mirror of
https://github.com/ntop/ntopng.git
synced 2026-05-20 00:57:00 +00:00
477 lines
14 KiB
C++
477 lines
14 KiB
C++
/*
|
|
*
|
|
* (C) 2013-26 - ntop.org
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software Foundation,
|
|
* Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*
|
|
*/
|
|
|
|
#include "ntop_includes.h"
|
|
|
|
/* ******************************* */
|
|
|
|
static void* resolverCheckFctn(void* ptr) {
|
|
static std::atomic<u_int32_t> counter = 0;
|
|
char name[16];
|
|
|
|
snprintf(name, sizeof(name), "mdns-res-%d", counter++);
|
|
ntop->registerThread(name, pthread_self());
|
|
MDNS* m = (MDNS*)ptr;
|
|
|
|
m->initializeResolver();
|
|
return (NULL);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
MDNS::MDNS(NetworkInterface* iface) {
|
|
if (trace_new_delete)
|
|
ntop->getTrace()->traceEvent(TRACE_NORMAL, "[new] %s", __FILE__);
|
|
|
|
if (((udp_sock = Utils::openSocket(AF_INET, SOCK_DGRAM, 0, "MDNS UDP")) ==
|
|
-1) ||
|
|
((batch_udp_sock =
|
|
Utils::openSocket(AF_INET, SOCK_DGRAM, 0, "MDNS Batch UDP")) == -1))
|
|
throw("Unable to create socket");
|
|
|
|
/* Multicast group is 224.0.0.251 */
|
|
gatewayIPv4 = Utils::findInterfaceGatewayIPv4(iface->get_name());
|
|
|
|
pthread_create(&resolverCheck, NULL, resolverCheckFctn, (void*)this);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
MDNS::~MDNS() {
|
|
if (trace_new_delete)
|
|
ntop->getTrace()->traceEvent(TRACE_NORMAL, "[delete] %s", __FILE__);
|
|
Utils::closeSocket(udp_sock);
|
|
Utils::closeSocket(batch_udp_sock);
|
|
|
|
pthread_join(resolverCheck, NULL);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
void MDNS::initializeResolver() {
|
|
if (gatewayIPv4) {
|
|
/* Let's check if this resolver is active */
|
|
u_int dns_query_len;
|
|
char mdnsbuf[512];
|
|
u_int16_t tid = gatewayIPv4 & 0xFFFF;
|
|
struct sockaddr_in mdns_dest;
|
|
|
|
dns_query_len =
|
|
prepareIPv4ResolveQuery(gatewayIPv4, mdnsbuf, sizeof(mdnsbuf), tid);
|
|
|
|
mdns_dest.sin_family = AF_INET, mdns_dest.sin_port = htons(53),
|
|
mdns_dest.sin_addr.s_addr = gatewayIPv4;
|
|
if (sendto(udp_sock, mdnsbuf, dns_query_len, 0,
|
|
(struct sockaddr*)&mdns_dest, sizeof(struct sockaddr_in)) > 0) {
|
|
if (Utils::pollSocket(udp_sock, 2000) > 0) {
|
|
struct sockaddr_in from;
|
|
socklen_t from_len = sizeof(from);
|
|
int len = recvfrom(udp_sock, mdnsbuf, sizeof(mdnsbuf), 0,
|
|
(struct sockaddr*)&from, &from_len);
|
|
|
|
if (len > 0) return; /* This is a valid resolver */
|
|
}
|
|
}
|
|
|
|
gatewayIPv4 = 0; /* Invalid */
|
|
}
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
u_int16_t MDNS::buildMDNSRequest(char* query, u_int8_t query_type,
|
|
char* mdnsbuf, u_int mdnsbuf_len,
|
|
u_int16_t tid) {
|
|
u_int16_t last_dot = 0, dns_query_len;
