diff options
author | Alexis La Goutte <alexis.lagoutte@gmail.com> | 2013-02-04 17:24:27 +0000 |
---|---|---|
committer | Alexis La Goutte <alexis.lagoutte@gmail.com> | 2013-02-04 17:24:27 +0000 |
commit | 17679a873323750b34e475e5be4da975df20f58a (patch) | |
tree | 694124eb43ba79090fe0bc026369f9a307c23511 /epan/dissectors/packet-rpki-rtr.c | |
parent | c0ca6220efaaa9b8e51d7cd5e853ac5b82107368 (diff) |
From me via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8296 Add RPKI-RTR Dissector (RFC6810)
Support all PDU Type (IPv4/6 Prefix, Serial Notify/Query...)
Not supported the packet with a lot of PDU (fragmentation)
svn path=/trunk/; revision=47470
Diffstat (limited to 'epan/dissectors/packet-rpki-rtr.c')
-rw-r--r-- | epan/dissectors/packet-rpki-rtr.c | 391 |
1 files changed, 391 insertions, 0 deletions
diff --git a/epan/dissectors/packet-rpki-rtr.c b/epan/dissectors/packet-rpki-rtr.c new file mode 100644 index 0000000000..70301200a5 --- /dev/null +++ b/epan/dissectors/packet-rpki-rtr.c @@ -0,0 +1,391 @@ +/* packet-rpki-rtr.c + * Routines for RPKI-Router Protocol dissection (RFC6810) + * Copyright 2013, Alexis La Goutte <alexis.lagoutte at gmail dot com> + * + * $Id$ + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, write to the Free Software Foundation, Inc., + * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + + * The information used comes from: + * RFC6810: The Resource Public Key Infrastructure (RPKI) to Router Protocol + */ + +#include "config.h" + +#include <glib.h> + +#include <epan/packet.h> +#include <epan/prefs.h> + +void proto_reg_handoff_rpkirtr(void); + +static int proto_rpkirtr = -1; +static int hf_rpkirtr_version = -1; +static int hf_rpkirtr_pdu_type = -1; +static int hf_rpkirtr_reserved = -1; +static int hf_rpkirtr_session_id = -1; +static int hf_rpkirtr_length = -1; +static int hf_rpkirtr_serial_number = -1; +static int hf_rpkirtr_flags = -1; +static int hf_rpkirtr_flags_aw = -1; +static int hf_rpkirtr_prefix_length = -1; +static int hf_rpkirtr_max_length = -1; +static int hf_rpkirtr_ipv4_prefix = -1; +static int hf_rpkirtr_ipv6_prefix = -1; +static int hf_rpkirtr_as_number = -1; +static int hf_rpkirtr_error_code = -1; +static int hf_rpkirtr_length_pdu = -1; +static int hf_rpkirtr_error_pdu = -1; +static int hf_rpkirtr_length_text = -1; +static int hf_rpkirtr_error_text = -1; + +static guint g_port_rpkirtr = 323; +static guint g_port_rpkirtr_tls = 324; + +static gint ett_rpkirtr = -1; +static gint ett_flags = -1; + + +/* http://www.iana.org/assignments/rpki/rpki.xml#rpki-rtr-pdu */ +#define RPKI_RTR_SERIAL_NOTIFY_PDU 0 +#define RPKI_RTR_SERIAL_QUERY_PDU 1 +#define RPKI_RTR_RESET_QUERY_PDU 2 +#define RPKI_RTR_CACHE_RESPONSE_PDU 3 +#define RPKI_RTR_IPV4_PREFIX_PDU 4 +#define RPKI_RTR_IPV6_PREFIX_PDU 6 +#define RPKI_RTR_END_OF_DATA_PDU 7 +#define RPKI_RTR_CACHE_RESET_PDU 8 +#define RPKI_RTR_ERROR_REPORT_PDU 10 + +static const value_string rtr_pdu_type_vals[] = { + { RPKI_RTR_SERIAL_NOTIFY_PDU, "Serial Notify" }, + { RPKI_RTR_SERIAL_QUERY_PDU, "Serial Query" }, + { RPKI_RTR_RESET_QUERY_PDU, "Reset Query" }, + { RPKI_RTR_CACHE_RESPONSE_PDU, "Cache Response" }, + { RPKI_RTR_IPV4_PREFIX_PDU, "IPV4 Prefix" }, + { RPKI_RTR_IPV6_PREFIX_PDU, "IPV6 Prefix" }, + { RPKI_RTR_END_OF_DATA_PDU, "End