Refactor packet monitoring to capture all traffic on wg0 and enhance logging for peer traffic detection

This commit is contained in:
ImBenji
2025-08-29 01:51:34 +01:00
parent aa5b609d09
commit 2382922995

View File

@@ -89,16 +89,14 @@ class ProtocolBlockingService {
}
static Future<void> _monitorPeerTraffic() async {
for (final peerIP in _activePeerIPs) {
// Capture ANY packet on wg0 interface and print it
try {
// Capture any new outbound traffic from this peer
final process = await Process.start('timeout', [
'0.1', // Very short timeout - just check for new packets
'0.1', // Very short timeout
'tcpdump',
'-i', 'wg0',
'-c', '1',
'-l', // Line buffered
'src $peerIP and (tcp[tcpflags] & tcp-syn != 0 or udp)',
'-v', // Verbose
]);
final output = <String>[];
@@ -110,14 +108,22 @@ class ProtocolBlockingService {
process.kill();
if (exitCode == 0 && output.isNotEmpty) {
final packetData = output.join();
final packetData = output.join().trim();
print('📦 PACKET DETECTED: $packetData');
// Check if it's from our monitored peers
for (final peerIP in _activePeerIPs) {
if (packetData.contains(peerIP)) {
print('🎯 PEER TRAFFIC FROM $peerIP: $packetData');
await _analyzeNewPacket(packetData, peerIP);
break;
}
}
}
} catch (e) {
// Ignore timeout errors - normal when no new packets
if (!e.toString().contains('timeout')) {
print('❌ Error monitoring peer $peerIP: $e');
}
// Ignore timeout errors - normal when no packets
if (!e.toString().contains('timeout') && !e.toString().contains('No such device')) {
print('❌ Error monitoring traffic: $e');
}
}
}