18b4e25c95
being put in for sets). svn path=/trunk/; revision=7064
2471 lines
100 KiB
C
2471 lines
100 KiB
C
/* packet-bgp.c
|
|
* Routines for BGP packet dissection.
|
|
* Copyright 1999, Jun-ichiro itojun Hagino <itojun@itojun.org>
|
|
*
|
|
* $Id: packet-bgp.c,v 1.74 2003/01/31 08:09:24 guy Exp $
|
|
*
|
|
* Supports:
|
|
* RFC1771 A Border Gateway Protocol 4 (BGP-4)
|
|
* RFC1965 Autonomous System Confederations for BGP
|
|
* RFC1997 BGP Communities Attribute
|
|
* RFC2547 BGP/MPLS VPNs
|
|
* RFC2796 BGP Route Reflection An alternative to full mesh IBGP
|
|
* RFC2842 Capabilities Advertisement with BGP-4
|
|
* RFC2858 Multiprotocol Extensions for BGP-4
|
|
* RFC2918 Route Refresh Capability for BGP-4
|
|
* RFC3107 Carrying Label Information in BGP-4
|
|
* Draft Ramahandra on Extended Communities Extentions
|
|
* draft-ietf-idr-as4bytes-06
|
|
* draft-ietf-idr-dynamic-cap-03
|
|
*
|
|
* TODO:
|
|
* Destination Preference Attribute for BGP (work in progress)
|
|
* RFC1863 A BGP/IDRP Route Server alternative to a full mesh routing
|
|
*
|
|
* Ethereal - Network traffic analyzer
|
|
* By Gerald Combs <gerald@ethereal.com>
|
|
* Copyright 1998 Gerald Combs
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
# include "config.h"
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
#include <glib.h>
|
|
|
|
#ifdef NEED_SNPRINTF_H
|
|
# include "snprintf.h"
|
|
#endif
|
|
|
|
#include <epan/packet.h>
|
|
#include "packet-bgp.h"
|
|
#include "packet-ipv6.h"
|
|
#include "afn.h"
|
|
#include "prefs.h"
|
|
|
|
static const value_string bgptypevals[] = {
|
|
{ BGP_OPEN, "OPEN Message" },
|
|
{ BGP_UPDATE, "UPDATE Message" },
|
|
{ BGP_NOTIFICATION, "NOTIFICATION Message" },
|
|
{ BGP_KEEPALIVE, "KEEPALIVE Message" },
|
|
{ BGP_ROUTE_REFRESH, "ROUTE-REFRESH Message" },
|
|
{ BGP_CAPABILITY, "CAPABILITY Message" },
|
|
{ BGP_ROUTE_REFRESH_CISCO, "Cisco ROUTE-REFRESH Message" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpnotify_major[] = {
|
|
{ 1, "Message Header Error" },
|
|
{ 2, "OPEN Message Error" },
|
|
{ 3, "UPDATE Message Error" },
|
|
{ 4, "Hold Timer Expired" },
|
|
{ 5, "Finite State Machine Error" },
|
|
{ 6, "Cease" },
|
|
{ 7, "CAPABILITY Message Error" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpnotify_minor_1[] = {
|
|
{ 1, "Connection Not Synchronized" },
|
|
{ 2, "Bad Message Length" },
|
|
{ 3, "Bad Message Type" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpnotify_minor_2[] = {
|
|
{ 1, "Unsupported Version Number" },
|
|
{ 2, "Bad Peer AS" },
|
|
{ 3, "Bad BGP Identifier" },
|
|
{ 4, "Unsupported Optional Parameter" },
|
|
{ 5, "Authentication Failure" },
|
|
{ 6, "Unacceptable Hold Time" },
|
|
{ 7, "Unsupported Capability" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpnotify_minor_3[] = {
|
|
{ 1, "Malformed Attribute List" },
|
|
{ 2, "Unrecognized Well-known Attribute" },
|
|
{ 3, "Missing Well-known Attribute" },
|
|
{ 4, "Attribute Flags Error" },
|
|
{ 5, "Attribute Length Error" },
|
|
{ 6, "Invalid ORIGIN Attribute" },
|
|
{ 7, "AS Routing Loop" },
|
|
{ 8, "Invalid NEXT_HOP Attribute" },
|
|
{ 9, "Optional Attribute Error" },
|
|
{ 10, "Invalid Network Field" },
|
|
{ 11, "Malformed AS_PATH" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpnotify_minor_7[] = {
|
|
{ 1, "Invalid Action Value" },
|
|
{ 2, "Invalid Capability Length" },
|
|
{ 3, "Malformed Capability Value" },
|
|
{ 4, "Unsopported Capability Code" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string *bgpnotify_minor[] = {
|
|
NULL, bgpnotify_minor_1, bgpnotify_minor_2, bgpnotify_minor_3,
|
|
};
|
|
|
|
static const value_string bgpattr_origin[] = {
|
|
{ 0, "IGP" },
|
|
{ 1, "EGP" },
|
|
{ 2, "INCOMPLETE" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string as_segment_type[] = {
|
|
{ 1, "AS_SET" },
|
|
{ 2, "AS_SEQUENCE" },
|
|
/* RFC1965 has the wrong values, corrected in */
|
|
/* draft-ietf-idr-bgp-confed-rfc1965bis-01.txt */
|
|
{ 4, "AS_CONFED_SET" },
|
|
{ 3, "AS_CONFED_SEQUENCE" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgpattr_type[] = {
|
|
{ BGPTYPE_ORIGIN, "ORIGIN" },
|
|
{ BGPTYPE_AS_PATH, "AS_PATH" },
|
|
{ BGPTYPE_NEXT_HOP, "NEXT_HOP" },
|
|
{ BGPTYPE_MULTI_EXIT_DISC, "MULTI_EXIT_DISC" },
|
|
{ BGPTYPE_LOCAL_PREF, "LOCAL_PREF" },
|
|
{ BGPTYPE_ATOMIC_AGGREGATE, "ATOMIC_AGGREGATE" },
|
|
{ BGPTYPE_AGGREGATOR, "AGGREGATOR" },
|
|
{ BGPTYPE_COMMUNITIES, "COMMUNITIES" },
|
|
{ BGPTYPE_ORIGINATOR_ID, "ORIGINATOR_ID" },
|
|
{ BGPTYPE_CLUSTER_LIST, "CLUSTER_LIST" },
|
|
{ BGPTYPE_MP_REACH_NLRI, "MP_REACH_NLRI" },
|
|
{ BGPTYPE_MP_UNREACH_NLRI, "MP_UNREACH_NLRI" },
|
|
{ BGPTYPE_EXTENDED_COMMUNITY, "EXTENDED_COMMUNITIES" },
|
|
{ BGPTYPE_NEW_AS_PATH, "NEW_AS_PATH" },
|
|
{ BGPTYPE_NEW_AGGREGATOR, "NEW_AGGREGATOR" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
/* Beware : See also MAX_SIZE_OF_EXT_COM_NAMES */
|
|
static const value_string bgpext_com_type[] = {
|
|
{ BGP_EXT_COM_RT_0, "Route Target" },
|
|
{ BGP_EXT_COM_RT_1, "Route Target" },
|
|
{ BGP_EXT_COM_RO_0, "Route Origin" },
|
|
{ BGP_EXT_COM_RO_1, "Route Origin" },
|
|
{ BGP_EXT_COM_LINKBAND, "Link Bandwidth" },
|
|
{ BGP_EXT_COM_VPN_ORIGIN, "OSPF Domain" },
|
|
{ BGP_EXT_COM_OSPF_RTYPE, "OSPF Route Type" },
|
|
{ BGP_EXT_COM_OSPF_RID, "OSPF Router ID" },
|
|
{ BGP_EXT_COM_L2INFO, "Layer 2 Information" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string bgp_l2vpn_encaps[] = {
|
|
{ 0, "Reserved"},
|
|
{ 1, "Frame Relay"},
|
|
{ 2, "ATM AAL5 VCC transport"},
|
|
{ 3, "ATM transparent cell transport"},
|
|
{ 4, "Ethernet VLAN"},
|
|
{ 5, "Ethernet"},
|
|
{ 6, "Cisco-HDLC"},
|
|
{ 7, "PPP"},
|
|
{ 8, "CEM"},
|
|
{ 9, "ATM VCC cell transport"},
|
|
{ 10, "ATM VPC cell transport"},
|
|
{ 11, "MPLS"},
|
|
{ 12, "VPLS"},
|
|
{ 64, "IP-interworking"},
|
|
{ 0, NULL},
|
|
};
|
|
|
|
static const value_string bgpext_ospf_rtype[] = {
|
|
{ BGP_OSPF_RTYPE_RTR, "Router" },
|
|
{ BGP_OSPF_RTYPE_NET, "Network" },
|
|
{ BGP_OSPF_RTYPE_SUM, "Summary" },
|
|
{ BGP_OSPF_RTYPE_EXT, "External" },
|
|
{ BGP_OSPF_RTYPE_NSSA,"NSSA External" },
|
|
{ BGP_OSPF_RTYPE_SHAM,"MPLS-VPN Sham" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
|
|
/* MUST be resized if a longer named extended community is added */
|
|
#define MAX_SIZE_OF_EXT_COM_NAMES 20
|
|
|
|
/* Subsequent address family identifier, RFC2858 */
|
|
static const value_string bgpattr_nlri_safi[] = {
|
|
{ 0, "Reserved" },
|
|
{ SAFNUM_UNICAST, "Unicast" },
|
|
{ SAFNUM_MULCAST, "Multicast" },
|
|
{ SAFNUM_UNIMULC, "Unicast+Multicast" },
|
|
{ SAFNUM_MPLS_LABEL, "Labeled Unicast"},
|
|
{ SAFNUM_LAB_VPNUNICAST, "Labeled VPN Unicast" }, /* draft-rosen-rfc2547bis-03 */
|
|
{ SAFNUM_LAB_VPNMULCAST, "Labeled VPN Multicast" },
|
|
{ SAFNUM_LAB_VPNUNIMULC, "Labeled VPN Unicast+Multicast" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
/* ORF Type, draft-ietf-idr-route-filter-04.txt */
|
|
static const value_string orf_type_vals[] = {
|
|
{ 2, "Communities ORF-Type" },
|
|
{ 3, "Extended Communities ORF-Type" },
|
|
{ 128, "Cisco PrefixList ORF-Type" },
|
|
{ 129, "Cisco CommunityList ORF-Type" },
|
|
{ 130, "Cisco Extended CommunityList ORF-Type" },
|
|
{ 131, "Cisco AsPathList ORF-Type" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
/* ORF Send/Receive, draft-ietf-idr-route-filter-04.txt */
|
|
static const value_string orf_send_recv_vals[] = {
|
|
{ 1, "Receive" },
|
|
{ 2, "Send" },
|
|
{ 3, "Both" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
/* ORF Send/Receive, draft-ietf-idr-route-filter-04.txt */
|
|
static const value_string orf_when_vals[] = {
|
|
{ 1, "Immediate" },
|
|
{ 2, "Defer" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string orf_entry_action_vals[] = {
|
|
{ 0, "Add" },
|
|
{ 0x40, "Remove" },
|
|
{ 0x80, "RemoveAll" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string orf_entry_match_vals[] = {
|
|
{ 0, "Permit" },
|
|
{ 0x20, "Deny" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
static const value_string capability_vals[] = {
|
|
{ BGP_CAPABILITY_RESERVED, "Reserved capability" },
|
|
{ BGP_CAPABILITY_MULTIPROTOCOL, "Multiprotocol extensions capability" },
|
|
{ BGP_CAPABILITY_ROUTE_REFRESH, "Route refresh capability" },
|
|
{ BGP_CAPABILITY_COOPERATIVE_ROUTE_FILTERING, "Cooperative route filtering capability" },
|
|
{ BGP_CAPABILITY_GRACEFUL_RESTART, "Graceful Restart capability" },
|
|
{ BGP_CAPABILITY_4_OCTET_AS_NUMBER, "Support for 4-octet AS number capability" },
|
|
{ BGP_CAPABILITY_DYNAMIC_CAPABILITY, "Support for Dynamic capability" },
|
|
{ BGP_CAPABILITY_ROUTE_REFRESH_CISCO, "Route refresh capability" },
|
|
{ BGP_CAPABILITY_ORF_CISCO, "Cooperative route filtering capability" },
|
|
};
|
|
|
|
/* Capability Message action code */
|
|
static const value_string bgpcap_action[] = {
|
|
{ 0, "advertising a capability" },
|
|
{ 1, "removing a capability" },
|
|
{ 0, NULL },
|
|
};
|
|
|
|
|
|
/* Maximal size of an IP address string */
|
|
#define MAX_SIZE_OF_IP_ADDR_STRING 16
|
|
|
|
static int proto_bgp = -1;
|
|
static int hf_bgp_type = -1;
|
|
|
|
static gint ett_bgp = -1;
|
|
static gint ett_bgp_unfeas = -1;
|
|
static gint ett_bgp_attrs = -1;
|
|
static gint ett_bgp_attr = -1;
|
|
static gint ett_bgp_attr_flags = -1;
|
|
static gint ett_bgp_mp_nhna = -1;
|
|
static gint ett_bgp_mp_reach_nlri = -1;
|
|
static gint ett_bgp_mp_unreach_nlri = -1;
|
|
static gint ett_bgp_mp_snpa = -1;
|
|
static gint ett_bgp_nlri = -1;
|
|
static gint ett_bgp_open = -1;
|
|
static gint ett_bgp_update = -1;
|
|
static gint ett_bgp_notification = -1;
|
|
static gint ett_bgp_route_refresh = -1; /* ROUTE-REFRESH message tree */
|
|
static gint ett_bgp_capability = -1;
|
|
static gint ett_bgp_as_paths = -1;
|
|
static gint ett_bgp_communities = -1;
|
|
static gint ett_bgp_cluster_list = -1; /* cluster list tree */
|
|
static gint ett_bgp_options = -1; /* optional parameters tree */
|
|
static gint ett_bgp_option = -1; /* an optional parameter tree */
|
|
static gint ett_bgp_extended_communities = -1 ; /* extended communities list tree */
|
|
static gint ett_bgp_orf = -1; /* orf (outbound route filter) tree */
|
|
static gint ett_bgp_orf_entry = -1; /* orf entry tree */
|
|
|
|
/* desegmentation */
|
|
static gboolean bgp_desegment = TRUE;
|
|
|
|
static gint bgp_asn_len = 0;
|
|
|
|
/*
|
|
* Decode an IPv4 prefix.
