2 * Copyright (c) 1998-2004 Hannes Gredler <hannes@tcpdump.org>
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code
7 * distributions retain the above copyright notice and this paragraph
8 * in its entirety, and (2) distributions including binary code include
9 * the above copyright notice and this paragraph in its entirety in
10 * the documentation or other materials provided with the distribution.
11 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
12 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
13 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
14 * FOR A PARTICULAR PURPOSE.
17 /* \summary: Enhanced Interior Gateway Routing Protocol (EIGRP) printer */
23 #include <netdissect-stdinc.h>
27 #include "netdissect.h"
29 #include "addrtoname.h"
32 * packet format documented at
33 * http://www.rhyshaden.com/eigrp.htm
36 struct eigrp_common_header {
46 #define EIGRP_VERSION 2
48 #define EIGRP_OPCODE_UPDATE 1
49 #define EIGRP_OPCODE_QUERY 3
50 #define EIGRP_OPCODE_REPLY 4
51 #define EIGRP_OPCODE_HELLO 5
52 #define EIGRP_OPCODE_IPXSAP 6
53 #define EIGRP_OPCODE_PROBE 7
55 static const struct tok eigrp_opcode_values[] = {
56 { EIGRP_OPCODE_UPDATE, "Update" },
57 { EIGRP_OPCODE_QUERY, "Query" },
58 { EIGRP_OPCODE_REPLY, "Reply" },
59 { EIGRP_OPCODE_HELLO, "Hello" },
60 { EIGRP_OPCODE_IPXSAP, "IPX SAP" },
61 { EIGRP_OPCODE_PROBE, "Probe" },
65 static const struct tok eigrp_common_header_flag_values[] = {
67 { 0x02, "Conditionally Received" },
71 struct eigrp_tlv_header {
76 #define EIGRP_TLV_GENERAL_PARM 0x0001
77 #define EIGRP_TLV_AUTH 0x0002
78 #define EIGRP_TLV_SEQ 0x0003
79 #define EIGRP_TLV_SW_VERSION 0x0004
80 #define EIGRP_TLV_MCAST_SEQ 0x0005
81 #define EIGRP_TLV_IP_INT 0x0102
82 #define EIGRP_TLV_IP_EXT 0x0103
83 #define EIGRP_TLV_AT_INT 0x0202
84 #define EIGRP_TLV_AT_EXT 0x0203
85 #define EIGRP_TLV_AT_CABLE_SETUP 0x0204
86 #define EIGRP_TLV_IPX_INT 0x0302
87 #define EIGRP_TLV_IPX_EXT 0x0303
89 static const struct tok eigrp_tlv_values[] = {
90 { EIGRP_TLV_GENERAL_PARM, "General Parameters"},
91 { EIGRP_TLV_AUTH, "Authentication"},
92 { EIGRP_TLV_SEQ, "Sequence"},
93 { EIGRP_TLV_SW_VERSION, "Software Version"},
94 { EIGRP_TLV_MCAST_SEQ, "Next Multicast Sequence"},
95 { EIGRP_TLV_IP_INT, "IP Internal routes"},
96 { EIGRP_TLV_IP_EXT, "IP External routes"},
97 { EIGRP_TLV_AT_INT, "AppleTalk Internal routes"},
98 { EIGRP_TLV_AT_EXT, "AppleTalk External routes"},
99 { EIGRP_TLV_AT_CABLE_SETUP, "AppleTalk Cable setup"},
100 { EIGRP_TLV_IPX_INT, "IPX Internal routes"},
101 { EIGRP_TLV_IPX_EXT, "IPX External routes"},
105 struct eigrp_tlv_general_parm_t {
115 struct eigrp_tlv_sw_version_t {
122 struct eigrp_tlv_ip_int_t {
125 uint8_t bandwidth[4];
132 uint8_t destination; /* variable length [1-4] bytes encoding */
135 struct eigrp_tlv_ip_ext_t {
137 uint8_t origin_router[4];
138 uint8_t origin_as[4];
145 uint8_t bandwidth[4];
150 uint8_t reserved2[2];
152 uint8_t destination; /* variable length [1-4] bytes encoding */
155 struct eigrp_tlv_at_cable_setup_t {
156 uint8_t cable_start[2];
157 uint8_t cable_end[2];
158 uint8_t router_id[4];
161 struct eigrp_tlv_at_int_t {
164 uint8_t bandwidth[4];
170 uint8_t cable_start[2];
171 uint8_t cable_end[2];
174 struct eigrp_tlv_at_ext_t {
176 uint8_t origin_router[4];
177 uint8_t origin_as[4];
183 uint8_t bandwidth[4];
