| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628 | 
							- #include <stdio.h>
 - #include <stdlib.h>
 - #include <unistd.h>
 - #include <string.h>
 - #include <stdarg.h>
 - #include <errno.h>
 - #include <fcntl.h>
 - #include <libgen.h>
 - #include <signal.h>
 - #include <net/if.h>
 - #include <net/ethernet.h>
 - #include <sys/select.h>
 - #include <sys/socket.h>
 - #include <sys/stat.h>
 - #include <sys/un.h>
 - #include <syslog.h>
 - #include <getopt.h>
 - #include <pcap.h>
 - 
 - #define SNAPLEN 1600
 - 
 - /*
 -  * FIXME: is there a way to detect the version of the libpcap library?
 -  * Version 0.9 has pcap_inject; version 0.8 doesn't, but both report
 -  * their version number as 2.4.
 -  */
 - #define HAVE_PCAP_INJECT 0
 - 
 - struct hijack {
 - 	pcap_t *pcap;
 - 	int fd;
 - 	int datalink;
 - 	int filtered;
 - 	unsigned long rx_count;
 - 	unsigned long tx_count;
 - };
 - 
 - struct hijack_listener {
 - 	struct sockaddr_un sun;
 - 	int fd;
 - };
 - 
 - struct hijack_options {
 - 	char interface[IF_NAMESIZE];
 - 	int daemonise;
 - };
 - 
 - static int daemonised = 0;
 - 
 - static int signalled = 0;
 - 
 - static void flag_signalled ( int signal __attribute__ (( unused )) ) {
 - 	signalled = 1;
 - }
 - 
 - #if ! HAVE_PCAP_INJECT
 - /**
 -  * Substitute for pcap_inject(), if this version of libpcap doesn't
 -  * have it.  Will almost certainly only work under Linux.
 -  *
 -  */
 - int pcap_inject ( pcap_t *pcap, const void *data, size_t len ) {
 - 	int fd;
 - 	char *errbuf = pcap_geterr ( pcap );
 - 
 - 	fd = pcap_get_selectable_fd ( pcap );
 - 	if ( fd < 0 ) {
 - 		snprintf ( errbuf, PCAP_ERRBUF_SIZE,
 - 			   "could not get file descriptor" );
 - 		return -1;
 - 	}
 - 	if ( write ( fd, data, len ) != len ) {
 - 		snprintf ( errbuf, PCAP_ERRBUF_SIZE,
 - 			   "could not write data: %s", strerror ( errno ) );
 - 		return -1;
 - 	}
 - 	return len;
 - }
 - #endif /* ! HAVE_PCAP_INJECT */
 - 
 - /**
 -  * Log error message
 -  *
 -  */
 - static __attribute__ (( format ( printf, 2, 3 ) )) void
 - logmsg ( int level, const char *format, ... ) {
 - 	va_list ap;
 - 
 - 	va_start ( ap, format );
 - 	if ( daemonised ) {
 - 		vsyslog ( ( LOG_DAEMON | level ), format, ap );
 - 	} else {
 - 		vfprintf ( stderr, format, ap );
 - 	}
 - 	va_end ( ap );
 - }
 - 
 - /**
 -  * Open pcap device
 -  *
 -  */
 - static int hijack_open ( const char *interface, struct hijack *hijack ) {
 - 	char errbuf[PCAP_ERRBUF_SIZE];
 - 
 - 	/* Open interface via pcap */
 - 	errbuf[0] = '\0';
 - 	hijack->pcap = pcap_open_live ( interface, SNAPLEN, 1, 0, errbuf );
 - 	if ( ! hijack->pcap ) {
 - 		logmsg ( LOG_ERR, "Failed to open %s: %s\n",
 - 			 interface, errbuf );
 - 		goto err;
 - 	}
 - 	if ( errbuf[0] )
 - 		logmsg ( LOG_WARNING, "Warning: %s\n", errbuf );
