2010-06-15 10:48:01 +00:00
|
|
|
|
|
|
|
/* BSC Multiplexer/NAT Utilities */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* (C) 2010 by Holger Hans Peter Freyther <zecke@selfish.org>
|
|
|
|
* (C) 2010 by On-Waves
|
|
|
|
* All Rights Reserved
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
2011-01-01 14:25:50 +00:00
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 3 of the License, or
|
2010-06-15 10:48:01 +00:00
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2011-01-01 14:25:50 +00:00
|
|
|
* GNU Affero General Public License for more details.
|
2010-06-15 10:48:01 +00:00
|
|
|
*
|
2011-01-01 14:25:50 +00:00
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2010-06-15 10:48:01 +00:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <openbsc/bsc_nat.h>
|
2010-07-30 21:17:17 +00:00
|
|
|
#include <openbsc/bsc_nat_sccp.h>
|
2010-07-05 06:39:44 +00:00
|
|
|
#include <openbsc/bsc_msc.h>
|
2010-06-15 10:48:01 +00:00
|
|
|
#include <openbsc/gsm_data.h>
|
2010-03-30 03:57:42 +00:00
|
|
|
#include <openbsc/debug.h>
|
2010-04-01 06:21:33 +00:00
|
|
|
#include <openbsc/ipaccess.h>
|
2010-10-12 21:21:54 +00:00
|
|
|
#include <openbsc/vty.h>
|
2010-06-15 10:48:01 +00:00
|
|
|
|
2010-03-30 03:57:42 +00:00
|
|
|
#include <osmocore/linuxlist.h>
|
2010-06-15 10:48:01 +00:00
|
|
|
#include <osmocore/talloc.h>
|
2010-06-15 10:50:57 +00:00
|
|
|
#include <osmocore/gsm0808.h>
|
2010-06-15 10:48:01 +00:00
|
|
|
|
2010-06-15 12:13:33 +00:00
|
|
|
#include <osmocore/protocol/gsm_08_08.h>
|
|
|
|
|
2010-08-03 13:11:51 +00:00
|
|
|
#include <osmocom/sccp/sccp.h>
|
2010-03-30 08:45:48 +00:00
|
|
|
|
2010-03-30 03:57:42 +00:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
2010-10-13 18:37:13 +00:00
|
|
|
#include <unistd.h>
|
2010-03-30 03:57:42 +00:00
|
|
|
|
2010-06-17 10:16:00 +00:00
|
|
|
static const struct rate_ctr_desc bsc_cfg_ctr_description[] = {
|
2010-06-17 10:31:18 +00:00
|
|
|
[BCFG_CTR_SCCP_CONN] = { "sccp.conn", "SCCP Connections "},
|
|
|
|
[BCFG_CTR_SCCP_CALLS] = { "sccp.calls", "SCCP Assignment Commands "},
|
|
|
|
[BCFG_CTR_NET_RECONN] = { "net.reconnects", "Network reconnects "},
|
|
|
|
[BCFG_CTR_DROPPED_SCCP] = { "dropped.sccp", "Dropped SCCP connections."},
|
|
|
|
[BCFG_CTR_DROPPED_CALLS] = { "dropped.calls", "Dropped active calls. "},
|
2010-09-25 09:58:22 +00:00
|
|
|
[BCFG_CTR_REJECTED_CR] = { "rejected.cr", "Rejected CR due filter "},
|
|
|
|
[BCFG_CTR_REJECTED_MSG] = { "rejected.msg", "Rejected MSG due filter "},
|
|
|
|
[BCFG_CTR_ILL_PACKET] = { "rejected.ill", "Rejected due parse error "},
|
2010-10-03 11:41:42 +00:00
|
|
|
[BCFG_CTR_CON_TYPE_LU] = { "conn.lu", "Conn Location Update "},
|
|
|
|
[BCFG_CTR_CON_CMSERV_RQ] = { "conn.rq", "Conn CM Service Req "},
|
|
|
|
[BCFG_CTR_CON_PAG_RESP] = { "conn.pag", "Conn Paging Response "},
|
2010-09-28 18:47:29 +00:00
|
|
|
[BCFG_CTR_CON_SSA] = { "conn.ssa", "Conn USSD "},
|
2010-10-03 11:41:42 +00:00
|
|
|
[BCFG_CTR_CON_OTHER] = { "conn.other", "Conn Other "},
|
2010-06-17 10:16:00 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct rate_ctr_group_desc bsc_cfg_ctrg_desc = {
|
|
|
|
.group_name_prefix = "nat.bsc",
|
|
|
|
.group_description = "NAT BSC Statistics",
|
|
|
|
.num_ctr = ARRAY_SIZE(bsc_cfg_ctr_description),
|
|
|
|
.ctr_desc = bsc_cfg_ctr_description,
|
|
|
|
};
|
|
|
|
|
2010-09-24 22:14:52 +00:00
|
|
|
static const struct rate_ctr_desc acc_list_ctr_description[] = {
|
|
|
|
[ACC_LIST_BSC_FILTER] = { "access-list.bsc-filter", "Rejected by rule for BSC"},
|
|
|
|
[ACC_LIST_NAT_FILTER] = { "access-list.nat-filter", "Rejected by rule for NAT"},
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct rate_ctr_group_desc bsc_cfg_acc_list_desc = {
|
|
|
|
.group_name_prefix = "nat.filter",
|
|
|
|
.group_description = "NAT Access-List Statistics",
|
|
|
|
.num_ctr = ARRAY_SIZE(acc_list_ctr_description),
|
|
|
|
.ctr_desc = acc_list_ctr_description,
|
|
|
|
};
|
|
|
|
|
2010-06-15 10:48:01 +00:00
|
|
|
struct bsc_nat *bsc_nat_alloc(void)
|
|
|
|
{
|
|
|
|
struct bsc_nat *nat = talloc_zero(tall_bsc_ctx, struct bsc_nat);
|
|
|
|
if (!nat)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
INIT_LLIST_HEAD(&nat->sccp_connections);
|
|
|
|
INIT_LLIST_HEAD(&nat->bsc_connections);
|
|
|
|
INIT_LLIST_HEAD(&nat->bsc_configs);
|
2010-05-31 17:03:13 +00:00
|
|
|
INIT_LLIST_HEAD(&nat->access_lists);
|
|
|
|
|
2010-04-12 10:17:09 +00:00
|
|
|
