blob: aac46bfc4f87e37844b02dce413c7fc80cc21c23 [file] [log] [blame]
/*
* nat.h - NAT plugin definitions
*
* Copyright (c) 2016 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef __included_nat_h__
#define __included_nat_h__
#include <vnet/vnet.h>
#include <vnet/ip/ip.h>
#include <vnet/ethernet/ethernet.h>
#include <vnet/ip/icmp46_packet.h>
#include <vnet/api_errno.h>
#include <vppinfra/bihash_8_8.h>
#include <vppinfra/bihash_16_8.h>
#include <vppinfra/dlist.h>
#include <vppinfra/error.h>
#include <vlibapi/api.h>
#define SNAT_UDP_TIMEOUT 300
#define SNAT_UDP_TIMEOUT_MIN 120
#define SNAT_TCP_TRANSITORY_TIMEOUT 240
#define SNAT_TCP_ESTABLISHED_TIMEOUT 7440
#define SNAT_TCP_INCOMING_SYN 6
#define SNAT_ICMP_TIMEOUT 60
#define SNAT_FLAG_HAIRPINNING (1 << 0)
/* Key */
typedef struct {
union
{
struct
{
ip4_address_t addr;
u16 port;
u16 protocol:3,
fib_index:13;
};
u64 as_u64;
};
} snat_session_key_t;
typedef struct {
union
{
struct
{
ip4_address_t l_addr;
ip4_address_t r_addr;
u32 fib_index;
u16 l_port;
u8 proto;
u8 rsvd;
};
u64 as_u64[2];
};
} nat_ed_ses_key_t;
typedef struct {
union
{
struct
{
ip4_address_t ext_host_addr;
u16 ext_host_port;
u16 out_port;
};
u64 as_u64;
};
} snat_det_out_key_t;
typedef struct {
union
{
struct
{
ip4_address_t addr;
u32 fib_index;
};
u64 as_u64;
};
} snat_user_key_t;
#define foreach_snat_protocol \
_(UDP, 0, udp, "udp") \
_(TCP, 1, tcp, "tcp") \
_(ICMP, 2, icmp, "icmp")
typedef enum {
#define _(N, i, n, s) SNAT_PROTOCOL_##N = i,
foreach_snat_protocol
#undef _
} snat_protocol_t;
#define foreach_snat_session_state \
_(0, UNKNOWN, "unknown") \
_(1, UDP_ACTIVE, "udp-active") \
_(2, TCP_SYN_SENT, "tcp-syn-sent") \
_(3, TCP_ESTABLISHED, "tcp-established") \
_(4, TCP_FIN_WAIT, "tcp-fin-wait") \
_(5, TCP_CLOSE_WAIT, "tcp-close-wait") \
_(6, TCP_LAST_ACK, "tcp-last-ack") \
_(7, ICMP_ACTIVE, "icmp-active")
typedef enum {
#define _(v, N, s) SNAT_SESSION_##N = v,
foreach_snat_session_state
#undef _
} snat_session_state_t;
#define SNAT_SESSION_FLAG_STATIC_MAPPING 1
#define SNAT_SESSION_FLAG_UNKNOWN_PROTO 2
#define SNAT_SESSION_FLAG_LOAD_BALANCING 4
#define NAT_INTERFACE_FLAG_IS_INSIDE 1
#define NAT_INTERFACE_FLAG_IS_OUTSIDE 2
typedef CLIB_PACKED(struct {
snat_session_key_t out2in; /* 0-15 */
snat_session_key_t in2out; /* 16-31 */
u32 flags; /* 32-35 */
/* per-user translations */
u32 per_user_index; /* 36-39 */
u32 per_user_list_head_index; /* 40-43 */
/* Last heard timer */
f64 last_heard; /* 44-51 */
u64 total_bytes; /* 52-59 */
u32 total_pkts; /* 60-63 */
/* Outside address */
u32 outside_address_index; /* 64-67 */
/* External host address */
ip4_address_t ext_host_addr; /* 68-71 */
}) snat_session_t;
typedef struct {
ip4_address_t addr;
u32 fib_index;
u32 sessions_per_user_list_head_index;
u32 nsessions;
u32 nstaticsessions;
} snat_user_t;
typedef struct {
ip4_address_t addr;
u32 fib_index;
#define _(N, i, n, s) \
u16 busy_##n##_ports; \
u16 * busy_##n##_ports_per_thread; \
