1
2
3
4
5
6#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
7
8#include <linux/module.h>
9#include <linux/moduleparam.h>
10#include <linux/in.h>
11#include <linux/udp.h>
12#include <linux/netfilter.h>
13
14#include <net/netfilter/nf_conntrack.h>
15#include <net/netfilter/nf_conntrack_tuple.h>
16#include <net/netfilter/nf_conntrack_expect.h>
17#include <net/netfilter/nf_conntrack_ecache.h>
18#include <net/netfilter/nf_conntrack_helper.h>
19#include <linux/netfilter/nf_conntrack_tftp.h>
20
21#define HELPER_NAME "tftp"
22
23MODULE_AUTHOR("Magnus Boden <mb@ozaba.mine.nu>");
24MODULE_DESCRIPTION("TFTP connection tracking helper");
25MODULE_LICENSE("GPL");
26MODULE_ALIAS("ip_conntrack_tftp");
27MODULE_ALIAS_NFCT_HELPER(HELPER_NAME);
28
29#define MAX_PORTS 8
30static unsigned short ports[MAX_PORTS];
31static unsigned int ports_c;
32module_param_array(ports, ushort, &ports_c, 0400);
33MODULE_PARM_DESC(ports, "Port numbers of TFTP servers");
34
35unsigned int (*nf_nat_tftp_hook)(struct sk_buff *skb,
36 enum ip_conntrack_info ctinfo,
37 struct nf_conntrack_expect *exp) __read_mostly;
38EXPORT_SYMBOL_GPL(nf_nat_tftp_hook);
39
40static int tftp_help(struct sk_buff *skb,
41 unsigned int protoff,
42 struct nf_conn *ct,
43 enum ip_conntrack_info ctinfo)
44{
45 const struct tftphdr *tfh;
46 struct tftphdr _tftph;
47 struct nf_conntrack_expect *exp;
48 struct nf_conntrack_tuple *tuple;
49 unsigned int ret = NF_ACCEPT;
50 typeof(nf_nat_tftp_hook) nf_nat_tftp;
51
52 tfh = skb_header_pointer(skb, protoff + sizeof(struct udphdr),
53 sizeof(_tftph), &_tftph);
54 if (tfh == NULL)
55 return NF_ACCEPT;
56
57 switch (ntohs(tfh->opcode)) {
58 case TFTP_OPCODE_READ:
59 case TFTP_OPCODE_WRITE:
60
61 nf_ct_dump_tuple(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple);
62 nf_ct_dump_tuple(&ct->tuplehash[IP_CT_DIR_REPLY].tuple);
63
64 exp = nf_ct_expect_alloc(ct);
65 if (exp == NULL) {
66 nf_ct_helper_log(skb, ct, "cannot alloc expectation");
67 return NF_DROP;
68 }
69 tuple = &ct->tuplehash[IP_CT_DIR_REPLY].tuple;
70 nf_ct_expect_init(exp, NF_CT_EXPECT_CLASS_DEFAULT,
71 nf_ct_l3num(ct),
72 &tuple->src.u3, &tuple->dst.u3,
73 IPPROTO_UDP, NULL, &tuple->dst.u.udp.port);
74
75 pr_debug("expect: ");
76 nf_ct_dump_tuple(&exp->tuple);
77
78 nf_nat_tftp = rcu_dereference(nf_nat_tftp_hook);
79 if (nf_nat_tftp && ct->status & IPS_NAT_MASK)
80 ret = nf_nat_tftp(skb, ctinfo, exp);
81 else if (nf_ct_expect_related(exp, 0) != 0) {
82 nf_ct_helper_log(skb, ct, "cannot add expectation");
83 ret = NF_DROP;
84 }
85 nf_ct_expect_put(exp);
86 break;
87 case TFTP_OPCODE_DATA:
88 case TFTP_OPCODE_ACK:
89 pr_debug("Data/ACK opcode\n");
90 break;
91 case TFTP_OPCODE_ERROR:
92 pr_debug("Error opcode\n");
93 break;
94 default:
95 pr_debug("Unknown opcode\n");
96 }
97 return ret;
98}
99
100static struct nf_conntrack_helper tftp[MAX_PORTS * 2] __read_mostly;
101
102static const struct nf_conntrack_expect_policy tftp_exp_policy = {
103 .max_expected = 1,
104 .timeout = 5 * 60,
105};
106
107static void __exit nf_conntrack_tftp_fini(void)
108{
109 nf_conntrack_helpers_unregister(tftp, ports_c * 2);
110}
111
112static int __init nf_conntrack_tftp_init(void)
113{
114 int i, ret;
115
116 NF_CT_HELPER_BUILD_BUG_ON(0);
117
118 if (ports_c == 0)
119 ports[ports_c++] = TFTP_PORT;
120
121 for (i = 0; i < ports_c; i++) {
122 nf_ct_helper_init(&tftp[2 * i], AF_INET, IPPROTO_UDP,
123 HELPER_NAME, TFTP_PORT, ports[i], i,
124 &tftp_exp_policy, 0, tftp_help, NULL,
125 THIS_MODULE);
126 nf_ct_helper_init(&tftp[2 * i + 1], AF_INET6, IPPROTO_UDP,
127 HELPER_NAME, TFTP_PORT, ports[i], i,
128 &tftp_exp_policy, 0, tftp_help, NULL,
129 THIS_MODULE);
130 }
131
132 ret = nf_conntrack_helpers_register(tftp, ports_c * 2);
133 if (ret < 0) {
134 pr_err("failed to register helpers\n");
135 return ret;
136 }
137 return 0;
138}
139
140module_init(nf_conntrack_tftp_init);
141module_exit(nf_conntrack_tftp_fini);
142