diff options
Diffstat (limited to 'epan/dissectors/packet-ftp.c')
-rw-r--r-- | epan/dissectors/packet-ftp.c | 1892 |
1 files changed, 1892 insertions, 0 deletions
diff --git a/epan/dissectors/packet-ftp.c b/epan/dissectors/packet-ftp.c new file mode 100644 index 00000000..c53781a9 --- /dev/null +++ b/epan/dissectors/packet-ftp.c @@ -0,0 +1,1892 @@ +/* packet-ftp.c + * Routines for ftp packet dissection + * Copyright 1999, Richard Sharpe <rsharpe@ns.aus.com> + * Copyright 2001, Juan Toledo <toledo@users.sourceforge.net> (Passive FTP) + * + * Wireshark - Network traffic analyzer + * By Gerald Combs <gerald@wireshark.org> + * Copyright 1998 Gerald Combs + * + * Copied from packet-pop.c + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "config.h" + +#include <stdio.h> /* for sscanf() */ +#include <wsutil/strtoi.h> + +#include <epan/packet.h> +#include <epan/strutil.h> +#include <epan/conversation.h> +#include <epan/expert.h> +#include <epan/addr_resolv.h> +#include <epan/proto_data.h> +#include "packet-acdr.h" + +#include <tap.h> +#include <epan/export_object.h> +#include <ui/tap-credentials.h> + +#include "packet-tls.h" +#include "packet-tls-utils.h" + +void proto_register_ftp(void); +void proto_reg_handoff_ftp(void); + +static int credentials_tap = -1; + +static int proto_ftp = -1; +static int proto_ftp_data = -1; +static int hf_ftp_current_working_directory = -1; +static int hf_ftp_response = -1; +static int hf_ftp_request = -1; +static int hf_ftp_request_command = -1; +static int hf_ftp_request_arg = -1; +static int hf_ftp_response_code = -1; +static int hf_ftp_response_arg = -1; +static int hf_ftp_pasv_ip = -1 ; +static int hf_ftp_pasv_port = -1; +static int hf_ftp_pasv_nat = -1; +static int hf_ftp_active_ip = -1; +static int hf_ftp_active_port = -1; +static int hf_ftp_active_nat = -1; +static int hf_ftp_eprt_af = -1; +static int hf_ftp_eprt_ip = -1; +static int hf_ftp_eprt_ipv6 = -1; +static int hf_ftp_eprt_port = -1; +static int hf_ftp_epsv_ip = -1; +static int hf_ftp_epsv_ipv6 = -1; +static int hf_ftp_epsv_port = -1; +static int hf_ftp_command_response_frames = -1; +static int hf_ftp_command_response_bytes = -1; +static int hf_ftp_command_response_first_frame_num = -1; +static int hf_ftp_command_response_last_frame_num = -1; +static int hf_ftp_command_response_duration = -1; +static int hf_ftp_command_response_kbps = -1; +static int hf_ftp_command_setup_frame = -1; +static int hf_ftp_command_command_frame = -1; +static int hf_ftp_command_command = -1; + +static int hf_ftp_data_setup_frame = -1; +static int hf_ftp_data_setup_method = -1; +static int hf_ftp_data_command = -1; +static int hf_ftp_data_command_frame = -1; +static int hf_ftp_data_current_working_directory = -1; + +static gint ett_ftp = -1; +static gint ett_ftp_reqresp = -1; + +static expert_field ei_ftp_eprt_args_invalid = EI_INIT; +static expert_field ei_ftp_epsv_args_invalid = EI_INIT; +static expert_field ei_ftp_response_code_invalid = EI_INIT; +static expert_field ei_ftp_pwd_response_invalid = EI_INIT; + +static int ftp_eo_tap = -1; + +static dissector_handle_t ftpdata_handle; +static dissector_handle_t ftp_handle; +static dissector_handle_t data_text_lines_handle; +static dissector_handle_t tls_handle; + +#define TCP_PORT_FTPDATA 20 +#define TCP_PORT_FTP 21 + +static const value_string response_table[] = { + { 110, "Restart marker reply" }, + { 120, "Service ready in nnn minutes" }, + { 125, "Data connection already open; transfer starting" }, + { 150, "File status okay; about to open data connection" }, + { 200, "Command okay" }, + { 202, "Command not implemented, superfluous at this site" }, + { 211, "System status, or system help reply" }, + { 212, "Directory status" }, + { 213, "File status" }, + { 214, "Help message" }, + { 215, "NAME system type" }, + { 220, "Service ready for new user" }, + { 221, "Service closing control connection" }, + { 225, "Data connection open; no transfer in progress" }, + { 226, "Closing data connection" }, + { 227, "Entering Passive Mode" }, + { 229, "Entering Extended Passive Mode" }, + { 230, "User logged in, proceed" }, + { 232, "User logged in, authorized by security data exchange" }, + { 234, "Security data exchange complete" }, + { 235, "Security data exchange completed successfully" }, + { 250, "Requested file action okay, completed" }, + { 257, "PATHNAME created" }, + { 331, "User name okay, need password" }, + { 332, "Need account for login" }, + { 334, "Requested security mechanism is ok" }, + { 335, "Security data is acceptable, more is required" }, + { 336, "Username okay, need password. Challenge is ..." }, + { 350, "Requested file action pending further information" }, + { 421, "Service not available, closing control connection" }, + { 425, "Can't open data connection" }, + { 426, "Connection closed; transfer aborted" }, + { 431, "Need some unavailable resource to process security" }, + { 450, "Requested file action not taken" }, + { 451, "Requested action aborted: local error in processing" }, + { 452, "Requested action not taken. Insufficient storage space in system" }, + { 500, "Syntax error, command unrecognized" }, + { 501, "Syntax error in parameters or arguments" }, + { 502, "Command not implemented" }, + { 503, "Bad sequence of commands" }, + { 504, "Command not implemented for that parameter" }, + { 522, "Network protocol not supported" }, + { 530, "Not logged in" }, + { 532, "Need account for storing files" }, + { 533, "Command protection level denied for policy reasons" }, + { 534, "Request denied for policy reasons" }, + { 535, "Failed security check (hash, sequence, etc)" }, + { 536, "Requested PROT level not supported by mechanism" }, + { 537, "Command protection level not supported by security mechanism" }, + { 550, "Requested action not taken: File unavailable" }, + { 551, "Requested action aborted: page type unknown" }, + { 552, "Requested file action aborted: Exceeded storage allocation" }, + { 553, "Requested action not taken: File name not allowed" }, + { 631, "Integrity protected reply" }, + { 632, "Confidentiality and integrity protected reply" }, + { 633, "Confidentiality protected reply" }, + { 0, NULL } +}; +static value_string_ext response_table_ext = VALUE_STRING_EXT_INIT(response_table); + +#define EPRT_AF_IPv4 1 +#define EPRT_AF_IPv6 2 +static const value_string eprt_af_vals[] = { + { EPRT_AF_IPv4, "IPv4" }, + { EPRT_AF_IPv6, "IPv6" }, + { 0, NULL } +}; + +/* Used for FTP-DATA's Export Object feature + This will be controlled by the preferences setting "export.maxsize". + It will be used to set the maximum file size for FTP's export + objects (in megabytes). Use 0 for no limit. + */ +static guint pref_export_maxsize = 0; + +typedef struct _ftp_eo_t { + gchar *command; /* Command this data stream answers (e.g., RETR foo.txt) */ + guint32 command_frame; /* Where command for this data was seen */ + guint32 payload_len; /* Length of packet's data */ + gchar *payload_data; /* Packet's data */ +} ftp_eo_t; + +/* Stores mappings of the command packet number to the export object + table's row number, so we can append data from later FTP packets + to the entries. + */ +GHashTable *command_packet_to_eo_row = NULL; + +/* Track which row number in the export object table we're up to */ +guint32 eo_row_count = 0; + +/** + * This is the callback passed to register_export_object() + * as the tap processing function. It will be called each time + * tap_queue_packet() sends a packet to the export objects tap. + * + * The general approach is that when a file transfer begins, + * besides storing the standard export object data, like + * the source system, filename, data, and length, + * an entry is added to the command_packet_to_eo_row hashtable, + * mapping the FTP command packet's number to the + * export object list's row number. + * + * When a later packet has a command packet number + * that's already present in the command_packet_to_eo_row hashtable, + * we detect that's it's a continuation of a previous + * file transfer, so we look up the associated entry in the export + * object list and append the data to there. + * + * FTP is complex in that there's no guarantee that the file transmission + * was completely captured. It might be possible to infer a successful + * transfer with either the "SIZE" command or with a 226 response code + * (indicating that the STOR or RETR command was succesful), but there + * is no guarantee that either of these are present. As such, this + * implementation takes a best-effort approach of simply appending + * all associated ftp-data packets to the export objects entry. + */ +static tap_packet_status +ftp_eo_packet(void *tapdata, packet_info *pinfo, epan_dissect_t *edt _U_, const void *data, tap_flags_t flags _U_) +{ + export_object_list_t *object_list = (export_object_list_t *)tapdata; + const ftp_eo_t *eo_info = (const ftp_eo_t *)data; + + if(eo_info) { /* We have data waiting for us */ + /* Only export files transferred with STOR or RETR*/ + if (strncmp(eo_info->command, "STOR", 4) != 0 && strncmp(eo_info->command, "RETR", 4) != 0) { + return TAP_PACKET_DONT_REDRAW; /* State unchanged - no window updates needed */ + } + /* Create the command_packet_to_eo_row hashtable for mapping the FTP + command packet's number to the export object list's row number */ + if(command_packet_to_eo_row == NULL) { + command_packet_to_eo_row = g_hash_table_new(g_direct_hash, g_direct_equal); + } + if (!g_hash_table_contains(command_packet_to_eo_row, GUINT_TO_POINTER(eo_info->command_frame))) { + /* Command packet not previously seen. Create the new entry in the hashtable. */ + export_object_entry_t *entry = g_new(export_object_entry_t, 1); + entry->pkt_num = pinfo->num; + /* If the command is STOR, the transfer is from the client to the server + If the command is RETR, the transfer is from the server to the client + However, ftp-data will always have the file's origin as pinfo->src */ + entry->hostname = g_strdup(address_to_str(pinfo->pool, &pinfo->src)); + entry->content_type = g_strdup("FTP file"); + + /* Remove the "STOR " or "RETR " to extract the filename */ + if (strlen(eo_info->command) > 5){ + entry->filename = g_strdup(eo_info->command + 5); + } else { + entry->filename = g_strdup("(MISSING)"); + } + + gsize bytes_to_copy; + if (pref_export_maxsize != 0 && (eo_info->payload_len > pref_export_maxsize*1024*1024)) { + bytes_to_copy = pref_export_maxsize*1024*1024; + } + else { + bytes_to_copy = eo_info->payload_len; + } + entry->payload_len = bytes_to_copy; + entry->payload_data = (guint8 *)g_memdup2(eo_info->payload_data, bytes_to_copy); + + /* Add the mapping of the command frame and the export object + list's row number to the hash table */ + g_hash_table_insert(command_packet_to_eo_row, GUINT_TO_POINTER(eo_info->command_frame), GUINT_TO_POINTER(eo_row_count)); + eo_row_count += 1; + object_list->add_entry(object_list->gui_data, entry); + } else { + /* This command packet number is already present in the + command_packet_to_eo_row hashtable, so it's a continuation of + a previous. Let's look up the entry in the export + object list and append the data to there */ + guint32 row_num = GPOINTER_TO_UINT(g_hash_table_lookup(command_packet_to_eo_row, GUINT_TO_POINTER(eo_info->command_frame))); + export_object_entry_t *entry = object_list->get_entry(object_list->gui_data, row_num); + + gsize bytes_to_copy; + if (pref_export_maxsize != 0 && (entry->payload_len + eo_info->payload_len) > pref_export_maxsize*1024*1024) { + bytes_to_copy = pref_export_maxsize*1024*1024 - entry->payload_len; + } + else { + bytes_to_copy = eo_info->payload_len; + } + + entry->payload_data = (guint8 *) g_realloc(entry->payload_data, entry->payload_len + bytes_to_copy); + memcpy(entry->payload_data + entry->payload_len, eo_info->payload_data, bytes_to_copy); + entry->payload_len = entry->payload_len + bytes_to_copy; + } + /* payload_data will be freed when the Export Object window is closed. */ + return TAP_PACKET_REDRAW; /* State changed - window should be redrawn */ + } else { + return TAP_PACKET_DONT_REDRAW; /* State unchanged - no window updates needed */ + } +} + +/** + * This is the callback passed to register_export_object() + * as the reset_cb. This will be used in the export_object module + * to cleanup any previous private data of the export object functionality + * before performing the eo_reset function or when the window closes */ +static void +ftp_eo_cleanup(void) +{ + if(command_packet_to_eo_row != NULL) { + g_hash_table_destroy(command_packet_to_eo_row); + command_packet_to_eo_row = NULL; + } + eo_row_count = 0; +} + + + +/********************************************************************/ +/* Storing session state and linking between control (ftp) and data */ +/* data (ftp-data) conversations */ + +typedef struct ftp_data_conversation_t +{ + const gchar *command; /* Command that this data answers */ + guint32 command_frame; /* Frame command was seen */ + const gchar *setup_method; /* Type of command used to set up data conversation */ + guint32 setup_frame; /* Frame where this happened */ + wmem_strbuf_t *current_working_directory; + + /* Summary details of stream to show in command frame. */ + guint first_frame_num; + nstime_t first_frame_time; + guint last_frame_num; + nstime_t last_frame_time; + guint frames_seen; + guint bytes_seen; +} ftp_data_conversation_t; + +/* Data to associate with individual FTP frame */ +typedef struct ftp_packet_data_t +{ + wmem_strbuf_t *current_working_directory; +} ftp_packet_data_t; + +/* State of FTP conversation */ +typedef struct ftp_conversation_t +{ + const gchar *last_command; /* Most recent request command seen (on first pass) */ + guint32 last_command_frame; /* When request was seen */ + wmem_strbuf_t *current_working_directory; + ftp_data_conversation_t *current_data_conv; /* Current data conversation (during first pass) */ + guint32 current_data_setup_frame; + gchar *username; + guint username_pkt_num; + gboolean tls_requested; +} ftp_conversation_t; + +/* For a given packet, retrieve or initialise a new conversation, and return it */ +static ftp_conversation_t *find_or_create_ftp_conversation(packet_info *pinfo) +{ + /* Create control conversation if necessary */ + conversation_t *conv = find_or_create_conversation(pinfo); + ftp_conversation_t *p_ftp_conv; + + /* Control conversation data */ + p_ftp_conv = (ftp_conversation_t *)conversation_get_proto_data(conv, proto_ftp); + if (!p_ftp_conv) { + p_ftp_conv = wmem_new0(wmem_file_scope(), ftp_conversation_t); + /* Start with an empty string - assume relative path unless/until find out differently. */ + p_ftp_conv->current_working_directory = wmem_strbuf_new(wmem_file_scope(), ""); + conversation_add_proto_data(conv, proto_ftp, p_ftp_conv); + } + + return p_ftp_conv; +} + +/* Keep track of ftp_data_conversation_t*, keyed by the ftp command frame */ +static GHashTable *ftp_command_to_data_hash = NULL; + + +/* When new data conversation is being created, should: + * - create data conversation + * - create control conversation, and have it point at control conversation + */ +static void create_and_link_data_conversation(packet_info *pinfo, + address *addr_a, + guint16 port_a, + address *addr_b, + guint16 port_b, + const char *method) +{ + /* Only to do on first pass */ + if (pinfo->fd->visited) { + return; + } + + ftp_conversation_t *p_ftp_conv = find_or_create_ftp_conversation(pinfo); + + /* Create data conversation and set dissector */ + ftp_data_conversation_t *p_ftp_data_conv; + conversation_t *data_conversation = conversation_new(pinfo->num, + addr_a, addr_b, + CONVERSATION_TCP, + port_a, port_b, + NO_PORT2); + conversation_set_dissector(data_conversation, ftpdata_handle); + + /* Allocate