2 * Copyright (C) 1999 WIDE Project.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 static const char rcsid
[] =
36 "@(#) $Header: /tcpdump/master/tcpdump/print-bgp.c,v 1.32 2002-07-03 19:47:53 hannes Exp $";
39 #include <sys/param.h>
41 #include <sys/types.h>
42 #include <sys/socket.h>
44 #include <netinet/in.h>
51 #include "interface.h"
52 #include "addrtoname.h"
56 u_int8_t bgp_marker
[16];
60 #define BGP_SIZE 19 /* unaligned */
64 #define BGP_NOTIFICATION 3
65 #define BGP_KEEPALIVE 4
68 u_int8_t bgpo_marker
[16];
71 u_int8_t bgpo_version
;
73 u_int16_t bgpo_holdtime
;
76 /* options should follow */
78 #define BGP_OPEN_SIZE 29 /* unaligned */
85 #define BGP_OPT_SIZE 2 /* some compilers may pad to 4 bytes */
87 struct bgp_notification
{
88 u_int8_t bgpn_marker
[16];
93 /* data should follow */
95 #define BGP_NOTIFICATION_SIZE 21 /* unaligned */
104 #define bgp_attr_len(p) \
105 (((p)->bgpa_flags & 0x10) ? \
106 ntohs((p)->bgpa_len.elen) : (p)->bgpa_len.len)
107 #define bgp_attr_off(p) \
108 (((p)->bgpa_flags & 0x10) ? 4 : 3)
111 #define BGPTYPE_ORIGIN 1
112 #define BGPTYPE_AS_PATH 2
113 #define BGPTYPE_NEXT_HOP 3
114 #define BGPTYPE_MULTI_EXIT_DISC 4
115 #define BGPTYPE_LOCAL_PREF 5
116 #define BGPTYPE_ATOMIC_AGGREGATE 6
117 #define BGPTYPE_AGGREGATOR 7
118 #define BGPTYPE_COMMUNITIES 8 /* RFC1997 */
119 #define BGPTYPE_ORIGINATOR_ID 9 /* RFC1998 */
120 #define BGPTYPE_CLUSTER_LIST 10 /* RFC1998 */
121 #define BGPTYPE_DPA 11 /* work in progress */
122 #define BGPTYPE_ADVERTISERS 12 /* RFC1863 */
123 #define BGPTYPE_RCID_PATH 13 /* RFC1863 */
124 #define BGPTYPE_MP_REACH_NLRI 14 /* RFC2283 */
125 #define BGPTYPE_MP_UNREACH_NLRI 15 /* RFC2283 */
128 static const char *bgptype
[] = {
129 NULL
, "OPEN", "UPDATE", "NOTIFICATION", "KEEPALIVE",
131 #define bgp_type(x) num_or_str(bgptype, sizeof(bgptype)/sizeof(bgptype[0]), (x))
133 static const char *bgpopt_type
[] = {
134 NULL
, "Authentication Information", "Capabilities Advertisement",
136 #define bgp_opttype(x) \
137 num_or_str(bgpopt_type, sizeof(bgpopt_type)/sizeof(bgpopt_type[0]), (x))
139 static const char *bgpnotify_major
[] = {
140 NULL
, "Message Header Error",
141 "OPEN Message Error", "UPDATE Message Error",
142 "Hold Timer Expired", "Finite State Machine Error",
145 #define bgp_notify_major(x) \
146 num_or_str(bgpnotify_major, \
147 sizeof(bgpnotify_major)/sizeof(bgpnotify_major[0]), (x))
149 static const char *bgpnotify_minor_1
[] = {
150 NULL
, "Connection Not Synchronized",
151 "Bad Message Length", "Bad Message Type",
154 static const char *bgpnotify_minor_2
[] = {
155 NULL
, "Unsupported Version Number",
156 "Bad Peer AS", "Bad BGP Identifier",
157 "Unsupported Optional Parameter", "Authentication Failure",
158 "Unacceptable Hold Time",
161 static const char *bgpnotify_minor_3
[] = {
162 NULL
, "Malformed Attribute List",
163 "Unrecognized Well-known Attribute", "Missing Well-known Attribute",
164 "Attribute Flags Error", "Attribute Length Error",
165 "Invalid ORIGIN Attribute", "AS Routing Loop",
166 "Invalid NEXT_HOP Attribute", "Optional Attribute Error",
167 "Invalid Network Field", "Malformed AS_PATH",
