1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3 *
4 * Copyright (c) 2004-2008 Sam Leffler, Errno Consulting
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
30
31 /*
32 * IEEE 802.11 MAC ACL support.
33 *
34 * When this module is loaded the sender address of each auth mgt
35 * frame is passed to the iac_check method and the module indicates
36 * if the frame should be accepted or rejected. If the policy is
37 * set to ACL_POLICY_OPEN then all frames are accepted w/o checking
38 * the address. Otherwise, the address is looked up in the database
39 * and if found the frame is either accepted (ACL_POLICY_ALLOW)
40 * or rejected (ACL_POLICY_DENT).
41 */
42 #include "opt_wlan.h"
43
44 #include <sys/param.h>
45 #include <sys/kernel.h>
46 #include <sys/systm.h>
47 #include <sys/malloc.h>
48 #include <sys/mbuf.h>
49 #include <sys/module.h>
50 #include <sys/queue.h>
51
52 #include <sys/socket.h>
53
54 #include <net/if.h>
55 #include <net/if_media.h>
56 #include <net/ethernet.h>
57 #include <net/route.h>
58
59 #include <net80211/ieee80211_var.h>
60
61 enum {
62 ACL_POLICY_OPEN = 0, /* open, don't check ACL's */
63 ACL_POLICY_ALLOW = 1, /* allow traffic from MAC */
64 ACL_POLICY_DENY = 2, /* deny traffic from MAC */
65 /*
66 * NB: ACL_POLICY_RADIUS must be the same value as
67 * IEEE80211_MACCMD_POLICY_RADIUS because of the way
68 * acl_getpolicy() works.
69 */
70 ACL_POLICY_RADIUS = 7, /* defer to RADIUS ACL server */
71 };
72
73 #define ACL_HASHSIZE 32
74
75 struct acl {
76 TAILQ_ENTRY(acl) acl_list;
77 LIST_ENTRY(acl) acl_hash;
78 uint8_t acl_macaddr[IEEE80211_ADDR_LEN];
79 };
80 struct aclstate {
81 acl_lock_t as_lock;
82 int as_policy;
83 uint32_t as_nacls;
84 TAILQ_HEAD(, acl) as_list; /* list of all ACL's */
85 LIST_HEAD(, acl) as_hash[ACL_HASHSIZE];
86 struct ieee80211vap *as_vap;
87 };
88
89 /* simple hash is enough for variation of macaddr */
90 #define ACL_HASH(addr) \
91 (((const uint8_t *)(addr))[IEEE80211_ADDR_LEN - 1] % ACL_HASHSIZE)
92
93 static MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl");
94
95 static int acl_free_all(struct ieee80211vap *);
96
97 /* number of references from net80211 layer */
98 static int nrefs = 0;
99
100 static int
101 acl_attach(struct ieee80211vap *vap)
102 {
103 struct aclstate *as;
104
105 as = (struct aclstate *) IEEE80211_MALLOC(sizeof(struct aclstate),
106 M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
107 if (as == NULL)
108 return 0;
109 ACL_LOCK_INIT(as, "acl");
110 TAILQ_INIT(&as->as_list);
111 as->as_policy = ACL_POLICY_OPEN;
112 as->as_vap = vap;
113 vap->iv_as = as;
114 nrefs++; /* NB: we assume caller locking */
115 return 1;
116 }
117
118 static void
119 acl_detach(struct ieee80211vap *vap)
120 {
121 struct aclstate *as = vap->iv_as;
122
123 KASSERT(nrefs > 0, ("imbalanced attach/detach"));
124 nrefs--; /* NB: we assume caller locking */
125
126 acl_free_all(vap);
127 vap->iv_as = NULL;
128 ACL_LOCK_DESTROY(as);
129 IEEE80211_FREE(as, M_80211_ACL);
130 }
131
132 static __inline struct acl *
133 _find_acl(struct aclstate *as, const uint8_t *macaddr)
134 {
135 struct acl *acl;
136 int hash;
137
138 hash = ACL_HASH(macaddr);
139 LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
140 if (IEEE80211_ADDR_EQ(acl->acl_macaddr, macaddr))
141 return acl;
142 }
143 return NULL;
144 }
145
146 static void
147 _acl_free(struct aclstate *as, struct acl *acl)
148 {
149 ACL_LOCK_ASSERT(as);
150
151 TAILQ_REMOVE(&as->as_list, acl, acl_list);
152 LIST_REMOVE(acl, acl_hash);
153 IEEE80211_FREE(acl, M_80211_ACL);
154 as->as_nacls--;
155 }
156
157 static int
158 acl_check(struct ieee80211vap *vap, const struct ieee80211_frame *wh)
159 {
160 struct aclstate *as = vap->iv_as;
161
162 switch (as->as_policy) {
163 case ACL_POLICY_OPEN:
164 case ACL_POLICY_RADIUS:
165 return 1;
166 case ACL_POLICY_ALLOW:
167 return _find_acl(as, wh->i_addr2) != NULL;
168 case ACL_POLICY_DENY:
169 return _find_acl(as, wh->i_addr2) == NULL;
170 }
171 return 0; /* should not happen */
172 }
173
174 static int
175 acl_add(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
176 {
177 struct aclstate *as = vap->iv_as;
178 struct acl *acl, *new;
179 int hash;
180
181 new = (struct acl *) IEEE80211_MALLOC(sizeof(struct acl),