 - 
 - 	/* Set capture interface to non-blocking mode */
 - 	if ( pcap_setnonblock ( hijack->pcap, 1, errbuf ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not make %s non-blocking: %s\n",
 - 			 interface, errbuf );
 - 		goto err;
 - 	}
 - 
 - 	/* Get file descriptor for select() */
 - 	hijack->fd = pcap_get_selectable_fd ( hijack->pcap );
 - 	if ( hijack->fd < 0 ) {
 - 		logmsg ( LOG_ERR, "Cannot get selectable file descriptor "
 - 			 "for %s\n", interface );
 - 		goto err;
 - 	}
 - 
 - 	/* Get link layer type */
 - 	hijack->datalink = pcap_datalink ( hijack->pcap );
 - 
 - 	return 0;
 - 
 -  err:
 - 	if ( hijack->pcap )
 - 		pcap_close ( hijack->pcap );
 - 	return -1;
 - }
 - 
 - /**
 -  * Close pcap device
 -  *
 -  */
 - static void hijack_close ( struct hijack *hijack ) {
 - 	pcap_close ( hijack->pcap );
 - }
 - 
 - /**
 -  * Install filter for hijacked connection
 -  *
 -  */
 - static int hijack_install_filter ( struct hijack *hijack,
 - 				   char *filter ) {
 - 	struct bpf_program program;
 - 
 - 	/* Compile filter */
 - 	if ( pcap_compile ( hijack->pcap, &program, filter, 1, 0 ) < 0 ) {
 - 		logmsg ( LOG_ERR, "could not compile filter \"%s\": %s\n",
 - 			 filter, pcap_geterr ( hijack->pcap ) );
 - 		goto err_nofree;
 - 	}
 - 
 - 	/* Install filter */
 - 	if ( pcap_setfilter ( hijack->pcap, &program ) < 0 ) {
 - 		logmsg ( LOG_ERR, "could not install filter \"%s\": %s\n",
 - 			 filter, pcap_geterr ( hijack->pcap ) );
 - 		goto err;
 - 	}
 - 	
 - 	logmsg ( LOG_INFO, "using filter \"%s\"\n", filter );
 - 
 - 	pcap_freecode ( &program );
 - 	return 0;
 - 
 -  err:	
 - 	pcap_freecode ( &program );
 -  err_nofree:
 - 	return -1;
 - }
 - 
 - /**
 -  * Set up filter for hijacked ethernet connection
 -  *
 -  */
 - static int hijack_filter_ethernet ( struct hijack *hijack, const char *buf,
 - 				    size_t len ) {
 - 	char filter[55]; /* see format string */
 - 	struct ether_header *ether_header = ( struct ether_header * ) buf;
 - 	unsigned char *hwaddr = ether_header->ether_shost;
 - 
 - 	if ( len < sizeof ( *ether_header ) )
 - 		return -1;
 - 
 - 	snprintf ( filter, sizeof ( filter ), "broadcast or multicast or "
 - 		   "ether host %02x:%02x:%02x:%02x:%02x:%02x", hwaddr[0],
 - 		   hwaddr[1], hwaddr[2], hwaddr[3], hwaddr[4], hwaddr[5] );
 - 
 - 	return hijack_install_filter ( hijack, filter );
 - }
 - 
 - /**
 -  * Set up filter for hijacked connection
 -  *
 -  */
 - static int hijack_filter ( struct hijack *hijack, const char *buf,
 - 			   size_t len ) {
 - 	switch ( hijack->datalink ) {
 - 	case DLT_EN10MB:
 - 		return hijack_filter_ethernet ( hijack, buf, len );
 - 	default:
 - 		logmsg ( LOG_ERR, "unsupported protocol %s: cannot filter\n",
 - 			 ( pcap_datalink_val_to_name ( hijack->datalink ) ?
 - 			   pcap_datalink_val_to_name ( hijack->datalink ) :
 - 			   "UNKNOWN" ) );
 - 		/* Return success so we don't get called again */
 - 		return 0;
 - 	}
 - }
 - 
 - /**
 -  * Forward data from hijacker
 -  *
 -  */
 - static ssize_t forward_from_hijacker ( struct hijack *hijack, int fd ) {
 - 	char buf[SNAPLEN];
 - 	ssize_t len;
 - 
 - 	/* Read packet from hijacker */
 - 	len = read ( fd, buf, sizeof ( buf ) );
 - 	if ( len < 0 ) {
 - 		logmsg ( LOG_ERR, "read from hijacker failed: %s\n",
 - 			 strerror ( errno ) );
 - 		return -1;
 - 	}
 - 	if ( len == 0 )
 - 		return 0;
 - 
 - 	/* Set up filter if not already in place */
 - 	if ( ! hijack->filtered ) {
 - 		if ( hijack_filter ( hijack, buf, len ) == 0 )
 - 			hijack->filtered = 1;
 - 	}
 - 
 - 	/* Transmit packet to network */
 - 	if ( pcap_inject ( hijack->pcap, buf, len ) != len ) {
 - 		logmsg ( LOG_ERR, "write to hijacked port failed: %s\n",
 - 			 pcap_geterr ( hijack->pcap ) );
 - 		return -1;
 - 	}
 - 
 - 	hijack->tx_count++;
 - 	return len;
 - };
 - 
 - /**
 -  * Forward data to hijacker
 -  *
 -  */
 - static ssize_t forward_to_hijacker ( int fd, struct hijack *hijack ) {
 - 	struct pcap_pkthdr *pkt_header;
 - 	const unsigned char *pkt_data;
 - 	ssize_t len;
 - 
 - 	/* Receive packet from network */
 - 	if ( pcap_next_ex ( hijack->pcap, &pkt_header, &pkt_data ) < 0 ) {
 - 		logmsg ( LOG_ERR, "read from hijacked port failed: %s\n",
 - 			 pcap_geterr ( hijack->pcap ) );
 - 		return -1;
 - 	}
 - 	if ( pkt_header->caplen != pkt_header->len ) {
 - 		logmsg ( LOG_ERR, "read partial packet (%d of %d bytes)\n",
 - 			 pkt_header->caplen, pkt_header->len );
 - 		return -1;
 - 	}
 - 	if ( pkt_header->caplen == 0 )
 - 		return 0;
 - 	len = pkt_header->caplen;
 - 
 - 	/* Write packet to hijacker */
 - 	if ( write ( fd, pkt_data, len ) != len ) {
 - 		logmsg ( LOG_ERR, "write to hijacker failed: %s\n",
 - 			 strerror ( errno ) );
 - 		return -1;
 - 	}
 - 
 - 	hijack->rx_count++;
 - 	return len;
 - };
 - 
 - 
 - /**
 -  * Run hijacker
 -  *
 -  */
 - static int run_hijacker ( const char *interface, int fd ) {
 - 	struct hijack hijack;
 - 	fd_set fdset;
 - 	int max_fd;
 - 	ssize_t len;
 - 
 - 	logmsg ( LOG_INFO, "new connection for %s\n", interface );
 - 
 - 	/* Open connection to network */
 - 	memset ( &hijack, 0, sizeof ( hijack ) );
 - 	if ( hijack_open ( interface, &hijack ) < 0 )
 - 		goto err;
 - 	
 - 	/* Do the forwarding */
 - 	max_fd = ( ( fd > hijack.fd ) ? fd : hijack.fd );
 - 	while ( 1 ) {
 - 		/* Wait for available data */
 - 		FD_ZERO ( &fdset );
 - 		FD_SET ( fd, &fdset );
 - 		FD_SET ( hijack.fd, &fdset );
 - 		if ( select ( ( max_fd + 1 ), &fdset, NULL, NULL, 0 ) < 0 ) {
 - 			logmsg ( LOG_ERR, "select failed: %s\n",
 - 				 strerror ( errno ) );
 - 			goto err;
 - 		}
 - 		if ( FD_ISSET ( fd, &fdset ) ) {
 - 			len = forward_from_hijacker ( &hijack, fd );
 - 			if ( len < 0 )
 - 				goto err;
 - 			if ( len == 0 )
 - 				break;
 - 		}
 - 		if ( FD_ISSET ( hijack.fd, &fdset ) ) {
 - 			len = forward_to_hijacker ( fd, &hijack );
 - 			if ( len < 0 )
 - 				goto err;
 - 			if ( len == 0 )
 - 				break;
 - 		}
 - 	}
 - 
 - 	hijack_close ( &hijack );
 - 	logmsg ( LOG_INFO, "closed connection for %s\n", interface );
 - 	logmsg ( LOG_INFO, "received %ld packets, sent %ld packets\n",
 - 		 hijack.rx_count, hijack.tx_count );
 - 
 - 	return 0;
 - 
 -  err:
 - 	if ( hijack.pcap )
 - 		hijack_close ( &hijack );
 - 	return -1;
 - }
 - 
 - /**
 -  * Open listener socket
 -  *
 -  */
 - static int open_listener ( const char *interface,
 - 			   struct hijack_listener *listener ) {
 - 	
 - 	/* Create socket */
 - 	listener->fd = socket ( PF_UNIX, SOCK_SEQPACKET, 0 );
 - 	if ( listener->fd < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not create socket: %s\n",
 - 			 strerror ( errno ) );
 - 		goto err;
 - 	}
 - 
 - 	/* Bind to local filename */
 - 	listener->sun.sun_family = AF_UNIX,
 - 	snprintf ( listener->sun.sun_path, sizeof ( listener->sun.sun_path ),
 - 		   "/var/run/hijack-%s", interface );
 - 	if ( bind ( listener->fd, ( struct sockaddr * ) &listener->sun,
 - 		    sizeof ( listener->sun ) ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not bind socket to %s: %s\n",
 - 			 listener->sun.sun_path, strerror ( errno ) );
 - 		goto err;
 - 	}
 - 
 - 	/* Set as a listening socket */
 - 	if ( listen ( listener->fd, 0 ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not listen to %s: %s\n",
 - 			 listener->sun.sun_path, strerror ( errno ) );
 - 		goto err;
 - 	}
 - 
 - 	return 0;
 - 	
 -  err:
 - 	if ( listener->fd >= 0 )
 - 		close ( listener->fd );
 - 	return -1;
 - }
 - 
 - /**
 -  * Listen on listener socket
 -  *
 -  */
 - static int listen_for_hijackers ( struct hijack_listener *listener,
 - 				  const char *interface ) {
 - 	int fd;
 - 	pid_t child;
 - 	int rc;
 - 
 - 	logmsg ( LOG_INFO, "Listening on %s\n", listener->sun.sun_path );
 - 
 - 	while ( ! signalled ) {
 - 		/* Accept new connection, interruptibly */
 - 		siginterrupt ( SIGINT, 1 );
 - 		siginterrupt ( SIGHUP, 1 );
 - 		fd = accept ( listener->fd, NULL, 0 );
 - 		siginterrupt ( SIGINT, 0 );
 - 		siginterrupt ( SIGHUP, 0 );
 - 		if ( fd < 0 ) {
 - 			if ( errno == EINTR ) {
 - 				continue;
 - 			} else {
 - 				logmsg ( LOG_ERR, "accept failed: %s\n",
 - 					 strerror ( errno ) );
 - 				goto err;
 - 			}
 - 		}
 - 
 - 		/* Fork child process */
 - 		child = fork();
 - 		if ( child < 0 ) {
 - 			logmsg ( LOG_ERR, "fork failed: %s\n",
 - 				 strerror ( errno ) );
 - 			goto err;
 - 		}
 - 		if ( child == 0 ) {
 - 			/* I am the child; run the hijacker */
 - 			rc = run_hijacker ( interface, fd );
 - 			close ( fd );
 - 			exit ( rc );
 - 		}
 - 		
 - 		close ( fd );
 - 	}
 - 
 - 	logmsg ( LOG_INFO, "Stopped listening on %s\n",
 - 		 listener->sun.sun_path );
 - 	return 0;
 - 
 -  err:
 - 	if ( fd >= 0 )
 - 		close ( fd );
 - 	return -1;
 - }
 - 
 - /**
 -  * Close listener socket
 -  *
 -  */
 - static void close_listener ( struct hijack_listener *listener ) {
 - 	close ( listener->fd );
 - 	unlink ( listener->sun.sun_path );
 - }
 - 
 - /**
 -  * Print usage
 -  *
 -  */
 - static void usage ( char **argv ) {
 - 	logmsg ( LOG_ERR,
 - 		 "Usage: %s [options]\n"
 - 		 "\n"
 - 		 "Options:\n"
 - 		 "  -h|--help               Print this help message\n"
 - 		 "  -i|--interface intf     Use specified network interface\n"
 - 		 "  -n|--nodaemon           Run in foreground\n",
 - 		 argv[0] );
 - }
 - 
 - /**
 -  * Parse command-line options
 -  *
 -  */
 - static int parse_options ( int argc, char **argv,
 - 			   struct hijack_options *options ) {
 - 	static struct option long_options[] = {
 - 		{ "interface", 1, NULL, 'i' },
 - 		{ "nodaemon", 0, NULL, 'n' },
 - 		{ "help", 0, NULL, 'h' },
 - 		{ },
 - 	};
 - 	int c;
 - 
 - 	/* Set default options */
 - 	memset ( options, 0, sizeof ( *options ) );
 - 	strncpy ( options->interface, "eth0", sizeof ( options->interface ) );
 - 	options->daemonise = 1;
 - 
 - 	/* Parse command-line options */
 - 	while ( 1 ) {
 - 		int option_index = 0;
 - 		
 - 		c = getopt_long ( argc, argv, "i:hn", long_options,
 - 				  &option_index );
 - 		if ( c < 0 )
 - 			break;
 - 
 - 		switch ( c ) {
 - 		case 'i':
 - 			strncpy ( options->interface, optarg,
 - 				  sizeof ( options->interface ) );
 - 			break;
 - 		case 'n':
 - 			options->daemonise = 0;
 - 			break;
 - 		case 'h':
 - 			usage( argv );
 - 			return -1;
 - 		case '?':
 - 			/* Unrecognised option */
 - 			return -1;
 - 		default:
 - 			logmsg ( LOG_ERR, "Unrecognised option '-%c'\n", c );
 - 			return -1;
 - 		}
 - 	}
 - 
 - 	/* Check there's nothing left over on the command line */
 - 	if ( optind != argc ) {
 - 		usage ( argv );
 - 		return -1;
 - 	}
 - 
 - 	return 0;
 - }
 - 
 - /**
 -  * Daemonise
 -  *
 -  */
 - static int daemonise ( const char *interface ) {
 - 	char pidfile[16 + IF_NAMESIZE + 4]; /* "/var/run/hijack-<intf>.pid" */
 - 	char pid[16];
 - 	int pidlen;
 - 	int fd = -1;
 - 
 - 	/* Daemonise */
 - 	if ( daemon ( 0, 0 ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not daemonise: %s\n",
 - 			 strerror ( errno ) );
 - 		goto err;
 - 	}
 - 	daemonised = 1; /* Direct messages to syslog now */
 - 
 - 	/* Open pid file */
 - 	snprintf ( pidfile, sizeof ( pidfile ), "/var/run/hijack-%s.pid",
 - 		   interface );
 - 	fd = open ( pidfile, ( O_WRONLY | O_CREAT | O_TRUNC ),
 - 		    ( S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH ) );
 - 	if ( fd < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not open %s for writing: %s\n",
 - 			 pidfile, strerror ( errno ) );
 - 		goto err;
 - 	}
 - 
 - 	/* Write pid to file */
 - 	pidlen = snprintf ( pid, sizeof ( pid ), "%d\n", getpid() );
 - 	if ( write ( fd, pid, pidlen ) != pidlen ) {
 - 		logmsg ( LOG_ERR, "Could not write %s: %s\n",
 - 			 pidfile, strerror ( errno ) );
 - 		goto err;
 - 	}
 - 
 - 	close ( fd );
 - 	return 0;
 - 
 -  err:
 - 	if ( fd >= 0 )
 - 		close ( fd );
 - 	return -1;
 - }
 - 
 - int main ( int argc, char **argv ) {
 - 	struct hijack_options options;
 - 	struct hijack_listener listener;
 - 	struct sigaction sa;
 - 
 - 	/* Parse command-line options */
 - 	if ( parse_options ( argc, argv, &options ) < 0 )
 - 		exit ( 1 );
 - 
 - 	/* Set up syslog connection */
 - 	openlog ( basename ( argv[0] ), LOG_PID, LOG_DAEMON );
 - 
 - 	/* Set up listening socket */
 - 	if ( open_listener ( options.interface, &listener ) < 0 )
 - 		exit ( 1 );
 - 
 - 	/* Daemonise on demand */
 - 	if ( options.daemonise ) {
 - 		if ( daemonise ( options.interface ) < 0 )
 - 			exit ( 1 );
 - 	}
 - 
 - 	/* Avoid creating zombies */
 - 	memset ( &sa, 0, sizeof ( sa ) );
 - 	sa.sa_handler = SIG_IGN;
 - 	sa.sa_flags = SA_RESTART | SA_NOCLDWAIT;
 - 	if ( sigaction ( SIGCHLD, &sa, NULL ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not set SIGCHLD handler: %s",
 - 			 strerror ( errno ) );
 - 		exit ( 1 );
 - 	}
 - 
 - 	/* Set 'signalled' flag on SIGINT or SIGHUP */
 - 	sa.sa_handler = flag_signalled;
 - 	sa.sa_flags = SA_RESTART | SA_RESETHAND;
 - 	if ( sigaction ( SIGINT, &sa, NULL ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not set SIGINT handler: %s",
 - 			 strerror ( errno ) );
 - 		exit ( 1 );
 - 	}
 - 	if ( sigaction ( SIGHUP, &sa, NULL ) < 0 ) {
 - 		logmsg ( LOG_ERR, "Could not set SIGHUP handler: %s",
 - 			 strerror ( errno ) );
 - 		exit ( 1 );
 - 	}
 - 
 - 	/* Listen for hijackers */
 - 	if ( listen_for_hijackers ( &listener, options.interface ) < 0 )
 - 		exit ( 1 );
 - 
 - 	close_listener ( &listener );
 - 	
 - 	return 0;
 - }
 
 
  |