You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

addr.c 42KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "addr.h"
  18. #include "util.h"
  19. /*
  20. * TODO: fix this cross dependency!
  21. */
  22. #include "libserver/maps/map_helpers.h"
  23. #include "logger.h"
  24. #include "cryptobox.h"
  25. #include "unix-std.h"
  26. /* pwd and grp */
  27. #ifdef HAVE_PWD_H
  28. #include <pwd.h>
  29. #endif
  30. #ifdef HAVE_GRP_H
  31. #include <grp.h>
  32. #endif
  33. static struct rspamd_radix_map_helper *local_addrs;
  34. enum {
  35. RSPAMD_IPV6_UNDEFINED = 0,
  36. RSPAMD_IPV6_SUPPORTED,
  37. RSPAMD_IPV6_UNSUPPORTED
  38. } ipv6_status = RSPAMD_IPV6_UNDEFINED;
  39. /**
  40. * Union that is used for storing sockaddrs
  41. */
  42. union sa_union {
  43. struct sockaddr sa;
  44. struct sockaddr_in s4;
  45. struct sockaddr_in6 s6;
  46. struct sockaddr_un su;
  47. struct sockaddr_storage ss;
  48. };
  49. union sa_inet {
  50. struct sockaddr sa;
  51. struct sockaddr_in s4;
  52. struct sockaddr_in6 s6;
  53. };
  54. struct rspamd_addr_unix {
  55. struct sockaddr_un addr;
  56. gint mode;
  57. uid_t owner;
  58. gid_t group;
  59. };
  60. struct rspamd_addr_inet {
  61. union sa_inet addr;
  62. };
  63. struct rspamd_inet_addr_s {
  64. union {
  65. struct rspamd_addr_inet in;
  66. struct rspamd_addr_unix *un;
  67. } u;
  68. gint af;
  69. socklen_t slen;
  70. };
  71. static void
  72. rspamd_ip_validate_af (rspamd_inet_addr_t *addr)
  73. {
  74. if (addr->af != AF_UNIX) {
  75. if (addr->u.in.addr.sa.sa_family != addr->af) {
  76. addr->u.in.addr.sa.sa_family = addr->af;
  77. }
  78. }
  79. else {
  80. addr->u.un->addr.sun_family = AF_UNIX;
  81. }
  82. if (addr->af == AF_INET) {
  83. addr->slen = sizeof (struct sockaddr_in);
  84. }
  85. else if (addr->af == AF_INET6) {
  86. addr->slen = sizeof (struct sockaddr_in6);
  87. }
  88. else if (addr->af == AF_UNIX) {
  89. #ifdef SUN_LEN
  90. addr->slen = SUN_LEN (&addr->u.un->addr);
  91. #else
  92. addr->slen = sizeof (addr->u.un->addr);
  93. #endif
  94. #if defined(FREEBSD) || defined(__APPLE__)
  95. addr->u.un->addr.sun_len = addr->slen;
  96. #endif
  97. }
  98. }
  99. #define RSPAMD_MAYBE_ALLOC_POOL(pool, sz) \
  100. (pool != NULL) ? rspamd_mempool_alloc((pool), (sz)) : g_malloc(sz)
  101. #define RSPAMD_MAYBE_ALLOC0_POOL(pool, sz) \
  102. (pool != NULL) ? rspamd_mempool_alloc0((pool), (sz)) : g_malloc0(sz)
  103. static rspamd_inet_addr_t *
  104. rspamd_inet_addr_create (gint af, rspamd_mempool_t *pool)
  105. {
  106. rspamd_inet_addr_t *addr;
  107. addr = RSPAMD_MAYBE_ALLOC0_POOL (pool, sizeof(*addr));
  108. addr->af = af;
  109. if (af == AF_UNIX) {
  110. addr->u.un = RSPAMD_MAYBE_ALLOC0_POOL(pool, sizeof (*addr->u.un));
  111. addr->slen = sizeof (addr->u.un->addr);
  112. }
  113. else {
  114. rspamd_ip_validate_af (addr);
  115. }
  116. return addr;
  117. }
  118. void
  119. rspamd_inet_address_free (rspamd_inet_addr_t *addr)
  120. {
  121. if (addr) {
  122. if (addr->af == AF_UNIX) {
  123. if (addr->u.un) {
  124. g_free (addr->u.un);
  125. }
  126. }
  127. g_free (addr);
  128. }
  129. }
  130. static void
  131. rspamd_ip_check_ipv6 (void)
  132. {
  133. if (ipv6_status == RSPAMD_IPV6_UNDEFINED) {
  134. gint s;
  135. s = socket (AF_INET6, SOCK_STREAM, 0);
  136. if (s == -1) {
  137. ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
  138. }
  139. else {
  140. /*
  141. * Try to check /proc if we are on Linux (the common case)
  142. */
  143. struct stat st;
  144. close (s);
  145. if (stat ("/proc/net/dev", &st) != -1) {
  146. if (stat ("/proc/net/if_inet6", &st) != -1) {
  147. if (st.st_size != 0) {
  148. ipv6_status = RSPAMD_IPV6_SUPPORTED;
  149. }
  150. else {
  151. /* Empty file, no ipv6 configuration at all */
  152. ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
  153. }
  154. }
  155. else {
  156. ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
  157. }
  158. }
  159. else {
  160. /* Not a Linux, so we assume it supports ipv6 somehow... */
  161. ipv6_status = RSPAMD_IPV6_SUPPORTED;
  162. }
  163. }
  164. }
  165. }
  166. gboolean
  167. rspamd_ip_is_valid (const rspamd_inet_addr_t *addr)
  168. {
  169. const struct in_addr ip4_any = { INADDR_ANY }, ip4_none = { INADDR_NONE };
  170. const struct in6_addr ip6_any = IN6ADDR_ANY_INIT;
  171. gboolean ret = FALSE;
  172. if (G_LIKELY (addr->af == AF_INET)) {
  173. if (memcmp (&addr->u.in.addr.s4.sin_addr, &ip4_any,
  174. sizeof (struct in_addr)) != 0 &&
  175. memcmp (&addr->u.in.addr.s4.sin_addr, &ip4_none,
  176. sizeof (struct in_addr)) != 0) {
  177. ret = TRUE;
  178. }
  179. }
  180. else if (G_UNLIKELY (addr->af == AF_INET6)) {
  181. if (memcmp (&addr->u.in.addr.s6.sin6_addr, &ip6_any,
  182. sizeof (struct in6_addr)) != 0) {
  183. ret = TRUE;
  184. }
  185. }
  186. return ret;
  187. }
  188. gint
  189. rspamd_accept_from_socket (gint sock, rspamd_inet_addr_t **target,
  190. rspamd_accept_throttling_handler hdl,
  191. void *hdl_data)
  192. {
  193. gint nfd, serrno;
  194. union sa_union su;
  195. socklen_t len = sizeof (su);
  196. rspamd_inet_addr_t *addr = NULL;
  197. if ((nfd = accept (sock, &su.sa, &len)) == -1) {
  198. if (target) {
  199. *target = NULL;
  200. }
  201. if (errno == EAGAIN || errno == EINTR || errno == EWOULDBLOCK) {
  202. return 0;
  203. }
  204. else if (errno == EMFILE || errno == ENFILE) {
  205. /* Temporary disable accept event */
  206. if (hdl) {
  207. hdl (sock, hdl_data);
  208. }
  209. return 0;
  210. }
  211. return -1;
  212. }
  213. if (su.sa.sa_family == AF_INET6) {
  214. /* Deal with bloody v4 mapped to v6 addresses */
  215. static const guint8 mask[] = {
  216. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  217. };
  218. const guint8 *p;
  219. if (memcmp ((const guint8 *)&su.s6.sin6_addr, mask, sizeof (mask)) == 0) {
  220. p = (const guint8 *)&su.s6.sin6_addr;
  221. if ((p[10] == 0xff && p[11] == 0xff)) {
  222. addr = rspamd_inet_addr_create (AF_INET, NULL);
  223. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  224. sizeof (struct in_addr));
  225. addr->u.in.addr.s4.sin_port = su.s6.sin6_port;
  226. }
  227. else {
  228. /* Something strange but not mapped v4 address */
