Start splitting ip_fw2.c and ip_fw.h into smaller components.
At this time we pull out from ip_fw2.c the logging functions, and support for dynamic rules, and move kernel-only stuff into netinet/ipfw/ip_fw_private.h No ABI change involved in this commit, unless I made some mistake. ip_fw.h has changed, though not in the userland-visible part. Files touched by this commit: conf/files now references the two new source files netinet/ip_fw.h remove kernel-only definitions gone into netinet/ipfw/ip_fw_private.h. netinet/ipfw/ip_fw_private.h new file with kernel-specific ipfw definitions netinet/ipfw/ip_fw_log.c ipfw_log and related functions netinet/ipfw/ip_fw_dynamic.c code related to dynamic rules netinet/ipfw/ip_fw2.c removed the pieces that goes in the new files netinet/ipfw/ip_fw_nat.c minor rearrangement to remove LOOKUP_NAT from the main headers. This require a new function pointer. A bunch of other kernel files that included netinet/ip_fw.h now require netinet/ipfw/ip_fw_private.h as well. Not 100% sure i caught all of them. MFC after: 1 month
This commit is contained in:
parent
09d432fc4a
commit
70228fb346
@ -2427,6 +2427,8 @@ netinet/ip_encap.c optional inet | inet6
|
||||
netinet/ip_fastfwd.c optional inet
|
||||
netinet/ipfw/ip_fw2.c optional inet ipfirewall \
|
||||
compile-with "${NORMAL_C} -I$S/contrib/pf"
|
||||
netinet/ipfw/ip_fw_dynamic.c optional inet ipfirewall
|
||||
netinet/ipfw/ip_fw_log.c optional inet ipfirewall
|
||||
netinet/ipfw/ip_fw_pfil.c optional inet ipfirewall
|
||||
netinet/ipfw/ip_fw_nat.c optional inet ipfirewall_nat
|
||||
netinet/ip_icmp.c optional inet
|
||||
|
@ -134,6 +134,7 @@ __FBSDID("$FreeBSD$");
|
||||
|
||||
#include <net/route.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/ip_dummynet.h>
|
||||
|
||||
/*
|
||||
|
@ -71,6 +71,7 @@
|
||||
#include <netinet/in_var.h>
|
||||
#include <netinet/if_ether.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/ip_dummynet.h>
|
||||
#include <netinet/ip_var.h>
|
||||
#endif
|
||||
|
@ -75,6 +75,7 @@ __FBSDID("$FreeBSD$");
|
||||
#include <netinet/ip_divert.h>
|
||||
#include <netinet/ip_var.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#ifdef SCTP
|
||||
#include <netinet/sctp_crc32.h>
|
||||
#endif
|
||||
|
@ -571,133 +571,4 @@ typedef struct _ipfw_table {
|
||||
ipfw_table_entry ent[0]; /* entries */
|
||||
} ipfw_table;
|
||||
|
||||
/*
|
||||
* Main firewall chains definitions and global var's definitions.
|
||||
*/
|
||||
#ifdef _KERNEL
|
||||
|
||||
#define MTAG_IPFW 1148380143 /* IPFW-tagged cookie */
|
||||
|
||||
/* Return values from ipfw_chk() */
|
||||
enum {
|
||||
IP_FW_PASS = 0,
|
||||
IP_FW_DENY,
|
||||
IP_FW_DIVERT,
|
||||
IP_FW_TEE,
|
||||
IP_FW_DUMMYNET,
|
||||
IP_FW_NETGRAPH,
|
||||
IP_FW_NGTEE,
|
||||
IP_FW_NAT,
|
||||
IP_FW_REASS,
|
||||
};
|
||||
|
||||
/* flags for divert mtag */
|
||||
#define IP_FW_DIVERT_LOOPBACK_FLAG 0x00080000
|
||||
#define IP_FW_DIVERT_OUTPUT_FLAG 0x00100000
|
||||
|
||||
/*
|
||||
* Structure for collecting parameters to dummynet for ip6_output forwarding
|
||||
*/
|
||||
struct _ip6dn_args {
|
||||
struct ip6_pktopts *opt_or;
|
||||
struct route_in6 ro_or;
|
||||
int flags_or;
|
||||
struct ip6_moptions *im6o_or;
|
||||
struct ifnet *origifp_or;
|
||||
struct ifnet *ifp_or;
|
||||
struct sockaddr_in6 dst_or;
|
||||
u_long mtu_or;
|
||||
struct route_in6 ro_pmtu_or;
|
||||
};
|
||||
|
||||
/*
|
||||
* Arguments for calling ipfw_chk() and dummynet_io(). We put them
|
||||
* all into a structure because this way it is easier and more
|
||||
* efficient to pass variables around and extend the interface.
