/*TODO: currently, nobody references this function*/ void dns_dynamic_update(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length, struct DNS *dns) { unsigned i; for (i=0; i<dns->answer_count; i++) { char name[256]; unsigned name_length; unsigned x; struct DNSRECORD *rec = &dns->answers[i]; name_length = dns_extract_name(frame, px, length, rec->name_offset, name, sizeof(name)); x = rec->clss<<16 | rec->type; SAMPLE(ferret,"DynDNS", JOT_NUM("Prereq", x)); switch (rec->type) { case 0x0001: /*A*/ switch (rec->clss) { case 0x0001: /*INTERNET*/ { unsigned ip_address = ex32be(px+rec->rdata_offset); if (rec->rdata_length != 4) FRAMERR(frame, "dns: data not 4-bytes long, was %d-bytes instead (class=%d, type=%d, name=%s)\n", rec->rdata_length, rec->clss, rec->type, name); JOTDOWN(ferret, JOT_IPv4("ID-IP", ip_address), JOT_PRINT("name", name, name_length), 0); JOTDOWN(ferret, JOT_SZ("proto","NETBIOS"), JOT_SZ("op","register"), JOT_SRC("ip.src", frame), JOT_PRINT("name", name, name_length), JOT_IPv4("address", ip_address), 0); } break; default: FRAMERR(frame, "dns: unknown class=%d (type=%d, name=%s)\n", rec->clss, rec->type, name); } break; } } }
void process_upnp_response(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned offset=0; while (offset < length) { const unsigned char *line = px+offset; unsigned line_length; for (line_length=0; offset+line_length < length && px[offset+line_length] != '\n'; line_length++) ; offset += line_length; if (offset<length && px[offset] == '\n') offset++; while (line_length && isspace(line[line_length-1])) line_length--; if (line_length>3 && strnicmp((const char*)line, "ST:", 3) == 0) { JOTDOWN(ferret, JOT_SZ("proto","upnp"), JOT_SRC("ip.src", frame), JOT_PRINT("ST", line+3, line_length-3), 0); } } }
void process_cups(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned offset = 0; unsigned type=0; unsigned state = 0; const unsigned char *uri; unsigned uri_length; const unsigned char *location; unsigned location_length; const unsigned char *information; unsigned information_length; const unsigned char *model; unsigned model_length; extract_num(px, length, &offset, &type); extract_num(px, length, &offset, &state); extract_string(px, length, &offset, &uri, &uri_length); extract_string(px, length, &offset, &location, &location_length); extract_string(px, length, &offset, &information, &information_length); extract_string(px, length, &offset, &model, &model_length); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_NUM("type",type), 0); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_NUM("state",state), 0); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_PRINT("uri", uri, uri_length), 0); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_PRINT("location", location, location_length), 0); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_PRINT("info", information, information_length), 0); JOTDOWN(ferret, JOT_SZ("proto", "CUPS"), JOT_SRC("ip.src", frame), JOT_PRINT("model", model, model_length), 0); }
void process_icmp(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned type = px[0]; unsigned code = px[1]; unsigned checksum = ex16be(px+2); UNUSEDPARM(length); UNUSEDPARM(frame); UNUSEDPARM(checksum); ferret->statistics.icmp++; frame->layer4_protocol = LAYER4_ICMP; JOTDOWN(ferret, JOT_SZ("TEST","icmp"), JOT_NUM("type",type), JOT_NUM("code",code), 0); }
void process_icmpv6(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned type = px[0]; unsigned code = px[1]; unsigned checksum = ex16be(px+2); UNUSEDPARM(length); UNUSEDPARM(frame); UNUSEDPARM(checksum); frame->layer4_protocol = LAYER4_ICMP; JOTDOWN(ferret, JOT_SZ("TEST","icmp"), JOT_NUM("type",type), JOT_NUM("code",code), 0); if (frame->dst_ipv6[0] == 0xFF) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_IPv6("ipv6", frame->src_ipv6, 16), 0); }
void process_simple_smtp_data(struct TCPRECORD *sess, struct TCP_STREAM *to_server, struct NetFrame *frame, const unsigned char *px, unsigned length) { struct FerretEngine *eng = sess->eng; struct Ferret *ferret = eng->ferret; unsigned offset=0; unsigned command; unsigned command_length; unsigned parm; unsigned parm_length; if (sess == NULL) return; frame->layer7_protocol = LAYER7_SMTP; while (offset<length) { /* Handle end-of-email '.' issue */ if (offset<length && px[offset] == '.') { if (offset+1<length && px[offset] == '\n' && offset+2<length && px[offset] == '\r' && px[offset+1] == '\n') { to_server->app.smtpreq.is_body = 0; to_server->app.smtpreq.is_data = 0; return; } } if (to_server->app.smtpreq.is_body) { while (offset<length && px[offset] != '\n') offset++; if (offset<length && px[offset] == '\n') offset++; continue; } while (offset<length && isspace(px[offset]) && px[offset] != '\n') offset++; command = offset; while (offset<length && px[offset] != ':' && px[offset] != '\n') offset++; command_length = offset-command; if (command_length == 0) { to_server->app.smtpreq.is_body = 1; continue; } while (command_length && isspace(px[offset+command_length])) command_length--; if (command_length && px[offset+command_length] == ':') command_length--; while (command_length && isspace(px[offset+command_length])) command_length--; while (offset<length && px[offset] == ':') offset++; while (offset<length && isspace(px[offset]) && px[offset] != '\n') offset++; parm = offset; if ((offset<length && px[offset] == '\n') || (offset+1<length && px[offset] == '\r' && px[offset+1] == '\n')) { to_server->app.smtpreq.is_body = 1; return; } again: while (offset<length && px[offset] != '\n') offset++; if (offset<length && px[offset] == '\n') offset++; if (offset<length && px[offset] != '\n' && isspace(px[offset]) && (offset+1<length && px[offset] != '\r' && px[offset] != '\n')) goto again; parm_length = offset-parm; while (parm_length && isspace(px[parm+parm_length-1])) parm_length--; JOTDOWN(ferret, JOT_SZ("proto","RFC822msg"), JOT_PRINT("header", px+command, command_length), JOT_PRINT("value", px+parm, parm_length), JOT_SRC("client", frame), JOT_DST("server", frame), 0); if (is_command("subject", px+command, command_length)) { smtp_copy(to_server->app.smtpreq.subject, px+parm, parm_length); } if (is_command("X-Mailer", px+command, command_length)) { JOTDOWN(ferret, JOT_SRC("ID-IP", frame), JOT_PRINT("X-Mailer", px+parm, parm_length), 0); } if (is_command("X-MimeOLE", px+command, command_length)) { JOTDOWN(ferret, JOT_SRC("ID-IP", frame), JOT_PRINT("X-MimeOLE", px+parm, parm_length), 0); } } }
void process_simple_smtp_request(struct TCPRECORD *sess, struct TCP_STREAM *to_server, struct NetFrame *frame, const unsigned char *px, unsigned length) { struct FerretEngine *eng = sess->eng; struct Ferret *ferret = eng->ferret; char command[16]; const char *parm; unsigned parm_length; unsigned i; unsigned x; /* IF CLOSING CONNECTION */ if (px == NULL) { return; } frame->layer7_protocol = LAYER7_SMTP; if (to_server->app.smtpreq.is_data) { process_simple_smtp_data(sess, to_server, frame, px, length); return; } /* Remove leading whitespace */ for (i=0; i<length && isspace(px[i]); i++) ; /* Grab command. This means parsing up to the first space * character, or the first ':' character in the case of * mailfrom: or rcptto: */ x=0; again: while (i<length && !isspace(px[i]) && px[i] != ':') { if (x < sizeof(command) -1) { command[x++] = (char)toupper(px[i]); command[x] = '\0'; } i++; } if (i<length && px[i] == ':') i++; /* skip space after command */ while (i<length && isspace(px[i])) i++; if (stricmp(command, "mail")==0 || stricmp(command, "rcpt")==0) { if (i >= length) return; goto again; } SAMPLE(ferret,"SMTP", JOT_SZ("command", command)); /* Grab parm */ parm = (const char*)px+i; x=i; while (i<length && px[i] != '\n') i++; parm_length = i-x; if (parm_length && parm[parm_length-1] == '\n') parm_length--; if (parm_length && parm[parm_length-1] == '\r') parm_length--; JOTDOWN(ferret, JOT_SZ("proto", "SMTP"), JOT_SZ("op", command), JOT_PRINT("parm", parm, parm_length), JOT_SRC("client", frame), JOT_DST("server", frame), 0); /* test parms */ if (stricmp(command, "MAILFROM")==0) { strip_address(&parm, &parm_length); if (sess) smtp_copy(to_server->app.smtpreq.from, parm, parm_length); JOTDOWN(ferret, JOT_SRC("IP", frame), JOT_PRINT("e-mail", parm, parm_length), 0); } if (stricmp(command, "RCPTTO")==0) { strip_address(&parm, &parm_length); if (sess) smtp_copy(to_server->app.smtpreq.to, parm, parm_length); JOTDOWN(ferret, JOT_SRC("IP", frame), JOT_PRINT("friend", parm, parm_length), 0); } if (stricmp(command, "DATA")==0 && sess) { to_server->app.smtpreq.is_data = 1; } if (stricmp(command, "RSET")==0 && sess) { to_server->app.smtpreq.is_data = 0; } }
void process_dns(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned offset; struct DNS dns[1]; unsigned record_count; unsigned total_records; unsigned i; /* Count the number of DNS packets we process. This includes * all types of DNS */ ferret->statistics.dns++; memset(dns, 0, sizeof(dns[0])); if (length < 12) { /* Regress: defcon2008-dns2.pcap(95639) */ ; //FRAMERR(frame, "dns: frame too short\n"); return; } /* Parse the DNS header, the 'fixed' portion of the packet * before the variable length records +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | ID | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ |QR| Opcode |AA|TC|RD|RA| Z | RCODE | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | QDCOUNT | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | ANCOUNT | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | NSCOUNT | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ | ARCOUNT | +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ ID A 16 bit identifier assigned by the program that generates any kind of query. This identifier is copied the corresponding reply and can be used by the requester to match up replies to outstanding queries. QR A one bit field that specifies whether this message is a query (0), or a response (1). OPCODE A four bit field that specifies kind of query in this message. This value is set by the originator of a query and copied into the response. The values are: 0 a standard query (QUERY) 1 an inverse query (IQUERY) 2 a server status request (STATUS) 3-15 reserved for future use AA Authoritative Answer - this bit is valid in responses, and specifies that the responding name server is an authority for the domain name in question section. Note that the contents of the answer section may have multiple owner names because of aliases. The AA bit corresponds to the name which matches the query name, or the first owner name in the answer section. TC TrunCation - specifies that this message was truncated due to length greater than that permitted on the transmission channel. RD Recursion Desired - this bit may be set in a query and is copied into the response. If RD is set, it directs the name server to pursue the query recursively. Recursive query support is optional. RA Recursion Available - this be is set or cleared in a response, and denotes whether recursive query support is available in the name server. Z Reserved for future use. Must be zero in all queries and responses. RCODE Response code - this 4 bit field is set as part of responses. The values have the following interpretation: 0 No error condition 1 Format error - The name server was unable to interpret the query. 2 Server failure - The name server was unable to process this query due to a problem with the name server. 3 Name Error - Meaningful only for responses from an authoritative name server, this code signifies that the domain name referenced in the query does not exist. 4 Not Implemented - The name server does not support the requested kind of query. 5 Refused - The name server refuses to perform the specified operation for policy reasons. For example, a name server may not wish to provide the information to the particular requester, or a name server may not wish to perform a particular operation (e.g., zone 6-15 Reserved for future use. QDCOUNT an unsigned 16 bit integer specifying the number of entries in the question section. ANCOUNT an unsigned 16 bit integer specifying the number of resource records in the answer section. NSCOUNT an unsigned 16 bit integer specifying the number of name server resource records in the authority records section. ARCOUNT an unsigned 16 bit integer specifying the number of resource records in the additional records section. */ dns->id = ex16be(px+0); dns->is_response = ((px[2]&0x80) != 0); dns->opcode = (px[2]>>3)&0x01F; dns->flags = ex16be(px+2)&0x7F0; dns->rcode = px[3]&0x0F; dns->question_count = ex16be(px+4); dns->answer_count = ex16be(px+6); dns->authority_count = ex16be(px+8); dns->additional_count = ex16be(px+10); /* Remember a total count of the records. There are a lot of corrupted packets * with data after the counted records, so we need to stop parsing once all * the counted records have been parsed. */ total_records = dns->question_count + dns->answer_count + dns->authority_count + dns->additional_count; offset = 12; record_count = 0; /* After parsing the fixed header, we no PRE-PROCESS the variable length records. * All we want to do at this point is to find their locations within the packet. * The reason we want to pre-process these is that some records will refer to * other records in the same packet. A good example are CNAME records * that require looking up other records in order to fully resolve. We can * do the resolution easier if we can preprocess the list first */ while (offset < length && record_count < 100) { struct DNSRECORD *rec = &dns->records[record_count]; /* Even if there is remaining data in the packet, do not parse past * the total count of all the records */ if (record_count >= total_records) { SAMPLE(ferret,"dns", JOT_NUM("too-many-records", total_records)); break; } /* NAME * The first part of a DNS record is the variable length name. The name * consists of a sequence of LABELS. Each label starts with a tag. The * tag can be one of three things: * - a value of zero, which ends the name * - a length from 1-63, which means we need to continue processing * more labels * - a two-byte 'pointer' to the remainder of the name, which means that * we stop pre-processing the name. We don't actually parse out the * full name at this stage in the code (so we won't follow that pointer), * we are just concerned with skipping the name at this point. */ rec->name_offset = offset; while (offset < length) { /* Test for end label */ if (px[offset] == 0x00) { offset++; break; } /* Test for compression 'pointer' */ if (px[offset] & 0xC0) { offset += 2; break; } /* Skip the 'length' number of bytes, plus the length byte itself */ offset += px[offset] + 1; if (offset > length) { FRAMERR(frame, "dns: past end of packet\n"); return; } } /* Now parse out the 'type' and 'class' fields. These are the * 4 bytes immediately following the name */ if (offset + 4 > length) { FRAMERR(frame, "dns: past end of packet\n"); return; } rec->type = ex16be(px+offset+0); rec->clss = ex16be(px+offset+2); offset += 4; record_count++; /* If this is a 'question' record, then we don't do any further processing. * Since question records are just asking for data, they don't contain * any data themselves. Otherwise, if the record will contain data that * we need to also parse */ if (record_count <= dns->question_count) continue; /* This bit of code parses out the remainder of the data in the record. For * the most part, we just need to parse the 'length' field for the record * data, remember it for use later, then skip the remainder of this record * and continue processing the next record */ if (offset + 6 > length) { /* Regress: defcon2008-dns2.pcap(88069) */ FRAMERR(frame, "dns: past end of packet\n"); return; } rec->ttl = ex32be(px+offset+0); rec->rdata_length = ex16be(px+offset+4); offset += 6; rec->rdata_offset = offset; offset += rec->rdata_length; if (offset > length) { FRAMERR(frame, "dns: past end of packet\n"); return; } } dns->record_count = record_count; /* We stored the records in one large array, but there are four kinds * of records (questions, answers, authority, additional). We figure out * which records belong to which type according to the counts */ if (dns->question_count > record_count) { dns->question_count = record_count; FRAMERR(frame, "%s: bad record count\n", "DNS"); } if (dns->answer_count > record_count - dns->question_count) { dns->answer_count = record_count - dns->question_count; /* Regress: defcon2008-dns2.pcap(158112) */ ; //FRAMERR(frame, "%s: bad record count\n", "DNS"); } if (dns->authority_count > record_count - dns->question_count - dns->answer_count) { dns->authority_count = record_count - dns->question_count - dns->answer_count; FRAMERR(frame, "%s: bad record count\n", "DNS"); } if (dns->additional_count > record_count - dns->question_count - dns->answer_count - dns->authority_count) { dns->additional_count = record_count - dns->question_count - dns->answer_count - dns->authority_count; FRAMERR(frame, "%s: bad record count\n", "DNS"); } dns->questions = &dns->records[0]; dns->answers = &dns->records[dns->question_count]; dns->authorities = &dns->records[dns->question_count + dns->answer_count]; dns->additionals = &dns->records[dns->question_count + dns->answer_count + dns->authority_count]; /* * First, we parse out all the question records. These don't contain any data * themselves, but they do give us interesting information about what a client * is looking for. Also, some protocols, such as NetBIOS and mDNS/Bonjour will * tell us additional information about the client. */ if (dns->is_response && dns->rcode == 0) for (i=0; i<dns->question_count; i++) { struct DNSRECORD *rec = &dns->questions[i]; dns_parse_question_record(ferret, frame, px, length, rec, dns); } /* Now parse all the resource records after the questions */ for (i=0; i<dns->answer_count; i++) { struct DNSRECORD *rec = &dns->answers[i]; dns_parse_resource_record(ferret, frame, px, length, rec, dns); } for (i=0; i<dns->authority_count; i++) { struct DNSRECORD *rec = &dns->authorities[i]; dns_parse_resource_record(ferret, frame, px, length, rec, dns); } for (i=0; i<dns->additional_count; i++) { struct DNSRECORD *rec = &dns->additionals[i]; dns_parse_resource_record(ferret, frame, px, length, rec, dns); } #if 0 switch (dns->opcode) { case 0x00: /*query request*/ case 0x10: /*query response */ switch (dns->rcode) { case 0: case 3: /* No such name */ SAMPLE(ferret,"DNS", JOT_NUM("rcode", dns->rcode)); break; case 2: /* Server error */ SAMPLE(ferret,"DNS", JOT_NUM("rcode", dns->rcode)); break; default: FRAMERR(frame, "dns: unknown rcode=%d (opcode=%d)\n", dns->rcode, dns->opcode); } break; case 0x06: /*release*/ switch (dns->rcode) { case 0: for (i=0; i<dns->additional_count; i++) { char name[256]; unsigned name_length; struct DNSRECORD *rec = &dns->additionals[i]; if (rec->type == 0x8001) FRAMERR(frame, "test\n"); name_length = dns_extract_name(frame, px, length, rec->name_offset, name, sizeof(name)); switch (rec->type) { case 0x0020: /*NETBIOS */ switch (rec->clss) { case 0x0001: /*INTERNET*/ { unsigned ip_address = ex32be(px+rec->rdata_offset+2); char netbios_name[256]; if (rec->rdata_length != 6) FRAMERR(frame, "dns: data not 4-bytes long, was %d-bytes instead (class=%d, type=%d, name=%s)\n", rec->rdata_length, rec->clss, rec->type, name); translate_netbios_name(frame, name, netbios_name, sizeof(netbios_name)); JOTDOWN(ferret, JOT_SZ("proto","NETBIOS"), JOT_SZ("op","release"), JOT_DST("ip.src", frame), JOT_PRINT("name", netbios_name, strlen(netbios_name)), JOT_IPv4("address", ip_address), 0); JOTDOWN(ferret, JOT_IPv4("ID-IP", ip_address), JOT_PRINT("netbios", netbios_name, strlen(netbios_name)), 0); } break; default: FRAMERR(frame, "dns: unknown class=%d (type=%d, name=%s)\n", rec->clss, rec->type, name); } break; default: FRAMERR(frame, "dns: unknown type=%d (class=%d, name=%s)\n", rec->type, rec->clss, name); } } } break; case 0x05: /*netbios registration request*/ if (frame->dst_port == 53) dns_dynamic_update(ferret, frame, px, length, dns); else process_request_update(ferret, frame, px, length, dns); break; case 0x08: for (i=0; i<dns->additional_count; i++) DECODEANSWER(ferret, frame, px, length, dns, &dns->additionals[i], "refresh"); break; case 0x01: /*inverse query request*/ case 0x11: /*inverse query reqsponse*/ case 0x02: /*status request*/ case 0x12: /*status response*/ case 0x04: /*notify request*/ case 0x14: /*notify response*/ case 0x15: /*update response*/ case 0x0f: /*multi-home registration*/ for (i=0; i<dns->additional_count; i++) DECODEANSWER(ferret, frame, px, length, dns, &dns->additionals[i], "multi-home"); break; default: FRAMERR(frame, "dns: unknown opcode %d\n", dns->opcode); } #endif }
