h_ = (chain[i]); shunk2(h_.ptr, h_.len); } ), outs)) |
3267 | return false0; |
3268 | } |
3269 | |
3270 | return true1; |
3271 | } |
3272 | |
3273 | void doi_log_cert_thinking(uint16_t auth, |
3274 | enum ike_cert_type certtype, |
3275 | enum certpolicy policy, |
3276 | bool_Bool gotcertrequest, |
3277 | bool_Bool send_cert, |
3278 | bool_Bool send_chain) |
3279 | { |
3280 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
3281 | DBG_log("thinking about whether to send my certificate:"); |
3282 | |
3283 | esb_buf oan; |
3284 | esb_buf ictn; |
3285 | DBG_log(" I have RSA key: %s cert.type: %s ", |
3286 | enum_show(&oakley_auth_names, auth, &oan), |
3287 | enum_show(&ike_cert_type_names, certtype, &ictn)); |
3288 | |
3289 | esb_buf cptn; |
3290 | DBG_log(" sendcert: %s and I did%s get a certificate request ", |
3291 | enum_show(&certpolicy_type_names, policy, &cptn), |
3292 | gotcertrequest ? "" : " not"); |
3293 | |
3294 | DBG_log(" so %ssend cert.", send_cert ? "" : "do not "); |
3295 | |
3296 | if (!send_cert) { |
3297 | if (auth == OAKLEY_PRESHARED_KEY) { |
3298 | DBG_log("I did not send a certificate because digital signatures are not being used. (PSK)"); |
3299 | } else if (certtype == CERT_NONE) { |
3300 | DBG_log("I did not send a certificate because I do not have one."); |
3301 | } else if (policy == CERT_SENDIFASKED) { |
3302 | DBG_log("I did not send my certificate because I was not asked to."); |
3303 | } else { |
3304 | DBG_log("INVALID AUTH SETTING: %d", auth); |
3305 | } |
3306 | } |
3307 | if (send_chain) |
3308 | DBG_log("Sending one or more authcerts"); |
3309 | } |
3310 | } |
3311 | |
3312 | /* |
3313 | * an ISAKMP SA has been established. |
3314 | * Note the serial number, and release any connections with |
3315 | * the same peer ID but different peer IP address. |
3316 | * |
3317 | * Called by IKEv1 and IKEv2 when the IKE SA is established. |
3318 | * It checks if the freshly established connection needs is |
3319 | * replacing an established version of itself. |
3320 | * |
3321 | * The use of uniqueIDs is mostly historic and might be removed |
3322 | * in a future version. It is ignored for PSK based connections, |
3323 | * which only act based on being a "server using PSK". |
3324 | * |
3325 | * IKEv1 code does not send or process INITIAL_CONTACT |
3326 | * IKEv2 codes does so we take it into account. |
3327 | */ |
3328 | |
3329 | void ISAKMP_SA_established(const struct ike_sa *ike) |
3330 | { |
3331 | struct connection *c = ike->sa.st_connection; |
3332 | bool_Bool authnull = (LIN(POLICY_AUTH_NULL, c->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (c->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || c->spd.that.authby == AUTHBY_NULL); |
3333 | |
3334 | if (c->spd.this.xauth_server && LIN(POLICY_PSK, c->policy)(((((lset_t)1 << (POLICY_PSK_IX))) & (c->policy) ) == (((lset_t)1 << (POLICY_PSK_IX))))) { |
3335 | /* |
3336 | * If we are a server and use PSK, all clients use the same group ID |
3337 | * Note that "xauth_server" also refers to IKEv2 CP |
3338 | */ |
3339 | dbg("We are a server using PSK and clients are using a group ID"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We are a server using PSK and clients are using a group ID" ); } }; |
3340 | } else if (!uniqueIDs) { |
3341 | dbg("uniqueIDs disabled, not contemplating releasing older self"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("uniqueIDs disabled, not contemplating releasing older self" ); } }; |
3342 | } else { |
3343 | /* |
3344 | * for all existing connections: if the same Phase 1 IDs are used, |
3345 | * unorient the (old) connection (if different from current connection) |
3346 | * Only do this for connections with the same name (can be shared ike sa) |
3347 | */ |
3348 | struct connection_query cq = { .where = HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3348, }; &here; }), .c = NULL((void*)0), }; |
3349 | while (new2old_connection(&cq)) { |
3350 | struct connection *d = cq.c; |
3351 | |
3352 | /* if old IKE SA is same as new IKE sa and non-auth isn't overwrting auth */ |
3353 | if (c != d && c->kind == d->kind && streq(c->name, d->name)(strcmp((c->name), (d->name)) == 0) && |
3354 | same_id(&c->spd.this.id, &d->spd.this.id) && |
3355 | same_id(&c->spd.that.id, &d->spd.that.id)) |
3356 | { |
3357 | bool_Bool old_is_nullauth = (LIN(POLICY_AUTH_NULL, d->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (d->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || d->spd.that.authby == AUTHBY_NULL); |
