| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package android.net; |
| |
| import static android.annotation.SystemApi.Client.MODULE_LIBRARIES; |
| |
| import android.annotation.IntDef; |
| import android.annotation.NonNull; |
| import android.annotation.RequiresFeature; |
| import android.annotation.RequiresPermission; |
| import android.annotation.SystemApi; |
| import android.annotation.SystemService; |
| import android.annotation.TestApi; |
| import android.content.Context; |
| import android.content.pm.PackageManager; |
| import android.os.Binder; |
| import android.os.IBinder; |
| import android.os.ParcelFileDescriptor; |
| import android.os.RemoteException; |
| import android.os.ServiceSpecificException; |
| import android.system.ErrnoException; |
| import android.system.OsConstants; |
| import android.util.AndroidException; |
| import android.util.Log; |
| |
| import com.android.internal.annotations.VisibleForTesting; |
| import com.android.modules.utils.build.SdkLevel; |
| |
| import dalvik.system.CloseGuard; |
| |
| import java.io.FileDescriptor; |
| import java.io.IOException; |
| import java.lang.annotation.Retention; |
| import java.lang.annotation.RetentionPolicy; |
| import java.net.DatagramSocket; |
| import java.net.InetAddress; |
| import java.net.Socket; |
| import java.util.Objects; |
| |
| /** |
| * This class contains methods for managing IPsec sessions. Once configured, the kernel will apply |
| * confidentiality (encryption) and integrity (authentication) to IP traffic. |
| * |
| * <p>Note that not all aspects of IPsec are permitted by this API. Applications may create |
| * transport mode security associations and apply them to individual sockets. Applications looking |
| * to create an IPsec VPN should use {@link VpnManager} and {@link Ikev2VpnProfile}. |
| * |
| * @see <a href="https://tools.ietf.org/html/rfc4301">RFC 4301, Security Architecture for the |
| * Internet Protocol</a> |
| */ |
| @SystemService(Context.IPSEC_SERVICE) |
| public class IpSecManager { |
| private static final String TAG = "IpSecManager"; |
| |
| // TODO : remove this class when udc-mainline-prod is abandoned and android.net.flags.Flags is |
| // available here |
| /** @hide */ |
| public static class Flags { |
| static final String IPSEC_TRANSFORM_STATE = "com.android.net.flags.ipsec_transform_state"; |
| } |
| |
| /** |
| * Feature flag to declare the kernel support of updating IPsec SAs. |
| * |
| * <p>Feature for {@link #getSystemAvailableFeatures} and {@link #hasSystemFeature}: The device |
| * has the requisite kernel support for migrating IPsec tunnels to new source/destination |
| * addresses. |
| * |
| * <p>This feature implies that the device supports XFRM Migration (CONFIG_XFRM_MIGRATE) and has |
| * the kernel fixes to allow XFRM Migration correctly |
| * |
| * @see android.content.pm.PackageManager#FEATURE_IPSEC_TUNNEL_MIGRATION |
| * @hide |
| */ |
| // Redefine this flag here so that IPsec code shipped in a mainline module can build on old |
| // platforms before FEATURE_IPSEC_TUNNEL_MIGRATION API is released. |
| public static final String FEATURE_IPSEC_TUNNEL_MIGRATION = |
| "android.software.ipsec_tunnel_migration"; |
| |
| /** |
| * Used when applying a transform to direct traffic through an {@link IpSecTransform} |
| * towards the host. |
| * |
| * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}. |
| */ |
| public static final int DIRECTION_IN = 0; |
| |
| /** |
| * Used when applying a transform to direct traffic through an {@link IpSecTransform} |
| * away from the host. |
| * |
| * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}. |
| */ |
| public static final int DIRECTION_OUT = 1; |
| |
| /** |
| * Used when applying a transform to direct traffic through an {@link IpSecTransform} for |
| * forwarding between interfaces. |
| * |
| * <p>See {@link #applyTransportModeTransform(Socket, int, IpSecTransform)}. |
| * |
| * @hide |
| */ |
| @SystemApi(client = MODULE_LIBRARIES) |
| public static final int DIRECTION_FWD = 2; |
| |
| /** @hide */ |
| @IntDef(value = {DIRECTION_IN, DIRECTION_OUT}) |
| @Retention(RetentionPolicy.SOURCE) |
| public @interface PolicyDirection {} |
| |
| /** |
| * The Security Parameter Index (SPI) 0 indicates an unknown or invalid index. |
| * |
| * <p>No IPsec packet may contain an SPI of 0. |
| * |
| * @hide |
| */ |
| @TestApi public static final int INVALID_SECURITY_PARAMETER_INDEX = 0; |
| |
| /** @hide */ |
| public interface Status { |
| int OK = 0; |
| int RESOURCE_UNAVAILABLE = 1; |
| int SPI_UNAVAILABLE = 2; |
| } |
| |
| /** @hide */ |
| public static final int INVALID_RESOURCE_ID = -1; |
| |
| /** |
| * Thrown to indicate that a requested SPI is in use. |
| * |
| * <p>The combination of remote {@code InetAddress} and SPI must be unique across all apps on |
| * one device. If this error is encountered, a new SPI is required before a transform may be |
| * created. This error can be avoided by calling {@link |
| * IpSecManager#allocateSecurityParameterIndex}. |
| */ |
| public static final class SpiUnavailableException extends AndroidException { |
| private final int mSpi; |
| |
| /** |
| * Construct an exception indicating that a transform with the given SPI is already in use |
| * or otherwise unavailable. |
| * |
| * @param msg description indicating the colliding SPI |
| * @param spi the SPI that could not be used due to a collision |
| */ |
| SpiUnavailableException(String msg, int spi) { |
| super(msg + " (spi: " + spi + ")"); |
| mSpi = spi; |
| } |
| |
| /** Get the SPI that caused a collision. */ |
| public int getSpi() { |
| return mSpi; |
| } |
| } |
| |
| /** |
| * Thrown to indicate that an IPsec resource is unavailable. |
| * |
| * <p>This could apply to resources such as sockets, {@link SecurityParameterIndex}, {@link |
| * IpSecTransform}, or other system resources. If this exception is thrown, users should release |
| * allocated objects of the type requested. |
| */ |
| public static final class ResourceUnavailableException extends AndroidException { |
| |
| ResourceUnavailableException(String msg) { |
| super(msg); |
| } |
| } |
| |
| private final Context mContext; |
| private final IIpSecService mService; |
| |
| /** |
| * This class represents a reserved SPI. |
| * |
| * <p>Objects of this type are used to track reserved security parameter indices. They can be |
| * obtained by calling {@link IpSecManager#allocateSecurityParameterIndex} and must be released |
| * by calling {@link #close()} when they are no longer needed. |
| */ |
| public static final class SecurityParameterIndex implements AutoCloseable { |
| private final IIpSecService mService; |
| private final InetAddress mDestinationAddress; |
| private final CloseGuard mCloseGuard = CloseGuard.get(); |
| private int mSpi = INVALID_SECURITY_PARAMETER_INDEX; |
| private int mResourceId = INVALID_RESOURCE_ID; |
| |
| /** Get the underlying SPI held by this object. */ |
| public int getSpi() { |
| return mSpi; |
| } |
| |
| /** |
| * Release an SPI that was previously reserved. |
| * |
| * <p>Release an SPI for use by other users in the system. If a SecurityParameterIndex is |
| * applied to an IpSecTransform, it will become unusable for future transforms but should |
| * still be closed to ensure system resources are released. |
| */ |
| @Override |
| public void close() { |
| try { |
| mService.releaseSecurityParameterIndex(mResourceId); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } catch (Exception e) { |
| // On close we swallow all random exceptions since failure to close is not |
| // actionable by the user. |
| Log.e(TAG, "Failed to close " + this + ", Exception=" + e); |
| } finally { |
| mResourceId = INVALID_RESOURCE_ID; |
| mCloseGuard.close(); |
| } |
| } |
| |
| /** Check that the SPI was closed properly. */ |
| @Override |
| protected void finalize() throws Throwable { |
| if (mCloseGuard != null) { |
| mCloseGuard.warnIfOpen(); |
| } |
| |
| close(); |
| } |
| |
| private SecurityParameterIndex( |
| @NonNull IIpSecService service, InetAddress destinationAddress, int spi) |
| throws ResourceUnavailableException, SpiUnavailableException { |
| mService = service; |
| mDestinationAddress = destinationAddress; |
| try { |
| IpSecSpiResponse result = |
| mService.allocateSecurityParameterIndex( |
| destinationAddress.getHostAddress(), spi, new Binder()); |
| |
| if (result == null) { |
| throw new NullPointerException("Received null response from IpSecService"); |
| } |
| |
| int status = result.status; |
| switch (status) { |
| case Status.OK: |
| break; |
| case Status.RESOURCE_UNAVAILABLE: |
| throw new ResourceUnavailableException( |
| "No more SPIs may be allocated by this requester."); |
| case Status.SPI_UNAVAILABLE: |
| throw new SpiUnavailableException("Requested SPI is unavailable", spi); |
| default: |
| throw new RuntimeException( |
| "Unknown status returned by IpSecService: " + status); |
| } |
| mSpi = result.spi; |
| mResourceId = result.resourceId; |
| |
| if (mSpi == INVALID_SECURITY_PARAMETER_INDEX) { |
| throw new RuntimeException("Invalid SPI returned by IpSecService: " + status); |
| } |
| |
| if (mResourceId == INVALID_RESOURCE_ID) { |
| throw new RuntimeException( |
| "Invalid Resource ID returned by IpSecService: " + status); |
| } |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| mCloseGuard.open("close"); |
| } |
| |
| /** @hide */ |
| @VisibleForTesting |
| public int getResourceId() { |
| return mResourceId; |
| } |
| |
| @Override |
| public String toString() { |
| return new StringBuilder() |
| .append("SecurityParameterIndex{spi=") |
| .append(mSpi) |
| .append(",resourceId=") |
| .append(mResourceId) |
| .append("}") |
| .toString(); |
| } |
| } |
| |
| /** |
| * Reserve a random SPI for traffic bound to or from the specified destination address. |
| * |
| * <p>If successful, this SPI is guaranteed available until released by a call to {@link |
| * SecurityParameterIndex#close()}. |
| * |
| * @param destinationAddress the destination address for traffic bearing the requested SPI. |
| * For inbound traffic, the destination should be an address currently assigned on-device. |
| * @return the reserved SecurityParameterIndex |
| * @throws ResourceUnavailableException indicating that too many SPIs are |
| * currently allocated for this user |
| */ |
| @NonNull |
| public SecurityParameterIndex allocateSecurityParameterIndex( |
| @NonNull InetAddress destinationAddress) throws ResourceUnavailableException { |
| try { |
| return new SecurityParameterIndex( |
| mService, |
| destinationAddress, |
| IpSecManager.INVALID_SECURITY_PARAMETER_INDEX); |
| } catch (ServiceSpecificException e) { |
| throw rethrowUncheckedExceptionFromServiceSpecificException(e); |
| } catch (SpiUnavailableException unlikely) { |
| // Because this function allocates a totally random SPI, it really shouldn't ever |
| // fail to allocate an SPI; we simply need this because the exception is checked. |
| throw new ResourceUnavailableException("No SPIs available"); |
| } |
| } |
| |
| /** |
| * Reserve the requested SPI for traffic bound to or from the specified destination address. |
| * |
| * <p>If successful, this SPI is guaranteed available until released by a call to {@link |
| * SecurityParameterIndex#close()}. |
| * |
| * @param destinationAddress the destination address for traffic bearing the requested SPI. |
| * For inbound traffic, the destination should be an address currently assigned on-device. |
| * @param requestedSpi the requested SPI. The range 1-255 is reserved and may not be used. See |
| * RFC 4303 Section 2.1. |
| * @return the reserved SecurityParameterIndex |
| * @throws ResourceUnavailableException indicating that too many SPIs are |
| * currently allocated for this user |
| * @throws SpiUnavailableException indicating that the requested SPI could not be |
| * reserved |
| */ |
| @NonNull |
| public SecurityParameterIndex allocateSecurityParameterIndex( |
| @NonNull InetAddress destinationAddress, int requestedSpi) |
| throws SpiUnavailableException, ResourceUnavailableException { |
| if (requestedSpi == IpSecManager.INVALID_SECURITY_PARAMETER_INDEX) { |
| throw new IllegalArgumentException("Requested SPI must be a valid (non-zero) SPI"); |
| } |
| try { |
| return new SecurityParameterIndex(mService, destinationAddress, requestedSpi); |
| } catch (ServiceSpecificException e) { |
| throw rethrowUncheckedExceptionFromServiceSpecificException(e); |
| } |
| } |
| |
| /** |
| * Apply an IPsec transform to a stream socket. |
| * |
| * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the |
| * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When |
| * the transform is removed from the socket by calling {@link #removeTransportModeTransforms}, |
| * unprotected traffic can resume on that socket. |
| * |
| * <p>For security reasons, the destination address of any traffic on the socket must match the |
| * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any |
| * other IP address will result in an IOException. In addition, reads and writes on the socket |
| * will throw IOException if the user deactivates the transform (by calling {@link |
| * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}. |
| * |
| * <p>Note that when applied to TCP sockets, calling {@link IpSecTransform#close()} on an |
| * applied transform before completion of graceful shutdown may result in the shutdown sequence |
| * failing to complete. As such, applications requiring graceful shutdown MUST close the socket |
| * prior to deactivating the applied transform. Socket closure may be performed asynchronously |
| * (in batches), so the returning of a close function does not guarantee shutdown of a socket. |
| * Setting an SO_LINGER timeout results in socket closure being performed synchronously, and is |
| * sufficient to ensure shutdown. |
| * |
| * Specifically, if the transform is deactivated (by calling {@link IpSecTransform#close()}), |
| * prior to the socket being closed, the standard [FIN - FIN/ACK - ACK], or the reset [RST] |
| * packets are dropped due to the lack of a valid Transform. Similarly, if a socket without the |
| * SO_LINGER option set is closed, the delayed/batched FIN packets may be dropped. |
| * |
| * <h4>Rekey Procedure</h4> |
| * |
| * <p>When applying a new tranform to a socket in the outbound direction, the previous transform |
| * will be removed and the new transform will take effect immediately, sending all traffic on |
| * the new transform; however, when applying a transform in the inbound direction, traffic |
| * on the old transform will continue to be decrypted and delivered until that transform is |
| * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey |
| * procedures where both transforms are valid until both endpoints are using the new transform |
| * and all in-flight packets have been received. |
| * |
| * @param socket a stream socket |
| * @param direction the direction in which the transform should be applied |
| * @param transform a transport mode {@code IpSecTransform} |
| * @throws IOException indicating that the transform could not be applied |
| */ |
| public void applyTransportModeTransform(@NonNull Socket socket, |
| @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException { |
| // Ensure creation of FD. See b/77548890 for more details. |
| socket.getSoLinger(); |
| |
| applyTransportModeTransform(socket.getFileDescriptor$(), direction, transform); |
| } |
| |
| /** |
| * Apply an IPsec transform to a datagram socket. |
| * |
| * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the |
| * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When |
| * the transform is removed from the socket by calling {@link #removeTransportModeTransforms}, |
| * unprotected traffic can resume on that socket. |
| * |
| * <p>For security reasons, the destination address of any traffic on the socket must match the |
| * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any |
| * other IP address will result in an IOException. In addition, reads and writes on the socket |
| * will throw IOException if the user deactivates the transform (by calling {@link |
| * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}. |
| * |
| * <h4>Rekey Procedure</h4> |
| * |
| * <p>When applying a new tranform to a socket in the outbound direction, the previous transform |
| * will be removed and the new transform will take effect immediately, sending all traffic on |
| * the new transform; however, when applying a transform in the inbound direction, traffic |
| * on the old transform will continue to be decrypted and delivered until that transform is |
| * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey |
| * procedures where both transforms are valid until both endpoints are using the new transform |
