summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-smtp.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/dissectors/packet-smtp.c
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/dissectors/packet-smtp.c')
-rw-r--r--epan/dissectors/packet-smtp.c1512
1 files changed, 1512 insertions, 0 deletions
diff --git a/epan/dissectors/packet-smtp.c b/epan/dissectors/packet-smtp.c
new file mode 100644
index 00000000..ad679d99
--- /dev/null
+++ b/epan/dissectors/packet-smtp.c
@@ -0,0 +1,1512 @@
+/* packet-smtp.c
+ * Routines for SMTP packet disassembly
+ *
+ * Copyright (c) 2000 by Richard Sharpe <rsharpe@ns.aus.com>
+ *
+ * Added RFC 4954 SMTP Authentication
+ * Michael Mann * Copyright 2012
+ * Added RFC 2920 Pipelining and RFC 3030 BDAT Pipelining
+ * John Thacker <johnthacker@gmail.com>
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1999 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <stdlib.h>
+
+#include <epan/packet.h>
+#include <epan/conversation.h>
+#include <epan/prefs.h>
+#include <epan/strutil.h>
+#include <epan/reassemble.h>
+#include <epan/proto_data.h>
+
+#include <ui/tap-credentials.h>
+#include <tap.h>
+
+#include <wsutil/str_util.h>
+#include "packet-tls.h"
+#include "packet-tls-utils.h"
+
+/* RFC 2821 */
+#define TCP_PORT_SMTP "25"
+#define TCP_PORT_SSL_SMTP 465
+
+/* RFC 4409 */
+#define TCP_PORT_SUBMISSION 587
+
+void proto_register_smtp(void);
+void proto_reg_handoff_smtp(void);
+
+static int proto_smtp = -1;
+
+static int credentials_tap = -1;
+
+static int hf_smtp_req = -1;
+static int hf_smtp_rsp = -1;
+static int hf_smtp_message = -1;
+static int hf_smtp_command_line = -1;
+static int hf_smtp_req_command = -1;
+static int hf_smtp_req_parameter = -1;
+static int hf_smtp_response = -1;
+static int hf_smtp_rsp_code = -1;
+static int hf_smtp_rsp_parameter = -1;
+static int hf_smtp_username = -1;
+static int hf_smtp_password = -1;
+static int hf_smtp_username_password = -1;
+static int hf_smtp_eom = -1;
+
+static int hf_smtp_data_fragments = -1;
+static int hf_smtp_data_fragment = -1;
+static int hf_smtp_data_fragment_overlap = -1;
+static int hf_smtp_data_fragment_overlap_conflicts = -1;
+static int hf_smtp_data_fragment_multiple_tails = -1;
+static int hf_smtp_data_fragment_too_long_fragment = -1;
+static int hf_smtp_data_fragment_error = -1;
+static int hf_smtp_data_fragment_count = -1;
+static int hf_smtp_data_reassembled_in = -1;
+static int hf_smtp_data_reassembled_length = -1;
+
+static int ett_smtp = -1;
+static int ett_smtp_cmdresp = -1;
+
+static gint ett_smtp_data_fragment = -1;
+static gint ett_smtp_data_fragments = -1;
+
+static expert_field ei_smtp_base64_decode = EI_INIT;
+static expert_field ei_smtp_rsp_code = EI_INIT;
+
+static gboolean smtp_auth_parameter_decoding_enabled = FALSE;
+/* desegmentation of SMTP command and response lines */
+static gboolean smtp_desegment = TRUE;
+static gboolean smtp_data_desegment = TRUE;
+
+static reassembly_table smtp_data_reassembly_table;
+
+static const fragment_items smtp_data_frag_items = {
+ /* Fragment subtrees */
+ &ett_smtp_data_fragment,
+ &ett_smtp_data_fragments,
+ /* Fragment fields */
+ &hf_smtp_data_fragments,
+ &hf_smtp_data_fragment,
+ &hf_smtp_data_fragment_overlap,
+ &hf_smtp_data_fragment_overlap_conflicts,
+ &hf_smtp_data_fragment_multiple_tails,
+ &hf_smtp_data_fragment_too_long_fragment,
+ &hf_smtp_data_fragment_error,
+ &hf_smtp_data_fragment_count,
+ /* Reassembled in field */
+ &hf_smtp_data_reassembled_in,
+ /* Reassembled length field */
+ &hf_smtp_data_reassembled_length,
+ /* Reassembled data field */
+ NULL,
+ /* Tag */
+ "DATA fragments"
+};
+
+static dissector_handle_t smtp_handle;
+static dissector_handle_t tls_handle;
+static dissector_handle_t imf_handle;
+static dissector_handle_t ntlmssp_handle;
+static dissector_handle_t data_text_lines_handle;
+
+/*
+ * A CMD is an SMTP command, MESSAGE is the message portion, and EOM is the
+ * last part of a message
+ */
+#define SMTP_PDU_CMD 0
+#define SMTP_PDU_MESSAGE 1
+#define SMTP_PDU_EOM 2
+
+struct smtp_proto_data {
+ guint16 pdu_type;
+ guint16 conversation_id;
+ gboolean more_frags;
+ int end_offset;
+ struct smtp_proto_data *next;
+};
+
+/*
+ * State information stored with a conversation.
+ */
+typedef enum {
+ SMTP_STATE_START, /* Start of SMTP conversion */
+ SMTP_STATE_READING_CMDS, /* reading commands */
+ SMTP_STATE_READING_DATA, /* reading message data */
+ SMTP_STATE_AWAITING_STARTTLS_RESPONSE /* sent STARTTLS, awaiting response */
+} smtp_state_t;
+
+typedef enum {
+ SMTP_AUTH_STATE_NONE, /* No authentication seen or used */
+ SMTP_AUTH_STATE_START, /* Authentication started, waiting for username */
+ SMTP_AUTH_STATE_USERNAME_REQ, /* Received username request from server */
+ SMTP_AUTH_STATE_USERNAME_RSP, /* Received username response from client */
+ SMTP_AUTH_STATE_PASSWORD_REQ, /* Received password request from server */
+ SMTP_AUTH_STATE_PASSWORD_RSP, /* Received password request from server */
+ SMTP_AUTH_STATE_PLAIN_START_REQ, /* Received AUTH PLAIN command from client*/
+ SMTP_AUTH_STATE_PLAIN_CRED_REQ, /* Received AUTH PLAIN command including creds from client*/
+ SMTP_AUTH_STATE_PLAIN_REQ, /* Received AUTH PLAIN request from server */
+ SMTP_AUTH_STATE_PLAIN_RSP, /* Received AUTH PLAIN response from client */
+ SMTP_AUTH_STATE_NTLM_REQ, /* Received ntlm negotiate request from client */
+ SMTP_AUTH_STATE_NTLM_CHALLANGE, /* Received ntlm challange request from server */
+ SMTP_AUTH_STATE_NTLM_RSP, /* Received ntlm auth request from client */
+ SMTP_AUTH_STATE_SUCCESS, /* Password received, authentication successful, start decoding */
+ SMTP_AUTH_STATE_FAILED /* authentication failed, no decoding */
+} smtp_auth_state_t;
+
+typedef enum {
+ SMTP_MULTILINE_NONE,
+ SMTP_MULTILINE_START,
+ SMTP_MULTILINE_CONTINUE,
+ SMTP_MULTILINE_END
+
+} smtp_multiline_state_t;
+
+struct smtp_session_state {
+ smtp_state_t smtp_state; /* Current state */
+ smtp_auth_state_t auth_state; /* Current authentication state */
+ /* Values that need to be saved because state machine can't be used during tree dissection */
+ guint32 first_auth_frame; /* First frame involving authentication. */
+ guint32 username_frame; /* Frame containing client username */
+ guint32 password_frame; /* Frame containing client password */
+ guint32 last_auth_frame; /* Last frame involving authentication. */
+ guint8* username; /* The username in the authentication. */
+ gboolean crlf_seen; /* Have we seen a CRLF on the end of a packet */
+ gboolean data_seen; /* Have we seen a DATA command yet */
+ guint32 msg_read_len; /* Length of BDAT message read so far */
+ guint32 msg_tot_len; /* Total length of BDAT message */
+ gboolean msg_last; /* Is this the last BDAT chunk */
+ guint32 username_cmd_frame; /* AUTH command contains username */
+ guint32 user_pass_cmd_frame; /* AUTH command contains username and password */
+ guint32 user_pass_frame; /* Frame contains username and password */
+ guint32 ntlm_req_frame; /* Frame containing NTLM request */
+ guint32 ntlm_cha_frame; /* Frame containing NTLM challange. */
+ guint32 ntlm_rsp_frame; /* Frame containing NTLM response. */
+};
+
+/*
+ * See
+ *
+ * http://support.microsoft.com/default.aspx?scid=kb;[LN];812455
+ *
+ * for the Exchange extensions.
+ */
+static const struct {
+ const char *command;
+ int len;
+} commands[] = {
+ { "STARTTLS", 8 }, /* RFC 2487 */
+ { "X-EXPS", 6 }, /* Microsoft Exchange */
+ { "X-LINK2STATE", 12 }, /* Microsoft Exchange */
+ { "XEXCH50", 7 } /* Microsoft Exchange */
+};
+
+#define NCOMMANDS (sizeof commands / sizeof commands[0])
+
+/* The following were copied from RFC 2821 */
+static const value_string response_codes_vs[] = {
+ { 211, "System status, or system help reply" },
+ { 214, "Help message" },
+ { 220, "<domain> Service ready" },
+ { 221, "<domain> Service closing transmission channel" },
+ { 235, "Authentication successful" },
+ { 250, "Requested mail action okay, completed" },
+ { 251, "User not local; will forward to <forward-path>" },
+ { 252, "Cannot VRFY user, but will accept message and attempt delivery" },
+ { 334, "AUTH input" },
+ { 354, "Start mail input; end with <CRLF>.<CRLF>" },
+ { 421, "<domain> Service not available, closing transmission channel" },
+ { 432, "A password transition is needed" },
+ { 450, "Requested mail action not taken: mailbox unavailable" },
+ { 451, "Requested action aborted: local error in processing" },
+ { 452, "Requested action not taken: insufficient system storage" },
+ { 454, "Temporary authentication failed" },
+ { 500, "Syntax error, command unrecognized" },
+ { 501, "Syntax error in parameters or arguments" },
+ { 502, "Command not implemented" },
+ { 503, "Bad sequence of commands" },
+ { 504, "Command parameter not implemented" },
+ { 530, "Authentication required" },
+ { 534, "Authentication mechanism is too weak" },
+ { 535, "Authentication credentials invalid" },
+ { 538, "Encryption required for requested authentication mechanism" },
+ { 550, "Requested action not taken: mailbox unavailable" },
+ { 551, "User not local; please try <forward-path>" },
+ { 552, "Requested mail action aborted: exceeded storage allocation" },
+ { 553, "Requested action not taken: mailbox name not allowed" },
+ { 554, "Transaction failed" },
+ { 0, NULL }
+};
+static value_string_ext response_codes_vs_ext = VALUE_STRING_EXT_INIT(response_codes_vs);
+
+static struct smtp_proto_data*
+append_pdu(struct smtp_proto_data *spd_frame_data)
+{
+ DISSECTOR_ASSERT(spd_frame_data && spd_frame_data->next == NULL);
+ struct smtp_proto_data *new_pdu = wmem_new0(wmem_file_scope(), struct smtp_proto_data);
+ new_pdu->conversation_id = spd_frame_data->conversation_id;
+ new_pdu->more_frags = TRUE;
+ spd_frame_data->next = new_pdu;
+
+ return new_pdu;
+}
+
+static gboolean
+line_is_smtp_command(const guchar *command, int commandlen)
+{
+ size_t i;
+
+ /*
+ * To quote RFC 821, "Command codes are four alphabetic
+ * characters".
+ *
+ * However, there are some SMTP extensions that involve commands
+ * longer than 4 characters and/or that contain non-alphabetic
+ * characters; we treat them specially.
+ *
+ * XXX - should we just have a table of known commands? Or would
+ * that fail to catch some extensions we don't know about?
+ */
+ if (commandlen == 4 && g_ascii_isalpha(command[0]) &&
+ g_ascii_isalpha(command[1]) && g_ascii_isalpha(command[2]) &&
+ g_ascii_isalpha(command[3])) {
+ /* standard 4-alphabetic command */
+ return TRUE;
+ }
+
+ /*
+ * Check the list of non-4-alphabetic commands.
+ */
+ for (i = 0; i < NCOMMANDS; i++) {
+ if (commandlen == commands[i].len &&
+ g_ascii_strncasecmp(command, commands[i].command, commands[i].len) == 0)
+ return TRUE;
+ }
+ return FALSE;
+}
+
+static void
+dissect_smtp_data(tvbuff_t *tvb, int offset, proto_tree *smtp_tree)
+{
+ gint next_offset;
+
+ if (smtp_tree) {
+ while (tvb_offset_exists(tvb, offset)) {
+ /*
+ * Find the end of the line.
+ */
+ tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE);
+
+ /*
+ * Put this line.
+ */
+ proto_tree_add_item(smtp_tree, hf_smtp_message, tvb,
+ offset, next_offset - offset, ENC_ASCII);
+
+ /*
+ * Step to the next line.
