2024-02-12 16:11:29 +00:00
|
|
|
use std::{
|
|
|
|
net::{IpAddr, Ipv4Addr, Ipv6Addr},
|
|
|
|
time::Duration,
|
|
|
|
};
|
2024-02-10 15:18:12 +00:00
|
|
|
|
|
|
|
use anyhow::{anyhow, Result};
|
|
|
|
use async_trait::async_trait;
|
2024-02-12 17:01:47 +00:00
|
|
|
use bytes::BytesMut;
|
2024-02-10 21:13:47 +00:00
|
|
|
use etherparse::{
|
2024-02-12 16:11:29 +00:00
|
|
|
IcmpEchoHeader, Icmpv4Header, Icmpv4Type, Icmpv6Header, Icmpv6Type, IpNumber, Ipv4Slice,
|
|
|
|
Ipv6Slice, NetSlice, PacketBuilder, SlicedPacket,
|
2024-02-10 21:13:47 +00:00
|
|
|
};
|
2024-02-12 16:11:29 +00:00
|
|
|
use log::{debug, trace, warn};
|
2024-02-10 15:18:12 +00:00
|
|
|
use smoltcp::wire::IpAddress;
|
|
|
|
use tokio::{
|
|
|
|
select,
|
|
|
|
sync::mpsc::{Receiver, Sender},
|
|
|
|
};
|
|
|
|
|
2024-02-10 21:13:47 +00:00
|
|
|
use crate::{
|
|
|
|
icmp::{IcmpClient, IcmpProtocol, IcmpReply},
|
2024-02-11 06:43:09 +00:00
|
|
|
nat::{NatHandler, NatHandlerContext},
|
2024-02-10 21:13:47 +00:00
|
|
|
};
|
2024-02-10 15:18:12 +00:00
|
|
|
|
|
|
|
const ICMP_PING_TIMEOUT_SECS: u64 = 20;
|
|
|
|
const ICMP_TIMEOUT_SECS: u64 = 30;
|
|
|
|
|
|
|
|
pub struct ProxyIcmpHandler {
|
2024-02-12 17:01:47 +00:00
|
|
|
rx_sender: Sender<BytesMut>,
|
2024-02-10 15:18:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#[async_trait]
|
|
|
|
impl NatHandler for ProxyIcmpHandler {
|
2024-02-11 11:53:59 +00:00
|
|
|
async fn receive(&self, data: &[u8]) -> Result<bool> {
|
|
|
|
if self.rx_sender.is_closed() {
|
|
|
|
Ok(true)
|
|
|
|
} else {
|
2024-02-12 17:01:47 +00:00
|
|
|
self.rx_sender.try_send(data.into())?;
|
2024-02-11 11:53:59 +00:00
|
|
|
Ok(true)
|
|
|
|
}
|
2024-02-10 15:18:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
enum ProxyIcmpSelect {
|
2024-02-12 17:01:47 +00:00
|
|
|
Internal(BytesMut),
|
2024-02-10 15:18:12 +00:00
|
|
|
Close,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ProxyIcmpHandler {
|
2024-02-12 17:01:47 +00:00
|
|
|
pub fn new(rx_sender: Sender<BytesMut>) -> Self {
|
2024-02-11 06:43:09 +00:00
|
|
|
ProxyIcmpHandler { rx_sender }
|
2024-02-10 15:18:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn spawn(
|
|
|
|
&mut self,
|
2024-02-11 06:43:09 +00:00
|
|
|
context: NatHandlerContext,
|
2024-02-12 17:01:47 +00:00
|
|
|
rx_receiver: Receiver<BytesMut>,
|
2024-02-10 15:18:12 +00:00
|
|
|
) -> Result<()> {
|
2024-02-11 07:29:37 +00:00
|
|
|
let client = IcmpClient::new(match context.key.external_ip.addr {
|
|
|
|
IpAddress::Ipv4(_) => IcmpProtocol::Icmpv4,
|
|
|
|
IpAddress::Ipv6(_) => IcmpProtocol::Icmpv6,
|
|
|
|
})?;
|
2024-02-10 15:18:12 +00:00
|
|
|
tokio::spawn(async move {
|
2024-02-11 06:43:09 +00:00
|
|
|
if let Err(error) = ProxyIcmpHandler::process(client, rx_receiver, context).await {
|
2024-02-10 15:18:12 +00:00
|
|
|
warn!("processing of icmp proxy failed: {}", error);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn process(
|
2024-02-10 21:13:47 +00:00
|
|
|
client: IcmpClient,
|
2024-02-12 17:01:47 +00:00
|
|
|
mut rx_receiver: Receiver<BytesMut>,
|
2024-02-11 06:43:09 +00:00
|
|
|
context: NatHandlerContext,
|
2024-02-10 15:18:12 +00:00
|
|
|
) -> Result<()> {
|
|
|
|
loop {
|
|
|
|
let deadline = tokio::time::sleep(Duration::from_secs(ICMP_TIMEOUT_SECS));
|
|
|
|
let selection = select! {
|
|
|
|
x = rx_receiver.recv() => if let Some(data) = x {
|
|
|
|
ProxyIcmpSelect::Internal(data)
|
|
|
|
} else {
|
|
|
|
ProxyIcmpSelect::Close
|
|
|
|
},
|
|
|
|
_ = deadline => ProxyIcmpSelect::Close,
|
|
|
|
};
|
|
|
|
|
|
|
|
match selection {
|
|
|
|
ProxyIcmpSelect::Internal(data) => {
|
|
|
|
let packet = SlicedPacket::from_ethernet(&data)?;
|
|
|
|
let Some(ref net) = packet.net else {
|
|
|
|
continue;
|
|
|
|
};
|
|
|
|
|
2024-02-10 21:13:47 +00:00
|
|
|
match net {
|
|
|
|
NetSlice::Ipv4(ipv4) => {
|
2024-02-11 06:43:09 +00:00
|
|
|
ProxyIcmpHandler::process_ipv4(&context, ipv4, &client).await?
