/* * Shared library add-on to iptables to add TPROXY target support. * * Copyright (C) 2002-2008 BalaBit IT Ltd. */ #include #include #include #include #include #include #include #include #include static const struct option tproxy_tg_opts[] = { { .name = "on-port", .has_arg = 1, .val = '1'}, { .name = "on-ip", .has_arg = 1, .val = '2'}, { .name = "tproxy-mark", .has_arg = 1, .val = '3'}, {NULL}, }; enum { PARAM_ONPORT = 1 << 0, PARAM_ONIP = 1 << 1, PARAM_MARK = 1 << 2, }; static void tproxy_tg_help(void) { printf( "TPROXY target options:\n" " --on-port port Redirect connection to port, or the original port if 0\n" " --on-ip ip Optionally redirect to the given IP\n" " --tproxy-mark value[/mask] Mark packets with the given value/mask\n\n"); } static void parse_tproxy_lport(const char *s, struct xt_tproxy_target_info *info) { unsigned int lport; if (xtables_strtoui(s, NULL, &lport, 0, UINT16_MAX)) info->lport = htons(lport); else xtables_param_act(XTF_BAD_VALUE, "TPROXY", "--on-port", s); } static void parse_tproxy_laddr(const char *s, struct xt_tproxy_target_info *info) { struct in_addr *laddr; if ((laddr = xtables_numeric_to_ipaddr(s)) == NULL) xtables_param_act(XTF_BAD_VALUE, "TPROXY", "--on-ip", s); info->laddr = laddr->s_addr; } static void parse_tproxy_mark(char *s, struct xt_tproxy_target_info *info) { unsigned int value, mask = UINT32_MAX; char *end; if (!xtables_strtoui(s, &end, &value, 0, UINT32_MAX)) xtables_param_act(XTF_BAD_VALUE, "TPROXY", "--tproxy-mark", s); if (*end == '/') if (!xtables_strtoui(end + 1, &end, &mask, 0, UINT32_MAX)) xtables_param_act(XTF_BAD_VALUE, "TPROXY", "--tproxy-mark", s); if (*end != '\0') xtables_param_act(XTF_BAD_VALUE, "TPROXY", "--tproxy-mark", s); info->mark_mask = mask; info->mark_value = value; } static int tproxy_tg_parse(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_target **target) { struct xt_tproxy_target_info *tproxyinfo = (void *)(*target)->data; switch (c) { case '1': xtables_param_act(XTF_ONLY_ONCE, "TPROXY", "--on-port", *flags & PARAM_ONPORT); xtables_param_act(XTF_NO_INVERT, "TPROXY", "--on-port", invert); parse_tproxy_lport(optarg, tproxyinfo); *flags |= PARAM_ONPORT; return 1; case '2': xtables_param_act(XTF_ONLY_ONCE, "TPROXY", "--on-ip", *flags & PARAM_ONIP); xtables_param_act(XTF_NO_INVERT, "TPROXY", "--on-ip", invert); parse_tproxy_laddr(optarg, tproxyinfo); *flags |= PARAM_ONIP; return 1; case '3': xtables_param_act(XTF_ONLY_ONCE, "TPROXY", "--tproxy-mark", *flags & PARAM_MARK); xtables_param_act(XTF_NO_INVERT, "TPROXY", "--tproxy-mark", invert); parse_tproxy_mark(optarg, tproxyinfo); *flags |= PARAM_MARK; return 1; } return 0; } static void tproxy_tg_check(unsigned int flags) { if (!(flags & PARAM_ONPORT)) xtables_error(PARAMETER_PROBLEM, "TPROXY target: Parameter --on-port is required"); } static void tproxy_tg_print(const void *ip, const struct xt_entry_target *target, int numeric) { const struct xt_tproxy_target_info *info = (const void *)target->data; printf("TPROXY redirect %s:%u mark 0x%x/0x%x", xtables_ipaddr_to_numeric((const struct in_addr *)&info->laddr), ntohs(info->lport), (unsigned int)info->mark_value, (unsigned int)info->mark_mask); } static void tproxy_tg_save(const void *ip, const struct xt_entry_target *target) { const struct xt_tproxy_target_info *info = (const void *)target->data; printf("--on-port %u ", ntohs(info->lport)); printf("--on-ip %s ", xtables_ipaddr_to_numeric((const struct in_addr *)&info->laddr)); printf("--tproxy-mark 0x%x/0x%x ", (unsigned int)info->mark_value, (unsigned int)info->mark_mask); } static struct xtables_target tproxy_tg_reg = { .name = "TPROXY", .family = NFPROTO_IPV4, .version = XTABLES_VERSION, .size = XT_ALIGN(sizeof(struct xt_tproxy_target_info)), .userspacesize = XT_ALIGN(sizeof(struct xt_tproxy_target_info)), .help = tproxy_tg_help, .parse = tproxy_tg_parse, .final_check = tproxy_tg_check, .print = tproxy_tg_print, .save = tproxy_tg_save, .extra_opts = tproxy_tg_opts, }; void _init(void) { xtables_register_target(&tproxy_tg_reg); }