libipt_REJECT.c 5.06 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
/* Shared library add-on to iptables to add customized REJECT support.
 *
 * (C) 2000 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
 */
#include <stdio.h>
#include <string.h>
#include <xtables.h>
#include <linux/netfilter_ipv4/ipt_REJECT.h>
#include <linux/version.h>

/* If we are compiling against a kernel that does not support
 * IPT_ICMP_ADMIN_PROHIBITED, we are emulating it.
 * The result will be a plain DROP of the packet instead of
 * reject. -- Maciej Soltysiak <solt@dns.toxicfilms.tv>
 */
#ifndef IPT_ICMP_ADMIN_PROHIBITED
#define IPT_ICMP_ADMIN_PROHIBITED	IPT_TCP_RESET + 1
#endif

struct reject_names {
	const char *name;
	const char *alias;
	const char *desc;
24
	const char *xlate;
25
26
};

27
28
29
30
31
enum {
	O_REJECT_WITH = 0,
};

static const struct reject_names reject_table[] = {
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
	[IPT_ICMP_NET_UNREACHABLE] = {
		"icmp-net-unreachable", "net-unreach",
		"ICMP network unreachable",
		"net-unreachable",
	},
	[IPT_ICMP_HOST_UNREACHABLE] = {
		"icmp-host-unreachable", "host-unreach",
		"ICMP host unreachable",
		"host-unreachable",
	},
	[IPT_ICMP_PROT_UNREACHABLE] = {
		"icmp-proto-unreachable", "proto-unreach",
		"ICMP protocol unreachable",
		"prot-unreachable",
	},
	[IPT_ICMP_PORT_UNREACHABLE] = {
		"icmp-port-unreachable", "port-unreach",
		"ICMP port unreachable (default)",
		"port-unreachable",
	},
52
#if 0
53
54
55
56
57
	[IPT_ICMP_ECHOREPLY] = {
		"echo-reply", "echoreply",
		"for ICMP echo only: faked ICMP echo reply",
		"echo-reply",
	},
58
#endif
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
	[IPT_ICMP_NET_PROHIBITED] = {
		"icmp-net-prohibited", "net-prohib",
		"ICMP network prohibited",
		"net-prohibited",
	},
	[IPT_ICMP_HOST_PROHIBITED] = {
		"icmp-host-prohibited", "host-prohib",
		"ICMP host prohibited",
		"host-prohibited",
	},
	[IPT_TCP_RESET] = {
		"tcp-reset", "tcp-rst",
		"TCP RST packet",
		"tcp reset",
	},
	[IPT_ICMP_ADMIN_PROHIBITED] = {
		"icmp-admin-prohibited", "admin-prohib",
		"ICMP administratively prohibited (*)",
		"admin-prohibited",
	},
79
80
81
82
83
84
85
86
87
88
};

static void
print_reject_types(void)
{
	unsigned int i;

	printf("Valid reject types:\n");

	for (i = 0; i < ARRAY_SIZE(reject_table); ++i) {
89
90
		if (!reject_table[i].name)
			continue;
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
		printf("    %-25s\t%s\n", reject_table[i].name, reject_table[i].desc);
		printf("    %-25s\talias\n", reject_table[i].alias);
	}
	printf("\n");
}

static void REJECT_help(void)
{
	printf(
"REJECT target options:\n"
"--reject-with type              drop input packet and send back\n"
"                                a reply packet according to type:\n");

	print_reject_types();

	printf("(*) See man page or read the INCOMPATIBILITES file for compatibility issues.\n");
}

static const struct xt_option_entry REJECT_opts[] = {
	{.name = "reject-with", .id = O_REJECT_WITH, .type = XTTYPE_STRING},
	XTOPT_TABLEEND,
};

static void REJECT_init(struct xt_entry_target *t)
{
	struct ipt_reject_info *reject = (struct ipt_reject_info *)t->data;

	/* default */
	reject->with = IPT_ICMP_PORT_UNREACHABLE;

}

static void REJECT_parse(struct xt_option_call *cb)
{
	struct ipt_reject_info *reject = cb->data;
	unsigned int i;

	xtables_option_parse(cb);
129
130
131
	for (i = 0; i < ARRAY_SIZE(reject_table); ++i) {
		if (!reject_table[i].name)
			continue;
132
133
134
135
		if (strncasecmp(reject_table[i].name,
		      cb->arg, strlen(cb->arg)) == 0 ||
		    strncasecmp(reject_table[i].alias,
		      cb->arg, strlen(cb->arg)) == 0) {
136
			reject->with = i;
137
138
			return;
		}
139
	}
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
	/* This due to be dropped late in 2.4 pre-release cycle --RR */
	if (strncasecmp("echo-reply", cb->arg, strlen(cb->arg)) == 0 ||
	    strncasecmp("echoreply", cb->arg, strlen(cb->arg)) == 0)
		fprintf(stderr, "--reject-with echo-reply no longer"
			" supported\n");
	xtables_error(PARAMETER_PROBLEM,
		"unknown reject type \"%s\"", cb->arg);
}

static void REJECT_print(const void *ip, const struct xt_entry_target *target,
                         int numeric)
{
	const struct ipt_reject_info *reject
		= (const struct ipt_reject_info *)target->data;

155
	printf(" reject-with %s", reject_table[reject->with].name);
156
157
158
159
}

static void REJECT_save(const void *ip, const struct xt_entry_target *target)
{
160
161
	const struct ipt_reject_info *reject =
		(const struct ipt_reject_info *)target->data;
162

163
	printf(" --reject-with %s", reject_table[reject->with].name);
164
165
}

166
167
168
169
170
171
172
173
174
175
static int REJECT_xlate(struct xt_xlate *xl,
			const struct xt_xlate_tg_params *params)
{
	const struct ipt_reject_info *reject =
		(const struct ipt_reject_info *)params->target->data;

	if (reject->with == IPT_ICMP_PORT_UNREACHABLE)
		xt_xlate_add(xl, "reject");
	else if (reject->with == IPT_TCP_RESET)
		xt_xlate_add(xl, "reject with %s",
176
			     reject_table[reject->with].xlate);
177
178
	else
		xt_xlate_add(xl, "reject with icmp type %s",
179
			     reject_table[reject->with].xlate);
180
181
182
183
184

	return 1;
}


185
186
187
188
189
190
191
192
193
194
195
196
static struct xtables_target reject_tg_reg = {
	.name		= "REJECT",
	.version	= XTABLES_VERSION,
	.family		= NFPROTO_IPV4,
	.size		= XT_ALIGN(sizeof(struct ipt_reject_info)),
	.userspacesize	= XT_ALIGN(sizeof(struct ipt_reject_info)),
	.help		= REJECT_help,
	.init		= REJECT_init,
	.print		= REJECT_print,
	.save		= REJECT_save,
	.x6_parse	= REJECT_parse,
	.x6_options	= REJECT_opts,
197
	.xlate		= REJECT_xlate,
198
199
200
201
202
203
};

void _init(void)
{
	xtables_register_target(&reject_tg_reg);
}