File: | programs/pluto/ikev1.c |
Warning: | line 2175, column 23 Access to field 'st_logger' results in a dereference of a null pointer (loaded from variable 'st') |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* State machine for IKEv1 | |||
2 | * | |||
3 | * Copyright (C) 1997 Angelos D. Keromytis. | |||
4 | * Copyright (C) 1998-2010,2013-2016 D. Hugh Redelmeier <hugh@mimosa.com> | |||
5 | * Copyright (C) 2003-2008 Michael Richardson <mcr@xelerance.com> | |||
6 | * Copyright (C) 2008-2009 David McCullough <david_mccullough@securecomputing.com> | |||
7 | * Copyright (C) 2008-2010 Paul Wouters <paul@xelerance.com> | |||
8 | * Copyright (C) 2011 Avesh Agarwal <avagarwa@redhat.com> | |||
9 | * Copyright (C) 2008 Hiren Joshi <joshihirenn@gmail.com> | |||
10 | * Copyright (C) 2009 Anthony Tong <atong@TrustedCS.com> | |||
11 | * Copyright (C) 2012-2019 Paul Wouters <pwouters@redhat.com> | |||
12 | * Copyright (C) 2013 Wolfgang Nothdurft <wolfgang@linogate.de> | |||
13 | * Copyright (C) 2019-2019 Andrew Cagney <cagney@gnu.org> | |||
14 | * | |||
15 | * This program is free software; you can redistribute it and/or modify it | |||
16 | * under the terms of the GNU General Public License as published by the | |||
17 | * Free Software Foundation; either version 2 of the License, or (at your | |||
18 | * option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>. | |||
19 | * | |||
20 | * This program is distributed in the hope that it will be useful, but | |||
21 | * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY | |||
22 | * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |||
23 | * for more details. | |||
24 | * | |||
25 | */ | |||
26 | ||||
27 | /* Ordering Constraints on Payloads | |||
28 | * | |||
29 | * rfc2409: The Internet Key Exchange (IKE) | |||
30 | * | |||
31 | * 5 Exchanges: | |||
32 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." | |||
33 | * | |||
34 | * "Except where otherwise noted, there are no requirements for ISAKMP | |||
35 | * payloads in any message to be in any particular order." | |||
36 | * | |||
37 | * 5.3 Phase 1 Authenticated With a Revised Mode of Public Key Encryption: | |||
38 | * | |||
39 | * "If the HASH payload is sent it MUST be the first payload of the | |||
40 | * second message exchange and MUST be followed by the encrypted | |||
41 | * nonce. If the HASH payload is not sent, the first payload of the | |||
42 | * second message exchange MUST be the encrypted nonce." | |||
43 | * | |||
44 | * "Save the requirements on the location of the optional HASH payload | |||
45 | * and the mandatory nonce payload there are no further payload | |||
46 | * requirements. All payloads-- in whatever order-- following the | |||
47 | * encrypted nonce MUST be encrypted with Ke_i or Ke_r depending on the | |||
48 | * direction." | |||
49 | * | |||
50 | * 5.5 Phase 2 - Quick Mode | |||
51 | * | |||
52 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP | |||
53 | * header and a SA payload MUST immediately follow the HASH." | |||
54 | * [NOTE: there may be more than one SA payload, so this is not | |||
55 | * totally reasonable. Probably all SAs should be so constrained.] | |||
56 | * | |||
57 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
58 | * party, the identities of the parties MUST be passed as IDci and | |||
59 | * then IDcr." | |||
60 | * | |||
61 | * "With the exception of the HASH, SA, and the optional ID payloads, | |||
62 | * there are no payload ordering restrictions on Quick Mode." | |||
63 | */ | |||
64 | ||||
65 | /* Unfolding of Identity -- a central mystery | |||
66 | * | |||
67 | * This concerns Phase 1 identities, those of the IKE hosts. | |||
68 | * These are the only ones that are authenticated. Phase 2 | |||
69 | * identities are for IPsec SAs. | |||
70 | * | |||
71 | * There are three case of interest: | |||
72 | * | |||
73 | * (1) We initiate, based on a whack command specifying a Connection. | |||
74 | * We know the identity of the peer from the Connection. | |||
75 | * | |||
76 | * (2) (to be implemented) we initiate based on a flow from our client | |||
77 | * to some IP address. | |||
78 | * We immediately know one of the peer's client IP addresses from | |||
79 | * the flow. We must use this to figure out the peer's IP address | |||
80 | * and Id. To be solved. | |||
81 | * | |||
82 | * (3) We respond to an IKE negotiation. | |||
83 | * We immediately know the peer's IP address. | |||
84 | * We get an ID Payload in Main I2. | |||
85 | * | |||
86 | * Unfortunately, this is too late for a number of things: | |||
87 | * - the ISAKMP SA proposals have already been made (Main I1) | |||
88 | * AND one accepted (Main R1) | |||
89 | * - the SA includes a specification of the type of ID | |||
90 | * authentication so this is negotiated without being told the ID. | |||
91 | * - with Preshared Key authentication, Main I2 is encrypted | |||
92 | * using the key, so it cannot be decoded to reveal the ID | |||
93 | * without knowing (or guessing) which key to use. | |||
94 | * | |||
95 | * There are three reasonable choices here for the responder: | |||
96 | * + assume that the initiator is making wise offers since it | |||
97 | * knows the IDs involved. We can balk later (but not gracefully) | |||
98 | * when we find the actual initiator ID | |||
99 | * + attempt to infer identity by IP address. Again, we can balk | |||
100 | * when the true identity is revealed. Actually, it is enough | |||
101 | * to infer properties of the identity (eg. SA properties and | |||
102 | * PSK, if needed). | |||
103 | * + make all properties universal so discrimination based on | |||
104 | * identity isn't required. For example, always accept the same | |||
105 | * kinds of encryption. Accept Public Key Id authentication | |||
106 | * since the Initiator presumably has our public key and thinks | |||
107 | * we must have / can find peers. This approach is weakest | |||
108 | * for preshared key since the actual key must be known to | |||
109 | * decrypt the Initiator's ID Payload. | |||
110 | * These choices can be blended. For example, a class of Identities | |||
111 | * can be inferred, sufficient to select a preshared key but not | |||
112 | * sufficient to infer a unique identity. | |||
113 | */ | |||
114 | ||||
115 | #include <stdio.h> | |||
116 | #include <stdlib.h> | |||
117 | #include <stddef.h> | |||
118 | #include <string.h> | |||
119 | #include <unistd.h> | |||
120 | #include <errno(*__errno_location ()).h> | |||
121 | #include <sys/types.h> | |||
122 | #include <sys/socket.h> | |||
123 | #include <netinet/in.h> | |||
124 | #include <arpa/inet.h> | |||
125 | ||||
126 | ||||
127 | #include "sysdep.h" | |||
128 | #include "constants.h" | |||
129 | ||||
130 | #include "defs.h" | |||
131 | #include "ike_spi.h" | |||
132 | #include "id.h" | |||
133 | #include "x509.h" | |||
134 | #include "pluto_x509.h" | |||
135 | #include "certs.h" | |||
136 | #include "connections.h" /* needs id.h */ | |||
137 | #include "state.h" | |||
138 | #include "ikev1_msgid.h" | |||
139 | #include "packet.h" | |||
140 | #include "crypto.h" | |||
141 | #include "ike_alg.h" | |||
142 | #include "log.h" | |||
143 | #include "demux.h" /* needs packet.h */ | |||
144 | #include "ikev1.h" | |||
145 | #include "ipsec_doi.h" /* needs demux.h and state.h */ | |||
146 | #include "ikev1_quick.h" | |||
147 | #include "timer.h" | |||
148 | #include "whack.h" /* requires connections.h */ | |||
149 | #include "server.h" | |||
150 | #include "send.h" | |||
151 | #include "ikev1_send.h" | |||
152 | #include "ikev1_xauth.h" | |||
153 | #include "retransmit.h" | |||
154 | #include "nat_traversal.h" | |||
155 | #include "ikev1_nat.h" | |||
156 | #include "vendor.h" | |||
157 | #include "ikev1_dpd.h" | |||
158 | #include "host_pair.h" | |||
159 | #include "ip_address.h" | |||
160 | #include "ikev1_hash.h" | |||
161 | #include "ike_alg_encrypt_ops.h" /* XXX: oops */ | |||
162 | #include "ikev1_states.h" | |||
163 | #include "initiate.h" | |||
164 | #include "iface.h" | |||
165 | #include "ip_selector.h" | |||
166 | #include "unpack.h" | |||
167 | #include "pending.h" | |||
168 | #include "state_db.h" | |||
169 | ||||
170 | #ifdef HAVE_NM1 | |||
171 | #include "kernel.h" | |||
172 | #endif | |||
173 | ||||
174 | #include "pluto_stats.h" | |||
175 | ||||
176 | /* | |||
177 | * state_v1_microcode is a tuple of information parameterizing certain | |||
178 | * centralized processing of a packet. For example, it roughly | |||
179 | * specifies what payloads are expected in this message. The | |||
180 | * microcode is selected primarily based on the state. In Phase 1, | |||
181 | * the payload structure often depends on the authentication | |||
182 | * technique, so that too plays a part in selecting the | |||
183 | * state_v1_microcode to use. | |||
184 | */ | |||
185 | ||||
186 | struct state_v1_microcode { | |||
187 | enum state_kind state, next_state; | |||
188 | lset_t flags; | |||
189 | lset_t req_payloads; /* required payloads (allows just one) */ | |||
190 | lset_t opt_payloads; /* optional payloads (any number) */ | |||
191 | enum event_type timeout_event; | |||
192 | ikev1_state_transition_fn *processor; | |||
193 | const char *message; | |||
194 | enum v1_hash_type hash_type; | |||
195 | }; | |||
196 | ||||
197 | void jam_v1_transition(struct jambuf *buf, const struct state_v1_microcode *transition) | |||
198 | { | |||
199 | if (transition == NULL((void*)0)) { | |||
200 | jam(buf, "NULL"); | |||
201 | } else { | |||
202 | jam(buf, "%s->%s", | |||
203 | finite_states[transition->state]->short_name, | |||
204 | finite_states[transition->next_state]->short_name); | |||
205 | } | |||
206 | } | |||
207 | ||||
208 | /* State Microcode Flags, in several groups */ | |||
209 | ||||
210 | /* Oakley Auth values: to which auth values does this entry apply? | |||
211 | * Most entries will use SMF_ALL_AUTH because they apply to all. | |||
212 | * Note: SMF_ALL_AUTH matches 0 for those circumstances when no auth | |||
213 | * has been set. | |||
214 | * | |||
215 | * The IKEv1 state machine then uses the auth type (SMF_*_AUTH flags) | |||
216 | * to select the exact state transition. For states where auth | |||
217 | * (SMF_*_AUTH flags) don't apply (.e.g, child states) | |||
218 | * flags|=SMF_ALL_AUTH so the first transition always matches. | |||
219 | * | |||
220 | * Once a transition is selected, the containing payloads are checked | |||
221 | * against what is allowed. For instance, in STATE_MAIN_R2 -> | |||
222 | * STATE_MAIN_R3 with SMF_DS_AUTH requires P(SIG). | |||
223 | * | |||
224 | * In IKEv2, it is the message header and payload types that select | |||
225 | * the state. As for how the IKEv1 'from state' is selected, look for | |||
226 | * a big nasty magic switch. | |||
227 | * | |||
228 | * XXX: the state transition table is littered with STATE_UNDEFINED / | |||
229 | * SMF_ALL_AUTH / unexpected() entries. These are to catch things | |||
230 | * like unimplemented auth cases, and unexpected packets. For the | |||
231 | * latter, they seem to be place holders so that the table contains at | |||
232 | * least one entry for the state. | |||
233 | * | |||
234 | * XXX: Some of the SMF flags specify attributes of the current state | |||
235 | * (e.g., SMF_RETRANSMIT_ON_DUPLICATE), some apply to the state | |||
236 | * transition (e.g., SMF_REPLY), and some can be interpreted as either | |||
237 | * (.e.g., SMF_INPUT_ENCRYPTED). | |||
238 | */ | |||
239 | #define SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) LRANGE(0, OAKLEY_AUTH_ROOF - 1)(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | |||
240 | #define SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) LELEM(OAKLEY_PRESHARED_KEY)((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | |||
241 | #define SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) (LELEM(OAKLEY_DSS_SIG)((lset_t)1 << (OAKLEY_DSS_SIG)) | LELEM(OAKLEY_RSA_SIG)((lset_t)1 << (OAKLEY_RSA_SIG))) | |||
242 | #define SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) LELEM(OAKLEY_RSA_ENC)((lset_t)1 << (OAKLEY_RSA_ENC)) | |||
243 | #define SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) LELEM(OAKLEY_RSA_REVISED_MODE)((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | |||
244 | ||||
245 | /* misc flags */ | |||
246 | #define SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) LELEM(OAKLEY_AUTH_ROOF + 0)((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | |||
247 | #define SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) LELEM(OAKLEY_AUTH_ROOF + 1)((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | |||
248 | #define SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) LELEM(OAKLEY_AUTH_ROOF + 2)((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | |||
249 | #define SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) LELEM(OAKLEY_AUTH_ROOF + 3)((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | |||
250 | #define SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) LELEM(OAKLEY_AUTH_ROOF + 4)((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)) | |||
251 | ||||
252 | #define SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) (SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | |||
253 | ||||
254 | /* this state generates a reply message */ | |||
255 | #define SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) LELEM(OAKLEY_AUTH_ROOF + 5)((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | |||
256 | ||||
257 | /* this state completes P1, so any pending P2 negotiations should start */ | |||
258 | #define SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) LELEM(OAKLEY_AUTH_ROOF + 6)((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | |||
259 | ||||
260 | /* if we have canoncalized the authentication from XAUTH mode */ | |||
261 | #define SMF_XAUTH_AUTH((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) LELEM(OAKLEY_AUTH_ROOF + 7)((lset_t)1 << (OAKLEY_AUTH_ROOF + 7)) | |||
262 | ||||
263 | /* end of flags */ | |||
264 | ||||
265 | static ikev1_state_transition_fn unexpected; /* forward declaration */ | |||
266 | static ikev1_state_transition_fn informational; /* forward declaration */ | |||
267 | ||||
268 | /* | |||
269 | * v1_state_microcode_table is a table of all state_v1_microcode | |||
270 | * tuples. It must be in order of state (the first element). After | |||
271 | * initialization, ike_microcode_index[s] points to the first entry in | |||
272 | * v1_state_microcode_table for state s. Remember that each state | |||
273 | * name in Main or Quick Mode describes what has happened in the past, | |||
274 | * not what this message is. | |||
275 | */ | |||
276 | ||||
277 | static const struct state_v1_microcode v1_state_microcode_table[] = { | |||
278 | ||||
279 | #define P(n) LELEM(ISAKMP_NEXT_ ##n)((lset_t)1 << (ISAKMP_NEXT_ ##n)) | |||
280 | #define FM(F) .processor = F, .message = #F | |||
281 | ||||
282 | /***** Phase 1 Main Mode *****/ | |||
283 | ||||
284 | /* No state for main_outI1: --> HDR, SA */ | |||
285 | ||||
286 | /* STATE_MAIN_R0: I1 --> R1 | |||
287 | * HDR, SA --> HDR, SA | |||
288 | */ | |||
289 | { STATE_MAIN_R0, STATE_MAIN_R1, | |||
290 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
291 | P(SA), P(VID) | P(CR), | |||
292 | EVENT_SA_DISCARD, | |||
293 | FM(main_inI1_outR1), | |||
294 | .hash_type = V1_HASH_NONE, }, | |||
295 | ||||
296 | /* STATE_MAIN_I1: R1 --> I2 | |||
297 | * HDR, SA --> auth dependent | |||
298 | * SMF_PSK_AUTH, SMF_DS_AUTH: --> HDR, KE, Ni | |||
299 | * SMF_PKE_AUTH: | |||
300 | * --> HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r | |||
301 | * SMF_RPKE_AUTH: | |||
302 | * --> HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] | |||
303 | * Note: since we don't know auth at start, we cannot differentiate | |||
304 | * microcode entries based on it. | |||
305 | */ | |||
306 | { STATE_MAIN_I1, STATE_MAIN_I2, | |||
307 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
308 | P(SA), P(VID) | P(CR), | |||
309 | EVENT_RETRANSMIT, | |||
310 | FM(main_inR1_outI2), | |||
311 | .hash_type = V1_HASH_NONE, }, | |||
312 | ||||
313 | /* STATE_MAIN_R1: I2 --> R2 | |||
314 | * SMF_PSK_AUTH, SMF_DS_AUTH: HDR, KE, Ni --> HDR, KE, Nr | |||
315 | * SMF_PKE_AUTH: HDR, KE, [ HASH(1), ] <IDi1_b>PubKey_r, <Ni_b>PubKey_r | |||
316 | * --> HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i | |||
317 | * SMF_RPKE_AUTH: | |||
318 | * HDR, [ HASH(1), ] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDi1_b>Ke_i [,<<Cert-I_b>Ke_i] | |||
319 | * --> HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r | |||
320 | */ | |||
321 | { STATE_MAIN_R1, STATE_MAIN_R2, | |||
322 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
323 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), | |||
324 | EVENT_RETRANSMIT, | |||
325 | FM(main_inI2_outR2), | |||
326 | .hash_type = V1_HASH_NONE, }, | |||
327 | ||||
328 | { STATE_MAIN_R1, STATE_UNDEFINED, | |||
329 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
330 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR) | P(HASH), | |||
331 | EVENT_RETRANSMIT, | |||
332 | FM(unexpected) /* ??? not yet implemented */, | |||
333 | .hash_type = V1_HASH_NONE, }, | |||
334 | ||||
335 | { STATE_MAIN_R1, STATE_UNDEFINED, | |||
336 | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
337 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR) | P(HASH) | P(CERT), | |||
338 | EVENT_RETRANSMIT, | |||
339 | FM(unexpected) /* ??? not yet implemented */, | |||
340 | .hash_type = V1_HASH_NONE, }, | |||
341 | ||||
342 | /* for states from here on, output message must be encrypted */ | |||
343 | ||||
344 | /* STATE_MAIN_I2: R2 --> I3 | |||
345 | * SMF_PSK_AUTH: HDR, KE, Nr --> HDR*, IDi1, HASH_I | |||
346 | * SMF_DS_AUTH: HDR, KE, Nr --> HDR*, IDi1, [ CERT, ] SIG_I | |||
347 | * SMF_PKE_AUTH: HDR, KE, <IDr1_b>PubKey_i, <Nr_b>PubKey_i | |||
348 | * --> HDR*, HASH_I | |||
349 | * SMF_RPKE_AUTH: HDR, <Nr_b>PubKey_i, <KE_b>Ke_r, <IDr1_b>Ke_r | |||
350 | * --> HDR*, HASH_I | |||
351 | */ | |||
352 | { STATE_MAIN_I2, STATE_MAIN_I3, | |||
353 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
354 | P(KE) | P(NONCE), P(VID) | P(CR) | P(NATD_RFC), | |||
355 | EVENT_RETRANSMIT, | |||
356 | FM(main_inR2_outI3), | |||
357 | /* calls main_mode_hash() after DH */ | |||
358 | .hash_type = V1_HASH_NONE, }, | |||
359 | ||||
360 | { STATE_MAIN_I2, STATE_UNDEFINED, | |||
361 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
362 | P(KE) | P(ID) | P(NONCE), P(VID) | P(CR), | |||
363 | EVENT_RETRANSMIT, | |||
364 | FM(unexpected) /* ??? not yet implemented */, | |||
365 | .hash_type = V1_HASH_NONE, }, | |||
366 | ||||
367 | { STATE_MAIN_I2, STATE_UNDEFINED, | |||
368 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
369 | P(NONCE) | P(KE) | P(ID), P(VID) | P(CR), | |||
370 | EVENT_RETRANSMIT, | |||
371 | FM(unexpected) /* ??? not yet implemented */, | |||
372 | .hash_type = V1_HASH_NONE, }, | |||
373 | ||||
374 | /* for states from here on, input message must be encrypted */ | |||
375 | ||||
376 | /* STATE_MAIN_R2: I3 --> R3 | |||
377 | * SMF_PSK_AUTH: HDR*, IDi1, HASH_I --> HDR*, IDr1, HASH_R | |||
378 | * SMF_DS_AUTH: HDR*, IDi1, [ CERT, ] SIG_I --> HDR*, IDr1, [ CERT, ] SIG_R | |||
379 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_I --> HDR*, HASH_R | |||
380 | */ | |||
381 | { STATE_MAIN_R2, STATE_MAIN_R3, | |||
382 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
383 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
384 | P(ID) | P(HASH), P(VID) | P(CR), | |||
385 | EVENT_SA_REPLACE, | |||
386 | FM(main_inI3_outR3), | |||
387 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
388 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
389 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ | |||
390 | .hash_type = V1_HASH_NONE, }, | |||
391 | ||||
392 | { STATE_MAIN_R2, STATE_MAIN_R3, | |||
393 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
394 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
395 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), | |||
396 | EVENT_SA_REPLACE, | |||
397 | FM(main_inI3_outR3), | |||
398 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
399 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
400 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) | |||
401 | SIG_I = SIGN(HASH_I) *", | |||
402 | SIG_I = SIGN(HASH_I) */ | |||
403 | .hash_type = V1_HASH_NONE, }, | |||
404 | ||||
405 | { STATE_MAIN_R2, STATE_UNDEFINED, | |||
406 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
407 | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
408 | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
409 | P(HASH), P(VID) | P(CR), | |||
410 | EVENT_SA_REPLACE, | |||
411 | FM(unexpected) /* ??? not yet implemented */, | |||
412 | .hash_type = V1_HASH_NONE, }, | |||
413 | ||||
414 | /* STATE_MAIN_I3: R3 --> done | |||
415 | * SMF_PSK_AUTH: HDR*, IDr1, HASH_R --> done | |||
416 | * SMF_DS_AUTH: HDR*, IDr1, [ CERT, ] SIG_R --> done | |||
417 | * SMF_PKE_AUTH, SMF_RPKE_AUTH: HDR*, HASH_R --> done | |||
418 | * May initiate quick mode by calling quick_outI1 | |||
419 | */ | |||
420 | { STATE_MAIN_I3, STATE_MAIN_I4, | |||
421 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
422 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
423 | P(ID) | P(HASH), P(VID) | P(CR), | |||
424 | EVENT_SA_REPLACE, | |||
425 | FM(main_inR3), | |||
426 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
427 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
428 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ | |||
429 | .hash_type = V1_HASH_NONE, }, | |||
430 | ||||
431 | { STATE_MAIN_I3, STATE_MAIN_I4, | |||
432 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
433 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
434 | P(ID) | P(SIG), P(VID) | P(CR) | P(CERT), | |||
435 | EVENT_SA_REPLACE, | |||
436 | FM(main_inR3), | |||
437 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
438 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
439 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) | |||
440 | SIG_R = SIGN(HASH_R) */ | |||
441 | .hash_type = V1_HASH_NONE, }, | |||
442 | ||||
443 | { STATE_MAIN_I3, STATE_UNDEFINED, | |||
444 | SMF_PKE_AUTH((lset_t)1 << (OAKLEY_RSA_ENC)) | SMF_RPKE_AUTH((lset_t)1 << (OAKLEY_RSA_REVISED_MODE)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | | |||
445 | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
446 | P(HASH), P(VID) | P(CR), | |||
447 | EVENT_SA_REPLACE, | |||
448 | FM(unexpected) /* ??? not yet implemented */, | |||
449 | .hash_type = V1_HASH_NONE, }, | |||
450 | ||||
451 | /* STATE_MAIN_R3: can only get here due to packet loss */ | |||
452 | { STATE_MAIN_R3, STATE_UNDEFINED, | |||
453 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
454 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
