| File: | extcap/sshdump.c |
| Warning: | line 279, column 9 Opened stream never closed. Potential resource leak |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* sshdump.c | |||
| 2 | * sshdump is extcap tool used to capture data using a remote ssh host | |||
| 3 | * | |||
| 4 | * Copyright 2015, Dario Lombardo | |||
| 5 | * | |||
| 6 | * Wireshark - Network traffic analyzer | |||
| 7 | * By Gerald Combs <gerald@wireshark.org> | |||
| 8 | * Copyright 1998 Gerald Combs | |||
| 9 | * | |||
| 10 | * SPDX-License-Identifier: GPL-2.0-or-later | |||
| 11 | */ | |||
| 12 | ||||
| 13 | #include "config.h" | |||
| 14 | #define WS_LOG_DOMAIN"sshdump" "sshdump" | |||
| 15 | ||||
| 16 | #include <extcap/extcap-base.h> | |||
| 17 | #include <extcap/ssh-base.h> | |||
| 18 | #include <wsutil/interface.h> | |||
| 19 | #include <wsutil/file_util.h> | |||
| 20 | #include <wsutil/strtoi.h> | |||
| 21 | #include <wsutil/filesystem.h> | |||
| 22 | #include <wsutil/privileges.h> | |||
| 23 | #include <wsutil/please_report_bug.h> | |||
| 24 | #include <wsutil/wslog.h> | |||
| 25 | ||||
| 26 | #include <errno(*__errno_location ()).h> | |||
| 27 | #include <string.h> | |||
| 28 | #include <fcntl.h> | |||
| 29 | ||||
| 30 | #include <cli_main.h> | |||
| 31 | ||||
| 32 | static char* sshdump_extcap_interface; | |||
| 33 | #define DEFAULT_SSHDUMP_EXTCAP_INTERFACE"sshdump" "sshdump" | |||
| 34 | ||||
| 35 | #define SSHDUMP_VERSION_MAJOR"1" "1" | |||
| 36 | #define SSHDUMP_VERSION_MINOR"2" "2" | |||
| 37 | #define SSHDUMP_VERSION_RELEASE"0" "0" | |||
| 38 | ||||
| 39 | #define SSH_READ_BLOCK_SIZE256 256 | |||
| 40 | ||||
| 41 | enum { | |||
| 42 | EXTCAP_BASE_OPTIONS_ENUMEXTCAP_OPT_LIST_INTERFACES, EXTCAP_OPT_VERSION, EXTCAP_OPT_LIST_DLTS , EXTCAP_OPT_INTERFACE, EXTCAP_OPT_CONFIG, EXTCAP_OPT_CAPTURE , EXTCAP_OPT_CAPTURE_FILTER, EXTCAP_OPT_FIFO, EXTCAP_OPT_LOG_LEVEL , EXTCAP_OPT_LOG_FILE, | |||
| 43 | OPT_HELP, | |||
| 44 | OPT_VERSION, | |||
| 45 | OPT_REMOTE_HOST, | |||
| 46 | OPT_REMOTE_PORT, | |||
| 47 | OPT_REMOTE_USERNAME, | |||
| 48 | OPT_REMOTE_PASSWORD, | |||
| 49 | OPT_REMOTE_INTERFACE, | |||
| 50 | OPT_REMOTE_CAPTURE_COMMAND_SELECT, | |||
| 51 | OPT_REMOTE_CAPTURE_COMMAND, | |||
| 52 | OPT_REMOTE_FILTER, | |||
| 53 | OPT_SSHKEY, | |||
| 54 | OPT_SSHKEY_PASSPHRASE, | |||
| 55 | OPT_PROXYCOMMAND, | |||
| 56 | OPT_SSH_SHA1, | |||
| 57 | OPT_REMOTE_COUNT, | |||
| 58 | OPT_REMOTE_SUDO, // Deprecated | |||
| 59 | OPT_REMOTE_PRIV, | |||
| 60 | OPT_REMOTE_PRIV_USER, | |||
| 61 | OPT_REMOTE_NOPROM | |||
| 62 | }; | |||
| 63 | ||||
| 64 | static const struct ws_option longopts[] = { | |||
| 65 | EXTCAP_BASE_OPTIONS{ "extcap-interfaces", 0, ((void*)0), EXTCAP_OPT_LIST_INTERFACES }, { "extcap-version", 2, ((void*)0), EXTCAP_OPT_VERSION}, { "extcap-dlts" , 0, ((void*)0), EXTCAP_OPT_LIST_DLTS}, { "extcap-interface", 1, ((void*)0), EXTCAP_OPT_INTERFACE}, { "extcap-config", 0, ( (void*)0), EXTCAP_OPT_CONFIG}, { "capture", 0, ((void*)0), EXTCAP_OPT_CAPTURE }, { "extcap-capture-filter", 1, ((void*)0), EXTCAP_OPT_CAPTURE_FILTER }, { "fifo", 1, ((void*)0), EXTCAP_OPT_FIFO}, { "log-level", 1 , ((void*)0), EXTCAP_OPT_LOG_LEVEL}, { "log-file", 1, ((void* )0), EXTCAP_OPT_LOG_FILE}, | |||
| 66 | { "help", ws_no_argument0, NULL((void*)0), OPT_HELP}, | |||
| 67 | { "version", ws_no_argument0, NULL((void*)0), OPT_VERSION}, | |||
| 68 | SSH_BASE_PACKET_OPTIONS{ "remote-host", 1, ((void*)0), OPT_REMOTE_HOST}, { "remote-port" , 1, ((void*)0), OPT_REMOTE_PORT}, { "remote-username", 1, (( void*)0), OPT_REMOTE_USERNAME}, { "remote-password", 1, ((void *)0), OPT_REMOTE_PASSWORD}, { "remote-count", 1, ((void*)0), OPT_REMOTE_COUNT }, { "sshkey", 1, ((void*)0), OPT_SSHKEY}, { "sshkey-passphrase" , 1, ((void*)0), OPT_SSHKEY_PASSPHRASE}, { "proxycommand", 1, ((void*)0), OPT_PROXYCOMMAND}, { "ssh-sha1", 0, ((void*)0), OPT_SSH_SHA1 }, { "remote-interface", 1, ((void*)0), OPT_REMOTE_INTERFACE} , { "remote-filter", 1, ((void*)0), OPT_REMOTE_FILTER}, | |||
| 69 | { "remote-capture-command-select", ws_required_argument1, NULL((void*)0), OPT_REMOTE_CAPTURE_COMMAND_SELECT}, | |||
| 70 | { "remote-capture-command", ws_required_argument1, NULL((void*)0), OPT_REMOTE_CAPTURE_COMMAND}, | |||
| 71 | { "remote-sudo", ws_no_argument0, NULL((void*)0), OPT_REMOTE_SUDO }, // Deprecated | |||
| 72 | { "remote-priv", ws_required_argument1, NULL((void*)0), OPT_REMOTE_PRIV }, | |||
| 73 | { "remote-priv-user", ws_required_argument1, NULL((void*)0), OPT_REMOTE_PRIV_USER }, | |||
| 74 | { "remote-noprom", ws_no_argument0, NULL((void*)0), OPT_REMOTE_NOPROM }, | |||
| 75 | { 0, 0, 0, 0} | |||
| 76 | }; | |||
| 77 | ||||
| 78 | static char* interfaces_list_to_filter(GSList* if_list, unsigned int remote_port); | |||
| 79 | ||||
| 80 | static int ssh_loop_read(ssh_channel channel, FILE* fp) | |||
| 81 | { | |||
| 82 | int nbytes; | |||
| 83 | int ret = EXIT_SUCCESS0; | |||
| 84 | char buffer[SSH_READ_BLOCK_SIZE256]; | |||
| 85 | ||||
| 86 | /* read from stdin until data are available */ | |||
