123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355 |
- /* Kernel module to match L2TP header parameters. */
- /* (C) 2013 James Chapman <jchapman@katalix.com>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 as
- * published by the Free Software Foundation.
- */
- #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
- #include <linux/module.h>
- #include <linux/skbuff.h>
- #include <linux/if_ether.h>
- #include <net/ip.h>
- #include <linux/ipv6.h>
- #include <net/ipv6.h>
- #include <net/udp.h>
- #include <linux/l2tp.h>
- #include <linux/netfilter_ipv4.h>
- #include <linux/netfilter_ipv6.h>
- #include <linux/netfilter_ipv4/ip_tables.h>
- #include <linux/netfilter_ipv6/ip6_tables.h>
- #include <linux/netfilter/x_tables.h>
- #include <linux/netfilter/xt_tcpudp.h>
- #include <linux/netfilter/xt_l2tp.h>
- /* L2TP header masks */
- #define L2TP_HDR_T_BIT 0x8000
- #define L2TP_HDR_L_BIT 0x4000
- #define L2TP_HDR_VER 0x000f
- MODULE_LICENSE("GPL");
- MODULE_AUTHOR("James Chapman <jchapman@katalix.com>");
- MODULE_DESCRIPTION("Xtables: L2TP header match");
- MODULE_ALIAS("ipt_l2tp");
- MODULE_ALIAS("ip6t_l2tp");
- /* The L2TP fields that can be matched */
- struct l2tp_data {
- u32 tid;
- u32 sid;
- u8 type;
- u8 version;
- };
- union l2tp_val {
- __be16 val16[2];
- __be32 val32;
- };
- static bool l2tp_match(const struct xt_l2tp_info *info, struct l2tp_data *data)
- {
- if ((info->flags & XT_L2TP_TYPE) && (info->type != data->type))
- return false;
- if ((info->flags & XT_L2TP_VERSION) && (info->version != data->version))
- return false;
- /* Check tid only for L2TPv3 control or any L2TPv2 packets */
- if ((info->flags & XT_L2TP_TID) &&
- ((data->type == XT_L2TP_TYPE_CONTROL) || (data->version == 2)) &&
- (info->tid != data->tid))
- return false;
- /* Check sid only for L2TP data packets */
- if ((info->flags & XT_L2TP_SID) && (data->type == XT_L2TP_TYPE_DATA) &&
- (info->sid != data->sid))
- return false;
- return true;
- }
- /* Parse L2TP header fields when UDP encapsulation is used. Handles
- * L2TPv2 and L2TPv3. Note the L2TPv3 control and data packets have a
- * different format. See
- * RFC2661, Section 3.1, L2TPv2 Header Format
- * RFC3931, Section 3.2.1, L2TPv3 Control Message Header
- * RFC3931, Section 3.2.2, L2TPv3 Data Message Header
- * RFC3931, Section 4.1.2.1, L2TPv3 Session Header over UDP
- */
- static bool l2tp_udp_mt(const struct sk_buff *skb, struct xt_action_param *par, u16 thoff)
- {
- const struct xt_l2tp_info *info = par->matchinfo;
- int uhlen = sizeof(struct udphdr);
- int offs = thoff + uhlen;
- union l2tp_val *lh;
- union l2tp_val lhbuf;
- u16 flags;
- struct l2tp_data data = { 0, };
- if (par->fragoff != 0)
- return false;
- /* Extract L2TP header fields. The flags in the first 16 bits
- * tell us where the other fields are.
- */
- lh = skb_header_pointer(skb, offs, 2, &lhbuf);
- if (lh == NULL)
- return false;
- flags = ntohs(lh->val16[0]);
- if (flags & L2TP_HDR_T_BIT)
- data.type = XT_L2TP_TYPE_CONTROL;
- else
- data.type = XT_L2TP_TYPE_DATA;
- data.version = (u8) flags & L2TP_HDR_VER;
- /* Now extract the L2TP tid/sid. These are in different places
- * for L2TPv2 (rfc2661) and L2TPv3 (rfc3931). For L2TPv2, we
- * must also check to see if the length field is present,
- * since this affects the offsets into the packet of the
- * tid/sid fields.
