2 * firewall3 - 3rd OpenWrt UCI firewall implementation
4 * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
6 * Permission to use, copy, modify, and/or distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include "redirects.h"
22 static struct fw3_option redirect_opts
[] = {
23 FW3_OPT("name", string
, redirect
, name
),
24 FW3_OPT("family", family
, redirect
, family
),
26 FW3_OPT("src", device
, redirect
, src
),
27 FW3_OPT("dest", device
, redirect
, dest
),
29 FW3_OPT("ipset", device
, redirect
, ipset
),
31 FW3_LIST("proto", protocol
, redirect
, proto
),
33 FW3_OPT("src_ip", address
, redirect
, ip_src
),
34 FW3_LIST("src_mac", mac
, redirect
, mac_src
),
35 FW3_OPT("src_port", port
, redirect
, port_src
),
37 FW3_OPT("src_dip", address
, redirect
, ip_dest
),
38 FW3_OPT("src_dport", port
, redirect
, port_dest
),
40 FW3_OPT("dest_ip", address
, redirect
, ip_redir
),
41 FW3_OPT("dest_port", port
, redirect
, port_redir
),
43 FW3_OPT("extra", string
, redirect
, extra
),
45 FW3_OPT("reflection", bool, redirect
, reflection
),
47 FW3_OPT("target", target
, redirect
, target
),
52 check_families(struct uci_element
*e
, struct fw3_redirect
*r
)
54 if (r
->family
== FW3_FAMILY_ANY
)
57 if (r
->_src
&& r
->_src
->family
&& r
->_src
->family
!= r
->family
)
59 warn_elem(e
, "refers to source zone with different family");
63 if (r
->_dest
&& r
->_dest
->family
&& r
->_dest
->family
!= r
->family
)
65 warn_elem(e
, "refers to destination zone with different family");
69 if (r
->_ipset
&& r
->_ipset
->family
&& r
->_ipset
->family
!= r
->family
)
71 warn_elem(e
, "refers to ipset with different family");
75 if (r
->ip_src
.family
&& r
->ip_src
.family
!= r
->family
)
77 warn_elem(e
, "uses source ip with different family");
81 if (r
->ip_dest
.family
&& r
->ip_dest
.family
!= r
->family
)
83 warn_elem(e
, "uses destination ip with different family");
87 if (r
->ip_redir
.family
&& r
->ip_redir
.family
!= r
->family
)
89 warn_elem(e
, "uses redirect ip with different family");
97 fw3_load_redirects(struct fw3_state
*state
, struct uci_package
*p
)
99 struct uci_section
*s
;
100 struct uci_element
*e
;
101 struct fw3_redirect
*redir
;
105 INIT_LIST_HEAD(&state
->redirects
);
107 uci_foreach_element(&p
->sections
, e
)
109 s
= uci_to_section(e
);
111 if (strcmp(s
->type
, "redirect"))
114 redir
= malloc(sizeof(*redir
));
119 memset(redir
, 0, sizeof(*redir
));
121 INIT_LIST_HEAD(&redir
->proto
);
122 INIT_LIST_HEAD(&redir
->mac_src
);
124 redir
->reflection
= true;
126 fw3_parse_options(redir
, redirect_opts
, ARRAY_SIZE(redirect_opts
), s
);
128 if (redir
->src
.invert
)
130 warn_elem(e
, "must not have an inverted source");
131 fw3_free_redirect(redir
);
134 else if (redir
->src
.set
&& !redir
->src
.any
&&
135 !(redir
->_src
= fw3_lookup_zone(state
, redir
->src
.name
)))
137 warn_elem(e
, "refers to not existing zone '%s'", redir
->src
.name
);
138 fw3_free_redirect(redir
);
141 else if (redir
->dest
.set
&& !redir
->dest
.any
&&
142 !(redir
->_dest
= fw3_lookup_zone(state
, redir
->dest
.name
)))
144 warn_elem(e
, "refers to not existing zone '%s'", redir
->dest
.name
);
145 fw3_free_redirect(redir
);
148 else if (redir
->ipset
.set
&& state
->disable_ipsets
)
150 warn_elem(e
, "skipped due to disabled ipset support");
151 fw3_free_redirect(redir
);
154 else if (redir
->ipset
.set
&& !redir
->ipset
.any
&&
155 !(redir
->_ipset
= fw3_lookup_ipset(state
, redir
->ipset
.name
)))
157 warn_elem(e
, "refers to unknown ipset '%s'", redir
->ipset
.name
);
158 fw3_free_redirect(redir
);
162 if (!check_families(e
, redir
))
164 fw3_free_redirect(redir
);
168 if (redir
