123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133 |
- /* Name: packet.c
- *
- * Slitheen - a decoy routing system for censorship resistance
- * Copyright (C) 2017 Cecylia Bocovich (cbocovic@uwaterloo.ca)
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, version 3.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- * Additional permission under GNU GPL version 3 section 7
- *
- * If you modify this Program, or any covered work, by linking or combining
- * it with the OpenSSL library (or a modified version of that library),
- * containing parts covered by the terms of the OpenSSL Licence and the
- * SSLeay license, the licensors of this Program grant you additional
- * permission to convey the resulting work. Corresponding Source for a
- * non-source form of such a combination shall include the source code
- * for the parts of the OpenSSL library used as well as that of the covered
- * work.
- */
- #include <pcap.h>
- #include "packet.h"
- #include "util.h"
- /** This function extracts the ip, tcp, and tls record headers
- * from a received packet (if they exist), and put them in
- * a packet_info struct
- */
- void extract_packet_headers(uint8_t *packet, struct packet_info *info){
- /* First fill in IP header */
- uint8_t *p = packet;
- p += ETHER_HEADER_LEN; //skip ethernet header
- info->ip_hdr = (struct ip_header*) p;
- info->size_ip_hdr = IP_HEADER_LEN(info->ip_hdr);
- /* Verify this is an IP packet */
- if( (info->ip_hdr->versionihl >>4) != 4){
- info->ip_hdr = NULL;
- info->size_ip_hdr = 0;
- info->tcp_hdr = NULL;
- info->size_tcp_hdr = 0;
- info->record_hdr = NULL;
- return;
- }
- /* If this is a TCP segment, fill in TCP header */
- if (info->ip_hdr->proto == IPPROTO_TCP){
- p += info->size_ip_hdr; //skip IP header
- info->tcp_hdr = (struct tcp_header*) p;
- info->size_tcp_hdr = TCP_HEADER_LEN(info->tcp_hdr);
- p += info->size_tcp_hdr;
- } else {
- info->tcp_hdr = NULL;
- info->size_tcp_hdr = 0;
- info->record_hdr = NULL;
- return;
- }
- /* If the application data contains a TLS record, fill in hdr */
- info->app_data_len = htons(info->ip_hdr->len) - (info->size_ip_hdr + info->size_tcp_hdr);
- if(info->app_data_len > 0){
- info->app_data = p;
- info->record_hdr = (struct tls_header*) p;
- //check to see if this is a valid record
- if((info->record_hdr->type < 0x14) || (info->record_hdr->type > 0x18)){
- info->record_hdr = NULL;
- }
- } else {
- info->record_hdr = NULL;
- info->app_data = NULL;
- }
- return;
- }
- /** Copies a packet_info structure and returns a pointer to the duplicate.
- */
- struct packet_info *copy_packet_info(struct packet_info *src_info){
- struct packet_info *dst_info = emalloc(sizeof(struct packet_info));
- dst_info->ip_hdr = src_info->ip_hdr;
- dst_info->tcp_hdr = src_info->tcp_hdr;
- dst_info->size_tcp_hdr = src_info->size_tcp_hdr;
- dst_info->size_ip_hdr = src_info->size_ip_hdr;
- dst_info->app_data = src_info->app_data;
- dst_info->app_data_len = src_info->app_data_len;
- return dst_info;
- }
- /*
- * Injects a packet back out the opposite interface
- */
- void inject_packet(struct inject_args *iargs, const struct pcap_pkthdr *header, uint8_t *packet){
- pcap_t *handle = iargs->write_dev;
- //write back out to the MAC ADDR it came in on
- //memmove(packet, packet+ETHER_ADDR_LEN, ETHER_ADDR_LEN);
- //memcpy(packet+ETHER_ADDR_LEN, iargs->mac_addr, ETHER_ADDR_LEN);
- if((pcap_inject(handle, packet, header->len)) < 0 ){
- fprintf(stderr, "Error: %s\n", pcap_geterr(handle));
- printf("Length: %d\n", header->len);
- }
- #ifdef DEBUG_EXTRA
- fprintf(stderr, "injected the following packet:\n");
- for(int i=0; i< header->len; i++){
- fprintf(stderr, "%02x ", packet[i]);
- }
- fprintf(stderr, "\n");
- #endif
- free(packet);
- }
|