/* This file is part of NetGuard. NetGuard is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. NetGuard is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with NetGuard. If not, see . Copyright 2015-2016 by Marcel Bokhorst (M66B) */ #include #include #include #include #include #include #include #include #include #include #include #include #include "netguard.h" // #define PROFILE 1 // TODO TCP options // TODO TCP fragmentation // TODO TCP push // TODO TCPv6 // TODO UDPv6 // TODO fix warnings // TODO non blocking send/write, handle EAGAIN/EWOULDBLOCK // Window size < 2^31: x <= y: (uint32_t)(y-x) < 0x80000000 // It is assumed that no packets will get lost and that packets arrive in order // http://journals.ecs.soton.ac.uk/java/tutorial/native1.1/implementing/index.html // Global variables static JavaVM *jvm; pthread_t thread_id; int signaled = 0; struct udp_session *udp_session = NULL; struct tcp_session *tcp_session = NULL; int loglevel = 0; char *pcap_fn = NULL; // JNI JNIEXPORT void JNICALL Java_eu_faircode_netguard_SinkholeService_jni_1init(JNIEnv *env) { udp_session = NULL; tcp_session = NULL; pcap_fn = NULL; } JNIEXPORT void JNICALL Java_eu_faircode_netguard_SinkholeService_jni_1start( JNIEnv *env, jobject instance, jint tun, jintArray uid_, jboolean log, jboolean filter, jint loglevel_) { loglevel = loglevel_; log_android(ANDROID_LOG_INFO, "Starting tun=%d log %d filter %d level %d", tun, log, filter, loglevel_); // Set blocking uint8_t flags = fcntl(tun, F_GETFL, 0); if (flags < 0 || fcntl(tun, F_SETFL, flags & ~O_NONBLOCK) < 0) log_android(ANDROID_LOG_ERROR, "fcntl tun ~O_NONBLOCK error %d: %s", errno, strerror(errno)); if (pthread_kill(thread_id, 0) == 0) log_android(ANDROID_LOG_WARN, "Already running thread %lu", thread_id); else { jint rs = (*env)->GetJavaVM(env, &jvm); if (rs != JNI_OK) log_android(ANDROID_LOG_ERROR, "GetJavaVM failed"); // Get arguments struct arguments *args = malloc(sizeof(struct arguments)); args->instance = (*env)->NewGlobalRef(env, instance); args->tun = tun; args->count = (*env)->GetArrayLength(env, uid_); args->uid = malloc(args->count * sizeof(jint)); jint *uid = (*env)->GetIntArrayElements(env, uid_, NULL); memcpy(args->uid, uid, args->count * sizeof(jint)); (*env)->ReleaseIntArrayElements(env, uid_, uid, 0); args->log = log; args->filter = filter; for (int i = 0; i < args->count; i++) log_android(ANDROID_LOG_DEBUG, "Allowed uid %d", args->uid[i]); // Start native thread int err = pthread_create(&thread_id, NULL, handle_events, (void *) args); if (err == 0) log_android(ANDROID_LOG_INFO, "Started thread %lu", thread_id); else log_android(ANDROID_LOG_ERROR, "pthread_create error %d: %s", err, strerror(err)); } } JNIEXPORT void JNICALL Java_eu_faircode_netguard_SinkholeService_jni_1stop(JNIEnv *env, jobject instance, jint tun, jboolean clear) { log_android(ANDROID_LOG_INFO, "Stop tun %d clear %d", tun, (int) clear); if (pthread_kill(thread_id, 0) == 0) { log_android(ANDROID_LOG_DEBUG, "Kill thread %lu", thread_id); int err = pthread_kill(thread_id, SIGUSR1); if (err != 0) log_android(ANDROID_LOG_WARN, "pthread_kill error %d: %s", err, strerror(err)); else { log_android(ANDROID_LOG_DEBUG, "Join thread %lu", thread_id); pthread_join(thread_id, NULL); if (err != 0) log_android(ANDROID_LOG_WARN, "pthread_join error %d: %s", err, strerror(err)); } if (clear) clear_sessions(); log_android(ANDROID_LOG_INFO, "Stopped thread %lu", thread_id); } else log_android(ANDROID_LOG_WARN, "Not running"); } JNIEXPORT void JNICALL Java_eu_faircode_netguard_SinkholeService_jni_1done(JNIEnv *env, jobject instance) { log_android(ANDROID_LOG_INFO, "Done"); clear_sessions(); if (pcap_fn != NULL) free(pcap_fn); } JNIEXPORT void JNICALL Java_eu_faircode_netguard_SinkholeService_jni_1pcap(JNIEnv *env, jclass type, jstring name_) { // TODO limit pcap file size // TODO keep pcap file open if (name_ == NULL) { pcap_fn = NULL; log_android(ANDROID_LOG_INFO, "PCAP disabled"); } else { const char *name = (*env)->GetStringUTFChars(env, name_, 0); log_android(ANDROID_LOG_INFO, "PCAP file %s", name); const char *tmp = malloc(strlen(name) + 1); strcpy(tmp, name); pcap_fn = tmp; write_pcap_hdr(); (*env)->ReleaseStringUTFChars(env, name_, name); } } // Private functions void clear_sessions() { struct udp_session *u = udp_session; while (u != NULL) { close(u->socket); struct udp_session *p = u; u = u->next; free(p); } udp_session = NULL; struct tcp_session *t = tcp_session; while (t != NULL) { close(t->socket); struct tcp_session *p = t; t = t->next; free(p); } tcp_session = NULL; } void handle_signal(int sig, siginfo_t *info, void *context) { log_android(ANDROID_LOG_DEBUG, "Signal %d", sig); signaled = 1; } void handle_events(void *a) { fd_set rfds; fd_set wfds; fd_set efds; struct timespec ts; sigset_t blockset; sigset_t emptyset; struct sigaction sa; struct arguments *args = (struct arguments *) a; log_android(ANDROID_LOG_INFO, "Start events tun=%d thread %lu", args->tun, thread_id); // Attach to Java JNIEnv *env; jint rs = (*jvm)->AttachCurrentThread(jvm, &env, NULL); if (rs != JNI_OK) { log_android(ANDROID_LOG_ERROR, "AttachCurrentThread failed"); return; } args->env = env; // Block SIGUSR1 sigemptyset(&blockset); sigaddset(&blockset, SIGUSR1); sigprocmask(SIG_BLOCK, &blockset, NULL); /// Handle SIGUSR1 sa.sa_sigaction = handle_signal; sigemptyset(&sa.sa_mask); sa.sa_flags = SA_RESTART; sigaction(SIGUSR1, &sa, NULL); signaled = 0; // Loop while (1) { log_android(ANDROID_LOG_DEBUG, "Loop thread %lu", thread_id); // Select ts.tv_sec = SELECT_TIMEOUT; ts.tv_nsec = 0; sigemptyset(&emptyset); int max = get_selects(args, &rfds, &wfds, &efds); int ready = pselect(max + 1, &rfds, &wfds, &efds, udp_session == NULL && tcp_session == NULL ? NULL : &ts, &emptyset); if (ready < 0) { if (errno == EINTR) { if (signaled) { ; log_android(ANDROID_LOG_DEBUG, "pselect signaled"); break; } else { log_android(ANDROID_LOG_WARN, "pselect interrupted"); continue; } } else { log_android(ANDROID_LOG_ERROR, "pselect error %d: %s", errno, strerror(errno)); break; } } // Count sessions int us = 0; struct udp_session *u = udp_session; while (u != NULL) { us++; u = u->next; } int ts = 0; struct tcp_session *t = tcp_session; while (t != NULL) { ts++; t = t->next; } if (ready == 0) log_android(ANDROID_LOG_DEBUG, "pselect timeout udp %d tcp %d", us, ts); else { log_android(ANDROID_LOG_DEBUG, "pselect udp %d tcp %d ready %d", us, ts, ready); #ifdef PROFILE struct timeval start, end; float mselapsed; gettimeofday(&start, NULL); #endif // Check upstream if (check_tun(args, &rfds, &wfds, &efds) < 0) break; #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "tun %f", mselapsed); gettimeofday(&start, NULL); #endif // Check UDP downstream check_udp_sockets(args, &rfds, &wfds, &efds); // Check TCP downstream check_tcp_sockets(args, &rfds, &wfds, &efds); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "sockets %f", mselapsed); #endif } } free(args->uid); free(args); (*env)->DeleteGlobalRef(env, args->instance); rs = (*jvm)->DetachCurrentThread(jvm); if (rs != JNI_OK) log_android(ANDROID_LOG_ERROR, "DetachCurrentThread failed"); log_android(ANDROID_LOG_INFO, "Stopped events tun=%d thread %lu", args->tun, thread_id); // TODO report exit to Java } int get_selects(const struct arguments *args, fd_set *rfds, fd_set *wfds, fd_set *efds) { time_t now = time(NULL); // Initialize FD_ZERO(rfds); FD_ZERO(wfds); FD_ZERO(efds); // Always select tun FD_SET(args->tun, rfds); FD_SET(args->tun, efds); int max = args->tun; // Select UDP sockets struct udp_session *ul = NULL; struct udp_session *u = udp_session; while (u != NULL) { if (u->time + UDP_TIMEOUT < now) { log_android(ANDROID_LOG_INFO, "UDP timeout"); // TODO non blocking? if (close(u->socket)) log_android(ANDROID_LOG_ERROR, "UDP close error %d: %s", errno, strerror(errno)); if (ul == NULL) udp_session = u->next; else ul->next = u->next; struct udp_session *c = u; u = u->next; free(c); continue; } else { FD_SET(u->socket, efds); FD_SET(u->socket, rfds); if (u->socket > max) max = u->socket; } ul = u; u = u->next; } // Select TCP sockets struct tcp_session *tl = NULL; struct tcp_session *t = tcp_session; while (t != NULL) { int timeout = 0; if (t->state == TCP_LISTEN || t->state == TCP_SYN_RECV) timeout = TCP_INIT_TIMEOUT; else if (t->state == TCP_ESTABLISHED) timeout = TCP_IDLE_TIMEOUT; else timeout = TCP_CLOSE_TIMEOUT; if (t->state != TCP_TIME_WAIT && t->time + timeout < now) { // TODO send keep alives? char dest[20]; inet_ntop(AF_INET, &(t->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_WARN, "Idle %s/%u lport %u", dest, ntohs(t->dest), t->lport); write_rst(args, t, args->tun); } if (t->state == TCP_TIME_WAIT) { // Log char dest[20]; inet_ntop(AF_INET, &(t->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_INFO, "Close %s/%u lport %u", dest, ntohs(t->dest), t->lport); // TODO keep for some time? // TODO non blocking? if (close(t->socket)) log_android(ANDROID_LOG_ERROR, "close error %d: %s", errno, strerror(errno)); if (tl == NULL) tcp_session = t->next; else tl->next = t->next; struct tcp_session *c = t; t = t->next; free(c); continue; } else if (t->state == TCP_LISTEN) { // Check for connected / errors FD_SET(t->socket, efds); FD_SET(t->socket, wfds); if (t->socket > max) max = t->socket; } else if (t->state == TCP_ESTABLISHED || t->state == TCP_SYN_RECV || t->state == TCP_CLOSE_WAIT) { // Check for data / errors FD_SET(t->socket, efds); FD_SET(t->socket, rfds); if (t->socket > max) max = t->socket; } tl = t; t = t->next; } return max; } int check_tun(const struct arguments *args, fd_set *rfds, fd_set *wfds, fd_set *efds) { // Check tun error if (FD_ISSET(args->tun, efds)) { log_android(ANDROID_LOG_ERROR, "tun exception"); return -1; // over and out } // Check tun read if (FD_ISSET(args->tun, rfds)) { uint8_t buffer[MAX_PKTSIZE]; ssize_t length = read(args->tun, buffer, sizeof(buffer)); if (length < 0) { log_android(ANDROID_LOG_ERROR, "tun read error %d: %s", errno, strerror(errno)); return (errno == EINTR ? 0 : -1); } else if (length > 0) { // Write pcap record if (pcap_fn != NULL) write_pcap_rec(buffer, length); // Handle IP from tun handle_ip(args, buffer, length); } else { // tun eof log_android(ANDROID_LOG_ERROR, "tun empty read"); return -1; } } return 0; } void check_udp_sockets(const struct arguments *args, fd_set *rfds, fd_set *wfds, fd_set *efds) { struct udp_session *cur = udp_session; while (cur != NULL) { // Check socket error if (FD_ISSET(cur->socket, efds)) { cur->time = time(NULL); int serr = 0; socklen_t optlen = sizeof(int); int err = getsockopt(cur->socket, SOL_SOCKET, SO_ERROR, &serr, &optlen); if (err < 0) log_android(ANDROID_LOG_ERROR, "UDP getsockopt error %d: %s", errno, strerror(errno)); else if (serr) log_android(ANDROID_LOG_ERROR, "UDP SO_ERROR %d: %s", serr, strerror(serr)); // TODO state } else { // Check socket read if (FD_ISSET(cur->socket, rfds)) { cur->time = time(NULL); uint8_t buffer[MAX_DATASIZE4]; ssize_t bytes = recv(cur->socket, buffer, sizeof(buffer), 0); if (bytes < 0) { // Socket error log_android(ANDROID_LOG_ERROR, "UDP recv error %d: %s", errno, strerror(errno)); if (errno != EINTR); // TODO state } else if (bytes == 0) { // Socket eof log_android(ANDROID_LOG_INFO, "UDP recv empty"); // TODO state } else { // Socket read data char dest[20]; inet_ntop(AF_INET, &(cur->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_INFO, "UDP recv bytes %d for %s/%u @tun", bytes, dest, ntohs(cur->dest)); write_udp(args, cur, buffer, bytes, args->tun); } } } cur = cur->next; } } void check_tcp_sockets(const struct arguments *args, fd_set *rfds, fd_set *wfds, fd_set *efds) { struct tcp_session *cur = tcp_session; while (cur != NULL) { int oldstate = cur->state; uint32_t oldlocal = cur->local_seq; uint32_t oldremote = cur->remote_seq; // Check socket error if (FD_ISSET(cur->socket, efds)) { cur->time = time(NULL); int serr = 0; socklen_t optlen = sizeof(int); int err = getsockopt(cur->socket, SOL_SOCKET, SO_ERROR, &serr, &optlen); if (err < 0) log_android(ANDROID_LOG_ERROR, "getsockopt lport %u error %d: %s", cur->lport, errno, strerror(errno)); else if (serr) log_android(ANDROID_LOG_ERROR, "lport %u SO_ERROR %d: %s", cur->lport, serr, strerror(serr)); write_rst(args, cur, args->tun); } else { // Assume socket okay if (cur->state == TCP_LISTEN) { // Check socket connect if (FD_ISSET(cur->socket, wfds)) { cur->time = time(NULL); // Log char dest[20]; inet_ntop(AF_INET, &(cur->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_INFO, "Connected %s/%u lport %u", dest, ntohs(cur->dest), cur->lport); if (write_syn_ack(args, cur, args->tun) >= 0) { cur->local_seq++; // local SYN cur->remote_seq++; // remote SYN cur->state = TCP_SYN_RECV; } } } else if (cur->state == TCP_SYN_RECV || cur->state == TCP_ESTABLISHED || cur->state == TCP_CLOSE_WAIT) { // Check socket read if (FD_ISSET(cur->socket, rfds)) { cur->time = time(NULL); // TODO window size uint8_t buffer[MAX_DATASIZE4]; ssize_t bytes = recv(cur->socket, buffer, sizeof(buffer), 0); if (bytes < 0) { // Socket error log_android(ANDROID_LOG_ERROR, "recv lport %u error %d: %s", cur->lport, errno, strerror(errno)); if (errno != EINTR) write_rst(args, cur, args->tun); } else if (bytes == 0) { // Socket eof // TCP: application close log_android(ANDROID_LOG_DEBUG, "recv empty lport %u state %s", cur->lport, strstate(cur->state)); if (write_fin_ack(args, cur, 0, args->tun) >= 0) { cur->local_seq++; // local FIN if (cur->state == TCP_SYN_RECV || cur->state == TCP_ESTABLISHED) cur->state = TCP_FIN_WAIT1; else if (cur->state == TCP_CLOSE_WAIT) cur->state = TCP_LAST_ACK; else log_android(ANDROID_LOG_ERROR, "Unknown state %s", strstate(cur->state)); log_android(ANDROID_LOG_DEBUG, "Half close state %s", strstate(cur->state)); } } else { // Socket read data log_android(ANDROID_LOG_DEBUG, "recv lport %u bytes %d state %s", cur->lport, bytes, strstate(cur->state)); // Forward to tun if (write_data(args, cur, buffer, bytes, args->tun) >= 0) cur->local_seq += bytes; } } } } if (cur->state != oldstate || cur->local_seq != oldlocal || cur->remote_seq != oldremote) { char dest[20]; inet_ntop(AF_INET, &(cur->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_INFO, "Session %s/%u lport %u new state %s local %u remote %u", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), cur->local_seq - cur->local_start, cur->remote_seq - cur->remote_start); } cur = cur->next; } } void handle_ip(const struct arguments *args, const uint8_t *buffer, const uint16_t length) { uint8_t protocol; void *saddr; void *daddr; char source[40]; char dest[40]; char flags[10]; int flen = 0; uint8_t *payload; #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif // Get protocol, addresses & payload uint8_t version = (*buffer) >> 4; if (version == 4) { struct iphdr *ip4hdr = buffer; protocol = ip4hdr->protocol; saddr = &ip4hdr->saddr; daddr = &ip4hdr->daddr; if (ip4hdr->frag_off & IP_MF) { log_android(ANDROID_LOG_ERROR, "IP fragment"); flags[flen++] = '+'; } uint8_t ipoptlen = (ip4hdr->ihl - 5) * 4; payload = buffer + sizeof(struct iphdr) + ipoptlen; if (ntohs(ip4hdr->tot_len) != length) { log_android(ANDROID_LOG_ERROR, "Invalid length %u header length %u", length, ntohs(ip4hdr->tot_len)); return; } uint16_t csum = calc_checksum(ip4hdr, sizeof(struct iphdr)); if (csum != 0) { log_android(ANDROID_LOG_ERROR, "Invalid IP checksum"); return; } } else if (version == 6) { struct ip6_hdr *ip6hdr = buffer; protocol = ip6hdr->ip6_nxt; saddr = &ip6hdr->ip6_src; daddr = &ip6hdr->ip6_dst; payload = buffer + 40; // TODO check length // TODO checksum } else { log_android(ANDROID_LOG_WARN, "Unknown version %d", version); return; } inet_ntop(version == 4 ? AF_INET : AF_INET6, saddr, source, sizeof(source)); inet_ntop(version == 4 ? AF_INET : AF_INET6, daddr, dest, sizeof(dest)); // Get ports & flags int syn = 0; int32_t sport = -1; int32_t dport = -1; if (protocol == IPPROTO_TCP) { struct tcphdr *tcp = payload; sport = ntohs(tcp->source); dport = ntohs(tcp->dest); if (tcp->syn) { syn = 1; flags[flen++] = 'S'; } if (tcp->ack) flags[flen++] = 'A'; if (tcp->psh) flags[flen++] = 'P'; if (tcp->fin) flags[flen++] = 'F'; if (tcp->rst) flags[flen++] = 'R'; // TODO checksum } else if (protocol == IPPROTO_UDP) { struct udphdr *udp = payload; sport = ntohs(udp->source); dport = ntohs(udp->dest); // TODO checksum } flags[flen] = 0; // Get uid jint uid = -1; if ((protocol == IPPROTO_TCP && (!args->filter || syn)) || protocol == IPPROTO_UDP) { log_android(ANDROID_LOG_DEBUG, "get uid %s/%u syn %d", dest, dport, syn); int tries = 0; usleep(1000 * UID_DELAY); while (uid < 0 && tries++ < UID_MAXTRY) { // Check IPv6 table