mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-27 11:55:06 +00:00
0bff6a5af8
It contains many fixes, including bounds checking, buffer overflows (in SLIP and bittok2str_internal), buffer over-reads, and infinite loops. One other notable change: Do not use getprotobynumber() for protocol name resolution. Do not do any protocol name resolution if -n is specified. Submitted by: gordon Reviewed by: delphij, emaste, glebius MFC after: 1 week Relnotes: Yes Security: CVE-2017-11108, CVE-2017-11541, CVE-2017-11542 Security: CVE-2017-11543, CVE-2017-12893, CVE-2017-12894 Security: CVE-2017-12895, CVE-2017-12896, CVE-2017-12897 Security: CVE-2017-12898, CVE-2017-12899, CVE-2017-12900 Security: CVE-2017-12901, CVE-2017-12902, CVE-2017-12985 Security: CVE-2017-12986, CVE-2017-12987, CVE-2017-12988 Security: CVE-2017-12989, CVE-2017-12990, CVE-2017-12991 Security: CVE-2017-12992, CVE-2017-12993, CVE-2017-12994 Security: CVE-2017-12995, CVE-2017-12996, CVE-2017-12997 Security: CVE-2017-12998, CVE-2017-12999, CVE-2017-13000 Security: CVE-2017-13001, CVE-2017-13002, CVE-2017-13003 Security: CVE-2017-13004, CVE-2017-13005, CVE-2017-13006 Security: CVE-2017-13007, CVE-2017-13008, CVE-2017-13009 Security: CVE-2017-13010, CVE-2017-13011, CVE-2017-13012 Security: CVE-2017-13013, CVE-2017-13014, CVE-2017-13015 Security: CVE-2017-13016, CVE-2017-13017, CVE-2017-13018 Security: CVE-2017-13019, CVE-2017-13020, CVE-2017-13021 Security: CVE-2017-13022, CVE-2017-13023, CVE-2017-13024 Security: CVE-2017-13025, CVE-2017-13026, CVE-2017-13027 Security: CVE-2017-13028, CVE-2017-13029, CVE-2017-13030 Security: CVE-2017-13031, CVE-2017-13032, CVE-2017-13033 Security: CVE-2017-13034, CVE-2017-13035, CVE-2017-13036 Security: CVE-2017-13037, CVE-2017-13038, CVE-2017-13039 Security: CVE-2017-13040, CVE-2017-13041, CVE-2017-13042 Security: CVE-2017-13043, CVE-2017-13044, CVE-2017-13045 Security: CVE-2017-13046, CVE-2017-13047, CVE-2017-13048 Security: CVE-2017-13049, CVE-2017-13050, CVE-2017-13051 Security: CVE-2017-13052, CVE-2017-13053, CVE-2017-13054 Security: CVE-2017-13055, CVE-2017-13687, CVE-2017-13688 Security: CVE-2017-13689, CVE-2017-13690, CVE-2017-13725 Differential Revision: https://reviews.freebsd.org/D12404
765 lines
24 KiB
C
765 lines
24 KiB
C
/*
|
|
* Copyright (c) 1998-2006 The TCPDUMP project
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that: (1) source code
|
|
* distributions retain the above copyright notice and this paragraph
|
|
* in its entirety, and (2) distributions including binary code include
|
|
* the above copyright notice and this paragraph in its entirety in
|
|
* the documentation or other materials provided with the distribution.
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND
|
|
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
|
|
* LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE.
|
|
*
|
|
* Original code by Hannes Gredler (hannes@gredler.at)
|
|
*/
|
|
|
|
/* \summary: IEEE 802.1ag Connectivity Fault Management (CFM) protocols printer */
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <netdissect-stdinc.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "netdissect.h"
|
|
#include "extract.h"
|
|
#include "ether.h"
|
|
#include "addrtoname.h"
|
|
#include "oui.h"
|
|
#include "af.h"
|
|
|
|
struct cfm_common_header_t {
|
|
uint8_t mdlevel_version;
|
|
uint8_t opcode;
|
|
uint8_t flags;
|
|
uint8_t first_tlv_offset;
|
|
};
|
|
|
|
#define CFM_VERSION 0
|
|
#define CFM_EXTRACT_VERSION(x) (((x)&0x1f))
|
|
#define CFM_EXTRACT_MD_LEVEL(x) (((x)&0xe0)>>5)
|
|
|
|
#define CFM_OPCODE_CCM 1
|
|
#define CFM_OPCODE_LBR 2
|
|
#define CFM_OPCODE_LBM 3
|
|
#define CFM_OPCODE_LTR 4
|
|
#define CFM_OPCODE_LTM 5
|
|
|
|
static const struct tok cfm_opcode_values[] = {
|
|
{ CFM_OPCODE_CCM, "Continouity Check Message"},
|
|
{ CFM_OPCODE_LBR, "Loopback Reply"},
|
|
{ CFM_OPCODE_LBM, "Loopback Message"},
|
|
{ CFM_OPCODE_LTR, "Linktrace Reply"},
|
|
{ CFM_OPCODE_LTM, "Linktrace Message"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
/*
|
|
* Message Formats.
