2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2020-05-25 16:57:04 +01:00
|
|
|
|
|
|
|
package packet
|
|
|
|
|
|
|
|
import (
|
2020-06-04 23:42:44 +01:00
|
|
|
"bytes"
|
2022-12-22 20:51:06 +00:00
|
|
|
"encoding/hex"
|
2022-07-26 04:55:44 +01:00
|
|
|
"net/netip"
|
2020-06-04 23:42:44 +01:00
|
|
|
"reflect"
|
2022-12-22 20:51:06 +00:00
|
|
|
"strings"
|
2020-05-25 16:57:04 +01:00
|
|
|
"testing"
|
2022-12-22 20:51:06 +00:00
|
|
|
"unicode"
|
2020-11-10 09:00:35 +00:00
|
|
|
|
2021-10-28 00:21:44 +01:00
|
|
|
"tailscale.com/tstest"
|
2021-03-21 04:45:47 +00:00
|
|
|
"tailscale.com/types/ipproto"
|
2022-12-22 20:51:06 +00:00
|
|
|
"tailscale.com/util/must"
|
2021-03-21 04:45:47 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
Unknown = ipproto.Unknown
|
|
|
|
TCP = ipproto.TCP
|
|
|
|
UDP = ipproto.UDP
|
|
|
|
SCTP = ipproto.SCTP
|
|
|
|
IGMP = ipproto.IGMP
|
|
|
|
ICMPv4 = ipproto.ICMPv4
|
|
|
|
ICMPv6 = ipproto.ICMPv6
|
|
|
|
TSMP = ipproto.TSMP
|
|
|
|
Fragment = ipproto.Fragment
|
2020-05-25 16:57:04 +01:00
|
|
|
)
|
|
|
|
|
all: convert more code to use net/netip directly
perl -i -npe 's,netaddr.IPPrefixFrom,netip.PrefixFrom,' $(git grep -l -F netaddr.)
perl -i -npe 's,netaddr.IPPortFrom,netip.AddrPortFrom,' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPrefix,netip.Prefix,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPPort,netip.AddrPort,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IP\b,netip.Addr,g' $(git grep -l -F netaddr. )
perl -i -npe 's,netaddr.IPv6Raw\b,netip.AddrFrom16,g' $(git grep -l -F netaddr. )
goimports -w .
Then delete some stuff from the net/netaddr shim package which is no
longer neeed.
Updates #5162
Change-Id: Ia7a86893fe21c7e3ee1ec823e8aba288d4566cd8
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
2022-07-26 05:14:09 +01:00
|
|
|
func mustIPPort(s string) netip.AddrPort {
|
2022-07-26 04:55:44 +01:00
|
|
|
ipp, err := netip.ParseAddrPort(s)
|
2020-11-10 09:00:35 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-12-20 00:43:25 +00:00
|
|
|
return ipp
|
2020-11-10 09:00:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var icmp4RequestBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x00, 0x00, 0x27, 0xde, 0xad, 0x00, 0x00, 0x40, 0x01, 0x8c, 0x15,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
// ICMP header
|
|
|
|
0x08, 0x00, 0x7d, 0x22,
|
|
|
|
// "request_payload"
|
|
|
|
0x72, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var icmp4RequestDecode = Parsed{
|
|
|
|
b: icmp4RequestBuffer,
|
2020-06-04 23:42:44 +01:00
|
|
|
subofs: 20,
|
|
|
|
dataofs: 24,
|
2020-11-10 09:00:35 +00:00
|
|
|
length: len(icmp4RequestBuffer),
|
2020-06-04 23:42:44 +01:00
|
|
|
|
2020-07-29 00:02:15 +01:00
|
|
|
IPVersion: 4,
|
2020-11-10 09:00:35 +00:00
|
|
|
IPProto: ICMPv4,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("1.2.3.4:0"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:0"),
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var icmp4ReplyBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
0x45, 0x00, 0x00, 0x25, 0x21, 0x52, 0x00, 0x00, 0x40, 0x01, 0x49, 0x73,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
|
|
|
// ICMP header
|
|
|
|
0x00, 0x00, 0xe6, 0x9e,
|
|
|
|
// "reply_payload"
|
|
|
|
0x72, 0x65, 0x70, 0x6c, 0x79, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
// ICMPv6 Router Solicitation
|
|
|
|
var icmp6PacketBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
0x60, 0x00, 0x00, 0x00, 0x00, 0x08, 0x3a, 0xff,
|
|
|
|
0xfe, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
0xfb, 0x57, 0x1d, 0xea, 0x9c, 0x39, 0x8f, 0xb7,
|
|
|
|
0xff, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02,
|
|
|
|
0x85, 0x00, 0x38, 0x04, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var icmp6PacketDecode = Parsed{
|
|
|
|
b: icmp6PacketBuffer,
|
|
|
|
subofs: 40,
|
|
|
|
dataofs: 44,
|
|
|
|
length: len(icmp6PacketBuffer),
|
2020-07-29 00:02:15 +01:00
|
|
|
IPVersion: 6,
|
|
|
|
IPProto: ICMPv6,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("[fe80::fb57:1dea:9c39:8fb7]:0"),
|
|
|
|
Dst: mustIPPort("[ff02::2]:0"),
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// This is a malformed IPv4 packet.