uword * busy_##n##_port_bitmap;
foreach_snat_protocol
#undef _
} snat_address_t;
typedef struct {
u16 in_port;
snat_det_out_key_t out;
u8 state;
u32 expire;
} snat_det_session_t;
typedef struct {
ip4_address_t in_addr;
u8 in_plen;
ip4_address_t out_addr;
u8 out_plen;
u32 sharing_ratio;
u16 ports_per_host;
u32 ses_num;
/* vector of sessions */
snat_det_session_t * sessions;
} snat_det_map_t;
typedef struct {
ip4_address_t addr;
u16 port;
u8 probability;
u8 prefix;
} nat44_lb_addr_port_t;
typedef struct {
ip4_address_t local_addr;
ip4_address_t external_addr;
u16 local_port;
u16 external_port;
u8 addr_only;
u32 vrf_id;
u32 fib_index;
snat_protocol_t proto;
u32 worker_index;
nat44_lb_addr_port_t *locals;
} snat_static_mapping_t;
typedef struct {
u32 sw_if_index;
u8 flags;
} snat_interface_t;
typedef struct {
ip4_address_t l_addr;
u16 l_port;
u16 e_port;
u32 sw_if_index;
u32 vrf_id;
snat_protocol_t proto;
int addr_only;
int is_add;
} snat_static_map_resolve_t;
typedef struct {
/* Main lookup tables */
clib_bihash_8_8_t out2in;
clib_bihash_8_8_t in2out;
/* Find-a-user => src address lookup */
clib_bihash_8_8_t user_hash;
/* User pool */
snat_user_t * users;
/* Session pool */
snat_session_t * sessions;
/* Pool of doubly-linked list elements */
dlist_elt_t * list_pool;
u32 snat_thread_index;
} snat_main_per_thread_data_t;
struct snat_main_s;
typedef u32 snat_icmp_match_function_t (struct snat_main_s *sm,
vlib_node_runtime_t *node,
u32 thread_index,
vlib_buffer_t *b0,
ip4_header_t *ip0,
u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate,
void *d,
void *e);
typedef u32 (snat_get_worker_function_t) (ip4_header_t * ip, u32 rx_fib_index);
typedef struct snat_main_s {
/* Endpoint address dependent sessions lookup tables */
clib_bihash_16_8_t out2in_ed;
clib_bihash_16_8_t in2out_ed;
snat_icmp_match_function_t * icmp_match_in2out_cb;
snat_icmp_match_function_t * icmp_match_out2in_cb;
u32 num_workers;
u32 first_worker_index;
u32 next_worker;
u32 * workers;
snat_get_worker_function_t * worker_in2out_cb;
snat_get_worker_function_t * worker_out2in_cb;
u16 port_per_thread;
u32 num_snat_thread;
/* Per thread data */
snat_main_per_thread_data_t * per_thread_data;
/* Find a static mapping by local */
clib_bihash_8_8_t static_mapping_by_local;
/* Find a static mapping by external */
clib_bihash_8_8_t static_mapping_by_external;
/* Static mapping pool */
snat_static_mapping_t * static_mappings;
/* Interface pool */
snat_interface_t * interfaces;
snat_interface_t * output_feature_interfaces;
/* Vector of outside addresses */
snat_address_t * addresses;
/* sw_if_indices whose intfc addresses should be auto-added */
u32 * auto_add_sw_if_indices;
/* vector of interface address static mappings to resolve. */
snat_static_map_resolve_t *to_resolve;
/* Randomize port allocation order */
u32 random_seed;
/* Worker handoff index */
u32 fq_in2out_index;
u32 fq_in2out_output_index;
u32 fq_out2in_index;
/* in2out and out2in node index */