  229. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  230. memcpy (&addr->u.in.addr.s6, &su.s6,
  231. sizeof (struct sockaddr_in6));
  232. }
  233. }
  234. else {
  235. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  236. memcpy (&addr->u.in.addr.s6, &su.s6,
  237. sizeof (struct sockaddr_in6));
  238. }
  239. }
  240. else {
  241. addr = rspamd_inet_addr_create (su.sa.sa_family, NULL);
  242. addr->slen = len;
  243. if (addr->af == AF_UNIX) {
  244. len = sizeof (su);
  245. if (getsockname (sock, &su.sa, &len) != -1) {
  246. memcpy (&addr->u.un->addr, &su.su, MIN (len,
  247. sizeof (struct sockaddr_un)));
  248. }
  249. else {
  250. /* Just copy socket address */
  251. memcpy (&addr->u.un->addr, &su.sa, sizeof (struct sockaddr));
  252. }
  253. }
  254. else {
  255. memcpy (&addr->u.in.addr, &su, MIN (len, sizeof (addr->u.in.addr)));
  256. }
  257. }
  258. if (rspamd_socket_nonblocking (nfd) < 0) {
  259. goto out;
  260. }
  261. /* Set close on exec */
  262. if (fcntl (nfd, F_SETFD, FD_CLOEXEC) == -1) {
  263. msg_warn ("fcntl failed: %d, '%s'", errno, strerror (errno));
  264. goto out;
  265. }
  266. if (target) {
  267. *target = addr;
  268. }
  269. else {
  270. /* Avoid leak */
  271. rspamd_inet_address_free (addr);
  272. }
  273. return (nfd);
  274. out:
  275. serrno = errno;
  276. close (nfd);
  277. errno = serrno;
  278. rspamd_inet_address_free (addr);
  279. return (-1);
  280. }
  281. static gboolean
  282. rspamd_parse_unix_path (rspamd_inet_addr_t **target,
  283. const char *src, gsize len,
  284. rspamd_mempool_t *pool,
  285. enum rspamd_inet_address_parse_flags how)
  286. {
  287. gchar **tokens, **cur_tok, *p, *pwbuf;
  288. glong pwlen;
  289. struct passwd pw, *ppw;
  290. struct group gr, *pgr;
  291. rspamd_inet_addr_t *addr;
  292. bool has_group = false;
  293. addr = rspamd_inet_addr_create (AF_UNIX, pool);
  294. addr->u.un->mode = 00644;
  295. addr->u.un->owner = (uid_t)-1;
  296. addr->u.un->group = (gid_t)-1;
  297. if (!(how & RSPAMD_INET_ADDRESS_PARSE_REMOTE)) {
  298. tokens = rspamd_string_len_split (src, len, " ,", -1, pool);
  299. if (tokens[0] == NULL) {
  300. return FALSE;
  301. }
  302. rspamd_strlcpy (addr->u.un->addr.sun_path, tokens[0],
  303. sizeof (addr->u.un->addr.sun_path));
  304. #if defined(FREEBSD) || defined(__APPLE__)
  305. addr->u.un->addr.sun_len = SUN_LEN (&addr->u.un->addr);
  306. #endif
  307. }
  308. else {
  309. rspamd_strlcpy (addr->u.un->addr.sun_path, src,
  310. MIN (len + 1, sizeof (addr->u.un->addr.sun_path)));
  311. #if defined(FREEBSD) || defined(__APPLE__)
  312. addr->u.un->addr.sun_len = SUN_LEN (&addr->u.un->addr);
  313. #endif
  314. return TRUE;
  315. }
  316. /* Skip for remote */
  317. cur_tok = &tokens[1];
  318. #ifdef _SC_GETPW_R_SIZE_MAX
  319. pwlen = sysconf (_SC_GETPW_R_SIZE_MAX);
  320. if (pwlen <= 0) {
  321. pwlen = 8192;
  322. }
  323. #else
  324. pwlen = 8192;
  325. #endif
  326. pwbuf = g_malloc0 (pwlen);
  327. while (*cur_tok) {
  328. if (g_ascii_strncasecmp (*cur_tok, "mode=", sizeof ("mode=") - 1) == 0) {
  329. p = strchr (*cur_tok, '=');
  330. /* XXX: add error check */
  331. addr->u.un->mode = strtoul (p + 1, NULL, 0);
  332. if (addr->u.un->mode == 0) {
  333. msg_err ("bad mode: %s", p + 1);
  334. errno = EINVAL;
  335. goto err;
  336. }
  337. }
  338. else if (g_ascii_strncasecmp (*cur_tok, "owner=",
  339. sizeof ("owner=") - 1) == 0) {
  340. p = strchr (*cur_tok, '=');
  341. if (getpwnam_r (p + 1, &pw, pwbuf, pwlen, &ppw) != 0 || ppw == NULL) {
  342. msg_err ("bad user: %s", p + 1);
  343. if (ppw == NULL) {
  344. errno = ENOENT;
  345. }
  346. goto err;
  347. }
  348. addr->u.un->owner = pw.pw_uid;
  349. if (!has_group) {
  350. addr->u.un->group = pw.pw_gid;
  351. }
  352. }
  353. else if (g_ascii_strncasecmp (*cur_tok, "group=",
  354. sizeof ("group=") - 1) == 0) {
  355. p = strchr (*cur_tok, '=');
  356. if (getgrnam_r (p + 1, &gr, pwbuf, pwlen, &pgr) != 0 || pgr == NULL) {
  357. msg_err ("bad group: %s", p + 1);
  358. if (pgr == NULL) {
  359. errno = ENOENT;
  360. }
  361. goto err;
  362. }
  363. has_group = true;
  364. addr->u.un->group = gr.gr_gid;
  365. }
  366. cur_tok ++;
  367. }
  368. g_free (pwbuf);
  369. g_strfreev (tokens);
  370. if (target) {
  371. rspamd_ip_validate_af (addr);
  372. *target = addr;
  373. }
  374. else {
  375. rspamd_inet_address_free (addr);
  376. }
  377. return TRUE;
  378. err:
  379. g_strfreev (tokens);
  380. g_free (pwbuf);
  381. if (!pool) {
  382. rspamd_inet_address_free (addr);
  383. }
  384. return FALSE;
  385. }
  386. gboolean
  387. rspamd_parse_inet_address_ip4 (const guchar *text, gsize len, gpointer target)
  388. {
  389. const guchar *p;
  390. guchar c;
  391. guint32 addr = 0, *addrptr = target;
  392. guint octet = 0, n = 0;
  393. g_assert (text != NULL);
  394. g_assert (target != NULL);
  395. if (len == 0) {
  396. len = strlen (text);
  397. }
  398. for (p = text; p < text + len; p++) {
  399. c = *p;
  400. if (c >= '0' && c <= '9') {
  401. octet = octet * 10 + (c - '0');
  402. if (octet > 255) {
  403. return FALSE;
  404. }
  405. continue;
  406. }
  407. if (c == '.') {
  408. addr = (addr << 8) + octet;
  409. octet = 0;
  410. n++;
  411. continue;
  412. }
  413. return FALSE;
  414. }
  415. if (n == 3) {
  416. addr = (addr << 8) + octet;
  417. *addrptr = ntohl (addr);
  418. return TRUE;
  419. }
  420. return FALSE;
  421. }
  422. gboolean
  423. rspamd_parse_inet_address_ip6 (const guchar *text, gsize len, gpointer target)
  424. {
  425. guchar t, *zero = NULL, *s, *d, *addr = target;
  426. const guchar *p, *digit = NULL, *percent;
  427. gsize len4 = 0;
  428. guint n = 8, nibbles = 0, word = 0;
  429. g_assert (text != NULL);
  430. g_assert (target != NULL);
  431. p = text;
  432. if (len == 0) {
  433. len = strlen (text);
  434. }
  435. /* Check IPv6 scope */
  436. if ((percent = memchr (p, '%', len)) != NULL && percent > p) {
  437. len = percent - p; /* Ignore scope */
  438. }
  439. if (len > sizeof ("IPv6:") - 1 &&
  440. g_ascii_strncasecmp (p, "IPv6:", sizeof ("IPv6:") - 1) == 0) {
  441. /* Special case, SMTP conformant IPv6 address */
  442. p += sizeof ("IPv6:") - 1;
  443. len -= sizeof ("IPv6:") - 1;
  444. }
  445. if (*p == '[' && len > 1 && p[len - 1] == ']') {
  446. /* Strip [] as well */
  447. p ++;
  448. len -= 2;
  449. }
  450. /* Ignore leading colon */
  451. if (len > 0 && *p == ':') {
  452. p++;
  453. len--;
  454. }
  455. for (/* void */; len; len--) {
  456. t = *p++;
  457. if (t == ':') {
  458. if (nibbles) {
  459. digit = p;
  460. len4 = len;
  461. *addr++ = (u_char) (word >> 8);
  462. *addr++ = (u_char) (word & 0xff);
  463. if (--n) {
  464. nibbles = 0;
  465. word = 0;
  466. continue;
  467. }
  468. } else {
  469. if (zero == NULL) {
  470. digit = p;
  471. len4 = len;
  472. zero = addr;
  473. continue;
  474. }
  475. }
  476. return FALSE;
  477. }
  478. if (t == '.' && nibbles) {
  479. if (n < 2 || digit == NULL) {
  480. return FALSE;
  481. }
  482. /* IPv4 encoded in IPv6 */
  483. if (!rspamd_parse_inet_address_ip4 (digit, len4 - 1, &word)) {
  484. return FALSE;
  485. }
  486. word = ntohl (word);
  487. *addr++ = (guchar) ((word >> 24) & 0xff);
  488. *addr++ = (guchar) ((word >> 16) & 0xff);
  489. n--;
  490. break;
  491. }
  492. if (++nibbles > 4) {
  493. /* Too many digits */
  494. return FALSE;
  495. }
  496. /* Restore from hex */
  497. if (t >= '0' && t <= '9') {
  498. word = word * 16 + (t - '0');
  499. continue;
  500. }
  501. t |= 0x20;
  502. if (t >= 'a' && t <= 'f') {
  503. word = word * 16 + (t - 'a') + 10;
  504. continue;
  505. }
  506. return FALSE;
  507. }
  508. if (nibbles == 0 && zero == NULL) {
  509. return FALSE;
  510. }
  511. *addr++ = (guchar) (word >> 8);
  512. *addr++ = (guchar) (word & 0xff);
  513. if (--n) {
  514. if (zero) {
  515. n *= 2;
  516. s = addr - 1;
  517. d = s + n;
  518. while (s >= zero) {
  519. *d-- = *s--;
  520. }
  521. memset (zero, 0, n);
  522. return TRUE;
  523. }
  524. } else {
  525. if (zero == NULL) {
  526. return TRUE;
  527. }
  528. }
  529. return FALSE;
  530. }
  531. /* Checks for ipv6 mapped address */
  532. static rspamd_inet_addr_t *
  533. rspamd_inet_address_v6_maybe_map (const struct sockaddr_in6 *sin6,
  534. rspamd_mempool_t *pool)
  535. {
  536. rspamd_inet_addr_t *addr = NULL;
  537. /* 10 zero bytes or 80 bits */
  538. static const guint8 mask[] = {
  539. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  540. };
  541. const guint8 *p;
  542. if (memcmp ((const guint8 *)&sin6->sin6_addr, mask, sizeof (mask)) == 0) {
  543. p = (const guint8 *)&sin6->sin6_addr;
  544. if ((p[10] == 0xff && p[11] == 0xff)) {
  545. addr = rspamd_inet_addr_create (AF_INET, pool);
  546. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  547. sizeof (struct in_addr));
  548. }
  549. else {
  550. /* Something strange but not mapped v4 address */
  551. addr = rspamd_inet_addr_create (AF_INET6, pool);
  552. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  553. sizeof (struct in6_addr));
  554. }
  555. }
  556. else {
  557. addr = rspamd_inet_addr_create (AF_INET6, pool);
  558. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  559. sizeof (struct in6_addr));
  560. }
  561. return addr;
  562. }
  563. static void
  564. rspamd_inet_address_v6_maybe_map_static (const struct sockaddr_in6 *sin6,
  565. rspamd_inet_addr_t *addr)
  566. {
  567. /* 10 zero bytes or 80 bits */
  568. static const guint8 mask[] = {
  569. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  570. };
  571. const guint8 *p;
  572. if (memcmp ((const guint8 *)&sin6->sin6_addr, mask, sizeof (mask)) == 0) {
  573. p = (const guint8 *)&sin6->sin6_addr;
  574. if ((p[10] == 0xff && p[11] == 0xff)) {
  575. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  576. sizeof (struct in_addr));
  577. addr->af = AF_INET;
  578. addr->slen = sizeof (addr->u.in.addr.s4);
  579. }
  580. else {
  581. /* Something strange but not mapped v4 address */
  582. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  583. sizeof (struct in6_addr));
  584. addr->af = AF_INET6;
  585. addr->slen = sizeof (addr->u.in.addr.s6);
  586. }
  587. }
  588. else {
  589. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  590. sizeof (struct in6_addr));
  591. addr->af = AF_INET6;
  592. addr->slen = sizeof (addr->u.in.addr.s6);
  593. }
  594. }
  595. static gboolean
  596. rspamd_parse_inet_address_common (rspamd_inet_addr_t **target,
  597. const char *src,
  598. gsize srclen,
  599. rspamd_mempool_t *pool,
  600. enum rspamd_inet_address_parse_flags how)
  601. {
  602. gboolean ret = FALSE;
  603. rspamd_inet_addr_t *addr = NULL;
  604. union sa_inet su;
  605. const char *end = NULL;
  606. char ipbuf[INET6_ADDRSTRLEN + 1];
  607. guint iplen;
  608. gulong portnum;
  609. if (srclen == 0) {
  610. return FALSE;
  611. }
  612. g_assert (src != NULL);
  613. g_assert (target != NULL);
  614. rspamd_ip_check_ipv6 ();
  615. if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_UNIX) &&
  616. (src[0] == '/' || src[0] == '.')) {
  617. return rspamd_parse_unix_path (target, src, srclen, pool, how);
  618. }
  619. if (src[0] == '[') {
  620. const gchar *ip_start;
  621. /* Ipv6 address in format [::1]:port or just [::1] */
  622. end = memchr (src + 1, ']', srclen - 1);
  623. if (end == NULL) {
  624. return FALSE;
  625. }
  626. iplen = end - src - 1;
  627. if (iplen == 0 || iplen >= sizeof (ipbuf)) {
  628. return FALSE;
  629. }
  630. ip_start = src + 1;
  631. rspamd_strlcpy (ipbuf, ip_start, iplen + 1);
  632. if (rspamd_parse_inet_address_ip6 (ipbuf, iplen,
  633. &su.s6.sin6_addr)) {
  634. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  635. ret = TRUE;
  636. }
  637. if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_PORT) && ret && end[1] == ':') {
  638. /* Port part */
  639. rspamd_strtoul (end + 1, srclen - iplen - 3, &portnum);
  640. rspamd_inet_address_set_port (addr, portnum);
  641. }
  642. }
  643. else {
  644. if (!(how & RSPAMD_INET_ADDRESS_PARSE_NO_PORT) &&
  645. (end = memchr (src, ':', srclen)) != NULL) {
  646. /* This is either port number and ipv4 addr or ipv6 addr */
  647. /* Search for another semicolon */
  648. if (memchr (end + 1, ':', srclen - (end - src + 1)) &&
  649. rspamd_parse_inet_address_ip6 (src, srclen,
  650. &su.s6.sin6_addr)) {
  651. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  652. ret = TRUE;
  653. }
  654. else {
  655. /* Not ipv6, so try ip:port */
  656. iplen = end - src;
  657. if (iplen >= sizeof (ipbuf) || iplen <= 1) {
  658. return FALSE;
  659. }
  660. else {
  661. rspamd_strlcpy (ipbuf, src, iplen + 1);
  662. }
  663. if (rspamd_parse_inet_address_ip4 (ipbuf, iplen,
  664. &su.s4.sin_addr)) {
  665. addr = rspamd_inet_addr_create (AF_INET, pool);
  666. memcpy (&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  667. sizeof (struct in_addr));
  668. rspamd_strtoul (end + 1, srclen - iplen - 1, &portnum);
  669. rspamd_inet_address_set_port (addr, portnum);
  670. ret = TRUE;
  671. }
  672. }
  673. }
  674. else {
  675. if (rspamd_parse_inet_address_ip4 (src, srclen, &su.s4.sin_addr)) {
  676. addr = rspamd_inet_addr_create (AF_INET, pool);
  677. memcpy (&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  678. sizeof (struct in_addr));
  679. ret = TRUE;
  680. }
  681. else if (rspamd_parse_inet_address_ip6 (src, srclen, &su.s6.sin6_addr)) {
  682. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  683. ret = TRUE;
  684. }
  685. }
  686. }
  687. if (ret && target) {
  688. *target = addr;
  689. }
  690. return ret;
  691. }
  692. gboolean
  693. rspamd_parse_inet_address (rspamd_inet_addr_t **target,
  694. const char *src,
  695. gsize srclen,
  696. enum rspamd_inet_address_parse_flags how)
  697. {
  698. return rspamd_parse_inet_address_common (target, src, srclen, NULL, how);
  699. }
  700. rspamd_inet_addr_t *
  701. rspamd_parse_inet_address_pool (const char *src,
  702. gsize srclen,
  703. rspamd_mempool_t *pool,
  704. enum rspamd_inet_address_parse_flags how)
  705. {
  706. rspamd_inet_addr_t *ret = NULL;
  707. if (!rspamd_parse_inet_address_common (&ret, src, srclen, pool, how)) {
  708. return NULL;
  709. }
  710. return ret;
  711. }
  712. gboolean
  713. rspamd_parse_inet_address_ip (const char *src, gsize srclen,
  714. rspamd_inet_addr_t *target)
  715. {
  716. const char *end;
  717. char ipbuf[INET6_ADDRSTRLEN + 1];
  718. guint iplen;
  719. gulong portnum;
  720. gboolean ret = FALSE;
  721. union sa_inet su;
  722. g_assert (target != NULL);
  723. g_assert (src != NULL);
  724. if (src[0] == '[') {
  725. /* Ipv6 address in format [::1]:port or just [::1] */
  726. end = memchr (src + 1, ']', srclen - 1);
  727. if (end == NULL) {
  728. return FALSE;
  729. }
  730. iplen = end - src - 1;
  731. if (iplen == 0 || iplen >= sizeof (ipbuf)) {
  732. return FALSE;
  733. }
  734. rspamd_strlcpy (ipbuf, src + 1, iplen + 1);
  735. if (rspamd_parse_inet_address_ip6 (ipbuf, iplen,
  736. &su.s6.sin6_addr)) {
  737. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  738. ret = TRUE;
  739. }
  740. if (ret && end[1] == ':') {
  741. /* Port part */
  742. rspamd_strtoul (end + 1, srclen - iplen - 3, &portnum);
  743. rspamd_inet_address_set_port (target, portnum);
  744. }
  745. }
  746. else {
  747. if ((end = memchr (src, ':', srclen)) != NULL) {
  748. /* This is either port number and ipv4 addr or ipv6 addr */
  749. /* Search for another semicolon */
  750. if (memchr (end + 1, ':', srclen - (end - src + 1)) &&
  751. rspamd_parse_inet_address_ip6 (src, srclen, &su.s6.sin6_addr)) {
  752. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  753. ret = TRUE;
  754. }
  755. else {
  756. /* Not ipv6, so try ip:port */
  757. iplen = end - src;
  758. if (iplen >= sizeof (ipbuf) || iplen <= 1) {
  759. return FALSE;
  760. }
  761. else {
  762. rspamd_strlcpy (ipbuf, src, iplen + 1);
  763. }
  764. if (rspamd_parse_inet_address_ip4 (ipbuf, iplen,
  765. &su.s4.sin_addr)) {
  766. memcpy (&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  767. sizeof (struct in_addr));
  768. target->af = AF_INET;
  769. target->slen = sizeof (target->u.in.addr.s4);
  770. rspamd_strtoul (end + 1, srclen - iplen - 1, &portnum);
  771. rspamd_inet_address_set_port (target, portnum);
  772. ret = TRUE;
  773. }
  774. }
  775. }
  776. else {
  777. if (rspamd_parse_inet_address_ip4 (src, srclen, &su.s4.sin_addr)) {
  778. memcpy (&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  779. sizeof (struct in_addr));
  780. target->af = AF_INET;
  781. target->slen = sizeof (target->u.in.addr.s4);
  782. ret = TRUE;
  783. }
  784. else if (rspamd_parse_inet_address_ip6 (src, srclen,
  785. &su.s6.sin6_addr)) {
  786. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  787. ret = TRUE;
  788. }
  789. }
  790. }
  791. return ret;
  792. }
  793. const char *
  794. rspamd_inet_address_to_string (const rspamd_inet_addr_t *addr)
  795. {
  796. static char addr_str[INET6_ADDRSTRLEN + 1];
  797. if (addr == NULL) {
  798. return "<empty inet address>";
  799. }
  800. switch (addr->af) {
  801. case AF_INET:
  802. return inet_ntop (addr->af, &addr->u.in.addr.s4.sin_addr, addr_str,
  803. sizeof (addr_str));
  804. case AF_INET6:
  805. return inet_ntop (addr->af, &addr->u.in.addr.s6.sin6_addr, addr_str,
  806. sizeof (addr_str));
  807. case AF_UNIX:
  808. return addr->u.un->addr.sun_path;
  809. }
  810. return "undefined";
  811. }
  812. const char *
  813. rspamd_inet_address_to_string_pretty (const rspamd_inet_addr_t *addr)
  814. {
  815. static char addr_str[PATH_MAX + 5];
  816. if (addr == NULL) {
  817. return "<empty inet address>";
  818. }
  819. switch (addr->af) {
  820. case AF_INET:
  821. rspamd_snprintf (addr_str, sizeof (addr_str), "%s:%d",
  822. rspamd_inet_address_to_string (addr),
  823. rspamd_inet_address_get_port (addr));
  824. break;
  825. case AF_INET6:
  826. rspamd_snprintf (addr_str, sizeof (addr_str), "[%s]:%d",
  827. rspamd_inet_address_to_string (addr),
  828. rspamd_inet_address_get_port (addr));
  829. break;
  830. case AF_UNIX:
  831. rspamd_snprintf (addr_str, sizeof (addr_str), "unix:%s",
  832. rspamd_inet_address_to_string (addr));
  833. break;
  834. }
  835. return addr_str;
  836. }
  837. uint16_t
  838. rspamd_inet_address_get_port (const rspamd_inet_addr_t *addr)
  839. {
  840. switch (addr->af) {
  841. case AF_INET:
  842. return ntohs (addr->u.in.addr.s4.sin_port);
  843. case AF_INET6:
  844. return ntohs (addr->u.in.addr.s6.sin6_port);
  845. }
  846. return 0;
  847. }
  848. void
  849. rspamd_inet_address_set_port (rspamd_inet_addr_t *addr, uint16_t port)
