1 // SPDX-License-Identifier: GPL-2.0-only
6 #include <linux/netfilter_ipv4/ip_tables.h>
7 #include <linux/netfilter/x_tables.h>
8 #include <linux/netfilter/xt_SYNPROXY.h>
10 #include <net/netfilter/nf_synproxy.h>
13 synproxy_tg4(struct sk_buff *skb, const struct xt_action_param *par)
15 const struct xt_synproxy_info *info = par->targinfo;
16 struct net *net = xt_net(par);
17 struct synproxy_net *snet = synproxy_pernet(net);
18 struct synproxy_options opts = {};
19 struct tcphdr *th, _th;
21 if (nf_ip_checksum(skb, xt_hooknum(par), par->thoff, IPPROTO_TCP))
24 th = skb_header_pointer(skb, par->thoff, sizeof(_th), &_th);
28 if (!synproxy_parse_options(skb, par->thoff, th, &opts))
31 if (th->syn && !(th->ack || th->fin || th->rst)) {
32 /* Initial SYN from client */
33 this_cpu_inc(snet->stats->syn_received);
35 if (th->ece && th->cwr)
36 opts.options |= XT_SYNPROXY_OPT_ECN;
38 opts.options &= info->options;
39 opts.mss_encode = opts.mss_option;
40 opts.mss_option = info->mss;
41 if (opts.options & XT_SYNPROXY_OPT_TIMESTAMP)
42 synproxy_init_timestamp_cookie(info, &opts);
44 opts.options &= ~(XT_SYNPROXY_OPT_WSCALE |
45 XT_SYNPROXY_OPT_SACK_PERM |
48 synproxy_send_client_synack(net, skb, th, &opts);
51 } else if (th->ack && !(th->fin || th->rst || th->syn)) {
53 if (synproxy_recv_client_ack(net, skb, th, &opts, ntohl(th->seq))) {
64 static int synproxy_tg4_check(const struct xt_tgchk_param *par)
66 struct synproxy_net *snet = synproxy_pernet(par->net);
67 const struct ipt_entry *e = par->entryinfo;
70 if (e->ip.proto != IPPROTO_TCP ||
71 e->ip.invflags & XT_INV_PROTO)
74 err = nf_ct_netns_get(par->net, par->family);
78 err = nf_synproxy_ipv4_init(snet, par->net);
80 nf_ct_netns_put(par->net, par->family);
87 static void synproxy_tg4_destroy(const struct xt_tgdtor_param *par)
89 struct synproxy_net *snet = synproxy_pernet(par->net);
91 nf_synproxy_ipv4_fini(snet, par->net);
92 nf_ct_netns_put(par->net, par->family);
95 static struct xt_target synproxy_tg4_reg __read_mostly = {
97 .family = NFPROTO_IPV4,
98 .hooks = (1 << NF_INET_LOCAL_IN) | (1 << NF_INET_FORWARD),
99 .target = synproxy_tg4,
100 .targetsize = sizeof(struct xt_synproxy_info),
101 .checkentry = synproxy_tg4_check,
102 .destroy = synproxy_tg4_destroy,
106 static int __init synproxy_tg4_init(void)
108 return xt_register_target(&synproxy_tg4_reg);
111 static void __exit synproxy_tg4_exit(void)
113 xt_unregister_target(&synproxy_tg4_reg);
116 module_init(synproxy_tg4_init);
117 module_exit(synproxy_tg4_exit);
119 MODULE_LICENSE("GPL");
121 MODULE_DESCRIPTION("Intercept TCP connections and establish them using syncookies");