3358 | bool_Bool same_remote_ip = sameaddr(&c->spd.that.host_addr, &d->spd.that.host_addr); |
3359 | |
3360 | if (same_remote_ip && (!old_is_nullauth && authnull)) { |
3361 | log_state(RC_LOG, &ike->sa, "cannot replace old authenticated connection with authnull connection"); |
3362 | } else if (!same_remote_ip && old_is_nullauth && authnull) { |
3363 | log_state(RC_LOG, &ike->sa, "NULL auth ID for different IP's cannot replace each other"); |
3364 | } else { |
3365 | dbg("unorienting old connection with same IDs"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unorienting old connection with same IDs"); } }; |
3366 | /* |
3367 | * When replacing an old |
3368 | * existing connection, |
3369 | * suppress sending delete |
3370 | * notify |
3371 | */ |
3372 | suppress_delete_notify(ike, "ISAKMP", d->newest_ike_sa); |
3373 | suppress_delete_notify(ike, "IKE", d->newest_ipsec_sa); |
3374 | /* |
3375 | * XXX: Assume this call |
3376 | * doesn't want to log to |
3377 | * whack? Even though the IKE |
3378 | * SA may have whack attached, |
3379 | * don't transfer it to the |
3380 | * old connection. |
3381 | */ |
3382 | if (d->kind == CK_INSTANCE) { |
3383 | delete_connection(&d, /*relations?*/false0); |
3384 | } else { |
3385 | release_connection(d, /*relations?*/false0); /* this deletes the states */ |
3386 | } |
3387 | } |
3388 | } |
3389 | } |
3390 | |
3391 | /* |
3392 | * This only affects IKEv2, since we don't store any |
3393 | * received INITIAL_CONTACT for IKEv1. |
3394 | * We don't do this on IKEv1, because it seems to |
3395 | * confuse various third parties (Windows, Cisco VPN 300, |
3396 | * and juniper |
3397 | * likely because this would be called before the IPsec SA |
3398 | * of QuickMode is installed, so the remote endpoints view |
3399 | * this IKE SA still as the active one? |
3400 | */ |
3401 | if (ike->sa.st_ike_seen_v2n_initial_contact) { |
3402 | if (c->newest_ike_sa != SOS_NOBODY0 && |
3403 | c->newest_ike_sa != ike->sa.st_serialno) { |
3404 | struct state *old_p1 = state_by_serialno(c->newest_ike_sa); |
3405 | |
3406 | dbg("deleting replaced IKE state for %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } } |
3407 | old_p1->st_connection->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } }; |
3408 | old_p1->st_send_delete = DONT_SEND_DELETE; |
3409 | event_force(EVENT_SA_EXPIRE, old_p1); |
3410 | } |
3411 | |
3412 | if (c->newest_ipsec_sa != SOS_NOBODY0) { |
3413 | struct state *old_p2 = state_by_serialno(c->newest_ipsec_sa); |
3414 | struct connection *d = old_p2 == NULL((void*)0) ? NULL((void*)0) : old_p2->st_connection; |
3415 | |
3416 | if (c == d && same_id(&c->spd.that.id, &d->spd.that.id)) { |
3417 | dbg("Initial Contact received, deleting old state #%lu from connection '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } } |
3418 | c->newest_ipsec_sa, c->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } }; |
3419 | old_p2->st_send_delete = DONT_SEND_DELETE; |
3420 | event_force(EVENT_SA_EXPIRE, old_p2); |
3421 | } |
3422 | } |
3423 | } |
3424 | } |
3425 | |
3426 | c->newest_ike_sa = ike->sa.st_serialno; |
3427 | } |
3428 | |
3429 | /* |
3430 | * Reply messages are built in this nasty evil global buffer. |
3431 | * |
3432 | * Only one packet can be built at a time. That should be ok as |
3433 | * packets are only built on the main thread and code and a packet is |
3434 | * created using a single operation. |
3435 | * |
3436 | * In the good old days code would partially construct a packet, |
3437 | * wonder off to do crypto and process other packets, and then assume |
3438 | * things could be picked up where they were left off. Code to make |
3439 | * that work (saving restoring the buffer, re-initializing the buffer |
3440 | * in strange places, ....) has all been removed. |
3441 | * |
3442 | * Something else that should go is global access to REPLY_STREAM. |
3443 | * Instead all code should use open_reply_stream() and a reference |
3444 | * with only local scope. This should reduce the odds of code |
3445 | * meddling in reply_stream on the sly. |
3446 | * |
3447 | * Another possibility is to move the buffer onto the stack. However, |
3448 | * the PBS is 64K and that isn't so good for small machines. Then |
3449 | * again the send.[hc] and demux[hc] code both allocate 64K stack |
3450 | * buffers already. Oops. |
3451 | */ |
3452 | |
3453 | pb_stream reply_stream; |