2021-03-04 14:30:38 +03:00
# define _GNU_SOURCE
# include "desync.h"
# include "protocol.h"
# include "params.h"
# include "helpers.h"
# include "hostlist.h"
2021-03-18 17:21:25 +03:00
# include "conntrack.h"
2021-03-04 14:30:38 +03:00
# include <string.h>
const char * fake_http_request_default = " GET / HTTP/1.1 \r \n Host: www.w3.org \r \n "
" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0 \r \n "
" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 \r \n "
" Accept-Encoding: gzip, deflate \r \n \r \n " ;
const uint8_t fake_tls_clienthello_default [ 517 ] = {
0x16 , 0x03 , 0x01 , 0x02 , 0x00 , 0x01 , 0x00 , 0x01 , 0xfc , 0x03 , 0x03 , 0x9a , 0x8f , 0xa7 , 0x6a , 0x5d ,
0x57 , 0xf3 , 0x62 , 0x19 , 0xbe , 0x46 , 0x82 , 0x45 , 0xe2 , 0x59 , 0x5c , 0xb4 , 0x48 , 0x31 , 0x12 , 0x15 ,
0x14 , 0x79 , 0x2c , 0xaa , 0xcd , 0xea , 0xda , 0xf0 , 0xe1 , 0xfd , 0xbb , 0x20 , 0xf4 , 0x83 , 0x2a , 0x94 ,
0xf1 , 0x48 , 0x3b , 0x9d , 0xb6 , 0x74 , 0xba , 0x3c , 0x81 , 0x63 , 0xbc , 0x18 , 0xcc , 0x14 , 0x45 , 0x57 ,
0x6c , 0x80 , 0xf9 , 0x25 , 0xcf , 0x9c , 0x86 , 0x60 , 0x50 , 0x31 , 0x2e , 0xe9 , 0x00 , 0x22 , 0x13 , 0x01 ,
0x13 , 0x03 , 0x13 , 0x02 , 0xc0 , 0x2b , 0xc0 , 0x2f , 0xcc , 0xa9 , 0xcc , 0xa8 , 0xc0 , 0x2c , 0xc0 , 0x30 ,
0xc0 , 0x0a , 0xc0 , 0x09 , 0xc0 , 0x13 , 0xc0 , 0x14 , 0x00 , 0x33 , 0x00 , 0x39 , 0x00 , 0x2f , 0x00 , 0x35 ,
0x01 , 0x00 , 0x01 , 0x91 , 0x00 , 0x00 , 0x00 , 0x0f , 0x00 , 0x0d , 0x00 , 0x00 , 0x0a , 0x77 , 0x77 , 0x77 ,
0x2e , 0x77 , 0x33 , 0x2e , 0x6f , 0x72 , 0x67 , 0x00 , 0x17 , 0x00 , 0x00 , 0xff , 0x01 , 0x00 , 0x01 , 0x00 ,
0x00 , 0x0a , 0x00 , 0x0e , 0x00 , 0x0c , 0x00 , 0x1d , 0x00 , 0x17 , 0x00 , 0x18 , 0x00 , 0x19 , 0x01 , 0x00 ,
0x01 , 0x01 , 0x00 , 0x0b , 0x00 , 0x02 , 0x01 , 0x00 , 0x00 , 0x23 , 0x00 , 0x00 , 0x00 , 0x10 , 0x00 , 0x0e ,
0x00 , 0x0c , 0x02 , 0x68 , 0x32 , 0x08 , 0x68 , 0x74 , 0x74 , 0x70 , 0x2f , 0x31 , 0x2e , 0x31 , 0x00 , 0x05 ,
0x00 , 0x05 , 0x01 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x33 , 0x00 , 0x6b , 0x00 , 0x69 , 0x00 , 0x1d , 0x00 ,
0x20 , 0xb0 , 0xe4 , 0xda , 0x34 , 0xb4 , 0x29 , 0x8d , 0xd3 , 0x5c , 0x70 , 0xd3 , 0xbe , 0xe8 , 0xa7 , 0x2a ,
0x6b , 0xe4 , 0x11 , 0x19 , 0x8b , 0x18 , 0x9d , 0x83 , 0x9a , 0x49 , 0x7c , 0x83 , 0x7f , 0xa9 , 0x03 , 0x8c ,
0x3c , 0x00 , 0x17 , 0x00 , 0x41 , 0x04 , 0x4c , 0x04 , 0xa4 , 0x71 , 0x4c , 0x49 , 0x75 , 0x55 , 0xd1 , 0x18 ,
0x1e , 0x22 , 0x62 , 0x19 , 0x53 , 0x00 , 0xde , 0x74 , 0x2f , 0xb3 , 0xde , 0x13 , 0x54 , 0xe6 , 0x78 , 0x07 ,
0x94 , 0x55 , 0x0e , 0xb2 , 0x6c , 0xb0 , 0x03 , 0xee , 0x79 , 0xa9 , 0x96 , 0x1e , 0x0e , 0x98 , 0x17 , 0x78 ,
0x24 , 0x44 , 0x0c , 0x88 , 0x80 , 0x06 , 0x8b , 0xd4 , 0x80 , 0xbf , 0x67 , 0x7c , 0x37 , 0x6a , 0x5b , 0x46 ,
0x4c , 0xa7 , 0x98 , 0x6f , 0xb9 , 0x22 , 0x00 , 0x2b , 0x00 , 0x09 , 0x08 , 0x03 , 0x04 , 0x03 , 0x03 , 0x03 ,
0x02 , 0x03 , 0x01 , 0x00 , 0x0d , 0x00 , 0x18 , 0x00 , 0x16 , 0x04 , 0x03 , 0x05 , 0x03 , 0x06 , 0x03 , 0x08 ,
0x04 , 0x08 , 0x05 , 0x08 , 0x06 , 0x04 , 0x01 , 0x05 , 0x01 , 0x06 , 0x01 , 0x02 , 0x03 , 0x02 , 0x01 , 0x00 ,
0x2d , 0x00 , 0x02 , 0x01 , 0x01 , 0x00 , 0x1c , 0x00 , 0x02 , 0x40 , 0x01 , 0x00 , 0x15 , 0x00 , 0x96 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 , 0x00 ,
0x00 , 0x00 , 0x00 , 0x00 , 0x00
} ;
2022-01-03 12:38:18 +03:00
# define PKTDATA_MAXDUMP 32
2022-02-02 15:18:35 +03:00
# define IP_MAXDUMP 80
2021-03-04 14:30:38 +03:00
static uint8_t zeropkt [ DPI_DESYNC_MAX_FAKE_LEN ] ;
2023-10-13 20:10:46 +03:00
void desync_init ( void )
2021-03-04 14:30:38 +03:00
{
memset ( zeropkt , 0 , sizeof ( zeropkt ) ) ;
}
2021-04-07 12:13:46 +03:00
bool desync_valid_zero_stage ( enum dpi_desync_mode mode )
{
return mode = = DESYNC_SYNACK ;
}
2021-03-04 14:30:38 +03:00
bool desync_valid_first_stage ( enum dpi_desync_mode mode )
{
2022-04-12 15:52:06 +03:00
return mode = = DESYNC_FAKE | | mode = = DESYNC_FAKE_KNOWN | | mode = = DESYNC_RST | | mode = = DESYNC_RSTACK | | mode = = DESYNC_HOPBYHOP | | mode = = DESYNC_DESTOPT | | mode = = DESYNC_IPFRAG1 ;
2022-02-01 20:35:52 +03:00
}
bool desync_only_first_stage ( enum dpi_desync_mode mode )
{
2022-02-02 15:18:35 +03:00
return false ;
2021-03-04 14:30:38 +03:00
}
bool desync_valid_second_stage ( enum dpi_desync_mode mode )
2022-04-12 15:52:06 +03:00
{
2023-09-07 19:03:37 +03:00
return mode = = DESYNC_NONE | | mode = = DESYNC_DISORDER | | mode = = DESYNC_DISORDER2 | | mode = = DESYNC_SPLIT | | mode = = DESYNC_SPLIT2 | | mode = = DESYNC_IPFRAG2 | | mode = = DESYNC_UDPLEN | | mode = = DESYNC_TAMPER ;
2022-04-12 15:52:06 +03:00
}
bool desync_valid_second_stage_tcp ( enum dpi_desync_mode mode )
2021-03-04 14:30:38 +03:00
{
2022-01-03 12:38:18 +03:00
return mode = = DESYNC_NONE | | mode = = DESYNC_DISORDER | | mode = = DESYNC_DISORDER2 | | mode = = DESYNC_SPLIT | | mode = = DESYNC_SPLIT2 | | mode = = DESYNC_IPFRAG2 ;
2021-03-04 14:30:38 +03:00
}
2022-04-12 15:52:06 +03:00
bool desync_valid_second_stage_udp ( enum dpi_desync_mode mode )
{
2023-09-07 19:03:37 +03:00
return mode = = DESYNC_NONE | | mode = = DESYNC_UDPLEN | | mode = = DESYNC_TAMPER | | mode = = DESYNC_IPFRAG2 ;
2022-04-12 15:52:06 +03:00
}
2021-03-04 14:30:38 +03:00
enum dpi_desync_mode desync_mode_from_string ( const char * s )
{
if ( ! s )
return DESYNC_NONE ;
else if ( ! strcmp ( s , " fake " ) )
return DESYNC_FAKE ;
2022-04-12 15:52:06 +03:00
else if ( ! strcmp ( s , " fakeknown " ) )
return DESYNC_FAKE_KNOWN ;
2021-03-04 14:30:38 +03:00
else if ( ! strcmp ( s , " rst " ) )
return DESYNC_RST ;
else if ( ! strcmp ( s , " rstack " ) )
return DESYNC_RSTACK ;
2021-04-07 12:13:46 +03:00
else if ( ! strcmp ( s , " synack " ) )
return DESYNC_SYNACK ;
2021-03-04 14:30:38 +03:00
else if ( ! strcmp ( s , " disorder " ) )
return DESYNC_DISORDER ;
else if ( ! strcmp ( s , " disorder2 " ) )
return DESYNC_DISORDER2 ;
else if ( ! strcmp ( s , " split " ) )
return DESYNC_SPLIT ;
else if ( ! strcmp ( s , " split2 " ) )
return DESYNC_SPLIT2 ;
2022-01-03 12:38:18 +03:00
else if ( ! strcmp ( s , " ipfrag2 " ) )
return DESYNC_IPFRAG2 ;
2022-02-01 20:35:52 +03:00
else if ( ! strcmp ( s , " hopbyhop " ) )
return DESYNC_HOPBYHOP ;
2022-02-05 13:36:03 +03:00
else if ( ! strcmp ( s , " destopt " ) )
return DESYNC_DESTOPT ;
2022-02-05 15:41:46 +03:00
else if ( ! strcmp ( s , " ipfrag1 " ) )
return DESYNC_IPFRAG1 ;
2022-04-12 15:52:06 +03:00
else if ( ! strcmp ( s , " udplen " ) )
return DESYNC_UDPLEN ;
2023-09-07 19:03:37 +03:00
else if ( ! strcmp ( s , " tamper " ) )
return DESYNC_TAMPER ;
2021-03-04 14:30:38 +03:00
return DESYNC_INVALID ;
}
// auto creates internal socket and uses it for subsequent calls
2022-05-15 15:54:35 +03:00
static bool rawsend_rep ( const struct sockaddr * dst , uint32_t fwmark , const char * ifout , const void * data , size_t len )
2021-03-04 14:30:38 +03:00
{
for ( int i = 0 ; i < params . desync_repeats ; i + + )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( dst , fwmark , ifout , data , len ) )
2021-03-04 14:30:38 +03:00
return false ;
return true ;
}
2021-12-27 16:51:30 +03:00
static uint64_t cutoff_get_limit ( t_ctrack * ctrack , char mode )
{
switch ( mode )
{
case ' n ' : return ctrack - > pcounter_orig ;
case ' d ' : return ctrack - > pdcounter_orig ;
case ' s ' : return ctrack - > seq_last - ctrack - > seq0 ;
default : return 0 ;
}
}
static bool cutoff_test ( t_ctrack * ctrack , uint64_t cutoff , char mode )
{
return cutoff & & cutoff_get_limit ( ctrack , mode ) > = cutoff ;
}
2022-01-01 20:22:04 +03:00
static void maybe_cutoff ( t_ctrack * ctrack , uint8_t proto )
2021-03-21 21:55:26 +03:00
{
if ( ctrack )
{
2022-01-01 20:22:04 +03:00
if ( proto = = IPPROTO_TCP )
ctrack - > b_wssize_cutoff | = cutoff_test ( ctrack , params . wssize_cutoff , params . wssize_cutoff_mode ) ;
2021-12-27 16:51:30 +03:00
ctrack - > b_desync_cutoff | = cutoff_test ( ctrack , params . desync_cutoff , params . desync_cutoff_mode ) ;
2022-01-01 20:22:04 +03:00
if ( proto = = IPPROTO_TCP )
// we do not need conntrack entry anymore if all cutoff conditions are either not defined or reached
// do not drop udp entry because it will be recreated when next packet arrives
ctrack - > b_cutoff | = ( ! params . wssize | | ctrack - > b_wssize_cutoff ) & & ( ! params . desync_cutoff | | ctrack - > b_desync_cutoff ) ;
2021-03-21 21:55:26 +03:00
}
}
static void wssize_cutoff ( t_ctrack * ctrack )
{
if ( ctrack )
{
ctrack - > b_wssize_cutoff = true ;
2022-01-01 20:22:04 +03:00
maybe_cutoff ( ctrack , IPPROTO_TCP ) ;
2021-03-21 21:55:26 +03:00
}
}
# define CONNTRACK_REQUIRED (params.wssize || params.desync_cutoff)
2021-03-04 14:30:38 +03:00
// result : true - drop original packet, false = dont drop
2022-05-15 15:54:35 +03:00
packet_process_result dpi_desync_tcp_packet ( uint32_t fwmark , const char * ifout , uint8_t * data_pkt , size_t len_pkt , struct ip * ip , struct ip6_hdr * ip6hdr , struct tcphdr * tcphdr , size_t len_tcp , uint8_t * data_payload , size_t len_payload )
2021-03-04 14:30:38 +03:00
{
packet_process_result res = pass ;
2021-03-18 17:21:25 +03:00
t_ctrack * ctrack = NULL ;
bool bReverse = false ;
2021-03-04 14:30:38 +03:00
2021-04-07 12:13:46 +03:00
struct sockaddr_storage src , dst ;
2022-01-03 12:38:18 +03:00
uint8_t pkt1 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] , pkt2 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] ;
size_t pkt1_len , pkt2_len ;
2021-04-07 12:13:46 +03:00
uint8_t ttl_orig , ttl_fake , flags_orig , scale_factor ;
uint32_t * timestamps ;
2021-03-04 14:30:38 +03:00
if ( ! ! ip = = ! ! ip6hdr ) return res ; // one and only one must be present
2021-03-12 14:33:48 +03:00
2021-03-21 21:55:26 +03:00
if ( CONNTRACK_REQUIRED )
2021-03-18 17:21:25 +03:00
{
ConntrackPoolPurge ( & params . conntrack ) ;
2022-01-01 20:22:04 +03:00
if ( ConntrackPoolFeed ( & params . conntrack , ip , ip6hdr , tcphdr , NULL , len_payload , & ctrack , & bReverse ) )
