404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.145.78.253: ~ $
/* SPDX-License-Identifier: GPL-2.0+ WITH Linux-syscall-note */
/*
 * Copyright (c) 2003+ Evgeniy Polyakov <johnpol@2ka.mxt.ru>
 *
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
 */

#ifndef _XT_OSF_H
#define _XT_OSF_H

#include <linux/types.h>
#include <linux/ip.h>
#include <linux/tcp.h>

#define MAXGENRELEN		32

#define XT_OSF_GENRE		(1<<0)
#define	XT_OSF_TTL		(1<<1)
#define XT_OSF_LOG		(1<<2)
#define XT_OSF_INVERT		(1<<3)

#define XT_OSF_LOGLEVEL_ALL	0	/* log all matched fingerprints */
#define XT_OSF_LOGLEVEL_FIRST	1	/* log only the first matced fingerprint */
#define XT_OSF_LOGLEVEL_ALL_KNOWN	2 /* do not log unknown packets */

#define XT_OSF_TTL_TRUE		0	/* True ip and fingerprint TTL comparison */
#define XT_OSF_TTL_LESS		1	/* Check if ip TTL is less than fingerprint one */
#define XT_OSF_TTL_NOCHECK	2	/* Do not compare ip and fingerprint TTL at all */

struct xt_osf_info {
	char			genre[MAXGENRELEN];
	__u32			len;
	__u32			flags;
	__u32			loglevel;
	__u32			ttl;
};

/*
 * Wildcard MSS (kind of).
 * It is used to implement a state machine for the different wildcard values
 * of the MSS and window sizes.
 */
struct xt_osf_wc {
	__u32			wc;
	__u32			val;
};

/*
 * This struct represents IANA options
 * http://www.iana.org/assignments/tcp-parameters
 */
struct xt_osf_opt {
	__u16			kind, length;
	struct xt_osf_wc	wc;
};

struct xt_osf_user_finger {
	struct xt_osf_wc	wss;

	__u8			ttl, df;
	__u16			ss, mss;
	__u16			opt_num;

	char			genre[MAXGENRELEN];
	char			version[MAXGENRELEN];
	char			subtype[MAXGENRELEN];

	/* MAX_IPOPTLEN is maximum if all options are NOPs or EOLs */
	struct xt_osf_opt	opt[MAX_IPOPTLEN];
};

struct xt_osf_nlmsg {
	struct xt_osf_user_finger	f;
	struct iphdr		ip;
	struct tcphdr		tcp;
};

/* Defines for IANA option kinds */

enum iana_options {
	OSFOPT_EOL = 0,		/* End of options */
	OSFOPT_NOP, 		/* NOP */
	OSFOPT_MSS, 		/* Maximum segment size */
	OSFOPT_WSO, 		/* Window scale option */
	OSFOPT_SACKP,		/* SACK permitted */
	OSFOPT_SACK,		/* SACK */
	OSFOPT_ECHO,
	OSFOPT_ECHOREPLY,
	OSFOPT_TS,		/* Timestamp option */
	OSFOPT_POCP,		/* Partial Order Connection Permitted */
	OSFOPT_POSP,		/* Partial Order Service Profile */

	/* Others are not used in the current OSF */
	OSFOPT_EMPTY = 255,
};

/*
 * Initial window size option state machine: multiple of mss, mtu or
 * plain numeric value. Can also be made as plain numeric value which
 * is not a multiple of specified value.
 */
enum xt_osf_window_size_options {
	OSF_WSS_PLAIN	= 0,
	OSF_WSS_MSS,
	OSF_WSS_MTU,
	OSF_WSS_MODULO,
	OSF_WSS_MAX,
};

/*
 * Add/remove fingerprint from the kernel.
 */
enum xt_osf_msg_types {
	OSF_MSG_ADD,
	OSF_MSG_REMOVE,
	OSF_MSG_MAX,
};

enum xt_osf_attr_type {
	OSF_ATTR_UNSPEC,
	OSF_ATTR_FINGER,
	OSF_ATTR_MAX,
};

#endif				/* _XT_OSF_H */

Filemanager

Name Type Size Permission Actions
ipset Folder 0755
nf_conntrack_common.h File 4.15 KB 0644
nf_conntrack_ftp.h File 438 B 0644
nf_conntrack_sctp.h File 576 B 0644
nf_conntrack_tcp.h File 1.3 KB 0644
nf_conntrack_tuple_common.h File 896 B 0644
nf_log.h File 538 B 0644
nf_nat.h File 1.19 KB 0644
nf_tables.h File 39.23 KB 0644
nf_tables_compat.h File 731 B 0644
nfnetlink.h File 2.37 KB 0644
nfnetlink_acct.h File 900 B 0644
nfnetlink_compat.h File 2.39 KB 0644
nfnetlink_conntrack.h File 5.57 KB 0644
nfnetlink_cthelper.h File 1.18 KB 0644
nfnetlink_cttimeout.h File 2.86 KB 0644
nfnetlink_log.h File 2.73 KB 0644
nfnetlink_queue.h File 3.42 KB 0644
x_tables.h File 4.36 KB 0644
xt_AUDIT.h File 718 B 0644
xt_CHECKSUM.h File 563 B 0644
xt_CLASSIFY.h File 217 B 0644
xt_CONNMARK.h File 199 B 0644
xt_CONNSECMARK.h File 301 B 0644
xt_CT.h File 853 B 0644
xt_DSCP.h File 697 B 0644
xt_HMARK.h File 933 B 0644
xt_IDLETIMER.h File 1.36 KB 0644
xt_LED.h File 470 B 0644
xt_LOG.h File 642 B 0644
xt_MARK.h File 184 B 0644
xt_NFLOG.h File 556 B 0644
xt_NFQUEUE.h File 779 B 0644
xt_RATEEST.h File 390 B 0644
xt_SECMARK.h File 648 B 0644
xt_SYNPROXY.h File 419 B 0644
xt_TCPMSS.h File 235 B 0644
xt_TCPOPTSTRIP.h File 407 B 0644
xt_TEE.h File 333 B 0644
xt_TPROXY.h File 575 B 0644
xt_addrtype.h File 1.06 KB 0644
xt_bpf.h File 935 B 0644
xt_cgroup.h File 740 B 0644
xt_cluster.h File 374 B 0644
xt_comment.h File 230 B 0644
xt_connbytes.h File 577 B 0644
xt_connlabel.h File 280 B 0644
xt_connlimit.h File 575 B 0644
xt_connmark.h File 755 B 0644
xt_conntrack.h File 2.5 KB 0644
xt_cpu.h File 199 B 0644
xt_dccp.h File 483 B 0644
xt_devgroup.h File 429 B 0644
xt_dscp.h File 701 B 0644
xt_ecn.h File 736 B 0644
xt_esp.h File 418 B 0644
xt_hashlimit.h File 3.18 KB 0644
xt_helper.h File 188 B 0644
xt_ipcomp.h File 485 B 0644
xt_iprange.h File 581 B 0644
xt_ipvs.h File 680 B 0644
xt_l2tp.h File 739 B 0644
xt_length.h File 221 B 0644
xt_limit.h File 673 B 0644
xt_mac.h File 227 B 0644
xt_mark.h File 260 B 0644
xt_multiport.h File 721 B 0644
xt_nfacct.h File 421 B 0644
xt_osf.h File 3.31 KB 0644
xt_owner.h File 369 B 0644
xt_physdev.h File 553 B 0644
xt_pkttype.h File 188 B 0644
xt_policy.h File 1022 B 0644
xt_quota.h File 400 B 0644
xt_rateest.h File 859 B 0644
xt_realm.h File 220 B 0644
xt_recent.h File 1.03 KB 0644
xt_rpfilter.h File 320 B 0644
xt_sctp.h File 2.27 KB 0644
xt_set.h File 1.78 KB 0644
xt_socket.h File 640 B 0644
xt_state.h File 331 B 0644
xt_statistic.h File 716 B 0644
xt_string.h File 664 B 0644
xt_tcpmss.h File 253 B 0644
xt_tcpudp.h File 1.22 KB 0644
xt_time.h File 730 B 0644
xt_u32.h File 752 B 0644