first if (version == 4) { int8_t saddr128[16]; memset(saddr128, 0, 10); saddr128[10] = 0xFF; saddr128[11] = 0xFF; memcpy(saddr128 + 12, saddr, 4); uid = get_uid(protocol, 6, saddr128, sport, tries == UID_MAXTRY); } if (uid < 0) uid = get_uid(protocol, version, saddr, sport, tries == UID_MAXTRY); // Retry delay if (uid < 0 && tries < UID_MAXTRY) { log_android(ANDROID_LOG_WARN, "get uid %s/%u syn %d try %d", dest, dport, syn, tries); usleep(1000 * UID_DELAYTRY); } } if (uid < 0) log_android(ANDROID_LOG_ERROR, "uid not found"); } log_android(ANDROID_LOG_DEBUG, "Packet v%d %s/%u -> %s/%u proto %d flags %s uid %d", version, source, sport, dest, dport, protocol, flags, uid); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "handle ip %f", mselapsed); #endif // Check if allowed jboolean allowed = !syn; if (syn && args->filter && uid >= 0) { for (int i = 0; i < args->count; i++) if (args->uid[i] == uid) { allowed = 1; break; } } // Handle allowed traffic if (allowed) { if (protocol == IPPROTO_UDP) allowed = handle_udp(args, buffer, length, uid); else if (protocol == IPPROTO_TCP) allowed = handle_tcp(args, buffer, length, uid); else allowed = 0; } // Log traffic if (args->log) { if (!args->filter || syn || protocol != IPPROTO_TCP) log_packet(args, time(NULL), version, dest, protocol, dport, flags, uid, allowed); } } jboolean handle_udp(const struct arguments *args, const uint8_t *buffer, uint16_t length, int uid) { // Check version uint8_t version = (*buffer) >> 4; if (version != 4) return 0; // Get headers struct iphdr *iphdr = buffer; uint8_t ipoptlen = (iphdr->ihl - 5) * 4; struct udphdr *udphdr = buffer + sizeof(struct iphdr) + ipoptlen; // Get data uint16_t dataoff = sizeof(struct iphdr) + ipoptlen + sizeof(struct udphdr); uint16_t datalen = length - dataoff; // Search session struct udp_session *last = NULL; struct udp_session *cur = udp_session; while (cur != NULL && !(cur->saddr == iphdr->saddr && cur->source == udphdr->source && cur->daddr == iphdr->daddr && cur->dest == udphdr->dest)) { last = cur; cur = cur->next; } // Create new session if needed int usock = -1; if (cur == NULL) { log_android(ANDROID_LOG_INFO, "UDP new session"); // Register session struct udp_session *u = malloc(sizeof(struct udp_session)); u->time = time(NULL); u->uid = uid; u->version = 4; u->saddr = iphdr->saddr; u->source = udphdr->source; u->daddr = iphdr->daddr; u->dest = udphdr->dest; u->next = NULL; // Open UDP socket u->socket = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); if (u->socket < 0) { log_android(ANDROID_LOG_ERROR, "UDP socket error %d: %s", errno, strerror(errno)); return 0; } else { protect_socket(args, u->socket); if (last == NULL) udp_session = u; else last->next = u; usock = u->socket; } } else { cur->time = time(NULL); usock = cur->socket; } char source[40]; char dest[40]; inet_ntop(version == 4 ? AF_INET : AF_INET6, &(iphdr->saddr), source, sizeof(source)); inet_ntop(version == 4 ? AF_INET : AF_INET6, &(iphdr->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_INFO, "UDP forward from tun %s/%u to %s/%u data %d", source, ntohs(udphdr->source), dest, ntohs(udphdr->dest), datalen); struct sockaddr_in server; server.sin_family = (version == 4 ? AF_INET : AF_INET6); server.sin_addr.s_addr = iphdr->daddr; server.sin_port = udphdr->dest; if (sendto(usock, buffer + dataoff, datalen, 0, &server, sizeof(server)) != datalen) { log_android(ANDROID_LOG_ERROR, "UDP sendto error %s:%s", errno, strerror(errno)); return 0; } return 1; } jboolean handle_tcp(const struct arguments *args, const uint8_t *buffer, uint16_t length, int uid) { #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif // Check version uint8_t version = (*buffer) >> 4; if (version != 4) return 0; // Get headers struct iphdr *iphdr = buffer; uint8_t ipoptlen = (iphdr->ihl - 5) * 4; struct tcphdr *tcphdr = buffer + sizeof(struct iphdr) + ipoptlen; uint8_t tcpoptlen = (tcphdr->doff - 5) * 4; if (tcpoptlen) { // TODO handle TCP options log_android(ANDROID_LOG_DEBUG, "optlen %d", tcpoptlen); } // Get data uint16_t dataoff = sizeof(struct iphdr) + ipoptlen + sizeof(struct tcphdr) + tcpoptlen; uint16_t datalen = length - dataoff; // Search session struct tcp_session *last = NULL; struct tcp_session *cur = tcp_session; while (cur != NULL && !(cur->saddr == iphdr->saddr && cur->source == tcphdr->source && cur->daddr == iphdr->daddr && cur->dest == tcphdr->dest)) { last = cur; cur = cur->next; } // Log char dest[20]; inet_ntop(AF_INET, &(iphdr->daddr), dest, sizeof(dest)); log_android(ANDROID_LOG_DEBUG, "Received %s/%u seq %u ack %u window %u data %d", dest, ntohs(tcphdr->dest), ntohl(tcphdr->seq) - (cur == NULL ? 0 : cur->remote_start), ntohl(tcphdr->ack_seq) - (cur == NULL ? 0 : cur->local_start), ntohs(tcphdr->window), datalen); if (cur == NULL) { if (tcphdr->syn) { log_android(ANDROID_LOG_INFO, "New session %s/%u uid %d", dest, ntohs(tcphdr->dest), uid); // Register session struct tcp_session *syn = malloc(sizeof(struct tcp_session)); syn->time = time(NULL); syn->uid = uid; syn->version = 4; syn->remote_seq = ntohl(tcphdr->seq); // ISN remote syn->local_seq = rand(); // ISN local syn->remote_start = syn->remote_seq; syn->local_start = syn->local_seq; syn->saddr = iphdr->saddr; syn->source = tcphdr->source; syn->daddr = iphdr->daddr; syn->dest = tcphdr->dest; syn->state = TCP_LISTEN; syn->next = NULL; // TODO handle SYN data? if (datalen) log_android(ANDROID_LOG_WARN, "SYN session %s/%u data %u", dest, ntohs(tcphdr->dest), datalen); // Open socket syn->socket = open_tcp(syn, args); if (syn->socket < 0) { syn->state = TCP_TIME_WAIT; // Remote might retry free(syn); } else { syn->lport = get_local_port(syn->socket); if (last == NULL) tcp_session = syn; else last->next = syn; } } else { log_android(ANDROID_LOG_WARN, "Unknown session %s/%u uid %d", dest, ntohs(tcphdr->dest), uid); struct tcp_session rst; memset(&rst, 0, sizeof(struct tcp_session)); rst.version = 4; rst.remote_seq = tcphdr->seq; rst.saddr = iphdr->saddr; rst.source = tcphdr->source; rst.daddr = iphdr->daddr; rst.dest = tcphdr->dest; write_rst(args, &rst, args->tun); return 0; } #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "new session %f", mselapsed); #endif } else { // Session found int oldstate = cur->state; uint32_t oldlocal = cur->local_seq; uint32_t oldremote = cur->remote_seq; log_android(ANDROID_LOG_DEBUG, "Session %s/%u lport %u state %s local %u remote %u", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), cur->local_seq - cur->local_start, cur->remote_seq - cur->remote_start); cur->time = time(NULL); // Do not change order of conditions if (tcphdr->rst) { log_android(ANDROID_LOG_INFO, "RST session %s/%u lport %u received", dest, ntohs(cur->dest), cur->lport); cur->state = TCP_TIME_WAIT; } else if (tcphdr->syn) { log_android(ANDROID_LOG_WARN, "Repeated SYN session %s/%u lport %u", dest, ntohs(cur->dest), cur->lport); // Note: perfect, ordered packet receive assumed } else if (tcphdr->fin /* ACK */) { if (ntohl(tcphdr->ack_seq) == cur->local_seq && ntohl(tcphdr->seq) == cur->remote_seq) { if (datalen) log_android(ANDROID_LOG_INFO, "FIN session %s/%u lport %u data %u", dest, ntohs(cur->dest), cur->lport, datalen); // Forward last data to socket int ok = 1; if (tcphdr->ack && datalen) { log_android(ANDROID_LOG_DEBUG, "send socket data %u", datalen); if (send_socket(cur->socket, buffer + dataoff, datalen) < 0) ok = 0; } // Shutdown socket for writing if (shutdown(cur->socket, SHUT_WR)) { log_android(ANDROID_LOG_ERROR, "shutdown WR error %d: %s", errno, strerror(errno)); ok = 0; // Data might be lost } if (ok) { if (write_ack(args, cur, 1 + datalen, args->tun) >= 0) { cur->remote_seq += (1 + datalen); // FIN + data from tun if (cur->state == TCP_ESTABLISHED /* && !tcphdr->ack */) cur->state = TCP_CLOSE_WAIT; else if (cur->state == TCP_FIN_WAIT1 && tcphdr->ack) cur->state = TCP_TIME_WAIT; else if (cur->state == TCP_FIN_WAIT1 && !tcphdr->ack) cur->state = TCP_CLOSING; else if (cur->state == TCP_FIN_WAIT2 /* && !tcphdr->ack */) cur->state = TCP_TIME_WAIT; else log_android(ANDROID_LOG_ERROR, "Invalid FIN session %s/%u lport %u state %s ACK %d", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), tcphdr->ack); } } else write_rst(args, cur, args->tun); } else { // Special case or hack if you like // TODO proper wrap around if ((cur->state == TCP_FIN_WAIT1 || cur->state == TCP_CLOSE_WAIT) && ntohl(tcphdr->seq) == cur->remote_seq && ntohl(tcphdr->ack_seq) < cur->local_seq) { int confirm = cur->local_seq - ntohl(tcphdr->ack_seq); log_android(ANDROID_LOG_WARN, "Simultaneous close %s/%u lport %u state %s confirm %d data %d", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), confirm, datalen); // Forward data to socket if (datalen) { log_android(ANDROID_LOG_DEBUG, "send socket data %u", datalen); if (send_socket(cur->socket, buffer + dataoff, datalen) < 0) write_rst(args, cur, args->tun); else { if (write_ack(args, cur, 1 + datalen, args->tun) >= 0) cur->remote_seq += 1 + datalen; } } else { // if (write_ack(args, cur, confirm, args->tun) >= 0) // cur->remote_seq += 1; } } else { // TODO proper wrap around if (ntohl(tcphdr->seq) < cur->remote_seq && ntohl(tcphdr->ack_seq) == cur->local_seq) log_android(ANDROID_LOG_WARN, "Repeated FIN session %s/%u lport %u state %s seq %u/%u ack %u/%u", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), ntohl(tcphdr->seq) - cur->remote_start, cur->remote_seq - cur->remote_start, ntohl(tcphdr->ack_seq) - cur->local_start, cur->local_seq - cur->local_start); else log_android(ANDROID_LOG_ERROR, "Invalid FIN session %s/%u lport %u state %s seq %u/%u ack %u/%u", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), ntohl(tcphdr->seq) - cur->remote_start, cur->remote_seq - cur->remote_start, ntohl(tcphdr->ack_seq) - cur->local_start, cur->local_seq - cur->local_start); } } } else if (tcphdr->ack) { if (((uint32_t) ntohl(tcphdr->seq) + 1) == cur->remote_seq) { log_android(ANDROID_LOG_INFO, "Keep alive session %s/%u lport %u", dest, ntohs(cur->dest), cur->lport); } else if (ntohl(tcphdr->ack_seq) == cur->local_seq && ntohl(tcphdr->seq) == cur->remote_seq) { if (cur->state == TCP_SYN_RECV) { // TODO process data? // Remote will retry cur->state = TCP_ESTABLISHED; } else if (cur->state == TCP_ESTABLISHED) { log_android(ANDROID_LOG_DEBUG, "New ACK session %s/%u lport %u data %u", dest, ntohs(cur->dest), cur->lport, datalen); // Forward data to socket if (datalen) { log_android(ANDROID_LOG_DEBUG, "send socket data %u", datalen); if (send_socket(cur->socket, buffer + dataoff, datalen) < 0) write_rst(args, cur, args->tun); else { if (write_ack(args, cur, datalen, args->tun) >= 0) cur->remote_seq += datalen; } } } else if (cur->state == TCP_LAST_ACK) { // socket has been shutdown already cur->state = TCP_TIME_WAIT; } else if (cur->state == TCP_FIN_WAIT1) cur->state = TCP_FIN_WAIT2; else if (cur->state == TCP_CLOSING) cur->state = TCP_TIME_WAIT; else log_android(ANDROID_LOG_ERROR, "Invalid ACK session %s/%u lport %u state %s", dest, ntohs(cur->dest), cur->lport, strstate(cur->state)); } else { // TODO proper wrap around if (ntohl(tcphdr->seq) == cur->remote_seq && ntohl(tcphdr->ack_seq) < cur->local_seq) { log_android(ANDROID_LOG_INFO, "Previous ACK session %s/%u lport %u seq %u/%u ack %u/%u data %d", dest, ntohs(cur->dest), cur->lport, ntohl(tcphdr->seq) - cur->remote_start, cur->remote_seq - cur->remote_start, ntohl(tcphdr->ack_seq) - cur->local_start, cur->local_seq - cur->local_start, datalen); // Forward data to socket if (datalen) { log_android(ANDROID_LOG_DEBUG, "send socket data %u", datalen); if (send_socket(cur->socket, buffer + dataoff, datalen) < 0) write_rst(args, cur, args->tun); else { if (write_ack(args, cur, datalen, args->tun) >= 0) cur->remote_seq += datalen; } } else { // TODO write ack? } } else { // TODO proper wrap around if (ntohl(tcphdr->seq) < cur->remote_seq && ntohl(tcphdr->ack_seq) == cur->local_seq) log_android(ANDROID_LOG_WARN, "Repeated ACK session %s/%u lport %u state %s seq %u/%u ack %u/%u data %d", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), ntohl(tcphdr->seq) - cur->remote_start, cur->remote_seq - cur->remote_start, ntohl(tcphdr->ack_seq) - cur->local_start, cur->local_seq - cur->local_start, datalen); else log_android(ANDROID_LOG_ERROR, "Invalid ACK session %s/%u lport %u state %s seq %u/%u ack %u/%u data %d", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), ntohl(tcphdr->seq) - cur->remote_start, cur->remote_seq - cur->remote_start, ntohl(tcphdr->ack_seq) - cur->local_start, cur->local_seq - cur->local_start, datalen); } } } else log_android(ANDROID_LOG_ERROR, "Unknown packet session %s/%u lport %u", dest, ntohs(cur->dest), cur->lport); if (cur->state != oldstate || cur->local_seq != oldlocal || cur->remote_seq != oldremote) log_android(ANDROID_LOG_INFO, "Session %s/%u lport %u new state %s local %u remote %u", dest, ntohs(cur->dest), cur->lport, strstate(cur->state), cur->local_seq - cur->local_start, cur->remote_seq - cur->remote_start); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "existing session %f", mselapsed); #endif } return 1; } int open_tcp(const struct tcp_session *cur, const struct arguments *args) { int sock = -1; // Build target address struct sockaddr_in daddr; memset(&daddr, 0, sizeof(struct sockaddr_in)); daddr.sin_family = AF_INET; daddr.sin_port = cur->dest; daddr.sin_addr.s_addr = cur->daddr; // Get TCP socket // TODO socket options (SO_REUSEADDR, etc) if ((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { log_android(ANDROID_LOG_ERROR, "socket error %d: %s", errno, strerror(errno)); return -1; } // Protect if (protect_socket(args, sock) < 0) return -1; // Set non blocking uint8_t flags = fcntl(sock, F_GETFL, 0); if (flags < 0 || fcntl(sock, F_SETFL, flags | O_NONBLOCK) < 0) { log_android(ANDROID_LOG_ERROR, "fcntl socket O_NONBLOCK error %d: %s", errno, strerror(errno)); return -1; } // Initiate connect int err = connect(sock, &daddr, sizeof(struct sockaddr_in)); if (err < 0 && errno != EINPROGRESS) { log_android(ANDROID_LOG_ERROR, "connect error %d: %s", errno, strerror(errno)); return -1; } // Set blocking if (fcntl(sock, F_SETFL, flags & ~O_NONBLOCK) < 0) { log_android(ANDROID_LOG_ERROR, "fcntl socket ~O_NONBLOCK error %d: %s", errno, strerror(errno)); return -1; } return sock; } int get_local_port(const int sock) { struct sockaddr_in sin; int len = sizeof(sin); if (getsockname(sock, &sin, &len) < 0) { log_android(ANDROID_LOG_ERROR, "getsockname error %d: %s", errno, strerror(errno)); return -1; } else return ntohs(sin.sin_port); } ssize_t send_socket(int sock, uint8_t *buffer, uint16_t len) { // TODO non blocking ssize_t res = send(sock, buffer, len, 0); if (res < 0) log_android(ANDROID_LOG_ERROR, "send error %d: %s", errno, strerror(errno)); return res; } int write_syn_ack(const struct arguments *args, struct tcp_session *cur, int tun) { if (write_tcp(args, cur, NULL, 0, 1, 1, 1, 0, 0, tun) < 0) { log_android(ANDROID_LOG_ERROR, "write SYN+ACK error %d: %s", errno, strerror((errno))); cur->state = TCP_TIME_WAIT; return -1; } return 0; } int write_ack(const struct arguments *args, struct tcp_session *cur, int bytes, int tun) { if (write_tcp(args, cur, NULL, 0, bytes, 0, 1, 0, 0, tun) < 0) { log_android(ANDROID_LOG_ERROR, "write ACK error %d: %s", errno, strerror((errno))); cur->state = TCP_TIME_WAIT; return -1; } return 0; } int write_data(const struct arguments *args, struct tcp_session *cur, const uint8_t *buffer, uint16_t length, int tun) { if (write_tcp(args, cur, buffer, length, 0, 0, 1, 0, 0, tun) < 0) { log_android(ANDROID_LOG_ERROR, "write data ACK lport %u error %d: %s", cur->lport, errno, strerror((errno))); cur->state = TCP_TIME_WAIT; } } int write_fin_ack(const struct arguments *args, struct tcp_session *cur, int bytes, int tun) { if (write_tcp(args, cur, NULL, 0, bytes, 0, 1, 1, 0, tun) < 0) { log_android(ANDROID_LOG_ERROR, "write FIN+ACK error %d: %s", errno, strerror((errno))); cur->state = TCP_TIME_WAIT; return -1; } return 0; } int write_fin(const struct arguments *args, struct tcp_session *cur, int tun) { if (write_tcp(args, cur, NULL, 0, 0, 0, 0, 1, 0, tun) < 0) { log_android(ANDROID_LOG_ERROR, "write FIN lport %u error %d: %s", cur->lport, errno, strerror((errno))); cur->state = TCP_TIME_WAIT; return -1; } return 0; } void write_rst(const struct arguments *args, struct tcp_session *cur, int tun) { log_android(ANDROID_LOG_WARN, "Sending RST"); if (write_tcp(args, cur, NULL, 0, 0, 0, 0, 0, 1, tun) < 0) log_android(ANDROID_LOG_ERROR, "write RST error %d: %s", errno, strerror((errno))); cur->state = TCP_TIME_WAIT; } int write_udp(const struct arguments *args, const struct udp_session *cur, uint8_t *data, uint16_t datalen, int tun) { #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif // Build packet uint16_t len = sizeof(struct iphdr) + sizeof(struct udphdr) + datalen; u_int8_t *buffer = calloc(len, 1); struct iphdr *ip = buffer; struct udphdr *udp = buffer + sizeof(struct iphdr); if (datalen) memcpy(buffer + sizeof(struct iphdr) + sizeof(struct udphdr), data, datalen); // Build IP header ip->version = 4; ip->ihl = sizeof(struct iphdr) >> 2; ip->tot_len = htons(len); ip->ttl = UDP_TTL; ip->protocol = IPPROTO_UDP; ip->saddr = cur->daddr; ip->daddr = cur->saddr; // Calculate IP checksum ip->check = calc_checksum(ip, sizeof(struct iphdr)); // Build TCP header udp->source = cur->dest; udp->dest = cur->source; udp->check = 0; udp->len = htons(sizeof(struct udphdr) + datalen); char to[20]; inet_ntop(AF_INET, &(ip->daddr), to, sizeof(to)); // Send packet log_android(ANDROID_LOG_DEBUG, "Sending UDP to tun %s/%u data %u", to, ntohs(udp->dest), datalen); // TODO non blocking int res = write(tun, buffer, len); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "tun UDP write %f", mselapsed); #endif log_packet(args, time(NULL), cur->version, to, ip->protocol, ntohs(udp->dest), "", cur->uid, 1); // Write pcap record if (pcap_fn != NULL) write_pcap_rec(buffer, len); free(buffer); return res; } int write_tcp(const struct arguments *args, const struct tcp_session *cur, uint8_t *data, uint16_t datalen, uint16_t confirm, int syn, int ack, int fin, int rst, int tun) { #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif // Build packet uint16_t len = sizeof(struct iphdr) + sizeof(struct tcphdr) + datalen; u_int8_t *buffer = calloc(len, 1); struct iphdr *ip = buffer; struct tcphdr *tcp = buffer + sizeof(struct iphdr); if (datalen) memcpy(buffer + sizeof(struct iphdr) + sizeof(struct tcphdr), data, datalen); // Build IP header ip->version = 4; ip->ihl = sizeof(struct iphdr) >> 2; ip->tot_len = htons(len); ip->ttl = TCP_TTL; ip->protocol = IPPROTO_TCP; ip->saddr = cur->daddr; ip->daddr = cur->saddr; // Calculate IP checksum ip->check = calc_checksum(ip, sizeof(struct iphdr)); // Build TCP header tcp->source = cur->dest; tcp->dest = cur->source; tcp->seq = htonl(cur->local_seq); tcp->ack_seq = htonl((uint32_t) (cur->remote_seq + confirm)); tcp->doff = sizeof(struct tcphdr) >> 2; tcp->syn = syn; tcp->ack = ack; tcp->fin = fin; tcp->rst = rst; tcp->window = htons(TCP_WINDOW); if (!tcp->ack) tcp->ack_seq = 0; // Calculate TCP checksum // TODO optimize memory usage uint16_t clen = sizeof(struct ippseudo) + sizeof(struct tcphdr) + datalen; uint8_t csum[clen]; // Build pseudo header struct ippseudo *pseudo = csum; pseudo->ippseudo_src.s_addr = ip->saddr; pseudo->ippseudo_dst.s_addr = ip->daddr; pseudo->ippseudo_pad = 0; pseudo->ippseudo_p = ip->protocol; pseudo->ippseudo_len = htons(sizeof(struct tcphdr) + datalen); // Copy TCP header + data memcpy(csum + sizeof(struct ippseudo), tcp, sizeof(struct tcphdr)); if (datalen) memcpy(csum + sizeof(struct ippseudo) + sizeof(struct tcphdr), data, datalen); tcp->check = calc_checksum(csum, clen); char to[20]; inet_ntop(AF_INET, &(ip->daddr), to, sizeof(to)); // Send packet log_android(ANDROID_LOG_DEBUG, "Sending%s%s%s%s to tun %s/%u seq %u ack %u data %u confirm %u", (tcp->syn ? " SYN" : ""), (tcp->ack ? " ACK" : ""), (tcp->fin ? " FIN" : ""), (tcp->rst ? " RST" : ""), to, ntohs(tcp->dest), ntohl(tcp->seq) - cur->local_start, ntohl(tcp->ack_seq) - cur->remote_start, datalen, confirm); // TODO non blocking int res = write(tun, buffer, len); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "tun TCP write %f", mselapsed); #endif // Write pcap record if (pcap_fn != NULL) write_pcap_rec(buffer, len); free(buffer); return res; } uint8_t char2nible(const char c) { if (c >= '0' && c <= '9') return (c - '0'); if (c >= 'a' && c <= 'f') return (c - 'a') + 10; if (c >= 'A' && c <= 'F') return (c - 'A') + 10; return 255; } void hex2bytes(const char *hex, uint8_t *buffer) { int len = strlen(hex); for (int i = 0; i < len; i += 2) buffer[i / 2] = (char2nible(hex[i]) << 4) | char2nible(hex[i + 1]); } jint get_uid(const int protocol, const int version, const void *saddr, const uint16_t sport, int dump) { char line[250]; char hex[16 * 2 + 1]; int fields; uint8_t addr4[4]; uint8_t addr6[16]; uint16_t port; jint uid = -1; #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif // Get proc file name char *fn = NULL; if (protocol == IPPROTO_TCP) fn = (version == 4 ? "/proc/net/tcp" : "/proc/net/tcp6"); else if (protocol == IPPROTO_UDP) fn = (version == 4 ? "/proc/net/udp" : "/proc/net/udp6"); else return uid; if (dump) { char source[40]; inet_ntop(version == 4 ? AF_INET : AF_INET6, saddr, source, sizeof(source)); log_android(ANDROID_LOG_INFO, "Searching %s/%u in %s", source, sport, fn); } // Open proc file FILE *fd = fopen(fn, "r"); if (fd == NULL) { log_android(ANDROID_LOG_ERROR, "fopen %s error %d: %s", fn, errno, strerror(errno)); return uid; } // Scan proc file jint u; int i = 0; while (fgets(line, sizeof(line), fd) != NULL) { if (i++) { if (version == 4) fields = sscanf( line, "%*d: %8s:%X %*X:%*X %*X %*lX:%*lX %*X:%*X %*X %d %*d %*ld", hex, &port, &u); else fields = sscanf( line, "%*d: %32s:%X %*X:%*X %*X %*lX:%*lX %*X:%*X %*X %d %*d %*ld", hex, &port, &u); if (fields == 3) { hex2bytes(hex, version == 4 ? addr4 : addr6); if (version == 4) ((uint32_t *) addr4)[0] = htonl(((uint32_t *) addr4)[0]); for (int w = 0; w < 4; w++) ((uint32_t *) addr6)[w] = htonl(((uint32_t *) addr6)[w]); if (dump) { char source[40]; inet_ntop(version == 4 ? AF_INET : AF_INET6, version == 4 ? addr4 : addr6, source, sizeof(source)); log_android(ANDROID_LOG_INFO, "%s/%u %d", source, sport, u); } if (port == sport) { if (memcmp(version == 4 ? addr4 : addr6, saddr, version == 4 ? 