|
|
*/
|
|
static int
|
|
decode_prefix4(tvbuff_t *tvb, gint offset, char *buf, int buflen)
|
|
{
|
|
guint8 addr[4]; /* IP address */
|
|
guint8 plen; /* prefix length */
|
|
int length; /* number of octets needed for prefix */
|
|
|
|
/* snarf length */
|
|
plen = tvb_get_guint8(tvb, offset);
|
|
if (plen > 32)
|
|
return -1;
|
|
length = (plen + 7) / 8;
|
|
|
|
/* snarf prefix */
|
|
memset(addr, 0, sizeof(addr));
|
|
tvb_memcpy(tvb, addr, offset + 1, length);
|
|
if (plen % 8)
|
|
addr[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
/* hand back a formatted string */
|
|
snprintf(buf, buflen, "%s/%u", ip_to_str(addr), plen);
|
|
return(1 + length);
|
|
}
|
|
|
|
/*
|
|
* Decode an IPv6 prefix.
|
|
*/
|
|
static int
|
|
decode_prefix6(tvbuff_t *tvb, gint offset, char *buf, int buflen)
|
|
{
|
|
struct e_in6_addr addr; /* IPv6 address */
|
|
int plen; /* prefix length */
|
|
int length; /* number of octets needed for prefix */
|
|
|
|
/* snarf length */
|
|
plen = tvb_get_guint8(tvb, offset);
|
|
if (plen < 0 || 128 < plen)
|
|
return -1;
|
|
length = (plen + 7) / 8;
|
|
|
|
/* snarf prefix */
|
|
memset(&addr, 0, sizeof(addr));
|
|
tvb_memcpy(tvb, (guint8 *)&addr, offset + 1, length);
|
|
if (plen % 8)
|
|
addr.s6_addr[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
/* hand back a formatted string */
|
|
snprintf(buf, buflen, "%s/%d", ip6_to_str(&addr), plen);
|
|
return(1 + length);
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* Decode an MPLS label stack
|
|
*/
|
|
static int
|
|
decode_MPLS_stack(tvbuff_t *tvb, gint offset, char *buf, size_t buflen)
|
|
{
|
|
guint32 label_entry; /* an MPLS label enrty (label + COS field + stack bit */
|
|
gint index; /* index for the label stack */
|
|
char junk_buf[256]; /* tmp */
|
|
|
|
index = offset ;
|
|
label_entry = 0x000000 ;
|
|
|
|
buf[0] = '\0' ;
|
|
|
|
while ((label_entry & 0x000001) == 0) {
|
|
|
|
label_entry = tvb_get_ntoh24(tvb, index) ;
|
|
|
|
/* withdrawn routes may contain 0 or 0x800000 in the first label */
|
|
if((index-offset)==0&&(label_entry==0||label_entry==0x800000)) {
|
|
snprintf(buf, buflen, "0 (withdrawn)");
|
|
return (1);
|
|
}
|
|
|
|
snprintf(junk_buf, sizeof(junk_buf),"%u%s", (label_entry >> 4), ((label_entry & 0x000001) == 0) ? "," : " (bottom)");
|
|
if (strlen(buf) + strlen(junk_buf) + 1 <= buflen)
|
|
strcat(buf, junk_buf);
|
|
index += 3 ;
|
|
|
|
if ((label_entry & 0x000001) == 0) {
|
|
/* real MPLS multi-label stack in BGP? - maybe later; for now, it must be a bogus packet */
|
|
strcpy(junk_buf, " (BOGUS: Bottom of Stack NOT set!)");
|
|
if (strlen(buf) + strlen(junk_buf) + 1 <= buflen)
|
|
strcat(buf, junk_buf);
|
|
break;
|
|
}
|
|
}
|
|
|
|
return((index - offset) / 3);
|
|
}
|
|
|
|
/*
|
|
* Decode a multiprotocol address
|
|
*/
|
|
|
|
static int
|
|
mp_addr_to_str (guint16 afi, guint8 safi, tvbuff_t *tvb, gint offset, char *buf, int buflen)
|
|
{
|
|
int length; /* length of the address in byte */
|
|
guint8 ip4addr[4],ip4addr2[4]; /* IPv4 address */
|
|
guint16 rd_type; /* Route Distinguisher type */
|
|
struct e_in6_addr ip6addr; /* IPv6 address */
|
|
|
|
length = 0 ;
|
|
switch (afi) {
|
|
case AFNUM_INET:
|
|
switch (safi) {
|
|
case SAFNUM_UNICAST:
|
|
case SAFNUM_MULCAST:
|
|
case SAFNUM_UNIMULC:
|
|
case SAFNUM_MPLS_LABEL:
|
|
length = 4 ;
|
|
tvb_memcpy(tvb, ip4addr, offset, sizeof(ip4addr));
|
|
snprintf(buf, buflen, "%s", ip_to_str(ip4addr));
|
|
break;
|
|
case SAFNUM_LAB_VPNUNICAST:
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
rd_type=tvb_get_ntohs(tvb,offset) ;
|
|
switch (rd_type) {
|
|
case FORMAT_AS2_LOC:
|
|
length = 8 + sizeof(ip4addr);
|
|
tvb_memcpy(tvb, ip4addr, offset + 8, sizeof(ip4addr)); /* Next Hop */
|
|
snprintf(buf, buflen, "Empty Label Stack RD=%u:%u IP=%s",
|
|
tvb_get_ntohs(tvb, offset + 2),
|
|
tvb_get_ntohl(tvb, offset + 4),
|
|
ip_to_str(ip4addr));
|
|
break;
|
|
case FORMAT_IP_LOC:
|
|
length = 8 + sizeof(ip4addr);
|
|
tvb_memcpy(tvb, ip4addr, offset + 2, sizeof(ip4addr)); /* IP part of the RD */
|
|
tvb_memcpy(tvb, ip4addr2, offset + 8, sizeof(ip4addr)); /* Next Hop */
|
|
snprintf(buf, buflen, "Empty Label Stack RD=%s:%u IP=%s",
|
|
ip_to_str(ip4addr),
|
|
tvb_get_ntohs(tvb, offset + 6),
|
|
ip_to_str(ip4addr2));
|
|
break ;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown (0x%04x)labeled VPN address format",rd_type);
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
case AFNUM_INET6:
|
|
switch (safi) {
|
|
case SAFNUM_UNICAST:
|
|
case SAFNUM_MULCAST:
|
|
case SAFNUM_UNIMULC:
|
|
length = 16 ;
|
|
tvb_memcpy(tvb, ip6addr.u6_addr.u6_addr8,offset, 16);
|
|
snprintf(buf, buflen, "%s", ip6_to_str(&ip6addr));
|
|
break;
|
|
case SAFNUM_LAB_VPNUNICAST:
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
rd_type=tvb_get_ntohs(tvb,offset) ;
|
|
switch (rd_type) {
|
|
case FORMAT_AS2_LOC:
|
|
length = 8 + 16;
|
|
tvb_memcpy(tvb, ip6addr.u6_addr.u6_addr8, offset + 8, 16); /* Next Hop */
|
|
snprintf(buf, buflen, "Empty Label Stack RD=%u:%u IP=%s",
|
|
tvb_get_ntohs(tvb, offset + 2),
|
|
tvb_get_ntohl(tvb, offset + 4),
|
|
ip6_to_str(&ip6addr));
|
|
break;
|
|
case FORMAT_IP_LOC:
|
|
length = 8 + 16;
|
|
tvb_memcpy(tvb, ip4addr, offset + 2, sizeof(ip4addr)); /* IP part of the RD */
|
|
tvb_memcpy(tvb, ip6addr.u6_addr.u6_addr8, offset + 8, 16); /* Next Hop */
|
|
snprintf(buf, buflen, "Empty Label Stack RD=%s:%u IP=%s",
|
|
ip_to_str(ip4addr),
|
|
tvb_get_ntohs(tvb, offset + 6),
|
|
ip6_to_str(&ip6addr));
|
|
break ;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown (0x%04x)labeled VPN address format",rd_type);
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
case AFNUM_L2VPN:
|
|
switch (safi) {
|
|
case SAFNUM_LAB_VPNUNICAST: /* only labeles prefixes do make sense */
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
length = 4; /* the next-hop is simply an ipv4 addr */
|
|
tvb_memcpy(tvb, ip4addr, offset + 0, 4);
|
|
snprintf(buf, buflen, "IP=%s",
|
|
ip_to_str(ip4addr));
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown AFI (%u) value", afi);
|
|
break;
|
|
}
|
|
return(length) ;
|
|
}
|
|
|
|
/*
|
|
* Decode a multiprotocol prefix
|
|
*/
|
|
static int
|
|
decode_prefix_MP(guint16 afi, guint8 safi, tvbuff_t *tvb, gint offset, char *buf, int buflen)
|
|
{
|
|
int length; /* length of the prefix in byte */
|
|
guint8 plen; /* length of the prefix in bit */
|
|
int labnum; /* number of labels */
|
|
int ce_id,labblk_off;
|
|
guint8 ip4addr[4],ip4addr2[4]; /* IPv4 address */
|
|
struct e_in6_addr ip6addr; /* IPv6 address */
|
|
guint16 rd_type; /* Route Distinguisher type */
|
|
char lab_stk[256]; /* label stack */
|
|
|
|
length = 0 ;
|
|
|
|
switch (afi) {
|
|
case AFNUM_INET:
|
|
switch (safi) {
|
|
case SAFNUM_UNICAST:
|
|
case SAFNUM_MULCAST:
|
|
case SAFNUM_UNIMULC:
|
|
length = decode_prefix4(tvb, offset, buf, buflen) - 1 ;
|
|
break;
|
|
case SAFNUM_MPLS_LABEL:
|
|
plen = tvb_get_guint8(tvb,offset) ;
|
|
labnum = decode_MPLS_stack(tvb, offset + 1, lab_stk, sizeof(lab_stk));
|
|
|
|
offset += (1 + labnum * 3);
|
|
plen -= (labnum * 3*8);
|
|
if (plen > 32) {
|
|
length = 0 ;
|
|
break ;
|
|
}
|
|
|
|
length = (plen + 7) / 8;
|
|
memset(ip4addr, 0, sizeof(ip4addr));
|
|
tvb_memcpy(tvb, ip4addr, offset, length);
|
|
if (plen % 8)
|
|
ip4addr[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
snprintf(buf,buflen, "Label Stack=%s IP=%s/%d",
|
|
lab_stk,
|
|
ip_to_str(ip4addr),
|
|
plen);
|
|
length += (labnum*3) ;
|
|
break;
|
|
|
|
case SAFNUM_LAB_VPNUNICAST:
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
plen = tvb_get_guint8(tvb,offset) ;
|
|
|
|
labnum = decode_MPLS_stack(tvb, offset + 1, lab_stk, sizeof(lab_stk));
|
|
|
|
offset += (1 + labnum * 3);
|
|
plen -= (labnum * 3*8);
|
|
|
|
rd_type=tvb_get_ntohs(tvb,offset) ;
|
|
plen -= 8*8;
|
|
|
|
switch (rd_type) {
|
|
case FORMAT_AS2_LOC: /* Code borrowed from the decode_prefix4 function */
|
|
if (plen > 32) {
|
|
length = 0 ;
|
|
break ;
|
|
}
|
|
|
|
length = (plen + 7) / 8;
|
|
memset(ip4addr, 0, sizeof(ip4addr));
|
|
tvb_memcpy(tvb, ip4addr, offset + 8, length);
|
|
if (plen % 8)
|
|
ip4addr[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
snprintf(buf,buflen, "Label Stack=%s RD=%u:%u, IP=%s/%d",
|
|
lab_stk,
|
|
tvb_get_ntohs(tvb, offset + 2),
|
|
tvb_get_ntohl(tvb, offset + 4),
|
|
ip_to_str(ip4addr),
|
|
plen);
|
|
length += (labnum * 3 + 8) ;
|
|
break ;
|
|
case FORMAT_IP_LOC: /* Code borrowed from the decode_prefix4 function */
|
|
tvb_memcpy(tvb, ip4addr, offset + 2, 4);
|
|
|
|
if (plen > 32) {
|
|
length = 0 ;
|
|
break ;
|
|
}
|
|
|
|
length = (plen + 7) / 8;
|
|
memset(ip4addr2, 0, sizeof(ip4addr2));
|
|
tvb_memcpy(tvb, ip4addr2, offset + 8, length);
|
|
if (plen % 8)
|
|
ip4addr2[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
snprintf(buf,buflen, "Label Stack=%s RD=%s:%u, IP=%s/%d",
|
|
lab_stk,
|
|
ip_to_str(ip4addr),
|
|
tvb_get_ntohs(tvb, offset + 6),
|
|
ip_to_str(ip4addr2),
|
|
plen);
|
|
length += (labnum * 3 + 8) ;
|
|
break ;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown labeled VPN address format");
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
case AFNUM_INET6:
|
|
switch (safi) {
|
|
case SAFNUM_UNICAST:
|
|
case SAFNUM_MULCAST:
|
|
case SAFNUM_UNIMULC:
|
|
length = decode_prefix6(tvb, offset, buf, buflen) - 1 ;
|
|
break;
|
|
|
|
case SAFNUM_LAB_VPNUNICAST:
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