data for data conversation. Note that control conversation will update it with commands. */ + p_ftp_data_conv = wmem_new0(wmem_file_scope(), ftp_data_conversation_t); + /* Set method */ + p_ftp_data_conv->setup_method = method; + /* Copy snapshot of what cwd is at this point */ + p_ftp_data_conv->current_working_directory = p_ftp_conv->current_working_directory; + + /* Point control conversation at current data conversation */ + conversation_add_proto_data(data_conversation, proto_ftp_data, + p_ftp_data_conv); + p_ftp_conv->current_data_conv = p_ftp_data_conv; + p_ftp_conv->current_data_setup_frame = pinfo->num; +} + +/********************************************************************/ + + +/* + * Parse the address and port information in a PORT command or in the + * response to a PASV command. Return TRUE if we found an address and + * port, and supply the address and port; return FALSE if we didn't find + * them. + * + * We ignore the IP address in the reply, and use the address from which + * the request came. + * + * XXX - are there cases where they differ? What if the FTP server is + * behind a NAT box, so that the address it puts into the reply isn't + * the address at which you should contact it? Do all NAT boxes detect + * FTP PASV replies and rewrite the address? (I suspect not.) + * + * RFC 959 doesn't say much about the syntax of the 227 reply. + * + * A proposal from Dan Bernstein at + * + * http://cr.yp.to/ftp/retr.html + * + * "recommend[s] that clients use the following strategy to parse the + * response line: look for the first digit after the initial space; look + * for the fourth comma after that digit; read two (possibly negative) + * integers, separated by a comma; the TCP port number is p1*256+p2, where + * p1 is the first integer modulo 256 and p2 is the second integer modulo + * 256." + * + * wget 1.5.3 looks for a digit, although it doesn't handle negative + * integers. + * + * The FTP code in the source of the cURL library, at + * + * https://github.com/curl/curl/blob/master/lib/ftp.c + * + * says that cURL "now scans for a sequence of six comma-separated numbers + * and will take them as IP+port indicators"; it loops, doing "sscanf"s + * looking for six numbers separated by commas, stepping the start pointer + * in the scanf one character at a time - i.e., it tries rather exhaustively. + * + * An optimization would be to scan for a digit, and start there, and if + * the scanf doesn't find six values, scan for the next digit and try + * again; this will probably succeed on the first try. + * + * The cURL code also says that "found reply-strings include": + * + * "227 Entering Passive Mode (127,0,0,1,4,51)" + * "227 Data transfer will passively listen to 127,0,0,1,4,51" + * "227 Entering passive mode. 127,0,0,1,4,51" + * + * so it appears that you can't assume there are parentheses around + * the address and port number. + */ +static gboolean +parse_port_pasv(tvbuff_t *tvb, int offset, int linelen, guint32 *ftp_ip, + guint16 *ftp_port, guint32 *pasv_offset, guint *ftp_ip_len, + guint *ftp_port_len) +{ + char *args; + char *p; + guchar c; + int i; + int ip_address[4], port[2]; + gboolean ret = FALSE; + + /* + * Copy the rest of the line into a null-terminated buffer. + */ + args = wmem_alloc(wmem_packet_scope(), linelen + 1); + tvb_get_raw_bytes_as_string(tvb, offset, args, linelen + 1); + p = args; + + for (;;) { + /* + * Look for a digit. + */ + while ((c = *p) != '\0' && !g_ascii_isdigit(c)) + p++; + + if (*p == '\0') { + /* + * We ran out of text without finding anything. + */ + break; + } + + /* + * See if we have six numbers. + */ + i = sscanf(p, "%d,%d,%d,%d,%d,%d", + &ip_address[0], &ip_address[1], &ip_address[2], &ip_address[3], + &port[0], &port[1]); + if (i == 6) { + /* + * We have a winner! + */ + *ftp_port = ((port[0] & 0xFF)<<8) | (port[1] & 0xFF); + *ftp_ip = g_htonl((ip_address[0] << 24) | (ip_address[1] <<16) | (ip_address[2] <<8) | ip_address[3]); + *pasv_offset = (guint32)(p - args); + *ftp_port_len = (port[0] < 10 ? 1 : (port[0] < 100 ? 2 : 3 )) + 1 + + (port[1] < 10 ? 1 : (port[1] < 100 ? 2 : 3 )); + *ftp_ip_len = (ip_address[0] < 10 ? 1 : (ip_address[0] < 100 ? 2 : 3)) + 1 + + (ip_address[1] < 10 ? 1 : (ip_address[1] < 100 ? 2 : 3)) + 1 + + (ip_address[2] < 10 ? 1 : (ip_address[2] < 100 ? 2 : 3)) + 1 + + (ip_address[3] < 10 ? 1 : (ip_address[3] < 100 ? 2 : 3)); + ret = TRUE; + break; + } + + /* + * Well, that didn't work. Skip the first number we found, + * and keep trying. + */ + while ((c = *p) != '\0' && g_ascii_isdigit(c)) + p++; + } + + return ret; +} + +static gboolean +isvalid_rfc2428_delimiter(const guchar c) +{ + /* RFC2428 sect. 2 states rules for a valid delimiter */ + const gchar *forbidden = "0123456789abcdef.:"; + if (!g_ascii_isgraph(c)) + return FALSE; + if (strchr(forbidden, g_ascii_tolower(c))) + return FALSE; + return TRUE; +} + + +/* + * RFC2428 states... + * + * AF Number Protocol + * --------- -------- + * 1 Internet Protocol, Version 4 + * 2 Internet Protocol, Version 6 + * + * AF Number Address Format Example + * --------- -------------- ------- + * 1 dotted decimal 132.235.1.2 + * 2 IPv6 string 1080::8:800:200C:417A + * representations + * defined in + * + * The following are sample EPRT commands: + * EPRT |1|132.235.1.2|6275| + * EPRT |2|1080::8:800:200C:417A|5282| + * + * The first command specifies that the server should use IPv4 to open a + * data connection to the host "132.235.1.2" on TCP port 6275. The + * second command specifies that the server should use the IPv6 network + * protocol and the network address "1080::8:800:200C:417A" to open a + * TCP data connection on port 5282. + * + * ... which means in fact that RFC2428 is capable to handle both, + * IPv4 and IPv6 so we have to care about the address family and properly + * act depending on it. + * + */ +static gboolean +parse_eprt_request(tvbuff_t *tvb, int offset, gint linelen, guint32 *eprt_af, + guint32 *eprt_ip, guint16 *eprt_ipv6, guint16 *ftp_port, + guint32 *eprt_ip_len, guint32 *ftp_port_len) +{ + gint delimiters_seen = 0; + gchar delimiter; + gint fieldlen; + gchar *field; + gint n; + gint lastn; + char *args, *p; + gboolean ret = TRUE; + + + /* line contains the EPRT parameters, we need at least the 4 delimiters */ + if (linelen<4) + return FALSE; + + /* Copy the rest of the line into a null-terminated buffer. */ + args = wmem_alloc(wmem_packet_scope(), linelen + 1); + tvb_get_raw_bytes_as_string(tvb, offset, args, linelen + 1); + p = args; + /* + * Handle a NUL being in the line; if there's a NUL in the line, + * strlen(args) will terminate at the NUL and will thus return + * a value less than linelen. + */ + if ((gint)strlen(args) < linelen) + linelen = (gint)strlen(args); + + /* + * RFC2428 sect. 2 states ... + * + * The EPRT command keyword MUST be followed by a single space (ASCII + * 32). Following the space, a delimiter character (<d>) MUST be + * specified. + * + * ... the preceding <space> is already stripped so we know that the first + * character must be the delimiter and has just to be checked to be valid. + */ + if (!isvalid_rfc2428_delimiter(*p)) + return FALSE; /* EPRT command does not follow a vaild delimiter; + * malformed EPRT command - immediate escape */ + + delimiter = *p; + /* Validate that the delimiter occurs 4 times in the string */ + for (n = 0; n < linelen; n++) { + if (*(p+n) == delimiter) + delimiters_seen++; + } + if (delimiters_seen != 4) + return FALSE; /* delimiter doesn't occur 4 times + * probably no EPRT request - immediate escape */ + + /* we know that the first character is a delimiter... */ + delimiters_seen = 1; + lastn = 0; + /* ... so we can start searching from the 2nd onwards */ + for (n=1; n < linelen; n++) { + + if (*(p+n) != delimiter) + continue; + + /* we found a delimiter */ + delimiters_seen++; + + fieldlen = n - lastn - 1; + if (fieldlen<=0) + return FALSE; /* all fields must have data in them */ + field = p + lastn + 1; + + if (delimiters_seen == 2) { /* end of address family field */ + gchar *af_str; + af_str = wmem_strndup(wmem_packet_scope(), field, fieldlen); + if (!ws_strtou32(af_str, NULL, eprt_af)) + return FALSE; + } + else if (delimiters_seen == 3) {/* end of IP address field */ + gchar *ip_str; + ip_str = wmem_strndup(wmem_packet_scope(), field, fieldlen); + + if (*eprt_af == EPRT_AF_IPv4) { + if (str_to_ip(ip_str, eprt_ip)) + ret = TRUE; + else + ret = FALSE; + } + else if (*eprt_af == EPRT_AF_IPv6) { + if (str_to_ip6(ip_str, eprt_ipv6)) + ret = TRUE; + else + ret = FALSE; + } + else + return FALSE; /* invalid/unknown address family */ + + *eprt_ip_len = fieldlen; + } + else if (delimiters_seen == 4) {/* end of port field */ + gchar *pt_str; + pt_str = wmem_strndup(wmem_packet_scope(), field, fieldlen); + + if (!ws_strtou16(pt_str, NULL, ftp_port)) + return FALSE; + *ftp_port_len = fieldlen; + } + + lastn = n; + } + + return ret; +} + +/* + * RFC2428 states .... + * + * The first two fields contained in the parenthesis MUST be blank. The + * third field MUST be the string representation of the TCP port number + * on which the server is listening for a data connection. + * + * The network protocol used by the data connection will be the same network + * protocol used by the control connection. In addition, the network + * address used to establish the data connection will be the same + * network address used for the control connection. + * + * An example response string follows: + * + * Entering Extended Passive Mode (|||6446|) + * + * ... which in fact means that again both address families IPv4 and IPv6 + * are supported. But gladly it's not necessary to parse because it doesn't + * occur in EPSV responses. We can leverage ftp_ip_address which is + * protocol independent and already set. + * + */ +static gboolean +parse_extended_pasv_response(tvbuff_t *tvb, int offset, gint linelen, + guint16 *ftp_port, guint *pasv_offset, guint *ftp_port_len) +{ + gint n; + gchar *args; + gchar *p; + gchar *e; + guchar c; + gboolean ret = FALSE; + gboolean delimiters_seen = FALSE; + + /* + * Copy the rest of the line into a null-terminated buffer. + */ + args = wmem_alloc(wmem_packet_scope(), linelen + 1); + tvb_get_raw_bytes_as_string(tvb, offset, args, linelen + 1); + p = args; + + /* + * Look for ( <d> <d> <d> + (Try to cope with '(' in description) + */ + for (; !delimiters_seen;) { + guchar delimiter = '\0'; + while ((c = *p) != '\0' && (c != '(')) + p++; + + if (*p == '\0') { + return FALSE; + } + + /* Skip '(' */ + p++; + + /* Make sure same delimiter is used 3 times */ + for (n=0; n<3; n++) { + if ((c = *p) != '\0') { + if (delimiter == '\0' && isvalid_rfc2428_delimiter(c)) { + delimiter = c; + } + if (c != delimiter) { + break; + } + p++; + } + else { + break; + } + } + delimiters_seen = TRUE; + } + + /* + * Should now be at digits. + */ + if (*p != '\0') { + const gchar* endptr; + gboolean port_valid; + /* + * We didn't run out of text without finding anything. + */ + port_valid = ws_strtou16(p, &endptr, ftp_port); + /* the conversion returned false, but the converted value could + be valid instead, check it out */ + if (!port_valid && *endptr == '|') + port_valid = TRUE; + if (port_valid) { + *pasv_offset = (guint32)(p - args); + + ret = TRUE; + + /* get port string length */ + if ((e=strchr(p,')')) == NULL) { + ret = FALSE; + } + else { + *ftp_port_len = (guint)(--e - p); + } + } + } + + return ret; +} + +/* Get the last character out of a string */ +static gchar wmem_strbuf_get_last_char(wmem_strbuf_t *string) +{ + gsize len = wmem_strbuf_get_len(string); + if (len > 0) { + const gchar *buf = wmem_strbuf_get_str(string); + return buf[len-1]; + } + else { + /* Error */ + return '\0'; + } +} + +/* Get the nth character out of string */ +static gchar wmem_strbuf_get_char_n(wmem_strbuf_t *string, size_t n) +{ + if (n > wmem_strbuf_get_len(string)-1) { + return '\0'; + } + else { + return wmem_strbuf_get_str(string)[n]; + } +} + +/* Does the path end with the separator character? */ +static gboolean ends_with_separator(wmem_strbuf_t *path) +{ + if (wmem_strbuf_get_len(path) == 0) { + return FALSE; + } + + gchar last = wmem_strbuf_get_last_char(path); + return last == '/'; +} + +/* Does the path begin with the separator character? */ +static gboolean begins_with_separator(wmem_strbuf_t *path) +{ + if (wmem_strbuf_get_len(path) == 0) { + return FALSE; + } + + gchar first = wmem_strbuf_get_char_n(path, 0); + return first == '/'; +} + + +/* Add new_path to the current working directory of the conversation, then normalise. */ +/* N.B. could use e.g. g_build_path() here, but doesn't really buy us anything */ +static void add_directory_to_conv(ftp_conversation_t *conv, const char *new_path) +{ + wmem_strbuf_t *appended_path = wmem_strbuf_new(wmem_packet_scope(), NULL); + + if (!wmem_strbuf_get_len(conv->current_working_directory)) { + /* Currently empty so just assign to new */ + wmem_strbuf_append(conv->current_working_directory, new_path); + return; + } + if (ends_with_separator(conv->current_working_directory)) { + /* Ends in separator, so don't need to write one */ + wmem_strbuf_append_printf(appended_path, "%s%s", wmem_strbuf_get_str(conv->current_working_directory), new_path); + } + else { + /* Separator needed */ + wmem_strbuf_append_printf(appended_path, "%s/%s", wmem_strbuf_get_str(conv->current_working_directory), new_path); + } + + /* Now normalise, by going through the string one directory at a time. If see "..", + remove it and the previous folder. If see ".", ignore it. */ + guint offset; + + /* Initialise with empty path */ + wmem_strbuf_t *normalised_directory = wmem_strbuf_new(wmem_file_scope(), NULL); + wmem_strbuf_t *this_folder = wmem_strbuf_new(wmem_packet_scope(), NULL); + + offset = 0; + /* If absolute, add root to this one too */ + if (begins_with_separator(conv->current_working_directory)) { + wmem_strbuf_append_c(normalised_directory, '/'); + offset++; + } + + /* Now go through the appended path, one directory at a time, and + copy to normalised_directory */ + for (; offset <= wmem_strbuf_get_len(appended_path); offset++) { + gchar ch = wmem_strbuf_get_char_n(appended_path, offset); + if ((offset == wmem_strbuf_get_len(appended_path)) || ch == '/' || ch == '\0') { + /* Folder name is complete */ + if (offset>0 && wmem_strbuf_get_len(this_folder) > 0) { + + /* Up a level. Rewind to before last directory - don't output this one */ + if (strcmp(wmem_strbuf_get_str(this_folder), "..") == 0) { + while (wmem_strbuf_get_len(normalised_directory) && !ends_with_separator(normalised_directory)) { + wmem_strbuf_truncate(normalised_directory, wmem_strbuf_get_len(normalised_directory)-1); + } + /* Potentially skip left-over trailing '/' too */ + if ((wmem_strbuf_get_len(normalised_directory) > 1) && + (wmem_strbuf_get_last_char(normalised_directory) == '/')) { + + wmem_strbuf_truncate(normalised_directory, wmem_strbuf_get_len(normalised_directory)-1); + } + } + /* Current directory - ignore */ + else if (strcmp(wmem_strbuf_get_str(this_folder), ".") == 0) { + /* Don't copy to normalised_directory */ + } + else { + /* Regular directory name - copy this one out */ + if (wmem_strbuf_get_len(normalised_directory) > 0 && !ends_with_separator(normalised_directory)) { + wmem_strbuf_append_c(normalised_directory, '/'); + } + wmem_strbuf_append(normalised_directory, wmem_strbuf_get_str(this_folder)); + } + + /* Reset folder name for next time */ + this_folder = wmem_strbuf_new(wmem_packet_scope(), NULL); + } + } + else { + /* Keep copying this folder name */ + wmem_strbuf_append_c(this_folder, ch); + } + if (ch == '\0') { + /* Reached end - get out of