|
|
*/
|
|
struct cfm_ccm_t {
|
|
uint8_t sequence[4];
|
|
uint8_t ma_epi[2];
|
|
uint8_t names[48];
|
|
uint8_t itu_t_y_1731[16];
|
|
};
|
|
|
|
/*
|
|
* Timer Bases for the CCM Interval field.
|
|
* Expressed in units of seconds.
|
|
*/
|
|
static const float ccm_interval_base[8] = {0, 0.003333, 0.01, 0.1, 1, 10, 60, 600};
|
|
#define CCM_INTERVAL_MIN_MULTIPLIER 3.25
|
|
#define CCM_INTERVAL_MAX_MULTIPLIER 3.5
|
|
|
|
#define CFM_CCM_RDI_FLAG 0x80
|
|
#define CFM_EXTRACT_CCM_INTERVAL(x) (((x)&0x07))
|
|
|
|
#define CFM_CCM_MD_FORMAT_8021 0
|
|
#define CFM_CCM_MD_FORMAT_NONE 1
|
|
#define CFM_CCM_MD_FORMAT_DNS 2
|
|
#define CFM_CCM_MD_FORMAT_MAC 3
|
|
#define CFM_CCM_MD_FORMAT_CHAR 4
|
|
|
|
static const struct tok cfm_md_nameformat_values[] = {
|
|
{ CFM_CCM_MD_FORMAT_8021, "IEEE 802.1"},
|
|
{ CFM_CCM_MD_FORMAT_NONE, "No MD Name present"},
|
|
{ CFM_CCM_MD_FORMAT_DNS, "DNS string"},
|
|
{ CFM_CCM_MD_FORMAT_MAC, "MAC + 16Bit Integer"},
|
|
{ CFM_CCM_MD_FORMAT_CHAR, "Character string"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
#define CFM_CCM_MA_FORMAT_8021 0
|
|
#define CFM_CCM_MA_FORMAT_VID 1
|
|
#define CFM_CCM_MA_FORMAT_CHAR 2
|
|
#define CFM_CCM_MA_FORMAT_INT 3
|
|
#define CFM_CCM_MA_FORMAT_VPN 4
|
|
|
|
static const struct tok cfm_ma_nameformat_values[] = {
|
|
{ CFM_CCM_MA_FORMAT_8021, "IEEE 802.1"},
|
|
{ CFM_CCM_MA_FORMAT_VID, "Primary VID"},
|
|
{ CFM_CCM_MA_FORMAT_CHAR, "Character string"},
|
|
{ CFM_CCM_MA_FORMAT_INT, "16Bit Integer"},
|
|
{ CFM_CCM_MA_FORMAT_VPN, "RFC2685 VPN-ID"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
struct cfm_lbm_t {
|
|
uint8_t transaction_id[4];
|
|
};
|
|
|
|
struct cfm_ltm_t {
|
|
uint8_t transaction_id[4];
|
|
uint8_t ttl;
|
|
uint8_t original_mac[ETHER_ADDR_LEN];
|
|
uint8_t target_mac[ETHER_ADDR_LEN];
|
|
};
|
|
|
|
static const struct tok cfm_ltm_flag_values[] = {
|
|
{ 0x80, "Use Forwarding-DB only"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
struct cfm_ltr_t {
|
|
uint8_t transaction_id[4];
|
|
uint8_t ttl;
|
|
uint8_t replay_action;
|
|
};
|
|
|
|
static const struct tok cfm_ltr_flag_values[] = {
|
|
{ 0x80, "UseFDB Only"},
|
|
{ 0x40, "FwdYes"},
|
|
{ 0x20, "Terminal MEP"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
static const struct tok cfm_ltr_replay_action_values[] = {
|
|
{ 1, "Exact Match"},
|
|
{ 2, "Filtering DB"},
|
|
{ 3, "MIP CCM DB"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
|
|
#define CFM_TLV_END 0
|
|
#define CFM_TLV_SENDER_ID 1
|
|
#define CFM_TLV_PORT_STATUS 2
|
|
#define CFM_TLV_INTERFACE_STATUS 3
|
|
#define CFM_TLV_DATA 4
|
|
