]>
Commit | Line | Data |
---|---|---|
9fafcd7b PM |
1 | /* SIP extension for UDP NAT alteration. |
2 | * | |
3 | * (C) 2005 by Christian Hentschel <chentschel@arnet.com.ar> | |
4 | * based on RR's ip_nat_ftp.c and other modules. | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License version 2 as | |
8 | * published by the Free Software Foundation. | |
9 | */ | |
10 | ||
11 | #include <linux/module.h> | |
12 | #include <linux/skbuff.h> | |
13 | #include <linux/ip.h> | |
14 | #include <linux/udp.h> | |
15 | ||
16 | #include <net/netfilter/nf_nat.h> | |
17 | #include <net/netfilter/nf_nat_helper.h> | |
18 | #include <net/netfilter/nf_nat_rule.h> | |
19 | #include <net/netfilter/nf_conntrack_helper.h> | |
20 | #include <net/netfilter/nf_conntrack_expect.h> | |
21 | #include <linux/netfilter/nf_conntrack_sip.h> | |
22 | ||
23 | MODULE_LICENSE("GPL"); | |
24 | MODULE_AUTHOR("Christian Hentschel <chentschel@arnet.com.ar>"); | |
25 | MODULE_DESCRIPTION("SIP NAT helper"); | |
26 | MODULE_ALIAS("ip_nat_sip"); | |
27 | ||
28 | #if 0 | |
29 | #define DEBUGP printk | |
30 | #else | |
31 | #define DEBUGP(format, args...) | |
32 | #endif | |
33 | ||
34 | struct addr_map { | |
35 | struct { | |
36 | char src[sizeof("nnn.nnn.nnn.nnn:nnnnn")]; | |
37 | char dst[sizeof("nnn.nnn.nnn.nnn:nnnnn")]; | |
38 | unsigned int srclen, srciplen; | |
39 | unsigned int dstlen, dstiplen; | |
40 | } addr[IP_CT_DIR_MAX]; | |
41 | }; | |
42 | ||
43 | static void addr_map_init(struct nf_conn *ct, struct addr_map *map) | |
44 | { | |
45 | struct nf_conntrack_tuple *t; | |
46 | enum ip_conntrack_dir dir; | |
47 | unsigned int n; | |
48 | ||
49 | for (dir = 0; dir < IP_CT_DIR_MAX; dir++) { | |
50 | t = &ct->tuplehash[dir].tuple; | |
51 | ||
52 | n = sprintf(map->addr[dir].src, "%u.%u.%u.%u", | |
53 | NIPQUAD(t->src.u3.ip)); | |
54 | map->addr[dir].srciplen = n; | |
55 | n += sprintf(map->addr[dir].src + n, ":%u", | |
56 | ntohs(t->src.u.udp.port)); | |
57 | map->addr[dir].srclen = n; | |
58 | ||
59 | n = sprintf(map->addr[dir].dst, "%u.%u.%u.%u", | |
60 | NIPQUAD(t->dst.u3.ip)); | |
61 | map->addr[dir].dstiplen = n; | |
62 | n += sprintf(map->addr[dir].dst + n, ":%u", | |
63 | ntohs(t->dst.u.udp.port)); | |
64 | map->addr[dir].dstlen = n; | |
65 | } | |
66 | } | |
67 | ||
68 | static int map_sip_addr(struct sk_buff **pskb, enum ip_conntrack_info ctinfo, | |
69 | struct nf_conn *ct, const char **dptr, size_t dlen, | |
70 | enum sip_header_pos pos, struct addr_map *map) | |
71 | { | |
72 | enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo); | |
73 | unsigned int matchlen, matchoff, addrlen; | |
74 | char *addr; | |
75 | ||
76 | if (ct_sip_get_info(ct, *dptr, dlen, &matchoff, &matchlen, pos) <= 0) | |
77 | return 1; | |
78 | ||
79 | if ((matchlen == map->addr[dir].srciplen || | |
80 | matchlen == map->addr[dir].srclen) && | |
81 | memcmp(*dptr + matchoff, map->addr[dir].src, matchlen) == 0) { | |
82 | addr = map->addr[!dir].dst; | |
83 | addrlen = map->addr[!dir].dstlen; | |
84 | } else if ((matchlen == map->addr[dir].dstiplen || | |
85 | matchlen == map->addr[dir].dstlen) && | |
86 | memcmp(*dptr + matchoff, map->addr[dir].dst, matchlen) == 0) { | |
87 | addr = map->addr[!dir].src; | |
88 | addrlen = map->addr[!dir].srclen; | |
89 | } else | |
90 | return 1; | |
91 | ||
92 | if (!nf_nat_mangle_udp_packet(pskb, ct, ctinfo, | |
93 | matchoff, matchlen, addr, addrlen)) | |
94 | return 0; | |
95 | *dptr = (*pskb)->data + (*pskb)->nh.iph->ihl*4 + sizeof(struct udphdr); | |
96 | return 1; | |
97 | ||
98 | } | |
99 | ||
100 | static unsigned int ip_nat_sip(struct sk_buff **pskb, | |
101 | enum ip_conntrack_info ctinfo, | |
102 | struct nf_conn *ct, | |
103 | const char **dptr) | |
104 | { | |
105 | enum sip_header_pos pos; | |
106 | struct addr_map map; | |
107 | int dataoff, datalen; | |
108 | ||
109 | dataoff = (*pskb)->nh.iph->ihl*4 + sizeof(struct udphdr); | |
110 | datalen = (*pskb)->len - dataoff; | |
111 | if (datalen < sizeof("SIP/2.0") - 1) | |
112 | return NF_DROP; | |
113 | ||
114 | addr_map_init(ct, &map); | |
115 | ||
116 | /* Basic rules: requests and responses. */ | |
117 | if (strncmp(*dptr, "SIP/2.0", sizeof("SIP/2.0") - 1) != 0) { | |
118 | /* 10.2: Constructing the REGISTER Request: | |
119 | * | |
120 | * The "userinfo" and "@" components of the SIP URI MUST NOT | |
121 | * be present. | |
122 | */ | |
123 | if (datalen >= sizeof("REGISTER") - 1 && | |
124 | strncmp(*dptr, "REGISTER", sizeof("REGISTER") - 1) == 0) | |
125 | pos = POS_REG_REQ_URI; | |
126 | else | |
127 | pos = POS_REQ_URI; | |
128 | ||
129 | if (!map_sip_addr(pskb, ctinfo, ct, dptr, datalen, pos, &map)) | |
130 | return NF_DROP; | |
131 | } | |
132 | ||
133 | if (!map_sip_addr(pskb, ctinfo, ct, dptr, datalen, POS_FROM, &map) || | |
134 | !map_sip_addr(pskb, ctinfo, ct, dptr, datalen, POS_TO, &map) || | |
135 | !map_sip_addr(pskb, ctinfo, ct, dptr, datalen, POS_VIA, &map) || | |
136 | !map_sip_addr(pskb, ctinfo, ct, dptr, datalen, POS_CONTACT, &map)) | |
137 | return NF_DROP; | |
138 | return NF_ACCEPT; | |
139 | } | |
140 | ||
141 | static unsigned int mangle_sip_packet(struct sk_buff **pskb, | |
142 | enum ip_conntrack_info ctinfo, | |
143 | struct nf_conn *ct, | |
144 | const char **dptr, size_t dlen, | |
145 | char *buffer, int bufflen, | |
146 | enum sip_header_pos pos) | |
147 | { | |
148 | unsigned int matchlen, matchoff; | |
149 | ||
150 | if (ct_sip_get_info(ct, *dptr, dlen, &matchoff, &matchlen, pos) <= 0) | |
151 | return 0; | |
152 | ||
153 | if (!nf_nat_mangle_udp_packet(pskb, ct, ctinfo, | |
154 | matchoff, matchlen, buffer, bufflen)) | |
155 | return 0; | |
156 | ||
157 | /* We need to reload this. Thanks Patrick. */ | |
158 | *dptr = (*pskb)->data + (*pskb)->nh.iph->ihl*4 + sizeof(struct udphdr); | |
159 | return 1; | |
160 | } | |
161 | ||
162 | static int mangle_content_len(struct sk_buff **pskb, | |
163 | enum ip_conntrack_info ctinfo, | |
164 | struct nf_conn *ct, | |
165 | const char *dptr) | |
166 | { | |
167 | unsigned int dataoff, matchoff, matchlen; | |
168 | char buffer[sizeof("65536")]; | |
169 | int bufflen; | |
170 | ||
171 | dataoff = (*pskb)->nh.iph->ihl*4 + sizeof(struct udphdr); | |
172 | ||
173 | /* Get actual SDP lenght */ | |
174 | if (ct_sip_get_info(ct, dptr, (*pskb)->len - dataoff, &matchoff, | |
175 | &matchlen, POS_SDP_HEADER) > 0) { | |
176 | ||
177 | /* since ct_sip_get_info() give us a pointer passing 'v=' | |
178 | we need to add 2 bytes in this count. */ | |
179 | int c_len = (*pskb)->len - dataoff - matchoff + 2; | |
180 | ||
181 | /* Now, update SDP length */ | |
182 | if (ct_sip_get_info(ct, dptr, (*pskb)->len - dataoff, &matchoff, | |
183 | &matchlen, POS_CONTENT) > 0) { | |
184 | ||
185 | bufflen = sprintf(buffer, "%u", c_len); | |
186 | return nf_nat_mangle_udp_packet(pskb, ct, ctinfo, | |
187 | matchoff, matchlen, | |
188 | buffer, bufflen); | |
189 | } | |
190 | } | |
191 | return 0; | |
192 | } | |
193 | ||
194 | static unsigned int mangle_sdp(struct sk_buff **pskb, | |
195 | enum ip_conntrack_info ctinfo, | |
196 | struct nf_conn *ct, | |
197 | __be32 newip, u_int16_t port, | |
198 | const char *dptr) | |
199 | { | |
200 | char buffer[sizeof("nnn.nnn.nnn.nnn")]; | |
201 | unsigned int dataoff, bufflen; | |
202 | ||
203 | dataoff = (*pskb)->nh.iph->ihl*4 + sizeof(struct udphdr); | |
204 | ||
205 | /* Mangle owner and contact info. */ | |
206 | bufflen = sprintf(buffer, "%u.%u.%u.%u", NIPQUAD(newip)); | |
207 | if (!mangle_sip_packet(pskb, ctinfo, ct, &dptr, (*pskb)->len - dataoff, | |
208 | buffer, bufflen, POS_OWNER_IP4)) | |
209 | return 0; | |
210 | ||
211 | if (!mangle_sip_packet(pskb, ctinfo, ct, &dptr, (*pskb)->len - dataoff, | |
212 | buffer, bufflen, POS_CONNECTION_IP4)) | |
213 | return 0; | |
214 | ||
215 | /* Mangle media port. */ | |
216 | bufflen = sprintf(buffer, "%u", port); | |
217 | if (!mangle_sip_packet(pskb, ctinfo, ct, &dptr, (*pskb)->len - dataoff, | |
218 | buffer, bufflen, POS_MEDIA)) | |
219 | return 0; | |
220 | ||
221 | return mangle_content_len(pskb, ctinfo, ct, dptr); | |
222 | } | |
223 | ||
224 | /* So, this packet has hit the connection tracking matching code. | |
225 | Mangle it, and change the expectation to match the new version. */ | |
226 | static unsigned int ip_nat_sdp(struct sk_buff **pskb, | |
227 | enum ip_conntrack_info ctinfo, | |
228 | struct nf_conntrack_expect *exp, | |
229 | const char *dptr) | |
230 | { | |
231 | struct nf_conn *ct = exp->master; | |
232 | enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo); | |
233 | __be32 newip; | |
234 | u_int16_t port; | |
235 | ||
236 | DEBUGP("ip_nat_sdp():\n"); | |
237 | ||
238 | /* Connection will come from reply */ | |
239 | newip = ct->tuplehash[!dir].tuple.dst.u3.ip; | |
240 | ||
241 | exp->tuple.dst.u3.ip = newip; | |
242 | exp->saved_proto.udp.port = exp->tuple.dst.u.udp.port; | |
243 | exp->dir = !dir; | |
244 | ||
245 | /* When you see the packet, we need to NAT it the same as the | |
246 | this one. */ | |
247 | exp->expectfn = nf_nat_follow_master; | |
248 | ||
249 | /* Try to get same port: if not, try to change it. */ | |
250 | for (port = ntohs(exp->saved_proto.udp.port); port != 0; port++) { | |
251 | exp->tuple.dst.u.udp.port = htons(port); | |
252 | if (nf_conntrack_expect_related(exp) == 0) | |
253 | break; | |
254 | } | |
255 | ||
256 | if (port == 0) | |
257 | return NF_DROP; | |
258 | ||
259 | if (!mangle_sdp(pskb, ctinfo, ct, newip, port, dptr)) { | |
260 | nf_conntrack_unexpect_related(exp); | |
261 | return NF_DROP; | |
262 | } | |
263 | return NF_ACCEPT; | |
264 | } | |
265 | ||
266 | static void __exit nf_nat_sip_fini(void) | |
267 | { | |
268 | rcu_assign_pointer(nf_nat_sip_hook, NULL); | |
269 | rcu_assign_pointer(nf_nat_sdp_hook, NULL); | |
270 | synchronize_rcu(); | |
271 | } | |
272 | ||
273 | static int __init nf_nat_sip_init(void) | |
274 | { | |
275 | BUG_ON(rcu_dereference(nf_nat_sip_hook)); | |
276 | BUG_ON(rcu_dereference(nf_nat_sdp_hook)); | |
277 | rcu_assign_pointer(nf_nat_sip_hook, ip_nat_sip); | |
278 | rcu_assign_pointer(nf_nat_sdp_hook, ip_nat_sdp); | |
279 | return 0; | |
280 | } | |
281 | ||
282 | module_init(nf_nat_sip_init); | |
283 | module_exit(nf_nat_sip_fini); |