mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-20 19:44:56 +02:00
Compare commits
54 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
254c6926d3 | ||
![]() |
2e78cf03a4 | ||
![]() |
bf63a25a64 | ||
![]() |
94656621ed | ||
![]() |
95d4f9e113 | ||
![]() |
123e1a14e9 | ||
![]() |
f4f3f98609 | ||
![]() |
9b1c7c1c04 | ||
![]() |
ed8e496750 | ||
![]() |
5339fcc65b | ||
![]() |
2265c1b854 | ||
![]() |
2c574f992d | ||
![]() |
3a24468a68 | ||
![]() |
7682cc8c34 | ||
![]() |
215b3c5b12 | ||
![]() |
4dbb36b723 | ||
![]() |
10f951e61d | ||
![]() |
a4c50ae405 | ||
![]() |
38d89983ca | ||
![]() |
25985650a9 | ||
![]() |
4de9ff1505 | ||
![]() |
46b7cf206b | ||
![]() |
29d10e11fa | ||
![]() |
60a26f1dea | ||
![]() |
cdf90737be | ||
![]() |
5713415014 | ||
![]() |
230bc1f327 | ||
![]() |
d360f5578c | ||
![]() |
dd32060f6a | ||
![]() |
d5eb4e586c | ||
![]() |
1b4b4347c5 | ||
![]() |
2f37af43c5 | ||
![]() |
56e5970c64 | ||
![]() |
2b76b68c65 | ||
![]() |
d2eeac4c32 | ||
![]() |
0e9037b000 | ||
![]() |
0a6091b64a | ||
![]() |
b565a85fb6 | ||
![]() |
89c80f5981 | ||
![]() |
8579fd2b3b | ||
![]() |
0a836e9677 | ||
![]() |
90b0f3a51f | ||
![]() |
89d1b808b9 | ||
![]() |
c839e87bbb | ||
![]() |
a587f9526d | ||
![]() |
1874fcd519 | ||
![]() |
21ea7b76ec | ||
![]() |
ee8da2b1ac | ||
![]() |
19a4359368 | ||
![]() |
1b379667d3 | ||
![]() |
cd410aefe7 | ||
![]() |
e4b5cef8f0 | ||
![]() |
a8af97b8fa | ||
![]() |
db234c30cd |
7
INSTALL
7
INSTALL
@@ -12,16 +12,17 @@ in combination with the kernel's Kbuild system.
|
||||
Supported configurations for this release
|
||||
=========================================
|
||||
|
||||
* iptables >= 1.4.5
|
||||
* iptables >= 1.6.0
|
||||
|
||||
* kernel-devel >= 3.7
|
||||
* kernel-devel >= 4.15
|
||||
with prepared build/output directory
|
||||
- CONFIG_NF_CONNTRACK
|
||||
- CONFIG_NF_CONNTRACK_MARK enabled =y or as module (=m)
|
||||
- CONFIG_CONNECTOR y/m if you wish to receive userspace
|
||||
notifications from pknock through netlink/connector
|
||||
|
||||
(Use xtables-addons-1.x if you need support for Linux < 3.7.)
|
||||
(Use xtables-addons-1.x if you need support for Linux < 3.7.
|
||||
Use xtables-addons-2.x if you need support for Linux < 4.15.)
|
||||
|
||||
|
||||
Selecting extensions
|
||||
|
10
configure.ac
10
configure.ac
@@ -1,4 +1,4 @@
|
||||
AC_INIT([xtables-addons], [2.11])
|
||||
AC_INIT([xtables-addons], [3.0])
|
||||
AC_CONFIG_AUX_DIR([build-aux])
|
||||
AC_CONFIG_HEADERS([config.h])
|
||||
AC_CONFIG_MACRO_DIR([m4])
|
||||
@@ -57,12 +57,10 @@ if test -n "$kbuilddir"; then
|
||||
echo "WARNING: Version detection did not succeed. Continue at own luck.";
|
||||
else
|
||||
echo "$kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
||||
if test "$kmajor" -gt 4 -o "$kmajor" -eq 7 -a "$kminor" -gt 3; then
|
||||
if test "$kmajor" -gt 4 -o "$kmajor" -eq 4 -a "$kminor" -gt 16; then
|
||||
echo "WARNING: That kernel version is not officially supported yet. Continue at own luck.";
|
||||
elif test "$kmajor" -eq 4 -a "$kminor" -le 3; then
|
||||
:;
|
||||
elif test "$kmajor" -eq 3 -a "$kminor" -ge 7; then
|
||||
:;
|
||||
elif test "$kmajor" -eq 4 -a "$kminor" -ge 15; then
|
||||
:
|
||||
else
|
||||
echo "WARNING: That kernel version is not officially supported.";
|
||||
fi;
|
||||
|
@@ -1,6 +1,34 @@
|
||||
|
||||
HEAD
|
||||
====
|
||||
Enhancements:
|
||||
- support for Linux 4.15, 4.16
|
||||
Changes:
|
||||
- remove support for Linux 3.7--4.14
|
||||
|
||||
|
||||
v2.14 (2017-11-22)
|
||||
==================
|
||||
Enhancements:
|
||||
- support for Linux up to 4.14
|
||||
Fixes:
|
||||
- xt_DNETMAP: fix some reports from PVSStudio (a static checker)
|
||||
|
||||
|
||||
v2.13 (2017-06-29)
|
||||
==================
|
||||
Enhancements:
|
||||
- support for Linux up to 4.12
|
||||
- xt_condition: namespace support
|
||||
Fixes:
|
||||
- xt_geoip: check for allocation overflow
|
||||
- xt_DNETMAP: fix a buffer overflow
|
||||
|
||||
|
||||
v2.12 (2017-01-11)
|
||||
==================
|
||||
Enhancements:
|
||||
- support for Linux up to 4.10
|
||||
|
||||
|
||||
v2.11 (2016-05-20)
|
||||
@@ -103,5 +131,5 @@ Changes:
|
||||
Enhancements:
|
||||
- Support for Linux 3.7
|
||||
|
||||
If you want to use Xtables-addons with kernels older than 3.7,
|
||||
use the addons 1.x series (maintained but without new features).