#define CFM_TLV_REPLY_INGRESS 5
|
|
#define CFM_TLV_REPLY_EGRESS 6
|
|
#define CFM_TLV_PRIVATE 31
|
|
|
|
static const struct tok cfm_tlv_values[] = {
|
|
{ CFM_TLV_END, "End"},
|
|
{ CFM_TLV_SENDER_ID, "Sender ID"},
|
|
{ CFM_TLV_PORT_STATUS, "Port status"},
|
|
{ CFM_TLV_INTERFACE_STATUS, "Interface status"},
|
|
{ CFM_TLV_DATA, "Data"},
|
|
{ CFM_TLV_REPLY_INGRESS, "Reply Ingress"},
|
|
{ CFM_TLV_REPLY_EGRESS, "Reply Egress"},
|
|
{ CFM_TLV_PRIVATE, "Organization Specific"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
/*
|
|
* TLVs
|
|
*/
|
|
|
|
struct cfm_tlv_header_t {
|
|
uint8_t type;
|
|
uint8_t length[2];
|
|
};
|
|
|
|
/* FIXME define TLV formats */
|
|
|
|
static const struct tok cfm_tlv_port_status_values[] = {
|
|
{ 1, "Blocked"},
|
|
{ 2, "Up"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
static const struct tok cfm_tlv_interface_status_values[] = {
|
|
{ 1, "Up"},
|
|
{ 2, "Down"},
|
|
{ 3, "Testing"},
|
|
{ 5, "Dormant"},
|
|
{ 6, "not present"},
|
|
{ 7, "lower Layer down"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
#define CFM_CHASSIS_ID_CHASSIS_COMPONENT 1
|
|
#define CFM_CHASSIS_ID_INTERFACE_ALIAS 2
|
|
#define CFM_CHASSIS_ID_PORT_COMPONENT 3
|
|
#define CFM_CHASSIS_ID_MAC_ADDRESS 4
|
|
#define CFM_CHASSIS_ID_NETWORK_ADDRESS 5
|
|
#define CFM_CHASSIS_ID_INTERFACE_NAME 6
|
|
#define CFM_CHASSIS_ID_LOCAL 7
|
|
|
|
static const struct tok cfm_tlv_senderid_chassisid_values[] = {
|
|
{ 0, "Reserved"},
|
|
{ CFM_CHASSIS_ID_CHASSIS_COMPONENT, "Chassis component"},
|
|
{ CFM_CHASSIS_ID_INTERFACE_ALIAS, "Interface alias"},
|
|
{ CFM_CHASSIS_ID_PORT_COMPONENT, "Port component"},
|
|
{ CFM_CHASSIS_ID_MAC_ADDRESS, "MAC address"},
|
|
{ CFM_CHASSIS_ID_NETWORK_ADDRESS, "Network address"},
|
|
{ CFM_CHASSIS_ID_INTERFACE_NAME, "Interface name"},
|
|
{ CFM_CHASSIS_ID_LOCAL, "Locally assigned"},
|
|
{ 0, NULL}
|
|
};
|
|
|
|
|
|
static int
|
|
cfm_network_addr_print(netdissect_options *ndo,
|
|
register const u_char *tptr, const u_int length)
|
|
{
|
|
u_int network_addr_type;
|
|
u_int hexdump = FALSE;
|
|
|
|
/*
|
|
* Altough AFIs are tpically 2 octects wide,
|
|
* 802.1ab specifies that this field width
|
|
* is only once octet
|
|
*/
|
|
if (length < 1) {
|
|
ND_PRINT((ndo, "\n\t Network Address Type (invalid, no data"));
|
|
return hexdump;
|
|
}
|
|
/* The calling function must make any due ND_TCHECK calls. */
|
|
network_addr_type = *tptr;
|
|
ND_PRINT((ndo, "\n\t Network Address Type %s (%u)",
|
|
tok2str(af_values, "Unknown", network_addr_type),
|
|
network_addr_type));
|
|
|
|
/*
|
|
* Resolve the passed in Address.