|
||||
*/
|
||||
struct ip_fw_args {
|
||||
struct mbuf *m; /* the mbuf chain */
|
||||
struct ifnet *oif; /* output interface */
|
||||
struct sockaddr_in *next_hop; /* forward address */
|
||||
struct ip_fw *rule; /* matching rule */
|
||||
uint32_t rule_id; /* matching rule id */
|
||||
uint32_t chain_id; /* ruleset id */
|
||||
struct ether_header *eh; /* for bridged packets */
|
||||
|
||||
struct ipfw_flow_id f_id; /* grabbed from IP header */
|
||||
uint32_t cookie; /* a cookie depending on rule action */
|
||||
struct inpcb *inp;
|
||||
|
||||
struct _ip6dn_args dummypar; /* dummynet->ip6_output */
|
||||
struct sockaddr_in hopstore; /* store here if cannot use a pointer */
|
||||
};
|
||||
|
||||
/*
|
||||
* Function definitions.
|
||||
*/
|
||||
|
||||
/* Firewall hooks */
|
||||
struct sockopt;
|
||||
struct dn_flow_set;
|
||||
|
||||
int ipfw_check_in(void *, struct mbuf **, struct ifnet *, int, struct inpcb *inp);
|
||||
int ipfw_check_out(void *, struct mbuf **, struct ifnet *, int, struct inpcb *inp);
|
||||
|
||||
int ipfw_chk(struct ip_fw_args *);
|
||||
|
||||
int ipfw_hook(void);
|
||||
int ipfw6_hook(void);
|
||||
int ipfw_unhook(void);
|
||||
int ipfw6_unhook(void);
|
||||
#ifdef NOTYET
|
||||
void ipfw_nat_destroy(void);
|
||||
#endif
|
||||
|
||||
VNET_DECLARE(int, fw_one_pass);
|
||||
VNET_DECLARE(int, fw_enable);
|
||||
#define V_fw_one_pass VNET(fw_one_pass)
|
||||
#define V_fw_enable VNET(fw_enable)
|
||||
|
||||
#ifdef INET6
|
||||
VNET_DECLARE(int, fw6_enable);
|
||||
#define V_fw6_enable VNET(fw6_enable)
|
||||
#endif
|
||||
|
||||
struct ip_fw_chain {
|
||||
struct ip_fw *rules; /* list of rules */
|
||||
struct ip_fw *reap; /* list of rules to reap */
|
||||
LIST_HEAD(, cfg_nat) nat; /* list of nat entries */
|
||||
struct radix_node_head *tables[IPFW_TABLES_MAX];
|
||||
struct rwlock rwmtx;
|
||||
uint32_t id; /* ruleset id */
|
||||
};
|
||||
|
||||
#ifdef IPFW_INTERNAL
|
||||
|
||||
#define IPFW_LOCK_INIT(_chain) \
|
||||
rw_init(&(_chain)->rwmtx, "IPFW static rules")
|
||||
#define IPFW_LOCK_DESTROY(_chain) rw_destroy(&(_chain)->rwmtx)
|
||||
#define IPFW_WLOCK_ASSERT(_chain) rw_assert(&(_chain)->rwmtx, RA_WLOCKED)
|
||||
|
||||
#define IPFW_RLOCK(p) rw_rlock(&(p)->rwmtx)
|
||||
#define IPFW_RUNLOCK(p) rw_runlock(&(p)->rwmtx)
|
||||
#define IPFW_WLOCK(p) rw_wlock(&(p)->rwmtx)
|
||||
#define IPFW_WUNLOCK(p) rw_wunlock(&(p)->rwmtx)
|
||||
|
||||
#define LOOKUP_NAT(l, i, p) do { \
|
||||
LIST_FOREACH((p), &(l.nat), _next) { \
|
||||
if ((p)->id == (i)) { \
|
||||
break; \
|
||||
} \
|
||||
} \
|
||||
} while (0)
|
||||
|
||||
typedef int ipfw_nat_t(struct ip_fw_args *, struct cfg_nat *, struct mbuf *);
|
||||
typedef int ipfw_nat_cfg_t(struct sockopt *);
|
||||
#endif
|
||||
|
||||
VNET_DECLARE(struct ip_fw_chain, layer3_chain);
|
||||
#define V_layer3_chain VNET(layer3_chain)
|
||||
|
||||
#endif /* _KERNEL */
|
||||
#endif /* _IPFW2_H */
|
||||
|
@ -76,6 +76,7 @@ __FBSDID("$FreeBSD$");
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/ip.h> /* ip_len, ip_off */
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/ip_dummynet.h>
|
||||
#include <netinet/ip_var.h> /* ip_output(), IP_FORWARDING */
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
1224
sys/netinet/ipfw/ip_fw_dynamic.c
Normal file
1224
sys/netinet/ipfw/ip_fw_dynamic.c
Normal file
File diff suppressed because it is too large
Load Diff
371
sys/netinet/ipfw/ip_fw_log.c
Normal file
371
sys/netinet/ipfw/ip_fw_log.c
Normal file
@ -0,0 +1,371 @@
|
||||
/*-
|
||||
* Copyright (c) 2002 Luigi Rizzo, Universita` di Pisa
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*/
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#define DEB(x)
|
||||
#define DDB(x) x
|
||||
|
||||
/*
|
||||
* Logging support for ipfw
|
||||
*/
|
||||
|
||||
#if !defined(KLD_MODULE)
|
||||
#include "opt_ipfw.h"
|
||||
#include "opt_ipdivert.h"
|
||||
#include "opt_ipdn.h"
|
||||
#include "opt_inet.h"
|
||||
#ifndef INET
|
||||
#error IPFIREWALL requires INET.
|
||||
#endif /* INET */
|
||||
#endif
|
||||
#include "opt_inet6.h"
|
||||
#include "opt_ipsec.h"
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/systm.h>
|
||||
#include <sys/mbuf.h>
|
||||
#include <sys/kernel.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/sysctl.h>
|
||||
#include <sys/syslog.h>
|
||||
#include <net/ethernet.h> /* for ETHERTYPE_IP */
|
||||
#include <net/if.h>
|
||||
#include <net/vnet.h>
|
||||
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/ip.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/tcp_var.h>
|
||||
#include <netinet/udp.h>
|
||||
|
||||
#include <netinet/ip6.h>
|
||||
#include <netinet/icmp6.h>
|
||||
#ifdef INET6
|
||||
#include <netinet6/in6_var.h> /* ip6_sprintf() */
|
||||
#endif
|
||||
|
||||
#ifdef MAC
|
||||
#include <security/mac/mac_framework.h>
|
||||
#endif
|
||||
|
||||
/*
|
||||
* L3HDR maps an ipv4 pointer into a layer3 header pointer of type T
|
||||
* Other macros just cast void * into the appropriate type
|
||||
*/
|
||||
#define L3HDR(T, ip) ((T *)((u_int32_t *)(ip) + (ip)->ip_hl))
|
||||
#define TCP(p) ((struct tcphdr *)(p))
|
||||
#define SCTP(p) ((struct sctphdr *)(p))
|
||||
#define UDP(p) ((struct udphdr *)(p))
|
||||
#define ICMP(p) ((struct icmphdr *)(p))
|
||||
#define ICMP6(p) ((struct icmp6_hdr *)(p))
|
||||
|
||||
/* counter for ipfw_log(NULL...) */
|
||||
VNET_DEFINE(u_int64_t, norule_counter);
|
||||
VNET_DEFINE(int, verbose_limit);
|
||||
|
||||
#define SNPARGS(buf, len) buf + len, sizeof(buf) > len ? sizeof(buf) - len : 0
|
||||
#define SNP(buf) buf, sizeof(buf)
|
||||
|
||||
/*
|
||||
* We enter here when we have a rule with O_LOG.
|
||||
* XXX this function alone takes about 2Kbytes of code!
|
||||
*/
|
||||
void
|
||||
ipfw_log(struct ip_fw *f, u_int hlen, struct ip_fw_args *args,
|
||||
struct mbuf *m, struct ifnet *oif, u_short offset, uint32_t tablearg,
|
||||
struct ip *ip)
|
||||
{
|
||||
struct ether_header *eh = args->eh;
|
||||
char *action;
|
||||
int limit_reached = 0;
|
||||
char action2[40], proto[128], fragment[32];
|
||||
|
||||
fragment[0] = '\0';
|
||||
proto[0] = '\0';
|
||||
|
||||
if (f == NULL) { /* bogus pkt */
|
||||
if (V_verbose_limit != 0 && V_norule_counter >= V_verbose_limit)
|
||||
return;
|
||||
V_norule_counter++;
|
||||
if (V_norule_counter == V_verbose_limit)
|
||||
limit_reached = V_verbose_limit;
|
||||
action = "Refuse";
|
||||
} else { /* O_LOG is the first action, find the real one */
|
||||
ipfw_insn *cmd = ACTION_PTR(f);
|
||||
ipfw_insn_log *l = (ipfw_insn_log *)cmd;
|
||||
|
||||
if (l->max_log != 0 && l->log_left == 0)
|
||||
return;
|
||||
l->log_left--;
|
||||
if (l->log_left == 0)
|
||||
limit_reached = l->max_log;
|
||||
cmd += F_LEN(cmd); /* point to first action */
|
||||
if (cmd->opcode == O_ALTQ) {
|
||||
ipfw_insn_altq *altq = (ipfw_insn_altq *)cmd;
|
||||
|
||||
snprintf(SNPARGS(action2, 0), "Altq %d",
|
||||
altq->qid);
|
||||
cmd += F_LEN(cmd);
|
||||
}
|
||||
if (cmd->opcode == O_PROB)
|
||||
cmd += F_LEN(cmd);
|
||||
|
||||
if (cmd->opcode == O_TAG)
|
||||
cmd += F_LEN(cmd);
|
||||
|
||||
action = action2;
|
||||
switch (cmd->opcode) {
|
||||
case O_DENY:
|
||||
action = "Deny";
|
||||
break;
|
||||
|
||||
case O_REJECT:
|
||||
if (cmd->arg1==ICMP_REJECT_RST)
|
||||
action = "Reset";
|
||||
