2021-03-18 17:22:03 +03:00
|
|
|
#include "conntrack.h"
|
|
|
|
#include "darkmagic.h"
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#undef uthash_nonfatal_oom
|
|
|
|
#define uthash_nonfatal_oom(elt) ut_oom_recover(elt)
|
|
|
|
|
|
|
|
static bool oom = false;
|
|
|
|
static void ut_oom_recover(void *elem)
|
|
|
|
{
|
|
|
|
oom = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *connstate_s[]={"SYN","ESTABLISHED","FIN"};
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
static void connswap(const t_conn *c, t_conn *c2)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
memset(c2,0,sizeof(*c2));
|
|
|
|
c2->l3proto = c->l3proto;
|
|
|
|
c2->l4proto = c->l4proto;
|
|
|
|
c2->src = c->dst;
|
|
|
|
c2->dst = c->src;
|
|
|
|
c2->sport = c->dport;
|
|
|
|
c2->dport = c->sport;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2023-11-15 19:36:34 +03:00
|
|
|
void ConntrackClearHostname(t_ctrack *track)
|
|
|
|
{
|
|
|
|
if (track->hostname)
|
|
|
|
{
|
|
|
|
free(track->hostname);
|
|
|
|
track->hostname = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
static void ConntrackClearTrack(t_ctrack *track)
|
|
|
|
{
|
|
|
|
ConntrackClearHostname(track);
|
|
|
|
ReasmClear(&track->reasm_orig);
|
2024-04-20 20:59:45 +03:00
|
|
|
rawpacket_queue_destroy(&track->delayed);
|
2023-11-15 19:36:34 +03:00
|
|
|
}
|
|
|
|
|
2023-10-26 15:12:32 +03:00
|
|
|
static void ConntrackFreeElem(t_conntrack_pool *elem)
|
|
|
|
{
|
2023-11-15 19:36:34 +03:00
|
|
|
ConntrackClearTrack(&elem->track);
|
2023-10-26 15:12:32 +03:00
|
|
|
free(elem);
|
|
|
|
}
|
2021-03-18 17:22:03 +03:00
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
static void ConntrackPoolDestroyPool(t_conntrack_pool **pp)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t_conntrack_pool *elem, *tmp;
|
2023-10-26 15:12:32 +03:00
|
|
|
HASH_ITER(hh, *pp, elem, tmp) { HASH_DEL(*pp, elem); ConntrackFreeElem(elem); }
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
void ConntrackPoolDestroy(t_conntrack *p)
|
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
ConntrackPoolDestroyPool(&p->pool);
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
void ConntrackPoolInit(t_conntrack *p, time_t purge_interval, uint32_t timeout_syn, uint32_t timeout_established, uint32_t timeout_fin, uint32_t timeout_udp)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
|
|
|
p->timeout_syn = timeout_syn;
|
|
|
|
p->timeout_established = timeout_established;
|
|
|
|
p->timeout_fin = timeout_fin;
|
2022-01-01 20:22:04 +03:00
|
|
|
p->timeout_udp= timeout_udp;
|
2021-03-18 17:22:03 +03:00
|
|
|
p->t_purge_interval = purge_interval;
|
|
|
|
time(&p->t_last_purge);
|
2022-01-01 20:22:04 +03:00
|
|
|
p->pool = NULL;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
void ConntrackExtractConn(t_conn *c, bool bReverse, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
memset(c,0,sizeof(*c));
|
|
|
|
if (ip)
|
|
|
|
{
|
|
|
|
c->l3proto = IPPROTO_IP;
|
|
|
|
c->dst.ip = bReverse ? ip->ip_src : ip->ip_dst;
|
|
|
|
c->src.ip = bReverse ? ip->ip_dst : ip->ip_src;
|
|
|
|
}
|
|
|
|
else if (ip6)
|
|
|
|
{
|
|
|
|
c->l3proto = IPPROTO_IPV6;
|
|
|
|
c->dst.ip6 = bReverse ? ip6->ip6_src : ip6->ip6_dst;
|
|
|
|
c->src.ip6 = bReverse ? ip6->ip6_dst : ip6->ip6_src;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
c->l3proto = -1;
|
|
|
|
extract_ports(tcphdr, udphdr, &c->l4proto, bReverse ? &c->dport : &c->sport, bReverse ? &c->sport : &c->dport);
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
static t_conntrack_pool *ConntrackPoolSearch(t_conntrack_pool *p, const t_conn *c)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t_conntrack_pool *t;
|
|
|
|
HASH_FIND(hh, p, c, sizeof(*c), t);
|
|
|
|
return t;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ConntrackInitTrack(t_ctrack *t)
|
|
|
|
{
|
|
|
|
memset(t,0,sizeof(*t));
|
2021-03-19 15:39:32 +03:00
|
|
|
t->scale_orig = t->scale_reply = SCALE_NONE;
|
2021-03-18 17:22:03 +03:00
|
|
|
time(&t->t_start);
|
2024-04-20 20:59:45 +03:00
|
|
|
rawpacket_queue_init(&t->delayed);
|
|
|
|
}
|
|
|
|
static void ConntrackReInitTrack(t_ctrack *t)
|
|
|
|
{
|
|
|
|
ConntrackClearTrack(t);
|
|
|
|
ConntrackInitTrack(t);
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
static t_conntrack_pool *ConntrackNew(t_conntrack_pool **pp, const t_conn *c)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2024-04-20 20:59:45 +03:00
|
|
|
t_conntrack_pool *ctnew;
|
|
|
|
if (!(ctnew = malloc(sizeof(*ctnew)))) return NULL;
|
|
|
|
ctnew->conn = *c;
|
2022-01-01 20:22:04 +03:00
|
|
|
oom = false;
|
2024-04-20 20:59:45 +03:00
|
|
|
HASH_ADD(hh, *pp, conn, sizeof(*c), ctnew);
|
|
|
|
if (oom) { free(ctnew); return NULL; }
|
|
|
|
ConntrackInitTrack(&ctnew->track);
|
|
|
|
return ctnew;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
// non-tcp packets are passed with tcphdr=NULL but len_payload filled
|
2021-03-18 17:22:03 +03:00
|
|
|
static void ConntrackFeedPacket(t_ctrack *t, bool bReverse, const struct tcphdr *tcphdr, uint32_t len_payload)
|
|
|
|
{
|
2021-03-19 15:39:32 +03:00
|
|
|
uint8_t scale;
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
if (bReverse)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t->pcounter_reply++;
|
|
|
|
t->pdcounter_reply+=!!len_payload;
|
|
|
|
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
else
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t->pcounter_orig++;
|
|
|
|
t->pdcounter_orig+=!!len_payload;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
if (tcphdr)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
if (tcp_syn_segment(tcphdr))
|
|
|
|
{
|
2024-04-20 20:59:45 +03:00
|
|
|
if (t->state!=SYN) ConntrackReInitTrack(t); // erase current entry
|
2024-04-22 14:30:05 +03:00
|
|
|
t->seq0 = ntohl(tcphdr->th_seq);
|
2022-01-01 20:22:04 +03:00
|
|
|
}
|
|
|
|
else if (tcp_synack_segment(tcphdr))
|
|
|
|
{
|
2024-04-20 20:59:45 +03:00
|
|
|
if (t->state!=SYN) ConntrackReInitTrack(t); // erase current entry
|
2024-04-22 14:30:05 +03:00
|
|
|
if (!t->seq0) t->seq0 = ntohl(tcphdr->th_ack)-1;
|
|
|
|
t->ack0 = ntohl(tcphdr->th_seq);
|
2022-01-01 20:22:04 +03:00
|
|
|
}
|
|
|
|
else if (tcphdr->th_flags & (TH_FIN|TH_RST))
|
|
|
|
{
|
|
|
|
t->state = FIN;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (t->state==SYN)
|
|
|
|
{
|
|
|
|
t->state=ESTABLISHED;
|
2024-04-22 14:30:05 +03:00
|
|
|
if (!bReverse && !t->ack0) t->ack0 = ntohl(tcphdr->th_ack)-1;
|
2022-01-01 20:22:04 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
scale = tcp_find_scale_factor(tcphdr);
|
|
|
|
if (bReverse)
|
|
|
|
{
|
2024-04-22 14:30:05 +03:00
|
|
|
t->pos_orig = t->seq_last = ntohl(tcphdr->th_ack);
|
|
|
|
t->ack_last = ntohl(tcphdr->th_seq);
|
2022-01-01 20:22:04 +03:00
|
|
|
t->pos_reply = t->ack_last + len_payload;
|
2024-04-22 14:30:05 +03:00
