aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols/attic/ftp.c
diff options
context:
space:
mode:
authorLuca Deri <deri@Lucas-MacBookPro.local>2015-04-19 07:25:59 +0200
committerLuca Deri <deri@Lucas-MacBookPro.local>2015-04-19 07:25:59 +0200
commit2e5ceac844c32fb52f4f3042be5b872f8b0b4ff0 (patch)
tree01af171f4af2b86efa64d0166dc540ee5c027c95 /src/lib/protocols/attic/ftp.c
parent7fa4694dadf869d1de2baa99383308a163902f8f (diff)
Initial import from SVN
Diffstat (limited to 'src/lib/protocols/attic/ftp.c')
-rw-r--r--src/lib/protocols/attic/ftp.c469
1 files changed, 469 insertions, 0 deletions
diff --git a/src/lib/protocols/attic/ftp.c b/src/lib/protocols/attic/ftp.c
new file mode 100644
index 000000000..f48f3e946
--- /dev/null
+++ b/src/lib/protocols/attic/ftp.c
@@ -0,0 +1,469 @@
+/*
+ * ftp.c
+ *
+ * Copyright (C) 2009-2011 by ipoque GmbH
+ * Copyright (C) 2011-15 - ntop.org
+ *
+ * This file is part of nDPI, an open source deep packet inspection
+ * library based on the OpenDPI and PACE technology by ipoque GmbH
+ *
+ * nDPI is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * nDPI is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with nDPI. If not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+
+#include "ndpi_protocols.h"
+#include "ndpi_utils.h"
+
+#ifdef NDPI_PROTOCOL_FTP
+
+
+static void ndpi_int_ftp_add_connection(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+ ndpi_int_add_connection(ndpi_struct, flow, NDPI_PROTOCOL_FTP, NDPI_REAL_PROTOCOL);
+}
+
+/**
+ * checks for possible FTP command
+ * not all valid commands are tested, it just need to be 3 or 4 characters followed by a space if the
+ * packet is longer
+ *
+ * this functions is not used to accept, just to not reject
+ */
+#if !defined(WIN32)
+static inline
+#else
+__forceinline static
+#endif
+u_int8_t ndpi_int_check_possible_ftp_command(const struct ndpi_packet_struct *packet)
+{
+ if (packet->payload_packet_len < 3)
+ return 0;
+
+ if ((packet->payload[0] < 'a' || packet->payload[0] > 'z') &&
+ (packet->payload[0] < 'A' || packet->payload[0] > 'Z'))
+ return 0;
+ if ((packet->payload[1] < 'a' || packet->payload[1] > 'z') &&
+ (packet->payload[1] < 'A' || packet->payload[1] > 'Z'))
+ return 0;
+ if ((packet->payload[2] < 'a' || packet->payload[2] > 'z') &&
+ (packet->payload[2] < 'A' || packet->payload[2] > 'Z'))
+ return 0;
+
+ if (packet->payload_packet_len > 3) {
+ if ((packet->payload[3] < 'a' || packet->payload[3] > 'z') &&
+ (packet->payload[3] < 'A' || packet->payload[3] > 'Z') && packet->payload[3] != ' ')
+ return 0;
+
+ if (packet->payload_packet_len > 4) {
+ if (packet->payload[3] != ' ' && packet->payload[4] != ' ')
+ return 0;
+ }
+ }
+
+ return 1;
+}
+
+/**
+ * ftp replies are are 3-digit number followed by space or hyphen
+ */
+#if !defined(WIN32)
+static inline
+#else
+__forceinline static
+#endif
+u_int8_t ndpi_int_check_possible_ftp_reply(const struct ndpi_packet_struct *packet)
+{
+ if (packet->payload_packet_len < 5)
+ return 0;
+
+ if (packet->payload[3] != ' ' && packet->payload[3] != '-')
+ return 0;
+
+ if (packet->payload[0] < '0' || packet->payload[0] > '9')
+ return 0;
+ if (packet->payload[1] < '0' || packet->payload[1] > '9')
+ return 0;
+ if (packet->payload[2] < '0' || packet->payload[2] > '9')
+ return 0;
+
+ return 1;
+}
+
+/**
+ * check for continuation replies
+ * there is no real indication whether it is a continuation message, we just
+ * require that there are at least 5 ascii characters
+ */
+#if !defined(WIN32)
+static inline
+#else
+__forceinline static
+#endif
+u_int8_t ndpi_int_check_possible_ftp_continuation_reply(const struct ndpi_packet_struct *packet)
+{
+ u_int16_t i;
+
+ if (packet->payload_packet_len < 5)
+ return 0;
+
+ for (i = 0; i < 5; i++) {
+ if (packet->payload[i] < ' ' || packet->payload[i] > 127)
+ return 0;
+ }
+
+ return 1;
+}
+
+/*
+ * these are the commands we tracking and expecting to see
+ */
+enum {
+ FTP_USER_CMD = 1 << 0,
+ FTP_FEAT_CMD = 1 << 1,
+ FTP_COMMANDS = ((1 << 2) - 1),
+ FTP_220_CODE = 1 << 2,
+ FTP_331_CODE = 1 << 3,
+ FTP_211_CODE = 1 << 4,
+ FTP_CODES = ((1 << 5) - 1 - FTP_COMMANDS)
+};
+
+/*
+ return 0 if nothing has been detected
+ return 1 if a pop packet
+*/
+
+static u_int8_t search_ftp(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+
+ struct ndpi_packet_struct *packet = &flow->packet;
+
+ u_int8_t current_ftp_code = 0;
+
+ // struct ndpi_id_struct *src=ndpi_struct->src;
+ // struct ndpi_id_struct *dst=ndpi_struct->dst;
+
+
+ /* initiate client direction flag */
+ if (flow->packet_counter == 1) {
+ if (flow->l4.tcp.seen_syn) {
+ flow->l4.tcp.ftp_client_direction = flow->setup_packet_direction;
+ } else {
+ /* no syn flag seen so guess */
+ if (packet->payload_packet_len > 0) {
+ if (packet->payload[0] >= '0' && packet->payload[0] <= '9') {
+ /* maybe server side */
+ flow->l4.tcp.ftp_client_direction = 1 - packet->packet_direction;
+ } else {
+ flow->l4.tcp.ftp_client_direction = packet->packet_direction;
+ }
+ }
+ }
+ }
+
+ if (packet->packet_direction == flow->l4.tcp.ftp_client_direction) {
+ if (packet->payload_packet_len > NDPI_STATICSTRING_LEN("USER ") &&
+ (memcmp(packet->payload, "USER ", NDPI_STATICSTRING_LEN("USER ")) == 0 ||
+ memcmp(packet->payload, "user ", NDPI_STATICSTRING_LEN("user ")) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP: found USER command\n");
+ flow->l4.tcp.ftp_codes_seen |= FTP_USER_CMD;
+ current_ftp_code = FTP_USER_CMD;
+ } else if (packet->payload_packet_len >= NDPI_STATICSTRING_LEN("FEAT") &&
+ (memcmp(packet->payload, "FEAT", NDPI_STATICSTRING_LEN("FEAT")) == 0 ||
+ memcmp(packet->payload, "feat", NDPI_STATICSTRING_LEN("feat")) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP: found FEAT command\n");
+ flow->l4.tcp.ftp_codes_seen |= FTP_FEAT_CMD;
+ current_ftp_code = FTP_FEAT_CMD;
+ } else if (!ndpi_int_check_possible_ftp_command(packet)) {
+ return 0;
+ }
+ } else {
+ if (packet->payload_packet_len > NDPI_STATICSTRING_LEN("220 ") &&
+ (memcmp(packet->payload, "220 ", NDPI_STATICSTRING_LEN("220 ")) == 0 ||
+ memcmp(packet->payload, "220-", NDPI_STATICSTRING_LEN("220-")) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP: found 220 reply code\n");
+ flow->l4.tcp.ftp_codes_seen |= FTP_220_CODE;
+ current_ftp_code = FTP_220_CODE;
+ } else if (packet->payload_packet_len > NDPI_STATICSTRING_LEN("331 ") &&
+ (memcmp(packet->payload, "331 ", NDPI_STATICSTRING_LEN("331 ")) == 0 ||
+ memcmp(packet->payload, "331-", NDPI_STATICSTRING_LEN("331-")) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP: found 331 reply code\n");
+ flow->l4.tcp.ftp_codes_seen |= FTP_331_CODE;
+ current_ftp_code = FTP_331_CODE;
+ } else if (packet->payload_packet_len > NDPI_STATICSTRING_LEN("211 ") &&
+ (memcmp(packet->payload, "211 ", NDPI_STATICSTRING_LEN("211 ")) == 0 ||
+ memcmp(packet->payload, "211-", NDPI_STATICSTRING_LEN("211-")) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP: found 211reply code\n");
+ flow->l4.tcp.ftp_codes_seen |= FTP_211_CODE;
+ current_ftp_code = FTP_211_CODE;
+ } else if (!ndpi_int_check_possible_ftp_reply(packet)) {
+ if ((flow->l4.tcp.ftp_codes_seen & FTP_CODES) == 0 ||
+ (!ndpi_int_check_possible_ftp_continuation_reply(packet))) {
+ return 0;
+ }
+ }
+ }
+
+ if ((flow->l4.tcp.ftp_codes_seen & FTP_COMMANDS) != 0 && (flow->l4.tcp.ftp_codes_seen & FTP_CODES) != 0) {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP detected\n");
+ ndpi_int_ftp_add_connection(ndpi_struct, flow);
+ return 1;
+ }
+
+ /* if no valid code has been seen for the first packets reject */
+ if (flow->l4.tcp.ftp_codes_seen == 0 && flow->packet_counter > 3)
+ return 0;
+
+ /* otherwise wait more packets, wait more for traffic on known ftp port */
+ if ((packet->packet_direction == flow->setup_packet_direction && packet->tcp && packet->tcp->dest == htons(21)) ||