455 | EVENT_NULL, | |||
456 | FM(unexpected), | |||
457 | .hash_type = V1_HASH_NONE, }, | |||
458 | ||||
459 | /* STATE_MAIN_I4: can only get here due to packet loss */ | |||
460 | { STATE_MAIN_I4, STATE_UNDEFINED, | |||
461 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
462 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
463 | EVENT_NULL, | |||
464 | FM(unexpected), | |||
465 | .hash_type = V1_HASH_NONE, }, | |||
466 | ||||
467 | /***** Phase 1 Aggressive Mode *****/ | |||
468 | ||||
469 | /* No initial state for aggr_outI1: | |||
470 | * SMF_DS_AUTH (RFC 2409 5.1) and SMF_PSK_AUTH (RFC 2409 5.4): | |||
471 | * -->HDR, SA, KE, Ni, IDii | |||
472 | * | |||
473 | * Not implemented: | |||
474 | * RFC 2409 5.2: --> HDR, SA, [ HASH(1),] KE, <IDii_b>Pubkey_r, <Ni_b>Pubkey_r | |||
475 | * RFC 2409 5.3: --> HDR, SA, [ HASH(1),] <Ni_b>Pubkey_r, <KE_b>Ke_i, <IDii_b>Ke_i [, <Cert-I_b>Ke_i ] | |||
476 | */ | |||
477 | ||||
478 | /* STATE_AGGR_R0: | |||
479 | * SMF_PSK_AUTH: HDR, SA, KE, Ni, IDii | |||
480 | * --> HDR, SA, KE, Nr, IDir, HASH_R | |||
481 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDii | |||
482 | * --> HDR, SA, KE, Nr, IDir, [CERT,] SIG_R | |||
483 | */ | |||
484 | { STATE_AGGR_R0, STATE_AGGR_R1, | |||
485 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
486 | P(SA) | P(KE) | P(NONCE) | P(ID), P(VID) | P(NATD_RFC), | |||
487 | EVENT_SA_DISCARD, | |||
488 | FM(aggr_inI1_outR1), | |||
489 | /* N/A */ | |||
490 | .hash_type = V1_HASH_NONE, }, | |||
491 | ||||
492 | /* STATE_AGGR_I1: | |||
493 | * SMF_PSK_AUTH: HDR, SA, KE, Nr, IDir, HASH_R | |||
494 | * --> HDR*, HASH_I | |||
495 | * SMF_DS_AUTH: HDR, SA, KE, Nr, IDir, [CERT,] SIG_R | |||
496 | * --> HDR*, [CERT,] SIG_I | |||
497 | */ | |||
498 | { STATE_AGGR_I1, STATE_AGGR_I2, | |||
499 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | | |||
500 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
501 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(HASH), P(VID) | P(NATD_RFC), | |||
502 | EVENT_SA_REPLACE, | |||
503 | FM(aggr_inR1_outI2), | |||
504 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
505 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
506 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) */ | |||
507 | .hash_type = V1_HASH_NONE, }, | |||
508 | ||||
509 | { STATE_AGGR_I1, STATE_AGGR_I2, | |||
510 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | | |||
511 | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
512 | P(SA) | P(KE) | P(NONCE) | P(ID) | P(SIG), P(VID) | P(NATD_RFC), | |||
513 | EVENT_SA_REPLACE, | |||
514 | FM(aggr_inR1_outI2), | |||
515 | /* after DH calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
516 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
517 | HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b ) | |||
518 | SIG_R = SIGN(HASH_R) */ | |||
519 | .hash_type = V1_HASH_NONE, }, | |||
520 | ||||
521 | /* STATE_AGGR_R1: | |||
522 | * SMF_PSK_AUTH: HDR*, HASH_I --> done | |||
523 | * SMF_DS_AUTH: HDR*, SIG_I --> done | |||
524 | */ | |||
525 | { STATE_AGGR_R1, STATE_AGGR_R2, | |||
526 | SMF_PSK_AUTH((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
527 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | | |||
528 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
529 | P(HASH), P(VID) | P(NATD_RFC), | |||
530 | EVENT_SA_REPLACE, | |||
531 | FM(aggr_inI2), | |||
532 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
533 | /* RFC 2409: 5. Exchanges & 5.2 Phase 1 Authenticated With Public Key Encryption | |||
534 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) */ | |||
535 | .hash_type = V1_HASH_NONE, }, | |||
536 | ||||
537 | { STATE_AGGR_R1, STATE_AGGR_R2, | |||
538 | SMF_DS_AUTH(((lset_t)1 << (OAKLEY_DSS_SIG)) | ((lset_t)1 << ( OAKLEY_RSA_SIG))) | SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)) | | |||
539 | SMF_OUTPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 3)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)) | | |||
540 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
541 | P(SIG), P(VID) | P(NATD_RFC), | |||
542 | EVENT_SA_REPLACE, | |||
543 | FM(aggr_inI2), | |||
544 | /* calls oakley_id_and_auth() which calls main_mode_hash() */ | |||
545 | /* RFC 2409: 5. Exchanges & 5.1 IKE Phase 1 Authenticated With Signatures | |||
546 | HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b ) | |||
547 | SIG_I = SIGN(HASH_I) */ | |||
548 | .hash_type = V1_HASH_NONE, }, | |||
549 | ||||
550 | /* STATE_AGGR_I2: can only get here due to packet loss */ | |||
551 | { STATE_AGGR_I2, STATE_UNDEFINED, | |||
552 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
553 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, | |||
554 | FM(unexpected), | |||
555 | .hash_type = V1_HASH_NONE, }, | |||
556 | ||||
557 | /* STATE_AGGR_R2: can only get here due to packet loss */ | |||
558 | { STATE_AGGR_R2, STATE_UNDEFINED, | |||
559 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), | |||
560 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), EVENT_NULL, | |||
561 | FM(unexpected), | |||
562 | .hash_type = V1_HASH_NONE, }, | |||
563 | ||||
564 | /***** Phase 2 Quick Mode *****/ | |||
565 | ||||
566 | /* No state for quick_outI1: | |||
567 | * --> HDR*, HASH(1), SA, Nr [, KE ] [, IDci, IDcr ] | |||
568 | */ | |||
569 | ||||
570 | /* STATE_QUICK_R0: | |||
571 | * HDR*, HASH(1), SA, Ni [, KE ] [, IDci, IDcr ] --> | |||
572 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] | |||
573 | * Installs inbound IPsec SAs. | |||
574 | * Because it may suspend for asynchronous DNS, first_out_payload | |||
575 | * is set to NONE to suppress early emission of HDR*. | |||
576 | * ??? it is legal to have multiple SAs, but we don't support it yet. | |||
577 | */ | |||
578 | { STATE_QUICK_R0, STATE_QUICK_R1, | |||
579 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
580 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), | |||
581 | EVENT_RETRANSMIT, | |||
582 | FM(quick_inI1_outR1), | |||
583 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
584 | HASH(1) = prf(SKEYID_a, M-ID | <rest>) */ | |||
585 | .hash_type = V1_HASH_1, }, | |||
586 | ||||
587 | /* STATE_QUICK_I1: | |||
588 | * HDR*, HASH(2), SA, Nr [, KE ] [, IDci, IDcr ] --> | |||
589 | * HDR*, HASH(3) | |||
590 | * Installs inbound and outbound IPsec SAs, routing, etc. | |||
591 | * ??? it is legal to have multiple SAs, but we don't support it yet. | |||
592 | */ | |||
593 | { STATE_QUICK_I1, STATE_QUICK_I2, | |||
594 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
595 | P(HASH) | P(SA) | P(NONCE), /* P(SA) | */ P(KE) | P(ID) | P(NATOA_RFC), | |||
596 | EVENT_SA_REPLACE, | |||
597 | FM(quick_inR1_outI2), | |||
598 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
599 | HASH(2) = prf(SKEYID_a, M-ID | Ni_b | <rest>) */ | |||
600 | .hash_type = V1_HASH_2, }, | |||
601 | ||||
602 | /* STATE_QUICK_R1: HDR*, HASH(3) --> done | |||
603 | * Installs outbound IPsec SAs, routing, etc. | |||
604 | */ | |||
605 | { STATE_QUICK_R1, STATE_QUICK_R2, | |||
606 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
607 | P(HASH), LEMPTY((lset_t)0), | |||
608 | EVENT_SA_REPLACE, | |||
609 | FM(quick_inI2), | |||
610 | /* RFC 2409: 5.5 Phase 2 - Quick Mode: | |||
611 | HASH(3) = prf(SKEYID_a, 0 | M-ID | Ni_b | Nr_b) */ | |||
612 | .hash_type = V1_HASH_3, }, | |||
613 | ||||
614 | /* STATE_QUICK_I2: can only happen due to lost packet */ | |||
615 | { STATE_QUICK_I2, STATE_UNDEFINED, | |||
616 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0)) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | | |||
617 | SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)), | |||
618 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
619 | EVENT_NULL, | |||
620 | FM(unexpected), | |||
621 | .hash_type = V1_HASH_NONE, }, | |||
622 | ||||
623 | /* STATE_QUICK_R2: can only happen due to lost packet */ | |||
624 | { STATE_QUICK_R2, STATE_UNDEFINED, | |||
625 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
626 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
627 | EVENT_NULL, | |||
628 | FM(unexpected), | |||
629 | .hash_type = V1_HASH_NONE, }, | |||
630 | ||||
631 | /***** informational messages *****/ | |||
632 | ||||
633 | /* Informational Exchange (RFC 2408 4.8): | |||
634 | * HDR N/D | |||
635 | * Unencrypted: must not occur after ISAKMP Phase 1 exchange of keying material. | |||
636 | */ | |||
637 | /* STATE_INFO: */ | |||
638 | { STATE_INFO, STATE_UNDEFINED, | |||
639 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))), | |||
640 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
641 | EVENT_NULL, | |||
642 | FM(informational), | |||
643 | .hash_type = V1_HASH_NONE, }, | |||
644 | ||||
645 | /* Informational Exchange (RFC 2408 4.8): | |||
646 | * HDR* N/D | |||
647 | */ | |||
648 | /* STATE_INFO_PROTECTED: */ | |||
649 | { STATE_INFO_PROTECTED, STATE_UNDEFINED, | |||
650 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
651 | P(HASH), LEMPTY((lset_t)0), | |||
652 | EVENT_NULL, | |||
653 | FM(informational), | |||
654 | /* RFC 2409: 5.7 ISAKMP Informational Exchanges: | |||
655 | HASH(1) = prf(SKEYID_a, M-ID | N/D) */ | |||
656 | .hash_type = V1_HASH_1, }, | |||
657 | ||||
658 | { STATE_XAUTH_R0, STATE_XAUTH_R1, | |||
659 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
660 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
661 | EVENT_NULL, | |||
662 | FM(xauth_inR0), | |||
663 | /* RFC ????: */ | |||
664 | .hash_type = V1_HASH_1, }, /* Re-transmit may be done by previous state */ | |||
665 | ||||
666 | { STATE_XAUTH_R1, STATE_MAIN_R3, | |||
667 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
668 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
669 | EVENT_SA_REPLACE, | |||
670 | FM(xauth_inR1), | |||
671 | /* RFC ????: */ | |||
672 | .hash_type = V1_HASH_1, }, | |||
673 | ||||
674 | #if 0 | |||
675 | /* for situation where there is XAUTH + ModeCFG */ | |||
676 | { STATE_XAUTH_R2, STATE_XAUTH_R3, | |||
677 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
678 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
679 | EVENT_SA_REPLACE, | |||
680 | FM(xauth_inR2), }, | |||
681 | ||||
682 | { STATE_XAUTH_R3, STATE_MAIN_R3, | |||
683 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
684 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
685 | EVENT_SA_REPLACE, | |||
686 | FM(xauth_inR3), }, | |||
687 | #endif | |||
688 | ||||
689 | /* MODE_CFG_x: | |||
690 | * Case R0: Responder -> Initiator | |||
691 | * <- Req(addr=0) | |||
692 | * Reply(ad=x) -> | |||
693 | * | |||
694 | * Case R1: Set(addr=x) -> | |||
695 | * <- Ack(ok) | |||
696 | */ | |||
697 | ||||
698 | { STATE_MODE_CFG_R0, STATE_MODE_CFG_R1, | |||
699 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)), | |||
700 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
701 | EVENT_SA_REPLACE, | |||
702 | FM(modecfg_inR0), | |||
703 | /* RFC ????: */ | |||
704 | .hash_type = V1_HASH_1, }, | |||
705 | ||||
706 | { STATE_MODE_CFG_R1, STATE_MODE_CFG_R2, | |||
707 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
708 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
709 | EVENT_SA_REPLACE, | |||
710 | FM(modecfg_inR1), | |||
711 | /* RFC ????: */ | |||
712 | .hash_type = V1_HASH_1, }, | |||
713 | ||||
714 | { STATE_MODE_CFG_R2, STATE_UNDEFINED, | |||
715 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))), | |||
716 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
717 | EVENT_NULL, | |||
718 | FM(unexpected), | |||
719 | .hash_type = V1_HASH_NONE, }, | |||
720 | ||||
721 | { STATE_MODE_CFG_I1, STATE_MAIN_I4, | |||
722 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
723 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
724 | EVENT_SA_REPLACE, | |||
725 | FM(modecfg_inR1), | |||
726 | /* RFC ????: */ | |||
727 | .hash_type = V1_HASH_1, }, | |||
728 | ||||
729 | { STATE_XAUTH_I0, STATE_XAUTH_I1, | |||
730 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
731 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
732 | EVENT_RETRANSMIT, | |||
733 | FM(xauth_inI0), | |||
734 | /* RFC ????: */ | |||
735 | .hash_type = V1_HASH_1, }, | |||
736 | ||||
737 | { STATE_XAUTH_I1, STATE_MAIN_I4, | |||
738 | SMF_ALL_AUTH(((lset_t)1 << (OAKLEY_AUTH_ROOF - 1)) - ((lset_t)1 << (0)) + ((lset_t)1 << (OAKLEY_AUTH_ROOF - 1))) | SMF_ENCRYPTED(((lset_t)1 << (OAKLEY_AUTH_ROOF + 2)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 3))) | SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)) | SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6)), | |||
739 | P(MCFG_ATTR) | P(HASH), P(VID), | |||
740 | EVENT_RETRANSMIT, | |||
741 | FM(xauth_inI1), | |||
742 | /* RFC ????: */ | |||
743 | .hash_type = V1_HASH_1, }, | |||
744 | ||||
745 | { STATE_IKEv1_ROOF, STATE_IKEv1_ROOF, | |||
746 | LEMPTY((lset_t)0), | |||
747 | LEMPTY((lset_t)0), LEMPTY((lset_t)0), | |||
748 | EVENT_NULL, NULL((void*)0), | |||
749 | .hash_type = V1_HASH_NONE, }, | |||
750 | ||||
751 | #undef FM | |||
752 | #undef P | |||
753 | }; | |||
754 | ||||
755 | void init_ikev1(struct logger *logger) | |||
756 | { | |||
757 | dbg("checking IKEv1 state table"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("checking IKEv1 state table"); } }; | |||
758 | ||||
759 | /* | |||
760 | * Fill in FINITE_STATES[]. | |||
761 | * | |||
762 | * This is a hack until each finite-state is a separate object | |||
763 | * with corresponding edges (aka microcodes). | |||
764 | * | |||
765 | * XXX: Long term goal is to have a constant FINITE_STATES[] | |||
766 | * contain constant pointers and this static writeable array | |||
767 | * to just go away. | |||
768 | */ | |||
769 | for (enum state_kind kind = STATE_IKEv1_FLOOR; kind < STATE_IKEv1_ROOF; kind++) { | |||
770 | /* fill in using static struct */ | |||
771 | const struct finite_state *fs = &v1_states[kind - STATE_IKEv1_FLOOR]; | |||
772 | passert(fs->kind == kind)({ _Bool assertion__ = fs->kind == kind; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 772, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "fs->kind == kind"); } (void) 1; }); | |||
773 | passert(finite_states[kind] == NULL)({ _Bool assertion__ = finite_states[kind] == ((void*)0); if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 773, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "finite_states[kind] == ((void*)0)" ); } (void) 1; }); | |||
774 | finite_states[kind] = fs; | |||
775 | } | |||
776 | ||||
777 | /* | |||
778 | * Go through the state transition table filling in details | |||
779 | * and checking for inconsistencies. | |||
780 | */ | |||
781 | for (const struct state_v1_microcode *t = v1_state_microcode_table; | |||
782 | t->state < STATE_IKEv1_ROOF; t++) { | |||
783 | ||||
784 | passert(t->state >= STATE_IKEv1_FLOOR)({ _Bool assertion__ = t->state >= STATE_IKEv1_FLOOR; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 784, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "t->state >= STATE_IKEv1_FLOOR" ); } (void) 1; }); | |||
785 | passert(t->state < STATE_IKEv1_ROOF)({ _Bool assertion__ = t->state < STATE_IKEv1_ROOF; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 785, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "t->state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
786 | struct finite_state *from = &v1_states[t->state - STATE_IKEv1_FLOOR]; | |||
787 | ||||
788 | /* | |||
789 | * Deal with next_state == STATE_UNDEFINED. | |||
790 | * | |||
791 | * XXX: STATE_UNDEFINED is used when a state | |||
792 | * transitions back to the same state; such | |||
793 | * transitions should instead explicitly specify that | |||
794 | * same state. | |||
795 | */ | |||
796 | enum state_kind next_state = (t->next_state == STATE_UNDEFINED ? | |||
797 | t->state : t->next_state); | |||
798 | passert(STATE_IKEv1_FLOOR <= next_state &&({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }) | |||
799 | next_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 799, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= next_state && next_state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
800 | const struct finite_state *to = finite_states[next_state]; | |||
801 | passert(to != NULL)({ _Bool assertion__ = to != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 801, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "to != ((void*)0)"); } (void) 1; }); | |||
802 | ||||
803 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
804 | if (from->nr_transitions == 0) { | |||
805 | LSWLOG_DEBUG(buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (; buf != ((void*) 0); jambuf_to_logger(buf, &failsafe_logger, DEBUG_STREAM) , buf = ((void*)0)) { | |||
806 | jam_string(buf, " "); | |||
807 | lswlog_finite_state(buf, from); | |||
808 | jam_string(buf, ":"); | |||
809 | } | |||
810 | } | |||
811 | DBG_log(" -> %s %s (%s)", to->short_name, | |||
812 | enum_name_short(&event_type_names, | |||
813 | t->timeout_event), | |||
814 | t->message); | |||
815 | } | |||
816 | ||||
817 | /* | |||
818 | * Point .fs_v1_transitions at to the first entry in | |||
819 | * v1_state_microcode_table for that state. All other | |||
820 | * transitions for that state should follow | |||
821 | * immediately after (or to put it another way, the | |||
822 | * previous transition's state should be the same as | |||
823 | * this). | |||
824 | */ | |||
825 | if (from->v1_transitions == NULL((void*)0)) { | |||
826 | from->v1_transitions = t; | |||
827 | } else { | |||
828 | passert(t[-1].state == t->state)({ _Bool assertion__ = t[-1].state == t->state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 828, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "t[-1].state == t->state" ); } (void) 1; }); | |||
829 | } | |||
830 | from->nr_transitions++; | |||
831 | ||||
832 | if (t->message == NULL((void*)0)) { | |||
833 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 833, }; &here; }), "transition %s -> %s missing .message", | |||
834 | from->short_name, to->short_name); | |||
835 | } | |||
836 | ||||
837 | /* | |||
838 | * Copy (actually merge) the flags that apply to the | |||
839 | * state; and not the state transition. | |||
840 | * | |||
841 | * The original code used something like state | |||
842 | * .microcode .flags after the state transition had | |||
843 | * completed. I.e., use the flags from a | |||
844 | * not-yet-taken potential future state transition and | |||
845 | * not the previous one. | |||
846 | * | |||
847 | * This is just trying to extract them and | |||
848 | * check they are consistent. | |||
849 | * | |||
850 | * XXX: this is confusing | |||
851 | * | |||
852 | * Should fs_flags and SMF_RETRANSMIT_ON_DUPLICATE | |||
853 | * should be replaced by SMF_RESPONDING in the | |||
854 | * transition flags? | |||
855 | * | |||
856 | * Or is this more like .fs_timeout_event which is | |||
857 | * always true of a state? | |||
858 | */ | |||
859 | if ((t->flags & from->flags) != from->flags) { | |||
860 | DBGF(DBG_BASE, "transition %s -> %s (%s) missing flags 0x%"PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } | |||
861 | from->short_name, to->short_name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } } | |||
862 | t->message, from->flags){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("transition %s -> %s (%s) missing flags 0x%" "l" "x", from->short_name, to->short_name, t->message , from->flags); } }; | |||
863 | } | |||
864 | from->flags |= t->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4)); | |||
865 | ||||
866 | if (!(t->flags & SMF_FIRST_ENCRYPTED_INPUT((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) && | |||
867 | (t->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) && | |||
868 | t->processor != unexpected) { | |||
869 | /* | |||
870 | * The first encrypted message carries | |||
871 | * authentication information so isn't | |||
872 | * applicable. Other encrypted messages | |||
873 | * require integrity via the HASH payload. | |||
874 | */ | |||
875 | if (!(t->req_payloads & LELEM(ISAKMP_NEXT_HASH)((lset_t)1 << (ISAKMP_NEXT_HASH)))) { | |||
876 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 876, }; &here; }), | |||
877 | "transition %s -> %s (%s) missing HASH payload", | |||
878 | from->short_name, to->short_name, | |||
879 | t->message); | |||
880 | } | |||
881 | if (t->hash_type == V1_HASH_NONE) { | |||
882 | pexpect_failllog_pexpect(logger, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 882, }; &here; }), | |||
883 | "transition %s -> %s (%s) missing HASH protection", | |||
884 | from->short_name, to->short_name, | |||
885 | t->message); | |||
886 | } | |||
887 | } | |||
888 | } | |||
889 | } | |||
890 | ||||
891 | static stf_status unexpected(struct state *st, struct msg_digest *md UNUSED__attribute__ ((unused))) | |||
892 | { | |||
893 | log_state(RC_LOG_SERIOUS, st, "unexpected message received in state %s", | |||
894 | st->st_state->name); | |||
895 | return STF_IGNORE; | |||
896 | } | |||
897 | ||||
898 | /* | |||
899 | * RFC 2408 Section 4.6 | |||
900 | * | |||
901 | * # Initiator Direction Responder NOTE | |||
902 | * (1) HDR*; N/D => Error Notification or Deletion | |||
903 | */ | |||
904 | static stf_status informational(struct state *st, struct msg_digest *md) | |||
905 | { | |||
906 | /* | |||
907 | * XXX: Danger: ST is deleted midway through this function. | |||
908 | */ | |||
909 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 909, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); | |||
910 | st = md->v1_st; /* may be NULL */ | |||
911 | ||||
912 | struct payload_digest *const n_pld = md->chain[ISAKMP_NEXT_N]; | |||
913 | ||||
914 | /* If the Notification Payload is not null... */ | |||
915 | if (n_pld != NULL((void*)0)) { | |||
916 | pb_stream *const n_pbs = &n_pld->pbs; | |||
917 | struct isakmp_notification *const n = | |||
918 | &n_pld->payload.notification; | |||
919 | ||||
920 | /* Switch on Notification Type (enum) */ | |||
921 | /* note that we _can_ get notification payloads unencrypted | |||
922 | * once we are at least in R3/I4. | |||
923 | * and that the handler is expected to treat them suspiciously. | |||
924 | */ | |||
925 | dbg("processing informational %s (%d)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } | |||
926 | enum_name(&ikev1_notify_names, n->isan_type),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } } | |||
927 | n->isan_type){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("processing informational %s (%d)", enum_name( &ikev1_notify_names, n->isan_type), n->isan_type); } }; | |||
928 | ||||
929 | pstats(ikev1_recv_notifies_e, n->isan_type){ const unsigned __pstat = (n->isan_type); if (__pstat < (sizeof(pstats_ikev1_recv_notifies_e) / sizeof(*(pstats_ikev1_recv_notifies_e )))) { pstats_ikev1_recv_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_recv_notifies_e", __pstat); } }; | |||
930 | ||||
931 | switch (n->isan_type) { | |||
932 | /* | |||
933 | * We answer DPD probes even if they claimed not to support | |||
934 | * Dead Peer Detection. | |||
935 | * We would have to send some kind of reply anyway to prevent | |||
936 | * a retransmit, so rather then send an error, we might as | |||
937 | * well just send a DPD reply | |||
938 | */ | |||
939 | case R_U_THERE: | |||
940 | if (st == NULL((void*)0)) { | |||
941 | llog(RC_LOG, md->md_logger, | |||
942 | "received bogus R_U_THERE informational message"); | |||
943 | return STF_IGNORE; | |||
944 | } | |||
945 | return dpd_inI_outR(st, n, n_pbs); | |||
946 | ||||
947 | case R_U_THERE_ACK: | |||
948 | if (st == NULL((void*)0)) { | |||
949 | llog(RC_LOG, md->md_logger, | |||
950 | "received bogus R_U_THERE_ACK informational message"); | |||
951 | return STF_IGNORE; | |||
952 | } | |||
953 | return dpd_inR(st, n, n_pbs); | |||
954 | ||||
955 | case PAYLOAD_MALFORMED: | |||
956 | if (st != NULL((void*)0)) { | |||
957 | st->hidden_variables.st_malformed_received++; | |||
958 | ||||
959 | log_state(RC_LOG, st, "received %u malformed payload notifies", | |||
960 | st->hidden_variables.st_malformed_received); | |||
961 | ||||
962 | if (st->hidden_variables.st_malformed_sent > | |||
963 | MAXIMUM_MALFORMED_NOTIFY16 / 2 && | |||
964 | ((st->hidden_variables.st_malformed_sent + | |||
965 | st->hidden_variables. | |||
966 | st_malformed_received) > | |||
967 | MAXIMUM_MALFORMED_NOTIFY16)) { | |||
968 | log_state(RC_LOG, st, "too many malformed payloads (we sent %u and received %u", | |||
969 | st->hidden_variables.st_malformed_sent, | |||
970 | st->hidden_variables.st_malformed_received); | |||
971 | delete_state(st); | |||
972 | md->v1_st = st = NULL((void*)0); | |||
973 | } | |||
974 | } | |||
975 | ||||
976 | return STF_IGNORE; | |||
977 | ||||
978 | case ISAKMP_N_CISCO_LOAD_BALANCE: | |||
979 | /* | |||
980 | * ??? what the heck is in the payload? | |||
981 | * We take the peer's new IP address from the last 4 octets. | |||
982 | * Is anything else possible? Expected? Documented? | |||
983 | */ | |||
984 | if (st == NULL((void*)0) || !IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
985 | llog(RC_LOG, md->md_logger, | |||
986 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with for unestablished state."); | |||
987 | } else if (pbs_left(n_pbs)((size_t)((n_pbs)->roof - (n_pbs)->cur)) < 4) { | |||
988 | log_state(RC_LOG_SERIOUS, st, | |||
989 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message without IPv4 address"); | |||
990 | } else { | |||
991 | /* | |||
992 | * Copy (not cast) the last 4 bytes | |||
993 | * (size of an IPv4) address from the | |||
994 | * end of the notification into IN | |||
995 | * (can't cast as can't assume that | |||
996 | * ->roof-4 is correctly aligned). | |||
997 | */ | |||
998 | struct in_addr in; | |||
999 | memcpy(&in, n_pbs->roof - sizeof(in), sizeof(in)); | |||
1000 | ip_address new_peer = address_from_in_addr(&in); | |||
1001 | ||||
1002 | /* is all zeros? */ | |||
1003 | if (address_is_any(new_peer)) { | |||
1004 | ipstr_buf b; | |||
1005 | ||||
1006 | log_state(RC_LOG_SERIOUS, st, | |||
1007 | "ignoring ISAKMP_N_CISCO_LOAD_BALANCE Informational Message with invalid IPv4 address %s", | |||
1008 | ipstr(&new_peer, &b)); | |||
1009 | return false0; /* XXX: STF_*? */ | |||
1010 | } | |||
1011 | ||||
1012 | /* Saving connection name and whack sock id */ | |||
1013 | const char *tmp_name = st->st_connection->name; | |||
1014 | struct fd *tmp_whack_sock = fd_dup(st->st_logger->object_whackfd, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1014, }; &here; })); | |||
1015 | ||||
1016 | /* deleting ISAKMP SA with the current remote peer */ | |||
1017 | delete_state(st); | |||
1018 | md->v1_st = st = NULL((void*)0); | |||
1019 | ||||
1020 | /* to find and store the connection associated with tmp_name */ | |||
1021 | /* ??? how do we know that tmp_name hasn't been freed? */ | |||
1022 | struct connection *tmp_c = conn_by_name(tmp_name, false0/*!strict*/); | |||
1023 | ||||
1024 | if (tmp_c == NULL((void*)0)) | |||
1025 | return STF_IGNORE; | |||
1026 | ||||
1027 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
1028 | address_buf npb; | |||
1029 | DBG_log("new peer address: %s", | |||
1030 | str_address(&new_peer, &npb)); | |||
1031 | ||||
1032 | /* Current remote peer info */ | |||
1033 | int count_spd = 1; | |||
1034 | for (const struct spd_route *tmp_spd = &tmp_c->spd; | |||
1035 | tmp_spd != NULL((void*)0); tmp_spd = tmp_spd->spd_next) { | |||
1036 | address_buf b; | |||
1037 | ||||
1038 | DBG_log("spd route number: %d", | |||
1039 | count_spd++); | |||
1040 | ||||
1041 | /**that info**/ | |||
1042 | DBG_log("that id kind: %d", | |||
1043 | tmp_spd->that.id.kind); | |||
1044 | DBG_log("that id ipaddr: %s", | |||
1045 | str_address(&tmp_spd->that.id.ip_addr, &b)); | |||
1046 | if (tmp_spd->that.id.name.ptr != NULL((void*)0)) { | |||
1047 | DBG_dump_hunk("that id name",{ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); } | |||
1048 | tmp_spd->that.id. name){ typeof(tmp_spd->that.id. name) hunk_ = tmp_spd->that. id. name; DBG_dump("that id name", hunk_.ptr, hunk_.len); }; | |||
1049 | } | |||
1050 | DBG_log("that host_addr: %s", | |||
1051 | str_address(&tmp_spd->that.host_addr, &b)); | |||
1052 | DBG_log("that nexthop: %s", | |||
1053 | str_address(&tmp_spd->that.host_nexthop, &b)); | |||
1054 | DBG_log("that srcip: %s", | |||
1055 | str_address(&tmp_spd->that.host_srcip, &b)); | |||
1056 | selector_buf sb; | |||
1057 | DBG_log("that client: %s", | |||
1058 | str_selector(&tmp_spd->that.client, &sb)); | |||
1059 | DBG_log("that has_client: %d", | |||
1060 | tmp_spd->that.has_client); | |||
1061 | DBG_log("that has_port_wildcard: %d", | |||
1062 | tmp_spd->that.has_port_wildcard); | |||
1063 | DBG_log("that has_id_wildcards: %d", | |||
1064 | tmp_spd->that.has_id_wildcards); | |||
1065 | } | |||
1066 | ||||
1067 | if (tmp_c->interface != NULL((void*)0)) { | |||
1068 | endpoint_buf b; | |||
1069 | DBG_log("Current interface_addr: %s", | |||
1070 | str_endpoint(&tmp_c->interface->local_endpoint, &b)); | |||
1071 | } | |||
1072 | } | |||
1073 | ||||
1074 | /* save peer's old address for comparison purposes */ | |||
1075 | ip_address old_addr = tmp_c->spd.that.host_addr; | |||
1076 | ||||
1077 | /* update peer's address */ | |||
1078 | tmp_c->spd.that.host_addr = new_peer; | |||
1079 | ||||
1080 | /* Modifying connection info to store the redirected remote peer info */ | |||
1081 | dbg("Old host_addr_name : %s", tmp_c->spd.that.host_addr_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Old host_addr_name : %s", tmp_c->spd.that. host_addr_name); } }; | |||
1082 | tmp_c->spd.that.host_addr_name = NULL((void*)0); | |||
1083 | ||||
1084 | /* ??? do we know the id.kind has an ip_addr? */ | |||
1085 | tmp_c->spd.that.id.ip_addr = new_peer; | |||
1086 | ||||
1087 | /* update things that were the old peer */ | |||
1088 | if (address_eq_address(tmp_c->spd.this.host_nexthop, old_addr)) { | |||
1089 | address_buf ob, nb; | |||
1090 | dbg("local next hop %s is the same as the old remote addr, changing local next hop to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1091 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1092 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("local next hop %s is the same as the old remote addr, changing local next hop to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
1093 | tmp_c->spd.this.host_nexthop = new_peer; | |||
1094 | } | |||
1095 | ||||
1096 | if (address_eq_address(tmp_c->spd.that.host_srcip, old_addr)) { | |||
1097 | address_buf ob, nb; | |||
1098 | dbg("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1099 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1100 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("remote host's srcip %s is the same as the old remote addr, changing remote host's srcip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
1101 | tmp_c->spd.that.host_srcip = new_peer; | |||
1102 | } | |||
1103 | ||||
1104 | /* | |||
1105 | * XXX: should this also check that | |||
1106 | * the client is a single address? | |||
1107 | */ | |||
1108 | ip_address client_prefix = selector_prefix(tmp_c->spd.that.client); | |||
1109 | if (address_eq_address(client_prefix, old_addr)) { | |||
1110 | address_buf ob, nb; | |||
1111 | dbg("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1112 | str_address(&old_addr, &ob),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } } | |||
1113 | str_address(&new_peer, &nb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("old remote client's ip %s is the same as the old remote address, changing remote client ip to %s" , str_address(&old_addr, &ob), str_address(&new_peer , &nb)); } }; | |||
1114 | tmp_c->spd.that.client = selector_from_address(new_peer); | |||
1115 | } | |||
1116 | ||||
1117 | /* | |||
1118 | * ??? is this wise? This may changes | |||
1119 | * a lot of other connections. | |||
1120 | */ | |||
1121 | tmp_c->host_pair->remote = new_peer; | |||
1122 | ||||
1123 | /* Initiating connection to the redirected peer */ | |||
1124 | struct logger logger[] = { GLOBAL_LOGGER(tmp_whack_sock)(struct logger) { .where = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1124, }; &here; }), .global_whackfd = tmp_whack_sock, .object = ((void*)0), .object_vec = &logger_global_vec, }, }; /*placeholder*/ | |||
1125 | initiate_connections_by_name(tmp_name, /*remote-name*/NULL((void*)0), | |||
1126 | /*background?*/tmp_whack_sock == NULL((void*)0)/*guess*/, | |||
1127 | logger); | |||
1128 | close_any(&tmp_whack_sock)close_any_fd((&tmp_whack_sock), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1128, }; &here; })); | |||
1129 | } | |||
1130 | return STF_IGNORE; | |||
1131 | default: | |||
1132 | { | |||
1133 | struct logger *logger = st != NULL((void*)0) ? st->st_logger : | |||
1134 | md->md_logger; | |||
1135 | llog(RC_LOG_SERIOUS, logger, | |||
1136 | "received and ignored notification payload: %s", | |||
1137 | enum_name(&ikev1_notify_names, n->isan_type)); | |||
1138 | return STF_IGNORE; | |||
1139 | } | |||
1140 | } | |||
1141 | } else { | |||
1142 | /* warn if we didn't find any Delete or Notify payload in packet */ | |||
1143 | if (md->chain[ISAKMP_NEXT_D] == NULL((void*)0)) { | |||
1144 | const struct logger *logger = (st != NULL((void*)0) ? st->st_logger : | |||
1145 | md != NULL((void*)0) ? md->md_logger : | |||
1146 | &failsafe_logger); | |||
1147 | llog(RC_LOG_SERIOUS, logger, | |||
1148 | "received and ignored empty informational notification payload"); | |||
1149 | } | |||
1150 | return STF_IGNORE; | |||
1151 | } | |||
1152 | } | |||
1153 | ||||
1154 | /* | |||
1155 | * create output HDR as replica of input HDR - IKEv1 only; return the body | |||
1156 | */ | |||
1157 | void ikev1_init_pbs_out_from_md_hdr(struct msg_digest *md, bool_Bool enc, | |||
1158 | struct pbs_outpacket_byte_stream *output_stream, uint8_t *output_buffer, | |||
1159 | size_t sizeof_output_buffer, | |||
1160 | struct pbs_outpacket_byte_stream *rbody, | |||
1161 | struct logger *logger) | |||
1162 | { | |||
1163 | struct isakmp_hdr hdr = md->hdr; /* mostly same as incoming header */ | |||
1164 | ||||
1165 | /* make sure we start with a clean buffer */ | |||
1166 | *output_stream = open_pbs_out("reply packet", output_buffer, sizeof_output_buffer, logger); | |||
1167 | ||||
1168 | hdr.isa_flags = 0; /* zero all flags */ | |||
1169 | if (enc) | |||
1170 | hdr.isa_flags |= ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX); | |||
1171 | ||||
1172 | if (impair.send_bogus_isakmp_flag) { | |||
1173 | hdr.isa_flags |= ISAKMP_FLAGS_RESERVED_BIT6(1<<ISAKMP_FLAGS_RESERVED_BIT6_IX); | |||
1174 | } | |||
1175 | ||||
1176 | /* there is only one IKEv1 version, and no new one will ever come - no need to set version */ | |||
1177 | hdr.isa_np = 0; | |||
1178 | /* surely must have room and be well-formed */ | |||
1179 | passert(out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody))({ _Bool assertion__ = out_struct(&hdr, &isakmp_hdr_desc , output_stream, rbody); if (!assertion__) { where_t here = ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1179, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "out_struct(&hdr, &isakmp_hdr_desc, output_stream, rbody)" ); } (void) 1; }); | |||
1180 | } | |||
1181 | ||||
1182 | /* | |||
1183 | * Recognise and, if necesssary, respond to an IKEv1 duplicate. | |||
1184 | * | |||
1185 | * Use .st_state, which is the true current state, and not MD | |||
1186 | * .FROM_STATE (which is derived from some convoluted magic) when | |||
1187 | * determining if the duplicate should or should not get a response. | |||
1188 | */ | |||
1189 | static bool_Bool ikev1_duplicate(struct state *st, struct msg_digest *md) | |||
1190 | { | |||
1191 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1191, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
1192 | if (st->st_v1_rpacket.ptr != NULL((void*)0) && | |||
1193 | st->st_v1_rpacket.len == pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)) && | |||
1194 | memeq(st->st_v1_rpacket.ptr, md->packet_pbs.start,(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0) | |||
1195 | st->st_v1_rpacket.len)(memcmp((st->st_v1_rpacket.ptr), (md->packet_pbs.start) , (st->st_v1_rpacket.len)) == 0)) { | |||
1196 | /* | |||
1197 | * Duplicate. Drop or retransmit? | |||
1198 | * | |||
1199 | * Only re-transmit when the last state transition | |||
1200 | * (triggered by this packet the first time) included | |||
1201 | * a reply. | |||
1202 | * | |||
1203 | * XXX: is SMF_RETRANSMIT_ON_DUPLICATE useful or | |||
1204 | * correct? | |||
1205 | */ | |||
1206 | bool_Bool replied = (st->st_v1_last_transition != NULL((void*)0) && | |||
1207 | (st->st_v1_last_transition->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5)))); | |||
1208 | bool_Bool retransmit_on_duplicate = | |||
1209 | (st->st_state->flags & SMF_RETRANSMIT_ON_DUPLICATE((lset_t)1 << (OAKLEY_AUTH_ROOF + 4))); | |||
1210 | if (replied && retransmit_on_duplicate) { | |||
1211 | /* | |||
1212 | * Transitions with EVENT_SA_DISCARD should | |||
1213 | * always respond to re-transmits (why?); else | |||
1214 | * cap. | |||
1215 | */ | |||
1216 | if (st->st_v1_last_transition->timeout_event == EVENT_SA_DISCARD || | |||
1217 | count_duplicate(st, MAXIMUM_v1_ACCEPTED_DUPLICATES2)) { | |||
1218 | log_state(RC_RETRANSMISSION, st, | |||
1219 | "retransmitting in response to duplicate packet; already %s", | |||
1220 | st->st_state->name); | |||
1221 | resend_recorded_v1_ike_msg(st, "retransmit in response to duplicate"); | |||
1222 | } else { | |||
1223 | log_state(RC_LOG_SERIOUS, st, | |||
1224 | "discarding duplicate packet -- exhausted retransmission; already %s", | |||
1225 | st->st_state->name); | |||
1226 | } | |||
1227 | } else { | |||
1228 | dbg("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } | |||
1229 | st->st_serialno, st->st_state->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } } | |||
1230 | bool_str(replied), bool_str(retransmit_on_duplicate)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("#%lu discarding duplicate packet; already %s; replied=%s retransmit_on_duplicate=%s" , st->st_serialno, st->st_state->name, bool_str(replied ), bool_str(retransmit_on_duplicate)); } }; | |||
1231 | } | |||
1232 | return true1; | |||
1233 | } | |||
1234 | return false0; | |||
1235 | } | |||
1236 | ||||
1237 | /* process an input packet, possibly generating a reply. | |||
1238 | * | |||
1239 | * If all goes well, this routine eventually calls a state-specific | |||
1240 | * transition function. | |||
1241 | * | |||
1242 | * This routine will not release_any_md(mdp). It is expected that its | |||
1243 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
1244 | * **mdp should not be freed. So the caller should be prepared for | |||
1245 | * *mdp being set to NULL. | |||
1246 | */ | |||
1247 | void process_v1_packet(struct msg_digest *md) | |||
1248 | { | |||
1249 | bool_Bool new_iv_set = false0; | |||
1250 | struct state *st = NULL((void*)0); | |||
1251 | enum state_kind from_state = STATE_UNDEFINED; /* state we started in */ | |||
1252 | ||||
1253 | #define SEND_NOTIFICATION(t){ { const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, t); else send_notification_from_md(md, t); } \ | |||
1254 | { \ | |||
1255 | pstats(ikev1_sent_notifies_e, t){ const unsigned __pstat = (t); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e ) / sizeof(*(pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; \ | |||
1256 | if (st != NULL((void*)0)) \ | |||
1257 | send_notification_from_state(st, from_state, t); \ | |||
1258 | else \ | |||
1259 | send_notification_from_md(md, t); \ | |||
1260 | } | |||
1261 | ||||
1262 | #define LOG_PACKET(RC, ...){ if (st != ((void*)0)) { log_state(RC, st, ...); } else { llog (RC, md->md_logger, ...); } } \ | |||
1263 | { \ | |||
1264 | if (st != NULL((void*)0)) { \ | |||
1265 | log_state(RC, st, __VA_ARGS__); \ | |||
1266 | } else { \ | |||
1267 | llog(RC, md->md_logger, __VA_ARGS__); \ | |||
1268 | } \ | |||
1269 | } | |||
1270 | #define LOG_PACKET_JAMBUF(RC_FLAGS, BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) \ | |||
1271 | LLOG_JAMBUF(RC_FLAGS, (st != NULL ? st->st_logger : md->md_logger), BUF)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *BUF = &jambuf ; BUF != ((void*)0); BUF = ((void*)0)) for (({ if (((RC_FLAGS ) & NO_PREFIX) == ((lset_t)0) && (((RC_FLAGS) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & (((lset_t )1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void*)0) ? st ->st_logger : md->md_logger))->object_vec->jam_object_prefix (BUF, ((st != ((void*)0) ? st->st_logger : md->md_logger ))->object); } }); BUF != ((void*)0); jambuf_to_logger(BUF , ((st != ((void*)0) ? st->st_logger : md->md_logger)), RC_FLAGS), BUF = ((void*)0)) | |||
1272 | ||||
1273 | switch (md->hdr.isa_xchg) { | |||
1274 | case ISAKMP_XCHG_AGGR: | |||
1275 | case ISAKMP_XCHG_IDPROT: /* part of a Main Mode exchange */ | |||
1276 | if (md->hdr.isa_msgid != v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
1277 | LOG_PACKET(RC_LOG, "Message ID was 0x%08" PRIx32 " but should be zero in phase 1",{ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } } | |||
1278 | md->hdr.isa_msgid){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } else { llog(RC_LOG, md->md_logger, "Message ID was 0x%08" "x" " but should be zero in phase 1", md->hdr.isa_msgid); } }; | |||
1279 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
1280 | return; | |||
1281 | } | |||
1282 | ||||
1283 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
1284 | LOG_PACKET(RC_LOG, "Initiator Cookie must not be zero in phase 1 message"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "Initiator Cookie must not be zero in phase 1 message" ); } else { llog(RC_LOG, md->md_logger, "Initiator Cookie must not be zero in phase 1 message" ); } }; | |||
1285 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
1286 | return; | |||
1287 | } | |||
1288 | ||||
1289 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
1290 | /* | |||
1291 | * initial message from initiator | |||
1292 | */ | |||
1293 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
1294 | LOG_PACKET(RC_LOG, "initial phase 1 message is invalid: its Encrypted Flag is on"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } else { llog(RC_LOG, md->md_logger, "initial phase 1 message is invalid: its Encrypted Flag is on" ); } }; | |||
1295 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; | |||
1296 | return; | |||
1297 | } | |||
1298 | ||||
1299 | /* | |||
1300 | * If there is already an existing state with | |||
1301 | * this ICOOKIE, assume it is some sort of | |||
1302 | * re-transmit. | |||
1303 | */ | |||
1304 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
1305 | md->hdr.isa_msgid); | |||
1306 | if (st != NULL((void*)0)) { | |||
1307 | if (!ikev1_duplicate(st, md)) { | |||
1308 | /* | |||
1309 | * Not a duplicate for the | |||
1310 | * current state; assume that | |||
1311 | * this a really old | |||
1312 | * re-transmit for an earlier | |||
1313 | * state that should be | |||
1314 | * discarded. | |||
1315 | */ | |||
1316 | log_state(RC_LOG, st, "discarding initial packet; already %s", | |||
1317 | st->st_state->name); | |||
1318 | } | |||
1319 | return; | |||
1320 | } | |||
1321 | passert(st == NULL)({ _Bool assertion__ = st == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1321, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st == ((void*)0)"); } (void) 1; }); /* new state needed */ | |||
1322 | /* don't build a state until the message looks tasty */ | |||
1323 | from_state = (md->hdr.isa_xchg == ISAKMP_XCHG_IDPROT ? | |||
1324 | STATE_MAIN_R0 : STATE_AGGR_R0); | |||
1325 | } else { | |||
1326 | /* not an initial message */ | |||
1327 | ||||
1328 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
1329 | md->hdr.isa_msgid); | |||
1330 | ||||
1331 | if (st == NULL((void*)0)) { | |||
1332 | /* | |||
1333 | * perhaps this is a first message | |||
1334 | * from the responder and contains a | |||
1335 | * responder cookie that we've not yet | |||
1336 | * seen. | |||
1337 | */ | |||
1338 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
1339 | md->hdr.isa_msgid); | |||
1340 | ||||
1341 | if (st == NULL((void*)0)) { | |||
1342 | llog(RC_LOG, md->md_logger, | |||
1343 | "phase 1 message is part of an unknown exchange"); | |||
1344 | /* XXX Could send notification back */ | |||
1345 | return; | |||
1346 | } | |||
1347 | } | |||
1348 | from_state = st->st_state->kind; | |||
1349 | } | |||
1350 | break; | |||
1351 | ||||
1352 | case ISAKMP_XCHG_INFO: /* an informational exchange */ | |||
1353 | st = find_v1_info_state(&md->hdr.isa_ike_spis, | |||
1354 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
1355 | ||||
1356 | if (st == NULL((void*)0)) { | |||
1357 | /* | |||
1358 | * might be an informational response to our | |||
1359 | * first message, in which case, we don't know | |||
1360 | * the rcookie yet. | |||
1361 | */ | |||
1362 | st = find_state_ikev1_init(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator, | |||
1363 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
1364 | } | |||
1365 | ||||
1366 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
1367 | bool_Bool quiet = (st == NULL((void*)0)); | |||
1368 | ||||
1369 | if (st == NULL((void*)0)) { | |||
1370 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
1371 | DBG_log("Informational Exchange is for an unknown (expired?) SA with MSGID:0x%08" PRIx32"x", | |||
1372 | md->hdr.isa_msgid); | |||
1373 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)) | |||
1374 | md->hdr.isa_ike_initiator_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_initiator_spi.bytes:" , &(md->hdr.isa_ike_spis.initiator), sizeof(md->hdr .isa_ike_spis.initiator)); | |||
