123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185 |
- #ifdef HAVE_CONFIG_H
- #include "config.h"
- #endif
- #ifndef HAVE_NET_PFVAR_H
- #error "No pf headers available"
- #endif
- #include <sys/types.h>
- #include <sys/socket.h>
- #include <net/if.h>
- #include <net/pfvar.h>
- #include <net/if_pflog.h>
- #include <netdissect-stdinc.h>
- #include "netdissect.h"
- #include "extract.h"
- static const char tstr[] = "[|pflog]";
- static const struct tok pf_reasons[] = {
- { 0, "0(match)" },
- { 1, "1(bad-offset)" },
- { 2, "2(fragment)" },
- { 3, "3(short)" },
- { 4, "4(normalize)" },
- { 5, "5(memory)" },
- { 6, "6(bad-timestamp)" },
- { 7, "7(congestion)" },
- { 8, "8(ip-option)" },
- { 9, "9(proto-cksum)" },
- { 10, "10(state-mismatch)" },
- { 11, "11(state-insert)" },
- { 12, "12(state-limit)" },
- { 13, "13(src-limit)" },
- { 14, "14(synproxy)" },
- { 0, NULL }
- };
- static const struct tok pf_actions[] = {
- { PF_PASS, "pass" },
- { PF_DROP, "block" },
- { PF_SCRUB, "scrub" },
- { PF_NAT, "nat" },
- { PF_NONAT, "nat" },
- { PF_BINAT, "binat" },
- { PF_NOBINAT, "binat" },
- { PF_RDR, "rdr" },
- { PF_NORDR, "rdr" },
- { PF_SYNPROXY_DROP, "synproxy-drop" },
- { 0, NULL }
- };
- static const struct tok pf_directions[] = {
- { PF_INOUT, "in/out" },
- { PF_IN, "in" },
- { PF_OUT, "out" },
- { 0, NULL }
- };
- #define OPENBSD_AF_INET 2
- #define OPENBSD_AF_INET6 24
- static void
- pflog_print(netdissect_options *ndo, const struct pfloghdr *hdr)
- {
- uint32_t rulenr, subrulenr;
- rulenr = EXTRACT_32BITS(&hdr->rulenr);
- subrulenr = EXTRACT_32BITS(&hdr->subrulenr);
- if (subrulenr == (uint32_t)-1)
- ND_PRINT((ndo, "rule %u/", rulenr));
- else
- ND_PRINT((ndo, "rule %u.%s.%u/", rulenr, hdr->ruleset, subrulenr));
- ND_PRINT((ndo, "%s: %s %s on %s: ",
- tok2str(pf_reasons, "unkn(%u)", hdr->reason),
- tok2str(pf_actions, "unkn(%u)", hdr->action),
- tok2str(pf_directions, "unkn(%u)", hdr->dir),
- hdr->ifname));
- }
- u_int
- pflog_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h,
- register const u_char *p)
- {
- u_int length = h->len;
- u_int hdrlen;
- u_int caplen = h->caplen;
- const struct pfloghdr *hdr;
- uint8_t af;
-
- if (caplen < sizeof(uint8_t)) {
- ND_PRINT((ndo, "%s", tstr));
- return (caplen);
- }
- #define MIN_PFLOG_HDRLEN 45
- hdr = (const struct pfloghdr *)p;
- if (hdr->length < MIN_PFLOG_HDRLEN) {
- ND_PRINT((ndo, "[pflog: invalid header length!]"));
- return (hdr->length);
- }
- hdrlen = BPF_WORDALIGN(hdr->length);
- if (caplen < hdrlen) {
- ND_PRINT((ndo, "%s", tstr));
- return (hdrlen);
- }
-
- ND_TCHECK(*hdr);
- if (ndo->ndo_eflag)
- pflog_print(ndo, hdr);
-
- af = hdr->af;
- length -= hdrlen;
- caplen -= hdrlen;
- p += hdrlen;
- switch (af) {
- case AF_INET:
- #if OPENBSD_AF_INET != AF_INET
- case OPENBSD_AF_INET:
- #endif
- ip_print(ndo, p, length);
- break;
- #if defined(AF_INET6) || defined(OPENBSD_AF_INET6)
- #ifdef AF_INET6
- case AF_INET6:
- #endif
- #if !defined(AF_INET6) || OPENBSD_AF_INET6 != AF_INET6
- case OPENBSD_AF_INET6:
- #endif
- ip6_print(ndo, p, length);
- break;
- #endif
- default:
-
- if (!ndo->ndo_eflag)
- pflog_print(ndo, hdr);
- if (!ndo->ndo_suppress_default_print)
- ND_DEFAULTPRINT(p, caplen);
- }
- return (hdrlen);
- trunc:
- ND_PRINT((ndo, "%s", tstr));
- return (hdrlen);
- }
|