Ethereal-dev: [Ethereal-dev] [patch] packet-fw1.c FW1 monitor dissector

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: Alfred Koebler <ak@xxxxxxxxxxxx>
Date: Tue, 6 Aug 2002 20:52:03 +0200
Hallo,


here is the actual patch with additional comments.



To patch:
  cd <path with ethereal-0.9.5 directory>
  patch -p0 < ethereal-0.9.5-fw1.patch
  ./configure && make && make install

To start ethereal with interpretation of FW1 monitor file:
  ethereal -o eth.eth_interpret_as_fw_monitor:TRUE -r FILE
 
  or in ~/.ethereal/preferences




diff -Naur ethereal-0.9.5/packet-fw1.c ethereal-0.9.5-fw1/packet-fw1.c
--- ethereal-0.9.5/packet-fw1.c	Tue Jul 23 20:00:51 2002
+++ ethereal-0.9.5-fw1/packet-fw1.c	Tue Jul 23 18:53:12 2002
@@ -0,0 +1,252 @@
+/* packet-fw1.c
+ * Routines for Ethernet header disassembly of FW1 "monitor" files
+ * Copyright 2002, Alfred Koebler <ak@xxxxxxxxxxxx>
+ *
+ * $Id: README.developer,v 1.49 2002/03/02 07:56:16 guy Exp $
+ *
+ * Ethereal - Network traffic analyzer
+ * By Alfred Koebler <ak@xxxxxxxxxxxx>
+ * Copyright 2002 I.Consult
+ * 
+ * To use this dissector use the command line option
+ * -o eth.eth_interpret_as_fw1_monitor:TRUE
+ *
+ * At the moment the way with the option is the best one.
+ * A automatic way is not possible, because the file format isn't different
+ * to the snoop file.
+ *
+ * With "fw monitor" it is possible to collect packets on several places.
+ * The additional information:
+ * - is it a incoming or outgoing packet
+ * - is it before or after the firewall
+ *   i  incoming before the firewall
+ *   I  incoming after the firewall
+ *   o  outcoming before the firewall
+ *   O  outcoming after the firewall
+ * - the name of the interface
+ *
+ * What's the problem ?
+ * Think about one packet traveling across the firewall.
+ * With ethereal you will see 4 lines in the Top Pane.
+ * To analyze a problem it is helpful to see the additional information
+ * in the protocol tree of the Middle Pane.
+ *
+ * The presentation of the summary line is designed in the following way:
+ * Every time the next selected packet in the Top Pane includes a
+ * "new" interface name the name is added to the list in the summary line.
+ * The interface names are listed one after the other.
+ * The position of the interface names didn't change.
+ *
+ * And who are the 4 places represented ?
+ * The interface name represents the firewall module of the interface.
+ * On the left side of the interface name is the interface module.
+ * On the right side of the interface name is the "IP" module.
+ *
+ * Example for a ping from the firewall to another host:
+ * For the four lines in the Top Pane you will see the according lines
+ * in the Middle Pane:
+ *   El90x1 o
+ * O El90x1 
+ * i El90x1 
+ *   El90x1 I
+ *
+ * Example for a packet traversing through the Firewall, first through
+ * the inner side firewall module then through the outer side firewall module:
+ * i  El90x1        El90x2
+ *    El90x1 I      El90x2
+ *    El90x1      o E190x2
+ *    El90x1        E190x2 O
+ *