| 87 | while (ssh_channel_is_open(channel) && !ssh_channel_is_eof(channel)) { | |||
| 88 | nbytes = ssh_channel_read(channel, buffer, SSH_READ_BLOCK_SIZE256, 0); | |||
| 89 | if (nbytes < 0) { | |||
| 90 | ws_warning("Error reading from channel")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 90, __func__, "Error reading from channel"); } } while (0); | |||
| 91 | goto end; | |||
| 92 | } | |||
| 93 | if (nbytes == 0) { | |||
| 94 | break; | |||
| 95 | } | |||
| 96 | if (fwrite(buffer, 1, nbytes, fp) != (unsigned)nbytes) { | |||
| 97 | ws_warning("Error writing to fifo")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 97, __func__, "Error writing to fifo"); } } while (0); | |||
| 98 | ret = EXIT_FAILURE1; | |||
| 99 | goto end; | |||
| 100 | } | |||
| 101 | fflush(fp); | |||
| 102 | } | |||
| 103 | ||||
| 104 | /* read loop finished... maybe something wrong happened. Read from stderr */ | |||
| 105 | while (ssh_channel_is_open(channel) && !ssh_channel_is_eof(channel)) { | |||
| 106 | nbytes = ssh_channel_read(channel, buffer, SSH_READ_BLOCK_SIZE256, 1); | |||
| 107 | if (nbytes < 0) { | |||
| 108 | ws_warning("Error reading from channel")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 108, __func__, "Error reading from channel"); } } while (0); | |||
| 109 | goto end; | |||
| 110 | } | |||
| 111 | if (fwrite(buffer, 1, nbytes, stderrstderr) != (unsigned)nbytes) { | |||
| 112 | ws_warning("Error writing to stderr")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 112, __func__, "Error writing to stderr"); } } while (0); | |||
| 113 | break; | |||
| 114 | } | |||
| 115 | } | |||
| 116 | ||||
| 117 | end: | |||
| 118 | if (ssh_channel_send_eof(channel) != SSH_OK0) { | |||
| 119 | ws_warning("Error sending EOF in ssh channel")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 119, __func__, "Error sending EOF in ssh channel"); } } while (0); | |||
| 120 | ret = EXIT_FAILURE1; | |||
| 121 | } | |||
| 122 | return ret; | |||
| 123 | } | |||
| 124 | ||||
| 125 | static char* local_interfaces_to_filter(const uint16_t remote_port) | |||
| 126 | { | |||
| 127 | GSList* interfaces = local_interfaces_to_list(); | |||
| 128 | char* filter = interfaces_list_to_filter(interfaces, remote_port); | |||
| 129 | g_slist_free_full(interfaces, g_free); | |||
| 130 | return filter; | |||
| 131 | } | |||
| 132 | ||||
| 133 | static ssh_channel run_ssh_command(ssh_session sshs, const char* capture_command_select, | |||
| 134 | const char* capture_command, const char* privilege, bool_Bool noprom, | |||
| 135 | const char* iface, const char* cfilter, const uint32_t count) | |||
| 136 | { | |||
| 137 | char* cmdline = NULL((void*)0); | |||
| 138 | ssh_channel channel; | |||
| 139 | char** ifaces_array = NULL((void*)0); | |||
| 140 | int ifaces_array_num = 0; | |||
| 141 | GString *ifaces_string; | |||
| 142 | char *ifaces = NULL((void*)0); | |||
| 143 | char* quoted_iface = NULL((void*)0); | |||
| 144 | char* quoted_filter = NULL((void*)0); | |||
| 145 | char* count_str = NULL((void*)0); | |||
| 146 | unsigned int remote_port = 22; | |||
| 147 | ||||
| 148 | channel = ssh_channel_new(sshs); | |||
| 149 | if (!channel) { | |||
| 150 | ws_warning("Can't create channel")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 150, __func__, "Can't create channel"); } } while (0); | |||
| 151 | return NULL((void*)0); | |||
| 152 | } | |||
| 153 | ||||
| 154 | if (ssh_channel_open_session(channel) != SSH_OK0) { | |||
| 155 | ws_warning("Can't open session")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 155, __func__, "Can't open session"); } } while (0); | |||
| 156 | ssh_channel_free(channel); | |||
| 157 | return NULL((void*)0); | |||
| 158 | } | |||
| 159 | ||||
| 160 | ssh_options_get_port(sshs, &remote_port); | |||
| 161 | ||||
| 162 | if (capture_command_select == NULL((void*)0) || !g_strcmp0(capture_command_select, "other")) { | |||
| 163 | if (capture_command && *capture_command) { | |||
| 164 | cmdline = g_strdup(capture_command)g_strdup_inline (capture_command); | |||
| 165 | ws_debug("Remote capture command has disabled other options")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_DEBUG, "extcap/sshdump.c" , 165, __func__, "Remote capture command has disabled other options" ); } } while (0); | |||
| 166 | } else { | |||
| 167 | capture_command_select = "tcpdump"; | |||
| 168 | } | |||
| 169 | } | |||
| 170 | ||||
| 171 | /* escape parameters to go save with the shell */ | |||
| 172 | if (!g_strcmp0(capture_command_select, "tcpdump")) { | |||
| 173 | quoted_iface = iface ? g_shell_quote(iface) : NULL((void*)0); | |||
| 174 | quoted_filter = g_shell_quote(cfilter ? cfilter : ""); | |||
| 175 | if (count > 0) | |||
| 176 | count_str = ws_strdup_printf("-c %u", count)wmem_strdup_printf(((void*)0), "-c %u", count); | |||
| 177 | ||||
| 178 | cmdline = ws_strdup_printf("%s tcpdump -U %s%s %s -w - %s %s",wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 179 | privilege,wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 180 | quoted_iface ? "-i " : "",wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 181 | quoted_iface ? quoted_iface : "",wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 182 | noprom ? "-p" : "",wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 183 | count_str ? count_str : "",wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ) | |||
| 184 | quoted_filter)wmem_strdup_printf(((void*)0), "%s tcpdump -U %s%s %s -w - %s %s" , privilege, quoted_iface ? "-i " : "", quoted_iface ? quoted_iface : "", noprom ? "-p" : "", count_str ? count_str : "", quoted_filter ); | |||
| 185 | } else if (!g_strcmp0(capture_command_select, "dumpcap")) { | |||
| 186 | if (iface) { | |||
| 187 | ifaces_array = g_strsplit(iface, " ", -1); | |||
| 188 | ifaces_string = g_string_new(NULL((void*)0)); | |||
| 189 | while (ifaces_array[ifaces_array_num]) | |||
| 190 | { | |||
| 191 | quoted_iface = g_shell_quote(ifaces_array[ifaces_array_num]); | |||
| 192 | g_string_append_printf(ifaces_string, "-i %s ", quoted_iface); | |||
| 193 | ifaces_array_num++; | |||
| 194 | } | |||
| 195 | ifaces = g_string_free(ifaces_string, FALSE)(__builtin_constant_p ((0)) ? (((0)) ? (g_string_free) ((ifaces_string ), ((0))) : g_string_free_and_steal (ifaces_string)) : (g_string_free ) ((ifaces_string), ((0)))); | |||
| 196 | } | |||
| 197 | quoted_filter = g_shell_quote(cfilter ? cfilter : ""); | |||
| 198 | if (count > 0) | |||
| 199 | count_str = ws_strdup_printf("-c %u", count)wmem_strdup_printf(((void*)0), "-c %u", count); | |||
| 200 | ||||
| 201 | cmdline = ws_strdup_printf("%s dumpcap %s %s -w - %s -f %s",wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter) | |||
| 202 | privilege,wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter) | |||
| 203 | noprom ? "-p" : "",wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter) | |||
| 204 | ifaces ? ifaces : "",wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter) | |||
| 205 | count_str ? count_str : "",wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter) | |||
| 206 | quoted_filter)wmem_strdup_printf(((void*)0), "%s dumpcap %s %s -w - %s -f %s" , privilege, noprom ? "-p" : "", ifaces ? ifaces : "", count_str ? count_str : "", quoted_filter); | |||
| 207 | ||||
| 208 | g_free(ifaces); | |||
| 209 | g_strfreev(ifaces_array); | |||
| 210 | } | |||
| 211 | ||||
| 212 | ws_debug("Running: %s", cmdline)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_DEBUG, "extcap/sshdump.c" , 212, __func__, "Running: %s", cmdline); } } while (0); | |||
| 213 | if (ssh_channel_request_exec(channel, cmdline) != SSH_OK0) { | |||
| 214 | ws_warning("Can't request exec")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 214, __func__, "Can't request exec"); } } while (0); | |||
| 215 | ssh_channel_close(channel); | |||
| 216 | ssh_channel_free(channel); | |||
| 217 | channel = NULL((void*)0); | |||
| 218 | } | |||
| 219 | ||||
| 220 | g_free(quoted_iface); | |||
| 221 | g_free(quoted_filter); | |||
| 222 | g_free(cmdline); | |||
| 223 | g_free(count_str); | |||
| 224 | ||||
| 225 | return channel; | |||
| 226 | } | |||
| 227 | ||||
| 228 | static int ssh_open_remote_connection(const ssh_params_t* params, const char* iface, const char* cfilter, | |||
| 229 | const char* capture_command_select, const char* capture_command, const char* privilege, | |||
| 230 | bool_Bool noprom, const uint32_t count, const char* fifo) | |||
| 231 | { | |||
| 232 | ssh_session sshs = NULL((void*)0); | |||
| 233 | ssh_channel channel = NULL((void*)0); | |||
| 234 | FILE* fp = stdoutstdout; | |||
| 235 | int ret = EXIT_FAILURE1; | |||
| 236 | char* err_info = NULL((void*)0); | |||
| 237 | ||||
| 238 | if (g_strcmp0(fifo, "-")) { | |||
| 239 | /* Open or create the output file */ | |||
| 240 | fp = fopen(fifo, "wb"); | |||
| 241 | if (fp
| |||
| 242 | ws_warning("Error creating output file: %s (%s)", fifo, g_strerror(errno))do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 242, __func__, "Error creating output file: %s (%s)", fifo, g_strerror((*__errno_location ()))); } } while (0); | |||
| 243 | return EXIT_FAILURE1; | |||
| 244 | } | |||
| 245 | } | |||
| 246 | ||||
| 247 | sshs = create_ssh_connection(params, &err_info); | |||
| 248 | ||||
| 249 | if (!sshs) { | |||
| 250 | ws_warning("Error creating connection.")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 250, __func__, "Error creating connection."); } } while (0); | |||
| 251 | goto cleanup; | |||
| 252 | } | |||
| 253 | ||||
| 254 | channel = run_ssh_command(sshs, capture_command_select, capture_command, privilege, noprom, iface, cfilter, count); | |||
| 255 | ||||
| 256 | if (!channel) { | |||
| 257 | ws_warning("Can't run ssh command.")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 257, __func__, "Can't run ssh command."); } } while (0); | |||
| 258 | goto cleanup; | |||
| 259 | } | |||
| 260 | ||||
| 261 | /* read from channel and write into fp */ | |||
| 262 | if (ssh_loop_read(channel, fp) != EXIT_SUCCESS0) { | |||
| 263 | ws_warning("Error in read loop.")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 263, __func__, "Error in read loop."); } } while (0); | |||
| 264 | ret = EXIT_FAILURE1; | |||
| 265 | goto cleanup; | |||
| 266 | } | |||
| 267 | ||||
| 268 | ret = EXIT_SUCCESS0; | |||
| 269 | cleanup: | |||
| 270 | if (err_info) | |||
| 271 | ws_warning("%s", err_info)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 271, __func__, "%s", err_info); } } while (0); | |||
| 272 | g_free(err_info); | |||
| 273 | ||||
| 274 | /* clean up and exit */ | |||
| 275 | ssh_cleanup(&sshs, &channel); | |||
| 276 | ||||
| 277 | if (g_strcmp0(fifo, "-")) | |||
| 278 | fclose(fp); | |||
| 279 | return ret; | |||
| ||||
| 280 | } | |||
| 281 | ||||
| 282 | static char* interfaces_list_to_filter(GSList* interfaces, unsigned int remote_port) | |||
| 283 | { | |||
| 284 | GString* filter = g_string_new(NULL((void*)0)); | |||
| 285 | GSList* cur; | |||
| 286 | ||||
| 287 | // If no port is given, assume the default one. This might not be | |||
| 288 | // correct if the port is looked up from the ssh config file, but it is | |||
| 289 | // better than nothing. | |||
| 290 | if (remote_port == 0) { | |||
| 291 | remote_port = 22; | |||
| 292 | } | |||
| 293 | ||||
| 294 | if (!interfaces) { | |||
| 295 | g_string_append_printf(filter, "not port %u", remote_port); | |||
| 296 | } else { | |||
| 297 | g_string_append_printf(filter, "not ((host %s", (char*)interfaces->data); | |||
| 298 | cur = g_slist_next(interfaces)((interfaces) ? (((GSList *)(interfaces))->next) : ((void* )0)); | |||
| 299 | while (cur) { | |||
| 300 | g_string_append_printf(filter, " or host %s", (char*)cur->data); | |||
| 301 | cur = g_slist_next(cur)((cur) ? (((GSList *)(cur))->next) : ((void*)0)); | |||
| 302 | } | |||
| 303 | g_string_append_printf(filter, ") and port %u)", remote_port); | |||
| 304 | } | |||
| 305 | return g_string_free(filter, FALSE)(__builtin_constant_p ((0)) ? (((0)) ? (g_string_free) ((filter ), ((0))) : g_string_free_and_steal (filter)) : (g_string_free ) ((filter), ((0)))); | |||
| 306 | } | |||
| 307 | ||||
| 308 | static int list_config(char *interface, unsigned int remote_port) | |||
| 309 | { | |||
| 310 | unsigned inc = 0; | |||
| 311 | char* ipfilter; | |||
| 312 | ||||
| 313 | if (!interface) { | |||
| 314 | ws_warning("ERROR: No interface specified.")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 314, __func__, "ERROR: No interface specified."); } } while (0); | |||
| 315 | return EXIT_FAILURE1; | |||
| 316 | } | |||
| 317 | ||||
| 318 | if (g_strcmp0(interface, sshdump_extcap_interface)) { | |||
| 319 | ws_warning("ERROR: interface must be %s", sshdump_extcap_interface)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 319, __func__, "ERROR: interface must be %s", sshdump_extcap_interface ); } } while (0); | |||
| 320 | return EXIT_FAILURE1; | |||
| 321 | } | |||
| 322 | ||||
| 323 | ipfilter = local_interfaces_to_filter(remote_port); | |||
| 324 | ||||
| 325 | printf("arg {number=%u}{call=--remote-host}{display=Remote SSH server address}" | |||
| 326 | "{type=string}{tooltip=The remote SSH host. It can be both " | |||
| 327 | "an IP address or a hostname}{required=true}{group=Server}\n", inc++); | |||
| 328 | printf("arg {number=%u}{call=--remote-port}{display=Remote SSH server port}" | |||
| 329 | "{type=unsigned}{default=22}{tooltip=The remote SSH host port (1-65535)}" | |||
| 330 | "{range=1,65535}{group=Server}\n", inc++); | |||
| 331 | printf("arg {number=%u}{call=--remote-username}{display=Remote SSH server username}" | |||
| 332 | "{type=string}{tooltip=The remote SSH username. If not provided, " | |||
| 333 | "the current user will be used}{group=Authentication}\n", inc++); | |||
| 334 | printf("arg {number=%u}{call=--remote-password}{display=Remote SSH server password}" | |||
| 335 | "{type=password}{tooltip=The SSH password, used when other methods (SSH agent " | |||
| 336 | "or key files) are unavailable.}{group=Authentication}\n", inc++); | |||
| 337 | printf("arg {number=%u}{call=--sshkey}{display=Path to SSH private key}" | |||
| 338 | "{type=fileselect}{tooltip=The path on the local filesystem of the private SSH key (OpenSSH format)}" | |||
| 339 | "{mustexist=true}{group=Authentication}\n", inc++); | |||
| 340 | printf("arg {number=%u}{call=--sshkey-passphrase}{display=SSH key passphrase}" | |||
| 341 | "{type=password}{tooltip=Passphrase to unlock the SSH private key}{group=Authentication}\n", | |||
| 342 | inc++); | |||
| 343 | printf("arg {number=%u}{call=--proxycommand}{display=ProxyCommand}" | |||
| 344 | "{type=string}{tooltip=The command to use as proxy for the SSH connection}" | |||
| 345 | "{group=Authentication}\n", inc++); | |||
| 346 | printf("arg {number=%u}{call=--ssh-sha1}{display=Support SHA-1 keys (deprecated)}" | |||
| 347 | "{type=boolflag}{tooltip=Support keys and key exchange algorithms using SHA-1 (deprecated)}{group=Authentication}" | |||
| 348 | "\n", inc++); | |||
| 349 | printf("arg {number=%u}{call=--remote-interface}{display=Remote interface}" | |||
| 350 | "{type=string}{tooltip=The remote network interface used for capture" | |||
