blob: 21da4b5f5fa807ce6ebac0bdb2751b6b38651c97 [file] [log] [blame]
Yasuyuki KOZAKAI52088062007-07-24 05:44:11 +00001/*
2 * (C) 2000-2006 by the netfilter coreteam <coreteam@netfilter.org>:
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
17 */
18
Yasuyuki KOZAKAI3dfa4482007-07-24 05:45:33 +000019#include <errno.h>
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000020#include <fcntl.h>
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +000021#include <netdb.h>
Jan Engelhardtaafd2692008-01-20 13:19:40 +000022#include <stdarg.h>
Jan Engelhardtcd9e7aa2008-01-20 13:18:54 +000023#include <stdbool.h>
Yasuyuki KOZAKAI3dfa4482007-07-24 05:45:33 +000024#include <stdio.h>
25#include <stdlib.h>
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000026#include <string.h>
27#include <unistd.h>
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +000028#include <sys/socket.h>
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000029#include <sys/stat.h>
30#include <sys/types.h>
31#include <sys/wait.h>
Jan Engelhardt08b16162008-01-20 13:36:08 +000032#include <arpa/inet.h>
Yasuyuki KOZAKAI3dfa4482007-07-24 05:45:33 +000033
Yasuyuki KOZAKAI52088062007-07-24 05:44:11 +000034#include <xtables.h>
Yasuyuki KOZAKAI3dfa4482007-07-24 05:45:33 +000035
Mike Frysinger5a26b5f2007-12-19 14:51:17 +000036#ifndef NO_SHARED_LIBS
37#include <dlfcn.h>
38#endif
39
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +000040#define NPROTO 255
41
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000042#ifndef PROC_SYS_MODPROBE
43#define PROC_SYS_MODPROBE "/proc/sys/kernel/modprobe"
44#endif
45
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +000046char *lib_dir;
47
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000048/* the path to command to load kernel module */
Jan Engelhardtdbb77542008-02-11 00:33:30 +010049const char *modprobe_program = NULL;
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000050
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +000051/* Keeping track of external matches and targets: linked lists. */
52struct xtables_match *xtables_matches;
53struct xtables_target *xtables_targets;
54
Yasuyuki KOZAKAI3dfa4482007-07-24 05:45:33 +000055void *fw_calloc(size_t count, size_t size)
56{
57 void *p;
58
59 if ((p = calloc(count, size)) == NULL) {
60 perror("ip[6]tables: calloc failed");
61 exit(1);
62 }
63
64 return p;
65}
66
67void *fw_malloc(size_t size)
68{
69 void *p;
70
71 if ((p = malloc(size)) == NULL) {
72 perror("ip[6]tables: malloc failed");
73 exit(1);
74 }
75
76 return p;
77}
Yasuyuki KOZAKAI0b82e8e2007-07-24 05:47:40 +000078
79static char *get_modprobe(void)
80{
81 int procfile;
82 char *ret;
83
84#define PROCFILE_BUFSIZ 1024
85 procfile = open(PROC_SYS_MODPROBE, O_RDONLY);
86 if (procfile < 0)
87 return NULL;
88
89 ret = (char *) malloc(PROCFILE_BUFSIZ);
90 if (ret) {
91 memset(ret, 0, PROCFILE_BUFSIZ);
92 switch (read(procfile, ret, PROCFILE_BUFSIZ)) {
93 case -1: goto fail;
94 case PROCFILE_BUFSIZ: goto fail; /* Partial read. Wierd */
95 }
96 if (ret[strlen(ret)-1]=='\n')
97 ret[strlen(ret)-1]=0;
98 close(procfile);
99 return ret;
100 }
101 fail:
102 free(ret);
103 close(procfile);
104 return NULL;
105}
106
107int xtables_insmod(const char *modname, const char *modprobe, int quiet)
108{
109 char *buf = NULL;
110 char *argv[4];
111 int status;
112
113 /* If they don't explicitly set it, read out of kernel */
114 if (!modprobe) {
115 buf = get_modprobe();
116 if (!buf)
117 return -1;
118 modprobe = buf;
119 }
120
121 switch (fork()) {
122 case 0:
123 argv[0] = (char *)modprobe;
124 argv[1] = (char *)modname;
125 if (quiet) {
126 argv[2] = "-q";
127 argv[3] = NULL;
128 } else {
129 argv[2] = NULL;
130 argv[3] = NULL;
131 }
132 execv(argv[0], argv);
133
134 /* not usually reached */
135 exit(1);
136 case -1:
137 return -1;
138
139 default: /* parent */
140 wait(&status);
141 }
142
143 free(buf);
144 if (WIFEXITED(status) && WEXITSTATUS(status) == 0)
145 return 0;
146 return -1;
147}
148
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000149int load_xtables_ko(const char *modprobe, int quiet)
150{
151 static int loaded = 0;
152 static int ret = -1;
153
154 if (!loaded) {
155 ret = xtables_insmod(afinfo.kmod, modprobe, quiet);
156 loaded = (ret == 0);
157 }
158
159 return ret;
160}
161
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +0000162int string_to_number_ll(const char *s, unsigned long long min,
163 unsigned long long max, unsigned long long *ret)
164{
165 unsigned long long number;
166 char *end;
167
168 /* Handle hex, octal, etc. */
169 errno = 0;
170 number = strtoull(s, &end, 0);
171 if (*end == '\0' && end != s) {
172 /* we parsed a number, let's see if we want this */
173 if (errno != ERANGE && min <= number && (!max || number <= max)) {
174 *ret = number;
175 return 0;
176 }
177 }
178 return -1;
179}
180
181int string_to_number_l(const char *s, unsigned long min, unsigned long max,
182 unsigned long *ret)
183{
184 int result;
185 unsigned long long number;
186
187 result = string_to_number_ll(s, min, max, &number);
188 *ret = (unsigned long)number;
189
190 return result;
191}
192
193int string_to_number(const char *s, unsigned int min, unsigned int max,
194 unsigned int *ret)
195{
196 int result;
197 unsigned long number;
198
199 result = string_to_number_l(s, min, max, &number);
200 *ret = (unsigned int)number;
201
202 return result;
203}
204
Jan Engelhardtcd9e7aa2008-01-20 13:18:54 +0000205/*
206 * strtonum{,l} - string to number conversion
207 *
208 * If @end is NULL, we assume the caller does not want
209 * a case like "15a", so reject it.
210 */
211bool strtonuml(const char *s, char **end, unsigned long *value,
212 unsigned long min, unsigned long max)
213{
214 unsigned long v;
215 char *my_end;
216
217 errno = 0;
218 v = strtoul(s, &my_end, 0);
219
220 if (my_end == s)
221 return false;
222 if (end != NULL)
223 *end = my_end;
224
225 if (errno != ERANGE && min <= v && (max == 0 || v <= max)) {
226 if (value != NULL)
227 *value = v;
228 if (end == NULL)
229 return *my_end == '\0';
230 return true;
231 }
232
233 return false;
234}
235
236bool strtonum(const char *s, char **end, unsigned int *value,
237 unsigned int min, unsigned int max)
238{
239 unsigned long v;
240 bool ret;
241
242 ret = strtonuml(s, end, &v, min, max);
243 if (value != NULL)
244 *value = v;
245 return ret;
246}
247
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +0000248int service_to_port(const char *name, const char *proto)
249{
250 struct servent *service;
251
252 if ((service = getservbyname(name, proto)) != NULL)
253 return ntohs((unsigned short) service->s_port);
254
255 return -1;
256}
257
258u_int16_t parse_port(const char *port, const char *proto)
259{
Jan Engelhardt7a236f42008-03-03 12:30:41 +0100260 unsigned int portnum;
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +0000261
262 if ((string_to_number(port, 0, 65535, &portnum)) != -1 ||
Max Kellermann9ee386a2008-01-29 13:48:05 +0000263 (portnum = service_to_port(port, proto)) != (unsigned)-1)
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +0000264 return (u_int16_t)portnum;
265
266 exit_error(PARAMETER_PROBLEM,
267 "invalid port/service `%s' specified", port);
268}
269
270void parse_interface(const char *arg, char *vianame, unsigned char *mask)
271{
272 int vialen = strlen(arg);
273 unsigned int i;
274
275 memset(mask, 0, IFNAMSIZ);
276 memset(vianame, 0, IFNAMSIZ);
277
278 if (vialen + 1 > IFNAMSIZ)
279 exit_error(PARAMETER_PROBLEM,
280 "interface name `%s' must be shorter than IFNAMSIZ"
281 " (%i)", arg, IFNAMSIZ-1);
282
283 strcpy(vianame, arg);
284 if ((vialen == 0) || (vialen == 1 && vianame[0] == '+'))
285 memset(mask, 0, IFNAMSIZ);
286 else if (vianame[vialen - 1] == '+') {
287 memset(mask, 0xFF, vialen - 1);
288 memset(mask + vialen - 1, 0, IFNAMSIZ - vialen + 1);
289 /* Don't remove `+' here! -HW */
290 } else {
291 /* Include nul-terminator in match */
292 memset(mask, 0xFF, vialen + 1);
293 memset(mask + vialen + 1, 0, IFNAMSIZ - vialen - 1);
294 for (i = 0; vianame[i]; i++) {
295 if (vianame[i] == ':' ||
296 vianame[i] == '!' ||
297 vianame[i] == '*') {
Max Kellermannaae4f822007-10-17 16:36:49 +0000298 fprintf(stderr,
299 "Warning: weird character in interface"
300 " `%s' (No aliases, :, ! or *).\n",
301 vianame);
Yasuyuki KOZAKAI04f8c542007-07-24 05:53:48 +0000302 break;
303 }
304 }
305 }
306}
307
Jan Engelhardt21b41ee2008-02-11 01:02:00 +0100308static void *load_extension(const char *search_path, const char *prefix,
309 const char *name, bool is_target)
310{
311 const char *dir = search_path, *next;
312 void *ptr = NULL;
313 struct stat sb;
314 char path[256];
315
316 do {
317 next = strchr(dir, ':');
318 if (next == NULL)
319 next = dir + strlen(dir);
320 snprintf(path, sizeof(path), "%.*s/libxt_%s.so",
321 next - dir, dir, name);
322
323 if (dlopen(path, RTLD_NOW) != NULL) {
324 /* Found library. If it didn't register itself,
325 maybe they specified target as match. */
326 if (is_target)
327 ptr = find_target(name, DONT_LOAD);
328 else
329 ptr = find_match(name, DONT_LOAD, NULL);
330 } else if (stat(path, &sb) == 0) {
331 fprintf(stderr, "%s: %s\n", path, dlerror());
332 }
333
334 if (ptr != NULL)
335 return ptr;
336
337 snprintf(path, sizeof(path), "%.*s/%s%s.so",
338 next - dir, dir, prefix, name);
339 if (dlopen(path, RTLD_NOW) != NULL) {
340 if (is_target)
341 ptr = find_target(name, DONT_LOAD);
342 else
343 ptr = find_match(name, DONT_LOAD, NULL);
344 } else if (stat(path, &sb) == 0) {
345 fprintf(stderr, "%s: %s\n", path, dlerror());
346 }
347
348 if (ptr != NULL)
349 return ptr;
350
351 dir = next + 1;
352 } while (*next != '\0');
353
354 return NULL;
355}
356
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000357struct xtables_match *find_match(const char *name, enum xt_tryload tryload,
358 struct xtables_rule_match **matches)
359{
360 struct xtables_match *ptr;
361 const char *icmp6 = "icmp6";
362
363 /* This is ugly as hell. Nonetheless, there is no way of changing
364 * this without hurting backwards compatibility */
365 if ( (strcmp(name,"icmpv6") == 0) ||
366 (strcmp(name,"ipv6-icmp") == 0) ||
367 (strcmp(name,"icmp6") == 0) )
368 name = icmp6;
369
370 for (ptr = xtables_matches; ptr; ptr = ptr->next) {
371 if (strcmp(name, ptr->name) == 0) {
372 struct xtables_match *clone;
373
374 /* First match of this type: */
375 if (ptr->m == NULL)
376 break;
377
378 /* Second and subsequent clones */
379 clone = fw_malloc(sizeof(struct xtables_match));
380 memcpy(clone, ptr, sizeof(struct xtables_match));
381 clone->mflags = 0;
382 /* This is a clone: */
383 clone->next = clone;
384
385 ptr = clone;
386 break;
387 }
388 }
389
390#ifndef NO_SHARED_LIBS
391 if (!ptr && tryload != DONT_LOAD && tryload != DURING_LOAD) {
Jan Engelhardt21b41ee2008-02-11 01:02:00 +0100392 ptr = load_extension(lib_dir, afinfo.libprefix, name, false);
Yasuyuki KOZAKAI170af8c2007-08-04 05:22:17 +0000393
394 if (ptr == NULL && tryload == LOAD_MUST_SUCCEED)
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000395 exit_error(PARAMETER_PROBLEM,
396 "Couldn't load match `%s':%s\n",
397 name, dlerror());
398 }
399#else
400 if (ptr && !ptr->loaded) {
401 if (tryload != DONT_LOAD)
402 ptr->loaded = 1;
403 else
404 ptr = NULL;
405 }
406 if(!ptr && (tryload == LOAD_MUST_SUCCEED)) {
407 exit_error(PARAMETER_PROBLEM,
408 "Couldn't find match `%s'\n", name);
409 }
410#endif
411
412 if (ptr && matches) {
413 struct xtables_rule_match **i;
414 struct xtables_rule_match *newentry;
415
416 newentry = fw_malloc(sizeof(struct xtables_rule_match));
417
418 for (i = matches; *i; i = &(*i)->next) {
419 if (strcmp(name, (*i)->match->name) == 0)
420 (*i)->completed = 1;
421 }
422 newentry->match = ptr;
423 newentry->completed = 0;
424 newentry->next = NULL;
425 *i = newentry;
426 }
427
428 return ptr;
429}
430
431
432struct xtables_target *find_target(const char *name, enum xt_tryload tryload)
433{
434 struct xtables_target *ptr;
435
436 /* Standard target? */
437 if (strcmp(name, "") == 0
438 || strcmp(name, XTC_LABEL_ACCEPT) == 0
439 || strcmp(name, XTC_LABEL_DROP) == 0
440 || strcmp(name, XTC_LABEL_QUEUE) == 0
441 || strcmp(name, XTC_LABEL_RETURN) == 0)
442 name = "standard";
443
444 for (ptr = xtables_targets; ptr; ptr = ptr->next) {
445 if (strcmp(name, ptr->name) == 0)
446 break;
447 }
448
449#ifndef NO_SHARED_LIBS
450 if (!ptr && tryload != DONT_LOAD && tryload != DURING_LOAD) {
Jan Engelhardt21b41ee2008-02-11 01:02:00 +0100451 ptr = load_extension(lib_dir, afinfo.libprefix, name, true);
Yasuyuki KOZAKAI170af8c2007-08-04 05:22:17 +0000452
Yasuyuki KOZAKAI170af8c2007-08-04 05:22:17 +0000453 if (ptr == NULL && tryload == LOAD_MUST_SUCCEED)
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000454 exit_error(PARAMETER_PROBLEM,
455 "Couldn't load target `%s':%s\n",
456 name, dlerror());
457 }
458#else
459 if (ptr && !ptr->loaded) {
460 if (tryload != DONT_LOAD)
461 ptr->loaded = 1;
462 else
463 ptr = NULL;
464 }
465 if(!ptr && (tryload == LOAD_MUST_SUCCEED)) {
466 exit_error(PARAMETER_PROBLEM,
467 "Couldn't find target `%s'\n", name);
468 }
469#endif
470
471 if (ptr)
472 ptr->used = 1;
473
474 return ptr;
475}
476
477static int compatible_revision(const char *name, u_int8_t revision, int opt)
478{
479 struct xt_get_revision rev;
480 socklen_t s = sizeof(rev);
481 int max_rev, sockfd;
482
483 sockfd = socket(afinfo.family, SOCK_RAW, IPPROTO_RAW);
484 if (sockfd < 0) {
Patrick McHardydf1ef382007-12-03 15:32:28 +0000485 if (errno == EPERM) {
486 /* revision 0 is always supported. */
487 if (revision != 0)
488 fprintf(stderr, "Could not determine whether "
489 "revision %u is supported, "
490 "assuming it is.\n",
491 revision);
492 return 1;
493 }
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000494 fprintf(stderr, "Could not open socket to kernel: %s\n",
495 strerror(errno));
496 exit(1);
497 }
498
Jan Engelhardtdbb77542008-02-11 00:33:30 +0100499 load_xtables_ko(modprobe_program, 1);
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000500
501 strcpy(rev.name, name);
502 rev.revision = revision;
503
504 max_rev = getsockopt(sockfd, afinfo.ipproto, opt, &rev, &s);
505 if (max_rev < 0) {
506 /* Definitely don't support this? */
507 if (errno == ENOENT || errno == EPROTONOSUPPORT) {
508 close(sockfd);
509 return 0;
510 } else if (errno == ENOPROTOOPT) {
511 close(sockfd);
512 /* Assume only revision 0 support (old kernel) */
513 return (revision == 0);
514 } else {
515 fprintf(stderr, "getsockopt failed strangely: %s\n",
516 strerror(errno));
517 exit(1);
518 }
519 }
520 close(sockfd);
521 return 1;
522}
523
524
525static int compatible_match_revision(const char *name, u_int8_t revision)
526{
527 return compatible_revision(name, revision, afinfo.so_rev_match);
528}
529
530static int compatible_target_revision(const char *name, u_int8_t revision)
531{
532 return compatible_revision(name, revision, afinfo.so_rev_target);
533}
534
535void xtables_register_match(struct xtables_match *me)
536{
537 struct xtables_match **i, *old;
538
539 if (strcmp(me->version, program_version) != 0) {
540 fprintf(stderr, "%s: match `%s' v%s (I'm v%s).\n",
541 program_name, me->name, me->version, program_version);
542 exit(1);
543 }
544
545 /* Revision field stole a char from name. */
546 if (strlen(me->name) >= XT_FUNCTION_MAXNAMELEN-1) {
547 fprintf(stderr, "%s: target `%s' has invalid name\n",
548 program_name, me->name);
549 exit(1);
550 }
551
552 if (me->family >= NPROTO) {
553 fprintf(stderr,
554 "%s: BUG: match %s has invalid protocol family\n",
555 program_name, me->name);
556 exit(1);
557 }
558
559 /* ignore not interested match */
Jan Engelhardt23545c22008-02-14 04:23:04 +0100560 if (me->family != afinfo.family && me->family != AF_UNSPEC)
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000561 return;
562
563 old = find_match(me->name, DURING_LOAD, NULL);
564 if (old) {
Jan Engelhardt23545c22008-02-14 04:23:04 +0100565 if (old->revision == me->revision &&
566 old->family == me->family) {
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000567 fprintf(stderr,
568 "%s: match `%s' already registered.\n",
569 program_name, me->name);
570 exit(1);
571 }
572
573 /* Now we have two (or more) options, check compatibility. */
574 if (compatible_match_revision(old->name, old->revision)
575 && old->revision > me->revision)
576 return;
577
Jan Engelhardt23545c22008-02-14 04:23:04 +0100578 /* See if new match can be used. */
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000579 if (!compatible_match_revision(me->name, me->revision))
580 return;
581
Jan Engelhardt23545c22008-02-14 04:23:04 +0100582 /* Prefer !AF_UNSPEC over AF_UNSPEC for same revision. */
583 if (old->revision == me->revision && me->family == AF_UNSPEC)
584 return;
585
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000586 /* Delete old one. */
587 for (i = &xtables_matches; *i!=old; i = &(*i)->next);
588 *i = old->next;
589 }
590
591 if (me->size != XT_ALIGN(me->size)) {
592 fprintf(stderr, "%s: match `%s' has invalid size %u.\n",
593 program_name, me->name, (unsigned int)me->size);
594 exit(1);
595 }
596
597 /* Append to list. */
598 for (i = &xtables_matches; *i; i = &(*i)->next);
599 me->next = NULL;
600 *i = me;
601
602 me->m = NULL;
603 me->mflags = 0;
604}
605
606void xtables_register_target(struct xtables_target *me)
607{
608 struct xtables_target *old;
609
610 if (strcmp(me->version, program_version) != 0) {
611 fprintf(stderr, "%s: target `%s' v%s (I'm v%s).\n",
612 program_name, me->name, me->version, program_version);
613 exit(1);
614 }
615
616 /* Revision field stole a char from name. */
617 if (strlen(me->name) >= XT_FUNCTION_MAXNAMELEN-1) {
618 fprintf(stderr, "%s: target `%s' has invalid name\n",
619 program_name, me->name);
620 exit(1);
621 }
622
623 if (me->family >= NPROTO) {
624 fprintf(stderr,
625 "%s: BUG: target %s has invalid protocol family\n",
626 program_name, me->name);
627 exit(1);
628 }
629
630 /* ignore not interested target */
Jan Engelhardt23545c22008-02-14 04:23:04 +0100631 if (me->family != afinfo.family && me->family != AF_UNSPEC)
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000632 return;
633
634 old = find_target(me->name, DURING_LOAD);
635 if (old) {
636 struct xtables_target **i;
637
Jan Engelhardt23545c22008-02-14 04:23:04 +0100638 if (old->revision == me->revision &&
639 old->family == me->family) {
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000640 fprintf(stderr,
641 "%s: target `%s' already registered.\n",
642 program_name, me->name);
643 exit(1);
644 }
645
646 /* Now we have two (or more) options, check compatibility. */
647 if (compatible_target_revision(old->name, old->revision)
648 && old->revision > me->revision)
649 return;
650
Jan Engelhardt23545c22008-02-14 04:23:04 +0100651 /* See if new target can be used. */
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000652 if (!compatible_target_revision(me->name, me->revision))
653 return;
654
Jan Engelhardt23545c22008-02-14 04:23:04 +0100655 /* Prefer !AF_UNSPEC over AF_UNSPEC for same revision. */
656 if (old->revision == me->revision && me->family == AF_UNSPEC)
657 return;
658
Yasuyuki KOZAKAI0d502bc2007-07-24 05:52:07 +0000659 /* Delete old one. */
660 for (i = &xtables_targets; *i!=old; i = &(*i)->next);
661 *i = old->next;
662 }
663
664 if (me->size != XT_ALIGN(me->size)) {
665 fprintf(stderr, "%s: target `%s' has invalid size %u.\n",
666 program_name, me->name, (unsigned int)me->size);
667 exit(1);
668 }
669
670 /* Prepend to list. */
671 me->next = xtables_targets;
672 xtables_targets = me;
673 me->t = NULL;
674 me->tflags = 0;
675}
Jan Engelhardtaafd2692008-01-20 13:19:40 +0000676
677void param_act(unsigned int status, const char *p1, ...)
678{
679 const char *p2, *p3;
680 va_list args;
681 bool b;
682
683 va_start(args, p1);
684
685 switch (status) {
686 case P_ONLY_ONCE:
687 p2 = va_arg(args, const char *);
688 b = va_arg(args, unsigned int);
689 if (!b)
690 return;
691 exit_error(PARAMETER_PROBLEM,
692 "%s: \"%s\" option may only be specified once",
693 p1, p2);
694 break;
695 case P_NO_INVERT:
696 p2 = va_arg(args, const char *);
697 b = va_arg(args, unsigned int);
698 if (!b)
699 return;
700 exit_error(PARAMETER_PROBLEM,
701 "%s: \"%s\" option cannot be inverted", p1, p2);
702 break;
703 case P_BAD_VALUE:
704 p2 = va_arg(args, const char *);
705 p3 = va_arg(args, const char *);
706 exit_error(PARAMETER_PROBLEM,
707 "%s: Bad value for \"%s\" option: \"%s\"",
708 p1, p2, p3);
709 break;
710 case P_ONE_ACTION:
711 b = va_arg(args, unsigned int);
712 if (!b)
713 return;
714 exit_error(PARAMETER_PROBLEM,
715 "%s: At most one action is possible", p1);
716 break;
717 default:
718 exit_error(status, p1, args);
719 break;
720 }
721
722 va_end(args);
723}
Jan Engelhardt08b16162008-01-20 13:36:08 +0000724
725const char *ipaddr_to_numeric(const struct in_addr *addrp)
726{
727 static char buf[20];
728 const unsigned char *bytep = (const void *)&addrp->s_addr;
729
730 sprintf(buf, "%u.%u.%u.%u", bytep[0], bytep[1], bytep[2], bytep[3]);
731 return buf;
732}
733
734static const char *ipaddr_to_host(const struct in_addr *addr)
735{
736 struct hostent *host;
737
738 host = gethostbyaddr(addr, sizeof(struct in_addr), AF_INET);
739 if (host == NULL)
740 return NULL;
741
742 return host->h_name;
743}
744
745static const char *ipaddr_to_network(const struct in_addr *addr)
746{
747 struct netent *net;
748
749 if ((net = getnetbyaddr(ntohl(addr->s_addr), AF_INET)) != NULL)
750 return net->n_name;
751
752 return NULL;
753}
754
755const char *ipaddr_to_anyname(const struct in_addr *addr)
756{
757 const char *name;
758
759 if ((name = ipaddr_to_host(addr)) != NULL ||
760 (name = ipaddr_to_network(addr)) != NULL)
761 return name;
762
763 return ipaddr_to_numeric(addr);
764}
765
766const char *ipmask_to_numeric(const struct in_addr *mask)
767{
768 static char buf[20];
769 uint32_t maskaddr, bits;
770 int i;
771
772 maskaddr = ntohl(mask->s_addr);
773
774 if (maskaddr == 0xFFFFFFFFL)
775 /* we don't want to see "/32" */
776 return "";
777
778 i = 32;
779 bits = 0xFFFFFFFEL;
780 while (--i >= 0 && maskaddr != bits)
781 bits <<= 1;
782 if (i >= 0)
783 sprintf(buf, "/%d", i);
784 else
785 /* mask was not a decent combination of 1's and 0's */
786 sprintf(buf, "/%s", ipaddr_to_numeric(mask));
787
788 return buf;
789}
790
Jan Engelhardtbd943842008-01-20 13:38:08 +0000791static struct in_addr *__numeric_to_ipaddr(const char *dotted, bool is_mask)
792{
793 static struct in_addr addr;
794 unsigned char *addrp;
795 unsigned int onebyte;
796 char buf[20], *p, *q;
797 int i;
798
799 /* copy dotted string, because we need to modify it */
800 strncpy(buf, dotted, sizeof(buf) - 1);
801 buf[sizeof(buf) - 1] = '\0';
802 addrp = (void *)&addr.s_addr;
803
804 p = buf;
805 for (i = 0; i < 3; ++i) {
806 if ((q = strchr(p, '.')) == NULL) {
807 if (is_mask)
808 return NULL;
809
810 /* autocomplete, this is a network address */
811 if (!strtonum(p, NULL, &onebyte, 0, 255))
812 return NULL;
813
814 addrp[i] = onebyte;
815 while (i < 3)
816 addrp[++i] = 0;
817
818 return &addr;
819 }
820
821 *q = '\0';
822 if (!strtonum(p, NULL, &onebyte, 0, 255))
823 return NULL;
824
825 addrp[i] = onebyte;
826 p = q + 1;
827 }
828
829 /* we have checked 3 bytes, now we check the last one */
830 if (!strtonum(p, NULL, &onebyte, 0, 255))
831 return NULL;
832
833 addrp[3] = onebyte;
834 return &addr;
835}
836
837struct in_addr *numeric_to_ipaddr(const char *dotted)
838{
839 return __numeric_to_ipaddr(dotted, false);
840}
841
842struct in_addr *numeric_to_ipmask(const char *dotted)
843{
844 return __numeric_to_ipaddr(dotted, true);
845}
846
847static struct in_addr *network_to_ipaddr(const char *name)
848{
849 static struct in_addr addr;
850 struct netent *net;
851
852 if ((net = getnetbyname(name)) != NULL) {
853 if (net->n_addrtype != AF_INET)
854 return NULL;
855 addr.s_addr = htonl(net->n_net);
856 return &addr;
857 }
858
859 return NULL;
860}
861
862static struct in_addr *host_to_ipaddr(const char *name, unsigned int *naddr)
863{
864 struct hostent *host;
865 struct in_addr *addr;
866 unsigned int i;
867
868 *naddr = 0;
869 if ((host = gethostbyname(name)) != NULL) {
870 if (host->h_addrtype != AF_INET ||
871 host->h_length != sizeof(struct in_addr))
872 return NULL;
873
874 while (host->h_addr_list[*naddr] != NULL)
875 ++*naddr;
876 addr = fw_calloc(*naddr, sizeof(struct in_addr) * *naddr);
877 for (i = 0; i < *naddr; i++)
878 memcpy(&addr[i], host->h_addr_list[i],
879 sizeof(struct in_addr));
880 return addr;
881 }
882
883 return NULL;
884}
885
886static struct in_addr *
887ipparse_hostnetwork(const char *name, unsigned int *naddrs)
888{
889 struct in_addr *addrptmp, *addrp;
890
891 if ((addrptmp = numeric_to_ipaddr(name)) != NULL ||
892 (addrptmp = network_to_ipaddr(name)) != NULL) {
893 addrp = fw_malloc(sizeof(struct in_addr));
894 memcpy(addrp, addrptmp, sizeof(*addrp));
895 *naddrs = 1;
896 return addrp;
897 }
898 if ((addrptmp = host_to_ipaddr(name, naddrs)) != NULL)
899 return addrptmp;
900
901 exit_error(PARAMETER_PROBLEM, "host/network `%s' not found", name);
902}
903
904static struct in_addr *parse_ipmask(const char *mask)
905{
906 static struct in_addr maskaddr;
907 struct in_addr *addrp;
908 unsigned int bits;
909
910 if (mask == NULL) {
911 /* no mask at all defaults to 32 bits */
912 maskaddr.s_addr = 0xFFFFFFFF;
913 return &maskaddr;
914 }
915 if ((addrp = numeric_to_ipmask(mask)) != NULL)
916 /* dotted_to_addr already returns a network byte order addr */
917 return addrp;
918 if (string_to_number(mask, 0, 32, &bits) == -1)
919 exit_error(PARAMETER_PROBLEM,
920 "invalid mask `%s' specified", mask);
921 if (bits != 0) {
922 maskaddr.s_addr = htonl(0xFFFFFFFF << (32 - bits));
923 return &maskaddr;
924 }
925
926 maskaddr.s_addr = 0U;
927 return &maskaddr;
928}
929
930void ipparse_hostnetworkmask(const char *name, struct in_addr **addrpp,
