Move IPFilter into contrib.
This commit is contained in:
parent
b8c1ab8e28
commit
f5282c3329
2132
sys/netinet/fil.c
2132
sys/netinet/fil.c
File diff suppressed because it is too large
Load Diff
@ -1,543 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1998-2000 by Darren Reed & Guido van Rooij.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*/
|
||||
#if !defined(lint)
|
||||
/*static const char rcsid[] = "@(#)$Id: ip_auth.c,v 2.1.2.2 2000/01/16 10:12:14 darrenr Exp $";*/
|
||||
static const char rcsid[] = "@(#)$FreeBSD$";
|
||||
#endif
|
||||
|
||||
#include <sys/errno.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/time.h>
|
||||
#include <sys/file.h>
|
||||
#if !defined(_KERNEL) && !defined(KERNEL)
|
||||
# include <stdio.h>
|
||||
# include <stdlib.h>
|
||||
# include <string.h>
|
||||
#endif
|
||||
#if (defined(KERNEL) || defined(_KERNEL)) && (__FreeBSD_version >= 220000)
|
||||
# include <sys/filio.h>
|
||||
# include <sys/fcntl.h>
|
||||
#else
|
||||
# include <sys/ioctl.h>
|
||||
#endif
|
||||
#include <sys/uio.h>
|
||||
#ifndef linux
|
||||
# include <sys/protosw.h>
|
||||
#endif
|
||||
#include <sys/socket.h>
|
||||
#if (defined(_KERNEL) || defined(KERNEL)) && !defined(linux)
|
||||
# include <sys/systm.h>
|
||||
#endif
|
||||
#if !defined(__SVR4) && !defined(__svr4__)
|
||||
# ifndef linux
|
||||
# include <sys/mbuf.h>
|
||||
# endif
|
||||
#else
|
||||
# include <sys/filio.h>
|
||||
# include <sys/byteorder.h>
|
||||
# ifdef _KERNEL
|
||||
# include <sys/dditypes.h>
|
||||
# endif
|
||||
# include <sys/stream.h>
|
||||
# include <sys/kmem.h>
|
||||
#endif
|
||||
#if (_BSDI_VERSION >= 199802) || (__FreeBSD_version >= 400000)
|
||||
# include <sys/queue.h>
|
||||
#endif
|
||||
#if defined(__NetBSD__) || defined(__OpenBSD__) || defined(bsdi)
|
||||
# include <machine/cpu.h>
|
||||
#endif
|
||||
#include <net/if.h>
|
||||
#ifdef sun
|
||||
# include <net/af.h>
|
||||
#endif
|
||||
#include <net/route.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/in_systm.h>
|
||||
#include <netinet/ip.h>
|
||||
#ifndef KERNEL
|
||||
# define KERNEL
|
||||
# define NOT_KERNEL
|
||||
#endif
|
||||
#ifndef linux
|
||||
# include <netinet/ip_var.h>
|
||||
#endif
|
||||
#ifdef NOT_KERNEL
|
||||
# undef KERNEL
|
||||
#endif
|
||||
#ifdef __sgi
|
||||
# ifdef IFF_DRVRLOCK /* IRIX6 */
|
||||
# include <sys/hashing.h>
|
||||
# endif
|
||||
#endif
|
||||
#include <netinet/tcp.h>
|
||||
#if defined(__sgi) && !defined(IFF_DRVRLOCK) /* IRIX < 6 */
|
||||
extern struct ifqueue ipintrq; /* ip packet input queue */
|
||||
#else
|
||||
# ifndef linux
|
||||
# if __FreeBSD_version >= 300000
|
||||
# include <net/if_var.h>
|
||||
# endif
|
||||
# include <netinet/in_var.h>
|
||||
# include <netinet/tcp_fsm.h>
|
||||
# endif
|
||||
#endif
|
||||
#include <netinet/udp.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include "netinet/ip_compat.h"
|
||||
#include <netinet/tcpip.h>
|
||||
#include "netinet/ip_fil.h"
|
||||
#include "netinet/ip_auth.h"
|
||||
#if !SOLARIS && !defined(linux)
|
||||
# include <net/netisr.h>
|
||||
# ifdef __FreeBSD__
|
||||
# include <machine/cpufunc.h>
|
||||
# endif
|
||||
#endif
|
||||
#if (__FreeBSD_version >= 300000)
|
||||
# include <sys/malloc.h>
|
||||
# if (defined(_KERNEL) || defined(KERNEL)) && !defined(IPFILTER_LKM)
|
||||
# include <sys/libkern.h>
|
||||
# include <sys/systm.h>
|
||||
# endif
|
||||
#endif
|
||||
|
||||
|
||||
|
||||
#if (SOLARIS || defined(__sgi)) && defined(_KERNEL)
|
||||
extern KRWLOCK_T ipf_auth;
|
||||
extern kmutex_t ipf_authmx;
|
||||
# if SOLARIS
|
||||
extern kcondvar_t ipfauthwait;
|
||||
# endif
|
||||
#endif
|
||||
#ifdef linux
|
||||
static struct wait_queue *ipfauthwait = NULL;
|
||||
#endif
|
||||
|
||||
int fr_authsize = FR_NUMAUTH;
|
||||
int fr_authused = 0;
|
||||
int fr_defaultauthage = 600;
|
||||
int fr_auth_lock = 0;
|
||||
fr_authstat_t fr_authstats;
|
||||
static frauth_t fr_auth[FR_NUMAUTH];
|
||||
mb_t *fr_authpkts[FR_NUMAUTH];
|
||||
static int fr_authstart = 0, fr_authend = 0, fr_authnext = 0;
|
||||
static frauthent_t *fae_list = NULL;
|
||||
frentry_t *ipauth = NULL;
|
||||
|
||||
|
||||
/*
|
||||
* Check if a packet has authorization. If the packet is found to match an
|
||||
* authorization result and that would result in a feedback loop (i.e. it
|
||||
* will end up returning FR_AUTH) then return FR_BLOCK instead.
|
||||
*/
|
||||
u_32_t fr_checkauth(ip, fin)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
{
|
||||
u_short id = ip->ip_id;
|
||||
u_32_t pass;
|
||||
int i;
|
||||
|
||||
if (fr_auth_lock)
|
||||
return 0;
|
||||
|
||||
READ_ENTER(&ipf_auth);
|
||||
for (i = fr_authstart; i != fr_authend; ) {
|
||||
/*
|
||||
* index becomes -2 only after an SIOCAUTHW. Check this in
|
||||
* case the same packet gets sent again and it hasn't yet been
|
||||
* auth'd.
|
||||
*/
|
||||
if ((fr_auth[i].fra_index == -2) &&
|
||||
(id == fr_auth[i].fra_info.fin_id) &&
|
||||
!bcmp((char *)fin,(char *)&fr_auth[i].fra_info,FI_CSIZE)) {
|
||||
/*
|
||||
* Avoid feedback loop.
|
||||
*/
|
||||
if (!(pass = fr_auth[i].fra_pass) || (pass & FR_AUTH))
|
||||
pass = FR_BLOCK;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
fr_authstats.fas_hits++;
|
||||
fr_auth[i].fra_index = -1;
|
||||
fr_authused--;
|
||||
if (i == fr_authstart) {
|
||||
while (fr_auth[i].fra_index == -1) {
|
||||
i++;
|
||||
if (i == FR_NUMAUTH)
|
||||
i = 0;
|
||||
fr_authstart = i;
|
||||
if (i == fr_authend)
|
||||
break;
|
||||
}
|
||||
if (fr_authstart == fr_authend) {
|
||||
fr_authnext = 0;
|
||||
fr_authstart = fr_authend = 0;
|
||||
}
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return pass;
|
||||
}
|
||||
i++;
|
||||
if (i == FR_NUMAUTH)
|
||||
i = 0;
|
||||
}
|
||||
fr_authstats.fas_miss++;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Check if we have room in the auth array to hold details for another packet.
|
||||
* If we do, store it and wake up any user programs which are waiting to
|
||||
* hear about these events.
|
||||
*/
|
||||
int fr_newauth(m, fin, ip)
|
||||
mb_t *m;
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
{
|
||||
#if defined(_KERNEL) && SOLARIS
|
||||
qif_t *qif = fin->fin_qif;
|
||||
#endif
|
||||
int i;
|
||||
|
||||
if (fr_auth_lock)
|
||||
return 0;
|
||||
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
if (fr_authstart > fr_authend) {
|
||||
fr_authstats.fas_nospace++;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return 0;
|
||||
} else {
|
||||
if ((fr_authstart == 0) && (fr_authend == FR_NUMAUTH - 1)) {
|
||||
fr_authstats.fas_nospace++;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
fr_authstats.fas_added++;
|
||||
fr_authused++;
|
||||
i = fr_authend++;
|
||||
if (fr_authend == FR_NUMAUTH)
|
||||
fr_authend = 0;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
fr_auth[i].fra_index = i;
|
||||
fr_auth[i].fra_pass = 0;
|
||||
fr_auth[i].fra_age = fr_defaultauthage;
|
||||
bcopy((char *)fin, (char *)&fr_auth[i].fra_info, sizeof(*fin));
|
||||
#if !defined(sparc) && !defined(m68k)
|
||||
/*
|
||||
* No need to copyback here as we want to undo the changes, not keep
|
||||
* them.
|
||||
*/
|
||||
# if SOLARIS && defined(_KERNEL)
|
||||
if ((ip == (ip_t *)m->b_rptr) && (ip->ip_v == 4))
|
||||
# endif
|
||||
{
|
||||
register u_short bo;
|
||||
|
||||
bo = ip->ip_len;
|
||||
ip->ip_len = htons(bo);
|
||||
# if !SOLARIS && !defined(__NetBSD__) && !defined(__FreeBSD__)
|
||||
/* 4.4BSD converts this ip_input.c, but I don't in solaris.c */
|
||||
bo = ip->ip_id;
|
||||
ip->ip_id = htons(bo);
|
||||
# endif
|
||||
bo = ip->ip_off;
|
||||
ip->ip_off = htons(bo);
|
||||
}
|
||||
#endif
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
m->b_rptr -= qif->qf_off;
|
||||
fr_authpkts[i] = *(mblk_t **)fin->fin_mp;
|
||||
fr_auth[i].fra_q = qif->qf_q;
|
||||
cv_signal(&ipfauthwait);
|
||||
#else
|
||||
fr_authpkts[i] = m;
|
||||
# if defined(linux) && defined(_KERNEL)
|
||||
wake_up_interruptible(&ipfauthwait);
|
||||
# else
|
||||
WAKEUP(&fr_authnext);
|
||||
# endif
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
int fr_auth_ioctl(data, cmd, fr, frptr)
|
||||
caddr_t data;
|
||||
#if defined(__NetBSD__) || defined(__OpenBSD__) || (FreeBSD_version >= 300003)
|
||||
u_long cmd;
|
||||
#else
|
||||
int cmd;
|
||||
#endif
|
||||
frentry_t *fr, **frptr;
|
||||
{
|
||||
mb_t *m;
|
||||
frauth_t auth, *au = &auth;
|
||||
frauthent_t *fae, **faep;
|
||||
int i, error = 0;
|
||||
|
||||
switch (cmd)
|
||||
{
|
||||
case SIOCSTLCK :
|
||||
error = fr_lock(data, &fr_auth_lock);
|
||||
break;
|
||||
case SIOCINIFR :
|
||||
case SIOCRMIFR :
|
||||
case SIOCADIFR :
|
||||
error = EINVAL;
|
||||
break;
|
||||
case SIOCINAFR :
|
||||
error = EINVAL;
|
||||
break;
|
||||
case SIOCRMAFR :
|
||||
case SIOCADAFR :
|
||||
for (faep = &fae_list; (fae = *faep); )
|
||||
if (&fae->fae_fr == fr)
|
||||
break;
|
||||
else
|
||||
faep = &fae->fae_next;
|
||||
if (cmd == SIOCRMAFR) {
|
||||
if (!fae)
|
||||
error = ESRCH;
|
||||
else {
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
*faep = fae->fae_next;
|
||||
*frptr = fr->fr_next;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
KFREE(fae);
|
||||
}
|
||||
} else {
|
||||
KMALLOC(fae, frauthent_t *);
|
||||
if (fae != NULL) {
|
||||
bcopy((char *)fr, (char *)&fae->fae_fr,
|
||||
sizeof(*fr));
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
fae->fae_age = fr_defaultauthage;
|
||||
fae->fae_fr.fr_hits = 0;
|
||||
fae->fae_fr.fr_next = *frptr;
|
||||
*frptr = &fae->fae_fr;
|
||||
fae->fae_next = *faep;
|
||||
*faep = fae;
|
||||
ipauth = &fae_list->fae_fr;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
} else
|
||||
error = ENOMEM;
|
||||
}
|
||||
break;
|
||||
case SIOCATHST:
|
||||
READ_ENTER(&ipf_auth);
|
||||
fr_authstats.fas_faelist = fae_list;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
error = IWCOPYPTR((char *)&fr_authstats, data,
|
||||
sizeof(fr_authstats));
|
||||
break;
|
||||
case SIOCAUTHW:
|
||||
fr_authioctlloop:
|
||||
READ_ENTER(&ipf_auth);
|
||||
if ((fr_authnext != fr_authend) && fr_authpkts[fr_authnext]) {
|
||||
error = IWCOPYPTR((char *)&fr_auth[fr_authnext], data,
|
||||
sizeof(frauth_t));
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
if (error)
|
||||
break;
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
fr_authnext++;
|
||||
if (fr_authnext == FR_NUMAUTH)
|
||||
fr_authnext = 0;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return 0;
|
||||
}
|
||||
#ifdef _KERNEL
|
||||
# if SOLARIS
|
||||
mutex_enter(&ipf_authmx);
|
||||
if (!cv_wait_sig(&ipfauthwait, &ipf_authmx)) {
|
||||
mutex_exit(&ipf_authmx);
|
||||
return EINTR;
|
||||
}
|
||||
mutex_exit(&ipf_authmx);
|
||||
# else
|
||||
# ifdef linux
|
||||
interruptible_sleep_on(&ipfauthwait);
|
||||
if (current->signal & ~current->blocked)
|
||||
error = -EINTR;
|
||||
# else
|
||||
error = SLEEP(&fr_authnext, "fr_authnext");
|
||||
# endif
|
||||
# endif
|
||||
#endif
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
if (!error)
|
||||
goto fr_authioctlloop;
|
||||
break;
|
||||
case SIOCAUTHR:
|
||||
error = IRCOPYPTR(data, (caddr_t)&auth, sizeof(auth));
|
||||
if (error)
|
||||
return error;
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
i = au->fra_index;
|
||||
if ((i < 0) || (i > FR_NUMAUTH) ||
|
||||
(fr_auth[i].fra_info.fin_id != au->fra_info.fin_id)) {
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
return EINVAL;
|
||||
}
|
||||
m = fr_authpkts[i];
|
||||
fr_auth[i].fra_index = -2;
|
||||
fr_auth[i].fra_pass = au->fra_pass;
|
||||
fr_authpkts[i] = NULL;
|
||||
#ifdef _KERNEL
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
# ifndef linux
|
||||
if (m && au->fra_info.fin_out) {
|
||||
# if SOLARIS
|
||||
error = fr_qout(fr_auth[i].fra_q, m);
|
||||
# else /* SOLARIS */
|
||||
# if (_BSDI_VERSION >= 199802) || defined(__OpenBSD__)
|
||||
error = ip_output(m, NULL, NULL, IP_FORWARDING, NULL,
|
||||
NULL);
|
||||
# else
|
||||
error = ip_output(m, NULL, NULL, IP_FORWARDING, NULL);
|
||||
# endif
|
||||
# endif /* SOLARIS */
|
||||
if (error)
|
||||
fr_authstats.fas_sendfail++;
|
||||
else
|
||||
fr_authstats.fas_sendok++;
|
||||
} else if (m) {
|
||||
# if SOLARIS
|
||||
error = fr_qin(fr_auth[i].fra_q, m);
|
||||
# else /* SOLARIS */
|
||||
if (! IF_HANDOFF(&ipintrq, m, NULL))
|
||||
error = ENOBUFS;
|
||||
else
|
||||
schednetisr(NETISR_IP);
|
||||
# endif /* SOLARIS */
|
||||
if (error)
|
||||
fr_authstats.fas_quefail++;
|
||||
else
|
||||
fr_authstats.fas_queok++;
|
||||
} else
|
||||
error = EINVAL;
|
||||
# endif
|
||||
# if SOLARIS
|
||||
if (error)
|
||||
error = EINVAL;
|
||||
# else
|
||||
/*
|
||||
* If we experience an error which will result in the packet
|
||||
* not being processed, make sure we advance to the next one.
|
||||
*/
|
||||
if (error == ENOBUFS) {
|
||||
fr_authused--;
|
||||
fr_auth[i].fra_index = -1;
|
||||
fr_auth[i].fra_pass = 0;
|
||||
if (i == fr_authstart) {
|
||||
while (fr_auth[i].fra_index == -1) {
|
||||
i++;
|
||||
if (i == FR_NUMAUTH)
|
||||
i = 0;
|
||||
fr_authstart = i;
|
||||
if (i == fr_authend)
|
||||
break;
|
||||
}
|
||||
if (fr_authstart == fr_authend) {
|
||||
fr_authnext = 0;
|
||||
fr_authstart = fr_authend = 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
# endif
|
||||
#endif /* _KERNEL */
|
||||
break;
|
||||
default :
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
return error;
|
||||
}
|
||||
|
||||
|
||||
#ifdef _KERNEL
|
||||
/*
|
||||
* Free all network buffer memory used to keep saved packets.
|
||||
*/
|
||||
void fr_authunload()
|
||||
{
|
||||
register int i;
|
||||
register frauthent_t *fae, **faep;
|
||||
mb_t *m;
|
||||
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
for (i = 0; i < FR_NUMAUTH; i++) {
|
||||
if ((m = fr_authpkts[i])) {
|
||||
FREE_MB_T(m);
|
||||
fr_authpkts[i] = NULL;
|
||||
fr_auth[i].fra_index = -1;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
for (faep = &fae_list; (fae = *faep); ) {
|
||||
*faep = fae->fae_next;
|
||||
KFREE(fae);
|
||||
}
|
||||
ipauth = NULL;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Slowly expire held auth records. Timeouts are set
|
||||
* in expectation of this being called twice per second.
|
||||
*/
|
||||
void fr_authexpire()
|
||||
{
|
||||
register int i;
|
||||
register frauth_t *fra;
|
||||
register frauthent_t *fae, **faep;
|
||||
mb_t *m;
|
||||
#if !SOLARIS
|
||||
int s;
|
||||
#endif
|
||||
|
||||
if (fr_auth_lock)
|
||||
return;
|
||||
|
||||
SPL_NET(s);
|
||||
WRITE_ENTER(&ipf_auth);
|
||||
for (i = 0, fra = fr_auth; i < FR_NUMAUTH; i++, fra++) {
|
||||
if ((!--fra->fra_age) && (m = fr_authpkts[i])) {
|
||||
FREE_MB_T(m);
|
||||
fr_authpkts[i] = NULL;
|
||||
fr_auth[i].fra_index = -1;
|
||||
fr_authstats.fas_expire++;
|
||||
fr_authused--;
|
||||
}
|
||||
}
|
||||
|
||||
for (faep = &fae_list; (fae = *faep); ) {
|
||||
if (!--fae->fae_age) {
|
||||
*faep = fae->fae_next;
|
||||
KFREE(fae);
|
||||
fr_authstats.fas_expire++;
|
||||
} else
|
||||
faep = &fae->fae_next;
|
||||
}
|
||||
ipauth = &fae_list->fae_fr;
|
||||
RWLOCK_EXIT(&ipf_auth);
|
||||
SPL_X(s);
|
||||
}
|
||||
#endif
|
@ -1,63 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1997-2000 by Darren Reed & Guido Van Rooij.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* $Id: ip_auth.h,v 2.1 1999/08/04 17:29:54 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*
|
||||
*/
|
||||
#ifndef __IP_AUTH_H__
|
||||
#define __IP_AUTH_H__
|
||||
|
||||
#define FR_NUMAUTH 32
|
||||
|
||||
typedef struct frauth {
|
||||
int fra_age;
|
||||
int fra_index;
|
||||
u_32_t fra_pass;
|
||||
fr_info_t fra_info;
|
||||
#if SOLARIS
|
||||
queue_t *fra_q;
|
||||
#endif
|
||||
} frauth_t;
|
||||
|
||||
typedef struct frauthent {
|
||||
struct frentry fae_fr;
|
||||
struct frauthent *fae_next;
|
||||
u_long fae_age;
|
||||
} frauthent_t;
|
||||
|
||||
typedef struct fr_authstat {
|
||||
U_QUAD_T fas_hits;
|
||||
U_QUAD_T fas_miss;
|
||||
u_long fas_nospace;
|
||||
u_long fas_added;
|
||||
u_long fas_sendfail;
|
||||
u_long fas_sendok;
|
||||
u_long fas_queok;
|
||||
u_long fas_quefail;
|
||||
u_long fas_expire;
|
||||
frauthent_t *fas_faelist;
|
||||
} fr_authstat_t;
|
||||
|
||||
|
||||
extern frentry_t *ipauth;
|
||||
extern struct fr_authstat fr_authstats;
|
||||
extern int fr_defaultauthage;
|
||||
extern int fr_authsize;
|
||||
extern int fr_authused;
|
||||
extern int fr_auth_lock;
|
||||
extern u_32_t fr_checkauth __P((ip_t *, fr_info_t *));
|
||||
extern void fr_authexpire __P((void));
|
||||
extern void fr_authunload __P((void));
|
||||
extern mb_t *fr_authpkts[];
|
||||
extern int fr_newauth __P((mb_t *, fr_info_t *, ip_t *));
|
||||
#if defined(__NetBSD__) || defined(__OpenBSD__)
|
||||
extern int fr_auth_ioctl __P((caddr_t, u_long, frentry_t *, frentry_t **));
|
||||
#else
|
||||
extern int fr_auth_ioctl __P((caddr_t, int, frentry_t *, frentry_t **));
|
||||
#endif
|
||||
#endif /* __IP_AUTH_H__ */
|
File diff suppressed because it is too large
Load Diff
1763
sys/netinet/ip_fil.c
1763
sys/netinet/ip_fil.c
File diff suppressed because it is too large
Load Diff
@ -1,634 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1993-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* @(#)ip_fil.h 1.35 6/5/96
|
||||
* $Id: ip_fil.h,v 2.29.2.4 2000/11/12 11:54:53 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef __IP_FIL_H__
|
||||
#define __IP_FIL_H__
|
||||
|
||||
/*
|
||||
* Pathnames for various IP Filter control devices. Used by LKM
|
||||
* and userland, so defined here.
