blob: dccc6c301efdc5614a03b8ebc74f6dfbca64ea94 [file] [log] [blame]
Jing Min Zhao5e35941d2006-03-20 23:41:17 -08001/*
2 * H.323 connection tracking helper
3 *
4 * Copyright (c) 2006 Jing Min Zhao <zhaojingmin@users.sourceforge.net>
5 *
6 * This source code is licensed under General Public License version 2.
7 *
8 * Based on the 'brute force' H.323 connection tracking module by
9 * Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
10 *
11 * For more information, please see http://nath323.sourceforge.net/
12 *
13 * Changes:
14 * 2006-02-01 - initial version 0.1
15 *
16 * 2006-02-20 - version 0.2
17 * 1. Changed source format to follow kernel conventions
18 * 2. Deleted some unnecessary structures
19 * 3. Minor fixes
20 *
21 * 2006-03-10 - version 0.3
22 * 1. Added support for multiple TPKTs in one packet (suggested by
23 * Patrick McHardy)
24 * 2. Avoid excessive stack usage (based on Patrick McHardy's patch)
25 * 3. Added support for non-linear skb (based on Patrick McHardy's patch)
26 * 4. Fixed missing H.245 module owner (Patrick McHardy)
27 * 5. Avoid long RAS expectation chains (Patrick McHardy)
28 * 6. Fixed incorrect __exit attribute (Patrick McHardy)
29 * 7. Eliminated unnecessary return code
30 * 8. Fixed incorrect use of NAT data from conntrack code (suggested by
31 * Patrick McHardy)
32 * 9. Fixed TTL calculation error in RCF
33 * 10. Added TTL support in RRQ
34 * 11. Better support for separate TPKT header and data
35 *
36 * 2006-03-15 - version 0.4
37 * 1. Added support for T.120 channels
38 * 2. Added parameter gkrouted_only (suggested by Patrick McHardy)
39 * 3. Splitted ASN.1 code and data (suggested by Patrick McHardy)
40 * 4. Sort ASN.1 data to avoid forwarding declarations (suggested by
41 * Patrick McHardy)
42 * 5. Reset next TPKT data length in get_tpkt_data()
43 */
44
45#include <linux/config.h>
46#include <linux/module.h>
47#include <linux/netfilter.h>
48#include <linux/ip.h>
49#include <net/tcp.h>
50#include <linux/netfilter_ipv4/ip_conntrack.h>
51#include <linux/netfilter_ipv4/ip_conntrack_core.h>
52#include <linux/netfilter_ipv4/ip_conntrack_helper.h>
53#include <linux/netfilter_ipv4/ip_conntrack_tuple.h>
54#include <linux/netfilter_ipv4/ip_conntrack_h323.h>
55#include <linux/moduleparam.h>
56
Jing Min Zhao5e35941d2006-03-20 23:41:17 -080057#if 0
58#define DEBUGP printk
59#else
60#define DEBUGP(format, args...)
61#endif
62
63/* Parameters */
Jing Min Zhaoa0b7db52006-04-06 14:15:33 -070064static unsigned int default_rrq_ttl = 300;
65module_param(default_rrq_ttl, uint, 0600);
66MODULE_PARM_DESC(default_rrq_ttl, "use this TTL if it's missing in RRQ");
67
Jing Min Zhao5e35941d2006-03-20 23:41:17 -080068static int gkrouted_only = 1;
69module_param(gkrouted_only, int, 0600);
70MODULE_PARM_DESC(gkrouted_only, "only accept calls from gatekeeper");
71
72/* Hooks for NAT */
73int (*set_h245_addr_hook) (struct sk_buff ** pskb,
74 unsigned char **data, int dataoff,
75 H245_TransportAddress * addr,
76 u_int32_t ip, u_int16_t port);
77int (*set_h225_addr_hook) (struct sk_buff ** pskb,
78 unsigned char **data, int dataoff,
79 TransportAddress * addr,
80 u_int32_t ip, u_int16_t port);
81int (*set_sig_addr_hook) (struct sk_buff ** pskb,
82 struct ip_conntrack * ct,
83 enum ip_conntrack_info ctinfo,
84 unsigned char **data,
85 TransportAddress * addr, int count);
86int (*set_ras_addr_hook) (struct sk_buff ** pskb,
87 struct ip_conntrack * ct,
88 enum ip_conntrack_info ctinfo,
89 unsigned char **data,
90 TransportAddress * addr, int count);
91int (*nat_rtp_rtcp_hook) (struct sk_buff ** pskb,
92 struct ip_conntrack * ct,
93 enum ip_conntrack_info ctinfo,
94 unsigned char **data, int dataoff,
95 H245_TransportAddress * addr,
96 u_int16_t port, u_int16_t rtp_port,
97 struct ip_conntrack_expect * rtp_exp,
98 struct ip_conntrack_expect * rtcp_exp);
99int (*nat_t120_hook) (struct sk_buff ** pskb,
100 struct ip_conntrack * ct,
101 enum ip_conntrack_info ctinfo,
102 unsigned char **data, int dataoff,
103 H245_TransportAddress * addr, u_int16_t port,
104 struct ip_conntrack_expect * exp);
105int (*nat_h245_hook) (struct sk_buff ** pskb,
106 struct ip_conntrack * ct,
107 enum ip_conntrack_info ctinfo,
108 unsigned char **data, int dataoff,
109 TransportAddress * addr, u_int16_t port,
110 struct ip_conntrack_expect * exp);
111int (*nat_q931_hook) (struct sk_buff ** pskb,
112 struct ip_conntrack * ct,
113 enum ip_conntrack_info ctinfo,
114 unsigned char **data, TransportAddress * addr, int idx,
115 u_int16_t port, struct ip_conntrack_expect * exp);
116
117
118static DEFINE_SPINLOCK(ip_h323_lock);
119static char *h323_buffer;
120
121/****************************************************************************/
122static int get_tpkt_data(struct sk_buff **pskb, struct ip_conntrack *ct,
123 enum ip_conntrack_info ctinfo,
124 unsigned char **data, int *datalen, int *dataoff)
125{
126 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
127 int dir = CTINFO2DIR(ctinfo);
128 struct tcphdr _tcph, *th;
129 int tcpdatalen;
130 int tcpdataoff;
131 unsigned char *tpkt;
132 int tpktlen;
133 int tpktoff;
134
135 /* Get TCP header */
136 th = skb_header_pointer(*pskb, (*pskb)->nh.iph->ihl * 4,
137 sizeof(_tcph), &_tcph);
138 if (th == NULL)
139 return 0;
140
141 /* Get TCP data offset */
142 tcpdataoff = (*pskb)->nh.iph->ihl * 4 + th->doff * 4;
143
144 /* Get TCP data length */
145 tcpdatalen = (*pskb)->len - tcpdataoff;
146 if (tcpdatalen <= 0) /* No TCP data */
147 goto clear_out;
148
149 if (*data == NULL) { /* first TPKT */
150 /* Get first TPKT pointer */
151 tpkt = skb_header_pointer(*pskb, tcpdataoff, tcpdatalen,
152 h323_buffer);
153 BUG_ON(tpkt == NULL);
154
155 /* Validate TPKT identifier */
156 if (tcpdatalen < 4 || tpkt[0] != 0x03 || tpkt[1] != 0) {
157 /* Netmeeting sends TPKT header and data separately */
158 if (info->tpkt_len[dir] > 0) {
159 DEBUGP("ip_ct_h323: previous packet "
160 "indicated separate TPKT data of %hu "
161 "bytes\n", info->tpkt_len[dir]);
162 if (info->tpkt_len[dir] <= tcpdatalen) {
163 /* Yes, there was a TPKT header
164 * received */
165 *data = tpkt;
166 *datalen = info->tpkt_len[dir];
167 *dataoff = 0;
168 goto out;
169 }
170
171 /* Fragmented TPKT */
172 if (net_ratelimit())
173 printk("ip_ct_h323: "
174 "fragmented TPKT\n");
175 goto clear_out;
176 }
177
178 /* It is not even a TPKT */
179 return 0;
180 }
181 tpktoff = 0;
182 } else { /* Next TPKT */
183 tpktoff = *dataoff + *datalen;
184 tcpdatalen -= tpktoff;
185 if (tcpdatalen <= 4) /* No more TPKT */
186 goto clear_out;
187 tpkt = *data + *datalen;
188
189 /* Validate TPKT identifier */
190 if (tpkt[0] != 0x03 || tpkt[1] != 0)
191 goto clear_out;
192 }
193
194 /* Validate TPKT length */
195 tpktlen = tpkt[2] * 256 + tpkt[3];
196 if (tpktlen > tcpdatalen) {
197 if (tcpdatalen == 4) { /* Separate TPKT header */
198 /* Netmeeting sends TPKT header and data separately */
199 DEBUGP("ip_ct_h323: separate TPKT header indicates "
200 "there will be TPKT data of %hu bytes\n",
201 tpktlen - 4);
202 info->tpkt_len[dir] = tpktlen - 4;
203 return 0;
204 }
205
206 if (net_ratelimit())
207 printk("ip_ct_h323: incomplete TPKT (fragmented?)\n");
208 goto clear_out;
209 }
210
211 /* This is the encapsulated data */
212 *data = tpkt + 4;