|
|
|
t->winsize_reply = ntohs(tcphdr->th_win);
|
2022-01-01 20:22:04 +03:00
|
|
|
if (scale!=SCALE_NONE) t->scale_reply = scale;
|
|
|
|
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2024-04-22 14:30:05 +03:00
|
|
|
t->seq_last = ntohl(tcphdr->th_seq);
|
2022-01-01 20:22:04 +03:00
|
|
|
t->pos_orig = t->seq_last + len_payload;
|
2024-04-22 14:30:05 +03:00
|
|
|
t->pos_reply = t->ack_last = ntohl(tcphdr->th_ack);
|
|
|
|
t->winsize_orig = ntohs(tcphdr->th_win);
|
2022-01-01 20:22:04 +03:00
|
|
|
if (scale!=SCALE_NONE) t->scale_orig = scale;
|
|
|
|
}
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
if (bReverse)
|
|
|
|
{
|
|
|
|
t->ack_last=t->pos_reply;
|
|
|
|
t->pos_reply+=len_payload;
|
|
|
|
}
|
|
|
|
else
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t->seq_last=t->pos_orig;
|
|
|
|
t->pos_orig+=len_payload;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
time(&t->t_last);
|
|
|
|
}
|
|
|
|
|
2024-04-20 20:59:45 +03:00
|
|
|
static bool ConntrackPoolDoubleSearchPool(t_conntrack_pool **pp, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr, t_ctrack **ctrack, bool *bReverse)
|
|
|
|
{
|
|
|
|
bool b_rev;
|
|
|
|
t_conn conn,connswp;
|
|
|
|
t_conntrack_pool *ctr;
|
|
|
|
|
|
|
|
ConntrackExtractConn(&conn,false,ip,ip6,tcphdr,udphdr);
|
|
|
|
if ((ctr=ConntrackPoolSearch(*pp,&conn)))
|
|
|
|
{
|
|
|
|
if (bReverse) *bReverse = false;
|
|
|
|
if (ctrack) *ctrack = &ctr->track;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
connswap(&conn,&connswp);
|
|
|
|
if ((ctr=ConntrackPoolSearch(*pp,&connswp)))
|
|
|
|
{
|
|
|
|
if (bReverse) *bReverse = true;
|
|
|
|
if (ctrack) *ctrack = &ctr->track;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
bool ConntrackPoolDoubleSearch(t_conntrack *p, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr, t_ctrack **ctrack, bool *bReverse)
|
|
|
|
{
|
|
|
|
return ConntrackPoolDoubleSearchPool(&p->pool, ip, ip6, tcphdr, udphdr, ctrack, bReverse);
|
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
|
|
|
|
static bool ConntrackPoolFeedPool(t_conntrack_pool **pp, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr, size_t len_payload, t_ctrack **ctrack, bool *bReverse)
|
|
|
|
{
|
|
|
|
t_conn conn, connswp;
|
|
|
|
t_conntrack_pool *ctr;
|
|
|
|
bool b_rev;
|
|
|
|
|
|
|
|
ConntrackExtractConn(&conn,false,ip,ip6,tcphdr,udphdr);
|
|
|
|
if ((ctr=ConntrackPoolSearch(*pp,&conn)))
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
ConntrackFeedPacket(&ctr->track, (b_rev=false), tcphdr, len_payload);
|
|
|
|
goto ok;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
connswap(&conn,&connswp);
|
|
|
|
if ((ctr=ConntrackPoolSearch(*pp,&connswp)))
|
|
|
|
{
|
|
|
|
ConntrackFeedPacket(&ctr->track, (b_rev=true), tcphdr, len_payload);
|
|
|
|
goto ok;
|
|
|
|
}
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
b_rev = tcphdr && tcp_synack_segment(tcphdr);
|
|
|
|
if (tcphdr && tcp_syn_segment(tcphdr) || b_rev || udphdr)
|
|
|
|
{
|
|
|
|
if ((ctr=ConntrackNew(pp, b_rev ? &connswp : &conn)))
|
|
|
|
{
|
|
|
|
ConntrackFeedPacket(&ctr->track, b_rev, tcphdr, len_payload);
|
|
|
|
goto ok;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
ok:
|
|
|
|
if (ctrack) *ctrack = &ctr->track;
|
|
|
|
if (bReverse) *bReverse = b_rev;
|
2021-03-18 17:22:03 +03:00
|
|
|
return true;
|
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
