You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

addr.c 39KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "addr.h"
  18. #include "util.h"
  19. #include "map_helpers.h"
  20. #include "logger.h"
  21. #include "cryptobox.h"
  22. #include "unix-std.h"
  23. /* pwd and grp */
  24. #ifdef HAVE_PWD_H
  25. #include <pwd.h>
  26. #endif
  27. #ifdef HAVE_GRP_H
  28. #include <grp.h>
  29. #endif
  30. static struct rspamd_radix_map_helper *local_addrs;
  31. enum {
  32. RSPAMD_IPV6_UNDEFINED = 0,
  33. RSPAMD_IPV6_SUPPORTED,
  34. RSPAMD_IPV6_UNSUPPORTED
  35. } ipv6_status = RSPAMD_IPV6_UNDEFINED;
  36. /**
  37. * Union that is used for storing sockaddrs
  38. */
  39. union sa_union {
  40. struct sockaddr sa;
  41. struct sockaddr_in s4;
  42. struct sockaddr_in6 s6;
  43. struct sockaddr_un su;
  44. struct sockaddr_storage ss;
  45. };
  46. union sa_inet {
  47. struct sockaddr sa;
  48. struct sockaddr_in s4;
  49. struct sockaddr_in6 s6;
  50. };
  51. struct rspamd_addr_unix {
  52. struct sockaddr_un addr;
  53. gint mode;
  54. uid_t owner;
  55. gid_t group;
  56. };
  57. struct rspamd_addr_inet {
  58. union sa_inet addr;
  59. };
  60. struct rspamd_inet_addr_s {
  61. union {
  62. struct rspamd_addr_inet in;
  63. struct rspamd_addr_unix *un;
  64. } u;
  65. gint af;
  66. socklen_t slen;
  67. };
  68. static void
  69. rspamd_ip_validate_af (rspamd_inet_addr_t *addr)
  70. {
  71. if (addr->af != AF_UNIX) {
  72. if (addr->u.in.addr.sa.sa_family != addr->af) {
  73. addr->u.in.addr.sa.sa_family = addr->af;
  74. }
  75. }
  76. else {
  77. addr->u.un->addr.sun_family = AF_UNIX;
  78. }
  79. if (addr->af == AF_INET) {
  80. addr->slen = sizeof (struct sockaddr_in);
  81. }
  82. else if (addr->af == AF_INET6) {
  83. addr->slen = sizeof (struct sockaddr_in6);
  84. }
  85. else if (addr->af == AF_UNIX) {
  86. #ifdef SUN_LEN
  87. addr->slen = SUN_LEN (&addr->u.un->addr);
  88. #else
  89. addr->slen = sizeof (addr->u.un->addr);
  90. #endif
  91. #if defined(FREEBSD) || defined(__APPLE__)
  92. addr->u.un->addr.sun_len = addr->slen;
  93. #endif
  94. }
  95. }
  96. #define RSPAMD_MAYBE_ALLOC_POOL(pool, sz) \
  97. (pool != NULL) ? rspamd_mempool_alloc((pool), (sz)) : g_malloc(sz)
  98. #define RSPAMD_MAYBE_ALLOC0_POOL(pool, sz) \
  99. (pool != NULL) ? rspamd_mempool_alloc0((pool), (sz)) : g_malloc0(sz)
  100. static rspamd_inet_addr_t *
  101. rspamd_inet_addr_create (gint af, rspamd_mempool_t *pool)
  102. {
  103. rspamd_inet_addr_t *addr;
  104. addr = RSPAMD_MAYBE_ALLOC0_POOL (pool, sizeof(*addr));
  105. addr->af = af;
  106. if (af == AF_UNIX) {
  107. addr->u.un = RSPAMD_MAYBE_ALLOC0_POOL(pool, sizeof (*addr->u.un));
  108. addr->slen = sizeof (addr->u.un->addr);
  109. }
  110. else {
  111. rspamd_ip_validate_af (addr);
  112. }
  113. return addr;
  114. }
  115. void
  116. rspamd_inet_address_free (rspamd_inet_addr_t *addr)
  117. {
  118. if (addr) {
  119. if (addr->af == AF_UNIX) {
  120. if (addr->u.un) {
  121. g_free (addr->u.un);
  122. }
  123. }
  124. g_free (addr);
  125. }
  126. }
  127. static void
  128. rspamd_ip_check_ipv6 (void)
  129. {
  130. if (ipv6_status == RSPAMD_IPV6_UNDEFINED) {
  131. gint s, r;
  132. struct sockaddr_in6 sin6;
  133. const struct in6_addr ip6_local = IN6ADDR_LOOPBACK_INIT;
  134. s = socket (AF_INET6, SOCK_STREAM, 0);
  135. if (s == -1) {
  136. ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
  137. }
  138. else {
  139. /*
  140. * Some systems allow ipv6 sockets creating but not binding,
  141. * so here we try to bind to some local address and check, whether it
  142. * is possible
  143. */
  144. memset (&sin6, 0, sizeof (sin6));
  145. sin6.sin6_family = AF_INET6;
  146. sin6.sin6_port = rspamd_random_uint64_fast () % 40000 + 20000;
  147. sin6.sin6_addr = ip6_local;
  148. r = bind (s, (struct sockaddr *)&sin6, sizeof (sin6));
  149. if (r == -1 && errno != EADDRINUSE) {
  150. ipv6_status = RSPAMD_IPV6_UNSUPPORTED;
  151. }
  152. else {
  153. ipv6_status = RSPAMD_IPV6_SUPPORTED;
  154. }
  155. close (s);
  156. }
  157. }
  158. }
  159. gboolean
  160. rspamd_ip_is_valid (const rspamd_inet_addr_t *addr)
  161. {
  162. const struct in_addr ip4_any = { INADDR_ANY }, ip4_none = { INADDR_NONE };
  163. const struct in6_addr ip6_any = IN6ADDR_ANY_INIT;
  164. gboolean ret = FALSE;
  165. if (G_LIKELY (addr->af == AF_INET)) {
  166. if (memcmp (&addr->u.in.addr.s4.sin_addr, &ip4_any,
  167. sizeof (struct in_addr)) != 0 &&
  168. memcmp (&addr->u.in.addr.s4.sin_addr, &ip4_none,
  169. sizeof (struct in_addr)) != 0) {
  170. ret = TRUE;
  171. }
  172. }
  173. else if (G_UNLIKELY (addr->af == AF_INET6)) {
  174. if (memcmp (&addr->u.in.addr.s6.sin6_addr, &ip6_any,
  175. sizeof (struct in6_addr)) != 0) {
  176. ret = TRUE;
  177. }
  178. }
  179. return ret;
  180. }
  181. static void
  182. rspamd_enable_accept_event (gint fd, short what, gpointer d)
  183. {
  184. struct event *events = d;
  185. event_del (&events[1]);
  186. event_add (&events[0], NULL);
  187. }
  188. static void
  189. rspamd_disable_accept_events (gint sock, GList *accept_events)
  190. {
  191. GList *cur;
  192. struct event *events;
  193. const gdouble throttling = 0.5;
  194. struct timeval tv;
  195. struct event_base *ev_base;
  196. double_to_tv (throttling, &tv);
  197. for (cur = accept_events; cur != NULL; cur = g_list_next (cur)) {
  198. events = cur->data;
  199. ev_base = event_get_base (&events[0]);
  200. event_del (&events[0]);
  201. event_set (&events[1], sock, EV_TIMEOUT, rspamd_enable_accept_event,
  202. events);
  203. event_base_set (ev_base, &events[1]);
  204. event_add (&events[1], &tv);
  205. }
  206. }
  207. gint
  208. rspamd_accept_from_socket (gint sock, rspamd_inet_addr_t **target,
  209. GList *accept_events)
  210. {
  211. gint nfd, serrno;
  212. union sa_union su;
  213. socklen_t len = sizeof (su);
  214. rspamd_inet_addr_t *addr = NULL;
  215. if ((nfd = accept (sock, &su.sa, &len)) == -1) {
  216. if (target) {
  217. *target = NULL;
  218. }
  219. if (errno == EAGAIN || errno == EINTR || errno == EWOULDBLOCK) {
  220. return 0;
  221. }
  222. else if (errno == EMFILE || errno == ENFILE) {
  223. /* Temporary disable accept event */
  224. rspamd_disable_accept_events (sock, accept_events);
  225. return 0;
  226. }
  227. return -1;
  228. }
  229. if (su.sa.sa_family == AF_INET6) {
  230. /* Deal with bloody v4 mapped to v6 addresses */
  231. static const guint8 mask[] = {
  232. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  233. };
  234. const guint8 *p;
  235. if (memcmp ((const guint8 *)&su.s6.sin6_addr, mask, sizeof (mask)) == 0) {
  236. p = (const guint8 *)&su.s6.sin6_addr;
  237. if ((p[10] == 0xff && p[11] == 0xff)) {
  238. addr = rspamd_inet_addr_create (AF_INET, NULL);
  239. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  240. sizeof (struct in_addr));
  241. }
  242. else {
  243. /* Something strange but not mapped v4 address */
  244. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  245. memcpy (&addr->u.in.addr.s6.sin6_addr, &su.s6.sin6_addr,
  246. sizeof (struct in6_addr));
  247. }
  248. }
  249. else {
  250. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  251. memcpy (&addr->u.in.addr.s6.sin6_addr, &su.s6.sin6_addr,
  252. sizeof (struct in6_addr));
  253. }
  254. }
  255. else {
  256. addr = rspamd_inet_addr_create (su.sa.sa_family, NULL);
  257. addr->slen = len;
  258. if (addr->af == AF_UNIX) {
  259. len = sizeof (su);
  260. if (getsockname (sock, &su.sa, &len) != -1) {
  261. memcpy (&addr->u.un->addr, &su.su, MIN (len,
  262. sizeof (struct sockaddr_un)));
  263. }
  264. else {
  265. /* Just copy socket address */
  266. memcpy (&addr->u.un->addr, &su.sa, sizeof (struct sockaddr));
  267. }
  268. }
  269. else {
  270. memcpy (&addr->u.in.addr, &su, MIN (len, sizeof (addr->u.in.addr)));
  271. }
  272. }
  273. if (rspamd_socket_nonblocking (nfd) < 0) {
  274. goto out;
  275. }
  276. /* Set close on exec */
  277. if (fcntl (nfd, F_SETFD, FD_CLOEXEC) == -1) {
  278. msg_warn ("fcntl failed: %d, '%s'", errno, strerror (errno));
  279. goto out;
  280. }
  281. if (target) {
  282. *target = addr;
  283. }
  284. else {
  285. /* Avoid leak */
  286. rspamd_inet_address_free (addr);
  287. }
  288. return (nfd);
  289. out:
  290. serrno = errno;
  291. close (nfd);
  292. errno = serrno;
  293. rspamd_inet_address_free (addr);
  294. return (-1);
  295. }
  296. static gboolean
  297. rspamd_parse_unix_path (rspamd_inet_addr_t **target, const char *src,
  298. rspamd_mempool_t *pool)
  299. {
  300. gchar **tokens, **cur_tok, *p, *pwbuf;
  301. glong pwlen;
  302. struct passwd pw, *ppw;
  303. struct group gr, *pgr;
  304. rspamd_inet_addr_t *addr;
  305. bool has_group = false;
  306. tokens = g_strsplit_set (src, " ,", -1);
  307. addr = rspamd_inet_addr_create (AF_UNIX, pool);
  308. rspamd_strlcpy (addr->u.un->addr.sun_path, tokens[0],
  309. sizeof (addr->u.un->addr.sun_path));
  310. #if defined(FREEBSD) || defined(__APPLE__)
  311. addr->u.un->addr.sun_len = SUN_LEN (&addr->u.un->addr);
  312. #endif
  313. addr->u.un->mode = 00644;
  314. addr->u.un->owner = (uid_t)-1;
  315. addr->u.un->group = (gid_t)-1;
  316. cur_tok = &tokens[1];
  317. #ifdef _SC_GETPW_R_SIZE_MAX
  318. pwlen = sysconf (_SC_GETPW_R_SIZE_MAX);
  319. if (pwlen <= 0) {
  320. pwlen = 8192;
  321. }
  322. #else
  323. pwlen = 8192;
  324. #endif
  325. pwbuf = g_malloc0 (pwlen);
  326. while (*cur_tok) {
  327. if (g_ascii_strncasecmp (*cur_tok, "mode=", sizeof ("mode=") - 1) == 0) {
  328. p = strchr (*cur_tok, '=');
  329. /* XXX: add error check */
  330. addr->u.un->mode = strtoul (p + 1, NULL, 0);
  331. if (addr->u.un->mode == 0) {
  332. msg_err ("bad mode: %s", p + 1);
  333. errno = EINVAL;
  334. goto err;
  335. }
  336. }
  337. else if (g_ascii_strncasecmp (*cur_tok, "owner=",
  338. sizeof ("owner=") - 1) == 0) {
  339. p = strchr (*cur_tok, '=');
  340. if (getpwnam_r (p + 1, &pw, pwbuf, pwlen, &ppw) != 0 || ppw == NULL) {
  341. msg_err ("bad user: %s", p + 1);
  342. if (ppw == NULL) {
  343. errno = ENOENT;
  344. }
  345. goto err;
  346. }
  347. addr->u.un->owner = pw.pw_uid;
  348. if (!has_group) {
  349. addr->u.un->group = pw.pw_gid;
  350. }
  351. }
  352. else if (g_ascii_strncasecmp (*cur_tok, "group=",
  353. sizeof ("group=") - 1) == 0) {
  354. p = strchr (*cur_tok, '=');
  355. if (getgrnam_r (p + 1, &gr, pwbuf, pwlen, &pgr) != 0 || pgr == NULL) {
  356. msg_err ("bad group: %s", p + 1);
  357. if (pgr == NULL) {
  358. errno = ENOENT;
  359. }
  360. goto err;
  361. }
  362. has_group = true;
  363. addr->u.un->group = gr.gr_gid;
  364. }
  365. cur_tok ++;
  366. }
  367. g_free (pwbuf);
  368. g_strfreev (tokens);
  369. if (target) {
  370. rspamd_ip_validate_af (addr);
  371. *target = addr;
  372. }
  373. else {
  374. rspamd_inet_address_free (addr);
  375. }
  376. return TRUE;
  377. err:
  378. g_strfreev (tokens);
  379. g_free (pwbuf);
  380. if (!pool) {
  381. rspamd_inet_address_free (addr);
  382. }
  383. return FALSE;
  384. }
  385. gboolean
  386. rspamd_parse_inet_address_ip4 (const guchar *text, gsize len, gpointer target)
  387. {
  388. const guchar *p;
  389. guchar c;
  390. guint32 addr = 0, *addrptr = target;
  391. guint octet = 0, n = 0;
  392. g_assert (text != NULL);
  393. g_assert (target != NULL);
  394. if (len == 0) {
  395. len = strlen (text);
  396. }
  397. for (p = text; p < text + len; p++) {
  398. c = *p;
  399. if (c >= '0' && c <= '9') {
  400. octet = octet * 10 + (c - '0');
  401. if (octet > 255) {
  402. return FALSE;
  403. }
  404. continue;
  405. }
  406. if (c == '.') {
  407. addr = (addr << 8) + octet;
  408. octet = 0;
  409. n++;
  410. continue;
  411. }
  412. return FALSE;
  413. }
  414. if (n == 3) {
  415. addr = (addr << 8) + octet;
  416. *addrptr = ntohl (addr);
  417. return TRUE;
  418. }
  419. return FALSE;
  420. }
  421. gboolean
  422. rspamd_parse_inet_address_ip6 (const guchar *text, gsize len, gpointer target)
  423. {
  424. guchar t, *zero = NULL, *s, *d, *addr = target;
  425. const guchar *p, *digit = NULL, *percent;
  426. gsize len4 = 0;
  427. guint n = 8, nibbles = 0, word = 0;
  428. g_assert (text != NULL);
  429. g_assert (target != NULL);
  430. if (len == 0) {
  431. len = strlen (text);
  432. }
  433. /* Ignore trailing semicolon */
  434. if (text[0] == ':') {
  435. p = text + 1;
  436. len--;
  437. }
  438. else {
  439. p = text;
  440. }
  441. /* Check IPv6 scope */
  442. if ((percent = memchr (p, '%', len)) != NULL && percent > p) {
  443. len = percent - p; /* Ignore scope */
  444. }
  445. if (len > sizeof ("IPv6:") - 1 &&
  446. g_ascii_strncasecmp (p, "IPv6:", sizeof ("IPv6:") - 1) == 0) {
  447. /* Special case, SMTP conformant IPv6 address */
  448. p += sizeof ("IPv6:") - 1;
  449. len -= sizeof ("IPv6:") - 1;
  450. }
  451. for (/* void */; len; len--) {
  452. t = *p++;
  453. if (t == ':') {
  454. if (nibbles) {
  455. digit = p;
  456. len4 = len;
  457. *addr++ = (u_char) (word >> 8);
  458. *addr++ = (u_char) (word & 0xff);
  459. if (--n) {
  460. nibbles = 0;
  461. word = 0;
  462. continue;
  463. }
  464. } else {
  465. if (zero == NULL) {
  466. digit = p;
  467. len4 = len;
  468. zero = addr;
  469. continue;
  470. }
  471. }
  472. return FALSE;
  473. }
  474. if (t == '.' && nibbles) {
  475. if (n < 2 || digit == NULL) {
  476. return FALSE;
  477. }
  478. /* IPv4 encoded in IPv6 */
  479. if (!rspamd_parse_inet_address_ip4 (digit, len4 - 1, &word)) {
  480. return FALSE;
  481. }
  482. word = ntohl (word);
  483. *addr++ = (guchar) ((word >> 24) & 0xff);
  484. *addr++ = (guchar) ((word >> 16) & 0xff);
  485. n--;
  486. break;
  487. }
  488. if (++nibbles > 4) {
  489. /* Too many dots */
  490. return FALSE;
  491. }
  492. /* Restore from hex */
  493. if (t >= '0' && t <= '9') {
  494. word = word * 16 + (t - '0');
  495. continue;
  496. }
  497. t |= 0x20;
  498. if (t >= 'a' && t <= 'f') {
  499. word = word * 16 + (t - 'a') + 10;
  500. continue;
  501. }
  502. return FALSE;
  503. }
  504. if (nibbles == 0 && zero == NULL) {
  505. return FALSE;
  506. }
  507. *addr++ = (guchar) (word >> 8);
  508. *addr++ = (guchar) (word & 0xff);
  509. if (--n) {
  510. if (zero) {
  511. n *= 2;
  512. s = addr - 1;
  513. d = s + n;
  514. while (s >= zero) {
  515. *d-- = *s--;
  516. }
  517. memset (zero, 0, n);
  518. return TRUE;
  519. }
  520. } else {
  521. if (zero == NULL) {
  522. return TRUE;
  523. }
  524. }
  525. return FALSE;
  526. }
  527. /* Checks for ipv6 mapped address */
  528. static rspamd_inet_addr_t *
  529. rspamd_inet_address_v6_maybe_map (const struct sockaddr_in6 *sin6,
  530. rspamd_mempool_t *pool)
  531. {
  532. rspamd_inet_addr_t *addr = NULL;
  533. /* 10 zero bytes or 80 bits */
  534. static const guint8 mask[] = {
  535. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  536. };
  537. const guint8 *p;
  538. if (memcmp ((const guint8 *)&sin6->sin6_addr, mask, sizeof (mask)) == 0) {
  539. p = (const guint8 *)&sin6->sin6_addr;
  540. if ((p[10] == 0xff && p[11] == 0xff)) {
  541. addr = rspamd_inet_addr_create (AF_INET, pool);
  542. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  543. sizeof (struct in_addr));
  544. }
  545. else {
  546. /* Something strange but not mapped v4 address */
  547. addr = rspamd_inet_addr_create (AF_INET6, pool);
  548. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  549. sizeof (struct in6_addr));
  550. }
  551. }
  552. else {
  553. addr = rspamd_inet_addr_create (AF_INET6, pool);
  554. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  555. sizeof (struct in6_addr));
  556. }
  557. return addr;
  558. }
  559. static void
  560. rspamd_inet_address_v6_maybe_map_static (const struct sockaddr_in6 *sin6,
  561. rspamd_inet_addr_t *addr)
  562. {
  563. /* 10 zero bytes or 80 bits */
  564. static const guint8 mask[] = {
  565. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
  566. };
  567. const guint8 *p;
  568. if (memcmp ((const guint8 *)&sin6->sin6_addr, mask, sizeof (mask)) == 0) {
  569. p = (const guint8 *)&sin6->sin6_addr;
  570. if ((p[10] == 0xff && p[11] == 0xff)) {
  571. memcpy (&addr->u.in.addr.s4.sin_addr, &p[12],
  572. sizeof (struct in_addr));
  573. addr->af = AF_INET;
  574. addr->slen = sizeof (addr->u.in.addr.s4);
  575. }
  576. else {
  577. /* Something strange but not mapped v4 address */
  578. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  579. sizeof (struct in6_addr));
  580. addr->af = AF_INET6;
  581. addr->slen = sizeof (addr->u.in.addr.s6);
  582. }
  583. }
  584. else {
  585. memcpy (&addr->u.in.addr.s6.sin6_addr, &sin6->sin6_addr,
  586. sizeof (struct in6_addr));
  587. addr->af = AF_INET6;
  588. addr->slen = sizeof (addr->u.in.addr.s6);
  589. }
  590. }
  591. static gboolean
  592. rspamd_parse_inet_address_common (rspamd_inet_addr_t **target,
  593. const char *src,
  594. gsize srclen,
  595. rspamd_mempool_t *pool)
  596. {
  597. gboolean ret = FALSE;
  598. rspamd_inet_addr_t *addr = NULL;
  599. union sa_inet su;
  600. const char *end;
  601. char ipbuf[INET6_ADDRSTRLEN + 1];
  602. guint iplen;
  603. gulong portnum;
  604. g_assert (src != NULL);
  605. g_assert (target != NULL);
  606. if (srclen == 0) {
  607. srclen = strlen (src);
  608. }
  609. rspamd_ip_check_ipv6 ();
  610. if (src[0] == '/' || src[0] == '.') {
