diff options
author | Larry Hajali <larryhaja[at]gmail[dot]com> | 2010-05-12 23:32:35 +0200 |
---|---|---|
committer | Robby Workman <rworkman@slackbuilds.org> | 2010-05-12 23:32:35 +0200 |
commit | 3a3ed9f8e4c726078706bf6c6301d63bf5f58f48 (patch) | |
tree | 60d4a00b3473836fcfe935557d7ad49c40b10954 /network/ngrep | |
parent | 819a1f0296029fb2ab22fbeaae8ed264c5a8f957 (diff) |
network/ngrep: Added to 12.2 repository
Diffstat (limited to 'network/ngrep')
-rw-r--r-- | network/ngrep/README | 14 | ||||
-rw-r--r-- | network/ngrep/ngrep-1.45-reasm.diff | 939 | ||||
-rw-r--r-- | network/ngrep/ngrep.SlackBuild | 81 | ||||
-rw-r--r-- | network/ngrep/ngrep.info | 8 | ||||
-rw-r--r-- | network/ngrep/slack-desc | 19 |
5 files changed, 1061 insertions, 0 deletions
diff --git a/network/ngrep/README b/network/ngrep/README new file mode 100644 index 0000000000000..a87f5e32cceb2 --- /dev/null +++ b/network/ngrep/README @@ -0,0 +1,14 @@ +ngrep strives to provide most of GNU grep's common features, applying +them to the network layer. ngrep is a pcap-aware tool that will allow +you to specify extended regular or hexadecimal expressions to match +against data payloads of packets. It currently recognizes IPv4/6, TCP, +UDP, ICMPv4/6, IGMP and Raw across Ethernet, PPP, SLIP, FDDI, Token +Ring and null interfaces, and understands BPF filter logic in the same +fashion as more common packet sniffing tools, such as tcpdump and snoop. + +ngrep is built with IPV6 support by default; to disable it, do this: + NGREP_IPV6=no ./ngrep.SlackBuild + +A patch is included for IPV4 and IPV6 packet reassembly applied by default. +The patch adds the -r switch to ngrep. To disable the patch, do this: + ASSEM_PATCH=no ./ngrep.SlackBuild diff --git a/network/ngrep/ngrep-1.45-reasm.diff b/network/ngrep/ngrep-1.45-reasm.diff new file mode 100644 index 0000000000000..ed33fb6f651e5 --- /dev/null +++ b/network/ngrep/ngrep-1.45-reasm.diff @@ -0,0 +1,939 @@ +diff -urN ngrep-1.45/ipreasm.c ngrep-1.45-reasm/ipreasm.c +--- ngrep-1.45/ipreasm.c 1970-01-01 01:00:00.000000000 +0100 ++++ ngrep-1.45-reasm/ipreasm.c 2007-06-16 19:17:20.124795623 +0200 +@@ -0,0 +1,717 @@ ++/* ++ * ipreasm -- Routines for reassembly of fragmented IPv4 and IPv6 packets. ++ * ++ * Copyright (c) 2007 Jan Andres <jandres@gmx.net> ++ * ++ */ ++ ++#include <stdio.h> ++#include <stdlib.h> ++#include <string.h> ++#include <stddef.h> ++ ++#ifdef HAVE_CONFIG_H ++#include "config.h" ++#endif /* HAVE_CONFIG_H */ ++ ++#include <netinet/ip.h> ++#include <netinet/udp.h> ++#if USE_IPv6 ++#include <netinet/ip6.h> ++#endif /* USE_IPv6 */ ++ ++#include "ipreasm.h" ++ ++ ++#define REASM_IP_HASH_SIZE 1021U ++ ++ ++enum entry_state { ++ STATE_ACTIVE, ++ STATE_INVALID, ++}; ++ ++ ++enum reasm_proto { ++ PROTO_IPV4, ++#if USE_IPv6 ++ PROTO_IPV6, ++#endif /* USE_IPv6 */ ++}; ++ ++ ++/* ++ * This tuple uniquely identifies all fragments belonging to ++ * the same IPv4 packet. ++ */ ++struct reasm_id_ipv4 { ++ uint8_t ip_src[4], ip_dst[4]; ++ uint16_t ip_id; ++ uint8_t ip_proto; ++}; ++ ++ ++/* ++ * Same for IPv6. ++ */ ++struct reasm_id_ipv6 { ++ uint8_t ip_src[16], ip_dst[16]; ++ uint32_t ip_id; ++}; ++ ++ ++union reasm_id { ++ struct reasm_id_ipv4 ipv4; ++ struct reasm_id_ipv6 ipv6; ++}; ++ ++ ++struct reasm_frag_entry { ++ unsigned len; /* payload length of this fragment */ ++ unsigned offset; /* offset of this fragment into the payload of the reassembled packet */ ++ unsigned data_offset; /* offset to the data pointer where payload starts */ ++ unsigned char *data; /* payload starts at data + data_offset */ ++ struct reasm_frag_entry *next; ++}; ++ ++ ++/* ++ * Reception of a complete packet is detected by counting the number ++ * of "holes" that remain between the cached fragments. A hole is ++ * assumed to exist at the upper end of the packet until the final ++ * fragment has been received. When the number of holes drops to 0, ++ * all fragments have been received and the packet can be reassembled. ++ */ ++struct reasm_ip_entry { ++ union reasm_id id; ++ unsigned len, holes, frag_count, hash; ++ reasm_time_t timeout; ++ enum entry_state state; ++ enum reasm_proto protocol; ++ struct reasm_frag_entry *frags; ++ struct reasm_ip_entry *prev, *next; ++ struct reasm_ip_entry *time_prev, *time_next; ++}; ++ ++ ++/* ++ * This struct contains some metadata, the main hash table, and a pointer ++ * to the first entry that will time out. A linked list is kept in the ++ * order in which packets will time out. Using a linked list for this ++ * purpose requires that packets are input in chronological order, and ++ * that a constant timeout value is used, which doesn't change even when ++ * the entry's state transitions from active to invalid. ++ */ ++struct reasm_ip { ++ struct reasm_ip_entry *table[REASM_IP_HASH_SIZE]; ++ struct reasm_ip_entry *time_first, *time_last; ++ unsigned waiting, max_waiting, timed_out, dropped_frags; ++ reasm_time_t timeout; ++}; ++ ++ ++/* ++ * Hash functions. ++ */ ++static unsigned reasm_ipv4_hash (const struct reasm_id_ipv4 *id); ++#if USE_IPv6 ++static unsigned reasm_ipv6_hash (const struct reasm_id_ipv6 *id); ++#endif /* USE_IPv6 */ ++ ++/* ++ * Insert a new fragment to the correct position in the list of fragments. ++ * Check for fragment overlap and other error conditions. Update the ++ * "hole count". ++ */ ++static bool add_fragment (struct reasm_ip_entry *entry, struct reasm_frag_entry *frag, bool last_frag); ++ ++/* ++ * Is the entry complete, ready for reassembly? ++ */ ++static bool is_complete (struct reasm_ip_entry *entry); ++ ++/* ++ * Create the reassembled packet. ++ */ ++static unsigned char *assemble (struct reasm_ip_entry *entry, unsigned *output_len); ++ ++/* ++ * Drop and free entries. ++ */ ++static void drop_entry (struct reasm_ip *reasm, struct reasm_ip_entry *entry); ++static void free_entry (struct reasm_ip_entry *entry); ++ ++/* ++ * Dispose of any entries which have expired before "now". ++ */ ++static void process_timeouts (struct reasm_ip *reasm, reasm_time_t now); ++ ++/* ++ * Create fragment structure from IPv6 packet. Returns NULL if the input ++ * is not a fragment. ++ * This function is called by parse_packet(), don't call it directly. ++ */ ++#if USE_IPv6 ++static struct reasm_frag_entry *frag_from_ipv6 (unsigned char *packet, uint32_t *ip_id, bool *last_frag); ++#endif /* USE_IPv6 */ ++ ++/* ++ * Compare packet identification tuples for specified protocol. ++ */ ++static bool reasm_id_equal (enum reasm_proto proto, const union reasm_id *left, const union reasm_id *right); ++ ++/* ++ * Create fragment structure from an IPv4 or IPv6 packet. Returns NULL ++ * if the input is not a fragment. ++ */ ++static struct reasm_frag_entry *parse_packet (unsigned char *packet, unsigned len, enum reasm_proto *protocol, union reasm_id *id, unsigned *hash, bool *last_frag); ++ ++ ++static unsigned ++reasm_ipv4_hash (const struct reasm_id_ipv4 *id) ++{ ++ unsigned hash = 0; ++ int i; ++ ++ for (i = 0; i < 4; i++) { ++ hash = 37U * hash + id->ip_src[i]; ++ hash = 37U * hash + id->ip_dst[i]; ++ } ++ ++ hash = 59U * hash + id->ip_id; ++ ++ hash = 47U * hash + id->ip_proto; ++ ++ return hash; ++} ++ ++ ++#if USE_IPv6 ++static unsigned ++reasm_ipv6_hash (const struct reasm_id_ipv6 *id) ++{ ++ unsigned hash = 0; ++ int i; ++ ++ for (i = 0; i < 16; i++) { ++ hash = 37U * hash + id->ip_src[i]; ++ hash = 37U * hash + id->ip_dst[i]; ++ } ++ ++ hash = 59U * hash + id->ip_id; ++ ++ return hash; ++} ++#endif /* USE_IPv6 */ ++ ++ ++unsigned char * ++reasm_ip_next (struct reasm_ip *reasm, unsigned char *packet, unsigned len, reasm_time_t