1

Working on tun rewrite

This commit is contained in:
Evan Pratten 2023-07-18 13:26:56 -04:00
parent 3d80c1fc0e
commit 7b88a1cad9
15 changed files with 450 additions and 226 deletions

1
.gitignore vendored
View File

@ -1,6 +1,7 @@
# Generated by Cargo # Generated by Cargo
# will have compiled files and executables # will have compiled files and executables
/target/ /target/
/protomask-*/target/
# Remove Cargo.lock from gitignore if creating an executable, leave it for libraries # Remove Cargo.lock from gitignore if creating an executable, leave it for libraries
# More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html # More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html

View File

@ -12,22 +12,19 @@ license = "GPL-3.0"
keywords = [] keywords = []
categories = [] categories = []
[features]
default = []
enable-profiling = ["profiling/profile-with-puffin", "puffin_http"]
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies] [dependencies]
tokio = { version = "1.29.1", features = [ tokio = { version = "1.29.1", features = [
"macros", "macros",
"rt-multi-thread", "rt-multi-thread",
"process" "process",
"sync"
] } ] }
clap = { version = "4.3.11", features = ["derive"] } clap = { version = "4.3.11", features = ["derive"] }
serde = { version = "1.0.171", features = ["derive"] } serde = { version = "1.0.171", features = ["derive"] }
ipnet = { version = "2.8.0", features = ["serde"] } ipnet = { version = "2.8.0", features = ["serde"] }
puffin_http = { version = "0.13.0", optional = true }
profiling = "1.0.8"
toml = "0.7.6" toml = "0.7.6"
log = "0.4.19" log = "0.4.19"
fern = "0.6.2" fern = "0.6.2"
@ -39,10 +36,11 @@ bimap = "0.6.3"
pnet_packet = "0.33.0" pnet_packet = "0.33.0"
rtnetlink = "0.13.0" rtnetlink = "0.13.0"
futures = "0.3.28" futures = "0.3.28"
protomask-tun = { path = "protomask-tun", version = "0.1.0" }
[[bin]] [[bin]]
name = "protomask" name = "protomask"
path = "src/main.rs" path = "src/cli/main.rs"
[package.metadata.rpm] [package.metadata.rpm]
package = "protomask" package = "protomask"

23
protomask-tun/Cargo.toml Normal file
View File

@ -0,0 +1,23 @@
[package]
name = "protomask-tun"
version = "0.1.0"
authors = ["Evan Pratten <ewpratten@gmail.com>"]
edition = "2021"
description = "An async interface to Linux TUN devices"
readme = "README.md"
homepage = "https://github.com/ewpratten/protomask/protomask-tun"
documentation = "https://docs.rs/protomask-tun"
repository = "https://github.com/ewpratten/protomask"
license = "GPL-3.0"
keywords = []
categories = []
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
tokio = { version = "1.29.1", features = ["sync", "rt"] }
log = "0.4.19"
thiserror = "1.0.43"
tun-tap = "0.1.3"
rtnetlink = "0.13.0"
futures = "0.3.28"
ipnet = "^2.8.0"

View File

@ -0,0 +1,10 @@
#[derive(Debug, thiserror::Error)]
pub enum Error {
#[error(transparent)]
IoError(#[from] std::io::Error),
#[error(transparent)]
NetlinkError(#[from] rtnetlink::Error),
}
pub type Result<T> = std::result::Result<T, Error>;

5
protomask-tun/src/lib.rs Normal file
View File

@ -0,0 +1,5 @@
mod error;
mod tun;
pub use error::{Error, Result};
pub use tun::TunDevice;

