You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
264 lines
6.1 KiB
264 lines
6.1 KiB
/*
|
|
* em_ipset.c IPset Ematch
|
|
*
|
|
* (C) 2012 Florian Westphal <fw@strlen.de>
|
|
*
|
|
* Parts taken from iptables libxt_set.h:
|
|
* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu>
|
|
* Patrick Schaaf <bof@bof.de>
|
|
* Martin Josefsson <gandalf@wlug.westbo.se>
|
|
* Copyright (C) 2003-2010 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*/
|
|
|
|
#include <stdbool.h>
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <netdb.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <getopt.h>
|
|
|
|
#include <xtables.h>
|
|
#include <linux/netfilter/ipset/ip_set.h>
|
|
|
|
#ifndef IPSET_INVALID_ID
|
|
typedef __u16 ip_set_id_t;
|
|
|
|
enum ip_set_dim {
|
|
IPSET_DIM_ZERO = 0,
|
|
IPSET_DIM_ONE,
|
|
IPSET_DIM_TWO,
|
|
IPSET_DIM_THREE,
|
|
IPSET_DIM_MAX = 6,
|
|
};
|
|
#endif /* IPSET_INVALID_ID */
|
|
|
|
#include <linux/netfilter/xt_set.h>
|
|
#include "m_ematch.h"
|
|
|
|
#ifndef IPSET_INVALID_ID
|
|
#define IPSET_INVALID_ID 65535
|
|
#define SO_IP_SET 83
|
|
|
|
union ip_set_name_index {
|
|
char name[IPSET_MAXNAMELEN];
|
|
__u16 index;
|
|
};
|
|
|
|
#define IP_SET_OP_GET_BYNAME 0x00000006 /* Get set index by name */
|
|
struct ip_set_req_get_set {
|
|
unsigned int op;
|
|
unsigned int version;
|
|
union ip_set_name_index set;
|
|
};
|
|
|
|
#define IP_SET_OP_GET_BYINDEX 0x00000007 /* Get set name by index */
|
|
/* Uses ip_set_req_get_set */
|
|
|
|
#define IP_SET_OP_VERSION 0x00000100 /* Ask kernel version */
|
|
struct ip_set_req_version {
|
|
unsigned int op;
|
|
unsigned int version;
|
|
};
|
|
#endif /* IPSET_INVALID_ID */
|
|
|
|
extern struct ematch_util ipset_ematch_util;
|
|
|
|
static int get_version(unsigned int *version)
|
|
{
|
|
int res, sockfd = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
|
|
struct ip_set_req_version req_version;
|
|
socklen_t size = sizeof(req_version);
|
|
|
|
if (sockfd < 0) {
|
|
fputs("Can't open socket to ipset.\n", stderr);
|
|
return -1;
|
|
}
|
|
|
|
req_version.op = IP_SET_OP_VERSION;
|
|
res = getsockopt(sockfd, SOL_IP, SO_IP_SET, &req_version, &size);
|
|
if (res != 0) {
|
|
perror("xt_set getsockopt");
|
|
close(sockfd);
|
|
return -1;
|
|
}
|
|
|
|
*version = req_version.version;
|
|
return sockfd;
|
|
}
|
|
|
|
static int do_getsockopt(struct ip_set_req_get_set *req)
|
|
{
|
|
int sockfd, res;
|
|
socklen_t size = sizeof(struct ip_set_req_get_set);
|
|
|
|
sockfd = get_version(&req->version);
|
|
if (sockfd < 0)
|
|
return -1;
|
|
res = getsockopt(sockfd, SOL_IP, SO_IP_SET, req, &size);
|
|
if (res != 0)
|
|
perror("Problem when communicating with ipset");
|
|
close(sockfd);
|
|
if (res != 0)
|
|
return -1;
|
|
|
|
if (size != sizeof(struct ip_set_req_get_set)) {
|
|
fprintf(stderr,
|
|
"Incorrect return size from kernel during ipset lookup, (want %zu, got %zu)\n",
|
|
sizeof(struct ip_set_req_get_set), (size_t)size);
|
|
return -1;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
static int
|
|
get_set_byid(char *setname, unsigned int idx)
|
|
{
|
|
struct ip_set_req_get_set req;
|
|
int res;
|
|
|
|
req.op = IP_SET_OP_GET_BYINDEX;
|
|
req.set.index = idx;
|
|
res = do_getsockopt(&req);
|
|
if (res != 0)
|
|
return -1;
|
|
if (req.set.name[0] == '\0') {
|
|
fprintf(stderr,
|
|
"Set with index %i in kernel doesn't exist.\n", idx);
|
|
return -1;
|
|
}
|
|
|
|
strncpy(setname, req.set.name, IPSET_MAXNAMELEN);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
get_set_byname(const char *setname, struct xt_set_info *info)
|
|
{
|
|
struct ip_set_req_get_set req;
|
|
int res;
|
|
|
|
req.op = IP_SET_OP_GET_BYNAME;
|
|
strlcpy(req.set.name, setname, IPSET_MAXNAMELEN);
|
|
res = do_getsockopt(&req);
|
|
if (res != 0)
|
|
return -1;
|
|
if (req.set.index == IPSET_INVALID_ID)
|
|
return -1;
|
|
info->index = req.set.index;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
parse_dirs(const char *opt_arg, struct xt_set_info *info)
|
|
{
|
|
char *saved = strdup(opt_arg);
|
|
char *ptr, *tmp = saved;
|
|
|
|
if (!tmp) {
|
|
perror("strdup");
|
|
return -1;
|
|
}
|
|
|
|
while (info->dim < IPSET_DIM_MAX && tmp != NULL) {
|
|
info->dim++;
|
|
ptr = strsep(&tmp, ",");
|
|
if (strncmp(ptr, "src", 3) == 0)
|
|
info->flags |= (1 << info->dim);
|
|
else if (strncmp(ptr, "dst", 3) != 0) {
|
|
fputs("You must specify (the comma separated list of) 'src' or 'dst'\n", stderr);
|
|
free(saved);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (tmp)
|
|
fprintf(stderr, "Can't be more src/dst options than %u", IPSET_DIM_MAX);
|
|
free(saved);
|
|
return tmp ? -1 : 0;
|
|
}
|
|
|
|
static void ipset_print_usage(FILE *fd)
|
|
{
|
|
fprintf(fd,
|
|
"Usage: ipset(SETNAME FLAGS)\n" \
|
|
"where: SETNAME:= string\n" \
|
|
" FLAGS := { FLAG[,FLAGS] }\n" \
|
|
" FLAG := { src | dst }\n" \
|
|
"\n" \
|
|
"Example: 'ipset(bulk src,dst)'\n");
|
|
}
|
|
|
|
static int ipset_parse_eopt(struct nlmsghdr *n, struct tcf_ematch_hdr *hdr,
|
|
struct bstr *args)
|
|
{
|
|
struct xt_set_info set_info = {};
|
|
int ret;
|
|
|
|
#define PARSE_ERR(CARG, FMT, ARGS...) \
|
|
em_parse_error(EINVAL, args, CARG, &ipset_ematch_util, FMT, ##ARGS)
|
|
|
|
if (args == NULL)
|
|
return PARSE_ERR(args, "ipset: missing set name");
|
|
|
|
if (args->len >= IPSET_MAXNAMELEN)
|
|
return PARSE_ERR(args, "ipset: set name too long (max %u)", IPSET_MAXNAMELEN - 1);
|
|
ret = get_set_byname(args->data, &set_info);
|
|
if (ret < 0)
|
|
return PARSE_ERR(args, "ipset: unknown set name '%s'", args->data);
|
|
|
|
if (args->next == NULL)
|
|
return PARSE_ERR(args, "ipset: missing set flags");
|
|
|
|
args = bstr_next(args);
|
|
if (parse_dirs(args->data, &set_info))
|
|
return PARSE_ERR(args, "ipset: error parsing set flags");
|
|
|
|
if (args->next) {
|
|
args = bstr_next(args);
|
|
return PARSE_ERR(args, "ipset: unknown parameter");
|
|
}
|
|
|
|
addraw_l(n, MAX_MSG, hdr, sizeof(*hdr));
|
|
addraw_l(n, MAX_MSG, &set_info, sizeof(set_info));
|
|
|
|
#undef PARSE_ERR
|
|
return 0;
|
|
}
|
|
|
|
static int ipset_print_eopt(FILE *fd, struct tcf_ematch_hdr *hdr, void *data,
|
|
int data_len)
|
|
{
|
|
int i;
|
|
char setname[IPSET_MAXNAMELEN];
|
|
const struct xt_set_info *set_info = data;
|
|
|
|
if (data_len != sizeof(*set_info)) {
|
|
fprintf(stderr, "xt_set_info struct size mismatch\n");
|
|
return -1;
|
|
}
|
|
|
|
if (get_set_byid(setname, set_info->index))
|
|
return -1;
|
|
fputs(setname, fd);
|
|
for (i = 1; i <= set_info->dim; i++) {
|
|
fprintf(fd, "%s%s", i == 1 ? " " : ",", set_info->flags & (1 << i) ? "src" : "dst");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct ematch_util ipset_ematch_util = {
|
|
.kind = "ipset",
|
|
.kind_num = TCF_EM_IPSET,
|
|
.parse_eopt = ipset_parse_eopt,
|
|
.print_eopt = ipset_print_eopt,
|
|
.print_usage = ipset_print_usage
|
|
};
|