/** * Assumes that "tuple" represents a IPv6-UDP or ICMP packet, and filters and updates based on it. * * This is RFC 6146, first halves of both sections 3.5.1 and 3.5.3. * * @param[in] skb tuple's packet. This is actually only used for error reporting. * @param[in] tuple summary of the packet Jool is currently translating. * @return VER_CONTINUE if everything went OK, VER_DROP otherwise. */ static verdict ipv6_simple(struct packet *pkt, struct tuple *tuple6) { struct bib_entry *bib; struct session_entry *session; int error; error = bibdb_get_or_create_ipv6(pkt, tuple6, &bib); if (error) { inc_stats(pkt, IPSTATS_MIB_INDISCARDS); return VERDICT_DROP; } log_bib(bib); error = sessiondb_get_or_create_ipv6(tuple6, bib, &session); if (error) { inc_stats(pkt, IPSTATS_MIB_INDISCARDS); bib_return(bib); return VERDICT_DROP; } log_session(session); session_return(session); bib_return(bib); return VERDICT_CONTINUE; }
/** * Assumes that "tuple" represents a IPv4-UDP or ICMP packet, and filters and updates based on it. * * This is RFC 6146, second halves of both sections 3.5.1 and 3.5.3. * * @param[in] skb tuple's packet. This is actually only used for error reporting. * @param[in] tuple summary of the packet Jool is currently translating. * @return VER_CONTINUE if everything went OK, VER_DROP otherwise. */ static verdict ipv4_simple(struct packet *pkt, struct tuple *tuple4) { int error; struct bib_entry *bib; struct session_entry *session; error = get_bib_ipv4(pkt, tuple4, &bib); if (error == -ESRCH) return VERDICT_ACCEPT; else if (error) return VERDICT_DROP; log_bib(bib); error = sessiondb_get_or_create_ipv4(tuple4, bib, &session); if (error) { inc_stats(pkt, IPSTATS_MIB_INDISCARDS); bib_return(bib); return VERDICT_DROP; } log_session(session); session_return(session); bib_return(bib); return VERDICT_CONTINUE; }
/** * First half of the filtering and updating done during the CLOSED state of the TCP state machine. * Processes IPv6 SYN packets when there's no state. * Part of RFC 6146 section 3.5.2.2. */ static int tcp_closed_v6_syn(struct packet *pkt, struct tuple *tuple6) { struct bib_entry *bib; struct session_entry *session; int error; error = bibdb_get_or_create_ipv6(pkt, tuple6, &bib); if (error) return error; log_bib(bib); error = create_session_ipv6(tuple6, bib, &session, SESSIONTIMER_TRANS, V6_INIT); if (error) { bib_return(bib); return error; } log_session(session); session_return(session); bib_return(bib); return 0; }
/** * Assumes that "tuple" represents a IPv4-UDP or ICMP packet, and filters and updates based on it. * * This is RFC 6146, second halves of both sections 3.5.1 and 3.5.3. * * @param[in] skb tuple's packet. This is actually only used for error reporting. * @param[in] tuple summary of the packet Jool is currently translating. * @return VER_CONTINUE if everything went OK, VER_DROP otherwise. */ static verdict ipv4_simple(struct sk_buff *skb, struct tuple *tuple4) { int error; struct bib_entry *bib; struct session_entry *session; error = get_bib_ipv4(skb, tuple4, &bib); if (error) return VER_DROP; log_bib(bib); error = sessiondb_get_or_create_ipv4(tuple4, bib, &session); if (error) { inc_stats(skb, IPSTATS_MIB_INDISCARDS); bib_return(bib); return VER_DROP; } log_session(session); session_return(session); bib_return(bib); return VER_CONTINUE; }
/** * Second half of the filtering and updating done during the CLOSED state of the TCP state machine. * Processes IPv4 SYN packets when there's no state. * Part of RFC 6146 section 3.5.2.2. */ static verdict tcp_closed_v4_syn(struct packet *pkt, struct tuple *tuple4) { struct bib_entry *bib; struct session_entry *session; int error; verdict result = VERDICT_DROP; if (config_get_drop_external_connections()) { log_debug("Applying policy: Dropping externally initiated TCP connections."); return VERDICT_DROP; } error = bibdb_get(tuple4, &bib); if (error) { if (error != -ESRCH) return VERDICT_DROP; bib = NULL; } log_bib(bib); error = create_session_ipv4(tuple4, bib, &session); if (error) goto end_bib; log_session(session); session->state = V4_INIT; if (!bib || config_get_addr_dependent_filtering()) { error = pktqueue_add(session, pkt); if (error) { if (error == -E2BIG) { /* Fall back to assume there's no Simultaneous Open. */ icmp64_send(pkt, ICMPERR_PORT_UNREACHABLE, 0); } goto end_session; } /* At this point, skb's original skb completely belongs to pktqueue. */ result = VERDICT_STOLEN; error = sessiondb_add(session, SESSIONTIMER_SYN); if (error) { log_debug("Error code %d while adding the session to the DB.", error); pktqueue_remove(session); goto end_session; } } else { error = sessiondb_add(session, SESSIONTIMER_TRANS); if (error) { log_debug("Error code %d while adding the session to the DB.", error); goto end_session; } result = VERDICT_CONTINUE; } /* Fall through. */ end_session: session_return(session); /* Fall through. */ end_bib: if (bib) bib_return(bib); return result; }