u32 in2out_node_index;
u32 in2out_output_node_index;
u32 out2in_node_index;
/* Deterministic NAT */
snat_det_map_t * det_maps;
/* Config parameters */
u8 static_mapping_only;
u8 static_mapping_connection_tracking;
u8 deterministic;
u32 translation_buckets;
u32 translation_memory_size;
u32 max_translations;
u32 user_buckets;
u32 user_memory_size;
u32 max_translations_per_user;
u32 outside_vrf_id;
u32 outside_fib_index;
u32 inside_vrf_id;
u32 inside_fib_index;
/* tenant VRF aware address pool activation flag */
u8 vrf_mode;
/* values of various timeouts */
u32 udp_timeout;
u32 tcp_established_timeout;
u32 tcp_transitory_timeout;
u32 icmp_timeout;
/* API message ID base */
u16 msg_id_base;
/* convenience */
vlib_main_t * vlib_main;
vnet_main_t * vnet_main;
ip4_main_t * ip4_main;
ip_lookup_main_t * ip4_lookup_main;
api_main_t * api_main;
} snat_main_t;
extern snat_main_t snat_main;
extern vlib_node_registration_t snat_in2out_node;
extern vlib_node_registration_t snat_in2out_output_node;
extern vlib_node_registration_t snat_out2in_node;
extern vlib_node_registration_t snat_in2out_fast_node;
extern vlib_node_registration_t snat_out2in_fast_node;
extern vlib_node_registration_t snat_in2out_worker_handoff_node;
extern vlib_node_registration_t snat_in2out_output_worker_handoff_node;
extern vlib_node_registration_t snat_out2in_worker_handoff_node;
extern vlib_node_registration_t snat_det_in2out_node;
extern vlib_node_registration_t snat_det_out2in_node;
extern vlib_node_registration_t snat_hairpin_dst_node;
extern vlib_node_registration_t snat_hairpin_src_node;
void snat_free_outside_address_and_port (snat_main_t * sm,
u32 thread_index,
snat_session_key_t * k,
u32 address_index);
int snat_alloc_outside_address_and_port (snat_main_t * sm,
u32 fib_index,
u32 thread_index,
snat_session_key_t * k,
u32 * address_indexp);
int snat_static_mapping_match (snat_main_t * sm,
snat_session_key_t match,
snat_session_key_t * mapping,
u8 by_external,
u8 *is_addr_only);
void snat_add_del_addr_to_fib (ip4_address_t * addr,
u8 p_len,
u32 sw_if_index,
int is_add);
format_function_t format_snat_user;
typedef struct {
u32 cached_sw_if_index;
u32 cached_ip4_address;
} snat_runtime_t;
/** \brief Check if SNAT session is created from static mapping.
@param s SNAT session
@return 1 if SNAT session is created from static mapping otherwise 0
*/
#define snat_is_session_static(s) (s->flags & SNAT_SESSION_FLAG_STATIC_MAPPING)
/** \brief Check if SNAT session for unknown protocol.
@param s SNAT session
@return 1 if SNAT session for unknown protocol otherwise 0
*/
#define snat_is_unk_proto_session(s) s->flags & SNAT_SESSION_FLAG_UNKNOWN_PROTO
#define nat_interface_is_inside(i) i->flags & NAT_INTERFACE_FLAG_IS_INSIDE
#define nat_interface_is_outside(i) i->flags & NAT_INTERFACE_FLAG_IS_OUTSIDE
/*
* Why is this here? Because we don't need to touch this layer to
* simply reply to an icmp. We need to change id to a unique
* value to NAT an echo request/reply.
