1/* $FreeBSD$ */ 2 3/* 4 * Copyright (C) 2012 by Darren Reed. 5 * 6 * See the IPFILTER.LICENCE file for details on licencing. 7 * 8 * Added redirect stuff and a variety of bug fixes. (mcn@EnGarde.com) 9 */ 10#include <stdio.h> 11#include <string.h> 12#include <fcntl.h> 13#include <errno.h> 14#include <sys/types.h> 15#if !defined(__SVR4) && !defined(__svr4__) 16#include <strings.h> 17#else 18#include <sys/byteorder.h> 19#endif 20#include <sys/time.h> 21#include <sys/param.h> 22#include <stdlib.h> 23#include <unistd.h> 24#include <stddef.h> 25#include <sys/file.h> 26#define _KERNEL 27#include <sys/uio.h> 28#undef _KERNEL 29#include <sys/socket.h> 30#include <sys/ioctl.h> 31#if defined(sun) && (defined(__svr4__) || defined(__SVR4)) 32# include <sys/ioccom.h> 33# include <sys/sysmacros.h> 34#endif 35#include <netinet/in.h> 36#include <netinet/in_systm.h> 37#include <netinet/ip.h> 38#include <netinet/tcp.h> 39#include <net/if.h> 40#if __FreeBSD_version >= 300000 41# include <net/if_var.h> 42#endif 43#include <netdb.h> 44#include <arpa/nameser.h> 45#include <arpa/inet.h> 46#include <resolv.h> 47#include <ctype.h> 48#if defined(linux) 49# include <linux/a.out.h> 50#else 51# include <nlist.h> 52#endif 53#include "ipf.h" 54#include "netinet/ipl.h" 55#include "kmem.h" 56 57#ifdef __hpux 58# define nlist nlist64 59#endif 60 61#if defined(sun) && !SOLARIS2 62# define STRERROR(x) sys_errlist[x] 63extern char *sys_errlist[]; 64#else 65# define STRERROR(x) strerror(x) 66#endif 67 68#if !defined(lint) 69static const char sccsid[] ="@(#)ipnat.c 1.9 6/5/96 (C) 1993 Darren Reed"; 70static const char rcsid[] = "@(#)$Id$"; 71#endif 72 73 74#if SOLARIS 75#define bzero(a,b) memset(a,0,b) 76#endif 77int use_inet6 = 0; 78char thishost[MAXHOSTNAMELEN]; 79 80extern char *optarg; 81 82void dostats __P((int, natstat_t *, int, int, int *)); 83void dotable __P((natstat_t *, int, int, int, char *)); 84void flushtable __P((int, int, int *)); 85void usage __P((char *)); 86int main __P((int, char*[])); 87void showhostmap __P((natstat_t *nsp)); 88void natstat_dead __P((natstat_t *, char *)); 89void dostats_live __P((int, natstat_t *, int, int *)); 90void showhostmap_dead __P((natstat_t *)); 91void showhostmap_live __P((int, natstat_t *)); 92void dostats_dead __P((natstat_t *, int, int *)); 93int nat_matcharray __P((nat_t *, int *)); 94 95int opts; 96int nohdrfields = 0; 97wordtab_t *nat_fields = NULL; 98 99void usage(name) 100 char *name; 101{ 102 fprintf(stderr, "Usage: %s [-CFhlnrRsv] [-f filename]\n", name); 103 exit(1); 104} 105 106 107int main(argc, argv) 108 int argc; 109 char *argv[]; 110{ 