timestamp, unsigned *output_len) ++{ ++ enum reasm_proto proto; ++ union reasm_id id; ++ unsigned hash; ++ bool last_frag; ++ ++ process_timeouts (reasm, timestamp); ++ ++ struct reasm_frag_entry *frag = parse_packet (packet, len, &proto, &id, &hash, &last_frag); ++ if (frag == NULL) { ++ *output_len = len; ++ return packet; /* some packet that we don't recognize as a fragment */ ++ } ++ ++ hash %= REASM_IP_HASH_SIZE; ++ struct reasm_ip_entry *entry = reasm->table[hash]; ++ while (entry != NULL && (proto != entry->protocol || !reasm_id_equal (proto, &id, &entry->id))) ++ entry = entry->next; ++ ++ if (entry == NULL) { ++ entry = malloc (sizeof (*entry)); ++ if (entry == NULL) { ++ free (frag); ++ abort (); ++ } ++ ++ struct reasm_frag_entry *list_head = malloc (sizeof (*list_head)); ++ if (list_head == NULL) { ++ free (frag); ++ free (entry); ++ abort (); ++ } ++ ++ *entry = (struct reasm_ip_entry) { ++ .id = id, ++ .len = 0, ++ .holes = 1, ++ .frags = list_head, ++ .hash = hash, ++ .protocol = proto, ++ .timeout = timestamp + reasm->timeout, ++ .state = STATE_ACTIVE, ++ .prev = NULL, ++ .next = reasm->table[hash], ++ .time_prev = reasm->time_last, ++ .time_next = NULL, ++ }; ++ ++ *list_head = (struct reasm_frag_entry) { ++ .len = 0, ++ .offset = 0, ++ .data_offset = 0, ++ .data = NULL, ++ }; ++ ++ if (entry->next != NULL) ++ entry->next->prev = entry; ++ reasm->table[hash] = entry; ++ ++ if (reasm->time_last != NULL) ++ reasm->time_last->time_next = entry; ++ else ++ reasm->time_first = entry; ++ reasm->time_last = entry; ++ ++ reasm->waiting++; ++ if (reasm->waiting > reasm->max_waiting) ++ reasm->max_waiting = reasm->waiting; ++ } ++ ++ if (entry->state != STATE_ACTIVE) { ++ reasm->dropped_frags++; ++ return NULL; ++ } ++ ++ if (!add_fragment (entry, frag, last_frag)) { ++ entry->state = STATE_INVALID; ++ reasm->dropped_frags += entry->frag_count + 1; ++ return NULL; ++ } ++ ++ if (!is_complete (entry)) ++ return NULL; ++ ++ unsigned char *r = assemble (entry, output_len); ++ drop_entry (reasm, entry); ++ return r; ++} ++ ++ ++static bool ++add_fragment (struct reasm_ip_entry *entry, struct reasm_frag_entry *frag, bool last_frag) ++{ ++ /* ++ * When a fragment is inserted into the list, different cases can occur ++ * concerning the number of holes. ++ * - The new fragment can be inserted in the middle of a hole, such that ++ * it will split the hole in two. The number of holes increases by 1. ++ * - The new fragment can be attached to one end of a hole, such that ++ * the rest of the hole remains at the opposite side of the fragment. ++ * The number of holes remains constant. ++ * - The new fragment can fill a hole completely. The number of holes ++ * decreases by 1. ++ */ ++ ++ /* ++ * If more fragments follow and the payload size is not an integer ++ * multiple of 8, the packet will never be reassembled completely. ++ */ ++ if (!last_frag && (frag->len & 7) != 0) ++ return false; ++ ++ if (entry->len != 0 && frag->len + frag->offset > entry->len) ++ return false; /* fragment extends past end of packet */ ++ ++ bool fit_left = false, fit_right = false; ++ ++ if (last_frag) { ++ if (entry->len != 0) { ++ fprintf (stderr, "* ERROR: Multiple final fragments.\n"); ++ return false; ++ } ++ entry->len = frag->offset + frag->len; ++ fit_right = true; ++ } ++ ++ struct reasm_frag_entry *cur = entry->frags, *next = cur->next; ++ ++ while (cur->next != NULL && cur->next->offset <= frag->offset) ++ cur = cur->next; ++ next = cur->next; ++ ++ /* Fragment is to be inserted between cur and next; next may be NULL. */ ++ ++ /* Overlap checks. */ ++ if (cur->offset + cur->len > frag->offset) ++ return false; /* overlaps with cur */ ++ else if (cur->offset + cur->len == frag->offset) ++ fit_left = true; ++ ++ if (next != NULL) { ++ if (last_frag) ++ return