Find a file
Ivan Nardi 82e8bf91dd
Improve handling of custom rules (#2276)
Avoid collisions between user-ids and internal-ids protocols in the
`example/protos.txt` file.
Add a new value for the classification confidence:
`NDPI_CONFIDENCE_CUSTOM_RULE`

With `./example/ndpiReader -p example/protos.txt -H` we now see also the
custom protocols and their internal/external ids:

```
nDPI supported protocols:
 Id Userd-id Protocol               Layer_4    Nw_Proto Breed        Category
  0        0 Unknown                TCP        X        Unrated      Unspecified

...

387      387 Mumble                 UDP        X        Fun          VoIP
388      388 iSCSI                  TCP                 Acceptable   Unspecified
389      389 Kibana                 TCP                 Acceptable   Unspecified
390      390 TestProto              TCP                 Acceptable   Unspecified
391      391 HomeRouter             TCP                 Acceptable   Unspecified
392      392 CustomProtocol         TCP                 Acceptable   Unspecified
393      393 AmazonPrime            TCP                 Acceptable   Unspecified
394      394 CustomProtocolA        TCP                 Acceptable   Unspecified
395      395 CustomProtocolB        TCP                 Acceptable   Unspecified
396      800 CustomProtocolC        TCP                 Acceptable   Unspecified
397     1024 CustomProtocolD        TCP                 Acceptable   Unspecified
398     2048 CustomProtocolE        TCP                 Acceptable   Unspecified
399     2049 CustomProtocolF        TCP                 Acceptable   Unspecified
400     2050 CustomProtocolG        TCP                 Acceptable   Unspecified
401    65535 CustomProtocolH        TCP                 Acceptable   Unspecified
```

We likely need to take a better look in general at the iteration between
internal and external protocols ids...

This PR fixes the issue observed in
https://github.com/ntop/nDPI/pull/2274#discussion_r1460674874 and in
https://github.com/ntop/nDPI/pull/2275.
2024-01-21 19:53:32 +01:00
.github ndpiReader: fix memory leak 2024-01-15 19:49:27 +01:00
doc Add ElectronicArts detection support (#2274) 2024-01-21 18:58:12 +01:00
example Improve handling of custom rules (#2276) 2024-01-21 19:53:32 +01:00
fuzz config: follow-up (#2268) 2024-01-20 16:14:41 +01:00
influxdb Do not interfere with CFLAGS/LDFLAGS env anymore. (#1659) 2022-07-13 19:44:18 +02:00
lists Added new API calls 2024-01-15 19:03:46 +01:00
m4 build: respect environment options more (#1392) 2022-01-18 14:30:14 +01:00
packages Debian 12 fixes 2023-07-21 12:24:34 -04:00
python config: allow configuration of guessing algorithms 2024-01-18 10:21:24 +01:00
rrdtool Added missing library 2022-09-21 08:24:37 +02:00
src Improve handling of custom rules (#2276) 2024-01-21 19:53:32 +01:00
tests Improve handling of custom rules (#2276) 2024-01-21 19:53:32 +01:00
utils Fix some warnings reported by CODESonar (#2227) 2024-01-12 13:30:43 +01:00
windows Add Yojimbo (netcode) protocol dissector (#2277) 2024-01-21 17:47:42 +01:00
wireshark Added NDPI_MALWARE_HOST_CONTACTED flow risk 2023-10-13 00:01:55 +02:00
.ci-ignore Replaced gethostbyname2 with getaddrinfo (portable code) 2023-10-30 22:55:50 +01:00
.gitattributes Extend protocols support (#1422) 2022-01-29 09:19:26 +01:00
.gitignore config: follow-up (#2268) 2024-01-20 16:14:41 +01:00
autogen.sh Fixed msys2 build warnings and re-activated CI Mingw64 build. 2022-04-14 19:17:48 +02:00
CHANGELOG.md Added 4.8 changeling 2023-10-23 11:38:46 +02:00
configure.ac CI: update list of compilers (#2223) 2023-12-20 19:22:22 +01:00
CONTRIBUTING.md Added CLA section 2023-10-23 12:05:56 +02:00
COPYING Initial import from SVN 2015-04-19 07:25:59 +02:00
INSTALL Initial import from SVN 2015-04-19 07:25:59 +02:00
libndpi.pc.in Fixed broken pkg-config file which did not care about gcrypt/pcre. 2020-08-24 18:12:49 +02:00
Makefile.am New API for library configuration 2024-01-18 10:21:24 +01:00
README.fuzzer.md Remove some useless fuzzing target (#1813) 2022-12-01 14:39:44 +01:00
README.md Add a FAQ for the project (#2185) 2023-11-29 18:25:36 +01:00
sonar-project.properties Changes for sonarcloud integration 2021-05-11 21:36:25 +02:00

ntop ntop

nDPI

Build Status Fuzzing Status

What is nDPI ?

nDPI® is an open source LGPLv3 library for deep-packet inspection. Based on OpenDPI it includes ntop extensions. We have tried to push them into the OpenDPI source tree but nobody answered emails so we have decided to create our own source tree

A generic FAQ about nDPI® is available here

How To Compile nDPI

In order to compile this project do

  • ./autogen.sh
  • make

To compile the library w/o any tools or tests:

  • ./autogen.sh --with-only-libndpi
  • make

To run tests do additionally:

  • ./tests/do.sh # Generate and check for diff's in PCAP files
  • ./tests/do-unit.sh # Run unit tests
  • ./tests/do-dga.sh # Run DGA detection test

or run all with: make check

Please note that the (minimal) pre-requisites for compilation include:

  • GNU tools (autoconf automake libtool pkg-config gettext flex bison)
  • GNU C compiler (gcc) or Clang

On Debian/Ubuntu systems do:

  • sudo apt-get install build-essential git gettext flex bison libtool autoconf automake pkg-config libpcap-dev libjson-c-dev libnuma-dev libpcre2-dev libmaxminddb-dev librrd-dev

On Arch Linux:

  • sudo pacman -S gcc git gettext flex bison libtool autoconf automake pkg-config libpcap json-c numactl pcre2 libmaxminddb rrdtool

On FreeBSD:

  • sudo pkg install gcc git gettext flex bison libtool autoconf automake devel/pkgconf gmake libpcap json-c pcre2 libmaxminddb rrdtool

Remember to use gmake and not make on FreeBSD

On MacOS:

  • brew install coreutils gcc git gettext flex bison libtool autoconf automake pkg-config libpcap json-c pcre2 libmaxminddb rrdtool

On Windows:

There are three supported ways to build nDPI:

  1. MSYS2 (assuming MSYS2 already installed):
  • msys2 -c "pacman --noconfirm -S --needed --overwrite '*' git mingw-w64-x86_64-toolchain automake1.16 automake-wrapper autoconf libtool make mingw-w64-x86_64-json-c mingw-w64-x86_64-crt-git mingw-w64-x86_64-pcre2 mingw-w64-x86_64-libpcap"
  1. Mingw-w64

  2. Visual Studio (see windows/nDPI.sln)

Note: All Windows versions require npcap with WinPcap compatibility mode enabled.

How To Build The Documentation

  • pip install --upgrade pip
  • pip install -r doc/requirements.txt
  • make doc

Use the builtin python3 webserver to view documentation:

  • make doc-view

How To Add A New Protocol Dissector

The entire procedure of adding new protocols in detail:

  1. Add new protocol together with its unique ID to: src/include/ndpi_protocol_ids.h
  2. Create a new protocol in: src/lib/protocols/
  3. Variables to be kept for the duration of the entire flow (as state variables) need to be placed in: src/include/ndpi_typedefs.h in ndpi_flow_tcp_struct (for TCP only), ndpi_flow_udp_struct (for UDP only), or ndpi_flow_struct (for both).
  4. Add a new entry for the search function for the new protocol in: src/include/ndpi_protocols.h
  5. Choose (do not change anything) a selection bitmask from: src/include/ndpi_define.h
  6. Set protocol default ports in ndpi_init_protocol_defaults in: src/lib/ndpi_main.c
  7. Be sure to have nBPF support, cloning PF_RING in the same directory where you cloned nDPI: git clone https://github.com/ntop/PF_RING/ && cd PF_RING/userland/nbpf && ./configure && make
  8. From the nDPI root directory, ./autogen.sh --with-pcre2 (nBPF and PCRE2 are usually optional, but they are needed to run/update all the unit tests)
  9. make
  10. make check
  11. Update the documentation, adding this new protocol to doc/protocols.rst

How to use nDPI to Block Selected Traffic

You can use nDPI to selectively block selected Internet traffic by embedding it onto an application (remember that nDPI is just a library). Both ntopng and nProbe cento can do this.

nDPI Paper Citation

Videos and Presentations

DISCLAIMER

While we do our best to detect network protocols, we cannot guarantee that our software is error free and 100% accurate in protocol detection. Please make sure that you respect the privacy of users and you have proper authorization to listen, capture and inspect network traffic.

nDPI is a registered trademark in the US and EU.