#define _GNU_SOURCE #include "nfqws.h" #include "sec.h" #include "desync.h" #include "helpers.h" #include "checksum.h" #include "params.h" #include "protocol.h" #include "hostlist.h" #include "gzip.h" #include "pools.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef __linux__ #include #define NF_DROP 0 #define NF_ACCEPT 1 #endif #define CTRACK_T_SYN 60 #define CTRACK_T_FIN 60 #define CTRACK_T_EST 300 #define CTRACK_T_UDP 60 struct params_s params; static bool bHup = false; static void onhup(int sig) { printf("HUP received !\n"); if (params.hostlist || params.hostlist_exclude) printf("Will reload hostlist on next request\n"); bHup = true; } // should be called in normal execution static void dohup(void) { if (bHup) { if (!LoadIncludeHostLists() || !LoadExcludeHostLists()) { // what will we do without hostlist ?? sure, gonna die exit(1); } bHup = false; } } static void onusr1(int sig) { printf("\nCONNTRACK DUMP\n"); ConntrackPoolDump(¶ms.conntrack); printf("\n"); } static void onusr2(int sig) { printf("\nHOSTFAIL POOL DUMP\n"); HostFailPoolDump(params.hostlist_auto_fail_counters); printf("\n"); } static uint8_t processPacketData(uint32_t *mark, const char *ifout, uint8_t *data_pkt, size_t *len_pkt) { struct ip *ip = NULL; struct ip6_hdr *ip6hdr = NULL; struct tcphdr *tcphdr = NULL; struct udphdr *udphdr = NULL; size_t len = *len_pkt, len_with_th; uint8_t *data = data_pkt; uint8_t res = VERDICT_PASS; uint8_t proto; #ifdef __linux__ if (*mark & params.desync_fwmark) { DLOG("ignoring generated packet\n") return res; } #endif if (proto_check_ipv4(data, len)) { ip = (struct ip *) data; proto = ip->ip_p; proto_skip_ipv4(&data, &len); if (params.debug) { printf("IP4: "); print_ip(ip); } } else if (proto_check_ipv6(data, len)) { ip6hdr = (struct ip6_hdr *) data; proto_skip_ipv6(&data, &len, &proto, NULL); if (params.debug) { printf("IP6: "); print_ip6hdr(ip6hdr, proto); } } else { // not ipv6 and not ipv4 return res; } if (proto==IPPROTO_TCP && proto_check_tcp(data, len)) { tcphdr = (struct tcphdr *) data; len_with_th = len; proto_skip_tcp(&data, &len); if (params.debug) { printf(" "); print_tcphdr(tcphdr); printf("\n"); } if (len) { DLOG("TCP: ") hexdump_limited_dlog(data, len, 32); DLOG("\n") } res = dpi_desync_tcp_packet(*mark, ifout, data_pkt, len_pkt, ip, ip6hdr, tcphdr, len_with_th, data, len); // in my FreeBSD divert tests only ipv4 packets were reinjected with correct checksum // ipv6 packets were with incorrect checksum #ifdef __FreeBSD__ // FreeBSD tend to pass ipv6 frames with wrong checksum if (!(res & VERDICT_NOCSUM) && ((res & VERDICT_MASK)==VERDICT_MODIFY || ip6hdr && (res & VERDICT_MASK)==VERDICT_PASS)) #else if (!(res & VERDICT_NOCSUM) && (res & VERDICT_MASK)==VERDICT_MODIFY) #endif tcp_fix_checksum(tcphdr,len_with_th,ip,ip6hdr); } else if (proto==IPPROTO_UDP && proto_check_udp(data, len)) { udphdr = (struct udphdr *) data; len_with_th = len; proto_skip_udp(&data, &len); if (params.debug) { printf(" "); print_udphdr(udphdr); printf("\n"); } if (len) { DLOG("UDP: ") hexdump_limited_dlog(data, len, 32); DLOG("\n") } res = dpi_desync_udp_packet(*mark, ifout, data_pkt, len_pkt, ip, ip6hdr, udphdr, data, len); #ifdef __FreeBSD__ // FreeBSD tend to pass ipv6 frames with wrong checksum if (!(res & VERDICT_NOCSUM) && ((res & VERDICT_MASK)==VERDICT_MODIFY || ip6hdr && (res & VERDICT_MASK)==VERDICT_PASS)) #else if (!(res & VERDICT_NOCSUM) && (res & VERDICT_MASK)==VERDICT_MODIFY) #endif udp_fix_checksum(udphdr,len_with_th,ip,ip6hdr); } else { if (params.debug) printf("\n"); } return res; } #ifdef __linux__ static int nfq_cb(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct nfq_data *nfa, void *cookie) { int id, ilen; size_t len; struct nfqnl_msg_packet_hdr *ph; uint8_t *data; uint32_t ifidx; char ifout[IFNAMSIZ+1]; ph = nfq_get_msg_packet_hdr(nfa); id = ph ? ntohl(ph->packet_id) : 0; uint32_t mark = nfq_get_nfmark(nfa); ilen = nfq_get_payload(nfa, &data); *ifout=0; if (params.bind_fix4 || params.bind_fix6) { ifidx = nfq_get_outdev(nfa); if (ifidx) if_indextoname(ifidx,ifout); DLOG("packet: id=%d len=%d mark=%08X ifout=%s(%u)\n", id, ilen, mark, ifout, ifidx) } else // save some syscalls DLOG("packet: id=%d len=%d mark=%08X\n", id, ilen, mark) if (ilen >= 0) { len = ilen; uint8_t res = processPacketData(&mark, ifout, data, &len); switch(res & VERDICT_MASK) { case VERDICT_MODIFY: DLOG("packet: id=%d pass modified. len=%zu\n", id, len); return nfq_set_verdict2(qh, id, NF_ACCEPT, mark, (uint32_t)len, data); case VERDICT_DROP: DLOG("packet: id=%d drop\n", id); return nfq_set_verdict2(qh, id, NF_DROP, mark, 0, NULL); } } DLOG("packet: id=%d pass unmodified\n", id); return nfq_set_verdict2(qh, id, NF_ACCEPT, mark, 0, NULL); } static int nfq_main(void) { struct nfq_handle *h = NULL; struct nfq_q_handle *qh = NULL; int fd,rv; uint8_t buf[16384] __attribute__((aligned)); printf("opening library handle\n"); h = nfq_open(); if (!h) { perror("nfq_open()"); goto exiterr; } printf("unbinding existing nf_queue handler for AF_INET (if any)\n"); if (nfq_unbind_pf(h, AF_INET) < 0) { perror("nfq_unbind_pf()"); goto exiterr; } printf("binding nfnetlink_queue as nf_queue handler for AF_INET\n"); if (nfq_bind_pf(h, AF_INET) < 0) { perror("nfq_bind_pf()"); goto exiterr; } printf("binding this socket to queue '%u'\n", params.qnum); qh = nfq_create_queue(h, params.qnum, &nfq_cb, ¶ms); if (!qh) { perror("nfq_create_queue()"); goto exiterr; } printf("setting copy_packet mode\n"); if (nfq_set_mode(qh, NFQNL_COPY_PACKET, 0xffff) < 0) { perror("can't set packet_copy mode"); goto exiterr; } if (nfq_set_queue_maxlen(qh, Q_MAXLEN) < 0) { perror("can't set queue maxlen"); goto exiterr; } // accept packets if they cant be handled if (nfq_set_queue_flags(qh, NFQA_CFG_F_FAIL_OPEN , NFQA_CFG_F_FAIL_OPEN)) { fprintf(stderr, "can't set queue flags. its OK on linux <3.6\n"); // dot not fail. not supported on old linuxes <3.6 } printf("initializing raw sockets bind-fix4=%u bind-fix6=%u\n",params.bind_fix4,params.bind_fix6); if (!rawsend_preinit(params.bind_fix4,params.bind_fix6)) goto exiterr; sec_harden(); if (params.droproot && !droproot(params.uid, params.gid)) goto exiterr; print_id(); signal(SIGHUP, onhup); signal(SIGUSR1, onusr1); signal(SIGUSR2, onusr2); desync_init(); fd = nfq_fd(h); // increase socket buffer size. on slow systems reloading hostlist can take a while. // if too many unhandled packets are received its possible to get "no buffer space available" error if (!set_socket_buffers(fd,Q_RCVBUF/2,Q_SNDBUF/2)) goto exiterr; do { while ((rv = recv(fd, buf, sizeof(buf), 0)) > 0) { dohup(); int r = nfq_handle_packet(h, buf, rv); if (r) fprintf(stderr, "nfq_handle_packet error %d\n", r); } fprintf(stderr, "recv: errno %d\n",errno); perror("recv"); // do not fail on ENOBUFS } while(errno==ENOBUFS); printf("unbinding from queue %u\n", params.qnum); nfq_destroy_queue(qh); #ifdef INSANE /* normally, applications SHOULD NOT issue this command, since * it detaches other programs/sockets from AF_INET, too ! */ printf("unbinding from AF_INET\n"); nfq_unbind_pf(h, AF_INET); #endif printf("closing library handle\n"); nfq_close(h); return 0; exiterr: if (qh) nfq_destroy_queue(qh); if (h) nfq_close(h); return 1; } #elif defined(BSD) static int dvt_main(void) { uint8_t buf[16384] __attribute__((aligned)); struct sockaddr_storage sa_from; int fd[2] = {-1,-1}; // 4,6 int i,r,res=1,fdct=1,fdmax; unsigned int id=0; socklen_t socklen; ssize_t rd,wr; fd_set fdset; { struct sockaddr_in bp4; bp4.sin_family = AF_INET; bp4.sin_port = htons(params.port); bp4.sin_addr.s_addr = INADDR_ANY; printf("creating divert4 socket\n"); fd[0] = socket_divert(AF_INET); if (fd[0] == -1) { perror("socket (DIVERT4)"); goto exiterr; } printf("binding divert4 socket\n"); if (bind(fd[0], (struct sockaddr*)&bp4, sizeof(bp4)) < 0) { perror("bind (DIVERT4)"); goto exiterr; } if (!set_socket_buffers(fd[0],Q_RCVBUF,Q_SNDBUF)) goto exiterr; } #ifdef __OpenBSD__ { // in OpenBSD must use separate divert sockets for ipv4 and ipv6 struct sockaddr_in6 bp6; memset(&bp6,0,sizeof(bp6)); bp6.sin6_family = AF_INET6; bp6.sin6_port = htons(params.port); printf("creating divert6 socket\n"); fd[1] = socket_divert(AF_INET6); if (fd[1] == -1) { perror("socket (DIVERT6)"); goto exiterr; } printf("binding divert6 socket\n"); if (bind(fd[1], (struct sockaddr*)&bp6, sizeof(bp6)) < 0) { perror("bind (DIVERT6)"); goto exiterr; } fdct++; if (!set_socket_buffers(fd[1],Q_RCVBUF,Q_SNDBUF)) goto exiterr; } #endif fdmax = (fd[0]>fd[1] ? fd[0] : fd[1]) + 1; printf("initializing raw sockets\n"); if (!rawsend_preinit(false,false)) goto exiterr; if (params.droproot && !droproot(params.uid, params.gid)) goto exiterr; print_id(); signal(SIGHUP, onhup); signal(SIGUSR1, onusr1); desync_init(); for(;;) { FD_ZERO(&fdset); for(i=0;i0) { uint32_t mark=0; uint8_t res; size_t len = rd; DLOG("packet: id=%u len=%zu\n", id, len) res = processPacketData(&mark, NULL, buf, &len); switch (res & VERDICT_MASK) { case VERDICT_PASS: case VERDICT_MODIFY: if ((res & VERDICT_MASK)==VERDICT_PASS) DLOG("packet: id=%u reinject unmodified\n", id) else DLOG("packet: id=%u reinject modified len=%zu\n", id, len) wr = sendto(fd[i], buf, len, 0, (struct sockaddr*)&sa_from, socklen); if (wr<0) perror("reinject sendto"); else if (wr!