Fix the comment at the beginning of the routine to give the right file
name, and add the RFC number for ISAKMP to it.
Fix the structures for headers to treat all multi-byte quantities as
arrays of bytes; the certificate request header needs to be done that
way, so that it's *not* padded to a multiple of the size of the longest
integral element (the longest integral element is 2 bytes, but the size
of the header is 5 bytes, so certificate requests were being
misdissected), and other structures might require this as well - it also
catches code that doesn't use "pntohl()" or "pntohs()" to get the values
of integral fields bigger than 1 byte.
In fact, it *did* catch some; the configuration attribute header's
"identifier" field was being used without being put in host byte order.
In addition, that field required padding to be aligned on its natural
boundary, but the padding wasn't given as a structure member; given that
the length field was specified as one byte but extracted with
"pntohs()", and that the length field is 2 bytes in the other headers,
it probably should be 2 bytes in this header as well - make it so.
svn path=/trunk/; revision=2101
2000-07-02 03:25:48 +00:00
/* packet-isakmp.c
* Routines for the Internet Security Association and Key Management Protocol
2001-10-25 23:40:28 +00:00
* ( ISAKMP ) ( RFC 2408 ) and the Internet IP Security Domain of Interpretation
* for ISAKMP ( RFC 2407 )
1999-06-11 15:30:55 +00:00
* Brad Robel - Forrest < brad . robel - forrest @ watchguard . com >
*
2005-03-15 09:58:58 +00:00
* Added routines for the Internet Key Exchange ( IKEv2 ) Protocol
* ( draft - ietf - ipsec - ikev2 - 17. txt )
* Shoichi Sakane < sakane @ tanu . org >
*
2005-12-22 21:28:51 +00:00
* Added routines for RFC3947 Negotiation of NAT - Traversal in the IKE
* ronnie sahlberg
*
2004-07-18 00:24:25 +00:00
* $ Id $
1999-06-11 15:30:55 +00:00
*
2006-05-21 04:49:01 +00:00
* Wireshark - Network traffic analyzer
* By Gerald Combs < gerald @ wireshark . org >
1999-06-11 15:30:55 +00:00
* Copyright 1998 Gerald Combs
2002-08-28 21:04:11 +00:00
*
1999-06-11 15:30:55 +00:00
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation ; either version 2
* of the License , or ( at your option ) any later version .
2002-08-28 21:04:11 +00:00
*
1999-06-11 15:30:55 +00:00
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
2002-08-28 21:04:11 +00:00
*
1999-06-11 15:30:55 +00:00
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place - Suite 330 , Boston , MA 02111 - 1307 , USA .
2006-12-06 22:03:45 +00:00
*
* References :
* IKEv2 http : //www.ietf.org/rfc/rfc4306.txt?number=4306
* http : //www.iana.org/assignments/ikev2-parameters
1999-06-11 15:30:55 +00:00
*/
# ifdef HAVE_CONFIG_H
# include "config.h"
# endif
# include <stdio.h>
2001-08-31 19:47:10 +00:00
# include <string.h>
1999-07-13 02:53:26 +00:00
1999-06-11 15:30:55 +00:00
# include <glib.h>
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
# ifdef _WIN32
# include <hmac.h>
# include <des.h>
# include <cbc.h>
# else
# include <nettle/hmac.h>
# include <nettle/des.h>
# include <nettle/cbc.h>
# endif
# include <epan/strutil.h>
# endif
2002-01-21 07:37:49 +00:00
# include <epan/packet.h>
2004-09-29 00:52:45 +00:00
# include <epan/ipproto.h>
2007-05-13 20:58:29 +00:00
# include <epan/asn1.h>
2004-09-21 07:47:14 +00:00
# include <epan/dissectors/packet-x509if.h>
2005-06-16 06:19:03 +00:00
# include <epan/dissectors/packet-isakmp.h>
2006-02-09 17:32:14 +00:00
# include <epan/prefs.h>
2000-08-11 13:37:21 +00:00
2002-08-20 18:20:11 +00:00
# define isakmp_min(a, b) ((a<b) ? a : b)
2005-03-15 09:58:58 +00:00
# define ARLEN(a) (sizeof(a) / sizeof(a[0]))
1999-07-29 05:47:07 +00:00
static int proto_isakmp = - 1 ;
2005-07-14 08:10:30 +00:00
static int hf_ike_certificate_authority = - 1 ;
static int hf_ike_v2_certificate_authority = - 1 ;
2005-07-20 07:51:24 +00:00
static int hf_ike_nat_keepalive = - 1 ;
1999-07-29 05:47:07 +00:00
2006-02-09 17:32:14 +00:00
static int hf_isakmp_icookie = - 1 ;
static int hf_isakmp_rcookie = - 1 ;
static int hf_isakmp_nextpayload = - 1 ;
static int hf_isakmp_version = - 1 ;
static int hf_isakmp_exchangetype = - 1 ;
static int hf_isakmp_flags = - 1 ;
static int hf_isakmp_messageid = - 1 ;
static int hf_isakmp_length = - 1 ;
static int hf_isakmp_payloadlen = - 1 ;
static int hf_isakmp_doi = - 1 ;
static int hf_isakmp_sa_situation = - 1 ;
static int hf_isakmp_prop_number = - 1 ;
static int hf_isakmp_spisize = - 1 ;
static int hf_isakmp_prop_transforms = - 1 ;
static int hf_isakmp_trans_number = - 1 ;
static int hf_isakmp_trans_id = - 1 ;
static int hf_isakmp_id_type = - 1 ;
static int hf_isakmp_protoid = - 1 ;
static int hf_isakmp_id_port = - 1 ;
static int hf_isakmp_cert_encoding = - 1 ;
static int hf_isakmp_certreq_type = - 1 ;
static int hf_isakmp_notify_msgtype = - 1 ;
static int hf_isakmp_num_spis = - 1 ;
1999-11-16 11:44:20 +00:00
static gint ett_isakmp = - 1 ;
static gint ett_isakmp_flags = - 1 ;
static gint ett_isakmp_payload = - 1 ;
2006-12-07 20:34:08 +00:00
static dissector_handle_t eap_handle = NULL ;
2006-12-06 22:03:45 +00:00
2005-10-12 05:36:44 +00:00
/* IKE port number assigned by IANA */
2000-04-08 07:07:42 +00:00
# define UDP_PORT_ISAKMP 500
2001-08-30 02:23:17 +00:00
# define TCP_PORT_ISAKMP 500
2000-04-08 07:07:42 +00:00
2005-10-12 05:36:44 +00:00
/*
2006-02-09 17:32:14 +00:00
* Identifier Type
2005-10-12 05:36:44 +00:00
* RFC2407 for IKEv1
* draft - ietf - ipsec - ikev2 - 17. txt for IKEv2
*/
# define IKE_ID_IPV4_ADDR 1
# define IKE_ID_FQDN 2
# define IKE_ID_USER_FQDN 3
# define IKE_ID_IPV4_ADDR_SUBNET 4
# define IKE_ID_IPV6_ADDR 5
# define IKE_ID_IPV6_ADDR_SUBNET 6
# define IKE_ID_IPV4_ADDR_RANGE 7
# define IKE_ID_IPV6_ADDR_RANGE 8
# define IKE_ID_DER_ASN1_DN 9
# define IKE_ID_DER_ASN1_GN 10
# define IKE_ID_KEY_ID 11
/*
* Traffic Selector Type
* Not in use for IKEv1
*/
# define IKEV2_TS_IPV4_ADDR_RANGE 7
# define IKEV2_TS_IPV6_ADDR_RANGE 8
2005-03-15 09:58:58 +00:00
static const value_string vs_proto [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " ISAKMP " } ,
{ 2 , " IPSEC_AH " } ,
{ 3 , " IPSEC_ESP " } ,
{ 4 , " IPCOMP " } ,
{ 0 , NULL } ,
2002-08-20 18:20:11 +00:00
} ;
2006-02-09 17:32:14 +00:00
# define COOKIE_SIZE 8
typedef struct isakmp_hdr {
1999-06-11 15:30:55 +00:00
guint8 next_payload ;
guint8 version ;
guint8 exch_type ;
guint8 flags ;
# define E_FLAG 0x01
# define C_FLAG 0x02
# define A_FLAG 0x04
2005-03-15 09:58:58 +00:00
# define I_FLAG 0x08
# define V_FLAG 0x10
# define R_FLAG 0x20
2002-08-18 19:19:46 +00:00
guint32 message_id ;
guint32 length ;
2006-02-09 17:32:14 +00:00
} isakmp_hdr_t ;
# define ISAKMP_HDR_SIZE (sizeof(struct isakmp_hdr) + (2 * COOKIE_SIZE))
# define ENC_DES_CBC 1
# define ENC_IDEA_CBC 2
# define ENC_BLOWFISH_CBC 3
# define ENC_RC5_R16_B64_CBC 4
# define ENC_3DES_CBC 5
# define ENC_CAST_CBC 6
# define ENC_AES_CBC 7
# define HMAC_MD5 1
# define HMAC_SHA 2
# define HMAC_TIGER 3
# define HMAC_SHA2_256 4
# define HMAC_SHA2_384 5
# define HMAC_SHA2_512 6
# ifdef HAVE_LIBNETTLE
# define MAIN_MODE 2
# define AGGRESSIVE_MODE 4
# define MAX_KEY_SIZE 256
# define MAX_DIGEST_SIZE 64
# define MAX_OAKLEY_KEY_LEN 32
typedef struct decrypt_key {
guchar secret [ MAX_KEY_SIZE ] ;
guint secret_len ;
} decrypt_key_t ;
typedef struct iv_data {
guchar iv [ MAX_DIGEST_SIZE ] ;
guint iv_len ;
guint32 frame_num ;
} iv_data_t ;
typedef struct decrypt_data {
gboolean is_psk ;
address initiator ;
guint encr_alg ;
guint hash_alg ;
guint group ;
gchar * gi ;
guint gi_len ;
gchar * gr ;
guint gr_len ;
guchar secret [ MAX_KEY_SIZE ] ;
guint secret_len ;
GList * iv_list ;
gchar last_cbc [ MAX_DIGEST_SIZE ] ;
guint last_cbc_len ;
gchar last_p1_cbc [ MAX_DIGEST_SIZE ] ;
guint last_p1_cbc_len ;
guint32 last_message_id ;
} decrypt_data_t ;
static GHashTable * isakmp_hash = NULL ;
static GMemChunk * isakmp_key_data = NULL ;
static GMemChunk * isakmp_decrypt_data = NULL ;
static FILE * logf = NULL ;
static const char * pluto_log_path = " insert pluto log path here " ;
static void
scan_pluto_log ( void ) {
# define MAX_PLUTO_LINE 500
decrypt_data_t * decr ;
gchar line [ MAX_PLUTO_LINE ] ;
guint8 i_cookie [ COOKIE_SIZE ] , * ic_key ;
gboolean got_cookie = FALSE ;
guchar secret [ MAX_KEY_SIZE ] ;
guint secret_len = 0 ;
gchar * icookie_pfx = " | ICOOKIE: " ;
gchar * enc_key_pfx = " | enc key: " ;
gchar * pos , * endpos ;
gint icpfx_len = strlen ( icookie_pfx ) ;
gint ec_len = strlen ( enc_key_pfx ) ;
gint i ;
address null_addr ;
unsigned long hexval ;
SET_ADDRESS ( & null_addr , AT_NONE , 0 , NULL ) ;
if ( logf ) {
while ( fgets ( line , MAX_PLUTO_LINE , logf ) ) {
if ( strncmp ( line , icookie_pfx , icpfx_len ) = = 0 ) {
secret_len = 0 ;
pos = line + icpfx_len ;
for ( i = 0 ; i < COOKIE_SIZE ; i + + ) {
hexval = strtoul ( pos , & endpos , 16 ) ;
if ( endpos = = pos )
break ;
i_cookie [ i ] = ( guint8 ) hexval ;
pos = endpos ;
}
if ( i = = COOKIE_SIZE )
got_cookie = TRUE ;
} else if ( strncmp ( line , enc_key_pfx , ec_len ) = = 0 ) {
pos = line + ec_len ;
for ( ; secret_len < MAX_KEY_SIZE ; secret_len + + ) {
hexval = strtoul ( pos , & endpos , 16 ) ;
if ( endpos = = pos )
break ;
secret [ secret_len ] = ( guint8 ) hexval ;
pos = endpos ;
}
} else if ( got_cookie & & secret_len > 1 ) {
decr = ( decrypt_data_t * ) g_hash_table_lookup ( isakmp_hash , i_cookie ) ;
if ( ! decr ) {
ic_key = g_mem_chunk_alloc ( isakmp_key_data ) ;
memcpy ( ic_key , i_cookie , COOKIE_SIZE ) ;
decr = g_mem_chunk_alloc ( isakmp_decrypt_data ) ;
memset ( decr , 0 , sizeof ( decrypt_data_t ) ) ;
g_hash_table_insert ( isakmp_hash , ic_key , decr ) ;
}
memcpy ( decr - > secret , secret , secret_len ) ;
decr - > secret_len = secret_len ;
}
}
}
}
static void
set_transform_vals ( decrypt_data_t * decr , int ike_p1 , guint16 type , guint32 val ) {
if ( ! ike_p1 )
return ;
if ( decr ! = NULL ) {
switch ( type ) {
case 1 :
decr - > encr_alg = val ;
break ;
case 2 :
decr - > hash_alg = val ;
break ;
case 3 :
if ( val = = 1 )
decr - > is_psk = TRUE ;
break ;
case 4 :
decr - > group = val ;
break ;
}
}
}
static tvbuff_t *
decrypt_payload ( proto_tree * tree , tvbuff_t * tvb , packet_info * pinfo , const guint8 * buf , guint buf_len , isakmp_hdr_t * hdr ) {
decrypt_data_t * decr = ( decrypt_data_t * ) pinfo - > private_data ;
gchar * decrypted_data = NULL ;
struct md5_ctx m_ctx ;
struct sha1_ctx s_ctx ;
struct des3_ctx d3_ctx ;
struct des_ctx d_ctx ;
tvbuff_t * encr_tvb ;
iv_data_t * ivd = NULL ;
GList * ivl ;
guchar iv [ MAX_DIGEST_SIZE ] ;
guint iv_len = 0 ;
guint32 message_id , cbc_block_size , digest_size ;
if ( ! decr | |
decr - > is_psk = = FALSE | |
decr - > gi_len = = 0 | |
decr - > gr_len = = 0 )
return NULL ;
switch ( decr - > encr_alg ) {
case ENC_3DES_CBC :
if ( decr - > secret_len < DES3_KEY_SIZE ) return NULL ;
cbc_block_size = DES_BLOCK_SIZE ;
break ;
case ENC_DES_CBC :
if ( decr - > secret_len < DES_KEY_SIZE ) return NULL ;
cbc_block_size = DES_BLOCK_SIZE ;
break ;
default :
return NULL ;
break ;
}
switch ( decr - > hash_alg ) {
case HMAC_MD5 :
digest_size = MD5_DIGEST_SIZE ;
break ;
case HMAC_SHA :
digest_size = SHA1_DIGEST_SIZE ;
break ;
default :
return NULL ;
break ;
}
for ( ivl = g_list_first ( decr - > iv_list ) ; ivl ! = NULL ; ivl = g_list_next ( ivl ) ) {
ivd = ( iv_data_t * ) ivl - > data ;
if ( ivd - > frame_num = = pinfo - > fd - > num ) {
iv_len = ivd - > iv_len ;
memcpy ( iv , ivd - > iv , iv_len ) ;
}
}
/*
* Set our initialization vector as follows :
* - If the IV list is empty , assume we have the first packet in a phase 1
* exchange . The IV is built from DH values .
* - If our message ID changes , assume we ' re entering a new mode . The IV
* is built from the message ID and the last phase 1 CBC .
* - Otherwise , use the last CBC .
*/
if ( iv_len = = 0 ) {
if ( decr - > iv_list = = NULL ) {
/* First packet */
ivd = g_malloc ( sizeof ( iv_data_t ) ) ;
ivd - > frame_num = pinfo - > fd - > num ;
ivd - > iv_len = digest_size ;
decr - > last_message_id = hdr - > message_id ;
if ( decr - > hash_alg = = HMAC_MD5 ) {
md5_init ( & m_ctx ) ;
md5_update ( & m_ctx , decr - > gi_len , decr - > gi ) ;
md5_update ( & m_ctx , decr - > gr_len , decr - > gr ) ;
md5_digest ( & m_ctx , MD5_DIGEST_SIZE , ivd - > iv ) ;
} else {
sha1_init ( & s_ctx ) ;
sha1_update ( & s_ctx , decr - > gi_len , decr - > gi ) ;
sha1_update ( & s_ctx , decr - > gr_len , decr - > gr ) ;
sha1_digest ( & s_ctx , SHA1_DIGEST_SIZE , ivd - > iv ) ;
}
decr - > iv_list = g_list_append ( decr - > iv_list , ivd ) ;
iv_len = ivd - > iv_len ;
memcpy ( iv , ivd - > iv , iv_len ) ;
} else if ( decr - > last_cbc_len > = cbc_block_size ) {
ivd = g_malloc ( sizeof ( iv_data_t ) ) ;
ivd - > frame_num = pinfo - > fd - > num ;
if ( hdr - > message_id ! = decr - > last_message_id ) {
if ( decr - > last_p1_cbc_len = = 0 ) {
memcpy ( decr - > last_p1_cbc , decr - > last_cbc , cbc_block_size ) ;
decr - > last_p1_cbc_len = cbc_block_size ;
}
ivd - > iv_len = digest_size ;
decr - > last_message_id = hdr - > message_id ;
message_id = g_htonl ( decr - > last_message_id ) ;
if ( decr - > hash_alg = = HMAC_MD5 ) {
md5_init ( & m_ctx ) ;
md5_update ( & m_ctx , cbc_block_size , decr - > last_p1_cbc ) ;
md5_update ( & m_ctx , sizeof ( message_id ) , ( unsigned char * ) & message_id ) ;
md5_digest ( & m_ctx , MD5_DIGEST_SIZE , ivd - > iv ) ;
} else {
sha1_init ( & s_ctx ) ;
sha1_update ( & s_ctx , cbc_block_size , decr - > last_p1_cbc ) ;
sha1_update ( & s_ctx , sizeof ( message_id ) , ( unsigned char * ) & message_id ) ;
sha1_digest ( & s_ctx , SHA1_DIGEST_SIZE , ivd - > iv ) ;
}
} else {
ivd - > iv_len = cbc_block_size ;
memcpy ( ivd - > iv , decr - > last_cbc , ivd - > iv_len ) ;
}
decr - > iv_list = g_list_append ( decr - > iv_list , ivd ) ;
iv_len = ivd - > iv_len ;
memcpy ( iv , ivd - > iv , iv_len ) ;
}
}
if ( ivd = = NULL ) return NULL ;
decrypted_data = g_malloc ( buf_len ) ;
if ( decr - > encr_alg = ENC_3DES_CBC ) {
des_fix_parity ( decr - > secret_len , decr - > secret , decr - > secret ) ;
des3_set_key ( & d3_ctx , decr - > secret ) ;
cbc_decrypt ( & d3_ctx , des3_decrypt , DES_BLOCK_SIZE , iv ,
buf_len , decrypted_data , buf ) ;
} else {
des_fix_parity ( decr - > secret_len , decr - > secret , decr - > secret ) ;
des_set_key ( & d_ctx , decr - > secret ) ;
cbc_decrypt ( & d_ctx , des_decrypt , DES_BLOCK_SIZE , iv ,
buf_len , decrypted_data , buf ) ;
}
encr_tvb = tvb_new_real_data ( decrypted_data , buf_len , buf_len ) ;
tvb_set_child_real_data_tvbuff ( tvb , encr_tvb ) ;
/* Add the decrypted data to the data source list. */
add_new_data_source ( pinfo , encr_tvb , " Decrypted IKE " ) ;
/* Fill in the next IV */
if ( tvb_length ( tvb ) > cbc_block_size ) {
decr - > last_cbc_len = cbc_block_size ;
memcpy ( decr - > last_cbc , iv , cbc_block_size ) ;
} else {
decr - > last_cbc_len = 0 ;
}
return encr_tvb ;
}
# endif /* HAVE_LIBNETTLE */
1999-06-11 15:30:55 +00:00
2005-06-16 06:19:03 +00:00
static proto_tree * dissect_payload_header ( tvbuff_t * , int , int , int , guint8 ,
2001-02-28 10:22:29 +00:00
guint8 * , guint16 * , proto_tree * ) ;
2004-09-21 07:47:14 +00:00
static void dissect_sa ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_proposal ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_transform ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
static void dissect_transform2 ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_key_exch ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_id ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_cert ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-07-14 08:10:30 +00:00
static void dissect_certreq_v1 ( tvbuff_t * , int , int , proto_tree * ,
packet_info * , int , int ) ;
static void dissect_certreq_v2 ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_hash ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
static void dissect_auth ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_sig ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_nonce ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_notif ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_delete ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_vid ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_config ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_nat_discovery ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2004-09-21 07:47:14 +00:00
static void dissect_nat_original_address ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
static void dissect_ts ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
static void dissect_enc ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
static void dissect_eap ( tvbuff_t * , int , int , proto_tree * ,
2005-06-16 06:19:03 +00:00
packet_info * , int , int ) ;
2005-05-27 08:53:07 +00:00
static void
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvbuff_t * tvb , proto_tree * tree , int isakmp_version ,
guint8 initial_payload , int offset , int length ,
packet_info * pinfo ) ;
2005-05-27 08:53:07 +00:00
1999-06-11 15:30:55 +00:00
2005-06-16 06:19:03 +00:00
static const char * payloadtype2str ( int , guint8 ) ;
static const char * exchtype2str ( int , guint8 ) ;
1999-06-11 15:30:55 +00:00
static const char * doitype2str ( guint32 ) ;
2005-06-16 06:19:03 +00:00
static const char * msgtype2str ( int , guint16 ) ;
1999-06-11 15:30:55 +00:00
static const char * situation2str ( guint32 ) ;
2005-03-15 09:58:58 +00:00
static const char * v1_attrval2str ( int , guint16 , guint32 ) ;
static const char * v2_attrval2str ( guint16 , guint32 ) ;
2005-06-16 06:19:03 +00:00
static const char * cfgtype2str ( int , guint8 ) ;
static const char * cfgattr2str ( int , guint16 ) ;
static const char * id2str ( int , guint8 ) ;
2005-03-15 09:58:58 +00:00
static const char * v2_tstype2str ( guint8 ) ;
static const char * v2_auth2str ( guint8 ) ;
2005-06-16 06:19:03 +00:00
static const char * certtype2str ( int , guint8 ) ;
2001-02-28 10:22:29 +00:00
static gboolean get_num ( tvbuff_t * , int , guint16 , guint32 * ) ;
2001-10-25 23:40:28 +00:00
# define LOAD_TYPE_NONE 0 /* payload type for None */
2001-02-28 10:22:29 +00:00
# define LOAD_TYPE_PROPOSAL 2 /* payload type for Proposal */
# define LOAD_TYPE_TRANSFORM 3 /* payload type for Transform */
1999-06-11 15:30:55 +00:00
2005-03-15 09:58:58 +00:00
struct payload_func {
2005-03-20 12:07:00 +00:00
guint8 type ;
1999-06-11 15:30:55 +00:00
const char * str ;
2005-06-16 06:19:03 +00:00
void ( * func ) ( tvbuff_t * , int , int , proto_tree * , packet_info * , int , int ) ;
2005-03-15 09:58:58 +00:00
} ;
static struct payload_func v1_plfunc [ ] = {
{ 0 , " NONE " , NULL } ,
{ 1 , " Security Association " , dissect_sa } ,
{ 2 , " Proposal " , dissect_proposal } ,
{ 3 , " Transform " , dissect_transform } ,
{ 4 , " Key Exchange " , dissect_key_exch } ,
{ 5 , " Identification " , dissect_id } ,
{ 6 , " Certificate " , dissect_cert } ,
2005-07-14 08:10:30 +00:00
{ 7 , " Certificate Request " , dissect_certreq_v1 } ,
2005-03-15 09:58:58 +00:00
{ 8 , " Hash " , dissect_hash } ,
{ 9 , " Signature " , dissect_sig } ,
{ 10 , " Nonce " , dissect_nonce } ,
{ 11 , " Notification " , dissect_notif } ,
{ 12 , " Delete " , dissect_delete } ,
{ 13 , " Vendor ID " , dissect_vid } ,
{ 14 , " Attrib " , dissect_config } ,
{ 15 , " NAT-Discovery " , dissect_nat_discovery } , /* draft-ietf-ipsec-nat-t-ike-04 */
{ 16 , " NAT-Original Address " , dissect_nat_original_address } , /* draft-ietf-ipsec-nat-t-ike */
2005-12-22 21:28:51 +00:00
{ 20 , " NAT-D (RFC 3947) " , dissect_nat_discovery } ,
{ 21 , " NAT-OA (RFC 3947) " , dissect_nat_original_address } ,
2005-03-21 02:00:14 +00:00
{ 130 , " NAT-D (draft-ietf-ipsec-nat-t-ike-01 to 03) " , dissect_nat_discovery } ,
{ 131 , " NAT-OA (draft-ietf-ipsec-nat-t-ike-01 to 04) " , dissect_nat_original_address } ,
2005-03-15 09:58:58 +00:00
} ;
static struct payload_func v2_plfunc [ ] = {
2006-08-15 18:16:56 +00:00
{ 0 , " NONE " , NULL } ,
2005-03-15 09:58:58 +00:00
{ 2 , " Proposal " , dissect_proposal } ,
{ 3 , " Transform " , dissect_transform2 } ,
{ 33 , " Security Association " , dissect_sa } ,
{ 34 , " Key Exchange " , dissect_key_exch } ,
{ 35 , " Identification - I " , dissect_id } ,
{ 36 , " Identification - R " , dissect_id } ,
{ 37 , " Certificate " , dissect_cert } ,
2005-07-14 08:10:30 +00:00
{ 38 , " Certificate Request " , dissect_certreq_v2 } ,
2005-03-15 09:58:58 +00:00
{ 39 , " Authentication " , dissect_auth } ,
{ 40 , " Nonce " , dissect_nonce } ,
{ 41 , " Notification " , dissect_notif } ,
{ 42 , " Delete " , dissect_delete } ,
{ 43 , " Vendor ID " , dissect_vid } ,
{ 44 , " Traffic Selector - I " , dissect_ts } ,
{ 45 , " Traffic Selector - R " , dissect_ts } ,
{ 46 , " Encrypted " , dissect_enc } ,
{ 47 , " Configuration " , dissect_config } ,
{ 48 , " Extensible Authentication " , dissect_eap } ,
1999-06-11 15:30:55 +00:00
} ;
2005-06-16 06:19:03 +00:00
static struct payload_func * getpayload_func ( guint8 , int ) ;
2005-03-15 09:58:58 +00:00
2002-08-20 18:20:11 +00:00
# define VID_LEN 16
# define VID_MS_LEN 20
static const guint8 VID_MS_W2K_WXP [ VID_MS_LEN ] = { 0x1E , 0x2B , 0x51 , 0x69 , 0x5 , 0x99 , 0x1C , 0x7D , 0x7C , 0x96 , 0xFC , 0xBF , 0xB5 , 0x87 , 0xE4 , 0x61 , 0x0 , 0x0 , 0x0 , 0x2 } ; /* according to http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/cableguy/cg0602.asp */
# define VID_CP_LEN 20
static const guint8 VID_CP [ VID_CP_LEN ] = { 0xF4 , 0xED , 0x19 , 0xE0 , 0xC1 , 0x14 , 0xEB , 0x51 , 0x6F , 0xAA , 0xAC , 0x0E , 0xE3 , 0x7D , 0xAF , 0x28 , 0x7 , 0xB4 , 0x38 , 0x1F } ;
static const guint8 VID_CYBERGUARD [ VID_LEN ] = { 0x9A , 0xA1 , 0xF3 , 0xB4 , 0x34 , 0x72 , 0xA4 , 0x5D , 0x5F , 0x50 , 0x6A , 0xEB , 0x26 , 0xC , 0xF2 , 0x14 } ;
static const guint8 VID_draft_ietf_ipsec_nat_t_ike_03 [ VID_LEN ] = { 0x7D , 0x94 , 0x19 , 0xA6 , 0x53 , 0x10 , 0xCA , 0x6F , 0x2C , 0x17 , 0x9D , 0x92 , 0x15 , 0x52 , 0x9d , 0x56 } ; /* according to http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-03.txt */
2005-12-22 21:28:51 +00:00
static const guint8 VID_rfc3947 [ VID_LEN ] = { 0x4a , 0x13 , 0x1c , 0x81 , 0x07 , 0x03 , 0x58 , 0x45 , 0x5c , 0x57 , 0x28 , 0xf2 , 0x0e , 0x95 , 0x45 , 0x2f } ; /* RFC 3947 Negotiation of NAT-Traversal in the IKE*/
2003-10-09 22:40:28 +00:00
static const guint8 VID_SSH_IPSEC_EXPRESS_1_1_0 [ VID_LEN ] = { 0xfB , 0xF4 , 0x76 , 0x14 , 0x98 , 0x40 , 0x31 , 0xFA , 0x8E , 0x3B , 0xB6 , 0x19 , 0x80 , 0x89 , 0xB2 , 0x23 } ; /* Ssh Communications Security IPSEC Express version 1.1.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_1_1_1 [ VID_LEN ] = { 0x19 , 0x52 , 0xDC , 0x91 , 0xAC , 0x20 , 0xF6 , 0x46 , 0xFB , 0x01 , 0xCF , 0x42 , 0xA3 , 0x3A , 0xEE , 0x30 } ; /* Ssh Communications Security IPSEC Express version 1.1.1 */
2006-02-09 17:32:14 +00:00
2003-10-09 22:40:28 +00:00
static const guint8 VID_SSH_IPSEC_EXPRESS_1_1_2 [ VID_LEN ] = { 0xE8 , 0xBF , 0xFA , 0x64 , 0x3E , 0x5C , 0x8F , 0x2C , 0xD1 , 0x0F , 0xDA , 0x73 , 0x70 , 0xB6 , 0xEB , 0xE5 } ; /* Ssh Communications Security IPSEC Express version 1.1.2 */
static const guint8 VID_SSH_IPSEC_EXPRESS_1_2_1 [ VID_LEN ] = { 0xC1 , 0x11 , 0x1B , 0x2D , 0xEE , 0x8C , 0xBC , 0x3D , 0x62 , 0x05 , 0x73 , 0xEC , 0x57 , 0xAA , 0xB9 , 0xCB } ; /* Ssh Communications Security IPSEC Express version 1.2.1 */
static const guint8 VID_SSH_IPSEC_EXPRESS_1_2_2 [ VID_LEN ] = { 0x09 , 0xEC , 0x27 , 0xBF , 0xBC , 0x09 , 0xC7 , 0x58 , 0x23 , 0xCF , 0xEC , 0xBF , 0xFE , 0x56 , 0x5A , 0x2E } ; /* Ssh Communications Security IPSEC Express version 1.2.2 */
2006-02-09 17:32:14 +00:00
2003-10-09 22:40:28 +00:00
static const guint8 VID_SSH_IPSEC_EXPRESS_2_0_0 [ VID_LEN ] = { 0x7F , 0x21 , 0xA5 , 0x96 , 0xE4 , 0xE3 , 0x18 , 0xF0 , 0xB2 , 0xF4 , 0x94 , 0x4C , 0x23 , 0x84 , 0xCB , 0x84 } ; /* SSH Communications Security IPSEC Express version 2.0.0 */
2006-02-09 17:32:14 +00:00
2003-10-09 22:40:28 +00:00
static const guint8 VID_SSH_IPSEC_EXPRESS_2_1_0 [ VID_LEN ] = { 0x28 , 0x36 , 0xD1 , 0xFD , 0x28 , 0x07 , 0xBC , 0x9E , 0x5A , 0xE3 , 0x07 , 0x86 , 0x32 , 0x04 , 0x51 , 0xEC } ; /* SSH Communications Security IPSEC Express version 2.1.0 */
2006-02-09 17:32:14 +00:00
2003-10-09 22:40:28 +00:00
static const guint8 VID_SSH_IPSEC_EXPRESS_2_1_1 [ VID_LEN ] = { 0xA6 , 0x8D , 0xE7 , 0x56 , 0xA9 , 0xC5 , 0x22 , 0x9B , 0xAE , 0x66 , 0x49 , 0x80 , 0x40 , 0x95 , 0x1A , 0xD5 } ; /* SSH Communications Security IPSEC Express version 2.1.1 */
static const guint8 VID_SSH_IPSEC_EXPRESS_2_1_2 [ VID_LEN ] = { 0x3F , 0x23 , 0x72 , 0x86 , 0x7E , 0x23 , 0x7C , 0x1C , 0xD8 , 0x25 , 0x0A , 0x75 , 0x55 , 0x9C , 0xAE , 0x20 } ; /* SSH Communications Security IPSEC Express version 2.1.2 */
static const guint8 VID_SSH_IPSEC_EXPRESS_3_0_0 [ VID_LEN ] = { 0x0E , 0x58 , 0xD5 , 0x77 , 0x4D , 0xF6 , 0x02 , 0x00 , 0x7D , 0x0B , 0x02 , 0x44 , 0x36 , 0x60 , 0xF7 , 0xEB } ; /* SSH Communications Security IPSEC Express version 3.0.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_3_0_1 [ VID_LEN ] = { 0xF5 , 0xCE , 0x31 , 0xEB , 0xC2 , 0x10 , 0xF4 , 0x43 , 0x50 , 0xCF , 0x71 , 0x26 , 0x5B , 0x57 , 0x38 , 0x0F } ; /* SSH Communications Security IPSEC Express version 3.0.1 */
static const guint8 VID_SSH_IPSEC_EXPRESS_4_0_0 [ VID_LEN ] = { 0xF6 , 0x42 , 0x60 , 0xAF , 0x2E , 0x27 , 0x42 , 0xDA , 0xDD , 0xD5 , 0x69 , 0x87 , 0x06 , 0x8A , 0x99 , 0xA0 } ; /* SSH Communications Security IPSEC Express version 4.0.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_4_0_1 [ VID_LEN ] = { 0x7A , 0x54 , 0xD3 , 0xBD , 0xB3 , 0xB1 , 0xE6 , 0xD9 , 0x23 , 0x89 , 0x20 , 0x64 , 0xBE , 0x2D , 0x98 , 0x1C } ; /* SSH Communications Security IPSEC Express version 4.0.1 */
static const guint8 VID_SSH_IPSEC_EXPRESS_4_1_0 [ VID_LEN ] = { 0x9A , 0xA1 , 0xF3 , 0xB4 , 0x34 , 0x72 , 0xA4 , 0x5D , 0x5F , 0x50 , 0x6A , 0xEB , 0x26 , 0x0C , 0xF2 , 0x14 } ; /* SSH Communications Security IPSEC Express version 4.1.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_4_1_1 [ VID_LEN ] = { 0x89 , 0xF7 , 0xB7 , 0x60 , 0xD8 , 0x6B , 0x01 , 0x2A , 0xCF , 0x26 , 0x33 , 0x82 , 0x39 , 0x4D , 0x96 , 0x2F } ; /* SSH Communications Security IPSEC Express version 4.1.1 */
static const guint8 VID_SSH_IPSEC_EXPRESS_5_0 [ VID_LEN ] = { 0xB0 , 0x37 , 0xA2 , 0x1A , 0xCE , 0xCC , 0xB5 , 0x57 , 0x0F , 0x60 , 0x25 , 0x46 , 0xF9 , 0x7B , 0xDE , 0x8C } ; /* SSH Communications Security IPSEC Express version 5.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_5_0_0 [ VID_LEN ] = { 0x2B , 0x2D , 0xAD , 0x97 , 0xC4 , 0xD1 , 0x40 , 0x93 , 0x00 , 0x53 , 0x28 , 0x7F , 0x99 , 0x68 , 0x50 , 0xB0 } ; /* SSH Communications Security IPSEC Express version 5.0.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_5_1_0 [ VID_LEN ] = { 0x45 , 0xE1 , 0x7F , 0x3A , 0xBE , 0x93 , 0x94 , 0x4C , 0xB2 , 0x02 , 0x91 , 0x0C , 0x59 , 0xEF , 0x80 , 0x6B } ; /* SSH Communications Security IPSEC Express version 5.1.0 */
static const guint8 VID_SSH_IPSEC_EXPRESS_5_1_1 [ VID_LEN ] = { 0x59 , 0x25 , 0x85 , 0x9F , 0x73 , 0x77 , 0xED , 0x78 , 0x16 , 0xD2 , 0xFB , 0x81 , 0xC0 , 0x1F , 0xA5 , 0x51 } ; /* SSH Communications Security IPSEC Express version 5.1.1 */
static const guint8 VID_SSH_SENTINEL [ VID_LEN ] = { 0x05 , 0x41 , 0x82 , 0xA0 , 0x7C , 0x7A , 0xE2 , 0x06 , 0xF9 , 0xD2 , 0xCF , 0x9D , 0x24 , 0x32 , 0xC4 , 0x82 } ; /* SSH Sentinel */
static const guint8 VID_SSH_SENTINEL_1_1 [ VID_LEN ] = { 0xB9 , 0x16 , 0x23 , 0xE6 , 0x93 , 0xCA , 0x18 , 0xA5 , 0x4C , 0x6A , 0x27 , 0x78 , 0x55 , 0x23 , 0x05 , 0xE8 } ; /* SSH Sentinel 1.1 */
static const guint8 VID_SSH_SENTINEL_1_2 [ VID_LEN ] = { 0x54 , 0x30 , 0x88 , 0x8D , 0xE0 , 0x1A , 0x31 , 0xA6 , 0xFA , 0x8F , 0x60 , 0x22 , 0x4E , 0x44 , 0x99 , 0x58 } ; /* SSH Sentinel 1.2 */
static const guint8 VID_SSH_SENTINEL_1_3 [ VID_LEN ] = { 0x7E , 0xE5 , 0xCB , 0x85 , 0xF7 , 0x1C , 0xE2 , 0x59 , 0xC9 , 0x4A , 0x5C , 0x73 , 0x1E , 0xE4 , 0xE7 , 0x52 } ; /* SSH Sentinel 1.3 */
static const guint8 VID_SSH_QUICKSEC_0_9_0 [ VID_LEN ] = { 0x37 , 0xEB , 0xA0 , 0xC4 , 0x13 , 0x61 , 0x84 , 0xE7 , 0xDA , 0xF8 , 0x56 , 0x2A , 0x77 , 0x06 , 0x0B , 0x4A } ; /* SSH Communications Security QuickSec 0.9.0 */
static const guint8 VID_SSH_QUICKSEC_1_1_0 [ VID_LEN ] = { 0x5D , 0x72 , 0x92 , 0x5E , 0x55 , 0x94 , 0x8A , 0x96 , 0x61 , 0xA7 , 0xFC , 0x48 , 0xFD , 0xEC , 0x7F , 0xF9 } ; /* SSH Communications Security QuickSec 1.1.0 */
static const guint8 VID_SSH_QUICKSEC_1_1_1 [ VID_LEN ] = { 0x77 , 0x7F , 0xBF , 0x4C , 0x5A , 0xF6 , 0xD1 , 0xCD , 0xD4 , 0xB8 , 0x95 , 0xA0 , 0x5B , 0xF8 , 0x25 , 0x94 } ; /* SSH Communications Security QuickSec 1.1.1 */
static const guint8 VID_SSH_QUICKSEC_1_1_2 [ VID_LEN ] = { 0x2C , 0xDF , 0x08 , 0xE7 , 0x12 , 0xED , 0xE8 , 0xA5 , 0x97 , 0x87 , 0x61 , 0x26 , 0x7C , 0xD1 , 0x9B , 0x91 } ; /* SSH Communications Security QuickSec 1.1.2 */
static const guint8 VID_SSH_QUICKSEC_1_1_3 [ VID_LEN ] = { 0x59 , 0xE4 , 0x54 , 0xA8 , 0xC2 , 0xCF , 0x02 , 0xA3 , 0x49 , 0x59 , 0x12 , 0x1F , 0x18 , 0x90 , 0xBC , 0x87 } ; /* SSH Communications Security QuickSec 1.1.3 */
static const guint8 VID_draft_huttunen_ipsec_esp_in_udp_01 [ VID_LEN ] = { 0x50 , 0x76 , 0x0F , 0x62 , 0x4C , 0x63 , 0xE5 , 0xC5 , 0x3E , 0xEA , 0x38 , 0x6C , 0x68 , 0x5C , 0xA0 , 0x83 } ; /* draft-huttunen-ipsec-esp-in-udp-01.txt */
static const guint8 VID_draft_stenberg_ipsec_nat_traversal_01 [ VID_LEN ] = { 0x27 , 0xBA , 0xB5 , 0xDC , 0x01 , 0xEA , 0x07 , 0x60 , 0xEA , 0x4E , 0x31 , 0x90 , 0xAC , 0x27 , 0xC0 , 0xD0 } ; /* draft-stenberg-ipsec-nat-traversal-01 */
static const guint8 VID_draft_stenberg_ipsec_nat_traversal_02 [ VID_LEN ] = { 0x61 , 0x05 , 0xC4 , 0x22 , 0xE7 , 0x68 , 0x47 , 0xE4 , 0x3F , 0x96 , 0x84 , 0x80 , 0x12 , 0x92 , 0xAE , 0xCD } ; /* draft-stenberg-ipsec-nat-traversal-02 */
static const guint8 VID_draft_ietf_ipsec_nat_t_ike_00 [ VID_LEN ] = { 0x44 , 0x85 , 0x15 , 0x2D , 0x18 , 0xB6 , 0xBB , 0xCD , 0x0B , 0xE8 , 0xA8 , 0x46 , 0x95 , 0x79 , 0xDD , 0xCC } ; /* draft-ietf-ipsec-nat-t-ike-00 */
static const guint8 VID_draft_ietf_ipsec_nat_t_ike_02a [ VID_LEN ] = { 0xCD , 0x60 , 0x46 , 0x43 , 0x35 , 0xDF , 0x21 , 0xF8 , 0x7C , 0xFD , 0xB2 , 0xFC , 0x68 , 0xB6 , 0xA4 , 0x48 } ; /* draft-ietf-ipsec-nat-t-ike-02 */
static const guint8 VID_draft_ietf_ipsec_nat_t_ike_02b [ VID_LEN ] = { 0x90 , 0xCB , 0x80 , 0x91 , 0x3E , 0xBB , 0x69 , 0x6E , 0x08 , 0x63 , 0x81 , 0xB5 , 0xEC , 0x42 , 0x7B , 0x1F } ; /* draft-ietf-ipsec-nat-t-ike-02 */
static const guint8 VID_draft_beaulieu_ike_xauth_02 [ VID_LEN ] = { 0x09 , 0x00 , 0x26 , 0x89 , 0xDF , 0xD6 , 0xB7 , 0x12 , 0x80 , 0xA2 , 0x24 , 0xDE , 0xC3 , 0x3B , 0x81 , 0xE5 } ; /* draft-beaulieu-ike-xauth-02.txt */
2004-06-15 18:47:24 +00:00
static const guint8 VID_rfc3706_dpd [ VID_LEN ] = { 0xAF , 0xCA , 0xD7 , 0x13 , 0x68 , 0xA1 , 0xF1 , 0xC9 , 0x6B , 0x86 , 0x96 , 0xFC , 0x77 , 0x57 , 0x01 , 0x00 } ; /* RFC 3706 */
2003-10-09 22:40:28 +00:00
static const guint8 VID_IKE_CHALLENGE_RESPONSE_1 [ VID_LEN ] = { 0xBA , 0x29 , 0x04 , 0x99 , 0xC2 , 0x4E , 0x84 , 0xE5 , 0x3A , 0x1D , 0x83 , 0xA0 , 0x5E , 0x5F , 0x00 , 0xC9 } ; /* IKE Challenge/Response for Authenticated Cryptographic Keys */
static const guint8 VID_IKE_CHALLENGE_RESPONSE_2 [ VID_LEN ] = { 0x0D , 0x33 , 0x61 , 0x1A , 0x5D , 0x52 , 0x1B , 0x5E , 0x3C , 0x9C , 0x03 , 0xD2 , 0xFC , 0x10 , 0x7E , 0x12 } ; /* IKE Challenge/Response for Authenticated Cryptographic Keys */
static const guint8 VID_IKE_CHALLENGE_RESPONSE_REV_1 [ VID_LEN ] = { 0xAD , 0x32 , 0x51 , 0x04 , 0x2C , 0xDC , 0x46 , 0x52 , 0xC9 , 0xE0 , 0x73 , 0x4C , 0xE5 , 0xDE , 0x4C , 0x7D } ; /* IKE Challenge/Response for Authenticated Cryptographic Keys (Revised) */
static const guint8 VID_IKE_CHALLENGE_RESPONSE_REV_2 [ VID_LEN ] = { 0x01 , 0x3F , 0x11 , 0x82 , 0x3F , 0x96 , 0x6F , 0xA9 , 0x19 , 0x00 , 0xF0 , 0x24 , 0xBA , 0x66 , 0xA8 , 0x6B } ; /* IKE Challenge/Response for Authenticated Cryptographic Keys (Revised) */
static const guint8 VID_MS_L2TP_IPSEC_VPN_CLIENT [ VID_LEN ] = { 0x40 , 0x48 , 0xB7 , 0xD5 , 0x6E , 0xBC , 0xE8 , 0x85 , 0x25 , 0xE7 , 0xDE , 0x7F , 0x00 , 0xD6 , 0xC2 , 0xD3 } ; /* Microsoft L2TP/IPSec VPN Client */
static const guint8 VID_GSS_API_1 [ VID_LEN ] = { 0xB4 , 0x6D , 0x89 , 0x14 , 0xF3 , 0xAA , 0xA3 , 0xF2 , 0xFE , 0xDE , 0xB7 , 0xC7 , 0xDB , 0x29 , 0x43 , 0xCA } ; /* A GSS-API Authentication Method for IKE */
static const guint8 VID_GSS_API_2 [ VID_LEN ] = { 0xAD , 0x2C , 0x0D , 0xD0 , 0xB9 , 0xC3 , 0x20 , 0x83 , 0xCC , 0xBA , 0x25 , 0xB8 , 0x86 , 0x1E , 0xC4 , 0x55 } ; /* A GSS-API Authentication Method for IKE */
static const guint8 VID_GSSAPI [ VID_LEN ] = { 0x62 , 0x1B , 0x04 , 0xBB , 0x09 , 0x88 , 0x2A , 0xC1 , 0xE1 , 0x59 , 0x35 , 0xFE , 0xFA , 0x24 , 0xAE , 0xEE } ; /* GSSAPI */
static const guint8 VID_MS_NT5_ISAKMPOAKLEY [ VID_LEN ] = { 0x1E , 0x2B , 0x51 , 0x69 , 0x05 , 0x99 , 0x1C , 0x7D , 0x7C , 0x96 , 0xFC , 0xBF , 0xB5 , 0x87 , 0xE4 , 0x61 } ; /* MS NT5 ISAKMPOAKLEY */
static const guint8 VID_CISCO_UNITY [ VID_LEN ] = { 0x12 , 0xF5 , 0xF2 , 0x8C , 0x45 , 0x71 , 0x68 , 0xA9 , 0x70 , 0x2D , 0x9F , 0xE2 , 0x74 , 0xCC , 0x02 , 0xD4 } ; /* CISCO-UNITY */
# define VID_LEN_8 8
static const guint8 VID_draft_ietf_ipsec_antireplay_00 [ VID_LEN_8 ] = { 0x32 , 0x5D , 0xF2 , 0x9A , 0x23 , 0x19 , 0xF2 , 0xDD } ; /* draft-ietf-ipsec-antireplay-00.txt */
static const guint8 VID_draft_ietf_ipsec_heartbeats_00 [ VID_LEN_8 ] = { 0x8D , 0xB7 , 0xA4 , 0x18 , 0x11 , 0x22 , 0x16 , 0x60 } ; /* draft-ietf-ipsec-heartbeats-00.txt */
2006-02-09 17:32:14 +00:00
/*
2003-01-20 22:27:03 +00:00
* Seen in Netscreen . Suppose to be ASCII HeartBeat_Notify - but I don ' t know the rest yet . I suspect it then proceeds with
* 8 k10 , which means every 8 K ( ? ) , and version 1.0 of the protocol ( ? ) . I won ' t add it to the code , until I know what it really
2004-09-21 07:47:14 +00:00
* means . ykaul - at - bezeqint . net
2003-01-20 22:27:03 +00:00
*/
2007-04-14 14:01:53 +00:00
static const guint8 VID_HeartBeat_Notify [ VID_LEN ] _U_ = { 0x48 , 0x65 , 0x61 , 0x72 , 0x74 , 0x42 , 0x65 , 0x61 , 0x74 , 0x5f , 0x4e , 0x6f , 0x74 , 0x69 , 0x66 , 0x79 } ;
2002-08-20 18:20:11 +00:00
2005-05-27 08:53:07 +00:00
void
2005-06-16 06:19:03 +00:00
isakmp_dissect_payloads ( tvbuff_t * tvb , proto_tree * tree , int isakmp_version ,
guint8 initial_payload , int offset , int length ,
packet_info * pinfo )
2005-05-27 08:53:07 +00:00
{
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvb , tree , isakmp_version , initial_payload , offset , length ,
pinfo ) ;
2005-05-27 08:53:07 +00:00
}
2001-10-25 23:40:28 +00:00
static void
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvbuff_t * tvb , proto_tree * tree , int isakmp_version ,
2006-02-09 17:32:14 +00:00
guint8 initial_payload , int offset , int length ,
packet_info * pinfo )
2001-10-25 23:40:28 +00:00
{
guint8 payload , next_payload ;
guint16 payload_length ;
proto_tree * ntree ;
2005-03-15 09:58:58 +00:00
struct payload_func * f ;
2001-10-25 23:40:28 +00:00
2005-03-29 22:23:09 +00:00
for ( payload = initial_payload ; length > 0 ; payload = next_payload ) {
2001-10-25 23:40:28 +00:00
if ( payload = = LOAD_TYPE_NONE ) {
/*
* What ? There ' s more stuff in this chunk of data , but the
* previous payload had a " next payload " type of None ?
*/
proto_tree_add_text ( tree , tvb , offset , length ,
" Extra data: %s " ,
tvb_bytes_to_str ( tvb , offset , length ) ) ;
break ;
}
2005-06-16 06:19:03 +00:00
ntree = dissect_payload_header ( tvb , offset , length , isakmp_version ,
payload , & next_payload , & payload_length , tree ) ;
2001-10-25 23:40:28 +00:00
if ( ntree = = NULL )
break ;
if ( payload_length > = 4 ) { /* XXX = > 4? */
2005-03-29 22:23:09 +00:00
tvb_ensure_bytes_exist ( tvb , offset + 4 , payload_length - 4 ) ;
2005-06-16 06:19:03 +00:00
if ( ( f = getpayload_func ( payload , isakmp_version ) ) ! = NULL & & f - > func ! = NULL )
( * f - > func ) ( tvb , offset + 4 , payload_length - 4 , ntree , pinfo ,
isakmp_version , - 1 ) ;
2001-10-25 23:40:28 +00:00
else {
2005-03-21 02:00:14 +00:00
proto_tree_add_text ( ntree , tvb , offset + 4 , payload_length - 4 ,
" Payload " ) ;
2001-10-25 23:40:28 +00:00
}
}
2004-11-29 19:30:12 +00:00
else if ( payload_length > length ) {
2005-03-29 22:23:09 +00:00
proto_tree_add_text ( ntree , tvb , 0 , 0 ,
2004-11-29 19:30:12 +00:00
" Payload (bogus, length is %u, greater than remaining length %d " ,
payload_length , length ) ;
return ;
}
2001-10-25 23:40:28 +00:00
else {
2005-03-29 22:23:09 +00:00
proto_tree_add_text ( ntree , tvb , 0 , 0 ,
2001-10-25 23:40:28 +00:00
" Payload (bogus, length is %u, must be at least 4) " ,
payload_length ) ;
payload_length = 4 ;
}
offset + = payload_length ;
length - = payload_length ;
}
}
2005-03-15 09:58:58 +00:00
static struct payload_func *
2005-06-16 06:19:03 +00:00
getpayload_func ( guint8 payload , int isakmp_version )
2005-03-15 09:58:58 +00:00
{
struct payload_func * f = 0 ;
int i , len ;
if ( isakmp_version = = 1 ) {
f = v1_plfunc ;
len = ARLEN ( v1_plfunc ) ;
} else if ( isakmp_version = = 2 ) {
f = v2_plfunc ;
len = ARLEN ( v2_plfunc ) ;
} else
return NULL ;
for ( i = 0 ; i < len ; i + + ) {
if ( f [ i ] . type = = payload )
return & f [ i ] ;
}
return NULL ;
}
2000-04-08 07:07:42 +00:00
static void
2001-02-28 10:22:29 +00:00
dissect_isakmp ( tvbuff_t * tvb , packet_info * pinfo , proto_tree * tree )
{
2004-11-29 17:52:38 +00:00
int offset = 0 , len ;
2006-02-09 17:32:14 +00:00
isakmp_hdr_t hdr ;
2001-08-29 09:02:37 +00:00
proto_item * ti ;
proto_tree * isakmp_tree = NULL ;
2005-06-16 06:19:03 +00:00
int isakmp_version ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
guint8 zeroes [ 8 ] = { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 } ;
guint8 i_cookie [ COOKIE_SIZE ] , * ic_key ;
decrypt_data_t * decr = NULL ;
tvbuff_t * decr_tvb ;
proto_tree * decr_tree ;
void * pd = pinfo - > private_data ;
address null_addr ;
# endif /* HAVE_LIBNETTLE */
Add the "Edit:Protocols..." feature which currently only implements
the following:
It is now possible to enable/disable a particular protocol decoding
(i.e. the protocol dissector is void or not). When a protocol
is disabled, it is displayed as Data and of course, all linked
sub-protocols are disabled as well.
Disabling a protocol could be interesting:
- in case of buggy dissectors
- in case of wrong heuristics
- for performance reasons
- to decode the data as another protocol (TODO)
Currently (if I am not wrong), all dissectors but NFS can be disabled
(and dissectors that do not register protocols :-)
I do not like the way the RPC sub-dissectors are disabled (in the
sub-dissectors) since this could be done in the RPC dissector itself,
knowing the sub-protocol hfinfo entry (this is why, I've not modified
the NFS one yet).
Two functions are added in proto.c :
gboolean proto_is_protocol_enabled(int n);
void proto_set_decoding(int n, gboolean enabled);
and two MACROs which can be used in dissectors:
OLD_CHECK_DISPLAY_AS_DATA(index, pd, offset, fd, tree)
CHECK_DISPLAY_AS_DATA(index, tvb, pinfo, tree)
See also the XXX in proto_dlg.c and proto.c around the new functions.
svn path=/trunk/; revision=2267
2000-08-13 14:09:15 +00:00
2001-12-10 00:26:21 +00:00
if ( check_col ( pinfo - > cinfo , COL_PROTOCOL ) )
col_set_str ( pinfo - > cinfo , COL_PROTOCOL , " ISAKMP " ) ;
if ( check_col ( pinfo - > cinfo , COL_INFO ) )
col_clear ( pinfo - > cinfo , COL_INFO ) ;
2001-08-29 08:12:32 +00:00
2001-08-29 09:02:37 +00:00
if ( tree ) {
2003-11-04 21:44:27 +00:00
ti = proto_tree_add_item ( tree , proto_isakmp , tvb , offset , - 1 , FALSE ) ;
2001-08-29 09:02:37 +00:00
isakmp_tree = proto_item_add_subtree ( ti , ett_isakmp ) ;
}
2002-08-28 21:04:11 +00:00
2005-07-20 07:51:24 +00:00
/* RFC3948 2.3 NAT Keepalive packet:
* 1 byte payload with the value 0xff .
*/
if ( ( tvb_length ( tvb ) = = 1 ) & & ( tvb_get_guint8 ( tvb , offset ) = = 0xff ) ) {
if ( check_col ( pinfo - > cinfo , COL_INFO ) ) {
col_add_str ( pinfo - > cinfo , COL_INFO , " NAT Keepalive " ) ;
}
proto_tree_add_item ( isakmp_tree , hf_ike_nat_keepalive , tvb , offset , 1 , FALSE ) ;
return ;
}
2006-02-09 17:32:14 +00:00
hdr . length = tvb_get_ntohl ( tvb , offset + ISAKMP_HDR_SIZE - sizeof ( hdr . length ) ) ;
hdr . exch_type = tvb_get_guint8 ( tvb , COOKIE_SIZE + COOKIE_SIZE + sizeof ( hdr . next_payload ) + sizeof ( hdr . version ) ) ;
hdr . version = tvb_get_guint8 ( tvb , COOKIE_SIZE + COOKIE_SIZE + sizeof ( hdr . next_payload ) ) ;
2005-03-15 09:58:58 +00:00
isakmp_version = hi_nibble ( hdr . version ) ; /* save the version */
2001-12-10 00:26:21 +00:00
if ( check_col ( pinfo - > cinfo , COL_INFO ) )
2005-06-16 06:19:03 +00:00
col_add_str ( pinfo - > cinfo , COL_INFO ,
exchtype2str ( isakmp_version , hdr . exch_type ) ) ;
2002-08-28 21:04:11 +00:00
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
SET_ADDRESS ( & null_addr , AT_NONE , 0 , NULL ) ;
tvb_memcpy ( tvb , i_cookie , offset , COOKIE_SIZE ) ;
decr = ( decrypt_data_t * ) g_hash_table_lookup ( isakmp_hash , i_cookie ) ;
if ( ! decr ) {
ic_key = g_mem_chunk_alloc ( isakmp_key_data ) ;
memcpy ( ic_key , i_cookie , COOKIE_SIZE ) ;
decr = g_mem_chunk_alloc ( isakmp_decrypt_data ) ;
memset ( decr , 0 , sizeof ( decrypt_data_t ) ) ;
SET_ADDRESS ( & decr - > initiator , AT_NONE , 0 , NULL ) ;
g_hash_table_insert ( isakmp_hash , ic_key , decr ) ;
}
if ( ADDRESSES_EQUAL ( & decr - > initiator , & null_addr ) ) {
/* XXX - We assume that we're seeing the second packet in an exchange here.