188 uint8_t reserved2[2];
189 uint8_t cable_start[2];
190 uint8_t cable_end[2];
193 static const struct tok eigrp_ext_proto_id_values[] = {
204 { 0x0b, "Connected" },
209 eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len)
211 const struct eigrp_common_header *eigrp_com_header;
212 const struct eigrp_tlv_header *eigrp_tlv_header;
213 const u_char *tptr,*tlv_tptr;
214 u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length;
218 const struct eigrp_tlv_general_parm_t *eigrp_tlv_general_parm;
219 const struct eigrp_tlv_sw_version_t *eigrp_tlv_sw_version;
220 const struct eigrp_tlv_ip_int_t *eigrp_tlv_ip_int;
221 const struct eigrp_tlv_ip_ext_t *eigrp_tlv_ip_ext;
222 const struct eigrp_tlv_at_cable_setup_t *eigrp_tlv_at_cable_setup;
223 const struct eigrp_tlv_at_int_t *eigrp_tlv_at_int;
224 const struct eigrp_tlv_at_ext_t *eigrp_tlv_at_ext;
228 eigrp_com_header = (const struct eigrp_common_header *)pptr;
229 ND_TCHECK(*eigrp_com_header);
232 * Sanity checking of the header.
234 if (eigrp_com_header->version != EIGRP_VERSION) {
235 ND_PRINT((ndo, "EIGRP version %u packet not supported",eigrp_com_header->version));
239 /* in non-verbose mode just lets print the basic Message Type*/
240 if (ndo->ndo_vflag < 1) {
241 ND_PRINT((ndo, "EIGRP %s, length: %u",
242 tok2str(eigrp_opcode_values, "unknown (%u)",eigrp_com_header->opcode),
247 /* ok they seem to want to know everything - lets fully decode it */
249 tlen=len-sizeof(struct eigrp_common_header);
251 /* FIXME print other header info */
252 ND_PRINT((ndo, "\n\tEIGRP v%u, opcode: %s (%u), chksum: 0x%04x, Flags: [%s]\n\tseq: 0x%08x, ack: 0x%08x, AS: %u, length: %u",
253 eigrp_com_header->version,
254 tok2str(eigrp_opcode_values, "unknown, type: %u",eigrp_com_header->opcode),
255 eigrp_com_header->opcode,
256 EXTRACT_16BITS(&eigrp_com_header->checksum),
257 tok2str(eigrp_common_header_flag_values,
259 EXTRACT_32BITS(&eigrp_com_header->flags)),
260 EXTRACT_32BITS(&eigrp_com_header->seq),
261 EXTRACT_32BITS(&eigrp_com_header->ack),
262 EXTRACT_32BITS(&eigrp_com_header->asn),
265 tptr+=sizeof(const struct eigrp_common_header);
268 /* did we capture enough for fully decoding the object header ? */
269 ND_TCHECK2(*tptr, sizeof(struct eigrp_tlv_header));
271 eigrp_tlv_header = (const struct eigrp_tlv_header *)tptr;
272 eigrp_tlv_len=EXTRACT_16BITS(&eigrp_tlv_header->length);
273 eigrp_tlv_type=EXTRACT_16BITS(&eigrp_tlv_header->type);
276 if (eigrp_tlv_len < sizeof(struct eigrp_tlv_header) ||
277 eigrp_tlv_len > tlen) {
278 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen);
282 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u",
283 tok2str(eigrp_tlv_values,
289 tlv_tptr=tptr+sizeof(struct eigrp_tlv_header);
290 tlv_tlen=eigrp_tlv_len-sizeof(struct eigrp_tlv_header);
292 /* did we capture enough for fully decoding the object ? */
293 ND_TCHECK2(*tptr, eigrp_tlv_len);
295 switch(eigrp_tlv_type) {
297 case EIGRP_TLV_GENERAL_PARM:
298 tlv_ptr.eigrp_tlv_general_parm = (const struct eigrp_tlv_general_parm_t *)tlv_tptr;
300 ND_PRINT((ndo, "\n\t holdtime: %us, k1 %u, k2 %u, k3 %u, k4 %u, k5 %u",
301 EXTRACT_16BITS(tlv_ptr.eigrp_tlv_general_parm->holdtime),
302 tlv_ptr.eigrp_tlv_general_parm->k1,
303 tlv_ptr.eigrp_tlv_general_parm->k2,
304 tlv_ptr.eigrp_tlv_general_parm->k3,
305 tlv_ptr.eigrp_tlv_general_parm->k4,
