原始套接字未收到 icmp 响应

raw socket didn't receive icmp response

我正在尝试发送 TTL 仅为 1 的 icmp 消息,并希望收到超时消息。该消息确实来了(我从 wireshark 看到它),但我的程序在 syscall.Recvfrom 上阻塞。有人知道为什么吗?
icmp.go

package main

import (
    "bytes"
    "encoding/binary"
    "fmt"
    "net"
    "os"
    "syscall"
)

type ICMP struct {
    Type       uint8
    Code       uint8
    Checksum   uint16
    Identifier uint16
    SeqNo      uint16
}

func Checksum(data []byte) uint16 {
    var (
        sum    uint32
        length int = len(data)
        index  int
    )

    for length > 1 {
        sum += uint32(data[index])<<8 + uint32(data[index+1])
        index += 2
        length -= 2
    }

    if length > 0 {
        sum += uint32(data[index])
    }

    sum += (sum >> 16)

    return uint16(^sum)
}

func main() {
    h := Header{
        Version:  4,
        Len:      20,
        TotalLen: 20 + 8,
        TTL:      1,
        Protocol: 1,
        //  Dst:
    }

    argc := len(os.Args)
    if argc < 2 {
        fmt.Println("usage: program + host")
        return
    }

    ipAddr, _ := net.ResolveIPAddr("ip", os.Args[1])
    h.Dst = ipAddr.IP

    icmpReq := ICMP{
        Type:       8,
        Code:       0,
        Identifier: 0,
        SeqNo:      0,
    }

    out, err := h.Marshal()
    if err != nil {
        fmt.Println("ip header error", err)
        return
    }

    var icmpBuf bytes.Buffer
    binary.Write(&icmpBuf, binary.BigEndian, icmpReq)
    icmpReq.Checksum = Checksum(icmpBuf.Bytes())

    icmpBuf.Reset()
    binary.Write(&icmpBuf, binary.BigEndian, icmpReq)

    fd, _ := syscall.Socket(syscall.AF_INET, syscall.SOCK_RAW, syscall.IPPROTO_RAW)
    addr := syscall.SockaddrInet4{
        Port: 0,
    }

    copy(addr.Addr[:], ipAddr.IP[12:16])
    pkg := append(out, icmpBuf.Bytes()...)

    fmt.Println("ip length", len(pkg))

    if err := syscall.Sendto(fd, pkg, 0, &addr); err != nil {
        fmt.Println("Sendto err:", err)
    }

    var recvBuf []byte
    if nBytes, rAddr, err := syscall.Recvfrom(fd, recvBuf, 0); err == nil {
        fmt.Printf("recv %d bytes from %v\n", nBytes, rAddr)
    }
}

此外,我使用 header.gohelper.go 来自 https://github.com/golang/net/tree/master/ipv4

我认为您需要在创建套接字时将 IPPROTO_ICMP 作为协议。 raw(7) man page 表示 IPPROTO_RAW 套接字仅发送。此外,如果您使用 IPPROTO_ICMP,则不会提供 IP header。 (注意:我实际上并没有在 Go 中尝试过。)

正如安迪指出的那样,raw(7) man page 说:

An IPPROTO_RAW socket is send only. If you really want to receive all IP packets, use a packet(7) socket with the ETH_P_IP protocol. Note that packet sockets don't reassemble IP fragments, unlike raw sockets.

我知道如果我在创建套接字时将IPPROTO_ICMP设置为协议,我可以收到ICMP回复,但我需要将TTL设置为1,这必须在IP层完成。因此,我使用 IPPROTO_RAW 套接字发送 ICMP 请求,之后我使用 net.ListenIP 接收 ICMP 消息。这是代码:

package main

import (
    "bytes"
    "encoding/binary"
    "log"
    "net"
    "os"
    "syscall"
)

const icmpID uint16 = 43565 // use a magic number for now

type ICMP struct {
    Type       uint8
    Code       uint8
    Checksum   uint16
    Identifier uint16
    SeqNo      uint16
}

func Checksum(data []byte) uint16 {
    var (
        sum    uint32
        length int = len(data)
        index  int
    )

    for length > 1 {
        sum += uint32(data[index])<<8 + uint32(data[index+1])
        index += 2
        length -= 2
    }

    if length > 0 {
        sum += uint32(data[index])
    }

    sum += (sum >> 16)

    return uint16(^sum)
}

func main() {
    h := Header{
        Version:  4,
        Len:      20,
        TotalLen: 20 + 8,
        TTL:      1,
        Protocol: 1,
    }

    argc := len(os.Args)
    if argc < 2 {
        log.Println("usage: program + host")
        return
    }

    ipAddr, _ := net.ResolveIPAddr("ip", os.Args[1])
    h.Dst = ipAddr.IP

    icmpReq := ICMP{
        Type:       8,
        Code:       0,
        Identifier: icmpID,
        SeqNo:      1,
    }

    out, err := h.Marshal()
    if err != nil {
        log.Println("ip header error", err)
        return
    }

    var icmpBuf bytes.Buffer
    binary.Write(&icmpBuf, binary.BigEndian, icmpReq)
    icmpReq.Checksum = Checksum(icmpBuf.Bytes())

    icmpBuf.Reset()
    binary.Write(&icmpBuf, binary.BigEndian, icmpReq)

    fd, _ := syscall.Socket(syscall.AF_INET, syscall.SOCK_RAW, syscall.IPPROTO_RAW)
    addr := syscall.SockaddrInet4{
        Port: 0,
    }

    copy(addr.Addr[:], ipAddr.IP[12:16])
    pkg := append(out, icmpBuf.Bytes()...)

    if err := syscall.Sendto(fd, pkg, 0, &addr); err != nil {
        log.Println("Sendto err:", err)
    }

    laddr, err := net.ResolveIPAddr("ip4:icmp", "0.0.0.0")
    if err != nil {
        log.Fatal(err)

    }

    c, err := net.ListenIP("ip4:icmp", laddr)
    if err != nil {
        log.Fatal(err)
    }

    for {
        buf := make([]byte, 2048)
        n, raddr, err := c.ReadFrom(buf)
        if err != nil {
            log.Println(err)
            continue
        }
        icmpType := buf[0]
        if icmpType == 11 {
            if n == 36 { // Time exceeded messages
                // A time exceeded message contain IP header(20 bytes) and first 64 bits of the original payload
                id := binary.BigEndian.Uint16(buf[32:34])
                log.Println("recv id", id)
                if id == icmpID {
                    log.Println("recv Time Exceeded from", raddr)
                }
            }
        }
    }
}

实际上,我正在用go写一个traceroute,如果有人对此感兴趣,整个代码在github