blob: 65a84809fd3054a7c47eb3363c8146136eeb285e [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* Kernel module to match connection tracking information.
2 * Superset of Rusty's minimalistic state match.
3 *
4 * (C) 2001 Marc Boucher (marc@mbsi.ca).
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
9 */
10
11#include <linux/module.h>
12#include <linux/skbuff.h>
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -080013
14#if defined(CONFIG_IP_NF_CONNTRACK) || defined(CONFIG_IP_NF_CONNTRACK_MODULE)
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/netfilter_ipv4/ip_conntrack.h>
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -080016#include <linux/netfilter_ipv4/ip_conntrack_tuple.h>
17#else
18#include <net/netfilter/nf_conntrack.h>
19#endif
20
Harald Welte2e4e6a12006-01-12 13:30:04 -080021#include <linux/netfilter/x_tables.h>
22#include <linux/netfilter/xt_conntrack.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023
24MODULE_LICENSE("GPL");
25MODULE_AUTHOR("Marc Boucher <marc@mbsi.ca>");
26MODULE_DESCRIPTION("iptables connection tracking match module");
Harald Welte2e4e6a12006-01-12 13:30:04 -080027MODULE_ALIAS("ipt_conntrack");
Linus Torvalds1da177e2005-04-16 15:20:36 -070028
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -080029#if defined(CONFIG_IP_NF_CONNTRACK) || defined(CONFIG_IP_NF_CONNTRACK_MODULE)
30
Linus Torvalds1da177e2005-04-16 15:20:36 -070031static int
32match(const struct sk_buff *skb,
33 const struct net_device *in,
34 const struct net_device *out,
Patrick McHardyc4986732006-03-20 18:02:56 -080035 const struct xt_match *match,
Linus Torvalds1da177e2005-04-16 15:20:36 -070036 const void *matchinfo,
37 int offset,
Harald Welte2e4e6a12006-01-12 13:30:04 -080038 unsigned int protoff,
Linus Torvalds1da177e2005-04-16 15:20:36 -070039 int *hotdrop)
40{
Harald Welte2e4e6a12006-01-12 13:30:04 -080041 const struct xt_conntrack_info *sinfo = matchinfo;
Linus Torvalds1da177e2005-04-16 15:20:36 -070042 struct ip_conntrack *ct;
43 enum ip_conntrack_info ctinfo;
44 unsigned int statebit;
45
46 ct = ip_conntrack_get((struct sk_buff *)skb, &ctinfo);
47
48#define FWINV(bool,invflg) ((bool) ^ !!(sinfo->invflags & invflg))
49
50 if (ct == &ip_conntrack_untracked)
Harald Welte2e4e6a12006-01-12 13:30:04 -080051 statebit = XT_CONNTRACK_STATE_UNTRACKED;
Linus Torvalds1da177e2005-04-16 15:20:36 -070052 else if (ct)
Harald Welte2e4e6a12006-01-12 13:30:04 -080053 statebit = XT_CONNTRACK_STATE_BIT(ctinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -070054 else
Harald Welte2e4e6a12006-01-12 13:30:04 -080055 statebit = XT_CONNTRACK_STATE_INVALID;
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
Harald Welte2e4e6a12006-01-12 13:30:04 -080057 if(sinfo->flags & XT_CONNTRACK_STATE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070058 if (ct) {
59 if(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.ip !=
60 ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip)
Harald Welte2e4e6a12006-01-12 13:30:04 -080061 statebit |= XT_CONNTRACK_STATE_SNAT;
Linus Torvalds1da177e2005-04-16 15:20:36 -070062
63 if(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.ip !=
64 ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip)
Harald Welte2e4e6a12006-01-12 13:30:04 -080065 statebit |= XT_CONNTRACK_STATE_DNAT;
Linus Torvalds1da177e2005-04-16 15:20:36 -070066 }
67
Harald Welte2e4e6a12006-01-12 13:30:04 -080068 if (FWINV((statebit & sinfo->statemask) == 0, XT_CONNTRACK_STATE))
Linus Torvalds1da177e2005-04-16 15:20:36 -070069 return 0;
70 }
71
Harald Welte2e4e6a12006-01-12 13:30:04 -080072 if(sinfo->flags & XT_CONNTRACK_PROTO) {
73 if (!ct || FWINV(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum != sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum, XT_CONNTRACK_PROTO))
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 return 0;
75 }
76
Harald Welte2e4e6a12006-01-12 13:30:04 -080077 if(sinfo->flags & XT_CONNTRACK_ORIGSRC) {
78 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.ip&sinfo->sipmsk[IP_CT_DIR_ORIGINAL].s_addr) != sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip, XT_CONNTRACK_ORIGSRC))
Linus Torvalds1da177e2005-04-16 15:20:36 -070079 return 0;
80 }
81
Harald Welte2e4e6a12006-01-12 13:30:04 -080082 if(sinfo->flags & XT_CONNTRACK_ORIGDST) {