|
|
|
|
// Namely, the string "tcp_payload" follows the first byte of the IPv4 header.
|
|
|
|
var unknownPacketBuffer = []byte{
|
|
|
|
0x45, 0x74, 0x63, 0x70, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2020-11-10 07:49:09 +00:00
|
|
|
var unknownPacketDecode = Parsed{
|
2020-07-29 00:02:15 +01:00
|
|
|
b: unknownPacketBuffer,
|
|
|
|
IPVersion: 0,
|
|
|
|
IPProto: Unknown,
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var tcp4PacketBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x00, 0x00, 0x37, 0xde, 0xad, 0x00, 0x00, 0x40, 0x06, 0x49, 0x5f,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
// TCP header with SYN, ACK set
|
|
|
|
0x00, 0x7b, 0x02, 0x37, 0x00, 0x00, 0x12, 0x34, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
0x50, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
// "request_payload"
|
|
|
|
0x72, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var tcp4PacketDecode = Parsed{
|
|
|
|
b: tcp4PacketBuffer,
|
2020-06-04 23:42:44 +01:00
|
|
|
subofs: 20,
|
|
|
|
dataofs: 40,
|
2020-11-10 09:00:35 +00:00
|
|
|
length: len(tcp4PacketBuffer),
|
2020-06-04 23:42:44 +01:00
|
|
|
|
2020-07-29 00:02:15 +01:00
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: TCP,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("1.2.3.4:123"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:567"),
|
2020-07-29 00:02:15 +01:00
|
|
|
TCPFlags: TCPSynAck,
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var tcp6RequestBuffer = []byte{
|
|
|
|
// IPv6 header up to hop limit
|
|
|
|
0x60, 0x06, 0xef, 0xcc, 0x00, 0x28, 0x06, 0x40,
|
|
|
|
// Src addr
|
|
|
|
0x20, 0x01, 0x05, 0x59, 0xbc, 0x13, 0x54, 0x00, 0x17, 0x49, 0x46, 0x28, 0x39, 0x34, 0x0e, 0x1b,
|
|
|
|
// Dst addr
|
|
|
|
0x26, 0x07, 0xf8, 0xb0, 0x40, 0x0a, 0x08, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x0e,
|
|
|
|
// TCP SYN segment, no payload
|
|
|
|
0xa4, 0x60, 0x00, 0x50, 0xf3, 0x82, 0xa1, 0x25, 0x00, 0x00, 0x00, 0x00, 0xa0, 0x02, 0xfd, 0x20,
|
|
|
|
0xb1, 0xc6, 0x00, 0x00, 0x02, 0x04, 0x05, 0xa0, 0x04, 0x02, 0x08, 0x0a, 0xca, 0x76, 0xa6, 0x8e,
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x01, 0x03, 0x03, 0x07,
|
|
|
|
}
|
|
|
|
|
|
|
|
var tcp6RequestDecode = Parsed{
|
|
|
|
b: tcp6RequestBuffer,
|
|
|
|
subofs: 40,
|
|
|
|
dataofs: len(tcp6RequestBuffer),
|
|
|
|
length: len(tcp6RequestBuffer),
|
|
|
|
|
|
|
|
IPVersion: 6,
|
|
|
|
IPProto: TCP,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("[2001:559:bc13:5400:1749:4628:3934:e1b]:42080"),
|
|
|
|
Dst: mustIPPort("[2607:f8b0:400a:809::200e]:80"),
|
2020-11-10 09:00:35 +00:00
|
|
|
TCPFlags: TCPSyn,
|
|
|
|
}
|
|
|
|
|
|
|
|
var udp4RequestBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x00, 0x00, 0x2b, 0xde, 0xad, 0x00, 0x00, 0x40, 0x11, 0x8c, 0x01,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
// UDP header
|
|
|
|
0x00, 0x7b, 0x02, 0x37, 0x00, 0x17, 0x72, 0x1d,
|
|
|
|
// "request_payload"
|
|
|
|
0x72, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var udp4RequestDecode = Parsed{
|
|
|
|
b: udp4RequestBuffer,
|
2020-06-04 23:42:44 +01:00
|
|
|
subofs: 20,
|
|
|
|
dataofs: 28,
|
2020-11-10 09:00:35 +00:00
|
|
|
length: len(udp4RequestBuffer),
|
2020-06-04 23:42:44 +01:00
|
|
|
|
2020-07-29 00:02:15 +01:00
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: UDP,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("1.2.3.4:123"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:567"),
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
2020-11-11 03:10:11 +00:00
|
|
|
var invalid4RequestBuffer = []byte{
|
|
|
|
// IP header up to checksum. IHL field points beyond end of packet.
|
|
|
|
0x4a, 0x00, 0x00, 0x14, 0xde, 0xad, 0x00, 0x00, 0x40, 0x11, 0x8c, 0x01,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-11-11 03:10:11 +00:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-11-11 03:10:11 +00:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Regression check for the IHL field pointing beyond the end of the
|
|
|
|
// packet.
|
|
|
|
var invalid4RequestDecode = Parsed{
|
|
|
|
b: invalid4RequestBuffer,
|
|
|
|
subofs: 40,
|
|
|
|
length: len(invalid4RequestBuffer),
|
|
|
|
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: Unknown,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("1.2.3.4:0"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:0"),
|
2020-11-11 03:10:11 +00:00
|
|
|
}
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
var udp6RequestBuffer = []byte{
|
|
|
|
// IPv6 header up to hop limit
|
|
|
|
0x60, 0x0e, 0xc9, 0x67, 0x00, 0x29, 0x11, 0x40,
|
|
|
|
// Src addr
|
|
|
|
0x20, 0x01, 0x05, 0x59, 0xbc, 0x13, 0x54, 0x00, 0x17, 0x49, 0x46, 0x28, 0x39, 0x34, 0x0e, 0x1b,
|
|
|
|
// Dst addr
|
|
|
|
0x26, 0x07, 0xf8, 0xb0, 0x40, 0x0a, 0x08, 0x09, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x0e,
|
|
|
|
// UDP header
|
|
|
|
0xd4, 0x04, 0x01, 0xbb, 0x00, 0x29, 0x96, 0x84,
|
|
|
|
// Payload
|
|
|
|
0x5c, 0x06, 0xae, 0x85, 0x02, 0xf5, 0xdb, 0x90, 0xe0, 0xe0, 0x93, 0xed, 0x9a, 0xd9, 0x92, 0x69, 0xbe, 0x36, 0x8a, 0x7d, 0xd7, 0xce, 0xd0, 0x8a, 0xf2, 0x51, 0x95, 0xff, 0xb6, 0x92, 0x70, 0x10, 0xd7,
|
|
|
|
}
|
|
|
|
|
|
|
|
var udp6RequestDecode = Parsed{
|
|
|
|
b: udp6RequestBuffer,
|
|
|
|
subofs: 40,
|
|
|
|
dataofs: 48,
|
|
|
|
length: len(udp6RequestBuffer),
|
|
|
|
|
|
|
|
IPVersion: 6,
|
|
|
|
IPProto: UDP,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("[2001:559:bc13:5400:1749:4628:3934:e1b]:54276"),
|
|
|
|
Dst: mustIPPort("[2607:f8b0:400a:809::200e]:443"),
|
2020-11-10 09:00:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
var udp4ReplyBuffer = []byte{
|
2020-06-04 23:42:44 +01:00
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x00, 0x00, 0x29, 0x21, 0x52, 0x00, 0x00, 0x40, 0x11, 0x49, 0x5f,
|
2022-09-22 19:08:28 +01:00
|
|
|
// source IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x05, 0x06, 0x07, 0x08,
|
2022-09-22 19:08:28 +01:00
|
|
|
// destination IP
|
2020-06-04 23:42:44 +01:00
|
|
|
0x01, 0x02, 0x03, 0x04,
|
|
|
|
// UDP header
|
|
|
|
0x02, 0x37, 0x00, 0x7b, 0x00, 0x15, 0xd3, 0x9d,
|
|
|
|
// "reply_payload"
|
|
|
|
0x72, 0x65, 0x70, 0x6c, 0x79, 0x5f, 0x70, 0x61, 0x79, 0x6c, 0x6f, 0x61, 0x64,
|
|
|
|
}
|
|
|
|
|
2022-09-22 19:08:28 +01:00
|
|
|
// First TCP fragment of a packet with leading 24 bytes of 'a's
|
|
|
|
var tcp4MediumFragmentBuffer = []byte{
|
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x20, 0x00, 0x4c, 0x2c, 0x62, 0x20, 0x00, 0x22, 0x06, 0x3a, 0x0f,
|
|
|
|
// source IP
|
|
|
|
0x01, 0x02, 0x03, 0x04,
|
|
|
|
// destination IP
|
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
// TCP header
|
|
|
|
0x00, 0x50, 0xf3, 0x8c, 0x58, 0xad, 0x60, 0x94, 0x25, 0xe4, 0x23, 0xa8, 0x80,
|
|
|
|
0x10, 0x01, 0xfd, 0xc6, 0x6e, 0x00, 0x00, 0x01, 0x01, 0x08, 0x0a, 0xff, 0x60,
|
|
|
|
0xfb, 0xfe, 0xba, 0x31, 0x78, 0x6a,
|
|
|
|
// data
|
|
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
|
|
0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61, 0x61,
|
|
|
|
}
|
|
|
|
|
|
|
|
var tcp4MediumFragmentDecode = Parsed{
|
|
|
|
b: tcp4MediumFragmentBuffer,
|
|
|
|
subofs: 20,
|
|
|
|
dataofs: 52,
|
|
|
|
length: len(tcp4MediumFragmentBuffer),
|
|
|
|
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: TCP,
|
|
|
|
Src: mustIPPort("1.2.3.4:80"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:62348"),
|
|
|
|
TCPFlags: 0x10,
|
|
|
|
}
|
|
|
|
|
|
|
|
var tcp4ShortFragmentBuffer = []byte{
|
|
|
|
// IP header up to checksum
|
|
|
|
0x45, 0x20, 0x00, 0x1e, 0x2c, 0x62, 0x20, 0x00, 0x22, 0x06, 0x3c, 0x4f,
|
|
|
|
// source IP
|
|
|
|
0x01, 0x02, 0x03, 0x04,
|
|
|
|
// destination IP
|
|
|
|
0x05, 0x06, 0x07, 0x08,
|
|
|
|
// partial TCP header
|
|
|
|
0x00, 0x50, 0xf3, 0x8c, 0x58, 0xad, 0x60, 0x94, 0x00, 0x00,
|
|
|
|
}
|
|
|
|
|
|
|
|
var tcp4ShortFragmentDecode = Parsed{
|
|
|
|
b: tcp4ShortFragmentBuffer,
|
|
|
|
subofs: 20,
|
|
|
|
dataofs: 0,
|
|
|
|
length: len(tcp4ShortFragmentBuffer),
|
|
|
|
// short fragments are rejected (marked unknown) to avoid header attacks as described in RFC 1858
|
|
|
|
IPProto: ipproto.Unknown,
|
|
|
|
IPVersion: 4,
|
|
|
|
Src: mustIPPort("1.2.3.4:0"),
|
|
|
|
Dst: mustIPPort("5.6.7.8:0"),
|
|
|
|
}
|
|
|
|
|
2020-11-11 07:23:17 +00:00
|
|
|
var igmpPacketBuffer = []byte{
|
|
|
|
// IP header up to checksum
|
|
|
|
0x46, 0xc0, 0x00, 0x20, 0x00, 0x00, 0x40, 0x00, 0x01, 0x02, 0x41, 0x22,
|
|
|
|
// source IP
|
|
|
|
0xc0, 0xa8, 0x01, 0x52,
|
|
|
|
// destination IP
|
|
|
|
0xe0, 0x00, 0x00, 0xfb,
|
|
|
|
// IGMP Membership Report
|
|
|
|
0x94, 0x04, 0x00, 0x00, 0x16, 0x00, 0x09, 0x04, 0xe0, 0x00, 0x00, 0xfb,
|
|
|
|
//0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
}
|
|
|
|
|
|
|
|
var igmpPacketDecode = Parsed{
|
|
|
|
b: igmpPacketBuffer,
|
|
|
|
subofs: 24,
|
|
|
|
length: len(igmpPacketBuffer),
|
|
|
|
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: IGMP,
|
2020-12-20 00:43:25 +00:00
|
|
|
Src: mustIPPort("192.168.1.82:0"),
|
|
|
|
Dst: mustIPPort("224.0.0.251:0"),
|
2020-11-11 07:23:17 +00:00
|
|
|
}
|
|
|
|
|
2021-01-12 20:03:41 +00:00
|
|
|
var ipv4TSMPBuffer = []byte{
|
|
|
|
// IPv4 header:
|
|
|
|
0x45, 0x00,
|
|
|
|
0x00, 0x1b, // 20 + 7 bytes total
|
|
|
|
0x00, 0x00, // ID
|
|
|
|
0x00, 0x00, // Fragment
|
|
|
|
0x40, // TTL
|
|
|
|
byte(TSMP),
|
|
|
|
0x5f, 0xc3, // header checksum (wrong here)
|
|
|
|
// source IP:
|
|
|
|
0x64, 0x5e, 0x0c, 0x0e,
|
|
|
|
// dest IP:
|
|
|
|
0x64, 0x4a, 0x46, 0x03,
|
|
|
|
byte(TSMPTypeRejectedConn),
|
|
|
|
byte(TCP),
|
|
|
|
byte(RejectedDueToACLs),
|
|
|
|
0x00, 123, // src port
|
|
|
|
0x00, 80, // dst port
|
|
|
|
}
|
|
|
|
|
|
|
|
var ipv4TSMPDecode = Parsed{
|
|
|
|
b: ipv4TSMPBuffer,
|
|
|
|
subofs: 20,
|
|
|
|
dataofs: 20,
|
|
|
|
length: 27,
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: TSMP,
|
|
|
|
Src: mustIPPort("100.94.12.14:0"),
|
|
|
|
Dst: mustIPPort("100.74.70.3:0"),
|
|
|
|
}
|
|
|
|
|
2021-03-20 04:05:51 +00:00
|
|
|
// IPv4 SCTP
|
|
|
|
var sctpBuffer = []byte{
|
|
|
|
// IPv4 header:
|
|
|
|
0x45, 0x00,
|
|
|
|
0x00, 0x20, // 20 + 12 bytes total
|
|
|
|
0x00, 0x00, // ID
|
|
|
|
0x00, 0x00, // Fragment
|
|
|
|
0x40, // TTL
|
|
|
|
byte(SCTP),
|
|
|
|
// Checksum, unchecked:
|
|
|
|
1, 2,
|
|
|
|
// source IP:
|
|
|
|
0x64, 0x5e, 0x0c, 0x0e,
|
|
|
|
// dest IP:
|
|
|
|
0x64, 0x4a, 0x46, 0x03,
|
|
|
|
// Src Port, Dest Port:
|
|
|
|
0x00, 0x7b, 0x01, 0xc8,
|
|
|
|
// Verification tag:
|
|
|
|
1, 2, 3, 4,
|
|
|
|
// Checksum: (unchecked)
|
|
|
|
5, 6, 7, 8,
|
|
|
|
}
|
|
|
|
|
|
|
|
var sctpDecode = Parsed{
|
|
|
|
b: sctpBuffer,
|
|
|
|
subofs: 20,
|
|
|
|
length: 20 + 12,
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: SCTP,
|
|
|
|
Src: mustIPPort("100.94.12.14:123"),
|
|
|
|
Dst: mustIPPort("100.74.70.3:456"),
|
|
|
|
}
|
|
|
|
|
2021-01-12 20:03:41 +00:00
|
|
|
func TestParsedString(t *testing.T) {
|
2020-06-04 23:42:44 +01:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
2020-11-10 07:49:09 +00:00
|
|
|
qdecode Parsed
|
2020-06-04 23:42:44 +01:00
|
|
|
want string
|
|
|
|
}{
|
2020-11-10 09:00:35 +00:00
|
|
|
{"tcp4", tcp4PacketDecode, "TCP{1.2.3.4:123 > 5.6.7.8:567}"},
|
|
|
|
{"tcp6", tcp6RequestDecode, "TCP{[2001:559:bc13:5400:1749:4628:3934:e1b]:42080 > [2607:f8b0:400a:809::200e]:80}"},
|
|
|
|
{"udp4", udp4RequestDecode, "UDP{1.2.3.4:123 > 5.6.7.8:567}"},
|
|
|
|
{"udp6", udp6RequestDecode, "UDP{[2001:559:bc13:5400:1749:4628:3934:e1b]:54276 > [2607:f8b0:400a:809::200e]:443}"},
|
|
|
|
{"icmp4", icmp4RequestDecode, "ICMPv4{1.2.3.4:0 > 5.6.7.8:0}"},
|
|
|
|
{"icmp6", icmp6PacketDecode, "ICMPv6{[fe80::fb57:1dea:9c39:8fb7]:0 > [ff02::2]:0}"},
|
2020-11-11 07:23:17 +00:00
|
|
|
{"igmp", igmpPacketDecode, "IGMP{192.168.1.82:0 > 224.0.0.251:0}"},
|
2020-06-04 23:42:44 +01:00
|
|
|
{"unknown", unknownPacketDecode, "Unknown{???}"},
|
2021-01-12 20:03:41 +00:00
|
|
|
{"ipv4_tsmp", ipv4TSMPDecode, "TSMP{100.94.12.14:0 > 100.74.70.3:0}"},
|
2021-03-20 04:05:51 +00:00
|
|
|
{"sctp", sctpDecode, "SCTP{100.94.12.14:123 > 100.74.70.3:456}"},
|
2020-05-25 16:57:04 +01:00
|
|
|
}
|
2020-06-04 23:42:44 +01:00
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
got := tt.qdecode.String()
|
|
|
|
if got != tt.want {
|
|
|
|
t.Errorf("got %q; want %q", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
2020-05-25 16:57:04 +01:00
|
|
|
}
|
|
|
|
|
2021-10-28 00:21:44 +01:00
|
|
|
err := tstest.MinAllocsPerRun(t, 1, func() {
|
2021-05-18 20:46:10 +01:00
|
|
|
sinkString = tests[0].qdecode.String()
|
2020-05-25 16:57:04 +01:00
|
|
|
})
|
2021-10-28 00:21:44 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
2020-05-25 16:57:04 +01:00
|
|
|
}
|
|
|
|
}
|
2020-06-04 23:42:44 +01:00
|
|
|
|
2022-12-22 20:51:06 +00:00
|
|
|
// mustHexDecode is like hex.DecodeString, but panics on error
|
2023-01-14 20:59:47 +00:00
|
|
|
// and ignores whitespace in s.
|
2022-12-22 20:51:06 +00:00
|
|
|
func mustHexDecode(s string) []byte {
|
|
|
|
return must.Get(hex.DecodeString(strings.Map(func(r rune) rune {
|
|
|
|
if unicode.IsSpace(r) {
|
|
|
|
return -1
|
|
|
|
}
|
|
|
|
return r
|
|
|
|
}, s)))
|
|
|
|
}
|
|
|
|
|
2020-06-04 23:42:44 +01:00
|
|
|
func TestDecode(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
buf []byte
|
2020-11-10 07:49:09 +00:00
|
|
|
want Parsed
|
2020-06-04 23:42:44 +01:00
|
|
|
}{
|
2020-11-10 09:00:35 +00:00
|
|
|
{"icmp4", icmp4RequestBuffer, icmp4RequestDecode},
|
|
|
|
{"icmp6", icmp6PacketBuffer, icmp6PacketDecode},
|
|
|
|
{"tcp4", tcp4PacketBuffer, tcp4PacketDecode},
|
|
|
|
{"tcp6", tcp6RequestBuffer, tcp6RequestDecode},
|
|
|
|
{"udp4", udp4RequestBuffer, udp4RequestDecode},
|
|
|
|
{"udp6", udp6RequestBuffer, udp6RequestDecode},
|
2020-11-11 07:23:17 +00:00
|
|
|
{"igmp", igmpPacketBuffer, igmpPacketDecode},
|
2020-11-11 03:10:11 +00:00
|
|
|
{"unknown", unknownPacketBuffer, unknownPacketDecode},
|
|
|
|
{"invalid4", invalid4RequestBuffer, invalid4RequestDecode},
|
2021-01-12 20:03:41 +00:00
|
|
|
{"ipv4_tsmp", ipv4TSMPBuffer, ipv4TSMPDecode},
|
2021-03-20 04:05:51 +00:00
|
|
|
{"ipv4_sctp", sctpBuffer, sctpDecode},
|
2022-09-22 19:08:28 +01:00
|
|
|
{"ipv4_frag", tcp4MediumFragmentBuffer, tcp4MediumFragmentDecode},
|
|
|
|
{"ipv4_fragtooshort", tcp4ShortFragmentBuffer, tcp4ShortFragmentDecode},
|
2022-12-22 20:51:06 +00:00
|
|
|
|
|
|
|
{"ip97", mustHexDecode("4500 0019 d186 4000 4061 751d 644a 4603 6449 e549 6865 6c6c 6f"), Parsed{
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: 97,
|
|
|
|
Src: netip.MustParseAddrPort("100.74.70.3:0"),
|
|
|
|
Dst: netip.MustParseAddrPort("100.73.229.73:0"),
|
|
|
|
b: mustHexDecode("4500 0019 d186 4000 4061 751d 644a 4603 6449 e549 6865 6c6c 6f"),
|
|
|
|
length: 25,
|
|
|
|
subofs: 20,
|
|
|
|
}},
|
|
|
|
|
|
|
|
// This packet purports to use protocol 0xFF, which is verboten and
|
|
|
|
// used internally as a sentinel value for fragments. So test that
|
|
|
|
// we map packets using 0xFF to Unknown (0) instead.
|
|
|
|
{"bogus_proto_ff", mustHexDecode("4500 0019 d186 4000 40" + "FF" /* bogus FF */ + " 751d 644a 4603 6449 e549 6865 6c6c 6f"), Parsed{
|
|
|
|
IPVersion: 4,
|
|
|
|
IPProto: ipproto.Unknown, // 0, not bogus 0xFF
|
|
|
|
Src: netip.MustParseAddrPort("100.74.70.3:0"),
|
|
|
|
Dst: netip.MustParseAddrPort("100.73.229.73:0"),
|
|
|
|
b: mustHexDecode("4500 0019 d186 4000 40" + "FF" /* bogus FF */ + " 751d 644a 4603 6449 e549 6865 6c6c 6f"),
|
|
|
|
length: 25,
|
|
|
|
subofs: 20,
|
|
|
|
}},
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2020-11-10 07:49:09 +00:00
|
|
|
var got Parsed
|
2020-06-04 23:42:44 +01:00
|
|
|
got.Decode(tt.buf)
|
|
|
|
if !reflect.DeepEqual(got, tt.want) {
|
2021-01-12 20:03:41 +00:00
|
|
|
t.Errorf("mismatch\n got: %s %#v\nwant: %s %#v", got.String(), got, tt.want.String(), tt.want)
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-10-28 00:21:44 +01:00
|
|
|
err := tstest.MinAllocsPerRun(t, 0, func() {
|
2020-11-10 07:49:09 +00:00
|
|
|
var got Parsed
|
2020-06-04 23:42:44 +01:00
|
|
|
got.Decode(tests[0].buf)
|
|
|
|
})
|
2021-10-28 00:21:44 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkDecode(b *testing.B) {
|
|
|
|
benches := []struct {
|
|
|
|
name string
|
|
|
|
buf []byte
|
|
|
|
}{
|
2020-11-10 09:00:35 +00:00
|
|
|
{"tcp4", tcp4PacketBuffer},
|
|
|
|
{"tcp6", tcp6RequestBuffer},
|
|
|
|
{"udp4", udp4RequestBuffer},
|
|
|
|
{"udp6", udp6RequestBuffer},
|
|
|
|
{"icmp4", icmp4RequestBuffer},
|
|
|
|
{"icmp6", icmp6PacketBuffer},
|
2020-11-11 07:23:17 +00:00
|
|
|
{"igmp", igmpPacketBuffer},
|
2020-06-04 23:42:44 +01:00
|
|
|
{"unknown", unknownPacketBuffer},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, bench := range benches {
|
|
|
|
b.Run(bench.name, func(b *testing.B) {
|
2020-11-10 10:19:04 +00:00
|
|
|
b.ReportAllocs()
|
2024-04-16 21:15:13 +01:00
|
|
|
for range b.N {
|
2020-11-10 07:49:09 +00:00
|
|
|
var p Parsed
|
2020-06-04 23:42:44 +01:00
|
|
|
p.Decode(bench.buf)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMarshalRequest(t *testing.T) {
|
|
|
|
// Too small to hold our packets, but only barely.
