mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-20 19:44:56 +02:00
Compare commits
30 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
5038e160f8 | ||
![]() |
a6289ec3ff | ||
![]() |
01e7128a80 | ||
![]() |
1dc2a1c2de | ||
![]() |
60b6b1dbef | ||
![]() |
fcb19403bc | ||
![]() |
f89f10bbe9 | ||
![]() |
a9358542fe | ||
![]() |
237fe7c660 | ||
![]() |
939fc901c1 | ||
![]() |
a4a077ff86 | ||
![]() |
bccf64d820 | ||
![]() |
7e3e156d92 | ||
![]() |
8f70b9a99d | ||
![]() |
e277360bcd | ||
![]() |
672f12b2a6 | ||
![]() |
8788b6c096 | ||
![]() |
96ce5ec488 | ||
![]() |
5e22c9c592 | ||
![]() |
01f97bfdd1 | ||
![]() |
1324442bce | ||
![]() |
a576f4d43e | ||
![]() |
cc17e1d0fe | ||
![]() |
c08835d65c | ||
![]() |
4c21811919 | ||
![]() |
431062c6ec | ||
![]() |
87adf3461f | ||
![]() |
f2e21e67a5 | ||
![]() |
ae307c0bf3 | ||
![]() |
ec8c6b8732 |
@@ -1,4 +1,4 @@
|
||||
AC_INIT([xtables-addons], [2.4])
|
||||
AC_INIT([xtables-addons], [2.10])
|
||||
AC_CONFIG_AUX_DIR([build-aux])
|
||||
AC_CONFIG_HEADERS([config.h])
|
||||
AC_CONFIG_MACRO_DIR([m4])
|
||||
@@ -63,8 +63,10 @@ if test -n "$kbuilddir"; then
|
||||
echo "WARNING: Version detection did not succeed. Continue at own luck.";
|
||||
else
|
||||
echo "$kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
||||
if test "$kmajor" -gt 3 -o "$kmajor" -eq 3 -a "$kminor" -gt 13; then
|
||||
if test "$kmajor" -gt 4 -o "$kmajor" -eq 4 -a "$kminor" -gt 3; then
|
||||
echo "WARNING: That kernel version is not officially supported yet. Continue at own luck.";
|
||||
elif test "$kmajor" -eq 4 -a "$kminor" -le 3; then
|
||||
:;
|
||||
elif test "$kmajor" -eq 3 -a "$kminor" -ge 7; then
|
||||
:;
|
||||
else
|
||||
|
@@ -3,13 +3,59 @@ HEAD
|
||||
====
|
||||
|
||||
|
||||
v2.10 (2015-11-20)
|
||||
==================
|
||||
Enhancements:
|
||||
- Support for Linux 4.4
|
||||
Fixes:
|
||||
- xt_ACCOUNT: call free_page with the right amount of pages
|
||||
|
||||
|
||||
v2.9 (2015-10-12)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux 4.3
|
||||
|
||||
|
||||
v2.8 (2015-08-19)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux 4.2
|
||||
- Enable xt_ECHO for Linux 4.0+
|
||||
|
||||
|
||||
v2.7 (2015-07-06)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux up to 4.1
|
||||
|
||||
|
||||
v2.6 (2014-09-29)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux up to 3.17
|
||||
Fixes:
|
||||
- xt_pknock: UDP SPA mode erroneously returned an error saying
|
||||
crypto was unavailable
|
||||
|
||||
|
||||
v2.5 (2014-04-18)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux up to 3.15
|
||||
- xt_quota2: introduce support for network namespaces
|
||||
|
||||
|
||||
v2.4 (2014-01-09)
|
||||
=================
|
||||
Enhancements:
|
||||
- Support for Linux 3.13
|
||||
- Support for Linux up to 3.13
|
||||
Changes:
|
||||
- remove unmaintained RAWSNAT/RAWDNAT code
|
||||
- remove unused parts of compat_xtables that served Linux <3.7
|
||||
Fixes:
|
||||
- xt_quota2: --no-change should not alter quota to zero ever
|
||||
- xt_quota2: --packet should not be set to zero based on skb->len
|
||||
|
||||
|
||||
v2.3 (2013-06-18)
|
||||
@@ -51,513 +97,4 @@ Enhancements:
|
||||
- Support for Linux 3.7
|
||||
|
||||
If you want to use Xtables-addons with kernels older than 3.7,
|
||||
use the addons 1.x series, which continues to be maintained for
|
||||
the time being.
|
||||
|
||||
|
||||
v1.47.1 (2010-10-15)
|
||||
====================
|
||||
Enhancements:
|
||||
- xt_psd gained IPv6 support
|
||||
Notes for this release:
|
||||
- Linux 3.7+ is expressly unsupported by this release.
|
||||
|
||||
|
||||
v1.46 (2012-08-23)
|
||||
==================
|
||||
Fixes:
|
||||
- length2, SYSRQ, RAWNAT: preinitialize values for ipv6_find_hdr
|
||||
- TARPIT: fix memory leak when tarpit_generic() fails
|
||||
- build: remove extraneous closing bracket in configure.ac
|
||||
- doc: update xt_SYSRQ.man to reflect that the full IPv6 address is needed
|
||||
Enhancements:
|
||||
- Support for Linux 3.6
|
||||
|
||||
|
||||
v1.45 (2012-07-16)
|
||||
==================
|
||||
Fixes:
|
||||
- build: export missing functions
|
||||
(fixes: "WARNING 'xtnu_ipv6_find_hdr' [xt_TARPIT.ko] not found")
|
||||
- build: avoid use of unexported functions
|
||||
(fixes: "WARNING 'ipv6_find_hdr' [xt_TARPIT.ko] not found"
|
||||
in <= linux-2.6.37)
|
||||
|
||||
|
||||
v1.44 (2012-07-15)
|
||||
==================
|
||||
Fixes:
|
||||
- SYSRQ: fix double target initialization at module load
|
||||
- build: do not attempt to build IPv6 parts if CONFIG_IP6_NF_IPTABLES=n
|
||||
Enhancements:
|
||||
- TARPIT gained IPv6 support
|
||||
|
||||
|
||||
v1.43 (2012-06-30)
|
||||
==================
|
||||
Fixes:
|
||||
- xt_psd: avoid crash due to curr->next corruption
|
||||
Changes:
|
||||
- xt_psd: reject invalid match options
|
||||
Enhancements:
|
||||
- Support for Linux 3.5
|
||||
- DNETMAP: new type: static binding
|
||||
- DNETMAP: new persistent flag option for prefix
|
||||
- DNETMAP: add write support to procfs interface
|
||||
|
||||
|
||||
v1.42 (2012-04-05)
|
||||
==================
|
||||
Fixes:
|
||||
- compat_xtables: fixed mistranslation of checkentry return values
|
||||
(affected kernels < 2.6.23)
|
||||
- xt_SYSRQ: fix compile error when crypto is turned off
|
||||
Changes:
|
||||
- ipset6-genl has been dropped from the tree;
|
||||
the libmnl build-time dependency is thus no longer needed
|
||||
Enhancements:
|
||||
- Support for Linux 3.3, 3.4
|
||||
|
||||
|
||||
v1.41 (2012-01-04)
|
||||
==================
|
||||
Changes:
|
||||
- Deactivate build of ipset-genl by default.
|
||||
I think the original ipset package can now take over, given there are
|
||||
a handful of kernels (2.6.39 onwards) that do not need patching.
|
||||
Enhancements:
|
||||
- Support for Linux 3.2
|
||||
|
||||
|
||||
v1.40 (2011-11-30)
|
||||
==================
|
||||
Fixes:
|
||||
- build: the code actually requires at least iptables 1.4.5 (would yield a
|
||||
compile error otherwise), make sure configure checks for it; update INSTALL
|
||||
- xt_ECHO: fix kernel warning about RTAX_HOPLIMIT being used
|
||||
- xt_ipv4options: fix an infinite loop
|
||||
Changes:
|
||||
- xt_ECHO: now calculates UDP checksum
|
||||
- Linux kernel versions below 2.6.32 are no longer officially
|
||||
supported, and will not be part of compilation testing.