nat->stats.sccp.conn = counter_alloc("nat.sccp.conn");
|
|
|
|
nat->stats.sccp.calls = counter_alloc("nat.sccp.calls");
|
|
|
|
nat->stats.bsc.reconn = counter_alloc("nat.bsc.conn");
|
|
|
|
nat->stats.bsc.auth_fail = counter_alloc("nat.bsc.auth_fail");
|
|
|
|
nat->stats.msc.reconn = counter_alloc("nat.msc.conn");
|
2010-10-13 18:22:36 +00:00
|
|
|
nat->stats.ussd.reconn = counter_alloc("nat.ussd.conn");
|
2010-06-15 10:51:04 +00:00
|
|
|
nat->msc_ip = talloc_strdup(nat, "127.0.0.1");
|
2010-04-17 05:48:45 +00:00
|
|
|
nat->msc_port = 5000;
|
2010-05-05 08:57:38 +00:00
|
|
|
nat->auth_timeout = 2;
|
|
|
|
nat->ping_timeout = 20;
|
|
|
|
nat->pong_timeout = 5;
|
2010-06-15 10:48:01 +00:00
|
|
|
return nat;
|
|
|
|
}
|
|
|
|
|
2010-06-15 10:51:04 +00:00
|
|
|
void bsc_nat_set_msc_ip(struct bsc_nat *nat, const char *ip)
|
|
|
|
{
|
2010-10-12 21:21:54 +00:00
|
|
|
bsc_replace_string(nat, &nat->msc_ip, ip);
|
2010-06-15 10:51:04 +00:00
|
|
|
}
|
|
|
|
|
2010-06-15 10:48:01 +00:00
|
|
|
struct bsc_connection *bsc_connection_alloc(struct bsc_nat *nat)
|
|
|
|
{
|
|
|
|
struct bsc_connection *con = talloc_zero(nat, struct bsc_connection);
|
|
|
|
if (!con)
|
|
|
|
return NULL;
|
|
|
|
|
2010-03-29 13:14:15 +00:00
|
|
|
con->nat = nat;
|
2010-04-22 04:05:23 +00:00
|
|
|
write_queue_init(&con->write_queue, 100);
|
2010-06-15 10:48:01 +00:00
|
|
|
return con;
|
|
|
|
}
|
|
|
|
|
2010-10-08 14:08:29 +00:00
|
|
|
struct bsc_config *bsc_config_alloc(struct bsc_nat *nat, const char *token)
|
2010-06-15 10:48:01 +00:00
|
|
|
{
|
|
|
|
struct bsc_config *conf = talloc_zero(nat, struct bsc_config);
|
|
|
|
if (!conf)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
conf->token = talloc_strdup(conf, token);
|
|
|
|
conf->nr = nat->num_bsc;
|
|
|
|
conf->nat = nat;
|
|
|
|
|
2010-10-08 14:08:29 +00:00
|
|
|
INIT_LLIST_HEAD(&conf->lac_list);
|
|
|
|
|
2010-04-16 14:52:20 +00:00
|
|
|
llist_add_tail(&conf->entry, &nat->bsc_configs);
|
2010-06-15 10:48:01 +00:00
|
|
|
++nat->num_bsc;
|
|
|
|
|
2010-10-08 14:08:29 +00:00
|
|
|
conf->stats.ctrg = rate_ctr_group_alloc(conf, &bsc_cfg_ctrg_desc, conf->nr);
|
2010-06-17 10:16:00 +00:00
|
|
|
if (!conf->stats.ctrg) {
|
|
|
|
talloc_free(conf);
|
|
|
|
return NULL;
|
|
|
|
}
|
2010-04-12 10:17:09 +00:00
|
|
|
|
2010-06-15 10:48:01 +00:00
|
|
|
return conf;
|
|
|
|
}
|
2010-03-30 03:57:42 +00:00
|
|
|
|
2010-10-08 14:08:29 +00:00
|
|
|
void bsc_config_add_lac(struct bsc_config *cfg, int _lac)
|
|
|
|
{
|
|
|
|
struct bsc_lac_entry *lac;
|
|
|
|
|
|
|
|
llist_for_each_entry(lac, &cfg->lac_list, entry)
|
|
|
|
if (lac->lac == _lac)
|
|
|
|
return;
|
|
|
|
|
|
|
|
lac = talloc_zero(cfg, struct bsc_lac_entry);
|
|
|
|
if (!lac) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to allocate.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
lac->lac = _lac;
|
|
|
|
llist_add_tail(&lac->entry, &cfg->lac_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
void bsc_config_del_lac(struct bsc_config *cfg, int _lac)
|
|
|
|
{
|
|
|
|
struct bsc_lac_entry *lac;
|
|
|
|
|
|
|
|
llist_for_each_entry(lac, &cfg->lac_list, entry)
|
|
|
|
if (lac->lac == _lac) {
|
|
|
|
llist_del(&lac->entry);
|
|
|
|
talloc_free(lac);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int bsc_config_handles_lac(struct bsc_config *cfg, int lac_nr)
|
|
|
|
{
|
|
|
|
struct bsc_lac_entry *entry;
|
|
|
|
|
|
|
|
llist_for_each_entry(entry, &cfg->lac_list, entry)
|
|
|
|
if (entry->lac == lac_nr)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-03-30 08:45:48 +00:00
|
|
|
void sccp_connection_destroy(struct sccp_connections *conn)
|
|
|
|
{
|
|
|
|
LOGP(DNAT, LOGL_DEBUG, "Destroy 0x%x <-> 0x%x mapping for con %p\n",
|
|
|
|
sccp_src_ref_to_int(&conn->real_ref),
|
|
|
|
sccp_src_ref_to_int(&conn->patched_ref), conn->bsc);
|
2010-04-22 04:08:17 +00:00
|
|
|
bsc_mgcp_dlcx(conn);
|
2010-03-30 08:45:48 +00:00
|
|
|
llist_del(&conn->list_entry);
|
|
|
|
talloc_free(conn);
|
|
|
|
}
|
|
|
|
|
2010-04-17 06:07:19 +00:00
|
|
|
struct bsc_connection *bsc_nat_find_bsc(struct bsc_nat *nat, struct msgb *msg, int *lac_out)
|
2010-03-30 03:57:42 +00:00
|
|
|
{
|
|
|
|
struct bsc_connection *bsc;
|
|
|
|
int data_length;
|
2010-07-23 11:08:55 +00:00
|
|
|
const uint8_t *data;
|
2010-03-30 03:57:42 +00:00
|
|
|
struct tlv_parsed tp;
|
|
|
|
int i = 0;
|
|
|
|
|
2010-04-17 18:41:20 +00:00
|
|
|
*lac_out = -1;
|
|
|
|
|
2010-03-30 04:51:23 +00:00
|
|
|
