mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-05 20:26:38 +02:00
Merge MR-11
This commit is contained in:
@@ -13,6 +13,7 @@ obj-${build_DNETMAP} += xt_DNETMAP.o
|
||||
obj-${build_ECHO} += xt_ECHO.o
|
||||
obj-${build_IPMARK} += xt_IPMARK.o
|
||||
obj-${build_LOGMARK} += xt_LOGMARK.o
|
||||
obj-${build_PROTO} += xt_PROTO.o
|
||||
obj-${build_SYSRQ} += xt_SYSRQ.o
|
||||
obj-${build_TARPIT} += xt_TARPIT.o
|
||||
obj-${build_condition} += xt_condition.o
|
||||
|
@@ -8,6 +8,7 @@ obj-${build_DNETMAP} += libxt_DNETMAP.so
|
||||
obj-${build_ECHO} += libxt_ECHO.so
|
||||
obj-${build_IPMARK} += libxt_IPMARK.so
|
||||
obj-${build_LOGMARK} += libxt_LOGMARK.so
|
||||
obj-${build_PROTO} += libxt_PROTO.so
|
||||
obj-${build_SYSRQ} += libxt_SYSRQ.so
|
||||
obj-${build_TARPIT} += libxt_TARPIT.so
|
||||
obj-${build_condition} += libxt_condition.so
|
||||
|
113
extensions/libxt_PROTO.c
Normal file
113
extensions/libxt_PROTO.c
Normal file
@@ -0,0 +1,113 @@
|
||||
/*
|
||||
* PROTO Target module
|
||||
* This program is distributed under the terms of GNU GPL
|
||||
*/
|
||||
#include <stdio.h>
|
||||
#include <xtables.h>
|
||||
#include "xt_PROTO.h"
|
||||
|
||||
enum {
|
||||
O_PROTO_SET = 0,
|
||||
O_PROTO_STOP_AT_FRAG = 1,
|
||||
O_PROTO_STOP_AT_AUTH = 2,
|
||||
F_PROTO_SET = 1 << O_PROTO_SET,
|
||||
F_PROTO_STOP_AT_FRAG = 1 << O_PROTO_STOP_AT_FRAG,
|
||||
F_PROTO_STOP_AT_AUTH = 1 << O_PROTO_STOP_AT_AUTH,
|
||||
};
|
||||
|
||||
#define s struct xt_PROTO_info
|
||||
static const struct xt_option_entry PROTO_opts[] = {
|
||||
{.name = "proto-set", .type = XTTYPE_UINT8, .id = O_PROTO_SET,
|
||||
.flags = XTOPT_PUT | XTOPT_MAND, XTOPT_POINTER(s, proto)},
|
||||
{.name = "stop-at-frag", .type = XTTYPE_NONE, .id = O_PROTO_STOP_AT_FRAG},
|
||||
{.name = "stop-at-auth", .type = XTTYPE_NONE, .id = O_PROTO_STOP_AT_AUTH},
|
||||
XTOPT_TABLEEND,
|
||||
};
|
||||
#undef s
|
||||
|
||||
static void PROTO_help(void)
|
||||
{
|
||||
printf(
|
||||
"PROTO target options\n"
|
||||
" --proto-set value Set protocol to <value 0-255>\n"
|
||||
);
|
||||
}
|
||||
|
||||
static void PROTO_parse(struct xt_option_call *cb)
|
||||
{
|
||||
struct xt_PROTO_info *info = cb->data;
|
||||
|
||||
xtables_option_parse(cb);
|
||||
switch (cb->entry->id) {
|
||||
case O_PROTO_SET:
|
||||
info->mode |= 1 << XT_PROTO_SET;
|
||||
break;
|
||||
case O_PROTO_STOP_AT_FRAG:
|
||||
info->mode |= 1 << XT_PROTO_STOP_AT_FRAG;
|
||||
break;
|
||||
case O_PROTO_STOP_AT_AUTH:
|
||||
info->mode |= 1 << XT_PROTO_STOP_AT_AUTH;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
static void PROTO_check(struct xt_fcheck_call *cb)
|
||||
{
|
||||
if (!(cb->xflags & F_PROTO_SET))
|
||||
xtables_error(PARAMETER_PROBLEM,
|
||||
"PROTO: You must specify the proto to be set");
|
||||
}
|
||||
|
||||
static void PROTO_save(const void *ip, const struct xt_entry_target *target)
|
||||
{
|
||||
const struct xt_PROTO_info *info =
|
||||
(struct xt_PROTO_info *) target->data;
|
