mirror of https://github.com/ValdikSS/GoodbyeDPI
4 changed files with 1475 additions and 6 deletions
@ -0,0 +1,178 @@ |
|||||
|
/*
|
||||
|
* DNS UDP Connection Tracker for GoodbyeDPI |
||||
|
* |
||||
|
* This is a simple connection tracker for DNS UDP data. |
||||
|
* It's not a proper one. The caveats as follows: |
||||
|
* * Uses only source IP address and port as a hash key; |
||||
|
* * One-shot only. Removes conntrack record as soon as gets the reply; |
||||
|
* * Does not properly parse DNS request and response, only checks some bytes; |
||||
|
* |
||||
|
* But anyway, it works fine for DNS. |
||||
|
*/ |
||||
|
|
||||
|
#include <windows.h> |
||||
|
#include <time.h> |
||||
|
#include <stdio.h> |
||||
|
#include "dnsredir.h" |
||||
|
#include "uthash.h" |
||||
|
|
||||
|
// IPv6 incompatible!
|
||||
|
#define UDP_CONNRECORD_KEY_LEN 6 |
||||
|
|
||||
|
#define DNS_CLEANUP_INTERVAL_SEC 30 |
||||
|
|
||||
|
#ifndef debug |
||||
|
#define debug(...) do {} while (0) |
||||
|
#endif |
||||
|
|
||||
|
#ifndef debug |
||||
|
#define debug(...) printf(...) |
||||
|
#endif |
||||
|
|
||||
|
/* HACK!
|
||||
|
* uthash uses strlen() for HASH_FIND_STR. |
||||
|
* We have null bytes in our key, so we can't use strlen() |
||||
|
* And since it's always UDP_CONNRECORD_KEY_LEN bytes long, |
||||
|
* we don't need to use any string function to determine length. |
||||
|
*/ |
||||
|
#undef uthash_strlen |
||||
|
#define uthash_strlen(s) UDP_CONNRECORD_KEY_LEN |
||||
|
|
||||
|
typedef struct udp_connrecord { |
||||
|
/* key (srcip[4] + srcport[2]) */ |
||||
|
char key[UDP_CONNRECORD_KEY_LEN]; |
||||
|
time_t time; /* time when this record was added */ |
||||
|
uint32_t dstip; |
||||
|
uint16_t dstport; |
||||
|
UT_hash_handle hh; /* makes this structure hashable */ |
||||
|
} udp_connrecord_t; |
||||
|
|
||||
|
static time_t last_cleanup = 0; |
||||
|
static udp_connrecord_t *conntrack = NULL; |
||||
|
|
||||
|
inline static void construct_key(const uint32_t srcip, const uint16_t srcport, char *key) { |
||||
|
debug("Construct key enter\n"); |
||||
|
if (key) { |
||||
|
debug("Constructing key\n"); |
||||
|
|
||||
|
*(uint32_t*)(key) = srcip; |
||||
|
*(uint16_t*)(key + sizeof(srcip)) = srcport; |
||||
|
} |
||||
|
debug("Construct key end\n"); |
||||
|
} |
||||
|
|
||||
|
inline static void deconstruct_key(const char *key, udp_connrecord_t *connrecord, |
||||
|
conntrack_info_t *conn_info) { |
||||
|
debug("Deconstruct key enter\n"); |
||||
|
if (key && conn_info) { |
||||
|
debug("Deconstructing key\n"); |
||||
|
|
||||
|
conn_info->srcip = *(uint32_t*)(key); |
||||
|
conn_info->srcport = *(uint16_t*)(key + sizeof(conn_info->srcip)); |
||||
|
conn_info->dstip = connrecord->dstip; |
||||
|
conn_info->dstport = connrecord->dstport; |
||||
|
} |
||||
|
debug("Deconstruct key end\n"); |
||||
|
} |
||||
|
|
||||
|
static int check_get_udp_conntrack_key(const char *key, udp_connrecord_t **connrecord) { |
||||
|
udp_connrecord_t *tmp_connrecord = NULL; |
||||
|
if (!conntrack) return FALSE; |
||||
|
|
||||
|
HASH_FIND_STR(conntrack, key, tmp_connrecord); |
||||
|
if (tmp_connrecord) { |
||||
|
if (connrecord) |
||||
|
*connrecord = tmp_connrecord; |
||||
|
debug("check_get_udp_conntrack_key found key\n"); |
||||
|
return TRUE; |
||||
|
} |
||||
|
debug("check_get_udp_conntrack_key key not found\n"); |
||||
|
return FALSE; |
||||
|
} |
||||
|
|
||||
|
static int add_udp_conntrack(const uint32_t srcip, const uint16_t srcport, |
||||
|
const uint32_t dstip, const uint16_t dstport) { |
||||
|
udp_connrecord_t *tmp_connrecord = malloc(sizeof(udp_connrecord_t)); |
||||
|
if (!(srcip && srcport && dstip && dstport)) |
||||
|
return FALSE; |
||||
|
|
||||
|
construct_key(srcip, srcport, tmp_connrecord->key); |
