⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 checkacl.cpp

📁 NDIS HOOK实例
💻 CPP
📖 第 1 页 / 共 2 页
字号:
//=============================================================================================
/*
	文件:		CheckAcl.cpp

	说明:
	---------------------------------------------------
		控管规则访问控制,通过控管规则的检查认证,确定
	Socket 连接是否允许通过。
	---------------------------------------------------

	工程:		Xfilter 个人防火墙
	作者:		朱雁辉,朱雁冰
	创建日期:	2001/08/21
	网址:		http://www.xfilt.com
	电子邮件:	xstudio@xfilt.com
	版权所有 (c) 2001-2002 X 工作室

	警告:
	---------------------------------------------------
		本电脑程序受著作权法的保护。未经授权,不能使用
	和修改本软件全部或部分源代码。凡擅自复制、盗用或散
	布此程序或部分程序或者有其它任何越权行为,将遭到民
	事赔偿及刑事的处罚,并将依法以最高刑罚进行追诉。
	
		凡通过合法途径购买本软件源代码的用户被默认授权
	可以在自己的程序中使用本软件的部分代码,但作者不对
	代码产生的任何后果负责。
	
		使用了本软件代码的程序只能以可执行文件形式发布,
	未经特别许可,不能将含有本软件源代码的源程序以任何
	形式发布。
	---------------------------------------------------	
*/
//=============================================================================================

#include "stdafx.h"
#include "CheckAcl.h"
#include "TcpIpDog.h"

//=============================================================================================
// share data

#pragma data_seg(".inidata")
	int			m_iWorkMode		= XF_PASS_ALL;
	BOOL		m_bAclIsChange	= FALSE;
	HWND		m_GuiHwnd		= NULL;
	BOOL		m_bIsWin9x		= FALSE;
#pragma data_seg()

#pragma bss_seg(".uinidata")
	XACL_FILE	m_AclFile;
	SESSION		m_SessionBuf[MAX_SESSION_BUFFER];
	TCHAR		m_sGuiPathName[MAX_PATH];
	TCHAR		m_sSystemPath[MAX_PATH];
	TCHAR		m_sWin9xSys1[MAX_PATH];
	TCHAR		m_sWin2kSys1[MAX_PATH];
	TCHAR		m_sWin2kSys2[MAX_PATH];	// v1.0.2 add 2001-12-22
#pragma bss_seg()

CRITICAL_SECTION	m_csWorkMode;
CRITICAL_SECTION	m_csAclChangeMode;
CRITICAL_SECTION	m_csSetProcessName;
CRITICAL_SECTION	m_csSystemVersion;
CRITICAL_SECTION	m_csSetAcl;

//=============================================================================================
// extern globals variable
extern TCHAR	m_sProcessName[MAX_PATH];

//=============================================================================================
// initialize class function and pre-destroy class function.

CCheckAcl::CCheckAcl()
{
	InitializeCriticalSection(&m_csWorkMode);
	InitializeCriticalSection(&m_csSetAcl);
	InitializeCriticalSection(&m_csAclChangeMode);
	InitializeCriticalSection(&m_csSetProcessName);
	InitializeCriticalSection(&m_csSystemVersion);

	InitializeCriticalSection(&m_csSession);

	m_SessionCount = 0;
}

CCheckAcl::~CCheckAcl()
{
	FinallySession();
	delete[](m_Session);
}

BOOL CCheckAcl::SetWindowsVersion()
{
	EnterCriticalSection(&m_csSystemVersion);
	{
		OSVERSIONINFO VerInfo;  
		VerInfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO);
		GetVersionEx(&VerInfo);

		if (VerInfo.dwPlatformId == VER_PLATFORM_WIN32_WINDOWS)
		{
			m_bIsWin9x = TRUE;
		}
		else if(VerInfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
			(VerInfo.dwMajorVersion == 4 || VerInfo.dwMajorVersion == 5))
		{
			m_bIsWin9x = FALSE;
		}

		GetSystemDirectory(m_sSystemPath, MAX_PATH);

		_tcscpy(m_sWin9xSys1, m_sSystemPath);
		_tcscat(m_sWin9xSys1, _T("\\icsmgr.exe"));
		_tcscpy(m_sWin2kSys1, m_sSystemPath);
		_tcscat(m_sWin2kSys1, _T("\\services.exe"));

		// v1.0.2 add 2001-12-22
		_tcscpy(m_sWin2kSys2, m_sSystemPath);
		_tcscat(m_sWin2kSys2, _T("\\INETSRV\\INETINFO.EXE"));
	}
	LeaveCriticalSection(&m_csSystemVersion);
	
	return TRUE; 
}

//=============================================================================================
// Static function, XFILTER.EXE to change the work mode and ACL information, 
// it's operate by XfIoControl.

int CCheckAcl::IsWin9x()
{
	return m_bIsWin9x;
}

int CCheckAcl::SetGuiProcessName(const TCHAR *sPathName)
{
	EnterCriticalSection(&m_csSetProcessName);
	{
		_tcscpy(m_sGuiPathName, sPathName);
	}
	LeaveCriticalSection(&m_csSetProcessName);
	return XERR_SUCCESS;
}

int CCheckAcl::SetGuiWnd(HWND hwnd)
{
	EnterCriticalSection(&m_csWorkMode);
	{
		m_GuiHwnd = hwnd;
	}
	LeaveCriticalSection(&m_csWorkMode);
	return XERR_SUCCESS;
}

HWND CCheckAcl::GetGuiWnd()
{
	return m_GuiHwnd;
}

int CCheckAcl::SetWorkMode(int iWorkMode)
{
	EnterCriticalSection(&m_csWorkMode);
	{
		m_iWorkMode = iWorkMode;
	}
	LeaveCriticalSection(&m_csWorkMode);

	return XERR_SUCCESS;
}

int CCheckAcl::GetWorkMode()
{
	return m_iWorkMode;
}

int CCheckAcl::SetAcl(XACL_FILE AclFile)
{
	EnterCriticalSection(&m_csSetAcl);
	{
		m_bAclIsChange = TRUE;

		SetWorkMode(CXCommon::GetBit(AclFile.mAclHeader.bSet, 4, 2));
		m_AclFile	= AclFile;

		m_bAclIsChange = FALSE;
	}
	LeaveCriticalSection(&m_csSetAcl);
	return XERR_SUCCESS;
}

BOOL CCheckAcl::SetAclToChangedMode(BOOL IsChange)
{
	EnterCriticalSection(&m_csAclChangeMode);
	{
		m_bAclIsChange = IsChange;
	}
	LeaveCriticalSection(&m_csAclChangeMode);
	
	return TRUE;
}

//=============================================================================================
// Check rule operation. it's return access value with the ACL.

BOOL CCheckAcl::IsLocalIP(DWORD *ip)
{
	BYTE IsLocalIP[4];
	memcpy(IsLocalIP, ip, sizeof(DWORD));

	if(*ip == 0 || IsLocalIP[3] == 127)
		return TRUE;

	ODS(m_sWin9xSys1);
	ODS(m_sWin2kSys1);

	static CString Win9xSys1 = m_sWin9xSys1;
	static CString Win2kSys1 = m_sWin2kSys1;
	static CString Win2kSys2 = m_sWin2kSys2; // v1.0.2 add 2001-12-22

	if(m_bIsWin9x)
	{
		if(Win9xSys1.CompareNoCase(m_sProcessName) == 0)
			return TRUE;
	}
	else
	{
		if(Win2kSys1.CompareNoCase(m_sProcessName) == 0
			|| Win2kSys2.CompareNoCase(m_sProcessName) == 0) // v1.0.2 add 2001-12-22
		{
			ODS(_T("Is Win2000 System Process ..."));
			return TRUE;
		}
	}

	ODS(_T("Not Is Win2000 System Process ..."));
	return FALSE;
}

int CCheckAcl::GetAccessInfo(SESSION *session)
{
	int		iRet;

	iRet = GetAccessFromAcl(session);

	if(iRet != XF_PASS)
		session->bAction = ACL_ACTION_DENY;
	else
		session->bAction = ACL_ACTION_PASS;

	return iRet;
}

int CCheckAcl::GetAccessFromWorkMode()
{
	if(m_bAclIsChange)
		return XF_UNKNOWN;

	if(m_iWorkMode == XF_PASS_ALL)
		return XF_PASS;

	if(m_iWorkMode == XF_DENY_ALL)
		return XF_DENY;

	if(m_iWorkMode != XF_QUERY_ALL)
		return XF_UNKNOWN;

	return XF_FILTER;
}

int CCheckAcl::GetAccessFromAcl(SESSION *mSession)
{
	if(m_AclFile.mAclHeader.sSignature[0] == 0
		|| _tcscmp(m_sGuiPathName, m_sProcessName) == 0
		|| IsLocalIP(&mSession->ulRemoteIP)
		)
		return XF_PASS;

	int		iRet;

	if((iRet = GetAccessFromWorkMode()) != XF_FILTER)
		return iRet;

	BOOL	IsOne	= TRUE;
	DWORD	iIndex	= 0;
	BYTE	bAction = ACL_ACTION_PASS;
	
COMPARE:

	if(!IsOne) iIndex ++;

	iIndex = FindAcl(m_sProcessName, iIndex);

	if(iIndex >= m_AclFile.mAclHeader.ulAclCount)
	{
		if(IsOne)
		{
			if(m_bIsWin9x)
			{
				if(!QueryAccess())
					return XF_DENY;
				else
					return XF_PASS;
			}
			else 
			{
				//
				// 2001-12-25 modify
				// return XF_QUERY;
				// chage to
				//
				if(!QueryAccess())
					return XF_DENY;
				else
					return XF_PASS;
			}
		}
		else
		{
			if(bAction == ACL_ACTION_DENY)
				return XF_PASS;
			else
				return XF_DENY;
		}
	}

	if(IsOne) IsOne = FALSE;
	bAction = m_AclFile.mpAcl[iIndex].bAction;

	if(m_AclFile.mpAcl[iIndex].bDirection != ACL_DIRECTION_IN_OUT
		&& mSession->bDirection	!= m_AclFile.mpAcl[iIndex].bDirection)
			goto COMPARE;

	if(m_AclFile.mpAcl[iIndex].bServiceType != ACL_SERVICE_TYPE_ALL
		&& mSession->bProtocol != m_AclFile.mpAcl[iIndex].bServiceType)
			goto COMPARE;

	if(m_AclFile.mpAcl[iIndex].bAccessTimeType != ACL_TIME_TYPE_ALL
		&& FindTime(mSession->tStartTime) != m_AclFile.mpAcl[iIndex].bAccessTimeType)
			goto COMPARE;

	if(m_AclFile.mpAcl[iIndex].bRemoteNetType != ACL_NET_TYPE_ALL
		&& FindIP(mSession->ulRemoteIP) != m_AclFile.mpAcl[iIndex].bRemoteNetType)
			goto COMPARE;

	if(m_AclFile.mpAcl[iIndex].uiServicePort != ACL_SERVICE_PORT_ALL
		&& mSession->uiPort != m_AclFile.mpAcl[iIndex].uiServicePort)
			goto COMPARE;
	
	if(m_AclFile.mpAcl[iIndex].bAction == ACL_ACTION_DENY)
		return XF_DENY;

	return XF_PASS;
}

DWORD CCheckAcl::FindAcl(CString sApplication, DWORD iStart)
{
	DWORD		iIndex = 0;

	for(iIndex = iStart; iIndex < m_AclFile.mAclHeader.ulAclCount; iIndex ++)
		if(sApplication.CompareNoCase(m_AclFile.mpAcl[iIndex].sApplication) == 0)
			break;

	return iIndex;
}

int CCheckAcl::FindTime(CTime time)
{
	for(DWORD i = 0; i < m_AclFile.mAclHeader.ulTimeCount; i ++)
	{
		if(CXCommon::GetBit(m_AclFile.mAclTime[i].bWeekDay,time.GetDayOfWeek() - 1) != 1)
			continue;

		if(m_AclFile.mAclTime[i].tStartTime == m_AclFile.mAclTime[i].tEndTime)
			return i + 1;

		CTime t = time.GetHour() * 3600 + time.GetMinute() * 60 + time.GetSecond();

		if(m_AclFile.mAclTime[i].tStartTime < m_AclFile.mAclTime[i].tEndTime)
		{
			if(t >= m_AclFile.mAclTime[i].tStartTime && t <= m_AclFile.mAclTime[i].tEndTime)
				return i + 1;
		}
		else
		{
			if(t >= m_AclFile.mAclTime[i].tStartTime || t <= m_AclFile.mAclTime[i].tEndTime)
				return i + 1;
		}
	}

	return ACL_TIME_TYPE_ALL;
}

int CCheckAcl::FindIP(DWORD IP)
{
	DWORD i = 0;

	if(IP >= m_AclFile.mAclIntranetIP.ulStartIP && IP <= m_AclFile.mAclIntranetIP.ulEndIP)
		return ACL_NET_TYPE_INTRANET;

	for(i = 0; i< m_AclFile.mAclHeader.ulDistrustIPCount; i++)
		if(IP >= m_AclFile.mpAclDistrustIP[i].ulStartIP && IP <= m_AclFile.mpAclDistrustIP[i].ulEndIP)
			return ACL_NET_TYPE_DISTRUST;

	for(i = 0; i< m_AclFile.mAclHeader.ulTrustIPCount; i++)
		if(IP >= m_AclFile.mpAclTrustIP[i].ulStartIP && IP <= m_AclFile.mpAclTrustIP[i].ulEndIP)
			return ACL_NET_TYPE_TRUST;

	for(i = 0; i< m_AclFile.mAclHeader.ulCustomIPCount; i++)
		if(IP >= m_AclFile.mpAclCustomIP[i].ulStartIP && IP <= m_AclFile.mpAclCustomIP[i].ulEndIP)
			return ACL_NET_TYPE_CUSTOM;

	return ACL_NET_TYPE_ALL;
}

//=============================================================================================
// session operation. session include the socket connection info.

int CCheckAcl::GetSessionAndSetSessionNull(SESSION *session, int iIndex)
{

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -