]> git.saurik.com Git - apple/network_cmds.git/blob - unbound/daemon/acl_list.c
84d099ca5092b12fc945c3f8c3cfc4c9bc342fa0
[apple/network_cmds.git] / unbound / daemon / acl_list.c
1 /*
2 * daemon/acl_list.h - client access control storage for the server.
3 *
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
5 *
6 * This software is open source.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
18 *
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36 /**
37 * \file
38 *
39 * This file helps the server keep out queries from outside sources, that
40 * should not be answered.
41 */
42 #include "config.h"
43 #include "daemon/acl_list.h"
44 #include "util/regional.h"
45 #include "util/log.h"
46 #include "util/config_file.h"
47 #include "util/net_help.h"
48
49 struct acl_list*
50 acl_list_create(void)
51 {
52 struct acl_list* acl = (struct acl_list*)calloc(1,
53 sizeof(struct acl_list));
54 if(!acl)
55 return NULL;
56 acl->region = regional_create();
57 if(!acl->region) {
58 acl_list_delete(acl);
59 return NULL;
60 }
61 return acl;
62 }
63
64 void
65 acl_list_delete(struct acl_list* acl)
66 {
67 if(!acl)
68 return;
69 regional_destroy(acl->region);
70 free(acl);
71 }
72
73 /** insert new address into acl_list structure */
74 static int
75 acl_list_insert(struct acl_list* acl, struct sockaddr_storage* addr,
76 socklen_t addrlen, int net, enum acl_access control,
77 int complain_duplicates)
78 {
79 struct acl_addr* node = regional_alloc(acl->region,
80 sizeof(struct acl_addr));
81 if(!node)
82 return 0;
83 node->control = control;
84 if(!addr_tree_insert(&acl->tree, &node->node, addr, addrlen, net)) {
85 if(complain_duplicates)
86 verbose(VERB_QUERY, "duplicate acl address ignored.");
87 }
88 return 1;
89 }
90
91 /** apply acl_list string */
92 static int
93 acl_list_str_cfg(struct acl_list* acl, const char* str, const char* s2,
94 int complain_duplicates)
95 {
96 struct sockaddr_storage addr;
97 int net;
98 socklen_t addrlen;
99 enum acl_access control;
100 if(strcmp(s2, "allow") == 0)
101 control = acl_allow;
102 else if(strcmp(s2, "deny") == 0)
103 control = acl_deny;
104 else if(strcmp(s2, "refuse") == 0)
105 control = acl_refuse;
106 else if(strcmp(s2, "deny_non_local") == 0)
107 control = acl_deny_non_local;
108 else if(strcmp(s2, "refuse_non_local") == 0)
109 control = acl_refuse_non_local;
110 else if(strcmp(s2, "allow_snoop") == 0)
111 control = acl_allow_snoop;
112 else {
113 log_err("access control type %s unknown", str);
114 return 0;
115 }
116 if(!netblockstrtoaddr(str, UNBOUND_DNS_PORT, &addr, &addrlen, &net)) {
117 log_err("cannot parse access control: %s %s", str, s2);
118 return 0;
119 }
120 if(!acl_list_insert(acl, &addr, addrlen, net, control,
121 complain_duplicates)) {
122 log_err("out of memory");
123 return 0;
124 }
125 return 1;
126 }
127
128 /** read acl_list config */
129 static int
130 read_acl_list(struct acl_list* acl, struct config_file* cfg)
131 {
132 struct config_str2list* p;
133 for(p = cfg->acls; p; p = p->next) {
134 log_assert(p->str && p->str2);
135 if(!acl_list_str_cfg(acl, p->str, p->str2, 1))
136 return 0;
137 }
138 return 1;
139 }
140
141 int
142 acl_list_apply_cfg(struct acl_list* acl, struct config_file* cfg)
143 {
144 regional_free_all(acl->region);
145 addr_tree_init(&acl->tree);
146 if(!read_acl_list(acl, cfg))
147 return 0;
148 /* insert defaults, with '0' to ignore them if they are duplicates */
149 if(!acl_list_str_cfg(acl, "0.0.0.0/0", "refuse", 0))
150 return 0;
151 if(!acl_list_str_cfg(acl, "127.0.0.0/8", "allow", 0))
152 return 0;
153 if(cfg->do_ip6) {
154 if(!acl_list_str_cfg(acl, "::0/0", "refuse", 0))
155 return 0;
156 if(!acl_list_str_cfg(acl, "::1", "allow", 0))
157 return 0;
158 if(!acl_list_str_cfg(acl, "::ffff:127.0.0.1", "allow", 0))
159 return 0;
160 }
161 addr_tree_init_parents(&acl->tree);
162 return 1;
163 }
164
165 enum acl_access
166 acl_list_lookup(struct acl_list* acl, struct sockaddr_storage* addr,
167 socklen_t addrlen)
168 {
169 struct acl_addr* r = (struct acl_addr*)addr_tree_lookup(&acl->tree,
170 addr, addrlen);
171 if(r) return r->control;
172 return acl_deny;
173 }
174
175 size_t
176 acl_list_get_mem(struct acl_list* acl)
177 {
178 if(!acl) return 0;
179 return sizeof(*acl) + regional_get_mem(acl->region);
180 }