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ * 
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ * 
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
+ */
+
+#ifdef HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <string.h>
+
+#ifdef HAVE_SYS_TYPES_H
+# include <sys/types.h>
+#endif
+
+#ifdef HAVE_NETINET_IN_H
+# include <netinet/in.h>
+#endif
+
+#include <glib.h>
+#include <epan/packet.h>
+#include "prefs.h"
+#include "packet-fw1.h"
+#include "packet-eth.h"
+#include "etypes.h"
+
+/* Place FW1 summary in proto tree */
+static gboolean fw1_summary_in_tree = TRUE;
+
+/* Initialize the protocol and registered fields */
+static int proto_fw1 = -1;
+static int hf_fw1_direction = -1;
+static int hf_fw1_interface = -1;
+static int hf_fw1_type = -1;
+static int hf_fw1_trailer = -1;
+
+/* Initialize the subtree pointers */
+static gint ett_fw1 = -1;
+
+#define ETH_HEADER_SIZE	14
+
+static dissector_handle_t eth_handle;
+
+void
+capture_fw1(const u_char *pd, int offset, int len, packet_counts *ld)
+{
+
+  if (!BYTES_ARE_IN_FRAME(offset, len, ETH_HEADER_SIZE)) {
+    ld->other++;
+    return;
+  }
+
+  capture_eth(pd, offset, len, ld);
+}
+
+void
+dissect_fw1(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
+{
+  /* Set up structures needed to add the protocol subtree and manage it */
+  proto_item    *ti; 
+  proto_tree    *volatile fh_tree = NULL;
+  char		direction[3];
+  char		interface[20];
+  guint16	etype;
+  char		header[1000];
+  char		*p_header;
+  int		i;
+  int		found;
+
+  #define	MAX_INTERFACES	20
+  static char	*p_interfaces[MAX_INTERFACES];
+  static int	interface_anzahl=0;
+
+  /* Make entries in Protocol column and Info column on summary display */
+  if (check_col(pinfo->cinfo, COL_PROTOCOL))
+    col_set_str(pinfo->cinfo, COL_PROTOCOL, "FW1");
+  if (check_col(pinfo->cinfo, COL_INFO))
+    col_clear(pinfo->cinfo, COL_INFO);
+
+  etype = tvb_get_ntohs(tvb, 12);
+
+  if (tree) {
+    sprintf(header, "FW1 Monitor");
+
+    /* fetch info to local variable */
+    direction[0] = tvb_get_guint8(tvb, 0);
+    direction[1] = 0;
+    tvb_get_nstringz0(tvb, 2, 10, interface);
+
+    if (fw1_summary_in_tree) {
+      /* Known interface name - if not, remember it */
+      found=1;
+      for (i=0; i<interface_anzahl && i<MAX_INTERFACES; i++) {
+        if ( strcmp(p_interfaces[i], interface) == 0 ) {
+          found=0;
+        }
+      }
+      if (found == 1 ) {
+        p_interfaces[interface_anzahl] = strdup(interface);
+        interface_anzahl++;
+      }
+      /* display all interfaces always in the same order */
+      for (i=0; i<interface_anzahl; i++) {
+        found=1;
+        if ( strcmp(p_interfaces[i], interface) == 0 ) {
+          found=0;
+        }
+        p_header = header + strlen(header);
+        sprintf(p_header, "  %c %s %c",
+  	  found==0 ? (direction[0]=='i' ? 'i' : (direction[0]=='O' ? 'O' : ' ')) : ' ',
+	  p_interfaces[i],
+	  found==0 ? (direction[0]=='I' ? 'I' : (direction[0]=='o' ? 'o' : ' ')) : ' '
+	  );
+      }
+    } else {
