diff options
author | Bill Meier <wmeier@newsguy.com> | 2010-10-20 00:36:53 +0000 |
---|---|---|
committer | Bill Meier <wmeier@newsguy.com> | 2010-10-20 00:36:53 +0000 |
commit | 9787a5734a75c813891ea1eba9ef8998e91ad9b2 (patch) | |
tree | bb3effb35a2e0047d5191d8777121d37a6a276d5 /wiretap/ipfix.c | |
parent | a75d7209f56e576ef2146026dd791d81acb1fc0b (diff) | |
download | wireshark-9787a5734a75c813891ea1eba9ef8998e91ad9b2.tar.gz wireshark-9787a5734a75c813891ea1eba9ef8998e91ad9b2.tar.bz2 wireshark-9787a5734a75c813891ea1eba9ef8998e91ad9b2.zip |
From Hadriel Kaplan: IPFIX file format support.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5242
svn path=/trunk/; revision=34576
Diffstat (limited to 'wiretap/ipfix.c')
-rw-r--r-- | wiretap/ipfix.c | 326 |
1 files changed, 326 insertions, 0 deletions
diff --git a/wiretap/ipfix.c b/wiretap/ipfix.c new file mode 100644 index 0000000000..5e15c1f1bc --- /dev/null +++ b/wiretap/ipfix.c @@ -0,0 +1,326 @@ +/* ipfix.c + * + * $Id$ + * + * Wiretap Library + * Copyright (c) 1998 by Gilbert Ramirez <gram@alumni.rice.edu> + * + * File format support for ipfix file format + * Copyright (c) 2010 by Hadriel Kaplan <hadrielk@yahoo.com> + * with generous copying from other wiretaps, such as pcapng + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + */ + +/* File format reference: + * RFC 5655 and 5101 + * http://tools.ietf.org/rfc/rfc5655 + * http://tools.ietf.org/rfc/rfc5101 + * + * This wiretap is for an ipfix file format reader, per RFC 5655/5101. + * All "records" in the file are IPFIX messages, beginning with an IPFIX + * message header of 16 bytes as follows from RFC 5101: + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Version Number | Length | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Export Time | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Sequence Number | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Observation Domain ID | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Figure F: IPFIX Message Header Format + + * which is then followed by one or more "Sets": Data Sets, Template Sets, + * and Options Template Sets. Each Set then has one or more Records in + * it. + * + * All IPFIX files are recorded in big-endian form (network byte order), + * per the RFCs. That means if we're on a little-endian system, all + * hell will break loose if we don't g_ntohX. + * + * Since wireshark already has an IPFIX dissector (implemented in + * packet-netflow.c), this reader will just set that dissector upon + * reading each message. Thus, an IPFIX Message is treated as a packet + * as far as the dissector is concerned. + */ + +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif + +#include <stdlib.h> +#include <string.h> +#include <errno.h> +#include "wtap-int.h" +#include "file_wrappers.h" +#include "buffer.h" +#include "libpcap.h" +#include "pcap-common.h" +#include "pcap-encap.h" +#include "ipfix.h" + +#if 0 +#define ipfix_debug0(str) g_warning(str) +#define ipfix_debug1(str,p1) g_warning(str,p1) +#define ipfix_debug2(str,p1,p2) g_warning(str,p1,p2) +#define ipfix_debug3(str,p1,p2,p3) g_warning(str,p1,p2,p3) +#else +#define ipfix_debug0(str) +#define ipfix_debug1(str,p1) +#define ipfix_debug2(str,p1,p2) +#define ipfix_debug3(str,p1,p2,p3) +#endif + +static gboolean +ipfix_read(wtap *wth, int *err, gchar **err_info, + gint64 *data_offset); +static gboolean +ipfix_seek_read(wtap *wth, gint64 seek_off, + union wtap_pseudo_header *pseudo_header, guchar *pd, int length, + int *err, gchar **err_info); +static