2 * Copyright (C) 2008 Martin Willi
3 * Hochschule fuer Technik Rapperswil
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
19 #include "medcli_config.h"
22 #include <processing/jobs/callback_job.h>
24 typedef struct private_medcli_config_t private_medcli_config_t
;
27 * Private data of an medcli_config_t object
29 struct private_medcli_config_t
{
34 medcli_config_t
public;
58 * create a traffic selector from a CIDR notation string
60 static traffic_selector_t
*ts_from_string(char *str
)
69 pos
= strchr(str
, '/');
82 net
= host_create_from_string(str
, 0);
85 return traffic_selector_create_from_subnet(net
, netbits
, 0, 0);
88 return traffic_selector_create_dynamic(0, 0, 65535);
91 METHOD(backend_t
, get_peer_cfg_by_name
, peer_cfg_t
*,
92 private_medcli_config_t
*this, char *name
)
95 peer_cfg_t
*peer_cfg
, *med_cfg
;
98 child_cfg_t
*child_cfg
;
100 char *address
, *local_net
, *remote_net
;
101 lifetime_cfg_t lifetime
= {
103 .life
= this->rekey
* 60 + this->rekey
,
104 .rekey
= this->rekey
,
105 .jitter
= this->rekey
109 /* query mediation server config:
110 * - build ike_cfg/peer_cfg for mediation connection on-the-fly
112 e
= this->db
->query(this->db
,
113 "SELECT Address, ClientConfig.KeyId, MediationServerConfig.KeyId "
114 "FROM MediationServerConfig JOIN ClientConfig",
115 DB_TEXT
, DB_BLOB
, DB_BLOB
);
116 if (!e
|| !e
->enumerate(e
, &address
, &me
, &other
))
121 ike_cfg
= ike_cfg_create(FALSE
, FALSE
,
122 "0.0.0.0", FALSE
, charon
->socket
->get_port(charon
->socket
, FALSE
),
123 address
, FALSE
, IKEV2_UDP_PORT
);
124 ike_cfg
->add_proposal(ike_cfg
, proposal_create_default(PROTO_IKE
));
125 med_cfg
= peer_cfg_create(
126 "mediation", IKEV2
, ike_cfg
,
127 CERT_NEVER_SEND
, UNIQUE_REPLACE
,
128 1, this->rekey
*60, 0, /* keytries, rekey, reauth */
129 this->rekey
*5, this->rekey
*3, /* jitter, overtime */
130 TRUE
, FALSE
, /* mobike, aggressive */
131 this->dpd
, 0, /* DPD delay, timeout */
132 TRUE
, NULL
, NULL
); /* mediation, med by, peer id */
135 auth
= auth_cfg_create();
136 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
137 auth
->add(auth
, AUTH_RULE_IDENTITY
,
138 identification_create_from_encoding(ID_KEY_ID
, me
));
139 med_cfg
->add_auth_cfg(med_cfg
, auth
, TRUE
);
140 auth
= auth_cfg_create();
141 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
142 auth
->add(auth
, AUTH_RULE_IDENTITY
,
143 identification_create_from_encoding(ID_KEY_ID
, other
));
144 med_cfg
->add_auth_cfg(med_cfg
, auth
, FALSE
);
146 /* query mediated config:
147 * - use any-any ike_cfg
148 * - build peer_cfg on-the-fly using med_cfg
151 e
= this->db
->query(this->db
,
152 "SELECT ClientConfig.KeyId, Connection.KeyId, "
153 "Connection.LocalSubnet, Connection.RemoteSubnet "
154 "FROM ClientConfig JOIN Connection "
155 "WHERE Active AND Alias = ?", DB_TEXT
, name
,
156 DB_BLOB
, DB_BLOB
, DB_TEXT
, DB_TEXT
);
157 if (!e
|| !e
->enumerate(e
, &me
, &other
, &local_net
, &remote_net
))
162 peer_cfg
= peer_cfg_create(
163 name
, IKEV2
, this->ike
->get_ref(this->ike
),
164 CERT_NEVER_SEND
, UNIQUE_REPLACE
,
165 1, this->rekey
*60, 0, /* keytries, rekey, reauth */
166 this->rekey
*5, this->rekey
*3, /* jitter, overtime */
167 TRUE
, FALSE
, /* mobike, aggressive */
168 this->dpd
, 0, /* DPD delay, timeout */
169 FALSE
, med_cfg
, /* mediation, med by */
170 identification_create_from_encoding(ID_KEY_ID
, other
));
172 auth
= auth_cfg_create();
173 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
174 auth
->add(auth
, AUTH_RULE_IDENTITY
,
175 identification_create_from_encoding(ID_KEY_ID
, me
));
176 peer_cfg
->add_auth_cfg(peer_cfg
, auth
, TRUE
);
177 auth
= auth_cfg_create();
178 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
179 auth
