2 * Routines for kpasswd packet dissection
7 * Wireshark - Network traffic analyzer
8 * By Gerald Combs <gerald@wireshark.org>
9 * Copyright 1998 Gerald Combs
11 * SPDX-License-Identifier: GPL-2.0-or-later
16 #include <epan/packet.h>
17 #include <epan/asn1.h>
18 #include "packet-tcp.h"
19 #include "packet-kerberos.h"
20 #include <epan/prefs.h>
22 void proto_register_kpasswd(void);
23 void proto_reg_handoff_kpasswd(void);
25 static dissector_handle_t kpasswd_handle_udp
;
26 static dissector_handle_t kpasswd_handle_tcp
;
28 /* Desegment Kerberos over TCP messages */
29 static bool kpasswd_desegment
= true;
31 static int proto_kpasswd
;
32 static int hf_kpasswd_message_len
;
33 static int hf_kpasswd_version
;
34 static int hf_kpasswd_result
;
35 static int hf_kpasswd_result_string
;
36 static int hf_kpasswd_ap_req_len
;
37 static int hf_kpasswd_ap_req_data
;
38 static int hf_kpasswd_krb_priv_message
;
39 static int hf_kpasswd_ChangePasswdData
;
41 static int ett_kpasswd
;
42 static int ett_ap_req_data
;
43 static int ett_krb_priv_message
;
46 #define UDP_PORT_KPASSWD 464
47 #define TCP_PORT_KPASSWD 464
50 static const value_string vers_vals
[] = {
52 { 0xff80, "Request" },
57 /** Dissects AP-REQ or AP-REP part of password change. */
59 dissect_kpasswd_ap_req_data(packet_info
*pinfo _U_
, tvbuff_t
*tvb
, proto_tree
*parent_tree
)
64 it
=proto_tree_add_item(parent_tree
, hf_kpasswd_ap_req_data
, tvb
, 0, -1, ENC_NA
);
65 tree
=proto_item_add_subtree(it
, ett_ap_req_data
);
66 dissect_kerberos_main(tvb
, pinfo
, tree
, false, NULL
);
70 dissect_kpasswd_user_data_request(packet_info
*pinfo
, tvbuff_t
*tvb
, proto_tree
*tree
)
74 asn1_ctx_init(&asn1_ctx
, ASN1_ENC_BER
, true, pinfo
);
76 offset
=dissect_kerberos_ChangePasswdData (false, tvb
, offset
, &asn1_ctx
, tree
, hf_kpasswd_ChangePasswdData
);
80 static kerberos_callbacks cb_req
[] = {
81 { KRB_CBTAG_PRIV_USER_DATA
, dissect_kpasswd_user_data_request
},
85 #define KRB5_KPASSWD_SUCCESS 0
86 #define KRB5_KPASSWD_MALFORMED 1
87 #define KRB5_KPASSWD_HARDERROR 2
88 #define KRB5_KPASSWD_AUTHERROR 3
89 #define KRB5_KPASSWD_SOFTERROR 4
90 #define KRB5_KPASSWD_ACCESSDENIED 5
91 #define KRB5_KPASSWD_BAD_VERSION 6
92 #define KRB5_KPASSWD_INITIAL_FLAG_NEEDED 7
93 static const value_string kpasswd_result_types
[] = {
94 { KRB5_KPASSWD_SUCCESS
, "Success" },
95 { KRB5_KPASSWD_MALFORMED
, "Malformed" },
96 { KRB5_KPASSWD_HARDERROR
, "HardError" },
97 { KRB5_KPASSWD_AUTHERROR
, "AuthError" },
98 { KRB5_KPASSWD_SOFTERROR
, "SoftError" },
99 { KRB5_KPASSWD_ACCESSDENIED
, "AccessDenied" },
100 { KRB5_KPASSWD_BAD_VERSION
, "BadVersion" },
101 { KRB5_KPASSWD_INITIAL_FLAG_NEEDED
, "InitialFlagNeeded" },
106 dissect_kpasswd_user_data_reply(packet_info
*pinfo
, tvbuff_t
*tvb
, proto_tree
*tree
)
112 result
= tvb_get_ntohs(tvb
, offset
);
113 proto_tree_add_uint(tree
, hf_kpasswd_result
, tvb
, offset
, 2, result
);
115 col_add_str(pinfo
->cinfo
, COL_INFO
,
116 val_to_str(result
, kpasswd_result_types
, "Result: %u"));
119 /* optional result string */
120 if(tvb_reported_length_remaining(tvb
, offset
) > 0){
121 proto_tree_add_item(tree
, hf_kpasswd_result_string
, tvb
, offset
, tvb_reported_length_remaining(tvb
, offset
), ENC_ASCII
);
122 offset
= tvb_reported_length(tvb
);
129 static kerberos_callbacks cb_rep
[] = {
