diff options
author | Arturo Borrero <arturo.borrero.glez@gmail.com> | 2014-10-16 06:23:29 -0400 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2014-10-27 17:47:06 -0400 |
commit | 8b13eddfdf04cbfa561725cfc42d6868fe896f56 (patch) | |
tree | a54fcd289d9acb1566a841f66045127227c84d25 | |
parent | b8901ac319768cdd3afa060787503e0c405f9607 (diff) |
netfilter: refactor NAT redirect IPv4 to use it from nf_tables
This patch refactors the IPv4 code so it can be usable both from xt and
nf_tables.
A similar patch follows-up to handle IPv6.
Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
-rw-r--r-- | include/net/netfilter/ipv4/nf_nat_redirect.h | 9 | ||||
-rw-r--r-- | net/ipv4/netfilter/Kconfig | 6 | ||||
-rw-r--r-- | net/ipv4/netfilter/Makefile | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_redirect_ipv4.c | 82 | ||||
-rw-r--r-- | net/netfilter/Kconfig | 1 | ||||
-rw-r--r-- | net/netfilter/xt_REDIRECT.c | 44 |
6 files changed, 101 insertions, 42 deletions
diff --git a/include/net/netfilter/ipv4/nf_nat_redirect.h b/include/net/netfilter/ipv4/nf_nat_redirect.h new file mode 100644 index 000000000000..19e1df3a0a4d --- /dev/null +++ b/include/net/netfilter/ipv4/nf_nat_redirect.h | |||
@@ -0,0 +1,9 @@ | |||
1 | #ifndef _NF_NAT_REDIRECT_IPV4_H_ | ||
2 | #define _NF_NAT_REDIRECT_IPV4_H_ | ||
3 | |||
4 | unsigned int | ||
5 | nf_nat_redirect_ipv4(struct sk_buff *skb, | ||
6 | const struct nf_nat_ipv4_multi_range_compat *mr, | ||
7 | unsigned int hooknum); | ||
8 | |||
9 | #endif /* _NF_NAT_REDIRECT_IPV4_H_ */ | ||
diff --git a/net/ipv4/netfilter/Kconfig b/net/ipv4/netfilter/Kconfig index 4c019d5c3f57..a300e2c32b26 100644 --- a/net/ipv4/netfilter/Kconfig +++ b/net/ipv4/netfilter/Kconfig | |||
@@ -104,6 +104,12 @@ config NF_NAT_MASQUERADE_IPV4 | |||
104 | This is the kernel functionality to provide NAT in the masquerade | 104 | This is the kernel functionality to provide NAT in the masquerade |
105 | flavour (automatic source address selection). | 105 | flavour (automatic source address selection). |
106 | 106 | ||
107 | config NF_NAT_REDIRECT_IPV4 | ||
108 | tristate "IPv4 redirect support" | ||
109 | help | ||
110 | This is the kernel functionality to provide NAT in the redirect | ||
111 | flavour (redirect packets to local machine). | ||
112 | |||
107 | config NFT_MASQ_IPV4 | 113 | config NFT_MASQ_IPV4 |
108 | tristate "IPv4 masquerading support for nf_tables" | 114 | tristate "IPv4 masquerading support for nf_tables" |
109 | depends on NF_TABLES_IPV4 | 115 | depends on NF_TABLES_IPV4 |
diff --git a/net/ipv4/netfilter/Makefile b/net/ipv4/netfilter/Makefile index f4cef5af0969..34e436c92015 100644 --- a/net/ipv4/netfilter/Makefile +++ b/net/ipv4/netfilter/Makefile | |||
@@ -31,6 +31,7 @@ obj-$(CONFIG_NF_NAT_H323) += nf_nat_h323.o | |||
31 | obj-$(CONFIG_NF_NAT_PPTP) += nf_nat_pptp.o | 31 | obj-$(CONFIG_NF_NAT_PPTP) += nf_nat_pptp.o |
32 | obj-$(CONFIG_NF_NAT_SNMP_BASIC) += nf_nat_snmp_basic.o | 32 | obj-$(CONFIG_NF_NAT_SNMP_BASIC) += nf_nat_snmp_basic.o |
33 | obj-$(CONFIG_NF_NAT_MASQUERADE_IPV4) += nf_nat_masquerade_ipv4.o | 33 | obj-$(CONFIG_NF_NAT_MASQUERADE_IPV4) += nf_nat_masquerade_ipv4.o |
34 | obj-$(CONFIG_NF_NAT_REDIRECT_IPV4) += nf_nat_redirect_ipv4.o | ||
34 | 35 | ||
35 | # NAT protocols (nf_nat) | 36 | # NAT protocols (nf_nat) |
36 | obj-$(CONFIG_NF_NAT_PROTO_GRE) += nf_nat_proto_gre.o | 37 | obj-$(CONFIG_NF_NAT_PROTO_GRE) += nf_nat_proto_gre.o |
