blob: 1918df82ccdefd91e137e761fe958db4f5ae723a [file] [log] [blame]
Marc Bouchere6869a82000-03-20 06:03:29 +00001/* Shared library add-on to iptables to add redirect support. */
2#include <stdio.h>
3#include <netdb.h>
4#include <string.h>
5#include <stdlib.h>
6#include <getopt.h>
7#include <iptables.h>
8#include <linux/netfilter_ipv4/ip_tables.h>
Patrick McHardy40d54752007-04-18 07:00:36 +00009#include <linux/netfilter/nf_nat.h>
Marc Bouchere6869a82000-03-20 06:03:29 +000010
Patrick McHardyef399a32007-05-29 11:24:45 +000011#define IPT_REDIRECT_OPT_DEST 0x01
12#define IPT_REDIRECT_OPT_RANDOM 0x02
13
Marc Bouchere6869a82000-03-20 06:03:29 +000014/* Function which prints out usage message. */
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +000015static void REDIRECT_help(void)
Marc Bouchere6869a82000-03-20 06:03:29 +000016{
17 printf(
18"REDIRECT v%s options:\n"
19" --to-ports <port>[-<port>]\n"
20" Port (range) to map to.\n\n",
Harald Welte80fe35d2002-05-29 13:08:15 +000021IPTABLES_VERSION);
Marc Bouchere6869a82000-03-20 06:03:29 +000022}
23
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +000024static const struct option REDIRECT_opts[] = {
Patrick McHardy500f4832007-09-08 15:59:04 +000025 { "to-ports", 1, NULL, '1' },
Tom Eastep75b4b202007-11-15 13:06:58 +000026 { "random", 0, NULL, '2' },
Max Kellermann9ee386a2008-01-29 13:48:05 +000027 { .name = NULL }
Marc Bouchere6869a82000-03-20 06:03:29 +000028};
29
30/* Initialize the target. */
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +000031static void REDIRECT_init(struct xt_entry_target *t)
Marc Bouchere6869a82000-03-20 06:03:29 +000032{
33 struct ip_nat_multi_range *mr = (struct ip_nat_multi_range *)t->data;
34
35 /* Actually, it's 0, but it's ignored at the moment. */
36 mr->rangesize = 1;
37
Marc Bouchere6869a82000-03-20 06:03:29 +000038}
39
40/* Parses ports */
41static void
42parse_ports(const char *arg, struct ip_nat_multi_range *mr)
43{
44 const char *dash;
45 int port;
46
47 mr->range[0].flags |= IP_NAT_RANGE_PROTO_SPECIFIED;
48
Phil Oester3836fcc2006-06-20 13:45:38 +000049 if (strchr(arg, '.'))
50 exit_error(PARAMETER_PROBLEM, "IP address not permitted\n");
51
Marc Bouchere6869a82000-03-20 06:03:29 +000052 port = atoi(arg);
53 if (port == 0 || port > 65535)
54 exit_error(PARAMETER_PROBLEM, "Port `%s' not valid\n", arg);
55
56 dash = strchr(arg, '-');
57 if (!dash) {
58 mr->range[0].min.tcp.port
59 = mr->range[0].max.tcp.port
Rusty Russellf9b2e662000-04-19 11:24:02 +000060 = htons(port);
Marc Bouchere6869a82000-03-20 06:03:29 +000061 } else {
62 int maxport;
63
64 maxport = atoi(dash + 1);
65 if (maxport == 0 || maxport > 65535)
66 exit_error(PARAMETER_PROBLEM,
67 "Port `%s' not valid\n", dash+1);
68 if (maxport < port)
69 /* People are stupid. */
70 exit_error(PARAMETER_PROBLEM,
71 "Port range `%s' funky\n", arg);
Rusty Russellf9b2e662000-04-19 11:24:02 +000072 mr->range[0].min.tcp.port = htons(port);
73 mr->range[0].max.tcp.port = htons(maxport);
Marc Bouchere6869a82000-03-20 06:03:29 +000074 }
75}
76
77/* Function which parses command options; returns true if it
78 ate an option */
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +000079static int REDIRECT_parse(int c, char **argv, int invert, unsigned int *flags,
80 const void *e, struct xt_entry_target **target)
Marc Bouchere6869a82000-03-20 06:03:29 +000081{
Yasuyuki KOZAKAIac8b2712007-07-24 06:06:59 +000082 const struct ipt_entry *entry = e;
Marc Bouchere6869a82000-03-20 06:03:29 +000083 struct ip_nat_multi_range *mr
84 = (struct ip_nat_multi_range *)(*target)->data;
85 int portok;
86
87 if (entry->ip.proto == IPPROTO_TCP
Patrick McHardy36d870c2005-07-22 06:39:45 +000088 || entry->ip.proto == IPPROTO_UDP
89 || entry->ip.proto == IPPROTO_ICMP)
Marc Bouchere6869a82000-03-20 06:03:29 +000090 portok = 1;
91 else
92 portok = 0;
93
94 switch (c) {
95 case '1':
96 if (!portok)
97 exit_error(PARAMETER_PROBLEM,
98 "Need TCP or UDP with port specification");
99
Harald Welteb77f1da2002-03-14 11:35:58 +0000100 if (check_inverse(optarg, &invert, NULL, 0))
Marc Bouchere6869a82000-03-20 06:03:29 +0000101 exit_error(PARAMETER_PROBLEM,
102 "Unexpected `!' after --to-ports");
103
104 parse_ports(optarg, mr);
Patrick McHardyef399a32007-05-29 11:24:45 +0000105 if (*flags & IPT_REDIRECT_OPT_RANDOM)
106 mr->range[0].flags |= IP_NAT_RANGE_PROTO_RANDOM;
107 *flags |= IPT_REDIRECT_OPT_DEST;
108 return 1;
109
110 case '2':
111 if (*flags & IPT_REDIRECT_OPT_DEST) {
112 mr->range[0].flags |= IP_NAT_RANGE_PROTO_RANDOM;
113 *flags |= IPT_REDIRECT_OPT_RANDOM;
114 } else
115 *flags |= IPT_REDIRECT_OPT_RANDOM;
Marc Bouchere6869a82000-03-20 06:03:29 +0000116 return 1;
117
118 default:
119 return 0;
120 }
121}
122
Marc Bouchere6869a82000-03-20 06:03:29 +0000123/* Prints out the targinfo. */
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +0000124static void REDIRECT_print(const void *ip, const struct xt_entry_target *target,
125 int numeric)
Marc Bouchere6869a82000-03-20 06:03:29 +0000126{
127 struct ip_nat_multi_range *mr
128 = (struct ip_nat_multi_range *)target->data;
129 struct ip_nat_range *r = &mr->range[0];
130
Marc Bouchere6869a82000-03-20 06:03:29 +0000131 if (r->flags & IP_NAT_RANGE_PROTO_SPECIFIED) {
Rusty Russell849779c2000-04-23 15:51:51 +0000132 printf("redir ports ");
Rusty Russellf9b2e662000-04-19 11:24:02 +0000133 printf("%hu", ntohs(r->min.tcp.port));
Marc Bouchere6869a82000-03-20 06:03:29 +0000134 if (r->max.tcp.port != r->min.tcp.port)
Rusty Russellf9b2e662000-04-19 11:24:02 +0000135 printf("-%hu", ntohs(r->max.tcp.port));
Marc Bouchere6869a82000-03-20 06:03:29 +0000136 printf(" ");
Patrick McHardyef399a32007-05-29 11:24:45 +0000137 if (mr->range[0].flags & IP_NAT_RANGE_PROTO_RANDOM)
138 printf("random ");
Marc Bouchere6869a82000-03-20 06:03:29 +0000139 }
140}
141
142/* Saves the union ipt_targinfo in parsable form to stdout. */
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +0000143static void REDIRECT_save(const void *ip, const struct xt_entry_target *target)
Marc Bouchere6869a82000-03-20 06:03:29 +0000144{
145 struct ip_nat_multi_range *mr
146 = (struct ip_nat_multi_range *)target->data;
147 struct ip_nat_range *r = &mr->range[0];
148
149 if (r->flags & IP_NAT_RANGE_PROTO_SPECIFIED) {
Harald Welte963bdcc2001-03-16 20:37:10 +0000150 printf("--to-ports ");
Rusty Russellf9b2e662000-04-19 11:24:02 +0000151 printf("%hu", ntohs(r->min.tcp.port));
Marc Bouchere6869a82000-03-20 06:03:29 +0000152 if (r->max.tcp.port != r->min.tcp.port)
Rusty Russellf9b2e662000-04-19 11:24:02 +0000153 printf("-%hu", ntohs(r->max.tcp.port));
Marc Bouchere6869a82000-03-20 06:03:29 +0000154 printf(" ");
Patrick McHardyef399a32007-05-29 11:24:45 +0000155 if (mr->range[0].flags & IP_NAT_RANGE_PROTO_RANDOM)
156 printf("--random ");
Marc Bouchere6869a82000-03-20 06:03:29 +0000157 }
158}
159
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +0000160static struct iptables_target redirect_target = {
Pablo Neira8caee8b2004-12-28 13:11:59 +0000161 .name = "REDIRECT",
162 .version = IPTABLES_VERSION,
163 .size = IPT_ALIGN(sizeof(struct ip_nat_multi_range)),
164 .userspacesize = IPT_ALIGN(sizeof(struct ip_nat_multi_range)),
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +0000165 .help = REDIRECT_help,
166 .init = REDIRECT_init,
167 .parse = REDIRECT_parse,
168 .print = REDIRECT_print,
169 .save = REDIRECT_save,
170 .extra_opts = REDIRECT_opts,
Marc Bouchere6869a82000-03-20 06:03:29 +0000171};
172
173void _init(void)
174{
Jan Engelhardt1d5b63d2007-10-04 16:29:00 +0000175 register_target(&redirect_target);
Marc Bouchere6869a82000-03-20 06:03:29 +0000176}