From 0809956e5f9ebbe11d5e11bebaf0c390eb993464 Mon Sep 17 00:00:00 2001 From: Luca Date: Wed, 20 Jan 2021 09:53:30 +0100 Subject: Rewored UPnP protocol that in essence was WSD hence it has been renamed Cleaned up TLS code for DTLS detection by defining a new DTLS protocol --- src/lib/protocols/wsd.c | 67 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 src/lib/protocols/wsd.c (limited to 'src/lib/protocols/wsd.c') diff --git a/src/lib/protocols/wsd.c b/src/lib/protocols/wsd.c new file mode 100644 index 000000000..8732675b1 --- /dev/null +++ b/src/lib/protocols/wsd.c @@ -0,0 +1,67 @@ +/* + * wsd.c + * + * Copyright (C) 2018-21 - ntop.org + * + * nDPI is free software: you can redistribute it and/or modify + * it under the terms of the GNU Lesser General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * nDPI is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public License + * along with nDPI. If not, see . + * + */ + +/* https://en.wikipedia.org/wiki/WS-Discovery */ + +#include "ndpi_protocol_ids.h" + +#define NDPI_CURRENT_PROTO NDPI_PROTOCOL_WSD + +#include "ndpi_api.h" + +#define WSD_PORT 3702 + +void ndpi_search_wsd(struct ndpi_detection_module_struct *ndpi_struct, + struct ndpi_flow_struct *flow) { + struct ndpi_packet_struct *packet = &flow->packet; + + NDPI_LOG_DBG(ndpi_struct, "search wsd\n"); + + if(packet->udp + && ( + (packet->iph && ((ntohl(packet->iph->daddr) & 0xF0000000) == 0xE0000000 /* A multicast address */)) +#ifdef NDPI_DETECTION_SUPPORT_IPV6 + || + (packet->iphv6 && ntohl(packet->iphv6->ip6_dst.u6_addr.u6_addr32[0]) == 0xFF020000) +#endif + ) + && (ntohs(packet->udp->dest) == WSD_PORT) + && (packet->payload_packet_len >= 40) + && (strncmp((char*)packet->payload, "