213 *datalen = tpktlen - 4;
214 *dataoff = tpktoff + 4;
215
216 out:
217 /* Clear TPKT length */
218 info->tpkt_len[dir] = 0;
219 return 1;
220
221 clear_out:
222 info->tpkt_len[dir] = 0;
223 return 0;
224}
225
226/****************************************************************************/
Jing Min Zhao51d42f52006-04-06 14:14:59 -0700227static int get_h245_addr(unsigned char *data, H245_TransportAddress * addr,
228 u_int32_t * ip, u_int16_t * port)
Jing Min Zhao5e35941d2006-03-20 23:41:17 -0800229{
230 unsigned char *p;
231
232 if (addr->choice != eH245_TransportAddress_unicastAddress ||
233 addr->unicastAddress.choice != eUnicastAddress_iPAddress)
234 return 0;
235
236 p = data + addr->unicastAddress.iPAddress.network;
237 *ip = htonl((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | (p[3]));
238 *port = (p[4] << 8) | (p[5]);
239
240 return 1;
241}
242
243/****************************************************************************/
244static int expect_rtp_rtcp(struct sk_buff **pskb, struct ip_conntrack *ct,
245 enum ip_conntrack_info ctinfo,
246 unsigned char **data, int dataoff,
247 H245_TransportAddress * addr)
248{
249 int dir = CTINFO2DIR(ctinfo);
250 int ret = 0;
251 u_int32_t ip;
252 u_int16_t port;
253 u_int16_t rtp_port;
254 struct ip_conntrack_expect *rtp_exp;
255 struct ip_conntrack_expect *rtcp_exp;
256
257 /* Read RTP or RTCP address */
258 if (!get_h245_addr(*data, addr, &ip, &port) ||
259 ip != ct->tuplehash[dir].tuple.src.ip || port == 0)
260 return 0;
261
262 /* RTP port is even */
263 rtp_port = port & (~1);
264
265 /* Create expect for RTP */
266 if ((rtp_exp = ip_conntrack_expect_alloc(ct)) == NULL)
267 return -1;
268 rtp_exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
269 rtp_exp->tuple.src.u.udp.port = 0;
270 rtp_exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
271 rtp_exp->tuple.dst.u.udp.port = htons(rtp_port);
272 rtp_exp->tuple.dst.protonum = IPPROTO_UDP;
273 rtp_exp->mask.src.ip = 0xFFFFFFFF;
274 rtp_exp->mask.src.u.udp.port = 0;
275 rtp_exp->mask.dst.ip = 0xFFFFFFFF;
276 rtp_exp->mask.dst.u.udp.port = 0xFFFF;
277 rtp_exp->mask.dst.protonum = 0xFF;
278 rtp_exp->flags = 0;
279
280 /* Create expect for RTCP */
281 if ((rtcp_exp = ip_conntrack_expect_alloc(ct)) == NULL) {
282 ip_conntrack_expect_put(rtp_exp);
283 return -1;
284 }
285 rtcp_exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
286 rtcp_exp->tuple.src.u.udp.port = 0;
287 rtcp_exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
288 rtcp_exp->tuple.dst.u.udp.port = htons(rtp_port + 1);
289 rtcp_exp->tuple.dst.protonum = IPPROTO_UDP;
290 rtcp_exp->mask.src.ip = 0xFFFFFFFF;
291 rtcp_exp->mask.src.u.udp.port = 0;
292 rtcp_exp->mask.dst.ip = 0xFFFFFFFF;
293 rtcp_exp->mask.dst.u.udp.port = 0xFFFF;
294 rtcp_exp->mask.dst.protonum = 0xFF;
295 rtcp_exp->flags = 0;
296
297 if (ct->tuplehash[dir].tuple.src.ip !=
298 ct->tuplehash[!dir].tuple.dst.ip && nat_rtp_rtcp_hook) {
299 /* NAT needed */
300 ret = nat_rtp_rtcp_hook(pskb, ct, ctinfo, data, dataoff,
301 addr, port, rtp_port, rtp_exp,
302 rtcp_exp);
303 } else { /* Conntrack only */
304 rtp_exp->expectfn = NULL;
305 rtcp_exp->expectfn = NULL;
306
307 if (ip_conntrack_expect_related(rtp_exp) == 0) {
308 if (ip_conntrack_expect_related(rtcp_exp) == 0) {
309 DEBUGP("ip_ct_h323: expect RTP "
310 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
311 NIPQUAD(rtp_exp->tuple.src.ip),
312 ntohs(rtp_exp->tuple.src.u.udp.port),
313 NIPQUAD(rtp_exp->tuple.dst.ip),
314 ntohs(rtp_exp->tuple.dst.u.udp.port));
315 DEBUGP("ip_ct_h323: expect RTCP "
316 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
317 NIPQUAD(rtcp_exp->tuple.src.ip),
318 ntohs(rtcp_exp->tuple.src.u.udp.port),
319 NIPQUAD(rtcp_exp->tuple.dst.ip),
320 ntohs(rtcp_exp->tuple.dst.u.udp.port));
321 } else {
322 ip_conntrack_unexpect_related(rtp_exp);
323 ret = -1;
324 }
325 } else
326 ret = -1;
327 }
328
329 ip_conntrack_expect_put(rtp_exp);
330 ip_conntrack_expect_put(rtcp_exp);
331
332 return ret;
333}
334
335/****************************************************************************/
336static int expect_t120(struct sk_buff **pskb,
337 struct ip_conntrack *ct,
338 enum ip_conntrack_info ctinfo,
339 unsigned char **data, int dataoff,
340 H245_TransportAddress * addr)
341{
342 int dir = CTINFO2DIR(ctinfo);
343 int ret = 0;
344 u_int32_t ip;
345 u_int16_t port;
346 struct ip_conntrack_expect *exp = NULL;
347
348 /* Read T.120 address */
349 if (!get_h245_addr(*data, addr, &ip, &port) ||
350 ip != ct->tuplehash[dir].tuple.src.ip || port == 0)
351 return 0;
352
353 /* Create expect for T.120 connections */
354 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
355 return -1;
356 exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
357 exp->tuple.src.u.tcp.port = 0;
358 exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
359 exp->tuple.dst.u.tcp.port = htons(port);
360 exp->tuple.dst.protonum = IPPROTO_TCP;
361 exp->mask.src.ip = 0xFFFFFFFF;
362 exp->mask.src.u.tcp.port = 0;
363 exp->mask.dst.ip = 0xFFFFFFFF;
364 exp->mask.dst.u.tcp.port = 0xFFFF;
365 exp->mask.dst.protonum = 0xFF;
366 exp->flags = IP_CT_EXPECT_PERMANENT; /* Accept multiple channels */
367
368 if (ct->tuplehash[dir].tuple.src.ip !=
369 ct->tuplehash[!dir].tuple.dst.ip && nat_t120_hook) {
370 /* NAT needed */
371 ret = nat_t120_hook(pskb, ct, ctinfo, data, dataoff, addr,
372 port, exp);
373 } else { /* Conntrack only */
374 exp->expectfn = NULL;
375 if (ip_conntrack_expect_related(exp) == 0) {
376 DEBUGP("ip_ct_h323: expect T.120 "
377 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
378 NIPQUAD(exp->tuple.src.ip),
379 ntohs(exp->tuple.src.u.tcp.port),
380 NIPQUAD(exp->tuple.dst.ip),
381 ntohs(exp->tuple.dst.u.tcp.port));
382 } else
383 ret = -1;
384 }
385
386 ip_conntrack_expect_put(exp);
387
388 return ret;
389}
390
391/****************************************************************************/
392static int process_h245_channel(struct sk_buff **pskb,
393 struct ip_conntrack *ct,
394 enum ip_conntrack_info ctinfo,
395 unsigned char **data, int dataoff,
396 H2250LogicalChannelParameters * channel)
397{
398 int ret;
399
400 if (channel->options & eH2250LogicalChannelParameters_mediaChannel) {
401 /* RTP */
402 ret = expect_rtp_rtcp(pskb, ct, ctinfo, data, dataoff,
403 &channel->mediaChannel);
404 if (ret < 0)
405 return -1;
406 }
407
408 if (channel->
409 options & eH2250LogicalChannelParameters_mediaControlChannel) {
410 /* RTCP */
411 ret = expect_rtp_rtcp(pskb, ct, ctinfo, data, dataoff,
412 &channel->mediaControlChannel);
413 if (ret < 0)
414 return -1;
415 }
416
417 return 0;
418}
419
420/****************************************************************************/
421static int process_olc(struct sk_buff **pskb, struct ip_conntrack *ct,
422 enum ip_conntrack_info ctinfo,
423 unsigned char **data, int dataoff,
424 OpenLogicalChannel * olc)
425{
426 int ret;
427
428 DEBUGP("ip_ct_h323: OpenLogicalChannel\n");
429
430 if (olc->forwardLogicalChannelParameters.multiplexParameters.choice ==
431 eOpenLogicalChannel_forwardLogicalChannelParameters_multiplexParameters_h2250LogicalChannelParameters)
432 {
433 ret = process_h245_channel(pskb, ct, ctinfo, data, dataoff,
434 &olc->
435 forwardLogicalChannelParameters.
436 multiplexParameters.
437 h2250LogicalChannelParameters);
438 if (ret < 0)
439 return -1;
440 }
441
442 if ((olc->options &
443 eOpenLogicalChannel_reverseLogicalChannelParameters) &&
444 (olc->reverseLogicalChannelParameters.options &
445 eOpenLogicalChannel_reverseLogicalChannelParameters_multiplexParameters)
446 && (olc->reverseLogicalChannelParameters.multiplexParameters.
447 choice ==
448 eOpenLogicalChannel_reverseLogicalChannelParameters_multiplexParameters_h2250LogicalChannelParameters))
449 {
450 ret =
451 process_h245_channel(pskb, ct, ctinfo, data, dataoff,
452 &olc->
453 reverseLogicalChannelParameters.
454 multiplexParameters.
455 h2250LogicalChannelParameters);
456 if (ret < 0)
457 return -1;
458 }
459
460 if ((olc->options & eOpenLogicalChannel_separateStack) &&
461 olc->forwardLogicalChannelParameters.dataType.choice ==
462 eDataType_data &&
463 olc->forwardLogicalChannelParameters.dataType.data.application.
464 choice == eDataApplicationCapability_application_t120 &&
465 olc->forwardLogicalChannelParameters.dataType.data.application.
466 t120.choice == eDataProtocolCapability_separateLANStack &&
467 olc->separateStack.networkAddress.choice ==
468 eNetworkAccessParameters_networkAddress_localAreaAddress) {
469 ret = expect_t120(pskb, ct, ctinfo, data, dataoff,
470 &olc->separateStack.networkAddress.
471 localAreaAddress);
472 if (ret < 0)
473 return -1;
474 }
475
476 return 0;
477}
478
479/****************************************************************************/
480static int process_olca(struct sk_buff **pskb, struct ip_conntrack *ct,
481 enum ip_conntrack_info ctinfo,
482 unsigned char **data, int dataoff,
483 OpenLogicalChannelAck * olca)
484{
485 H2250LogicalChannelAckParameters *ack;
486 int ret;
487
488 DEBUGP("ip_ct_h323: OpenLogicalChannelAck\n");
489
490 if ((olca->options &
491 eOpenLogicalChannelAck_reverseLogicalChannelParameters) &&
492 (olca->reverseLogicalChannelParameters.options &
493 eOpenLogicalChannelAck_reverseLogicalChannelParameters_multiplexParameters)
494 && (olca->reverseLogicalChannelParameters.multiplexParameters.
495 choice ==
496 eOpenLogicalChannelAck_reverseLogicalChannelParameters_multiplexParameters_h2250LogicalChannelParameters))
497 {
498 ret = process_h245_channel(pskb, ct, ctinfo, data, dataoff,
499 &olca->
500 reverseLogicalChannelParameters.
501 multiplexParameters.
502 h2250LogicalChannelParameters);
503 if (ret < 0)
504 return -1;
505 }
506
507 if ((olca->options &
508 eOpenLogicalChannelAck_forwardMultiplexAckParameters) &&
509 (olca->forwardMultiplexAckParameters.choice ==
510 eOpenLogicalChannelAck_forwardMultiplexAckParameters_h2250LogicalChannelAckParameters))
511 {
512 ack = &olca->forwardMultiplexAckParameters.
513 h2250LogicalChannelAckParameters;
514 if (ack->options &
515 eH2250LogicalChannelAckParameters_mediaChannel) {
516 /* RTP */
517 ret = expect_rtp_rtcp(pskb, ct, ctinfo, data, dataoff,
518 &ack->mediaChannel);
519 if (ret < 0)
520 return -1;
521 }
522
523 if (ack->options &
524 eH2250LogicalChannelAckParameters_mediaControlChannel) {
525 /* RTCP */
526 ret = expect_rtp_rtcp(pskb, ct, ctinfo, data, dataoff,
527 &ack->mediaControlChannel);
528 if (ret < 0)
529 return -1;
530 }
531 }
532
533 return 0;
534}
535
536/****************************************************************************/
537static int process_h245(struct sk_buff **pskb, struct ip_conntrack *ct,
538 enum ip_conntrack_info ctinfo,
539 unsigned char **data, int dataoff,
540 MultimediaSystemControlMessage * mscm)
541{
542 switch (mscm->choice) {
543 case eMultimediaSystemControlMessage_request:
544 if (mscm->request.choice ==
545 eRequestMessage_openLogicalChannel) {
546 return process_olc(pskb, ct, ctinfo, data, dataoff,
547 &mscm->request.openLogicalChannel);
548 }
549 DEBUGP("ip_ct_h323: H.245 Request %d\n",
550 mscm->request.choice);
551 break;
552 case eMultimediaSystemControlMessage_response:
553 if (mscm->response.choice ==
554 eResponseMessage_openLogicalChannelAck) {
555 return process_olca(pskb, ct, ctinfo, data, dataoff,
556 &mscm->response.
557 openLogicalChannelAck);
558 }
559 DEBUGP("ip_ct_h323: H.245 Response %d\n",
560 mscm->response.choice);
561 break;
562 default:
563 DEBUGP("ip_ct_h323: H.245 signal %d\n", mscm->choice);
564 break;
565 }
566
567 return 0;
568}
569
570/****************************************************************************/
571static int h245_help(struct sk_buff **pskb, struct ip_conntrack *ct,
572 enum ip_conntrack_info ctinfo)
573{
574 static MultimediaSystemControlMessage mscm;
575 unsigned char *data = NULL;
576 int datalen;
577 int dataoff;
578 int ret;
579
580 /* Until there's been traffic both ways, don't look in packets. */
581 if (ctinfo != IP_CT_ESTABLISHED
582 && ctinfo != IP_CT_ESTABLISHED + IP_CT_IS_REPLY) {
583 return NF_ACCEPT;
584 }
585 DEBUGP("ip_ct_h245: skblen = %u\n", (*pskb)->len);
586
587 spin_lock_bh(&ip_h323_lock);
588
589 /* Process each TPKT */
590 while (get_tpkt_data(pskb, ct, ctinfo, &data, &datalen, &dataoff)) {
591 DEBUGP("ip_ct_h245: TPKT %u.%u.%u.%u->%u.%u.%u.%u, len=%d\n",
592 NIPQUAD((*pskb)->nh.iph->saddr),
593 NIPQUAD((*pskb)->nh.iph->daddr), datalen);
594
595 /* Decode H.245 signal */
596 ret = DecodeMultimediaSystemControlMessage(data, datalen,
597 &mscm);
598 if (ret < 0) {
599 if (net_ratelimit())
600 printk("ip_ct_h245: decoding error: %s\n",
601 ret == H323_ERROR_BOUND ?
602 "out of bound" : "out of range");
603 /* We don't drop when decoding error */
604 break;
605 }
606
607 /* Process H.245 signal */
608 if (process_h245(pskb, ct, ctinfo, &data, dataoff, &mscm) < 0)
609 goto drop;
610 }
611
612 spin_unlock_bh(&ip_h323_lock);
613 return NF_ACCEPT;
614
615 drop:
616 spin_unlock_bh(&ip_h323_lock);
617 if (net_ratelimit())
618 printk("ip_ct_h245: packet dropped\n");
619 return NF_DROP;
620}
621
622/****************************************************************************/
623static struct ip_conntrack_helper ip_conntrack_helper_h245 = {
624 .name = "H.245",
625 .me = THIS_MODULE,
626 .max_expected = H323_RTP_CHANNEL_MAX * 4 + 2 /* T.120 */ ,
627 .timeout = 240,
628 .tuple = {.dst = {.protonum = IPPROTO_TCP}},
629 .mask = {.src = {.u = {0xFFFF}},
630 .dst = {.protonum = 0xFF}},
631 .help = h245_help
632};
633
634/****************************************************************************/
635void ip_conntrack_h245_expect(struct ip_conntrack *new,
636 struct ip_conntrack_expect *this)
637{
638 write_lock_bh(&ip_conntrack_lock);
639 new->helper = &ip_conntrack_helper_h245;
640 write_unlock_bh(&ip_conntrack_lock);
641}
642
643/****************************************************************************/
Patrick McHardy6a534ee2006-03-22 13:57:25 -0800644int get_h225_addr(unsigned char *data, TransportAddress * addr,
645 u_int32_t * ip, u_int16_t * port)
Jing Min Zhao5e35941d2006-03-20 23:41:17 -0800646{
647 unsigned char *p;
648
649 if (addr->choice != eTransportAddress_ipAddress)
650 return 0;
651
652 p = data + addr->ipAddress.ip;
653 *ip = htonl((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | (p[3]));
654 *port = (p[4] << 8) | (p[5]);
655
656 return 1;
657}
658
659/****************************************************************************/
660static int expect_h245(struct sk_buff **pskb, struct ip_conntrack *ct,
661 enum ip_conntrack_info ctinfo,
662 unsigned char **data, int dataoff,
663 TransportAddress * addr)
664{
665 int dir = CTINFO2DIR(ctinfo);
666 int ret = 0;
667 u_int32_t ip;
668 u_int16_t port;
669 struct ip_conntrack_expect *exp = NULL;
670
671 /* Read h245Address */
672 if (!get_h225_addr(*data, addr, &ip, &port) ||
673 ip != ct->tuplehash[dir].tuple.src.ip || port == 0)
674 return 0;
675
676 /* Create expect for h245 connection */
677 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
678 return -1;
679 exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
680 exp->tuple.src.u.tcp.port = 0;
681 exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
682 exp->tuple.dst.u.tcp.port = htons(port);
683 exp->tuple.dst.protonum = IPPROTO_TCP;
684 exp->mask.src.ip = 0xFFFFFFFF;
685 exp->mask.src.u.tcp.port = 0;
686 exp->mask.dst.ip = 0xFFFFFFFF;
687 exp->mask.dst.u.tcp.port = 0xFFFF;
688 exp->mask.dst.protonum = 0xFF;
689 exp->flags = 0;
690
691 if (ct->tuplehash[dir].tuple.src.ip !=
692 ct->tuplehash[!dir].tuple.dst.ip && nat_h245_hook) {
693 /* NAT needed */
694 ret = nat_h245_hook(pskb, ct, ctinfo, data, dataoff, addr,
695 port, exp);
696 } else { /* Conntrack only */
697 exp->expectfn = ip_conntrack_h245_expect;
698
699 if (ip_conntrack_expect_related(exp) == 0) {
700 DEBUGP("ip_ct_q931: expect H.245 "
701 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
702 NIPQUAD(exp->tuple.src.ip),
703 ntohs(exp->tuple.src.u.tcp.port),
704 NIPQUAD(exp->tuple.dst.ip),
705 ntohs(exp->tuple.dst.u.tcp.port));
706 } else
707 ret = -1;
708 }
709
710 ip_conntrack_expect_put(exp);
711
712 return ret;
713}
714
715/****************************************************************************/
716static int process_setup(struct sk_buff **pskb, struct ip_conntrack *ct,
717 enum ip_conntrack_info ctinfo,
718 unsigned char **data, int dataoff,
719 Setup_UUIE * setup)
720{
721 int dir = CTINFO2DIR(ctinfo);
722 int ret;
723 int i;
724 u_int32_t ip;
725 u_int16_t port;
726
727 DEBUGP("ip_ct_q931: Setup\n");
728
729 if (setup->options & eSetup_UUIE_h245Address) {
730 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
731 &setup->h245Address);
732 if (ret < 0)
733 return -1;
734 }
735
736 if ((setup->options & eSetup_UUIE_destCallSignalAddress) &&
737 (set_h225_addr_hook) &&
738 get_h225_addr(*data, &setup->destCallSignalAddress, &ip, &port) &&
739 ip != ct->tuplehash[!dir].tuple.src.ip) {
740 DEBUGP("ip_ct_q931: set destCallSignalAddress "
741 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
742 NIPQUAD(ip), port,
743 NIPQUAD(ct->tuplehash[!dir].tuple.src.ip),
744 ntohs(ct->tuplehash[!dir].tuple.src.u.tcp.port));
745 ret = set_h225_addr_hook(pskb, data, dataoff,
746 &setup->destCallSignalAddress,
747 ct->tuplehash[!dir].tuple.src.ip,
748 ntohs(ct->tuplehash[!dir].tuple.src.
749 u.tcp.port));
750 if (ret < 0)
751 return -1;
752 }
753
754 if ((setup->options & eSetup_UUIE_sourceCallSignalAddress) &&
755 (set_h225_addr_hook) &&
756 get_h225_addr(*data, &setup->sourceCallSignalAddress, &ip, &port)
757 && ip != ct->tuplehash[!dir].tuple.dst.ip) {
758 DEBUGP("ip_ct_q931: set sourceCallSignalAddress "
759 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
760 NIPQUAD(ip), port,
761 NIPQUAD(ct->tuplehash[!dir].tuple.dst.ip),
762 ntohs(ct->tuplehash[!dir].tuple.dst.u.tcp.port));
763 ret = set_h225_addr_hook(pskb, data, dataoff,
764 &setup->sourceCallSignalAddress,
765 ct->tuplehash[!dir].tuple.dst.ip,
766 ntohs(ct->tuplehash[!dir].tuple.dst.
767 u.tcp.port));
768 if (ret < 0)
769 return -1;
770 }
771
772 if (setup->options & eSetup_UUIE_fastStart) {
773 for (i = 0; i < setup->fastStart.count; i++) {
774 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
775 &setup->fastStart.item[i]);
776 if (ret < 0)
777 return -1;
778 }
779 }
780
781 return 0;
782}
783
784/****************************************************************************/
785static int process_callproceeding(struct sk_buff **pskb,
786 struct ip_conntrack *ct,
787 enum ip_conntrack_info ctinfo,
788 unsigned char **data, int dataoff,
789 CallProceeding_UUIE * callproc)
790{
791 int ret;
792 int i;
793
794 DEBUGP("ip_ct_q931: CallProceeding\n");
795
796 if (callproc->options & eCallProceeding_UUIE_h245Address) {
797 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
798 &callproc->h245Address);
799 if (ret < 0)
800 return -1;
801 }
802
803 if (callproc->options & eCallProceeding_UUIE_fastStart) {
804 for (i = 0; i < callproc->fastStart.count; i++) {
805 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
806 &callproc->fastStart.item[i]);
807 if (ret < 0)
808 return -1;
809 }
810 }
811
812 return 0;
813}
814
815/****************************************************************************/
816static int process_connect(struct sk_buff **pskb, struct ip_conntrack *ct,
