X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/f78c60f54a9beb04f1409712ec95b46f2d52a0ab..2db7c32de1a1c3e7f940e8275a285bbf44c658ad:/print-syslog.c diff --git a/print-syslog.c b/print-syslog.c index d332f67f..396f07a4 100644 --- a/print-syslog.c +++ b/print-syslog.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 1998-2004 Hannes Gredler + * Copyright (c) 1998-2004 Hannes Gredler * The TCPDUMP project * * Redistribution and use in source and binary forms, with or without @@ -14,19 +14,16 @@ * FOR A PARTICULAR PURPOSE. */ -#ifdef HAVE_CONFIG_H -#include "config.h" -#endif +/* \summary: Syslog protocol printer */ +/* specification: RFC 3164 (not RFC 5424) */ -#include +#include -#include -#include +#include "netdissect-stdinc.h" -#include "interface.h" +#include "netdissect.h" #include "extract.h" -static const char tstr[] = "[|syslog]"; /* * tokenlists and #defines taken from Ethereal - Network traffic analyzer @@ -35,7 +32,7 @@ static const char tstr[] = "[|syslog]"; #define SYSLOG_SEVERITY_MASK 0x0007 /* 0000 0000 0000 0111 */ #define SYSLOG_FACILITY_MASK 0x03f8 /* 0000 0011 1111 1000 */ -#define SYSLOG_MAX_DIGITS 3 /* The maximum number if priority digits to read in. */ +#define SYSLOG_MAX_DIGITS 3 /* The maximum number of priority digits to read in. */ static const struct tok syslog_severity_values[] = { { 0, "emergency" }, @@ -78,52 +75,47 @@ static const struct tok syslog_facility_values[] = { }; void -syslog_print(register const u_char *pptr, register u_int len) +syslog_print(netdissect_options *ndo, + const u_char *pptr, u_int len) { - u_int16_t msg_off = 0; - u_int16_t pri = 0; - u_int16_t facility,severity; + uint16_t msg_off = 0; + uint16_t pri = 0; + uint16_t facility,severity; + ndo->ndo_protocol = "syslog"; /* extract decimal figures that are * encapsulated within < > tags * based on this decimal figure extract the * severity and facility values */ - TCHECK2(*pptr, 1); - if (*(pptr+msg_off) == '<') { - msg_off++; - TCHECK2(*(pptr+msg_off), 1); - while ( *(pptr+msg_off) >= '0' && - *(pptr+msg_off) <= '9' && - msg_off <= SYSLOG_MAX_DIGITS) { - pri = pri * 10 + (*(pptr+msg_off) - '0'); - msg_off++; - TCHECK2(*(pptr+msg_off), 1); - } - if (*(pptr+msg_off) != '>') { - printf("%s", tstr); - return; - } + if (GET_U_1(pptr) != '<') + goto invalid; + msg_off++; + + while (msg_off <= SYSLOG_MAX_DIGITS && + GET_U_1(pptr + msg_off) >= '0' && + GET_U_1(pptr + msg_off) <= '9') { + pri = pri * 10 + (GET_U_1(pptr + msg_off) - '0'); msg_off++; - } else { - printf("%s", tstr); - return; } + if (GET_U_1(pptr + msg_off) != '>') + goto invalid; + msg_off++; + facility = (pri & SYSLOG_FACILITY_MASK) >> 3; severity = pri & SYSLOG_SEVERITY_MASK; - if (vflag < 1 ) - { - printf("SYSLOG %s.%s, length: %u", + if (ndo->ndo_vflag < 1 ) { + ND_PRINT("SYSLOG %s.%s, length: %u", tok2str(syslog_facility_values, "unknown (%u)", facility), tok2str(syslog_severity_values, "unknown (%u)", severity), len); return; } - printf("SYSLOG, length: %u\n\tFacility %s (%u), Severity %s (%u)\n\tMsg: ", + ND_PRINT("SYSLOG, length: %u\n\tFacility %s (%u), Severity %s (%u)\n\tMsg: ", len, tok2str(syslog_facility_values, "unknown (%u)", facility), facility, @@ -131,16 +123,25 @@ syslog_print(register const u_char *pptr, register u_int len) severity); /* print the syslog text in verbose mode */ - for (; msg_off < len; msg_off++) { - TCHECK2(*(pptr+msg_off), 1); - safeputchar(gndo, *(pptr + msg_off)); - } - - if (vflag > 1) - print_unknown_data(gndo,pptr,"\n\t",len); + /* + * RFC 3164 Section 4.1.3: "There is no ending delimiter to this part. + * The MSG part of the syslog packet MUST contain visible (printing) + * characters." + * + * RFC 5424 Section 8.2: "This document does not impose any mandatory + * restrictions on the MSG or PARAM-VALUE content. As such, they MAY + * contain control characters, including the NUL character." + * + * Hence, to aid in protocol debugging, print the full MSG without + * beautification to make it clear what was transmitted on the wire. + */ + if (len > msg_off) + nd_printjn(ndo, pptr + msg_off, len - msg_off); + if (ndo->ndo_vflag > 1) + print_unknown_data(ndo, pptr, "\n\t", len); return; -trunc: - printf("%s", tstr); +invalid: + nd_print_invalid(ndo); }