+      /* without FW1 summary delete all remembered names of interfaces */
+      for (i=0; i<interface_anzahl && i<MAX_INTERFACES; i++) {
+        free(p_interfaces[i]);
+      }
+      interface_anzahl = 0;
+    }
+
+    ti = proto_tree_add_protocol_format(tree, proto_fw1, tvb, 0, ETH_HEADER_SIZE, header);
+ 
+    /* create display subtree for the protocol */
+    fh_tree = proto_item_add_subtree(ti, ett_fw1);
+
+    proto_tree_add_item(fh_tree, hf_fw1_direction, tvb, 0, 1, FALSE);
+
+    proto_tree_add_string_format(fh_tree, hf_fw1_interface,
+	tvb, 2, 10,
+	interface, "Interface: %s", interface);
+  }
+  ethertype(etype, tvb, ETH_HEADER_SIZE, pinfo, tree, fh_tree, hf_fw1_type,
+          hf_fw1_trailer);
+}
+    
+void
+proto_register_fw1(void)
+{
+  static hf_register_info hf[] = {
+	{ &hf_fw1_direction,
+	{ "Direction",	"fw1.direction", FT_STRING, BASE_NONE, NULL, 0x0,
+		"Direction", HFILL }},
+	{ &hf_fw1_interface,
+	{ "Interface",	"fw1.interface", FT_STRING, BASE_NONE, NULL, 0x0,
+		"Interface", HFILL }},
+		/* registered here but handled in ethertype.c */
+	{ &hf_fw1_type,
+	{ "Type",		"fw1.type", FT_UINT16, BASE_HEX, VALS(etype_vals), 0x0,
+		"", HFILL }},
+  };
+  /* Setup protocol subtree array */
+  static gint *ett[] = {
+	&ett_fw1,
+  };
+  module_t *fw1_module;
+
+  /* Register the protocol name and description */
+  proto_fw1 = proto_register_protocol("Checkpoint FW-1", "FW-1", "fw1");
+  /* Required function calls to register the header fields and subtrees used */
+  proto_register_field_array(proto_fw1, hf, array_length(hf));
+  proto_register_subtree_array(ett, array_length(ett));
+
+  /* Register configuration preferences */
+  fw1_module = prefs_register_protocol(proto_fw1, NULL);
+  prefs_register_bool_preference(fw1_module, "fw1_summary_in_tree",
+            "Show FW1 summary in protocol tree",
+"Whether the FW1 summary line should be shown in the protocol tree",
+            &fw1_summary_in_tree);
+
+  register_dissector("fw1", dissect_fw1, proto_fw1);
+}
+
+void
+proto_reg_handoff_fw1(void)
+{
+  /*
+   * Get handles for the Ethernet dissectors.
+   */
+  eth_handle = find_dissector("eth");
+}
diff -Naur ethereal-0.9.5/packet-fw1.h ethereal-0.9.5-fw1/packet-fw1.h
--- ethereal-0.9.5/packet-fw1.h	Tue Jul 23 20:00:56 2002
+++ ethereal-0.9.5-fw1/packet-fw1.h	Wed Jul  3 11:49:47 2002
@@ -0,0 +1,29 @@
+/* packet-fw1.h
+ *
+ * Ethereal - Network traffic analyzer
+ * By Gerald Combs <gerald@xxxxxxxxxxxx>
+ * Copyright 1998 Gerald Combs
+ * 
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ * 
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ * 
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
+ */
+
+#ifndef __PACKET_FW1_H__
+#define __PACKET_FW1_H__
+
+void capture_fw1(const u_char *, int, int, packet_counts *);
+
+void dissect_fw1(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree);
+
+#endif
diff -Naur ethereal-0.9.5/packet-eth.c ethereal-0.9.5-fw1/packet-eth.c
--- ethereal-0.9.5/packet-eth.c	Sat May 11 18:23:28 2002
+++ ethereal-0.9.5-fw1/packet-eth.c	Wed Jul  3 11:49:47 2002
@@ -32,6 +32,7 @@
 
