9bcac48403
Started by grepping call_dissector_with_data, call_dissector_only and call_dissector and traced the handles passed into them to a find_dissector within the dissector. Then replaced find_dissector with find_dissector_add_dependency and added the protocol id from the dissector. "data" dissector was not considered to be a dependency. Change-Id: I15d0d77301306587ef8e7af5876e74231816890d Reviewed-on: https://code.wireshark.org/review/14509 Petri-Dish: Michael Mann <mmann78@netscape.net> Reviewed-by: Michael Mann <mmann78@netscape.net>
278 lines
8.5 KiB
C
278 lines
8.5 KiB
C
/*
|
|
* Routines for the disassembly of the proprietary Cisco IPSEC in
|
|
* TCP encapsulation protocol
|
|
*
|
|
* Copyright 2007 Joerg Mayer (see AUTHORS file)
|
|
*
|
|
* Wireshark - Network traffic analyzer
|
|
* By Gerald Combs <gerald@wireshark.org>
|
|
* Copyright 1998 Gerald Combs
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*/
|
|
|
|
/* TODO:
|
|
* - Find out the meaning of the (unknown) trailer
|
|
* - UDP checksum is wrong
|
|
* - Currently doesn't handle AH (lack of sample trace)
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <epan/packet.h>
|
|
#include <epan/prefs.h>
|
|
#include "packet-ndmp.h"
|
|
|
|
void proto_register_tcpencap(void);
|
|
void proto_reg_handoff_tcpencap(void);
|
|
|
|
static int hf_tcpencap_unknown = -1;
|
|
static int hf_tcpencap_zero = -1;
|
|
static int hf_tcpencap_seq = -1;
|
|
static int hf_tcpencap_ike_direction = -1;
|
|
static int hf_tcpencap_esp_zero = -1;
|
|
static int hf_tcpencap_magic = -1;
|
|
static int hf_tcpencap_proto = -1;
|
|
static int hf_tcpencap_magic2 = -1;
|
|
|
|
static int proto_tcpencap = -1;
|
|
static gint ett_tcpencap = -1;
|
|
static gint ett_tcpencap_unknown = -1;
|
|
|
|
static const value_string tcpencap_ikedir_vals[] = {
|
|
{ 0x0000, "Server to client" },
|
|
{ 0x4000, "Client to server" },
|
|
|
|
{ 0, NULL }
|
|
};
|
|
|
|
static const value_string tcpencap_proto_vals[] = {
|
|
{ 0x11, "ISAKMP" },
|
|
{ 0x32, "ESP" },
|
|
|
|
{ 0, NULL }
|
|
};
|
|
|
|
#define TRAILERLENGTH 16
|
|
#define TCP_CISCO_IPSEC 10000
|
|
/* Another case of several companies creating protocols and
|
|
choosing an easy-to-remember port. Playing tonight: Cisco vs NDMP.
|
|
Since NDMP has officially registered port 10000 with IANA, it should be the default
|
|
*/
|
|
static guint global_tcpencap_tcp_port = 0;
|
|
|
|
static dissector_handle_t esp_handle;
|
|
static dissector_handle_t udp_handle;
|
|
|
|
#define TCP_ENCAP_P_ESP 1
|
|
#define TCP_ENCAP_P_UDP 2
|
|
|
|
|
|
static int
|
|
packet_is_tcpencap(tvbuff_t *tvb, packet_info *pinfo, guint32 offset)
|
|
{
|
|
if ( /* Must be zero */
|
|
tvb_get_ntohl(tvb, offset + 0) != 0 ||
|
|
/* Lower 12 bits must be zero */
|
|
(tvb_get_ntohs(tvb, offset + 6) & 0xfff) != 0 ||
|
|
/* Protocol must be UDP or ESP */
|
|
(tvb_get_guint8(tvb, offset + 13) != 17 &&
|
|
tvb_get_guint8(tvb, offset + 13) != 50)
|
|
) {
|
|
return FALSE;
|
|
}
|
|
|
|
if(check_if_ndmp(tvb, pinfo)){
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/*
|
|
* TCP Encapsulation of IPsec Packets
|
|
* as supported by the cisco vpn3000 concentrator series
|
|
*/
|
|
static int
|
|
dissect_tcpencap(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
|
|
{
|
|
proto_tree *tcpencap_tree = NULL;
|
|
proto_tree *tcpencap_unknown_tree = NULL;
|
|
|
|
proto_item *tree_item = NULL;
|
|
proto_item *unknown_item = NULL;
|
|
tvbuff_t *next_tvb;
|
|
guint32 reported_length = tvb_reported_length(tvb);
|
|
guint32 offset;
|
|
guint8 protocol;
|
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "TCPENCAP");
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
|
|
|
/* If the first 4 bytes are 0x01f401f4 (udp src and dst port = 500)
|
|
we most likely have UDP (isakmp) traffic */
|
|
|
|
if (tvb_get_ntohl(tvb, 0) == 0x01f401f4) { /* UDP means ISAKMP */
|
|
protocol = TCP_ENCAP_P_UDP;
|
|
} else { /* Hopefully ESP */
|
|
protocol = TCP_ENCAP_P_ESP;
|
|
}
|
|
|
|
if (tree) {
|
|
tree_item = proto_tree_add_item(tree, proto_tcpencap, tvb, 0, -1, ENC_NA);
|
|
tcpencap_tree = proto_item_add_subtree(tree_item, ett_tcpencap);
|
|
|
|
/* Dissect the trailer following the encapsulated IPSEC/ISAKMP packet */
|
|
offset = reported_length - TRAILERLENGTH;
|
|
unknown_item = proto_tree_add_item(tcpencap_tree, hf_tcpencap_unknown, tvb,
|
|
offset, TRAILERLENGTH, ENC_NA);
|
|
/* Try to guess the contents of the trailer */
|
|
tcpencap_unknown_tree = proto_item_add_subtree(unknown_item, ett_tcpencap_unknown);
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_zero, tvb, offset + 0, 4, ENC_NA);
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_seq, tvb, offset + 4, 2, ENC_BIG_ENDIAN);
|
|
if (protocol == TCP_ENCAP_P_UDP) {
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_ike_direction, tvb, offset + 6, 2, ENC_BIG_ENDIAN);
|
|
} else {
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_esp_zero, tvb, offset + 6, 2, ENC_BIG_ENDIAN);
|
|
}
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_magic, tvb, offset + 8, 5, ENC_NA);
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_proto, tvb, offset + 13, 1, ENC_BIG_ENDIAN);
|
|
proto_tree_add_item(tcpencap_unknown_tree, hf_tcpencap_magic2, tvb, offset + 14, 2, ENC_NA);
|
|
}
|
|
|
|
/* Create the tvbuffer for the next dissector */
|
|
next_tvb = tvb_new_subset(tvb, 0, reported_length - TRAILERLENGTH , -1);
|
|
if (protocol == TCP_ENCAP_P_UDP) {
|
|
call_dissector(udp_handle, next_tvb, pinfo, tree);
|
|
} else { /* Hopefully ESP */
|
|
call_dissector(esp_handle, next_tvb, pinfo, tree);
|
|
}
|
|
|
|
return tvb_captured_length(tvb);
|
|
}
|
|
|
|
static gboolean
|
|
dissect_tcpencap_heur(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data)
|
|
{
|
|
guint32 reported_length = tvb_reported_length(tvb);
|
|
guint32 captured_length = tvb_captured_length(tvb);
|
|
|
|
if (reported_length <= TRAILERLENGTH + 8 ||
|
|
/* Ensure we have enough bytes for packet_is_tcpencap analysis */
|
|
(reported_length - captured_length) > (TRAILERLENGTH - 13) ||
|
|
!packet_is_tcpencap(tvb, pinfo, reported_length - TRAILERLENGTH) ) {
|
|
return FALSE;
|
|
}
|
|
|
|
dissect_tcpencap(tvb, pinfo, tree, data);
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
proto_register_tcpencap(void)
|
|
{
|
|
static hf_register_info hf[] = {
|
|
|
|
{ &hf_tcpencap_unknown,
|
|
{ "Unknown trailer", "tcpencap.unknown", FT_BYTES, BASE_NONE, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_zero,
|
|
{ "All zero", "tcpencap.zero", FT_BYTES, BASE_NONE, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_seq,
|
|
{ "Sequence number", "tcpencap.seq", FT_UINT16, BASE_HEX, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_esp_zero,
|
|
{ "ESP zero", "tcpencap.espzero", FT_UINT16, BASE_HEX, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_ike_direction,
|
|
{ "ISAKMP traffic direction", "tcpencap.ikedirection", FT_UINT16, BASE_HEX, VALS(tcpencap_ikedir_vals),
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_magic,
|
|
{ "Magic number", "tcpencap.magic", FT_BYTES, BASE_NONE, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_proto,
|
|
{ "Protocol", "tcpencap.proto", FT_UINT8, BASE_HEX, VALS(tcpencap_proto_vals),
|
|
0x0, NULL, HFILL }},
|
|
|
|
{ &hf_tcpencap_magic2,
|
|
{ "Magic 2", "tcpencap.magic2", FT_BYTES, BASE_NONE, NULL,
|
|
0x0, NULL, HFILL }},
|
|
|
|
};
|
|
|
|
static gint *ett[] = {
|
|
&ett_tcpencap,
|
|
&ett_tcpencap_unknown,
|
|
};
|
|
|
|
module_t *tcpencap_module;
|
|
|
|
proto_tcpencap = proto_register_protocol(
|
|
"TCP Encapsulation of IPsec Packets", "TCPENCAP", "tcpencap");
|
|
proto_register_field_array(proto_tcpencap, hf, array_length(hf));
|
|
proto_register_subtree_array(ett, array_length(ett));
|
|
tcpencap_module = prefs_register_protocol(proto_tcpencap, proto_reg_handoff_tcpencap);
|
|
prefs_register_uint_preference(tcpencap_module, "tcp.port", "IPSEC TCP Port",
|
|
"Set the port for IPSEC/ISAKMP messages (typically 10000)",
|
|
10, &global_tcpencap_tcp_port);
|
|
}
|
|
|
|
void
|
|
proto_reg_handoff_tcpencap(void)
|
|
{
|
|
static dissector_handle_t tcpencap_handle;
|
|
static gboolean initialized = FALSE;
|
|
static guint tcpencap_tcp_port = 0;
|
|
|
|
if (!initialized) {
|
|
tcpencap_handle = create_dissector_handle(dissect_tcpencap, proto_tcpencap);
|
|
esp_handle = find_dissector_add_dependency("esp", proto_tcpencap);
|
|
udp_handle = find_dissector_add_dependency("udp", proto_tcpencap);
|
|
|
|
heur_dissector_add("tcp", dissect_tcpencap_heur, "TCP Encapsulation of IPsec Packets", "ipsec_tcp", proto_tcpencap, HEURISTIC_ENABLE);
|
|
|
|
initialized = TRUE;
|
|
}
|
|
|
|
/* Register TCP port for dissection */
|
|
if(tcpencap_tcp_port != 0 && tcpencap_tcp_port != global_tcpencap_tcp_port){
|
|
dissector_delete_uint("tcp.port", tcpencap_tcp_port, tcpencap_handle);
|
|
}
|
|
|
|
if(global_tcpencap_tcp_port != 0 && tcpencap_tcp_port != global_tcpencap_tcp_port) {
|
|
dissector_add_uint("tcp.port", global_tcpencap_tcp_port, tcpencap_handle);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Editor modelines - http://www.wireshark.org/tools/modelines.html
|
|
*
|
|
* Local variables:
|
|
* c-basic-offset: 8
|
|
* tab-width: 8
|
|
* indent-tabs-mode: t
|
|
* End:
|
|
*
|
|
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
|
|
* :indentSize=8:tabSize=8:noTabs=false:
|
|
*/
|