diff options
Diffstat (limited to 'libnet/sample/bgp4_update.c')
-rw-r--r-- | libnet/sample/bgp4_update.c | 337 |
1 files changed, 337 insertions, 0 deletions
diff --git a/libnet/sample/bgp4_update.c b/libnet/sample/bgp4_update.c new file mode 100644 index 0000000..a9bf52b --- /dev/null +++ b/libnet/sample/bgp4_update.c @@ -0,0 +1,337 @@ +/* + * + * libnet 1.1 + * Build a BGP4 update message with what you want as payload + * + * Copyright (c) 2003 Frédéric Raynal <pappy@security-labs.org> + * All rights reserved. + * + * Examples: + * + * empty BGP UPDATE message: + * + * # ./bgp4_update -s 1.1.1.1 -d 2.2.2.2 + * libnet 1.1 packet shaping: BGP4 update + payload[raw] + * Wrote 63 byte TCP packet; check the wire. + * + * 13:44:29.216135 1.1.1.1.26214 > 2.2.2.2.179: S [tcp sum ok] + * 16843009:16843032(23) win 32767: BGP (ttl 64, id 242, len 63) + * 0x0000 4500 003f 00f2 0000 4006 73c2 0101 0101 E..?....@.s..... + * 0x0010 0202 0202 6666 00b3 0101 0101 0202 0202 ....ff.......... + * 0x0020 5002 7fff b288 0000 0101 0101 0101 0101 P............... + * 0x0030 0101 0101 0101 0101 0017 0200 0000 00 ............... + * + * + * BGP UPDATE with Path Attributes and Unfeasible Routes Length + * + * # ./bgp4_update -s 1.1.1.1 -d 2.2.2.2 -a `printf "\x01\x02\x03"` -A 3 -W 13 + * libnet 1.1 packet shaping: BGP4 update + payload[raw] + * Wrote 79 byte TCP packet; check the wire. + * + * 13:45:59.579901 1.1.1.1.26214 > 2.2.2.2.179: S [tcp sum ok] + * 16843009:16843048(39) win 32767: BGP (ttl 64, id 242, len 79) + * 0x0000 4500 004f 00f2 0000 4006 73b2 0101 0101 E..O....@.s..... + * 0x0010 0202 0202 6666 00b3 0101 0101 0202 0202 ....ff.......... + * 0x0020 5002 7fff 199b 0000 0101 0101 0101 0101 P............... + * 0x0030 0101 0101 0101 0101 0027 0200 0d41 4141 .........'...AAA + * 0x0040 4141 4141 4141 4141 4141 0003 0102 03 AAAAAAAAAA..... + * + * + * BGP UPDATE with Reachability Information + * + * # ./bgp4_update -s 1.1.1.1 -d 2.2.2.2 -I 7 + * libnet 1.1 packet shaping: BGP4 update + payload[raw] + * Wrote 70 byte TCP packet; check the wire. + * + * 13:49:02.829225 1.1.1.1.26214 > 2.2.2.2.179: S [tcp sum ok] + * 16843009:16843039(30) win 32767: BGP (ttl 64, id 242, len 70) + * 0x0000 4500 0046 00f2 0000 4006 73bb 0101 0101 E..F....@.s..... + * 0x0010 0202 0202 6666 00b3 0101 0101 0202 0202 ....ff.......... + * 0x0020 5002 7fff e86d 0000 0101 0101 0101 0101 P....m.......... + * 0x0030 0101 0101 0101 0101 001e 0200 0000 0043 ...............C + * 0x0040 4343 4343 4343 CCCCCC + * + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + */ +#if (HAVE_CONFIG_H) +#include "../include/config.h" +#endif +#include "./libnet_test.h" + + +#define set_ptr_and_size(ptr, size, val, flag) \ + if (size && !ptr) \ + { \ + ptr = (u_char *)malloc(size); \ + if (!ptr) \ + { \ + printf("memory allocation failed (%u bytes requested)\n", size); \ + goto bad; \ + } \ + memset(ptr, val, size); \ + flag = 1; \ + } \ + \ + if (ptr && !size) \ + { \ + size = strlen(ptr); \ + } + + + +int +main(int argc, char *argv[]) +{ + int c; + libnet_t *l; + u_long src_ip, dst_ip, length; + libnet_ptag_t t = 0; + char errbuf[LIBNET_ERRBUF_SIZE]; + u_char *payload = NULL; + u_long payload_s = 0; + u_char marker[LIBNET_BGP4_MARKER_SIZE]; + + u_short u_rt_l = 0; + u_char *withdraw_rt = NULL; + char flag_w = 0; + u_short attr_l = 0; + u_char *attr = NULL; + char flag_a = 0; + u_short info_l = 0; + u_char *info = NULL; + char flag_i = 0; + + printf("libnet 1.1 packet shaping: BGP4 update + payload[raw]\n"); + + /* + * Initialize the library. Root priviledges are required. + */ + l = libnet_init( + LIBNET_RAW4, /* injection type */ + NULL, /* network interface */ + errbuf); /* error buffer */ + + if (l == NULL) + { + fprintf(stderr, "libnet_init() failed: %s", errbuf); + exit(EXIT_FAILURE); + } + + src_ip = 0; + dst_ip = 0; + memset(marker, 0x1, LIBNET_BGP4_MARKER_SIZE); + + while ((c = getopt(argc, argv, "d:s:t:m:p:w:W:a:A:i:I:")) != EOF) + { + switch (c) + { + /* + * We expect the input to be of the form `ip.ip.ip.ip.port`. We + * point cp to the last dot of the IP address/port