aboutsummaryrefslogtreecommitdiff
path: root/wireshark/sharkfest_scripts/iec.lua
blob: c9221950e88087753ed4a16cd0e14e8585c2d322 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
--
-- (C) 2021 - switch.ch
--


local iec_analysis = Proto("iec_analysis", "IEC Packet Analysis")

iec_analysis.fields = {}
iec_analysis.fields.invalid_cp56time = ProtoField.new("Invalid CP56Time", "iec_analysis.fields.invalid_cp56time", ftypes.STRING)

local f_time_epoch         = Field.new("frame.time_epoch")
local f_cp56time_min       = Field.new("iec60870_asdu.cp56time.min")
local f_cp56time_hour      = Field.new("iec60870_asdu.cp56time.hour")
local f_cp56time_day       = Field.new("iec60870_asdu.cp56time.day")
local f_cp56time_month     = Field.new("iec60870_asdu.cp56time.month")
local f_cp56time_year      = Field.new("iec60870_asdu.cp56time.year")

local f_tcplen	            = Field.new("tcp.len")
local f_payload            = Field.new("tcp.payload")


-- ###############################################

function iec_analysis.init()

end

-- ###############################################


-- Print contents of `tbl`, with indentation.
-- You can call it as tprint(mytable)
-- The other two parameters should not be set
function tprint(s, l, i)
   l = (l) or 1000; i = i or "";-- default item limit, indent string
   if (l<1) then io.write("ERROR: Item limit reached.\n"); return l-1 end;
   local ts = type(s);
   if (ts ~= "table") then io.write(i..' '..ts..' '..tostring(s)..'\n'); return l-1 end
   io.write(i..' '..ts..'\n');
   for k,v in pairs(s) do
      local indent = ""

      if(i ~= "") then
	 indent = i .. "."
      end
      indent = indent .. tostring(k)

      l = tprint(v, l, indent);
      if (l < 0) then break end
   end

   return l
end

-- ###############################################

local function getstring(finfo)
   local ok, val = pcall(tostring, finfo)
   if not ok then val = "(unknown)" end
   return val
end

local function getval(finfo)
   local ok, val = pcall(tostring, finfo)
   if not ok then val = nil end
   return val
end

function dump_pinfo(pinfo)
   local fields = { all_field_infos() }
   for ix, finfo in ipairs(fields) do
      --  output = output .. "\t[" .. ix .. "] " .. finfo.name .. " = " .. getstring(finfo) .. "\n"
      --print(finfo.name .. "\n")
      print("\t[" .. ix .. "] " .. finfo.name .. " = " .. getstring(finfo) .. "\n")
   end
end




-- ###############################################

-- the dissector function callback
function iec_analysis.dissector(tvb, pinfo, tree)
   -- Wireshark dissects the packet twice. We ignore the first
   -- run as on that step the packet is still undecoded
   -- The trick below avoids to process the packet twice

   if (pinfo.visited == true) then

      
      local tcplenRaw          = { f_tcplen() }
      local payloadRaw         = { f_payload() }
   
   
      if ((tcplenRaw ~= nil) and (payloadRaw ~= nil )) then


         local cp56time_min       = { f_cp56time_min() } 
         local cp56time_hour      = { f_cp56time_hour()  }
         local cp56time_day       = { f_cp56time_day()   }
         local cp56time_month     = { f_cp56time_month() }
         local cp56time_year      = { f_cp56time_year()  }

         local msgTime = ""


         if((cp56time_day ~= nil)
            and (cp56time_month ~= nil)
            and (cp56time_year ~= nil)
            and (cp56time_hour ~= nil)
            and (cp56time_min ~= nil)) then
               -- The field is present: we now validate CP56time
               local hour  = tonumber(getval(cp56time_hour[#cp56time_hour]))
               local day   = tonumber(getval(cp56time_day[#cp56time_day]))
               local month = tonumber(getval(cp56time_month[#cp56time_month]))
               local year  = tonumber(getval(cp56time_year[#cp56time_year]))
               local min   = tonumber(getval(cp56time_min[#cp56time_min]))

               if((day ~= nil)
                and (month ~= nil)
                and (year ~= nil)
                and (hour ~= nil)
                and (min ~= nil)) then
                   local t = {year=2000+year, month=month, day=day, hour=hour, min=min}
                   local cp56time = os.time(t)
                   local epoch = { f_time_epoch() }
                   local packet_epoch  = tonumber(getval(epoch[#epoch]))

                   local deviation3h = 10800

                  if ((cp56time + deviation3h) < packet_epoch) then
                     msgTime = "CP54time differs more then 3h from epoch time. Difference = " .. os.date("%X", packet_epoch - cp56time)
                  elseif ((cp56time + 10) < packet_epoch) then
                     local msgTime = "CP54time differs more than 10s from epoch time. Difference = " .. os.date("%X", packet_epoch - cp56time)
                  end
               end
         end