|
||||
*/
|
||||
#define IPNAT_NAME "/dev/ipnat"
|
||||
#define IPSTATE_NAME "/dev/ipstate"
|
||||
#define IPAUTH_NAME "/dev/ipauth"
|
||||
|
||||
#ifndef SOLARIS
|
||||
# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
|
||||
#endif
|
||||
|
||||
#if defined(KERNEL) && !defined(_KERNEL)
|
||||
# define _KERNEL
|
||||
#endif
|
||||
|
||||
#ifndef __P
|
||||
# ifdef __STDC__
|
||||
# define __P(x) x
|
||||
# else
|
||||
# define __P(x) ()
|
||||
# endif
|
||||
#endif
|
||||
|
||||
#if defined(__STDC__) || defined(__GNUC__)
|
||||
# define SIOCADAFR _IOW('r', 60, struct frentry *)
|
||||
# define SIOCRMAFR _IOW('r', 61, struct frentry *)
|
||||
# define SIOCSETFF _IOW('r', 62, u_int)
|
||||
# define SIOCGETFF _IOR('r', 63, u_int)
|
||||
# define SIOCGETFS _IOWR('r', 64, struct friostat *)
|
||||
# define SIOCIPFFL _IOWR('r', 65, int)
|
||||
# define SIOCIPFFB _IOR('r', 66, int)
|
||||
# define SIOCADIFR _IOW('r', 67, struct frentry *)
|
||||
# define SIOCRMIFR _IOW('r', 68, struct frentry *)
|
||||
# define SIOCSWAPA _IOR('r', 69, u_int)
|
||||
# define SIOCINAFR _IOW('r', 70, struct frentry *)
|
||||
# define SIOCINIFR _IOW('r', 71, struct frentry *)
|
||||
# define SIOCFRENB _IOW('r', 72, u_int)
|
||||
# define SIOCFRSYN _IOW('r', 73, u_int)
|
||||
# define SIOCFRZST _IOWR('r', 74, struct friostat *)
|
||||
# define SIOCZRLST _IOWR('r', 75, struct frentry *)
|
||||
# define SIOCAUTHW _IOWR('r', 76, struct fr_info *)
|
||||
# define SIOCAUTHR _IOWR('r', 77, struct fr_info *)
|
||||
# define SIOCATHST _IOWR('r', 78, struct fr_authstat *)
|
||||
# define SIOCSTLCK _IOWR('r', 79, u_int)
|
||||
# define SIOCSTPUT _IOWR('r', 80, struct ipstate_save *)
|
||||
# define SIOCSTGET _IOWR('r', 81, struct ipstate_save *)
|
||||
# define SIOCSTGSZ _IOWR('r', 82, struct natget *)
|
||||
# define SIOCGFRST _IOWR('r', 83, struct ipfrstat *)
|
||||
#else
|
||||
# define SIOCADAFR _IOW(r, 60, struct frentry *)
|
||||
# define SIOCRMAFR _IOW(r, 61, struct frentry *)
|
||||
# define SIOCSETFF _IOW(r, 62, u_int)
|
||||
# define SIOCGETFF _IOR(r, 63, u_int)
|
||||
# define SIOCGETFS _IOWR(r, 64, struct friostat *)
|
||||
# define SIOCIPFFL _IOWR(r, 65, int)
|
||||
# define SIOCIPFFB _IOR(r, 66, int)
|
||||
# define SIOCADIFR _IOW(r, 67, struct frentry *)
|
||||
# define SIOCRMIFR _IOW(r, 68, struct frentry *)
|
||||
# define SIOCSWAPA _IOR(r, 69, u_int)
|
||||
# define SIOCINAFR _IOW(r, 70, struct frentry *)
|
||||
# define SIOCINIFR _IOW(r, 71, struct frentry *)
|
||||
# define SIOCFRENB _IOW(r, 72, u_int)
|
||||
# define SIOCFRSYN _IOW(r, 73, u_int)
|
||||
# define SIOCFRZST _IOWR(r, 74, struct friostat *)
|
||||
# define SIOCZRLST _IOWR(r, 75, struct frentry *)
|
||||
# define SIOCAUTHW _IOWR(r, 76, struct fr_info *)
|
||||
# define SIOCAUTHR _IOWR(r, 77, struct fr_info *)
|
||||
# define SIOCATHST _IOWR(r, 78, struct fr_authstat *)
|
||||
# define SIOCSTLCK _IOWR(r, 79, u_int)
|
||||
# define SIOCSTPUT _IOWR(r, 80, struct ipstate_save *)
|
||||
# define SIOCSTGET _IOWR(r, 81, struct ipstate_save *)
|
||||
# define SIOCSTGSZ _IOWR(r, 82, struct natget *)
|
||||
# define SIOCGFRST _IOWR(r, 83, struct ipfrstat *)
|
||||
#endif
|
||||
#define SIOCADDFR SIOCADAFR
|
||||
#define SIOCDELFR SIOCRMAFR
|
||||
#define SIOCINSFR SIOCINAFR
|
||||
|
||||
|
||||
typedef struct fr_ip {
|
||||
u_32_t fi_v:4; /* IP version */
|
||||
u_32_t fi_fl:4; /* packet flags */
|
||||
u_32_t fi_tos:8; /* IP packet TOS */
|
||||
u_32_t fi_ttl:8; /* IP packet TTL */
|
||||
u_32_t fi_p:8; /* IP packet protocol */
|
||||
union i6addr fi_src; /* source address from packet */
|
||||
union i6addr fi_dst; /* destination address from packet */
|
||||
u_32_t fi_optmsk; /* bitmask composed from IP options */
|
||||
u_short fi_secmsk; /* bitmask composed from IP security options */
|
||||
u_short fi_auth; /* authentication code from IP sec. options */
|
||||
} fr_ip_t;
|
||||
|
||||
#define FI_OPTIONS (FF_OPTIONS >> 24)
|
||||
#define FI_TCPUDP (FF_TCPUDP >> 24) /* TCP/UCP implied comparison*/
|
||||
#define FI_FRAG (FF_FRAG >> 24)
|
||||
#define FI_SHORT (FF_SHORT >> 24)
|
||||
#define FI_CMP (FI_OPTIONS|FI_TCPUDP|FI_SHORT)
|
||||
|
||||
#define fi_saddr fi_src.in4.s_addr
|
||||
#define fi_daddr fi_dst.in4.s_addr
|
||||
|
||||
|
||||
/*
|
||||
* These are both used by the state and NAT code to indicate that one port or
|
||||
* the other should be treated as a wildcard.
|
||||
*/
|
||||
#define FI_W_SPORT 0x00000100
|
||||
#define FI_W_DPORT 0x00000200
|
||||
#define FI_WILDP (FI_W_SPORT|FI_W_DPORT)
|
||||
#define FI_W_SADDR 0x00000400
|
||||
#define FI_W_DADDR 0x00000800
|
||||
#define FI_WILDA (FI_W_SADDR|FI_W_DADDR)
|
||||
#define FI_NEWFR 0x00001000
|
||||
|
||||
typedef struct fr_info {
|
||||
void *fin_ifp; /* interface packet is `on' */
|
||||
struct fr_ip fin_fi; /* IP Packet summary */
|
||||
u_short fin_data[2]; /* TCP/UDP ports, ICMP code/type */
|
||||
u_char fin_out; /* in or out ? 1 == out, 0 == in */
|
||||
u_char fin_rev; /* state only: 1 = reverse */
|
||||
u_short fin_hlen; /* length of IP header in bytes */
|
||||
u_char fin_tcpf; /* TCP header flags (SYN, ACK, etc) */
|
||||
/* From here on is packet specific */
|
||||
u_char fin_icode; /* ICMP error to return */
|
||||
u_short fin_rule; /* rule # last matched */
|
||||
u_32_t fin_group; /* group number, -1 for none */
|
||||
struct frentry *fin_fr; /* last matching rule */
|
||||
char *fin_dp; /* start of data past IP header */
|
||||
u_short fin_dlen; /* length of data portion of packet */
|
||||
u_short fin_id; /* IP packet id field */
|
||||
void *fin_mp; /* pointer to pointer to mbuf */
|
||||
#if SOLARIS
|
||||
void *fin_qfm; /* pointer to mblk where pkt starts */
|
||||
void *fin_qif;
|
||||
#endif
|
||||
u_short fin_plen;
|
||||
u_short fin_off;
|
||||
} fr_info_t;
|
||||
|
||||
#define fin_v fin_fi.fi_v
|
||||
|
||||
/*
|
||||
* Size for compares on fr_info structures
|
||||
*/
|
||||
#define FI_CSIZE offsetof(fr_info_t, fin_icode)
|
||||
|
||||
/*
|
||||
* Size for copying cache fr_info structure
|
||||
*/
|
||||
#define FI_COPYSIZE offsetof(fr_info_t, fin_dp)
|
||||
|
||||
typedef struct frdest {
|
||||
void *fd_ifp;
|
||||
struct in_addr fd_ip;
|
||||
char fd_ifname[IFNAMSIZ];
|
||||
} frdest_t;
|
||||
|
||||
typedef struct frpcmp {
|
||||
int frp_cmp; /* data for port comparisons */
|
||||
u_short frp_port; /* top port for <> and >< */
|
||||
u_short frp_top; /* top port for <> and >< */
|
||||
} frpcmp_t;
|
||||
|
||||
typedef struct frtuc {
|
||||
u_char ftu_tcpfm; /* tcp flags mask */
|
||||
u_char ftu_tcpf; /* tcp flags */
|
||||
frpcmp_t ftu_src;
|
||||
frpcmp_t ftu_dst;
|
||||
} frtuc_t;
|
||||
|
||||
#define ftu_scmp ftu_src.frp_cmp
|
||||
#define ftu_dcmp ftu_dst.frp_cmp
|
||||
#define ftu_sport ftu_src.frp_port
|
||||
#define ftu_dport ftu_dst.frp_port
|
||||
#define ftu_stop ftu_src.frp_top
|
||||
#define ftu_dtop ftu_dst.frp_top
|
||||
|
||||
typedef struct frentry {
|
||||
struct frentry *fr_next;
|
||||
u_32_t fr_group; /* group to which this rule belongs */
|
||||
u_32_t fr_grhead; /* group # which this rule starts */
|
||||
struct frentry *fr_grp;
|
||||
int fr_ref; /* reference count - for grouping */
|
||||
void *fr_ifa;
|
||||
#if BSD >= 199306
|
||||
void *fr_oifa;
|
||||
#endif
|
||||
/*
|
||||
* These are only incremented when a packet matches this rule and
|
||||
* it is the last match
|
||||
*/
|
||||
U_QUAD_T fr_hits;
|
||||
U_QUAD_T fr_bytes;
|
||||
/*
|
||||
* Fields after this may not change whilst in the kernel.
|
||||
*/
|
||||
struct fr_ip fr_ip;
|
||||
struct fr_ip fr_mip; /* mask structure */
|
||||
|
||||
|
||||
u_short fr_icmpm; /* data for ICMP packets (mask) */
|
||||
u_short fr_icmp;
|
||||
|
||||
frtuc_t fr_tuc;
|
||||
u_32_t fr_flags; /* per-rule flags && options (see below) */
|
||||
u_int fr_skip; /* # of rules to skip */
|
||||
u_int fr_loglevel; /* syslog log facility + priority */
|
||||
int (*fr_func) __P((int, ip_t *, fr_info_t *)); /* call this function */
|
||||
int fr_sap; /* For solaris only */
|
||||
u_char fr_icode; /* return ICMP code */
|
||||
char fr_ifname[IFNAMSIZ];
|
||||
#if BSD >= 199306
|
||||
char fr_oifname[IFNAMSIZ];
|
||||
#endif
|
||||
struct frdest fr_tif; /* "to" interface */
|
||||
struct frdest fr_dif; /* duplicate packet interfaces */
|
||||
u_int fr_cksum; /* checksum on filter rules for performance */
|
||||
} frentry_t;
|
||||
|
||||
#define fr_v fr_ip.fi_v
|
||||
#define fr_proto fr_ip.fi_p
|
||||
#define fr_ttl fr_ip.fi_ttl
|
||||
#define fr_tos fr_ip.fi_tos
|
||||
#define fr_tcpfm fr_tuc.ftu_tcpfm
|
||||
#define fr_tcpf fr_tuc.ftu_tcpf
|
||||
#define fr_scmp fr_tuc.ftu_scmp
|
||||
#define fr_dcmp fr_tuc.ftu_dcmp
|
||||
#define fr_dport fr_tuc.ftu_dport
|
||||
#define fr_sport fr_tuc.ftu_sport
|
||||
#define fr_stop fr_tuc.ftu_stop
|
||||
#define fr_dtop fr_tuc.ftu_dtop
|
||||
#define fr_dst fr_ip.fi_dst.in4
|
||||
#define fr_src fr_ip.fi_src.in4
|
||||
#define fr_dmsk fr_mip.fi_dst.in4
|
||||
#define fr_smsk fr_mip.fi_src.in4
|
||||
|
||||
#ifndef offsetof
|
||||
#define offsetof(t,m) (int)((&((t *)0L)->m))
|
||||
#endif
|
||||
#define FR_CMPSIZ (sizeof(struct frentry) - offsetof(frentry_t, fr_ip))
|
||||
|
||||
/*
|
||||
* fr_flags
|
||||
*/
|
||||
#define FR_BLOCK 0x00001 /* do not allow packet to pass */
|
||||
#define FR_PASS 0x00002 /* allow packet to pass */
|
||||
#define FR_OUTQUE 0x00004 /* outgoing packets */
|
||||
#define FR_INQUE 0x00008 /* ingoing packets */
|
||||
#define FR_LOG 0x00010 /* Log */
|
||||
#define FR_LOGB 0x00011 /* Log-fail */
|
||||
#define FR_LOGP 0x00012 /* Log-pass */
|
||||
#define FR_LOGBODY 0x00020 /* Log the body */
|
||||
#define FR_LOGFIRST 0x00040 /* Log the first byte if state held */
|
||||
#define FR_RETRST 0x00080 /* Return TCP RST packet - reset connection */
|
||||
#define FR_RETICMP 0x00100 /* Return ICMP unreachable packet */
|
||||
#define FR_FAKEICMP 0x00180 /* Return ICMP unreachable with fake source */
|
||||
#define FR_NOMATCH 0x00200 /* no match occured */
|
||||
#define FR_ACCOUNT 0x00400 /* count packet bytes */
|
||||
#define FR_KEEPFRAG 0x00800 /* keep fragment information */
|
||||
#define FR_KEEPSTATE 0x01000 /* keep `connection' state information */
|
||||
#define FR_INACTIVE 0x02000
|
||||
#define FR_QUICK 0x04000 /* match & stop processing list */
|
||||
#define FR_FASTROUTE 0x08000 /* bypass normal routing */
|
||||
#define FR_CALLNOW 0x10000 /* call another function (fr_func) if matches */
|
||||
#define FR_DUP 0x20000 /* duplicate packet */
|
||||
#define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */
|
||||
#define FR_NOTSRCIP 0x80000 /* not the src IP# */
|
||||
#define FR_NOTDSTIP 0x100000 /* not the dst IP# */
|
||||
#define FR_AUTH 0x200000 /* use authentication */
|
||||
#define FR_PREAUTH 0x400000 /* require preauthentication */
|
||||
#define FR_DONTCACHE 0x800000 /* don't cache the result */
|
||||
|
||||
#define FR_LOGMASK (FR_LOG|FR_LOGP|FR_LOGB)
|
||||
#define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP)
|
||||
|
||||
/*
|
||||
* These correspond to #define's for FI_* and are stored in fr_flags
|
||||
*/
|
||||
#define FF_OPTIONS 0x01000000
|
||||
#define FF_TCPUDP 0x02000000
|
||||
#define FF_FRAG 0x04000000
|
||||
#define FF_SHORT 0x08000000
|
||||
/*
|
||||
* recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
|
||||
*/
|
||||
#define FF_LOGPASS 0x10000000
|
||||
#define FF_LOGBLOCK 0x20000000
|
||||
#define FF_LOGNOMATCH 0x40000000
|
||||
#define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
|
||||
#define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */
|
||||
|
||||
#define FR_NONE 0
|
||||
#define FR_EQUAL 1
|
||||
#define FR_NEQUAL 2
|
||||
#define FR_LESST 3
|
||||
#define FR_GREATERT 4
|
||||
#define FR_LESSTE 5
|
||||
#define FR_GREATERTE 6
|
||||
#define FR_OUTRANGE 7
|
||||
#define FR_INRANGE 8
|
||||
|
||||
typedef struct filterstats {
|
||||
u_long fr_pass; /* packets allowed */
|
||||
u_long fr_block; /* packets denied */
|
||||
u_long fr_nom; /* packets which don't match any rule */
|
||||
u_long fr_short; /* packets which are short */
|
||||
u_long fr_ppkl; /* packets allowed and logged */
|
||||
u_long fr_bpkl; /* packets denied and logged */
|
||||
u_long fr_npkl; /* packets unmatched and logged */
|
||||
u_long fr_pkl; /* packets logged */
|
||||
u_long fr_skip; /* packets to be logged but buffer full */
|
||||
u_long fr_ret; /* packets for which a return is sent */
|
||||
u_long fr_acct; /* packets for which counting was performed */
|
||||
u_long fr_bnfr; /* bad attempts to allocate fragment state */
|
||||
u_long fr_nfr; /* new fragment state kept */
|
||||
u_long fr_cfr; /* add new fragment state but complete pkt */
|
||||
u_long fr_bads; /* bad attempts to allocate packet state */
|
||||
u_long fr_ads; /* new packet state kept */
|
||||
u_long fr_chit; /* cached hit */
|
||||
u_long fr_tcpbad; /* TCP checksum check failures */
|
||||
u_long fr_pull[2]; /* good and bad pullup attempts */
|
||||
u_long fr_badsrc; /* source received doesn't match route */
|
||||
u_long fr_badttl; /* TTL in packet doesn't reach minimum */
|
||||
#if SOLARIS
|
||||
u_long fr_notdata; /* PROTO/PCPROTO that have no data */
|
||||
u_long fr_nodata; /* mblks that have no data */
|
||||
u_long fr_bad; /* bad IP packets to the filter */
|
||||
u_long fr_notip; /* packets passed through no on ip queue */
|
||||
u_long fr_drop; /* packets dropped - no info for them! */
|
||||
u_long fr_copy; /* messages copied due to db_ref > 1 */
|
||||
#endif
|
||||
u_long fr_ipv6[2]; /* IPv6 packets in/out */
|
||||
} filterstats_t;
|
||||
|
||||
/*
|
||||
* For SIOCGETFS
|
||||
*/
|
||||
typedef struct friostat {
|
||||
struct filterstats f_st[2];
|
||||
struct frentry *f_fin[2];
|
||||
struct frentry *f_fout[2];
|
||||
struct frentry *f_acctin[2];
|
||||
struct frentry *f_acctout[2];
|
||||
struct frentry *f_fin6[2];
|
||||
struct frentry *f_fout6[2];
|
||||
struct frentry *f_acctin6[2];
|
||||
struct frentry *f_acctout6[2];
|
||||
struct frentry *f_auth;
|
||||
struct frgroup *f_groups[3][2];
|
||||
u_long f_froute[2];
|
||||
int f_defpass; /* default pass - from fr_pass */
|
||||
char f_active; /* 1 or 0 - active rule set */
|
||||
char f_running; /* 1 if running, else 0 */
|
||||
char f_logging; /* 1 if enabled, else 0 */
|
||||
char f_version[32]; /* version string */
|
||||
int f_locks[4];
|
||||
} friostat_t;
|
||||
|
||||
typedef struct optlist {
|
||||
u_short ol_val;
|
||||
int ol_bit;
|
||||
} optlist_t;
|
||||
|
||||
|
||||
/*
|
||||
* Group list structure.
|
||||
*/
|
||||
typedef struct frgroup {
|
||||
u_32_t fg_num;
|
||||
struct frgroup *fg_next;
|
||||
struct frentry *fg_head;
|
||||
struct frentry **fg_start;
|
||||
} frgroup_t;
|
||||
|
||||
|
||||
/*
|
||||
* Log structure. Each packet header logged is prepended by one of these.
|
||||
* Following this in the log records read from the device will be an ipflog
|
||||
* structure which is then followed by any packet data.
|
||||
*/
|
||||
typedef struct iplog {
|
||||
u_32_t ipl_magic;
|
||||
u_int ipl_count;
|
||||
u_long ipl_sec;
|
||||
u_long ipl_usec;
|
||||
size_t ipl_dsize;
|
||||
struct iplog *ipl_next;
|
||||
} iplog_t;
|
||||
|
||||
#define IPL_MAGIC 0x49504c4d /* 'IPLM' */
|
||||
|
||||
typedef struct ipflog {
|
||||
#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
|
||||
(defined(OpenBSD) && (OpenBSD >= 199603))
|
||||
u_char fl_ifname[IFNAMSIZ];
|
||||
#else
|
||||
u_int fl_unit;
|
||||
u_char fl_ifname[4];
|
||||
#endif
|
||||
u_char fl_plen; /* extra data after hlen */
|
||||
u_char fl_hlen; /* length of IP headers saved */
|
||||
u_short fl_loglevel; /* syslog log level */
|
||||
u_32_t fl_rule;
|
||||
u_32_t fl_group;
|
||||
u_32_t fl_flags;
|
||||
u_32_t fl_lflags;
|
||||
} ipflog_t;
|
||||
|
||||
|
||||
#ifndef ICMP_UNREACH_FILTER
|
||||
# define ICMP_UNREACH_FILTER 13
|
||||
#endif
|
||||
|
||||
#ifndef IPF_LOGGING
|
||||
# define IPF_LOGGING 0
|
||||
#endif
|
||||
#ifndef IPF_DEFAULT_PASS
|
||||
# define IPF_DEFAULT_PASS FR_PASS
|
||||
#endif
|
||||
|
||||
#define IPMINLEN(i, h) ((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h)))
|
||||
#define IPLLOGSIZE 8192
|
||||
|
||||
/*
|
||||
* Device filenames for reading log information. Use ipf on Solaris2 because
|
||||
* ipl is already a name used by something else.
|
||||
*/
|
||||
#ifndef IPL_NAME
|
||||
# if SOLARIS
|
||||
# define IPL_NAME "/dev/ipf"
|
||||
# else
|
||||
# define IPL_NAME "/dev/ipl"
|
||||
# endif
|
||||
#endif
|
||||
#define IPL_NAT IPNAT_NAME
|
||||
#define IPL_STATE IPSTATE_NAME
|
||||
#define IPL_AUTH IPAUTH_NAME
|
||||
|
||||
#define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */
|
||||
#define IPL_LOGNAT 1
|
||||
#define IPL_LOGSTATE 2
|
||||
#define IPL_LOGAUTH 3
|
||||
#define IPL_LOGMAX 3
|
||||
|
||||
#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
|
||||
(__FreeBSD_version >= 220000)
|
||||
# define CDEV_MAJOR 79
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Post NetBSD 1.2 has the PFIL interface for packet filters. This turns
|
||||
* on those hooks. We don't need any special mods in non-IP Filter code
|
||||
* with this!