+ */
+ offset = next_offset;
+ }
+ }
+}
+
+static void
+dissect_ntlm_auth(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
+ const char *line)
+{
+ tvbuff_t *ntlm_tvb;
+
+ ntlm_tvb = base64_to_tvb(tvb, line);
+ if(tvb_strneql(ntlm_tvb, 0, "NTLMSSP", 7) == 0) {
+ add_new_data_source(pinfo, ntlm_tvb, "NTLMSSP Data");
+ call_dissector(ntlmssp_handle, ntlm_tvb, pinfo, tree);
+ }
+}
+
+static void
+decode_plain_auth(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
+ gint a_offset, int a_linelen)
+{
+ gint returncode;
+ gint length_user1;
+ gint length_user2;
+ gint length_pass;
+ guint8 *decrypt = NULL;
+ proto_item *ti;
+ gsize len = 0;
+
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, a_offset, a_linelen, ENC_ASCII);
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &len);
+ decrypt[len] = 0;
+ }
+ returncode = (gint)len;
+ if (returncode) {
+ gchar* username;
+ length_user1 = (gint)strlen(decrypt);
+ if (returncode >= (length_user1 + 1)) {
+ length_user2 = (gint)strlen(decrypt + length_user1 + 1);
+ proto_tree_add_string(tree, hf_smtp_username, tvb,
+ a_offset, a_linelen, decrypt + length_user1 + 1);
+ username = format_text(pinfo->pool, decrypt + length_user1 + 1, length_user2);
+ col_append_fstr(pinfo->cinfo, COL_INFO, "User: %s", username);
+
+ if (returncode >= (length_user1 + 1 + length_user2 + 1)) {
+ length_pass = (gint)strlen(decrypt + length_user1 + length_user2 + 2);
+ proto_tree_add_string(tree, hf_smtp_password, tvb,
+ a_offset, length_pass, decrypt + length_user1 + length_user2 + 2);
+ col_append_str(pinfo->cinfo, COL_INFO, " ");
+ col_append_fstr(pinfo->cinfo, COL_INFO, " Pass: %s",
+ format_text(pinfo->pool, decrypt + length_user1 + length_user2 + 2, length_pass));
+
+ tap_credential_t* auth = wmem_new0(pinfo->pool, tap_credential_t);
+ auth->num = pinfo->num;
+ auth->username_num = pinfo->num;
+ auth->password_hf_id = hf_smtp_password;
+ auth->username = username;
+ auth->proto = "SMTP";
+ tap_queue_packet(credentials_tap, pinfo, auth);
+ }
+ }
+ }
+ }
+ else {
+ ti = proto_tree_add_item(tree, hf_smtp_username_password, tvb,
+ a_offset, a_linelen, ENC_ASCII);
+ expert_add_info(pinfo, ti, &ei_smtp_base64_decode);
+ col_append_str(pinfo->cinfo, COL_INFO, format_text(pinfo->pool, decrypt, a_linelen));
+ }
+}
+
+static int
+dissect_smtp_request(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, proto_tree *smtp_tree, struct smtp_session_state *session_state, struct smtp_proto_data *spd_frame_data, gboolean first_pdu)
+{
+ proto_item *ti, *hidden_item;
+ proto_tree *cmdresp_tree = NULL;
+ int offset = 0;
+ int next_offset;
+ int linelen = 0;
+ int length_remaining;
+ int cmdlen;
+ fragment_head *frag_msg = NULL;
+ tvbuff_t *next_tvb;
+ guint8 *decrypt = NULL;
+ gsize decrypt_len = 0;
+ guint8 *base64_string = NULL;
+
+ switch (spd_frame_data->pdu_type) {
+
+ case SMTP_PDU_MESSAGE:
+ /* Column Info */
+ length_remaining = tvb_reported_length_remaining(tvb, offset);
+ if (first_pdu)
+ col_append_str(pinfo->cinfo, COL_INFO, "C: ");
+ else
+ col_append_str(pinfo->cinfo, COL_INFO, " | ");
+ col_append_str(pinfo->cinfo, COL_INFO, smtp_data_desegment ? "DATA fragment" : "Message Body");
+ col_append_fstr(pinfo->cinfo, COL_INFO, ", %d byte%s", length_remaining,
+ plurality (length_remaining, "", "s"));
+
+ if (smtp_data_desegment) {
+ frag_msg = fragment_add_seq_next(&smtp_data_reassembly_table, tvb, 0,
+ pinfo, spd_frame_data->conversation_id, NULL,
+ tvb_reported_length(tvb),
+ spd_frame_data->more_frags);
+ if (spd_frame_data->more_frags) {
+ /* Show the text lines within this PDU fragment
+ * Calling this on the last fragment would interfere with
+ * process reassembled data below, by changing the layer number.
+ * (We'll display the data anyway as part of the reassembly.)
+ */
+ call_dissector(data_text_lines_handle, tvb, pinfo, smtp_tree);
+ }
+ } else {
+ /*
+ * Message body.
+ * Put its lines into the protocol tree, a line at a time.
+ */
+ dissect_smtp_data(tvb, offset, smtp_tree);
+ }
+ break;
+
+ case SMTP_PDU_EOM:
+ /*
+ * End-of-message-body indicator.
+ */
+ if (first_pdu)
+ col_append_str(pinfo->cinfo, COL_INFO, "C: ");
+ else
+ col_append_str(pinfo->cinfo, COL_INFO, " | ");
+ col_append_str(pinfo->cinfo, COL_INFO, ".");
+
+ proto_tree_add_none_format(smtp_tree, hf_smtp_eom, tvb, offset, 3, "C: .");
+
+ break;
+
+ case SMTP_PDU_CMD:
+ /*
+ * Command.
+ */
+
+ while (tvb_offset_exists(tvb, offset)) {
+ /*
+ * Find the end of the line.
+ */
+ linelen = tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE);
+
+ /* Column Info */
+ if (first_pdu && offset == 0)
+ col_append_str(pinfo->cinfo, COL_INFO, "C: ");
+ else
+ col_append_str(pinfo->cinfo, COL_INFO, " | ");
+
+ hidden_item = proto_tree_add_boolean(smtp_tree, hf_smtp_req, tvb,
+ 0, 0, TRUE);
+ proto_item_set_hidden(hidden_item);
+
+ if (session_state->username_frame == pinfo->num) {
+ if (decrypt == NULL) {
+ /* This line wasn't already decrypted through the state machine */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &decrypt_len);
+ decrypt[decrypt_len] = 0;
+ } else {
+ decrypt_len = 0;
+ }
+ if (decrypt_len == 0) {
+ /* Go back to the original string */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ }
+ }
+ }
+
+ if (!session_state->username)
+ session_state->username = wmem_strdup(wmem_file_scope(), decrypt);
+ proto_tree_add_string(smtp_tree, hf_smtp_username, tvb,
+ offset, linelen, decrypt);
+ col_append_fstr(pinfo->cinfo, COL_INFO, "User: %s", format_text(pinfo->pool, decrypt, decrypt_len));
+ } else if (session_state->password_frame == pinfo->num) {
+ if (decrypt == NULL) {
+ /* This line wasn't already decrypted through the state machine */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &decrypt_len);
+ decrypt[decrypt_len] = 0;
+ } else {
+ decrypt_len = 0;
+ }
+ if (decrypt_len == 0) {
+ /* Go back to the original string */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ }
+ }
+ }
+ proto_tree_add_string(smtp_tree, hf_smtp_password, tvb,
+ offset, linelen, decrypt);
+ col_append_fstr(pinfo->cinfo, COL_INFO, "Pass: %s", format_text(pinfo->pool, decrypt, decrypt_len));
+
+ tap_credential_t* auth = wmem_new0(pinfo->pool, tap_credential_t);
+ auth->num = pinfo->num;
+ auth->username_num = session_state->username_frame;
+ auth->password_hf_id = hf_smtp_password;
+ auth->username = session_state->username;
+ auth->proto = "SMTP";
+ auth->info = wmem_strdup_printf(pinfo->pool, "Username in packet %u", auth->username_num);
+ tap_queue_packet(credentials_tap, pinfo, auth);
+ } else if (session_state->ntlm_rsp_frame == pinfo->num) {
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &decrypt_len);
+ decrypt[decrypt_len] = 0;
+ } else {
+ decrypt_len = 0;
+ }
+ if (decrypt_len == 0) {
+ /* Go back to the original string */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ decrypt_len = linelen;
+ col_append_str(pinfo->cinfo, COL_INFO, format_text(pinfo->pool, decrypt, linelen));
+ proto_tree_add_item(smtp_tree, hf_smtp_command_line, tvb,
+ offset, linelen, ENC_ASCII);
+ }
+ else {
+ base64_string = tvb_get_string_enc(pinfo->pool, tvb, offset, linelen, ENC_ASCII);
+ dissect_ntlm_auth(tvb, pinfo, smtp_tree, base64_string);
+ }
+ }
+ else {
+ col_append_str(pinfo->cinfo, COL_INFO, format_text(pinfo->pool, decrypt, linelen));
+ proto_tree_add_item(smtp_tree, hf_smtp_command_line, tvb,
+ offset, linelen, ENC_ASCII);
+ }
+ } else if (session_state->user_pass_frame == pinfo->num) {
+ decode_plain_auth(tvb, pinfo, smtp_tree, offset, linelen);
+ } else {
+
+ if (linelen >= 4)
+ cmdlen = 4;
+ else
+ cmdlen = linelen;
+
+ /*
+ * Put the command line into the protocol tree.
+ */
+ ti = proto_tree_add_item(smtp_tree, hf_smtp_command_line, tvb,
+ offset, next_offset - offset, ENC_ASCII);
+ cmdresp_tree = proto_item_add_subtree(ti, ett_smtp_cmdresp);
+
+ proto_tree_add_item(cmdresp_tree, hf_smtp_req_command, tvb,
+ offset, cmdlen, ENC_ASCII);
+
+ if ((linelen > 5) && (session_state->username_cmd_frame == pinfo->num) ) {
+ proto_tree_add_item(cmdresp_tree, hf_smtp_req_parameter, tvb,
+ offset + 5, linelen - 5, ENC_ASCII);
+
+ if (linelen >= 11) {
+ if (decrypt == NULL) {
+ /* This line wasn't already decrypted through the state machine */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset + 11, linelen - 11, ENC_ASCII);
+ decrypt_len = linelen - 11;
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &decrypt_len);
+ decrypt[decrypt_len] = 0;
+ } else {
+ decrypt_len = 0;
+ }
+ if (decrypt_len == 0) {
+ /* Go back to the original string */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset + 11, linelen - 11, ENC_ASCII);
+ decrypt_len = linelen - 11;
+ }
+ }
+ }
+ proto_tree_add_string(cmdresp_tree, hf_smtp_username, tvb, offset + 11, linelen - 11, decrypt);
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, 11));
+ col_append_fstr(pinfo->cinfo, COL_INFO, "User: %s", format_text(pinfo->pool, decrypt, decrypt_len));
+ }
+ }
+ else if ((linelen > 5) && (session_state->ntlm_req_frame == pinfo->num) ) {
+ proto_tree_add_item(cmdresp_tree, hf_smtp_req_parameter, tvb,
+ offset + 5, linelen - 5, ENC_ASCII);
+ if (linelen >= 10) {
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset + 10, linelen - 10, ENC_ASCII);
+ decrypt_len = linelen - 10;
+ if (smtp_auth_parameter_decoding_enabled) {
+ if (strlen(decrypt) > 1) {
+ g_base64_decode_inplace(decrypt, &decrypt_len);
+ decrypt[decrypt_len] = 0;
+ } else {
+ decrypt_len = 0;
+ }
+ if (decrypt_len == 0) {
+ /* Go back to the original string */
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset + 10, linelen - 10, ENC_ASCII);
+ decrypt_len = linelen - 10;
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, 10));
+ col_append_str(pinfo->cinfo, COL_INFO, format_text(pinfo->pool, decrypt, linelen - 10));
+ }
+ else {
+ base64_string = tvb_get_string_enc(pinfo->pool, tvb, offset + 10, linelen - 10, ENC_ASCII);
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, 10));
+ dissect_ntlm_auth(tvb, pinfo, cmdresp_tree, format_text(pinfo->pool, base64_string, linelen - 10));
+ }
+ }
+ else {
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, 10));
+ col_append_str(pinfo->cinfo, COL_INFO, format_text(pinfo->pool, decrypt, linelen - 10));
+ }
+ }
+ }
+ else if ((linelen > 5) && (session_state->user_pass_cmd_frame == pinfo->num) ) {
+ proto_tree_add_item(cmdresp_tree, hf_smtp_req_parameter, tvb,
+ offset + 5, linelen - 5, ENC_ASCII);
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, 11));
+ decode_plain_auth(tvb, pinfo, cmdresp_tree, offset + 11, linelen - 11);
+ }
+ else if (linelen > 5) {
+ proto_tree_add_item(cmdresp_tree, hf_smtp_req_parameter, tvb,
+ offset + 5, linelen - 5, ENC_ASCII);
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, linelen));
+ }
+ else {
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, linelen));
+ }
+
+ if (smtp_data_desegment && !spd_frame_data->more_frags) {
+ /* terminate the desegmentation */
+ frag_msg = fragment_end_seq_next(&smtp_data_reassembly_table,
+ pinfo, spd_frame_data->conversation_id, NULL);
+ }
+ }
+ /*
+ * Step past this line.
+ */
+ offset = next_offset;
+ }
+ }
+
+ if (smtp_data_desegment && (spd_frame_data->pdu_type == SMTP_PDU_MESSAGE || spd_frame_data->more_frags == FALSE) ) {
+ /* XXX: fragment_add_seq_next() only supports one PDU with a given ID
+ * being completed in a frame.
+ *
+ * RFCs 2920 and 3030 imply that even with pipelining, a frame only
+ * contains one message that ends, as the client needs to handle
+ * responses. If it does happen, we need to track message numbers within
+ * the conversation and use those as part of the frag ID.
+ */
+ next_tvb = process_reassembled_data(tvb, offset, pinfo, "Reassembled SMTP",
+ frag_msg, &smtp_data_frag_items, NULL, smtp_tree);
+ if (next_tvb) {
+ /* XXX: this is presumptuous - we may have negotiated something else */
+ if (imf_handle) {
+ call_dissector(imf_handle, next_tvb, pinfo, tree);
+ } else {
+ /*
+ * Message body.
+ * Put its lines into the protocol tree, a line at a time.
+ */
+ dissect_smtp_data(tvb, offset, smtp_tree);
+ }
+
+ pinfo->fragmented = FALSE;
+ } else {
+ pinfo->fragmented = TRUE;
+ }
+ }
+ return tvb_captured_length(tvb);
+}
+
+static int
+dissect_smtp_response(tvbuff_t *tvb, packet_info *pinfo, proto_tree *smtp_tree, struct smtp_session_state *session_state)
+{
+ proto_item *ti, *hidden_item;
+ proto_tree *cmdresp_tree = NULL;
+ int offset = 0;
+ int next_offset;
+ int linelen = 0;
+ guint32 code;
+ guint8 line_code[3];
+ guint8 *decrypt = NULL;
+ gsize decrypt_len = 0;
+ guint8 *base64_string = NULL;
+
+ /*
+ * Process the response, a line at a time, until we hit a line
+ * that doesn't have a continuation indication on it.
+ */
+ hidden_item = proto_tree_add_boolean(smtp_tree, hf_smtp_rsp, tvb, 0, 0, TRUE);
+ proto_item_set_hidden(hidden_item);
+
+ //Multiline information
+ smtp_multiline_state_t multiline_state = SMTP_MULTILINE_NONE;
+ guint32 multiline_code = 0;
+ proto_item* code_item = NULL;
+
+ while (tvb_offset_exists(tvb, offset)) {
+ /*
+ * Find the end of the line.
+ */
+ linelen = tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE);
+
+ if (offset == 0)
+ col_append_str(pinfo->cinfo, COL_INFO, "S: ");
+ else
+ col_append_str(pinfo->cinfo, COL_INFO, " | ");
+
+ if (linelen >= 3) {
+ line_code[0] = tvb_get_guint8(tvb, offset);
+ line_code[1] = tvb_get_guint8(tvb, offset+1);
+ line_code[2] = tvb_get_guint8(tvb, offset+2);
+ if (g_ascii_isdigit(line_code[0]) && g_ascii_isdigit(line_code[1])
+ && g_ascii_isdigit(line_code[2])) {
+ /*
+ * We have a 3-digit response code.
+ */
+ code = (line_code[0] - '0')*100 + (line_code[1] - '0')*10 + (line_code[2] - '0');
+ if ((linelen > 3) && (tvb_get_guint8(tvb, offset + 3) == '-')) {
+ if (multiline_state == SMTP_MULTILINE_NONE) {
+ multiline_state = SMTP_MULTILINE_START;
+ multiline_code = code;
+ } else {
+ multiline_state = SMTP_MULTILINE_CONTINUE;
+ }
+ } else if ((multiline_state == SMTP_MULTILINE_START) || (multiline_state == SMTP_MULTILINE_CONTINUE)) {
+ multiline_state = SMTP_MULTILINE_END;
+ }
+
+ /*
+ * If we're awaiting the response to a STARTTLS code, this
+ * is it - if it's 220, all subsequent traffic will
+ * be TLS, otherwise we're back to boring old SMTP.
+ */
+ if (session_state->smtp_state == SMTP_STATE_AWAITING_STARTTLS_RESPONSE) {
+ if (code == 220) {
+ /* This is the last non-TLS frame. */
+ ssl_starttls_ack(tls_handle, pinfo, smtp_handle);
+ }
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ }
+
+ if (code == 334) {
+ switch(session_state->auth_state)
+ {
+ case SMTP_AUTH_STATE_START:
+ session_state->auth_state = SMTP_AUTH_STATE_USERNAME_REQ;
+ break;
+ case SMTP_AUTH_STATE_USERNAME_RSP:
+ session_state->auth_state = SMTP_AUTH_STATE_PASSWORD_REQ;
+ break;
+ case SMTP_AUTH_STATE_PLAIN_REQ:
+ session_state->auth_state = SMTP_AUTH_STATE_PLAIN_RSP;
+ break;
+ case SMTP_AUTH_STATE_PLAIN_START_REQ:
+ session_state->auth_state = SMTP_AUTH_STATE_PLAIN_REQ;
+ break;
+ case SMTP_AUTH_STATE_NTLM_REQ:
+ session_state->auth_state = SMTP_AUTH_STATE_NTLM_CHALLANGE;
+ break;
+ case SMTP_AUTH_STATE_NONE:
+ case SMTP_AUTH_STATE_USERNAME_REQ:
+ case SMTP_AUTH_STATE_PASSWORD_REQ:
+ case SMTP_AUTH_STATE_PASSWORD_RSP:
+ case SMTP_AUTH_STATE_PLAIN_RSP:
+ case SMTP_AUTH_STATE_PLAIN_CRED_REQ:
+ case SMTP_AUTH_STATE_NTLM_RSP:
+ case SMTP_AUTH_STATE_NTLM_CHALLANGE:
+ case SMTP_AUTH_STATE_SUCCESS:
+ case SMTP_AUTH_STATE_FAILED:
+ /* ignore */
+ break;
+ }
+ } else if ((session_state->auth_state == SMTP_AUTH_STATE_PASSWORD_RSP) ||
+ ( session_state->auth_state == SMTP_AUTH_STATE_PLAIN_RSP) ||
+ ( session_state->auth_state == SMTP_AUTH_STATE_NTLM_RSP) ||
+ ( session_state->auth_state == SMTP_AUTH_STATE_PLAIN_CRED_REQ) ) {
+ if (code == 235) {
+ session_state->auth_state = SMTP_AUTH_STATE_SUCCESS;
+ } else {
+ session_state->auth_state = SMTP_AUTH_STATE_FAILED;
+ }
+ session_state->last_auth_frame = pinfo->num;
+ }
+
+ /*
+ * Put the response code and parameters into the protocol tree.
+ * Only create a new response tree when not in the middle of multiline response.
+ */
+ if ((multiline_state != SMTP_MULTILINE_CONTINUE) &&
+ (multiline_state != SMTP_MULTILINE_END))
+ {
+ ti = proto_tree_add_item(smtp_tree, hf_smtp_response, tvb,
+ offset, next_offset - offset, ENC_ASCII | ENC_NA);
+ cmdresp_tree = proto_item_add_subtree(ti, ett_smtp_cmdresp);
+
+ code_item = proto_tree_add_uint(cmdresp_tree, hf_smtp_rsp_code, tvb, offset, 3, code);
+ } else if (multiline_code != code) {
+ expert_add_info_format(pinfo, code_item, &ei_smtp_rsp_code, "Unexpected response code %u in multiline response. Expected %u", code, multiline_code);
+ }
+
+ decrypt = NULL;
+ if (linelen >= 4) {
+ if ((smtp_auth_parameter_decoding_enabled) && (code == 334)) {
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, offset + 4, linelen - 4, ENC_ASCII);
+ if (strlen(decrypt) > 1 && (g_base64_decode_inplace(decrypt, &decrypt_len)) && decrypt_len > 0) {
+ decrypt[decrypt_len] = 0;
+ if (g_ascii_strncasecmp(decrypt, "NTLMSSP", 7) == 0) {
+ base64_string = tvb_get_string_enc(pinfo->pool, tvb, offset + 4, linelen - 4, ENC_ASCII);
+ col_append_fstr(pinfo->cinfo, COL_INFO, "%d ", code);
+ proto_tree_add_string(cmdresp_tree, hf_smtp_rsp_parameter, tvb,
+ offset + 4, linelen - 4, (const char*)base64_string);
+ dissect_ntlm_auth(tvb, pinfo, cmdresp_tree, base64_string);
+ }
+ else {
+ proto_tree_add_string(cmdresp_tree, hf_smtp_rsp_parameter, tvb,
+ offset + 4, linelen - 4, (const char*)decrypt);
+
+ col_append_fstr(pinfo->cinfo, COL_INFO, "%d %s", code, format_text(pinfo->pool, decrypt, decrypt_len));
+ }
+ } else {
+ decrypt = NULL;
+ }
+ }
+
+ if (decrypt == NULL) {
+ proto_tree_add_item(cmdresp_tree, hf_smtp_rsp_parameter, tvb,
+ offset + 4, linelen - 4, ENC_ASCII);
+
+ if ((multiline_state != SMTP_MULTILINE_CONTINUE) &&
+ (multiline_state != SMTP_MULTILINE_END)) {
+ col_append_fstr(pinfo->cinfo, COL_INFO, "%s",
+ tvb_format_text(pinfo->pool, tvb, offset, linelen));
+ } else {
+ col_append_fstr(pinfo->cinfo, COL_INFO, "%s",
+ tvb_format_text(pinfo->pool, tvb, offset+4, linelen-4));
+ }
+ }
+ } else {
+ col_append_str(pinfo->cinfo, COL_INFO,
+ tvb_format_text(pinfo->pool, tvb, offset, linelen));
+ }
+ }
+
+ //Clear multiline state if this is the last line
+ if (multiline_state == SMTP_MULTILINE_END)
+ multiline_state = SMTP_MULTILINE_NONE;
+ }
+ /*
+ * Step past this line.
+ */
+ offset = next_offset;
+
+ }
+ return offset;
+}
+
+static int
+dissect_smtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
+{
+ struct smtp_proto_data *spd_frame_data;
+ proto_tree *smtp_tree = NULL;
+ proto_item *ti;
+ int offset = 0;
+ int request = 0;
+ conversation_t *conversation;
+ struct smtp_session_state *session_state;
+ const guchar *line, *linep, *lineend;
+ int linelen = 0;
+ gboolean eom_seen = FALSE;
+ gint next_offset;
+ gint loffset = 0;
+ int cmdlen;
+ guint8 *decrypt = NULL;
+ gsize decrypt_len = 0;
+
+ /* As there is no guarantee that we will only see frames in the
+ * the SMTP conversation once, and that we will see them in
+ * order - in Wireshark, the user could randomly click on frames
+ * in the conversation in any order in which they choose - we
+ * have to store information with each frame indicating whether
+ * it contains commands or data or an EOM indication.
+ *
+ * XXX - what about frames that contain *both*? TCP is a
+ * byte-stream protocol, and there are no guarantees that
+ * TCP segment boundaries will correspond to SMTP commands
+ * or EOM indications.
+ *
+ * We only need that for the client->server stream; responses
+ * are easy to manage.
+ *
+ * If we have per frame data, use that, else, we must be on the first
+ * pass, so we figure it out on the first pass.
+ */
+
+ /*
+ * Find or create the conversation for this.
+ */
+ conversation = find_or_create_conversation(pinfo);
+
+ /*
+ * Is there a request structure attached to this conversation?
+ */
+ session_state = (struct smtp_session_state *)conversation_get_proto_data(conversation, proto_smtp);
+ if (!session_state) {
+ /*
+ * No - create one and attach it.
+ */
+ session_state = wmem_new0(wmem_file_scope(), struct smtp_session_state);
+ session_state->smtp_state = SMTP_STATE_START;
+ session_state->auth_state = SMTP_AUTH_STATE_NONE;
+ session_state->msg_last = TRUE;
+
+ conversation_add_proto_data(conversation, proto_smtp, session_state);
+ }
+
+ /* Is this a request or a response? */
+ request = pinfo->destport == pinfo->match_uint;
+
+ /*
+ * Is there any data attached to this frame?
+ */
+ spd_frame_data = (struct smtp_proto_data *)p_get_proto_data(wmem_file_scope(), pinfo, proto_smtp, 0);
+
+ if (!spd_frame_data) {
+
+ /*
+ * No frame data.
+ */
+ if (request) {
+
+ /*
+ * Create a frame data structure and attach it to the packet.
+ */
+ spd_frame_data = wmem_new0(wmem_file_scope(), struct smtp_proto_data);
+
+ spd_frame_data->conversation_id = conversation->conv_index;
+ spd_frame_data->more_frags = TRUE;
+ spd_frame_data->end_offset = tvb_reported_length(tvb);
+
+ p_add_proto_data(wmem_file_scope(), pinfo, proto_smtp, 0, spd_frame_data);
+
+ }
+
+ /*
+ * Get the first line from the buffer.
+ *
+ * Note that "tvb_find_line_end()" will, if it doesn't return
+ * -1, return a value that is not longer than what's in the buffer,
+ * and "tvb_find_line_end()" will always return a value that is not
+ * longer than what's in the buffer, so the "tvb_get_ptr()" call
+ * won't throw an exception.
+ */
+ loffset = offset;
+ while (tvb_offset_exists(tvb, loffset)) {
+ linelen = tvb_find_line_end(tvb, loffset, -1, &next_offset,
+ smtp_desegment && pinfo->can_desegment);
+ if (linelen == -1) {
+ if (offset == loffset) {
+ /*
+ * We didn't find a line ending, and we're doing desegmentation;
+ * tell the TCP dissector where the data for this message starts
+ * in the data it handed us, and tell it we need more bytes
+ */
+ pinfo->desegment_offset = loffset;
+ pinfo->desegment_len = DESEGMENT_ONE_MORE_SEGMENT;
+ return tvb_captured_length(tvb);
+ } else {
+ linelen = tvb_reported_length_remaining(tvb, loffset);
+ next_offset = loffset + linelen;
+ }
+ }
+
+ /*
+ * Check whether or not this packet is an end of message packet
+ * We should look for CRLF.CRLF and they may be split.
+ * We have to keep in mind that we may see what we want on
+ * two passes through here ...
+ */
+ if (request) {
+ /*
+ * The order of these is important ... We want to avoid
+ * cases where there is a CRLF at the end of a packet and a
+ * .CRLF at the beginning of the same packet.
+ */
+ if (session_state->crlf_seen && tvb_strneql(tvb, loffset, ".\r\n", 3) == 0)
+ eom_seen = TRUE;
+
+ if (tvb_strneql(tvb, next_offset-2, "\r\n", 2) == 0) {
+ session_state->crlf_seen = TRUE;
+ } else {
+ session_state->crlf_seen = FALSE;
+ }
+ }
+
+ /*
+ * OK, Check if we have seen a DATA request. We do it here for
+ * simplicity, but we have to be careful below.
+ */
+ if (request) {
+ if (session_state->smtp_state == SMTP_STATE_READING_DATA) {
+ /*
+ * This is message data.
+ */
+ if (eom_seen) { /* Seen the EOM */
+ /*
+ * EOM.
+ * Everything that comes before it is a message.
+ * Everything that comes after it is commands.
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_MESSAGE;
+ spd_frame_data->more_frags = FALSE;
+ spd_frame_data->end_offset = loffset;
+
+ spd_frame_data = append_pdu(spd_frame_data);
+ spd_frame_data->pdu_type = SMTP_PDU_EOM;
+ spd_frame_data->end_offset = next_offset;
+
+ spd_frame_data = append_pdu(spd_frame_data);
+ spd_frame_data->end_offset = tvb_reported_length(tvb);
+
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ } else {
+ /*
+ * Message data with no EOM.
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_MESSAGE;
+
+ if (session_state->msg_tot_len > 0) {
+ /*
+ * We are handling a BDAT message.
+ * Check if we have reached end of the data chunk.
+ */
+
+ guint32 msg_len = MIN((guint32)tvb_reported_length_remaining(tvb, loffset), (session_state->msg_tot_len - session_state->msg_read_len));
+ session_state->msg_read_len += msg_len;
+ /*
+ * Since we're grabbing the rest of the packet or the data chunk,
+ * update the offset accordingly.
+ */
+ next_offset = loffset + msg_len;
+ spd_frame_data->end_offset = next_offset;
+
+ if (session_state->msg_read_len == session_state->msg_tot_len) {
+ /*
+ * We have reached end of BDAT data chunk.
+ * Everything that comes after this is commands.
+ */
+
+ if (session_state->msg_last) {
+ /*
+ * We have found the LAST data chunk.
+ * The message can now be reassembled.
+ */
+ spd_frame_data->more_frags = FALSE;
+ }
+
+ spd_frame_data = append_pdu(spd_frame_data);
+ spd_frame_data->end_offset = tvb_reported_length(tvb);
+
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ }
+ }
+ }
+ } else {
+ /*
+ * This is commands - unless the capture started in the
+ * middle of a session, and we're in the middle of data.
+ *
+ * Commands are not necessarily 4 characters; look
+ * for a space or the end of the line to see where
+ * the putative command ends.
+ */
+ if ((session_state->auth_state != SMTP_AUTH_STATE_NONE) &&
+ (pinfo->num >= session_state->first_auth_frame) &&
+ ((session_state->last_auth_frame == 0) || (pinfo->num <= session_state->last_auth_frame))) {
+ decrypt = tvb_get_string_enc(pinfo->pool, tvb, loffset, linelen, ENC_ASCII);
+ if ((smtp_auth_parameter_decoding_enabled) &&
+ (strlen(decrypt) > 1) &&
+ (g_base64_decode_inplace(decrypt, &decrypt_len)) &&
+ (decrypt_len > 0)) {
+ decrypt[decrypt_len] = 0;
+ line = decrypt;
+ linelen = (int)decrypt_len;
+ } else {
+ line = tvb_get_ptr(tvb, loffset, linelen);
+ decrypt_len = linelen;
+ }
+ } else {
+ line = tvb_get_ptr(tvb, loffset, linelen);
+ }
+
+ linep = line;
+ lineend = line + linelen;
+ while (linep < lineend && *linep != ' ')
+ linep++;
+ cmdlen = (int)(linep - line);
+ if (line_is_smtp_command(line, cmdlen)) {
+ if (g_ascii_strncasecmp(line, "DATA", 4) == 0) {
+ /*
+ * DATA command.