=len) fprintf(stderr,"reinject sendto: not all data was reinjected. received %zu, sent %zd\n", len, wr); break; default: DLOG("packet: id=%u drop\n", id); } id++; } else { DLOG("unexpected zero size recvfrom\n") } } } } res=0; exiterr: if (fd[0]!=-1) close(fd[0]); if (fd[1]!=-1) close(fd[1]); return res; } #endif static bool parse_ws_scale_factor(char *s, uint16_t *wsize, uint8_t *wscale) { int v; char *p; if ((p = strchr(s,':'))) *p++=0; v = atoi(s); if (v < 0 || v>65535) { fprintf(stderr, "bad wsize\n"); return false; } *wsize=(uint16_t)v; if (p && *p) { v = atoi(p); if (v < 0 || v>255) { fprintf(stderr, "bad wscale\n"); return false; } *wscale = (uint8_t)v; } return true; } static void exithelp(void) { printf( " --debug=0|1\n" #ifdef __linux__ " --qnum=\n" #elif defined(BSD) " --port=\t\t\t\t\t; divert port\n" #endif " --daemon\t\t\t\t\t; daemonize\n" " --pidfile=\t\t\t\t; write pid to file\n" " --user=\t\t\t\t; drop root privs\n" " --uid=uid[:gid]\t\t\t\t; drop root privs\n" #ifdef __linux__ " --bind-fix4\t\t\t\t\t; apply outgoing interface selection fix for generated ipv4 packets\n" " --bind-fix6\t\t\t\t\t; apply outgoing interface selection fix for generated ipv6 packets\n" #endif " --wsize=[:]\t\t; set window size. 0 = do not modify. OBSOLETE !\n" " --wssize=[:]\t; set window size for server. 0 = do not modify. default scale_factor = 0.\n" " --wssize-cutoff=[n|d|s]N\t\t\t; apply server wsize only to packet numbers (n, default), data packet numbers (d), relative sequence (s) less than N\n" " --ctrack-timeouts=S:E:F[:U]\t\t\t; internal conntrack timeouts for TCP SYN, ESTABLISHED, FIN stages, UDP timeout. default %u:%u:%u:%u\n" " --hostcase\t\t\t\t\t; change Host: => host:\n" " --hostspell\t\t\t\t\t; exact spelling of \"Host\" header. must be 4 chars. default is \"host\"\n" " --hostnospace\t\t\t\t\t; remove space after Host: and add it to User-Agent: to preserve packet size\n" " --domcase\t\t\t\t\t; mix domain case : Host: TeSt.cOm\n" " --dpi-desync=[,][,]\t; try to desync dpi state. modes : synack syndata fake fakeknown rst rstack hopbyhop destopt ipfrag1 disorder disorder2 split split2 ipfrag2 udplen tamper\n" #ifdef __linux__ " --dpi-desync-fwmark=\t\t; override fwmark for desync packet. default = 0x%08X (%u)\n" #elif defined(SO_USER_COOKIE) " --dpi-desync-sockarg=\t\t; override sockarg (SO_USER_COOKIE) for desync packet. default = 0x%08X (%u)\n" #endif " --dpi-desync-ttl=\t\t\t\t; set ttl for desync packet\n" " --dpi-desync-ttl6=\t\t\t; set ipv6 hop limit for desync packet. by default ttl value is used.\n" " --dpi-desync-autottl=[[:[-]]]\t; auto ttl mode for both ipv4 and ipv6. default: %u:%u-%u\n" " --dpi-desync-autottl6=[[:[-]]] ; overrides --dpi-desync-autottl for ipv6 only\n" " --dpi-desync-fooling=[,]\t\t; can use multiple comma separated values. modes : none md5sig ts badseq badsum datanoack hopbyhop hopbyhop2\n" #ifdef __linux__ " --dpi-desync-retrans=0|1\t\t\t; 0(default)=reinject original data packet after fake 1=drop original data packet to force its retransmission\n" #endif " --dpi-desync-repeats=\t\t\t; send every desync packet N times\n" " --dpi-desync-skip-nosni=0|1\t\t\t; 1(default)=do not act on ClientHello without SNI (ESNI ?)\n" " --dpi-desync-split-pos=<1..%u>\t\t; data payload split position\n" " --dpi-desync-ipfrag-pos-tcp=<8..%u>\t\t; ip frag position starting from the transport header. multiple of 8, default %u.\n" " --dpi-desync-ipfrag-pos-udp=<8..%u>\t\t; ip frag position starting from the transport header. multiple of 8, default %u.\n" " --dpi-desync-badseq-increment=\t; badseq fooling seq signed increment. default %d\n" " --dpi-desync-badack-increment=\t; badseq fooling ackseq signed increment. default %d\n" " --dpi-desync-any-protocol=0|1\t\t\t; 0(default)=desync only http and tls 1=desync any nonempty data packet\n" " --dpi-desync-fake-http=|0xHEX\t; file containing fake http request\n" " --dpi-desync-fake-tls=|0xHEX\t\t; file containing fake TLS ClientHello (for https)\n" " --dpi-desync-fake-unknown=|0xHEX\t; file containing unknown protocol fake payload\n" " --dpi-desync-fake-syndata=|0xHEX\t; file containing SYN data payload\n" " --dpi-desync-fake-quic=|0xHEX\t; file containing fake QUIC Initial\n" " --dpi-desync-fake-wireguard=|0xHEX\t; file containing fake wireguard handshake initiation\n" " --dpi-desync-fake-dht=|0xHEX\t\t; file containing DHT protocol fake payload (d1...e)\n" " --dpi-desync-fake-unknown-udp=|0xHEX\t; file containing unknown udp protocol fake payload\n" " --dpi-desync-udplen-increment=\t\t; increase or decrease udp packet length by N bytes (default %u). negative values decrease length.\n" " --dpi-desync-udplen-pattern=|0xHEX\t; udp tail fill pattern\n" " --dpi-desync-cutoff=[n|d|s]N\t\t\t; apply dpi desync only to packet numbers (n, default), data packet numbers (d), relative sequence (s) less than N\n" " --hostlist=\t\t\t\t; apply dpi desync only to the listed hosts (one host per line, subdomains auto apply, gzip supported, multiple hostlists allowed)\n" " --hostlist-exclude=\t\t\t; do not apply dpi desync to the listed hosts (one host per line, subdomains auto apply, gzip supported, multiple hostlists allowed)\n" " --hostlist-auto=\t\t\t; detect DPI blocks and build hostlist automatically\n" " --hostlist-auto-fail-threshold=\t\t; how many failed attempts cause hostname to be added to auto hostlist (default : %d)\n" " --hostlist-auto-fail-time=\t\t; all failed attemps must be within these seconds (default : %d)\n" " --hostlist-auto-retrans-threshold=\t; how many request retransmissions cause attempt to fail (default : %d)\n" " --hostlist-auto-debug=\t\t; debug auto hostlist positives\n", CTRACK_T_SYN, CTRACK_T_EST, CTRACK_T_FIN, CTRACK_T_UDP, #if defined(__linux__) || defined(SO_USER_COOKIE) DPI_DESYNC_FWMARK_DEFAULT,DPI_DESYNC_FWMARK_DEFAULT, #endif AUTOTTL_DEFAULT_DELTA,AUTOTTL_DEFAULT_MIN,AUTOTTL_DEFAULT_MAX, DPI_DESYNC_MAX_FAKE_LEN, DPI_DESYNC_MAX_FAKE_LEN, IPFRAG_UDP_DEFAULT, DPI_DESYNC_MAX_FAKE_LEN, IPFRAG_TCP_DEFAULT, BADSEQ_INCREMENT_DEFAULT, BADSEQ_ACK_INCREMENT_DEFAULT, UDPLEN_INCREMENT_DEFAULT, HOSTLIST_AUTO_FAIL_THRESHOLD_DEFAULT, HOSTLIST_AUTO_FAIL_TIME_DEFAULT, HOSTLIST_AUTO_RETRANS_THRESHOLD_DEFAULT ); exit(1); } static void cleanup_params(void) { ConntrackPoolDestroy(¶ms.conntrack); strlist_destroy(¶ms.hostlist_files); strlist_destroy(¶ms.hostlist_exclude_files); StrPoolDestroy(¶ms.hostlist_exclude); StrPoolDestroy(¶ms.hostlist); HostFailPoolDestroy(¶ms.hostlist_auto_fail_counters); } static void exithelp_clean(void) { cleanup_params(); exithelp(); } static void exit_clean(int code) { cleanup_params(); exit(code); } static bool parse_cutoff(const char *opt, unsigned int *value, char *mode) { *mode = (*opt=='n' || *opt=='d' || *opt=='s') ? *opt++ : 'n'; return sscanf(opt, "%u", value)>0; } static bool parse_badseq_increment(const char *opt, uint32_t *value) { if ((opt[0]=='0' && opt[1]=='x' || opt[0]=='-' && opt[1]=='0' && opt[2]=='x') && sscanf(opt+2+(opt[0]=='-'), "%X", (int32_t*)value)>0) { if (opt[0]=='-') params.desync_badseq_increment = -params.desync_badseq_increment; return true; } else { return sscanf(opt, "%d", (int32_t*)value)>0; } } static void load_file_or_exit(const char *filename, void *buf, size_t *size) { if (filename[0]=='0' && filename[1]=='x') { if (!parse_hex_str(filename+2,buf,size) || !*size) { fprintf(stderr, "invalid hex string: %s\n",filename+2); exit_clean(1); } DLOG("read %zu bytes from hex string\n",*size) } else { if (!load_file_nonempty(filename,buf,size)) { fprintf(stderr, "could not read %s\n",filename); exit_clean(1); } DLOG("read %zu bytes from %s\n",*size,filename) } } bool parse_autottl(const char *s, autottl *t) { unsigned int delta,min,max; AUTOTTL_SET_DEFAULT(*t); if (s) { max = t->max; switch (sscanf(s,"%u:%u-%u",&delta,&min,&max)) { case 3: if (delta && !max || max>255) return false; t->max=(uint8_t)max; case 2: if (delta && !min || min>255 || min>max) return false; t->min=(uint8_t)min; case 1: if (delta>255) return false; t->delta=(uint8_t)delta; break; default: return false; } } return true; } int main(int argc, char **argv) { int result, v; int option_index = 0; bool daemon = false; char pidfile[256]; srandom(time(NULL)); memset(¶ms, 0, sizeof(params)); memcpy(params.hostspell, "host", 4); // default hostspell *pidfile = 0; params.desync_fwmark = DPI_DESYNC_FWMARK_DEFAULT; params.desync_skip_nosni = true; params.desync_split_pos = 2; params.desync_ipfrag_pos_udp = IPFRAG_UDP_DEFAULT; params.desync_ipfrag_pos_tcp = IPFRAG_TCP_DEFAULT; params.desync_repeats = 1; params.fake_tls_size = sizeof(fake_tls_clienthello_default); memcpy(params.fake_tls,fake_tls_clienthello_default,params.fake_tls_size); params.fake_http_size = strlen(fake_http_request_default); memcpy(params.fake_http,fake_http_request_default,params.fake_http_size); params.fake_quic_size = 620; // must be 601+ for TSPU hack params.fake_quic[0] = 0x40; // russian TSPU QUIC short header fake params.fake_wg_size = 64; params.fake_dht_size = 64; params.fake_unknown_size = 256; params.fake_syndata_size = 16; params.fake_unknown_udp_size = 64; params.wscale=-1; // default - dont change scale factor (client) params.ctrack_t_syn = CTRACK_T_SYN; params.ctrack_t_est = CTRACK_T_EST; params.ctrack_t_fin = CTRACK_T_FIN; params.ctrack_t_udp = CTRACK_T_UDP; params.desync_ttl6 = 0xFF; // unused params.desync_badseq_increment = BADSEQ_INCREMENT_DEFAULT; params.desync_badseq_ack_increment = BADSEQ_ACK_INCREMENT_DEFAULT; params.wssize_cutoff_mode = params.desync_cutoff_mode = 'n'; // packet number by default params.udplen_increment = UDPLEN_INCREMENT_DEFAULT; params.hostlist_auto_fail_threshold = HOSTLIST_AUTO_FAIL_THRESHOLD_DEFAULT; params.hostlist_auto_fail_time = HOSTLIST_AUTO_FAIL_TIME_DEFAULT; params.hostlist_auto_retrans_threshold = HOSTLIST_AUTO_RETRANS_THRESHOLD_DEFAULT; LIST_INIT(¶ms.hostlist_files); LIST_INIT(¶ms.hostlist_exclude_files); if (can_drop_root()) // are we root ? { params.uid = params.gid = 0x7FFFFFFF; // default uid:gid params.droproot = true; } const struct option long_options[] = { {"debug",optional_argument,0,0}, // optidx=0 #ifdef __linux__ {"qnum",required_argument,0,0}, // optidx=1 #elif defined(BSD) {"port",required_argument,0,0}, // optidx=1 #else {"disabled_argument_1",no_argument,0,0},// optidx=1 #endif {"daemon",no_argument,0,0}, // optidx=2 {"pidfile",required_argument,0,0}, // optidx=3 {"user",required_argument,0,0 }, // optidx=4 {"uid",required_argument,0,0 }, // optidx=5 {"wsize",required_argument,0,0}, // optidx=6 {"wssize",required_argument,0,0}, // optidx=7 {"wssize-cutoff",required_argument,0,0},// optidx=8 {"ctrack-timeouts",required_argument,0,0},// optidx=9 {"hostcase",no_argument,0,0}, // optidx=10 {"hostspell",required_argument,0,0}, // optidx=11 {"hostnospace",no_argument,0,0}, // optidx=12 {"domcase",no_argument,0,0 }, // optidx=13 {"dpi-desync",required_argument,0,0}, // optidx=14 #ifdef __linux__ {"dpi-desync-fwmark",required_argument,0,0}, // optidx=15 #elif defined(SO_USER_COOKIE) {"dpi-desync-sockarg",required_argument,0,0}, // optidx=15 #else {"disabled_argument_2",no_argument,0,0}, // optidx=15 #endif {"dpi-desync-ttl",required_argument,0,0}, // optidx=16 {"dpi-desync-ttl6",required_argument,0,0}, // optidx=17 {"dpi-desync-autottl",optional_argument,0,0}, // optidx=18 {"dpi-desync-autottl6",optional_argument,0,0}, // optidx=19 {"dpi-desync-fooling",required_argument,0,0}, // optidx=20 {"dpi-desync-retrans",optional_argument,0,0}, // optidx=21 {"dpi-desync-repeats",required_argument,0,0}, // optidx=22 {"dpi-desync-skip-nosni",optional_argument,0,0},// optidx=23 {"dpi-desync-split-pos",required_argument,0,0},// optidx=24 {"dpi-desync-ipfrag-pos-tcp",required_argument,0,0},// optidx=25 {"dpi-desync-ipfrag-pos-udp",required_argument,0,0},// optidx=26 {"dpi-desync-badseq-increment",required_argument,0,0},// optidx=27 {"dpi-desync-badack-increment",required_argument,0,0},// optidx=28 {"dpi-desync-any-protocol",optional_argument,0,0},// optidx=29 {"dpi-desync-fake-http",required_argument,0,0},// optidx=30 {"dpi-desync-fake-tls",required_argument,0,0},// optidx=31 {"dpi-desync-fake-unknown",required_argument,0,0},// optidx=32 {"dpi-desync-fake-syndata",required_argument,0,0},// optidx=33 {"dpi-desync-fake-quic",required_argument,0,0},// optidx=34 {"dpi-desync-fake-wireguard",required_argument,0,0},// optidx=35 {"dpi-desync-fake-dht",required_argument,0,0},// optidx=36 {"dpi-desync-fake-unknown-udp",required_argument,0,0},// optidx=37 {"dpi-desync-udplen-increment",required_argument,0,0},// optidx=38 {"dpi-desync-udplen-pattern",required_argument,0,0},// optidx=39 {"dpi-desync-cutoff",required_argument,0,0},// optidx=40 {"hostlist",required_argument,0,0}, // optidx=41 {"hostlist-exclude",required_argument,0,0}, // optidx=42 {"hostlist-auto",required_argument,0,0}, // optidx=43 {"hostlist-auto-fail-threshold",required_argument,0,0}, // optidx=44 {"hostlist-auto-fail-time",required_argument,0,0}, // optidx=45 {"hostlist-auto-retrans-threshold",required_argument,0,0}, // optidx=46 {"hostlist-auto-debug",required_argument,0,0}, // optidx=47 #ifdef __linux__ {"bind-fix4",no_argument,0,0}, // optidx=48 {"bind-fix6",no_argument,0,0}, // optidx=49 #endif {NULL,0,NULL,0} }; if (argc < 2) exithelp(); while ((v = getopt_long_only(argc, argv, "", long_options, &option_index)) != -1) { if (v) exithelp(); switch (option_index) { case 0: /* debug */ params.debug = !optarg || atoi(optarg); break; case 1: /* qnum or port */ #ifdef __linux__ params.qnum = atoi(optarg); if (params.qnum < 0 || params.qnum>65535) { fprintf(stderr, "bad qnum\n"); exit_clean(1); } #elif defined(BSD) { int i = atoi(optarg); if (i <= 0 || i > 65535) { fprintf(stderr, "bad port number\n"); exit_clean(1); } params.port = (uint16_t)i; } #endif break; case 2: /* daemon */ daemon = true; break; case 3: /* pidfile */ strncpy(pidfile, optarg, sizeof(pidfile)); pidfile[sizeof(pidfile) - 1] = '\0'; break; case 4: /* user */ { struct passwd *pwd = getpwnam(optarg); if (!pwd) { fprintf(stderr, "non-existent username supplied\n"); exit_clean(1); } params.uid = pwd->pw_uid; params.gid = pwd->pw_gid; params.droproot = true; break; } case 5: /* uid */ params.gid = 0x7FFFFFFF; // default gid. drop gid=0 params.droproot = true; if (sscanf(optarg, "%u:%u", ¶ms.uid, ¶ms.gid)<1) { fprintf(stderr, "--uid should be : uid[:gid]\n"); exit_clean(1); } break; case 6: /* wsize */ if (!parse_ws_scale_factor(optarg,¶ms.wsize,¶ms.wscale)) exit_clean(1); break; case 7: /* wssize */ if (!parse_ws_scale_factor(optarg,¶ms.wssize,¶ms.wsscale)) exit_clean(1); break; case 8: /* wssize-cutoff */ if (!parse_cutoff(optarg, ¶ms.wssize_cutoff, ¶ms.wssize_cutoff_mode)) { fprintf(stderr, "invalid wssize-cutoff value\n"); exit_clean(1); } break; case 9: /* ctrack-timeouts */ if (sscanf(optarg, "%u:%u:%u:%u", ¶ms.ctrack_t_syn, ¶ms.ctrack_t_est, ¶ms.ctrack_t_fin, ¶ms.ctrack_t_udp)<3) { fprintf(stderr, "invalid ctrack-timeouts value\n"); exit_clean(1); } break; case 10: /* hostcase */ params.hostcase = true; break; case 11: /* hostspell */ if (strlen(optarg) != 4) { fprintf(stderr, "hostspell must be exactly 4 chars long\n"); exit_clean(1); } params.hostcase = true; memcpy(params.hostspell, optarg, 4); break; case 12: /* hostnospace */ params.hostnospace = true; break; case 13: /* domcase */ params.domcase = true; break; case 14: /* dpi-desync */ { char *mode=optarg,*mode2,*mode3; mode2 = mode ? strchr(mode,',') : NULL; if (mode2) *mode2++=0; mode3 = mode2 ? strchr(mode2,',') : NULL; if (mode3) *mode3++=0; params.desync_mode0 = desync_mode_from_string(mode); if (desync_valid_zero_stage(params.desync_mode0)) { mode = mode2; mode2 = mode3; mode3 = NULL; } else { params.desync_mode0 = DESYNC_NONE; } params.desync_mode = desync_mode_from_string(mode); params.desync_mode2 = desync_mode_from_string(mode2); if (params.desync_mode0==DESYNC_INVALID || params.desync_mode==DESYNC_INVALID || params.desync_mode2==DESYNC_INVALID) { fprintf(stderr, "invalid dpi-desync mode\n"); exit_clean(1); } if (mode3) { fprintf(stderr, "invalid desync combo : %s+%s+%s\n",mode,mode2,mode3); exit_clean(1); } if (params.desync_mode2 && (desync_only_first_stage(params.desync_mode) || !(desync_valid_first_stage(params.desync_mode) && desync_valid_second_stage(params.desync_mode2)))) { fprintf(stderr, "invalid desync combo : %s+%s\n", mode,mode2); exit_clean(1); } #if defined(__OpenBSD__) if (params.desync_mode==DESYNC_IPFRAG2 || params.desync_mode2==DESYNC_IPFRAG2) { fprintf(stderr, "OpenBSD has checksum issues with fragmented packets. ipfrag disabled.\n"); exit_clean(1); } #endif } break; case 15: /* dpi-desync-fwmark/dpi-desync-sockarg */ #if defined(__linux__) || defined(SO_USER_COOKIE) params.desync_fwmark = 0; if (sscanf(optarg, "0x%X", ¶ms.desync_fwmark)<=0) sscanf(optarg, "%u", ¶ms.desync_fwmark); if (!params.desync_fwmark) { fprintf(stderr, "fwmark/sockarg should be decimal or 0xHEX and should not be zero\n"); exit_clean(1); } #else fprintf(stderr, "fmwark/sockarg not supported in this OS\n"); exit_clean(1); #endif break; case 16: /* dpi-desync-ttl */ params.desync_ttl = (uint8_t)atoi(optarg); break; case 17: /* dpi-desync-ttl6 */ params.desync_ttl6 = (uint8_t)atoi(optarg); break; case 18: /* dpi-desync-autottl */ if (!parse_autottl(optarg, ¶ms.desync_autottl)) { fprintf(stderr, "dpi-desync-autottl value error\n"); exit_clean(1); } break; case 19: /* dpi-desync-autottl6 */ if (!parse_autottl(optarg, ¶ms.desync_autottl6)) { fprintf(stderr, "dpi-desync-autottl6 value error\n"); exit_clean(1); } break; case 20: /* dpi-desync-fooling */ { char *e,*p = optarg; while (p) { e = strchr(p,','); if (e) *e++=0; if (!strcmp(p,"md5sig")) params.desync_fooling_mode |= FOOL_MD5SIG; else if (!strcmp(p,"ts")) params.desync_fooling_mode |= FOOL_TS; else if (!strcmp(p,"badsum")) { #ifdef __OpenBSD__ printf("\nWARNING !!! OpenBSD may forcibly recompute tcp/udp checksums !!! In this case badsum fooling will not work.