1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
|
#!/usr/local/bin/python2.7
# send data from client via relay before server handshake is completed
import os
import sys
import threading
from addr import *
from scapy.all import *
client=os.getpid() & 0xffff
relay=int(sys.argv[2])
server=int(sys.argv[1])
class Sniff1(threading.Thread):
filter = None
captured = None
packet = None
def __init__(self):
# clear packets buffered by scapy bpf
sniff(iface=LOCAL_IF, timeout=1)
super(Sniff1, self).__init__()
def run(self):
self.captured = sniff(iface=LOCAL_IF, filter=self.filter,
count=1, timeout=5)
if self.captured:
self.packet = self.captured[0]
ip=IP(src=FAKE_NET_ADDR, dst=REMOTE_ADDR)
print "Send SYN packet, receive SYN+ACK"
syn=TCP(sport=client, dport=relay, seq=0, flags='S', window=(2**16)-1)
synack=sr1(ip/syn, iface=LOCAL_IF, timeout=5)
if synack is None:
print "ERROR: No matching SYN+ACK packet received"
exit(1)
print "Expect spliced SYN"
sniffer = Sniff1();
sniffer.filter = "src %s and dst %s and tcp port %u " \
"and tcp[tcpflags] = tcp-syn" % (ip.dst, ip.src, server)
sniffer.start()
time.sleep(1)
print "Send ACK packet to finish handshake"
ack=TCP(sport=synack.dport, dport=synack.sport,
seq=1, ack=synack.seq+1, flags='A')
send(ip/ack, iface=LOCAL_IF)
sniffer.join(timeout=7)
spliced_syn = sniffer.packet
if spliced_syn is None:
print "ERROR: No spliced SYN packet received"
exit(1)
print "Send 10 bytes payload"
data="0123456789"
payload=TCP(sport=synack.dport, dport=synack.sport,
seq=1, ack=synack.seq+1, flags='AP')/data
payload_ack=sr1(ip/payload, iface=LOCAL_IF)
if payload_ack is None:
print "ERROR: No payload ACK packet received"
exit(1)
if payload_ack.ack != len(data)+1:
print "ERROR: Expected ack %d, got %d in payload ACK" % \
(len(data)+1, payload_ack.ack)
exit(1)
time.sleep(1)
print "Expect spliced payload"
sniffer = Sniff1();
sniffer.filter = "src %s and dst %s and tcp port %u " \
"and tcp[tcpflags] = tcp-ack|tcp-push" % (ip.dst, ip.src, server)
sniffer.start()
time.sleep(1)
print "Send spliced SYN+ACK packet to finish handshake"
spliced_synack=TCP(sport=spliced_syn.dport, dport=spliced_syn.sport,
seq=0, ack=spliced_syn.seq+1, flags='SA')
spliced_ack=sr1(ip/spliced_synack, iface=LOCAL_IF)
if spliced_ack is None:
print "ERROR: No spliced ACK packet received"
exit(1)
sniffer.join(timeout=7)
spliced_payload = sniffer.packet
if spliced_payload is None:
print "ERROR: No spliced payload packet received"
exit(1)
if spliced_payload.seq != spliced_ack.seq:
print "ERROR: Expected seq %d, got %d in spliced payload" % \
(spliced_ack.seq, spliced_payload.seq)
exit(1)
if spliced_payload.len-20-20 != len(data):
print "ERROR: Expected len %d, got %d in spliced payload" % \
(len(data), spliced_payload.len-20-20)
exit(1)
print "Expect spliced ACK retransmission"
sniffer = Sniff1();
sniffer.filter = "src %s and dst %s and tcp port %u " \
"and tcp[tcpflags] = tcp-ack" % (ip.dst, ip.src, server)
sniffer.start()
time.sleep(1)
print "Retransmit spliced SYN+ACK packet to trigger ACK"
send(ip/spliced_synack, iface=LOCAL_IF)
sniffer.join(timeout=7)
spliced_ack_retrans = sniffer.packet
if spliced_ack_retrans is None:
print "ERROR: No spliced ACK retransmit packet received"
exit(1)
if spliced_ack_retrans.seq != spliced_syn.seq+1+len(data):
print "ERROR: Expected seq %d, got %d in retransmitted spliced ack" % \
(spliced_syn.seq+1+len(data), spliced_ack_retrans.seq)
exit(1)
if spliced_ack_retrans.ack != 1:
print "ERROR: Expected ack %d, got %d in retransmitted spliced ack" % \
(1, spliced_ack_retrans.ack)
exit(1)
if spliced_ack_retrans.len-20-20 != 0:
print "ERROR: Expected len %d, got %d in retransmitted spliced ack" % \
(0, spliced_ack_retrans.len-20-20)
exit(1)
print "Kill connections with RST"
spliced_rst=TCP(sport=spliced_ack.dport, dport=spliced_ack.sport,
seq=1, ack=spliced_ack.seq, flags='RA')
send(ip/spliced_rst, iface=LOCAL_IF)
rst=TCP(sport=synack.dport, dport=synack.sport,
seq=payload_ack.ack, ack=synack.seq+1, flags='RA')
send(ip/rst, iface=LOCAL_IF)
exit(0)
|