blob: 0e357ac9a2a831b85fee911847b4c2427d8255d6 [file] [log] [blame]
Patrick McHardycdd289a2007-02-07 15:09:46 -08001/*
2 * This is a module which is used for setting the MSS option in TCP packets.
3 *
4 * Copyright (C) 2000 Marc Boucher <marc@mbsi.ca>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
10
11#include <linux/module.h>
12#include <linux/skbuff.h>
13#include <linux/ip.h>
14#include <linux/ipv6.h>
15#include <linux/tcp.h>
Jan Engelhardt37c08382008-01-31 04:06:10 -080016#include <net/dst.h>
17#include <net/flow.h>
Patrick McHardycdd289a2007-02-07 15:09:46 -080018#include <net/ipv6.h>
Jan Engelhardt37c08382008-01-31 04:06:10 -080019#include <net/route.h>
Patrick McHardycdd289a2007-02-07 15:09:46 -080020#include <net/tcp.h>
21
22#include <linux/netfilter_ipv4/ip_tables.h>
23#include <linux/netfilter_ipv6/ip6_tables.h>
24#include <linux/netfilter/x_tables.h>
25#include <linux/netfilter/xt_tcpudp.h>
26#include <linux/netfilter/xt_TCPMSS.h>
27
28MODULE_LICENSE("GPL");
29MODULE_AUTHOR("Marc Boucher <marc@mbsi.ca>");
Jan Engelhardt2ae15b62008-01-14 23:42:28 -080030MODULE_DESCRIPTION("Xtables: TCP Maximum Segment Size (MSS) adjustment");
Patrick McHardycdd289a2007-02-07 15:09:46 -080031MODULE_ALIAS("ipt_TCPMSS");
32MODULE_ALIAS("ip6t_TCPMSS");
33
34static inline unsigned int
35optlen(const u_int8_t *opt, unsigned int offset)
36{
37 /* Beware zero-length options: make finite progress */
38 if (opt[offset] <= TCPOPT_NOP || opt[offset+1] == 0)
39 return 1;
40 else
41 return opt[offset+1];
42}
43
44static int
Herbert Xu3db05fe2007-10-15 00:53:15 -070045tcpmss_mangle_packet(struct sk_buff *skb,
Patrick McHardycdd289a2007-02-07 15:09:46 -080046 const struct xt_tcpmss_info *info,
Jan Engelhardt37c08382008-01-31 04:06:10 -080047 unsigned int in_mtu,
Patrick McHardycdd289a2007-02-07 15:09:46 -080048 unsigned int tcphoff,
49 unsigned int minlen)
50{
51 struct tcphdr *tcph;
52 unsigned int tcplen, i;
53 __be16 oldval;
54 u16 newmss;
55 u8 *opt;
56
Herbert Xu3db05fe2007-10-15 00:53:15 -070057 if (!skb_make_writable(skb, skb->len))
Patrick McHardycdd289a2007-02-07 15:09:46 -080058 return -1;
59
Herbert Xu3db05fe2007-10-15 00:53:15 -070060 tcplen = skb->len - tcphoff;
61 tcph = (struct tcphdr *)(skb_network_header(skb) + tcphoff);
Patrick McHardycdd289a2007-02-07 15:09:46 -080062
Simon Arlott10a19932010-02-02 15:33:38 +010063 /* Header cannot be larger than the packet */
64 if (tcplen < tcph->doff*4)
Patrick McHardycdd289a2007-02-07 15:09:46 -080065 return -1;
Patrick McHardycdd289a2007-02-07 15:09:46 -080066
67 if (info->mss == XT_TCPMSS_CLAMP_PMTU) {
Eric Dumazetadf30902009-06-02 05:19:30 +000068 if (dst_mtu(skb_dst(skb)) <= minlen) {
Patrick McHardycdd289a2007-02-07 15:09:46 -080069 if (net_ratelimit())
70 printk(KERN_ERR "xt_TCPMSS: "
71 "unknown or invalid path-MTU (%u)\n",
Eric Dumazetadf30902009-06-02 05:19:30 +000072 dst_mtu(skb_dst(skb)));
Patrick McHardycdd289a2007-02-07 15:09:46 -080073 return -1;
74 }
Jan Engelhardt37c08382008-01-31 04:06:10 -080075 if (in_mtu <= minlen) {
76 if (net_ratelimit())
77 printk(KERN_ERR "xt_TCPMSS: unknown or "
78 "invalid path-MTU (%u)\n", in_mtu);
79 return -1;
80 }
Eric Dumazetadf30902009-06-02 05:19:30 +000081 newmss = min(dst_mtu(skb_dst(skb)), in_mtu) - minlen;
Patrick McHardycdd289a2007-02-07 15:09:46 -080082 } else
83 newmss = info->mss;
84
85 opt = (u_int8_t *)tcph;
86 for (i = sizeof(struct tcphdr); i < tcph->doff*4; i += optlen(opt, i)) {
87 if (opt[i] == TCPOPT_MSS && tcph->doff*4 - i >= TCPOLEN_MSS &&
88 opt[i+1] == TCPOLEN_MSS) {
89 u_int16_t oldmss;
90
91 oldmss = (opt[i+2] << 8) | opt[i+3];
92
Benjamin LaHaise17008062007-12-17 22:27:36 -080093 /* Never increase MSS, even when setting it, as
94 * doing so results in problems for hosts that rely
95 * on MSS being set correctly.
96 */
97 if (oldmss <= newmss)
Patrick McHardycdd289a2007-02-07 15:09:46 -080098 return 0;
99
100 opt[i+2] = (newmss & 0xff00) >> 8;
Jan Engelhardt7c4e36b2007-07-07 22:19:08 -0700101 opt[i+3] = newmss & 0x00ff;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800102
Patrick McHardybe0ea7d2007-11-30 01:17:11 +1100103 inet_proto_csum_replace2(&tcph->check, skb,
104 htons(oldmss), htons(newmss),
105 0);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800106 return 0;
107 }
108 }
109
Simon Arlott10a19932010-02-02 15:33:38 +0100110 /* There is data after the header so the option can't be added
111 without moving it, and doing so may make the SYN packet
112 itself too large. Accept the packet unmodified instead. */
113 if (tcplen > tcph->doff*4)
114 return 0;
115
Patrick McHardycdd289a2007-02-07 15:09:46 -0800116 /*
117 * MSS Option not found ?! add it..
118 */
Herbert Xu3db05fe2007-10-15 00:53:15 -0700119 if (skb_tailroom(skb) < TCPOLEN_MSS) {
120 if (pskb_expand_head(skb, 0,
121 TCPOLEN_MSS - skb_tailroom(skb),
Herbert Xu2ca7b0a2007-10-14 00:39:55 -0700122 GFP_ATOMIC))
Patrick McHardycdd289a2007-02-07 15:09:46 -0800123 return -1;
Herbert Xu3db05fe2007-10-15 00:53:15 -0700124 tcph = (struct tcphdr *)(skb_network_header(skb) + tcphoff);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800125 }
126
Herbert Xu3db05fe2007-10-15 00:53:15 -0700127 skb_put(skb, TCPOLEN_MSS);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800128
129 opt = (u_int8_t *)tcph + sizeof(struct tcphdr);
130 memmove(opt + TCPOLEN_MSS, opt, tcplen - sizeof(struct tcphdr));
131
Patrick McHardybe0ea7d2007-11-30 01:17:11 +1100132 inet_proto_csum_replace2(&tcph->check, skb,
133 htons(tcplen), htons(tcplen + TCPOLEN_MSS), 1);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800134 opt[0] = TCPOPT_MSS;
135 opt[1] = TCPOLEN_MSS;
136 opt[2] = (newmss & 0xff00) >> 8;
Jan Engelhardt7c4e36b2007-07-07 22:19:08 -0700137 opt[3] = newmss & 0x00ff;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800138
Patrick McHardybe0ea7d2007-11-30 01:17:11 +1100139 inet_proto_csum_replace4(&tcph->check, skb, 0, *((__be32 *)opt), 0);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800140
141 oldval = ((__be16 *)tcph)[6];
142 tcph->doff += TCPOLEN_MSS/4;
Patrick McHardybe0ea7d2007-11-30 01:17:11 +1100143 inet_proto_csum_replace2(&tcph->check, skb,
144 oldval, ((__be16 *)tcph)[6], 0);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800145 return TCPOLEN_MSS;
146}
147
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700148static u_int32_t tcpmss_reverse_mtu(const struct sk_buff *skb,
149 unsigned int family)
Jan Engelhardt37c08382008-01-31 04:06:10 -0800150{
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700151 struct flowi fl = {};
Jan Engelhardt37c08382008-01-31 04:06:10 -0800152 const struct nf_afinfo *ai;
153 struct rtable *rt = NULL;
154 u_int32_t mtu = ~0U;
155
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700156 if (family == PF_INET)
157 fl.fl4_dst = ip_hdr(skb)->saddr;
158 else
159 fl.fl6_dst = ipv6_hdr(skb)->saddr;
160
Jan Engelhardt37c08382008-01-31 04:06:10 -0800161 rcu_read_lock();
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700162 ai = nf_get_afinfo(family);
Jan Engelhardt37c08382008-01-31 04:06:10 -0800163 if (ai != NULL)
164 ai->route((struct dst_entry **)&rt, &fl);
165 rcu_read_unlock();
166
167 if (rt != NULL) {
168 mtu = dst_mtu(&rt->u.dst);
169 dst_release(&rt->u.dst);
170 }
171 return mtu;
172}
173
Patrick McHardycdd289a2007-02-07 15:09:46 -0800174static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200175tcpmss_tg4(struct sk_buff *skb, const struct xt_target_param *par)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800176{
Herbert Xu3db05fe2007-10-15 00:53:15 -0700177 struct iphdr *iph = ip_hdr(skb);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800178 __be16 newlen;
179 int ret;
180
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200181 ret = tcpmss_mangle_packet(skb, par->targinfo,
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700182 tcpmss_reverse_mtu(skb, PF_INET),
Jan Engelhardt37c08382008-01-31 04:06:10 -0800183 iph->ihl * 4,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800184 sizeof(*iph) + sizeof(struct tcphdr));
185 if (ret < 0)
186 return NF_DROP;
187 if (ret > 0) {
Herbert Xu3db05fe2007-10-15 00:53:15 -0700188 iph = ip_hdr(skb);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800189 newlen = htons(ntohs(iph->tot_len) + ret);
Patrick McHardybe0ea7d2007-11-30 01:17:11 +1100190 csum_replace2(&iph->check, iph->tot_len, newlen);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800191 iph->tot_len = newlen;
192 }
193 return XT_CONTINUE;
194}
195
196#if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE)
197static unsigned int
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200198tcpmss_tg6(struct sk_buff *skb, const struct xt_target_param *par)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800199{
Herbert Xu3db05fe2007-10-15 00:53:15 -0700200 struct ipv6hdr *ipv6h = ipv6_hdr(skb);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800201 u8 nexthdr;
202 int tcphoff;
203 int ret;
204
205 nexthdr = ipv6h->nexthdr;
Herbert Xu3db05fe2007-10-15 00:53:15 -0700206 tcphoff = ipv6_skip_exthdr(skb, sizeof(*ipv6h), &nexthdr);
Patrick McHardy9dc05642007-11-30 23:58:03 +1100207 if (tcphoff < 0)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800208 return NF_DROP;
Jan Engelhardt7eb35582008-10-08 11:35:19 +0200209 ret = tcpmss_mangle_packet(skb, par->targinfo,
Jan Engelhardtdb1a75b2008-07-21 10:02:59 -0700210 tcpmss_reverse_mtu(skb, PF_INET6),
Jan Engelhardt37c08382008-01-31 04:06:10 -0800211 tcphoff,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800212 sizeof(*ipv6h) + sizeof(struct tcphdr));
213 if (ret < 0)
214 return NF_DROP;
215 if (ret > 0) {
Herbert Xu3db05fe2007-10-15 00:53:15 -0700216 ipv6h = ipv6_hdr(skb);
Patrick McHardycdd289a2007-02-07 15:09:46 -0800217 ipv6h->payload_len = htons(ntohs(ipv6h->payload_len) + ret);
218 }
219 return XT_CONTINUE;
220}
221#endif
222
223#define TH_SYN 0x02
224
225/* Must specify -p tcp --syn */
Jan Engelhardte1931b72007-07-07 22:16:26 -0700226static inline bool find_syn_match(const struct xt_entry_match *m)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800227{
228 const struct xt_tcp *tcpinfo = (const struct xt_tcp *)m->data;
229
230 if (strcmp(m->u.kernel.match->name, "tcp") == 0 &&
231 tcpinfo->flg_cmp & TH_SYN &&
232 !(tcpinfo->invflags & XT_TCP_INV_FLAGS))
Jan Engelhardte1931b72007-07-07 22:16:26 -0700233 return true;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800234
Jan Engelhardte1931b72007-07-07 22:16:26 -0700235 return false;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800236}
237
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200238static bool tcpmss_tg4_check(const struct xt_tgchk_param *par)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800239{
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200240 const struct xt_tcpmss_info *info = par->targinfo;
241 const struct ipt_entry *e = par->entryinfo;
Jan Engelhardtdcea9922010-02-24 18:34:48 +0100242 const struct xt_entry_match *ematch;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800243
244 if (info->mss == XT_TCPMSS_CLAMP_PMTU &&
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200245 (par->hook_mask & ~((1 << NF_INET_FORWARD) |
Patrick McHardy6e23ae22007-11-19 18:53:30 -0800246 (1 << NF_INET_LOCAL_OUT) |
247 (1 << NF_INET_POST_ROUTING))) != 0) {
Patrick McHardycdd289a2007-02-07 15:09:46 -0800248 printk("xt_TCPMSS: path-MTU clamping only supported in "
249 "FORWARD, OUTPUT and POSTROUTING hooks\n");