| 351 | "}{group=Capture}\n", inc++); | |||
| 352 | printf("arg {number=%u}{call=--remote-capture-command-select}{display=Remote capture command selection}" | |||
| 353 | "{type=radio}{tooltip=The remote capture command to build a command line for}{group=Capture}\n", inc); | |||
| 354 | printf("value {arg=%u}{value=dumpcap}{display=dumpcap}\n", inc); | |||
| 355 | printf("value {arg=%u}{value=tcpdump}{display=tcpdump}{default=true}\n", inc); | |||
| 356 | printf("value {arg=%u}{value=other}{display=Other:}\n", inc++); | |||
| 357 | printf("arg {number=%u}{call=--remote-capture-command}{display=Remote capture command}" | |||
| 358 | "{type=string}{tooltip=The remote command used to capture}{group=Capture}\n", inc++); | |||
| 359 | // Deprecated | |||
| 360 | //printf("arg {number=%u}{call=--remote-sudo}{display=Use sudo on the remote machine}" | |||
| 361 | // "{type=boolflag}{tooltip=Prepend the capture command with sudo on the remote machine}" | |||
| 362 | // "{group=Capture}\n", inc++); | |||
| 363 | printf("arg {number=%u}{call=--remote-priv}{display=Gain capture privilege on the remote machine}" | |||
| 364 | "{type=radio}{tooltip=Optionally prepend the capture command with sudo or doas on the remote machine}" | |||
| 365 | "{group=Capture}\n", inc); | |||
| 366 | printf("value {arg=%u}{value=none}{display=none}{default=true}\n", inc); | |||
| 367 | printf("value {arg=%u}{value=sudo}{display=sudo}\n", inc); | |||
| 368 | printf("value {arg=%u}{value=doas -n}{display=doas}\n", inc++); | |||
| 369 | printf("arg {number=%u}{call=--remote-priv-user}{display=Privileged user name for sudo or doas}" | |||
| 370 | "{type=string}{tooltip=User name of privileged user to execute the capture command on the remote machine}" | |||
| 371 | "{group=Capture}\n", inc++); | |||
| 372 | printf("arg {number=%u}{call=--remote-noprom}{display=No promiscuous mode}" | |||
| 373 | "{type=boolflag}{tooltip=Don't use promiscuous mode on the remote machine}{group=Capture}" | |||
| 374 | "\n", inc++); | |||
| 375 | printf("arg {number=%u}{call=--remote-filter}{display=Remote capture filter}{type=string}" | |||
| 376 | "{tooltip=The remote capture filter}", inc++); | |||
| 377 | if (ipfilter) | |||
| 378 | printf("{default=%s}", ipfilter); | |||
| 379 | printf("{group=Capture}\n"); | |||
| 380 | printf("arg {number=%u}{call=--remote-count}{display=Packets to capture}" | |||
| 381 | "{type=unsigned}{default=0}{tooltip=The number of remote packets to capture. (Default: inf)}" | |||
| 382 | "{group=Capture}\n", inc++); | |||
| 383 | ||||
| 384 | extcap_config_debug(&inc); | |||
| 385 | ||||
| 386 | g_free(ipfilter); | |||
| 387 | ||||
| 388 | return EXIT_SUCCESS0; | |||
| 389 | } | |||
| 390 | ||||
| 391 | static char* concat_filters(const char* extcap_filter, const char* remote_filter) | |||
| 392 | { | |||
| 393 | if (!extcap_filter && remote_filter) | |||
| 394 | return g_strdup(remote_filter)g_strdup_inline (remote_filter); | |||
| 395 | ||||
| 396 | if (!remote_filter && extcap_filter) | |||
| 397 | return g_strdup(extcap_filter)g_strdup_inline (extcap_filter); | |||
| 398 | ||||
| 399 | if (!remote_filter && !extcap_filter) | |||
| 400 | return NULL((void*)0); | |||
| 401 | ||||
| 402 | return ws_strdup_printf("(%s) and (%s)", extcap_filter, remote_filter)wmem_strdup_printf(((void*)0), "(%s) and (%s)", extcap_filter , remote_filter); | |||
| 403 | } | |||
| 404 | ||||
| 405 | int main(int argc, char *argv[]) | |||
| 406 | { | |||
| 407 | char* err_msg; | |||
| 408 | int result; | |||
| 409 | int option_idx = 0; | |||
| 410 | ssh_params_t* ssh_params = ssh_params_new(); | |||
| 411 | char* remote_interface = NULL((void*)0); | |||
| 412 | char* remote_capture_command_select = NULL((void*)0); | |||
| 413 | char* remote_capture_command = NULL((void*)0); | |||
| 414 | char* remote_filter = NULL((void*)0); | |||
| 415 | uint32_t count = 0; | |||
| 416 | int ret = EXIT_FAILURE1; | |||
| 417 | extcap_parameters* extcap_conf = g_new0(extcap_parameters, 1)((extcap_parameters *) g_malloc0_n ((1), sizeof (extcap_parameters ))); | |||
| 418 | char* help_url; | |||
| 419 | char* help_header = NULL((void*)0); | |||
| 420 | char* priv = NULL((void*)0); | |||
| 421 | char* priv_user = NULL((void*)0); | |||
| 422 | bool_Bool noprom = false0; | |||
| 423 | char* interface_description = g_strdup("SSH remote capture")g_strdup_inline ("SSH remote capture"); | |||
| 424 | ||||
| 425 | /* Set the program name. */ | |||
| 426 | g_set_prgname("sshdump"); | |||
| 427 | ||||
| 428 | /* Initialize log handler early so we can have proper logging during startup. */ | |||
| 429 | extcap_log_init(); | |||
| 430 | ||||
| 431 | sshdump_extcap_interface = g_path_get_basename(argv[0]); | |||