 #include <glib.h>
 #include <epan/packet.h>
+#include "prefs.h"
 #include "etypes.h"
 #include <epan/resolv.h>
 #include "packet-eth.h"
@@ -39,6 +40,10 @@
 #include "packet-ipx.h"
 #include "packet-isl.h"
 #include "packet-llc.h"
+#include "packet-fw1.h"
+
+/* Interpret capture file as FW1 monitor file */
+static gboolean eth_interpret_as_fw1_monitor = FALSE;
 
 /* protocols and header fields */
 static int proto_eth = -1;
@@ -53,6 +58,7 @@
 static gint ett_ether2 = -1;
 
 static dissector_handle_t isl_handle;
+static dissector_handle_t fw1_handle;
 
 #define ETH_HEADER_SIZE	14
 
@@ -212,6 +218,11 @@
     dissect_802_3(etype, is_802_2, tvb, ETH_HEADER_SIZE, pinfo, tree, fh_tree,
 		  hf_eth_len, hf_eth_trailer);
   } else {
+    if ( eth_interpret_as_fw1_monitor ) {
+      call_dissector(fw1_handle, tvb, pinfo, tree);
+      return;
+    }
+
     if (check_col(pinfo->cinfo, COL_INFO))
       col_set_str(pinfo->cinfo, COL_INFO, "Ethernet II");
     if (tree) {
@@ -266,11 +277,19 @@
 		&ett_ieee8023,
 		&ett_ether2,
 	};
+	module_t *eth_module;
 
 	proto_eth = proto_register_protocol("Ethernet", "Ethernet", "eth");
 	proto_register_field_array(proto_eth, hf, array_length(hf));
 	proto_register_subtree_array(ett, array_length(ett));
 
+	/* Register configuration preferences */
+	eth_module = prefs_register_protocol(proto_eth, NULL);
+	prefs_register_bool_preference(eth_module, "eth_interpret_as_fw1_monitor",
+            "Interpret as FW1 monitor file",
+"Whether the capture file should be interpreted as FW1 monitor file",
+            &eth_interpret_as_fw1_monitor);
+
 	register_dissector("eth", dissect_eth, proto_eth);
 }
 
@@ -283,6 +302,7 @@
 	 * Get a handle for the ISL dissector.
 	 */
 	isl_handle = find_dissector("isl");
+	fw1_handle = find_dissector("fw1");
 
 	eth_handle = find_dissector("eth");
 	dissector_add("wtap_encap", WTAP_ENCAP_ETHERNET, eth_handle);
diff -Naur ethereal-0.9.5/Makefile.am ethereal-0.9.5-fw1/Makefile.am
--- ethereal-0.9.5/Makefile.am	Sat Jun 29 02:30:29 2002
+++ ethereal-0.9.5-fw1/Makefile.am	Wed Jul  3 11:49:47 2002
@@ -150,6 +150,7 @@
 	packet-fr.c    \
 	packet-frame.c  \
 	packet-ftp.c   \
+	packet-fw1.c   \
 	packet-giop.c  \
 	packet-gmrp.c \
 	packet-gnutella.c \
@@ -404,6 +405,7 @@
 	packet-eth.h   \
 	packet-fddi.h  \
 	packet-frame.h  \
+	packet-fw1.h  \
 	packet-giop.h  \
 	packet-gnutella.h \
 	packet-hclnfsd.h  \
diff -Naur ethereal-0.9.5/Makefile.nmake ethereal-0.9.5-fw1/Makefile.nmake
--- ethereal-0.9.5/Makefile.nmake	Sat Jun 29 00:23:53 2002
+++ ethereal-0.9.5-fw1/Makefile.nmake	Wed Jul  3 11:49:47 2002
@@ -91,6 +91,7 @@
 	packet-fr.c    \
 	packet-frame.c  \
 	packet-ftp.c   \
+	packet-fw1.c   \
 	packet-giop.c  \
 	packet-gmrp.c \
 	packet-gnutella.c \
 


Greetings

Alfred Koebler
 
---
I.CONSULT Beratungsgesellschaft mbH                 web:  www.icon-sult.de
Dipl. Ing. Alfred Koebler                         email:   ak@xxxxxxxxxxxx
CCSA/CCSE-2000, CCSA/CCSE-NG, CCSI, CSGE/CSGA, ACA
Breitwiesenstr. 6                                   Fon: +49 711 787808-13
70565 Stuttgart                                     Fax: +49 711 787808-11

PGP Fingerprint = 0C15 BB1B 7E87 19F6 EDCC  539D AB04 BEB7 3409 9A09
Publickey:  http://www.pca.dfn.de/dfnpca/pgpkserv/  - KeyID: ak@xxxxxxxxxxxx 

X509/Certificate Fingerprint = 5E:2C:CF:46:91:96:0D:BD:B0:52:8C:E2:BE:3B:D7:60