maybe_cutoff ( ctrack , IPPROTO_TCP ) ;
2021-03-18 17:21:25 +03:00
}
2021-12-27 16:51:30 +03:00
//ConntrackPoolDump(¶ms.conntrack);
2021-03-12 14:33:48 +03:00
if ( params . wsize & & tcp_synack_segment ( tcphdr ) )
{
tcp_rewrite_winsize ( tcphdr , params . wsize , params . wscale ) ;
res = modify ;
}
2021-04-07 12:13:46 +03:00
if ( bReverse ) return res ; // nothing to do. do not waste cpu
2022-05-15 15:54:35 +03:00
uint32_t desync_fwmark = fwmark | params . desync_fwmark ;
2021-12-27 16:51:30 +03:00
if ( params . wssize )
2021-03-12 14:33:48 +03:00
{
2021-12-27 16:51:30 +03:00
if ( ctrack )
{
if ( ctrack - > b_wssize_cutoff )
{
DLOG ( " not changing wssize. wssize-cutoff reached \n " ) ;
}
else
{
if ( params . wssize_cutoff ) DLOG ( " wssize-cutoff not reached (mode %c): %llu/%u \n " , params . wssize_cutoff_mode , ( unsigned long long ) cutoff_get_limit ( ctrack , params . wssize_cutoff_mode ) , params . wssize_cutoff ) ;
tcp_rewrite_winsize ( tcphdr , params . wssize , params . wsscale ) ;
res = modify ;
}
}
else
{
DLOG ( " not changing wssize. wssize is set but conntrack entry is missing \n " ) ;
}
2021-03-12 14:33:48 +03:00
}
2021-04-07 12:13:46 +03:00
if ( params . desync_mode0 ! = DESYNC_NONE | | params . desync_mode ! = DESYNC_NONE ) // save some cpu
{
ttl_orig = ip ? ip - > ip_ttl : ip6hdr - > ip6_ctlun . ip6_un1 . ip6_un1_hlim ;
2021-12-10 22:08:52 +03:00
if ( ip6hdr ) ttl_fake = params . desync_ttl6 ? params . desync_ttl6 : ttl_orig ;
else ttl_fake = params . desync_ttl ? params . desync_ttl : ttl_orig ;
2021-04-07 12:13:46 +03:00
flags_orig = * ( ( uint8_t * ) tcphdr + 13 ) ;
scale_factor = tcp_find_scale_factor ( tcphdr ) ;
timestamps = tcp_find_timestamps ( tcphdr ) ;
2022-01-01 20:22:04 +03:00
extract_endpoints ( ip , ip6hdr , tcphdr , NULL , & src , & dst ) ;
2021-04-07 12:13:46 +03:00
}
if ( params . desync_mode0 = = DESYNC_SYNACK & & tcp_syn_segment ( tcphdr ) )
{
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2021-04-07 12:13:46 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , TH_SYN | TH_ACK , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-01-01 20:22:04 +03:00
ttl_fake , params . desync_fooling_mode , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
NULL , 0 , pkt1 , & pkt1_len ) )
2021-04-07 12:13:46 +03:00
{
return res ;
}
DLOG ( " sending fake SYNACK \n " ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-04-07 12:13:46 +03:00
return res ;
}
2021-12-27 16:51:30 +03:00
if ( params . desync_cutoff )
{
if ( ctrack )
{
if ( ctrack - > b_desync_cutoff )
{
DLOG ( " not desyncing. desync-cutoff reached (mode %c): %llu/%u \n " , params . desync_cutoff_mode , ( unsigned long long ) cutoff_get_limit ( ctrack , params . desync_cutoff_mode ) , params . desync_cutoff ) ;
return res ;
}
DLOG ( " desync-cutoff not reached (mode %c): %llu/%u \n " , params . desync_cutoff_mode , ( unsigned long long ) cutoff_get_limit ( ctrack , params . desync_cutoff_mode ) , params . desync_cutoff ) ;
}
else
{
DLOG ( " not desyncing. desync-cutoff is set but conntrack entry is missing \n " ) ;
return res ;
}
}
2021-04-07 12:13:46 +03:00
if ( ! params . wssize & & params . desync_mode = = DESYNC_NONE & & ! params . hostcase & & ! params . hostnospace & & ! params . domcase ) return res ; // nothing to do. do not waste cpu
2021-03-04 14:30:38 +03:00
if ( ! ( tcphdr - > th_flags & TH_SYN ) & & len_payload )
{
const uint8_t * fake ;
size_t fake_size ;
char host [ 256 ] ;
bool bHaveHost = false ;
bool bIsHttp ;
2022-04-12 15:52:06 +03:00
bool bKnownProtocol = false ;
2021-03-04 14:30:38 +03:00
uint8_t * p , * phost ;
if ( ( bIsHttp = IsHttp ( data_payload , len_payload ) ) )
{
DLOG ( " packet contains HTTP request \n " )
2021-12-27 16:51:30 +03:00
if ( params . wssize ) DLOG ( " forced wssize-cutoff \n " ) ;
2021-03-21 21:55:26 +03:00
wssize_cutoff ( ctrack ) ;
2021-03-04 14:30:38 +03:00
fake = params . fake_http ;
fake_size = params . fake_http_size ;
if ( params . hostlist | | params . debug ) bHaveHost = HttpExtractHost ( data_payload , len_payload , host , sizeof ( host ) ) ;
if ( params . hostlist & & ! bHaveHost )
{
DLOG ( " not applying tampering to HTTP without Host: \n " )
return res ;
}
2022-04-12 15:52:06 +03:00
bKnownProtocol = true ;
2021-03-04 14:30:38 +03:00
}
else if ( IsTLSClientHello ( data_payload , len_payload ) )
{
DLOG ( " packet contains TLS ClientHello \n " )
2021-12-27 16:51:30 +03:00
if ( params . wssize ) DLOG ( " forced wssize-cutoff \n " ) ;
2021-03-21 21:55:26 +03:00
wssize_cutoff ( ctrack ) ;
2021-03-04 14:30:38 +03:00
fake = params . fake_tls ;
fake_size = params . fake_tls_size ;
if ( params . hostlist | | params . desync_skip_nosni | | params . debug )
{
bHaveHost = TLSHelloExtractHost ( data_payload , len_payload , host , sizeof ( host ) ) ;
if ( params . desync_skip_nosni & & ! bHaveHost )
{
DLOG ( " not applying tampering to TLS ClientHello without hostname in the SNI \n " )
