| /* Code to save the iptables state, in human readable-form. */ |
| /* (C) 1999 by Paul 'Rusty' Russell <rusty@rustcorp.com.au> and |
| * (C) 2000-2002 by Harald Welte <laforge@gnumonks.org> |
| * |
| * This code is distributed under the terms of GNU GPL v2 |
| * |
| */ |
| #include <getopt.h> |
| #include <sys/errno.h> |
| #include <stdio.h> |
| #include <fcntl.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <dlfcn.h> |
| #include <time.h> |
| #include <netdb.h> |
| #include "libiptc/libiptc.h" |
| #include "iptables.h" |
| |
| static int binary = 0, counters = 0; |
| |
| static struct option options[] = { |
| { "binary", 0, 0, 'b' }, |
| { "counters", 0, 0, 'c' }, |
| { "dump", 0, 0, 'd' }, |
| { "table", 1, 0, 't' }, |
| { 0 } |
| }; |
| |
| #define IP_PARTS_NATIVE(n) \ |
| (unsigned int)((n)>>24)&0xFF, \ |
| (unsigned int)((n)>>16)&0xFF, \ |
| (unsigned int)((n)>>8)&0xFF, \ |
| (unsigned int)((n)&0xFF) |
| |
| #define IP_PARTS(n) IP_PARTS_NATIVE(ntohl(n)) |
| |
| /* This assumes that mask is contiguous, and byte-bounded. */ |
| static void |
| print_iface(char letter, const char *iface, const unsigned char *mask, |
| int invert) |
| { |
| unsigned int i; |
| |
| if (mask[0] == 0) |
| return; |
| |
| printf("-%c %s", letter, invert ? "! " : ""); |
| |
| for (i = 0; i < IFNAMSIZ; i++) { |
| if (mask[i] != 0) { |
| if (iface[i] != '\0') |
| printf("%c", iface[i]); |
| } else { |
| /* we can access iface[i-1] here, because |
| * a few lines above we make sure that mask[0] != 0 */ |
| if (iface[i-1] != '\0') |
| printf("+"); |
| break; |
| } |
| } |
| |
| printf(" "); |
| } |
| |
| /* These are hardcoded backups in iptables.c, so they are safe */ |
| struct pprot { |
| char *name; |
| u_int8_t num; |
| }; |
| |
| /* FIXME: why don't we use /etc/protocols ? */ |
| static const struct pprot chain_protos[] = { |
| { "tcp", IPPROTO_TCP }, |
| { "udp", IPPROTO_UDP }, |
| { "icmp", IPPROTO_ICMP }, |
| { "esp", IPPROTO_ESP }, |
| { "ah", IPPROTO_AH }, |
| { "sctp", IPPROTO_SCTP }, |
| }; |
| |
| static void print_proto(u_int16_t proto, int invert) |
| { |
| if (proto) { |
| unsigned int i; |
| const char *invertstr = invert ? "! " : ""; |
| |
| struct protoent *pent = getprotobynumber(proto); |
| if (pent) { |
| printf("-p %s%s ", invertstr, pent->p_name); |
| return; |
| } |
| |
| for (i = 0; i < sizeof(chain_protos)/sizeof(struct pprot); i++) |
| if (chain_protos[i].num == proto) { |
| printf("-p %s%s ", |
| invertstr, chain_protos[i].name); |
| return; |
| } |
| |
| printf("-p %s%u ", invertstr, proto); |
| } |
| } |
| |
| #if 0 |
| static int non_zero(const void *ptr, size_t size) |
| { |
| unsigned int i; |
| |
| for (i = 0; i < size; i++) |
| if (((char *)ptr)[i]) |
| return 0; |
| |
| return 1; |
| } |
| #endif |
| |
| static int print_match(const struct ipt_entry_match *e, |
| const struct ipt_ip *ip) |
| { |
| struct iptables_match *match |
| = find_match(e->u.user.name, TRY_LOAD, NULL); |
| |
| if (match) { |
| printf("-m %s ", e->u.user.name); |
| |
| /* some matches don't provide a save function */ |
| if (match->save) |