if (!msg->l3h || msgb_l3len(msg) < 3) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Paging message is too short.\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-03-30 03:57:42 +00:00
|
|
|
tlv_parse(&tp, gsm0808_att_tlvdef(), msg->l3h + 3, msgb_l3len(msg) - 3, 0, 0);
|
|
|
|
if (!TLVP_PRESENT(&tp, GSM0808_IE_CELL_IDENTIFIER_LIST)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "No CellIdentifier List inside paging msg.\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
data_length = TLVP_LEN(&tp, GSM0808_IE_CELL_IDENTIFIER_LIST);
|
|
|
|
data = TLVP_VAL(&tp, GSM0808_IE_CELL_IDENTIFIER_LIST);
|
2010-04-21 10:47:24 +00:00
|
|
|
|
|
|
|
/* No need to try a different BSS */
|
|
|
|
if (data[0] == CELL_IDENT_BSS) {
|
|
|
|
return NULL;
|
|
|
|
} else if (data[0] != CELL_IDENT_LAC) {
|
2010-04-06 08:25:40 +00:00
|
|
|
LOGP(DNAT, LOGL_ERROR, "Unhandled cell ident discrminator: %d\n", data[0]);
|
2010-03-30 03:57:42 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Currently we only handle one BSC */
|
|
|
|
for (i = 1; i < data_length - 1; i += 2) {
|
|
|
|
unsigned int _lac = ntohs(*(unsigned int *) &data[i]);
|
2010-04-17 06:07:19 +00:00
|
|
|
*lac_out = _lac;
|
2010-03-30 03:57:42 +00:00
|
|
|
llist_for_each_entry(bsc, &nat->bsc_connections, list_entry) {
|
2010-04-06 13:11:34 +00:00
|
|
|
if (!bsc->cfg)
|
|
|
|
continue;
|
2010-10-08 14:08:29 +00:00
|
|
|
if (!bsc->authenticated)
|
|
|
|
continue;
|
|
|
|
if (!bsc_config_handles_lac(bsc->cfg, _lac))
|
2010-03-30 03:57:42 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
return bsc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
2010-04-01 06:21:33 +00:00
|
|
|
}
|
|
|
|
|
2010-07-23 11:08:55 +00:00
|
|
|
int bsc_write_mgcp(struct bsc_connection *bsc, const uint8_t *data, unsigned int length)
|
2010-04-01 06:21:33 +00:00
|
|
|
{
|
|
|
|
struct msgb *msg;
|
|
|
|
|
|
|
|
if (length > 4096 - 128) {
|
|
|
|
LOGP(DINP, LOGL_ERROR, "Can not send message of that size.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg = msgb_alloc_headroom(4096, 128, "to-bsc");
|
|
|
|
if (!msg) {
|
|
|
|
LOGP(DINP, LOGL_ERROR, "Failed to allocate memory for BSC msg.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* copy the data */
|
|
|
|
msg->l3h = msgb_put(msg, length);
|
|
|
|
memcpy(msg->l3h, data, length);
|
|
|
|
|
2011-01-07 15:54:46 +00:00
|
|
|
return bsc_write(bsc, msg, IPAC_PROTO_MGCP_OLD);
|
2010-04-01 06:21:33 +00:00
|
|
|
}
|
|
|
|
|
2010-04-08 08:24:57 +00:00
|
|
|
int bsc_write(struct bsc_connection *bsc, struct msgb *msg, int proto)
|
2010-10-13 15:56:22 +00:00
|
|
|
{
|
|
|
|
return bsc_do_write(&bsc->write_queue, msg, proto);
|
|
|
|
}
|
|
|
|
|
|
|
|
int bsc_do_write(struct write_queue *queue, struct msgb *msg, int proto)
|
2010-04-01 06:21:33 +00:00
|
|
|
{
|
|
|
|
/* prepend the header */
|
2010-04-08 08:24:57 +00:00
|
|
|
ipaccess_prepend_header(msg, proto);
|
2010-10-16 15:33:46 +00:00
|
|
|
return bsc_write_msg(queue, msg);
|
|
|
|
}
|
2010-04-01 06:21:33 +00:00
|
|
|
|
2010-10-16 15:33:46 +00:00
|
|
|
int bsc_write_msg(struct write_queue *queue, struct msgb *msg)
|
|
|
|
{
|
2010-10-13 15:56:22 +00:00
|
|
|
if (write_queue_enqueue(queue, msg) != 0) {
|
2010-04-01 06:21:33 +00:00
|
|
|
LOGP(DINP, LOGL_ERROR, "Failed to enqueue the write.\n");
|
|
|
|
msgb_free(msg);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2010-05-13 19:39:56 +00:00
|
|
|
|
2010-10-11 07:50:31 +00:00
|
|
|
int bsc_nat_lst_check_allow(struct bsc_nat_acc_lst *lst, const char *mi_string)
|
2010-06-08 02:53:39 +00:00
|
|
|
{
|
|
|
|
struct bsc_nat_acc_lst_entry *entry;
|
|
|
|
|
|
|
|
llist_for_each_entry(entry, &lst->fltr_list, list) {
|
|
|
|
if (!entry->imsi_allow)
|
|
|
|
continue;
|
|
|
|
if (regexec(&entry->imsi_allow_re, mi_string, 0, NULL, 0) == 0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lst_check_deny(struct bsc_nat_acc_lst *lst, const char *mi_string)
|
|
|
|
{
|
|
|
|
struct bsc_nat_acc_lst_entry *entry;
|
|
|
|
|
|
|
|
llist_for_each_entry(entry, &lst->fltr_list, list) {
|
|
|
|
if (!entry->imsi_deny)
|
|
|
|
continue;
|
|
|
|
if (regexec(&entry->imsi_deny_re, mi_string, 0, NULL, 0) == 0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2010-05-14 11:49:35 +00:00
|
|
|
/* apply white/black list */
|
|
|
|
static int auth_imsi(struct bsc_connection *bsc, const char *mi_string)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Now apply blacklist/whitelist of the BSC and the NAT.