|
|
*/
|
|
switch(network_addr_type) {
|
|
case AFNUM_INET:
|
|
if (length != 1 + 4) {
|
|
ND_PRINT((ndo, "(invalid IPv4 address length %u)", length - 1));
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
ND_PRINT((ndo, ", %s", ipaddr_string(ndo, tptr + 1)));
|
|
break;
|
|
|
|
case AFNUM_INET6:
|
|
if (length != 1 + 16) {
|
|
ND_PRINT((ndo, "(invalid IPv6 address length %u)", length - 1));
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
ND_PRINT((ndo, ", %s", ip6addr_string(ndo, tptr + 1)));
|
|
break;
|
|
|
|
default:
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
|
|
return hexdump;
|
|
}
|
|
|
|
void
|
|
cfm_print(netdissect_options *ndo,
|
|
register const u_char *pptr, register u_int length)
|
|
{
|
|
const struct cfm_common_header_t *cfm_common_header;
|
|
const struct cfm_tlv_header_t *cfm_tlv_header;
|
|
const uint8_t *tptr, *tlv_ptr;
|
|
const uint8_t *namesp;
|
|
u_int names_data_remaining;
|
|
uint8_t md_nameformat, md_namelength;
|
|
const uint8_t *md_name;
|
|
uint8_t ma_nameformat, ma_namelength;
|
|
const uint8_t *ma_name;
|
|
u_int hexdump, tlen, cfm_tlv_len, cfm_tlv_type, ccm_interval;
|
|
|
|
|
|
union {
|
|
const struct cfm_ccm_t *cfm_ccm;
|
|
const struct cfm_lbm_t *cfm_lbm;
|
|
const struct cfm_ltm_t *cfm_ltm;
|
|
const struct cfm_ltr_t *cfm_ltr;
|
|
} msg_ptr;
|
|
|
|
tptr=pptr;
|
|
cfm_common_header = (const struct cfm_common_header_t *)pptr;
|
|
if (length < sizeof(*cfm_common_header))
|
|
goto tooshort;
|
|
ND_TCHECK(*cfm_common_header);
|
|
|
|
/*
|
|
* Sanity checking of the header.
|
|
*/
|
|
if (CFM_EXTRACT_VERSION(cfm_common_header->mdlevel_version) != CFM_VERSION) {
|
|
ND_PRINT((ndo, "CFMv%u not supported, length %u",
|
|
CFM_EXTRACT_VERSION(cfm_common_header->mdlevel_version), length));
|
|
return;
|
|
}
|
|
|
|
ND_PRINT((ndo, "CFMv%u %s, MD Level %u, length %u",
|
|
CFM_EXTRACT_VERSION(cfm_common_header->mdlevel_version),
|
|
tok2str(cfm_opcode_values, "unknown (%u)", cfm_common_header->opcode),
|
|
CFM_EXTRACT_MD_LEVEL(cfm_common_header->mdlevel_version),
|
|
length));
|
|
|
|
/*
|
|
* In non-verbose mode just print the opcode and md-level.
|
|
*/
|
|
if (ndo->ndo_vflag < 1) {
|
|
return;
|
|
}
|
|
|
|
ND_PRINT((ndo, "\n\tFirst TLV offset %u", cfm_common_header->first_tlv_offset));
|
|
|
|
tptr += sizeof(const struct cfm_common_header_t);
|
|
tlen = length - sizeof(struct cfm_common_header_t);
|
|
|
|
/*
|
|
* Sanity check the first TLV offset.
|
|
*/
|
|
if (cfm_common_header->first_tlv_offset > tlen) {
|
|
ND_PRINT((ndo, " (too large, must be <= %u)", tlen));
|
|
return;
|
|
}
|
|
|
|
switch (cfm_common_header->opcode) {
|
|
case CFM_OPCODE_CCM:
|
|
msg_ptr.cfm_ccm = (const struct cfm_ccm_t *)tptr;
|
|
if (cfm_common_header->first_tlv_offset < sizeof(*msg_ptr.cfm_ccm)) {
|
|
ND_PRINT((ndo, " (too small 1, must be >= %lu)",
|
|
(unsigned long) sizeof(*msg_ptr.cfm_ccm)));
|
|
return;
|
|
}
|
|
if (tlen < sizeof(*msg_ptr.cfm_ccm))
|
|
goto tooshort;
|
|
ND_TCHECK(*msg_ptr.cfm_ccm);
|
|
|
|
ccm_interval = CFM_EXTRACT_CCM_INTERVAL(cfm_common_header->flags);
|
|
ND_PRINT((ndo, ", Flags [CCM Interval %u%s]",
|
|
ccm_interval,
|
|
cfm_common_header->flags & CFM_CCM_RDI_FLAG ?
|
|
", RDI" : ""));
|
|
|
|
/*
|
|
* Resolve the CCM interval field.
