/* packet-netlink-netfilter.c * * Wireshark - Network traffic analyzer * By Gerald Combs * Copyright 1998 Gerald Combs * * SPDX-License-Identifier: GPL-2.0-or-later */ #include "config.h" #include #include #include #include "packet-netlink.h" void proto_register_netlink_netfilter(void); void proto_reg_handoff_netlink_netfilter(void); typedef struct { packet_info *pinfo; guint16 hw_protocol; /* protocol for NFQUEUE packet payloads. */ } netlink_netfilter_info_t; static dissector_handle_t netlink_netfilter; static dissector_handle_t nflog_handle; static dissector_table_t ethertype_table; /* nfnetlink subsystems from */ enum { WS_NFNL_SUBSYS_NONE = 0, WS_NFNL_SUBSYS_CTNETLINK = 1, WS_NFNL_SUBSYS_CTNETLINK_EXP = 2, WS_NFNL_SUBSYS_QUEUE = 3, WS_NFNL_SUBSYS_ULOG = 4, WS_NFNL_SUBSYS_OSF = 5, WS_NFNL_SUBSYS_IPSET = 6, WS_NFNL_SUBSYS_ACCT = 7, WS_NFNL_SUBSYS_CTNETLINK_TIMEOUT = 8, WS_NFNL_SUBSYS_CTHELPER = 9, WS_NFNL_SUBSYS_NFTABLES = 10, WS_NFNL_SUBSYS_NFT_COMPAT = 11, WS_NFNL_SUBSYS_COUNT = 12, }; /* nfnetlink ULOG subsystem types from */ enum ws_nfulnl_msg_types { WS_NFULNL_MSG_PACKET = 0, WS_NFULNL_MSG_CONFIG = 1 }; /* Macros for "hook function responses" from */ enum ws_verdict_types { WS_NF_DROP = 0, WS_NF_ACCEPT = 1, WS_NF_STOLEN = 2, WS_NF_QUEUE = 3, WS_NF_REPEAT = 4, WS_NF_STOP = 5, }; enum ws_nf_inet_hooks { WS_NF_INET_PRE_ROUTING = 0, WS_NF_INET_LOCAL_IN = 1, WS_NF_INET_FORWARD = 2, WS_NF_INET_LOCAL_OUT = 3, WS_NF_INET_POST_ROUTING = 4, }; /* from */ enum ws_ip_conntrack_info { WS_IP_CT_ESTABLISHED, WS_IP_CT_RELATED, WS_IP_CT_NEW, WS_IP_CT_IS_REPLY, WS_IP_CT_ESTABLISHED_REPLY = WS_IP_CT_ESTABLISHED + WS_IP_CT_IS_REPLY, WS_IP_CT_RELATED_REPLY = WS_IP_CT_RELATED + WS_IP_CT_IS_REPLY, WS_IP_CT_NUMBER, }; enum ws_ip_conntrack_status { WS_IPS_EXPECTED_BIT = 0, WS_IPS_EXPECTED = (1 << WS_IPS_EXPECTED_BIT), WS_IPS_SEEN_REPLY_BIT = 1, WS_IPS_SEEN_REPLY = (1 << WS_IPS_SEEN_REPLY_BIT), WS_IPS_ASSURED_BIT = 2, WS_IPS_ASSURED = (1 << WS_IPS_ASSURED_BIT), WS_IPS_CONFIRMED_BIT = 3, WS_IPS_CONFIRMED = (1 << WS_IPS_CONFIRMED_BIT), WS_IPS_SRC_NAT_BIT = 4, WS_IPS_SRC_NAT = (1 << WS_IPS_SRC_NAT_BIT), WS_IPS_DST_NAT_BIT = 5, WS_IPS_DST_NAT = (1 << WS_IPS_DST_NAT_BIT), WS_IPS_SEQ_ADJUST_BIT = 6, WS_IPS_SEQ_ADJUST = (1 << WS_IPS_SEQ_ADJUST_BIT), WS_IPS_SRC_NAT_DONE_BIT = 7, WS_IPS_SRC_NAT_DONE = (1 << WS_IPS_SRC_NAT_DONE_BIT), WS_IPS_DST_NAT_DONE_BIT = 8, WS_IPS_DST_NAT_DONE = (1 << WS_IPS_DST_NAT_DONE_BIT), WS_IPS_DYING_BIT = 9, WS_IPS_DYING = (1 << WS_IPS_DYING_BIT), WS_IPS_FIXED_TIMEOUT_BIT = 10, WS_IPS_FIXED_TIMEOUT = (1 << WS_IPS_FIXED_TIMEOUT_BIT), WS_IPS_TEMPLATE_BIT = 11, WS_IPS_TEMPLATE = (1 << WS_IPS_TEMPLATE_BIT), WS_IPS_UNTRACKED_BIT = 12, WS_IPS_UNTRACKED = (1 << WS_IPS_UNTRACKED_BIT), WS_IPS_HELPER_BIT = 13, WS_IPS_HELPER = (1 << WS_IPS_HELPER_BIT), WS_IPS_OFFLOAD_BIT = 14, WS_IPS_OFFLOAD = (1 << WS_IPS_OFFLOAD_BIT), }; enum nfexp_flags { WS_NF_CT_EXPECT_PERMANENT = (1 << 0), WS_NF_CT_EXPECT_INACTIVE = (1 << 1), WS_NF_CT_EXPECT_USERSPACE = (1 << 2), }; /* from */ enum ws_ip_conntrack_dir { WS_IP_CT_DIR_ORIGINAL = 0, WS_IP_CT_DIR_REPLY = 1, }; /* nfnetlink QUEUE subsystem types from */ enum ws_nfqnl_msg_types { WS_NFQNL_MSG_PACKET = 0, WS_NFQNL_MSG_VERDICT = 1, WS_NFQNL_MSG_CONFIG = 2, WS_NFQNL_MSG_VERDICT_BATCH = 3 }; enum ws_nfqnl_attr_type { WS_NFQA_UNSPEC = 0, WS_NFQA_PACKET_HDR = 1, WS_NFQA_VERDICT_HDR = 2, WS_NFQA_MARK = 3, WS_NFQA_TIMESTAMP = 4, WS_NFQA_IFINDEX_INDEV = 5, WS_NFQA_IFINDEX_OUTDEV = 6, WS_NFQA_IFINDEX_PHYSINDEV = 7, WS_NFQA_IFINDEX_PHYSOUTDEV = 8, WS_NFQA_HWADDR = 9, WS_NFQA_PAYLOAD = 10, WS_NFQA_CT = 11, WS_NFQA_CT_INFO = 12, WS_NFQA_CAP_LEN = 13, WS_NFQA_SKB_INFO = 14, WS_NFQA_EXP = 15, WS_NFQA_UID = 16, WS_NFQA_GID = 17, WS_NFQA_SECCTX = 18, WS_NFQA_VLAN = 19, WS_NFQA_L2HDR = 20, }; enum ws_nfqnl_msg_config_cmds { WS_NFQNL_CFG_CMD_NONE = 0, WS_NFQNL_CFG_CMD_BIND = 1, WS_NFQNL_CFG_CMD_UNBIND = 2, WS_NFQNL_CFG_CMD_PF_BIND = 3, WS_NFQNL_CFG_CMD_PF_UNBIND = 4, }; enum ws_nfqnl_config_mode { WS_NFQNL_COPY_NONE = 0, WS_NFQNL_COPY_META = 1, WS_NFQNL_COPY_PACKET = 2, }; enum ws_nfqnl_attr_config { WS_NFQA_CFG_UNSPEC = 0, WS_NFQA_CFG_CMD = 1, WS_NFQA_CFG_PARAMS = 2, WS_NFQA_CFG_QUEUE_MAXLEN = 3, WS_NFQA_CFG_MASK = 4, WS_NFQA_CFG_FLAGS = 5, }; /* from */ enum ws_ctattr_tuple { WS_CTA_TUPLE_UNSPEC = 0, WS_CTA_TUPLE_IP = 1, WS_CTA_TUPLE_PROTO = 2, WS_CTA_TUPLE_ZONE = 3, }; enum ws_ctattr_ip { WS_CTA_IP_UNSPEC = 0, WS_CTA_IP_V4_SRC = 1, WS_CTA_IP_V4_DST = 2, WS_CTA_IP_V6_SRC = 3, WS_CTA_IP_V6_DST = 4, }; enum ws_ctattr_l4proto { WS_CTA_PROTO_UNSPEC = 0, WS_CTA_PROTO_NUM = 1, WS_CTA_PROTO_SRC_PORT = 2, WS_CTA_PROTO_DST_PORT = 3, WS_CTA_PROTO_ICMP_ID = 4, WS_CTA_PROTO_ICMP_TYPE = 5, WS_CTA_PROTO_ICMP_CODE = 6, WS_CTA_PROTO_ICMPV6_ID = 7, WS_CTA_PROTO_ICMPV6_TYPE = 8, WS_CTA_PROTO_ICMPV6_CODE = 9, }; enum ws_ctnl_exp_msg_types { WS_IPCTNL_MSG_EXP_NEW = 0, WS_IPCTNL_MSG_EXP_GET = 1, WS_IPCTNL_MSG_EXP_DELETE = 2, WS_IPCTNL_MSG_EXP_GET_STATS_CPU = 3, }; enum ws_ctattr_expect { WS_CTA_EXPECT_UNSPEC = 0, WS_CTA_EXPECT_MASTER = 1, WS_CTA_EXPECT_TUPLE = 2, WS_CTA_EXPECT_MASK = 3, WS_CTA_EXPECT_TIMEOUT = 4, WS_CTA_EXPECT_ID = 5, WS_CTA_EXPECT_HELP_NAME = 6, WS_CTA_EXPECT_ZONE = 7, WS_CTA_EXPECT_FLAGS = 8, WS_CTA_EXPECT_CLASS = 9, WS_CTA_EXPECT_NAT = 10, WS_CTA_EXPECT_FN = 11, }; enum ws_ctattr_expect_nat { WS_CTA_EXPECT_NAT_UNSPEC = 0, WS_CTA_EXPECT_NAT_DIR = 1, WS_CTA_EXPECT_NAT_TUPLE = 2, }; enum ws_ctattr_type { WS_CTA_UNSPEC = 0, WS_CTA_TUPLE_ORIG = 1, WS_CTA_TUPLE_REPLY = 2, WS_CTA_STATUS = 3, WS_CTA_PROTOINFO = 4, WS_CTA_HELP = 5, WS_CTA_NAT_SRC = 6, WS_CTA_TIMEOUT = 7, WS_CTA_MARK = 8, WS_CTA_COUNTERS_ORIG = 9, WS_CTA_COUNTERS_REPLY = 10, WS_CTA_USE = 11, WS_CTA_ID = 12, WS_CTA_NAT_DST = 13, WS_CTA_TUPLE_MASTER = 14, WS_CTA_SEQ_ADJ_ORIG = 15, WS_CTA_SEQ_ADJ_REPLY = 16, WS_CTA_SECMARK = 17, WS_CTA_ZONE = 18, WS_CTA_SECCTX = 19, WS_CTA_TIMESTAMP = 20, WS_CTA_MARK_MASK = 21, WS_CTA_LABELS = 22, WS_CTA_LABELS_MASK = 23, WS_CTA_SYNPROXY = 24, }; enum ws_ctattr_help { WS_CTA_HELP_UNSPEC = 0, WS_CTA_HELP_NAME = 1, WS_CTA_HELP_INFO = 2, }; enum ws_ctattr_seqadj { WS_CTA_SEQADJ_UNSPEC = 0, WS_CTA_SEQADJ_CORRECTION_POS = 1, WS_CTA_SEQADJ_OFFSET_BEFORE = 2, WS_CTA_SEQADJ_OFFSET_AFTER = 3, }; /* from */ enum ws_ipset_cmd { WS_IPSET_CMD_NONE = 0, WS_IPSET_CMD_PROTOCOL = 1, WS_IPSET_CMD_CREATE = 2, WS_IPSET_CMD_DESTROY = 3, WS_IPSET_CMD_FLUSH = 4, WS_IPSET_CMD_RENAME = 5, WS_IPSET_CMD_SWAP = 6, WS_IPSET_CMD_LIST = 7, WS_IPSET_CMD_SAVE = 8, WS_IPSET_CMD_ADD = 9, WS_IPSET_CMD_DEL = 10, WS_IPSET_CMD_TEST = 11, WS_IPSET_CMD_HEADER = 12, WS_IPSET_CMD_TYPE = 13, WS_IPSET_CMD_GET_BYNAME = 14, WS_IPSET_CMD_GET_BYINDEX = 15, }; /* Attributes at command level */ enum ws_ipset_attr { WS_IPSET_ATTR_PROTOCOL = 1, WS_IPSET_ATTR_SETNAME = 2, WS_IPSET_ATTR_TYPENAME = 3, WS_IPSET_ATTR_REVISION = 4, WS_IPSET_ATTR_FAMILY = 5, WS_IPSET_ATTR_FLAGS = 6, WS_IPSET_ATTR_DATA = 7, WS_IPSET_ATTR_ADT = 8, WS_IPSET_ATTR_LINENO = 9, WS_IPSET_ATTR_PROTOCOL_MIN = 10, WS_IPSET_ATTR_INDEX = 11, }; /* CADT-specific attributes (Create/Abstract Data Type) */ enum ws_ipset_cadt_attr { WS_IPSET_ATTR_IP_FROM = 1, WS_IPSET_ATTR_IP_TO = 2, WS_IPSET_ATTR_CIDR = 3, WS_IPSET_ATTR_PORT_FROM = 4, WS_IPSET_ATTR_PORT_TO = 5, WS_IPSET_ATTR_TIMEOUT = 6, WS_IPSET_ATTR_PROTO = 7, WS_IPSET_ATTR_CADT_FLAGS = 8, WS_IPSET_ATTR_CADT_LINENO = 9, WS_IPSET_ATTR_MARK = 10, WS_IPSET_ATTR_MARKMASK = 11, /* (reserved up to 16) */ #define WS_IPSET_ATTR_CADT_MAX 