ip_fil.h revision 80482
1229997Sken/* 2229997Sken * Copyright (C) 1993-2001 by Darren Reed. 3232604Strasz * 4229997Sken * See the IPFILTER.LICENCE file for details on licencing. 5229997Sken * 6232604Strasz * @(#)ip_fil.h 1.35 6/5/96 7232604Strasz * $Id: ip_fil.h,v 2.29.2.4 2000/11/12 11:54:53 darrenr Exp $ 8232604Strasz * $FreeBSD: head/sys/contrib/ipfilter/netinet/ip_fil.h 80482 2001-07-28 11:58:26Z darrenr $ 9229997Sken */ 10229997Sken 11229997Sken#ifndef __IP_FIL_H__ 12229997Sken#define __IP_FIL_H__ 13229997Sken 14229997Sken/* 15229997Sken * Pathnames for various IP Filter control devices. Used by LKM 16229997Sken * and userland, so defined here. 17229997Sken */ 18229997Sken#define IPNAT_NAME "/dev/ipnat" 19229997Sken#define IPSTATE_NAME "/dev/ipstate" 20229997Sken#define IPAUTH_NAME "/dev/ipauth" 21229997Sken 22229997Sken#ifndef SOLARIS 23229997Sken# define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4))) 24229997Sken#endif 25229997Sken 26229997Sken#if defined(KERNEL) && !defined(_KERNEL) 27229997Sken# define _KERNEL 28229997Sken#endif 29229997Sken 30229997Sken#ifndef __P 31229997Sken# ifdef __STDC__ 32229997Sken# define __P(x) x 33229997Sken# else 34229997Sken# define __P(x) () 35229997Sken# endif 36229997Sken#endif 37229997Sken 38229997Sken#if defined(__STDC__) || defined(__GNUC__) 39229997Sken# define SIOCADAFR _IOW('r', 60, struct frentry *) 40229997Sken# define SIOCRMAFR _IOW('r', 61, struct frentry *) 41229997Sken# define SIOCSETFF _IOW('r', 62, u_int) 42229997Sken# define SIOCGETFF _IOR('r', 63, u_int) 43229997Sken# define SIOCGETFS _IOWR('r', 64, struct friostat *) 44229997Sken# define SIOCIPFFL _IOWR('r', 65, int) 45229997Sken# define SIOCIPFFB _IOR('r', 66, int) 46229997Sken# define SIOCADIFR _IOW('r', 67, struct frentry *) 47229997Sken# define SIOCRMIFR _IOW('r', 68, struct frentry *) 48229997Sken# define SIOCSWAPA _IOR('r', 69, u_int) 49229997Sken# define SIOCINAFR _IOW('r', 70, struct frentry *) 50229997Sken# define SIOCINIFR _IOW('r', 71, struct frentry *) 51229997Sken# define SIOCFRENB _IOW('r', 72, u_int) 52229997Sken# define SIOCFRSYN _IOW('r', 73, u_int) 53264886Smav# define SIOCFRZST _IOWR('r', 74, struct friostat *) 54229997Sken# define SIOCZRLST _IOWR('r', 75, struct frentry *) 55229997Sken# define SIOCAUTHW _IOWR('r', 76, struct fr_info *) 56229997Sken# define SIOCAUTHR _IOWR('r', 77, struct fr_info *) 57229997Sken# define SIOCATHST _IOWR('r', 78, struct fr_authstat *) 58229997Sken# define SIOCSTLCK _IOWR('r', 79, u_int) 59287621Smav# define SIOCSTPUT _IOWR('r', 80, struct ipstate_save *) 60229997Sken# define SIOCSTGET _IOWR('r', 81, struct ipstate_save *) 61229997Sken# define SIOCSTGSZ _IOWR('r', 82, struct natget) 62287621Smav# define SIOCGFRST _IOWR('r', 83, struct ipfrstat *) 63229997Sken#else 64229997Sken# define SIOCADAFR _IOW(r, 60, struct frentry *) 65229997Sken# define SIOCRMAFR _IOW(r, 61, struct frentry *) 66229997Sken# define SIOCSETFF _IOW(r, 62, u_int) 67229997Sken# define SIOCGETFF _IOR(r, 63, u_int) 68229997Sken# define SIOCGETFS _IOWR(r, 64, struct friostat *) 69287621Smav# define SIOCIPFFL _IOWR(r, 65, int) 70287621Smav# define SIOCIPFFB _IOR(r, 66, int) 71229997Sken# define SIOCADIFR _IOW(r, 67, struct frentry *) 72229997Sken# define SIOCRMIFR _IOW(r, 68, struct frentry *) 73229997Sken# define SIOCSWAPA _IOR(r, 69, u_int) 74229997Sken# define SIOCINAFR _IOW(r, 70, struct frentry *) 75229997Sken# define SIOCINIFR _IOW(r, 71, struct frentry *) 76229997Sken# define SIOCFRENB _IOW(r, 72, u_int) 77229997Sken# define SIOCFRSYN _IOW(r, 73, u_int) 78229997Sken# define SIOCFRZST _IOWR(r, 74, struct friostat *) 79229997Sken# define SIOCZRLST _IOWR(r, 75, struct frentry *) 80287500Smav# define SIOCAUTHW _IOWR(r, 76, struct fr_info *) 81264886Smav# define SIOCAUTHR _IOWR(r, 77, struct fr_info *) 82229997Sken# define SIOCATHST _IOWR(r, 78, struct fr_authstat *) 83229997Sken# define SIOCSTLCK _IOWR(r, 79, u_int) 84229997Sken# define SIOCSTPUT _IOWR(r, 80, struct ipstate_save *) 85229997Sken# define SIOCSTGET _IOWR(r, 81, struct ipstate_save *) 86229997Sken# define SIOCSTGSZ _IOWR(r, 82, struct natget) 87287499Smav# define SIOCGFRST _IOWR(r, 83, struct ipfrstat *) 88264886Smav#endif 89264886Smav#define SIOCADDFR SIOCADAFR 90264886Smav#define SIOCDELFR SIOCRMAFR 91267877Smav#define SIOCINSFR SIOCINAFR 92229997Sken 93229997Sken 94229997Skentypedef struct fr_ip { 95229997Sken u_32_t fi_v:4; /* IP version */ 96229997Sken u_32_t fi_fl:4; /* packet flags */ 97229997Sken u_32_t fi_tos:8; /* IP packet TOS */ 98229997Sken u_32_t fi_ttl:8; /* IP packet TTL */ 99229997Sken u_32_t fi_p:8; /* IP packet protocol */ 100229997Sken union i6addr fi_src; /* source address from packet */ 101229997Sken union i6addr fi_dst; /* destination address from packet */ 102229997Sken u_32_t fi_optmsk; /* bitmask composed from IP options */ 103229997Sken u_short fi_secmsk; /* bitmask composed from IP security options */ 104229997Sken u_short fi_auth; /* authentication code from IP sec. options */ 105229997Sken} fr_ip_t; 106229997Sken 107229997Sken#define FI_OPTIONS (FF_OPTIONS >> 24) 108287621Smav#define FI_TCPUDP (FF_TCPUDP >> 24) /* TCP/UCP implied comparison*/ 109229997Sken#define FI_FRAG (FF_FRAG >> 24) 110229997Sken#define FI_SHORT (FF_SHORT >> 24) 111229997Sken#define FI_CMP (FI_OPTIONS|FI_TCPUDP|FI_SHORT) 112229997Sken 113229997Sken#define fi_saddr fi_src.in4.s_addr 114264886Smav#define fi_daddr fi_dst.in4.s_addr 115229997Sken 116229997Sken 117229997Sken/* 118229997Sken * These are both used by the state and NAT code to indicate that one port or 119229997Sken * the other should be treated as a wildcard. 120287499Smav */ 121232604Strasz#define FI_W_SPORT 0x00000100 122232604Strasz#define FI_W_DPORT 0x00000200 123264886Smav#define FI_WILDP (FI_W_SPORT|FI_W_DPORT) 124229997Sken#define FI_W_SADDR 0x00000400 125229997Sken#define FI_W_DADDR 0x00000800 126229997Sken#define FI_WILDA (FI_W_SADDR|FI_W_DADDR) 127229997Sken#define FI_NEWFR 0x00001000 128229997Sken 129229997Skentypedef struct fr_info { 130229997Sken void *fin_ifp; /* interface packet is `on' */ 131229997Sken struct fr_ip fin_fi; /* IP Packet summary */ 132230334Sken u_short fin_data[2]; /* TCP/UDP ports, ICMP code/type */ 133230334Sken u_char fin_out; /* in or out ? 1 == out, 0 == in */ 134230334Sken u_char fin_rev; /* state only: 1 = reverse */ 135230334Sken u_short fin_hlen; /* length of IP header in bytes */ 136230334Sken u_char fin_tcpf; /* TCP header flags (SYN, ACK, etc) */ 137230334Sken /* From here on is packet specific */ 138230334Sken u_char fin_icode; /* ICMP error to return */ 139230334Sken u_short fin_rule; /* rule # last matched */ 140229997Sken u_32_t fin_group; /* group number, -1 for none */ 141229997Sken struct frentry *fin_fr; /* last matching rule */ 142229997Sken char *fin_dp; /* start of data past IP header */ 143229997Sken u_short fin_dlen; /* length of data portion of packet */ 144229997Sken u_short fin_id; /* IP packet id field */ 145229997Sken void *fin_mp; /* pointer to pointer to mbuf */ 146229997Sken#if SOLARIS 147229997Sken void *fin_qfm; /* pointer to mblk where pkt starts */ 148229997Sken void *fin_qif; 149229997Sken#endif 150240993Strasz u_short fin_plen; 151229997Sken u_short fin_off; 152229997Sken} fr_info_t; 153229997Sken 154229997Sken#define fin_v fin_fi.fi_v 155229997Sken#define fin_saddr fin_fi.fi_saddr 156229997Sken#define