WinDivert is a powerful user-mode capture/sniffing/modification/blocking/re-injection package for Windows 10, Windows 11, and Windows Server. WinDivert can be used to implement user-mode packet filters, packet sniffers, firewalls, NAT, VPNs, tunneling applications, etc., without the need to write kernel-mode code.
The main features of the WinDivert are:
WinDivert provides similar functionality to
divert
sockets from FreeBSD/MacOS, NETLINK
sockets
from Linux.
Note that pre-built WinDivert binary distributions are available from the WinDivert website. Most users do not need to build their own version of WinDivert from source.
The source code for WinDivert is available for download at:
https://github.com/basil00/Divert
To build the WinDivert drivers from source:
wddk-build.batThis will build the
install\WDDK\i386\WinDivert32.sys
driver.wddk-build.bat
command to build the
install\WDDK\amd64\WinDivert64.sys
driver.
To build the WinDivert user-mode library (WinDivert.dll
) and sample
programs:
wddk-build.bat
command described above.sh mingw-build.shThis will the user-mode library and sample programs which will be placed in the
install\MINGW
subdirectory.
The generated WinDivert.dll
/WinDivert.lib
files
should be compatible with all major compilers, including both MinGW and
Visual Studio.
If you built your own
WinDivert32.sys
/WinDivert64.sys
drivers,
they must be digitally signed before they can be used.
See Driver Signing Requirements for Windows
for more information.
Note that the pre-built WinDivert32.sys
/WinDivert64.sys
drivers from the official WinDivert distribution are already digitally signed.
WinDivert does not require any special installation. Depending on your target configuration, simply place the following files in your application's home directory:
Application Type | Target Windows Type | Files Required |
---|---|---|
32-bit | 32-bit Windows only |
WinDivert.dll (32-bit version) and WinDivert32.sys
|
64-bit | 64-bit Windows only |
WinDivert.dll (64-bit version) and WinDivert64.sys
|
32-bit | Both 32-bit and 64-bit Windows |
WinDivert.dll (32-bit version), WinDivert32.sys ,
and WinDivert64.sys
|
The WinDivert driver is automatically (and silently) installed on demand
whenever your application calls
WinDivertOpen()
.
The calling application must have Administrator privileges.
To uninstall, simply delete the WinDivert.dll
,
WinDivert32.sys
, and WinDivert64.sys
files.
If already running, the WinDivert driver will be automatically
uninstalled during the next machine reboot.
The WinDivert driver can also be manually removed by (1) terminating
all processes that are using WinDivert, and (2) issuing the following
commands at the command prompt
sc stop WinDivert sc delete WinDivert
Alternatively, the WinDivert driver can be removed by using the
windivertctl.exe
sample program by
issuing the following command:
windivertctl uninstall
To use the WinDivert package, a program/application must:
windivert.h
header file
#include "windivert.h"
WinDivert.dll
dynamic link
library.
typedef enum { WINDIVERT_LAYER_NETWORK = 0, WINDIVERT_LAYER_NETWORK_FORWARD, WINDIVERT_LAYER_FLOW, WINDIVERT_LAYER_SOCKET, WINDIVERT_LAYER_REFLECT, } WINDIVERT_LAYER, *PWINDIVERT_LAYER; |
WinDivert supports several layers for diverting or capturing network packets/events. Each layer has its own capabilities, such as the ability to block events or to inject new events, etc. The list of supported WinDivert layers is summarized below:
Layer | Capability | Description | |||
---|---|---|---|---|---|
Block? | Inject? | Data? | PID? | ||
WINDIVERT_LAYER_NETWORK
|
✔ | ✔ | ✔ | Network packets to/from the local machine. | |
WINDIVERT_LAYER_NETWORK_FORWARD
|
✔ | ✔ | ✔ | Network packets passing through the local machine. | |
WINDIVERT_LAYER_FLOW
|
✔ | Network flow established/deleted events. | |||
WINDIVERT_LAYER_SOCKET
|
✔ | ✔ | Socket operation events. | ||
WINDIVERT_LAYER_REFLECT
|
✔ | ✔ | WinDivert handle events. |
Here, the layer capabilities are:
The WINDIVERT_LAYER_NETWORK
and
WINDIVERT_LAYER_NETWORK_FORWARD
layers allow the user application to capture/block/inject network packets
passing to/from (and through) the local machine.
Due to technical limitations, process ID information is not available
at these layers.
The WINDIVERT_LAYER_FLOW
layer captures information about
network flow establishment/deletion events.
Here, a flow represents either (1) a
TCP connection, or (2) an implicit flow
created by the first
sent/received packet for non-TCP traffic, e.g., UDP.
Old flows are deleted when the corresponding connection is closed (for TCP),
or based on an activity timeout (non-TCP).
Flow-related events can be captured, but not blocked nor injected.
Process ID information is also available at this layer.
Due to technical limitations, the
WINDIVERT_LAYER_FLOW
layer cannot capture flow events that
occurred before the handle was opened.
The WINDIVERT_LAYER_SOCKET
layer can capture or block events
corresponding to socket operations, such as bind()
,
connect()
, listen()
, etc., or the termination
of socket operations, such as a TCP socket disconnection.
Unlike the flow layer, most socket-related events can be blocked.
However, it is not possible to inject new or modified socket events.
Process ID information (of the process responsible for the socket operation)
is available at this layer.
Due to technical limitations, this layer cannot capture events that
occurred before the handle was opened.
Finally, the WINDIVERT_LAYER_REFLECT
layer can capture events
relating to WinDivert itself, such as when another process opens a
new WinDivert handle, or closes an old WinDivert handle.
WinDivert events can be captured but not injected nor blocked.
Process ID information (of the process responsible for opening the
WinDivert handle) is available at this layer.
This layer also returns data in the form of an object
representation
of the filter string used to open the handle.
The object representation can be converted back into a human-readable
filter string using the
WinDivertHelperFormatFilter()
function.
This layer can also capture events that occurred before the handle was opened.
This layer cannot capture events related to other
WINDIVERT_LAYER_REFLECT
-layer handles.
typedef enum { WINDIVERT_EVENT_NETWORK_PACKET, WINDIVERT_EVENT_FLOW_ESTABLISHED, WINDIVERT_EVENT_FLOW_DELETED, WINDIVERT_EVENT_SOCKET_BIND, WINDIVERT_EVENT_SOCKET_CONNECT, WINDIVERT_EVENT_SOCKET_LISTEN, WINDIVERT_EVENT_SOCKET_ACCEPT, WINDIVERT_EVENT_SOCKET_CLOSE, WINDIVERT_EVENT_REFLECT_OPEN, WINDIVERT_EVENT_REFLECT_CLOSE, } WINDIVERT_EVENT, *PWINDIVERT_EVENT; |
Each layer supports one or more events summarized below:
WINDIVERT_LAYER_NETWORK
and
WINDIVERT_LAYER_NETWORK_FORWARD
:
Only a single event is supported:
Event | Description |
---|---|
WINDIVERT_EVENT_NETWORK_PACKET
|
A new network packet. |
WINDIVERT_LAYER_FLOW
:
Two events are supported:
Event | Description |
---|---|
WINDIVERT_EVENT_FLOW_ESTABLISHED
|
A new flow is created. |
WINDIVERT_EVENT_FLOW_DELETED
|
An old flow is deleted. |
WINDIVERT_LAYER_SOCKET
:
The following events are supported:
Event | Description |
---|---|
WINDIVERT_EVENT_SOCKET_BIND
|
A bind() operation.
|
WINDIVERT_EVENT_SOCKET_CONNECT
|
A connect() operation.
|
WINDIVERT_EVENT_SOCKET_LISTEN
|
A listen() operation.
|
WINDIVERT_EVENT_SOCKET_ACCEPT
|
An accept() operation.
|
WINDIVERT_EVENT_SOCKET_CLOSE
|
A socket endpoint is closed. This corresponds to a previous binding being released, or an established connection being terminated. The event cannot be blocked. |
WINDIVERT_LAYER_REFLECT
:
Two events are supported:
Event | Description |
---|---|
WINDIVERT_EVENT_REFLECT_OPEN
|
A new WinDivert handle was opened. |
WINDIVERT_EVENT_REFLECT_CLOSE
|
An old WinDivert handle was closed. |
typedef struct { UINT32 IfIdx; UINT32 SubIfIdx; } WINDIVERT_DATA_NETWORK, *PWINDIVERT_DATA_NETWORK; typedef struct { UINT64 Endpoint; UINT64 ParentEndpoint; UINT32 ProcessId; UINT32 LocalAddr[4]; UINT32 RemoteAddr[4]; UINT16 LocalPort; UINT16 RemotePort; UINT8 Protocol; } WINDIVERT_DATA_FLOW, *PWINDIVERT_DATA_FLOW; typedef struct { UINT64 Endpoint; UINT64 ParentEndpoint; UINT32 ProcessId; UINT32 LocalAddr[4]; UINT32 RemoteAddr[4]; UINT16 LocalPort; UINT16 RemotePort; UINT8 Protocol; } WINDIVERT_DATA_SOCKET, *PWINDIVERT_DATA_SOCKET; typedef struct { INT64 Timestamp; UINT32 ProcessId; WINDIVERT_LAYER Layer; UINT64 Flags; INT16 Priority; } WINDIVERT_DATA_REFLECT, *PWINDIVERT_DATA_REFLECT; typedef struct { INT64 Timestamp; UINT64 Layer:8; UINT64 Event:8; UINT64 Sniffed:1; UINT64 Outbound:1; UINT64 Loopback:1; UINT64 Impostor:1; UINT64 IPv6:1; UINT64 IPChecksum:1; UINT64 TCPChecksum:1; UINT64 UDPChecksum:1; union { WINDIVERT_DATA_NETWORK Network; WINDIVERT_DATA_FLOW Flow; WINDIVERT_DATA_SOCKET Socket; WINDIVERT_DATA_REFLECT Reflect; }; } WINDIVERT_ADDRESS, *PWINDIVERT_ADDRESS; |
Fields
Timestamp
: A timestamp indicating when event occurred.Layer
: The handle's layer (WINDIVERT_LAYER_*
).Event
: The captured event (WINDIVERT_EVENT_*
).Sniffed
: Set to 1
if the event was
sniffed(i.e., not blocked),
0
otherwise..Outbound
: Set to 1
for outbound
packets/event, 0
for inbound or otherwise.Loopback
: Set to 1
for loopback packets, 0
otherwiseImpostor
: Set to 1
for impostorpackets,
0
otherwise.IPv6
: Set to 1
for IPv6 packets/events, 0
otherwiseIPChecksum
: Set to 1
if the IPv4 checksum is
valid, 0
otherwise.TCPChecksum
: Set to 1
if the TCP checksum is
valid, 0
otherwise.UDPChecksum
: Set to 1
if the UDP checksum is
valid, 0
otherwise.Network.IfIdx
: The interface index on which the packet arrived
(for inbound packets), or is to be sent (for outbound packets).Network.SubIfIdx
: The sub-interface index for IfIdx
.Flow.EndpointId
: The endpoint ID of the flow.Flow.ParentEndpointId
: The parent endpoint ID of the
flow.Flow.ProcessId
: The ID of the process associated with the
flow.Flow.LocalAddr
, Flow.RemoteAddr
,
Flow.LocalPort
, Flow.RemotePort
, and
Flow.Protocol
: The network 5-tuple associated with the
flow.Socket.EndpointId
: The endpoint ID of the socket
operation.Socket.ParentEndpointId
: The parent endpoint ID of the
socket operation.Socket.ProcessId
: The ID of the process associated with the
socket operation.Socket.LocalAddr
, Socket.RemoteAddr
,
Socket.LocalPort
, Socket.RemotePort
, and
Socket.Protocol
: The network 5-tuple associated with the
socket operation.Reflect.Timestamp
: A timestamp indicating when the handle was
opened.Reflect.ProcessId
: The ID of the process that opened the
handle.Reflect.Layer
, Reflect.Flags
, and
Reflect.Priority
: The
WinDivertOpen()
parameters of
the opened handle.
Remarks
The WINDIVERT_ADDRESS
structure
represents the "address" of a captured or injected packet.
The address includes the packet's timestamp, layer, event, flags, and
layer-specific data.
All fields are set by WinDivertRecv()
when the packet/event is captured.
Only some fields are used by
WinDivertSend()
when a packet
is injected.
The Timestamp
indicates when the packet/event was first
captured by WinDivert.
It uses the same clock as
QueryPerformanceCounter()
.
The Layer
indicates the layer parameter
(WINDIVERT_LAYER_*
) that was passed to
WinDivertOpen()
.
It is included in the address to make the structure self-contained.
The Event
indicates the layer-specific event
(WINDIVERT_EVENT_*
) that was captured.
The Outbound
flag is set for outbound
packets/events, and is cleared
for inbound or direction-less packets/events.
The Loopback
flag is set for loopback packets.
Note that Windows considers any packet originating from, and destined to, the
current machine to be a loopback packet, so loopback packets are not
limited to localhost addresses.
Note that WinDivert considers loopback packets to be
outbound only, and will not capture loopback packets on the
inbound path.
The Impostor
flag is set for impostor packets.
An impostor packet is any packet injected by another driver rather than
originating from the network or Windows TCP/IP stack.
Impostor packets are problematic since they can cause infinite loops,
where a packet injected by WinDivertSend()
is captured again by WinDivertRecv()
.
For more information, see WinDivertSend()
.
The IPv6
flag is set for IPv6 packets/events, and cleared
for IPv4 packets/events.
The *Checksum
flags indicate whether the packet has valid checksums
or not.
When IP/TCP/UDP checksum offloading is enabled, it is possible that
captured packets do not have valid checksums.
Invalid checksums may be arbitrary values.
The Network.*
fields are only valid at the
WINDIVERT_LAYER_NETWORK
and
WINDIVERT_LAYER_NETWORK_FORWARD
layers.
The Network.IfIdx
/Network.SubIfIdx
indicate the packet's
network adapter (a.k.a. interface) index.
These values are ignored for outbound packets.
The Flow.*
fields are only valid at the
WINDIVERT_LAYER_FLOW
layer.
The Flow.ProcessId
is the ID of the process that
created the flow (for outbound), or receives the flow (for inbound).
The
(Flow.LocalAddr
, Flow.LocalPort
,
Flow.RemoteAddr
, Flow.RemotePort
, Flow.Protocol
)
fields form the network 5-tuple associated with the flow.
For IPv4, the Flow.LocalAddr
and Flow.RemoteAddr
fields will be IPv4-mapped IPv6 addresses,
e.g. the IPv4 address X.Y.Z.W
will be represented by
::ffff:X.Y.Z.W
.
The Socket.*
fields are only valid at the
WINDIVERT_LAYER_SOCKET
layer.
The Socket.ProcessId
is the ID of the process that executed
the socket operation.
The
(Socket.LocalAddr
, Socket.LocalPort
,
Socket.RemoteAddr
, Socket.RemotePort
,
Socket.Protocol
)
fields form the network 5-tuple associated with the operation.
For IPv4, the Socket.LocalAddr
and Socket.RemoteAddr
fields will be IPv4-mapped IPv6 addresses.
The WINDIVERT_EVENT_SOCKET_BIND
and
WINDIVERT_EVENT_SOCKET_LISTEN
events can occur before a
connection attempt has been made, meaning that the
Socket.RemoteAddr
and Socket.RemotePort
fields
for these events will be zero.
The Reflect.*
fields are only valid at the
WINDIVERT_LAYER_REFLECT
layer.
The Reflect.ProcessId
is the ID of the process that
opened the WinDivert handle.
The Reflect.Timestamp
field is a timestamp indicating when the
handle was opened, using
the same clock as
QueryPerformanceCounter()
.
The Reflect.Layer
, Reflect.Flags
, and
Reflect.Priority
fields correspond to the
WinDivertOpen()
parameters of
the opened handle.
Most address fields are ignored by
WinDivertSend()
.
The exceptions are
Outbound
(for WINDIVERT_LAYER_NETWORK
only),
Impostor
, IPChecksum
, TCPChecksum
,
UDPChecksum
, Network.IfIdx
and
Network.SubIfIdx
.
HANDLE WinDivertOpen( __in const char *filter, __in WINDIVERT_LAYER layer, __in INT16 priority, __in UINT64 flags ); |
Parameters
filter
: A packet filter string specified in the WinDivert
filter language.layer
: The layer.priority
: The priority of the handle.flags
: Additional flags.
Return Value
A valid WinDivert handle on success, or
INVALID_HANDLE_VALUE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Common errors include:
Name | Code | Description |
---|---|---|
ERROR_FILE_NOT_FOUND
|
2 |
The driver files
WinDivert32.sys or WinDivert64.sys
were not found.
|
ERROR_ACCESS_DENIED
|
5 | The calling application does not have Administrator privileges. |
ERROR_INVALID_PARAMETER
|
87 | This indicates an invalid packet filter string, layer, priority, or flags. |
ERROR_INVALID_IMAGE_HASH
|
577 |
The WinDivert32.sys or WinDivert64.sys driver does not
have a valid digital signature
(see the driver signing requirements above).
|
ERROR_DRIVER_FAILED_PRIOR_UNLOAD
|
654 | An incompatible version of the WinDivert driver is currently loaded. |
ERROR_SERVICE_DOES_NOT_EXIST
|
1060 |
The handle was opened with the WINDIVERT_FLAG_NO_INSTALL flag and
the WinDivert driver is not already installed.
|
ERROR_DRIVER_BLOCKED
|
1275 |
This error occurs for various reasons, including:
|
EPT_S_NOT_REGISTERED
|
1753 | This error occurs when the Base Filtering Engine service has been disabled. |
Remarks
Opens a WinDivert handle for the given filter.
Unless otherwise specified by flags
, any packet or event that
matches the filter will be diverted to the handle.
Diverted packets/events can be read by the application with
WinDivertRecv()
.
A typical application is only interested in a subset of all network traffic or events. In this case the filter should match as closely as possible to the subset of interest. This avoids unnecessary overheads introduced by diverting packets to the user-mode application. See the filter language section for more information.
The layer of the WinDivert handle is determined by the layer
parameter.
See WINDIVERT_LAYER
for more
information.
Currently the following layers are supported:
Layer | Description |
---|---|
WINDIVERT_LAYER_NETWORK = 0
|
Network packets to/from the local machine. This is the default layer. |
WINDIVERT_LAYER_NETWORK_FORWARD
|
Network packets passing through the local machine. |
WINDIVERT_LAYER_FLOW
|
Network flow established/deleted events. |
WINDIVERT_LAYER_SOCKET
|
Socket operation events. |
WINDIVERT_LAYER_REFLECT
|
WinDivert handle events. |
Different WinDivert handles can be assigned different priorities by the
priority
parameter.
Packets are diverted to higher priority handles before lower priority
handles.
Packets injected by a handle are then diverted to the next priority handle,
and so on, provided the packet matches the handle's filter.
A packet is only diverted once per priority level, so handles should not
share priority levels unless they use mutually exclusive filters.
Otherwise it is not defined which handle will receive the packet first.
Higher priority
values represent higher priorities, with
WINDIVERT_PRIORITY_HIGHEST
being the highest priority,
0
the middle (and a good default) priority,
and WINDIVERT_PRIORITY_LOWEST
the lowest priority.
Different flags affect how the opened handle behaves. The following flags are supported:
Flag | Description |
---|---|
WINDIVERT_FLAG_SNIFF
|
This flag opens the WinDivert handle in packet sniffing mode.
In packet sniffing mode the original packet is not dropped-and-diverted
(the default) but copied-and-diverted.
This mode is useful for implementing packet sniffing tools similar to those
applications that currently use Winpcap .
|
WINDIVERT_FLAG_DROP
|
This flag indicates that the user application does not intend to read matching
packets with WinDivertRecv() , instead the
packets should be silently dropped.
This is useful for implementing simple packet filters using the
WinDivert filter language.
|
WINDIVERT_FLAG_RECV_ONLY
|
This flags forces the handle into receive onlymode which effectively disables WinDivertSend() .
This means that it is possible to block/capture packets or events but not
inject them.
|
WINDIVERT_FLAG_READ_ONLY
|
An alias for WINDIVERT_FLAG_RECV_ONLY .
|
WINDIVERT_FLAG_SEND_ONLY
|
This flags forces the handle into send onlymode which effectively disables WinDivertRecv() .
This means that it is possible to inject packets or events, but not
block/capture them.
|
WINDIVERT_FLAG_WRITE_ONLY
|
An alias for WINDIVERT_FLAG_SEND_ONLY .
|
WINDIVERT_FLAG_NO_INSTALL
|
This flags causes WinDivertOpen() to fail with
ERROR_SERVICE_DOES_NOT_EXIST if the WinDivert driver
is not already installed.
This flag is useful for querying the WinDivert state using a
WINDIVERT_LAYER_REFLECT handle.
|
WINDIVERT_FLAG_FRAGMENTS
|
If set, the handle will capture inbound IP fragments, but not inbound
reassembled IP packets.
Otherwise, if not set (the default), the handle will capture inbound
reassembled IP packets, but not inbound IP fragments.
This flag only affects inbound packets at the
WINDIVERT_LAYER_NETWORK layer, else the flag is ignored.
|
Note that any combination of
(WINDIVERT_FLAG_SNIFF | WINDIVERT_FLAG_DROP)
or
(WINDIVERT_FLAG_RECV_ONLY | WINDIVERT_FLAG_SEND_ONLY)
are considered invalid.
Some layers have mandatory flags, as listed below:
Layer | Required Flags |
---|---|
WINDIVERT_LAYER_FLOW
|
WINDIVERT_FLAG_SNIFF | WINDIVERT_FLAG_RECV_ONLY
|
WINDIVERT_LAYER_SOCKET
|
WINDIVERT_FLAG_RECV_ONLY
|
WINDIVERT_LAYER_REFLECT
|
WINDIVERT_FLAG_SNIFF | WINDIVERT_FLAG_RECV_ONLY
|
BOOL WinDivertRecv( __in HANDLE handle, __out_opt PVOID pPacket, __in UINT packetLen, __out_opt UINT *pRecvLen, __out_opt WINDIVERT_ADDRESS *pAddr ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.pPacket
: An optional buffer for the captured packet.packetLen
: The length of the pPacket
buffer.pRecvLen
: The total number of bytes written to pPacket
.
Can be NULL
if this information is not required.pAddr
: An optional buffer for the
address of the captured packet/event.
Return Value
TRUE
if a packet/event was successfully received, or FALSE
if
an error occurred.
Use GetLastError()
to get the reason for the error.
Common errors include:
Name | Code | Description |
---|---|---|
ERROR_INSUFFICIENT_BUFFER
|
122 |
The captured packet is larger than the pPacket buffer.
|
ERROR_NO_DATA
|
232 |
The handle has been shutdown using
WinDivertShutdown()
and the packet queue is empty.
|
Remarks
Receives a single captured packet/event matching the filter passed to
WinDivertOpen()
.
The received packet/event is guaranteed to match the filter.
Only some layers can capture packets/data, as summarized below:
Layer | Data? | Description |
---|---|---|
WINDIVERT_LAYER_NETWORK
|
✔ | Network packet. |
WINDIVERT_LAYER_NETWORK_FORWARD
|
✔ | Network packet. |
WINDIVERT_LAYER_FLOW
|
- | |
WINDIVERT_LAYER_SOCKET
|
- | |
WINDIVERT_LAYER_REFLECT
|
✔ | Filter object. |
For layers that do support capturing, the captured packet/data will be written
to the pPacket
buffer.
If non-NULL
, then the total number of bytes
written to pPacket
will be written to pRecvLen
.
If the pPacket
buffer is too small, the packet will be
truncated and the operation will fail with the
ERROR_INSUFFICIENT_BUFFER
error code.
This error can be ignored if the application only intends to receive part
of the packet, e.g., the IP headers only.
For layers that do not capture packets/data, the pPacket
parameter
should be NULL
and packetLen
should be zero.
If non-NULL
, the address of the
packet/event will be written to the pAddr
buffer.
An application should call WinDivertRecv()
as soon as possible
after a successful call to WinDivertOpen()
.
When a WinDivert handle is open, any packet/event that matches the filter will
be captured and queued until handled by
WinDivertRecv()
.