* Is there a way to verify this ? */
COPY_ADDRESS ( & decr - > initiator , & pinfo - > src ) ;
}
pinfo - > private_data = decr ;
# endif /* HAVE_LIBNETTLE */
2001-02-28 10:22:29 +00:00
if ( tree ) {
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( isakmp_tree , hf_isakmp_icookie , tvb , offset , COOKIE_SIZE , FALSE ) ;
offset + = COOKIE_SIZE ;
2002-08-28 21:04:11 +00:00
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( isakmp_tree , hf_isakmp_rcookie , tvb , offset , COOKIE_SIZE , FALSE ) ;
offset + = COOKIE_SIZE ;
2002-08-28 21:04:11 +00:00
2002-08-18 19:19:46 +00:00
hdr . next_payload = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( isakmp_tree , hf_isakmp_nextpayload , tvb , offset ,
sizeof ( hdr . next_payload ) , hdr . next_payload ,
1999-06-11 15:30:55 +00:00
" Next payload: %s (%u) " ,
2005-06-16 06:19:03 +00:00
payloadtype2str ( isakmp_version , hdr . next_payload ) ,
hdr . next_payload ) ;
2002-08-18 19:19:46 +00:00
offset + = sizeof ( hdr . next_payload ) ;
1999-06-11 15:30:55 +00:00
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( isakmp_tree , hf_isakmp_version , tvb , offset ,
sizeof ( hdr . version ) , hdr . version , " Version: %u.%u " ,
2002-08-18 19:19:46 +00:00
hi_nibble ( hdr . version ) , lo_nibble ( hdr . version ) ) ;
offset + = sizeof ( hdr . version ) ;
2002-08-28 21:04:11 +00:00
hdr . exch_type = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( isakmp_tree , hf_isakmp_exchangetype , tvb , offset ,
sizeof ( hdr . exch_type ) , hdr . exch_type ,
1999-06-11 15:30:55 +00:00
" Exchange type: %s (%u) " ,
2005-06-16 06:19:03 +00:00
exchtype2str ( isakmp_version , hdr . exch_type ) ,
hdr . exch_type ) ;
2002-08-18 19:19:46 +00:00
offset + = sizeof ( hdr . exch_type ) ;
2002-08-28 21:04:11 +00:00
1999-06-11 15:30:55 +00:00
{
proto_item * fti ;
proto_tree * ftree ;
2002-08-28 21:04:11 +00:00
hdr . flags = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
fti = proto_tree_add_item ( isakmp_tree , hf_isakmp_flags , tvb , offset , sizeof ( hdr . flags ) , FALSE ) ;
1999-11-16 11:44:20 +00:00
ftree = proto_item_add_subtree ( fti , ett_isakmp_flags ) ;
2002-08-28 21:04:11 +00:00
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
2002-08-18 19:19:46 +00:00
decode_boolean_bitfield ( hdr . flags , E_FLAG , sizeof ( hdr . flags ) * 8 ,
2005-03-15 09:58:58 +00:00
" Encrypted " , " Not encrypted " ) ) ;
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
2002-08-18 19:19:46 +00:00
decode_boolean_bitfield ( hdr . flags , C_FLAG , sizeof ( hdr . flags ) * 8 ,
1999-06-11 15:30:55 +00:00
" Commit " , " No commit " ) ) ;
2005-03-15 09:58:58 +00:00
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
2002-08-18 19:19:46 +00:00
decode_boolean_bitfield ( hdr . flags , A_FLAG , sizeof ( hdr . flags ) * 8 ,
1999-06-11 15:30:55 +00:00
" Authentication " , " No authentication " ) ) ;
2005-03-15 09:58:58 +00:00
} else if ( isakmp_version = = 2 ) {
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
decode_boolean_bitfield ( hdr . flags , I_FLAG , sizeof ( hdr . flags ) * 8 ,
" Initiator " , " Responder " ) ) ;
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
decode_boolean_bitfield ( hdr . flags , V_FLAG , sizeof ( hdr . flags ) * 8 ,
" A higher version enabled " , " " ) ) ;
proto_tree_add_text ( ftree , tvb , offset , 1 , " %s " ,
decode_boolean_bitfield ( hdr . flags , R_FLAG , sizeof ( hdr . flags ) * 8 ,
" Response " , " Request " ) ) ;
}
2002-08-18 19:19:46 +00:00
offset + = sizeof ( hdr . flags ) ;
1999-06-11 15:30:55 +00:00
}
2006-02-09 17:32:14 +00:00
hdr . message_id = tvb_get_ntohl ( tvb , offset ) ;
proto_tree_add_item ( isakmp_tree , hf_isakmp_messageid , tvb , offset , sizeof ( hdr . message_id ) , FALSE ) ;
2002-08-18 19:19:46 +00:00
offset + = sizeof ( hdr . message_id ) ;
2002-08-28 21:04:11 +00:00
2006-02-09 17:32:14 +00:00
if ( hdr . length < ISAKMP_HDR_SIZE ) {
proto_tree_add_uint_format ( isakmp_tree , hf_isakmp_length , tvb , offset , sizeof ( hdr . length ) ,
hdr . length , " Length: (bogus, length is %u, should be at least %lu) " ,
hdr . length , ( unsigned long ) ISAKMP_HDR_SIZE ) ;
2003-12-10 10:47:24 +00:00
return ;
}
2006-02-09 17:32:14 +00:00
len = hdr . length - ISAKMP_HDR_SIZE ;
2004-11-29 17:52:38 +00:00
if ( len < 0 ) {
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( isakmp_tree , hf_isakmp_length , tvb , offset , sizeof ( hdr . length ) ,
hdr . length , " Length: (bogus, length is %u, which is too large) " ,
2004-11-29 17:52:38 +00:00
hdr . length ) ;
return ;
}
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( isakmp_tree , hf_isakmp_length , tvb , offset , sizeof ( hdr . length ) , FALSE ) ;
2002-08-18 19:19:46 +00:00
offset + = sizeof ( hdr . length ) ;
2002-08-28 21:04:11 +00:00
2002-08-18 19:19:46 +00:00
if ( hdr . flags & E_FLAG ) {
2001-02-28 10:22:29 +00:00
if ( len & & isakmp_tree ) {
2006-02-09 17:32:14 +00:00
ti = proto_tree_add_text ( isakmp_tree , tvb , offset , len ,
2000-04-28 17:53:25 +00:00
" Encrypted payload (%d byte%s) " ,
2001-02-28 10:22:29 +00:00
len , plurality ( len , " " , " s " ) ) ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
if ( decr ) {
decr_tvb = decrypt_payload ( isakmp_tree , tvb , pinfo , tvb_get_ptr ( tvb , offset , len ) , len , & hdr ) ;
if ( decr_tvb ) {
decr_tree = proto_item_add_subtree ( ti , ett_isakmp ) ;
dissect_payloads ( decr_tvb , decr_tree , isakmp_version , hdr . next_payload ,
0 , tvb_length ( decr_tvb ) , pinfo ) ;
}
}
# endif /* HAVE_LIBNETTLE */
2000-04-28 17:53:25 +00:00
}
2001-10-25 23:40:28 +00:00
} else
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvb , isakmp_tree , isakmp_version , hdr . next_payload ,
offset , len , pinfo ) ;
1999-06-11 15:30:55 +00:00
}
}
2001-02-28 10:22:29 +00:00
static proto_tree *
2005-06-16 06:19:03 +00:00
dissect_payload_header ( tvbuff_t * tvb , int offset , int length ,
int isakmp_version , guint8 payload , guint8 * next_payload_p ,
guint16 * payload_length_p , proto_tree * tree )
2001-02-28 10:22:29 +00:00
{
guint8 next_payload ;
guint16 payload_length ;
proto_item * ti ;
proto_tree * ntree ;
if ( length < 4 ) {
proto_tree_add_text ( tree , tvb , offset , length ,
" Not enough room in payload for all transforms " ) ;
return NULL ;
}
next_payload = tvb_get_guint8 ( tvb , offset ) ;
payload_length = tvb_get_ntohs ( tvb , offset + 2 ) ;
ti = proto_tree_add_text ( tree , tvb , offset , payload_length ,
2005-06-16 06:19:03 +00:00
" %s payload " , payloadtype2str ( isakmp_version , payload ) ) ;
2001-02-28 10:22:29 +00:00
ntree = proto_item_add_subtree ( ti , ett_isakmp_payload ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( ntree , hf_isakmp_nextpayload , tvb , offset , 1 ,
next_payload , " Next payload: %s (%u) " ,
payloadtype2str ( isakmp_version , next_payload ) ,
next_payload ) ;
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 2 ) {
2005-03-20 22:24:51 +00:00
proto_tree_add_text ( ntree , tvb , offset + 1 , 1 , " %s " ,
decode_boolean_bitfield ( tvb_get_guint8 ( tvb , offset + 1 ) , 0x80 ,
8 , " Critical " , " Not critical " ) ) ;
2005-03-15 09:58:58 +00:00
}
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( ntree , hf_isakmp_payloadlen , tvb , offset + 2 , 2 , FALSE ) ;
2001-02-28 10:22:29 +00:00
* next_payload_p = next_payload ;
* payload_length_p = payload_length ;
return ntree ;
1999-06-11 15:30:55 +00:00
}
2001-02-28 10:22:29 +00:00
static void
2006-02-09 17:32:14 +00:00
dissect_sa ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint32 doi ;
guint32 situation ;
1999-06-11 15:30:55 +00:00
2001-10-25 23:40:28 +00:00
if ( length < 4 ) {
proto_tree_add_text ( tree , tvb , offset , length ,
" DOI %s (length is %u, should be >= 4) " ,
tvb_bytes_to_str ( tvb , offset , length ) , length ) ;
return ;
}
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
doi = tvb_get_ntohl ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_doi , tvb , offset , 4 ,
doi , " Domain of interpretation: %s (%u) " ,
doitype2str ( doi ) , doi ) ;
2005-03-15 09:58:58 +00:00
offset + = 4 ;
length - = 4 ;
2002-08-28 21:04:11 +00:00
2005-03-15 09:58:58 +00:00
if ( doi = = 1 ) {
/* IPSEC */
if ( length < 4 ) {
2006-02-09 17:32:14 +00:00
proto_tree_add_bytes_format ( tree , hf_isakmp_sa_situation , tvb , offset , length ,
tvb_get_ptr ( tvb , offset , length ) ,
2001-10-25 23:40:28 +00:00
" Situation: %s (length is %u, should be >= 4) " ,
tvb_bytes_to_str ( tvb , offset , length ) , length ) ;
2005-03-15 09:58:58 +00:00
return ;
}
situation = tvb_get_ntohl ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_bytes_format ( tree , hf_isakmp_sa_situation , tvb , offset , 4 ,
tvb_get_ptr ( tvb , offset , 4 ) , " Situation: %s (%u) " ,
2001-10-25 23:40:28 +00:00
situation2str ( situation ) , situation ) ;
2005-03-15 09:58:58 +00:00
offset + = 4 ;
length - = 4 ;
2002-08-28 21:04:11 +00:00
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvb , tree , isakmp_version , LOAD_TYPE_PROPOSAL , offset ,
length , pinfo ) ;
2005-03-15 09:58:58 +00:00
} else {
/* Unknown */
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_sa_situation , tvb , offset , length , FALSE ) ;
2005-03-15 09:58:58 +00:00
}
} else if ( isakmp_version = = 2 ) {
2005-06-16 06:19:03 +00:00
dissect_payloads ( tvb , tree , isakmp_version , LOAD_TYPE_PROPOSAL , offset ,
length , pinfo ) ;
2001-10-25 23:40:28 +00:00
}
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_proposal ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint8 protocol_id ;
guint8 spi_size ;
guint8 num_transforms ;
guint8 next_payload ;
guint16 payload_length ;
1999-07-07 22:52:57 +00:00
proto_tree * ntree ;
2002-08-20 18:20:11 +00:00
guint8 proposal_num ;
1999-12-06 03:39:34 +00:00
2002-08-20 18:20:11 +00:00
proposal_num = tvb_get_guint8 ( tvb , offset ) ;
2002-08-28 21:04:11 +00:00
2006-02-09 17:32:14 +00:00
proto_item_append_text ( tree , " # %d " , proposal_num ) ;
proto_tree_add_item ( tree , hf_isakmp_prop_number , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
protocol_id = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_protoid , tvb , offset , 1 ,
protocol_id , " Protocol ID: %s (%u) " ,
val_to_str ( protocol_id , vs_proto , " UNKNOWN-PROTO-TYPE " ) , protocol_id ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
spi_size = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_spisize , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
num_transforms = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_prop_transforms , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
if ( spi_size ) {
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , spi_size , " SPI: 0x%s " ,
2001-10-25 23:40:28 +00:00
tvb_bytes_to_str ( tvb , offset , spi_size ) ) ;
2001-02-28 10:22:29 +00:00
offset + = spi_size ;
length - = spi_size ;
1999-06-11 15:30:55 +00:00
}
2001-02-28 10:22:29 +00:00
while ( num_transforms > 0 ) {
2005-06-16 06:19:03 +00:00
ntree = dissect_payload_header ( tvb , offset , length , isakmp_version ,
LOAD_TYPE_TRANSFORM , & next_payload , & payload_length , tree ) ;
2001-02-28 10:22:29 +00:00
if ( ntree = = NULL )
break ;
if ( length < payload_length ) {
proto_tree_add_text ( tree , tvb , offset + 4 , length ,
" Not enough room in payload for all transforms " ) ;
break ;
}
2005-03-15 09:58:58 +00:00
if ( payload_length > = 4 ) {
if ( isakmp_version = = 1 )
dissect_transform ( tvb , offset + 4 , payload_length - 4 , ntree ,
2005-06-16 06:19:03 +00:00
pinfo , isakmp_version , protocol_id ) ;
2005-03-15 09:58:58 +00:00
else if ( isakmp_version = = 2 )
dissect_transform2 ( tvb , offset + 4 , payload_length - 4 , ntree ,
2005-06-16 06:19:03 +00:00
pinfo , isakmp_version , protocol_id ) ;
2005-03-15 09:58:58 +00:00
}
1999-12-06 03:39:34 +00:00
else
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( ntree , tvb , offset + 4 , payload_length - 4 , " Payload " ) ;
offset + = payload_length ;
length - = payload_length ;
num_transforms - - ;
1999-12-06 03:39:34 +00:00
}
1999-06-11 15:30:55 +00:00
}
static void
2001-02-28 10:22:29 +00:00
dissect_transform ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int protocol_id )
1999-12-06 03:39:34 +00:00
{
2005-03-15 09:58:58 +00:00
static const value_string vs_v1_attr [ ] = {
{ 1 , " Encryption-Algorithm " } ,
{ 2 , " Hash-Algorithm " } ,
{ 3 , " Authentication-Method " } ,
{ 4 , " Group-Description " } ,
{ 5 , " Group-Type " } ,
{ 6 , " Group-Prime " } ,
{ 7 , " Group-Generator-One " } ,
{ 8 , " Group-Generator-Two " } ,
{ 9 , " Group-Curve-A " } ,
{ 10 , " Group-Curve-B " } ,
{ 11 , " Life-Type " } ,
{ 12 , " Life-Duration " } ,
{ 13 , " PRF " } ,
{ 14 , " Key-Length " } ,
{ 15 , " Field-Size " } ,
{ 16 , " Group-Order " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v2_sttr [ ] = {
{ 1 , " SA-Life-Type " } ,
{ 2 , " SA-Life-Duration " } ,
{ 3 , " Group-Description " } ,
{ 4 , " Encapsulation-Mode " } ,
{ 5 , " Authentication-Algorithm " } ,
{ 6 , " Key-Length " } ,
{ 7 , " Key-Rounds " } ,
{ 8 , " Compress-Dictinary-Size " } ,
{ 9 , " Compress-Private-Algorithm " } ,
{ 10 , " ECN Tunnel " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_trans_isakmp [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " KEY_IKE " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_trans_ah [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " RESERVED " } ,
{ 2 , " MD5 " } ,
{ 3 , " SHA " } ,
{ 4 , " DES " } ,
{ 5 , " SHA2-256 " } ,
{ 6 , " SHA2-384 " } ,
{ 7 , " SHA2-512 " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_trans_esp [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " DES-IV64 " } ,
{ 2 , " DES " } ,
{ 3 , " 3DES " } ,
{ 4 , " RC5 " } ,
{ 5 , " IDEA " } ,
{ 6 , " CAST " } ,
{ 7 , " BLOWFISH " } ,
{ 8 , " 3IDEA " } ,
{ 9 , " DES-IV32 " } ,
{ 10 , " RC4 " } ,
{ 11 , " NULL " } ,
{ 12 , " AES " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_trans_ipcomp [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " OUI " } ,
{ 2 , " DEFLATE " } ,
{ 3 , " LZS " } ,
{ 4 , " LZJH " } ,
{ 0 , NULL } ,
} ;
2001-02-28 10:22:29 +00:00
guint8 transform_id ;
2002-08-20 18:20:11 +00:00
guint8 transform_num ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
decrypt_data_t * decr = ( decrypt_data_t * ) pinfo - > private_data ;
# endif /* HAVE_LIBNETTLE */
2002-08-28 21:04:11 +00:00
2002-08-20 18:20:11 +00:00
transform_num = tvb_get_guint8 ( tvb , offset ) ;
proto_item_append_text ( tree , " # %d " , transform_num ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_trans_number , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
1999-12-06 03:39:34 +00:00
2001-02-28 10:22:29 +00:00
transform_id = tvb_get_guint8 ( tvb , offset ) ;
1999-12-06 03:39:34 +00:00
switch ( protocol_id ) {
default :
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_trans_id , tvb , offset , 1 , FALSE ) ;
2001-10-26 10:30:16 +00:00
break ;
1999-12-06 03:39:34 +00:00
case 1 : /* ISAKMP */
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_trans_id , tvb , offset , 1 ,
transform_id , " Transform ID: %s (%u) " ,
2005-03-15 09:58:58 +00:00
val_to_str ( transform_id , vs_v1_trans_isakmp , " UNKNOWN-TRANS-TYPE " ) , transform_id ) ;
1999-12-06 03:39:34 +00:00
break ;
case 2 : /* AH */
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_trans_id , tvb , offset , 1 ,
transform_id , " Transform ID: %s (%u) " ,
2005-03-15 09:58:58 +00:00
val_to_str ( transform_id , vs_v1_trans_ah , " UNKNOWN-AH-TRANS-TYPE " ) , transform_id ) ;
1999-12-06 03:39:34 +00:00
break ;
case 3 : /* ESP */
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_trans_id , tvb , offset , 1 ,
transform_id , " Transform ID: %s (%u) " ,
2005-03-15 09:58:58 +00:00
val_to_str ( transform_id , vs_v1_trans_esp , " UNKNOWN-ESP-TRANS-TYPE " ) , transform_id ) ;
1999-12-06 03:39:34 +00:00
break ;
2001-11-05 21:36:07 +00:00
case 4 : /* IPCOMP */
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_trans_id , tvb , offset , 1 ,
transform_id , " Transform ID: %s (%u) " ,
2005-03-15 09:58:58 +00:00
val_to_str ( transform_id , vs_v1_trans_ipcomp , " UNKNOWN-IPCOMP-TRANS-TYPE " ) , transform_id ) ;
2001-11-05 21:36:07 +00:00
break ;
1999-12-06 03:39:34 +00:00
}
2001-02-28 10:22:29 +00:00
offset + = 3 ;
length - = 3 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
while ( length > 0 ) {
const char * str ;
1999-12-06 03:39:34 +00:00
int ike_phase1 = 0 ;
2001-02-28 10:22:29 +00:00
guint16 aft = tvb_get_ntohs ( tvb , offset ) ;
guint16 type = aft & 0x7fff ;
guint16 len ;
guint32 val ;
guint pack_len ;
1999-12-06 03:39:34 +00:00
2006-02-09 17:32:14 +00:00
/* XXX - Add header fields */
2001-02-28 10:22:29 +00:00
if ( protocol_id = = 1 & & transform_id = = 1 ) {
1999-12-06 03:39:34 +00:00
ike_phase1 = 1 ;
2005-03-15 09:58:58 +00:00
str = val_to_str ( type , vs_v1_attr , " UNKNOWN-ATTRIBUTE-TYPE " ) ;
}
else {
str = val_to_str ( type , vs_v2_sttr , " UNKNOWN-ATTRIBUTE-TYPE " ) ;
}
if ( aft & 0x8000 ) {
val = tvb_get_ntohs ( tvb , offset + 2 ) ;
proto_tree_add_text ( tree , tvb , offset , 4 ,
" %s (%u): %s (%u) " ,
str , type ,
v1_attrval2str ( ike_phase1 , type , val ) , val ) ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
set_transform_vals ( decr , ike_phase1 , type , val ) ;
# endif
2005-03-15 09:58:58 +00:00
offset + = 4 ;
length - = 4 ;
1999-12-06 03:39:34 +00:00
}
else {
2005-03-15 09:58:58 +00:00
len = tvb_get_ntohs ( tvb , offset + 2 ) ;
pack_len = 4 + len ;
if ( ! get_num ( tvb , offset + 4 , len , & val ) ) {
proto_tree_add_text ( tree , tvb , offset , pack_len ,
" %s (%u): <too big (%u bytes)> " ,
str , type , len ) ;
} else {
proto_tree_add_text ( tree , tvb , offset , pack_len ,
" %s (%u): %s (%u) " ,
str , type ,
v1_attrval2str ( ike_phase1 , type , val ) , val ) ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
set_transform_vals ( decr , ike_phase1 , type , val ) ;
# endif
2005-03-15 09:58:58 +00:00
}
offset + = pack_len ;
length - = pack_len ;
1999-12-06 03:39:34 +00:00
}
2005-03-15 09:58:58 +00:00
}
}
/* For Transform Type 1 (Encryption Algorithm), defined Transform IDs */
static const char *
v2_tid2encstr ( guint16 tid )
{
static const value_string vs_v2_trans_enc [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " ENCR_DES_IV64 " } ,
{ 2 , " ENCR_DES " } ,
2006-09-06 08:36:13 +00:00
{ 3 , " ENCR_3DES " } ,
2005-03-15 09:58:58 +00:00
{ 4 , " ENCR_RC5 " } ,
{ 5 , " ENCR_IDEA " } ,
{ 6 , " ENCR_CAST " } ,
{ 7 , " ENCR_BLOWFISH " } ,
{ 8 , " ENCR_3IDEA " } ,
{ 9 , " ENCR_DES_IV32 " } ,
{ 10 , " RESERVED " } ,
{ 11 , " ENCR_NULL " } ,
{ 12 , " ENCR_AES_CBC " } ,
2006-09-29 05:51:44 +00:00
{ 13 , " ENCR_AES_CTR " } , /* [RFC3686] */
{ 14 , " ENCR_AES-CCM_8 " } , /* [RFC4309] */
{ 15 , " ENCR-AES-CCM_12 " } , /* [RFC4309] */
{ 16 , " ENCR-AES-CCM_16 " } , /* [RFC4309] */
{ 17 , " UNASSIGNED " } ,
{ 18 , " AES-GCM with a 8 octet ICV " } , /* [RFC4106] */
{ 19 , " AES-GCM with a 12 octet ICV " } , /* [RFC4106] */
{ 20 , " AES-GCM with a 16 octet ICV " } , /* [RFC4106] */
{ 21 , " ENCR_NULL_AUTH_AES_GMAC " } , /* [RFC4543] */
/*
* 22 - 1023 RESERVED TO IANA [ RFC4306 ]
* 1024 - 65535 PRIVATE USE [ RFC4306 ]
*/
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
return val_to_str ( tid , vs_v2_trans_enc , " UNKNOWN-ENC-ALG " ) ;
}
/* For Transform Type 2 (Pseudo-random Function), defined Transform IDs */
static const char *
v2_tid2prfstr ( guint16 tid )
{
static const value_string vs_v2_trans_prf [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " PRF_HMAC_MD5 " } ,
{ 2 , " PRF_HMAC_SHA1 " } ,
{ 3 , " PRF_HMAC_TIGER " } ,
{ 4 , " PRF_AES128_CBC " } ,
2006-09-29 05:51:44 +00:00
{ 5 , " RESERVED TO IANA " } , /* [RFC4306] */
{ 6 , " RESERVED TO IANA " } , /* [RFC4306] */
{ 7 , " RESERVED TO IANA " } , /* [RFC4306] */
{ 8 , " PRF_AES128_CMAC6 " } , /* [RFC4615] */
/*
9 - 1023 RESERVED TO IANA [ RFC4306 ]
1024 - 65535 PRIVATE USE [ RFC4306 ]
*/
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
return val_to_str ( tid , vs_v2_trans_prf , " UNKNOWN-PRF " ) ;
}
/* For Transform Type 3 (Integrity Algorithm), defined Transform IDs */
static const char *
v2_tid2iastr ( guint16 tid )
{
static const value_string vs_v2_trans_integrity [ ] = {
{ 0 , " NONE " } ,
{ 1 , " AUTH_HMAC_MD5_96 " } ,
{ 2 , " AUTH_HMAC_SHA1_96 " } ,
{ 3 , " AUTH_DES_MAC " } ,
{ 4 , " AUTH_KPDK_MD5 " } ,
{ 5 , " AUTH_AES_XCBC_96 " } ,
2006-09-29 05:51:44 +00:00
{ 6 , " AUTH_HMAC_MD5_128 " } , /* [RFC-maino-fcsp-02.txt] */
{ 7 , " AUTH_HMAC_SHA1_160 " } , /* [RFC-maino-fcsp-02.txt] */
{ 8 , " AUTH_AES_CMAC_96 " } , /* [RFC4494] */
{ 9 , " AUTH_AES_128_GMAC " } , /* [RFC4543] */
{ 10 , " AUTH_AES_192_GMAC " } , /* [RFC4543] */
{ 11 , " AUTH_AES_256_GMAC " } , /* [RFC4543] */
/*
12 - 1023 RESERVED TO IANA [ RFC4306 ]
1024 - 65535 PRIVATE USE [ RFC4306 ]
*/
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
return val_to_str ( tid , vs_v2_trans_integrity , " UNKNOWN-INTEGRITY-ALG " ) ;
}
/* For Transform Type 4 (Diffie-Hellman Group), defined Transform IDs */
static const char *
v2_tid2dhstr ( guint16 tid )
{
static const value_string vs_v2_trans_dhgroup [ ] = {
{ 0 , " NONE " } ,
{ 1 , " Group 1 - 768 Bit MODP " } ,
{ 2 , " Group 2 - 1024 Bit MODP " } ,
{ 3 , " RESERVED " } ,
{ 4 , " RESERVED " } ,
{ 5 , " group 5 - 1536 Bit MODP " } ,
2006-09-29 05:51:44 +00:00
/* 6-13 RESERVED TO IANA [RFC4306] */
2005-03-15 09:58:58 +00:00
{ 14 , " 2048-bit MODP Group " } ,
{ 15 , " 3072-bit MODP Group " } ,
{ 16 , " 4096-bit MODP Group " } ,
{ 17 , " 6144-bit MODP Group " } ,
{ 18 , " 8192-bit MODP Group " } ,
2006-09-29 05:51:44 +00:00
{ 19 , " 256-bit random ECP group " } , /* [RFC-ietf-ipsec-ike-ecp-groups-02.txt]*/
{ 20 , " 384-bit random ECP group " } , /* [RFC-ietf-ipsec-ike-ecp-groups-02.txt]*/
{ 21 , " 521-bit random ECP group " } , /* [RFC-ietf-ipsec-ike-ecp-groups-02.txt]*/
/*
22 - 1023 RESERVED TO IANA [ RFC4306 ]
1024 - 65535 PRIVATE USE [ RFC4306 ]
*/
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
2006-09-29 05:51:44 +00:00
if ( ( tid > = 6 & & tid < = 13 ) | | ( tid > = 22 & & tid < = 1023 ) )
2005-03-15 09:58:58 +00:00
return " RESERVED TO IANA " ;
if ( tid > = 1024 )
return " PRIVATE USE " ;
return val_to_str ( tid , vs_v2_trans_dhgroup , " UNKNOWN-DH-GROUP " ) ;
}
/* For Transform Type 5 (Extended Sequence Numbers), defined Transform */
static const char *
v2_tid2esnstr ( guint16 tid )
{
static const value_string vs_v2_trans_esn [ ] = {
{ 0 , " No Extended Sequence Numbers " } ,
{ 1 , " Extended Sequence Numbers " } ,
{ 0 , NULL } ,
} ;
return val_to_str ( tid , vs_v2_trans_esn , " UNKNOWN-ESN-TYPE " ) ;
}
static struct {
const gint8 type ;
const char * str ;
const char * ( * func ) ( guint16 ) ;
} v2_tid_func [ ] = {
{ 0 , " RESERVED " , NULL , } ,
{ 1 , " Encryption Algorithm (ENCR) " , v2_tid2encstr } ,
2006-02-09 17:32:14 +00:00
{ 2 , " Pseudo-random Function (PRF) " , v2_tid2prfstr } ,
2005-03-15 09:58:58 +00:00
{ 3 , " Integrity Algorithm (INTEG) " , v2_tid2iastr } ,
{ 4 , " Diffie-Hellman Group (D-H) " , v2_tid2dhstr } ,
{ 5 , " Extended Sequence Numbers (ESN) " , v2_tid2esnstr } ,
} ;
static const char *
v2_trans2str ( guint8 type )
{
if ( type < ARLEN ( v2_tid_func ) ) return v2_tid_func [ type ] . str ;
if ( type < 240 ) return " RESERVED TO IANA " ;
return " PRIVATE USE " ;
}
static const char *
v2_tid2str ( guint8 type , guint16 tid )
{
if ( type < ARLEN ( v2_tid_func ) & & v2_tid_func [ type ] . func ! = NULL ) {
return ( v2_tid_func [ type ] . func ) ( tid ) ;
}
return " RESERVED " ;
}
static const char *
v2_aft2str ( guint16 aft )
{
if ( aft < 14 | | ( aft > 14 & & aft < 18 ) ) return " RESERVED " ;
if ( aft = = 14 ) return " Key Length (in bits) " ;
if ( aft > = 18 & & aft < 16384 ) return " RESERVED TO IANA " ;
return " PRIVATE USE " ;
}
static void
dissect_transform2 ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2005-03-15 09:58:58 +00:00
{
guint8 transform_type ;
guint16 transform_id ;
transform_type = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" Transform type: %s (%u) " , v2_trans2str ( transform_type ) , transform_type ) ;
offset + = 2 ;
length - = 2 ;
transform_id = tvb_get_ntohs ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" Transform ID: %s (%u) " , v2_tid2str ( transform_type , transform_id ) ,
transform_id ) ;
offset + = 2 ;
length - = 2 ;
while ( length > 0 ) {
const char * str ;
guint16 aft = tvb_get_ntohs ( tvb , offset ) ;
guint16 type = aft & 0x7fff ;
guint16 len ;
guint32 val ;
guint pack_len ;
2006-09-05 12:22:44 +00:00
str = v2_aft2str ( type ) ;
1999-12-06 03:39:34 +00:00
2001-02-28 10:22:29 +00:00
if ( aft & 0x8000 ) {
val = tvb_get_ntohs ( tvb , offset + 2 ) ;
proto_tree_add_text ( tree , tvb , offset , 4 ,
1999-06-11 15:30:55 +00:00
" %s (%u): %s (%u) " ,
1999-12-06 03:39:34 +00:00
str , type ,
2005-03-15 09:58:58 +00:00
v2_attrval2str ( type , val ) , val ) ;
1999-06-11 15:30:55 +00:00
offset + = 4 ;
2001-02-28 10:22:29 +00:00
length - = 4 ;
1999-06-11 15:30:55 +00:00
}
else {
2001-02-28 10:22:29 +00:00
len = tvb_get_ntohs ( tvb , offset + 2 ) ;
pack_len = 4 + len ;
if ( ! get_num ( tvb , offset + 4 , len , & val ) ) {
proto_tree_add_text ( tree , tvb , offset , pack_len ,
" %s (%u): <too big (%u bytes)> " ,
str , type , len ) ;
} else {
proto_tree_add_text ( tree , tvb , offset , pack_len ,
" %s (%u): %s (%u) " ,
str , type ,
2005-03-15 09:58:58 +00:00
v2_attrval2str ( type , val ) , val ) ;
2001-02-28 10:22:29 +00:00
}
1999-06-11 15:30:55 +00:00
offset + = pack_len ;
2001-02-28 10:22:29 +00:00
length - = pack_len ;
1999-06-11 15:30:55 +00:00
}
}
}
static void
2001-10-26 10:30:16 +00:00
dissect_key_exch ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
2005-03-15 09:58:58 +00:00
guint16 dhgroup ;
2006-02-09 17:32:14 +00:00
# ifdef HAVE_LIBNETTLE
decrypt_data_t * decr = ( decrypt_data_t * ) pinfo - > private_data ;
# endif /* HAVE_LIBNETTLE */
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 2 ) {
dhgroup = tvb_get_ntohs ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" DH Group #: %u " , dhgroup ) ;
offset + = 4 ;
length - = 4 ;
}
2006-02-09 17:32:14 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Key Exchange Data (%d bytes / %d bits) " ,
length , length * 8 ) ;
# ifdef HAVE_LIBNETTLE
if ( decr & & decr - > gi_len = = 0 & & ADDRESSES_EQUAL ( & decr - > initiator , & pinfo - > src ) ) {
decr - > gi = g_malloc ( length ) ;
tvb_memcpy ( tvb , decr - > gi , offset , length ) ;
decr - > gi_len = length ;
} else if ( decr & & decr - > gr_len = = 0 & & ! ADDRESSES_EQUAL ( & decr - > initiator , & pinfo - > src ) ) {
decr - > gr = g_malloc ( length ) ;
tvb_memcpy ( tvb , decr - > gr , offset , length ) ;
decr - > gr_len = length ;
}
# endif /* HAVE_LIBNETTLE */
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_id ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint8 id_type ;
guint8 protocol_id ;
guint16 port ;
2007-05-13 20:58:29 +00:00
asn1_ctx_t asn1_ctx ;
asn1_ctx_init ( & asn1_ctx , ASN1_ENC_BER , TRUE , pinfo ) ;
2001-02-28 10:22:29 +00:00
id_type = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_id_type , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , 1 ,
2005-06-16 06:19:03 +00:00
" ID type: %s (%u) " ,
id2str ( isakmp_version , id_type ) , id_type ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
protocol_id = tvb_get_guint8 ( tvb , offset ) ;
if ( protocol_id = = 0 ) {
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_protoid , tvb , offset , 1 ,
protocol_id , " Protocol ID: Unused " ) ;
2001-02-28 10:22:29 +00:00
} else {
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_protoid , tvb , offset , 1 ,
protocol_id , " Protocol ID: %s (%u) " ,
2001-02-28 10:22:29 +00:00
ipprotostr ( protocol_id ) , protocol_id ) ;
}
offset + = 1 ;
length - = 1 ;
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
port = tvb_get_ntohs ( tvb , offset ) ;
if ( port = = 0 )
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_id_port , tvb , offset , 2 ,
port , " Port: Unused " ) ;
2001-02-28 10:22:29 +00:00
else
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_id_port , tvb , offset , 2 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 2 ;
length - = 2 ;
2002-08-28 21:04:11 +00:00
2005-10-12 05:36:44 +00:00
/*
* It shows strings of all types though some of types are not
* supported in IKEv2 specification actually .
*/
2001-02-28 10:22:29 +00:00
switch ( id_type ) {
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV4_ADDR :
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Identification data: %s " ,
ip_to_str ( tvb_get_ptr ( tvb , offset , 4 ) ) ) ;
1999-06-11 15:30:55 +00:00
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_FQDN :
case IKE_ID_USER_FQDN :
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Identification data: %.*s " , length ,
tvb_get_ptr ( tvb , offset , length ) ) ;
1999-06-11 15:30:55 +00:00
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV4_ADDR_SUBNET :
case IKE_ID_IPV4_ADDR_RANGE :
2001-11-05 21:36:07 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Identification data: %s/%s " ,
ip_to_str ( tvb_get_ptr ( tvb , offset , 4 ) ) ,
ip_to_str ( tvb_get_ptr ( tvb , offset + 4 , 4 ) ) ) ;
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV6_ADDR :
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Identification data: %s " ,
2005-09-24 19:09:40 +00:00
ip6_to_str ( ( const struct e_in6_addr * ) tvb_get_ptr ( tvb , offset , 16 ) ) ) ;
2005-09-24 15:42:37 +00:00
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV6_ADDR_SUBNET :
case IKE_ID_IPV6_ADDR_RANGE :
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Identification data: %s/%s " ,
2005-09-24 19:09:40 +00:00
ip6_to_str ( ( const struct e_in6_addr * ) tvb_get_ptr ( tvb , offset , 16 ) ) ,
ip6_to_str ( ( const struct e_in6_addr * ) tvb_get_ptr ( tvb , offset + 16 , 16 ) ) ) ;
2005-09-24 15:42:37 +00:00
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_DER_ASN1_DN :
2007-05-13 20:58:29 +00:00
dissect_x509if_Name ( FALSE , tvb , offset , & asn1_ctx , tree ,
2004-09-21 07:47:14 +00:00
hf_ike_certificate_authority ) ;
break ;
1999-06-11 15:30:55 +00:00
default :
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Identification Data " ) ;
break ;
1999-12-06 03:39:34 +00:00
}
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_cert ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint8 cert_enc ;
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
cert_enc = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_cert_encoding , tvb , offset , 1 ,
cert_enc , " Certificate encoding: %u - %s " ,
cert_enc , certtype2str ( isakmp_version , cert_enc ) ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Certificate Data " ) ;
1999-06-11 15:30:55 +00:00
}
static void
2005-07-14 08:10:30 +00:00
dissect_certreq_v1 ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint8 cert_type ;
2007-05-13 20:58:29 +00:00
asn1_ctx_t asn1_ctx ;
asn1_ctx_init ( & asn1_ctx , ASN1_ENC_BER , TRUE , pinfo ) ;
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
cert_type = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_certreq_type , tvb , offset , 1 ,
cert_type , " Certificate type: %u - %s " ,
cert_type , certtype2str ( isakmp_version , cert_type ) ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
1999-06-11 15:30:55 +00:00
2004-09-21 07:47:14 +00:00
if ( length ) {
2005-07-14 08:10:30 +00:00
if ( cert_type = = 4 ) {
2007-05-13 20:58:29 +00:00
dissect_x509if_Name ( FALSE , tvb , offset , & asn1_ctx , tree , hf_ike_certificate_authority ) ;
2005-07-14 08:10:30 +00:00
} else {
2004-09-21 07:47:14 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Certificate Authority " ) ;
2005-07-14 08:10:30 +00:00
}
2004-09-21 07:47:14 +00:00
}
else
proto_tree_add_text ( tree , tvb , offset , length , " Certificate Authority (empty) " ) ;
1999-06-11 15:30:55 +00:00
}
2005-07-14 08:10:30 +00:00
static void
dissect_certreq_v2 ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2006-02-11 09:54:10 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2005-07-14 08:10:30 +00:00
{
guint8 cert_type ;
cert_type = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" Certificate type: %u - %s " ,
cert_type , certtype2str ( isakmp_version , cert_type ) ) ;
offset + = 1 ;
length - = 1 ;
/* this is a list of 20 byte SHA-1 hashes */
2005-08-01 13:52:22 +00:00
while ( length > 0 ) {
2005-07-14 08:10:30 +00:00
proto_tree_add_item ( tree , hf_ike_v2_certificate_authority , tvb , offset , 20 , FALSE ) ;
length - = 20 ;
}
}
1999-06-11 15:30:55 +00:00
static void
2001-10-26 10:30:16 +00:00
dissect_hash ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
proto_tree_add_text ( tree , tvb , offset , length , " Hash Data " ) ;
1999-06-11 15:30:55 +00:00
}
2005-03-15 09:58:58 +00:00
static void
dissect_auth ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2005-03-15 09:58:58 +00:00
{
guint8 auth ;
auth = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" Auth Method: %s (%u) " , v2_auth2str ( auth ) , auth ) ;
offset + = 4 ;
length - = 4 ;
proto_tree_add_text ( tree , tvb , offset , length , " Authentication Data " ) ;
}
1999-06-11 15:30:55 +00:00
static void
2001-10-26 10:30:16 +00:00
dissect_sig ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
proto_tree_add_text ( tree , tvb , offset , length , " Signature Data " ) ;
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_nonce ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
proto_tree_add_text ( tree , tvb , offset , length , " Nonce Data " ) ;
1999-06-11 15:30:55 +00:00
}
2005-03-15 09:58:58 +00:00
static const char *
v2_ipcomptype2str ( guint8 type )
{
static const value_string vs_v2_ipcomptype [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " IPCOMP_OUI " } ,
{ 2 , " IPCOMP_DEFLATE " } ,
{ 3 , " IPCOMP_LZS " } ,
{ 4 , " IPCOMP_LZJH " } ,
{ 0 , NULL } ,
} ;
if ( type > = 5 & & type < = 240 )
return " RESERVED TO IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 241 )
2005-03-15 09:58:58 +00:00
return " PRIVATE USE " ;
return val_to_str ( type , vs_v2_ipcomptype , " UNKNOWN-IPCOMP-TYPE " ) ;
}
1999-06-11 15:30:55 +00:00
static void
2001-10-26 10:30:16 +00:00
dissect_notif ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint32 doi ;
guint8 protocol_id ;
guint8 spi_size ;
guint16 msgtype ;
2005-03-15 09:58:58 +00:00
guint8 ipcomptype ;
2001-02-28 10:22:29 +00:00
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
doi = tvb_get_ntohl ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_doi , tvb , offset , 4 ,
doi , " Domain of interpretation: %s (%u) " ,
doitype2str ( doi ) , doi ) ;
2005-03-15 09:58:58 +00:00
offset + = 4 ;
length - = 4 ;
}
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
protocol_id = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_protoid , tvb , offset , 1 ,
protocol_id , " Protocol ID: %s (%u) " ,
val_to_str ( protocol_id , vs_proto , " UNKNOWN-PROTO-TYPE " ) , protocol_id ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
spi_size = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_spisize , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