|
||||
If you want to use Xtables-addons with kernels older than 4.15,
|
||||
use the addons 2.x series.
|
||||
|
@@ -482,12 +482,7 @@ static void ipt_acc_depth2_insert(struct ipt_acc_mask_8 *mask_8,
|
||||
static unsigned int
|
||||
ipt_acc_target(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
{
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4,4,0)
|
||||
struct ipt_acc_net *ian = net_generic(par->net, ipt_acc_net_id);
|
||||
#else
|
||||
struct net *net = dev_net(par->in ? par->in : par->out);
|
||||
struct ipt_acc_net *ian = net_generic(net, ipt_acc_net_id);
|
||||
#endif
|
||||
struct ipt_acc_net *ian = net_generic(par->state->net, ipt_acc_net_id);
|
||||
struct ipt_acc_table *ipt_acc_tables = ian->ipt_acc_tables;
|
||||
const struct ipt_acc_info *info =
|
||||
par->targinfo;
|
||||
|
@@ -8,12 +8,8 @@
|
||||
|
||||
#define DEBUGP Use__pr_debug__instead
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 7, 0)
|
||||
# warning Kernels below 3.7 not supported.
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 8, 0)
|
||||
# define prandom_u32() random32()
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 15, 0)
|
||||
# warning Kernels below 4.15 not supported.
|
||||
#endif
|
||||
|
||||
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
||||
@@ -35,7 +31,7 @@
|
||||
ntohs((addr).s6_addr16[5]), \
|
||||
ntohs((addr).s6_addr16[6]), \
|
||||
ntohs((addr).s6_addr16[7])
|
||||
# define NIP6_FMT "%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x"
|
||||
# define NIP6_FMT "%04hx:%04hx:%04hx:%04hx:%04hx:%04hx:%04hx:%04hx"
|
||||
#endif
|
||||
#if !defined(NIPQUAD) && !defined(NIPQUAD_FMT)
|
||||
# define NIPQUAD(addr) \
|
||||
@@ -43,50 +39,16 @@
|
||||
((const unsigned char *)&addr)[1], \
|
||||
((const unsigned char *)&addr)[2], \
|
||||
((const unsigned char *)&addr)[3]
|
||||
# define NIPQUAD_FMT "%u.%u.%u.%u"
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 9, 0)
|
||||
static inline struct inode *file_inode(struct file *f)
|
||||
{
|
||||
return f->f_path.dentry->d_inode;
|
||||
}
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 10, 0)
|
||||
static inline void proc_set_user(struct proc_dir_entry *de,
|
||||
typeof(de->uid) uid, typeof(de->gid) gid)
|
||||
{
|
||||
de->uid = uid;
|
||||
de->gid = gid;
|
||||
}
|
||||
|
||||
static inline void *PDE_DATA(struct inode *inode)
|
||||
{
|
||||
return PDE(inode)->data;
|
||||
}
|
||||
|
||||
static inline void proc_remove(struct proc_dir_entry *de)
|
||||
{
|
||||
if (de != NULL)
|
||||
remove_proc_entry(de->name, de->parent);
|
||||
}
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 4, 0)
|
||||
# define ip6_local_out(xnet, xsk, xskb) ip6_local_out(xskb)
|
||||
# define ip6_route_me_harder(xnet, xskb) ip6_route_me_harder(xskb)
|
||||
# define ip_local_out(xnet, xsk, xskb) ip_local_out(xskb)
|
||||
# define ip_route_me_harder(xnet, xskb, xaddrtype) ip_route_me_harder((xskb), (xaddrtype))
|
||||
# define NIPQUAD_FMT "%hhu.%hhu.%hhu.%hhu"
|
||||
#endif
|
||||
|
||||
static inline struct net *par_net(const struct xt_action_param *par)
|
||||
{
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
return par->net;
|
||||
#else
|
||||
return dev_net((par->in != NULL) ? par->in : par->out);
|
||||
#endif
|
||||
return par->state->net;
|
||||
}
|
||||
|
||||
#ifndef NF_CT_ASSERT
|
||||
# define NF_CT_ASSERT(x) WARN_ON(!(x))
|
||||
#endif
|
||||
|
||||
#endif /* _XTABLES_COMPAT_H */
|
||||
|
@@ -357,11 +357,10 @@ has_logged_during_this_minute(const struct peer *peer)
|
||||
*
|
||||
* @r: rule
|
||||
*/
|
||||
static void
|
||||
peer_gc(unsigned long r)
|
||||
static void peer_gc(struct timer_list *tl)
|
||||
{
|
||||
unsigned int i;
|
||||
struct xt_pknock_rule *rule = (struct xt_pknock_rule *)r;
|
||||
struct xt_pknock_rule *rule = from_timer(rule, tl, timer);
|
||||
struct peer *peer;
|
||||
struct list_head *pos, *n;
|
||||
|
||||
@@ -468,11 +467,7 @@ add_rule(struct xt_pknock_mtinfo *info)
|
||||
