| /* Shared library add-on to iptables to add connection limit support. */ |
| #include <stdbool.h> |
| #include <stdio.h> |
| #include <netdb.h> |
| #include <string.h> |
| #include <stdlib.h> |
| #include <stddef.h> |
| #include <getopt.h> |
| #include <xtables.h> |
| #include <linux/netfilter/xt_connlimit.h> |
| |
| enum { |
| FL_LIMIT = 1 << 0, |
| FL_MASK = 1 << 1, |
| FL_ADDR = 1 << 2, |
| }; |
| |
| static void connlimit_help(void) |
| { |
| printf( |
| "connlimit match options:\n" |
| " --connlimit-upto n match if the number of existing connections is 0..n\n" |
| " --connlimit-above n match if the number of existing connections is >n\n" |
| " --connlimit-mask n group hosts using prefix length (default: max len)\n" |
| " --connlimit-saddr select source address for grouping\n" |
| " --connlimit-daddr select destination addresses for grouping\n"); |
| } |
| |
| static const struct option connlimit_opts[] = { |
| {.name = "connlimit-upto", .has_arg = true, .val = 'U'}, |
| {.name = "connlimit-above", .has_arg = true, .val = 'A'}, |
| {.name = "connlimit-mask", .has_arg = true, .val = 'M'}, |
| {.name = "connlimit-saddr", .has_arg = false, .val = 's'}, |
| {.name = "connlimit-daddr", .has_arg = false, .val = 'd'}, |
| XT_GETOPT_TABLEEND, |
| }; |
| |
| static void connlimit_init(struct xt_entry_match *match) |
| { |
| struct xt_connlimit_info *info = (void *)match->data; |
| |
| /* This will also initialize the v4 mask correctly */ |
| memset(info->v6_mask, 0xFF, sizeof(info->v6_mask)); |
| } |
| |
| static void prefix_to_netmask(uint32_t *mask, unsigned int prefix_len) |
| { |
| if (prefix_len == 0) { |
| mask[0] = mask[1] = mask[2] = mask[3] = 0; |
| } else if (prefix_len <= 32) { |
| mask[0] <<= 32 - prefix_len; |
| mask[1] = mask[2] = mask[3] = 0; |
| } else if (prefix_len <= 64) { |
| mask[1] <<= 32 - (prefix_len - 32); |
| mask[2] = mask[3] = 0; |
| } else if (prefix_len <= 96) { |
| mask[2] <<= 32 - (prefix_len - 64); |
| mask[3] = 0; |
| } else if (prefix_len <= 128) { |
| mask[3] <<= 32 - (prefix_len - 96); |
| } |
| mask[0] = htonl(mask[0]); |
| mask[1] = htonl(mask[1]); |
| mask[2] = htonl(mask[2]); |
| mask[3] = htonl(mask[3]); |
| } |
| |
| static int |
| connlimit_parse(int c, char **argv, int invert, unsigned int *flags, |
| struct xt_entry_match **match, unsigned int family) |
| { |
| struct xt_connlimit_info *info = (void *)(*match)->data; |
| const unsigned int revision = (*match)->u.user.revision; |
| char *err; |
| int i; |
| |
| switch (c) { |
| case 'A': /* --connlimit-above */ |
| xtables_param_act(XTF_ONLY_ONCE, "connlimit", |
| "--connlimit-{upto,above}", *flags & FL_LIMIT); |
| *flags |= FL_LIMIT; |
| if (invert) |
| info->flags |= XT_CONNLIMIT_INVERT; |
| info->limit = strtoul(optarg, NULL, 0); |
| return true; |
| case 'U': /* --connlimit-upto */ |
| xtables_param_act(XTF_ONLY_ONCE, "connlimit", |
| "--connlimit-{upto,above}", *flags & FL_LIMIT); |
| *flags |= FL_LIMIT; |
| if (!invert) |
| info->flags |= XT_CONNLIMIT_INVERT; |
| info->limit = strtoul(optarg, NULL, 0); |