else if (cmd->arg1==ICMP_UNREACH_HOST)
|
||||
action = "Reject";
|
||||
else
|
||||
snprintf(SNPARGS(action2, 0), "Unreach %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
|
||||
case O_UNREACH6:
|
||||
if (cmd->arg1==ICMP6_UNREACH_RST)
|
||||
action = "Reset";
|
||||
else
|
||||
snprintf(SNPARGS(action2, 0), "Unreach %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
|
||||
case O_ACCEPT:
|
||||
action = "Accept";
|
||||
break;
|
||||
case O_COUNT:
|
||||
action = "Count";
|
||||
break;
|
||||
case O_DIVERT:
|
||||
snprintf(SNPARGS(action2, 0), "Divert %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_TEE:
|
||||
snprintf(SNPARGS(action2, 0), "Tee %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_SETFIB:
|
||||
snprintf(SNPARGS(action2, 0), "SetFib %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_SKIPTO:
|
||||
snprintf(SNPARGS(action2, 0), "SkipTo %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_PIPE:
|
||||
snprintf(SNPARGS(action2, 0), "Pipe %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_QUEUE:
|
||||
snprintf(SNPARGS(action2, 0), "Queue %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_FORWARD_IP: {
|
||||
ipfw_insn_sa *sa = (ipfw_insn_sa *)cmd;
|
||||
int len;
|
||||
struct in_addr dummyaddr;
|
||||
if (sa->sa.sin_addr.s_addr == INADDR_ANY)
|
||||
dummyaddr.s_addr = htonl(tablearg);
|
||||
else
|
||||
dummyaddr.s_addr = sa->sa.sin_addr.s_addr;
|
||||
|
||||
len = snprintf(SNPARGS(action2, 0), "Forward to %s",
|
||||
inet_ntoa(dummyaddr));
|
||||
|
||||
if (sa->sa.sin_port)
|
||||
snprintf(SNPARGS(action2, len), ":%d",
|
||||
sa->sa.sin_port);
|
||||
}
|
||||
break;
|
||||
case O_NETGRAPH:
|
||||
snprintf(SNPARGS(action2, 0), "Netgraph %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_NGTEE:
|
||||
snprintf(SNPARGS(action2, 0), "Ngtee %d",
|
||||
cmd->arg1);
|
||||
break;
|
||||
case O_NAT:
|
||||
action = "Nat";
|
||||
break;
|
||||
case O_REASS:
|
||||
action = "Reass";
|
||||
break;
|
||||
default:
|
||||
action = "UNKNOWN";
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (hlen == 0) { /* non-ip */
|
||||
snprintf(SNPARGS(proto, 0), "MAC");
|
||||
|
||||
} else {
|
||||
int len;
|
||||
#ifdef INET6
|
||||
char src[INET6_ADDRSTRLEN + 2], dst[INET6_ADDRSTRLEN + 2];
|
||||
#else
|
||||
char src[INET_ADDRSTRLEN], dst[INET_ADDRSTRLEN];
|
||||
#endif
|
||||
struct icmphdr *icmp;
|
||||
struct tcphdr *tcp;
|
||||
struct udphdr *udp;
|
||||
#ifdef INET6
|
||||
struct ip6_hdr *ip6 = NULL;
|
||||
struct icmp6_hdr *icmp6;
|
||||
#endif
|
||||
src[0] = '\0';
|
||||
dst[0] = '\0';
|
||||
#ifdef INET6
|
||||
if (IS_IP6_FLOW_ID(&(args->f_id))) {
|
||||
char ip6buf[INET6_ADDRSTRLEN];
|
||||
snprintf(src, sizeof(src), "[%s]",
|
||||
ip6_sprintf(ip6buf, &args->f_id.src_ip6));
|
||||
snprintf(dst, sizeof(dst), "[%s]",
|
||||
ip6_sprintf(ip6buf, &args->f_id.dst_ip6));
|
||||
|
||||
ip6 = (struct ip6_hdr *)ip;
|
||||
tcp = (struct tcphdr *)(((char *)ip) + hlen);
|
||||
udp = (struct udphdr *)(((char *)ip) + hlen);
|
||||
} else
|
||||
#endif
|
||||
{
|
||||
tcp = L3HDR(struct tcphdr, ip);
|
||||
udp = L3HDR(struct udphdr, ip);
|
||||
|
||||
inet_ntoa_r(ip->ip_src, src);
|
||||
inet_ntoa_r(ip->ip_dst, dst);
|
||||
}
|
||||
|
||||
switch (args->f_id.proto) {
|
||||
case IPPROTO_TCP:
|
||||
len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
|
||||
if (offset == 0)
|
||||
snprintf(SNPARGS(proto, len), ":%d %s:%d",
|
||||
ntohs(tcp->th_sport),
|
||||
dst,
|
||||
ntohs(tcp->th_dport));
|
||||
else
|
||||
snprintf(SNPARGS(proto, len), " %s", dst);
|
||||
break;
|
||||
|
||||
case IPPROTO_UDP:
|
||||
len = snprintf(SNPARGS(proto, 0), "UDP %s", src);
|
||||
if (offset == 0)
|
||||
snprintf(SNPARGS(proto, len), ":%d %s:%d",
|
||||
ntohs(udp->uh_sport),
|
||||
dst,
|
||||
ntohs(udp->uh_dport));
|
||||
else
|
||||
snprintf(SNPARGS(proto, len), " %s", dst);
|
||||
break;
|
||||
|
||||
case IPPROTO_ICMP:
|
||||
icmp = L3HDR(struct icmphdr, ip);
|
||||
if (offset == 0)
|
||||
len = snprintf(SNPARGS(proto, 0),
|
||||
"ICMP:%u.%u ",
|
||||
icmp->icmp_type, icmp->icmp_code);
|
||||
else
|
||||
len = snprintf(SNPARGS(proto, 0), "ICMP ");
|
||||
len += snprintf(SNPARGS(proto, len), "%s", src);
|
||||
snprintf(SNPARGS(proto, len), " %s", dst);
|
||||
break;
|
||||
#ifdef INET6
|
||||
case IPPROTO_ICMPV6:
|
||||
icmp6 = (struct icmp6_hdr *)(((char *)ip) + hlen);
|
||||
if (offset == 0)
|
||||
len = snprintf(SNPARGS(proto, 0),
|
||||
"ICMPv6:%u.%u ",
|
||||
icmp6->icmp6_type, icmp6->icmp6_code);
|
||||
else
|
||||
len = snprintf(SNPARGS(proto, 0), "ICMPv6 ");
|
||||
len += snprintf(SNPARGS(proto, len), "%s", src);
|
||||
snprintf(SNPARGS(proto, len), " %s", dst);
|
||||
break;
|
||||
#endif
|
||||
default:
|
||||
len = snprintf(SNPARGS(proto, 0), "P:%d %s",
|
||||
args->f_id.proto, src);
|
||||
snprintf(SNPARGS(proto, len), " %s", dst);
|
||||
break;
|
||||
}
|
||||
|
||||
#ifdef INET6
|
||||
if (IS_IP6_FLOW_ID(&(args->f_id))) {
|
||||
if (offset & (IP6F_OFF_MASK | IP6F_MORE_FRAG))
|
||||
snprintf(SNPARGS(fragment, 0),
|
||||
" (frag %08x:%d@%d%s)",
|
||||
args->f_id.frag_id6,
|
||||
ntohs(ip6->ip6_plen) - hlen,
|
||||
ntohs(offset & IP6F_OFF_MASK) << 3,
|
||||
(offset & IP6F_MORE_FRAG) ? "+" : "");
|
||||
} else
|
||||
#endif
|
||||
{
|
||||
int ip_off, ip_len;
|
||||
if (eh != NULL) { /* layer 2 packets are as on the wire */
|
||||
ip_off = ntohs(ip->ip_off);
|
||||
ip_len = ntohs(ip->ip_len);
|
||||
} else {
|
||||
ip_off = ip->ip_off;
|
||||
ip_len = ip->ip_len;
|
||||
}
|
||||
if (ip_off & (IP_MF | IP_OFFMASK))
|
||||
snprintf(SNPARGS(fragment, 0),
|
||||
" (frag %d:%d@%d%s)",
|
||||
ntohs(ip->ip_id), ip_len - (ip->ip_hl << 2),
|
||||
offset << 3,
|
||||
(ip_off & IP_MF) ? "+" : "");
|
||||
}
|
||||
}
|
||||
if (oif || m->m_pkthdr.rcvif)
|
||||
log(LOG_SECURITY | LOG_INFO,
|
||||
"ipfw: %d %s %s %s via %s%s\n",
|
||||
f ? f->rulenum : -1,
|
||||
action, proto, oif ? "out" : "in",
|
||||
oif ? oif->if_xname : m->m_pkthdr.rcvif->if_xname,
|
||||
fragment);
|
||||
else
|
||||
log(LOG_SECURITY | LOG_INFO,
|
||||
"ipfw: %d %s %s [no if info]%s\n",
|
||||
f ? f->rulenum : -1,
|
||||
action, proto, fragment);
|
||||
if (limit_reached)
|
||||
log(LOG_SECURITY | LOG_NOTICE,
|
||||
"ipfw: limit %d reached on entry %d\n",
|
||||
limit_reached, f ? f->rulenum : -1);
|
||||
}
|
@ -46,17 +46,18 @@ __FBSDID("$FreeBSD$");
|
||||
#include <sys/syslog.h>
|
||||
#include <sys/ucred.h>
|
||||
|
||||
#define IPFW_INTERNAL /* Access to protected data structures in ip_fw.h. */
|
||||
|
||||
#include <netinet/libalias/alias.h>
|
||||
#include <netinet/libalias/alias_local.h>
|
||||
|
||||
#define IPFW_INTERNAL /* Access to protected data structures in ip_fw.h. */
|
||||
|
||||
#include <net/if.h>
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/ip.h>
|
||||
#include <netinet/ip_var.h>
|
||||
#include <netinet/ip_icmp.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/tcp.h>
|
||||
#include <netinet/tcp_timer.h>
|
||||
#include <netinet/tcp_var.h>
|
||||
@ -66,8 +67,6 @@ __FBSDID("$FreeBSD$");
|
||||
|
||||
#include <machine/in_cksum.h> /* XXX for in_cksum */
|
||||
|
||||
MALLOC_DECLARE(M_IPFW);
|
||||
|
||||
static VNET_DEFINE(eventhandler_tag, ifaddr_event_tag);
|
||||
#define V_ifaddr_event_tag VNET(ifaddr_event_tag)
|
||||
|
||||
@ -403,6 +402,23 @@ ipfw_nat(struct ip_fw_args *args, struct cfg_nat *t, struct mbuf *m)
|
||||
return (IP_FW_NAT);
|
||||
}
|
||||
|
||||
#define LOOKUP_NAT(head, i, p) do { \
|
||||
LIST_FOREACH((p), head, _next) { \
|
||||
if ((p)->id == (i)) { \
|
||||
break; \
|
||||
} \
|
||||
} \
|
||||
} while (0)
|
||||
|
||||
static struct cfg_nat *
|
||||
lookup_nat(struct nat_list *l, int nat_id)
|
||||
{
|
||||
struct cfg_nat *res;
|
||||
|
||||
LOOKUP_NAT(l, nat_id, res);
|
||||
return res;
|
||||
}
|
||||
|
||||
static int
|
||||
ipfw_nat_cfg(struct sockopt *sopt)
|
||||
{
|
||||
@ -418,7 +434,7 @@ ipfw_nat_cfg(struct sockopt *sopt)
|
||||
* Find/create nat rule.
|
||||
*/
|
||||
IPFW_WLOCK(&V_layer3_chain);
|
||||
LOOKUP_NAT(V_layer3_chain, ser_n->id, ptr);
|
||||
LOOKUP_NAT(&V_layer3_chain.nat, ser_n->id, ptr);
|
||||
if (ptr == NULL) {
|
||||
/* New rule: allocate and init new instance. */
|
||||
ptr = malloc(sizeof(struct cfg_nat),
|
||||
@ -481,7 +497,7 @@ ipfw_nat_del(struct sockopt *sopt)
|
||||
|
||||
sooptcopyin(sopt, &i, sizeof i, sizeof i);
|
||||
IPFW_WLOCK(&V_layer3_chain);
|
||||
LOOKUP_NAT(V_layer3_chain, i, ptr);
|
||||
LOOKUP_NAT(&V_layer3_chain.nat, i, ptr);
|
||||
if (ptr == NULL) {
|
||||
IPFW_WUNLOCK(&V_layer3_chain);
|
||||
return (EINVAL);
|
||||
@ -590,6 +606,7 @@ ipfw_nat_init(void)
|
||||
IPFW_WLOCK(&V_layer3_chain);
|
||||
/* init ipfw hooks */
|
||||
ipfw_nat_ptr = ipfw_nat;
|
||||
lookup_nat_ptr = lookup_nat;
|
||||
ipfw_nat_cfg_ptr = ipfw_nat_cfg;
|
||||
ipfw_nat_del_ptr = ipfw_nat_del;
|
||||
ipfw_nat_get_cfg_ptr = ipfw_nat_get_cfg;
|
||||
@ -621,6 +638,11 @@ ipfw_nat_destroy(void)
|
||||
}
|
||||
/* deregister ipfw_nat */
|
||||
ipfw_nat_ptr = NULL;
|
||||
lookup_nat_ptr = NULL;
|
||||
ipfw_nat_cfg_ptr = NULL;
|
||||
ipfw_nat_del_ptr = NULL;
|
||||
ipfw_nat_get_cfg_ptr = NULL;
|
||||
ipfw_nat_get_log_ptr = NULL;
|
||||
IPFW_WUNLOCK(&V_layer3_chain);
|
||||
}
|
||||
|
||||
|
@ -60,6 +60,7 @@ __FBSDID("$FreeBSD$");
|
||||
#include <netinet/ip.h>
|
||||
#include <netinet/ip_var.h>
|
||||
#include <netinet/ip_fw.h>
|
||||
#include <netinet/ipfw/ip_fw_private.h>
|
||||
#include <netinet/ip_divert.h>
|
||||
#include <netinet/ip_dummynet.h>
|
||||
|
||||
|
208
sys/netinet/ipfw/ip_fw_private.h
Normal file
208
sys/netinet/ipfw/ip_fw_private.h
Normal file
@ -0,0 +1,208 @@
|
||||
/*-
|
||||
* Copyright (c) 2002-2009 Luigi Rizzo, Universita` di Pisa
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef _IPFW2_PRIVATE_H
|
||||
#define _IPFW2_PRIVATE_H
|
||||
|
||||
/*
|
||||
* Internal constants and data structures used by ipfw components
|
||||
* and not meant to be exported outside the kernel.