fin_daddr fin_fi.fi_daddr 157229997Sken#define fin_fl fin_fi.fi_fl 158267877Smav 159229997Sken/* 160229997Sken * Size for compares on fr_info structures 161264886Smav */ 162229997Sken#define FI_CSIZE offsetof(fr_info_t, fin_icode) 163229997Sken 164229997Sken/* 165229997Sken * Size for copying cache fr_info structure 166229997Sken */ 167240993Strasz#define FI_COPYSIZE offsetof(fr_info_t, fin_dp) 168229997Sken 169229997Skentypedef struct frdest { 170229997Sken void *fd_ifp; 171229997Sken struct in_addr fd_ip; 172229997Sken char fd_ifname[IFNAMSIZ]; 173229997Sken#if SOLARIS 174229997Sken mb_t *fd_mp; /* cache resolver for to/dup-to */ 175229997Sken#endif 176229997Sken} frdest_t; 177229997Sken 178229997Skentypedef struct frpcmp { 179229997Sken int frp_cmp; /* data for port comparisons */ 180229997Sken u_short frp_port; /* top port for <> and >< */ 181229997Sken u_short frp_top; /* top port for <> and >< */ 182229997Sken} frpcmp_t; 183229997Sken 184229997Skentypedef struct frtuc { 185229997Sken u_char ftu_tcpfm; /* tcp flags mask */ 186229997Sken u_char ftu_tcpf; /* tcp flags */ 187229997Sken frpcmp_t ftu_src; 188229997Sken frpcmp_t ftu_dst; 189229997Sken} frtuc_t; 190229997Sken 191229997Sken#define ftu_scmp ftu_src.frp_cmp 192229997Sken#define ftu_dcmp ftu_dst.frp_cmp 193229997Sken#define ftu_sport ftu_src.frp_port 194229997Sken#define ftu_dport ftu_dst.frp_port 195229997Sken#define ftu_stop ftu_src.frp_top 196229997Sken#define ftu_dtop ftu_dst.frp_top 197229997Sken 198229997Skentypedef struct frentry { 199229997Sken struct frentry *fr_next; 200229997Sken struct frentry *fr_grp; 201229997Sken int fr_ref; /* reference count - for grouping */ 202229997Sken void *fr_ifa; 203287499Smav#if BSD >= 199306 204287499Smav void *fr_oifa; 205229997Sken#endif 206229997Sken /* 207229997Sken * These are only incremented when a packet matches this rule and 208229997Sken * it is the last match 209229997Sken */ 210229997Sken U_QUAD_T fr_hits; 211229997Sken U_QUAD_T fr_bytes; 212229997Sken /* 213229997Sken * Fields after this may not change whilst in the kernel. 214229997Sken */ 215229997Sken struct fr_ip fr_ip; 216229997Sken struct fr_ip fr_mip; /* mask structure */ 217229997Sken 218229997Sken 219229997Sken u_short fr_icmpm; /* data for ICMP packets (mask) */ 220229997Sken u_short fr_icmp; 221229997Sken 222229997Sken frtuc_t fr_tuc; 223229997Sken u_32_t fr_group; /* group to which this rule belongs */ 224229997Sken u_32_t fr_grhead; /* group # which this rule starts */ 225229997Sken u_32_t fr_flags; /* per-rule flags && options (see below) */ 226229997Sken u_int fr_skip; /* # of rules to skip */ 227287499Smav u_int fr_loglevel; /* syslog log facility + priority */ 228264886Smav int (*fr_func) __P((int, ip_t *, fr_info_t *)); /* call this function */ 229229997Sken int fr_sap; /* For solaris only */ 230229997Sken u_char fr_icode; /* return ICMP code */ 231229997Sken char fr_ifname[IFNAMSIZ]; 232229997Sken#if BSD >= 199306 233229997Sken char fr_oifname[IFNAMSIZ]; 234287499Smav#endif 235264886Smav struct frdest fr_tif; /* "to" interface */ 236287499Smav struct frdest fr_dif; /* duplicate packet interfaces */ 237264886Smav u_int fr_cksum; /* checksum on filter rules for performance */ 238288215Smav} frentry_t; 239264886Smav 240264886Smav#define fr_v fr_ip.fi_v 241288215Smav#define fr_proto fr_ip.fi_p 242264886Smav#define fr_ttl fr_ip.fi_ttl 243264886Smav#define fr_tos fr_ip.fi_tos 244264886Smav#define fr_tcpfm fr_tuc.ftu_tcpfm 245264886Smav#define fr_tcpf fr_tuc.ftu_tcpf 246275058Smav#define fr_scmp fr_tuc.ftu_scmp 247275058Smav#define fr_dcmp fr_tuc.ftu_dcmp 248275058Smav#define fr_dport fr_tuc.ftu_dport 249275058Smav#define fr_sport fr_tuc.ftu_sport 250267519Smav#define fr_stop fr_tuc.ftu_stop 251267877Smav#define fr_dtop fr_tuc.ftu_dtop 252264886Smav#define fr_dst fr_ip.fi_dst.in4 253264886Smav#define fr_src fr_ip.fi_src.in4 254267877Smav#define fr_dmsk fr_mip.fi_dst.in4 255264886Smav#define fr_smsk fr_mip.fi_src.in4 256264886Smav 257264886Smav#ifndef offsetof 258264886Smav#define offsetof(t,m) (int)((&((t *)0L)->m)) 259275009Smav#endif 260275058Smav#define FR_CMPSIZ (sizeof(struct frentry) - offsetof(frentry_t, fr_ip)) 261275058Smav 262275058Smav/* 263229997Sken * fr_flags 264229997Sken */ 265229997Sken#define FR_BLOCK 0x00001 /* do not allow packet to pass */ 266229997Sken#define FR_PASS 0x00002 /* allow packet to pass */ 267229997Sken#define FR_OUTQUE 0x00004 /* outgoing packets */ 268229997Sken#define FR_INQUE 0x00008 /* ingoing packets */ 269229997Sken#define FR_LOG 0x00010 /* Log */ 270229997Sken#define FR_LOGB 0x00011 /* Log-fail */ 271229997Sken#define FR_LOGP 0x00012 /* Log-pass */ 272229997Sken#define FR_LOGBODY 0x00020 /* Log the body */ 273229997Sken#define FR_LOGFIRST 0x00040 /* Log the first byte if state held */ 274229997Sken#define FR_RETRST 0x00080 /* Return TCP RST packet - reset connection */ 275229997Sken#define FR_RETICMP 0x00100 /* Return ICMP unreachable packet */ 276267537Smav#define FR_FAKEICMP 0x00180 /* Return ICMP unreachable with fake source */ 277229997Sken#define FR_NOMATCH 0x00200 /* no match occured */ 278229997Sken#define FR_ACCOUNT 0x00400 /* count packet bytes */ 279229997Sken#define FR_KEEPFRAG 0x00800 /* keep fragment information */ 280229997Sken#define FR_KEEPSTATE 0x01000 /* keep `connection' state information */ 281229997Sken#define FR_INACTIVE 0x02000 282229997Sken#define FR_QUICK 0x04000 /* match & stop processing list */ 283287499Smav#define FR_FASTROUTE 0x08000 /* bypass normal routing */ 284267537Smav#define FR_CALLNOW 0x10000 /* call another function (fr_func) if matches */ 285229997Sken#define FR_DUP 0x20000 /* duplicate packet */ 286287499Smav#define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */ 287267519Smav#define FR_NOTSRCIP 0x80000 /* not the src IP# */ 288267537Smav#define FR_NOTDSTIP 0x100000 /* not the dst IP# */ 289267537Smav#define FR_AUTH 0x200000 /* use authentication */ 290267537Smav#define FR_PREAUTH 0x400000 /* require preauthentication */ 291267537Smav#define FR_DONTCACHE 0x800000 /* don't cache the result */ 292267537Smav 293267537Smav#define FR_LOGMASK (FR_LOG|FR_LOGP|FR_LOGB) 294267519Smav#define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP) 295287499Smav 296264886Smav/* 297264886Smav * These correspond to #define's for FI_* and are stored in fr_flags 298264886Smav */ 299229997Sken#define FF_OPTIONS 0x01000000 300264886Smav#define FF_TCPUDP 0x02000000 301264886Smav#define FF_FRAG 0x04000000 302264886Smav#define FF_SHORT 0x08000000 303264886Smav/* 304264886Smav * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags 305264886Smav */ 306264886Smav#define FF_LOGPASS 0x10000000 307264886Smav#define FF_LOGBLOCK 0x20000000 308264886Smav#define FF_LOGNOMATCH 0x40000000 309229997Sken#define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH) 310264886Smav#define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */ 311267519Smav 312229997Sken#define FR_NONE 0 313264886Smav#define FR_EQUAL 1 314264886Smav#define FR_NEQUAL 2 315229997Sken#define FR_LESST 3 316264886Smav#define FR_GREATERT 4 317229997Sken#define FR_LESSTE 5 318229997Sken#define FR_GREATERTE 6 319264886Smav#define FR_OUTRANGE 7 320229997Sken#define FR_INRANGE 8 321275953Smav 322264886Smavtypedef struct filterstats { 323229997Sken u_long fr_pass; /* packets allowed */ 324229997Sken u_long