1375 | DBG_dump_thing("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:",DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)) | |||
1376 | md->hdr.isa_ike_responder_spi)DBG_dump("- unknown SA's md->hdr.isa_ike_responder_spi.bytes:" , &(md->hdr.isa_ike_spis.responder), sizeof(md->hdr .isa_ike_spis.responder)); | |||
1377 | } | |||
1378 | ||||
1379 | /* XXX Could send notification back */ | |||
1380 | return; | |||
1381 | } | |||
1382 | ||||
1383 | if (!IS_V1_ISAKMP_ENCRYPTED(st->st_state->kind)((((lset_t)1 << (st->st_state->kind)) & ((((lset_t )1 << (STATE_MAIN_I4)) - ((lset_t)1 << (STATE_MAIN_R2 )) + ((lset_t)1 << (STATE_MAIN_I4))) | (((lset_t)1 << (STATE_AGGR_R2)) - ((lset_t)1 << (STATE_AGGR_R1)) + (( lset_t)1 << (STATE_AGGR_R2))) | (((lset_t)1 << (STATE_QUICK_R2 )) - ((lset_t)1 << (STATE_QUICK_R0)) + ((lset_t)1 << (STATE_QUICK_R2))) | ((lset_t)1 << (STATE_INFO_PROTECTED )) | (((lset_t)1 << (STATE_XAUTH_I1)) - ((lset_t)1 << (STATE_XAUTH_R0)) + ((lset_t)1 << (STATE_XAUTH_I1))))) != ((lset_t)0))) { | |||
1384 | if (!quiet) { | |||
1385 | log_state(RC_LOG_SERIOUS, st, | |||
1386 | "encrypted Informational Exchange message is invalid because no key is known"); | |||
1387 | } | |||
1388 | /* XXX Could send notification back */ | |||
1389 | return; | |||
1390 | } | |||
1391 | ||||
1392 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
1393 | if (!quiet) { | |||
1394 | log_state(RC_LOG_SERIOUS, st, | |||
1395 | "Informational Exchange message is invalid because it has a Message ID of 0"); | |||
1396 | } | |||
1397 | /* XXX Could send notification back */ | |||
1398 | return; | |||
1399 | } | |||
1400 | ||||
1401 | if (!unique_msgid(st, md->hdr.isa_msgid)) { | |||
1402 | if (!quiet) { | |||
1403 | log_state(RC_LOG_SERIOUS, st, | |||
1404 | "Informational Exchange message is invalid because it has a previously used Message ID (0x%08" PRIx32"x" " )", | |||
1405 | md->hdr.isa_msgid); | |||
1406 | } | |||
1407 | /* XXX Could send notification back */ | |||
1408 | return; | |||
1409 | } | |||
1410 | st->st_v1_msgid.reserved = false0; | |||
1411 | ||||
1412 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
1413 | new_iv_set = true1; | |||
1414 | ||||
1415 | from_state = STATE_INFO_PROTECTED; | |||
1416 | } else { | |||
1417 | if (st != NULL((void*)0) && | |||
1418 | IS_V1_ISAKMP_AUTHENTICATED(st->st_state)(STATE_MAIN_R3 <= ((st->st_state)->kind) && STATE_AGGR_R0 != ((st->st_state)->kind) && STATE_AGGR_I1 != ( (st->st_state)->kind))) { | |||
1419 | log_state(RC_LOG_SERIOUS, st, | |||
1420 | "Informational Exchange message must be encrypted"); | |||
1421 | /* XXX Could send notification back */ | |||
1422 | return; | |||
1423 | } | |||
1424 | from_state = STATE_INFO; | |||
1425 | } | |||
1426 | break; | |||
1427 | ||||
1428 | case ISAKMP_XCHG_QUICK: /* part of a Quick Mode exchange */ | |||
1429 | ||||
1430 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
1431 | dbg("Quick Mode message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has an Initiator Cookie of 0" ); } }; | |||
1432 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
1433 | return; | |||
1434 | } | |||
1435 | ||||
1436 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
1437 | dbg("Quick Mode message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Responder Cookie of 0" ); } }; | |||
1438 | SEND_NOTIFICATION(INVALID_COOKIE){ { const unsigned __pstat = (INVALID_COOKIE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_COOKIE ); else send_notification_from_md(md, INVALID_COOKIE); }; | |||
1439 | return; | |||
1440 | } | |||
1441 | ||||
1442 | if (md->hdr.isa_msgid == v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
1443 | dbg("Quick Mode message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is invalid because it has a Message ID of 0" ); } }; | |||
1444 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
1445 | return; | |||
1446 | } | |||
1447 | ||||
1448 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
1449 | md->hdr.isa_msgid); | |||
1450 | ||||
1451 | if (st == NULL((void*)0)) { | |||
1452 | /* No appropriate Quick Mode state. | |||
1453 | * See if we have a Main Mode state. | |||
1454 | * ??? what if this is a duplicate of another message? | |||
1455 | */ | |||
1456 | st = find_state_ikev1(&md->hdr.isa_ike_spis, | |||
1457 | v1_MAINMODE_MSGID((msgid_t) 0)); | |||
1458 | ||||
1459 | if (st == NULL((void*)0)) { | |||
1460 | dbg("Quick Mode message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Quick Mode message is for a non-existent (expired?) ISAKMP SA" ); } }; | |||
1461 | /* XXX Could send notification back */ | |||
1462 | return; | |||
1463 | } | |||
1464 | ||||
1465 | if (st->st_oakley.doing_xauth) { | |||
1466 | dbg("Cannot do Quick Mode until XAUTH done."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Cannot do Quick Mode until XAUTH done."); } }; | |||
1467 | return; | |||
1468 | } | |||
1469 | ||||
1470 | /* Have we just given an IP address to peer? */ | |||
1471 | if (st->st_state->kind == STATE_MODE_CFG_R2) { | |||
1472 | /* ISAKMP is up... */ | |||
1473 | change_state(st, STATE_MAIN_R3); | |||
1474 | } | |||
1475 | ||||
1476 | #ifdef SOFTREMOTE_CLIENT_WORKAROUND | |||
1477 | /* See: http://popoludnica.pl/?id=10100110 */ | |||
1478 | if (st->st_state->kind == STATE_MODE_CFG_R1) { | |||
1479 | log_state(RC_LOG, st, | |||
1480 | "SoftRemote workaround: Cannot do Quick Mode until MODECFG done."); | |||
1481 | return; | |||
1482 | } | |||
1483 | #endif | |||
1484 | ||||
1485 | ||||
1486 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
1487 | log_state(RC_LOG_SERIOUS, st, | |||
1488 | "Quick Mode message is unacceptable because it is for an incomplete ISAKMP SA"); | |||
1489 | SEND_NOTIFICATION(PAYLOAD_MALFORMED /* XXX ? */){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
1490 | return; | |||
1491 | } | |||
1492 | ||||
1493 | if (!unique_msgid(st, md->hdr.isa_msgid)) { | |||
1494 | log_state(RC_LOG_SERIOUS, st, | |||
1495 | "Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x%08" PRIx32"x" " (perhaps this is a duplicated packet)", | |||
1496 | md->hdr.isa_msgid); | |||
1497 | SEND_NOTIFICATION(INVALID_MESSAGE_ID){ { const unsigned __pstat = (INVALID_MESSAGE_ID); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_MESSAGE_ID ); else send_notification_from_md(md, INVALID_MESSAGE_ID); }; | |||
1498 | return; | |||
1499 | } | |||
1500 | st->st_v1_msgid.reserved = false0; | |||
1501 | ||||
1502 | /* Quick Mode Initial IV */ | |||
1503 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
1504 | new_iv_set = true1; | |||
1505 | ||||
1506 | from_state = STATE_QUICK_R0; | |||
1507 | } else { | |||
1508 | if (st->st_oakley.doing_xauth) { | |||
1509 | log_state(RC_LOG, st, "Cannot do Quick Mode until XAUTH done."); | |||
1510 | return; | |||
1511 | } | |||
1512 | from_state = st->st_state->kind; | |||
1513 | } | |||
1514 | ||||
1515 | break; | |||
1516 | ||||
1517 | case ISAKMP_XCHG_MODE_CFG: | |||
1518 | if (ike_spi_is_zero(&md->hdr.isa_ike_initiator_spiisa_ike_spis.initiator)) { | |||
1519 | dbg("Mode Config message is invalid because it has an Initiator Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has an Initiator Cookie of 0" ); } }; | |||
1520 | /* XXX Could send notification back */ | |||
1521 | return; | |||
1522 | } | |||
1523 | ||||
1524 | if (ike_spi_is_zero(&md->hdr.isa_ike_responder_spiisa_ike_spis.responder)) { | |||
1525 | dbg("Mode Config message is invalid because it has a Responder Cookie of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Responder Cookie of 0" ); } }; | |||
1526 | /* XXX Could send notification back */ | |||
1527 | return; | |||
1528 | } | |||
1529 | ||||
1530 | if (md->hdr.isa_msgid == 0) { | |||
1531 | dbg("Mode Config message is invalid because it has a Message ID of 0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is invalid because it has a Message ID of 0" ); } }; | |||
1532 | /* XXX Could send notification back */ | |||
1533 | return; | |||
1534 | } | |||
1535 | ||||
1536 | st = find_v1_info_state(&md->hdr.isa_ike_spis, md->hdr.isa_msgid); | |||
1537 | ||||
1538 | if (st == NULL((void*)0)) { | |||
1539 | /* No appropriate Mode Config state. | |||
1540 | * See if we have a Main Mode state. | |||
1541 | * ??? what if this is a duplicate of another message? | |||
1542 | */ | |||
1543 | dbg("No appropriate Mode Config state yet. See if we have a Main Mode state"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("No appropriate Mode Config state yet. See if we have a Main Mode state" ); } }; | |||
1544 | ||||
1545 | st = find_v1_info_state(&md->hdr.isa_ike_spis, 0); | |||
1546 | ||||
1547 | if (st == NULL((void*)0)) { | |||
1548 | dbg("Mode Config message is for a non-existent (expired?) ISAKMP SA"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is for a non-existent (expired?) ISAKMP SA" ); } }; | |||
1549 | /* XXX Could send notification back */ | |||
1550 | /* ??? ought to log something (not just DBG)? */ | |||
1551 | return; | |||
1552 | } | |||
1553 | ||||
1554 | ||||
1555 | const struct end *this = &st->st_connection->spd.this; | |||
1556 | esb_buf b; | |||
1557 | dbg(" processing received isakmp_xchg_type %s; this is a%s%s%s%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
1558 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
1559 | this->xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
1560 | this->xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
1561 | this->modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } } | |||
1562 | this->modecfg_client ? " modecfgclient" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" processing received isakmp_xchg_type %s; this is a%s%s%s%s" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), this->xauth_server ? " xauthserver" : "", this->xauth_client ? " xauthclient" : "", this->modecfg_server ? " modecfgserver" : "", this->modecfg_client ? " modecfgclient" : ""); } }; | |||
1563 | ||||
1564 | if (!IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
1565 | dbg("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } } | |||
1566 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Mode Config message is unacceptable because it is for an incomplete ISAKMP SA (state=%s)" , st->st_state->name); } }; | |||
1567 | /* XXX Could send notification back */ | |||
1568 | return; | |||
1569 | } | |||
1570 | dbg(" call init_phase2_iv"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" call init_phase2_iv"); } }; | |||
1571 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
1572 | new_iv_set = true1; | |||
1573 | ||||
1574 | /* | |||
1575 | * okay, now we have to figure out if we are receiving a bogus | |||
1576 | * new message in an outstanding XAUTH server conversation | |||
1577 | * (i.e. a reply to our challenge) | |||
1578 | * (this occurs with some broken other implementations). | |||
1579 | * | |||
1580 | * or if receiving for the first time, an XAUTH challenge. | |||
1581 | * | |||
1582 | * or if we are getting a MODECFG request. | |||
1583 | * | |||
1584 | * we distinguish these states because we cannot both be an | |||
1585 | * XAUTH server and client, and our policy tells us which | |||
1586 | * one we are. | |||
1587 | * | |||
1588 | * to complicate further, it is normal to start a new msgid | |||
1589 | * when going from one state to another, or when restarting | |||
1590 | * the challenge. | |||
1591 | * | |||
1592 | */ | |||
1593 | ||||
1594 | if (this->xauth_server && | |||
1595 | st->st_state->kind == STATE_XAUTH_R1 && | |||
1596 | st->quirks.xauth_ack_msgid) { | |||
1597 | from_state = STATE_XAUTH_R1; | |||
1598 | dbg(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } } | |||
1599 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s state is STATE_XAUTH_R1 and quirks.xauth_ack_msgid is TRUE" , st->st_state->name); } }; | |||
1600 | } else if (this->xauth_client && | |||
1601 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
1602 | from_state = STATE_XAUTH_I0; | |||
1603 | dbg(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
1604 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
1605 | } else if (this->xauth_client && | |||
1606 | st->st_state->kind == STATE_XAUTH_I1) { | |||
1607 | /* | |||
1608 | * in this case, we got a new MODECFG message after I0, maybe | |||
1609 | * because it wants to start over again. | |||
1610 | */ | |||
1611 | from_state = STATE_XAUTH_I0; | |||
1612 | dbg(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } } | |||
1613 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is xauthclient and state == STATE_XAUTH_I1" , st->st_state->name); } }; | |||
1614 | } else if (this->modecfg_server && | |||
1615 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
1616 | from_state = STATE_MODE_CFG_R0; | |||
1617 | dbg(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
1618 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgserver and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
1619 | } else if (this->modecfg_client && | |||
1620 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
1621 | from_state = STATE_MODE_CFG_R1; | |||
1622 | dbg(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } } | |||
1623 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" set from_state to %s this is modecfgclient and IS_PHASE1() is TRUE" , st->st_state->name); } }; | |||
1624 | } else { | |||
1625 | esb_buf b; | |||
1626 | dbg("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1627 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1628 | st->st_connection ->spd.this.xauth_server ? " xauthserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1629 | st->st_connection->spd.this.xauth_client ? " xauthclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1630 | st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1631 | st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } } | |||
1632 | st->st_state->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received isakmp_xchg_type %s; this is a%s%s%s%s in state %s. Reply with UNSUPPORTED_EXCHANGE_TYPE" , enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, & b), st->st_connection ->spd.this.xauth_server ? " xauthserver" : "", st->st_connection->spd.this.xauth_client ? " xauthclient" : "", st->st_connection->spd.this.modecfg_server ? " modecfgserver" : "", st->st_connection->spd.this.modecfg_client ? " modecfgclient" : "", st->st_state->name); } }; | |||
1633 | return; | |||
1634 | } | |||
1635 | } else { | |||
1636 | if (st->st_connection->spd.this.xauth_server && | |||
1637 | IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2)) { | |||
1638 | /* Switch from Phase1 to Mode Config */ | |||
1639 | dbg("We were in phase 1, with no state, so we went to XAUTH_R0"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We were in phase 1, with no state, so we went to XAUTH_R0" ); } }; | |||
1640 | change_state(st, STATE_XAUTH_R0); | |||
1641 | } | |||
1642 | ||||
1643 | /* otherwise, this is fine, we continue in the state we are in */ | |||
1644 | from_state = st->st_state->kind; | |||
1645 | } | |||
1646 | ||||
1647 | break; | |||
1648 | ||||
1649 | case ISAKMP_XCHG_NONE: | |||
1650 | case ISAKMP_XCHG_BASE: | |||
1651 | case ISAKMP_XCHG_AO: | |||
1652 | case ISAKMP_XCHG_NGRP: | |||
1653 | default: | |||
1654 | { | |||
1655 | esb_buf b; | |||
1656 | dbg("unsupported exchange type %s in message",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } } | |||
1657 | enum_show(&ikev1_exchange_names, md->hdr.isa_xchg, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unsupported exchange type %s in message", enum_show (&ikev1_exchange_names, md->hdr.isa_xchg, &b)); } }; | |||
1658 | SEND_NOTIFICATION(UNSUPPORTED_EXCHANGE_TYPE){ { const unsigned __pstat = (UNSUPPORTED_EXCHANGE_TYPE); if ( __pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(* (pstats_ikev1_sent_notifies_e)))) { pstats_ikev1_sent_notifies_e [__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ikev1_sent_notifies_e" , __pstat); } }; if (st != ((void*)0)) send_notification_from_state (st, from_state, UNSUPPORTED_EXCHANGE_TYPE); else send_notification_from_md (md, UNSUPPORTED_EXCHANGE_TYPE); }; | |||
1659 | return; | |||
1660 | } | |||
1661 | } | |||
1662 | ||||
1663 | /* We have found a from_state, and perhaps a state object. | |||
1664 | * If we need to build a new state object, | |||
1665 | * we wait until the packet has been sanity checked. | |||
1666 | */ | |||
1667 | ||||
1668 | /* We don't support the Commit Flag. It is such a bad feature. | |||
1669 | * It isn't protected -- neither encrypted nor authenticated. | |||
1670 | * A man in the middle turns it on, leading to DoS. | |||
1671 | * We just ignore it, with a warning. | |||
1672 | */ | |||
1673 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_COMMIT(1<<ISAKMP_FLAGS_v1_COMMIT_IX)) | |||
1674 | dbg("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKE message has the Commit Flag set but Pluto doesn't implement this feature due to security concerns; ignoring flag" ); } }; | |||
1675 | ||||
1676 | /* Handle IKE fragmentation payloads */ | |||
1677 | if (md->hdr.isa_np == ISAKMP_NEXT_IKE_FRAGMENTATION) { | |||
1678 | struct isakmp_ikefrag fraghdr; | |||
1679 | int last_frag_index = 0; /* index of the last fragment */ | |||
1680 | pb_stream frag_pbs; | |||
1681 | ||||
1682 | if (st == NULL((void*)0)) { | |||
1683 | dbg("received IKE fragment, but have no state. Ignoring packet."){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment, but have no state. Ignoring packet." ); } }; | |||
1684 | return; | |||
1685 | } | |||
1686 | ||||
1687 | if ((st->st_connection->policy & POLICY_IKE_FRAG_ALLOW((lset_t)1 << (POLICY_IKE_FRAG_ALLOW_IX))) == 0) { | |||
1688 | dbg("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("discarding IKE fragment packet - fragmentation not allowed by local policy (ike_frag=no)" ); } }; | |||
1689 | return; | |||
1690 | } | |||
1691 | ||||
1692 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ikefrag_desc, | |||
1693 | &fraghdr, sizeof(fraghdr), &frag_pbs); | |||
1694 | if (d != NULL((void*)0)) { | |||
1695 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
1696 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
1697 | return; | |||
1698 | } | |||
1699 | if (pbs_room(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->start )) != fraghdr.isafrag_length || | |||
1700 | fraghdr.isafrag_np != ISAKMP_NEXT_NONE || | |||
1701 | fraghdr.isafrag_number == 0 || | |||
1702 | fraghdr.isafrag_number > 16) { | |||
1703 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
1704 | return; | |||
1705 | } | |||
1706 | ||||
1707 | dbg("received IKE fragment id '%d', number '%u'%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
1708 | fraghdr.isafrag_id,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
1709 | fraghdr.isafrag_number,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } } | |||
1710 | (fraghdr.isafrag_flags == 1) ? "(last)" : ""){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received IKE fragment id '%d', number '%u'%s" , fraghdr.isafrag_id, fraghdr.isafrag_number, (fraghdr.isafrag_flags == 1) ? "(last)" : ""); } }; | |||
1711 | ||||
1712 | struct v1_ike_rfrag *ike_frag = alloc_thing(struct v1_ike_rfrag, "ike_frag")((struct v1_ike_rfrag*) alloc_bytes(sizeof(struct v1_ike_rfrag ), ("ike_frag"))); | |||
1713 | ike_frag->md = md_addref(md, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1713, }; &here; })); | |||
1714 | ike_frag->index = fraghdr.isafrag_number; | |||
1715 | ike_frag->last = (fraghdr.isafrag_flags & 1); | |||
1716 | ike_frag->size = pbs_left(&frag_pbs)((size_t)((&frag_pbs)->roof - (&frag_pbs)->cur) ); | |||
1717 | ike_frag->data = frag_pbs.cur; | |||
1718 | ||||
1719 | /* Add the fragment to the state */ | |||
1720 | struct v1_ike_rfrag **i = &st->st_v1_rfrags; | |||
1721 | for (;;) { | |||
1722 | if (ike_frag != NULL((void*)0)) { | |||
1723 | /* Still looking for a place to insert ike_frag */ | |||
1724 | if (*i == NULL((void*)0) || | |||
1725 | (*i)->index > ike_frag->index) { | |||
1726 | ike_frag->next = *i; | |||
1727 | *i = ike_frag; | |||
1728 | ike_frag = NULL((void*)0); | |||
1729 | } else if ((*i)->index == ike_frag->index) { | |||
1730 | /* Replace fragment with same index */ | |||
1731 | struct v1_ike_rfrag *old = *i; | |||
1732 | ||||
1733 | ike_frag->next = old->next; | |||
1734 | *i = ike_frag; | |||
1735 | pexpect(old->md != NULL)({ _Bool assertion__ = old->md != ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1735, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "old->md != ((void*)0)" ); } assertion__; }); | |||
1736 | release_any_md(&old->md)md_delref(&old->md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1736, }; &here; })); | |||
1737 | pfree(old); | |||
1738 | ike_frag = NULL((void*)0); | |||
1739 | } | |||
1740 | } | |||
1741 | ||||
1742 | if (*i == NULL((void*)0)) | |||
1743 | break; | |||
1744 | ||||
1745 | if ((*i)->last) | |||
1746 | last_frag_index = (*i)->index; | |||
1747 | ||||
1748 | i = &(*i)->next; | |||
1749 | } | |||
1750 | ||||
1751 | /* We have the last fragment, reassemble if complete */ | |||
1752 | if (last_frag_index != 0) { | |||
1753 | size_t size = 0; | |||
1754 | int prev_index = 0; | |||
1755 | ||||
1756 | for (struct v1_ike_rfrag *frag = st->st_v1_rfrags; frag; frag = frag->next) { | |||
1757 | size += frag->size; | |||
1758 | if (frag->index != ++prev_index) { | |||
1759 | break; /* fragment list incomplete */ | |||
1760 | } else if (frag->index == last_frag_index) { | |||
1761 | struct msg_digest *whole_md = alloc_md(frag->md->iface, | |||
1762 | &frag->md->sender, | |||
1763 | HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1763, }; &here; })); | |||
1764 | uint8_t *buffer = alloc_bytes(size, | |||
1765 | "IKE fragments buffer"); | |||
1766 | size_t offset = 0; | |||
1767 | ||||
1768 | /* Reassemble fragments in buffer */ | |||
1769 | frag = st->st_v1_rfrags; | |||
1770 | while (frag != NULL((void*)0) && | |||
1771 | frag->index <= last_frag_index) | |||
1772 | { | |||
1773 | passert(offset + frag->size <=({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }) | |||
1774 | size)({ _Bool assertion__ = offset + frag->size <= size; if ( !assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1774, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "offset + frag->size <= size" ); } (void) 1; }); | |||
1775 | memcpy(buffer + offset, | |||
1776 | frag->data, frag->size); | |||
1777 | offset += frag->size; | |||
1778 | frag = frag->next; | |||
1779 | } | |||
1780 | ||||
1781 | init_pbs(&whole_md->packet_pbs, buffer, size, | |||
1782 | "packet"); | |||
1783 | ||||
1784 | process_packet(&whole_md); | |||
1785 | release_any_md(&whole_md)md_delref(&whole_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1785 , }; &here; })); | |||
1786 | free_v1_message_queues(st); | |||
