mirror of
https://github.com/zr-hebo/sniffer-agent.git
synced 2025-09-18 17:56:52 +08:00
deal all auth packet
This commit is contained in:
@@ -31,17 +31,17 @@ func init() {
|
|||||||
|
|
||||||
// networkCard is network device
|
// networkCard is network device
|
||||||
type networkCard struct {
|
type networkCard struct {
|
||||||
name string
|
name string
|
||||||
listenPort int
|
listenPort int
|
||||||
receiver chan model.QueryPiece
|
receiver chan model.QueryPiece
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewNetworkCard() (nc *networkCard) {
|
func NewNetworkCard() (nc *networkCard) {
|
||||||
// init device
|
// init device
|
||||||
return &networkCard{
|
return &networkCard{
|
||||||
name: DeviceName,
|
name: DeviceName,
|
||||||
listenPort: snifferPort,
|
listenPort: snifferPort,
|
||||||
receiver: make(chan model.QueryPiece, 100),
|
receiver: make(chan model.QueryPiece, 100),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -97,7 +97,6 @@ func (nc *networkCard) Listen() (receiver chan model.QueryPiece) {
|
|||||||
return nc.receiver
|
return nc.receiver
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// Listen get a connection.
|
// Listen get a connection.
|
||||||
func (nc *networkCard) listenNormal() {
|
func (nc *networkCard) listenNormal() {
|
||||||
go func() {
|
go func() {
|
||||||
@@ -112,7 +111,7 @@ func (nc *networkCard) listenNormal() {
|
|||||||
// capture packets according to a certain probability
|
// capture packets according to a certain probability
|
||||||
capturePacketRate := communicator.GetTCPCapturePacketRate()
|
capturePacketRate := communicator.GetTCPCapturePacketRate()
|
||||||
if capturePacketRate <= 0 {
|
if capturePacketRate <= 0 {
|
||||||
time.Sleep(time.Second*1)
|
time.Sleep(time.Second * 1)
|
||||||
aliveCounter += 1
|
aliveCounter += 1
|
||||||
if aliveCounter >= checkCount {
|
if aliveCounter >= checkCount {
|
||||||
aliveCounter = 0
|
aliveCounter = 0
|
||||||
@@ -124,7 +123,7 @@ func (nc *networkCard) listenNormal() {
|
|||||||
data, ci, err = handler.ZeroCopyReadPacketData()
|
data, ci, err = handler.ZeroCopyReadPacketData()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error(err.Error())
|
log.Error(err.Error())
|
||||||
time.Sleep(time.Second*3)
|
time.Sleep(time.Second * 3)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -135,7 +134,10 @@ func (nc *networkCard) listenNormal() {
|
|||||||
|
|
||||||
// send FIN tcp packet to avoid not complete session cannot be released
|
// send FIN tcp packet to avoid not complete session cannot be released
|
||||||
tcpPkt := packet.TransportLayer().(*layers.TCP)
|
tcpPkt := packet.TransportLayer().(*layers.TCP)
|
||||||
if tcpPkt.FIN {
|
payLoad := tcpPkt.Payload
|
||||||
|
// deal FIN packet
|
||||||
|
// deal auth packet
|
||||||
|
if tcpPkt.FIN || (len(payLoad) >= 5 && sd.IsAuthPacket(payLoad[4])) {
|
||||||
nc.parseTCPPackage(packet)
|
nc.parseTCPPackage(packet)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
@@ -274,4 +276,3 @@ func readToServerPackage(
|
|||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -24,3 +24,12 @@ func CheckParams() {
|
|||||||
mysql.CheckParams()
|
mysql.CheckParams()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func IsAuthPacket(val byte) bool {
|
||||||
|
switch serviceType {
|
||||||
|
case ServiceTypeMysql:
|
||||||
|
return mysql.IsAuthPacket(val)
|
||||||
|
default:
|
||||||
|
return mysql.IsAuthPacket(val)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@@ -144,7 +144,7 @@ func (ms *MysqlSession) readFromClient(seqID int64, bytes []byte) {
|
|||||||
|
|
||||||
if ms.expectReceiveSize == -1 {
|
if ms.expectReceiveSize == -1 {
|
||||||
// ignore invalid head package
|
// ignore invalid head package
|
||||||
if len(bytes) <= 4{
|
if len(bytes) <= 4 {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -208,6 +208,10 @@ func (ms *MysqlSession) readFromClient(seqID int64, bytes []byte) {
|
|||||||
// ms.expectReceiveSize = ms.expectReceiveSize - int(contentSize)
|
// ms.expectReceiveSize = ms.expectReceiveSize - int(contentSize)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func IsAuthPacket(val byte) bool {
|
||||||
|
return val > 32
|
||||||
|
}
|
||||||
|
|
||||||
func (ms *MysqlSession) GenerateQueryPiece() (qp model.QueryPiece) {
|
func (ms *MysqlSession) GenerateQueryPiece() (qp model.QueryPiece) {
|
||||||
defer ms.clear()
|
defer ms.clear()
|
||||||
|
|
||||||
@@ -227,7 +231,7 @@ func (ms *MysqlSession) GenerateQueryPiece() (qp model.QueryPiece) {
|
|||||||
|
|
||||||
var mqp *model.PooledMysqlQueryPiece
|
var mqp *model.PooledMysqlQueryPiece
|
||||||
var querySQLInBytes []byte
|
var querySQLInBytes []byte
|
||||||
if ms.cachedStmtBytes[0] > 32 {
|
if IsAuthPacket(ms.cachedStmtBytes[0]) {
|
||||||
userName, dbName, err := parseAuthInfo(ms.cachedStmtBytes)
|
userName, dbName, err := parseAuthInfo(ms.cachedStmtBytes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("parse auth info failed <-- %s", err.Error())
|
log.Errorf("parse auth info failed <-- %s", err.Error())
|
||||||
|
Reference in New Issue
Block a user