Packets/events are not queued indefinitely, and if not handled in a timely
manner, data may be lost.
The amount of time a packet/event is queued can be controlled using the
WinDivertSetParam()
function.
Captured packets are
guaranteed to have correct checksums or have the corresponding
*Checksum
flag unset
(see WINDIVERT_ADDRESS
).
WinDivertRecv()
should not be used on any
WinDivert handle created with the WINDIVERT_FLAG_DROP
set.
BOOL WinDivertRecvEx( __in HANDLE handle, __out VOID *pPacket, __in UINT packetLen, __out_opt UINT *pRecvLen, __in UINT64 flags, __out_opt WINDIVERT_ADDRESS *pAddr, __inout_opt UINT *pAddrLen, __inout_opt LPOVERLAPPED lpOverlapped ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.pPacket
: A buffer for the captured packet(s).packetLen
: The length of the pPacket
buffer in
bytes.pRecvLen
: The total number of bytes written to pPacket
.
Can be NULL
if this information is not required.flags
: Reserved, set to zero.pAddr
: The
WINDIVERT_ADDRESS
of the captured
packet(s).pAddrLen
: Initially, a pointer to the length of the
pAddr
buffer in bytes.
This value is updated to the total bytes written to pAddr
.
If NULL
, a fixed length of sizeof(WINDIVERT_ADDRESS)
is
assumed.lpOverlapped
: An optional pointer to a OVERLAPPED
structure.
Return Value
TRUE
if a packet was successfully received, or FALSE
otherwise.
Use GetLastError()
to get the reason.
The error code ERROR_IO_PENDING
indicates that the overlapped
operation has been successfully initiated and that completion will be
indicated at a later time.
All other codes indicate an error.
Remarks
This function is equivalent to
WinDivertRecv()
except:
lpOverlapped
parameter.
Batched I/O makes it possible to receive up to WINDIVERT_BATCH_MAX
packets at once using a single operation, reducing the number of
kernel/user-mode context switches and improving performance.
To enable batched I/O:
WINDIVERT_ADDRESS
to pAddr
;pAddrLen
to be the total size (in bytes) of the
pAddr
buffer; andpPacket
points to a sufficiently large buffer
capable of receiving multiple packets.For example:
UINT8 packets[10 * MTU]; // Space for up to 10 packets WINDIVERT_ADDRESS addr[10]; // Addresses for up to 10 packets UINT addr_len = sizeof(addr); BOOL result = WinDivertRecvEx(handle, packets, ..., addr, &addr_len, ...);
upon successful completion, the value pointed to by pAddrLen
is updated to the total number of address bytes actually received.
For example, if a total of 5
packets were received, then
the value pointed to by pAddrLen
will be set to
(5*sizeof(WINDIVERT_ADDRESS))
.
The received packets are packed contiguously (i.e., no gaps) into the
pPacket
buffer.
BOOL WinDivertSend( __in HANDLE handle, __in const VOID *pPacket, __in UINT packetLen, __out_opt UINT *pSendLen, __in const WINDIVERT_ADDRESS *pAddr ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.pPacket
: A buffer containing a packet to be injected.packetLen
: The total length of the pPacket
buffer.pSendLen
: The total number of bytes injected.
Can be NULL
if this information is not required.pAddr
: The
address of the injected packet.
Return Value
TRUE
if a packet was successfully injected, or FALSE
if
an error occurred.
Use GetLastError()
to get the reason for the error.
Common errors include:
Name | Code | Description |
---|---|---|
ERROR_HOST_UNREACHABLE
|
1232 |
This error occurs when an impostor packet (with
pAddr->Impostor set to 1 ) is injected and the
ip.TTL or ipv6.HopLimit field goes to zero.
This is a defense of last resortagainst infinite loops caused by impostor packets. |
Remarks
Injects a packet into the network stack.
The injected packet may be one received from
WinDivertRecv()
, or a
modified version, or a completely new packet.
Injected packets can be captured and diverted again by other WinDivert
handles with lower priorities.
Only the WINDIVERT_LAYER_NETWORK
and
WINDIVERT_LAYER_NETWORK_FORWARD
layers
support packet injection, as summarized below:
Layer | Inject? |
---|---|
WINDIVERT_LAYER_NETWORK
|
✔ |
WINDIVERT_LAYER_NETWORK_FORWARD
|
✔ |
WINDIVERT_LAYER_FLOW
|
|
WINDIVERT_LAYER_SOCKET
|
|
WINDIVERT_LAYER_REFLECT
|
For the WINDIVERT_LAYER_NETWORK
layer the
pAddr->Outbound
value determines which direction the packet
is injected.
If the pAddr->Outbound
field is 1
,
the packet will be injected into the outbound path
(i.e. a packet leaving the local machine).
Else, if pAddr->Outbound
is 0
,
the packet is injected into the inbound path (i.e. a packet arriving
to the local machine).
Note that only the Outbound
field, and not the IP addresses in
the injected packet, determines the packet's direction.
For packets injected into the inbound path, the
pAddr->Network.IfIdx
and
pAddr->Network.SubIfIdx
fields are assumed to contain valid
interface numbers.
These may be retrieved from WinDivertRecv()
(for packet modification),
or from the IP Helper API.
For outbound injected packets, the IfIdx
and SubIfIdx
fields are currently ignored and may be arbitrary values.
Injecting an inbound packet on the outbound path may work (for some
types of packets), however this should be considered "undocumented" behavior,
and may be changed in the future.
For impostor packets (where pAddr->Impostor
is set to
1
) WinDivert will automatically decrement the
ip.TTL
or ipv6.HopLimit
fields before reinjection.
This is to mitigate infinite loops since WinDivert cannot prevent
impostor packets from being captured again by
WinDivertRecv()
.
Injected packets must have the correct checksums or have the corresponding
pAddr->*Checksum
flag unset.
A packet/address pair captured by
WinDivertRecv()
is guaranteed to satisfy
this condition, so can be reinjected unmodified without recalculating
checksums.
Otherwise, if a modification is necessary,
checksums can be recalculated using the
WinDivertHelperCalcChecksums()
function.
BOOL WinDivertSendEx( __in HANDLE handle, __in const VOID *pPacket, __in UINT packetLen, __out_opt UINT *pSendLen, __in UINT64 flags, __in const WINDIVERT_ADDRESS *pAddr, __in UINT addrLen, __inout_opt LPOVERLAPPED lpOverlapped ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.pPacket
: A buffer containing the packet(s) to be injected.packetLen
: The total length of the buffer pPacket
.pSendLen
: The total number of bytes injected.
Can be NULL
if this information is not required.flags
: Reserved, set to zero.pAddr
: The
address(es)
of the injected
packet(s).addrLen
: The total length (in bytes) of the pAddr
buffer.lpOverlapped
: An optional pointer to a OVERLAPPED
structure.
Return Value
TRUE
if a packet was successfully injected, or FALSE
otherwise.
Use GetLastError()
to get the reason.
The error code ERROR_IO_PENDING
indicates that the overlapped
operation has been successfully initiated and that completion will be
indicated at a later time.
All other codes indicate an error.
Remarks
This function is equivalent to
WinDivertSend()
except:
lpOverlapped
parameter.
Batched I/O makes it possible to send up to WINDIVERT_BATCH_MAX
packets at once using a single operation, reducing the number of
kernel/user-mode context switches and improving performance.
To use batched I/O:
pPacket
buffer
(with no gaps between packets);packetLen
to be the total sum of the N packet lengths;
WINDIVERT_ADDRESS
address structures into the pAddr
buffer; and addrLen
to be the total size (in bytes) of the pAddr
buffer.
BOOL WinDivertShutdown( __in HANDLE handle, __in WINDIVERT_SHUTDOWN how); ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.how
: A WINDIVERT_SHUTDOWN
value to indicate how
the handle should be shutdown.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
This operation causes all or part of a WinDivert handle to be shut down.