static void dns_parse_question_record(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length, struct DNSRECORD *rec, struct DNS *dns) { char name[512]; /* reserve a longer name than the max theoretical limit */ unsigned name_length; /* If this is actually a bonjour packet, then pass it off to the * Bonjour module */ if (!dns->is_response && frame->dst_port == 5353) bonjour_parse_question_record(ferret, frame, px, length, rec, dns); else if (dns->is_response && frame->src_port == 5353) bonjour_parse_question_record(ferret, frame, px, length, rec, dns); /* First, let's extract a pretty version of the name */ name_length = dns_extract_name(frame, px, length, rec->name_offset, name, sizeof(name)); switch (rec->type<<16 | rec->clss) { case TYPECLASS(1,1): /* type=A(IPv4 address), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","A"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; case TYPECLASS(2,1): /* type=NS(name-server), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","NS"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; case TYPECLASS(6,1): /* type=SOA(Start of Authority), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","SOA"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; case TYPECLASS(10,1): /* type=NULL, class=INTERNET*/ /* Regress: defcon2008-dns2.pcap(100803): name=Vaaaaiaqaac.tunnel.fastcoder.net */ /* I'm not sure what this is, other than passing data as Null records. * This would be a good thing for an intrusion-detection system to trigger * on. */ break; case TYPECLASS(12,1): /* type=PTR(pointer, aka. reverse), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("op","reverse"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; case TYPECLASS(13,1): /* type=HINFO, class=INTERNET*/ /* Regress: defcon2008-dns2.pcap(292428) */ break; case TYPECLASS(15,1): /* type=MX, class=INTERNET*/ /* Regress: defcon2008-dns2.pcap(18661) */ break; case TYPECLASS(16,1): /* type=TXT(text), class=INTERNET*/ /* CASE: I see these in mDNS. A machine sends out a query for a * record to the multi-cast address right before it then multi-casts * the answer. I don't think there is anything useful to extract here * at this time */ if (!is_valid_opcode(dns->opcode, OP_QUERY, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } break; case TYPECLASS(35,1): /* type=NAPTR(naming authority pointer), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, OP_QUERY, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } /* Reference: defcon2008-dns2.pcap(277617) */ break; case TYPECLASS(0x1c,1): /* type=AAAA(IPv6 address), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","AAAA"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; case TYPECLASS(0x1c,0x8001): /* type=AAAA(IPv6 address), class=mDNS-FLUSH*/ if (!is_valid_opcode(dns->opcode, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } /* TODO: move this to the mDNS-Bonjour parser */ JOTDOWN(ferret, JOT_SZ("proto","MDNS"), JOT_SZ("query","AAAA"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("flush", name, name_length), 0); break; case TYPECLASS(0x21,1): /* type=SRV(Service Location), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, OP_QUERY, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","srv"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; /*case TYPECLASS(255,1):*/ /* type=ANY, class=INTERNET*/ case TYPECLASS(255,0x8001): /* type=ANY, class=FLUSH(mDNS/Bonjour)*/ if (!is_valid_opcode(dns->opcode, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("op","flush"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); if (endsWith(name, "._ipp._tcp.local")) { JOTDOWN(ferret, "Bonjour", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("Printer", name, name_length-strlen("._ipp._tcp.local")), 0); } else if (endsWith(name, ".local")) JOTDOWN(ferret, "ID-IP", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length-strlen(".local")), 0); else FRAMERR(frame, "%s: unknown value: %s\n", "dns", name); break; case TYPECLASS(255,1): /* type=ANY, class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("query","ANY"), "ip.src", dns->is_response?REC_FRAMEDST:REC_FRAMESRC, frame, -1, JOT_PRINT("name", name, name_length), 0); break; default: FRAMERR(frame, "dns: unknown [type=0x%x(%d), class=0x%x(%d)] name=%s)\n", rec->type, rec->type, rec->clss, rec->clss, name); } }
/** * This is the main function of the DNS parser. * * This is where the each DNS 'answer' (or 'additional' or 'authoritative') * record is parsed. Mostly, we ignore the return code, though some functions * pay attention to and provide slightly different information depending * upon the opcode. */ static void dns_parse_resource_record(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length, struct DNSRECORD *rec, struct DNS *dns) { char name[512]; /* reserve a longer name than the max theoretical limit */ unsigned name_length; char name2[512]; /* reserve a longer name than the max theoretical limit */ unsigned name2_length; unsigned ip_address; unsigned offset = rec->rdata_offset; unsigned offset_max = MIN(rec->rdata_offset+rec->rdata_length, length); /* MULTICAST DNS (mDNS): handle the multicast DNS records differently * from normal DNS records. */ if (!dns->is_response && frame->dst_port == 5353) { bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); return; } else if (dns->is_response && (frame->src_port == 5353 || (frame->dst_port == 5353 && frame->src_port != 53))) { bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); return; } /* NETBIOS: handle NetBIOS records differently from normal DNS records */ if (!dns->is_response && frame->dst_port == 137) { netbios_parse_resource_record(ferret, frame, px, length, rec, dns); return; } else if (dns->is_response && frame->src_port == 137) { netbios_parse_resource_record(ferret, frame, px, length, rec, dns); return; } /* First, let's extract a pretty version of the name */ name_length = dns_extract_name(frame, px, length, rec->name_offset, name, sizeof(name)); if (rec->type == 0x8001) FRAMERR(frame, "TODO\n"); if (rec->clss == 0xfe) return; /* RFC2671 - Extension Mechanisms for DNS (EDNS0) */ if (rec->type == 41) { /* Regress: defcon2008/dump000.pca(12541) */ /* TODO: parse this */ return; } /* Haven't implemented dynamic update yet * TODO: */ if (dns->opcode == 21 || dns->opcode == 5) return; switch (rec->type<<16 | rec->clss) { case TYPECLASS(1,0x8001): /* type=A(IPv4 address), class=INTERNET(cache flush) */ bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); break; case TYPECLASS(1,1): /* type=A(IPv4 address), class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, 5, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } ip_address = ex32be(px+rec->rdata_offset); if (rec->rdata_length != 4) FRAMERR(frame, "dns: data not 4-bytes long, was %d-bytes instead (class=%d, type=%d, name=%s)\n", rec->rdata_length, rec->clss, rec->type, name); JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_IPv4("address", ip_address), 0); break; case TYPECLASS(2,1): /* type=NS, class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } name2_length = dns_extract_name(frame, px, length, rec->rdata_offset, name2, sizeof(name2)); ip_address = dns_resolve_alias(frame, px, length, dns, name2, 0); JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_PRINT("Name-Server", name2, name2_length), JOT_IPv4("address", ip_address), 0); break; case TYPECLASS(5,1): /*type=CNAME(aliased canonical name), class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, 5, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } name2_length = dns_extract_name(frame, px, length, rec->rdata_offset, name2, sizeof(name2)); ip_address = dns_resolve_alias(frame, px, length, dns, name2, 0); if (ip_address != 0) { JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_IPv4("alias",ip_address), 0); } JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_PRINT("alias", name2, name2_length), 0); break; case TYPECLASS(6,1): /*type=SOA, class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } /* * Authoritative Name Server */ name2_length = dns_extract_name(frame, px, length, offset, name2, sizeof(name2)); JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_SZ("SOA", "Start of zone authority"), JOT_PRINT("Name-Server", name2, name2_length), 0); ip_address = dns_resolve_alias(frame, px, length, dns, name2, 0); if (ip_address) JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_SZ("SOA", "Start of zone authority"), JOT_PRINT("Name-Server", name2, name2_length), JOT_IPv4("address", ip_address), 0); skip_name(px, length, &offset); /* Contact */ if (offset < offset_max) { name2_length = dns_extract_name(frame, px, length, offset, name2, sizeof(name2)); JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_SZ("SOA", "Start of zone authority"), JOT_PRINT("Contact", name2, name2_length), 0); skip_name(px, length, &offset); } break; case TYPECLASS(10,1): /* type=NULL, class=INTERNET*/ /* Regress: defcon2008-dns2.pcap(100803): name=Vaaaaiaqaac.tunnel.fastcoder.net */ /* I'm not sure what this is, other than passing data as Null records. * This would be a good thing for an intrusion-detection system to trigger * on. */ break; case TYPECLASS(12,0x8001): /*type=PTR, class=INTERNET */ bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); break; case TYPECLASS(12,1): /*type=PTR(pointer reverse lookup), class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } if (name_length > 6 && memcmp(name+name_length-6, ".local", 6) == 0) { JOTDOWN(ferret, JOT_SRC("ID-IP", frame), JOT_PRINT("Service", name,name_length), 0); /* Extract MAC address */ { const unsigned char *p_name; unsigned name_length; const unsigned char *p_mac = find_mac(px, MIN(length, rec->rdata_offset+rec->rdata_length), rec->rdata_offset, &p_name, &name_length); if (p_mac) { JOTDOWN(ferret, JOT_SRC("ID-IP", frame), JOT_PRINT("mac", p_mac, 19), 0); JOTDOWN(ferret, JOT_SRC("ID-IP", frame), JOT_PRINT("name", p_name, name_length), 0); } } } else if (endsWith(name, ".in-addr.arpa")) { /* Extract a 4-byte IPv4 address * Example: "18.0.0.10.in-addr.arpa"*/ unsigned ipv4=0; unsigned i; unsigned j=0; for (i=0; i<4; i++) { unsigned num = 0; for (; name[j] && name[j] != '.'; j++) { if ('0' <= name[j] && name[j] <= '9') num = num * 10 + name[j]-'0'; } while (name[j] == '.') j++; ipv4 |= num<<(i*8); } /* Now get the name it points to */ name2_length = dns_extract_name(frame, px, length, offset, name2, sizeof(name2)); JOTDOWN(ferret, JOT_PRINT("ID-DNS", name2, name2_length), JOT_IPv4("ID-IP", ipv4), JOT_SRC("dnssrv", frame), 0); } else ; //FRAMERR(frame, "dns: unknown PTR record\n"); break; case TYPECLASS(13,0x8001): /*type=HINFO, class=INTERNET */ bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); break; case TYPECLASS(15,1): /*type=MX, class=INTERNET */ /* Regress: defcon2008-dns2.pcap(18661) */ break; case TYPECLASS(16,0x8001): /*type=TXT, class=INTERNET(cache flush)*/ bonjour_parse_resource_record(ferret, frame, px, length, rec, dns); break; case TYPECLASS(16,1): /*type=TXT, class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, 5, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } if (stricmp(name, "current.cvd.clamav.net") == 0) { /* This is a single string containing a version string, like: * 0.91.1:44:3855:1186270141:1 */ break; } else if (starts_with("_DM-NOTIFICATION.", name, strlen(name))) { /* Regress: defcon2008\dump001.pcap(87082) */ /* TODO */ break; } else if (endsWith(name, "._workstation._tcp.local")) { /* Regress: defcon2008-dns2.pcap(56127): "mike-desktop [00:0c:29:f6:58:ca]._workstation._tcp.local" */ break; } else if (endsWith(name, ".asn.cymru.com")) { /* Regress: defcon2008-dns2.pcap(98958) */ /* This is a system for mapping IP to ASN numbers: * http://www.team-cymru.org/Services/ip-to-asn.html */ break; } else if (endsWith(name, ".wrs.trendmicro.com")) { /* Regress: defcon2008-dns2.pcap(184904) */ /* Appears to check whether IP addresses are trustworthy */ break; } else { FRAMERR(frame, "%s: unknown TXT record %s", "DNS", name); } break; case TYPECLASS(0x1c,1): /*type=AAAA(IPv6 address), class=INTERNET*/ case TYPECLASS(0x1c,255): /*type=AAAA(IPv6 address), class=INTERNET*/ if (!is_valid_opcode(dns->opcode, 0x10, 5, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } switch (dns->opcode) { case 0x10: { const unsigned char *ipv6_address = px+rec->rdata_offset; if (rec->rdata_length != 16) FRAMERR(frame, "dns: data not 16-bytes long, was %d-bytes instead (class=%d, type=%d, name=%s)\n", rec->rdata_length, rec->clss, rec->type, name); JOTDOWN(ferret, JOT_SZ("proto","DNS"), JOT_SZ("op","lookup"), JOT_SRC("ip.src", frame), JOT_PRINT("name", name, name_length), JOT_IPv6("address", ipv6_address, 16), 0); } case 5: /* dynamic update*/ /* Regress: defcon2008-dns2.pcap(7958) */ break; default: FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); } break; case TYPECLASS(33,1): /*type=SRV, class=INTERNET */ if (!is_valid_opcode(dns->opcode, 0x10, -1)) { FRAMERR(frame, "%s: unknown opcode=%d\n", "DNS", dns->opcode); return; } if (rec->rdata_length < 7) FRAMERR(frame, "dns: unknown type=%d (class=%d, name=%s)\n", rec->type, rec->clss, name); else { unsigned port = px[rec->rdata_offset+4]<<8 | px[rec->rdata_offset+5]; name2_length = dns_extract_name(frame, px, length, rec->rdata_offset+6, name2, sizeof(name2)); ip_address = dns_resolve_alias(frame, px, length, dns, name2, 0); if (ip_address != 0) { JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_PRINT("Server", name2, name2_length), JOT_NUM("Port", port), JOT_IPv4("IPv4",ip_address), 0); } else JOTDOWN(ferret, JOT_PRINT("ID-DNS", name, name_length), JOT_PRINT("Server", name2, name2_length), JOT_NUM("Port", port), 0); } break; default: FRAMERR(frame, "dns: unknown type=%d (class=%d, name=%s)\n", rec->type, rec->clss, name); } }
/** * Parse the "rendez-vous" TLV within a packet. Since this is a TLV, it has * already been reassembled by our string frag parser. */ static void parse_message_filexfer_rendezvous(struct TCPRECORD *sess, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned offset=0; /* skip some fields */ offset += 2+8; /* verify we have the file transfer ID */ while (offset < 2+8+16) { if (px[offset] != (unsigned char)("\x09\x46\x13\x43\x4c\x7f\x11\xd1\x82\x22\x44\x45\x53\x54\x00\x00"[offset-8-2])) return; /* not a file transfer command */ /*TODO: SAMPLE this */ offset++; } /* go through the embeded TLVs */ while (offset<length) { unsigned tag; unsigned len; if (offset+4>length) break; tag = ex16be(px+offset+0); len = ex16be(px+offset+2); offset += 4; /* TLV: Unknown Value ID: Unknown (0x000a) Length: 2 Value TLV: Unknown Value ID: Unknown (0x000f) Length: 0 Value TLV: Internal IP Value ID: Internal IP (0x0003) Length: 4 Value: 12625930 TLV: External Port Value ID: External Port (0x0005) Length: 2 Value: 5190 TLV: Extended Data Value ID: Extended Data (0x2711) Length: 17 Value */ switch (tag) { case 0x000a: case 0x000f: case 0x0010: break; case 3: /* Internet IP */ { unsigned j; unsigned ip=0; for (j=0; j<4 && offset+j<length; j++) ip = ip << 8 | px[offset+j]; JOTDOWN(sess->eng->ferret, JOT_SRC("ID-IP",frame), JOT_SZ("AIM", "File-Transfer"), JOT_IPv4("Internal-IP", ip), 0); } break; case 5: /* Internal Port */ { unsigned j; unsigned port=0; for (j=0; j<2 && offset+j<length; j++) port = port << 8 | px[offset+j]; JOTDOWN(sess->eng->ferret, JOT_SRC("ID-IP",frame), JOT_SZ("AIM", "File-Transfer"), JOT_NUM("Internal-Port", port), 0); } break; case 0x2711: /* filename */ if (len > length-offset) len = length-offset; if (len > 4) { len -= 4; offset += 4; } while (offset < length && len && px[offset] < 26) { offset++; len--; } JOTDOWN(sess->eng->ferret, JOT_SRC("ID-IP",frame), JOT_SZ("AIM", "File-Transfer"), JOT_PRINT("Filename", px+offset, len), 0); break; default: /* TODO: SAMPLE this */ FRAMERR(frame, "%s: unknown\n", "AIM"); break; } offset += len; } }
