line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Sniffer::HTTP; |
2
|
4
|
|
|
4
|
|
155233
|
use strict; |
|
4
|
|
|
|
|
11
|
|
|
4
|
|
|
|
|
1361
|
|
3
|
4
|
|
|
4
|
|
3379
|
use Sniffer::Connection::HTTP; |
|
4
|
|
|
|
|
16
|
|
|
4
|
|
|
|
|
37
|
|
4
|
4
|
|
|
4
|
|
162
|
use base 'Class::Accessor'; |
|
4
|
|
|
|
|
8
|
|
|
4
|
|
|
|
|
321
|
|
5
|
4
|
|
|
4
|
|
25
|
use Data::Dumper; |
|
4
|
|
|
|
|
10
|
|
|
4
|
|
|
|
|
269
|
|
6
|
4
|
|
|
4
|
|
5442
|
use NetPacket::Ethernet; |
|
4
|
|
|
|
|
5965
|
|
|
4
|
|
|
|
|
264
|
|
7
|
4
|
|
|
4
|
|
3620
|
use NetPacket::IP; |
|
4
|
|
|
|
|
6350
|
|
|
4
|
|
|
|
|
178
|
|
8
|
4
|
|
|
4
|
|
26
|
use NetPacket::TCP; |
|
4
|
|
|
|
|
7
|
|
|
4
|
|
|
|
|
310
|
|
9
|
4
|
|
|
4
|
|
6205
|
use Net::Pcap; # just for the convenience function below |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
use Net::Pcap::FindDevice; |
11
|
|
|
|
|
|
|
use Carp qw(croak); |
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
use vars qw($VERSION); |
14
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
$VERSION = '0.23'; |
16
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
=head1 NAME |
18
|
|
|
|
|
|
|
|
19
|
|
|
|
|
|
|
Sniffer::HTTP - multi-connection sniffer driver |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=head1 SYNOPSIS |
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
use Sniffer::HTTP; |
24
|
|
|
|
|
|
|
my $VERBOSE = 0; |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
my $sniffer = Sniffer::HTTP->new( |
27
|
|
|
|
|
|
|
callbacks => { |
28
|
|
|
|
|
|
|
request => sub { my ($req,$conn) = @_; print $req->uri,"\n" if $req }, |
29
|
|
|
|
|
|
|
response => sub { my ($res,$req,$conn) = @_; print $res->code,"\n" }, |
30
|
|
|
|
|
|
|
log => sub { print $_[0] if $VERBOSE }, |
31
|
|
|
|
|
|
|
tcp_log => sub { print $_[0] if $VERBOSE > 1 }, |
32
|
|
|
|
|
|
|
}, |
33
|
|
|
|
|
|
|
timeout => 5*60, # seconds after which a connection is considered stale |
34
|
|
|
|
|
|
|
stale_connection |
35
|
|
|
|
|
|
|
=> sub { my ($s,$conn,$key); |
36
|
|
|
|
|
|
|
$s->log->("Connection $key is stale."); |
37
|
|
|
|
|
|
|
$s->remove_connection($key); |
38
|
|
|
|
|
|
|
}, |
39
|
|
|
|
|
|
|
); |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
$sniffer->run(); # uses the "best" default device |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
# Or, if you want to feed it the packets yourself: |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
while (1) { |
46
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
# retrieve ethernet packet into $eth, |
48
|
|
|
|
|
|
|
# for example via Net::Pcap |
49
|
|
|
|
|
|
|
my $eth = sniff_ethernet_packet; |
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
# And handle the packet. Callbacks will be invoked as soon |
52
|
|
|
|
|
|
|
# as complete data is available |
53
|
|
|
|
|
|
|
$sniffer->handle_eth_packet($eth); |
54
|
|
|
|
|
|
|
}; |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
This driver gives you callbacks with the completely accumulated |
57
|
|
|
|
|
|
|
Ls or Ls as sniffed from the |
58
|
|
|
|
|
|
|
TCP traffic. You need to feed it the Ethernet, IP or TCP packets |
59
|
|
|
|
|
|
|
either from a dump file or from L by unpacking them via |
60
|
|
|
|
|
|
|
L. |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
As the whole response data is accumulated in memory you should |
63
|
|
|
|
|
|
|
be aware of memory issues. If you want to write stuff |
64
|
|
|
|
|
|
|
directly to disk, you will need to submit patches to L. |
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
A good example to start from is the C |
67
|
|
|
|
|
|
|
script that comes with the distribution. |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
=head1 METHODS |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
=head2 C<< new %ARGS >> |
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
Creates a new object for handling many HTTP requests. |
74
|
|
|
|
|
|
|
You can pass in the following arguments: |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
=over 4 |
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=item * |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
C - preexisting connections (optional) |
81
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
=item * |
83
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
C - callbacks for the new connections (hash reference) |
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
=item * |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
C - timeout in seconds after which a connection is considered stale |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
=item * |
91
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
C - callback for stale connections |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
=item * |
95
|
|
|
|
|
|
|
|
96
|
|
|
|
|
|
|
C - maximum size of data to capture per packet. The default is 16384, |
97
|
|
|
|
|
|
|
which should be plenty for all cases. |
98
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
=back |
100
|
|
|
|
|
|
|
|
101
|
|
|
|
|
|
|
Usually, you will want to create a new object like this: |
102
|
|
|
|
|
|
|
|
103
|
|
|
|
|
|
|
my $sniffer = Sniffer::HTTP->new( callbacks => { |
104
|
|
|
|
|
|
|
request => sub { my ($req, $conn) = @_; print $req->uri,"\n"; }, |
105
|
|
|
|
|
|
|
response => sub { my ($res,$req,$conn) = @_; print $res->code,"\n"; }, |
106
|
|
|
|
|
|
|
}); |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
except that you will likely do more work than this example. |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
=cut |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
__PACKAGE__->mk_accessors(qw(connections callbacks timeout pcap_device stale_connection snaplen)); |
113
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
sub new { |
115
|
|
|
|
|
|
|
my ($class,%args) = @_; |
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
$args{connections} ||= {}; |
118
|
|
|
|
|
|
|
$args{callbacks} ||= {}; |
119
|
|
|
|
|
|
|
$args{callbacks}->{log} ||= sub {}; |
120
|
|
|
|
|
|
|
$args{stale_connection} ||= sub { |
121
|
|
|
|
|
|
|
my ($s,$conn,$key) = @_; |
122
|
|
|
|
|
|
|
$conn->log->("$key is stale."); |
123
|
|
|
|
|
|
|
$s->remove_connection($key); |
124
|
|
|
|
|
|
|
}; |
125
|
|
|
|
|
|
|
$args{ snaplen } ||= 16384; |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
$args{timeout} = 300 |
128
|
|
|
|
|
|
|
unless exists $args{timeout}; |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
my $self = $class->SUPER::new(\%args); |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