|
||||
- update to ipset 6.10
|
||||
Enhancements:
|
||||
- xt_ECHO: IPv6 support
|
||||
|
||||
|
||||
v1.39 (2011-09-21)
|
||||
==================
|
||||
Fixes:
|
||||
- libxt_ACCOUNT: fix compilation after missing libxtables_CFLAGS
|
||||
- build: fix compilation after missing libxtables_CFLAGS in submodules
|
||||
- build: add missing linux/version.h includes where needed
|
||||
Changes:
|
||||
- Remove unsupported ipset 4.x from the Xtables-addons distribution
|
||||
- ipset: move ipset_errcode from src to library to avoid undefined reference
|
||||
- update to ipset 6.9.1
|
||||
|
||||
|
||||
v1.38 (2011-08-20)
|
||||
==================
|
||||
- xt_CHECKSUM: abort build when the feature is already provided by mainline
|
||||
- xt_SYSRQ: fix UDPLITE header lookup in IPv6
|
||||
- xt_TARPIT: fix kernel warning about RTAX_HOPLIMIT being used
|
||||
- xt_TEE: abort build when the feature is already provided by mainline
|
||||
- xt_ipp2p: support UDPLITE
|
||||
- xt_pknock: support UDPLITE
|
||||
- xt_psd: restore functionality with UDP
|
||||
- xt_psd: support UDPLITE
|
||||
- update to ipset 6.8
|
||||
- support for Linux 3.1
|
||||
|
||||
|
||||
v1.37 (2011-06-25)
|
||||
==================
|
||||
Fixes:
|
||||
- xt_SYSRQ: make IPv6 trigger work again
|
||||
- xt_SYSRQ: improve security: include host address in digest
|
||||
- xt_TARPIT: fix a kernel oops in --reset mode
|
||||
|
||||
|
||||
v1.36 (2011-06-03)
|
||||
==================
|
||||
Changes:
|
||||
- xt_geoip: avoid recursive function calls
|
||||
- xt_TARPIT: unlock for use in all tables
|
||||
- xt_TARPIT: honeypot and reset modes
|
||||
- update to ipset 6.7
|
||||
- support for Linux 3.0
|
||||
|
||||
|
||||
v1.35 (2011-04-11)
|
||||
==================
|
||||
Enhancements:
|
||||
- update to ipset 6.3
|
||||
* allow "new" as a commad alias to "create"
|
||||
* resolving IP addresses did not work at listing/saving sets, fixed
|
||||
* check ICMP and ICMPv6 with the set match and target in the testsuite
|
||||
* avoid possible syntax clashing at saving hostnames
|
||||
* fix linking with CONFIG_IPV6=n
|
||||
* sctp, udplite support for the hash:*port* types
|
||||
- ipset-genl: handle EAGAIN return value emitted from autoloader
|
||||
- ipset-genl: resolve nfgenmsg remains and fix spurious protocol abort
|
||||
|
||||
|
||||
v1.34 (2011-04-07)
|
||||
==================
|
||||
Fixes:
|
||||
- xt_pknock: avoid crash when hash TFM could not be allocated
|
||||
- xt_pknock: avoid inversion of rule lookup that led to warnings
|
||||
- xt_DNETMAP: add missing module alias
|
||||
- xt_DNETMAP: support for kernels below 2.6.34
|
||||
Changes:
|
||||
- Linux kernel versions below 2.6.29 are no longer officially
|
||||
supported, and will not be part of compilation testing.
|
||||
|
||||
|
||||
v1.33 (2011-02-02)
|
||||
==================
|
||||
Fixes:
|
||||
- build: restore functionality of `configure --without-kbuild`
|
||||
- build: fix objdir builds for ipset-5 (xt-a specific)
|
||||
- build: fix missing inclusion of dependency rules
|
||||
- xt_LOGMARK: fix detection of untracked connection for Linux >= 2.6.36
|
||||
Enhancements:
|
||||
- IPv6 support for xt_geoip
|
||||
- Update to ipset 5.3
|
||||
* make IPv4 and IPv6 address handling similar
|
||||
* show correct line numbers in restore output for parser errors
|
||||
- Update to ipset 5.4
|
||||
* fixed ICMP and ICMPv6 handling
|
||||
* fixed trailing whitespaces and pr_* messages
|
||||
* fixed module loading at create/header commands
|
||||
- build: support for Linux up to 2.6.38
|
||||
- build: preliminary support for iptables 1.4.11
|
||||
|
||||
|
||||
v1.32 (2011-01-04)
|
||||
==================
|
||||
Fixes:
|
||||
- Update to ipset 4.5
|
||||
* the iptreemap type used wrong gfp flags when deleting entries
|
||||
- Include ipset 5.2 with genetlink patch (beta)
|
||||
* no kernel patch needed, but requires Linux >= 2.6.35
|
||||
and thus needs to be manually enabled in mconfig
|
||||
|
||||
|
||||
v1.31 (2010-11-05)
|
||||
==================
|
||||
Fixes:
|
||||
- build: improve detection of kernel version and error handling
|
||||
Changes:
|
||||
- build: automatically derive Xtables module directory, thus
|
||||
--with-xtlibdir is no longer needed for ./configure in most cases
|
||||
(If I still see a distro using it, I will scold you for not
|
||||
reading this changelog.)
|
||||
Enhancements:
|
||||
- LOGMARK: print remaining lifetime of cts
|
||||
- xt_iface: allow matching against incoming/outgoing interface
|
||||
- libxt_gradm: match packets based on status of grsecurity RBAC
|
||||
(userspace part only - xt_gradm is in the grsec patch)
|
||||
|
||||
|
||||
v1.30 (2010-010-02)
|
||||
===================
|
||||
Fixes:
|
||||
- update to ipset 4.4
|
||||
* ipport{,ip,net}hash did not work with mixed "src" and "dst"
|
||||
destination parameters
|
||||
Changes:
|
||||
- deactivate building xt_TEE and xt_CHECKSUM by default, as these have been
|
||||
merged upstream in Linux 2.6.35 and 2.6.36, respectively.
|
||||
Distros still wishing to build this need to enable it in their build
|
||||
script, e.g. perl -i -pe 's{^build_TEE=.*}{build_TEE=m}' mconfig;
|
||||
|
||||
|
||||
v1.29 (2010-09-29)
|
||||
==================
|
||||
- compat_xtables: return bool for match_check and target_check in 2.6.23..34
|
||||
- ipset: enable building of ip_set_ipport{ip,net}hash.ko
|
||||
- support for Linux 2.6.36
|
||||
- SYSRQ: resolve compile error with Linux 2.6.36
|
||||
- TEE: resolve compile error with Linux 2.6.36
|
||||
- add workaround for broken linux-glibc-devel 2.6.34 userspace headers
|
||||
("implicit declaration of function 'ALIGN'")
|
||||
|
||||
|
||||
v1.28 (2010-07-24)
|
||||
==================
|
||||
- RAWNAT: IPv6 variants erroneously rejected masks /33-/128
|
||||
- new target xt_CHECKSUM
|
||||
- xt_length2: add support for IPv6 jumbograms
|
||||
- xt_geoip: fix possible out-of-bounds access
|
||||
- import xt_geoip database scripts
|
||||
|
||||
|
||||
v1.27 (2010-05-16)
|
||||
==================
|
||||
- further updates for the upcoming 2.6.35 changes
|
||||
|
||||
|
||||
v1.26 (2010-04-30)
|
||||
==================
|
||||
- compat_xtables: fix 2.6.34 compile error due to a typo
|
||||
|
||||
|
||||
v1.25 (2010-04-26)
|
||||
==================
|
||||
- TEE: do rechecksumming in PREROUTING too
|
||||
- TEE: decrease TTL on cloned packet
|
||||
- TEE: set dont-fragment on cloned packets
|
||||
- TEE: free skb when route lookup failed
|
||||
- TEE: do not limit use to mangle table
|
||||
- TEE: do not retain iif and mark on cloned packet
|
||||
- TEE: new loop detection logic
|
||||
- TEE: use less expensive pskb_copy
|
||||
- condition: remove unnecessary RCU protection
|
||||
|
||||
|
||||
v1.24 (2010-03-17)
|
||||
==================
|
||||
- build: fix build of userspace modules against old (pre-2.6.25)
|
||||
headers from linux-glibc-devel (/usr/include/linux)
|
||||
- ipp2p: updated bittorent command recognition
|
||||
- SYSRQ: let module load when crypto is unavailable
|
||||
- SYSRQ: allow processing of UDP-Lite
|
||||
|
||||
|
||||
v1.23 (2010-02-24)
|
||||
==================
|
||||
- build: support for Linux 2.6.34
|
||||
- build: remove unused --with-ksource option
|
||||
- build: remove unneeded --with-xtables option
|
||||
- build: fix compilations in RAWNAT, SYSRQ and length2 when CONFIG_IPV6=n
|
||||
- ipset: update to 4.2
|
||||
- ECHO: fix compilation w.r.t. skb_dst
|
||||
|
||||
|
||||
v1.22 (2010-01-22)
|
||||
==================
|
||||
- compat_xtables: support for 2.6.33 skb_iif changes
|
||||
- geoip: for FHS compliance use /usr/share/xt_geoip instead of /var/geoip
|
||||
- ipset: enable build of ip_set_setlist.ko
|
||||
- quota2: add the --no-change mode
|
||||
|
||||
|
||||
v1.21 (2009-12-09)
|
||||
==================
|
||||
- ACCOUNT: avoid collision with arp_tables setsockopt numbers
|
||||