->add(auth
, AUTH_RULE_IDENTITY
,
180 identification_create_from_encoding(ID_KEY_ID
, other
));
181 peer_cfg
->add_auth_cfg(peer_cfg
, auth
, FALSE
);
183 child_cfg
= child_cfg_create(name
, &lifetime
, NULL
, TRUE
, MODE_TUNNEL
,
184 ACTION_NONE
, ACTION_NONE
, ACTION_NONE
, FALSE
,
185 0, 0, NULL
, NULL
, 0);
186 child_cfg
->add_proposal(child_cfg
, proposal_create_default(PROTO_ESP
));
187 child_cfg
->add_traffic_selector(child_cfg
, TRUE
, ts_from_string(local_net
));
188 child_cfg
->add_traffic_selector(child_cfg
, FALSE
, ts_from_string(remote_net
));
189 peer_cfg
->add_child_cfg(peer_cfg
, child_cfg
);
194 METHOD(backend_t
, create_ike_cfg_enumerator
, enumerator_t
*,
195 private_medcli_config_t
*this, host_t
*me
, host_t
*other
)
197 return enumerator_create_single(this->ike
, NULL
);
201 /** implements enumerator */
203 /** inner SQL enumerator */
205 /** currently enumerated peer config */
207 /** ike cfg to use in peer cfg */
215 METHOD(enumerator_t
, peer_enumerator_enumerate
, bool,
216 peer_enumerator_t
*this, peer_cfg_t
**cfg
)
218 char *name
, *local_net
, *remote_net
;
220 child_cfg_t
*child_cfg
;
222 lifetime_cfg_t lifetime
= {
224 .life
= this->rekey
* 60 + this->rekey
,
225 .rekey
= this->rekey
,
226 .jitter
= this->rekey
230 DESTROY_IF(this->current
);
231 if (!this->inner
->enumerate(this->inner
, &name
, &me
, &other
,
232 &local_net
, &remote_net
))
234 this->current
= NULL
;
237 this->current
= peer_cfg_create(
238 name
, IKEV2
, this->ike
->get_ref(this->ike
),
239 CERT_NEVER_SEND
, UNIQUE_REPLACE
,
240 1, this->rekey
*60, 0, /* keytries, rekey, reauth */
241 this->rekey
*5, this->rekey
*3, /* jitter, overtime */
242 TRUE
, FALSE
, /* mobike, aggressive */
243 this->dpd
, 0, /* DPD delay, timeout */
244 FALSE
, NULL
, NULL
); /* mediation, med by, peer id */
246 auth
= auth_cfg_create();
247 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
248 auth
->add(auth
, AUTH_RULE_IDENTITY
,
249 identification_create_from_encoding(ID_KEY_ID
, me
));
250 this->current
->add_auth_cfg(this->current
, auth
, TRUE
);
251 auth
= auth_cfg_create();
252 auth
->add(auth
, AUTH_RULE_AUTH_CLASS
, AUTH_CLASS_PUBKEY
);
253 auth
->add(auth
, AUTH_RULE_IDENTITY
,
254 identification_create_from_encoding(ID_KEY_ID
, other
));
255 this->current
->add_auth_cfg(this->current
, auth
, FALSE
);
257 child_cfg
= child_cfg_create(name
, &lifetime
, NULL
, TRUE
, MODE_TUNNEL
,
258 ACTION_NONE
, ACTION_NONE
, ACTION_NONE
, FALSE
,
259 0, 0, NULL
, NULL
, 0);
260 child_cfg
->add_proposal(child_cfg
, proposal_create_default(PROTO_ESP
));
261 child_cfg
->add_traffic_selector(child_cfg
, TRUE
, ts_from_string(local_net
));
262 child_cfg
->add_traffic_selector(child_cfg
, FALSE
, ts_from_string(remote_net
));
263 this->current
->add_child_cfg(this->current
, child_cfg
);
264 *cfg
= this->current
;
268 METHOD(enumerator_t
, peer_enumerator_destroy
, void,
269 peer_enumerator_t
*this)
271 DESTROY_IF(this->current
);
272 this->inner
->destroy(this->inner
);
276 METHOD(backend_t
, create_peer_cfg_enumerator
, enumerator_t
*,
277 private_medcli_config_t
*this, identification_t
*me
,
278 identification_t
*other
)
280 peer_enumerator_t
*e
;
284 .enumerate
= (void*)_peer_enumerator_enumerate
,
285 .destroy
= _peer_enumerator_destroy
,
288 .rekey
= this->rekey
,
292 /* filter on IDs: NULL or ANY or matching KEY_ID */
293 e
->inner
= this->db
->query(this->db
,
294 "SELECT Alias, ClientConfig.KeyId, Connection.KeyId, "
295 "Connection.LocalSubnet, Connection.RemoteSubnet "
296 "FROM ClientConfig JOIN Connection "
298 "(? OR ClientConfig.KeyId = ?) AND (? OR Connection.KeyId = ?)",
299 DB_INT
, me
== NULL
|| me
->get_type(me
) == ID_ANY
,
300 DB_BLOB
, me
&& me
->get_type(me
) == ID_KEY_ID
?
301 me
->get_encoding(me
) : chunk_empty
,
302 DB_INT
, other
== NULL
|| other
->get_type(other
) == ID_ANY
,
303 DB_BLOB
, other
&& other
->get_type(other
) == ID_KEY_ID
?
304 other
->get_encoding(other
) : chunk_empty
,
305 DB_TEXT
, DB_BLOB
, DB_BLOB
, DB_TEXT
, DB_TEXT
);
315 * initiate a peer config
317 static job_requeue_t
initiate_config(peer_cfg_t
*peer_cfg
)
319 enumerator_t
*enumerator
;
320 child_cfg_t
*child_cfg
= NULL
;;
322 enumerator
= peer_cfg
->create_child_cfg_enumerator(peer_cfg
);
323 enumerator
->enumerate(enumerator
, &child_cfg
);
326 child_cfg
->get_ref(child_cfg
);
327 peer_cfg
->get_ref(peer_cfg
);
328 enumerator
->destroy(enumerator
);
329 charon
->controller
->initiate(charon
->controller
,
330 peer_cfg
, child_cfg
, NULL
, NULL
, 0);
334 enumerator
->destroy(enumerator
);
336 return JOB_REQUEUE_NONE
;
340 * schedule initiation of all "active" connections
342 static void schedule_autoinit(private_medcli_config_t
*this)
347 e
= this->db
->query(this->db
, "SELECT Alias FROM Connection WHERE Active",
351 while (e
->enumerate(e
, &name
))
353 peer_cfg_t
*peer_cfg
;
355 peer_cfg
= get_peer_cfg_by_name(this, name
);
358 /* schedule asynchronous initiation job */
359 lib
->processor
->queue_job(lib
->processor
,
360 (job_t
*)callback_job_create(
361 (callback_job_cb_t
)initiate_config
,
362 peer_cfg
, (void*)peer_cfg
->destroy
, NULL
));
369 METHOD(medcli_config_t
, destroy
, void,
370 private_medcli_config_t
*this)
372 this->ike
->destroy(this->ike
);
377 * Described in header.
379 medcli_config_t
*medcli_config_create(database_t
*db
)
381 private_medcli_config_t
*this;
386 .create_peer_cfg_enumerator
= _create_peer_cfg_enumerator
,
387 .create_ike_cfg_enumerator
= _create_ike_cfg_enumerator
,
388 .get_peer_cfg_by_name
= _get_peer_cfg_by_name
,
393 .rekey
= lib
->settings
->get_time(lib
->settings
, "medcli.rekey", 1200),
394 .dpd
= lib
->settings
->get_time(lib
->settings
, "medcli.dpd", 300),
395 .ike
= ike_cfg_create(FALSE
, FALSE
,
396 "0.0.0.0", FALSE
, charon
->socket
->get_port(charon
->socket
, FALSE
),
397 "0.0.0.0", FALSE
, IKEV2_UDP_PORT
),
399 this->ike
->add_proposal(this->ike
, proposal_create_default(PROTO_IKE
));
401 schedule_autoinit(this);
403 return &this->public;