blob: 171ba82b5902095202d72705fd0ec00906e241b8 [file] [log] [blame]
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -08001/* Kernel module to match ESP parameters. */
2
3/* (C) 1999-2000 Yon Uriarte <yon@astaro.de>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
Jan Engelhardtbe91fd52010-03-18 02:22:32 +01009#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080010#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/in.h>
13#include <linux/ip.h>
14
15#include <linux/netfilter/xt_esp.h>
16#include <linux/netfilter/x_tables.h>
17
18#include <linux/netfilter_ipv4/ip_tables.h>
19#include <linux/netfilter_ipv6/ip6_tables.h>
20
21MODULE_LICENSE("GPL");
22MODULE_AUTHOR("Yon Uriarte <yon@astaro.de>");
Jan Engelhardt2ae15b62008-01-14 23:42:28 -080023MODULE_DESCRIPTION("Xtables: IPsec-ESP packet match");
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080024MODULE_ALIAS("ipt_esp");
25MODULE_ALIAS("ip6t_esp");
26
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080027/* Returns 1 if the spi is matched by the range, 0 otherwise */
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070028static inline bool
29spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert)
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080030{
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070031 bool r;
Jan Engelhardtff67e4e2010-03-19 21:08:16 +010032 pr_debug("spi_match:%c 0x%x <= 0x%x <= 0x%x\n",
Jan Engelhardtbe91fd52010-03-18 02:22:32 +010033 invert ? '!' : ' ', min, spi, max);
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080034 r = (spi >= min && spi <= max) ^ invert;
Jan Engelhardtbe91fd52010-03-18 02:22:32 +010035 pr_debug(" result %s\n", r ? "PASS" : "FAILED");
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080036 return r;
37}
38
Jan Engelhardt62fc8052009-07-07 20:42:08 +020039static bool esp_mt(const struct sk_buff *skb, struct xt_action_param *par)
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080040{
Jan Engelhardt3cf93c92008-04-14 09:56:05 +020041 const struct ip_esp_hdr *eh;
42 struct ip_esp_hdr _esp;
Jan Engelhardtf7108a22008-10-08 11:35:18 +020043 const struct xt_esp *espinfo = par->matchinfo;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080044
45 /* Must not be a fragment. */
Jan Engelhardtf7108a22008-10-08 11:35:18 +020046 if (par->fragoff != 0)
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070047 return false;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080048
Jan Engelhardtf7108a22008-10-08 11:35:18 +020049 eh = skb_header_pointer(skb, par->thoff, sizeof(_esp), &_esp);
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080050 if (eh == NULL) {
51 /* We've been asked to examine this packet, and we
52 * can't. Hence, no choice but to drop.
53 */
Jan Engelhardtbe91fd52010-03-18 02:22:32 +010054 pr_debug("Dropping evil ESP tinygram.\n");
Jan Engelhardtb4ba2612009-07-07 20:54:30 +020055 par->hotdrop = true;
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070056 return false;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080057 }
58
59 return spi_match(espinfo->spis[0], espinfo->spis[1], ntohl(eh->spi),
60 !!(espinfo->invflags & XT_ESP_INV_SPI));
61}
62
Jan Engelhardtb0f38452010-03-19 17:16:42 +010063static int esp_mt_check(const struct xt_mtchk_param *par)
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080064{
Jan Engelhardt9b4fce72008-10-08 11:35:18 +020065 const struct xt_esp *espinfo = par->matchinfo;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080066
67 if (espinfo->invflags & ~XT_ESP_INV_MASK) {
Jan Engelhardtbe91fd52010-03-18 02:22:32 +010068 pr_debug("unknown flags %X\n", espinfo->invflags);
Jan Engelhardtbd414ee2010-03-23 16:35:56 +010069 return -EINVAL;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080070 }
71
Jan Engelhardtbd414ee2010-03-23 16:35:56 +010072 return 0;
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080073}
74
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080075static struct xt_match esp_mt_reg[] __read_mostly = {
Patrick McHardy4470bbc2006-08-22 00:34:04 -070076 {
77 .name = "esp",
Jan Engelhardtee999d82008-10-08 11:35:01 +020078 .family = NFPROTO_IPV4,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080079 .checkentry = esp_mt_check,
80 .match = esp_mt,
Patrick McHardy4470bbc2006-08-22 00:34:04 -070081 .matchsize = sizeof(struct xt_esp),
82 .proto = IPPROTO_ESP,
83 .me = THIS_MODULE,
84 },
85 {
86 .name = "esp",
Jan Engelhardtee999d82008-10-08 11:35:01 +020087 .family = NFPROTO_IPV6,
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080088 .checkentry = esp_mt_check,
89 .match = esp_mt,
Patrick McHardy4470bbc2006-08-22 00:34:04 -070090 .matchsize = sizeof(struct xt_esp),
91 .proto = IPPROTO_ESP,
92 .me = THIS_MODULE,
93 },
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080094};
95
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080096static int __init esp_mt_init(void)
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080097{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -080098 return xt_register_matches(esp_mt_reg, ARRAY_SIZE(esp_mt_reg));
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -080099}
100
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800101static void __exit esp_mt_exit(void)
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -0800102{
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800103 xt_unregister_matches(esp_mt_reg, ARRAY_SIZE(esp_mt_reg));
Yasuyuki Kozakaidc5ab2f2006-04-01 02:22:30 -0800104}
105
Jan Engelhardtd3c5ee62007-12-04 23:24:03 -0800106module_init(esp_mt_init);
107module_exit(esp_mt_exit);