loop */ + break; + } + } + + /* Copy normalised path into conversation */ + conv->current_working_directory = normalised_directory; +} + +/* In response to the arg to a CWD command succeeding, update the conversation's current working directory */ +static void process_cwd_success(ftp_conversation_t *conv, const char *new_path) +{ + if (g_path_is_absolute(new_path)) { + /* Just adopt new_path */ + conv->current_working_directory = wmem_strbuf_new(wmem_file_scope(), new_path); + } + else { + /* Add new_path to what we already have */ + add_directory_to_conv(conv, new_path); + } +} + +/* When get a PWD command response, extract directory and set it in conversation. */ +static void process_pwd_success(ftp_conversation_t *conv, tvbuff_t *tvb, + int offset, int linelen, packet_info *pinfo, + proto_item *pi) +{ + wmem_strbuf_t *output; + const char *line = tvb_get_ptr(tvb, offset, linelen); + gboolean outputStarted = FALSE; + + /* Line must start with quotes */ + if ((linelen < 2) || (line[0] != '"')) { + expert_add_info(pinfo, pi, &ei_ftp_pwd_response_invalid); + return; + } + + output = wmem_strbuf_new(wmem_file_scope(), NULL); + + /* For each character */ + for (offset=0; + (offset < linelen) && (line[offset] != '\r') && (line[offset] != '\n'); + offset++) { + + if (line[offset] == '"') { + if ((offset+1 < linelen) && (line[offset+1] == '"')) { + /* Double, so output one */ + wmem_strbuf_append_c(output, '"'); + offset++; + } + else { + if (outputStarted) { + /* End of path */ + break; + } + outputStarted = TRUE; + } + } + else { + /* Part of path - append */ + wmem_strbuf_append_c(output, line[offset]); + } + } + + /* Make sure output ends in " */ + if (offset >= linelen || line[offset] != '"') { + expert_add_info(pinfo, pi, &ei_ftp_pwd_response_invalid); + wmem_strbuf_destroy(output); + return; + } + + /* Save result - assume it's UTF-8 */ + wmem_strbuf_utf8_make_valid(output); + conv->current_working_directory = output; +} + + +/* Associate the conversation's current working directory with the given packet */ +static void store_directory_in_packet(packet_info *pinfo, ftp_conversation_t *p_ftp_conv) +{ + ftp_packet_data_t *p_packet_data = wmem_new0(wmem_file_scope(), ftp_packet_data_t); + /* Take deep copy of current path, and associate with this packet */ + p_packet_data->current_working_directory = wmem_strbuf_new(wmem_file_scope(), + wmem_strbuf_get_str(p_ftp_conv->current_working_directory)); + p_add_proto_data(wmem_file_scope(), pinfo, proto_ftp, 0, p_packet_data); +} + + +static int +dissect_ftp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_) +{ + gboolean is_request; + proto_tree *ftp_tree; + proto_tree *reqresp_tree; + proto_item *ti, *hidden_item; + gint offset = 0; + guint32 code; + gchar code_str[4]; + gboolean is_port_request = FALSE; + gboolean is_eprt_request = FALSE; + gboolean is_pasv_response = FALSE; + gboolean is_epasv_response = FALSE; + gint next_offset; + gint next_token; + int linelen; + int tokenlen = 0; + guint32 pasv_ip; + guint32 pasv_offset; + guint32 ftp_ip; + guint32 ftp_ip_len; + guint32 eprt_offset; + guint32 eprt_af = 0; + guint32 eprt_ip; + guint16 eprt_ipv6[8]; + guint32 eprt_ip_len = 0; + guint16 ftp_port; + guint32 ftp_port_len; + address ftp_ip_address; + gboolean ftp_nat; + + copy_address_shallow(&ftp_ip_address, &pinfo->src); + + if (pinfo->match_uint == pinfo->destport) + is_request = TRUE; + else + is_request = FALSE; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "FTP"); + + /* Get the conversation */ + ftp_conversation_t *p_ftp_conv = find_or_create_ftp_conversation(pinfo); + + /* Store the current working directory */ + if (!pinfo->fd->visited) { + store_directory_in_packet(pinfo, p_ftp_conv); + } + + /* + * Find the end of the first line. + * + * Note that "tvb_find_line_end()" will return a value that is + * not longer than what's in the buffer, so the "tvb_get_ptr()" + * call won't throw an exception. + */ + /* + * Both request and reply arguments can be pathnames, which according + * to RFC 2640 MUST be assumed to be UTF-8 if they are valid UTF-8, + * unless explicitly configured to use another character set (and there + * is no official way to do so.) We don't have a preference for character + * set, so we'll display strings as UTF-8 (backwards compatible to ASCII). + * + * XXX: Non valid UTF-8 sequences SHOULD be treated as raw bytes, + * which means that the various extracted strings should be copied + * as raw bytes, and added as FT_BYTES with BASE_SHOW_UTF_8_PRINTABLE. + * That would work better for pathnames that are in a different character + * set, but worse for those intended to be in ASCII/UTF-8 but with errors. + * Pathnames would still need to be converted to a valid string for Export + * Objects, though. + * + * XXX: RFC 2640 allows embedded <CR> and <LF> in pathnames by enforcing + * that ftp commands end with \r\n and requiring that <CR> be padded + * with a <NUL> that is then stripped away upon receipt, similar to Telnet. + */ + linelen = tvb_find_line_end(tvb, 0, -1, &next_offset, FALSE); + + /* + * Put the first line from the buffer into the summary + * (but leave out the line terminator). + */ + col_add_fstr(pinfo->cinfo, COL_INFO, "%s: %s", + is_request ? "Request" : "Response", + tvb_format_text(pinfo->pool, tvb, 0, linelen)); + + ti = proto_tree_add_item(tree, proto_ftp, tvb, 0, -1, ENC_NA); + ftp_tree = proto_item_add_subtree(ti, ett_ftp); + + hidden_item = proto_tree_add_boolean(ftp_tree, + hf_ftp_request, tvb, 0, 0, is_request); + proto_item_set_hidden(hidden_item); + hidden_item = proto_tree_add_boolean(ftp_tree, + hf_ftp_response, tvb, 0, 0, is_request == FALSE); + proto_item_set_hidden(hidden_item); + + /* Put the line into the protocol tree. */ + ti = proto_tree_add_format_text(ftp_tree, tvb, 0, next_offset); + reqresp_tree = proto_item_add_subtree(ti, ett_ftp_reqresp); + + if (is_request) { + /* + * Extract the first token, and, if there is a first + * token, add it as the request. + */ + /* RFC 2640 s3.1: "There MUST be only one <SP> between a ftp command + * and the pathname. Implementations MUST assume <SP> characters + * following the initial <SP> as part of the pathname." + * + * tvb_get_token_len() does not skip trailing spaces, which is + * what we want. (get_token_len() _does_ skip extra spaces.) + */ + tokenlen = tvb_get_token_len(tvb, 0, linelen, &next_token, FALSE); + if (tokenlen != 0) { + proto_tree_add_item(reqresp_tree, hf_ftp_request_command, + tvb, 0, tokenlen, ENC_UTF_8); + if (tvb_strneql(tvb, 0, "PORT", tokenlen) == 0) + is_port_request = TRUE; + /* + * EPRT request command, as per RFC 2428 + */ + else if (tvb_strneql(tvb, 0, "EPRT", tokenlen) == 0) + is_eprt_request = TRUE; + else if (tvb_strneql(tvb, 0, "USER", tokenlen) == 0) { + if (p_ftp_conv && !p_ftp_conv->username && linelen - tokenlen > 1) { + p_ftp_conv->username = tvb_get_string_enc(wmem_file_scope(), tvb, tokenlen + 1, linelen - tokenlen - 1, ENC_UTF_8); + p_ftp_conv->username_pkt_num = pinfo->num; + } + } else if (tvb_strneql(tvb, 0, "PASS", tokenlen) == 0) { + if (p_ftp_conv && p_ftp_conv->username) { + tap_credential_t* auth = wmem_new0(wmem_packet_scope(), tap_credential_t); + auth->num = pinfo->num; + auth->proto = "FTP"; + auth->password_hf_id = hf_ftp_request_arg; + auth->username = p_ftp_conv->username; + auth->username_num = p_ftp_conv->username_pkt_num; + auth->info = wmem_strdup_printf(wmem_packet_scope(), "Username in packet: %u", p_ftp_conv->username_pkt_num); + tap_queue_packet(credentials_tap, pinfo, auth); + } + } + } + + /* If there is an ftp data conversation that doesn't have a + command yet, attempt to update here */ + if (p_ftp_conv) { + p_ftp_conv->last_command = tvb_get_string_enc(wmem_file_scope(), tvb, 0, linelen, ENC_UTF_8); + p_ftp_conv->last_command_frame = pinfo->num; + + if ( (linelen == 