* [resend 2.6.30-rc4] Added 'transparent' option to socket match
@ 2009-05-08 7:47 Laszlo Attila Toth
2009-05-08 7:47 ` [resend iptables] new revision of socket match to check IP_TRANSPARENT Laszlo Attila Toth
0 siblings, 1 reply; 2+ messages in thread
From: Laszlo Attila Toth @ 2009-05-08 7:47 UTC (permalink / raw)
To: Patrick McHardy, netfilter-devel; +Cc: Laszlo Attila Toth
Added new revision of the 'socket' match, that can check for
the IP_TRANSPARENT socket option.
If the matchinfo's 'transparent' member is set, matching sockets have to enable
the IP_TRANSPARENT socket option.
Signed-off-by: Laszlo Attila Toth <panther@balabit.hu>
---
include/linux/netfilter/xt_socket.h | 8 +++++
net/netfilter/xt_socket.c | 56 +++++++++++++++++++++++++++++-----
2 files changed, 55 insertions(+), 9 deletions(-)
create mode 100644 include/linux/netfilter/xt_socket.h
diff --git a/include/linux/netfilter/xt_socket.h b/include/linux/netfilter/xt_socket.h
new file mode 100644
index 0000000..2222d63
--- /dev/null
+++ b/include/linux/netfilter/xt_socket.h
@@ -0,0 +1,8 @@
+#ifndef _XT_SOCKET_H_match
+#define _XT_SOCKET_H_match
+
+struct xt_socket_match_info {
+ __u8 transparent:1;
+};
+
+#endif /* _XT_SOCKET_H_match */
diff --git a/net/netfilter/xt_socket.c b/net/netfilter/xt_socket.c
index 1acc089..6938033 100644
--- a/net/netfilter/xt_socket.c
+++ b/net/netfilter/xt_socket.c
@@ -22,6 +22,8 @@
#include <net/netfilter/nf_tproxy_core.h>
#include <net/netfilter/ipv4/nf_defrag_ipv4.h>
+#include <linux/netfilter/xt_socket.h>
+
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
#define XT_SOCKET_HAVE_CONNTRACK 1
#include <net/netfilter/nf_conntrack.h>
@@ -86,7 +88,8 @@ extract_icmp_fields(const struct sk_buff *skb,
static bool
-socket_mt(const struct sk_buff *skb, const struct xt_match_param *par)
+socket_match(const struct sk_buff *skb, const struct xt_match_param *par,
+ bool check_transparent)
{
const struct iphdr *iph = ip_hdr(skb);
struct udphdr _hdr, *hp = NULL;
@@ -142,10 +145,22 @@ socket_mt(const struct sk_buff *skb, const struct xt_match_param *par)
saddr, daddr, sport, dport, par->in, false);
if (sk != NULL) {
bool wildcard = (sk->sk_state != TCP_TIME_WAIT && inet_sk(sk)->rcv_saddr == 0);
+ bool transparent = (sk->sk_state != TCP_TIME_WAIT &&
+ inet_sk(sk)->transparent) ||
+ (sk->sk_state == TCP_TIME_WAIT &&
+ inet_twsk(sk)->tw_transparent);
+ const struct xt_socket_match_info *info;
+
+ if (check_transparent);
+ info = par->matchinfo;
nf_tproxy_put_sock(sk);
+
if (wildcard)
sk = NULL;
+ else if (check_transparent && info->transparent &&
+ !transparent)
+ sk = NULL;
}
pr_debug("socket match: proto %u %08x:%u -> %08x:%u "
@@ -157,23 +172,46 @@ socket_mt(const struct sk_buff *skb, const struct xt_match_param *par)
return (sk != NULL);
}
-static struct xt_match socket_mt_reg __read_mostly = {
- .name = "socket",
- .family = AF_INET,
- .match = socket_mt,
- .hooks = 1 << NF_INET_PRE_ROUTING,
- .me = THIS_MODULE,
+static bool
+socket_mt_v0(const struct sk_buff *skb, const struct xt_match_param *par)
+{
+ return socket_match(skb, par, false);
+}
+
