原文作者:Jesús O. 原文地址:http://www.codeproject.com/internet/drvfltip.asp翻译:zerray下载防火墙程序 - 47.7 Kb 下载源代码 - 35.2 Kb
介绍如果你决定在 Linux 下开发一个防火墙,你可以找到很多资料和源代码,全部免费。但对 Windows 平台下的防火墙感兴趣的人们就有些困难了,不仅是找资料难,找免费的源代码更是个不可能的任务!
所以,我决定写这片文章来简述一下在 Windows 2000/XP 下开发防火墙的简单方法,借以帮助那些对此感兴趣的人们。
背景In the Windows 2000 DDK, Microsoft includes a new type of network driver denominated Filter-Hook Driver. With it, you can establish a function to filter all traffic that arrive/leave to interfaces.
Because the documentation about this topic is a little and don't include samples, I write in this article the steps needed to use it successfully. I hope this article will help you to understand this easy method.
The Filter-Hook DriverAs I said before, the Filter-Hook Driver was introduced by Microsoft in Windows 2000 DDK. In fact, it is not a new network driver class, it is only a way to extend IP Filter Driver (included with Windows 2000 and ¿later?) functionality.
In fact, Filter-Hook Driver isn't a Network driver, it is a Kernel Mode Driver. Basically, in this Filter-Hook driver we implement a callback function, and then, we register this callback with the IP Filter Driver. When we do this, the IP Filter Driver calls our callback function when a packet is been sent or received. Then... what are the main steps to do this?
We can summarize them in the following steps:
Create a Filter-Hook Driver. For this, you must create a Kernel Mode Driver, you choose the name, DOS name and other driver characteristics, nothing obligatory but I recommended to use descriptive names. If we want to install the filter function, first we must get a pointer to IP Filter Driver. So, It will be the second step. We already have the pointer, now we can install the filter function. We can do it by sending a specific IRP. The data passed in this "message" includes a pointer to the filter function. Filtering packets!!!! When we decide to finish filtering, we must deregister the filter function. We can do it by "registering" as filter function the null pointer. Oh, Oh, five steps only, and it seem very easy, but... how can I make a Kernel mode driver? How can I get a pointer to the IP Filter Driver? How can I ..... yessssssss, one moment please, I will explain all these steps now :P, showing the source code sample.
Create the Kernel Mode DriverFilter-Hook driver is a Kernel Mode Driver, so if we want to do one, we have to make a Kernel Mode Driver. This article isn't a "How to develop Kernel Mode drivers in 5 minutes" guide, so I assume that the reader has some knowledge on the subject.
The structure of the Filter-Hook driver is the typical Kernel Mode Driver structure:
A driver entry where we create the device, set the standard routines in order to process IRPs (Dispatch, load, unload, create....) and create the symbolic link for communication with user applications. The standard routines to manage IRPs. Before you begin to code, I recommend, think what IOCTL you "export" to applications from device driver. In my sample, I implement four IOCTL Codes: START_IP_HOOK (registers the filter function), STOP_IP_HOOK (deregisters the filter function), ADD_FILTER (installs a new rule) and CLEAR_FILTER (frees all rules). For our driver, we must implement one more function: the filter function. I recommended you to use a program that generates the structure of a Kernel Mode Driver, so you only have to put code into the generate functions. For example, I have used QuickSYS in this project.
You can see my own implementation of the structure of the Driver, in the following code:
NTSTATUS DriverEntry(IN PDRIVER_OBJECT DriverObject,
IN PUNICODE_STRING RegistryPath)
{
//....
dprintf("DrvFltIp.SYS: entering DriverEntry\n");
//we have to create the device
RtlInitUnicodeString(&deviceNameUnicodeString, NT_DEVICE_NAME);
ntStatus = IoCreateDevice(DriverObject,
0,
&deviceNameUnicodeString,
FILE_DEVICE_DRVFLTIP,
0,
FALSE,
&deviceObject);
if ( NT_SUCCESS(ntStatus) )
{
// Create a symbolic link that Win32 apps can specify to gain access
// to this driver/device
RtlInitUnicodeString(&deviceLinkUnicodeString, DOS_DEVICE_NAME);
ntStatus = IoCreateSymbolicLink(&deviceLinkUnicodeString,
&deviceNameUnicodeString);
//....
// Create dispatch points for device control, create, close.
DriverObject->MajorFunction[IRP_MJ_CREATE] =
DriverObject->MajorFunction[IRP_MJ_CLOSE] =
DriverObject->MajorFunction[IRP_MJ_DEVICE_CONTROL] = DrvDispatch;
DriverObject->DriverUnload = DrvUnload;
}
if ( !NT_SUCCESS(ntStatus) )
{
dprintf("Error in initialization. Unloading...");
DrvUnload(DriverObject);
}
return ntStatus;
}
NTSTATUS DrvDispatch(IN PDEVICE_OBJECT DeviceObject, IN PIRP Irp)
{
// ....
