From: Patrick McHardy <kaber@trash.net>
To: KOVACS Krisztian <hidden@balabit.hu>
Cc: netfilter-devel@lists.netfilter.org, netdev@vger.kernel.org
Subject: Re: [PATCH/RFC 09/10] iptables TPROXY target
Date: Wed, 10 Jan 2007 13:45:12 +0100 [thread overview]
Message-ID: <45A4DFD8.3050008@trash.net> (raw)
In-Reply-To: <20070103163828.14635.74153.stgit@nienna.balabit>
KOVACS Krisztian wrote:
> diff --git a/net/ipv4/netfilter/ipt_TPROXY.c b/net/ipv4/netfilter/ipt_TPROXY.c
> new file mode 100644
> index 0000000..6f64717
> --- /dev/null
> +++ b/net/ipv4/netfilter/ipt_TPROXY.c
> +static unsigned int
> +target(struct sk_buff **pskb,
> + const struct net_device *in,
> + const struct net_device *out,
> + unsigned int hooknum,
> + const struct xt_target *target,
> + const void *targinfo)
> +{
> + const struct iphdr *iph = (*pskb)->nh.iph;
> + unsigned int verdict = NF_ACCEPT;
> + struct sk_buff *skb = *pskb;
> + struct udphdr _hdr, *hp;
> + struct sock *sk;
> +
> + /* TCP/UDP only */
> + if ((iph->protocol != IPPROTO_TCP) &&
> + (iph->protocol != IPPROTO_UDP))
> + return NF_ACCEPT;
> +
> + if (in == NULL)
> + return NF_ACCEPT;
> +
> + if ((skb->dst != NULL) || (skb->ip_tproxy == 1))
> + return NF_ACCEPT;
> +
> + hp = skb_header_pointer(*pskb, iph->ihl * 4, sizeof(_hdr), &_hdr);
> + if (hp == NULL)
> + return NF_DROP;
> +
> + sk = ip_tproxy_get_sock(iph->protocol,
> + iph->saddr, iph->daddr,
> + hp->source, hp->dest, in);
> + if (sk != NULL) {
> + if (ip_tproxy_do_divert(skb, sk, 0, in) < 0)
> + verdict = NF_DROP;
> + sock_put(sk);
Missing time wait socket handling.
> + }
> +
> + return verdict;
> +}
> +
> +static int
> +checkentry(const char *tablename,
> + const void *e,
> + const struct xt_target *target,
> + void *targinfo,
> + unsigned int hook_mask)
> +{
> + /* checks are now done by the x_tables core based on
> + * information specified in the ipt_target structure */
> + return 1;
> +}
The function is optional, you can simply delete it.
> +
> +static struct ipt_target ipt_tproxy_reg = {
> + .name = "TPROXY",
> + .target = target,
> + .targetsize = sizeof(struct ipt_tproxy_target_info),
> + .table = "tproxy",
> + .checkentry = checkentry,
> + .me = THIS_MODULE,
> +};
> +
> +static int __init init(void)
> +{
> + if (ipt_register_target(&ipt_tproxy_reg))
> + return -EINVAL;
This should return the result of ipt_register_target.
next prev parent reply other threads:[~2007-01-10 12:45 UTC|newest]
Thread overview: 47+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-01-03 16:33 [PATCH/RFC 00/10] Transparent proxying patches version 4 KOVACS Krisztian
2007-01-03 16:34 ` [PATCH/RFC 01/10] Implement local diversion of IPv4 skbs KOVACS Krisztian
2007-01-10 6:46 ` Patrick McHardy
2007-01-10 9:31 ` Balazs Scheidler
2007-01-10 12:32 ` Patrick McHardy
2007-01-10 13:27 ` Ingo Oeser
2007-01-10 13:42 ` Patrick McHardy
2007-01-11 14:05 ` KOVACS Krisztian
2007-01-10 10:17 ` KOVACS Krisztian
2007-01-10 12:19 ` Patrick McHardy
2007-01-16 12:49 ` KOVACS Krisztian
2007-01-16 13:19 ` Patrick McHardy
2007-01-03 16:34 ` [PATCH/RFC 02/10] Port redirection support for TCP KOVACS Krisztian
2007-01-03 16:35 ` [PATCH/RFC 03/10] Don't do the TCP socket lookup if we already have one attached KOVACS Krisztian
2007-01-03 16:35 ` [PATCH/RFC 04/10] Don't do the UDP " KOVACS Krisztian
2007-01-03 16:36 ` [PATCH/RFC 05/10] Remove local address check on IP output KOVACS Krisztian
2007-01-10 6:47 ` Patrick McHardy
2007-01-10 10:01 ` KOVACS Krisztian
2007-02-06 14:36 ` IP_FREEBIND and CAP_NET_ADMIN (was: Re: [PATCH/RFC 05/10] Remove local address check on IP output) KOVACS Krisztian
2007-02-06 19:46 ` IP_FREEBIND and CAP_NET_ADMIN David Miller
2007-02-06 20:53 ` [PATCH] tg3 : avoid an expensive divide Eric Dumazet
2007-02-06 21:19 ` David Miller
2007-02-06 22:09 ` Michael Chan
2007-02-06 21:27 ` David Miller
2007-02-07 9:54 ` Andi Kleen
2007-02-07 9:45 ` David Miller
2007-02-07 9:56 ` Eric Dumazet
2007-02-07 10:27 ` Andi Kleen
2007-02-06 22:05 ` Michael Chan
2007-02-06 21:25 ` David Miller
2007-02-06 21:35 ` Eric Dumazet
2007-02-06 22:17 ` David Miller
2007-01-03 16:36 ` [PATCH/RFC 06/10] Create a tproxy flag in struct sk_buff KOVACS Krisztian
2007-01-03 16:37 ` [PATCH/RFC 07/10] Export UDP socket lookup function KOVACS Krisztian
2007-01-03 16:37 ` [PATCH/RFC 08/10] iptables tproxy table KOVACS Krisztian
2007-01-10 12:40 ` Patrick McHardy
2007-01-03 16:38 ` [PATCH/RFC 09/10] iptables TPROXY target KOVACS Krisztian
2007-01-10 12:45 ` Patrick McHardy [this message]
2007-01-03 16:38 ` [PATCH/RFC 10/10] iptables tproxy match KOVACS Krisztian
2007-01-03 17:23 ` [PATCH/RFC 00/10] Transparent proxying patches version 4 Evgeniy Polyakov
2007-01-08 20:30 ` KOVACS Krisztian
2007-01-03 19:33 ` Lennert Buytenhek
2007-01-04 12:13 ` KOVACS Krisztian
2007-01-04 12:16 ` Lennert Buytenhek
2007-01-07 14:11 ` Harald Welte
2007-01-07 16:11 ` Lennert Buytenhek
2007-01-07 23:58 ` Harald Welte
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=45A4DFD8.3050008@trash.net \
--to=kaber@trash.net \
--cc=hidden@balabit.hu \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@lists.netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).