fr_block; /* packets denied */ 325264886Smav u_long fr_nom; /* packets which don't match any rule */ 326264886Smav u_long fr_short; /* packets which are short */ 327229997Sken u_long fr_ppkl; /* packets allowed and logged */ 328264886Smav u_long fr_bpkl; /* packets denied and logged */ 329229997Sken u_long fr_npkl; /* packets unmatched and logged */ 330264886Smav u_long fr_pkl; /* packets logged */ 331264886Smav u_long fr_skip; /* packets to be logged but buffer full */ 332264886Smav u_long fr_ret; /* packets for which a return is sent */ 333264886Smav u_long fr_acct; /* packets for which counting was performed */ 334229997Sken u_long fr_bnfr; /* bad attempts to allocate fragment state */ 335267514Smav u_long fr_nfr; /* new fragment state kept */ 336267514Smav u_long fr_cfr; /* add new fragment state but complete pkt */ 337264886Smav u_long fr_bads; /* bad attempts to allocate packet state */ 338264886Smav u_long fr_ads; /* new packet state kept */ 339264886Smav u_long fr_chit; /* cached hit */ 340267519Smav u_long fr_tcpbad; /* TCP checksum check failures */ 341229997Sken u_long fr_pull[2]; /* good and bad pullup attempts */ 342288215Smav u_long fr_badsrc; /* source received doesn't match route */ 343229997Sken u_long fr_badttl; /* TTL in packet doesn't reach minimum */ 344229997Sken#if SOLARIS 345264886Smav u_long fr_notdata; /* PROTO/PCPROTO that have no data */ 346229997Sken u_long fr_nodata; /* mblks that have no data */ 347264886Smav u_long fr_bad; /* bad IP packets to the filter */ 348264886Smav u_long fr_notip; /* packets passed through no on ip queue */ 349264886Smav u_long fr_drop; /* packets dropped - no info for them! */ 350264886Smav u_long fr_copy; /* messages copied due to db_ref > 1 */ 351264886Smav#endif 352264886Smav u_long fr_ipv6[2]; /* IPv6 packets in/out */ 353264886Smav} filterstats_t; 354264886Smav 355264886Smav/* 356264886Smav * For SIOCGETFS 357267877Smav */ 358264886Smavtypedef struct friostat { 359264886Smav struct filterstats f_st[2]; 360264886Smav struct frentry *f_fin[2]; 361264886Smav struct frentry *f_fout[2]; 362264886Smav struct frentry *f_acctin[2]; 363264886Smav struct frentry *f_acctout[2]; 364267877Smav struct frentry *f_fin6[2]; 365264886Smav struct frentry *f_fout6[2]; 366264886Smav struct frentry *f_acctin6[2]; 367264886Smav struct frentry *f_acctout6[2]; 368267877Smav struct frentry *f_auth; 369264886Smav struct frgroup *f_groups[3][2]; 370264886Smav u_long f_froute[2]; 371264886Smav int f_defpass; /* default pass - from fr_pass */ 372264886Smav char f_active; /* 1 or 0 - active rule set */ 373264886Smav char f_running; /* 1 if running, else 0 */ 374264886Smav char f_logging; /* 1 if enabled, else 0 */ 375264886Smav char f_version[32]; /* version string */ 376264886Smav int f_locks[4]; 377264886Smav} friostat_t; 378267877Smav 379229997Skentypedef struct optlist { 380229997Sken u_short ol_val; 381229997Sken int ol_bit; 382229997Sken} optlist_t; 383229997Sken 384229997Sken 385229997Sken/* 386229997Sken * Group list structure. 387229997Sken */ 388229997Skentypedef struct frgroup { 389229997Sken u_32_t fg_num; 390229997Sken struct frgroup *fg_next; 391229997Sken struct frentry *fg_head; 392229997Sken struct frentry **fg_start; 393229997Sken} frgroup_t; 394229997Sken 395229997Sken 396229997Sken/* 397229997Sken * Log structure. Each packet header logged is prepended by one of these. 