rule->peer_head = alloc_hashtable(peer_hashsize);
|
||||
if (rule->peer_head == NULL)
|
||||
goto out;
|
||||
|
||||
init_timer(&rule->timer);
|
||||
rule->timer.function = peer_gc;
|
||||
rule->timer.data = (unsigned long)rule;
|
||||
|
||||
timer_setup(&rule->timer, peer_gc, 0);
|
||||
rule->status_proc = proc_create_data(info->rule_name, 0, pde,
|
||||
&pknock_proc_ops, rule);
|
||||
if (rule->status_proc == NULL)
|
||||
@@ -619,9 +614,10 @@ static void add_peer(struct peer *peer, struct xt_pknock_rule *rule)
|
||||
*/
|
||||
static void remove_peer(struct peer *peer)
|
||||
{
|
||||
if (peer == NULL)
|
||||
return;
|
||||
list_del(&peer->head);
|
||||
if (peer != NULL)
|
||||
kfree(peer);
|
||||
kfree(peer);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -698,13 +694,7 @@ msg_to_userspace_nl(const struct xt_pknock_mtinfo *info,
|
||||
scnprintf(msg.rule_name, info->rule_name_len + 1, info->rule_name);
|
||||
|
||||
memcpy(m + 1, &msg, m->len);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
||||
cn_netlink_send(m, 0, multicast_group, GFP_ATOMIC);
|
||||
#else
|
||||
cn_netlink_send(m, multicast_group, GFP_ATOMIC);
|
||||
#endif
|
||||
|
||||
kfree(m);
|
||||
#endif
|
||||
return true;
|
||||
|
@@ -58,8 +58,7 @@ xt_chaos_total(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
|
||||
{
|
||||
struct xt_action_param local_par;
|
||||
local_par.in = par->in,
|
||||
local_par.out = par->out,
|
||||
local_par.state = par->state;
|
||||
local_par.match = xm_tcp;
|
||||
local_par.matchinfo = &tcp_params;
|
||||
local_par.fragoff = fragoff;
|
||||
@@ -74,12 +73,9 @@ xt_chaos_total(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
destiny = (info->variant == XTCHAOS_TARPIT) ? xt_tarpit : xt_delude;
|
||||
{
|
||||
struct xt_action_param local_par;
|
||||
local_par.in = par->in;
|
||||
local_par.out = par->out;
|
||||
local_par.hooknum = par->hooknum;
|
||||
local_par.state = par->state;
|
||||
local_par.target = destiny;
|
||||
local_par.targinfo = par->targinfo;
|
||||
local_par.family = par->family;
|
||||
destiny->target(skb, &local_par);
|
||||
}
|
||||
}
|
||||
@@ -100,18 +96,15 @@ chaos_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
|
||||
if ((unsigned int)prandom_u32() <= reject_percentage) {
|
||||
struct xt_action_param local_par;
|
||||
local_par.in = par->in;
|
||||
local_par.out = par->out;
|
||||
local_par.hooknum = par->hooknum;
|
||||
local_par.state = par->state;
|
||||
local_par.target = xt_reject;
|
||||
local_par.targinfo = &reject_params;
|
||||
return xt_reject->target(skb, &local_par);
|
||||
}
|
||||
|
||||
/* TARPIT/DELUDE may not be called from the OUTPUT chain */
|
||||
if (iph->protocol == IPPROTO_TCP &&
|
||||
info->variant != XTCHAOS_NORMAL &&
|
||||
par->hooknum != NF_INET_LOCAL_OUT)
|
||||
if (iph->protocol == IPPROTO_TCP && info->variant != XTCHAOS_NORMAL &&
|
||||
par->state->hook != NF_INET_LOCAL_OUT)
|
||||
xt_chaos_total(skb, par);
|
||||
|
||||
return NF_DROP;
|
||||
|
@@ -79,7 +79,7 @@ static void delude_send_reset(struct net *net, struct sk_buff *oldskb,
|
||||
tcph->doff = sizeof(struct tcphdr) / 4;
|
||||
|
||||
/* DELUDE essential part */
|
||||
if (oth->syn && !oth->ack && !oth->rst && !oth->fin) {
|
||||
if (oth->syn && !oth->ack && !oth->fin) {
|
||||
tcph->syn = true;
|
||||
tcph->seq = 0;
|
||||
tcph->ack = true;
|
||||
@@ -107,13 +107,8 @@ static void delude_send_reset(struct net *net, struct sk_buff *oldskb,
|
||||
|
||||
addr_type = RTN_UNSPEC;
|
||||
#ifdef CONFIG_BRIDGE_NETFILTER
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->physoutdev))
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->mask & BRNF_BRIDGED))
|
||||
#endif
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD)
|
||||
#endif
|
||||
@@ -151,7 +146,7 @@ delude_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
* a problem, as that is supported since Linux 2.6.35. But since we do not
|
||||
* actually want to have a connection open, we are still going to drop it.