- doc: fix option mismatch --gw/--gateway in libxt_TEE.man
|
||||
|
||||
|
||||
v1.20 (2009-11-19)
|
||||
==================
|
||||
- ipp2p: add more boundary checks
|
||||
- ipp2p: fix Gnutelle line ending detection
|
||||
- LOGMARK: remove unknown options from manpage
|
||||
- ACCOUNT: endianess-correctness
|
||||
- ipset: install manpage
|
||||
- ipset: fast forward to v4.1
|
||||
|
||||
|
||||
v1.19 (2009-10-12)
|
||||
==================
|
||||
- build: compile fixes for 2.6.31-rt
|
||||
- build: support for Linux 2.6.32
|
||||
- ipp2p: try to address underflows
|
||||
- psd: avoid potential crash when dealing with non-linear skbs
|
||||
- merge xt_ACCOUNT userspace utilities
|
||||
- added reworked xt_pknock module
|
||||
Changes from pknock v0.5:
|
||||
- pknock: "strict" and "checkip" flags were not displayed in `iptables -L`
|
||||
- pknock: the GC expire time's lower bound is now the default gc time
|
||||
(65000 msec) to avoid rendering anti-spoof protection in SPA mode useless
|
||||
- pknock: avoid crash on memory allocation failure and fix memleak
|
||||
- pknock: avoid fillup of peer table during DDoS
|
||||
- pknock: automatic closing of ports
|
||||
- pknock: make non-zero time mandatory for TCP mode
|
||||
- pknock: display only pknock mode and state relevant information in procfs
|
||||
- pknock: check interknock time only for !ST_ALLOWED peers
|
||||
- pknock: preserve time/autoclose values for rules added in
|
||||
reverse/arbitrary order
|
||||
- pknock: add a manpage
|
||||
|
||||
|
||||
v1.18 (2009-09-09)
|
||||
==================
|
||||
- build: support for Linux 2.6.31
|
||||
- ipset: fast forward to v3.2
|
||||
- quota2: support anonymous counters
|
||||
- quota2: reduce memory footprint for anonymous counters
|
||||
- quota2: extend locked period during cleanup (locking bugfix)
|
||||
- quota2: use strtoull instead of strtoul
|
||||
- merged xt_ACCOUNT module
|
||||
- merged xt_psd module
|
||||
|
||||
|
||||
v1.17 (2009-06-16)
|
||||
==================
|
||||
- IPMARK: print missing --shift parameter
|
||||
- build: use readlink -f in extensions/ipset/
|
||||
- build: support for Linux 2.6.30
|
||||
|
||||
|
||||
v1.16 (2009-05-27)
|
||||
==================
|
||||
- RAWNAT: make iptable_rawpost compile with 2.6.30-rc5
|
||||
- ipset: fast forward to 3.0
|
||||
|
||||
|
||||
v1.15 (2009-04-30)
|
||||
==================
|
||||
- build: add kernel version check to configure
|
||||
- condition: compile fix for 2.6.30-rc
|
||||
- condition: fix intrapositional negation sign
|
||||
- fuzzy: fix bogus comparison logic leftover from move to new 1.4.3 API
|
||||
- ipp2p: fix bogus varargs call
|
||||
- ipp2p: fix typo in error message
|
||||
- added "iface" match
|
||||
- added rawpost table (for use with RAWNAT)
|
||||
- added RAWSNAT/RAWDNAT targets
|
||||
|
||||
|
||||
v1.14 (2009-03-31)
|
||||
==================
|
||||
- fuzzy: need to account for kernel-level modified variables in .userspacesize
|
||||
- geoip: remove XT_ALIGN from .userspacesize when used with offsetof
|
||||
- SYSRQ: ignore non-UDP packets
|
||||
- SYSRQ: do proper L4 header access in IPv6 code
|
||||
(must not use tcp/udp_hdr in input path)
|
||||
- add "STEAL" target
|
||||
- dhcpmac: rename from dhcpaddr
|
||||
|
||||
|
||||
v1.13 (2009-03-23)
|
||||
==================
|
||||
- added a reworked ipv4options match
|
||||
- upgrade to iptables 1.4.3 API
|
||||
|
||||
|
||||
v1.12 (2009-03-07)
|
||||
==================
|
||||
- ipset: fix for compilation with 2.6.29-rt
|
||||
- ipset: fast forward to 2.5.0
|
||||
- rename xt_portscan to xt_lscan ("low-level scan") because
|
||||
"portscan" as a word caused confusion
|
||||
- xt_LOGMARK: print incoming interface index
|
||||
- revert "TEE: do not use TOS for routing"
|
||||
- xt_TEE: resolve unknown symbol error with CONFIG_IPV6=n
|
||||
- xt_TEE: enable routing by iif, nfmark and flowlabel
|
||||
|
||||
|
||||
v1.10 (2009-02-18)
|
||||
==================
|
||||
- compat: compile fixes for 2.6.29
|
||||
- ipset: upgrade to ipset 2.4.9
|
||||
|
||||
|
||||
v1.9 (2009-01-30)
|
||||
=================
|
||||
- add the xt_length2 extension
|
||||
- xt_TEE: remove intrapositional '!' support
|
||||
- ipset: upgrade to ipset 2.4.7
|
||||
|
||||
|
||||
v1.8 (2009-01-10)
|
||||
=================
|
||||
- xt_TEE: IPv6 support
|
||||
- xt_TEE: do not include TOS value in routing decision
|
||||
- xt_TEE: fix switch-case inversion for name/IP display
|
||||
- xt_ipp2p: update manpages and help text
|
||||
- xt_ipp2p: remove log flooding
|
||||
- xt_portscan: update manpage about --grscan option caveats
|
||||
|
||||
|
||||
v1.7 (2008-12-25)
|
||||
=================
|
||||
- xt_ECHO: compile fix
|
||||
- avoid the use of "_init" which led to compile errors on some installations
|
||||
- build: do not unconditionally install ipset
|
||||
- doc: add manpages for xt_ECHO and xt_TEE
|
||||
- xt_ipp2p: kazaa detection code cleanup
|
||||
- xt_ipp2p: fix newline inspection in kazaa detection
|
||||
- xt_ipp2p: ensure better array bounds checking
|
||||
- xt_SYSRQ: improve security by hashing password
|
||||
|
||||
|
||||
v1.6 (2008-11-18)
|
||||
=================
|
||||
- build: support for Linux 2.6.17
|
||||
- build: compile fixes for 2.6.18 and 2.6.19
|
||||
- xt_ECHO: resolve compile errors in xt_ECHO
|
||||
- xt_ipp2p: parenthesize unaligned-access macros
|
||||
|
||||
|
||||
v1.5.7 (2008-09-01)
|
||||
===================
|
||||
- API layer: fix use of uninitialized 'hotdrop' variable
|
||||
- API layer: move to pskb-based signatures
|
||||
- xt_SYSRQ: compile fixes for Linux <= 2.6.19
|
||||
- ipset: adjust semaphore.h include for Linux >= 2.6.27
|
||||
- build: automatically run `depmod -a` on installation
|
||||
- add reworked xt_fuzzy module
|
||||
- add DHCP address match and mangle module
|
||||
- xt_portscan: IPv6 support
|
||||
- xt_SYSRQ: add missing module aliases
|
||||
|
||||
|
||||
v1.5.5 (2008-08-03)
|
||||
===================
|
||||
- manpage updates for xt_CHAOS, xt_IPMARK; README updates
|
||||
- build: properly recognize external Kbuild/Mbuild files
|
||||
- build: remove dependency on CONFIG_NETWORK_SECMARK
|
||||
- add the xt_SYSRQ target
|
||||
- add the xt_quota2 extension
|
||||
- import ipset extension group
|
||||
|
||||
|
||||
v1.5.4.1 (2008-04-26)
|
||||
=====================
|
||||
- build: fix compile error for 2.6.18-stable
|
||||
|
||||
|
||||
v1.5.4 (2008-04-09)
|
||||
===================
|
||||
- build: support building multiple files with one config option
|
||||
- API layer: add check for pskb relocation
|
||||
- doc: generate manpages
|
||||
- xt_ECHO: catch skb_linearize out-of-memory condition
|
||||
- xt_LOGMARK: add hook= and ctdir= fields in dump
|
||||
- xt_LOGMARK: fix comma output in ctstatus= list
|
||||
- xt_TEE: fix address copying bug
|
||||
- xt_TEE: make skb writable before attempting checksum update
|
||||
- add reworked xt_condition match
|
||||
- add reworked xt_ipp2p match
|
||||
- add reworked xt_IPMARK target
|
||||
|
||||
|
||||
v1.5.3 (2008-03-22)
|
||||
===================
|
||||
- support for Linux 2.6.18
|
||||
- add xt_ECHO sample target
|
||||
- add reworked xt_geoip match
|
||||
|
||||
|
||||
v1.5.2 (2008-03-04)
|
||||
===================
|
||||
- build: support for GNU make < 3.81 which does not have $(realpath)
|
||||
|
||||
|
||||
v1.5.1 (2008-02-21)
|
||||
===================
|
||||
- build: allow user to select what extensions to compile and install
|
||||
- build: allow external proejcts to be downloaded into the tree
|
||||
- xt_LOGMARK: dump classify mark, ctstate and ctstatus
|
||||
- add xt_CHAOS, xt_DELUDE and xt_portscan from Chaostables
|
||||
|
||||
|
||||
v1.5.0 (2008-02-11)
|
||||
===================
|
||||
Initial release with:
|
||||
- extensions: xt_LOGMARK, xt_TARPIT, xt_TEE
|
||||
- support for Linux >= 2.6.19
|
||||
use the addons 1.x series (maintained but without new features).
