1dc5ab2faSYasuyuki Kozakai /* Kernel module to match ESP parameters. */ 2dc5ab2faSYasuyuki Kozakai 3dc5ab2faSYasuyuki Kozakai /* (C) 1999-2000 Yon Uriarte <yon@astaro.de> 4dc5ab2faSYasuyuki Kozakai * 5dc5ab2faSYasuyuki Kozakai * This program is free software; you can redistribute it and/or modify 6dc5ab2faSYasuyuki Kozakai * it under the terms of the GNU General Public License version 2 as 7dc5ab2faSYasuyuki Kozakai * published by the Free Software Foundation. 8dc5ab2faSYasuyuki Kozakai */ 9dc5ab2faSYasuyuki Kozakai 10dc5ab2faSYasuyuki Kozakai #include <linux/module.h> 11dc5ab2faSYasuyuki Kozakai #include <linux/skbuff.h> 12dc5ab2faSYasuyuki Kozakai #include <linux/in.h> 13dc5ab2faSYasuyuki Kozakai #include <linux/ip.h> 14dc5ab2faSYasuyuki Kozakai 15dc5ab2faSYasuyuki Kozakai #include <linux/netfilter/xt_esp.h> 16dc5ab2faSYasuyuki Kozakai #include <linux/netfilter/x_tables.h> 17dc5ab2faSYasuyuki Kozakai 18dc5ab2faSYasuyuki Kozakai #include <linux/netfilter_ipv4/ip_tables.h> 19dc5ab2faSYasuyuki Kozakai #include <linux/netfilter_ipv6/ip6_tables.h> 20dc5ab2faSYasuyuki Kozakai 21dc5ab2faSYasuyuki Kozakai MODULE_LICENSE("GPL"); 22dc5ab2faSYasuyuki Kozakai MODULE_AUTHOR("Yon Uriarte <yon@astaro.de>"); 232ae15b64SJan Engelhardt MODULE_DESCRIPTION("Xtables: IPsec-ESP packet match"); 24dc5ab2faSYasuyuki Kozakai MODULE_ALIAS("ipt_esp"); 25dc5ab2faSYasuyuki Kozakai MODULE_ALIAS("ip6t_esp"); 26dc5ab2faSYasuyuki Kozakai 27dc5ab2faSYasuyuki Kozakai #if 0 28dc5ab2faSYasuyuki Kozakai #define duprintf(format, args...) printk(format , ## args) 29dc5ab2faSYasuyuki Kozakai #else 30dc5ab2faSYasuyuki Kozakai #define duprintf(format, args...) 31dc5ab2faSYasuyuki Kozakai #endif 32dc5ab2faSYasuyuki Kozakai 33dc5ab2faSYasuyuki Kozakai /* Returns 1 if the spi is matched by the range, 0 otherwise */ 341d93a9cbSJan Engelhardt static inline bool 351d93a9cbSJan Engelhardt spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert) 36dc5ab2faSYasuyuki Kozakai { 371d93a9cbSJan Engelhardt bool r; 38dc5ab2faSYasuyuki Kozakai duprintf("esp spi_match:%c 0x%x <= 0x%x <= 0x%x", invert ? '!' : ' ', 39dc5ab2faSYasuyuki Kozakai min, spi, max); 40dc5ab2faSYasuyuki Kozakai r = (spi >= min && spi <= max) ^ invert; 41dc5ab2faSYasuyuki Kozakai duprintf(" result %s\n", r ? "PASS" : "FAILED"); 42dc5ab2faSYasuyuki Kozakai return r; 43dc5ab2faSYasuyuki Kozakai } 44dc5ab2faSYasuyuki Kozakai 45f7108a20SJan Engelhardt static bool esp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 46dc5ab2faSYasuyuki Kozakai { 473cf93c96SJan Engelhardt const struct ip_esp_hdr *eh; 483cf93c96SJan Engelhardt struct ip_esp_hdr _esp; 49f7108a20SJan Engelhardt const struct xt_esp *espinfo = par->matchinfo; 50dc5ab2faSYasuyuki Kozakai 51dc5ab2faSYasuyuki Kozakai /* Must not be a fragment. */ 52f7108a20SJan Engelhardt if (par->fragoff != 0) 531d93a9cbSJan Engelhardt return false; 54dc5ab2faSYasuyuki Kozakai 55f7108a20SJan Engelhardt eh = skb_header_pointer(skb, par->thoff, sizeof(_esp), &_esp); 56dc5ab2faSYasuyuki Kozakai if (eh == NULL) { 57dc5ab2faSYasuyuki Kozakai /* We've been asked to examine this packet, and we 58dc5ab2faSYasuyuki Kozakai * can't. Hence, no choice but to drop. 59dc5ab2faSYasuyuki Kozakai */ 60dc5ab2faSYasuyuki Kozakai duprintf("Dropping evil ESP tinygram.\n"); 61f7108a20SJan Engelhardt *par->hotdrop = true; 621d93a9cbSJan Engelhardt return false; 63dc5ab2faSYasuyuki Kozakai } 64dc5ab2faSYasuyuki Kozakai 65dc5ab2faSYasuyuki Kozakai return spi_match(espinfo->spis[0], espinfo->spis[1], ntohl(eh->spi), 66dc5ab2faSYasuyuki Kozakai !!(espinfo->invflags & XT_ESP_INV_SPI)); 67dc5ab2faSYasuyuki Kozakai } 68dc5ab2faSYasuyuki Kozakai 699b4fce7aSJan Engelhardt static bool esp_mt_check(const struct xt_mtchk_param *par) 70dc5ab2faSYasuyuki Kozakai { 719b4fce7aSJan Engelhardt const struct xt_esp *espinfo = par->matchinfo; 72dc5ab2faSYasuyuki Kozakai 73dc5ab2faSYasuyuki Kozakai if (espinfo->invflags & ~XT_ESP_INV_MASK) { 74dc5ab2faSYasuyuki Kozakai duprintf("xt_esp: unknown flags %X\n", espinfo->invflags); 75ccb79bdcSJan Engelhardt return false; 76dc5ab2faSYasuyuki Kozakai } 77dc5ab2faSYasuyuki Kozakai 78ccb79bdcSJan Engelhardt return true; 79dc5ab2faSYasuyuki Kozakai } 80dc5ab2faSYasuyuki Kozakai 81d3c5ee6dSJan Engelhardt static struct xt_match esp_mt_reg[] __read_mostly = { 824470bbc7SPatrick McHardy { 83dc5ab2faSYasuyuki Kozakai .name = "esp", 84ee999d8bSJan Engelhardt .family = NFPROTO_IPV4, 85d3c5ee6dSJan Engelhardt .checkentry = esp_mt_check, 86d3c5ee6dSJan Engelhardt .match = esp_mt, 87dc5ab2faSYasuyuki Kozakai .matchsize = sizeof(struct xt_esp), 884470bbc7SPatrick McHardy .proto = IPPROTO_ESP, 89dc5ab2faSYasuyuki Kozakai .me = THIS_MODULE, 904470bbc7SPatrick McHardy }, 914470bbc7SPatrick McHardy { 92dc5ab2faSYasuyuki Kozakai .name = "esp", 93ee999d8bSJan Engelhardt .family = NFPROTO_IPV6, 94d3c5ee6dSJan Engelhardt .checkentry = esp_mt_check, 95d3c5ee6dSJan Engelhardt .match = esp_mt, 96dc5ab2faSYasuyuki Kozakai .matchsize = sizeof(struct xt_esp), 974470bbc7SPatrick McHardy .proto = IPPROTO_ESP, 98dc5ab2faSYasuyuki Kozakai .me = THIS_MODULE, 994470bbc7SPatrick McHardy }, 100dc5ab2faSYasuyuki Kozakai }; 101dc5ab2faSYasuyuki Kozakai 102d3c5ee6dSJan Engelhardt static int __init esp_mt_init(void) 103dc5ab2faSYasuyuki Kozakai { 104d3c5ee6dSJan Engelhardt return xt_register_matches(esp_mt_reg, ARRAY_SIZE(esp_mt_reg)); 105dc5ab2faSYasuyuki Kozakai } 106dc5ab2faSYasuyuki Kozakai 107d3c5ee6dSJan Engelhardt static void __exit esp_mt_exit(void) 108dc5ab2faSYasuyuki Kozakai { 109d3c5ee6dSJan Engelhardt xt_unregister_matches(esp_mt_reg, ARRAY_SIZE(esp_mt_reg)); 110dc5ab2faSYasuyuki Kozakai } 111dc5ab2faSYasuyuki Kozakai 112d3c5ee6dSJan Engelhardt module_init(esp_mt_init); 113d3c5ee6dSJan Engelhardt module_exit(esp_mt_exit); 114