||||
|
|
||||
|
if (!check_get_udp_conntrack_key(tmp_connrecord->key, NULL)) { |
||||
|
tmp_connrecord->time = time(NULL); |
||||
|
tmp_connrecord->dstip = dstip; |
||||
|
tmp_connrecord->dstport = dstport; |
||||
|
HASH_ADD_STR(conntrack, key, tmp_connrecord); |
||||
|
debug("Added UDP conntrack\n"); |
||||
|
return TRUE; |
||||
|
} |
||||
|
debug("Not added UDP conntrack\n"); |
||||
|
return FALSE; |
||||
|
} |
||||
|
|
||||
|
void dns_cleanup() { |
||||
|
udp_connrecord_t *tmp_connrecord, *tmp_connrecord2 = NULL; |
||||
|
|
||||
|
if (last_cleanup == 0) { |
||||
|
last_cleanup = time(NULL); |
||||
|
return; |
||||
|
} |
||||
|
|
||||
|
if (difftime(time(NULL), last_cleanup) >= DNS_CLEANUP_INTERVAL_SEC) { |
||||
|
last_cleanup = time(NULL); |
||||
|
|
||||
|
HASH_ITER(hh, conntrack, tmp_connrecord, tmp_connrecord2) { |
||||
|
if (difftime(last_cleanup, tmp_connrecord->time) >= DNS_CLEANUP_INTERVAL_SEC) { |
||||
|
HASH_DEL(conntrack, tmp_connrecord); |
||||
|
free(tmp_connrecord); |
||||
|
} |
||||
|
} |
||||
|
} |
||||
|
} |
||||
|
|
||||
|
int dns_handle_outgoing(const uint32_t srcip, const uint16_t srcport, |
||||
|
const uint32_t dstip, const uint16_t dstport, |
||||
|
const char *packet_data, const UINT packet_dataLen) { |
||||
|
|
||||
|
if (packet_dataLen < 16) |
||||
|
return FALSE; |
||||
|
|
||||
|
dns_cleanup(); |
||||
|
|
||||
|
if ((ntohs(*(const uint16_t*)(packet_data + 2)) & 0xFA00) == 0 && |
||||
|
(ntohs(*(const uint32_t*)(packet_data + 6))) == 0) { |
||||
|
/* Looks like DNS request */ |
||||
|
debug("trying to add srcport = %hu, dstport = %hu\n", ntohs(srcport), ntohs(dstport)); |
||||
|
return add_udp_conntrack(srcip, srcport, dstip, dstport); |
||||
|
} |
||||
|
debug("____dns_handle_outgoing FALSE: srcport = %hu, dstport = %hu\n", ntohs(srcport), ntohs(dstport)); |
||||
|
return FALSE; |
||||
|
} |
||||
|
|
||||
|
int dns_handle_incoming(const uint32_t srcip, const uint16_t srcport, |
||||
|
const uint32_t dstip, const uint16_t dstport, |
||||
|
const char *packet_data, const UINT packet_dataLen, |
||||
|
conntrack_info_t *conn_info) { |
||||
|
|
||||
|
char key[UDP_CONNRECORD_KEY_LEN]; |
||||
|
udp_connrecord_t *tmp_connrecord = NULL; |
||||
|
|
||||
|
if (packet_dataLen < 16 || !conn_info) |
||||
|
return FALSE; |
||||
|
|
||||
|
dns_cleanup(); |
||||
|
|
||||
|
if ((ntohs(*(const uint16_t*)(packet_data + 2)) & 0xF800) == 0x8000) { |
||||
|
/* Looks like DNS response */ |
||||
|
construct_key(srcip, srcport, key); |
||||
|
if (check_get_udp_conntrack_key(key, &tmp_connrecord) && tmp_connrecord) { |
||||
|
/* Connection exists in conntrack, moving on */ |
||||
|
deconstruct_key(key, tmp_connrecord, conn_info); |
||||
|
HASH_DEL(conntrack, tmp_connrecord); |
||||
|
free(tmp_connrecord); |
||||
|
return TRUE; |
||||
|
} |
||||
|
} |
||||
|
debug("____dns_handle_incoming FALSE: srcport = %hu, dstport = %hu\n", ntohs(srcport), ntohs(dstport)); |
||||
|
return FALSE; |
||||
|
} |
@ -0,0 +1,17 @@ |
|||||
|
#include <stdint.h> |
||||
|
|
||||
|
typedef struct conntrack_info { |
||||
|
uint32_t srcip; |
||||
|
uint16_t srcport; |
||||
|
uint32_t dstip; |
||||
|
uint16_t dstport; |
||||
|
} conntrack_info_t; |
||||
|
|
||||
|
int dns_handle_incoming(const uint32_t srcip, const uint16_t srcport, |
||||
|
const uint32_t dstip, const uint16_t dstport, |
||||
|
const char *packet_data, const UINT packet_dataLen, |
||||
|
conntrack_info_t *conn_info); |
||||
|
|
||||
|
int dns_handle_outgoing(const uint32_t srcip, const uint16_t srcport, |
||||
|
const uint32_t dstip, const uint16_t dstport, |
||||
|
const char *packet_data, const UINT packet_dataLen); |
File diff suppressed because it is too large
Loading…
Reference in new issue