|
2010-10-19 18:55:33 +00:00
|
|
|
* 1.) Allow directly if the IMSI is allowed at the BSC
|
|
|
|
* 2.) Reject if the IMSI is not allowed at the BSC
|
2010-05-14 11:49:35 +00:00
|
|
|
* 3.) Reject if the IMSI not allowed at the global level.
|
|
|
|
* 4.) Allow directly if the IMSI is allowed at the global level
|
|
|
|
*/
|
2010-06-08 02:14:44 +00:00
|
|
|
struct bsc_nat_acc_lst *nat_lst = NULL;
|
|
|
|
struct bsc_nat_acc_lst *bsc_lst = NULL;
|
2010-05-31 17:03:13 +00:00
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
bsc_lst = bsc_nat_acc_lst_find(bsc->nat, bsc->cfg->acc_lst_name);
|
|
|
|
nat_lst = bsc_nat_acc_lst_find(bsc->nat, bsc->nat->acc_lst_name);
|
2010-05-31 17:03:13 +00:00
|
|
|
|
2010-05-14 11:49:35 +00:00
|
|
|
|
2010-06-08 02:53:39 +00:00
|
|
|
if (bsc_lst) {
|
2010-10-19 18:55:33 +00:00
|
|
|
/* 1. BSC allow */
|
2010-10-11 07:50:31 +00:00
|
|
|
if (bsc_nat_lst_check_allow(bsc_lst, mi_string) == 0)
|
2010-10-19 18:55:33 +00:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* 2. BSC deny */
|
2010-06-08 02:53:39 +00:00
|
|
|
if (lst_check_deny(bsc_lst, mi_string) == 0) {
|
2010-05-14 11:49:35 +00:00
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
2010-05-15 16:45:07 +00:00
|
|
|
"Filtering %s by imsi_deny on bsc nr: %d.\n", mi_string, bsc->cfg->nr);
|
2010-09-24 22:14:52 +00:00
|
|
|
rate_ctr_inc(&bsc_lst->stats->ctr[ACC_LIST_BSC_FILTER]);
|
2010-05-14 11:49:35 +00:00
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 3. NAT deny */
|
2010-06-08 02:53:39 +00:00
|
|
|
if (nat_lst) {
|
|
|
|
if (lst_check_deny(nat_lst, mi_string) == 0) {
|
2010-05-14 11:49:35 +00:00
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
2010-05-15 16:45:07 +00:00
|
|
|
"Filtering %s by nat imsi_deny on bsc nr: %d.\n", mi_string, bsc->cfg->nr);
|
2010-10-05 16:18:20 +00:00
|
|
|
rate_ctr_inc(&nat_lst->stats->ctr[ACC_LIST_NAT_FILTER]);
|
2010-05-14 11:49:35 +00:00
|
|
|
return -3;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-09-14 16:41:19 +00:00
|
|
|
return 1;
|
2010-05-14 11:49:35 +00:00
|
|
|
}
|
2010-05-14 00:14:09 +00:00
|
|
|
|
2010-09-28 17:19:42 +00:00
|
|
|
static int _cr_check_loc_upd(struct bsc_connection *bsc,
|
|
|
|
uint8_t *data, unsigned int length,
|
|
|
|
char **imsi)
|
2010-05-13 19:39:56 +00:00
|
|
|
{
|
2010-07-23 11:08:55 +00:00
|
|
|
uint8_t mi_type;
|
2010-05-14 00:14:09 +00:00
|
|
|
struct gsm48_loc_upd_req *lu;
|
|
|
|
char mi_string[GSM48_MI_SIZE];
|
|
|
|
|
2010-05-14 11:24:06 +00:00
|
|
|
if (length < sizeof(*lu)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"LU does not fit. Length is %d \n", length);
|
2010-05-14 00:14:09 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
lu = (struct gsm48_loc_upd_req *) data;
|
|
|
|
mi_type = lu->mi[0] & GSM_MI_TYPE_MASK;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We can only deal with the IMSI. This will fail for a phone that
|
|
|
|
* will send the TMSI of a previous network to us.