8) && ! tvb_strneql(tvb, 0, "AUTH TLS", 8) ) + p_ftp_conv->tls_requested = TRUE; + } + /* And make sure set for FTP data conversation */ + if (p_ftp_conv && p_ftp_conv->current_data_conv && !p_ftp_conv->current_data_conv->command) { + /* Store command and frame where it happened */ + p_ftp_conv->current_data_conv->command = tvb_get_string_enc(wmem_file_scope(), tvb, 0, linelen, ENC_UTF_8); + p_ftp_conv->current_data_conv->command_frame = pinfo->num; + + /* Add to table to ftp-data response can be shown with this frame on later passes */ + g_hash_table_insert(ftp_command_to_data_hash, GUINT_TO_POINTER(pinfo->num), + p_ftp_conv->current_data_conv); + g_hash_table_insert(ftp_command_to_data_hash, GUINT_TO_POINTER(p_ftp_conv->current_data_setup_frame), + p_ftp_conv->current_data_conv); + } + } else { + /* + * This is a response; the response code is 3 digits, + * followed by a space or hyphen, possibly followed by + * text. + * + * If the line doesn't start with 3 digits, it's part of + * a continuation. + * + * XXX - keep track of state in the first pass, and + * treat non-continuation lines not beginning with digits + * as errors? + */ + if (linelen >= 3 && tvb_ascii_isdigit(tvb, 0, 3)) { + gboolean code_valid; + proto_item* pi; + /* + * One-line reply, or first or last line + * of a multi-line reply. + */ + tvb_get_raw_bytes_as_string(tvb, 0, code_str, sizeof code_str); + code_valid = ws_strtou32(code_str, NULL, &code); + + pi = proto_tree_add_uint(reqresp_tree, + hf_ftp_response_code, tvb, 0, 3, code); + + if (!code_valid) + expert_add_info(pinfo, pi, &ei_ftp_response_code_invalid); + + /* + * See if it's a passive-mode response. + * + * XXX - does anybody do FOOBAR, as per RFC + * 1639, or has that been supplanted by RFC 2428? + */ + if (code == 227) + is_pasv_response = TRUE; + + /* + * Responses to EPSV command, as per RFC 2428 + */ + if (code == 229) + is_epasv_response = TRUE; + + /* + * Response to AUTH TLS command as per RFC 4217 + */ + if (code == 234) { + if ( p_ftp_conv->tls_requested ) { + /* AUTH TLS accepted, next reply will be TLS */ + ssl_starttls_ack( tls_handle, pinfo, ftp_handle); + + p_ftp_conv->tls_requested = FALSE ; + } + } + + /* + * Responses to CWD command. + */ + if (code == 250) { + if (!pinfo->fd->visited) { + if (p_ftp_conv && p_ftp_conv->last_command) { + /* Explicit Change Working Directory command */ + if (strncmp(p_ftp_conv->last_command, "CWD ", 4) == 0) { + process_cwd_success(p_ftp_conv, p_ftp_conv->last_command+4); + /* Update path in packet */ + store_directory_in_packet(pinfo, p_ftp_conv); + } + /* Change Directory Up command (i.e. "CWD ..") */ + else if (strncmp(p_ftp_conv->last_command, "CDUP", 4) == 0) { + process_cwd_success(p_ftp_conv, ".."); + /* Update path in packet */ + store_directory_in_packet(pinfo, p_ftp_conv); + } + } + } + } + + /* + * Responses to PWD command. Overwrite whatever is stored - this is the truth! + */ + if (code == 257) { + if (!pinfo->fd->visited) { + if (p_ftp_conv && linelen >= 4) { + /* Want directory name, which will be between " " */ + process_pwd_success(p_ftp_conv, tvb, 4, linelen-4, pinfo, pi); + + /* Update path in packet */ + if (!pinfo->fd->visited) { + store_directory_in_packet(pinfo, p_ftp_conv); + } + } + } + } + + + /* + * Skip the 3 digits and, if present, the + * space or hyphen. + */ + if (linelen >= 4) + next_token = 4; + else + next_token = linelen; + } else { + /* + * Line doesn't start with 3 digits; assume it's + * a line in the middle of a multi-line reply. + */ + next_token = 0; + } + } + + offset = next_token; + linelen -= next_token; + + /* + * Add the rest of the first line as request or + * reply data. + */ + if (linelen != 0) { + if (is_request) { + proto_tree_add_item(reqresp_tree, + hf_ftp_request_arg, tvb, offset, + linelen, ENC_UTF_8); + } else { + proto_tree_add_item(reqresp_tree, + hf_ftp_response_arg, tvb, offset, + linelen, ENC_UTF_8); + } + } + + /* + * If this is a PORT request or a PASV response, handle it. + */ + if (is_port_request) { + if (parse_port_pasv(tvb, offset, linelen, &ftp_ip, &ftp_port, &pasv_offset, &ftp_ip_len, &ftp_port_len)) { + proto_tree_add_ipv4(reqresp_tree, hf_ftp_active_ip, + tvb, pasv_offset + (tokenlen+1) , ftp_ip_len, ftp_ip); + proto_tree_add_uint(reqresp_tree, hf_ftp_active_port, + tvb, pasv_offset + 1 + (tokenlen+1) + ftp_ip_len, ftp_port_len, ftp_port); + set_address(&ftp_ip_address, AT_IPv4, 4, (const guint8 *)&ftp_ip); + ftp_nat = !addresses_equal(&pinfo->src, &ftp_ip_address); + if (ftp_nat) { + proto_tree_add_boolean(reqresp_tree, hf_ftp_active_nat, + tvb, 0, 0, ftp_nat); + } + + /* Set up data conversation */ + create_and_link_data_conversation(pinfo, + &pinfo->dst, 20, + &ftp_ip_address, ftp_port, + "PORT"); + } + } + + if (is_pasv_response) { + if (linelen != 0) { + /* + * This frame contains a PASV response; set up a + * conversation for the data. + */ + if (parse_port_pasv(tvb, offset, linelen, &pasv_ip, &ftp_port, &pasv_offset, &ftp_ip_len, &ftp_port_len)) { + proto_tree_add_ipv4(reqresp_tree, hf_ftp_pasv_ip, + tvb, pasv_offset + 4, ftp_ip_len, pasv_ip); + proto_tree_add_uint(reqresp_tree, hf_ftp_pasv_port, + tvb, pasv_offset + 4 + 1 + ftp_ip_len, ftp_port_len, ftp_port); + set_address(&ftp_ip_address, AT_IPv4, 4, + (const guint8 *)&pasv_ip); + ftp_nat = !addresses_equal(&pinfo->src, &ftp_ip_address); + if (ftp_nat) { + proto_tree_add_boolean(reqresp_tree, hf_ftp_pasv_nat, + tvb, 0, 0, ftp_nat); + } + + create_and_link_data_conversation(pinfo, &ftp_ip_address, ftp_port, &pinfo->dst, pinfo->destport, "PASV"); + } + } + } + + if (is_eprt_request) { + /* + * RFC2428 - sect. 2 + * This frame contains a EPRT request; let's dissect it and set up a + * conversation for the data connection. + */ + if (parse_eprt_request(tvb, offset, linelen, + &eprt_af, &eprt_ip, eprt_ipv6, &ftp_port, + &eprt_ip_len, &ftp_port_len)) { + + /* since parse_eprt_request() returned TRUE, + we know that we have a valid address family */ + eprt_offset = tokenlen + 1 + 1; /* token, space, 1st delimiter */ + proto_tree_add_uint(reqresp_tree, hf_ftp_eprt_af, tvb, + eprt_offset, 1, eprt_af); + eprt_offset += 1 + 1; /* addr family, 2nd delimiter */ + + if (eprt_af == EPRT_AF_IPv4) { + proto_tree_add_ipv4(reqresp_tree, hf_ftp_eprt_ip, + tvb, eprt_offset, eprt_ip_len, eprt_ip); + set_address(&ftp_ip_address, AT_IPv4, 4, + (const guint8 *)&eprt_ip); + } + else if (eprt_af == EPRT_AF_IPv6) { + proto_tree_add_ipv6(reqresp_tree, hf_ftp_eprt_ipv6, + tvb, eprt_offset, eprt_ip_len, (const ws_in6_addr *)eprt_ipv6); + set_address(&ftp_ip_address, AT_IPv6, 16, eprt_ipv6); + } + eprt_offset += eprt_ip_len + 1; /* addr, 3rd delimiter */ + + proto_tree_add_uint(reqresp_tree, hf_ftp_eprt_port, + tvb, eprt_offset, ftp_port_len, ftp_port); + + /* Set up data conversation */ + create_and_link_data_conversation(pinfo, + &pinfo->src, ftp_port, + &ftp_ip_address, 0, + "EPRT"); + } + else { + proto_tree_add_expert(reqresp_tree, pinfo, &ei_ftp_eprt_args_invalid, + tvb, offset - linelen - 1, linelen); + } + } + + if (is_epasv_response) { + if (linelen != 0) { + proto_item *addr_it; + /* + * RFC2428 - sect. 3 + * This frame contains an EPSV response; set up a + * conversation for the data. + */ + if (parse_extended_pasv_response(tvb, offset, linelen, + &ftp_port, &pasv_offset, &ftp_port_len)) { + /* Add IP address and port number to tree */ + + if (ftp_ip_address.type == AT_IPv4) { + guint32 addr; + memcpy(&addr, ftp_ip_address.data, 4); + addr_it = proto_tree_add_ipv4(reqresp_tree, + hf_ftp_epsv_ip, tvb, 0, 0, addr); + proto_item_set_generated(addr_it); + } + else if (ftp_ip_address.type == AT_IPv6) { + addr_it = proto_tree_add_ipv6(reqresp_tree, + hf_ftp_epsv_ipv6, tvb, 0, 0, + (const ws_in6_addr *)ftp_ip_address.data); + proto_item_set_generated(addr_it); + } + + proto_tree_add_uint(reqresp_tree, + hf_ftp_epsv_port, tvb, pasv_offset + 4, + ftp_port_len, ftp_port); + + /* Set up data conversation */ + create_and_link_data_conversation(pinfo, + &ftp_ip_address, ftp_port, + &pinfo->dst, 0, "EPASV"); } + else { + proto_tree_add_expert(reqresp_tree, pinfo, &ei_ftp_epsv_args_invalid, + tvb, offset - linelen - 1, linelen); + } + } + } + + offset = next_offset; + + /* + * Show the rest of the request or response as text, + * a line at a time. + * XXX - only if there's a continuation indicator? + */ + while (tvb_offset_exists(tvb, offset)) { + /* + * Find the end of the line. + */ + tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE); + + /* + * Put this line. + */ + proto_tree_add_format_text(ftp_tree, tvb, offset, + next_offset - offset); + offset = next_offset; + } + + /* Show current working directory */ + ftp_packet_data_t *ftp_packet_data = (ftp_packet_data_t *)p_get_proto_data(wmem_file_scope(), pinfo, proto_ftp, 0); + if (ftp_packet_data != NULL) { + /* Should always be set.. */ + if (ftp_packet_data->current_working_directory) { + proto_item *cwd_ti = proto_tree_add_string(tree, hf_ftp_current_working_directory, + tvb, 0, 0, wmem_strbuf_get_str(ftp_packet_data->current_working_directory)); + proto_item_set_generated(cwd_ti); + } + } + + /* If this is a command resulting in an ftp-data stream, show details */ + if (pinfo->fd->visited) { + /* Look up what has been stored for this frame */ + ftp_data_conversation_t *ftp_data = + (ftp_data_conversation_t *)g_hash_table_lookup(ftp_command_to_data_hash, GUINT_TO_POINTER(pinfo->num)); + if (ftp_data) { + /* Show these for the command frame only */ + if (pinfo->num == ftp_data->command_frame) { + /* Number of frames */ + ti = proto_tree_add_uint(tree, hf_ftp_command_response_frames, + tvb, 0, 0, ftp_data->frames_seen); + proto_item_set_generated(ti); + + /* Number of bytes */ + ti = proto_tree_add_uint(tree, hf_ftp_command_response_bytes, + tvb, 0, 0, ftp_data->bytes_seen); + proto_item_set_generated(ti); + + /* First frame */ + ti = proto_tree_add_uint(tree, hf_ftp_command_response_first_frame_num, + tvb, 0, 0, ftp_data->first_frame_num); + proto_item_set_generated(ti); + + /* Last frame */ + ti = proto_tree_add_uint(tree, hf_ftp_command_response_last_frame_num, + tvb, 0, 0, ftp_data->last_frame_num); + proto_item_set_generated(ti); + + /* Length of stream */ + if (ftp_data->frames_seen > 1) { + /* Work out gap between frames */ + gint seconds = (gint) + (ftp_data->last_frame_time.secs - ftp_data->first_frame_time.secs); + gint nseconds = + ftp_data->last_frame_time.nsecs - ftp_data->first_frame_time.nsecs; + + /* Round gap to nearest ms. */ + gint gap_ms = (seconds*1000) + ((nseconds+500000) / 1000000); + ti = proto_tree_add_uint(tree, hf_ftp_command_response_duration, + tvb, 0, 0, gap_ms); + proto_item_set_generated(ti); + + /* Bitrate (kbps)*/ + guint bitrate = (guint)(((ftp_data->bytes_seen*8.0)/(gap_ms/1000.0))/1000); + ti = proto_tree_add_uint(tree, hf_ftp_command_response_kbps, + tvb, offset, 0, bitrate); + proto_item_set_generated(ti); + } + + ti = proto_tree_add_uint(tree, hf_ftp_command_setup_frame, + tvb, 0, 0, ftp_data->setup_frame); + proto_item_set_generated(ti); + } + + /* Show this only under the setup frame */ + if (pinfo->num == ftp_data->setup_frame) { + ti = proto_tree_add_string(tree, hf_ftp_command_command, + tvb, 0, 0, ftp_data->command); + proto_item_set_generated(ti); + + ti = proto_tree_add_uint(tree, hf_ftp_command_command_frame, + tvb, 0, 0, ftp_data->command_frame); + proto_item_set_generated(ti); + } + } + } + + return tvb_captured_length(tvb); +} + +static int +dissect_ftpdata(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_) +{ + proto_item *data_ti, *ti; + int data_length = tvb_captured_length(tvb); + gboolean is_text = TRUE; + gint check_chars, i; + conversation_t *p_conv; + ftp_data_conversation_t *p_ftp_data_conv; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "FTP-DATA"); + + col_add_fstr(pinfo->cinfo, COL_INFO, "FTP Data: %u bytes", + tvb_reported_length(tvb)); + + data_ti = proto_tree_add_item(tree, proto_ftp_data, tvb, 0, -1, ENC_NA); + + /* Link back to setup of this stream */ + p_conv = find_conversation_pinfo(pinfo, 0); + + if (p_conv) { + /* Link back to FTP frame where this conversation was created */ + ti = proto_tree_add_uint(tree, hf_ftp_data_setup_frame, + tvb, 0, 0, p_conv->setup_frame); + proto_item_set_generated(ti); + + p_ftp_data_conv = (ftp_data_conversation_t*)conversation_get_proto_data(p_conv, proto_ftp_data); + + if (p_ftp_data_conv) { + /* First time around, update info. */ + if (!pinfo->fd->visited) { + if (!p_ftp_data_conv->first_frame_num) { + p_ftp_data_conv->first_frame_num = pinfo->num; + p_ftp_data_conv->first_frame_time = pinfo->abs_ts; + } + if (pinfo->num > p_ftp_data_conv->last_frame_num) { + p_ftp_data_conv->last_frame_num = pinfo->num; + p_ftp_data_conv->last_frame_time = pinfo->abs_ts; + } + p_ftp_data_conv->frames_seen++; + p_ftp_data_conv->bytes_seen += tvb_reported_length(tvb); + + /* Also store setup_frame here for benefit of ftp (control) */ + p_ftp_data_conv->setup_frame = p_conv->setup_frame; + } + + /* Show setup method as field and in info column */ + if (p_ftp_data_conv->setup_method) { + ti = proto_tree_add_string(tree, hf_ftp_data_setup_method, + tvb, 0, 0, p_ftp_data_conv->setup_method); + col_append_fstr(pinfo->cinfo, COL_INFO, " (%s)", p_ftp_data_conv->setup_method); + proto_item_set_generated(ti); + } + + /* Show command in info column */ + if (p_ftp_data_conv->command) { + ti = proto_tree_add_string(tree, hf_ftp_data_command, + tvb, 0, 0, p_ftp_data_conv->command); + proto_item_set_generated(ti); + col_append_fstr(pinfo->cinfo, COL_INFO, " (%s)", p_ftp_data_conv->command); + + proto_tree_add_uint(tree, hf_ftp_data_command_frame, + tvb, 0, 0, p_ftp_data_conv->command_frame); + proto_item_set_generated(ti); + } + + /* Show current working directory */ + if (p_ftp_data_conv->current_working_directory) { + ti = proto_tree_add_string(tree, hf_ftp_data_current_working_directory, + tvb, 0, 0, wmem_strbuf_get_str(p_ftp_data_conv->current_working_directory)); + proto_item_set_generated(ti); + } + if (have_tap_listener(ftp_eo_tap)) { + if (p_ftp_data_conv->command_frame) { + ftp_eo_t *eo_info = wmem_new0(wmem_packet_scope(), ftp_eo_t); + eo_info->command = wmem_strdup(wmem_packet_scope(), p_ftp_data_conv->command); + eo_info->command_frame = p_ftp_data_conv->command_frame; + eo_info->payload_len = tvb_reported_length(tvb); + eo_info->payload_data = (gchar *) tvb_memdup(wmem_packet_scope(), tvb, 0, tvb_reported_length(tvb)); + tap_queue_packet(ftp_eo_tap, pinfo, eo_info); + } + } + } + } + + /* Check the first few chars to see whether it looks like a text file or output */ + check_chars = MIN(20, data_length); + for (i=0; i < check_chars; i++) { + guint8 c = tvb_get_guint8(tvb, i); + if (c!='\r' && c!