mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-07 21:25:12 +02:00
427 lines
11 KiB
C
427 lines
11 KiB
C
/* Copyright 2008 Jozsef Kadlecsik (kadlec@blackhole.kfki.hu)
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#include <limits.h> /* UINT_MAX */
|
|
#include <stdio.h> /* *printf */
|
|
#include <string.h> /* mem*, str* */
|
|
|
|
#include "ipset.h"
|
|
|
|
#include "ip_set_ipportnethash.h"
|
|
|
|
#define OPT_CREATE_HASHSIZE 0x01U
|
|
#define OPT_CREATE_PROBES 0x02U
|
|
#define OPT_CREATE_RESIZE 0x04U
|
|
#define OPT_CREATE_NETWORK 0x08U
|
|
#define OPT_CREATE_FROM 0x10U
|
|
#define OPT_CREATE_TO 0x20U
|
|
|
|
/* Initialize the create. */
|
|
static void
|
|
ipportnethash_create_init(void *data)
|
|
{
|
|
struct ip_set_req_ipportnethash_create *mydata = data;
|
|
|
|
DP("create INIT");
|
|
|
|
/* Default create parameters */
|
|
mydata->hashsize = IP_NF_SET_HASHSIZE;
|
|
mydata->probes = 8;
|
|
mydata->resize = 50;
|
|
}
|
|
|
|
/* Function which parses command options; returns true if it ate an option */
|
|
static int
|
|
ipportnethash_create_parse(int c, char *argv[] UNUSED, void *data,
|
|
unsigned *flags)
|
|
{
|
|
struct ip_set_req_ipportnethash_create *mydata = data;
|
|
ip_set_ip_t value;
|
|
|
|
DP("create_parse");
|
|
|
|
switch (c) {
|
|
case '1':
|
|
|
|
if (string_to_number(optarg, 1, UINT_MAX - 1, &mydata->hashsize))
|
|
exit_error(PARAMETER_PROBLEM, "Invalid hashsize `%s' specified", optarg);
|
|
|
|
*flags |= OPT_CREATE_HASHSIZE;
|
|
|
|
DP("--hashsize %u", mydata->hashsize);
|
|
|
|
break;
|
|
|
|
case '2':
|
|
|
|
if (string_to_number(optarg, 1, 65535, &value))
|
|
exit_error(PARAMETER_PROBLEM, "Invalid probes `%s' specified", optarg);
|
|
|
|
mydata->probes = value;
|
|
*flags |= OPT_CREATE_PROBES;
|
|
|
|
DP("--probes %u", mydata->probes);
|
|
|
|
break;
|
|
|
|
case '3':
|
|
|
|
if (string_to_number(optarg, 0, 65535, &value))
|
|
exit_error(PARAMETER_PROBLEM, "Invalid resize `%s' specified", optarg);
|
|
|
|
mydata->resize = value;
|
|
*flags |= OPT_CREATE_RESIZE;
|
|
|
|
DP("--resize %u", mydata->resize);
|
|
|
|
break;
|
|
|
|
case '4':
|
|
parse_ip(optarg, &mydata->from);
|
|
|
|
*flags |= OPT_CREATE_FROM;
|
|
|
|
DP("--from %x (%s)", mydata->from,
|
|
ip_tostring_numeric(mydata->from));
|
|
|
|
break;
|
|
|
|
case '5':
|
|
parse_ip(optarg, &mydata->to);
|
|
|
|
*flags |= OPT_CREATE_TO;
|
|
|
|
DP("--to %x (%s)", mydata->to,
|
|
ip_tostring_numeric(mydata->to));
|
|
|
|
break;
|
|
|
|
case '6':
|
|
parse_ipandmask(optarg, &mydata->from, &mydata->to);
|
|
|
|
/* Make to the last of from + mask */
|
|
if (mydata->to)
|
|
mydata->to = mydata->from | ~(mydata->to);
|
|
else {
|
|
mydata->from = 0x00000000;
|
|
mydata->to = 0xFFFFFFFF;
|
|
}
|
|
*flags |= OPT_CREATE_NETWORK;
|
|
|
|
DP("--network from %x (%s)",
|
|
mydata->from, ip_tostring_numeric(mydata->from));
|
|
DP("--network to %x (%s)",