|
||||
|
@@ -200,13 +200,19 @@ int main(int argc, char *argv[])
|
||||
while ((entry = ipt_ACCOUNT_get_next_entry(&ctx)) != NULL)
|
||||
{
|
||||
if (doCSV)
|
||||
printf("%s;%u;%u;%u;%u\n",
|
||||
addr_to_dotted(entry->ip), entry->src_packets, entry->src_bytes,
|
||||
entry->dst_packets, entry->dst_bytes);
|
||||
printf("%s;%llu;%llu;%llu;%llu\n",
|
||||
addr_to_dotted(entry->ip),
|
||||
(unsigned long long)entry->src_packets,
|
||||
(unsigned long long)entry->src_bytes,
|
||||
(unsigned long long)entry->dst_packets,
|
||||
(unsigned long long)entry->dst_bytes);
|
||||
else
|
||||
printf("IP: %s SRC packets: %u bytes: %u DST packets: %u bytes: %u\n",
|
||||
addr_to_dotted(entry->ip), entry->src_packets, entry->src_bytes,
|
||||
entry->dst_packets, entry->dst_bytes);
|
||||
printf("IP: %s SRC packets: %llu bytes: %llu DST packets: %llu bytes: %llu\n",
|
||||
addr_to_dotted(entry->ip),
|
||||
(unsigned long long)entry->src_packets,
|
||||
(unsigned long long)entry->src_bytes,
|
||||
(unsigned long long)entry->dst_packets,
|
||||
(unsigned long long)entry->dst_bytes);
|
||||
}
|
||||
|
||||
if (doContinue)
|
||||
|
@@ -73,13 +73,13 @@ struct ipt_acc_handle {
|
||||
};
|
||||
|
||||
/* Used for every IP entry
|
||||
Size is 16 bytes so that 256 (class C network) * 16
|
||||
fits in one kernel (zero) page */
|
||||
Size is 32 bytes so that 256 (class C network) * 16
|
||||
fits in a double kernel (zero) page (two consecutive kernel pages)*/
|
||||
struct ipt_acc_ip {
|
||||
uint32_t src_packets;
|
||||
uint32_t src_bytes;
|
||||
uint32_t dst_packets;
|
||||
uint32_t dst_bytes;
|
||||
uint64_t src_packets;
|
||||
uint64_t src_bytes;
|
||||
uint64_t dst_packets;
|
||||
uint64_t dst_bytes;
|
||||
};
|
||||
|
||||
/*
|
||||
@@ -109,16 +109,14 @@ static DEFINE_SPINLOCK(ipt_acc_lock);
|
||||
/* Mutex (semaphore) used for manipulating userspace handles/snapshot data */
|
||||
static struct semaphore ipt_acc_userspace_mutex;
|
||||
|
||||
/* Allocates a page and clears it */
|
||||
/* Allocates a page pair and clears it */
|
||||
static void *ipt_acc_zalloc_page(void)
|
||||
{
|
||||
// Don't use get_zeroed_page until it's fixed in the kernel.
|
||||
// get_zeroed_page(GFP_ATOMIC)
|
||||
void *mem = (void *)__get_free_page(GFP_ATOMIC);
|
||||
if (mem) {
|
||||
memset (mem, 0, PAGE_SIZE);
|
||||
}
|
||||
|
||||
void *mem = (void *)__get_free_pages(GFP_ATOMIC, 2);
|
||||
if (mem != NULL)
|
||||
memset(mem, 0, 2 *PAGE_SIZE);
|
||||
return mem;
|
||||
}
|
||||
|
||||
@@ -131,7 +129,7 @@ static void ipt_acc_data_free(void *data, uint8_t depth)
|
||||
|
||||
/* Free for 8 bit network */
|
||||
if (depth == 0) {
|
||||
free_page((unsigned long)data);
|
||||
free_pages((unsigned long)data, 2);
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -139,12 +137,10 @@ static void ipt_acc_data_free(void *data, uint8_t depth)
|
||||
if (depth == 1) {
|
||||
struct ipt_acc_mask_16 *mask_16 = data;
|
||||
unsigned int b;
|
||||
for (b = 0; b <= 255; b++) {
|
||||
if (mask_16->mask_24[b]) {
|
||||
free_page((unsigned long)mask_16->mask_24[b]);
|
||||
}
|
||||
}
|
||||
free_page((unsigned long)data);
|
||||
for (b = 0; b <= 255; ++b)
|
||||
if (mask_16->mask_24[b])
|
||||
free_pages((unsigned long)mask_16->mask_24[b], 2);
|
||||
free_pages((unsigned long)data, 2);
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -156,15 +152,13 @@ static void ipt_acc_data_free(void *data, uint8_t depth)
|
||||
struct ipt_acc_mask_16 *mask_16 =
|
||||
((struct ipt_acc_mask_8 *)data)->mask_16[a];
|
||||
|
||||
for (b = 0; b <= 255; b++) {
|
||||
if (mask_16->mask_24[b]) {
|
||||
free_page((unsigned long)mask_16->mask_24[b]);
|
||||
}
|
||||
}
|
||||
free_page((unsigned long)mask_16);
|
||||
for (b = 0; b <= 255; ++b)
|
||||
if (mask_16->mask_24[b])
|
||||
free_pages((unsigned long)mask_16->mask_24[b], 2);
|
||||
free_pages((unsigned long)mask_16, 2);
|
||||
}
|
||||
}
|
||||
free_page((unsigned long)data);
|
||||
free_pages((unsigned long)data, 2);
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -538,7 +532,7 @@ ipt_acc_target(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
|
||||
/*
|
||||
Functions dealing with "handles":
|
||||
Handles are snapshots of a accounting state.
|
||||
Handles are snapshots of an accounting state.
|
||||
|
||||
read snapshots are only for debugging the code
|
||||
and are very expensive concerning speed/memory
|
||||
@@ -631,18 +625,18 @@ static int ipt_acc_handle_prepare_read(char *tablename,
|
||||
unsigned int b;
|
||||
|
||||
for (b = 0; b <= 255; b++) {
|
||||
if (src_16->mask_24[b]) {
|
||||
if ((network_16->mask_24[b] =
|
||||
ipt_acc_zalloc_page()) == NULL) {
|
||||
printk("ACCOUNT: out of memory during copy of 16 bit "
|
||||
"network in ipt_acc_handle_prepare_read()\n");
|
||||
ipt_acc_data_free(dest->data, depth);
|
||||
return -1;
|
||||
}
|
||||
|
||||
memcpy(network_16->mask_24[b], src_16->mask_24[b],
|
||||
sizeof(struct ipt_acc_mask_24));
|
||||
if (src_16->mask_24[b] == NULL)
|
||||
continue;
|
||||
if ((network_16->mask_24[b] =
|
||||
ipt_acc_zalloc_page()) == NULL) {
|
||||
printk("ACCOUNT: out of memory during copy of 16 bit "
|
||||
"network in ipt_acc_handle_prepare_read()\n");
|
||||
ipt_acc_data_free(dest->data, depth);
|
||||
return -1;
|
||||
}
|
||||
|
||||
memcpy(network_16->mask_24[b], src_16->mask_24[b],
|
||||
sizeof(struct ipt_acc_mask_24));
|
||||
}
|
||||
} else if (depth == 2) {
|
||||
struct ipt_acc_mask_8 *src_8 =
|
||||
@@ -652,35 +646,35 @@ static int ipt_acc_handle_prepare_read(char *tablename,
|
||||
unsigned int a, b;
|
||||
|
||||
for (a = 0; a <= 255; a++) {
|
||||
if (src_8->mask_16[a]) {
|
||||
if ((network_8->mask_16[a] =
|
||||
if (src_8->mask_16[a] == NULL)
|
||||
continue;
|
||||
if ((network_8->mask_16[a] =
|
||||
ipt_acc_zalloc_page()) == NULL) {
|
||||
printk("ACCOUNT: out of memory during copy of 24 bit network"
|
||||
" in ipt_acc_handle_prepare_read()\n");
|
||||
ipt_acc_data_free(dest->data, depth);
|
||||
return -1;
|
||||
}
|
||||
|
||||
memcpy(network_8->mask_16[a], src_8->mask_16[a],
|
||||
sizeof(struct ipt_acc_mask_16));
|
||||
|
||||
src_16 = src_8->mask_16[a];
|
||||
network_16 = network_8->mask_16[a];
|
||||
|
||||
for (b = 0; b <= 255; b++) {
|
||||
if (src_16->mask_24[b] == NULL)
|
||||
continue;
|
||||
if ((network_16->mask_24[b] =
|
||||
ipt_acc_zalloc_page()) == NULL) {
|
||||
printk("ACCOUNT: out of memory during copy of 24 bit network"
|
||||
" in ipt_acc_handle_prepare_read()\n");
|
||||
printk("ACCOUNT: out of memory during copy of 16 bit"
|
||||
" network in ipt_acc_handle_prepare_read()\n");
|
||||
ipt_acc_data_free(dest->data, depth);
|
||||
return -1;
|
||||
}
|
||||
|
||||
memcpy(network_8->mask_16[a], src_8->mask_16[a],
|
||||
sizeof(struct ipt_acc_mask_16));
|
||||
|
||||
src_16 = src_8->mask_16[a];
|
||||
network_16 = network_8->mask_16[a];
|
||||
|
||||
for (b = 0; b <= 255; b++) {
|
||||
if (src_16->mask_24[b]) {
|
||||
if ((network_16->mask_24[b] =
|
||||
ipt_acc_zalloc_page()) == NULL) {
|
||||
printk("ACCOUNT: out of memory during copy of 16 bit"
|
||||
" network in ipt_acc_handle_prepare_read()\n");
|
||||
ipt_acc_data_free(dest->data, depth);
|
||||
return -1;
|
||||
}
|
||||
|
||||
memcpy(network_16->mask_24[b], src_16->mask_24[b],
|
||||
sizeof(struct ipt_acc_mask_24));
|
||||
}
|
||||
}
|
||||
memcpy(network_16->mask_24[b], src_16->mask_24[b],
|
||||
sizeof(struct ipt_acc_mask_24));
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -742,25 +736,26 @@ static int ipt_acc_handle_copy_data(void *to_user, unsigned long *to_user_pos,
|
||||
unsigned int i;
|
||||
|
||||
for (i = 0; i <= 255; i++) {
|
||||
if (data->ip[i].src_packets || data->ip[i].dst_packets) {
|
||||
handle_ip.ip = net_ip | net_OR_mask | i;
|
||||
if (data->ip[i].src_packets == 0 &&
|
||||
data->ip[i].dst_packets == 0)
|
||||
continue;
|
||||
|
||||
handle_ip.src_packets = data->ip[i].src_packets;
|
||||
handle_ip.src_bytes = data->ip[i].src_bytes;
|
||||
handle_ip.dst_packets = data->ip[i].dst_packets;
|
||||
handle_ip.dst_bytes = data->ip[i].dst_bytes;
|
||||
handle_ip.ip = net_ip | net_OR_mask | i;
|
||||
handle_ip.src_packets = data->ip[i].src_packets;
|
||||
handle_ip.src_bytes = data->ip[i].src_bytes;
|
||||
handle_ip.dst_packets = data->ip[i].dst_packets;
|
||||
handle_ip.dst_bytes = data->ip[i].dst_bytes;
|
||||
|
||||
/* Temporary buffer full? Flush to userspace */
|
||||
if (*tmpbuf_pos + handle_ip_size >= PAGE_SIZE) {
|
||||
if (copy_to_user(to_user + *to_user_pos, ipt_acc_tmpbuf,
|
||||
*tmpbuf_pos))
|
||||
return -EFAULT;
|
||||
*to_user_pos = *to_user_pos + *tmpbuf_pos;
|
||||
*tmpbuf_pos = 0;
|
||||
}
|
||||
memcpy(ipt_acc_tmpbuf + *tmpbuf_pos, &handle_ip, handle_ip_size);
|
||||
*tmpbuf_pos += handle_ip_size;
|
||||
/* Temporary buffer full? Flush to userspace */
|
||||
if (*tmpbuf_pos + handle_ip_size >= PAGE_SIZE) {
|
||||
if (copy_to_user(to_user + *to_user_pos, ipt_acc_tmpbuf,
|
||||
*tmpbuf_pos))
|
||||
return -EFAULT;
|
||||
*to_user_pos = *to_user_pos + *tmpbuf_pos;
|
||||
*tmpbuf_pos = 0;
|
||||
}
|
||||
memcpy(ipt_acc_tmpbuf + *tmpbuf_pos, &handle_ip, handle_ip_size);
|
||||
*tmpbuf_pos += handle_ip_size;
|
||||
}
|
||||
|
||||
return 0;
|
||||
@@ -1120,7 +1115,7 @@ static int __init account_tg_init(void)
|
||||
ACCOUNT_MAX_HANDLES * sizeof(struct ipt_acc_handle));
|
||||
|
||||
/* Allocate one page as temporary storage */
|
||||
if ((ipt_acc_tmpbuf = (void*)__get_free_page(GFP_KERNEL)) == NULL) {
|
||||
if ((ipt_acc_tmpbuf = (void *)__get_free_pages(GFP_KERNEL, 2)) == NULL) {
|
||||
printk("ACCOUNT: Out of memory for temporary buffer page\n");
|
||||
goto error_cleanup;
|
||||
}
|
||||
@@ -1142,7 +1137,7 @@ error_cleanup:
|
||||
if (ipt_acc_handles)
|
||||
kfree(ipt_acc_handles);
|
||||
if (ipt_acc_tmpbuf)
|
||||
free_page((unsigned long)ipt_acc_tmpbuf);
|
||||
free_pages((unsigned long)ipt_acc_tmpbuf, 2);
|
||||
|
||||
return -EINVAL;
|
||||
}
|
||||
@@ -1155,7 +1150,7 @@ static void __exit account_tg_exit(void)
|
||||
|
||||
kfree(ipt_acc_tables);
|
||||
kfree(ipt_acc_handles);
|
||||
free_page((unsigned long)ipt_acc_tmpbuf);
|
||||
free_pages((unsigned long)ipt_acc_tmpbuf, 2);
|
||||
}
|
||||
|
||||
module_init(account_tg_init);
|
||||
|
@@ -59,11 +59,11 @@ struct ipt_acc_handle_sockopt {
|
||||
Used for every IP when returning data
|
||||
*/
|
||||
struct ipt_acc_handle_ip {
|
||||
__be32 ip;
|
||||
uint32_t src_packets;
|
||||
uint32_t src_bytes;
|
||||
uint32_t dst_packets;
|
||||
uint32_t dst_bytes;
|
||||
__be32 ip, __dummy;
|
||||
uint64_t src_packets;
|
||||
uint64_t src_bytes;
|
||||
uint64_t dst_packets;
|
||||
uint64_t dst_bytes;
|
||||
};
|
||||
|
||||
#endif /* _IPT_ACCOUNT_H */
|
||||
|
@@ -10,9 +10,7 @@ obj-${build_CHAOS} += xt_CHAOS.o
|
||||
obj-${build_DELUDE} += xt_DELUDE.o
|
||||
obj-${build_DHCPMAC} += xt_DHCPMAC.o
|
||||
obj-${build_DNETMAP} += xt_DNETMAP.o
|
||||
ifeq (${VERSION},3)