void +ipfix_close(wtap *wth); + +#define IPFIX_VERSION 10 + +/* ipfix: message header */ +typedef struct ipfix_message_header_s { + guint16 version; + guint16 message_length; + guint32 export_time_secs; + guint32 sequence_number; + guint32 observation_id; /* might be 0 for none */ + /* x bytes msg_body */ +} ipfix_message_header_t; +#define IPFIX_MSG_HDR_SIZE 16 + +/* ipfix: common Set header for every Set type */ +typedef struct ipfix_set_header_s { + guint16 set_type; + guint16 set_length; + /* x bytes set_body */ +} ipfix_set_header_t; +#define IPFIX_SET_HDR_SIZE 4 + + +/* Read IPFIX message header from file. Return true on success. Set *err to + * 0 on EOF, any other value for "real" errors (EOF is ok, since return + * value is still FALSE) + */ + static gboolean +ipfix_read_message_header(ipfix_message_header_t *pfx_hdr, FILE_T fh, int *err, gchar **err_info) +{ + wtap_file_read_expected_bytes(pfx_hdr, IPFIX_MSG_HDR_SIZE, fh, err); + + /* fix endianess, because IPFIX files are always big-endian */ + pfx_hdr->version = g_ntohs(pfx_hdr->version); + pfx_hdr->message_length = g_ntohs(pfx_hdr->message_length); + pfx_hdr->export_time_secs = g_ntohl(pfx_hdr->export_time_secs); + pfx_hdr->sequence_number = g_ntohl(pfx_hdr->sequence_number); + pfx_hdr->observation_id = g_ntohl(pfx_hdr->observation_id); + + /* is the version number one we expect? */ + if (pfx_hdr->version != IPFIX_VERSION) { + /* Not an ipfix file. */ + *err = WTAP_ERR_BAD_RECORD; + return FALSE; + } + + if (pfx_hdr->message_length < 16) { + *err_info = g_strdup_printf("ipfix: message length %u is too short", pfx_hdr->message_length); + *err = WTAP_ERR_BAD_RECORD; + return FALSE; + } + + /* go back to before header */ + if (file_seek(fh, 0 - IPFIX_MSG_HDR_SIZE, SEEK_CUR, err) == -1) { + ipfix_debug0("ipfix_read: couldn't go back in file before header"); + return FALSE; + } + + return TRUE; +} + + + +/* classic wtap: open capture file. Return 1 on success, 0 on normal failure + * like malformed format, -1 on bad error like file system + */ +int +ipfix_open(wtap *wth, int *err, gchar **err_info) +{ + gint i, n, records_for_ipfix_check = RECORDS_FOR_IPFIX_CHECK; + gchar *s; + guint16 checked_len = 0; + ipfix_message_header_t msg_hdr; + ipfix_set_header_t set_hdr; + + ipfix_debug0("ipfix_open: opening file"); + + /* number of records to scan before deciding if this really is ERF */ + if ((s = getenv("IPFIX_RECORDS_TO_CHECK")) != NULL) { + if ((n = atoi(s)) > 0 && n < 101) { + records_for_ipfix_check = n; + } + } + + /* + * IPFIX is a little hard because there's no magic number; we look at + * the first few records and see if they look enough like IPFIX + * records. + */ + for (i = 0; i < records_for_ipfix_check; i++) { + /* read first message header to check version */ + if (!ipfix_read_message_header(&msg_hdr, wth->fh, err, err_info)) { + ipfix_debug2("ipfix_open: couldn't read message header #%d with err code #%d", + i, *err); + if (*err == WTAP_ERR_BAD_RECORD) return 0; + if (*err != 0) return -1; /* real failure */ + /* else it's EOF */ + if (i < 1) { + /* we haven't seen enough to prove this is a ipfix file */ + return 0; + } + /* if we got here, it's EOF and we think it's an ipfix file */ + break; + } + if (file_seek(wth->fh, IPFIX_MSG_HDR_SIZE, SEEK_CUR, err) == -1) { + ipfix_debug1("ipfix_open: failed seek to next message in file, %d bytes away", + msg_hdr.message_length); + return 0; + } + checked_len = IPFIX_MSG_HDR_SIZE; + + /* check each Set in IPFIX Message for sanity */ + while (checked_len < msg_hdr.message_length) { + wtap_file_read_expected_bytes(&set_hdr, IPFIX_SET_HDR_SIZE, wth->fh, err); + set_hdr.set_length = g_ntohs(set_hdr.set_length); + if ((set_hdr.set_length < IPFIX_SET_HDR_SIZE) || + ((set_hdr.set_length + checked_len) > msg_hdr.message_length)) { + ipfix_debug1("ipfix_open: found invalid set_length of %d", + set_hdr.set_length); + return 0; + } + + if (file_seek(wth->fh, set_hdr.set_length - IPFIX_SET_HDR_SIZE, + SEEK_CUR, err) == -1) + { + ipfix_debug1("ipfix_open: failed seek to next set in file, %d bytes away", + set_hdr.set_length - IPFIX_SET_HDR_SIZE); + return 0; + } + checked_len += set_hdr.set_length; + } + } + + /* all's good, this is a IPFIX file */ + wth->file_encap = WTAP_ENCAP_RAW_IPFIX; + wth->snapshot_length = 0; + wth->tsprecision = WTAP_FILE_TSPREC_SEC; + wth->subtype_read = ipfix_read; + wth->subtype_seek_read = ipfix_seek_read; + wth->subtype_close = ipfix_close; + wth->file_type = WTAP_FILE_IPFIX; + + /* go back to beginning of file */ + if (file_seek (wth->fh, 0, SEEK_SET, err) != 0) + { + return -1; + } + return 1; +} + + +/* classic wtap: read packet */ +static gboolean +ipfix_read(wtap *wth, int *err, gchar **err_info, gint64 *data_offset) +{ + ipfix_message_header_t msg_hdr; + + ipfix_debug1("ipfix_read: wth->data_offset is initially %" G_GINT64_MODIFIER "u", wth->data_offset); + *data_offset = wth->data_offset; + + if (!ipfix_read_message_header(&msg_hdr, wth->fh, err, err_info)) { + ipfix_debug2("ipfix_read: couldn't read message header with code: %d\n, and error '%s'", + *err, *err_info); + return FALSE; + } + + buffer_assure_space(wth->frame_buffer, msg_hdr.message_length); + wtap_file_read_expected_bytes(buffer_start_ptr(wth->frame_buffer), + msg_hdr.message_length, wth->fh, err); + + wth->phdr.len = msg_hdr.message_length; + wth->phdr.caplen = msg_hdr.message_length; + wth->phdr.ts.secs = 0; + wth->phdr.ts.nsecs = 0; + + /*ipfix_debug2("Read length: %u Packet length: %u", msg_hdr.message_length, wth->phdr.caplen);*/ + wth->data_offset += msg_hdr.message_length; + ipfix_debug1("ipfix_read: wth->data_offset is finally %" G_GINT64_MODIFIER "u", wth->data_offset); + + return TRUE; +} + + +/* classic wtap: seek to file position and read packet */ +static gboolean +ipfix_seek_read(wtap *wth, gint64 seek_off, + union wtap_pseudo_header *pseudo_header, guchar *pd, int length _U_, + int *err, gchar **err_info) +{ + ipfix_message_header_t msg_hdr; + + (void) pseudo_header; /* avoids compiler warning about unused variable */ + + /* seek to the right file position */ + if (file_seek(wth->random_fh, seek_off, SEEK_SET, err) == -1) { + ipfix_debug2("ipfix_seek_read: couldn't read message header with code: %d\n, and error '%s'", + *err, *err_info); + return FALSE; /* Seek error */ + } + + ipfix_debug1("ipfix_seek_read: reading at offset %" G_GINT64_MODIFIER "u", seek_off); + + if (!ipfix_read_message_header(&msg_hdr, wth->random_fh, err, err_info)) { + ipfix_debug0("ipfix_read: couldn't read message header"); + return FALSE; + } + + if(length != (int)msg_hdr.message_length) { + *err = WTAP_ERR_BAD_RECORD; + *err_info = g_strdup_printf("ipfix: record length %u doesn't match requested length %d", + msg_hdr.message_length, length); + ipfix_debug1("ipfix_seek_read: %s", *err_info); + return FALSE; + } + + wtap_file_read_expected_bytes(pd, length, wth->random_fh, err); + + return TRUE; +} + + +/* classic wtap: close capture file */ +static void +ipfix_close(wtap *wth _U_) +{ + ipfix_debug0("ipfix_close: closing file"); +} + |