| /* |
| * Copyright 2011 Daniel Drown |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| * translate.c - CLAT functions / partial implementation of rfc6145 |
| */ |
| #include <string.h> |
| |
| #include <netinet/in.h> |
| #include <netinet/ip.h> |
| #include <netinet/ip_icmp.h> |
| #include <netinet/udp.h> |
| #include <netinet/tcp.h> |
| #include <netinet/ip6.h> |
| #include <netinet/icmp6.h> |
| #include <linux/icmp.h> |
| |
| #include "icmp.h" |
| #include "translate.h" |
| #include "checksum.h" |
| #include "clatd.h" |
| #include "config.h" |
| #include "logging.h" |
| #include "debug.h" |
| |
| /* function: packet_checksum |
| * calculates the checksum over all the packet components starting from pos |
| * checksum - checksum of packet components before pos |
| * packet - packet to calculate the checksum of |
| * pos - position to start counting from |
| * returns - the completed 16-bit checksum, ready to write into a checksum header field |
| */ |
| uint16_t packet_checksum(uint32_t checksum, clat_packet packet, int pos) { |
| int i; |
| for (i = pos; i < CLAT_POS_MAX; i++) { |
| if (packet[i].iov_len > 0) { |
| checksum = ip_checksum_add(checksum, packet[i].iov_base, packet[i].iov_len); |
| } |
| } |
| return ip_checksum_finish(checksum); |
| } |
| |
| /* function: packet_length |
| * returns the total length of all the packet components after pos |
| * packet - packet to calculate the length of |
| * pos - position to start counting after |
| * returns: the total length of the packet components after pos |
| */ |
| uint16_t packet_length(clat_packet packet, int pos) { |
| size_t len = 0; |
| int i; |
| for (i = pos + 1; i < CLAT_POS_MAX; i++) { |
| len += packet[i].iov_len; |
| } |
| return len; |
| } |
| |
| /* function: is_in_plat_subnet |
| * returns true iff the given IPv6 address is in the plat subnet. |
| * addr - IPv6 address |
| */ |
| int is_in_plat_subnet(const struct in6_addr *addr6) { |
| // Assumes a /96 plat subnet. |
| return (addr6 != NULL) && (memcmp(addr6, &Global_Clatd_Config.plat_subnet, 12) == 0); |
| } |
| |
| /* function: ipv6_addr_to_ipv4_addr |
| * return the corresponding ipv4 address for the given ipv6 address |
| * addr6 - ipv6 address |
| * returns: the IPv4 address |
| */ |
| uint32_t ipv6_addr_to_ipv4_addr(const struct in6_addr *addr6) { |
| if (is_in_plat_subnet(addr6)) { |
| // Assumes a /96 plat subnet. |
| return addr6->s6_addr32[3]; |
| } else if (IN6_ARE_ADDR_EQUAL(addr6, &Global_Clatd_Config.ipv6_local_subnet)) { |
| // Special-case our own address. |
| return Global_Clatd_Config.ipv4_local_subnet.s_addr; |
| } else { |
| // Third party packet. Let the caller deal with it. |
| return INADDR_NONE; |
| } |
| } |
| |
| /* function: ipv4_addr_to_ipv6_addr |
| * return the corresponding ipv6 address for the given ipv4 address |
| * addr4 - ipv4 address |
| */ |
| struct in6_addr ipv4_addr_to_ipv6_addr(uint32_t addr4) { |
| struct in6_addr addr6; |
| // Both addresses are in network byte order (addr4 comes from a network packet, and the config |
| // file entry is read using inet_ntop). |
| if (addr4 == Global_Clatd_Config.ipv4_local_subnet.s_addr) { |
| return Global_Clatd_Config.ipv6_local_subnet; |
| } else { |
| // Assumes a /96 plat subnet. |
| addr6 = Global_Clatd_Config.plat_subnet; |
| addr6.s6_addr32[3] = addr4; |
| return addr6; |
| } |
| } |
| |
| /* function: fill_tun_header |
| * fill in the header for the tun fd |
| * tun_header - tunnel header, already allocated |
| * proto - ethernet protocol id: ETH_P_IP(ipv4) or ETH_P_IPV6(ipv6) |
| */ |
| void fill_tun_header(struct tun_pi *tun_header, uint16_t proto) { |
| tun_header->flags = 0; |