my $user_closed = delete $args{callbacks}->{closed}; |
133
|
|
|
|
|
|
|
$args{callbacks}->{closed} = sub { |
134
|
|
|
|
|
|
|
my $key = $_[0]->flow; |
135
|
|
|
|
|
|
|
if (! exists $args{connections}->{$key}) { |
136
|
|
|
|
|
|
|
warn "Error: flow() ne connection-key!"; |
137
|
|
|
|
|
|
|
$key = join ":", reverse split /:/, $key; |
138
|
|
|
|
|
|
|
}; |
139
|
|
|
|
|
|
|
$_[0]->{log}->("Removing $key"); |
140
|
|
|
|
|
|
|
$self->remove_connection($key); |
141
|
|
|
|
|
|
|
goto &$user_closed |
142
|
|
|
|
|
|
|
if $user_closed; |
143
|
|
|
|
|
|
|
}; |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
$self; |
146
|
|
|
|
|
|
|
}; |
147
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
=head2 C<< $sniffer->remove_connection KEY >> |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
Removes a connection (or a key) from the list |
151
|
|
|
|
|
|
|
of connections. This will not have the intended |
152
|
|
|
|
|
|
|
effect if the connection is still alive, as it |
153
|
|
|
|
|
|
|
will be recreated as soon as the next packet |
154
|
|
|
|
|
|
|
for it is received. |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
=cut |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
sub remove_connection { |
159
|
|
|
|
|
|
|
my ($self,$key) = @_; |
160
|
|
|
|
|
|
|
if (ref $key) { |
161
|
|
|
|
|
|
|
my $real_key = $key->flow; |
162
|
|
|
|
|
|
|
if (! exists $self->connections->{$real_key}) { |
163
|
|
|
|
|
|
|
warn "Error: flow() ne connection-key!"; |
164
|
|
|
|
|
|
|
$real_key = join ":", reverse split /:/, $real_key; |
165
|
|
|
|
|
|
|
}; |
166
|
|
|
|
|
|
|
$key = $real_key; |
167
|
|
|
|
|
|
|
}; |
168
|
|
|
|
|
|
|
delete $self->connections->{$key}; |
169
|
|
|
|
|
|
|
}; |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
=head2 C<< $sniffer->find_or_create_connection TCP, %ARGS >> |
172
|
|
|
|
|
|
|
|
173
|
|
|
|
|
|
|
This parses a TCP packet and creates the TCP connection |
174
|
|
|
|
|
|
|
to keep track of the packet order and resent packets. |
175
|
|
|
|
|
|
|
|
176
|
|
|
|
|
|
|
=cut |
177
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
sub find_or_create_connection { |
179
|
|
|
|
|
|
|
my ($self,$tcp) = @_; |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
my $connections = $self->connections; |
182
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
# Implement find_or_create() for connections in |
184
|
|
|
|
|
|
|
# the base class ... |
185
|
|
|
|
|
|
|
my $key = $tcp->{src_port} . ":" . $tcp->{dest_port}; |
186
|
|
|
|
|
|
|
if (! exists $connections->{$key}) { |
187
|
|
|
|
|
|
|
my $key2 = $tcp->{dest_port} . ":" . $tcp->{src_port}; |
188
|
|
|
|
|
|
|
if (! exists $connections->{$key2}) { |
189
|
|
|
|
|
|
|
$self->callbacks->{log}->("Creating connection $key, sequence start at " . $tcp->{seqnum}); |
190
|
|
|
|
|
|
|
my $c = $self->callbacks; |
191
|
|
|
|
|
|
|
my $o = Sniffer::Connection::HTTP->new( |
192
|
|
|
|
|
|
|
%$c, |
193
|
|
|
|
|
|
|
tcp => $tcp, |
194
|
|
|
|
|
|
|
); |
195
|
|
|
|
|
|
|
$connections->{$key} = $o; |
196
|
|
|
|
|
|
|
} else { |
197
|
|
|
|
|
|
|
$key = $key2 |
198
|
|
|
|
|
|
|
}; |
199
|
|
|
|
|
|
|
}; |
200
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
return $connections->{$key}; |
202
|
|
|
|
|
|
|
}; |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