|
||||
*/
|
||||
#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
|
||||
(defined(NetBSD1_2) && NetBSD1_2 > 1) || (defined(__FreeBSD_version) && \
|
||||
(__FreeBSD_version >= 500011))
|
||||
# if (NetBSD >= 199905)
|
||||
# define PFIL_HOOKS
|
||||
# endif
|
||||
# ifdef PFIL_HOOKS
|
||||
# define NETBSD_PF
|
||||
# endif
|
||||
#endif
|
||||
|
||||
|
||||
#ifndef _KERNEL
|
||||
struct ifnet;
|
||||
extern int fr_check __P((ip_t *, int, void *, int, mb_t **));
|
||||
extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
|
||||
extern int send_reset __P((ip_t *, struct ifnet *));
|
||||
extern int icmp_error __P((ip_t *, struct ifnet *));
|
||||
extern int ipf_log __P((void));
|
||||
extern int ipfr_fastroute __P((ip_t *, fr_info_t *, frdest_t *));
|
||||
extern struct ifnet *get_unit __P((char *, int));
|
||||
# if defined(__NetBSD__) || defined(__OpenBSD__) || \
|
||||
(_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000)
|
||||
extern int iplioctl __P((dev_t, u_long, caddr_t, int));
|
||||
# else
|
||||
extern int iplioctl __P((dev_t, int, caddr_t, int));
|
||||
# endif
|
||||
extern int iplopen __P((dev_t, int));
|
||||
extern int iplclose __P((dev_t, int));
|
||||
#else /* #ifndef _KERNEL */
|
||||
# if defined(__NetBSD__) && defined(PFIL_HOOKS)
|
||||
extern void ipfilterattach __P((int));
|
||||
# endif
|
||||
extern int iplattach __P((void));
|
||||
extern int ipl_enable __P((void));
|
||||
extern int ipl_disable __P((void));
|
||||
extern void ipflog_init __P((void));
|
||||
extern int ipflog_clear __P((minor_t));
|
||||
extern int ipflog_read __P((minor_t, struct uio *));
|
||||
extern int ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *));
|
||||
extern int ipllog __P((int, fr_info_t *, void **, size_t *, int *, int));
|
||||
extern int send_icmp_err __P((ip_t *, int, fr_info_t *, int));
|
||||
extern int send_reset __P((ip_t *, fr_info_t *));
|
||||
# if SOLARIS
|
||||
extern int fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **));
|
||||
extern int (*fr_checkp) __P((ip_t *, int, void *,
|
||||
int, qif_t *, mb_t **));
|
||||
# if SOLARIS2 >= 7
|
||||
extern int iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *));
|
||||
# else
|
||||
extern int iplioctl __P((dev_t, int, int *, int, cred_t *, int *));
|
||||
# endif
|
||||
extern int iplopen __P((dev_t *, int, int, cred_t *));
|
||||
extern int iplclose __P((dev_t, int, int, cred_t *));
|
||||
extern int ipfsync __P((void));
|
||||
extern int ipfr_fastroute __P((ip_t *, mblk_t *, mblk_t **,
|
||||
fr_info_t *, frdest_t *));
|
||||
extern void copyin_mblk __P((mblk_t *, size_t, size_t, char *));
|
||||
extern void copyout_mblk __P((mblk_t *, size_t, size_t, char *));
|
||||
extern int fr_qin __P((queue_t *, mblk_t *));
|
||||
extern int fr_qout __P((queue_t *, mblk_t *));
|
||||
extern int iplread __P((dev_t, struct uio *, cred_t *));
|
||||
# else /* SOLARIS */
|
||||
extern int fr_check __P((ip_t *, int, void *, int, mb_t **));
|
||||
extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
|
||||
extern int ipfr_fastroute __P((mb_t *, fr_info_t *, frdest_t *));
|
||||
extern size_t mbufchainlen __P((mb_t *));
|
||||
# ifdef __sgi
|
||||
# include <sys/cred.h>
|
||||
extern int iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *));
|
||||
extern int iplopen __P((dev_t *, int, int, cred_t *));
|
||||
extern int iplclose __P((dev_t, int, int, cred_t *));
|
||||
extern int iplread __P((dev_t, struct uio *, cred_t *));
|
||||
extern int ipfsync __P((void));
|
||||
extern int ipfilter_sgi_attach __P((void));
|
||||
extern void ipfilter_sgi_detach __P((void));
|
||||
extern void ipfilter_sgi_intfsync __P((void));
|
||||
# else
|
||||
# ifdef IPFILTER_LKM
|
||||
extern int iplidentify __P((char *));
|
||||
# endif
|
||||
# if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \
|
||||
(NetBSD >= 199511) || defined(__OpenBSD__)
|
||||
# if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \
|
||||
defined(__OpenBSD__) || (__FreeBSD_version >= 300000)
|
||||
extern int iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *));
|
||||
# else
|
||||
extern int iplioctl __P((dev_t, int, caddr_t, int, struct proc *));
|
||||
# endif
|
||||
extern int iplopen __P((dev_t, int, int, struct proc *));
|
||||
extern int iplclose __P((dev_t, int, int, struct proc *));
|
||||
# else
|
||||
# ifndef linux
|
||||
extern int iplopen __P((dev_t, int));
|
||||
extern int iplclose __P((dev_t, int));
|
||||
extern int iplioctl __P((dev_t, int, caddr_t, int));
|
||||
# else
|
||||
extern int iplioctl(struct inode *, struct file *, u_int, u_long);
|
||||
extern int iplopen __P((struct inode *, struct file *));
|
||||
extern void iplclose __P((struct inode *, struct file *));
|
||||
# endif /* !linux */
|
||||
# endif /* (_BSDI_VERSION >= 199510) */
|
||||
# if BSD >= 199306
|
||||
extern int iplread __P((dev_t, struct uio *, int));
|
||||
# else
|
||||
# ifndef linux
|
||||
extern int iplread __P((dev_t, struct uio *));
|
||||
# else
|
||||
extern int iplread(struct inode *, struct file *, char *, int);
|
||||
# endif /* !linux */
|
||||
# endif /* BSD >= 199306 */
|
||||
# endif /* __ sgi */
|
||||
# endif /* SOLARIS */
|
||||
#endif /* #ifndef _KERNEL */
|
||||
|
||||
extern char *memstr __P((char *, char *, int, int));
|
||||
extern void fixskip __P((frentry_t **, frentry_t *, int));
|
||||
extern int countbits __P((u_32_t));
|
||||
extern int ipldetach __P((void));
|
||||
extern u_short ipf_cksum __P((u_short *, int));
|
||||
extern int ircopyptr __P((void *, void *, size_t));
|
||||
extern int iwcopyptr __P((void *, void *, size_t));
|
||||
|
||||
extern int frflush __P((minor_t, int));
|
||||
extern void frsync __P((void));
|
||||
extern frgroup_t *fr_addgroup __P((u_32_t, frentry_t *, minor_t, int));
|
||||
extern void fr_delgroup __P((u_32_t, u_32_t, minor_t, int));
|
||||
extern frgroup_t *fr_findgroup __P((u_32_t, u_32_t, minor_t, int,
|
||||
frgroup_t ***));
|
||||
|
||||
extern int fr_copytolog __P((int, char *, int));
|
||||
extern void fr_forgetifp __P((void *));
|
||||
extern void fr_getstat __P((struct friostat *));
|
||||
extern int fr_ifpaddr __P((int, void *, struct in_addr *));
|
||||
extern int fr_lock __P((caddr_t, int *));
|
||||
extern void fr_makefrip __P((int, ip_t *, fr_info_t *));
|
||||
extern u_short fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *));
|
||||
extern int fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *));
|
||||
extern int fr_tcpudpchk __P((frtuc_t *, fr_info_t *));
|
||||
extern int fr_verifysrc __P((struct in_addr, void *));
|
||||
|
||||
extern int ipl_unreach;
|
||||
extern int fr_running;
|
||||
extern u_long ipl_frouteok[2];
|
||||
extern int fr_pass;
|
||||
extern int fr_flags;
|
||||
extern int fr_active;
|
||||
extern int fr_chksrc;
|
||||
extern int fr_minttl;
|
||||
extern int fr_minttllog;
|
||||
extern fr_info_t frcache[2];
|
||||
extern char ipfilter_version[];
|
||||
extern iplog_t **iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1];
|
||||
extern size_t iplused[IPL_LOGMAX + 1];
|
||||
extern struct frentry *ipfilter[2][2], *ipacct[2][2];
|
||||
#ifdef USE_INET6
|
||||
extern struct frentry *ipfilter6[2][2], *ipacct6[2][2];
|
||||
extern int icmptoicmp6types[ICMP_MAXTYPE+1];
|
||||
extern int icmptoicmp6unreach[ICMP_MAX_UNREACH];
|
||||
#endif
|
||||
extern struct frgroup *ipfgroups[3][2];
|
||||
extern struct filterstats frstats[];
|
||||
|
||||
#endif /* __IP_FIL_H__ */
|
@ -1,576 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1993-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*/
|
||||
#if !defined(lint)
|
||||
static const char sccsid[] = "@(#)ip_frag.c 1.11 3/24/96 (C) 1993-1995 Darren Reed";
|
||||
static const char rcsid[] = "@(#)$FreeBSD$";
|
||||
#endif
|
||||
|
||||
#if defined(KERNEL) && !defined(_KERNEL)
|
||||
# define _KERNEL
|
||||
#endif
|
||||
|
||||
#include <sys/errno.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/time.h>
|
||||
#include <sys/file.h>
|
||||
#if !defined(_KERNEL) && !defined(KERNEL)
|
||||
# include <stdio.h>
|
||||
# include <string.h>
|
||||
# include <stdlib.h>
|
||||
#endif
|
||||
#if (defined(KERNEL) || defined(_KERNEL)) && (__FreeBSD_version >= 220000)
|
||||
# include <sys/filio.h>
|
||||
# include <sys/fcntl.h>
|
||||
#else
|
||||
# include <sys/ioctl.h>
|
||||
#endif
|
||||
#include <sys/uio.h>
|
||||
#ifndef linux
|
||||
# include <sys/protosw.h>
|
||||
#endif
|
||||
#include <sys/socket.h>
|
||||
#if defined(_KERNEL) && !defined(linux)
|
||||
# include <sys/systm.h>
|
||||
#endif
|
||||
#if !defined(__SVR4) && !defined(__svr4__)
|
||||
# if defined(_KERNEL) && !defined(__sgi)
|
||||
# include <sys/kernel.h>
|
||||
# endif
|
||||
# ifndef linux
|
||||
# include <sys/mbuf.h>
|
||||
# endif
|
||||
#else
|
||||
# include <sys/byteorder.h>
|
||||
# ifdef _KERNEL
|
||||
# include <sys/dditypes.h>
|
||||
# endif
|
||||
# include <sys/stream.h>
|
||||
# include <sys/kmem.h>
|
||||
#endif
|
||||
#include <net/if.h>
|
||||
#ifdef sun
|
||||
# include <net/af.h>
|
||||
#endif
|
||||
#include <net/route.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/in_systm.h>
|
||||
#include <netinet/ip.h>
|
||||
#ifndef linux
|
||||
# include <netinet/ip_var.h>
|
||||
#endif
|
||||
#include <netinet/tcp.h>
|
||||
#include <netinet/udp.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include "netinet/ip_compat.h"
|
||||
#include <netinet/tcpip.h>
|
||||
#include "netinet/ip_fil.h"
|
||||
#include "netinet/ip_proxy.h"
|
||||
#include "netinet/ip_nat.h"
|
||||
#include "netinet/ip_frag.h"
|
||||
#include "netinet/ip_state.h"
|
||||
#include "netinet/ip_auth.h"
|
||||
#if (__FreeBSD_version >= 300000)
|
||||
# include <sys/malloc.h>
|
||||
# if (defined(KERNEL) || defined(_KERNEL))
|
||||
# ifndef IPFILTER_LKM
|
||||
# include <sys/libkern.h>
|
||||
# include <sys/systm.h>
|
||||
# endif
|
||||
extern struct callout_handle ipfr_slowtimer_ch;
|
||||
# endif
|
||||
#endif
|
||||
#if defined(__NetBSD__) && (__NetBSD_Version__ >= 104230000)
|
||||
# include <sys/callout.h>
|
||||
extern struct callout ipfr_slowtimer_ch;
|
||||
#endif
|
||||
|
||||
|
||||
static ipfr_t *ipfr_heads[IPFT_SIZE];
|
||||
static ipfr_t *ipfr_nattab[IPFT_SIZE];
|
||||
static ipfrstat_t ipfr_stats;
|
||||
static int ipfr_inuse = 0;
|
||||
|
||||
int fr_ipfrttl = 120; /* 60 seconds */
|
||||
int fr_frag_lock = 0;
|
||||
|
||||
#ifdef _KERNEL
|
||||
# if SOLARIS2 >= 7
|
||||
extern timeout_id_t ipfr_timer_id;
|
||||
# else
|
||||
extern int ipfr_timer_id;
|
||||
# endif
|
||||
#endif
|
||||
#if (SOLARIS || defined(__sgi)) && defined(_KERNEL)
|
||||
extern KRWLOCK_T ipf_frag, ipf_natfrag, ipf_nat, ipf_mutex;
|
||||
# if SOLARIS
|
||||
extern KRWLOCK_T ipf_solaris;
|
||||
# else
|
||||
KRWLOCK_T ipf_solaris;
|
||||
# endif
|
||||
extern kmutex_t ipf_rw;
|
||||
#endif
|
||||
|
||||
|
||||
static ipfr_t *ipfr_new __P((ip_t *, fr_info_t *, u_int, ipfr_t **));
|
||||
static ipfr_t *ipfr_lookup __P((ip_t *, fr_info_t *, ipfr_t **));
|
||||
static void ipfr_delete __P((ipfr_t *));
|
||||
|
||||
|
||||
ipfrstat_t *ipfr_fragstats()
|
||||
{
|
||||
ipfr_stats.ifs_table = ipfr_heads;
|
||||
ipfr_stats.ifs_nattab = ipfr_nattab;
|
||||
ipfr_stats.ifs_inuse = ipfr_inuse;
|
||||
return &ipfr_stats;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* add a new entry to the fragment cache, registering it as having come
|
||||
* through this box, with the result of the filter operation.
|
||||
*/
|
||||
static ipfr_t *ipfr_new(ip, fin, pass, table)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
u_int pass;
|
||||
ipfr_t *table[];
|
||||
{
|
||||
ipfr_t **fp, *fra, frag;
|
||||
u_int idx, off;
|
||||
|
||||
if (ipfr_inuse >= IPFT_SIZE)
|
||||
return NULL;
|
||||
|
||||
if (!(fin->fin_fi.fi_fl & FI_FRAG))
|
||||
return NULL;
|
||||
|
||||
frag.ipfr_p = ip->ip_p;
|
||||
idx = ip->ip_p;
|
||||
frag.ipfr_id = ip->ip_id;
|
||||
idx += ip->ip_id;
|
||||
frag.ipfr_tos = ip->ip_tos;
|
||||
frag.ipfr_src.s_addr = ip->ip_src.s_addr;
|
||||
idx += ip->ip_src.s_addr;
|
||||
frag.ipfr_dst.s_addr = ip->ip_dst.s_addr;
|
||||
idx += ip->ip_dst.s_addr;
|
||||
frag.ipfr_ifp = fin->fin_ifp;
|
||||
idx *= 127;
|
||||
idx %= IPFT_SIZE;
|
||||
|
||||
/*
|
||||
* first, make sure it isn't already there...
|
||||
*/
|
||||
for (fp = &table[idx]; (fra = *fp); fp = &fra->ipfr_next)
|
||||
if (!bcmp((char *)&frag.ipfr_src, (char *)&fra->ipfr_src,
|
||||
IPFR_CMPSZ)) {
|
||||
ATOMIC_INCL(ipfr_stats.ifs_exists);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/*
|
||||
* allocate some memory, if possible, if not, just record that we
|
||||
* failed to do so.
|
||||
*/
|
||||
KMALLOC(fra, ipfr_t *);
|
||||
if (fra == NULL) {
|
||||
ATOMIC_INCL(ipfr_stats.ifs_nomem);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if ((fra->ipfr_rule = fin->fin_fr) != NULL) {
|
||||
ATOMIC_INC32(fin->fin_fr->fr_ref);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Instert the fragment into the fragment table, copy the struct used
|
||||
* in the search using bcopy rather than reassign each field.
|
||||
* Set the ttl to the default and mask out logging from "pass"
|
||||
*/
|
||||
if ((fra->ipfr_next = table[idx]))
|
||||
table[idx]->ipfr_prev = fra;
|
||||
fra->ipfr_prev = NULL;
|
||||
fra->ipfr_data = NULL;
|
||||
table[idx] = fra;
|
||||
bcopy((char *)&frag.ipfr_src, (char *)&fra->ipfr_src, IPFR_CMPSZ);
|
||||
fra->ipfr_ttl = fr_ipfrttl;
|
||||
/*
|
||||
* Compute the offset of the expected start of the next packet.
|
||||
*/
|
||||
off = ip->ip_off & IP_OFFMASK;
|
||||
if (!off)
|
||||
fra->ipfr_seen0 = 1;
|
||||
fra->ipfr_off = off + (fin->fin_dlen >> 3);
|
||||
ATOMIC_INCL(ipfr_stats.ifs_new);
|
||||
ATOMIC_INC32(ipfr_inuse);
|
||||
return fra;
|
||||
}
|
||||
|
||||
|
||||
int ipfr_newfrag(ip, fin, pass)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
u_int pass;
|
||||
{
|
||||
ipfr_t *ipf;
|
||||
|
||||
if ((ip->ip_v != 4) || (fr_frag_lock))
|
||||
return -1;
|
||||
WRITE_ENTER(&ipf_frag);
|
||||
ipf = ipfr_new(ip, fin, pass, ipfr_heads);
|
||||
RWLOCK_EXIT(&ipf_frag);
|
||||
return ipf ? 0 : -1;
|
||||
}
|
||||
|
||||
|
||||
int ipfr_nat_newfrag(ip, fin, pass, nat)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
u_int pass;
|
||||
nat_t *nat;
|
||||
{
|
||||
ipfr_t *ipf;
|
||||
|
||||
if ((ip->ip_v != 4) || (fr_frag_lock))
|
||||
return -1;
|
||||
WRITE_ENTER(&ipf_natfrag);
|
||||
ipf = ipfr_new(ip, fin, pass, ipfr_nattab);
|
||||
if (ipf != NULL) {
|
||||
ipf->ipfr_data = nat;
|
||||
nat->nat_data = ipf;
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_natfrag);
|
||||
return ipf ? 0 : -1;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* check the fragment cache to see if there is already a record of this packet
|
||||
* with its filter result known.
|
||||
*/
|
||||
static ipfr_t *ipfr_lookup(ip, fin, table)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
ipfr_t *table[];
|
||||
{
|
||||
ipfr_t *f, frag;
|
||||
u_int idx;
|
||||
|
||||
if (!(fin->fin_fi.fi_fl & FI_FRAG))
|
||||
return NULL;
|
||||
|
||||
/*
|
||||
* For fragments, we record protocol, packet id, TOS and both IP#'s
|
||||
* (these should all be the same for all fragments of a packet).
|
||||
*
|
||||
* build up a hash value to index the table with.
|
||||
*/
|
||||
frag.ipfr_p = ip->ip_p;
|
||||
idx = ip->ip_p;
|
||||
frag.ipfr_id = ip->ip_id;
|
||||
idx += ip->ip_id;
|
||||
frag.ipfr_tos = ip->ip_tos;
|
||||
frag.ipfr_src.s_addr = ip->ip_src.s_addr;
|
||||
idx += ip->ip_src.s_addr;
|
||||
frag.ipfr_dst.s_addr = ip->ip_dst.s_addr;
|
||||
idx += ip->ip_dst.s_addr;
|
||||
frag.ipfr_ifp = fin->fin_ifp;
|
||||
idx *= 127;
|
||||
idx %= IPFT_SIZE;
|
||||
|
||||
/*
|
||||
* check the table, careful to only compare the right amount of data
|
||||
*/
|
||||
for (f = table[idx]; f; f = f->ipfr_next)
|
||||
if (!bcmp((char *)&frag.ipfr_src, (char *)&f->ipfr_src,
|
||||
IPFR_CMPSZ)) {
|
||||
u_short atoff, off;
|
||||
|
||||
/*
|
||||
* XXX - We really need to be guarding against the
|
||||
* retransmission of (src,dst,id,offset-range) here
|
||||
* because a fragmented packet is never resent with
|
||||
* the same IP ID#.
|
||||
*/
|
||||
off = ip->ip_off & IP_OFFMASK;
|
||||
if (f->ipfr_seen0) {
|
||||
if (!off || (fin->fin_fi.fi_fl & FI_SHORT))
|
||||
continue;
|
||||
} else if (!off)
|
||||
f->ipfr_seen0 = 1;
|
||||
|
||||
if (f != table[idx]) {
|
||||
/*
|
||||
* move fragment info. to the top of the list
|
||||
* to speed up searches.
|
||||
*/
|
||||
if ((f->ipfr_prev->ipfr_next = f->ipfr_next))
|
||||
f->ipfr_next->ipfr_prev = f->ipfr_prev;
|
||||
f->ipfr_next = table[idx];
|
||||
table[idx]->ipfr_prev = f;
|
||||
f->ipfr_prev = NULL;
|
||||
table[idx] = f;
|
||||
}
|
||||
atoff = off + (fin->fin_dlen >> 3);
|
||||
/*
|
||||
* If we've follwed the fragments, and this is the
|
||||
* last (in order), shrink expiration time.
|
||||
*/
|
||||
if (off == f->ipfr_off) {
|
||||
if (!(ip->ip_off & IP_MF))
|
||||
f->ipfr_ttl = 1;
|
||||
else
|
||||
f->ipfr_off = atoff;
|
||||
}
|
||||
ATOMIC_INCL(ipfr_stats.ifs_hits);
|
||||
return f;
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* functional interface for NAT lookups of the NAT fragment cache
|
||||
*/
|
||||
nat_t *ipfr_nat_knownfrag(ip, fin)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
{
|
||||
nat_t *nat;
|
||||
ipfr_t *ipf;
|
||||
|
||||
if ((ip->ip_v != 4) || (fr_frag_lock))
|
||||
return NULL;
|
||||
READ_ENTER(&ipf_natfrag);
|
||||
ipf = ipfr_lookup(ip, fin, ipfr_nattab);
|
||||
if (ipf != NULL) {
|
||||
nat = ipf->ipfr_data;
|
||||
/*
|
||||
* This is the last fragment for this packet.
|
||||
*/
|
||||
if ((ipf->ipfr_ttl == 1) && (nat != NULL)) {
|
||||
nat->nat_data = NULL;
|
||||
ipf->ipfr_data = NULL;
|
||||
}
|
||||
} else
|
||||
nat = NULL;
|
||||
RWLOCK_EXIT(&ipf_natfrag);
|
||||
return nat;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* functional interface for normal lookups of the fragment cache
|
||||
*/
|
||||
frentry_t *ipfr_knownfrag(ip, fin)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
{
|
||||
frentry_t *fr = NULL;
|
||||
ipfr_t *fra;
|
||||
|
||||
if ((ip->ip_v != 4) || (fr_frag_lock))
|
||||
return NULL;
|
||||
READ_ENTER(&ipf_frag);
|
||||
fra = ipfr_lookup(ip, fin, ipfr_heads);
|
||||
if (fra != NULL)
|
||||
fr = fra->ipfr_rule;
|
||||
RWLOCK_EXIT(&ipf_frag);
|
||||
return fr;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* forget any references to this external object.
|
||||
*/
|
||||
void ipfr_forget(nat)
|
||||
void *nat;
|
||||
{
|
||||
ipfr_t *fr;
|
||||
int idx;
|
||||
|
||||
WRITE_ENTER(&ipf_natfrag);
|
||||
for (idx = IPFT_SIZE - 1; idx >= 0; idx--)
|
||||
for (fr = ipfr_heads[idx]; fr; fr = fr->ipfr_next)
|
||||
if (fr->ipfr_data == nat)
|
||||
fr->ipfr_data = NULL;
|
||||
|
||||
RWLOCK_EXIT(&ipf_natfrag);
|
||||
}
|
||||
|
||||
|
||||
static void ipfr_delete(fra)
|
||||
ipfr_t *fra;
|
||||
{
|
||||
frentry_t *fr;
|
||||
|
||||
fr = fra->ipfr_rule;
|
||||
if (fr != NULL) {
|
||||
ATOMIC_DEC32(fr->fr_ref);
|
||||
if (fr->fr_ref == 0)
|
||||
KFREE(fr);
|
||||
}
|
||||
if (fra->ipfr_prev)
|
||||
fra->ipfr_prev->ipfr_next = fra->ipfr_next;
|
||||
if (fra->ipfr_next)
|
||||
fra->ipfr_next->ipfr_prev = fra->ipfr_prev;
|
||||
KFREE(fra);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Free memory in use by fragment state info. kept.
|
||||
*/
|
||||
void ipfr_unload()
|
||||
{
|
||||
ipfr_t **fp, *fra;
|
||||
nat_t *nat;
|
||||
int idx;
|
||||
|
||||
WRITE_ENTER(&ipf_frag);
|
||||
for (idx = IPFT_SIZE - 1; idx >= 0; idx--)
|
||||
for (fp = &ipfr_heads[idx]; (fra = *fp); ) {
|
||||
*fp = fra->ipfr_next;
|
||||
ipfr_delete(fra);
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_frag);
|
||||
|
||||
WRITE_ENTER(&ipf_nat);
|
||||
WRITE_ENTER(&ipf_natfrag);
|
||||
for (idx = IPFT_SIZE - 1; idx >= 0; idx--)
|
||||
for (fp = &ipfr_nattab[idx]; (fra = *fp); ) {
|
||||
*fp = fra->ipfr_next;
|
||||
nat = fra->ipfr_data;
|
||||
if (nat != NULL) {
|
||||
if (nat->nat_data == fra)
|
||||
nat->nat_data = NULL;
|
||||
}
|
||||
ipfr_delete(fra);
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_natfrag);
|
||||
RWLOCK_EXIT(&ipf_nat);
|
||||
}
|
||||
|
||||
|
||||
#ifdef _KERNEL
|
||||
void ipfr_fragexpire()
|
||||
{
|
||||
ipfr_t **fp, *fra;
|
||||
nat_t *nat;
|
||||
int idx;
|
||||
#if defined(_KERNEL)
|
||||
# if !SOLARIS
|
||||
int s;
|
||||
# endif
|
||||
#endif
|
||||
|
||||
if (fr_frag_lock)
|
||||
return;
|
||||
|
||||
SPL_NET(s);
|
||||
WRITE_ENTER(&ipf_frag);
|
||||
|
||||
/*
|
||||
* Go through the entire table, looking for entries to expire,
|
||||
* decreasing the ttl by one for each entry. If it reaches 0,
|
||||
* remove it from the chain and free it.
|
||||
*/
|
||||
for (idx = IPFT_SIZE - 1; idx >= 0; idx--)
|
||||
for (fp = &ipfr_heads[idx]; (fra = *fp); ) {
|
||||
--fra->ipfr_ttl;
|
||||
if (fra->ipfr_ttl == 0) {
|
||||
*fp = fra->ipfr_next;
|
||||
ipfr_delete(fra);
|
||||
ATOMIC_INCL(ipfr_stats.ifs_expire);
|
||||
ATOMIC_DEC32(ipfr_inuse);
|
||||
} else
|
||||
fp = &fra->ipfr_next;
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_frag);
|
||||
|
||||
/*
|
||||
* Same again for the NAT table, except that if the structure also
|
||||
* still points to a NAT structure, and the NAT structure points back
|
||||
* at the one to be free'd, NULL the reference from the NAT struct.
|
||||
* NOTE: We need to grab both mutex's early, and in this order so as
|
||||
* to prevent a deadlock if both try to expire at the same time.
|
||||
*/
|
||||
WRITE_ENTER(&ipf_nat);
|
||||
WRITE_ENTER(&ipf_natfrag);
|
||||
for (idx = IPFT_SIZE - 1; idx >= 0; idx--)
|
||||
for (fp = &ipfr_nattab[idx]; (fra = *fp); ) {
|
||||
--fra->ipfr_ttl;
|
||||
if (fra->ipfr_ttl == 0) {
|
||||
ATOMIC_INCL(ipfr_stats.ifs_expire);
|
||||
ATOMIC_DEC32(ipfr_inuse);
|
||||
nat = fra->ipfr_data;
|
||||
if (nat != NULL) {
|
||||
if (nat->nat_data == fra)
|
||||
nat->nat_data = NULL;
|
||||
}
|
||||
*fp = fra->ipfr_next;
|
||||
ipfr_delete(fra);
|
||||
} else
|
||||
fp = &fra->ipfr_next;
|
||||
}
|
||||
RWLOCK_EXIT(&ipf_natfrag);
|
||||
RWLOCK_EXIT(&ipf_nat);
|
||||
SPL_X(s);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Slowly expire held state for fragments. Timeouts are set * in expectation
|
||||
* of this being called twice per second.
