1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
|
/* packet-teredo.c v.1.0
* Routines for Teredo packets disassembly
* draft-huitema-v6ops-teredo-02.txt
*
* Copyright 2003, Ragi BEJJANI - 6WIND - <ragi.bejjani@6wind.com>
* Copyright 2003, Vincent JARDIN - 6WIND - <vincent.jardin@6wind.com>
* Copyright 2004, Remi DENIS-COURMONT
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/prefs.h>
#include <epan/tap.h>
#define UDP_PORT_TEREDO 3544
void proto_reg_handoff_teredo(void);
void proto_register_teredo(void);
static int teredo_tap;
static int proto_teredo;
static int hf_teredo_auth;
static int hf_teredo_auth_idlen;
static int hf_teredo_auth_aulen;
static int hf_teredo_auth_id;
static int hf_teredo_auth_value;
static int hf_teredo_auth_nonce;
static int hf_teredo_auth_conf;
static int hf_teredo_orig;
static int hf_teredo_orig_port;
static int hf_teredo_orig_addr;
static int ett_teredo;
static int ett_teredo_auth;
static int ett_teredo_orig;
typedef struct {
uint16_t th_indtyp;
uint8_t th_cidlen;
uint8_t th_authdlen;
uint8_t th_nonce[8];
uint8_t th_conf;
uint8_t th_ip_v_hl;
uint16_t th_header;
uint16_t th_orgport;
uint32_t th_iporgaddr;
} e_teredohdr;
static dissector_table_t teredo_dissector_table;
/*static heur_dissector_list_t heur_subdissector_list;*/
static dissector_handle_t teredo_handle;
static dissector_handle_t data_handle;
static int
parse_teredo_auth(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
int offset, e_teredohdr *teredoh)
{
unsigned idlen, aulen;
col_append_sep_str (pinfo->cinfo, COL_INFO, ", ",
"Authentication header");
teredoh->th_indtyp = 1;
offset += 2;
idlen = tvb_get_uint8(tvb, offset);
teredoh->th_cidlen = idlen;
offset++;
aulen = tvb_get_uint8(tvb, offset);
teredoh->th_authdlen = aulen;
offset++;
if (tree) {
proto_item *ti;
ti = proto_tree_add_item(tree, hf_teredo_auth, tvb, offset-4,
13 + idlen + aulen, ENC_NA);
tree = proto_item_add_subtree(ti, ett_teredo_auth);
proto_tree_add_item(tree, hf_teredo_auth_idlen, tvb,
offset - 2, 1, ENC_BIG_ENDIAN);
proto_tree_add_item(tree, hf_teredo_auth_aulen, tvb,
offset - 1, 1, ENC_BIG_ENDIAN);
/* idlen is usually zero */
if (idlen) {
proto_tree_add_item(tree, hf_teredo_auth_id, tvb,
offset, idlen, ENC_NA);
offset += idlen;
}
/* aulen is usually zero */
if (aulen) {
proto_tree_add_item(tree, hf_teredo_auth_value, tvb,
offset, aulen, ENC_NA);
offset += aulen;
}
proto_tree_add_item(tree, hf_teredo_auth_nonce, tvb,
offset, 8, ENC_NA);
offset += 8;
proto_tree_add_item(tree, hf_teredo_auth_conf, tvb,
offset, 1, ENC_NA);
offset++;
}
else
offset += idlen + aulen + 9;
tvb_memcpy(tvb, teredoh->th_nonce, offset - 9, 8);
teredoh->th_conf = tvb_get_uint8(tvb, offset - 1);
return offset;
}
static int
parse_teredo_orig(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
int offset, e_teredohdr *teredoh)
{
proto_item *ti = NULL;
col_append_sep_str (pinfo->cinfo, COL_INFO, ", ",
"Origin indication");
if (tree) {
ti = proto_tree_add_item(tree, hf_teredo_orig, tvb, offset,
8, ENC_NA);
tree = proto_item_add_subtree(ti, ett_teredo_orig);
}
offset += 2;
teredoh->th_orgport = tvb_get_ntohs(tvb, offset);
if (tree) {
/*
* The "usual arithmetic conversions" will convert
* "teredoh->th_orgport" to an "int" (because all
* "unsigned short" values will fit in an "int"),
* which will zero-extend it. This means that
* complementing it will turn all the zeroes in
* the upper 16 bits into ones; we just want the
* lower 16 bits (containing the port number)
* complemented, with the result zero-extended.
*
* That's what the cast is for.