The possible values for how
are:
How | Description |
---|---|
WINDIVERT_SHUTDOWN_RECV
|
Stop new packets being queued for
WinDivertRecv() .
|
WINDIVERT_SHUTDOWN_SEND
|
Stop new packets being injected via
WinDivertSend() .
|
WINDIVERT_SHUTDOWN_BOTH
|
Equivalent to (WINDIVERT_SHUTDOWN_RECV | WINDIVERT_SHUTDOWN_SEND) .
|
Note that previously queued packets can still be received after
WINDIVERT_SHUTDOWN_RECV
.
When the packet queue is empty,
WinDivertRecv()
will fail with ERROR_NO_DATA
.
BOOL WinDivertClose( __in HANDLE handle ); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Closes a WinDivert handle created by
WinDivertOpen()
.
BOOL WinDivertSetParam( __in HANDLE handle, __in WINDIVERT_PARAM param, __in UINT64 value); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.param
: A WinDivert parameter name.value
: The parameter's new value.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Sets a WinDivert parameter.
Currently, the following WinDivert parameters are defined.
Parameter | Description |
---|---|
WINDIVERT_PARAM_QUEUE_LENGTH
|
Sets the maximum length of the packet queue for
WinDivertRecv() .
The default value is WINDIVERT_PARAM_QUEUE_LENGTH_DEFAULT ,
the minimum is WINDIVERT_PARAM_QUEUE_LENGTH_MIN , and the maximum
is WINDIVERT_PARAM_QUEUE_LENGTH_MAX .
|
WINDIVERT_PARAM_QUEUE_TIME
|
Sets the minimum time, in milliseconds, a packet can be queued before it is
automatically dropped.
Packets cannot be queued indefinitely, and ideally, packets should be
processed by the application as soon as is possible.
Note that this sets the minimum time a packet can be queued before
it can be dropped.
The actual time may be exceed this value.
Currently the default value is WINDIVERT_PARAM_QUEUE_TIME_DEFAULT ,
the minimum is WINDIVERT_PARAM_QUEUE_TIME_MIN , and the
maximum is WINDIVERT_PARAM_QUEUE_TIME_MAX .
|
WINDIVERT_PARAM_QUEUE_SIZE
|
Sets the maximum number of bytes that can be stored in the packet queue for
WinDivertRecv() .
Currently the default value is WINDIVERT_PARAM_QUEUE_SIZE_DEFAULT ,
the minimum is WINDIVERT_PARAM_QUEUE_SIZE_MIN ,
and the maximum is WINDIVERT_PARAM_QUEUE_SIZE_MAX .
|
BOOL WinDivertGetParam( __in HANDLE handle, __in WINDIVERT_PARAM param, __out UINT64 *pValue); |
Parameters
handle
: A valid WinDivert handle created by
WinDivertOpen()
.param
: A WinDivert parameter name.value
: The parameter's current value.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Gets a WinDivert parameter.
This function supports all the parameters from
WinDivertSetParam()
,
and the following additional read-only
parameters:
Parameter | Description |
---|---|
WINDIVERT_PARAM_VERSION_MAJOR
|
Returns the major version of the driver. |
WINDIVERT_PARAM_VERSION_MINOR
|
Returns the minor version of the driver. |
typedef struct { UINT8 HdrLength:4; UINT8 Version:4; UINT8 TOS; UINT16 Length; UINT16 Id; UINT16 ...; UINT8 TTL; UINT8 Protocol; UINT16 Checksum; UINT32 SrcAddr; UINT32 DstAddr; } WINDIVERT_IPHDR, *PWINDIVERT_IPHDR; |
Fields
See here
for more information.
Remarks
IPv4 header definition.
The following fields can only be get/set using the following macro definitions:
WINDIVERT_IPHDR_GET_FRAGOFF(hdr)
and
WINDIVERT_IPHDR_SET_FRAGOFF(hdr, val)
WINDIVERT_IPHDR_GET_MF(hdr)
and
WINDIVERT_IPHDR_SET_MF(hdr, val)
WINDIVERT_IPHDR_GET_DF(hdr)
and
WINDIVERT_IPHDR_SET_DF(hdr, val)
WINDIVERT_IPHDR_GET_RESERVED(hdr)
and
WINDIVERT_IPHDR_SET_RESERVED(hdr, val)
typedef struct { UINT32 Version:4; UINT32 ...:28; UINT16 Length; UINT8 NextHdr; UINT8 HopLimit; UINT32 SrcAddr[4]; UINT32 DstAddr[4]; } WINDIVERT_IPV6HDR, *PWINDIVERT_IPV6HDR; |
Fields
See here
for more information.
Remarks
IPv6 header definition.
The following fields can only be get/set using the following macro definitions:
WINDIVERT_IPV6HDR_GET_TRAFFICCLASS(hdr)
and
WINDIVERT_IPV6HDR_SET_TRAFFICCLASS(hdr, val)
WINDIVERT_IPV6HDR_GET_FLOWLABEL(hdr)
and
WINDIVERT_IPV6HDR_SET_FLOWLABEL(hdr, val)
typedef struct { UINT8 Type; UINT8 Code; UINT16 Checksum; UINT32 Body; } WINDIVERT_ICMPHDR, *PWINDIVERT_ICMPHDR; |
Fields
See here
for more information.
Remarks
ICMP header definition.
typedef struct { UINT8 Type; UINT8 Code; UINT16 Checksum; UINT32 Body; } WINDIVERT_ICMPV6HDR, *PWINDIVERT_ICMPV6HDR; |
Fields
See here for
more information.
Remarks
ICMPv6 header definition.
typedef struct { UINT16 SrcPort; UINT16 DstPort; UINT32 SeqNum; UINT32 AckNum; UINT16 Reserved1:4; UINT16 HdrLength:4; UINT16 Fin:1; UINT16 Syn:1; UINT16 Rst:1; UINT16 Psh:1; UINT16 Ack:1; UINT16 Urg:1; UINT16 Reserved2:2; UINT16 Window; UINT16 Checksum; UINT16 UrgPtr; } WINDIVERT_TCPHDR, *PWINDIVERT_TCPHDR; |
Fields
See here
for more information.
Remarks
TCP header definition.
typedef struct { UINT16 SrcPort; UINT16 DstPort; UINT16 Length; UINT16 Checksum; } WINDIVERT_UDPHDR, *PWINDIVERT_UDPHDR; |
Fields
See here
for more information.
Remarks
UDP header definition.
BOOL WinDivertHelperParsePacket( __in PVOID pPacket, __in UINT packetLen, __out_opt PWINDIVERT_IPHDR *ppIpHdr, __out_opt PWINDIVERT_IPV6HDR *ppIpv6Hdr, __out_opt UINT8 *pProtocol, __out_opt PWINDIVERT_ICMPHDR *ppIcmpHdr, __out_opt PWINDIVERT_ICMPV6HDR *ppIcmpv6Hdr, __out_opt PWINDIVERT_TCPHDR *ppTcpHdr, __out_opt PWINDIVERT_UDPHDR *ppUdpHdr, __out_opt PVOID *ppData, __out_opt UINT *pDataLen, __out_opt PVOID *ppNext, __out_opt UINT *pNextLen ); |
Parameters
pPacket
: The packet(s) to be parsed.packetLen
: The total length of the packet(s) pPacket
.ppIpHdr
: Output pointer to a WINDIVERT_IPHDR
.ppIpv6Hdr
: Output pointer to a WINDIVERT_IPV6HDR
.pProtocol
: Output transport protocol.ppIcmpHdr
: Output pointer to a WINDIVERT_ICMPHDR
.ppIcmpv6Hdr
: Output pointer to a WINDIVERT_ICMPV6HDR
.ppTcpHdr
: Output pointer to a WINDIVERT_TCPHDR
.ppUdpHdr
: Output pointer to a WINDIVERT_UDPHDR
.ppData
: Output pointer to the packet's data/payload.pDataLen
: Output data/payload length.ppNext
: Output pointer to the next packet (if present).pNextLen
: Output next packet length.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Remarks
Parses a raw packet or batch of packets (e.g. from WinDivertRecv()
) into the
various packet headers and/or payloads that may or may not be present.
Each output parameter may be NULL
or non-NULL
.
For non-NULL
parameters, this function will write the pointer to
the corresponding header/payload if it exists, or will write NULL
otherwise.
Any non-NULL
pointer that is returned:
pPacket
packet buffer; andpPacket
to fit the header.