|
2024-02-10 21:13:47 +00:00
|
|
|
}
|
2024-02-10 15:18:12 +00:00
|
|
|
|
2024-02-10 21:13:47 +00:00
|
|
|
NetSlice::Ipv6(ipv6) => {
|
2024-02-11 06:43:09 +00:00
|
|
|
ProxyIcmpHandler::process_ipv6(&context, ipv6, &client).await?
|
2024-02-10 15:18:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ProxyIcmpSelect::Close => {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-12 16:11:29 +00:00
|
|
|
context.reclaim().await?;
|
|
|
|
|
2024-02-10 15:18:12 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2024-02-11 06:43:09 +00:00
|
|
|
|
|
|
|
async fn process_ipv4(
|
|
|
|
context: &NatHandlerContext,
|
|
|
|
ipv4: &Ipv4Slice<'_>,
|
|
|
|
client: &IcmpClient,
|
|
|
|
) -> Result<()> {
|
|
|
|
if ipv4.header().protocol() != IpNumber::ICMP {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
let (header, payload) = Icmpv4Header::from_slice(ipv4.payload().payload)?;
|
|
|
|
if let Icmpv4Type::EchoRequest(echo) = header.icmp_type {
|
|
|
|
let IpAddr::V4(external_ipv4) = context.key.external_ip.addr.into() else {
|
|
|
|
return Ok(());
|
|
|
|
};
|
|
|
|
|
2024-02-12 16:11:29 +00:00
|
|
|
let context = context.clone();
|
|
|
|
let client = client.clone();
|
|
|
|
let payload = payload.to_vec();
|
|
|
|
tokio::task::spawn(async move {
|
|
|
|
if let Err(error) = ProxyIcmpHandler::process_echo_ipv4(
|
|
|
|
context,
|
|
|
|
client,
|
2024-02-11 06:43:09 +00:00
|
|
|
external_ipv4,
|
2024-02-12 16:11:29 +00:00
|
|
|
echo,
|
2024-02-11 06:43:09 +00:00
|
|
|
payload,
|
|
|
|
)
|
2024-02-12 16:11:29 +00:00
|
|
|
.await
|
|
|
|
{
|
|
|
|
trace!("icmp4 echo failed: {}", error);
|
2024-02-11 06:43:09 +00:00
|
|
|
}
|
2024-02-12 16:11:29 +00:00
|
|
|
});
|
2024-02-11 06:43:09 +00:00
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn process_ipv6(
|
|
|
|
context: &NatHandlerContext,
|
|
|
|
ipv6: &Ipv6Slice<'_>,
|
|
|
|
client: &IcmpClient,
|
|
|
|
) -> Result<()> {
|
2024-02-11 07:29:37 +00:00
|
|
|
if ipv6.header().next_header() != IpNumber::IPV6_ICMP {
|
2024-02-11 06:43:09 +00:00
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
let (header, payload) = Icmpv6Header::from_slice(ipv6.payload().payload)?;
|
|
|
|
if let Icmpv6Type::EchoRequest(echo) = header.icmp_type {
|
|
|
|
let IpAddr::V6(external_ipv6) = context.key.external_ip.addr.into() else {
|
|
|
|
return Ok(());
|
|
|
|
};
|
|
|
|
|
2024-02-12 16:11:29 +00:00
|
|
|
let context = context.clone();
|
|
|
|
let client = client.clone();
|
|
|
|
let payload = payload.to_vec();
|
|
|
|
tokio::task::spawn(async move {
|
|
|
|
if let Err(error) = ProxyIcmpHandler::process_echo_ipv6(
|
|
|
|
context,
|
|
|
|
client,
|
2024-02-11 06:43:09 +00:00
|
|
|
external_ipv6,
|
2024-02-12 16:11:29 +00:00
|
|
|
echo,
|
2024-02-11 06:43:09 +00:00
|
|
|
payload,
|
|
|
|
)
|
2024-02-12 16:11:29 +00:00
|
|
|
.await
|
|
|
|
{
|
|
|
|
trace!("icmp6 echo failed: {}", error);
|
2024-02-11 06:43:09 +00:00
|
|
|
}
|
2024-02-12 16:11:29 +00:00
|
|
|
});
|
2024-02-11 06:43:09 +00:00
|
|
|
}
|
|
|
|
|
2024-02-11 10:07:47 +00:00
|
|
|
context.reclaim().await?;