  611. return rspamd_parse_unix_path (target, src, pool);
  612. }
  613. if (src[0] == '[') {
  614. const gchar *ip_start;
  615. /* Ipv6 address in format [::1]:port or just [::1] */
  616. end = memchr (src + 1, ']', srclen - 1);
  617. if (end == NULL) {
  618. return FALSE;
  619. }
  620. iplen = end - src - 1;
  621. if (iplen == 0 || iplen >= sizeof (ipbuf)) {
  622. return FALSE;
  623. }
  624. ip_start = src + 1;
  625. rspamd_strlcpy (ipbuf, ip_start, iplen + 1);
  626. if (rspamd_parse_inet_address_ip6 (ipbuf, iplen,
  627. &su.s6.sin6_addr)) {
  628. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  629. ret = TRUE;
  630. }
  631. if (ret && end[1] == ':') {
  632. /* Port part */
  633. rspamd_strtoul (end + 1, srclen - iplen - 3, &portnum);
  634. rspamd_inet_address_set_port (addr, portnum);
  635. }
  636. }
  637. else {
  638. if ((end = memchr (src, ':', srclen)) != NULL) {
  639. /* This is either port number and ipv4 addr or ipv6 addr */
  640. /* Search for another semicolon */
  641. if (memchr (end + 1, ':', srclen - (end - src + 1)) &&
  642. rspamd_parse_inet_address_ip6 (src, srclen,
  643. &su.s6.sin6_addr)) {
  644. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  645. ret = TRUE;
  646. }
  647. else {
  648. /* Not ipv6, so try ip:port */
  649. iplen = end - src;
  650. if (iplen >= sizeof (ipbuf) || iplen <= 1) {
  651. return FALSE;
  652. }
  653. else {
  654. rspamd_strlcpy (ipbuf, src, iplen + 1);
  655. }
  656. if (rspamd_parse_inet_address_ip4 (ipbuf, iplen,
  657. &su.s4.sin_addr)) {
  658. addr = rspamd_inet_addr_create (AF_INET, pool);
  659. memcpy (&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  660. sizeof (struct in_addr));
  661. rspamd_strtoul (end + 1, srclen - iplen - 1, &portnum);
  662. rspamd_inet_address_set_port (addr, portnum);
  663. ret = TRUE;
  664. }
  665. }
  666. }
  667. else {
  668. if (rspamd_parse_inet_address_ip4 (src, srclen, &su.s4.sin_addr)) {
  669. addr = rspamd_inet_addr_create (AF_INET, pool);
  670. memcpy (&addr->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  671. sizeof (struct in_addr));
  672. ret = TRUE;
  673. }
  674. else if (rspamd_parse_inet_address_ip6 (src, srclen, &su.s6.sin6_addr)) {
  675. addr = rspamd_inet_address_v6_maybe_map (&su.s6, pool);
  676. ret = TRUE;
  677. }
  678. }
  679. }
  680. if (ret && target) {
  681. *target = addr;
  682. }
  683. return ret;
  684. }
  685. gboolean
  686. rspamd_parse_inet_address (rspamd_inet_addr_t **target,
  687. const char *src,
  688. gsize srclen)
  689. {
  690. return rspamd_parse_inet_address_common (target, src, srclen, NULL);
  691. }
  692. rspamd_inet_addr_t *
  693. rspamd_parse_inet_address_pool (const char *src,
  694. gsize srclen,
  695. rspamd_mempool_t *pool)
  696. {
  697. rspamd_inet_addr_t *ret = NULL;
  698. if (!rspamd_parse_inet_address_common (&ret, src, srclen, pool)) {
  699. return NULL;
  700. }
  701. return ret;
  702. }
  703. gboolean
  704. rspamd_parse_inet_address_ip (const char *src, gsize srclen,
  705. rspamd_inet_addr_t *target)
  706. {
  707. const char *end;
  708. char ipbuf[INET6_ADDRSTRLEN + 1];
  709. guint iplen;
  710. gulong portnum;
  711. gboolean ret = FALSE;
  712. union sa_inet su;
  713. g_assert (target != NULL);
  714. g_assert (src != NULL);
  715. if (src[0] == '[') {
  716. /* Ipv6 address in format [::1]:port or just [::1] */
  717. end = memchr (src + 1, ']', srclen - 1);
  718. if (end == NULL) {
  719. return FALSE;
  720. }
  721. iplen = end - src - 1;
  722. if (iplen == 0 || iplen >= sizeof (ipbuf)) {
  723. return FALSE;
  724. }
  725. rspamd_strlcpy (ipbuf, src + 1, iplen + 1);
  726. if (rspamd_parse_inet_address_ip6 (ipbuf, iplen,
  727. &su.s6.sin6_addr)) {
  728. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  729. ret = TRUE;
  730. }
  731. if (ret && end[1] == ':') {
  732. /* Port part */
  733. rspamd_strtoul (end + 1, srclen - iplen - 3, &portnum);
  734. rspamd_inet_address_set_port (target, portnum);
  735. }
  736. }
  737. else {
  738. if ((end = memchr (src, ':', srclen)) != NULL) {
  739. /* This is either port number and ipv4 addr or ipv6 addr */
  740. /* Search for another semicolon */
  741. if (memchr (end + 1, ':', srclen - (end - src + 1)) &&
  742. rspamd_parse_inet_address_ip6 (src, srclen, &su.s6.sin6_addr)) {
  743. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  744. ret = TRUE;
  745. }
  746. else {
  747. /* Not ipv6, so try ip:port */
  748. iplen = end - src;
  749. if (iplen >= sizeof (ipbuf) || iplen <= 1) {
  750. return FALSE;
  751. }
  752. else {
  753. rspamd_strlcpy (ipbuf, src, iplen + 1);
  754. }
  755. if (rspamd_parse_inet_address_ip4 (ipbuf, iplen,
  756. &su.s4.sin_addr)) {
  757. memcpy (&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  758. sizeof (struct in_addr));
  759. target->af = AF_INET;
  760. target->slen = sizeof (target->u.in.addr.s4);
  761. rspamd_strtoul (end + 1, srclen - iplen - 1, &portnum);
  762. rspamd_inet_address_set_port (target, portnum);
  763. ret = TRUE;
  764. }
  765. }
  766. }
  767. else {
  768. if (rspamd_parse_inet_address_ip4 (src, srclen, &su.s4.sin_addr)) {
  769. memcpy (&target->u.in.addr.s4.sin_addr, &su.s4.sin_addr,
  770. sizeof (struct in_addr));
  771. target->af = AF_INET;
  772. target->slen = sizeof (target->u.in.addr.s4);
  773. ret = TRUE;
  774. }
  775. else if (rspamd_parse_inet_address_ip6 (src, srclen,
  776. &su.s6.sin6_addr)) {
  777. rspamd_inet_address_v6_maybe_map_static (&su.s6, target);
  778. ret = TRUE;
  779. }
  780. }
  781. }
  782. return ret;
  783. }
  784. const char *
  785. rspamd_inet_address_to_string (const rspamd_inet_addr_t *addr)
  786. {
  787. static char addr_str[INET6_ADDRSTRLEN + 1];
  788. if (addr == NULL) {
  789. return "<empty inet address>";
  790. }
  791. switch (addr->af) {
  792. case AF_INET:
  793. return inet_ntop (addr->af, &addr->u.in.addr.s4.sin_addr, addr_str,
  794. sizeof (addr_str));
  795. case AF_INET6:
  796. return inet_ntop (addr->af, &addr->u.in.addr.s6.sin6_addr, addr_str,
  797. sizeof (addr_str));
  798. case AF_UNIX:
  799. return addr->u.un->addr.sun_path;
  800. }
  801. return "undefined";
  802. }
  803. const char *
  804. rspamd_inet_address_to_string_pretty (const rspamd_inet_addr_t *addr)
  805. {
  806. static char addr_str[PATH_MAX + 5];
  807. if (addr == NULL) {
  808. return "<empty inet address>";
  809. }
  810. switch (addr->af) {
  811. case AF_INET:
  812. rspamd_snprintf (addr_str, sizeof (addr_str), "%s:%d",
  813. rspamd_inet_address_to_string (addr),
  814. rspamd_inet_address_get_port (addr));
  815. break;
  816. case AF_INET6:
  817. rspamd_snprintf (addr_str, sizeof (addr_str), "[%s]:%d",
  818. rspamd_inet_address_to_string (addr),
  819. rspamd_inet_address_get_port (addr));
  820. break;
  821. case AF_UNIX:
  822. rspamd_snprintf (addr_str, sizeof (addr_str), "unix:%s",
  823. rspamd_inet_address_to_string (addr));
  824. break;
  825. }
  826. return addr_str;
  827. }
  828. uint16_t
  829. rspamd_inet_address_get_port (const rspamd_inet_addr_t *addr)
  830. {
  831. switch (addr->af) {
  832. case AF_INET:
  833. return ntohs (addr->u.in.addr.s4.sin_port);
  834. case AF_INET6:
  835. return ntohs (addr->u.in.addr.s6.sin6_port);
  836. }
  837. return 0;
  838. }
  839. void
  840. rspamd_inet_address_set_port (rspamd_inet_addr_t *addr, uint16_t port)
  841. {
  842. switch (addr->af) {
  843. case AF_INET:
  844. addr->u.in.addr.s4.sin_port = htons (port);
  845. break;
  846. case AF_INET6:
  847. addr->u.in.addr.s6.sin6_port = htons (port);
  848. break;
  849. }
  850. }
  851. int
  852. rspamd_inet_address_connect (const rspamd_inet_addr_t *addr, gint type,
  853. gboolean async)
  854. {
  855. int fd, r;
  856. const struct sockaddr *sa;
  857. if (addr == NULL) {
  858. return -1;
  859. }
  860. fd = rspamd_socket_create (addr->af, type, 0, async);
  861. if (fd == -1) {
  862. return -1;
  863. }
  864. if (addr->af == AF_UNIX) {
  865. sa = (const struct sockaddr *)&addr->u.un->addr;
  866. }
  867. else {
  868. sa = &addr->u.in.addr.sa;
  869. }
  870. r = connect (fd, sa, addr->slen);
  871. if (r == -1) {
  872. if (!async || errno != EINPROGRESS) {
  873. close (fd);
  874. msg_warn ("connect %s failed: %d, '%s'",
  875. rspamd_inet_address_to_string_pretty (addr),
  876. errno, strerror (errno));
  877. return -1;
  878. }
  879. }
  880. return fd;
  881. }
  882. int
  883. rspamd_inet_address_listen (const rspamd_inet_addr_t *addr, gint type,
  884. gboolean async)
  885. {
  886. gint fd, r;
  887. gint on = 1;
  888. const struct sockaddr *sa;
  889. const char *path;
  890. if (addr == NULL) {
  891. return -1;
  892. }
  893. fd = rspamd_socket_create (addr->af, type, 0, async);
  894. if (fd == -1) {
  895. return -1;
  896. }
  897. if (addr->af == AF_UNIX && access (addr->u.un->addr.sun_path, W_OK) != -1) {
  898. /* Unlink old socket */
  899. (void)unlink (addr->u.un->addr.sun_path);
  900. }
  901. if (addr->af == AF_UNIX) {
  902. sa = (const struct sockaddr *)&addr->u.un->addr;
  903. }
  904. else {
  905. sa = &addr->u.in.addr.sa;
  906. }
  907. (void)setsockopt (fd, SOL_SOCKET, SO_REUSEADDR, (const void *)&on, sizeof (gint));
  908. #ifdef HAVE_IPV6_V6ONLY
  909. if (addr->af == AF_INET6) {
  910. /* We need to set this flag to avoid errors */
  911. on = 1;
  912. #ifdef SOL_IPV6
  913. (void)setsockopt (fd, SOL_IPV6, IPV6_V6ONLY, (const void *)&on, sizeof (gint));
  914. #elif defined(IPPROTO_IPV6)
  915. (void)setsockopt (fd, IPPROTO_IPV6, IPV6_V6ONLY, (const void *)&on, sizeof (gint));
  916. #endif
  917. }
  918. #endif
  919. r = bind (fd, sa, addr->slen);
  920. if (r == -1) {
  921. if (!async || errno != EINPROGRESS) {
  922. close (fd);
  923. msg_warn ("bind %s failed: %d, '%s'",
  924. rspamd_inet_address_to_string_pretty (addr),
  925. errno,
  926. strerror (errno));
  927. return -1;
  928. }
  929. }
  930. if (type != (int)SOCK_DGRAM) {
  931. if (addr->af == AF_UNIX) {
  932. path = addr->u.un->addr.sun_path;
  933. /* Try to set mode and owner */
  934. if (addr->u.un->owner != (uid_t)-1 || addr->u.un->group != (gid_t)-1) {
  935. if (chown (path, addr->u.un->owner, addr->u.un->group) == -1) {
  936. msg_info ("cannot change owner for %s to %d:%d: %s",
  937. path, addr->u.un->owner, addr->u.un->group,
  938. strerror (errno));
  939. }
  940. }
  941. if (chmod (path, addr->u.un->mode) == -1) {
  942. msg_info ("cannot change mode for %s to %od %s",
  943. path, addr->u.un->mode, strerror (errno));
  944. }
  945. }
  946. r = listen (fd, -1);
  947. if (r == -1) {
  948. msg_warn ("listen %s failed: %d, '%s'",
  949. rspamd_inet_address_to_string_pretty (addr),
  950. errno, strerror (errno));
  951. close (fd);
  952. return -1;
  953. }
  954. }
  955. return fd;
  956. }
  957. gssize
  958. rspamd_inet_address_recvfrom (gint fd, void *buf, gsize len, gint fl,
  959. rspamd_inet_addr_t **target)
  960. {
  961. gssize ret;
  962. union sa_union su;
  963. socklen_t slen = sizeof (su);
  964. rspamd_inet_addr_t *addr = NULL;
  965. if ((ret = recvfrom (fd, buf, len, fl, &su.sa, &slen)) == -1) {
  966. if (target) {
  967. *target = NULL;
  968. }
  969. return -1;
  970. }
  971. if (target) {
  972. addr = rspamd_inet_addr_create (su.sa.sa_family, NULL);
  973. addr->slen = slen;
  974. if (addr->af == AF_UNIX) {
  975. addr->u.un = g_malloc (sizeof (*addr->u.un));
  976. memcpy (&addr->u.un->addr, &su.su, sizeof (struct sockaddr_un));
  977. }
  978. else {
  979. memcpy (&addr->u.in.addr, &su.sa, MIN (slen, sizeof (addr->u.in.addr)));
  980. }
  981. *target = addr;
  982. }
  983. return (ret);
  984. }
  985. gssize
  986. rspamd_inet_address_sendto (gint fd, const void *buf, gsize len, gint fl,
  987. const rspamd_inet_addr_t *addr)
  988. {
  989. gssize r;
  990. const struct sockaddr *sa;
  991. if (addr == NULL) {
  992. return -1;
  993. }
  994. if (addr->af == AF_UNIX) {
  995. sa = (struct sockaddr *)&addr->u.un->addr;
  996. }
  997. else {
  998. sa = &addr->u.in.addr.sa;
  999. }
  1000. r = sendto (fd, buf, len, fl, sa, addr->slen);
  1001. return r;
  1002. }
  1003. static gboolean
  1004. rspamd_check_port_priority (const char *line, guint default_port,
  1005. guint *priority, gchar *out,
  1006. gsize outlen, rspamd_mempool_t *pool)
  1007. {
  1008. guint real_port = default_port, real_priority = 0;
  1009. gchar *err_str, *err_str_prio;
  1010. if (line && line[0] == ':') {
  1011. errno = 0;
  1012. real_port = strtoul (line + 1, &err_str, 10);
  1013. if (err_str && *err_str == ':') {
  1014. /* We have priority */
  1015. real_priority = strtoul (err_str + 1, &err_str_prio, 10);
  1016. if (err_str_prio && *err_str_prio != '\0') {
  1017. msg_err_pool_check (
  1018. "cannot parse priority: %s, at symbol %c, error: %s",
  1019. line,
  1020. *err_str_prio,
  1021. strerror (errno));
  1022. return FALSE;
  1023. }
  1024. }
  1025. else if (err_str && *err_str != '\0') {
  1026. msg_err_pool_check (
  1027. "cannot parse port: %s, at symbol %c, error: %s",
  1028. line,
  1029. *err_str,
  1030. strerror (errno));
  1031. return FALSE;
  1032. }
  1033. }
  1034. if (priority) {
  1035. *priority = real_priority;
  1036. }
  1037. rspamd_snprintf (out, outlen, "%ud", real_port);
  1038. return TRUE;
  1039. }
  1040. static gboolean
  1041. rspamd_resolve_addrs (const char *begin, size_t len, GPtrArray **addrs,
  1042. const gchar *portbuf, gint flags,
  1043. rspamd_mempool_t *pool)
  1044. {
  1045. struct addrinfo hints, *res, *cur;
  1046. rspamd_inet_addr_t *cur_addr = NULL;
  1047. gint r, addr_cnt;
  1048. gchar *addr_cpy = NULL;
  1049. rspamd_ip_check_ipv6 ();
  1050. if (rspamd_parse_inet_address (&cur_addr, begin, len)) {
  1051. if (*addrs == NULL) {
  1052. *addrs = g_ptr_array_new_full (1,
  1053. (GDestroyNotify) rspamd_inet_address_free);
  1054. if (pool != NULL) {
  1055. rspamd_mempool_add_destructor (pool,
  1056. rspamd_ptr_array_free_hard, *addrs);
  1057. }
  1058. }
  1059. rspamd_inet_address_set_port (cur_addr, strtoul (portbuf, NULL, 10));
  1060. g_ptr_array_add (*addrs, cur_addr);
  1061. }
  1062. else {
  1063. memset (&hints, 0, sizeof (hints));
  1064. hints.ai_socktype = SOCK_STREAM; /* Type of the socket */
  1065. hints.ai_flags = AI_NUMERICSERV|flags;
  1066. if (len > 0) {
  1067. if (pool) {
  1068. addr_cpy = rspamd_mempool_alloc (pool, len + 1);
  1069. }
  1070. else {
  1071. addr_cpy = g_malloc (len + 1);
  1072. }
  1073. rspamd_strlcpy (addr_cpy, begin, len + 1);
  1074. }
  1075. /* Otherwise it will be NULL */
  1076. if (ipv6_status == RSPAMD_IPV6_SUPPORTED) {
  1077. hints.ai_family = AF_UNSPEC;
  1078. }
  1079. else {
  1080. hints.ai_family = AF_INET;
  1081. }
  1082. if ((r = getaddrinfo (addr_cpy, portbuf, &hints, &res)) == 0) {
  1083. /* Now copy up to max_addrs of addresses */
  1084. addr_cnt = 0;
  1085. cur = res;
  1086. while (cur) {
  1087. cur = cur->ai_next;
  1088. addr_cnt ++;
  1089. }
  1090. if (*addrs == NULL) {
  1091. *addrs = g_ptr_array_new_full (addr_cnt,
  1092. (GDestroyNotify) rspamd_inet_address_free);
  1093. if (pool != NULL) {
  1094. rspamd_mempool_add_destructor (pool,
  1095. rspamd_ptr_array_free_hard, *addrs);
  1096. }
  1097. }
  1098. cur = res;
  1099. while (cur) {
  1100. cur_addr = rspamd_inet_address_from_sa (cur->ai_addr,
  1101. cur->ai_addrlen);
  1102. if (cur_addr != NULL) {
  1103. g_ptr_array_add (*addrs, cur_addr);
  1104. }
  1105. cur = cur->ai_next;
  1106. }
  1107. freeaddrinfo (res);
  1108. }
  1109. else if (addr_cpy) {
  1110. msg_err_pool_check ("address resolution for %s failed: %s",
  1111. addr_cpy,
  1112. gai_strerror (r));
  1113. if (pool == NULL) {
  1114. g_free (addr_cpy);
  1115. }
  1116. return FALSE;
  1117. }
  1118. else {
  1119. /* Should never ever happen */
  1120. g_assert (0);
  1121. }
  1122. }
  1123. return TRUE;
  1124. }
  1125. gboolean
  1126. rspamd_parse_host_port_priority (const gchar *str,
  1127. GPtrArray **addrs,
  1128. guint *priority,
  1129. gchar **name_ptr,
  1130. guint default_port,
  1131. rspamd_mempool_t *pool)
  1132. {
  1133. gchar portbuf[8];
  1134. const gchar *p, *name = NULL;
  1135. gsize namelen;
  1136. rspamd_inet_addr_t *cur_addr = NULL;
  1137. /*
  1138. * In this function, we can have several possibilities:
  1139. * 1) Unix socket: check for '.' or '/' at the begin of string
  1140. * 2) \[ipv6\]: check for '[' at the beginning
  1141. * 3) '*': means listening on any address
  1142. * 4) ip|host[:port[:priority]]
  1143. */
  1144. if (str[0] == '*') {
  1145. if (!rspamd_check_port_priority (str + 1, default_port, priority,
  1146. portbuf, sizeof (portbuf), pool)) {
  1147. return FALSE;
  1148. }
  1149. if (!rspamd_resolve_addrs (str, 0, addrs, portbuf, AI_PASSIVE, pool)) {
  1150. return FALSE;
  1151. }
  1152. name = "*";
  1153. namelen = 1;
  1154. }
  1155. else if (str[0] == '[') {
  1156. /* This is braced IPv6 address */
  1157. p = strchr (str, ']');
  1158. if (p == NULL) {
  1159. msg_err_pool_check ("cannot parse address definition %s: %s",
  1160. str,
  1161. strerror (EINVAL));
  1162. return FALSE;
  1163. }
  1164. name = str + 1;
  1165. namelen = p - str - 1;
  1166. if (!rspamd_check_port_priority (p + 1, default_port, priority, portbuf,
  1167. sizeof (portbuf), pool)) {
  1168. return FALSE;
  1169. }
  1170. if (!rspamd_resolve_addrs (name, namelen, addrs,
  1171. portbuf, 0, pool)) {
  1172. return FALSE;
  1173. }
  1174. }
  1175. else if (str[0] == '/' || str[0] == '.') {
  1176. /* Special case of unix socket, as getaddrinfo cannot deal with them */
  1177. if (*addrs == NULL) {
  1178. *addrs = g_ptr_array_new_full (1,
  1179. (GDestroyNotify) rspamd_inet_address_free);
  1180. if (pool != NULL) {
  1181. rspamd_mempool_add_destructor (pool,
  1182. rspamd_ptr_array_free_hard, *addrs);
  1183. }
  1184. }
  1185. if (!rspamd_parse_inet_address (&cur_addr, str, 0)) {
  1186. msg_err_pool_check ("cannot parse unix socket definition %s: %s",
  1187. str,
  1188. strerror (errno));
  1189. return FALSE;
  1190. }
  1191. g_ptr_array_add (*addrs, cur_addr);
  1192. name = str;
  1193. namelen = strlen (str);
  1194. }
  1195. else {
  1196. p = strchr (str, ':');
  1197. if (p == NULL) {
  1198. /* Just address or IP */
  1199. name = str;
  1200. namelen = strlen (str);
  1201. rspamd_check_port_priority ("", default_port, priority, portbuf,
  1202. sizeof (portbuf), pool);
  1203. if (!rspamd_resolve_addrs (name, namelen, addrs,
  1204. portbuf, 0, pool)) {
  1205. return FALSE;
  1206. }
  1207. }
  1208. else {
  1209. name = str;
  1210. namelen = p - str;
  1211. if (!rspamd_check_port_priority (p, default_port, priority, portbuf,
  1212. sizeof (portbuf), pool)) {
  1213. return FALSE;
  1214. }
  1215. if (!rspamd_resolve_addrs (str, p - str, addrs,
  1216. portbuf, 0, pool)) {
  1217. return FALSE;
  1218. }
  1219. }
  1220. }
  1221. if (name_ptr != NULL) {
  1222. if (pool) {
  1223. *name_ptr = rspamd_mempool_alloc (pool, namelen + 1);
  1224. }
  1225. else {
  1226. *name_ptr = g_malloc (namelen + 1);
  1227. }
  1228. rspamd_strlcpy (*name_ptr, name, namelen + 1);
  1229. }
  1230. return TRUE;
  1231. }
  1232. guchar*
  1233. rspamd_inet_address_get_hash_key (const rspamd_inet_addr_t *addr, guint *klen)
  1234. {
  1235. guchar *res = NULL;
  1236. static struct in_addr local = {INADDR_LOOPBACK};
  1237. g_assert (addr != NULL);
  1238. g_assert (klen != NULL);
  1239. if (addr->af == AF_INET) {
  1240. *klen = sizeof (struct in_addr);
  1241. res = (guchar *)&addr->u.in.addr.s4.sin_addr;
  1242. }
  1243. else if (addr->af == AF_INET6) {
  1244. *klen = sizeof (struct in6_addr);
  1245. res = (guchar *)&addr->u.in.addr.s6.sin6_addr;
  1246. }
  1247. else if (addr->af == AF_UNIX) {
  1248. *klen = sizeof (struct in_addr);
  1249. res = (guchar *)&local;
  1250. }
  1251. else {
  1252. *klen = 0;
  1253. res = NULL;
  1254. }
  1255. return res;
  1256. }
  1257. rspamd_inet_addr_t *
  1258. rspamd_inet_address_new (int af, const void *init)
  1259. {
  1260. rspamd_inet_addr_t *addr;
  1261. addr = rspamd_inet_addr_create (af, NULL);
  1262. if (init != NULL) {
  1263. if (af == AF_UNIX) {
  1264. /* Init is a path */
  1265. rspamd_strlcpy (addr->u.un->addr.sun_path, init,
  1266. sizeof (addr->u.un->addr.sun_path));
  1267. #if defined(FREEBSD) || defined(__APPLE__)
  1268. addr->u.un->addr.sun_len = SUN_LEN (&addr->u.un->addr);
  1269. #endif
  1270. }
  1271. else if (af == AF_INET) {
  1272. memcpy (&addr->u.in.addr.s4.sin_addr, init, sizeof (struct in_addr));
  1273. }
  1274. else if (af == AF_INET6) {
  1275. memcpy (&addr->u.in.addr.s6.sin6_addr, init, sizeof (struct in6_addr));
  1276. }
  1277. }
  1278. return addr;
  1279. }
  1280. rspamd_inet_addr_t *
  1281. rspamd_inet_address_from_sa (const struct sockaddr *sa, socklen_t slen)
  1282. {
  1283. rspamd_inet_addr_t *addr;
  1284. g_assert (sa != NULL);
  1285. g_assert (slen >= sizeof (struct sockaddr));
  1286. addr = rspamd_inet_addr_create (sa->sa_family, NULL);
  1287. if (sa->sa_family == AF_UNIX) {
  1288. /* Init is a path */
  1289. const struct sockaddr_un *un = (const struct sockaddr_un *)sa;
  1290. g_assert (slen >= SUN_LEN (un));
  1291. rspamd_strlcpy (addr->u.un->addr.sun_path, un->sun_path,
  1292. sizeof (addr->u.un->addr.sun_path));
  1293. #if defined(FREEBSD) || defined(__APPLE__)
  1294. addr->u.un->addr.sun_len = un->sun_len;
  1295. #endif
  1296. }
  1297. else if (sa->sa_family == AF_INET) {
  1298. g_assert (slen >= sizeof (struct sockaddr_in));
  1299. memcpy (&addr->u.in.addr.s4, sa, sizeof (struct sockaddr_in));
  1300. }
  1301. else if (sa->sa_family == AF_INET6) {
  1302. g_assert (slen >= sizeof (struct sockaddr_in6));
  1303. memcpy (&addr->u.in.addr.s6, sa, sizeof (struct sockaddr_in6));
  1304. }
  1305. else {
  1306. /* XXX: currently we cannot deal with other AF */
  1307. g_assert (0);
  1308. }
  1309. return addr;
  1310. }
  1311. rspamd_inet_addr_t *
  1312. rspamd_inet_address_from_rnds (const struct rdns_reply_entry *rep)
  1313. {
  1314. rspamd_inet_addr_t *addr = NULL;
  1315. g_assert (rep != NULL);
  1316. if (rep->type == RDNS_REQUEST_A) {
  1317. addr = rspamd_inet_addr_create (AF_INET, NULL);
  1318. memcpy (&addr->u.in.addr.s4.sin_addr, &rep->content.a.addr,
  1319. sizeof (struct in_addr));
  1320. }
  1321. else if (rep->type == RDNS_REQUEST_AAAA) {
  1322. addr = rspamd_inet_addr_create (AF_INET6, NULL);
  1323. memcpy (&addr->u.in.addr.s6.sin6_addr, &rep->content.aaa.addr,
  1324. sizeof (struct in6_addr));
  1325. }
  1326. return addr;
  1327. }
  1328. void
  1329. rspamd_inet_address_apply_mask (rspamd_inet_addr_t *addr, guint mask)
  1330. {
  1331. guint32 umsk, *p;
  1332. if (mask > 0 && addr != NULL) {
  1333. if (addr->af == AF_INET && mask <= 32) {
  1334. umsk = htonl (G_MAXUINT32 << (32 - mask));
  1335. addr->u.in.addr.s4.sin_addr.s_addr &= umsk;
  1336. }
  1337. else if (addr->af == AF_INET6 && mask <= 128) {
  1338. p = (uint32_t *)&addr->u.in.addr.s6.sin6_addr;
  1339. mask = 128 - mask;
  1340. p += 3;
  1341. for (;;) {
  1342. if (mask >= 32) {
  1343. mask -= 32;
  1344. *p = 0;
  1345. }
  1346. else {
  1347. umsk = htonl (G_MAXUINT32 << mask);
  1348. *p &= umsk;
  1349. break;
  1350. }
  1351. p --;
  1352. }
  1353. }
  1354. }
  1355. }
  1356. static gint
  1357. rspamd_inet_address_af_order (const rspamd_inet_addr_t *addr)
  1358. {
  1359. int ret;
  1360. switch (addr->af) {
  1361. case AF_UNIX:
  1362. ret = 2;
  1363. break;
  1364. case AF_INET:
  1365. ret = 1;
  1366. break;
  1367. default:
  1368. ret = 0;
  1369. break;
  1370. }
  1371. return ret;
  1372. }
  1373. gint
  1374. rspamd_inet_address_compare (const rspamd_inet_addr_t *a1,
  1375. const rspamd_inet_addr_t *a2)
  1376. {
  1377. g_assert (a1 != NULL);
  1378. g_assert (a2 != NULL);
  1379. if (a1->af != a2->af) {
  1380. return (rspamd_inet_address_af_order (a2) -
  1381. rspamd_inet_address_af_order (a1));
  1382. }
  1383. else {
  1384. switch (a1->af) {
  1385. case AF_INET:
  1386. return memcmp (&a1->u.in.addr.s4.sin_addr,
  1387. &a2->u.in.addr.s4.sin_addr, sizeof (struct in_addr));
  1388. case AF_INET6:
  1389. return memcmp (&a1->u.in.addr.s6.sin6_addr,
  1390. &a2->u.in.addr.s6.sin6_addr, sizeof (struct in6_addr));
  1391. case AF_UNIX:
  1392. return strncmp (a1->u.un->addr.sun_path,
  1393. a2->u.un->addr.sun_path, sizeof (a1->u.un->addr.sun_path));
  1394. default:
  1395. return memcmp (&a1->u.in, &a2->u.in, sizeof (a1->u.in));
  1396. }
  1397. }
  1398. return 0;
  1399. }
  1400. gint
  1401. rspamd_inet_address_compare_ptr (gconstpointer a1,
  1402. gconstpointer a2)
  1403. {
  1404. const rspamd_inet_addr_t **i1 = (const rspamd_inet_addr_t **)a1,
  1405. **i2 = (const rspamd_inet_addr_t **)a2;
  1406. return rspamd_inet_address_compare (*i1, *i2);
  1407. }
  1408. rspamd_inet_addr_t *
  1409. rspamd_inet_address_copy (const rspamd_inet_addr_t *addr)
  1410. {
  1411. rspamd_inet_addr_t *n;
  1412. if (addr == NULL) {
  1413. return NULL;
  1414. }
  1415. n = rspamd_inet_addr_create (addr->af, NULL);
  1416. if (n->af == AF_UNIX) {
  1417. memcpy (n->u.un, addr->u.un, sizeof (*addr->u.un));
  1418. }
  1419. else {
  1420. memcpy (&n->u.in, &addr->u.in, sizeof (addr->u.in));
  1421. }
  1422. return n;
  1423. }
  1424. gint
  1425. rspamd_inet_address_get_af (const rspamd_inet_addr_t *addr)
  1426. {
  1427. g_assert (addr != NULL);
  1428. return addr->af;
  1429. }
  1430. struct sockaddr*
  1431. rspamd_inet_address_get_sa (const rspamd_inet_addr_t *addr,
  1432. socklen_t *sz)
  1433. {
  1434. g_assert (addr != NULL);
  1435. if (addr->af == AF_UNIX) {
  1436. *sz = addr->slen;
  1437. return (struct sockaddr *)&addr->u.un->addr;
  1438. }
  1439. else {
  1440. *sz = addr->slen;
  1441. return (struct sockaddr *)&addr->u.in.addr.sa;
  1442. }
  1443. }
  1444. guint
  1445. rspamd_inet_address_hash (gconstpointer a)
  1446. {
  1447. const rspamd_inet_addr_t *addr = a;
  1448. rspamd_cryptobox_fast_hash_state_t st;
  1449. rspamd_cryptobox_fast_hash_init (&st, rspamd_hash_seed ());
  1450. rspamd_cryptobox_fast_hash_update (&st, &addr->af, sizeof (addr->af));
  1451. if (addr->af == AF_UNIX && addr->u.un) {
  1452. rspamd_cryptobox_fast_hash_update (&st, addr->u.un, sizeof (*addr->u.un));
  1453. }
  1454. else {
  1455. /* We ignore port part here */
  1456. if (addr->af == AF_INET) {
  1457. rspamd_cryptobox_fast_hash_update (&st, &addr->u.in.addr.s4.sin_addr,
  1458. sizeof (addr->u.in.addr.s4.sin_addr));
  1459. }
  1460. else {
  1461. rspamd_cryptobox_fast_hash_update (&st, &addr->u.in.addr.s6.sin6_addr,
  1462. sizeof (addr->u.in.addr.s6.sin6_addr));
  1463. }
  1464. }
  1465. return rspamd_cryptobox_fast_hash_final (&st);
  1466. }
  1467. gboolean
  1468. rspamd_inet_address_equal (gconstpointer a, gconstpointer b)
  1469. {
  1470. const rspamd_inet_addr_t *a1 = a, *a2 = b;
  1471. return rspamd_inet_address_compare (a1, a2) == 0;
  1472. }
  1473. #ifndef IN6_IS_ADDR_LOOPBACK
  1474. #define IN6_IS_ADDR_LOOPBACK(a) \
  1475. ((*(const __uint32_t *)(const void *)(&(a)->s6_addr[0]) == 0) && \
  1476. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[4]) == 0) && \
  1477. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[8]) == 0) && \
  1478. (*(const __uint32_t *)(const void *)(&(a)->s6_addr[12]) == ntohl(1)))
  1479. #endif
  1480. #ifndef IN6_IS_ADDR_LINKLOCAL
  1481. #define IN6_IS_ADDR_LINKLOCAL(a) \
  1482. (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0x80))
  1483. #endif
  1484. #ifndef IN6_IS_ADDR_SITELOCAL
  1485. #define IN6_IS_ADDR_SITELOCAL(a) \
  1486. (((a)->s6_addr[0] == 0xfe) && (((a)->s6_addr[1] & 0xc0) == 0xc0))
  1487. #endif
  1488. gboolean
  1489. rspamd_inet_address_is_local (const rspamd_inet_addr_t *addr,
  1490. gboolean check_laddrs)
  1491. {
  1492. if (addr == NULL) {
  1493. return FALSE;
  1494. }
  1495. if (addr->af == AF_UNIX) {
  1496. /* Always true for unix sockets */
  1497. return TRUE;
  1498. }
  1499. else {
  1500. if (addr->af == AF_INET) {
  1501. if ((ntohl (addr->u.in.addr.s4.sin_addr.s_addr) & 0xff000000)
  1502. == 0x7f000000) {
  1503. return TRUE;
  1504. }
  1505. }
  1506. else if (addr->af == AF_INET6) {
  1507. if (IN6_IS_ADDR_LOOPBACK (&addr->u.in.addr.s6.sin6_addr) ||
  1508. IN6_IS_ADDR_LINKLOCAL (&addr->u.in.addr.s6.sin6_addr) ||
  1509. IN6_IS_ADDR_SITELOCAL (&addr->u.in.addr.s6.sin6_addr)) {
  1510. return TRUE;
  1511. }
  1512. }
  1513. if (check_laddrs && local_addrs) {
  1514. if (rspamd_match_radix_map_addr (local_addrs, addr) != NULL) {
  1515. return TRUE;
  1516. }
  1517. }
  1518. }
  1519. return FALSE;
  1520. }
  1521. struct rspamd_radix_map_helper **
  1522. rspamd_inet_library_init (void)
  1523. {
  1524. return &local_addrs;
  1525. }
  1526. void
  1527. rspamd_inet_library_destroy (void)
  1528. {
  1529. /* Ugly: local_addrs will actually be freed by config object */
  1530. }
  1531. gsize
  1532. rspamd_inet_address_storage_size (void)
  1533. {
  1534. return sizeof (rspamd_inet_addr_t);
  1535. }