306 tlv_ptr.eigrp_tlv_general_parm->k5));
309 case EIGRP_TLV_SW_VERSION:
310 tlv_ptr.eigrp_tlv_sw_version = (const struct eigrp_tlv_sw_version_t *)tlv_tptr;
312 ND_PRINT((ndo, "\n\t IOS version: %u.%u, EIGRP version %u.%u",
313 tlv_ptr.eigrp_tlv_sw_version->ios_major,
314 tlv_ptr.eigrp_tlv_sw_version->ios_minor,
315 tlv_ptr.eigrp_tlv_sw_version->eigrp_major,
316 tlv_ptr.eigrp_tlv_sw_version->eigrp_minor));
319 case EIGRP_TLV_IP_INT:
320 tlv_ptr.eigrp_tlv_ip_int = (const struct eigrp_tlv_ip_int_t *)tlv_tptr;
322 bit_length = tlv_ptr.eigrp_tlv_ip_int->plen;
323 if (bit_length > 32) {
324 ND_PRINT((ndo, "\n\t illegal prefix length %u",bit_length));
327 byte_length = (bit_length + 7) / 8; /* variable length encoding */
328 memset(prefix, 0, 4);
329 memcpy(prefix,&tlv_ptr.eigrp_tlv_ip_int->destination,byte_length);
331 ND_PRINT((ndo, "\n\t IPv4 prefix: %15s/%u, nexthop: ",
332 ipaddr_string(ndo, prefix),
334 if (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_int->nexthop) == 0)
335 ND_PRINT((ndo, "self"));
337 ND_PRINT((ndo, "%s",ipaddr_string(ndo, &tlv_ptr.eigrp_tlv_ip_int->nexthop)));
339 ND_PRINT((ndo, "\n\t delay %u ms, bandwidth %u Kbps, mtu %u, hop %u, reliability %u, load %u",
340 (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_int->delay)/100),
341 EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_int->bandwidth),
342 EXTRACT_24BITS(&tlv_ptr.eigrp_tlv_ip_int->mtu),
343 tlv_ptr.eigrp_tlv_ip_int->hopcount,
344 tlv_ptr.eigrp_tlv_ip_int->reliability,
345 tlv_ptr.eigrp_tlv_ip_int->load));
348 case EIGRP_TLV_IP_EXT:
349 tlv_ptr.eigrp_tlv_ip_ext = (const struct eigrp_tlv_ip_ext_t *)tlv_tptr;
351 bit_length = tlv_ptr.eigrp_tlv_ip_ext->plen;
352 if (bit_length > 32) {
353 ND_PRINT((ndo, "\n\t illegal prefix length %u",bit_length));
356 byte_length = (bit_length + 7) / 8; /* variable length encoding */
357 memset(prefix, 0, 4);
358 memcpy(prefix,&tlv_ptr.eigrp_tlv_ip_ext->destination,byte_length);
360 ND_PRINT((ndo, "\n\t IPv4 prefix: %15s/%u, nexthop: ",
361 ipaddr_string(ndo, prefix),
363 if (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_ext->nexthop) == 0)
364 ND_PRINT((ndo, "self"));
366 ND_PRINT((ndo, "%s",ipaddr_string(ndo, &tlv_ptr.eigrp_tlv_ip_ext->nexthop)));
368 ND_PRINT((ndo, "\n\t origin-router %s, origin-as %u, origin-proto %s, flags [0x%02x], tag 0x%08x, metric %u",
369 ipaddr_string(ndo, tlv_ptr.eigrp_tlv_ip_ext->origin_router),
370 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_ip_ext->origin_as),
371 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_ip_ext->proto_id),
372 tlv_ptr.eigrp_tlv_ip_ext->flags,
373 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_ip_ext->tag),
374 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_ip_ext->metric)));
376 ND_PRINT((ndo, "\n\t delay %u ms, bandwidth %u Kbps, mtu %u, hop %u, reliability %u, load %u",
377 (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_ext->delay)/100),
378 EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_ip_ext->bandwidth),
379 EXTRACT_24BITS(&tlv_ptr.eigrp_tlv_ip_ext->mtu),
380 tlv_ptr.eigrp_tlv_ip_ext->hopcount,
381 tlv_ptr.eigrp_tlv_ip_ext->reliability,
382 tlv_ptr.eigrp_tlv_ip_ext->load));
385 case EIGRP_TLV_AT_CABLE_SETUP:
386 tlv_ptr.eigrp_tlv_at_cable_setup = (const struct eigrp_tlv_at_cable_setup_t *)tlv_tptr;
388 ND_PRINT((ndo, "\n\t Cable-range: %u-%u, Router-ID %u",