| * and all in-flight packets have been received. |
| * |
| * @param socket a datagram socket |
| * @param direction the direction in which the transform should be applied |
| * @param transform a transport mode {@code IpSecTransform} |
| * @throws IOException indicating that the transform could not be applied |
| */ |
| public void applyTransportModeTransform(@NonNull DatagramSocket socket, |
| @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException { |
| applyTransportModeTransform(socket.getFileDescriptor$(), direction, transform); |
| } |
| |
| /** |
| * Apply an IPsec transform to a socket. |
| * |
| * <p>This applies transport mode encapsulation to the given socket. Once applied, I/O on the |
| * socket will be encapsulated according to the parameters of the {@code IpSecTransform}. When |
| * the transform is removed from the socket by calling {@link #removeTransportModeTransforms}, |
| * unprotected traffic can resume on that socket. |
| * |
| * <p>For security reasons, the destination address of any traffic on the socket must match the |
| * remote {@code InetAddress} of the {@code IpSecTransform}. Attempts to send traffic to any |
| * other IP address will result in an IOException. In addition, reads and writes on the socket |
| * will throw IOException if the user deactivates the transform (by calling {@link |
| * IpSecTransform#close()}) without calling {@link #removeTransportModeTransforms}. |
| * |
| * <p>Note that when applied to TCP sockets, calling {@link IpSecTransform#close()} on an |
| * applied transform before completion of graceful shutdown may result in the shutdown sequence |
| * failing to complete. As such, applications requiring graceful shutdown MUST close the socket |
| * prior to deactivating the applied transform. Socket closure may be performed asynchronously |
| * (in batches), so the returning of a close function does not guarantee shutdown of a socket. |
| * Setting an SO_LINGER timeout results in socket closure being performed synchronously, and is |
| * sufficient to ensure shutdown. |
| * |
| * Specifically, if the transform is deactivated (by calling {@link IpSecTransform#close()}), |
| * prior to the socket being closed, the standard [FIN - FIN/ACK - ACK], or the reset [RST] |
| * packets are dropped due to the lack of a valid Transform. Similarly, if a socket without the |
| * SO_LINGER option set is closed, the delayed/batched FIN packets may be dropped. |
| * |
| * <h4>Rekey Procedure</h4> |
| * |
| * <p>When applying a new tranform to a socket in the outbound direction, the previous transform |
| * will be removed and the new transform will take effect immediately, sending all traffic on |
| * the new transform; however, when applying a transform in the inbound direction, traffic |
| * on the old transform will continue to be decrypted and delivered until that transform is |
| * deallocated by calling {@link IpSecTransform#close()}. This overlap allows lossless rekey |
| * procedures where both transforms are valid until both endpoints are using the new transform |
| * and all in-flight packets have been received. |
| * |
| * @param socket a socket file descriptor |
| * @param direction the direction in which the transform should be applied |
| * @param transform a transport mode {@code IpSecTransform} |
| * @throws IOException indicating that the transform could not be applied |
| */ |
| public void applyTransportModeTransform(@NonNull FileDescriptor socket, |
| @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException { |
| // We dup() the FileDescriptor here because if we don't, then the ParcelFileDescriptor() |
| // constructor takes control and closes the user's FD when we exit the method. |
| try (ParcelFileDescriptor pfd = ParcelFileDescriptor.dup(socket)) { |
| mService.applyTransportModeTransform(pfd, direction, transform.getResourceId()); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * Remove an IPsec transform from a stream socket. |
| * |
| * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a |
| * socket allows the socket to be reused for communication in the clear. |
| * |
| * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling |
| * {@link IpSecTransform#close()}, then communication on the socket will fail until this method |
| * is called. |
| * |
| * @param socket a socket that previously had a transform applied to it |
| * @throws IOException indicating that the transform could not be removed from the socket |
| */ |
| public void removeTransportModeTransforms(@NonNull Socket socket) throws IOException { |
| // Ensure creation of FD. See b/77548890 for more details. |
| socket.getSoLinger(); |
| |
| removeTransportModeTransforms(socket.getFileDescriptor$()); |
| } |
| |
| /** |
| * Remove an IPsec transform from a datagram socket. |
| * |
| * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a |
| * socket allows the socket to be reused for communication in the clear. |
| * |
| * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling |
| * {@link IpSecTransform#close()}, then communication on the socket will fail until this method |
| * is called. |
| * |
| * @param socket a socket that previously had a transform applied to it |
| * @throws IOException indicating that the transform could not be removed from the socket |
| */ |
| public void removeTransportModeTransforms(@NonNull DatagramSocket socket) throws IOException { |
| removeTransportModeTransforms(socket.getFileDescriptor$()); |
| } |
| |
| /** |
| * Remove an IPsec transform from a socket. |
| * |
| * <p>Once removed, traffic on the socket will not be encrypted. Removing transforms from a |