bool ConntrackPoolFeed(t_conntrack *p, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr, size_t len_payload, t_ctrack **ctrack, bool *bReverse)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
return ConntrackPoolFeedPool(&p->pool,ip,ip6,tcphdr,udphdr,len_payload,ctrack,bReverse);
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
static bool ConntrackPoolDropPool(t_conntrack_pool **pp, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t_conn conn, connswp;
|
|
|
|
t_conntrack_pool *t;
|
|
|
|
ConntrackExtractConn(&conn,false,ip,ip6,tcphdr,udphdr);
|
|
|
|
if (!(t=ConntrackPoolSearch(*pp,&conn)))
|
|
|
|
{
|
|
|
|
connswap(&conn,&connswp);
|
|
|
|
t=ConntrackPoolSearch(*pp,&connswp);
|
|
|
|
}
|
|
|
|
if (!t) return false;
|
2023-10-26 15:12:32 +03:00
|
|
|
HASH_DEL(*pp, t); ConntrackFreeElem(t);
|
2022-01-01 20:22:04 +03:00
|
|
|
return true;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
bool ConntrackPoolDrop(t_conntrack *p, const struct ip *ip, const struct ip6_hdr *ip6, const struct tcphdr *tcphdr, const struct udphdr *udphdr)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
return ConntrackPoolDropPool(&p->pool,ip,ip6,tcphdr,udphdr);
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void ConntrackPoolPurge(t_conntrack *p)
|
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
time_t tidle, tnow = time(NULL);
|
|
|
|
t_conntrack_pool *t, *tmp;
|
|
|
|
|
2021-03-18 17:22:03 +03:00
|
|
|
if ((tnow - p->t_last_purge)>=p->t_purge_interval)
|
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
HASH_ITER(hh, p->pool , t, tmp) {
|
|
|
|
tidle = tnow - t->track.t_last;
|
|
|
|
if ( t->track.b_cutoff ||
|
|
|
|
t->conn.l4proto==IPPROTO_TCP && (
|
|
|
|
t->track.state==SYN && tidle>=p->timeout_syn ||
|
|
|
|
t->track.state==ESTABLISHED && tidle>=p->timeout_established ||
|
|
|
|
t->track.state==FIN && tidle>=p->timeout_fin) ||
|
|
|
|
t->conn.l4proto==IPPROTO_UDP &&
|
|
|
|
tidle>=p->timeout_udp)
|
|
|
|
{
|
2023-10-26 15:12:32 +03:00
|
|
|
HASH_DEL(p->pool, t); ConntrackFreeElem(t);
|
2022-01-01 20:22:04 +03:00
|
|
|
}
|
|
|
|
}
|
2021-03-18 17:22:03 +03:00
|
|
|
p->t_last_purge = tnow;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-01 20:22:04 +03:00
|
|
|
static void taddr2str(uint8_t l3proto, const t_addr *a, char *buf, size_t bufsize)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
if (!inet_ntop(family_from_proto(l3proto), a, buf, bufsize) && bufsize) *buf=0;
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
|
2023-10-26 15:12:32 +03:00
|
|
|
static const char *ConntrackProtoName(t_l7proto proto)
|
|
|
|
{
|
|
|
|
switch(proto)
|
|
|
|
{
|
|
|
|
case HTTP: return "HTTP";
|
|
|
|
case TLS: return "TLS";
|
|
|
|
case QUIC: return "QUIC";
|
|
|
|
case WIREGUARD: return "WIREGUARD";
|
|
|
|
case DHT: return "DHT";
|
|
|
|
default: return "UNKNOWN";
|
|
|
|
}
|
|
|
|
}
|
2022-01-01 20:22:04 +03:00
|
|
|
void ConntrackPoolDump(const t_conntrack *p)
|
2021-03-18 17:22:03 +03:00
|
|
|
{
|
2022-01-01 20:22:04 +03:00
|
|
|
t_conntrack_pool *t, *tmp;
|
|
|
|
char sa1[40],sa2[40];
|
|
|
|
time_t tnow = time(NULL);
|
|
|
|
HASH_ITER(hh, p->pool, t, tmp) {
|
|
|
|
taddr2str(t->conn.l3proto, &t->conn.src, sa1, sizeof(sa1));
|
|
|
|
taddr2str(t->conn.l3proto, &t->conn.dst, sa2, sizeof(sa2));
|
2023-10-26 15:12:32 +03:00
|
|
|
printf("%s [%s]:%u => [%s]:%u : %s : t0=%llu last=t0+%llu now=last+%llu packets_orig=d%llu/n%llu packets_reply=d%llu/n%llu ",
