summaryrefslogtreecommitdiff
path: root/extensions/libct_proto_tcp.c
diff options
context:
space:
mode:
Diffstat (limited to 'extensions/libct_proto_tcp.c')
-rw-r--r--extensions/libct_proto_tcp.c234
1 files changed, 234 insertions, 0 deletions
diff --git a/extensions/libct_proto_tcp.c b/extensions/libct_proto_tcp.c
new file mode 100644
index 0000000..cb573d0
--- /dev/null
+++ b/extensions/libct_proto_tcp.c
@@ -0,0 +1,234 @@
+/*
+ * (C) 2005-2007 by Pablo Neira Ayuso <pablo@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ */
+#include <stdio.h>
+#include <getopt.h>
+#include <stdlib.h>
+#include <string.h>
+#include <netinet/in.h> /* For htons */
+#include <libnetfilter_conntrack/libnetfilter_conntrack.h>
+#include <libnetfilter_conntrack/libnetfilter_conntrack_tcp.h>
+
+#include "conntrack.h"
+
+enum {
+ CT_TCP_ORIG_SPORT = (1 << 0),
+ CT_TCP_ORIG_DPORT = (1 << 1),
+ CT_TCP_REPL_SPORT = (1 << 2),
+ CT_TCP_REPL_DPORT = (1 << 3),
+ CT_TCP_MASK_SPORT = (1 << 4),
+ CT_TCP_MASK_DPORT = (1 << 5),
+ CT_TCP_STATE = (1 << 6),
+ CT_TCP_EXPTUPLE_SPORT = (1 << 7),
+ CT_TCP_EXPTUPLE_DPORT = (1 << 8)
+};
+
+static struct option opts[] = {
+ {"orig-port-src", 1, 0, '1'},
+ {"sport", 1, 0, '1'},
+ {"orig-port-dst", 1, 0, '2'},
+ {"dport", 1, 0, '2'},
+ {"reply-port-src", 1, 0, '3'},
+ {"reply-port-dst", 1, 0, '4'},
+ {"mask-port-src", 1, 0, '5'},
+ {"mask-port-dst", 1, 0, '6'},
+ {"state", 1, 0, '7'},
+ {"tuple-port-src", 1, 0, '8'},
+ {"tuple-port-dst", 1, 0, '9'},
+ {0, 0, 0, 0}
+};
+
+#define TCP_NUMBER_OF_OPT 10
+
+static const char *tcp_optflags[TCP_NUMBER_OF_OPT] = {
+"sport", "dport", "reply-port-src", "reply-port-dst", "mask-port-src",
+"mask-port-dst", "state", "tuple-port-src", "tuple-port-dst"
+};
+
+static char tcp_commands_v_options[NUMBER_OF_CMD][TCP_NUMBER_OF_OPT] =
+/* Well, it's better than "Re: Sevilla vs Betis" */
+{
+ /* 1 2 3 4 5 6 7 8 9 */
+/*CT_LIST*/ {2,2,2,2,0,0,2,0,0},
+/*CT_CREATE*/ {3,3,3,3,0,0,1,0,0},
+/*CT_UPDATE*/ {2,2,2,2,0,0,2,0,0},
+/*CT_DELETE*/ {2,2,2,2,0,0,2,0,0},
+/*CT_GET*/ {3,3,3,3,0,0,2,0,0},
+/*CT_FLUSH*/ {0,0,0,0,0,0,0,0,0},
+/*CT_EVENT*/ {2,2,2,2,0,0,2,0,0},
+/*CT_VERSION*/ {0,0,0,0,0,0,0,0,0},
+/*CT_HELP*/ {0,0,0,0,0,0,0,0,0},
+/*EXP_LIST*/ {0,0,0,0,0,0,0,0,0},
+/*EXP_CREATE*/ {1,1,1,1,1,1,0,1,1},
+/*EXP_DELETE*/ {1,1,1,1,0,0,0,0,0},
+/*EXP_GET*/ {1,1,1,1,0,0,0,0,0},
+/*EXP_FLUSH*/ {0,0,0,0,0,0,0,0,0},
+/*EXP_EVENT*/ {0,0,0,0,0,0,0,0,0},
+};
+
+static const char *tcp_states[TCP_CONNTRACK_MAX] = {
+ [TCP_CONNTRACK_NONE] = "NONE",
+ [TCP_CONNTRACK_SYN_SENT] = "SYN_SENT",
+ [TCP_CONNTRACK_SYN_RECV] = "SYN_RECV",
+ [TCP_CONNTRACK_ESTABLISHED] = "ESTABLISHED",
+ [TCP_CONNTRACK_FIN_WAIT] = "FIN_WAIT",
+ [TCP_CONNTRACK_CLOSE_WAIT] = "CLOSE_WAIT",
+ [TCP_CONNTRACK_LAST_ACK] = "LAST_ACK",
+ [TCP_CONNTRACK_TIME_WAIT] = "TIME_WAIT",
+ [TCP_CONNTRACK_CLOSE] = "CLOSE",
+ [TCP_CONNTRACK_LISTEN] = "LISTEN"
+};
+
+static void help(void)
+{
+ fprintf(stdout, " --orig-port-src\t\toriginal source port\n");
+ fprintf(stdout, " --orig-port-dst\t\toriginal destination port\n");
+ fprintf(stdout, " --reply-port-src\t\treply source port\n");
+ fprintf(stdout, " --reply-port-dst\t\treply destination port\n");
+ fprintf(stdout, " --mask-port-src\t\tmask source port\n");
+ fprintf(stdout, " --mask-port-dst\t\tmask destination port\n");
+ fprintf(stdout, " --tuple-port-src\t\texpectation tuple src port\n");
+ fprintf(stdout, " --tuple-port-src\t\texpectation tuple dst port\n");
+ fprintf(stdout, " --state\t\t\tTCP state, fe. ESTABLISHED\n");
+}
+
+static int parse_options(char c,
+ struct nf_conntrack *ct,
+ struct nf_conntrack *exptuple,
+ struct nf_conntrack *mask,
+ unsigned int *flags)
+{
+ int i;
+ u_int16_t port;
+
+ switch(c) {
+ case '1':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(ct, ATTR_ORIG_PORT_SRC, port);
+ nfct_set_attr_u8(ct, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_ORIG_SPORT;
+ break;
+ case '2':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(ct, ATTR_ORIG_PORT_DST, port);
+ nfct_set_attr_u8(ct, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_ORIG_DPORT;
+ break;
+ case '3':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(ct, ATTR_REPL_PORT_SRC, port);
+ nfct_set_attr_u8(ct, ATTR_REPL_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_REPL_SPORT;
+ break;
+ case '4':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(ct, ATTR_REPL_PORT_DST, port);
+ nfct_set_attr_u8(ct, ATTR_REPL_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_REPL_DPORT;
+ break;
+ case '5':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(mask, ATTR_ORIG_PORT_SRC, port);
+ nfct_set_attr_u8(mask, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_MASK_SPORT;
+ break;
+ case '6':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(mask, ATTR_ORIG_PORT_DST, port);
+ nfct_set_attr_u8(mask, ATTR_ORIG_L4PROTO, IPPROTO_TCP);
+ *flags |= CT_TCP_MASK_DPORT;
+ break;
+ case '7':
+ for (i=0; i<TCP_CONNTRACK_MAX; i++) {
+ if (strcmp(optarg, tcp_states[i]) == 0) {
+ nfct_set_attr_u8(ct, ATTR_TCP_STATE, i);
+ break;
+ }
+ }
+ if (i == TCP_CONNTRACK_MAX)
+ exit_error(PARAMETER_PROBLEM,
+ "unknown TCP state `%s'", optarg);
+ *flags |= CT_TCP_STATE;
+ break;
+ case '8':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(exptuple, ATTR_ORIG_PORT_SRC, port);
+ nfct_set_attr_u8(exptuple, ATTR_ORIG_L4PROTO, port);
+ *flags |= CT_TCP_EXPTUPLE_SPORT;
+ break;
+ case '9':
+ port = htons(atoi(optarg));
+ nfct_set_attr_u16(exptuple, ATTR_ORIG_PORT_DST, port);
+ nfct_set_attr_u8(exptuple, ATTR_ORIG_L4PROTO, port);
+ *flags |= CT_TCP_EXPTUPLE_DPORT;
+ break;
+ }
+ return 1;
+}
+
+#define TCP_VALID_FLAGS_MAX 2
+static unsigned int tcp_valid_flags[TCP_VALID_FLAGS_MAX] = {
+ CT_TCP_ORIG_SPORT | CT_TCP_ORIG_DPORT,
+ CT_TCP_REPL_SPORT | CT_TCP_REPL_DPORT,
+};
+
+static void final_check(unsigned int flags,
+ unsigned int cmd,
+ struct nf_conntrack *ct)
+{
+ int ret, partial;
+
+ ret = generic_opt_check(flags, TCP_NUMBER_OF_OPT,
+ tcp_commands_v_options[cmd], tcp_optflags,
+ tcp_valid_flags, TCP_VALID_FLAGS_MAX, &partial);
+ if (!ret) {
+ switch(partial) {
+ case -1:
+ case 0:
+ exit_error(PARAMETER_PROBLEM, "you have to specify "
+ "`--sport' and "
+ "`--dport'");
+ break;
+ case 1:
+ exit_error(PARAMETER_PROBLEM, "you have to specify "
+ "`--reply-src-port' and "
+ "`--reply-dst-port'");
+ break;
+ }
+ }
+ /* Disable TCP window tracking for manually created TCP entries,
+ * otherwise this will not work. */
+ uint8_t tcp_flags = IP_CT_TCP_FLAG_BE_LIBERAL |
+ IP_CT_TCP_FLAG_SACK_PERM;
+
+ /* This allows to reopen a new connection directly from TIME-WAIT
+ * as RFC 1122 states. See nf_conntrack_proto_tcp.c for more info. */
+ if (nfct_get_attr_u8(ct, ATTR_TCP_STATE) >= TCP_CONNTRACK_TIME_WAIT)
+ tcp_flags |= IP_CT_TCP_FLAG_CLOSE_INIT;
+
+ nfct_set_attr_u8(ct, ATTR_TCP_FLAGS_ORIG, tcp_flags);
+ nfct_set_attr_u8(ct, ATTR_TCP_MASK_ORIG, tcp_flags);
+ nfct_set_attr_u8(ct, ATTR_TCP_FLAGS_REPL, tcp_flags);
+ nfct_set_attr_u8(ct, ATTR_TCP_MASK_REPL, tcp_flags);
+}
+
+static struct ctproto_handler tcp = {
+ .name = "tcp",
+ .protonum = IPPROTO_TCP,
+ .parse_opts = parse_options,
+ .final_check = final_check,
+ .help = help,
+ .opts = opts,
+ .version = VERSION,
+};
+
+void register_tcp(void)
+{
+ register_proto(&tcp);
+}