- */
- if (data.version == 3) {
- lh = skb_header_pointer(skb, offs + 4, 4, &lhbuf);
- if (lh == NULL)
- return false;
- if (data.type == XT_L2TP_TYPE_CONTROL)
- data.tid = ntohl(lh->val32);
- else
- data.sid = ntohl(lh->val32);
- } else if (data.version == 2) {
- if (flags & L2TP_HDR_L_BIT)
- offs += 2;
- lh = skb_header_pointer(skb, offs + 2, 4, &lhbuf);
- if (lh == NULL)
- return false;
- data.tid = (u32) ntohs(lh->val16[0]);
- data.sid = (u32) ntohs(lh->val16[1]);
- } else
- return false;
- return l2tp_match(info, &data);
- }
- /* Parse L2TP header fields for IP encapsulation (no UDP header).
- * L2TPv3 data packets have a different form with IP encap. See
- * RC3931, Section 4.1.1.1, L2TPv3 Session Header over IP.
- * RC3931, Section 4.1.1.2, L2TPv3 Control and Data Traffic over IP.
- */
- static bool l2tp_ip_mt(const struct sk_buff *skb, struct xt_action_param *par, u16 thoff)
- {
- const struct xt_l2tp_info *info = par->matchinfo;
- union l2tp_val *lh;
- union l2tp_val lhbuf;
- struct l2tp_data data = { 0, };
- /* For IP encap, the L2TP sid is the first 32-bits. */
- lh = skb_header_pointer(skb, thoff, sizeof(lhbuf), &lhbuf);
- if (lh == NULL)
- return false;
- if (lh->val32 == 0) {
- /* Must be a control packet. The L2TP tid is further
- * into the packet.
- */
- data.type = XT_L2TP_TYPE_CONTROL;
- lh = skb_header_pointer(skb, thoff + 8, sizeof(lhbuf),
- &lhbuf);
- if (lh == NULL)
- return false;
- data.tid = ntohl(lh->val32);
- } else {
- data.sid = ntohl(lh->val32);
- data.type = XT_L2TP_TYPE_DATA;
- }
- data.version = 3;
- return l2tp_match(info, &data);
- }
- static bool l2tp_mt4(const struct sk_buff *skb, struct xt_action_param *par)
- {
- struct iphdr *iph = ip_hdr(skb);
- u8 ipproto = iph->protocol;
- /* l2tp_mt_check4 already restricts the transport protocol */
- switch (ipproto) {
- case IPPROTO_UDP:
- return l2tp_udp_mt(skb, par, par->thoff);
- case IPPROTO_L2TP:
- return l2tp_ip_mt(skb, par, par->thoff);
- }
- return false;
- }
- #if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
- static bool l2tp_mt6(const struct sk_buff *skb, struct xt_action_param *par)
- {
- unsigned int thoff = 0;
- unsigned short fragoff = 0;
- int ipproto;
- ipproto = ipv6_find_hdr(skb, &thoff, -1, &fragoff, NULL);
- if (fragoff != 0)
- return false;
- /* l2tp_mt_check6 already restricts the transport protocol */
- switch (ipproto) {
- case IPPROTO_UDP:
- return l2tp_udp_mt(skb, par, thoff);
- case IPPROTO_L2TP:
- return l2tp_ip_mt(skb, par, thoff);
- }
- return false;
- }
- #endif
- static int l2tp_mt_check(const struct xt_mtchk_param *par)
- {
- const struct xt_l2tp_info *info = par->matchinfo;
- /* Check for invalid flags */
- if (info->flags & ~(XT_L2TP_TID | XT_L2TP_SID | XT_L2TP_VERSION |
- XT_L2TP_TYPE)) {
- pr_info("unknown flags: %x\n", info->flags);
- return -EINVAL;
- }
- /* At least one of tid, sid or type=control must be specified */
- if ((!(info->flags & XT_L2TP_TID)) &&
- (!(info->flags & XT_L2TP_SID)) &&
- ((!(info->flags & XT_L2TP_TYPE)) ||
- (info->type != XT_L2TP_TYPE_CONTROL))) {
- pr_info("invalid flags combination: %x\n", info->flags);
- return -EINVAL;
- }
- /* If version 2 is specified, check that incompatible params
- * are not supplied
- */
- if (info->flags & XT_L2TP_VERSION) {
- if ((info->version < 2) || (info->version > 3)) {
- pr_info("wrong L2TP version: %u\n", info->version);
- return -EINVAL;
- }
- if (info->version == 2) {
- if ((info->flags & XT_L2TP_TID) &&
- (info->tid > 0xffff)) {
- pr_info("v2 tid > 0xffff: %u\n", info->tid);
- return -EINVAL;
- }
- if ((info->flags & XT_L2TP_SID) &&
- (info->sid > 0xffff)) {
- pr_info("v2 sid > 0xffff: %u\n", info->sid);
- return -EINVAL;
- }
- }
- }
- return 0;
- }
- static int l2tp_mt_check4(const struct xt_mtchk_param *par)
- {
- const struct xt_l2tp_info *info = par->matchinfo;
- const struct ipt_entry *e = par->entryinfo;
- const struct ipt_ip *ip = &e->ip;
- int ret;
- ret = l2tp_mt_check(par);
- if (ret != 0)
- return ret;
- if ((ip->proto != IPPROTO_UDP) &&
- (ip->proto != IPPROTO_L2TP)) {
- pr_info("missing protocol rule (udp|l2tpip)\n");
- return -EINVAL;
- }
- if ((ip->proto == IPPROTO_L2TP) &&
- (info->version == 2)) {
- pr_info("v2 doesn't support IP mode\n");
- return -EINVAL;
- }
- return 0;
- }
- #if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
- static int l2tp_mt_check6(const struct xt_mtchk_param *par)
- {
- const struct xt_l2tp_info *info = par->matchinfo;
- const struct ip6t_entry *e = par->entryinfo;
- const struct ip6t_ip6 *ip = &e->ipv6;
- int ret;
- ret = l2tp_mt_check(par);
- if (ret != 0)
- return ret;
- if ((ip->proto != IPPROTO_UDP) &&
- (ip->proto != IPPROTO_L2TP)) {
- pr_info("missing protocol rule (udp|l2tpip)\n");
- return -EINVAL;
- }
- if ((ip->proto == IPPROTO_L2TP) &&
- (info->version == 2)) {
- pr_info("v2 doesn't support IP mode\n");
- return -EINVAL;
- }
- return 0;
- }
- #endif
- static struct xt_match l2tp_mt_reg[] __read_mostly = {
- {
- .name = "l2tp",
- .revision = 0,
- .family = NFPROTO_IPV4,
- .match = l2tp_mt4,
- .matchsize = XT_ALIGN(sizeof(struct xt_l2tp_info)),
- .checkentry = l2tp_mt_check4,
- .hooks = ((1 << NF_INET_PRE_ROUTING) |
- (1 << NF_INET_LOCAL_IN) |
- (1 << NF_INET_LOCAL_OUT) |
- (1 << NF_INET_FORWARD)),
- .me = THIS_MODULE,
- },
- #if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
- {
- .name = "l2tp",
- .revision = 0,
- .family = NFPROTO_IPV6,
- .match = l2tp_mt6,
- .matchsize = XT_ALIGN(sizeof(struct xt_l2tp_info)),
- .checkentry = l2tp_mt_check6,
- .hooks = ((1 << NF_INET_PRE_ROUTING) |
- (1 << NF_INET_LOCAL_IN) |
- (1 << NF_INET_LOCAL_OUT) |
- (1 << NF_INET_FORWARD)),
- .me = THIS_MODULE,
- },
- #endif
- };
- static int __init l2tp_mt_init(void)
- {
- return xt_register_matches(&l2tp_mt_reg[0], ARRAY_SIZE(l2tp_mt_reg));
- }
- static void __exit l2tp_mt_exit(void)
- {
- xt_unregister_matches(&l2tp_mt_reg[0], ARRAY_SIZE(l2tp_mt_reg));
- }
- module_init(l2tp_mt_init);
- module_exit(l2tp_mt_exit);
|