diff options
author | Yasuyuki Kozakai <yasuyuki.kozakai@toshiba.co.jp> | 2006-04-01 05:22:30 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2006-04-01 05:22:30 -0500 |
commit | dc5ab2faece3b7473931357db7f63f596678481d (patch) | |
tree | d1e5fd3e805e7d2c4136459cca17d5f8ed44bfb6 /net/netfilter | |
parent | 9606a21635cec077e1928273751b44ecc824a49d (diff) |
[NETFILTER]: x_tables: unify IPv4/IPv6 esp match
This unifies ipt_esp and ip6t_esp to xt_esp. Please note that now
a user program needs to specify IPPROTO_ESP as protocol to use esp match
with IPv6. This means that ip6tables requires '-p esp' like iptables.
Signed-off-by: Yasuyuki Kozakai <yasuyuki.kozakai@toshiba.co.jp>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/netfilter')
-rw-r--r-- | net/netfilter/Kconfig | 9 | ||||
-rw-r--r-- | net/netfilter/Makefile | 1 | ||||
-rw-r--r-- | net/netfilter/xt_esp.c | 136 |
3 files changed, 146 insertions, 0 deletions
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index 332acb37b385..5fe51894b120 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig | |||
@@ -231,6 +231,15 @@ config NETFILTER_XT_MATCH_DCCP | |||
231 | If you want to compile it as a module, say M here and read | 231 | If you want to compile it as a module, say M here and read |
232 | <file:Documentation/modules.txt>. If unsure, say `N'. | 232 | <file:Documentation/modules.txt>. If unsure, say `N'. |
233 | 233 | ||
234 | config NETFILTER_XT_MATCH_ESP | ||
235 | tristate '"ESP" match support' | ||
236 | depends on NETFILTER_XTABLES | ||
237 | help | ||
238 | This match extension allows you to match a range of SPIs | ||
239 | inside ESP header of IPSec packets. | ||
240 | |||
241 | To compile it as a module, choose M here. If unsure, say N. | ||
242 | |||
234 | config NETFILTER_XT_MATCH_HELPER | 243 | config NETFILTER_XT_MATCH_HELPER |
235 | tristate '"helper" match support' | 244 | tristate '"helper" match support' |
236 | depends on NETFILTER_XTABLES | 245 | depends on NETFILTER_XTABLES |
diff --git a/net/netfilter/Makefile b/net/netfilter/Makefile index 9558727f5e79..8f02486101ab 100644 --- a/net/netfilter/Makefile +++ b/net/netfilter/Makefile | |||
@@ -35,6 +35,7 @@ obj-$(CONFIG_NETFILTER_XT_MATCH_CONNBYTES) += xt_connbytes.o | |||
35 | obj-$(CONFIG_NETFILTER_XT_MATCH_CONNMARK) += xt_connmark.o | 35 | obj-$(CONFIG_NETFILTER_XT_MATCH_CONNMARK) += xt_connmark.o |
36 | obj-$(CONFIG_NETFILTER_XT_MATCH_CONNTRACK) += xt_conntrack.o | 36 | obj-$(CONFIG_NETFILTER_XT_MATCH_CONNTRACK) += xt_conntrack.o |
37 | obj-$(CONFIG_NETFILTER_XT_MATCH_DCCP) += xt_dccp.o | 37 | obj-$(CONFIG_NETFILTER_XT_MATCH_DCCP) += xt_dccp.o |
38 | obj-$(CONFIG_NETFILTER_XT_MATCH_ESP) += xt_esp.o | ||
38 | obj-$(CONFIG_NETFILTER_XT_MATCH_HELPER) += xt_helper.o | 39 | obj-$(CONFIG_NETFILTER_XT_MATCH_HELPER) += xt_helper.o |
39 | obj-$(CONFIG_NETFILTER_XT_MATCH_LENGTH) += xt_length.o | 40 | obj-$(CONFIG_NETFILTER_XT_MATCH_LENGTH) += xt_length.o |
40 | obj-$(CONFIG_NETFILTER_XT_MATCH_LIMIT) += xt_limit.o | 41 | obj-$(CONFIG_NETFILTER_XT_MATCH_LIMIT) += xt_limit.o |
diff --git a/net/netfilter/xt_esp.c b/net/netfilter/xt_esp.c new file mode 100644 index 000000000000..9dad6281e0c1 --- /dev/null +++ b/net/netfilter/xt_esp.c | |||
@@ -0,0 +1,136 @@ | |||
1 | /* Kernel module to match ESP parameters. */ | ||
2 | |||
3 | /* (C) 1999-2000 Yon Uriarte <yon@astaro.de> | ||
4 | * | ||
5 | * This program is free software; you can redistribute it and/or modify | ||
6 | * it under the terms of the GNU General Public License version 2 as | ||
7 | * published by the Free Software Foundation. | ||
8 | */ | ||
9 | |||
10 | #include <linux/module.h> | ||
11 | #include <linux/skbuff.h> | ||
12 | #include <linux/in.h> | ||
13 | #include <linux/ip.h> | ||
14 | |||
15 | #include <linux/netfilter/xt_esp.h> | ||
16 | #include <linux/netfilter/x_tables.h> | ||
17 | |||
18 | #include <linux/netfilter_ipv4/ip_tables.h> | ||
19 | #include <linux/netfilter_ipv6/ip6_tables.h> | ||
20 | |||
21 | MODULE_LICENSE("GPL"); | ||
22 | MODULE_AUTHOR("Yon Uriarte <yon@astaro.de>"); | ||
23 | MODULE_DESCRIPTION("x_tables ESP SPI match module"); | ||
24 | MODULE_ALIAS("ipt_esp"); | ||
25 | MODULE_ALIAS("ip6t_esp"); | ||
26 | |||
27 | #if 0 | ||
28 | #define duprintf(format, args...) printk(format , ## args) | ||
29 | #else | ||
30 | #define duprintf(format, args...) | ||
31 | #endif | ||
32 | |||
33 | /* Returns 1 if the spi is matched by the range, 0 otherwise */ | ||
34 | static inline int | ||
35 | spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, int invert) | ||
36 | { | ||
37 | int r = 0; | ||
38 | duprintf("esp spi_match:%c 0x%x <= 0x%x <= 0x%x", invert ? '!' : ' ', | ||
39 | min, spi, max); | ||
40 | r = (spi >= min && spi <= max) ^ invert; | ||
41 | duprintf(" result %s\n", r ? "PASS" : "FAILED"); | ||
42 | return r; | ||
43 | } | ||
44 | |||
45 | static int | ||
46 | match(const struct sk_buff *skb, | ||
47 | const struct net_device *in, | ||
48 | const struct net_device *out, | ||
49 | const struct xt_match *match, | ||
50 | const void *matchinfo, | ||
51 | int offset, | ||
52 | unsigned int protoff, | ||
53 | int *hotdrop) | ||
54 | { | ||
55 | struct ip_esp_hdr _esp, *eh; | ||
56 | const struct xt_esp *espinfo = matchinfo; | ||
57 | |||
58 | /* Must not be a fragment. */ | ||
59 | if (offset) | ||
60 | return 0; | ||
61 | |||
62 | eh = skb_header_pointer(skb, protoff, sizeof(_esp), &_esp); | ||
63 | if (eh == NULL) { | ||
64 | /* We've been asked to examine this packet, and we | ||
65 | * can't. Hence, no choice but to drop. | ||
66 | */ | ||
67 | duprintf("Dropping evil ESP tinygram.\n"); | ||
68 | *hotdrop = 1; | ||
69 | return 0; | ||
70 | } | ||
71 | |||
72 | return spi_match(espinfo->spis[0], espinfo->spis[1], ntohl(eh->spi), | ||
73 | !!(espinfo->invflags & XT_ESP_INV_SPI)); | ||
74 | } | ||
75 | |||
76 | /* Called when user tries to insert an entry of this type. */ | ||
77 | static int | ||
78 | checkentry(const char *tablename, | ||
79 | const void *ip_void, | ||
80 | const struct xt_match *match, | ||
81 | void *matchinfo, | ||
82 | unsigned int matchinfosize, | ||
83 | unsigned int hook_mask) | ||
84 | { | ||
85 | const struct xt_esp *espinfo = matchinfo; | ||
86 | |||
87 | if (espinfo->invflags & ~XT_ESP_INV_MASK) { | ||
88 | duprintf("xt_esp: unknown flags %X\n", espinfo->invflags); | ||
89 | return 0; | ||
90 | } | ||
91 | |||
92 | return 1; | ||
93 | } | ||
94 | |||
95 | static struct xt_match esp_match = { | ||
96 | .name = "esp", | ||
97 | .family = AF_INET, | ||
98 | .proto = IPPROTO_ESP, | ||
99 | .match = &match, | ||
100 | .matchsize = sizeof(struct xt_esp), | ||
101 | .checkentry = &checkentry, | ||
102 | .me = THIS_MODULE, | ||
103 | }; | ||
104 | |||
105 | static struct xt_match esp6_match = { | ||
106 | .name = "esp", | ||
107 | .family = AF_INET6, | ||
108 | .proto = IPPROTO_ESP, | ||
109 | .match = &match, | ||
110 | .matchsize = sizeof(struct xt_esp), | ||
111 | .checkentry = &checkentry, | ||
112 | .me = THIS_MODULE, | ||
113 | }; | ||
114 | |||
115 | static int __init xt_esp_init(void) | ||
116 | { | ||
117 | int ret; | ||
118 | ret = xt_register_match(&esp_match); | ||
119 | if (ret) | ||
120 | return ret; | ||
121 | |||
122 | ret = xt_register_match(&esp6_match); | ||
123 | if (ret) | ||
124 | xt_unregister_match(&esp_match); | ||
125 | |||
126 | return ret; | ||
127 | } | ||
128 | |||
129 | static void __exit xt_esp_cleanup(void) | ||
130 | { | ||
131 | xt_unregister_match(&esp_match); | ||
132 | xt_unregister_match(&esp6_match); | ||
133 | } | ||
134 | |||
135 | module_init(xt_esp_init); | ||
136 | module_exit(xt_esp_cleanup); | ||