|
|
|
|
proto_name(t->conn.l4proto),
|
|
|
|
sa1, t->conn.sport, sa2, t->conn.dport,
|
|
|
|
t->conn.l4proto==IPPROTO_TCP ? connstate_s[t->track.state] : "-",
|
|
|
|
(unsigned long long)t->track.t_start, (unsigned long long)(t->track.t_last - t->track.t_start), (unsigned long long)(tnow - t->track.t_last),
|
|
|
|
(unsigned long long)t->track.pdcounter_orig, (unsigned long long)t->track.pcounter_orig,
|
|
|
|
(unsigned long long)t->track.pdcounter_reply, (unsigned long long)t->track.pcounter_reply);
|
2022-01-01 20:22:04 +03:00
|
|
|
if (t->conn.l4proto==IPPROTO_TCP)
|
2023-10-26 15:12:32 +03:00
|
|
|
printf("seq0=%u rseq=%u pos_orig=%u ack0=%u rack=%u pos_reply=%u wsize_orig=%u:%d wsize_reply=%u:%d",
|
2022-01-01 20:22:04 +03:00
|
|
|
t->track.seq0, t->track.seq_last - t->track.seq0, t->track.pos_orig - t->track.seq0,
|
|
|
|
t->track.ack0, t->track.ack_last - t->track.ack0, t->track.pos_reply - t->track.ack0,
|
|
|
|
t->track.winsize_orig, t->track.scale_orig==SCALE_NONE ? -1 : t->track.scale_orig,
|
|
|
|
t->track.winsize_reply, t->track.scale_reply==SCALE_NONE ? -1 : t->track.scale_reply);
|
|
|
|
else
|
2023-10-26 15:12:32 +03:00
|
|
|
printf("rseq=%u pos_orig=%u rack=%u pos_reply=%u",
|
2022-01-01 20:22:04 +03:00
|
|
|
t->track.seq_last, t->track.pos_orig,
|
|
|
|
t->track.ack_last, t->track.pos_reply);
|
2023-10-26 15:12:32 +03:00
|
|
|
printf(" req_retrans=%u cutoff=%u wss_cutoff=%u d_cutoff=%u hostname=%s l7proto=%s\n",
|
|
|
|
t->track.req_retrans_counter, t->track.b_cutoff, t->track.b_wssize_cutoff, t->track.b_desync_cutoff, t->track.hostname, ConntrackProtoName(t->track.l7proto));
|
2022-01-01 20:22:04 +03:00
|
|
|
};
|
2021-03-18 17:22:03 +03:00
|
|
|
}
|
2023-11-15 19:36:34 +03:00
|
|
|
|
|
|
|
|
|
|
|
void ReasmClear(t_reassemble *reasm)
|
|
|
|
{
|
|
|
|
if (reasm->packet)
|
|
|
|
{
|
|
|
|
free(reasm->packet);
|
|
|
|
reasm->packet = NULL;
|
|
|
|
}
|
|
|
|
reasm->size = reasm->size_present = 0;
|
|
|
|
}
|
|
|
|
bool ReasmInit(t_reassemble *reasm, size_t size_requested, uint32_t seq_start)
|
|
|
|
{
|
|
|
|
reasm->packet = malloc(size_requested);
|
|
|
|
if (!reasm->packet) return false;
|
|
|
|
reasm->size = size_requested;
|
|
|
|
reasm->size_present = 0;
|
|
|
|
reasm->seq = seq_start;
|
|
|
|
return true;
|
|
|
|
}
|
2024-04-20 20:59:45 +03:00
|
|
|
bool ReasmResize(t_reassemble *reasm, size_t new_size)
|
|
|
|
{
|
|
|
|
uint8_t *p = realloc(reasm->packet, new_size);
|
|
|
|
if (!p) return false;
|
|
|
|
reasm->packet = p;
|
|
|
|
reasm->size = new_size;
|
|
|
|
if (reasm->size_present > new_size) reasm->size_present = new_size;
|
|
|
|
return true;
|
|
|
|
}
|
2024-04-22 14:30:05 +03:00
|
|
|
bool ReasmFeed(t_reassemble *reasm, uint32_t seq, const void *payload, size_t len)
|
2023-11-15 19:36:34 +03:00
|
|
|
{
|
2024-04-22 10:28:07 +03:00
|
|
|
if (reasm->seq!=seq) return false; // fail session if out of sequence
|
2023-11-15 19:36:34 +03:00
|
|
|
|
|
|
|
size_t szcopy;
|
|
|
|
szcopy = reasm->size - reasm->size_present;
|
|
|
|
if (len<szcopy) szcopy = len;
|
|
|
|
memcpy(reasm->packet + reasm->size_present, payload, szcopy);
|
|
|
|
reasm->size_present += szcopy;
|
|
|
|
reasm->seq += (uint32_t)szcopy;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2024-04-22 10:28:07 +03:00
|
|
|
bool ReasmHasSpace(t_reassemble *reasm, size_t len)
|
|
|
|
{
|
|
|
|
return (reasm->size_present+len)<=reasm->size;
|
|
|
|
}
|