2012-06-29 05:18:28 +00:00
|
|
|
# -*- coding: binary -*-
|
2012-01-24 16:16:56 +00:00
|
|
|
##
|
|
|
|
#
|
|
|
|
# NAT-PMP protocol support
|
|
|
|
#
|
|
|
|
##
|
|
|
|
|
|
|
|
module Rex
|
|
|
|
module Proto
|
|
|
|
module NATPMP
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
# Return a NAT-PMP request to get the external address.
|
2014-08-22 17:34:05 +00:00
|
|
|
def external_address_request
|
2013-08-30 21:28:33 +00:00
|
|
|
[ 0, 0 ].pack('nn')
|
|
|
|
end
|
2012-01-24 16:16:56 +00:00
|
|
|
|
2014-10-14 21:20:24 +00:00
|
|
|
def get_external_address(udp_sock, host, port, timeout=1)
|
|
|
|
vprint_status("#{host}:#{port} - Probing NAT-PMP for external address")
|
|
|
|
udp_sock.sendto(external_address_request, host, port, 0)
|
|
|
|
external_address = nil
|
|
|
|
while (r = udp_sock.recvfrom(12, timeout) and r[1])
|
|
|
|
(ver, op, result, epoch, external_address) = parse_external_address_response(r[0])
|
|
|
|
if external_address
|
|
|
|
vprint_good("#{host}:#{port} - NAT-PMP external address is #{external_address}")
|
|
|
|
break
|
|
|
|
end
|
|
|
|
end
|
|
|
|
external_address
|
|
|
|
end
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
# Parse a NAT-PMP external address response +resp+.
|
|
|
|
# Returns the decoded parts of the response as an array.
|
2014-08-22 17:34:05 +00:00
|
|
|
def parse_external_address_response(resp)
|
|
|
|
(ver, op, result, epoch, addr) = resp.unpack("CCnNN")
|
2013-08-30 21:28:33 +00:00
|
|
|
[ ver, op, result, epoch, Rex::Socket::addr_itoa(addr) ]
|
|
|
|
end
|
2012-01-24 16:16:56 +00:00
|
|
|
|
2014-10-14 21:20:24 +00:00
|
|
|
def map_port(udp_sock, host, port, int_port, ext_port, protocol, lifetime, timeout=1)
|
|
|
|
vprint_status("#{host}:#{port} - Sending NAT-PMP mapping request")
|
|
|
|
# build the mapping request
|
|
|
|
req = map_port_request(int_port, ext_port,
|
|
|
|
Rex::Proto::NATPMP.const_get(datastore['PROTOCOL']), datastore['LIFETIME'])
|
|
|
|
# send it
|
|
|
|
udp_sock.sendto(req, host, datastore['RPORT'], 0)
|
|
|
|
# handle the reply
|
|
|
|
while (r = udp_sock.recvfrom(16, timeout) and r[1])
|
|
|
|
(_, _, result, _, _, actual_ext_port, _) = parse_map_port_response(r[0])
|
|
|
|
return (result == 0 ? actual_ext_port : nil)
|
|
|
|
end
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
# Return a NAT-PMP request to map remote port +rport+/+protocol+ to local port +lport+ for +lifetime+ ms
|
2014-08-22 17:34:05 +00:00
|
|
|
def map_port_request(lport, rport, protocol, lifetime)
|
|
|
|
[ Rex::Proto::NATPMP::Version, # version
|
2013-08-30 21:28:33 +00:00
|
|
|
protocol, # opcode, which is now the protocol we are asking to forward
|
|
|
|
0, # reserved
|
|
|
|
lport,
|
|
|
|
rport,
|
|
|
|
lifetime
|
2014-06-30 07:48:18 +00:00
|
|
|
].pack("CCnnnN")
|
2013-08-30 21:28:33 +00:00
|
|
|
end
|
2012-01-24 16:16:56 +00:00
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
# Parse a NAT-PMP mapping response +resp+.
|
|
|
|
# Returns the decoded parts as an array.
|
2014-08-22 17:34:05 +00:00
|
|
|
def parse_map_port_response(resp)
|
2014-08-22 19:41:35 +00:00
|
|
|
resp.unpack("CCnNnnN")
|
2013-08-30 21:28:33 +00:00
|
|
|
end
|
2014-10-14 21:20:24 +00:00
|
|
|
|
2012-01-24 16:16:56 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|