||||
|
||||
if(info->mode & (1 << XT_PROTO_SET)){
|
||||
printf(" --proto-set %u", info->proto);
|
||||
}
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_FRAG)){
|
||||
printf(" --stop-at-frag");
|
||||
}
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_AUTH)){
|
||||
printf(" --stop-at-auth");
|
||||
}
|
||||
}
|
||||
|
||||
static void PROTO_print(const void *ip, const struct xt_entry_target *target,
|
||||
int numeric)
|
||||
{
|
||||
const struct xt_PROTO_info *info =
|
||||
(struct xt_PROTO_info *) target->data;
|
||||
|
||||
printf(" PROTO ");
|
||||
if(info->mode & (1 << XT_PROTO_SET)){
|
||||
printf("set to %u", info->proto);
|
||||
}
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_FRAG)){
|
||||
printf(" stop-at-frag");
|
||||
}
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_AUTH)){
|
||||
printf(" stop-at-auth");
|
||||
}
|
||||
}
|
||||
|
||||
static struct xtables_target proto_tg_reg = {
|
||||
.name = "PROTO",
|
||||
.version = XTABLES_VERSION,
|
||||
.family = NFPROTO_UNSPEC,
|
||||
.size = XT_ALIGN(sizeof(struct xt_PROTO_info)),
|
||||
.userspacesize = XT_ALIGN(sizeof(struct xt_PROTO_info)),
|
||||
.help = PROTO_help,
|
||||
.print = PROTO_print,
|
||||
.save = PROTO_save,
|
||||
.x6_parse = PROTO_parse,
|
||||
.x6_fcheck = PROTO_check,
|
||||
.x6_options = PROTO_opts,
|
||||
};
|
||||
|
||||
static __attribute__((constructor)) void _init(void)
|
||||
{
|
||||
xtables_register_target(&proto_tg_reg);
|
||||
|
||||
}
|
30
extensions/libxt_PROTO.man
Normal file
30
extensions/libxt_PROTO.man
Normal file
@@ -0,0 +1,30 @@
|
||||
.PP
|
||||
The PROTO target modifies the protocol number in IP packet header.
|
||||
.TP
|
||||
\fB\-\-proto-set\fP \fIproto_num\fP
|
||||
This option is mandatory. \fIproto_num\fP is the protocol number to which you want to
|
||||
modify the packets.
|
||||
.TP
|
||||
\fB\-\-stop-at-frag\fP
|
||||
This option is only valid for IPv6 rules. When specifying this option, the
|
||||
fragment extension header will be seen as a non-extension header.
|
||||
.TP
|
||||
\fB\-\-stop-at-auth\fP
|
||||
This option is only valid for IPv6 rules. When specifying this option, the
|
||||
authentication extension header will be seen as a non-extension header.
|
||||
.PP
|
||||
For IPv4 packets, the \fBProtocol\fP field is modified and the checksum is
|
||||
re-calculated.
|
||||
.PP
|
||||
For IPv6 packets, the scenario can be more complex due to the introduction of
|
||||
the extension headers mechanism. By default, the PROTO target will scan the IPv6
|
||||
packet, finding the last extension header and modify its \fBNext-header\fP field.
|
||||
Normally, the following headers will be seen as an extension header:
|
||||
\fINEXTHDR_HOP\fP,
|
||||
\fINEXTHDR_ROUTING\fP,
|
||||
\fINEXTHDR_FRAGMENT\fP,
|
||||
\fINEXTHDR_AUTH\fP,
|
||||
\fINEXTHDR_DEST\fP.
|
||||
.PP
|
||||
For fragmented packets, only the first fragment is processed and other fragments
|
||||
are not touched.
|
172
extensions/xt_PROTO.c
Normal file
172
extensions/xt_PROTO.c
Normal file
@@ -0,0 +1,172 @@
|
||||
/*
|
||||
* Protocol modification target for IP tables
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License version 2 as
|
||||
* published by the Free Software Foundation.
|
||||
*/
|
||||
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||
#include <linux/module.h>
|
||||
#include <linux/skbuff.h>
|
||||
#include <linux/ip.h>
|
||||
#include <linux/ipv6.h>
|
||||
#include <net/ipv6.h>
|
||||
#include <net/checksum.h>
|
||||
|
||||
|
||||
#include <linux/netfilter/x_tables.h>
|
||||
#include "xt_PROTO.h"
|
||||
|
||||
MODULE_AUTHOR("Shanker Wang <i@innull.com>");
|
||||
MODULE_DESCRIPTION("Xtables: Protocol field modification target");
|
||||
MODULE_LICENSE("GPL");
|
||||
|
||||
static unsigned int
|
||||
proto_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
{
|
||||
struct iphdr *iph;
|
||||
const struct xt_PROTO_info *info = par->targinfo;
|
||||
int new_proto;
|
||||
|
||||
if (!skb_make_writable(skb, skb->len))
|
||||
return NF_DROP;
|
||||
|
||||
iph = ip_hdr(skb);
|
||||
|
||||
new_proto = iph->protocol;
|
||||
if(info->mode & (1 << XT_PROTO_SET)){
|
||||
new_proto = info->proto;
|
||||
}
|
||||
if (new_proto != iph->protocol) {
|
||||
csum_replace2(&iph->check, htons(iph->protocol & 0xff),
|
||||
htons(new_proto & 0xff));
|
||||
iph->protocol = new_proto;
|
||||
}
|
||||
|
||||
return XT_CONTINUE;
|
||||
}
|
||||
|
||||
static unsigned int
|
||||
proto_tg6(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
{
|
||||
struct ipv6hdr *ip6h;
|
||||
const struct xt_PROTO_info *info = par->targinfo;
|
||||
u8 *nexthdr;
|
||||
unsigned int hdr_offset;
|
||||
__be16 *fp;
|
||||
|
||||
if (!skb_make_writable(skb, skb->len))
|
||||
return NF_DROP;
|
||||
|
||||
ip6h = ipv6_hdr(skb);
|
||||
nexthdr = &ip6h->nexthdr;
|
||||
|
||||
hdr_offset = sizeof(struct ipv6hdr);
|
||||
|
||||
for(;;){
|
||||
struct ipv6_opt_hdr _opthdr, *opthp;
|
||||
unsigned int hdrlen;
|
||||
unsigned short _frag_off;
|
||||
if ((!ipv6_ext_hdr(*nexthdr)) || *nexthdr == NEXTHDR_NONE) {
|
||||
break;
|
||||
}
|
||||
opthp = skb_header_pointer(skb, skb_network_offset(skb) + hdr_offset, sizeof(_opthdr), &_opthdr);
|
||||
if(!opthp){
|
||||
return NF_DROP;
|
||||
}
|
||||
if(*nexthdr == NEXTHDR_FRAGMENT){
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_FRAG)){
|
||||
break;
|
||||
}
|
||||
fp = skb_header_pointer(skb,
|
||||
skb_network_offset(skb) + hdr_offset +
|
||||
offsetof(struct frag_hdr,
|
||||
frag_off),
|
||||
sizeof(_frag_off),
|
||||
&_frag_off);
|
||||
if (!fp)
|
||||
return NF_DROP;
|
||||
_frag_off = ntohs(*fp) & ~0x7;
|
||||
if(_frag_off){ // if the packet is not the first fragment
|
||||
if ((!ipv6_ext_hdr(opthp->nexthdr)) || opthp->nexthdr == NEXTHDR_NONE ||
|
||||
((info->mode & (1 << XT_PROTO_STOP_AT_AUTH)) && opthp->nexthdr == NEXTHDR_AUTH)