string and + * then seperate them with a NULL byte. The optarg now points to + * just the IP address, and cp points to the port. + */ + case 'd': + if ((dst_ip = libnet_name2addr4(l, optarg, LIBNET_RESOLVE)) == -1) + { + fprintf(stderr, "Bad destination IP address: %s\n", optarg); + exit(EXIT_FAILURE); + } + break; + + case 's': + if ((src_ip = libnet_name2addr4(l, optarg, LIBNET_RESOLVE)) == -1) + { + fprintf(stderr, "Bad source IP address: %s\n", optarg); + exit(EXIT_FAILURE); + } + break; + + case 'p': + payload = optarg; + payload_s = strlen(payload); + break; + + case 'w': + withdraw_rt = optarg; + break; + + case 'W': + u_rt_l = atoi(optarg); + break; + + case 'a': + attr = optarg; + break; + + case 'A': + attr_l = atoi(optarg); + break; + + case 'i': + info = optarg; + break; + + case 'I': + info_l = atoi(optarg); + break; + + default: + exit(EXIT_FAILURE); + } + } + + if (!src_ip || !dst_ip) + { + usage(argv[0]); + goto bad; + } + + set_ptr_and_size(withdraw_rt, u_rt_l, 0x41, flag_w); + set_ptr_and_size(attr, attr_l, 0x42, flag_a); + set_ptr_and_size(info, info_l, 0x43, flag_i); + + /* + * BGP4 update messages are "dynamic" are fields have variable size. The only + * sizes we know are those for the 2 first fields ... so we need to count them + * plus their value. + */ + length = LIBNET_BGP4_UPDATE_H + u_rt_l + attr_l + info_l + payload_s; + t = libnet_build_bgp4_update( + u_rt_l, /* Unfeasible Routes Length */ + withdraw_rt, /* Withdrawn Routes */ + attr_l, /* Total Path Attribute Length */ + attr, /* Path Attributes */ + info_l, /* Network Layer Reachability Information length */ + info, /* Network Layer Reachability Information */ + payload, /* payload */ + payload_s, /* payload size */ + l, /* libnet handle */ + 0); /* libnet id */ + if (t == -1) + { + fprintf(stderr, "Can't build BGP4 update header: %s\n", libnet_geterror(l)); + goto bad; + } + + length+=LIBNET_BGP4_HEADER_H; + t = libnet_build_bgp4_header( + marker, /* marker */ + length, /* length */ + LIBNET_BGP4_UPDATE, /* message type */ + NULL, /* payload */ + 0, /* payload size */ + l, /* libnet handle */ + 0); /* libnet id */ + if (t == -1) + { + fprintf(stderr, "Can't build BGP4 header: %s\n", libnet_geterror(l)); + goto bad; + } + + length+=LIBNET_TCP_H; + t = libnet_build_tcp( + 0x6666, /* source port */ + 179, /* destination port */ + 0x01010101, /* sequence number */ + 0x02020202, /* acknowledgement num */ + TH_SYN, /* control flags */ + 32767, /* window size */ + 0, /* checksum */ + 0, /* urgent pointer */ + length, /* TCP packet size */ + NULL, /* payload */ + 0, /* payload size */ + l, /* libnet handle */ + 0); /* libnet id */ + if (t == -1) + { + fprintf(stderr, "Can't build TCP header: %s\n", libnet_geterror(l)); + goto bad; + } + + length+=LIBNET_IPV4_H; + t = libnet_build_ipv4( + length, /* length */ + 0, /* TOS */ + 242, /* IP ID */ + 0, /* IP Frag */ + 64, /* TTL */ + IPPROTO_TCP, /* protocol */ + 0, /* checksum */ + src_ip, /* source IP */ + dst_ip, /* destination IP */ + NULL, /* payload */ + 0, /* payload size */ + l, /* libnet handle */ + 0); /* libnet id */ + if (t == -1) + { + fprintf(stderr, "Can't build IP header: %s\n", libnet_geterror(l)); + goto bad; + } + + /* + * Write it to the wire. + */ + c = libnet_write(l); + if (c == -1) + { + fprintf(stderr, "Write error: %s\n", libnet_geterror(l)); + goto bad; + } + else + { + fprintf(stderr, "Wrote %d byte TCP packet; check the wire.\n", c); + } + + if (flag_w) free(withdraw_rt); + if (flag_a) free(attr); + if (flag_i) free(info); + + libnet_destroy(l); + return (EXIT_SUCCESS); +bad: + if (flag_w) free(withdraw_rt); + if (flag_a) free(attr); + if (flag_i) free(info); + + libnet_destroy(l); + return (EXIT_FAILURE); +} + +void +usage(char *name) +{ + fprintf(stderr, + "usage: %s -s source_ip -d destination_ip \n" + " [-m marker] [-p payload] [-S payload size]\n" + " [-w Withdrawn Routes] [-W Unfeasible Routes Length]\n" + " [-a Path Attributes] [-A Attribute Length]\n" + " [-i Reachability Information] [-I Reachability Information length]\n", + name); +} + + +/* EOF */ |