Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unknown PTCP Packet Type 0x0a Received #15

Open
krabiswabbie opened this issue Feb 12, 2025 · 0 comments
Open

Unknown PTCP Packet Type 0x0a Received #15

krabiswabbie opened this issue Feb 12, 2025 · 0 comments

Comments

@krabiswabbie
Copy link

krabiswabbie commented Feb 12, 2025

Hi,

While experimenting with a minified relay-only model, I encounter an unexpected PTCP packet type during the realm binding process.

After sending a Binding Port packet, the system receives a PTCP packet identified as type 0x0a, which the current implementation doesn't recognize. This occurs after the initial PTCP session (SYN/SYN-ACK) is successfully established and during the realm binding attempt.

Any insights into packet type 0x0a and its role in the PTCP relay protocol would be greatly appreciated.

Here's a snippet from the debug logs showing the received packet:

time=2025-02-12T19:12:54.516+03:00 level=DEBUG msg="Attempting to fetch relay address from www.easy4ipcloud.com:8800"
time=2025-02-12T19:12:54.727+03:00 level=DEBUG msg="Sending request" req="DHGET /online/relay HTTP/1.1\r\nCSeq: 1\r\nAuthorization: WSSE profile=\"UsernameToken\"\r\nX-WSSE: UsernameToken Username=\"cba1b29e32cb17aa46b8ff9e73c7f40b\", PasswordDigest=\"RJk2jM0LWTrQxx6FnKgLnCNJAOs=\", Nonce=\"1208787743\", Created=\"2025-02-12T16:12:54Z\"\r\n\r\n"
time=2025-02-12T19:12:54.923+03:00 level=DEBUG msg="Received response" resp="HTTP/1.1 200 OK\r\nDate: 2025-02-12T16:12:54Z\r\nCSeq: 1\r\nContent-Type: \r\nContent-Length: 89\r\n\r\n<?xml version=\"1.0\" encoding=\"UTF-8\"?><body><Address>150.230.41.180:8900</Address></body>"
time=2025-02-12T19:12:54.923+03:00 level=DEBUG msg="Relay address is 150.230.41.180:8900"
time=2025-02-12T19:12:54.923+03:00 level=DEBUG msg="Attempting to setup initial relay connection"
time=2025-02-12T19:12:54.923+03:00 level=DEBUG msg="Sending request" req="DHGET /relay/agent HTTP/1.1\r\nCSeq: 2\r\nAuthorization: WSSE profile=\"UsernameToken\"\r\nX-WSSE: UsernameToken Username=\"cba1b29e32cb17aa46b8ff9e73c7f40b\", PasswordDigest=\"5KuIh0KBajMBp3lLe1abP8Pmh9k=\", Nonce=\"1310360986\", Created=\"2025-02-12T16:12:54Z\"\r\n\r\n"
time=2025-02-12T19:12:55.122+03:00 level=DEBUG msg="Received response" resp="HTTP/1.1 200 OK\r\nCSeq: 2\r\nContent-Type: \r\nContent-Length: 170\r\n\r\n<?xml version=\"1.0\" encoding=\"UTF-8\"?><body><Agent>146.235.210.85:14042</Agent><Token>79E821C01ED5F4D17418805A9FD35A28-67d31a7402bd6b3febf071367f8c9211</Token></body>\r\n\r\n"
time=2025-02-12T19:12:55.122+03:00 level=DEBUG msg="Sending request" req="DHPOST /relay/start/79E821C01ED5F4D17418805A9FD35A28-67d31a7402bd6b3febf071367f8c9211 HTTP/1.1\r\nCSeq: 3\r\nAuthorization: WSSE profile=\"UsernameToken\"\r\nX-WSSE: UsernameToken Username=\"cba1b29e32cb17aa46b8ff9e73c7f40b\", PasswordDigest=\"CpLVWaQJ1dmkSqvNpJfCE9fzepk=\", Nonce=\"1475121588\", Created=\"2025-02-12T16:12:55Z\"\r\nContent-Type: \r\nContent-Length: 32\r\n\r\n<body><Client>:0</Client></body>"
time=2025-02-12T19:12:55.318+03:00 level=DEBUG msg="Received response" resp="HTTP/1.1 200 OK\r\nCSeq: 3\r\nContent-Type: \r\nContent-Length: 113\r\n\r\n<?xml version=\"1.0\" encoding=\"UTF-8\"?><body><SID>67d31a7402bd6b3febf071367f8c9211</SID><Time>30</Time></body>\r\n\r\n"
time=2025-02-12T19:12:55.318+03:00 level=INFO msg="Relay initialized"
time=2025-02-12T19:12:55.318+03:00 level=DEBUG msg="Attempting to setup relay channel with the device"
time=2025-02-12T19:12:55.518+03:00 level=DEBUG msg="Sending request" req="DHPOST /device/AD01D76PAGF6D14/relay-channel HTTP/1.1\r\nCSeq: 4\r\nAuthorization: WSSE profile=\"UsernameToken\"\r\nX-WSSE: UsernameToken Username=\"cba1b29e32cb17aa46b8ff9e73c7f40b\", PasswordDigest=\"L1eGTdTNOBWPqGCR6D1szITnHhk=\", Nonce=\"488173548\", Created=\"2025-02-12T16:12:55Z\"\r\nContent-Type: \r\nContent-Length: 267\r\n\r\n<body><CreateDate>1739376775</CreateDate><DevAuth>7n2q8s+rN15Vw2ePIaTc6Fc71VXpNrfV8SDa5G4e6v4=</DevAuth><Nonce>1739376775518089298</Nonce><RandSalt>5daf91fc5cfc1be8e081cfb08f792726</RandSalt><UserName>admin</UserName><agentAddr>146.235.210.85:14042</agentAddr></body>"
time=2025-02-12T19:12:55.953+03:00 level=DEBUG msg="Received response" resp="HTTP/1.1 200 Server Nat Info!\r\nCSeq: 4\r\nContent-Type: \r\nContent-Length: 37\r\n\r\n<body><version>5.0.3</version></body>"
time=2025-02-12T19:12:55.954+03:00 level=INFO msg="Relay channel setup successful"
time=2025-02-12T19:12:55.954+03:00 level=INFO msg="RTSP tunnel started" local=127.0.0.1:1554 remote=554

time=2025-02-12T19:12:57.879+03:00 level=INFO msg="New RTSP connection" addr=127.0.0.1:53346
time=2025-02-12T19:12:57.880+03:00 level=DEBUG msg="Attempting to establish PTCPPacket session with relay"
time=2025-02-12T19:12:57.880+03:00 level=DEBUG msg="Sending SYN packet" packet="{ sent: 0, recv: 0, pid: 0x0002ffff, lmid: 0x00000000, rmid: 0x00000000, type: SYN }" addr=146.235.210.85:14042
time=2025-02-12T19:12:57.880+03:00 level=DEBUG msg="Start listening for incoming messages"
time=2025-02-12T19:12:58.259+03:00 level=DEBUG msg="Received bytes" size=28 data=0x5054435000000000000000040002ffff0245f9110000000000030100 addr=146.235.210.85:14042
time=2025-02-12T19:12:58.259+03:00 level=DEBUG msg="Parsed packet" packet="{ sent: 0, recv: 4, pid: 0x0002ffff, lmid: 0x0245f911, rmid: 0x00000000, type: SYN }"
time=2025-02-12T19:12:58.259+03:00 level=INFO msg="PTCP session established"
time=2025-02-12T19:12:58.259+03:00 level=DEBUG msg="Starting realm binding" realm=0xbf4adfac
time=2025-02-12T19:12:58.259+03:00 level=DEBUG msg="Sending packet" packet="{ sent: 28, recv: 28, pid: 0x0000ffff, lmid: 0x00000001, rmid: 0x0245f911, type: Binding Port }" addr=146.235.210.85:14042
time=2025-02-12T19:12:58.259+03:00 level=DEBUG msg="Packet raw data" data=505443500000001c0000001c0000ffff000000010245f91111000000bf4adfac000000000000022a7f000001
time=2025-02-12T19:12:58.638+03:00 level=DEBUG msg="Received bytes" size=35 data=0x5054435000000004000000040100ffff0245fa8c000000000a00080400000000001700 addr=146.235.210.85:14042
time=2025-02-12T19:12:58.638+03:00 level=DEBUG msg="Parsed packet" packet="{ sent: 4, recv: 4, pid: 0x0100ffff, lmid: 0x0245fa8c, rmid: 0x00000000, type: Unknown(0x0a): 0x00080400000000001700 }"
time=2025-02-12T19:12:58.639+03:00 level=DEBUG msg="Sending EMPTY packet" packet="{ sent: 72, recv: 63, pid: 0x0000fffe, lmid: 0x00000002, rmid: 0x0245fa8c, type: Empty }" addr=146.235.210.85:14042
time=2025-02-12T19:12:59.017+03:00 level=DEBUG msg="Received bytes" size=35 data=0x5054435000000004000000040100ffff0245fc08000000000a00080400000000001700 addr=146.235.210.85:14042
time=2025-02-12T19:12:59.017+03:00 level=DEBUG msg="Parsed packet" packet="{ sent: 4, recv: 4, pid: 0x0100ffff, lmid: 0x0245fc08, rmid: 0x00000000, type: Unknown(0x0a): 0x00080400000000001700 }"
time=2025-02-12T19:12:59.017+03:00 level=DEBUG msg="Sending EMPTY packet" packet="{ sent: 96, recv: 98, pid: 0x0000fffe, lmid: 0x00000003, rmid: 0x0245fc08, type: Empty }" addr=146.235.210.85:14042
time=2025-02-12T19:12:59.397+03:00 level=DEBUG msg="Received bytes" size=35 data=0x5054435000000004000000040100ffff0245fd83000000000a00080400000000001700 addr=146.235.210.85:14042
time=2025-02-12T19:12:59.397+03:00 level=DEBUG msg="Parsed packet" packet="{ sent: 4, recv: 4, pid: 0x0100ffff, lmid: 0x0245fd83, rmid: 0x00000000, type: Unknown(0x0a): 0x00080400000000001700 }"
time=2025-02-12T19:12:59.397+03:00 level=DEBUG msg="Sending EMPTY packet" packet="{ sent: 120, recv: 133, pid: 0x0000fffe, lmid: 0x00000004, rmid: 0x0245fd83, type: Empty }" addr=146.235.210.85:14042

Thank you for your help!
Best regards

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant