2 * A module for stripping a specific TCP option from TCP packets.
4 * Copyright (C) 2007 Sven Schnelle <svens@bitebene.org>
5 * Copyright © CC Computer Consultants GmbH, 2007
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
12 #include <linux/module.h>
13 #include <linux/skbuff.h>
15 #include <linux/ipv6.h>
16 #include <linux/tcp.h>
19 #include <linux/netfilter/x_tables.h>
20 #include <linux/netfilter/xt_TCPOPTSTRIP.h>
22 static inline unsigned int optlen(const u_int8_t
*opt
, unsigned int offset
)
24 /* Beware zero-length options: make finite progress */
25 if (opt
[offset
] <= TCPOPT_NOP
|| opt
[offset
+1] == 0)
32 tcpoptstrip_mangle_packet(struct sk_buff
*skb
,
33 const struct xt_tcpoptstrip_target_info
*info
,
34 unsigned int tcphoff
, unsigned int minlen
)
36 unsigned int optl
, i
, j
;
41 if (!skb_make_writable(skb
, skb
->len
))
44 tcph
= (struct tcphdr
*)(skb_network_header(skb
) + tcphoff
);
45 opt
= (u_int8_t
*)tcph
;
48 * Walk through all TCP options - if we find some option to remove,
49 * set all octets to %TCPOPT_NOP and adjust checksum.
51 for (i
= sizeof(struct tcphdr
); i
< tcp_hdrlen(skb
); i
+= optl
) {
52 optl
= optlen(opt
, i
);
54 if (i
+ optl
> tcp_hdrlen(skb
))
57 if (!tcpoptstrip_test_bit(info
->strip_bmap
, opt
[i
]))
60 for (j
= 0; j
< optl
; ++j
) {
63 if ((i
+ j
) % 2 == 0) {
67 inet_proto_csum_replace2(&tcph
->check
, skb
, htons(o
),
70 memset(opt
+ i
, TCPOPT_NOP
, optl
);
77 tcpoptstrip_tg4(struct sk_buff
*skb
, const struct xt_action_param
*par
)
79 return tcpoptstrip_mangle_packet(skb
, par
->targinfo
, ip_hdrlen(skb
),
80 sizeof(struct iphdr
) + sizeof(struct tcphdr
));
83 #if IS_ENABLED(CONFIG_IP6_NF_MANGLE)
85 tcpoptstrip_tg6(struct sk_buff
*skb
, const struct xt_action_param
*par
)
87 struct ipv6hdr
*ipv6h
= ipv6_hdr(skb
);
92 nexthdr
= ipv6h
->nexthdr
;
93 tcphoff
= ipv6_skip_exthdr(skb
, sizeof(*ipv6h
), &nexthdr
, &frag_off
);
97 return tcpoptstrip_mangle_packet(skb
, par
->targinfo
, tcphoff
,
98 sizeof(*ipv6h
) + sizeof(struct tcphdr
));
102 static struct xt_target tcpoptstrip_tg_reg
[] __read_mostly
= {
104 .name
= "TCPOPTSTRIP",
105 .family
= NFPROTO_IPV4
,
107 .proto
= IPPROTO_TCP
,
108 .target
= tcpoptstrip_tg4
,
109 .targetsize
= sizeof(struct xt_tcpoptstrip_target_info
),
112 #if IS_ENABLED(CONFIG_IP6_NF_MANGLE)
114 .name
= "TCPOPTSTRIP",
115 .family
= NFPROTO_IPV6
,
117 .proto
= IPPROTO_TCP
,
118 .target
= tcpoptstrip_tg6
,
119 .targetsize
= sizeof(struct xt_tcpoptstrip_target_info
),
125 static int __init
tcpoptstrip_tg_init(void)
127 return xt_register_targets(tcpoptstrip_tg_reg
,
128 ARRAY_SIZE(tcpoptstrip_tg_reg
));
131 static void __exit
tcpoptstrip_tg_exit(void)
133 xt_unregister_targets(tcpoptstrip_tg_reg
,
134 ARRAY_SIZE(tcpoptstrip_tg_reg
));
137 module_init(tcpoptstrip_tg_init
);
138 module_exit(tcpoptstrip_tg_exit
);
139 MODULE_AUTHOR("Sven Schnelle <svens@bitebene.org>, Jan Engelhardt <jengelh@medozas.de>");
140 MODULE_DESCRIPTION("Xtables: TCP option stripping");
141 MODULE_LICENSE("GPL");
142 MODULE_ALIAS("ipt_TCPOPTSTRIP");
143 MODULE_ALIAS("ip6t_TCPOPTSTRIP");