false; /* next extends past end of packet */ ++ if (frag->offset + frag->len > next->offset) ++ return false; /* overlaps with next */ ++ else if (frag->offset + frag->len == next->offset) ++ fit_right = true; ++ } ++ ++ /* ++ * Everything's fine, insert it. ++ */ ++ if (frag->len != 0) { ++ frag->next = cur->next; ++ cur->next = frag; ++ ++ if (fit_left && fit_right) ++ entry->holes--; ++ else if (!fit_left && !fit_right) ++ entry->holes++; ++ ++ entry->frag_count++; ++ } else { ++ /* ++ * If the fragment has zero size, we don't insert it into the list, ++ * but one case remains to be handled: If the zero-size fragment ++ * is the last fragment, and fits exactly with the fragment to its ++ * left, the number of holes decreases. ++ */ ++ if (last_frag && fit_left) ++ entry->holes--; ++ } ++ ++ ++ return true; ++} ++ ++ ++struct reasm_ip * ++reasm_ip_new (void) ++{ ++ struct reasm_ip *reasm = malloc (sizeof (*reasm)); ++ if (reasm == NULL) ++ return NULL; ++ ++ memset (reasm, 0, sizeof (*reasm)); ++ return reasm; ++} ++ ++ ++void ++reasm_ip_free (struct reasm_ip *reasm) ++{ ++ while (reasm->time_first != NULL) ++ drop_entry (reasm, reasm->time_first); ++ free (reasm); ++} ++ ++ ++static bool ++is_complete (struct reasm_ip_entry *entry) ++{ ++ return entry->holes == 0; ++} ++ ++ ++static unsigned char * ++assemble (struct reasm_ip_entry *entry, unsigned *output_len) ++{ ++ struct reasm_frag_entry *frag = entry->frags->next; /* skip list head */ ++ unsigned offset0 = frag->data_offset; ++ unsigned char *p = malloc (entry->len + offset0); ++ if (p == NULL) ++ abort (); ++ ++ switch (entry->protocol) { ++ case PROTO_IPV4: ++ break; ++ ++#if USE_IPv6 ++ case PROTO_IPV6: ++ offset0 -= 8; /* size of frag header */ ++ break; ++#endif /* USE_IPv6 */ ++ ++ default: ++ abort (); ++ } ++ ++ *output_len = entry->len + offset0; ++ ++ /* copy the (unfragmentable) header from the first fragment received */ ++ memcpy (p, frag->data, offset0); ++ ++ /* join all the payload fragments together */ ++ while (frag != NULL) { ++ memcpy (p + offset0 + frag->offset, frag->data + frag->data_offset, frag->len); ++ frag = frag->next; ++ } ++ ++ /* some cleanups, e.g. update the length field of reassembled packet */ ++ switch (entry->protocol) { ++ case PROTO_IPV4: { ++ struct ip *ip_header = (struct ip *) p; ++ ip_header->ip_len = htons (offset0 + entry->len); ++ ip_header->ip_off = 0; ++ // XXX recompute the checksum ++ break; ++ } ++ ++#if USE_IPv6 ++ case PROTO_IPV6: { ++ struct ip6_hdr *ip6_header = (struct ip6_hdr *) p; ++ ip6_header->ip6_plen = htons (offset0 + entry->len - 40); ++ break; ++ } ++#endif /* USE_IPv6 */ ++ ++ default: ++ abort (); ++ } ++ ++ return p; ++} ++ ++ ++static void ++drop_entry (struct reasm_ip *reasm, struct reasm_ip_entry *entry) ++{ ++ if (entry->prev != NULL) ++ entry->prev->next = entry->next; ++ else ++ reasm->table[entry->hash] = entry->next; ++ ++ if (entry->next != NULL) ++ entry->next->prev = entry->prev; ++ ++ if (entry->time_prev != NULL) ++ entry->time_prev->time_next = entry->time_next; ++ else ++ reasm->time_first = entry->time_next; ++ ++ if (entry->time_next != NULL) ++ entry->time_next->time_prev = entry->time_prev; ++ else ++ reasm->time_last = entry->time_prev; ++ ++ reasm->waiting--; ++ ++ free_entry (entry); ++} ++ ++ ++static void ++free_entry (struct reasm_ip_entry *entry) ++{ ++ struct reasm_frag_entry *frag = entry->frags, *next; ++ while (frag != NULL) { ++ next = frag->next; ++ if (frag->data != NULL) ++ free (frag->data); ++ free (frag); ++ frag = next; ++ } ++ ++ free (entry); ++} ++ ++ ++unsigned ++reasm_ip_waiting (const struct reasm_ip *reasm) ++{ ++ return reasm->waiting; ++} ++ ++ ++unsigned ++reasm_ip_max_waiting (const struct reasm_ip *reasm) ++{ ++ return reasm->max_waiting; ++} ++ ++ ++unsigned ++reasm_ip_timed_out (const struct reasm_ip *reasm) ++{ ++ return reasm->timed_out; ++} ++ ++ ++unsigned ++reasm_ip_dropped_frags (const struct reasm_ip *reasm) ++{ ++ return reasm->dropped_frags; ++} ++ ++ ++bool ++reasm_ip_set_timeout (struct reasm_ip *reasm, reasm_time_t timeout) ++{ ++ if (reasm->time_first != NULL) ++ return false; ++ ++ reasm->timeout = timeout; ++ return true; ++} ++ ++ ++static void ++process_timeouts (struct reasm_ip *reasm, reasm_time_t now) ++{ ++ while (reasm->time_first != NULL && reasm->time_first->timeout < now) { ++ reasm->timed_out++; ++ drop_entry (reasm, reasm->time_first); ++ } ++} ++ ++ ++#if USE_IPv6 ++static struct reasm_frag_entry * ++frag_from_ipv6 (unsigned char *packet, uint32_t *ip_id, bool *last_frag) ++{ ++ struct ip6_hdr *ip6_header = (struct ip6_hdr *) packet; ++ unsigned offset = 40; /* IPv6 header size */ ++ uint8_t nxt = ip6_header->ip6_nxt; ++ unsigned total_len = 40 + ntohs (ip6_header->ip6_plen); ++ unsigned last_nxt = offsetof (struct ip6_hdr, ip6_nxt); ++ ++ /* ++ * IPv6 extension headers from RFC 2460: ++ * 0 Hop-by-Hop Options ++ * 43 Routing ++ * 44 Fragment ++ * 60 Destination Options ++ * ++ * We look out for the Fragment header; the other 3 header ++ * types listed above are recognized and considered safe to ++ * skip over if they occur before the Fragment header. ++ * Any unrecognized header will cause processing to stop and ++ * a subsequent Fragment header to stay unrecognized. ++ */ ++ while (nxt == IPPROTO_HOPOPTS || nxt == IPPROTO_ROUTING || nxt == IPPROTO_DSTOPTS) { ++ if (offset + 2 > total_len) ++ return NULL; /* header extends past end of packet */ ++ ++ unsigned exthdr_len = 8 + 8 * packet[offset + 1]; ++ if (offset + exthdr_len > total_len) ++ return NULL; /* header extends past end of packet */ ++ ++ nxt = packet[offset]; ++ last_nxt = offset; ++ offset += exthdr_len; ++ } ++ ++ if (nxt != IPPROTO_FRAGMENT) ++ return NULL; ++ ++ if (offset + 8 > total_len) ++ return NULL; /* Fragment header extends past end of packet */ ++ ++ struct reasm_frag_entry *frag = malloc (sizeof (*frag)); ++ if (frag == NULL) ++ abort (); ++ ++ struct ip6_frag *frag_header = (struct ip6_frag *) (packet + offset); ++ offset += 8; ++ ++ /* ++ * The Fragment header will be removed on reassembly, so we have to ++ * replace the Next Header field of the previous header (which is ++ * currently IPPROTO_FRAGMENT), with the Next Header field of the ++ * Fragment header. ++ * ++ * XXX We really shouldn't manipulate the input packet in-place. ++ */ ++ packet[last_nxt] = frag_header->ip6f_nxt; ++ ++ *frag = (struct reasm_frag_entry) { ++ .len = total_len - offset, ++ .data_offset = offset, ++ .offset = ntohs (frag_header->ip6f_offlg & IP6F_OFF_MASK), ++ .data = packet, ++ }; ++ ++ *ip_id = ntohl (frag_header->ip6f_ident); ++ *last_frag = (frag_header->ip6f_offlg & IP6F_MORE_FRAG) == 0; ++ ++ return frag; ++} ++#endif /* USE_IPv6 */ ++ ++ ++static bool ++reasm_id_equal (enum reasm_proto proto, const union reasm_id *left, const union reasm_id *right) ++{ ++ switch (proto) { ++ case PROTO_IPV4: ++ return memcmp (left->ipv4.ip_src, right->ipv4.ip_src, 4) == 0 ++ && memcmp (left->ipv4.ip_dst, right->ipv4.ip_dst, 4) == 0 ++ && left->ipv4.ip_id == right->ipv4.ip_id ++ && left->ipv4.ip_proto == right->ipv4.ip_proto; ++#if USE_IPv6 ++ case PROTO_IPV6: ++ return memcmp (left->ipv6.ip_src, right->ipv6.ip_src, 16) == 0 ++ && memcmp (left->ipv6.ip_dst, right->ipv6.ip_dst, 16) == 0 ++ && left->ipv6.ip_id == right->ipv6.ip_id; ++#endif /* USE_IPv6 */ ++ default: ++ abort (); ++ } ++} ++ ++ ++static struct reasm_frag_entry * ++parse_packet (unsigned char *packet, unsigned len, enum reasm_proto *protocol, union reasm_id *id, unsigned *hash, bool *last_frag) ++{ ++ struct ip *ip_header = (struct ip *) packet; ++ struct