plen = tvb_get_guint8(tvb,offset) ;
|
|
|
|
labnum = decode_MPLS_stack(tvb, offset + 1, lab_stk, sizeof(lab_stk));
|
|
|
|
offset += (1 + labnum * 3);
|
|
plen -= (labnum * 3*8);
|
|
|
|
rd_type=tvb_get_ntohs(tvb,offset) ;
|
|
plen -= 8*8;
|
|
|
|
switch (rd_type) {
|
|
case FORMAT_AS2_LOC:
|
|
if (plen > 128) {
|
|
length = 0 ;
|
|
break ;
|
|
}
|
|
|
|
length = (plen + 7) / 8;
|
|
memset(ip6addr.u6_addr.u6_addr8, 0, 16);
|
|
tvb_memcpy(tvb, ip6addr.u6_addr.u6_addr8, offset + 8, length);
|
|
if (plen % 8)
|
|
ip6addr.u6_addr.u6_addr8[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
snprintf(buf,buflen, "Label Stack=%s RD=%u:%u, IP=%s/%d",
|
|
lab_stk,
|
|
tvb_get_ntohs(tvb, offset + 2),
|
|
tvb_get_ntohl(tvb, offset + 4),
|
|
ip6_to_str(&ip6addr),
|
|
plen);
|
|
length += (labnum * 3 + 8) ;
|
|
break ;
|
|
case FORMAT_IP_LOC:
|
|
tvb_memcpy(tvb, ip4addr, offset + 2, sizeof(ip4addr));
|
|
|
|
if (plen > 128) {
|
|
length = 0 ;
|
|
break ;
|
|
}
|
|
|
|
length = (plen + 7) / 8;
|
|
memset(ip6addr.u6_addr.u6_addr8, 0, 16);
|
|
tvb_memcpy(tvb, ip6addr.u6_addr.u6_addr8, offset + 8, length);
|
|
if (plen % 8)
|
|
ip6addr.u6_addr.u6_addr8[length - 1] &= ((0xff00 >> (plen % 8)) & 0xff);
|
|
|
|
snprintf(buf,buflen, "Label Stack=%s RD=%s:%u, IP=%s/%d",
|
|
lab_stk,
|
|
ip_to_str(ip4addr),
|
|
tvb_get_ntohs(tvb, offset + 6),
|
|
ip6_to_str(&ip6addr),
|
|
plen);
|
|
length += (labnum * 3 + 8) ;
|
|
break ;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown labeled VPN address format");
|
|
break;
|
|
}
|
|
break;
|
|
|
|
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
case AFNUM_L2VPN:
|
|
switch (safi) {
|
|
case SAFNUM_LAB_VPNUNICAST:
|
|
case SAFNUM_LAB_VPNMULCAST:
|
|
case SAFNUM_LAB_VPNUNIMULC:
|
|
plen = tvb_get_ntohs(tvb,offset);
|
|
rd_type=tvb_get_ntohs(tvb,offset+2);
|
|
ce_id=tvb_get_ntohs(tvb,offset+10);
|
|
labblk_off=tvb_get_ntohs(tvb,offset+12);
|
|
labnum = decode_MPLS_stack(tvb, offset + 14, lab_stk, sizeof(lab_stk));
|
|
|
|
switch (rd_type) {
|
|
case FORMAT_AS2_LOC:
|
|
tvb_memcpy(tvb, ip4addr, offset + 6, 4);
|
|
snprintf(buf,buflen, "RD: %u:%s, CE-ID: %u, Label-Block Offset: %u, Label Base %s",
|
|
tvb_get_ntohs(tvb, offset + 4),
|
|
ip_to_str(ip4addr),
|
|
ce_id,
|
|
labblk_off,
|
|
lab_stk);
|
|
break ;
|
|
case FORMAT_IP_LOC:
|
|
tvb_memcpy(tvb, ip4addr, offset + 4, 4);
|
|
snprintf(buf,buflen, "RD: %s:%u, CE-ID: %u, Label-Block Offset: %u, Label Base %s",
|
|
ip_to_str(ip4addr),
|
|
tvb_get_ntohs(tvb, offset + 8),
|
|
ce_id,
|
|
labblk_off,
|
|
lab_stk);
|
|
break ;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown labeled VPN address format");
|
|
break;
|
|
}
|
|
/* FIXME there are subTLVs left to decode ... for now lets omit them */
|
|
length=plen+1; /* should be 2 but length+1 is returned at the end */
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf, buflen, "Unknown SAFI (%u) for AFI %u", safi, afi);
|
|
break;
|
|
}
|
|
break;
|
|
default:
|
|
length = 0 ;
|
|
snprintf(buf,buflen, "Unknown AFI (%u) value", afi);
|
|
break;
|
|
}
|
|
return(1 + length) ;
|
|
}
|
|
|
|
/*
|
|
* Dissect a BGP capability.
|
|
*/
|
|
static void
|
|
dissect_bgp_capability_item(tvbuff_t *tvb, int *p, proto_tree *tree, int ctype, int clen)
|
|
{
|
|
proto_tree *subtree;
|
|
proto_item *ti;
|
|
guint8 orfnum; /* number of ORFs */
|
|
guint8 orftype; /* ORF Type */
|
|
guint8 orfsendrecv; /* ORF Send/Receive */
|
|
int tclen; /* capability length */
|
|
int i;
|
|
|
|
/* check the capability type */
|
|
switch (ctype) {
|
|
case BGP_CAPABILITY_RESERVED:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
if (clen != 0) {
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Unknown");
|
|
}
|
|
*p += clen;
|
|
break;
|
|
case BGP_CAPABILITY_MULTIPROTOCOL:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
if (clen != 4) {
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: Invalid");
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Unknown");
|
|
}
|
|
else {
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
ti = proto_tree_add_text(tree, tvb, *p, clen, "Capability value");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
/* AFI */
|
|
i = tvb_get_ntohs(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
2, "Address family identifier: %s (%u)",
|
|
val_to_str(i, afn_vals, "Unknown"), i);
|
|
*p += 2;
|
|
/* Reserved */
|
|
proto_tree_add_text(subtree, tvb, *p, 1, "Reserved: 1 byte");
|
|
(*p)++;
|
|
/* SAFI */
|
|
i = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
1, "Subsequent address family identifier: %s (%u)",
|
|
val_to_str(i, bgpattr_nlri_safi,
|
|
i >= 128 ? "Vendor specific" : "Unknown"), i);
|
|
(*p)++;
|
|
}
|
|
break;
|
|
case BGP_CAPABILITY_GRACEFUL_RESTART:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
if (clen < 6) {
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Invalid");
|
|
}
|
|
else {
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
ti = proto_tree_add_text(tree, tvb, *p, clen, "Capability value");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
/* Timers */
|
|
i = tvb_get_ntohs(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
2, "Restart Flags: [%s], Restart Time %us",
|
|
(i&0x8000) ? "R" : "none", i&0xfff);
|
|
*p += 2;
|
|
tclen = clen - 2;
|
|
/*
|
|
* what follows is alist of AFI/SAFI/flag triplets
|
|
* read it until the TLV ends
|
|
*/
|
|
while (tclen >=4) {
|
|
/* AFI */
|
|
i = tvb_get_ntohs(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
2, "Address family identifier: %s (%u)",
|
|
val_to_str(i, afn_vals, "Unknown"), i);
|
|
*p += 2;
|
|
/* SAFI */
|
|
i = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
1, "Subsequent address family identifier: %s (%u)",
|
|
val_to_str(i, bgpattr_nlri_safi,
|
|
i >= 128 ? "Vendor specific" : "Unknown"), i);
|
|
(*p)++;
|
|
/* flags */
|
|
i = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p, 1,
|
|
"Preserve forwarding state: %s",
|
|
(i&0x80) ? "yes" : "no");
|
|
(*p)++;
|
|
tclen-=4;
|
|
}
|
|
}
|
|
*p += clen;
|
|
break;
|
|
case BGP_CAPABILITY_4_OCTET_AS_NUMBER:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
if (clen != 4) {
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Invalid");
|
|
}
|
|
else {
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
ti = proto_tree_add_text(tree, tvb, *p, clen, "Capability value");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
proto_tree_add_text(subtree, tvb, *p, 4,
|
|
"AS number: %d", tvb_get_ntohl(tvb, *p));
|
|
}
|
|
*p += clen;
|
|
break;
|
|
case BGP_CAPABILITY_DYNAMIC_CAPABILITY:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
proto_tree_add_text(tree, tvb, *p - 1, 1,
|
|
"Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
if (clen > 0) {
|
|
ti = proto_tree_add_text(tree, tvb, *p, clen, "Capability value");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
for (i = 0; (int)i <= clen; i++) {
|
|
proto_tree_add_text(subtree, tvb, *p, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"),
|
|
tvb_get_guint8(tvb, *p));
|
|
(*p)++;
|
|
}
|
|
}
|
|
break;
|
|
case BGP_CAPABILITY_ROUTE_REFRESH_CISCO:
|
|
case BGP_CAPABILITY_ROUTE_REFRESH:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
if (clen != 0) {
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Invalid");
|
|
}
|
|
else {
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
}
|
|
*p += clen;
|
|
break;
|
|
case BGP_CAPABILITY_ORF_CISCO:
|
|
case BGP_CAPABILITY_COOPERATIVE_ROUTE_FILTERING:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
ti = proto_tree_add_text(tree, tvb, *p, clen, "Capability value");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
/* AFI */
|
|
i = tvb_get_ntohs(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
2, "Address family identifier: %s (%u)",
|
|
val_to_str(i, afn_vals, "Unknown"), i);
|
|
*p += 2;
|
|
/* Reserved */
|
|
proto_tree_add_text(subtree, tvb, *p, 1, "Reserved: 1 byte");
|
|
(*p)++;
|
|
/* SAFI */
|
|
i = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
1, "Subsequent address family identifier: %s (%u)",
|
|
val_to_str(i, bgpattr_nlri_safi,
|
|
i >= 128 ? "Vendor specific" : "Unknown"), i);
|
|
(*p)++;
|
|
/* Number of ORFs */
|
|
orfnum = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p, 1, "Number of ORFs: %u", orfnum);
|
|
(*p)++;
|
|
for (i=0; i<orfnum; i++) {
|
|
/* ORF Type */
|
|
orftype = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p, 1, "ORF Type: %s (%u)",
|
|
val_to_str(orftype, orf_type_vals,"Unknown"), orftype);
|
|
(*p)++;
|
|
/* Send/Receive */
|
|
orfsendrecv = tvb_get_guint8(tvb, *p);
|
|
proto_tree_add_text(subtree, tvb, *p,
|
|
1, "Send/Receive: %s (%u)",
|
|
val_to_str(orfsendrecv, orf_send_recv_vals,
|
|
"Uknown"), orfsendrecv);
|
|
(*p)++;
|
|
}
|
|
break;
|
|
/* unknown capability */
|
|
default:
|
|
proto_tree_add_text(tree, tvb, *p - 2, 1,
|
|
"Capability code: %s (%d)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"), ctype);
|
|
proto_tree_add_text(tree, tvb, *p - 2,
|
|
1, "Capability code: %s (%d)",
|
|
ctype >= 128 ? "Private use" : "Unknown", ctype);
|
|
proto_tree_add_text(tree, tvb, *p - 1,
|
|
1, "Capability length: %u %s", clen,
|
|
(clen == 1) ? "byte" : "bytes");
|
|
if (clen != 0) {
|
|
proto_tree_add_text(tree, tvb, *p,
|
|
clen, "Capability value: Unknown");
|
|
}
|
|
*p += clen;
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* Dissect a BGP OPEN message.