=head2 C<< $sniffer->stale_connections( TIMEOUT, TIMESTAMP, HANDLER ) >> |
205
|
|
|
|
|
|
|
|
206
|
|
|
|
|
|
|
Will call the handler HANDLER for all connections that |
207
|
|
|
|
|
|
|
have a C before TIMESTAMP - TIMEOUT. |
208
|
|
|
|
|
|
|
|
209
|
|
|
|
|
|
|
All parameters are optional and default to: |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
TIMEOUT - $sniffer->timeout |
212
|
|
|
|
|
|
|
TIMESTAMP - time() |
213
|
|
|
|
|
|
|
HANDLER - $sniffer->stale_connection |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
It returns all stale connections. |
216
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
=cut |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
sub stale_connections { |
220
|
|
|
|
|
|
|
my ($self,$timeout,$timestamp,$handler) = @_; |
221
|
|
|
|
|
|
|
$timeout ||= $self->timeout; |
222
|
|
|
|
|
|
|
$handler ||= $self->stale_connection; |
223
|
|
|
|
|
|
|
$timestamp ||= time(); |
224
|
|
|
|
|
|
|
|
225
|
|
|
|
|
|
|
my $cutoff = $timestamp - $timeout; |
226
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
my $connections = $self->connections; |
228
|
|
|
|
|
|
|
my @stale = grep { $connections->{$_}->last_activity < $cutoff } keys %$connections; |
229
|
|
|
|
|
|
|
for my $connection (@stale) { |
230
|
|
|
|
|
|
|
$handler->($self, $connections->{$connection}, $connection); |
231
|
|
|
|
|
|
|
}; |
232
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
map {$connections->{$_}} @stale |
234
|
|
|
|
|
|
|
}; |
235
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
=head2 C<< $sniffer->live_connections TIMEOUT, TIMESTAMP >> |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
Returns all live connections. No callback |
239
|
|
|
|
|
|
|
mechanism is provided here. |
240
|
|
|
|
|
|
|
|
241
|
|
|
|
|
|
|
The defaults are |
242
|
|
|
|
|
|
|
TIMEOUT - $sniffer->timeout |
243
|
|
|
|
|
|
|
TIMESTAMP - time() |
244
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
=cut |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
sub live_connections { |
248
|
|
|
|
|
|
|
my ($self,$timeout,$timestamp) = @_; |
249
|
|
|
|
|
|
|
$timeout ||= $self->timeout; |
250
|
|
|
|
|
|
|
$timestamp ||= time(); |
251
|
|
|
|
|
|
|
|
252
|
|
|
|
|
|
|
my $cutoff = $timestamp - $timeout; |
253
|
|
|
|
|
|
|
|
254
|
|
|
|
|
|
|
my $connections = $self->connections; |
255
|
|
|
|
|
|
|
grep { $_->last_activity >= $cutoff } values %$connections; |
256
|
|
|
|
|
|
|
}; |
257
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
=head2 C<< $sniffer->handle_eth_packet ETH [, TIMESTAMP] >> |
259
|
|
|
|
|
|
|
|
260
|
|
|
|
|
|
|
Processes a raw ethernet packet. L will return |
261
|
|
|
|
|
|
|
this kind of packet for most Ethernet network cards. |
262
|
|
|
|
|
|
|
|
263
|
|
|
|
|
|
|
You need to call this method (or one of the other protocol |
264
|
|
|
|
|
|
|
methods) for every packet you wish to handle. |
265
|
|
|
|
|
|
|
|
266
|
|
|
|
|
|
|
The optional TIMESTAMP corresponds to the epoch time |
267
|
|
|
|
|
|
|
the packet was captured at. It defaults to the value |
268
|
|
|
|
|
|
|
of C |
269
|
|
|
|
|
|
|
|
270
|
|
|
|
|
|
|
=cut |
271
|
|
|
|
|
|
|
|
272
|
|
|
|
|
|
|
sub handle_eth_packet { |
273
|
|
|
|
|
|
|
my ($self,$eth,$ts) = @_; |
274
|
|
|
|
|
|
|
$ts ||= time(); |
275
|
|
|
|
|
|
|