190
protomask-tun/src/tun.rs Normal file
View File

@ -0,0 +1,190 @@
use std::{
io::{Read, Write},
net::IpAddr,
os::fd::{AsRawFd, FromRawFd},
};
use futures::TryStreamExt;
use ipnet::IpNet;
use tokio::{
sync::{broadcast, mpsc},
task,
};
use tun_tap::Mode;
use crate::Result;
#[derive(Debug)]
pub struct TunDevice {
device: tun_tap::Iface,
rt_handle: rtnetlink::Handle,
link_index: u32,
mtu: usize,
}
impl TunDevice {
/// Create and bring up a new TUN device
///
/// ## Name format
///
/// The name field can be any string. If `%d` is present in the string,
/// it will be replaced with a unique number.
pub async fn new(name: &str) -> Result<Self> {
// Bring up an rtnetlink connection
let (rt_connection, rt_handle, _) = rtnetlink::new_connection()?;
tokio::spawn(rt_connection);
// Create the TUN device
let tun_device = tun_tap::Iface::without_packet_info(name, Mode::Tun)?;
log::debug!("Created new TUN device: {}", tun_device.name());
// Get access to the link through rtnetlink
// NOTE: I don't think there is any way this can fail, so `except` is probably OK
let tun_link = rt_handle
.link()
.get()
.match_name(tun_device.name().to_owned())
.execute()
.try_next()
.await?
.expect("Failed to access newly created TUN device");
// Bring the link up
rt_handle
.link()
.set(tun_link.header.index)
.up()
.execute()
.await?;
log::debug!("Brought {} up", tun_device.name());
// Read the link MTU
let mtu: usize =
std::fs::read_to_string(format!("/sys/class/net/{}/mtu", tun_device.name()))
.expect("Failed to read link MTU")
.strip_suffix("\n")
.unwrap()
.parse()
.unwrap();
Ok(Self {
device: tun_device,
rt_handle,
link_index: tun_link.header.index,
mtu,
})
}
/// Add an IP address to this device
pub async fn add_address(&mut self, ip_address: IpAddr, prefix_len: u8) -> Result<()> {
self.rt_handle
.address()
.add(self.link_index, ip_address, prefix_len)
.execute()
.await?;
Ok(())
}
/// Remove an IP address from this device
pub async fn remove_address(&mut self, ip_address: IpAddr, prefix_len: u8) -> Result<()> {
// Find the address message that matches the given address
if let Some(address_message) = self
.rt_handle
.address()
.get()
.set_link_index_filter(self.link_index)
.set_address_filter(ip_address)
.set_prefix_length_filter(prefix_len)
.execute()
.try_next()
.await?
{
// Delete the address
self.rt_handle
.address()
.del(address_message)
.execute()
.await?;
}
Ok(())
}
/// Add a route to this device
pub async fn add_route(&mut self, destination: IpNet) -> Result<()> {
match destination {
IpNet::V4(destination) => {
self.rt_handle
.route()
.add()
.v4()
.destination_prefix(destination.addr(), destination.prefix_len())
.execute()
.await?;
}
IpNet::V6(destination) => {
self.rt_handle
.route()
.add()
.v6()
.destination_prefix(destination.addr(), destination.prefix_len())
.execute()
.await?;
}
}
Ok(())
}
/// Spawns worker threads, and returns a tx/rx pair for the caller to interact with them
pub async fn spawn_worker(&self) -> (mpsc::Sender<Vec<u8>>, broadcast::Receiver<Vec<u8>>) {
// Create a channel for packets to be sent to the caller
let (tx_to_caller, rx_from_worker) = broadcast::channel(32);
// Create a channel for packets being received from the caller
let (tx_to_worker, mut rx_from_caller) = mpsc::channel(32);
// Clone some values for use in worker threads
let mtu = self.mtu;
let device_fd = self.device.as_raw_fd();
// Create a task that broadcasts all incoming packets
let _rx_task = task::spawn_blocking(move || {
// Build a buffer to read packets into
let mut buffer = vec![0u8; mtu];
// Create a file to access the TUN device
let mut device = unsafe { std::fs::File::from_raw_fd(device_fd) };
loop {
// Read a packet from the TUN device
let packet_len = device.read(&mut buffer[..]).unwrap();
let packet = buffer[..packet_len].to_vec();
// Broadcast the packet to all listeners
tx_to_caller.send(packet).unwrap();
}
});
// Create a task that sends all outgoing packets
let _tx_task = task::spawn(async move {
// Create a file to access the TUN device
let mut device = unsafe { std::fs::File::from_raw_fd(device_fd) };
loop {
// Wait for a packet to be sent
let packet: Vec<u8> = rx_from_caller.recv().await.unwrap();
// Write the packet to the TUN device
device.write_all(&packet[..]).unwrap();
}
});
// Create a task that sends all outgoing packets
let _tx_task = task::spawn_blocking(|| {});
// Return an rx/tx pair for the caller to interact with the workers
(tx_to_worker, rx_from_worker)
}
}