130 { KRB_CBTAG_PRIV_USER_DATA
, dissect_kpasswd_user_data_reply
},
135 dissect_kpasswd_krb_priv_message(packet_info
*pinfo _U_
, tvbuff_t
*tvb
, proto_tree
*parent_tree
, bool isrequest
)
138 proto_tree
*tree
=NULL
;
142 it
=proto_tree_add_item(parent_tree
, hf_kpasswd_krb_priv_message
, tvb
, 0, -1, ENC_NA
);
143 tree
=proto_item_add_subtree(it
, ett_krb_priv_message
);
146 offset
= dissect_kerberos_main(tvb
, pinfo
, tree
, false, cb_req
);
148 offset
= dissect_kerberos_main(tvb
, pinfo
, tree
, false, cb_rep
);
151 /* offset is bytes consumed in child tvb given to us */
157 dissect_kpasswd_common(tvbuff_t
*tvb
, packet_info
*pinfo
, proto_tree
*tree
, bool have_rm
)
159 proto_item
*kpasswd_item
=NULL
;
160 proto_tree
*kpasswd_tree
=NULL
;
162 uint16_t message_len
, version
, ap_req_len
;
165 /* TCP record mark and length */
168 int krb_rm_size
= 0; /* bytes consumed by record mark: 0 or 4 */
170 col_set_str(pinfo
->cinfo
, COL_PROTOCOL
, "KPASSWD");
171 col_clear(pinfo
->cinfo
, COL_INFO
);
173 /* can't pass have_rm to dissect_kerberos_main, so strip rm first */
175 krb_rm
= tvb_get_ntohl(tvb
, offset
);
176 krb_reclen
= kerberos_rm_to_reclen(krb_rm
);
179 * What is a reasonable size limit?
181 if (krb_reclen
> 10 * 1024 * 1024) {
184 offset
+= krb_rm_size
;
187 /* it might be a KERBEROS ERROR */
188 if(tvb_get_uint8(tvb
, offset
)==0x7e){
189 /* TCP record mark, if any, not displayed. But hopefully
190 * KRB-ERROR dissection will proceed correctly. */
191 next_tvb
=tvb_new_subset_remaining(tvb
, offset
);
192 return dissect_kerberos_main(next_tvb
, pinfo
, tree
, false, NULL
);
195 message_len
=tvb_get_ntohs(tvb
, offset
);
196 version
=tvb_get_ntohs(tvb
, offset
+2);
197 ap_req_len
=tvb_get_ntohs(tvb
, offset
+4);
199 kpasswd_item
=proto_tree_add_item(tree
, proto_kpasswd
, tvb
, offset
-krb_rm_size
, message_len
+krb_rm_size
, ENC_NA
);
200 kpasswd_tree
=proto_item_add_subtree(kpasswd_item
, ett_kpasswd
);
202 show_krb_recordmark(kpasswd_tree
, tvb
, offset
-krb_rm_size
, krb_rm
);
206 proto_tree_add_uint(kpasswd_tree
, hf_kpasswd_message_len
, tvb
, offset
, 2, message_len
);
207 proto_tree_add_uint(kpasswd_tree
, hf_kpasswd_version
, tvb
, offset
+2, 2, version
);
208 col_set_str(pinfo
->cinfo
, COL_INFO
, val_to_str_const(version
, vers_vals
, "Unknown command"));
209 proto_tree_add_uint(kpasswd_tree
, hf_kpasswd_ap_req_len
, tvb
, offset
+4, 2, ap_req_len
);
212 /* AP-REQ / AP-REP data */
213 next_tvb
=tvb_new_subset_length(tvb
, offset
, ap_req_len
);
214 dissect_kpasswd_ap_req_data(pinfo
, next_tvb
, kpasswd_tree
);
217 /* KRB-PRIV message */
218 next_tvb
=tvb_new_subset_remaining(tvb
, offset
);
219 offset
+= dissect_kpasswd_krb_priv_message(pinfo
, next_tvb
, kpasswd_tree
, (version
==0xff80));
221 proto_item_set_len(kpasswd_item
, offset
);
227 dissect_kpasswd_udp(tvbuff_t
*tvb
, packet_info
*pinfo
, proto_tree
*tree
, void* data _U_
)
229 dissect_kpasswd_common(tvb
, pinfo
, tree
, false);
230 return tvb_captured_length(tvb
);
234 dissect_kpasswd_tcp_pdu(tvbuff_t
*tvb
, packet_info
*pinfo
, proto_tree
*tree
, void* data _U_
)
236 pinfo
->fragmented
= true;
237 if (dissect_kpasswd_common(tvb
, pinfo
, tree
, true) < 0) {
239 * The dissector failed to recognize this as a valid
240 * Kerberos message. Mark it as a continuation packet.
242 col_set_str(pinfo
->cinfo
, COL_INFO
, "Continuation");
244 return tvb_captured_length(tvb
);
248 dissect_kpasswd_tcp(tvbuff_t
*tvb
, packet_info
*pinfo
, proto_tree
*tree
, void* data
)
250 col_set_str(pinfo
->cinfo
, COL_PROTOCOL
, "KPASSWD");
251 col_clear(pinfo
->cinfo
, COL_INFO
);
253 tcp_dissect_pdus(tvb
, pinfo
, tree
, kpasswd_desegment
, 4, get_krb_pdu_len
, dissect_kpasswd_tcp_pdu
, data
);
254 return tvb_captured_length(tvb
);
258 proto_register_kpasswd(void)
260 static hf_register_info hf
[] = {
261 { &hf_kpasswd_message_len
,
262 { "Message Length", "kpasswd.message_len", FT_UINT16
, BASE_DEC
,
263 NULL
, 0, NULL
, HFILL
}},
264 { &hf_kpasswd_ap_req_len
,
265 { "AP_REQ Length", "kpasswd.ap_req_len", FT_UINT16
, BASE_DEC
,
266 NULL
, 0, "Length of AP_REQ data", HFILL
}},
267 { &hf_kpasswd_version
,
268 { "Version", "kpasswd.version", FT_UINT16
, BASE_HEX
,
269 VALS(vers_vals
), 0, NULL
, HFILL
}},
270 { &hf_kpasswd_result
,
271 { "Result", "kpasswd.result", FT_UINT16
, BASE_DEC
,
272 VALS(kpasswd_result_types
), 0, NULL
, HFILL
}},
273 { &hf_kpasswd_result_string
,
274 { "Result String", "kpasswd.result_string", FT_STRING
, BASE_NONE
,
275 NULL
, 0, NULL
, HFILL
}},
276 { &hf_kpasswd_ap_req_data
,
277 { "AP_REQ", "kpasswd.ap_req", FT_NONE
, BASE_NONE
,
278 NULL
, 0, "AP_REQ structure", HFILL
}},
279 { &hf_kpasswd_krb_priv_message
,
280 { "KRB-PRIV", "kpasswd.krb_priv", FT_NONE
, BASE_NONE
,
281 NULL
, 0, "KRB-PRIV message", HFILL
}},
282 { &hf_kpasswd_ChangePasswdData
, {
283 "ChangePasswdData", "kpasswd.ChangePasswdData", FT_NONE
, BASE_NONE
,
284 NULL
, 0, "Change Password Data structure", HFILL
}},
287 static int *ett
[] = {
290 &ett_krb_priv_message
,
292 module_t
*kpasswd_module
;
294 proto_kpasswd
= proto_register_protocol("MS Kpasswd", "Kpasswd", "kpasswd");
295 proto_register_field_array(proto_kpasswd
, hf
, array_length(hf
));
296 proto_register_subtree_array(ett
, array_length(ett
));
298 /* Register preferences */
299 kpasswd_module
= prefs_register_protocol(proto_kpasswd
, NULL
);
300 prefs_register_bool_preference(kpasswd_module
, "desegment",
301 "Reassemble Kpasswd over TCP messages spanning multiple TCP segments",
302 "Whether the Kpasswd dissector should reassemble messages spanning multiple TCP segments."
303 " To use this option, you must also enable \"Allow subdissectors to reassemble TCP streams\" in the TCP protocol settings.",
306 /* Register dissectors */
307 kpasswd_handle_udp
= register_dissector("kpasswd.udp", dissect_kpasswd_udp
, proto_kpasswd
);
308 kpasswd_handle_tcp
= register_dissector("kpasswd.tcp", dissect_kpasswd_tcp
, proto_kpasswd
);
312 proto_reg_handoff_kpasswd(void)
314 dissector_add_uint_with_preference("udp.port", UDP_PORT_KPASSWD
, kpasswd_handle_udp
);
315 dissector_add_uint_with_preference("tcp.port", TCP_PORT_KPASSWD
, kpasswd_handle_tcp
);
319 * Editor modelines - https://www.wireshark.org/tools/modelines.html
324 * indent-tabs-mode: nil
327 * vi: set shiftwidth=4 tabstop=8 expandtab:
328 * :indentSize=4:tabSize=8:noTabs=true: