⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ipt_reject.c

📁 Linux内核源代码 为压缩文件 是<<Linux内核>>一书中的源代码
💻 C
字号:
/* * This is a module which is used for rejecting packets. * Added support for customized reject packets (Jozsef Kadlecsik). */#include <linux/config.h>#include <linux/module.h>#include <linux/skbuff.h>#include <linux/ip.h>#include <net/icmp.h>#include <net/ip.h>#include <net/tcp.h>struct in_device;#include <net/route.h>#include <linux/netfilter_ipv4/ip_tables.h>#include <linux/netfilter_ipv4/ipt_REJECT.h>#if 0#define DEBUGP printk#else#define DEBUGP(format, args...)#endif/* Send RST reply */static void send_reset(struct sk_buff *oldskb, int local){	struct sk_buff *nskb;	struct tcphdr *otcph, *tcph;	struct rtable *rt;	unsigned int otcplen;	u_int16_t tmp;	int needs_ack;	/* IP header checks: fragment, too short. */	if (oldskb->nh.iph->frag_off & htons(IP_OFFSET)	    || oldskb->len < (oldskb->nh.iph->ihl<<2) + sizeof(struct tcphdr))		return;	otcph = (struct tcphdr *)((u_int32_t*)oldskb->nh.iph + oldskb->nh.iph->ihl);	otcplen = oldskb->len - oldskb->nh.iph->ihl*4;	/* No RST for RST. */	if (otcph->rst)		return;	/* Check checksum. */	if (tcp_v4_check(otcph, otcplen, oldskb->nh.iph->saddr,			 oldskb->nh.iph->daddr,			 csum_partial((char *)otcph, otcplen, 0)) != 0)		return;	/* Copy skb (even if skb is about to be dropped, we can't just           clone it because there may be other things, such as tcpdump,           interested in it) */	nskb = skb_copy(oldskb, GFP_ATOMIC);	if (!nskb)		return;	/* This packet will not be the same as the other: clear nf fields */	nf_conntrack_put(nskb->nfct);	nskb->nfct = NULL;	nskb->nfcache = 0;#ifdef CONFIG_NETFILTER_DEBUG	nskb->nf_debug = 0;#endif	tcph = (struct tcphdr *)((u_int32_t*)nskb->nh.iph + nskb->nh.iph->ihl);	/* Swap source and dest */	nskb->nh.iph->daddr = xchg(&nskb->nh.iph->saddr, nskb->nh.iph->daddr);	tmp = tcph->source;	tcph->source = tcph->dest;	tcph->dest = tmp;	/* Truncate to length (no data) */	tcph->doff = sizeof(struct tcphdr)/4;	skb_trim(nskb, nskb->nh.iph->ihl*4 + sizeof(struct tcphdr));	nskb->nh.iph->tot_len = htons(nskb->len);	if (tcph->ack) {		needs_ack = 0;		tcph->seq = otcph->ack_seq;		tcph->ack_seq = 0;	} else {		needs_ack = 1;		tcph->ack_seq = htonl(ntohl(otcph->seq) + otcph->syn + otcph->fin				      + otcplen - (otcph->doff<<2));		tcph->seq = 0;	}	/* Reset flags */	((u_int8_t *)tcph)[13] = 0;	tcph->rst = 1;	tcph->ack = needs_ack;	tcph->window = 0;	tcph->urg_ptr = 0;	/* Adjust TCP checksum */	tcph->check = 0;	tcph->check = tcp_v4_check(tcph, sizeof(struct tcphdr),				   nskb->nh.iph->saddr,				   nskb->nh.iph->daddr,				   csum_partial((char *)tcph,						sizeof(struct tcphdr), 0));	/* Adjust IP TTL, DF */	nskb->nh.iph->ttl = MAXTTL;	/* Set DF, id = 0 */	nskb->nh.iph->frag_off = htons(IP_DF);	nskb->nh.iph->id = 0;	/* Adjust IP checksum */	nskb->nh.iph->check = 0;	nskb->nh.iph->check = ip_fast_csum((unsigned char *)nskb->nh.iph, 					   nskb->nh.iph->ihl);	/* Routing: if not headed for us, route won't like source */	if (ip_route_output(&rt, nskb->nh.iph->daddr,			    local ? nskb->nh.iph->saddr : 0,			    RT_TOS(nskb->nh.iph->tos) | RTO_CONN,			    0) != 0)		goto free_nskb;	dst_release(nskb->dst);	nskb->dst = &rt->u.dst;	/* "Never happens" */	if (nskb->len > nskb->dst->pmtu)		goto free_nskb;	NF_HOOK(PF_INET, NF_IP_LOCAL_OUT, nskb, NULL, nskb->dst->dev,		ip_finish_output);	return; free_nskb:	kfree_skb(nskb);}static unsigned int reject(struct sk_buff **pskb,			   unsigned int hooknum,			   const struct net_device *in,			   const struct net_device *out,			   const void *targinfo,			   void *userinfo){	const struct ipt_reject_info *reject = targinfo;	/* WARNING: This code causes reentry within iptables.	   This means that the iptables jump stack is now crap.  We	   must return an absolute verdict. --RR */    	switch (reject->with) {    	case IPT_ICMP_NET_UNREACHABLE:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_NET_UNREACH, 0);    		break;    	case IPT_ICMP_HOST_UNREACHABLE:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0);    		break;    	case IPT_ICMP_PROT_UNREACHABLE:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_PROT_UNREACH, 0);    		break;    	case IPT_ICMP_PORT_UNREACHABLE:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);    		break;    	case IPT_ICMP_NET_PROHIBITED:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_NET_ANO, 0);    		break;	case IPT_ICMP_HOST_PROHIBITED:    		icmp_send(*pskb, ICMP_DEST_UNREACH, ICMP_HOST_ANO, 0);    		break;    	case IPT_ICMP_ECHOREPLY: {		struct icmphdr *icmph  = (struct icmphdr *)			((u_int32_t *)(*pskb)->nh.iph + (*pskb)->nh.iph->ihl);		unsigned int datalen = (*pskb)->len - (*pskb)->nh.iph->ihl * 4;		/* Not non-head frags, or truncated */		if (((ntohs((*pskb)->nh.iph->frag_off) & IP_OFFSET) == 0)		    && datalen >= 4) {			/* Usually I don't like cut & pasting code,                           but dammit, my party is starting in 45                           mins! --RR */			struct icmp_bxm icmp_param;			icmp_param.icmph=*icmph;			icmp_param.icmph.type=ICMP_ECHOREPLY;			icmp_param.data_ptr=(icmph+1);			icmp_param.data_len=datalen;			icmp_reply(&icmp_param, *pskb);		}	}	break;	case IPT_TCP_RESET:		send_reset(*pskb, hooknum == NF_IP_LOCAL_IN);		break;	}	return NF_DROP;}static inline int find_ping_match(const struct ipt_entry_match *m){	const struct ipt_icmp *icmpinfo = (const struct ipt_icmp *)m->data;	if (strcmp(m->u.kernel.match->name, "icmp") == 0	    && icmpinfo->type == ICMP_ECHO	    && !(icmpinfo->invflags & IPT_ICMP_INV))		return 1;	return 0;}static int check(const char *tablename,		 const struct ipt_entry *e,		 void *targinfo,		 unsigned int targinfosize,		 unsigned int hook_mask){ 	const struct ipt_reject_info *rejinfo = targinfo; 	if (targinfosize != IPT_ALIGN(sizeof(struct ipt_icmp))) {  		DEBUGP("REJECT: targinfosize %u != 0\n", targinfosize);  		return 0;  	}	/* Only allow these for packet filtering. */	if (strcmp(tablename, "filter") != 0) {		DEBUGP("REJECT: bad table `%s'.\n", tablename);		return 0;	}	if ((hook_mask & ~((1 << NF_IP_LOCAL_IN)			   | (1 << NF_IP_FORWARD)			   | (1 << NF_IP_LOCAL_OUT))) != 0) {		DEBUGP("REJECT: bad hook mask %X\n", hook_mask);		return 0;	}	if (rejinfo->with == IPT_ICMP_ECHOREPLY) {		/* Must specify that it's an ICMP ping packet. */		if (e->ip.proto != IPPROTO_ICMP		    || (e->ip.invflags & IPT_INV_PROTO)) {			DEBUGP("REJECT: ECHOREPLY illegal for non-icmp\n");			return 0;		}		/* Must contain ICMP match. */		if (IPT_MATCH_ITERATE(e, find_ping_match) == 0) {			DEBUGP("REJECT: ECHOREPLY illegal for non-ping\n");			return 0;		}	} else if (rejinfo->with == IPT_TCP_RESET) {		/* Must specify that it's a TCP packet */		if (e->ip.proto != IPPROTO_TCP		    || (e->ip.invflags & IPT_INV_PROTO)) {			DEBUGP("REJECT: TCP_RESET illegal for non-tcp\n");			return 0;		}	}	return 1;}static struct ipt_target ipt_reject_reg= { { NULL, NULL }, "REJECT", reject, check, NULL, THIS_MODULE };static int __init init(void){	if (ipt_register_target(&ipt_reject_reg))		return -EINVAL;	return 0;}static void __exit fini(void){	ipt_unregister_target(&ipt_reject_reg);}module_init(init);module_exit(fini);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -