aboutsummaryrefslogtreecommitdiff
path: root/src/pkt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/pkt.c')
-rw-r--r--src/pkt.c403
1 files changed, 403 insertions, 0 deletions
diff --git a/src/pkt.c b/src/pkt.c
new file mode 100644
index 0000000..9bd8777
--- /dev/null
+++ b/src/pkt.c
@@ -0,0 +1,403 @@
+#ifndef WIN32
+#include <netinet/in.h>
+#include <arpa/inet.h>
+#include <pthread.h>
+#endif
+#include <sys/time.h>
+
+#include "ptunnel.h"
+#include "pkt.h"
+#include "pdesc.h"
+#include "options.h"
+#include "utils.h"
+
+/* handle_proxy_packet:
+ * Processes incoming ICMP packets for the proxy. The packet can come either from the
+ * packet capture lib, or from the actual socket or both.
+ * Input: A buffer pointing at the start of an IP header, the buffer length and the proxy
+ * descriptor chain.
+ */
+void handle_packet(char *buf, unsigned bytes, int is_pcap, struct sockaddr_in *addr, int icmp_sock) {
+ ip_packet_t *ip_pkt;
+ icmp_echo_packet_t *pkt;
+ ping_tunnel_pkt_t *pt_pkt;
+ proxy_desc_t *cur;
+ uint32_t type_flag, pkt_flag, init_state, proxy_flag;
+ challenge_t *challenge;
+ struct timeval tt;
+
+ proxy_flag = kProxy_flag;
+
+ if (bytes < sizeof(icmp_echo_packet_t)+sizeof(ping_tunnel_pkt_t))
+ pt_log(kLog_verbose, "Skipping this packet - too short. "
+ "Expect: %d+%d = %d ; Got: %d\n",
+ sizeof(icmp_echo_packet_t),
+ sizeof(ping_tunnel_pkt_t),
+ sizeof(icmp_echo_packet_t) +
+ sizeof(ping_tunnel_pkt_t), bytes);
+ else {
+ if (opts.udp) {
+ ip_pkt = 0;
+ pkt = (icmp_echo_packet_t*)buf;
+ pt_pkt = (ping_tunnel_pkt_t*)pkt->data;
+ }
+ else {
+ ip_pkt = (ip_packet_t*)buf;
+ pkt = (icmp_echo_packet_t*)ip_pkt->data;
+ pt_pkt = (ping_tunnel_pkt_t*)pkt->data;
+ }
+
+ if (ntohl(pt_pkt->magic) == opts.magic) {
+ pt_pkt->state = ntohl(pt_pkt->state);
+ pkt->identifier = ntohs(pkt->identifier);
+ pt_pkt->id_no = ntohs(pt_pkt->id_no);
+ pt_pkt->seq_no = ntohs(pt_pkt->seq_no);
+ /* Find the relevant connection, if it exists */
+ pthread_mutex_lock(&chain_lock);
+ for (cur=chain;cur;cur=cur->next) {
+ if (cur->id_no == pt_pkt->id_no)
+ break;
+ }
+ pthread_mutex_unlock(&chain_lock);
+
+ /* Handle the packet if it comes from "the other end." This is a bit tricky
+ * to get right, since we receive both our own and the other end's packets.
+ * Basically, a proxy will accept any packet from a user, regardless if it
+ * has a valid connection or not. A user will only accept the packet if there
+ * exists a connection to handle it.
