blob: 70d2ff3c129387de17fba5c2a24d16bcdf5dcc47 [file] [log] [blame]
/* ip6tables match extension for limiting packets per destination
*
* (C) 2003-2004 by Harald Welte <laforge@netfilter.org>
*
* Development of this code was funded by Astaro AG, http://www.astaro.com/
*
* Based on ipt_limit.c by
* Jérôme de Vivie <devivie@info.enserb.u-bordeaux.fr>
* Hervé Eychenne <rv@wallfire.org>
*
* Error corections by nmalykh@bilim.com (22.01.2005)
*/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <getopt.h>
#include <ip6tables.h>
#include <stddef.h>
#include <linux/netfilter_ipv6/ip6_tables.h>
#include <linux/netfilter/xt_hashlimit.h>
#define XT_HASHLIMIT_BURST 5
/* miliseconds */
#define XT_HASHLIMIT_GCINTERVAL 1000
#define XT_HASHLIMIT_EXPIRE 10000
/* Function which prints out usage message. */
static void
help(void)
{
printf(
"hashlimit v%s options:\n"
"--hashlimit <avg> max average match rate\n"
" [Packets per second unless followed by \n"
" /sec /minute /hour /day postfixes]\n"
"--hashlimit-mode <mode> mode is a comma-separated list of\n"
" dstip,srcip,dstport,srcport\n"
"--hashlimit-name <name> name for /proc/net/ipt_hashlimit/\n"
"[--hashlimit-burst <num>] number to match in a burst, default %u\n"
"[--hashlimit-htable-size <num>] number of hashtable buckets\n"
"[--hashlimit-htable-max <num>] number of hashtable entries\n"
"[--hashlimit-htable-gcinterval] interval between garbage collection runs\n"
"[--hashlimit-htable-expire] after which time are idle entries expired?\n"
"\n", IPTABLES_VERSION, XT_HASHLIMIT_BURST);
}
static struct option opts[] = {
{ "hashlimit", 1, 0, '%' },
{ "hashlimit-burst", 1, 0, '$' },
{ "hashlimit-htable-size", 1, 0, '&' },
{ "hashlimit-htable-max", 1, 0, '*' },
{ "hashlimit-htable-gcinterval", 1, 0, '(' },
{ "hashlimit-htable-expire", 1, 0, ')' },
{ "hashlimit-mode", 1, 0, '_' },
{ "hashlimit-name", 1, 0, '"' },
{ 0 }
};
static
int parse_rate(const char *rate, u_int32_t *val)
{
const char *delim;
u_int32_t r;
u_int32_t mult = 1; /* Seconds by default. */
delim = strchr(rate, '/');
if (delim) {
if (strlen(delim+1) == 0)
return 0;
if (strncasecmp(delim+1, "second", strlen(delim+1)) == 0)
mult = 1;
else if (strncasecmp(delim+1, "minute", strlen(delim+1)) == 0)
mult = 60;
else if (strncasecmp(delim+1, "hour", strlen(delim+1)) == 0)
mult = 60*60;
else if (strncasecmp(delim+1, "day", strlen(delim+1)) == 0)
mult = 24*60*60;
else
return 0;
}
r = atoi(rate);
if (!r)
return 0;
/* This would get mapped to infinite (1/day is minimum they
can specify, so we're ok at that end). */
if (r / mult > XT_HASHLIMIT_SCALE)
exit_error(PARAMETER_PROBLEM, "Rate too fast `%s'\n", rate);
*val = XT_HASHLIMIT_SCALE * mult / r;
return 1;
}
/* Initialize the match. */
static void
init(struct ip6t_entry_match *m, unsigned int *nfcache)
{
struct xt_hashlimit_info *r = (struct xt_hashlimit_info *)m->data;
r->cfg.burst = XT_HASHLIMIT_BURST;
r->cfg.gc_interval = XT_HASHLIMIT_GCINTERVAL;
r->cfg.expire = XT_HASHLIMIT_EXPIRE;
}
/* Parse a 'mode' parameter into the required bitmask */
static int parse_mode(struct xt_hashlimit_info *r, char *optarg)
{
char *tok;
char *arg = strdup(optarg);
if (!arg)
