1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
|
/* packet-dtp.c
* Routines for the disassembly for Cisco Dynamic Trunk Protocol
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* DTP support added by Charlie Lenahan <clenahan@fortresstech.com>
*
* Additional information comes from Yersinia (http://www.yersinia.net/)
* by Alfredo Andres and David Barroso
*
* Improved dissection for Trunk Status and Trunk Type TLVs
* based on DTP description in U.S. Patent #6,445,715 and
* consultations with Aninda Chatterjee @ Cisco
* by Peter Paluch <Peter.Paluch@fri.uniza.sk>
*
* SPDX-License-Identifier: GPL-2.0-or-later
*
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/to_str.h>
#include <epan/expert.h>
#include <epan/cisco_pid.h>
/*
* It's incomplete, and it appears to be inaccurate in a number of places,
* but it's all I could find....
*/
void proto_register_dtp(void);
void proto_reg_handoff_dtp(void);
static dissector_handle_t dtp_handle;
static int proto_dtp = -1;
static int hf_dtp_version = -1;
static int hf_dtp_domain = -1;
static int hf_dtp_tlvtype = -1;
static int hf_dtp_tlvlength = -1;
static int hf_dtp_senderid = -1;
static int hf_dtp_tot = -1;
static int hf_dtp_tat = -1;
static int hf_dtp_tos = -1;
static int hf_dtp_tas = -1;
static int hf_dtp_data = -1;
static gint ett_dtp = -1;
static gint ett_dtp_tlv = -1;
static gint ett_dtp_status = -1;
static gint ett_dtp_type = -1;
static expert_field ei_dtp_tlv_length_too_short = EI_INIT;
static expert_field ei_dtp_tlv_length_invalid = EI_INIT;
static expert_field ei_dtp_truncated = EI_INIT;
static void
dissect_dtp_tlv(packet_info *pinfo, tvbuff_t *tvb, int offset, int length,
proto_tree *tree, proto_item *ti, proto_item *tlv_length_item, guint8 type);
#define DTP_TLV_DOMAIN 0x01 /* VTP Domain Name */
#define DTP_TLV_TRSTATUS 0x02 /* Trunk Status */
#define DTP_TLV_TRTYPE 0x03 /* Trunk Type */
#define DTP_TLV_SENDERID 0x04 /* Sender ID (MAC) */
#define DTP_TOS_SHIFT 7
#define DTP_TOT_SHIFT 5
#define DTP_TOS_MASK 0x80
#define DTP_TAS_MASK 0x07
#define DTP_TOT_MASK 0xE0
#define DTP_TAT_MASK 0x07
#define DTP_TOSVALUE(status) (((status) & DTP_TOS_MASK) >> DTP_TOS_SHIFT)
#define DTP_TASVALUE(status) ((status) & DTP_TAS_MASK)
#define DTP_TOTVALUE(type) (((type) & DTP_TOT_MASK) >> DTP_TOT_SHIFT)
#define DTP_TATVALUE(type) ((type) & DTP_TAT_MASK)
/* Trunk Operating Status */
#define DTP_TOS_ACCESS 0x0
#define DTP_TOS_TRUNK 0x1
/* Trunk Administrative Status */
#define DTP_TAS_ON 0x1
#define DTP_TAS_OFF 0x2
#define DTP_TAS_DESIRABLE 0x3
#define DTP_TAS_AUTO 0x4
/* Trunk Operating Type */
#define DTP_TOT_NATIVE 0x1
#define DTP_TOT_ISL 0x2
#define DTP_TOT_DOT1Q 0x5
/* Trunk Administrative Type */
#define DTP_TAT_NEGOTIATED 0x0
#define DTP_TAT_NATIVE 0x1
#define DTP_TAT_ISL 0x2
#define DTP_TAT_DOT1Q 0x5
static const value_string dtp_tlv_type_vals[] = {
{ DTP_TLV_DOMAIN, "Domain" },
{ DTP_TLV_TRSTATUS, "Trunk Status" },
{ DTP_TLV_TRTYPE, "Trunk Type" },
{ DTP_TLV_SENDERID, "Sender ID" },
{ 0, NULL }
};
static const value_string dtp_tos_vals[] = {
{ DTP_TOS_ACCESS, "Access" },
{ DTP_TOS_TRUNK, "Trunk"},
{ 0, NULL }
};
static const value_string dtp_tas_vals[] = {
{ DTP_TAS_ON, "On" },
{ DTP_TAS_OFF, "Off" },
{ DTP_TAS_DESIRABLE, "Desirable" },
{ DTP_TAS_AUTO, "Auto" },
{ 0, NULL }
};
static const value_string dtp_tot_vals[] = {
{ DTP_TOT_NATIVE, "Native" },
{ DTP_TOT_ISL, "ISL" },
{ DTP_TOT_DOT1Q, "802.1Q" },
{ 0, NULL }
};
static const value_string dtp_tat_vals[] = {
{ DTP_TAT_NEGOTIATED, "Negotiated" },
{ DTP_TAT_NATIVE, "Native" },
{ DTP_TAT_ISL, "ISL" },
{ DTP_TAT_DOT1Q, "802.1Q" },
{ 0, NULL }
};
static int
dissect_dtp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_item *ti;
proto_tree *dtp_tree;
proto_tree *tlv_tree;
int offset = 0;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "DTP");
col_set_str(pinfo->cinfo, COL_INFO, "Dynamic Trunk Protocol");
ti = proto_tree_add_item(tree, proto_dtp, tvb, offset, -1, ENC_NA);
dtp_tree = proto_item_add_subtree(ti, ett_dtp);
/* We assume version */
proto_tree_add_item(dtp_tree, hf_dtp_version, tvb, offset, 1, ENC_BIG_ENDIAN);
offset += 1;
while (tvb_reported_length_remaining(tvb, offset) > 0) {
int type, length, valuelength;
proto_item * tlv_length_item;
/* XXX - why not just let tvbuff exceptions handle this? */
if (tvb_reported_length_remaining(tvb, offset) < 4) {
expert_add_info(pinfo, dtp_tree, &ei_dtp_truncated);
break;
}
type = tvb_get_ntohs(tvb, offset);
length = tvb_get_ntohs(tvb, offset + 2);
tlv_tree = proto_tree_add_subtree(dtp_tree, tvb, offset, length, ett_dtp_tlv, NULL,
val_to_str(type, dtp_tlv_type_vals, "Unknown TLV type: 0x%02x"));
proto_tree_add_uint(tlv_tree, hf_dtp_tlvtype, tvb, offset, 2, type);
offset+=2;
tlv_length_item = proto_tree_add_uint(tlv_tree, hf_dtp_tlvlength, tvb, offset, 2, length);
offset+=2;
if (length <= 4) {
/* Length includes type and length fields, so it
must be >= 4, and no known TLVs have a value
length of 0, so it must be > 4. */
expert_add_info(pinfo, tlv_length_item, &ei_dtp_tlv_length_too_short);
break;
}
valuelength = (length-4);
dissect_dtp_tlv(pinfo, tvb, offset, valuelength, tlv_tree, ti, tlv_length_item, (guint8) type);
offset += valuelength;
}
return tvb_captured_length(tvb);
}
static void
dissect_dtp_tlv(packet_info *pinfo, tvbuff_t *tvb, int offset, int length,
proto_tree *tree, proto_item *ti, proto_item *tlv_length_item, guint8 type)
{
switch (type) {
case DTP_TLV_DOMAIN:
if (length <= 33) { /* VTP domain name is at most 32 bytes long and is null-terminated */
proto_item_append_text(ti, ": %s", tvb_format_text(pinfo->pool, tvb, offset, length - 1));
proto_tree_add_item(tree, hf_dtp_domain, tvb, offset, length, ENC_ASCII);
}
else
expert_add_info(pinfo, tlv_length_item, &ei_dtp_tlv_length_invalid);
break;
case DTP_TLV_TRSTATUS:
if (length == 1) { /* Value field length must be 1 byte */
proto_tree * field_tree = NULL;
guint8 trunk_status = tvb_get_guint8(tvb, offset);
proto_item_append_text(ti,
" (Operating/Administrative): %s/%s (0x%02x)",
val_to_str_const(DTP_TOSVALUE(trunk_status), dtp_tos_vals, "Unknown operating status"),
val_to_str_const(DTP_TASVALUE(trunk_status), dtp_tas_vals, "Unknown administrative status"),
trunk_status);
field_tree = proto_tree_add_subtree_format(tree, tvb, offset, length, ett_dtp_status, NULL, "Value: %s/%s (0x%02x)",
val_to_str_const(DTP_TOSVALUE(trunk_status), dtp_tos_vals, "Unknown operating status"),
val_to_str_const(DTP_TASVALUE(trunk_status), dtp_tas_vals, "Unknown administrative status"),
trunk_status);
proto_tree_add_item(field_tree, hf_dtp_tos, tvb, offset, length, ENC_BIG_ENDIAN);
proto_tree_add_item(field_tree, hf_dtp_tas, tvb, offset, length, ENC_BIG_ENDIAN);
}
else
expert_add_info(pinfo, tlv_length_item, &ei_dtp_tlv_length_invalid);
break;
case DTP_TLV_TRTYPE:
if (length == 1) { /* Value field length must be 1 byte */
proto_tree * field_tree;
guint8 trunk_type = tvb_get_guint8(tvb, offset);
proto_item_append_text(ti,