|
|
*/
|
|
static const value_string community_vals[] = {
|
|
{ BGP_COMM_NO_EXPORT, "NO_EXPORT" },
|
|
{ BGP_COMM_NO_ADVERTISE, "NO_ADVERTISE" },
|
|
{ BGP_COMM_NO_EXPORT_SUBCONFED, "NO_EXPORT_SUBCONFED" },
|
|
{ 0, NULL }
|
|
};
|
|
|
|
static void
|
|
dissect_bgp_open(tvbuff_t *tvb, int offset, proto_tree *tree)
|
|
{
|
|
struct bgp_open bgpo; /* BGP OPEN message */
|
|
int hlen; /* message length */
|
|
int ptype; /* parameter type */
|
|
int plen; /* parameter length */
|
|
int ctype; /* capability type */
|
|
int clen; /* capability length */
|
|
int cend; /* capabilities end */
|
|
int ostart; /* options start */
|
|
int oend; /* options end */
|
|
int p; /* tvb offset counter */
|
|
proto_item *ti; /* tree item */
|
|
proto_tree *subtree; /* subtree for options */
|
|
proto_tree *subtree1; /* subtree for an option */
|
|
proto_tree *subtree2; /* subtree for an option */
|
|
|
|
/* snarf OPEN message */
|
|
tvb_memcpy(tvb, bgpo.bgpo_marker, offset, BGP_MIN_OPEN_MSG_SIZE);
|
|
hlen = g_ntohs(bgpo.bgpo_len);
|
|
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_open, bgpo_version), 1,
|
|
"Version: %u", bgpo.bgpo_version);
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_open, bgpo_myas), 2,
|
|
"My AS: %u", g_ntohs(bgpo.bgpo_myas));
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_open, bgpo_holdtime), 2,
|
|
"Hold time: %u", g_ntohs(bgpo.bgpo_holdtime));
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_open, bgpo_id), 4,
|
|
"BGP identifier: %s", ip_to_str((guint8 *)&bgpo.bgpo_id));
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_open, bgpo_optlen), 1,
|
|
"Optional parameters length: %u %s", bgpo.bgpo_optlen,
|
|
(bgpo.bgpo_optlen == 1) ? "byte" : "bytes");
|
|
|
|
/* optional parameters */
|
|
if (bgpo.bgpo_optlen > 0) {
|
|
/* add a subtree and setup some offsets */
|
|
ostart = offset + BGP_MIN_OPEN_MSG_SIZE;
|
|
ti = proto_tree_add_text(tree, tvb, ostart, bgpo.bgpo_optlen,
|
|
"Optional parameters");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_options);
|
|
p = offset + ostart;
|
|
oend = p + bgpo.bgpo_optlen;
|
|
|
|
/* step through all of the optional parameters */
|
|
while (p < oend) {
|
|
|
|
/* grab the type and length */
|
|
ptype = tvb_get_guint8(tvb, p++);
|
|
plen = tvb_get_guint8(tvb, p++);
|
|
|
|
/* check the type */
|
|
switch (ptype) {
|
|
case BGP_OPTION_AUTHENTICATION:
|
|
proto_tree_add_text(subtree, tvb, p - 2, 2 + plen,
|
|
"Authentication information (%u %s)", plen,
|
|
(plen == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGP_OPTION_CAPABILITY:
|
|
/* grab the capability code */
|
|
cend = p - 1 + plen;
|
|
ctype = tvb_get_guint8(tvb, p++);
|
|
clen = tvb_get_guint8(tvb, p++);
|
|
ti = proto_tree_add_text(subtree, tvb, p - 4,
|
|
2 + plen, "Capabilities Advertisement (%u bytes)",
|
|
2 + plen);
|
|
subtree1 = proto_item_add_subtree(ti, ett_bgp_option);
|
|
proto_tree_add_text(subtree1, tvb, p - 4,
|
|
1, "Parameter type: Capabilities (2)");
|
|
proto_tree_add_text(subtree1, tvb, p - 3,
|
|
1, "Parameter length: %u %s", plen,
|
|
(plen == 1) ? "byte" : "bytes");
|
|
p -= 2;
|
|
|
|
/* step through all of the capabilities */
|
|
while (p < cend) {
|
|
ctype = tvb_get_guint8(tvb, p++);
|
|
clen = tvb_get_guint8(tvb, p++);
|
|
|
|
ti = proto_tree_add_text(subtree1, tvb, p - 2,
|
|
2 + clen, "%s (%u %s)", val_to_str(ctype,
|
|
capability_vals, "Unknown capability"),
|
|
2 + clen, (clen == 1) ? "byte" : "bytes");
|
|
subtree2 = proto_item_add_subtree(ti, ett_bgp_option);
|
|
dissect_bgp_capability_item(tvb, &p,
|
|
subtree2, ctype, clen);
|
|
}
|
|
break;
|
|
default:
|
|
proto_tree_add_text(subtree, tvb, p - 2, 2 + plen,
|
|
"Unknown optional parameter");
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Dissect a BGP UPDATE message.
|
|
*/
|
|
static void
|
|
dissect_bgp_update(tvbuff_t *tvb, int offset, proto_tree *tree)
|
|
{
|
|
struct bgp_attr bgpa; /* path attributes */
|
|
guint16 hlen; /* message length */
|
|
gint o; /* packet offset */
|
|
gint q; /* tmp */
|
|
gint end; /* message end */
|
|
guint16 ext_com; /* EXTENDED COMMUNITY type */
|
|
guint16 len; /* tmp */
|
|
int advance; /* tmp */
|
|
proto_item *ti; /* tree item */
|
|
proto_tree *subtree; /* subtree for attributes */
|
|
proto_tree *subtree2; /* subtree for attributes */
|
|
proto_tree *subtree3; /* subtree for attributes */
|
|
proto_tree *subtree4; /* subtree for attributes */
|
|
proto_tree *as_paths_tree; /* subtree for AS_PATHs */
|
|
proto_tree *as_path_tree; /* subtree for AS_PATH */
|
|
proto_tree *communities_tree; /* subtree for COMMUNITIES */
|
|
proto_tree *community_tree; /* subtree for a community */
|
|
proto_tree *cluster_list_tree; /* subtree for CLUSTER_LIST */
|
|
int i, j; /* tmp */
|
|
guint8 length; /* AS_PATH length */
|
|
guint8 type; /* AS_PATH type */
|
|
char *as_path_str = NULL; /* AS_PATH string */
|
|
char *communities_str = NULL; /* COMMUNITIES string */
|
|
char *cluster_list_str = NULL; /* CLUSTER_LIST string */
|
|
char junk_buf[256]; /* tmp */
|
|
int junk_buf_len; /* tmp len */
|
|
guint8 ipaddr[4]; /* IPv4 address */
|
|
|
|
hlen = tvb_get_ntohs(tvb, offset + BGP_MARKER_SIZE);
|
|
o = offset + BGP_HEADER_SIZE;
|
|
|
|
/* check for withdrawals */
|
|
len = tvb_get_ntohs(tvb, o);
|
|
proto_tree_add_text(tree, tvb, o, 2,
|
|
"Unfeasible routes length: %u %s", len, (len == 1) ? "byte" : "bytes");
|
|
o += 2;
|
|
|
|
/* parse unfeasible prefixes */
|
|
if (len > 0) {
|
|
ti = proto_tree_add_text(tree, tvb, o, len, "Withdrawn routes:");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_unfeas);
|
|
|
|
/* parse each prefixes */
|
|
end = o + len;
|
|
while (o < end) {
|
|
i = decode_prefix4(tvb, o, junk_buf, sizeof(junk_buf));
|
|
if (i < 0 || 32 < i) {
|
|
proto_tree_add_text (tree, tvb, o, len,
|
|
"Invalid withdrawn route prefix length: %u",
|
|
tvb_get_guint8(tvb, o) );
|
|
return;
|
|
}
|
|
|
|
proto_tree_add_text(subtree, tvb, o, i, "%s", junk_buf);
|
|
o += i;
|
|
}
|
|
}
|
|
|
|
/* check for advertisements */
|
|
len = tvb_get_ntohs(tvb, o);
|
|
proto_tree_add_text(tree, tvb, o, 2, "Total path attribute length: %u %s",
|
|
len, (len == 1) ? "byte" : "bytes");
|
|
|
|
/* path attributes */
|
|
if (len > 0) {
|
|
ti = proto_tree_add_text(tree, tvb, o + 2, len, "Path attributes");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_attrs);
|
|
i = 2;
|
|
while (i < len) {
|
|
char *msg;
|
|
int off;
|
|
gint k;
|
|
guint16 alen, tlen, aoff;
|
|
guint16 af;
|
|
guint8 saf, snpa;
|
|
guint8 nexthop_len;
|
|
guint8 asn_len = 0;
|
|
|
|
tvb_memcpy(tvb, (guint8 *)&bgpa, o + i, sizeof(bgpa));
|
|
/* check for the Extended Length bit */
|
|
if (bgpa.bgpa_flags & BGP_ATTR_FLAG_EXTENDED_LENGTH) {
|
|
alen = tvb_get_ntohs(tvb, o + i + sizeof(bgpa));
|
|
aoff = sizeof(bgpa) + 2;
|
|
} else {
|
|
alen = tvb_get_guint8(tvb, o + i + sizeof(bgpa));
|
|
aoff = sizeof(bgpa) + 1;
|
|
}
|
|
tlen = alen;
|
|
|
|
/* This is kind of ugly - similar code appears twice, but it
|
|
helps browsing attrs. */
|
|
/* the first switch prints things in the title of the subtree */
|
|
switch (bgpa.bgpa_type) {
|
|
case BGPTYPE_ORIGIN:
|
|
if (tlen != 1)
|
|
goto default_attribute_top;
|
|
msg = val_to_str(tvb_get_guint8(tvb, o + i + aoff), bgpattr_origin, "Unknown");
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
msg, tlen + aoff, (tlen + aoff == 1) ? "byte" :
|
|
"bytes");
|
|
break;
|
|
case BGPTYPE_AS_PATH:
|
|
case BGPTYPE_NEW_AS_PATH:
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
/* must be freed by second switch! */
|
|
/* "tlen * 11" (10 digits + space) should be a good estimate
|
|
of how long the AS path string could be */
|
|
as_path_str = malloc((tlen + 1) * 11);
|
|
if (as_path_str == NULL) break;
|
|
as_path_str[0] = '\0';
|
|
|
|
/* estimate the length of the AS number */
|
|
if (bgpa.bgpa_type == BGPTYPE_NEW_AS_PATH)
|
|
asn_len = 4;
|
|
else {
|
|
if (bgp_asn_len == 0) {
|
|
k = q;
|
|
while (k < end) {
|
|
k++;
|
|
length = tvb_get_guint8(tvb, k++);
|
|
k += length * 2;
|
|
}
|
|
asn_len = (k == end) ? 2 : 4;
|
|
}
|
|
else {
|
|
asn_len = bgp_asn_len;
|
|
}
|
|
}
|
|
|
|
/* snarf each AS path */
|
|
while (q < end) {
|
|
type = tvb_get_guint8(tvb, q++);
|
|
if (strlen(as_path_str) != 0 &&
|
|
as_path_str[strlen(as_path_str) - 1] != ' ')
|
|
strcat(as_path_str, " ");
|
|
if (type == AS_SET) {
|
|
strcat(as_path_str, "{");
|
|
}
|
|
else if (type == AS_CONFED_SET) {
|
|
strcat(as_path_str, "[");
|
|
}
|
|
else if (type == AS_CONFED_SEQUENCE) {
|
|
strcat(as_path_str, "(");
|
|
}
|
|
length = tvb_get_guint8(tvb, q++);
|
|
|
|
/* snarf each value in path */
|
|
for (j = 0; j < length; j++) {
|
|
snprintf(junk_buf, sizeof(junk_buf), "%u%s",
|
|
(asn_len == 2) ?