16 WS_IPSET_ATTR_GC = 17, WS_IPSET_ATTR_HASHSIZE = 18, WS_IPSET_ATTR_MAXELEM = 19, WS_IPSET_ATTR_NETMASK = 20, WS_IPSET_ATTR_PROBES = 21, WS_IPSET_ATTR_RESIZE = 22, WS_IPSET_ATTR_SIZE = 23, WS_IPSET_ATTR_ELEMENTS = 24, WS_IPSET_ATTR_REFERENCES = 25, WS_IPSET_ATTR_MEMSIZE = 26, }; /* ADT-specific attrivutes */ enum ws_ipset_adt_attr { WS_IPSET_ATTR_ETHER = 17, WS_IPSET_ATTR_NAME = 18, WS_IPSET_ATTR_NAMEREF = 19, WS_IPSET_ATTR_IP2 = 20, WS_IPSET_ATTR_CIDR2 = 21, WS_IPSET_ATTR_IP2_TO = 22, WS_IPSET_ATTR_IFACE = 23, WS_IPSET_ATTR_BYTES = 24, WS_IPSET_ATTR_PACKETS = 25, WS_IPSET_ATTR_COMMENT = 26, WS_IPSET_ATTR_SKBMARK = 27, WS_IPSET_ATTR_SKBPRIO = 28, WS_IPSET_ATTR_SKBQUEUE = 29, WS_IPSET_ATTR_PAD = 30, }; /* IP specific attributes */ enum ws_ipset_ip_attr { WS_IPSET_ATTR_IPADDR_IPV4 = 1, WS_IPSET_ATTR_IPADDR_IPV6 = 2, }; static int proto_netlink_netfilter; static int hf_ipset_adt_attr = -1; static int hf_ipset_adt_attr_comment = -1; static int hf_ipset_attr = -1; static int hf_ipset_attr_family = -1; static int hf_ipset_attr_flags = -1; static int hf_ipset_attr_setname = -1; static int hf_ipset_attr_typename = -1; static int hf_ipset_cadt_attr = -1; static int hf_ipset_cadt_attr_cadt_flags = -1; static int hf_ipset_cadt_attr_cidr = -1; static int hf_ipset_cadt_attr_timeout = -1; static int hf_ipset_command = -1; static int hf_ipset_ip_attr = -1; static int hf_ipset_ip_attr_ipv4 = -1; static int hf_ipset_ip_attr_ipv6 = -1; static int hf_netlink_netfilter_family = -1; static int hf_netlink_netfilter_resid = -1; static int hf_netlink_netfilter_subsys = -1; static int hf_netlink_netfilter_ulog_type = -1; static int hf_netlink_netfilter_version = -1; static int hf_nfct_attr = -1; static int hf_nfct_attr_id = -1; static int hf_nfct_attr_status = -1; static int hf_nfct_attr_status_flag_assured = -1; static int hf_nfct_attr_status_flag_confirmed = -1; static int hf_nfct_attr_status_flag_dst_nat = -1; static int hf_nfct_attr_status_flag_dst_nat_done = -1; static int hf_nfct_attr_status_flag_dying = -1; static int hf_nfct_attr_status_flag_expected = -1; static int hf_nfct_attr_status_flag_fixed_timeout = -1; static int hf_nfct_attr_status_flag_helper = -1; static int hf_nfct_attr_status_flag_offload = -1; static int hf_nfct_attr_status_flag_seen_reply = -1; static int hf_nfct_attr_status_flag_seq_adjust = -1; static int hf_nfct_attr_status_flag_src_nat = -1; static int hf_nfct_attr_status_flag_src_nat_done = -1; static int hf_nfct_attr_status_flag_template = -1; static int hf_nfct_attr_status_flag_untracked = -1; static int hf_nfct_attr_timeout = -1; static int hf_nfct_help_attr = -1; static int hf_nfct_help_attr_help_name = -1; static int hf_nfct_seqadj_attr = -1; static int hf_nfct_seqadj_attr_correction_pos = -1; static int hf_nfct_seqadj_attr_offset_after = -1; static int hf_nfct_seqadj_attr_offset_before = -1; static int hf_nfct_tuple_attr = -1; static int hf_nfct_tuple_ip_attr = -1; static int hf_nfct_tuple_ip_attr_ipv4 = -1; static int hf_nfct_tuple_ip_attr_ipv6 = -1; static int hf_nfct_tuple_proto_attr = -1; static int hf_nfct_tuple_proto_dst_port_attr = -1; static int hf_nfct_tuple_proto_num_attr = -1; static int hf_nfct_tuple_proto_src_port_attr = -1; static int hf_nfct_tuple_zone_attr = -1; static int hf_nfexp_attr = -1; static int hf_nfexp_attr_class = -1; static int hf_nfexp_attr_flag_inactive = -1; static int hf_nfexp_attr_flag_permanent = -1; static int hf_nfexp_attr_flag_userspace = -1; static int hf_nfexp_attr_flags = -1; static int hf_nfexp_attr_fn = -1; static int hf_nfexp_attr_id = -1; static int hf_nfexp_attr_timeout = -1; static int hf_nfexp_attr_zone = -1; static int hf_nfexp_nat_attr = -1; static int hf_nfexp_nat_attr_dir = -1; static int hf_nfexp_type = -1; static int hf_nfq_attr = -1; static int hf_nfq_caplen = -1; static int hf_nfq_config_attr = -1; static int hf_nfq_config_command_command = -1; static int hf_nfq_config_command_pf = -1; static int hf_nfq_config_flags = -1; static int hf_nfq_config_mask = -1; static int hf_nfq_config_params_copymode = -1; static int hf_nfq_config_params_copyrange = -1; static int hf_nfq_config_queue_maxlen = -1; static int hf_nfq_ctinfo = -1; static int hf_nfq_gid = -1; static int hf_nfq_hwaddr_addr = -1; static int hf_nfq_hwaddr_len = -1; static int hf_nfq_ifindex_indev = -1; static int hf_nfq_ifindex_outdev = -1; static int hf_nfq_ifindex_physindev = -1; static int hf_nfq_ifindex_physoutdev = -1; static int hf_nfq_nfmark = -1; static int hf_nfq_packet_hook = -1; static int hf_nfq_packet_hwprotocol = -1; static int hf_nfq_packet_id = -1; static int hf_nfq_timestamp = -1; static int hf_nfq_type = -1; static int hf_nfq_uid = -1; static int hf_nfq_verdict_id = -1; static int hf_nfq_verdict_verdict = -1; static int ett_netlink_netfilter = -1; static int ett_nfct_attr = -1; static int ett_nfct_help_attr = -1; static int ett_nfct_seqadj_attr = -1; static int ett_nfct_status_attr = -1; static int ett_nfct_tuple_attr = -1; static int ett_nfct_tuple_ip_attr = -1; static int ett_nfct_tuple_proto_attr = -1; static int ett_nfq_config_attr = -1; static int ett_nfq_attr = -1; static int ett_nfexp_attr = -1; static int ett_nfexp_flags_attr = -1; static int ett_nfexp_nat_attr = -1; static int ett_ipset_attr = -1; static int ett_ipset_cadt_attr = -1; static int ett_ipset_adt_attr = -1; static int ett_ipset_ip_attr = -1; static int dissect_netlink_netfilter_header(tvbuff_t *tvb, proto_tree *tree, int offset) { proto_tree_add_item(tree, hf_netlink_netfilter_family, tvb, offset, 1, ENC_NA); offset++; proto_tree_add_item(tree, hf_netlink_netfilter_version, tvb, offset, 1, ENC_NA); offset++; proto_tree_add_item(tree, hf_netlink_netfilter_resid, tvb, offset, 2, ENC_BIG_ENDIAN); offset += 2; return offset; } /* tuple attribute, used by EXP and QUEUE */ static const value_string nfct_tuple_attr_vals[] = { { WS_CTA_TUPLE_IP, "IP address" }, { WS_CTA_TUPLE_PROTO, "L4 protocol info" }, { WS_CTA_TUPLE_ZONE, "Zone" }, { 0, NULL } }; static const value_string nfct_tuple_ip_attr_vals[] = { { WS_CTA_IP_V4_SRC, "IPv4 source address" }, { WS_CTA_IP_V4_DST, "IPv4 destination address" }, { WS_CTA_IP_V6_SRC, "IPv6 source address" }, { WS_CTA_IP_V6_DST, "IPv6 destination address" }, { 0, NULL } }; static const value_string nfct_tuple_l4proto_attr_vals[] = { { WS_CTA_PROTO_NUM, "IP protocol number" }, { WS_CTA_PROTO_SRC_PORT, "Source port" }, { WS_CTA_PROTO_DST_PORT, "Destination port" }, { WS_CTA_PROTO_ICMP_ID, "ICMPv4 ID" }, { WS_CTA_PROTO_ICMP_TYPE, "ICMPv4 type" }, { WS_CTA_PROTO_ICMP_CODE, "ICMPv4 code" }, { WS_CTA_PROTO_ICMPV6_ID, "ICMPv6 ID" }, { WS_CTA_PROTO_ICMPV6_TYPE, "ICMPv6 type" }, { WS_CTA_PROTO_ICMPV6_CODE, "ICMPv6 code" }, { 0, NULL } }; static int dissect_nfct_tuple_proto_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data _U_, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_ip type = (enum ws_ctattr_ip) nla_type & NLA_TYPE_MASK; switch (type) { case WS_CTA_PROTO_NUM: proto_tree_add_item(tree, hf_nfct_tuple_proto_num_attr, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_PROTO_SRC_PORT: proto_tree_add_item(tree, hf_nfct_tuple_proto_src_port_attr, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_PROTO_DST_PORT: proto_tree_add_item(tree, hf_nfct_tuple_proto_dst_port_attr, tvb, offset, len, ENC_BIG_ENDIAN); return 1; default: return 0; } } static int dissect_nfct_tuple_ip_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data _U_, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_ip type = (enum ws_ctattr_ip) nla_type & NLA_TYPE_MASK; switch (type) { case WS_CTA_IP_V4_SRC: case WS_CTA_IP_V4_DST: proto_tree_add_item(tree, hf_nfct_tuple_ip_attr_ipv4, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_IP_V6_SRC: case WS_CTA_IP_V6_DST: proto_tree_add_item(tree, hf_nfct_tuple_ip_attr_ipv6, tvb, offset, len, ENC_NA); return 1; default: return 0; } } static int dissect_nfct_tuple_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_tuple type = (enum ws_ctattr_tuple) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_CTA_TUPLE_IP: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_tuple_ip_attr, ett_nfct_tuple_ip_attr, info, nl_data, tree, offset, len, dissect_nfct_tuple_ip_attrs); return 0; case WS_CTA_TUPLE_PROTO: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_tuple_proto_attr, ett_nfct_tuple_proto_attr, info, nl_data, tree, offset, len, dissect_nfct_tuple_proto_attrs); return 0; case WS_CTA_TUPLE_ZONE: proto_tree_add_item(tree, hf_nfct_tuple_zone_attr, tvb, offset, len, ENC_BIG_ENDIAN); return 1; default: return 0; } } /* conntrack attributes, used by QUEUE and CT */ static const value_string nfct_attr_vals[] = { { WS_CTA_TUPLE_ORIG, "Original IP tuple" }, { WS_CTA_TUPLE_REPLY, "Reply IP tuple" }, { WS_CTA_STATUS, "Connection status" }, { WS_CTA_PROTOINFO, "Protocol-specific info" }, { WS_CTA_HELP, "Helper" }, { WS_CTA_NAT_SRC, "SNAT setup" }, { WS_CTA_TIMEOUT, "Timeout" }, { WS_CTA_MARK, "Mark" }, { WS_CTA_COUNTERS_ORIG, "COUNTERS_ORIG" }, { WS_CTA_COUNTERS_REPLY, "COUNTERS_REPLY" }, { WS_CTA_USE, "Use count" }, { WS_CTA_ID, "ID" }, { WS_CTA_NAT_DST, "DNAT setup" }, { WS_CTA_TUPLE_MASTER, "Master IP tuple" }, { WS_CTA_SEQ_ADJ_ORIG, "Sequence number adjustment (original direction)" }, { WS_CTA_SEQ_ADJ_REPLY, "Sequence number adjustment (reply direction)" }, { WS_CTA_SECMARK, "Security mark" }, { WS_CTA_ZONE, "Zone" }, { WS_CTA_SECCTX, "Security context" }, { WS_CTA_TIMESTAMP, "Timestamp" }, { WS_CTA_MARK_MASK, "Mark mask" }, { WS_CTA_LABELS, "LABELS" }, { WS_CTA_LABELS_MASK, "LABELS_MASK" }, { WS_CTA_SYNPROXY, "SYNPROXY" }, { 0, NULL } }; static const value_string nfct_help_attr_vals[] = { { WS_CTA_HELP_NAME, "Helper name" }, { WS_CTA_HELP_INFO, "Helper info" }, { 0, NULL } }; static const value_string nfct_seqadj_attr_vals[] = { { WS_CTA_SEQADJ_UNSPEC, "Unspecified" }, { WS_CTA_SEQADJ_CORRECTION_POS, "Correction position" }, { WS_CTA_SEQADJ_OFFSET_BEFORE, "Offset before" }, { WS_CTA_SEQADJ_OFFSET_AFTER, "Offset after" }, { 0, NULL } }; static int * const hf_nfct_attr_status_flags[] = { &hf_nfct_attr_status_flag_offload, &hf_nfct_attr_status_flag_helper, &hf_nfct_attr_status_flag_untracked, &hf_nfct_attr_status_flag_template, &hf_nfct_attr_status_flag_fixed_timeout, &hf_nfct_attr_status_flag_dying, &hf_nfct_attr_status_flag_dst_nat_done, &hf_nfct_attr_status_flag_src_nat_done, &hf_nfct_attr_status_flag_seq_adjust, &hf_nfct_attr_status_flag_dst_nat, &hf_nfct_attr_status_flag_src_nat, &hf_nfct_attr_status_flag_confirmed, &hf_nfct_attr_status_flag_assured, &hf_nfct_attr_status_flag_seen_reply, &hf_nfct_attr_status_flag_expected, NULL }; static int dissect_nfct_help_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data _U_, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_help type = (enum ws_ctattr_help) nla_type & NLA_TYPE_MASK; switch (type) { case WS_CTA_HELP_NAME: proto_tree_add_item(tree, hf_nfct_help_attr_help_name, tvb, offset, len, ENC_UTF_8); return 1; default: break; } return 0; } static int dissect_nfct_seqadj_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data _U_, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_seqadj type = (enum ws_ctattr_seqadj) nla_type & NLA_TYPE_MASK; switch (type) { case WS_CTA_SEQADJ_CORRECTION_POS: proto_tree_add_item(tree, hf_nfct_seqadj_attr_correction_pos, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_SEQADJ_OFFSET_BEFORE: proto_tree_add_item(tree, hf_nfct_seqadj_attr_offset_before, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_SEQADJ_OFFSET_AFTER: proto_tree_add_item(tree, hf_nfct_seqadj_attr_offset_after, tvb, offset, len, ENC_BIG_ENDIAN); return 1; default: break; } return 0; } static int dissect_nfct_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_type type = (enum ws_ctattr_type) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_CTA_STATUS: proto_tree_add_bitmask(tree, tvb, offset, hf_nfct_attr_status, ett_nfct_status_attr, hf_nfct_attr_status_flags, ENC_BIG_ENDIAN); return 1; case WS_CTA_TIMEOUT: proto_tree_add_item(tree, hf_nfct_attr_timeout, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_ID: proto_tree_add_item(tree, hf_nfct_attr_id, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_HELP: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_help_attr, ett_nfct_help_attr, info, nl_data, tree, offset, len, dissect_nfct_help_attrs); return 0; case WS_CTA_SEQ_ADJ_ORIG: case WS_CTA_SEQ_ADJ_REPLY: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_seqadj_attr, ett_nfct_seqadj_attr, info, nl_data, tree, offset, len, dissect_nfct_seqadj_attrs); return 0; case WS_CTA_TUPLE_ORIG: case WS_CTA_TUPLE_REPLY: case WS_CTA_TUPLE_MASTER: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_tuple_attr, ett_nfct_tuple_attr, info, nl_data, tree, offset, len, dissect_nfct_tuple_attrs); return 0; default: return 0; } } /* CT - main */ static int dissect_netfilter_ct(tvbuff_t *tvb, netlink_netfilter_info_t *info, struct packet_netlink_data *nl_data, proto_tree *tree, int offset) { offset = dissect_netlink_netfilter_header(tvb, tree, offset); return dissect_netlink_attributes_to_end(tvb, hf_nfct_attr, ett_nfct_attr, info, nl_data, tree, offset, dissect_nfct_attrs); } /* EXP */ static const value_string nfexp_type_vals[] = { { WS_IPCTNL_MSG_EXP_NEW, "New" }, { WS_IPCTNL_MSG_EXP_GET, "Get" }, { WS_IPCTNL_MSG_EXP_DELETE, "Delete" }, { WS_IPCTNL_MSG_EXP_GET_STATS_CPU, "Get CPU stats" }, { 0, NULL } }; static const value_string nfexp_attr_vals[] = { { WS_CTA_EXPECT_MASTER, "Master IP tuple" }, { WS_CTA_EXPECT_TUPLE, "IP tuple" }, { WS_CTA_EXPECT_MASK, "IP mask tuple" }, { WS_CTA_EXPECT_TIMEOUT, "Timeout" }, { WS_CTA_EXPECT_ID, "ID" }, { WS_CTA_EXPECT_HELP_NAME, "Helper name" }, { WS_CTA_EXPECT_ZONE, "Zone" }, { WS_CTA_EXPECT_FLAGS, "Flags" }, { WS_CTA_EXPECT_CLASS, "Class" }, { WS_CTA_EXPECT_NAT, "NAT" }, { WS_CTA_EXPECT_FN, "Expect function" }, { 0, NULL } }; static const value_string nfexp_nat_attr_vals[] = { { WS_CTA_EXPECT_NAT_DIR, "Direction" }, { WS_CTA_EXPECT_NAT_TUPLE, "IP tuple" }, { 0, NULL } }; static const value_string nfexp_conntrack_dir_vals[] = { { WS_IP_CT_DIR_ORIGINAL, "Original direction" }, { WS_IP_CT_DIR_REPLY, "Reply direction" }, { 0, NULL } }; static int dissect_nfexp_nat_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_expect type = (enum ws_ctattr_expect) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_CTA_EXPECT_NAT_DIR: proto_tree_add_item(tree, hf_nfexp_nat_attr_dir, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_EXPECT_NAT_TUPLE: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_tuple_attr, ett_nfct_tuple_attr, info, nl_data, tree, offset, len, dissect_nfct_tuple_attrs); return 0; default: return 0; } } /* CTA_EXPECT_FLAGS bitfield */ static int * const hf_nfexp_attr_flags_bitfield[] = { &hf_nfexp_attr_flag_userspace, &hf_nfexp_attr_flag_inactive, &hf_nfexp_attr_flag_permanent, NULL }; static int dissect_nfexp_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ctattr_expect type = (enum ws_ctattr_expect) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_CTA_EXPECT_TUPLE: case WS_CTA_EXPECT_MASK: case WS_CTA_EXPECT_MASTER: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_tuple_attr, ett_nfct_tuple_attr, info, nl_data, tree, offset, len, dissect_nfct_tuple_attrs); return 0; case WS_CTA_EXPECT_NAT: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfexp_nat_attr, ett_nfexp_nat_attr, info, nl_data, tree, offset, len, dissect_nfexp_nat_attrs); return 0; case WS_CTA_EXPECT_TIMEOUT: proto_tree_add_item(tree, hf_nfexp_attr_timeout, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_EXPECT_ID: proto_tree_add_item(tree, hf_nfexp_attr_id, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_EXPECT_CLASS: proto_tree_add_item(tree, hf_nfexp_attr_class, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_EXPECT_ZONE: proto_tree_add_item(tree, hf_nfexp_attr_zone, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_CTA_EXPECT_FN: proto_tree_add_item(tree, hf_nfexp_attr_fn, tvb, offset, len, ENC_UTF_8); return 1; case WS_CTA_EXPECT_FLAGS: proto_tree_add_bitmask(tree, tvb, offset, hf_nfexp_attr_flags, ett_nfexp_flags_attr, hf_nfexp_attr_flags_bitfield, ENC_BIG_ENDIAN); return 1; default: return 0; } } /* EXP - main */ static int dissect_netfilter_exp(tvbuff_t *tvb, netlink_netfilter_info_t *info, struct packet_netlink_data *nl_data, proto_tree *tree, int offset) { //enum ws_ctnl_exp_msg_types type = (enum ws_ctnl_exp_msg_types) (info->data->type & 0xff); offset = dissect_netlink_netfilter_header(tvb, tree, offset); return dissect_netlink_attributes_to_end(tvb, hf_nfexp_attr, ett_nfexp_attr, info, nl_data, tree, offset, dissect_nfexp_attrs); } /* QUEUE */ /* QUEUE - Config */ static const value_string nfq_type_vals[] = { { WS_NFQNL_MSG_PACKET, "Packet" }, { WS_NFQNL_MSG_VERDICT, "Verdict" }, { WS_NFQNL_MSG_CONFIG, "Config" }, { WS_NFQNL_MSG_VERDICT_BATCH, "Verdict (batch)" }, { 0, NULL } }; static const value_string nfq_config_command_vals[] = { { WS_NFQNL_CFG_CMD_NONE, "None" }, { WS_NFQNL_CFG_CMD_BIND, "Bind" }, { WS_NFQNL_CFG_CMD_UNBIND, "Unbind" }, { WS_NFQNL_CFG_CMD_PF_BIND, "PF bind" }, { WS_NFQNL_CFG_CMD_PF_UNBIND, "PF unbind" }, { 0, NULL } }; static const value_string nfq_config_attr_vals[] = { { WS_NFQA_CFG_UNSPEC, "Unspecified" }, { WS_NFQA_CFG_CMD, "Command" }, { WS_NFQA_CFG_PARAMS, "Parameters" }, { WS_NFQA_CFG_QUEUE_MAXLEN, "Maximum queue length" }, { WS_NFQA_CFG_MASK, "Mask" }, { WS_NFQA_CFG_FLAGS, "Flags" }, { 0, NULL } }; static const value_string nfq_config_mode_vals[] = { { WS_NFQNL_COPY_NONE, "None" }, { WS_NFQNL_COPY_META, "Meta" }, { WS_NFQNL_COPY_PACKET, "Packet" }, { 0, NULL } }; static int dissect_nfq_config_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_nfqnl_attr_config type = (enum ws_nfqnl_attr_config) nla_type; switch (type) { case WS_NFQA_CFG_UNSPEC: break; case WS_NFQA_CFG_CMD: if (len == 4) { proto_tree_add_item(tree, hf_nfq_config_command_command, tvb, offset, 1, ENC_NA); offset += 2; /* skip command and 1 byte padding. */ proto_tree_add_item(tree, hf_nfq_config_command_pf, tvb, offset, 2, ENC_BIG_ENDIAN); offset += 2; } break; case WS_NFQA_CFG_PARAMS: if (len == 5) { proto_tree_add_item(tree, hf_nfq_config_params_copyrange, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; proto_tree_add_item(tree, hf_nfq_config_params_copymode, tvb, offset, 1, ENC_NA); offset++; } break; case WS_NFQA_CFG_QUEUE_MAXLEN: if (len == 4) { proto_tree_add_item(tree, hf_nfq_config_queue_maxlen, tvb, offset, 4, nl_data->encoding); offset += 4; } break; case WS_NFQA_CFG_MASK: if (len == 4) { proto_tree_add_item(tree, hf_nfq_config_mask, tvb, offset, 4, nl_data->encoding); offset += 4; } break; case WS_NFQA_CFG_FLAGS: if (len == 4) { proto_tree_add_item(tree, hf_nfq_config_flags, tvb, offset, 4, nl_data->encoding); offset += 4; } break; } return offset; } /* QUEUE - Packet and verdict */ static const value_string nfq_attr_vals[] = { { WS_NFQA_UNSPEC, "Unspecified" }, { WS_NFQA_PACKET_HDR, "Packet header" }, { WS_NFQA_VERDICT_HDR, "Verdict header" }, { WS_NFQA_MARK, "Mark" }, { WS_NFQA_TIMESTAMP, "Timestamp" }, { WS_NFQA_IFINDEX_INDEV, "NFQA_IFINDEX_INDEV" }, { WS_NFQA_IFINDEX_OUTDEV, "NFQA_IFINDEX_OUTDEV" }, { WS_NFQA_IFINDEX_PHYSINDEV, "NFQA_IFINDEX_PHYSINDEV" }, { WS_NFQA_IFINDEX_PHYSOUTDEV, "NFQA_IFINDEX_PHYSOUTDEV" }, { WS_NFQA_HWADDR, "Hardware address" }, { WS_NFQA_PAYLOAD, "Payload" }, { WS_NFQA_CT, "NFQA_CT" }, { WS_NFQA_CT_INFO, "Conntrack info" }, { WS_NFQA_CAP_LEN, "Length of captured packet" }, { WS_NFQA_SKB_INFO, "SKB meta information" }, { WS_NFQA_EXP, "Conntrack expectation" }, { WS_NFQA_UID, "SK UID" }, { WS_NFQA_GID, "SK GID" }, { WS_NFQA_SECCTX, "Security context string" }, { WS_NFQA_VLAN, "Packet VLAN info" }, { WS_NFQA_L2HDR, "Full L2 header" }, { 0, NULL } }; static const value_string nfq_verdict_vals[] = { { WS_NF_DROP, "DROP" }, { WS_NF_ACCEPT, "ACCEPT" }, { WS_NF_STOLEN, "STOLEN" }, { WS_NF_QUEUE, "QUEUE" }, { WS_NF_REPEAT, "REPEAT" }, { WS_NF_STOP, "STOP" }, { 0, NULL } }; const value_string netfilter_hooks_vals[] = { { WS_NF_INET_PRE_ROUTING, "Pre-routing" }, { WS_NF_INET_LOCAL_IN, "Local in" }, { WS_NF_INET_FORWARD, "Forward" }, { WS_NF_INET_LOCAL_OUT, "Local out" }, { WS_NF_INET_POST_ROUTING, "Post-routing" }, { 0, NULL } }; const value_string nfproto_family_vals[] = { { WS_NFPROTO_UNSPEC, "Unspecified" }, { WS_NFPROTO_INET, "IPv4/IPv6" }, { WS_NFPROTO_IPV4, "IPv4" }, { WS_NFPROTO_ARP, "ARP" }, { WS_NFPROTO_NETDEV, "Netdev" }, { WS_NFPROTO_BRIDGE, "Bridge" }, { WS_NFPROTO_IPV6, "IPv6" }, { WS_NFPROTO_DECNET, "DECNET" }, { 0, NULL } }; static const value_string nfq_ctinfo_vals[] = { { WS_IP_CT_ESTABLISHED, "ESTABLISHED" }, { WS_IP_CT_RELATED, "RELATED" }, { WS_IP_CT_NEW, "NEW" }, { WS_IP_CT_IS_REPLY, "IS_REPLY" }, /* { WS_IP_CT_ESTABLISHED_REPLY, "ESTABLISHED_REPLY" }, XXX - duplicate of WS_IP_CT_ESTABLISHED */ { WS_IP_CT_RELATED_REPLY, "RELATED_REPLY" }, { WS_IP_CT_NUMBER, "NUMBER" }, { 0, NULL } }; static int dissect_nfq_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_nfqnl_attr_type type = (enum ws_nfqnl_attr_type) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_NFQA_UNSPEC: break; case WS_NFQA_PACKET_HDR: if (len == 7) { proto_tree_add_item(tree, hf_nfq_packet_id, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; proto_tree_add_item(tree, hf_nfq_packet_hwprotocol, tvb, offset, 2, ENC_BIG_ENDIAN); info->hw_protocol = tvb_get_ntohs(tvb, offset); offset += 2; proto_tree_add_item(tree, hf_nfq_packet_hook, tvb, offset, 1, ENC_NA); offset++; } break; case WS_NFQA_VERDICT_HDR: if (len == 8) { proto_tree_add_item(tree, hf_nfq_verdict_verdict, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; proto_tree_add_item(tree, hf_nfq_verdict_id, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_MARK: if (len == 4) { proto_tree_add_item(tree, hf_nfq_nfmark, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_TIMESTAMP: if (len == 16) { proto_tree_add_item(tree, hf_nfq_timestamp, tvb, offset, 16, ENC_TIME_SECS_NSECS|ENC_BIG_ENDIAN); offset += 16; } break; case WS_NFQA_IFINDEX_INDEV: if (len == 4) { proto_tree_add_item(tree, hf_nfq_ifindex_indev, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_IFINDEX_OUTDEV: if (len == 4) { proto_tree_add_item(tree, hf_nfq_ifindex_outdev, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_IFINDEX_PHYSINDEV: if (len == 4) { proto_tree_add_item(tree, hf_nfq_ifindex_physindev, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_IFINDEX_PHYSOUTDEV: if (len == 4) { proto_tree_add_item(tree, hf_nfq_ifindex_physoutdev, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_HWADDR: if (len >= 4) { guint16 addrlen; proto_tree_add_item(tree, hf_nfq_hwaddr_len, tvb, offset, 2, ENC_BIG_ENDIAN); addrlen = tvb_get_ntohs(tvb, offset); offset += 4; /* skip len and padding */ /* XXX expert info if 4 + addrlen > len. */ addrlen = MIN(addrlen, len - 4); proto_tree_add_item(tree, hf_nfq_hwaddr_addr, tvb, offset, addrlen, ENC_NA); offset += addrlen; } break; case WS_NFQA_PAYLOAD: if (len > 0) { tvbuff_t *next_tvb = tvb_new_subset_length(tvb, offset, len); proto_tree *parent_tree = proto_item_get_parent(tree); if (!dissector_try_uint(ethertype_table, info->hw_protocol, next_tvb, info->pinfo, parent_tree)) call_data_dissector(next_tvb, info->pinfo, parent_tree); offset += len; } break; case WS_NFQA_CT: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_nfct_attr, ett_nfct_attr, info, nl_data, tree, offset, len, dissect_nfct_attrs); break; case WS_NFQA_CT_INFO: if (len == 4) { proto_tree_add_item(tree, hf_nfq_ctinfo, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_CAP_LEN: if (len == 4) { proto_tree_add_item(tree, hf_nfq_caplen, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_SKB_INFO: case WS_NFQA_EXP: /* TODO */ break; case WS_NFQA_UID: if (len == 4) { proto_tree_add_item(tree, hf_nfq_uid, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_GID: if (len == 4) { proto_tree_add_item(tree, hf_nfq_gid, tvb, offset, 4, ENC_BIG_ENDIAN); offset += 4; } break; case WS_NFQA_SECCTX: case WS_NFQA_VLAN: case WS_NFQA_L2HDR: /* TODO */ break; } return offset; } /* QUEUE - main */ static int dissect_netfilter_queue(tvbuff_t *tvb, netlink_netfilter_info_t *info, struct packet_netlink_data *nl_data, proto_tree *tree, int offset) { enum ws_nfqnl_msg_types type = (enum ws_nfqnl_msg_types) (nl_data->type & 0xff); offset = dissect_netlink_netfilter_header(tvb, tree, offset); switch (type) { case WS_NFQNL_MSG_CONFIG: return dissect_netlink_attributes_to_end(tvb, hf_nfq_config_attr, ett_nfq_config_attr, info, nl_data, tree, offset, dissect_nfq_config_attrs); case WS_NFQNL_MSG_PACKET: case WS_NFQNL_MSG_VERDICT: return dissect_netlink_attributes_to_end(tvb, hf_nfq_attr, ett_nfq_attr, info, nl_data, tree, offset, dissect_nfq_attrs); case WS_NFQNL_MSG_VERDICT_BATCH: /* TODO */ break; } return offset; } /* ULOG */ static const value_string netlink_netfilter_ulog_type_vals[] = { { WS_NFULNL_MSG_PACKET, "Packet" }, { WS_NFULNL_MSG_CONFIG, "Config" }, { 0, NULL } }; static int dissect_netfilter_ulog(tvbuff_t *tvb, netlink_netfilter_info_t *info, struct packet_netlink_data *nl_data, proto_tree *tree, int offset) { enum ws_nfulnl_msg_types type = (enum ws_nfulnl_msg_types) (nl_data->type & 0xff); tvbuff_t *next_tvb; switch (type) { case WS_NFULNL_MSG_PACKET: /* Note that NFLOG dissects the nfgenmsg header */ next_tvb = tvb_new_subset_remaining(tvb, offset); call_dissector(nflog_handle, next_tvb, info->pinfo, tree); offset = tvb_reported_length(tvb); break; default: break; } return offset; } /* IPSET */ static const value_string ipset_command_vals[] = { { WS_IPSET_CMD_NONE, "None" }, { WS_IPSET_CMD_PROTOCOL, "Return protocol version" }, { WS_IPSET_CMD_CREATE, "Create a new (empty) set" }, { WS_IPSET_CMD_DESTROY, "Destroy a (empty) set" }, { WS_IPSET_CMD_FLUSH, "Remove all elements from a set" }, { WS_IPSET_CMD_RENAME, "Rename a set" }, { WS_IPSET_CMD_SWAP, "Swap two sets" }, { WS_IPSET_CMD_LIST, "List sets" }, { WS_IPSET_CMD_SAVE, "Save sets" }, { WS_IPSET_CMD_ADD, "Add an element to a set" }, { WS_IPSET_CMD_DEL, "Delete an element from a set" }, { WS_IPSET_CMD_TEST, "Test an element in a set" }, { WS_IPSET_CMD_HEADER, "Get set header data only" }, { WS_IPSET_CMD_TYPE, "Get set type" }, { WS_IPSET_CMD_GET_BYNAME, "Get set by name" }, { WS_IPSET_CMD_GET_BYINDEX, "Get set by index" }, { 0, NULL } }; static const value_string ipset_attr_vals[] = { { WS_IPSET_ATTR_PROTOCOL, "Protocol version" }, { WS_IPSET_ATTR_SETNAME, "Name of the set" }, { WS_IPSET_ATTR_TYPENAME, "Typename" }, { WS_IPSET_ATTR_REVISION, "Settype revision" }, { WS_IPSET_ATTR_FAMILY, "Settype family" }, { WS_IPSET_ATTR_FLAGS, "Flags at command level" }, { WS_IPSET_ATTR_DATA, "Nested attributes" }, { WS_IPSET_ATTR_ADT, "Multiple data containers" }, { WS_IPSET_ATTR_LINENO, "Restore lineno" }, { WS_IPSET_ATTR_PROTOCOL_MIN, "Minimal supported version number" }, { WS_IPSET_ATTR_INDEX, "Index" }, { 0, NULL } }; static const value_string ipset_cadt_attr_vals[] = { { WS_IPSET_ATTR_IP_FROM, "IP_FROM" }, { WS_IPSET_ATTR_IP_TO, "IP_TO" }, { WS_IPSET_ATTR_CIDR, "CIDR" }, { WS_IPSET_ATTR_PORT_FROM, "PORT_FROM" }, { WS_IPSET_ATTR_PORT_TO, "PORT_TO" }, { WS_IPSET_ATTR_TIMEOUT, "TIMEOUT" }, { WS_IPSET_ATTR_PROTO, "PROTO" }, { WS_IPSET_ATTR_CADT_FLAGS, "CADT_FLAGS" }, { WS_IPSET_ATTR_CADT_LINENO, "CADT_LINENO" }, { WS_IPSET_ATTR_MARK, "MARK" }, { WS_IPSET_ATTR_MARKMASK, "MARKMASK" }, /* up to 16 is reserved. */ { WS_IPSET_ATTR_GC, "GC" }, { WS_IPSET_ATTR_HASHSIZE, "HASHSIZE" }, { WS_IPSET_ATTR_MAXELEM, "MAXELEM" }, { WS_IPSET_ATTR_NETMASK, "NETMASK" }, { WS_IPSET_ATTR_PROBES, "PROBES" }, { WS_IPSET_ATTR_RESIZE, "RESIZE" }, { WS_IPSET_ATTR_SIZE, "SIZE" }, { WS_IPSET_ATTR_ELEMENTS, "ELEMENTS" }, { WS_IPSET_ATTR_REFERENCES, "REFERENCES" }, { WS_IPSET_ATTR_MEMSIZE, "MEMSIZE" }, { 0, NULL } }; static const value_string ipset_adt_attr_vals[] = { /* Nasty! Duplication from CADT above... */ { WS_IPSET_ATTR_IP_FROM, "IP_FROM" }, { WS_IPSET_ATTR_IP_TO, "IP_TO" }, { WS_IPSET_ATTR_CIDR, "CIDR" }, { WS_IPSET_ATTR_PORT_FROM, "PORT_FROM" }, { WS_IPSET_ATTR_PORT_TO, "PORT_TO" }, { WS_IPSET_ATTR_TIMEOUT, "TIMEOUT" }, { WS_IPSET_ATTR_PROTO, "PROTO" }, { WS_IPSET_ATTR_CADT_FLAGS, "CADT_FLAGS" }, { WS_IPSET_ATTR_CADT_LINENO, "CADT_LINENO" }, { WS_IPSET_ATTR_MARK, "MARK" }, { WS_IPSET_ATTR_MARKMASK, "MARKMASK" }, /* End of duplication, other attributes follow. */ { WS_IPSET_ATTR_ETHER, "ETHER" }, { WS_IPSET_ATTR_NAME, "NAME" }, { WS_IPSET_ATTR_NAMEREF, "NAMEREF" }, { WS_IPSET_ATTR_IP2, "IP2" }, { WS_IPSET_ATTR_CIDR2, "CIDR2" }, { WS_IPSET_ATTR_IP2_TO, "IP2_TO" }, { WS_IPSET_ATTR_IFACE, "IFACE" }, { WS_IPSET_ATTR_BYTES, "BYTES" }, { WS_IPSET_ATTR_PACKETS, "PACKETS" }, { WS_IPSET_ATTR_COMMENT, "COMMENT" }, { WS_IPSET_ATTR_SKBMARK, "SKBMARK" }, { WS_IPSET_ATTR_SKBPRIO, "SKBPRIO" }, { WS_IPSET_ATTR_SKBQUEUE, "SKBQUEUE" }, { WS_IPSET_ATTR_PAD, "PAD" }, { 0, NULL } }; static const value_string ipset_ip_attr_vals[] = { { WS_IPSET_ATTR_IPADDR_IPV4, "IPv4 address" }, { WS_IPSET_ATTR_IPADDR_IPV6, "IPv6 address" }, { 0, NULL } }; static int dissect_ipset_ip_attrs(tvbuff_t *tvb, void *data _U_, struct packet_netlink_data *nl_data _U_, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ipset_ip_attr type = (enum ws_ipset_ip_attr) nla_type & NLA_TYPE_MASK; switch (type) { case WS_IPSET_ATTR_IPADDR_IPV4: proto_tree_add_item(tree, hf_ipset_ip_attr_ipv4, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_IPSET_ATTR_IPADDR_IPV6: proto_tree_add_item(tree, hf_ipset_ip_attr_ipv6, tvb, offset, len, ENC_NA); return 1; } return 0; } static int dissect_ipset_cadt_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ipset_cadt_attr type = (enum