summaryrefslogtreecommitdiffstats
path: root/services.cc
diff options
context:
space:
mode:
Diffstat (limited to 'services.cc')
-rw-r--r--services.cc527
1 files changed, 527 insertions, 0 deletions
diff --git a/services.cc b/services.cc
new file mode 100644
index 0000000..2a709dc
--- /dev/null
+++ b/services.cc
@@ -0,0 +1,527 @@
+
+/***************************************************************************
+ * services.cc -- Various functions relating to reading the nmap-services *
+ * file and port <-> service mapping *
+ * *
+ ***********************IMPORTANT NMAP LICENSE TERMS************************
+ *
+ * The Nmap Security Scanner is (C) 1996-2023 Nmap Software LLC ("The Nmap
+ * Project"). Nmap is also a registered trademark of the Nmap Project.
+ *
+ * This program is distributed under the terms of the Nmap Public Source
+ * License (NPSL). The exact license text applying to a particular Nmap
+ * release or source code control revision is contained in the LICENSE
+ * file distributed with that version of Nmap or source code control
+ * revision. More Nmap copyright/legal information is available from
+ * https://nmap.org/book/man-legal.html, and further information on the
+ * NPSL license itself can be found at https://nmap.org/npsl/ . This
+ * header summarizes some key points from the Nmap license, but is no
+ * substitute for the actual license text.
+ *
+ * Nmap is generally free for end users to download and use themselves,
+ * including commercial use. It is available from https://nmap.org.
+ *
+ * The Nmap license generally prohibits companies from using and
+ * redistributing Nmap in commercial products, but we sell a special Nmap
+ * OEM Edition with a more permissive license and special features for
+ * this purpose. See https://nmap.org/oem/
+ *
+ * If you have received a written Nmap license agreement or contract
+ * stating terms other than these (such as an Nmap OEM license), you may
+ * choose to use and redistribute Nmap under those terms instead.
+ *
+ * The official Nmap Windows builds include the Npcap software
+ * (https://npcap.com) for packet capture and transmission. It is under
+ * separate license terms which forbid redistribution without special
+ * permission. So the official Nmap Windows builds may not be redistributed
+ * without special permission (such as an Nmap OEM license).
+ *
+ * Source is provided to this software because we believe users have a
+ * right to know exactly what a program is going to do before they run it.
+ * This also allows you to audit the software for security holes.
+ *
+ * Source code also allows you to port Nmap to new platforms, fix bugs, and add
+ * new features. You are highly encouraged to submit your changes as a Github PR
+ * or by email to the dev@nmap.org mailing list for possible incorporation into
+ * the main distribution. Unless you specify otherwise, it is understood that
+ * you are offering us very broad rights to use your submissions as described in
+ * the Nmap Public Source License Contributor Agreement. This is important
+ * because we fund the project by selling licenses with various terms, and also
+ * because the inability to relicense code has caused devastating problems for
+ * other Free Software projects (such as KDE and NASM).
