* [PATCH] netfilter: Parse ICMPv6 redirects
@ 2017-03-01 14:32 Alin Nastac
2017-03-01 15:41 ` Jan Engelhardt
0 siblings, 1 reply; 2+ messages in thread
From: Alin Nastac @ 2017-03-01 14:32 UTC (permalink / raw)
To: netfilter-devel
Extract IPv6 packet that triggered the sending of redirect message from
ICMPv6 Redirected Header option and check if conntrack table contain such
connection. Mark redirect packet as RELATED if a matching connection is found.
Signed-off-by: Alin Nastac <alin.nastac@gmail.com>
---
net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 77 ++++++++++++++++++++++++--
1 file changed, 72 insertions(+), 5 deletions(-)
diff --git a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c
index d2c2ccb..2f9a985 100644
--- a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c
+++ b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c
@@ -144,7 +144,7 @@ static bool icmpv6_new(struct nf_conn *ct, const struct sk_buff *skb,
static int
icmpv6_error_message(struct net *net, struct nf_conn *tmpl,
struct sk_buff *skb,
- unsigned int icmp6off,
+ unsigned int inneripv6off,
unsigned int hooknum)
{
struct nf_conntrack_tuple intuple, origtuple;
@@ -157,9 +157,7 @@ static bool icmpv6_new(struct nf_conn *ct, const struct sk_buff *skb,
/* Are they talking about one of our connections? */
if (!nf_ct_get_tuplepr(skb,
- skb_network_offset(skb)
- + sizeof(struct ipv6hdr)
- + sizeof(struct icmp6hdr),
+ inneripv6off,
PF_INET6, net, &origtuple)) {
pr_debug("icmpv6_error: Can't get tuple\n");
return -NF_ACCEPT;
@@ -225,9 +223,78 @@ static bool icmpv6_new(struct nf_conn *ct, const struct sk_buff *skb,
nf_conntrack_get(skb_nfct(skb));
return NF_ACCEPT;
}
+ dataoff += sizeof(struct icmp6hdr);
/* is not error message ? */
- if (icmp6h->icmp6_type >= 128)
+ if (icmp6h->icmp6_type == NDISC_REDIRECT) {
+ const struct in6_addr *dst;
+ struct in6_addr _dst;
+ const struct nd_opt_hdr *opt;
+ struct nd_opt_hdr _opt;
+ const struct ipv6hdr *iph;
+ struct ipv6hdr _iph;
+
+ /* skip target address */
+ dataoff += sizeof(_dst);
+
+ /* read destination address */
+ dst = skb_header_pointer(skb, dataoff, sizeof(_dst), &_dst);
+ if (dst == NULL) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: short redirect packet ");
+ return -NF_ACCEPT;
+ }
+ if (ipv6_addr_is_multicast(dst)) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: redirect destination address is multicast ");
+ return -NF_ACCEPT;
+ }
+ dataoff += sizeof(_dst);
+
+ /* find redirected header */
+ while (1) {
+ opt = skb_header_pointer(skb, dataoff, sizeof(_opt), &_opt);
+ if (opt == NULL) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: invalid redirect option ");
+ return -NF_ACCEPT;
+ }
+ if (opt->nd_opt_len == 0) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: invalid redirect option length ");
+ return -NF_ACCEPT;
+ }
+
+ if (opt->nd_opt_type == ND_OPT_REDIRECT_HDR) {
+ dataoff += 8;
+ break;
+ }
+
+ dataoff += opt->nd_opt_len << 3;
+ }
+
+ /* read redirect header */
+ iph = skb_header_pointer(skb, dataoff, sizeof(_iph), &_iph);
+ if (iph == NULL) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: short redirect header ");
+ return -NF_ACCEPT;
+ }
+
+ /* validate destination address */
+ if (!ipv6_addr_equal(&iph->daddr, dst)) {
+ if (LOG_INVALID(net, IPPROTO_ICMPV6))
+ nf_log_packet(net, PF_INET6, 0, skb, NULL, NULL, NULL,
+ "nf_ct_icmpv6: redirect destination address not matching destination address of redirect header ");
+ return -NF_ACCEPT;
+ }
+ }
+ else if (icmp6h->icmp6_type >= 128)
return NF_ACCEPT;
return icmpv6_error_message(net, tmpl, skb, dataoff, hooknum);
--
1.7.12.4
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] netfilter: Parse ICMPv6 redirects
2017-03-01 14:32 [PATCH] netfilter: Parse ICMPv6 redirects Alin Nastac
@ 2017-03-01 15:41 ` Jan Engelhardt
0 siblings, 0 replies; 2+ messages in thread
From: Jan Engelhardt @ 2017-03-01 15:41 UTC (permalink / raw)
To: Alin Nastac; +Cc: netfilter-devel
On Wednesday 2017-03-01 15:32, Alin Nastac wrote:
>Extract IPv6 packet that triggered the sending of redirect message from
>ICMPv6 Redirected Header option and check if conntrack table contain such
>connection. Mark redirect packet as RELATED if a matching connection is found.
>
>Signed-off-by: Alin Nastac <alin.nastac@gmail.com>
>---
> net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 77 ++++++++++++++++++++++++--
> 1 file changed, 72 insertions(+), 5 deletions(-)
> /* is not error message ? */
>- if (icmp6h->icmp6_type >= 128)
>+ if (icmp6h->icmp6_type == NDISC_REDIRECT) {
That should most likely become a new subfunction for the size that it is.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-03-01 15:52 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-03-01 14:32 [PATCH] netfilter: Parse ICMPv6 redirects Alin Nastac
2017-03-01 15:41 ` Jan Engelhardt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).