817 enum ip_conntrack_info ctinfo,
818 unsigned char **data, int dataoff,
819 Connect_UUIE * connect)
820{
821 int ret;
822 int i;
823
824 DEBUGP("ip_ct_q931: Connect\n");
825
826 if (connect->options & eConnect_UUIE_h245Address) {
827 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
828 &connect->h245Address);
829 if (ret < 0)
830 return -1;
831 }
832
833 if (connect->options & eConnect_UUIE_fastStart) {
834 for (i = 0; i < connect->fastStart.count; i++) {
835 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
836 &connect->fastStart.item[i]);
837 if (ret < 0)
838 return -1;
839 }
840 }
841
842 return 0;
843}
844
845/****************************************************************************/
846static int process_alerting(struct sk_buff **pskb, struct ip_conntrack *ct,
847 enum ip_conntrack_info ctinfo,
848 unsigned char **data, int dataoff,
849 Alerting_UUIE * alert)
850{
851 int ret;
852 int i;
853
854 DEBUGP("ip_ct_q931: Alerting\n");
855
856 if (alert->options & eAlerting_UUIE_h245Address) {
857 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
858 &alert->h245Address);
859 if (ret < 0)
860 return -1;
861 }
862
863 if (alert->options & eAlerting_UUIE_fastStart) {
864 for (i = 0; i < alert->fastStart.count; i++) {
865 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
866 &alert->fastStart.item[i]);
867 if (ret < 0)
868 return -1;
869 }
870 }
871
872 return 0;
873}
874
875/****************************************************************************/
876static int process_information(struct sk_buff **pskb,
877 struct ip_conntrack *ct,
878 enum ip_conntrack_info ctinfo,
879 unsigned char **data, int dataoff,
880 Information_UUIE * info)
881{
882 int ret;
883 int i;
884
885 DEBUGP("ip_ct_q931: Information\n");
886
887 if (info->options & eInformation_UUIE_fastStart) {
888 for (i = 0; i < info->fastStart.count; i++) {
889 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
890 &info->fastStart.item[i]);
891 if (ret < 0)
892 return -1;
893 }
894 }
895
896 return 0;
897}
898
899/****************************************************************************/
900static int process_facility(struct sk_buff **pskb, struct ip_conntrack *ct,
901 enum ip_conntrack_info ctinfo,
902 unsigned char **data, int dataoff,
903 Facility_UUIE * facility)
904{
905 int ret;
906 int i;
907
908 DEBUGP("ip_ct_q931: Facility\n");
909
910 if (facility->options & eFacility_UUIE_h245Address) {
911 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
912 &facility->h245Address);
913 if (ret < 0)
914 return -1;
915 }
916
917 if (facility->options & eFacility_UUIE_fastStart) {
918 for (i = 0; i < facility->fastStart.count; i++) {
919 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
920 &facility->fastStart.item[i]);
921 if (ret < 0)
922 return -1;
923 }
924 }
925
926 return 0;
927}
928
929/****************************************************************************/
930static int process_progress(struct sk_buff **pskb, struct ip_conntrack *ct,
931 enum ip_conntrack_info ctinfo,
932 unsigned char **data, int dataoff,
933 Progress_UUIE * progress)
934{
935 int ret;
936 int i;
937
938 DEBUGP("ip_ct_q931: Progress\n");
939
940 if (progress->options & eProgress_UUIE_h245Address) {
941 ret = expect_h245(pskb, ct, ctinfo, data, dataoff,
942 &progress->h245Address);
943 if (ret < 0)
944 return -1;
945 }
946
947 if (progress->options & eProgress_UUIE_fastStart) {
948 for (i = 0; i < progress->fastStart.count; i++) {
949 ret = process_olc(pskb, ct, ctinfo, data, dataoff,
950 &progress->fastStart.item[i]);
951 if (ret < 0)
952 return -1;
953 }
954 }
955
956 return 0;
957}
958
959/****************************************************************************/
960static int process_q931(struct sk_buff **pskb, struct ip_conntrack *ct,
961 enum ip_conntrack_info ctinfo,
962 unsigned char **data, int dataoff, Q931 * q931)
963{
964 H323_UU_PDU *pdu = &q931->UUIE.h323_uu_pdu;
965 int i;
966 int ret = 0;
967
968 switch (pdu->h323_message_body.choice) {
969 case eH323_UU_PDU_h323_message_body_setup:
970 ret = process_setup(pskb, ct, ctinfo, data, dataoff,
971 &pdu->h323_message_body.setup);
972 break;
973 case eH323_UU_PDU_h323_message_body_callProceeding:
974 ret = process_callproceeding(pskb, ct, ctinfo, data, dataoff,
975 &pdu->h323_message_body.
976 callProceeding);
977 break;
978 case eH323_UU_PDU_h323_message_body_connect:
979 ret = process_connect(pskb, ct, ctinfo, data, dataoff,
980 &pdu->h323_message_body.connect);
981 break;
982 case eH323_UU_PDU_h323_message_body_alerting:
983 ret = process_alerting(pskb, ct, ctinfo, data, dataoff,
984 &pdu->h323_message_body.alerting);
985 break;
986 case eH323_UU_PDU_h323_message_body_information:
987 ret = process_information(pskb, ct, ctinfo, data, dataoff,
988 &pdu->h323_message_body.
989 information);
990 break;
991 case eH323_UU_PDU_h323_message_body_facility:
992 ret = process_facility(pskb, ct, ctinfo, data, dataoff,
993 &pdu->h323_message_body.facility);
994 break;
995 case eH323_UU_PDU_h323_message_body_progress:
996 ret = process_progress(pskb, ct, ctinfo, data, dataoff,
997 &pdu->h323_message_body.progress);
998 break;
999 default:
1000 DEBUGP("ip_ct_q931: Q.931 signal %d\n",
1001 pdu->h323_message_body.choice);
1002 break;
1003 }
1004
1005 if (ret < 0)
1006 return -1;
1007
1008 if (pdu->options & eH323_UU_PDU_h245Control) {
1009 for (i = 0; i < pdu->h245Control.count; i++) {
1010 ret = process_h245(pskb, ct, ctinfo, data, dataoff,
1011 &pdu->h245Control.item[i]);
1012 if (ret < 0)
1013 return -1;
1014 }
1015 }
1016
1017 return 0;
1018}
1019
1020/****************************************************************************/
1021static int q931_help(struct sk_buff **pskb, struct ip_conntrack *ct,
1022 enum ip_conntrack_info ctinfo)
1023{
1024 static Q931 q931;
1025 unsigned char *data = NULL;
1026 int datalen;
1027 int dataoff;
1028 int ret;
1029
1030 /* Until there's been traffic both ways, don't look in packets. */
1031 if (ctinfo != IP_CT_ESTABLISHED
1032 && ctinfo != IP_CT_ESTABLISHED + IP_CT_IS_REPLY) {
1033 return NF_ACCEPT;
1034 }
1035 DEBUGP("ip_ct_q931: skblen = %u\n", (*pskb)->len);
1036
1037 spin_lock_bh(&ip_h323_lock);
1038
1039 /* Process each TPKT */
1040 while (get_tpkt_data(pskb, ct, ctinfo, &data, &datalen, &dataoff)) {
1041 DEBUGP("ip_ct_q931: TPKT %u.%u.%u.%u->%u.%u.%u.%u, len=%d\n",
1042 NIPQUAD((*pskb)->nh.iph->saddr),
1043 NIPQUAD((*pskb)->nh.iph->daddr), datalen);
1044
1045 /* Decode Q.931 signal */
1046 ret = DecodeQ931(data, datalen, &q931);
1047 if (ret < 0) {
1048 if (net_ratelimit())
1049 printk("ip_ct_q931: decoding error: %s\n",
1050 ret == H323_ERROR_BOUND ?
