Wrap ipfw nat support in a new kernel config option named

"IPFIREWALL_NAT": this way nat is turned off by default and
POLA is preserved.

Reviewed by: rwatson
This commit is contained in:
Paolo Pisati 2007-01-03 11:12:54 +00:00
parent d64492c407
commit 61c0e134f5
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=165750
3 changed files with 22 additions and 1 deletions

View File

@ -841,6 +841,10 @@ device stf #6to4 IPv6 over IPv4 encapsulation
# packets too. Because of this great care is required when
# crafting the ruleset.
#
# IPFIREWALL_NAT adds support for in kernel nat in ipfw, and it requires
# LIBALIAS. To build an ipfw kld with nat support enabled, add
# "CFLAGS+= -DIPFIREWALL_NAT" to your make.conf.
#
# IPSTEALTH enables code to support stealth forwarding (i.e., forwarding
# packets without touching the TTL). This can be useful to hide firewalls
# from traceroute and similar tools.
@ -856,6 +860,7 @@ options IPFIREWALL_VERBOSE #enable logging to syslogd(8)
options IPFIREWALL_VERBOSE_LIMIT=100 #limit verbosity
options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default
options IPFIREWALL_FORWARD #packet destination changes
options IPFIREWALL_NAT #ipfw kernel nat support
options IPDIVERT #divert sockets
options IPFILTER #ipfilter support
options IPFILTER_LOG #ipfilter logging

View File

@ -374,6 +374,7 @@ IPFIREWALL_VERBOSE opt_ipfw.h
IPFIREWALL_VERBOSE_LIMIT opt_ipfw.h
IPFIREWALL_DEFAULT_TO_ACCEPT opt_ipfw.h
IPFIREWALL_FORWARD opt_ipfw.h
IPFIREWALL_NAT opt_ipfw.h
IPSTEALTH
IPX
IPXIP opt_ipx.h

View File

@ -84,9 +84,10 @@
#include <netinet/udp.h>
#include <netinet/udp_var.h>
#include <netinet/sctp.h>
#ifdef IPFIREWALL_NAT
#include <netinet/libalias/alias.h>
#include <netinet/libalias/alias_local.h>
#endif
#include <netgraph/ng_ipfw.h>
#include <altq/if_altq.h>
@ -307,7 +308,9 @@ static struct sysctl_oid *ip6_fw_sysctl_tree;
#endif /* INET6 */
#endif /* SYSCTL_NODE */
#ifdef IPFIREWALL_NAT
MODULE_DEPEND(ipfw, libalias, 1, 1, 1);
#endif
static int fw_deny_unknown_exthdrs = 1;
@ -2060,6 +2063,7 @@ check_uidgid(ipfw_insn_u32 *insn,
return match;
}
#ifdef IPFIREWALL_NAT
static eventhandler_tag ifaddr_event_tag;
static void
@ -2231,6 +2235,7 @@ add_redir_spool_cfg(char *buf, struct cfg_nat *ptr) {
/* something really bad happened: panic! */
panic("%s\n", panic_err);
}
#endif
/*
* The main check routine for the firewall.
@ -3474,6 +3479,7 @@ do { \
IP_FW_NETGRAPH : IP_FW_NGTEE;
goto done;
#ifdef IPFIREWALL_NAT
case O_NAT: {
struct cfg_nat *t;
struct mbuf *mcl;
@ -3644,6 +3650,7 @@ do { \
retval = IP_FW_NAT;
goto done;
}
#endif
default:
panic("-- unknown opcode %d\n", cmd->opcode);
@ -4593,6 +4600,7 @@ ipfw_ctl(struct sockopt *sopt)
}
break;
#ifdef IPFIREWALL_NAT
case IP_FW_NAT_CFG:
{
struct cfg_nat *ptr, *ser_n;
@ -4771,6 +4779,7 @@ ipfw_ctl(struct sockopt *sopt)
free(data, M_IPFW);
}
break;
#endif
default:
printf("ipfw: ipfw_ctl invalid option %d\n", sopt->sopt_name);
@ -4944,9 +4953,11 @@ ipfw_init(void)
ip_fw_ctl_ptr = ipfw_ctl;
ip_fw_chk_ptr = ipfw_chk;
callout_reset(&ipfw_timeout, hz, ipfw_tick, NULL);
#ifdef IPFIREWALL_NAT
LIST_INIT(&layer3_chain.nat);
ifaddr_event_tag = EVENTHANDLER_REGISTER(ifaddr_event, ifaddr_change,
NULL, EVENTHANDLER_PRI_ANY);
#endif
return (0);
}
@ -4954,13 +4965,16 @@ void
ipfw_destroy(void)
{
struct ip_fw *reap;
#ifdef IPFIREWALL_NAT
struct cfg_nat *ptr, *ptr_temp;
#endif
ip_fw_chk_ptr = NULL;
ip_fw_ctl_ptr = NULL;
callout_drain(&ipfw_timeout);
IPFW_WLOCK(&layer3_chain);
flush_tables(&layer3_chain);
#ifdef IPFIREWALL_NAT
LIST_FOREACH_SAFE(ptr, &layer3_chain.nat, _next, ptr_temp) {
LIST_REMOVE(ptr, _next);
del_redir_spool_cfg(ptr, &ptr->redir_chain);
@ -4968,6 +4982,7 @@ ipfw_destroy(void)
free(ptr, M_IPFW);
}
EVENTHANDLER_DEREGISTER(ifaddr_event, ifaddr_event_tag);
#endif
layer3_chain.reap = NULL;
free_chain(&layer3_chain, 1 /* kill default rule */);
reap = layer3_chain.reap, layer3_chain.reap = NULL;