msgtype = tvb_get_ntohs ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_notify_msgtype , tvb , offset , 2 ,
msgtype , " Message type: %s (%u) " ,
msgtype2str ( isakmp_version , msgtype ) , msgtype ) ;
2001-02-28 10:22:29 +00:00
offset + = 2 ;
length - = 2 ;
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
if ( spi_size ) {
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , spi_size , " SPI: 0x%s " ,
tvb_bytes_to_str ( tvb , offset , spi_size ) ) ;
2001-02-28 10:22:29 +00:00
offset + = spi_size ;
length - = spi_size ;
1999-06-11 15:30:55 +00:00
}
2005-03-15 09:58:58 +00:00
if ( length > 0 ) {
2001-02-28 10:22:29 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Notification Data " ) ;
2005-03-15 09:58:58 +00:00
/* notification data */
if ( isakmp_version = = 2 & & msgtype = = 16387 ) {
/* IPCOMP_SUPPORTED */
proto_tree_add_text ( tree , tvb , offset , 2 ,
" IPComp CPI (%u) " , tvb_get_ntohs ( tvb , offset ) ) ;
ipcomptype = tvb_get_guint8 ( tvb , offset + 2 ) ;
proto_tree_add_text ( tree , tvb , offset + 2 , 1 ,
" Transform ID: %s (%u) " ,
v2_ipcomptype2str ( ipcomptype ) , ipcomptype ) ;
offset + = 3 ;
length - = 3 ;
}
}
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_delete ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint32 doi ;
guint8 protocol_id ;
guint8 spi_size ;
guint16 num_spis ;
1999-06-11 15:30:55 +00:00
guint16 i ;
2002-08-28 21:04:11 +00:00
2005-09-24 15:42:37 +00:00
if ( isakmp_version = = 1 ) {
doi = tvb_get_ntohl ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 4 ,
" Domain of Interpretation: %s (%u) " ,
doitype2str ( doi ) , doi ) ;
offset + = 4 ;
length - = 4 ;
}
1999-06-11 15:30:55 +00:00
2001-02-28 10:22:29 +00:00
protocol_id = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_uint_format ( tree , hf_isakmp_protoid , tvb , offset , 1 ,
protocol_id , " Protocol ID: %s (%u) " ,
val_to_str ( protocol_id , vs_proto , " UNKNOWN-PROTO-TYPE " ) , protocol_id ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
spi_size = tvb_get_guint8 ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_spisize , tvb , offset , 1 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 1 ;
length - = 1 ;
num_spis = tvb_get_ntohs ( tvb , offset ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_item ( tree , hf_isakmp_num_spis , tvb , offset , 2 , FALSE ) ;
2001-02-28 10:22:29 +00:00
offset + = 2 ;
length - = 2 ;
2002-08-28 21:04:11 +00:00
1999-06-11 15:30:55 +00:00
for ( i = 0 ; i < num_spis ; + + i ) {
2001-02-28 10:22:29 +00:00
if ( length < spi_size ) {
proto_tree_add_text ( tree , tvb , offset , length ,
" Not enough room in payload for all SPI's " ) ;
break ;
}
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , spi_size , " SPI: 0x%s " ,
tvb_bytes_to_str ( tvb , offset , spi_size ) ) ;
2001-02-28 10:22:29 +00:00
offset + = spi_size ;
length - = spi_size ;
1999-12-06 03:39:34 +00:00
}
1999-06-11 15:30:55 +00:00
}
static void
2001-10-26 10:30:16 +00:00
dissect_vid ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
2002-08-20 18:20:11 +00:00
guint32 CPproduct , CPversion ;
const guint8 * pVID ;
proto_item * pt ;
proto_tree * ntree ;
pVID = tvb_get_ptr ( tvb , offset , length ) ;
pt = proto_tree_add_text ( tree , tvb , offset , length , " Vendor ID: " ) ;
if ( memcmp ( pVID , VID_MS_W2K_WXP , isakmp_min ( VID_MS_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Microsoft Win2K/WinXP " ) ;
else
if ( memcmp ( pVID , VID_CP , isakmp_min ( VID_CP_LEN , length ) ) = = 0 )
{
proto_item_append_text ( pt , " Check Point " ) ;
offset + = VID_CP_LEN ;
CPproduct = tvb_get_ntohl ( tvb , offset ) ;
ntree = proto_item_add_subtree ( pt , ett_isakmp_payload ) ;
pt = proto_tree_add_text ( ntree , tvb , offset , sizeof ( CPproduct ) , " Check Point Product: " ) ;
switch ( CPproduct ) {
case 1 : proto_item_append_text ( pt , " VPN-1 " ) ;
break ;
case 2 : proto_item_append_text ( pt , " SecuRemote/SecureClient " ) ;
break ;
default : proto_item_append_text ( pt , " Unknown CP product! " ) ;
break ;
}
offset + = sizeof ( CPproduct ) ;
CPversion = tvb_get_ntohl ( tvb , offset ) ;
2004-09-21 07:47:14 +00:00
pt = proto_tree_add_text ( ntree , tvb , offset , sizeof ( CPversion ) , " Version: " ) ;
2002-08-20 18:20:11 +00:00
switch ( CPversion ) {
case 2 : proto_item_append_text ( pt , " 4.1 " ) ;
break ;
case 3 : proto_item_append_text ( pt , " 4.1 SP-1 " ) ;
break ;
case 4002 : proto_item_append_text ( pt , " 4.1 (SP-2 or above) " ) ;
break ;
case 5000 : proto_item_append_text ( pt , " NG " ) ;
break ;
case 5001 : proto_item_append_text ( pt , " NG Feature Pack 1 " ) ;
break ;
case 5002 : proto_item_append_text ( pt , " NG Feature Pack 2 " ) ;
break ;
case 5003 : proto_item_append_text ( pt , " NG Feature Pack 3 " ) ;
break ;
2003-12-02 18:35:36 +00:00
case 5004 : proto_item_append_text ( pt , " NG with Application Intelligence " ) ;
break ;
case 5005 : proto_item_append_text ( pt , " NG with Application Intelligence R55 " ) ;
2003-12-02 09:05:10 +00:00
break ;
default : proto_item_append_text ( pt , " Unknown CP version! " ) ;
2002-08-20 18:20:11 +00:00
break ;
}
2004-09-21 07:47:14 +00:00
offset + = sizeof ( CPversion ) ;
2006-02-09 17:32:14 +00:00
proto_tree_add_text ( ntree , tvb , offset , length - VID_CP_LEN - sizeof ( CPproduct ) - sizeof ( CPversion ) , " Check Point Vendor ID parameters " ) ;
2002-08-28 21:04:11 +00:00
}
2002-08-20 18:20:11 +00:00
else
if ( memcmp ( pVID , VID_CYBERGUARD , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Cyber Guard " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_nat_t_ike_03 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-nat-t-ike-03 " ) ;
else
2005-12-22 21:28:51 +00:00
if ( memcmp ( pVID , VID_rfc3947 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " RFC 3947 Negotiation of NAT-Traversal in the IKE " ) ;
else
2003-10-09 22:40:28 +00:00
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_1_1_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 1.1.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_1_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 1.1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_1_1_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 1.1.2 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_1_2_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 1.2.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_1_2_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 1.2.2 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_2_0_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 2.0.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_2_1_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 2.1.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_2_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 2.1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_2_1_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 2.1.2 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_3_0_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 3.0.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_3_0_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 3.0.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_4_0_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 4.0.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_4_0_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 4.0.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_4_1_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 4.1.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_4_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 4.1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_5_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 5.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_5_0_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 5.0.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_5_1_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 5.1.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_IPSEC_EXPRESS_5_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Ssh Communications Security IPSEC Express version 5.1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_SENTINEL , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Sentinel " ) ;
else
if ( memcmp ( pVID , VID_SSH_SENTINEL_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Sentinel 1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_SENTINEL_1_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Sentinel 1.2 " ) ;
else
if ( memcmp ( pVID , VID_SSH_SENTINEL_1_3 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Sentinel 1.3 " ) ;
else
if ( memcmp ( pVID , VID_SSH_QUICKSEC_0_9_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Communications Security QuickSec 0.9.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_QUICKSEC_1_1_0 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Communications Security QuickSec 1.1.0 " ) ;
else
if ( memcmp ( pVID , VID_SSH_QUICKSEC_1_1_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Communications Security QuickSec 1.1.1 " ) ;
else
if ( memcmp ( pVID , VID_SSH_QUICKSEC_1_1_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Communications Security QuickSec 1.1.2 " ) ;
else
if ( memcmp ( pVID , VID_SSH_QUICKSEC_1_1_3 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " SSH Communications Security QuickSec 1.1.3 " ) ;
else
if ( memcmp ( pVID , VID_draft_huttunen_ipsec_esp_in_udp_01 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-huttunen-ipsec-esp-in-udp-01.txt " ) ;
else
if ( memcmp ( pVID , VID_draft_stenberg_ipsec_nat_traversal_01 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-stenberg-ipsec-nat-traversal-01 " ) ;
else
if ( memcmp ( pVID , VID_draft_stenberg_ipsec_nat_traversal_02 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-stenberg-ipsec-nat-traversal-02 " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_nat_t_ike_00 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-nat-t-ike-00 " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_nat_t_ike_02a , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-nat-t-ike-02 " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_nat_t_ike_02b , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-nat-t-ike-02 " ) ;
else
if ( memcmp ( pVID , VID_draft_beaulieu_ike_xauth_02 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-beaulieu-ike-xauth-02.txt " ) ;
else
2004-06-15 18:47:24 +00:00
if ( memcmp ( pVID , VID_rfc3706_dpd , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " RFC 3706 Detecting Dead IKE Peers (DPD) " ) ;
2003-10-09 22:40:28 +00:00
else
if ( memcmp ( pVID , VID_IKE_CHALLENGE_RESPONSE_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " IKE Challenge/Response for Authenticated Cryptographic Keys " ) ;
else
if ( memcmp ( pVID , VID_IKE_CHALLENGE_RESPONSE_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " IKE Challenge/Response for Authenticated Cryptographic Keys " ) ;
else
if ( memcmp ( pVID , VID_IKE_CHALLENGE_RESPONSE_REV_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " IKE Challenge/Response for Authenticated Cryptographic Keys (Revised) " ) ;
else
if ( memcmp ( pVID , VID_IKE_CHALLENGE_RESPONSE_REV_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " IKE Challenge/Response for Authenticated Cryptographic Keys (Revised) " ) ;
else
if ( memcmp ( pVID , VID_MS_L2TP_IPSEC_VPN_CLIENT , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " Microsoft L2TP/IPSec VPN Client " ) ;
else
if ( memcmp ( pVID , VID_GSS_API_1 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " A GSS-API Authentication Method for IKE " ) ;
else
if ( memcmp ( pVID , VID_GSS_API_2 , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " A GSS-API Authentication Method for IKE " ) ;
else
if ( memcmp ( pVID , VID_GSSAPI , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " GSSAPI " ) ;
else
if ( memcmp ( pVID , VID_MS_NT5_ISAKMPOAKLEY , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " MS NT5 ISAKMPOAKLEY " ) ;
else
if ( memcmp ( pVID , VID_CISCO_UNITY , isakmp_min ( VID_LEN , length ) ) = = 0 )
proto_item_append_text ( pt , " CISCO-UNITY " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_antireplay_00 , isakmp_min ( VID_LEN_8 , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-antireplay-00.txt " ) ;
else
if ( memcmp ( pVID , VID_draft_ietf_ipsec_heartbeats_00 , isakmp_min ( VID_LEN_8 , length ) ) = = 0 )
proto_item_append_text ( pt , " draft-ietf-ipsec-heartbeats-00.txt " ) ;
else
proto_item_append_text ( pt , " unknown vendor ID: 0x%s " , tvb_bytes_to_str ( tvb , offset , length ) ) ;
1999-06-11 15:30:55 +00:00
}
2000-05-11 18:55:40 +00:00
static void
2001-10-26 10:30:16 +00:00
dissect_config ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2001-02-28 10:22:29 +00:00
{
guint8 type ;
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
type = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
2005-06-16 06:19:03 +00:00
" Type %s (%u) " ,
cfgtype2str ( isakmp_version , type ) , type ) ;
2005-03-15 09:58:58 +00:00
offset + = 2 ;
length - = 2 ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" Identifier: %u " , tvb_get_ntohs ( tvb , offset ) ) ;
offset + = 2 ;
length - = 2 ;
} else if ( isakmp_version = = 2 ) {
type = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
2005-06-16 06:19:03 +00:00
" CFG Type %s (%u) " ,
cfgtype2str ( isakmp_version , type ) , type ) ;
2005-03-15 09:58:58 +00:00
offset + = 4 ;
length - = 4 ;
}
2002-08-28 21:04:11 +00:00
2001-02-28 10:22:29 +00:00
while ( length > 0 ) {
guint16 aft = tvb_get_ntohs ( tvb , offset ) ;
guint16 type = aft & 0x7fff ;
guint16 len ;
guint32 val ;
guint pack_len ;
if ( aft & 0x8000 ) {
val = tvb_get_ntohs ( tvb , offset + 2 ) ;
proto_tree_add_text ( tree , tvb , offset , 4 ,
2005-06-16 06:19:03 +00:00
" %s (%u) " ,
cfgattr2str ( isakmp_version , type ) , val ) ;
2000-05-21 19:59:02 +00:00
offset + = 4 ;
2001-02-28 10:22:29 +00:00
length - = 4 ;
2000-05-21 19:59:02 +00:00
}
else {
2001-02-28 10:22:29 +00:00
len = tvb_get_ntohs ( tvb , offset + 2 ) ;
pack_len = 4 + len ;
if ( ! get_num ( tvb , offset + 4 , len , & val ) ) {
proto_tree_add_text ( tree , tvb , offset , pack_len ,
" %s: <too big (%u bytes)> " ,
2005-06-16 06:19:03 +00:00
cfgattr2str ( isakmp_version , type ) , len ) ;
2001-02-28 10:22:29 +00:00
} else {
proto_tree_add_text ( tree , tvb , offset , 4 ,
2005-06-16 06:19:03 +00:00
" %s (%ue) " ,
cfgattr2str ( isakmp_version , type ) , val ) ;
2001-02-28 10:22:29 +00:00
}
2000-05-21 19:59:02 +00:00
offset + = pack_len ;
2001-02-28 10:22:29 +00:00
length - = pack_len ;
2000-05-21 19:59:02 +00:00
}
}
2000-05-11 18:55:40 +00:00
}
2003-10-08 05:36:19 +00:00
static void
dissect_nat_discovery ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2003-10-08 05:36:19 +00:00
{
proto_tree_add_text ( tree , tvb , offset , length ,
" Hash of address and port: %s " ,
tvb_bytes_to_str ( tvb , offset , length ) ) ;
}
static void
dissect_nat_original_address ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version , int unused _U_ )
2003-10-08 05:36:19 +00:00
{
guint8 id_type ;
guint32 addr_ipv4 ;
struct e_in6_addr addr_ipv6 ;
id_type = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
2005-06-16 06:19:03 +00:00
" ID type: %s (%u) " ,
id2str ( isakmp_version , id_type ) , id_type ) ;
2003-10-08 05:36:19 +00:00
offset + = 1 ;
length - = 1 ;
offset + = 3 ; /* reserved */
length - = 3 ;
switch ( id_type ) {
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV4_ADDR :
2003-10-08 05:36:19 +00:00
if ( length = = 4 ) {
2005-09-11 21:25:37 +00:00
addr_ipv4 = tvb_get_ipv4 ( tvb , offset ) ;
2003-10-08 05:36:19 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Original address: %s " ,
ip_to_str ( ( guint8 * ) & addr_ipv4 ) ) ;
} else {
proto_tree_add_text ( tree , tvb , offset , length ,
" Original address: bad length, should be 4, is %u " ,
length ) ;
}
break ;
2005-10-12 05:36:44 +00:00
case IKE_ID_IPV6_ADDR :
2003-10-08 05:36:19 +00:00
if ( length = = 16 ) {
2005-09-11 21:25:37 +00:00
tvb_get_ipv6 ( tvb , offset , & addr_ipv6 ) ;
2003-10-08 05:36:19 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Original address: %s " ,
ip6_to_str ( & addr_ipv6 ) ) ;
} else {
proto_tree_add_text ( tree , tvb , offset , length ,
" Original address: bad length, should be 16, is %u " ,
length ) ;
}
break ;
default :
proto_tree_add_text ( tree , tvb , offset , length ,
" Original address: bad address type " ) ;
break ;
}
}
2005-03-15 09:58:58 +00:00
static void
dissect_ts ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2005-03-15 09:58:58 +00:00
{
2005-03-20 12:07:00 +00:00
guint8 num , tstype , protocol_id , addrlen ;
guint16 len , port ;
2005-03-15 09:58:58 +00:00
proto_tree_add_text ( tree , tvb , offset , length , " Traffic Selector " ) ;
num = tvb_get_guint8 ( tvb , offset ) ;
proto_item_append_text ( tree , " # %d " , num ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" Number of TSs: %u " , num ) ;
offset + = 4 ;
length - = 4 ;
while ( length > 0 ) {
tstype = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" TS Type: %s (%u) " ,
v2_tstype2str ( tstype ) , tstype ) ;
switch ( tstype ) {
2005-10-12 05:36:44 +00:00
case IKEV2_TS_IPV4_ADDR_RANGE :
2005-03-15 09:58:58 +00:00
addrlen = 4 ;
break ;
2005-10-12 05:36:44 +00:00
case IKEV2_TS_IPV6_ADDR_RANGE :
2005-03-15 09:58:58 +00:00
addrlen = 16 ;
break ;
default :
2005-09-24 15:42:37 +00:00
proto_item_append_text ( tree , " unknown TS data (aborted decoding): 0x%s " ,
