blob: 8a37a556327ce8e87c3c01b00a7e1e271bfea20a [file] [log] [blame]
/*
* (C) 2005-2007 by Pablo Neira Ayuso <pablo@netfilter.org>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
*/
#include <stdio.h>
#include <getopt.h>
#include <stdlib.h>
#include <string.h>
#include <netinet/in.h> /* For htons */
#include <libnetfilter_conntrack/libnetfilter_conntrack.h>
#include <libnetfilter_conntrack/libnetfilter_conntrack_tcp.h>
#include "conntrack.h"
enum {
CT_TCP_ORIG_SPORT = (1 << 0),
CT_TCP_ORIG_DPORT = (1 << 1),
CT_TCP_REPL_SPORT = (1 << 2),
CT_TCP_REPL_DPORT = (1 << 3),
CT_TCP_MASK_SPORT = (1 << 4),
CT_TCP_MASK_DPORT = (1 << 5),
CT_TCP_STATE = (1 << 6),
CT_TCP_EXPTUPLE_SPORT = (1 << 7),
CT_TCP_EXPTUPLE_DPORT = (1 << 8)
};
static struct option opts[] = {
{"orig-port-src", 1, 0, '1'},
{"sport", 1, 0, '1'},
{"orig-port-dst", 1, 0, '2'},
{"dport", 1, 0, '2'},
{"reply-port-src", 1, 0, '3'},
{"reply-port-dst", 1, 0, '4'},
{"mask-port-src", 1, 0, '5'},
{"mask-port-dst", 1, 0, '6'},
{"state", 1, 0, '7'},
{"tuple-port-src", 1, 0, '8'},
{"tuple-port-dst", 1, 0, '9'},
{0, 0, 0, 0}
};
#define TCP_NUMBER_OF_OPT 10
static const char *tcp_optflags[TCP_NUMBER_OF_OPT] = {
"sport", "dport", "reply-port-src", "reply-port-dst", "mask-port-src",
"mask-port-dst", "state", "tuple-port-src", "tuple-port-dst"
};
static char tcp_commands_v_options[NUMBER_OF_CMD][TCP_NUMBER_OF_OPT] =
/* Well, it's better than "Re: Sevilla vs Betis" */
{
/* 1 2 3 4 5 6 7 8 9 */
/*CT_LIST*/ {2,2,2,2,0,0,2,0,0},
/*CT_CREATE*/ {3,3,3,3,0,0,1,0,0},
/*CT_UPDATE*/ {2,2,2,2,0,0,2,0,0},
/*CT_DELETE*/ {2,2,2,2,0,0,2,0,0},
/*CT_GET*/ {3,3,3,3,0,0,2,0,0},
/*CT_FLUSH*/ {0,0,0,0,0,0,0,0,0},
/*CT_EVENT*/ {2,2,2,2,0,0,2,0,0},
/*CT_VERSION*/ {0,0,0,0,0,0,0,0,0},
/*CT_HELP*/ {0,0,0,0,0,0,0,0,0},
/*EXP_LIST*/ {0,0,0,0,0,0,0,0,0},
/*EXP_CREATE*/ {1,1,0,0,1,1,0,1,1},
/*EXP_DELETE*/ {1,1,1,1,0,0,0,0,0},
/*EXP_GET*/ {1,1,1,1,0,0,0,0,0},
/*EXP_FLUSH*/ {0,0,0,0,0,0,0,0,0},
/*EXP_EVENT*/ {0,0,0,0,0,0,0,0,0},
};
static const char *tcp_states[TCP_CONNTRACK_MAX] = {
[TCP_CONNTRACK_NONE] = "NONE",
[TCP_CONNTRACK_SYN_SENT] = "SYN_SENT",
[TCP_CONNTRACK_SYN_RECV] = "SYN_RECV",
[TCP_CONNTRACK_ESTABLISHED] = "ESTABLISHED",
[TCP_CONNTRACK_FIN_WAIT] = "FIN_WAIT",
[TCP_CONNTRACK_CLOSE_WAIT] = "CLOSE_WAIT",
[TCP_CONNTRACK_LAST_ACK] = "LAST_ACK",
[TCP_CONNTRACK_TIME_WAIT] = "TIME_WAIT",
[TCP_CONNTRACK_CLOSE] = "CLOSE",
/* Since Linux kernel 2.6.31, LISTEN is SYN_SENT2. */
[TCP_CONNTRACK_SYN_SENT2] = "SYN_SENT2"
};
static void help(void)
{
fprintf(stdout, " --orig-port-src\t\toriginal source port\n");
fprintf(stdout, " --orig-port-dst\t\toriginal destination port\n");
fprintf(stdout, " --reply-port-src\t\treply source port\n");
fprintf(stdout, " --reply-port-dst\t\treply destination port\n");
fprintf(stdout, " --mask-port-src\t\tmask source port\n");
fprintf(stdout, " --mask-port-dst\t\tmask destination port\n");
fprintf(stdout, " --tuple-port-src\t\texpectation tuple src port\n");
fprintf(stdout, " --tuple-port-src\t\texpectation tuple dst port\n");
fprintf(stdout, " --state\t\t\tTCP state, fe. ESTABLISHED\n");
}
static int parse_options(char c,
struct nf_conntrack *ct,
struct nf_conntrack *exptuple,
struct nf_conntrack *mask,
unsigned int *flags)
{
int i;
uint16_t port;
switch(c) {
case '1':
port = htons(atoi(optarg));
nfct_set_attr_u16(ct, ATTR_ORIG_PORT_SRC, port);
nfct_set_attr_u8(ct, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_ORIG_SPORT;
break;
case '2':
port = htons(atoi(optarg));
nfct_set_attr_u16(ct, ATTR_ORIG_PORT_DST, port);
nfct_set_attr_u8(ct, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_ORIG_DPORT;
break;
case '3':
port = htons(atoi(optarg));
nfct_set_attr_u16(ct, ATTR_REPL_PORT_SRC, port);
nfct_set_attr_u8(ct, ATTR_REPL_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_REPL_SPORT;
break;
case '4':
port = htons(atoi(optarg));
nfct_set_attr_u16(ct, ATTR_REPL_PORT_DST, port);
nfct_set_attr_u8(ct, ATTR_REPL_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_REPL_DPORT;
break;
case '5':
port = htons(atoi(optarg));
nfct_set_attr_u16(mask, ATTR_ORIG_PORT_SRC, port);
nfct_set_attr_u8(mask, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_MASK_SPORT;
break;
case '6':
port = htons(atoi(optarg));
nfct_set_attr_u16(mask, ATTR_ORIG_PORT_DST, port);
nfct_set_attr_u8(mask, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
*flags |= CT_TCP_MASK_DPORT;
break;
case '7':
for (i=0; i<TCP_CONNTRACK_MAX; i++) {
if (strcmp(optarg, tcp_states[i]) == 0) {
nfct_set_attr_u8(ct, ATTR_TCP_STATE, i);
break;
}
}
/* For backward compatibility with Linux kernel < 2.6.31. */
if (strcmp(optarg, "LISTEN") == 0) {
nfct_set_attr_u8(ct, ATTR_TCP_STATE,
TCP_CONNTRACK_LISTEN);
} else if (i == TCP_CONNTRACK_MAX)
exit_error(PARAMETER_PROBLEM,
"unknown TCP state `%s'", optarg);
*flags |= CT_TCP_STATE;
break;
case '8':
port = htons(atoi(optarg));
nfct_set_attr_u16(exptuple, ATTR_ORIG_PORT_SRC, port);
nfct_set_attr_u8(exptuple, ATTR_ORIG_L4PROTO, port);
*flags |= CT_TCP_EXPTUPLE_SPORT;
break;
case '9':
port = htons(atoi(optarg));
nfct_set_attr_u16(exptuple, ATTR_ORIG_PORT_DST, port);
nfct_set_attr_u8(exptuple, ATTR_ORIG_L4PROTO, port);
*flags |= CT_TCP_EXPTUPLE_DPORT;
break;
}
return 1;
}
#define TCP_VALID_FLAGS_MAX 2
static unsigned int tcp_valid_flags[TCP_VALID_FLAGS_MAX] = {
CT_TCP_ORIG_SPORT | CT_TCP_ORIG_DPORT,
CT_TCP_REPL_SPORT | CT_TCP_REPL_DPORT,
};
static void final_check(unsigned int flags,
unsigned int cmd,
struct nf_conntrack *ct)
{
int ret, partial;
ret = generic_opt_check(flags, TCP_NUMBER_OF_OPT,
tcp_commands_v_options[cmd], tcp_optflags,
tcp_valid_flags, TCP_VALID_FLAGS_MAX, &partial);
if (!ret) {
switch(partial) {
case -1:
case 0:
exit_error(PARAMETER_PROBLEM, "you have to specify "
"`--sport' and "
"`--dport'");
break;
case 1:
exit_error(PARAMETER_PROBLEM, "you have to specify "
"`--reply-src-port' and "
"`--reply-dst-port'");
break;
}
}
/* Disable TCP window tracking for manually created TCP entries,
* otherwise this will not work. */
uint8_t tcp_flags = IP_CT_TCP_FLAG_BE_LIBERAL |
IP_CT_TCP_FLAG_SACK_PERM;
/* This allows to reopen a new connection directly from TIME-WAIT
* as RFC 1122 states. See nf_conntrack_proto_tcp.c for more info. */
if (nfct_get_attr_u8(ct, ATTR_TCP_STATE) >= TCP_CONNTRACK_TIME_WAIT)
tcp_flags |= IP_CT_TCP_FLAG_CLOSE_INIT;
nfct_set_attr_u8(ct, ATTR_TCP_FLAGS_ORIG, tcp_flags);
nfct_set_attr_u8(ct, ATTR_TCP_MASK_ORIG, tcp_flags);
nfct_set_attr_u8(ct, ATTR_TCP_FLAGS_REPL, tcp_flags);
nfct_set_attr_u8(ct, ATTR_TCP_MASK_REPL, tcp_flags);
}
static struct ctproto_handler tcp = {
.name = "tcp",
.protonum = IPPROTO_TCP,
.parse_opts = parse_options,
.final_check = final_check,
.help = help,
.opts = opts,
.version = VERSION,
};
void register_tcp(void)
{
register_proto(&tcp);
}