182 M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
183 if (new == NULL) {
184 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
185 "ACL: add %s failed, no memory\n", ether_sprintf(mac));
186 /* XXX statistic */
187 return ENOMEM;
188 }
189
190 ACL_LOCK(as);
191 hash = ACL_HASH(mac);
192 LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
193 if (IEEE80211_ADDR_EQ(acl->acl_macaddr, mac)) {
194 ACL_UNLOCK(as);
195 IEEE80211_FREE(new, M_80211_ACL);
196 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
197 "ACL: add %s failed, already present\n",
198 ether_sprintf(mac));
199 return EEXIST;
200 }
201 }
202 IEEE80211_ADDR_COPY(new->acl_macaddr, mac);
203 TAILQ_INSERT_TAIL(&as->as_list, new, acl_list);
204 LIST_INSERT_HEAD(&as->as_hash[hash], new, acl_hash);
205 as->as_nacls++;
206 ACL_UNLOCK(as);
207
208 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
209 "ACL: add %s\n", ether_sprintf(mac));
210 return 0;
211 }
212
213 static int
214 acl_remove(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
215 {
216 struct aclstate *as = vap->iv_as;
217 struct acl *acl;
218
219 ACL_LOCK(as);
220 acl = _find_acl(as, mac);
221 if (acl != NULL)
222 _acl_free(as, acl);
223 ACL_UNLOCK(as);
224
225 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
226 "ACL: remove %s%s\n", ether_sprintf(mac),
227 acl == NULL ? ", not present" : "");
228
229 return (acl == NULL ? ENOENT : 0);
230 }
231
232 static int
233 acl_free_all(struct ieee80211vap *vap)
234 {
235 struct aclstate *as = vap->iv_as;
236 struct acl *acl;
237
238 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL, "ACL: %s\n", "free all");
239
240 ACL_LOCK(as);
241 while ((acl = TAILQ_FIRST(&as->as_list)) != NULL)
242 _acl_free(as, acl);
243 ACL_UNLOCK(as);
244
245 return 0;
246 }
247
248 static int
249 acl_setpolicy(struct ieee80211vap *vap, int policy)
250 {
251 struct aclstate *as = vap->iv_as;
252
253 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
254 "ACL: set policy to %u\n", policy);
255
256 switch (policy) {
257 case IEEE80211_MACCMD_POLICY_OPEN:
258 as->as_policy = ACL_POLICY_OPEN;
259 break;
260 case IEEE80211_MACCMD_POLICY_ALLOW:
261 as->as_policy = ACL_POLICY_ALLOW;
262 break;
263 case IEEE80211_MACCMD_POLICY_DENY:
264 as->as_policy = ACL_POLICY_DENY;
265 break;
266 case IEEE80211_MACCMD_POLICY_RADIUS:
267 as->as_policy = ACL_POLICY_RADIUS;
268 break;
269 default:
270 return EINVAL;
271 }
272 return 0;
273 }
274
275 static int
276 acl_getpolicy(struct ieee80211vap *vap)
277 {
278 struct aclstate *as = vap->iv_as;
279
280 return as->as_policy;
281 }
282
283 static int
284 acl_setioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
285 {
286
287 return EINVAL;
288 }
289
290 static int
291 acl_getioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
292 {
293 struct aclstate *as = vap->iv_as;
294 struct acl *acl;
295 struct ieee80211req_maclist *ap;
296 int error;
297 uint32_t i, space;
298
299 switch (ireq->i_val) {
300 case IEEE80211_MACCMD_POLICY:
301 ireq->i_val = as->as_policy;
302 return 0;
303 case IEEE80211_MACCMD_LIST:
304 space = as->as_nacls * IEEE80211_ADDR_LEN;
305 if (ireq->i_len == 0) {
306 ireq->i_len = space; /* return required space */
307 return 0; /* NB: must not error */
308 }
309 ap = (struct ieee80211req_maclist *) IEEE80211_MALLOC(space,
310 M_TEMP, IEEE80211_M_NOWAIT);
311 if (ap == NULL)
312 return ENOMEM;
313 i = 0;
314 ACL_LOCK(as);
315 TAILQ_FOREACH(acl, &as->as_list, acl_list) {
316 IEEE80211_ADDR_COPY(ap[i].ml_macaddr, acl->acl_macaddr);
317 i++;
318 }
319 ACL_UNLOCK(as);
320 if (ireq->i_len >= space) {
321 error = copyout(ap, ireq->i_data, space);
322 ireq->i_len = space;
323 } else
324 error = copyout(ap, ireq->i_data, ireq->i_len);
325 IEEE80211_FREE(ap, M_TEMP);
326 return error;
327 }
328 return EINVAL;
329 }
330
331 static const struct ieee80211_aclator mac = {
332 .iac_name = "mac",
333 .iac_attach = acl_attach,
334 .iac_detach = acl_detach,
335 .iac_check = acl_check,
336 .iac_add = acl_add,
337 .iac_remove = acl_remove,
338 .iac_flush = acl_free_all,
339 .iac_setpolicy = acl_setpolicy,
340 .iac_getpolicy = acl_getpolicy,
341 .iac_setioctl = acl_setioctl,
342 .iac_getioctl = acl_getioctl,
343 };
344 IEEE80211_ACL_MODULE(wlan_acl, mac, 1);
Cache object: eeb9c84e3e91254e6e99f2ff797a7bcd
|