byedpi/desync.c

214 lines
5.2 KiB
C
Raw Normal View History

2023-06-12 04:00:33 +00:00
#include <stdio.h>
2023-06-12 08:01:40 +00:00
#include <string.h>
2023-06-03 19:52:10 +00:00
#include <unistd.h>
2023-06-12 08:01:40 +00:00
#include <time.h>
#include <sys/time.h>
2023-06-03 19:52:10 +00:00
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/tcp.h>
#include <sys/mman.h>
#ifdef __linux__
#include <sys/sendfile.h>
2023-07-03 17:59:39 +00:00
#define _sendfile(outfd, infd, start, len) sendfile(outfd, infd, start, len)
2023-06-03 19:52:10 +00:00
#else
#include <sys/uio.h>
2023-07-03 17:59:39 +00:00
#define _sendfile(outfd, infd, start, len) sendfile(infd, outfd, start, len, 0, 0)
2023-06-03 19:52:10 +00:00
#endif
#ifdef MFD_CLOEXEC
#include <sys/syscall.h>
#define memfd_create(name, flags) syscall(__NR_memfd_create, name, flags);
#else
#define memfd_create(name, flags) fileno(tmpfile())
#endif
#include <params.h>
#include <packets.h>
2023-07-03 17:59:39 +00:00
int setttl(int fd, int ttl, int family) {
int _ttl = ttl;
if (family == AF_INET) {
if (setsockopt(fd, IPPROTO_IP, IP_TTL,
&_ttl, sizeof(_ttl)) < 0) {
perror("setsockopt IP_TTL");
return -1;
}
}
else if (setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
&_ttl, sizeof(_ttl)) < 0) {
perror("setsockopt IPV6_UNICAST_HOPS");
return -1;
}
return 0;
}
int fake_attack(int sfd, char *buffer, ssize_t n, int cnt, int pos, int fa)
2023-06-03 19:52:10 +00:00
{
struct packet pkt = cnt != IS_HTTP ? fake_tls : fake_http;
size_t psz = pkt.size;
int ffd = memfd_create("name", O_RDWR);
if (ffd < 0) {
perror("memfd_create");
return -1;
}
char *p = 0;
int status = -1;
while (status) {
if (ftruncate(ffd, pos) < 0) {
perror("ftruncate");
break;
}
p = mmap(0, pos, PROT_WRITE, MAP_SHARED, ffd, 0);
if (p == MAP_FAILED) {
perror("mmap");
break;
}
memcpy(p, pkt.data, psz < pos ? psz : pos);
2023-07-03 17:59:39 +00:00
if (setttl(sfd, params.ttl, fa) < 0) {
2023-06-03 19:52:10 +00:00
break;
}
2023-07-03 17:59:39 +00:00
if (_sendfile(sfd, ffd, 0, pos) < 0) {
2023-06-03 19:52:10 +00:00
perror("sendfile");
break;
}
2023-06-12 08:01:40 +00:00
struct timespec delay = {
.tv_nsec = params.sfdelay * 1000
};
nanosleep(&delay, 0);
2023-06-03 19:52:10 +00:00
memcpy(p, buffer, pos);
2023-07-03 17:59:39 +00:00
if (setttl(sfd, params.def_ttl, fa) < 0) {
2023-06-03 19:52:10 +00:00
break;
}
if (send(sfd, buffer + pos, n - pos, 0) < 0) {
perror("send");
break;
}
status = 0;
}
if (p) munmap(p, pos);
close(ffd);
return status;
}
2023-07-03 17:59:39 +00:00
int disorder_attack(int sfd, char *buffer, ssize_t n, int pos, int fa)
2023-06-03 19:52:10 +00:00
{
int bttl = 1;
2023-07-03 17:59:39 +00:00
if (setttl(sfd, bttl, fa) < 0) {
2023-06-03 19:52:10 +00:00
return -1;
}
if (send(sfd, buffer, pos, 0) < 0) {
perror("send");
return -1;
}
2023-07-03 17:59:39 +00:00
if (setttl(sfd, params.def_ttl, fa) < 0) {
2023-06-03 19:52:10 +00:00
return -1;
}
if (send(sfd, buffer + pos, n - pos, 0) < 0) {
perror("send");
return -1;
}
return 0;
}
2023-07-07 20:07:27 +00:00
int desync(int sfd, char *buffer,
ssize_t n, struct sockaddr *dst)
2023-06-03 19:52:10 +00:00
{
int pos = params.split;
char *host = 0;
int len = 0, type = 0;
2023-07-07 20:07:27 +00:00
int fa = dst->sa_family;
2023-07-03 17:59:39 +00:00
2023-06-03 19:52:10 +00:00
if ((len = parse_tls(buffer, n, &host))) {
type = IS_HTTPS;
}
else if ((len = parse_http(buffer, n, &host, 0))) {
type = IS_HTTP;
}
LOG(LOG_S, "host: %.*s\n", len, host);
if (type == IS_HTTP && params.mod_http) {
if (mod_http(buffer, n, params.mod_http)) {
fprintf(stderr, "mod http error\n");
return -1;
}
}
if (host && params.split_host)
pos += (host - buffer);
else if (pos < 0)
pos += n;
LOG(LOG_L, "split pos: %d, n: %ld\n", pos, n);
if (pos <= 0 || pos >= n ||
params.attack == DESYNC_NONE ||
(!type && params.de_known))
{
if (send(sfd, buffer, n, 0) < 0) {
perror("send");
return -1;
}
}
else switch (params.attack) {
case DESYNC_FAKE:
2023-07-03 17:59:39 +00:00
return fake_attack(sfd, buffer, n, type, pos, fa);
2023-06-03 19:52:10 +00:00
case DESYNC_DISORDER:
2023-07-03 17:59:39 +00:00
printf("disorder attack\n");
return disorder_attack(sfd, buffer, n, pos, fa);
2023-06-03 19:52:10 +00:00
case DESYNC_SPLIT:
default:
if (send(sfd, buffer, pos, 0) < 0) {
perror("send");
return -1;
}
if (send(sfd, buffer + pos, n - pos, 0) < 0) {
perror("send");
return -1;
}
}
return 0;
2023-07-07 20:07:27 +00:00
}
int desync_udp(int fd, char *buffer,
ssize_t n, struct sockaddr_in6 *dst)
{
2023-07-08 18:04:24 +00:00
char is_mv4 = 1;
if (dst->sin6_family == AF_INET6) {
static char *pat = "\0\0\0\0\0\0\0\0\0\0\xff\xff";
is_mv4 = !memcmp(&dst->sin6_addr, pat, 12);
}
2023-07-07 20:07:27 +00:00
if (params.desync_udp & DESYNC_UDP_FAKE) {
2023-07-08 18:04:24 +00:00
if (setttl(fd, params.ttl,
is_mv4 ? AF_INET : dst->sin6_family) < 0) {
2023-07-07 20:07:27 +00:00
return -1;
}
if (sendto(fd, fake_udp.data, fake_udp.size,
0, (struct sockaddr *)dst, sizeof(*dst)) < 0) {
perror("sendto");
return -1;
}
2023-07-08 18:04:24 +00:00
if (setttl(fd, params.def_ttl,
is_mv4 ? AF_INET : dst->sin6_family) < 0) {
2023-07-07 20:07:27 +00:00
return -1;
}
}
ssize_t ns = sendto(fd,
buffer, n, 0, (struct sockaddr *)dst, sizeof(*dst));
if (ns < 0) {
perror("sendto");
return -1;
}
return 0;
2023-06-03 19:52:10 +00:00
}