|
|
*/
|
|
if (ccm_interval) {
|
|
ND_PRINT((ndo, "\n\t CCM Interval %.3fs"
|
|
", min CCM Lifetime %.3fs, max CCM Lifetime %.3fs",
|
|
ccm_interval_base[ccm_interval],
|
|
ccm_interval_base[ccm_interval] * CCM_INTERVAL_MIN_MULTIPLIER,
|
|
ccm_interval_base[ccm_interval] * CCM_INTERVAL_MAX_MULTIPLIER));
|
|
}
|
|
|
|
ND_PRINT((ndo, "\n\t Sequence Number 0x%08x, MA-End-Point-ID 0x%04x",
|
|
EXTRACT_32BITS(msg_ptr.cfm_ccm->sequence),
|
|
EXTRACT_16BITS(msg_ptr.cfm_ccm->ma_epi)));
|
|
|
|
namesp = msg_ptr.cfm_ccm->names;
|
|
names_data_remaining = sizeof(msg_ptr.cfm_ccm->names);
|
|
|
|
/*
|
|
* Resolve the MD fields.
|
|
*/
|
|
md_nameformat = *namesp;
|
|
namesp++;
|
|
names_data_remaining--; /* We know this is != 0 */
|
|
if (md_nameformat != CFM_CCM_MD_FORMAT_NONE) {
|
|
md_namelength = *namesp;
|
|
namesp++;
|
|
names_data_remaining--; /* We know this is !=0 */
|
|
ND_PRINT((ndo, "\n\t MD Name Format %s (%u), MD Name length %u",
|
|
tok2str(cfm_md_nameformat_values, "Unknown",
|
|
md_nameformat),
|
|
md_nameformat,
|
|
md_namelength));
|
|
|
|
/*
|
|
* -3 for the MA short name format and length and one byte
|
|
* of MA short name.
|
|
*/
|
|
if (md_namelength > names_data_remaining - 3) {
|
|
ND_PRINT((ndo, " (too large, must be <= %u)", names_data_remaining - 2));
|
|
return;
|
|
}
|
|
|
|
md_name = namesp;
|
|
ND_PRINT((ndo, "\n\t MD Name: "));
|
|
switch (md_nameformat) {
|
|
case CFM_CCM_MD_FORMAT_DNS:
|
|
case CFM_CCM_MD_FORMAT_CHAR:
|
|
safeputs(ndo, md_name, md_namelength);
|
|
break;
|
|
|
|
case CFM_CCM_MD_FORMAT_MAC:
|
|
if (md_namelength == 6) {
|
|
ND_PRINT((ndo, "\n\t MAC %s", etheraddr_string(ndo,
|
|
md_name)));
|
|
} else {
|
|
ND_PRINT((ndo, "\n\t MAC (length invalid)"));
|
|
}
|
|
break;
|
|
|
|
/* FIXME add printers for those MD formats - hexdump for now */
|
|
case CFM_CCM_MA_FORMAT_8021:
|
|
default:
|
|
print_unknown_data(ndo, md_name, "\n\t ",
|
|
md_namelength);
|
|
}
|
|
namesp += md_namelength;
|
|
names_data_remaining -= md_namelength;
|
|
} else {
|
|
ND_PRINT((ndo, "\n\t MD Name Format %s (%u)",
|
|
tok2str(cfm_md_nameformat_values, "Unknown",
|
|
md_nameformat),
|
|
md_nameformat));
|
|
}
|
|
|
|
|
|
/*
|
|
* Resolve the MA fields.
