#ifndef _NF_CONNTRACK_COMMON_H #define _NF_CONNTRACK_COMMON_H /* Connection state tracking for netfilter. This is separated from, but required by, the NAT layer; it can also be used by an iptables extension. */ enum ip_conntrack_info { /* Part of an established connection (either direction). */ IP_CT_ESTABLISHED, /* Like NEW, but related to an existing connection, or ICMP error (in either direction). */ IP_CT_RELATED, /* Started a new connection to track (only IP_CT_DIR_ORIGINAL); may be a retransmission. */ IP_CT_NEW, /* >= this indicates reply direction */ IP_CT_IS_REPLY, IP_CT_ESTABLISHED_REPLY = IP_CT_ESTABLISHED + IP_CT_IS_REPLY, IP_CT_RELATED_REPLY = IP_CT_RELATED + IP_CT_IS_REPLY, /* No NEW in reply direction. */ /* Number of distinct IP_CT types. */ IP_CT_NUMBER, /* only for userspace compatibility */ IP_CT_NEW_REPLY = IP_CT_NUMBER, }; #define NF_CT_STATE_INVALID_BIT (1 << 0) #define NF_CT_STATE_BIT(ctinfo) (1 << ((ctinfo) % IP_CT_IS_REPLY + 1)) #define NF_CT_STATE_UNTRACKED_BIT (1 << 6) /* Bitset representing status of connection. */ enum ip_conntrack_status { /* It's an expected connection: bit 0 set. This bit never changed */ IPS_EXPECTED_BIT = 0, IPS_EXPECTED = (1 << IPS_EXPECTED_BIT), /* We've seen packets both ways: bit 1 set. Can be set, not unset. */ IPS_SEEN_REPLY_BIT = 1, IPS_SEEN_REPLY = (1 << IPS_SEEN_REPLY_BIT), /* Conntrack should never be early-expired. */ IPS_ASSURED_BIT = 2, IPS_ASSURED = (1 << IPS_ASSURED_BIT), /* Connection is confirmed: originating packet has left box */ IPS_CONFIRMED_BIT = 3, IPS_CONFIRMED = (1 << IPS_CONFIRMED_BIT), /* Connection needs src nat in orig dir. This bit never changed. */ IPS_SRC_NAT_BIT = 4, IPS_SRC_NAT = (1 << IPS_SRC_NAT_BIT), /* Connection needs dst nat in orig dir. This bit never changed. */ IPS_DST_NAT_BIT = 5, IPS_DST_NAT = (1 << IPS_DST_NAT_BIT), /* Both together. */ IPS_NAT_MASK = (IPS_DST_NAT | IPS_SRC_NAT), /* Connection needs TCP sequence adjusted. */ IPS_SEQ_ADJUST_BIT = 6, IPS_SEQ_ADJUST = (1 << IPS_SEQ_ADJUST_BIT), /* NAT initialization bits. */ IPS_SRC_NAT_DONE_BIT = 7, IPS_SRC_NAT_DONE = (1 << IPS_SRC_NAT_DONE_BIT), IPS_DST_NAT_DONE_BIT = 8, IPS_DST_NAT_DONE = (1 << IPS_DST_NAT_DONE_BIT), /* Both together */ IPS_NAT_DONE_MASK = (IPS_DST_NAT_DONE | IPS_SRC_NAT_DONE), /* Connection is dying (removed from lists), can not be unset. */ IPS_DYING_BIT = 9, IPS_DYING = (1 << IPS_DYING_BIT), /* Connection has fixed timeout. */ IPS_FIXED_TIMEOUT_BIT = 10, IPS_FIXED_TIMEOUT = (1 << IPS_FIXED_TIMEOUT_BIT), /* Conntrack is a template */ IPS_TEMPLATE_BIT = 11, IPS_TEMPLATE = (1 << IPS_TEMPLATE_BIT), /* Conntrack is a fake untracked entry. Obsolete and not used anymore */ IPS_UNTRACKED_BIT = 12, IPS_UNTRACKED = (1 << IPS_UNTRACKED_BIT), /* Conntrack got a helper explicitly attached via CT target. */ IPS_HELPER_BIT = 13, IPS_HELPER = (1 << IPS_HELPER_BIT), /* Be careful here, modifying these bits can make things messy, * so don't let users modify them directly. */ IPS_UNCHANGEABLE_MASK = (IPS_NAT_DONE_MASK | IPS_NAT_MASK | IPS_EXPECTED | IPS_CONFIRMED | IPS_DYING | IPS_SEQ_ADJUST | IPS_TEMPLATE), __IPS_MAX_BIT = 14, }; /* Connection tracking event types */ enum ip_conntrack_events { IPCT_NEW, /* new conntrack */ IPCT_RELATED, /* related conntrack */ IPCT_DESTROY, /* destroyed conntrack */ IPCT_REPLY, /* connection has seen two-way traffic */ IPCT_ASSURED, /* connection status has changed to assured */ IPCT_PROTOINFO, /* protocol information has changed */ IPCT_HELPER, /* new helper has been set */ IPCT_MARK, /* new mark has been set */ IPCT_SEQADJ, /* sequence adjustment has changed */ IPCT_NATSEQADJ = IPCT_SEQADJ, IPCT_SECMARK, /* new security mark has been set */ IPCT_LABEL, /* new connlabel has been set */ }; enum ip_conntrack_expect_events { IPEXP_NEW, /* new expectation */ IPEXP_DESTROY, /* destroyed expectation */ }; /* expectation flags */ #define NF_CT_EXPECT_PERMANENT 0x1 #define NF_CT_EXPECT_INACTIVE 0x2 #define NF_CT_EXPECT_USERSPACE 0x4 #endif /* _NF_CONNTRACK_COMMON_H */
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
ipset | Folder | 0755 |
|
|
nf_conntrack_common.h | File | 4.09 KB | 0644 |
|
nf_conntrack_ftp.h | File | 375 B | 0644 |
|
nf_conntrack_sctp.h | File | 595 B | 0644 |
|
nf_conntrack_tcp.h | File | 1.24 KB | 0644 |
|
nf_conntrack_tuple_common.h | File | 708 B | 0644 |
|
nf_nat.h | File | 1.12 KB | 0644 |
|
nf_tables.h | File | 31.31 KB | 0644 |
|
nf_tables_compat.h | File | 668 B | 0644 |
|
nfnetlink.h | File | 2.01 KB | 0644 |
|
nfnetlink_acct.h | File | 522 B | 0644 |
|
nfnetlink_compat.h | File | 2.33 KB | 0644 |
|
nfnetlink_conntrack.h | File | 5.42 KB | 0644 |
|
nfnetlink_cthelper.h | File | 1.11 KB | 0644 |
|
nfnetlink_cttimeout.h | File | 2.8 KB | 0644 |
|
nfnetlink_log.h | File | 2.51 KB | 0644 |
|
nfnetlink_queue.h | File | 2.88 KB | 0644 |
|
x_tables.h | File | 4.3 KB | 0644 |
|
xt_AUDIT.h | File | 655 B | 0644 |
|
xt_CHECKSUM.h | File | 500 B | 0644 |
|
xt_CLASSIFY.h | File | 154 B | 0644 |
|
xt_CONNMARK.h | File | 136 B | 0644 |
|
xt_CONNSECMARK.h | File | 238 B | 0644 |
|
xt_CT.h | File | 790 B | 0644 |
|
xt_DSCP.h | File | 634 B | 0644 |
|
xt_HMARK.h | File | 841 B | 0644 |
|
xt_IDLETIMER.h | File | 1.3 KB | 0644 |
|
xt_LED.h | File | 407 B | 0644 |
|
xt_LOG.h | File | 579 B | 0644 |
|
xt_MARK.h | File | 121 B | 0644 |
|
xt_NFLOG.h | File | 326 B | 0644 |
|
xt_NFQUEUE.h | File | 716 B | 0644 |
|
xt_RATEEST.h | File | 305 B | 0644 |
|
xt_SECMARK.h | File | 486 B | 0644 |
|
xt_TCPMSS.h | File | 172 B | 0644 |
|
xt_TCPOPTSTRIP.h | File | 344 B | 0644 |
|
xt_TEE.h | File | 240 B | 0644 |
|
xt_TPROXY.h | File | 483 B | 0644 |
|
xt_addrtype.h | File | 1021 B | 0644 |
|
xt_bpf.h | File | 340 B | 0644 |
|
xt_cgroup.h | File | 149 B | 0644 |
|
xt_cluster.h | File | 311 B | 0644 |
|
xt_comment.h | File | 167 B | 0644 |
|
xt_connbytes.h | File | 514 B | 0644 |
|
xt_connlabel.h | File | 217 B | 0644 |
|
xt_connlimit.h | File | 512 B | 0644 |
|
xt_connmark.h | File | 691 B | 0644 |
|
xt_conntrack.h | File | 2.43 KB | 0644 |
|
xt_cpu.h | File | 136 B | 0644 |
|
xt_dccp.h | File | 420 B | 0644 |
|
xt_devgroup.h | File | 366 B | 0644 |
|
xt_dscp.h | File | 638 B | 0644 |
|
xt_ecn.h | File | 673 B | 0644 |
|
xt_esp.h | File | 355 B | 0644 |
|
xt_hashlimit.h | File | 1.83 KB | 0644 |
|
xt_helper.h | File | 125 B | 0644 |
|
xt_iprange.h | File | 518 B | 0644 |
|
xt_ipvs.h | File | 588 B | 0644 |
|
xt_length.h | File | 158 B | 0644 |
|
xt_limit.h | File | 610 B | 0644 |
|
xt_mac.h | File | 135 B | 0644 |
|
xt_mark.h | File | 197 B | 0644 |
|
xt_multiport.h | File | 658 B | 0644 |
|
xt_nfacct.h | File | 238 B | 0644 |
|
xt_osf.h | File | 3.27 KB | 0644 |
|
xt_owner.h | File | 306 B | 0644 |
|
xt_physdev.h | File | 469 B | 0644 |
|
xt_pkttype.h | File | 125 B | 0644 |
|
xt_policy.h | File | 914 B | 0644 |
|
xt_quota.h | File | 337 B | 0644 |
|
xt_rateest.h | File | 774 B | 0644 |
|
xt_realm.h | File | 157 B | 0644 |
|
xt_recent.h | File | 966 B | 0644 |
|
xt_rpfilter.h | File | 257 B | 0644 |
|
xt_sctp.h | File | 2.22 KB | 0644 |
|
xt_set.h | File | 1.72 KB | 0644 |
|
xt_socket.h | File | 382 B | 0644 |
|
xt_state.h | File | 268 B | 0644 |
|
xt_statistic.h | File | 653 B | 0644 |
|
xt_string.h | File | 601 B | 0644 |
|
xt_tcpmss.h | File | 190 B | 0644 |
|
xt_tcpudp.h | File | 1.16 KB | 0644 |
|
xt_time.h | File | 667 B | 0644 |
|
xt_u32.h | File | 689 B | 0644 |
|