  850. {
  851. switch (addr->af) {
  852. case AF_INET:
  853. addr->u.in.addr.s4.sin_port = htons (port);
  854. break;
  855. case AF_INET6:
  856. addr->u.in.addr.s6.sin6_port = htons (port);
  857. break;
  858. }
  859. }
  860. int
  861. rspamd_inet_address_connect (const rspamd_inet_addr_t *addr, gint type,
  862. gboolean async)
  863. {
  864. int fd, r;
  865. const struct sockaddr *sa;
  866. if (addr == NULL) {
  867. return -1;
  868. }
  869. fd = rspamd_socket_create (addr->af, type, 0, async);
  870. if (fd == -1) {
  871. return -1;
  872. }
  873. if (addr->af == AF_UNIX) {
  874. sa = (const struct sockaddr *)&addr->u.un->addr;
  875. }
  876. else {
  877. sa = &addr->u.in.addr.sa;
  878. }
  879. r = connect (fd, sa, addr->slen);
  880. if (r == -1) {
  881. if (!async || errno != EINPROGRESS) {
  882. close (fd);
  883. msg_info ("connect %s failed: %d, '%s'",
  884. rspamd_inet_address_to_string_pretty (addr),
  885. errno, strerror (errno));
  886. return -1;
  887. }
  888. }
  889. return fd;
  890. }
  891. int
  892. rspamd_inet_address_listen (const rspamd_inet_addr_t *addr, gint type,
  893. gboolean async)
  894. {
  895. gint fd, r;
  896. gint on = 1;
  897. const struct sockaddr *sa;
  898. const char *path;
  899. if (addr == NULL) {
  900. return -1;
  901. }
  902. fd = rspamd_socket_create (addr->af, type, 0, async);
  903. if (fd == -1) {
  904. return -1;
  905. }
  906. if (addr->af == AF_UNIX && access (addr->u.un->addr.sun_path, W_OK) != -1) {
  907. /* Unlink old socket */
  908. (void)unlink (addr->u.un->addr.sun_path);
  909. }
  910. if (addr->af == AF_UNIX) {
  911. sa = (const struct sockaddr *)&addr->u.un->addr;
  912. }
  913. else {
  914. sa = &addr->u.in.addr.sa;
  915. }
  916. (void)setsockopt (fd, SOL_SOCKET, SO_REUSEADDR, (const void *)&on, sizeof (gint));
  917. #ifdef HAVE_IPV6_V6ONLY
  918. if (addr->af == AF_INET6) {
  919. /* We need to set this flag to avoid errors */
  920. on = 1;
  921. #ifdef SOL_IPV6
  922. (void)setsockopt (fd, SOL_IPV6, IPV6_V6ONLY, (const void *)&on, sizeof (gint));
  923. #elif defined(IPPROTO_IPV6)
  924. (void)setsockopt (fd, IPPROTO_IPV6, IPV6_V6ONLY, (const void *)&on, sizeof (gint));
  925. #endif
  926. }
  927. #endif
  928. r = bind (fd, sa, addr->slen);
  929. if (r == -1) {
  930. if (!async || errno != EINPROGRESS) {
  931. close (fd);
  932. msg_warn ("bind %s failed: %d, '%s'",
  933. rspamd_inet_address_to_string_pretty (addr),
  934. errno,
  935. strerror (errno));
  936. return -1;
  937. }
  938. }
  939. if (type != (int)SOCK_DGRAM) {
  940. if (addr->af == AF_UNIX) {
  941. path = addr->u.un->addr.sun_path;
  942. /* Try to set mode and owner */
  943. if (addr->u.un->owner != (uid_t)-1 || addr->u.un->group != (gid_t)-1) {
  944. if (chown (path, addr->u.un->owner, addr->u.un->group) == -1) {
  945. msg_info ("cannot change owner for %s to %d:%d: %s",
  946. path, addr->u.un->owner, addr->u.un->group,
  947. strerror (errno));
  948. }
  949. }
  950. if (chmod (path, addr->u.un->mode) == -1) {
  951. msg_info ("cannot change mode for %s to %od %s",
  952. path, addr->u.un->mode, strerror (errno));
  953. }
  954. }
  955. r = listen (fd, -1);
  956. if (r == -1) {
  957. msg_warn ("listen %s failed: %d, '%s'",
  958. rspamd_inet_address_to_string_pretty (addr),
  959. errno, strerror (errno));
  960. close (fd);
  961. return -1;
  962. }
  963. }
  964. return fd;
  965. }
  966. gssize
  967. rspamd_inet_address_recvfrom (gint fd, void *buf, gsize len, gint fl,
  968. rspamd_inet_addr_t **target)
  969. {
  970. gssize ret;
  971. union sa_union su;
  972. socklen_t slen = sizeof (su);
  973. rspamd_inet_addr_t *addr = NULL;
  974. if ((ret = recvfrom (fd, buf, len, fl, &su.sa, &slen)) == -1) {
  975. if (target) {
  976. *target = NULL;
  977. }
  978. return -1;
  979. }
  980. if (target) {
  981. addr = rspamd_inet_addr_create (su.sa.sa_family, NULL);
  982. addr->slen = slen;
  983. if (addr->af == AF_UNIX) {
  984. addr->u.un = g_malloc (sizeof (*addr->u.un));
  985. memcpy (&addr->u.un->addr, &su.su, sizeof (struct sockaddr_un));
  986. }
  987. else {
  988. memcpy (&addr->u.in.addr, &su.sa, MIN (slen, sizeof (addr->u.in.addr)));
  989. }
  990. *target = addr;
  991. }
  992. return (ret);
  993. }
  994. gssize
  995. rspamd_inet_address_sendto (gint fd, const void *buf, gsize len, gint fl,
  996. const rspamd_inet_addr_t *addr)
  997. {
  998. gssize r;
  999. const struct sockaddr *sa;
  1000. if (addr == NULL) {
  1001. return -1;
  1002. }
  1003. if (addr->af == AF_UNIX) {
  1004. sa = (struct sockaddr *)&addr->u.un->addr;
  1005. }
  1006. else {
  1007. sa = &addr->u.in.addr.sa;
  1008. }
  1009. r = sendto (fd, buf, len, fl, sa, addr->slen);
  1010. return r;
  1011. }
  1012. static gboolean
  1013. rspamd_check_port_priority (const char *line, guint default_port,
  1014. guint *priority, gchar *out,
  1015. gsize outlen, rspamd_mempool_t *pool)
  1016. {
  1017. guint real_port = default_port, real_priority = 0;
  1018. gchar *err_str, *err_str_prio;
  1019. if (line && line[0] == ':') {
  1020. errno = 0;
  1021. real_port = strtoul (line + 1, &err_str, 10);
  1022. if (err_str && *err_str == ':') {
  1023. /* We have priority */
  1024. real_priority = strtoul (err_str + 1, &err_str_prio, 10);
  1025. if (err_str_prio && *err_str_prio != '\0') {
  1026. msg_err_pool_check (
  1027. "cannot parse priority: %s, at symbol %c, error: %s",
  1028. line,
  1029. *err_str_prio,
  1030. strerror (errno));
  1031. return FALSE;
  1032. }
  1033. }
  1034. else if (err_str && *err_str != '\0') {
  1035. msg_err_pool_check (
  1036. "cannot parse port: %s, at symbol %c, error: %s",
  1037. line,
  1038. *err_str,
  1039. strerror (errno));
  1040. return FALSE;
  1041. }
  1042. }
  1043. if (priority) {
  1044. *priority = real_priority;
  1045. }
  1046. rspamd_snprintf (out, outlen, "%ud", real_port);
  1047. return TRUE;
  1048. }
  1049. static enum rspamd_parse_host_port_result
  1050. rspamd_resolve_addrs (const char *begin, size_t len, GPtrArray **addrs,
  1051. const gchar *portbuf, gint flags,
  1052. rspamd_mempool_t *pool)
  1053. {
  1054. struct addrinfo hints, *res, *cur;
  1055. rspamd_inet_addr_t *cur_addr = NULL;
