xt_conntrack.c 9.6 KB
Newer Older
1 2 3
/*
 *	xt_conntrack - Netfilter module to match connection tracking
 *	information. (Superset of Rusty's minimalistic state match.)
L
Linus Torvalds 已提交
4
 *
5 6
 *	(C) 2001  Marc Boucher (marc@mbsi.ca).
 *	Copyright © CC Computer Consultants GmbH, 2007 - 2008
L
Linus Torvalds 已提交
7
 *
8 9 10
 *	This program is free software; you can redistribute it and/or modify
 *	it under the terms of the GNU General Public License version 2 as
 *	published by the Free Software Foundation.
L
Linus Torvalds 已提交
11
 */
12
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
L
Linus Torvalds 已提交
13 14
#include <linux/module.h>
#include <linux/skbuff.h>
15
#include <net/ipv6.h>
16 17
#include <linux/netfilter/x_tables.h>
#include <linux/netfilter/xt_conntrack.h>
18
#include <net/netfilter/nf_conntrack.h>
L
Linus Torvalds 已提交
19 20 21

MODULE_LICENSE("GPL");
MODULE_AUTHOR("Marc Boucher <marc@mbsi.ca>");
22
MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>");
23
MODULE_DESCRIPTION("Xtables: connection tracking state match");
24
MODULE_ALIAS("ipt_conntrack");
25
MODULE_ALIAS("ip6t_conntrack");
L
Linus Torvalds 已提交
26

27 28 29 30 31
static bool
conntrack_addrcmp(const union nf_inet_addr *kaddr,
                  const union nf_inet_addr *uaddr,
                  const union nf_inet_addr *umask, unsigned int l3proto)
{
32
	if (l3proto == NFPROTO_IPV4)
33
		return ((kaddr->ip ^ uaddr->ip) & umask->ip) == 0;
34
	else if (l3proto == NFPROTO_IPV6)
35 36 37 38 39 40 41 42
		return ipv6_masked_addr_cmp(&kaddr->in6, &umask->in6,
		       &uaddr->in6) == 0;
	else
		return false;
}

static inline bool
conntrack_mt_origsrc(const struct nf_conn *ct,
43
                     const struct xt_conntrack_mtinfo2 *info,
44
		     u_int8_t family)
45 46 47 48 49 50 51
{
	return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3,
	       &info->origsrc_addr, &info->origsrc_mask, family);
}

static inline bool
conntrack_mt_origdst(const struct nf_conn *ct,
52
                     const struct xt_conntrack_mtinfo2 *info,
53
		     u_int8_t family)
54 55 56 57 58 59 60
{
	return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3,
	       &info->origdst_addr, &info->origdst_mask, family);
}

static inline bool
conntrack_mt_replsrc(const struct nf_conn *ct,
61
                     const struct xt_conntrack_mtinfo2 *info,
62
		     u_int8_t family)
63 64 65 66 67 68 69
{
	return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3,
	       &info->replsrc_addr, &info->replsrc_mask, family);
}

static inline bool
conntrack_mt_repldst(const struct nf_conn *ct,
70
                     const struct xt_conntrack_mtinfo2 *info,
71
		     u_int8_t family)
72 73 74 75 76
{
	return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3,
	       &info->repldst_addr, &info->repldst_mask, family);
}

77
static inline bool
78
ct_proto_port_check(const struct xt_conntrack_mtinfo2 *info,
79 80 81 82 83 84
                    const struct nf_conn *ct)
{
	const struct nf_conntrack_tuple *tuple;

	tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
	if ((info->match_flags & XT_CONNTRACK_PROTO) &&
85
	    (nf_ct_protonum(ct) == info->l4proto) ^
86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
	    !(info->invert_flags & XT_CONNTRACK_PROTO))
		return false;

	/* Shortcut to match all recognized protocols by using ->src.all. */
	if ((info->match_flags & XT_CONNTRACK_ORIGSRC_PORT) &&
	    (tuple->src.u.all == info->origsrc_port) ^
	    !(info->invert_flags & XT_CONNTRACK_ORIGSRC_PORT))
		return false;

	if ((info->match_flags & XT_CONNTRACK_ORIGDST_PORT) &&
	    (tuple->dst.u.all == info->origdst_port) ^
	    !(info->invert_flags & XT_CONNTRACK_ORIGDST_PORT))
		return false;

	tuple = &ct->tuplehash[IP_CT_DIR_REPLY].tuple;

	if ((info->match_flags & XT_CONNTRACK_REPLSRC_PORT) &&
	    (tuple->src.u.all == info->replsrc_port) ^
	    !(info->invert_flags & XT_CONNTRACK_REPLSRC_PORT))
		return false;