|
||||
*/
|
||||
# if (BSD >= 199306) || SOLARIS || defined(__sgi)
|
||||
# if defined(SOLARIS2) && (SOLARIS2 < 7)
|
||||
void ipfr_slowtimer()
|
||||
# else
|
||||
void ipfr_slowtimer __P((void *ptr))
|
||||
# endif
|
||||
# else
|
||||
int ipfr_slowtimer()
|
||||
# endif
|
||||
{
|
||||
#if defined(_KERNEL) && SOLARIS
|
||||
extern int fr_running;
|
||||
|
||||
if (fr_running <= 0)
|
||||
return;
|
||||
#endif
|
||||
|
||||
READ_ENTER(&ipf_solaris);
|
||||
#ifdef __sgi
|
||||
ipfilter_sgi_intfsync();
|
||||
#endif
|
||||
|
||||
ipfr_fragexpire();
|
||||
fr_timeoutstate();
|
||||
ip_natexpire();
|
||||
fr_authexpire();
|
||||
# if SOLARIS
|
||||
ipfr_timer_id = timeout(ipfr_slowtimer, NULL, drv_usectohz(500000));
|
||||
RWLOCK_EXIT(&ipf_solaris);
|
||||
# else
|
||||
# if defined(__NetBSD__) && (__NetBSD_Version__ >= 104240000)
|
||||
callout_reset(&ipfr_slowtimer_ch, hz / 2, ipfr_slowtimer, NULL);
|
||||
# else
|
||||
# if (__FreeBSD_version >= 300000)
|
||||
ipfr_slowtimer_ch = timeout(ipfr_slowtimer, NULL, hz/2);
|
||||
# else
|
||||
timeout(ipfr_slowtimer, NULL, hz/2);
|
||||
# endif
|
||||
# if (BSD < 199306) && !defined(__sgi)
|
||||
return 0;
|
||||
# endif /* FreeBSD */
|
||||
# endif /* NetBSD */
|
||||
# endif /* SOLARIS */
|
||||
}
|
||||
#endif /* defined(_KERNEL) */
|
@ -1,69 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1993-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* @(#)ip_frag.h 1.5 3/24/96
|
||||
* $Id: ip_frag.h,v 2.4.2.2 2000/11/10 13:10:54 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef __IP_FRAG_H__
|
||||
#define __IP_FRAG_H__
|
||||
|
||||
#define IPFT_SIZE 257
|
||||
|
||||
typedef struct ipfr {
|
||||
struct ipfr *ipfr_next, *ipfr_prev;
|
||||
void *ipfr_data;
|
||||
struct in_addr ipfr_src;
|
||||
struct in_addr ipfr_dst;
|
||||
void *ipfr_ifp;
|
||||
u_short ipfr_id;
|
||||
u_char ipfr_p;
|
||||
u_char ipfr_tos;
|
||||
u_short ipfr_off;
|
||||
u_char ipfr_ttl;
|
||||
u_char ipfr_seen0;
|
||||
frentry_t *ipfr_rule;
|
||||
} ipfr_t;
|
||||
|
||||
|
||||
typedef struct ipfrstat {
|
||||
u_long ifs_exists; /* add & already exists */
|
||||
u_long ifs_nomem;
|
||||
u_long ifs_new;
|
||||
u_long ifs_hits;
|
||||
u_long ifs_expire;
|
||||
u_long ifs_inuse;
|
||||
struct ipfr **ifs_table;
|
||||
struct ipfr **ifs_nattab;
|
||||
} ipfrstat_t;
|
||||
|
||||
#define IPFR_CMPSZ (offsetof(ipfr_t, ipfr_off) - \
|
||||
offsetof(ipfr_t, ipfr_src))
|
||||
|
||||
extern int fr_ipfrttl;
|
||||
extern int fr_frag_lock;
|
||||
extern ipfrstat_t *ipfr_fragstats __P((void));
|
||||
extern int ipfr_newfrag __P((ip_t *, fr_info_t *, u_int));
|
||||
extern int ipfr_nat_newfrag __P((ip_t *, fr_info_t *, u_int, struct nat *));
|
||||
extern nat_t *ipfr_nat_knownfrag __P((ip_t *, fr_info_t *));
|
||||
extern frentry_t *ipfr_knownfrag __P((ip_t *, fr_info_t *));
|
||||
extern void ipfr_forget __P((void *));
|
||||
extern void ipfr_unload __P((void));
|
||||
extern void ipfr_fragexpire __P((void));
|
||||
|
||||
#if (BSD >= 199306) || SOLARIS || defined(__sgi)
|
||||
# if defined(SOLARIS2) && (SOLARIS2 < 7)
|
||||
extern void ipfr_slowtimer __P((void));
|
||||
# else
|
||||
extern void ipfr_slowtimer __P((void *));
|
||||
# endif
|
||||
#else
|
||||
extern int ipfr_slowtimer __P((void));
|
||||
#endif /* (BSD >= 199306) || SOLARIS */
|
||||
|
||||
#endif /* __IP_FIL_H__ */
|
@ -1,786 +0,0 @@
|
||||
/*
|
||||
* Simple FTP transparent proxy for in-kernel use. For use with the NAT
|
||||
* code.
|
||||
*
|
||||
* $FreeBSD$
|
||||
*/
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
extern kmutex_t ipf_rw;
|
||||
#endif
|
||||
|
||||
#define isdigit(x) ((x) >= '0' && (x) <= '9')
|
||||
#define isupper(x) (((unsigned)(x) >= 'A') && ((unsigned)(x) <= 'Z'))
|
||||
#define islower(x) (((unsigned)(x) >= 'a') && ((unsigned)(x) <= 'z'))
|
||||
#define isalpha(x) (isupper(x) || islower(x))
|
||||
#define toupper(x) (isupper(x) ? (x) : (x) - 'a' + 'A')
|
||||
|
||||
#define IPF_FTP_PROXY
|
||||
|
||||
#define IPF_MINPORTLEN 18
|
||||
#define IPF_MAXPORTLEN 30
|
||||
#define IPF_MIN227LEN 39
|
||||
#define IPF_MAX227LEN 51
|
||||
#define IPF_FTPBUFSZ 96 /* This *MUST* be >= 53! */
|
||||
|
||||
|
||||
int ippr_ftp_client __P((fr_info_t *, ip_t *, nat_t *, ftpinfo_t *, int));
|
||||
int ippr_ftp_complete __P((char *, size_t));
|
||||
int ippr_ftp_in __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_ftp_init __P((void));
|
||||
int ippr_ftp_new __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_ftp_out __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_ftp_pasv __P((fr_info_t *, ip_t *, nat_t *, ftpside_t *, int));
|
||||
int ippr_ftp_port __P((fr_info_t *, ip_t *, nat_t *, ftpside_t *, int));
|
||||
int ippr_ftp_process __P((fr_info_t *, ip_t *, nat_t *, ftpinfo_t *, int));
|
||||
int ippr_ftp_server __P((fr_info_t *, ip_t *, nat_t *, ftpinfo_t *, int));
|
||||
int ippr_ftp_valid __P((char *, size_t));
|
||||
u_short ippr_ftp_atoi __P((char **));
|
||||
|
||||
static frentry_t natfr;
|
||||
int ippr_ftp_pasvonly = 0;
|
||||
int ippr_ftp_insecure = 0;
|
||||
|
||||
|
||||
/*
|
||||
* Initialize local structures.
|
||||
*/
|
||||
int ippr_ftp_init()
|
||||
{
|
||||
bzero((char *)&natfr, sizeof(natfr));
|
||||
natfr.fr_ref = 1;
|
||||
natfr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_new(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
ftpinfo_t *ftp;
|
||||
ftpside_t *f;
|
||||
|
||||
KMALLOC(ftp, ftpinfo_t *);
|
||||
if (ftp == NULL)
|
||||
return -1;
|
||||
aps->aps_data = ftp;
|
||||
aps->aps_psiz = sizeof(ftpinfo_t);
|
||||
|
||||
bzero((char *)ftp, sizeof(*ftp));
|
||||
f = &ftp->ftp_side[0];
|
||||
f->ftps_rptr = f->ftps_buf;
|
||||
f->ftps_wptr = f->ftps_buf;
|
||||
f = &ftp->ftp_side[1];
|
||||
f->ftps_rptr = f->ftps_buf;
|
||||
f->ftps_wptr = f->ftps_buf;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_port(fin, ip, nat, f, dlen)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
nat_t *nat;
|
||||
ftpside_t *f;
|
||||
int dlen;
|
||||
{
|
||||
tcphdr_t *tcp, tcph, *tcp2 = &tcph;
|
||||
char newbuf[IPF_FTPBUFSZ], *s;
|
||||
u_short a5, a6, sp, dp;
|
||||
u_int a1, a2, a3, a4;
|
||||
struct in_addr swip;
|
||||
size_t nlen, olen;
|
||||
fr_info_t fi;
|
||||
int inc, off;
|
||||
nat_t *ipn;
|
||||
mb_t *m;
|
||||
#if SOLARIS
|
||||
mb_t *m1;
|
||||
#endif
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
/*
|
||||
* Check for client sending out PORT message.
|
||||
*/
|
||||
if (dlen < IPF_MINPORTLEN)
|
||||
return 0;
|
||||
off = fin->fin_hlen + (tcp->th_off << 2);
|
||||
/*
|
||||
* Skip the PORT command + space
|
||||
*/
|
||||
s = f->ftps_rptr + 5;
|
||||
/*
|
||||
* Pick out the address components, two at a time.
|
||||
*/
|
||||
a1 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
a2 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
/*
|
||||
* check that IP address in the PORT/PASV reply is the same as the
|
||||
* sender of the command - prevents using PORT for port scanning.
|
||||
*/
|
||||
a1 <<= 16;
|
||||
a1 |= a2;
|
||||
if (a1 != ntohl(nat->nat_inip.s_addr))
|
||||
return 0;
|
||||
|
||||
a5 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
if (*s == ')')
|
||||
s++;
|
||||
|
||||
/*
|
||||
* check for CR-LF at the end.
|
||||
*/
|
||||
if (*s == '\n')
|
||||
s--;
|
||||
if ((*s == '\r') && (*(s + 1) == '\n')) {
|
||||
s += 2;
|
||||
a6 = a5 & 0xff;
|
||||
} else
|
||||
return 0;
|
||||
a5 >>= 8;
|
||||
a5 &= 0xff;
|
||||
/*
|
||||
* Calculate new address parts for PORT command
|
||||
*/
|
||||
a1 = ntohl(ip->ip_src.s_addr);
|
||||
a2 = (a1 >> 16) & 0xff;
|
||||
a3 = (a1 >> 8) & 0xff;
|
||||
a4 = a1 & 0xff;
|
||||
a1 >>= 24;
|
||||
olen = s - f->ftps_rptr;
|
||||
/* DO NOT change this to sprintf! */
|
||||
(void) sprintf(newbuf, "%s %u,%u,%u,%u,%u,%u\r\n",
|
||||
"PORT", a1, a2, a3, a4, a5, a6);
|
||||
|
||||
nlen = strlen(newbuf);
|
||||
inc = nlen - olen;
|
||||
if ((inc + ip->ip_len) > 65535)
|
||||
return 0;
|
||||
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
for (m1 = m; m1->b_cont; m1 = m1->b_cont)
|
||||
;
|
||||
if ((inc > 0) && (m1->b_datap->db_lim - m1->b_wptr < inc)) {
|
||||
mblk_t *nm;
|
||||
|
||||
/* alloc enough to keep same trailer space for lower driver */
|
||||
nm = allocb(nlen, BPRI_MED);
|
||||
PANIC((!nm),("ippr_ftp_out: allocb failed"));
|
||||
|
||||
nm->b_band = m1->b_band;
|
||||
nm->b_wptr += nlen;
|
||||
|
||||
m1->b_wptr -= olen;
|
||||
PANIC((m1->b_wptr < m1->b_rptr),
|
||||
("ippr_ftp_out: cannot handle fragmented data block"));
|
||||
|
||||
linkb(m1, nm);
|
||||
} else {
|
||||
if (m1->b_datap->db_struiolim == m1->b_wptr)
|
||||
m1->b_datap->db_struiolim += inc;
|
||||
m1->b_datap->db_struioflag &= ~STRUIO_IP;
|
||||
m1->b_wptr += inc;
|
||||
}
|
||||
copyin_mblk(m, off, nlen, newbuf);
|
||||
#else
|
||||
m = *((mb_t **)fin->fin_mp);
|
||||
if (inc < 0)
|
||||
m_adj(m, inc);
|
||||
/* the mbuf chain will be extended if necessary by m_copyback() */
|
||||
m_copyback(m, off, nlen, newbuf);
|
||||
# ifdef M_PKTHDR
|
||||
if (!(m->m_flags & M_PKTHDR))
|
||||
m->m_pkthdr.len += inc;
|
||||
# endif
|
||||
#endif
|
||||
if (inc != 0) {
|
||||
#if SOLARIS || defined(__sgi)
|
||||
register u_32_t sum1, sum2;
|
||||
|
||||
sum1 = ip->ip_len;
|
||||
sum2 = ip->ip_len + inc;
|
||||
|
||||
/* Because ~1 == -2, We really need ~1 == -1 */
|
||||
if (sum1 > sum2)
|
||||
sum2--;
|
||||
sum2 -= sum1;
|
||||
sum2 = (sum2 & 0xffff) + (sum2 >> 16);
|
||||
|
||||
fix_outcksum(&ip->ip_sum, sum2);
|
||||
#endif
|
||||
ip->ip_len += inc;
|
||||
}
|
||||
|
||||
/*
|
||||
* Add skeleton NAT entry for connection which will come back the
|
||||
* other way.
|
||||
*/
|
||||
sp = htons(a5 << 8 | a6);
|
||||
/*
|
||||
* Don't allow the PORT command to specify a port < 1024 due to
|
||||
* security crap.
|
||||
*/
|
||||
if (ntohs(sp) < 1024)
|
||||
return 0;
|
||||
/*
|
||||
* The server may not make the connection back from port 20, but
|
||||
* it is the most likely so use it here to check for a conflicting
|
||||
* mapping.
|
||||
*/
|
||||
dp = htons(fin->fin_data[1] - 1);
|
||||
ipn = nat_outlookup(fin->fin_ifp, IPN_TCP, nat->nat_p, nat->nat_inip,
|
||||
ip->ip_dst, (dp << 16) | sp, 0);
|
||||
if (ipn == NULL) {
|
||||
int slen;
|
||||
|
||||
slen = ip->ip_len;
|
||||
ip->ip_len = fin->fin_hlen + sizeof(*tcp2);
|
||||
bcopy((char *)fin, (char *)&fi, sizeof(fi));
|
||||
bzero((char *)tcp2, sizeof(*tcp2));
|
||||
tcp2->th_win = htons(8192);
|
||||
tcp2->th_sport = sp;
|
||||
tcp2->th_off = 5;
|
||||
tcp2->th_dport = 0; /* XXX - don't specify remote port */
|
||||
fi.fin_data[0] = ntohs(sp);
|
||||
fi.fin_data[1] = 0;
|
||||
fi.fin_dlen = sizeof(*tcp2);
|
||||
fi.fin_dp = (char *)tcp2;
|
||||
fi.fin_fr = &natfr;
|
||||
swip = ip->ip_src;
|
||||
fi.fin_fi.fi_saddr = nat->nat_inip.s_addr;
|
||||
ip->ip_src = nat->nat_inip;
|
||||
ipn = nat_new(nat->nat_ptr, ip, &fi, IPN_TCP|FI_W_DPORT,
|
||||
NAT_OUTBOUND);
|
||||
if (ipn != NULL) {
|
||||
ipn->nat_age = fr_defnatage;
|
||||
(void) fr_addstate(ip, &fi, FI_W_DPORT);
|
||||
}
|
||||
ip->ip_len = slen;
|
||||
ip->ip_src = swip;
|
||||
}
|
||||
return APR_INC(inc);
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_client(fin, ip, nat, ftp, dlen)
|
||||
fr_info_t *fin;
|
||||
nat_t *nat;
|
||||
ftpinfo_t *ftp;
|
||||
ip_t *ip;
|
||||
int dlen;
|
||||
{
|
||||
char *rptr, *wptr, cmd[6], c;
|
||||
ftpside_t *f;
|
||||
int inc, i;
|
||||
|
||||
inc = 0;
|
||||
f = &ftp->ftp_side[0];
|
||||
rptr = f->ftps_rptr;
|
||||
wptr = f->ftps_wptr;
|
||||
|
||||
for (i = 0; (i < 5) && (i < dlen); i++) {
|
||||
c = rptr[i];
|
||||
if (isalpha(c)) {
|
||||
cmd[i] = toupper(c);
|
||||
} else {
|
||||
cmd[i] = c;
|
||||
}
|
||||
}
|
||||
cmd[i] = '\0';
|
||||
|
||||
if ((ftp->ftp_passok == 0) && !strncmp(cmd, "USER ", 5))
|
||||
ftp->ftp_passok = 1;
|
||||
else if ((ftp->ftp_passok == 2) && !strncmp(cmd, "PASS ", 5))
|
||||
ftp->ftp_passok = 3;
|
||||
else if ((ftp->ftp_passok == 4) && !ippr_ftp_pasvonly &&
|
||||
!strncmp(cmd, "PORT ", 5)) {
|
||||
inc = ippr_ftp_port(fin, ip, nat, f, dlen);
|
||||
} else if (ippr_ftp_insecure && !ippr_ftp_pasvonly &&
|
||||
!strncmp(cmd, "PORT ", 5)) {
|
||||
inc = ippr_ftp_port(fin, ip, nat, f, dlen);
|
||||
}
|
||||
|
||||
while ((*rptr++ != '\n') && (rptr < wptr))
|
||||
;
|
||||
f->ftps_rptr = rptr;
|
||||
return inc;
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_pasv(fin, ip, nat, f, dlen)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
nat_t *nat;
|
||||
ftpside_t *f;
|
||||
int dlen;
|
||||
{
|
||||
tcphdr_t *tcp, tcph, *tcp2 = &tcph;
|
||||
struct in_addr swip, swip2;
|
||||
u_short a5, a6, sp, dp;
|
||||
u_int a1, a2, a3, a4;
|
||||
fr_info_t fi;
|
||||
nat_t *ipn;
|
||||
int inc;
|
||||
char *s;
|
||||
|
||||
/*
|
||||
* Check for PASV reply message.
|
||||
*/
|
||||
if (dlen < IPF_MIN227LEN)
|
||||
return 0;
|
||||
else if (strncmp(f->ftps_rptr, "227 Entering Passive Mode", 25))
|
||||
return 0;
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
|
||||
/*
|
||||
* Skip the PORT command + space
|
||||
*/
|
||||
s = f->ftps_rptr + 25;
|
||||
while (*s && !isdigit(*s))
|
||||
s++;
|
||||
/*
|
||||
* Pick out the address components, two at a time.
|
||||
*/
|
||||
a1 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
a2 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* check that IP address in the PORT/PASV reply is the same as the
|
||||
* sender of the command - prevents using PORT for port scanning.
|
||||
*/
|
||||
a1 <<= 16;
|
||||
a1 |= a2;
|
||||
if (a1 != ntohl(nat->nat_oip.s_addr))
|
||||
return 0;
|
||||
|
||||
a5 = ippr_ftp_atoi(&s);
|
||||
if (!s)
|
||||
return 0;
|
||||
|
||||
if (*s == ')')
|
||||
s++;
|
||||
if (*s == '\n')
|
||||
s--;
|
||||
/*
|
||||
* check for CR-LF at the end.
|
||||
*/
|
||||
if ((*s == '\r') && (*(s + 1) == '\n')) {
|
||||
s += 2;
|
||||
a6 = a5 & 0xff;
|
||||
} else
|
||||
return 0;
|
||||
a5 >>= 8;
|
||||
/*
|
||||
* Calculate new address parts for 227 reply
|
||||
*/
|
||||
a1 = ntohl(ip->ip_src.s_addr);
|
||||
a2 = (a1 >> 16) & 0xff;
|
||||
a3 = (a1 >> 8) & 0xff;
|
||||
a4 = a1 & 0xff;
|
||||
a1 >>= 24;
|
||||
inc = 0;
|
||||
#if 0
|
||||
olen = s - f->ftps_rptr;
|
||||
(void) sprintf(newbuf, "%s %u,%u,%u,%u,%u,%u\r\n",
|
||||
"227 Entering Passive Mode", a1, a2, a3, a4, a5, a6);
|
||||
nlen = strlen(newbuf);
|
||||
inc = nlen - olen;
|
||||
if ((inc + ip->ip_len) > 65535)
|
||||
return 0;
|
||||
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
for (m1 = m; m1->b_cont; m1 = m1->b_cont)
|
||||
;
|
||||
if ((inc > 0) && (m1->b_datap->db_lim - m1->b_wptr < inc)) {
|
||||
mblk_t *nm;
|
||||
|
||||
/* alloc enough to keep same trailer space for lower driver */
|
||||
nm = allocb(nlen, BPRI_MED);
|
||||
PANIC((!nm),("ippr_ftp_out: allocb failed"));
|
||||
|
||||
nm->b_band = m1->b_band;
|
||||
nm->b_wptr += nlen;
|
||||
|
||||
m1->b_wptr -= olen;
|
||||
PANIC((m1->b_wptr < m1->b_rptr),
|
||||
("ippr_ftp_out: cannot handle fragmented data block"));
|
||||
|
||||
linkb(m1, nm);
|
||||
} else {
|
||||
m1->b_wptr += inc;
|
||||
}
|
||||
/*copyin_mblk(m, off, nlen, newbuf);*/
|
||||
#else /* SOLARIS */
|
||||
m = *((mb_t **)fin->fin_mp);
|
||||
if (inc < 0)
|
||||
m_adj(m, inc);
|
||||
/* the mbuf chain will be extended if necessary by m_copyback() */
|
||||
/*m_copyback(m, off, nlen, newbuf);*/
|
||||
#endif /* SOLARIS */
|
||||
if (inc != 0) {
|
||||
#if SOLARIS || defined(__sgi)
|
||||
register u_32_t sum1, sum2;
|
||||
|
||||
sum1 = ip->ip_len;
|
||||
sum2 = ip->ip_len + inc;
|
||||
|
||||
/* Because ~1 == -2, We really need ~1 == -1 */
|
||||
if (sum1 > sum2)
|
||||
sum2--;
|
||||
sum2 -= sum1;
|
||||
sum2 = (sum2 & 0xffff) + (sum2 >> 16);
|
||||
|
||||
fix_outcksum(&ip->ip_sum, sum2);
|
||||
#endif /* SOLARIS || defined(__sgi) */
|
||||
ip->ip_len += inc;
|
||||
}
|
||||
#endif /* 0 */
|
||||
|
||||
/*
|
||||
* Add skeleton NAT entry for connection which will come back the
|
||||
* other way.
|
||||
*/
|
||||
sp = 0;
|
||||
dp = htons(fin->fin_data[1] - 1);
|
||||
ipn = nat_outlookup(fin->fin_ifp, IPN_TCP, nat->nat_p, nat->nat_inip,
|
||||
ip->ip_dst, (dp << 16) | sp, 0);
|
||||
if (ipn == NULL) {
|
||||
int slen;
|
||||
|
||||
slen = ip->ip_len;
|
||||
ip->ip_len = fin->fin_hlen + sizeof(*tcp2);
|
||||
bcopy((char *)fin, (char *)&fi, sizeof(fi));
|
||||
bzero((char *)tcp2, sizeof(*tcp2));
|
||||
tcp2->th_win = htons(8192);
|
||||
tcp2->th_sport = 0; /* XXX - fake it for nat_new */
|
||||
tcp2->th_off = 5;
|
||||
fi.fin_data[1] = a5 << 8 | a6;
|
||||
fi.fin_dlen = sizeof(*tcp2);
|
||||
tcp2->th_dport = htons(fi.fin_data[1]);
|
||||
fi.fin_data[0] = 0;
|
||||
fi.fin_dp = (char *)tcp2;
|
||||
fi.fin_fr = &natfr;
|
||||
swip = ip->ip_src;
|
||||
swip2 = ip->ip_dst;
|
||||
fi.fin_fi.fi_daddr = ip->ip_src.s_addr;
|
||||
fi.fin_fi.fi_saddr = nat->nat_inip.s_addr;
|
||||
ip->ip_dst = ip->ip_src;
|
||||
ip->ip_src = nat->nat_inip;
|
||||
ipn = nat_new(nat->nat_ptr, ip, &fi, IPN_TCP|FI_W_SPORT,
|
||||
NAT_OUTBOUND);
|
||||
if (ipn != NULL) {
|
||||
ipn->nat_age = fr_defnatage;
|
||||
(void) fr_addstate(ip, &fi, FI_W_SPORT);
|
||||
}
|
||||
ip->ip_len = slen;
|
||||
ip->ip_src = swip;
|
||||
ip->ip_dst = swip2;
|
||||
}
|
||||
return inc;
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_server(fin, ip, nat, ftp, dlen)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
nat_t *nat;
|
||||
ftpinfo_t *ftp;
|
||||
int dlen;
|
||||
{
|
||||
char *rptr, *wptr;
|
||||
ftpside_t *f;
|
||||
int inc;
|
||||
|
||||
inc = 0;
|
||||
f = &ftp->ftp_side[1];
|
||||
rptr = f->ftps_rptr;
|
||||
wptr = f->ftps_wptr;
|
||||
|
||||
if ((ftp->ftp_passok == 1) && !strncmp(rptr, "331", 3))
|
||||
ftp->ftp_passok = 2;
|
||||
else if ((ftp->ftp_passok == 3) && !strncmp(rptr, "230", 3))
|
||||
ftp->ftp_passok = 4;
|
||||
else if ((ftp->ftp_passok == 3) && !strncmp(rptr, "530", 3))
|
||||
ftp->ftp_passok = 0;
|
||||
else if ((ftp->ftp_passok == 4) && !strncmp(rptr, "227 ", 4)) {
|
||||
inc = ippr_ftp_pasv(fin, ip, nat, f, dlen);
|
||||
} else if (ippr_ftp_insecure && !strncmp(rptr, "227 ", 4)) {
|
||||
inc = ippr_ftp_pasv(fin, ip, nat, f, dlen);
|
||||
}
|
||||
while ((*rptr++ != '\n') && (rptr < wptr))
|
||||
;
|
||||
f->ftps_rptr = rptr;
|
||||
return inc;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Look to see if the buffer starts with something which we recognise as
|
||||
* being the correct syntax for the FTP protocol.
|
||||
*/
|
||||
int ippr_ftp_valid(buf, len)
|
||||
char *buf;
|
||||
size_t len;
|
||||
{
|
||||
register char *s, c;
|
||||
register size_t i = len;
|
||||
|
||||
if (i < 5)
|
||||
return 2;
|
||||
s = buf;
|
||||
c = *s++;
|
||||
i--;
|
||||
|
||||
if (isdigit(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if (isdigit(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if (isdigit(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if ((c != '-') && (c != ' '))
|
||||
return 1;
|
||||
} else
|
||||
return 1;
|
||||
} else
|
||||
return 1;
|
||||
} else if (isalpha(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if (isalpha(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if (isalpha(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if (isalpha(c)) {
|
||||
c = *s++;
|
||||
i--;
|
||||
if ((c != ' ') && (c != '\r'))
|
||||
return 1;
|
||||
} else if ((c != ' ') && (c != '\r'))
|
||||
return 1;
|
||||
} else
|
||||
return 1;
|
||||
} else
|
||||
return 1;
|
||||
} else
|
||||
return 1;
|
||||
for (; i; i--) {
|
||||
c = *s++;
|
||||
if (c == '\n')
|
||||
return 0;
|
||||
}
|
||||
return 2;
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_process(fin, ip, nat, ftp, rv)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
nat_t *nat;
|
||||
ftpinfo_t *ftp;
|
||||
int rv;
|
||||
{
|
||||
int mlen, len, off, inc, i, sel;
|
||||
char *rptr, *wptr;
|
||||
ftpside_t *f, *t;
|
||||
tcphdr_t *tcp;
|
||||
mb_t *m;
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
off = fin->fin_hlen + (tcp->th_off << 2);
|
||||
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
#else
|
||||
m = *((mb_t **)fin->fin_mp);
|
||||
#endif
|
||||
|
||||
#if SOLARIS
|
||||
mlen = msgdsize(m) - off;
|
||||
#else
|
||||
mlen = mbufchainlen(m) - off;
|
||||
#endif
|
||||
|
||||
t = &ftp->ftp_side[1 - rv];
|
||||
f = &ftp->ftp_side[rv];
|
||||
if (!mlen) {
|
||||
if (!t->ftps_seq ||
|
||||
(int)ntohl(tcp->th_ack) - (int)t->ftps_seq > 0)
|
||||
t->ftps_seq = ntohl(tcp->th_ack);
|
||||
f->ftps_len = 0;
|
||||
return 0;
|
||||
}
|
||||
|
||||
inc = 0;
|
||||
rptr = f->ftps_rptr;
|
||||
wptr = f->ftps_wptr;
|
||||
|
||||
sel = nat->nat_aps->aps_sel[1 - rv];
|
||||
if (rv)
|
||||
i = nat->nat_aps->aps_ackoff[sel];
|
||||
else
|
||||
i = nat->nat_aps->aps_seqoff[sel];
|
||||
/*
|
||||
* XXX - Ideally, this packet should get dropped because we now know
|
||||
* that it is out of order (and there is no real danger in doing so
|
||||
* apart from causing packets to go through here ordered).
|
||||
*/
|
||||
if (f->ftps_len + f->ftps_seq == ntohl(tcp->th_seq))
|
||||
f->ftps_seq = ntohl(tcp->th_seq);
|
||||
else if (ntohl(tcp->th_seq) + i != f->ftps_seq) {
|
||||
return APR_ERR(-1);
|
||||
}
|
||||
f->ftps_len = mlen;
|
||||
|
||||
while (mlen > 0) {
|
||||
len = MIN(mlen, FTP_BUFSZ / 2);
|
||||
|
||||
#if SOLARIS
|
||||
copyout_mblk(m, off, len, wptr);
|
||||
#else
|
||||
m_copydata(m, off, len, wptr);
|
||||
#endif
|
||||
mlen -= len;
|
||||
off += len;
|
||||
wptr += len;
|
||||
f->ftps_wptr = wptr;
|
||||
if (f->ftps_junk == 2)
|
||||
f->ftps_junk = ippr_ftp_valid(rptr, wptr - rptr);
|
||||
|
||||
while ((f->ftps_junk == 0) && (wptr > rptr)) {
|
||||
f->ftps_junk = ippr_ftp_valid(rptr, wptr - rptr);
|
||||
if (f->ftps_junk == 0) {
|
||||
len = wptr - rptr;
|
||||
f->ftps_rptr = rptr;
|
||||
if (rv)
|
||||
inc += ippr_ftp_server(fin, ip, nat,
|
||||
ftp, len);
|
||||
else
|
||||
inc += ippr_ftp_client(fin, ip, nat,
|
||||
ftp, len);
|
||||
rptr = f->ftps_rptr;
|
||||
}
|
||||
}
|
||||
|
||||
while ((f->ftps_junk == 1) && (rptr < wptr)) {
|
||||
while ((rptr < wptr) && (*rptr != '\r'))
|
||||
rptr++;
|
||||
|
||||
if (*rptr == '\r') {
|
||||
if (rptr + 1 < wptr) {
|
||||
if (*(rptr + 1) == '\n') {
|
||||
rptr += 2;
|
||||
f->ftps_junk = 0;
|
||||
} else
|
||||
rptr++;
|
||||
} else
|
||||
break;
|
||||
}
|
||||
}
|
||||
f->ftps_rptr = rptr;
|
||||
|
||||
if (rptr == wptr) {
|
||||
rptr = wptr = f->ftps_buf;
|
||||
} else {
|
||||
if ((wptr > f->ftps_buf + FTP_BUFSZ / 2)) {
|
||||
i = wptr - rptr;
|
||||
if ((rptr == f->ftps_buf) ||
|
||||
(wptr - rptr > FTP_BUFSZ / 2)) {
|
||||
f->ftps_junk = 1;
|
||||
rptr = wptr = f->ftps_buf;
|
||||
} else {
|
||||
bcopy(rptr, f->ftps_buf, i);
|
||||
wptr = f->ftps_buf + i;
|
||||
rptr = f->ftps_buf;
|
||||
}
|
||||
}
|
||||
f->ftps_rptr = rptr;
|
||||
f->ftps_wptr = wptr;
|
||||
}
|
||||
}
|
||||
|
||||
t->ftps_seq = ntohl(tcp->th_ack);
|
||||
f->ftps_rptr = rptr;
|
||||
f->ftps_wptr = wptr;
|
||||
return APR_INC(inc);
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_out(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
ftpinfo_t *ftp;
|
||||
|
||||
ftp = aps->aps_data;
|
||||
if (ftp == NULL)
|
||||
return 0;
|
||||
return ippr_ftp_process(fin, ip, nat, ftp, 0);
|
||||
}
|
||||
|
||||
|
||||
int ippr_ftp_in(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
ftpinfo_t *ftp;
|
||||
|
||||
ftp = aps->aps_data;
|
||||
if (ftp == NULL)
|
||||
return 0;
|
||||
return ippr_ftp_process(fin, ip, nat, ftp, 1);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* ippr_ftp_atoi - implement a version of atoi which processes numbers in
|
||||
* pairs separated by commas (which are expected to be in the range 0 - 255),
|
||||
* returning a 16 bit number combining either side of the , as the MSB and
|
||||
* LSB.
|
||||
*/
|
||||
u_short ippr_ftp_atoi(ptr)
|
||||
char **ptr;
|
||||
{
|
||||
register char *s = *ptr, c;
|
||||
register u_char i = 0, j = 0;
|
||||
|
||||
while ((c = *s++) && isdigit(c)) {
|
||||
i *= 10;
|
||||
i += c - '0';
|
||||
}
|
||||
if (c != ',') {
|
||||
*ptr = NULL;
|
||||
return 0;
|
||||
}
|
||||
while ((c = *s++) && isdigit(c)) {
|
||||
j *= 10;
|
||||
j += c - '0';
|
||||
}
|
||||
*ptr = s;
|
||||
i &= 0xff;
|
||||
j &= 0xff;
|
||||
return (i << 8) | j;
|
||||
}
|
@ -1,507 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1997-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* $Id: ip_log.c,v 2.5.2.1 2000/07/19 13:11:47 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
#include <sys/param.h>
|
||||
#if defined(KERNEL) && !defined(_KERNEL)
|
||||
# define _KERNEL
|
||||
#endif
|
||||
#if defined(__NetBSD__) && (NetBSD >= 199905) && !defined(IPFILTER_LKM)
|
||||
# include "opt_ipfilter_log.h"
|
||||
#endif
|
||||
#ifdef __FreeBSD__
|
||||
# if defined(IPFILTER_LKM) || defined(_KERNEL)
|
||||
# if !defined(__FreeBSD_version)
|
||||
# include <sys/osreldate.h>
|
||||
# endif
|
||||
# if !defined(IPFILTER_LKM)
|
||||
# if defined(__FreeBSD_version) && (__FreeBSD_version >= 300000)
|
||||
# include "opt_ipfilter.h"
|
||||
# endif
|
||||
# endif
|
||||
# else
|
||||
# ifdef KLD_MODULE
|
||||
# include <osreldate.h>
|
||||
# endif
|
||||
# endif
|
||||
#endif
|
||||
#ifdef IPFILTER_LOG
|
||||
# ifndef SOLARIS
|
||||
# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
|
||||
# endif
|
||||
# ifndef _KERNEL
|
||||
# include <stdio.h>
|
||||
# include <string.h>
|
||||
# include <stdlib.h>
|
||||
# include <ctype.h>
|
||||
# endif
|
||||
# include <sys/errno.h>
|
||||
# include <sys/types.h>
|
||||
# include <sys/file.h>
|
||||
# if __FreeBSD_version >= 220000 && defined(_KERNEL)
|
||||
# include <sys/fcntl.h>
|
||||
# include <sys/filio.h>
|
||||
# else
|
||||
# include <sys/ioctl.h>
|
||||
# endif
|
||||
# include <sys/time.h>
|
||||
# if defined(_KERNEL) && !defined(linux)
|
||||
# include <sys/systm.h>
|
||||
# endif
|
||||
# include <sys/uio.h>
|
||||
# if !SOLARIS
|
||||
# if (NetBSD > 199609) || (OpenBSD > 199603) || (__FreeBSD_version >= 300000)
|
||||
# include <sys/dirent.h>
|
||||
# else
|
||||
# include <sys/dir.h>
|
||||
# endif
|
||||
# ifndef linux
|
||||
# include <sys/mbuf.h>
|
||||
# endif
|
||||
# else
|
||||
# include <sys/filio.h>
|
||||
# include <sys/cred.h>
|
||||
# include <sys/ddi.h>
|
||||
# include <sys/sunddi.h>
|
||||
# include <sys/ksynch.h>
|
||||
# include <sys/kmem.h>
|
||||
# include <sys/mkdev.h>
|
||||
# include <sys/dditypes.h>
|
||||
# include <sys/cmn_err.h>
|
||||
# endif
|
||||
# ifndef linux
|
||||
# include <sys/protosw.h>
|
||||
# endif
|
||||
# include <sys/socket.h>
|
||||
|
||||
# include <net/if.h>
|
||||
# ifdef sun
|
||||
# include <net/af.h>
|
||||
# endif
|
||||
# if __FreeBSD_version >= 300000
|
||||
# include <net/if_var.h>
|
||||
# endif
|
||||
# include <net/route.h>
|
||||
# include <netinet/in.h>
|
||||
# ifdef __sgi
|
||||
# include <sys/ddi.h>
|
||||
# ifdef IFF_DRVRLOCK /* IRIX6 */
|
||||
# include <sys/hashing.h>
|
||||
# endif
|
||||
# endif
|
||||
# if !defined(linux) && !(defined(__sgi) && !defined(IFF_DRVRLOCK)) /*IRIX<6*/
|
||||
# include <netinet/in_var.h>
|
||||
# endif
|
||||
# include <netinet/in_systm.h>
|
||||
# include <netinet/ip.h>
|
||||
# include <netinet/tcp.h>
|
||||
# include <netinet/udp.h>
|
||||
# include <netinet/ip_icmp.h>
|
||||
# ifndef linux
|
||||
# include <netinet/ip_var.h>
|
||||
# endif
|
||||
# ifndef _KERNEL
|
||||
# include <syslog.h>
|
||||
# endif
|
||||
# include "netinet/ip_compat.h"
|
||||
# include <netinet/tcpip.h>
|
||||
# include "netinet/ip_fil.h"
|
||||
# include "netinet/ip_proxy.h"
|
||||
# include "netinet/ip_nat.h"
|
||||
# include "netinet/ip_frag.h"
|
||||
# include "netinet/ip_state.h"
|
||||
# include "netinet/ip_auth.h"
|
||||
# if (__FreeBSD_version >= 300000)
|
||||
# include <sys/malloc.h>
|
||||
# endif
|
||||
|
||||
# ifndef MIN
|
||||
# define MIN(a,b) (((a)<(b))?(a):(b))
|
||||
# endif
|
||||
|
||||
|
||||
# if SOLARIS || defined(__sgi)
|
||||
extern kmutex_t ipl_mutex;
|
||||
# if SOLARIS
|
||||
extern kcondvar_t iplwait;
|
||||
# endif
|
||||
# endif
|
||||
|
||||
iplog_t **iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1], *ipll[IPL_LOGMAX+1];
|
||||
size_t iplused[IPL_LOGMAX+1];
|
||||
static fr_info_t iplcrc[IPL_LOGMAX+1];
|
||||
# ifdef linux
|
||||
static struct wait_queue *iplwait[IPL_LOGMAX+1];
|
||||
# endif
|
||||
|
||||
|
||||
/*
|
||||
* Initialise log buffers & pointers. Also iniialised the CRC to a local
|
||||
* secret for use in calculating the "last log checksum".
|
||||
*/
|
||||
void ipflog_init()
|
||||
{
|
||||
int i;
|
||||
|
||||
for (i = IPL_LOGMAX; i >= 0; i--) {
|
||||
iplt[i] = NULL;
|
||||
ipll[i] = NULL;
|
||||
iplh[i] = &iplt[i];
|
||||
iplused[i] = 0;
|
||||
bzero((char *)&iplcrc[i], sizeof(iplcrc[i]));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* ipflog
|
||||
* Create a log record for a packet given that it has been triggered by a
|
||||
* rule (or the default setting). Calculate the transport protocol header
|
||||
* size using predetermined size of a couple of popular protocols and thus
|
||||
* how much data to copy into the log, including part of the data body if
|
||||
* requested.
|
||||
*/
|
||||
int ipflog(flags, ip, fin, m)
|
||||
u_int flags;
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
mb_t *m;
|
||||
{
|
||||
ipflog_t ipfl;
|
||||
register size_t mlen, hlen;
|
||||
size_t sizes[2];
|
||||
void *ptrs[2];
|
||||
int types[2];
|
||||
u_char p;
|
||||
# if SOLARIS
|
||||
ill_t *ifp = fin->fin_ifp;
|
||||
# else
|
||||
struct ifnet *ifp = fin->fin_ifp;
|
||||
# endif
|
||||
|
||||
/*
|
||||
* calculate header size.
|
||||
*/
|
||||
hlen = fin->fin_hlen;
|
||||
if (fin->fin_off == 0) {
|
||||
p = fin->fin_fi.fi_p;
|
||||
if (p == IPPROTO_TCP)
|
||||
hlen += MIN(sizeof(tcphdr_t), fin->fin_dlen);
|
||||
else if (p == IPPROTO_UDP)
|
||||
hlen += MIN(sizeof(udphdr_t), fin->fin_dlen);
|
||||
else if (p == IPPROTO_ICMP) {
|
||||
struct icmp *icmp;
|
||||
|
||||
icmp = (struct icmp *)fin->fin_dp;
|
||||
|
||||
/*
|
||||
* For ICMP, if the packet is an error packet, also
|
||||
* include the information about the packet which
|
||||
* caused the error.
|
||||
*/
|
||||
switch (icmp->icmp_type)
|
||||
{
|
||||
case ICMP_UNREACH :
|
||||
case ICMP_SOURCEQUENCH :
|
||||
case ICMP_REDIRECT :
|
||||
case ICMP_TIMXCEED :
|
||||
case ICMP_PARAMPROB :
|
||||
hlen += MIN(sizeof(struct icmp) + 8,
|
||||
fin->fin_dlen);
|
||||
break;
|
||||
default :
|
||||
hlen += MIN(sizeof(struct icmp),
|
||||
fin->fin_dlen);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
/*
|
||||
* Get the interface number and name to which this packet is
|
||||
* currently associated.
|
||||
*/
|
||||
# if SOLARIS
|
||||
ipfl.fl_unit = (u_char)ifp->ill_ppa;
|
||||
bcopy(ifp->ill_name, ipfl.fl_ifname, MIN(ifp->ill_name_length, 4));
|
||||
mlen = (flags & FR_LOGBODY) ? MIN(msgdsize(m) - hlen, 128) : 0;
|
||||
# else
|
||||
# if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
|
||||
(defined(OpenBSD) && (OpenBSD >= 199603))
|
||||
strncpy(ipfl.fl_ifname, ifp->if_xname, IFNAMSIZ);
|
||||
# else
|
||||
# ifndef linux
|
||||
ipfl.fl_unit = (u_char)ifp->if_unit;
|
||||
# endif
|
||||
if ((ipfl.fl_ifname[0] = ifp->if_name[0]))
|
||||
if ((ipfl.fl_ifname[1] = ifp->if_name[1]))
|
||||
if ((ipfl.fl_ifname[2] = ifp->if_name[2]))
|
||||
ipfl.fl_ifname[3] = ifp->if_name[3];
|
||||
# endif
|
||||
mlen = (flags & FR_LOGBODY) ? MIN(fin->fin_plen - hlen, 128) : 0;
|
||||
# endif
|
||||
ipfl.fl_plen = (u_char)mlen;
|
||||
ipfl.fl_hlen = (u_char)hlen;
|
||||
ipfl.fl_rule = fin->fin_rule;
|
||||
ipfl.fl_group = fin->fin_group;
|
||||
if (fin->fin_fr != NULL)
|
||||
ipfl.fl_loglevel = fin->fin_fr->fr_loglevel;
|
||||
else
|
||||
ipfl.fl_loglevel = 0xffff;
|
||||
ipfl.fl_flags = flags;
|
||||
ptrs[0] = (void *)&ipfl;
|
||||
sizes[0] = sizeof(ipfl);
|
||||
types[0] = 0;
|
||||
# if SOLARIS
|
||||
/*
|
||||
* Are we copied from the mblk or an aligned array ?
|
||||
*/
|
||||
if (ip == (ip_t *)m->b_rptr) {
|
||||
ptrs[1] = m;
|
||||
sizes[1] = hlen + mlen;
|
||||
types[1] = 1;
|
||||
} else {
|
||||
ptrs[1] = ip;
|
||||
sizes[1] = hlen + mlen;
|
||||
types[1] = 0;
|
||||
}
|
||||
# else
|
||||
ptrs[1] = m;
|
||||
sizes[1] = hlen + mlen;
|
||||
types[1] = 1;
|
||||
# endif
|
||||
return ipllog(IPL_LOGIPF, fin, ptrs, sizes, types, 2);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* ipllog
|
||||
*/
|
||||
int ipllog(dev, fin, items, itemsz, types, cnt)
|
||||
int dev;
|
||||
fr_info_t *fin;
|
||||
void **items;
|
||||
size_t *itemsz;
|
||||
int *types, cnt;
|
||||
{
|
||||
caddr_t buf, s;
|
||||
iplog_t *ipl;
|
||||
size_t len;
|
||||
int i;
|
||||
|
||||
/*
|
||||
* Check to see if this log record has a CRC which matches the last
|
||||
* record logged. If it does, just up the count on the previous one
|
||||
* rather than create a new one.
|
||||
*/
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
if (fin != NULL) {
|
||||
if ((ipll[dev] != NULL) &&
|
||||
bcmp((char *)fin, (char *)&iplcrc[dev], FI_CSIZE) == 0) {
|
||||
ipll[dev]->ipl_count++;
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
return 1;
|
||||
}
|
||||
bcopy((char *)fin, (char *)&iplcrc[dev], FI_CSIZE);
|
||||
} else
|
||||
bzero((char *)&iplcrc[dev], FI_CSIZE);
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
|
||||
/*
|
||||
* Get the total amount of data to be logged.
|
||||
*/
|
||||
for (i = 0, len = sizeof(iplog_t); i < cnt; i++)
|
||||
len += itemsz[i];
|
||||
|
||||
/*
|
||||
* check that we have space to record this information and can
|
||||
* allocate that much.
|
||||
*/
|
||||
KMALLOCS(buf, caddr_t, len);
|
||||
if (!buf)
|
||||
return 0;
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
if ((iplused[dev] + len) > IPLLOGSIZE) {
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
KFREES(buf, len);
|
||||
return 0;
|
||||
}
|
||||
iplused[dev] += len;
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
|
||||
/*
|
||||
* advance the log pointer to the next empty record and deduct the
|
||||
* amount of space we're going to use.
|
||||
*/
|
||||
ipl = (iplog_t *)buf;
|
||||
ipl->ipl_magic = IPL_MAGIC;
|
||||
ipl->ipl_count = 1;
|
||||
ipl->ipl_next = NULL;
|
||||
ipl->ipl_dsize = len;
|
||||
# if SOLARIS || defined(sun) || defined(linux)
|
||||
uniqtime((struct timeval *)&ipl->ipl_sec);
|
||||
# else
|
||||
# if BSD >= 199306 || defined(__FreeBSD__) || defined(__sgi)
|
||||
microtime((struct timeval *)&ipl->ipl_sec);
|
||||
# endif
|
||||
# endif
|
||||
|
||||
/*
|
||||
* Loop through all the items to be logged, copying each one to the
|
||||
* buffer. Use bcopy for normal data or the mb_t copyout routine.
|
||||
*/
|
||||
for (i = 0, s = buf + sizeof(*ipl); i < cnt; i++) {
|
||||
if (types[i] == 0)
|
||||
bcopy(items[i], s, itemsz[i]);
|
||||
else if (types[i] == 1) {
|
||||
# if SOLARIS
|
||||
copyout_mblk(items[i], 0, itemsz[i], s);
|
||||
# else
|
||||
m_copydata(items[i], 0, itemsz[i], s);
|
||||
# endif
|
||||
}
|
||||
s += itemsz[i];
|
||||
}
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
ipll[dev] = ipl;
|
||||
*iplh[dev] = ipl;
|
||||
iplh[dev] = &ipl->ipl_next;
|
||||
# if SOLARIS
|
||||
cv_signal(&iplwait);
|
||||
mutex_exit(&ipl_mutex);
|
||||
# else
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
# ifdef linux
|
||||
wake_up_interruptible(&iplwait[dev]);
|
||||
# else
|
||||
wakeup(&iplh[dev]);
|
||||
# endif
|
||||
# endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
int ipflog_read(unit, uio)
|
||||
minor_t unit;
|
||||
struct uio *uio;
|
||||
{
|
||||
size_t dlen, copied;
|
||||
int error = 0;
|
||||
iplog_t *ipl;
|
||||
# if defined(_KERNEL) && !SOLARIS
|
||||
int s;
|
||||
# endif
|
||||
|
||||
/*
|
||||
* Sanity checks. Make sure the minor # is valid and we're copying
|
||||
* a valid chunk of data.
|
||||
*/
|
||||
if (IPL_LOGMAX < unit)
|
||||
return ENXIO;
|
||||
if (!uio->uio_resid)
|
||||
return 0;
|
||||
if ((uio->uio_resid < sizeof(iplog_t)) ||
|
||||
(uio->uio_resid > IPLLOGSIZE))
|
||||
return EINVAL;
|
||||
|
||||
/*
|
||||
* Lock the log so we can snapshot the variables. Wait for a signal
|
||||
* if the log is empty.