|
||||
obj-${build_ECHO} += xt_ECHO.o
|
||||
endif
|
||||
obj-${build_IPMARK} += xt_IPMARK.o
|
||||
obj-${build_LOGMARK} += xt_LOGMARK.o
|
||||
obj-${build_SYSRQ} += xt_SYSRQ.o
|
||||
|
@@ -12,6 +12,10 @@
|
||||
# warning Kernels below 3.7 not supported.
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 8, 0)
|
||||
# define prandom_u32() random32()
|
||||
#endif
|
||||
|
||||
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
||||
# if !defined(CONFIG_NF_CONNTRACK_MARK)
|
||||
# warning You have CONFIG_NF_CONNTRACK enabled, but CONFIG_NF_CONNTRACK_MARK is not (please enable).
|
||||
@@ -50,8 +54,8 @@ static inline struct inode *file_inode(struct file *f)
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(3, 10, 0)
|
||||
static inline void
|
||||
proc_set_user(struct proc_dir_entry *de, kuid_t uid, kgid_t gid)
|
||||
static inline void proc_set_user(struct proc_dir_entry *de,
|
||||
typeof(de->uid) uid, typeof(de->gid) gid)
|
||||
{
|
||||
de->uid = uid;
|
||||
de->gid = gid;
|
||||
@@ -69,4 +73,20 @@ static inline void proc_remove(struct proc_dir_entry *de)
|
||||
}
|
||||
#endif
|
||||
|
||||
#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 4, 0)
|
||||
# define ip6_local_out(xnet, xsk, xskb) ip6_local_out(xskb)
|
||||
# define ip6_route_me_harder(xnet, xskb) ip6_route_me_harder(xskb)
|
||||
# define ip_local_out(xnet, xsk, xskb) ip_local_out(xskb)
|
||||
# define ip_route_me_harder(xnet, xskb, xaddrtype) ip_route_me_harder((xskb), (xaddrtype))
|
||||
#endif
|
||||
|
||||
static inline struct net *par_net(const struct xt_action_param *par)
|
||||
{
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
return par->net;
|
||||
#else
|
||||
return dev_net((par->in != NULL) ? par->in : par->out);
|
||||
#endif
|
||||
}
|
||||
|
||||
#endif /* _XTABLES_COMPAT_H */
|
||||
|
@@ -701,7 +701,11 @@ msg_to_userspace_nl(const struct xt_pknock_mtinfo *info,
|
||||
|
||||
memcpy(m + 1, &msg, m->len);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(3, 15, 0)
|
||||
cn_netlink_send(m, 0, multicast_group, GFP_ATOMIC);
|
||||
#else
|
||||
cn_netlink_send(m, multicast_group, GFP_ATOMIC);
|
||||
#endif
|
||||
|
||||
kfree(m);
|
||||
#endif
|
||||
@@ -1054,9 +1058,6 @@ static int pknock_mt_check(const struct xt_mtchk_param *par)
|
||||
|
||||
if (!(info->option & XT_PKNOCK_NAME))
|
||||
RETURN_ERR("You must specify --name option.\n");
|
||||
if (info->option & (XT_PKNOCK_OPENSECRET | XT_PKNOCK_CLOSESECRET))
|
||||
RETURN_ERR("No crypto support available; "
|
||||
"cannot use opensecret/closescret\n");
|
||||
if (info->option & XT_PKNOCK_OPENSECRET && info->ports_count != 1)
|
||||
RETURN_ERR("--opensecret must have just one knock port\n");
|
||||
if (info->option & XT_PKNOCK_KNOCKPORT) {
|
||||
|
@@ -68,7 +68,7 @@ xt_chaos_total(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
ret = xm_tcp->match(skb, &local_par);
|
||||
hotdrop = local_par.hotdrop;
|
||||
}
|
||||
if (!ret || hotdrop || (unsigned int)net_random() > delude_percentage)
|
||||
if (!ret || hotdrop || (unsigned int)prandom_u32() > delude_percentage)
|
||||
return;
|
||||
|
||||
destiny = (info->variant == XTCHAOS_TARPIT) ? xt_tarpit : xt_delude;
|
||||
@@ -98,7 +98,7 @@ chaos_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
const struct xt_chaos_tginfo *info = par->targinfo;
|
||||
const struct iphdr *iph = ip_hdr(skb);
|
||||
|
||||
if ((unsigned int)net_random() <= reject_percentage) {
|
||||
if ((unsigned int)prandom_u32() <= reject_percentage) {
|
||||
struct xt_action_param local_par;
|
||||
local_par.in = par->in;
|
||||
local_par.out = par->out;
|
||||
|
@@ -25,7 +25,8 @@
|
||||
#include "compat_xtables.h"
|
||||
#define PFX KBUILD_MODNAME ": "
|
||||
|
||||
static void delude_send_reset(struct sk_buff *oldskb, unsigned int hook)
|
||||
static void delude_send_reset(struct net *net, struct sk_buff *oldskb,
|
||||
unsigned int hook)
|
||||
{
|
||||
struct tcphdr _otcph, *tcph;
|
||||
const struct tcphdr *oth;
|
||||
@@ -106,8 +107,13 @@ static void delude_send_reset(struct sk_buff *oldskb, unsigned int hook)
|
||||
|
||||
addr_type = RTN_UNSPEC;
|
||||
#ifdef CONFIG_BRIDGE_NETFILTER
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->physoutdev))
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->mask & BRNF_BRIDGED))
|
||||
#endif
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD)
|
||||
#endif
|
||||
@@ -116,7 +122,7 @@ static void delude_send_reset(struct sk_buff *oldskb, unsigned int hook)
|
||||
/* ip_route_me_harder expects skb->dst to be set */
|
||||
skb_dst_set(nskb, dst_clone(skb_dst(oldskb)));
|
||||
|
||||
if (ip_route_me_harder(nskb, addr_type))
|
||||
if (ip_route_me_harder(net, nskb, addr_type))
|
||||
goto free_nskb;
|
||||
else
|
||||
niph = ip_hdr(nskb);
|
||||
@@ -130,7 +136,7 @@ static void delude_send_reset(struct sk_buff *oldskb, unsigned int hook)
|
||||
|
||||
nf_ct_attach(nskb, oldskb);
|
||||
|
||||
ip_local_out(nskb);
|
||||
ip_local_out(net, nskb->sk, nskb);
|
||||
return;
|
||||
|
||||
free_nskb:
|
||||
@@ -145,7 +151,7 @@ delude_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
* a problem, as that is supported since Linux 2.6.35. But since we do not
|
||||
* actually want to have a connection open, we are still going to drop it.
|
||||
*/
|
||||
delude_send_reset(skb, par->hooknum);
|
||||
delude_send_reset(par_net(par), skb, par->hooknum);
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
|
@@ -34,9 +34,9 @@ static void ether_set(unsigned char *addr, const unsigned char *op,
|
||||
unsigned int i;
|
||||
|
||||
for (i = 0; i < ETH_ALEN && mask > 0; ++i) {
|
||||
lo_mask = mask % 8;
|
||||
lo_mask = (mask >= 8) ? 8 : mask;
|
||||
/* FF << 4 >> 4 = 0F */
|
||||
lo_mask = ~(uint8_t)0U << lo_mask >> lo_mask;
|
||||
lo_mask = (uint8_t)(~0U << lo_mask) >> lo_mask;
|
||||
addr[i] &= lo_mask;
|
||||
addr[i] |= op[i] & ~lo_mask;
|
||||
if (mask >= 8)
|
||||
@@ -55,9 +55,9 @@ static bool ether_cmp(const unsigned char *lh, const unsigned char *rh,
|
||||
#define ZMACHEX(s) s[0], s[1], s[2], s[3], s[4], s[5]
|
||||
|
||||
for (i = 0; i < ETH_ALEN && mask > 0; ++i) {
|
||||
lo_mask = mask % 8;
|
||||
lo_mask = (mask >= 8) ? 8 : mask;
|
||||
/* ~(0xFF << 4 >> 4) = ~0x0F = 0xF0 */
|
||||
lo_mask = ~(~(uint8_t)0U << lo_mask >> lo_mask);
|
||||
lo_mask = ~((uint8_t)(~0U << lo_mask) >> lo_mask);
|
||||
if ((lh[i] ^ rh[i]) & lo_mask)
|
||||
return false;
|
||||
if (mask >= 8)
|
||||
@@ -110,13 +110,12 @@ dhcpmac_tg(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
return NF_DROP;
|
||||
|
||||
for (i = 0; i < sizeof(dh->chaddr); i += 2)
|
||||
csum_replace2(&udph->check, *(const __be16 *)dh->chaddr, 0);
|
||||
csum_replace2(&udph->check, *(const __be16 *)(dh->chaddr + i), 0);
|
||||
|
||||
memset(dh->chaddr, 0, sizeof(dh->chaddr));
|
||||
ether_set(dh->chaddr, info->addr, info->mask);
|
||||
|
||||
for (i = 0; i < sizeof(dh->chaddr); i += 2)
|
||||
csum_replace2(&udph->check, 0, *(const __be16 *)dh->chaddr);
|
||||
csum_replace2(&udph->check, 0, *(const __be16 *)(dh->chaddr + i));
|
||||
|
||||
return XT_CONTINUE;
|
||||
}
|
||||
|
@@ -26,6 +26,7 @@
|
||||
#include <linux/netfilter.h>
|
||||
#include <linux/netfilter_ipv4.h>
|
||||
#include <linux/netfilter/x_tables.h>
|
||||
#include <linux/proc_fs.h>
|
||||
#include <linux/seq_file.h>
|
||||
#include <linux/uidgid.h>
|
||||
#include <linux/version.h>
|
||||
|
@@ -112,7 +112,7 @@ echo_tg6(struct sk_buff *oldskb, const struct xt_action_param *par)
|
||||
goto free_nskb;
|
||||
|
||||
nf_ct_attach(newskb, oldskb);
|
||||
ip6_local_out(newskb);
|
||||
ip6_local_out(par_net(par), newskb->sk, newskb);
|
||||
return NF_DROP;
|
||||
|
||||
free_nskb:
|
||||
@@ -190,7 +190,7 @@ echo_tg4(struct sk_buff *oldskb, const struct xt_action_param *par)
|
||||
/* ip_route_me_harder expects the skb's dst to be set */
|
||||
skb_dst_set(newskb, dst_clone(skb_dst(oldskb)));
|
||||
|
||||
if (ip_route_me_harder(newskb, RTN_UNSPEC) != 0)
|
||||
if (ip_route_me_harder(par_net(par), newskb, RTN_UNSPEC) != 0)
|
||||
goto free_nskb;
|
||||
|
||||
newip->ttl = ip4_dst_hoplimit(skb_dst(newskb));
|
||||
@@ -201,7 +201,7 @@ echo_tg4(struct sk_buff *oldskb, const struct xt_action_param *par)
|
||||
goto free_nskb;
|
||||
|
||||
nf_ct_attach(newskb, oldskb);
|
||||
ip_local_out(newskb);
|
||||
ip_local_out(par_net(par), newskb->sk, newskb);
|
||||
return NF_DROP;
|
||||
|
||||
free_nskb:
|
||||
|
@@ -107,8 +107,8 @@ static bool xttarpit_honeypot(struct tcphdr *tcph, const struct tcphdr *oth,
|
||||
tcph->syn = true;
|
||||
tcph->ack = true;
|
||||
tcph->window = oth->window &
|
||||
((net_random() & 0x1f) - 0xf);
|
||||
tcph->seq = htonl(net_random() & ~oth->seq);
|
||||
((prandom_u32() & 0x1f) - 0xf);
|
||||
tcph->seq = htonl(prandom_u32() & ~oth->seq);
|
||||
tcph->ack_seq = htonl(ntohl(oth->seq) + oth->syn);
|
||||
}
|
||||
|
||||
@@ -117,7 +117,7 @@ static bool xttarpit_honeypot(struct tcphdr *tcph, const struct tcphdr *oth,
|
||||
tcph->syn = false;
|
||||
tcph->ack = true;
|
||||
tcph->window = oth->window &
|
||||
((net_random() & 0x1f) - 0xf);
|
||||
((prandom_u32() & 0x1f) - 0xf);
|
||||
tcph->ack_seq = payload > 100 ?