reasm_frag_entry *frag = NULL; ++ ++ switch (ip_header->ip_v) { ++ case 4: { ++ *protocol = PROTO_IPV4; ++ uint16_t offset = ntohs (ip_header->ip_off); ++ if (len >= ntohs (ip_header->ip_len) && (offset & (IP_MF | IP_OFFMASK)) != 0) { ++ frag = malloc (sizeof (*frag)); ++ if (frag == NULL) ++ abort (); ++ ++ *frag = (struct reasm_frag_entry) { ++ .len = ntohs (ip_header->ip_len) - ip_header->ip_hl * 4, ++ .offset = (offset & IP_OFFMASK) * 8, ++ .data_offset = ip_header->ip_hl * 4, ++ .data = packet, ++ }; ++ ++ *last_frag = (offset & IP_MF) == 0; ++ ++ memcpy (id->ipv4.ip_src, &ip_header->ip_src, 4); ++ memcpy (id->ipv4.ip_dst, &ip_header->ip_dst, 4); ++ id->ipv4.ip_id = ntohs (ip_header->ip_id); ++ id->ipv4.ip_proto = ip_header->ip_p; ++ ++ *hash = reasm_ipv4_hash (&id->ipv4); ++ } ++ break; ++ } ++ ++#if USE_IPv6 ++ case 6: { ++ struct ip6_hdr *ip6_header = (struct ip6_hdr *) packet; ++ *protocol = PROTO_IPV6; ++ if (len >= ntohs (ip6_header->ip6_plen) + 40) ++ frag = frag_from_ipv6 (packet, &id->ipv6.ip_id, last_frag); ++ if (frag != NULL) { ++ memcpy (id->ipv6.ip_src, &ip6_header->ip6_src, 16); ++ memcpy (id->ipv6.ip_dst, &ip6_header->ip6_dst, 16); ++ *hash = reasm_ipv6_hash (&id->ipv6); ++ } ++ break; ++ } ++#endif /* USE_IPv6 */ ++ ++ default: ++ break; ++ } ++ ++ return frag; ++} +diff -urN ngrep-1.45/ipreasm.h ngrep-1.45-reasm/ipreasm.h +--- ngrep-1.45/ipreasm.h 1970-01-01 01:00:00.000000000 +0100 ++++ ngrep-1.45-reasm/ipreasm.h 2007-06-16 19:17:20.124795623 +0200 +@@ -0,0 +1,57 @@ ++#ifndef _IPREASM_H ++#define _IPREASM_H ++ ++#include <stdbool.h> ++ ++#include <pcap.h> ++ ++ ++/* ++ * This is an abstract time stamp. ipreasm doesn't care whether it is ++ * in seconds, milliseconds, or nanodecades. All it does it add the ++ * configured timeout value to it, and then compare it to the timstamps ++ * of subsequent packets to decide whether a fragment has expired. ++ */ ++typedef uint64_t reasm_time_t; ++ ++struct reasm_ip; ++ ++/* ++ * Functions to create and destroy the reassembly environment. ++ */ ++struct reasm_ip *reasm_ip_new (void); ++void reasm_ip_free (struct reasm_ip *reasm); ++ ++/* ++ * This is the main packet processing function. It inputs one packet, ++ * and MAY output one packet in turn. If the input was not a fragment, ++ * it is passed unmodified. If the input was a fragment that completed ++ * reassembly of a packet, the reassembled packet is output. ++ * If more fragments are required for reassembly, or the input packet ++ * is invalid for some reason, a NULL pointer is returned. ++ * ++ * The input must be a pointer allocated by malloc(). The output will ++ * be a pointer allocated by malloc(). ++ * ++ * Note that in the case of an IPv6 fragment, the input buffer will be ++ * modified in-place. This is considered a bug and should be fixed in ++ * the future. ++ */ ++unsigned char *reasm_ip_next (struct reasm_ip *reasm, unsigned char *packet, unsigned len, reasm_time_t timestamp, unsigned *output_len); ++ ++/* ++ * Set the timeout after which a noncompleted reassembly expires, in ++ * abstract time units (see above for the definition of reasm_time_t). ++ */ ++bool reasm_ip_set_timeout (struct reasm_ip *reasm, reasm_time_t timeout); ++ ++/* ++ * Query certain information about the current state. ++ */ ++unsigned reasm_ip_waiting (const struct reasm_ip *reasm); ++unsigned reasm_ip_max_waiting (const struct reasm_ip *reasm); ++unsigned reasm_ip_timed_out (const struct reasm_ip *reasm); ++unsigned reasm_ip_dropped_frags (const struct reasm_ip *reasm); ++ ++ ++#endif /* _IPREASM_H */ +diff -urN ngrep-1.45/Makefile.in ngrep-1.45-reasm/Makefile.in +--- ngrep-1.45/Makefile.in 2006-11-28 14:35:37.000000000 +0100 ++++ ngrep-1.45-reasm/Makefile.in 2007-06-16 15:41:22.859876074 +0200 +@@ -15,8 +15,8 @@ + + STRIPFLAG=@STRIPFLAG@ + +-SRC=ngrep.c +-OBJS=ngrep.o ++SRC=ngrep.c ipreasm.c ++OBJS=ngrep.o ipreasm.o + TARGET=ngrep + MANPAGE=ngrep.8 + +@@ -65,7 +65,7 @@ + $(REGEX_OBJS): $(REGEX_OBJS:.o=.c) $(REGEX_DIR)/*.h + $(MAKE) $(MAKEFLAGS) -C $(REGEX_DIR) $(notdir $(REGEX_OBJS)) + +-$(OBJS): Makefile ngrep.c ngrep.h ++$(OBJS): Makefile ngrep.c ngrep.h ipreasm.c ipreasm.h + + tardist: + @( VERSION=`perl -ne '/VERSION\s+"(.*)"/ && print "$$1\n"' ngrep.h` ; \ +diff -urN ngrep-1.45/ngrep.c ngrep-1.45-reasm/ngrep.c +--- ngrep-1.45/ngrep.c 2006-11-28 14:38:43.000000000 +0100 ++++ ngrep-1.45-reasm/ngrep.c 2007-06-16 21:41:43.142117150 +0200 +@@ -98,6 +98,7 @@ + #endif + + #include "ngrep.h" ++#include "ipreasm.h" + + + static char rcsver[] = "$Revision: 1.93 $"; +@@ -156,7 +157,7 @@ + uint8_t link_offset; + uint8_t radiotap_present = 0; + +-pcap_t *pd = NULL; ++pcap_t *pd = NULL, *pd_dumppcap = NULL; + pcap_dumper_t *pd_dump = NULL; + struct bpf_program pcapfilter; + struct in_addr net, mask; +@@ -183,6 +184,12 @@ + uint32_t ws_row, ws_col = 80, ws_col_forced = 0; + + ++/* ++ * Reassembly ++ */ ++struct reasm_ip *reasm = NULL; ++ ++ + int main(int argc, char **argv) { + int32_t c; + +@@ -195,7 +202,7 @@ + signal(SIGWINCH, update_windowsize); + #endif + +- while ((c = getopt(argc, argv, "LNhXViwqpevxlDtTRMs:n:c:d:A:I:O:S:P:F:W:")) != EOF) { ++ while ((c = getopt(argc, argv, "LNhXViwqpevxlDtTrRMs:n:c:d:A:I:O:S:P:F:W:")) != EOF) { + switch (c) { + case 'W': { + if (!strcasecmp(optarg, "normal")) +@@ -260,6 +267,10 @@ + case 'M': + re_multiline_match = 0; + break; ++ case 'r': ++ reasm = reasm_ip_new (); ++ reasm_ip_set_timeout (reasm, 30000000); ++ break; + case 'R': + dont_dropprivs = 1; + break; +@@ -585,7 +596,15 @@ + } + + if (dump_file) { +- if (!(pd_dump = pcap_dump_open(pd, dump_file))) { ++ if (reasm != NULL) { ++ if (!(pd_dumppcap = pcap_open_dead(DLT_RAW, 65535))) { ++ fprintf(stderr, "fatal: pcap_open_dead failed\n"); ++ clean_exit(-1); ++ } ++ pd_dump = pcap_dump_open(pd_dumppcap, dump_file); ++ } else ++ pd_dump = pcap_dump_open(pd, dump_file); ++ if (!pd_dump) { + fprintf(stderr, "fatal: %s\n", pcap_geterr(pd)); + clean_exit(-1); + } else printf("output: %s\n", dump_file); +@@ -641,6 +660,23 @@ + } + #endif + ++ if (reasm != NULL) { ++ unsigned new_len; ++ u_char *new_p = malloc(len - link_offset); ++ memcpy(new_p, ip4_pkt, len - link_offset); ++ p = reasm_ip_next(reasm, new_p, len - link_offset, (reasm_time_t) 1000000UL * h->ts.tv_sec + h->ts.tv_usec, &new_len); ++ if (p == NULL) ++ return; ++ len = new_len + link_offset; ++ h->len = new_len; ++ h->caplen = new_len; ++ ++ ip4_pkt = (struct ip *) p; ++#if USE_IPv6 ++ ip6_pkt = (struct ip6_hdr*)p; ++#endif ++ } ++ + ip_ver = ip4_pkt->ip_v; + + switch (ip_ver) { +@@ -802,6 +838,9 @@ + + if (match_after && keep_matching) + keep_matching--; ++ ++ if (reasm != NULL) ++ free(p); + } + + void dump_packet(struct pcap_pkthdr *h, u_char *p, uint8_t proto, unsigned char *data, uint32_t len, +@@ -1242,6 +1281,7 @@ + " -s is set the bpf caplen\n" + " -S is set the limitlen on matched packets\n" + " -W is set the dump format (normal, byline, single, none)\n" ++ " -r is reassemble any fragmented IPV4 or IPV6 packets\n" + " -c is force the column width to the specified size\n" + " -P is set the non-printable display char to what is specified\n" + " -F is read the bpf filter from the specified file\n" +@@ -1292,8 +1331,9 @@ + && pd && !pcap_stats(pd, &s)) + printf("%u received, %u dropped\n", s.ps_recv, s.ps_drop); + +- if (pd) pcap_close(pd); +- if (pd_dump) pcap_dump_close(pd_dump); ++ if (pd) pcap_close(pd); ++ if (pd_dumppcap) pcap_close(pd_dumppcap); ++ if (pd_dump) pcap_dump_close(pd_dump); + + #if defined(_WIN32) + if (delay_socket) closesocket(delay_socket); +@@ -1301,6 +1341,9 @@ + if (usedev) free(usedev); + #endif + ++ if (reasm != NULL) ++ reasm_ip_free(reasm); ++ + exit(sig); + } + diff --git a/network/ngrep/ngrep.SlackBuild b/network/ngrep/ngrep.SlackBuild new file mode 100644 index 0000000000000..cb74a01a95b31 --- /dev/null +++ b/network/ngrep/ngrep.SlackBuild @@ -0,0 +1,81 @@ +#!