switch (irpStack->MajorFunction)
{
case IRP_MJ_CREATE:
dprintf("DrvFltIp.SYS: IRP_MJ_CREATE\n");
break;
case IRP_MJ_CLOSE:
dprintf("DrvFltIp.SYS: IRP_MJ_CLOSE\n");
break;
case IRP_MJ_DEVICE_CONTROL:
dprintf("DrvFltIp.SYS: IRP_MJ_DEVICE_CONTROL\n");
ioControlCode = irpStack->Parameters.DeviceIoControl.IoControlCode;
switch (ioControlCode)
{
// ioctl code to start filtering
case START_IP_HOOK:
{
SetFilterFunction(cbFilterFunction);
break;
}
// ioctl to stop filtering
case STOP_IP_HOOK:
{
SetFilterFunction(NULL);
break;
}
// ioctl to add a filter rule
case ADD_FILTER:
{
if(inputBufferLength == sizeof(IPFilter))
{
IPFilter *nf;
nf = (IPFilter *)ioBuffer;
AddFilterToList(nf);
}
break;
}
// ioctl to free filter rule list
case CLEAR_FILTER:
{
ClearFilterList();
break;
}
default:
Irp->IoStatus.Status = STATUS_INVALID_PARAMETER;
dprintf("DrvFltIp.SYS: unknown IRP_MJ_DEVICE_CONTROL\n");
break;
}
break;
}
ntStatus = Irp->IoStatus.Status;
IoCompleteRequest(Irp, IO_NO_INCREMENT);
// We never have pending operation so always return the status code.
return ntStatus;
}
VOID DrvUnload(IN PDRIVER_OBJECT DriverObject)
{
UNICODE_STRING deviceLinkUnicodeString;
dprintf("DrvFltIp.SYS: Unloading\n");
SetFilterFunction(NULL);
// Free any resources
ClearFilterList();
// Delete the symbolic link
RtlInitUnicodeString(&deviceLinkUnicodeString, DOS_DEVICE_NAME);
IoDeleteSymbolicLink(&deviceLinkUnicodeString);
// Delete the device object
IoDeleteDevice(DriverObject->DeviceObject);
}
We already have made the driver main code, so we follow with code of the Filter-Hook Driver.
Registering a Filter functionIn the above code, you have seen a function called SetFilterFunction(..). I implemented this function to register a function in the IP Filter Driver. I will describe the steps followed:
First, we must get a pointer to the IP Filter Driver. That requires that driver is installed and executing. My user application, loads and starts IP Filter Driver before loading this driver, in order to assure this. Second, we must build an IRP specifying IOCTL_PF_SET_EXTENSION_POINTER as IO Control Code. We must pass as parameter a PF_SET_EXTENSION_HOOK_INFO structure that has information about the pointer to filter function. If you want to uninstall the function, you have to follow the same steps but passing NULL as the pointer to filter function. Send the build IRP to the device driver. Here there is one of the bigger problems of this driver. Only one filter function can be installed, so if other applications installed one, you can't install your function.
I will show in the following lines, the code of this function:
NTSTATUS SetFilterFunction
(PacketFilterExtensionPtr filterFunction)
{
NTSTATUS status = STATUS_SUCCESS, waitStatus=STATUS_SUCCESS;
UNICODE_STRING filterName;
PDEVICE_OBJECT ipDeviceObject=NULL;
PFILE_OBJECT ipFileObject=NULL;
PF_SET_EXTENSION_HOOK_INFO filterData;
KEVENT event;
IO_STATUS_BLOCK ioStatus;
PIRP irp;
dprintf("Getting pointer to IpFilterDriver\n");
//first of all, we have to get a pointer to IpFilterDriver Device
RtlInitUnicodeString(&filterName, DD_IPFLTRDRVR_DEVICE_NAME);
status = IoGetDeviceObjectPointer(&filterName,STANDARD_RIGHTS_ALL,
&ipFileObject, &ipDeviceObject);
if(NT_SUCCESS(status))
{
//initialize the struct with functions parameters
filterData.ExtensionPointer = filterFunction;
//we need initialize the event used later by
//the IpFilterDriver to signal us
//when it finished its work
KeInitializeEvent(&event, NotificationEvent, FALSE);
//we build the irp needed to establish fitler function
irp = IoBuildDeviceIoControlRequest(IOCTL_PF_SET_EXTENSION_POINTER,
ipDeviceObject,
if(irp != NULL)
{
// we send the IRP
status = IoCallDriver(ipDeviceObject, irp);
//and finally, we wait for
//"acknowledge" of IpFilter Driver
if (status == STATUS_PENDING)
{
waitStatus = KeWaitForSingleObject(&event,
Executive, KernelMode, FALSE, NULL);
if (waitStatus != STATUS_SUCCESS )
dprintf("Error waiting for IpFilterDriver response.");
}
status = ioStatus.Status;
if(!NT_SUCCESS(status))
dprintf("Error, IO error with ipFilterDriver\n");
}
else
{
//if we cant allocate the space,
//we return the corresponding code error
status = STATUS_INSUFFICIENT_RESOURCES;
dprintf("Error building IpFilterDriver IRP\n");
}
if(ipFileObject != NULL)
ObDereferenceObject(ipFileObject);
ipFileObject = NULL;
ipDeviceObject = NULL;
}
else
dprintf("Error while getting the pointer\n");
return status;
}
You can see that when we finish the process of establishing the filter function, we must de-reference the file object obtained when we got a pointer to the device driver. I use an event to be notified when IpFilter Driver finish the processes of the IRP.
