Home | History | Annotate | Download | only in extensions
      1 #include <stdio.h>
      2 #include <netdb.h>
      3 #include <string.h>
      4 #include <stdlib.h>
      5 #include <xtables.h>
      6 #include <iptables.h> /* get_kernel_version */
      7 #include <limits.h> /* INT_MAX in ip_tables.h */
      8 #include <linux/netfilter_ipv4/ip_tables.h>
      9 #include <linux/netfilter/nf_nat.h>
     10 
     11 enum {
     12 	O_TO_DEST = 0,
     13 	O_RANDOM,
     14 	O_PERSISTENT,
     15 	O_X_TO_DEST, /* hidden flag */
     16 	F_TO_DEST   = 1 << O_TO_DEST,
     17 	F_RANDOM    = 1 << O_RANDOM,
     18 	F_X_TO_DEST = 1 << O_X_TO_DEST,
     19 };
     20 
     21 /* Dest NAT data consists of a multi-range, indicating where to map
     22    to. */
     23 struct ipt_natinfo
     24 {
     25 	struct xt_entry_target t;
     26 	struct nf_nat_ipv4_multi_range_compat mr;
     27 };
     28 
     29 static void DNAT_help(void)
     30 {
     31 	printf(
     32 "DNAT target options:\n"
     33 " --to-destination [<ipaddr>[-<ipaddr>]][:port[-port]]\n"
     34 "				Address to map destination to.\n"
     35 "[--random] [--persistent]\n");
     36 }
     37 
     38 static const struct xt_option_entry DNAT_opts[] = {
     39 	{.name = "to-destination", .id = O_TO_DEST, .type = XTTYPE_STRING,
     40 	 .flags = XTOPT_MAND | XTOPT_MULTI},
     41 	{.name = "random", .id = O_RANDOM, .type = XTTYPE_NONE},
     42 	{.name = "persistent", .id = O_PERSISTENT, .type = XTTYPE_NONE},
     43 	XTOPT_TABLEEND,
     44 };
     45 
     46 static struct ipt_natinfo *
     47 append_range(struct ipt_natinfo *info, const struct nf_nat_ipv4_range *range)
     48 {
     49 	unsigned int size;
     50 
     51 	/* One rangesize already in struct ipt_natinfo */
     52 	size = XT_ALIGN(sizeof(*info) + info->mr.rangesize * sizeof(*range));
     53 
     54 	info = realloc(info, size);
     55 	if (!info)
     56 		xtables_error(OTHER_PROBLEM, "Out of memory\n");
     57 
     58 	info->t.u.target_size = size;
     59 	info->mr.range[info->mr.rangesize] = *range;
     60 	info->mr.rangesize++;
     61 
     62 	return info;
     63 }
     64 
     65 /* Ranges expected in network order. */
     66 static struct xt_entry_target *
     67 parse_to(const char *orig_arg, int portok, struct ipt_natinfo *info)
     68 {
     69 	struct nf_nat_ipv4_range range;
     70 	char *arg, *colon, *dash, *error;
     71 	const struct in_addr *ip;
     72 
     73 	arg = strdup(orig_arg);
     74 	if (arg == NULL)
     75 		xtables_error(RESOURCE_PROBLEM, "strdup");
     76 	memset(&range, 0, sizeof(range));
     77 	colon = strchr(arg, ':');
     78 
     79 	if (colon) {
     80 		int port;
     81 
     82 		if (!portok)
     83 			xtables_error(PARAMETER_PROBLEM,
     84 				   "Need TCP, UDP, SCTP or DCCP with port specification");
     85 
     86 		range.flags |= NF_NAT_RANGE_PROTO_SPECIFIED;
     87 
     88 		port = atoi(colon+1);
     89 		if (port <= 0 || port > 65535)
     90 			xtables_error(PARAMETER_PROBLEM,
     91 				   "Port `%s' not valid\n", colon+1);
     92 
     93 		error = strchr(colon+1, ':');
     94 		if (error)
     95 			xtables_error(PARAMETER_PROBLEM,
     96 				   "Invalid port:port syntax - use dash\n");
     97 
     98 		dash = strchr(colon, '-');
     99 		if (!dash) {
    100 			range.min.tcp.port
    101 				= range.max.tcp.port
    102 				= htons(port);
    103 		} else {
    104 			int maxport;
    105 
    106 			maxport = atoi(dash + 1);
    107 			if (maxport <= 0 || maxport > 65535)
    108 				xtables_error(PARAMETER_PROBLEM,
    109 					   "Port `%s' not valid\n", dash+1);
    110 			if (maxport < port)
    111 				/* People are stupid. */
    112 				xtables_error(PARAMETER_PROBLEM,
    113 					   "Port range `%s' funky\n", colon+1);
    114 			range.min.tcp.port = htons(port);
    115 			range.max.tcp.port = htons(maxport);
    116 		}
    117 		/* Starts with a colon? No IP info...*/
    118 		if (colon == arg) {
    119 			free(arg);
    120 			return &(append_range(info, &range)->t);
    121 		}
    122 		*colon = '\0';
    123 	}
    124 
    125 	range.flags |= NF_NAT_RANGE_MAP_IPS;
    126 	dash = strchr(arg, '-');
    127 	if (colon && dash && dash > colon)
    128 		dash = NULL;
    129 
    130 	if (dash)
    131 		*dash = '\0';
    132 
    133 	ip = xtables_numeric_to_ipaddr(arg);
    134 	if (!ip)
    135 		xtables_error(PARAMETER_PROBLEM, "Bad IP address \"%s\"\n",
    136 			   arg);
    137 	range.min_ip = ip->s_addr;
    138 	if (dash) {
    139 		ip = xtables_numeric_to_ipaddr(dash+1);
    140 		if (!ip)
    141 			xtables_error(PARAMETER_PROBLEM, "Bad IP address \"%s\"\n",
    142 				   dash+1);
    143 		range.max_ip = ip->s_addr;
    144 	} else
    145 		range.max_ip = range.min_ip;
    146 
    147 	free(arg);
    148 	return &(append_range(info, &range)->t);
    149 }
    150 
    151 static void DNAT_parse(struct xt_option_call *cb)
    152 {
    153 	const struct ipt_entry *entry = cb->xt_entry;
    154 	struct ipt_natinfo *info = (void *)(*cb->target);
    155 	int portok;
    156 
    157 	if (entry->ip.proto == IPPROTO_TCP
    158 	    || entry->ip.proto == IPPROTO_UDP
    159 	    || entry->ip.proto == IPPROTO_SCTP
    160 	    || entry->ip.proto == IPPROTO_DCCP
    161 	    || entry->ip.proto == IPPROTO_ICMP)
    162 		portok = 1;
    163 	else
    164 		portok = 0;
    165 
    166 	xtables_option_parse(cb);
    167 	switch (cb->entry->id) {
    168 	case O_TO_DEST:
    169 		if (cb->xflags & F_X_TO_DEST) {
    170 			if (!kernel_version)
    171 				get_kernel_version();
    172 			if (kernel_version > LINUX_VERSION(2, 6, 10))
    173 				xtables_error(PARAMETER_PROBLEM,
    174 					   "DNAT: Multiple --to-destination not supported");
    175 		}
    176 		*cb->target = parse_to(cb->arg, portok, info);
    177 		cb->xflags |= F_X_TO_DEST;
    178 		break;
    179 	case O_PERSISTENT:
    180 		info->mr.range[0].flags |= NF_NAT_RANGE_PERSISTENT;
    181 		break;
    182 	}
    183 }
    184 
    185 static void DNAT_fcheck(struct xt_fcheck_call *cb)
    186 {
    187 	static const unsigned int f = F_TO_DEST | F_RANDOM;
    188 	struct nf_nat_ipv4_multi_range_compat *mr = cb->data;
    189 
    190 	if ((cb->xflags & f) == f)
    191 		mr->range[0].flags |= NF_NAT_RANGE_PROTO_RANDOM;
    192 }
    193 
    194 static void print_range(const struct nf_nat_ipv4_range *r)
    195 {
    196 	if (r->flags & NF_NAT_RANGE_MAP_IPS) {
    197 		struct in_addr a;
    198 
    199 		a.s_addr = r->min_ip;
    200 		printf("%s", xtables_ipaddr_to_numeric(&a));
    201 		if (r->max_ip != r->min_ip) {
    202 			a.s_addr = r->max_ip;
    203 			printf("-%s", xtables_ipaddr_to_numeric(&a));
    204 		}
    205 	}
    206 	if (r->flags & NF_NAT_RANGE_PROTO_SPECIFIED) {
    207 		printf(":");
    208 		printf("%hu", ntohs(r->min.tcp.port));
    209 		if (r->max.tcp.port != r->min.tcp.port)
    210 			printf("-%hu", ntohs(r->max.tcp.port));
    211 	}
    212 }
    213 
    214 static void DNAT_print(const void *ip, const struct xt_entry_target *target,
    215                        int numeric)
    216 {
    217 	const struct ipt_natinfo *info = (const void *)target;
    218 	unsigned int i = 0;
    219 
    220 	printf(" to:");
    221 	for (i = 0; i < info->mr.rangesize; i++) {
    222 		print_range(&info->mr.range[i]);
    223 		if (info->mr.range[i].flags & NF_NAT_RANGE_PROTO_RANDOM)
    224 			printf(" random");
    225 		if (info->mr.range[i].flags & NF_NAT_RANGE_PERSISTENT)
    226 			printf(" persistent");
    227 	}
    228 }
    229 
    230 static void DNAT_save(const void *ip, const struct xt_entry_target *target)
    231 {
    232 	const struct ipt_natinfo *info = (const void *)target;
    233 	unsigned int i = 0;
    234 
    235 	for (i = 0; i < info->mr.rangesize; i++) {
    236 		printf(" --to-destination ");
    237 		print_range(&info->mr.range[i]);
    238 		if (info->mr.range[i].flags & NF_NAT_RANGE_PROTO_RANDOM)
    239 			printf(" --random");
    240 		if (info->mr.range[i].flags & NF_NAT_RANGE_PERSISTENT)
    241 			printf(" --persistent");
    242 	}
    243 }
    244 
    245 static void print_range_xlate(const struct nf_nat_ipv4_range *r,
    246 			struct xt_xlate *xl)
    247 {
    248 	if (r->flags & NF_NAT_RANGE_MAP_IPS) {
    249 		struct in_addr a;
    250 
    251 		a.s_addr = r->min_ip;
    252 		xt_xlate_add(xl, "%s", xtables_ipaddr_to_numeric(&a));
    253 		if (r->max_ip != r->min_ip) {
    254 			a.s_addr = r->max_ip;
    255 			xt_xlate_add(xl, "-%s", xtables_ipaddr_to_numeric(&a));
    256 		}
    257 	}
    258 	if (r->flags & NF_NAT_RANGE_PROTO_SPECIFIED) {
    259 		xt_xlate_add(xl, ":%hu", ntohs(r->min.tcp.port));
    260 		if (r->max.tcp.port != r->min.tcp.port)
    261 			xt_xlate_add(xl, "-%hu", ntohs(r->max.tcp.port));
    262 	}
    263 }
    264 
    265 static int DNAT_xlate(struct xt_xlate *xl,
    266 		      const struct xt_xlate_tg_params *params)
    267 {
    268 	const struct ipt_natinfo *info = (const void *)params->target;
    269 	unsigned int i = 0;
    270 	bool sep_need = false;
    271 	const char *sep = " ";
    272 
    273 	for (i = 0; i < info->mr.rangesize; i++) {
    274 		xt_xlate_add(xl, "dnat to ");
    275 		print_range_xlate(&info->mr.range[i], xl);
    276 		if (info->mr.range[i].flags & NF_NAT_RANGE_PROTO_RANDOM) {
    277 			xt_xlate_add(xl, " random");
    278 			sep_need = true;
    279 		}
    280 		if (info->mr.range[i].flags & NF_NAT_RANGE_PERSISTENT) {
    281 			if (sep_need)
    282 				sep = ",";
    283 			xt_xlate_add(xl, "%spersistent", sep);
    284 		}
    285 	}
    286 
    287 	return 1;
    288 }
    289 
    290 static struct xtables_target dnat_tg_reg = {
    291 	.name		= "DNAT",
    292 	.version	= XTABLES_VERSION,
    293 	.family		= NFPROTO_IPV4,
    294 	.size		= XT_ALIGN(sizeof(struct nf_nat_ipv4_multi_range_compat)),
    295 	.userspacesize	= XT_ALIGN(sizeof(struct nf_nat_ipv4_multi_range_compat)),
    296 	.help		= DNAT_help,
    297 	.x6_parse	= DNAT_parse,
    298 	.x6_fcheck	= DNAT_fcheck,
    299 	.print		= DNAT_print,
    300 	.save		= DNAT_save,
    301 	.x6_options	= DNAT_opts,
    302 	.xlate		= DNAT_xlate,
    303 };
    304 
    305 void _init(void)
    306 {
    307 	xtables_register_target(&dnat_tg_reg);
    308 }
    309