View File

@ -1,3 +1,5 @@
//! Command line argument definitions
use std::path::PathBuf; use std::path::PathBuf;
use clap::Parser; use clap::Parser;
@ -11,9 +13,4 @@ pub struct Args {
/// Enable verbose logging /// Enable verbose logging
#[clap(short, long)] #[clap(short, long)]
pub verbose: bool, pub verbose: bool,
/// Enable the puffin profiling server for debugging
#[cfg(feature = "enable-profiling")]
#[clap(long)]
pub enable_profiling: bool,
} }

View File

@ -1,3 +1,5 @@
//! Serde definitions for the config file
use std::{ use std::{
net::{Ipv4Addr, Ipv6Addr}, net::{Ipv4Addr, Ipv6Addr},
path::Path, path::Path,
@ -65,6 +67,7 @@ impl Config {
// Parse // Parse
match serde_path_to_error::deserialize(deserializer) { match serde_path_to_error::deserialize(deserializer) {
Ok(config) => Ok(config), Ok(config) => Ok(config),
// If there is a parsing error, display a reasonable error message
Err(e) => { Err(e) => {
eprintln!( eprintln!(
"Failed to parse config file due to:\n {}\n at {}", "Failed to parse config file due to:\n {}\n at {}",

View File

@ -1,20 +1,5 @@
use std::sync::OnceLock;
use colored::Colorize; use colored::Colorize;
/// A global variable that is used to early-kill attempts to write debug logs if debug logging is disabled
pub static DEBUG_ENABLED: OnceLock<bool> = OnceLock::new();
/// A macro that can completely skip the debug step if debug logging is disabled
#[macro_export]
macro_rules! debug {
($($arg:tt)*) => {
if *$crate::logging::DEBUG_ENABLED.get().unwrap_or(&false) {
log::debug!($($arg)*);
}
};
}
/// Enable the logger /// Enable the logger
#[allow(dead_code)] #[allow(dead_code)]
pub fn enable_logger(verbose: bool) { pub fn enable_logger(verbose: bool) {
@ -42,17 +27,13 @@ pub fn enable_logger(verbose: bool) {
message message
)) ))
}) })
// Set the correct log level based on CLI flags
.level(match verbose { .level(match verbose {
true => log::LevelFilter::Debug, true => log::LevelFilter::Debug,
false => log::LevelFilter::Info, false => log::LevelFilter::Info,
}) })
// Output to STDOUT
.chain(std::io::stdout()) .chain(std::io::stdout())
.apply() .apply()
.unwrap(); .unwrap();
if verbose {
log::debug!("Verbose logging enabled");
}
// Set the global debug enabled variable
DEBUG_ENABLED.set(verbose).unwrap();
} }

View File

@ -1,11 +1,12 @@
//! This is the entrypoint for `protomask` from the command line.
use clap::Parser; use clap::Parser;
use config::Config; use config::Config;
use logging::enable_logger; use logging::enable_logger;
use nat::Nat64; use protomask::nat::Nat64;
mod cli; mod cli;
mod config; mod config;
mod nat;
mod logging; mod logging;
#[tokio::main] #[tokio::main]
@ -16,16 +17,6 @@ pub async fn main() {
// Set up logging // Set up logging
enable_logger(args.verbose); enable_logger(args.verbose);
// If the binary was built with profiling support, enable it
#[cfg(feature = "enable-profiling")]
let _puffin_server: puffin_http::Server;
#[cfg(feature = "enable-profiling")]
if args.enable_profiling {
_puffin_server =
puffin_http::Server::new(&format!("0.0.0.0:{}", puffin_http::DEFAULT_PORT)).unwrap();
log::info!("Puffin profiling server started");
}
// Parse the config file // Parse the config file
let config = Config::load(args.config_file).unwrap(); let config = Config::load(args.config_file).unwrap();