='\n' && !g_ascii_isprint(c)) { + is_text = FALSE; + break; + } + } + + /* Show the number of bytes */ + proto_item_append_text(data_ti, " (%u bytes data)", data_length); + + /* Show line-by-line if text */ + if (is_text) { + call_dissector(data_text_lines_handle, tvb, pinfo, tree); + } + + return data_length; +} + +static void ftp_init_protocol(void) +{ + ftp_command_to_data_hash = g_hash_table_new(g_direct_hash, g_direct_equal); +} + +static void ftp_cleanup_protocol(void) +{ + g_hash_table_destroy(ftp_command_to_data_hash); +} + +void +proto_register_ftp(void) +{ + static hf_register_info hf[] = { + { &hf_ftp_current_working_directory, + { "Current working directory", "ftp.current-working-directory", + FT_STRING, BASE_NONE, NULL, 0, + NULL, HFILL }}, + + { &hf_ftp_response, + { "Response", "ftp.response", + FT_BOOLEAN, BASE_NONE, NULL, 0x0, + "TRUE if FTP response", HFILL }}, + + { &hf_ftp_request, + { "Request", "ftp.request", + FT_BOOLEAN, BASE_NONE, NULL, 0x0, + "TRUE if FTP request", HFILL }}, + + { &hf_ftp_request_command, + { "Request command", "ftp.request.command", + FT_STRING, BASE_NONE, NULL, 0x0, + NULL, HFILL }}, + + { &hf_ftp_request_arg, + { "Request arg", "ftp.request.arg", + FT_STRING, BASE_NONE, NULL, 0x0, + NULL, HFILL }}, + + { &hf_ftp_response_code, + { "Response code", "ftp.response.code", + FT_UINT32, BASE_DEC|BASE_EXT_STRING, &response_table_ext, 0x0, + NULL, HFILL }}, + + { &hf_ftp_response_arg, + { "Response arg", "ftp.response.arg", + FT_STRING, BASE_NONE, NULL, 0x0, + NULL, HFILL }}, + + { &hf_ftp_pasv_ip, + { "Passive IP address", "ftp.passive.ip", + FT_IPv4, BASE_NONE, NULL,0x0, + "Passive IP address (check NAT)", HFILL}}, + + { &hf_ftp_pasv_port, + { "Passive port", "ftp.passive.port", + FT_UINT16, BASE_DEC, NULL,0x0, + "Passive FTP server port", HFILL }}, + + { &hf_ftp_pasv_nat, + {"Passive IP NAT", "ftp.passive.nat", + FT_BOOLEAN, BASE_NONE, NULL, 0x0, + "NAT is active SIP and passive IP different", HFILL }}, + + { &hf_ftp_active_ip, + { "Active IP address", "ftp.active.cip", + FT_IPv4, BASE_NONE, NULL, 0x0, + "Active FTP client IP address", HFILL }}, + + { &hf_ftp_active_port, + {"Active port", "ftp.active.port", + FT_UINT16, BASE_DEC, NULL, 0x0, + "Active FTP client port", HFILL }}, + + { &hf_ftp_active_nat, + { "Active IP NAT", "ftp.active.nat", + FT_BOOLEAN, BASE_NONE, NULL, 0x0, + "NAT is active", HFILL}}, + + { &hf_ftp_eprt_af, + { "Extended active address family", "ftp.eprt.af", + FT_UINT8, BASE_DEC, VALS(eprt_af_vals), 0, + NULL, HFILL }}, + + { &hf_ftp_eprt_ip, + { "Extended active IP address", "ftp.eprt.ip", + FT_IPv4, BASE_NONE, NULL, 0, + "Extended active FTP client IPv4 address", HFILL }}, + + { &hf_ftp_eprt_ipv6, + { "Extended active IPv6 address", "ftp.eprt.ipv6", + FT_IPv6, BASE_NONE, NULL, 0, + "Extended active FTP client IPv6 address", HFILL }}, + + { &hf_ftp_eprt_port, + { "Extended active port", "ftp.eprt.port", + FT_UINT16, BASE_DEC, NULL, 0, + "Extended active FTP client listener port", HFILL }}, + + { &hf_ftp_epsv_ip, + { "Extended passive IPv4 address", "ftp.epsv.ip", + FT_IPv4, BASE_NONE, NULL, 0, + "Extended passive FTP server IPv4 address", HFILL }}, + + { &hf_ftp_epsv_ipv6, + { "Extended passive IPv6 address", "ftp.epsv.ipv6", + FT_IPv6, BASE_NONE, NULL, 0, + "Extended passive FTP server IPv6 address", HFILL }}, + + { &hf_ftp_epsv_port, + { "Extended passive port", "ftp.epsv.port", + FT_UINT16, BASE_DEC, NULL, 0, + "Extended passive FTP server port", HFILL }}, + + { &hf_ftp_command_response_first_frame_num, + { "Command response first frame", "ftp.command-response.first-frame-num", + FT_FRAMENUM, BASE_NONE, FRAMENUM_TYPE(FT_FRAMENUM_RESPONSE), 0, + "First frame seen in resulting ftp-data stream", HFILL }}, + + { &hf_ftp_command_response_last_frame_num, + { "Command response last frame", "ftp.command-response.last-frame-num", + FT_FRAMENUM, BASE_NONE, FRAMENUM_TYPE(FT_FRAMENUM_RESPONSE), 0, + "Last frame seen in resulting ftp-data stream", HFILL }}, + + { &hf_ftp_command_response_duration, + { "Response duration", "ftp.command-response.duration", + FT_UINT32, BASE_DEC|BASE_UNIT_STRING, &units_milliseconds, 0, + "Duration of command response in ms", HFILL }}, + + { &hf_ftp_command_response_kbps, + { "Response bitrate", "ftp.command-response.bitrate", + FT_UINT32, BASE_DEC|BASE_UNIT_STRING, &units_kbps, 0, + "Bitrate of command response", HFILL }}, + + { &hf_ftp_command_response_frames, + { "Command response frames", "ftp.command-response.frames", + FT_UINT32, BASE_DEC, NULL, 0, + "Number of frames seen in resulting ftp-data stream", HFILL }}, + + { &hf_ftp_command_response_bytes, + { "Command response bytes", "ftp.command-response.bytes", + FT_UINT32, BASE_DEC, NULL, 0, + "Number of bytes seen in resulting ftp-data stream", HFILL }}, + + { &hf_ftp_command_setup_frame, + { "Setup frame", "ftp.setup-frame", + FT_FRAMENUM, BASE_NONE, FRAMENUM_TYPE(FT_FRAMENUM_REQUEST), 0, + "Where ftp-data conversation for this command was signalled", HFILL }}, + + { &hf_ftp_command_command_frame, + { "Command frame", "ftp.command-frame", + FT_FRAMENUM, BASE_NONE, FRAMENUM_TYPE(FT_FRAMENUM_REQUEST), 0, + "Where command for setup was seen", HFILL }}, + + { &hf_ftp_command_command, + { "Command", "ftp.command", + FT_STRING, BASE_NONE, NULL, 0, + "Command corresponding to this setup frame", HFILL }}, + }; + static gint *ett[] = { + &ett_ftp, + &ett_ftp_reqresp + }; + + static hf_register_info data_hf[] = { + { &hf_ftp_data_setup_frame, + { "Setup frame", "ftp-data.setup-frame", + FT_FRAMENUM, BASE_NONE, NULL, 0, + "Where ftp-data conversation was signalled", HFILL }}, + + { &hf_ftp_data_setup_method, + { "Setup method", "ftp-data.setup-method", + FT_STRING, BASE_NONE, NULL, 0, + "Method used to set up data conversation", HFILL }}, + + { &hf_ftp_data_command, + { "Command", "ftp-data.command", + FT_STRING, BASE_NONE, NULL, 0, + "Command that this data stream answers", HFILL }}, + + { &hf_ftp_data_command_frame, + { "Command frame", "ftp-data.command-frame", + FT_FRAMENUM, BASE_NONE, NULL, 0, + "Where command for this data was seen", HFILL }}, + + { &hf_ftp_data_current_working_directory, + { "Current working directory", "ftp-data.current-working-directory", + FT_STRING, BASE_NONE, NULL, 0, + "Current working directory at time of command", HFILL }} + }; + + static ei_register_info ei[] = { + { &ei_ftp_eprt_args_invalid, { "ftp.eprt.args_invalid", PI_MALFORMED, PI_WARN, "EPRT arguments must have the form: |<family>|<addr>|<port>|", EXPFILL }}, + { &ei_ftp_epsv_args_invalid, { "ftp.epsv.args_invalid", PI_MALFORMED, PI_WARN, "EPSV arguments must have the form (|||<port>|)", EXPFILL }}, + { &ei_ftp_response_code_invalid, { "ftp.response.code.invalid", PI_MALFORMED, PI_ERROR, "Invalid response code", EXPFILL }}, + { &ei_ftp_pwd_response_invalid, { "ftp.response.pwd.invalid", PI_MALFORMED, PI_ERROR, "Invalid PWD response", EXPFILL }} + }; + + expert_module_t* expert_ftp; + + proto_ftp = proto_register_protocol("File Transfer Protocol (FTP)", "FTP", "ftp"); + + ftp_handle = register_dissector("ftp", dissect_ftp, proto_ftp); + proto_ftp_data = proto_register_protocol("FTP Data", "FTP-DATA", "ftp-data"); + ftpdata_handle = register_dissector("ftp-data", dissect_ftpdata, proto_ftp_data); + proto_register_field_array(proto_ftp, hf, array_length(hf)); + proto_register_field_array(proto_ftp, data_hf, array_length(data_hf)); + proto_register_subtree_array(ett, array_length(ett)); + expert_ftp = expert_register_protocol(proto_ftp); + expert_register_field_array(expert_ftp, ei, array_length(ei)); + + register_init_routine(&ftp_init_protocol); + register_cleanup_routine(&ftp_cleanup_protocol); + + credentials_tap = register_tap("credentials"); + + module_t *ftp_prefs_module = prefs_register_protocol(proto_ftp_data, NULL); + prefs_register_uint_preference(ftp_prefs_module, "export.maxsize", + "Max file size (in MB) for export objects (use 0 for unlimited)", /* Title */ + "Maximum file size (in megabytes) for export objects (use 0 for unlimited).", /* Description */ + 10, + &pref_export_maxsize); + ftp_eo_tap = register_export_object(proto_ftp_data, ftp_eo_packet, ftp_eo_cleanup); +} + +void +proto_reg_handoff_ftp(void) +{ + dissector_add_uint_with_preference("tcp.port", TCP_PORT_FTPDATA, ftpdata_handle); + dissector_add_uint_with_preference("tcp.port", TCP_PORT_FTP, ftp_handle); + dissector_add_uint("acdr.tls_application", TLS_APP_FTP, ftp_handle); + + data_text_lines_handle = find_dissector_add_dependency("data-text-lines", proto_ftp_data); + + tls_handle = find_dissector( "tls" ); +} + +/* + * Editor modelines - https://www.wireshark.org/tools/modelines.html + * + * Local variables: + * c-basic-offset: 4 + * tab-width: 8 + * indent-tabs-mode: nil + * End: + * + * vi: set shiftwidth=4 tabstop=8 expandtab: + * :indentSize=4:tabSize=8:noTabs=true: + */ |