/* Shared library add-on to iptables to add connection limit support. */ #include #include #include #include #include #include #include #include #include enum { FL_LIMIT = 1 << 0, FL_MASK = 1 << 1, FL_ADDR = 1 << 2, }; static void connlimit_help(void) { printf( "connlimit match options:\n" " --connlimit-upto n match if the number of existing connections is 0..n\n" " --connlimit-above n match if the number of existing connections is >n\n" " --connlimit-mask n group hosts using prefix length (default: max len)\n" " --connlimit-saddr select source address for grouping\n" " --connlimit-daddr select destination addresses for grouping\n"); } static const struct option connlimit_opts[] = { {.name = "connlimit-upto", .has_arg = true, .val = 'U'}, {.name = "connlimit-above", .has_arg = true, .val = 'A'}, {.name = "connlimit-mask", .has_arg = true, .val = 'M'}, {.name = "connlimit-saddr", .has_arg = false, .val = 's'}, {.name = "connlimit-daddr", .has_arg = false, .val = 'd'}, XT_GETOPT_TABLEEND, }; static void connlimit_init(struct xt_entry_match *match) { struct xt_connlimit_info *info = (void *)match->data; /* This will also initialize the v4 mask correctly */ memset(info->v6_mask, 0xFF, sizeof(info->v6_mask)); } static void prefix_to_netmask(uint32_t *mask, unsigned int prefix_len) { if (prefix_len == 0) { mask[0] = mask[1] = mask[2] = mask[3] = 0; } else if (prefix_len <= 32) { mask[0] <<= 32 - prefix_len; mask[1] = mask[2] = mask[3] = 0; } else if (prefix_len <= 64) { mask[1] <<= 32 - (prefix_len - 32); mask[2] = mask[3] = 0; } else if (prefix_len <= 96) { mask[2] <<= 32 - (prefix_len - 64); mask[3] = 0; } else if (prefix_len <= 128) { mask[3] <<= 32 - (prefix_len - 96); } mask[0] = htonl(mask[0]); mask[1] = htonl(mask[1]); mask[2] = htonl(mask[2]); mask[3] = htonl(mask[3]); } static int connlimit_parse(int c, char **argv, int invert, unsigned int *flags, struct xt_entry_match **match, unsigned int family) { struct xt_connlimit_info *info = (void *)(*match)->data; const unsigned int revision = (*match)->u.user.revision; char *err; int i; switch (c) { case 'A': /* --connlimit-above */ xtables_param_act(XTF_ONLY_ONCE, "connlimit", "--connlimit-{upto,above}", *flags & FL_LIMIT); *flags |= FL_LIMIT; if (invert) info->flags |= XT_CONNLIMIT_INVERT; info->limit = strtoul(optarg, NULL, 0); return true; case 'U': /* --connlimit-upto */ xtables_param_act(XTF_ONLY_ONCE, "connlimit", "--connlimit-{upto,above}", *flags & FL_LIMIT); *flags |= FL_LIMIT; if (!invert) info->flags |= XT_CONNLIMIT_INVERT; info->limit = strtoul(optarg, NULL, 0); return true; case 'M': /* --connlimit-mask */ xtables_param_act(XTF_NO_INVERT, "connlimit", "--connlimit-mask", invert); xtables_param_act(XTF_ONLY_ONCE, "connlimit", "--connlimit-mask", *flags & FL_MASK); *flags |= FL_MASK; i = strtoul(optarg, &err, 0); if (family == NFPROTO_IPV6) { if (i > 128 || *err != '\0') xtables_error(PARAMETER_PROBLEM, "--connlimit-mask must be between " "0 and 128"); prefix_to_netmask(info->v6_mask, i); } else { if (i > 32 || *err != '\0') xtables_error(PARAMETER_PROBLEM, "--connlimit-mask must be between " "0 and 32"); if (i == 0) info->v4_mask = 0; else info->v4_mask = htonl(0xFFFFFFFF << (32 - i)); } return true; case 's': /* --connlimit-saddr */ info->flags &= ~XT_CONNLIMIT_DADDR; return true; case 'd': /* --connlimit-daddr */ if (revision < 1) xtables_error(PARAMETER_PROBLEM, "xt_connlimit.0 does not support " "--connlimit-daddr"); info->flags |= XT_CONNLIMIT_DADDR; return true; } return false; } static int connlimit_parse4(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { return connlimit_parse(c, argv, invert, flags, match, NFPROTO_IPV4); } static int connlimit_parse6(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { return connlimit_parse(c, argv, invert, flags, match, NFPROTO_IPV6); } static void connlimit_check(unsigned int flags) { if (!(flags & 0x1)) xtables_error(PARAMETER_PROBLEM, "You must specify \"--connlimit-above\""); } static unsigned int count_bits4(uint32_t mask) { unsigned int bits = 0; for (mask = ~ntohl(mask); mask != 0; mask >>= 1) ++bits; return 32 - bits; } static unsigned int count_bits6(const uint32_t *mask) { unsigned int bits = 0, i; uint32_t tmp[4]; for (i = 0; i < 4; ++i) for (tmp[i] = ~ntohl(mask[i]); tmp[i] != 0; tmp[i] >>= 1) ++bits; return 128 - bits; } static void connlimit_print4(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_connlimit_info *info = (const void *)match->data; printf(" #conn %s/%u %s %u", (info->flags & XT_CONNLIMIT_DADDR) ? "dst" : "src", count_bits4(info->v4_mask), (info->flags & XT_CONNLIMIT_INVERT) ? "<=" : ">", info->limit); } static void connlimit_print6(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_connlimit_info *info = (const void *)match->data; printf(" #conn %s/%u %s %u", (info->flags & XT_CONNLIMIT_DADDR) ? "dst" : "src", count_bits6(info->v6_mask), (info->flags & XT_CONNLIMIT_INVERT) ? "<=" : ">", info->limit); } static void connlimit_save4(const void *ip, const struct xt_entry_match *match) { const struct xt_connlimit_info *info = (const void *)match->data; const int revision = match->u.user.revision; if (info->flags & XT_CONNLIMIT_INVERT) printf(" --connlimit-upto %u", info->limit); else printf(" --connlimit-above %u", info->limit); printf(" --connlimit-mask %u", count_bits4(info->v4_mask)); if (revision >= 1) { if (info->flags & XT_CONNLIMIT_DADDR) printf(" --connlimit-daddr"); else printf(" --connlimit-saddr"); } } static void connlimit_save6(const void *ip, const struct xt_entry_match *match) { const struct xt_connlimit_info *info = (const void *)match->data; const int revision = match->u.user.revision; if (info->flags & XT_CONNLIMIT_INVERT) printf(" --connlimit-upto %u", info->limit); else printf(" --connlimit-above %u", info->limit); printf(" --connlimit-mask %u", count_bits6(info->v6_mask)); if (revision >= 1) { if (info->flags & XT_CONNLIMIT_DADDR) printf(" --connlimit-daddr"); else printf(" --connlimit-saddr"); } } static struct xtables_match connlimit_mt_reg[] = { { .name = "connlimit", .revision = 0, .family = NFPROTO_IPV4, .version = XTABLES_VERSION, .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), .userspacesize = offsetof(struct xt_connlimit_info, data), .help = connlimit_help, .init = connlimit_init, .parse = connlimit_parse4, .final_check = connlimit_check, .print = connlimit_print4, .save = connlimit_save4, .extra_opts = connlimit_opts, }, { .name = "connlimit", .revision = 0, .family = NFPROTO_IPV6, .version = XTABLES_VERSION, .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), .userspacesize = offsetof(struct xt_connlimit_info, data), .help = connlimit_help, .init = connlimit_init, .parse = connlimit_parse6, .final_check = connlimit_check, .print = connlimit_print6, .save = connlimit_save6, .extra_opts = connlimit_opts, }, { .name = "connlimit", .revision = 1, .family = NFPROTO_IPV4, .version = XTABLES_VERSION, .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), .userspacesize = offsetof(struct xt_connlimit_info, data), .help = connlimit_help, .init = connlimit_init, .parse = connlimit_parse4, .final_check = connlimit_check, .print = connlimit_print4, .save = connlimit_save4, .extra_opts = connlimit_opts, }, { .name = "connlimit", .revision = 1, .family = NFPROTO_IPV6, .version = XTABLES_VERSION, .size = XT_ALIGN(sizeof(struct xt_connlimit_info)), .userspacesize = offsetof(struct xt_connlimit_info, data), .help = connlimit_help, .init = connlimit_init, .parse = connlimit_parse6, .final_check = connlimit_check, .print = connlimit_print6, .save = connlimit_save6, .extra_opts = connlimit_opts, }, }; void _init(void) { xtables_register_matches(connlimit_mt_reg, ARRAY_SIZE(connlimit_mt_reg)); }