xt_connlimit.c (3816B)
1/* 2 * netfilter module to limit the number of parallel tcp 3 * connections per IP address. 4 * (c) 2000 Gerd Knorr <kraxel@bytesex.org> 5 * Nov 2002: Martin Bene <martin.bene@icomedias.com>: 6 * only ignore TIME_WAIT or gone connections 7 * (C) CC Computer Consultants GmbH, 2007 8 * 9 * based on ... 10 * 11 * Kernel module to match connection tracking information. 12 * GPL (C) 1999 Rusty Russell (rusty@rustcorp.com.au). 13 */ 14#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 15 16#include <linux/ip.h> 17#include <linux/ipv6.h> 18#include <linux/module.h> 19#include <linux/skbuff.h> 20#include <linux/netfilter/x_tables.h> 21#include <linux/netfilter/xt_connlimit.h> 22 23#include <net/netfilter/nf_conntrack.h> 24#include <net/netfilter/nf_conntrack_core.h> 25#include <net/netfilter/nf_conntrack_tuple.h> 26#include <net/netfilter/nf_conntrack_zones.h> 27#include <net/netfilter/nf_conntrack_count.h> 28 29static bool 30connlimit_mt(const struct sk_buff *skb, struct xt_action_param *par) 31{ 32 struct net *net = xt_net(par); 33 const struct xt_connlimit_info *info = par->matchinfo; 34 struct nf_conntrack_tuple tuple; 35 const struct nf_conntrack_tuple *tuple_ptr = &tuple; 36 const struct nf_conntrack_zone *zone = &nf_ct_zone_dflt; 37 enum ip_conntrack_info ctinfo; 38 const struct nf_conn *ct; 39 unsigned int connections; 40 u32 key[5]; 41 42 ct = nf_ct_get(skb, &ctinfo); 43 if (ct != NULL) { 44 tuple_ptr = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; 45 zone = nf_ct_zone(ct); 46 } else if (!nf_ct_get_tuplepr(skb, skb_network_offset(skb), 47 xt_family(par), net, &tuple)) { 48 goto hotdrop; 49 } 50 51 if (xt_family(par) == NFPROTO_IPV6) { 52 const struct ipv6hdr *iph = ipv6_hdr(skb); 53 union nf_inet_addr addr; 54 unsigned int i; 55 56 memcpy(&addr.ip6, (info->flags & XT_CONNLIMIT_DADDR) ? 57 &iph->daddr : &iph->saddr, sizeof(addr.ip6)); 58 59 for (i = 0; i < ARRAY_SIZE(addr.ip6); ++i) 60 addr.ip6[i] &= info->mask.ip6[i]; 61 memcpy(key, &addr, sizeof(addr.ip6)); 62 key[4] = zone->id; 63 } else { 64 const struct iphdr *iph = ip_hdr(skb); 65 key[0] = (info->flags & XT_CONNLIMIT_DADDR) ? 66 iph->daddr : iph->saddr; 67 68 key[0] &= info->mask.ip; 69 key[1] = zone->id; 70 } 71 72 connections = nf_conncount_count(net, info->data, key, tuple_ptr, 73 zone); 74 if (connections == 0) 75 /* kmalloc failed, drop it entirely */ 76 goto hotdrop; 77 78 return (connections > info->limit) ^ !!(info->flags & XT_CONNLIMIT_INVERT); 79 80 hotdrop: 81 par->hotdrop = true; 82 return false; 83} 84 85static int connlimit_mt_check(const struct xt_mtchk_param *par) 86{ 87 struct xt_connlimit_info *info = par->matchinfo; 88 unsigned int keylen; 89 90 keylen = sizeof(u32); 91 if (par->family == NFPROTO_IPV6) 92 keylen += sizeof(struct in6_addr); 93 else 94 keylen += sizeof(struct in_addr); 95 96 /* init private data */ 97 info->data = nf_conncount_init(par->net, par->family, keylen); 98 99 return PTR_ERR_OR_ZERO(info->data); 100} 101 102static void connlimit_mt_destroy(const struct xt_mtdtor_param *par) 103{ 104 const struct xt_connlimit_info *info = par->matchinfo; 105 106 nf_conncount_destroy(par->net, par->family, info->data); 107} 108 109static struct xt_match connlimit_mt_reg __read_mostly = { 110 .name = "connlimit", 111 .revision = 1, 112 .family = NFPROTO_UNSPEC, 113 .checkentry = connlimit_mt_check, 114 .match = connlimit_mt, 115 .matchsize = sizeof(struct xt_connlimit_info), 116 .usersize = offsetof(struct xt_connlimit_info, data), 117 .destroy = connlimit_mt_destroy, 118 .me = THIS_MODULE, 119}; 120 121static int __init connlimit_mt_init(void) 122{ 123 return xt_register_match(&connlimit_mt_reg); 124} 125 126static void __exit connlimit_mt_exit(void) 127{ 128 xt_unregister_match(&connlimit_mt_reg); 129} 130 131module_init(connlimit_mt_init); 132module_exit(connlimit_mt_exit); 133MODULE_AUTHOR("Jan Engelhardt <jengelh@medozas.de>"); 134MODULE_DESCRIPTION("Xtables: Number of connections matching"); 135MODULE_LICENSE("GPL"); 136MODULE_ALIAS("ipt_connlimit"); 137MODULE_ALIAS("ip6t_connlimit");