Blame extensions/libip6t_MASQUERADE.c

Packit 7b22a4
/*
Packit 7b22a4
 * Copyright (c) 2011 Patrick McHardy <kaber@trash.net>
Packit 7b22a4
 *
Packit 7b22a4
 * Based on Rusty Russell's IPv4 MASQUERADE target. Development of IPv6 NAT
Packit 7b22a4
 * funded by Astaro.
Packit 7b22a4
 */
Packit 7b22a4
Packit 7b22a4
#include <stdio.h>
Packit 7b22a4
#include <netdb.h>
Packit 7b22a4
#include <string.h>
Packit 7b22a4
#include <stdlib.h>
Packit 7b22a4
#include <getopt.h>
Packit 7b22a4
#include <xtables.h>
Packit 7b22a4
#include <limits.h> /* INT_MAX in ip_tables.h */
Packit 7b22a4
#include <linux/netfilter_ipv6/ip6_tables.h>
Packit 7b22a4
#include <linux/netfilter/nf_nat.h>
Packit 7b22a4
Packit 7b22a4
enum {
Packit 7b22a4
	O_TO_PORTS = 0,
Packit 7b22a4
	O_RANDOM,
Packit 7b22a4
	O_RANDOM_FULLY,
Packit 7b22a4
};
Packit 7b22a4
Packit 7b22a4
static void MASQUERADE_help(void)
Packit 7b22a4
{
Packit 7b22a4
	printf(
Packit 7b22a4
"MASQUERADE target options:\n"
Packit 7b22a4
" --to-ports <port>[-<port>]\n"
Packit 7b22a4
"				Port (range) to map to.\n"
Packit 7b22a4
" --random\n"
Packit 7b22a4
"				Randomize source port.\n"
Packit 7b22a4
" --random-fully\n"
Packit 7b22a4
"				Fully randomize source port.\n");
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static const struct xt_option_entry MASQUERADE_opts[] = {
Packit 7b22a4
	{.name = "to-ports", .id = O_TO_PORTS, .type = XTTYPE_STRING},
Packit 7b22a4
	{.name = "random", .id = O_RANDOM, .type = XTTYPE_NONE},
Packit 7b22a4
	{.name = "random-fully", .id = O_RANDOM_FULLY, .type = XTTYPE_NONE},
Packit 7b22a4
	XTOPT_TABLEEND,
Packit 7b22a4
};
Packit 7b22a4
Packit 7b22a4
/* Parses ports */
Packit 7b22a4
static void
Packit 7b22a4
parse_ports(const char *arg, struct nf_nat_range *r)
Packit 7b22a4
{
Packit 7b22a4
	char *end;
Packit 7b22a4
	unsigned int port, maxport;
Packit 7b22a4
Packit 7b22a4
	r->flags |= NF_NAT_RANGE_PROTO_SPECIFIED;
Packit 7b22a4
Packit 7b22a4
	if (!xtables_strtoui(arg, &end, &port, 0, UINT16_MAX))
Packit 7b22a4
		xtables_param_act(XTF_BAD_VALUE, "MASQUERADE", "--to-ports", arg);
Packit 7b22a4
Packit 7b22a4
	switch (*end) {
Packit 7b22a4
	case '\0':
Packit 7b22a4
		r->min_proto.tcp.port
Packit 7b22a4
			= r->max_proto.tcp.port
Packit 7b22a4
			= htons(port);
Packit 7b22a4
		return;
Packit 7b22a4
	case '-':
Packit 7b22a4
		if (!xtables_strtoui(end + 1, NULL, &maxport, 0, UINT16_MAX))
Packit 7b22a4
			break;
Packit 7b22a4
Packit 7b22a4
		if (maxport < port)
Packit 7b22a4
			break;
Packit 7b22a4
Packit 7b22a4
		r->min_proto.tcp.port = htons(port);
Packit 7b22a4
		r->max_proto.tcp.port = htons(maxport);
Packit 7b22a4
		return;
Packit 7b22a4
	default:
Packit 7b22a4
		break;
Packit 7b22a4
	}
Packit 7b22a4
	xtables_param_act(XTF_BAD_VALUE, "MASQUERADE", "--to-ports", arg);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void MASQUERADE_parse(struct xt_option_call *cb)
Packit 7b22a4
{
Packit 7b22a4
	const struct ip6t_entry *entry = cb->xt_entry;
Packit 7b22a4
	struct nf_nat_range *r = cb->data;
Packit 7b22a4
	int portok;
Packit 7b22a4
Packit 7b22a4
	if (entry->ipv6.proto == IPPROTO_TCP ||
Packit 7b22a4
	    entry->ipv6.proto == IPPROTO_UDP ||
Packit 7b22a4
	    entry->ipv6.proto == IPPROTO_SCTP ||
Packit 7b22a4
	    entry->ipv6.proto == IPPROTO_DCCP ||
Packit 7b22a4
	    entry->ipv6.proto == IPPROTO_ICMP)
Packit 7b22a4
		portok = 1;
Packit 7b22a4
	else
Packit 7b22a4
		portok = 0;
Packit 7b22a4
Packit 7b22a4
	xtables_option_parse(cb);
Packit 7b22a4
	switch (cb->entry->id) {
Packit 7b22a4
	case O_TO_PORTS:
Packit 7b22a4
		if (!portok)
Packit 7b22a4
			xtables_error(PARAMETER_PROBLEM,
Packit 7b22a4