  1056. gint r, addr_cnt;
  1057. gchar *addr_cpy = NULL;
  1058. enum rspamd_parse_host_port_result ret = RSPAMD_PARSE_ADDR_FAIL;
  1059. rspamd_ip_check_ipv6 ();
  1060. if (rspamd_parse_inet_address (&cur_addr,
  1061. begin, len, RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  1062. if (*addrs == NULL) {
  1063. *addrs = g_ptr_array_new_full (1,
  1064. (GDestroyNotify) rspamd_inet_address_free);
  1065. if (pool != NULL) {
  1066. rspamd_mempool_add_destructor (pool,
  1067. rspamd_ptr_array_free_hard, *addrs);
  1068. }
  1069. }
  1070. rspamd_inet_address_set_port (cur_addr, strtoul (portbuf, NULL, 10));
  1071. g_ptr_array_add (*addrs, cur_addr);
  1072. ret = RSPAMD_PARSE_ADDR_NUMERIC;
  1073. }
  1074. else {
  1075. memset (&hints, 0, sizeof (hints));
  1076. hints.ai_socktype = SOCK_STREAM; /* Type of the socket */
  1077. hints.ai_flags = AI_NUMERICSERV|flags;
  1078. if (len > 0) {
  1079. if (pool) {
  1080. addr_cpy = rspamd_mempool_alloc (pool, len + 1);
  1081. }
  1082. else {
  1083. addr_cpy = g_malloc (len + 1);
  1084. }
  1085. rspamd_strlcpy (addr_cpy, begin, len + 1);
  1086. }
  1087. /* Otherwise it will be NULL */
  1088. if (ipv6_status == RSPAMD_IPV6_SUPPORTED) {
  1089. hints.ai_family = AF_UNSPEC;
  1090. }
  1091. else {
  1092. hints.ai_family = AF_INET;
  1093. }
  1094. if ((r = getaddrinfo (addr_cpy, portbuf, &hints, &res)) == 0) {
  1095. /* Now copy up to max_addrs of addresses */
  1096. addr_cnt = 0;
  1097. cur = res;
  1098. while (cur) {
  1099. cur = cur->ai_next;
  1100. addr_cnt ++;
  1101. }
  1102. if (*addrs == NULL) {
  1103. *addrs = g_ptr_array_new_full (addr_cnt,
  1104. (GDestroyNotify) rspamd_inet_address_free);
  1105. if (pool != NULL) {
  1106. rspamd_mempool_add_destructor (pool,
  1107. rspamd_ptr_array_free_hard, *addrs);
  1108. }
  1109. }
  1110. cur = res;
  1111. while (cur) {
  1112. cur_addr = rspamd_inet_address_from_sa (cur->ai_addr,
  1113. cur->ai_addrlen);
  1114. if (cur_addr != NULL) {
  1115. g_ptr_array_add (*addrs, cur_addr);
  1116. }
  1117. cur = cur->ai_next;
  1118. }
  1119. freeaddrinfo (res);
  1120. ret = RSPAMD_PARSE_ADDR_RESOLVED;
  1121. }
  1122. else if (addr_cpy) {
  1123. msg_err_pool_check ("address resolution for %s failed: %s",
  1124. addr_cpy,
  1125. gai_strerror (r));
  1126. if (pool == NULL) {
  1127. g_free (addr_cpy);
  1128. }
  1129. return RSPAMD_PARSE_ADDR_FAIL;
  1130. }
  1131. else {
  1132. /* Should never ever happen */
  1133. g_assert (0);
  1134. }
  1135. }
  1136. return ret;
  1137. }
  1138. enum rspamd_parse_host_port_result
  1139. rspamd_parse_host_port_priority (const gchar *str,
  1140. GPtrArray **addrs,
  1141. guint *priority,
  1142. gchar **name_ptr,
  1143. guint default_port,
  1144. rspamd_mempool_t *pool)
  1145. {
  1146. gchar portbuf[8];
  1147. const gchar *p, *name = NULL;
  1148. gsize namelen;
  1149. rspamd_inet_addr_t *cur_addr = NULL;
  1150. enum rspamd_parse_host_port_result ret = RSPAMD_PARSE_ADDR_FAIL;
  1151. /*
  1152. * In this function, we can have several possibilities:
  1153. * 1) Unix socket: check for '.' or '/' at the begin of string
  1154. * 2) \[ipv6\]: check for '[' at the beginning
  1155. * 3) '*': means listening on any address
  1156. * 4) ip|host[:port[:priority]]
  1157. */
  1158. if (str[0] == '*') {
  1159. if (!rspamd_check_port_priority (str + 1, default_port, priority,
  1160. portbuf, sizeof (portbuf), pool)) {
  1161. return ret;
  1162. }
  1163. if (rspamd_resolve_addrs (str, 0, addrs, portbuf, AI_PASSIVE, pool)
  1164. == RSPAMD_PARSE_ADDR_FAIL) {
  1165. return ret;
  1166. }
  1167. name = "*";
  1168. namelen = 1;
  1169. ret = RSPAMD_PARSE_ADDR_NUMERIC; /* No resolution here */
  1170. }
  1171. else if (str[0] == '[') {
  1172. /* This is braced IPv6 address */
  1173. p = strchr (str, ']');
  1174. if (p == NULL) {
  1175. msg_err_pool_check ("cannot parse address definition %s: %s",
  1176. str,
  1177. strerror (EINVAL));
  1178. return ret;
  1179. }
  1180. name = str + 1;
  1181. namelen = p - str - 1;
  1182. if (!rspamd_check_port_priority (p + 1, default_port, priority, portbuf,
  1183. sizeof (portbuf), pool)) {
  1184. return ret;
  1185. }
  1186. ret = rspamd_resolve_addrs (name, namelen, addrs, portbuf, 0, pool);
  1187. }
  1188. else if (str[0] == '/' || str[0] == '.') {
  1189. /* Special case of unix socket, as getaddrinfo cannot deal with them */
  1190. if (*addrs == NULL) {
  1191. *addrs = g_ptr_array_new_full (1,
  1192. (GDestroyNotify) rspamd_inet_address_free);
  1193. if (pool != NULL) {
  1194. rspamd_mempool_add_destructor (pool,
  1195. rspamd_ptr_array_free_hard, *addrs);
  1196. }
  1197. }
  1198. if (!rspamd_parse_inet_address (&cur_addr,
  1199. str, strlen (str), RSPAMD_INET_ADDRESS_PARSE_DEFAULT)) {
  1200. msg_err_pool_check ("cannot parse unix socket definition %s: %s",
  1201. str,
  1202. strerror (errno));
  1203. return ret;
  1204. }
  1205. g_ptr_array_add (*addrs, cur_addr);
  1206. name = str;
  1207. namelen = strlen (str);
  1208. ret = RSPAMD_PARSE_ADDR_NUMERIC; /* No resolution here: unix socket */
  1209. }
  1210. else {
  1211. p = strchr (str, ':');
  1212. if (p == NULL) {
  1213. /* Just address or IP */
  1214. name = str;
  1215. namelen = strlen (str);
  1216. rspamd_check_port_priority ("", default_port, priority, portbuf,
  1217. sizeof (portbuf), pool);
  1218. ret = rspamd_resolve_addrs (name, namelen, addrs,
  1219. portbuf, 0, pool);
  1220. }
  1221. else {
  1222. const gchar *second_semicolon = strchr (p + 1, ':');
  1223. name = str;
  1224. if (second_semicolon) {
  1225. /* name + port part excluding priority */
  1226. namelen = second_semicolon - str;
  1227. }
  1228. else {
  1229. /* Full ip/name + port */
  1230. namelen = strlen (str);
  1231. }
  1232. if (!rspamd_check_port_priority (p, default_port, priority, portbuf,
  1233. sizeof (portbuf), pool)) {
  1234. return ret;
  1235. }
  1236. ret = rspamd_resolve_addrs (str, p - str, addrs,
  1237. portbuf, 0, pool);
  1238. }
  1239. }
  1240. if (name_ptr != NULL) {
  1241. if (pool) {
  1242. *name_ptr = rspamd_mempool_alloc (pool, namelen + 1);
  1243. }
  1244. else {
  1245. *name_ptr = g_malloc (namelen + 1);
  1246. }
