177 lines
3.6 KiB
C
177 lines
3.6 KiB
C
/*
|
|
* ip_vs_proto_esp.c: ESP IPSec load balancing support for IPVS
|
|
*
|
|
* Authors: Julian Anastasov <ja@ssi.bg>, February 2002
|
|
* Wensong Zhang <wensong@linuxvirtualserver.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* version 2 as published by the Free Software Foundation;
|
|
*
|
|
*/
|
|
|
|
#include <linux/in.h>
|
|
#include <linux/ip.h>
|
|
#include <linux/module.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/netfilter.h>
|
|
#include <linux/netfilter_ipv4.h>
|
|
|
|
#include <net/ip_vs.h>
|
|
|
|
|
|
/* TODO:
|
|
|
|
struct isakmp_hdr {
|
|
__u8 icookie[8];
|
|
__u8 rcookie[8];
|
|
__u8 np;
|
|
__u8 version;
|
|
__u8 xchgtype;
|
|
__u8 flags;
|
|
__u32 msgid;
|
|
__u32 length;
|
|
};
|
|
|
|
*/
|
|
|
|
#define PORT_ISAKMP 500
|
|
|
|
|
|
static struct ip_vs_conn *
|
|
esp_conn_in_get(const struct sk_buff *skb,
|
|
struct ip_vs_protocol *pp,
|
|
const struct iphdr *iph,
|
|
unsigned int proto_off,
|
|
int inverse)
|
|
{
|
|
struct ip_vs_conn *cp;
|
|
|
|
if (likely(!inverse)) {
|
|
cp = ip_vs_conn_in_get(IPPROTO_UDP,
|
|
iph->saddr,
|
|
htons(PORT_ISAKMP),
|
|
iph->daddr,
|
|
htons(PORT_ISAKMP));
|
|
} else {
|
|
cp = ip_vs_conn_in_get(IPPROTO_UDP,
|
|
iph->daddr,
|
|
htons(PORT_ISAKMP),
|
|
iph->saddr,
|
|
htons(PORT_ISAKMP));
|
|
}
|
|
|
|
if (!cp) {
|
|
/*
|
|
* We are not sure if the packet is from our
|
|
* service, so our conn_schedule hook should return NF_ACCEPT
|
|
*/
|
|
IP_VS_DBG(12, "Unknown ISAKMP entry for outin packet "
|
|
"%s%s %u.%u.%u.%u->%u.%u.%u.%u\n",
|
|
inverse ? "ICMP+" : "",
|
|
pp->name,
|
|
NIPQUAD(iph->saddr),
|
|
NIPQUAD(iph->daddr));
|
|
}
|
|
|
|
return cp;
|
|
}
|
|
|
|
|
|
static struct ip_vs_conn *
|
|
esp_conn_out_get(const struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|
const struct iphdr *iph, unsigned int proto_off, int inverse)
|
|
{
|
|
struct ip_vs_conn *cp;
|
|
|
|
if (likely(!inverse)) {
|
|
cp = ip_vs_conn_out_get(IPPROTO_UDP,
|
|
iph->saddr,
|
|
htons(PORT_ISAKMP),
|
|
iph->daddr,
|
|
htons(PORT_ISAKMP));
|
|
} else {
|
|
cp = ip_vs_conn_out_get(IPPROTO_UDP,
|
|
iph->daddr,
|
|
htons(PORT_ISAKMP),
|
|
iph->saddr,
|
|
htons(PORT_ISAKMP));
|
|
}
|
|
|
|
if (!cp) {
|
|
IP_VS_DBG(12, "Unknown ISAKMP entry for inout packet "
|
|
"%s%s %u.%u.%u.%u->%u.%u.%u.%u\n",
|
|
inverse ? "ICMP+" : "",
|
|
pp->name,
|
|
NIPQUAD(iph->saddr),
|
|
NIPQUAD(iph->daddr));
|
|
}
|
|
|
|
return cp;
|
|
}
|
|
|
|
|
|
static int
|
|
esp_conn_schedule(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
|
int *verdict, struct ip_vs_conn **cpp)
|
|
{
|
|
/*
|
|
* ESP is only related traffic. Pass the packet to IP stack.
|
|
*/
|
|
*verdict = NF_ACCEPT;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void
|
|
esp_debug_packet(struct ip_vs_protocol *pp, const struct sk_buff *skb,
|
|
int offset, const char *msg)
|
|
{
|
|
char buf[256];
|
|
struct iphdr _iph, *ih;
|
|
|
|
ih = skb_header_pointer(skb, offset, sizeof(_iph), &_iph);
|
|
if (ih == NULL)
|
|
sprintf(buf, "%s TRUNCATED", pp->name);
|
|
else
|
|
sprintf(buf, "%s %u.%u.%u.%u->%u.%u.%u.%u",
|
|
pp->name, NIPQUAD(ih->saddr),
|
|
NIPQUAD(ih->daddr));
|
|
|
|
printk(KERN_DEBUG "IPVS: %s: %s\n", msg, buf);
|
|
}
|
|
|
|
|
|
static void esp_init(struct ip_vs_protocol *pp)
|
|
{
|
|
/* nothing to do now */
|
|
}
|
|
|
|
|
|
static void esp_exit(struct ip_vs_protocol *pp)
|
|
{
|
|
/* nothing to do now */
|
|
}
|
|
|
|
|
|
struct ip_vs_protocol ip_vs_protocol_esp = {
|
|
.name = "ESP",
|
|
.protocol = IPPROTO_ESP,
|
|
.num_states = 1,
|
|
.dont_defrag = 1,
|
|
.init = esp_init,
|
|
.exit = esp_exit,
|
|
.conn_schedule = esp_conn_schedule,
|
|
.conn_in_get = esp_conn_in_get,
|
|
.conn_out_get = esp_conn_out_get,
|
|
.snat_handler = NULL,
|
|
.dnat_handler = NULL,
|
|
.csum_check = NULL,
|
|
.state_transition = NULL,
|
|
.register_app = NULL,
|
|
.unregister_app = NULL,
|
|
.app_conn_bind = NULL,
|
|
.debug_packet = esp_debug_packet,
|
|
.timeout_change = NULL, /* ISAKMP */
|
|
};
|