|
|
struct ndpi_dns_packet_header* dns_h =
|
|
(struct ndpi_dns_packet_header*)mdnsbuf;
|
|
char* queries;
|
|
|
|
dns_h->tr_id = tid;
|
|
dns_h->flags = 0 /* query */;
|
|
dns_h->num_queries = htons(1);
|
|
dns_h->num_answers = 0;
|
|
dns_h->authority_rrs = 0;
|
|
dns_h->additional_rrs = 0;
|
|
queries = &mdnsbuf[sizeof(struct ndpi_dns_packet_header)];
|
|
|
|
mdnsbuf_len -= sizeof(struct ndpi_dns_packet_header) + 4;
|
|
|
|
for (dns_query_len = 0;
|
|
(dns_query_len < mdnsbuf_len) && (query[dns_query_len] != '\0');
|
|
dns_query_len++) {
|
|
if (query[dns_query_len] == '.') {
|
|
queries[last_dot] = dns_query_len - last_dot;
|
|
last_dot = dns_query_len + 1;
|
|
} else
|
|
queries[dns_query_len + 1] = query[dns_query_len];
|
|
}
|
|
|
|
dns_query_len++;
|
|
queries[last_dot] = dns_query_len - last_dot - 1;
|
|
queries[dns_query_len++] = '\0';
|
|
|
|
queries[dns_query_len++] = 0x00;
|
|
queries[dns_query_len++] = query_type;
|
|
queries[dns_query_len++] = 0x00;
|
|
queries[dns_query_len++] = 0x01; /* IN */
|
|
dns_query_len += sizeof(struct ndpi_dns_packet_header);
|
|
|
|
sentAnyQuery = (query_type == 0xFF) ? true : false;
|
|
return (dns_query_len);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
u_int16_t MDNS::prepareIPv4ResolveQuery(
|
|
u_int32_t ipv4addr /* network byte order */, char* mdnsbuf,
|
|
u_int mdnsbuf_len, u_int16_t tid) {
|
|
char query[64], addrbuf[32];
|
|
|
|
/*
|
|
dig +short @224.0.0.251 -p 5353 -t PTR 20.2.168.192.in-addr.arpa
|
|
*/
|
|
snprintf(query, sizeof(query), "%s.in-addr.arpa",
|
|
Utils::intoaV4(ipv4addr, addrbuf, sizeof(addrbuf)));
|
|
|
|
return (buildMDNSRequest(query, 0x0C /* PTR */, mdnsbuf, mdnsbuf_len, tid));
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
bool MDNS::sendAnyQuery(char* targetIPv4, char* query) {
|
|
char mdnsbuf[512];
|
|
u_int16_t len =
|
|
buildMDNSRequest(query, 0xFF /* ANY */, mdnsbuf, sizeof(mdnsbuf), 0);
|
|
struct sockaddr_in dest;
|
|
|
|
/* dig @192.168.2.38 -p 5353 -t any _sftp-ssh._tcp.local */
|
|
|
|
dest.sin_family = AF_INET, dest.sin_port = htons(5353),
|
|
dest.sin_addr.s_addr = inet_addr(targetIPv4);
|
|
if (sendto(batch_udp_sock, mdnsbuf, len, 0, (struct sockaddr*)&dest,
|
|
sizeof(struct sockaddr_in)) < 0) {
|
|
return (false);
|
|
}
|
|
|
|
return (true);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
char* MDNS::decodePTRResponse(char* mdnsbuf, u_int mdnsbuf_len, char* buf,
|
|
u_int buf_len, u_int32_t* resolved_ip) {
|
|
struct ndpi_dns_packet_header* dns_h =
|
|
(struct ndpi_dns_packet_header*)mdnsbuf;
|
|
u_int offset = 0, i, idx, to_skip = ntohs(dns_h->num_queries);
|
|
char* queries = &mdnsbuf[sizeof(struct ndpi_dns_packet_header)];
|
|
|
|
mdnsbuf_len -= sizeof(struct ndpi_dns_packet_header);
