# 網路模擬-anti TCP SYN Port Scan ###### tags: `P4`、`Mininet` ------- Question === - H1 will use TCP SYN to do the port scan. S1(p4 switch) will detect it and block the packet sent from H1. - Detect method: when the number of SYN packets - the number of SYN+ACK packets > 3, then S1 will block the connection. Environment === ![](https://i.imgur.com/ju8Pley.png) >TCP threehandshake about syn port scan. ![](https://i.imgur.com/QJiWPpi.png) Codes === > basic.p4 ↓ ``` #include <core.p4> #include <v1model.p4> const bit<16> TYPE_IPV4 = 0x800; /************************************************************************* *********************** H E A D E R S *********************************** *************************************************************************/ typedef bit<9> egressSpec_t; typedef bit<48> macAddr_t; typedef bit<32> ip4Addr_t; register<bit<10>>(1024) syn_cnt; register<bit<10>>(1024) syn_ack_cnt; header ethernet_t { macAddr_t dstAddr; macAddr_t srcAddr; bit<16> etherType; } header ipv4_t { bit<4> version; bit<4> ihl; bit<8> diffserv; bit<16> totalLen; bit<16> identification; bit<3> flags; bit<13> fragOffset; bit<8> ttl; bit<8> protocol; bit<16> hdrChecksum; ip4Addr_t srcAddr; ip4Addr_t dstAddr; } header tcp_t { bit<16> srcPort; bit<16> dstPort; bit<32> seqNo; bit<32> ackNo; bit<4> dataOffset; bit<4> res; bit<8> flags; bit<16> window; bit<16> checksum; bit<16> urgentPtr; } header udp_t { bit<16> srcPort; bit<16> dstPort; bit<16> udplength; bit<16> checksum; } struct metadata { bit<10> flowlet_map_index; bit<10> syn_count; bit<10> syn_ack_count; } struct headers { ethernet_t ethernet; ipv4_t ipv4; tcp_t tcp; udp_t udp; } /************************************************************************* *********************** P A R S E R *********************************** *************************************************************************/ parser MyParser(packet_in packet, out headers hdr, inout metadata meta, inout standard_metadata_t standard_metadata) { state start { transition parse_ethernet; } state parse_ethernet { packet.extract(hdr.ethernet); transition select(hdr.ethernet.etherType) { TYPE_IPV4: parse_ipv4; default: accept; } } state parse_ipv4 { packet.extract(hdr.ipv4); transition select(hdr.ipv4.protocol) { 0x06: parse_tcp; 0x11: parse_udp; default: accept; } } state parse_tcp { packet.extract(hdr.tcp); transition accept; } state parse_udp { packet.extract(hdr.udp); transition accept; } } /************************************************************************* ************ C H E C K S U M V E R I F I C A T I O N ************* *************************************************************************/ control MyVerifyChecksum(inout headers hdr, inout metadata meta) { apply { } } /************************************************************************* ************** I N G R E S S P R O C E S S I N G ******************* *************************************************************************/ control MyIngress(inout headers hdr, inout metadata meta, inout standard_metadata_t standard_metadata) { action add_syn_cnt() { hash(meta.flowlet_map_index, HashAlgorithm.crc16, (bit<16>)0, { hdr.ipv4.srcAddr }, (bit<32>)1024); syn_cnt.read(meta.syn_count, (bit<32>)meta.flowlet_map_index); meta.syn_count=meta.syn_count+1; syn_cnt.write((bit<32>)meta.flowlet_map_index, meta.syn_count); } action add_syn_ack_cnt() { hash(meta.flowlet_map_index, HashAlgorithm.crc16, (bit<16>)0, { hdr.ipv4.dstAddr }, (bit<32>)1024); syn_ack_cnt.read(meta.syn_ack_count, (bit<32>)meta.flowlet_map_index); meta.syn_ack_count=meta.syn_ack_count+1; syn_ack_cnt.write((bit<32>)meta.flowlet_map_index, meta.syn_ack_count); } action drop() { mark_to_drop(standard_metadata); } action forward(macAddr_t dstAddr, egressSpec_t port) { hdr.ethernet.srcAddr = hdr.ethernet.dstAddr; hdr.ethernet.dstAddr = dstAddr; standard_metadata.egress_spec = port; hdr.ipv4.ttl = hdr.ipv4.ttl - 1; } table ip_forward { key = { hdr.ipv4.dstAddr: exact; } actions = { forward; drop; } size = 1024; default_action = drop(); } apply { bit<1> set_drop=0; if (hdr.tcp.isValid()){ if(hdr.tcp.flags==2) { add_syn_cnt(); hash(meta.flowlet_map_index, HashAlgorithm.crc16, (bit<16>)0, { hdr.ipv4.srcAddr }, (bit<32>)1024); bit<10> tmp; syn_ack_cnt.read(tmp, (bit<32>)meta.flowlet_map_index); if(tmp==0 && meta.syn_count>3){ set_drop=1; } if (tmp!