|
|
tvb_get_ntohs(tvb, q) : tvb_get_ntohl(tvb, q),
|
|
(type == AS_SET || type == AS_CONFED_SET) ?
|
|
", " : " ");
|
|
strncat(as_path_str, junk_buf, sizeof(junk_buf));
|
|
q += asn_len;
|
|
}
|
|
|
|
/* cleanup end of string */
|
|
if (type == AS_SET) {
|
|
as_path_str[strlen(as_path_str) - 2] = '}';
|
|
as_path_str[strlen(as_path_str) - 1] = '\0';
|
|
}
|
|
else if (type == AS_CONFED_SET) {
|
|
as_path_str[strlen(as_path_str) - 2] = ']';
|
|
as_path_str[strlen(as_path_str) - 1] = '\0';
|
|
}
|
|
else if (type == AS_CONFED_SEQUENCE) {
|
|
as_path_str[strlen(as_path_str) - 1] = ')';
|
|
}
|
|
else {
|
|
as_path_str[strlen(as_path_str) - 1] = '\0';
|
|
}
|
|
}
|
|
|
|
/* check for empty AS_PATH */
|
|
if (tlen == 0)
|
|
strncpy(as_path_str, "empty", 6);
|
|
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
as_path_str, tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_NEXT_HOP:
|
|
if (tlen != 4)
|
|
goto default_attribute_top;
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff, 4);
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
ip_to_str(ipaddr), tlen + aoff, (tlen + aoff == 1)
|
|
? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_MULTI_EXIT_DISC:
|
|
if (tlen != 4)
|
|
goto default_attribute_top;
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %u (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
tvb_get_ntohl(tvb, o + i + aoff), tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_LOCAL_PREF:
|
|
if (tlen != 4)
|
|
goto default_attribute_top;
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %u (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
tvb_get_ntohl(tvb, o + i + aoff), tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_ATOMIC_AGGREGATE:
|
|
if (tlen != 0)
|
|
goto default_attribute_top;
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
tlen + aoff, (tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_AGGREGATOR:
|
|
if (tlen != 6 && tlen != 8)
|
|
goto default_attribute_top;
|
|
case BGPTYPE_NEW_AGGREGATOR:
|
|
if (bgpa.bgpa_type == BGPTYPE_NEW_AGGREGATOR && tlen != 8)
|
|
goto default_attribute_top;
|
|
asn_len = tlen - 4;
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff + asn_len, 4);
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: AS: %u origin: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
(asn_len == 2) ? tvb_get_ntohs(tvb, o + i + aoff) :
|
|
tvb_get_ntohl(tvb, o + i + aoff),
|
|
ip_to_str(ipaddr), tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_COMMUNITIES:
|
|
if (tlen % 4 != 0)
|
|
goto default_attribute_top;
|
|
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
/* must be freed by second switch! */
|
|
/* "tlen * 12" (5 digits, a :, 5 digits + space ) should be
|
|
a good estimate of how long the communities string could
|
|
be */
|
|
communities_str = malloc((tlen + 1) * 12);
|
|
if (communities_str == NULL) break;
|
|
communities_str[0] = '\0';
|
|
memset(junk_buf, 0, sizeof(junk_buf));
|
|
|
|
/* snarf each community */
|
|
while (q < end) {
|
|
/* check for well-known communities */
|
|
if (tvb_get_ntohl(tvb, q) == BGP_COMM_NO_EXPORT)
|
|
strncpy(junk_buf, "NO_EXPORT ", 10);
|
|
else if (tvb_get_ntohl(tvb, q) == BGP_COMM_NO_ADVERTISE)
|
|
strncpy(junk_buf, "NO_ADVERTISE ", 13);
|
|
else if (tvb_get_ntohl(tvb, q) == BGP_COMM_NO_EXPORT_SUBCONFED)
|
|
strncpy(junk_buf, "NO_EXPORT_SUBCONFED ", 20);
|
|
else {
|
|
snprintf(junk_buf, sizeof(junk_buf), "%u:%u ",
|
|
tvb_get_ntohs(tvb, q),
|
|
tvb_get_ntohs(tvb, q + 2));
|
|
}
|
|
q += 4;
|
|
|
|
strncat(communities_str, junk_buf, sizeof(junk_buf));
|
|
}
|
|
/* cleanup end of string */
|
|
communities_str[strlen(communities_str) - 1] = '\0';
|
|
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
communities_str, tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_ORIGINATOR_ID:
|
|
if (tlen != 4)
|
|
goto default_attribute_top;
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff, 4);
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
ip_to_str(ipaddr), tlen + aoff, (tlen + aoff == 1)
|
|
? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_CLUSTER_LIST:
|
|
if (tlen % 4 != 0)
|
|
goto default_attribute_top;
|
|
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
/* must be freed by second switch! */
|
|
/* "tlen * 16" (12 digits, 3 dots + space ) should be
|
|
a good estimate of how long the cluster_list string could
|
|
be */
|
|
cluster_list_str = malloc((tlen + 1) * 16);
|
|
if (cluster_list_str == NULL) break;
|
|
cluster_list_str[0] = '\0';
|
|
memset(junk_buf, 0, sizeof(junk_buf));
|
|
|
|
/* snarf each cluster list */
|
|
tvb_memcpy(tvb, ipaddr, q, 4);
|
|
while (q < end) {
|
|
snprintf(junk_buf, sizeof(junk_buf), "%s ", ip_to_str(ipaddr));
|
|
strncat(cluster_list_str, junk_buf, sizeof(junk_buf));
|
|
q += 4;
|
|
}
|
|
/* cleanup end of string */
|
|
cluster_list_str[strlen(cluster_list_str) - 1] = '\0';
|
|
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s: %s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
cluster_list_str, tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
case BGPTYPE_EXTENDED_COMMUNITY:
|
|
if (tlen %8 != 0)
|
|
break;
|
|
ti = proto_tree_add_text(subtree,tvb,o+i,tlen+aoff,
|
|
"%s: (%u %s)",
|
|
val_to_str(bgpa.bgpa_type,bgpattr_type,"Unknown"),
|
|
tlen + aoff,
|
|
(tlen + aoff == 1) ? "byte" : "bytes");
|
|
break;
|
|
|
|
default:
|
|
default_attribute_top:
|
|
ti = proto_tree_add_text(subtree, tvb, o + i, tlen + aoff,
|
|
"%s (%u %s)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
tlen + aoff, (tlen + aoff == 1) ? "byte" : "bytes");
|
|
} /* end of first switch */
|
|
subtree2 = proto_item_add_subtree(ti, ett_bgp_attr);
|
|
|
|
/* figure out flags */
|
|
junk_buf[0] = '\0';
|
|
if (bgpa.bgpa_flags & BGP_ATTR_FLAG_OPTIONAL) {
|
|
strncat(junk_buf, "Optional, ", 10);
|
|
}
|
|
else {
|
|
strncat(junk_buf, "Well-known, ", 12);
|
|
}
|
|
if (bgpa.bgpa_flags & BGP_ATTR_FLAG_TRANSITIVE) {
|
|
strncat(junk_buf, "Transitive, ", 12);
|
|
}
|
|
else {
|
|
strncat(junk_buf, "Non-transitive, ", 16);
|
|
}
|
|
if (bgpa.bgpa_flags & BGP_ATTR_FLAG_PARTIAL) {
|
|
strncat(junk_buf, "Partial, ", 9);
|
|
}
|
|
else {
|
|
strncat(junk_buf, "Complete, ", 10);
|
|
}
|
|
if (bgpa.bgpa_flags & BGP_ATTR_FLAG_EXTENDED_LENGTH) {
|
|
strncat(junk_buf, "Extended Length, ", 17);
|
|
}
|
|
/* stomp last ", " */
|
|
j = strlen(junk_buf);
|
|
junk_buf[j - 2] = '\0';
|
|
ti = proto_tree_add_text(subtree2, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_flags), 1,
|
|
"Flags: 0x%02x (%s)", bgpa.bgpa_flags, junk_buf);
|
|
subtree3 = proto_item_add_subtree(ti, ett_bgp_attr_flags);
|
|
|
|
/* add flag bitfield subtrees */
|
|
proto_tree_add_text(subtree3, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_flags), 1,
|
|
"%s", decode_boolean_bitfield(bgpa.bgpa_flags,
|
|
BGP_ATTR_FLAG_OPTIONAL, 8, "Optional", "Well-known"));
|
|
proto_tree_add_text(subtree3, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_flags), 1,
|
|
"%s", decode_boolean_bitfield(bgpa.bgpa_flags,
|
|
BGP_ATTR_FLAG_TRANSITIVE, 8, "Transitive",
|
|
"Non-transitive"));
|
|
proto_tree_add_text(subtree3, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_flags), 1,
|
|
"%s", decode_boolean_bitfield(bgpa.bgpa_flags,
|
|
BGP_ATTR_FLAG_PARTIAL, 8, "Partial", "Complete"));
|
|
proto_tree_add_text(subtree3, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_flags), 1,
|
|
"%s", decode_boolean_bitfield(bgpa.bgpa_flags,
|
|
BGP_ATTR_FLAG_EXTENDED_LENGTH, 8, "Extended length",
|
|
"Regular length"));
|
|
|
|
proto_tree_add_text(subtree2, tvb,
|
|
o + i + offsetof(struct bgp_attr, bgpa_type), 1,
|
|
"Type code: %s (%u)",
|
|
val_to_str(bgpa.bgpa_type, bgpattr_type, "Unknown"),
|
|
bgpa.bgpa_type);
|
|
|
|
proto_tree_add_text(subtree2, tvb, o + i + sizeof(bgpa),
|
|
aoff - sizeof(bgpa), "Length: %d %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
|
|
/* the second switch prints things in the actual subtree of each
|
|
attribute */
|
|
switch (bgpa.bgpa_type) {
|
|
case BGPTYPE_ORIGIN:
|
|
if (tlen != 1) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Origin (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
} else {
|
|
msg = val_to_str(tvb_get_guint8(tvb, o + i + aoff), bgpattr_origin, "Unknown");
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, 1,
|
|
"Origin: %s (%u)", msg, tvb_get_guint8(tvb, o + i + aoff));
|
|
}
|
|
break;
|
|
case BGPTYPE_AS_PATH:
|
|
case BGPTYPE_NEW_AS_PATH:
|
|
/* check for empty AS_PATH */
|
|
if (tlen == 0) {
|
|
free(as_path_str);
|
|
break;
|
|
}
|
|
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"AS path: %s", as_path_str);
|
|
as_paths_tree = proto_item_add_subtree(ti, ett_bgp_as_paths);
|
|
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
|
|
/* snarf each AS path tuple, we have to step through each one
|
|
again to make a separate subtree so we can't just reuse
|
|
as_path_str from above */
|
|
while (q < end) {
|
|
as_path_str[0] = '\0';
|
|
type = tvb_get_guint8(tvb, q++);
|
|
if (type == AS_SET) {
|
|
snprintf(as_path_str, 2, "{");
|
|
}
|
|
else if (type == AS_CONFED_SET) {
|
|
snprintf(as_path_str, 2, "[");
|
|
}
|
|
else if (type == AS_CONFED_SEQUENCE) {
|
|
snprintf(as_path_str, 2, "(");
|
|
}
|
|
length = tvb_get_guint8(tvb, q++);
|
|
|
|
/* snarf each value in path, we're just going to reuse
|
|
as_path_str since we already have it malloced */
|
|
for (j = 0; j < length; j++) {
|
|
snprintf(junk_buf, sizeof(junk_buf), "%u%s",
|
|
(asn_len == 2) ?