|
||||
*/
|
||||
|
||||
#ifdef _KERNEL
|
||||
|
||||
#define MTAG_IPFW 1148380143 /* IPFW-tagged cookie */
|
||||
|
||||
/* Return values from ipfw_chk() */
|
||||
enum {
|
||||
IP_FW_PASS = 0,
|
||||
IP_FW_DENY,
|
||||
IP_FW_DIVERT,
|
||||
IP_FW_TEE,
|
||||
IP_FW_DUMMYNET,
|
||||
IP_FW_NETGRAPH,
|
||||
IP_FW_NGTEE,
|
||||
IP_FW_NAT,
|
||||
IP_FW_REASS,
|
||||
};
|
||||
|
||||
/* flags for divert mtag */
|
||||
#define IP_FW_DIVERT_LOOPBACK_FLAG 0x00080000
|
||||
#define IP_FW_DIVERT_OUTPUT_FLAG 0x00100000
|
||||
|
||||
/*
|
||||
* Structure for collecting parameters to dummynet for ip6_output forwarding
|
||||
*/
|
||||
struct _ip6dn_args {
|
||||
struct ip6_pktopts *opt_or;
|
||||
struct route_in6 ro_or;
|
||||
int flags_or;
|
||||
struct ip6_moptions *im6o_or;
|
||||
struct ifnet *origifp_or;
|
||||
struct ifnet *ifp_or;
|
||||
struct sockaddr_in6 dst_or;
|
||||
u_long mtu_or;
|
||||
struct route_in6 ro_pmtu_or;
|
||||
};
|
||||
|
||||
/*
|
||||
* Arguments for calling ipfw_chk() and dummynet_io(). We put them
|
||||
* all into a structure because this way it is easier and more
|
||||
* efficient to pass variables around and extend the interface.
|
||||
*/
|
||||
struct ip_fw_args {
|
||||
struct mbuf *m; /* the mbuf chain */
|
||||
struct ifnet *oif; /* output interface */
|
||||
struct sockaddr_in *next_hop; /* forward address */
|
||||
struct ip_fw *rule; /* matching rule */
|
||||
uint32_t rule_id; /* matching rule id */
|
||||
uint32_t chain_id; /* ruleset id */
|
||||
struct ether_header *eh; /* for bridged packets */
|
||||
|
||||
struct ipfw_flow_id f_id; /* grabbed from IP header */
|
||||
uint32_t cookie; /* a cookie depending on rule action */
|
||||
struct inpcb *inp;
|
||||
|
||||
struct _ip6dn_args dummypar; /* dummynet->ip6_output */
|
||||
struct sockaddr_in hopstore; /* store here if cannot use a pointer */
|
||||
};
|
||||
|
||||
MALLOC_DECLARE(M_IPFW);
|
||||
|
||||
/*
|
||||
* Function definitions.
|
||||
*/
|
||||
|
||||
/* Firewall hooks */
|
||||
|
||||
int ipfw_check_in(void *, struct mbuf **, struct ifnet *, int, struct inpcb *inp);
|
||||
int ipfw_check_out(void *, struct mbuf **, struct ifnet *, int, struct inpcb *inp);
|
||||
|
||||
int ipfw_chk(struct ip_fw_args *);
|
||||
|
||||
int ipfw_hook(void);
|
||||
int ipfw6_hook(void);
|
||||
int ipfw_unhook(void);
|
||||
int ipfw6_unhook(void);
|
||||
#ifdef NOTYET
|
||||
void ipfw_nat_destroy(void);
|
||||
#endif
|
||||
|
||||
/* In ip_fw_log.c */
|
||||
struct ip;
|
||||
void ipfw_log(struct ip_fw *f, u_int hlen, struct ip_fw_args *args,
|
||||
struct mbuf *m, struct ifnet *oif, u_short offset, uint32_t tablearg,
|
||||
struct ip *ip);
|
||||
VNET_DECLARE(u_int64_t, norule_counter);
|
||||
#define V_norule_counter VNET(norule_counter)
|
||||
VNET_DECLARE(int, verbose_limit);
|
||||
#define V_verbose_limit VNET(verbose_limit)
|
||||
|
||||
/* In ip_fw_dynamic.c */
|
||||
|
||||
enum { /* result for matching dynamic rules */
|
||||
MATCH_REVERSE = 0,
|
||||
MATCH_FORWARD,
|
||||
MATCH_NONE,
|
||||
MATCH_UNKNOWN,
|
||||
};
|
||||
|
||||
/*
|
||||
* The lock for dynamic rules is only used once outside the file,
|
||||
* and only to release the result of lookup_dyn_rule().