of Data" }, + { RPKI_RTR_CACHE_RESET_PDU, "Cache Reset" }, + { RPKI_RTR_ERROR_REPORT_PDU, "Error Report" }, + { 0, NULL } +}; + +/* http://www.iana.org/assignments/rpki/rpki.xml#rpki-rtr-error */ +static const value_string rtr_error_code_vals[] = { + { 0, "Corrupt Data" }, + { 1, "Internal Error" }, + { 2, "No Data Available" }, + { 3, "Invalid Request" }, + { 4, "Unsupported Protocol Version" }, + { 5, "Unsupported PDU Type" }, + { 6, "Withdrawal of Unknown Record" }, + { 7, "Duplicate Announcement Received" }, + { 0, NULL } +}; + +static const true_false_string tfs_flag_type_aw = { + "Announcement", + "Withdrawal" +}; + +int dissect_rpkirtr(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_) +{ + + proto_item *ti = NULL, *ti_flags; + proto_tree *rpkirtr_tree = NULL, *flags_tree = NULL; + int offset = 0; + guint8 pdu_type; + col_set_str(pinfo->cinfo, COL_PROTOCOL, "RPKI-RTR"); + + while (tvb_reported_length_remaining(tvb, offset) != 0) { + if (tree) { + + ti = proto_tree_add_item(tree, proto_rpkirtr, tvb, 0, -1, ENC_NA); + + rpkirtr_tree = proto_item_add_subtree(ti, ett_rpkirtr); + } + + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_version, tvb, offset, 1, ENC_BIG_ENDIAN); + offset += 1; + + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_pdu_type, tvb, offset, 1, ENC_BIG_ENDIAN); + pdu_type = tvb_get_guint8(tvb, offset); + col_set_str(pinfo->cinfo, COL_INFO, val_to_str_const(pdu_type, rtr_pdu_type_vals, "Unknown %d")); + proto_item_append_text(ti, " (%s)", val_to_str_const(pdu_type, rtr_pdu_type_vals, "Unknown %d")); + offset += 1; + + switch(pdu_type){ + case RPKI_RTR_SERIAL_NOTIFY_PDU: /* Serial Notify (0) */ + case RPKI_RTR_SERIAL_QUERY_PDU: /* Serial Query (1) */ + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_session_id, tvb, offset, 2, ENC_BIG_ENDIAN); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_serial_number, tvb, offset, 4, ENC_BIG_ENDIAN); + offset +=4; + break; + case RPKI_RTR_RESET_QUERY_PDU: /* Reset Query (2) */ + case RPKI_RTR_CACHE_RESET_PDU: /* Cache Reset (8) */ + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_reserved, tvb, offset, 2, ENC_NA); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + break; + case RPKI_RTR_CACHE_RESPONSE_PDU: /* Cache Response (3) */ + case RPKI_RTR_END_OF_DATA_PDU: /* End Of Data (7) */ + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_session_id, tvb, offset, 2, ENC_BIG_ENDIAN); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + break; + case RPKI_RTR_IPV4_PREFIX_PDU: /* IPv4 Prefix (4) */ + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_reserved, tvb, offset, 2, ENC_NA); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + ti_flags = proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_flags, tvb, offset, 1, ENC_BIG_ENDIAN); + flags_tree = proto_item_add_subtree(ti_flags, ett_flags); + proto_tree_add_item(flags_tree, hf_rpkirtr_flags_aw, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_prefix_length, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_max_length, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_reserved, tvb, offset, 1, ENC_NA); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_ipv4_prefix, tvb, offset, 4, ENC_BIG_ENDIAN); + offset +=4; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_as_number, tvb, offset, 4, ENC_BIG_ENDIAN); + offset +=4; + break; + case RPKI_RTR_IPV6_PREFIX_PDU: /* IPv4 Prefix (6) */ + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_reserved, tvb, offset, 2, ENC_NA); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + ti_flags = proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_flags, tvb, offset, 1, ENC_BIG_ENDIAN); + flags_tree = proto_item_add_subtree(ti_flags, ett_flags); + proto_tree_add_item(flags_tree, hf_rpkirtr_flags_aw, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_prefix_length, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_max_length, tvb, offset, 1, ENC_BIG_ENDIAN); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_reserved, tvb, offset, 1, ENC_NA); + offset +=1; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_ipv6_prefix, tvb, offset, 16, ENC_NA); + offset +=16; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_as_number, tvb, offset, 4, ENC_BIG_ENDIAN); + offset +=4; + break; + case RPKI_RTR_ERROR_REPORT_PDU: /* Error Report (10) */ + { + guint32 len_pdu, len_text; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_error_code, tvb, offset, 2, ENC_BIG_ENDIAN); + offset +=2; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length, tvb, offset, 4, ENC_BIG_ENDIAN); + /* TODO: Add check length ? */ + offset +=4; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length_pdu, tvb, offset, 4, ENC_BIG_ENDIAN); + len_pdu = tvb_get_ntohl(tvb, offset); + offset +=4; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_error_pdu, tvb, offset, len_pdu, ENC_NA); + offset += len_pdu; + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_length_text, tvb, offset, 4, ENC_BIG_ENDIAN); + len_text = tvb_get_ntohl(tvb, offset); + offset +=4, + proto_tree_add_item(rpkirtr_tree, hf_rpkirtr_error_text, tvb, offset, len_text, ENC_ASCII|ENC_NA); + offset += len_text; + } + default: + /* No default ? */ + break; + } + } + return offset; +} + + + +void +proto_register_rpkirtr(void) +{ + module_t *rpkirtr_module; + + static hf_register_info hf[] = { + { &hf_rpkirtr_version, + { "Version", "rpki-rtr.version", + FT_UINT8, BASE_DEC, NULL, 0x0, + "Denoting the version of this protocol (currently 0)", HFILL } + }, + { &hf_rpkirtr_pdu_type, + { "PDU Type", "rpki-rtr.pdu_type", + FT_UINT8, BASE_DEC, VALS(rtr_pdu_type_vals), 0x0, + "Denoting the type of the PDU", HFILL } + }, + { &hf_rpkirtr_reserved, + { "Reserved", "rpki-rtr.reserved", + FT_BYTES, BASE_NONE, NULL, 0x0, + "Must be zero", HFILL } + }, + { &hf_rpkirtr_session_id, + { "Session ID", "rpki-rtr.session_id", + FT_UINT16, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_length, + { "Length", "rpki-rtr.length", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Value the count of the bytes in the entire PDU, including the eight bytes of header that end with the length field", HFILL } + }, + { &hf_rpkirtr_serial_number, + { "Serial Number", "rpki-rtr.serial_number", + FT_UINT32, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_flags, + { "Flags", "rpki-rtr.flags", + FT_UINT8, BASE_HEX, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_flags_aw, + { "Flag AW", "rpki-rtr.flags.aw", + FT_BOOLEAN, 8, TFS(&tfs_flag_type_aw), 0x01, + NULL, HFILL } + }, + { &hf_rpkirtr_prefix_length, + { "Prefix