|
|
tvb_get_ntohs(tvb, q) : tvb_get_ntohl(tvb, q),
|
|
(type == AS_SET || type == AS_CONFED_SET) ? ", " : " ");
|
|
strncat(as_path_str, junk_buf, sizeof(junk_buf));
|
|
q += asn_len;
|
|
}
|
|
|
|
/* cleanup end of string */
|
|
if (type == AS_SET) {
|
|
as_path_str[strlen(as_path_str) - 2] = '}';
|
|
}
|
|
else if (type == AS_CONFED_SET) {
|
|
as_path_str[strlen(as_path_str) - 2] = ']';
|
|
}
|
|
else if (type == AS_CONFED_SEQUENCE) {
|
|
as_path_str[strlen(as_path_str) - 1] = ')';
|
|
}
|
|
else {
|
|
as_path_str[strlen(as_path_str) - 1] = '\0';
|
|
}
|
|
|
|
/* length here means number of ASs, ie length * 2 bytes */
|
|
ti = proto_tree_add_text(as_paths_tree, tvb,
|
|
q - length * asn_len - 2,
|
|
length * asn_len + 2, "AS path segment: %s", as_path_str);
|
|
as_path_tree = proto_item_add_subtree(ti, ett_bgp_as_paths);
|
|
proto_tree_add_text(as_path_tree, tvb, q - length * asn_len - 2,
|
|
1, "Path segment type: %s (%u)",
|
|
val_to_str(type, as_segment_type, "Unknown"), type);
|
|
proto_tree_add_text(as_path_tree, tvb, q - length * asn_len - 1,
|
|
1, "Path segment length: %u %s", length,
|
|
(length == 1) ? "AS" : "ASs");
|
|
|
|
/* backup and reprint path segment value(s) only */
|
|
q -= asn_len * length;
|
|
as_path_str[0] = '\0';
|
|
for (j = 0; j < length; j++) {
|
|
snprintf(junk_buf, sizeof(junk_buf), "%u ",
|
|
(asn_len == 2) ?
|
|
tvb_get_ntohs(tvb, q) : tvb_get_ntohl(tvb, q));
|
|
strncat(as_path_str, junk_buf, sizeof(junk_buf));
|
|
q += asn_len;
|
|
}
|
|
as_path_str[strlen(as_path_str) - 1] = '\0';
|
|
|
|
proto_tree_add_text(as_path_tree, tvb, q - length * asn_len,
|
|
length * asn_len, "Path segment value: %s", as_path_str);
|
|
}
|
|
|
|
free(as_path_str);
|
|
break;
|
|
case BGPTYPE_NEXT_HOP:
|
|
if (tlen != 4) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Next hop (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
} else {
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff, 4);
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Next hop: %s", ip_to_str(ipaddr));
|
|
}
|
|
break;
|
|
case BGPTYPE_MULTI_EXIT_DISC:
|
|
if (tlen != 4) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Multiple exit discriminator (invalid): %u %s",
|
|
tlen, (tlen == 1) ? "byte" : "bytes");
|
|
} else {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Multiple exit discriminator: %u",
|
|
tvb_get_ntohl(tvb, o + i + aoff));
|
|
}
|
|
break;
|
|
case BGPTYPE_LOCAL_PREF:
|
|
if (tlen != 4) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Local preference (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
} else {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Local preference: %u", tvb_get_ntohl(tvb, o + i + aoff));
|
|
}
|
|
break;
|
|
case BGPTYPE_ATOMIC_AGGREGATE:
|
|
if (tlen != 0) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Atomic aggregate (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
}
|
|
break;
|
|
case BGPTYPE_AGGREGATOR:
|
|
if (tlen != 6 && tlen != 8) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Aggregator (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
break;
|
|
}
|
|
case BGPTYPE_NEW_AGGREGATOR:
|
|
if (bgpa.bgpa_type == BGPTYPE_NEW_AGGREGATOR && tlen != 8)
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Aggregator (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
else {
|
|
asn_len = tlen - 4;
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, 2,
|
|
"Aggregator AS: %u", asn_len == 2 ?
|
|
tvb_get_ntohs(tvb, o + i + aoff) :
|
|
tvb_get_ntohl(tvb, o + i + aoff));
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff + asn_len, 4);
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff + asn_len,
|
|
4, "Aggregator origin: %s", ip_to_str(ipaddr));
|
|
}
|
|
break;
|
|
case BGPTYPE_COMMUNITIES:
|
|
if (tlen % 4 != 0) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Communities (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
free(communities_str);
|
|
break;
|
|
}
|
|
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Communities: %s", communities_str);
|
|
communities_tree = proto_item_add_subtree(ti,
|
|
ett_bgp_communities);
|
|
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
|
|
/* snarf each community */
|
|
while (q < end) {
|
|
/* check for reserved values */
|
|
guint32 community = tvb_get_ntohl(tvb, q);
|
|
if ((community & 0xFFFF0000) == FOURHEX0 ||
|
|
(community & 0xFFFF0000) == FOURHEXF) {
|
|
proto_tree_add_text(communities_tree, tvb,
|
|
q - 3 + aoff, 4,
|
|
"Community: %s (0x%08x)",
|
|
val_to_str(community, community_vals, "(reserved)"),
|
|
community);
|
|
}
|
|
else {
|
|
ti = proto_tree_add_text(communities_tree, tvb,
|
|
q - 3 + aoff, 4, "Community: %u:%u",
|
|
tvb_get_ntohs(tvb, q), tvb_get_ntohs(tvb, q + 2));
|
|
community_tree = proto_item_add_subtree(ti,
|
|
ett_bgp_communities);
|
|
proto_tree_add_text(community_tree, tvb, q - 3 + aoff,
|
|
2, "Community AS: %u", tvb_get_ntohs(tvb, q));
|
|
proto_tree_add_text(community_tree, tvb, q - 1 + aoff,
|
|
2, "Community value: %u", tvb_get_ntohs(tvb, q + 2));
|
|
}
|
|
|
|
q += 4;
|
|
}
|
|
|
|
free(communities_str);
|
|
break;
|
|
case BGPTYPE_ORIGINATOR_ID:
|
|
if (tlen != 4) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Originator identifier (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
} else {
|
|
tvb_memcpy(tvb, ipaddr, o + i + aoff, 4);
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Originator identifier: %s",
|
|
ip_to_str(ipaddr));
|
|
}
|
|
break;
|
|
case BGPTYPE_MP_REACH_NLRI:
|
|
/*
|
|
* RFC 2545 specifies that there may be more than one
|
|
* address in the MP_REACH_NLRI attribute in section
|
|
* 3, "Constructing the Next Hop field".
|
|
*
|
|
* Yes, RFC 2858 says you can't do that, and, yes, RFC
|
|
* 2858 obsoletes RFC 2283, which says you can do that,
|
|
* but that doesn't mean we shouldn't dissect packets
|
|
* that conform to RFC 2283 but not RFC 2858, as some
|
|
* device on the network might implement the 2283-style
|
|
* BGP extensions rather than RFC 2858-style extensions.
|
|
*/
|
|
af = tvb_get_ntohs(tvb, o + i + aoff);
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, 2,
|
|
"Address family: %s (%u)",
|
|
val_to_str(af, afn_vals, "Unknown"), af);
|
|
saf = tvb_get_guint8(tvb, o + i + aoff + 2) ;
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff + 2, 1,
|
|
"Subsequent address family identifier: %s (%u)",
|
|
val_to_str(saf, bgpattr_nlri_safi, saf >= 128 ? "Vendor specific" : "Unknown"),
|
|
saf);
|
|
if (af != AFNUM_INET && af != AFNUM_INET6 && af != AFNUM_L2VPN) {
|
|
/*
|
|
* The addresses don't contain lengths, so if we
|
|
* don't understand the address family type, we
|
|
* cannot parse the subsequent addresses as we
|
|
* don't know how long they are.
|
|
*
|
|
* XXX - we should put a protocol tree item in for
|
|
* this, as an unknown blob.
|
|
*/
|
|
break;
|
|
}
|
|
nexthop_len = tvb_get_guint8(tvb, o + i + aoff + 3);
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff + 3, 1,
|
|
"Next hop network address (%d %s)",
|
|
nexthop_len, plurality(nexthop_len, "byte", "bytes"));
|
|
subtree3 = proto_item_add_subtree(ti, ett_bgp_mp_nhna);
|
|
j = 0;
|
|
while (j < nexthop_len) {
|
|
advance = mp_addr_to_str(af, saf, tvb, o + i + aoff + 4 + j,
|
|
junk_buf, sizeof(junk_buf)) ;
|
|
if (advance == 0) /* catch if this is a unknown AFI type*/
|
|
break;
|
|
if (j + advance > nexthop_len)
|
|
break;
|
|
proto_tree_add_text(subtree3, tvb,o + i + aoff + 4 + j,
|
|
advance, "Next hop: %s (%u)", junk_buf, advance);
|
|
j += advance;
|
|
}
|
|
tlen -= nexthop_len + 4;
|
|
aoff += nexthop_len + 4 ;
|
|
|
|
off = 0;
|
|
snpa = tvb_get_guint8(tvb, o + i + aoff);
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff, 1,
|
|
"Subnetwork points of attachment: %u", snpa);
|
|
off++;
|
|
if (snpa) {
|
|
subtree3 = proto_item_add_subtree(ti, ett_bgp_mp_snpa);
|
|
for (/*nothing*/; snpa > 0; snpa--) {
|
|
proto_tree_add_text(subtree3, tvb, o + i + aoff + off, 1,
|
|
"SNPA length: %u", tvb_get_guint8(tvb, o + i + aoff + off));
|
|
off++;
|
|
proto_tree_add_text(subtree3, tvb, o + i + aoff + off,
|
|
tvb_get_guint8(tvb, o + i + aoff + off - 1),
|
|
"SNPA (%u %s)", tvb_get_guint8(tvb, o + i + aoff + off - 1),
|
|
(tvb_get_guint8(tvb, o + i + aoff + off - 1) == 1) ? "byte" : "bytes");
|
|
off += tvb_get_guint8(tvb, o + i + aoff + off - 1);
|
|
}
|
|
}
|
|
tlen -= off;
|
|
aoff += off;
|
|
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Network layer reachability information (%u %s)",
|
|
tlen, (tlen == 1) ? "byte" : "bytes");
|
|
if (tlen) {
|
|
subtree3 = proto_item_add_subtree(ti,ett_bgp_mp_reach_nlri);
|
|
|
|
while (tlen > 0) {
|
|
advance = decode_prefix_MP(af, saf, tvb, o + i + aoff , junk_buf, sizeof(junk_buf)) ;
|
|
proto_tree_add_text(subtree3, tvb, o + i + aoff, advance, "%s", junk_buf) ;
|
|
tlen -= advance;
|
|
aoff += advance;
|
|
}
|
|
}
|
|
break;
|
|
case BGPTYPE_MP_UNREACH_NLRI:
|
|
af = tvb_get_ntohs(tvb, o + i + aoff);
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, 2,
|
|
"Address family: %s (%u)",
|
|
val_to_str(af, afn_vals, "Unknown"), af);
|
|
saf = tvb_get_guint8(tvb, o + i + aoff + 2) ;
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff + 2, 1,
|
|
"Subsequent address family identifier: %s (%u)",
|
|
val_to_str(saf, bgpattr_nlri_safi, saf >= 128 ? "Vendor specific" : "Unknown"),
|
|
saf);
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff + 3,
|
|
tlen - 3, "Withdrawn routes (%u %s)", tlen - 3,
|
|
(tlen - 3 == 1) ? "byte" : "bytes");
|
|
|
|
tlen -= 3;
|
|
aoff += 3;
|
|
if (tlen > 0) {
|
|
subtree3 = proto_item_add_subtree(ti,ett_bgp_mp_unreach_nlri);
|
|
|
|
while (tlen > 0) {
|
|
advance = decode_prefix_MP(af, saf, tvb, o + i + aoff , junk_buf, sizeof(junk_buf)) ;
|
|
proto_tree_add_text(subtree3, tvb, o + i + aoff, advance, "%s", junk_buf) ;
|
|
tlen -= advance;
|
|
aoff += advance;
|
|
if (advance==1) /* catch if this is a unknown AFI type*/
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
case BGPTYPE_CLUSTER_LIST:
|
|
if (tlen % 4 != 0) {
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Cluster list (invalid): %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes");
|
|
free(cluster_list_str);
|
|
break;
|
|
}
|
|
|
|
ti = proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Cluster list: %s", cluster_list_str);
|
|
cluster_list_tree = proto_item_add_subtree(ti,
|
|
ett_bgp_cluster_list);
|
|
|
|
/* (o + i + aoff) =
|
|
(o + current attribute + aoff bytes to first tuple) */
|
|
q = o + i + aoff;
|
|
end = q + tlen;
|
|
|
|
/* snarf each cluster identifier */
|
|
while (q < end) {
|
|
tvb_memcpy(tvb, ipaddr, q, 4);
|
|
ti = proto_tree_add_text(cluster_list_tree, tvb,
|
|
q - 3 + aoff, 4, "Cluster identifier: %s",
|
|
ip_to_str(ipaddr));
|
|
|
|
q += 4;
|
|
}
|
|
|
|
free(cluster_list_str);