|
|
|
|
var small [20]byte
|
|
|
|
var large [64]byte
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
icmpHeader := icmp4RequestDecode.ICMP4Header()
|
|
|
|
udpHeader := udp4RequestDecode.UDP4Header()
|
2020-06-04 23:42:44 +01:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
header Header
|
|
|
|
want []byte
|
|
|
|
}{
|
2020-11-10 09:00:35 +00:00
|
|
|
{"icmp", &icmpHeader, icmp4RequestBuffer},
|
|
|
|
{"udp", &udpHeader, udp4RequestBuffer},
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
err := tt.header.Marshal(small[:])
|
|
|
|
if err != errSmallBuffer {
|
|
|
|
t.Errorf("got err: nil; want: %s", errSmallBuffer)
|
|
|
|
}
|
|
|
|
|
|
|
|
dataOffset := tt.header.Len()
|
|
|
|
dataLength := copy(large[dataOffset:], []byte("request_payload"))
|
|
|
|
end := dataOffset + dataLength
|
|
|
|
err = tt.header.Marshal(large[:end])
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("got err: %s; want nil", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(large[:end], tt.want) {
|
|
|
|
t.Errorf("got %x; want %x", large[:end], tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMarshalResponse(t *testing.T) {
|
|
|
|
var buf [64]byte
|
|
|
|
|
2020-11-10 09:00:35 +00:00
|
|
|
icmpHeader := icmp4RequestDecode.ICMP4Header()
|
|
|
|
udpHeader := udp4RequestDecode.UDP4Header()
|
2020-06-04 23:42:44 +01:00
|
|
|
|
2021-01-12 20:03:41 +00:00
|
|
|
type HeaderToResponser interface {
|
|
|
|
Header
|
|
|
|
// ToResponse transforms the header into one for a response packet.
|
|
|
|
// For instance, this swaps the source and destination IPs.
|
|
|
|
ToResponse()
|
|
|
|
}
|
|
|
|
|
2020-06-04 23:42:44 +01:00
|
|
|
tests := []struct {
|
|
|
|
name string
|
2021-01-12 20:03:41 +00:00
|
|
|
header HeaderToResponser
|
2020-06-04 23:42:44 +01:00
|
|
|
want []byte
|
|
|
|
}{
|
2020-11-10 09:00:35 +00:00
|
|
|
{"icmp", &icmpHeader, icmp4ReplyBuffer},
|
|
|
|
{"udp", &udpHeader, udp4ReplyBuffer},
|
2020-06-04 23:42:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
tt.header.ToResponse()
|
|
|
|
|
|
|
|
dataOffset := tt.header.Len()
|
|
|
|
dataLength := copy(buf[dataOffset:], []byte("reply_payload"))
|
|
|
|
end := dataOffset + dataLength
|
|
|
|
err := tt.header.Marshal(buf[:end])
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("got err: %s; want nil", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(buf[:end], tt.want) {
|
|
|
|
t.Errorf("got %x; want %x", buf[:end], tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2021-05-18 20:46:10 +01:00
|
|
|
|
|
|
|
var sinkString string
|
|
|
|
|
|
|
|
func BenchmarkString(b *testing.B) {
|
|
|
|
benches := []struct {
|
|
|
|
name string
|
|
|
|
buf []byte
|
|
|
|
}{
|
|
|
|
{"tcp4", tcp4PacketBuffer},
|
|
|
|
{"tcp6", tcp6RequestBuffer},
|
|
|
|
{"udp4", udp4RequestBuffer},
|
|
|
|
{"udp6", udp6RequestBuffer},
|
|
|
|
{"icmp4", icmp4RequestBuffer},
|
|
|
|
{"icmp6", icmp6PacketBuffer},
|
|
|
|
{"igmp", igmpPacketBuffer},
|
|
|
|
{"unknown", unknownPacketBuffer},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, bench := range benches {
|
|
|
|
b.Run(bench.name, func(b *testing.B) {
|
|
|
|
b.ReportAllocs()
|
|
|
|
var p Parsed
|
|
|
|
p.Decode(bench.buf)
|
|
|
|
b.ResetTimer()
|
2024-04-16 21:15:13 +01:00
|
|
|
for range b.N {
|
2021-05-18 20:46:10 +01:00
|
|
|
sinkString = p.String()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|