->target
== FW3_TARGET_UNSPEC
)
170 warn_elem(e
, "has no target specified, defaulting to DNAT");
171 redir
->target
= FW3_TARGET_DNAT
;
173 else if (redir
->target
< FW3_TARGET_DNAT
)
175 warn_elem(e
, "has invalid target specified, defaulting to DNAT");
176 redir
->target
= FW3_TARGET_DNAT
;
179 if (redir
->target
== FW3_TARGET_DNAT
)
182 warn_elem(e
, "must not have source '*' for DNAT target");
183 else if (!redir
->_src
)
184 warn_elem(e
, "has no source specified");
187 setbit(redir
->_src
->dst_flags
, redir
->target
);
188 redir
->_src
->conntrack
= true;
192 if (redir
->reflection
&& redir
->_dest
&& redir
->_src
->masq
)
194 setbit(redir
->_dest
->dst_flags
, FW3_TARGET_ACCEPT
);
195 setbit(redir
->_dest
->dst_flags
, FW3_TARGET_DNAT
);
196 setbit(redir
->_dest
->dst_flags
, FW3_TARGET_SNAT
);
202 warn_elem(e
, "must not have destination '*' for SNAT target");
203 else if (!redir
->_dest
)
204 warn_elem(e
, "has no destination specified");
205 else if (!redir
->ip_dest
.set
)
206 warn_elem(e
, "has no src_dip option specified");
209 setbit(redir
->_dest
->dst_flags
, redir
->target
);
210 redir
->_dest
->conntrack
= true;
217 fw3_free_redirect(redir
);
221 if (!redir
->port_redir
.set
)
222 redir
->port_redir
= redir
->port_dest
;
224 list_add_tail(&redir
->list
, &state
->redirects
);
229 print_chain_nat(struct fw3_redirect
*redir
)
231 if (redir
->target
== FW3_TARGET_DNAT
)
232 fw3_pr("-A zone_%s_prerouting", redir
->src
.name
);
234 fw3_pr("-A zone_%s_postrouting", redir
->dest
.name
);
238 print_snat_dnat(enum fw3_target target
,
239 struct fw3_address
*addr
, struct fw3_port
*port
)
242 char s
[sizeof("255.255.255.255 ")];
244 if (target
== FW3_TARGET_DNAT
)
245 t
= "DNAT --to-destination";
247 t
= "SNAT --to-source";
249 inet_ntop(AF_INET
, &addr
->address
.v4
, s
, sizeof(s
));
251 fw3_pr(" -j %s %s", t
, s
);
253 if (port
&& port
->set
)
255 if (port
->port_min
== port
->port_max
)
256 fw3_pr(":%u", port
->port_min
);
258 fw3_pr(":%u-%u", port
->port_min
, port
->port_max
);
265 print_target_nat(struct fw3_redirect
*redir
)
267 if (redir
->target
== FW3_TARGET_DNAT
)
268 print_snat_dnat(redir
->target
, &redir
->ip_redir
, &redir
->port_redir
);
270 print_snat_dnat(redir
->target
, &redir
->ip_dest
, &redir
->port_dest
);
274 print_chain_filter(struct fw3_redirect
*redir
)
276 if (redir
->target
== FW3_TARGET_DNAT
)
278 /* XXX: check for local ip */
279 if (!redir
->ip_redir
.set
)
280 fw3_pr("-A zone_%s_input", redir
->src
.name
);
282 fw3_pr("-A zone_%s_forward", redir
->src
.name
);
286 if (redir
->src
.set
&& !redir
->src
.any
)
287 fw3_pr("-A zone_%s_forward", redir
->src
.name
);
289 fw3_pr("-A delegate_forward");
294 print_target_filter(struct fw3_redirect
*redir
)
296 /* XXX: check for local ip */
297 if (redir
->target
== FW3_TARGET_DNAT
&& !redir
->ip_redir
.set
)
298 fw3_pr(" -m conntrack --ctstate DNAT -j ACCEPT\n");
300 fw3_pr(" -j ACCEPT\n");
304 print_redirect(enum fw3_table table
, enum fw3_family family
,
305 struct fw3_redirect
*redir
, int num
)
307 struct list_head
*ext_addrs
, *int_addrs
;
308 struct fw3_address
*ext_addr
, *int_addr
;
309 struct fw3_device
*ext_net
, *int_net
;
310 struct fw3_protocol
*proto
;
314 info(" * Redirect '%s'", redir
->name
);
316 info(" * Redirect #%u", num
);
318 if (!fw3_is_family(redir
->_src
, family
) ||
319 !fw3_is_family(redir
->_dest
, family
))
321 info(" ! Skipping due to different family of zone");
325 if (!fw3_is_family(&redir
->ip_src
, family
) ||
326 !fw3_is_family(&redir
->ip_dest
, family
) ||
327 !fw3_is_family(&redir
->ip_redir
, family
))
329 info(" ! Skipping due to different family of ip address");
335 if (!fw3_is_family(redir
->_ipset
, family
))
337 info(" ! Skipping due to different family in ipset");
341 setbit(redir
->_ipset
->flags
, family
);
344 fw3_foreach(proto
, &redir
->proto
)
345 fw3_foreach(mac
, &redir
->mac_src
)
347 if (table
== FW3_TABLE_NAT
)
349 print_chain_nat(redir
);
350 fw3_format_ipset(redir
->_ipset
, redir
->ipset
.invert
);
351 fw3_format_protocol(proto
, family
);
353 if (redir
->target
== FW3_TARGET_DNAT
)
355 fw3_format_src_dest(&redir
->ip_src
, &redir
->ip_dest
);
356 fw3_format_sport_dport(&redir
->port_src
, &redir
->port_dest
);
360 fw3_format_src_dest(&redir
->ip_src
, &redir
->ip_redir
);
361 fw3_format_sport_dport(&redir
->port_src
, &redir
->port_redir
);
365 fw3_format_extra(redir
->extra
);
366 fw3_format_comment(redir
->name
);
367 print_target_nat(redir
);
369 else if (table
== FW3_TABLE_FILTER
)
371 print_chain_filter(redir
);
372 fw3_format_ipset(redir
->_ipset
, redir
->ipset
.invert
);
373 fw3_format_protocol(proto
, family
);
374 fw3_format_src_dest(&redir
->ip_src
, &redir
->ip_redir
);
375 fw3_format_sport_dport(&redir
->port_src
, &redir
->port_redir
);
377 fw3_format_extra(redir
->extra
);
378 fw3_format_comment(redir
->name
);
379 print_target_filter(redir
);
383 /* reflection rules */
384 if (redir
->target
!= FW3_TARGET_DNAT
|| !redir
->reflection
)
387 if (!redir
->_dest
|| !redir
->_src
->masq
)
390 list_for_each_entry(ext_net
, &redir
->_src
->networks
, list
)
392 ext_addrs
= fw3_ubus_address(ext_net
->name
);
394 if (!ext_addrs
|| list_empty(ext_addrs
))
397 list_for_each_entry(int_net
, &redir
->_dest
->networks
, list
)
399 int_addrs
= fw3_ubus_address(int_net
->name
);
401 if (!int_addrs
|| list_empty(int_addrs
))
404 fw3_foreach(ext_addr
, ext_addrs
)
405 fw3_foreach(int_addr
, int_addrs
)
406 fw3_foreach(proto
, &redir
->proto
)
408 if (!fw3_is_family(int_addr
, family
) ||
409 !fw3_is_family(ext_addr
, family
))
412 if (!proto
|| (proto
->protocol
!= 6 && proto
->protocol
!= 17))
417 if (table
== FW3_TABLE_NAT
)
419 fw3_pr("-A zone_%s_prerouting", redir
->dest
.name
);
420 fw3_format_protocol(proto
, family
);
421 fw3_format_src_dest(int_addr
, ext_addr
);
422 fw3_format_sport_dport(NULL
, &redir
->port_dest
);
423 fw3_format_comment(redir
->name
, " (reflection)");
424 print_snat_dnat(FW3_TARGET_DNAT
,
425 &redir
->ip_redir
, &redir
->port_redir
);
427 fw3_pr("-A zone_%s_postrouting", redir
->dest
.name
);
428 fw3_format_protocol(proto
, family
);
429 fw3_format_src_dest(int_addr
, &redir
->ip_redir
);
430 fw3_format_sport_dport(NULL
, &redir
->port_redir
);
431 fw3_format_comment(redir
->name
, " (reflection)");
432 print_snat_dnat(FW3_TARGET_SNAT
, ext_addr
, NULL
);
434 else if (table
== FW3_TABLE_FILTER
)
436 fw3_pr("-A zone_%s_forward", redir
->dest
.name
);
437 fw3_format_protocol(proto
, family
);
438 fw3_format_src_dest(int_addr
, &redir
->ip_redir
);
439 fw3_format_sport_dport(NULL
, &redir
->port_redir
);
440 fw3_format_comment(redir
->name
, " (reflection)");
441 fw3_pr(" -j zone_%s_dest_ACCEPT\n", redir
->dest
.name
);
445 fw3_ubus_address_free(int_addrs
);
448 fw3_ubus_address_free(ext_addrs
);
453 fw3_print_redirects(enum fw3_table table
, enum fw3_family family
,
454 struct fw3_state
*state
)
457 struct fw3_redirect
*redir
;
459 if (family
== FW3_FAMILY_V6
)
462 if (table
!= FW3_TABLE_FILTER
&& table
!= FW3_TABLE_NAT
)
465 list_for_each_entry(redir
, &state
->redirects
, list
)
466 print_redirect(table
, family
, redir
, num
++);
470 fw3_free_redirect(struct fw3_redirect
*redir
)
472 fw3_free_list(&redir
->proto
);
473 fw3_free_list(&redir
->mac_src
);