netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] extensions: libipt_DNAT: support shifted portmap ranges
@ 2017-12-20 16:40 Thierry Du Tre
  0 siblings, 0 replies; only message in thread
From: Thierry Du Tre @ 2017-12-20 16:40 UTC (permalink / raw)
  To: netfilter-devel; +Cc: Patrick McHardy, Pablo Neira Ayuso

This is a proposal patch for iptables DNAT extension to support shifted 
portmap ranges. It is related to the kernel patch proposed in earlier 
message '[PATCH] netfilter : add NAT support for shifted portmap ranges'.

The syntax uses an extra value in '--to-destination' for setting the 
base port which determines the offset in the redirect port range for 
incoming connections.
i.e. : iptables -t nat -A zone_wan_prerouting -p tcp -m tcp --dport 
5000:5100 -j DNAT --to-destination '192.168.1.2:2000-2100;5000'
The base port value is totally optional, so current behavior is not 
impacted in any way.

The use of semicolon as separator is an arbitrary choice, all other 
suggestions are valid of course.
The base port is now member of 'struct nf_nat_ipv4_range' together with 
min and max port. Therefore, the simplest solution is to parse the base 
port as part of the to-destination argument.
Another approach using an additional option seems also possible (i.e. 
'--base-port 5000'). However, that would mean more parsing logic with 
extra lines of code and thus increased risk for regression.

When a definitive solution is agreed on, I'll update libipt6_DNAT and 
man page accordingly.

Signed-off-by: Thierry Du Tre <thierry@dtsystems.be>

---
  extensions/libipt_DNAT.c         | 18 +++++++++++++++++-
  include/linux/netfilter/nf_nat.h |  3 +++
  2 files changed, 20 insertions(+), 1 deletion(-)

diff --git a/extensions/libipt_DNAT.c b/extensions/libipt_DNAT.c
index a14d16f..f810efe 100644
--- a/extensions/libipt_DNAT.c
+++ b/extensions/libipt_DNAT.c
@@ -30,7 +30,7 @@ static void DNAT_help(void)
  {
  	printf(
  "DNAT target options:\n"
-" --to-destination [<ipaddr>[-<ipaddr>]][:port[-port]]\n"
+" --to-destination [<ipaddr>[-<ipaddr>]][:port[-port[;port]]]\n"
  "				Address to map destination to.\n"
  "[--random] [--persistent]\n");
  }
@@ -102,6 +102,7 @@ parse_to(const char *orig_arg, int portok, struct 
ipt_natinfo *info)
  				= htons(port);
  		} else {
  			int maxport;
+			char *semicolon;

  			maxport = atoi(dash + 1);
  			if (maxport <= 0 || maxport > 65535)
@@ -113,6 +114,17 @@ parse_to(const char *orig_arg, int portok, struct 
ipt_natinfo *info)
  					   "Port range `%s' funky\n", colon+1);
  			range.min.tcp.port = htons(port);
  			range.max.tcp.port = htons(maxport);
+
+			if ((semicolon = strchr(dash, ';'))) {
+				int baseport;
+
+				baseport = atoi(semicolon + 1);
+				if (baseport <= 0 || baseport > 65535)
+					xtables_error(PARAMETER_PROBLEM,
+							 "Port `%s' not valid\n", semicolon+1);
+				range.flags |= NF_NAT_RANGE_PROTO_OFFSET;
+				range.base.tcp.port = htons(baseport);
+			}
  		}
  		/* Starts with a colon? No IP info...*/
  		if (colon == arg) {
@@ -208,6 +220,8 @@ static void print_range(const struct 
nf_nat_ipv4_range *r)
  		printf("%hu", ntohs(r->min.tcp.port));
  		if (r->max.tcp.port != r->min.tcp.port)
  			printf("-%hu", ntohs(r->max.tcp.port));
+		if (r->flags & NF_NAT_RANGE_PROTO_OFFSET)
+			printf(";%hu", ntohs(r->base.tcp.port));
  	}
  }

@@ -259,6 +273,8 @@ static void print_range_xlate(const struct 
nf_nat_ipv4_range *r,
  		xt_xlate_add(xl, ":%hu", ntohs(r->min.tcp.port));
  		if (r->max.tcp.port != r->min.tcp.port)
  			xt_xlate_add(xl, "-%hu", ntohs(r->max.tcp.port));
+		if (r->flags & NF_NAT_RANGE_PROTO_OFFSET)
+			xt_xlate_add(xl, ";%hu", ntohs(r->base.tcp.port));
  	}
  }

diff --git a/include/linux/netfilter/nf_nat.h 
b/include/linux/netfilter/nf_nat.h
index 1ad3659..a945ee3 100644
--- a/include/linux/netfilter/nf_nat.h
+++ b/include/linux/netfilter/nf_nat.h
@@ -9,6 +9,7 @@
  #define NF_NAT_RANGE_PROTO_RANDOM		(1 << 2)
  #define NF_NAT_RANGE_PERSISTENT			(1 << 3)
  #define NF_NAT_RANGE_PROTO_RANDOM_FULLY		(1 << 4)
+#define NF_NAT_RANGE_PROTO_OFFSET		(1 << 5)

  #define NF_NAT_RANGE_PROTO_RANDOM_ALL		\
  	(NF_NAT_RANGE_PROTO_RANDOM | NF_NAT_RANGE_PROTO_RANDOM_FULLY)
@@ -19,6 +20,7 @@ struct nf_nat_ipv4_range {
  	__be32				max_ip;
  	union nf_conntrack_man_proto	min;
  	union nf_conntrack_man_proto	max;
+	union nf_conntrack_man_proto	base;
  };

  struct nf_nat_ipv4_multi_range_compat {
@@ -32,6 +34,7 @@ struct nf_nat_range {
  	union nf_inet_addr		max_addr;
  	union nf_conntrack_man_proto	min_proto;
  	union nf_conntrack_man_proto	max_proto;
+	union nf_conntrack_man_proto	base_proto;
  };

  #endif /* _NETFILTER_NF_NAT_H */
-- 
2.7.4

^ permalink raw reply related	[flat|nested] only message in thread

only message in thread, other threads:[~2017-12-20 16:40 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-12-20 16:40 [PATCH] extensions: libipt_DNAT: support shifted portmap ranges Thierry Du Tre

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).