| tun_header->proto = htons(proto); |
| } |
| |
| /* function: fill_ip_header |
| * generate an ipv4 header from an ipv6 header |
| * ip_targ - (ipv4) target packet header, source: original ipv4 addr, dest: local subnet addr |
| * payload_len - length of other data inside packet |
| * protocol - protocol number (tcp, udp, etc) |
| * old_header - (ipv6) source packet header, source: nat64 prefix, dest: local subnet prefix |
| */ |
| void fill_ip_header(struct iphdr *ip, uint16_t payload_len, uint8_t protocol, |
| const struct ip6_hdr *old_header) { |
| int ttl_guess; |
| memset(ip, 0, sizeof(struct iphdr)); |
| |
| ip->ihl = 5; |
| ip->version = 4; |
| ip->tos = 0; |
| ip->tot_len = htons(sizeof(struct iphdr) + payload_len); |
| ip->id = 0; |
| ip->frag_off = htons(IP_DF); |
| ip->ttl = old_header->ip6_hlim; |
| ip->protocol = protocol; |
| ip->check = 0; |
| |
| ip->saddr = ipv6_addr_to_ipv4_addr(&old_header->ip6_src); |
| ip->daddr = ipv6_addr_to_ipv4_addr(&old_header->ip6_dst); |
| |
| // Third-party ICMPv6 message. This may have been originated by an native IPv6 address. |
| // In that case, the source IPv6 address can't be translated and we need to make up an IPv4 |
| // source address. For now, use 255.0.0.<ttl>, which at least looks useful in traceroute. |
| if ((uint32_t) ip->saddr == INADDR_NONE) { |
| ttl_guess = icmp_guess_ttl(old_header->ip6_hlim); |
| ip->saddr = htonl((0xff << 24) + ttl_guess); |
| } |
| } |
| |
| /* function: fill_ip6_header |
| * generate an ipv6 header from an ipv4 header |
| * ip6 - (ipv6) target packet header, source: local subnet prefix, dest: nat64 prefix |
| * payload_len - length of other data inside packet |
| * protocol - protocol number (tcp, udp, etc) |
| * old_header - (ipv4) source packet header, source: local subnet addr, dest: internet's ipv4 addr |
| */ |
| void fill_ip6_header(struct ip6_hdr *ip6, uint16_t payload_len, uint8_t protocol, |
| const struct iphdr *old_header) { |
| memset(ip6, 0, sizeof(struct ip6_hdr)); |
| |
| ip6->ip6_vfc = 6 << 4; |
| ip6->ip6_plen = htons(payload_len); |
| ip6->ip6_nxt = protocol; |
| ip6->ip6_hlim = old_header->ttl; |
| |
| ip6->ip6_src = ipv4_addr_to_ipv6_addr(old_header->saddr); |
| ip6->ip6_dst = ipv4_addr_to_ipv6_addr(old_header->daddr); |
| } |
| |
| /* function: icmp_to_icmp6 |
| * translate ipv4 icmp to ipv6 icmp |
| * out - output packet |
| * icmp - source packet icmp header |
| * checksum - pseudo-header checksum |
| * payload - icmp payload |
| * payload_size - size of payload |
| * returns: the highest position in the output clat_packet that's filled in |
| */ |
| int icmp_to_icmp6(clat_packet out, int pos, const struct icmphdr *icmp, uint32_t checksum, |
| const char *payload, size_t payload_size) { |
| struct icmp6_hdr *icmp6_targ = out[pos].iov_base; |
| uint8_t icmp6_type; |
| int clat_packet_len; |
| |
| memset(icmp6_targ, 0, sizeof(struct icmp6_hdr)); |
| |
| icmp6_type = icmp_to_icmp6_type(icmp->type, icmp->code); |
| icmp6_targ->icmp6_type = icmp6_type; |
| icmp6_targ->icmp6_code = icmp_to_icmp6_code(icmp->type, icmp->code); |
| |
| out[pos].iov_len = sizeof(struct icmp6_hdr); |
| |
| if (pos == CLAT_POS_TRANSPORTHDR && |
| is_icmp_error(icmp->type) && |
| icmp6_type != ICMP6_PARAM_PROB) { |
| // An ICMP error we understand, one level deep. |
| // Translate the nested packet (the one that caused the error). |
| clat_packet_len = ipv4_packet(out, pos + 1, payload, payload_size); |
| |
| // The pseudo-header checksum was calculated on the transport length of the original IPv4 |
| // packet that we were asked to translate. This transport length is 20 bytes smaller than it |