|
|
*/
|
|
ma_nameformat = *namesp;
|
|
namesp++;
|
|
names_data_remaining--; /* We know this is != 0 */
|
|
ma_namelength = *namesp;
|
|
namesp++;
|
|
names_data_remaining--; /* We know this is != 0 */
|
|
ND_PRINT((ndo, "\n\t MA Name-Format %s (%u), MA name length %u",
|
|
tok2str(cfm_ma_nameformat_values, "Unknown",
|
|
ma_nameformat),
|
|
ma_nameformat,
|
|
ma_namelength));
|
|
|
|
if (ma_namelength > names_data_remaining) {
|
|
ND_PRINT((ndo, " (too large, must be <= %u)", names_data_remaining));
|
|
return;
|
|
}
|
|
|
|
ma_name = namesp;
|
|
ND_PRINT((ndo, "\n\t MA Name: "));
|
|
switch (ma_nameformat) {
|
|
case CFM_CCM_MA_FORMAT_CHAR:
|
|
safeputs(ndo, ma_name, ma_namelength);
|
|
break;
|
|
|
|
/* FIXME add printers for those MA formats - hexdump for now */
|
|
case CFM_CCM_MA_FORMAT_8021:
|
|
case CFM_CCM_MA_FORMAT_VID:
|
|
case CFM_CCM_MA_FORMAT_INT:
|
|
case CFM_CCM_MA_FORMAT_VPN:
|
|
default:
|
|
print_unknown_data(ndo, ma_name, "\n\t ", ma_namelength);
|
|
}
|
|
break;
|
|
|
|
case CFM_OPCODE_LTM:
|
|
msg_ptr.cfm_ltm = (const struct cfm_ltm_t *)tptr;
|
|
if (cfm_common_header->first_tlv_offset < sizeof(*msg_ptr.cfm_ltm)) {
|
|
ND_PRINT((ndo, " (too small 4, must be >= %lu)",
|
|
(unsigned long) sizeof(*msg_ptr.cfm_ltm)));
|
|
return;
|
|
}
|
|
if (tlen < sizeof(*msg_ptr.cfm_ltm))
|
|
goto tooshort;
|
|
ND_TCHECK(*msg_ptr.cfm_ltm);
|
|
|
|
ND_PRINT((ndo, ", Flags [%s]",
|
|
bittok2str(cfm_ltm_flag_values, "none", cfm_common_header->flags)));
|
|
|
|
ND_PRINT((ndo, "\n\t Transaction-ID 0x%08x, ttl %u",
|
|
EXTRACT_32BITS(msg_ptr.cfm_ltm->transaction_id),
|
|
msg_ptr.cfm_ltm->ttl));
|
|
|
|
ND_PRINT((ndo, "\n\t Original-MAC %s, Target-MAC %s",
|
|
etheraddr_string(ndo, msg_ptr.cfm_ltm->original_mac),
|
|
etheraddr_string(ndo, msg_ptr.cfm_ltm->target_mac)));
|
|
break;
|
|
|
|
case CFM_OPCODE_LTR:
|
|
msg_ptr.cfm_ltr = (const struct cfm_ltr_t *)tptr;
|
|
if (cfm_common_header->first_tlv_offset < sizeof(*msg_ptr.cfm_ltr)) {
|
|
ND_PRINT((ndo, " (too small 5, must be >= %lu)",
|
|
(unsigned long) sizeof(*msg_ptr.cfm_ltr)));
|
|
return;
|
|
}
|
|
if (tlen < sizeof(*msg_ptr.cfm_ltr))
|
|
goto tooshort;
|
|
ND_TCHECK(*msg_ptr.cfm_ltr);
|
|
|
|
ND_PRINT((ndo, ", Flags [%s]",
|
|
bittok2str(cfm_ltr_flag_values, "none", cfm_common_header->flags)));
|
|
|
|
ND_PRINT((ndo, "\n\t Transaction-ID 0x%08x, ttl %u",
|
|
EXTRACT_32BITS(msg_ptr.cfm_ltr->transaction_id),
|
|
msg_ptr.cfm_ltr->ttl));
|
|
|
|
ND_PRINT((ndo, "\n\t Replay-Action %s (%u)",
|
|
tok2str(cfm_ltr_replay_action_values,
|
|
"Unknown",
|
|
msg_ptr.cfm_ltr->replay_action),
|
|
msg_ptr.cfm_ltr->replay_action));
|
|
break;
|
|
|
|
/*
|
|
* No message decoder yet.
|
|
* Hexdump everything up until the start of the TLVs
|
|
*/
|
|
case CFM_OPCODE_LBR:
|
|
case CFM_OPCODE_LBM:
|
|
default:
|
|
print_unknown_data(ndo, tptr, "\n\t ",
|
|
tlen - cfm_common_header->first_tlv_offset);
|
|
break;
|
|
}
|
|
|
|
tptr += cfm_common_header->first_tlv_offset;
|
|
tlen -= cfm_common_header->first_tlv_offset;
|
|
|
|
while (tlen > 0) {
|
|
cfm_tlv_header = (const struct cfm_tlv_header_t *)tptr;
|
|
|
|
/* Enough to read the tlv type ? */
|
|
ND_TCHECK2(*tptr, 1);
|
|
cfm_tlv_type=cfm_tlv_header->type;
|
|
|
|
ND_PRINT((ndo, "\n\t%s TLV (0x%02x)",
|
|
tok2str(cfm_tlv_values, "Unknown", cfm_tlv_type),
|
|
cfm_tlv_type));
|
|
|
|
if (cfm_tlv_type == CFM_TLV_END) {
|
|
/* Length is "Not present if the Type field is 0." */
|
|
return;
|
|
}
|
|
|
|