This function does not do any verification of the header/payload contents
beyond checking the header length and any other minimal information required
for parsing.
This function will always succeed provided the pPacket
buffer
contains at least one IPv4 or IPv6 header and the packetLen
is
correct.
By default this function will parse a single packet.
However, if either ppNext
or pNextLen
are
non-NULL
, then the pPacket
parameter can point
to a batch (>1) of packets
(and packetLen
can be the total length of the batch).
In this case, the function will parse the first packet, and a pointer to the
remaining packet(s) will be written to ppNext
,
and the remaining length will be written to pNextLen
.
This makes it convenient to loop over every packet in the batch as follows:
while (WinDivertHelperParsePacket(pPacket, packetLen, ..., &pPacket, &packetLen)) { ... }
UINT64 WinDivertHelperHashPacket( __in const VOID *pPacket, __in UINT packetLen, __in UINT64 seed = 0 ); |
Parameters
pPacket
: The packet to be hashed.packetLen
: The total length of the packet pPacket
.seed
: An optional seed value.
Return Value
A 64bit hash value.
Remarks
Calculates a 64bit hash value of the given packet.
Note that the hash function depends on the packet's
IP and transport headers only, and not the payload of the packet.
That said, a weak dependency on the payload will exist if the
TCP/UDP checksums are valid.
The hash function itself is based on the
xxHash algorithm
and is not cryptographic.
The optional seed
value is also incorporated into the hash.
BOOL WinDivertHelperParseIPv4Address( __in const char *addrStr, __out_opt UINT32 *pAddr ); |
Parameters
addrStr
: The address string.pAddr
: Output address.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Parses an IPv4 address stored in addrStr
.
If pAddr
is non-NULL
, the result is be stored in
host-byte-order.
Use WinDivertHelperHtonl()
to convert the result into network-byte-order.
BOOL WinDivertHelperParseIPv6Address( __in const char *addrStr, __out_opt UINT32 *pAddr ); |
Parameters
addrStr
: The address string.pAddr
: Output address.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Parses an IPv6 address stored in addrStr
.
If pAddr
is non-NULL
, the buffer assumed
to be large enough to hold a 16-byte IPv6 address.
The result is stored in host-byte-order.
Use WinDivertHelperHtonIPv6Address()
to convert the result into network-byte-order.
BOOL WinDivertHelperFormatIPv4Address( __in UINT32 addr, __out char *buffer, __in UINT bufLen ); |
Parameters
addr
: The IPv4 address in host-byte order.buffer
: The buffer to store the formatted string.bufLen
: The length of buffer
.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Convert an IPv4 address into a string.
BOOL WinDivertHelperFormatIPv6Address( __in const UINT32 *pAddr, __out char *buffer, __in UINT bufLen ); |
Parameters
pAddr
: The IPv6 address in host-byte order.buffer
: The buffer to store the formatted string.bufLen
: The length of buffer
.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Convert an IPv6 address into a string.
BOOL WinDivertHelperCalcChecksums( __inout VOID *pPacket, __in UINT packetLen, __out_opt WINDIVERT_ADDRESS *pAddr, __in UINT64 flags ); |
Parameters
pPacket
: The packet to be modified.packetLen
: The total length of the packet pPacket
.pAddr
: Optional pointer to a
WINDIVERT_ADDRESS
structure.flags
: One or more of the following flags:
WINDIVERT_HELPER_NO_IP_CHECKSUM
: Do not calculate the IPv4
checksum.WINDIVERT_HELPER_NO_ICMP_CHECKSUM
: Do not calculate the ICMP
checksum.WINDIVERT_HELPER_NO_ICMPV6_CHECKSUM
: Do not calculate the ICMPv6
checksum.WINDIVERT_HELPER_NO_TCP_CHECKSUM
: Do not calculate the TCP
checksum.WINDIVERT_HELPER_NO_UDP_CHECKSUM
: Do not calculate the UDP
checksum.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Remarks
(Re)calculates the checksum for any IPv4/ICMP/ICMPv6/TCP/UDP checksum present
in the given packet.
Individual checksum calculations may be disabled via the appropriate flag.
Typically this function should be invoked on a modified packet before it is
injected with WinDivertSend()
.
By default this function will calculate each checksum from scratch, even if the existing checksum is correct. This may be inefficient for some applications. For better performance, incremental checksum calculations should be used instead (not provided by this API).
If pAddr
is non-NULL
, this function sets
the corresponding *Checksum
flag
(see WINDIVERT_ADDRESS
).
Normally, pAddr
should point to the address
passed to WinDivertSend()
for
packet injection.
BOOL WinDivertHelperDecrementTTL( __inout VOID *packet, __in packetLen ); |
Parameters
pPacket
: The packet to be modified.packetLen
: The total length of the packet pPacket
.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Returns FALSE
if the ip.TTL
or
ipv6.HopHimit
fields go to 0
.
Remarks
Decrements the ip.TTL
or
ipv6.HopHimit
field by 1
, and returns
TRUE
only if the result is non-zero.
This is useful for applications where packet loops may be a problem.
For IPv4, this function will preserve the validity of the IPv4 checksum. That is, if the packet had a valid checksum before the operation, the resulting checksum will also be valid after the operation. This function updates the checksum field incrementally.
BOOL WinDivertHelperCompileFilter( __in const char *filter, __in WINDIVERT_LAYER layer, __out_opt char *object, __in UINT objLen, __out_opt const char **errorStr, __out_opt UINT *errorPos ); |
Parameters
filter
: The packet filter string to be checked.layer
: The layer.object
: The compiled filter object.objLen
: The length of the object
buffer.errorStr
: The error description.errorPos
: The error position.
Return Value
TRUE
if the packet filter compilation is successful, FALSE
otherwise.
Remarks
Compiles the given packet filter string into a compact object
representation that is optionally stored in object
if non-NULL.
The object
representation is a valid null terminated C string, but is
otherwise opaque and not meant to be human readable.
The object representation can be passed to all WinDivert functions,
such as WinDivertOpen()
, in place of the
human-readable filter string equivalent.
The compilation operation will succeed if the given filter string is
valid with respect to the
filter language.
Otherwise, if the filter is invalid, then a human readable description of
the error is
returned by errorStr
(if non-NULL
), and the error's
position is returned by errorPos
(if non-NULL
).
Note that all strings returned through errorStr
are global static
objects, and therefore do not need to be deallocated.
BOOL WinDivertHelperEvalFilter( __in const char *filter, __in const VOID *pPacket, __in UINT packetLen, __in const WINDIVERT_ADDRESS *pAddr ); |
Parameters
filter
: The packet filter string to be evaluated.pPacket
: The packet.packetLen
: The total length of the packet pPacket
.pAddr
: The WINDIVERT_ADDRESS
of the packet
pPacket
.
Return Value
TRUE
if the packet matches the filter string,
FALSE
otherwise.
Remarks
Evaluates the given packet against the given packet filter string.
This function returns TRUE
if the packet matches, and
returns FALSE
otherwise.
This function also returns FALSE
if an error occurs, in which
case GetLastError()
can be used to get the reason for the error.
Otherwise, if no error occurred, GetLastError()
will return
0
.
Note that this function is relatively slow since the packet filter string
will be (re)compiled for each call.
This overhead can be minimized by pre-compiling the filter string into the
object representation using the
WinDivertHelperCompileFilter()
function.
BOOL WinDivertHelperEvalFilter( __in const char *filter, __in WINDIVERT_LAYER layer, __out char *buffer, __in UINT bufLen ); |
Parameters
filter
: The packet filter string to be evaluated.layer
: The layer.buffer
: A buffer for the formatted filter.bufLen
: The length of buffer
.
Return Value
TRUE
if successful, FALSE
if an error occurred.
Use GetLastError()
to get the reason for the error.
Remarks
Formats the given filter string or object.
This function is mainly useful for decompiling
the filter object
representation back into a human-readable filter string representation.
One application is the WINDIVERT_LAYER_REFLECT
layer,
where the filter object associated with the reflection event is
returned by WinDivertRecv()
.
