mirror of
https://github.com/netbirdio/netbird.git
synced 2026-04-24 19:26:39 +00:00
Correct sharedsock BPF fields (#835)
This commit is contained in:
@@ -2,44 +2,44 @@ package sharedsock
|
||||
|
||||
import "golang.org/x/net/bpf"
|
||||
|
||||
// STUNFilter implements BPFFilter by filtering on STUN packets.
|
||||
// IncomingSTUNFilter implements BPFFilter and filters out anything but incoming STUN packets to a specified destination port.
|
||||
// Other packets (non STUN) will be forwarded to the process that own the port (e.g., WireGuard).
|
||||
type STUNFilter struct {
|
||||
type IncomingSTUNFilter struct {
|
||||
}
|
||||
|
||||
// NewSTUNFilter creates an instance of a STUNFilter
|
||||
func NewSTUNFilter() BPFFilter {
|
||||
return &STUNFilter{}
|
||||
// NewIncomingSTUNFilter creates an instance of a IncomingSTUNFilter
|
||||
func NewIncomingSTUNFilter() BPFFilter {
|
||||
return &IncomingSTUNFilter{}
|
||||
}
|
||||
|
||||
// GetInstructions returns raw BPF instructions for ipv4 and ipv6 that filter out anything but STUN packets
|
||||
func (sf STUNFilter) GetInstructions(port uint32) (raw4 []bpf.RawInstruction, raw6 []bpf.RawInstruction, err error) {
|
||||
raw4, err = rawInstructions(22, 32, port)
|
||||
func (filter *IncomingSTUNFilter) GetInstructions(dstPort uint32) (raw4 []bpf.RawInstruction, raw6 []bpf.RawInstruction, err error) {
|
||||
raw4, err = rawInstructions(22, 32, dstPort)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
raw6, err = rawInstructions(2, 12, port)
|
||||
raw6, err = rawInstructions(2, 12, dstPort)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
return raw4, raw6, nil
|
||||
}
|
||||
|
||||
func rawInstructions(portOff, cookieOff, port uint32) ([]bpf.RawInstruction, error) {
|
||||
func rawInstructions(dstPortOff, cookieOff, dstPort uint32) ([]bpf.RawInstruction, error) {
|
||||
// UDP raw socket for ipv4 receives the rcvdPacket with IP headers
|
||||
// UDP raw socket for ipv6 receives the rcvdPacket with UDP headers
|
||||
instructions := []bpf.Instruction{
|
||||
// Load the source port from the UDP header (offset 22 for ipv4 and 2 for ipv6)
|
||||
bpf.LoadAbsolute{Off: portOff, Size: 2},
|
||||
// Check if the source port is equal to the specified `port`. If not, skip the next 3 instructions.
|
||||
bpf.JumpIf{Cond: bpf.JumpNotEqual, Val: port, SkipTrue: 3},
|
||||
// Load the destination port from the UDP header (offset 22 for ipv4 and 2 for ipv6)
|
||||
bpf.LoadAbsolute{Off: dstPortOff, Size: 2},
|
||||
// Check if the destination port is equal to the specified `dstPort`. If not, skip the next 3 instructions.
|
||||
bpf.JumpIf{Cond: bpf.JumpNotEqual, Val: dstPort, SkipTrue: 3},
|
||||
// Load the 4-byte value (magic cookie) from the UDP payload (offset 32 for ipv4 and 12 for ipv6)
|
||||
bpf.LoadAbsolute{Off: cookieOff, Size: 4},
|
||||
// Check if the loaded value is equal to the `magicCookie`. If not, skip the next instruction.
|
||||
bpf.JumpIf{Cond: bpf.JumpNotEqual, Val: magicCookie, SkipTrue: 1},
|
||||
// If both the port and the magic cookie match, return a positive value (0xffffffff)
|
||||
// If both the dstPort and the magic cookie match, return a positive value (0xffffffff)
|
||||
bpf.RetConstant{Val: 0xffffffff},
|
||||
// If either the port or the magic cookie doesn't match, return 0
|
||||
// If either the dstPort or the magic cookie doesn't match, return 0
|
||||
bpf.RetConstant{Val: 0},
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user