| // needs to be, because the ICMP error contains an IPv4 header, which we will be translating to |
| // an IPv6 header, which is 20 bytes longer. Fix it up here. This is simpler than the |
| // alternative, which is to always update the pseudo-header checksum in all UDP/TCP/ICMP |
| // translation functions (rather than pre-calculating it when translating the IPv4 header). |
| // We only need to do this for ICMP->ICMPv6, not ICMPv6->ICMP, because ICMP does not use the |
| // pseudo-header when calculating its checksum (as the IPv4 header has its own checksum). |
| checksum = htonl(ntohl(checksum) + 20); |
| } else if (icmp6_type == ICMP6_ECHO_REQUEST || icmp6_type == ICMP6_ECHO_REPLY) { |
| // Ping packet. |
| icmp6_targ->icmp6_id = icmp->un.echo.id; |
| icmp6_targ->icmp6_seq = icmp->un.echo.sequence; |
| out[CLAT_POS_PAYLOAD].iov_base = (char *) payload; |
| out[CLAT_POS_PAYLOAD].iov_len = payload_size; |
| clat_packet_len = CLAT_POS_PAYLOAD + 1; |
| } else { |
| // Unknown type/code. The type/code conversion functions have already logged an error. |
| return 0; |
| } |
| |
| icmp6_targ->icmp6_cksum = 0; // Checksum field must be 0 when calculating checksum. |
| icmp6_targ->icmp6_cksum = packet_checksum(checksum, out, pos); |
| |
| return clat_packet_len; |
| } |
| |
| /* function: icmp6_to_icmp |
| * translate ipv6 icmp to ipv4 icmp |
| * out - output packet |
| * icmp6 - source packet icmp6 header |
| * payload - icmp6 payload |
| * payload_size - size of payload |
| * returns: the highest position in the output clat_packet that's filled in |
| */ |
| int icmp6_to_icmp(clat_packet out, int pos, const struct icmp6_hdr *icmp6, |
| const char *payload, size_t payload_size) { |
| struct icmphdr *icmp_targ = out[pos].iov_base; |
| uint8_t icmp_type; |
| int ttl; |
| int clat_packet_len; |
| |
| memset(icmp_targ, 0, sizeof(struct icmphdr)); |
| |
| icmp_type = icmp6_to_icmp_type(icmp6->icmp6_type, icmp6->icmp6_code); |
| icmp_targ->type = icmp_type; |
| icmp_targ->code = icmp6_to_icmp_code(icmp6->icmp6_type, icmp6->icmp6_code); |
| |
| out[pos].iov_len = sizeof(struct icmphdr); |
| |
| if (pos == CLAT_POS_TRANSPORTHDR && |
| is_icmp6_error(icmp6->icmp6_type) && |
| icmp_type != ICMP_PARAMETERPROB) { |
| // An ICMPv6 error we understand, one level deep. |
| // Translate the nested packet (the one that caused the error). |
| clat_packet_len = ipv6_packet(out, pos + 1, payload, payload_size); |
| } else if (icmp_type == ICMP_ECHO || icmp_type == ICMP_ECHOREPLY) { |
| // Ping packet. |
| icmp_targ->un.echo.id = icmp6->icmp6_id; |
| icmp_targ->un.echo.sequence = icmp6->icmp6_seq; |
| out[CLAT_POS_PAYLOAD].iov_base = (char *) payload; |
| out[CLAT_POS_PAYLOAD].iov_len = payload_size; |
| clat_packet_len = CLAT_POS_PAYLOAD + 1; |
| } else { |
| // Unknown type/code. The type/code conversion functions have already logged an error. |
| return 0; |
| } |
| |
| icmp_targ->checksum = 0; // Checksum field must be 0 when calculating checksum. |
| icmp_targ->checksum = packet_checksum(0, out, pos); |
| |
| return clat_packet_len; |
| } |
| |
| /* function: udp_packet |
| * takes a udp packet and sets it up for translation |
| * out - output packet |
| * udp - pointer to udp header in packet |
| * checksum - pseudo-header checksum |
| * len - size of ip payload |
| */ |
| int udp_packet(clat_packet out, int pos, const struct udphdr *udp, uint32_t checksum, size_t len) { |
| const char *payload; |
| size_t payload_size; |
| |
| if(len < sizeof(struct udphdr)) { |
| logmsg_dbg(ANDROID_LOG_ERROR,"udp_packet/(too small)"); |
| return 0; |
| } |
| |
| payload = (const char *) (udp + 1); |
| payload_size = len - sizeof(struct udphdr); |
