/* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu> * Patrick Schaaf <bof@bof.de> * Martin Josefsson <gandalf@wlug.westbo.se> * Copyright (C) 2003-2010 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ /* Shared library add-on to iptables to add IP set matching. */ #include <stdbool.h> #include <stdio.h> #include <netdb.h> #include <string.h> #include <stdlib.h> #include <getopt.h> #include <ctype.h> #include <errno.h> #include <xtables.h> #include <linux/netfilter/xt_set.h> #include "libxt_set.h" /* Revision 0 */ static void set_help_v0(void) { printf("set match options:\n" " [!] --match-set name flags\n" " 'name' is the set name from to match,\n" " 'flags' are the comma separated list of\n" " 'src' and 'dst' specifications.\n"); } static const struct option set_opts_v0[] = { {.name = "match-set", .has_arg = true, .val = '1'}, {.name = "set", .has_arg = true, .val = '2'}, XT_GETOPT_TABLEEND, }; static void set_check_v0(unsigned int flags) { if (!flags) xtables_error(PARAMETER_PROBLEM, "You must specify `--match-set' with proper arguments"); } static int set_parse_v0(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { struct xt_set_info_match_v0 *myinfo = (struct xt_set_info_match_v0 *) (*match)->data; struct xt_set_info_v0 *info = &myinfo->match_set; switch (c) { case '2': fprintf(stderr, "--set option deprecated, please use --match-set\n"); case '1': /* --match-set <set> <flag>[,<flag> */ if (info->u.flags[0]) xtables_error(PARAMETER_PROBLEM, "--match-set can be specified only once"); if (invert) info->u.flags[0] |= IPSET_MATCH_INV; if (!argv[optind] || argv[optind][0] == '-' || argv[optind][0] == '!') xtables_error(PARAMETER_PROBLEM, "--match-set requires two args."); if (strlen(optarg) > IPSET_MAXNAMELEN - 1) xtables_error(PARAMETER_PROBLEM, "setname `%s' too long, max %d characters.", optarg, IPSET_MAXNAMELEN - 1); get_set_byname(optarg, (struct xt_set_info *)info); parse_dirs_v0(argv[optind], info); DEBUGP("parse: set index %u\n", info->index); optind++; *flags = 1; break; } return 1; } static void print_match_v0(const char *prefix, const struct xt_set_info_v0 *info) { int i; char setname[IPSET_MAXNAMELEN]; get_set_byid(setname, info->index); printf("%s %s %s", (info->u.flags[0] & IPSET_MATCH_INV) ? " !" : "", prefix, setname); for (i = 0; i < IPSET_DIM_MAX; i++) { if (!info->u.flags[i]) break; printf("%s%s", i == 0 ? " " : ",", info->u.flags[i] & IPSET_SRC ? "src" : "dst"); } } /* Prints out the matchinfo. */ static void set_print_v0(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_set_info_match_v0 *info = (const void *)match->data; print_match_v0("match-set", &info->match_set); } static void set_save_v0(const void *ip, const struct xt_entry_match *match) { const struct xt_set_info_match_v0 *info = (const void *)match->data; print_match_v0("--match-set", &info->match_set); } /* Revision 1 */ static int set_parse_v1(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { struct xt_set_info_match_v1 *myinfo = (struct xt_set_info_match_v1 *) (*match)->data; struct xt_set_info *info = &myinfo->match_set; switch (c) { case '2': fprintf(stderr, "--set option deprecated, please use --match-set\n"); case '1': /* --match-set <set> <flag>[,<flag> */ if (info->dim) xtables_error(PARAMETER_PROBLEM, "--match-set can be specified only once"); if (invert) info->flags |= IPSET_INV_MATCH; if (!argv[optind] || argv[optind][0] == '-' || argv[optind][0] == '!') xtables_error(PARAMETER_PROBLEM, "--match-set requires two args."); if (strlen(optarg) > IPSET_MAXNAMELEN - 1) xtables_error(PARAMETER_PROBLEM, "setname `%s' too long, max %d characters.", optarg, IPSET_MAXNAMELEN - 1); get_set_byname(optarg, info); parse_dirs(argv[optind], info); DEBUGP("parse: set index %u\n", info->index); optind++; *flags = 1; break; } return 1; } static void print_match(const char *prefix, const struct xt_set_info *info) { int i; char setname[IPSET_MAXNAMELEN]; get_set_byid(setname, info->index); printf("%s %s %s", (info->flags & IPSET_INV_MATCH) ? " !" : "", prefix, setname); for (i = 1; i <= info->dim; i++) { printf("%s%s", i == 1 ? " " : ",", info->flags & (1 << i) ? "src" : "dst"); } } /* Prints out the matchinfo. */ static void set_print_v1(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_set_info_match_v1 *info = (const void *)match->data; print_match("match-set", &info->match_set); } static void set_save_v1(const void *ip, const struct xt_entry_match *match) { const struct xt_set_info_match_v1 *info = (const void *)match->data; print_match("--match-set", &info->match_set); } /* Revision 2 */ static void set_help_v2(void) { printf("set match options:\n" " [!] --match-set name flags [--return-nomatch]\n" " 'name' is the set name from to match,\n" " 'flags' are the comma separated list of\n" " 'src' and 'dst' specifications.\n"); } static const struct option set_opts_v2[] = { {.name = "match-set", .has_arg = true, .val = '1'}, {.name = "set", .has_arg = true, .val = '2'}, {.name = "return-nomatch", .has_arg = false, .val = '3'}, XT_GETOPT_TABLEEND, }; static int set_parse_v2(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { struct xt_set_info_match_v1 *myinfo = (struct xt_set_info_match_v1 *) (*match)->data; struct xt_set_info *info = &myinfo->match_set; switch (c) { case '3': info->flags |= IPSET_RETURN_NOMATCH; break; case '2': fprintf(stderr, "--set option deprecated, please use --match-set\n"); case '1': /* --match-set <set> <flag>[,<flag> */ if (info->dim) xtables_error(PARAMETER_PROBLEM, "--match-set can be specified only once"); if (invert) info->flags |= IPSET_INV_MATCH; if (!argv[optind] || argv[optind][0] == '-' || argv[optind][0] == '!') xtables_error(PARAMETER_PROBLEM, "--match-set requires two args."); if (strlen(optarg) > IPSET_MAXNAMELEN - 1) xtables_error(PARAMETER_PROBLEM, "setname `%s' too long, max %d characters.", optarg, IPSET_MAXNAMELEN - 1); get_set_byname(optarg, info); parse_dirs(argv[optind], info); DEBUGP("parse: set index %u\n", info->index); optind++; *flags = 1; break; } return 1; } /* Prints out the matchinfo. */ static void set_print_v2(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_set_info_match_v1 *info = (const void *)match->data; print_match("match-set", &info->match_set); if (info->match_set.flags & IPSET_RETURN_NOMATCH) printf(" return-nomatch"); } static void set_save_v2(const void *ip, const struct xt_entry_match *match) { const struct xt_set_info_match_v1 *info = (const void *)match->data; print_match("--match-set", &info->match_set); if (info->match_set.flags & IPSET_RETURN_NOMATCH) printf(" --return-nomatch"); } /* Revision 3 */ static void set_help_v3(void) { printf("set match options:\n" " [!] --match-set name flags [--return-nomatch]\n" " [! --update-counters] [! --update-subcounters]\n" " [[!] --packets-eq value | --packets-lt value | --packets-gt value\n" " [[!] --bytes-eq value | --bytes-lt value | --bytes-gt value\n" " 'name' is the set name from to match,\n" " 'flags' are the comma separated list of\n" " 'src' and 'dst' specifications.\n"); } static const struct option set_opts_v3[] = { {.name = "match-set", .has_arg = true, .val = '1'}, {.name = "set", .has_arg = true, .val = '2'}, {.name = "return-nomatch", .has_arg = false, .val = '3'}, {.name = "update-counters", .has_arg = false, .val = '4'}, {.name = "packets-eq", .has_arg = true, .val = '5'}, {.name = "packets-lt", .has_arg = true, .val = '6'}, {.name = "packets-gt", .has_arg = true, .val = '7'}, {.name = "bytes-eq", .has_arg = true, .val = '8'}, {.name = "bytes-lt", .has_arg = true, .val = '9'}, {.name = "bytes-gt", .has_arg = true, .val = '0'}, {.name = "update-subcounters", .has_arg = false, .val = 'a'}, XT_GETOPT_TABLEEND, }; static uint64_t parse_counter(const char *opt) { uintmax_t value; if (!xtables_strtoul(opt, NULL, &value, 0, UINT64_MAX)) xtables_error(PARAMETER_PROBLEM, "Cannot parse %s as a counter value\n", opt); return (uint64_t)value; } static int set_parse_v3(int c, char **argv, int invert, unsigned int *flags, const void *entry, struct xt_entry_match **match) { struct xt_set_info_match_v3 *info = (struct xt_set_info_match_v3 *) (*match)->data; switch (c) { case 'a': if (invert) info->flags |= IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE; break; case '0': if (info->bytes.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --bytes-[eq|lt|gt]" " is allowed\n"); if (invert) xtables_error(PARAMETER_PROBLEM, "--bytes-gt option cannot be inverted\n"); info->bytes.op = IPSET_COUNTER_GT; info->bytes.value = parse_counter(optarg); break; case '9': if (info->bytes.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --bytes-[eq|lt|gt]" " is allowed\n"); if (invert) xtables_error(PARAMETER_PROBLEM, "--bytes-lt option cannot be inverted\n"); info->bytes.op = IPSET_COUNTER_LT; info->bytes.value = parse_counter(optarg); break; case '8': if (info->bytes.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --bytes-[eq|lt|gt]" " is allowed\n"); info->bytes.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ; info->bytes.value = parse_counter(optarg); break; case '7': if (info->packets.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --packets-[eq|lt|gt]" " is allowed\n"); if (invert) xtables_error(PARAMETER_PROBLEM, "--packets-gt option cannot be inverted\n"); info->packets.op = IPSET_COUNTER_GT; info->packets.value = parse_counter(optarg); break; case '6': if (info->packets.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --packets-[eq|lt|gt]" " is allowed\n"); if (invert) xtables_error(PARAMETER_PROBLEM, "--packets-lt option cannot be inverted\n"); info->packets.op = IPSET_COUNTER_LT; info->packets.value = parse_counter(optarg); break; case '5': if (info->packets.op != IPSET_COUNTER_NONE) xtables_error(PARAMETER_PROBLEM, "only one of the --packets-[eq|lt|gt]" " is allowed\n"); info->packets.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ; info->packets.value = parse_counter(optarg); break; case '4': if (invert) info->flags |= IPSET_FLAG_SKIP_COUNTER_UPDATE; break; case '3': if (invert) xtables_error(PARAMETER_PROBLEM, "--return-nomatch flag cannot be inverted\n"); info->flags |= IPSET_FLAG_RETURN_NOMATCH; break; case '2': fprintf(stderr, "--set option deprecated, please use --match-set\n"); case '1': /* --match-set <set> <flag>[,<flag> */ if (info->match_set.dim) xtables_error(PARAMETER_PROBLEM, "--match-set can be specified only once"); if (invert) info->match_set.flags |= IPSET_INV_MATCH; if (!argv[optind] || argv[optind][0] == '-' || argv[optind][0] == '!') xtables_error(PARAMETER_PROBLEM, "--match-set requires two args."); if (strlen(optarg) > IPSET_MAXNAMELEN - 1) xtables_error(PARAMETER_PROBLEM, "setname `%s' too long, max %d characters.", optarg, IPSET_MAXNAMELEN - 1); get_set_byname(optarg, &info->match_set); parse_dirs(argv[optind], &info->match_set); DEBUGP("parse: set index %u\n", info->match_set.index); optind++; *flags = 1; break; } return 1; } static void set_printv3_counter(const struct ip_set_counter_match *c, const char *name, const char *sep) { switch (c->op) { case IPSET_COUNTER_EQ: printf(" %s%s-eq %llu", sep, name, c->value); break; case IPSET_COUNTER_NE: printf(" ! %s%s-eq %llu", sep, name, c->value); break; case IPSET_COUNTER_LT: printf(" %s%s-lt %llu", sep, name, c->value); break; case IPSET_COUNTER_GT: printf(" %s%s-gt %llu", sep, name, c->value); break; } } static void set_print_v3_matchinfo(const struct xt_set_info_match_v3 *info, const char *opt, const char *sep) { print_match(opt, &info->match_set); if (info->flags & IPSET_FLAG_RETURN_NOMATCH) printf(" %sreturn-nomatch", sep); if ((info->flags & IPSET_FLAG_SKIP_COUNTER_UPDATE)) printf(" ! %supdate-counters", sep); if ((info->flags & IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE)) printf(" ! %supdate-subcounters", sep); set_printv3_counter(&info->packets, "packets", sep); set_printv3_counter(&info->bytes, "bytes", sep); } /* Prints out the matchinfo. */ static void set_print_v3(const void *ip, const struct xt_entry_match *match, int numeric) { const struct xt_set_info_match_v3 *info = (const void *)match->data; set_print_v3_matchinfo(info, "match-set", ""); } static void set_save_v3(const void *ip, const struct xt_entry_match *match) { const struct xt_set_info_match_v3 *info = (const void *)match->data; set_print_v3_matchinfo(info, "--match-set", "--"); } static struct xtables_match set_mt_reg[] = { { .name = "set", .revision = 0, .version = XTABLES_VERSION, .family = NFPROTO_IPV4, .size = XT_ALIGN(sizeof(struct xt_set_info_match_v0)), .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v0)), .help = set_help_v0, .parse = set_parse_v0, .final_check = set_check_v0, .print = set_print_v0, .save = set_save_v0, .extra_opts = set_opts_v0, }, { .name = "set", .revision = 1, .version = XTABLES_VERSION, .family = NFPROTO_UNSPEC, .size = XT_ALIGN(sizeof(struct xt_set_info_match_v1)), .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v1)), .help = set_help_v0, .parse = set_parse_v1, .final_check = set_check_v0, .print = set_print_v1, .save = set_save_v1, .extra_opts = set_opts_v0, }, { .name = "set", .revision = 2, .version = XTABLES_VERSION, .family = NFPROTO_UNSPEC, .size = XT_ALIGN(sizeof(struct xt_set_info_match_v1)), .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v1)), .help = set_help_v2, .parse = set_parse_v2, .final_check = set_check_v0, .print = set_print_v2, .save = set_save_v2, .extra_opts = set_opts_v2, }, { .name = "set", .revision = 3, .version = XTABLES_VERSION, .family = NFPROTO_UNSPEC, .size = XT_ALIGN(sizeof(struct xt_set_info_match_v3)), .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v3)), .help = set_help_v3, .parse = set_parse_v3, .final_check = set_check_v0, .print = set_print_v3, .save = set_save_v3, .extra_opts = set_opts_v3, }, }; void _init(void) { xtables_register_matches(set_mt_reg, ARRAY_SIZE(set_mt_reg)); }