|
|
|
|
*/
|
|
|
|
if (mi_type != GSM_MI_TYPE_IMSI)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
gsm48_mi_to_string(mi_string, sizeof(mi_string), lu->mi, lu->mi_len);
|
2010-09-28 17:19:42 +00:00
|
|
|
*imsi = talloc_strdup(bsc, mi_string);
|
2010-05-14 11:49:35 +00:00
|
|
|
return auth_imsi(bsc, mi_string);
|
2010-05-13 19:39:56 +00:00
|
|
|
}
|
2010-05-14 00:14:09 +00:00
|
|
|
|
2010-09-28 17:19:42 +00:00
|
|
|
static int _cr_check_cm_serv_req(struct bsc_connection *bsc,
|
|
|
|
uint8_t *data, unsigned int length,
|
2010-09-28 18:47:29 +00:00
|
|
|
int *con_type, char **imsi)
|
2010-05-15 13:58:33 +00:00
|
|
|
{
|
2010-05-15 17:13:28 +00:00
|
|
|
static const uint32_t classmark_offset =
|
|
|
|
offsetof(struct gsm48_service_request, classmark);
|
|
|
|
|
2010-05-15 13:58:33 +00:00
|
|
|
char mi_string[GSM48_MI_SIZE];
|
2010-05-15 17:13:28 +00:00
|
|
|
uint8_t mi_type;
|
|
|
|
int rc;
|
2010-05-15 13:58:33 +00:00
|
|
|
struct gsm48_service_request *req;
|
|
|
|
|
|
|
|
/* unfortunately in Phase1 the classmark2 length is variable */
|
|
|
|
|
|
|
|
if (length < sizeof(*req)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"CM Serv Req does not fit. Length is %d\n", length);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
req = (struct gsm48_service_request *) data;
|
2010-09-28 18:47:29 +00:00
|
|
|
if (req->cm_service_type == 0x8)
|
|
|
|
*con_type = NAT_CON_TYPE_SSA;
|
2010-05-15 17:13:28 +00:00
|
|
|
rc = gsm48_extract_mi((uint8_t *) &req->classmark,
|
|
|
|
length - classmark_offset, mi_string, &mi_type);
|
|
|
|
if (rc < 0) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to parse the classmark2/mi. error: %d\n", rc);
|
2010-05-15 13:58:33 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we have to let the TMSI or such pass */
|
|
|
|
if (mi_type != GSM_MI_TYPE_IMSI)
|
|
|
|
return 0;
|
|
|
|
|
2010-09-28 17:19:42 +00:00
|
|
|
*imsi = talloc_strdup(bsc, mi_string);
|
2010-05-15 13:58:33 +00:00
|
|
|
return auth_imsi(bsc, mi_string);
|
|
|
|
}
|
|
|
|
|
2010-09-28 17:19:42 +00:00
|
|
|
static int _cr_check_pag_resp(struct bsc_connection *bsc,
|
|
|
|
uint8_t *data, unsigned int length,
|
|
|
|
char **imsi)
|
2010-05-15 15:54:04 +00:00
|
|
|
{
|
|
|
|
struct gsm48_pag_resp *resp;
|
|
|
|
char mi_string[GSM48_MI_SIZE];
|
2010-07-23 11:08:55 +00:00
|
|
|
uint8_t mi_type;
|
2010-05-15 15:54:04 +00:00
|
|
|
|
|
|
|
if (length < sizeof(*resp)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "PAG RESP does not fit. Length was %d.\n", length);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
resp = (struct gsm48_pag_resp *) data;
|
|
|
|
if (gsm48_paging_extract_mi(resp, length, mi_string, &mi_type) < 0) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to extract the MI.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we need to let it pass for now */
|
|
|
|
if (mi_type != GSM_MI_TYPE_IMSI)
|
|
|
|
return 0;
|
|
|
|
|
2010-09-28 17:19:42 +00:00
|
|
|
*imsi = talloc_strdup(bsc, mi_string);
|
2010-05-15 15:54:04 +00:00
|
|
|
return auth_imsi(bsc, mi_string);
|
|
|
|
}
|
2010-05-14 00:14:09 +00:00
|
|
|
|
2010-09-14 21:20:40 +00:00
|
|
|
static int _dt_check_id_resp(struct bsc_connection *bsc,
|
|
|
|
uint8_t *data, unsigned int length,
|
|
|
|
struct sccp_connections *con)
|
|
|
|
{
|
|
|
|
char mi_string[GSM48_MI_SIZE];
|
|
|
|
uint8_t mi_type;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (length < 2) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "mi does not fit.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data[0] < length - 1) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "mi length too big.\n");
|
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
|
|
|
|
mi_type = data[1] & GSM_MI_TYPE_MASK;
|
|
|
|
gsm48_mi_to_string(mi_string, sizeof(mi_string), &data[1], data[0]);
|
|
|
|
|
|
|
|
if (mi_type != GSM_MI_TYPE_IMSI)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = auth_imsi(bsc, mi_string);
|
|
|
|
con->imsi_checked = 1;
|
2010-09-28 17:00:46 +00:00
|
|
|
con->imsi = talloc_strdup(con, mi_string);
|
2010-09-14 21:20:40 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-05-14 00:14:09 +00:00
|
|
|
/* Filter out CR data... */
|
2010-09-28 17:19:42 +00:00
|
|
|
int bsc_nat_filter_sccp_cr(struct bsc_connection *bsc, struct msgb *msg,
|
|
|
|
struct bsc_nat_parsed *parsed, int *con_type,
|
|
|
|
char **imsi)
|
2010-05-14 00:14:09 +00:00
|
|
|
{
|
|
|
|
struct tlv_parsed tp;
|
|
|
|
struct gsm48_hdr *hdr48;
|
|
|
|
int hdr48_len;
|
|
|
|
int len;
|
2010-09-14 21:24:25 +00:00
|
|
|
uint8_t msg_type;
|
2010-05-14 00:14:09 +00:00
|
|
|
|
2010-05-15 18:00:40 +00:00
|
|
|
*con_type = NAT_CON_TYPE_NONE;
|
2010-09-28 17:19:42 +00:00
|
|
|
*imsi = NULL;
|
2010-05-15 18:00:40 +00:00
|
|
|
|
2010-05-14 00:14:09 +00:00
|
|
|