\nYou should check tcp checksum correctness in tcpdump manually before using badsum.\n\n"); #endif params.desync_fooling_mode |= FOOL_BADSUM; } else if (!strcmp(p,"badseq")) params.desync_fooling_mode |= FOOL_BADSEQ; else if (!strcmp(p,"datanoack")) params.desync_fooling_mode |= FOOL_DATANOACK; else if (!strcmp(p,"hopbyhop")) params.desync_fooling_mode |= FOOL_HOPBYHOP; else if (!strcmp(p,"hopbyhop2")) params.desync_fooling_mode |= FOOL_HOPBYHOP2; else if (strcmp(p,"none")) { fprintf(stderr, "dpi-desync-fooling allowed values : none,md5sig,ts,badseq,badsum,datanoack,hopbyhop,hopbyhop2\n"); exit_clean(1); } p = e; } } break; case 21: /* dpi-desync-retrans */ #ifdef __linux__ params.desync_retrans = !optarg || atoi(optarg); #else fprintf(stderr, "dpi-desync-retrans is only supported in linux\n"); exit_clean(1); #endif break; case 22: /* dpi-desync-repeats */ if (sscanf(optarg,"%u",¶ms.desync_repeats)<1 || !params.desync_repeats || params.desync_repeats>20) { fprintf(stderr, "dpi-desync-repeats must be within 1..20\n"); exit_clean(1); } break; case 23: /* dpi-desync-skip-nosni */ params.desync_skip_nosni = !optarg || atoi(optarg); break; case 24: /* dpi-desync-split-pos */ if (sscanf(optarg,"%u",¶ms.desync_split_pos)<1 || params.desync_split_pos<1 || params.desync_split_pos>DPI_DESYNC_MAX_FAKE_LEN) { fprintf(stderr, "dpi-desync-split-pos must be within 1..%u range\n",DPI_DESYNC_MAX_FAKE_LEN); exit_clean(1); } break; case 25: /* dpi-desync-ipfrag-pos-tcp */ if (sscanf(optarg,"%u",¶ms.desync_ipfrag_pos_tcp)<1 || params.desync_ipfrag_pos_tcp<1 || params.desync_ipfrag_pos_tcp>DPI_DESYNC_MAX_FAKE_LEN) { fprintf(stderr, "dpi-desync-ipfrag-pos-tcp must be within 1..%u range\n",DPI_DESYNC_MAX_FAKE_LEN); exit_clean(1); } if (params.desync_ipfrag_pos_tcp & 7) { fprintf(stderr, "dpi-desync-ipfrag-pos-tcp must be multiple of 8\n"); exit_clean(1); } break; case 26: /* dpi-desync-ipfrag-pos-udp */ if (sscanf(optarg,"%u",¶ms.desync_ipfrag_pos_udp)<1 || params.desync_ipfrag_pos_udp<1 || params.desync_ipfrag_pos_udp>DPI_DESYNC_MAX_FAKE_LEN) { fprintf(stderr, "dpi-desync-ipfrag-pos-udp must be within 1..%u range\n",DPI_DESYNC_MAX_FAKE_LEN); exit_clean(1); } if (params.desync_ipfrag_pos_udp & 7) { fprintf(stderr, "dpi-desync-ipfrag-pos-udp must be multiple of 8\n"); exit_clean(1); } break; case 27: /* dpi-desync-badseq-increments */ if (!parse_badseq_increment(optarg,¶ms.desync_badseq_increment)) { fprintf(stderr, "dpi-desync-badseq-increment should be signed decimal or signed 0xHEX\n"); exit_clean(1); } break; case 28: /* dpi-desync-badack-increment */ if (!parse_badseq_increment(optarg,¶ms.desync_badseq_ack_increment)) { fprintf(stderr, "dpi-desync-badack-increment should be signed decimal or signed 0xHEX\n"); exit_clean(1); } break; case 29: /* dpi-desync-any-protocol */ params.desync_any_proto = !optarg || atoi(optarg); break; case 30: /* dpi-desync-fake-http */ params.fake_http_size = sizeof(params.fake_http); load_file_or_exit(optarg,params.fake_http,¶ms.fake_http_size); break; case 31: /* dpi-desync-fake-tls */ params.fake_tls_size = sizeof(params.fake_tls); load_file_or_exit(optarg,params.fake_tls,¶ms.fake_tls_size); break; case 32: /* dpi-desync-fake-unknown */ params.fake_unknown_size = sizeof(params.fake_unknown); load_file_or_exit(optarg,params.fake_unknown,¶ms.fake_unknown_size); break; case 33: /* dpi-desync-fake-syndata */ params.fake_syndata_size = sizeof(params.fake_syndata); load_file_or_exit(optarg,params.fake_syndata,¶ms.fake_syndata_size); break; case 34: /* dpi-desync-fake-quic */ params.fake_quic_size = sizeof(params.fake_quic); load_file_or_exit(optarg,params.fake_quic,¶ms.fake_quic_size); break; case 35: /* dpi-desync-fake-wireguard */ params.fake_wg_size = sizeof(params.fake_wg); load_file_or_exit(optarg,params.fake_wg,¶ms.fake_wg_size); break; case 36: /* dpi-desync-fake-dht */ params.fake_dht_size = sizeof(params.fake_dht); load_file_or_exit(optarg,params.fake_dht,¶ms.fake_dht_size); break; case 37: /* dpi-desync-fake-unknown-udp */ params.fake_unknown_udp_size = sizeof(params.fake_unknown_udp); load_file_or_exit(optarg,params.fake_unknown_udp,¶ms.fake_unknown_udp_size); break; case 38: /* dpi-desync-udplen-increment */ if (sscanf(optarg,"%d",¶ms.udplen_increment)<1 || params.udplen_increment>0x7FFF || params.udplen_increment<-0x8000) { fprintf(stderr, "dpi-desync-udplen-increment must be integer within -32768..32767 range\n"); exit_clean(1); } break; case 39: /* dpi-desync-udplen-pattern */ { char buf[sizeof(params.udplen_pattern)]; size_t sz=sizeof(buf); load_file_or_exit(optarg,buf,&sz); fill_pattern(params.udplen_pattern,sizeof(params.udplen_pattern),buf,sz); } break; case 40: /* desync-cutoff */ if (!parse_cutoff(optarg, ¶ms.desync_cutoff, ¶ms.desync_cutoff_mode)) { fprintf(stderr, "invalid desync-cutoff value\n"); exit_clean(1); } break; case 41: /* hostlist */ if (!strlist_add(¶ms.hostlist_files, optarg)) { fprintf(stderr, "strlist_add failed\n"); exit_clean(1); } break; case 42: /* hostlist-exclude */ if (!strlist_add(¶ms.hostlist_exclude_files, optarg)) { fprintf(stderr, "strlist_add failed\n"); exit_clean(1); } break; case 43: /* hostlist-auto */ if (*params.hostlist_auto_filename) { fprintf(stderr, "only one auto hostlist is supported\n"); exit_clean(1); } { FILE *F = fopen(optarg,"a+t"); if (!F) { fprintf(stderr, "cannot create %s\n", optarg); exit_clean(1); } bool bGzip = is_gzip(F); fclose(F); if (bGzip) { fprintf(stderr, "gzipped auto hostlists are not supported\n"); exit_clean(1); } if (params.droproot && chown(optarg, params.uid, -1)) fprintf(stderr, "could not chown %s. auto hostlist file may not be writable after privilege drop\n", optarg); } if (!strlist_add(¶ms.hostlist_files, optarg)) { fprintf(stderr, "strlist_add failed\n"); exit_clean(1); } strncpy(params.hostlist_auto_filename, optarg, sizeof(params.hostlist_auto_filename)); params.hostlist_auto_filename[sizeof(params.hostlist_auto_filename) - 1] = '\0'; break; case 44: /* hostlist-auto-fail-threshold */ params.hostlist_auto_fail_threshold = (uint8_t)atoi(optarg); if (params.hostlist_auto_fail_threshold<1 || params.hostlist_auto_fail_threshold>20) { fprintf(stderr, "auto hostlist fail threshold must be within 1..20\n"); exit_clean(1); } break; case 45: /* hostlist-auto-fail-time */ params.hostlist_auto_fail_time = (uint8_t)atoi(optarg); if (params.hostlist_auto_fail_time<1) { fprintf(stderr, "auto hostlist fail time is not valid\n"); exit_clean(1); } break; case 46: /* hostlist-auto-retrans-threshold */ params.hostlist_auto_retrans_threshold = (uint8_t)atoi(optarg); if (params.hostlist_auto_retrans_threshold<2 || params.hostlist_auto_retrans_threshold>10) { fprintf(stderr, "auto hostlist fail threshold must be within 2..10\n"); exit_clean(1); } break; case 47: /* hostlist-auto-debug */ { FILE *F = fopen(optarg,"a+t"); if (!F) { fprintf(stderr, "cannot create %s\n", optarg); exit_clean(1); } fclose(F); if (params.droproot && chown(optarg, params.uid, -1)) fprintf(stderr, "could not chown %s. auto hostlist debug log may not be writable after privilege drop\n", optarg); strncpy(params.hostlist_auto_debuglog, optarg, sizeof(params.hostlist_auto_debuglog)); params.hostlist_auto_debuglog[sizeof(params.hostlist_auto_debuglog) - 1] = '\0'; } break; #ifdef __linux__ case 48: /* bind-fix4 */ params.bind_fix4 = true; break; case 49: /* bind-fix6 */ params.bind_fix6 = true; break; #endif } } // not specified - use desync_ttl value instead if (params.desync_ttl6 == 0xFF) params.desync_ttl6=params.desync_ttl; if (!AUTOTTL_ENABLED(params.desync_autottl6)) params.desync_autottl6 = params.desync_autottl; if (AUTOTTL_ENABLED(params.desync_autottl)) DLOG("autottl ipv4 %u:%u-%u\n",params.desync_autottl.delta,params.desync_autottl.min,params.desync_autottl.max) if (AUTOTTL_ENABLED(params.desync_autottl6)) DLOG("autottl ipv6 %u:%u-%u\n",params.desync_autottl6.delta,params.desync_autottl6.min,params.desync_autottl6.max) #ifdef BSD if (!params.port) { fprintf(stderr, "Need port number\n"); exit_clean(1); } #endif if (!LoadIncludeHostLists()) { fprintf(stderr, "Include hostlist load failed\n"); exit_clean(1); } if (*params.hostlist_auto_filename) NonEmptyHostlist(¶ms.hostlist); if (!LoadExcludeHostLists()) { fprintf(stderr, "Exclude hostlist load failed\n"); exit_clean(1); } if (daemon) daemonize(); if (*pidfile && !writepid(pidfile)) { fprintf(stderr, "could not write pidfile\n"); goto exiterr; } DLOG("initializing conntrack with timeouts tcp=%u:%u:%u udp=%u\n", params.ctrack_t_syn, params.ctrack_t_est, params.ctrack_t_fin, params.ctrack_t_udp) ConntrackPoolInit(¶ms.conntrack, 10, params.ctrack_t_syn, params.ctrack_t_est, params.ctrack_t_fin, params.ctrack_t_udp); #ifdef __linux__ result = nfq_main(); #elif defined(BSD) result = dvt_main(); #else #error unsupported OS #endif ex: rawsend_cleanup(); cleanup_params(); return result; exiterr: result = 1; goto ex; }