aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorToni <matzeton@googlemail.com>2023-11-21 16:56:46 +0100
committerGitHub <noreply@github.com>2023-11-21 16:56:46 +0100
commit21f25740337c6c0412181c135b8cee8881fc7f58 (patch)
tree37fce306c06827070c31aa76b94cde7884e44fe1 /src
parent35abafec4fabcb7ad91973e4e9d3c505589e47ca (diff)
Improved TFTP. Fixes #2075. (#2149)
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'src')
-rw-r--r--src/lib/protocols/tftp.c181
1 files changed, 127 insertions, 54 deletions
diff --git a/src/lib/protocols/tftp.c b/src/lib/protocols/tftp.c
index b44746f45..f32a7851c 100644
--- a/src/lib/protocols/tftp.c
+++ b/src/lib/protocols/tftp.c
@@ -29,18 +29,111 @@
#include "ndpi_api.h"
#include "ndpi_private.h"
-/* see: https://datatracker.ietf.org/doc/html/rfc1350 */
-
static void ndpi_int_tftp_add_connection(struct ndpi_detection_module_struct
*ndpi_struct, struct ndpi_flow_struct *flow)
{
ndpi_set_detected_protocol(ndpi_struct, flow, NDPI_PROTOCOL_TFTP, NDPI_PROTOCOL_UNKNOWN, NDPI_CONFIDENCE_DPI);
}
+static size_t tftp_dissect_szstr(struct ndpi_packet_struct const * const packet,
+ size_t * const offset,
+ char const ** const string_start)
+{
+ if (packet->payload_packet_len <= *offset)
+ {
+ return 0;
+ }
+
+ const union {
+ uint8_t const * const as_ptr;
+ char const * const as_str;
+ } payload = { .as_ptr = packet->payload + *offset };
+
+ size_t len = strnlen(payload.as_str, packet->payload_packet_len - *offset);
+ if (len == 0 ||
+ packet->payload_packet_len <= *offset + len ||
+ payload.as_str[len] != '\0')
+ {
+ return 0;
+ }
+
+ if (string_start != NULL)
+ {
+ *string_start = payload.as_str;
+ }
+ *offset += len + 1;
+ return len;
+}
+
+static int tftp_dissect_mode(struct ndpi_packet_struct const * const packet,
+ size_t * const offset)
+{
+ static char const * const valid_modes[] = {
+ "netascii", "octet", "mail"
+ };
+ char const * string_start;
+ size_t string_length = tftp_dissect_szstr(packet, offset, &string_start);
+ size_t i;
+
+ if (string_length == 0)
+ {
+ return 1;
+ }
+
+ for (i = 0; i < NDPI_ARRAY_LENGTH(valid_modes); ++i)
+ {
+ if (strncasecmp(string_start, valid_modes[i], string_length) == 0)
+ {
+ break;
+ }
+ }
+
+ return i == NDPI_ARRAY_LENGTH(valid_modes);
+}
+
+static int tftp_dissect_options(struct ndpi_packet_struct const * const packet,
+ size_t * const offset)
+{
+ static char const * const valid_options[] = {
+ "blksize", "tsize"
+ };
+ uint8_t options_used[NDPI_ARRAY_LENGTH(valid_options)] = {0, 0};
+ size_t i;
+
+ do {
+ char const * string_start;
+ size_t string_length = tftp_dissect_szstr(packet, offset, &string_start);
+
+ if (string_length == 0 ||
+ tftp_dissect_szstr(packet, offset, NULL) == 0 /* value, not interested */)
+ {
+ break;
+ }
+
+ for (i = 0; i < NDPI_ARRAY_LENGTH(valid_options); ++i)
+ {
+ if (strncasecmp(string_start, valid_options[i], string_length) == 0)
+ {
+ break;
+ }
+ }
+
+ if (i == NDPI_ARRAY_LENGTH(valid_options) /* option not found in valid_options */ ||
+ options_used[i] != 0 /* duplicate options are not allowed */)
+ {
+ break;
+ }
+
+ options_used[i] = 1;
+ } while (1);
+
+ return *offset != packet->payload_packet_len;
+}
+
static void ndpi_search_tftp(struct ndpi_detection_module_struct *ndpi_struct,
struct ndpi_flow_struct *flow)
{
- struct ndpi_packet_struct *packet = &ndpi_struct->packet;
+ struct ndpi_packet_struct const * const packet = &ndpi_struct->packet;
u_int16_t block_num;
u_int16_t prev_num;
@@ -68,60 +161,26 @@ static void ndpi_search_tftp(struct ndpi_detection_module_struct *ndpi_struct,
}
{
- uint8_t mode_found = 0;
- size_t mode_len;
- int i;
size_t filename_len = 0;
- const char *string;
- size_t len = 0;
- bool first = true;
+ size_t offset = 2;
+ char const * filename_start;
+
+ filename_len = tftp_dissect_szstr(packet, &offset, &filename_start);
- /* Skip 2 byte opcode. */
- for (i = 2; i < packet->payload_packet_len; i++)
+ /* Exclude the flow as TFPT if there was no filename and mode in the first two strings. */
+ if (filename_len == 0 || ndpi_is_printable_buffer((uint8_t *)filename_start, filename_len) == 0)
{
- /* Search through the payload until we find a NULL terminated string. */
- if (packet->payload[i] != '\0')
- {
- len++;
- continue;
- }
- string = (const char *)&packet->payload[i - len];
-
- /* Filename should be immediately after opcode followed by the mode. */
- if (first)
- {
- filename_len = len;
- len = 0;
- first = false;
- continue;
- }
-
- char const * const possible_modes[] = { "netascii", "octet", "mail" };
- uint8_t mode_idx;
-
- /* Check the string in the payload against the possible TFTP modes. */
- for(mode_idx = 0; mode_idx < NDPI_ARRAY_LENGTH(possible_modes); ++mode_idx)
- {
- mode_len = strlen(possible_modes[mode_idx]);
- /* Both are now null terminated */
- if (len != mode_len)
- {
- continue;
- }
- if (strncasecmp(string, possible_modes[mode_idx], mode_len) == 0)
- {
- mode_found = 1;
- break;
- }
- }
-
- /* Second string searched must've been the mode, break out before any following options. */
- break;
+ NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
+ return;
}
- /* Exclude the flow as TFPT if there was no filename and mode in the first two strings. */
- if (filename_len == 0 || ndpi_is_printable_buffer(&packet->payload[2], filename_len) == 0 ||
- mode_found == 0)
+ if (tftp_dissect_mode(packet, &offset) != 0)
+ {
+ NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
+ return;
+ }
+
+ if (tftp_dissect_options(packet, &offset) != 0)
{
NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
return;
@@ -129,7 +188,7 @@ static void ndpi_search_tftp(struct ndpi_detection_module_struct *ndpi_struct,
/* Dissect RRQ/WWQ filename. */
filename_len = ndpi_min(filename_len, sizeof(flow->protos.tftp.filename) - 1);
- memcpy(flow->protos.tftp.filename, &packet->payload[2], filename_len);
+ memcpy(flow->protos.tftp.filename, filename_start, filename_len);
flow->protos.tftp.filename[filename_len] = '\0';
/* We have seen enough and do not need any more TFTP packets. */
@@ -158,6 +217,7 @@ static void ndpi_search_tftp(struct ndpi_detection_module_struct *ndpi_struct,
case 0x04:
/* Acknowledgment (ACK) */
+
if (packet->payload_packet_len != 4 /* ACK has a fixed packet size */)
{
NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
@@ -188,7 +248,20 @@ static void ndpi_search_tftp(struct ndpi_detection_module_struct *ndpi_struct,
case 0x06:
/* Option Acknowledgment (OACK) */
- /* No fixed lengths as it can include the options from the request. */
+
+ {
+ size_t offset = 2;
+
+ if (tftp_dissect_options(packet, &offset) != 0)
+ {
+ NDPI_EXCLUDE_PROTO(ndpi_struct, flow);
+ return;
+ }
+ }
+
+ /* We have seen enough and do not need any more TFTP packets. */
+ NDPI_LOG_INFO(ndpi_struct, "found tftp (OACK)\n");
+ ndpi_int_tftp_add_connection(ndpi_struct, flow);
break;
default: