I wonder if anyone here could perhaps of be assistance, Im currently
playing with implementing certain things in trusted bsd to do with ip
security classes and how the system responds to security bits, and
implementing certain things the stack etc. However my first piece of test
code playing with raw packets to test how things respond to packets with
the security bit set, doesnt seem to want to work. This code compiles
fine, however when I try and run it it says invalid argument when it tries
to send the packet. If anyone could give me any insight as to why this
code doesnt run properly, it would be much appreciated, and would
certainly help me in my efforts to continue expanding trusted bsd.
Ive included the code below..
Thanks
Andrew
--- Code starts here ---
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <unistd.h>
#include <string.h>
#include <time.h>
#include <netinet/udp.h>
#define IPVERSION 4 /* Define the IP Version (always 4, until we go ipv6)
*/
#define DEFAULT_TTL 60 /* Define the default Time to Live as 60 */
#define DESTPORT 1700
struct pseudohdr {
struct in_addr source_address;
struct in_addr dest_address;
u_char place_holder;
u_char proto;
u_short length;
} pseudohdr;
u_short in_chksum(u_short *addr, int len) {
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;
while (nleft > 1) {
sum += *w++;
nleft -= 2;
}
if (nleft == 1) {
*(u_char *)(&answer) = *(u_char *)w;
sum += answer;
}
sum = (sum >> 16) + (sum & 0xffff);
sum += (sum >> 16);
answer = ~sum;
return(answer);
};
u_short trans_check(u_char proto, char *packet, int length,
struct in_addr source_address, struct in_addr dest_address)
{
char *pseudo_packet;
u_short answer;
pseudohdr.proto = proto;
pseudohdr.length = htons(length);
pseudohdr.place_holder = 0;
pseudohdr.source_address = source_address;
pseudohdr.dest_address = dest_address;
if((pseudo_packet = malloc(sizeof(struct pseudohdr) + length)) == NULL) {
perror("malloc");
exit(-1);
}
memcpy(pseudo_packet, &pseudohdr, sizeof(pseudohdr));
memcpy((pseudo_packet + sizeof(pseudo_packet)), packet, length);
answer = (u_short)in_chksum((u_short *)pseudo_packet, (length +
sizeof(pseudohdr)));
free(pseudo_packet);
return answer;
};
void ipgenerate(char *packet, u_char protocol, struct in_addr saddr,
struct in_addr daddr, u_short length)
{
struct ip *iphead;
iphead = (struct ip *)packet;
memset((char *)iphead, '\0', sizeof(struct ip));
iphead->ip_hl = 5; /* Define the ip header length as 6,
this is standard packet
+ security class option, counted in 32
bit words */
iphead->ip_v = IPVERSION; /* Set the ip version to 4 as its ipv4
not ipv6 */
iphead->ip_len = htons(length); /* Set the packet length in network
byte order */
iphead->ip_id = htons(getpid()); /* Set the packet id to the process id
*/
iphead->ip_ttl = DEFAULT_TTL; /* Set the time to live to the default
defined (60 seconds) */
iphead->ip_p = protocol; /* Set the protocol (tcp/udp/icmp) */
iphead->ip_src = saddr; /* Set the source address */
iphead->ip_dst = daddr; /* Set the destination address */
iphead->ip_sum = (u_short)in_chksum((u_short *)iphead,
sizeof(struct ip)); /* Set the checksum */
printf("sizeof: %d\n",sizeof(struct ip));
};
void addsecure(char *packet)
{
char *pack;
pack = (char *)packet+sizeof(struct ip);
pack[0] = 0x82; /* We want a security option that is copied on all
fragmentation */
pack[1] = 0xB;
pack[2] = 0x6B; /* We class this packet as top secret */
pack[3] = 0xC5;
pack[4] = 0; /* Packet is non compartmentalized */
pack[5] = 0;
pack[6] = 0; /* More security crap from DIAM 65-19 */
pack[7] = 0;
pack[8] = 0; /* Still more crap leave this 0 */
pack[9] = 0;
pack[10] = 0;
pack[11] = 0; /* Terminate the packet options */
/* Packet data now starts at (char *)packet+sizeof(struct ip)+12 */
};
void addudphead(char *packet, u_short sport, u_short dport, u_short length)
{
struct udphdr *udphead;
udphead = (struct udphdr *)packet;
udphead->uh_sport = 0;
udphead->uh_dport = DESTPORT;
udphead->uh_ulen = length;
};
int main(int argc, char *argv[])
{
char *packetdata; /* Data going into our UDP
Packet */
struct in_addr saddr, daddr; /* Source and Destination
address structs */
u_short sport, dport; /* Source and Destination
ports */
struct sockaddr_in rawsocket; /* The socket we will be
talking over */
int sockd, on = 1; /* Socket stuff */
struct udphdr *udpheader; /* UDP header used for
generating checksums */
u_short datalength = strlen("Test UDP Packet") +5;
u_short packetlength = sizeof(struct ip) + sizeof(struct udphdr) + 12 +
datalength;
u_char entirepacket[packetlength];
u_char *tempstr;
if (argc < 5) {
printf("\nRaw UDP packet + security bit transmitter\n(c) 1999 Andrew
Alston\n");
printf("Usage: %s source_port source_address destination_port
destination_address\n"
,argv[0]);
exit(-1);
};
if((packetdata = malloc(datalength)) == NULL) {
perror("malloc");
exit(-1);
}; /* Allocate some memory for
the packet data */
memset(packetdata, '\0', datalength); /* Fill the string with 0's */
snprintf(packetdata, strlen("Test UDP Packet")+5, "Test UDP Packet\n");
memset(entirepacket, '\0', packetlength); /* 0 out the entire packet */
sport = (u_short)atoi(argv[1]); /* Source port from argument 1
*/
saddr.s_addr = htonl(inet_addr(argv[2])); /* Source address from
argument 2 */
dport = (u_short)atoi(argv[3]); /* Destination port from
argument 3 */
daddr.s_addr = htonl(inet_addr(argv[4])); /* Destination address
from argument 4 */
if((sockd = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) < 0 ) {
perror("Socket");
exit(-1);
}; /* Set up the socket and die
on faliure */
if(setsockopt(sockd, IPPROTO_IP, IP_HDRINCL, (char *)&on, sizeof(on)) < 0) {
perror("setsockopt");
exit(-1);
}; /* Request permission to
include own ip header */
ipgenerate(entirepacket, IPPROTO_UDP, saddr, daddr, packetlength);
addsecure(entirepacket);
udpheader = (struct udphdr *)(entirepacket + sizeof(struct ip) + 12);
addudphead((char *)udpheader, sport, dport, sizeof(struct udphdr) +
datalength);
udpheader->uh_sum = trans_check(IPPROTO_UDP, (char *)udpheader,
(datalength + sizeof(struct udphdr)),
saddr, daddr);
tempstr = entirepacket + sizeof(struct ip) + sizeof(struct udphdr) + 12;
strncpy(tempstr, packetdata, strlen(packetdata));
memset(&rawsocket, '\0', sizeof(struct sockaddr_in));
rawsocket.sin_family = AF_INET;
rawsocket.sin_port = htons(dport);
rawsocket.sin_addr = daddr;
printf("Length of packet: %d\n",sizeof(entirepacket));
printf("Packetlength: %d\n", packetlength);
if(sendto(sockd,&entirepacket,packetlength,0x0,(struct sockaddr *)&rawsocket,
sizeof(rawsocket)) != packetlength) {
perror("send to");
exit(-1);
};
return(0);
};
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message