| 432 | if (g_str_has_suffix(sshdump_extcap_interface, ".exe")(__builtin_constant_p (".exe")? __extension__ ({ const char * const __str = (sshdump_extcap_interface); const char * const __suffix = (".exe"); gboolean __result = (0); if (__str == ( (void*)0) || __suffix == ((void*)0)) __result = (g_str_has_suffix ) (__str, __suffix); else { const size_t __str_len = strlen ( ((__str) + !(__str))); const size_t __suffix_len = strlen ((( __suffix) + !(__suffix))); if (__str_len >= __suffix_len) __result = memcmp (__str + __str_len - __suffix_len, ((__suffix) + !( __suffix)), __suffix_len) == 0; } __result; }) : (g_str_has_suffix ) (sshdump_extcap_interface, ".exe") )) { | |||
| ||||
| 433 | sshdump_extcap_interface[strlen(sshdump_extcap_interface) - 4] = '\0'; | |||
| 434 | } | |||
| 435 | ||||
| 436 | /* | |||
| 437 | * Get credential information for later use. | |||
| 438 | */ | |||
| 439 | init_process_policies(); | |||
| 440 | ||||
| 441 | /* | |||
| 442 | * Attempt to get the pathname of the directory containing the | |||
| 443 | * executable file. | |||
| 444 | */ | |||
| 445 | err_msg = configuration_init(argv[0]); | |||
| 446 | if (err_msg != NULL((void*)0)) { | |||
| 447 | ws_warning("Can't get pathname of directory containing the extcap program: %s.",do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 448, __func__, "Can't get pathname of directory containing the extcap program: %s." , err_msg); } } while (0) | |||
| 448 | err_msg)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 448, __func__, "Can't get pathname of directory containing the extcap program: %s." , err_msg); } } while (0); | |||
| 449 | g_free(err_msg); | |||
| 450 | } | |||
| 451 | ||||
| 452 | help_url = data_file_url("sshdump.html"); | |||
| 453 | extcap_base_set_util_info(extcap_conf, argv[0], SSHDUMP_VERSION_MAJOR"1", SSHDUMP_VERSION_MINOR"2", | |||
| 454 | SSHDUMP_VERSION_RELEASE"0", help_url); | |||
| 455 | g_free(help_url); | |||
| 456 | add_libssh_info(extcap_conf); | |||
| 457 | if (g_strcmp0(sshdump_extcap_interface, DEFAULT_SSHDUMP_EXTCAP_INTERFACE"sshdump")) { | |||
| 458 | char* temp = interface_description; | |||
| 459 | interface_description = ws_strdup_printf("%s, custom version", interface_description)wmem_strdup_printf(((void*)0), "%s, custom version", interface_description ); | |||
| 460 | g_free(temp); | |||
| 461 | } | |||
| 462 | extcap_base_register_interface(extcap_conf, sshdump_extcap_interface, interface_description, 147, "Remote capture dependent DLT"); | |||
| 463 | g_free(interface_description); | |||
| 464 | ||||
| 465 | help_header = ws_strdup_printf(wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 466 | " %s --extcap-interfaces\n"wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 467 | " %s --extcap-interface=%s --extcap-dlts\n"wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 468 | " %s --extcap-interface=%s --extcap-config\n"wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 469 | " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 "wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 470 | "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' "wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 471 | "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface, argv[0],wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ) | |||
| 472 | sshdump_extcap_interface, argv[0], sshdump_extcap_interface)wmem_strdup_printf(((void*)0), " %s --extcap-interfaces\n" " %s --extcap-interface=%s --extcap-dlts\n" " %s --extcap-interface=%s --extcap-config\n" " %s --extcap-interface=%s --remote-host myhost --remote-port 22222 " "--remote-username myuser --remote-interface eth2 --remote-capture-command 'tcpdump -U -i eth0 -w -' " "--fifo=FILENAME --capture\n", argv[0], argv[0], sshdump_extcap_interface , argv[0], sshdump_extcap_interface, argv[0], sshdump_extcap_interface ); | |||
| 473 | extcap_help_add_header(extcap_conf, help_header); | |||
| 474 | g_free(help_header); | |||
| 475 | extcap_help_add_option(extcap_conf, "--help", "print this help"); | |||
| 476 | extcap_help_add_option(extcap_conf, "--version", "print the version"); | |||
| 477 | extcap_help_add_option(extcap_conf, "--remote-host <host>", "the remote SSH host"); | |||
| 478 | extcap_help_add_option(extcap_conf, "--remote-port <port>", "the remote SSH port"); | |||
| 479 | extcap_help_add_option(extcap_conf, "--remote-username <username>", "the remote SSH username"); | |||
| 480 | extcap_help_add_option(extcap_conf, "--remote-password <password>", "the remote SSH password. If not specified, ssh-agent and ssh-key are used"); | |||
| 481 | extcap_help_add_option(extcap_conf, "--sshkey <private key path>", "the path of the SSH key (OpenSSH format)"); | |||
| 482 | extcap_help_add_option(extcap_conf, "--sshkey-passphrase <private key passphrase>", "the passphrase to unlock private SSH key"); | |||
| 483 | extcap_help_add_option(extcap_conf, "--proxycommand <proxy command>", "the command to use as proxy for the SSH connection"); | |||
| 484 | extcap_help_add_option(extcap_conf, "--ssh-sha1", "support keys and key exchange using SHA-1 (deprecated)"); | |||
| 485 | extcap_help_add_option(extcap_conf, "--remote-interface <iface>", "the remote capture interface"); | |||
| 486 | extcap_help_add_option(extcap_conf, "--remote-capture-command-select <selection>", "dumpcap, tcpdump or other remote capture command"); | |||