=0 && meta.syn_count > (bit<10>)(3+tmp)){ set_drop=1; } } else if (hdr.tcp.flags==0x12) { add_syn_ack_cnt(); } } if( hdr.ipv4.isValid() && set_drop==0){ ip_forward.apply(); } } } /************************************************************************* **************** E G R E S S P R O C E S S I N G ******************* *************************************************************************/ control MyEgress(inout headers hdr, inout metadata meta, inout standard_metadata_t standard_metadata) { apply { } } /************************************************************************* ************* C H E C K S U M C O M P U T A T I O N ************** *************************************************************************/ control MyComputeChecksum(inout headers hdr, inout metadata meta) { apply { update_checksum( hdr.ipv4.isValid(), { hdr.ipv4.version, hdr.ipv4.ihl, hdr.ipv4.diffserv, hdr.ipv4.totalLen, hdr.ipv4.identification, hdr.ipv4.flags, hdr.ipv4.fragOffset, hdr.ipv4.ttl, hdr.ipv4.protocol, hdr.ipv4.srcAddr, hdr.ipv4.dstAddr }, hdr.ipv4.hdrChecksum, HashAlgorithm.csum16); } } /************************************************************************* *********************** D E P A R S E R ******************************* *************************************************************************/ control MyDeparser(packet_out packet, in headers hdr) { apply { packet.emit(hdr.ethernet); packet.emit(hdr.ipv4); packet.emit(hdr.tcp); packet.emit(hdr.udp); } } /************************************************************************* *********************** S W I T C H ******************************* *************************************************************************/ V1Switch( MyParser(), MyVerifyChecksum(), MyIngress(), MyEgress(), MyComputeChecksum(), MyDeparser() ) main; ``` > p4app.json ↓ ``` { "program": "basic.p4", "switch": "simple_switch", "compiler": "p4c", "options": "--target bmv2 --arch v1model --std p4-16", "switch_cli": "simple_switch_CLI", "cli": true, "pcap_dump": true, "enable_log": true, "topo_module": { "file_path": "", "module_name": "p4utils.mininetlib.apptopo", "object_name": "AppTopoStrategies" }, "controller_module": null, "topodb_module": { "file_path": "", "module_name": "p4utils.utils.topology", "object_name": "Topology" }, "mininet_module": { "file_path": "", "module_name": "p4utils.mininetlib.p4net", "object_name": "P4Mininet" }, "topology": { "assignment_strategy": "manual", "auto_arp_tables": "true", "auto_gw_arp": "true", "links": [["h1", "s1"], ["h2", "s1"],["h3", "s1"]], "hosts": { "h1": { "ip": "10.0.1.1/24", "gw": "10.0.1.254" }, "h2": { "ip": "10.0.2.1/24", "gw": "10.0.2.254" }, "h3": { "ip": "10.0.3.1/24", "gw": "10.0.3.254" } }, "switches": { "s1": { "cli_input": "cmd.txt", "program": "basic.p4" } } } } ``` > cmd.txt ↓ ``` table_add ip_forward forward 10.0.1.1 => 00:00:0a:00:01:01 1 table_add ip_forward forward 10.0.2.1 => 00:00:0a:00:02:01 2 table_add ip_forward forward 10.0.3.1 => 00:00:0a:00:03:01 3 ``` Test === > anti syn port scan, if malicious packet transmission over than 3, controller will set a rule about "drop packet" and back to p4-switch. ![](https://i.imgur.com/HQI9gJJ.png) >h1 send a packet to h3, and h1's ip is block. ![](https://i.imgur.com/E3THhzT.png) Reference === [anti port scan](http://csie.nqu.edu.tw/smallko/sdn/anti_tcp_syn_port_scan.htm) --- ###### 2020-06-29 ###### written by **yi-hao tu**