| * socket allows the socket to be reused for communication in the clear. |
| * |
| * <p>If an {@code IpSecTransform} object applied to this socket was deallocated by calling |
| * {@link IpSecTransform#close()}, then communication on the socket will fail until this method |
| * is called. |
| * |
| * @param socket a socket that previously had a transform applied to it |
| * @throws IOException indicating that the transform could not be removed from the socket |
| */ |
| public void removeTransportModeTransforms(@NonNull FileDescriptor socket) throws IOException { |
| try (ParcelFileDescriptor pfd = ParcelFileDescriptor.dup(socket)) { |
| mService.removeTransportModeTransforms(pfd); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * Remove a Tunnel Mode IPsec Transform from a {@link Network}. This must be used as part of |
| * cleanup if a tunneled Network experiences a change in default route. The Network will drop |
| * all traffic that cannot be routed to the Tunnel's outbound interface. If that interface is |
| * lost, all traffic will drop. |
| * |
| * <p>TODO: Update javadoc for tunnel mode APIs at the same time the APIs are re-worked. |
| * |
| * @param net a network that currently has transform applied to it. |
| * @param transform a Tunnel Mode IPsec Transform that has been previously applied to the given |
| * network |
| * @hide |
| */ |
| public void removeTunnelModeTransform(Network net, IpSecTransform transform) {} |
| |
| /** |
| * This class provides access to a UDP encapsulation Socket. |
| * |
| * <p>{@code UdpEncapsulationSocket} wraps a system-provided datagram socket intended for IKEv2 |
| * signalling and UDP encapsulated IPsec traffic. Instances can be obtained by calling {@link |
| * IpSecManager#openUdpEncapsulationSocket}. The provided socket cannot be re-bound by the |
| * caller. The caller should not close the {@code FileDescriptor} returned by {@link |
| * #getFileDescriptor}, but should use {@link #close} instead. |
| * |
| * <p>Allowing the user to close or unbind a UDP encapsulation socket could impact the traffic |
| * of the next user who binds to that port. To prevent this scenario, these sockets are held |
| * open by the system so that they may only be closed by calling {@link #close} or when the user |
| * process exits. |
| */ |
| public static final class UdpEncapsulationSocket implements AutoCloseable { |
| private final ParcelFileDescriptor mPfd; |
| private final IIpSecService mService; |
| private int mResourceId = INVALID_RESOURCE_ID; |
| private final int mPort; |
| private final CloseGuard mCloseGuard = CloseGuard.get(); |
| |
| private UdpEncapsulationSocket(@NonNull IIpSecService service, int port) |
| throws ResourceUnavailableException, IOException { |
| mService = service; |
| try { |
| IpSecUdpEncapResponse result = |
| mService.openUdpEncapsulationSocket(port, new Binder()); |
| switch (result.status) { |
| case Status.OK: |
| break; |
| case Status.RESOURCE_UNAVAILABLE: |
| throw new ResourceUnavailableException( |
| "No more Sockets may be allocated by this requester."); |
| default: |
| throw new RuntimeException( |
| "Unknown status returned by IpSecService: " + result.status); |
| } |
| mResourceId = result.resourceId; |
| mPort = result.port; |
| mPfd = result.fileDescriptor; |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| mCloseGuard.open("close"); |
| } |
| |
| /** Get the encapsulation socket's file descriptor. */ |
| public FileDescriptor getFileDescriptor() { |
| if (mPfd == null) { |
| return null; |
| } |
| return mPfd.getFileDescriptor(); |
| } |
| |
| /** Get the bound port of the wrapped socket. */ |
| public int getPort() { |
| return mPort; |
| } |
| |
| /** |
| * Close this socket. |
| * |
| * <p>This closes the wrapped socket. Open encapsulation sockets count against a user's |
| * resource limits, and forgetting to close them eventually will result in {@link |
| * ResourceUnavailableException} being thrown. |
| */ |
| @Override |
| public void close() throws IOException { |
| try { |
| mService.closeUdpEncapsulationSocket(mResourceId); |
| mResourceId = INVALID_RESOURCE_ID; |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } catch (Exception e) { |
| // On close we swallow all random exceptions since failure to close is not |
| // actionable by the user. |
| Log.e(TAG, "Failed to close " + this + ", Exception=" + e); |
| } finally { |
| mResourceId = INVALID_RESOURCE_ID; |
| mCloseGuard.close(); |
| } |
| |
| try { |
| mPfd.close(); |
| } catch (IOException e) { |
| Log.e(TAG, "Failed to close UDP Encapsulation Socket with Port= " + mPort); |
| throw e; |
| } |
| } |
| |
| /** Check that the socket was closed properly. */ |
| @Override |
| protected void finalize() throws Throwable { |
| if (mCloseGuard != null) { |
| mCloseGuard.warnIfOpen(); |
| } |
| close(); |
| } |
| |
| /** @hide */ |
| @SystemApi(client = MODULE_LIBRARIES) |
| public int getResourceId() { |
| return mResourceId; |
| } |
| |
| @Override |
| public String toString() { |
| return new StringBuilder() |
| .append("UdpEncapsulationSocket{port=") |
| .append(mPort) |
| .append(",resourceId=") |
| .append(mResourceId) |
| .append("}") |
| .toString(); |
| } |
| }; |
| |
| /** |
| * Open a socket for UDP encapsulation and bind to the given port. |
| * |
| * <p>See {@link UdpEncapsulationSocket} for the proper way to close the returned socket. |
| * |
| * @param port a local UDP port |
| * @return a socket that is bound to the given port |
| * @throws IOException indicating that the socket could not be opened or bound |
| * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open |
| */ |
| // Returning a socket in this fashion that has been created and bound by the system |
| // is the only safe way to ensure that a socket is both accessible to the user and |
| // safely usable for Encapsulation without allowing a user to possibly unbind from/close |
| // the port, which could potentially impact the traffic of the next user who binds to that |
| // socket. |
| @NonNull |
| public UdpEncapsulationSocket openUdpEncapsulationSocket(int port) |
| throws IOException, ResourceUnavailableException { |
| /* |
| * Most range checking is done in the service, but this version of the constructor expects |
| * a valid port number, and zero cannot be checked after being passed to the service. |
| */ |
| if (port == 0) { |
| throw new IllegalArgumentException("Specified port must be a valid port number!"); |
| } |
| try { |
| return new UdpEncapsulationSocket(mService, port); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } |
| } |
| |
| /** |
| * Open a socket for UDP encapsulation. |
| * |
| * <p>See {@link UdpEncapsulationSocket} for the proper way to close the returned socket. |
| * |
| * <p>The local port of the returned socket can be obtained by calling {@link |
| * UdpEncapsulationSocket#getPort()}. |
| * |
| * @return a socket that is bound to a local port |
| * @throws IOException indicating that the socket could not be opened or bound |
| * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open |
| */ |
| // Returning a socket in this fashion that has been created and bound by the system |
| // is the only safe way to ensure that a socket is both accessible to the user and |
| // safely usable for Encapsulation without allowing a user to possibly unbind from/close |
| // the port, which could potentially impact the traffic of the next user who binds to that |
| // socket. |
| @NonNull |
| public UdpEncapsulationSocket openUdpEncapsulationSocket() |
| throws IOException, ResourceUnavailableException { |
| try { |
| return new UdpEncapsulationSocket(mService, 0); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } |
| } |
| |
| /** |
| * This class represents an IpSecTunnelInterface |
| * |
| * <p>IpSecTunnelInterface objects track tunnel interfaces that serve as |
| * local endpoints for IPsec tunnels. |
| * |
| * <p>Creating an IpSecTunnelInterface creates a device to which IpSecTransforms may be |
| * applied to provide IPsec security to packets sent through the tunnel. While a tunnel |
| * cannot be used in standalone mode within Android, the higher layers may use the tunnel |
| * to create Network objects which are accessible to the Android system. |
| * @hide |
| */ |
| @SystemApi |
| public static final class IpSecTunnelInterface implements AutoCloseable { |
| private final String mOpPackageName; |
| private final IIpSecService mService; |
| private final InetAddress mRemoteAddress; |
| private final InetAddress mLocalAddress; |
| private final Network mUnderlyingNetwork; |
| private final CloseGuard mCloseGuard = CloseGuard.get(); |
| private String mInterfaceName; |
| private int mResourceId = INVALID_RESOURCE_ID; |
| |
| /** Get the underlying SPI held by this object. */ |
| @NonNull |
| public String getInterfaceName() { |
| return mInterfaceName; |
| } |
| |
| /** |
| * Add an address to the IpSecTunnelInterface |
| * |
| * <p>Add an address which may be used as the local inner address for |
| * tunneled traffic. |
| * |
| * @param address the local address for traffic inside the tunnel |
| * @param prefixLen length of the InetAddress prefix |
| * @hide |
| */ |
| @SystemApi |
| @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public void addAddress(@NonNull InetAddress address, int prefixLen) throws IOException { |
| try { |
| mService.addAddressToTunnelInterface( |
| mResourceId, new LinkAddress(address, prefixLen), mOpPackageName); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * Remove an address from the IpSecTunnelInterface |
| * |
| * <p>Remove an address which was previously added to the IpSecTunnelInterface |
| * |
| * @param address to be removed |
| * @param prefixLen length of the InetAddress prefix |
| * @hide |
| */ |
| @SystemApi |
| @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public void removeAddress(@NonNull InetAddress address, int prefixLen) throws IOException { |
| try { |
| mService.removeAddressFromTunnelInterface( |
| mResourceId, new LinkAddress(address, prefixLen), mOpPackageName); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * Update the underlying network for this IpSecTunnelInterface. |
| * |
| * <p>This new underlying network will be used for all transforms applied AFTER this call is |
| * complete. Before {@link IpSecTransform}(s) with matching addresses are applied to this |
| * tunnel interface, traffic will still use the old transform, and be routed on the old |
| * underlying network. |
| * |
| * <p>To migrate IPsec tunnel mode traffic, a caller should: |
| * |
| * <ol> |
| * <li>Update the IpSecTunnelInterface’s underlying network. |
| * <li>Apply the new {@link IpSecTransform}(s) to this IpSecTunnelInterface. These can be |
| * new {@link IpSecTransform}(s) with matching addresses, or {@link IpSecTransform}(s) |
| * that have started migration (see {@link |
| * IpSecManager#startTunnelModeTransformMigration}). |
| * </ol> |
| * |
| * @param underlyingNetwork the new {@link Network} that will carry traffic for this tunnel. |
| * This network MUST be a functional {@link Network} with valid {@link LinkProperties}, |
| * and MUST never be the network exposing this IpSecTunnelInterface, otherwise this |