|
||||
*/
|
||||
SPL_NET(s);
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
|
||||
while (!iplused[unit] || !iplt[unit]) {
|
||||
# if SOLARIS && defined(_KERNEL)
|
||||
if (!cv_wait_sig(&iplwait, &ipl_mutex)) {
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
return EINTR;
|
||||
}
|
||||
# else
|
||||
# ifdef linux
|
||||
interruptible_sleep_on(&iplwait[unit]);
|
||||
if (current->signal & ~current->blocked)
|
||||
return -EINTR;
|
||||
# else
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
SPL_X(s);
|
||||
error = SLEEP(&iplh[unit], "ipl sleep");
|
||||
if (error)
|
||||
return error;
|
||||
SPL_NET(s);
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
# endif /* linux */
|
||||
# endif /* SOLARIS */
|
||||
}
|
||||
|
||||
# if BSD >= 199306 || defined(__FreeBSD__)
|
||||
uio->uio_rw = UIO_READ;
|
||||
# endif
|
||||
|
||||
for (copied = 0; (ipl = iplt[unit]); copied += dlen) {
|
||||
dlen = ipl->ipl_dsize;
|
||||
if (dlen > uio->uio_resid)
|
||||
break;
|
||||
/*
|
||||
* Don't hold the mutex over the uiomove call.
|
||||
*/
|
||||
iplt[unit] = ipl->ipl_next;
|
||||
iplused[unit] -= dlen;
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
SPL_X(s);
|
||||
error = UIOMOVE((caddr_t)ipl, dlen, UIO_READ, uio);
|
||||
if (error) {
|
||||
SPL_NET(s);
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
ipl->ipl_next = iplt[unit];
|
||||
iplt[unit] = ipl;
|
||||
iplused[unit] += dlen;
|
||||
break;
|
||||
}
|
||||
KFREES((caddr_t)ipl, dlen);
|
||||
SPL_NET(s);
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
}
|
||||
if (!iplt[unit]) {
|
||||
iplused[unit] = 0;
|
||||
iplh[unit] = &iplt[unit];
|
||||
ipll[unit] = NULL;
|
||||
}
|
||||
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
SPL_X(s);
|
||||
# ifdef linux
|
||||
if (!error)
|
||||
return (int)copied;
|
||||
return -error;
|
||||
# else
|
||||
return error;
|
||||
# endif
|
||||
}
|
||||
|
||||
|
||||
int ipflog_clear(unit)
|
||||
minor_t unit;
|
||||
{
|
||||
iplog_t *ipl;
|
||||
int used;
|
||||
|
||||
MUTEX_ENTER(&ipl_mutex);
|
||||
while ((ipl = iplt[unit])) {
|
||||
iplt[unit] = ipl->ipl_next;
|
||||
KFREES((caddr_t)ipl, ipl->ipl_dsize);
|
||||
}
|
||||
iplh[unit] = &iplt[unit];
|
||||
ipll[unit] = NULL;
|
||||
used = iplused[unit];
|
||||
iplused[unit] = 0;
|
||||
bzero((char *)&iplcrc[unit], FI_CSIZE);
|
||||
MUTEX_EXIT(&ipl_mutex);
|
||||
return used;
|
||||
}
|
||||
#endif /* IPFILTER_LOG */
|
2739
sys/netinet/ip_nat.c
2739
sys/netinet/ip_nat.c
File diff suppressed because it is too large
Load Diff
@ -1,309 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1995-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* @(#)ip_nat.h 1.5 2/4/96
|
||||
* $Id: ip_nat.h,v 2.17.2.14 2000/11/18 03:58:04 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef __IP_NAT_H__
|
||||
#define __IP_NAT_H__
|
||||
|
||||
#ifndef SOLARIS
|
||||
#define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
|
||||
#endif
|
||||
|
||||
#if defined(__STDC__) || defined(__GNUC__)
|
||||
#define SIOCADNAT _IOW('r', 60, struct ipnat *)
|
||||
#define SIOCRMNAT _IOW('r', 61, struct ipnat *)
|
||||
#define SIOCGNATS _IOWR('r', 62, struct natstat *)
|
||||
#define SIOCGNATL _IOWR('r', 63, struct natlookup *)
|
||||
#else
|
||||
#define SIOCADNAT _IOW(r, 60, struct ipnat *)
|
||||
#define SIOCRMNAT _IOW(r, 61, struct ipnat *)
|
||||
#define SIOCGNATS _IOWR(r, 62, struct natstat *)
|
||||
#define SIOCGNATL _IOWR(r, 63, struct natlookup *)
|
||||
#endif
|
||||
|
||||
#undef LARGE_NAT /* define this if you're setting up a system to NAT
|
||||
* LARGE numbers of networks/hosts - i.e. in the
|
||||
* hundreds or thousands. In such a case, you should
|
||||
* also change the RDR_SIZE and NAT_SIZE below to more
|
||||
* appropriate sizes. The figures below were used for
|
||||
* a setup with 1000-2000 networks to NAT.
|
||||
*/
|
||||
#define NAT_SIZE 127
|
||||
#define RDR_SIZE 127
|
||||
#define HOSTMAP_SIZE 127
|
||||
#define NAT_TABLE_SZ 127
|
||||
#ifdef LARGE_NAT
|
||||
#undef NAT_SIZE
|
||||
#undef RDR_SIZE
|
||||
#undef NAT_TABLE_SZ
|
||||
#undef HOSTMAP_SIZE 127
|
||||
#define NAT_SIZE 2047
|
||||
#define RDR_SIZE 2047
|
||||
#define NAT_TABLE_SZ 16383
|
||||
#define HOSTMAP_SIZE 8191
|
||||
#endif
|
||||
#ifndef APR_LABELLEN
|
||||
#define APR_LABELLEN 16
|
||||
#endif
|
||||
#define NAT_HW_CKSUM 0x80000000
|
||||
|
||||
#define DEF_NAT_AGE 1200 /* 10 minutes (600 seconds) */
|
||||
|
||||
struct ap_session;
|
||||
|
||||
typedef struct nat {
|
||||
u_long nat_age;
|
||||
int nat_flags;
|
||||
u_32_t nat_sumd[2];
|
||||
u_32_t nat_ipsumd;
|
||||
void *nat_data;
|
||||
struct ap_session *nat_aps; /* proxy session */
|
||||
struct frentry *nat_fr; /* filter rule ptr if appropriate */
|
||||
struct in_addr nat_inip;
|
||||
struct in_addr nat_outip;
|
||||
struct in_addr nat_oip; /* other ip */
|
||||
U_QUAD_T nat_pkts;
|
||||
U_QUAD_T nat_bytes;
|
||||
u_short nat_oport; /* other port */
|
||||
u_short nat_inport;
|
||||
u_short nat_outport;
|
||||
u_short nat_use;
|
||||
u_char nat_tcpstate[2];
|
||||
u_char nat_p; /* protocol for NAT */
|
||||
struct ipnat *nat_ptr; /* pointer back to the rule */
|
||||
struct hostmap *nat_hm;
|
||||
struct nat *nat_next;
|
||||
struct nat *nat_hnext[2];
|
||||
struct nat **nat_phnext[2];
|
||||
void *nat_ifp;
|
||||
int nat_dir;
|
||||
char nat_ifname[IFNAMSIZ];
|
||||
#if SOLARIS || defined(__sgi)
|
||||
kmutex_t nat_lock;
|
||||
#endif
|
||||
} nat_t;
|
||||
|
||||
typedef struct ipnat {
|
||||
struct ipnat *in_next;
|
||||
struct ipnat *in_rnext;
|
||||
struct ipnat **in_prnext;
|
||||
struct ipnat *in_mnext;
|
||||
struct ipnat **in_pmnext;
|
||||
void *in_ifp;
|
||||
void *in_apr;
|
||||
u_long in_space;
|
||||
u_int in_use;
|
||||
u_int in_hits;
|
||||
struct in_addr in_nextip;
|
||||
u_short in_pnext;
|
||||
u_short in_ippip; /* IP #'s per IP# */
|
||||
u_32_t in_flags; /* From here to in_dport must be reflected */
|
||||
u_short in_spare;
|
||||
u_short in_ppip; /* ports per IP */
|
||||
u_short in_port[2]; /* correctly in IPN_CMPSIZ */
|
||||
struct in_addr in_in[2];
|
||||
struct in_addr in_out[2];
|
||||
struct in_addr in_src[2];
|
||||
struct frtuc in_tuc;
|
||||
int in_redir; /* 0 if it's a mapping, 1 if it's a hard redir */
|
||||
char in_ifname[IFNAMSIZ];
|
||||
char in_plabel[APR_LABELLEN]; /* proxy label */
|
||||
char in_p; /* protocol */
|
||||
} ipnat_t;
|
||||
|
||||
#define in_pmin in_port[0] /* Also holds static redir port */
|
||||
#define in_pmax in_port[1]
|
||||
#define in_nip in_nextip.s_addr
|
||||
#define in_inip in_in[0].s_addr
|
||||
#define in_inmsk in_in[1].s_addr
|
||||
#define in_outip in_out[0].s_addr
|
||||
#define in_outmsk in_out[1].s_addr
|
||||
#define in_srcip in_src[0].s_addr
|
||||
#define in_srcmsk in_src[1].s_addr
|
||||
#define in_scmp in_tuc.ftu_scmp
|
||||
#define in_dcmp in_tuc.ftu_dcmp
|
||||
#define in_stop in_tuc.ftu_stop
|
||||
#define in_dtop in_tuc.ftu_dtop
|
||||
#define in_sport in_tuc.ftu_sport
|
||||
#define in_dport in_tuc.ftu_dport
|
||||
|
||||
#define NAT_OUTBOUND 0
|
||||
#define NAT_INBOUND 1
|
||||
|
||||
#define NAT_MAP 0x01
|
||||
#define NAT_REDIRECT 0x02
|
||||
#define NAT_BIMAP (NAT_MAP|NAT_REDIRECT)
|
||||
#define NAT_MAPBLK 0x04
|
||||
/* 0x100 reserved for FI_W_SPORT */
|
||||
/* 0x200 reserved for FI_W_DPORT */
|
||||
/* 0x400 reserved for FI_W_SADDR */
|
||||
/* 0x800 reserved for FI_W_DADDR */
|
||||
/* 0x1000 reserved for FI_W_NEWFR */
|
||||
|
||||
#define MAPBLK_MINPORT 1024 /* don't use reserved ports for src port */
|
||||
#define USABLE_PORTS (65536 - MAPBLK_MINPORT)
|
||||
|
||||
#define IPN_CMPSIZ (sizeof(ipnat_t) - offsetof(ipnat_t, in_flags))
|
||||
|
||||
typedef struct natlookup {
|
||||
struct in_addr nl_inip;
|
||||
struct in_addr nl_outip;
|
||||
struct in_addr nl_realip;
|
||||
int nl_flags;
|
||||
u_short nl_inport;
|
||||
u_short nl_outport;
|
||||
u_short nl_realport;
|
||||
} natlookup_t;
|
||||
|
||||
|
||||
typedef struct nat_save {
|
||||
void *ipn_next;
|
||||
struct nat ipn_nat;
|
||||
struct ipnat ipn_ipnat;
|
||||
struct frentry ipn_fr;
|
||||
int ipn_dsize;
|
||||
char ipn_data[4];
|
||||
} nat_save_t;
|
||||
|
||||
#define ipn_rule ipn_nat.nat_fr
|
||||
|
||||
typedef struct natget {
|
||||
void *ng_ptr;
|
||||
int ng_sz;
|
||||
} natget_t;
|
||||
|
||||
|
||||
typedef struct hostmap {
|
||||
struct hostmap *hm_next;
|
||||
struct hostmap **hm_pnext;
|
||||
struct ipnat *hm_ipnat;
|
||||
struct in_addr hm_realip;
|
||||
struct in_addr hm_mapip;
|
||||
int hm_ref;
|
||||
} hostmap_t;
|
||||
|
||||
|
||||
typedef struct natstat {
|
||||
u_long ns_mapped[2];
|
||||
u_long ns_rules;
|
||||
u_long ns_added;
|
||||
u_long ns_expire;
|
||||
u_long ns_inuse;
|
||||
u_long ns_logged;
|
||||
u_long ns_logfail;
|
||||
u_long ns_memfail;
|
||||
u_long ns_badnat;
|
||||
nat_t **ns_table[2];
|
||||
ipnat_t *ns_list;
|
||||
void *ns_apslist;
|
||||
u_int ns_nattab_sz;
|
||||
u_int ns_rultab_sz;
|
||||
u_int ns_rdrtab_sz;
|
||||
nat_t *ns_instances;
|
||||
u_int ns_wilds;
|
||||
} natstat_t;
|
||||
|
||||
#define IPN_ANY 0x000
|
||||
#define IPN_TCP 0x001
|
||||
#define IPN_UDP 0x002
|
||||
#define IPN_TCPUDP (IPN_TCP|IPN_UDP)
|
||||
#define IPN_DELETE 0x004
|
||||
#define IPN_ICMPERR 0x008
|
||||
#define IPN_RF (IPN_TCPUDP|IPN_DELETE|IPN_ICMPERR)
|
||||
#define IPN_AUTOPORTMAP 0x010
|
||||
#define IPN_IPRANGE 0x020
|
||||
#define IPN_USERFLAGS (IPN_TCPUDP|IPN_AUTOPORTMAP|IPN_IPRANGE|IPN_SPLIT|\
|
||||
IPN_ROUNDR|IPN_FILTER|IPN_NOTSRC|IPN_NOTDST)
|
||||
#define IPN_FILTER 0x040
|
||||
#define IPN_SPLIT 0x080
|
||||
#define IPN_ROUNDR 0x100
|
||||
#define IPN_NOTSRC 0x080000
|
||||
#define IPN_NOTDST 0x100000
|
||||
#define IPN_FRAG 0x200000
|
||||
|
||||
|
||||
typedef struct natlog {
|
||||
struct in_addr nl_origip;
|
||||
struct in_addr nl_outip;
|
||||
struct in_addr nl_inip;
|
||||
u_short nl_origport;
|
||||
u_short nl_outport;
|
||||
u_short nl_inport;
|
||||
u_short nl_type;
|
||||
int nl_rule;
|
||||
U_QUAD_T nl_pkts;
|
||||
U_QUAD_T nl_bytes;
|
||||
u_char nl_p;
|
||||
} natlog_t;
|
||||
|
||||
|
||||
#define NL_NEWMAP NAT_MAP
|
||||
#define NL_NEWRDR NAT_REDIRECT
|
||||
#define NL_NEWBIMAP NAT_BIMAP
|
||||
#define NL_NEWBLOCK NAT_MAPBLK
|
||||
#define NL_FLUSH 0xfffe
|
||||
#define NL_EXPIRE 0xffff
|
||||
|
||||
#define NAT_HASH_FN(k,l,m) (((k) + ((k) >> 12) + l) % (m))
|
||||
|
||||
#define LONG_SUM(in) (((in) & 0xffff) + ((in) >> 16))
|
||||
|
||||
#define CALC_SUMD(s1, s2, sd) { \
|
||||
(s1) = ((s1) & 0xffff) + ((s1) >> 16); \
|
||||
(s2) = ((s2) & 0xffff) + ((s2) >> 16); \
|
||||
/* Do it twice */ \
|
||||
(s1) = ((s1) & 0xffff) + ((s1) >> 16); \
|
||||
(s2) = ((s2) & 0xffff) + ((s2) >> 16); \
|
||||
/* Because ~1 == -2, We really need ~1 == -1 */ \
|
||||
if ((s1) > (s2)) (s2)--; \
|
||||
(sd) = (s2) - (s1); \
|
||||
(sd) = ((sd) & 0xffff) + ((sd) >> 16); }
|
||||
|
||||
|
||||
extern u_int ipf_nattable_sz;
|
||||
extern u_int ipf_natrules_sz;
|
||||
extern u_int ipf_rdrrules_sz;
|
||||
extern int fr_nat_lock;
|
||||
extern void ip_natsync __P((void *));
|
||||
extern u_long fr_defnatage;
|
||||
extern u_long fr_defnaticmpage;
|
||||
extern nat_t **nat_table[2];
|
||||
extern nat_t *nat_instances;
|
||||
extern ipnat_t **nat_rules;
|
||||
extern ipnat_t **rdr_rules;
|
||||
extern natstat_t nat_stats;
|
||||
#if defined(__NetBSD__) || defined(__OpenBSD__) || (__FreeBSD_version >= 300003)
|
||||
extern int nat_ioctl __P((caddr_t, u_long, int));
|
||||
#else
|
||||
extern int nat_ioctl __P((caddr_t, int, int));
|
||||
#endif
|
||||
extern int nat_init __P((void));
|
||||
extern nat_t *nat_new __P((ipnat_t *, ip_t *, fr_info_t *, u_int, int));
|
||||
extern nat_t *nat_outlookup __P((void *, u_int, u_int, struct in_addr,
|
||||
struct in_addr, u_32_t, int));
|
||||
extern nat_t *nat_inlookup __P((void *, u_int, u_int, struct in_addr,
|
||||
struct in_addr, u_32_t, int));
|
||||
extern nat_t *nat_maplookup __P((void *, u_int, struct in_addr,
|
||||
struct in_addr));
|
||||
extern nat_t *nat_lookupredir __P((natlookup_t *));
|
||||
extern nat_t *nat_icmplookup __P((ip_t *, fr_info_t *, int));
|
||||
extern nat_t *nat_icmp __P((ip_t *, fr_info_t *, u_int *, int));
|
||||
extern void nat_insert __P((nat_t *));
|
||||
|
||||
extern int ip_natout __P((ip_t *, fr_info_t *));
|
||||
extern int ip_natin __P((ip_t *, fr_info_t *));
|
||||
extern void ip_natunload __P((void)), ip_natexpire __P((void));
|
||||
extern void nat_log __P((struct nat *, u_int));
|
||||
extern void fix_incksum __P((u_short *, u_32_t));
|
||||
extern void fix_outcksum __P((u_short *, u_32_t));
|
||||
extern void fix_datacksum __P((u_short *, u_32_t));
|
||||
|
||||
#endif /* __IP_NAT_H__ */
|
@ -1,452 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1997-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*/
|
||||
#if !defined(lint)
|
||||
/*static const char rcsid[] = "@(#)$Id: ip_proxy.c,v 2.2.2.1 1999/09/19 12:18:19 darrenr Exp $";*/
|
||||
static const char rcsid[] = "@(#)$FreeBSD$";
|
||||
#endif
|
||||
|
||||
#if defined(__FreeBSD__) && defined(KERNEL) && !defined(_KERNEL)
|
||||
# define _KERNEL
|
||||
#endif
|
||||
|
||||
#include <sys/errno.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/time.h>
|
||||
#include <sys/file.h>
|
||||
#if !defined(__FreeBSD_version)
|
||||
# include <sys/ioctl.h>
|
||||
#endif
|
||||
#include <sys/fcntl.h>
|
||||
#include <sys/uio.h>
|
||||
#if !defined(_KERNEL) && !defined(KERNEL)
|
||||
# include <stdio.h>
|
||||
# include <string.h>
|
||||
# include <stdlib.h>
|
||||
#endif
|
||||
#ifndef linux
|
||||
# include <sys/protosw.h>
|
||||
#endif
|
||||
#include <sys/socket.h>
|
||||
#if defined(_KERNEL)
|
||||
# if !defined(linux)
|
||||
# include <sys/systm.h>
|
||||
# else
|
||||
# include <linux/string.h>
|
||||
# endif
|
||||
#endif
|
||||
#if !defined(__SVR4) && !defined(__svr4__)
|
||||
# ifndef linux
|
||||
# include <sys/mbuf.h>
|
||||
# endif
|
||||
#else
|
||||
# include <sys/byteorder.h>
|
||||
# ifdef _KERNEL
|
||||
# include <sys/dditypes.h>
|
||||
# endif
|
||||
# include <sys/stream.h>
|
||||
# include <sys/kmem.h>
|
||||
#endif
|
||||
#if __FreeBSD__ > 2
|
||||
# include <sys/queue.h>
|
||||
#endif
|
||||
#include <net/if.h>
|
||||
#ifdef sun
|
||||
# include <net/af.h>
|
||||
#endif
|
||||
#include <net/route.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/in_systm.h>
|
||||
#include <netinet/ip.h>
|
||||
#ifndef linux
|
||||
# include <netinet/ip_var.h>
|
||||
#endif
|
||||
#include <netinet/tcp.h>
|
||||
#include <netinet/udp.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include "netinet/ip_compat.h"
|
||||
#include <netinet/tcpip.h>
|
||||
#include "netinet/ip_fil.h"
|
||||
#include "netinet/ip_proxy.h"
|
||||
#include "netinet/ip_nat.h"
|
||||
#include "netinet/ip_state.h"
|
||||
#if (__FreeBSD_version >= 300000)
|
||||
# include <sys/malloc.h>
|
||||
#endif
|
||||
|
||||
|
||||
#ifndef MIN
|
||||
#define MIN(a,b) (((a)<(b))?(a):(b))
|
||||
#endif
|
||||
|
||||
static ap_session_t *appr_new_session __P((aproxy_t *, ip_t *,
|
||||
fr_info_t *, nat_t *));
|
||||
static int appr_fixseqack __P((fr_info_t *, ip_t *, ap_session_t *, int ));
|
||||
|
||||
|
||||
#define AP_SESS_SIZE 53
|
||||
|
||||
#if defined(_KERNEL) && !defined(linux)
|
||||
#include "netinet/ip_ftp_pxy.c"
|
||||
#include "netinet/ip_rcmd_pxy.c"
|
||||
#include "netinet/ip_raudio_pxy.c"
|
||||
#endif
|
||||
|
||||
ap_session_t *ap_sess_tab[AP_SESS_SIZE];
|
||||
ap_session_t *ap_sess_list = NULL;
|
||||
aproxy_t *ap_proxylist = NULL;
|
||||
aproxy_t ap_proxies[] = {
|
||||
#ifdef IPF_FTP_PROXY
|
||||
{ NULL, "ftp", (char)IPPROTO_TCP, 0, 0, ippr_ftp_init, NULL,
|
||||
ippr_ftp_new, ippr_ftp_in, ippr_ftp_out },
|
||||
#endif
|
||||
#ifdef IPF_RCMD_PROXY
|
||||
{ NULL, "rcmd", (char)IPPROTO_TCP, 0, 0, ippr_rcmd_init, NULL,
|
||||
ippr_rcmd_new, NULL, ippr_rcmd_out },
|
||||
#endif
|
||||
#ifdef IPF_RAUDIO_PROXY
|
||||
{ NULL, "raudio", (char)IPPROTO_TCP, 0, 0, ippr_raudio_init, NULL,
|
||||
ippr_raudio_new, ippr_raudio_in, ippr_raudio_out },
|
||||
#endif
|
||||
{ NULL, "", '\0', 0, 0, NULL, NULL }
|
||||
};
|
||||
|
||||
|
||||
int appr_add(ap)
|
||||
aproxy_t *ap;
|
||||
{
|
||||
aproxy_t *a;
|
||||
|
||||
for (a = ap_proxies; a->apr_p; a++)
|
||||
if ((a->apr_p == ap->apr_p) &&
|
||||
!strncmp(a->apr_label, ap->apr_label,
|
||||
sizeof(ap->apr_label)))
|
||||
return -1;
|
||||
|
||||
for (a = ap_proxylist; a->apr_p; a = a->apr_next)
|
||||
if ((a->apr_p == ap->apr_p) &&
|
||||
!strncmp(a->apr_label, ap->apr_label,
|
||||
sizeof(ap->apr_label)))
|
||||
return -1;
|
||||
ap->apr_next = ap_proxylist;
|
||||
ap_proxylist = ap;
|
||||
return (*ap->apr_init)();
|
||||
}
|
||||
|
||||
|
||||
int appr_del(ap)
|
||||
aproxy_t *ap;
|
||||
{
|
||||
aproxy_t *a, **app;
|
||||
|
||||
for (app = &ap_proxylist; (a = *app); app = &a->apr_next)
|
||||
if (a == ap) {
|
||||
if (ap->apr_ref != 0)
|
||||
return 1;
|
||||
*app = a->apr_next;
|
||||
return 0;
|
||||
}
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
int appr_ok(ip, tcp, nat)
|
||||
ip_t *ip;
|
||||
tcphdr_t *tcp;
|
||||
ipnat_t *nat;
|
||||
{
|
||||
aproxy_t *apr = nat->in_apr;
|
||||
u_short dport = nat->in_dport;
|
||||
|
||||
if (!apr || (apr->apr_flags & APR_DELETE) ||
|
||||
(ip->ip_p != apr->apr_p))
|
||||
return 0;
|
||||
if ((tcp && (tcp->th_dport != dport)) || (!tcp && dport))
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Allocate a new application proxy structure and fill it in with the
|
||||
* relevant details. call the init function once complete, prior to
|
||||
* returning.
|
||||
*/
|
||||
static ap_session_t *appr_new_session(apr, ip, fin, nat)
|
||||
aproxy_t *apr;
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
nat_t *nat;
|
||||
{
|
||||
register ap_session_t *aps;
|
||||
|
||||
if (!apr || (apr->apr_flags & APR_DELETE) || (ip->ip_p != apr->apr_p))
|
||||
return NULL;
|
||||
|
||||
KMALLOC(aps, ap_session_t *);
|
||||
if (!aps)
|
||||
return NULL;
|
||||
bzero((char *)aps, sizeof(*aps));
|
||||
aps->aps_p = ip->ip_p;
|
||||
aps->aps_data = NULL;
|
||||
aps->aps_apr = apr;
|
||||
aps->aps_psiz = 0;
|
||||
if (apr->apr_new != NULL)
|
||||
if ((*apr->apr_new)(fin, ip, aps, nat) == -1) {
|
||||
KFREE(aps);
|
||||
return NULL;
|
||||
}
|
||||
aps->aps_nat = nat;
|
||||
aps->aps_next = ap_sess_list;
|
||||
ap_sess_list = aps;
|
||||
return aps;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* check to see if a packet should be passed through an active proxy routine
|
||||
* if one has been setup for it.