diff --git a/net/ipv4/netfilter/nf_nat_redirect_ipv4.c b/net/ipv4/netfilter/nf_nat_redirect_ipv4.c new file mode 100644 index 000000000000..a220552fc532 --- /dev/null +++ b/net/ipv4/netfilter/nf_nat_redirect_ipv4.c | |||
@@ -0,0 +1,82 @@ | |||
1 | /* | ||
2 | * (C) 1999-2001 Paul `Rusty' Russell | ||
3 | * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org> | ||
4 | * Copyright (c) 2011 Patrick McHardy <kaber@trash.net> | ||
5 | * | ||
6 | * This program is free software; you can redistribute it and/or modify | ||
7 | * it under the terms of the GNU General Public License version 2 as | ||
8 | * published by the Free Software Foundation. | ||
9 | * | ||
10 | * Based on Rusty Russell's IPv4 REDIRECT target. Development of IPv6 | ||
11 | * NAT funded by Astaro. | ||
12 | */ | ||
13 | |||
14 | #include <linux/if.h> | ||
15 | #include <linux/inetdevice.h> | ||
16 | #include <linux/ip.h> | ||
17 | #include <linux/kernel.h> | ||
18 | #include <linux/module.h> | ||
19 | #include <linux/netdevice.h> | ||
20 | #include <linux/netfilter.h> | ||
21 | #include <linux/types.h> | ||
22 | #include <linux/netfilter_ipv4.h> | ||
23 | #include <linux/netfilter/x_tables.h> | ||
24 | #include <net/addrconf.h> | ||
25 | #include <net/checksum.h> | ||
26 | #include <net/protocol.h> | ||
27 | #include <net/netfilter/nf_nat.h> | ||
28 | #include <net/netfilter/ipv4/nf_nat_redirect.h> | ||
29 | |||
30 | unsigned int | ||
31 | nf_nat_redirect_ipv4(struct sk_buff *skb, | ||
32 | const struct nf_nat_ipv4_multi_range_compat *mr, | ||
33 | unsigned int hooknum) | ||
34 | { | ||
35 | struct nf_conn *ct; | ||
36 | enum ip_conntrack_info ctinfo; | ||
37 | __be32 newdst; | ||
38 | struct nf_nat_range newrange; | ||
39 | |||
40 | NF_CT_ASSERT(hooknum == NF_INET_PRE_ROUTING || | ||
41 | hooknum == NF_INET_LOCAL_OUT); | ||
42 | |||
43 | ct = nf_ct_get(skb, &ctinfo); | ||
44 | NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED)); | ||
45 | |||
46 | /* Local packets: make them go to loopback */ | ||
47 | if (hooknum == NF_INET_LOCAL_OUT) { | ||
48 | newdst = htonl(0x7F000001); | ||
49 | } else { | ||
50 | struct in_device *indev; | ||
51 | struct in_ifaddr *ifa; | ||
52 | |||
53 | newdst = 0; | ||
54 | |||
55 | rcu_read_lock(); | ||
56 | indev = __in_dev_get_rcu(skb->dev); | ||
57 | if (indev != NULL) { | ||
58 | ifa = indev->ifa_list; | ||
59 | newdst = ifa->ifa_local; | ||
60 | } | ||
61 | rcu_read_unlock(); | ||
62 | |||
63 | if (!newdst) | ||
64 | return NF_DROP; | ||
65 | } | ||
66 | |||
67 | /* Transfer from original range. */ | ||
68 | memset(&newrange.min_addr, 0, sizeof(newrange.min_addr)); | ||
69 | memset(&newrange.max_addr, 0, sizeof(newrange.max_addr)); | ||
70 | newrange.flags = mr->range[0].flags | NF_NAT_RANGE_MAP_IPS; | ||
71 | newrange.min_addr.ip = newdst; | ||
72 | newrange.max_addr.ip = newdst; | ||
73 | newrange.min_proto = mr->range[0].min; | ||
74 | newrange.max_proto = mr->range[0].max; | ||
75 | |||
76 | /* Hand modified range to generic setup. */ | ||
77 | return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_DST); | ||
78 | } | ||
79 | EXPORT_SYMBOL_GPL(nf_nat_redirect_ipv4); | ||
80 | |||
81 | MODULE_LICENSE("GPL"); | ||
82 | MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>"); | ||
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index ae5096ab65eb..a0716a3f08b0 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig | |||
@@ -835,6 +835,7 @@ config NETFILTER_XT_TARGET_RATEEST | |||