83 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.ip&sinfo->dipmsk[IP_CT_DIR_ORIGINAL].s_addr) != sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.ip, XT_CONNTRACK_ORIGDST))
Linus Torvalds1da177e2005-04-16 15:20:36 -070084 return 0;
85 }
86
Harald Welte2e4e6a12006-01-12 13:30:04 -080087 if(sinfo->flags & XT_CONNTRACK_REPLSRC) {
88 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip&sinfo->sipmsk[IP_CT_DIR_REPLY].s_addr) != sinfo->tuple[IP_CT_DIR_REPLY].src.ip, XT_CONNTRACK_REPLSRC))
Linus Torvalds1da177e2005-04-16 15:20:36 -070089 return 0;
90 }
91
Harald Welte2e4e6a12006-01-12 13:30:04 -080092 if(sinfo->flags & XT_CONNTRACK_REPLDST) {
93 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip&sinfo->dipmsk[IP_CT_DIR_REPLY].s_addr) != sinfo->tuple[IP_CT_DIR_REPLY].dst.ip, XT_CONNTRACK_REPLDST))
Linus Torvalds1da177e2005-04-16 15:20:36 -070094 return 0;
95 }
96
Harald Welte2e4e6a12006-01-12 13:30:04 -080097 if(sinfo->flags & XT_CONNTRACK_STATUS) {
98 if (!ct || FWINV((ct->status & sinfo->statusmask) == 0, XT_CONNTRACK_STATUS))
Linus Torvalds1da177e2005-04-16 15:20:36 -070099 return 0;
100 }
101
Harald Welte2e4e6a12006-01-12 13:30:04 -0800102 if(sinfo->flags & XT_CONNTRACK_EXPIRES) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103 unsigned long expires;
104
105 if(!ct)
106 return 0;
107
108 expires = timer_pending(&ct->timeout) ? (ct->timeout.expires - jiffies)/HZ : 0;
109
Harald Welte2e4e6a12006-01-12 13:30:04 -0800110 if (FWINV(!(expires >= sinfo->expires_min && expires <= sinfo->expires_max), XT_CONNTRACK_EXPIRES))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111 return 0;
112 }
113
114 return 1;
115}
116
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800117#else /* CONFIG_IP_NF_CONNTRACK */
118static int
119match(const struct sk_buff *skb,
120 const struct net_device *in,
121 const struct net_device *out,
Patrick McHardyc4986732006-03-20 18:02:56 -0800122 const struct xt_match *match,
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800123 const void *matchinfo,
124 int offset,
Harald Welte2e4e6a12006-01-12 13:30:04 -0800125 unsigned int protoff,
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800126 int *hotdrop)
127{
Harald Welte2e4e6a12006-01-12 13:30:04 -0800128 const struct xt_conntrack_info *sinfo = matchinfo;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800129 struct nf_conn *ct;
130 enum ip_conntrack_info ctinfo;
131 unsigned int statebit;
132
133 ct = nf_ct_get((struct sk_buff *)skb, &ctinfo);
134
135#define FWINV(bool,invflg) ((bool) ^ !!(sinfo->invflags & invflg))
136
137 if (ct == &nf_conntrack_untracked)
Harald Welte2e4e6a12006-01-12 13:30:04 -0800138 statebit = XT_CONNTRACK_STATE_UNTRACKED;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800139 else if (ct)
Harald Welte2e4e6a12006-01-12 13:30:04 -0800140 statebit = XT_CONNTRACK_STATE_BIT(ctinfo);
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800141 else
Harald Welte2e4e6a12006-01-12 13:30:04 -0800142 statebit = XT_CONNTRACK_STATE_INVALID;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800143
Harald Welte2e4e6a12006-01-12 13:30:04 -0800144 if(sinfo->flags & XT_CONNTRACK_STATE) {
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800145 if (ct) {
146 if(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip !=
147 ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3.ip)
Harald Welte2e4e6a12006-01-12 13:30:04 -0800148 statebit |= XT_CONNTRACK_STATE_SNAT;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800149
150 if(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3.ip !=
151 ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3.ip)
Harald Welte2e4e6a12006-01-12 13:30:04 -0800152 statebit |= XT_CONNTRACK_STATE_DNAT;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800153 }
154
Harald Welte2e4e6a12006-01-12 13:30:04 -0800155 if (FWINV((statebit & sinfo->statemask) == 0, XT_CONNTRACK_STATE))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800156 return 0;
157 }
158
Harald Welte2e4e6a12006-01-12 13:30:04 -0800159 if(sinfo->flags & XT_CONNTRACK_PROTO) {
160 if (!ct || FWINV(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum != sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum, XT_CONNTRACK_PROTO))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800161 return 0;