	if ((info->match_flags & XT_CONNTRACK_REPLDST_PORT) &&
	    (tuple->dst.u.all == info->repldst_port) ^
	    !(info->invert_flags & XT_CONNTRACK_REPLDST_PORT))
		return false;

	return true;
}

115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162
static inline bool
port_match(u16 min, u16 max, u16 port, bool invert)
{
	return (port >= min && port <= max) ^ invert;
}

static inline bool
ct_proto_port_check_v3(const struct xt_conntrack_mtinfo3 *info,
		       const struct nf_conn *ct)
{
	const struct nf_conntrack_tuple *tuple;

	tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
	if ((info->match_flags & XT_CONNTRACK_PROTO) &&
	    (nf_ct_protonum(ct) == info->l4proto) ^
	    !(info->invert_flags & XT_CONNTRACK_PROTO))
		return false;

	/* Shortcut to match all recognized protocols by using ->src.all. */
	if ((info->match_flags & XT_CONNTRACK_ORIGSRC_PORT) &&
	    !port_match(info->origsrc_port, info->origsrc_port_high,
			ntohs(tuple->src.u.all),
			info->invert_flags & XT_CONNTRACK_ORIGSRC_PORT))
		return false;

	if ((info->match_flags & XT_CONNTRACK_ORIGDST_PORT) &&
	    !port_match(info->origdst_port, info->origdst_port_high,
			ntohs(tuple->dst.u.all),
			info->invert_flags & XT_CONNTRACK_ORIGDST_PORT))
		return false;

	tuple = &ct->tuplehash[IP_CT_DIR_REPLY].tuple;

	if ((info->match_flags & XT_CONNTRACK_REPLSRC_PORT) &&
	    !port_match(info->replsrc_port, info->replsrc_port_high,
			ntohs(tuple->src.u.all),
			info->invert_flags & XT_CONNTRACK_REPLSRC_PORT))
		return false;

	if ((info->match_flags & XT_CONNTRACK_REPLDST_PORT) &&
	    !port_match(info->repldst_port, info->repldst_port_high,
			ntohs(tuple->dst.u.all),
			info->invert_flags & XT_CONNTRACK_REPLDST_PORT))
		return false;

	return true;
}

163
static bool
164
conntrack_mt(const struct sk_buff *skb, struct xt_action_param *par,
165
             u16 state_mask, u16 status_mask)
166
{
167
	const struct xt_conntrack_mtinfo2 *info = par->matchinfo;
168 169 170 171 172 173
	enum ip_conntrack_info ctinfo;
	const struct nf_conn *ct;
	unsigned int statebit;

	ct = nf_ct_get(skb, &ctinfo);

174 175 176 177 178 179
	if (ct) {
		if (nf_ct_is_untracked(ct))
			statebit = XT_CONNTRACK_STATE_UNTRACKED;
		else
			statebit = XT_CONNTRACK_STATE_BIT(ctinfo);
	} else
180 181 182 183 184 185 186 187 188
		statebit = XT_CONNTRACK_STATE_INVALID;

	if (info->match_flags & XT_CONNTRACK_STATE) {
		if (ct != NULL) {
			if (test_bit(IPS_SRC_NAT_BIT, &ct->status))
				statebit |= XT_CONNTRACK_STATE_SNAT;
			if (test_bit(IPS_DST_NAT_BIT, &ct->status))
				statebit |= XT_CONNTRACK_STATE_DNAT;
		}
189
		if (!!(state_mask & statebit) ^
190 191 192 193 194 195
		    !(info->invert_flags & XT_CONNTRACK_STATE))
			return false;
	}

	if (ct == NULL)
		return info->match_flags & XT_CONNTRACK_STATE;
196 197
	if ((info->match_flags & XT_CONNTRACK_DIRECTION) &&
	    (CTINFO2DIR(ctinfo) == IP_CT_DIR_ORIGINAL) ^
198
	    !(info->invert_flags & XT_CONNTRACK_DIRECTION))
199 200 201
		return false;

	if (info->match_flags & XT_CONNTRACK_ORIGSRC)
202
		if (conntrack_mt_origsrc(ct, info, par->family) ^
203 204 205 206
		    !(info->invert_flags & XT_CONNTRACK_ORIGSRC))
			return false;

	if (info->match_flags & XT_CONNTRACK_ORIGDST)
207
		if (conntrack_mt_origdst(ct, info, par->family) ^
208 209 210 211
		    !(info->invert_flags & XT_CONNTRACK_ORIGDST))
			return false;

	if (info->match_flags & XT_CONNTRACK_REPLSRC)
212
		if (conntrack_mt_replsrc(ct, info, par->family) ^
213 214 215 216
		    !(info->invert_flags & XT_CONNTRACK_REPLSRC))
			return false;

	if (info->match_flags & XT_CONNTRACK_REPLDST)
217
		if (conntrack_mt_repldst(ct, info, par->family) ^
218 219 220
		    !(info->invert_flags & XT_CONNTRACK_REPLDST))
			return false;

