mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 10:18:21 -05:00
a8b00423ea
As we define __FAVOR_BSD use the BSD IP header. Compile tested on NetBSD, DragonFlyBSD, and Linux. Signed-off-by: Roy Marples <roy@marples.name>
178 lines
4.3 KiB
C
178 lines
4.3 KiB
C
/*
|
|
* Received Data frame processing for IPv4 packets
|
|
* Copyright (c) 2010, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip_icmp.h>
|
|
|
|
#include "utils/common.h"
|
|
#include "wlantest.h"
|
|
|
|
|
|
static void ping_update(struct wlantest *wt, struct wlantest_sta *sta, int req,
|
|
u32 src, u32 dst, u16 id, u16 seq)
|
|
{
|
|
if (req) {
|
|
sta->icmp_echo_req_src = src;
|
|
sta->icmp_echo_req_dst = dst;
|
|
sta->icmp_echo_req_id = id;
|
|
sta->icmp_echo_req_seq = seq;
|
|
return;
|
|
}
|
|
|
|
if (sta->icmp_echo_req_src == dst &&
|
|
sta->icmp_echo_req_dst == src &&
|
|
sta->icmp_echo_req_id == id &&
|
|
sta->icmp_echo_req_seq == seq) {
|
|
sta->counters[WLANTEST_STA_COUNTER_PING_OK]++;
|
|
if (sta->counters[WLANTEST_STA_COUNTER_ASSOCREQ_TX] == 0 &&
|
|
sta->counters[WLANTEST_STA_COUNTER_REASSOCREQ_TX] == 0)
|
|
sta->counters[
|
|
WLANTEST_STA_COUNTER_PING_OK_FIRST_ASSOC]++;
|
|
add_note(wt, MSG_DEBUG, "ICMP echo (ping) match for STA "
|
|
MACSTR, MAC2STR(sta->addr));
|
|
}
|
|
}
|
|
|
|
|
|
static void rx_data_icmp(struct wlantest *wt, const u8 *bssid,
|
|
const u8 *sta_addr, u32 dst, u32 src,
|
|
const u8 *data, size_t len, const u8 *peer_addr)
|
|
{
|
|
struct in_addr addr;
|
|
char buf[20];
|
|
const struct icmphdr *hdr;
|
|
u16 id, seq;
|
|
struct wlantest_bss *bss;
|
|
struct wlantest_sta *sta;
|
|
|
|
hdr = (const struct icmphdr *) data;
|
|
if (len < 4)
|
|
return;
|
|
|
|
/* TODO: check hdr->checksum */
|
|
|
|
if (hdr->type != ICMP_ECHOREPLY && hdr->type != ICMP_ECHO)
|
|
return;
|
|
if (len < 8)
|
|
return;
|
|
|
|
id = ntohs(hdr->un.echo.id);
|
|
seq = ntohs(hdr->un.echo.sequence);
|
|
|
|
addr.s_addr = dst;
|
|
snprintf(buf, sizeof(buf), "%s", inet_ntoa(addr));
|
|
addr.s_addr = src;
|
|
add_note(wt, MSG_DEBUG, "ICMP echo %s %s -> %s id=%04x seq=%u len=%u%s",
|
|
hdr->type == ICMP_ECHO ? "request" : "response",
|
|
inet_ntoa(addr), buf, id, seq, (unsigned) len - 8,
|
|
peer_addr ? " [DL]" : "");
|
|
|
|
bss = bss_find(wt, bssid);
|
|
if (bss == NULL) {
|
|
add_note(wt, MSG_INFO, "No BSS " MACSTR
|
|
" known for ICMP packet", MAC2STR(bssid));
|
|
return;
|
|
}
|
|
|
|
if (sta_addr == NULL)
|
|
return; /* FromDS broadcast ping */
|
|
|
|
sta = sta_find(bss, sta_addr);
|
|
if (sta == NULL) {
|
|
add_note(wt, MSG_INFO, "No STA " MACSTR
|
|
" known for ICMP packet", MAC2STR(sta_addr));
|
|
return;
|
|
}
|
|
|
|
ping_update(wt, sta, hdr->type == ICMP_ECHO, src, dst, id, seq);
|
|
if (peer_addr && (sta = sta_find(bss, peer_addr)))
|
|
ping_update(wt, sta, hdr->type == ICMP_ECHO, src, dst, id, seq);
|
|
}
|
|
|
|
|
|
static int hwsim_test_packet(const u8 *data, size_t len)
|
|
{
|
|
size_t i;
|
|
|
|
if (len != 1500 - 14)
|
|
return 0;
|
|
|
|
for (i = 0; i < len; i++) {
|
|
if (data[i] != (i & 0xff))
|
|
return 0;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
void rx_data_ip(struct wlantest *wt, const u8 *bssid, const u8 *sta_addr,
|
|
const u8 *dst, const u8 *src, const u8 *data, size_t len,
|
|
const u8 *peer_addr)
|
|
{
|
|
const struct ip *ip;
|
|
const u8 *payload;
|
|
size_t plen;
|
|
uint16_t frag_off, ip_len;
|
|
|
|
ip = (const struct ip *) data;
|
|
if (len < sizeof(*ip))
|
|
return;
|
|
if (ip->ip_v != 4) {
|
|
if (hwsim_test_packet(data, len)) {
|
|
add_note(wt, MSG_INFO, "hwsim_test package");
|
|
return;
|
|
}
|
|
add_note(wt, MSG_DEBUG, "Unexpected IP protocol version %u in "
|
|
"IPv4 packet (bssid=" MACSTR " str=" MACSTR
|
|
" dst=" MACSTR ")", ip->ip_v, MAC2STR(bssid),
|
|
MAC2STR(src), MAC2STR(dst));
|
|
return;
|
|
}
|
|
if (ip->ip_hl * 4 < sizeof(*ip)) {
|
|
add_note(wt, MSG_DEBUG, "Unexpected IP header length %u in "
|
|
"IPv4 packet (bssid=" MACSTR " str=" MACSTR
|
|
" dst=" MACSTR ")", ip->ip_hl, MAC2STR(bssid),
|
|
MAC2STR(src), MAC2STR(dst));
|
|
return;
|
|
}
|
|
if (ip->ip_hl * 4 > len) {
|
|
add_note(wt, MSG_DEBUG, "Truncated IP header (ihl=%u len=%u) "
|
|
"in IPv4 packet (bssid=" MACSTR " str=" MACSTR
|
|
" dst=" MACSTR ")", ip->ip_hl, (unsigned) len,
|
|
MAC2STR(bssid), MAC2STR(src), MAC2STR(dst));
|
|
return;
|
|
}
|
|
|
|
/* TODO: check header checksum in ip->ip_sum */
|
|
|
|
frag_off = be_to_host16(ip->ip_off);
|
|
if (frag_off & 0x1fff) {
|
|
wpa_printf(MSG_EXCESSIVE, "IP fragment reassembly not yet "
|
|
"supported");
|
|
return;
|
|
}
|
|
|
|
ip_len = be_to_host16(ip->ip_len);
|
|
if (ip_len > len)
|
|
return;
|
|
if (ip_len < len)
|
|
len = ip_len;
|
|
|
|
payload = data + 4 * ip->ip_hl;
|
|
plen = len - 4 * ip->ip_hl;
|
|
|
|
switch (ip->ip_p) {
|
|
case IPPROTO_ICMP:
|
|
rx_data_icmp(wt, bssid, sta_addr, ip->ip_dst.s_addr,
|
|
ip->ip_src.s_addr, payload, plen, peer_addr);
|
|
break;
|
|
}
|
|
}
|