1051 "out of bound" : "out of range");
1052 /* We don't drop when decoding error */
1053 break;
1054 }
1055
1056 /* Process Q.931 signal */
1057 if (process_q931(pskb, ct, ctinfo, &data, dataoff, &q931) < 0)
1058 goto drop;
1059 }
1060
1061 spin_unlock_bh(&ip_h323_lock);
1062 return NF_ACCEPT;
1063
1064 drop:
1065 spin_unlock_bh(&ip_h323_lock);
1066 if (net_ratelimit())
1067 printk("ip_ct_q931: packet dropped\n");
1068 return NF_DROP;
1069}
1070
1071/****************************************************************************/
1072static struct ip_conntrack_helper ip_conntrack_helper_q931 = {
1073 .name = "Q.931",
1074 .me = THIS_MODULE,
1075 .max_expected = H323_RTP_CHANNEL_MAX * 4 + 4 /* T.120 and H.245 */ ,
1076 .timeout = 240,
1077 .tuple = {.src = {.u = {__constant_htons(Q931_PORT)}},
1078 .dst = {.protonum = IPPROTO_TCP}},
1079 .mask = {.src = {.u = {0xFFFF}},
1080 .dst = {.protonum = 0xFF}},
1081 .help = q931_help
1082};
1083
1084/****************************************************************************/
1085void ip_conntrack_q931_expect(struct ip_conntrack *new,
1086 struct ip_conntrack_expect *this)
1087{
1088 write_lock_bh(&ip_conntrack_lock);
1089 new->helper = &ip_conntrack_helper_q931;
1090 write_unlock_bh(&ip_conntrack_lock);
1091}
1092
1093/****************************************************************************/
1094static unsigned char *get_udp_data(struct sk_buff **pskb, int *datalen)
1095{
1096 struct udphdr _uh, *uh;
1097 int dataoff;
1098
1099 uh = skb_header_pointer(*pskb, (*pskb)->nh.iph->ihl * 4, sizeof(_uh),
1100 &_uh);
1101 if (uh == NULL)
1102 return NULL;
1103 dataoff = (*pskb)->nh.iph->ihl * 4 + sizeof(_uh);
1104 if (dataoff >= (*pskb)->len)
1105 return NULL;
1106 *datalen = (*pskb)->len - dataoff;
1107 return skb_header_pointer(*pskb, dataoff, *datalen, h323_buffer);
1108}
1109
1110/****************************************************************************/
1111static struct ip_conntrack_expect *find_expect(struct ip_conntrack *ct,
1112 u_int32_t ip, u_int16_t port)
1113{
1114 struct ip_conntrack_expect *exp;
1115 struct ip_conntrack_tuple tuple;
1116
1117 tuple.src.ip = 0;
1118 tuple.src.u.tcp.port = 0;
1119 tuple.dst.ip = ip;
1120 tuple.dst.u.tcp.port = htons(port);
1121 tuple.dst.protonum = IPPROTO_TCP;
1122
1123 exp = __ip_conntrack_expect_find(&tuple);
1124 if (exp->master == ct)
1125 return exp;
1126 return NULL;
1127}
1128
1129/****************************************************************************/
1130static int set_expect_timeout(struct ip_conntrack_expect *exp,
1131 unsigned timeout)
1132{
1133 if (!exp || !del_timer(&exp->timeout))
1134 return 0;
1135
1136 exp->timeout.expires = jiffies + timeout * HZ;
1137 add_timer(&exp->timeout);
1138
1139 return 1;
1140}
1141
1142/****************************************************************************/
1143static int expect_q931(struct sk_buff **pskb, struct ip_conntrack *ct,
1144 enum ip_conntrack_info ctinfo,
1145 unsigned char **data,
1146 TransportAddress * addr, int count)
1147{
1148 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
1149 int dir = CTINFO2DIR(ctinfo);
1150 int ret = 0;
1151 int i;
1152 u_int32_t ip;
1153 u_int16_t port;
1154 struct ip_conntrack_expect *exp;
1155
1156 /* Look for the first related address */
1157 for (i = 0; i < count; i++) {
1158 if (get_h225_addr(*data, &addr[i], &ip, &port) &&
1159 ip == ct->tuplehash[dir].tuple.src.ip && port != 0)
1160 break;
1161 }
1162
1163 if (i >= count) /* Not found */
1164 return 0;
1165
1166 /* Create expect for Q.931 */
1167 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
1168 return -1;
1169 exp->tuple.src.ip = gkrouted_only ? /* only accept calls from GK? */
1170 ct->tuplehash[!dir].tuple.src.ip : 0;
1171 exp->tuple.src.u.tcp.port = 0;
1172 exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
1173 exp->tuple.dst.u.tcp.port = htons(port);
1174 exp->tuple.dst.protonum = IPPROTO_TCP;
1175 exp->mask.src.ip = gkrouted_only ? 0xFFFFFFFF : 0;
1176 exp->mask.src.u.tcp.port = 0;
1177 exp->mask.dst.ip = 0xFFFFFFFF;
1178 exp->mask.dst.u.tcp.port = 0xFFFF;
1179 exp->mask.dst.protonum = 0xFF;
1180 exp->flags = IP_CT_EXPECT_PERMANENT; /* Accept multiple calls */
1181
1182 if (nat_q931_hook) { /* Need NAT */
1183 ret = nat_q931_hook(pskb, ct, ctinfo, data, addr, i,
1184 port, exp);
1185 } else { /* Conntrack only */
1186 exp->expectfn = ip_conntrack_q931_expect;
1187
1188 if (ip_conntrack_expect_related(exp) == 0) {
1189 DEBUGP("ip_ct_ras: expect Q.931 "
1190 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
1191 NIPQUAD(exp->tuple.src.ip),
1192 ntohs(exp->tuple.src.u.tcp.port),
1193 NIPQUAD(exp->tuple.dst.ip),
1194 ntohs(exp->tuple.dst.u.tcp.port));
1195
1196 /* Save port for looking up expect in processing RCF */
1197 info->sig_port[dir] = port;
1198 } else
1199 ret = -1;
1200 }
1201
1202 ip_conntrack_expect_put(exp);
1203
1204 return ret;
1205}
1206
1207/****************************************************************************/
1208static int process_grq(struct sk_buff **pskb, struct ip_conntrack *ct,
1209 enum ip_conntrack_info ctinfo,
1210 unsigned char **data, GatekeeperRequest * grq)
1211{
1212 DEBUGP("ip_ct_ras: GRQ\n");
1213
1214 if (set_ras_addr_hook) /* NATed */
1215 return set_ras_addr_hook(pskb, ct, ctinfo, data,
1216 &grq->rasAddress, 1);
1217 return 0;
1218}
1219
1220/* Declare before using */
1221static void ip_conntrack_ras_expect(struct ip_conntrack *new,
1222 struct ip_conntrack_expect *this);
1223
1224/****************************************************************************/
1225static int process_gcf(struct sk_buff **pskb, struct ip_conntrack *ct,
1226 enum ip_conntrack_info ctinfo,
1227 unsigned char **data, GatekeeperConfirm * gcf)
1228{
1229 int dir = CTINFO2DIR(ctinfo);
1230 int ret = 0;
1231 u_int32_t ip;
1232 u_int16_t port;
1233 struct ip_conntrack_expect *exp;
1234
1235 DEBUGP("ip_ct_ras: GCF\n");
1236
1237 if (!get_h225_addr(*data, &gcf->rasAddress, &ip, &port))
1238 return 0;
1239
1240 /* Registration port is the same as discovery port */
1241 if (ip == ct->tuplehash[dir].tuple.src.ip &&
1242 port == ntohs(ct->tuplehash[dir].tuple.src.u.udp.port))
1243 return 0;
1244
1245 /* Avoid RAS expectation loops. A GCF is never expected. */
1246 if (test_bit(IPS_EXPECTED_BIT, &ct->status))
1247 return 0;
1248
1249 /* Need new expect */
1250 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
1251 return -1;
1252 exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
1253 exp->tuple.src.u.tcp.port = 0;
1254 exp->tuple.dst.ip = ip;
1255 exp->tuple.dst.u.tcp.port = htons(port);
1256 exp->tuple.dst.protonum = IPPROTO_UDP;
1257 exp->mask.src.ip = 0xFFFFFFFF;
1258 exp->mask.src.u.tcp.port = 0;
1259 exp->mask.dst.ip = 0xFFFFFFFF;
1260 exp->mask.dst.u.tcp.port = 0xFFFF;
1261 exp->mask.dst.protonum = 0xFF;
1262 exp->flags = 0;
1263 exp->expectfn = ip_conntrack_ras_expect;
1264 if (ip_conntrack_expect_related(exp) == 0) {
1265 DEBUGP("ip_ct_ras: expect RAS "
1266 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
1267 NIPQUAD(exp->tuple.src.ip),
1268 ntohs(exp->tuple.src.u.tcp.port),
1269 NIPQUAD(exp->tuple.dst.ip),
1270 ntohs(exp->tuple.dst.u.tcp.port));
1271 } else
1272 ret = -1;
1273
1274 ip_conntrack_expect_put(exp);
1275
1276 return ret;
1277}
1278
1279/****************************************************************************/
1280static int process_rrq(struct sk_buff **pskb, struct ip_conntrack *ct,
1281 enum ip_conntrack_info ctinfo,
1282 unsigned char **data, RegistrationRequest * rrq)
1283{
1284 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
1285 int ret;
1286
1287 DEBUGP("ip_ct_ras: RRQ\n");
1288
1289 ret = expect_q931(pskb, ct, ctinfo, data,
1290 rrq->callSignalAddress.item,
1291 rrq->callSignalAddress.count);
1292 if (ret < 0)
1293 return -1;
1294
1295 if (set_ras_addr_hook) {
1296 ret = set_ras_addr_hook(pskb, ct, ctinfo, data,
1297 rrq->rasAddress.item,
1298 rrq->rasAddress.count);
1299 if (ret < 0)
1300 return -1;
1301 }
1302
1303 if (rrq->options & eRegistrationRequest_timeToLive) {
1304 DEBUGP("ip_ct_ras: RRQ TTL = %u seconds\n", rrq->timeToLive);
1305 info->timeout = rrq->timeToLive;
1306 } else
Jing Min Zhaoa0b7db52006-04-06 14:15:33 -07001307 info->timeout = default_rrq_ttl;
Jing Min Zhao5e35941d2006-03-20 23:41:17 -08001308
1309 return 0;
1310}
1311
1312/****************************************************************************/
1313static int process_rcf(struct sk_buff **pskb, struct ip_conntrack *ct,
1314 enum ip_conntrack_info ctinfo,
1315 unsigned char **data, RegistrationConfirm * rcf)
1316{
1317 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
1318 int dir = CTINFO2DIR(ctinfo);
1319 int ret;
1320 struct ip_conntrack_expect *exp;
1321
1322 DEBUGP("ip_ct_ras: RCF\n");
1323
1324 if (set_sig_addr_hook) {
1325 ret = set_sig_addr_hook(pskb, ct, ctinfo, data,
1326 rcf->callSignalAddress.item,
1327 rcf->callSignalAddress.count);
1328 if (ret < 0)
1329 return -1;
1330 }
1331
1332 if (rcf->options & eRegistrationConfirm_timeToLive) {
1333 DEBUGP("ip_ct_ras: RCF TTL = %u seconds\n", rcf->timeToLive);
1334 info->timeout = rcf->timeToLive;
1335 }
1336
1337 if (info->timeout > 0) {
1338 DEBUGP
1339 ("ip_ct_ras: set RAS connection timeout to %u seconds\n",
1340 info->timeout);
1341 ip_ct_refresh_acct(ct, ctinfo, NULL, info->timeout * HZ);
1342
1343 /* Set expect timeout */
1344 read_lock_bh(&ip_conntrack_lock);
1345 exp = find_expect(ct, ct->tuplehash[dir].tuple.dst.ip,
1346 info->sig_port[!dir]);
1347 if (exp) {
1348 DEBUGP("ip_ct_ras: set Q.931 expect "
1349 "(%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu) "
1350 "timeout to %u seconds\n",
1351 NIPQUAD(exp->tuple.src.ip),
1352 ntohs(exp->tuple.src.u.tcp.port),
1353 NIPQUAD(exp->tuple.dst.ip),
1354 ntohs(exp->tuple.dst.u.tcp.port),
1355 info->timeout);
1356 set_expect_timeout(exp, info->timeout);
1357 }
1358 read_unlock_bh(&ip_conntrack_lock);
1359 }
1360
1361 return 0;
1362}
1363
1364/****************************************************************************/
1365static int process_urq(struct sk_buff **pskb, struct ip_conntrack *ct,
1366 enum ip_conntrack_info ctinfo,
1367 unsigned char **data, UnregistrationRequest * urq)
1368{
1369 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
1370 int dir = CTINFO2DIR(ctinfo);
1371 int ret;
1372
1373 DEBUGP("ip_ct_ras: URQ\n");
1374
1375 if (set_sig_addr_hook) {
1376 ret = set_sig_addr_hook(pskb, ct, ctinfo, data,
1377 urq->callSignalAddress.item,
1378 urq->callSignalAddress.count);
1379 if (ret < 0)
1380 return -1;
1381 }
1382
1383 /* Clear old expect */
1384 ip_ct_remove_expectations(ct);
1385 info->sig_port[dir] = 0;
1386 info->sig_port[!dir] = 0;
1387
1388 /* Give it 30 seconds for UCF or URJ */
1389 ip_ct_refresh_acct(ct, ctinfo, NULL, 30 * HZ);
1390
1391 return 0;
1392}
1393
1394/****************************************************************************/
1395static int process_arq(struct sk_buff **pskb, struct ip_conntrack *ct,
1396 enum ip_conntrack_info ctinfo,
1397 unsigned char **data, AdmissionRequest * arq)
1398{
1399 struct ip_ct_h323_master *info = &ct->help.ct_h323_info;
1400 int dir = CTINFO2DIR(ctinfo);
1401 u_int32_t ip;
1402 u_int16_t port;
1403
1404 DEBUGP("ip_ct_ras: ARQ\n");
1405
1406 if ((arq->options & eAdmissionRequest_destCallSignalAddress) &&
1407 get_h225_addr(*data, &arq->destCallSignalAddress, &ip, &port) &&
1408 ip == ct->tuplehash[dir].tuple.src.ip &&
1409 port == info->sig_port[dir] && set_h225_addr_hook) {
1410 /* Answering ARQ */
1411 return set_h225_addr_hook(pskb, data, 0,
1412 &arq->destCallSignalAddress,
1413 ct->tuplehash[!dir].tuple.dst.ip,
1414 info->sig_port[!dir]);
1415 }
1416
1417 if ((arq->options & eAdmissionRequest_srcCallSignalAddress) &&
1418 get_h225_addr(*data, &arq->srcCallSignalAddress, &ip, &port) &&
1419 ip == ct->tuplehash[dir].tuple.src.ip && set_h225_addr_hook) {
1420 /* Calling ARQ */
1421 return set_h225_addr_hook(pskb, data, 0,
1422 &arq->srcCallSignalAddress,
1423 ct->tuplehash[!dir].tuple.dst.ip,
1424 port);
1425 }
1426
1427 return 0;
1428}
1429
1430/****************************************************************************/
1431static int process_acf(struct sk_buff **pskb, struct ip_conntrack *ct,
1432 enum ip_conntrack_info ctinfo,
1433 unsigned char **data, AdmissionConfirm * acf)
1434{
1435 int dir = CTINFO2DIR(ctinfo);
1436 int ret = 0;
1437 u_int32_t ip;
1438 u_int16_t port;
1439 struct ip_conntrack_expect *exp;
1440
1441 DEBUGP("ip_ct_ras: ACF\n");
1442
1443 if (!get_h225_addr(*data, &acf->destCallSignalAddress, &ip, &port))
1444 return 0;
1445
1446 if (ip == ct->tuplehash[dir].tuple.dst.ip) { /* Answering ACF */
1447 if (set_sig_addr_hook)
1448 return set_sig_addr_hook(pskb, ct, ctinfo, data,
1449 &acf->destCallSignalAddress,
1450 1);
1451 return 0;
1452 }
1453
1454 /* Need new expect */
1455 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
1456 return -1;
1457 exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
1458 exp->tuple.src.u.tcp.port = 0;
1459 exp->tuple.dst.ip = ip;
1460 exp->tuple.dst.u.tcp.port = htons(port);
1461 exp->tuple.dst.protonum = IPPROTO_TCP;
1462 exp->mask.src.ip = 0xFFFFFFFF;
1463 exp->mask.src.u.tcp.port = 0;
1464 exp->mask.dst.ip = 0xFFFFFFFF;
1465 exp->mask.dst.u.tcp.port = 0xFFFF;
1466 exp->mask.dst.protonum = 0xFF;
1467 exp->flags = IP_CT_EXPECT_PERMANENT;
1468 exp->expectfn = ip_conntrack_q931_expect;
1469
1470 if (ip_conntrack_expect_related(exp) == 0) {
1471 DEBUGP("ip_ct_ras: expect Q.931 "
1472 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
1473 NIPQUAD(exp->tuple.src.ip),
1474 ntohs(exp->tuple.src.u.tcp.port),
1475 NIPQUAD(exp->tuple.dst.ip),
1476 ntohs(exp->tuple.dst.u.tcp.port));
1477 } else
1478 ret = -1;
1479
1480 ip_conntrack_expect_put(exp);
1481
1482 return ret;
1483}
1484
1485/****************************************************************************/
1486static int process_lrq(struct sk_buff **pskb, struct ip_conntrack *ct,
1487 enum ip_conntrack_info ctinfo,
1488 unsigned char **data, LocationRequest * lrq)
1489{
1490 DEBUGP("ip_ct_ras: LRQ\n");
1491
1492 if (set_ras_addr_hook)
1493 return set_ras_addr_hook(pskb, ct, ctinfo, data,
1494 &lrq->replyAddress, 1);
1495 return 0;
1496}
1497
1498/****************************************************************************/
1499static int process_lcf(struct sk_buff **pskb, struct ip_conntrack *ct,
1500 enum ip_conntrack_info ctinfo,
1501 unsigned char **data, LocationConfirm * lcf)
1502{
1503 int dir = CTINFO2DIR(ctinfo);
1504 int ret = 0;
1505 u_int32_t ip;
