1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148
|
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
#include <inttypes.h>
#include <stdbool.h>
#include <isc/mem.h>
#include <isc/radix.h>
#include <isc/util.h>
#include <dns/acl.h>
/*
* Create a new IP table and the underlying radix structure
*/
void
dns_iptable_create(isc_mem_t *mctx, dns_iptable_t **target) {
dns_iptable_t *tab = isc_mem_get(mctx, sizeof(*tab));
*tab = (dns_iptable_t){
.references = ISC_REFCOUNT_INITIALIZER(1),
.magic = DNS_IPTABLE_MAGIC,
};
isc_mem_attach(mctx, &tab->mctx);
isc_radix_create(mctx, &tab->radix, RADIX_MAXBITS);
*target = tab;
}
static bool dns_iptable_neg = false;
static bool dns_iptable_pos = true;
/*
* Add an IP prefix to an existing IP table
*/
isc_result_t
dns_iptable_addprefix(dns_iptable_t *tab, const isc_netaddr_t *addr,
uint16_t bitlen, bool pos) {
isc_result_t result;
isc_prefix_t pfx;
isc_radix_node_t *node = NULL;
int i;
INSIST(DNS_IPTABLE_VALID(tab));
INSIST(tab->radix != NULL);
NETADDR_TO_PREFIX_T(addr, pfx, bitlen);
result = isc_radix_insert(tab->radix, &node, NULL, &pfx);
if (result != ISC_R_SUCCESS) {
isc_refcount_destroy(&pfx.refcount);
return result;
}
/* If a node already contains data, don't overwrite it */
if (pfx.family == AF_UNSPEC) {
/* "any" or "none" */
INSIST(pfx.bitlen == 0);
for (i = 0; i < RADIX_FAMILIES; i++) {
if (node->data[i] == NULL) {
node->data[i] = pos ? &dns_iptable_pos
: &dns_iptable_neg;
}
}
} else {
/* any other prefix */
int fam = ISC_RADIX_FAMILY(&pfx);
if (node->data[fam] == NULL) {
node->data[fam] = pos ? &dns_iptable_pos
: &dns_iptable_neg;
}
}
isc_refcount_destroy(&pfx.refcount);
return ISC_R_SUCCESS;
}
/*
* Merge one IP table into another one.
*/
isc_result_t
dns_iptable_merge(dns_iptable_t *tab, dns_iptable_t *source, bool pos) {
isc_result_t result;
isc_radix_node_t *node, *new_node;
int i, max_node = 0;
RADIX_WALK(source->radix->head, node) {
new_node = NULL;
result = isc_radix_insert(tab->radix, &new_node, node, NULL);
if (result != ISC_R_SUCCESS) {
return result;
}
/*
* If we're negating a nested ACL, then we should
* reverse the sense of every node. However, this
* could lead to a negative node in a nested ACL
* becoming a positive match in the parent, which
* could be a security risk. To prevent this, we
* just leave the negative nodes negative.
*/
for (i = 0; i < RADIX_FAMILIES; i++) {
if (!pos) {
if (node->data[i] && *(bool *)node->data[i]) {
new_node->data[i] = &dns_iptable_neg;
}
}
if (node->node_num[i] > max_node) {
max_node = node->node_num[i];
}
}
}
RADIX_WALK_END;
tab->radix->num_added_node += max_node;
return ISC_R_SUCCESS;
}
static void
dns__iptable_destroy(dns_iptable_t *dtab) {
REQUIRE(DNS_IPTABLE_VALID(dtab));
dtab->magic = 0;
if (dtab->radix != NULL) {
isc_radix_destroy(dtab->radix, NULL);
dtab->radix = NULL;
}
isc_mem_putanddetach(&dtab->mctx, dtab, sizeof(*dtab));
}
#if DNS_IPTABLE_TRACE
ISC_REFCOUNT_TRACE_IMPL(dns_iptable, dns__iptable_destroy);
#else
ISC_REFCOUNT_IMPL(dns_iptable, dns__iptable_destroy);
#endif
|