/* do we have the full tlv header ? */
|
|
if (tlen < sizeof(struct cfm_tlv_header_t))
|
|
goto tooshort;
|
|
ND_TCHECK2(*tptr, sizeof(struct cfm_tlv_header_t));
|
|
cfm_tlv_len=EXTRACT_16BITS(&cfm_tlv_header->length);
|
|
|
|
ND_PRINT((ndo, ", length %u", cfm_tlv_len));
|
|
|
|
tptr += sizeof(struct cfm_tlv_header_t);
|
|
tlen -= sizeof(struct cfm_tlv_header_t);
|
|
tlv_ptr = tptr;
|
|
|
|
/* do we have the full tlv ? */
|
|
if (tlen < cfm_tlv_len)
|
|
goto tooshort;
|
|
ND_TCHECK2(*tptr, cfm_tlv_len);
|
|
hexdump = FALSE;
|
|
|
|
switch(cfm_tlv_type) {
|
|
case CFM_TLV_PORT_STATUS:
|
|
if (cfm_tlv_len < 1) {
|
|
ND_PRINT((ndo, " (too short, must be >= 1)"));
|
|
return;
|
|
}
|
|
ND_PRINT((ndo, ", Status: %s (%u)",
|
|
tok2str(cfm_tlv_port_status_values, "Unknown", *tptr),
|
|
*tptr));
|
|
break;
|
|
|
|
case CFM_TLV_INTERFACE_STATUS:
|
|
if (cfm_tlv_len < 1) {
|
|
ND_PRINT((ndo, " (too short, must be >= 1)"));
|
|
return;
|
|
}
|
|
ND_PRINT((ndo, ", Status: %s (%u)",
|
|
tok2str(cfm_tlv_interface_status_values, "Unknown", *tptr),
|
|
*tptr));
|
|
break;
|
|
|
|
case CFM_TLV_PRIVATE:
|
|
if (cfm_tlv_len < 4) {
|
|
ND_PRINT((ndo, " (too short, must be >= 4)"));
|
|
return;
|
|
}
|
|
ND_PRINT((ndo, ", Vendor: %s (%u), Sub-Type %u",
|
|
tok2str(oui_values,"Unknown", EXTRACT_24BITS(tptr)),
|
|
EXTRACT_24BITS(tptr),
|
|
*(tptr + 3)));
|
|
hexdump = TRUE;
|
|
break;
|
|
|
|
case CFM_TLV_SENDER_ID:
|
|
{
|
|
u_int chassis_id_type, chassis_id_length;
|
|
u_int mgmt_addr_length;
|
|
|
|
if (cfm_tlv_len < 1) {
|
|
ND_PRINT((ndo, " (too short, must be >= 1)"));
|
|
goto next_tlv;
|
|
}
|
|
|
|
/*
|
|
* Get the Chassis ID length and check it.
|
|
* IEEE 802.1Q-2014 Section 21.5.3.1
|
|
*/
|
|
chassis_id_length = *tptr;
|
|
tptr++;
|
|
tlen--;
|
|
cfm_tlv_len--;
|
|
|
|
if (chassis_id_length) {
|
|
/*
|
|
* IEEE 802.1Q-2014 Section 21.5.3.2: Chassis ID Subtype, references
|
|
* IEEE 802.1AB-2005 Section 9.5.2.2, subsequently
|
|
* IEEE 802.1AB-2016 Section 8.5.2.2: chassis ID subtype
|
|
*/
|
|
if (cfm_tlv_len < 1) {
|
|
ND_PRINT((ndo, "\n\t (TLV too short)"));
|
|
goto next_tlv;
|
|
}
|
|
chassis_id_type = *tptr;
|
|
cfm_tlv_len--;
|
|
ND_PRINT((ndo, "\n\t Chassis-ID Type %s (%u), Chassis-ID length %u",
|
|
tok2str(cfm_tlv_senderid_chassisid_values,
|
|
"Unknown",
|
|
chassis_id_type),
|
|
chassis_id_type,
|
|
chassis_id_length));
|
|
|
|
if (cfm_tlv_len < chassis_id_length) {
|
|
ND_PRINT((ndo, "\n\t (TLV too short)"));
|
|
goto next_tlv;
|
|
}
|
|
|
|
/* IEEE 802.1Q-2014 Section 21.5.3.3: Chassis ID */
|
|
switch (chassis_id_type) {
|
|
case CFM_CHASSIS_ID_MAC_ADDRESS:
|
|
if (chassis_id_length != ETHER_ADDR_LEN) {
|
|
ND_PRINT((ndo, " (invalid MAC address length)"));
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
ND_PRINT((ndo, "\n\t MAC %s", etheraddr_string(ndo, tptr + 1)));
|
|
break;
|
|
|
|
case CFM_CHASSIS_ID_NETWORK_ADDRESS:
|
|
hexdump |= cfm_network_addr_print(ndo, tptr + 1, chassis_id_length);
|
|
break;
|
|
|
|
case CFM_CHASSIS_ID_INTERFACE_NAME: /* fall through */
|
|
case CFM_CHASSIS_ID_INTERFACE_ALIAS:
|
|
case CFM_CHASSIS_ID_LOCAL:
|
|
case CFM_CHASSIS_ID_CHASSIS_COMPONENT:
|
|
case CFM_CHASSIS_ID_PORT_COMPONENT:
|
|
safeputs(ndo, tptr + 1, chassis_id_length);
|
|
break;
|
|
|
|
default:
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
cfm_tlv_len -= chassis_id_length;
|
|
|
|
tptr += 1 + chassis_id_length;
|
|
tlen -= 1 + chassis_id_length;
|
|
}
|
|
|
|
/*
|
|
* Check if there is a Management Address.