|
|
*resolved_ip = 0;
|
|
|
|
/* Skip queries */
|
|
for (i = 0, idx = 0; (i < to_skip) && (offset < (u_int)mdnsbuf_len);) {
|
|
if (queries[offset] != 0) {
|
|
if (queries[offset] < 32)
|
|
buf[idx] = '.';
|
|
else
|
|
buf[idx] = queries[offset];
|
|
|
|
offset++, idx++;
|
|
continue;
|
|
} else {
|
|
if (i == 0) {
|
|
int a, b, c, d;
|
|
|
|
buf[idx] = '\0';
|
|
|
|
if (sscanf(buf, ".%d.%d.%d.%d.", &a, &b, &c, &d) == 4)
|
|
*resolved_ip = ((d & 0xFF) << 24) + ((c & 0xFF) << 16) +
|
|
((b & 0xFF) << 8) + (a & 0xFF);
|
|
}
|
|
|
|
offset += 4, idx = 0;
|
|
i++; /* Found one query */
|
|
}
|
|
}
|
|
|
|
/* Time to decode response. We consider only the first one */
|
|
offset += 14;
|
|
|
|
for (idx = 0;
|
|
(offset < mdnsbuf_len) && (queries[offset] != '\0') && (idx < buf_len);
|
|
offset++, idx++) {
|
|
if (queries[offset] < 32)
|
|
buf[idx] = '.';
|
|
else
|
|
buf[idx] = queries[offset];
|
|
}
|
|
|
|
/* As the response ends in ".local" let's cut it */
|
|
if ((idx > 6) && (strncmp(&buf[idx], ".local", 6) == 0)) idx -= 6;
|
|
|
|
buf[idx] = '\0';
|
|
|
|
return (buf);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
char* MDNS::decodeAnyResponse(char* mdnsbuf, u_int mdnsbuf_len, char* buf,
|
|
u_int buf_len) {
|
|
struct ndpi_dns_packet_header* dns_h =
|
|
(struct ndpi_dns_packet_header*)mdnsbuf;
|
|
u_int offset = 0, i, idx, to_skip;
|
|
u_char* queries = (u_char*)&mdnsbuf[sizeof(struct ndpi_dns_packet_header)];
|
|
|
|
mdnsbuf_len -= sizeof(struct ndpi_dns_packet_header);
|
|
|
|
/* Skip queries */
|
|
to_skip = ntohs(dns_h->num_queries);
|
|
for (i = 0, idx = 0; (i < to_skip) && (offset < (u_int)mdnsbuf_len);) {
|
|
if (queries[offset] != 0) {
|
|
offset++, idx++;
|
|
continue;
|
|
} else {
|
|
offset += 4, idx = 0;
|
|
i++; /* Found one query */
|
|
}
|
|
}
|
|
|
|
offset++;
|
|
|
|
/* Skip replies */
|
|
to_skip = ntohs(dns_h->num_answers);
|
|
for (i = 0, idx = 0; (i < to_skip) && (offset < (u_int)mdnsbuf_len);) {
|
|
u_int16_t len;
|
|
|
|
offset += 10;
|
|
|
|
len = ntohs(*(u_int16_t*)&queries[offset]);
|
|
offset += len + 2;
|
|
|
|
i++; /* Found one reply */
|
|
}
|
|
|
|
to_skip = ntohs(dns_h->additional_rrs);
|
|
for (i = 0, idx = 0; (i < to_skip) && (offset < (u_int)mdnsbuf_len);) {
|
|
u_int16_t len, qtype;
|
|
|
|
if (queries[offset] != 0xC0) {
|
|
while ((offset < (u_int)mdnsbuf_len) && (queries[offset] != 0xC0))
|
|
offset++;
|
|
}
|
|
|
|
qtype = ntohs(*(u_int16_t*)&queries[offset + 2]);
|
|
|
|
len = ntohs(*(u_int16_t*)&queries[offset + 10]);
|
|
offset += 12;
|
|
|
|
if (qtype == 0x10) {
|
|
int j;
|
|
|
|
for (j = 0; (j < len) && (offset < (u_int)mdnsbuf_len); j++) {
|
|
if (queries[offset + j] < 32) {
|
|
if (idx > 0) buf[idx++] = ';';
|
|
} else
|
|
buf[idx++] = queries[offset + j];
|
|
}
|
|
|
|
if (idx > 0) {
|
|
buf[idx] = '\0';
|
|
ntop->getTrace()->traceEvent(TRACE_INFO, "[TXT] %s", buf);
|
|
break;
|
|
}
|
|
}
|
|
|
|
offset += len;
|
|
|
|
i++; /* Found one reply */
|
|
}
|
|
|
|
return (buf);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
bool MDNS::queueResolveIPv4(u_int32_t ipv4addr, bool alsoUseGatewayDNS) {
|
|
u_int dns_query_len;
|
|
char mdnsbuf[512], src[32];
|
|
u_int16_t tid = ipv4addr & 0xFFFF;
|
|
struct sockaddr_in mdns_dest, nbns_dest;
|
|
u_int8_t nbns_discover[] = {
|
|
0x12, 0x34, /* Transaction ID: 0x1234 */
|
|
0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x20, 0x43,
|
|
0x4b, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41,
|
|
0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41,
|
|
0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x41, 0x00, 0x00, 0x21, 0x00, 0x01};
|
|
|
|
if ((ipv4addr == 0) || (ipv4addr = 0xFFFFFFFF)) return (false);
|
|
|
|
dns_query_len =
|
|
prepareIPv4ResolveQuery(ipv4addr, mdnsbuf, sizeof(mdnsbuf), tid);
|
|
|
|
mdns_dest.sin_family = AF_INET, mdns_dest.sin_port = htons(5353),
|
|
mdns_dest.sin_addr.s_addr = ipv4addr;
|
|
if (sendto(batch_udp_sock, mdnsbuf, dns_query_len, 0,
|
|
(struct sockaddr*)&mdns_dest, sizeof(struct sockaddr_in)) < 0) {
|
|
ntop->getTrace()->traceEvent(
|
|
TRACE_ERROR, "Send error %s [%d/%s]",
|
|
Utils::intoaV4(ntohl(ipv4addr), src, sizeof(src)), errno,
|
|
strerror(errno));
|
|
return (false);
|
|
}
|
|
|
|
if (alsoUseGatewayDNS && (gatewayIPv4 != 0)) {
|
|
mdns_dest.sin_family = AF_INET, mdns_dest.sin_port = htons(53),
|
|
mdns_dest.sin_addr.s_addr = gatewayIPv4;
|
|
if (sendto(batch_udp_sock, mdnsbuf, dns_query_len, 0,
|
|
(struct sockaddr*)&mdns_dest, sizeof(struct sockaddr_in)) < 0) {
|
|
ntop->getTrace()->traceEvent(
|
|
TRACE_ERROR, "Send error %s [%d/%s]",
|
|
Utils::intoaV4(ntohl(gatewayIPv4), src, sizeof(src)), errno,
|
|
strerror(errno));
|
|
return (false);
|
|
}
|
|
}
|
|
|
|
nbns_dest.sin_family = AF_INET, nbns_dest.sin_port = htons(137),
|
|
nbns_dest.sin_addr.s_addr = ipv4addr;
|
|
if (sendto(batch_udp_sock, (const char*)nbns_discover, sizeof(nbns_discover),
|
|
0, (struct sockaddr*)&nbns_dest, sizeof(struct sockaddr_in)) < 0)
|
|
ntop->getTrace()->traceEvent(
|
|
TRACE_ERROR, "Send error %s [%d/%s]",
|
|
Utils::intoaV4(ntohl(ipv4addr), src, sizeof(src)), errno,
|
|
strerror(errno));
|
|
|
|
return (true);
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
void MDNS::fetchResolveResponses(lua_State* vm, int32_t timeout_sec) {
|
|
char src[32], buf[128];
|
|
u_int16_t onethreeseven = ntohs(137);
|
|
|
|
lua_newtable(vm);
|
|
|
|
while (true) {
|
|
if (Utils::pollSocket(batch_udp_sock, timeout_sec * 1000) > 0) {
|
|
struct sockaddr_in from;
|
|
char mdnsbuf[512];
|
|
socklen_t from_len = sizeof(from);
|
|
int len = recvfrom(batch_udp_sock, mdnsbuf, sizeof(mdnsbuf), 0,
|
|
(struct sockaddr*)&from, &from_len);
|
|
|
|
if (len > 0) {
|
|
if (from.sin_port == onethreeseven) {
|
|
/* NetBIOS */
|
|
decodeNetBIOS((u_char*)mdnsbuf, len, buf, sizeof(buf));
|
|
lua_push_str_table_entry(
|
|
vm, Utils::intoaV4(ntohl(from.sin_addr.s_addr), src, sizeof(src)),
|
|
buf);
|
|
} else {
|
|
struct ndpi_dns_packet_header* dns_h =
|
|
(struct ndpi_dns_packet_header*)mdnsbuf;
|
|
|
|
if (ntohs(dns_h->num_answers) > 0) {
|
|
u_int32_t resolved_ip;
|
|
char* dot;
|
|
|
|
if (!sentAnyQuery)
|
|
decodePTRResponse(mdnsbuf, (u_int)len, buf, sizeof(buf),
|
|
&resolved_ip);
|
|
else
|
|
decodeAnyResponse(mdnsbuf, (u_int)len, buf, sizeof(buf)),
|
|
resolved_ip = 0;
|
|
|
|
if (resolved_ip == 0) resolved_ip = ntohl(from.sin_addr.s_addr);
|
|
|
|
if ((dot = strchr(buf, '.')) != NULL) dot[0] = '\0';
|
|
|
|
lua_push_str_table_entry(
|
|
vm, Utils::intoaV4(resolved_ip, src, sizeof(src)), buf);
|
|
}
|
|
}
|
|
}
|
|
} else
|
|
break;
|
|
}
|
|
|
|
if (gatewayIPv4 != 0)
|
|
lua_push_str_table_entry(
|
|
vm, "gateway.local",
|
|
Utils::intoaV4(ntohl(gatewayIPv4), src, sizeof(src)));
|
|
}
|
|
|
|
/* ******************************* */
|
|
|
|
/*
|
|
Ok I know this is not a MDNS packet but it is convenient to combine
|
|
MDNS with NetBIOS address resolution
|
|
*/
|
|
char* MDNS::decodeNetBIOS(u_char* buf, u_int buf_len, char* out,
|
|
u_int out_len) {
|
|
struct netbios_header {
|
|
u_int16_t transaction_id, flags, questions, answer_rrs, authority_rrs,
|
|
additional_rrs;
|
|
};
|
|
struct netbios_header* h = (struct netbios_header*)buf;
|
|
u_int16_t i16;
|
|
u_int offset;
|
|
|
|
out[0] = '\0';
|
|
|
|
if ((buf_len < sizeof(struct netbios_header) + 32 /* Just to be safe */) ||
|
|
(ntohs(h->transaction_id) != 0x1234) ||
|
|
((ntohs(h->flags) & 0x8000) == 0 /* Not a reply */) ||
|
|
(ntohs(h->questions) != 0) || (ntohs(h->answer_rrs) == 0))
|
|
return (out);
|
|
|
|
offset = sizeof(struct netbios_header);
|
|
offset += buf[offset] + 2; /* Skip name */
|
|
|
|
if (offset > buf_len) return (out);
|
|
i16 = ntohs(*((u_int16_t*)&buf[offset])); /* Type */
|
|
if (i16 != 0x21) /* NBSTAT */
|
|
return (out);
|
|
else
|
|
offset += 2;
|
|
|
|
offset += 8; /* Skip class, TTL and data len */
|
|
if (offset > buf_len) return (out);
|
|
|
|
if (buf[offset] == 0) /* Number of names */
|
|
return (out);
|
|
else
|
|
offset += 1;
|
|
if ((u_int)(offset + 16) > buf_len) return (out);
|
|
|
|
strncpy(out, (char*)&buf[offset], 16);
|
|
|
|
for (i16 = 15; i16 > 0; i16--)
|
|
if ((out[i16] == ' ') || (out[i16] == 0x0))
|
|
out[i16] = '\0';
|
|
else
|
|
break;
|
|
|
|
return (out);
|
|
}
|