111 int fd, c, mode, *natfilter; 112 char *file, *core, *kernel; 113 natstat_t ns, *nsp; 114 ipfobj_t obj; 115 116 fd = -1; 117 opts = 0; 118 nsp = &ns; 119 file = NULL; 120 core = NULL; 121 kernel = NULL; 122 mode = O_RDWR; 123 natfilter = NULL; 124 125 assigndefined(getenv("IPNAT_PREDEFINED")); 126 127 while ((c = getopt(argc, argv, "CdFf:hlm:M:N:nO:prRsv")) != -1) 128 switch (c) 129 { 130 case 'C' : 131 opts |= OPT_CLEAR; 132 break; 133 case 'd' : 134 opts |= OPT_DEBUG; 135 break; 136 case 'f' : 137 file = optarg; 138 break; 139 case 'F' : 140 opts |= OPT_FLUSH; 141 break; 142 case 'h' : 143 opts |=OPT_HITS; 144 break; 145 case 'l' : 146 opts |= OPT_LIST; 147 mode = O_RDONLY; 148 break; 149 case 'm' : 150 natfilter = parseipfexpr(optarg, NULL); 151 break; 152 case 'M' : 153 core = optarg; 154 break; 155 case 'N' : 156 kernel = optarg; 157 break; 158 case 'n' : 159 opts |= OPT_DONOTHING|OPT_DONTOPEN; 160 mode = O_RDONLY; 161 break; 162 case 'O' : 163 nat_fields = parsefields(natfields, optarg); 164 break; 165 case 'p' : 166 opts |= OPT_PURGE; 167 break; 168 case 'R' : 169 opts |= OPT_NORESOLVE; 170 break; 171 case 'r' : 172 opts |= OPT_REMOVE; 173 break; 174 case 's' : 175 opts |= OPT_STAT; 176 mode = O_RDONLY; 177 break; 178 case 'v' : 179 opts |= OPT_VERBOSE; 180 break; 181 default : 182 usage(argv[0]); 183 } 184 185 if (((opts & OPT_PURGE) != 0) && ((opts & OPT_REMOVE) == 0)) { 186 (void) fprintf(stderr, "%s: -p must be used with -r\n", 187 argv[0]); 188 exit(1); 189 } 190 191 initparse(); 192 193 if ((kernel != NULL) || (core != NULL)) { 194 (void) setgid(getgid()); 195 (void) setuid(getuid()); 196 } 197 198 if (!(opts & OPT_DONOTHING)) { 199 if (((fd = open(IPNAT_NAME, mode)) == -1) && 200 ((fd = open(IPNAT_NAME, O_RDONLY)) == -1)) { 201 (void) fprintf(stderr, "%s: open: %s\n", IPNAT_NAME, 202 STRERROR(errno)); 203 exit(1); 204 } 205 } 206 207 bzero((char *)&ns, sizeof(ns)); 208 209 if ((opts & OPT_DONOTHING) == 0) { 210 if (checkrev(IPL_NAME) == -1) { 211 fprintf(stderr, "User/kernel version check failed\n"); 212 exit(1); 213 } 214 } 215 216 if (!(opts & OPT_DONOTHING) && (kernel == NULL) && (core == NULL)) { 217 bzero((char *)&obj, sizeof(obj)); 218 obj.ipfo_rev = IPFILTER_VERSION; 219 obj.ipfo_type = IPFOBJ_NATSTAT; 220 obj.ipfo_size = sizeof(*nsp); 221 obj.ipfo_ptr = (void *)nsp; 222 if (ioctl(fd, SIOCGNATS, &obj) == -1) { 223 ipferror(fd, "ioctl(SIOCGNATS)"); 224 exit(1); 225 } 226 (void) setgid(getgid()); 227 (void) setuid(getuid()); 228 } else if ((kernel != NULL) || (core != NULL)) { 229 if (openkmem(kernel, core) == -1) 230 exit(1); 231 232 