3 * Discover the owner of a connection (Linux version)
5 * (c) 2012 Straylight/Edgeware
8 /*----- Licensing notice --------------------------------------------------*
10 * This file is part of Yet Another Ident Daemon (YAID).
12 * YAID is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * YAID is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with YAID; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
27 /*----- Header files ------------------------------------------------------*/
31 /*----- Static variables --------------------------------------------------*/
35 int (*parseaddr)(char **, union addr *);
38 static int parseaddr_ipv4(char **pp, union addr *a)
39 { a->ipv4.s_addr = strtoul(*pp, pp, 16); return (0); }
41 const struct addrops_sys addrops_sys_ipv4 = {
42 "/proc/net/tcp", parseaddr_ipv4
45 static int parseaddr_ipv6(char **pp, union addr *a)
52 for (i = 0; i < 4; i++) {
54 for (j = 0; j < 8; j++) {
55 if ('0' <= *p && *p <= '9') x = *p - '0';
56 else if ('a' <= *p && *p <= 'f') x = *p - 'a'+ 10;
57 else if ('A' <= *p && *p <= 'F') x = *p - 'A'+ 10;
62 a->ipv6.s6_addr32[i] = y;
68 const struct addrops_sys addrops_sys_ipv6 = {
69 "/proc/net/tcp6", parseaddr_ipv6
72 /*----- Main code ---------------------------------------------------------*/
74 int get_default_gw(int af, union addr *a)
78 struct nlmsghdr *nlmsg;
79 struct rtgenmsg *rtgen;
80 const struct rtattr *rta;
81 const struct rtmsg *rtm;
84 static unsigned long seq = 0x48b4aec4;
86 if ((fd = socket(AF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE)) < 0)
87 die(1, "failed to create netlink socket: %s", strerror(errno));
89 nlmsg = (struct nlmsghdr *)buf;
90 assert(NLMSG_SPACE(sizeof(*rtgen)) < sizeof(buf));
91 nlmsg->nlmsg_len = NLMSG_LENGTH(sizeof(*rtgen));
92 nlmsg->nlmsg_type = RTM_GETROUTE;
93 nlmsg->nlmsg_flags = NLM_F_REQUEST | NLM_F_ROOT;
94 nlmsg->nlmsg_seq = ++seq;
97 rtgen = (struct rtgenmsg *)NLMSG_DATA(nlmsg);
98 rtgen->rtgen_family = af;
100 if (write(fd, nlmsg, nlmsg->nlmsg_len) < 0)
101 die(1, "failed to send RTM_GETROUTE request: %s", strerror(errno));
104 if ((n = read(fd, buf, sizeof(buf))) < 0)
105 die(1, "failed to read RTM_GETROUTE response: %s", strerror(errno));
106 nlmsg = (struct nlmsghdr *)buf;
107 if (nlmsg->nlmsg_seq != seq) continue;
108 assert(nlmsg->nlmsg_flags & NLM_F_MULTI);
110 for (; NLMSG_OK(nlmsg, n); nlmsg = NLMSG_NEXT(nlmsg, n)) {
111 if (nlmsg->nlmsg_type == NLMSG_DONE) goto done;
112 if (nlmsg->nlmsg_type != RTM_NEWROUTE) continue;
113 rtm = (const struct rtmsg *)NLMSG_DATA(nlmsg);
115 if (rtm->rtm_family != af ||
116 rtm->rtm_dst_len > 0 ||
117 rtm->rtm_src_len > 0 ||
118 rtm->rtm_type != RTN_UNICAST ||
119 rtm->rtm_scope != RT_SCOPE_UNIVERSE ||
123 for (rta = RTM_RTA(rtm), nn = RTM_PAYLOAD(nlmsg);
124 RTA_OK(rta, nn); rta = RTA_NEXT(rta, nn)) {
125 if (rta->rta_type == RTA_GATEWAY) {
126 assert(RTA_PAYLOAD(rta) <= sizeof(*a));
127 memcpy(a, RTA_DATA(rta), RTA_PAYLOAD(rta));
139 void identify(struct query *q)
152 #define F_ALL (F_SADDR | F_SPORT | F_DADDR | F_DPORT)
155 enum { LOC, REM, ST, UID, NFIELD };
158 if (get_default_gw(q->ao->af, &s[0].addr) &&
159 q->ao->addreq(&s[0].addr, &q->s[R].addr))
162 if ((fp = fopen(q->ao->sys->procfile, "r")) == 0) {
163 logmsg(q, LOG_ERR, "failed to open `%s' for reading: %s",
164 q->ao->sys->procfile, strerror(errno));
168 #define NEXTFIELD do { \
169 for (p = pp; isspace((unsigned char)*p); p++); \
170 for (pp = p; *pp && !isspace((unsigned char)*pp); pp++); \
171 if (*pp) *pp++ = 0; \
174 if (dstr_putline(&d, fp) == EOF) {
175 logmsg(q, LOG_ERR, "failed to read header line from `%s': %s",
176 q->ao->sys->procfile,
177 ferror(fp) ? strerror(errno) : "unexpected EOF");
181 for (i = 0; i < NFIELD; i++) ff[i] = -1;
184 NEXTFIELD; if (!*p) break;
185 if (strcmp(p, "local_address") == 0)
187 else if (strcmp(p, "rem_address") == 0 ||
188 strcmp(p, "remote_address") == 0)
190 else if (strcmp(p, "uid") == 0)
192 else if (strcmp(p, "st") == 0)
194 else if (strcmp(p, "rx_queue") == 0 ||
195 strcmp(p, "tm->when") == 0)
198 for (i = 0; i < NFIELD; i++) {
200 logmsg(q, LOG_ERR, "failed to find required fields in `%s'",
201 q->ao->sys->procfile);
208 if (dstr_putline(&d, fp) == EOF) break;
212 NEXTFIELD; if (!*p) break;
213 if (f == ff[LOC]) { i = L; goto compare; }
214 else if (f == ff[REM]) { i = R; goto compare; }
215 else if (f == ff[UID]) uid = atoi(p);
216 else if (f == ff[ST]) {
217 if (strtol(p, 0, 16) != 1) goto next_row;
222 if (q->ao->sys->parseaddr(&p, &s[0].addr)) goto next_row;
223 if (*p != ':') break; p++;
224 s[0].port = strtoul(p, 0, 16);
225 if (!sockeq(q->ao, &q->s[i], &s[0]) &&
226 (i != R || !gwp || q->s[R].port != s[0].port))
238 logmsg(q, LOG_ERR, "failed to read connection table: %s",
243 if (q->ao->af == AF_INET) {
245 if ((fp = fopen("/proc/net/ip_conntrack", "r")) == 0) {
250 "failed to open `/proc/net/ip_conntrack' for reading: %s",
258 if (dstr_putline(&d, fp) == EOF) break;
260 NEXTFIELD; if (!*p) break;
261 if (strcmp(p, "tcp") != 0) continue;
265 NEXTFIELD; if (!*p) break;
266 if (strcmp(p, "ESTABLISHED") == 0)
268 else if (strncmp(p, "src=", 4) == 0) {
269 inet_pton(AF_INET, p + 4, &s[i].addr);
271 } else if (strncmp(p, "dst=", 4) == 0) {
272 inet_pton(AF_INET, p + 4, &s[i + 1].addr);
274 } else if (strncmp(p, "sport=", 6) == 0) {
275 s[i].port = atoi(p + 6);
277 } else if (strncmp(p, "dport=", 6) == 0) {
278 s[i + 1].port = atoi(p + 6);
281 if ((fl & F_ALL) == F_ALL) {
291 dstr_putf(&dd, "%sestab ", (fl & F_ESTAB) ? " " : "!");
292 dputsock(&dd, q->ao, &s[0]);
293 dstr_puts(&dd, "<->");
294 dputsock(&dd, q->ao, &s[1]);
295 dstr_puts(&dd, " | ");
296 dputsock(&dd, q->ao, &s[2]);
297 dstr_puts(&dd, "<->");
298 dputsock(&dd, q->ao, &s[3]);
299 printf("parsed: %s\n", dd.buf);
304 if (!(fl & F_ESTAB)) continue;
306 for (i = 0; i < 4; i++)
307 if (sockeq(q->ao, &s[i], &q->s[L])) goto found_local;
311 if (!sockeq(q->ao, &s[i^1], &s[i^2]) ||
312 !sockeq(q->ao, &s[i^1], &q->s[R]))
320 logmsg(q, LOG_ERR, "failed to read `/proc/net/ip_conntrack': %s",
324 logmsg(q, LOG_ERR, "connection not found");
331 q->u.error = E_NOUSER;
335 q->u.error = E_UNKNOWN;
341 /*----- That's all, folks -------------------------------------------------*/