1787 | /* optimize: if receiving fragments, immediately respond with fragments too */ | |||
1788 | st->st_v1_seen_fragments = true1; | |||
1789 | dbg(" updated IKE fragment state to respond using fragments without waiting for re-transmits"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" updated IKE fragment state to respond using fragments without waiting for re-transmits" ); } }; | |||
1790 | break; | |||
1791 | } | |||
1792 | } | |||
1793 | } | |||
1794 | ||||
1795 | return; | |||
1796 | } | |||
1797 | ||||
1798 | /* | |||
1799 | * Set smc to describe this state's properties. | |||
1800 | * | |||
1801 | * Look up the appropriate microcode based on state and | |||
1802 | * possibly Oakley Auth type. | |||
1803 | */ | |||
1804 | passert(STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF)({ _Bool assertion__ = STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1804, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "STATE_IKEv1_FLOOR <= from_state && from_state < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
1805 | const struct finite_state *fs = finite_states[from_state]; | |||
1806 | passert(fs != NULL)({ _Bool assertion__ = fs != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1806, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "fs != ((void*)0)"); } (void) 1; }); | |||
1807 | const struct state_v1_microcode *smc = fs->v1_transitions; | |||
1808 | passert(smc != NULL)({ _Bool assertion__ = smc != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1808, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc != ((void*)0)"); } ( void) 1; }); | |||
1809 | ||||
1810 | /* | |||
1811 | * Find the state's the state transitions that has matching | |||
1812 | * authentication. | |||
1813 | * | |||
1814 | * For states where this makes no sense (eg, quick states | |||
1815 | * creating a CHILD_SA), .flags|=SMF_ALL_AUTH so the first | |||
1816 | * (only) one always matches. | |||
1817 | * | |||
1818 | * XXX: The code assumes that when there is always a match (if | |||
1819 | * there isn't the passert() triggers. If needed, bogus | |||
1820 | * transitions that log/drop the packet are added to the | |||
1821 | * table? Would simply dropping the packets be easier. | |||
1822 | */ | |||
1823 | if (st != NULL((void*)0)) { | |||
1824 | oakley_auth_t baseauth = | |||
1825 | xauth_calcbaseauth(st->st_oakley.auth); | |||
1826 | ||||
1827 | while (!LHAS(smc->flags, baseauth)(((smc->flags) & ((lset_t)1 << (baseauth))) != ( (lset_t)0))) { | |||
1828 | smc++; | |||
1829 | passert(smc->state == from_state)({ _Bool assertion__ = smc->state == from_state; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1829, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "smc->state == from_state" ); } (void) 1; }); | |||
1830 | } | |||
1831 | } | |||
1832 | ||||
1833 | /* | |||
1834 | * XXX: do this earlier? */ | |||
1835 | if (verbose_state_busy(st)) | |||
1836 | return; | |||
1837 | ||||
1838 | /* | |||
1839 | * Detect and handle duplicated packets. This won't work for | |||
1840 | * the initial packet of an exchange because we won't have a | |||
1841 | * state object to remember it. If we are in a non-receiving | |||
1842 | * state (terminal), and the preceding state did transmit, | |||
1843 | * then the duplicate may indicate that that transmission | |||
1844 | * wasn't received -- retransmit it. Otherwise, just discard | |||
1845 | * it. ??? Notification packets are like exchanges -- I hope | |||
1846 | * that they are idempotent! | |||
1847 | * | |||
1848 | * XXX: do this earlier? | |||
1849 | */ | |||
1850 | if (st != NULL((void*)0) && ikev1_duplicate(st, md)) { | |||
1851 | return; | |||
1852 | } | |||
1853 | ||||
1854 | /* save values for use in resumption of processing below. | |||
1855 | * (may be suspended due to crypto operation not yet complete) | |||
1856 | */ | |||
1857 | md->v1_st = st; | |||
1858 | md->smc = smc; | |||
1859 | md->new_iv_set = new_iv_set; | |||
1860 | ||||
1861 | /* | |||
1862 | * look for encrypt packets. We cannot handle them if we have not | |||
1863 | * yet calculated the skeyids. We will just store the packet in | |||
1864 | * the suspended state, since the calculation is likely underway. | |||
1865 | * | |||
1866 | * note that this differs from above, because skeyid is calculated | |||
1867 | * in between states. (or will be, once DH is async) | |||
1868 | * | |||
1869 | */ | |||
1870 | if ((md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) && | |||
1871 | st != NULL((void*)0) && | |||
1872 | !st->hidden_variables.st_skeyid_calculated) { | |||
1873 | endpoint_buf b; | |||
1874 | dbg("received encrypted packet from %s but exponentiation still in progress",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } } | |||
1875 | str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s but exponentiation still in progress" , str_endpoint(&md->sender, &b)); } }; | |||
1876 | ||||
1877 | /* | |||
1878 | * if there was a previous packet, let it go, and go | |||
1879 | * with most recent one. | |||
1880 | */ | |||
1881 | if (st->st_suspended_md != NULL((void*)0)) { | |||
1882 | dbg("releasing suspended operation before completion: %p",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } } | |||
1883 | st->st_suspended_md){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("releasing suspended operation before completion: %p" , st->st_suspended_md); } }; | |||
1884 | release_any_md(&st->st_suspended_md)md_delref(&st->st_suspended_md, ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 1884, }; &here; })); | |||
1885 | } | |||
1886 | suspend_any_md(st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (st)->st_serialno, md); } }; ({ _Bool assertion__ = (st) ->st_suspended_md == ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 1886, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "(st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (st)->st_suspended_md = md_addref(md, ( { static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, }; &here; })); ( st)->st_suspended_md_func = __func__; (st)->st_suspended_md_line = 1886; ({ _Bool assertion__ = state_is_busy(st); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1886, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "state_is_busy(st)"); } ( void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; | |||
1887 | return; | |||
1888 | } | |||
1889 | ||||
1890 | process_packet_tail(md); | |||
1891 | /* our caller will release_any_md(mdp); */ | |||
1892 | } | |||
1893 | ||||
1894 | /* | |||
1895 | * This routine will not release_any_md(mdp). It is expected that its | |||
1896 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
1897 | * **mdp should not be freed. So the caller should be prepared for | |||
1898 | * *mdp being set to NULL. | |||
1899 | */ | |||
1900 | void process_packet_tail(struct msg_digest *md) | |||
1901 | { | |||
1902 | struct state *st = md->v1_st; | |||
| ||||
1903 | const struct state_v1_microcode *smc = md->smc; | |||
1904 | enum state_kind from_state = smc->state; | |||
1905 | bool_Bool new_iv_set = md->new_iv_set; | |||
1906 | bool_Bool self_delete = false0; | |||
1907 | ||||
1908 | if (md->hdr.isa_flags & ISAKMP_FLAGS_v1_ENCRYPTION(1<<ISAKMP_FLAGS_v1_ENCRYPTION_IX)) { | |||
1909 | ||||
1910 | endpoint_buf b; | |||
1911 | dbg("received encrypted packet from %s", str_endpoint(&md->sender, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("received encrypted packet from %s", str_endpoint (&md->sender, &b)); } }; | |||
1912 | ||||
1913 | if (st == NULL((void*)0)) { | |||
1914 | LOG_PACKET(RC_LOG,{ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } } | |||
1915 | "discarding encrypted message for an unknown ISAKMP SA"){ if (st != ((void*)0)) { log_state(RC_LOG, st, "discarding encrypted message for an unknown ISAKMP SA" ); } else { llog(RC_LOG, md->md_logger, "discarding encrypted message for an unknown ISAKMP SA" ); } }; | |||
1916 | return; | |||
1917 | } | |||
1918 | if (st->st_skeyid_e_nssst_skey_ei_nss == NULL((void*)0)) { | |||
1919 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } } | |||
1920 | "discarding encrypted message because we haven't yet negotiated keying material"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "discarding encrypted message because we haven't yet negotiated keying material" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "discarding encrypted message because we haven't yet negotiated keying material" ); } }; | |||
1921 | return; | |||
1922 | } | |||
1923 | ||||
1924 | /* Mark as encrypted */ | |||
1925 | md->encrypted = true1; | |||
1926 | ||||
1927 | /* do the specified decryption | |||
1928 | * | |||
1929 | * IV is from st->st_iv or (if new_iv_set) st->st_new_iv. | |||
1930 | * The new IV is placed in st->st_new_iv | |||
1931 | * | |||
1932 | * See RFC 2409 "IKE" Appendix B | |||
1933 | * | |||
1934 | * XXX The IV should only be updated really if the packet | |||
1935 | * is successfully processed. | |||
1936 | * We should keep this value, check for a success return | |||
1937 | * value from the parsing routines and then replace. | |||
1938 | * | |||
1939 | * Each post phase 1 exchange generates IVs from | |||
1940 | * the last phase 1 block, not the last block sent. | |||
1941 | */ | |||
1942 | const struct encrypt_desc *e = st->st_oakley.ta_encrypt; | |||
1943 | ||||
1944 | if (pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) % e->enc_blocksize != 0) { | |||
1945 | LOG_PACKET(RC_LOG_SERIOUS, "malformed message: not a multiple of encryption blocksize"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed message: not a multiple of encryption blocksize" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed message: not a multiple of encryption blocksize" ); } }; | |||
1946 | return; | |||
1947 | } | |||
1948 | ||||
1949 | /* XXX Detect weak keys */ | |||
1950 | ||||
1951 | /* grab a copy of raw packet (for duplicate packet detection) */ | |||
1952 | md->raw_packet = clone_bytes_as_chunk(md->packet_pbs.start, | |||
1953 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), | |||
1954 | "raw packet"); | |||
1955 | ||||
1956 | /* Decrypt everything after header */ | |||
1957 | if (!new_iv_set) { | |||
1958 | if (st->st_v1_iv.len == 0) { | |||
1959 | init_phase2_iv(st, &md->hdr.isa_msgid); | |||
1960 | } else { | |||
1961 | /* use old IV */ | |||
1962 | restore_new_iv(st, st->st_v1_iv){ (st)->st_v1_new_iv = (st->st_v1_iv); }; | |||
1963 | } | |||
1964 | } | |||
1965 | ||||
1966 | passert(st->st_v1_new_iv.len >= e->enc_blocksize)({ _Bool assertion__ = st->st_v1_new_iv.len >= e->enc_blocksize ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 1966, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_v1_new_iv.len >= e->enc_blocksize" ); } (void) 1; }); | |||
1967 | st->st_v1_new_iv.len = e->enc_blocksize; /* truncate */ | |||
1968 | ||||
1969 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { | |||
1970 | DBG_log("decrypting %u bytes using algorithm %s", | |||
1971 | (unsigned) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), | |||
1972 | st->st_oakley.ta_encrypt->common.fqn); | |||
1973 | DBG_dump_hunk("IV before:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV before:", hunk_.ptr, hunk_.len); }; | |||
1974 | } | |||
1975 | e->encrypt_ops->do_crypt(e, md->message_pbs.cur, | |||
1976 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)), | |||
1977 | st->st_enc_key_nss, | |||
1978 | st->st_v1_new_iv.ptr, false0, | |||
1979 | st->st_logger); | |||
1980 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { | |||
1981 | DBG_dump_hunk("IV after:", st->st_v1_new_iv){ typeof(st->st_v1_new_iv) hunk_ = st->st_v1_new_iv; DBG_dump ("IV after:", hunk_.ptr, hunk_.len); }; | |||
1982 | DBG_log("decrypted payload (starts at offset %td):", | |||
1983 | md->message_pbs.cur - md->message_pbs.roof); | |||
1984 | DBG_dump(NULL((void*)0), md->message_pbs.start, | |||
1985 | md->message_pbs.roof - md->message_pbs.start); | |||
1986 | } | |||
1987 | } else { | |||
1988 | /* packet was not encryped -- should it have been? */ | |||
1989 | ||||
1990 | if (smc->flags & SMF_INPUT_ENCRYPTED((lset_t)1 << (OAKLEY_AUTH_ROOF + 2))) { | |||
1991 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } } | |||
1992 | "packet rejected: should have been encrypted"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "packet rejected: should have been encrypted" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "packet rejected: should have been encrypted" ); } }; | |||
1993 | SEND_NOTIFICATION(INVALID_FLAGS){ { const unsigned __pstat = (INVALID_FLAGS); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_FLAGS ); else send_notification_from_md(md, INVALID_FLAGS); }; | |||
1994 | return; | |||
1995 | } | |||
1996 | } | |||
1997 | ||||
1998 | /* Digest the message. | |||
1999 | * Padding must be removed to make hashing work. | |||
2000 | * Padding comes from encryption (so this code must be after decryption). | |||
2001 | * Padding rules are described before the definition of | |||
2002 | * struct isakmp_hdr in packet.h. | |||
2003 | */ | |||
2004 | { | |||
2005 | enum next_payload_types_ikev1 np = md->hdr.isa_np; | |||
2006 | lset_t needed = smc->req_payloads; | |||
2007 | const char *excuse = | |||
2008 | LIN(SMF_PSK_AUTH | SMF_FIRST_ENCRYPTED_INPUT,(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) | |||
2009 | smc->flags)(((((lset_t)1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1))) & (smc->flags)) == (((lset_t )1 << (OAKLEY_PRESHARED_KEY)) | ((lset_t)1 << (OAKLEY_AUTH_ROOF + 1)))) ? | |||
2010 | "probable authentication failure (mismatch of preshared secrets?): " | |||
2011 | : | |||
2012 | ""; | |||
2013 | ||||
2014 | while (np != ISAKMP_NEXT_NONE) { | |||
2015 | struct_desc *sd = v1_payload_desc(np); | |||
2016 | ||||
2017 | if (md->digest_roof >= elemsof(md->digest)(sizeof(md->digest) / sizeof(*(md->digest)))) { | |||
2018 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } | |||
2019 | "more than %zu payloads in message; ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } } | |||
2020 | elemsof(md->digest)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } else { llog(RC_LOG_SERIOUS, md->md_logger, "more than %zu payloads in message; ignored" , (sizeof(md->digest) / sizeof(*(md->digest)))); } }; | |||
2021 | if (!md->encrypted) { | |||
2022 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2023 | } | |||
2024 | return; | |||
2025 | } | |||
2026 | struct payload_digest *const pd = md->digest + md->digest_roof; | |||
2027 | ||||
2028 | /* | |||
2029 | * only do this in main mode. In aggressive mode, there | |||
2030 | * is no negotiation of NAT-T method. Get it right. | |||
2031 | */ | |||
2032 | if (st != NULL((void*)0) && st->st_connection != NULL((void*)0) && | |||
2033 | (st->st_connection->policy & POLICY_AGGRESSIVE((lset_t)1 << (POLICY_AGGRESSIVE_IX))) == LEMPTY((lset_t)0)) | |||
2034 | { | |||
2035 | switch (np) { | |||
2036 | case ISAKMP_NEXT_NATD_RFC: | |||
2037 | case ISAKMP_NEXT_NATOA_RFC: | |||
2038 | if ((st->hidden_variables.st_nat_traversal & NAT_T_WITH_RFC_VALUES((lset_t)1 << (NAT_TRAVERSAL_METHOD_IETF_RFC))) == LEMPTY((lset_t)0)) { | |||
2039 | /* | |||
2040 | * don't accept NAT-D/NAT-OA reloc directly in message, | |||
2041 | * unless we're using NAT-T RFC | |||
2042 | */ | |||
2043 | lset_buf lb; | |||
2044 | dbg("st_nat_traversal was: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
2045 | str_lset(&natt_method_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
2046 | st->hidden_variables.st_nat_traversal,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } } | |||
2047 | &lb)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("st_nat_traversal was: %s", str_lset(&natt_method_names , st->hidden_variables.st_nat_traversal, &lb)); } }; | |||
2048 | sd = NULL((void*)0); | |||
2049 | } | |||
2050 | break; | |||
2051 | default: | |||
2052 | break; | |||
2053 | } | |||
2054 | } | |||
2055 | ||||
2056 | if (sd == NULL((void*)0)) { | |||
2057 | /* payload type is out of range or requires special handling */ | |||
2058 | switch (np) { | |||
2059 | case ISAKMP_NEXT_ID: | |||
2060 | /* ??? two kinds of ID payloads */ | |||
2061 | sd = (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || | |||
2062 | IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) ? | |||
2063 | &isakmp_identification_desc : | |||
2064 | &isakmp_ipsec_identification_desc; | |||
2065 | break; | |||
2066 | ||||
2067 | case ISAKMP_NEXT_NATD_DRAFTS: /* out of range */ | |||
2068 | /* | |||
2069 | * ISAKMP_NEXT_NATD_DRAFTS was a private use type before RFC-3947. | |||
2070 | * Since it has the same format as ISAKMP_NEXT_NATD_RFC, | |||
2071 | * just rewrite np and sd, and carry on. | |||
2072 | */ | |||
2073 | np = ISAKMP_NEXT_NATD_RFC; | |||
2074 | sd = &isakmp_nat_d_drafts; | |||
2075 | break; | |||
2076 | ||||
2077 | case ISAKMP_NEXT_NATOA_DRAFTS: /* out of range */ | |||
2078 | /* NAT-OA was a private use type before RFC-3947 -- same format */ | |||
2079 | np = ISAKMP_NEXT_NATOA_RFC; | |||
2080 | sd = &isakmp_nat_oa_drafts; | |||
2081 | break; | |||
2082 | ||||
2083 | case ISAKMP_NEXT_SAK: /* or ISAKMP_NEXT_NATD_BADDRAFTS */ | |||
2084 | /* | |||
2085 | * Official standards say that this is ISAKMP_NEXT_SAK, | |||
2086 | * a part of Group DOI, something we don't implement. | |||
2087 | * Old non-updated Cisco gear abused this number in ancient NAT drafts. | |||
2088 | * We ignore (rather than reject) this in support of people | |||
2089 | * with crufty Cisco machines. | |||
2090 | */ | |||
2091 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } | |||
2092 | "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } } | |||
2093 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage with unsupported payload ISAKMP_NEXT_SAK (or ISAKMP_NEXT_NATD_BADDRAFTS) ignored" , excuse); } }; | |||
2094 | /* | |||
2095 | * Hack to discard payload, whatever it was. | |||
2096 | * Since we are skipping the rest of the loop | |||
2097 | * body we must do some things ourself: | |||
2098 | * - demarshall the payload | |||
2099 | * - grab the next payload number (np) | |||
2100 | * - don't keep payload (don't increment pd) | |||
2101 | * - skip rest of loop body | |||
2102 | */ | |||
2103 | diag_t d = pbs_in_struct(&md->message_pbs, &isakmp_ignore_desc, | |||
2104 | &pd->payload, sizeof(pd->payload), &pd->pbs); | |||
2105 | if (d != NULL((void*)0)) { | |||
2106 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
2107 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
2108 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
2109 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; | |||
2110 | if (!md->encrypted) { | |||
2111 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2112 | } | |||
2113 | return; | |||
2114 | } | |||
2115 | np = pd->payload.generic.isag_np; | |||
2116 | /* NOTE: we do not increment pd! */ | |||
2117 | continue; /* skip rest of the loop */ | |||
2118 | ||||
2119 | default: | |||
2120 | { | |||
2121 | esb_buf b; | |||
2122 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
2123 | "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
2124 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } } | |||
2125 | enum_show(&ikev1_payload_names, np, &b)){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smessage ignored because it contains an unknown or unexpected payload type (%s) at the outermost level" , excuse, enum_show(&ikev1_payload_names, np, &b)); } }; | |||
2126 | if (!md->encrypted) { | |||
2127 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; | |||
2128 | } | |||
2129 | return; | |||
2130 | } | |||
2131 | } | |||
2132 | passert(sd != NULL)({ _Bool assertion__ = sd != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2132, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "sd != ((void*)0)"); } (void) 1; }); | |||
2133 | } | |||
2134 | ||||
2135 | passert(np < LELEM_ROOF)({ _Bool assertion__ = np < 64; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2135, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "np < 64"); } (void) 1; }); | |||
2136 | ||||
2137 | { | |||
2138 | lset_t s = LELEM(np)((lset_t)1 << (np)); | |||
2139 | ||||
2140 | if (LDISJOINT(s,(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2141 | needed | smc->opt_payloads |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2142 | LELEM(ISAKMP_NEXT_VID) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2143 | LELEM(ISAKMP_NEXT_N) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2144 | LELEM(ISAKMP_NEXT_D) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2145 | LELEM(ISAKMP_NEXT_CR) |(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) ) | |||
2146 | LELEM(ISAKMP_NEXT_CERT))(((s) & (needed | smc->opt_payloads | ((lset_t)1 << (ISAKMP_NEXT_VID)) | ((lset_t)1 << (ISAKMP_NEXT_N)) | ( (lset_t)1 << (ISAKMP_NEXT_D)) | ((lset_t)1 << (ISAKMP_NEXT_CR )) | ((lset_t)1 << (ISAKMP_NEXT_CERT)))) == ((lset_t)0) )) { | |||
2147 | esb_buf b; | |||
2148 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
2149 | "%smessage ignored because it contains a payload type (%s) unexpected by state %s",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
2150 | excuse,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
2151 | enum_show(&ikev1_payload_names, np, &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } } | |||
2152 | finite_states[smc->state]->name){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } else { llog(RC_LOG_SERIOUS, md-> md_logger, "%smessage ignored because it contains a payload type (%s) unexpected by state %s" , excuse, enum_show(&ikev1_payload_names, np, &b), finite_states [smc->state]->name); } }; | |||
2153 | if (!md->encrypted) { | |||
2154 | SEND_NOTIFICATION(INVALID_PAYLOAD_TYPE){ { const unsigned __pstat = (INVALID_PAYLOAD_TYPE); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, INVALID_PAYLOAD_TYPE ); else send_notification_from_md(md, INVALID_PAYLOAD_TYPE); }; | |||
2155 | } | |||
2156 | return; | |||
2157 | } | |||
2158 | ||||
2159 | esb_buf b; | |||
2160 | dbg("got payload 0x%" PRIxLSET" (%s) needed: 0x%" PRIxLSET " opt: 0x%" PRIxLSET,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } | |||
2161 | s, enum_show(&ikev1_payload_names, np, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } } | |||
2162 | needed, smc->opt_payloads){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("got payload 0x%" "l" "x"" (%s) needed: 0x%" "l" "x" " opt: 0x%" "l" "x", s, enum_show(&ikev1_payload_names , np, &b), needed, smc->opt_payloads); } }; | |||
2163 | needed &= ~s; | |||
2164 | } | |||
2165 | ||||
2166 | /* | |||
2167 | * Read in the payload recording what type it | |||
2168 | * should be | |||
2169 | */ | |||
2170 | pd->payload_type = np; | |||
2171 | diag_t d = pbs_in_struct(&md->message_pbs, sd, | |||
2172 | &pd->payload, sizeof(pd->payload), | |||