|
||||
*/
|
||||
delude_send_reset(par_net(par), skb, par->hooknum);
|
||||
delude_send_reset(par_net(par), skb, par->state->hook);
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
|
@@ -81,7 +81,7 @@ struct dnetmap_entry {
|
||||
|
||||
struct dnetmap_prefix {
|
||||
struct nf_nat_range prefix;
|
||||
char prefix_str[16];
|
||||
char prefix_str[20];
|
||||
#ifdef CONFIG_PROC_FS
|
||||
char proc_str_data[20];
|
||||
char proc_str_stat[25];
|
||||
@@ -356,7 +356,7 @@ out:
|
||||
static unsigned int
|
||||
dnetmap_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
{
|
||||
struct net *net = dev_net(par->in ? par->in : par->out);
|
||||
struct net *net = dev_net(par->state->in ? par->state->in : par->state->out);
|
||||
struct dnetmap_net *dnetmap_net = dnetmap_pernet(net);
|
||||
struct nf_conn *ct;
|
||||
enum ip_conntrack_info ctinfo;
|
||||
@@ -367,16 +367,13 @@ dnetmap_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
struct dnetmap_entry *e;
|
||||
struct dnetmap_prefix *p;
|
||||
__s32 jttl;
|
||||
|
||||
NF_CT_ASSERT(par->hooknum == NF_INET_POST_ROUTING ||
|
||||
par->hooknum == NF_INET_LOCAL_OUT ||
|
||||
par->hooknum == NF_INET_PRE_ROUTING);
|
||||
unsigned int hooknum = par->state->hook;
|
||||
ct = nf_ct_get(skb, &ctinfo);
|
||||
|
||||
jttl = tginfo->flags & XT_DNETMAP_TTL ? tginfo->ttl * HZ : jtimeout;
|
||||
|
||||
/* in prerouting we try to map postnat-ip to prenat-ip */
|
||||
if (par->hooknum == NF_INET_PRE_ROUTING) {
|
||||
if (hooknum == NF_INET_PRE_ROUTING) {
|
||||
postnat_ip = ip_hdr(skb)->daddr;
|
||||
|
||||
spin_lock_bh(&dnetmap_lock);
|
||||
@@ -389,7 +386,7 @@ dnetmap_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
/* if prefix is specified, we check if
|
||||
it matches lookedup entry */
|
||||
if (tginfo->flags & XT_DNETMAP_PREFIX)
|
||||
if (memcmp(mr, &e->prefix, sizeof(*mr)))
|
||||
if (memcmp(mr, &e->prefix->prefix, sizeof(*mr)))
|
||||
goto no_rev_map;
|
||||
/* don't reset ttl if flag is set */
|
||||
if (jttl >= 0 && (! (e->flags & XT_DNETMAP_STATIC) ) ) {
|
||||
@@ -407,7 +404,7 @@ dnetmap_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
newrange.min_proto = mr->min_proto;
|
||||
newrange.max_proto = mr->max_proto;
|
||||
return nf_nat_setup_info(ct, &newrange,
|
||||
HOOK2MANIP(par->hooknum));
|
||||
HOOK2MANIP(hooknum));
|
||||
}
|
||||
|
||||
prenat_ip = ip_hdr(skb)->saddr;
|
||||
@@ -495,8 +492,7 @@ bind_new_prefix:
|
||||
newrange.max_addr.ip = postnat_ip;
|
||||
newrange.min_proto = mr->min_proto;
|
||||
newrange.max_proto = mr->max_proto;
|
||||
return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(par->hooknum));
|
||||
|
||||
return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(par->state->hook));
|
||||
no_rev_map:
|
||||
no_free_ip:
|
||||
spin_unlock_bh(&dnetmap_lock);
|
||||
|
@@ -35,7 +35,7 @@ echo_tg6(struct sk_buff *oldskb, const struct xt_action_param *par)
|
||||
void *payload;
|
||||
struct flowi6 fl;
|
||||
struct dst_entry *dst = NULL;
|
||||
struct net *net = dev_net((par->in != NULL) ? par->in : par->out);
|
||||
struct net *net = dev_net((par->state->in != NULL) ? par->state->in : par->state->out);
|
||||
|
||||
/* This allows us to do the copy operation in fewer lines of code. */
|
||||
if (skb_linearize(oldskb) < 0)
|
||||
|
@@ -52,14 +52,19 @@ static void logmark_ct(const struct nf_conn *ct, enum ip_conntrack_info ctinfo)
|
||||
printk("EXPECTED");
|
||||
prev = true;
|
||||
}
|
||||
if (ct->status & IPS_SEEN_REPLY)
|
||||
printk("%s""SEEN_REPLY", prev++ ? "," : "");
|
||||
if (ct->status & IPS_ASSURED)
|
||||
printk("%s""ASSURED", prev++ ? "," : "");
|
||||
if (ct->status & IPS_CONFIRMED)
|
||||
printk("%s""CONFIRMED", prev++ ? "," : "");
|
||||
printk(" lifetime=%lus",
|
||||
(jiffies - ct->timeout.expires) / HZ);
|
||||
if (ct->status & IPS_SEEN_REPLY) {
|
||||
printk("%s""SEEN_REPLY", prev ? "," : "");
|
||||
prev = true;
|
||||
}
|
||||
if (ct->status & IPS_ASSURED) {
|
||||
printk("%s""ASSURED", prev ? "," : "");
|
||||
prev = true;
|
||||
}
|
||||
if (ct->status & IPS_CONFIRMED) {
|
||||
printk("%s""CONFIRMED", prev ? "," : "");
|
||||
prev = true;
|
||||
}
|
||||
printk(" lifetime=%lus", nf_ct_expires(ct) / HZ);
|
||||
}
|
||||
|
||||
static unsigned int
|
||||
@@ -72,15 +77,13 @@ logmark_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
printk("<%u>%.*s""iif=%d hook=%s nfmark=0x%x "
|
||||
"secmark=0x%x classify=0x%x",
|
||||
info->level, (unsigned int)sizeof(info->prefix), info->prefix,
|
||||
skb_ifindex(skb), hook_names[par->hooknum],
|
||||
skb_ifindex(skb), hook_names[par->state->hook],
|
||||
skb_nfmark(skb), skb_secmark(skb), skb->priority);
|
||||
|
||||
ct = nf_ct_get(skb, &ctinfo);
|
||||
printk(" ctdir=%s", dir_names[ctinfo >= IP_CT_IS_REPLY]);
|
||||
if (ct == NULL)
|
||||
printk(" ct=NULL ctmark=NULL ctstate=INVALID ctstatus=NONE");
|
||||
else if (nf_ct_is_untracked(ct))
|
||||
printk(" ct=UNTRACKED ctmark=NULL ctstate=UNTRACKED ctstatus=NONE");
|
||||
else
|
||||
logmark_ct(ct, ctinfo);
|
||||
|
||||
|
@@ -249,13 +249,8 @@ static void tarpit_tcp4(struct net *net, struct sk_buff *oldskb,
|
||||
niph->id = ~oldhdr->id + 1;
|
||||
|
||||
#ifdef CONFIG_BRIDGE_NETFILTER
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->physoutdev != NULL))
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->mask & BRNF_BRIDGED))
|
||||
#endif
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD)
|
||||
#endif
|
||||
@@ -283,17 +278,8 @@ static void tarpit_tcp4(struct net *net, struct sk_buff *oldskb,
|
||||
goto free_nskb;
|
||||
|
||||
nf_ct_attach(nskb, oldskb);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, net, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output_sk);
|
||||
#else
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#endif
|
||||
return;
|
||||
|
||||
free_nskb:
|
||||
@@ -406,17 +392,8 @@ static void tarpit_tcp6(struct net *net, struct sk_buff *oldskb,
|
||||
nskb->ip_summed = CHECKSUM_NONE;
|
||||
|
||||
nf_ct_attach(nskb, oldskb);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, net, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output_sk);
|
||||
#else
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#endif
|
||||
return;
|
||||
|
||||
free_nskb:
|
||||
@@ -454,8 +431,7 @@ tarpit_tg4(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
/* We are not interested in fragments */
|
||||
if (iph->frag_off & htons(IP_OFFSET))
|
||||
return NF_DROP;
|
||||
|
||||
tarpit_tcp4(par_net(par), skb, par->hooknum, info->variant);
|
||||
tarpit_tcp4(par_net(par), skb, par->state->hook, info->variant);
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
@@ -496,8 +472,7 @@ tarpit_tg6(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
pr_debug("addr is not unicast.\n");
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
tarpit_tcp6(par_net(par), skb, par->hooknum, info->variant);
|
||||
tarpit_tcp6(par_net(par), skb, par->state->hook, info->variant);
|
||||
return NF_DROP;
|
||||
}
|
||||
#endif
|
||||
|
@@ -7,6 +7,7 @@
|
||||
* Authors:
|
||||
* Stephane Ouellette <ouellettes [at] videotron ca>, 2002-10-22
|
||||
* Massimiliano Hofer <max [at] nucleus it>, 2006-05-15
|
||||
* Grzegorz Kuczyński <grzegorz.kuczynski [at] koba pl>, 2017-02-27
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License; either version 2
|
||||
@@ -21,6 +22,8 @@
|
||||
#include <linux/version.h>
|
||||
#include <linux/netfilter/x_tables.h>
|
||||
#include <asm/uaccess.h>
|
||||
#include <net/net_namespace.h>
|
||||
#include <net/netns/generic.h>
|
||||
#include "xt_condition.h"
|
||||
#include "compat_xtables.h"
|
||||
|
||||
@@ -59,8 +62,18 @@ struct condition_variable {
|
||||
/* to the conditions' list. */
|
||||
static DEFINE_MUTEX(proc_lock);
|
||||
|
||||
static LIST_HEAD(conditions_list);
|
||||
static struct proc_dir_entry *proc_net_condition;
|
||||
struct condition_net {
|
||||
struct list_head conditions_list;
|
||||
struct proc_dir_entry *proc_net_condition;
|
||||
bool after_clear;
|
||||
};
|
||||
|
||||
static int condition_net_id;
|
||||
|
||||
static inline struct condition_net *condition_pernet(struct net *net)
|
||||
{
|
||||
return net_generic(net, condition_net_id);
|
||||
}
|
||||
|
||||
static int condition_proc_show(struct seq_file *m, void *data)
|
||||
{
|
||||
@@ -119,6 +132,7 @@ static int condition_mt_check(const struct xt_mtchk_param *par)
|
||||
{
|
||||
struct xt_condition_mtinfo *info = par->matchinfo;
|
||||
struct condition_variable *var;
|
||||
struct condition_net *condition_net = condition_pernet(par->net);
|
||||
|
||||
/* Forbid certain names */
|
||||
if (*info->name == '\0' || *info->name == '.' ||
|
||||
@@ -134,7 +148,7 @@ static int condition_mt_check(const struct xt_mtchk_param *par)
|
||||
* or increase the reference counter.
|
||||
*/
|
||||
mutex_lock(&proc_lock);
|
||||
list_for_each_entry(var, &conditions_list, list) {
|
||||
list_for_each_entry(var, &condition_net->conditions_list, list) {
|
||||
if (strcmp(info->name, var->name) == 0) {
|
||||
var->refcount++;
|
||||
mutex_unlock(&proc_lock);
|
||||
@@ -153,7 +167,7 @@ static int condition_mt_check(const struct xt_mtchk_param *par)
|
||||
memcpy(var->name, info->name, sizeof(info->name));
|
||||
/* Create the condition variable's proc file entry. */
|
||||
var->status_proc = proc_create_data(info->name, condition_list_perms,
|
||||
proc_net_condition, &condition_proc_fops, var);
|
||||
condition_net->proc_net_condition, &condition_proc_fops, var);
|
||||
if (var->status_proc == NULL) {
|
||||
kfree(var);
|
||||
mutex_unlock(&proc_lock);
|
||||
@@ -166,7 +180,7 @@ static int condition_mt_check(const struct xt_mtchk_param *par)
|
||||
var->refcount = 1;
|
||||
var->enabled = false;
|
||||
wmb();
|
||||
list_add(&var->list, &conditions_list);
|
||||
list_add(&var->list, &condition_net->conditions_list);
|
||||
mutex_unlock(&proc_lock);
|
||||
info->condvar = var;
|
||||
return 0;
|
||||
@@ -176,11 +190,15 @@ static void condition_mt_destroy(const struct xt_mtdtor_param *par)
|
||||
{
|
||||
const struct xt_condition_mtinfo *info = par->matchinfo;
|
||||
struct condition_variable *var = info->condvar;
|
||||
struct condition_net *cnet = condition_pernet(par->net);
|
||||
|
||||
if (cnet->after_clear)
|
||||
return;
|
||||
|
||||
mutex_lock(&proc_lock);
|
||||
if (--var->refcount == 0) {
|
||||
list_del(&var->list);
|
||||
proc_remove(var->status_proc);
|
||||
remove_proc_entry(var->name, cnet->proc_net_condition);
|
||||
mutex_unlock(&proc_lock);
|
||||
kfree(var);
|
||||
return;
|
||||
@@ -213,18 +231,54 @@ static struct xt_match condition_mt_reg[] __read_mostly = {
|
||||
|
||||
static const char *const dir_name = "nf_condition";
|
||||
|
||||
static int __net_init condition_net_init(struct net *net)
|
||||
{
|
||||
struct condition_net *condition_net = condition_pernet(net);
|
||||
INIT_LIST_HEAD(&condition_net->conditions_list);
|
||||
condition_net->proc_net_condition = proc_mkdir(dir_name, net->proc_net);
|
||||
if (condition_net->proc_net_condition == NULL)
|
||||
return -EACCES;
|
||||
condition_net->after_clear = 0;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void __net_exit condition_net_exit(struct net *net)
|
||||
{
|
||||
struct condition_net *condition_net = condition_pernet(net);
|
||||
struct list_head *pos, *q;
|
||||
struct condition_variable *var = NULL;
|
||||
|
||||
remove_proc_subtree(dir_name, net->proc_net);
|
||||
mutex_lock(&proc_lock);
|
||||
list_for_each_safe(pos, q, &condition_net->conditions_list) {
|
||||
var = list_entry(pos, struct condition_variable, list);
|
||||
list_del(pos);
|
||||
kfree(var);
|
||||
}
|
||||
mutex_unlock(&proc_lock);
|
||||
condition_net->after_clear = true;
|
||||
}
|
||||
|
||||
static struct pernet_operations condition_net_ops = {
|
||||
.init = condition_net_init,
|
||||
.exit = condition_net_exit,
|
||||
.id = &condition_net_id,
|
||||
.size = sizeof(struct condition_net),
|
||||
};
|
||||
|
||||
|
||||
static int __init condition_mt_init(void)
|
||||
{
|
||||
int ret;
|
||||
|
||||
mutex_init(&proc_lock);
|
||||
proc_net_condition = proc_mkdir(dir_name, init_net.proc_net);
|
||||
if (proc_net_condition == NULL)
|
||||
return -EACCES;
|
||||
ret = register_pernet_subsys(&condition_net_ops);
|
||||
if (ret != 0)
|
||||
return ret;
|
||||
|
||||
ret = xt_register_matches(condition_mt_reg, ARRAY_SIZE(condition_mt_reg));
|
||||
if (ret < 0) {
|
||||
remove_proc_entry(dir_name, init_net.proc_net);
|
||||
unregister_pernet_subsys(&condition_net_ops);
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -234,7 +288,7 @@ static int __init condition_mt_init(void)
|
||||
static void __exit condition_mt_exit(void)
|
