66 lines
1.5 KiB
C
66 lines
1.5 KiB
C
/* This is a module which is used for setting up fake conntracks
|
|
* on packets so that they are not seen by the conntrack/NAT code.
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <linux/netfilter/x_tables.h>
|
|
#include <net/netfilter/nf_conntrack.h>
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS("ipt_NOTRACK");
|
|
|
|
static unsigned int
|
|
target(struct sk_buff **pskb,
|
|
const struct net_device *in,
|
|
const struct net_device *out,
|
|
unsigned int hooknum,
|
|
const struct xt_target *target,
|
|
const void *targinfo)
|
|
{
|
|
/* Previously seen (loopback)? Ignore. */
|
|
if ((*pskb)->nfct != NULL)
|
|
return XT_CONTINUE;
|
|
|
|
/* Attach fake conntrack entry.
|
|
If there is a real ct entry correspondig to this packet,
|
|
it'll hang aroun till timing out. We don't deal with it
|
|
for performance reasons. JK */
|
|
(*pskb)->nfct = &nf_conntrack_untracked.ct_general;
|
|
(*pskb)->nfctinfo = IP_CT_NEW;
|
|
nf_conntrack_get((*pskb)->nfct);
|
|
|
|
return XT_CONTINUE;
|
|
}
|
|
|
|
static struct xt_target xt_notrack_target[] = {
|
|
{
|
|
.name = "NOTRACK",
|
|
.family = AF_INET,
|
|
.target = target,
|
|
.table = "raw",
|
|
.me = THIS_MODULE,
|
|
},
|
|
{
|
|
.name = "NOTRACK",
|
|
.family = AF_INET6,
|
|
.target = target,
|
|
.table = "raw",
|
|
.me = THIS_MODULE,
|
|
},
|
|
};
|
|
|
|
static int __init xt_notrack_init(void)
|
|
{
|
|
return xt_register_targets(xt_notrack_target,
|
|
ARRAY_SIZE(xt_notrack_target));
|
|
}
|
|
|
|
static void __exit xt_notrack_fini(void)
|
|
{
|
|
xt_unregister_targets(xt_notrack_target, ARRAY_SIZE(xt_notrack_target));
|
|
}
|
|
|
|
module_init(xt_notrack_init);
|
|
module_exit(xt_notrack_fini);
|