The Filter functionWe have seen how we can develop the driver and how to install the filter function, but we don't know anything about this function yet.
I already said that this function is called always when the host receives or sends a packet. Depending on the return value of this function, the system decides what to do with the packet.
The prototype of this function must be:
typedef PF_FORWARD_ACTION
(*PacketFilterExtensionPtr)(
// Ip Packet Header
IN unsigned char *PacketHeader,
// Packet. Don't include Header
IN unsigned char *Packet,
// Packet length. Don't Include length of ip header
IN unsigned int PacketLength,
// Index number for the interface adapter
//over which the packet arrived
IN unsigned int RecvInterfaceIndex,
// Index number for the interface adapter
//over which the packet will be transmitted
IN unsigned int SendInterfaceIndex,
//IP address for the interface
//adapter that received the packet
IN IPAddr RecvLinkNextHop,
//IP address for the interface adapter
//that will transmit the packet
IN IPAddr SendLinkNextHop
);
PF_FORWARD_ACTION is an enumerated type that can value (in Microsoft Words):
PF_FORWARD Specifies for the IP filter driver to immediately return the forward response to the IP stack. For local packets, IP forwards them up the stack. If the destination for packets is another computer and routing is enabled, IP routes them accordingly.
PF_DROP Specifies for the IP filter driver to immediately return the drop response to the IP stack. IP should drop the packet.
PF_PASS Specifies for the IP filter driver to filter packets and return the resulting response to the IP stack. How the IP filter driver proceeds to filter packets is determined by how it was set with the Packet Filtering API.
The filter hook returns this pass response if it determined that it should not process the packet but should allow the IP filter driver to filter the packet.
Although DDK documentation only include these 3 values, if you look into pfhook.h (include needed for Filter-Hook Driver), you can see one more. This value is PF_ICMP_ON_DROP. I suppose this value correspond with dropping the packet and informing source for error with an ICMP packet.
As you can see in the definition of the filter function, the packet and its header are passed as pointers. So, you can modify header or payload and then forward the packets. This is very useful for example to do Network Address Translation (NAT). If we change destination address, IP routes the packets.
In my implementation, the filter function compares each packet with a list of rules, introduced by the user application. This list is implemented as a linked list, that is built in runtime with each START_IP_HOOK IOCTL. You can see this in my source code.
The CodeIn the first version of this article I included a simple example and, because some people requested me to help them to develop real applications, I updated it with a more complex one. The new example is a little packet filtering application. With this new program you can establish your filter rules as you can do in some commercial firewalls.
As the first version, this application has two components:
User Application: It's a MFC application that manages the filter rules. This application sends the rules to the application and decides when the driver must begin to filter. Three steps for filteringthe traffic: Define the rules you need. With Add and Delete commands you can add or delete filter rules. Install Rules. When you define the rules, click install button to send them to the driver. Start Filtering. You only have to click start button in order to begin filtering. Filter-Hook Driver: Driver that filter IP Traffic based in the filter rules received from user application. The Filter-Hook Driver must be in the same directory as the user application executable.
Why use this method to develop a Firewall?It isn't the unique method to develop firewalls for Windows, there are others as NDIS Firewall, TDI Firewall, Winsock Layered Firewall, Packet Filtering API,.... so I will mention some advantages and disadvantages of Filter-Hook Driver in order for you to decide if your future firewall must use this driver.
You have much flexibility filtering with this method. You can filter all IP traffic (and above). However you can't filter lower layer header, for example, you cant filter Ethernet frame. You need a NDIS filter to do it, more complicated to develop but more flexible. It is an easy method. Installing a firewall and the implementation of filter function is an easy procedure with this method. However Packet Filtering API is more easy yet, although it is less flexible. You can't access packet content, and you can't modify this with Packet Filtering API. Result: Filter-Hook Driver isn't the best in nothing, but it hasn't bad characteristics. However why this method isn't used in commercial products?
The answer is simple. Although this driver hasn't bad characteristics it has a great disadvantage, too. As I mentioned this before, only one filter function can be installed each time. We can develop a great firewall, it can be downloaded and installed by thousands of users but if other applications use this filter (and installed the filter function before) our program won't do anything.
This method has another disadvantage not documented by Microsoft. Although DDK documentation says that you can access packet content in filter function, it's not real. You can access packet content for received packets but for sent packets you can only read IP and TCP, UDP or ICMP header. I don't understand why...
Microsoft introduced another type of driver without this limitation in Windows XP: firewall-hook driver. Its installation is very similar, but Microsoft doesn't recommend its use because "it ran too high in the network stack". Maybe this driver will disappear in later Windows versions.
ConclusionOk, this is the finish. I know this is not the best method for developing firewalls (I mentioned the great disadvantage before), but I think this is a good beginning for interested people who are searching information, or for people who are interested now.
I hope you understood something, and you want to develop a great firewall now.