|
|
mydata->to, ip_tostring_numeric(mydata->to));
|
|
|
|
break;
|
|
|
|
default:
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Final check; exit if not ok. */
|
|
static void
|
|
ipportnethash_create_final(void *data, unsigned int flags)
|
|
{
|
|
struct ip_set_req_ipportnethash_create *mydata = data;
|
|
|
|
#ifdef IPSET_DEBUG
|
|
DP("hashsize %u probes %u resize %u",
|
|
mydata->hashsize, mydata->probes, mydata->resize);
|
|
#endif
|
|
|
|
if (flags & OPT_CREATE_NETWORK) {
|
|
/* --network */
|
|
if ((flags & OPT_CREATE_FROM) || (flags & OPT_CREATE_TO))
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Can't specify --from or --to with --network\n");
|
|
} else if (flags & (OPT_CREATE_FROM | OPT_CREATE_TO)) {
|
|
/* --from --to */
|
|
if (!(flags & OPT_CREATE_FROM) || !(flags & OPT_CREATE_TO))
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Need to specify both --from and --to\n");
|
|
} else {
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Need to specify --from and --to, or --network\n");
|
|
|
|
}
|
|
|
|
DP("from : %x to: %x diff: %x",
|
|
mydata->from, mydata->to,
|
|
mydata->to - mydata->from);
|
|
|
|
if (mydata->from > mydata->to)
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"From can't be higher than to.\n");
|
|
|
|
if (mydata->to - mydata->from > MAX_RANGE)
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Range too large. Max is %d IPs in range\n",
|
|
MAX_RANGE+1);
|
|
}
|
|
|
|
/* Create commandline options */
|
|
static const struct option create_opts[] = {
|
|
{.name = "hashsize", .has_arg = required_argument, .val = '1'},
|
|
{.name = "probes", .has_arg = required_argument, .val = '2'},
|
|
{.name = "resize", .has_arg = required_argument, .val = '3'},
|
|
{.name = "from", .has_arg = required_argument, .val = '4'},
|
|
{.name = "to", .has_arg = required_argument, .val = '5'},
|
|
{.name = "network", .has_arg = required_argument, .val = '6'},
|
|
{NULL},
|
|
};
|
|
|
|
/* Add, del, test parser */
|
|
static ip_set_ip_t
|
|
ipportnethash_adt_parser(int cmd, const char *arg, void *data)
|
|
{
|
|
struct ip_set_req_ipportnethash *mydata = data;
|
|
char *saved = ipset_strdup(arg);
|
|
char *ptr, *tmp = saved;
|
|
ip_set_ip_t cidr;
|
|
|
|
DP("ipportnethash: %p %p", arg, data);
|
|
|
|
if (((ptr = strchr(tmp, ':')) || (ptr = strchr(tmp, '%'))) && ++warn_once == 1)
|
|
fprintf(stderr, "Warning: please use ',' separator token between ip,port,net.\n"
|
|
"Next release won't support old separator tokens.\n");
|
|
|
|
ptr = strsep(&tmp, ":%,");
|
|
parse_ip(ptr, &mydata->ip);
|
|
if (!tmp)
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"IP address, port and network address must be specified: ip,port,net");
|
|
|
|
ptr = strsep(&tmp, ":%,");
|
|
parse_port(ptr, &mydata->port);
|
|
if (!tmp)
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"IP address, port and network address must be specified: ip,port,net");
|
|
|
|
ptr = strsep(&tmp, "/");
|
|
if (tmp == NULL)
|
|
if (cmd == CMD_TEST)
|
|
cidr = 32;
|
|
else
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Missing /cidr from `%s'", arg);
|
|
else
|
|
if (string_to_number(tmp, 1, 31, &cidr))
|
|
exit_error(PARAMETER_PROBLEM,
|
|
"Out of range cidr `%s' specified", arg);
|
|
|
|
mydata->cidr = cidr;
|
|
|
|
parse_ip(ptr, &mydata->ip1);
|
|
ipset_free(saved);
|
|
return 1;
|
|
};
|
|
|
|
/*
|
|
* Print and save
|
|
*/
|
|
|
|
static void
|
|
ipportnethash_initheader(struct set *set, const void *data)
|
|
{
|
|
const struct ip_set_req_ipportnethash_create *header = data;
|
|
struct ip_set_ipportnethash *map = set->settype->header;
|
|
|
|
memset(map, 0, sizeof(struct ip_set_ipportnethash));
|
|
map->hashsize = header->hashsize;
|
|
map->probes = header->probes;
|
|
map->resize = header->resize;
|
|
map->first_ip = header->from;
|
|
map->last_ip = header->to;
|
|
}
|
|
|
|
static void
|
|
ipportnethash_printheader(struct set *set, unsigned options)
|
|
{
|
|
struct ip_set_ipportnethash *mysetdata = set->settype->header;
|
|
|
|
printf(" from: %s", ip_tostring(mysetdata->first_ip, options));
|
|
printf(" to: %s", ip_tostring(mysetdata->last_ip, options));
|
|
printf(" hashsize: %u", mysetdata->hashsize);
|
|
printf(" probes: %u", mysetdata->probes);
|
|
printf(" resize: %u\n", mysetdata->resize);
|
|
}
|
|
|
|
static char buf[20];
|
|
|
|
static char *
|
|
unpack_ip_tostring(ip_set_ip_t ip, unsigned options UNUSED)
|
|
{
|
|
int i, j = 3;
|
|
unsigned char a, b;
|
|
|
|
ip = htonl(ip);
|
|
for (i = 3; i >= 0; i--)
|
|
if (((unsigned char *)&ip)[i] != 0) {
|
|
j = i;
|
|
break;
|
|
}
|
|
|
|
a = ((unsigned char *)&ip)[j];
|
|
if (a <= 128) {
|
|
a = (a - 1) * 2;
|
|
b = 7;
|
|
} else if (a <= 192) {
|
|
a = (a - 129) * 4;
|
|
b = 6;
|
|
} else if (a <= 224) {
|
|
a = (a - 193) * 8;
|
|
b = 5;
|
|
} else if (a <= 240) {
|
|
a = (a - 225) * 16;
|
|
b = 4;
|
|
} else if (a <= 248) {
|
|
a = (a - 241) * 32;
|
|
b = 3;
|
|
} else if (a <= 252) {
|
|
a = (a - 249) * 64;
|
|
b = 2;
|
|
} else if (a <= 254) {
|
|
a = (a - 253) * 128;
|
|
b = 1;
|
|
} else {
|
|
a = b = 0;
|
|
}
|
|
((unsigned char *)&ip)[j] = a;
|
|
b += j * 8;
|
|
|
|
sprintf(buf, "%u.%u.%u.%u/%u",
|
|
((unsigned char *)&ip)[0],
|
|
((unsigned char *)&ip)[1],
|
|
((unsigned char *)&ip)[2],
|
|
((unsigned char *)&ip)[3],
|
|
b);
|
|
|
|
DP("%s %s", ip_tostring(ntohl(ip), 0), buf);
|
|
return buf;
|
|
}
|
|
|
|
static void
|
|
ipportnethash_printips(struct set *set, void *data, u_int32_t len,
|
|
unsigned options, char dont_align)
|
|
{
|
|
struct ip_set_ipportnethash *mysetdata = set->settype->header;
|
|
size_t offset = 0;
|
|
struct ipportip *ipptr;
|
|
ip_set_ip_t ip;
|
|
uint16_t port;
|
|
|
|
while (offset < len) {
|
|
ipptr = data + offset;
|
|
ip = (ipptr->ip>>16) + mysetdata->first_ip;