398229997Sken * Following this in the log records read from the device will be an ipflog 399287499Smav * structure which is then followed by any packet data. 400229997Sken */ 401229997Skentypedef struct iplog { 402229997Sken u_32_t ipl_magic; 403229997Sken u_int ipl_count; 404232604Strasz u_long ipl_sec; 405232604Strasz u_long ipl_usec; 406232604Strasz size_t ipl_dsize; 407229997Sken struct iplog *ipl_next; 408229997Sken} iplog_t; 409229997Sken 410229997Sken#define IPL_MAGIC 0x49504c4d /* 'IPLM' */ 411229997Sken 412229997Skentypedef struct ipflog { 413229997Sken#if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \ 414229997Sken (defined(OpenBSD) && (OpenBSD >= 199603)) 415229997Sken u_char fl_ifname[IFNAMSIZ]; 416229997Sken#else 417229997Sken u_int fl_unit; 418229997Sken u_char fl_ifname[4]; 419229997Sken#endif 420229997Sken u_char fl_plen; /* extra data after hlen */ 421229997Sken u_char fl_hlen; /* length of IP headers saved */ 422229997Sken u_short fl_loglevel; /* syslog log level */ 423229997Sken u_32_t fl_rule; 424229997Sken u_32_t fl_group; 425229997Sken u_32_t fl_flags; 426229997Sken u_32_t fl_lflags; 427229997Sken} ipflog_t; 428229997Sken 429229997Sken 430229997Sken#ifndef ICMP_UNREACH_FILTER 431229997Sken# define ICMP_UNREACH_FILTER 13 432229997Sken#endif 433229997Sken 434229997Sken#ifndef IPF_LOGGING 435229997Sken# define IPF_LOGGING 0 436229997Sken#endif 437229997Sken#ifndef IPF_DEFAULT_PASS 438229997Sken# define IPF_DEFAULT_PASS FR_PASS 439229997Sken#endif 440229997Sken 441287499Smav#define IPMINLEN(i, h) ((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h))) 442229997Sken#define IPLLOGSIZE 8192 443229997Sken 444229997Sken#define IPF_OPTCOPY 0x07ff00 /* bit mask of copied options */ 445229997Sken 446229997Sken/* 447229997Sken * Device filenames for reading log information. Use ipf on Solaris2 because 448229997Sken * ipl is already a name used by something else. 449229997Sken */ 450229997Sken#ifndef IPL_NAME 451229997Sken# if SOLARIS 452229997Sken# define IPL_NAME "/dev/ipf" 453287499Smav# else 454229997Sken# define IPL_NAME "/dev/ipl" 455229997Sken# endif 456229997Sken#endif 457229997Sken#define IPL_NAT IPNAT_NAME 458229997Sken#define IPL_STATE IPSTATE_NAME 459229997Sken#define IPL_AUTH IPAUTH_NAME 460229997Sken 461229997Sken#define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */ 462229997Sken#define IPL_LOGNAT 1 463229997Sken#define IPL_LOGSTATE 2 464229997Sken#define IPL_LOGAUTH 3 465229997Sken#define IPL_LOGMAX 3 466229997Sken 467229997Sken#if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \ 468229997Sken (__FreeBSD_version >= 220000) 469229997Sken# define CDEV_MAJOR 79 470229997Sken#endif 471229997Sken 472229997Sken/* 473229997Sken * Post NetBSD 1.2 has the PFIL interface for packet filters. This turns 474287499Smav * on those hooks. We don't need any special mods in non-IP Filter code 475229997Sken * with this! 476229997Sken */ 477229997Sken#if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \ 478229997Sken (defined(NetBSD1_2) && NetBSD1_2 > 1) || (defined(__FreeBSD_version) && \ 479252569Smav (__FreeBSD_version >= 500011)) 480252569Smav# if (NetBSD >= 199905) 481252569Smav# define PFIL_HOOKS 482229997Sken# endif 483229997Sken# ifdef PFIL_HOOKS 484229997Sken# define NETBSD_PF 485229997Sken# endif 486229997Sken#endif 487229997Sken 488229997Sken 489229997Sken#ifndef _KERNEL 490229997Skenstruct ifnet; 491229997Skenextern int fr_check __P((ip_t *, int, void *, int, mb_t **)); 492229997Skenextern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **)); 493229997Skenextern int send_reset __P((ip_t *, struct ifnet *)); 494229997Skenextern int icmp_error __P((ip_t *, struct ifnet *)); 495229997Skenextern int ipf_log __P((void)); 496229997Skenextern struct ifnet *get_unit __P((char *, int)); 497229997Sken# if defined(__NetBSD__) || defined(__OpenBSD__) || \ 498229997Sken (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000) 499229997Skenextern int iplioctl __P((dev_t, u_long, caddr_t, int)); 500229997Sken# else 501229997Skenextern int iplioctl __P((dev_t, int, caddr_t, int)); 502229997Sken# endif 503229997Skenextern int iplopen __P((dev_t, int)); 504229997Skenextern int iplclose __P((dev_t, int)); 505229997Sken#else /* #ifndef _KERNEL */ 506229997Sken# if defined(__NetBSD__) && defined(PFIL_HOOKS) 507229997Skenextern void ipfilterattach __P((int)); 508264886Smav# endif 509287670Smavextern int iplattach __P((void)); 510264886Smavextern int ipl_enable __P((void)); 511287499Smavextern int ipl_disable __P((void)); 512267877Smavextern void ipflog_init __P((void)); 513229997Skenextern int ipflog_clear __P((minor_t)); 514264886Smavextern int ipflog_read __P((minor_t, struct uio *)); 515229997Skenextern int ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *)); 516229997Skenextern int ipllog __P((int, fr_info_t *, void **, size_t *, int *, int)); 517229997Skenextern int send_icmp_err __P((ip_t *, int, fr_info_t *, int)); 518229997Skenextern int send_reset __P((ip_t *, fr_info_t *)); 519229997Sken# if SOLARIS 520229997Skenextern int fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **)); 521229997Skenextern int (*fr_checkp) __P((ip_t *, int, void *, 522229997Sken int, qif_t *, mb_t **)); 523229997Sken# if SOLARIS2 >= 7 524229997Skenextern int iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *)); 525229997Sken# else 526229997Skenextern int iplioctl __P((dev_t, int, int *, int, cred_t *, int *)); 527229997Sken# endif 528287499Smavextern int iplopen __P((dev_t *, int, int, cred_t *)); 529229997Skenextern int iplclose __P((dev_t, int, int, cred_t *)); 530229997Skenextern int ipfsync __P((void)); 531287499Smavextern int ipfr_fastroute __P((ip_t *, mblk_t *, mblk_t **, 532229997Sken fr_info_t *, frdest_t *)); 533267481Smavextern void copyin_mblk __P((mblk_t *, size_t, size_t, char *)); 534229997Skenextern void copyout_mblk __P((mblk_t *, size_t, size_t, char *)); 535287499Smavextern int fr_qin __P((queue_t *, mblk_t *)); 536229997Skenextern int fr_qout __P((queue_t *, mblk_t *)); 537229997Skenextern int iplread __P((dev_t, struct uio *, cred_t *)); 538229997Sken# else /* SOLARIS */ 539229997Skenextern int fr_check __P((ip_t *, int, void *, int, mb_t **)); 540287499Smavextern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **)); 541287499Smavextern int ipfr_fastroute __P((mb_t *, mb_t **, fr_info_t *, frdest_t *)); 542287499Smavextern size_t mbufchainlen __P((mb_t *)); 543287500Smav# ifdef __sgi 544287499Smav# include <sys/cred.h> 545264886Smavextern int iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *)); 546287499Smavextern int iplopen __P((dev_t *, int, int, cred_t *)); 547229997Skenextern int iplclose __P((dev_t, int, int, cred_t *)); 548229997Skenextern int iplread __P((dev_t, struct uio *, cred_t *)); 549287499Smavextern int ipfsync __P((void)); 550229997Skenextern int ipfilter_sgi_attach __P((void)); 551287499Smavextern void ipfilter_sgi_detach __P((void)); 552287499Smavextern void ipfilter_sgi_intfsync __P((void)); 553287621Smav# else 554287621Smav# ifdef IPFILTER_LKM 555287621Smavextern int iplidentify __P((char *)); 556287621Smav# endif 557287621Smav# if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \ 558287621Smav (NetBSD >= 199511) || defined(__OpenBSD__) 559287621Smav# if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \ 560229997Sken defined(__OpenBSD__) || (__FreeBSD_version >= 300000) 561287499Smavextern int iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *)); 562287499Smav# else 563287499Smavextern int iplioctl __P((dev_t, int, caddr_t, int, struct proc *)); 564287499Smav# endif 565287499Smavextern int iplopen __P((dev_t, int, int, struct proc *)); 566287499Smavextern int iplclose __P((dev_t, int, int, struct proc *)); 567229997Sken# else 568229997Sken# ifndef linux 569287499Smavextern int iplopen __P((dev_t, int)); 570229997Skenextern int iplclose __P((dev_t, int)); 571229997Skenextern int iplioctl __P((dev_t, int, caddr_t, int)); 572287499Smav# else 573287499Smavextern int iplioctl(struct inode *, struct file *, u_int, u_long); 574287499Smavextern int iplopen __P((struct inode *, struct file *)); 575287499Smavextern void iplclose __P((struct inode *, struct file *)); 576287499Smav# endif /* !linux */ 577229997Sken# endif /* (_BSDI_VERSION >= 199510) */ 578229997Sken# if BSD >= 199306 579229997Skenextern int iplread __P((dev_t, struct uio *, int)); 580287499Smav# else 581229997Sken# ifndef linux 582229997Skenextern int iplread __P((dev_t, struct uio *)); 583287499Smav# else 584267481Smavextern int iplread(struct inode *, struct file *, char *, int); 585287499Smav# endif /* !linux */ 586287499Smav# endif /* BSD >= 199306 */ 587287499Smav# endif /* __ sgi */ 588287499Smav# endif /* SOLARIS */ 589287499Smav#endif /* #ifndef _KERNEL */ 590287499Smav 591287499Smavextern char *memstr __P((char *, char *, int, int)); 592287499Smavextern void fixskip __P((frentry_t **, frentry_t *, int)); 593287499Smavextern int countbits __P((u_32_t)); 594287499Smavextern int ipldetach __P((void)); 595287499Smavextern u_short ipf_cksum __P((u_short *, int)); 596287499Smavextern int ircopyptr __P((void *, void *, size_t)); 597254759Straszextern int iwcopyptr __P((void *, void *, size_t)); 598229997Sken 599287499Smavextern int frflush __P((minor_t, int)); 600287499Smavextern void frsync __P((void)); 601229997Skenextern frgroup_t *fr_addgroup __P((u_32_t, frentry_t *, minor_t, int)); 602287499Smavextern void fr_delgroup __P((u_32_t, u_32_t, minor_t, int)); 603229997Skenextern frgroup_t *fr_findgroup __P((u_32_t, u_32_t, minor_t, int, 604287499Smav frgroup_t ***)); 605287499Smav 606287499Smavextern int fr_copytolog __P((int, char *, int)); 607229997Skenextern void fr_forgetifp __P((void *)); 608229997Skenextern void fr_getstat __P((struct friostat *)); 609229997Skenextern int fr_ifpaddr __P((int, void *, struct in_addr *)); 610287499Smavextern int fr_lock __P((caddr_t, int *)); 611287499Smavextern void fr_makefrip __P((int, ip_t *, fr_info_t *)); 612229997Skenextern u_short fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *)); 613229997Skenextern int fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *)); 614229997Skenextern int fr_tcpudpchk __P((frtuc_t *, fr_info_t *)); 615275953Smavextern int fr_verifysrc __P((struct in_addr, void *)); 616229997Sken 617287499Smavextern int ipl_unreach; 618287499Smavextern int fr_running; 619275953Smavextern u_long ipl_frouteok[2]; 620229997Skenextern int fr_pass; 621229997Skenextern int fr_flags; 622229997Skenextern int fr_active; 623287499Smavextern int fr_chksrc; 624287499Smavextern int fr_minttl; 625229997Skenextern int fr_minttllog; 626229997Skenextern fr_info_t frcache[2]; 627229997Skenextern char ipfilter_version[]; 628275953Smavextern iplog_t **iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1]; 629229997Skenextern size_t iplused[IPL_LOGMAX + 1]; 630287499Smavextern struct frentry *ipfilter[2][2], *ipacct[2][2]; 631287499Smav#ifdef USE_INET6 632275953Smavextern struct frentry *ipfilter6[2][2], *ipacct6[2][2]; 633229997Skenextern int icmptoicmp6types[ICMP_MAXTYPE+1]; 634229997Skenextern int icmptoicmp6unreach[ICMP_MAX_UNREACH]; 635264886Smav#endif 636267877Smavextern struct frgroup *ipfgroups[3][2]; 637264886Smavextern struct filterstats frstats[]; 638264886Smav 639264886Smav#endif /* __IP_FIL_H__ */ 640264886Smav