+ */
+ if (cur) {
+ type_flag = cur->type_flag;
+ if (type_flag == (uint32_t)kProxy_flag)
+ cur->icmp_id = pkt->identifier;
+ if (!is_pcap)
+ cur->xfer.icmp_in++;
+ }
+ else
+ type_flag = kProxy_flag;
+
+ pkt_flag = pt_pkt->state & kFlag_mask;
+ pt_pkt->state &= ~kFlag_mask;
+ pt_log(kLog_sendrecv, "Recv: %d [%d] bytes "
+ "[seq = %d] [type = %s] "
+ "[ack = %d] [icmp = %d] "
+ "[user = %s] [pcap = %d]\n",
+ bytes, ntohl(pt_pkt->data_len),
+ pt_pkt->seq_no, state_name[pt_pkt->state & (~kFlag_mask)],
+ ntohl(pt_pkt->ack), pkt->type,
+ (pkt_flag == kUser_flag ? "yes" : "no"), is_pcap);
+
+ /* This test essentially verifies that the packet comes from someone who isn't us. */
+ if ((pkt_flag == kUser_flag && type_flag == proxy_flag) ||
+ (pkt_flag == proxy_flag && type_flag == kUser_flag))
+ {
+ pt_pkt->data_len = ntohl(pt_pkt->data_len);
+ pt_pkt->ack = ntohl(pt_pkt->ack);
+ if (pt_pkt->state == kProxy_start) {
+ if (!cur && type_flag == proxy_flag) {
+ pt_log(kLog_info, "Incoming tunnel request from %s.\n",
+ inet_ntoa(*(struct in_addr *)&addr->sin_addr));
+ gettimeofday(&tt, 0);
+ if (tt.tv_sec < seq_expiry_tbl[pt_pkt->id_no]) {
+ pt_log(kLog_verbose, "Dropping request: ID was recently in use.\n");
+ return;
+ }
+ pt_log(kLog_info, "Starting new session to %s:%d with ID %d\n",
+ inet_ntoa(*(struct in_addr *)&pt_pkt->dst_ip),
+ ntohl(pt_pkt->dst_port), pt_pkt->id_no);
+ if ((opts.given_dst_ip && opts.given_dst_ip != pt_pkt->dst_ip) ||
+ ((uint32_t)-1 != opts.given_dst_port && opts.given_dst_port != ntohl(pt_pkt->dst_port)))
+ {
+ pt_log(kLog_info, "Destination administratively prohibited!\n");
+ return;
+ }
+
+ if (opts.password)
+ init_state = kProto_authenticate;
+ else
+ init_state = kProto_data;
+
+ cur = create_and_insert_proxy_desc(pt_pkt->id_no, pkt->identifier, 0,
+ addr, pt_pkt->dst_ip,
+ ntohl(pt_pkt->dst_port),
+ init_state, kProxy_flag);
+ if (init_state == kProto_authenticate) {
+ pt_log(kLog_debug, "Sending authentication challenge..\n");
+ /* Send challenge */
+ cur->challenge = generate_challenge();
+ memcpy(cur->buf, cur->challenge, sizeof(challenge_t));
+ queue_packet(icmp_sock, cur->pkt_type, cur->buf,
+ sizeof(challenge_t), cur->id_no,
+ cur->icmp_id, &cur->my_seq, cur->send_ring,
+ &cur->send_idx, &cur->send_wait_ack, 0, 0,
+ kProto_authenticate | cur->type_flag,
+ &cur->dest_addr, cur->next_remote_seq,
+ &cur->send_first_ack, &cur->ping_seq);
+ }
+ }
+ else if (type_flag == kUser_flag) {
+ pt_log(kLog_error, "Dropping proxy session request - we are not a proxy!\n");
+ return;
+ }
+ else
+ pt_log(kLog_error, "Dropping duplicate proxy session request.\n");
+ }
+ else if (cur && pt_pkt->state == kProto_authenticate) {
+ /* Sanity check packet length, and make sure it matches what we expect */
+ if (pt_pkt->data_len != sizeof(challenge_t)) {
+ pt_log(kLog_error, "Received challenge packet, but data length "
+ "is not as expected.\n");
+ pt_log(kLog_debug, "Data length: %d Expected: %d\n",
+ pt_pkt->data_len, sizeof (challenge_t));
+ cur->should_remove = 1;
+ return;
+ }
+ /* Prevent packet data from being forwarded over TCP! */
+ pt_pkt->data_len = 0;
+ challenge = (challenge_t*)pt_pkt->data;
+ /* If client: Compute response to challenge */
+ if (type_flag == kUser_flag) {
+ if (!opts.password) {
+ pt_log(kLog_error, "This proxy requires a password! "
+ "Please supply one usin g the -x switch.\n");
+ send_termination_msg(cur, icmp_sock);
+ cur->should_remove = 1;
+ return;
+ }
+ pt_log(kLog_debug, "Got authentication challenge - sending response\n");
+ generate_response(challenge);
+ queue_packet(icmp_sock, cur->pkt_type, (char*)challenge,
+ sizeof(challenge_t), cur->id_no, cur->icmp_id,
+ &cur->my_seq, cur->send_ring, &cur->send_idx,
+ &cur->send_wait_ack, 0, 0,
+ kProto_authenticate | cur->type_flag, &cur->dest_addr,
+ cur->next_remote_seq, &cur->send_first_ack, &cur-> ping_seq);
+ /* We have authenticated locally.
+ * It's up to the proxy now if it accepts our response or not..
