sniffer-agent/capture/network.go

225 lines
5.3 KiB
Go

package capture
import (
"bufio"
"bytes"
"flag"
"math/rand"
"time"
log "github.com/golang/glog"
"github.com/google/gopacket"
"github.com/google/gopacket/layers"
pp "github.com/pires/go-proxyproto"
"github.com/zr-hebo/sniffer-agent/communicator"
"github.com/zr-hebo/sniffer-agent/model"
sd "github.com/zr-hebo/sniffer-agent/session-dealer"
)
var (
DeviceName string
snifferPort int
// inParallel bool
)
func init() {
flag.StringVar(&DeviceName, "interface", "eth0", "network device name. Default is eth0")
flag.IntVar(&snifferPort, "port", 3306, "sniffer port. Default is 3306")
// flag.BoolVar(&inParallel, "in_parallel", false, "if capture and deal package in parallel. Default is false")
}
// networkCard is network device
type networkCard struct {
name string
listenPort int
receiver chan model.QueryPiece
}
type PcapHandler interface {
ZeroCopyReadPacketData() (data []byte, ci gopacket.CaptureInfo, err error)
}
func NewNetworkCard() (nc *networkCard) {
// init device
return &networkCard{
name: DeviceName,
listenPort: snifferPort,
receiver: make(chan model.QueryPiece, 100),
}
}
func (nc *networkCard) Listen() (receiver chan model.QueryPiece) {
nc.listenNormal()
return nc.receiver
}
// Listen get a connection.
func (nc *networkCard) listenNormal() {
go func() {
dealTCPPacket := func(srcIP, dstIP string, tcpPkt *layers.TCP, capturePacketRate float64) {
// send FIN tcp packet to avoid not complete session cannot be released
// deal FIN packet
if tcpPkt.FIN {
nc.parseTCPPackage(srcIP, dstIP, tcpPkt, nil)
return
}
// deal auth packet
if sd.IsAuthPacket(tcpPkt.Payload) {
authHeader, _ := pp.Read(bufio.NewReader(bytes.NewReader(tcpPkt.Payload)))
nc.parseTCPPackage(srcIP, dstIP, tcpPkt, authHeader)
return
}
if 0 < capturePacketRate && capturePacketRate < 1.0 {
// fall into throw range
rn := rand.Float64()
if rn > capturePacketRate {
return
}
}
nc.parseTCPPackage(srcIP, dstIP, tcpPkt, nil)
}
aliveCounter := 0
dealTCPIPPacket := func(tcpIPPkt *TCPIPPair) {
// capture packets according to a certain probability
capturePacketRate := communicator.GetTCPCapturePacketRate()
if capturePacketRate <= 0 {
time.Sleep(time.Second * 1)
aliveCounter += 1
if aliveCounter >= checkCount {
aliveCounter = 0
nc.receiver <- model.NewBaseQueryPiece(localIPAddr, nc.listenPort, capturePacketRate)
}
} else {
dealTCPPacket(tcpIPPkt.srcIP, tcpIPPkt.dstIP, tcpIPPkt.tcpPkt, capturePacketRate)
}
}
dealEachTCPIPPacket(dealTCPIPPacket)
}()
return
}
func (nc *networkCard) parseTCPPackage(srcIP, dstIP string, tcpPkt *layers.TCP, authHeader *pp.Header) {
var err error
defer func() {
if err != nil {
log.Error("parse TCP package failed <-- %s", err.Error())
}
}()
if tcpPkt.SYN || tcpPkt.RST {
return
}
srcPort := int(tcpPkt.SrcPort)
dstPort := int(tcpPkt.DstPort)
if dstPort == nc.listenPort {
// get client ip from proxy auth info
var clientIP *string
var clientPort int
if authHeader != nil && authHeader.SourceAddress.String() != srcIP {
clientIPContent := authHeader.SourceAddress.String()
clientIP = &clientIPContent
clientPort = int(authHeader.SourcePort)
} else {
clientIP = &srcIP
clientPort = srcPort
}
// deal mysql server response
err = readToServerPackage(clientIP, clientPort, &dstIP, tcpPkt, nc.receiver)
if err != nil {
return
}
} else if srcPort == nc.listenPort {
// deal mysql client request
err = readFromServerPackage(&dstIP, dstPort, tcpPkt)
if err != nil {
return
}
}
return
}
func readFromServerPackage(
clientIP *string, clientPort int, tcpPkt *layers.TCP) (err error) {
defer func() {
if err != nil {
log.Error("read Mysql package send from mysql server to client failed <-- %s", err.Error())
}
}()
if tcpPkt.FIN {
sessionKey := spliceSessionKey(clientIP, clientPort)
session := sessionPool[*sessionKey]
if session != nil {
session.Close()
delete(sessionPool, *sessionKey)
}
return
}
tcpPayload := tcpPkt.Payload
if len(tcpPayload) < 1 {
return
}
sessionKey := spliceSessionKey(clientIP, clientPort)
session := sessionPool[*sessionKey]
if session != nil {
pkt := model.NewTCPPacket(tcpPayload, int64(tcpPkt.Ack), false)
session.ReceiveTCPPacket(pkt)
}
return
}
func readToServerPackage(
clientIP *string, clientPort int, destIP *string, tcpPkt *layers.TCP,
receiver chan model.QueryPiece) (err error) {
defer func() {
if err != nil {
log.Error("read package send from client to mysql server failed <-- %s", err.Error())
}
}()
// when client try close connection remove session from session pool
if tcpPkt.FIN {
sessionKey := spliceSessionKey(clientIP, clientPort)
session := sessionPool[*sessionKey]
if session != nil {
session.Close()
delete(sessionPool, *sessionKey)
}
log.Infof("close connection from %s", *sessionKey)
return
}
tcpPayload := tcpPkt.Payload
if len(tcpPayload) < 1 {
return
}
sessionKey := spliceSessionKey(clientIP, clientPort)
session := sessionPool[*sessionKey]
if session == nil {
session = sd.NewSession(sessionKey, clientIP, clientPort, destIP, snifferPort, receiver)
sessionPool[*sessionKey] = session
}
pkt := model.NewTCPPacket(tcpPayload, int64(tcpPkt.Seq), true)
session.ReceiveTCPPacket(pkt)
return
}