*/
proto_tree_add_uint(tree, hf_teredo_orig_port, tvb,
offset, 2,
(uint16_t)~teredoh->th_orgport);
}
offset += 2;
teredoh->th_iporgaddr = tvb_get_ipv4(tvb, offset);
if (tree) {
proto_tree_add_ipv4(tree, hf_teredo_orig_addr, tvb,
offset, 4, ~teredoh->th_iporgaddr);
}
offset += 4;
return offset;
}
/* Determine if there is a sub-dissector and call it. This has been */
/* separated into a stand alone routine to other protocol dissectors */
/* can call to it, ie. socks */
static void
decode_teredo_ports(tvbuff_t *tvb, int offset, packet_info *pinfo,proto_tree *tree, int th_header)
{
tvbuff_t *next_tvb;
next_tvb = tvb_new_subset_remaining(tvb, offset);
if (dissector_try_uint(teredo_dissector_table, th_header, next_tvb, pinfo, tree))
return;
call_dissector(data_handle,next_tvb, pinfo, tree);
}
static int
dissect_teredo(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *teredo_tree;
proto_item *ti;
int offset = 0;
static e_teredohdr teredohstruct[4], *teredoh;
static int teredoh_count = 0;
teredoh_count++;
if(teredoh_count>=4){
teredoh_count=0;
}
teredoh = &teredohstruct[teredoh_count];
col_set_str(pinfo->cinfo, COL_PROTOCOL, "Teredo");
col_clear(pinfo->cinfo, COL_INFO);
ti = proto_tree_add_item(tree, proto_teredo, tvb, 0, -1, ENC_NA);
teredo_tree = proto_item_add_subtree(ti, ett_teredo);
teredoh->th_header = tvb_get_ntohs(tvb, offset);
if (teredoh->th_header == 1) {
offset = parse_teredo_auth(tvb, pinfo, teredo_tree,
offset, teredoh);
teredoh->th_header = tvb_get_ntohs(tvb, offset);
}
else
teredoh->th_indtyp = 0;
if ( teredoh->th_header == 0 ) {
offset = parse_teredo_orig(tvb, pinfo, teredo_tree,
offset, teredoh);
}
teredoh->th_ip_v_hl = tvb_get_uint8(tvb, offset);
decode_teredo_ports(tvb, offset, pinfo, tree, teredoh->th_header /* , teredoh->th_orgport*/);
tap_queue_packet(teredo_tap, pinfo, teredoh);
return tvb_captured_length(tvb);
}
static bool
dissect_teredo_heur(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
{
uint16_t val;
int offset = 0;
if (tvb_captured_length_remaining(tvb, offset) < 40)
return false;
val = tvb_get_ntohs(tvb, offset);
if (val == 1) /* possible auth header */
{
uint8_t idlen, aulen;
offset += 2;
idlen = tvb_get_uint8(tvb, offset);
offset++;
aulen = tvb_get_uint8(tvb, offset);
offset += 10;
if (tvb_captured_length_remaining(tvb, offset) < idlen + aulen + 40)
return false;
offset += idlen + aulen;
val = tvb_get_ntohs(tvb, offset);
}
if (val == 0) /* origin indication */
{
offset += 8;
if (tvb_captured_length_remaining(tvb, offset) < 40)
return false;
val = tvb_get_ntohs(tvb, offset);
}
/*
* We have to check upper-layer packet a little bit otherwise we will
* match -almost- *ANY* packet.
* These checks are in the Teredo specification by the way.
* Unfortunately, that will cause false-negative if the snaplen is too
* short to get the packet entirely.
*/
if ((val >> 12) == 6) /* IPv6 header */
{
/* checks IPv6 payload length */
val = tvb_get_ntohs(tvb, offset + 4);
offset += 40;
if (val > 65467)
return false; /* length too big for Teredo */
if (tvb_reported_length_remaining(tvb, offset) != val)
return false; /* length mismatch */
dissect_teredo (tvb, pinfo, tree, data);
return true;
}
return false; /* not an IPv6 packet */
}
void
proto_register_teredo(void)
{
static hf_register_info hf[] = {
/* Authentication header */
{ &hf_teredo_auth,
{ "Teredo Authentication header", "teredo.auth",
FT_NONE, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_teredo_auth_idlen,
{ "Client identifier length", "teredo.auth.idlen",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Client identifier length (ID-len)", HFILL }},
{ &hf_teredo_auth_aulen,
{ "Authentication value length", "teredo.auth.aulen",
FT_UINT8, BASE_DEC, NULL, 0x0,
"Authentication value length (AU-len)", HFILL }},
{ &hf_teredo_auth_id,
{ "Client identifier", "teredo.auth.id",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Client identifier (ID)", HFILL }},
{ &hf_teredo_auth_value,
{ "Authentication value", "teredo.auth.value",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Authentication value (hash)", HFILL }},
{ &hf_teredo_auth_nonce,
{ "Nonce value", "teredo.auth.nonce",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Nonce value prevents spoofing Teredo server.",
HFILL }},
{ &hf_teredo_auth_conf,
{ "Confirmation byte", "teredo.auth.conf",
FT_BYTES, BASE_NONE, NULL, 0x0,
"Confirmation byte is zero upon successful authentication.",
HFILL }},
/* Origin indication */
{ &hf_teredo_orig,
{ "Teredo Origin Indication header", "teredo.orig",
FT_NONE, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_teredo_orig_port,
{ "Origin UDP port", "teredo.orig.port",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_teredo_orig_addr,
{ "Origin IPv4 address", "teredo.orig.addr",
FT_IPv4, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
};
static int *ett[] = {
&ett_teredo, &ett_teredo_auth, &ett_teredo_orig
};
module_t *teredo_module;
proto_teredo = proto_register_protocol("Teredo IPv6 over UDP tunneling", "Teredo", "teredo");
proto_register_field_array(proto_teredo, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
teredo_handle = register_dissector("teredo", dissect_teredo, proto_teredo);
/* subdissector code */
teredo_dissector_table = register_dissector_table("teredo", "Teredo", proto_teredo, FT_UINT16, BASE_DEC);
teredo_module = prefs_register_protocol(proto_teredo, NULL);
prefs_register_obsolete_preference(teredo_module, "heuristic_teredo");
teredo_tap = register_tap("teredo");
}
void
proto_reg_handoff_teredo(void)
{
data_handle = find_dissector("ipv6");
dissector_add_uint_with_preference("udp.port", UDP_PORT_TEREDO, teredo_handle);
heur_dissector_add("udp", dissect_teredo_heur, "Teredo over UDP", "teredo_udp", proto_teredo, HEURISTIC_DISABLE);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/
|