16fecd198SMichal Schmidt /* SANE connection tracking helper
26fecd198SMichal Schmidt  * (SANE = Scanner Access Now Easy)
36fecd198SMichal Schmidt  * For documentation about the SANE network protocol see
46fecd198SMichal Schmidt  * http://www.sane-project.org/html/doc015.html
56fecd198SMichal Schmidt  */
66fecd198SMichal Schmidt 
76fecd198SMichal Schmidt /* Copyright (C) 2007 Red Hat, Inc.
86fecd198SMichal Schmidt  * Author: Michal Schmidt <mschmidt@redhat.com>
96fecd198SMichal Schmidt  * Based on the FTP conntrack helper (net/netfilter/nf_conntrack_ftp.c):
106fecd198SMichal Schmidt  *  (C) 1999-2001 Paul `Rusty' Russell
116fecd198SMichal Schmidt  *  (C) 2002-2004 Netfilter Core Team <coreteam@netfilter.org>
126fecd198SMichal Schmidt  *  (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org>
136fecd198SMichal Schmidt  *  (C) 2003 Yasuyuki Kozakai @USAGI <yasuyuki.kozakai@toshiba.co.jp>
146fecd198SMichal Schmidt  *
156fecd198SMichal Schmidt  * This program is free software; you can redistribute it and/or modify
166fecd198SMichal Schmidt  * it under the terms of the GNU General Public License version 2 as
176fecd198SMichal Schmidt  * published by the Free Software Foundation.
186fecd198SMichal Schmidt  */
196fecd198SMichal Schmidt 
20ad6d9503SPablo Neira Ayuso #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21ad6d9503SPablo Neira Ayuso 
226fecd198SMichal Schmidt #include <linux/module.h>
236fecd198SMichal Schmidt #include <linux/moduleparam.h>
246fecd198SMichal Schmidt #include <linux/netfilter.h>
255a0e3ad6STejun Heo #include <linux/slab.h>
266fecd198SMichal Schmidt #include <linux/in.h>
276fecd198SMichal Schmidt #include <linux/tcp.h>
286fecd198SMichal Schmidt #include <net/netfilter/nf_conntrack.h>
296fecd198SMichal Schmidt #include <net/netfilter/nf_conntrack_helper.h>
306fecd198SMichal Schmidt #include <net/netfilter/nf_conntrack_expect.h>
316fecd198SMichal Schmidt #include <linux/netfilter/nf_conntrack_sane.h>
326fecd198SMichal Schmidt 
336fecd198SMichal Schmidt MODULE_LICENSE("GPL");
346fecd198SMichal Schmidt MODULE_AUTHOR("Michal Schmidt <mschmidt@redhat.com>");
356fecd198SMichal Schmidt MODULE_DESCRIPTION("SANE connection tracking helper");
364dc06f96SPablo Neira Ayuso MODULE_ALIAS_NFCT_HELPER("sane");
376fecd198SMichal Schmidt 
386fecd198SMichal Schmidt static char *sane_buffer;
396fecd198SMichal Schmidt 
406fecd198SMichal Schmidt static DEFINE_SPINLOCK(nf_sane_lock);
416fecd198SMichal Schmidt 
426fecd198SMichal Schmidt #define MAX_PORTS 8
436fecd198SMichal Schmidt static u_int16_t ports[MAX_PORTS];
446fecd198SMichal Schmidt static unsigned int ports_c;
456fecd198SMichal Schmidt module_param_array(ports, ushort, &ports_c, 0400);
466fecd198SMichal Schmidt 
476fecd198SMichal Schmidt struct sane_request {
486fecd198SMichal Schmidt 	__be32 RPC_code;
496fecd198SMichal Schmidt #define SANE_NET_START      7   /* RPC code */
506fecd198SMichal Schmidt 
516fecd198SMichal Schmidt 	__be32 handle;
526fecd198SMichal Schmidt };
536fecd198SMichal Schmidt 
546fecd198SMichal Schmidt struct sane_reply_net_start {
556fecd198SMichal Schmidt 	__be32 status;
566fecd198SMichal Schmidt #define SANE_STATUS_SUCCESS 0
576fecd198SMichal Schmidt 
586fecd198SMichal Schmidt 	__be16 zero;
596fecd198SMichal Schmidt 	__be16 port;
606fecd198SMichal Schmidt 	/* other fields aren't interesting for conntrack */
616fecd198SMichal Schmidt };
626fecd198SMichal Schmidt 
633db05feaSHerbert Xu static int help(struct sk_buff *skb,
646fecd198SMichal Schmidt 		unsigned int protoff,
656fecd198SMichal Schmidt 		struct nf_conn *ct,
666fecd198SMichal Schmidt 		enum ip_conntrack_info ctinfo)
676fecd198SMichal Schmidt {
686fecd198SMichal Schmidt 	unsigned int dataoff, datalen;
6902e23f40SJan Engelhardt 	const struct tcphdr *th;
7002e23f40SJan Engelhardt 	struct tcphdr _tcph;
7102e23f40SJan Engelhardt 	void *sb_ptr;
726fecd198SMichal Schmidt 	int ret = NF_ACCEPT;
736fecd198SMichal Schmidt 	int dir = CTINFO2DIR(ctinfo);
741afc5679SPablo Neira Ayuso 	struct nf_ct_sane_master *ct_sane_info = nfct_help_data(ct);
756fecd198SMichal Schmidt 	struct nf_conntrack_expect *exp;
766fecd198SMichal Schmidt 	struct nf_conntrack_tuple *tuple;
776fecd198SMichal Schmidt 	struct sane_request *req;
786fecd198SMichal Schmidt 	struct sane_reply_net_start *reply;
796fecd198SMichal Schmidt 
806fecd198SMichal Schmidt 	/* Until there's been traffic both ways, don't look in packets. */
816fecd198SMichal Schmidt 	if (ctinfo != IP_CT_ESTABLISHED &&
82fb048833SEric Dumazet 	    ctinfo != IP_CT_ESTABLISHED_REPLY)
836fecd198SMichal Schmidt 		return NF_ACCEPT;
846fecd198SMichal Schmidt 
856fecd198SMichal Schmidt 	/* Not a full tcp header? */
863db05feaSHerbert Xu 	th = skb_header_pointer(skb, protoff, sizeof(_tcph), &_tcph);
876fecd198SMichal Schmidt 	if (th == NULL)
886fecd198SMichal Schmidt 		return NF_ACCEPT;
896fecd198SMichal Schmidt 
906fecd198SMichal Schmidt 	/* No data? */
916fecd198SMichal Schmidt 	dataoff = protoff + th->doff * 4;
923db05feaSHerbert Xu 	if (dataoff >= skb->len)
936fecd198SMichal Schmidt 		return NF_ACCEPT;
946fecd198SMichal Schmidt 
953db05feaSHerbert Xu 	datalen = skb->len - dataoff;
966fecd198SMichal Schmidt 
976fecd198SMichal Schmidt 	spin_lock_bh(&nf_sane_lock);
983db05feaSHerbert Xu 	sb_ptr = skb_header_pointer(skb, dataoff, datalen, sane_buffer);
996fecd198SMichal Schmidt 	BUG_ON(sb_ptr == NULL);
1006fecd198SMichal Schmidt 
1016fecd198SMichal Schmidt 	if (dir == IP_CT_DIR_ORIGINAL) {
1026fecd198SMichal Schmidt 		if (datalen != sizeof(struct sane_request))
1036fecd198SMichal Schmidt 			goto out;
1046fecd198SMichal Schmidt 
10502e23f40SJan Engelhardt 		req = sb_ptr;
1066fecd198SMichal Schmidt 		if (req->RPC_code != htonl(SANE_NET_START)) {
1076fecd198SMichal Schmidt 			/* Not an interesting command */