View File

@ -1,4 +1,6 @@
#![deny(unsafe_code)] //! # Protomask library
//!
//! *Note: There is a fair chance you are looking for `src/cli/main.rs` instead of this file.*
pub mod nat; pub mod nat;
mod logging; mod packet;

View File

@ -1,121 +1,121 @@
use futures::stream::TryStreamExt; // use futures::stream::TryStreamExt;
use ipnet::{Ipv4Net, Ipv6Net}; // use ipnet::{Ipv4Net, Ipv6Net};
use tun_tap::{Iface, Mode}; // use tun_tap::{Iface, Mode};
#[derive(Debug, thiserror::Error)] // #[derive(Debug, thiserror::Error)]
pub enum InterfaceError { // pub enum InterfaceError {
#[error(transparent)] // #[error(transparent)]
IoError(#[from] std::io::Error), // IoError(#[from] std::io::Error),
#[error(transparent)] // #[error(transparent)]
NetlinkError(#[from] rtnetlink::Error), // NetlinkError(#[from] rtnetlink::Error),
} // }
/// Wrapper around a TUN interface that automatically configures itself // /// Wrapper around a TUN interface that automatically configures itself
#[derive(Debug)] // #[derive(Debug)]
pub struct Nat64Interface { // pub struct Nat64Interface {
/// Underlying TUN interface // /// Underlying TUN interface
interface: Iface, // interface: Iface,
/// Interface MTU // /// Interface MTU
mtu: usize, // mtu: usize,
} // }
impl Nat64Interface { // impl Nat64Interface {
/// Create a new NAT64 interface // /// Create a new NAT64 interface
pub async fn new(v6_prefix: Ipv6Net, v4_pool: &Vec<Ipv4Net>) -> Result<Self, InterfaceError> { // pub async fn new(v6_prefix: Ipv6Net, v4_pool: &Vec<Ipv4Net>) -> Result<Self, InterfaceError> {
// Bring up an rtnetlink connection // // Bring up an rtnetlink connection
let (rt_connection, rt_handle, _) = rtnetlink::new_connection()?; // let (rt_connection, rt_handle, _) = rtnetlink::new_connection()?;
tokio::spawn(rt_connection); // tokio::spawn(rt_connection);
// Set up the TUN interface // // Set up the TUN interface
let interface = Iface::without_packet_info("nat64i%d", Mode::Tun)?; // let interface = Iface::without_packet_info("nat64i%d", Mode::Tun)?;
// Get access to the new interface through rtnetlink // // Get access to the new interface through rtnetlink
let interface_link = rt_handle // let interface_link = rt_handle
.link() // .link()
.get() // .get()
.match_name(interface.name().to_owned()) // .match_name(interface.name().to_owned())
.execute() // .execute()
.try_next() // .try_next()
.await? // .await?
.expect("Interface not found even though it was just created"); // .expect("Interface not found even though it was just created");
// Bring up the interface // // Bring up the interface
rt_handle // rt_handle
.link() // .link()
.set(interface_link.header.index) // .set(interface_link.header.index)
.up() // .up()
.execute() // .execute()
.await?; // .await?;
log::info!("Created interface: {}", interface.name()); // log::info!("Created interface: {}", interface.name());
// Add the v6 prefix as a route // // Add the v6 prefix as a route
rt_handle // rt_handle
.route() // .route()
.add() // .add()
.v6() // .v6()
.destination_prefix(v6_prefix.addr(), v6_prefix.prefix_len()) // .destination_prefix(v6_prefix.addr(), v6_prefix.prefix_len())
.output_interface(interface_link.header.index) // .output_interface(interface_link.header.index)
.execute() // .execute()
.await // .await
.map_err(|error| { // .map_err(|error| {
log::error!("Failed to add route for {}: {}", v6_prefix, error); // log::error!("Failed to add route for {}: {}", v6_prefix, error);
error // error
})?; // })?;
log::info!("Added route: {} via {}", v6_prefix, interface.name()); // log::info!("Added route: {} via {}", v6_prefix, interface.name());
// Add every prefix in the v4 pool as a route // // Add every prefix in the v4 pool as a route
for prefix in v4_pool { // for prefix in v4_pool {
rt_handle // rt_handle
.route() // .route()
.add() // .add()
.v4() // .v4()
.destination_prefix(prefix.addr(), prefix.prefix_len()) // .destination_prefix(prefix.addr(), prefix.prefix_len())
.output_interface(interface_link.header.index) // .output_interface(interface_link.header.index)
.execute() // .execute()
.await // .await
.map_err(|error| { // .map_err(|error| {
log::error!("Failed to add route for {}: {}", prefix, error); // log::error!("Failed to add route for {}: {}", prefix, error);
error // error
})?; // })?;
log::info!("Added route: {} via {}", prefix, interface.name()); // log::info!("Added route: {} via {}", prefix, interface.name());
} // }
// Read the interface MTU // // Read the interface MTU
let mtu: usize = // let mtu: usize =
std::fs::read_to_string(format!("/sys/class/net/{}/mtu", interface.name())) // std::fs::read_to_string(format!("/sys/class/net/{}/mtu", interface.name()))
.expect("Failed to read interface MTU") // .expect("Failed to read interface MTU")
.strip_suffix("\n") // .strip_suffix("\n")
.unwrap() // .unwrap()
.parse() // .parse()
.unwrap(); // .unwrap();
Ok(Self { interface, mtu }) // Ok(Self { interface, mtu })
} // }
/// Get the interface mode // /// Get the interface mode
#[allow(dead_code)] // #[allow(dead_code)]
pub fn mode(&self) -> Mode { // pub fn mode(&self) -> Mode {
self.interface.mode() // self.interface.mode()
} // }
/// Get the interface nam // /// Get the interface nam
#[allow(dead_code)] // #[allow(dead_code)]
pub fn name(&self) -> &str { // pub fn name(&self) -> &str {
self.interface.name() // self.interface.name()
} // }
/// Get the interface MTU // /// Get the interface MTU
pub fn mtu(&self) -> usize { // pub fn mtu(&self) -> usize {
self.mtu // self.mtu
} // }
/// Receive a packet from the interface // /// Receive a packet from the interface
pub fn recv(&self, buf: &mut [u8]) -> Result<usize, std::io::Error> { // pub fn recv(&self, buf: &mut [u8]) -> Result<usize, std::io::Error> {
self.interface.recv(buf) // self.interface.recv(buf)
} // }
/// Send a packet to the interface // /// Send a packet to the interface
pub fn send(&self, buf: &[u8]) -> Result<usize, std::io::Error> { // pub fn send(&self, buf: &[u8]) -> Result<usize, std::io::Error> {
self.interface.send(buf) // self.interface.send(buf)
} // }
} // }

View File

@ -1,21 +1,20 @@
use std::{ use self::{
net::{IpAddr, Ipv4Addr, Ipv6Addr}, // interface::Nat64Interface,
time::Duration, packet::IpPacket,
table::{Nat64Table, TableError},
}; };
use ipnet::{Ipv4Net, Ipv6Net};
use pnet_packet::{ip::IpNextHeaderProtocols, Packet};
use crate::{ use crate::{
into_icmp, into_icmpv6, into_tcp, into_udp, ipv4_packet, ipv6_packet, into_icmp, into_icmpv6, into_tcp, into_udp, ipv4_packet, ipv6_packet,
nat::xlat::translate_udp_4_to_6, nat::xlat::translate_udp_4_to_6,
}; };
use ipnet::{Ipv4Net, Ipv6Net};
use self::{ use pnet_packet::{ip::IpNextHeaderProtocols, Packet};
interface::Nat64Interface, use protomask_tun::TunDevice;
packet::IpPacket, use std::{
table::{Nat64Table, TableError}, net::{IpAddr, Ipv4Addr, Ipv6Addr},
time::Duration,
}; };
use tokio::sync::{broadcast, mpsc};
mod interface; mod interface;
mod macros; mod macros;
@ -28,16 +27,18 @@ pub enum Nat64Error {
#[error(transparent)] #[error(transparent)]
TableError(#[from] table::TableError), TableError(#[from] table::TableError),
#[error(transparent)] #[error(transparent)]
InterfaceError(#[from] interface::InterfaceError), TunError(#[from] protomask_tun::Error),
#[error(transparent)] #[error(transparent)]
IoError(#[from] std::io::Error), IoError(#[from] std::io::Error),
#[error(transparent)] #[error(transparent)]
XlatError(#[from] xlat::PacketTranslationError), XlatError(#[from] xlat::PacketTranslationError),
#[error(transparent)]
PacketReceiveError(#[from] broadcast::error::RecvError),
} }
pub struct Nat64 { pub struct Nat64 {
table: Nat64Table, table: Nat64Table,
interface: Nat64Interface, interface: TunDevice,
ipv6_nat_prefix: Ipv6Net, ipv6_nat_prefix: Ipv6Net,
} }
@ -50,7 +51,15 @@ impl Nat64 {
reservation_duration: Duration, reservation_duration: Duration,
) -> Result<Self, Nat64Error> { ) -> Result<Self, Nat64Error> {
// Bring up the interface // Bring up the interface
let interface = Nat64Interface::new(ipv6_nat_prefix, &ipv4_pool).await?; let mut interface = TunDevice::new("nat64i%d").await?;
// Add the NAT64 prefix as a route
interface.add_route(ipv6_nat_prefix.into()).await?;
// Add the IPv4 pool prefixes as routes
for ipv4_prefix in ipv4_pool.iter() {
interface.add_route((*ipv4_prefix).into()).await?;
}
// Build the table and insert any static reservations // Build the table and insert any static reservations
let mut table = Nat64Table::new(ipv4_pool, reservation_duration); let mut table = Nat64Table::new(ipv4_pool, reservation_duration);
@ -67,60 +76,78 @@ impl Nat64 {
/// Block and process all packets /// Block and process all packets
pub async fn run(&mut self) -> Result<(), Nat64Error> { pub async fn run(&mut self) -> Result<(), Nat64Error> {
// Allocate a buffer for incoming packets // Get an rx/tx pair for the interface
let mut buffer = vec![0u8; self.interface.mtu()]; let (tx, mut rx) = self.interface.spawn_worker().await;
// Loop forever // Process packets in a loop
loop { loop {
// Read a packet from the interface // Try to read a packet
match self.interface.recv(&mut buffer) { let packet = rx.recv().await?;
Ok(packet_len) => {
// Parse in to a more friendly format
crate::debug!("--- NEW PACKET ---");
match IpPacket::new(&buffer[..packet_len]) {
// Try to process the packet
Ok(inbound_packet) => match self.process_packet(inbound_packet).await {
Ok(outbound_packet) => match outbound_packet {
// If data is returned, send it back out the interface
Some(outbound_packet) => {
let packet_bytes = outbound_packet.to_bytes();