389 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_cable_setup->cable_start),
390 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_cable_setup->cable_end),
391 EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_cable_setup->router_id)));
394 case EIGRP_TLV_AT_INT:
395 tlv_ptr.eigrp_tlv_at_int = (const struct eigrp_tlv_at_int_t *)tlv_tptr;
397 ND_PRINT((ndo, "\n\t Cable-Range: %u-%u, nexthop: ",
398 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_int->cable_start),
399 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_int->cable_end)));
401 if (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_int->nexthop) == 0)
402 ND_PRINT((ndo, "self"));
404 ND_PRINT((ndo, "%u.%u",
405 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_int->nexthop),
406 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_int->nexthop[2])));
408 ND_PRINT((ndo, "\n\t delay %u ms, bandwidth %u Kbps, mtu %u, hop %u, reliability %u, load %u",
409 (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_int->delay)/100),
410 EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_int->bandwidth),
411 EXTRACT_24BITS(&tlv_ptr.eigrp_tlv_at_int->mtu),
412 tlv_ptr.eigrp_tlv_at_int->hopcount,
413 tlv_ptr.eigrp_tlv_at_int->reliability,
414 tlv_ptr.eigrp_tlv_at_int->load));
417 case EIGRP_TLV_AT_EXT:
418 tlv_ptr.eigrp_tlv_at_ext = (const struct eigrp_tlv_at_ext_t *)tlv_tptr;
420 ND_PRINT((ndo, "\n\t Cable-Range: %u-%u, nexthop: ",
421 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_ext->cable_start),
422 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_ext->cable_end)));
424 if (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_ext->nexthop) == 0)
425 ND_PRINT((ndo, "self"));
427 ND_PRINT((ndo, "%u.%u",
428 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_ext->nexthop),
429 EXTRACT_16BITS(&tlv_ptr.eigrp_tlv_at_ext->nexthop[2])));
431 ND_PRINT((ndo, "\n\t origin-router %u, origin-as %u, origin-proto %s, flags [0x%02x], tag 0x%08x, metric %u",
432 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_at_ext->origin_router),
433 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_at_ext->origin_as),
434 tok2str(eigrp_ext_proto_id_values,"unknown",tlv_ptr.eigrp_tlv_at_ext->proto_id),
435 tlv_ptr.eigrp_tlv_at_ext->flags,
436 EXTRACT_32BITS(tlv_ptr.eigrp_tlv_at_ext->tag),
437 EXTRACT_16BITS(tlv_ptr.eigrp_tlv_at_ext->metric)));
439 ND_PRINT((ndo, "\n\t delay %u ms, bandwidth %u Kbps, mtu %u, hop %u, reliability %u, load %u",
440 (EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_ext->delay)/100),
441 EXTRACT_32BITS(&tlv_ptr.eigrp_tlv_at_ext->bandwidth),
442 EXTRACT_24BITS(&tlv_ptr.eigrp_tlv_at_ext->mtu),
443 tlv_ptr.eigrp_tlv_at_ext->hopcount,
444 tlv_ptr.eigrp_tlv_at_ext->reliability,
445 tlv_ptr.eigrp_tlv_at_ext->load));
449 * FIXME those are the defined TLVs that lack a decoder
450 * you are welcome to contribute code ;-)
455 case EIGRP_TLV_MCAST_SEQ:
456 case EIGRP_TLV_IPX_INT:
457 case EIGRP_TLV_IPX_EXT:
460 if (ndo->ndo_vflag <= 1)
461 print_unknown_data(ndo,tlv_tptr,"\n\t ",tlv_tlen);
464 /* do we want to see an additionally hexdump ? */
465 if (ndo->ndo_vflag > 1)
466 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",
467 eigrp_tlv_len-sizeof(struct eigrp_tlv_header));
474 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));