| match->save(ip, e); |
| } else { |
| if (e->u.match_size) { |
| fprintf(stderr, |
| "Can't find library for match `%s'\n", |
| e->u.user.name); |
| exit(1); |
| } |
| } |
| return 0; |
| } |
| |
| /* print a given ip including mask if neccessary */ |
| static void print_ip(char *prefix, u_int32_t ip, u_int32_t mask, int invert) |
| { |
| u_int32_t bits, hmask = ntohl(mask); |
| int i; |
| |
| if (!mask && !ip && !invert) |
| return; |
| |
| printf("%s %s%u.%u.%u.%u", |
| prefix, |
| invert ? "! " : "", |
| IP_PARTS(ip)); |
| |
| if (mask == 0xFFFFFFFFU) { |
| printf("/32 "); |
| return; |
| } |
| |
| i = 32; |
| bits = 0xFFFFFFFEU; |
| while (--i >= 0 && hmask != bits) |
| bits <<= 1; |
| if (i >= 0) |
| printf("/%u ", i); |
| else |
| printf("/%u.%u.%u.%u ", IP_PARTS(mask)); |
| } |
| |
| /* We want this to be readable, so only print out neccessary fields. |
| * Because that's the kind of world I want to live in. */ |
| static void print_rule(const struct ipt_entry *e, |
| iptc_handle_t *h, const char *chain, int counters) |
| { |
| struct ipt_entry_target *t; |
| const char *target_name; |
| |
| /* print counters */ |
| if (counters) |
| printf("[%llu:%llu] ", (unsigned long long)e->counters.pcnt, (unsigned long long)e->counters.bcnt); |
| |
| /* print chain name */ |
| printf("-A %s ", chain); |
| |
| /* Print IP part. */ |
| print_ip("-s", e->ip.src.s_addr,e->ip.smsk.s_addr, |
| e->ip.invflags & IPT_INV_SRCIP); |
| |
| print_ip("-d", e->ip.dst.s_addr, e->ip.dmsk.s_addr, |
| e->ip.invflags & IPT_INV_DSTIP); |
| |
| print_iface('i', e->ip.iniface, e->ip.iniface_mask, |
| e->ip.invflags & IPT_INV_VIA_IN); |
| |
| print_iface('o', e->ip.outiface, e->ip.outiface_mask, |
| e->ip.invflags & IPT_INV_VIA_OUT); |
| |
| print_proto(e->ip.proto, e->ip.invflags & IPT_INV_PROTO); |
| |
| if (e->ip.flags & IPT_F_FRAG) |
| printf("%s-f ", |
| e->ip.invflags & IPT_INV_FRAG ? "! " : ""); |
| |
| /* Print matchinfo part */ |
| if (e->target_offset) { |
| IPT_MATCH_ITERATE(e, print_match, &e->ip); |
| } |
| |
| /* Print target name */ |
| target_name = iptc_get_target(e, h); |
| if (target_name && (*target_name != '\0')) |
| #ifdef IPT_F_GOTO |
| printf("-%c %s ", e->ip.flags & IPT_F_GOTO ? 'g' : 'j', target_name); |
| #else |
| printf("-j %s ", target_name); |
| #endif |
| |
| /* Print targinfo part */ |
| t = ipt_get_target((struct ipt_entry *)e); |
| if (t->u.user.name[0]) { |
| struct iptables_target *target |
| = find_target(t->u.user.name, TRY_LOAD); |
| |
| if (!target) { |
| fprintf(stderr, "Can't find library for target `%s'\n", |
| t->u.user.name); |
| exit(1); |
| } |
| |
| if (target->save) |
| target->save(&e->ip, t); |
| else { |
| /* If the target size is greater than ipt_entry_target |
| * there is something to be saved, we just don't know |
| * how to print it */ |
| if (t->u.target_size != |
| sizeof(struct ipt_entry_target)) { |
| fprintf(stderr, "Target `%s' is missing " |
| "save function\n", |
| t->u.user.name); |
| exit(1); |
| } |
| } |
| } |
| printf("\n"); |
| } |
| |
| /* Debugging prototype. */ |
| static int for_each_table(int (*func)(const char *tablename)) |
| { |
| int ret = 1; |
| FILE *procfile = NULL; |
| char tablename[IPT_TABLE_MAXNAMELEN+1]; |
| |
| procfile = fopen("/proc/net/ip_tables_names", "r"); |
| if (!procfile) |
| exit_error(OTHER_PROBLEM, |
| "Unable to open /proc/net/ip_tables_names: %s\n", |
| strerror(errno)); |
| |
| while (fgets(tablename, sizeof(tablename), procfile)) { |
| if (tablename[strlen(tablename) - 1] != '\n') |
| exit_error(OTHER_PROBLEM, |
| "Badly formed tablename `%s'\n", |
| tablename); |
| tablename[strlen(tablename) - 1] = '\0'; |
| ret &= func(tablename); |
| } |
| |
| return ret; |
| } |
| |
| |
| static int do_output(const char *tablename) |
| { |
| iptc_handle_t h; |
| const char *chain = NULL; |
| |
| if (!tablename) |
| return for_each_table(&do_output); |
| |
| h = iptc_init(tablename); |
| if (!h) |
| exit_error(OTHER_PROBLEM, "Can't initialize: %s\n", |
| iptc_strerror(errno)); |
| |
| if (!binary) { |
| time_t now = time(NULL); |
| |
| printf("# Generated by iptables-save v%s on %s", |
| IPTABLES_VERSION, ctime(&now)); |
| printf("*%s\n", tablename); |
| |
| /* Dump out chain names first, |
| * thereby preventing dependency conflicts */ |
| for (chain = iptc_first_chain(&h); |
| chain; |
| chain = iptc_next_chain(&h)) { |
| |
| printf(":%s ", chain); |
| if (iptc_builtin(chain, h)) { |
| struct ipt_counters count; |
| printf("%s ", |
| iptc_get_policy(chain, &count, &h)); |
| printf("[%llu:%llu]\n", (unsigned long long)count.pcnt, (unsigned long long)count.bcnt); |
| } else { |
| printf("- [0:0]\n"); |
| } |
| } |
| |
| |
| for (chain = iptc_first_chain(&h); |
| chain; |
| chain = iptc_next_chain(&h)) { |
| const struct ipt_entry *e; |
| |
| /* Dump out rules */ |
| e = iptc_first_rule(chain, &h); |
| while(e) { |
| print_rule(e, &h, chain, counters); |
| e = iptc_next_rule(e, &h); |
| } |
| } |
| |
| now = time(NULL); |
| printf("COMMIT\n"); |
| printf("# Completed on %s", ctime(&now)); |
| } else { |
| /* Binary, huh? OK. */ |
| exit_error(OTHER_PROBLEM, "Binary NYI\n"); |
| } |
| |
| iptc_free(&h); |
| |
| return 1; |
| } |
| |
| /* Format: |
| * :Chain name POLICY packets bytes |
| * rule |
| */ |
| #ifdef IPTABLES_MULTI |
| int |
| iptables_save_main(int argc, char *argv[]) |
| #else |
| int |
| main(int argc, char *argv[]) |
| #endif |
| { |
| const char *tablename = NULL; |
| int c; |
| |
| program_name = "iptables-save"; |
| program_version = IPTABLES_VERSION; |
| |
| lib_dir = getenv("IPTABLES_LIB_DIR"); |
| if (!lib_dir) |
| lib_dir = IPT_LIB_DIR; |
| |
| #ifdef NO_SHARED_LIBS |
| init_extensions(); |
| #endif |
| |
| while ((c = getopt_long(argc, argv, "bcdt:", options, NULL)) != -1) { |
| switch (c) { |
| case 'b': |
| binary = 1; |
| break; |
| |
| case 'c': |
| counters = 1; |
| break; |
| |
| case 't': |
| /* Select specific table. */ |
| tablename = optarg; |
| break; |
| case 'd': |
| do_output(tablename); |
| exit(0); |
| } |
| } |
| |
| if (optind < argc) { |
| fprintf(stderr, "Unknown arguments found on commandline\n"); |
| exit(1); |
| } |
| |
| return !do_output(tablename); |
| } |