strongswan/src/libcharon/plugins/error_notify/error_notify_listener.c

204 lines
5.7 KiB
C
Raw Normal View History

/*
* Copyright (C) 2012 Martin Willi
* Copyright (C) 2012 revosec AG
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#include "error_notify_listener.h"
#include <daemon.h>
typedef struct private_error_notify_listener_t private_error_notify_listener_t;
/**
* Private data of an error_notify_listener_t object.
*/
struct private_error_notify_listener_t {
/**
* Public error_notify_listener_t interface.
*/
error_notify_listener_t public;
/**
* Socket to send notifications over
*/
error_notify_socket_t *socket;
};
METHOD(listener_t, alert, bool,
private_error_notify_listener_t *this, ike_sa_t *ike_sa,
alert_t alert, va_list args)
{
error_notify_msg_t msg;
message_t *message;
host_t *host;
identification_t *id;
linked_list_t *list, *list2;
peer_cfg_t *peer_cfg;
if (!this->socket->has_listeners(this->socket))
{
return TRUE;
}
memset(&msg, 0, sizeof(msg));
switch (alert)
{
case ALERT_RADIUS_NOT_RESPONDING:
msg.type = ERROR_NOTIFY_RADIUS_NOT_RESPONDING;
snprintf(msg.str, sizeof(msg.str),
"a RADIUS request message timed out");
break;
case ALERT_LOCAL_AUTH_FAILED:
msg.type = ERROR_NOTIFY_LOCAL_AUTH_FAILED;
snprintf(msg.str, sizeof(msg.str),
"creating local authentication data failed");
break;
case ALERT_PEER_AUTH_FAILED:
msg.type = ERROR_NOTIFY_PEER_AUTH_FAILED;
snprintf(msg.str, sizeof(msg.str), "peer authentication failed");
break;
case ALERT_PARSE_ERROR_HEADER:
msg.type = ERROR_NOTIFY_PARSE_ERROR_HEADER;
message = va_arg(args, message_t*);
snprintf(msg.str, sizeof(msg.str), "parsing IKE header from "
"%#H failed", message->get_source(message));
break;
case ALERT_PARSE_ERROR_BODY:
msg.type = ERROR_NOTIFY_PARSE_ERROR_BODY;
message = va_arg(args, message_t*);
snprintf(msg.str, sizeof(msg.str), "parsing IKE message from "
"%#H failed", message->get_source(message));
break;
case ALERT_RETRANSMIT_SEND_TIMEOUT:
msg.type = ERROR_NOTIFY_RETRANSMIT_SEND_TIMEOUT;
snprintf(msg.str, sizeof(msg.str),
"IKE message retransmission timed out");
break;
case ALERT_HALF_OPEN_TIMEOUT:
msg.type = ERROR_NOTIFY_HALF_OPEN_TIMEOUT;
snprintf(msg.str, sizeof(msg.str), "IKE_SA timed out before it "
"could be established");
break;
case ALERT_PROPOSAL_MISMATCH_IKE:
msg.type = ERROR_NOTIFY_PROPOSAL_MISMATCH_IKE;
list = va_arg(args, linked_list_t*);
snprintf(msg.str, sizeof(msg.str), "the received IKE_SA poposals "
"did not match: %#P", list);
break;
case ALERT_PROPOSAL_MISMATCH_CHILD:
msg.type = ERROR_NOTIFY_PROPOSAL_MISMATCH_CHILD;
list = va_arg(args, linked_list_t*);
snprintf(msg.str, sizeof(msg.str), "the received CHILD_SA poposals "
"did not match: %#P", list);
break;
case ALERT_TS_MISMATCH:
msg.type = ERROR_NOTIFY_TS_MISMATCH;
list = va_arg(args, linked_list_t*);
list2 = va_arg(args, linked_list_t*);
snprintf(msg.str, sizeof(msg.str), "the received traffic selectors "
"did not match: %#R=== %#R", list, list2);
break;
case ALERT_INSTALL_CHILD_SA_FAILED:
msg.type = ERROR_NOTIFY_INSTALL_CHILD_SA_FAILED;
snprintf(msg.str, sizeof(msg.str), "installing IPsec SA failed");
break;
case ALERT_INSTALL_CHILD_POLICY_FAILED:
msg.type = ERROR_NOTIFY_INSTALL_CHILD_POLICY_FAILED;
snprintf(msg.str, sizeof(msg.str), "installing IPsec policy failed");
break;
case ALERT_UNIQUE_REPLACE:
msg.type = ERROR_NOTIFY_UNIQUE_REPLACE;
snprintf(msg.str, sizeof(msg.str),
"replaced old IKE_SA due to uniqueness policy");
break;
case ALERT_UNIQUE_KEEP:
msg.type = ERROR_NOTIFY_UNIQUE_KEEP;
snprintf(msg.str, sizeof(msg.str), "keep existing in favor of "
"rejected new IKE_SA due to uniqueness policy");
break;
case ALERT_VIP_FAILURE:
msg.type = ERROR_NOTIFY_VIP_FAILURE;
list = va_arg(args, linked_list_t*);
if (list->get_first(list, (void**)&host) == SUCCESS)
{
snprintf(msg.str, sizeof(msg.str),
"allocating a virtual IP failed, requested was %H", host);
}
else
{
snprintf(msg.str, sizeof(msg.str),
"expected a virtual IP request, but none found");
}
break;
case ALERT_AUTHORIZATION_FAILED:
msg.type = ERROR_NOTIFY_AUTHORIZATION_FAILED;
snprintf(msg.str, sizeof(msg.str), "an authorization plugin "
"prevented establishment of an IKE_SA");
break;
default:
return TRUE;
}
if (ike_sa)
{
id = ike_sa->get_other_eap_id(ike_sa);
if (id->get_type(id) != ID_ANY)
{
snprintf(msg.id, sizeof(msg.id), "%Y", id);
}
host = ike_sa->get_other_host(ike_sa);
if (!host->is_anyaddr(host))
{
snprintf(msg.ip, sizeof(msg.ip), "%#H", host);
}
peer_cfg = ike_sa->get_peer_cfg(ike_sa);
if (peer_cfg)
{
snprintf(msg.name, sizeof(msg.name), "%s",
peer_cfg->get_name(peer_cfg));
}
}
this->socket->notify(this->socket, &msg);
return TRUE;
}
METHOD(error_notify_listener_t, destroy, void,
private_error_notify_listener_t *this)
{
free(this);
}
/**
* See header
*/
error_notify_listener_t *error_notify_listener_create(error_notify_socket_t *s)
{
private_error_notify_listener_t *this;
INIT(this,
.public = {
.listener = {
.alert = _alert,
},
.destroy = _destroy,
},
.socket = s,
);
return &this->public;
}