summaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-tsdns.c
diff options
context:
space:
mode:
Diffstat (limited to 'epan/dissectors/packet-tsdns.c')
-rw-r--r--epan/dissectors/packet-tsdns.c162
1 files changed, 162 insertions, 0 deletions
diff --git a/epan/dissectors/packet-tsdns.c b/epan/dissectors/packet-tsdns.c
new file mode 100644
index 00000000..62b9280d
--- /dev/null
+++ b/epan/dissectors/packet-tsdns.c
@@ -0,0 +1,162 @@
+/* packet-dns.c
+ * Routines for TSDNS (TeamSpeak3 DNS) packet disassembly
+ * Copyright 2018, Maciej Krueger <mkg20001@gmail.com>
+ *
+ * Wireshark - Network traffic analyzer
+ * By Gerald Combs <gerald@wireshark.org>
+ * Copyright 1998 Gerald Combs
+ *
+ * SPDX-License-Identifier: GPL-2.0-or-later
+ */
+
+#include "config.h"
+
+#include <epan/packet.h>
+#include <epan/expert.h>
+#include <epan/strutil.h>
+#include <wsutil/strtoi.h>
+
+#define TSDNS_PORT 41144 /* Not IANA registered */
+
+void proto_register_tsdns(void);
+void proto_reg_handoff_tsdns(void);
+static dissector_handle_t tsdns_handle;
+
+static int proto_tsdns = -1;
+
+static int hf_tsdns_data = -1;
+static int hf_tsdns_request = -1;
+static int hf_tsdns_request_domain = -1;
+static int hf_tsdns_response = -1;
+static int hf_tsdns_response_ip = -1;
+static int hf_tsdns_response_address = -1;
+static int hf_tsdns_response_port = -1;
+
+static expert_field ei_response_port_malformed = EI_INIT;
+
+static gint ett_tsdns = -1;
+
+static int dissect_tsdns(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
+{
+
+ int offset = 0;
+ gboolean request = FALSE;
+
+ if (pinfo->destport == pinfo->match_uint) {
+ request = TRUE;
+ }
+
+ col_set_str(pinfo->cinfo, COL_PROTOCOL, "TSDNS");
+
+ int pLen = tvb_reported_length(tvb);
+
+ if (request) {
+ col_set_str(pinfo->cinfo, COL_INFO, "Request");
+ col_append_fstr(pinfo->cinfo, COL_INFO, " %s", tvb_get_string_enc(pinfo->pool, tvb, 0, pLen - 5, ENC_ASCII));
+ } else {
+ col_set_str(pinfo->cinfo, COL_INFO, "Response");
+ col_append_fstr(pinfo->cinfo, COL_INFO, " %s", tvb_get_string_enc(pinfo->pool, tvb, 0, pLen, ENC_ASCII));
+ }
+
+ proto_tree *tsdns_tree;
+ proto_item *ti, *hidden_item, *address_item;
+
+ ti = proto_tree_add_item(tree, proto_tsdns, tvb, offset, -1, ENC_NA);
+ tsdns_tree = proto_item_add_subtree(ti, ett_tsdns);
+
+ hidden_item = proto_tree_add_item(tsdns_tree, hf_tsdns_data, tvb, offset, -1, ENC_ASCII);
+ proto_item_set_hidden(hidden_item);
+
+ if (request) { // request is DOMAIN\n\r\r\r\n
+ hidden_item = proto_tree_add_boolean(tsdns_tree, hf_tsdns_request, tvb, 0, 0, 1); // using pLen - 5 as the last chars are \n\r\r\r\n which are just indicating the end of the request
+ proto_tree_add_item(tsdns_tree, hf_tsdns_request_domain, tvb, offset, pLen - 5, ENC_ASCII);
+ } else { // response is IP:PORT
+ hidden_item = proto_tree_add_boolean(tsdns_tree, hf_tsdns_response, tvb, 0, 0, 1);
+ address_item = proto_tree_add_item(tsdns_tree, hf_tsdns_response_address, tvb, offset, pLen, ENC_ASCII);
+ gchar** splitAddress;
+ splitAddress = wmem_strsplit(pinfo->pool, tvb_format_text(pinfo->pool, tvb, 0, pLen), ":", 1); // unsure if TSDNS also does IPv6...
+ if (splitAddress == NULL || splitAddress[0] == NULL || splitAddress[1] == NULL) {
+ expert_add_info(pinfo, address_item, &ei_response_port_malformed);
+ } else {
+ proto_tree_add_string(tsdns_tree, hf_tsdns_response_ip, tvb, 0, pLen, splitAddress[0]);
+ guint32 port;
+ if (ws_strtou32(splitAddress[1], NULL, &port))
+ proto_tree_add_uint(tsdns_tree, hf_tsdns_response_port, tvb, 0, pLen, port);
+ }
+ }
+ proto_item_set_hidden(hidden_item);
+
+ return tvb_captured_length(tvb);
+
+} /* dissect_tsdns */
+
+void proto_register_tsdns(void)
+{
+
+ static hf_register_info hf[] = {
+ { &hf_tsdns_data,
+ { "Data", "tsdns.data",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }},
+ { &hf_tsdns_request,
+ { "Request", "tsdns.request",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0,
+ "TRUE if TSDNS Request", HFILL }},
+ { &hf_tsdns_request_domain,
+ { "Requested Domain", "tsdns.request.domain",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }},
+ { &hf_tsdns_response,
+ { "Response","tsdns.response",
+ FT_BOOLEAN, BASE_NONE, NULL, 0x0,
+ "TRUE if TSDNS Response", HFILL }},
+ { &hf_tsdns_response_address,
+ { "Response Address","tsdns.response.address",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }},
+ { &hf_tsdns_response_ip,
+ { "Response IP","tsdns.response.ip",
+ FT_STRING, BASE_NONE, NULL, 0x0,
+ NULL, HFILL }},
+ { &hf_tsdns_response_port,
+ { "Response Port","tsdns.response.port",
+ FT_UINT16, BASE_DEC, NULL, 0x0,
+ NULL, HFILL }}
+ };
+
+ static ei_register_info ei[] = {
+ { &ei_response_port_malformed, { "tsdns.response.port.malformed", PI_MALFORMED, PI_ERROR, "Address port is not an integer or not contained in address", EXPFILL }}
+ };
+ expert_module_t* expert_tsdns;
+
+ static gint *ett[] = {
+ &ett_tsdns
+ };
+
+ proto_tsdns = proto_register_protocol("TeamSpeak3 DNS", "TSDNS", "tsdns");
+ proto_register_field_array(proto_tsdns, hf, array_length(hf));
+ proto_register_subtree_array(ett, array_length(ett));
+ expert_tsdns = expert_register_protocol(proto_tsdns);
+ expert_register_field_array(expert_tsdns, ei, array_length(ei));
+
+ tsdns_handle = register_dissector("tsdns", dissect_tsdns, proto_tsdns);
+}
+
+void proto_reg_handoff_tsdns(void)
+{
+ /* Default port to not dissect the protocol*/
+ dissector_add_uint_with_preference("tcp.port", 0, tsdns_handle);
+}
+
+/*
+ * Editor modelines - https://www.wireshark.org/tools/modelines.html
+ *
+ * Local variables:
+ * c-basic-offset: 2
+ * tab-width: 8
+ * indent-tabs-mode: t
+ * End:
+ *
+ * vi: set shiftwidth=8 tabstop=8 noexpandtab:
+ * :indentSize=8:tabSize=8:noTabs=false:
+ */