4 : 16) == 0) { uid = u; break; } } } else log_android(ANDROID_LOG_ERROR, "Invalid field #%d: %s", fields, line); } } if (fclose(fd)) log_android(ANDROID_LOG_ERROR, "fclose %s error %d: %s", fn, errno, strerror(errno)); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "get uid ip %f", mselapsed); #endif return uid; } int protect_socket(struct arguments *args, int socket) { JNIEnv *env = args->env; jobject instance = args->instance; jclass cls = (*env)->GetObjectClass(env, instance); jmethodID mid = (*env)->GetMethodID(env, cls, "protect", "(I)Z"); if (mid == 0) { log_android(ANDROID_LOG_ERROR, "protect method not found"); return -1; } jboolean isProtected = (*env)->CallBooleanMethod(env, instance, mid, socket); if (!isProtected) { log_android(ANDROID_LOG_ERROR, "protect failed"); return -1; } jthrowable ex = (*env)->ExceptionOccurred(env); if (ex) { log_android(ANDROID_LOG_ERROR, "protect exception"); (*env)->ExceptionDescribe(env); (*env)->ExceptionClear(env); (*env)->DeleteLocalRef(env, ex); return -1; } return 0; } uint16_t calc_checksum(uint8_t *buffer, uint16_t length) { register uint32_t sum = 0; register uint16_t *buf = buffer; register int len = length; while (len > 1) { sum += *buf++; len -= 2; } if (len > 0) sum += *((uint8_t *) buf); while (sum >> 16) sum = (sum & 0xFFFF) + (sum >> 16); return (uint16_t) (~sum); } void log_android(int prio, const char *fmt, ...) { if (prio >= loglevel) { char line[1024]; va_list argptr; va_start(argptr, fmt); vsprintf(line, fmt, argptr); __android_log_print(prio, TAG, line); va_end(argptr); } } void log_packet( const struct arguments *args, jlong time, jint version, const char *dest, jint protocol, jint dport, const char *flags, jint uid, jboolean allowed) { #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif JNIEnv *env = args->env; jobject instance = args->instance; jclass cls = (*env)->GetObjectClass(env, instance); char *signature = "(JILjava/lang/String;IILjava/lang/String;IZ)V"; jmethodID mid = (*env)->GetMethodID(env, cls, "logPacket", signature); if (mid == 0) log_android(ANDROID_LOG_ERROR, "Method logPacket%s not found", signature); else { jstring jdest = (*env)->NewStringUTF(env, dest); jstring jflags = (*env)->NewStringUTF(env, flags); (*env)->CallVoidMethod(env, instance, mid, time, version, jdest, protocol, dport, jflags, uid, allowed); (*env)->DeleteLocalRef(env, jdest); (*env)->DeleteLocalRef(env, jflags); jthrowable ex = (*env)->ExceptionOccurred(env); if (ex) { (*env)->ExceptionDescribe(env); (*env)->ExceptionClear(env); (*env)->DeleteLocalRef(env, ex); } } (*env)->DeleteLocalRef(env, cls); #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "log java %f", mselapsed); #endif } void write_pcap(const void *ptr, size_t len) { #ifdef PROFILE float mselapsed; struct timeval start, end; gettimeofday(&start, NULL); #endif FILE *fd = fopen(pcap_fn, "ab"); if (fd == NULL) log_android(ANDROID_LOG_ERROR, "fopen %s error %d: %s", pcap_fn, errno, strerror(errno)); else { if (fwrite(ptr, len, 1, fd) < 1) log_android(ANDROID_LOG_ERROR, "fwrite %s error %d: %s", pcap_fn, errno, strerror(errno)); else log_android(ANDROID_LOG_DEBUG, "PCAP write %d", len); if (fclose(fd)) log_android(ANDROID_LOG_ERROR, "fclose %s error %d: %s", pcap_fn, errno, strerror(errno)); } #ifdef PROFILE gettimeofday(&end, NULL); mselapsed = (end.tv_sec - start.tv_sec) * 1000.0 + (end.tv_usec - start.tv_usec) / 1000.0; if (mselapsed > 1) log_android(ANDROID_LOG_INFO, "pcap write %f", mselapsed); #endif } void write_pcap_hdr() { struct pcap_hdr_s pcap_hdr; pcap_hdr.magic_number = 0xa1b2c3d4; pcap_hdr.version_major = 2; pcap_hdr.version_minor = 4; pcap_hdr.thiszone = 0; pcap_hdr.sigfigs = 0; pcap_hdr.snaplen = MAX_PCAP; pcap_hdr.network = LINKTYPE_RAW; write_pcap(&pcap_hdr, sizeof(struct pcap_hdr_s)); } void write_pcap_rec(const uint8_t *buffer, uint16_t length) { struct timespec ts; if (clock_gettime(CLOCK_REALTIME, &ts)) log_android(ANDROID_LOG_ERROR, "clock_gettime error %d: %s", errno, strerror(errno)); // TODO use stack int plen = (length < MAX_PCAP ? length : MAX_PCAP); struct pcaprec_hdr_s *pcap_rec = malloc(sizeof(struct pcaprec_hdr_s) + plen); pcap_rec->ts_sec = ts.tv_sec; pcap_rec->ts_usec = ts.tv_nsec / 1000; pcap_rec->incl_len = plen; pcap_rec->orig_len = length; memcpy(((uint8_t *) pcap_rec) + sizeof(struct pcaprec_hdr_s), buffer, plen); write_pcap(pcap_rec, sizeof(struct pcaprec_hdr_s) + plen); free(pcap_rec); } const char *strstate(const int state) { char buf[20]; switch (state) { case TCP_ESTABLISHED: return "ESTABLISHED"; case TCP_SYN_SENT: return "SYN_SENT"; case TCP_SYN_RECV: return "SYN_RECV"; case TCP_FIN_WAIT1: return "FIN_WAIT1"; case TCP_FIN_WAIT2: return "FIN_WAIT2"; case TCP_TIME_WAIT: return "TIME_WAIT"; case TCP_CLOSE: return "CLOSE"; case TCP_CLOSE_WAIT: return "CLOSE_WAIT"; case TCP_LAST_ACK: return "LAST_ACK"; case TCP_LISTEN: return "LISTEN"; case TCP_CLOSING: return "CLOSING"; default: sprintf(buf, "TCP_%d", state); return buf; } } char *hex(const u_int8_t *data, const u_int16_t len) { char hex_str[] = "0123456789ABCDEF"; char *hexout; hexout = (char *) malloc(len * 3 + 1); // TODO free for (size_t i = 0; i < len; i++) { hexout[i * 3 + 0] = hex_str[(data[i] >> 4) & 0x0F]; hexout[i * 3 + 1] = hex_str[(data[i]) & 0x0F]; hexout[i * 3 + 2] = ' '; } return hexout; }