Jan Engelhardte1931b72007-07-07 22:16:26 -0700250 return false;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800251 }
Jan Engelhardtdcea9922010-02-24 18:34:48 +0100252 xt_ematch_foreach(ematch, e)
253 if (find_syn_match(ematch))
254 return true;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800255 printk("xt_TCPMSS: Only works on TCP SYN packets\n");
Jan Engelhardte1931b72007-07-07 22:16:26 -0700256 return false;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800257}
258
259#if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE)
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200260static bool tcpmss_tg6_check(const struct xt_tgchk_param *par)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800261{
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200262 const struct xt_tcpmss_info *info = par->targinfo;
263 const struct ip6t_entry *e = par->entryinfo;
Jan Engelhardtdcea9922010-02-24 18:34:48 +0100264 const struct xt_entry_match *ematch;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800265
266 if (info->mss == XT_TCPMSS_CLAMP_PMTU &&
Jan Engelhardtaf5d6dc2008-10-08 11:35:19 +0200267 (par->hook_mask & ~((1 << NF_INET_FORWARD) |
Patrick McHardy6e23ae22007-11-19 18:53:30 -0800268 (1 << NF_INET_LOCAL_OUT) |
269 (1 << NF_INET_POST_ROUTING))) != 0) {
Patrick McHardycdd289a2007-02-07 15:09:46 -0800270 printk("xt_TCPMSS: path-MTU clamping only supported in "
271 "FORWARD, OUTPUT and POSTROUTING hooks\n");
Jan Engelhardte1931b72007-07-07 22:16:26 -0700272 return false;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800273 }
Jan Engelhardtdcea9922010-02-24 18:34:48 +0100274 xt_ematch_foreach(ematch, e)
275 if (find_syn_match(ematch))
276 return true;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800277 printk("xt_TCPMSS: Only works on TCP SYN packets\n");
Jan Engelhardte1931b72007-07-07 22:16:26 -0700278 return false;
Patrick McHardycdd289a2007-02-07 15:09:46 -0800279}
280#endif
281
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800282static struct xt_target tcpmss_tg_reg[] __read_mostly = {
Patrick McHardycdd289a2007-02-07 15:09:46 -0800283 {
Jan Engelhardtee999d82008-10-08 11:35:01 +0200284 .family = NFPROTO_IPV4,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800285 .name = "TCPMSS",
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800286 .checkentry = tcpmss_tg4_check,
287 .target = tcpmss_tg4,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800288 .targetsize = sizeof(struct xt_tcpmss_info),
289 .proto = IPPROTO_TCP,
290 .me = THIS_MODULE,
291 },
292#if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE)
293 {
Jan Engelhardtee999d82008-10-08 11:35:01 +0200294 .family = NFPROTO_IPV6,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800295 .name = "TCPMSS",
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800296 .checkentry = tcpmss_tg6_check,
297 .target = tcpmss_tg6,
Patrick McHardycdd289a2007-02-07 15:09:46 -0800298 .targetsize = sizeof(struct xt_tcpmss_info),
299 .proto = IPPROTO_TCP,
300 .me = THIS_MODULE,
301 },
302#endif
303};
304
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800305static int __init tcpmss_tg_init(void)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800306{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800307 return xt_register_targets(tcpmss_tg_reg, ARRAY_SIZE(tcpmss_tg_reg));
Patrick McHardycdd289a2007-02-07 15:09:46 -0800308}
309
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800310static void __exit tcpmss_tg_exit(void)
Patrick McHardycdd289a2007-02-07 15:09:46 -0800311{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800312 xt_unregister_targets(tcpmss_tg_reg, ARRAY_SIZE(tcpmss_tg_reg));
Patrick McHardycdd289a2007-02-07 15:09:46 -0800313}
314
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800315module_init(tcpmss_tg_init);
316module_exit(tcpmss_tg_exit);