/bin/sh + +# Slackware build script for ngrep + +# Written by Larry Hajali <larryhaja[at]gmail[dot]com> + +PRGNAM=ngrep +VERSION=${VERSION:-1.45} +ARCH=${ARCH:-i486} +BUILD=${BUILD:-1} +TAG=${TAG:-_SBo} + +CWD=$(pwd) +TMP=${TMP:-/tmp/SBo} +PKG=$TMP/package-$PRGNAM +OUTPUT=${OUTPUT:-/tmp} + +if [ "$ARCH" = "i486" ]; then + SLKCFLAGS="-O2 -march=i486 -mtune=i686" +elif [ "$ARCH" = "i686" ]; then + SLKCFLAGS="-O2 -march=i686 -mtune=i686" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" +fi + +set -e + +# Option to add packet reassembly patch (default = yes) +REASSEM_PATCH=${ASSEM_PATCH:-yes} + +# Enable IPV6; either yes or no +NGREP_IPV6=${NGREP_IPV6:-yes} + +rm -rf $PKG +mkdir -p $TMP $PKG $OUTPUT +cd $TMP +rm -rf $PRGNAM-$VERSION +tar xvf $CWD/$PRGNAM-$VERSION.tar.bz2 +cd $PRGNAM-$VERSION +chown -R root:root . +find . \ + \( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \ + -exec chmod 755 {} \; -o \ + \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ + -exec chmod 644 {} \; + +# Patch adds IPv4 and IPv6 fragment reassembly for ngrep 1.45 +if [ $REASSEM_PATCH == yes ]; then + patch -p1 < $CWD/ngrep-1.45-reasm.diff +fi + +CFLAGS="$SLKCFLAGS" \ +CXXFLAGS="$SLKCFLAGS" \ +./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --enable-ipv6=${NGREP_IPV6} \ + --with-pcap-includes=/usr/include \ + --disable-static \ + --build=$ARCH-slackware-linux + +make +make install DESTDIR=$PKG mandir=/usr/man + +( cd $PKG + find . | xargs file | grep "executable" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true + find . | xargs file | grep "shared object" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null +) + +find $PKG/usr/man -type f -exec gzip -9 {} \; + +mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION +cp -a LICENSE.txt doc/*.txt $PKG/usr/doc/$PRGNAM-$VERSION +cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild + +mkdir -p $PKG/install +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.tgz diff --git a/network/ngrep/ngrep.info b/network/ngrep/ngrep.info new file mode 100644 index 0000000000000..c41388d2acb22 --- /dev/null +++ b/network/ngrep/ngrep.info @@ -0,0 +1,8 @@ +PRGNAM="ngrep" +VERSION="1.45" +HOMEPAGE="http://ngrep.sourceforge.net/" +DOWNLOAD="http://downloads.sourceforge.net/ngrep/ngrep-1.45.tar.bz2" +MD5SUM="bc8150331601f3b869549c94866b4f1c" +MAINTAINER="Larry Hajali" +EMAIL="larryhaja[at]gmail[dot]com" +APPROVED="rworkman" diff --git a/network/ngrep/slack-desc b/network/ngrep/slack-desc new file mode 100644 index 0000000000000..d286d4f10e634 --- /dev/null +++ b/network/ngrep/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. Line +# up the first '|' above the ':' following the base package name, and the '|' on +# the right side marks the last column you can put a character in. You must make +# exactly 11 lines for the formatting to be correct. It's also customary to +# leave one space after the ':'. + + |-----handy-ruler------------------------------------------------------| +ngrep: ngrep (network grep) +ngrep: +ngrep: ngrep strives to provide most of GNU grep's common features, +ngrep: applying them to the network layer. ngrep is a pcap-aware tool that +ngrep: will allow you to specify extended regular or hexadecimal expressions +ngrep: to match against data payloads of packets. It currently recognizes +ngrep: IPv4/6, TCP, UDP and ICMPv4/6, IGMP and Raw across Ethernet, PPP, +ngrep: SLIP, FDDI, Token Ring and null interfaces. +ngrep: +ngrep: Home: http://ngrep.sourceforge.net/ +ngrep:
\ No newline at end of file |