|
|
* IEEE 802.1Q-2014 Section 21.5.3.4: Management Address Domain Length
|
|
* This and all subsequent fields are not present if the TLV length
|
|
* allows only the above fields.
|
|
*/
|
|
if (cfm_tlv_len == 0) {
|
|
/* No, there isn't; we're done. */
|
|
break;
|
|
}
|
|
|
|
/* Here mgmt_addr_length stands for the management domain length. */
|
|
mgmt_addr_length = *tptr;
|
|
tptr++;
|
|
tlen--;
|
|
cfm_tlv_len--;
|
|
ND_PRINT((ndo, "\n\t Management Address Domain Length %u", mgmt_addr_length));
|
|
if (mgmt_addr_length) {
|
|
/* IEEE 802.1Q-2014 Section 21.5.3.5: Management Address Domain */
|
|
if (cfm_tlv_len < mgmt_addr_length) {
|
|
ND_PRINT((ndo, "\n\t (TLV too short)"));
|
|
goto next_tlv;
|
|
}
|
|
cfm_tlv_len -= mgmt_addr_length;
|
|
/*
|
|
* XXX - this is an OID; print it as such.
|
|
*/
|
|
hex_print(ndo, "\n\t Management Address Domain: ", tptr, mgmt_addr_length);
|
|
tptr += mgmt_addr_length;
|
|
tlen -= mgmt_addr_length;
|
|
|
|
/*
|
|
* IEEE 802.1Q-2014 Section 21.5.3.6: Management Address Length
|
|
* This field is present if Management Address Domain Length is not 0.
|
|
*/
|
|
if (cfm_tlv_len < 1) {
|
|
ND_PRINT((ndo, " (Management Address Length is missing)"));
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
|
|
/* Here mgmt_addr_length stands for the management address length. */
|
|
mgmt_addr_length = *tptr;
|
|
tptr++;
|
|
tlen--;
|
|
cfm_tlv_len--;
|
|
ND_PRINT((ndo, "\n\t Management Address Length %u", mgmt_addr_length));
|
|
if (mgmt_addr_length) {
|
|
/* IEEE 802.1Q-2014 Section 21.5.3.7: Management Address */
|
|
if (cfm_tlv_len < mgmt_addr_length) {
|
|
ND_PRINT((ndo, "\n\t (TLV too short)"));
|
|
return;
|
|
}
|
|
cfm_tlv_len -= mgmt_addr_length;
|
|
/*
|
|
* XXX - this is a TransportDomain; print it as such.
|
|
*/
|
|
hex_print(ndo, "\n\t Management Address: ", tptr, mgmt_addr_length);
|
|
tptr += mgmt_addr_length;
|
|
tlen -= mgmt_addr_length;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* FIXME those are the defined TLVs that lack a decoder
|
|
* you are welcome to contribute code ;-)
|
|
*/
|
|
|
|
case CFM_TLV_DATA:
|
|
case CFM_TLV_REPLY_INGRESS:
|
|
case CFM_TLV_REPLY_EGRESS:
|
|
default:
|
|
hexdump = TRUE;
|
|
break;
|
|
}
|
|
/* do we want to see an additional hexdump ? */
|
|
if (hexdump || ndo->ndo_vflag > 1)
|
|
print_unknown_data(ndo, tlv_ptr, "\n\t ", cfm_tlv_len);
|
|
|
|
next_tlv:
|
|
tptr+=cfm_tlv_len;
|
|
tlen-=cfm_tlv_len;
|
|
}
|
|
return;
|
|
|
|
tooshort:
|
|
ND_PRINT((ndo, "\n\t\t packet is too short"));
|
|
return;
|
|
|
|
trunc:
|
|
ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
|
|
}
|