2173 | &pd->pbs); | |||
2174 | if (d != NULL((void*)0)) { | |||
2175 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
| ||||
2176 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
2177 | "%smalformed payload in packet",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } } | |||
2178 | excuse){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "%smalformed payload in packet" , excuse); } else { llog(RC_LOG_SERIOUS, md->md_logger, "%smalformed payload in packet" , excuse); } }; | |||
2179 | if (!md->encrypted) { | |||
2180 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2181 | } | |||
2182 | return; | |||
2183 | } | |||
2184 | ||||
2185 | /* do payload-type specific debugging */ | |||
2186 | switch (np) { | |||
2187 | case ISAKMP_NEXT_ID: | |||
2188 | case ISAKMP_NEXT_NATOA_RFC: | |||
2189 | /* dump ID section */ | |||
2190 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
2191 | DBG_dump(" obj: ", pd->pbs.cur, | |||
2192 | pbs_left(&pd->pbs)((size_t)((&pd->pbs)->roof - (&pd->pbs)-> cur))); | |||
2193 | } | |||
2194 | break; | |||
2195 | default: | |||
2196 | break; | |||
2197 | } | |||
2198 | ||||
2199 | ||||
2200 | /* | |||
2201 | * Place payload at the end of the chain for this type. | |||
2202 | * This code appears in ikev1.c and ikev2.c. | |||
2203 | */ | |||
2204 | { | |||
2205 | /* np is a proper subscript for chain[] */ | |||
2206 | passert(np < elemsof(md->chain))({ _Bool assertion__ = np < (sizeof(md->chain) / sizeof (*(md->chain))); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c" , .line = 2206, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "np < (sizeof(md->chain) / sizeof(*(md->chain)))" ); } (void) 1; }); | |||
2207 | struct payload_digest **p = &md->chain[np]; | |||
2208 | ||||
2209 | while (*p != NULL((void*)0)) | |||
2210 | p = &(*p)->next; | |||
2211 | *p = pd; | |||
2212 | pd->next = NULL((void*)0); | |||
2213 | } | |||
2214 | ||||
2215 | np = pd->payload.generic.isag_np; | |||
2216 | md->digest_roof++; | |||
2217 | ||||
2218 | /* since we've digested one payload happily, it is probably | |||
2219 | * the case that any decryption worked. So we will not suggest | |||
2220 | * encryption failure as an excuse for subsequent payload | |||
2221 | * problems. | |||
2222 | */ | |||
2223 | excuse = ""; | |||
2224 | } | |||
2225 | ||||
2226 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX)))) && | |||
2227 | pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur)) != 0) { | |||
2228 | DBG_log("removing %d bytes of padding", | |||
2229 | (int) pbs_left(&md->message_pbs)((size_t)((&md->message_pbs)->roof - (&md->message_pbs )->cur))); | |||
2230 | } | |||
2231 | ||||
2232 | md->message_pbs.roof = md->message_pbs.cur; | |||
2233 | ||||
2234 | /* check that all mandatory payloads appeared */ | |||
2235 | ||||
2236 | if (needed != 0) { | |||
2237 | LOG_PACKET_JAMBUF(RC_LOG_SERIOUS, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((RC_LOG_SERIOUS ) & NO_PREFIX) == ((lset_t)0) && (((RC_LOG_SERIOUS ) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & ( ((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { ((st != ((void *)0) ? st->st_logger : md->md_logger))->object_vec-> jam_object_prefix(buf, ((st != ((void*)0) ? st->st_logger : md->md_logger))->object); } }); buf != ((void*)0); jambuf_to_logger (buf, ((st != ((void*)0) ? st->st_logger : md->md_logger )), RC_LOG_SERIOUS), buf = ((void*)0)) { | |||
2238 | jam(buf, "message for %s is missing payloads ", | |||
2239 | finite_states[from_state]->name); | |||
2240 | jam_lset_short(buf, &ikev1_payload_names, "+", needed); | |||
2241 | } | |||
2242 | if (!md->encrypted) { | |||
2243 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2244 | } | |||
2245 | return; | |||
2246 | } | |||
2247 | } | |||
2248 | ||||
2249 | if (!check_v1_HASH(smc->hash_type, smc->message, st, md)) { | |||
2250 | /*SEND_NOTIFICATION(INVALID_HASH_INFORMATION);*/ | |||
2251 | return; | |||
2252 | } | |||
2253 | ||||
2254 | /* more sanity checking: enforce most ordering constraints */ | |||
2255 | ||||
2256 | if (IS_V1_PHASE1(from_state)(STATE_MAIN_R0 <= (from_state) && (from_state) <= STATE_AGGR_R2) || IS_V1_PHASE15(from_state)(STATE_XAUTH_R0 <= (from_state) && (from_state) <= STATE_XAUTH_I1)) { | |||
2257 | /* rfc2409: The Internet Key Exchange (IKE), 5 Exchanges: | |||
2258 | * "The SA payload MUST precede all other payloads in a phase 1 exchange." | |||
2259 | */ | |||
2260 | if (md->chain[ISAKMP_NEXT_SA] != NULL((void*)0) && | |||
2261 | md->hdr.isa_np != ISAKMP_NEXT_SA) { | |||
2262 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } } | |||
2263 | "malformed Phase 1 message: does not start with an SA payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Phase 1 message: does not start with an SA payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Phase 1 message: does not start with an SA payload" ); } }; | |||
2264 | if (!md->encrypted) { | |||
2265 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2266 | } | |||
2267 | return; | |||
2268 | } | |||
2269 | } else if (IS_V1_QUICK(from_state)(STATE_QUICK_R0 <= (from_state) && (from_state) <= STATE_QUICK_R2)) { | |||
2270 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode | |||
2271 | * | |||
2272 | * "In Quick Mode, a HASH payload MUST immediately follow the ISAKMP | |||
2273 | * header and a SA payload MUST immediately follow the HASH." | |||
2274 | * [NOTE: there may be more than one SA payload, so this is not | |||
2275 | * totally reasonable. Probably all SAs should be so constrained.] | |||
2276 | * | |||
2277 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
2278 | * party, the identities of the parties MUST be passed as IDci and | |||
2279 | * then IDcr." | |||
2280 | * | |||
2281 | * "With the exception of the HASH, SA, and the optional ID payloads, | |||
2282 | * there are no payload ordering restrictions on Quick Mode." | |||
2283 | */ | |||
2284 | ||||
2285 | if (md->hdr.isa_np != ISAKMP_NEXT_HASH) { | |||
2286 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } } | |||
2287 | "malformed Quick Mode message: does not start with a HASH payload"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: does not start with a HASH payload" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: does not start with a HASH payload" ); } }; | |||
2288 | if (!md->encrypted) { | |||
2289 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2290 | } | |||
2291 | return; | |||
2292 | } | |||
2293 | ||||
2294 | { | |||
2295 | struct payload_digest *p; | |||
2296 | int i; | |||
2297 | ||||
2298 | p = md->chain[ISAKMP_NEXT_SA]; | |||
2299 | i = 1; | |||
2300 | while (p != NULL((void*)0)) { | |||
2301 | if (p != &md->digest[i]) { | |||
2302 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } } | |||
2303 | "malformed Quick Mode message: SA payload is in wrong position"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: SA payload is in wrong position" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: SA payload is in wrong position" ); } }; | |||
2304 | if (!md->encrypted) { | |||
2305 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2306 | } | |||
2307 | return; | |||
2308 | } | |||
2309 | p = p->next; | |||
2310 | i++; | |||
2311 | } | |||
2312 | } | |||
2313 | ||||
2314 | /* rfc2409: The Internet Key Exchange (IKE), 5.5 Phase 2 - Quick Mode: | |||
2315 | * "If ISAKMP is acting as a client negotiator on behalf of another | |||
2316 | * party, the identities of the parties MUST be passed as IDci and | |||
2317 | * then IDcr." | |||
2318 | */ | |||
2319 | { | |||
2320 | struct payload_digest *id = md->chain[ISAKMP_NEXT_ID]; | |||
2321 | ||||
2322 | if (id != NULL((void*)0)) { | |||
2323 | if (id->next == NULL((void*)0) || | |||
2324 | id->next->next != NULL((void*)0)) { | |||
2325 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } } | |||
2326 | "malformed Quick Mode message: if any ID payload is present, there must be exactly two"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: if any ID payload is present, there must be exactly two" ); } }; | |||
2327 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2328 | return; | |||
2329 | } | |||
2330 | if (id + 1 != id->next) { | |||
2331 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } } | |||
2332 | "malformed Quick Mode message: the ID payloads are not adjacent"){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "malformed Quick Mode message: the ID payloads are not adjacent" ); } else { llog(RC_LOG_SERIOUS, md->md_logger, "malformed Quick Mode message: the ID payloads are not adjacent" ); } }; | |||
2333 | SEND_NOTIFICATION(PAYLOAD_MALFORMED){ { const unsigned __pstat = (PAYLOAD_MALFORMED); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, PAYLOAD_MALFORMED ); else send_notification_from_md(md, PAYLOAD_MALFORMED); }; | |||
2334 | return; | |||
2335 | } | |||
2336 | } | |||
2337 | } | |||
2338 | } | |||
2339 | ||||
2340 | /* | |||
2341 | * Ignore payloads that we don't handle: | |||
2342 | */ | |||
2343 | /* XXX Handle Notifications */ | |||
2344 | { | |||
2345 | struct payload_digest *p = md->chain[ISAKMP_NEXT_N]; | |||
2346 | ||||
2347 | while (p != NULL((void*)0)) { | |||
2348 | switch (p->payload.notification.isan_type) { | |||
2349 | case R_U_THERE: | |||
2350 | case R_U_THERE_ACK: | |||
2351 | case ISAKMP_N_CISCO_LOAD_BALANCE: | |||
2352 | case PAYLOAD_MALFORMED: | |||
2353 | case INVALID_MESSAGE_ID: | |||
2354 | case IPSEC_RESPONDER_LIFETIME: | |||
2355 | if (md->hdr.isa_xchg == ISAKMP_XCHG_INFO) { | |||
2356 | /* these are handled later on in informational() */ | |||
2357 | break; | |||
2358 | } | |||
2359 | /* FALL THROUGH */ | |||
2360 | default: | |||
2361 | if (st == NULL((void*)0)) { | |||
2362 | esb_buf b; | |||
2363 | dbg("ignoring informational payload %s, no corresponding state",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } | |||
2364 | enum_show(& ikev1_notify_names,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } } | |||
2365 | p->payload.notification.isan_type, &b)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ignoring informational payload %s, no corresponding state" , enum_show(& ikev1_notify_names, p->payload.notification .isan_type, &b)); } }; | |||
2366 | } else { | |||
2367 | esb_buf b; | |||
2368 | LOG_PACKET(RC_LOG_SERIOUS,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2369 | "ignoring informational payload %s, msgid=%08" PRIx32 ", length=%d",{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2370 | enum_show(&ikev1_notify_names,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2371 | p->payload.notification.isan_type,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2372 | &b),{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2373 | st->st_v1_msgid.id,{ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } } | |||
2374 | p->payload.notification.isan_length){ if (st != ((void*)0)) { log_state(RC_LOG_SERIOUS, st, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } else { llog(RC_LOG_SERIOUS , md->md_logger, "ignoring informational payload %s, msgid=%08" "x" ", length=%d", enum_show(&ikev1_notify_names, p-> payload.notification.isan_type, &b), st->st_v1_msgid.id , p->payload.notification.isan_length); } }; | |||
2375 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
2376 | DBG_dump_pbs(&p->pbs)DBG_dump((&p->pbs)->name, (&p->pbs)->start , ((size_t)((&p->pbs)->cur - (&p->pbs)->start ))); | |||
2377 | } | |||
2378 | } | |||
2379 | } | |||
2380 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
2381 | DBG_dump("info:", p->pbs.cur, | |||
2382 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); | |||
2383 | } | |||
2384 | ||||
2385 | p = p->next; | |||
2386 | } | |||
2387 | ||||
2388 | p = md->chain[ISAKMP_NEXT_D]; | |||
2389 | while (p != NULL((void*)0)) { | |||
2390 | self_delete |= accept_delete(md, p); | |||
2391 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
2392 | DBG_dump("del:", p->pbs.cur, | |||
2393 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur ))); | |||
2394 | } | |||
2395 | if (md->v1_st != st) { | |||
2396 | pexpect(md->v1_st == NULL)({ _Bool assertion__ = md->v1_st == ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2396, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "md->v1_st == ((void*)0)" ); } assertion__; }); | |||
2397 | dbg("zapping ST as accept_delete() zapped MD.ST"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("zapping ST as accept_delete() zapped MD.ST"); } }; | |||
2398 | st = md->v1_st; | |||
2399 | } | |||
2400 | p = p->next; | |||
2401 | } | |||
2402 | ||||
2403 | p = md->chain[ISAKMP_NEXT_VID]; | |||
2404 | while (p != NULL((void*)0)) { | |||
2405 | handle_vendorid(md, (char *)p->pbs.cur, | |||
2406 | pbs_left(&p->pbs)((size_t)((&p->pbs)->roof - (&p->pbs)->cur )), false0, | |||
2407 | st != NULL((void*)0) ? st->st_logger : md->md_logger); | |||
2408 | p = p->next; | |||
2409 | } | |||
2410 | } | |||
2411 | ||||
2412 | if (self_delete) { | |||
2413 | accept_self_delete(md); | |||
2414 | st = md->v1_st; | |||
2415 | /* note: st ought to be NULL from here on */ | |||
2416 | } | |||
2417 | ||||
2418 | pexpect(st == md->v1_st)({ _Bool assertion__ = st == md->v1_st; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2418, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "st == md->v1_st"); } assertion__; }); | |||
2419 | statetime_t start = statetime_start(md->v1_st); | |||
2420 | /* | |||
2421 | * XXX: danger - the .informational() processor deletes ST; | |||
2422 | * and then tunnels this loss through MD.ST. | |||
2423 | */ | |||
2424 | stf_status e =smc->processor(st, md); | |||
2425 | complete_v1_state_transition(md->v1_st, md, e); | |||
2426 | statetime_stop(&start, "%s()", __func__); | |||
2427 | /* our caller will release_any_md(mdp); */ | |||
2428 | } | |||
2429 | ||||
2430 | /* | |||
2431 | * replace previous receive packet with latest, to update | |||
2432 | * our notion of a retransmitted packet. This is important | |||
2433 | * to do, even for failing transitions, and suspended transitions | |||
2434 | * because the sender may well retransmit their request. | |||
2435 | * We had better be idempotent since we can be called | |||
2436 | * multiple times in handling a packet due to crypto helper logic. | |||
2437 | */ | |||
2438 | static void remember_received_packet(struct state *st, struct msg_digest *md) | |||
2439 | { | |||
2440 | if (md->encrypted) { | |||
2441 | /* if encrypted, duplication already done */ | |||
2442 | if (md->raw_packet.ptr != NULL((void*)0)) { | |||
2443 | pfreeany(st->st_v1_rpacket.ptr){ typeof(st->st_v1_rpacket.ptr) *pp_ = &(st->st_v1_rpacket .ptr); if (*pp_ != ((void*)0)) { pfree(*pp_); *pp_ = ((void*) 0); } }; | |||
2444 | st->st_v1_rpacket = md->raw_packet; | |||
2445 | md->raw_packet = EMPTY_CHUNK((const chunk_t) { .ptr = ((void*)0), .len = 0 }); | |||
2446 | } | |||
2447 | } else { | |||
2448 | /* this may be a repeat, but it will work */ | |||
2449 | replace_chunk(&st->st_v1_rpacket, | |||
2450 | clone_bytes_as_chunk(md->packet_pbs.start, | |||
2451 | pbs_room(&md->packet_pbs)((size_t)((&md->packet_pbs)->roof - (&md->packet_pbs )->start)), | |||
2452 | "raw packet")); | |||
2453 | } | |||
2454 | } | |||
2455 | ||||
2456 | static void jam_v1_ipsec_details(struct jambuf *buf, struct state *st) | |||
2457 | { | |||
2458 | struct connection *const c = st->st_connection; | |||
2459 | jam_string(buf, c->policy & POLICY_TUNNEL((lset_t)1 << (POLICY_TUNNEL_IX)) ? "tunnel mode" : "transport mode"); | |||
2460 | jam(buf, " "); | |||
2461 | jam_child_sa_details(buf, st); | |||
2462 | } | |||
2463 | ||||
2464 | static void jam_v1_isakmp_details(struct jambuf *buf, struct state *st) | |||
2465 | { | |||
2466 | jam_parent_sa_details(buf, st); | |||
2467 | } | |||
2468 | ||||
2469 | /* complete job started by the state-specific state transition function | |||
2470 | * | |||
2471 | * This routine will not release_any_md(mdp). It is expected that its | |||
2472 | * caller will do this. In fact, it will zap *mdp to NULL if it thinks | |||
2473 | * **mdp should not be freed. So the caller should be prepared for | |||
2474 | * *mdp being set to NULL. | |||
2475 | * | |||
2476 | * md is used to: | |||
2477 | * - find st | |||
2478 | * - find from_state (st might be gone) | |||
2479 | * - find note for STF_FAIL (might not be part of result (STF_FAIL+note)) | |||
2480 | * - find note for STF_INTERNAL_ERROR | |||
2481 | * - record md->event_already_set | |||
2482 | * - remember_received_packet(st, md); | |||
2483 | * - nat_traversal_change_port_lookup(md, st); | |||
2484 | * - smc for smc->next_state | |||
2485 | * - smc for smc->flags & SMF_REPLY to trigger a reply | |||
2486 | * - smc for smc->timeout_event | |||
2487 | * - smc for !(smc->flags & SMF_INITIATOR) for Contivity mode | |||
2488 | * - smc for smc->flags & SMF_RELEASE_PENDING_P2 to trigger unpend call | |||
2489 | * - smc for smc->flags & SMF_INITIATOR to adjust retransmission | |||
2490 | * - fragvid, dpd, nortel | |||
2491 | */ | |||
2492 | void complete_v1_state_transition(struct state *st, struct msg_digest *md, stf_status result) | |||
2493 | { | |||
2494 | /* handle oddball/meta results now */ | |||
2495 | ||||
2496 | /* | |||
2497 | * statistics; lump all FAILs together | |||
2498 | * | |||
2499 | * Fun fact: using min() stupidly fails (at least in GCC 8.1.1 with -Werror=sign-compare) | |||
2500 | * error: comparison of integer expressions of different signedness: `stf_status' {aka `enum <anonymous>'} and `int' | |||
2501 | */ | |||
2502 | pstats(ike_stf, PMIN(result, STF_FAIL)){ const unsigned __pstat = (((result) <= (STF_FAIL) ? (result ) : (STF_FAIL))); if (__pstat < (sizeof(pstats_ike_stf) / sizeof (*(pstats_ike_stf)))) { pstats_ike_stf[__pstat]++; } else if ( (cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d", "ike_stf", __pstat); } }; | |||
2503 | ||||
2504 | dbg("complete v1 state transition with %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
2505 | result > STF_FAIL ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
2506 | enum_name(&ikev1_notify_names, result - STF_FAIL) :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } } | |||
2507 | enum_name(&stf_status_names, result)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("complete v1 state transition with %s", result > STF_FAIL ? enum_name(&ikev1_notify_names, result - STF_FAIL ) : enum_name(&stf_status_names, result)); } }; | |||
2508 | ||||
2509 | switch (result) { | |||
2510 | case STF_SUSPEND: | |||
2511 | /* | |||
2512 | * If this transition was triggered by an incoming | |||
2513 | * packet, save it. | |||
2514 | * | |||
2515 | * XXX: some initiator code creates a fake MD (there | |||
2516 | * isn't a real one); save that as well. | |||
2517 | */ | |||
2518 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2518, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); | |||
2519 | suspend_any_md(md->v1_st, md){ if (md != ((void*)0)) { { if ((cur_debugging & (((lset_t )1 << (DBG_BASE_IX))))) { DBG_log("suspending state #%lu and saving MD %p" , (md->v1_st)->st_serialno, md); } }; ({ _Bool assertion__ = (md->v1_st)->st_suspended_md == ((void*)0); if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "(md->v1_st)->st_suspended_md == ((void*)0)" ); } (void) 1; }); (md->v1_st)->st_suspended_md = md_addref (md, ({ static const struct where here = { .func = __func__, . file = "programs/pluto/ikev1.c", .line = 2519, }; &here; } )); (md->v1_st)->st_suspended_md_func = __func__; (md-> v1_st)->st_suspended_md_line = 2519; ({ _Bool assertion__ = state_is_busy(md->v1_st); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2519, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert( logger_, here, "%s", "state_is_busy(md->v1_st)"); } (void) 1; }); } else { { if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("no MD to suspend"); } }; } }; | |||
2520 | return; | |||
2521 | case STF_IGNORE: | |||
2522 | /* note: md might be NULL */ | |||
2523 | return; | |||
2524 | default: | |||
2525 | passert(md != NULL)({ _Bool assertion__ = md != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2525, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "md != ((void*)0)"); } (void) 1; }); | |||
2526 | break; | |||
2527 | } | |||
2528 | ||||
2529 | /* safe to refer to *md */ | |||
2530 | ||||
2531 | enum state_kind from_state = md->smc->state; | |||
2532 | st = md->v1_st; | |||
2533 | ||||
2534 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2534, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
2535 | pexpect(!state_is_busy(st))({ _Bool assertion__ = !state_is_busy(st); if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2535, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "!state_is_busy(st)"); } assertion__; }); | |||
2536 | ||||
2537 | if (result > STF_OK) { | |||
2538 | linux_audit_conn(md->v1_st, IS_V1_ISAKMP_SA_ESTABLISHED(md->v1_st)((((lset_t)1 << ((md->v1_st)->st_state->kind)) & (((lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4)) | ((lset_t)1 << (STATE_AGGR_I2)) | (( lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0 )) | ((lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0)) | ((lset_t)1 << (STATE_MODE_CFG_R1 )) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1)) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) ? LAK_CHILD_FAIL : LAK_PARENT_FAIL); | |||
2539 | } | |||
2540 | ||||
2541 | switch (result) { | |||
2542 | case STF_OK: | |||
2543 | { | |||
2544 | /* advance the state */ | |||
2545 | const struct state_v1_microcode *smc = md->smc; | |||
2546 | ||||
2547 | dbg("doing_xauth:%s, t_xauth_client_done:%s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } | |||
2548 | bool_str(st->st_oakley.doing_xauth),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } } | |||
2549 | bool_str(st->hidden_variables.st_xauth_client_done)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("doing_xauth:%s, t_xauth_client_done:%s", bool_str (st->st_oakley.doing_xauth), bool_str(st->hidden_variables .st_xauth_client_done)); } }; | |||
2550 | ||||
2551 | /* accept info from VID because we accept this message */ | |||
2552 | ||||
2553 | /* | |||
2554 | * Most of below VIDs only appear Main/Aggr mode, not Quick mode, | |||
2555 | * so why are we checking them for each state transition? | |||
2556 | */ | |||
2557 | ||||
2558 | if (md->fragvid) { | |||
2559 | dbg("peer supports fragmentation"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports fragmentation"); } }; | |||
2560 | st->st_seen_fragmentation_supported = true1; | |||
2561 | } | |||
2562 | ||||
2563 | if (md->dpd) { | |||
2564 | dbg("peer supports DPD"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer supports DPD"); } }; | |||
2565 | st->hidden_variables.st_peer_supports_dpd = true1; | |||
2566 | if (dpd_active_locally(st)) { | |||