|
||||
*/
|
||||
int appr_check(ip, fin, nat)
|
||||
ip_t *ip;
|
||||
fr_info_t *fin;
|
||||
nat_t *nat;
|
||||
{
|
||||
ap_session_t *aps;
|
||||
aproxy_t *apr;
|
||||
tcphdr_t *tcp = NULL;
|
||||
u_32_t sum;
|
||||
short rv;
|
||||
int err;
|
||||
|
||||
if (nat->nat_aps == NULL)
|
||||
nat->nat_aps = appr_new_session(nat->nat_ptr->in_apr, ip,
|
||||
fin, nat);
|
||||
aps = nat->nat_aps;
|
||||
if ((aps != NULL) && (aps->aps_p == ip->ip_p)) {
|
||||
if (ip->ip_p == IPPROTO_TCP) {
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
/*
|
||||
* verify that the checksum is correct. If not, then
|
||||
* don't do anything with this packet.
|
||||
*/
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
sum = fr_tcpsum(fin->fin_qfm, ip, tcp);
|
||||
#else
|
||||
sum = fr_tcpsum(*(mb_t **)fin->fin_mp, ip, tcp);
|
||||
#endif
|
||||
if (sum != tcp->th_sum) {
|
||||
frstats[fin->fin_out].fr_tcpbad++;
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
apr = aps->aps_apr;
|
||||
err = 0;
|
||||
if (fin->fin_out != 0) {
|
||||
if (apr->apr_outpkt != NULL)
|
||||
err = (*apr->apr_outpkt)(fin, ip, aps, nat);
|
||||
} else {
|
||||
if (apr->apr_inpkt != NULL)
|
||||
err = (*apr->apr_inpkt)(fin, ip, aps, nat);
|
||||
}
|
||||
|
||||
rv = APR_EXIT(err);
|
||||
if (rv == -1)
|
||||
return rv;
|
||||
|
||||
if (tcp != NULL) {
|
||||
err = appr_fixseqack(fin, ip, aps, APR_INC(err));
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
tcp->th_sum = fr_tcpsum(fin->fin_qfm, ip, tcp);
|
||||
#else
|
||||
tcp->th_sum = fr_tcpsum(*(mb_t **)fin->fin_mp, ip, tcp);
|
||||
#endif
|
||||
}
|
||||
aps->aps_bytes += ip->ip_len;
|
||||
aps->aps_pkts++;
|
||||
return 1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
aproxy_t *appr_match(pr, name)
|
||||
u_int pr;
|
||||
char *name;
|
||||
{
|
||||
aproxy_t *ap;
|
||||
|
||||
for (ap = ap_proxies; ap->apr_p; ap++)
|
||||
if ((ap->apr_p == pr) &&
|
||||
!strncmp(name, ap->apr_label, sizeof(ap->apr_label))) {
|
||||
ap->apr_ref++;
|
||||
return ap;
|
||||
}
|
||||
|
||||
for (ap = ap_proxylist; ap; ap = ap->apr_next)
|
||||
if ((ap->apr_p == pr) &&
|
||||
!strncmp(name, ap->apr_label, sizeof(ap->apr_label))) {
|
||||
ap->apr_ref++;
|
||||
return ap;
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
void appr_free(ap)
|
||||
aproxy_t *ap;
|
||||
{
|
||||
ap->apr_ref--;
|
||||
}
|
||||
|
||||
|
||||
void aps_free(aps)
|
||||
ap_session_t *aps;
|
||||
{
|
||||
ap_session_t *a, **ap;
|
||||
|
||||
if (!aps)
|
||||
return;
|
||||
|
||||
for (ap = &ap_sess_list; (a = *ap); ap = &a->aps_next)
|
||||
if (a == aps) {
|
||||
*ap = a->aps_next;
|
||||
break;
|
||||
}
|
||||
|
||||
if ((aps->aps_data != NULL) && (aps->aps_psiz != 0))
|
||||
KFREES(aps->aps_data, aps->aps_psiz);
|
||||
KFREE(aps);
|
||||
}
|
||||
|
||||
|
||||
static int appr_fixseqack(fin, ip, aps, inc)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
int inc;
|
||||
{
|
||||
int sel, ch = 0, out, nlen;
|
||||
u_32_t seq1, seq2;
|
||||
tcphdr_t *tcp;
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
out = fin->fin_out;
|
||||
nlen = ip->ip_len;
|
||||
nlen -= (ip->ip_hl << 2) + (tcp->th_off << 2);
|
||||
|
||||
if (out != 0) {
|
||||
seq1 = (u_32_t)ntohl(tcp->th_seq);
|
||||
sel = aps->aps_sel[out];
|
||||
|
||||
/* switch to other set ? */
|
||||
if ((aps->aps_seqmin[!sel] > aps->aps_seqmin[sel]) &&
|
||||
(seq1 > aps->aps_seqmin[!sel]))
|
||||
sel = aps->aps_sel[out] = !sel;
|
||||
|
||||
if (aps->aps_seqoff[sel]) {
|
||||
seq2 = aps->aps_seqmin[sel] - aps->aps_seqoff[sel];
|
||||
if (seq1 > seq2) {
|
||||
seq2 = aps->aps_seqoff[sel];
|
||||
seq1 += seq2;
|
||||
tcp->th_seq = htonl(seq1);
|
||||
ch = 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (inc && (seq1 > aps->aps_seqmin[!sel])) {
|
||||
aps->aps_seqmin[!sel] = seq1 + nlen - 1;
|
||||
aps->aps_seqoff[!sel] = aps->aps_seqoff[sel] + inc;
|
||||
}
|
||||
|
||||
/***/
|
||||
|
||||
seq1 = ntohl(tcp->th_ack);
|
||||
sel = aps->aps_sel[1 - out];
|
||||
|
||||
/* switch to other set ? */
|
||||
if ((aps->aps_ackmin[!sel] > aps->aps_ackmin[sel]) &&
|
||||
(seq1 > aps->aps_ackmin[!sel]))
|
||||
sel = aps->aps_sel[1 - out] = !sel;
|
||||
|
||||
if (aps->aps_ackoff[sel] && (seq1 > aps->aps_ackmin[sel])) {
|
||||
seq2 = aps->aps_ackoff[sel];
|
||||
tcp->th_ack = htonl(seq1 - seq2);
|
||||
ch = 1;
|
||||
}
|
||||
} else {
|
||||
seq1 = ntohl(tcp->th_seq);
|
||||
sel = aps->aps_sel[out];
|
||||
|
||||
/* switch to other set ? */
|
||||
if ((aps->aps_ackmin[!sel] > aps->aps_ackmin[sel]) &&
|
||||
(seq1 > aps->aps_ackmin[!sel]))
|
||||
sel = aps->aps_sel[out] = !sel;
|
||||
|
||||
if (aps->aps_ackoff[sel]) {
|
||||
seq2 = aps->aps_ackmin[sel] -
|
||||
aps->aps_ackoff[sel];
|
||||
if (seq1 > seq2) {
|
||||
seq2 = aps->aps_ackoff[sel];
|
||||
seq1 += seq2;
|
||||
tcp->th_seq = htonl(seq1);
|
||||
ch = 1;
|
||||
}
|
||||
}
|
||||
|
||||
if (inc && (seq1 > aps->aps_ackmin[!sel])) {
|
||||
aps->aps_ackmin[!sel] = seq1 + nlen - 1;
|
||||
aps->aps_ackoff[!sel] = aps->aps_ackoff[sel] + inc;
|
||||
}
|
||||
|
||||
/***/
|
||||
|
||||
seq1 = ntohl(tcp->th_ack);
|
||||
sel = aps->aps_sel[1 - out];
|
||||
|
||||
/* switch to other set ? */
|
||||
if ((aps->aps_seqmin[!sel] > aps->aps_seqmin[sel]) &&
|
||||
(seq1 > aps->aps_seqmin[!sel]))
|
||||
sel = aps->aps_sel[1 - out] = !sel;
|
||||
|
||||
if (aps->aps_seqoff[sel] && (seq1 > aps->aps_seqmin[sel])) {
|
||||
seq2 = aps->aps_seqoff[sel];
|
||||
tcp->th_ack = htonl(seq1 - seq2);
|
||||
ch = 1;
|
||||
}
|
||||
}
|
||||
return ch ? 2 : 0;
|
||||
}
|
||||
|
||||
|
||||
int appr_init()
|
||||
{
|
||||
aproxy_t *ap;
|
||||
int err = 0;
|
||||
|
||||
for (ap = ap_proxies; ap->apr_p; ap++) {
|
||||
err = (*ap->apr_init)();
|
||||
if (err != 0)
|
||||
break;
|
||||
}
|
||||
return err;
|
||||
}
|
||||
|
||||
|
||||
void appr_unload()
|
||||
{
|
||||
aproxy_t *ap;
|
||||
|
||||
for (ap = ap_proxies; ap->apr_p; ap++)
|
||||
if (ap->apr_fini)
|
||||
(*ap->apr_fini)();
|
||||
for (ap = ap_proxylist; ap; ap = ap->apr_next)
|
||||
if (ap->apr_fini)
|
||||
(*ap->apr_fini)();
|
||||
}
|
@ -1,157 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1997-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* $Id: ip_proxy.h,v 2.8.2.4 2000/12/02 00:15:03 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef __IP_PROXY_H__
|
||||
#define __IP_PROXY_H__
|
||||
|
||||
#ifndef SOLARIS
|
||||
#define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
|
||||
#endif
|
||||
|
||||
#ifndef APR_LABELLEN
|
||||
#define APR_LABELLEN 16
|
||||
#endif
|
||||
#define AP_SESS_SIZE 53
|
||||
|
||||
struct nat;
|
||||
struct ipnat;
|
||||
|
||||
typedef struct ap_tcp {
|
||||
u_short apt_sport; /* source port */
|
||||
u_short apt_dport; /* destination port */
|
||||
short apt_sel[2]; /* {seq,ack}{off,min} set selector */
|
||||
short apt_seqoff[2]; /* sequence # difference */
|
||||
tcp_seq apt_seqmin[2]; /* don't change seq-off until after this */
|
||||
short apt_ackoff[2]; /* sequence # difference */
|
||||
tcp_seq apt_ackmin[2]; /* don't change seq-off until after this */
|
||||
u_char apt_state[2]; /* connection state */
|
||||
} ap_tcp_t;
|
||||
|
||||
typedef struct ap_udp {
|
||||
u_short apu_sport; /* source port */
|
||||
u_short apu_dport; /* destination port */
|
||||
} ap_udp_t;
|
||||
|
||||
typedef struct ap_session {
|
||||
struct aproxy *aps_apr;
|
||||
union {
|
||||
struct ap_tcp apu_tcp;
|
||||
struct ap_udp apu_udp;
|
||||
} aps_un;
|
||||
u_int aps_flags;
|
||||
U_QUAD_T aps_bytes; /* bytes sent */
|
||||
U_QUAD_T aps_pkts; /* packets sent */
|
||||
void *aps_nat; /* pointer back to nat struct */
|
||||
void *aps_data; /* private data */
|
||||
int aps_p; /* protocol */
|
||||
int aps_psiz; /* size of private data */
|
||||
struct ap_session *aps_hnext;
|
||||
struct ap_session *aps_next;
|
||||
} ap_session_t;
|
||||
|
||||
#define aps_sport aps_un.apu_tcp.apt_sport
|
||||
#define aps_dport aps_un.apu_tcp.apt_dport
|
||||
#define aps_sel aps_un.apu_tcp.apt_sel
|
||||
#define aps_seqoff aps_un.apu_tcp.apt_seqoff
|
||||
#define aps_seqmin aps_un.apu_tcp.apt_seqmin
|
||||
#define aps_state aps_un.apu_tcp.apt_state
|
||||
#define aps_ackoff aps_un.apu_tcp.apt_ackoff
|
||||
#define aps_ackmin aps_un.apu_tcp.apt_ackmin
|
||||
|
||||
|
||||
typedef struct aproxy {
|
||||
struct aproxy *apr_next;
|
||||
char apr_label[APR_LABELLEN]; /* Proxy label # */
|
||||
u_char apr_p; /* protocol */
|
||||
int apr_ref; /* +1 per rule referencing it */
|
||||
int apr_flags;
|
||||
int (* apr_init) __P((void));
|
||||
void (* apr_fini) __P((void));
|
||||
int (* apr_new) __P((fr_info_t *, ip_t *,
|
||||
ap_session_t *, struct nat *));
|
||||
int (* apr_inpkt) __P((fr_info_t *, ip_t *,
|
||||
ap_session_t *, struct nat *));
|
||||
int (* apr_outpkt) __P((fr_info_t *, ip_t *,
|
||||
ap_session_t *, struct nat *));
|
||||
} aproxy_t;
|
||||
|
||||
#define APR_DELETE 1
|
||||
|
||||
#define APR_ERR(x) (((x) & 0xffff) << 16)
|
||||
#define APR_EXIT(x) (((x) >> 16) & 0xffff)
|
||||
#define APR_INC(x) ((x) & 0xffff)
|
||||
|
||||
#define FTP_BUFSZ 160
|
||||
/*
|
||||
* For the ftp proxy.
|
||||
*/
|
||||
typedef struct ftpside {
|
||||
char *ftps_rptr;
|
||||
char *ftps_wptr;
|
||||
u_32_t ftps_seq;
|
||||
u_32_t ftps_len;
|
||||
int ftps_junk;
|
||||
char ftps_buf[FTP_BUFSZ];
|
||||
} ftpside_t;
|
||||
|
||||
typedef struct ftpinfo {
|
||||
u_int ftp_passok;
|
||||
ftpside_t ftp_side[2];
|
||||
} ftpinfo_t;
|
||||
|
||||
/*
|
||||
* Real audio proxy structure and #defines
|
||||
*/
|
||||
typedef struct {
|
||||
int rap_seenpna;
|
||||
int rap_seenver;
|
||||
int rap_version;
|
||||
int rap_eos; /* End Of Startup */
|
||||
int rap_gotid;
|
||||
int rap_gotlen;
|
||||
int rap_mode;
|
||||
int rap_sdone;
|
||||
u_short rap_plport;
|
||||
u_short rap_prport;
|
||||
u_short rap_srport;
|
||||
char rap_svr[19];
|
||||
u_32_t rap_sbf; /* flag to indicate which of the 19 bytes have
|
||||
* been filled
|
||||
*/
|
||||
tcp_seq rap_sseq;
|
||||
} raudio_t;
|
||||
|
||||
#define RA_ID_END 0
|
||||
#define RA_ID_UDP 1
|
||||
#define RA_ID_ROBUST 7
|
||||
|
||||
#define RAP_M_UDP 1
|
||||
#define RAP_M_ROBUST 2
|
||||
#define RAP_M_TCP 4
|
||||
#define RAP_M_UDP_ROBUST (RAP_M_UDP|RAP_M_ROBUST)
|
||||
|
||||
|
||||
extern ap_session_t *ap_sess_tab[AP_SESS_SIZE];
|
||||
extern ap_session_t *ap_sess_list;
|
||||
extern aproxy_t ap_proxies[];
|
||||
extern int ippr_ftp_pasvonly;
|
||||
|
||||
extern int appr_add __P((aproxy_t *));
|
||||
extern int appr_del __P((aproxy_t *));
|
||||
extern int appr_init __P((void));
|
||||
extern void appr_unload __P((void));
|
||||
extern int appr_ok __P((ip_t *, tcphdr_t *, struct ipnat *));
|
||||
extern void appr_free __P((aproxy_t *));
|
||||
extern void aps_free __P((ap_session_t *));
|
||||
extern int appr_check __P((ip_t *, fr_info_t *, struct nat *));
|
||||
extern aproxy_t *appr_match __P((u_int, char *));
|
||||
|
||||
#endif /* __IP_PROXY_H__ */
|
@ -1,308 +0,0 @@
|
||||
/*
|
||||
* $FreeBSD$
|
||||
*/
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
extern kmutex_t ipf_rw;
|
||||
#endif
|
||||
|
||||
#define IPF_RAUDIO_PROXY
|
||||
|
||||
|
||||
int ippr_raudio_init __P((void));
|
||||
int ippr_raudio_new __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_raudio_in __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_raudio_out __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
|
||||
static frentry_t raudiofr;
|
||||
|
||||
|
||||
/*
|
||||
* Real Audio application proxy initialization.
|
||||
*/
|
||||
int ippr_raudio_init()
|
||||
{
|
||||
bzero((char *)&raudiofr, sizeof(raudiofr));
|
||||
raudiofr.fr_ref = 1;
|
||||
raudiofr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Setup for a new proxy to handle Real Audio.
|
||||
*/
|
||||
int ippr_raudio_new(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
raudio_t *rap;
|
||||
|
||||
|
||||
KMALLOCS(aps->aps_data, void *, sizeof(raudio_t));
|
||||
if (aps->aps_data == NULL)
|
||||
return -1;
|
||||
|
||||
bzero(aps->aps_data, sizeof(raudio_t));
|
||||
rap = aps->aps_data;
|
||||
aps->aps_psiz = sizeof(raudio_t);
|
||||
rap->rap_mode = RAP_M_TCP; /* default is for TCP */
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
|
||||
int ippr_raudio_out(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
raudio_t *rap = aps->aps_data;
|
||||
unsigned char membuf[512 + 1], *s;
|
||||
u_short id = 0;
|
||||
tcphdr_t *tcp;
|
||||
int off, dlen;
|
||||
int len = 0;
|
||||
mb_t *m;
|
||||
#if SOLARIS
|
||||
mb_t *m1;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* If we've already processed the start messages, then nothing left
|
||||
* for the proxy to do.
|
||||
*/
|
||||
if (rap->rap_eos == 1)
|
||||
return 0;
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
off = (ip->ip_hl << 2) + (tcp->th_off << 2);
|
||||
bzero(membuf, sizeof(membuf));
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
|
||||
dlen = msgdsize(m) - off;
|
||||
if (dlen <= 0)
|
||||
return 0;
|
||||
copyout_mblk(m, off, MIN(sizeof(membuf), dlen), (char *)membuf);
|
||||
#else
|
||||
m = *(mb_t **)fin->fin_mp;
|
||||
|
||||
dlen = mbufchainlen(m) - off;
|
||||
if (dlen <= 0)
|
||||
return 0;
|
||||
m_copydata(m, off, MIN(sizeof(membuf), dlen), (char *)membuf);
|
||||
#endif
|
||||
/*
|
||||
* In all the startup parsing, ensure that we don't go outside
|
||||
* the packet buffer boundary.
|
||||
*/
|
||||
/*
|
||||
* Look for the start of connection "PNA" string if not seen yet.
|
||||
*/
|
||||
if (rap->rap_seenpna == 0) {
|
||||
s = (u_char *)memstr("PNA", (char *)membuf, 3, dlen);
|
||||
if (s == NULL)
|
||||
return 0;
|
||||
s += 3;
|
||||
rap->rap_seenpna = 1;
|
||||
} else
|
||||
s = membuf;
|
||||
|
||||
/*
|
||||
* Directly after the PNA will be the version number of this
|
||||
* connection.
|
||||
*/
|
||||
if (rap->rap_seenpna == 1 && rap->rap_seenver == 0) {
|
||||
if ((s + 1) - membuf < dlen) {
|
||||
rap->rap_version = (*s << 8) | *(s + 1);
|
||||
s += 2;
|
||||
rap->rap_seenver = 1;
|
||||
} else
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* Now that we've been past the PNA and version number, we're into the
|
||||
* startup messages block. This ends when a message with an ID of 0.
|
||||
*/
|
||||
while ((rap->rap_eos == 0) && ((s + 1) - membuf < dlen)) {
|
||||
if (rap->rap_gotid == 0) {
|
||||
id = (*s << 8) | *(s + 1);
|
||||
s += 2;
|
||||
rap->rap_gotid = 1;
|
||||
if (id == RA_ID_END) {
|
||||
rap->rap_eos = 1;
|
||||
break;
|
||||
}
|
||||
} else if (rap->rap_gotlen == 0) {
|
||||
len = (*s << 8) | *(s + 1);
|
||||
s += 2;
|
||||
rap->rap_gotlen = 1;
|
||||
}
|
||||
|
||||
if (rap->rap_gotid == 1 && rap->rap_gotlen == 1) {
|
||||
if (id == RA_ID_UDP) {
|
||||
rap->rap_mode &= ~RAP_M_TCP;
|
||||
rap->rap_mode |= RAP_M_UDP;
|
||||
rap->rap_plport = (*s << 8) | *(s + 1);
|
||||
} else if (id == RA_ID_ROBUST) {
|
||||
rap->rap_mode |= RAP_M_ROBUST;
|
||||
rap->rap_prport = (*s << 8) | *(s + 1);
|
||||
}
|
||||
s += len;
|
||||
rap->rap_gotlen = 0;
|
||||
rap->rap_gotid = 0;
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int ippr_raudio_in(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
unsigned char membuf[IPF_MAXPORTLEN + 1], *s;
|
||||
tcphdr_t *tcp, tcph, *tcp2 = &tcph;
|
||||
raudio_t *rap = aps->aps_data;
|
||||
struct in_addr swa, swb;
|
||||
int off, dlen, slen;
|
||||
int a1, a2, a3, a4;
|
||||
u_short sp, dp;
|
||||
fr_info_t fi;
|
||||
tcp_seq seq;
|
||||
nat_t *ipn;
|
||||
u_char swp;
|
||||
mb_t *m;
|
||||
#if SOLARIS
|
||||
mb_t *m1;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Wait until we've seen the end of the start messages and even then
|
||||
* only proceed further if we're using UDP. If they want to use TCP
|
||||
* then data is sent back on the same channel that is already open.
|
||||
*/
|
||||
if (rap->rap_sdone != 0)
|
||||
return 0;
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
off = (ip->ip_hl << 2) + (tcp->th_off << 2);
|
||||
m = *(mb_t **)fin->fin_mp;
|
||||
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
|
||||
dlen = msgdsize(m) - off;
|
||||
if (dlen <= 0)
|
||||
return 0;
|
||||
bzero(membuf, sizeof(membuf));
|
||||
copyout_mblk(m, off, MIN(sizeof(membuf), dlen), (char *)membuf);
|
||||
#else
|
||||
dlen = mbufchainlen(m) - off;
|
||||
if (dlen <= 0)
|
||||
return 0;
|
||||
bzero(membuf, sizeof(membuf));
|
||||
m_copydata(m, off, MIN(sizeof(membuf), dlen), (char *)membuf);
|
||||
#endif
|
||||
|
||||
seq = ntohl(tcp->th_seq);
|
||||
/*
|
||||
* Check to see if the data in this packet is of interest to us.
|
||||
* We only care for the first 19 bytes coming back from the server.
|
||||
*/
|
||||
if (rap->rap_sseq == 0) {
|
||||
s = (u_char *)memstr("PNA", (char *)membuf, 3, dlen);
|
||||
if (s == NULL)
|
||||
return 0;
|
||||
a1 = s - membuf;
|
||||
dlen -= a1;
|
||||
a1 = 0;
|
||||
rap->rap_sseq = seq;
|
||||
a2 = MIN(dlen, sizeof(rap->rap_svr));
|
||||
} else if (seq <= rap->rap_sseq + sizeof(rap->rap_svr)) {
|
||||
/*
|
||||
* seq # which is the start of data and from that the offset
|
||||
* into the buffer array.
|
||||
*/
|
||||
a1 = seq - rap->rap_sseq;
|
||||
a2 = MIN(dlen, sizeof(rap->rap_svr));
|
||||
a2 -= a1;
|
||||
s = membuf;
|
||||
} else
|
||||
return 0;
|
||||
|
||||
for (a3 = a1, a4 = a2; (a4 > 0) && (a3 < 19) && (a3 >= 0); a4--,a3++) {
|
||||
rap->rap_sbf |= (1 << a3);
|
||||
rap->rap_svr[a3] = *s++;
|
||||
}
|
||||
|
||||
if ((rap->rap_sbf != 0x7ffff) || (!rap->rap_eos)) /* 19 bits */
|
||||
return 0;
|
||||
rap->rap_sdone = 1;
|
||||
|
||||
s = (u_char *)rap->rap_svr + 11;
|
||||
if (((*s << 8) | *(s + 1)) == RA_ID_ROBUST) {
|
||||
s += 2;
|
||||
rap->rap_srport = (*s << 8) | *(s + 1);
|
||||
}
|
||||
|
||||
swp = ip->ip_p;
|
||||
swa = ip->ip_src;
|
||||
swb = ip->ip_dst;
|
||||
|
||||
ip->ip_p = IPPROTO_UDP;
|
||||
ip->ip_src = nat->nat_inip;
|
||||
ip->ip_dst = nat->nat_oip;
|
||||
|
||||
bcopy((char *)fin, (char *)&fi, sizeof(fi));
|
||||
bzero((char *)tcp2, sizeof(*tcp2));
|
||||
tcp2->th_off = 5;
|
||||
fi.fin_dp = (char *)tcp2;
|
||||
fi.fin_fr = &raudiofr;
|
||||
fi.fin_dlen = sizeof(*tcp2);
|
||||
tcp2->th_win = htons(8192);
|
||||
slen = ip->ip_len;
|
||||
ip->ip_len = fin->fin_hlen + sizeof(*tcp);
|
||||
|
||||
if (((rap->rap_mode & RAP_M_UDP_ROBUST) == RAP_M_UDP_ROBUST) &&
|
||||
(rap->rap_srport != 0)) {
|
||||
dp = rap->rap_srport;
|
||||
sp = rap->rap_prport;
|
||||
tcp2->th_sport = htons(sp);
|
||||
tcp2->th_dport = htons(dp);
|
||||
fi.fin_data[0] = dp;
|
||||
fi.fin_data[1] = sp;
|
||||
ipn = nat_new(nat->nat_ptr, ip, &fi,
|
||||
IPN_UDP | (sp ? 0 : FI_W_SPORT), NAT_OUTBOUND);
|
||||
if (ipn != NULL) {
|
||||
ipn->nat_age = fr_defnatage;
|
||||
(void) fr_addstate(ip, &fi, sp ? 0 : FI_W_SPORT);
|
||||
}
|
||||
}
|
||||
|
||||
if ((rap->rap_mode & RAP_M_UDP) == RAP_M_UDP) {
|
||||
sp = rap->rap_plport;
|
||||
tcp2->th_sport = htons(sp);
|
||||
tcp2->th_dport = 0; /* XXX - don't specify remote port */
|
||||
fi.fin_data[0] = sp;
|
||||
fi.fin_data[1] = 0;
|
||||
ipn = nat_new(nat->nat_ptr, ip, &fi, IPN_UDP|FI_W_DPORT,
|
||||
NAT_OUTBOUND);
|
||||
if (ipn != NULL) {
|
||||
ipn->nat_age = fr_defnatage;
|
||||
(void) fr_addstate(ip, &fi, FI_W_DPORT);
|
||||
}
|
||||
}
|
||||
|
||||
ip->ip_p = swp;
|
||||
ip->ip_len = slen;
|
||||
ip->ip_src = swa;
|
||||
ip->ip_dst = swb;
|
||||
return 0;
|
||||
}
|
@ -1,174 +0,0 @@
|
||||
/*
|
||||
* $Id: ip_rcmd_pxy.c,v 1.4.2.4 2000/11/01 14:34:20 darrenr Exp $
|
||||
*/
|
||||
/*
|
||||
* Simple RCMD transparent proxy for in-kernel use. For use with the NAT
|
||||
* code.
|
||||
* $FreeBSD$
|
||||
*/
|
||||
#if SOLARIS && defined(_KERNEL)
|
||||
extern kmutex_t ipf_rw;
|
||||
#endif
|
||||
|
||||
#define isdigit(x) ((x) >= '0' && (x) <= '9')
|
||||
|
||||
#define IPF_RCMD_PROXY
|
||||
|
||||
|
||||
int ippr_rcmd_init __P((void));
|
||||
int ippr_rcmd_new __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
int ippr_rcmd_out __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
u_short ipf_rcmd_atoi __P((char *));
|
||||
int ippr_rcmd_portmsg __P((fr_info_t *, ip_t *, ap_session_t *, nat_t *));
|
||||
|
||||
static frentry_t rcmdfr;
|
||||
|
||||
|
||||
/*
|
||||
* RCMD application proxy initialization.
|
||||
*/
|
||||
int ippr_rcmd_init()
|
||||
{
|
||||
bzero((char *)&rcmdfr, sizeof(rcmdfr));
|
||||
rcmdfr.fr_ref = 1;
|
||||
rcmdfr.fr_flags = FR_INQUE|FR_PASS|FR_QUICK|FR_KEEPSTATE;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Setup for a new RCMD proxy.
|
||||
*/
|
||||
int ippr_rcmd_new(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
tcphdr_t *tcp = (tcphdr_t *)fin->fin_dp;
|
||||
|
||||
aps->aps_psiz = sizeof(u_32_t);
|
||||
KMALLOCS(aps->aps_data, u_32_t *, sizeof(u_32_t));
|
||||
if (aps->aps_data == NULL)
|
||||
return -1;
|
||||
*(u_32_t *)aps->aps_data = 0;
|
||||
aps->aps_sport = tcp->th_sport;
|
||||
aps->aps_dport = tcp->th_dport;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* ipf_rcmd_atoi - implement a simple version of atoi
|
||||
*/
|
||||
u_short ipf_rcmd_atoi(ptr)
|
||||
char *ptr;
|
||||
{
|
||||
register char *s = ptr, c;
|
||||
register u_short i = 0;
|
||||
|
||||
while ((c = *s++) && isdigit(c)) {
|
||||
i *= 10;
|
||||
i += c - '0';
|
||||
}
|
||||
return i;
|
||||
}
|
||||
|
||||
|
||||
int ippr_rcmd_portmsg(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
char portbuf[8], *s;
|
||||
struct in_addr swip;
|
||||
u_short sp, dp;
|
||||
int off, dlen;
|
||||
tcphdr_t *tcp, tcph, *tcp2 = &tcph;
|
||||
fr_info_t fi;
|
||||
nat_t *ipn;
|
||||
mb_t *m;
|
||||
#if SOLARIS
|
||||
mb_t *m1;
|
||||
#endif
|
||||
|
||||
tcp = (tcphdr_t *)fin->fin_dp;
|
||||
|
||||
if (tcp->th_flags & TH_SYN) {
|
||||
*(u_32_t *)aps->aps_data = htonl(ntohl(tcp->th_seq) + 1);
|
||||
return 0;
|
||||
}
|
||||
|
||||
if ((*(u_32_t *)aps->aps_data != 0) &&
|
||||
(tcp->th_seq != *(u_32_t *)aps->aps_data))
|
||||
return 0;
|
||||
|
||||
off = (ip->ip_hl << 2) + (tcp->th_off << 2);
|
||||
|
||||
#if SOLARIS
|
||||
m = fin->fin_qfm;
|
||||
|
||||
dlen = msgdsize(m) - off;
|
||||
bzero(portbuf, sizeof(portbuf));
|
||||
copyout_mblk(m, off, MIN(sizeof(portbuf), dlen), portbuf);
|
||||
#else
|
||||
m = *(mb_t **)fin->fin_mp;
|
||||
dlen = mbufchainlen(m) - off;
|
||||
bzero(portbuf, sizeof(portbuf));
|
||||
m_copydata(m, off, MIN(sizeof(portbuf), dlen), portbuf);
|
||||
#endif
|
||||
|
||||
portbuf[sizeof(portbuf) - 1] = '\0';
|
||||
s = portbuf;
|
||||
sp = ipf_rcmd_atoi(s);
|
||||
if (!sp)
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Add skeleton NAT entry for connection which will come back the
|
||||
* other way.
|
||||
*/
|
||||
sp = htons(sp);
|
||||
dp = htons(fin->fin_data[1]);
|
||||
ipn = nat_outlookup(fin->fin_ifp, IPN_TCP, nat->nat_p, nat->nat_inip,
|
||||
ip->ip_dst, (dp << 16) | sp, 0);
|
||||
if (ipn == NULL) {
|
||||
int slen;
|
||||
|
||||
slen = ip->ip_len;
|
||||
ip->ip_len = fin->fin_hlen + sizeof(*tcp);
|
||||
bcopy((char *)fin, (char *)&fi, sizeof(fi));
|
||||
bzero((char *)tcp2, sizeof(*tcp2));
|
||||
tcp2->th_win = htons(8192);
|
||||
tcp2->th_sport = sp;
|
||||
tcp2->th_dport = 0; /* XXX - don't specify remote port */
|
||||
tcp2->th_off = 5;
|
||||
fi.fin_data[0] = ntohs(sp);
|
||||
fi.fin_data[1] = 0;
|
||||
fi.fin_dp = (char *)tcp2;
|
||||
fi.fin_dlen = sizeof(*tcp2);
|
||||
swip = ip->ip_src;
|
||||
ip->ip_src = nat->nat_inip;
|
||||
ipn = nat_new(nat->nat_ptr, ip, &fi, IPN_TCP|FI_W_DPORT,
|
||||
NAT_OUTBOUND);
|
||||
if (ipn != NULL) {
|
||||
ipn->nat_age = fr_defnatage;
|
||||
fi.fin_fr = &rcmdfr;
|
||||
(void) fr_addstate(ip, &fi, FI_W_DPORT);
|
||||
}
|
||||
ip->ip_len = slen;
|
||||
ip->ip_src = swip;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int ippr_rcmd_out(fin, ip, aps, nat)
|
||||
fr_info_t *fin;
|
||||
ip_t *ip;
|
||||
ap_session_t *aps;
|
||||
nat_t *nat;
|
||||
{
|
||||
return ippr_rcmd_portmsg(fin, ip, aps, nat);
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -1,196 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1995-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* @(#)ip_state.h 1.3 1/12/96 (C) 1995 Darren Reed
|
||||
* $Id: ip_state.h,v 2.13.2.1 2000/07/08 02:15:35 darrenr Exp $
|
||||
* $FreeBSD$
|
||||
*/
|
||||
#ifndef __IP_STATE_H__
|
||||
#define __IP_STATE_H__
|
||||
|
||||
#if defined(__STDC__) || defined(__GNUC__)
|
||||
# define SIOCDELST _IOW('r', 61, struct ipstate *)
|
||||
#else
|
||||
# define SIOCDELST _IOW(r, 61, struct ipstate *)
|
||||
#endif
|
||||
|
||||
#define IPSTATE_SIZE 5737
|
||||
#define IPSTATE_MAX 4013 /* Maximum number of states held */
|
||||
|
||||
#define PAIRS(s1,d1,s2,d2) ((((s1) == (s2)) && ((d1) == (d2))) ||\
|
||||
(((s1) == (d2)) && ((d1) == (s2))))
|
||||
#define IPPAIR(s1,d1,s2,d2) PAIRS((s1).s_addr, (d1).s_addr, \
|
||||
(s2).s_addr, (d2).s_addr)
|
||||
|
||||
|
||||
typedef struct udpstate {
|
||||
u_short us_sport;
|
||||
u_short us_dport;
|
||||
} udpstate_t;
|
||||
|
||||
typedef struct icmpstate {
|
||||
u_short ics_id;
|
||||
u_short ics_seq;
|
||||
u_char ics_type;
|
||||
} icmpstate_t;
|
||||
|
||||
typedef struct tcpdata {
|
||||
u_32_t td_end;
|
||||
u_32_t td_maxend;
|
||||
u_short td_maxwin;
|
||||
} tcpdata_t;
|
||||
|
||||
typedef struct tcpstate {
|
||||
u_short ts_sport;
|
||||
u_short ts_dport;
|
||||
tcpdata_t ts_data[2];
|
||||
u_char ts_state[2];
|
||||
} tcpstate_t;
|
||||
|
||||
typedef struct ipstate {
|
||||
struct ipstate *is_next;
|
||||
struct ipstate **is_pnext;
|
||||
struct ipstate *is_hnext;
|
||||
struct ipstate **is_phnext;
|
||||
u_long is_age;
|
||||
u_int is_pass;
|
||||
U_QUAD_T is_pkts;
|
||||
U_QUAD_T is_bytes;
|
||||
void *is_ifp[2];
|
||||
frentry_t *is_rule;
|
||||
union i6addr is_src;
|
||||
union i6addr is_dst;
|
||||
u_char is_p; /* Protocol */
|
||||
u_char is_v;
|
||||
u_int is_hv;
|
||||
u_32_t is_flags;
|
||||
u_32_t is_opt; /* packet options set */
|
||||
u_32_t is_optmsk; /* " " mask */
|
||||
u_short is_sec; /* security options set */
|
||||
u_short is_secmsk; /* " " mask */
|
||||
u_short is_auth; /* authentication options set */
|
||||
u_short is_authmsk; /* " " mask */
|
||||
union {
|
||||
icmpstate_t is_ics;
|
||||
tcpstate_t is_ts;
|
||||
udpstate_t is_us;
|
||||
} is_ps;
|
||||
char is_ifname[2][IFNAMSIZ];
|
||||
#if SOLARIS || defined(__sgi)
|
||||
kmutex_t is_lock;
|
||||
#endif
|
||||
} ipstate_t;
|
||||
|
||||
#define is_saddr is_src.in4.s_addr
|
||||
#define is_daddr is_dst.in4.s_addr
|
||||
#define is_icmp is_ps.is_ics
|
||||
#define is_type is_icmp.ics_type
|
||||
#define is_code is_icmp.ics_code
|
||||
#define is_tcp is_ps.is_ts
|
||||
#define is_udp is_ps.is_us
|
||||
#define is_send is_tcp.ts_data[0].td_end
|
||||
#define is_dend is_tcp.ts_data[1].td_end
|
||||
#define is_maxswin is_tcp.ts_data[0].td_maxwin
|
||||
#define is_maxdwin is_tcp.ts_data[1].td_maxwin
|
||||
#define is_maxsend is_tcp.ts_data[0].td_maxend
|
||||
#define is_maxdend is_tcp.ts_data[1].td_maxend
|
||||
#define is_sport is_tcp.ts_sport
|
||||
#define is_dport is_tcp.ts_dport
|
||||
#define is_state is_tcp.ts_state
|
||||
#define is_ifpin is_ifp[0]
|
||||
#define is_ifpout is_ifp[1]
|
||||
|
||||
#define TH_OPENING (TH_SYN|TH_ACK)
|
||||
/*
|
||||
* is_flags:
|
||||
* Bits 0 - 3 are use as a mask with the current packet's bits to check for
|
||||
* whether it is short, tcp/udp, a fragment or the presence of IP options.
|
||||
* Bits 4 - 7 are set from the initial packet and contain what the packet
|
||||
* anded with bits 0-3 must match.
|
||||
* Bits 8,9 are used to indicate wildcard source/destination port matching.
|
||||
*/
|
||||
|
||||
typedef struct ipstate_save {
|
||||
void *ips_next;
|
||||
struct ipstate ips_is;
|
||||
struct frentry ips_fr;
|
||||
} ipstate_save_t;
|
||||
|
||||
#define ips_rule ips_is.is_rule
|
||||
|
||||
|
||||
typedef struct ipslog {
|
||||
U_QUAD_T isl_pkts;
|
||||
U_QUAD_T isl_bytes;
|
||||
union i6addr isl_src;
|
||||
union i6addr isl_dst;
|
||||
u_short isl_type;
|
||||
union {
|
||||
u_short isl_filler[2];
|
||||
u_short isl_ports[2];
|
||||
u_short isl_icmp;
|
||||
} isl_ps;
|
||||
u_char isl_v;
|
||||
u_char isl_p;
|
||||
u_char isl_flags;
|
||||
u_char isl_state[2];
|
||||
} ipslog_t;
|
||||
|
||||
#define isl_sport isl_ps.isl_ports[0]
|
||||
#define isl_dport isl_ps.isl_ports[1]
|
||||
#define isl_itype isl_ps.isl_icmp
|
||||
|
||||
#define ISL_NEW 0
|
||||
#define ISL_EXPIRE 0xffff
|
||||
#define ISL_FLUSH 0xfffe
|
||||
#define ISL_REMOVE 0xfffd
|
||||
|
||||
|
||||
typedef struct ips_stat {
|
||||
u_long iss_hits;
|
||||
u_long iss_miss;
|
||||
u_long iss_max;
|
||||
u_long iss_tcp;
|
||||
u_long iss_udp;
|
||||
u_long iss_icmp;
|
||||
u_long iss_nomem;
|
||||
u_long iss_expire;
|
||||
u_long iss_fin;
|
||||
u_long iss_active;
|
||||
u_long iss_logged;
|
||||
u_long iss_logfail;
|
||||
u_long iss_inuse;
|
||||
ipstate_t **iss_table;
|
||||
ipstate_t *iss_list;
|
||||
} ips_stat_t;
|
||||
|
||||
|
||||
extern u_long fr_tcpidletimeout;
|
||||
extern u_long fr_tcpclosewait;
|
||||
extern u_long fr_tcplastack;
|
||||
extern u_long fr_tcptimeout;
|
||||
extern u_long fr_tcpclosed;
|
||||
extern u_long fr_tcphalfclosed;
|
||||
extern u_long fr_udptimeout;
|
||||
extern u_long fr_icmptimeout;
|
||||
extern int fr_state_lock;
|
||||
extern int fr_stateinit __P((void));
|
||||
extern int fr_tcpstate __P((ipstate_t *, fr_info_t *, ip_t *, tcphdr_t *));
|
||||
extern ipstate_t *fr_addstate __P((ip_t *, fr_info_t *, u_int));
|
||||
extern frentry_t *fr_checkstate __P((ip_t *, fr_info_t *));
|
||||
extern void ip_statesync __P((void *));
|
||||
extern void fr_timeoutstate __P((void));
|
||||
extern void fr_tcp_age __P((u_long *, u_char *, fr_info_t *, int));
|
||||
extern void fr_stateunload __P((void));
|
||||
extern void ipstate_log __P((struct ipstate *, u_int));
|
||||
#if defined(__NetBSD__) || defined(__OpenBSD__)
|
||||
extern int fr_state_ioctl __P((caddr_t, u_long, int));
|
||||
#else
|
||||
extern int fr_state_ioctl __P((caddr_t, int, int));
|
||||
#endif
|
||||
|
||||
#endif /* __IP_STATE_H__ */
|
@ -1,17 +0,0 @@
|
||||
/*
|
||||
* Copyright (C) 1993-2000 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*
|
||||
* @(#)ipl.h 1.21 6/5/96
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef __IPL_H__
|
||||
#define __IPL_H__
|
||||
|
||||
#define IPL_VERSION "IP Filter: v3.4.16"
|
||||
|
||||
#endif
|
@ -1,196 +0,0 @@
|
||||
/*
|
||||
* Copyright 1999 Guido van Rooij. All rights reserved.
|
||||
*
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions are
|
||||
* met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
||||
* this list of conditions and the following disclaimer in the documentation
|
||||
* and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS
|
||||
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||
* DISCLAIMED. IN NO EVENT SHALL THE HOLDER OR CONTRIBUTORS BE LIABLE FOR
|
||||
* ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
||||
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/systm.h>
|
||||
#include <sys/kernel.h>
|
||||
#include <sys/module.h>
|
||||
#include <sys/conf.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/sysctl.h>
|
||||
#include <net/if.h>
|
||||
#include <netinet/in_systm.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/ip.h>
|
||||
#if (__FreeBSD_version >= 199511)
|
||||
# include <net/route.h>
|
||||
# include <netinet/ip_var.h>
|
||||
# include <netinet/tcp.h>
|
||||
# include <netinet/tcpip.h>
|
||||
#endif
|
||||
|
||||
|
||||
#include <netinet/ipl.h>
|
||||
#include <netinet/ip_compat.h>
|
||||
#include <netinet/ip_fil.h>
|
||||
#include <netinet/ip_state.h>
|
||||
#include <netinet/ip_nat.h>
|
||||
#include <netinet/ip_auth.h>
|
||||
#include <netinet/ip_frag.h>
|
||||
#include <netinet/ip_proxy.h>
|
||||
|
||||
static dev_t ipf_devs[IPL_LOGMAX + 1];
|
||||
|
||||
SYSCTL_DECL(_net_inet);
|
||||
SYSCTL_NODE(_net_inet, OID_AUTO, ipf, CTLFLAG_RW, 0, "IPF");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_flags, CTLFLAG_RW, &fr_flags, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_pass, CTLFLAG_RW, &fr_pass, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_active, CTLFLAG_RD, &fr_active, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcpidletimeout, CTLFLAG_RW,
|
||||
&fr_tcpidletimeout, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcpclosewait, CTLFLAG_RW,
|
||||
&fr_tcpclosewait, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcplastack, CTLFLAG_RW,
|
||||
&fr_tcplastack, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcptimeout, CTLFLAG_RW,
|
||||
&fr_tcptimeout, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcpclosed, CTLFLAG_RW,
|
||||
&fr_tcpclosed, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_tcphalfclosed, CTLFLAG_RW,
|
||||
&fr_tcphalfclosed, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_udptimeout, CTLFLAG_RW,
|
||||
&fr_udptimeout, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_icmptimeout, CTLFLAG_RW,
|
||||
&fr_icmptimeout, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_defnatage, CTLFLAG_RW,
|
||||
&fr_defnatage, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_ipfrttl, CTLFLAG_RW,
|
||||
&fr_ipfrttl, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, ipl_unreach, CTLFLAG_RW,
|
||||
&ipl_unreach, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_running, CTLFLAG_RD,
|
||||
&fr_running, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_authsize, CTLFLAG_RD,
|
||||
&fr_authsize, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_authused, CTLFLAG_RD,
|
||||
&fr_authused, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_defaultauthage, CTLFLAG_RW,
|
||||
&fr_defaultauthage, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_chksrc, CTLFLAG_RW, &fr_chksrc, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, ippr_ftp_pasvonly, CTLFLAG_RW,
|
||||
&ippr_ftp_pasvonly, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_minttl, CTLFLAG_RW, &fr_minttl, 0, "");
|
||||
SYSCTL_INT(_net_inet_ipf, OID_AUTO, fr_minttllog, CTLFLAG_RW,
|
||||
&fr_minttllog, 0, "");
|
||||
|
||||
#define CDEV_MAJOR 79
|
||||
static struct cdevsw ipl_cdevsw = {
|
||||
/* open */ iplopen,
|
||||
/* close */ iplclose,
|
||||
/* read */ iplread,
|
||||
/* write */ nowrite,
|
||||
/* ioctl */ iplioctl,
|
||||
/* poll */ nopoll,
|
||||
/* mmap */ nommap,
|
||||
/* strategy */ nostrategy,
|
||||
/* name */ "ipl",
|
||||
/* maj */ CDEV_MAJOR,
|
||||
/* dump */ nodump,
|
||||
/* psize */ nopsize,
|
||||
/* flags */ 0,
|
||||
};
|
||||
|
||||
static int
|
||||
ipfilter_modevent(module_t mod, int type, void *unused)
|
||||
{
|
||||
char *c;
|
||||
int i, error = 0;
|
||||
|
||||
switch (type) {
|
||||
case MOD_LOAD :
|
||||
|
||||
error = iplattach();
|
||||
if (error)
|
||||
break;
|
||||
|
||||
c = NULL;
|
||||
for(i=strlen(IPL_NAME); i>0; i--)
|
||||
if (IPL_NAME[i] == '/') {
|
||||
c = &IPL_NAME[i+1];
|
||||
break;
|
||||
}
|
||||
if (!c)
|
||||
c = IPL_NAME;
|
||||
ipf_devs[IPL_LOGIPF] =
|
||||
make_dev(&ipl_cdevsw, IPL_LOGIPF, 0, 0, 0600, c);
|
||||
|
||||
c = NULL;
|
||||
for(i=strlen(IPL_NAT); i>0; i--)
|
||||
if (IPL_NAT[i] == '/') {
|
||||
c = &IPL_NAT[i+1];
|
||||
break;
|
||||
}
|
||||
if (!c)
|
||||
c = IPL_NAT;
|
||||
ipf_devs[IPL_LOGNAT] =
|
||||
make_dev(&ipl_cdevsw, IPL_LOGNAT, 0, 0, 0600, c);
|
||||
|
||||
c = NULL;
|
||||
for(i=strlen(IPL_STATE); i>0; i--)
|
||||
if (IPL_STATE[i] == '/') {
|
||||
c = &IPL_STATE[i+1];
|
||||
break;
|
||||
}
|
||||
if (!c)
|
||||
c = IPL_STATE;
|
||||
ipf_devs[IPL_LOGSTATE] =
|
||||
make_dev(&ipl_cdevsw, IPL_LOGSTATE, 0, 0, 0600, c);
|
||||
|
||||
c = NULL;
|
||||
for(i=strlen(IPL_AUTH); i>0; i--)
|
||||
if (IPL_AUTH[i] == '/') {
|
||||
c = &IPL_AUTH[i+1];
|
||||
break;
|
||||
}
|
||||
if (!c)
|
||||
c = IPL_AUTH;
|
||||
ipf_devs[IPL_LOGAUTH] =
|
||||
make_dev(&ipl_cdevsw, IPL_LOGAUTH, 0, 0, 0600, c);
|
||||
|
||||
break;
|
||||
case MOD_UNLOAD :
|
||||
destroy_dev(ipf_devs[IPL_LOGIPF]);
|
||||
destroy_dev(ipf_devs[IPL_LOGNAT]);
|
||||
destroy_dev(ipf_devs[IPL_LOGSTATE]);
|
||||
destroy_dev(ipf_devs[IPL_LOGAUTH]);
|
||||
error = ipldetach();
|
||||
break;
|
||||
default:
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
return error;
|
||||
}
|
||||
|
||||
static moduledata_t ipfiltermod = {
|
||||
IPL_VERSION,
|
||||
ipfilter_modevent,
|
||||
0
|
||||
};
|
||||
DECLARE_MODULE(ipfilter, ipfiltermod, SI_SUB_PROTO_DOMAIN, SI_ORDER_ANY);
|
Loading…
Reference in New Issue
Block a user