| return true; |
| case 'M': /* --connlimit-mask */ |
| xtables_param_act(XTF_NO_INVERT, "connlimit", |
| "--connlimit-mask", invert); |
| xtables_param_act(XTF_ONLY_ONCE, "connlimit", |
| "--connlimit-mask", *flags & FL_MASK); |
| *flags |= FL_MASK; |
| i = strtoul(optarg, &err, 0); |
| if (family == NFPROTO_IPV6) { |
| if (i > 128 || *err != '\0') |
| xtables_error(PARAMETER_PROBLEM, |
| "--connlimit-mask must be between " |
| "0 and 128"); |
| prefix_to_netmask(info->v6_mask, i); |
| } else { |
| if (i > 32 || *err != '\0') |
| xtables_error(PARAMETER_PROBLEM, |
| "--connlimit-mask must be between " |
| "0 and 32"); |
| if (i == 0) |
| info->v4_mask = 0; |
| else |
| info->v4_mask = htonl(0xFFFFFFFF << (32 - i)); |
| } |
| return true; |
| case 's': /* --connlimit-saddr */ |
| info->flags &= ~XT_CONNLIMIT_DADDR; |
| return true; |
| case 'd': /* --connlimit-daddr */ |
| if (revision < 1) |
| xtables_error(PARAMETER_PROBLEM, |
| "xt_connlimit.0 does not support " |
| "--connlimit-daddr"); |
| info->flags |= XT_CONNLIMIT_DADDR; |
| return true; |
| } |
| return false; |
| } |
| |
| static int connlimit_parse4(int c, char **argv, int invert, |
| unsigned int *flags, const void *entry, |
| struct xt_entry_match **match) |
| { |
| return connlimit_parse(c, argv, invert, flags, match, NFPROTO_IPV4); |
| } |
| |
| static int connlimit_parse6(int c, char **argv, int invert, |
| unsigned int *flags, const void *entry, |
| struct xt_entry_match **match) |
| { |
| return connlimit_parse(c, argv, invert, flags, match, NFPROTO_IPV6); |
| } |
| |
| static void connlimit_check(unsigned int flags) |
| { |
| if (!(flags & 0x1)) |
| xtables_error(PARAMETER_PROBLEM, |
| "You must specify \"--connlimit-above\""); |
| } |
| |
| static unsigned int count_bits4(uint32_t mask) |
| { |
| unsigned int bits = 0; |
| |
| for (mask = ~ntohl(mask); mask != 0; mask >>= 1) |
| ++bits; |
| |
| return 32 - bits; |
| } |
| |
| static unsigned int count_bits6(const uint32_t *mask) |
| { |
| unsigned int bits = 0, i; |
| uint32_t tmp[4]; |
| |
| for (i = 0; i < 4; ++i) |
| for (tmp[i] = ~ntohl(mask[i]); tmp[i] != 0; tmp[i] >>= 1) |
| ++bits; |
| return 128 - bits; |
| } |
| |
| static void connlimit_print4(const void *ip, |
| const struct xt_entry_match *match, int numeric) |
| { |
| const struct xt_connlimit_info *info = (const void *)match->data; |
| |
| printf(" #conn %s/%u %s %u", |
| (info->flags & XT_CONNLIMIT_DADDR) ? "dst" : "src", |
| count_bits4(info->v4_mask), |
| (info->flags & XT_CONNLIMIT_INVERT) ? "<=" : ">", info->limit); |
| } |
| |
| static void connlimit_print6(const void *ip, |
| const struct xt_entry_match *match, int numeric) |
| { |
| const struct xt_connlimit_info *info = (const void *)match->data; |
| |
| printf(" #conn %s/%u %s %u", |
| (info->flags & XT_CONNLIMIT_DADDR) ? "dst" : "src", |
| count_bits6(info->v6_mask), |
| (info->flags & XT_CONNLIMIT_INVERT) ? "<=" : ">", info->limit); |
| } |
| |
| static void connlimit_save4(const void *ip, const struct xt_entry_match *match) |
| { |
| const struct xt_connlimit_info *info = (const void *)match->data; |
| const int revision = match->u.user.revision; |
| |
| if (info->flags & XT_CONNLIMIT_INVERT) |
| printf(" --connlimit-upto %u", info->limit); |
| else |
| printf(" --connlimit-above %u", info->limit); |
| printf(" --connlimit-mask %u", count_bits4(info->v4_mask)); |
| if (revision >= 1) { |
| if (info->flags & XT_CONNLIMIT_DADDR) |
| printf(" --connlimit-daddr"); |
| else |
| printf(" --connlimit-saddr"); |
| } |
| } |
| |
| static void connlimit_save6(const void *ip, const struct xt_entry_match *match) |
| { |
| const struct xt_connlimit_info *info = (const void *)match->data; |
| const int revision = match->u.user.revision; |
| |
| if (info->flags & XT_CONNLIMIT_INVERT) |
| printf(" --connlimit-upto %u", info->limit); |
| else |
| printf(" --connlimit-above %u", info->limit); |
| printf(" --connlimit-mask %u", count_bits6(info->v6_mask)); |
| if (revision >= 1) { |
| if (info->flags & XT_CONNLIMIT_DADDR) |
| printf(" --connlimit-daddr"); |
| else |
| printf(" --connlimit-saddr"); |
| } |
| } |
| |
| static struct xtables_match connlimit_mt_reg[] = { |
| { |
| .name = "connlimit", |
| .revision = 0, |
| .family = NFPROTO_IPV4, |
| .version = XTABLES_VERSION, |
| .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), |
| .userspacesize = offsetof(struct xt_connlimit_info, data), |
| .help = connlimit_help, |
| .init = connlimit_init, |
| .parse = connlimit_parse4, |
| .final_check = connlimit_check, |
| .print = connlimit_print4, |
| .save = connlimit_save4, |
| .extra_opts = connlimit_opts, |
| }, |
| { |
| .name = "connlimit", |
| .revision = 0, |
| .family = NFPROTO_IPV6, |
| .version = XTABLES_VERSION, |
| .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), |
| .userspacesize = offsetof(struct xt_connlimit_info, data), |
| .help = connlimit_help, |
| .init = connlimit_init, |
| .parse = connlimit_parse6, |
| .final_check = connlimit_check, |
| .print = connlimit_print6, |
| .save = connlimit_save6, |
| .extra_opts = connlimit_opts, |
| }, |
| { |
| .name = "connlimit", |
| .revision = 1, |
| .family = NFPROTO_IPV4, |
| .version = XTABLES_VERSION, |
| .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), |
| .userspacesize = offsetof(struct xt_connlimit_info, data), |
| .help = connlimit_help, |
| .init = connlimit_init, |
| .parse = connlimit_parse4, |
| .final_check = connlimit_check, |
| .print = connlimit_print4, |
| .save = connlimit_save4, |
| .extra_opts = connlimit_opts, |
| }, |
| { |
| .name = "connlimit", |
| .revision = 1, |
| .family = NFPROTO_IPV6, |
| .version = XTABLES_VERSION, |
| .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), |
| .userspacesize = offsetof(struct xt_connlimit_info, data), |
| .help = connlimit_help, |
| .init = connlimit_init, |
| .parse = connlimit_parse6, |
| .final_check = connlimit_check, |
| .print = connlimit_print6, |
| .save = connlimit_save6, |
| .extra_opts = connlimit_opts, |
| }, |
| }; |
| |
| void _init(void) |
| { |
| xtables_register_matches(connlimit_mt_reg, ARRAY_SIZE(connlimit_mt_reg)); |
| } |