blob: 222d2709e2745b0bfc0c4c8994f5124b098bf971 [file] [log] [blame]
henrike@webrtc.orgf0488722014-05-13 18:00:26 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
jbauch555604a2016-04-26 03:13:22 -070011#include <memory>
12
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000013#include "webrtc/base/natsocketfactory.h"
14#include "webrtc/base/natserver.h"
15#include "webrtc/base/logging.h"
deadbeefc5d0d952015-07-16 10:22:21 -070016#include "webrtc/base/socketadapters.h"
henrike@webrtc.orgf0488722014-05-13 18:00:26 +000017
18namespace rtc {
19
20RouteCmp::RouteCmp(NAT* nat) : symmetric(nat->IsSymmetric()) {
21}
22
23size_t RouteCmp::operator()(const SocketAddressPair& r) const {
24 size_t h = r.source().Hash();
25 if (symmetric)
26 h ^= r.destination().Hash();
27 return h;
28}
29
30bool RouteCmp::operator()(
31 const SocketAddressPair& r1, const SocketAddressPair& r2) const {
32 if (r1.source() < r2.source())
33 return true;
34 if (r2.source() < r1.source())
35 return false;
36 if (symmetric && (r1.destination() < r2.destination()))
37 return true;
38 if (symmetric && (r2.destination() < r1.destination()))
39 return false;
40 return false;
41}
42
43AddrCmp::AddrCmp(NAT* nat)
44 : use_ip(nat->FiltersIP()), use_port(nat->FiltersPort()) {
45}
46
47size_t AddrCmp::operator()(const SocketAddress& a) const {
48 size_t h = 0;
49 if (use_ip)
50 h ^= HashIP(a.ipaddr());
51 if (use_port)
52 h ^= a.port() | (a.port() << 16);
53 return h;
54}
55
56bool AddrCmp::operator()(
57 const SocketAddress& a1, const SocketAddress& a2) const {
58 if (use_ip && (a1.ipaddr() < a2.ipaddr()))
59 return true;
60 if (use_ip && (a2.ipaddr() < a1.ipaddr()))
61 return false;
62 if (use_port && (a1.port() < a2.port()))
63 return true;
64 if (use_port && (a2.port() < a1.port()))
65 return false;
66 return false;
67}
68
deadbeefc5d0d952015-07-16 10:22:21 -070069// Proxy socket that will capture the external destination address intended for
70// a TCP connection to the NAT server.
71class NATProxyServerSocket : public AsyncProxyServerSocket {
72 public:
73 NATProxyServerSocket(AsyncSocket* socket)
74 : AsyncProxyServerSocket(socket, kNATEncodedIPv6AddressSize) {
75 BufferInput(true);
76 }
77
78 void SendConnectResult(int err, const SocketAddress& addr) override {
79 char code = err ? 1 : 0;
80 BufferedReadAdapter::DirectSend(&code, sizeof(char));
81 }
82
83 protected:
84 void ProcessInput(char* data, size_t* len) override {
85 if (*len < 2) {
86 return;
87 }
88
89 int family = data[1];
90 ASSERT(family == AF_INET || family == AF_INET6);
91 if ((family == AF_INET && *len < kNATEncodedIPv4AddressSize) ||
92 (family == AF_INET6 && *len < kNATEncodedIPv6AddressSize)) {
93 return;
94 }
95
96 SocketAddress dest_addr;
97 size_t address_length = UnpackAddressFromNAT(data, *len, &dest_addr);
98
99 *len -= address_length;
100 if (*len > 0) {
101 memmove(data, data + address_length, *len);
102 }
103
104 bool remainder = (*len > 0);
105 BufferInput(false);
106 SignalConnectRequest(this, dest_addr);
107 if (remainder) {
108 SignalReadEvent(this);
109 }
110 }
111
112};
113
114class NATProxyServer : public ProxyServer {
115 public:
116 NATProxyServer(SocketFactory* int_factory, const SocketAddress& int_addr,
117 SocketFactory* ext_factory, const SocketAddress& ext_ip)
118 : ProxyServer(int_factory, int_addr, ext_factory, ext_ip) {
119 }
120
121 protected:
122 AsyncProxyServerSocket* WrapSocket(AsyncSocket* socket) override {
123 return new NATProxyServerSocket(socket);
124 }
125};
126
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000127NATServer::NATServer(
deadbeefc5d0d952015-07-16 10:22:21 -0700128 NATType type, SocketFactory* internal,
129 const SocketAddress& internal_udp_addr,
130 const SocketAddress& internal_tcp_addr,
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000131 SocketFactory* external, const SocketAddress& external_ip)
132 : external_(external), external_ip_(external_ip.ipaddr(), 0) {
133 nat_ = NAT::Create(type);
134
deadbeefc5d0d952015-07-16 10:22:21 -0700135 udp_server_socket_ = AsyncUDPSocket::Create(internal, internal_udp_addr);
136 udp_server_socket_->SignalReadPacket.connect(this,
137 &NATServer::OnInternalUDPPacket);
138 tcp_proxy_server_ = new NATProxyServer(internal, internal_tcp_addr, external,
139 external_ip);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000140
141 int_map_ = new InternalMap(RouteCmp(nat_));
142 ext_map_ = new ExternalMap();
143}
144
145NATServer::~NATServer() {
146 for (InternalMap::iterator iter = int_map_->begin();
147 iter != int_map_->end();
148 iter++)
149 delete iter->second;
150
151 delete nat_;
deadbeefc5d0d952015-07-16 10:22:21 -0700152 delete udp_server_socket_;
153 delete tcp_proxy_server_;
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000154 delete int_map_;
155 delete ext_map_;
156}
157
deadbeefc5d0d952015-07-16 10:22:21 -0700158void NATServer::OnInternalUDPPacket(
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000159 AsyncPacketSocket* socket, const char* buf, size_t size,
160 const SocketAddress& addr, const PacketTime& packet_time) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000161 // Read the intended destination from the wire.
162 SocketAddress dest_addr;
163 size_t length = UnpackAddressFromNAT(buf, size, &dest_addr);
164
165 // Find the translation for these addresses (allocating one if necessary).
166 SocketAddressPair route(addr, dest_addr);
167 InternalMap::iterator iter = int_map_->find(route);
168 if (iter == int_map_->end()) {
169 Translate(route);
170 iter = int_map_->find(route);
171 }
172 ASSERT(iter != int_map_->end());
173
174 // Allow the destination to send packets back to the source.
175 iter->second->WhitelistInsert(dest_addr);
176
177 // Send the packet to its intended destination.
178 rtc::PacketOptions options;
179 iter->second->socket->SendTo(buf + length, size - length, dest_addr, options);
180}
181
deadbeefc5d0d952015-07-16 10:22:21 -0700182void NATServer::OnExternalUDPPacket(
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000183 AsyncPacketSocket* socket, const char* buf, size_t size,
184 const SocketAddress& remote_addr, const PacketTime& packet_time) {
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000185 SocketAddress local_addr = socket->GetLocalAddress();
186
187 // Find the translation for this addresses.
188 ExternalMap::iterator iter = ext_map_->find(local_addr);
189 ASSERT(iter != ext_map_->end());
190
191 // Allow the NAT to reject this packet.
192 if (ShouldFilterOut(iter->second, remote_addr)) {
193 LOG(LS_INFO) << "Packet from " << remote_addr.ToSensitiveString()
194 << " was filtered out by the NAT.";
195 return;
196 }
197
198 // Forward this packet to the internal address.
199 // First prepend the address in a quasi-STUN format.
jbauch555604a2016-04-26 03:13:22 -0700200 std::unique_ptr<char[]> real_buf(new char[size + kNATEncodedIPv6AddressSize]);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000201 size_t addrlength = PackAddressForNAT(real_buf.get(),
202 size + kNATEncodedIPv6AddressSize,
203 remote_addr);
204 // Copy the data part after the address.
205 rtc::PacketOptions options;
206 memcpy(real_buf.get() + addrlength, buf, size);
deadbeefc5d0d952015-07-16 10:22:21 -0700207 udp_server_socket_->SendTo(real_buf.get(), size + addrlength,
208 iter->second->route.source(), options);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000209}
210
211void NATServer::Translate(const SocketAddressPair& route) {
212 AsyncUDPSocket* socket = AsyncUDPSocket::Create(external_, external_ip_);
213
214 if (!socket) {
215 LOG(LS_ERROR) << "Couldn't find a free port!";
216 return;
217 }
218
219 TransEntry* entry = new TransEntry(route, socket, nat_);
220 (*int_map_)[route] = entry;
221 (*ext_map_)[socket->GetLocalAddress()] = entry;
deadbeefc5d0d952015-07-16 10:22:21 -0700222 socket->SignalReadPacket.connect(this, &NATServer::OnExternalUDPPacket);
henrike@webrtc.orgf0488722014-05-13 18:00:26 +0000223}
224
225bool NATServer::ShouldFilterOut(TransEntry* entry,
226 const SocketAddress& ext_addr) {
227 return entry->WhitelistContains(ext_addr);
228}
229
230NATServer::TransEntry::TransEntry(
231 const SocketAddressPair& r, AsyncUDPSocket* s, NAT* nat)
232 : route(r), socket(s) {
233 whitelist = new AddressSet(AddrCmp(nat));
234}
235
236NATServer::TransEntry::~TransEntry() {
237 delete whitelist;
238 delete socket;
239}
240
241void NATServer::TransEntry::WhitelistInsert(const SocketAddress& addr) {
242 CritScope cs(&crit_);
243 whitelist->insert(addr);
244}
245
246bool NATServer::TransEntry::WhitelistContains(const SocketAddress& ext_addr) {
247 CritScope cs(&crit_);
248 return whitelist->find(ext_addr) == whitelist->end();
249}
250
251} // namespace rtc