+ *
+ * The free version of Nmap is distributed in the hope that it will be
+ * useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Warranties,
+ * indemnification and commercial support are all available through the
+ * Npcap OEM program--see https://nmap.org/oem/
+ *
+ ***************************************************************************/
+
+/* $Id$ */
+
+#include "scan_lists.h"
+#include "services.h"
+#include "protocols.h"
+#include "NmapOps.h"
+#include "string_pool.h"
+#include "nmap_error.h"
+#include "utils.h"
+
+#include <list>
+#include <map>
+#include <iterator>
+#include <algorithm>
+
+/* This structure is the key for looking up services in the
+ port/proto -> service map. */
+union port_spec {
+ struct {
+ u16 portno;
+ u16 proto;
+ } p;
+ u32 compval;
+};
+
+/* This is a nservent augmented by a frequency ratio. */
+struct service_node : public nservent {
+public:
+ double ratio;
+};
+
+/* Compare the ratios of two service nodes for top-ports purposes. Larger ratios
+ come before smaller. */
+bool service_node_ratio_compare(const service_node& a, const service_node& b) {
+ return a.ratio > b.ratio;
+}
+
+extern NmapOps o;
+static int numtcpports;
+static int numudpports;
+static int numsctpports;
+typedef std::map<u32, service_node> ServiceMap;
+static ServiceMap service_table;
+static std::list<service_node> services_by_ratio;
+static int services_initialized;
+static int ratio_format; // 0 = /etc/services no-ratio format. 1 = new nmap format
+
+static int nmap_services_init() {
+ if (services_initialized) return 0;
+
+ char filename[512];
+ FILE *fp;
+ char servicename[128] = { 0 }, proto[16] = { 0 };
+ u16 portno;
+ const char *p;
+ char line[1024];
+ int lineno = 0;
+ int res;
+ double ratio;
+ int ratio_n, ratio_d;
+ char ratio_str[32] = { 0 };
+
+ numtcpports = 0;
+ numudpports = 0;
+ numsctpports = 0;
+ service_table.clear();
+ services_by_ratio.clear();
+ ratio_format = 0;
+
+ if (nmap_fetchfile(filename, sizeof(filename), "nmap-services") != 1) {
+ error("Unable to find nmap-services! Resorting to /etc/services");
+#ifndef WIN32
+ strcpy(filename, "/etc/services");
+#else
+ int len = GetSystemDirectory(filename, 480); // be safe
+ if(!len)
+ fatal("GetSystemDirectory failed (%d) @#!#@", GetLastError());
+ else
+ strcpy(filename + len, "\\drivers\\etc\\services");
+#endif
+ }
+
+ fp = fopen(filename, "r");
+ if (!fp) {
+ pfatal("Unable to open %s for reading service information", filename);
+ }
+ /* Record where this data file was found. */
+ o.loaded_data_files["nmap-services"] = filename;
+
+ while(fgets(line, sizeof(line), fp)) {
+ lineno++;
+ p = line;
+ while(*p && isspace((int) (unsigned char) *p))
+ p++;
+ if (*p == '#')
+ continue;
+
+ res = sscanf(line, "%127s %hu/%15s %31s", servicename, &portno, proto, ratio_str);
+
+ if (res == 3) {
+ ratio = 0;
+ } else if (res == 4) {
+ if (strchr(ratio_str, '/')) {
+ res = sscanf(ratio_str, "%d/%d", &ratio_n, &ratio_d);
+ if (res != 2)
+ fatal("%s:%d contains invalid port ratio string: %s", filename, lineno, ratio_str);
+
+ if (ratio_n < 0 || ratio_d < 0)
+ fatal("%s:%d contains an invalid negative value", filename, lineno);
+
+ if (ratio_n > ratio_d)
+ fatal("%s:%d has a ratio %g. All ratios must be < 1", filename, lineno, (double)ratio_n/ratio_d);
+
+ if (ratio_d == 0)
+ fatal("%s:%d has a ratio denominator of 0 causing a division by 0 error", filename, lineno);
+
+ ratio = (double)ratio_n / ratio_d;
+ ratio_format = 1;
+ } else if (strncmp(ratio_str, "0.", 2) == 0) {
+ /* We assume the ratio is in floating point notation already */
+ ratio = strtod(ratio_str, NULL);
+ ratio_format = 1;
+ } else {
+ ratio = 0;
+ }
+ } else {
+ continue;
+ }
+
+ // lowercase in-place
+ *(u32 *)proto = (*(u32 *)proto) | 0x20202020;
+ if (proto[3] == 0x20) proto[3] = '\0';
+ const struct nprotoent *npe = nmap_getprotbyname(proto);
+ int *port_count = NULL;
+ switch (npe ? npe->p_proto : -1) {
+ case IPPROTO_TCP:
+ port_count = &numtcpports;
+ break;
+ case IPPROTO_UDP:
+ port_count = &numudpports;
+ break;
+ case IPPROTO_SCTP:
+ port_count = &numsctpports;
+ break;
+ default:
+ // ignore a few known protos from system services files
+ if (o.debugging
+ && strncasecmp(proto, "ddp", 3) != 0
+ /* ddp is some apple thing...we don't "do" that */
+ && strncasecmp(proto, "divert", 6) != 0
+ /* divert sockets are for freebsd's natd */
+ && proto[0] != '#') /* possibly misplaced comment, but who cares? */
+ {
+ error("Unknown protocol (%s) on line %d of services file %s.", proto, lineno, filename);
+ }
+ continue;
+ break;
+ }
+
+ port_spec ps;
+ ps.p.portno = portno;
+ ps.p.proto = npe->p_proto;
+
+
+ struct service_node sn;
+
+ if (strcmp(servicename, "unknown") == 0) {
+ // there are a ton (15K+) of ports in our db with this service name, and
+ // we already write "unknown" if this is NULL, so don't bother allocating
+ // space for it.
+ sn.s_name = NULL;
+ }
+ else {
+ sn.s_name = string_pool_insert(servicename);
+ }
+ sn.s_port = portno;
+ sn.s_proto = npe->p_name;
+ sn.ratio = ratio;
+
+ std::pair<ServiceMap::iterator, bool> status = service_table.insert(
+ ServiceMap::value_type(ps.compval, sn));
+
+ if (!status.second) {
+ if (o.debugging > 1) {
+ error("Port %d proto %s is duplicated in services file %s", portno, proto, filename);
+ }
+ continue;
+ }
+ /* Now we make sure our service table doesn't have duplicates */
+
+ *port_count += 1;
+
+ services_by_ratio.push_back(sn);
+ }
+
+ /* Sort the list of ports sorted by frequency for top-ports purposes. */
+ services_by_ratio.sort(service_node_ratio_compare);
+
+ fclose(fp);
+ services_initialized = 1;
+ return 0;
+}
+
+void free_services() {
+ /* This doesn't free anything, because the service_table is allocated
+ statically. It just marks the table as needing to be reinitialized because
+ other things have been freed, for example the cp_strdup-allocated members
+ of service_node. */
+ services_initialized = 0;
+}
+
+
+/* Adds ports whose names match mask and one or more protocols
+ * specified by range_type to porttbl. Increases the respective
+ * protocol counts in ports.
+ * Returns the number of ports added in total.
+ */
+
+int addportsfromservmask(const char *mask, u8 *porttbl, int range_type) {
+ ServiceMap::const_iterator i;
+ const char *name = NULL;
+ int t = 0;
+
+ if (!services_initialized && nmap_services_init() == -1)
+ fatal("%s: Couldn't get port numbers", __func__);
+
+ for (i = service_table.begin(); i != service_table.end(); i++) {
+ const service_node& current = i->second;
+ if (!current.s_name)
+ name = "unknown";
+ else
+ name = current.s_name;
+ if (wildtest(mask, name)) {
+ if ((range_type & SCAN_TCP_PORT) && strcmp(current.s_proto, "tcp") == 0) {
+ porttbl[current.s_port] |= SCAN_TCP_PORT;
+ t++;
+ }
+ if ((range_type & SCAN_UDP_PORT) && strcmp(current.s_proto, "udp") == 0) {
+ porttbl[current.s_port] |= SCAN_UDP_PORT;
+ t++;
+ }
+ if ((range_type & SCAN_SCTP_PORT) && strcmp(current.s_proto, "sctp") == 0) {
+ porttbl[current.s_port] |= SCAN_SCTP_PORT;
+ t++;
+ }
+ }
+ }
+
+ return t;
+}
+
+
+
+const struct nservent *nmap_getservbyport(u16 port, u16 proto) {
+ ServiceMap::const_iterator i;
+ port_spec ps;
+
+ if (nmap_services_init() == -1)
+ return NULL;
+
+ ps.p.portno = port;
+ ps.p.proto = proto;
+ i = service_table.find(ps.compval);
+ if (i != service_table.end())
+ return &i->second;
+
+ /* Couldn't find it ... oh well. */
+ return NULL;
+}
+
+
+
+static int port_compare(const void *a, const void *b) {
+ unsigned short ua = *((unsigned short *) a), ub = *((unsigned short *) b);
+ if (ua > ub) return 1;
+ else return -1;
+}
+
+
+template <typename T>
+class C_array_iterator: public std::iterator<std::random_access_iterator_tag, T, std::ptrdiff_t> {
+ T *ptr;
+ public:
+ C_array_iterator(T *_ptr=NULL) : ptr(_ptr) {}
+ C_array_iterator(const C_array_iterator &other) : ptr(other.ptr) {}
+ C_array_iterator& operator=(T *_ptr) {ptr = _ptr; return *this;}
+ C_array_iterator& operator++() {ptr++; return *this;}
+ C_array_iterator operator++(int) {C_array_iterator retval = *this; ++(*this); return retval;}
+ C_array_iterator& operator--() {ptr--; return *this;}
+ C_array_iterator operator--(int) {C_array_iterator retval = *this; --(*this); return retval;}