return res ;
}
}
2022-04-12 15:52:06 +03:00
bKnownProtocol = true ;
2021-03-04 14:30:38 +03:00
}
else
{
if ( ! params . desync_any_proto ) return res ;
DLOG ( " applying tampering to unknown protocol \n " )
2021-12-26 20:43:16 +03:00
fake = params . fake_unknown ;
fake_size = params . fake_unknown_size ;
2021-03-04 14:30:38 +03:00
}
if ( bHaveHost )
{
DLOG ( " hostname: %s \n " , host )
2022-07-26 19:15:28 +03:00
if ( ( params . hostlist | | params . hostlist_exclude ) & & ! HostlistCheck ( params . hostlist , params . hostlist_exclude , host ) )
2021-03-04 14:30:38 +03:00
{
DLOG ( " not applying tampering to this request \n " )
return res ;
}
}
if ( bIsHttp & & ( params . hostcase | | params . hostnospace | | params . domcase ) & & ( phost = ( uint8_t * ) memmem ( data_payload , len_payload , " \r \n Host: " , 8 ) ) )
{
if ( params . hostcase )
{
DLOG ( " modifying Host: => %c%c%c%c: \n " , params . hostspell [ 0 ] , params . hostspell [ 1 ] , params . hostspell [ 2 ] , params . hostspell [ 3 ] )
memcpy ( phost + 2 , params . hostspell , 4 ) ;
res = modify ;
}
if ( params . domcase )
{
DLOG ( " mixing domain case \n " ) ;
for ( p = phost + 7 ; p < ( data_payload + len_payload ) & & * p ! = ' \r ' & & * p ! = ' \n ' ; p + + )
* p = ( ( ( size_t ) p ) & 1 ) ? tolower ( * p ) : toupper ( * p ) ;
res = modify ;
}
uint8_t * pua ;
if ( params . hostnospace & &
( pua = ( uint8_t * ) memmem ( data_payload , len_payload , " \r \n User-Agent: " , 14 ) ) & &
( pua = ( uint8_t * ) memmem ( pua + 1 , len_payload - ( pua - data_payload ) - 1 , " \r \n " , 2 ) ) )
{
DLOG ( " removing space after Host: and adding it to User-Agent: \n " )
if ( pua > phost )
{
memmove ( phost + 7 , phost + 8 , pua - phost - 8 ) ;
phost [ pua - phost - 1 ] = ' ' ;
}
else
{
memmove ( pua + 1 , pua , phost - pua + 7 ) ;
* pua = ' ' ;
}
res = modify ;
}
}
if ( params . desync_mode = = DESYNC_NONE ) return res ;
if ( params . debug )
{
printf ( " dpi desync src= " ) ;
print_sockaddr ( ( struct sockaddr * ) & src ) ;
printf ( " dst= " ) ;
print_sockaddr ( ( struct sockaddr * ) & dst ) ;
printf ( " \n " ) ;
}
enum dpi_desync_mode desync_mode = params . desync_mode ;
2022-02-02 15:18:35 +03:00
uint8_t fooling_orig = FOOL_NONE ;
2021-03-04 14:30:38 +03:00
bool b ;
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2021-03-04 14:30:38 +03:00
b = false ;
switch ( desync_mode )
{
2022-04-12 15:52:06 +03:00
case DESYNC_FAKE_KNOWN :
if ( ! bKnownProtocol )
{
DLOG ( " not applying fake because of unknown protocol \n " ) ;
desync_mode = params . desync_mode2 ;
break ;
}
2021-03-04 14:30:38 +03:00
case DESYNC_FAKE :
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-01-01 20:22:04 +03:00
ttl_fake , params . desync_fooling_mode , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
fake , fake_size , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
{
return res ;
}
DLOG ( " sending fake request : " ) ;
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( fake , fake_size , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2021-03-04 14:30:38 +03:00
b = true ;
break ;
case DESYNC_RST :
case DESYNC_RSTACK :
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , TH_RST | ( desync_mode = = DESYNC_RSTACK ? TH_ACK : 0 ) , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-01-01 20:22:04 +03:00
ttl_fake , params . desync_fooling_mode , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
NULL , 0 , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
{
return res ;
}
DLOG ( " sending fake RST/RSTACK \n " ) ;
b = true ;
break ;
2022-02-01 20:35:52 +03:00
case DESYNC_HOPBYHOP :
2022-02-05 13:36:03 +03:00
case DESYNC_DESTOPT :
2022-02-05 15:41:46 +03:00
case DESYNC_IPFRAG1 :
fooling_orig = ( desync_mode = = DESYNC_HOPBYHOP ) ? FOOL_HOPBYHOP : ( desync_mode = = DESYNC_DESTOPT ) ? FOOL_DESTOPT : FOOL_IPFRAG1 ;
2022-04-12 15:52:06 +03:00
if ( ip6hdr & & ( params . desync_mode2 = = DESYNC_NONE | | ! desync_valid_second_stage_tcp ( params . desync_mode2 ) ) )
2022-02-01 20:35:52 +03:00
{
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-02-05 13:36:03 +03:00
ttl_orig , fooling_orig , 0 , 0 ,
2022-02-01 20:35:52 +03:00
data_payload , len_payload , pkt1 , & pkt1_len ) )
{
return res ;
}
2022-02-05 13:36:03 +03:00
DLOG ( " resending original packet with extension header \n " ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-02-01 20:35:52 +03:00
return res ;
2022-02-02 09:39:48 +03:00
// this mode is final, no other options available
return drop ;
2022-02-01 20:35:52 +03:00
}
2022-02-02 15:18:35 +03:00
desync_mode = params . desync_mode2 ;
2021-03-04 14:30:38 +03:00
}
if ( b )
{
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
2022-04-12 15:52:06 +03:00
if ( params . desync_mode2 = = DESYNC_NONE | | ! desync_valid_second_stage_tcp ( params . desync_mode2 ) )
2021-03-04 14:30:38 +03:00
{
if ( params . desync_retrans )
{