|
||||
htonl(ntohl(oth->seq) + payload) :
|
||||
oth->seq;
|
||||
@@ -170,8 +170,8 @@ static bool tarpit_generic(struct tcphdr *tcph, const struct tcphdr *oth,
|
||||
return true;
|
||||
}
|
||||
|
||||
static void tarpit_tcp4(struct sk_buff *oldskb, unsigned int hook,
|
||||
unsigned int mode)
|
||||
static void tarpit_tcp4(struct net *net, struct sk_buff *oldskb,
|
||||
unsigned int hook, unsigned int mode)
|
||||
{
|
||||
struct tcphdr _otcph, *tcph;
|
||||
const struct tcphdr *oth;
|
||||
@@ -249,14 +249,19 @@ static void tarpit_tcp4(struct sk_buff *oldskb, unsigned int hook,
|
||||
niph->id = ~oldhdr->id + 1;
|
||||
|
||||
#ifdef CONFIG_BRIDGE_NETFILTER
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->physoutdev != NULL))
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD || (nskb->nf_bridge != NULL &&
|
||||
nskb->nf_bridge->mask & BRNF_BRIDGED))
|
||||
#endif
|
||||
#else
|
||||
if (hook != NF_INET_FORWARD)
|
||||
#endif
|
||||
addr_type = RTN_LOCAL;
|
||||
|
||||
if (ip_route_me_harder(nskb, addr_type))
|
||||
if (ip_route_me_harder(net, nskb, addr_type))
|
||||
goto free_nskb;
|
||||
else
|
||||
niph = ip_hdr(nskb);
|
||||
@@ -279,8 +284,16 @@ static void tarpit_tcp4(struct sk_buff *oldskb, unsigned int hook,
|
||||
|
||||
nf_ct_attach(nskb, oldskb);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, net, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output_sk);
|
||||
#else
|
||||
NF_HOOK(NFPROTO_IPV4, NF_INET_LOCAL_OUT, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#endif
|
||||
return;
|
||||
|
||||
free_nskb:
|
||||
@@ -288,8 +301,8 @@ static void tarpit_tcp4(struct sk_buff *oldskb, unsigned int hook,
|
||||
}
|
||||
|
||||
#ifdef WITH_IPV6
|
||||
static void tarpit_tcp6(struct sk_buff *oldskb, unsigned int hook,
|
||||
unsigned int mode)
|
||||
static void tarpit_tcp6(struct net *net, struct sk_buff *oldskb,
|
||||
unsigned int hook, unsigned int mode)
|
||||
{
|
||||
struct sk_buff *nskb;
|
||||
struct tcphdr *tcph, oth;
|
||||
@@ -387,15 +400,23 @@ static void tarpit_tcp6(struct sk_buff *oldskb, unsigned int hook,
|
||||
IPPROTO_TCP,
|
||||
csum_partial(tcph, sizeof(struct tcphdr), 0));
|
||||
|
||||
if (ip6_route_me_harder(nskb))
|
||||
if (ip6_route_me_harder(net, nskb))
|
||||
goto free_nskb;
|
||||
|
||||
nskb->ip_summed = CHECKSUM_NONE;
|
||||
|
||||
nf_ct_attach(nskb, oldskb);
|
||||
|
||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 4, 0)
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, net, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(4, 1, 0)
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, nskb->sk, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output_sk);
|
||||
#else
|
||||
NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, nskb, NULL,
|
||||
skb_dst(nskb)->dev, dst_output);
|
||||
#endif
|
||||
return;
|
||||
|
||||
free_nskb:
|
||||
@@ -434,7 +455,7 @@ tarpit_tg4(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
if (iph->frag_off & htons(IP_OFFSET))
|
||||
return NF_DROP;
|
||||
|
||||
tarpit_tcp4(skb, par->hooknum, info->variant);
|
||||
tarpit_tcp4(par_net(par), skb, par->hooknum, info->variant);
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
@@ -476,7 +497,7 @@ tarpit_tg6(struct sk_buff *skb, const struct xt_action_param *par)
|
||||
return NF_DROP;
|
||||
}
|
||||
|
||||
tarpit_tcp6(skb, par->hooknum, info->variant);
|
||||
tarpit_tcp6(par_net(par), skb, par->hooknum, info->variant);
|
||||
return NF_DROP;
|
||||
}
|
||||
#endif
|
||||
|
@@ -66,7 +66,8 @@ static int condition_proc_show(struct seq_file *m, void *data)
|
||||
{
|
||||
const struct condition_variable *var = m->private;
|
||||
|
||||
return seq_printf(m, var->enabled ? "1\n" : "0\n");
|
||||
seq_printf(m, var->enabled ? "1\n" : "0\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int condition_proc_open(struct inode *inode, struct file *file)
|
||||
|
@@ -13,6 +13,7 @@
|
||||
*/
|
||||
#include <linux/list.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/nsproxy.h>
|
||||
#include <linux/proc_fs.h>
|
||||
#include <linux/seq_file.h>
|
||||
#include <linux/skbuff.h>
|
||||
@@ -20,6 +21,9 @@
|
||||
#include <linux/uidgid.h>
|
||||
#include <linux/version.h>
|
||||
#include <asm/atomic.h>
|
||||
#include <net/net_namespace.h>
|
||||
#include <net/netns/generic.h>
|
||||
#include <net/dst.h>
|
||||
|
||||
#include <linux/netfilter/x_tables.h>
|
||||
#include "xt_quota2.h"
|
||||
@@ -37,10 +41,19 @@ struct xt_quota_counter {
|
||||
struct proc_dir_entry *procfs_entry;
|
||||
};
|
||||
|
||||
static LIST_HEAD(counter_list);
|
||||
struct quota2_net {
|
||||
struct list_head counter_list;
|
||||
struct proc_dir_entry *proc_xt_quota;
|
||||
};
|
||||
|
||||
static int quota2_net_id;
|
||||
static inline struct quota2_net *quota2_pernet(struct net *net)
|
||||
{
|
||||
return net_generic(net, quota2_net_id);
|
||||
}
|
||||
|
||||
static DEFINE_SPINLOCK(counter_list_lock);
|
||||
|
||||
static struct proc_dir_entry *proc_xt_quota;
|
||||
static unsigned int quota_list_perms = S_IRUGO | S_IWUSR;
|
||||
static unsigned int quota_list_uid = 0;
|
||||
static unsigned int quota_list_gid = 0;
|
||||
@@ -51,12 +64,11 @@ module_param_named(gid, quota_list_gid, uint, S_IRUGO | S_IWUSR);
|
||||
static int quota_proc_show(struct seq_file *m, void *data)
|
||||
{
|
||||
struct xt_quota_counter *e = m->private;
|
||||
int ret;
|
||||
|
||||
spin_lock_bh(&e->lock);
|
||||
ret = seq_printf(m, "%llu\n", e->quota);
|
||||
seq_printf(m, "%llu\n", e->quota);
|
||||
spin_unlock_bh(&e->lock);
|
||||
return ret;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int quota_proc_open(struct inode *inode, struct file *file)
|
||||
@@ -69,7 +81,7 @@ quota_proc_write(struct file *file, const char __user *input,
|
||||
size_t size, loff_t *loff)
|
||||
{
|
||||
struct xt_quota_counter *e = PDE_DATA(file_inode(file));
|
||||
char buf[sizeof("18446744073709551616")];
|
||||
char buf[sizeof("+-18446744073709551616")];
|
||||
|
||||
if (size > sizeof(buf))
|