natstat_dead(nsp, kernel); 233 if (opts & (OPT_LIST|OPT_STAT)) 234 dostats(fd, nsp, opts, 0, natfilter); 235 exit(0); 236 } 237 238 if (opts & (OPT_FLUSH|OPT_CLEAR)) 239 flushtable(fd, opts, natfilter); 240 if (file) { 241 return ipnat_parsefile(fd, ipnat_addrule, ioctl, file); 242 } 243 if (opts & (OPT_LIST|OPT_STAT)) 244 dostats(fd, nsp, opts, 1, natfilter); 245 return 0; 246} 247 248 249/* 250 * Read NAT statistic information in using a symbol table and memory file 251 * rather than doing ioctl's. 252 */ 253void natstat_dead(nsp, kernel) 254 natstat_t *nsp; 255 char *kernel; 256{ 257 struct nlist nat_nlist[10] = { 258 { "nat_table" }, /* 0 */ 259 { "nat_list" }, 260 { "maptable" }, 261 { "ipf_nattable_sz" }, 262 { "ipf_natrules_sz" }, 263 { "ipf_rdrrules_sz" }, /* 5 */ 264 { "ipf_hostmap_sz" }, 265 { "nat_instances" }, 266 { NULL } 267 }; 268 void *tables[2]; 269 270 if (nlist(kernel, nat_nlist) == -1) { 271 fprintf(stderr, "nlist error\n"); 272 return; 273 } 274 275 /* 276 * Normally the ioctl copies all of these values into the structure 277 * for us, before returning it to userland, so here we must copy each 278 * one in individually. 279 */ 280 kmemcpy((char *)&tables, nat_nlist[0].n_value, sizeof(tables)); 281 nsp->ns_side[0].ns_table = tables[0]; 282 nsp->ns_side[1].ns_table = tables[1]; 283 284 kmemcpy((char *)&nsp->ns_list, nat_nlist[1].n_value, 285 sizeof(nsp->ns_list)); 286 kmemcpy((char *)&nsp->ns_maptable, nat_nlist[2].n_value, 287 sizeof(nsp->ns_maptable)); 288 kmemcpy((char *)&nsp->ns_nattab_sz, nat_nlist[3].n_value, 289 sizeof(nsp->ns_nattab_sz)); 290 kmemcpy((char *)&nsp->ns_rultab_sz, nat_nlist[4].n_value, 291 sizeof(nsp->ns_rultab_sz)); 292 kmemcpy((char *)&nsp->ns_rdrtab_sz, nat_nlist[5].n_value, 293 sizeof(nsp->ns_rdrtab_sz)); 294 kmemcpy((char *)&nsp->ns_hostmap_sz, nat_nlist[6].n_value, 295 sizeof(nsp->ns_hostmap_sz)); 296 kmemcpy((char *)&nsp->ns_instances, nat_nlist[7].n_value, 297 sizeof(nsp->ns_instances)); 298} 299 300 301/* 302 * Issue an ioctl to flush either the NAT rules table or the active mapping 303 * table or both. 304 */ 305void flushtable(fd, opts, match) 306 int fd, opts, *match; 307{ 308 int n = 0; 309 310 if (opts & OPT_FLUSH) { 311 n = 0; 312 if (!