|
|
port = (uint16_t) ipptr->ip;
|
|
printf("%s,%s,",
|
|
ip_tostring(ip, options),
|
|
port_tostring(port, options));
|
|
printf("%s\n",
|
|
unpack_ip_tostring(ipptr->ip1, options));
|
|
offset += IPSET_VALIGN(sizeof(struct ipportip), dont_align);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ipportnethash_saveheader(struct set *set, unsigned options)
|
|
{
|
|
struct ip_set_ipportnethash *mysetdata = set->settype->header;
|
|
|
|
printf("-N %s %s --from %s",
|
|
set->name, set->settype->typename,
|
|
ip_tostring(mysetdata->first_ip, options));
|
|
printf(" --to %s",
|
|
ip_tostring(mysetdata->last_ip, options));
|
|
printf(" --hashsize %u --probes %u --resize %u\n",
|
|
mysetdata->hashsize, mysetdata->probes, mysetdata->resize);
|
|
}
|
|
|
|
/* Print save for an IP */
|
|
static void
|
|
ipportnethash_saveips(struct set *set, void *data, u_int32_t len,
|
|
unsigned options, char dont_align)
|
|
{
|
|
struct ip_set_ipportnethash *mysetdata = set->settype->header;
|
|
size_t offset = 0;
|
|
struct ipportip *ipptr;
|
|
ip_set_ip_t ip;
|
|
uint16_t port;
|
|
|
|
while (offset < len) {
|
|
ipptr = data + offset;
|
|
ip = (ipptr->ip>>16) + mysetdata->first_ip;
|
|
port = (uint16_t) ipptr->ip;
|
|
printf("-A %s %s,%s,", set->name,
|
|
ip_tostring(ip, options),
|
|
port_tostring(port, options));
|
|
printf("%s\n",
|
|
unpack_ip_tostring(ipptr->ip, options));
|
|
offset += IPSET_VALIGN(sizeof(struct ipportip), dont_align);
|
|
}
|
|
}
|
|
|
|
static void
|
|
ipportnethash_usage(void)
|
|
{
|
|
printf
|
|
("-N set ipportnethash --from IP --to IP\n"
|
|
" [--hashsize hashsize] [--probes probes ] [--resize resize]\n"
|
|
"-N set ipportnethash --network IP/mask\n"
|
|
" [--hashsize hashsize] [--probes probes ] [--resize resize]\n"
|
|
"-A set IP,port,IP/net\n"
|
|
"-D set IP,port,IP/net\n"
|
|
"-T set IP,port,IP[/net]\n");
|
|
}
|
|
|
|
static struct settype settype_ipportnethash = {
|
|
.typename = SETTYPE_NAME,
|
|
.protocol_version = IP_SET_PROTOCOL_VERSION,
|
|
|
|
/* Create */
|
|
.create_size = sizeof(struct ip_set_req_ipportnethash_create),
|
|
.create_init = ipportnethash_create_init,
|
|
.create_parse = ipportnethash_create_parse,
|
|
.create_final = ipportnethash_create_final,
|
|
.create_opts = create_opts,
|
|
|
|
/* Add/del/test */
|
|
.adt_size = sizeof(struct ip_set_req_ipportnethash),
|
|
.adt_parser = ipportnethash_adt_parser,
|
|
|
|
/* Printing */
|
|
.header_size = sizeof(struct ip_set_ipportnethash),
|
|
.initheader = ipportnethash_initheader,
|
|
.printheader = ipportnethash_printheader,
|
|
.printips = ipportnethash_printips,
|
|
.printips_sorted = ipportnethash_printips,
|
|
.saveheader = ipportnethash_saveheader,
|
|
.saveips = ipportnethash_saveips,
|
|
|
|
.usage = ipportnethash_usage,
|
|
};
|
|
|
|
CONSTRUCTOR(ipportnethash)
|
|
{
|
|
settype_register(&settype_ipportnethash);
|
|
|
|
}
|