| 487 | extcap_help_add_option(extcap_conf, "--remote-capture-command <capture command>", "the remote capture command"); | |||
| 488 | //extcap_help_add_option(extcap_conf, "--remote-sudo", "use sudo on the remote machine to capture"); // Deprecated | |||
| 489 | extcap_help_add_option(extcap_conf, "--remote-priv <selection>", "none, sudo or doas"); | |||
| 490 | extcap_help_add_option(extcap_conf, "--remote-priv-user <username>", "privileged user name"); | |||
| 491 | extcap_help_add_option(extcap_conf, "--remote-noprom", "don't use promiscuous mode on the remote machine"); | |||
| 492 | extcap_help_add_option(extcap_conf, "--remote-filter <filter>", "a filter for remote capture (default: don't listen on local interfaces IPs)"); | |||
| 493 | extcap_help_add_option(extcap_conf, "--remote-count <count>", "the number of packets to capture"); | |||
| 494 | ||||
| 495 | ws_opterr = 0; | |||
| 496 | ws_optind = 0; | |||
| 497 | ||||
| 498 | if (argc == 1) { | |||
| 499 | extcap_help_print(extcap_conf); | |||
| 500 | goto end; | |||
| 501 | } | |||
| 502 | ||||
| 503 | while ((result = ws_getopt_long(argc, argv, ":", longopts, &option_idx)) != -1) { | |||
| 504 | ||||
| 505 | switch (result) { | |||
| 506 | ||||
| 507 | case OPT_HELP: | |||
| 508 | extcap_help_print(extcap_conf); | |||
| 509 | ret = EXIT_SUCCESS0; | |||
| 510 | goto end; | |||
| 511 | ||||
| 512 | case OPT_VERSION: | |||
| 513 | extcap_version_print(extcap_conf); | |||
| 514 | ret = EXIT_SUCCESS0; | |||
| 515 | goto end; | |||
| 516 | ||||
| 517 | case OPT_REMOTE_HOST: | |||
| 518 | g_free(ssh_params->host); | |||
| 519 | ssh_params->host = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 520 | break; | |||
| 521 | ||||
| 522 | case OPT_REMOTE_PORT: | |||
| 523 | if (!ws_strtou16(ws_optarg, NULL((void*)0), &ssh_params->port) || ssh_params->port == 0) { | |||
| 524 | ws_warning("Invalid port: %s", ws_optarg)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 524, __func__, "Invalid port: %s", ws_optarg); } } while (0 ); | |||
| 525 | goto end; | |||
| 526 | } | |||
| 527 | break; | |||
| 528 | ||||
| 529 | case OPT_REMOTE_USERNAME: | |||
| 530 | g_free(ssh_params->username); | |||
| 531 | ssh_params->username = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 532 | break; | |||
| 533 | ||||
| 534 | case OPT_REMOTE_PASSWORD: | |||
| 535 | g_free(ssh_params->password); | |||
| 536 | ssh_params->password = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 537 | memset(ws_optarg, 'X', strlen(ws_optarg)); | |||
| 538 | break; | |||
| 539 | ||||
| 540 | case OPT_SSHKEY: | |||
| 541 | g_free(ssh_params->sshkey_path); | |||
| 542 | ssh_params->sshkey_path = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 543 | break; | |||
| 544 | ||||
| 545 | case OPT_SSHKEY_PASSPHRASE: | |||
| 546 | g_free(ssh_params->sshkey_passphrase); | |||
| 547 | ssh_params->sshkey_passphrase = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 548 | memset(ws_optarg, 'X', strlen(ws_optarg)); | |||
| 549 | break; | |||
| 550 | ||||
| 551 | case OPT_PROXYCOMMAND: | |||
| 552 | g_free(ssh_params->proxycommand); | |||
| 553 | ssh_params->proxycommand = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 554 | break; | |||
| 555 | ||||
| 556 | case OPT_SSH_SHA1: | |||
| 557 | ssh_params->ssh_sha1 = true1; | |||
| 558 | break; | |||
| 559 | ||||
| 560 | case OPT_REMOTE_INTERFACE: | |||
| 561 | g_free(remote_interface); | |||
| 562 | remote_interface = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 563 | break; | |||
| 564 | ||||
| 565 | case OPT_REMOTE_CAPTURE_COMMAND_SELECT: | |||
| 566 | g_free(remote_capture_command_select); | |||
| 567 | remote_capture_command_select = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 568 | break; | |||
| 569 | ||||
| 570 | case OPT_REMOTE_CAPTURE_COMMAND: | |||
| 571 | g_free(remote_capture_command); | |||
| 572 | remote_capture_command = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 573 | break; | |||
| 574 | ||||
| 575 | case OPT_REMOTE_SUDO: | |||
| 576 | // Deprecated | |||
| 577 | g_free(priv); | |||
| 578 | priv = g_strdup("sudo")g_strdup_inline ("sudo"); | |||
| 579 | break; | |||
| 580 | ||||
| 581 | case OPT_REMOTE_PRIV: | |||
| 582 | g_free(priv); | |||
| 583 | priv = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 584 | break; | |||
| 585 | ||||
| 586 | case OPT_REMOTE_PRIV_USER: | |||
| 587 | g_free(priv_user); | |||
| 588 | priv_user = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 589 | break; | |||
| 590 | ||||
| 591 | case OPT_REMOTE_FILTER: | |||
| 592 | g_free(remote_filter); | |||
| 593 | remote_filter = g_strdup(ws_optarg)g_strdup_inline (ws_optarg); | |||
| 594 | break; | |||
| 595 | ||||
| 596 | case OPT_REMOTE_COUNT: | |||
| 597 | if (!ws_strtou32(ws_optarg, NULL((void*)0), &count)) { | |||
| 598 | ws_warning("Invalid value for count: %s", ws_optarg)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 598, __func__, "Invalid value for count: %s", ws_optarg); } } while (0); | |||