DLOG ( " dropping original packet to force retransmission. len=%zu len_payload=%zu \n " , len_pkt , len_payload )
}
else
{
DLOG ( " reinjecting original packet. len=%zu len_payload=%zu \n " , len_pkt , len_payload )
# ifdef __FreeBSD__
// FreeBSD tend to pass ipv6 frames with wrong checksum
if ( res = = modify | | ip6hdr )
# else
// if original packet was tampered earlier it needs checksum fixed
if ( res = = modify )
# endif
tcp_fix_checksum ( tcphdr , len_tcp , ip , ip6hdr ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , data_pkt , len_pkt ) )
2021-03-04 14:30:38 +03:00
return res ;
}
return drop ;
}
desync_mode = params . desync_mode2 ;
}
2022-01-03 12:38:18 +03:00
size_t split_pos = len_payload > params . desync_split_pos ? params . desync_split_pos : 1 ;
pkt1_len = sizeof ( pkt1 ) ;
2021-03-04 14:30:38 +03:00
switch ( desync_mode )
{
case DESYNC_DISORDER :
case DESYNC_DISORDER2 :
{
uint8_t fakeseg [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] ;
size_t fakeseg_len ;
if ( split_pos < len_payload )
{
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , net32_add ( tcphdr - > th_seq , split_pos ) , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-02-02 15:18:35 +03:00
ttl_orig , fooling_orig , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
data_payload + split_pos , len_payload - split_pos , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
DLOG ( " sending 2nd out-of-order tcp segment %zu-%zu len=%zu : " , split_pos , len_payload - 1 , len_payload - split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( data_payload + split_pos , len_payload - split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
if ( desync_mode = = DESYNC_DISORDER )
{
fakeseg_len = sizeof ( fakeseg ) ;
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-01-01 20:22:04 +03:00
ttl_fake , params . desync_fooling_mode , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2021-03-04 14:30:38 +03:00
zeropkt , split_pos , fakeseg , & fakeseg_len ) )
return res ;
DLOG ( " sending fake(1) 1st out-of-order tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( zeropkt , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , fakeseg , fakeseg_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-02-02 15:18:35 +03:00
ttl_orig , fooling_orig , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
data_payload , split_pos , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
DLOG ( " sending 1st out-of-order tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( data_payload , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
if ( desync_mode = = DESYNC_DISORDER )
{
DLOG ( " sending fake(2) 1st out-of-order tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( zeropkt , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , fakeseg , fakeseg_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
return drop ;
}
break ;
case DESYNC_SPLIT :
case DESYNC_SPLIT2 :
{
uint8_t fakeseg [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] ;
size_t fakeseg_len ;
if ( desync_mode = = DESYNC_SPLIT )
{
fakeseg_len = sizeof ( fakeseg ) ;
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-01-01 20:22:04 +03:00
ttl_fake , params . desync_fooling_mode , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2021-03-04 14:30:38 +03:00
zeropkt , split_pos , fakeseg , & fakeseg_len ) )
return res ;
DLOG ( " sending fake(1) 1st tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( zeropkt , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , fakeseg , fakeseg_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , tcphdr - > th_seq , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-02-02 15:18:35 +03:00
ttl_orig , fooling_orig , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
data_payload , split_pos , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
DLOG ( " sending 1st tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( data_payload , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
if ( desync_mode = = DESYNC_SPLIT )
{
DLOG ( " sending fake(2) 1st tcp segment 0-%zu len=%zu : " , split_pos - 1 , split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( zeropkt , split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , fakeseg , fakeseg_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
if ( split_pos < len_payload )
{
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2021-03-19 15:39:32 +03:00
if ( ! prepare_tcp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , flags_orig , net32_add ( tcphdr - > th_seq , split_pos ) , tcphdr - > th_ack , tcphdr - > th_win , scale_factor , timestamps ,
2022-02-02 15:18:35 +03:00
ttl_orig , fooling_orig , params . desync_badseq_increment , params . desync_badseq_ack_increment ,
2022-01-03 12:38:18 +03:00
data_payload + split_pos , len_payload - split_pos , pkt1 , & pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
DLOG ( " sending 2nd tcp segment %zu-%zu len=%zu : " , split_pos , len_payload - 1 , len_payload - split_pos )