| * method will throw an {@link IllegalArgumentException}. If the IpSecTunnelInterface is |
| * later added to this network, all outbound traffic will be blackholed. |
| */ |
| // The purpose of making updating network and applying transforms separate is to leave open |
| // the possibility to support lossless migration procedures. To do that, Android platform |
| // will need to support multiple inbound tunnel mode transforms, just like it can support |
| // multiple transport mode transforms. |
| @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public void setUnderlyingNetwork(@NonNull Network underlyingNetwork) throws IOException { |
| try { |
| mService.setNetworkForTunnelInterface( |
| mResourceId, underlyingNetwork, mOpPackageName); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| private IpSecTunnelInterface(@NonNull Context ctx, @NonNull IIpSecService service, |
| @NonNull InetAddress localAddress, @NonNull InetAddress remoteAddress, |
| @NonNull Network underlyingNetwork) |
| throws ResourceUnavailableException, IOException { |
| mOpPackageName = ctx.getOpPackageName(); |
| mService = service; |
| mLocalAddress = localAddress; |
| mRemoteAddress = remoteAddress; |
| mUnderlyingNetwork = underlyingNetwork; |
| |
| try { |
| IpSecTunnelInterfaceResponse result = |
| mService.createTunnelInterface( |
| localAddress.getHostAddress(), |
| remoteAddress.getHostAddress(), |
| underlyingNetwork, |
| new Binder(), |
| mOpPackageName); |
| switch (result.status) { |
| case Status.OK: |
| break; |
| case Status.RESOURCE_UNAVAILABLE: |
| throw new ResourceUnavailableException( |
| "No more tunnel interfaces may be allocated by this requester."); |
| default: |
| throw new RuntimeException( |
| "Unknown status returned by IpSecService: " + result.status); |
| } |
| mResourceId = result.resourceId; |
| mInterfaceName = result.interfaceName; |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| mCloseGuard.open("close"); |
| } |
| |
| /** |
| * Delete an IpSecTunnelInterface |
| * |
| * <p>Calling close will deallocate the IpSecTunnelInterface and all of its system |
| * resources. Any packets bound for this interface either inbound or outbound will |
| * all be lost. |
| */ |
| @Override |
| public void close() { |
| try { |
| mService.deleteTunnelInterface(mResourceId, mOpPackageName); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } catch (Exception e) { |
| // On close we swallow all random exceptions since failure to close is not |
| // actionable by the user. |
| Log.e(TAG, "Failed to close " + this + ", Exception=" + e); |
| } finally { |
| mResourceId = INVALID_RESOURCE_ID; |
| mCloseGuard.close(); |
| } |
| } |
| |
| /** Check that the Interface was closed properly. */ |
| @Override |
| protected void finalize() throws Throwable { |
| if (mCloseGuard != null) { |
| mCloseGuard.warnIfOpen(); |
| } |
| close(); |
| } |
| |
| /** @hide */ |
| @VisibleForTesting |
| public int getResourceId() { |
| return mResourceId; |
| } |
| |
| @NonNull |
| @Override |
| public String toString() { |
| return new StringBuilder() |
| .append("IpSecTunnelInterface{ifname=") |
| .append(mInterfaceName) |
| .append(",resourceId=") |
| .append(mResourceId) |
| .append("}") |
| .toString(); |
| } |
| } |
| |
| /** |
| * Create a new IpSecTunnelInterface as a local endpoint for tunneled IPsec traffic. |
| * |
| * <p>An application that creates tunnels is responsible for cleaning up the tunnel when the |
| * underlying network goes away, and the onLost() callback is received. |
| * |
| * @param localAddress The local addres of the tunnel |
| * @param remoteAddress The local addres of the tunnel |
| * @param underlyingNetwork the {@link Network} that will carry traffic for this tunnel. |
| * This network should almost certainly be a network such as WiFi with an L2 address. |
| * @return a new {@link IpSecManager#IpSecTunnelInterface} with the specified properties |
| * @throws IOException indicating that the socket could not be opened or bound |
| * @throws ResourceUnavailableException indicating that too many encapsulation sockets are open |
| * @hide |
| */ |
| @SystemApi |
| @NonNull |
| @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public IpSecTunnelInterface createIpSecTunnelInterface(@NonNull InetAddress localAddress, |
| @NonNull InetAddress remoteAddress, @NonNull Network underlyingNetwork) |
| throws ResourceUnavailableException, IOException { |
| try { |
| return new IpSecTunnelInterface( |
| mContext, mService, localAddress, remoteAddress, underlyingNetwork); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } |
| } |
| |
| /** |
| * Apply an active Tunnel Mode IPsec Transform to a {@link IpSecTunnelInterface}, which will |
| * tunnel all traffic for the given direction through the underlying network's interface with |
| * IPsec (applies an outer IP header and IPsec Header to all traffic, and expects an additional |
| * IP header and IPsec Header on all inbound traffic). |
| * <p>Applications should probably not use this API directly. |
| * |
| * @param tunnel The {@link IpSecManager#IpSecTunnelInterface} that will use the supplied |
| * transform. |
| * @param direction the direction, {@link DIRECTION_OUT} or {@link #DIRECTION_IN} in which |
| * the transform will be used. |
| * @param transform an {@link IpSecTransform} created in tunnel mode |
| * @throws IOException indicating that the transform could not be applied due to a lower |
| * layer failure. |
| * @hide |
| */ |
| @SystemApi |