  1247. rspamd_strlcpy (*name_ptr, name, namelen + 1);
  1248. }
  1249. return ret;
  1250. }
  1251. guchar*
  1252. rspamd_inet_address_get_hash_key (const rspamd_inet_addr_t *addr, guint *klen)
  1253. {
  1254. guchar *res = NULL;
  1255. static struct in_addr local = {INADDR_LOOPBACK};
  1256. g_assert (addr != NULL);
  1257. g_assert (klen != NULL);
  1258. if (addr->af == AF_INET) {
  1259. *klen = sizeof (struct in_addr);
  1260. res = (guchar *)&addr->u.in.addr.s4.sin_addr;
  1261. }
  1262. else if (addr->af == AF_INET6) {
  1263. *klen = sizeof (struct in6_addr);
  1264. res = (guchar *)&addr->u.in.addr.s6.sin6_addr;
  1265. }
  1266. else if (addr->af == AF_UNIX) {
  1267. *klen = sizeof (struct in_addr);
  1268. res = (guchar *)&local;
  1269. }
  1270. else {
  1271. *klen = 0;
  1272. res = NULL;
  1273. }
  1274. return res;
  1275. }
  1276. rspamd_inet_addr_t *
  1277. rspamd_inet_address_new (int af, const void *init)
  1278. {
  1279. rspamd_inet_addr_t *addr;
  1280. addr = rspamd_inet_addr_create (af, NULL);
  1281. if (init != NULL) {
  1282. if (af == AF_UNIX) {
  1283. /* Init is a path */
  1284. rspamd_strlcpy (addr->u.un->addr.sun_path, init,
  1285. sizeof (addr->u.un->addr.sun_path));
  1286. #if defined(FREEBSD) || defined(__APPLE__)
  1287. addr->u.un->addr.sun_len = SUN_LEN (&addr->u.un->addr);
  1288. #endif
  1289. }
  1290. else if (af == AF_INET) {
  1291. memcpy (&addr->u.in.addr.s4.sin_addr, init, sizeof (struct in_addr));
  1292. }
  1293. else if (af == AF_INET6) {
  1294. memcpy (&addr->u.in.addr.s6.sin6_addr, init, sizeof (struct in6_addr));
  1295. }
  1296. }
  1297. return addr;
  1298. }
  1299. rspamd_inet_addr_t *
  1300. rspamd_inet_address_from_sa (const struct sockaddr *sa, socklen_t slen)
  1301. {
  1302. rspamd_inet_addr_t *addr;
  1303. g_assert (sa != NULL);
  1304. g_assert (slen >= sizeof (struct sockaddr));
  1305. addr = rspamd_inet_addr_create (sa->sa_family, NULL);
  1306. if (sa->sa_family == AF_UNIX) {
  1307. /* Init is a path */
  1308. const struct sockaddr_un *un = (const struct sockaddr_un *)sa;
  1309. g_assert (slen >= SUN_LEN (un));
  1310. rspamd_strlcpy (addr->u.un->addr.sun_path, un->sun_path,
  1311. sizeof (addr->u.un->addr.sun_path));
  1312. #if defined(FREEBSD) || defined(__APPLE__)
  1313. addr->u.un->addr.sun_len = un->sun_len;
  1314. #endif
  1315. }
  1316. else if (sa->sa_family == AF_INET) {
  1317. g_assert (slen >= sizeof (struct sockaddr_in));
  1318. memcpy (&addr->u.in.addr.s4, sa, sizeof (struct sockaddr_in));
  1319. }
  1320. else if (sa->sa_family == AF_INET6) {
  1321. g_assert (slen >= sizeof (struct sockaddr_in6));
  1322. memcpy (&addr->u.in.addr.s6, sa, sizeof (struct sockaddr_in6));
  1323. }
  1324. else {
  1325. /* XXX: currently we cannot deal with other AF */
  1326. g_assert (0);
  1327. }
  1328. return addr;
  1329. }
  1330. rspamd_inet_addr_t *
  1331. rspamd_inet_address_from_rnds (const struct rdns_reply_entry *rep)
  1332. {
  1333. rspamd_inet_addr_t *addr = NULL;
  1334. g_assert (rep != NULL);
  1335. if (rep->type == RDNS_REQUEST_A) {
  1336. addr = rspamd_inet_addr_create (AF_INET, NULL);
  1337. memcpy (&addr->u.in.addr.s4.sin_addr, &rep->content.a.addr,
  1338. sizeof (struct in_addr));
  1339. }
  1340. else if (rep->type == RDNS_REQUEST_AAAA) {
  1341. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  1342. memcpy (&addr->u.in.addr.s6.sin6_addr, &rep->content.aaa.addr,
  1343. sizeof (struct in6_addr));
  1344. }
  1345. return addr;
  1346. }
  1347. void
  1348. rspamd_inet_address_apply_mask (rspamd_inet_addr_t *addr, guint mask)
  1349. {
  1350. guint32 umsk, *p;
  1351. if (mask > 0 && addr != NULL) {
  1352. if (addr->af == AF_INET && mask <= 32) {
  1353. umsk = htonl (G_MAXUINT32 << (32 - mask));
  1354. addr->u.in.addr.s4.sin_addr.s_addr &= umsk;
  1355. }
  1356. else if (addr->af == AF_INET6 && mask <= 128) {
  1357. p = (uint32_t *)&addr->u.in.addr.s6.sin6_addr;
  1358. mask = 128 - mask;
  1359. p += 3;
  1360. for (;;) {
  1361. if (mask >= 32) {
  1362. mask -= 32;
  1363. *p = 0;
  1364. }
  1365. else {
  1366. umsk = htonl (G_MAXUINT32 << mask);
  1367. *p &= umsk;
  1368. break;
  1369. }
  1370. p --;
  1371. }
  1372. }
  1373. }
  1374. }
  1375. static gint
  1376. rspamd_inet_address_af_order (const rspamd_inet_addr_t *addr)
  1377. {
  1378. int ret;
  1379. switch (addr->af) {
  1380. case AF_UNIX:
  1381. ret = 2;
  1382. break;
  1383. case AF_INET:
  1384. ret = 1;
  1385. break;
  1386. default:
  1387. ret = 0;
  1388. break;
  1389. }
  1390. return ret;
  1391. }
  1392. gint
  1393. rspamd_inet_address_compare (const rspamd_inet_addr_t *a1,
  1394. const rspamd_inet_addr_t *a2, gboolean compare_ports)
  1395. {
  1396. g_assert (a1 != NULL);
  1397. g_assert (a2 != NULL);
  1398. if (a1->af != a2->af) {
  1399. return (rspamd_inet_address_af_order (a2) -
  1400. rspamd_inet_address_af_order (a1));
  1401. }
  1402. else {
  1403. switch (a1->af) {
  1404. case AF_INET:
  1405. if (!compare_ports) {
  1406. return memcmp (&a1->u.in.addr.s4.sin_addr,
  1407. &a2->u.in.addr.s4.sin_addr, sizeof (struct in_addr));
  1408. }
  1409. else {
  1410. if (a1->u.in.addr.s4.sin_port == a2->u.in.addr.s4.sin_port) {
  1411. return memcmp (&a1->u.in.addr.s4.sin_addr,
  1412. &a2->u.in.addr.s4.sin_addr, sizeof (struct in_addr));
  1413. }
  1414. else {
  1415. return a1->u.in.addr.s4.sin_port - a2->u.in.addr.s4.sin_port;
  1416. }
  1417. }
  1418. case AF_INET6:
  1419. if (!compare_ports) {
  1420. return memcmp (&a1->u.in.addr.s6.sin6_addr,
  1421. &a2->u.in.addr.s6.sin6_addr, sizeof (struct in6_addr));
  1422. }
  1423. else {
  1424. if (a1->u.in.addr.s6.sin6_port == a2->u.in.addr.s6.sin6_port) {
  1425. return memcmp (&a1->u.in.addr.s6.sin6_addr,
  1426. &a2->u.in.addr.s6.sin6_addr, sizeof (struct in6_addr));
  1427. }
  1428. else {
  1429. return a1->u.in.addr.s6.sin6_port - a2->u.in.addr.s6.sin6_port;
  1430. }
  1431. }
  1432. case AF_UNIX:
  1433. return strncmp (a1->u.un->addr.sun_path,
  1434. a2->u.un->addr.sun_path, sizeof (a1->u.un->addr.sun_path));
  1435. default:
  1436. return memcmp (&a1->u.in, &a2->u.in, sizeof (a1->u.in));
  1437. }
  1438. }
  1439. return 0;
  1440. }
  1441. gint
  1442. rspamd_inet_address_compare_ptr (gconstpointer a1,
