2 * Copyright (c) 2004-2008 Sam Leffler, Errno Consulting
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 * $FreeBSD: head/sys/net80211/ieee80211_acl.c 186302 2008-12-18 23:00:09Z sam $
29 * IEEE 802.11 MAC ACL support.
31 * When this module is loaded the sender address of each auth mgt
32 * frame is passed to the iac_check method and the module indicates
33 * if the frame should be accepted or rejected. If the policy is
34 * set to ACL_POLICY_OPEN then all frames are accepted w/o checking
35 * the address. Otherwise, the address is looked up in the database
36 * and if found the frame is either accepted (ACL_POLICY_ALLOW)
37 * or rejected (ACL_POLICY_DENT).
41 #include <sys/param.h>
42 #include <sys/kernel.h>
43 #include <sys/systm.h>
45 #include <sys/module.h>
46 #include <sys/queue.h>
48 #include <sys/socket.h>
51 #include <net/if_media.h>
52 #include <net/ethernet.h>
53 #include <net/route.h>
55 #include <netproto/802_11/ieee80211_var.h>
58 ACL_POLICY_OPEN
= 0, /* open, don't check ACL's */
59 ACL_POLICY_ALLOW
= 1, /* allow traffic from MAC */
60 ACL_POLICY_DENY
= 2, /* deny traffic from MAC */
62 * NB: ACL_POLICY_RADIUS must be the same value as
63 * IEEE80211_MACCMD_POLICY_RADIUS because of the way
64 * acl_getpolicy() works.
66 ACL_POLICY_RADIUS
= 7, /* defer to RADIUS ACL server */
69 #define ACL_HASHSIZE 32
72 TAILQ_ENTRY(acl
) acl_list
;
73 LIST_ENTRY(acl
) acl_hash
;
74 uint8_t acl_macaddr
[IEEE80211_ADDR_LEN
];
79 TAILQ_HEAD(, acl
) as_list
; /* list of all ACL's */
80 LIST_HEAD(, acl
) as_hash
[ACL_HASHSIZE
];
81 struct ieee80211vap
*as_vap
;
84 /* simple hash is enough for variation of macaddr */
85 #define ACL_HASH(addr) \
86 (((const uint8_t *)(addr))[IEEE80211_ADDR_LEN - 1] % ACL_HASHSIZE)
88 MALLOC_DEFINE(M_80211_ACL
, "acl", "802.11 station acl");
90 static int acl_free_all(struct ieee80211vap
*);
92 /* number of references from net80211 layer */
96 acl_attach(struct ieee80211vap
*vap
)
100 as
= (struct aclstate
*) kmalloc(sizeof(struct aclstate
),
101 M_80211_ACL
, M_INTWAIT
| M_ZERO
);
104 TAILQ_INIT(&as
->as_list
);
105 as
->as_policy
= ACL_POLICY_OPEN
;
108 nrefs
++; /* NB: we assume caller locking */
113 acl_detach(struct ieee80211vap
*vap
)
115 struct aclstate
*as
= vap
->iv_as
;
117 KASSERT(nrefs
> 0, ("imbalanced attach/detach"));
118 nrefs
--; /* NB: we assume caller locking */
122 kfree(as
, M_80211_ACL
);
125 static __inline
struct acl
*
126 _find_acl(struct aclstate
*as
, const uint8_t *macaddr
)
131 hash
= ACL_HASH(macaddr
);
132 LIST_FOREACH(acl
, &as
->as_hash
[hash
], acl_hash
) {
133 if (IEEE80211_ADDR_EQ(acl
->acl_macaddr
, macaddr
))
140 _acl_free(struct aclstate
*as
, struct acl
*acl
)
143 TAILQ_REMOVE(&as
->as_list
, acl
, acl_list
);
144 LIST_REMOVE(acl
, acl_hash
);
145 kfree(acl
, M_80211_ACL
);
150 acl_check(struct ieee80211vap
*vap
, const uint8_t mac
[IEEE80211_ADDR_LEN
])
152 struct aclstate
*as
= vap
->iv_as
;
154 switch (as
->as_policy
) {
155 case ACL_POLICY_OPEN
:
156 case ACL_POLICY_RADIUS
:
158 case ACL_POLICY_ALLOW
:
159 return _find_acl(as
, mac
) != NULL
;
160 case ACL_POLICY_DENY
:
161 return _find_acl(as
, mac
) == NULL
;
163 return 0; /* should not happen */
167 acl_add(struct ieee80211vap
*vap
, const uint8_t mac
[IEEE80211_ADDR_LEN
])
169 struct aclstate
*as
= vap
->iv_as
;
170 struct acl
*acl
, *new;
173 new = (struct acl
*) kmalloc(sizeof(struct acl
), M_80211_ACL
, M_INTWAIT
| M_ZERO
);
175 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
,
176 "ACL: add %6D failed, no memory\n", mac
, ":");
181 hash
= ACL_HASH(mac
);
182 LIST_FOREACH(acl
, &as
->as_hash
[hash
], acl_hash
) {
183 if (IEEE80211_ADDR_EQ(acl
->acl_macaddr
, mac
)) {
184 kfree(new, M_80211_ACL
);
185 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
,
186 "ACL: add %6D failed, already present\n",
191 IEEE80211_ADDR_COPY(new->acl_macaddr
, mac
);
192 TAILQ_INSERT_TAIL(&as
->as_list
, new, acl_list
);
193 LIST_INSERT_HEAD(&as
->as_hash
[hash
], new, acl_hash
);
196 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
,
197 "ACL: add %6D\n", mac
, ":");
202 acl_remove(struct ieee80211vap
*vap
, const uint8_t mac
[IEEE80211_ADDR_LEN
])
204 struct aclstate
*as
= vap
->iv_as
;
207 acl
= _find_acl(as
, mac
);
211 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
,
212 "ACL: remove %6D%s\n", mac
, ":",
213 acl
== NULL
? ", not present" : "");
215 return (acl
== NULL
? ENOENT
: 0);
219 acl_free_all(struct ieee80211vap
*vap
)
221 struct aclstate
*as
= vap
->iv_as
;
224 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
, "ACL: %s\n", "free all");
226 while ((acl
= TAILQ_FIRST(&as
->as_list
)) != NULL
)
233 acl_setpolicy(struct ieee80211vap
*vap
, int policy
)
235 struct aclstate
*as
= vap
->iv_as
;
237 IEEE80211_DPRINTF(vap
, IEEE80211_MSG_ACL
,
238 "ACL: set policy to %u\n", policy
);
241 case IEEE80211_MACCMD_POLICY_OPEN
:
242 as
->as_policy
= ACL_POLICY_OPEN
;
244 case IEEE80211_MACCMD_POLICY_ALLOW
:
245 as
->as_policy
= ACL_POLICY_ALLOW
;
247 case IEEE80211_MACCMD_POLICY_DENY
:
248 as
->as_policy
= ACL_POLICY_DENY
;
250 case IEEE80211_MACCMD_POLICY_RADIUS
:
251 as
->as_policy
= ACL_POLICY_RADIUS
;
260 acl_getpolicy(struct ieee80211vap
*vap
)
262 struct aclstate
*as
= vap
->iv_as
;
264 return as
->as_policy
;
268 acl_setioctl(struct ieee80211vap
*vap
, struct ieee80211req
*ireq
)
275 acl_getioctl(struct ieee80211vap
*vap
, struct ieee80211req
*ireq
)
277 struct aclstate
*as
= vap
->iv_as
;
279 struct ieee80211req_maclist
*ap
;
282 switch (ireq
->i_val
) {
283 case IEEE80211_MACCMD_POLICY
:
284 ireq
->i_val
= as
->as_policy
;
286 case IEEE80211_MACCMD_LIST
:
287 space
= as
->as_nacls
* IEEE80211_ADDR_LEN
;
288 if (ireq
->i_len
== 0) {
289 ireq
->i_len
= space
; /* return required space */
290 return 0; /* NB: must not error */
292 ap
= (struct ieee80211req_maclist
*) kmalloc(space
,
297 TAILQ_FOREACH(acl
, &as
->as_list
, acl_list
) {
298 IEEE80211_ADDR_COPY(ap
[i
].ml_macaddr
, acl
->acl_macaddr
);
301 if (ireq
->i_len
>= space
) {
302 error
= copyout(ap
, ireq
->i_data
, space
);
305 error
= copyout(ap
, ireq
->i_data
, ireq
->i_len
);
312 static const struct ieee80211_aclator mac
= {
314 .iac_attach
= acl_attach
,
315 .iac_detach
= acl_detach
,
316 .iac_check
= acl_check
,
318 .iac_remove
= acl_remove
,
319 .iac_flush
= acl_free_all
,
320 .iac_setpolicy
= acl_setpolicy
,
321 .iac_getpolicy
= acl_getpolicy
,
322 .iac_setioctl
= acl_setioctl
,
323 .iac_getioctl
= acl_getioctl
,
325 IEEE80211_ACL_MODULE(wlan_acl
, mac
, 1);