1994-10-28 15:09:49 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1993 Daniel Boulet
|
|
|
|
* Copyright (c) 1994 Ugen J.S.Antsilevich
|
|
|
|
*
|
|
|
|
* Redistribution and use in source forms, with and without modification,
|
|
|
|
* are permitted provided that this entire comment appears intact.
|
|
|
|
*
|
|
|
|
* Redistribution in binary form may occur without any restrictions.
|
|
|
|
* Obviously, it would be nice if you gave credit where credit is due
|
|
|
|
* but requiring it would be too onerous.
|
|
|
|
*
|
|
|
|
* This software is provided ``AS IS'' without any warranties of any kind.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Format of an IP firewall descriptor
|
|
|
|
*
|
1994-12-13 15:57:34 +00:00
|
|
|
* fw_src, fw_dst, fw_smsk, fw_dmsk are always stored in network byte order.
|
|
|
|
* fw_flg and fw_n*p are stored in host byte order (of course).
|
1994-10-28 15:09:49 +00:00
|
|
|
* Port numbers are stored in HOST byte order.
|
|
|
|
*/
|
1994-10-31 23:58:04 +00:00
|
|
|
#ifndef _IP_FW_H
|
|
|
|
#define _IP_FW_H
|
1994-10-28 15:09:49 +00:00
|
|
|
|
1994-11-08 12:47:29 +00:00
|
|
|
struct ip_fw {
|
1994-12-13 15:57:34 +00:00
|
|
|
struct ip_fw *fw_next; /* Next firewall on chain */
|
|
|
|
struct in_addr fw_src, fw_dst; /* Source and destination IP addr */
|
|
|
|
struct in_addr fw_smsk, fw_dmsk; /* Mask for src and dest IP addr */
|
|
|
|
struct in_addr fw_via; /* IP addr of interface "via" */
|
|
|
|
u_short fw_flg; /* Flags word */
|
|
|
|
u_short fw_nsp, fw_ndp; /* N'of src ports and # of dst ports */
|
1994-10-28 15:09:49 +00:00
|
|
|
/* in ports array (dst ports follow */
|
|
|
|
/* src ports; max of 10 ports in all; */
|
|
|
|
/* count of 0 means match all ports) */
|
1994-11-16 10:17:11 +00:00
|
|
|
#define IP_FW_MAX_PORTS 10 /* A reasonable maximum */
|
1994-12-13 15:57:34 +00:00
|
|
|
u_short fw_pts[IP_FW_MAX_PORTS]; /* Array of port numbers to match */
|
|
|
|
u_long fw_pcnt,fw_bcnt; /* Packet and byte counters */
|
1994-10-28 15:09:49 +00:00
|
|
|
};
|
|
|
|
|
1994-11-08 12:47:29 +00:00
|
|
|
/*
|
|
|
|
* Values for "flags" field .
|
|
|
|
*/
|
|
|
|
|
1994-11-28 12:35:14 +00:00
|
|
|
#define IP_FW_F_ALL 0x000 /* This is a universal packet firewall*/
|
|
|
|
#define IP_FW_F_TCP 0x001 /* This is a TCP packet firewall */
|
|
|
|
#define IP_FW_F_UDP 0x002 /* This is a UDP packet firewall */
|
|
|
|
#define IP_FW_F_ICMP 0x003 /* This is a ICMP packet firewall */
|
|
|
|
#define IP_FW_F_KIND 0x003 /* Mask to isolate firewall kind */
|
|
|
|
#define IP_FW_F_ACCEPT 0x004 /* This is an accept firewall (as *
|
1994-11-08 12:47:29 +00:00
|
|
|
* opposed to a deny firewall)*
|
|
|
|
* */
|
1994-11-28 12:35:14 +00:00
|
|
|
#define IP_FW_F_SRNG 0x008 /* The first two src ports are a min *
|
1994-11-08 12:47:29 +00:00
|
|
|
* and max range (stored in host byte *
|
|
|
|
* order). *
|
|
|
|
* */
|
1994-11-28 12:35:14 +00:00
|
|
|
#define IP_FW_F_DRNG 0x010 /* The first two dst ports are a min *
|
1994-11-08 12:47:29 +00:00
|
|
|
* and max range (stored in host byte *
|
|
|
|
* order). *
|
|
|
|
* (ports[0] <= port <= ports[1]) *
|
|
|
|
* */
|
1994-11-28 12:35:14 +00:00
|
|
|
#define IP_FW_F_PRN 0x020 /* In verbose mode print this firewall*/
|
|
|
|
#define IP_FW_F_BIDIR 0x040 /* For accounting-count two way */
|
|
|
|
#define IP_FW_F_TCPSYN 0x080 /* For tcp packets-check SYN only */
|
|
|
|
#define IP_FW_F_ICMPRPL 0x100 /* Send back icmp unreachable packet */
|
|
|
|
#define IP_FW_F_MASK 0x1FF /* All possible flag bits mask */
|
1994-11-08 12:47:29 +00:00
|
|
|
|
1994-10-28 15:09:49 +00:00
|
|
|
/*
|
|
|
|
* New IP firewall options for [gs]etsockopt at the RAW IP level.
|
|
|
|
*/
|
|
|
|
#define IP_FW_BASE_CTL 53
|
|
|
|
|
1995-01-12 13:06:32 +00:00
|
|
|
#define IP_FW_ADD (IP_FW_BASE_CTL)
|
|
|
|
#define IP_FW_DEL (IP_FW_BASE_CTL+4)
|
1994-10-28 15:09:49 +00:00
|
|
|
#define IP_FW_FLUSH (IP_FW_BASE_CTL+6)
|
|
|
|
#define IP_FW_POLICY (IP_FW_BASE_CTL+7)
|
|
|
|
|
1994-11-16 10:17:11 +00:00
|
|
|
#define IP_ACCT_ADD (IP_FW_BASE_CTL+10)
|
|
|
|
#define IP_ACCT_DEL (IP_FW_BASE_CTL+11)
|
|
|
|
#define IP_ACCT_FLUSH (IP_FW_BASE_CTL+12)
|
|
|
|
#define IP_ACCT_ZERO (IP_FW_BASE_CTL+13)
|
1994-12-13 15:57:34 +00:00
|
|
|
#define IP_ACCT_CLR (IP_FW_BASE_CTL+14)
|
1994-11-16 10:17:11 +00:00
|
|
|
|
1994-11-28 12:35:14 +00:00
|
|
|
/*
|
|
|
|
* Policy flags...
|
|
|
|
*/
|
|
|
|
#define IP_FW_P_DENY 0x01
|
|
|
|
#define IP_FW_P_ICMP 0x02
|
|
|
|
#define IP_FW_P_MASK 0x03
|
|
|
|
|
1994-10-28 15:09:49 +00:00
|
|
|
|
1994-11-08 12:47:29 +00:00
|
|
|
/*
|
|
|
|
* Main firewall chains definitions and global var's definitions.
|
|
|
|
*/
|
1994-11-16 10:17:11 +00:00
|
|
|
#ifdef KERNEL
|
1995-01-12 13:06:32 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Variables/chain.
|
|
|
|
*/
|
|
|
|
extern struct ip_fw *ip_fw_chain;
|
1994-11-28 12:35:14 +00:00
|
|
|
extern u_short ip_fw_policy;
|
1995-01-12 13:06:32 +00:00
|
|
|
|
|
|
|
extern struct ip_fw *ip_acct_chain;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Function pointers.
|
|
|
|
*/
|
|
|
|
extern int (*ip_fw_chk_ptr)(struct ip *,struct ifnet *,struct ip_fw *);
|
|
|
|
extern int (*ip_fw_ctl_ptr)(int,struct mbuf *);
|
|
|
|
|
|
|
|
extern void (*ip_acct_cnt_ptr)(struct ip *,struct ifnet *,struct ip_fw *,int);
|
|
|
|
extern int (*ip_acct_ctl_ptr)(int,struct mbuf *);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Function definitions.
|
|
|
|
*/
|
|
|
|
int ip_fw_chk(struct ip *,struct ifnet *,struct ip_fw *);
|
|
|
|
int ip_fw_ctl(int,struct mbuf *);
|
|
|
|
|
|
|
|
void ip_acct_cnt(struct ip *,struct ifnet *,struct ip_fw *,int);
|
|
|
|
int ip_acct_ctl(int,struct mbuf *);
|
|
|
|
|
1994-11-16 10:17:11 +00:00
|
|
|
#endif /* KERNEL */
|
|
|
|
|
|
|
|
#endif /* _IP_FW_H */
|