2020-06-04 22:42:44 +00:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package packet
|
|
|
|
|
|
|
|
import (
|
2020-11-11 03:09:47 +00:00
|
|
|
"encoding/binary"
|
2020-06-04 22:42:44 +00:00
|
|
|
"fmt"
|
2020-07-07 19:25:32 +00:00
|
|
|
|
|
|
|
"inet.af/netaddr"
|
2020-06-04 22:42:44 +00:00
|
|
|
)
|
|
|
|
|
2020-11-09 23:34:03 +00:00
|
|
|
// IP4 is an IPv4 address.
|
|
|
|
type IP4 uint32
|
2020-06-04 22:42:44 +00:00
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// IPFromNetaddr converts a netaddr.IP to an IP4. Panics if !ip.Is4.
|
2020-11-09 23:34:03 +00:00
|
|
|
func IP4FromNetaddr(ip netaddr.IP) IP4 {
|
2020-07-07 19:25:32 +00:00
|
|
|
ipbytes := ip.As4()
|
2020-11-11 03:09:47 +00:00
|
|
|
return IP4(binary.BigEndian.Uint32(ipbytes[:]))
|
2020-07-07 19:25:32 +00:00
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// Netaddr converts ip to a netaddr.IP.
|
2020-11-09 23:34:03 +00:00
|
|
|
func (ip IP4) Netaddr() netaddr.IP {
|
2020-07-07 19:25:32 +00:00
|
|
|
return netaddr.IPv4(byte(ip>>24), byte(ip>>16), byte(ip>>8), byte(ip))
|
|
|
|
}
|
|
|
|
|
2020-11-09 23:34:03 +00:00
|
|
|
func (ip IP4) String() string {
|
2020-06-04 22:42:44 +00:00
|
|
|
return fmt.Sprintf("%d.%d.%d.%d", byte(ip>>24), byte(ip>>16), byte(ip>>8), byte(ip))
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// IsMulticast returns whether ip is a multicast address.
|
2020-11-09 23:34:03 +00:00
|
|
|
func (ip IP4) IsMulticast() bool {
|
2020-09-25 18:06:48 +00:00
|
|
|
return byte(ip>>24)&0xf0 == 0xe0
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// IsLinkLocalUnicast returns whether ip is a link-local unicast
|
|
|
|
// address.
|
2020-11-09 23:34:03 +00:00
|
|
|
func (ip IP4) IsLinkLocalUnicast() bool {
|
2020-09-25 18:47:38 +00:00
|
|
|
return byte(ip>>24) == 169 && byte(ip>>16) == 254
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// ip4HeaderLength is the length of an IPv4 header with no IP options.
|
|
|
|
const ip4HeaderLength = 20
|
|
|
|
|
|
|
|
// IP4Header represents an IPv4 packet header.
|
2020-11-09 23:34:03 +00:00
|
|
|
type IP4Header struct {
|
2020-11-10 09:00:35 +00:00
|
|
|
IPProto IPProto
|
2020-06-04 22:42:44 +00:00
|
|
|
IPID uint16
|
2020-11-09 23:34:03 +00:00
|
|
|
SrcIP IP4
|
|
|
|
DstIP IP4
|
2020-06-04 22:42:44 +00:00
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// Len implements Header.
|
|
|
|
func (h IP4Header) Len() int {
|
2020-11-10 09:00:35 +00:00
|
|
|
return ip4HeaderLength
|
2020-06-04 22:42:44 +00:00
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// Marshal implements Header.
|
2020-11-09 23:34:03 +00:00
|
|
|
func (h IP4Header) Marshal(buf []byte) error {
|
2020-11-11 06:26:00 +00:00
|
|
|
if len(buf) < h.Len() {
|
2020-06-04 22:42:44 +00:00
|
|
|
return errSmallBuffer
|
|
|
|
}
|
|
|
|
if len(buf) > maxPacketLength {
|
|
|
|
return errLargePacket
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
buf[0] = 0x40 | (byte(h.Len() >> 2)) // IPv4 + IHL
|
|
|
|
buf[1] = 0x00 // DSCP + ECN
|
|
|
|
binary.BigEndian.PutUint16(buf[2:4], uint16(len(buf))) // Total length
|
|
|
|
binary.BigEndian.PutUint16(buf[4:6], h.IPID) // ID
|
|
|
|
binary.BigEndian.PutUint16(buf[6:8], 0) // Flags + fragment offset
|
|
|
|
buf[8] = 64 // TTL
|
|
|
|
buf[9] = uint8(h.IPProto) // Inner protocol
|
|
|
|
// Blank checksum. This is necessary even though we overwrite
|
|
|
|
// it later, because the checksum computation runs over these
|
|
|
|
// bytes and expects them to be zero.