1506 u_int16_t port;
1507 struct ip_conntrack_expect *exp = NULL;
1508
1509 DEBUGP("ip_ct_ras: LCF\n");
1510
1511 if (!get_h225_addr(*data, &lcf->callSignalAddress, &ip, &port))
1512 return 0;
1513
1514 /* Need new expect for call signal */
1515 if ((exp = ip_conntrack_expect_alloc(ct)) == NULL)
1516 return -1;
1517 exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
1518 exp->tuple.src.u.tcp.port = 0;
1519 exp->tuple.dst.ip = ip;
1520 exp->tuple.dst.u.tcp.port = htons(port);
1521 exp->tuple.dst.protonum = IPPROTO_TCP;
1522 exp->mask.src.ip = 0xFFFFFFFF;
1523 exp->mask.src.u.tcp.port = 0;
1524 exp->mask.dst.ip = 0xFFFFFFFF;
1525 exp->mask.dst.u.tcp.port = 0xFFFF;
1526 exp->mask.dst.protonum = 0xFF;
1527 exp->flags = IP_CT_EXPECT_PERMANENT;
1528 exp->expectfn = ip_conntrack_q931_expect;
1529
1530 if (ip_conntrack_expect_related(exp) == 0) {
1531 DEBUGP("ip_ct_ras: expect Q.931 "
1532 "%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
1533 NIPQUAD(exp->tuple.src.ip),
1534 ntohs(exp->tuple.src.u.tcp.port),
1535 NIPQUAD(exp->tuple.dst.ip),
1536 ntohs(exp->tuple.dst.u.tcp.port));
1537 } else
1538 ret = -1;
1539
1540 ip_conntrack_expect_put(exp);
1541
1542 /* Ignore rasAddress */
1543
1544 return ret;
1545}
1546
1547/****************************************************************************/
1548static int process_irr(struct sk_buff **pskb, struct ip_conntrack *ct,
1549 enum ip_conntrack_info ctinfo,
1550 unsigned char **data, InfoRequestResponse * irr)
1551{
1552 int ret;
1553
1554 DEBUGP("ip_ct_ras: IRR\n");
1555
1556 if (set_ras_addr_hook) {
1557 ret = set_ras_addr_hook(pskb, ct, ctinfo, data,
1558 &irr->rasAddress, 1);
1559 if (ret < 0)
1560 return -1;
1561 }
1562
1563 if (set_sig_addr_hook) {
1564 ret = set_sig_addr_hook(pskb, ct, ctinfo, data,
1565 irr->callSignalAddress.item,
1566 irr->callSignalAddress.count);
1567 if (ret < 0)
1568 return -1;
1569 }
1570
1571 return 0;
1572}
1573
1574/****************************************************************************/
1575static int process_ras(struct sk_buff **pskb, struct ip_conntrack *ct,
1576 enum ip_conntrack_info ctinfo,
1577 unsigned char **data, RasMessage * ras)
1578{
1579 switch (ras->choice) {
1580 case eRasMessage_gatekeeperRequest:
1581 return process_grq(pskb, ct, ctinfo, data,
1582 &ras->gatekeeperRequest);
1583 case eRasMessage_gatekeeperConfirm:
1584 return process_gcf(pskb, ct, ctinfo, data,
1585 &ras->gatekeeperConfirm);
1586 case eRasMessage_registrationRequest:
1587 return process_rrq(pskb, ct, ctinfo, data,
1588 &ras->registrationRequest);
1589 case eRasMessage_registrationConfirm:
1590 return process_rcf(pskb, ct, ctinfo, data,
1591 &ras->registrationConfirm);
1592 case eRasMessage_unregistrationRequest:
1593 return process_urq(pskb, ct, ctinfo, data,
1594 &ras->unregistrationRequest);
1595 case eRasMessage_admissionRequest:
1596 return process_arq(pskb, ct, ctinfo, data,
1597 &ras->admissionRequest);
1598 case eRasMessage_admissionConfirm:
1599 return process_acf(pskb, ct, ctinfo, data,
1600 &ras->admissionConfirm);
1601 case eRasMessage_locationRequest:
1602 return process_lrq(pskb, ct, ctinfo, data,
1603 &ras->locationRequest);
1604 case eRasMessage_locationConfirm:
1605 return process_lcf(pskb, ct, ctinfo, data,
1606 &ras->locationConfirm);
1607 case eRasMessage_infoRequestResponse:
1608 return process_irr(pskb, ct, ctinfo, data,
1609 &ras->infoRequestResponse);
1610 default:
1611 DEBUGP("ip_ct_ras: RAS message %d\n", ras->choice);
1612 break;
1613 }
1614
1615 return 0;
1616}
1617
1618/****************************************************************************/
1619static int ras_help(struct sk_buff **pskb, struct ip_conntrack *ct,
1620 enum ip_conntrack_info ctinfo)
1621{
1622 static RasMessage ras;
1623 unsigned char *data;
1624 int datalen = 0;
1625 int ret;
1626
1627 DEBUGP("ip_ct_ras: skblen = %u\n", (*pskb)->len);
1628
1629 spin_lock_bh(&ip_h323_lock);
1630
1631 /* Get UDP data */
1632 data = get_udp_data(pskb, &datalen);
1633 if (data == NULL)
1634 goto accept;
1635 DEBUGP("ip_ct_ras: RAS message %u.%u.%u.%u->%u.%u.%u.%u, len=%d\n",
1636 NIPQUAD((*pskb)->nh.iph->saddr),
1637 NIPQUAD((*pskb)->nh.iph->daddr), datalen);
1638
1639 /* Decode RAS message */
1640 ret = DecodeRasMessage(data, datalen, &ras);
1641 if (ret < 0) {
1642 if (net_ratelimit())
1643 printk("ip_ct_ras: decoding error: %s\n",
1644 ret == H323_ERROR_BOUND ?
1645 "out of bound" : "out of range");
1646 goto accept;
1647 }
1648
1649 /* Process RAS message */
1650 if (process_ras(pskb, ct, ctinfo, &data, &ras) < 0)
1651 goto drop;
1652
1653 accept:
1654 spin_unlock_bh(&ip_h323_lock);
1655 return NF_ACCEPT;
1656
1657 drop:
1658 spin_unlock_bh(&ip_h323_lock);
1659 if (net_ratelimit())
1660 printk("ip_ct_ras: packet dropped\n");
1661 return NF_DROP;
1662}
1663
1664/****************************************************************************/
1665static struct ip_conntrack_helper ip_conntrack_helper_ras = {
1666 .name = "RAS",
1667 .me = THIS_MODULE,
1668 .max_expected = 32,
1669 .timeout = 240,
1670 .tuple = {.src = {.u = {__constant_htons(RAS_PORT)}},
1671 .dst = {.protonum = IPPROTO_UDP}},
1672 .mask = {.src = {.u = {0xFFFE}},
1673 .dst = {.protonum = 0xFF}},
1674 .help = ras_help,
1675};
1676
1677/****************************************************************************/
1678static void ip_conntrack_ras_expect(struct ip_conntrack *new,
1679 struct ip_conntrack_expect *this)
1680{
1681 write_lock_bh(&ip_conntrack_lock);
1682 new->helper = &ip_conntrack_helper_ras;
1683 write_unlock_bh(&ip_conntrack_lock);
1684}
1685
1686/****************************************************************************/
1687/* Not __exit - called from init() */
1688static void fini(void)
1689{
1690 ip_conntrack_helper_unregister(&ip_conntrack_helper_ras);
1691 ip_conntrack_helper_unregister(&ip_conntrack_helper_q931);
1692 kfree(h323_buffer);
1693 DEBUGP("ip_ct_h323: fini\n");
1694}
1695
1696/****************************************************************************/
1697static int __init init(void)
1698{
1699 int ret;
1700
1701 h323_buffer = kmalloc(65536, GFP_KERNEL);
1702 if (!h323_buffer)
1703 return -ENOMEM;
1704 if ((ret = ip_conntrack_helper_register(&ip_conntrack_helper_q931)) ||
1705 (ret = ip_conntrack_helper_register(&ip_conntrack_helper_ras))) {
1706 fini();
1707 return ret;
1708 }
1709
1710 DEBUGP("ip_ct_h323: init success\n");
1711 return 0;
1712}
1713
1714/****************************************************************************/
1715module_init(init);
1716module_exit(fini);
1717
Jing Min Zhao0f249682006-04-06 14:14:11 -07001718EXPORT_SYMBOL_GPL(get_h225_addr);
1719EXPORT_SYMBOL_GPL(ip_conntrack_h245_expect);
1720EXPORT_SYMBOL_GPL(ip_conntrack_q931_expect);
1721EXPORT_SYMBOL_GPL(set_h245_addr_hook);
1722EXPORT_SYMBOL_GPL(set_h225_addr_hook);
1723EXPORT_SYMBOL_GPL(set_sig_addr_hook);
1724EXPORT_SYMBOL_GPL(set_ras_addr_hook);
1725EXPORT_SYMBOL_GPL(nat_rtp_rtcp_hook);
1726EXPORT_SYMBOL_GPL(nat_t120_hook);
1727EXPORT_SYMBOL_GPL(nat_h245_hook);
1728EXPORT_SYMBOL_GPL(nat_q931_hook);
Jing Min Zhao5e35941d2006-03-20 23:41:17 -08001729
1730MODULE_AUTHOR("Jing Min Zhao <zhaojingmin@users.sourceforge.net>");
1731MODULE_DESCRIPTION("H.323 connection tracking helper");
1732MODULE_LICENSE("GPL");