|
||||
) {
|
||||
nexthdr = &((struct ipv6_opt_hdr*)(skb_network_header(skb) + hdr_offset))->nexthdr;
|
||||
break;
|
||||
}else{
|
||||
return XT_CONTINUE;
|
||||
}
|
||||
}
|
||||
hdrlen = 8;
|
||||
}else if(*nexthdr == NEXTHDR_AUTH){
|
||||
if(info->mode & (1 << XT_PROTO_STOP_AT_AUTH)){
|
||||
break;
|
||||
}
|
||||
hdrlen = (opthp->hdrlen + 2) << 2;
|
||||
}else{
|
||||
hdrlen = ipv6_optlen(opthp);
|
||||
}
|
||||
nexthdr = &((struct ipv6_opt_hdr*)(skb_network_header(skb) + hdr_offset))->nexthdr;
|
||||
hdr_offset += hdrlen;
|
||||
}
|
||||
|
||||
if(info->mode & (1 << XT_PROTO_SET)){
|
||||
*nexthdr = info->proto;
|
||||
}
|
||||
|
||||
return XT_CONTINUE;
|
||||
}
|
||||
|
||||
static int proto_tg_check(const struct xt_tgchk_param *par)
|
||||
{
|
||||
const struct xt_PROTO_info *info = par->targinfo;
|
||||
|
||||
if ((info->mode & (1 << XT_PROTO_SET)) == 0){
|
||||
pr_info_ratelimited("Did not specify any proto to set\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
if ((par->family != NFPROTO_IPV6) && ((info->mode & ((1 << XT_PROTO_STOP_AT_FRAG) | (1 << XT_PROTO_STOP_AT_AUTH))) != 0)){
|
||||
pr_info_ratelimited("Must not specify stop-at-frag and stop-at-auth on non-ipv6 targets\n");
|
||||
return -EPROTOTYPE;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct xt_target proto_tg_reg[] __read_mostly = {
|
||||
{
|
||||
.name = "PROTO",
|
||||
.revision = 0,
|
||||
.family = NFPROTO_IPV4,
|
||||
.target = proto_tg,
|
||||
.targetsize = sizeof(struct xt_PROTO_info),
|
||||
.table = "mangle",
|
||||
.checkentry = proto_tg_check,
|
||||
.me = THIS_MODULE,
|
||||
},
|
||||
{
|
||||
.name = "PROTO",
|
||||
.revision = 0,
|
||||
.family = NFPROTO_IPV6,
|
||||
.target = proto_tg6,
|
||||
.targetsize = sizeof(struct xt_PROTO_info),
|
||||
.table = "mangle",
|
||||
.checkentry = proto_tg_check,
|
||||
.me = THIS_MODULE,
|
||||
},
|
||||
};
|
||||
|
||||
static int __init proto_tg_init(void)
|
||||
{
|
||||
return xt_register_targets(proto_tg_reg, ARRAY_SIZE(proto_tg_reg));
|
||||
}
|
||||
|
||||
static void __exit proto_tg_exit(void)
|
||||
{
|
||||
xt_unregister_targets(proto_tg_reg, ARRAY_SIZE(proto_tg_reg));
|
||||
}
|
||||
|
||||
module_init(proto_tg_init);
|
||||
module_exit(proto_tg_exit);
|
||||
MODULE_ALIAS("ipt_PROTO");
|
||||
MODULE_ALIAS("ip6t_PROTO");
|
||||
|
20
extensions/xt_PROTO.h
Normal file
20
extensions/xt_PROTO.h
Normal file
@@ -0,0 +1,20 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
||||
/* Protocol modification module for IP tables */
|
||||
|
||||
#ifndef _XT_PROTO_H
|
||||
#define _XT_PROTO_H
|
||||
|
||||
#include <linux/types.h>
|
||||
|
||||
enum {
|
||||
XT_PROTO_SET = 0,
|
||||
XT_PROTO_STOP_AT_FRAG = 1,
|
||||
XT_PROTO_STOP_AT_AUTH = 2
|
||||
};
|
||||
|
||||
struct xt_PROTO_info {
|
||||
__u8 mode;
|
||||
__u8 proto;
|
||||
};
|
||||
|
||||
#endif
|
Reference in New Issue
Block a user