+ (packet->packet_direction != flow->setup_packet_direction && packet->tcp && packet->tcp->source == htons(21))) {
+ /* flow to known ftp port */
+
+ /* wait much longer if this was a 220 code, initial messages might be long */
+ if (current_ftp_code == FTP_220_CODE) {
+ if (flow->packet_counter > 40)
+ return 0;
+ } else {
+ if (flow->packet_counter > 20)
+ return 0;
+ }
+ } else {
+ /* wait much longer if this was a 220 code, initial messages might be long */
+ if (current_ftp_code == FTP_220_CODE) {
+ if (flow->packet_counter > 20)
+ return 0;
+ } else {
+ if (flow->packet_counter > 10)
+ return 0;
+ }
+ }
+
+ return 2;
+}
+
+
+static void search_passive_ftp_mode(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+ struct ndpi_packet_struct *packet = &flow->packet;
+ struct ndpi_id_struct *dst = flow->dst;
+ struct ndpi_id_struct *src = flow->src;
+ u_int16_t plen;
+ u_int8_t i;
+ u_int32_t ftp_ip;
+
+
+ // TODO check if normal passive mode also needs adaption for ipv6
+ if (packet->payload_packet_len > 3 && ndpi_mem_cmp(packet->payload, "227 ", 4) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP passive mode initial string\n");
+
+ plen = 4; //=4 for "227 "
+ while (1) {
+ if (plen >= packet->payload_packet_len) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "plen >= packet->payload_packet_len, return\n");
+ return;
+ }
+ if (packet->payload[plen] == '(') {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "found (. break.\n");
+ break;
+ }
+ /* if (!isalnum(packet->payload[plen])) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "no alpha numeric symbol --> break.\n");
+ return;
+ }*/
+ plen++;
+ }
+ plen++;
+
+ if (plen >= packet->payload_packet_len)
+ return;
+
+
+ ftp_ip = 0;
+ for (i = 0; i < 4; i++) {
+ u_int16_t oldplen = plen;
+ ftp_ip =
+ (ftp_ip << 8) +
+ ndpi_bytestream_to_number(&packet->payload[plen], packet->payload_packet_len - plen, &plen);
+ if (oldplen == plen || plen >= packet->payload_packet_len) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP passive mode %u value parse failed\n",
+ i);
+ return;
+ }
+ if (packet->payload[plen] != ',') {
+
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "FTP passive mode %u value parse failed, char ',' is missing\n", i);
+ return;
+ }
+ plen++;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "FTP passive mode %u value parsed, ip is now: %u\n", i, ftp_ip);
+
+ }
+ if (dst != NULL) {
+ dst->ftp_ip.ipv4 = htonl(ftp_ip);
+ dst->ftp_timer = packet->tick_timestamp;
+ dst->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "saved ftp_ip, ftp_timer, ftp_timer_set to dst");
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP PASSIVE MODE FOUND: use Server %s\n",
+ ndpi_get_ip_string(ndpi_struct, &dst->ftp_ip));
+ }
+ if (src != NULL) {
+ src->ftp_ip.ipv4 = packet->iph->daddr;
+ src->ftp_timer = packet->tick_timestamp;
+ src->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "saved ftp_ip, ftp_timer, ftp_timer_set to src");
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP PASSIVE MODE FOUND: use Server %s\n",
+ ndpi_get_ip_string(ndpi_struct, &src->ftp_ip));
+ }
+ return;
+ }
+
+ if (packet->payload_packet_len > 34 && ndpi_mem_cmp(packet->payload, "229 Entering Extended Passive Mode", 34) == 0) {
+ if (dst != NULL) {
+ ndpi_packet_src_ip_get(packet, &dst->ftp_ip);
+ dst->ftp_timer = packet->tick_timestamp;
+ dst->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "saved ftp_ip, ftp_timer, ftp_timer_set to dst");
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "FTP Extended PASSIVE MODE FOUND: use Server %s\n", ndpi_get_ip_string(ndpi_struct, &dst->ftp_ip));
+ }
+ if (src != NULL) {
+ ndpi_packet_dst_ip_get(packet, &src->ftp_ip);
+ src->ftp_timer = packet->tick_timestamp;
+ src->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "saved ftp_ip, ftp_timer, ftp_timer_set to src");