221 222 223 224 225 226 227
	if (par->match->revision != 3) {
		if (!ct_proto_port_check(info, ct))
			return false;
	} else {
		if (!ct_proto_port_check_v3(par->matchinfo, ct))
			return false;
	}
228

229
	if ((info->match_flags & XT_CONNTRACK_STATUS) &&
230
	    (!!(status_mask & ct->status) ^
231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246
	    !(info->invert_flags & XT_CONNTRACK_STATUS)))
		return false;

	if (info->match_flags & XT_CONNTRACK_EXPIRES) {
		unsigned long expires = 0;

		if (timer_pending(&ct->timeout))
			expires = (ct->timeout.expires - jiffies) / HZ;
		if ((expires >= info->expires_min &&
		    expires <= info->expires_max) ^
		    !(info->invert_flags & XT_CONNTRACK_EXPIRES))
			return false;
	}
	return true;
}

247
static bool
248
conntrack_mt_v1(const struct sk_buff *skb, struct xt_action_param *par)
249
{
250
	const struct xt_conntrack_mtinfo1 *info = par->matchinfo;
251

252 253 254 255
	return conntrack_mt(skb, par, info->state_mask, info->status_mask);
}

static bool
256
conntrack_mt_v2(const struct sk_buff *skb, struct xt_action_param *par)
257 258 259 260
{
	const struct xt_conntrack_mtinfo2 *info = par->matchinfo;

	return conntrack_mt(skb, par, info->state_mask, info->status_mask);
261 262
}

263 264 265 266 267 268 269 270
static bool
conntrack_mt_v3(const struct sk_buff *skb, struct xt_action_param *par)
{
	const struct xt_conntrack_mtinfo3 *info = par->matchinfo;

	return conntrack_mt(skb, par, info->state_mask, info->status_mask);
}

271
static int conntrack_mt_check(const struct xt_mtchk_param *par)
272
{
273 274 275
	int ret;

	ret = nf_ct_l3proto_try_module_get(par->family);
276
	if (ret < 0)
277 278
		pr_info("cannot load conntrack support for proto=%u\n",
			par->family);
279
	return ret;
280 281
}

282
static void conntrack_mt_destroy(const struct xt_mtdtor_param *par)
283
{
284
	nf_ct_l3proto_module_put(par->family);
285 286
}

287 288 289 290
static struct xt_match conntrack_mt_reg[] __read_mostly = {
	{
		.name       = "conntrack",
		.revision   = 1,
291
		.family     = NFPROTO_UNSPEC,
292
		.matchsize  = sizeof(struct xt_conntrack_mtinfo1),
293
		.match      = conntrack_mt_v1,
294 295
		.checkentry = conntrack_mt_check,
		.destroy    = conntrack_mt_destroy,
296 297 298 299 300 301 302
		.me         = THIS_MODULE,
	},
	{
		.name       = "conntrack",
		.revision   = 2,
		.family     = NFPROTO_UNSPEC,
		.matchsize  = sizeof(struct xt_conntrack_mtinfo2),
303
		.match      = conntrack_mt_v2,
304 305 306 307
		.checkentry = conntrack_mt_check,
		.destroy    = conntrack_mt_destroy,
		.me         = THIS_MODULE,
	},
308 309 310 311 312 313 314 315 316 317
	{
		.name       = "conntrack",
		.revision   = 3,
		.family     = NFPROTO_UNSPEC,
		.matchsize  = sizeof(struct xt_conntrack_mtinfo3),
		.match      = conntrack_mt_v3,
		.checkentry = conntrack_mt_check,
		.destroy    = conntrack_mt_destroy,
		.me         = THIS_MODULE,
	},
L
Linus Torvalds 已提交
318 319
};

320
static int __init conntrack_mt_init(void)
L
Linus Torvalds 已提交
321
{
322 323
	return xt_register_matches(conntrack_mt_reg,
	       ARRAY_SIZE(conntrack_mt_reg));
L
Linus Torvalds 已提交
324 325
}

326
static void __exit conntrack_mt_exit(void)
L
Linus Torvalds 已提交
327
{
328
	xt_unregister_matches(conntrack_mt_reg, ARRAY_SIZE(conntrack_mt_reg));
L
Linus Torvalds 已提交
329 330
}

331 332
module_init(conntrack_mt_init);
module_exit(conntrack_mt_exit);