835 | config NETFILTER_XT_TARGET_REDIRECT | 835 | config NETFILTER_XT_TARGET_REDIRECT |
836 | tristate "REDIRECT target support" | 836 | tristate "REDIRECT target support" |
837 | depends on NF_NAT | 837 | depends on NF_NAT |
838 | select NF_NAT_REDIRECT_IPV4 | ||
838 | ---help--- | 839 | ---help--- |
839 | REDIRECT is a special case of NAT: all incoming connections are | 840 | REDIRECT is a special case of NAT: all incoming connections are |
840 | mapped onto the incoming interface's address, causing the packets to | 841 | mapped onto the incoming interface's address, causing the packets to |
diff --git a/net/netfilter/xt_REDIRECT.c b/net/netfilter/xt_REDIRECT.c index 22a10309297c..b4ffac5fe8e9 100644 --- a/net/netfilter/xt_REDIRECT.c +++ b/net/netfilter/xt_REDIRECT.c | |||
@@ -26,6 +26,7 @@ | |||
26 | #include <net/checksum.h> | 26 | #include <net/checksum.h> |
27 | #include <net/protocol.h> | 27 | #include <net/protocol.h> |
28 | #include <net/netfilter/nf_nat.h> | 28 | #include <net/netfilter/nf_nat.h> |
29 | #include <net/netfilter/ipv4/nf_nat_redirect.h> | ||
29 | 30 | ||
30 | static const struct in6_addr loopback_addr = IN6ADDR_LOOPBACK_INIT; | 31 | static const struct in6_addr loopback_addr = IN6ADDR_LOOPBACK_INIT; |
31 | 32 | ||
@@ -98,48 +99,7 @@ static int redirect_tg4_check(const struct xt_tgchk_param *par) | |||
98 | static unsigned int | 99 | static unsigned int |
99 | redirect_tg4(struct sk_buff *skb, const struct xt_action_param *par) | 100 | redirect_tg4(struct sk_buff *skb, const struct xt_action_param *par) |
100 | { | 101 | { |
101 | struct nf_conn *ct; | 102 | return nf_nat_redirect_ipv4(skb, par->targinfo, par->hooknum); |
102 | enum ip_conntrack_info ctinfo; | ||
103 | __be32 newdst; | ||
104 | const struct nf_nat_ipv4_multi_range_compat *mr = par->targinfo; | ||
105 | struct nf_nat_range newrange; | ||
106 | |||
107 | NF_CT_ASSERT(par->hooknum == NF_INET_PRE_ROUTING || | ||
108 | par->hooknum == NF_INET_LOCAL_OUT); | ||
109 | |||
110 | ct = nf_ct_get(skb, &ctinfo); | ||
111 | NF_CT_ASSERT(ct && (ctinfo == IP_CT_NEW || ctinfo == IP_CT_RELATED)); | ||
112 | |||
113 | /* Local packets: make them go to loopback */ | ||
114 | if (par->hooknum == NF_INET_LOCAL_OUT) | ||
115 | newdst = htonl(0x7F000001); | ||
116 | else { | ||
117 | struct in_device *indev; | ||
118 | struct in_ifaddr *ifa; | ||
119 | |||
120 | newdst = 0; | ||
121 | |||
122 | rcu_read_lock(); | ||
123 | indev = __in_dev_get_rcu(skb->dev); | ||
124 | if (indev && (ifa = indev->ifa_list)) | ||
125 | newdst = ifa->ifa_local; | ||
126 | rcu_read_unlock(); | ||
127 | |||
128 | if (!newdst) | ||
129 | return NF_DROP; | ||
130 | } | ||
131 | |||
132 | /* Transfer from original range. */ | ||
133 | memset(&newrange.min_addr, 0, sizeof(newrange.min_addr)); | ||
134 | memset(&newrange.max_addr, 0, sizeof(newrange.max_addr)); | ||
135 | newrange.flags = mr->range[0].flags | NF_NAT_RANGE_MAP_IPS; | ||
136 | newrange.min_addr.ip = newdst; | ||
137 | newrange.max_addr.ip = newdst; | ||
138 | newrange.min_proto = mr->range[0].min; | ||
139 | newrange.max_proto = mr->range[0].max; | ||
140 | |||
141 | /* Hand modified range to generic setup. */ | ||
142 | return nf_nat_setup_info(ct, &newrange, NF_NAT_MANIP_DST); | ||
143 | } | 103 | } |
144 | 104 | ||
145 | static struct xt_target redirect_tg_reg[] __read_mostly = { | 105 | static struct xt_target redirect_tg_reg[] __read_mostly = { |