tvb_bytes_to_str ( tvb , offset , length ) ) ;
return ;
2005-03-15 09:58:58 +00:00
}
2005-09-24 15:42:37 +00:00
2005-03-15 09:58:58 +00:00
/*
* XXX should the remaining of the length check be done here ?
* it seems other routines don ' t check the length .
*/
if ( length < ( 8 + addrlen * 2 ) ) {
proto_tree_add_text ( tree , tvb , offset , length ,
" Length mismatch (%u) " , length ) ;
return ;
}
offset + = 1 ;
length - = 1 ;
protocol_id = tvb_get_guint8 ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 1 ,
" Protocol ID: (%u) " , protocol_id ) ;
offset + = 1 ;
length - = 1 ;
len = tvb_get_ntohs ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" Selector Length: %u " , len ) ;
offset + = 2 ;
length - = 2 ;
port = tvb_get_ntohs ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" Start Port: (%u) " , port ) ;
offset + = 2 ;
length - = 2 ;
port = tvb_get_ntohs ( tvb , offset ) ;
proto_tree_add_text ( tree , tvb , offset , 2 ,
" End Port: (%u) " , port ) ;
offset + = 2 ;
length - = 2 ;
2005-09-24 15:42:37 +00:00
switch ( tstype ) {
2005-10-12 05:36:44 +00:00
case IKEV2_TS_IPV4_ADDR_RANGE :
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Starting Address: %s " ,
ip_to_str ( tvb_get_ptr ( tvb , offset , addrlen ) ) ) ;
offset + = addrlen ;
length - = addrlen ;
proto_tree_add_text ( tree , tvb , offset , length ,
" Ending Address: %s " ,
2005-03-15 09:58:58 +00:00
ip_to_str ( tvb_get_ptr ( tvb , offset , addrlen ) ) ) ;
2005-09-24 15:42:37 +00:00
offset + = addrlen ;
length - = addrlen ;
break ;
2005-10-12 05:36:44 +00:00
case IKEV2_TS_IPV6_ADDR_RANGE :
2005-09-24 15:42:37 +00:00
proto_tree_add_text ( tree , tvb , offset , length ,
" Starting Address: %s " ,
2005-09-24 19:09:40 +00:00
ip6_to_str ( ( const struct e_in6_addr * ) tvb_get_ptr ( tvb , offset , addrlen ) ) ) ;
2005-09-24 15:42:37 +00:00
offset + = addrlen ;
length - = addrlen ;
proto_tree_add_text ( tree , tvb , offset , length ,
" Ending Address: %s " ,
2005-09-24 19:09:40 +00:00
ip6_to_str ( ( const struct e_in6_addr * ) tvb_get_ptr ( tvb , offset , addrlen ) ) ) ;
2005-09-24 15:42:37 +00:00
offset + = addrlen ;
length - = addrlen ;
break ;
}
2005-03-15 09:58:58 +00:00
}
}
static void
dissect_enc ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2005-03-15 09:58:58 +00:00
{
proto_tree_add_text ( tree , tvb , offset , 4 , " Initialization Vector: 0x%s " ,
2005-03-20 22:24:51 +00:00
tvb_bytes_to_str ( tvb , offset , 4 ) ) ;
2005-03-15 09:58:58 +00:00
proto_tree_add_text ( tree , tvb , offset + 4 , length , " Encrypted Data " ) ;
}
1999-06-11 15:30:55 +00:00
2005-03-15 09:58:58 +00:00
static void
dissect_eap ( tvbuff_t * tvb , int offset , int length , proto_tree * tree ,
2005-06-16 06:19:03 +00:00
packet_info * pinfo _U_ , int isakmp_version _U_ , int unused _U_ )
2005-03-15 09:58:58 +00:00
{
2006-12-06 22:03:45 +00:00
tvbuff_t * eap_tvb = NULL ;
eap_tvb = tvb_new_subset ( tvb , offset , length , length ) ;
if ( ( eap_tvb ! = NULL ) & & eap_handle ! = NULL ) {
call_dissector ( eap_handle , eap_tvb , pinfo , tree ) ;
} else {
proto_tree_add_text ( tree , tvb , offset , length , " EAP Message " ) ;
}
2005-03-15 09:58:58 +00:00
}
static const char *
2005-06-16 06:19:03 +00:00
payloadtype2str ( int isakmp_version , guint8 type )
2005-03-15 09:58:58 +00:00
{
struct payload_func * f ;
2005-06-16 06:19:03 +00:00
if ( ( f = getpayload_func ( type , isakmp_version ) ) ! = NULL )
2005-03-15 09:58:58 +00:00
return f - > str ;
if ( isakmp_version = = 1 ) {
if ( type < 128 )
return " RESERVED " ;
return " Private USE " ;
} else if ( isakmp_version = = 2 ) {
if ( type > 127 )
return " PRIVATE USE " ;
if ( type > 48 )
return " RESERVED TO IANA " ;
2003-06-24 05:54:41 +00:00
return " RESERVED " ;
2005-03-15 09:58:58 +00:00
}
return " UNKNOWN-ISAKMP-VERSION " ;
1999-06-11 15:30:55 +00:00
}
static const char *
2005-06-16 06:19:03 +00:00
exchtype2str ( int isakmp_version , guint8 type )
2005-03-15 09:58:58 +00:00
{
static const value_string vs_v1_exchange [ ] = {
{ 0 , " NONE " } ,
{ 1 , " Base " } ,
{ 2 , " Identity Protection (Main Mode) " } ,
{ 3 , " Authentication Only " } ,
{ 4 , " Aggressive " } ,
{ 5 , " Informational " } ,
{ 6 , " Transaction (Config Mode) " } ,
{ 32 , " Quick Mode " } ,
{ 33 , " New Group Mode " } ,
{ 0 , NULL } ,
1999-06-11 15:30:55 +00:00
} ;
2002-08-28 21:04:11 +00:00
2005-03-15 09:58:58 +00:00
static const value_string vs_v2_exchange [ ] = {
{ 34 , " IKE_SA_INIT " } ,
{ 35 , " IKE_AUTH " } ,
{ 36 , " CREATE_CHILD_SA " } ,
2005-07-22 02:00:04 +00:00
{ 37 , " INFORMATIONAL " } ,
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
if ( isakmp_version = = 1 ) {
if ( type > 6 & & type < 32 )
return " ISAKMP Future Use " ;
if ( type > 33 & & type < 240 )
return " DOI Specific Use " ;
return val_to_str ( type , vs_v1_exchange , " Private Use " ) ;
} else if ( isakmp_version = = 2 ) {
if ( type < 34 )
return " RESERVED " ;
if ( type > 37 & & type < 240 )
return " Reserved for IKEv2+ " ;
return val_to_str ( type , vs_v2_exchange , " Reserved for private use " ) ;
1999-12-06 03:39:34 +00:00
}
2005-03-15 09:58:58 +00:00
return " UNKNOWN-ISAKMP-VERSION " ;
1999-06-11 15:30:55 +00:00
}
static const char *
2005-03-15 09:58:58 +00:00
doitype2str ( guint32 type )
{
1999-06-11 15:30:55 +00:00
if ( type = = 1 ) return " IPSEC " ;
return " Unknown DOI Type " ;
}
static const char *
2005-06-16 06:19:03 +00:00
msgtype2str ( int isakmp_version , guint16 type )
2005-03-15 09:58:58 +00:00
{
static const value_string vs_v1_notifmsg [ ] = {
{ 0 , " <UNKNOWN> " } ,
{ 1 , " INVALID-PAYLOAD-TYPE " } ,
{ 2 , " DOI-NOT-SUPPORTED " } ,
{ 3 , " SITUATION-NOT-SUPPORTED " } ,
{ 4 , " INVALID-COOKIE " } ,
{ 5 , " INVALID-MAJOR-VERSION " } ,
{ 6 , " INVALID-MINOR-VERSION " } ,
{ 7 , " INVALID-EXCHANGE-TYPE " } ,
{ 8 , " INVALID-FLAGS " } ,
{ 9 , " INVALID-MESSAGE-ID " } ,
{ 10 , " INVALID-PROTOCOL-ID " } ,
{ 11 , " INVALID-SPI " } ,
{ 12 , " INVALID-TRANSFORM-ID " } ,
{ 13 , " ATTRIBUTES-NOT-SUPPORTED " } ,
{ 14 , " NO-PROPOSAL-CHOSEN " } ,
{ 15 , " BAD-PROPOSAL-SYNTAX " } ,
{ 16 , " PAYLOAD-MALFORMED " } ,
{ 17 , " INVALID-KEY-INFORMATION " } ,
{ 18 , " INVALID-ID-INFORMATION " } ,
{ 19 , " INVALID-CERT-ENCODING " } ,
{ 20 , " INVALID-CERTIFICATE " } ,
{ 21 , " CERT-TYPE-UNSUPPORTED " } ,
{ 22 , " INVALID-CERT-AUTHORITY " } ,
{ 23 , " INVALID-HASH-INFORMATION " } ,
{ 24 , " AUTHENTICATION-FAILED " } ,
{ 25 , " INVALID-SIGNATURE " } ,
{ 26 , " ADDRESS-NOTIFICATION " } ,
{ 27 , " NOTIFY-SA-LIFETIME " } ,
{ 28 , " CERTIFICATE-UNAVAILABLE " } ,
{ 29 , " UNSUPPORTED-EXCHANGE-TYPE " } ,
{ 30 , " UNEQUAL-PAYLOAD-LENGTHS " } ,
{ 8192 , " RESERVED " } ,
2005-07-22 02:07:43 +00:00
{ 16384 , " CONNECTED " } ,
{ 24576 , " RESPONDER-LIFETIME " } ,
{ 24577 , " REPLAY-STATUS " } ,
2005-03-15 09:58:58 +00:00
{ 24578 , " INITIAL-CONTACT " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v2_notifmsg [ ] = {
{ 0 , " RESERVED " } ,
{ 4 , " INVALID_IKE_SPI " } ,
{ 5 , " INVALID_MAJOR_VERSION " } ,
{ 7 , " INVALID_SYNTAX " } ,
{ 9 , " INVALID_MESSAGE_ID " } ,
{ 11 , " INVALID_SPI " } ,
{ 14 , " NO_PROPOSAL_CHOSEN " } ,
{ 17 , " INVALID_KE_PAYLOAD " } ,
{ 24 , " AUTHENTICATION_FAILED " } ,
{ 34 , " SINGLE_PAIR_REQUIRED " } ,
{ 35 , " NO_ADDITIONAL_SAS " } ,
{ 36 , " INTERNAL_ADDRESS_FAILURE " } ,
{ 37 , " FAILED_CP_REQUIRED " } ,
{ 38 , " TS_UNACCEPTABLE " } ,
{ 39 , " INVALID_SELECTORS " } ,
2006-08-10 03:11:33 +00:00
{ 40 , " UNACCEPTABLE_ADDRESSES " } ,
{ 41 , " UNEXPECTED_NAT_DETECTED " } ,
2005-03-15 09:58:58 +00:00
{ 16384 , " INITIAL_CONTACT " } ,
{ 16385 , " SET_WINDOW_SIZE " } ,
{ 16386 , " ADDITIONAL_TS_POSSIBLE " } ,
{ 16387 , " IPCOMP_SUPPORTED " } ,
{ 16388 , " NAT_DETECTION_SOURCE_IP " } ,
{ 16389 , " NAT_DETECTION_DESTINATION_IP " } ,
{ 16390 , " COOKIE " } ,
{ 16391 , " USE_TRANSPORT_MODE " } ,
{ 16392 , " HTTP_CERT_LOOKUP_SUPPORTED " } ,
{ 16393 , " REKEY_SA " } ,
{ 16394 , " ESP_TFC_PADDING_NOT_SUPPORTED " } ,
{ 16395 , " NON_FIRST_FRAGMENTS_ALSO " } ,
2006-08-10 03:11:33 +00:00
{ 16396 , " MOBIKE_SUPPORTED " } ,
{ 16397 , " ADDITIONAL_IP4_ADDRESS " } ,
{ 16398 , " ADDITIONAL_IP6_ADDRESS " } ,
{ 16399 , " NO_ADDITIONAL_ADDRESSES " } ,
{ 16400 , " UPDATE_SA_ADDRESSES " } ,
{ 16401 , " COOKIE2 " } ,
{ 16402 , " NO_NATS_ALLOWED " } ,
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
1999-06-11 15:30:55 +00:00
} ;
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
if ( type > 30 & & type < 8192 )
return " RESERVED (Future Use) " ;
if ( type > 8192 & & type < 16384 )
return " Private Use " ;
if ( type > 16384 & & type < 24576 )
return " RESERVED (Future Use) - status " ;
if ( type > 24578 & & type < 32768 )
return " DOI-specific codes " ;
if ( type > 32767 & & type < 40960 )
return " Private Use - status " ;
if ( type > 40959 & & type < 65535 )
return " RESERVED (Future Use) - status (2) " ;
return val_to_str ( type , vs_v1_notifmsg , " UNKNOWN-NOTIFY-MESSAGE-TYPE " ) ;
} else if ( isakmp_version = = 2 ) {
2006-08-10 03:11:33 +00:00
if ( type > = 42 & & type < = 8191 )
2005-03-15 09:58:58 +00:00
return " RESERVED TO IANA - Error types " ;
2006-08-10 03:11:33 +00:00
if ( type > = 16403 & & type < = 40959 )
2005-03-15 09:58:58 +00:00
return " RESERVED TO IANA - STATUS TYPES " ;
if ( type > = 8192 & & type < = 16383 )
return " Private Use - Errors " ;
2005-03-16 19:41:33 +00:00
if ( type > = 40960 )
2005-03-15 09:58:58 +00:00
return " Private Use - STATUS TYPES " ;
return val_to_str ( type , vs_v2_notifmsg , " UNKNOWN-NOTIFY-MESSAGE-TYPE " ) ;
2006-02-09 17:32:14 +00:00
}
2005-03-15 09:58:58 +00:00
return " UNKNOWN-ISAKMP-VERSION " ;
1999-06-11 15:30:55 +00:00
}
static const char *
2005-03-15 09:58:58 +00:00
situation2str ( guint32 type )
{
1999-06-11 15:30:55 +00:00
# define SIT_MSG_NUM 1024
# define SIT_IDENTITY 0x01
# define SIT_SECRECY 0x02
# define SIT_INTEGRITY 0x04
static char msg [ SIT_MSG_NUM ] ;
int n = 0 ;
2005-07-30 16:34:38 +00:00
const char * sep = " " ;
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
int ret ;
2002-08-28 21:04:11 +00:00
1999-06-11 15:30:55 +00:00
if ( type & SIT_IDENTITY ) {
2005-08-17 23:10:28 +00:00
ret = g_snprintf ( msg , SIT_MSG_NUM - n , " %sIDENTITY " , sep ) ;
2003-05-24 17:45:10 +00:00
if ( ret = = - 1 | | ret > = SIT_MSG_NUM - n ) {
/* Truncated. */
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
return msg ;
}
n + = ret ;
1999-06-11 15:30:55 +00:00
sep = " & " ;
}
if ( type & SIT_SECRECY ) {
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
if ( n > = SIT_MSG_NUM ) {
/* No more room. */
return msg ;
}
2005-08-17 23:10:28 +00:00
ret = g_snprintf ( msg , SIT_MSG_NUM - n , " %sSECRECY " , sep ) ;
2003-05-24 17:45:10 +00:00
if ( ret = = - 1 | | ret > = SIT_MSG_NUM - n ) {
/* Truncated. */
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
return msg ;
}
n + = ret ;
1999-06-11 15:30:55 +00:00
sep = " & " ;
}
if ( type & SIT_INTEGRITY ) {
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
if ( n > = SIT_MSG_NUM ) {
/* No more room. */
return msg ;
}
2005-08-17 23:10:28 +00:00
ret = g_snprintf ( msg , SIT_MSG_NUM - n , " %sINTEGRITY " , sep ) ;
2003-05-24 17:45:10 +00:00
if ( ret = = - 1 | | ret > = SIT_MSG_NUM - n ) {
/* Truncated. */
If "snprintf()" can't print all the data because there's not enough
room, it might return -1 in some versions of glibc; check for that, and
quit if that happens.
It might also return the number of characters that would've been printed
had there been enough room; this means that a loop that does
n += snprintf (buf + n, BUF_LENGTH - n, ...);
may end up making "n" bigger than BUF_LENGTH, and "snprintf()" might not
sanely handle being passed a negative length, so if "n" isn't less than
the total length of the string buffer, don't add stuff to it.
The "capabilitiesStart" variable in "add_capabilities()" in the WSP
dissector is an offset into the PDU data; there's no guarantee that said
offet is < 256, and, even if there were, there's no point in making it
an 8-bit variable.
Add some additional buffer overflow checks to the WSP dissector.
svn path=/trunk/; revision=3953
2001-09-25 18:27:35 +00:00
return msg ;
}
n + = ret ;
1999-06-11 15:30:55 +00:00
sep = " & " ;
}
return msg ;
}
static const char *
2005-03-15 09:58:58 +00:00
v2_attrval2str ( guint16 att_type , guint32 value )
{
value = 0 ; /* dummy to be less warning in compiling it */
switch ( att_type ) {
case 14 :
return " Key-Length " ;
default :
return " UNKNOWN-ATTRIBUTE-TYPE " ;
}
}
static const char *
v1_attrval2str ( int ike_p1 , guint16 att_type , guint32 value )
{
static const value_string vs_v1_attrval_lttype [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " Seconds " } ,
{ 2 , " Kilobytes " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_encap [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " Tunnel " } ,
{ 2 , " Transport " } ,
{ 3 , " UDP-Encapsulated-Tunnel " } , /* http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-05.txt */
{ 4 , " UDP-Encapsulated-Transport " } , /* http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-05.txt */
{ 61440 , " Check Point IPSec UDP Encapsulation " } ,
{ 61443 , " UDP-Encapsulated-Tunnel (draft) " } ,
{ 61444 , " UDP-Encapsulated-Transport (draft) " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_auth [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " HMAC-MD5 " } ,
{ 2 , " HMAC-SHA " } ,
{ 3 , " DES-MAC " } ,
{ 4 , " KPDK " } ,
{ 5 , " HMAC-SHA2-256 " } ,
{ 6 , " HMAC-SHA2-384 " } ,
{ 7 , " HMAC-SHA2-512 " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_enc [ ] = {
2006-02-09 17:32:14 +00:00
{ 0 , " RESERVED " } ,
{ ENC_DES_CBC , " DES-CBC " } ,
{ ENC_IDEA_CBC , " IDEA-CBC " } ,
{ ENC_BLOWFISH_CBC , " BLOWFISH-CBC " } ,
{ ENC_RC5_R16_B64_CBC , " RC5-R16-B64-CBC " } ,
{ ENC_3DES_CBC , " 3DES-CBC " } ,
{ ENC_CAST_CBC , " CAST-CBC " } ,
{ ENC_AES_CBC , " AES-CBC " } ,
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_hash [ ] = {
2006-02-09 17:32:14 +00:00
{ 0 , " RESERVED " } ,
{ HMAC_MD5 , " MD5 " } ,
{ HMAC_SHA , " SHA " } ,
{ HMAC_TIGER , " TIGER " } ,
{ HMAC_SHA2_256 , " SHA2-256 " } ,
{ HMAC_SHA2_384 , " SHA2-384 " } ,
{ HMAC_SHA2_512 , " SHA2-512 " } ,
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_authmeth [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " PSK " } ,
{ 2 , " DSS-SIG " } ,
{ 3 , " RSA-SIG " } ,
{ 4 , " RSA-ENC " } ,
{ 5 , " RSA-Revised-ENC " } ,
{ 6 , " Encryption with El-Gamal " } ,
{ 7 , " Revised encryption with El-Gamal " } ,
{ 8 , " ECDSA signatures " } ,
{ 9 , " AES-XCBC-MAC " } ,
{ 64221 , " HybridInitRSA " } ,
{ 64222 , " HybridRespRSA " } ,
{ 64223 , " HybridInitDSS " } ,
{ 64224 , " HybridRespDSS " } ,
{ 65001 , " XAUTHInitPreShared " } ,
{ 65002 , " XAUTHRespPreShared " } ,
{ 65003 , " XAUTHInitDSS " } ,
{ 65004 , " XAUTHRespDSS " } ,
{ 65005 , " XAUTHInitRSA " } ,
{ 65006 , " XAUTHRespRSA " } ,
{ 65007 , " XAUTHInitRSAEncryption " } ,
{ 65008 , " XAUTHRespRSAEncryption " } ,
{ 65009 , " XAUTHInitRSARevisedEncryption " } ,
{ 65010 , " XAUTHRespRSARevisedEncryption " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_grpdesc [ ] = {
{ 0 , " UNDEFINED - 0 " } ,
{ 1 , " Default 768-bit MODP group " } ,
{ 2 , " Alternate 1024-bit MODP group " } ,
{ 3 , " EC2N group on GP[2^155] group " } ,
{ 4 , " EC2N group on GP[2^185] group " } ,
{ 5 , " 1536 bit MODP group " } ,
{ 6 , " EC2N group over GF[2^163] " } ,
{ 7 , " EC2N group over GF[2^163] " } ,
{ 8 , " EC2N group over GF[2^283] " } ,
{ 9 , " EC2N group over GF[2^283] " } ,
{ 10 , " EC2N group over GF[2^409] " } ,
{ 11 , " EC2N group over GF[2^409] " } ,
{ 12 , " EC2N group over GF[2^571] " } ,
{ 13 , " EC2N group over GF[2^571] " } ,
{ 14 , " 2048 bit MODP group " } ,
{ 15 , " 3072 bit MODP group " } ,
{ 16 , " 4096 bit MODP group " } ,
{ 17 , " 6144 bit MODP group " } ,
{ 18 , " 8192 bit MODP group " } ,
2006-04-18 11:52:28 +00:00
{ 19 , " 256-bit random curve group " } ,
{ 20 , " 384-bit random curve group " } ,
{ 21 , " 521-bit random curve group " } ,
{ 22 , " 192-bit random curve group " } ,
{ 23 , " EC2N group over GF[2^163] " } ,
{ 24 , " 224-bit random curve group " } ,
{ 25 , " EC2N group over GF[2^233] " } ,
{ 26 , " EC2N group over GF[2^233] " } ,
{ 0 , NULL }
2005-03-15 09:58:58 +00:00
} ;
static const value_string vs_v1_attrval_grptype [ ] = {
{ 0 , " UNDEFINED - 0 " } ,
{ 1 , " MODP " } ,
{ 2 , " ECP " } ,
{ 3 , " EC2N " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v1_attrval_lifetype [ ] = {
{ 0 , " UNDEFINED - 0 " } ,
{ 1 , " Seconds " } ,
{ 2 , " Kilobytes " } ,
{ 0 , NULL } ,
} ;
2002-08-28 21:04:11 +00:00
1999-06-11 15:30:55 +00:00
if ( value = = 0 ) return " RESERVED " ;
2002-08-28 21:04:11 +00:00
1999-12-06 03:39:34 +00:00
if ( ! ike_p1 ) {
2003-12-13 02:24:48 +00:00
switch ( att_type ) {
case 1 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_lttype , " UNKNOWN-LIFETIME-TYPE " ) ;
2003-12-13 02:24:48 +00:00
case 2 :
return " Duration-Value " ;
case 3 :
return " Group-Value " ;
case 4 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_encap , " UNKNOWN-ENCAPSULATION-VALUE " ) ;
2003-12-13 02:24:48 +00:00
case 5 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_auth , " UNKNOWN-AUTHENTICATION-VALUE " ) ;
2003-12-13 02:24:48 +00:00
case 6 :
return " Key-Length " ;
case 7 :
return " Key-Rounds " ;
case 8 :
return " Compress-Dictionary-size " ;
case 9 :
return " Compress Private Algorithm " ;
2005-03-15 09:58:58 +00:00
default :
return " UNKNOWN-ATTRIBUTE-TYPE " ;
2003-12-13 02:24:48 +00:00
}
1999-12-06 03:39:34 +00:00
}
else {
switch ( att_type ) {
case 1 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_enc , " UNKNOWN-ENCRYPTION-ALG " ) ;
1999-12-06 03:39:34 +00:00
case 2 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_hash , " UNKNOWN-HASH-ALG " ) ;
1999-12-06 03:39:34 +00:00
case 3 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_authmeth , " UNKNOWN-AUTH-METHOD " ) ;
case 4 :
return val_to_str ( value , vs_v1_attrval_grpdesc , " UNKNOWN-GROUP-DESCRIPTION " ) ;
2002-08-28 21:04:11 +00:00
case 6 :
1999-12-06 03:39:34 +00:00
case 7 :
case 8 :
case 9 :
case 10 :
case 16 :
return " Group-Value " ;
case 5 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_grptype , " UNKNOWN-GROUP-TYPE " ) ;
1999-12-06 03:39:34 +00:00
case 11 :
2005-03-15 09:58:58 +00:00
return val_to_str ( value , vs_v1_attrval_lifetype , " UNKNOWN-LIFE-TYPE " ) ;
1999-12-06 03:39:34 +00:00
case 12 :
return " Duration-Value " ;
case 13 :
return " PRF-Value " ;
case 14 :
return " Key-Length " ;
case 15 :
return " Field-Size " ;
2005-03-15 09:58:58 +00:00
default :
return " UNKNOWN-ATTRIBUTE-TYPE " ;
1999-12-06 03:39:34 +00:00
}
}
1999-06-11 15:30:55 +00:00
}
2002-08-28 21:04:11 +00:00
static const char *
2005-06-16 06:19:03 +00:00
cfgtype2str ( int isakmp_version , guint8 type )
2005-03-15 09:58:58 +00:00
{
static const value_string vs_v1_cfgtype [ ] = {
{ 0 , " Reserved " } ,
{ 1 , " ISAKMP_CFG_REQUEST " } ,
{ 2 , " ISAKMP_CFG_REPLY " } ,
{ 3 , " ISAKMP_CFG_SET " } ,
{ 4 , " ISAKMP_CFG_ACK " } ,
{ 0 , NULL } ,
} ;
2005-03-15 10:05:54 +00:00
#if 0
2005-03-15 09:58:58 +00:00
static const value_string vs_v2_cfgtype [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " CFG_REQUEST " } ,
{ 2 , " CFG_REPLY " } ,
{ 3 , " CFG_SET " } ,
{ 4 , " CFG_ACK " } ,
{ 0 , NULL } ,
} ;
2005-03-15 10:05:54 +00:00
# endif
2005-03-15 09:58:58 +00:00
if ( isakmp_version = = 1 ) {
if ( type > = 5 & & type < = 127 )
return " Future use " ;
2005-03-16 19:41:33 +00:00
if ( type > = 128 )
2005-03-15 09:58:58 +00:00
return " Private Use " ;
return val_to_str ( type , vs_v1_cfgtype , " UNKNOWN-CFG-TYPE " ) ;
} else if ( isakmp_version = = 2 ) {
if ( type > = 5 & & type < = 127 )
return " RESERVED TO IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 128 )
2005-03-15 09:58:58 +00:00
return " PRIVATE USE " ;
return val_to_str ( type , vs_v1_cfgtype , " UNKNOWN-CFG-TYPE " ) ;
2000-05-11 18:55:40 +00:00
}
2005-03-15 09:58:58 +00:00
return " UNKNOWN-ISAKMP-VERSION " ;
2000-05-11 18:55:40 +00:00
}
2002-08-28 21:04:11 +00:00
static const char *
2005-06-16 06:19:03 +00:00
id2str ( int isakmp_version , guint8 type )
2005-03-15 09:58:58 +00:00
{
2005-10-12 05:36:44 +00:00
static const value_string vs_ident [ ] = {
2006-09-29 05:51:44 +00:00
{ IKE_ID_IPV4_ADDR , " IPV4_ADDR " } ,
{ IKE_ID_FQDN , " FQDN " } ,
{ IKE_ID_USER_FQDN , " USER_FQDN " } ,
2005-10-12 05:36:44 +00:00
{ IKE_ID_IPV4_ADDR_SUBNET , " IPV4_ADDR_SUBNET " } ,
2006-09-29 05:51:44 +00:00
{ IKE_ID_IPV6_ADDR , " IPV6_ADDR " } ,
2005-10-12 05:36:44 +00:00
{ IKE_ID_IPV6_ADDR_SUBNET , " IPV6_ADDR_SUBNET " } ,
{ IKE_ID_IPV4_ADDR_RANGE , " IPV4_ADDR_RANGE " } ,
{ IKE_ID_IPV6_ADDR_RANGE , " IPV6_ADDR_RANGE " } ,
2006-09-29 05:51:44 +00:00
{ IKE_ID_DER_ASN1_DN , " DER_ASN1_DN " } ,
{ IKE_ID_DER_ASN1_GN , " DER_ASN1_GN " } ,
{ IKE_ID_KEY_ID , " KEY_ID " } ,
2005-10-12 05:36:44 +00:00
{ 0 , NULL } ,
2005-03-15 09:58:58 +00:00
} ;
2005-10-12 05:36:44 +00:00
if ( isakmp_version = = 1 ) {
if ( type = = 0 )
return " RESERVED " ;
return val_to_str ( type , vs_ident , " UNKNOWN-ID-TYPE " ) ;
} else if ( isakmp_version = = 2 ) {
if ( type = = 4 | | ( type > = 6 & & type < = 8 ) | | ( type > = 12 & & type < = 200 ) )
2005-03-15 09:58:58 +00:00
return " Reserved to IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 201 )
2005-03-15 09:58:58 +00:00
return " Reserved for private use " ;
2005-10-12 05:36:44 +00:00
if ( type = = IKE_ID_USER_FQDN )
return " RFC822_ADDR " ;
return val_to_str ( type , vs_ident , " UNKNOWN-ID-TYPE " ) ;
2000-05-22 17:59:53 +00:00
}
2005-03-15 09:58:58 +00:00
return " UNKNOWN-ISAKMP-VERSION " ;
2000-05-11 18:55:40 +00:00
}
2001-02-13 20:47:17 +00:00
static const char *
2005-03-15 09:58:58 +00:00
v2_tstype2str ( guint8 type )
{
static const value_string vs_v2_tstype [ ] = {
2005-10-12 05:36:44 +00:00
{ IKEV2_TS_IPV4_ADDR_RANGE , " TS_IPV4_ADDR_RANGE " } ,
{ IKEV2_TS_IPV6_ADDR_RANGE , " TS_IPV6_ADDR_RANGE " } ,
2005-03-15 09:58:58 +00:00
{ 0 , NULL } ,
2001-02-13 20:47:17 +00:00
} ;
2005-03-15 09:58:58 +00:00
if ( type < = 6 )
2001-02-13 20:47:17 +00:00
return " RESERVED " ;
2005-03-15 09:58:58 +00:00
if ( type > = 9 & & type < = 240 )
return " RESERVED TO IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 241 )
2005-03-15 09:58:58 +00:00
return " PRIVATE USE " ;
return val_to_str ( type , vs_v2_tstype , " UNKNOWN-TS-TYPE " ) ;
2001-02-13 20:47:17 +00:00
}
2005-03-15 09:58:58 +00:00
static const char *
v2_auth2str ( guint8 type )
{
static const value_string vs_v2_authmeth [ ] = {
{ 0 , " RESERVED TO IANA " } ,
{ 1 , " RSA Digital Signature " } ,
{ 2 , " Shared Key Message Integrity Code " } ,
{ 3 , " DSS Digital Signature " } ,
{ 0 , NULL } ,
} ;
if ( type > = 4 & & type < = 200 )
return " RESERVED TO IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 201 )
2005-03-15 09:58:58 +00:00
return " PRIVATE USE " ;
return val_to_str ( type , vs_v2_authmeth , " UNKNOWN-AUTHMETHOD-TYPE " ) ;
}
1999-06-11 15:30:55 +00:00
2005-03-15 09:58:58 +00:00
static const char *
2005-06-16 06:19:03 +00:00
cfgattr2str ( int isakmp_version , guint16 ident )
2005-03-15 09:58:58 +00:00
{
static const value_string vs_v1_cfgattr [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " INTERNAL_IP4_ADDRESS " } ,
{ 2 , " INTERNAL_IP4_NETMASK " } ,
{ 3 , " INTERNAL_IP4_DNS " } ,
{ 4 , " INTERNAL_IP4_NBNS " } ,
{ 5 , " INTERNAL_ADDRESS_EXPIREY " } ,
{ 6 , " INTERNAL_IP4_DHCP " } ,
{ 7 , " APPLICATION_VERSION " } ,
{ 8 , " INTERNAL_IP6_ADDRESS " } ,
{ 9 , " INTERNAL_IP6_NETMASK " } ,
{ 10 , " INTERNAL_IP6_DNS " } ,
{ 11 , " INTERNAL_IP6_NBNS " } ,
{ 12 , " INTERNAL_IP6_DHCP " } ,
{ 13 , " INTERNAL_IP4_SUBNET " } ,
{ 14 , " SUPPORTED_ATTRIBUTES " } ,
{ 16520 , " XAUTH_TYPE " } ,
{ 16521 , " XAUTH_USER_NAME " } ,
{ 16522 , " XAUTH_USER_PASSWORD " } ,
{ 16523 , " XAUTH_PASSCODE " } ,
{ 16524 , " XAUTH_MESSAGE " } ,
{ 16525 , " XAUTH_CHALLANGE " } ,
{ 16526 , " XAUTH_DOMAIN " } ,
{ 16527 , " XAUTH_STATUS " } ,
{ 16528 , " XAUTH_NEXT_PIN " } ,
{ 16529 , " XAUTH_ANSWER " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v2_cfgattr [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " INTERNAL_IP4_ADDRESS " } ,
{ 2 , " INTERNAL_IP4_NETMASK " } ,
{ 3 , " INTERNAL_IP4_DNS " } ,
{ 4 , " INTERNAL_IP4_NBNS " } ,
{ 5 , " INTERNAL_ADDRESS_EXPIREY " } ,
{ 6 , " INTERNAL_IP4_DHCP " } ,
{ 7 , " APPLICATION_VERSION " } ,
{ 8 , " INTERNAL_IP6_ADDRESS " } ,
{ 9 , " RESERVED " } ,
{ 10 , " INTERNAL_IP6_DNS " } ,
{ 11 , " INTERNAL_IP6_NBNS " } ,
{ 12 , " INTERNAL_IP6_DHCP " } ,
{ 13 , " INTERNAL_IP4_SUBNET " } ,
{ 14 , " SUPPORTED_ATTRIBUTES " } ,
{ 15 , " INTERNAL_IP6_SUBNET " } ,
{ 0 , NULL } ,
} ;
if ( isakmp_version = = 1 ) {
if ( ident > = 15 & & ident < = 16383 )
return " Future use " ;
if ( ident > = 16384 & & ident < = 16519 )
return " PRIVATE USE " ;
if ( ident > = 16530 & & ident < = 32767 )
return " PRIVATE USE " ;
return val_to_str ( ident , vs_v1_cfgattr , " UNKNOWN-CFG-ATTRIBUTE " ) ;
} else if ( isakmp_version = = 2 ) {
if ( ident > = 16 & & ident < = 16383 )
return " RESERVED TO IANA " ;
if ( ident > = 16384 & & ident < = 32767 )
return " PRIVATE USE " ;
return val_to_str ( ident , vs_v2_cfgattr , " UNKNOWN-CFG-ATTRIBUTE " ) ;
}
return " UNKNOWN-ISAKMP-VERSION " ;
}
static const char *
2005-06-16 06:19:03 +00:00
certtype2str ( int isakmp_version , guint8 type )
2005-03-15 09:58:58 +00:00
{
static const value_string vs_v1_certtype [ ] = {
{ 0 , " NONE " } ,
{ 1 , " PKCS #7 wrapped X.509 certificate " } ,
{ 2 , " PGP Certificate " } ,
{ 3 , " DNS Signed Key " } ,
{ 4 , " X.509 Certificate - Signature " } ,
{ 5 , " X.509 Certificate - Key Exchange " } ,
{ 6 , " Kerberos Tokens " } ,
{ 7 , " Certificate Revocation List (CRL) " } ,
{ 8 , " Authority Revocation List (ARL) " } ,
{ 9 , " SPKI Certificate " } ,
{ 10 , " X.509 Certificate - Attribute " } ,
{ 0 , NULL } ,
} ;
static const value_string vs_v2_certtype [ ] = {
{ 0 , " RESERVED " } ,
{ 1 , " PKCS #7 wrapped X.509 certificate " } ,
{ 2 , " PGP Certificate " } ,
{ 3 , " DNS Signed Key " } ,
{ 4 , " X.509 Certificate - Signature " } ,
{ 5 , " *undefined by any document* " } ,
{ 6 , " Kerberos Tokens " } ,
{ 7 , " Certificate Revocation List (CRL) " } ,
{ 8 , " Authority Revocation List (ARL) " } ,
{ 9 , " SPKI Certificate " } ,
{ 10 , " X.509 Certificate - Attribute " } ,
{ 11 , " Raw RSA Key " } ,
{ 12 , " Hash and URL of X.509 certificate " } ,
{ 13 , " Hash and URL of X.509 bundle " } ,
{ 0 , NULL } ,
} ;
if ( isakmp_version = = 1 )
return val_to_str ( type , vs_v1_certtype , " RESERVED " ) ;
else if ( isakmp_version = = 2 ) {
if ( type > = 14 & & type < = 200 )
return " RESERVED to IANA " ;
2005-03-16 19:41:33 +00:00
if ( type > = 201 )
2005-03-15 09:58:58 +00:00
return " PRIVATE USE " ;
return val_to_str ( type , vs_v2_certtype , " RESERVED " ) ;
}
return " UNKNOWN-ISAKMP-VERSION " ;
}
static gboolean
get_num ( tvbuff_t * tvb , int offset , guint16 len , guint32 * num_p )
{
1999-06-11 15:30:55 +00:00
switch ( len ) {
case 1 :
2001-02-28 10:22:29 +00:00
* num_p = tvb_get_guint8 ( tvb , offset ) ;
1999-06-11 15:30:55 +00:00
break ;
case 2 :
2001-02-28 10:22:29 +00:00
* num_p = tvb_get_ntohs ( tvb , offset ) ;
1999-06-11 15:30:55 +00:00
break ;
case 3 :
2001-02-28 10:22:29 +00:00
* num_p = tvb_get_ntoh24 ( tvb , offset ) ;
1999-06-11 15:30:55 +00:00
break ;
case 4 :
2001-02-28 10:22:29 +00:00
* num_p = tvb_get_ntohl ( tvb , offset ) ;
1999-06-11 15:30:55 +00:00
break ;
default :
2001-02-28 10:22:29 +00:00
return FALSE ;
1999-06-11 15:30:55 +00:00
}
2001-02-28 10:22:29 +00:00
return TRUE ;
1999-06-11 15:30:55 +00:00
}
2006-02-09 17:32:14 +00:00
/*
* Protocol initialization
*/
2006-02-11 09:54:10 +00:00
# ifdef HAVE_LIBNETTLE
2006-02-09 17:32:14 +00:00
static guint
isakmp_hash_func ( gconstpointer c ) {
guint8 * i_cookie = ( guint8 * ) c ;
guint val = 0 , keychunk , i ;
/* XOR our icookie down to the size of a guint */
for ( i = 0 ; i < COOKIE_SIZE - ( COOKIE_SIZE % sizeof ( keychunk ) ) ; i + = sizeof ( keychunk ) ) {
memcpy ( & keychunk , & i_cookie [ i ] , sizeof ( keychunk ) ) ;
val ^ = keychunk ;
}
return val ;
}
static gint
isakmp_equal_func ( gconstpointer ic1 , gconstpointer ic2 ) {
if ( memcmp ( ic1 , ic2 , COOKIE_SIZE ) = = 0 )
return 1 ;
return 0 ;
}
2006-02-11 09:54:10 +00:00
# endif
2006-02-09 17:32:14 +00:00
static void
isakmp_init_protocol ( void ) {
# ifdef HAVE_LIBNETTLE
if ( isakmp_hash ) {
g_hash_table_destroy ( isakmp_hash ) ;
}
if ( isakmp_key_data )
g_mem_chunk_destroy ( isakmp_key_data ) ;
if ( isakmp_decrypt_data )
g_mem_chunk_destroy ( isakmp_decrypt_data ) ;
isakmp_hash = g_hash_table_new ( isakmp_hash_func , isakmp_equal_func ) ;
isakmp_key_data = g_mem_chunk_new ( " isakmp_key_data " ,
COOKIE_SIZE , 5 * COOKIE_SIZE ,
G_ALLOC_AND_FREE ) ;
isakmp_decrypt_data = g_mem_chunk_new ( " isakmp_decrypt_data " ,
sizeof ( decrypt_data_t ) , 5 * sizeof ( decrypt_data_t ) ,
G_ALLOC_AND_FREE ) ;
if ( logf )
fclose ( logf ) ;
logf = fopen ( pluto_log_path , " r " ) ;
scan_pluto_log ( ) ;
# endif /* HAVE_LIBNETTLE */
}
static void
isakmp_prefs_apply_cb ( void ) {
# ifdef HAVE_LIBNETTLE
isakmp_init_protocol ( ) ;
# endif /* HAVE_LIBNETTLE */
}
1999-07-29 05:47:07 +00:00
void
proto_register_isakmp ( void )
{
2006-02-09 17:32:14 +00:00
module_t * isakmp_module ;
2004-09-21 07:47:14 +00:00
static hf_register_info hf [ ] = {
2006-02-09 17:32:14 +00:00
{ & hf_isakmp_icookie ,
{ " Initiator cookie " , " isakmp.icookie " ,
FT_BYTES , BASE_HEX , NULL , 0x0 ,
" ISAKMP Initiator Cookie " , HFILL } } ,
{ & hf_isakmp_rcookie ,
{ " Responder cookie " , " isakmp.rcookie " ,
FT_BYTES , BASE_HEX , NULL , 0x0 ,
" ISAKMP Responder Cookie " , HFILL } } ,
{ & hf_isakmp_nextpayload ,
{ " Next payload " , " isakmp.nextpayload " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Next Payload " , HFILL } } ,
{ & hf_isakmp_version ,
{ " Version " , " isakmp.version " ,
FT_UINT8 , BASE_HEX , NULL , 0x0 ,
" ISAKMP Version (major + minor) " , HFILL } } ,
{ & hf_isakmp_exchangetype ,
{ " Exchange type " , " isakmp.exchangetype " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Exchange Type " , HFILL } } ,
{ & hf_isakmp_flags ,
{ " Flags " , " isakmp.flags " ,
FT_UINT8 , BASE_HEX , NULL , 0x0 ,
" ISAKMP Flags " , HFILL } } ,
{ & hf_isakmp_messageid ,
{ " Message ID " , " isakmp.messageid " ,
FT_UINT32 , BASE_HEX , NULL , 0x0 ,
" ISAKMP Message ID " , HFILL } } ,
{ & hf_isakmp_length ,
{ " Length " , " isakmp.length " ,
FT_UINT32 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Length " , HFILL } } ,
{ & hf_isakmp_payloadlen ,
{ " Payload length " , " isakmp.payloadlength " ,
FT_UINT16 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Payload Length " , HFILL } } ,
{ & hf_isakmp_doi ,
{ " Domain of interpretation " , " isakmp.doi " ,
FT_UINT32 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Domain of Interpretation " , HFILL } } ,
{ & hf_isakmp_sa_situation ,
{ " Situation " , " isakmp.sa.situation " ,
FT_BYTES , BASE_HEX , NULL , 0x0 ,
" ISAKMP SA Situation " , HFILL } } ,
{ & hf_isakmp_prop_number ,
{ " Proposal number " , " isakmp.prop.number " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Proposal Number " , HFILL } } ,
{ & hf_isakmp_spisize ,
{ " SPI Size " , " isakmp.spisize " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP SPI Size " , HFILL } } ,
{ & hf_isakmp_prop_transforms ,
{ " Proposal transforms " , " isakmp.prop.transforms " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Proposal Transforms " , HFILL } } ,
{ & hf_isakmp_trans_number ,
{ " Transform number " , " isakmp.trans.number " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Transform Number " , HFILL } } ,
{ & hf_isakmp_trans_id ,
{ " Transform ID " , " isakmp.trans.id " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Transform ID " , HFILL } } ,
{ & hf_isakmp_id_type ,
{ " ID type " , " isakmp.id.type " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP ID Type " , HFILL } } ,
{ & hf_isakmp_protoid ,
{ " Protocol ID " , " isakmp.protoid " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Protocol ID " , HFILL } } ,
{ & hf_isakmp_id_port ,
{ " Port " , " isakmp.id.port " ,
FT_UINT16 , BASE_DEC , NULL , 0x0 ,
" ISAKMP ID Port " , HFILL } } ,
{ & hf_isakmp_cert_encoding ,
{ " Port " , " isakmp.cert.encoding " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Certificate Encoding " , HFILL } } ,
{ & hf_isakmp_certreq_type ,
{ " Port " , " isakmp.certreq.type " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Certificate Request Type " , HFILL } } ,
{ & hf_isakmp_notify_msgtype ,
{ " Port " , " isakmp.notify.msgtype " ,
FT_UINT8 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Notify Message Type " , HFILL } } ,
{ & hf_isakmp_num_spis ,
{ " Port " , " isakmp.spinum " ,
FT_UINT16 , BASE_DEC , NULL , 0x0 ,
" ISAKMP Number of SPIs " , HFILL } } ,
2004-09-21 07:47:14 +00:00
{ & hf_ike_certificate_authority ,
{ " Certificate Authority Distinguished Name " , " ike.cert_authority_dn " , FT_UINT32 , BASE_DEC , NULL , 0x0 , " Certificate Authority Distinguished Name " , HFILL }
} ,
2005-07-14 08:10:30 +00:00
{ & hf_ike_v2_certificate_authority ,
{ " Certificate Authority " , " ike.cert_authority " , FT_BYTES , BASE_HEX , NULL , 0x0 , " SHA-1 hash of the Certificate Authority " , HFILL }
} ,
2005-07-20 07:51:24 +00:00
{ & hf_ike_nat_keepalive ,
{ " NAT Keepalive " , " ike.nat_keepalive " , FT_NONE , BASE_HEX , NULL , 0x0 , " NAT Keepalive packet " , HFILL }
} ,
2004-09-21 07:47:14 +00:00
} ;
2006-02-09 17:32:14 +00:00
2001-02-28 10:22:29 +00:00
static gint * ett [ ] = {
& ett_isakmp ,
& ett_isakmp_flags ,
& ett_isakmp_payload ,
} ;
proto_isakmp = proto_register_protocol ( " Internet Security Association and Key Management Protocol " ,
2001-01-03 06:56:03 +00:00
" ISAKMP " , " isakmp " ) ;
2004-09-21 07:47:14 +00:00
proto_register_field_array ( proto_isakmp , hf , array_length ( hf ) ) ;
2001-02-28 10:22:29 +00:00
proto_register_subtree_array ( ett , array_length ( ett ) ) ;
2006-02-09 17:32:14 +00:00
register_init_routine ( & isakmp_init_protocol ) ;
2003-08-08 23:08:02 +00:00
register_dissector ( " isakmp " , dissect_isakmp , proto_isakmp ) ;
2006-02-09 17:32:14 +00:00
isakmp_module = prefs_register_protocol ( proto_isakmp , isakmp_prefs_apply_cb ) ;
# ifdef HAVE_LIBNETTLE
prefs_register_string_preference ( isakmp_module , " log " ,
" Log Filename " ,
" Path to a pluto log file containing DH secret information " ,
& pluto_log_path ) ;
# endif /* HAVE_LIBNETTLE */
1999-07-29 05:47:07 +00:00
}
2000-04-08 07:07:42 +00:00
void
proto_reg_handoff_isakmp ( void )
{
2001-12-03 04:00:26 +00:00
dissector_handle_t isakmp_handle ;
2003-08-08 23:08:02 +00:00
isakmp_handle = find_dissector ( " isakmp " ) ;
2006-12-06 22:03:45 +00:00
eap_handle = find_dissector ( " eap " ) ;
2001-12-03 04:00:26 +00:00
dissector_add ( " udp.port " , UDP_PORT_ISAKMP , isakmp_handle ) ;
dissector_add ( " tcp.port " , TCP_PORT_ISAKMP , isakmp_handle ) ;
2000-04-08 07:07:42 +00:00
}