Length", "rpki-rtr.prefix_length", + FT_UINT8, BASE_DEC, NULL, 0x0, + "Denoting the shortest prefix allowed for the prefix", HFILL } + }, + { &hf_rpkirtr_max_length, + { "Max length", "rpki-rtr.max_length", + FT_UINT8, BASE_DEC, NULL, 0x0, + "Denoting the longest prefix allowed by the prefix. This MUST NOT be less than the Prefix Length element", HFILL } + }, + { &hf_rpkirtr_ipv4_prefix, + { "IPv4 Prefix", "rpki-rtr.ipv4_prefix", + FT_IPv4, BASE_NONE, NULL, 0x0, + "The IPv4 prefix of the ROA", HFILL } + }, + { &hf_rpkirtr_ipv6_prefix, + { "IPv6 Prefix", "rpki-rtr.ipv6_prefix", + FT_IPv6, BASE_NONE, NULL, 0x0, + "The IPv6 prefix of the ROA", HFILL } + }, + { &hf_rpkirtr_as_number, + { "AS Number", "rpki-rtr.as_number", + FT_UINT32, BASE_DEC, NULL, 0x0, + "Autonomous System Number allowed to announce this prefix", HFILL } + }, + { &hf_rpkirtr_error_code, + { "Error Code", "rpki-rtr.error_code", + FT_UINT16, BASE_DEC, VALS(rtr_error_code_vals), 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_length_pdu, + { "Length of Encapsulated PDU", "rpki-rtr.length_pdu", + FT_UINT32, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_error_pdu, + { "Erroneous PDU", "rpki-rtr.error_pdu", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_length_text, + { "Length of text", "rpki-rtr.length_text", + FT_UINT32, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + { &hf_rpkirtr_error_text, + { "Erroneous Text", "rpki-rtr.error_text", + FT_STRING, BASE_NONE, NULL, 0x0, + NULL, HFILL } + } + }; + + static gint *ett[] = { + &ett_rpkirtr, + &ett_flags + }; + + proto_rpkirtr = proto_register_protocol("RPKI-Router Protocol", + "RPKI-Router Protocol", "rpkirtr"); + + proto_register_field_array(proto_rpkirtr, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + + rpkirtr_module = prefs_register_protocol(proto_rpkirtr, + proto_reg_handoff_rpkirtr); + + prefs_register_uint_preference(rpkirtr_module, "tcp.rpkirtr.port", "RPKI-RTR TCP Port", + "RPKI-Router Protocol TCP port if other than the default", + 10, &g_port_rpkirtr); + prefs_register_uint_preference(rpkirtr_module, "tcp.rpkirtr_tls.port", "RPKI-RTR TCP TLS Port", + "RPKI-Router Protocol TCP TLS port if other than the default", + 10, &g_port_rpkirtr_tls); +} + + +void +proto_reg_handoff_rpkirtr(void) +{ + static gboolean initialized = FALSE; + static dissector_handle_t rpkirtr_handle; + static dissector_handle_t ssl_handle; + static int rpki_rtr_port, rpki_rtr_tls_port; + + if (!initialized) { + + rpkirtr_handle = new_create_dissector_handle(dissect_rpkirtr, + proto_rpkirtr); + ssl_handle = find_dissector("ssl"); + initialized = TRUE; + } else { + + dissector_delete_uint("tcp.port", rpki_rtr_port, rpkirtr_handle); + dissector_delete_uint("tcp.port", rpki_rtr_tls_port, ssl_handle); + } + + rpki_rtr_port = g_port_rpkirtr; + rpki_rtr_tls_port = g_port_rpkirtr_tls; + + dissector_add_uint("tcp.port", rpki_rtr_port, rpkirtr_handle); + dissector_add_uint("tcp.port", rpki_rtr_tls_port, ssl_handle); +} + + +/* + * Editor modelines - http://www.wireshark.org/tools/modelines.html + * + * Local variables: + * c-basic-offset: 4 + * tab-width: 8 + * indent-tabs-mode: nil + * End: + * + * vi: set shiftwidth=4 tabstop=8 expandtab: + * :indentSize=4:tabSize=8:noTabs=true: + */ |