+ * This is a command, but everything that comes after it,
+ * until an EOM, is data.
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_DATA;
+ session_state->data_seen = TRUE;
+ } else if (g_ascii_strncasecmp(line, "BDAT", 4) == 0) {
+ /*
+ * BDAT command.
+ * This is a command, but everything that comes after it,
+ * until given length is received, is data.
+ */
+ guint32 msg_len;
+
+ msg_len = (guint32)strtoul (line+5, NULL, 10);
+
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+
+ session_state->data_seen = TRUE;
+ session_state->msg_tot_len += msg_len;
+
+ if (g_ascii_strncasecmp(line+linelen-4, "LAST", 4) == 0) {
+ /*
+ * This is the last data chunk.
+ */
+ session_state->msg_last = TRUE;
+
+ if (msg_len == 0) {
+ /*
+ * No more data to expect.
+ * The message can now be reassembled.
+ */
+ spd_frame_data->more_frags = FALSE;
+ }
+ } else {
+ session_state->msg_last = FALSE;
+ }
+
+ if (msg_len == 0) {
+ /* No data to read, next will be another command */
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ } else {
+ session_state->smtp_state = SMTP_STATE_READING_DATA;
+ spd_frame_data->end_offset = next_offset;
+
+ spd_frame_data = append_pdu(spd_frame_data);
+ spd_frame_data->end_offset = tvb_reported_length(tvb);
+ }
+ } else if (g_ascii_strncasecmp(line, "RSET", 4) == 0) {
+ /*
+ * RSET command.
+ * According to RFC 3030, the RSET command clears all BDAT
+ * segments and resets the transaction. It is possible to
+ * use DATA and BDAT in the same session, so long as they
+ * are not mixed in the same transaction.
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->msg_last = TRUE;
+ session_state->msg_tot_len = 0;
+ session_state->msg_read_len = 0;
+ } else if ((g_ascii_strncasecmp(line, "AUTH LOGIN", 10) == 0) && (linelen <= 11)) {
+ /*
+ * AUTH LOGIN command.
+ * Username is in a separate frame
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ session_state->auth_state = SMTP_AUTH_STATE_START;
+ session_state->first_auth_frame = pinfo->num;
+ } else if ((g_ascii_strncasecmp(line, "AUTH LOGIN", 10) == 0) && (linelen > 11)) {
+ /*
+ * AUTH LOGIN command.
+ * Username follows the 'AUTH LOGIN' string
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ session_state->auth_state = SMTP_AUTH_STATE_USERNAME_RSP;
+ session_state->first_auth_frame = pinfo->num;
+ session_state->username_cmd_frame = pinfo->num;
+ } else if ((g_ascii_strncasecmp(line, "AUTH PLAIN", 10) == 0) && (linelen <= 11)) {
+ /*
+ * AUTH PLAIN command.
+ * Username and Password is in one separate frame
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ session_state->auth_state = SMTP_AUTH_STATE_PLAIN_START_REQ;
+ session_state->first_auth_frame = pinfo->num;
+ } else if ((g_ascii_strncasecmp(line, "AUTH PLAIN", 10) == 0) && (linelen > 11)) {
+ /*
+ * AUTH PLAIN command.
+ * Username and Password follows the 'AUTH PLAIN' string
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ session_state->auth_state = SMTP_AUTH_STATE_PLAIN_CRED_REQ;
+ session_state->first_auth_frame = pinfo->num;
+ session_state->user_pass_cmd_frame = pinfo->num;
+ } else if ((g_ascii_strncasecmp(line, "AUTH NTLM", 9) == 0) && (linelen > 10)) {
+ /*
+ * AUTH NTLM command with nlmssp request
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ session_state->smtp_state = SMTP_STATE_READING_CMDS;
+ session_state->auth_state = SMTP_AUTH_STATE_NTLM_REQ;
+ session_state->ntlm_req_frame = pinfo->num;
+ } else if (g_ascii_strncasecmp(line, "STARTTLS", 8) == 0) {
+ /*
+ * STARTTLS command.
+ * This is a command, but if the response is 220,
+ * everything after the response is TLS.
+ */
+ session_state->smtp_state = SMTP_STATE_AWAITING_STARTTLS_RESPONSE;
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ } else {
+ /*
+ * Regular command.
+ */
+ spd_frame_data->pdu_type = SMTP_PDU_CMD;
+ }
+ } else if (session_state->auth_state == SMTP_AUTH_STATE_USERNAME_REQ) {
+ session_state->auth_state = SMTP_AUTH_STATE_USERNAME_RSP;
+ session_state->username_frame = pinfo->num;
+ } else if (session_state->auth_state == SMTP_AUTH_STATE_PASSWORD_REQ) {
+ session_state->auth_state = SMTP_AUTH_STATE_PASSWORD_RSP;
+ session_state->password_frame = pinfo->num;
+ } else if (session_state->auth_state == SMTP_AUTH_STATE_PLAIN_REQ) {
+ session_state->auth_state = SMTP_AUTH_STATE_PLAIN_RSP;
+ session_state->user_pass_frame = pinfo->num;
+ } else if (session_state->auth_state == SMTP_AUTH_STATE_NTLM_CHALLANGE) {
+ session_state->auth_state = SMTP_AUTH_STATE_NTLM_RSP;
+ session_state->ntlm_rsp_frame = pinfo->num;
+ }
+ else {
+
+ /*
+ * Assume it's message data.
+ */
+ spd_frame_data->pdu_type = (session_state->data_seen || (session_state->smtp_state == SMTP_STATE_START)) ? SMTP_PDU_MESSAGE : SMTP_PDU_CMD;
+ }
+ }
+ }
+
+ /*
+ * Step past this line.
+ */
+ loffset = next_offset;
+ }
+ }
+
+
+ /*
+ * From here, we simply add items to the tree and info to the info
+ * fields ...
+ */
+
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "SMTP");
+ col_clear(pinfo->cinfo, COL_INFO);
+
+ ti = proto_tree_add_item(tree, proto_smtp, tvb, offset, -1, ENC_NA);
+ smtp_tree = proto_item_add_subtree(ti, ett_smtp);
+
+ if (request) {
+ /*
+ * Check out whether or not we can see a command in there ...
+ * What we are looking for is not data_seen and the word DATA
+ * and not eom_seen.
+ *
+ * We will see DATA and session_state->data_seen when we process the
+ * tree view after we have seen a DATA packet when processing
+ * the packet list pane.
+ *
+ * On the first pass, we will not have any info on the packets
+ * On second and subsequent passes, we will.