2567 | dbg("DPD is configured locally"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("DPD is configured locally"); } }; | |||
2568 | } | |||
2569 | } | |||
2570 | ||||
2571 | /* If state has VID_NORTEL, import it to activate workaround */ | |||
2572 | if (md->nortel) { | |||
2573 | dbg("peer requires Nortel Contivity workaround"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("peer requires Nortel Contivity workaround"); } }; | |||
2574 | st->st_seen_nortel_vid = true1; | |||
2575 | } | |||
2576 | ||||
2577 | if (!st->st_v1_msgid.reserved && | |||
2578 | IS_CHILD_SA(st)((st)->st_clonedfrom != 0) && | |||
2579 | st->st_v1_msgid.id != v1_MAINMODE_MSGID((msgid_t) 0)) { | |||
2580 | struct state *p1st = state_with_serialno( | |||
2581 | st->st_clonedfrom); | |||
2582 | ||||
2583 | if (p1st != NULL((void*)0)) { | |||
2584 | /* do message ID reservation */ | |||
2585 | reserve_msgid(p1st, st->st_v1_msgid.id); | |||
2586 | } | |||
2587 | ||||
2588 | st->st_v1_msgid.reserved = true1; | |||
2589 | } | |||
2590 | ||||
2591 | dbg("IKEv1: transition from state %s to state %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } | |||
2592 | finite_states[from_state]->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } } | |||
2593 | finite_states[smc->next_state]->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("IKEv1: transition from state %s to state %s", finite_states[from_state]->name, finite_states[smc->next_state ]->name); } }; | |||
2594 | ||||
2595 | change_state(st, smc->next_state); | |||
2596 | ||||
2597 | /* | |||
2598 | * XAUTH negotiation without ModeCFG cannot follow the regular | |||
2599 | * state machine change as it cannot be determined if the CFG | |||
2600 | * payload is "XAUTH OK, no ModeCFG" or "XAUTH OK, expect | |||
2601 | * ModeCFG". To the smc, these two cases look identical. So we | |||
2602 | * have an ad hoc state change here for the case where | |||
2603 | * we have XAUTH but not ModeCFG. We move it to the established | |||
2604 | * state, so the regular state machine picks up the Quick Mode. | |||
2605 | */ | |||
2606 | if (st->st_connection->spd.this.xauth_client && | |||
2607 | st->hidden_variables.st_xauth_client_done && | |||
2608 | !st->st_connection->spd.this.modecfg_client && | |||
2609 | st->st_state->kind == STATE_XAUTH_I1) | |||
2610 | { | |||
2611 | bool_Bool aggrmode = LHAS(st->st_connection->policy, POLICY_AGGRESSIVE_IX)(((st->st_connection->policy) & ((lset_t)1 << (POLICY_AGGRESSIVE_IX))) != ((lset_t)0)); | |||
2612 | ||||
2613 | log_state(RC_LOG, st, "XAUTH completed; ModeCFG skipped as per configuration"); | |||
2614 | change_state(st, aggrmode ? STATE_AGGR_I2 : STATE_MAIN_I4); | |||
2615 | st->st_v1_msgid.phase15 = v1_MAINMODE_MSGID((msgid_t) 0); | |||
2616 | } | |||
2617 | ||||
2618 | /* Schedule for whatever timeout is specified */ | |||
2619 | if (!md->event_already_set) { | |||
2620 | /* | |||
2621 | * This md variable is hardly ever set. | |||
2622 | * Only deals with v1 <-> v2 switching | |||
2623 | * which will be removed in the near future anyway | |||
2624 | * (PW 2017 Oct 8) | |||
2625 | */ | |||
2626 | dbg("event_already_set, deleting event"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("event_already_set, deleting event"); } }; | |||
2627 | /* | |||
2628 | * Delete previous retransmission event. | |||
2629 | * New event will be scheduled below. | |||
2630 | */ | |||
2631 | delete_event(st); | |||
2632 | clear_retransmits(st); | |||
2633 | } | |||
2634 | ||||
2635 | /* Delete IKE fragments */ | |||
2636 | free_v1_message_queues(st); | |||
2637 | ||||
2638 | /* scrub the previous packet exchange */ | |||
2639 | free_chunk_content(&st->st_v1_rpacket); | |||
2640 | free_chunk_content(&st->st_v1_tpacket); | |||
2641 | ||||
2642 | /* in aggressive mode, there will be no reply packet in transition | |||
2643 | * from STATE_AGGR_R1 to STATE_AGGR_R2 | |||
2644 | */ | |||
2645 | if (nat_traversal_enabled && st->st_connection->ikev1_natt != NATT_NONE) { | |||
2646 | /* adjust our destination port if necessary */ | |||
2647 | nat_traversal_change_port_lookup(md, st); | |||
2648 | v1_maybe_natify_initiator_endpoints(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2648, }; &here; })); | |||
2649 | } | |||
2650 | ||||
2651 | /* | |||
2652 | * Save both the received packet, and this | |||
2653 | * state-transition. | |||
2654 | * | |||
2655 | * Only when the (last) state transition was a "reply" | |||
2656 | * should a duplicate packet trigger a retransmit | |||
2657 | * (else they get discarded). | |||
2658 | * | |||
2659 | * XXX: .st_state .fs_flags & SMF_REPLY can't | |||
2660 | * be used because it contains flags for the new state | |||
2661 | * not the old-to-new state transition. | |||
2662 | */ | |||
2663 | remember_received_packet(st, md); | |||
2664 | st->st_v1_last_transition = md->smc; | |||
2665 | ||||
2666 | /* if requested, send the new reply packet */ | |||
2667 | if (smc->flags & SMF_REPLY((lset_t)1 << (OAKLEY_AUTH_ROOF + 5))) { | |||
2668 | endpoint_buf b; | |||
2669 | endpoint_buf b2; | |||
2670 | pexpect_st_local_endpoint(st); | |||
2671 | dbg("sending reply packet to %s (from %s)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } | |||
2672 | str_endpoint(&st->st_remote_endpoint, &b),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } } | |||
2673 | str_endpoint(&st->st_interface->local_endpoint, &b2)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending reply packet to %s (from %s)", str_endpoint (&st->st_remote_endpoint, &b), str_endpoint(&st ->st_interface->local_endpoint, &b2)); } }; | |||
2674 | ||||
2675 | close_output_pbs(&reply_stream); /* good form, but actually a no-op */ | |||
2676 | ||||
2677 | if (st->st_state->kind == STATE_MAIN_R2 && | |||
2678 | impair.send_no_main_r2) { | |||
2679 | /* record-only so we properly emulate packet drop */ | |||
2680 | record_outbound_v1_ike_msg(st, &reply_stream, | |||
2681 | finite_states[from_state]->name); | |||
2682 | log_state(RC_LOG, st, "IMPAIR: Skipped sending STATE_MAIN_R2 response packet"); | |||
2683 | } else { | |||
2684 | record_and_send_v1_ike_msg(st, &reply_stream, | |||
2685 | finite_states[from_state]->name); | |||
2686 | } | |||
2687 | } | |||
2688 | ||||
2689 | /* Schedule for whatever timeout is specified */ | |||
2690 | if (!md->event_already_set) { | |||
2691 | dbg("!event_already_set at reschedule"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("!event_already_set at reschedule"); } }; | |||
2692 | intmax_t delay_ms; /* delay is in milliseconds here */ | |||
2693 | enum event_type kind = smc->timeout_event; | |||
2694 | bool_Bool agreed_time = false0; | |||
2695 | struct connection *c = st->st_connection; | |||
2696 | ||||
2697 | /* fixup in case of state machine jump for xauth without modecfg */ | |||
2698 | if (c->spd.this.xauth_client && | |||
2699 | st->hidden_variables.st_xauth_client_done && | |||
2700 | !c->spd.this.modecfg_client && | |||
2701 | (st->st_state->kind == STATE_MAIN_I4 || st->st_state->kind == STATE_AGGR_I2)) | |||
2702 | { | |||
2703 | dbg("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("fixup XAUTH without ModeCFG event from EVENT_RETRANSMIT to EVENT_SA_REPLACE" ); } }; | |||
2704 | kind = EVENT_SA_REPLACE; | |||
2705 | } | |||
2706 | ||||
2707 | switch (kind) { | |||
2708 | case EVENT_RETRANSMIT: /* Retransmit packet */ | |||
2709 | start_retransmits(st); | |||
2710 | break; | |||
2711 | ||||
2712 | case EVENT_SA_REPLACE: /* SA replacement event */ | |||
2713 | if (IS_V1_PHASE1(st->st_state->kind)(STATE_MAIN_R0 <= (st->st_state->kind) && (st ->st_state->kind) <= STATE_AGGR_R2) || | |||
2714 | IS_V1_PHASE15(st->st_state->kind)(STATE_XAUTH_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_XAUTH_I1)) { | |||
2715 | /* Note: we will defer to the "negotiated" (dictated) | |||
2716 | * lifetime if we are POLICY_DONT_REKEY. | |||
2717 | * This allows the other side to dictate | |||
2718 | * a time we would not otherwise accept | |||
2719 | * but it prevents us from having to initiate | |||
2720 | * rekeying. The negative consequences seem | |||
2721 | * minor. | |||
2722 | */ | |||
2723 | delay_ms = deltamillisecs(c->sa_ike_life_seconds); | |||
2724 | if ((c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX))) || | |||
2725 | delay_ms >= deltamillisecs(st->st_oakley.life_seconds)) | |||
2726 | { | |||
2727 | agreed_time = true1; | |||
2728 | delay_ms = deltamillisecs(st->st_oakley.life_seconds); | |||
2729 | } | |||
2730 | } else { | |||
2731 | /* Delay is min of up to four things: | |||
2732 | * each can limit the lifetime. | |||
2733 | */ | |||
2734 | time_t delay = deltasecs(c->sa_ipsec_life_seconds); | |||
2735 | ||||
2736 | #define clamp_delay(trans) { \ | |||
2737 | if (st->trans.present && \ | |||
2738 | delay >= deltasecs(st->trans.attrs.life_seconds)) { \ | |||
2739 | agreed_time = true1; \ | |||
2740 | delay = deltasecs(st->trans.attrs.life_seconds); \ | |||
2741 | } \ | |||
2742 | } | |||
2743 | clamp_delay(st_ah); | |||
2744 | clamp_delay(st_esp); | |||
2745 | clamp_delay(st_ipcomp); | |||
2746 | delay_ms = delay * 1000; | |||
2747 | #undef clamp_delay | |||
2748 | } | |||
2749 | ||||
2750 | /* By default, we plan to rekey. | |||
2751 | * | |||
2752 | * If there isn't enough time to rekey, plan to | |||
2753 | * expire. | |||
2754 | * | |||
2755 | * If we are --dontrekey, a lot more rules apply. | |||
2756 | * If we are the Initiator, use REPLACE_IF_USED. | |||
2757 | * If we are the Responder, and the dictated time | |||
2758 | * was unacceptable (too large), plan to REPLACE | |||
2759 | * (the only way to ratchet down the time). | |||
2760 | * If we are the Responder, and the dictated time | |||
2761 | * is acceptable, plan to EXPIRE. | |||
2762 | * | |||
2763 | * Important policy lies buried here. | |||
2764 | * For example, we favour the initiator over the | |||
2765 | * responder by making the initiator start rekeying | |||
2766 | * sooner. Also, fuzz is only added to the | |||
2767 | * initiator's margin. | |||
2768 | * | |||
2769 | * Note: for ISAKMP SA, we let the negotiated | |||
2770 | * time stand (implemented by earlier logic). | |||
2771 | */ | |||
2772 | if (agreed_time && | |||
2773 | (c->policy & POLICY_DONT_REKEY((lset_t)1 << (POLICY_DONT_REKEY_IX)))) { | |||
2774 | kind = (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) ? | |||
2775 | EVENT_v1_REPLACE_IF_USED : | |||
2776 | EVENT_SA_EXPIRE; | |||
2777 | } | |||
2778 | if (kind != EVENT_SA_EXPIRE) { | |||
2779 | time_t marg = | |||
2780 | deltasecs(c->sa_rekey_margin); | |||
2781 | ||||
2782 | if (smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) { | |||
2783 | marg += marg * | |||
2784 | c->sa_rekey_fuzz / | |||
2785 | 100.E0 * | |||
2786 | (rand() / | |||
2787 | (RAND_MAX2147483647 + 1.E0)); | |||
2788 | } else { | |||
2789 | marg /= 2; | |||
2790 | } | |||
2791 | ||||
2792 | if (delay_ms > marg * 1000) { | |||
2793 | delay_ms -= marg * 1000; | |||
2794 | st->st_replace_margin = deltatime(marg); | |||
2795 | } else { | |||
2796 | kind = EVENT_SA_EXPIRE; | |||
2797 | } | |||
2798 | } | |||
2799 | /* XXX: DELAY_MS should be a deltatime_t */ | |||
2800 | event_schedule(kind, deltatime_ms(delay_ms), st); | |||
2801 | break; | |||
2802 | ||||
2803 | case EVENT_SA_DISCARD: | |||
2804 | event_schedule(EVENT_SA_DISCARD, c->config->retransmit_timeout, st); | |||
2805 | break; | |||
2806 | ||||
2807 | default: | |||
2808 | bad_case(kind)libreswan_bad_case("kind", (kind), ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2808, }; &here; })); | |||
2809 | } | |||
2810 | } | |||
2811 | ||||
2812 | /* tell whack and log of progress */ | |||
2813 | { | |||
2814 | enum rc_type w; | |||
2815 | void (*jam_details)(struct jambuf *buf, struct state *st); | |||
2816 | ||||
2817 | if (IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) { | |||
2818 | pstat_sa_established(st); | |||
2819 | jam_details = jam_v1_ipsec_details; | |||
2820 | w = RC_SUCCESS; /* log our success */ | |||
2821 | } else if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
2822 | pstat_sa_established(st); | |||
2823 | jam_details = jam_v1_isakmp_details; | |||
2824 | w = RC_SUCCESS; /* log our success */ | |||
2825 | } else { | |||
2826 | jam_details = NULL((void*)0); | |||
2827 | w = RC_NEW_V1_STATE + st->st_state->kind; | |||
2828 | } | |||
2829 | ||||
2830 | passert(st->st_state->kind < STATE_IKEv1_ROOF)({ _Bool assertion__ = st->st_state->kind < STATE_IKEv1_ROOF ; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2830, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "st->st_state->kind < STATE_IKEv1_ROOF" ); } (void) 1; }); | |||
2831 | ||||
2832 | /* tell whack and logs our progress */ | |||
2833 | LLOG_JAMBUF(w, st->st_logger, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((w) & NO_PREFIX) == ((lset_t)0) && (((w) & STREAM_MASK ) != DEBUG_STREAM || (cur_debugging & (((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { (st->st_logger)->object_vec ->jam_object_prefix(buf, (st->st_logger)->object); } }); buf != ((void*)0); jambuf_to_logger(buf, (st->st_logger ), w), buf = ((void*)0)) { | |||
2834 | jam(buf, "%s", st->st_state->story); | |||
2835 | /* document SA details for admin's pleasure */ | |||
2836 | if (jam_details != NULL((void*)0)) { | |||
2837 | jam(buf, " "); | |||
2838 | jam_details(buf, st); | |||
2839 | } | |||
2840 | } | |||
2841 | } | |||
2842 | ||||
2843 | /* | |||
2844 | * make sure that a DPD event gets created for a new phase 1 | |||
2845 | * SA. | |||
2846 | * Why do we need a DPD event on an IKE SA??? | |||
2847 | */ | |||
2848 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
2849 | if (dpd_init(st) != STF_OK) { | |||
2850 | log_state(RC_LOG_SERIOUS, st, | |||
2851 | "DPD initialization failed - continuing without DPD"); | |||
2852 | } | |||
2853 | } | |||
2854 | ||||
2855 | /* Special case for XAUTH server */ | |||
2856 | if (st->st_connection->spd.this.xauth_server) { | |||
2857 | if (st->st_oakley.doing_xauth && | |||
2858 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0))) { | |||
2859 | dbg("XAUTH: Sending XAUTH Login/Password Request"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH: Sending XAUTH Login/Password Request") ; } }; | |||
2860 | event_schedule(EVENT_v1_SEND_XAUTH, | |||
2861 | deltatime_ms(EVENT_v1_SEND_XAUTH_DELAY_MS80), | |||
2862 | st); | |||
2863 | break; | |||
2864 | } | |||
2865 | } | |||
2866 | ||||
2867 | /* | |||
2868 | * for XAUTH client, we are also done, because we need to | |||
2869 | * stay in this state, and let the server query us | |||
2870 | */ | |||
2871 | if (!IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2) && | |||
2872 | st->st_connection->spd.this.xauth_client && | |||
2873 | !st->hidden_variables.st_xauth_client_done) { | |||
2874 | dbg("XAUTH client is not yet authenticated"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("XAUTH client is not yet authenticated"); } }; | |||
2875 | break; | |||
2876 | } | |||
2877 | ||||
2878 | /* | |||
2879 | * when talking to some vendors, we need to initiate a mode | |||
2880 | * cfg request to get challenged, but there is also an | |||
2881 | * override in the form of a policy bit. | |||
2882 | */ | |||
2883 | dbg("modecfg pull: %s policy:%s %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2884 | (st->quirks.modecfg_pull_mode ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2885 | "quirk-poll" : "noquirk"),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2886 | (st->st_connection->policy & POLICY_MODECFG_PULL) ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2887 | "pull" : "push",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2888 | (st->st_connection->spd.this.modecfg_client ?{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } } | |||
2889 | "modecfg-client" : "not-client")){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg pull: %s policy:%s %s", (st->quirks .modecfg_pull_mode ? "quirk-poll" : "noquirk"), (st->st_connection ->policy & ((lset_t)1 << (POLICY_MODECFG_PULL_IX ))) ? "pull" : "push", (st->st_connection->spd.this.modecfg_client ? "modecfg-client" : "not-client")); } }; | |||
2890 | ||||
2891 | if (st->st_connection->spd.this.modecfg_client && | |||
2892 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
2893 | (st->quirks.modecfg_pull_mode || | |||
2894 | st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX))) && | |||
2895 | !st->hidden_variables.st_modecfg_started) { | |||
2896 | dbg("modecfg client is starting due to %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } | |||
2897 | st->quirks.modecfg_pull_mode ? "quirk" :{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } } | |||
2898 | "policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("modecfg client is starting due to %s", st-> quirks.modecfg_pull_mode ? "quirk" : "policy"); } }; | |||
2899 | modecfg_send_request(st); | |||
2900 | break; | |||
2901 | } | |||
2902 | ||||
2903 | /* Should we set the peer's IP address regardless? */ | |||
2904 | if (st->st_connection->spd.this.modecfg_server && | |||
2905 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
2906 | !st->hidden_variables.st_modecfg_vars_set && | |||
2907 | !(st->st_connection->policy & POLICY_MODECFG_PULL((lset_t)1 << (POLICY_MODECFG_PULL_IX)))) { | |||
2908 | change_state(st, STATE_MODE_CFG_R1); | |||
2909 | log_state(RC_LOG, st, "Sending MODE CONFIG set"); | |||
2910 | /* | |||
2911 | * ??? we ignore the result of modecfg. | |||
2912 | * But surely, if it fails, we ought to terminate this exchange. | |||
2913 | * What do the RFCs say? | |||
2914 | */ | |||
2915 | modecfg_start_set(st); | |||
2916 | break; | |||
2917 | } | |||
2918 | ||||
2919 | /* | |||
2920 | * If we are the responder and the client is in "Contivity mode", | |||
2921 | * we need to initiate Quick mode | |||
2922 | */ | |||
2923 | if (!(smc->flags & SMF_INITIATOR((lset_t)1 << (OAKLEY_AUTH_ROOF + 0))) && | |||
2924 | IS_V1_MODE_CFG_ESTABLISHED(st->st_state)(((st->st_state)->kind) == STATE_MODE_CFG_R2) && | |||
2925 | (st->st_seen_nortel_vid)) { | |||
2926 | log_state(RC_LOG, st, "Nortel 'Contivity Mode' detected, starting Quick Mode"); | |||
2927 | change_state(st, STATE_MAIN_R3); /* ISAKMP is up... */ | |||
2928 | quick_outI1(st->st_logger->object_whackfd, st, st->st_connection, | |||
2929 | st->st_connection->policy, 1, SOS_NOBODY0, null_shunk); | |||
2930 | break; | |||
2931 | } | |||
2932 | ||||
2933 | /* wait for modecfg_set */ | |||
2934 | if (st->st_connection->spd.this.modecfg_client && | |||
2935 | IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) && | |||
2936 | !st->hidden_variables.st_modecfg_vars_set) { | |||
2937 | dbg("waiting for modecfg set from server"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("waiting for modecfg set from server"); } }; | |||
2938 | break; | |||
2939 | } | |||
2940 | ||||
2941 | dbg("phase 1 is done, looking for phase 2 to unpend"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("phase 1 is done, looking for phase 2 to unpend" ); } }; | |||
2942 | ||||
2943 | if (smc->flags & SMF_RELEASE_PENDING_P2((lset_t)1 << (OAKLEY_AUTH_ROOF + 6))) { | |||
2944 | /* Initiate any Quick Mode negotiations that | |||
2945 | * were waiting to piggyback on this Keying Channel. | |||
2946 | * | |||
2947 | * ??? there is a potential race condition | |||
2948 | * if we are the responder: the initial Phase 2 | |||
2949 | * message might outrun the final Phase 1 message. | |||
2950 | * | |||
2951 | * so, instead of actually sending the traffic now, | |||
2952 | * we schedule an event to do so. | |||
2953 | * | |||
2954 | * but, in fact, quick_mode will enqueue a cryptographic operation | |||
2955 | * anyway, which will get done "later" anyway, so maybe it is just fine | |||
2956 | * as it is. | |||
2957 | * | |||
2958 | */ | |||
2959 | unpend(pexpect_ike_sa(st), NULL((void*)0)); | |||
2960 | } | |||
2961 | ||||
2962 | if (IS_V1_ISAKMP_SA_ESTABLISHED(st)((((lset_t)1 << ((st)->st_state->kind)) & ((( lset_t)1 << (STATE_MAIN_R3)) | ((lset_t)1 << (STATE_MAIN_I4 )) | ((lset_t)1 << (STATE_AGGR_I2)) | ((lset_t)1 << (STATE_AGGR_R2)) | ((lset_t)1 << (STATE_XAUTH_R0)) | ( (lset_t)1 << (STATE_XAUTH_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R0 )) | ((lset_t)1 << (STATE_MODE_CFG_R1)) | ((lset_t)1 << (STATE_MODE_CFG_R2)) | ((lset_t)1 << (STATE_MODE_CFG_I1 )) | ((lset_t)1 << (STATE_XAUTH_I0)) | ((lset_t)1 << (STATE_XAUTH_I1)))) != ((lset_t)0)) || | |||
2963 | IS_IPSEC_SA_ESTABLISHED(st)(((st)->st_clonedfrom != 0) && (((st)->st_state ->kind) == STATE_QUICK_I2 || ((st)->st_state->kind) == STATE_QUICK_R1 || ((st)->st_state->kind) == STATE_QUICK_R2 || ((st)->st_state->kind) == STATE_V2_ESTABLISHED_CHILD_SA ))) | |||
2964 | release_any_whack(st, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 2964, }; &here; }), "IKEv1 transitions finished"); | |||
2965 | ||||
2966 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) | |||
2967 | break; | |||
2968 | ||||
2969 | break; | |||
2970 | } | |||
2971 | ||||
2972 | case STF_INTERNAL_ERROR: | |||
2973 | /* update the previous packet history */ | |||
2974 | remember_received_packet(st, md); | |||
2975 | log_state(RC_INTERNALERR + md->v1_note, st, | |||
2976 | "state transition function for %s had internal error", | |||
2977 | st->st_state->name); | |||
2978 | release_pending_whacks(st, "internal error"); | |||
2979 | break; | |||
2980 | ||||
2981 | case STF_FATAL: | |||
2982 | passert(st != NULL)({ _Bool assertion__ = st != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/ikev1.c", .line = 2982, }; &here ; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "st != ((void*)0)"); } (void) 1; }); | |||
2983 | /* update the previous packet history */ | |||
2984 | remember_received_packet(st, md); | |||
2985 | log_state(RC_FATAL, st, "encountered fatal error in state %s", | |||
2986 | st->st_state->name); | |||
2987 | #ifdef HAVE_NM1 | |||
2988 | if (st->st_connection->remotepeertype == CISCO && | |||
2989 | st->st_connection->nmconfigured) { | |||
2990 | if (!do_command(st->st_connection, | |||
2991 | &st->st_connection->spd, | |||
2992 | "disconnectNM", | |||
2993 | st, st->st_logger)) | |||
2994 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; | |||
2995 | } | |||
2996 | #endif | |||
2997 | release_pending_whacks(st, "fatal error"); | |||
2998 | delete_state(st); | |||
2999 | md->v1_st = st = NULL((void*)0); | |||
3000 | break; | |||
3001 | ||||
3002 | default: /* a shortcut to STF_FAIL, setting md->note */ | |||
3003 | passert(result > STF_FAIL)({ _Bool assertion__ = result > STF_FAIL; if (!assertion__ ) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3003, } ; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "result > STF_FAIL"); } (void) 1; }); | |||
3004 | md->v1_note = result - STF_FAIL; | |||
3005 | /* FALL THROUGH */ | |||
3006 | case STF_FAIL: | |||
3007 | { | |||
3008 | /* As it is, we act as if this message never happened: | |||