UINT16 WinDivertHelperNtohs( __in UINT16 x ); UINT32 WinDivertHelperNtohl( __in UINT32 x ); UINT64 WinDivertHelperNtohll( __in UINT64 x ); void WinDivertHelperNtohIPv6Address( __in const UINT *inAddr, __out UINT *outAddr ); |
Parameters
x
: The input value in network byte-order.inAddr
: The input IPv6 address in network byte-order.outAddr
: A buffer for the output IPv6 address in host
byte-order.
Return Value
The output value in host byte order.
Remarks
Converts a value/IPv6-address from network to host byte-order.
UINT16 WinDivertHelperHtons( __in UINT16 x ); UINT32 WinDivertHelperHtonl( __in UINT32 x ); UINT64 WinDivertHelperHtonll( __in UINT64 x ); void WinDivertHelperHtonIPv6Address( __in const UINT *inAddr, __out UINT *outAddr ); |
Parameters
x
: The input value in host byte-order.inAddr
: The input IPv6 address in host byte-order.outAddr
: A buffer for the output IPv6 address in network
byte-order.
Return Value
The output value in network byte order.
Remarks
Converts a value/IPv6-address from host to network byte-order.
The WinDivertOpen()
function accepts a
string containing a filter.
Only packets/events that match the filter will be blocked and/or captured.
All other non-matching packets/events will be allowed to continue as normal.
The filter allows an application to select only a subset traffic that is of interest. For example, a HTTP blacklist filter is only interested in packets that might contain URLs. This could be achieved using the following filter.
HANDLE handle = WinDivertOpen( "outbound and " "tcp.PayloadLength > 0 and " "tcp.DstPort == 80", 0, 0, 0);
This filter selects only the subset of all traffic that is:
A filter is a Boolean expression of the form:
FILTER := true | false | FILTER and FILTER | FILTER or FILTER | (FILTER) | (FILTER? FILTER: FILTER) | TEST
C-style syntax &&
, ||
, and !
may also
be used instead of and
, or
, and not
, respectively.
C-style conditional operators are also supported,
where the expression (A? B: C)
evaluates to:
B
if A
evaluates to true
; orC
if A
evaluates to false
.
A test is of the following form:
TEST := TEST0 | not TEST0 TEST0 := FIELD | FIELD op VAL
where op
is one of the following:
Operator | Description |
---|---|
== or = | Equal |
!= | Not equal |
< | Less-than |
> | Greater-than |
<= | Less-than-or-equal |
>= | Greater-than-or-equal |
and VAL
is a decimal number, hexadecimal number, IPv4
address, IPv6 address or a layer-specific macro.
If the
is missing, the test is implicitly
op VAL
.
FIELD != 0
Finally, a field is some layer-specific property matching the packet or event. The possible fields are:
Field | Layer | Description | ||||
---|---|---|---|---|---|---|
NETWORK | FORWARD | FLOW | SOCKET | REFLECT | ||
zero | ✔ | ✔ | ✔ | ✔ | ✔ | The value zero |
timestamp | ✔ | ✔ | ✔ | ✔ | ✔ | The packet/event timestamp |
event | ✔ | ✔ | ✔ | ✔ | ✔ | The event |
outbound | ✔ | ✔ | Is outbound? | |||
inbound | ✔ | ✔ | Is inbound? | |||
ifIdx | ✔ | ✔ | Interface index | |||
subIfIdx | ✔ | ✔ | Sub-interface index | |||
loopback | ✔ | ✔ | ✔ | Is loopback packet? | ||
impostor | ✔ | ✔ | Is impostor packet? | |||
fragment | ✔ | ✔ | Is IP fragment packet? | |||
endpointId | ✔ | ✔ | Endpoint ID | |||
parentEndpointId | ✔ | ✔ | Parent endpoint ID | |||
processId | ✔ | ✔ | ✔ | Process ID | ||
random8 | ✔ | ✔ | 8-bit random number | |||
random16 | ✔ | ✔ | 16-bit random number | |||
random32 | ✔ | ✔ | 32-bit random number | |||
layer | ✔ | The handle's layer | ||||
priority | ✔ | The handle's priority | ||||
packet[i] | ✔ | ✔ | The i th 8-bit word of the packet | |||
packet16[i] | ✔ | ✔ | The i th 16-bit word of the packet | |||
packet32[i] | ✔ | ✔ | The i th 32-bit word of the packet | |||
length | ✔ | ✔ | The packet length | |||
ip | ✔ | ✔ | ✔ | ✔ | Is IPv4? | |
ipv6 | ✔ | ✔ | ✔ | ✔ | Is IPv6? | |
icmp | ✔ | ✔ | ✔ | ✔ | Is ICMP? | |
icmpv6 | ✔ | ✔ | ✔ | ✔ | Is ICMPv6? | |
tcp | ✔ | ✔ | ✔ | ✔ | Is TCP? | |
udp | ✔ | ✔ | ✔ | ✔ | Is UDP? | |
protocol | ✔ | ✔ | ✔ | The protocol | ||
localAddr | ✔ | ✔ | ✔ | The local address | ||
localPort | ✔ | ✔ | ✔ | The local port | ||
remoteAddr | ✔ | ✔ | ✔ | The remote address | ||
remotePort | ✔ | ✔ | ✔ | The remote port | ||
ip.* | ✔ | ✔ | IPv4 fields (see WINDIVERT_IPHDR ) | |||
ipv6.* | ✔ | ✔ | IPv6 fields (see WINDIVERT_IPV6HDR ) | |||
icmp.* | ✔ | ✔ | ICMP fields (see WINDIVERT_ICMPHDR ) | |||
icmpv6.* | ✔ | ✔ | ICMPV6 fields (see WINDIVERT_ICMPV6HDR ) | |||
tcp.* | ✔ | ✔ | TCP fields (see WINDIVERT_TCPHDR ) | |||
tcp.PayloadLength | ✔ | ✔ | The TCP payload length | |||
tcp.Payload[i] | ✔ | ✔ | The i th 8-bit word of the TCP payload | |||
tcp.Payload16[i] | ✔ | ✔ | The i th 16-bit word of the TCP payload | |||
tcp.Payload32[i] | ✔ | ✔ | The i th 32-bit word of the TCP payload | |||
udp.* | ✔ | ✔ | UDP fields (see WINDIVERT_UDPHDR ) | |||
udp.PayloadLength | ✔ | ✔ | The UDP payload length | |||
udp.Payload[i] | ✔ | ✔ | The i th 8-bit word of the UDP payload | |||
udp.Payload16[i] | ✔ | ✔ | The i th 16-bit word of the UDP payload | |||
udp.Payload32[i] | ✔ | ✔ | The i th 32-bit word of the UDP payload |
A test will also fails if the field is not relevant.
For example, the test
will fail if the
packet does not contain a TCP header.
tcp.DstPort == 80
The processId
field matches the ID of the process associated
to an event.
Due to technical limitations, this field is not supported by the
WINDIVERT_LAYER_NETWORK*
layers.
That said, it is usually possible to associate process IDs to network packets
matching the same network 5-tuple.
Note that a fundamental race condition exists between the processId
and the termination of the corresponding process, see
the know issues listed below.
The packet*[i]
, tcp.Payload*[i]
and
udp.Payload*[i]
fields take an index parameter (i
).
The following indexing schemes are supported:
packet32[10]
):
evaluates to the i
th word from the start of
the packet/payload.
This is essentially C-style array indexing; packet32[-10]
):
evaluates to the i
th word from the end
of the packet/payload.
Here the index (-1
) is the first full word that fits; and packet32[10b]
or packet32[-10b]
):
evaluated to the word offset by i
bytes from the
start (or end) of the packet/payload.
These fields can be used to match filters against the contents of packets/payloads in addition to address/header information. Words are assumed to be in network-byte ordering. If the index is out-of-bounds then the corresponding test is deemed to have failed.
The random*
fields are not really random but use a
deterministic hash value calculated using the
WinDivertHelperHashPacket()
function.
Layer-specific macros make it possible to match events
and layers symbolically, e.g.,
or
event == CONNECT
.