170 static const char **bgpnotify_minor
[] = {
171 NULL
, bgpnotify_minor_1
, bgpnotify_minor_2
, bgpnotify_minor_3
,
173 static const int bgpnotify_minor_siz
[] = {
174 0, sizeof(bgpnotify_minor_1
)/sizeof(bgpnotify_minor_1
[0]),
175 sizeof(bgpnotify_minor_2
)/sizeof(bgpnotify_minor_2
[0]),
176 sizeof(bgpnotify_minor_3
)/sizeof(bgpnotify_minor_3
[0]),
179 static const char *bgpattr_origin
[] = {
180 "IGP", "EGP", "INCOMPLETE",
182 #define bgp_attr_origin(x) \
183 num_or_str(bgpattr_origin, \
184 sizeof(bgpattr_origin)/sizeof(bgpattr_origin[0]), (x))
186 static const char *bgpattr_type
[] = {
187 NULL
, "ORIGIN", "AS_PATH", "NEXT_HOP",
188 "MULTI_EXIT_DISC", "LOCAL_PREF", "ATOMIC_AGGREGATE", "AGGREGATOR",
189 "COMMUNITIES", "ORIGINATOR_ID", "CLUSTER_LIST", "DPA",
190 "ADVERTISERS", "RCID_PATH", "MP_REACH_NLRI", "MP_UNREACH_NLRI",
192 #define bgp_attr_type(x) \
193 num_or_str(bgpattr_type, \
194 sizeof(bgpattr_type)/sizeof(bgpattr_type[0]), (x))
196 /* Subsequent address family identifier, RFC2283 section 7 */
198 #define SAFNUM_UNICAST 1
199 #define SAFNUM_MULTICAST 2
200 #define SAFNUM_UNIMULTICAST 3
201 /* labeled BGP RFC3107 */
202 #define SAFNUM_LABUNICAST 4
203 /* Section 4.3.4 of draft-rosen-rfc2547bis-03.txt */
204 #define SAFNUM_VPNUNICAST 128
205 #define SAFNUM_VPNMULTICAST 129
206 #define SAFNUM_VPNUNIMULTICAST 130
208 static struct tok bgp_safi_values
[] = {
209 { SAFNUM_RES
, "Reserved"},
210 { SAFNUM_UNICAST
, "Unicast"},
211 { SAFNUM_MULTICAST
, "Multicast"},
212 { SAFNUM_UNIMULTICAST
, "Unicast+Multicast"},
213 { SAFNUM_LABUNICAST
, "labeled Unicast"},
214 { SAFNUM_VPNUNICAST
, "labeled VPN Unicast"},
215 { SAFNUM_VPNMULTICAST
, "labeled VPN Multicast"},
216 { SAFNUM_VPNUNIMULTICAST
, "labeled VPN Unicast+Multicast"},
220 /* well-known community */
221 #define BGP_COMMUNITY_NO_EXPORT 0xffffff01
222 #define BGP_COMMUNITY_NO_ADVERT 0xffffff02
223 #define BGP_COMMUNITY_NO_EXPORT_SUBCONFED 0xffffff03
225 /* RFC1700 address family numbers */
227 #define AFNUM_INET6 2
230 #define AFNUM_BBN1822 5
235 #define AFNUM_X121 10
237 #define AFNUM_ATALK 12
238 #define AFNUM_DECNET 13
239 #define AFNUM_BANYAN 14
240 #define AFNUM_E164NSAP 15
241 /* draft-kompella-ppvpn-l2vpn */
242 #define AFNUM_L2VPN 196 /* still to be approved by IANA */
244 static struct tok bgp_afi_values
[] = {
246 { AFNUM_INET
, "IPv4"},
247 { AFNUM_INET6
, "IPv6"},
248 { AFNUM_NSAP
, "NSAP"},
249 { AFNUM_HDLC
, "HDLC"},
250 { AFNUM_BBN1822
, "BBN 1822"},
252 { AFNUM_E163
, "E.163"},
253 { AFNUM_E164
, "E.164"},
254 { AFNUM_F69
, "F.69"},
255 { AFNUM_X121
, "X.121"},
256 { AFNUM_IPX
, "Novell IPX"},
257 { AFNUM_ATALK
, "Appletalk"},
258 { AFNUM_DECNET
, "Decnet IV"},
259 { AFNUM_BANYAN
, "Banyan Vines"},
260 { AFNUM_E164NSAP
, "E.164 with NSAP subaddress"},
261 { AFNUM_L2VPN
, "Layer-2 VPN"},
266 num_or_str(const char **table
, size_t siz
, int value
)
269 if (value
< 0 || siz
<= value
|| table
[value
] == NULL
) {
270 snprintf(buf
, sizeof(buf
), "#%d", value
);
277 bgp_notify_minor(int major
, int minor
)
279 static const char **table
;
285 && major
< sizeof(bgpnotify_minor
)/sizeof(bgpnotify_minor
[0])
286 && bgpnotify_minor
[major
]) {
287 table
= bgpnotify_minor
[major
];
288 siz
= bgpnotify_minor_siz
[major
];
289 if (0 <= minor
&& minor
< siz
&& table
[minor
])
296 snprintf(buf
, sizeof(buf
), "#%d", minor
);
303 decode_prefix4(const u_char
*pd
, char *buf
, u_int buflen
)
309 if (plen
< 0 || 32 < plen
)
312 memset(&addr
, 0, sizeof(addr
));
313 memcpy(&addr
, &pd
[1], (plen
+ 7) / 8);
315 ((u_char
*)&addr
)[(plen
+ 7) / 8 - 1] &=
316 ((0xff00 >> (plen
% 8)) & 0xff);
318 snprintf(buf
, buflen
, "%s/%d", getname((u_char
*)&addr
), plen
);
319 return 1 + (plen
+ 7) / 8;
323 decode_labeled_prefix4(const u_char
*pd
, char *buf
, u_int buflen
)
328 plen
= pd
[0]; /* get prefix length */
330 /* this is one of the weirdnesses of rfc3107
331 the label length (actually the label + COS bits)
332 is added of the prefix length;
333 we also do only read out just one label -
334 there is no real application for advertisment of
335 stacked labels in a a single BGP message
338 plen
-=24; /* adjust prefixlen - labellength */
340 if (plen
< 0 || 32 < plen
)
343 memset(&addr
, 0, sizeof(addr
));
344 memcpy(&addr
, &pd
[4], (plen
+ 7) / 8);
346 ((u_char
*)&addr
)[(plen
+ 7) / 8 - 1] &=
347 ((0xff00 >> (plen
% 8)) & 0xff);
349 /* the label may get offsetted by 4 bits so lets shift it right */
350 snprintf(buf
, buflen
, "%s/%d label:%u %s",
351 getname((u_char
*)&addr
),
353 EXTRACT_24BITS(pd
+1)>>4,
354 ((pd
[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
356 return 4 + (plen
+ 7) / 8;
361 decode_prefix6(const u_char
*pd
, char *buf
, u_int buflen
)
363 struct in6_addr addr
;
367 if (plen
< 0 || 128 < plen
)
370 memset(&addr
, 0, sizeof(addr
));
371 memcpy(&addr
, &pd
[1], (plen
+ 7) / 8);
373 addr
.s6_addr
[(plen
+ 7) / 8 - 1] &=
374 ((0xff00 >> (plen
% 8)) & 0xff);
376 snprintf(buf
, buflen
, "%s/%d", getname6((u_char
*)&addr
), plen
);
377 return 1 + (plen
+ 7) / 8;
382 bgp_attr_print(const struct bgp_attr
*attr
, const u_char
*dat
, int len
)
390 char buf
[MAXHOSTNAMELEN
+ 100];
394 switch (attr
->bgpa_type
) {
397 printf(" invalid len");
399 printf(" %s", bgp_attr_origin(p
[0]));
401 case BGPTYPE_AS_PATH
:
403 printf(" invalid len");
406 while (p
< dat
+ len
) {
408 * under RFC1965, p[0] means:
409 * 1: AS_SET 2: AS_SEQUENCE
410 * 3: AS_CONFED_SET 4: AS_CONFED_SEQUENCE
413 if (p
[0] == 3 || p
[0] == 4)
415 printf("%s", (p
[0] & 1) ? "{" : "");
416 for (i
= 0; i
< p
[1] * 2; i
+= 2) {
417 printf("%s%u", i
== 0 ? "" : " ",
418 EXTRACT_16BITS(&p
[2 + i
]));
420 printf("%s", (p
[0] & 1) ? "}" : "");
424 case BGPTYPE_NEXT_HOP
:
426 printf(" invalid len");
428 printf(" %s", getname(p
));
430 case BGPTYPE_MULTI_EXIT_DISC
:
431 case BGPTYPE_LOCAL_PREF
:
433 printf(" invalid len");
435 printf(" %u", EXTRACT_32BITS(p
));
437 case BGPTYPE_ATOMIC_AGGREGATE
:
439 printf(" invalid len");
441 case BGPTYPE_AGGREGATOR
:
443 printf(" invalid len");
446 printf(" AS #%u, origin %s", EXTRACT_16BITS(p
),
449 case BGPTYPE_COMMUNITIES
:
451 printf(" invalid len");
454 for (i
= 0; i
< len
; i
+= 4) {
456 comm
= EXTRACT_32BITS(&p
[i
]);