(opts & OPT_DONOTHING)) { 313 if (match != NULL) { 314 ipfobj_t obj; 315 316 obj.ipfo_rev = IPFILTER_VERSION; 317 obj.ipfo_size = match[0] * sizeof(int); 318 obj.ipfo_type = IPFOBJ_IPFEXPR; 319 obj.ipfo_ptr = match; 320 if (ioctl(fd, SIOCMATCHFLUSH, &obj) == -1) { 321 ipferror(fd, "ioctl(SIOCMATCHFLUSH)"); 322 n = -1; 323 } else { 324 n = obj.ipfo_retval; 325 } 326 } else if (ioctl(fd, SIOCIPFFL, &n) == -1) { 327 ipferror(fd, "ioctl(SIOCIPFFL)"); 328 n = -1; 329 } 330 } 331 if (n >= 0) 332 printf("%d entries flushed from NAT table\n", n); 333 } 334 335 if (opts & OPT_CLEAR) { 336 n = 1; 337 if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1) 338 ipferror(fd, "ioctl(SIOCCNATL)"); 339 else 340 printf("%d entries flushed from NAT list\n", n); 341 } 342} 343 344 345/* 346 * Display NAT statistics. 347 */ 348void dostats_dead(nsp, opts, filter) 349 natstat_t *nsp; 350 int opts, *filter; 351{ 352 nat_t *np, nat; 353 ipnat_t ipn; 354 int i; 355 356 if (nat_fields == NULL) { 357 printf("List of active MAP/Redirect filters:\n"); 358 while (nsp->ns_list) { 359 if (kmemcpy((char *)&ipn, (long)nsp->ns_list, 360 sizeof(ipn))) { 361 perror("kmemcpy"); 362 break; 363 } 364 if (opts & OPT_HITS) 365 printf("%lu ", ipn.in_hits); 366 printnat(&ipn, opts & (OPT_DEBUG|OPT_VERBOSE)); 367 nsp->ns_list = ipn.in_next; 368 } 369 } 370 371 if (nat_fields == NULL) { 372 printf("\nList of active sessions:\n"); 373 374 } else if (nohdrfields == 0) { 375 for (i = 0; nat_fields[i].w_value != 0; i++) { 376 printfieldhdr(natfields, nat_fields + i); 377 if (nat_fields[i + 1].w_value != 0) 378 printf("\t"); 379 } 380 printf("\n"); 381 } 382 383 for (np = nsp->ns_instances; np; np = nat.nat_next) { 384 if (kmemcpy((char *)&nat, (long)np, sizeof(nat))) 385 break; 386 if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0)) 387 continue; 388 if (nat_fields != NULL) { 389 for (i = 0; nat_fields[i].w_value != 0; i++) { 390 printnatfield(&nat, nat_fields[i].w_value); 391 if (nat_fields[i + 1].w_value != 0) 392 printf("\t"); 393 } 394 printf("\n"); 395 } else { 396 printactivenat(&nat, opts, nsp->ns_ticks); 397 if (nat.nat_aps) { 398 int proto; 399 400 if (nat.nat_dir & NAT_OUTBOUND) 401 proto = nat.nat_pr[1]; 402 else 403 proto = nat.nat_pr[0]; 404 printaps(nat.nat_aps, opts, proto); 405 } 406 } 407 } 408 409 if (opts & OPT_VERBOSE) 410 showhostmap_dead(nsp); 411} 412 413 414void dotable(nsp, fd, alive, which, side) 415 natstat_t *nsp; 416 int fd, alive, which; 417 char *side; 418{ 419 int sz, i, used, maxlen, minlen, totallen; 420 ipftable_t table; 421 u_int *buckets; 422 ipfobj_t obj; 423 424 sz = sizeof(*buckets) * nsp->ns_nattab_sz; 425 buckets = (u_int *)malloc(sz); 426 if (buckets == NULL) { 427 fprintf(stderr, 428 "cannot allocate memory (%d) for buckets\n", sz); 429 return; 430 } 431 432 obj.ipfo_rev = IPFILTER_VERSION; 433 obj.ipfo_type = IPFOBJ_GTABLE; 434 obj.ipfo_size = sizeof(table); 435 obj.ipfo_ptr = &table; 436 437 if (which == 0) { 438 table.ita_type = IPFTABLE_BUCKETS_NATIN; 439 } else if (which == 1) { 440 table.ita_type = IPFTABLE_BUCKETS_NATOUT; 441 } 442 table.ita_table = buckets; 443 444 if (alive) { 445 if (ioctl(fd, SIOCGTABL, &obj) != 0) { 446 ipferror(fd, "SIOCFTABL"); 447 free(buckets); 448 return; 449 } 450 } else { 451 if (kmemcpy((char *)buckets, (u_long)nsp->ns_nattab_sz, sz)) { 452 free(buckets); 453 return; 454 } 455 } 456 457 minlen = nsp->ns_side[which].ns_inuse; 458 totallen = 0; 459 maxlen = 0; 460 used = 0; 461 462 for (i = 0; i < nsp->ns_nattab_sz; i++) { 463 if (buckets[i] > maxlen) 464 maxlen = buckets[i]; 465 if (buckets[i] < minlen) 466 minlen = buckets[i]; 467 if (buckets[i] != 0) 468 used++; 469 totallen += buckets[i]; 470 } 471 472 printf("%d%%\thash efficiency %s\n", 473 totallen ? used * 100 / totallen : 0, side); 474 printf("%2.2f%%\tbucket usage %s\n", 475 ((float)used / nsp->ns_nattab_sz) * 100.0, side); 476 printf("%d\tminimal length %s\n", minlen, side); 477 printf("%d\tmaximal length %s\n", maxlen, side); 478 printf("%.3f\taverage length %s\n", 479 used ? ((float)totallen / used) : 0.0, side); 480 481 free(buckets); 482} 483 484 485void dostats(fd, nsp, opts, alive, filter) 486 natstat_t *nsp; 487 int fd, opts, alive, *filter; 488{ 489 /* 490 * Show statistics ? 491 */ 492 if (opts & OPT_STAT) { 493 printnatside("in", &nsp->ns_side[0]); 494 dotable(nsp, fd, alive, 0, "in"); 495 496 printnatside("out", &nsp->ns_side[1]); 497 dotable(nsp, fd, alive, 1, "out"); 498 499 printf("%lu\tlog successes\n", nsp->ns_side[0].ns_log); 500 printf("%lu\tlog failures\n", nsp->ns_side[1].ns_log); 501 printf("%lu\tadded in\n%lu\tadded out\n", 502 nsp->ns_side[0].ns_added, 503 nsp->ns_side[1].ns_added); 504 printf("%u\tactive\n", nsp->ns_active); 505 printf("%lu\ttransparent adds\n", nsp->ns_addtrpnt); 506 printf("%lu\tdivert build\n", nsp->ns_divert_build); 507 printf("%lu\texpired\n", nsp->ns_expire); 508 printf("%lu\tflush all\n", nsp->ns_flush_all); 509 printf("%lu\tflush closing\n", nsp->ns_flush_closing); 510 printf("%lu\tflush queue\n", nsp->ns_flush_queue); 511 printf("%lu\tflush state\n", nsp->ns_flush_state); 512 printf("%lu\tflush timeout\n", nsp->ns_flush_timeout); 513 printf("%lu\thostmap new\n", nsp->ns_hm_new); 514 printf("%lu\thostmap fails\n", nsp->ns_hm_newfail); 515 printf("%lu\thostmap add\n", nsp->ns_hm_addref); 516 printf("%lu\thostmap NULL rule\n", nsp->ns_hm_nullnp); 517 printf("%lu\tlog ok\n", nsp->ns_log_ok); 518 printf("%lu\tlog fail\n", nsp->ns_log_fail); 519 printf("%u\torphan count\n", nsp->ns_orphans); 520 printf("%u\trule count\n", nsp->ns_rules); 521 printf("%u\tmap rules\n", nsp->ns_rules_map); 522 printf("%u\trdr rules\n", nsp->ns_rules_rdr); 523 printf("%u\twilds\n", nsp->ns_wilds); 524 if (opts & OPT_VERBOSE) 525 printf("list %p\n", nsp->ns_list); 526 } 527 528 if (opts & OPT_LIST) { 529 if (alive) 530 dostats_live(fd, nsp, opts, filter); 531 else 532 dostats_dead(nsp, opts, filter); 533 } 534} 535 536 537/* 538 * Display NAT statistics. 539 */ 540void dostats_live(fd, nsp, opts, filter) 541 natstat_t *nsp; 542 int fd, opts, *filter; 543{ 544 ipfgeniter_t iter; 545 char buffer[2000]; 546 ipfobj_t obj; 547 ipnat_t *ipn; 548 nat_t nat; 549 int i; 550 551 bzero((char *)&obj, sizeof(obj)); 552 obj.ipfo_rev = IPFILTER_VERSION; 553 obj.ipfo_type = IPFOBJ_GENITER; 554 obj.ipfo_size = sizeof(iter); 555 obj.ipfo_ptr = &iter; 556 557 iter.igi_type = IPFGENITER_IPNAT; 558 iter.igi_nitems = 1; 559 iter.igi_data = buffer; 560 ipn = (ipnat_t *)buffer; 561 562 /* 563 * Show list of NAT rules and NAT sessions ? 564 */ 565 if (nat_fields == NULL) { 566 printf("List of active MAP/Redirect filters:\n"); 567 while (nsp->ns_list) { 568 if (ioctl(fd, SIOCGENITER, &obj) == -1) 569 break; 570 if (opts & OPT_HITS) 571 printf("%lu ", ipn->in_hits); 572 printnat(ipn, opts & (OPT_DEBUG|OPT_VERBOSE)); 573 nsp->ns_list = ipn->in_next; 574 } 575 } 576 577 if (nat_fields == NULL) { 578 printf("\nList of active sessions:\n"); 579 580 } else if (nohdrfields == 0) { 581 for (i = 0; nat_fields[i].w_value != 0; i++) { 582 printfieldhdr(natfields, nat_fields + i); 583 if (nat_fields[i + 1].w_value != 0) 584 printf("\t"); 585 } 586 printf("\n"); 587 } 588 589 i = IPFGENITER_IPNAT; 590 (void) ioctl(fd,SIOCIPFDELTOK, &i); 591 592 593 iter.igi_type = IPFGENITER_NAT; 594 iter.igi_nitems = 1; 595 iter.igi_data = &nat; 596 597 while (nsp->ns_instances != NULL) { 598 if (ioctl(fd, SIOCGENITER, &obj) == -1) 599 break; 600 if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0)) 601 continue; 602 if (nat_fields != NULL) { 603 for (i = 0; nat_fields[i].w_value != 0; i++) { 604 printnatfield(&nat, nat_fields[i].w_value); 605 if (nat_fields[i + 1].w_value != 0) 606 printf("\t"); 607 } 608 printf("\n"); 609 } else { 610 printactivenat(&nat, opts, nsp->ns_ticks); 611 if (nat.nat_aps) { 612 int proto; 613 614 if (nat.nat_dir & NAT_OUTBOUND) 615 proto = nat.nat_pr[1]; 616 else 617 proto = nat.nat_pr[0]; 618 printaps(nat.nat_aps, opts, proto); 619 } 620 } 621 nsp->ns_instances = nat.nat_next; 622 } 623 624 if (opts & OPT_VERBOSE) 625 showhostmap_live(fd, nsp); 626 627 i = IPFGENITER_NAT; 628 (void) ioctl(fd,SIOCIPFDELTOK, &i); 629} 630 631 632/* 633 * Display the active host mapping table. 634 */ 635void showhostmap_dead(nsp) 636 natstat_t *nsp; 637{ 638 hostmap_t hm, *hmp, **maptable; 639 u_int hv; 640 641 printf("\nList of active host mappings:\n"); 642 643 maptable = (hostmap_t **)malloc(sizeof(hostmap_t *) * 644 nsp->ns_hostmap_sz); 645 if (kmemcpy((char *)maptable, (u_long)nsp->ns_maptable, 646 sizeof(hostmap_t *) * nsp->ns_hostmap_sz)) { 647 perror("kmemcpy (maptable)"); 648 return; 649 } 650 651 for (hv = 0; hv < nsp->ns_hostmap_sz; hv++) { 652 hmp = maptable[hv]; 653 654 while (hmp) { 655 if (kmemcpy((char *)&hm, (u_long)hmp, sizeof(hm))) { 656 perror("kmemcpy (hostmap)"); 657 return; 658 } 659 660 printhostmap(&hm, hv); 661 hmp = hm.hm_next; 662 } 663 } 664 free(maptable); 665} 666 667 668/* 669 * Display the active host mapping table. 670 */ 671void showhostmap_live(fd, nsp) 672 int fd; 673 natstat_t *nsp; 674{ 675 ipfgeniter_t iter; 676 hostmap_t hm; 677 ipfobj_t obj; 678 int i; 679 680 bzero((char *)&obj, sizeof(obj)); 681 obj.ipfo_rev = IPFILTER_VERSION; 682 obj.ipfo_type = IPFOBJ_GENITER; 683 obj.ipfo_size = sizeof(iter); 684 obj.ipfo_ptr = &iter; 685 686 iter.igi_type = IPFGENITER_HOSTMAP; 687 iter.igi_nitems = 1; 688 iter.igi_data = &hm; 689 690 printf("\nList of active host mappings:\n"); 691 692 while (nsp->ns_maplist != NULL) { 693 if (ioctl(fd, SIOCGENITER, &obj) == -1) 694 break; 695 printhostmap(&hm, hm.hm_hv); 696 nsp->ns_maplist = hm.hm_next; 697 } 698 699 i = IPFGENITER_HOSTMAP; 700 (void) ioctl(fd,SIOCIPFDELTOK, &i); 701} 702 703 704int nat_matcharray(nat, array) 705 nat_t *nat; 706 int *array; 707{ 708 int i, n, *x, rv, p; 709 ipfexp_t *e; 710 711 rv = 0; 712 n = array[0]; 713 x = array + 1; 714 715 for (; n > 0; x += 3 + x[3], rv = 0) { 716 e = (ipfexp_t *)x; 717 if (e->ipfe_cmd == IPF_EXP_END) 718 break; 719 n -= e->ipfe_size; 720 721 p = e->ipfe_cmd >> 16; 722 if ((p != 0) && (p != nat->nat_pr[1])) 723 break; 724 725 switch (e->ipfe_cmd) 726 { 727 case IPF_EXP_IP_PR : 728 for (i = 0; !rv && i < e->ipfe_narg; i++) { 729 rv |= (nat->nat_pr[1] == e->ipfe_arg0[i]); 730 } 731 break; 732 733 case IPF_EXP_IP_SRCADDR : 734 if (nat->nat_v[0] != 4) 735 break; 736 for (i = 0; !rv && i < e->ipfe_narg; i++) { 737 rv |= ((nat->nat_osrcaddr & 738 e->ipfe_arg0[i * 2 + 1]) == 739 e->ipfe_arg0[i * 2]) || 740 ((nat->nat_nsrcaddr & 741 e->ipfe_arg0[i * 2 + 1]) == 742 e->ipfe_arg0[i * 2]); 743 } 744 break; 745 746 case IPF_EXP_IP_DSTADDR : 747 if (nat->nat_v[0] != 4) 748 break; 749 for (i = 0; !rv && i < e->ipfe_narg; i++) { 750 rv |= ((nat->nat_odstaddr & 751 e->ipfe_arg0[i * 2 + 1]) == 752 e->ipfe_arg0[i * 2]) || 753 ((nat->nat_ndstaddr & 754 e->ipfe_arg0[i * 2 + 1]) == 755 e->ipfe_arg0[i * 2]); 756 } 757 break; 758 759 case IPF_EXP_IP_ADDR : 760 if (nat->nat_v[0] != 4) 761 break; 762 for (i = 0; !rv && i < e->ipfe_narg; i++) { 763 rv |= ((nat->nat_osrcaddr & 764 e->ipfe_arg0[i * 2 + 1]) == 765 e->ipfe_arg0[i * 2]) || 766 ((nat->nat_nsrcaddr & 767 e->ipfe_arg0[i * 2 + 1]) == 768 e->ipfe_arg0[i * 2]) || 769 ((nat->nat_odstaddr & 770 e->ipfe_arg0[i * 2 + 1]) == 771 e->ipfe_arg0[i * 2]) || 772 ((nat->nat_ndstaddr & 773 e->ipfe_arg0[i * 2 + 1]) == 774 e->ipfe_arg0[i * 2]); 775 } 776 break; 777 778#ifdef USE_INET6 779 case IPF_EXP_IP6_SRCADDR : 780 if (nat->nat_v[0] != 6) 781 break; 782 for (i = 0; !rv && i < e->ipfe_narg; i++) { 783 rv |= IP6_MASKEQ(&nat->nat_osrc6, 784 &e->ipfe_arg0[i * 8 + 4], 785 &e->ipfe_arg0[i * 8]) || 786 IP6_MASKEQ(&nat->nat_nsrc6, 787 &e->ipfe_arg0[i * 8 + 4], 788 &e->ipfe_arg0[i * 8]); 789 } 790 break; 791 792 case IPF_EXP_IP6_DSTADDR : 793 if (nat->nat_v[0] != 6) 794 break; 795 for (i = 0; !rv && i < e->ipfe_narg; i++) { 796 rv |= IP6_MASKEQ(&nat->nat_odst6, 797 &e->ipfe_arg0[i * 8 + 4], 798 &e->ipfe_arg0[i * 8]) || 799 IP6_MASKEQ(&nat->nat_ndst6, 800 &e->ipfe_arg0[i * 8 + 4], 801 &e->ipfe_arg0[i * 8]); 802 } 803 break; 804 805 case IPF_EXP_IP6_ADDR : 806 if (nat->nat_v[0] != 6) 807 break; 808 for (i = 0; !rv && i < e->ipfe_narg; i++) { 809 rv |= IP6_MASKEQ(&nat->nat_osrc6, 810 &e->ipfe_arg0[i * 8 + 4], 811 &e->ipfe_arg0[i * 8]) || 812 IP6_MASKEQ(&nat->nat_nsrc6, 813 &e->ipfe_arg0[i * 8 + 4], 814 &e->ipfe_arg0[i * 8]) || 815 IP6_MASKEQ(&nat->nat_odst6, 816 &e->ipfe_arg0[i * 8 + 4], 817 &e->ipfe_arg0[i * 8]) || 818 IP6_MASKEQ(&nat->nat_ndst6, 819 &e->ipfe_arg0[i * 8 + 4], 820 &e->ipfe_arg0[i * 8]); 821 } 822 break; 823#endif 824 825 case IPF_EXP_UDP_PORT : 826 case IPF_EXP_TCP_PORT : 827 for (i = 0; !rv && i < e->ipfe_narg; i++) { 828 rv |= (nat->nat_osport == e->ipfe_arg0[i]) || 829 (nat->nat_nsport == e->ipfe_arg0[i]) || 830 (nat->nat_odport == e->ipfe_arg0[i]) || 831 (nat->nat_ndport == e->ipfe_arg0[i]); 832 } 833 break; 834 835 case IPF_EXP_UDP_SPORT : 836 case IPF_EXP_TCP_SPORT : 837 for (i = 0; !rv && i < e->ipfe_narg; i++) { 838 rv |= (nat->nat_osport == e->ipfe_arg0[i]) || 839 (nat->nat_nsport == e->ipfe_arg0[i]); 840 } 841 break; 842 843 case IPF_EXP_UDP_DPORT : 844 case IPF_EXP_TCP_DPORT : 845 for (i = 0; !rv && i < e->ipfe_narg; i++) { 846 rv |= (nat->nat_odport == e->ipfe_arg0[i]) || 847 (nat->nat_ndport == e->ipfe_arg0[i]); 848 } 849 break; 850 } 851 rv ^= e->ipfe_not; 852 853 if (rv == 0) 854 break; 855 } 856 857 return rv; 858} 859