162 }
163
Harald Welte2e4e6a12006-01-12 13:30:04 -0800164 if(sinfo->flags & XT_CONNTRACK_ORIGSRC) {
165 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip&sinfo->sipmsk[IP_CT_DIR_ORIGINAL].s_addr) != sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip, XT_CONNTRACK_ORIGSRC))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800166 return 0;
167 }
168
Harald Welte2e4e6a12006-01-12 13:30:04 -0800169 if(sinfo->flags & XT_CONNTRACK_ORIGDST) {
170 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3.ip&sinfo->dipmsk[IP_CT_DIR_ORIGINAL].s_addr) != sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.ip, XT_CONNTRACK_ORIGDST))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800171 return 0;
172 }
173
Harald Welte2e4e6a12006-01-12 13:30:04 -0800174 if(sinfo->flags & XT_CONNTRACK_REPLSRC) {
175 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3.ip&sinfo->sipmsk[IP_CT_DIR_REPLY].s_addr) != sinfo->tuple[IP_CT_DIR_REPLY].src.ip, XT_CONNTRACK_REPLSRC))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800176 return 0;
177 }
178
Harald Welte2e4e6a12006-01-12 13:30:04 -0800179 if(sinfo->flags & XT_CONNTRACK_REPLDST) {
180 if (!ct || FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3.ip&sinfo->dipmsk[IP_CT_DIR_REPLY].s_addr) != sinfo->tuple[IP_CT_DIR_REPLY].dst.ip, XT_CONNTRACK_REPLDST))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800181 return 0;
182 }
183
Harald Welte2e4e6a12006-01-12 13:30:04 -0800184 if(sinfo->flags & XT_CONNTRACK_STATUS) {
185 if (!ct || FWINV((ct->status & sinfo->statusmask) == 0, XT_CONNTRACK_STATUS))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800186 return 0;
187 }
188
Harald Welte2e4e6a12006-01-12 13:30:04 -0800189 if(sinfo->flags & XT_CONNTRACK_EXPIRES) {
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800190 unsigned long expires;
191
192 if(!ct)
193 return 0;
194
195 expires = timer_pending(&ct->timeout) ? (ct->timeout.expires - jiffies)/HZ : 0;
196
Harald Welte2e4e6a12006-01-12 13:30:04 -0800197 if (FWINV(!(expires >= sinfo->expires_min && expires <= sinfo->expires_max), XT_CONNTRACK_EXPIRES))
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800198 return 0;
199 }
200
201 return 1;
202}
203
204#endif /* CONFIG_NF_IP_CONNTRACK */
205
Pablo Neira Ayusob9f78f92006-03-22 13:56:08 -0800206static int
207checkentry(const char *tablename,
208 const void *ip,
209 const struct xt_match *match,
210 void *matchinfo,
211 unsigned int matchsize,
212 unsigned int hook_mask)
213{
214#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
215 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
216 printk(KERN_WARNING "can't load nf_conntrack support for "
217 "proto=%d\n", match->family);
218 return 0;
219 }
220#endif
221 return 1;
222}
223
224static void
225destroy(const struct xt_match *match, void *matchinfo, unsigned int matchsize)
226{
227#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
228 nf_ct_l3proto_module_put(match->family);
229#endif
230}
231
Harald Welte2e4e6a12006-01-12 13:30:04 -0800232static struct xt_match conntrack_match = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700233 .name = "conntrack",
Patrick McHardy5d04bff2006-03-20 18:01:58 -0800234 .match = match,
Pablo Neira Ayusob9f78f92006-03-22 13:56:08 -0800235 .checkentry = checkentry,
236 .destroy = destroy,
Patrick McHardy5d04bff2006-03-20 18:01:58 -0800237 .matchsize = sizeof(struct xt_conntrack_info),
Pablo Neira Ayusoa45049c2006-03-22 13:55:40 -0800238 .family = AF_INET,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239 .me = THIS_MODULE,
240};
241
242static int __init init(void)
243{
Harald Welte2e4e6a12006-01-12 13:30:04 -0800244 int ret;
245 need_conntrack();
Pablo Neira Ayusoa45049c2006-03-22 13:55:40 -0800246 ret = xt_register_match(&conntrack_match);
Harald Welte2e4e6a12006-01-12 13:30:04 -0800247
248 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249}
250
251static void __exit fini(void)
252{
Pablo Neira Ayusoa45049c2006-03-22 13:55:40 -0800253 xt_unregister_match(&conntrack_match);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254}
255
256module_init(init);
257module_exit(fini);