" (Operating/Administrative): %s/%s (0x%02x)",
val_to_str_const(DTP_TOTVALUE(trunk_type), dtp_tot_vals, "Unknown operating type"),
val_to_str_const(DTP_TATVALUE(trunk_type), dtp_tat_vals, "Unknown administrative type"),
trunk_type);
field_tree = proto_tree_add_subtree_format(tree, tvb, offset, length, ett_dtp_type, NULL, "Value: %s/%s (0x%02x)",
val_to_str_const(DTP_TOTVALUE(trunk_type), dtp_tot_vals, "Unknown operating type"),
val_to_str_const(DTP_TATVALUE(trunk_type), dtp_tat_vals, "Unknown administrative type"),
trunk_type);
proto_tree_add_item(field_tree, hf_dtp_tot, tvb, offset, length, ENC_BIG_ENDIAN);
proto_tree_add_item(field_tree, hf_dtp_tat, tvb, offset, length, ENC_BIG_ENDIAN);
}
else
expert_add_info(pinfo, tlv_length_item, &ei_dtp_tlv_length_invalid);
break;
case DTP_TLV_SENDERID:
if (length == 6) { /* Value length must be 6 bytes for a MAC address */
proto_item_append_text(ti, ": %s",
tvb_ether_to_str(pinfo->pool, tvb, offset)); /* XXX - resolve? */
proto_tree_add_item(tree, hf_dtp_senderid, tvb, offset, length, ENC_NA);
}
else
expert_add_info(pinfo, tlv_length_item, &ei_dtp_tlv_length_invalid);
break;
default:
proto_tree_add_item(tree, hf_dtp_data, tvb, offset, length, ENC_NA);
break;
}
}
void
proto_register_dtp(void)
{
static hf_register_info hf[] = {
{ &hf_dtp_version,
{ "Version", "dtp.version", FT_UINT8, BASE_DEC,
NULL, 0x0, NULL, HFILL }},
{ &hf_dtp_domain,
{ "Domain", "dtp.domain", FT_STRING, BASE_NONE,
NULL, 0x0, NULL, HFILL }},
{ &hf_dtp_tlvtype,
{ "Type", "dtp.tlv_type", FT_UINT16, BASE_HEX,
VALS(dtp_tlv_type_vals), 0x0, NULL, HFILL }},
{ &hf_dtp_tlvlength,
{ "Length", "dtp.tlv_len", FT_UINT16, BASE_DEC,
NULL, 0x0, NULL, HFILL }},
{ &hf_dtp_tos,
{ "Trunk Operating Status", "dtp.tos", FT_UINT8, BASE_HEX,
VALS(dtp_tos_vals), DTP_TOS_MASK, NULL, HFILL }},
{ &hf_dtp_tas,
{ "Trunk Administrative Status", "dtp.tas", FT_UINT8, BASE_HEX,
VALS(dtp_tas_vals), DTP_TAS_MASK, NULL, HFILL }},
{ &hf_dtp_tot,
{ "Trunk Operating Type", "dtp.tot", FT_UINT8, BASE_HEX,
VALS(dtp_tot_vals), DTP_TOT_MASK, NULL, HFILL }},
{ &hf_dtp_tat,
{ "Trunk Administrative Type", "dtp.tat", FT_UINT8, BASE_HEX,
VALS(dtp_tat_vals), DTP_TAT_MASK, NULL, HFILL }},
{ &hf_dtp_senderid,
{ "Sender ID", "dtp.senderid", FT_ETHER, BASE_NONE,
NULL, 0x0, "MAC Address of neighbor", HFILL }},
{ &hf_dtp_data,
{ "Data", "dtp.data", FT_ETHER, BASE_NONE,
NULL, 0x0, NULL, HFILL }},
};
static gint *ett[] = {
&ett_dtp,
&ett_dtp_tlv,
&ett_dtp_status,
&ett_dtp_type,
};
static ei_register_info ei[] = {
{ &ei_dtp_tlv_length_too_short,
{ "dtp.tlv_len.too_short", PI_MALFORMED, PI_ERROR,
"Indicated length is less than the minimum length", EXPFILL }},
{ &ei_dtp_tlv_length_invalid,
{ "dtp.tlv_len.invalid", PI_MALFORMED, PI_ERROR,
"Indicated length does not correspond to this record type", EXPFILL }},
{ &ei_dtp_truncated,
{ "dtp.truncated", PI_MALFORMED, PI_ERROR,
"DTP message is truncated prematurely", EXPFILL }}
};
expert_module_t *expert_dtp;
proto_dtp = proto_register_protocol("Dynamic Trunk Protocol", "DTP", "dtp");
proto_register_field_array(proto_dtp, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
expert_dtp = expert_register_protocol(proto_dtp);
expert_register_field_array(expert_dtp, ei, array_length(ei));
dtp_handle = register_dissector("dtp", dissect_dtp, proto_dtp);
}
void
proto_reg_handoff_dtp(void)
{
dissector_add_uint("llc.cisco_pid", CISCO_PID_DTP, dtp_handle);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/
|