458 case BGP_COMMUNITY_NO_EXPORT
:
459 printf(" NO_EXPORT");
461 case BGP_COMMUNITY_NO_ADVERT
:
462 printf(" NO_ADVERTISE");
464 case BGP_COMMUNITY_NO_EXPORT_SUBCONFED
:
465 printf(" NO_EXPORT_SUBCONFED");
468 printf(" (AS #%d value 0x%04x)",
469 (comm
>> 16) & 0xffff, comm
& 0xffff);
474 case BGPTYPE_MP_REACH_NLRI
:
475 af
= EXTRACT_16BITS(p
);
478 printf(" %s vendor specific,",
479 tok2str(bgp_afi_values
, "Unknown", af
));
481 printf(" AFI %s SAFI %s,",
482 tok2str(bgp_afi_values
, "Unknown", af
),
483 tok2str(bgp_safi_values
, "Unknown", safi
));
487 if (af
== AFNUM_INET
)
490 else if (af
== AFNUM_INET6
)
503 printf(" %s", getname(p
+ 1 + i
));
504 i
+= sizeof(struct in_addr
);
508 printf(" %s", getname6(p
+ 1 + i
));
509 i
+= sizeof(struct in6_addr
);
513 printf(" (unknown af)");
514 i
= tlen
; /*exit loop*/
525 printf(" %u snpa", snpa
);
526 for (/*nothing*/; snpa
> 0; snpa
--) {
527 printf("(%d bytes)", p
[0]);
536 while (len
- (p
- dat
) > 0) {
539 if(safi
==SAFNUM_LABUNICAST
) {
540 advance
= decode_labeled_prefix4(p
, buf
, sizeof(buf
));
542 advance
= decode_prefix4(p
, buf
, sizeof(buf
));
550 advance
= decode_prefix6(p
, buf
, sizeof(buf
));
555 printf(" (unknown af)");
566 case BGPTYPE_MP_UNREACH_NLRI
:
567 af
= EXTRACT_16BITS(p
);
570 printf(" %s vendor specific,",
571 tok2str(bgp_afi_values
, "Unknown", af
));
573 printf(" AFI %s SAFI %s,",
574 tok2str(bgp_afi_values
, "Unknown", af
),
575 tok2str(bgp_safi_values
, "Unknown", safi
));
580 while (len
- (p
- dat
) > 0) {
583 if(safi
==SAFNUM_LABUNICAST
) {
584 advance
= decode_labeled_prefix4(p
, buf
, sizeof(buf
));
586 advance
= decode_prefix4(p
, buf
, sizeof(buf
));
594 advance
= decode_prefix6(p
, buf
, sizeof(buf
));
599 printf(" (unknown af)");
614 bgp_open_print(const u_char
*dat
, int length
)
616 struct bgp_open bgpo
;
617 struct bgp_opt bgpopt
;
622 TCHECK2(dat
[0], BGP_OPEN_SIZE
);
623 memcpy(&bgpo
, dat
, BGP_OPEN_SIZE
);
624 hlen
= ntohs(bgpo
.bgpo_len
);
626 printf(": Version %d,", bgpo
.bgpo_version
);
627 printf(" AS #%u,", ntohs(bgpo
.bgpo_myas
));
628 printf(" Holdtime %u,", ntohs(bgpo
.bgpo_holdtime
));
629 printf(" ID %s,", getname((u_char
*)&bgpo
.bgpo_id
));
630 printf(" Option length %u", bgpo
.bgpo_optlen
);
633 opt
= &((const struct bgp_open
*)dat
)->bgpo_optlen
;
637 while (i
< bgpo
.bgpo_optlen
) {
638 TCHECK2(opt
[i
], BGP_OPT_SIZE
);
639 memcpy(&bgpopt
, &opt
[i
], BGP_OPT_SIZE
);
640 if (i
+ 2 + bgpopt
.bgpopt_len
> bgpo
.bgpo_optlen
) {
641 printf(" [|opt %d %d]", bgpopt
.bgpopt_len
, bgpopt
.bgpopt_type
);
645 printf(" (option %s, len=%d)", bgp_opttype(bgpopt
.bgpopt_type
),
647 i
+= BGP_OPT_SIZE
+ bgpopt
.bgpopt_len
;
655 bgp_update_print(const u_char
*dat
, int length
)
658 struct bgp_attr bgpa
;
665 TCHECK2(dat
[0], BGP_SIZE
);
666 memcpy(&bgp
, dat
, BGP_SIZE
);
667 hlen
= ntohs(bgp
.bgp_len
);
668 p
= dat
+ BGP_SIZE
; /*XXX*/
671 /* Unfeasible routes */
672 len
= EXTRACT_16BITS(p
);
675 * Without keeping state from the original NLRI message,
676 * it's not possible to tell if this a v4 or v6 route,
677 * so only try to decode it if we're not v6 enabled.
680 printf(" (Withdrawn routes: %d bytes)", len
);
682 char buf
[MAXHOSTNAMELEN
+ 100];
687 printf(" (Withdrawn routes:");
690 i
+= decode_prefix4(&p
[i
], buf
, sizeof(buf
));
699 len
= EXTRACT_16BITS(p
);
701 /* do something more useful!*/
703 printf(" (Path attributes:"); /* ) */
705 while (i
< 2 + len
) {
708 TCHECK2(p
[i
], sizeof(bgpa
));
709 memcpy(&bgpa
, &p
[i
], sizeof(bgpa
));
710 alen
= bgp_attr_len(&bgpa
);
711 aoff
= bgp_attr_off(&bgpa
);
713 if (vflag
&& newline
)
718 printf("%s", bgp_attr_type(bgpa
.bgpa_type
));
719 if (bgpa
.bgpa_flags
) {
721 bgpa
.bgpa_flags
& 0x80 ? "O" : "",
722 bgpa
.bgpa_flags
& 0x40 ? "T" : "",
723 bgpa
.bgpa_flags
& 0x20 ? "P" : "",
724 bgpa
.bgpa_flags
& 0x10 ? "E" : "");
725 if (bgpa
.bgpa_flags
& 0xf)
726 printf("+%x", bgpa
.bgpa_flags
& 0xf);
730 bgp_attr_print(&bgpa
, &p
[i
+ aoff
], alen
);
744 if (len
&& dat
+ length
> p
)
746 if (dat
+ length
> p
) {
747 printf("(NLRI:"); /* ) */
748 while (dat
+ length
> p
) {
749 char buf
[MAXHOSTNAMELEN
+ 100];
750 i
= decode_prefix4(p
, buf
, sizeof(buf
));
766 bgp_notification_print(const u_char
*dat
, int length
)
768 struct bgp_notification bgpn
;
771 TCHECK2(dat
[0], BGP_NOTIFICATION_SIZE
);
772 memcpy(&bgpn
, dat
, BGP_NOTIFICATION_SIZE
);
773 hlen
= ntohs(bgpn
.bgpn_len
);
775 printf(": error %s,", bgp_notify_major(bgpn
.bgpn_major
));
776 printf(" subcode %s",
777 bgp_notify_minor(bgpn
.bgpn_major
, bgpn
.bgpn_minor
));
784 bgp_header_print(const u_char
*dat
, int length
)
788 TCHECK2(dat
[0], BGP_SIZE
);
789 memcpy(&bgp
, dat
, BGP_SIZE
);
790 printf("(%s", bgp_type(bgp
.bgp_type
)); /* ) */
792 switch (bgp
.bgp_type
) {
794 bgp_open_print(dat
, length
);
797 bgp_update_print(dat
, length
);
799 case BGP_NOTIFICATION
:
800 bgp_notification_print(dat
, length
);
812 bgp_print(const u_char
*dat
, int length
)
817 const u_char marker
[] = {
818 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
819 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
826 if (snapend
< dat
+ length
)
834 while (p
< snapend
) {
835 if (!TTEST2(p
[0], 1))
842 if (!TTEST2(p
[0], sizeof(marker
)))
844 if (memcmp(p
, marker
, sizeof(marker
)) != 0) {
849 /* found BGP header */
850 TCHECK2(p
[0], BGP_SIZE
); /*XXX*/
851 memcpy(&bgp
, p
, BGP_SIZE
);
856 hlen
= ntohs(bgp
.bgp_len
);
857 if (vflag
&& newline
)
861 if (TTEST2(p
[0], hlen
)) {
862 bgp_header_print(p
, hlen
);
867 printf("[|BGP %s]", bgp_type(bgp
.bgp_type
));