| |
| return udp_translate(out, pos, udp, checksum, payload, payload_size); |
| } |
| |
| /* function: tcp_packet |
| * takes a tcp packet and sets it up for translation |
| * out - output packet |
| * tcp - pointer to tcp header in packet |
| * checksum - pseudo-header checksum |
| * len - size of ip payload |
| * returns: the highest position in the output clat_packet that's filled in |
| */ |
| int tcp_packet(clat_packet out, int pos, const struct tcphdr *tcp, uint32_t checksum, size_t len) { |
| const char *payload; |
| size_t payload_size, header_size; |
| |
| if(len < sizeof(struct tcphdr)) { |
| logmsg_dbg(ANDROID_LOG_ERROR,"tcp_packet/(too small)"); |
| return 0; |
| } |
| |
| if(tcp->doff < 5) { |
| logmsg_dbg(ANDROID_LOG_ERROR,"tcp_packet/tcp header length set to less than 5: %x", tcp->doff); |
| return 0; |
| } |
| |
| if((size_t) tcp->doff*4 > len) { |
| logmsg_dbg(ANDROID_LOG_ERROR,"tcp_packet/tcp header length set too large: %x", tcp->doff); |
| return 0; |
| } |
| |
| header_size = tcp->doff * 4; |
| payload = ((const char *) tcp) + header_size; |
| payload_size = len - header_size; |
| |
| return tcp_translate(out, pos, tcp, header_size, checksum, payload, payload_size); |
| } |
| |
| /* function: udp_translate |
| * common between ipv4/ipv6 - setup checksum and send udp packet |
| * out - output packet |
| * udp - udp header |
| * checksum - pseudo-header checksum |
| * payload - tcp payload |
| * payload_size - size of payload |
| * returns: the highest position in the output clat_packet that's filled in |
| */ |
| int udp_translate(clat_packet out, int pos, const struct udphdr *udp, uint32_t checksum, |
| const char *payload, size_t payload_size) { |
| struct udphdr *udp_targ = out[pos].iov_base; |
| |
| memcpy(udp_targ, udp, sizeof(struct udphdr)); |
| |
| out[pos].iov_len = sizeof(struct udphdr); |
| out[CLAT_POS_PAYLOAD].iov_base = (char *) payload; |
| out[CLAT_POS_PAYLOAD].iov_len = payload_size; |
| |
| udp_targ->check = 0; // Checksum field must be 0 when calculating checksum. |
| udp_targ->check = packet_checksum(checksum, out, pos); |
| |
| return CLAT_POS_PAYLOAD + 1; |
| } |
| |
| /* function: tcp_translate |
| * common between ipv4/ipv6 - setup checksum and send tcp packet |
| * out - output packet |
| * tcp - tcp header |
| * header_size - size of tcp header including options |
| * checksum - partial checksum covering ipv4/ipv6 header |
| * payload - tcp payload |
| * payload_size - size of payload |
| * returns: the highest position in the output clat_packet that's filled in |
| * |
| * TODO: mss rewrite |
| * TODO: hosts without pmtu discovery - non DF packets will rely on fragmentation (unimplemented) |
| */ |
| int tcp_translate(clat_packet out, int pos, const struct tcphdr *tcp, size_t header_size, |
| uint32_t checksum, const char *payload, size_t payload_size) { |
| struct tcphdr *tcp_targ = out[pos].iov_base; |
| out[pos].iov_len = header_size; |
| |
| if (header_size > MAX_TCP_HDR) { |
| // A TCP header cannot be more than MAX_TCP_HDR bytes long because it's a 4-bit field that |
| // counts in 4-byte words. So this can never happen unless there is a bug in the caller. |
| logmsg(ANDROID_LOG_ERROR, "tcp_translate: header too long %d > %d, truncating", |
| header_size, MAX_TCP_HDR); |
| header_size = MAX_TCP_HDR; |
| } |
| |
| memcpy(tcp_targ, tcp, header_size); |
| |
| out[CLAT_POS_PAYLOAD].iov_base = (char *)payload; |
| out[CLAT_POS_PAYLOAD].iov_len = payload_size; |
| |
| tcp_targ->check = 0; // Checksum field must be 0 when calculating checksum. |
| tcp_targ->check = packet_checksum(checksum, out, pos); |
| |
| return CLAT_POS_PAYLOAD + 1; |
| } |