diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-10 20:34:10 +0000 |
commit | e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch) | |
tree | 68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-dhcp-failover.c | |
parent | Initial commit. (diff) | |
download | wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip |
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-dhcp-failover.c')
-rw-r--r-- | epan/dissectors/packet-dhcp-failover.c | 1533 |
1 files changed, 1533 insertions, 0 deletions
diff --git a/epan/dissectors/packet-dhcp-failover.c b/epan/dissectors/packet-dhcp-failover.c new file mode 100644 index 00000000..a9966d0e --- /dev/null +++ b/epan/dissectors/packet-dhcp-failover.c @@ -0,0 +1,1533 @@ +/* packet-dhcpfo.c + * Routines for ISC DHCP Server failover protocol dissection + * Copyright 2004, M. Ortega y Strupp <moys@loplof.de> + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +/* + * This implementation is loosely based on draft-ietf-dhc-failover-07.txt. + * As this document does not represent the actual implementation, the + * source code of ISC DHCPD 3.0 was used too. + * + * See also + * + * https://tools.ietf.org/html/draft-ietf-dhc-failover-10 + * + * upon which the handling of the message-digest option is based. + * + * Updated to https://tools.ietf.org/html/draft-ietf-dhc-failover-12, July 2020 + * + * Updated with Microsoft DHCP Failover Protocol Extension in August 2023: + * https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-dhcpf/380744f9-17ed-4aef-8810-ef08d1e70932 + */ + +#include "config.h" + +#include <epan/packet.h> +#include <epan/strutil.h> +#include <epan/prefs.h> +#include <epan/expert.h> +#include <epan/to_str.h> + +#include "packet-arp.h" +#include "packet-tcp.h" + +#define TCP_PORT_DHCPFO 647 /* Not IANA registered */ + +void proto_register_dhcpfo(void); +void proto_reg_handoff_dhcpfo(void); + +static dissector_handle_t dhcpfo_handle; + +/* desegmentation of DHCP failover over TCP */ +static gboolean dhcpfo_desegment = TRUE; + +/* enum preference to interpret Microsoft-formatted fields correctly */ +#define AUTODETECT_MS_DHCP 0 +#define DISSECT_IEFT_DRAFT 1 +#define DISSECT_MS_DHCP 2 +static const enum_val_t microsoft_compatibility[] = { + { "autodetect_ms_dhcp", "Autodetect Microsoft Windows DHCP server", AUTODETECT_MS_DHCP }, + { "dissect_ietf_draft", "Dissect using IETF draft 12 specifications", DISSECT_IEFT_DRAFT }, + { "dissect_ms_dhcp", "Dissect using Microsoft-style formatting", DISSECT_MS_DHCP }, + { NULL, NULL, 0 } +}; +static int dhcpfo_microsoft_compatibility = AUTODETECT_MS_DHCP; + +/* Initialize the protocol and registered fields */ +static int proto_dhcpfo = -1; +static int hf_dhcpfo_length = -1; +static int hf_dhcpfo_type = -1; +static int hf_dhcpfo_poffset = -1; +static int hf_dhcpfo_time = -1; +static int hf_dhcpfo_xid = -1; +static int hf_dhcpfo_additional_HB = -1; +static int hf_dhcpfo_payload_data = -1; +static int hf_dhcpfo_option_code = -1; +static int hf_dhcpfo_dhcp_style_option = -1; +static int hf_dhcpfo_option_length = -1; +static int hf_dhcpfo_binding_status = -1; +static int hf_dhcpfo_server_state = -1; +static int hf_dhcpfo_assigned_ip_address = -1; +static int hf_dhcpfo_delayed_service_parameter = -1; +static int hf_dhcpfo_addresses_transferred = -1; +static int hf_dhcpfo_client_identifier = -1; +static int hf_dhcpfo_client_hw_type = -1; +static int hf_dhcpfo_client_hardware_address = -1; +static int hf_dhcpfo_ftddns = -1; +static int hf_dhcpfo_reject_reason = -1; +static int hf_dhcpfo_relationship_name = -1; +static int hf_dhcpfo_message = -1; +static int hf_dhcpfo_mclt = -1; +static int hf_dhcpfo_vendor_class = -1; +static int hf_dhcpfo_lease_expiration_time = -1; +static int hf_dhcpfo_potential_expiration_time = -1; +static int hf_dhcpfo_client_last_transaction_time = -1; +static int hf_dhcpfo_start_time_of_state = -1; +static int hf_dhcpfo_vendor_option = -1; +static int hf_dhcpfo_max_unacked_bndupd = -1; +static int hf_dhcpfo_protocol_version = -1; +static int hf_dhcpfo_receive_timer = -1; +static int hf_dhcpfo_message_digest = -1; +static int hf_dhcpfo_ipflags = -1; +static int hf_dhcpfo_ipflags_reserved = -1; +static int hf_dhcpfo_ipflags_bootp = -1; +static int hf_dhcpfo_ipflags_mbz = -1; +static int hf_dhcpfo_hash_bucket_assignment = -1; +static int hf_dhcpfo_message_digest_type = -1; +static int hf_dhcpfo_tls_request = -1; +static int hf_dhcpfo_tls_reply = -1; +static int hf_dhcpfo_serverflag = -1; +static int hf_dhcpfo_options = -1; +static int hf_dhcpfo_ms_client_name = -1; +static int hf_dhcpfo_ms_client_description = -1; +static int hf_dhcpfo_ms_client_type = -1; +static int hf_dhcpfo_ms_client_nap_status = -1; +static int hf_dhcpfo_ms_client_nap_capable = -1; +static int hf_dhcpfo_ms_client_nap_probation = -1; +static int hf_dhcpfo_ms_client_matched_policy = -1; +static int hf_dhcpfo_ms_server_name = -1; +static int hf_dhcpfo_ms_server_ip = -1; +static int hf_dhcpfo_ms_client_scope = -1; +static int hf_dhcpfo_ms_client_subnet_mask = -1; +static int hf_dhcpfo_ms_scope_id = -1; +static int hf_dhcpfo_ms_ipflags = -1; +static int hf_dhcpfo_ms_extended_address_state = -1; +static int hf_dhcpfo_infoblox_client_hostname = -1; +static int hf_dhcpfo_unknown_data = -1; + +/* Initialize the subtree pointers */ +static gint ett_dhcpfo = -1; +static gint ett_fo_payload = -1; +static gint ett_fo_option = -1; +static gint ett_fo_payload_data = -1; + +static expert_field ei_dhcpfo_bad_length = EI_INIT; +static expert_field ei_dhcpfo_message_digest_type_not_allowed = EI_INIT; + + +/* Length of fixed-length portion of header */ +#define DHCPFO_FL_HDR_LEN 12 + +/* message-types of failover */ + +static const value_string failover_vals[] = +{ + {1, "Pool request"}, + {2, "Pool response"}, + {3, "Binding update"}, + {4, "Binding acknowledge"}, + {5, "Connect"}, + {6, "Connect acknowledge"}, + {7, "Update request"}, + {8, "Update done"}, + {9, "Update request all"}, + {10, "State"}, + {11, "Contact"}, + {12, "Disconnect"}, + {0, NULL} +}; + +/*options of payload-data*/ +#define DHCP_FO_PD_ADDRESSES_TRANSFERRED 1 +#define DHCP_FO_PD_ASSIGNED_IP_ADDRESS 2 +#define DHCP_FO_PD_BINDING_STATUS 3 +#define DHCP_FO_PD_CLIENT_IDENTIFIER 4 +#define DHCP_FO_PD_CLIENT_HARDWARE_ADDRESS 5 +#define DHCP_FO_PD_CLIENT_LAST_TRANSACTION_TIME 6 +#define DHCP_FO_PD_REPLY_OPTION 7 +#define DHCP_FO_PD_REQUEST_OPTION 8 +#define DHCP_FO_PD_FTDDNS 9 +#define DHCP_FO_PD_DELAYED_SERVICE_PARAMETER 10 +#define DHCP_FO_PD_HASH_BUCKET_ASSIGNMENT 11 +#define DHCP_FO_PD_IP_FLAGS 12 +#define DHCP_FO_PD_LEASE_EXPIRATION_TIME 13 +#define DHCP_FO_PD_MAX_UNACKED_BNDUPD 14 +#define DHCP_FO_PD_MCLT 15 +#define DHCP_FO_PD_MESSAGE 16 +#define DHCP_FO_PD_MESSAGE_DIGEST 17 +#define DHCP_FO_PD_POTENTIAL_EXPIRATION_TIME 18 +#define DHCP_FO_PD_RECEIVE_TIMER 19 +#define DHCP_FO_PD_PROTOCOL_VERSION 20 +#define DHCP_FO_PD_REJECT_REASON 21 +#define DHCP_FO_PD_RELATIONSHIP_NAME 22 +#define DHCP_FO_PD_SERVERFLAG 23 +#define DHCP_FO_PD_SERVERSTATE 24 +#define DHCP_FO_PD_START_TIME_OF_STATE 25 +#define DHCP_FO_PD_TLS_REPLY 26 +#define DHCP_FO_PD_TLS_REQUEST 27 +#define DHCP_FO_PD_VENDOR_CLASS 28 +#define DHCP_FO_PD_VENDOR_OPTION 29 +/* Options not defined in the draft */ +#define DHCP_FO_PD_OPTION_30 30 +#define DHCP_FO_PD_OPTION_31 31 +#define DHCP_FO_PD_OPTION_32 32 +#define DHCP_FO_PD_OPTION_33 33 +#define DHCP_FO_PD_OPTION_34 34 +#define DHCP_FO_PD_OPTION_35 35 +#define DHCP_FO_PD_OPTION_36 36 +#define DHCP_FO_PD_OPTION_37 37 +#define DHCP_FO_PD_OPTION_38 38 +#define DHCP_FO_PD_OPTION_39 39 +#define DHCP_FO_PD_OPTION_40 40 +#define DHCP_FO_PD_OPTION_41 41 + + +static const gchar VENDOR_SPECIFIC[] = "(vendor-specific)"; +static const gchar UNKNOWN_OPTION[] = "Unknown Option"; + +static const value_string option_code_vals[] = +{ + {DHCP_FO_PD_ADDRESSES_TRANSFERRED, "addresses-transferred"}, + {DHCP_FO_PD_ASSIGNED_IP_ADDRESS, "assigned-IP-address"}, + {DHCP_FO_PD_BINDING_STATUS, "binding-status"}, + {DHCP_FO_PD_CLIENT_IDENTIFIER, "client-identifier"}, + {DHCP_FO_PD_CLIENT_HARDWARE_ADDRESS, "client-hardware-address"}, + {DHCP_FO_PD_CLIENT_LAST_TRANSACTION_TIME, "client-last-transaction-time"}, + {DHCP_FO_PD_REPLY_OPTION, "reply-option"}, + {DHCP_FO_PD_REQUEST_OPTION, "request-option"}, + {DHCP_FO_PD_FTDDNS, "FTDDNS"}, + {DHCP_FO_PD_DELAYED_SERVICE_PARAMETER, "delayed-service-parameter"}, + {DHCP_FO_PD_HASH_BUCKET_ASSIGNMENT, "hash-bucket-assignment"}, + {DHCP_FO_PD_IP_FLAGS, "IP-flags"}, + {DHCP_FO_PD_LEASE_EXPIRATION_TIME, "lease-expiration-time"}, + {DHCP_FO_PD_MAX_UNACKED_BNDUPD, "max-unacked-BNDUPD"}, + {DHCP_FO_PD_MCLT, "MCLT"}, + {DHCP_FO_PD_MESSAGE, "message"}, + {DHCP_FO_PD_MESSAGE_DIGEST, "message-digest"}, + {DHCP_FO_PD_POTENTIAL_EXPIRATION_TIME, "potential-expiration-time"}, + {DHCP_FO_PD_RECEIVE_TIMER, "receive-timer"}, + {DHCP_FO_PD_PROTOCOL_VERSION, "protocol-version"}, + {DHCP_FO_PD_REJECT_REASON, "reject-reason"}, + {DHCP_FO_PD_RELATIONSHIP_NAME, "relationship-name"}, + {DHCP_FO_PD_SERVERFLAG, "server-flag"}, + {DHCP_FO_PD_SERVERSTATE, "server-state"}, + {DHCP_FO_PD_START_TIME_OF_STATE, "start-time-of-state"}, + {DHCP_FO_PD_TLS_REPLY, "TLS-reply"}, + {DHCP_FO_PD_TLS_REQUEST, "TLS-request"}, + {DHCP_FO_PD_VENDOR_CLASS, "vendor-class"}, + {DHCP_FO_PD_VENDOR_OPTION, "vendor-option"}, + /* Not specified in the draft, further defined in the following arrays: */ + {DHCP_FO_PD_OPTION_30, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_31, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_32, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_33, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_34, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_35, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_36, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_37, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_38, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_39, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_40, VENDOR_SPECIFIC}, + {DHCP_FO_PD_OPTION_41, VENDOR_SPECIFIC}, + {0, NULL} +}; + +/* Used when Microsoft-compatibility is detected/enabled */ +static const value_string microsoft_option_code_vals[] = +{ + {DHCP_FO_PD_OPTION_30, "microsoft-scope-ID-list"}, + {DHCP_FO_PD_OPTION_31, "microsoft-client-name"}, + {DHCP_FO_PD_OPTION_32, "microsoft-client-description"}, + {DHCP_FO_PD_OPTION_33, "microsoft-client-subnet-mask"}, + {DHCP_FO_PD_OPTION_34, "microsoft-server-IP"}, + {DHCP_FO_PD_OPTION_35, "microsoft-server-name"}, + {DHCP_FO_PD_OPTION_36, "microsoft-client-type"}, + {DHCP_FO_PD_OPTION_37, "microsoft-client-NAP-status"}, + {DHCP_FO_PD_OPTION_38, "microsoft-client-NAP-probation"}, + {DHCP_FO_PD_OPTION_39, "microsoft-client-NAP-capable"}, + {DHCP_FO_PD_OPTION_40, "microsoft-client-matched-policy"}, + {DHCP_FO_PD_OPTION_41, "microsoft-extended-address-state"}, + {0, NULL} +}; + +/* Used when Microsoft-compatibility is NOT detected/enabled */ +static const value_string others_option_code_vals[] = +{ + {DHCP_FO_PD_OPTION_30, "infoblox-client-hostname"}, + {0, NULL} +}; + +/* Microsoft client types (option 36) */ + +static const value_string ms_client_type_vals[] = +{ + {0x00, "CLIENT_TYPE_UNSPECIFIED"}, + {0x01, "CLIENT_TYPE_DHCP"}, + {0x02, "CLIENT_TYPE_BOOTP"}, + {0x03, "CLIENT_TYPE_BOTH"}, + {0x04, "CLIENT_TYPE_RESERVATION_FLAG"}, + {0x64, "CLIENT_TYPE_NONE"}, + {0, NULL} +}; + +/* Microsoft client NAP status codes (option 37) */ + +static const value_string ms_client_nap_status_vals[] = +{ + {0x00, "NOQUARANTINE"}, + {0x01, "RESTRICTEDACCESS"}, + {0x02, "DROPPACKET"}, + {0x03, "PROBATION"}, + {0, NULL} +}; + +/* Binding-status */ + +static const value_string binding_status_vals[] = +{ + {1, "FREE"}, + {2, "ACTIVE"}, + {3, "EXPIRED"}, + {4, "RELEASED"}, + {5, "ABANDONED"}, + {6, "RESET"}, + {7, "BACKUP"}, + {0, NULL} + +}; + +/* Server-status */ + +static const value_string server_state_vals[] = +{ + {1, "startup"}, + {2, "normal"}, + {3, "communication interrupted"}, + {4, "partner down"}, + {5, "potential conflict"}, + {6, "recover"}, + {7, "paused"}, + {8, "shutdown"}, + {9, "recover done"}, + {10, "resolution interrupted"}, + {11, "conflict done"}, + {0, NULL} +}; + +/* reject reasons */ +static const value_string reject_reason_vals[] = +{ + {0, "Reserved"}, + {1, "Illegal IP address (not part of any address pool)"}, + {2, "Fatal conflict exists: address in use by other client"}, + {3, "Missing binding information"}, + {4, "Connection rejected, time mismatch too great"}, + {5, "Connection rejected, invalid MCLT"}, + {6, "Connection rejected, unknown reason"}, + {7, "Connection rejected, duplicate connection"}, + {8, "Connection rejected, invalid failover partner"}, + {9, "TLS not supported"}, + {10, "TLS supported but not configured"}, + {11, "TLS required but not supported by partner"}, + {12, "Message digest not supported"}, + {13, "Message digest not configured"}, + {14, "Protocol version mismatch"}, + {15, "Outdated binding information"}, + {16, "Less critical binding information"}, + {17, "No traffic within sufficient time"}, + {18, "Hash bucket assignment conflict"}, + {19, "IP not reserved on this server"}, + {20, "Message digest failed to compare"}, + {21, "Missing message digest."