mirror of
https://github.com/apernet/OpenGFW.git
synced 2024-11-14 14:29:22 +08:00
Merge pull request #109 from apernet/wip-io-rst
feat: io tcp reset support (forward only)
This commit is contained in:
commit
bf2988116a
@ -78,6 +78,7 @@ io:
|
|||||||
rcvBuf: 4194304
|
rcvBuf: 4194304
|
||||||
sndBuf: 4194304
|
sndBuf: 4194304
|
||||||
local: true # FORWARD チェーンで OpenGFW を実行したい場合は false に設定する
|
local: true # FORWARD チェーンで OpenGFW を実行したい場合は false に設定する
|
||||||
|
rst: false # ブロックされたTCP接続に対してRSTを送信する場合はtrueに設定してください。local=falseのみです
|
||||||
|
|
||||||
workers:
|
workers:
|
||||||
count: 4
|
count: 4
|
||||||
|
@ -82,6 +82,7 @@ io:
|
|||||||
rcvBuf: 4194304
|
rcvBuf: 4194304
|
||||||
sndBuf: 4194304
|
sndBuf: 4194304
|
||||||
local: true # set to false if you want to run OpenGFW on FORWARD chain
|
local: true # set to false if you want to run OpenGFW on FORWARD chain
|
||||||
|
rst: false # set to true if you want to send RST for blocked TCP connections, local=false only
|
||||||
|
|
||||||
workers:
|
workers:
|
||||||
count: 4
|
count: 4
|
||||||
|
@ -78,6 +78,7 @@ io:
|
|||||||
rcvBuf: 4194304
|
rcvBuf: 4194304
|
||||||
sndBuf: 4194304
|
sndBuf: 4194304
|
||||||
local: true # 如果需要在 FORWARD 链上运行 OpenGFW,请设置为 false
|
local: true # 如果需要在 FORWARD 链上运行 OpenGFW,请设置为 false
|
||||||
|
rst: false # 是否对要阻断的 TCP 连接发送 RST。仅在 local=false 时有效
|
||||||
|
|
||||||
workers:
|
workers:
|
||||||
count: 4
|
count: 4
|
||||||
|
@ -171,6 +171,7 @@ type cliConfigIO struct {
|
|||||||
ReadBuffer int `mapstructure:"rcvBuf"`
|
ReadBuffer int `mapstructure:"rcvBuf"`
|
||||||
WriteBuffer int `mapstructure:"sndBuf"`
|
WriteBuffer int `mapstructure:"sndBuf"`
|
||||||
Local bool `mapstructure:"local"`
|
Local bool `mapstructure:"local"`
|
||||||
|
RST bool `mapstructure:"rst"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type cliConfigWorkers struct {
|
type cliConfigWorkers struct {
|
||||||
@ -197,6 +198,7 @@ func (c *cliConfig) fillIO(config *engine.Config) error {
|
|||||||
ReadBuffer: c.IO.ReadBuffer,
|
ReadBuffer: c.IO.ReadBuffer,
|
||||||
WriteBuffer: c.IO.WriteBuffer,
|
WriteBuffer: c.IO.WriteBuffer,
|
||||||
Local: c.IO.Local,
|
Local: c.IO.Local,
|
||||||
|
RST: c.IO.RST,
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return configError{Field: "io", Err: err}
|
return configError{Field: "io", Err: err}
|
||||||
|
173
io/nfqueue.go
173
io/nfqueue.go
@ -27,59 +27,60 @@ const (
|
|||||||
nftTable = "opengfw"
|
nftTable = "opengfw"
|
||||||
)
|
)
|
||||||
|
|
||||||
var nftRulesForward = fmt.Sprintf(`
|
func generateNftRules(local, rst bool) (*nftTableSpec, error) {
|
||||||
define ACCEPT_CTMARK=%d
|
if local && rst {
|
||||||
define DROP_CTMARK=%d
|
return nil, errors.New("tcp rst is not supported in local mode")
|
||||||
define QUEUE_NUM=%d
|
}
|
||||||
|
table := &nftTableSpec{
|
||||||
table %s %s {
|
Family: nftFamily,
|
||||||
chain FORWARD {
|
Table: nftTable,
|
||||||
type filter hook forward priority filter; policy accept;
|
}
|
||||||
|
table.Defines = append(table.Defines, fmt.Sprintf("define ACCEPT_CTMARK=%d", nfqueueConnMarkAccept))
|
||||||
ct mark $ACCEPT_CTMARK counter accept
|
table.Defines = append(table.Defines, fmt.Sprintf("define DROP_CTMARK=%d", nfqueueConnMarkDrop))
|
||||||
ct mark $DROP_CTMARK counter drop
|
table.Defines = append(table.Defines, fmt.Sprintf("define QUEUE_NUM=%d", nfqueueNum))
|
||||||
counter queue num $QUEUE_NUM bypass
|
if local {
|
||||||
}
|
table.Chains = []nftChainSpec{
|
||||||
}
|
{Chain: "INPUT", Header: "type filter hook input priority filter; policy accept;"},
|
||||||
`, nfqueueConnMarkAccept, nfqueueConnMarkDrop, nfqueueNum, nftFamily, nftTable)
|
{Chain: "OUTPUT", Header: "type filter hook output priority filter; policy accept;"},
|
||||||
|
}
|
||||||
var nftRulesLocal = fmt.Sprintf(`
|
} else {
|
||||||
define ACCEPT_CTMARK=%d
|
table.Chains = []nftChainSpec{
|
||||||
define DROP_CTMARK=%d
|
{Chain: "FORWARD", Header: "type filter hook forward priority filter; policy accept;"},
|
||||||
define QUEUE_NUM=%d
|
}
|
||||||
|
}
|
||||||
table %s %s {
|
for i := range table.Chains {
|
||||||
chain INPUT {
|
c := &table.Chains[i]
|
||||||
type filter hook input priority filter; policy accept;
|
c.Rules = append(c.Rules, "ct mark $ACCEPT_CTMARK counter accept")
|
||||||
|
if rst {
|
||||||
ct mark $ACCEPT_CTMARK counter accept
|
c.Rules = append(c.Rules, "ip protocol tcp ct mark $DROP_CTMARK counter reject with tcp reset")
|
||||||
ct mark $DROP_CTMARK counter drop
|
}
|
||||||
counter queue num $QUEUE_NUM bypass
|
c.Rules = append(c.Rules, "ct mark $DROP_CTMARK counter drop")
|
||||||
}
|
c.Rules = append(c.Rules, "counter queue num $QUEUE_NUM bypass")
|
||||||
chain OUTPUT {
|
}
|
||||||
type filter hook output priority filter; policy accept;
|
return table, nil
|
||||||
|
|
||||||
ct mark $ACCEPT_CTMARK counter accept
|
|
||||||
ct mark $DROP_CTMARK counter drop
|
|
||||||
counter queue num $QUEUE_NUM bypass
|
|
||||||
}
|
|
||||||
}
|
|
||||||
`, nfqueueConnMarkAccept, nfqueueConnMarkDrop, nfqueueNum, nftFamily, nftTable)
|
|
||||||
|
|
||||||
var iptRulesForward = []iptRule{
|
|
||||||
{"filter", "FORWARD", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkAccept), "-j", "ACCEPT"}},
|
|
||||||
{"filter", "FORWARD", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkDrop), "-j", "DROP"}},
|
|
||||||
{"filter", "FORWARD", []string{"-j", "NFQUEUE", "--queue-num", strconv.Itoa(nfqueueNum), "--queue-bypass"}},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var iptRulesLocal = []iptRule{
|
func generateIptRules(local, rst bool) ([]iptRule, error) {
|
||||||
{"filter", "INPUT", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkAccept), "-j", "ACCEPT"}},
|
if local && rst {
|
||||||
{"filter", "INPUT", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkDrop), "-j", "DROP"}},
|
return nil, errors.New("tcp rst is not supported in local mode")
|
||||||
{"filter", "INPUT", []string{"-j", "NFQUEUE", "--queue-num", strconv.Itoa(nfqueueNum), "--queue-bypass"}},
|
}
|
||||||
|
var chains []string
|
||||||
|
if local {
|
||||||
|
chains = []string{"INPUT", "OUTPUT"}
|
||||||
|
} else {
|
||||||
|
chains = []string{"FORWARD"}
|
||||||
|
}
|
||||||
|
rules := make([]iptRule, 0, 4*len(chains))
|
||||||
|
for _, chain := range chains {
|
||||||
|
rules = append(rules, iptRule{"filter", chain, []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkAccept), "-j", "ACCEPT"}})
|
||||||
|
if rst {
|
||||||
|
rules = append(rules, iptRule{"filter", chain, []string{"-p", "tcp", "-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkDrop), "-j", "REJECT", "--reject-with", "tcp-reset"}})
|
||||||
|
}
|
||||||
|
rules = append(rules, iptRule{"filter", chain, []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkDrop), "-j", "DROP"}})
|
||||||
|
rules = append(rules, iptRule{"filter", chain, []string{"-j", "NFQUEUE", "--queue-num", strconv.Itoa(nfqueueNum), "--queue-bypass"}})
|
||||||
|
}
|
||||||
|
|
||||||
{"filter", "OUTPUT", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkAccept), "-j", "ACCEPT"}},
|
return rules, nil
|
||||||
{"filter", "OUTPUT", []string{"-m", "connmark", "--mark", strconv.Itoa(nfqueueConnMarkDrop), "-j", "DROP"}},
|
|
||||||
{"filter", "OUTPUT", []string{"-j", "NFQUEUE", "--queue-num", strconv.Itoa(nfqueueNum), "--queue-bypass"}},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ PacketIO = (*nfqueuePacketIO)(nil)
|
var _ PacketIO = (*nfqueuePacketIO)(nil)
|
||||||
@ -89,6 +90,7 @@ var errNotNFQueuePacket = errors.New("not an NFQueue packet")
|
|||||||
type nfqueuePacketIO struct {
|
type nfqueuePacketIO struct {
|
||||||
n *nfqueue.Nfqueue
|
n *nfqueue.Nfqueue
|
||||||
local bool
|
local bool
|
||||||
|
rst bool
|
||||||
rSet bool // whether the nftables/iptables rules have been set
|
rSet bool // whether the nftables/iptables rules have been set
|
||||||
|
|
||||||
// iptables not nil = use iptables instead of nftables
|
// iptables not nil = use iptables instead of nftables
|
||||||
@ -101,6 +103,7 @@ type NFQueuePacketIOConfig struct {
|
|||||||
ReadBuffer int
|
ReadBuffer int
|
||||||
WriteBuffer int
|
WriteBuffer int
|
||||||
Local bool
|
Local bool
|
||||||
|
RST bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewNFQueuePacketIO(config NFQueuePacketIOConfig) (PacketIO, error) {
|
func NewNFQueuePacketIO(config NFQueuePacketIOConfig) (PacketIO, error) {
|
||||||
@ -147,6 +150,7 @@ func NewNFQueuePacketIO(config NFQueuePacketIOConfig) (PacketIO, error) {
|
|||||||
return &nfqueuePacketIO{
|
return &nfqueuePacketIO{
|
||||||
n: n,
|
n: n,
|
||||||
local: config.Local,
|
local: config.Local,
|
||||||
|
rst: config.RST,
|
||||||
ipt4: ipt4,
|
ipt4: ipt4,
|
||||||
ipt6: ipt6,
|
ipt6: ipt6,
|
||||||
}, nil
|
}, nil
|
||||||
@ -182,9 +186,9 @@ func (n *nfqueuePacketIO) Register(ctx context.Context, cb PacketCallback) error
|
|||||||
}
|
}
|
||||||
if !n.rSet {
|
if !n.rSet {
|
||||||
if n.ipt4 != nil {
|
if n.ipt4 != nil {
|
||||||
err = n.setupIpt(n.local, false)
|
err = n.setupIpt(n.local, n.rst, false)
|
||||||
} else {
|
} else {
|
||||||
err = n.setupNft(n.local, false)
|
err = n.setupNft(n.local, n.rst, false)
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -238,29 +242,27 @@ func (n *nfqueuePacketIO) SetVerdict(p Packet, v Verdict, newPacket []byte) erro
|
|||||||
func (n *nfqueuePacketIO) Close() error {
|
func (n *nfqueuePacketIO) Close() error {
|
||||||
if n.rSet {
|
if n.rSet {
|
||||||
if n.ipt4 != nil {
|
if n.ipt4 != nil {
|
||||||
_ = n.setupIpt(n.local, true)
|
_ = n.setupIpt(n.local, n.rst, true)
|
||||||
} else {
|
} else {
|
||||||
_ = n.setupNft(n.local, true)
|
_ = n.setupNft(n.local, n.rst, true)
|
||||||
}
|
}
|
||||||
n.rSet = false
|
n.rSet = false
|
||||||
}
|
}
|
||||||
return n.n.Close()
|
return n.n.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (n *nfqueuePacketIO) setupNft(local, remove bool) error {
|
func (n *nfqueuePacketIO) setupNft(local, rst, remove bool) error {
|
||||||
var rules string
|
rules, err := generateNftRules(local, rst)
|
||||||
if local {
|
if err != nil {
|
||||||
rules = nftRulesLocal
|
return err
|
||||||
} else {
|
|
||||||
rules = nftRulesForward
|
|
||||||
}
|
}
|
||||||
var err error
|
rulesText := rules.String()
|
||||||
if remove {
|
if remove {
|
||||||
err = nftDelete(nftFamily, nftTable)
|
err = nftDelete(nftFamily, nftTable)
|
||||||
} else {
|
} else {
|
||||||
// Delete first to make sure no leftover rules
|
// Delete first to make sure no leftover rules
|
||||||
_ = nftDelete(nftFamily, nftTable)
|
_ = nftDelete(nftFamily, nftTable)
|
||||||
err = nftAdd(rules)
|
err = nftAdd(rulesText)
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -268,14 +270,11 @@ func (n *nfqueuePacketIO) setupNft(local, remove bool) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (n *nfqueuePacketIO) setupIpt(local, remove bool) error {
|
func (n *nfqueuePacketIO) setupIpt(local, rst, remove bool) error {
|
||||||
var rules []iptRule
|
rules, err := generateIptRules(local, rst)
|
||||||
if local {
|
if err != nil {
|
||||||
rules = iptRulesLocal
|
return err
|
||||||
} else {
|
|
||||||
rules = iptRulesForward
|
|
||||||
}
|
}
|
||||||
var err error
|
|
||||||
if remove {
|
if remove {
|
||||||
err = iptsBatchDeleteIfExists([]*iptables.IPTables{n.ipt4, n.ipt6}, rules)
|
err = iptsBatchDeleteIfExists([]*iptables.IPTables{n.ipt4, n.ipt6}, rules)
|
||||||
} else {
|
} else {
|
||||||
@ -330,6 +329,42 @@ func nftDelete(family, table string) error {
|
|||||||
return cmd.Run()
|
return cmd.Run()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type nftTableSpec struct {
|
||||||
|
Defines []string
|
||||||
|
Family, Table string
|
||||||
|
Chains []nftChainSpec
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *nftTableSpec) String() string {
|
||||||
|
chains := make([]string, 0, len(t.Chains))
|
||||||
|
for _, c := range t.Chains {
|
||||||
|
chains = append(chains, c.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Sprintf(`
|
||||||
|
%s
|
||||||
|
|
||||||
|
table %s %s {
|
||||||
|
%s
|
||||||
|
}
|
||||||
|
`, strings.Join(t.Defines, "\n"), t.Family, t.Table, strings.Join(chains, ""))
|
||||||
|
}
|
||||||
|
|
||||||
|
type nftChainSpec struct {
|
||||||
|
Chain string
|
||||||
|
Header string
|
||||||
|
Rules []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *nftChainSpec) String() string {
|
||||||
|
return fmt.Sprintf(`
|
||||||
|
chain %s {
|
||||||
|
%s
|
||||||
|
%s
|
||||||
|
}
|
||||||
|
`, c.Chain, c.Header, strings.Join(c.Rules, "\n\x20\x20\x20\x20"))
|
||||||
|
}
|
||||||
|
|
||||||
type iptRule struct {
|
type iptRule struct {
|
||||||
Table, Chain string
|
Table, Chain string
|
||||||
RuleSpec []string
|
RuleSpec []string
|
||||||
|
Loading…
Reference in New Issue
Block a user