9 Commits

Author SHA1 Message Date
6cd90ae1dd reuse single buffers 2024-09-28 00:38:55 +01:00
826756eb6e rename comparand arg 2024-04-14 19:13:56 +01:00
05fb7bdd0f add compare helper method
split up long conditionals
2024-04-14 08:27:30 +01:00
e8f213fded easier to read? 2024-04-11 23:40:25 +01:00
3a8758a4d7 remove string casts
compare byte slices
2024-04-11 19:24:43 +01:00
2c8ae43303 split 3 times, log last part 2024-04-03 23:58:58 +01:00
0935fc1190 rename isBadRconRequest to isBadRconResponse 2024-04-03 20:59:37 +01:00
3e039824de log bad rcon requests at info level
include client ip in log
2024-04-03 20:54:10 +01:00
0c054377ba move validator methods into Validator struct
embed Validator into Session

unexport Session
2024-03-26 10:47:53 +00:00
3 changed files with 79 additions and 37 deletions

View File

@@ -9,24 +9,27 @@ import (
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
) )
type Session struct { type session struct {
serverConn *net.UDPConn serverConn *net.UDPConn
proxyConn *net.UDPConn proxyConn *net.UDPConn
caddr *net.UDPAddr caddr *net.UDPAddr
updateTime time.Time updateTime time.Time
validator
} }
func newSession(caddr *net.UDPAddr, raddr *net.UDPAddr, proxyConn *net.UDPConn) (*Session, error) { func newSession(caddr *net.UDPAddr, raddr *net.UDPAddr, proxyConn *net.UDPConn) (*session, error) {
serverConn, err := net.DialUDP("udp", nil, raddr) serverConn, err := net.DialUDP("udp", nil, raddr)
if err != nil { if err != nil {
return nil, err return nil, err
} }
session := &Session{ session := &session{
serverConn: serverConn, serverConn: serverConn,
proxyConn: proxyConn, proxyConn: proxyConn,
caddr: caddr, caddr: caddr,
updateTime: time.Now(), updateTime: time.Now(),
validator: newValidator(),
} }
go session.listen() go session.listen()
@@ -34,33 +37,9 @@ func newSession(caddr *net.UDPAddr, raddr *net.UDPAddr, proxyConn *net.UDPConn)
return session, nil return session, nil
} }
func (s *Session) isRconRequestPacket(buf []byte) bool { func (s *session) listen() error {
return string(buf[:8]) == "\xff\xff\xff\xffrcon" buf := make([]byte, 2048)
}
func (s *Session) isQueryRequestPacket(buf []byte) bool {
return string(buf[:13]) == "\xff\xff\xff\xffgetstatus" || string(buf[:11]) == "\xff\xff\xff\xffgetinfo"
}
func (s *Session) isValidRequestPacket(buf []byte) bool {
return s.isRconRequestPacket(buf) || s.isQueryRequestPacket(buf)
}
func (s *Session) isRconResponsePacket(buf []byte) bool {
return string(buf[:9]) == "\xff\xff\xff\xffprint"
}
func (s *Session) isQueryResponsePacket(buf []byte) bool {
return string(buf[:18]) == "\xff\xff\xff\xffstatusResponse" || string(buf[:16]) == "\xff\xff\xff\xffinfoResponse"
}
func (s *Session) isValidResponsePacket(buf []byte) bool {
return s.isRconResponsePacket(buf) || s.isQueryResponsePacket(buf)
}
func (s *Session) listen() error {
for { for {
buf := make([]byte, 2048)
n, err := s.serverConn.Read(buf) n, err := s.serverConn.Read(buf)
if err != nil { if err != nil {
log.Error(err) log.Error(err)
@@ -71,7 +50,7 @@ func (s *Session) listen() error {
} }
} }
func (s *Session) proxyFrom(buf []byte) error { func (s *session) proxyFrom(buf []byte) error {
if !s.isValidResponsePacket(buf) { if !s.isValidResponsePacket(buf) {
err := errors.New("not a rcon or query response packet") err := errors.New("not a rcon or query response packet")
log.Error(err.Error()) log.Error(err.Error())
@@ -86,13 +65,17 @@ func (s *Session) proxyFrom(buf []byte) error {
} }
if s.isRconResponsePacket(buf) { if s.isRconResponsePacket(buf) {
log.Debugf("Response: %s", string(buf[10:])) if s.isBadRconResponse(buf) {
log.Infof("Response: Bad rcon from %s", s.caddr.IP)
} else {
log.Debugf("Response: %s", string(buf[10:]))
}
} }
return nil return nil
} }
func (s *Session) proxyTo(buf []byte) error { func (s *session) proxyTo(buf []byte) error {
if !s.isValidRequestPacket(buf) { if !s.isValidRequestPacket(buf) {
err := errors.New("not a rcon or query request packet") err := errors.New("not a rcon or query request packet")
log.Error(err.Error()) log.Error(err.Error())
@@ -107,8 +90,8 @@ func (s *Session) proxyTo(buf []byte) error {
} }
if s.isRconRequestPacket(buf) { if s.isRconRequestPacket(buf) {
parts := strings.Split(string(buf), " ") parts := strings.SplitN(string(buf), " ", 3)
log.Infof("From [%s] To [%s] Command: %s", s.caddr.IP, s.serverConn.RemoteAddr(), strings.Join(parts[2:], " ")) log.Infof("From [%s] To [%s] Command: %s", s.caddr.IP, s.serverConn.RemoteAddr(), parts[len(parts)-1])
} }
return nil return nil

View File

@@ -15,7 +15,7 @@ type Client struct {
proxyConn *net.UDPConn proxyConn *net.UDPConn
mutex sync.RWMutex mutex sync.RWMutex
sessions map[string]*Session sessions map[string]*session
} }
func New(port, target string) (*Client, error) { func New(port, target string) (*Client, error) {
@@ -33,7 +33,7 @@ func New(port, target string) (*Client, error) {
laddr: laddr, laddr: laddr,
raddr: raddr, raddr: raddr,
mutex: sync.RWMutex{}, mutex: sync.RWMutex{},
sessions: map[string]*Session{}, sessions: map[string]*session{},
}, nil }, nil
} }
@@ -46,8 +46,8 @@ func (c *Client) ListenAndServe() error {
go c.pruneSessions() go c.pruneSessions()
buf := make([]byte, 2048)
for { for {
buf := make([]byte, 2048)
n, caddr, err := c.proxyConn.ReadFromUDP(buf) n, caddr, err := c.proxyConn.ReadFromUDP(buf)
if err != nil { if err != nil {
log.Error(err) log.Error(err)

59
pkg/udpproxy/validator.go Normal file
View File

@@ -0,0 +1,59 @@
package udpproxy
import "bytes"
type validator struct {
rconRequestHeader []byte
getstatusRequestHeader []byte
getinfoRequestHeader []byte
rconResponseHeader []byte
getstatusResponseHeader []byte
getinfoResponseHeader []byte
badRconIdentifier []byte
}
func newValidator() validator {
v := validator{}
v.rconRequestHeader = []byte("\xff\xff\xff\xffrcon")
v.getstatusRequestHeader = []byte("\xff\xff\xff\xffgetstatus")
v.getinfoRequestHeader = []byte("\xff\xff\xff\xffgetinfo")
v.rconResponseHeader = []byte("\xff\xff\xff\xffprint\n")
v.getstatusResponseHeader = []byte("\xff\xff\xff\xffstatusResponse\n")
v.getinfoResponseHeader = []byte("\xff\xff\xff\xffinfoResponse\n")
v.badRconIdentifier = []byte("Bad rcon")
return v
}
func (v *validator) compare(buf, c []byte) bool {
return bytes.Equal(buf[:len(c)], c)
}
func (v *validator) isRconRequestPacket(buf []byte) bool {
return v.compare(buf, v.rconRequestHeader)
}
func (v *validator) isQueryRequestPacket(buf []byte) bool {
return v.compare(buf, v.getstatusRequestHeader) ||
v.compare(buf, v.getinfoRequestHeader)
}
func (v *validator) isValidRequestPacket(buf []byte) bool {
return v.isRconRequestPacket(buf) || v.isQueryRequestPacket(buf)
}
func (v *validator) isRconResponsePacket(buf []byte) bool {
return v.compare(buf, v.rconResponseHeader)
}
func (v *validator) isQueryResponsePacket(buf []byte) bool {
return v.compare(buf, v.getstatusResponseHeader) ||
v.compare(buf, v.getinfoResponseHeader)
}
func (v *validator) isValidResponsePacket(buf []byte) bool {
return v.isRconResponsePacket(buf) || v.isQueryResponsePacket(buf)
}
func (v *validator) isBadRconResponse(buf []byte) bool {
return v.compare(buf[len(v.rconResponseHeader):], v.badRconIdentifier)
}