}, + {254, "Unknown: Error occurred but does not match any reason"}, + {0, NULL} +}; + +static const value_string tls_request_vals[] = +{ + {0, "No TLS operation"}, + {1, "TLS operation desired but not required"}, + {2, "TLS operation is required"}, + {0, NULL} +}; + +static const value_string tls_reply_vals[] = +{ + {0, "No TLS operation"}, + {1, "TLS operation is required"}, + {0, NULL} +}; + +static const value_string message_digest_type_vals[] = +{ + {1, "HMAC-MD5"}, + {2, "Microsoft-specific"}, + {0, NULL} +}; + +static const value_string serverflag_vals[] = +{ + {0, "NONE"}, + {1, "STARTUP"}, + {0, NULL} +}; + +/* Code to actually dissect the packets */ +static guint +get_dhcpfo_pdu_len(packet_info *pinfo _U_, tvbuff_t *tvb, int offset, void *data _U_) +{ + /* + * Return the length of the DHCP failover packet. + */ + return tvb_get_ntohs(tvb, offset); +} + +static int +dissect_dhcpfo_pdu(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_) +{ + int offset = 0; + proto_item *ti, *pi, *oi; + proto_tree *dhcpfo_tree = NULL, *payload_tree, *option_tree; + guint8 tls_request, tls_reply; + guint16 length; + guint type, serverflag; + int poffset; + guint32 xid; + nstime_t timex; + guint32 lease_expiration_time, + potential_expiration_time, client_last_transaction_time, + start_time_of_state; + gboolean bogus_poffset, microsoft_style; + guint16 opcode, option_length; + guint8 htype, reject_reason, message_digest_type, binding_status; + const guint8 *vendor_class_str, *relationship_name_str; + const gchar *htype_str, *option_name; + gchar *lease_expiration_time_str, *potential_expiration_time_str, + *client_last_transaction_time_str, *start_time_of_state_str; + guint32 mclt; + guint8 server_state, ms_client_type, ms_client_nap_status, ms_client_nap_capable; + guint32 max_unacked_bndupd, receive_timer, + ms_client_nap_probation, ms_extended_address_state; + const guint8 *client_hostname_str, *ms_server_name_str, *ms_client_description_str, + *ms_client_matched_policy_str; + +/* Make entries in Protocol column and Info column on summary display */ + col_set_str(pinfo->cinfo, COL_PROTOCOL, "DHCPFO"); + col_clear(pinfo->cinfo, COL_INFO); + + length = tvb_get_ntohs(tvb, offset); + if (tree) { + /* create display subtree for the protocol */ + ti = proto_tree_add_item(tree, proto_dhcpfo, tvb, 0, -1, ENC_NA); + + dhcpfo_tree = proto_item_add_subtree(ti, ett_dhcpfo); + + if (length >= DHCPFO_FL_HDR_LEN) { + proto_tree_add_uint(dhcpfo_tree, + hf_dhcpfo_length, tvb, offset, 2, length); + } else { + proto_tree_add_uint_format_value(dhcpfo_tree, + hf_dhcpfo_length, tvb, offset, 2, length, + "%u (bogus, must be >= %u)", + length, DHCPFO_FL_HDR_LEN); + } + } + offset += 2; + + type = tvb_get_guint8(tvb, offset); + if (tree) { + proto_tree_add_uint(dhcpfo_tree, + hf_dhcpfo_type, tvb, offset, 1, type); + } + col_set_str(pinfo->cinfo, COL_INFO, + val_to_str_const(type, failover_vals, "Unknown Packet")); + offset += 1; + + if (dhcpfo_microsoft_compatibility == DISSECT_MS_DHCP) { + microsoft_style = TRUE; + } else { + /* Set to FALSE, changed to TRUE later if autodetected */ + microsoft_style = FALSE; + } + poffset = tvb_get_guint8(tvb, offset); + if (poffset == 8) { + if (dhcpfo_microsoft_compatibility == AUTODETECT_MS_DHCP) { + microsoft_style = TRUE; + } + bogus_poffset = FALSE; + proto_tree_add_uint_format_value(dhcpfo_tree, + hf_dhcpfo_poffset, tvb, offset, 1, poffset, + "%u (as per Draft, now treated as being %u)", + poffset, DHCPFO_FL_HDR_LEN); + poffset = DHCPFO_FL_HDR_LEN; + } else if (poffset < DHCPFO_FL_HDR_LEN) { + bogus_poffset = TRUE; + if (tree) { + proto_tree_add_uint_format_value(dhcpfo_tree, + hf_dhcpfo_poffset, tvb, offset, 1, poffset, + "%u (bogus, must be >= %u)", + poffset, DHCPFO_FL_HDR_LEN); + } + } else if (poffset > length) { + bogus_poffset = TRUE; + if (tree) { + proto_tree_add_uint_format_value(dhcpfo_tree, + hf_dhcpfo_poffset, tvb, offset, 1, poffset, + "%u (bogus, must be <= length of message)", + poffset); + } + } else { + bogus_poffset = FALSE; + if (tree) { + proto_tree_add_uint(dhcpfo_tree, + hf_dhcpfo_poffset, tvb, offset, 1, poffset); + } + } + offset += 1; + + if (tree) { + /* + * XXX - this is *almost* like a time_t, but it's unsigned. + * Also, we need a way to keep from displaying nanoseconds, + * so as not to make it look as if it has higher + */ + timex.secs = tvb_get_ntohl(tvb, offset); + timex.nsecs = 0; + proto_tree_add_time_format_value(dhcpfo_tree, hf_dhcpfo_time, tvb, + offset, 4, &timex, "%s", + abs_time_secs_to_str(pinfo->pool, timex.secs, ABSOLUTE_TIME_LOCAL, TRUE)); + } + offset += 4; + + xid = tvb_get_ntohl(tvb, offset); + if (tree) { + proto_tree_add_item(dhcpfo_tree, + hf_dhcpfo_xid, tvb, offset, 4, ENC_BIG_ENDIAN); + } + col_append_fstr(pinfo->cinfo, COL_INFO," xid: %x", xid); + offset += 4; + + if (bogus_poffset) + return offset; /* payload offset was bogus */ + + /* if there are any additional header bytes */ + if (poffset != offset) { + proto_tree_add_item(dhcpfo_tree, hf_dhcpfo_additional_HB, tvb, + offset, poffset-offset, ENC_NA); + offset = poffset; + } + + /* payload-data */ + if (poffset == length) + return length; /* no payload */ + /* create display subtree for the payload */ + pi = proto_tree_add_item(dhcpfo_tree, hf_dhcpfo_payload_data, + tvb, poffset, length-poffset, ENC_NA); + payload_tree = proto_item_add_subtree(pi, ett_fo_payload); + while (offset < length) { + opcode = tvb_get_ntohs(tvb, offset); + option_length = tvb_get_ntohs(tvb, offset+2); + + oi = proto_tree_add_item(payload_tree, + hf_dhcpfo_dhcp_style_option, tvb, offset, + option_length+4, ENC_NA); + option_tree = proto_item_add_subtree(oi, ett_fo_option); + + /*** DHCP-Style-Options ****/ + + option_name = val_to_str_const(opcode, option_code_vals, UNKNOWN_OPTION); + if (strcmp(option_name, VENDOR_SPECIFIC) == 0) { + /* Get the option name based on current setting */ + if (microsoft_style) { + option_name = val_to_str_const(opcode, microsoft_option_code_vals, UNKNOWN_OPTION); + } else { + option_name = val_to_str_const(opcode, others_option_code_vals, UNKNOWN_OPTION); + } + } + proto_item_append_text(oi, ", %s (%u)", option_name, opcode); + + proto_tree_add_uint(option_tree, hf_dhcpfo_option_code, tvb, + offset, 2, opcode); + + proto_tree_add_uint(option_tree, hf_dhcpfo_option_length, tvb, + offset+2, 2, option_length); + + offset += 4; + + /** opcode dependent format **/ + + switch (opcode) { + + case DHCP_FO_PD_BINDING_STATUS: + binding_status = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s (%d)", + val_to_str_const(binding_status, + binding_status_vals, + "Unknown Packet"), + binding_status); + + proto_tree_add_item(option_tree, + hf_dhcpfo_binding_status, tvb, + offset, 1, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_ASSIGNED_IP_ADDRESS: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "assigned ip address is not 4 bytes long"); + break; + } + proto_item_append_text(oi, ", %s ", tvb_ip_to_str(pinfo->pool, tvb, offset)); + + proto_tree_add_item(option_tree, + hf_dhcpfo_assigned_ip_address, tvb, offset, + option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_DELAYED_SERVICE_PARAMETER: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "delayed service parameter is not 1 bytes long"); + break; + } + + proto_item_append_text(oi, ", %d ", tvb_get_guint8(tvb, offset)); + + proto_tree_add_item(option_tree, + hf_dhcpfo_delayed_service_parameter, tvb, + offset, option_length, ENC_NA); + break; + + case DHCP_FO_PD_ADDRESSES_TRANSFERRED: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "addresses transferred is not 4 bytes long"); + break; + } + + proto_item_append_text(oi,", %u", tvb_get_ntohl(tvb, offset)); + + proto_tree_add_item(option_tree, + hf_dhcpfo_addresses_transferred, tvb, offset, + option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_CLIENT_IDENTIFIER: + { + const guint8* identifier; + /* + * XXX - if this is truly like DHCP option 81, + * we need to dissect it as such. + */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_client_identifier, tvb, offset, + option_length, ENC_ASCII|ENC_NA, pinfo->pool, &identifier); + + proto_item_append_text(oi,", \"%s\"", identifier); + } + break; + + case DHCP_FO_PD_CLIENT_HARDWARE_ADDRESS: + if (microsoft_style == FALSE) { + /* As specified in the draft: hardware type + hardware address */ + if (option_length < 2) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "hardware address is too short"); + break; + } + htype = tvb_get_guint8(tvb, offset); + htype_str = tvb_arphrdaddr_to_str(pinfo->pool, tvb, offset+1, option_length-1, + htype); + proto_item_append_text(oi, ", %s, %s", htype_str, + htype_str); + + proto_tree_add_item(option_tree, hf_dhcpfo_client_hw_type, tvb, + offset, 1, ENC_BIG_ENDIAN); + proto_tree_add_string(option_tree, hf_dhcpfo_client_hardware_address, tvb, + offset+1, option_length-1, htype_str); + } else { + /* Microsoft-style: DHCP scope (reversed) + hardware type + hardware address */ + if (option_length < 6) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "hardware address is too short"); + break; + } + proto_tree_add_item(option_tree, + hf_dhcpfo_ms_client_scope, tvb, offset, 4, ENC_LITTLE_ENDIAN); + + htype = tvb_get_guint8(tvb, offset+4); + htype_str = tvb_arphrdaddr_to_str(pinfo->pool, tvb, offset+1+4, option_length-1-4, + htype); + proto_item_append_text(oi, ", %s, %s", htype_str, + htype_str); + + proto_tree_add_item(option_tree, hf_dhcpfo_client_hw_type, tvb, + offset+4, 1, ENC_BIG_ENDIAN); + proto_tree_add_string(option_tree, hf_dhcpfo_client_hardware_address, tvb, + offset+1+4, option_length-1-4, htype_str); + } + break; + + case DHCP_FO_PD_FTDDNS: + proto_tree_add_item(option_tree, hf_dhcpfo_ftddns, tvb, + offset, option_length, ENC_ASCII); + break; + + case DHCP_FO_PD_REJECT_REASON: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Reject reason is not 1 byte long"); + break; + } + reject_reason = tvb_get_guint8(tvb, offset); + + proto_item_append_text(oi, ", %s (%d)", + val_to_str_const(reject_reason, reject_reason_vals, + "Unknown Packet"), + reject_reason); + + proto_tree_add_uint(option_tree, + hf_dhcpfo_reject_reason, tvb, offset, + option_length, reject_reason); + break; + + case DHCP_FO_PD_RELATIONSHIP_NAME: + if (microsoft_style == FALSE) { + /* Parse as ASCII */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_relationship_name, tvb, offset, + option_length, ENC_ASCII, pinfo->pool, &relationship_name_str); + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, relationship_name_str, option_length)); + } else { + /* Microsoft-style: Parse as UTF-16-LE */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_relationship_name, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &relationship_name_str); + /* String length is half the data length */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, relationship_name_str, option_length/2)); + } + break; + + case DHCP_FO_PD_MESSAGE: + proto_tree_add_item(option_tree, hf_dhcpfo_message, tvb, + offset, option_length, ENC_ASCII); + break; + + case DHCP_FO_PD_MCLT: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "MCLT is not 4 bytes long"); + break; + } + mclt = tvb_get_ntohl(tvb, offset); + proto_item_append_text(oi,", %u seconds", mclt); + proto_tree_add_uint(option_tree, hf_dhcpfo_mclt, tvb, + offset, option_length, mclt); + break; + + case DHCP_FO_PD_VENDOR_CLASS: + if (microsoft_style == FALSE) { + /* Parse as ASCII */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_vendor_class, tvb, offset, + option_length, ENC_ASCII, pinfo->pool, &vendor_class_str); + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, vendor_class_str, option_length)); + } else { + /* Microsoft-style: Parse as UTF-16-LE */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_vendor_class, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &vendor_class_str); + /* String length is half the data length */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, vendor_class_str, option_length/2)); + } + break; + + case DHCP_FO_PD_LEASE_EXPIRATION_TIME: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Lease expiration time is not 4 bytes long"); + break; + } + lease_expiration_time = + tvb_get_ntohl(tvb, offset); + lease_expiration_time_str = + abs_time_secs_to_str(pinfo->pool, lease_expiration_time, ABSOLUTE_TIME_LOCAL, TRUE); + + proto_item_append_text(oi, ", %s", + lease_expiration_time_str); + + proto_tree_add_uint_format_value(option_tree, + hf_dhcpfo_lease_expiration_time, tvb, + offset, option_length, + lease_expiration_time, + "%s", + lease_expiration_time_str); + break; + + case DHCP_FO_PD_POTENTIAL_EXPIRATION_TIME: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Potential expiration time is not 4 bytes long"); + break; + } + potential_expiration_time = + tvb_get_ntohl(tvb, offset); + + potential_expiration_time_str = + abs_time_secs_to_str(pinfo->pool, potential_expiration_time, ABSOLUTE_TIME_LOCAL, TRUE); + + proto_item_append_text(oi, ", %s", + potential_expiration_time_str); + + proto_tree_add_uint_format_value(option_tree, + hf_dhcpfo_potential_expiration_time, tvb, + offset, option_length, + potential_expiration_time, + "%s", + potential_expiration_time_str); + break; + + case DHCP_FO_PD_CLIENT_LAST_TRANSACTION_TIME: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Last transaction time is not 4 bytes long"); + break; + } + client_last_transaction_time = + tvb_get_ntohl(tvb, offset); + client_last_transaction_time_str = + abs_time_secs_to_str(pinfo->pool, client_last_transaction_time, ABSOLUTE_TIME_LOCAL, TRUE); + + proto_item_append_text(oi, ", %s", + client_last_transaction_time_str); + + proto_tree_add_uint_format_value(option_tree, + hf_dhcpfo_client_last_transaction_time, tvb, + offset, option_length, + client_last_transaction_time, + "%s", + abs_time_secs_to_str(pinfo->pool, client_last_transaction_time, ABSOLUTE_TIME_LOCAL, TRUE)); + break; + + case DHCP_FO_PD_START_TIME_OF_STATE: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Start time of state is not 4 bytes long"); + break; + } + start_time_of_state = + tvb_get_ntohl(tvb, offset); + start_time_of_state_str = + abs_time_secs_to_str(pinfo->pool, start_time_of_state, ABSOLUTE_TIME_LOCAL, TRUE); + + proto_item_append_text(oi, ", %s", + start_time_of_state_str); + + proto_tree_add_uint_format_value(option_tree, + hf_dhcpfo_start_time_of_state, tvb, + offset, option_length, + start_time_of_state, + "%s", + abs_time_secs_to_str(pinfo->pool, start_time_of_state, ABSOLUTE_TIME_LOCAL, TRUE)); + break; + + case DHCP_FO_PD_SERVERSTATE: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "server status is not 1 byte long"); + break; + } + server_state = tvb_get_guint8(tvb, offset); + + proto_item_append_text(oi, ", %s (%u)", + val_to_str_const(server_state, server_state_vals, + "Unknown"), + server_state); + + proto_tree_add_uint(option_tree, + hf_dhcpfo_server_state, tvb, offset, 1, + server_state); + break; + + case DHCP_FO_PD_SERVERFLAG: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Serverflag is not 1 byte long"); + break; + } + serverflag = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s (%d)", + val_to_str_const(serverflag, serverflag_vals, "UNKNOWN FLAGS"), + serverflag); + proto_tree_add_item(option_tree, hf_dhcpfo_serverflag, tvb, offset, option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_VENDOR_OPTION: + proto_tree_add_item(option_tree, + hf_dhcpfo_vendor_option, tvb, offset, + option_length, ENC_NA); + break; + + case DHCP_FO_PD_MAX_UNACKED_BNDUPD: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Max unacked BNDUPD is not 4 bytes long"); + break; + } + max_unacked_bndupd = tvb_get_ntohl(tvb, offset); + proto_item_append_text(oi, ", %u", max_unacked_bndupd); + + proto_tree_add_uint(option_tree, + hf_dhcpfo_max_unacked_bndupd, tvb, offset, + option_length, max_unacked_bndupd); + break; + + case DHCP_FO_PD_RECEIVE_TIMER: + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Receive timer is not 4 bytes long"); + break; + } + receive_timer = tvb_get_ntohl(tvb, offset); + proto_item_append_text(oi,", %u seconds", + receive_timer); + + proto_tree_add_uint(option_tree, + hf_dhcpfo_receive_timer, tvb, offset, + option_length, receive_timer); + break; + + case DHCP_FO_PD_HASH_BUCKET_ASSIGNMENT: + proto_tree_add_item(option_tree, + hf_dhcpfo_hash_bucket_assignment, tvb, + offset, option_length, ENC_NA); + break; + + case DHCP_FO_PD_IP_FLAGS: { + if (microsoft_style == FALSE) { + /* As specified in the draft: 16-bit flags */ + static int * const ipflags[] = { + &hf_dhcpfo_ipflags_reserved, + &hf_dhcpfo_ipflags_bootp, + &hf_dhcpfo_ipflags_mbz, + NULL + }; + if (option_length != 2) { + /* Draft-12 shows Len=1 with 16-bit field though */ + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "IP flags is not 2 bytes long"); + break; + } + proto_tree_add_bitmask(option_tree, tvb, offset, hf_dhcpfo_ipflags, + ett_fo_payload_data, ipflags, ENC_BIG_ENDIAN); + } else { + /* Microsoft-style: one byte only, usage unknown */ + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "IP flags is not 1 bytes long"); + break; + } + proto_item_append_text(oi, ", flags (Microsoft-specific): 0x%02x", tvb_get_guint8(tvb, offset)); + proto_tree_add_item(option_tree, hf_dhcpfo_ms_ipflags, tvb, offset, option_length, ENC_BIG_ENDIAN); + } + break; + } + + case DHCP_FO_PD_MESSAGE_DIGEST: + if (option_length < 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Message digest option is too short"); + break; + } + + message_digest_type = tvb_get_guint8(tvb, offset); + ti = proto_tree_add_item(option_tree, hf_dhcpfo_message_digest_type, tvb, offset, 1, ENC_BIG_ENDIAN); + + if (message_digest_type >= 1 && message_digest_type <= 2) { + proto_item_append_text(oi, ", %s", val_to_str_const(message_digest_type, message_digest_type_vals, "Unknown value")); + } else { + proto_item_append_text(oi, ", type not allowed"); + expert_add_info_format(pinfo, ti, &ei_dhcpfo_message_digest_type_not_allowed, "Message digest type: %u, not allowed", message_digest_type); + } + + proto_tree_add_item(option_tree, + hf_dhcpfo_message_digest, tvb, offset+1, + option_length-1, ENC_ASCII); + break; + + case DHCP_FO_PD_PROTOCOL_VERSION: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Protocol version is not 1 byte long"); + break; + } + proto_item_append_text(oi, ", version: %u", tvb_get_guint8(tvb, offset)); + proto_tree_add_item(option_tree, hf_dhcpfo_protocol_version, tvb, offset, option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_TLS_REQUEST: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "TLS request is not 1 bytes long"); + break; + } + tls_request = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s", val_to_str(tls_request, tls_request_vals, "Unknown (%u)")); + proto_tree_add_item(option_tree, hf_dhcpfo_tls_request, tvb, offset, 1, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_TLS_REPLY: + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "TLS reply is not 1 bytes long"); + break; + } + tls_reply = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s", val_to_str(tls_reply, tls_reply_vals, "Unknown (%u)")); + proto_tree_add_item(option_tree, hf_dhcpfo_tls_reply, tvb, offset, 1, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_REQUEST_OPTION: + case DHCP_FO_PD_REPLY_OPTION: + proto_tree_add_item(option_tree, hf_dhcpfo_options, tvb, offset, option_length, ENC_NA); + break; + + case DHCP_FO_PD_OPTION_30: + if (microsoft_style) { + /* Microsoft: Scope ID List */ + guint16 local_offset = 0; + while (local_offset < option_length) { + proto_tree_add_item(option_tree, + hf_dhcpfo_ms_scope_id, tvb, offset+local_offset, 4, ENC_LITTLE_ENDIAN); + local_offset += 4; + } + } else { + /* In Infoblox this is client hostname */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_infoblox_client_hostname, tvb, offset, + option_length, ENC_UTF_8, pinfo->pool, &client_hostname_str); + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, client_hostname_str, option_length)); + } + break; + + case DHCP_FO_PD_OPTION_31: + /* Microsoft: Client Name */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_ms_client_name, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &client_hostname_str); + /* With UTF-16 the string length is half the data length, minus the zero-termination */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, client_hostname_str, option_length/2-1)); + break; + + case DHCP_FO_PD_OPTION_32: + /* Microsoft: Client Description */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_ms_client_description, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &ms_client_description_str); + /* With UTF-16 the string length is half the data length, minus the zero-termination */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, ms_client_description_str, option_length/2-1)); + break; + + case DHCP_FO_PD_OPTION_33: + /* Microsoft: Client Subnet Mask */ + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "netmask is not 4 bytes long"); + break; + } + proto_item_append_text(oi, ", %s", tvb_ip_to_str(pinfo->pool, tvb, offset)); + proto_tree_add_item(option_tree, + hf_dhcpfo_ms_client_subnet_mask, tvb, offset, + option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_OPTION_34: + /* Microsoft: Server IP */ + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "server IP address is not 4 bytes long"); + break; + } + proto_item_append_text(oi, ", %s", tvb_ip_to_str(pinfo->pool, tvb, offset)); + proto_tree_add_item(option_tree, + hf_dhcpfo_ms_server_ip, tvb, offset, + option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_OPTION_35: + /* Microsoft: Server Name */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_ms_server_name, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &ms_server_name_str); + /* With UTF-16 the string length is half the data length, minus the zero-termination */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, ms_server_name_str, option_length/2-1)); + break; + + case DHCP_FO_PD_OPTION_36: + /* Microsoft: Client Type */ + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "client type is not 1 byte long"); + break; + } + ms_client_type = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s (%d)", + val_to_str_const(ms_client_type, ms_client_type_vals, "(undefined)"), + ms_client_type); + proto_tree_add_item(option_tree, hf_dhcpfo_ms_client_type, tvb, offset, option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_OPTION_37: + /* Microsoft: Client NAP Status */ + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "client NAP status is not 1 byte long"); + break; + } + ms_client_nap_status = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s (%d)", + val_to_str_const(ms_client_nap_status, ms_client_nap_status_vals, "(undefined)"), + ms_client_nap_status); + proto_tree_add_item(option_tree, hf_dhcpfo_ms_client_nap_status, tvb, offset, option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_OPTION_38: + /* Microsoft: Client NAP Probation */ + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "client NAP probation is not 4 bytes long"); + break; + } + ms_client_nap_probation = tvb_get_ntohl(tvb, offset); + /* The option value is specified: + * "The value is specified as an absolute time and represents the + * number of 100-nanosecond intervals since January 1, 1601 (UTC)" + * But obviously that large values won't fit into a 4-byte variable. + * So showing as uint32 for now. + */ + proto_item_append_text(oi,", %u", ms_client_nap_probation); + proto_tree_add_uint(option_tree, + hf_dhcpfo_ms_client_nap_probation, tvb, offset, + option_length, ms_client_nap_probation); + break; + + case DHCP_FO_PD_OPTION_39: + /* Microsoft: Client NAP Capable */ + if (option_length != 1) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "client NAP capable option is not 1 byte long"); + break; + } + ms_client_nap_capable = tvb_get_guint8(tvb, offset); + proto_item_append_text(oi, ", %s (%d)", + tfs_get_true_false(ms_client_nap_capable), + ms_client_nap_capable); + proto_tree_add_item(option_tree, hf_dhcpfo_ms_client_nap_capable, tvb, offset, option_length, ENC_BIG_ENDIAN); + break; + + case DHCP_FO_PD_OPTION_40: + /* Microsoft: Client Matched Policy */ + proto_tree_add_item_ret_string(option_tree, + hf_dhcpfo_ms_client_matched_policy, tvb, offset, + option_length, ENC_UTF_16|ENC_LITTLE_ENDIAN, pinfo->pool, &ms_client_matched_policy_str); + /* With UTF-16 the string length is half the data length, minus the zero-termination */ + proto_item_append_text(oi,", \"%s\"", + format_text(pinfo->pool, ms_client_matched_policy_str, option_length/2-1)); + break; + + case DHCP_FO_PD_OPTION_41: + /* Microsoft: Extended Address State */ + if (option_length != 4) { + expert_add_info_format(pinfo, oi, &ei_dhcpfo_bad_length, "Extended address state is not 4 bytes long"); + break; + } + ms_extended_address_state = tvb_get_ntohl(tvb, offset); + proto_item_append_text(oi,", 0x%08x", ms_extended_address_state); + + proto_tree_add_uint(option_tree, + hf_dhcpfo_ms_extended_address_state, tvb, offset, + option_length, ms_extended_address_state); + break; + + default: + proto_tree_add_item(option_tree, + hf_dhcpfo_unknown_data, tvb, offset, + option_length, ENC_ASCII); + break; + } + + offset += option_length; + } + + return tvb_reported_length(tvb); +} + +static int +dissect_dhcpfo(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data) +{ + tcp_dissect_pdus(tvb, pinfo, tree, dhcpfo_desegment, 2, + get_dhcpfo_pdu_len, dissect_dhcpfo_pdu, data); + return tvb_reported_length(tvb); +} + +/* Register the protocol with Wireshark */ + +void +proto_register_dhcpfo(void) +{ + +/* Setup list of header fields See Section 1.6.1 for details*/ + static hf_register_info hf[] = { + { &hf_dhcpfo_length, + { "Message length", "dhcpfo.length", + FT_UINT16, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_type, + { "Message Type", "dhcpfo.type", + FT_UINT8, BASE_DEC, VALS(failover_vals), 0, + NULL, HFILL } + }, + { &hf_dhcpfo_poffset, + { "Payload Offset", "dhcpfo.poffset", + FT_UINT8, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_time, + { "Time", "dhcpfo.time", + FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_xid, + { "Xid", "dhcpfo.xid", + FT_UINT32, BASE_HEX, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_additional_HB, + {"Additional Header Bytes", "dhcpfo.additionalheaderbytes", + FT_BYTES, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + { &hf_dhcpfo_payload_data, + {"Payload Data", "dhcpfo.payloaddata", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_dhcp_style_option, + {"DHCP Style Option", "dhcpfo.dhcpstyleoption", + FT_NONE, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + { &hf_dhcpfo_option_code, + {"Option Code", "dhcpfo.optioncode", + FT_UINT16, BASE_DEC, VALS(option_code_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_option_length, + {"Length", "dhcpfo.optionlength", + FT_UINT16, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_binding_status, + {"Status", "dhcpfo.bindingstatus", + FT_UINT32, BASE_DEC, VALS(binding_status_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_server_state, + {"server status", "dhcpfo.serverstatus", + FT_UINT8, BASE_DEC, VALS(server_state_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_assigned_ip_address, + {"assigned ip address", "dhcpfo.assignedipaddress", + FT_IPv4, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_delayed_service_parameter, + {"delayed service parameter", "dhcpfo.delayedserviceparameter", + FT_UINT8, BASE_DEC, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_addresses_transferred, + {"addresses transferred", "dhcpfo.addressestransferred", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_client_identifier, + {"Client Identifier", "dhcpfo.clientidentifier", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_client_hw_type, + {"Client Hardware Type", "dhcpfo.clienthardwaretype", + FT_UINT8, BASE_HEX, VALS(arp_hrd_vals), 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_client_hardware_address, + {"Client Hardware Address", "dhcpfo.clienthardwareaddress", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ftddns, + {"FTDDNS", "dhcpfo.ftddns", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_reject_reason, + {"Reject reason", "dhcpfo.rejectreason", + FT_UINT8, BASE_DEC, VALS(reject_reason_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_relationship_name, + {"Relationship name", "dhcpfo.relationshipname", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_message, + {"Message", "dhcpfo.message", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_mclt, + {"MCLT", "dhcpfo.mclt", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_vendor_class, + {"Vendor class", "dhcpfo.vendorclass", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_lease_expiration_time, + {"Lease expiration time", "dhcpfo.leaseexpirationtime", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_potential_expiration_time, + {"Potential expiration time", "dhcpfo.potentialexpirationtime", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_client_last_transaction_time, + {"Client last transaction time", "dhcpfo.clientlasttransactiontime", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_start_time_of_state, + {"Start time of state", "dhcpfo.starttimeofstate", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_vendor_option, + {"Vendor option", "dhcpfo.vendoroption", + FT_NONE, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_max_unacked_bndupd, + {"Max unacked BNDUPD", "dhcpfo.maxunackedbndupd", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_protocol_version, + {"Protocol version", "dhcpfo.protocolversion", + FT_UINT8, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_receive_timer, + {"Receive timer", "dhcpfo.receivetimer", + FT_UINT32, BASE_DEC|BASE_UNIT_STRING, &units_second_seconds, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_message_digest, + {"Message