|
|
|
|
|
2024-02-11 06:43:09 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2024-02-12 16:11:29 +00:00
|
|
|
|
|
|
|
async fn process_echo_ipv4(
|
|
|
|
context: NatHandlerContext,
|
|
|
|
client: IcmpClient,
|
|
|
|
external_ipv4: Ipv4Addr,
|
|
|
|
echo: IcmpEchoHeader,
|
|
|
|
payload: Vec<u8>,
|
|
|
|
) -> Result<()> {
|
|
|
|
let reply = client
|
|
|
|
.ping4(
|
|
|
|
external_ipv4,
|
|
|
|
echo.id,
|
|
|
|
echo.seq,
|
|
|
|
&payload,
|
|
|
|
Duration::from_secs(ICMP_PING_TIMEOUT_SECS),
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
let Some(IcmpReply::Icmpv4 {
|
|
|
|
header: _,
|
|
|
|
echo,
|
|
|
|
payload,
|
|
|
|
}) = reply
|
|
|
|
else {
|
|
|
|
return Ok(());
|
|
|
|
};
|
|
|
|
|
|
|
|
let packet = PacketBuilder::ethernet2(context.key.local_mac.0, context.key.client_mac.0);
|
|
|
|
let packet = match (context.key.external_ip.addr, context.key.client_ip.addr) {
|
|
|
|
(IpAddress::Ipv4(external_addr), IpAddress::Ipv4(client_addr)) => {
|
|
|
|
packet.ipv4(external_addr.0, client_addr.0, 20)
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
return Err(anyhow!("IP endpoint mismatch"));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
let packet = packet.icmpv4_echo_reply(echo.id, echo.seq);
|
|
|
|
let mut buffer: Vec<u8> = Vec::new();
|
|
|
|
packet.write(&mut buffer, &payload)?;
|
2024-02-12 17:01:47 +00:00
|
|
|
if let Err(error) = context.try_send(buffer.as_slice().into()) {
|
2024-02-12 16:11:29 +00:00
|
|
|
debug!("failed to transmit icmp packet: {}", error);
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn process_echo_ipv6(
|
|
|
|
context: NatHandlerContext,
|
|
|
|
client: IcmpClient,
|
|
|
|
external_ipv6: Ipv6Addr,
|
|
|
|
echo: IcmpEchoHeader,
|
|
|
|
payload: Vec<u8>,
|
|
|
|
) -> Result<()> {
|
|
|
|
let reply = client
|
|
|
|
.ping6(
|
|
|
|
external_ipv6,
|
|
|
|
echo.id,
|
|
|
|
echo.seq,
|
|
|
|
&payload,
|
|
|
|
Duration::from_secs(ICMP_PING_TIMEOUT_SECS),
|
|
|
|
)
|
|
|
|
.await?;
|
|
|
|
let Some(IcmpReply::Icmpv6 {
|
|
|
|
header: _,
|
|
|
|
echo,
|
|
|
|
payload,
|
|
|
|
}) = reply
|
|
|
|
else {
|
|
|
|
return Ok(());
|
|
|
|
};
|
|
|
|
|
|
|
|
let packet = PacketBuilder::ethernet2(context.key.local_mac.0, context.key.client_mac.0);
|
|
|
|
let packet = match (context.key.external_ip.addr, context.key.client_ip.addr) {
|
|
|
|
(IpAddress::Ipv6(external_addr), IpAddress::Ipv6(client_addr)) => {
|
|
|
|
packet.ipv6(external_addr.0, client_addr.0, 20)
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
return Err(anyhow!("IP endpoint mismatch"));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
let packet = packet.icmpv6_echo_reply(echo.id, echo.seq);
|
|
|
|
let mut buffer: Vec<u8> = Vec::new();
|
|
|
|
packet.write(&mut buffer, &payload)?;
|
2024-02-12 17:01:47 +00:00
|
|
|
if let Err(error) = context.try_send(buffer.as_slice().into()) {
|
2024-02-12 16:11:29 +00:00
|
|
|
debug!("failed to transmit icmp packet: {}", error);
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
2024-02-10 15:18:12 +00:00
|
|
|
}
|