/* * Copyright (C) 2016 Tobias Brunner * Copyright (C) 2006-2007 Martin Willi * HSR Hochschule fuer Technik Rapperswil * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "ike_delete.h" #include #include #include typedef struct private_ike_delete_t private_ike_delete_t; /** * Private members of a ike_delete_t task. */ struct private_ike_delete_t { /** * Public methods and task_t interface. */ ike_delete_t public; /** * Assigned IKE_SA. */ ike_sa_t *ike_sa; /** * Are we the initiator? */ bool initiator; /** * are we deleting a rekeyed SA? */ bool rekeyed; }; METHOD(task_t, build_i, status_t, private_ike_delete_t *this, message_t *message) { delete_payload_t *delete_payload; DBG0(DBG_IKE, "deleting IKE_SA %s[%d] between %H[%Y]...%H[%Y]", this->ike_sa->get_name(this->ike_sa), this->ike_sa->get_unique_id(this->ike_sa), this->ike_sa->get_my_host(this->ike_sa), this->ike_sa->get_my_id(this->ike_sa), this->ike_sa->get_other_host(this->ike_sa), this->ike_sa->get_other_id(this->ike_sa)); delete_payload = delete_payload_create(PLV2_DELETE, PROTO_IKE); message->add_payload(message, (payload_t*)delete_payload); if (this->ike_sa->get_state(this->ike_sa) == IKE_REKEYING || this->ike_sa->get_state(this->ike_sa) == IKE_REKEYED) { this->rekeyed = TRUE; } this->ike_sa->set_state(this->ike_sa, IKE_DELETING); DBG1(DBG_IKE, "sending DELETE for IKE_SA %s[%d]", this->ike_sa->get_name(this->ike_sa), this->ike_sa->get_unique_id(this->ike_sa)); return NEED_MORE; } METHOD(task_t, process_i, status_t, private_ike_delete_t *this, message_t *message) { DBG0(DBG_IKE, "IKE_SA deleted"); if (!this->rekeyed) { /* invoke ike_down() hook if SA has not been rekeyed */ charon->bus->ike_updown(charon->bus, this->ike_sa, FALSE); } /* completed, delete IKE_SA by returning DESTROY_ME */ return DESTROY_ME; } /** * Check if this delete happened after a rekey collision */ static bool after_rekey_collision(private_ike_delete_t *this) { enumerator_t *tasks; task_t *task; tasks = this->ike_sa->create_task_enumerator(this->ike_sa, TASK_QUEUE_ACTIVE); while (tasks->enumerate(tasks, &task)) { if (task->get_type(task) == TASK_IKE_REKEY) { ike_rekey_t *rekey = (ike_rekey_t*)task; if (rekey->did_collide(rekey)) { tasks->destroy(tasks); return TRUE; } } } tasks->destroy(tasks); return FALSE; } METHOD(task_t, process_r, status_t, private_ike_delete_t *this, message_t *message) { /* we don't even scan the payloads, as the message wouldn't have * come so far without being correct */ DBG1(DBG_IKE, "received DELETE for IKE_SA %s[%d]", this->ike_sa->get_name(this->ike_sa), this->ike_sa->get_unique_id(this->ike_sa)); DBG0(DBG_IKE, "deleting IKE_SA %s[%d] between %H[%Y]...%H[%Y]", this->ike_sa->get_name(this->ike_sa), this->ike_sa->get_unique_id(this->ike_sa), this->ike_sa->get_my_host(this->ike_sa), this->ike_sa->get_my_id(this->ike_sa), this->ike_sa->get_other_host(this->ike_sa), this->ike_sa->get_other_id(this->ike_sa)); if (message->get_exchange_type(message) == INFORMATIONAL && message->get_notify(message, AUTHENTICATION_FAILED)) { /* a late AUTHENTICATION_FAILED notify from the initiator after * we have established the IKE_SA: signal auth failure */ charon->bus->alert(charon->bus, ALERT_LOCAL_AUTH_FAILED); } switch (this->ike_sa->get_state(this->ike_sa)) { case IKE_REKEYING: /* if the peer concurrently deleted the IKE_SA we treat this as * regular delete. however, in case the peer did not detect a rekey * collision it will delete the replaced IKE_SA if we are still in * state IKE_REKEYING */ if (after_rekey_collision(this)) { this->rekeyed = TRUE; break; } /* fall-through */ case IKE_ESTABLISHED: this->ike_sa->set_state(this->ike_sa, IKE_DELETING); this->ike_sa->reestablish(this->ike_sa); return NEED_MORE; case IKE_REKEYED: this->rekeyed = TRUE; break; default: break; } this->ike_sa->set_state(this->ike_sa, IKE_DELETING); return NEED_MORE; } /** * Check if we are currently deleting this IKE_SA in a break-before-make reauth. */ static bool is_reauthenticating(private_ike_delete_t *this) { enumerator_t *tasks; task_t *task; if (!this->ike_sa->has_condition(this->ike_sa, COND_REAUTHENTICATING)) { return FALSE; } tasks = this->ike_sa->create_task_enumerator(this->ike_sa, TASK_QUEUE_ACTIVE); while (tasks->enumerate(tasks, &task)) { if (task->get_type(task) == TASK_IKE_REAUTH) { tasks->destroy(tasks); return TRUE; } } tasks->destroy(tasks); return FALSE; } METHOD(task_t, build_r, status_t, private_ike_delete_t *this, message_t *message) { DBG0(DBG_IKE, "IKE_SA deleted"); if (!this->rekeyed) { /* invoke ike_down() hook if SA has not been rekeyed */ charon->bus->ike_updown(charon->bus, this->ike_sa, FALSE); } /* if we are currently deleting this IKE_SA due to a break-before-make * reauthentication, make sure to not just silently destroy the SA if * the peer concurrently deletes it */ if (is_reauthenticating(this)) { if (this->ike_sa->reestablish(this->ike_sa) != SUCCESS) { DBG1(DBG_IKE, "reauthenticating IKE_SA failed"); } } /* completed, delete IKE_SA by returning DESTROY_ME */ return DESTROY_ME; } METHOD(task_t, get_type, task_type_t, private_ike_delete_t *this) { return TASK_IKE_DELETE; } METHOD(task_t, migrate, void, private_ike_delete_t *this, ike_sa_t *ike_sa) { this->ike_sa = ike_sa; } METHOD(task_t, destroy, void, private_ike_delete_t *this) { free(this); } /* * Described in header. */ ike_delete_t *ike_delete_create(ike_sa_t *ike_sa, bool initiator) { private_ike_delete_t *this; INIT(this, .public = { .task = { .get_type = _get_type, .migrate = _migrate, .destroy = _destroy, }, }, .ike_sa = ike_sa, .initiator = initiator, ); if (initiator) { this->public.task.build = _build_i; this->public.task.process = _process_i; } else { this->public.task.build = _build_r; this->public.task.process = _process_r; } return &this->public; }