| 599 | goto end; | |||
| 600 | } | |||
| 601 | break; | |||
| 602 | ||||
| 603 | case OPT_REMOTE_NOPROM: | |||
| 604 | noprom = true1; | |||
| 605 | break; | |||
| 606 | ||||
| 607 | case ':': | |||
| 608 | /* missing option argument */ | |||
| 609 | ws_warning("Option '%s' requires an argument", argv[ws_optind - 1])do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 609, __func__, "Option '%s' requires an argument", argv[ws_optind - 1]); } } while (0); | |||
| 610 | break; | |||
| 611 | ||||
| 612 | default: | |||
| 613 | if (!extcap_base_parse_options(extcap_conf, result - EXTCAP_OPT_LIST_INTERFACES, ws_optarg)) { | |||
| 614 | ws_warning("Invalid option: %s", argv[ws_optind - 1])do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 614, __func__, "Invalid option: %s", argv[ws_optind - 1]); } } while (0); | |||
| 615 | goto end; | |||
| 616 | } | |||
| 617 | } | |||
| 618 | } | |||
| 619 | ||||
| 620 | extcap_cmdline_debug(argv, argc); | |||
| 621 | ||||
| 622 | if (extcap_base_handle_interface(extcap_conf)) { | |||
| 623 | ret = EXIT_SUCCESS0; | |||
| 624 | goto end; | |||
| 625 | } | |||
| 626 | ||||
| 627 | if (extcap_conf->show_config) { | |||
| 628 | ret = list_config(extcap_conf->interface, ssh_params->port); | |||
| 629 | goto end; | |||
| 630 | } | |||
| 631 | ||||
| 632 | err_msg = ws_init_sockets(); | |||
| 633 | if (err_msg != NULL((void*)0)) { | |||
| 634 | ws_warning("ERROR: %s", err_msg)do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 634, __func__, "ERROR: %s", err_msg); } } while (0); | |||
| 635 | g_free(err_msg); | |||
| 636 | ws_warning("%s", please_report_bug())do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 636, __func__, "%s", please_report_bug()); } } while (0); | |||
| 637 | goto end; | |||
| 638 | } | |||
| 639 | ||||
| 640 | if (extcap_conf->capture) { | |||
| 641 | char* filter; | |||
| 642 | char* privilege; | |||
| 643 | ||||
| 644 | if (!ssh_params->host) { | |||
| 645 | ws_warning("Missing parameter: --remote-host")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_WARNING, "extcap/sshdump.c" , 645, __func__, "Missing parameter: --remote-host"); } } while (0); | |||
| 646 | goto end; | |||
| 647 | } | |||
| 648 | ||||
| 649 | if ((priv
| |||
| 650 | if ((priv_user) && strlen(g_strstrip(priv_user)g_strchomp (g_strchug (priv_user)))) | |||
| 651 | /* Both sudo and doas use the same command line option */ | |||
| 652 | privilege = g_strconcat(priv, " -u ", priv_user, NULL((void*)0)); | |||
| 653 | else | |||
| 654 | privilege = g_strdup(priv)g_strdup_inline (priv); | |||
| 655 | } else { | |||
| 656 | privilege = g_strdup("")g_strdup_inline (""); | |||
| 657 | } | |||
| 658 | ||||
| 659 | // This may result in the use of a different port number than was given in | |||
| 660 | // the default filter string, as presented in the config dialog. The default | |||
| 661 | // given is always using the default SSH port since there's no remote SSH port | |||
| 662 | // given on the command line to get the extcap arguments. | |||
| 663 | // However the remote SSH port used here is the one given on the command line | |||
| 664 | // when the capture us started, which is the intended one. | |||
| 665 | // And this is only happening when no remote filter is specified on the command | |||
| 666 | // line to start the capture. | |||
| 667 | if (remote_filter
| |||
| 668 | remote_filter = local_interfaces_to_filter(ssh_params->port); | |||
| 669 | filter = concat_filters(extcap_conf->capture_filter, remote_filter); | |||
| 670 | ssh_params_set_log_level(ssh_params, extcap_conf->debug); | |||
| 671 | ret = ssh_open_remote_connection(ssh_params, remote_interface, | |||
| 672 | filter, remote_capture_command_select, remote_capture_command, | |||
| 673 | privilege, noprom, count, extcap_conf->fifo); | |||
| 674 | g_free(filter); | |||
| 675 | g_free(privilege); | |||
| 676 | } else { | |||
| 677 | ws_debug("You should not come here... maybe some parameter missing?")do { if (1) { ws_log_full("sshdump", LOG_LEVEL_DEBUG, "extcap/sshdump.c" , 677, __func__, "You should not come here... maybe some parameter missing?" ); } } while (0); | |||
| 678 | ret = EXIT_FAILURE1; | |||
| 679 | } | |||
| 680 | ||||
| 681 | end: | |||
| 682 | /* clean up stuff */ | |||
| 683 | ssh_params_free(ssh_params); | |||
| 684 | g_free(remote_capture_command_select); | |||
| 685 | g_free(remote_capture_command); | |||
| 686 | g_free(remote_interface); | |||
| 687 | g_free(remote_filter); | |||
| 688 | g_free(priv); | |||
| 689 | g_free(priv_user); | |||
| 690 | extcap_base_cleanup(&extcap_conf); | |||
| 691 | return ret; | |||
| 692 | } | |||
| 693 | ||||
| 694 | /* | |||
| 695 | * Editor modelines - https://www.wireshark.org/tools/modelines.html | |||
| 696 | * | |||
| 697 | * Local variables: | |||
| 698 | * c-basic-offset: 8 | |||
| 699 | * tab-width: 8 | |||
| 700 | * indent-tabs-mode: t | |||
| 701 | * End: | |||
| 702 | * | |||
| 703 | * vi: set shiftwidth=8 tabstop=8 noexpandtab: | |||
| 704 | * :indentSize=8:tabSize=8:noTabs=false: | |||
| 705 | */ |