|
|
break;
|
|
case BGPTYPE_EXTENDED_COMMUNITY:
|
|
if (tlen %8 != 0) {
|
|
proto_tree_add_text(subtree3, tvb, o + i + aoff, tlen, "Extended community (invalid) : %u %s", tlen,
|
|
(tlen == 1) ? "byte" : "bytes") ;
|
|
} else {
|
|
q = o + i + aoff ;
|
|
end = o + i + aoff + tlen ;
|
|
ti = proto_tree_add_text(subtree2,tvb,q,tlen, "Carried Extended communities");
|
|
subtree3 = proto_item_add_subtree(ti,ett_bgp_extended_communities) ;
|
|
|
|
while (q < end) {
|
|
junk_buf_len=0;
|
|
ext_com = tvb_get_ntohs(tvb,q) ;
|
|
junk_buf_len=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf), "%s",
|
|
val_to_str(ext_com,bgpext_com_type,"Unknown"));
|
|
switch (ext_com) {
|
|
case BGP_EXT_COM_RT_0:
|
|
case BGP_EXT_COM_RO_0:
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, ": %u%s%d",
|
|
tvb_get_ntohs(tvb,q+2),":",tvb_get_ntohl(tvb,q+4));
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break ;
|
|
case BGP_EXT_COM_RT_1:
|
|
case BGP_EXT_COM_RO_1:
|
|
tvb_memcpy(tvb,ipaddr,q+2,4);
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, ": %s%s%u",
|
|
ip_to_str(ipaddr),":",tvb_get_ntohs(tvb,q+6));
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break;
|
|
case BGP_EXT_COM_VPN_ORIGIN:
|
|
case BGP_EXT_COM_OSPF_RID:
|
|
tvb_memcpy(tvb,ipaddr,q+2,4);
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, ": %s",
|
|
ip_to_str(ipaddr));
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break;
|
|
case BGP_EXT_COM_OSPF_RTYPE:
|
|
tvb_memcpy(tvb,ipaddr,q+2,4);
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, ": Area:%s %s",
|
|
ip_to_str(ipaddr),
|
|
val_to_str(tvb_get_guint8(tvb,q+6),bgpext_ospf_rtype,"Unknown"));
|
|
/* print OSPF Metric type if selected */
|
|
/* always print E2 even if not external route -- receiving router should ignore */
|
|
if ( (tvb_get_guint8(tvb,q+7)) & BGP_OSPF_RTYPE_METRIC_TYPE ) {
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len,sizeof(junk_buf)-junk_buf_len," E2");
|
|
} else if (tvb_get_guint8(tvb,q+6)==(BGP_OSPF_RTYPE_EXT ||BGP_OSPF_RTYPE_NSSA ) ) {
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len,sizeof(junk_buf)-junk_buf_len," E1");
|
|
}
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break;
|
|
case BGP_EXT_COM_LINKBAND:
|
|
tvb_memcpy(tvb,ipaddr,q+2,4); /* need to check on IEEE format on all platforms */
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, ": %.3f Mbps",
|
|
((double)*ipaddr)*8/1000000);
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break;
|
|
case BGP_EXT_COM_L2INFO:
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len,
|
|
": %s, Control Flags: %s%s%s%s%s, MTU: %u %s",
|
|
val_to_str(tvb_get_guint8(tvb,q+2),bgp_l2vpn_encaps,"Unknown"),
|
|
tvb_get_guint8(tvb,q+3) ? "" : "none",
|
|
tvb_get_ntohs(tvb,q+3)&0x08 ? "Q" : "",
|
|
tvb_get_ntohs(tvb,q+3)&0x04 ? "F" : "",
|
|
tvb_get_ntohs(tvb,q+3)&0x02 ? "C" : "",
|
|
tvb_get_ntohs(tvb,q+3)&0x01 ? "S" : "",
|
|
tvb_get_ntohs(tvb,q+4),
|
|
tvb_get_ntohs(tvb,q+4)==1 ? "byte" : "bytes");
|
|
junk_buf[junk_buf_len]='\0';
|
|
ti = proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
|
|
subtree4 = proto_item_add_subtree(ti,ett_bgp_extended_communities) ;
|
|
proto_tree_add_text(subtree4,tvb,q+2,1, "Encapsulation: %s",
|
|
val_to_str(tvb_get_guint8(tvb,q+2),bgp_l2vpn_encaps,"Unknown"));
|
|
proto_tree_add_text(subtree4,tvb,q+3,1, "Control Flags: %s%sControl Word %s required, Sequenced delivery %s required",
|
|
tvb_get_ntohs(tvb,q+3)&0x08 ? "Q flag (Reserved) set" : "",
|
|
tvb_get_ntohs(tvb,q+3)&0x04 ? "F flag (reserved) set" : "",
|
|
tvb_get_ntohs(tvb,q+3)&0x02 ? "is" : "not",
|
|
tvb_get_ntohs(tvb,q+3)&0x01 ? "is" : "not");
|
|
proto_tree_add_text(subtree4,tvb,q+4,2, "MTU: %u %s",
|
|
tvb_get_ntohs(tvb,q+4),
|
|
tvb_get_ntohs(tvb,q+4)==1 ? "byte" : "bytes");
|
|
break;
|
|
default:
|
|
junk_buf_len+=snprintf(junk_buf+junk_buf_len, sizeof(junk_buf)-junk_buf_len, " ");
|
|
junk_buf[junk_buf_len]='\0';
|
|
proto_tree_add_text(subtree3,tvb,q,8, "%s",junk_buf);
|
|
break ;
|
|
}
|
|
q = q + 8 ;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
proto_tree_add_text(subtree2, tvb, o + i + aoff, tlen,
|
|
"Unknown (%d %s)", tlen, (tlen == 1) ? "byte" :
|
|
"bytes");
|
|
break;
|
|
} /* end of second switch */
|
|
|
|
i += alen + aoff;
|
|
}
|
|
|
|
o += 2 + len;
|
|
|
|
/* NLRI */
|
|
len = offset + hlen - o;
|
|
|
|
/* parse prefixes */
|
|
if (len > 0) {
|
|
ti = proto_tree_add_text(tree, tvb, o, len,
|
|
"Network layer reachability information: %u %s", len,
|
|
(len == 1) ? "byte" : "bytes");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_nlri);
|
|
end = o + len;
|
|
while (o < end) {
|
|
i = decode_prefix4(tvb, o, junk_buf, sizeof(junk_buf));
|
|
if (i < 0 || 32 < i) {
|
|
proto_tree_add_text (tree, tvb, o, len,
|
|
"Invalid NLRI prefix length: %u",
|
|
tvb_get_guint8(tvb, o) );
|
|
return;
|
|
}
|
|
|
|
proto_tree_add_text(subtree, tvb, o, i, "%s", junk_buf);
|
|
o += i;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Dissect a BGP NOTIFICATION message.
|
|
*/
|
|
static void
|
|
dissect_bgp_notification(tvbuff_t *tvb, int offset, proto_tree *tree)
|
|
{
|
|
struct bgp_notification bgpn; /* BGP NOTIFICATION message */
|
|
int hlen; /* message length */
|
|
char *p; /* string pointer */
|
|
|
|
/* snarf message */
|
|
tvb_memcpy(tvb, bgpn.bgpn_marker, offset, BGP_MIN_NOTIFICATION_MSG_SIZE);
|
|
hlen = g_ntohs(bgpn.bgpn_len);
|
|
|
|
/* print error code */
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_notification, bgpn_major), 1,
|
|
"Error code: %s (%u)",
|
|
val_to_str(bgpn.bgpn_major, bgpnotify_major, "Unknown"),
|
|
bgpn.bgpn_major);
|
|
|
|
/* print error subcode */
|
|
if (bgpn.bgpn_major < array_length(bgpnotify_minor)
|
|
&& bgpnotify_minor[bgpn.bgpn_major] != NULL) {
|
|
p = val_to_str(bgpn.bgpn_minor, bgpnotify_minor[bgpn.bgpn_major],
|
|
"Unknown");
|
|
} else if (bgpn.bgpn_minor == 0)
|
|
p = "Unspecified";
|
|
else
|
|
p = "Unknown";
|
|
proto_tree_add_text(tree, tvb,
|
|
offset + offsetof(struct bgp_notification, bgpn_minor), 1,
|
|
"Error subcode: %s (%u)", p, bgpn.bgpn_minor);
|
|
|
|
/* only print if there is optional data */
|
|
if (hlen > BGP_MIN_NOTIFICATION_MSG_SIZE) {
|
|
proto_tree_add_text(tree, tvb, offset + BGP_MIN_NOTIFICATION_MSG_SIZE,
|
|
hlen - BGP_MIN_NOTIFICATION_MSG_SIZE, "Data");
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Dissect a BGP ROUTE-REFRESH message.
|
|
*/
|
|
static void
|
|
dissect_bgp_route_refresh(tvbuff_t *tvb, int offset, proto_tree *tree)
|
|
{
|
|
guint16 i; /* tmp */
|
|
int p; /* tvb offset counter */
|
|
int pend; /* end of list of entries for one orf type */
|
|
guint16 hlen; /* tvb RR msg length */
|
|
proto_item *ti; /* tree item */
|
|
proto_item *ti1; /* tree item */
|
|
proto_tree *subtree; /* tree for orf */
|
|
proto_tree *subtree1; /* tree for orf entry */
|
|
guint8 orftype; /* ORF Type */
|
|
guint8 orfwhen; /* ORF flag: immediate, defer */
|
|
guint16 orflen; /* ORF len */
|
|
guint8 entryflag; /* ORF Entry flag: action(add,del,delall) match(permit,deny) */
|
|
guint32 entryseq; /* ORF Entry sequence number */
|
|
int entrylen; /* ORF Entry length */
|
|
guint8 pfx_ge; /* ORF PrefixList mask lower bound */
|
|
guint8 pfx_le; /* ORF PrefixList mask upper bound */
|
|
char pfxbuf[20]; /* ORF PrefixList prefix string buffer */
|
|
int pfx_masklen; /* ORF PRefixList prefix mask length */
|
|
|
|
|
|
/*
|
|
example 1
|
|
00 1c 05 hlen=28
|
|
00 01 00 01 afi,safi= ipv4-unicast
|
|
02 80 00 01 defer, prefix-orf, len=1
|
|
80 removeall
|
|
example 2
|
|
00 25 05 hlen=37
|
|
00 01 00 01 afi,saif= ipv4-unicast
|
|
01 80 00 0a immediate, prefix-orf, len=10
|
|
00 add
|
|
00 00 00 05 seqno = 5
|
|
12 ge = 18
|
|
18 le = 24
|
|
10 07 02 prefix = 7.2.0.0/16
|
|
*/
|
|
hlen = tvb_get_ntohs(tvb, offset + BGP_MARKER_SIZE);
|
|
p = offset + BGP_HEADER_SIZE;
|
|
/* AFI */
|
|
i = tvb_get_ntohs(tvb, p);
|
|
proto_tree_add_text(tree, tvb, p, 2,
|
|
"Address family identifier: %s (%u)",
|
|
val_to_str(i, afn_vals, "Unknown"), i);
|
|
p += 2;
|
|
/* Reserved */
|
|
proto_tree_add_text(tree, tvb, p, 1,
|
|
"Reserved: 1 byte");
|
|
p++;
|
|
/* SAFI */
|
|
i = tvb_get_guint8(tvb, p);
|
|
proto_tree_add_text(tree, tvb, p, 1,
|
|
"Subsequent address family identifier: %s (%u)",
|
|
val_to_str(i, bgpattr_nlri_safi,
|
|
i >= 128 ? "Vendor specific" : "Unknown"),
|
|
i);
|
|
p++;
|
|
if ( hlen == BGP_HEADER_SIZE + 4 )
|
|
return;
|
|
while (p < offset + hlen) {
|
|
/* ORF type */
|
|
orfwhen = tvb_get_guint8(tvb, p);
|
|
orftype = tvb_get_guint8(tvb, p+1);
|
|
orflen = tvb_get_ntohs(tvb, p+2);
|
|
ti = proto_tree_add_text(tree, tvb, p , orflen + 4 , "ORF information (%u bytes)", orflen + 4);
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_orf);
|
|
proto_tree_add_text(subtree, tvb, p , 1, "ORF flag: %s", val_to_str(orfwhen, orf_when_vals,"UNKNOWN"));
|
|
proto_tree_add_text(subtree, tvb, p+1 , 1, "ORF type: %s", val_to_str(orftype, orf_type_vals,"UNKNOWN"));
|
|
proto_tree_add_text(subtree, tvb, p+2 , 2, "ORF len: %u %s", orflen, (orflen == 1) ? "byte" : "bytes");
|
|
p += 4;
|
|
|
|
if (orftype != BGP_ORF_PREFIX_CISCO){
|
|
proto_tree_add_text(subtree, tvb, p, orflen, "ORFEntry-Unknown (%u bytes)", orflen);
|
|
p += orflen;
|
|
continue;
|
|
}
|
|
pend = p + orflen;
|
|
while (p < pend) {
|
|
entryflag = tvb_get_guint8(tvb, p);
|
|
if ((entryflag & BGP_ORF_ACTION) == BGP_ORF_REMOVEALL) {
|
|
ti1 = proto_tree_add_text(subtree, tvb, p, 1, "ORFEntry-PrefixList (1 byte)");
|
|
subtree1 = proto_item_add_subtree(ti1, ett_bgp_orf_entry);
|
|
proto_tree_add_text(subtree1, tvb, p , 1, "RemoveAll");
|
|
p++;
|
|
} else {
|
|
entryseq = tvb_get_ntohl(tvb, p+1);
|
|
pfx_ge = tvb_get_guint8(tvb, p+5);
|
|
pfx_le = tvb_get_guint8(tvb, p+6);
|
|
/* calc len */
|
|
decode_prefix4(tvb, p+7, pfxbuf, sizeof(pfxbuf));
|
|
pfx_masklen = tvb_get_guint8(tvb, p+7);
|
|
entrylen = 7+ 1 + (pfx_masklen+7)/8;
|
|
ti1 = proto_tree_add_text(subtree, tvb, p, entrylen, "ORFEntry-PrefixList (%u bytes)", entrylen);
|
|
subtree1 = proto_item_add_subtree(ti1, ett_bgp_orf_entry);
|
|
proto_tree_add_text(subtree1, tvb, p , 1, "ACTION: %s MATCH: %s",
|
|
val_to_str(entryflag&BGP_ORF_ACTION, orf_entry_action_vals,"UNKNOWN"),
|
|
val_to_str(entryflag&BGP_ORF_MATCH, orf_entry_match_vals,"UNKNOWN"));
|
|
p++;
|
|
proto_tree_add_text(subtree1, tvb, p , 4, "Entry Sequence No: %u", entryseq);
|
|
p += 4;
|
|
proto_tree_add_text(subtree1, tvb, p , 1, "PrefixMask length lower bound: %u", pfx_ge);
|
|
p++;
|
|
proto_tree_add_text(subtree1, tvb, p , 1, "PrefixMask length upper bound: %u", pfx_le);
|
|
p++;
|
|
proto_tree_add_text(subtree1, tvb, p , 1 + (pfx_masklen+7)/8, "Prefix: %s", pfxbuf);
|
|
p+= 1 + (pfx_masklen+7)/8;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Dissect a BGP CAPABILITY message.
