proxy.go 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. package proxy
  2. import (
  3. "context"
  4. "errors"
  5. "fmt"
  6. "log"
  7. "net"
  8. "time"
  9. "github.com/google/gopacket"
  10. "github.com/google/gopacket/layers"
  11. "github.com/google/gopacket/pcap"
  12. "github.com/gravitl/netmaker/nm-proxy/common"
  13. "github.com/gravitl/netmaker/nm-proxy/wg"
  14. "golang.zx2c4.com/wireguard/wgctrl/wgtypes"
  15. )
  16. const (
  17. defaultBodySize = 10000
  18. defaultPort = 51722
  19. )
  20. type Config struct {
  21. Port int
  22. BodySize int
  23. Addr string
  24. RemoteKey string
  25. LocalKey string
  26. WgInterface *wg.WGIface
  27. PeerConf *wgtypes.PeerConfig
  28. }
  29. // Proxy - WireguardProxy proxies
  30. type Proxy struct {
  31. Ctx context.Context
  32. Cancel context.CancelFunc
  33. Config Config
  34. RemoteConn *net.UDPAddr
  35. LocalConn net.Conn
  36. }
  37. func GetInterfaceIpv4Addr(interfaceName string) (addr string, err error) {
  38. var (
  39. ief *net.Interface
  40. addrs []net.Addr
  41. ipv4Addr net.IP
  42. )
  43. if ief, err = net.InterfaceByName(interfaceName); err != nil { // get interface
  44. return
  45. }
  46. if addrs, err = ief.Addrs(); err != nil { // get addresses
  47. return
  48. }
  49. for _, addr := range addrs { // get ipv4 address
  50. if ipv4Addr = addr.(*net.IPNet).IP.To4(); ipv4Addr != nil {
  51. break
  52. }
  53. }
  54. if ipv4Addr == nil {
  55. return "", errors.New(fmt.Sprintf("interface %s don't have an ipv4 address\n", interfaceName))
  56. }
  57. return ipv4Addr.String(), nil
  58. }
  59. func GetInterfaceListenAddr(port int) (*net.UDPAddr, error) {
  60. locallistenAddr := "127.0.0.1"
  61. udpAddr, err := net.ResolveUDPAddr("udp", fmt.Sprintf("%s:%d", locallistenAddr, port))
  62. if err != nil {
  63. return udpAddr, err
  64. }
  65. if !common.IsHostNetwork {
  66. addrs, err := getBoardCastAddress()
  67. if err != nil {
  68. return udpAddr, err
  69. }
  70. for _, addr := range addrs {
  71. if liAddr := addr.(*net.IPNet).IP; liAddr != nil {
  72. udpAddr.IP = liAddr
  73. break
  74. }
  75. }
  76. }
  77. return udpAddr, nil
  78. }
  79. func getBoardCastAddress() ([]net.Addr, error) {
  80. localnets, err := net.Interfaces()
  81. if err != nil {
  82. return nil, err
  83. }
  84. var (
  85. ief net.Interface
  86. addrs []net.Addr
  87. )
  88. for _, ief = range localnets {
  89. if ief.Flags&net.FlagBroadcast != 0 && ief.Flags&net.FlagUp != 0 {
  90. addrs, err = ief.Addrs()
  91. if err == nil {
  92. return addrs, nil
  93. }
  94. }
  95. }
  96. return nil, errors.New("couldn't obtain the broadcast addr")
  97. }
  98. func StartSniffer(ctx context.Context, ifaceName, ingGwAddr, extClientAddr string, port int) {
  99. log.Println("Starting Packet Sniffer for iface: ", ifaceName)
  100. var (
  101. snapshotLen int32 = 1024
  102. promiscuous bool = false
  103. err error
  104. timeout time.Duration = 1 * time.Microsecond
  105. handle *pcap.Handle
  106. )
  107. // Open device
  108. handle, err = pcap.OpenLive(ifaceName, snapshotLen, promiscuous, timeout)
  109. if err != nil {
  110. log.Println("failed to start sniffer for iface: ", ifaceName, err)
  111. return
  112. }
  113. // if err := handle.SetBPFFilter(fmt.Sprintf("src %s and port %d", extClientAddr, port)); err != nil {
  114. // log.Println("failed to set bpf filter: ", err)
  115. // return
  116. // }
  117. defer handle.Close()
  118. // var tcp layers.TCP
  119. // var icmp layers.ICMPv4
  120. // var udp layers.UDP
  121. // parser := gopacket.NewDecodingLayerParser(layers.LayerTypeIPv4, &udp, &tcp, &icmp)
  122. packetSource := gopacket.NewPacketSource(handle, handle.LinkType())
  123. for {
  124. select {
  125. case <-ctx.Done():
  126. log.Println("Stopping packet sniffer for iface: ", ifaceName, " port: ", port)
  127. return
  128. default:
  129. packet, err := packetSource.NextPacket()
  130. if err == nil {
  131. //processPkt(ifaceName, packet)
  132. ipLayer := packet.Layer(layers.LayerTypeIPv4)
  133. if ipLayer != nil {
  134. fmt.Println("IPv4 layer detected.")
  135. ip, _ := ipLayer.(*layers.IPv4)
  136. // IP layer variables:
  137. // Version (Either 4 or 6)
  138. // IHL (IP Header Length in 32-bit words)
  139. // TOS, Length, Id, Flags, FragOffset, TTL, Protocol (TCP?),
  140. // Checksum, SrcIP, DstIP
  141. fmt.Println("#########################")
  142. fmt.Printf("From %s to %s\n", ip.SrcIP, ip.DstIP)
  143. fmt.Println("Protocol: ", ip.Protocol.String())
  144. if (ip.SrcIP.String() == extClientAddr && ip.DstIP.String() != ingGwAddr) ||
  145. (ip.DstIP.String() == extClientAddr && ip.SrcIP.String() != ingGwAddr) {
  146. log.Println("-----> Fowarding PKT From: ", ip.SrcIP, " to: ", ip.DstIP)
  147. c, err := net.Dial("ip", ip.DstIP.String())
  148. if err == nil {
  149. c.Write(ip.Payload)
  150. c.Close()
  151. } else {
  152. log.Println("------> Failed to forward packet from sniffer: ", err)
  153. }
  154. }
  155. fmt.Println("#########################")
  156. }
  157. }
  158. }
  159. }
  160. }
  161. func processPkt(iface string, packet gopacket.Packet) {
  162. // Let's see if the packet is an ethernet packet
  163. // ethernetLayer := packet.Layer(layers.LayerTypeEthernet)
  164. // if ethernetLayer != nil {
  165. // fmt.Println("Ethernet layer detected.")
  166. // ethernetPacket, _ := ethernetLayer.(*layers.Ethernet)
  167. // fmt.Println("Source MAC: ", ethernetPacket.SrcMAC)
  168. // fmt.Println("Destination MAC: ", ethernetPacket.DstMAC)
  169. // // Ethernet type is typically IPv4 but could be ARP or other
  170. // fmt.Println("Ethernet type: ", ethernetPacket.EthernetType)
  171. // fmt.Println()
  172. // }
  173. // Let's see if the packet is IP (even though the ether type told us)
  174. ipLayer := packet.Layer(layers.LayerTypeIPv4)
  175. if ipLayer != nil {
  176. fmt.Println("IPv4 layer detected.")
  177. ip, _ := ipLayer.(*layers.IPv4)
  178. // IP layer variables:
  179. // Version (Either 4 or 6)
  180. // IHL (IP Header Length in 32-bit words)
  181. // TOS, Length, Id, Flags, FragOffset, TTL, Protocol (TCP?),
  182. // Checksum, SrcIP, DstIP
  183. fmt.Printf("From %s to %s\n", ip.SrcIP, ip.DstIP)
  184. fmt.Println("Protocol: ", ip.Protocol)
  185. fmt.Println()
  186. }
  187. // udpLayer := packet.Layer(layers.LayerTypeUDP)
  188. // if udpLayer != nil {
  189. // udp, _ := udpLayer.(*layers.UDP)
  190. // fmt.Printf("UDP: From port %d to %d\n", udp.SrcPort, udp.DstPort)
  191. // fmt.Println()
  192. // }
  193. // // Iterate over all layers, printing out each layer type
  194. // fmt.Println("All packet layers:")
  195. // for _, layer := range packet.Layers() {
  196. // fmt.Println("- ", layer.LayerType())
  197. // }
  198. // When iterating through packet.Layers() above,
  199. // if it lists Payload layer then that is the same as
  200. // this applicationLayer. applicationLayer contains the payload
  201. // applicationLayer := packet.ApplicationLayer()
  202. // if applicationLayer != nil {
  203. // fmt.Println("Application layer/Payload found.")
  204. // fmt.Printf("%s\n", applicationLayer.Payload())
  205. // // Search for a string inside the payload
  206. // if strings.Contains(string(applicationLayer.Payload()), "HTTP") {
  207. // fmt.Println("HTTP found!")
  208. // }
  209. // }
  210. // Check for errors
  211. if err := packet.ErrorLayer(); err != nil {
  212. fmt.Println("Error decoding some part of the packet:", err)
  213. }
  214. }