+ bool operator==(const C_array_iterator &other) const {return ptr == other.ptr;}
+ bool operator!=(const C_array_iterator &other) const {return !(*this == other);}
+ bool operator<(const C_array_iterator &other) const {return ptr < other.ptr;}
+ C_array_iterator& operator+=(std::ptrdiff_t n) {ptr += n; return *this;}
+ C_array_iterator& operator-=(std::ptrdiff_t n) {ptr -= n; return *this;}
+ std::ptrdiff_t operator+(const C_array_iterator &other) {return ptr + other.ptr;}
+ std::ptrdiff_t operator-(const C_array_iterator &other) {return ptr - other.ptr;}
+ T& operator*() const {return *ptr;}
+};
+
+// is_port_member() returns true if serv->s_port is an element of pts.
+static bool is_port_member(unsigned short *pts, int count, const struct service_node *serv) {
+ C_array_iterator<unsigned short> begin = pts;
+ C_array_iterator<unsigned short> end = pts + count;
+ return std::binary_search(begin, end, serv->s_port);
+}
+
+// gettoppts() sets its third parameter, a scan_list, with the most
+// common ports scanned by Nmap according to the ratios specified in
+// the nmap-services file.
+//
+// If level is below 1.0 then we treat it as a minimum ratio and we
+// add all ports with ratios above level.
+//
+// If level is 1 or above, we treat it as a "top ports" directive
+// and return the N highest ratio ports (where N==level).
+//
+// If the fourth parameter is not NULL, then the specified ports
+// are excluded first and only then are the top N ports taken
+//
+// This function doesn't support IP protocol scan so only call this
+// function if o.TCPScan() || o.UDPScan() || o.SCTPScan()
+
+void gettoppts(double level, const char *portlist, struct scan_lists * ports, const char *exclude_ports) {
+ struct scan_lists ptsdata = { 0 };
+ bool ptsdata_initialized = false;
+ const struct service_node *current;
+ std::list<service_node>::const_iterator i;
+
+ if (!services_initialized && nmap_services_init() == -1)
+ fatal("%s: Couldn't get port numbers", __func__);
+
+ if (ratio_format == 0) {
+ if (level != -1)
+ fatal("Unable to use --top-ports or --port-ratio with an old style (no-ratio) services file");
+
+ if (portlist){
+ getpts(portlist, ports);
+ return;
+ }else if (o.fastscan){
+ getpts("[-]", ports);
+ return;
+ }else{
+ getpts("1-1024,[1025-]", ports);
+ return;
+ }
+ }
+
+ // TOP PORT DEFAULTS
+ if (level == -1) {
+ if (portlist){
+ getpts(portlist, ports);
+ return;
+ }
+ if (o.fastscan) level = 100;
+ else level = 1000;
+ }
+
+ if (portlist){
+ getpts(portlist, &ptsdata);
+ ptsdata_initialized = true;
+ } else if (exclude_ports) {
+ getpts("-", &ptsdata);
+ ptsdata_initialized = true;
+ }
+
+ if (ptsdata_initialized && exclude_ports)
+ removepts(exclude_ports, &ptsdata);
+
+ /* Max number of ports for each protocol cannot be more than the minimum of:
+ * 1. all of them (65536)
+ * 2. requested ports (ptsdata)
+ * 3. the number in services db (numXXXports)
+ */
+ int tcpmax = o.TCPScan() ? (ptsdata_initialized ? ptsdata.tcp_count : 65536) : 0;
+ tcpmax = MIN(tcpmax, numtcpports);
+ int udpmax = o.UDPScan() ? (ptsdata_initialized ? ptsdata.udp_count : 65536) : 0;
+ udpmax = MIN(udpmax, numudpports);
+ int sctpmax = o.SCTPScan() ? (ptsdata_initialized ? ptsdata.sctp_count : 65536) : 0;
+ sctpmax = MIN(sctpmax, numsctpports);
+
+ // If level is positive integer, it's the max number of ports.
+ if (level >= 1) {
+ if (level > 65536)
+ fatal("Level argument to gettoppts (%g) is too large", level);
+ tcpmax = MIN((int) level, tcpmax);
+ udpmax = MIN((int) level, udpmax);
+ sctpmax = MIN((int) level, sctpmax);
+ // Now force the ratio comparison to always be true:
+ level = 0;
+ }
+ else if (level <= 0) {
+ fatal("Argument to gettoppts (%g) should be a positive ratio below 1 or an integer of 1 or higher", level);
+ }
+ // else level is a ratio between 0 and 1
+
+ // These could be 0/false if the scan type was not requested.
+ if (tcpmax) {
+ ports->tcp_ports = (unsigned short *)safe_zalloc(tcpmax * sizeof(unsigned short));
+ }
+ if (udpmax) {
+ ports->udp_ports = (unsigned short *)safe_zalloc(udpmax * sizeof(unsigned short));
+ }
+ if (sctpmax) {
+ ports->sctp_ports = (unsigned short *)safe_zalloc(sctpmax * sizeof(unsigned short));
+ }
+
+ ports->prots = NULL;
+
+ // Loop until we get enough or run out of candidates
+ for (i = services_by_ratio.begin(); i != services_by_ratio.end() && (tcpmax || udpmax || sctpmax); i++) {
+ current = &(*i);
+ if (current->ratio < level) {
+ break;
+ }
+ switch (current->s_proto[0]) {
+ case 't':
+ if (tcpmax && strcmp(current->s_proto, "tcp") == 0
+ && (!ptsdata_initialized ||
+ is_port_member(ptsdata.tcp_ports, ptsdata.tcp_count, current))
+ ) {
+ ports->tcp_ports[ports->tcp_count++] = current->s_port;
+ tcpmax--;
+ }
+ break;
+ case 'u':
+ if (udpmax && strcmp(current->s_proto, "udp") == 0
+ && (!ptsdata_initialized ||
+ is_port_member(ptsdata.udp_ports, ptsdata.udp_count, current))
+ ) {
+ ports->udp_ports[ports->udp_count++] = current->s_port;
+ udpmax--;
+ }
+ break;
+ case 's':
+ if (sctpmax && strcmp(current->s_proto, "sctp") == 0
+ && (!ptsdata_initialized ||
+ is_port_member(ptsdata.sctp_ports, ptsdata.sctp_count, current))
+ ) {
+ ports->sctp_ports[ports->sctp_count++] = current->s_port;
+ sctpmax--;
+ }
+ break;
+ default:
+ break;
+ }
+ }
+
+ if (ptsdata_initialized) {
+ free_scan_lists(&ptsdata);
+ ptsdata_initialized = false;
+ }
+
+ if (ports->tcp_count > 1)
+ qsort(ports->tcp_ports, ports->tcp_count, sizeof(unsigned short), &port_compare);
+
+ if (ports->udp_count > 1)
+ qsort(ports->udp_ports, ports->udp_count, sizeof(unsigned short), &port_compare);
+
+ if (ports->sctp_count > 1)
+ qsort(ports->sctp_ports, ports->sctp_count, sizeof(unsigned short), &port_compare);
+
+ if (o.debugging && level < 1)
+ log_write(LOG_STDOUT, "PORTS: Using ports open on %g%% or more average hosts (TCP:%d, UDP:%d, SCTP:%d)\n", level*100, ports->tcp_count, ports->udp_count, ports->sctp_count);
+ else if (o.debugging && level >= 1)
+ log_write(LOG_STDOUT, "PORTS: Using top %d ports found open (TCP:%d, UDP:%d, SCTP:%d)\n", (int) level, ports->tcp_count, ports->udp_count, ports->sctp_count);
+}