if (parsed->gsm_type != BSS_MAP_MSG_COMPLETE_LAYER_3) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"Rejecting CR message due wrong GSM Type %d\n", parsed->gsm_type);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the parsed has had some basic l3 length check */
|
|
|
|
len = msg->l3h[1];
|
|
|
|
if (msgb_l3len(msg) - 3 < len) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"The CR Data has not enough space...\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg->l4h = &msg->l3h[3];
|
|
|
|
len -= 1;
|
|
|
|
|
|
|
|
tlv_parse(&tp, gsm0808_att_tlvdef(), msg->l4h, len, 0, 0);
|
|
|
|
|
|
|
|
if (!TLVP_PRESENT(&tp, GSM0808_IE_LAYER_3_INFORMATION)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "CR Data does not contain layer3 information.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr48_len = TLVP_LEN(&tp, GSM0808_IE_LAYER_3_INFORMATION);
|
|
|
|
|
|
|
|
if (hdr48_len < sizeof(*hdr48)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "GSM48 header does not fit.\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr48 = (struct gsm48_hdr *) TLVP_VAL(&tp, GSM0808_IE_LAYER_3_INFORMATION);
|
|
|
|
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type = hdr48->msg_type & 0xbf;
|
2010-05-15 14:09:39 +00:00
|
|
|
if (hdr48->proto_discr == GSM48_PDISC_MM &&
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type == GSM48_MT_MM_LOC_UPD_REQUEST) {
|
2010-05-15 18:00:40 +00:00
|
|
|
*con_type = NAT_CON_TYPE_LU;
|
2010-09-28 17:19:42 +00:00
|
|
|
return _cr_check_loc_upd(bsc, &hdr48->data[0], hdr48_len - sizeof(*hdr48), imsi);
|
2010-05-15 14:09:39 +00:00
|
|
|
} else if (hdr48->proto_discr == GSM48_PDISC_MM &&
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type == GSM48_MT_MM_CM_SERV_REQ) {
|
2010-05-15 18:00:40 +00:00
|
|
|
*con_type = NAT_CON_TYPE_CM_SERV_REQ;
|
2010-09-28 18:47:29 +00:00
|
|
|
return _cr_check_cm_serv_req(bsc, &hdr48->data[0],
|
|
|
|
hdr48_len - sizeof(*hdr48),
|
|
|
|
con_type, imsi);
|
2010-05-15 15:54:04 +00:00
|
|
|
} else if (hdr48->proto_discr == GSM48_PDISC_RR &&
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type == GSM48_MT_RR_PAG_RESP) {
|
2010-05-15 18:00:40 +00:00
|
|
|
*con_type = NAT_CON_TYPE_PAG_RESP;
|
2010-09-28 17:19:42 +00:00
|
|
|
return _cr_check_pag_resp(bsc, &hdr48->data[0], hdr48_len - sizeof(*hdr48), imsi);
|
2010-05-14 00:14:09 +00:00
|
|
|
} else {
|
2010-05-15 17:05:47 +00:00
|
|
|
/* We only want to filter the above, let other things pass */
|
2010-05-15 18:00:40 +00:00
|
|
|
*con_type = NAT_CON_TYPE_OTHER;
|
2010-05-15 17:05:47 +00:00
|
|
|
return 0;
|
2010-05-14 00:14:09 +00:00
|
|
|
}
|
|
|
|
}
|
2010-05-14 10:38:29 +00:00
|
|
|
|
2010-09-28 18:30:50 +00:00
|
|
|
struct gsm48_hdr *bsc_unpack_dtap(struct bsc_nat_parsed *parsed,
|
|
|
|
struct msgb *msg, uint32_t *len)
|
|
|
|
{
|
|
|
|
/* gsm_type is actually the size of the dtap */
|
|
|
|
*len = parsed->gsm_type;
|
|
|
|
if (*len < msgb_l3len(msg) - 3) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Not enough space for DTAP.\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*len < sizeof(struct gsm48_hdr)) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "GSM48 header does not fit.\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
msg->l4h = &msg->l3h[3];
|
|
|
|
return (struct gsm48_hdr *) msg->l4h;
|
|
|
|
}
|
|
|
|
|
2010-09-14 17:11:08 +00:00
|
|
|
int bsc_nat_filter_dt(struct bsc_connection *bsc, struct msgb *msg,
|
|
|
|
struct sccp_connections *con, struct bsc_nat_parsed *parsed)
|
|
|
|
{
|
2010-09-14 21:20:40 +00:00
|
|
|
uint32_t len;
|
2010-09-14 21:24:25 +00:00
|
|
|
uint8_t msg_type;
|
2010-09-14 21:20:40 +00:00
|
|
|
struct gsm48_hdr *hdr48;
|
|
|
|
|
2010-09-14 17:11:08 +00:00
|
|
|
if (con->imsi_checked)
|
|
|
|
return 0;
|
|
|
|
|
2010-09-14 21:20:40 +00:00
|
|
|
/* only care about DTAP messages */
|
|
|
|
if (parsed->bssap != BSSAP_MSG_DTAP)
|
|
|
|
return 0;
|
|
|
|
|
2010-09-28 18:30:50 +00:00
|
|
|
hdr48 = bsc_unpack_dtap(parsed, msg, &len);
|
|
|
|
if (!hdr48)
|
2010-09-14 21:20:40 +00:00
|
|
|
return -1;
|
|
|
|
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type = hdr48->msg_type & 0xbf;
|
2010-09-14 21:20:40 +00:00
|
|
|
if (hdr48->proto_discr == GSM48_PDISC_MM &&
|
2010-09-14 21:24:25 +00:00
|
|
|
msg_type == GSM48_MT_MM_ID_RESP) {
|
2010-09-14 21:20:40 +00:00
|
|
|
return _dt_check_id_resp(bsc, &hdr48->data[0], len - sizeof(*hdr48), con);
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2010-09-14 17:11:08 +00:00
|
|
|
}
|
|
|
|
|
2010-05-14 10:38:29 +00:00
|
|
|
void bsc_parse_reg(void *ctx, regex_t *reg, char **imsi, int argc, const char **argv)
|
|
|
|
{
|
|
|
|
if (*imsi) {
|
|
|
|
talloc_free(*imsi);
|
|
|
|
*imsi = NULL;
|
|
|
|
}
|
|
|
|
regfree(reg);
|
|
|
|
|
|
|
|
if (argc > 0) {
|
|
|
|
*imsi = talloc_strdup(ctx, argv[0]);
|
|
|
|
regcomp(reg, argv[0], 0);
|
|
|
|
}
|
|
|
|
}
|
2010-05-15 18:06:11 +00:00
|
|
|
|
|
|
|
static const char *con_types [] = {
|
|
|
|
[NAT_CON_TYPE_NONE] = "n/a",
|
|
|
|
[NAT_CON_TYPE_LU] = "Location Update",
|
|
|
|
[NAT_CON_TYPE_CM_SERV_REQ] = "CM Serv Req",
|
|
|
|
[NAT_CON_TYPE_PAG_RESP] = "Paging Response",
|
2010-09-28 18:47:29 +00:00
|
|
|
[NAT_CON_TYPE_SSA] = "Supplementar Service Activation",
|
2010-05-16 12:43:52 +00:00
|
|
|
[NAT_CON_TYPE_LOCAL_REJECT] = "Local Reject",
|
2010-05-15 18:06:11 +00:00
|
|
|
[NAT_CON_TYPE_OTHER] = "Other",
|
|
|
|
};
|
|
|
|
|
|
|
|
const char *bsc_con_type_to_string(int type)
|
|
|
|
{
|
|
|
|
return con_types[type];
|
2010-05-31 17:03:13 +00:00
|
|
|
}
|
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
struct bsc_nat_acc_lst *bsc_nat_acc_lst_find(struct bsc_nat *nat, const char *name)
|
2010-05-31 17:03:13 +00:00
|
|
|
{
|
2010-06-08 02:14:44 +00:00
|
|
|
struct bsc_nat_acc_lst *lst;
|
2010-05-31 17:03:13 +00:00
|
|
|
|
|
|
|
if (!name)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
llist_for_each_entry(lst, &nat->access_lists, list)
|
|
|
|
if (strcmp(lst->name, name) == 0)
|
|
|
|
return lst;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
struct bsc_nat_acc_lst *bsc_nat_acc_lst_get(struct bsc_nat *nat, const char *name)
|
2010-05-31 17:03:13 +00:00
|
|
|
{
|
2010-06-08 02:14:44 +00:00
|
|
|
struct bsc_nat_acc_lst *lst;
|
2010-05-31 17:03:13 +00:00
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
lst = bsc_nat_acc_lst_find(nat, name);
|
2010-05-31 17:03:13 +00:00
|
|
|
if (lst)
|
|
|
|
return lst;
|
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
lst = talloc_zero(nat, struct bsc_nat_acc_lst);
|
2010-05-31 17:03:13 +00:00
|
|
|
if (!lst) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to allocate access list");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-09-24 22:14:52 +00:00
|
|
|
/* TODO: get the index right */
|
|
|
|
lst->stats = rate_ctr_group_alloc(lst, &bsc_cfg_acc_list_desc, 0);
|
|
|
|
if (!lst->stats) {
|
|
|
|
talloc_free(lst);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2010-06-08 02:53:39 +00:00
|
|
|
INIT_LLIST_HEAD(&lst->fltr_list);
|
2010-05-31 17:03:13 +00:00
|
|
|
lst->name = talloc_strdup(lst, name);
|
2010-06-08 03:00:09 +00:00
|
|
|
llist_add_tail(&lst->list, &nat->access_lists);
|
2010-05-31 17:03:13 +00:00
|
|
|
return lst;
|
2010-06-02 17:44:05 +00:00
|
|
|
}
|
|
|
|
|
2010-06-08 02:14:44 +00:00
|
|
|
void bsc_nat_acc_lst_delete(struct bsc_nat_acc_lst *lst)
|
2010-06-02 17:44:05 +00:00
|
|
|
{
|
|
|
|
llist_del(&lst->list);
|
2010-09-24 22:14:52 +00:00
|
|
|
rate_ctr_group_free(lst->stats);
|
2010-06-02 17:44:05 +00:00
|
|
|
talloc_free(lst);
|
2010-06-08 02:53:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct bsc_nat_acc_lst_entry *bsc_nat_acc_lst_entry_create(struct bsc_nat_acc_lst *lst)
|
|
|
|
{
|
|
|
|
struct bsc_nat_acc_lst_entry *entry;
|
|
|
|
|
|
|
|
entry = talloc_zero(lst, struct bsc_nat_acc_lst_entry);
|
|
|
|
if (!entry)
|
|
|
|
return NULL;
|
|
|
|
|
2010-06-08 03:00:09 +00:00
|
|
|
llist_add_tail(&entry->list, &lst->fltr_list);
|
2010-06-08 02:53:39 +00:00
|
|
|
return entry;
|
2010-06-17 10:16:00 +00:00
|
|
|
}
|
2010-07-05 06:39:44 +00:00
|
|
|
|
|
|
|
int bsc_nat_msc_is_connected(struct bsc_nat *nat)
|
|
|
|
{
|
|
|
|
return nat->msc_con->is_connected;
|
|
|
|
}
|
2010-10-03 11:41:42 +00:00
|
|
|
|
|
|
|
static const int con_to_ctr[] = {
|
|
|
|
[NAT_CON_TYPE_NONE] = -1,
|
|
|
|
[NAT_CON_TYPE_LU] = BCFG_CTR_CON_TYPE_LU,
|
|
|
|
[NAT_CON_TYPE_CM_SERV_REQ] = BCFG_CTR_CON_CMSERV_RQ,
|
|
|
|
[NAT_CON_TYPE_PAG_RESP] = BCFG_CTR_CON_PAG_RESP,
|
2010-09-28 18:47:29 +00:00
|
|
|
[NAT_CON_TYPE_SSA] = BCFG_CTR_CON_SSA,
|
2010-10-03 11:41:42 +00:00
|
|
|
[NAT_CON_TYPE_LOCAL_REJECT] = -1,
|
|
|
|
[NAT_CON_TYPE_OTHER] = BCFG_CTR_CON_OTHER,
|
|
|
|
};
|
|
|
|
|
|
|
|
int bsc_conn_type_to_ctr(struct sccp_connections *conn)
|
|
|
|
{
|
|
|
|
return con_to_ctr[conn->con_type];
|
|
|
|
}
|
2010-10-13 18:37:13 +00:00
|
|
|
|
|
|
|
int bsc_write_cb(struct bsc_fd *bfd, struct msgb *msg)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = write(bfd->fd, msg->data, msg->len);
|
|
|
|
if (rc != msg->len)
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to write message to the BSC.\n");
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2010-10-21 10:12:57 +00:00
|
|
|
/**
|
|
|
|
* Rewrite non global numbers... according to rules based on the IMSI
|
|
|
|
*/
|
2010-10-21 12:46:57 +00:00
|
|
|
struct msgb *bsc_nat_rewrite_setup(struct bsc_nat *nat, struct msgb *msg, struct bsc_nat_parsed *parsed, const char *imsi)
|
2010-10-21 10:12:57 +00:00
|
|
|
{
|
2010-10-21 12:46:57 +00:00
|
|
|
struct tlv_parsed tp;
|
|
|
|
struct gsm48_hdr *hdr48;
|
|
|
|
uint32_t len;
|
|
|
|
uint8_t msg_type;
|
|
|
|
unsigned int payload_len;
|
|
|
|
struct gsm_mncc_number called;
|
|
|
|
struct msg_entry *entry;
|
|
|
|
char *new_number = NULL;
|
|
|
|
struct msgb *out, *sccp;
|
|
|
|
uint8_t *outptr;
|
|
|
|
const uint8_t *msgptr;
|
|
|
|
int sec_len;
|
|
|
|
|
|
|
|
if (!imsi || strlen(imsi) < 5)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
if (!nat->num_rewr)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
/* only care about DTAP messages */
|
|
|
|
if (parsed->bssap != BSSAP_MSG_DTAP)
|
|
|
|
return msg;
|
|
|
|
if (!parsed->dest_local_ref)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
hdr48 = bsc_unpack_dtap(parsed, msg, &len);
|
|
|
|
if (!hdr48)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
msg_type = hdr48->msg_type & 0xbf;
|
|
|
|
if (hdr48->proto_discr != GSM48_PDISC_CC ||
|
|
|
|
msg_type != GSM48_MT_CC_SETUP)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
/* decode and rewrite the message */
|
|
|
|
payload_len = len - sizeof(*hdr48);
|
|
|
|
tlv_parse(&tp, &gsm48_att_tlvdef, hdr48->data, payload_len, 0, 0);
|
|
|
|
|
|
|
|
/* no number, well let us ignore it */
|
|
|
|
if (!TLVP_PRESENT(&tp, GSM48_IE_CALLED_BCD))
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
memset(&called, 0, sizeof(called));
|
|
|
|
gsm48_decode_called(&called,
|
|
|
|
TLVP_VAL(&tp, GSM48_IE_CALLED_BCD) - 1);
|
|
|
|
|
|
|
|
/* check if it looks international and stop */
|
2010-10-27 08:24:34 +00:00
|
|
|
if (called.plan != 1)
|
|
|
|
return msg;
|
|
|
|
if (called.type == 1)
|
2010-10-21 12:46:57 +00:00
|
|
|
return msg;
|
|
|
|
if (strncmp(called.number, "00", 2) == 0)
|
|
|
|
return msg;
|
|
|
|
|
|
|
|
/* need to find a replacement and then fix it */
|
|
|
|
llist_for_each_entry(entry, &nat->num_rewr->entry, list) {
|
|
|
|
regex_t reg;
|
|
|
|
regmatch_t matches[2];
|
|
|
|
|
2010-10-28 11:51:28 +00:00
|
|
|
if (entry->mcc[0] != '*' && strncmp(entry->mcc, imsi, 3) != 0)
|
2010-10-21 12:46:57 +00:00
|
|
|
continue;
|
2010-10-28 11:51:28 +00:00
|
|
|
if (entry->mnc[0] != '*' && strncmp(entry->mnc, imsi + 3, 2) != 0)
|
2010-10-21 12:46:57 +00:00
|
|
|
continue;
|
|
|
|
|
2010-10-27 08:24:12 +00:00
|
|
|
if (entry->text[0] == '+') {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"Plus is not allowed in the number");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2010-10-21 12:46:57 +00:00
|
|
|
/* We have an entry for the IMSI. Need to match now */
|
|
|
|
if (regcomp(®, entry->option, REG_EXTENDED) != 0) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR,
|
|
|
|
"Regexp '%s' is not valid.\n", entry->option);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this regexp matches... */
|
|
|
|
if (regexec(®, called.number, 2, matches, 0) == 0 &&
|
|
|
|
matches[1].rm_eo != -1)
|
|
|
|
new_number = talloc_asprintf(msg, "%s%s",
|
|
|
|
entry->text,
|
|
|
|
&called.number[matches[1].rm_so]);
|
|
|
|
regfree(®);
|
|
|
|
|
|
|
|
if (new_number)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!new_number) {
|
|
|
|
LOGP(DNAT, LOGL_DEBUG, "No IMSI match found, returning message.\n");
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Need to create a new message now based on the old onew
|
|
|
|
* with a new number. We can sadly not patch this in place
|
|
|
|
* so we will need to regenerate it.
|
|
|
|
*/
|
|
|
|
|
|
|
|
out = msgb_alloc_headroom(4096, 128, "changed-setup");
|
|
|
|
if (!out) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to allocate.\n");
|
|
|
|
talloc_free(new_number);
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* copy the header */
|
|
|
|
outptr = msgb_put(out, sizeof(*hdr48));
|
|
|
|
memcpy(outptr, hdr48, sizeof(*hdr48));
|
|
|
|
|
|
|
|
/* copy everything up to the number */
|
|
|
|
sec_len = TLVP_VAL(&tp, GSM48_IE_CALLED_BCD) - 2 - &hdr48->data[0];
|
|
|
|
outptr = msgb_put(out, sec_len);
|
|
|
|
memcpy(outptr, &hdr48->data[0], sec_len);
|
|
|
|
|
|
|
|
/* create the new number */
|
|
|
|
strncpy(called.number, new_number, sizeof(called.number));
|
|
|
|
gsm48_encode_called(out, &called);
|
|
|
|
|
|
|
|
/* copy thre rest */
|
|
|
|
msgptr = TLVP_VAL(&tp, GSM48_IE_CALLED_BCD) +
|
|
|
|
TLVP_LEN(&tp, GSM48_IE_CALLED_BCD);
|
|
|
|
sec_len = payload_len - (msgptr - &hdr48->data[0]);
|
|
|
|
outptr = msgb_put(out, sec_len);
|
|
|
|
memcpy(outptr, msgptr, sec_len);
|
|
|
|
|
|
|
|
/* wrap with DTAP, SCCP, then IPA. TODO: Stop copying */
|
|
|
|
gsm0808_prepend_dtap_header(out, 0);
|
|
|
|
sccp = sccp_create_dt1(parsed->dest_local_ref, out->data, out->len);
|
|
|
|
if (!sccp) {
|
|
|
|
LOGP(DNAT, LOGL_ERROR, "Failed to allocate.\n");
|
|
|
|
talloc_free(new_number);
|
|
|
|
talloc_free(out);
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
|
|
|
|
ipaccess_prepend_header(sccp, IPAC_PROTO_SCCP);
|
|
|
|
|
|
|
|
/* give up memory, we are done */
|
|
|
|
talloc_free(new_number);
|
|
|
|
/* the parsed hangs off from msg but it needs to survive */
|
|
|
|
talloc_steal(sccp, parsed);
|
|
|
|
msgb_free(msg);
|
|
|
|
msgb_free(out);
|
|
|
|
out = NULL;
|
|
|
|
return sccp;
|
2010-10-21 10:12:57 +00:00
|
|
|
}
|
2010-10-21 12:46:57 +00:00
|
|
|
|