return -1;
r->cfg.mode = 0;
for (tok = strtok(arg, ",|");
tok;
tok = strtok(NULL, ",|")) {
if (!strcmp(tok, "dstip"))
r->cfg.mode |= XT_HASHLIMIT_HASH_DIP;
else if (!strcmp(tok, "srcip"))
r->cfg.mode |= XT_HASHLIMIT_HASH_SIP;
else if (!strcmp(tok, "srcport"))
r->cfg.mode |= XT_HASHLIMIT_HASH_SPT;
else if (!strcmp(tok, "dstport"))
r->cfg.mode |= XT_HASHLIMIT_HASH_DPT;
else {
free(arg);
return -1;
}
}
free(arg);
return 0;
}
#define PARAM_LIMIT 0x00000001
#define PARAM_BURST 0x00000002
#define PARAM_MODE 0x00000004
#define PARAM_NAME 0x00000008
#define PARAM_SIZE 0x00000010
#define PARAM_MAX 0x00000020
#define PARAM_GCINTERVAL 0x00000040
#define PARAM_EXPIRE 0x00000080
/* Function which parses command options; returns true if it
ate an option */
static int
parse(int c, char **argv, int invert, unsigned int *flags,
const struct ip6t_entry *entry,
unsigned int *nfcache,
struct ip6t_entry_match **match)
{
struct xt_hashlimit_info *r =
(struct xt_hashlimit_info *)(*match)->data;
unsigned int num;
switch(c) {
case '%':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (!parse_rate(optarg, &r->cfg.avg))
exit_error(PARAMETER_PROBLEM,
"bad rate `%s'", optarg);
*flags |= PARAM_LIMIT;
break;
case '$':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (string_to_number(optarg, 0, 10000, &num) == -1)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-burst `%s'", optarg);
r->cfg.burst = num;
*flags |= PARAM_BURST;
break;
case '&':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (string_to_number(optarg, 0, 0xffffffff, &num) == -1)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-htable-size: `%s'", optarg);
r->cfg.size = num;
*flags |= PARAM_SIZE;
break;
case '*':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (string_to_number(optarg, 0, 0xffffffff, &num) == -1)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-htable-max: `%s'", optarg);
r->cfg.max = num;
*flags |= PARAM_MAX;
break;
case '(':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (string_to_number(optarg, 0, 0xffffffff, &num) == -1)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-htable-gcinterval: `%s'",
optarg);
/* FIXME: not HZ dependent!! */
r->cfg.gc_interval = num;
*flags |= PARAM_GCINTERVAL;
break;
case ')':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (string_to_number(optarg, 0, 0xffffffff, &num) == -1)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-htable-expire: `%s'", optarg);
/* FIXME: not HZ dependent */
r->cfg.expire = num;
*flags |= PARAM_EXPIRE;
break;
case '_':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (parse_mode(r, optarg) < 0)
exit_error(PARAMETER_PROBLEM,
"bad --hashlimit-mode: `%s'\n", optarg);
*flags |= PARAM_MODE;
break;
case '"':
if (check_inverse(argv[optind-1], &invert, &optind, 0)) break;
if (strlen(optarg) == 0)
exit_error(PARAMETER_PROBLEM, "Zero-length name?");
strncpy(r->name, optarg, sizeof(r->name));
*flags |= PARAM_NAME;
break;
default:
return 0;
}
if (invert)
exit_error(PARAMETER_PROBLEM,
"hashlimit does not support invert");
return 1;
}
/* Final check; nothing. */
static void final_check(unsigned int flags)
{
if (!(flags & PARAM_LIMIT))
exit_error(PARAMETER_PROBLEM,
"You have to specify --hashlimit");
if (!(flags & PARAM_MODE))
exit_error(PARAMETER_PROBLEM,
"You have to specify --hashlimit-mode");
if (!(flags & PARAM_NAME))
exit_error(PARAMETER_PROBLEM,
"You have to specify --hashlimit-name");
}
static struct rates
{
const char *name;
u_int32_t mult;
} rates[] = { { "day", XT_HASHLIMIT_SCALE*24*60*60 },
{ "hour", XT_HASHLIMIT_SCALE*60*60 },
{ "min", XT_HASHLIMIT_SCALE*60 },
{ "sec", XT_HASHLIMIT_SCALE } };
static void print_rate(u_int32_t period)
{
unsigned int i;
for (i = 1; i < sizeof(rates)/sizeof(struct rates); i++) {
if (period > rates[i].mult
|| rates[i].mult/period < rates[i].mult%period)
break;
}
printf("%u/%s ", rates[i-1].mult / period, rates[i-1].name);
}
static void print_mode(const struct xt_hashlimit_info *r, char separator)
{
int prevmode = 0;
if (r->cfg.mode & XT_HASHLIMIT_HASH_SIP) {
if (prevmode)
putchar(separator);
fputs("srcip", stdout);
prevmode = 1;
}
if (r->cfg.mode & XT_HASHLIMIT_HASH_SPT) {
if (prevmode)
putchar(separator);
fputs("srcport", stdout);
prevmode = 1;
}
if (r->cfg.mode & XT_HASHLIMIT_HASH_DIP) {
if (prevmode)
putchar(separator);
fputs("dstip", stdout);
prevmode = 1;
}
if (r->cfg.mode & XT_HASHLIMIT_HASH_DPT) {
if (prevmode)
putchar(separator);
fputs("dstport", stdout);
}
putchar(' ');
}
/* Prints out the matchinfo. */
static void
print(const struct ip6t_ip6 *ip,
const struct ip6t_entry_match *match,
int numeric)
{
struct xt_hashlimit_info *r =
(struct xt_hashlimit_info *)match->data;
fputs("limit: avg ", stdout); print_rate(r->cfg.avg);
printf("burst %u ", r->cfg.burst);
fputs("mode ", stdout);
print_mode(r, '-');
if (r->cfg.size)
printf("htable-size %u ", r->cfg.size);
if (r->cfg.max)
printf("htable-max %u ", r->cfg.max);
if (r->cfg.gc_interval != XT_HASHLIMIT_GCINTERVAL)
printf("htable-gcinterval %u ", r->cfg.gc_interval);
if (r->cfg.expire != XT_HASHLIMIT_EXPIRE)
printf("htable-expire %u ", r->cfg.expire);
}
/* FIXME: Make minimalist: only print rate if not default --RR */
static void save(const struct ip6t_ip6 *ip, const struct ip6t_entry_match *match)
{
struct xt_hashlimit_info *r =
(struct xt_hashlimit_info *)match->data;
fputs("--hashlimit ", stdout); print_rate(r->cfg.avg);
if (r->cfg.burst != XT_HASHLIMIT_BURST)
printf("--hashlimit-burst %u ", r->cfg.burst);
fputs("--hashlimit-mode ", stdout);
print_mode(r, ',');
printf("--hashlimit-name %s ", r->name);
if (r->cfg.size)
printf("--hashlimit-htable-size %u ", r->cfg.size);
if (r->cfg.max)
printf("--hashlimit-htable-max %u ", r->cfg.max);
if (r->cfg.gc_interval != XT_HASHLIMIT_GCINTERVAL)
printf("--hashlimit-htable-gcinterval %u", r->cfg.gc_interval);
if (r->cfg.expire != XT_HASHLIMIT_EXPIRE)
printf("--hashlimit-htable-expire %u ", r->cfg.expire);
}
static struct ip6tables_match hashlimit = { NULL,
.name = "hashlimit",
.version = IPTABLES_VERSION,
.size = IP6T_ALIGN(sizeof(struct xt_hashlimit_info)),
.userspacesize = offsetof(struct xt_hashlimit_info, hinfo),
.help = &help,
.init = &init,
.parse = &parse,
.final_check = &final_check,
.print = &print,
.save = &save,
.extra_opts = opts
};
void _init(void)
{
register_match6(&hashlimit);
}