+static bool
+socket_mt_v1(const struct sk_buff *skb, const struct xt_match_param *par)
+{
+ return socket_match(skb, par, true);
+}
+
+static struct xt_match socket_mt_reg[] __read_mostly = {
+ {
+ .name = "socket",
+ .family = AF_INET,
+ .match = socket_mt_v0,
+ .hooks = 1 << NF_INET_PRE_ROUTING,
+ .me = THIS_MODULE,
+ },
+ {
+ .name = "socket",
+ .family = AF_INET,
+ .match = socket_mt_v1,
+ .matchsize = sizeof(struct xt_socket_match_info),
+ .hooks = 1 << NF_INET_PRE_ROUTING,
+ .me = THIS_MODULE,
+ .revision = 1,
+ },
};
static int __init socket_mt_init(void)
{
nf_defrag_ipv4_enable();
- return xt_register_match(&socket_mt_reg);
+ return xt_register_matches(socket_mt_reg, ARRAY_SIZE(socket_mt_reg));
}
static void __exit socket_mt_exit(void)
{
- xt_unregister_match(&socket_mt_reg);
+ xt_unregister_matches(socket_mt_reg, ARRAY_SIZE(socket_mt_reg));
}
module_init(socket_mt_init);
--
1.6.2.2.404.ge96f3
^ permalink raw reply related [flat|nested] 2+ messages in thread* [resend iptables] new revision of socket match to check IP_TRANSPARENT
2009-05-08 7:47 [resend 2.6.30-rc4] Added 'transparent' option to socket match Laszlo Attila Toth
@ 2009-05-08 7:47 ` Laszlo Attila Toth
0 siblings, 0 replies; 2+ messages in thread
From: Laszlo Attila Toth @ 2009-05-08 7:47 UTC (permalink / raw)
To: Patrick McHardy, netfilter-devel; +Cc: Laszlo Attila Toth
Added new revision of the socket match.
if the '--transparent' parameter is specified, the matching sockets have to
enable the IP_TRANSPARENT socket option.
Signed-off-by: Laszlo Attila Toth <panther@balabit.hu>
---
extensions/libxt_socket.c | 96 +++++++++++++++++++++++++++++-----
extensions/libxt_socket.man | 6 ++-
include/linux/netfilter/xt_socket.h | 8 +++
3 files changed, 95 insertions(+), 15 deletions(-)
create mode 100644 include/linux/netfilter/xt_socket.h
diff --git a/extensions/libxt_socket.c b/extensions/libxt_socket.c
index eebc7c5..03c1852 100644
--- a/extensions/libxt_socket.c
+++ b/extensions/libxt_socket.c
@@ -6,34 +6,102 @@
#include <stdio.h>
#include <getopt.h>
#include <xtables.h>
+#include <linux/netfilter/xt_socket.h>
-static void socket_mt_help(void)
+static void socket_mt_help_v0(void)
{
- printf("socket v%s has no options\n\n", XTABLES_VERSION);
+ printf("socket match has no options.\n\n");
}
-static int socket_mt_parse(int c, char **argv, int invert, unsigned int *flags,
- const void *entry, struct xt_entry_match **match)
+static void socket_mt_help_v1(void)
+{
+ printf("socket match options:\n"
+"--transparent Matches only if the socket's transparent option is set\n");
+}
+
+static const struct option socket_opts_v1[] = {
+ { "transparent", 0, NULL, '1' },
+ { }
+};
+
+static int socket_mt_parse_v0(int c, char **argv, int invert,
+ unsigned int *flags, const void *entry,
+ struct xt_entry_match **match)
{
return 0;
}
+static int socket_mt_parse_v1(int c, char **argv, int invert,
+ unsigned int *flags, const void *entry,
+ struct xt_entry_match **match)
+{
+ struct xt_socket_match_info *info =
+ (struct xt_socket_match_info *) (*match)->data;
+
+ switch (c) {
+ case '1':