				   "Need TCP, UDP, SCTP or DCCP with port specification");
Packit 7b22a4
		parse_ports(cb->arg, r);
Packit 7b22a4
		break;
Packit 7b22a4
	case O_RANDOM:
Packit 7b22a4
		r->flags |=  NF_NAT_RANGE_PROTO_RANDOM;
Packit 7b22a4
		break;
Packit 7b22a4
	case O_RANDOM_FULLY:
Packit 7b22a4
		r->flags |=  NF_NAT_RANGE_PROTO_RANDOM_FULLY;
Packit 7b22a4
		break;
Packit 7b22a4
	}
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void
Packit 7b22a4
MASQUERADE_print(const void *ip, const struct xt_entry_target *target,
Packit 7b22a4
                 int numeric)
Packit 7b22a4
{
Packit 7b22a4
	const struct nf_nat_range *r = (const void *)target->data;
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_SPECIFIED) {
Packit 7b22a4
		printf(" masq ports: ");
Packit 7b22a4
		printf("%hu", ntohs(r->min_proto.tcp.port));
Packit 7b22a4
		if (r->max_proto.tcp.port != r->min_proto.tcp.port)
Packit 7b22a4
			printf("-%hu", ntohs(r->max_proto.tcp.port));
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM)
Packit 7b22a4
		printf(" random");
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM_FULLY)
Packit 7b22a4
		printf(" random-fully");
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void
Packit 7b22a4
MASQUERADE_save(const void *ip, const struct xt_entry_target *target)
Packit 7b22a4
{
Packit 7b22a4
	const struct nf_nat_range *r = (const void *)target->data;
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_SPECIFIED) {
Packit 7b22a4
		printf(" --to-ports %hu", ntohs(r->min_proto.tcp.port));
Packit 7b22a4
		if (r->max_proto.tcp.port != r->min_proto.tcp.port)
Packit 7b22a4
			printf("-%hu", ntohs(r->max_proto.tcp.port));
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM)
Packit 7b22a4
		printf(" --random");
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM_FULLY)
Packit 7b22a4
		printf(" --random-fully");
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static int MASQUERADE_xlate(struct xt_xlate *xl,
Packit 7b22a4
			    const struct xt_xlate_tg_params *params)
Packit 7b22a4
{
Packit 7b22a4
	const struct nf_nat_range *r = (const void *)params->target->data;
Packit 7b22a4
Packit 7b22a4
	xt_xlate_add(xl, "masquerade");
Packit 7b22a4
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_SPECIFIED) {
Packit 7b22a4
		xt_xlate_add(xl, " to :%hu", ntohs(r->min_proto.tcp.port));
Packit 7b22a4
		if (r->max_proto.tcp.port != r->min_proto.tcp.port)
Packit 7b22a4
			xt_xlate_add(xl, "-%hu", ntohs(r->max_proto.tcp.port));
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	xt_xlate_add(xl, " ");
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM)
Packit 7b22a4
		xt_xlate_add(xl, "random ");
Packit 7b22a4
Packit 7b22a4
	xt_xlate_add(xl, " ");
Packit 7b22a4
	if (r->flags & NF_NAT_RANGE_PROTO_RANDOM_FULLY)
Packit 7b22a4
		xt_xlate_add(xl, "random-fully ");
Packit 7b22a4
Packit 7b22a4
	return 1;
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static struct xtables_target masquerade_tg_reg = {
Packit 7b22a4
	.name		= "MASQUERADE",
Packit 7b22a4
	.version	= XTABLES_VERSION,
Packit 7b22a4
	.family		= NFPROTO_IPV6,
Packit 7b22a4
	.size		= XT_ALIGN(sizeof(struct nf_nat_range)),
Packit 7b22a4
	.userspacesize	= XT_ALIGN(sizeof(struct nf_nat_range)),
Packit 7b22a4
	.help		= MASQUERADE_help,
Packit 7b22a4
	.x6_parse	= MASQUERADE_parse,
Packit 7b22a4
	.print		= MASQUERADE_print,
Packit 7b22a4
	.save		= MASQUERADE_save,
Packit 7b22a4
	.x6_options	= MASQUERADE_opts,
Packit 7b22a4
	.xlate		= MASQUERADE_xlate,
Packit 7b22a4
};
Packit 7b22a4
Packit 7b22a4
void _init(void)
Packit 7b22a4
{
Packit 7b22a4
	xtables_register_target(&masquerade_tg_reg);
Packit 7b22a4
}