| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| #ifndef _XFRM_CONTROLLER_H |
| #define _XFRM_CONTROLLER_H |
| |
| #include <atomic> |
| #include <list> |
| #include <map> |
| #include <string> |
| #include <utility> // for pair |
| |
| #include <linux/if.h> |
| #include <linux/if_link.h> |
| #include <linux/if_tunnel.h> |
| #include <linux/netlink.h> |
| #include <linux/udp.h> |
| #include <linux/xfrm.h> |
| #include <unistd.h> |
| |
| #include "NetdConstants.h" |
| #include "android-base/unique_fd.h" |
| #include "netdutils/DumpWriter.h" |
| #include "netdutils/Slice.h" |
| #include "netdutils/Status.h" |
| #include "sysutils/SocketClient.h" |
| |
| namespace android { |
| namespace net { |
| |
| // Exposed for testing |
| extern const uint32_t ALGO_MASK_AUTH_ALL; |
| // Exposed for testing |
| extern const uint32_t ALGO_MASK_CRYPT_ALL; |
| // Exposed for testing |
| extern const uint32_t ALGO_MASK_AEAD_ALL; |
| // Exposed for testing |
| extern const uint8_t REPLAY_WINDOW_SIZE; |
| |
| // Suggest we avoid the smallest and largest ints |
| class XfrmMessage; |
| class TransportModeSecurityAssociation; |
| |
| class XfrmSocket { |
| public: |
| // called from destructor and thus cannot be virtual |
| void close() { |
| if (mSock >= 0) { |
| ::close(mSock); |
| } |
| mSock = -1; |
| } |
| |
| virtual netdutils::Status open() = 0; |
| |
| virtual ~XfrmSocket() { close(); } |
| |
| // Sends the netlink message contained in iovecs. This populates iovecs[0] with |
| // a valid netlink message header. |
| virtual netdutils::Status sendMessage(uint16_t nlMsgType, uint16_t nlMsgFlags, |
| uint16_t nlMsgSeqNum, |
| std::vector<iovec>* iovecs) const = 0; |
| |
| protected: |
| int mSock; |
| }; |
| |
| enum struct XfrmDirection : uint8_t { |
| IN = XFRM_POLICY_IN, |
| OUT = XFRM_POLICY_OUT, |
| FORWARD = XFRM_POLICY_FWD, |
| MASK = XFRM_POLICY_MASK, |
| }; |
| |
| enum struct XfrmMode : uint8_t { |
| TRANSPORT = XFRM_MODE_TRANSPORT, |
| TUNNEL = XFRM_MODE_TUNNEL, |
| }; |
| |
| enum struct XfrmEncapType : uint16_t { |
| NONE = 0, |
| ESPINUDP_NON_IKE = UDP_ENCAP_ESPINUDP_NON_IKE, |
| ESPINUDP = UDP_ENCAP_ESPINUDP |
| }; |
| |
| struct XfrmAlgo { |
| std::string name; |
| std::vector<uint8_t> key; |
| uint16_t truncLenBits; |
| }; |
| |
| struct XfrmEncap { |
| XfrmEncapType type; |
| uint16_t srcPort; |
| uint16_t dstPort; |
| }; |
| |
| // minimally sufficient structure to match either an SA or a Policy |
| struct XfrmCommonInfo { |
| xfrm_address_t dstAddr; // network order |
| xfrm_address_t srcAddr; |
| int addrFamily; // AF_INET or AF_INET6 |
| int transformId; // requestId |
| int spi; |
| xfrm_mark mark; |
| int xfrm_if_id; |
| }; |
| |
| struct XfrmSaInfo : XfrmCommonInfo { |
| XfrmAlgo auth; |
| XfrmAlgo crypt; |
| XfrmAlgo aead; |
| int netId; |
| XfrmMode mode; |
| XfrmEncap encap; |
| }; |
| |
| struct XfrmSpInfo : XfrmSaInfo { |
| // Address family in XfrmCommonInfo used for template/SA matching, need separate addrFamily |
| // for selectors |
| int selAddrFamily; // AF_INET or AF_INET6 |
| }; |
| |
| /* |
| * This is a workaround for a kernel bug in the 32bit netlink compat layer |
| * that has been present on x86_64 kernels since 2010 with no fix on the |
| * horizon. |
| * |
| * Below is a redefinition of the xfrm_usersa_info struct that is part |
| * of the Linux uapi <linux/xfrm.h> to align the structures to a 64-bit |
| * boundary. |
| * |
| * Note that we turn this on for all x86 32bit targets, under the assumption |
| * that nowadays all x86 targets are running 64bit kernels. |
| */ |
| #if defined(__i386__) |
| // Shadow the kernel definition of xfrm_usersa_info with a 64-bit aligned version |
| struct xfrm_usersa_info : ::xfrm_usersa_info { |
| } __attribute__((aligned(8))); |
| // Shadow the kernel's version, using the aligned version of xfrm_usersa_info |
| struct xfrm_userspi_info { |
| struct xfrm_usersa_info info; |
| __u32 min; |
| __u32 max; |
| }; |
| struct xfrm_userpolicy_info : ::xfrm_userpolicy_info { |
| } __attribute__((aligned(8))); |
| |
| /* |
| * Anyone who encounters a failure when sending netlink messages should look here |
| * first. Hitting the static_assert() below should be a strong hint that Android |
| * IPsec will probably not work with your current settings. |
| * |
| * Again, experimentally determined, the "flags" field should be the first byte in |
| * the final word of the xfrm_usersa_info struct. The check validates the size of |
| * the padding to be 7. |
| * |
| * This padding is verified to be correct on gcc/x86_64 kernel, and clang/x86 userspace. |
| */ |
| static_assert(sizeof(::xfrm_usersa_info) % 8 != 0, |
| "struct xfrm_usersa_info has changed " |
| "alignment. Please consider whether this " |
| "patch is needed."); |
| static_assert(sizeof(xfrm_usersa_info) - offsetof(xfrm_usersa_info, flags) == 8, |
| "struct xfrm_usersa_info probably misaligned with kernel struct."); |
| static_assert(sizeof(xfrm_usersa_info) % 8 == 0, |
| "struct xfrm_usersa_info_t is not 64-bit " |
| "aligned. Please consider whether this patch " |
| "is needed."); |
| static_assert(sizeof(::xfrm_userspi_info) - sizeof(::xfrm_usersa_info) == |
| sizeof(xfrm_userspi_info) - sizeof(xfrm_usersa_info), |
| "struct xfrm_userspi_info has changed and does not match the kernel struct."); |
| static_assert(sizeof(::xfrm_userpolicy_info) % 8 != 0, |
| "struct xfrm_userpolicy_info has changed " |
| "alignment. Please consider whether this " |
| "patch is needed."); |
| static_assert(sizeof(xfrm_userpolicy_info) - offsetof(xfrm_userpolicy_info, share) == 5, |
| "struct xfrm_userpolicy_info probably misaligned with kernel struct."); |
| static_assert(sizeof(xfrm_userpolicy_info) % 8 == 0, |
| "struct xfrm_userpolicy_info is not 64-bit " |
| "aligned. Please consider whether this patch " |
| "is needed."); |
| #endif |
| |
| class XfrmController { |
| public: |
| XfrmController(); |
| |
| // Initializer to override XFRM-I support for unit-testing purposes |
| explicit XfrmController(bool xfrmIntfSupport); |
| |
| static netdutils::Status Init(); |
| |
| static netdutils::Status ipSecSetEncapSocketOwner(int socketFd, int newUid, uid_t callerUid); |
| |
| static netdutils::Status ipSecAllocateSpi(int32_t transformId, const std::string& localAddress, |
| const std::string& remoteAddress, int32_t inSpi, |
| int32_t* outSpi); |
| |
| static netdutils::Status ipSecAddSecurityAssociation( |
| int32_t transformId, int32_t mode, const std::string& sourceAddress, |
| const std::string& destinationAddress, int32_t underlyingNetId, int32_t spi, |
| int32_t markValue, int32_t markMask, const std::string& authAlgo, |
| const std::vector<uint8_t>& authKey, int32_t authTruncBits, |
| const std::string& cryptAlgo, const std::vector<uint8_t>& cryptKey, |
| int32_t cryptTruncBits, const std::string& aeadAlgo, |
| const std::vector<uint8_t>& aeadKey, int32_t aeadIcvBits, int32_t encapType, |
| int32_t encapLocalPort, int32_t encapRemotePort, int32_t xfrmInterfaceId); |
| |
| static netdutils::Status ipSecDeleteSecurityAssociation(int32_t transformId, |
| const std::string& sourceAddress, |
| const std::string& destinationAddress, |
| int32_t spi, int32_t markValue, |
| int32_t markMask, |
| int32_t xfrmInterfaceId); |
| |
| static netdutils::Status ipSecApplyTransportModeTransform(int socketFd, int32_t transformId, |