||||
{
|
||||
xt_unregister_matches(condition_mt_reg, ARRAY_SIZE(condition_mt_reg));
|
||||
remove_proc_entry(dir_name, init_net.proc_net);
|
||||
unregister_pernet_subsys(&condition_net_ops);
|
||||
}
|
||||
|
||||
module_init(condition_mt_init);
|
||||
|
@@ -75,7 +75,8 @@ geoip_add_node(const struct geoip_country_user __user *umem_ptr,
|
||||
|
||||
if (copy_from_user(&umem, umem_ptr, sizeof(umem)) != 0)
|
||||
return ERR_PTR(-EFAULT);
|
||||
|
||||
if (umem.count > SIZE_MAX / geoproto_size[proto])
|
||||
return ERR_PTR(-E2BIG);
|
||||
p = kmalloc(sizeof(struct geoip_country_kernel), GFP_KERNEL);
|
||||
if (p == NULL)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
@@ -45,9 +45,9 @@ static const struct net_device *iface_get(const struct xt_iface_mtinfo *info,
|
||||
const struct xt_action_param *par, struct net_device **put)
|
||||
{
|
||||
if (info->flags & XT_IFACE_DEV_IN)
|
||||
return par->in;
|
||||
return par->state->in;
|
||||
else if (info->flags & XT_IFACE_DEV_OUT)
|
||||
return par->out;
|
||||
return par->state->out;
|
||||
return *put = dev_get_by_name(&init_net, info->ifname);
|
||||
}
|
||||
|
||||
|
@@ -511,7 +511,7 @@ search_bittorrent(const unsigned char *payload, const unsigned int plen)
|
||||
* but *must have* one (or more) of strings listed below (true for scrape and announce)
|
||||
*/
|
||||
if (memcmp(payload, "GET /", 5) == 0) {
|
||||
if (HX_memmem(payload, plen, "info_hash=", 9) != NULL)
|
||||
if (HX_memmem(payload, plen, "info_hash=", 10) != NULL)
|
||||
return IPP2P_BIT * 100 + 1;
|
||||
if (HX_memmem(payload, plen, "peer_id=", 8) != NULL)
|
||||
return IPP2P_BIT * 100 + 2;
|
||||
|
@@ -204,7 +204,7 @@ lscan_mt(const struct sk_buff *skb, struct xt_action_param *par)
|
||||
unsigned int n;
|
||||
|
||||
n = lscan_mt_full(ctdata->mark & connmark_mask, ctstate,
|
||||
par->in == init_net.loopback_dev, tcph,
|
||||
par->state->in == init_net.loopback_dev, tcph,
|
||||
skb->len - par->thoff - 4 * tcph->doff);
|
||||
|
||||
ctdata->mark = (ctdata->mark & ~connmark_mask) | n;
|
||||
|
@@ -45,12 +45,12 @@ MODULE_ALIAS("ip6t_psd");
|
||||
|
||||
/*
|
||||
* Keep track of up to LIST_SIZE source addresses, using a hash table of
|
||||
* HASH_SIZE entries for faster lookups, but limiting hash collisions to
|
||||
* PSD_HASH_SIZE entries for faster lookups, but limiting hash collisions to
|
||||
* HASH_MAX source addresses per the same hash value.
|
||||
*/
|
||||
#define LIST_SIZE 0x100
|
||||
#define HASH_LOG 9
|
||||
#define HASH_SIZE (1 << HASH_LOG)
|
||||
#define PSD_HASH_SIZE (1 << HASH_LOG)
|
||||
#define HASH_MAX 0x10
|
||||
|
||||
#if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE)
|
||||
@@ -108,7 +108,7 @@ struct host6 {
|
||||
static struct {
|
||||
spinlock_t lock;
|
||||
struct host4 list[LIST_SIZE];
|
||||
struct host *hash[HASH_SIZE];
|
||||
struct host *hash[PSD_HASH_SIZE];
|
||||
int index;
|
||||
} state;
|
||||
|
||||
@@ -143,13 +143,12 @@ static bool state6_alloc_mem(void)
|
||||
if (state6.list == NULL)
|
||||
return false;
|
||||
memset(state6.list, 0, LIST_SIZE * sizeof(struct host6));
|
||||
|
||||
state6.hash = vmalloc(HASH_SIZE * sizeof(struct host*));
|
||||
state6.hash = vmalloc(PSD_HASH_SIZE * sizeof(struct host *));
|
||||
if (state6.hash == NULL) {
|
||||
vfree(state6.list);
|
||||
return false;
|
||||
}
|
||||
memset(state6.hash, 0, HASH_SIZE * sizeof(struct host *));
|
||||
memset(state6.hash, 0, PSD_HASH_SIZE * sizeof(struct host *));
|
||||
return true;
|
||||
}
|
||||
#endif
|
||||
@@ -167,8 +166,7 @@ static unsigned int hashfunc(__be32 addr)
|
||||
do {
|
||||
hash ^= value;
|
||||
} while ((value >>= HASH_LOG) != 0);
|
||||
|
||||
return hash & (HASH_SIZE - 1);
|
||||
return hash & (PSD_HASH_SIZE - 1);
|
||||
}
|
||||
|
||||
static inline unsigned int hashfunc6(const struct in6_addr *addr)
|
||||
|
@@ -8,23 +8,45 @@ use IO::Handle;
|
||||