+ */
+ spd_frame_data = (struct smtp_proto_data *)p_get_proto_data(wmem_file_scope(), pinfo, proto_smtp, 0);
+ offset = 0;
+ while (spd_frame_data != NULL && tvb_reported_length_remaining(tvb, offset)) {
+ DISSECTOR_ASSERT_CMPINT(offset, <=, spd_frame_data->end_offset);
+ dissect_smtp_request(tvb_new_subset_length(tvb, offset, spd_frame_data->end_offset - offset), pinfo, tree, smtp_tree, session_state, spd_frame_data, (offset == 0));
+ offset = spd_frame_data->end_offset;
+ spd_frame_data = spd_frame_data->next;
+ }
+ } else {
+ dissect_smtp_response(tvb, pinfo, smtp_tree, session_state);
+ }
+
+ return tvb_captured_length(tvb);
+}
+
+
+/* Register all the bits needed by the filtering engine */
+
+void
+proto_register_smtp(void)
+{
+ static hf_register_info hf[] = {
+ { &hf_smtp_req,
+ { "Request", "smtp.req",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_rsp,
+ { "Response", "smtp.rsp",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_message,
+ { "Message", "smtp.message",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_command_line,
+ { "Command Line", "smtp.command_line",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_req_command,
+ { "Command", "smtp.req.command",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_req_parameter,
+ { "Request parameter", "smtp.req.parameter",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_response,
+ { "Response", "smtp.response",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_rsp_code,
+ { "Response code", "smtp.response.code",
+ FT_UINT32, BASE_DEC|BASE_EXT_STRING, &response_codes_vs_ext, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_rsp_parameter,
+ { "Response parameter", "smtp.rsp.parameter",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_username,
+ { "Username", "smtp.auth.username",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_password,
+ { "Password", "smtp.auth.password",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_username_password,
+ { "Username/Password", "smtp.auth.username_password",
+ FT_STRING, BASE_NONE, NULL, 0x0, NULL, HFILL }},
+
+ { &hf_smtp_eom,
+ { "EOM", "smtp.eom",
+ FT_NONE, BASE_NONE, NULL, 0x00, NULL, HFILL } },
+
+ /* Fragment entries */
+ { &hf_smtp_data_fragments,
+ { "DATA fragments", "smtp.data.fragments",
+ FT_NONE, BASE_NONE, NULL, 0x00, "Message fragments", HFILL } },
+
+ { &hf_smtp_data_fragment,
+ { "DATA fragment", "smtp.data.fragment",
+ FT_FRAMENUM, BASE_NONE, NULL, 0x00, "Message fragment", HFILL } },
+
+ { &hf_smtp_data_fragment_overlap,
+ { "DATA fragment overlap", "smtp.data.fragment.overlap", FT_BOOLEAN,
+ BASE_NONE, NULL, 0x0, "Message fragment overlap", HFILL } },
+
+ { &hf_smtp_data_fragment_overlap_conflicts,
+ { "DATA fragment overlapping with conflicting data",
+ "smtp.data.fragment.overlap.conflicts", FT_BOOLEAN, BASE_NONE, NULL,
+ 0x0, "Message fragment overlapping with conflicting data", HFILL } },
+
+ { &hf_smtp_data_fragment_multiple_tails,
+ { "DATA has multiple tail fragments", "smtp.data.fragment.multiple_tails",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0, "Message has multiple tail fragments", HFILL } },
+
+ { &hf_smtp_data_fragment_too_long_fragment,
+ { "DATA fragment too long", "smtp.data.fragment.too_long_fragment",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0, "Message fragment too long", HFILL } },
+
+ { &hf_smtp_data_fragment_error,
+ { "DATA defragmentation error", "smtp.data.fragment.error",
+ FT_FRAMENUM, BASE_NONE, NULL, 0x00, "Message defragmentation error", HFILL } },
+
+ { &hf_smtp_data_fragment_count,
+ { "DATA fragment count", "smtp.data.fragment.count",
+ FT_UINT32, BASE_DEC, NULL, 0x00, NULL, HFILL } },
+
+ { &hf_smtp_data_reassembled_in,
+ { "Reassembled DATA in frame", "smtp.data.reassembled.in",
+ FT_FRAMENUM, BASE_NONE, NULL, 0x00, "This DATA fragment is reassembled in this frame", HFILL } },
+
+ { &hf_smtp_data_reassembled_length,
+ { "Reassembled DATA length", "smtp.data.reassembled.length",
+ FT_UINT32, BASE_DEC, NULL, 0x00, "The total length of the reassembled payload", HFILL } },
+ };
+ static gint *ett[] = {
+ &ett_smtp,
+ &ett_smtp_cmdresp,
+ &ett_smtp_data_fragment,
+ &ett_smtp_data_fragments,
+
+ };
+
+ static ei_register_info ei[] = {
+ { &ei_smtp_base64_decode, { "smtp.base64_decode", PI_PROTOCOL, PI_WARN, "base64 decode failed or is not enabled (check SMTP preferences)", EXPFILL }},
+ { &ei_smtp_rsp_code,{ "smtp.response.code.unexpected", PI_PROTOCOL, PI_WARN, "Unexpected response code in multiline response", EXPFILL } },
+ };
+
+ module_t *smtp_module;
+ expert_module_t* expert_smtp;
+
+ proto_smtp = proto_register_protocol("Simple Mail Transfer Protocol",
+ "SMTP", "smtp");
+
+ proto_register_field_array(proto_smtp, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+ expert_smtp = expert_register_protocol(proto_smtp);
+ expert_register_field_array(expert_smtp, ei, array_length(ei));
+ reassembly_table_register(&smtp_data_reassembly_table,
+ &addresses_ports_reassembly_table_functions);
+
+ /* Allow dissector to find be found by name. */
+ smtp_handle = register_dissector("smtp", dissect_smtp, proto_smtp);
+
+ /* Preferences */
+ smtp_module = prefs_register_protocol(proto_smtp, NULL);
+ prefs_register_bool_preference(smtp_module, "desegment_lines",
+ "Reassemble SMTP command and response lines spanning multiple TCP segments",
+ "Whether the SMTP dissector should reassemble command and response lines"
+ " spanning multiple TCP segments. To use this option, you must also enable "
+ "\"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.",
+ &smtp_desegment);
+
+ prefs_register_bool_preference(smtp_module, "desegment_data",
+ "Reassemble SMTP DATA commands spanning multiple TCP segments",
+ "Whether the SMTP dissector should reassemble DATA command and lines"
+ " spanning multiple TCP segments. To use this option, you must also enable "
+ "\"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.",
+ &smtp_data_desegment);
+
+ prefs_register_bool_preference(smtp_module, "decryption",
+ "Decode Base64 encoded AUTH parameters",
+ "Whether the SMTP dissector should decode Base64 encoded AUTH parameters",
+ &smtp_auth_parameter_decoding_enabled);
+
+ credentials_tap = register_tap("credentials"); /* credentials tap */
+}
+
+/* The registration hand-off routine */
+void
+proto_reg_handoff_smtp(void)
+{
+ dissector_add_uint_range_with_preference("tcp.port", TCP_PORT_SMTP, smtp_handle);
+ ssl_dissector_add(TCP_PORT_SSL_SMTP, smtp_handle);
+ /* No "auto" preference since handle is shared with SMTP */
+ dissector_add_uint("tcp.port", TCP_PORT_SUBMISSION, smtp_handle);
+
+ /* find the IMF dissector */
+ imf_handle = find_dissector_add_dependency("imf", proto_smtp);
+
+ /* find the TLS dissector */
+ tls_handle = find_dissector_add_dependency("tls", proto_smtp);
+
+ /* find the NTLM dissector */
+ ntlmssp_handle = find_dissector_add_dependency("ntlmssp", proto_smtp);
+
+ /* find the data-text-lines dissector */
+ data_text_lines_handle = find_dissector_add_dependency("data-text-lines", proto_smtp);
+}
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 2
+ * tab-width: 8
+ * indent-tabs-mode: nil
+ * End:
+ *
+ * vi: set shiftwidth=2 tabstop=8 expandtab:
+ * :indentSize=2:tabSize=8:noTabs=true
+ */