+ if (*flags)
+ xtables_error(PARAMETER_PROBLEM,
+ "Can't specify multiple --transparent");
+ info->transparent = 1;
+ *flags = 1;
+ break;
+ default:
+ return 0;
+ }
+ return 1;
+}
+
static void socket_mt_check(unsigned int flags)
{
}
-static struct xtables_match socket_mt_reg = {
- .name = "socket",
- .version = XTABLES_VERSION,
- .family = NFPROTO_IPV4,
- .size = XT_ALIGN(0),
- .userspacesize = XT_ALIGN(0),
- .parse = socket_mt_parse,
- .final_check = socket_mt_check,
- .help = socket_mt_help,
+static void socket_mt_print_v1(const void *ip,
+ const struct xt_entry_match *target,
+ int numeric)
+{
+ const struct xt_socket_match_info *info = (const void *)target->data;
+ printf("socket ");
+ if (info->transparent)
+ printf("transparent ");
+}
+
+static void socket_mt_save_v1(const void *ip,
+ const struct xt_entry_match *match)
+{
+ const struct xt_socket_match_info *info =
+ (const struct xt_socket_match_info*) match->data;
+
+ if (info->transparent)
+ printf("--transparent ");
+}
+
+static struct xtables_match socket_mt_reg_v0 = {
+ .name = "socket",
+ .version = XTABLES_VERSION,
+ .family = NFPROTO_IPV4,
+ .parse = socket_mt_parse_v0,
+ .final_check = socket_mt_check,
+ .help = socket_mt_help_v0,
+};
+
+static struct xtables_match socket_mt_reg_v1 = {
+ .name = "socket",
+ .version = XTABLES_VERSION,
+ .family = NFPROTO_IPV4,
+ .size = XT_ALIGN(sizeof(struct xt_socket_match_info)),
+ .userspacesize = XT_ALIGN(sizeof(struct xt_socket_match_info)),
+ .parse = socket_mt_parse_v1,
+ .print = socket_mt_print_v1,
+ .save = socket_mt_save_v1,
+ .final_check = socket_mt_check,
+ .help = socket_mt_help_v1,
+ .extra_opts = socket_opts_v1,
+ .revision = 1,
};
void _init(void)
{
- xtables_register_match(&socket_mt_reg);
+ xtables_register_match(&socket_mt_reg_v0);
+ xtables_register_match(&socket_mt_reg_v1);
}
diff --git a/extensions/libxt_socket.man b/extensions/libxt_socket.man
index 50c8854..edc9d75 100644
--- a/extensions/libxt_socket.man
+++ b/extensions/libxt_socket.man
@@ -1,2 +1,6 @@
This matches if an open socket can be found by doing a socket lookup on the
-packet.
+packet which doesn\'t listen on the \'any\' IP address (0.0.0.0).
+.TP
+.BI "\-\-transparent"
+Enables additional check, that the actual socket's transparent socket option
+has to be set.
diff --git a/include/linux/netfilter/xt_socket.h b/include/linux/netfilter/xt_socket.h
new file mode 100644
index 0000000..2222d63
--- /dev/null
+++ b/include/linux/netfilter/xt_socket.h
@@ -0,0 +1,8 @@
+#ifndef _XT_SOCKET_H_match
+#define _XT_SOCKET_H_match
+
+struct xt_socket_match_info {
+ __u8 transparent:1;
+};
+
+#endif /* _XT_SOCKET_H_match */
--
1.6.2.2.404.ge96f3
^ permalink raw reply related [flat|nested] 2+ messages in thread
end of thread, other threads:[~2009-05-08 7:47 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-05-08 7:47 [resend 2.6.30-rc4] Added 'transparent' option to socket match Laszlo Attila Toth
2009-05-08 7:47 ` [resend iptables] new revision of socket match to check IP_TRANSPARENT Laszlo Attila Toth
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).