1086fecd198SMichal Schmidt 			ct_sane_info->state = SANE_STATE_NORMAL;
1096fecd198SMichal Schmidt 			goto out;
1106fecd198SMichal Schmidt 		}
1116fecd198SMichal Schmidt 
1126fecd198SMichal Schmidt 		/* We're interested in the next reply */
1136fecd198SMichal Schmidt 		ct_sane_info->state = SANE_STATE_START_REQUESTED;
1146fecd198SMichal Schmidt 		goto out;
1156fecd198SMichal Schmidt 	}
1166fecd198SMichal Schmidt 
1176fecd198SMichal Schmidt 	/* Is it a reply to an uninteresting command? */
1186fecd198SMichal Schmidt 	if (ct_sane_info->state != SANE_STATE_START_REQUESTED)
1196fecd198SMichal Schmidt 		goto out;
1206fecd198SMichal Schmidt 
1216fecd198SMichal Schmidt 	/* It's a reply to SANE_NET_START. */
1226fecd198SMichal Schmidt 	ct_sane_info->state = SANE_STATE_NORMAL;
1236fecd198SMichal Schmidt 
1246fecd198SMichal Schmidt 	if (datalen < sizeof(struct sane_reply_net_start)) {
125ad6d9503SPablo Neira Ayuso 		pr_debug("NET_START reply too short\n");
1266fecd198SMichal Schmidt 		goto out;
1276fecd198SMichal Schmidt 	}
1286fecd198SMichal Schmidt 
12902e23f40SJan Engelhardt 	reply = sb_ptr;
1306fecd198SMichal Schmidt 	if (reply->status != htonl(SANE_STATUS_SUCCESS)) {
1316fecd198SMichal Schmidt 		/* saned refused the command */
132ad6d9503SPablo Neira Ayuso 		pr_debug("unsuccessful SANE_STATUS = %u\n",
1336fecd198SMichal Schmidt 			 ntohl(reply->status));
1346fecd198SMichal Schmidt 		goto out;
1356fecd198SMichal Schmidt 	}
1366fecd198SMichal Schmidt 
1376fecd198SMichal Schmidt 	/* Invalid saned reply? Ignore it. */
1386fecd198SMichal Schmidt 	if (reply->zero != 0)
1396fecd198SMichal Schmidt 		goto out;
1406fecd198SMichal Schmidt 
1416823645dSPatrick McHardy 	exp = nf_ct_expect_alloc(ct);
1426fecd198SMichal Schmidt 	if (exp == NULL) {
143b20ab9ccSPablo Neira Ayuso 		nf_ct_helper_log(skb, ct, "cannot alloc expectation");
1446fecd198SMichal Schmidt 		ret = NF_DROP;
1456fecd198SMichal Schmidt 		goto out;
1466fecd198SMichal Schmidt 	}
1476fecd198SMichal Schmidt 
1486fecd198SMichal Schmidt 	tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
1495e8fbe2aSPatrick McHardy 	nf_ct_expect_init(exp, NF_CT_EXPECT_CLASS_DEFAULT, nf_ct_l3num(ct),
1506002f266SPatrick McHardy 			  &tuple->src.u3, &tuple->dst.u3,
1516823645dSPatrick McHardy 			  IPPROTO_TCP, NULL, &reply->port);
1526fecd198SMichal Schmidt 
153ad6d9503SPablo Neira Ayuso 	pr_debug("expect: ");
1543c9fba65SJan Engelhardt 	nf_ct_dump_tuple(&exp->tuple);
1556fecd198SMichal Schmidt 
1566fecd198SMichal Schmidt 	/* Can't expect this?  Best to drop packet now. */
157b20ab9ccSPablo Neira Ayuso 	if (nf_ct_expect_related(exp) != 0) {
158b20ab9ccSPablo Neira Ayuso 		nf_ct_helper_log(skb, ct, "cannot add expectation");
1596fecd198SMichal Schmidt 		ret = NF_DROP;
160b20ab9ccSPablo Neira Ayuso 	}
1616fecd198SMichal Schmidt 
1626823645dSPatrick McHardy 	nf_ct_expect_put(exp);
1636fecd198SMichal Schmidt 
1646fecd198SMichal Schmidt out:
1656fecd198SMichal Schmidt 	spin_unlock_bh(&nf_sane_lock);
1666fecd198SMichal Schmidt 	return ret;
1676fecd198SMichal Schmidt }
1686fecd198SMichal Schmidt 
16982de0be6SGao Feng static struct nf_conntrack_helper sane[MAX_PORTS * 2] __read_mostly;
1706fecd198SMichal Schmidt 
1716002f266SPatrick McHardy static const struct nf_conntrack_expect_policy sane_exp_policy = {
1726002f266SPatrick McHardy 	.max_expected	= 1,
1736002f266SPatrick McHardy 	.timeout	= 5 * 60,
1746002f266SPatrick McHardy };
1756002f266SPatrick McHardy 
1766fecd198SMichal Schmidt /* don't make this __exit, since it's called from __init ! */
1776fecd198SMichal Schmidt static void nf_conntrack_sane_fini(void)
1786fecd198SMichal Schmidt {
17982de0be6SGao Feng 	nf_conntrack_helpers_unregister(sane, ports_c * 2);
1806fecd198SMichal Schmidt 	kfree(sane_buffer);
1816fecd198SMichal Schmidt }
1826fecd198SMichal Schmidt 
1836fecd198SMichal Schmidt static int __init nf_conntrack_sane_init(void)
1846fecd198SMichal Schmidt {
18582de0be6SGao Feng 	int i, ret = 0;
1866fecd198SMichal Schmidt 
1876fecd198SMichal Schmidt 	sane_buffer = kmalloc(65536, GFP_KERNEL);
1886fecd198SMichal Schmidt 	if (!sane_buffer)
1896fecd198SMichal Schmidt 		return -ENOMEM;
1906fecd198SMichal Schmidt 
1916fecd198SMichal Schmidt 	if (ports_c == 0)
1926fecd198SMichal Schmidt 		ports[ports_c++] = SANE_PORT;
1936fecd198SMichal Schmidt 
1946fecd198SMichal Schmidt 	/* FIXME should be configurable whether IPv4 and IPv6 connections
1956fecd198SMichal Schmidt 		 are tracked or not - YK */
1966fecd198SMichal Schmidt 	for (i = 0; i < ports_c; i++) {
19782de0be6SGao Feng 		nf_ct_helper_init(&sane[2 * i], AF_INET, IPPROTO_TCP, "sane",
19882de0be6SGao Feng 				  SANE_PORT, ports[i], ports[i],
19982de0be6SGao Feng 				  &sane_exp_policy, 0,
20082de0be6SGao Feng 				  sizeof(struct nf_ct_sane_master), help, NULL,
20182de0be6SGao Feng 				  THIS_MODULE);
20282de0be6SGao Feng 		nf_ct_helper_init(&sane[2 * i + 1], AF_INET6, IPPROTO_TCP, "sane",
20382de0be6SGao Feng 				  SANE_PORT, ports[i], ports[i],
20482de0be6SGao Feng 				  &sane_exp_policy, 0,
20582de0be6SGao Feng 				  sizeof(struct nf_ct_sane_master), help, NULL,
20682de0be6SGao Feng 				  THIS_MODULE);
20782de0be6SGao Feng 	}
2086fecd198SMichal Schmidt 
20982de0be6SGao Feng 	ret = nf_conntrack_helpers_register(sane, ports_c * 2);
21082de0be6SGao Feng 	if (ret < 0) {
21182de0be6SGao Feng 		pr_err("failed to register helpers\n");
21282de0be6SGao Feng 		kfree(sane_buffer);
2136fecd198SMichal Schmidt 		return ret;
2146fecd198SMichal Schmidt 	}
2156fecd198SMichal Schmidt 
2166fecd198SMichal Schmidt 	return 0;
2176fecd198SMichal Schmidt }
2186fecd198SMichal Schmidt 
2196fecd198SMichal Schmidt module_init(nf_conntrack_sane_init);
2206fecd198SMichal Schmidt module_exit(nf_conntrack_sane_fini);
221