crate::debug!(
"Outbound packet next header: {}",
outbound_packet.get_next_header().0
);
crate::debug!("Sending packet: {:?}", packet_bytes);
self.interface.send(&packet_bytes).unwrap();
}
// Otherwise, we can assume that the packet was dealt with, and can move on
None => {}
},
// Some errors are non-critical as far as this loop is concerned
Err(error) => match error {
Nat64Error::TableError(TableError::NoIpv6Mapping(address)) => { // Spawn a task to process the packet
crate::debug!("No IPv6 mapping for {}", address); let mut tx = tx.clone();
} tokio::spawn(async move{
error => {
return Err(error);
} });
},
},
Err(error) => {
log::error!("Failed to parse packet: {}", error);
}
}
}
Err(error) => {
log::error!("Failed to read packet: {}", error);
}
}
} }
Ok(())
// // Allocate a buffer for incoming packets
// let mut buffer = vec![0u8; self.interface.mtu()];
// // Loop forever
// loop {
// // Read a packet from the interface
// match self.interface.recv(&mut buffer) {
// Ok(packet_len) => {
// // Parse in to a more friendly format
// log::debug!("--- NEW PACKET ---");
// match IpPacket::new(&buffer[..packet_len]) {
// // Try to process the packet
// Ok(inbound_packet) => match self.process_packet(inbound_packet).await {
// Ok(outbound_packet) => match outbound_packet {
// // If data is returned, send it back out the interface
// Some(outbound_packet) => {
// let packet_bytes = outbound_packet.to_bytes();
// log::debug!(
// "Outbound packet next header: {}",
// outbound_packet.get_next_header().0
// );
// log::debug!("Sending packet: {:?}", packet_bytes);
// self.interface.send(&packet_bytes).unwrap();
// }
// // Otherwise, we can assume that the packet was dealt with, and can move on
// None => {}
// },
// // Some errors are non-critical as far as this loop is concerned
// Err(error) => match error {
// Nat64Error::TableError(TableError::NoIpv6Mapping(address)) => {
// log::debug!("No IPv6 mapping for {}", address);
// }
// error => {
// return Err(error);
// }
// },
// },
// Err(error) => {
// log::error!("Failed to parse packet: {}", error);
// }
// }
// }
// Err(error) => {
// log::error!("Failed to read packet: {}", error);
// }
// }
// }
} }
} }
impl Nat64 { impl Nat64 {
#[profiling::function]
async fn process_packet<'a>( async fn process_packet<'a>(
&mut self, &mut self,
packet: IpPacket<'a>, packet: IpPacket<'a>,
@ -130,7 +157,7 @@ impl Nat64 {
IpAddr::V4(ipv4_addr) => !self.table.is_address_within_pool(&ipv4_addr), IpAddr::V4(ipv4_addr) => !self.table.is_address_within_pool(&ipv4_addr),
IpAddr::V6(ipv6_addr) => !self.ipv6_nat_prefix.contains(&ipv6_addr), IpAddr::V6(ipv6_addr) => !self.ipv6_nat_prefix.contains(&ipv6_addr),
} { } {
crate::debug!( log::debug!(
"Packet destination {} is not within the NAT64 prefix or IPv4 pool", "Packet destination {} is not within the NAT64 prefix or IPv4 pool",
packet.get_destination(), packet.get_destination(),
); );
@ -148,12 +175,12 @@ impl Nat64 {
.calculate_xlat_addr(&destination, &self.ipv6_nat_prefix)?; .calculate_xlat_addr(&destination, &self.ipv6_nat_prefix)?;
// Log information about the packet // Log information about the packet
crate::debug!( log::debug!(
"Received packet traveling from {} to {}", "Received packet traveling from {} to {}",
source, source,
destination destination
); );
crate::debug!( log::debug!(
"New path shall become: {} -> {}", "New path shall become: {} -> {}",
new_source, new_source,
new_destination new_destination

View File

@ -68,7 +68,6 @@ impl Nat64Table {
} }
/// Get or assign an IPv4 address for the given IPv6 address /// Get or assign an IPv4 address for the given IPv6 address
#[profiling::function]
pub fn get_or_assign_ipv4(&mut self, ipv6: Ipv6Addr) -> Result<Ipv4Addr, TableError> { pub fn get_or_assign_ipv4(&mut self, ipv6: Ipv6Addr) -> Result<Ipv4Addr, TableError> {
// Prune old reservations // Prune old reservations
self.prune(); self.prune();
@ -103,7 +102,6 @@ impl Nat64Table {
} }
/// Try to find an IPv6 address for the given IPv4 address /// Try to find an IPv6 address for the given IPv4 address
#[profiling::function]
pub fn get_reverse(&mut self, ipv4: Ipv4Addr) -> Result<Ipv6Addr, TableError> { pub fn get_reverse(&mut self, ipv4: Ipv4Addr) -> Result<Ipv6Addr, TableError> {
// Prune old reservations // Prune old reservations
self.prune(); self.prune();
@ -128,7 +126,6 @@ impl Nat64Table {
} }
/// Calculate the translated version of any address /// Calculate the translated version of any address
#[profiling::function]
pub fn calculate_xlat_addr( pub fn calculate_xlat_addr(
&mut self, &mut self,
input: &IpAddr, input: &IpAddr,
@ -181,7 +178,6 @@ impl Nat64Table {
impl Nat64Table { impl Nat64Table {
/// Prune old reservations /// Prune old reservations
#[profiling::function]
pub fn prune(&mut self) { pub fn prune(&mut self) {
let now = Instant::now(); let now = Instant::now();

View File

@ -144,7 +144,7 @@ pub fn translate_icmp_4_to_6(
// if the original payload's next header is ICMP, we need to translated the inner payload's ICMP type // if the original payload's next header is ICMP, we need to translated the inner payload's ICMP type
if original_payload.get_next_level_protocol() == IpNextHeaderProtocols::Icmp { if original_payload.get_next_level_protocol() == IpNextHeaderProtocols::Icmp {
crate::debug!("Time Exceeded packet contains another ICMP packet.. Translating"); log::debug!("Time Exceeded packet contains another ICMP packet.. Translating");
if let Some((icmpv6_type, icmpv6_code)) = translate_type_and_code_4_to_6( if let Some((icmpv6_type, icmpv6_code)) = translate_type_and_code_4_to_6(
IcmpType(original_payload_inner[0]), IcmpType(original_payload_inner[0]),
IcmpCode(original_payload_inner[1]), IcmpCode(original_payload_inner[1]),
@ -157,7 +157,7 @@ pub fn translate_icmp_4_to_6(
&original_payload_inner[4..] &original_payload_inner[4..]
); );
original_payload_inner = inner_icmpv6.packet().to_vec(); original_payload_inner = inner_icmpv6.packet().to_vec();
crate::debug!( log::debug!(
"Translated inner ICMPv6 packet: {:?}", "Translated inner ICMPv6 packet: {:?}",
original_payload_inner original_payload_inner
); );
@ -194,7 +194,7 @@ pub fn translate_icmp_4_to_6(
output.set_icmpv6_code(icmpv6_code); output.set_icmpv6_code(icmpv6_code);
// Set the payload // Set the payload
crate::debug!("Setting ICMPv6 payload: {:?}", output_payload); log::debug!("Setting ICMPv6 payload: {:?}", output_payload);
output.set_payload(&output_payload); output.set_payload(&output_payload);
// Calculate the checksum // Calculate the checksum
@ -256,7 +256,7 @@ pub fn translate_icmp_6_to_4(
// if the original payload's next header is ICMPv6, we need to translated the inner payload's ICMPv6 type // if the original payload's next header is ICMPv6, we need to translated the inner payload's ICMPv6 type
if original_payload.get_next_header() == IpNextHeaderProtocols::Icmpv6 { if original_payload.get_next_header() == IpNextHeaderProtocols::Icmpv6 {
crate::debug!("Time Exceeded packet contains another ICMPv6 packet.. Translating"); log::debug!("Time Exceeded packet contains another ICMPv6 packet.. Translating");
if let Some((icmp_type, icmp_code)) = translate_type_and_code_6_to_4( if let Some((icmp_type, icmp_code)) = translate_type_and_code_6_to_4(
Icmpv6Type(original_payload_inner[0]), Icmpv6Type(original_payload_inner[0]),
Icmpv6Code(original_payload_inner[1]), Icmpv6Code(original_payload_inner[1]),
@ -264,7 +264,7 @@ pub fn translate_icmp_6_to_4(
let inner_icmp = let inner_icmp =
icmp_packet!(icmp_type, icmp_code, &original_payload_inner[8..]); icmp_packet!(icmp_type, icmp_code, &original_payload_inner[8..]);
original_payload_inner = inner_icmp.packet().to_vec(); original_payload_inner = inner_icmp.packet().to_vec();
crate::debug!("Translated inner ICMP packet: {:?}", original_payload_inner); log::debug!("Translated inner ICMP packet: {:?}", original_payload_inner);
} }
} }