The possible macros are:
layer == SOCKET
Macro | Layer | Value | ||||
---|---|---|---|---|---|---|
NETWORK | FORWARD | FLOW | SOCKET | REFLECT | ||
TRUE | ✔ | ✔ | ✔ | ✔ | ✔ | 1 |
FALSE | ✔ | ✔ | ✔ | ✔ | ✔ | 0 |
TCP | ✔ | ✔ | ✔ | ✔ | ✔ | IPPROTO_TCP (6 ) |
UDP | ✔ | ✔ | ✔ | ✔ | ✔ | IPPROTO_UDP (17 ) |
ICMP | ✔ | ✔ | ✔ | ✔ | ✔ | IPPROTO_ICMP (1 ) |
ICMPV6 | ✔ | ✔ | ✔ | ✔ | ✔ | IPPROTO_ICMPV6 (58 ) |
PACKET | ✔ | ✔ | WINDIVERT_EVENT_NETWORK_PACKET | |||
ESTABLISHED | ✔ | WINDIVERT_EVENT_FLOW_ESTABLISHED | ||||
DELETED | ✔ | WINDIVERT_EVENT_FLOW_DELETED | ||||
BIND | ✔ | WINDIVERT_EVENT_SOCKET_BIND | ||||
CONNECT | ✔ | WINDIVERT_EVENT_SOCKET_CONNECT | ||||
ACCEPT | ✔ | WINDIVERT_EVENT_SOCKET_ACCEPT | ||||
LISTEN | ✔ | WINDIVERT_EVENT_SOCKET_LISTEN | ||||
OPEN | ✔ | WINDIVERT_EVENT_REFLECT_OPEN | ||||
CLOSE | ✔ | ✔ | WINDIVERT_EVENT_SOCKET_CLOSE
for the SOCKET layer, or
WINDIVERT_EVENT_REFLECT_CLOSE for the REFLECT
layer. | |||
NETWORK | ✔ | WINDIVERT_LAYER_NETWORK | ||||
NETWORK_FORWARD | ✔ | WINDIVERT_LAYER_NETWORK_FORWARD | ||||
FLOW | ✔ | WINDIVERT_LAYER_FLOW | ||||
SOCKET | ✔ | WINDIVERT_LAYER_SOCKET | ||||
REFLECT | ✔ | WINDIVERT_LAYER_REFLECT |
HANDLE handle = WinDivertOpen( "outbound and !loopback and " "(tcp.DstPort == 80 or udp.DstPort == 53)", 0, 0, 0 );
HANDLE handle = WinDivertOpen( "inbound and " "tcp.Syn", 0, 0, 0 );
HANDLE handle = WinDivertOpen("true", 0, 0, 0);
HANDLE handle = WinDivertOpen("false", 0, 0, 0);This is useful for packet injection.
The purpose of the filter is to help applications select the subset of all network traffic that the application is interested in. Ideally the filter should be
For some applications these two objectives can conflict. That is, a selective filter is not short, and a short filter is not selective. For such applications the developer should experiment with different filter configurations and carefully measure the performance impact to find the optimal solution.
Using WinDivert to redirect network traffic to/from a user application incurs performance overheads, such as copying packet data and user/kernel mode context switching. Under heavy load (≥1Gbps) these overheads can be significant. The following techniques can be used to reduce overheads (in order of importance):
OVERLAPPED
structure)
are not modified by the user application until the operation
completes.
The passthru.exe
sample program can
be used to experiment with different batch sizes and thread counts.
Some samples have been provided to demonstrate the WinDivert API. The sample programs are:
webfilter.exe
: A simple URL blacklist filter.
This program monitors outbound HTTP traffic.
If it finds a URL request that matches the blacklist, it hijacks the
TCP connection, reseting the connection at the server's end, and
sending a simple block-page to the browser.
The blacklist(s) are specified at the command-line.netdump.exe
: A simple packet sniffer based on the
WinDivert filter language.
This program takes a filter specified at the command line, and prints
information about any packet that matches the filter.
This example uses WinDivert in "packet sniffing" mode, similar to
winpcap
.
However, unlike winpcap
, WinDivert can see local (loopback)
packets.
netfilter.exe
: A simple firewall based on the WinDivert
filter language.
This program takes a filter specified at the command line, and blocks
any packet that matches the filter.
It blocks TCP by sending a TCP reset, UDP by an ICMP message, and all
other traffic it simply drops.
This is similar to the Linux iptables
command with the
-j REJECT
option.passthru.exe
: A simple program that simply re-injects every
packet it captures.
This example has a configurable batch-size and thread count,
and so is useful for performance testing or as a starting point
for more interesting applications.streamdump.exe
: A simple program that demonstrates how to
handle streams using WinDivert.
The basic idea is to divert outbound TCP connections to a local proxy
server which can capture or manipulate the stream.flowtrack.exe
: A program that tracks all network flows
to and from the local machine, including information such as the ID of the
responsible process.
The flowtrack
sample demonstrates the
WINDIVERT_LAYER_FLOW
layer.socketdump.exe
: Dumps socket operations
(bind()
, connect()
, etc.) and the ID of the
responsible process.
The socketdump
sample demonstrates the
WINDIVERT_LAYER_SOCKET
layer.windivertctl.exe
allows the user to query which processes
are using WinDivert via the list
or watch
commands, or to terminate all such processes using the
kill
command.
The windivertctl.exe
can also forcibly remove the
WinDivert driver using the uninstall
command.
The windivertctl
sample demonstrates the
WINDIVERT_LAYER_REFLECT
layer.The samples are intended for educational purposes only, and are not fully-featured applications.
The following basic template for a WinDivert application using the
WINDIVERT_LAYER_NETWORK
layer.
The basic idea is to open a WinDivert handle, then enter a
capture-modify-reinject loop:
HANDLE handle; // WinDivert handle WINDIVERT_ADDRESS addr; // Packet address char packet[MAXBUF]; // Packet buffer UINT packetLen; // Open some filter handle = WinDivertOpen("...", WINDIVERT_LAYER_NETWORK, 0, 0); if (handle == INVALID_HANDLE_VALUE) { // Handle error exit(1); } // Main capture-modify-inject loop: while (TRUE) { if (!WinDivertRecv(handle, packet, sizeof(packet), &packetLen, &addr)) { // Handle recv error continue; } // Modify packet. WinDivertHelperCalcChecksums(packet, packetLen, &addr, 0); if (!WinDivertSend(handle, packet, packetLen, NULL, &addr)) { // Handle send error continue; } }
For applications that do not need to modify the packet, a better approach is
to open the WinDivert handle with the WINDIVERT_FLAG_SNIFF
flag set,
and not re-inject the packet with
WinDivertSend()
.
See the netdump.exe
sample program for an example of this usage.
WinDivert has some known limitations listed below:
WinDivertSend()
will fail
with an error for certain types of inbound ICMP/ICMPv6 messages.
This is probably because the Windows TCP/IP stack does not handle
such messages.
Such errors are harmless and can be ignored.
WinDivertSend()
will eventually fail
with error ERROR_HOST_UNREACHABLE
.
Unfortunately, such errors are not easy to fix.
Some crude solutions include: (1) removing the incompatible driver, or
(2) ignoring all packets with ip.TTL
or
ipv6.HopLimit
less than the Windows DefaultTTL
registry value.
See
GitHub issue #41 for more information.
passthru.exe
sample program can cause
packets to become out-of-order.
This is not a bug, since there is no requirement for packets to
remain in-order.
However, this may affect other buggy software
(e.g. some buggy NAT implementations)
that incorrectly assume packets to be in-order.
addr.*.processId
and
process termination.
By the time an event is received using
WinDivertRecv()
,
it is possible that the process responsible for the event has already
terminated.
Furthermore, it is theoretically possible that the
processId
has been reassigned to an unrelated process.
This problem can be partly mitigated by comparing the timestamp
(addr.Timestamp
) with the creation time of the process.
If the process is newer, then the ID has been reassigned.
This race condition does not affect the
WINDIVERT_EVENT_REFLECT_OPEN
event.
In this special case, the addr.Reflect.processId
is
guaranteed to be valid until the corresponding
WINDIVERT_EVENT_REFLECT_CLOSE
event is
received by the user application or is dropped
(filter mismatch or timeout).
WinDivert is dual-licensed under your choice of either the GNU Lesser General Public License (LGPL) Version 3 or the GNU General Public License (GPL) Version 2. Please see the notices below:
LGPL version 3:
WinDivert is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.
GPL version 2:
WinDivert is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.