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "FTP Extended PASSIVE MODE FOUND: use Server %s\n", ndpi_get_ip_string(ndpi_struct, &src->ftp_ip));
+ }
+ return;
+ }
+}
+
+
+static void search_active_ftp_mode(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+ struct ndpi_packet_struct *packet = &flow->packet;
+ struct ndpi_id_struct *src = flow->src;
+ struct ndpi_id_struct *dst = flow->dst;
+
+ if (packet->payload_packet_len > 5
+ && (ndpi_mem_cmp(packet->payload, "PORT ", 5) == 0 || ndpi_mem_cmp(packet->payload, "EPRT ", 5) == 0)) {
+
+ //src->local_ftp_data_port = htons(data_port_number);
+ if (src != NULL) {
+ ndpi_packet_dst_ip_get(packet, &src->ftp_ip);
+ src->ftp_timer = packet->tick_timestamp;
+ src->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP ACTIVE MODE FOUND, command is %.*s\n", 4,
+ packet->payload);
+ }
+ if (dst != NULL) {
+ ndpi_packet_src_ip_get(packet, &dst->ftp_ip);
+ dst->ftp_timer = packet->tick_timestamp;
+ dst->ftp_timer_set = 1;
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "FTP ACTIVE MODE FOUND, command is %.*s\n", 4,
+ packet->payload);
+ }
+ }
+ return;
+}
+
+
+void ndpi_search_ftp_tcp(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+
+ struct ndpi_packet_struct *packet = &flow->packet;
+
+ struct ndpi_id_struct *src = flow->src;
+ struct ndpi_id_struct *dst = flow->dst;
+
+
+
+ if (src != NULL && ndpi_packet_dst_ip_eql(packet, &src->ftp_ip)
+ && packet->tcp->syn != 0 && packet->tcp->ack == 0
+ && packet->detected_protocol_stack[0] == NDPI_PROTOCOL_UNKNOWN
+ && NDPI_COMPARE_PROTOCOL_TO_BITMASK(src->detected_protocol_bitmask,
+ NDPI_PROTOCOL_FTP) != 0 && src->ftp_timer_set != 0) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "possible ftp data, src!= 0.\n");
+
+ if (((u_int32_t)
+ (packet->tick_timestamp - src->ftp_timer)) >= ndpi_struct->ftp_connection_timeout) {
+ src->ftp_timer_set = 0;
+ } else if (ntohs(packet->tcp->dest) > 1024
+ && (ntohs(packet->tcp->source) > 1024 || ntohs(packet->tcp->source) == 20)) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "detected FTP data stream.\n");
+ ndpi_int_ftp_add_connection(ndpi_struct, flow);
+ return;
+ }
+ }
+
+ if (dst != NULL && ndpi_packet_src_ip_eql(packet, &dst->ftp_ip)
+ && packet->tcp->syn != 0 && packet->tcp->ack == 0
+ && packet->detected_protocol_stack[0] == NDPI_PROTOCOL_UNKNOWN
+ && NDPI_COMPARE_PROTOCOL_TO_BITMASK(dst->detected_protocol_bitmask,
+ NDPI_PROTOCOL_FTP) != 0 && dst->ftp_timer_set != 0) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "possible ftp data; dst!= 0.\n");
+
+ if (((u_int32_t)
+ (packet->tick_timestamp - dst->ftp_timer)) >= ndpi_struct->ftp_connection_timeout) {
+ dst->ftp_timer_set = 0;
+
+ } else if (ntohs(packet->tcp->dest) > 1024
+ && (ntohs(packet->tcp->source) > 1024 || ntohs(packet->tcp->source) == 20)) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "detected FTP data stream.\n");
+ ndpi_int_ftp_add_connection(ndpi_struct, flow);
+ return;
+ }
+ }
+ // ftp data asymmetrically
+
+
+ /* skip packets without payload */
+ if (packet->payload_packet_len == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "FTP test skip because of data connection or zero byte packet_payload.\n");
+ return;
+ }
+ /* skip excluded connections */
+
+ // we test for FTP connection and search for passive mode
+ if (packet->detected_protocol_stack[0] == NDPI_PROTOCOL_FTP) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected ftp command mode. going to test data mode.\n");
+ search_passive_ftp_mode(ndpi_struct, flow);
+
+ search_active_ftp_mode(ndpi_struct, flow);
+ return;
+ }
+
+
+ if (packet->detected_protocol_stack[0] == NDPI_PROTOCOL_UNKNOWN && search_ftp(ndpi_struct, flow) != 0) {
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "unknown. need next packet.\n");
+
+ return;
+ }
+ NDPI_ADD_PROTOCOL_TO_BITMASK(flow->excluded_protocol_bitmask, NDPI_PROTOCOL_FTP);
+ NDPI_LOG(NDPI_PROTOCOL_FTP, ndpi_struct, NDPI_LOG_DEBUG, "exclude ftp.\n");
+
+}
+
+#endif