/* MMS extension for IP connection tracking * (C) 2002 by Filip Sneppe * based on ip_conntrack_ftp.c and ip_conntrack_irc.c * * ip_conntrack_mms.c v0.3 2002-09-22 * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. * * Module load syntax: * insmod ip_conntrack_mms.o ports=port1,port2,...port * * Please give the ports of all MMS servers You wish to connect to. * If you don't specify ports, the default will be TCP port 1755. * * More info on MMS protocol, firewalls and NAT: * http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwmt/html/MMSFirewall.asp * http://www.microsoft.com/windows/windowsmedia/serve/firewall.asp * * The SDP project people are reverse-engineering MMS: * http://get.to/sdp */ #include #include #include #include #include #include #include #include #include #include DECLARE_LOCK(ip_mms_lock); struct module *ip_conntrack_mms = THIS_MODULE; #define MAX_PORTS 8 static int ports[MAX_PORTS]; static int ports_c; #ifdef MODULE_PARM MODULE_PARM(ports, "1-" __MODULE_STRING(MAX_PORTS) "i"); #endif #define DEBUGP(format, args...) #ifdef CONFIG_IP_NF_NAT_NEEDED EXPORT_SYMBOL(ip_mms_lock); #endif MODULE_AUTHOR("Filip Sneppe "); MODULE_DESCRIPTION("Microsoft Windows Media Services (MMS) connection tracking module"); MODULE_LICENSE("GPL"); /* #define isdigit(c) (c >= '0' && c <= '9') */ /* copied from drivers/usb/serial/io_edgeport.c - not perfect but will do the trick */ static void unicode_to_ascii (char *string, short *unicode, int unicode_size) { int i; for (i = 0; i < unicode_size; ++i) { string[i] = (char)(unicode[i]); } string[unicode_size] = 0x00; } __inline static int atoi(char *s) { int i=0; while (isdigit(*s)) { i = i*10 + *(s++) - '0'; } return i; } /* convert ip address string like "192.168.0.10" to unsigned int */ __inline static u_int32_t asciiiptoi(char *s) { unsigned int i, j, k; for(i=k=0; k<3; ++k, ++s, i<<=8) { i+=atoi(s); for(j=0; (*(++s) != '.') && (j<3); ++j) ; } i+=atoi(s); return ntohl(i); } int parse_mms(const char *data, const unsigned int datalen, u_int32_t *mms_ip, u_int16_t *mms_proto, u_int16_t *mms_port, char **mms_string_b, char **mms_string_e, char **mms_padding_e) { int unicode_size, i; char tempstring[28]; /* "\\255.255.255.255\UDP\65535" */ char getlengthstring[28]; for(unicode_size=0; (char) *(data+(MMS_SRV_UNICODE_STRING_OFFSET+unicode_size*2)) != (char)0; unicode_size++) if ((unicode_size == 28) || (MMS_SRV_UNICODE_STRING_OFFSET+unicode_size*2 >= datalen)) return -1; /* out of bounds - incomplete packet */ unicode_to_ascii(tempstring, (short *)(data+MMS_SRV_UNICODE_STRING_OFFSET), unicode_size); DEBUGP("ip_conntrack_mms: offset 60: %s\n", (const char *)(tempstring)); /* IP address ? */ *mms_ip = asciiiptoi(tempstring+2); i=sprintf(getlengthstring, "%u.%u.%u.%u", HIPQUAD(*mms_ip)); /* protocol ? */ if(strncmp(tempstring+3+i, "TCP", 3)==0) *mms_proto = IPPROTO_TCP; else if(strncmp(tempstring+3+i, "UDP", 3)==0) *mms_proto = IPPROTO_UDP; /* port ? */ *mms_port = atoi(tempstring+7+i); /* we store a pointer to the beginning of the "\\a.b.c.d\proto\port" unicode string, one to the end of the string, and one to the end of the packet, since we must keep track of the number of bytes between end of the unicode string and the end of packet (padding) */ *mms_string_b = (char *)(data + MMS_SRV_UNICODE_STRING_OFFSET); *mms_string_e = (char *)(data + MMS_SRV_UNICODE_STRING_OFFSET + unicode_size * 2); *mms_padding_e = (char *)(data + datalen); /* looks funny, doesn't it */ return 0; } static int help(const struct iphdr *iph, size_t len, struct ip_conntrack *ct, enum ip_conntrack_info ctinfo) { /* tcplen not negative guaranteed by ip_conntrack_tcp.c */ struct tcphdr *tcph = (void *)iph + iph->ihl * 4; const char *data = (const char *)tcph + tcph->doff * 4; unsigned int tcplen = len - iph->ihl * 4; unsigned int datalen = tcplen - tcph->doff * 4; int dir = CTINFO2DIR(ctinfo); struct ip_conntrack_expect expect, *exp = &expect; struct ip_ct_mms_expect *exp_mms_info = &exp->help.exp_mms_info; u_int32_t mms_ip; u_int16_t mms_proto; char mms_proto_string[8]; u_int16_t mms_port; char *mms_string_b, *mms_string_e, *mms_padding_e; /* Until there's been traffic both ways, don't look in packets. */ if (ctinfo != IP_CT_ESTABLISHED && ctinfo != IP_CT_ESTABLISHED+IP_CT_IS_REPLY) { DEBUGP("ip_conntrack_mms: Conntrackinfo = %u\n", ctinfo); return NF_ACCEPT; } /* Not whole TCP header? */ if (tcplen < sizeof(struct tcphdr) || tcplen < tcph->doff*4) { DEBUGP("ip_conntrack_mms: tcplen = %u\n", (unsigned)tcplen); return NF_ACCEPT; } /* Checksum invalid? Ignore. */ if (tcp_v4_check(tcph, tcplen, iph->saddr, iph->daddr, csum_partial((char *)tcph, tcplen, 0))) { DEBUGP("mms_help: bad csum: %p %u %u.%u.%u.%u %u.%u.%u.%u\n", tcph, tcplen, NIPQUAD(iph->saddr), NIPQUAD(iph->daddr)); return NF_ACCEPT; } /* Only look at packets with 0x00030002/196610 on bytes 36->39 of TCP payload */ if( (MMS_SRV_MSG_OFFSET < datalen) && ((*(u32 *)(data+MMS_SRV_MSG_OFFSET)) == MMS_SRV_MSG_ID)) { DEBUGP("ip_conntrack_mms: offset 37: %u %u %u %u, datalen:%u\n", (u8)*(data+36), (u8)*(data+37), (u8)*(data+38), (u8)*(data+39), datalen); if(parse_mms(data, datalen, &mms_ip, &mms_proto, &mms_port, &mms_string_b, &mms_string_e, &mms_padding_e)) if(net_ratelimit()) printk(KERN_WARNING "ip_conntrack_mms: Unable to parse data payload\n"); memset(&expect, 0, sizeof(expect)); sprintf(mms_proto_string, "(%u)", mms_proto); DEBUGP("ip_conntrack_mms: adding %s expectation %u.%u.%u.%u -> %u.%u.%u.%u:%u\n", mms_proto == IPPROTO_TCP ? "TCP" : mms_proto == IPPROTO_UDP ? "UDP":mms_proto_string, NIPQUAD(ct->tuplehash[!dir].tuple.src.ip), NIPQUAD(mms_ip), mms_port); /* it's possible that the client will just ask the server to tunnel the stream over the same TCP session (from port 1755): there's shouldn't be a need to add an expectation in that case, but it makes NAT packet mangling so much easier */ LOCK_BH(&ip_mms_lock); DEBUGP("ip_conntrack_mms: tcph->seq = %u\n", tcph->seq); exp->seq = ntohl(tcph->seq) + (mms_string_b - data); exp_mms_info->len = (mms_string_e - mms_string_b); exp_mms_info->padding = (mms_padding_e - mms_string_e); exp_mms_info->port = mms_port; DEBUGP("ip_conntrack_mms: wrote info seq=%u (ofs=%u), len=%d, padding=%u\n", exp->seq, (mms_string_e - data), exp_mms_info->len, exp_mms_info->padding); exp->tuple = ((struct ip_conntrack_tuple) { { ct->tuplehash[!dir].tuple.src.ip, { 0 } }, { mms_ip, { (__u16) ntohs(mms_port) }, mms_proto } } ); exp->mask = ((struct ip_conntrack_tuple) { { 0xFFFFFFFF, { 0 } }, { 0xFFFFFFFF, { 0xFFFF }, 0xFFFF }}); exp->expectfn = NULL; ip_conntrack_expect_related(ct, &expect); UNLOCK_BH(&ip_mms_lock); } return NF_ACCEPT; } static struct ip_conntrack_helper mms[MAX_PORTS]; static char mms_names[MAX_PORTS][10]; /* Not __exit: called from init() */ static void fini(void) { int i; for (i = 0; (i < MAX_PORTS) && ports[i]; i++) { DEBUGP("ip_conntrack_mms: unregistering helper for port %d\n", ports[i]); ip_conntrack_helper_unregister(&mms[i]); } } static int __init init(void) { int i, ret; char *tmpname; if (ports[0] == 0) ports[0] = MMS_PORT; for (i = 0; (i < MAX_PORTS) && ports[i]; i++) { memset(&mms[i], 0, sizeof(struct ip_conntrack_helper)); mms[i].tuple.src.u.tcp.port = htons(ports[i]); mms[i].tuple.dst.protonum = IPPROTO_TCP; mms[i].mask.src.u.tcp.port = 0xFFFF; mms[i].mask.dst.protonum = 0xFFFF; mms[i].max_expected = 1; mms[i].timeout = 0; mms[i].flags = IP_CT_HELPER_F_REUSE_EXPECT; mms[i].me = THIS_MODULE; mms[i].help = help; tmpname = &mms_names[i][0]; if (ports[i] == MMS_PORT) sprintf(tmpname, "mms"); else sprintf(tmpname, "mms-%d", ports[i]); mms[i].name = tmpname; DEBUGP("ip_conntrack_mms: registering helper for port %d\n", ports[i]); ret = ip_conntrack_helper_register(&mms[i]); if (ret) { fini(); return ret; } ports_c++; } return 0; } module_init(init); module_exit(fini);