||||
size = sizeof(buf);
|
||||
@@ -79,9 +91,29 @@ quota_proc_write(struct file *file, const char __user *input,
|
||||
if (size < sizeof(buf))
|
||||
buf[size] = '\0';
|
||||
|
||||
spin_lock_bh(&e->lock);
|
||||
e->quota = simple_strtoull(buf, NULL, 0);
|
||||
spin_unlock_bh(&e->lock);
|
||||
if (*buf == '+') {
|
||||
int64_t temp = simple_strtoll(buf + 1, NULL, 0);
|
||||
spin_lock_bh(&e->lock);
|
||||
/* Do not let quota become negative if @tmp is very negative */
|
||||
if (temp > 0 || -temp < e->quota)
|
||||
e->quota += temp;
|
||||
else
|
||||
e->quota = 0;
|
||||
spin_unlock_bh(&e->lock);
|
||||
} else if (*buf == '-') {
|
||||
int64_t temp = simple_strtoll(buf + 1, NULL, 0);
|
||||
spin_lock_bh(&e->lock);
|
||||
/* Do not let quota become negative if @tmp is very big */
|
||||
if (temp < 0 || temp < e->quota)
|
||||
e->quota -= temp;
|
||||
else
|
||||
e->quota = 0;
|
||||
spin_unlock_bh(&e->lock);
|
||||
} else {
|
||||
spin_lock_bh(&e->lock);
|
||||
e->quota = simple_strtoull(buf, NULL, 0);
|
||||
spin_unlock_bh(&e->lock);
|
||||
}
|
||||
return size;
|
||||
}
|
||||
|
||||
@@ -120,16 +152,17 @@ q2_new_counter(const struct xt_quota_mtinfo2 *q, bool anon)
|
||||
* @name: name of counter
|
||||
*/
|
||||
static struct xt_quota_counter *
|
||||
q2_get_counter(const struct xt_quota_mtinfo2 *q)
|
||||
q2_get_counter(struct net *net, const struct xt_quota_mtinfo2 *q)
|
||||
{
|
||||
struct proc_dir_entry *p;
|
||||
struct xt_quota_counter *e;
|
||||
struct quota2_net *quota2_net = quota2_pernet(net);
|
||||
|
||||
if (*q->name == '\0')
|
||||
return q2_new_counter(q, true);
|
||||
|
||||
spin_lock_bh(&counter_list_lock);
|
||||
list_for_each_entry(e, &counter_list, list)
|
||||
list_for_each_entry(e, "a2_net->counter_list, list)
|
||||
if (strcmp(e->name, q->name) == 0) {
|
||||
atomic_inc(&e->ref);
|
||||
spin_unlock_bh(&counter_list_lock);
|
||||
@@ -140,7 +173,8 @@ q2_get_counter(const struct xt_quota_mtinfo2 *q)
|
||||
if (e == NULL)
|
||||
goto out;
|
||||
|
||||
p = proc_create_data(e->name, quota_list_perms, proc_xt_quota,
|
||||
p = proc_create_data(e->name, quota_list_perms,
|
||||
quota2_net->proc_xt_quota,
|
||||
"a_proc_fops, e);
|
||||
if (p == NULL || IS_ERR(p))
|
||||
goto out;
|
||||
@@ -148,7 +182,7 @@ q2_get_counter(const struct xt_quota_mtinfo2 *q)
|
||||
e->procfs_entry = p;
|
||||
proc_set_user(p, make_kuid(&init_user_ns, quota_list_uid),
|
||||
make_kgid(&init_user_ns, quota_list_gid));
|
||||
list_add_tail(&e->list, &counter_list);
|
||||
list_add_tail(&e->list, "a2_net->counter_list);
|
||||
spin_unlock_bh(&counter_list_lock);
|
||||
return e;
|
||||
|
||||
@@ -171,7 +205,7 @@ static int quota_mt2_check(const struct xt_mtchk_param *par)
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
q->master = q2_get_counter(q);
|
||||
q->master = q2_get_counter(par->net, q);
|
||||
if (q->master == NULL) {
|
||||
printk(KERN_ERR "xt_quota.3: memory alloc failure\n");
|
||||
return -ENOMEM;
|
||||
@@ -184,6 +218,7 @@ static void quota_mt2_destroy(const struct xt_mtdtor_param *par)
|
||||
{
|
||||
struct xt_quota_mtinfo2 *q = par->matchinfo;
|
||||
struct xt_quota_counter *e = q->master;
|
||||
struct quota2_net *quota2_net = quota2_pernet(par->net);
|
||||
|
||||
if (*q->name == '\0') {
|
||||
kfree(e);
|
||||
@@ -197,7 +232,7 @@ static void quota_mt2_destroy(const struct xt_mtdtor_param *par)
|
||||
}
|
||||
|
||||
list_del(&e->list);
|
||||
remove_proc_entry(e->name, proc_xt_quota);
|
||||
remove_proc_entry(e->name, quota2_net->proc_xt_quota);
|
||||
spin_unlock_bh(&counter_list_lock);
|
||||
kfree(e);
|
||||
}
|
||||
@@ -259,24 +294,60 @@ static struct xt_match quota_mt2_reg[] __read_mostly = {
|
||||
},
|
||||
};
|
||||
|
||||
static int __net_init quota2_net_init(struct net *net)
|
||||
{
|
||||
struct quota2_net *quota2_net = quota2_pernet(net);
|
||||
INIT_LIST_HEAD("a2_net->counter_list);
|
||||
|
||||
quota2_net->proc_xt_quota = proc_mkdir("xt_quota", net->proc_net);
|
||||
if (quota2_net->proc_xt_quota == NULL)
|
||||
return -EACCES;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void __net_exit quota2_net_exit(struct net *net)
|
||||
{
|
||||
struct quota2_net *quota2_net = quota2_pernet(net);
|
||||
struct xt_quota_counter *e = NULL;
|
||||
struct list_head *pos, *q;
|
||||
|
||||
remove_proc_entry("xt_quota", net->proc_net);
|
||||
|
||||
/* destroy counter_list while freeing it's content */
|
||||
spin_lock_bh(&counter_list_lock);
|
||||
list_for_each_safe(pos, q, "a2_net->counter_list) {
|
||||
e = list_entry(pos, struct xt_quota_counter, list);
|
||||
list_del(pos);
|
||||
kfree(e);
|
||||
}
|
||||
spin_unlock_bh(&counter_list_lock);
|
||||
}
|
||||
|
||||
static struct pernet_operations quota2_net_ops = {
|
||||
.init = quota2_net_init,
|
||||
.exit = quota2_net_exit,
|
||||
.id = "a2_net_id,
|
||||
.size = sizeof(struct quota2_net),
|
||||
};
|
||||
|
||||
static int __init quota_mt2_init(void)
|
||||
{
|
||||
int ret;
|
||||
|
||||
proc_xt_quota = proc_mkdir("xt_quota", init_net.proc_net);
|
||||
if (proc_xt_quota == NULL)
|
||||
return -EACCES;
|
||||
ret = register_pernet_subsys("a2_net_ops);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
ret = xt_register_matches(quota_mt2_reg, ARRAY_SIZE(quota_mt2_reg));
|
||||
if (ret < 0)
|
||||
remove_proc_entry("xt_quota", init_net.proc_net);
|
||||
unregister_pernet_subsys("a2_net_ops);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static void __exit quota_mt2_exit(void)
|
||||
{
|
||||
xt_unregister_matches(quota_mt2_reg, ARRAY_SIZE(quota_mt2_reg));
|
||||
remove_proc_entry("xt_quota", init_net.proc_net);
|
||||
unregister_pernet_subsys("a2_net_ops);
|
||||
}
|
||||
|
||||
module_init(quota_mt2_init);
|
||||
|
@@ -1,4 +1,4 @@
|
||||
.TH xtables-addons 8 "US Hoarding All The Cold Edition" "" "v2.4 (2014-01-09)"
|
||||
.TH xtables-addons 8 "" "" "v2.10 (2015-11-20)"
|
||||
.SH Name
|
||||
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
||||
.SH Targets
|
||||
|
Reference in New Issue
Block a user