| @RequiresFeature(PackageManager.FEATURE_IPSEC_TUNNELS) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public void applyTunnelModeTransform(@NonNull IpSecTunnelInterface tunnel, |
| @PolicyDirection int direction, @NonNull IpSecTransform transform) throws IOException { |
| try { |
| mService.applyTunnelModeTransform( |
| tunnel.getResourceId(), direction, |
| transform.getResourceId(), mContext.getOpPackageName()); |
| } catch (ServiceSpecificException e) { |
| throw rethrowCheckedExceptionFromServiceSpecificException(e); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * Migrate an active Tunnel Mode IPsec Transform to new source/destination addresses. |
| * |
| * <p>Begins the process of migrating a transform and cache the new addresses. To complete the |
| * migration once started, callers MUST apply the same transform to the appropriate tunnel using |
| * {@link IpSecManager#applyTunnelModeTransform}. Otherwise, the address update will not be |
| * committed and the transform will still only process traffic between the current source and |
| * destination address. One common use case is that the control plane will start the migration |
| * process and then hand off the transform to the IPsec caller to perform the actual migration |
| * when the tunnel is ready. |
| * |
| * <p>If this method is called multiple times before {@link |
| * IpSecManager#applyTunnelModeTransform} is called, when the transform is applied, it will be |
| * migrated to the addresses from the last call. |
| * |
| * <p>The provided source and destination addresses MUST share the same address family, but they |
| * can have a different family from the current addresses. |
| * |
| * <p>Transform migration is only supported for tunnel mode transforms. Calling this method on |
| * other types of transforms will throw an {@code UnsupportedOperationException}. |
| * |
| * @see IpSecTunnelInterface#setUnderlyingNetwork |
| * @param transform a tunnel mode {@link IpSecTransform} |
| * @param newSourceAddress the new source address |
| * @param newDestinationAddress the new destination address |
| * @hide |
| */ |
| @SystemApi |
| @RequiresFeature(FEATURE_IPSEC_TUNNEL_MIGRATION) |
| @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) |
| public void startTunnelModeTransformMigration( |
| @NonNull IpSecTransform transform, |
| @NonNull InetAddress newSourceAddress, |
| @NonNull InetAddress newDestinationAddress) { |
| if (!SdkLevel.isAtLeastU()) { |
| throw new UnsupportedOperationException( |
| "Transform migration only supported for Android 14+"); |
| } |
| |
| Objects.requireNonNull(transform, "transform was null"); |
| Objects.requireNonNull(newSourceAddress, "newSourceAddress was null"); |
| Objects.requireNonNull(newDestinationAddress, "newDestinationAddress was null"); |
| |
| try { |
| mService.migrateTransform( |
| transform.getResourceId(), |
| newSourceAddress.getHostAddress(), |
| newDestinationAddress.getHostAddress(), |
| mContext.getOpPackageName()); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * @hide |
| */ |
| public IpSecTransformResponse createTransform(IpSecConfig config, IBinder binder, |
| String callingPackage) { |
| try { |
| return mService.createTransform(config, binder, callingPackage); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** |
| * @hide |
| */ |
| public void deleteTransform(int resourceId) { |
| try { |
| mService.deleteTransform(resourceId); |
| } catch (RemoteException e) { |
| throw e.rethrowFromSystemServer(); |
| } |
| } |
| |
| /** @hide */ |
| public IpSecTransformState getTransformState(int transformId) |
| throws IllegalStateException, RemoteException { |
| return mService.getTransformState(transformId); |
| } |
| |
| /** |
| * Construct an instance of IpSecManager within an application context. |
| * |
| * @param context the application context for this manager |
| * @hide |
| */ |
| public IpSecManager(Context ctx, IIpSecService service) { |
| mContext = ctx; |
| mService = Objects.requireNonNull(service, "missing service"); |
| } |
| |
| private static void maybeHandleServiceSpecificException(ServiceSpecificException sse) { |
| // OsConstants are late binding, so switch statements can't be used. |
| if (sse.errorCode == OsConstants.EINVAL) { |
| throw new IllegalArgumentException(sse); |
| } else if (sse.errorCode == OsConstants.EAGAIN) { |
| throw new IllegalStateException(sse); |
| } else if (sse.errorCode == OsConstants.EOPNOTSUPP |
| || sse.errorCode == OsConstants.EPROTONOSUPPORT) { |
| throw new UnsupportedOperationException(sse); |
| } |
| } |
| |
| /** |
| * Convert an Errno SSE to the correct Unchecked exception type. |
| * |
| * This method never actually returns. |
| */ |
| // package |
| static RuntimeException |
| rethrowUncheckedExceptionFromServiceSpecificException(ServiceSpecificException sse) { |
| maybeHandleServiceSpecificException(sse); |
| throw new RuntimeException(sse); |
| } |
| |
| /** |
| * Convert an Errno SSE to the correct Checked or Unchecked exception type. |
| * |
| * This method may throw IOException, or it may throw an unchecked exception; it will never |
| * actually return. |
| */ |
| // package |
| static IOException rethrowCheckedExceptionFromServiceSpecificException( |
| ServiceSpecificException sse) throws IOException { |
| // First see if this is an unchecked exception of a type we know. |
| // If so, then we prefer the unchecked (specific) type of exception. |
| maybeHandleServiceSpecificException(sse); |
| // If not, then all we can do is provide the SSE in the form of an IOException. |
| throw new ErrnoException( |
| "IpSec encountered errno=" + sse.errorCode, sse.errorCode).rethrowAsIOException(); |
| } |
| } |