/* * Cisco Discovery Protocol */ static void parse_CDP(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned offset=0; unsigned version; //unsigned ttl; //unsigned checksum; if (offset+4 > length) { FRAMERR(frame, "%s: truncated\n", "cisco"); return; } frame->layer3_protocol = LAYER3_MGMT; version = px[offset++]; //ttl = px[offset++]; //checksum = ex16be(px+2); offset += 2; SAMPLE(ferret,"Cisco Discovery Protocol", JOT_NUM("version",version)); while (offset < length) { unsigned tag; unsigned len; unsigned i; if (offset+4 > length) { FRAMERR(frame, "%s: truncated\n", "cisco"); return; } tag = ex16be(px+offset); len = ex16be(px+offset+2); offset += 4; if (len < 4) { FRAMERR(frame, "%s: bad value: 0x%x\n", "cdp", tag); return; } else len -= 4; if (len > length-offset) len = length-offset; SAMPLE(ferret,"Cisco Discovery Protocol", JOT_NUM("tag", tag)); switch (tag) { case 0x0000: return; case 0x0001: /* Device ID */ JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_PRINT("Cisco Device ID", px+offset,len), 0); break; case 0x0002: /* Addresses */ if (len < 4) { FRAMERR(frame, "%s: truncated\n", "cdp"); break; } i=0; { unsigned address_count = ex32be(px+offset); i += 4; while (address_count && i<len) { unsigned protocol_type; unsigned protocol_length; unsigned protocol = 0; unsigned address_length; if (i-len < 5) break; address_count--; protocol_type = px[offset+i++]; protocol_length = px[offset+i++]; if (protocol_length != 1) FRAMERR(frame, "%s: unknown value: 0x%x\n", "cdp", protocol_length); while (protocol_length && i<len) { protocol <<= 8; protocol |= px[offset+i++]; protocol_length--; } address_length = ex16be(px+offset+i); i+= 2; switch (protocol_type) { case 1: switch (protocol) { case 0xCC: /*IPv4 address */ if (address_length != 4) FRAMERR(frame, "%s: unknown value: 0x%x\n", "cdp", address_length); else if (len-i < 4) FRAMERR(frame, "%s: truncated\n", "cdp"); else { unsigned ip = ex32be(px+offset+i); JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_IPv4("ip", ip), 0); JOTDOWN(ferret, JOT_IPv4("ID-IP", ip), JOT_MACADDR("mac", frame->src_mac), 0); } break; default: SAMPLE(ferret,"CDP", JOT_NUM("ip-protocol-type", protocol)); FRAMERR(frame, "%s: unknown value: 0x%x\n", "cdp", protocol); } break; default: SAMPLE(ferret,"CDP", JOT_NUM("address-protocol-type", protocol_type)); FRAMERR(frame, "%s: unknown value: 0x%x\n", "cdp", protocol_type); break; } } } break; case 0x0003: /* Port ID*/ JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_PRINT("Cisco Port ID", px+offset,len), 0); break; case 0x0004: { unsigned n = 0; for (i=0; i<len; i++) { n <<= 8; n |= px[offset + i]; } if (n & 0x00000001) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "router"), 0); if (n & 0x00000002) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "bridge"), 0); if (n & 0x00000004) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "source route bridge"), 0); if (n & 0x00000008) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "switch"), 0); if (n & 0x00000010) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "host"), 0); if (n & 0x00000020) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "IGMP"), 0); if (n & 0x00000040) JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Capabilities", "repeater"), 0); } break; case 0x0005: /* IOS Version */ for (i=0; i<len; i++) if (!isspace(px[offset+i])) break; JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_PRINT("IOS Version", px+offset+i,len-i), 0); break; case 0x0006: /* Platform*/ JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_PRINT("Cisco Platform", px+offset,len), 0); break; case 0x0008: /* Hello: cluster mgmt */ break; case 0x0009: /* VTP mgmnt domain */ JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_PRINT("VTP Mgmt Domain", px+offset,len), 0); break; case 0x000a: /* Native VLAN */ break; case 0x000b: /* Duplex */ break; case 0x0012: /* Trust Bitmap */ break; case 0x0013: /* Untrusted Port CoS */ break; case 0x0016: /* Management Addresses */ /* TODO: decode the management addresses */ break; default: FRAMERR(frame, "%s: unknown value: 0x%x\n", "cdp", tag); } offset += len; } }
void parse_PVSTP(struct Ferret *ferret, struct NetFrame *frame, const unsigned char *px, unsigned length) { unsigned port_id; if (length < 4) { FRAMERR(frame, "truncated\n"); return; } /* Protocol Identifier */ if (ex16be(px+0) != 0) { FRAMERR(frame, "unexpected\n"); return; } frame->layer3_protocol = LAYER3_STP; /* Protocol Version Identifier */ if (px[2] != 0) { FRAMERR(frame, "unexpected\n"); return; } /* BPDU type */ switch (px[3]) { case 0: if (length < 28) { FRAMERR(frame, "truncated\n"); return; } JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Type", "bridge"), JOT_MACADDR("root", px+7), 0); JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Type", "bridge"), JOT_MACADDR("ID", px+19), 0); port_id = ex16be(px+25); JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Type", "bridge"), JOT_NUM("port-id", port_id), 0); break; case 0x80: JOTDOWN(ferret, JOT_MACADDR("ID-MAC", frame->src_mac), JOT_SZ("Type", "bridge"), 0); break; default: FRAMERR(frame, "unexpected\n"); return; } }