|
|
|
|
binary.BigEndian.PutUint16(buf[10:12], 0)
|
|
|
|
binary.BigEndian.PutUint32(buf[12:16], uint32(h.SrcIP)) // Src
|
|
|
|
binary.BigEndian.PutUint32(buf[16:20], uint32(h.DstIP)) // Dst
|
|
|
|
|
|
|
|
binary.BigEndian.PutUint16(buf[10:12], ip4Checksum(buf[0:20])) // Checksum
|
2020-06-04 22:42:44 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
// ToResponse implements Header.
|
|
|
|
func (h *IP4Header) ToResponse() {
|
|
|
|
h.SrcIP, h.DstIP = h.DstIP, h.SrcIP
|
|
|
|
// Flip the bits in the IPID. If incoming IPIDs are distinct, so are these.
|
|
|
|
h.IPID = ^h.IPID
|
|
|
|
}
|
|
|
|
|
|
|
|
// ip4Checksum computes an IPv4 checksum, as specified in
|
|
|
|
// https://tools.ietf.org/html/rfc1071
|
|
|
|
func ip4Checksum(b []byte) uint16 {
|
|
|
|
var ac uint32
|
|
|
|
i := 0
|
|
|
|
n := len(b)
|
|
|
|
for n >= 2 {
|
|
|
|
ac += uint32(binary.BigEndian.Uint16(b[i : i+2]))
|
|
|
|
n -= 2
|
|
|
|
i += 2
|
|
|
|
}
|
|
|
|
if n == 1 {
|
|
|
|
ac += uint32(b[i]) << 8
|
|
|
|
}
|
|
|
|
for (ac >> 16) > 0 {
|
|
|
|
ac = (ac >> 16) + (ac & 0xffff)
|
|
|
|
}
|
|
|
|
return uint16(^ac)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ip4PseudoHeaderOffset is the number of bytes by which the IPv4 UDP
|
|
|
|
// pseudo-header is smaller than the real IPv4 header.
|
|
|
|
const ip4PseudoHeaderOffset = 8
|
|
|
|
|
|
|
|
// marshalPseudo serializes h into buf in the "pseudo-header" form
|
|
|
|
// required when calculating UDP checksums. The pseudo-header starts
|
|
|
|
// at buf[ip4PseudoHeaderOffset] so as to abut the following UDP
|
|
|
|
// header, while leaving enough space in buf for a full IPv4 header.
|
|
|
|
func (h IP4Header) marshalPseudo(buf []byte) error {
|
|
|
|
if len(buf) < h.Len() {
|
2020-06-04 22:42:44 +00:00
|
|
|
return errSmallBuffer
|
|
|
|
}
|
|
|
|
if len(buf) > maxPacketLength {
|
|
|
|
return errLargePacket
|
|
|
|
}
|
|
|
|
|
2020-11-11 06:26:00 +00:00
|
|
|
length := len(buf) - h.Len()
|
2020-11-11 03:09:47 +00:00
|
|
|
binary.BigEndian.PutUint32(buf[8:12], uint32(h.SrcIP))
|
|
|
|
binary.BigEndian.PutUint32(buf[12:16], uint32(h.DstIP))
|
2020-06-04 22:42:44 +00:00
|
|
|
buf[16] = 0x0
|
|
|
|
buf[17] = uint8(h.IPProto)
|
2020-11-11 03:09:47 +00:00
|
|
|
binary.BigEndian.PutUint16(buf[18:20], uint16(length))
|
2020-06-04 22:42:44 +00:00
|
|
|
return nil
|
|
|
|
}
|