1
0
mirror of https://github.com/mfontanini/libtins synced 2026-01-23 02:35:57 +01:00
Files
libtins/src/tcp.cpp
Lukáš Karas 22b4435c81 simplify tcp flag checks, fix stream_follower (#334)
* simplify tcp flag checks, fix stream_follower

On various places was used simple comparison for checking state of flags.

tcp.flags() == (TCP::SYN | TCP::ACK)

This is not what you want usually, because this check is false
in case that another flag is set also. Correct check for syn-ack
packet should be:

(tcp.flags() & (TCP::SYN | TCP::ACK)) == (TCP::SYN | TCP::ACK)

To simplify this kind of check, add new has_flags method:

bool TCP::has_flags(small_uint<12> check_flags) const

* remove duplicate TCP::SYN flag check
2019-03-14 18:18:12 -07:00

426 lines
13 KiB
C++

/*
* Copyright (c) 2017, Matias Fontanini
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
#include <cstring>
#include <tins/tcp.h>
#include <tins/ip.h>
#include <tins/ipv6.h>
#include <tins/constants.h>
#include <tins/rawpdu.h>
#include <tins/exceptions.h>
#include <tins/memory_helpers.h>
#include <tins/utils/checksum_utils.h>
using std::vector;
using std::pair;
using Tins::Memory::InputMemoryStream;
using Tins::Memory::OutputMemoryStream;
namespace Tins {
const uint16_t TCP::DEFAULT_WINDOW = 32678;
PDU::metadata TCP::extract_metadata(const uint8_t *buffer, uint32_t total_sz) {
if (TINS_UNLIKELY(total_sz < sizeof(tcp_header))) {
throw malformed_packet();
}
const tcp_header* header = (const tcp_header*)buffer;
return metadata(header->doff * 4, pdu_flag, PDU::UNKNOWN);
}
TCP::TCP(uint16_t dport, uint16_t sport)
: header_() {
this->dport(dport);
this->sport(sport);
data_offset(sizeof(tcp_header) / sizeof(uint32_t));
window(DEFAULT_WINDOW);
}
TCP::TCP(const uint8_t* buffer, uint32_t total_sz) {
InputMemoryStream stream(buffer, total_sz);
stream.read(header_);
// Check that we have at least the amount of bytes we need and not less
if (TINS_UNLIKELY(data_offset() * sizeof(uint32_t) > total_sz ||
data_offset() * sizeof(uint32_t) < sizeof(tcp_header))) {
throw malformed_packet();
}
const uint8_t* header_end = buffer + (data_offset() * sizeof(uint32_t));
if (stream.pointer() < header_end) {
// Estimate about 4 bytes per option and reserver that so we avoid doing
// multiple reallocations on the vector
options_.reserve((header_end - stream.pointer()) / sizeof(uint32_t));
}
while (stream.pointer() < header_end) {
const OptionTypes option_type = (OptionTypes)stream.read<uint8_t>();
if (option_type == EOL) {
stream.skip(header_end - stream.pointer());
break;
}
else if (option_type == NOP) {
#if TINS_IS_CXX11
add_option(option_type, 0);
#else
add_option(option(option_type, 0));
#endif // TINS_IS_CXX11
}
else {
// Extract the length
uint32_t len = stream.read<uint8_t>();
const uint8_t* data_start = stream.pointer();
// We need to subtract the option type and length from the size
if (TINS_UNLIKELY(len < sizeof(uint8_t) << 1)) {
throw malformed_packet();
}
len -= (sizeof(uint8_t) << 1);
// Make sure we have enough bytes for the advertised option payload length
if (TINS_UNLIKELY(data_start + len > header_end)) {
throw malformed_packet();
}
// If we're using C++11, use the variadic template overload
#if TINS_IS_CXX11
add_option(option_type, data_start, data_start + len);
#else
add_option(option(option_type, data_start, data_start + len));
#endif // TINS_IS_CXX11
// Skip the option's payload
stream.skip(len);
}
}
// If we still have any bytes left
if (stream) {
inner_pdu(new RawPDU(stream.pointer(), stream.size()));
}
}
void TCP::dport(uint16_t new_dport) {
header_.dport = Endian::host_to_be(new_dport);
}
void TCP::sport(uint16_t new_sport) {
header_.sport = Endian::host_to_be(new_sport);
}
void TCP::seq(uint32_t new_seq) {
header_.seq = Endian::host_to_be(new_seq);
}
void TCP::ack_seq(uint32_t new_ack_seq) {
header_.ack_seq = Endian::host_to_be(new_ack_seq);
}
void TCP::window(uint16_t new_window) {
header_.window = Endian::host_to_be(new_window);
}
void TCP::checksum(uint16_t new_check) {
header_.check = Endian::host_to_be(new_check);
}
void TCP::urg_ptr(uint16_t new_urg_ptr) {
header_.urg_ptr = Endian::host_to_be(new_urg_ptr);
}
void TCP::data_offset(small_uint<4> new_doff) {
this->header_.doff = new_doff;
}
void TCP::mss(uint16_t value) {
value = Endian::host_to_be(value);
add_option(option(MSS, 2, (uint8_t*)&value));
}
uint16_t TCP::mss() const {
return generic_search<uint16_t>(MSS);
}
void TCP::winscale(uint8_t value) {
add_option(option(WSCALE, 1, &value));
}
uint8_t TCP::winscale() const {
return generic_search<uint8_t>(WSCALE);
}
void TCP::sack_permitted() {
add_option(option(SACK_OK, 0));
}
bool TCP::has_sack_permitted() const {
return search_option(SACK_OK) != NULL;
}
void TCP::sack(const sack_type& edges) {
vector<uint8_t> value(edges.size() * sizeof(uint32_t));
if (edges.size()) {
OutputMemoryStream stream(value);
for (sack_type::const_iterator it = edges.begin(); it != edges.end(); ++it) {
stream.write_be(*it);
}
}
add_option(option(SACK, (uint8_t)value.size(), &value[0]));
}
TCP::sack_type TCP::sack() const {
const option* opt = search_option(SACK);
if (!opt) {
throw option_not_found();
}
return opt->to<sack_type>();
}
void TCP::timestamp(uint32_t value, uint32_t reply) {
uint64_t buffer = (uint64_t(value) << 32) | reply;
buffer = Endian::host_to_be(buffer);
add_option(option(TSOPT, 8, (uint8_t*)&buffer));
}
pair<uint32_t, uint32_t> TCP::timestamp() const {
const option* opt = search_option(TSOPT);
if (!opt) {
throw option_not_found();
}
return opt->to<pair<uint32_t, uint32_t> >();
}
void TCP::altchecksum(AltChecksums value) {
uint8_t int_value = value;
add_option(option(ALTCHK, 1, &int_value));
}
TCP::AltChecksums TCP::altchecksum() const {
return static_cast<AltChecksums>(generic_search<uint8_t>(ALTCHK));
}
small_uint<1> TCP::get_flag(Flags tcp_flag) const {
switch (tcp_flag) {
case FIN:
return header_.flags.fin;
break;
case SYN:
return header_.flags.syn;
break;
case RST:
return header_.flags.rst;
break;
case PSH:
return header_.flags.psh;
break;
case ACK:
return header_.flags.ack;
break;
case URG:
return header_.flags.urg;
break;
case ECE:
return header_.flags.ece;
break;
case CWR:
return header_.flags.cwr;
break;
default:
return 0;
break;
};
}
small_uint<12> TCP::flags() const {
return (header_.res1 << 8) | header_.flags_8;
}
bool TCP::has_flags(small_uint<12> check_flags) const {
return (flags() & check_flags) == check_flags;
}
void TCP::set_flag(Flags tcp_flag, small_uint<1> value) {
switch (tcp_flag) {
case FIN:
header_.flags.fin = value;
break;
case SYN:
header_.flags.syn = value;
break;
case RST:
header_.flags.rst = value;
break;
case PSH:
header_.flags.psh = value;
break;
case ACK:
header_.flags.ack = value;
break;
case URG:
header_.flags.urg = value;
break;
case ECE:
header_.flags.ece = value;
break;
case CWR:
header_.flags.cwr = value;
break;
};
}
void TCP::flags(small_uint<12> value) {
header_.res1 = (value >> 8) & 0x0f;
header_.flags_8 = value & 0xff;
}
void TCP::add_option(const option& opt) {
options_.push_back(opt);
}
uint32_t TCP::header_size() const {
return sizeof(header_) + pad_options_size(calculate_options_size());
}
void TCP::write_serialization(uint8_t* buffer, uint32_t total_sz) {
OutputMemoryStream stream(buffer, total_sz);
const uint32_t options_size = calculate_options_size();
const uint32_t total_options_size = pad_options_size(options_size);
// Set checksum to 0, we'll calculate it at the end
checksum(0);
header_.doff = (sizeof(tcp_header) + total_options_size) / sizeof(uint32_t);
stream.write(header_);
for (options_type::const_iterator it = options_.begin(); it != options_.end(); ++it) {
write_option(*it, stream);
}
if (options_size < total_options_size) {
const uint16_t padding = total_options_size - options_size;
stream.fill(padding, 0);
}
uint32_t check = 0;
const PDU* parent = parent_pdu();
if (const Tins::IP* ip_packet = tins_cast<const Tins::IP*>(parent)) {
check = Utils::pseudoheader_checksum(
ip_packet->src_addr(),
ip_packet->dst_addr(),
size(),
Constants::IP::PROTO_TCP
) + Utils::sum_range(buffer, buffer + total_sz);
}
else if (const Tins::IPv6* ipv6_packet = tins_cast<const Tins::IPv6*>(parent)) {
check = Utils::pseudoheader_checksum(
ipv6_packet->src_addr(),
ipv6_packet->dst_addr(),
size(),
Constants::IP::PROTO_TCP
) + Utils::sum_range(buffer, buffer + total_sz);
}
else {
return;
}
// Convert this 32-bit value into a 16-bit value
while (check >> 16) {
check = (check & 0xffff) + (check >> 16);
}
checksum(Endian::host_to_be<uint16_t>(~check));
((tcp_header*)buffer)->check = header_.check;
}
const TCP::option* TCP::search_option(OptionTypes type) const {
// Search for the iterator. If we found something, return it, otherwise return nullptr.
options_type::const_iterator iter = search_option_iterator(type);
return (iter != options_.end()) ? &*iter : 0;
}
TCP::options_type::const_iterator TCP::search_option_iterator(OptionTypes type) const {
return Internals::find_option_const<option>(options_, type);
}
TCP::options_type::iterator TCP::search_option_iterator(OptionTypes type) {
return Internals::find_option<option>(options_, type);
}
/* options */
void TCP::write_option(const option& opt, OutputMemoryStream& stream) {
stream.write<uint8_t>(opt.option());
// Only do this for non EOL nor NOP options
if (opt.option() > 1) {
uint8_t length = opt.length_field();
// Only add the identifier and size field sizes if the length
// field hasn't been spoofed.
if (opt.length_field() == opt.data_size()) {
length += (sizeof(uint8_t) << 1);
}
stream.write(length);
stream.write(opt.data_ptr(), opt.data_size());
}
}
uint32_t TCP::calculate_options_size() const {
uint32_t options_size = 0;
for (options_type::const_iterator iter = options_.begin(); iter != options_.end(); ++iter) {
const option& opt = *iter;
options_size += sizeof(uint8_t);
// SACK_OK contains length but not data
if (opt.data_size() || opt.option() == SACK_OK) {
options_size += sizeof(uint8_t);
options_size += static_cast<uint16_t>(opt.data_size());
}
}
return options_size;
}
uint32_t TCP::pad_options_size(uint32_t size) const {
uint8_t padding = size & 3;
return padding ? (size - padding + 4) : size;
}
bool TCP::remove_option(OptionTypes type) {
options_type::iterator iter = search_option_iterator(type);
if (iter == options_.end()) {
return false;
}
options_.erase(iter);
return true;
}
bool TCP::matches_response(const uint8_t* ptr, uint32_t total_sz) const {
if (total_sz < sizeof(header_)) {
return false;
}
const tcp_header* tcp_ptr = (const tcp_header*)ptr;
if (tcp_ptr->sport == header_.dport && tcp_ptr->dport == header_.sport) {
const uint32_t data_offset = tcp_ptr->doff * sizeof(uint32_t);
uint32_t sz = (total_sz < data_offset) ? total_sz : data_offset;
return inner_pdu() ? inner_pdu()->matches_response(ptr + sz, total_sz - sz) : true;
}
else
return false;
}
} // Tins