  1443. gconstpointer a2)
  1444. {
  1445. const rspamd_inet_addr_t **i1 = (const rspamd_inet_addr_t **)a1,
  1446. **i2 = (const rspamd_inet_addr_t **)a2;
  1447. return rspamd_inet_address_compare (*i1, *i2, FALSE);
  1448. }
  1449. rspamd_inet_addr_t *
  1450. rspamd_inet_address_copy (const rspamd_inet_addr_t *addr)
  1451. {
  1452. rspamd_inet_addr_t *n;
  1453. if (addr == NULL) {
  1454. return NULL;
  1455. }
  1456. n = rspamd_inet_addr_create (addr->af, NULL);
  1457. if (n->af == AF_UNIX) {
  1458. memcpy (n->u.un, addr->u.un, sizeof (*addr->u.un));
  1459. }
  1460. else {
  1461. memcpy (&n->u.in, &addr->u.in, sizeof (addr->u.in));
  1462. }
  1463. return n;
  1464. }
  1465. gint
  1466. rspamd_inet_address_get_af (const rspamd_inet_addr_t *addr)
  1467. {
  1468. g_assert (addr != NULL);
  1469. return addr->af;
  1470. }
  1471. struct sockaddr*
  1472. rspamd_inet_address_get_sa (const rspamd_inet_addr_t *addr,
  1473. socklen_t *sz)
  1474. {
  1475. g_assert (addr != NULL);
  1476. if (addr->af == AF_UNIX) {
  1477. *sz = addr->slen;
  1478. return (struct sockaddr *)&addr->u.un->addr;
  1479. }
  1480. else {
  1481. *sz = addr->slen;
  1482. return (struct sockaddr *)&addr->u.in.addr.sa;
  1483. }
  1484. }
  1485. guint
  1486. rspamd_inet_address_hash (gconstpointer a)
  1487. {
  1488. const rspamd_inet_addr_t *addr = a;
  1489. struct {
  1490. gchar buf[sizeof(struct in6_addr)]; /* 16 bytes */
  1491. int af;
  1492. } layout;
  1493. gint32 k;
  1494. if (addr->af == AF_UNIX && addr->u.un) {
  1495. rspamd_cryptobox_fast_hash_state_t st;
  1496. rspamd_cryptobox_fast_hash_init (&st, rspamd_hash_seed ());
  1497. rspamd_cryptobox_fast_hash_update (&st, &addr->af, sizeof (addr->af));
  1498. rspamd_cryptobox_fast_hash_update (&st, addr->u.un, sizeof (*addr->u.un));
  1499. return rspamd_cryptobox_fast_hash_final (&st);
  1500. }
  1501. else {
  1502. memset (&layout, 0, sizeof (layout));
  1503. layout.af = addr->af;
  1504. /* We ignore port part here */
  1505. if (addr->af == AF_INET) {
  1506. memcpy (layout.buf, &addr->u.in.addr.s4.sin_addr,
  1507. sizeof (addr->u.in.addr.s4.sin_addr));
  1508. }
  1509. else {
  1510. memcpy (layout.buf, &addr->u.in.addr.s6.sin6_addr,
  1511. sizeof (addr->u.in.addr.s6.sin6_addr));
  1512. }
  1513. k = rspamd_cryptobox_fast_hash (&layout, sizeof (layout),
  1514. rspamd_hash_seed ());
  1515. }
  1516. return k;
  1517. }
  1518. guint
  1519. rspamd_inet_address_port_hash (gconstpointer a)
  1520. {
  1521. const rspamd_inet_addr_t *addr = a;
  1522. struct {
  1523. gchar buf[sizeof(struct in6_addr)]; /* 16 bytes */
  1524. int port;
  1525. int af;
  1526. } layout;
  1527. gint32 k;
  1528. if (addr->af == AF_UNIX && addr->u.un) {
  1529. rspamd_cryptobox_fast_hash_state_t st;
  1530. rspamd_cryptobox_fast_hash_init (&st, rspamd_hash_seed ());
  1531. rspamd_cryptobox_fast_hash_update (&st, &addr->af, sizeof (addr->af));
  1532. rspamd_cryptobox_fast_hash_update (&st, addr->u.un, sizeof (*addr->u.un));
  1533. return rspamd_cryptobox_fast_hash_final (&st);
  1534. }
  1535. else {
  1536. memset (&layout, 0, sizeof (layout));
  1537. layout.af = addr->af;
  1538. /* We consider port part here */
  1539. if (addr->af == AF_INET) {
  1540. memcpy (layout.buf, &addr->u.in.addr.s4.sin_addr,
  1541. sizeof (addr->u.in.addr.s4.sin_addr));
  1542. layout.port = addr->u.in.addr.s4.sin_port;
  1543. }
  1544. else {
  1545. memcpy (layout.buf, &addr->u.in.addr.s6.sin6_addr,
  1546. sizeof (addr->u.in.addr.s6.sin6_addr));
  1547. layout.port = addr->u.in.addr.s6.sin6_port;
  1548. }
  1549. k = rspamd_cryptobox_fast_hash (&layout, sizeof (layout),
  1550. rspamd_hash_seed ());
  1551. }
  1552. return k;
  1553. }
  1554. gboolean
  1555. rspamd_inet_address_equal (gconstpointer a, gconstpointer b)
  1556. {
  1557. const rspamd_inet_addr_t *a1 = a, *a2 = b;
  1558. return rspamd_inet_address_compare (a1, a2, FALSE) == 0;
  1559. }
  1560. gboolean
  1561. rspamd_inet_address_port_equal (gconstpointer a, gconstpointer b)
  1562. {
  1563. const rspamd_inet_addr_t *a1 = a, *a2 = b;
  1564. return rspamd_inet_address_compare (a1, a2, TRUE) == 0;
  1565. }
  1566. #ifndef IN6_IS_ADDR_LOOPBACK
  1567. #define IN6_IS_ADDR_LOOPBACK(a) \
  1568. ((*(const __uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \
  1569. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \
  1570. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[8]) == 0) && \
  1571. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[12]) == ntohl(1)))
  1572. #endif
  1573. #ifndef IN6_IS_ADDR_LINKLOCAL
  1574. #define IN6_IS_ADDR_LINKLOCAL(a) \
  1575. (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0x80))
  1576. #endif
  1577. #ifndef IN6_IS_ADDR_SITELOCAL
  1578. #define IN6_IS_ADDR_SITELOCAL(a) \
  1579. (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0xc0))
  1580. #endif
  1581. gboolean
  1582. rspamd_inet_address_is_local (const rspamd_inet_addr_t *addr,
  1583. gboolean check_laddrs)
  1584. {
  1585. if (addr == NULL) {
  1586. return FALSE;
  1587. }
  1588. if (addr->af == AF_UNIX) {
  1589. /* Always true for unix sockets */
  1590. return TRUE;
  1591. }
  1592. else {
  1593. if (addr->af == AF_INET) {
  1594. if ((ntohl (addr->u.in.addr.s4.sin_addr.s_addr) & 0xff000000)
  1595. == 0x7f000000) {
  1596. return TRUE;
  1597. }
  1598. }
  1599. else if (addr->af == AF_INET6) {
  1600. if (IN6_IS_ADDR_LOOPBACK (&addr->u.in.addr.s6.sin6_addr) ||
  1601. IN6_IS_ADDR_LINKLOCAL (&addr->u.in.addr.s6.sin6_addr) ||
  1602. IN6_IS_ADDR_SITELOCAL (&addr->u.in.addr.s6.sin6_addr)) {
  1603. return TRUE;
  1604. }
  1605. }
  1606. if (check_laddrs && local_addrs) {
  1607. if (rspamd_match_radix_map_addr (local_addrs, addr) != NULL) {
  1608. return TRUE;
  1609. }
  1610. }
  1611. }
  1612. return FALSE;
  1613. }
  1614. struct rspamd_radix_map_helper **
  1615. rspamd_inet_library_init (void)
  1616. {
  1617. return &local_addrs;
  1618. }
  1619. void
  1620. rspamd_inet_library_destroy (void)
  1621. {
  1622. /* Ugly: local_addrs will actually be freed by config object */
  1623. }
  1624. gsize
  1625. rspamd_inet_address_storage_size (void)
  1626. {
  1627. return sizeof (rspamd_inet_addr_t);
  1628. }