 
         local tcplen    = tonumber(getval(tcplenRaw[#tcplenRaw]))
         local payload    = tostring(getval(payloadRaw[#payloadRaw]))
      	
         local APDU_type = {"Length", "Type", "Rx", "Tx", "TypeID", "TestFr", "StartPos", "CauseTx", "IOA", "NumIx"}
         local APDU = APDU_type

         local StartPos = 1
         local i = 1
         local msg = ""
         local msg2 = ""
         local msg3 = ""

         local APDU_length = {}
         local APDU_StartPos = {}

         --read first APDU length and check wheater payload contains multiple APDUs or not
         if ((payload ~= nil) and (tcplen > 3 )) then
    
            --define APDUs start positions, containing 0x68
            if ((tonumber(string.sub(payload,4,5),16) + 2) < tcplen) then
               --multiple APDUs
               --loop through all APDU's
               while StartPos < (tcplen*3-1) do
                  APDU_StartPos[i] = StartPos
                  APDU_length[i] = tonumber(string.sub(payload,StartPos + 3,StartPos + 3 + 1),16)
                  
                  StartPos = StartPos + 5 + APDU_length[i]*3 + 1
                  i = i + 1
               end

            else
               --single APDU
               APDU_length[i] = tonumber(string.sub(payload,StartPos + 3,StartPos + 3 + 1),16)
               APDU_StartPos[i] = StartPos
            end  
       
            --process all APDUs
            for j=1,#APDU_StartPos do


               if (APDU_length[j] > 7) then
                  APDU['NumIx'] = tonumber(string.sub(payload,APDU_StartPos[j]+21, APDU_StartPos[j] + 21 + 1),16)
                  if ((APDU['NumIx'] * 6) > (APDU_length[j] - 10) and (APDU['NumIx'] >= 3)) then
                     msg = " APDU object #" .. j  .. msg
                  end
                  APDU["TypeID"] = tonumber(string.sub(payload,APDU_StartPos[j]+ 18, APDU_StartPos[j] + 18 + 1),16)
                  if ( not (APDU["TypeID"] == 9 
                     or APDU["TypeID"] == 13 
                     or APDU["TypeID"] == 36 
                     or APDU["TypeID"] == 45 
                     or APDU["TypeID"] == 46 
                     or APDU["TypeID"] == 48
                     or APDU["TypeID"] == 30 
                     or APDU["TypeID"] == 103 
                     or APDU["TypeID"] == 100 
                     or APDU["TypeID"] == 37 )) then
                     msg3 = "in ASDU #" .. j .. " (TypeID: " .. APDU["TypeID"] .. ")" .. msg3
                  end
               else
                  APDU['NumIx'] = 0 
                  APDU["TypeID"] = 0
               end

            -- end for loop   
            end

            if (msg ~= "") then
               msg = "Possible missing data, check for [] in IOAs in" .. msg
            end

            if #APDU_StartPos > 8 then
               msg2 = "Payload contains more then 8 APDU objects (wireshark disects only 8 APDU objects). Number of APDU objects found: " .. #APDU_StartPos
            end

            if (msg3 ~= "") then
               msg3 = "Not permitted TypeID(s) " .. msg3
            end

            -- Add analysis information to packet
            if (msg ~= "") or (msg2 ~= "") or (msg3 ~= "") or (msgTime  ~= "") then
               local iec_subtree = tree:add(iec_analysis, tvb(), "IEC 60870-5-104 Analysis")
               if (msg ~= "") then
                  iec_subtree:add_expert_info(PI_PROTOCOL, PI_WARN, msg)
               end
               if (msg2 ~= "") then
                  iec_subtree:add_expert_info(PI_PROTOCOL, PI_NOTE, msg2)
               end
               if (msg3 ~= "") then
                  iec_subtree:add_expert_info(PI_PROTOCOL, PI_NOTE, msg3)
               end
               if (msgTime ~= "") then
                  iec_subtree:add_expert_info(PI_PROTOCOL, PI_WARN, msgTime)
               end
            end

         -- end of: if ((payload ~= nil) and (tcplen > 3 )) then
         end

      -- end of: if ((tcplenRaw ~= nil) and (payloadRaw ~= nil )) then
      end

   -- end of: if (pinfo.visited == true) then
   end




         

        

   
   
       

   
   -- ###########################################

   -- As we do not need to add fields to the dissection
   -- there is no need to process the packet multiple times
   if(pinfo.visited == true) then return end

end

register_postdissector(iec_analysis)