use Text::CSV_XS; # or trade for Text::CSV
|
||||
use strict;
|
||||
|
||||
my $le32 = pack("V", 0x10000000);
|
||||
my $be32 = pack("N", 0x10000000);
|
||||
my $u32 = undef;
|
||||
|
||||
sub wantBE { return !$u32 || $u32 eq $be32; }
|
||||
sub wantLE { return !$u32 || $u32 eq $le32; }
|
||||
|
||||
my $csv = Text::CSV_XS->new({
|
||||
allow_whitespace => 1,
|
||||
binary => 1,
|
||||
eol => $/,
|
||||
}); # or Text::CSV
|
||||
my $target_dir = ".";
|
||||
my $native_only = 0;
|
||||
|
||||
&Getopt::Long::Configure(qw(bundling));
|
||||
&GetOptions(
|
||||
"D=s" => \$target_dir,
|
||||
"n" => \$native_only,
|
||||
);
|
||||
|
||||
if (!-d $target_dir) {
|
||||
print STDERR "Target directory $target_dir does not exist.\n";
|
||||
exit 1;
|
||||
}
|
||||
foreach (qw(LE BE)) {
|
||||
my @dbs = qw(LE BE);
|
||||
if ($native_only) {
|
||||
$u32 = pack("L", 0x10000000);
|
||||
if ($u32 eq $le32) {
|
||||
@dbs = qw(LE);
|
||||
} elsif ($u32 eq $be32) {
|
||||
@dbs = qw(BE);
|
||||
} else {
|
||||
print STDERRR "Cannot determine endianness.\n";
|
||||
exit 1;
|
||||
}
|
||||
}
|
||||
|
||||
foreach (@dbs) {
|
||||
my $dir = "$target_dir/$_";
|
||||
if (!-e $dir && !mkdir($dir)) {
|
||||
print STDERR "Could not mkdir $dir: $!\n";
|
||||
@@ -80,43 +102,55 @@ sub dump_one
|
||||
scalar(@{$country->{pool_v6}}),
|
||||
$iso_code, $country->{name};
|
||||
|
||||
$file = "$target_dir/LE/".uc($iso_code).".iv6";
|
||||
if (!open($fh_le, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
if (wantLE) {
|
||||
$file = "$target_dir/LE/".uc($iso_code).".iv6";
|
||||
if (!open($fh_le, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v6}}) {
|
||||
print $fh_le &ip6_swap($range->[0]), &ip6_swap($range->[1]);
|
||||
}
|
||||
close $fh_le;
|
||||
}
|
||||
$file = "$target_dir/BE/".uc($iso_code).".iv6";
|
||||
if (!open($fh_be, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
if (wantBE) {
|
||||
$file = "$target_dir/BE/".uc($iso_code).".iv6";
|
||||
if (!open($fh_be, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v6}}) {
|
||||
print $fh_be $range->[0], $range->[1];
|
||||
}
|
||||
close $fh_be;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v6}}) {
|
||||
print $fh_be $range->[0], $range->[1];
|
||||
print $fh_le &ip6_swap($range->[0]), &ip6_swap($range->[1]);
|
||||
}
|
||||
close $fh_le;
|
||||
close $fh_be;
|
||||
|
||||
printf "%5u IPv4 ranges for %s %s\n",
|
||||
scalar(@{$country->{pool_v4}}),
|
||||
$iso_code, $country->{name};
|
||||
|
||||
$file = "$target_dir/LE/".uc($iso_code).".iv4";
|
||||
if (!open($fh_le, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
if (wantLE) {
|
||||
$file = "$target_dir/LE/".uc($iso_code).".iv4";
|
||||
if (!open($fh_le, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v4}}) {
|
||||
print $fh_le pack("VV", $range->[0], $range->[1]);
|
||||
}
|
||||
close $fh_le;
|
||||
}
|
||||
$file = "$target_dir/BE/".uc($iso_code).".iv4";
|
||||
if (!open($fh_be, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
if (wantBE) {
|
||||
$file = "$target_dir/BE/".uc($iso_code).".iv4";
|
||||
if (!open($fh_be, "> $file")) {
|
||||
print STDERR "Error opening $file: $!\n";
|
||||
exit 1;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v4}}) {
|
||||
print $fh_be pack("NN", $range->[0], $range->[1]);
|
||||
}
|
||||
close $fh_be;
|
||||
}
|
||||
foreach my $range (@{$country->{pool_v4}}) {
|
||||
print $fh_le pack("VV", $range->[0], $range->[1]);
|
||||
print $fh_be pack("NN", $range->[0], $range->[1]);
|
||||
}
|
||||
close $fh_le;
|
||||
close $fh_be;
|
||||
}
|
||||
|
||||
sub ip6_pack
|
||||
|
@@ -1,4 +1,4 @@
|
||||
.TH xtables-addons 8 "For Workgroups?" "" "v2.11 (2016-05-20)"
|
||||
.TH xtables-addons 8 "Lilac" "" "v3.0 (2018-02-12)"
|
||||
.SH Name
|
||||
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
||||
.SH Targets
|
||||
|
Reference in New Issue
Block a user