+ */
+ cur->authenticated = 1;
+ handle_data(pkt, bytes, cur->recv_ring, &cur->recv_wait_send,
+ &cur->recv_idx, &cur->next_remote_seq);
+ return;
+ }
+ /* If proxy: Handle client's response to challenge */
+ else if (type_flag == proxy_flag) {
+ pt_log(kLog_debug, "Received remote challenge response.\n");
+ if (validate_challenge(cur->challenge, challenge) ||
+ cur->authenticated)
+ {
+ pt_log(kLog_verbose, "Remote end authenticated successfully.\n");
+ /* Authentication has succeeded, so now we can proceed
+ * to handle incoming TCP data.
+ */
+ cur->authenticated = 1;
+ cur->state = kProto_data;
+ /* Insert the packet into the receive ring, to avoid
+ * confusing the reliab ility mechanism.
+ */
+ handle_data(pkt, bytes, cur->recv_ring, &cur->recv_wait_send,
+ &cur->recv_idx, &cur->next_remote_seq);
+ }
+ else {
+ pt_log(kLog_info, "Remote end failed authentication.\n");
+ send_termination_msg(cur, icmp_sock);
+ cur->should_remove = 1;
+ }
+ return;
+ }
+ }
+ /* Handle close-messages for connections we know about */
+ if (cur && pt_pkt->state == kProto_close) {
+ pt_log(kLog_info, "Received session close from remote peer.\n");
+ cur->should_remove = 1;
+ return;
+ }
+ /* The proxy will ignore any other packets from the client
+ * until it has been authenticated. The packet resend mechanism
+ * insures that this isn't problematic.
+ */
+ if (type_flag == proxy_flag && opts.password &&
+ cur && !cur->authenticated)
+ {
+ pt_log(kLog_debug, "Ignoring packet with seq-no %d "
+ "- not authenticated yet.\n", pt_pkt->seq_no);
+ return;
+ }
+
+ if (cur && cur->sock) {
+ if (pt_pkt->state == kProto_data || pt_pkt->state == kProxy_start ||
+ pt_pkt->state == kProto_ack)
+ {
+ handle_data(pkt, bytes, cur->recv_ring, &cur->recv_wait_send,
+ &cur->recv_idx, &cur->next_remote_seq);
+ }
+ handle_ack((uint16_t)pt_pkt->ack, cur->send_ring, &cur->send_wait_ack,
+ 0, cur->send_idx, &cur->send_first_ack, &cur->remote_ack_val,
+ is_pcap);
+ cur->last_activity = time_as_double();
+ }
+ }
+ }
+ else
+ pt_log(kLog_verbose, "Ignored incoming packet.\n");
+ }
+}
+
+/* handle_data:
+ * Utility function for handling kProto_data packets, and place the data it contains
+ * onto the passed-in receive ring.
+ */
+void handle_data(icmp_echo_packet_t *pkt, int total_len, forward_desc_t *ring[],
+ int *await_send, int *insert_idx, uint16_t *next_expected_seq)
+{
+ ping_tunnel_pkt_t *pt_pkt = (ping_tunnel_pkt_t*)pkt->data;
+ int expected_len = sizeof(ip_packet_t) + sizeof(icmp_echo_packet_t) +
+ sizeof(ping_tunnel_pkt_t); /* 20+8+28 */
+ /* Place packet in the receive ring, in its proper place.
+ * This works as follows:
+ * -1. Packet == ack packet? Perform ack, and continue.
+ * 0. seq_no < next_remote_seq, and absolute difference is bigger than w size => discard
+ * 1. If seq_no == next_remote_seq, we have no problems; just put it in the ring.
+ * 2. If seq_no > next_remote_seq + remaining window size, discard packet.
+ * Send resend request for missing packets.
+ * 3. Else, put packet in the proper place in the ring
+ * (don't overwrite if one is already there), but don't increment next_remote_seq_no
+ * 4. If packed was not discarded, process ack info in packet.
+ */
+ expected_len += pt_pkt->data_len;
+ expected_len += expected_len % 2;
+ if (opts.udp)
+ expected_len -= sizeof(ip_packet_t);
+ if (total_len < expected_len) {
+ pt_log(kLog_error, "Packet not completely received: %d Should be: %d. "
+ "For some reason, this error is fatal.\n", total_len, expected_len);
+ pt_log(kLog_debug, "Data length: %d Total length: %d\n", pt_pkt->data_len, total_len);
+ /* TODO: This error isn't fatal, so it should definitely be handled in some way.
+ * We could simply discard it.
+ */
+ exit(0);
+ }
+ if (pt_pkt->seq_no == *next_expected_seq) {
+ /* hmm, what happens if this test is true? */
+ if (!ring[*insert_idx]) { /* && pt_pkt->state == kProto_data */
+ /* pt_log(kLog_debug, "Queing data packet: %d\n", pt_pkt->seq_no); */
+ ring[*insert_idx] = create_fwd_desc(pt_pkt->seq_no, pt_pkt->data_len, pt_pkt->data);
+ (*await_send)++;
+ (*insert_idx)++;
+ }
+ else if (ring[*insert_idx])
+ pt_log(kLog_debug, "Dup packet?\n");
+
+ (*next_expected_seq)++;
+ if (*insert_idx >= kPing_window_size)
+ *insert_idx = 0;
+ /* Check if we have already received some of the next packets */
+ while (ring[*insert_idx]) {
+ if (ring[*insert_idx]->seq_no == *next_expected_seq) {
+ (*next_expected_seq)++;
+ (*insert_idx)++;
+ if (*insert_idx >= kPing_window_size)
+ *insert_idx = 0;
+ }
+ else
+ break;
+ }
+ }
+ else {
+ int r, s, d, pos;
+ pos = -1; /* If pos ends up staying -1, packet is discarded. */
+ r = *next_expected_seq;
+ s = pt_pkt->seq_no;
+ d = s - r;
+ if (d < 0) { /* This packet _may_ be old, or seq_no may have wrapped around */
+ d = (s+0xFFFF) - r;
+ if (d < kPing_window_size) {
+ /* Counter has wrapped, so we should add this packet to the recv ring */
+ pos = ((*insert_idx)+d) % kPing_window_size;
+ }
+ }
+ else if (d < kPing_window_size)
+ pos = ((*insert_idx)+d) % kPing_window_size;
+
+ if (pos != -1) {
+ if (!ring[pos]) {
+ pt_log(kLog_verbose, "Out of order. Expected: %d Got: %d Inserted: %d "
+ "(cur = %d)\n", *next_expected_seq, pt_pkt->seq_no, pos,
+ (*insert_idx));
+ ring[pos] = create_fwd_desc(pt_pkt->seq_no, pt_pkt->data_len, pt_pkt->data);
+ (*await_send)++;
+ }
+ }
+ /* else
+ * pt_log(kLog_debug, "Packet discarded - outside receive window.\n");
+ */
+ }
+}
+
+void handle_ack(uint16_t seq_no, icmp_desc_t ring[], int *packets_awaiting_ack,
+ int one_ack_only, int insert_idx, int *first_ack,
+ uint16_t *remote_ack, int is_pcap)
+{
+ int i, j, k;
+ ping_tunnel_pkt_t *pt_pkt;
+
+ if (*packets_awaiting_ack > 0) {
+ if (one_ack_only) {
+ for (i = 0; i < kPing_window_size; i++) {
+ if (ring[i].pkt && ring[i].seq_no == seq_no && !is_pcap) {
+ pt_log(kLog_debug, "Received ack for only seq %d\n", seq_no);
+ pt_pkt = (ping_tunnel_pkt_t*)ring[i].pkt->data;
+ /* WARNING: We make the dangerous assumption here that packets arrive in order! */
+ *remote_ack = (uint16_t)ntohl(pt_pkt->ack);
+ free(ring[i].pkt);
+ ring[i].pkt = 0;
+ (*packets_awaiting_ack)--;
+ if (i == *first_ack) {
+ for (j=1;j<kPing_window_size;j++) {
+ k = (i+j)%kPing_window_size;
+ if (ring[k].pkt) {
+ *first_ack = k;
+ break;
+ }
+ /* we have looped through everything */
+ if (k == i)
+ *first_ack = insert_idx;
+ j++;
+ }
+ }
+ return;
+ }
+ }
+ }
+ else {
+ int i, can_ack = 0, count = 0;
+ i = insert_idx-1;
+ if (i < 0)
+ i = kPing_window_size - 1;
+
+ pt_log(kLog_debug, "Received ack-series starting at seq %d\n", seq_no);
+ while (count < kPing_window_size) {
+ if (!ring[i].pkt)
+ break;
+
+ if (ring[i].seq_no == seq_no)
+ can_ack = 1;
+ else if (!can_ack)
+ *first_ack = i;
+
+ if (can_ack) {
+ free(ring[i].pkt);
+ ring[i].pkt = 0;
+ (*packets_awaiting_ack)--;
+ }
+ i--;
+ if (i < 0)
+ i = kPing_window_size - 1;
+ count++;
+ }
+ }
+ }
+/* else
+ * pt_log(kLog_verbose, "Dropping superfluous acknowledgement (no outstanding packets needing ack.)\n");
+ */
+}