931 struct in_addr *maskp, unsigned int *naddrs)
932{
933 unsigned int i, j, k, n;
934 struct in_addr *addrp;
935 char buf[256], *p;
936
937 strncpy(buf, name, sizeof(buf) - 1);
938 buf[sizeof(buf) - 1] = '\0';
939 if ((p = strrchr(buf, '/')) != NULL) {
940 *p = '\0';
941 addrp = parse_ipmask(p + 1);
942 } else {
943 addrp = parse_ipmask(NULL);
944 }
945 memcpy(maskp, addrp, sizeof(*maskp));
946
947 /* if a null mask is given, the name is ignored, like in "any/0" */
948 if (maskp->s_addr == 0U)
949 strcpy(buf, "0.0.0.0");
950
951 addrp = *addrpp = ipparse_hostnetwork(buf, naddrs);
952 n = *naddrs;
953 for (i = 0, j = 0; i < n; ++i) {
954 addrp[j++].s_addr &= maskp->s_addr;
955 for (k = 0; k < j - 1; ++k)
956 if (addrp[k].s_addr == addrp[j-1].s_addr) {
957 --*naddrs;
958 --j;
959 break;
960 }
961 }
962}
963
Jan Engelhardt08b16162008-01-20 13:36:08 +0000964const char *ip6addr_to_numeric(const struct in6_addr *addrp)
965{
966 /* 0000:0000:0000:0000:0000:000.000.000.000
967 * 0000:0000:0000:0000:0000:0000:0000:0000 */
968 static char buf[50+1];
969 return inet_ntop(AF_INET6, addrp, buf, sizeof(buf));
970}
971
972static const char *ip6addr_to_host(const struct in6_addr *addr)
973{
974 static char hostname[NI_MAXHOST];
975 struct sockaddr_in6 saddr;
976 int err;
977
978 memset(&saddr, 0, sizeof(struct sockaddr_in6));
979 memcpy(&saddr.sin6_addr, addr, sizeof(*addr));
980 saddr.sin6_family = AF_INET6;
981
982 err = getnameinfo((const void *)&saddr, sizeof(struct sockaddr_in6),
983 hostname, sizeof(hostname) - 1, NULL, 0, 0);
984 if (err != 0) {
985#ifdef DEBUG
986 fprintf(stderr,"IP2Name: %s\n",gai_strerror(err));
987#endif
988 return NULL;
989 }
990
991#ifdef DEBUG
992 fprintf (stderr, "\naddr2host: %s\n", hostname);
993#endif
994 return hostname;
995}
996
997const char *ip6addr_to_anyname(const struct in6_addr *addr)
998{
999 const char *name;
1000
1001 if ((name = ip6addr_to_host(addr)) != NULL)
1002 return name;
1003
1004 return ip6addr_to_numeric(addr);
1005}
1006
1007static int ip6addr_prefix_length(const struct in6_addr *k)
1008{
1009 unsigned int bits = 0;
1010 uint32_t a, b, c, d;
1011
1012 a = k->s6_addr32[0];
1013 b = k->s6_addr32[1];
1014 c = k->s6_addr32[2];
1015 d = k->s6_addr32[3];
1016 while (a & 0x80000000U) {
1017 ++bits;
1018 a <<= 1;
1019 a |= (b >> 31) & 1;
1020 b <<= 1;
1021 b |= (c >> 31) & 1;
1022 c <<= 1;
1023 c |= (d >> 31) & 1;
1024 d <<= 1;
1025 }
1026 if (a != 0 || b != 0 || c != 0 || d != 0)
1027 return -1;
1028 return bits;
1029}
1030
1031const char *ip6mask_to_numeric(const struct in6_addr *addrp)
1032{
1033 static char buf[50+2];
1034 int l = ip6addr_prefix_length(addrp);
1035
1036 if (l == -1) {
1037 strcpy(buf, "/");
1038 strcat(buf, ip6addr_to_numeric(addrp));
1039 return buf;
1040 }
1041 sprintf(buf, "/%d", l);
1042 return buf;
1043}
Jan Engelhardtbd943842008-01-20 13:38:08 +00001044
1045struct in6_addr *numeric_to_ip6addr(const char *num)
1046{
1047 static struct in6_addr ap;
1048 int err;
1049
1050 if ((err = inet_pton(AF_INET6, num, &ap)) == 1)
1051 return &ap;
1052#ifdef DEBUG
1053 fprintf(stderr, "\nnumeric2addr: %d\n", err);
1054#endif
1055 return NULL;
1056}
1057
1058static struct in6_addr *
1059host_to_ip6addr(const char *name, unsigned int *naddr)
1060{
1061 static struct in6_addr *addr;
1062 struct addrinfo hints;
1063 struct addrinfo *res;
1064 int err;
1065
1066 memset(&hints, 0, sizeof(hints));
1067 hints.ai_flags = AI_CANONNAME;
1068 hints.ai_family = AF_INET6;
1069 hints.ai_socktype = SOCK_RAW;
1070 hints.ai_protocol = IPPROTO_IPV6;
1071 hints.ai_next = NULL;
1072
1073 *naddr = 0;
1074 if ((err = getaddrinfo(name, NULL, &hints, &res)) != 0) {
1075#ifdef DEBUG
1076 fprintf(stderr,"Name2IP: %s\n",gai_strerror(err));
1077#endif
1078 return NULL;
1079 } else {
1080 if (res->ai_family != AF_INET6 ||
1081 res->ai_addrlen != sizeof(struct sockaddr_in6))
1082 return NULL;
1083
1084#ifdef DEBUG
1085 fprintf(stderr, "resolved: len=%d %s ", res->ai_addrlen,
1086 ip6addr_to_numeric(&((struct sockaddr_in6 *)res->ai_addr)->sin6_addr));
1087#endif
1088 /* Get the first element of the address-chain */
1089 addr = fw_malloc(sizeof(struct in6_addr));
1090 memcpy(addr, &((const struct sockaddr_in6 *)res->ai_addr)->sin6_addr,
1091 sizeof(struct in6_addr));
1092 freeaddrinfo(res);
1093 *naddr = 1;
1094 return addr;
1095 }
1096
1097 return NULL;
1098}
1099
1100static struct in6_addr *network_to_ip6addr(const char *name)
1101{
1102 /* abort();*/
1103 /* TODO: not implemented yet, but the exception breaks the
1104 * name resolvation */
1105 return NULL;
1106}
1107
1108static struct in6_addr *
1109ip6parse_hostnetwork(const char *name, unsigned int *naddrs)
1110{
1111 struct in6_addr *addrp, *addrptmp;
1112
1113 if ((addrptmp = numeric_to_ip6addr(name)) != NULL ||
1114 (addrptmp = network_to_ip6addr(name)) != NULL) {
1115 addrp = fw_malloc(sizeof(struct in6_addr));
1116 memcpy(addrp, addrptmp, sizeof(*addrp));
1117 *naddrs = 1;
1118 return addrp;
1119 }
1120 if ((addrp = host_to_ip6addr(name, naddrs)) != NULL)
1121 return addrp;
1122
1123 exit_error(PARAMETER_PROBLEM, "host/network `%s' not found", name);
1124}
1125
1126static struct in6_addr *parse_ip6mask(char *mask)
1127{
1128 static struct in6_addr maskaddr;
1129 struct in6_addr *addrp;
1130 unsigned int bits;
1131
1132 if (mask == NULL) {
1133 /* no mask at all defaults to 128 bits */
1134 memset(&maskaddr, 0xff, sizeof maskaddr);
1135 return &maskaddr;
1136 }
1137 if ((addrp = numeric_to_ip6addr(mask)) != NULL)
1138 return addrp;
1139 if (string_to_number(mask, 0, 128, &bits) == -1)
1140 exit_error(PARAMETER_PROBLEM,
1141 "invalid mask `%s' specified", mask);
1142 if (bits != 0) {
1143 char *p = (void *)&maskaddr;
1144 memset(p, 0xff, bits / 8);
1145 memset(p + (bits / 8) + 1, 0, (128 - bits) / 8);
1146 p[bits/8] = 0xff << (8 - (bits & 7));
1147 return &maskaddr;
1148 }
1149
1150 memset(&maskaddr, 0, sizeof(maskaddr));
1151 return &maskaddr;
1152}
1153
1154void ip6parse_hostnetworkmask(const char *name, struct in6_addr **addrpp,
1155 struct in6_addr *maskp, unsigned int *naddrs)
1156{
1157 struct in6_addr *addrp;
1158 unsigned int i, j, k, n;
1159 char buf[256], *p;
1160
1161 strncpy(buf, name, sizeof(buf) - 1);
1162 buf[sizeof(buf)-1] = '\0';
1163 if ((p = strrchr(buf, '/')) != NULL) {
1164 *p = '\0';
1165 addrp = parse_ip6mask(p + 1);
1166 } else {
1167 addrp = parse_ip6mask(NULL);
1168 }
1169 memcpy(maskp, addrp, sizeof(*maskp));
1170
1171 /* if a null mask is given, the name is ignored, like in "any/0" */
1172 if (memcmp(maskp, &in6addr_any, sizeof(in6addr_any)) == 0)
1173 strcpy(buf, "::");
1174
1175 addrp = *addrpp = ip6parse_hostnetwork(buf, naddrs);
1176 n = *naddrs;
1177 for (i = 0, j = 0; i < n; ++i) {
1178 for (k = 0; k < 4; ++k)
1179 addrp[j].in6_u.u6_addr32[k] &= maskp->in6_u.u6_addr32[k];
1180 ++j;
1181 for (k = 0; k < j - 1; ++k)
1182 if (IN6_ARE_ADDR_EQUAL(&addrp[k], &addrp[j - 1])) {
1183 --*naddrs;
1184 --j;
1185 break;
1186 }
1187 }
1188}
Max Kellermanna5d09942008-01-29 13:44:34 +00001189
1190void save_string(const char *value)
1191{
1192 static const char no_quote_chars[] = "_-0123456789"
1193 "abcdefghijklmnopqrstuvwxyz"
1194 "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
1195 static const char escape_chars[] = "\"\\'";
1196 size_t length;
1197 const char *p;
1198
1199 length = strcspn(value, no_quote_chars);
1200 if (length > 0 && value[length] == 0) {
1201 /* no quoting required */
1202 fputs(value, stdout);
1203 putchar(' ');
1204 } else {
1205 /* there is at least one dangerous character in the
1206 value, which we have to quote. Write double quotes
1207 around the value and escape special characters with
1208 a backslash */
1209 putchar('"');
1210
1211 for (p = strpbrk(value, escape_chars); p != NULL;
1212 p = strpbrk(value, escape_chars)) {
1213 if (p > value)
1214 fwrite(value, 1, p - value, stdout);
1215 putchar('\\');
1216 putchar(*p);
1217 value = p + 1;
1218 }
1219
1220 /* print the rest and finish the double quoted
1221 string */
1222 fputs(value, stdout);
1223 printf("\" ");
1224 }
1225}