|
||||
* Eventually we may implement it with a callback on the function.
|
||||
*/
|
||||
void ipfw_dyn_unlock(void);
|
||||
|
||||
struct tcphdr;
|
||||
struct mbuf *send_pkt(struct mbuf *, struct ipfw_flow_id *,
|
||||
u_int32_t, u_int32_t, int);
|
||||
int install_state(struct ip_fw *rule, ipfw_insn_limit *cmd,
|
||||
struct ip_fw_args *args, uint32_t tablearg);
|
||||
ipfw_dyn_rule * lookup_dyn_rule_locked(struct ipfw_flow_id *pkt, int *match_direction,
|
||||
struct tcphdr *tcp);
|
||||
ipfw_dyn_rule * lookup_dyn_rule(struct ipfw_flow_id *pkt, int *match_direction,
|
||||
struct tcphdr *tcp);
|
||||
void remove_dyn_children(struct ip_fw *rule);
|
||||
void ipfw_get_dynamic(char **bp, const char *ep);
|
||||
|
||||
void ipfw_dyn_attach(void); /* uma_zcreate .... */
|
||||
void ipfw_dyn_detach(void); /* uma_zdestroy ... */
|
||||
void ipfw_dyn_init(void); /* per-vnet initialization */
|
||||
void ipfw_dyn_uninit(int); /* per-vnet deinitialization */
|
||||
int ipfw_dyn_len(void);
|
||||
|
||||
/* common variables */
|
||||
VNET_DECLARE(int, fw_one_pass);
|
||||
VNET_DECLARE(int, fw_enable);
|
||||
VNET_DECLARE(int, fw_verbose);
|
||||
VNET_DECLARE(struct ip_fw_chain, layer3_chain);
|
||||
|
||||
#define V_fw_one_pass VNET(fw_one_pass)
|
||||
#define V_fw_enable VNET(fw_enable)
|
||||
#define V_fw_verbose VNET(fw_enable)
|
||||
#define V_layer3_chain VNET(layer3_chain)
|
||||
|
||||
#ifdef INET6
|
||||
VNET_DECLARE(int, fw6_enable);
|
||||
#define V_fw6_enable VNET(fw6_enable)
|
||||
#endif
|
||||
|
||||
struct ip_fw_chain {
|
||||
struct ip_fw *rules; /* list of rules */
|
||||
struct ip_fw *reap; /* list of rules to reap */
|
||||
LIST_HEAD(nat_list, cfg_nat) nat; /* list of nat entries */
|
||||
struct radix_node_head *tables[IPFW_TABLES_MAX];
|
||||
struct rwlock rwmtx;
|
||||
uint32_t id; /* ruleset id */
|
||||
};
|
||||
|
||||
struct sockopt; /* used by tcp_var.h */
|
||||
|
||||
/*
|
||||
* The lock is heavily used by ip_fw2.c (the main file) and ip_fw_nat.c
|
||||
* so the variable and the macros must be here.
|
||||
*/
|
||||
|
||||
#define IPFW_LOCK_INIT(_chain) \
|
||||
rw_init(&(_chain)->rwmtx, "IPFW static rules")
|
||||
#define IPFW_LOCK_DESTROY(_chain) rw_destroy(&(_chain)->rwmtx)
|
||||
#define IPFW_WLOCK_ASSERT(_chain) rw_assert(&(_chain)->rwmtx, RA_WLOCKED)
|
||||
|
||||
#define IPFW_RLOCK(p) rw_rlock(&(p)->rwmtx)
|
||||
#define IPFW_RUNLOCK(p) rw_runlock(&(p)->rwmtx)
|
||||
#define IPFW_WLOCK(p) rw_wlock(&(p)->rwmtx)
|
||||
#define IPFW_WUNLOCK(p) rw_wunlock(&(p)->rwmtx)
|
||||
|
||||
/* In ip_fw_nat.c */
|
||||
extern struct cfg_nat *(*lookup_nat_ptr)(struct nat_list *, int);
|
||||
|
||||
typedef int ipfw_nat_t(struct ip_fw_args *, struct cfg_nat *, struct mbuf *);
|
||||
typedef int ipfw_nat_cfg_t(struct sockopt *);
|
||||
|
||||
#endif /* _KERNEL */
|
||||
#endif /* _IPFW2_PRIVATE_H */
|
Loading…
x
Reference in New Issue
Block a user