*/
typedef struct {
u16 identifier;
u16 sequence;
} icmp_echo_header_t;
always_inline u32
ip_proto_to_snat_proto (u8 ip_proto)
{
u32 snat_proto = ~0;
snat_proto = (ip_proto == IP_PROTOCOL_UDP) ? SNAT_PROTOCOL_UDP : snat_proto;
snat_proto = (ip_proto == IP_PROTOCOL_TCP) ? SNAT_PROTOCOL_TCP : snat_proto;
snat_proto = (ip_proto == IP_PROTOCOL_ICMP) ? SNAT_PROTOCOL_ICMP : snat_proto;
snat_proto = (ip_proto == IP_PROTOCOL_ICMP6) ? SNAT_PROTOCOL_ICMP : snat_proto;
return snat_proto;
}
always_inline u8
snat_proto_to_ip_proto (snat_protocol_t snat_proto)
{
u8 ip_proto = ~0;
ip_proto = (snat_proto == SNAT_PROTOCOL_UDP) ? IP_PROTOCOL_UDP : ip_proto;
ip_proto = (snat_proto == SNAT_PROTOCOL_TCP) ? IP_PROTOCOL_TCP : ip_proto;
ip_proto = (snat_proto == SNAT_PROTOCOL_ICMP) ? IP_PROTOCOL_ICMP : ip_proto;
return ip_proto;
}
typedef struct {
u16 src_port, dst_port;
} tcp_udp_header_t;
u32 icmp_match_in2out_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_in2out_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_in2out_det(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_out2in_fast(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_out2in_slow(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
u32 icmp_match_out2in_det(snat_main_t *sm, vlib_node_runtime_t *node,
u32 thread_index, vlib_buffer_t *b0,
ip4_header_t *ip0, u8 *p_proto,
snat_session_key_t *p_value,
u8 *p_dont_translate, void *d, void *e);
void increment_v4_address(ip4_address_t * a);
void snat_add_address(snat_main_t *sm, ip4_address_t *addr, u32 vrf_id);
int snat_del_address(snat_main_t *sm, ip4_address_t addr, u8 delete_sm);
int snat_add_static_mapping(ip4_address_t l_addr, ip4_address_t e_addr,
u16 l_port, u16 e_port, u32 vrf_id, int addr_only,
u32 sw_if_index, snat_protocol_t proto, int is_add);
clib_error_t * snat_api_init(vlib_main_t * vm, snat_main_t * sm);
int snat_set_workers (uword * bitmap);
int snat_interface_add_del(u32 sw_if_index, u8 is_inside, int is_del);
int snat_interface_add_del_output_feature(u32 sw_if_index, u8 is_inside,
int is_del);
int snat_add_interface_address(snat_main_t *sm, u32 sw_if_index, int is_del);
uword unformat_snat_protocol(unformat_input_t * input, va_list * args);
u8 * format_snat_protocol(u8 * s, va_list * args);
int nat44_add_del_lb_static_mapping (ip4_address_t e_addr, u16 e_port,
snat_protocol_t proto, u32 vrf_id,
nat44_lb_addr_port_t *locals, u8 is_add);
int nat44_del_session (snat_main_t *sm, ip4_address_t *addr, u16 port,
snat_protocol_t proto, u32 vrf_id, int is_in);
static_always_inline u8
icmp_is_error_message (icmp46_header_t * icmp)
{
switch(icmp->type)
{
case ICMP4_destination_unreachable:
case ICMP4_time_exceeded:
case ICMP4_parameter_problem:
case ICMP4_source_quench:
case ICMP4_redirect:
case ICMP4_alternate_host_address:
return 1;
}
return 0;
}
static_always_inline u8
is_interface_addr(snat_main_t *sm, vlib_node_runtime_t *node, u32 sw_if_index0,
u32 ip4_addr)
{
snat_runtime_t *rt = (snat_runtime_t *) node->runtime_data;
ip4_address_t * first_int_addr;
if (PREDICT_FALSE(rt->cached_sw_if_index != sw_if_index0))
{
first_int_addr =
ip4_interface_first_address (sm->ip4_main, sw_if_index0,
0 /* just want the address */);
rt->cached_sw_if_index = sw_if_index0;
if (first_int_addr)
rt->cached_ip4_address = first_int_addr->as_u32;
else
rt->cached_ip4_address = 0;
}
if (PREDICT_FALSE(ip4_addr == rt->cached_ip4_address))
return 1;
else
return 0;
}
always_inline u8
maximum_sessions_exceeded (snat_main_t *sm, u32 thread_index)
{
if (pool_elts (sm->per_thread_data[thread_index].sessions) >= sm->max_translations)
return 1;
return 0;
}
#endif /* __included_nat_h__ */