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( data_payload + split_pos , len_payload - split_pos , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2021-03-04 14:30:38 +03:00
return res ;
}
return drop ;
}
break ;
2022-01-03 12:38:18 +03:00
case DESYNC_IPFRAG2 :
{
# ifdef __FreeBSD__
// FreeBSD tend to pass ipv6 frames with wrong checksum
2022-02-02 15:18:35 +03:00
if ( res = = modify | | ip6hdr )
# else
// if original packet was tampered earlier it needs checksum fixed
if ( res = = modify )
2022-01-03 12:38:18 +03:00
# endif
2022-02-02 15:18:35 +03:00
tcp_fix_checksum ( tcphdr , len_tcp , ip , ip6hdr ) ;
uint8_t pkt3 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] , * pkt_orig ;
size_t pkt_orig_len ;
2022-01-03 12:38:18 +03:00
size_t ipfrag_pos = ( params . desync_ipfrag_pos_tcp & & params . desync_ipfrag_pos_tcp < len_tcp ) ? params . desync_ipfrag_pos_tcp : 24 ;
2022-02-05 15:41:46 +03:00
uint32_t ident = ip ? ip - > ip_id ? ip - > ip_id : htons ( 1 + random ( ) % 0xFFFF ) : htonl ( 1 + random ( ) % 0xFFFFFFFF ) ;
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
pkt2_len = sizeof ( pkt2 ) ;
2022-02-05 15:41:46 +03:00
if ( ip6hdr & & ( fooling_orig = = FOOL_HOPBYHOP | | fooling_orig = = FOOL_DESTOPT ) )
2022-02-02 15:18:35 +03:00
{
pkt_orig_len = sizeof ( pkt3 ) ;
2022-02-05 15:41:46 +03:00
if ( ! ip6_insert_simple_hdr ( fooling_orig = = FOOL_HOPBYHOP ? IPPROTO_HOPOPTS : IPPROTO_DSTOPTS , data_pkt , len_pkt , pkt3 , & pkt_orig_len ) )
2022-02-02 15:18:35 +03:00
return res ;
pkt_orig = pkt3 ;
}
else
{
pkt_orig = data_pkt ;
pkt_orig_len = len_pkt ;
}
if ( ! ip_frag ( pkt_orig , pkt_orig_len , ipfrag_pos , ident , pkt1 , & pkt1_len , pkt2 , & pkt2_len ) )
2022-01-03 12:38:18 +03:00
return res ;
DLOG ( " sending 1st ip fragment 0-%zu len=%zu : " , ipfrag_pos - 1 , ipfrag_pos )
hexdump_limited_dlog ( pkt1 , pkt1_len , IP_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt2 , pkt2_len ) )
2022-01-03 12:38:18 +03:00
return res ;
DLOG ( " sending 2nd ip fragment %zu-%zu len=%zu : " , ipfrag_pos , len_tcp - 1 , len_tcp - ipfrag_pos )
hexdump_limited_dlog ( pkt2 , pkt2_len , IP_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-01-03 12:38:18 +03:00
return res ;
return frag ;
}
2021-03-04 14:30:38 +03:00
}
2022-01-01 20:22:04 +03:00
}
return res ;
}
2022-05-15 15:54:35 +03:00
packet_process_result dpi_desync_udp_packet ( uint32_t fwmark , const char * ifout , uint8_t * data_pkt , size_t len_pkt , struct ip * ip , struct ip6_hdr * ip6hdr , struct udphdr * udphdr , uint8_t * data_payload , size_t len_payload )
2022-01-01 20:22:04 +03:00
{
packet_process_result res = pass ;
t_ctrack * ctrack = NULL ;
bool bReverse = false ;
struct sockaddr_storage src , dst ;
2022-01-03 12:38:18 +03:00
uint8_t pkt1 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] , pkt2 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] ;
size_t pkt1_len , pkt2_len ;
2022-01-01 20:22:04 +03:00
uint8_t ttl_orig , ttl_fake ;
if ( ! ! ip = = ! ! ip6hdr ) return res ; // one and only one must be present
if ( CONNTRACK_REQUIRED )
{
ConntrackPoolPurge ( & params . conntrack ) ;
if ( ConntrackPoolFeed ( & params . conntrack , ip , ip6hdr , NULL , udphdr , len_payload , & ctrack , & bReverse ) )
maybe_cutoff ( ctrack , IPPROTO_UDP ) ;
}
//ConntrackPoolDump(¶ms.conntrack);
if ( bReverse ) return res ; // nothing to do. do not waste cpu
2021-03-04 14:30:38 +03:00
2022-01-01 20:22:04 +03:00
if ( params . desync_cutoff )
{
if ( ctrack )
{
if ( ctrack - > b_desync_cutoff )
{
DLOG ( " not desyncing. desync-cutoff reached (mode %c): %llu/%u \n " , params . desync_cutoff_mode , ( unsigned long long ) cutoff_get_limit ( ctrack , params . desync_cutoff_mode ) , params . desync_cutoff ) ;
return res ;
}
DLOG ( " desync-cutoff not reached (mode %c): %llu/%u \n " , params . desync_cutoff_mode , ( unsigned long long ) cutoff_get_limit ( ctrack , params . desync_cutoff_mode ) , params . desync_cutoff ) ;
}
else
{
DLOG ( " not desyncing. desync-cutoff is set but conntrack entry is missing \n " ) ;
return res ;
}
}
if ( params . desync_mode = = DESYNC_NONE ) return res ;
if ( len_payload )
{
const uint8_t * fake ;
size_t fake_size ;
bool b ;
2022-03-25 16:59:58 +03:00
char host [ 256 ] ;
bool bHaveHost = false ;
2022-04-12 15:52:06 +03:00
bool bKnownProtocol = false ;
2022-01-01 20:22:04 +03:00
2022-03-20 20:46:39 +03:00
if ( IsQUICInitial ( data_payload , len_payload ) )
{
DLOG ( " packet contains QUIC initial \n " )
fake = params . fake_quic ;
fake_size = params . fake_quic_size ;
2022-03-25 16:59:58 +03:00
2022-03-25 22:34:37 +03:00
bool bIsCryptoHello , bDecryptOK ;
bHaveHost = QUICExtractHostFromInitial ( data_payload , len_payload , host , sizeof ( host ) , & bDecryptOK , & bIsCryptoHello ) ;
2022-03-25 16:59:58 +03:00
if ( bIsCryptoHello )
{
2022-03-25 22:34:37 +03:00
// decrypted and payload is ClientHello