ws_ipset_cadt_attr) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_IPSET_ATTR_IP_FROM: case WS_IPSET_ATTR_IP_TO: if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_ipset_ip_attr, ett_ipset_ip_attr, info, nl_data, tree, offset, len, dissect_ipset_ip_attrs); return 0; case WS_IPSET_ATTR_CIDR: if (len == 1) { proto_tree_add_item(tree, hf_ipset_cadt_attr_cidr, tvb, offset, len, ENC_NA); return 1; } return 0; case WS_IPSET_ATTR_PORT_FROM: case WS_IPSET_ATTR_PORT_TO: /* TODO */ return 0; case WS_IPSET_ATTR_TIMEOUT: if (len == 4) { proto_tree_add_item(tree, hf_ipset_cadt_attr_timeout, tvb, offset, len, ENC_BIG_ENDIAN); return 1; } return 0; case WS_IPSET_ATTR_PROTO: /* TODO */ return 0; case WS_IPSET_ATTR_CADT_FLAGS: if (len == 4) { proto_tree_add_item(tree, hf_ipset_cadt_attr_cadt_flags, tvb, offset, len, ENC_BIG_ENDIAN); /* TODO show bits from enum ipset_cadt_flags */ return 1; } return 0; case WS_IPSET_ATTR_CADT_LINENO: case WS_IPSET_ATTR_MARK: case WS_IPSET_ATTR_MARKMASK: case WS_IPSET_ATTR_GC: case WS_IPSET_ATTR_HASHSIZE: case WS_IPSET_ATTR_MAXELEM: case WS_IPSET_ATTR_NETMASK: case WS_IPSET_ATTR_PROBES: case WS_IPSET_ATTR_RESIZE: case WS_IPSET_ATTR_SIZE: case WS_IPSET_ATTR_ELEMENTS: case WS_IPSET_ATTR_REFERENCES: case WS_IPSET_ATTR_MEMSIZE: /* TODO */ return 0; } return 0; } static int dissect_ipset_adt_data_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ipset_adt_attr type = (enum ws_ipset_adt_attr) nla_type & NLA_TYPE_MASK; if ((nla_type & NLA_TYPE_MASK) <= WS_IPSET_ATTR_CADT_MAX) return dissect_ipset_cadt_attrs(tvb, data, nl_data, tree, nla_type, offset, len); switch (type) { case WS_IPSET_ATTR_COMMENT: proto_tree_add_item(tree, hf_ipset_adt_attr_comment, tvb, offset, len, ENC_UTF_8); return 1; default: return 0; } return 0; } static int dissect_ipset_adt_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_ipset_adt_attr, ett_ipset_adt_attr, info, nl_data, tree, offset, len, dissect_ipset_adt_data_attrs); return 0; } static int dissect_ipset_attrs(tvbuff_t *tvb, void *data, struct packet_netlink_data *nl_data, proto_tree *tree, int nla_type, int offset, int len) { enum ws_ipset_attr type = (enum ws_ipset_attr) nla_type & NLA_TYPE_MASK; netlink_netfilter_info_t *info = (netlink_netfilter_info_t *) data; switch (type) { case WS_IPSET_ATTR_PROTOCOL: /* TODO */ return 0; case WS_IPSET_ATTR_SETNAME: proto_tree_add_item(tree, hf_ipset_attr_setname, tvb, offset, len, ENC_UTF_8); return 1; case WS_IPSET_ATTR_TYPENAME: proto_tree_add_item(tree, hf_ipset_attr_typename, tvb, offset, len, ENC_UTF_8); return 1; case WS_IPSET_ATTR_REVISION: /* TODO */ return 0; case WS_IPSET_ATTR_FAMILY: proto_tree_add_item(tree, hf_ipset_attr_family, tvb, offset, len, ENC_BIG_ENDIAN); return 1; case WS_IPSET_ATTR_FLAGS: if (len == 4) { proto_tree_add_item(tree, hf_ipset_attr_flags, tvb, offset, len, ENC_BIG_ENDIAN); /* TODO show bits from enum ipset_cmd_flags */ return 1; } return 0; case WS_IPSET_ATTR_DATA: /* See ipset lib/PROTOCOL, CADT attributes only follow for some commands */ if (nla_type & NLA_F_NESTED) { guint16 command = nl_data->type & 0xffff; if (command == WS_IPSET_CMD_CREATE || command == WS_IPSET_CMD_LIST || command == WS_IPSET_CMD_SAVE) return dissect_netlink_attributes(tvb, hf_ipset_cadt_attr, ett_ipset_cadt_attr, info, nl_data, tree, offset, len, dissect_ipset_cadt_attrs); else return dissect_netlink_attributes(tvb, hf_ipset_adt_attr, ett_ipset_adt_attr, info, nl_data, tree, offset, len, dissect_ipset_adt_data_attrs); } return 0; case WS_IPSET_ATTR_ADT: /* Following this, there will be an IPSET_ATTR_DATA with regular ADT attributes, not CADT */ if (nla_type & NLA_F_NESTED) return dissect_netlink_attributes(tvb, hf_ipset_attr, ett_ipset_attr, info, nl_data, tree, offset, len, dissect_ipset_adt_attrs); return 0; case WS_IPSET_ATTR_LINENO: case WS_IPSET_ATTR_PROTOCOL_MIN: case WS_IPSET_ATTR_INDEX: /* TODO */ return 0; } return 0; } static int dissect_netfilter_ipset(tvbuff_t *tvb, netlink_netfilter_info_t *info, struct packet_netlink_data *nl_data, proto_tree *tree, int offset) { offset = dissect_netlink_netfilter_header(tvb, tree, offset); return dissect_netlink_attributes_to_end(tvb, hf_ipset_attr, ett_ipset_attr, info, nl_data, tree, offset, dissect_ipset_attrs); } static const value_string netlink_netfilter_subsystem_vals[] = { { WS_NFNL_SUBSYS_NONE, "None" }, { WS_NFNL_SUBSYS_CTNETLINK, "Conntrack" }, { WS_NFNL_SUBSYS_CTNETLINK_EXP, "Conntrack expect" }, { WS_NFNL_SUBSYS_QUEUE, "Netfilter packet queue" }, { WS_NFNL_SUBSYS_ULOG, "Netfilter userspace logging" }, { WS_NFNL_SUBSYS_OSF, "OS fingerprint" }, { WS_NFNL_SUBSYS_IPSET, "IP set" }, { WS_NFNL_SUBSYS_ACCT, "Extended Netfilter accounting infrastructure" }, { WS_NFNL_SUBSYS_CTNETLINK_TIMEOUT, "Extended Netfilter Connection Tracking timeout tuning" }, { WS_NFNL_SUBSYS_CTHELPER, "Connection Tracking Helpers" }, { WS_NFNL_SUBSYS_NFTABLES, "Netfilter tables" }, { WS_NFNL_SUBSYS_NFT_COMPAT, "x_tables compatibility layer for nf_tables" }, { WS_NFNL_SUBSYS_COUNT, "Count" }, { 0, NULL } }; static int dissect_netlink_netfilter(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data) { struct packet_netlink_data *nl_data = (struct packet_netlink_data *)data; netlink_netfilter_info_t info; proto_tree *nlmsg_tree; proto_item *pi; int offset = 0; DISSECTOR_ASSERT(nl_data && nl_data->magic == PACKET_NETLINK_MAGIC); col_set_str(pinfo->cinfo, COL_PROTOCOL, "Netlink netfilter"); col_clear(pinfo->cinfo, COL_INFO); pi = proto_tree_add_item(tree, proto_netlink_netfilter, tvb, 0, -1, ENC_NA); nlmsg_tree = proto_item_add_subtree(pi, ett_netlink_netfilter); /* Netlink message header (nlmsghdr) */ offset = dissect_netlink_header(tvb, nlmsg_tree, offset, nl_data->encoding, -1, NULL); proto_tree_add_item(nlmsg_tree, hf_netlink_netfilter_subsys, tvb, 4, 2, nl_data->encoding); switch (nl_data->type >> 8) { case WS_NFNL_SUBSYS_CTNETLINK_EXP: proto_tree_add_item(nlmsg_tree, hf_nfexp_type, tvb, 4, 2, nl_data->encoding); break; case WS_NFNL_SUBSYS_QUEUE: proto_tree_add_item(nlmsg_tree, hf_nfq_type, tvb, 4, 2, nl_data->encoding); break; case WS_NFNL_SUBSYS_ULOG: proto_tree_add_item(nlmsg_tree, hf_netlink_netfilter_ulog_type, tvb, 4, 2, nl_data->encoding); break; case WS_NFNL_SUBSYS_IPSET: proto_tree_add_item(nlmsg_tree, hf_ipset_command, tvb, 4, 2, nl_data->encoding); break; } info.pinfo = pinfo; info.hw_protocol = 0; switch (nl_data->type >> 8) { case WS_NFNL_SUBSYS_CTNETLINK: offset = dissect_netfilter_ct(tvb, &info, nl_data, nlmsg_tree, offset); break; case WS_NFNL_SUBSYS_CTNETLINK_EXP: offset = dissect_netfilter_exp(tvb, &info, nl_data, nlmsg_tree, offset); break; case WS_NFNL_SUBSYS_QUEUE: offset = dissect_netfilter_queue(tvb, &info, nl_data, nlmsg_tree, offset); break; case WS_NFNL_SUBSYS_ULOG: offset = dissect_netfilter_ulog(tvb, &info, nl_data, nlmsg_tree, offset); break; case WS_NFNL_SUBSYS_IPSET: offset = dissect_netfilter_ipset(tvb, &info, nl_data, nlmsg_tree, offset); break; default: call_data_dissector(tvb_new_subset_remaining(tvb, offset), pinfo, nlmsg_tree); offset = tvb_reported_length(tvb); break; } return offset; } void proto_register_netlink_netfilter(void) { static hf_register_info hf[] = { { &hf_netlink_netfilter_family, { "Address family", "netlink-netfilter.family", FT_UINT8, BASE_DEC | BASE_EXT_STRING, &linux_af_vals_ext, 0x00, "nfnetlink address family", HFILL } }, { &hf_netlink_netfilter_version, { "Version", "netlink-netfilter.version", FT_UINT8, BASE_DEC, NULL, 