| int32_t direction, |
| const std::string& localAddress, |
| const std::string& remoteAddress, |
| int32_t spi); |
| |
| static netdutils::Status ipSecRemoveTransportModeTransform(int socketFd); |
| |
| static netdutils::Status ipSecAddSecurityPolicy(int32_t transformId, int32_t selAddrFamily, |
| int32_t direction, |
| const std::string& tmplSrcAddress, |
| const std::string& tmplDstAddress, int32_t spi, |
| int32_t markValue, int32_t markMask, |
| int32_t xfrmInterfaceId); |
| |
| static netdutils::Status ipSecUpdateSecurityPolicy(int32_t transformId, int32_t selAddrFamily, |
| int32_t direction, |
| const std::string& tmplSrcAddress, |
| const std::string& tmplDstAddress, |
| int32_t spi, int32_t markValue, |
| int32_t markMask, int32_t xfrmInterfaceId); |
| |
| static netdutils::Status ipSecDeleteSecurityPolicy(int32_t transformId, int32_t selAddrFamily, |
| int32_t direction, int32_t markValue, |
| int32_t markMask, int32_t xfrmInterfaceId); |
| |
| static netdutils::Status ipSecAddTunnelInterface(const std::string& deviceName, |
| const std::string& localAddress, |
| const std::string& remoteAddress, int32_t ikey, |
| int32_t okey, int32_t interfaceId, |
| bool isUpdate); |
| |
| static netdutils::Status ipSecRemoveTunnelInterface(const std::string& deviceName); |
| |
| void dump(netdutils::DumpWriter& dw); |
| |
| // Some XFRM netlink attributes comprise a header, a struct, and some data |
| // after the struct. We wrap all of those in one struct for easier |
| // marshalling. The structs below must be ABI compatible with the kernel and |
| // are composed from kernel structures; thus, they use the kernel naming |
| // convention. |
| |
| // Exposed for testing |
| static constexpr size_t MAX_KEY_LENGTH = 128; |
| |
| // Container for the content of an XFRMA_ALG_CRYPT netlink attribute. |
| // Exposed for testing |
| struct nlattr_algo_crypt { |
| nlattr hdr; |
| xfrm_algo crypt; |
| uint8_t key[MAX_KEY_LENGTH]; |
| }; |
| |
| // Container for the content of an XFRMA_ALG_AUTH_TRUNC netlink attribute. |
| // Exposed for testing |
| struct nlattr_algo_auth { |
| nlattr hdr; |
| xfrm_algo_auth auth; |
| uint8_t key[MAX_KEY_LENGTH]; |
| }; |
| |
| // Container for the content of an XFRMA_TMPL netlink attribute. |
| // Exposed for testing |
| struct nlattr_algo_aead { |
| nlattr hdr; |
| xfrm_algo_aead aead; |
| uint8_t key[MAX_KEY_LENGTH]; |
| }; |
| |
| // Exposed for testing |
| struct nlattr_user_tmpl { |
| nlattr hdr; |
| xfrm_user_tmpl tmpl; |
| }; |
| |
| // Container for the content of an XFRMA_ENCAP netlink attribute. |
| // Exposed for testing |
| struct nlattr_encap_tmpl { |
| nlattr hdr; |
| xfrm_encap_tmpl tmpl; |
| }; |
| |
| // Container for the content of an XFRMA_MARK netlink attribute. |
| // Exposed for testing |
| struct nlattr_xfrm_mark { |
| nlattr hdr; |
| xfrm_mark mark; |
| }; |
| |
| // Container for the content of an XFRMA_OUTPUT_MARK netlink attribute. |
| // Exposed for testing |
| struct nlattr_xfrm_output_mark { |
| nlattr hdr; |
| __u32 outputMark; |
| }; |
| |
| // Container for the content of an XFRMA_IF_ID netlink attribute. |
| // Exposed for testing |
| struct nlattr_xfrm_interface_id { |
| nlattr hdr; |
| __u32 if_id; |
| }; |
| |
| // Exposed for testing |
| struct nlattr_payload_u32 { |
| nlattr hdr; |
| uint32_t value; |
| }; |
| |
| private: |
| static bool isXfrmIntfSupported(); |
| |
| // helper functions for filling in the XfrmCommonInfo (and XfrmSaInfo) structure |
| static netdutils::Status fillXfrmCommonInfo(const std::string& sourceAddress, |
| const std::string& destinationAddress, int32_t spi, |
| int32_t markValue, int32_t markMask, |
| int32_t transformId, int32_t xfrmInterfaceId, |
| XfrmCommonInfo* info); |
| static netdutils::Status fillXfrmCommonInfo(int32_t spi, int32_t markValue, int32_t markMask, |
| int32_t transformId, int32_t xfrmInterfaceId, |
| XfrmCommonInfo* info); |
| |
| // Top level functions for managing a Transport Mode Transform |
| static netdutils::Status addTransportModeTransform(const XfrmSaInfo& record); |
| static int removeTransportModeTransform(const XfrmSaInfo& record); |
| |
| // TODO(messagerefactor): FACTOR OUT ALL MESSAGE BUILDING CODE BELOW HERE |
| // Shared between SA and SP |
| static void fillXfrmSelector(const int record, xfrm_selector* selector); |
| |
| // Shared between Transport and Tunnel Mode |
| static int fillNlAttrXfrmAlgoEnc(const XfrmAlgo& in_algo, nlattr_algo_crypt* algo); |
| static int fillNlAttrXfrmAlgoAuth(const XfrmAlgo& in_algo, nlattr_algo_auth* algo); |
| static int fillNlAttrXfrmAlgoAead(const XfrmAlgo& in_algo, nlattr_algo_aead* algo); |
| static int fillNlAttrXfrmEncapTmpl(const XfrmSaInfo& record, nlattr_encap_tmpl* tmpl); |
| |
| // Functions for updating a Transport Mode SA |
| static netdutils::Status updateSecurityAssociation(const XfrmSaInfo& record, |
| const XfrmSocket& sock); |
| static int fillUserSaInfo(const XfrmSaInfo& record, xfrm_usersa_info* usersa); |
| |
| // Functions for deleting a Transport Mode SA |
| static netdutils::Status deleteSecurityAssociation(const XfrmCommonInfo& record, |
| const XfrmSocket& sock); |
| static int fillUserSaId(const XfrmCommonInfo& record, xfrm_usersa_id* said); |
| static void fillUserTemplate(const XfrmSpInfo& record, xfrm_user_tmpl* tmpl); |
| |
| static int fillUserSpInfo(const XfrmSpInfo& record, XfrmDirection direction, |
| xfrm_userpolicy_info* usersp); |
| static int fillNlAttrUserTemplate(const XfrmSpInfo& record, nlattr_user_tmpl* tmpl); |
| static int fillUserPolicyId(const XfrmSpInfo& record, XfrmDirection direction, |
| xfrm_userpolicy_id* policy_id); |
| static int fillNlAttrXfrmMark(const XfrmCommonInfo& record, nlattr_xfrm_mark* mark); |
| static int fillNlAttrXfrmOutputMark(const __u32 underlyingNetId, |
| nlattr_xfrm_output_mark* output_mark); |
| static int fillNlAttrXfrmIntfId(const __u32 intf_id_value, nlattr_xfrm_interface_id* intf_id); |
| |
| static netdutils::Status allocateSpi(const XfrmSaInfo& record, uint32_t minSpi, uint32_t maxSpi, |
| uint32_t* outSpi, const XfrmSocket& sock); |
| |
| static netdutils::Status processSecurityPolicy(int32_t transformId, int32_t selAddrFamily, |
| int32_t direction, |
| const std::string& tmplSrcAddress, |
| const std::string& tmplDstAddress, int32_t spi, |
| int32_t markValue, int32_t markMask, |
| int32_t xfrmInterfaceId, int32_t msgType); |
| static netdutils::Status updateTunnelModeSecurityPolicy(const XfrmSpInfo& record, |
| const XfrmSocket& sock, |
| XfrmDirection direction, |
| uint16_t msgType); |
| static netdutils::Status deleteTunnelModeSecurityPolicy(const XfrmSpInfo& record, |
| const XfrmSocket& sock, |
| XfrmDirection direction); |
| static netdutils::Status flushInterfaces(); |
| static netdutils::Status flushSaDb(const XfrmSocket& s); |
| static netdutils::Status flushPolicyDb(const XfrmSocket& s); |
| |
| static netdutils::Status ipSecAddXfrmInterface(const std::string& deviceName, |
| int32_t interfaceId, uint16_t flags); |
| static netdutils::Status ipSecAddVirtualTunnelInterface(const std::string& deviceName, |
| const std::string& localAddress, |
| const std::string& remoteAddress, |
| int32_t ikey, int32_t okey, |
| uint16_t flags); |
| // END TODO(messagerefactor) |
| }; |
| |
| } // namespace net |
| } // namespace android |
| |
| #endif /* !defined(XFRM_CONTROLLER_H) */ |