2022-03-25 16:59:58 +03:00
if ( params . desync_skip_nosni & & ! bHaveHost )
{
DLOG ( " not applying tampering to QUIC ClientHello without hostname in the SNI \n " )
return res ;
}
}
2022-03-25 22:34:37 +03:00
else if ( ! bDecryptOK )
{
// could not decrypt
if ( params . desync_skip_nosni )
{
DLOG ( " not applying tampering to QUIC initial that could not be decrypted \n " )
return res ;
}
else
// consider this case the same way as absence of the SNI. DPI also might not be able to decrypt this and get SNI
DLOG ( " QUIC initial decryption failed. still applying tampering because desync_skip_nosni is not set \n " )
}
2022-03-25 16:59:58 +03:00
else
{
2022-03-25 22:34:37 +03:00
// decrypted and payload is not ClientHello
2022-03-25 16:59:58 +03:00
if ( params . desync_any_proto )
{
DLOG ( " QUIC initial without CRYPTO frame. applying tampering because desync_any_proto is set \n " )
}
else
{
DLOG ( " not applying tampering to QUIC initial without CRYPTO frame \n " )
return res ;
}
}
2022-04-12 15:52:06 +03:00
bKnownProtocol = true ;
2022-03-20 20:46:39 +03:00
}
2023-08-12 09:56:19 +03:00
else if ( IsWireguardHandshakeInitiation ( data_payload , len_payload ) )
{
DLOG ( " packet contains wireguard handshake initiation \n " )
fake = params . fake_wg ;
fake_size = params . fake_wg_size ;
bKnownProtocol = true ;
}
2023-09-07 19:03:37 +03:00
else if ( IsDhtD1 ( data_payload , len_payload ) )
{
DLOG ( " packet contains DHT d1...e \n " )
fake = params . fake_dht ;
fake_size = params . fake_dht_size ;
bKnownProtocol = true ;
}
2022-03-20 20:46:39 +03:00
else
{
if ( ! params . desync_any_proto ) return res ;
DLOG ( " applying tampering to unknown protocol \n " )
fake = params . fake_unknown_udp ;
fake_size = params . fake_unknown_udp_size ;
}
2022-01-01 20:22:04 +03:00
2022-03-25 16:59:58 +03:00
if ( bHaveHost )
{
DLOG ( " hostname: %s \n " , host )
2022-07-26 19:15:28 +03:00
if ( ( params . hostlist | | params . hostlist_exclude ) & & ! HostlistCheck ( params . hostlist , params . hostlist_exclude , host ) )
2022-03-25 16:59:58 +03:00
{
DLOG ( " not applying tampering to this request \n " )
return res ;
}
}
2022-01-03 12:38:18 +03:00
enum dpi_desync_mode desync_mode = params . desync_mode ;
2022-02-02 15:18:35 +03:00
uint8_t fooling_orig = FOOL_NONE ;
2022-01-03 12:38:18 +03:00
2022-01-01 21:12:47 +03:00
ttl_orig = ip ? ip - > ip_ttl : ip6hdr - > ip6_ctlun . ip6_un1 . ip6_un1_hlim ;
if ( ip6hdr ) ttl_fake = params . desync_ttl6 ? params . desync_ttl6 : ttl_orig ;
else ttl_fake = params . desync_ttl ? params . desync_ttl : ttl_orig ;
extract_endpoints ( ip , ip6hdr , NULL , udphdr , & src , & dst ) ;
2022-01-01 20:22:04 +03:00
if ( params . debug )
{
printf ( " dpi desync src= " ) ;
print_sockaddr ( ( struct sockaddr * ) & src ) ;
printf ( " dst= " ) ;
print_sockaddr ( ( struct sockaddr * ) & dst ) ;
printf ( " \n " ) ;
}
2022-05-15 15:54:35 +03:00
uint32_t desync_fwmark = fwmark | params . desync_fwmark ;
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
2022-01-01 20:22:04 +03:00
b = false ;
2022-01-03 12:38:18 +03:00
switch ( desync_mode )
2022-01-01 20:22:04 +03:00
{
2022-04-12 15:52:06 +03:00
case DESYNC_FAKE_KNOWN :
if ( ! bKnownProtocol )
{
DLOG ( " not applying fake because of unknown protocol \n " ) ;
desync_mode = params . desync_mode2 ;
break ;
}
2022-01-01 20:22:04 +03:00
case DESYNC_FAKE :
2023-09-07 13:41:25 +03:00
if ( ! prepare_udp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , ttl_fake , params . desync_fooling_mode , NULL , 0 , 0 , fake , fake_size , pkt1 , & pkt1_len ) )
2022-01-01 20:22:04 +03:00
return res ;
DLOG ( " sending fake request : " ) ;
2022-01-03 12:38:18 +03:00
hexdump_limited_dlog ( fake , fake_size , PKTDATA_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend_rep ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-04-12 15:52:06 +03:00
return res ;
2022-01-01 20:22:04 +03:00
b = true ;
break ;
2022-02-01 20:35:52 +03:00
case DESYNC_HOPBYHOP :
2022-02-05 13:36:03 +03:00
case DESYNC_DESTOPT :
2022-02-05 15:41:46 +03:00
case DESYNC_IPFRAG1 :
fooling_orig = ( desync_mode = = DESYNC_HOPBYHOP ) ? FOOL_HOPBYHOP : ( desync_mode = = DESYNC_DESTOPT ) ? FOOL_DESTOPT : FOOL_IPFRAG1 ;
2022-04-12 15:52:06 +03:00
if ( ip6hdr & & ( params . desync_mode2 = = DESYNC_NONE | | ! desync_valid_second_stage_udp ( params . desync_mode2 ) ) )
2022-02-01 20:35:52 +03:00
{
if ( ! prepare_udp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst ,
2023-09-07 13:41:25 +03:00
ttl_orig , fooling_orig , NULL , 0 , 0 ,
2022-02-01 20:35:52 +03:00
data_payload , len_payload , pkt1 , & pkt1_len ) )
{
return res ;
}
2022-02-05 13:36:03 +03:00
DLOG ( " resending original packet with extension header \n " ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-02-01 20:35:52 +03:00
return res ;
2022-02-02 09:39:48 +03:00
// this mode is final, no other options available
return drop ;
2022-02-01 20:35:52 +03:00
}
2022-02-02 15:18:35 +03:00
desync_mode = params . desync_mode2 ;
2022-04-12 15:52:06 +03:00
break ;
2022-01-01 20:22:04 +03:00
}
if ( b )
{
2022-04-12 15:52:06 +03:00
if ( params . desync_mode2 = = DESYNC_NONE | | ! desync_valid_second_stage_udp ( params . desync_mode2 ) )
2022-01-03 12:38:18 +03:00
{
DLOG ( " reinjecting original packet. len=%zu len_payload=%zu \n " , len_pkt , len_payload )
# ifdef __FreeBSD__
// FreeBSD tend to pass ipv6 frames with wrong checksum
if ( res = = modify | | ip6hdr )
# else
// if original packet was tampered earlier it needs checksum fixed
if ( res = = modify )
# endif
udp_fix_checksum ( udphdr , sizeof ( struct udphdr ) + len_payload , ip , ip6hdr ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , data_pkt , len_pkt ) )
2022-01-03 12:38:18 +03:00
return res ;
return drop ;
}
desync_mode = params . desync_mode2 ;
2022-01-01 20:22:04 +03:00
}
2022-01-03 12:38:18 +03:00
switch ( desync_mode )
{
2022-04-12 15:52:06 +03:00
case DESYNC_UDPLEN :
pkt1_len = sizeof ( pkt1 ) ;
2023-09-07 13:41:25 +03:00
if ( ! prepare_udp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , ttl_orig , fooling_orig , params . udplen_pattern , sizeof ( params . udplen_pattern ) , params . udplen_increment , data_payload , len_payload , pkt1 , & pkt1_len ) )
2022-07-27 12:00:36 +03:00
{
DLOG ( " could not construct packet with modified length. too large ? \n " ) ;
2022-04-12 15:52:06 +03:00
return res ;
2022-07-27 12:00:36 +03:00
}
DLOG ( " resending original packet with increased by %d length \n " , params . udplen_increment ) ;
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-04-12 15:52:06 +03:00
return res ;
return drop ;
2023-09-07 19:03:37 +03:00
case DESYNC_TAMPER :
if ( IsDhtD1 ( data_payload , len_payload ) )
{
size_t szbuf , szcopy ;
2023-09-07 21:02:29 +03:00
memcpy ( pkt2 , " d2:001:x " , 8 ) ;
2023-09-07 19:03:37 +03:00
pkt2_len = 8 ;
szbuf = sizeof ( pkt2 ) - pkt2_len ;
szcopy = len_payload - 1 ;
if ( szcopy > szbuf )
{
DLOG ( " packet is too long to tamper " ) ;
return res ;
}
memcpy ( pkt2 + pkt2_len , data_payload + 1 , szcopy ) ;
pkt2_len + = szcopy ;
pkt1_len = sizeof ( pkt1 ) ;
if ( ! prepare_udp_segment ( ( struct sockaddr * ) & src , ( struct sockaddr * ) & dst , ttl_orig , fooling_orig , NULL , 0 , 0 , pkt2 , pkt2_len , pkt1 , & pkt1_len ) )
{
DLOG ( " could not construct packet with modified length. too large ? \n " ) ;
return res ;
}
DLOG ( " resending tampered DHT \n " ) ;
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
return res ;
return drop ;
}
else
{
DLOG ( " payload is not tamperable \n " ) ;
return res ;
}
2022-01-03 12:38:18 +03:00
case DESYNC_IPFRAG2 :
{
# ifdef __FreeBSD__
// FreeBSD tend to pass ipv6 frames with wrong checksum
2022-02-02 15:18:35 +03:00
if ( res = = modify | | ip6hdr )
# else
// if original packet was tampered earlier it needs checksum fixed
if ( res = = modify )
2022-01-03 12:38:18 +03:00
# endif
2022-02-02 15:18:35 +03:00
udp_fix_checksum ( udphdr , sizeof ( struct udphdr ) + len_payload , ip , ip6hdr ) ;
uint8_t pkt3 [ DPI_DESYNC_MAX_FAKE_LEN + 100 ] , * pkt_orig ;
size_t pkt_orig_len ;
2022-01-03 12:38:18 +03:00
size_t len_transport = len_payload + sizeof ( struct udphdr ) ;
size_t ipfrag_pos = ( params . desync_ipfrag_pos_udp & & params . desync_ipfrag_pos_udp < len_transport ) ? params . desync_ipfrag_pos_udp : sizeof ( struct udphdr ) ;
// freebsd do not set ip.id
2022-02-05 15:41:46 +03:00
uint32_t ident = ip ? ip - > ip_id ? ip - > ip_id : htons ( 1 + random ( ) % 0xFFFF ) : htonl ( 1 + random ( ) % 0xFFFFFFFF ) ;
2022-01-03 12:38:18 +03:00
pkt1_len = sizeof ( pkt1 ) ;
pkt2_len = sizeof ( pkt2 ) ;
2022-02-05 15:41:46 +03:00
if ( ip6hdr & & ( fooling_orig = = FOOL_HOPBYHOP | | fooling_orig = = FOOL_DESTOPT ) )
2022-02-02 15:18:35 +03:00
{
pkt_orig_len = sizeof ( pkt3 ) ;
2022-02-05 15:41:46 +03:00
if ( ! ip6_insert_simple_hdr ( fooling_orig = = FOOL_HOPBYHOP ? IPPROTO_HOPOPTS : IPPROTO_DSTOPTS , data_pkt , len_pkt , pkt3 , & pkt_orig_len ) )
2022-02-02 15:18:35 +03:00
return res ;
pkt_orig = pkt3 ;
}
else
{
pkt_orig = data_pkt ;
pkt_orig_len = len_pkt ;
}
if ( ! ip_frag ( pkt_orig , pkt_orig_len , ipfrag_pos , ident , pkt1 , & pkt1_len , pkt2 , & pkt2_len ) )
2022-01-03 12:38:18 +03:00
return res ;
DLOG ( " sending 1st ip fragment 0-%zu len=%zu : " , ipfrag_pos - 1 , ipfrag_pos )
hexdump_limited_dlog ( pkt1 , pkt1_len , IP_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt2 , pkt2_len ) )
2022-01-03 12:38:18 +03:00
return res ;
DLOG ( " sending 2nd ip fragment %zu-%zu len=%zu : " , ipfrag_pos , len_transport - 1 , len_transport - ipfrag_pos )
hexdump_limited_dlog ( pkt2 , pkt2_len , IP_MAXDUMP ) ; DLOG ( " \n " )
2022-05-15 15:54:35 +03:00
if ( ! rawsend ( ( struct sockaddr * ) & dst , desync_fwmark , ifout , pkt1 , pkt1_len ) )
2022-01-03 12:38:18 +03:00
return res ;
return frag ;
}
}
2021-03-04 14:30:38 +03:00
}
return res ;
}