3009 | * whatever retrying was in place, remains in place. | |||
3010 | */ | |||
3011 | /* | |||
3012 | * Try to convert the notification into a non-NULL | |||
3013 | * string. For NOTHING_WRONG, be vague (at the time | |||
3014 | * of writing the enum_names didn't contain | |||
3015 | * NOTHING_WRONG, and even if it did "nothing wrong" | |||
3016 | * wouldn't exactly help here :-). | |||
3017 | */ | |||
3018 | const char *notify_name = (md->v1_note == NOTHING_WRONG ? "failed" : | |||
3019 | enum_name(&ikev1_notify_names, md->v1_note)); | |||
3020 | if (notify_name == NULL((void*)0)) { | |||
3021 | notify_name = "internal error"; | |||
3022 | } | |||
3023 | /* | |||
3024 | * ??? why no call of remember_received_packet? | |||
3025 | * Perhaps because the message hasn't been authenticated? | |||
3026 | * But then then any duplicate would lose too, I would think. | |||
3027 | */ | |||
3028 | ||||
3029 | if (md->v1_note != NOTHING_WRONG) { | |||
3030 | /* this will log */ | |||
3031 | SEND_NOTIFICATION(md->v1_note){ { const unsigned __pstat = (md->v1_note); if (__pstat < (sizeof(pstats_ikev1_sent_notifies_e) / sizeof(*(pstats_ikev1_sent_notifies_e )))) { pstats_ikev1_sent_notifies_e[__pstat]++; } else if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { DBG_log("pstats %s %d" , "ikev1_sent_notifies_e", __pstat); } }; if (st != ((void*)0 )) send_notification_from_state(st, from_state, md->v1_note ); else send_notification_from_md(md, md->v1_note); }; | |||
3032 | } else { | |||
3033 | /* XXX: why whack only? */ | |||
3034 | log_state(WHACK_STREAM | (RC_NOTIFICATION + md->v1_note), st, | |||
3035 | "state transition failed: %s", notify_name); | |||
3036 | } | |||
3037 | ||||
3038 | dbg("state transition function for %s failed: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } } | |||
3039 | st->st_state->name, notify_name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("state transition function for %s failed: %s", st->st_state->name, notify_name); } }; | |||
3040 | ||||
3041 | #ifdef HAVE_NM1 | |||
3042 | if (st->st_connection->remotepeertype == CISCO && | |||
3043 | st->st_connection->nmconfigured) { | |||
3044 | if (!do_command(st->st_connection, | |||
3045 | &st->st_connection->spd, | |||
3046 | "disconnectNM", | |||
3047 | st, st->st_logger)) | |||
3048 | dbg("sending disconnect to NM failed, you may need to do it manually"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("sending disconnect to NM failed, you may need to do it manually" ); } }; | |||
3049 | } | |||
3050 | #endif | |||
3051 | if (IS_V1_QUICK(st->st_state->kind)(STATE_QUICK_R0 <= (st->st_state->kind) && ( st->st_state->kind) <= STATE_QUICK_R2)) { | |||
3052 | delete_state(st); | |||
3053 | /* wipe out dangling pointer to st */ | |||
3054 | md->v1_st = NULL((void*)0); | |||
3055 | } | |||
3056 | break; | |||
3057 | } | |||
3058 | } | |||
3059 | } | |||
3060 | ||||
3061 | /* | |||
3062 | * note: may change which connection is referenced by md->v1_st->st_connection. | |||
3063 | * But only if we are a Main Mode Responder. | |||
3064 | */ | |||
3065 | bool_Bool ikev1_decode_peer_id(struct msg_digest *md, bool_Bool initiator, bool_Bool aggrmode) | |||
3066 | { | |||
3067 | struct state *const st = md->v1_st; | |||
3068 | struct connection *c = st->st_connection; | |||
3069 | const struct payload_digest *const id_pld = md->chain[ISAKMP_NEXT_ID]; | |||
3070 | const struct isakmp_id *const id = &id_pld->payload.id; | |||
3071 | ||||
3072 | /* | |||
3073 | * I think that RFC2407 (IPSEC DOI) 4.6.2 is confused. | |||
3074 | * It talks about the protocol ID and Port fields of the ID | |||
3075 | * Payload, but they don't exist as such in Phase 1. | |||
3076 | * We use more appropriate names. | |||
3077 | * isaid_doi_specific_a is in place of Protocol ID. | |||
3078 | * isaid_doi_specific_b is in place of Port. | |||
3079 | * Besides, there is no good reason for allowing these to be | |||
3080 | * other than 0 in Phase 1. | |||
3081 | */ | |||
3082 | if (st->hidden_variables.st_nat_traversal != LEMPTY((lset_t)0) && | |||
3083 | id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && | |||
3084 | (id->isaid_doi_specific_b == 0 || | |||
3085 | id->isaid_doi_specific_b == NAT_IKE_UDP_PORT4500)) { | |||
3086 | dbg("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } } | |||
3087 | id->isaid_doi_specific_a, id->isaid_doi_specific_b){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("protocol/port in Phase 1 ID Payload is %d/%d. accepted with port_floating NAT-T" , id->isaid_doi_specific_a, id->isaid_doi_specific_b); } }; | |||
3088 | } else if (!(id->isaid_doi_specific_a == 0 && | |||
3089 | id->isaid_doi_specific_b == 0) && | |||
3090 | !(id->isaid_doi_specific_a == IPPROTO_UDPIPPROTO_UDP && | |||
3091 | id->isaid_doi_specific_b == IKE_UDP_PORT500)) | |||
3092 | { | |||
3093 | log_state(RC_LOG_SERIOUS, st, | |||
3094 | "protocol/port in Phase 1 ID Payload MUST be 0/0 or %d/%d but are %d/%d (attempting to continue)", | |||
3095 | IPPROTO_UDPIPPROTO_UDP, IKE_UDP_PORT500, | |||
3096 | id->isaid_doi_specific_a, | |||
3097 | id->isaid_doi_specific_b); | |||
3098 | /* | |||
3099 | * We have turned this into a warning because of bugs in other | |||
3100 | * vendors' products. Specifically CISCO VPN3000. | |||
3101 | */ | |||
3102 | /* return false; */ | |||
3103 | } | |||
3104 | ||||
3105 | struct id peer; | |||
3106 | ||||
3107 | diag_t d = unpack_peer_id(id->isaid_idtype, &peer, &id_pld->pbs); | |||
3108 | if (d != NULL((void*)0)) { | |||
3109 | llog_diag(RC_LOG, st->st_logger, &d, "%s", ""); | |||
3110 | return false0; | |||
3111 | } | |||
3112 | ||||
3113 | if (c->spd.that.id.kind == ID_FROMCERT) { | |||
3114 | /* breaks API, connection modified by %fromcert */ | |||
3115 | duplicate_id(&c->spd.that.id, &peer); | |||
3116 | } | |||
3117 | ||||
3118 | /* | |||
3119 | * For interop with SoftRemote/aggressive mode we need to remember some | |||
3120 | * things for checking the hash | |||
3121 | */ | |||
3122 | st->st_peeridentity_protocol = id->isaid_doi_specific_a; | |||
3123 | st->st_peeridentity_port = ntohs(id->isaid_doi_specific_b); | |||
3124 | ||||
3125 | { | |||
3126 | id_buf buf; | |||
3127 | esb_buf b; | |||
3128 | log_state(RC_LOG, st, "Peer ID is %s: '%s'", | |||
3129 | enum_show(&ike_id_type_names, id->isaid_idtype, &b), | |||
3130 | str_id(&peer, &buf)str_id_bytes(&peer, jam_raw_bytes, &buf)); | |||
3131 | } | |||
3132 | ||||
3133 | /* check for certificates */ | |||
3134 | if (!v1_verify_certs(md)) { | |||
3135 | log_state(RC_LOG, st, "X509: CERT payload does not match connection ID"); | |||
3136 | if (initiator || aggrmode) { | |||
3137 | /* cannot switch connection so fail */ | |||
3138 | return false0; | |||
3139 | } | |||
3140 | } | |||
3141 | ||||
3142 | /* check for certificate requests */ | |||
3143 | ikev1_decode_cr(md, st->st_logger); | |||
3144 | ||||
3145 | /* | |||
3146 | * Now that we've decoded the ID payload, let's see if we | |||
3147 | * need to switch connections. | |||
3148 | * Aggressive mode cannot switch connections. | |||
3149 | * We must not switch horses if we initiated: | |||
3150 | * - if the initiation was explicit, we'd be ignoring user's intent | |||
3151 | * - if opportunistic, we'll lose our HOLD info | |||
3152 | */ | |||
3153 | ||||
3154 | if (initiator) { | |||
3155 | if (!st->st_v1_peer_alt_id && | |||
3156 | !same_id(&c->spd.that.id, &peer) && | |||
3157 | c->spd.that.id.kind != ID_FROMCERT) { | |||
3158 | id_buf expect; | |||
3159 | id_buf found; | |||
3160 | ||||
3161 | log_state(RC_LOG_SERIOUS, st, | |||
3162 | "we require IKEv1 peer to have ID '%s', but peer declares '%s'", | |||
3163 | str_id(&c->spd.that.id, &expect)str_id_bytes(&c->spd.that.id, jam_raw_bytes, &expect ), | |||
3164 | str_id(&peer, &found)str_id_bytes(&peer, jam_raw_bytes, &found)); | |||
3165 | return false0; | |||
3166 | } else if (c->spd.that.id.kind == ID_FROMCERT) { | |||
3167 | if (peer.kind != ID_DER_ASN1_DN) { | |||
3168 | log_state(RC_LOG_SERIOUS, st, | |||
3169 | "peer ID is not a certificate type"); | |||
3170 | return false0; | |||
3171 | } | |||
3172 | duplicate_id(&c->spd.that.id, &peer); | |||
3173 | } | |||
3174 | } else if (!aggrmode) { | |||
3175 | /* Main Mode Responder */ | |||
3176 | uint16_t auth = xauth_calcbaseauth(st->st_oakley.auth); | |||
3177 | lset_t auth_policy; | |||
3178 | ||||
3179 | switch (auth) { | |||
3180 | case OAKLEY_PRESHARED_KEY: | |||
3181 | auth_policy = POLICY_PSK((lset_t)1 << (POLICY_PSK_IX)); | |||
3182 | break; | |||
3183 | case OAKLEY_RSA_SIG: | |||
3184 | auth_policy = POLICY_RSASIG((lset_t)1 << (POLICY_RSASIG_IX)); | |||
3185 | break; | |||
3186 | /* Not implemented */ | |||
3187 | case OAKLEY_DSS_SIG: | |||
3188 | case OAKLEY_RSA_ENC: | |||
3189 | case OAKLEY_RSA_REVISED_MODE: | |||
3190 | case OAKLEY_ECDSA_P256: | |||
3191 | case OAKLEY_ECDSA_P384: | |||
3192 | case OAKLEY_ECDSA_P521: | |||
3193 | default: | |||
3194 | dbg("ikev1 ike_decode_peer_id bad_case due to not supported policy"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ikev1 ike_decode_peer_id bad_case due to not supported policy" ); } }; | |||
3195 | return false0; | |||
3196 | } | |||
3197 | ||||
3198 | bool_Bool fromcert; | |||
3199 | struct connection *r = | |||
3200 | refine_host_connection_on_responder(st, &peer, | |||
3201 | NULL((void*)0), /* IKEv1 does not support 'you Tarzan, me Jane' */ | |||
3202 | auth_policy, | |||
3203 | AUTHBY_UNSET, /* ikev2 only */ | |||
3204 | &fromcert); | |||
3205 | ||||
3206 | if (r == NULL((void*)0)) { | |||
3207 | id_buf buf; | |||
3208 | dbg("no more suitable connection for peer '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } } | |||
3209 | str_id(&peer, &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no more suitable connection for peer '%s'", str_id_bytes (&peer, jam_raw_bytes, &buf)); } }; | |||
3210 | /* can we continue with what we had? */ | |||
3211 | if (!md->v1_st->st_v1_peer_alt_id && | |||
3212 | !same_id(&c->spd.that.id, &peer) && | |||
3213 | c->spd.that.id.kind != ID_FROMCERT) { | |||
3214 | log_state(RC_LOG, md->v1_st, "Peer mismatch on first found connection and no better connection found"); | |||
3215 | return false0; | |||
3216 | } else { | |||
3217 | dbg("Peer ID matches and no better connection found - continuing with existing connection"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Peer ID matches and no better connection found - continuing with existing connection" ); } }; | |||
3218 | r = c; | |||
3219 | } | |||
3220 | } | |||
3221 | ||||
3222 | dn_buf buf; | |||
3223 | dbg("offered CA: '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } } | |||
3224 | str_dn_or_null(r->spd.this.ca, "%none", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("offered CA: '%s'", str_dn_or_null(r->spd.this .ca, "%none", &buf)); } }; | |||
3225 | ||||
3226 | if (r != c) { | |||
3227 | /* | |||
3228 | * We are changing st->st_connection! | |||
3229 | * Our caller might be surprised! | |||
3230 | */ | |||
3231 | connection_buf b1, b2; | |||
3232 | ||||
3233 | /* apparently, r is an improvement on c -- replace */ | |||
3234 | log_state(RC_LOG, st, "switched from "PRI_CONNECTION"\"%s\"%s"" to "PRI_CONNECTION"\"%s\"%s""", | |||
3235 | pri_connection(c, &b1)(c)->name, str_connection_instance(c, &b1), pri_connection(r, &b2)(r)->name, str_connection_instance(r, &b2)); | |||
3236 | ||||
3237 | if (r->kind == CK_TEMPLATE || r->kind == CK_GROUP) { | |||
3238 | /* instantiate it, filling in peer's ID */ | |||
3239 | r = rw_instantiate(r, &c->spd.that.host_addr, | |||
3240 | NULL((void*)0), | |||
3241 | &peer); | |||
3242 | } | |||
3243 | ||||
3244 | update_state_connection(st, r); | |||
3245 | c = r; /* c not subsequently used */ | |||
3246 | /* redo from scratch so we read and check CERT payload */ | |||
3247 | dbg("retrying ike_decode_peer_id() with new conn"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("retrying ike_decode_peer_id() with new conn") ; } }; | |||
3248 | passert(!initiator && !aggrmode)({ _Bool assertion__ = !initiator && !aggrmode; if (! assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3248, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "!initiator && !aggrmode" ); } (void) 1; }); | |||
3249 | return ikev1_decode_peer_id(md, false0, false0); | |||
3250 | } else if (c->spd.that.has_id_wildcards) { | |||
3251 | duplicate_id(&c->spd.that.id, &peer); | |||
3252 | c->spd.that.has_id_wildcards = false0; | |||
3253 | } else if (fromcert) { | |||
3254 | dbg("copying ID for fromcert"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("copying ID for fromcert"); } }; | |||
3255 | duplicate_id(&c->spd.that.id, &peer); | |||
3256 | } | |||
3257 | } | |||
3258 | ||||
3259 | return true1; | |||
3260 | } | |||
3261 | ||||
3262 | bool_Bool ikev1_ship_chain(chunk_t *chain, int n, pb_stream *outs, | |||
3263 | uint8_t type) | |||
3264 | { | |||
3265 | for (int i = 0; i < n; i++) { | |||
3266 | if (!ikev1_ship_CERT(type, HUNK_AS_SHUNK(chain[i])({ typeof(chain[i]) h_ = (chain[i]); shunk2(h_.ptr, h_.len); } ), outs)) | |||
3267 | return false0; | |||
3268 | } | |||
3269 | ||||
3270 | return true1; | |||
3271 | } | |||
3272 | ||||
3273 | void doi_log_cert_thinking(uint16_t auth, | |||
3274 | enum ike_cert_type certtype, | |||
3275 | enum certpolicy policy, | |||
3276 | bool_Bool gotcertrequest, | |||
3277 | bool_Bool send_cert, | |||
3278 | bool_Bool send_chain) | |||
3279 | { | |||
3280 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { | |||
3281 | DBG_log("thinking about whether to send my certificate:"); | |||
3282 | ||||
3283 | esb_buf oan; | |||
3284 | esb_buf ictn; | |||
3285 | DBG_log(" I have RSA key: %s cert.type: %s ", | |||
3286 | enum_show(&oakley_auth_names, auth, &oan), | |||
3287 | enum_show(&ike_cert_type_names, certtype, &ictn)); | |||
3288 | ||||
3289 | esb_buf cptn; | |||
3290 | DBG_log(" sendcert: %s and I did%s get a certificate request ", | |||
3291 | enum_show(&certpolicy_type_names, policy, &cptn), | |||
3292 | gotcertrequest ? "" : " not"); | |||
3293 | ||||
3294 | DBG_log(" so %ssend cert.", send_cert ? "" : "do not "); | |||
3295 | ||||
3296 | if (!send_cert) { | |||
3297 | if (auth == OAKLEY_PRESHARED_KEY) { | |||
3298 | DBG_log("I did not send a certificate because digital signatures are not being used. (PSK)"); | |||
3299 | } else if (certtype == CERT_NONE) { | |||
3300 | DBG_log("I did not send a certificate because I do not have one."); | |||
3301 | } else if (policy == CERT_SENDIFASKED) { | |||
3302 | DBG_log("I did not send my certificate because I was not asked to."); | |||
3303 | } else { | |||
3304 | DBG_log("INVALID AUTH SETTING: %d", auth); | |||
3305 | } | |||
3306 | } | |||
3307 | if (send_chain) | |||
3308 | DBG_log("Sending one or more authcerts"); | |||
3309 | } | |||
3310 | } | |||
3311 | ||||
3312 | /* | |||
3313 | * an ISAKMP SA has been established. | |||
3314 | * Note the serial number, and release any connections with | |||
3315 | * the same peer ID but different peer IP address. | |||
3316 | * | |||
3317 | * Called by IKEv1 and IKEv2 when the IKE SA is established. | |||
3318 | * It checks if the freshly established connection needs is | |||
3319 | * replacing an established version of itself. | |||
3320 | * | |||
3321 | * The use of uniqueIDs is mostly historic and might be removed | |||
3322 | * in a future version. It is ignored for PSK based connections, | |||
3323 | * which only act based on being a "server using PSK". | |||
3324 | * | |||
3325 | * IKEv1 code does not send or process INITIAL_CONTACT | |||
3326 | * IKEv2 codes does so we take it into account. | |||
3327 | */ | |||
3328 | ||||
3329 | void ISAKMP_SA_established(const struct ike_sa *ike) | |||
3330 | { | |||
3331 | struct connection *c = ike->sa.st_connection; | |||
3332 | bool_Bool authnull = (LIN(POLICY_AUTH_NULL, c->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (c->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || c->spd.that.authby == AUTHBY_NULL); | |||
3333 | ||||
3334 | if (c->spd.this.xauth_server && LIN(POLICY_PSK, c->policy)(((((lset_t)1 << (POLICY_PSK_IX))) & (c->policy) ) == (((lset_t)1 << (POLICY_PSK_IX))))) { | |||
3335 | /* | |||
3336 | * If we are a server and use PSK, all clients use the same group ID | |||
3337 | * Note that "xauth_server" also refers to IKEv2 CP | |||
3338 | */ | |||
3339 | dbg("We are a server using PSK and clients are using a group ID"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("We are a server using PSK and clients are using a group ID" ); } }; | |||
3340 | } else if (!uniqueIDs) { | |||
3341 | dbg("uniqueIDs disabled, not contemplating releasing older self"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("uniqueIDs disabled, not contemplating releasing older self" ); } }; | |||
3342 | } else { | |||
3343 | /* | |||
3344 | * for all existing connections: if the same Phase 1 IDs are used, | |||
3345 | * unorient the (old) connection (if different from current connection) | |||
3346 | * Only do this for connections with the same name (can be shared ike sa) | |||
3347 | */ | |||
3348 | struct connection_query cq = { .where = HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/ikev1.c", .line = 3348, }; &here; }), .c = NULL((void*)0), }; | |||
3349 | while (new2old_connection(&cq)) { | |||
3350 | struct connection *d = cq.c; | |||
3351 | ||||
3352 | /* if old IKE SA is same as new IKE sa and non-auth isn't overwrting auth */ | |||
3353 | if (c != d && c->kind == d->kind && streq(c->name, d->name)(strcmp((c->name), (d->name)) == 0) && | |||
3354 | same_id(&c->spd.this.id, &d->spd.this.id) && | |||
3355 | same_id(&c->spd.that.id, &d->spd.that.id)) | |||
3356 | { | |||
3357 | bool_Bool old_is_nullauth = (LIN(POLICY_AUTH_NULL, d->policy)(((((lset_t)1 << (POLICY_AUTH_NULL_IX))) & (d->policy )) == (((lset_t)1 << (POLICY_AUTH_NULL_IX)))) || d->spd.that.authby == AUTHBY_NULL); | |||
3358 | bool_Bool same_remote_ip = sameaddr(&c->spd.that.host_addr, &d->spd.that.host_addr); | |||
3359 | ||||
3360 | if (same_remote_ip && (!old_is_nullauth && authnull)) { | |||
3361 | log_state(RC_LOG, &ike->sa, "cannot replace old authenticated connection with authnull connection"); | |||
3362 | } else if (!same_remote_ip && old_is_nullauth && authnull) { | |||
3363 | log_state(RC_LOG, &ike->sa, "NULL auth ID for different IP's cannot replace each other"); | |||
3364 | } else { | |||
3365 | dbg("unorienting old connection with same IDs"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("unorienting old connection with same IDs"); } }; | |||
3366 | /* | |||
3367 | * When replacing an old | |||
3368 | * existing connection, | |||
3369 | * suppress sending delete | |||
3370 | * notify | |||
3371 | */ | |||
3372 | suppress_delete_notify(ike, "ISAKMP", d->newest_ike_sa); | |||
3373 | suppress_delete_notify(ike, "IKE", d->newest_ipsec_sa); | |||
3374 | /* | |||
3375 | * XXX: Assume this call | |||
3376 | * doesn't want to log to | |||
3377 | * whack? Even though the IKE | |||
3378 | * SA may have whack attached, | |||
3379 | * don't transfer it to the | |||
3380 | * old connection. | |||
3381 | */ | |||
3382 | if (d->kind == CK_INSTANCE) { | |||
3383 | delete_connection(&d, /*relations?*/false0); | |||
3384 | } else { | |||
3385 | release_connection(d, /*relations?*/false0); /* this deletes the states */ | |||
3386 | } | |||
3387 | } | |||
3388 | } | |||
3389 | } | |||
3390 | ||||
3391 | /* | |||
3392 | * This only affects IKEv2, since we don't store any | |||
3393 | * received INITIAL_CONTACT for IKEv1. | |||
3394 | * We don't do this on IKEv1, because it seems to | |||
3395 | * confuse various third parties (Windows, Cisco VPN 300, | |||
3396 | * and juniper | |||
3397 | * likely because this would be called before the IPsec SA | |||
3398 | * of QuickMode is installed, so the remote endpoints view | |||
3399 | * this IKE SA still as the active one? | |||
3400 | */ | |||
3401 | if (ike->sa.st_ike_seen_v2n_initial_contact) { | |||
3402 | if (c->newest_ike_sa != SOS_NOBODY0 && | |||
3403 | c->newest_ike_sa != ike->sa.st_serialno) { | |||
3404 | struct state *old_p1 = state_by_serialno(c->newest_ike_sa); | |||
3405 | ||||
3406 | dbg("deleting replaced IKE state for %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } } | |||
3407 | old_p1->st_connection->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("deleting replaced IKE state for %s", old_p1-> st_connection->name); } }; | |||
3408 | old_p1->st_send_delete = DONT_SEND_DELETE; | |||
3409 | event_force(EVENT_SA_EXPIRE, old_p1); | |||
3410 | } | |||
3411 | ||||
3412 | if (c->newest_ipsec_sa != SOS_NOBODY0) { | |||
3413 | struct state *old_p2 = state_by_serialno(c->newest_ipsec_sa); | |||
3414 | struct connection *d = old_p2 == NULL((void*)0) ? NULL((void*)0) : old_p2->st_connection; | |||
3415 | ||||
3416 | if (c == d && same_id(&c->spd.that.id, &d->spd.that.id)) { | |||
3417 | dbg("Initial Contact received, deleting old state #%lu from connection '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } } | |||
3418 | c->newest_ipsec_sa, c->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("Initial Contact received, deleting old state #%lu from connection '%s'" , c->newest_ipsec_sa, c->name); } }; | |||
3419 | old_p2->st_send_delete = DONT_SEND_DELETE; | |||
3420 | event_force(EVENT_SA_EXPIRE, old_p2); | |||
3421 | } | |||
3422 | } | |||
3423 | } | |||
3424 | } | |||
3425 | ||||
3426 | c->newest_ike_sa = ike->sa.st_serialno; | |||
3427 | } | |||
3428 | ||||
3429 | /* | |||
3430 | * Reply messages are built in this nasty evil global buffer. | |||
3431 | * | |||
3432 | * Only one packet can be built at a time. That should be ok as | |||
3433 | * packets are only built on the main thread and code and a packet is | |||
3434 | * created using a single operation. | |||
3435 | * | |||
3436 | * In the good old days code would partially construct a packet, | |||
3437 | * wonder off to do crypto and process other packets, and then assume | |||
3438 | * things could be picked up where they were left off. Code to make | |||
3439 | * that work (saving restoring the buffer, re-initializing the buffer | |||
3440 | * in strange places, ....) has all been removed. | |||
3441 | * | |||
3442 | * Something else that should go is global access to REPLY_STREAM. | |||
3443 | * Instead all code should use open_reply_stream() and a reference | |||
3444 | * with only local scope. This should reduce the odds of code | |||
3445 | * meddling in reply_stream on the sly. | |||
3446 | * | |||
3447 | * Another possibility is to move the buffer onto the stack. However, | |||
3448 | * the PBS is 64K and that isn't so good for small machines. Then | |||
3449 | * again the send.[hc] and demux[hc] code both allocate 64K stack | |||
3450 | * buffers already. Oops. | |||
3451 | */ | |||
3452 | ||||
3453 | pb_stream reply_stream; |