digest", "dhcpfo.messagedigest", + FT_BYTES, BASE_NONE|BASE_ALLOW_ZERO, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_hash_bucket_assignment, + {"Hash bucket assignment", "dhcpfo.hashbucketassignment", + FT_BYTES, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ipflags, + {"IP Flags", "dhcpfo.ipflags", + FT_UINT16, BASE_HEX, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ipflags_reserved, + {"Reserved", "dhcpfo.ipflags.reserved", + FT_BOOLEAN, 8, NULL, 0x80, + NULL, HFILL } + }, + {&hf_dhcpfo_ipflags_bootp, + {"BOOTP", "dhcpfo.ipflags.bootp", + FT_BOOLEAN, 8, NULL, 0x40, + NULL, HFILL } + }, + {&hf_dhcpfo_ipflags_mbz, + {"MBZ", "dhcpfo.ipflags.mbz", + FT_UINT8, BASE_HEX, NULL, 0x3F, + NULL, HFILL } + }, + {&hf_dhcpfo_message_digest_type, + {"Message digest type", "dhcpfo.message_digest_type", + FT_UINT8, BASE_DEC, VALS(message_digest_type_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_tls_request, + {"TLS Request", "dhcpfo.tls_request", + FT_UINT8, BASE_DEC, VALS(tls_request_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_tls_reply, + {"TLS Reply", "dhcpfo.tls_reply", + FT_UINT8, BASE_DEC, VALS(tls_reply_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_serverflag, + {"Serverflag", "dhcpfo.serverflag", + FT_UINT8, BASE_DEC, VALS(serverflag_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_options, + {"Options", "dhcpfo.options", + FT_BYTES, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_name, + {"Client name (Microsoft-specific)", "dhcpfo.microsoft.clientname", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_description, + {"Client description (Microsoft-specific)", "dhcpfo.microsoft.clientdescription", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_type, + {"Client type (Microsoft-specific)", "dhcpfo.microsoft.clienttype", + FT_UINT8, BASE_NONE, VALS(ms_client_type_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_nap_status, + {"Client NAP status (Microsoft-specific)", "dhcpfo.microsoft.clientnapstatus", + FT_UINT8, BASE_NONE, VALS(ms_client_nap_status_vals), 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_nap_capable, + {"Client NAP capable (Microsoft-specific)", "dhcpfo.microsoft.clientnapcapable", + FT_BOOLEAN, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_nap_probation, + {"Client NAP probation (Microsoft-specific)", "dhcpfo.microsoft.clientnapprobation", + FT_UINT32, BASE_DEC, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_matched_policy, + {"Client matched policy (Microsoft-specific)", "dhcpfo.microsoft.clientmatchedpolicy", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_server_name, + {"Server name (Microsoft-specific)", "dhcpfo.microsoft.servername", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_scope, + {"Client DHCP scope (Microsoft-specific)", "dhcpfo.microsoft.clientscope", + FT_IPv4, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_client_subnet_mask, + {"Client subnet mask (Microsoft-specific)", "dhcpfo.microsoft.clientsubnetmask", + FT_IPv4, BASE_NETMASK, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_scope_id, + {"Scope ID (Microsoft-specific)", "dhcpfo.microsoft.scopeid", + FT_IPv4, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_server_ip, + {"Server IP (Microsoft-specific)", "dhcpfo.microsoft.serverip", + FT_IPv4, BASE_NONE, NULL, 0x0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_ipflags, + {"IP flags (Microsoft-specific)", "dhcpfo.microsoft.ipflags", + FT_UINT8, BASE_HEX, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_ms_extended_address_state, + {"Extended address state (Microsoft-specific)", "dhcpfo.microsoft.extendedaddressstate", + FT_UINT32, BASE_HEX, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_infoblox_client_hostname, + {"Client hostname (Infoblox-specific)", "dhcpfo.infoblox.clienthostname", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + {&hf_dhcpfo_unknown_data, + {"Unknown data", "dhcpfo.unknowndata", + FT_BYTES, BASE_NONE, NULL, 0, + NULL, HFILL } + }, + }; + +/* Setup protocol subtree array */ + static gint *ett[] = { + &ett_dhcpfo, + &ett_fo_payload, + &ett_fo_option, + &ett_fo_payload_data, + }; + + static ei_register_info ei[] = { + { &ei_dhcpfo_bad_length, { "dhcpfo.bad_length", PI_PROTOCOL, PI_WARN, "Bad length", EXPFILL }}, + { &ei_dhcpfo_message_digest_type_not_allowed, { "dhcpfo.message_digest_type_not_allowed", PI_PROTOCOL, PI_WARN, "Message digest type not allowed", EXPFILL }}, + }; + + module_t *dhcpfo_module; + expert_module_t* expert_dhcpfo; + +/* Register the protocol name and description */ + proto_dhcpfo = proto_register_protocol("DHCP Failover", "DHCPFO", "dhcpfo"); + +/* Required function calls to register the header fields and subtrees used */ + proto_register_field_array(proto_dhcpfo, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + expert_dhcpfo = expert_register_protocol(proto_dhcpfo); + expert_register_field_array(expert_dhcpfo, ei, array_length(ei)); + + dhcpfo_module = prefs_register_protocol(proto_dhcpfo, NULL); + + prefs_register_bool_preference(dhcpfo_module, "desegment", + "Reassemble DHCP failover messages spanning multiple TCP segments", + "Whether the DHCP failover dissector should reassemble messages spanning multiple TCP segments." + " To use this option, you must also enable \"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.", + &dhcpfo_desegment); + prefs_register_enum_preference(dhcpfo_module, "microsoft_compatibility", + "Microsoft Windows DHCP server compatibility", + "Enables the dissector to show Microsoft-formatted option fields correctly", + &dhcpfo_microsoft_compatibility, + microsoft_compatibility, FALSE); + + dhcpfo_handle = register_dissector("dhcpfo", dissect_dhcpfo, proto_dhcpfo); +} + +void +proto_reg_handoff_dhcpfo(void) +{ + dissector_add_uint_with_preference("tcp.port", TCP_PORT_DHCPFO, dhcpfo_handle); +} + +/* + * Editor modelines - https://www.wireshark.org/tools/modelines.html + * + * Local variables: + * c-basic-offset: 8 + * tab-width: 8 + * indent-tabs-mode: t + * End: + * + * vi: set shiftwidth=8 tabstop=8 noexpandtab: + * :indentSize=8:tabSize=8:noTabs=false: + */ |