|
|
*/
|
|
static void
|
|
dissect_bgp_capability(tvbuff_t *tvb, int offset, proto_tree *tree)
|
|
{
|
|
proto_item *ti;
|
|
proto_tree *subtree;
|
|
guint8 action;
|
|
int ctype;
|
|
int clen;
|
|
int mend;
|
|
|
|
mend = offset + tvb_get_ntohs(tvb, offset + BGP_MARKER_SIZE);
|
|
offset += BGP_HEADER_SIZE;
|
|
/* step through all of the capabilities */
|
|
while (offset < mend) {
|
|
action = tvb_get_guint8(tvb, offset++);
|
|
ctype = tvb_get_guint8(tvb, offset++);
|
|
clen = tvb_get_guint8(tvb, offset++);
|
|
|
|
ti = proto_tree_add_text(tree, tvb, offset - 2, 2 + clen,
|
|
"%s (%u %s)", val_to_str(ctype, capability_vals,
|
|
"Unknown capability"), 2 + clen, (clen == 1) ? "byte" : "bytes");
|
|
subtree = proto_item_add_subtree(ti, ett_bgp_option);
|
|
proto_tree_add_text(subtree, tvb, offset-2, 1, "Action: %d (%s)",
|
|
action, val_to_str(action, bgpcap_action, "Invalid action value"));
|
|
dissect_bgp_capability_item(tvb, &offset, subtree, ctype, clen);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* Dissect a BGP packet.
|
|
*/
|
|
static void
|
|
dissect_bgp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
|
|
{
|
|
proto_item *ti; /* tree item */
|
|
proto_tree *bgp_tree; /* BGP packet tree */
|
|
proto_tree *bgp1_tree; /* BGP message tree */
|
|
int l, i; /* tmp */
|
|
int found; /* number of BGP messages in packet */
|
|
static guchar marker[] = { /* BGP message marker */
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
|
|
};
|
|
guint8 bgp_marker[BGP_MARKER_SIZE]; /* Marker (should be all ones */
|
|
guint16 bgp_len; /* Message length */
|
|
guint8 bgp_type; /* Message type */
|
|
|
|
char *typ; /* Message type (string) */
|
|
|
|
if (check_col(pinfo->cinfo, COL_PROTOCOL))
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "BGP");
|
|
if (check_col(pinfo->cinfo, COL_INFO))
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
|
|
|
l = tvb_reported_length(tvb);
|
|
i = 0;
|
|
found = -1;
|
|
/* run through the TCP packet looking for BGP headers */
|
|
while (i + BGP_HEADER_SIZE <= l) {
|
|
tvb_memcpy(tvb, bgp_marker, i, BGP_MARKER_SIZE);
|
|
bgp_len = tvb_get_ntohs(tvb, i + BGP_MARKER_SIZE);
|
|
bgp_type = tvb_get_guint8(tvb, i + BGP_MARKER_SIZE + 2);
|
|
|
|
/* look for bgp header */
|
|
if (memcmp(bgp_marker, marker, sizeof(marker)) != 0) {
|
|
i++;
|
|
continue;
|
|
}
|
|
|
|
found++;
|
|
|
|
/*
|
|
* Desegmentation check.
|
|
*/
|
|
if (bgp_desegment) {
|
|
if (bgp_len > tvb_length_remaining(tvb, i) && pinfo->can_desegment) {
|
|
/*
|
|
* Not all of this packet is in the data we've been
|
|
* handed, but we can do reassembly on it.
|
|
*
|
|
* Tell the TCP dissector where the data for
|
|
* this message starts in the data it handed
|
|
* us, and how many more bytes we need, and
|
|
* return.
|
|
*/
|
|
pinfo->desegment_offset = i;
|
|
pinfo->desegment_len = bgp_len - tvb_length_remaining(tvb, i);
|
|
return;
|
|
}
|
|
}
|
|
|
|
typ = val_to_str(bgp_type, bgptypevals, "Unknown Message");
|
|
|
|
if (check_col(pinfo->cinfo, COL_INFO)) {
|
|
if (found == 0)
|
|
col_add_fstr(pinfo->cinfo, COL_INFO, "%s", typ);
|
|
else
|
|
col_append_fstr(pinfo->cinfo, COL_INFO, ", %s", typ);
|
|
}
|
|
|
|
if (tree) {
|
|
ti = proto_tree_add_item(tree, proto_bgp, tvb, i, bgp_len, FALSE);
|
|
bgp_tree = proto_item_add_subtree(ti, ett_bgp);
|
|
|
|
ti = proto_tree_add_text(bgp_tree, tvb, i, bgp_len, "%s", typ);
|
|
|
|
/* add a different tree for each message type */
|
|
switch (bgp_type) {
|
|
case BGP_OPEN:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp_open);
|
|
break;
|
|
case BGP_UPDATE:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp_update);
|
|
break;
|
|
case BGP_NOTIFICATION:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp_notification);
|
|
break;
|
|
case BGP_KEEPALIVE:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp);
|
|
break;
|
|
case BGP_ROUTE_REFRESH_CISCO:
|
|
case BGP_ROUTE_REFRESH:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp_route_refresh);
|
|
break;
|
|
case BGP_CAPABILITY:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp_capability);
|
|
break;
|
|
default:
|
|
bgp1_tree = proto_item_add_subtree(ti, ett_bgp);
|
|
break;
|
|
}
|
|
|
|
proto_tree_add_text(bgp1_tree, tvb, i, BGP_MARKER_SIZE,
|
|
"Marker: 16 bytes");
|
|
|
|
if (bgp_len < BGP_HEADER_SIZE || bgp_len > BGP_MAX_PACKET_SIZE) {
|
|
proto_tree_add_text(bgp1_tree, tvb,
|
|
i + BGP_MARKER_SIZE, 2,
|
|
"Length (invalid): %u %s", bgp_len,
|
|
(bgp_len == 1) ? "byte" : "bytes");
|
|
return;
|
|
} else {
|
|
proto_tree_add_text(bgp1_tree, tvb,
|
|
i + BGP_MARKER_SIZE, 2,
|
|
"Length: %u %s", bgp_len,
|
|
(bgp_len == 1) ? "byte" : "bytes");
|
|
}
|
|
|
|
proto_tree_add_uint_format(bgp1_tree, hf_bgp_type, tvb,
|
|
i + BGP_MARKER_SIZE + 2, 1,
|
|
bgp_type,
|
|
"Type: %s (%u)", typ, bgp_type);
|
|
|
|
switch (bgp_type) {
|
|
case BGP_OPEN:
|
|
dissect_bgp_open(tvb, i, bgp1_tree);
|
|
break;
|
|
case BGP_UPDATE:
|
|
dissect_bgp_update(tvb, i, bgp1_tree);
|
|
break;
|
|
case BGP_NOTIFICATION:
|
|
dissect_bgp_notification(tvb, i, bgp1_tree);
|
|
break;
|
|
case BGP_KEEPALIVE:
|
|
/* no data in KEEPALIVE messages */
|
|
break;
|
|
case BGP_ROUTE_REFRESH_CISCO:
|
|
case BGP_ROUTE_REFRESH:
|
|
dissect_bgp_route_refresh(tvb, i, bgp1_tree);
|
|
break;
|
|
case BGP_CAPABILITY:
|
|
dissect_bgp_capability(tvb, i, bgp1_tree);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
i += bgp_len;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Register ourselves.
|
|
*/
|
|
void
|
|
proto_register_bgp(void)
|
|
{
|
|
|
|
static hf_register_info hf[] = {
|
|
{ &hf_bgp_type,
|
|
{ "BGP message type", "bgp.type", FT_UINT8, BASE_HEX,
|
|
VALS(bgptypevals), 0x0, "BGP message type", HFILL }},
|
|
};
|
|
|
|
static gint *ett[] = {
|
|
&ett_bgp,
|
|
&ett_bgp_unfeas,
|
|
&ett_bgp_attrs,
|
|
&ett_bgp_attr,
|
|
&ett_bgp_attr_flags,
|
|
&ett_bgp_mp_nhna,
|
|
&ett_bgp_mp_reach_nlri,
|
|
&ett_bgp_mp_unreach_nlri,
|
|
&ett_bgp_mp_snpa,
|
|
&ett_bgp_nlri,
|
|
&ett_bgp_open,
|
|
&ett_bgp_update,
|
|
&ett_bgp_notification,
|
|
&ett_bgp_route_refresh,
|
|
&ett_bgp_capability,
|
|
&ett_bgp_as_paths,
|
|
&ett_bgp_communities,
|
|
&ett_bgp_cluster_list,
|
|
&ett_bgp_options,
|
|
&ett_bgp_option,
|
|
&ett_bgp_extended_communities,
|
|
&ett_bgp_orf,
|
|
&ett_bgp_orf_entry
|
|
};
|
|
module_t *bgp_module;
|
|
static enum_val_t asn_len[] = {
|
|
{"Auto-detect", 0},
|
|
{"2 octet", 2},
|
|
{"4 octet", 4},
|
|
{NULL, -1}
|
|
};
|
|
|
|
proto_bgp = proto_register_protocol("Border Gateway Protocol",
|
|
"BGP", "bgp");
|
|
proto_register_field_array(proto_bgp, hf, array_length(hf));
|
|
proto_register_subtree_array(ett, array_length(ett));
|
|
|
|
bgp_module = prefs_register_protocol(proto_bgp, NULL);
|
|
prefs_register_bool_preference(bgp_module, "desegment",
|
|
"Desegment all BGP messages spanning multiple TCP segments",
|
|
"Whether the BGP dissector should desegment all messages spanning multiple TCP segments",
|
|
&bgp_desegment);
|
|
prefs_register_enum_preference(bgp_module, "asn_len",
|
|
"Length of the AS number",
|
|
"BGP dissector detect the length of the AS number in AS_PATH attributes automatically or manually (NOTE: Automatic detection is not 100% accurate)",
|
|
&bgp_asn_len, asn_len, FALSE);
|
|
}
|
|
|
|
void
|
|
proto_reg_handoff_bgp(void)
|
|
{
|
|
dissector_handle_t bgp_handle;
|
|
|
|
bgp_handle = create_dissector_handle(dissect_bgp, proto_bgp);
|
|
dissector_add("tcp.port", BGP_TCP_PORT, bgp_handle);
|
|
}
|