0x00, "nfnetlink version", HFILL } }, { &hf_netlink_netfilter_resid, { "Resource id", "netlink-netfilter.res_id", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_proto_num_attr, { "Protocol", "netlink-netfilter.nfct_tuple.proto.num", FT_UINT8, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_proto_src_port_attr, { "Port", "netlink-netfilter.nfct_tuple.proto.src_port", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_proto_dst_port_attr, { "Port", "netlink-netfilter.nfct_tuple.proto.dst_port", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_proto_attr, { "Type", "netlink-netfilter.nfct_tuple.proto", FT_UINT16, BASE_DEC, VALS(nfct_tuple_l4proto_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfct_tuple_ip_attr_ipv4, { "IPv4 address", "netlink-netfilter.nfct_tuple.ip.ip_addr", FT_IPv4, BASE_NONE, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_ip_attr_ipv6, { "IPv6 address", "netlink-netfilter.nfct_tuple.ip.ip6_addr", FT_IPv6, BASE_NONE, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_ip_attr, { "Type", "netlink-netfilter.nfct_tuple.ip", FT_UINT16, BASE_DEC, VALS(nfct_tuple_ip_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfct_tuple_zone_attr, { "Zone", "netlink-netfilter.nfct_tuple.zone", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_tuple_attr, { "Type", "netlink-netfilter.nfct_tuple", FT_UINT16, BASE_DEC, VALS(nfct_tuple_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfct_attr_timeout, { "Timeout", "netlink-netfilter.ct_attr.timeout", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_attr_id, { "ID", "netlink-netfilter.ct_attr.id", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_attr_status_flag_expected, { "Expected", "netlink-netfilter.ct_attr.status.expected", FT_UINT32, BASE_DEC, NULL, WS_IPS_EXPECTED, "It is an expected connection", HFILL } }, { &hf_nfct_attr_status_flag_seen_reply, { "Seen reply", "netlink-netfilter.ct_attr.status.seen_reply", FT_UINT32, BASE_DEC, NULL, WS_IPS_SEEN_REPLY, "Packets going in both directions have been seen", HFILL } }, { &hf_nfct_attr_status_flag_assured, { "Assured", "netlink-netfilter.ct_attr.status.assured", FT_UINT32, BASE_DEC, NULL, WS_IPS_ASSURED, "Conntrack should never be early-expired", HFILL } }, { &hf_nfct_attr_status_flag_confirmed, { "Confirmed", "netlink-netfilter.ct_attr.status.confirmed", FT_UINT32, BASE_DEC, NULL, WS_IPS_CONFIRMED, "Connection is confirmed: originating packet has left box", HFILL } }, { &hf_nfct_attr_status_flag_src_nat, { "Source NAT", "netlink-netfilter.ct_attr.status.src_nat", FT_UINT32, BASE_DEC, NULL, WS_IPS_SRC_NAT, "Connection needs source NAT in orig dir.", HFILL } }, { &hf_nfct_attr_status_flag_dst_nat, { "Destination NAT", "netlink-netfilter.ct_attr.status.dst_nat", FT_UINT32, BASE_DEC, NULL, WS_IPS_DST_NAT, "Connection needs destination NAT in orig dir.", HFILL } }, { &hf_nfct_attr_status_flag_seq_adjust, { "Sequence adjust", "netlink-netfilter.ct_attr.status.seq_adjust", FT_UINT32, BASE_DEC, NULL, WS_IPS_SEQ_ADJUST, "Connection needs TCP sequence adjusted", HFILL } }, { &hf_nfct_attr_status_flag_src_nat_done, { "Source NAT done", "netlink-netfilter.ct_attr.status.src_nat_done", FT_UINT32, BASE_DEC, NULL, WS_IPS_SRC_NAT_DONE, "Source NAT has been initialized", HFILL } }, { &hf_nfct_attr_status_flag_dst_nat_done, { "Destination NAT done", "netlink-netfilter.ct_attr.status.dst_nat_done", FT_UINT32, BASE_DEC, NULL, WS_IPS_DST_NAT_DONE, "Destination NAT has been initialized", HFILL } }, { &hf_nfct_attr_status_flag_dying, { "Dying", "netlink-netfilter.ct_attr.status.dying", FT_UINT32, BASE_DEC, NULL, WS_IPS_DYING, "Connection is dying (removed from lists)", HFILL } }, { &hf_nfct_attr_status_flag_fixed_timeout, { "Fixed timeout", "netlink-netfilter.ct_attr.status.fixed_timeout", FT_UINT32, BASE_DEC, NULL, WS_IPS_FIXED_TIMEOUT, "Connection has fixed timeout", HFILL } }, { &hf_nfct_attr_status_flag_template, { "Template", "netlink-netfilter.ct_attr.status.template", FT_UINT32, BASE_DEC, NULL, WS_IPS_TEMPLATE, "Conntrack is a template", HFILL } }, { &hf_nfct_attr_status_flag_untracked, { "Untracked", "netlink-netfilter.ct_attr.status.untracked", FT_UINT32, BASE_DEC, NULL, WS_IPS_UNTRACKED, "Conntrack is a fake untracked entry. Obsolete and not used anymore", HFILL } }, { &hf_nfct_attr_status_flag_helper, { "Helper", "netlink-netfilter.ct_attr.status.helper", FT_UINT32, BASE_DEC, NULL, WS_IPS_HELPER, "Conntrack got a helper explicitly attached via CT target", HFILL } }, { &hf_nfct_attr_status_flag_offload, { "Offload", "netlink-netfilter.ct_attr.status.offload", FT_UINT32, BASE_DEC, NULL, WS_IPS_OFFLOAD, NULL, HFILL } }, { &hf_nfct_attr_status, { "Status", "netlink-netfilter.ct_attr.status", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_help_attr_help_name, { "Helper name", "netlink-netfilter.ct_help_attr.help_name", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_nfct_help_attr, { "Helper", "netlink-netfilter.ct_help_attr", FT_UINT16, BASE_DEC, VALS(nfct_help_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfct_seqadj_attr_correction_pos, { "Position", "netlink-netfilter.ct_seqadj_correction_pos", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_seqadj_attr_offset_before, { "Offset", "netlink-netfilter.ct_seqadj_offset_before", FT_INT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_seqadj_attr_offset_after, { "Offset", "netlink-netfilter.ct_seqadj_offset_after", FT_INT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfct_seqadj_attr, { "Adjustment", "netlink-netfilter.ct_seqadj_attr", FT_UINT16, BASE_DEC, VALS(nfct_seqadj_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfct_attr, { "Type", "netlink-netfilter.ct.attr", FT_UINT16, BASE_DEC, VALS(nfct_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfexp_nat_attr_dir, { "Direction", "netlink-netfilter.nfexp.nat.dir", FT_UINT32, BASE_DEC, VALS(nfexp_conntrack_dir_vals), 0x00, NULL, HFILL } }, { &hf_nfexp_nat_attr, { "Type", "netlink-netfilter.nfexp.nat", FT_UINT16, BASE_DEC, VALS(nfexp_nat_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfexp_attr_timeout, { "Timeout", "netlink-netfilter.nfexp.timeout", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_attr_id, { "ID", "netlink-netfilter.nfexp.id", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_attr_class, { "Class", "netlink-netfilter.nfexp.class", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_attr_zone, { "Zone", "netlink-netfilter.nfexp.zone", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_attr_fn, { "Name", "netlink-netfilter.nfexp.fn", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_nfexp_attr_flag_permanent, { "Permanent", "netlink-netfilter.nfexp.flags.permanent", FT_UINT32, BASE_DEC, NULL, WS_NF_CT_EXPECT_PERMANENT, NULL, HFILL } }, { &hf_nfexp_attr_flag_inactive, { "Inactive", "netlink-netfilter.nfexp.flags.inactive", FT_UINT32, BASE_DEC, NULL, WS_NF_CT_EXPECT_INACTIVE, NULL, HFILL } }, { &hf_nfexp_attr_flag_userspace, { "Userspace", "netlink-netfilter.nfexp.flags.userspace", FT_UINT32, BASE_DEC, NULL, WS_NF_CT_EXPECT_USERSPACE, NULL, HFILL } }, { &hf_nfexp_attr_flags, { "Flags", "netlink-netfilter.nfexp.flags", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_attr, { "Type", "netlink-netfilter.exp.attr", FT_UINT16, BASE_DEC, VALS(nfexp_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfq_config_command_command, { "Command", "netlink-netfilter.queue.config.command.command", FT_UINT8, BASE_DEC, VALS(nfq_config_command_vals), 0x00, NULL, HFILL } }, { &hf_nfq_config_command_pf, { "Protocol family", "netlink-netfilter.queue.config.command.pf", FT_UINT16, BASE_DEC, VALS(nfproto_family_vals), 0x00, NULL, HFILL } }, { &hf_nfq_config_params_copyrange, { "Copy range", "netlink-netfilter.queue.config.params.copy_range", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_config_params_copymode, { "Copy mode", "netlink-netfilter.queue.config.params.copy_mode", FT_UINT8, BASE_DEC, VALS(nfq_config_mode_vals), 0x00, NULL, HFILL } }, { &hf_nfq_config_queue_maxlen, { "Maximum queue length", "netlink-netfilter.queue.config.queue_maxlen", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_config_mask, { "Flags mask", "netlink-netfilter.queue.config.mask", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_config_flags, { "Flags", "netlink-netfilter.queue.config.flags", FT_UINT32, BASE_HEX, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_config_attr, { "Type", "netlink-netfilter.queue.config_attr", FT_UINT16, BASE_DEC, VALS(nfq_config_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_nfq_verdict_verdict, { "Verdict", "netlink-netfilter.queue.verdict.verdict", FT_UINT32, BASE_DEC, VALS(nfq_verdict_vals), 0x00, NULL, HFILL } }, { &hf_nfq_verdict_id, { "Verdict ID", "netlink-netfilter.queue.verdict.id", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_packet_id, { "Packet ID", "netlink-netfilter.queue.packet.id", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_packet_hwprotocol, { "HW protocol", "netlink-netfilter.queue.packet.protocol", FT_UINT16, BASE_HEX, VALS(etype_vals), 0x00, NULL, HFILL } }, { &hf_nfq_packet_hook, { "Netfilter hook", "netlink-netfilter.queue.packet.hook", FT_UINT8, BASE_DEC, VALS(netfilter_hooks_vals), 0x00, NULL, HFILL } }, { &hf_nfq_nfmark, { "Mark", "netlink-netfilter.queue.nfmark", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_timestamp, { "Timestamp", "netlink-netfilter.queue.timestamp", FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_ifindex_indev, { "IFINDEX_INDEV", "netlink-netfilter.queue.ifindex_indev", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_ifindex_outdev, { "IFINDEX_OUTDEV", "netlink-netfilter.queue.ifindex_outdev", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_ifindex_physindev, { "IFINDEX_PHYSINDEV", "netlink-netfilter.queue.ifindex_physindev", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_ifindex_physoutdev, { "IFINDEX_PHYSOUTDEV", "netlink-netfilter.queue.ifindex_physoutdev", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_hwaddr_len, { "Address length", "netlink-netfilter.queue.hwaddr.len", FT_UINT16, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_hwaddr_addr, { "Address", "netlink-netfilter.queue.hwaddr.addr", FT_ETHER, BASE_NONE, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_ctinfo, { "Conntrack info", "netlink-netfilter.queue.ct_info", FT_UINT32, BASE_DEC, VALS(nfq_ctinfo_vals), 0x00, "Connection state tracking info", HFILL } }, { &hf_nfq_caplen, { "Length of captured packet", "netlink-netfilter.queue.caplen", FT_UINT32, BASE_DEC, NULL, 0x00, "Length of captured, untruncated packet", HFILL } }, { &hf_nfq_uid, { "UID", "netlink-netfilter.queue.uid", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_gid, { "GID", "netlink-netfilter.queue.gid", FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } }, { &hf_nfq_attr, { "Type", "netlink-netfilter.queue.attr", FT_UINT16, BASE_DEC, VALS(nfq_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_netlink_netfilter_ulog_type, { "Type", "netlink-netfilter.ulog_type", FT_UINT16, BASE_DEC, VALS(netlink_netfilter_ulog_type_vals), 0x00FF, NULL, HFILL } }, { &hf_ipset_attr, { "Type", "netlink-netfilter.ipset_attr", FT_UINT16, BASE_DEC, VALS(ipset_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_ipset_cadt_attr, { "Type", "netlink-netfilter.ipset_cadt_attr", FT_UINT16, BASE_DEC, VALS(ipset_cadt_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_ipset_cadt_attr_cidr, { "CIDR", "netlink-netfilter.ipset.cidr", FT_UINT8, BASE_DEC, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_cadt_attr_timeout, { "Timeout", "netlink-netfilter.ipset.timeout", FT_UINT32, BASE_DEC, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_cadt_attr_cadt_flags, { "Flags", "netlink-netfilter.ipset.cadt_flags", FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_attr_setname, { "Setname", "netlink-netfilter.ipset.setname", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_attr_typename, { "Typename", "netlink-netfilter.ipset.typename", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_attr_family, { "Settype family", "netlink-netfilter.ipset.family", FT_UINT8, BASE_DEC, VALS(nfproto_family_vals), 0x00, NULL, HFILL } }, { &hf_ipset_attr_flags, { "Flags", "netlink-netfilter.ipset.flags", FT_UINT32, BASE_HEX, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_adt_attr, { "Type", "netlink-netfilter.ipset_adt_attr", FT_UINT16, BASE_DEC, VALS(ipset_adt_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_ipset_adt_attr_comment, { "Comment", "netlink-netfilter.ipset.comment", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL } }, { &hf_ipset_ip_attr, { "Type", "netlink-netfilter.ipset_ip_attr", FT_UINT16, BASE_DEC, VALS(ipset_ip_attr_vals), NLA_TYPE_MASK, NULL, HFILL } }, { &hf_ipset_ip_attr_ipv4, { "IPv4 address", "netlink-netfilter.ipset.ip_addr", FT_IPv4, BASE_NONE, NULL, 0x00, NULL, HFILL } }, { &hf_ipset_ip_attr_ipv6, { "IPv6 address", "netlink-netfilter.ipset.ip6_addr", FT_IPv6, BASE_NONE, NULL, 0x00, NULL, HFILL } }, { &hf_nfexp_type, { "Type", "netlink-netfilter.exp_type", FT_UINT16, BASE_DEC, VALS(nfexp_type_vals), 0x00FF, NULL, HFILL } }, { &hf_nfq_type, { "Type", "netlink-netfilter.queue_type", FT_UINT16, BASE_DEC, VALS(nfq_type_vals), 0x00FF, NULL, HFILL } }, { &hf_ipset_command, { "Command", "netlink-netfilter.ipset_command", FT_UINT16, BASE_DEC, VALS(ipset_command_vals), 0x00FF, NULL, HFILL } }, { &hf_netlink_netfilter_subsys, { "Subsystem", "netlink-netfilter.subsys", FT_UINT16, BASE_DEC, VALS(netlink_netfilter_subsystem_vals), 0xFF00, NULL, HFILL } }, }; static gint *ett[] = { &ett_netlink_netfilter, &ett_nfct_attr, &ett_nfct_help_attr, &ett_nfct_seqadj_attr, &ett_nfct_status_attr, &ett_nfct_tuple_attr, &ett_nfct_tuple_ip_attr, &ett_nfct_tuple_proto_attr, &ett_nfq_config_attr, &ett_nfq_attr, &ett_nfexp_attr, &ett_nfexp_flags_attr, &ett_nfexp_nat_attr, &ett_ipset_attr, &ett_ipset_cadt_attr, &ett_ipset_adt_attr, &ett_ipset_ip_attr, }; proto_netlink_netfilter = proto_register_protocol("Linux netlink netfilter protocol", "netfilter", "netlink-netfilter" ); proto_register_field_array(proto_netlink_netfilter, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); netlink_netfilter = create_dissector_handle(dissect_netlink_netfilter, proto_netlink_netfilter); } void proto_reg_handoff_netlink_netfilter(void) { dissector_add_uint("netlink.protocol", WS_NETLINK_NETFILTER, netlink_netfilter); nflog_handle = find_dissector_add_dependency("nflog", proto_netlink_netfilter); ethertype_table = find_dissector_table("ethertype"); } /* * Editor modelines - https://www.wireshark.org/tools/modelines.html * * Local variables: * c-basic-offset: 8 * tab-width: 8 * indent-tabs-mode: t * End: * * vi: set shiftwidth=8 tabstop=8 noexpandtab: * :indentSize=8:tabSize=8:noTabs=false: */