#warn Dumper( NetPacket::Ethernet->decode($eth) ); |
276
|
|
|
|
|
|
|
$self->handle_ip_packet(NetPacket::Ethernet->decode($eth)->{data}, $ts); |
277
|
|
|
|
|
|
|
}; |
278
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
=head2 C<< $sniffer->handle_ip_packet IP [, TIMESTAMP] >> |
280
|
|
|
|
|
|
|
|
281
|
|
|
|
|
|
|
Processes a raw ip packet. |
282
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
The optional TIMESTAMP corresponds to the epoch time |
284
|
|
|
|
|
|
|
the packet was captured at. It defaults to the value |
285
|
|
|
|
|
|
|
of C |
286
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
=cut |
288
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
sub handle_ip_packet { |
290
|
|
|
|
|
|
|
my ($self,$ip,$ts) = @_; |
291
|
|
|
|
|
|
|
$ts ||= time(); |
292
|
|
|
|
|
|
|
#warn Dumper( NetPacket::IP->decode($ip) ); |
293
|
|
|
|
|
|
|
# This is a workaround around a bug in NetPacket::IP v0.04, which sets the |
294
|
|
|
|
|
|
|
# payload to include the trailer |
295
|
|
|
|
|
|
|
my $i = NetPacket::IP->decode($ip); |
296
|
|
|
|
|
|
|
|
297
|
|
|
|
|
|
|
# Safeguard against malformed IP headers |
298
|
|
|
|
|
|
|
$i->{hlen} = 5 |
299
|
|
|
|
|
|
|
if $i->{hlen} < 5; |
300
|
|
|
|
|
|
|
my $conn = $self->handle_tcp_packet(substr($i->{data}, 0, $i->{len}-($i->{hlen}*4)), $ts); |
301
|
|
|
|
|
|
|
unless($conn->tcp_connection->dest_host) { |
302
|
|
|
|
|
|
|
$conn->tcp_connection->dest_host($i->{dest_ip}); |
303
|
|
|
|
|
|
|
$conn->tcp_connection->src_host($i->{src_ip}); |
304
|
|
|
|
|
|
|
} |
305
|
|
|
|
|
|
|
$conn; |
306
|
|
|
|
|
|
|
}; |
307
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
=head2 C<< $sniffer->handle_tcp_packet TCP [, TIMESTAMP] >> |
309
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
Processes a raw tcp packet. This processes the packet |
311
|
|
|
|
|
|
|
by handing it off to the L which handles |
312
|
|
|
|
|
|
|
the reordering of TCP packets. |
313
|
|
|
|
|
|
|
|
314
|
|
|
|
|
|
|
It returns the L object that |
315
|
|
|
|
|
|
|
handled the packet. |
316
|
|
|
|
|
|
|
|
317
|
|
|
|
|
|
|
The optional TIMESTAMP corresponds to the epoch time |
318
|
|
|
|
|
|
|
the packet was captured at. It defaults to the value |
319
|
|
|
|
|
|
|
of C |
320
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
=cut |
322
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
sub handle_tcp_packet { |
324
|
|
|
|
|
|
|
my ($self,$tcp,$ts) = @_; |
325
|
|
|
|
|
|
|
$ts ||= time(); |
326
|
|
|
|
|
|
|
if (! ref $tcp) { |
327
|
|
|
|
|
|
|
$tcp = NetPacket::TCP->decode($tcp); |
328
|
|
|
|
|
|
|
}; |
329
|
|
|
|
|
|
|
#warn $tcp->{src_port}.":".$tcp->{dest_port};; |
330
|
|
|
|
|
|
|
my $conn = $self->find_or_create_connection($tcp); |
331
|
|
|
|
|
|
|
$conn->handle_packet($tcp,$ts); |
332
|
|
|
|
|
|
|
# Handle callbacks for detection of stale connections |
333
|
|
|
|
|
|
|
$self->stale_connections(); |
334
|
|
|
|
|
|
|
|
335
|
|
|
|
|
|
|
# Return the connection that the packet belongs to |
336
|
|
|
|
|
|
|
$conn; |
337
|
|
|
|
|
|
|
}; |
338
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
=head2 C<< run DEVICE_NAME, PCAP_FILTER, %OPTIONS >> |
340
|
|
|
|
|
|
|
|
341
|
|
|
|
|
|
|
Listens on the given device for all TCP |
342
|
|
|
|
|
|
|
traffic from and to port 80 and invokes the callbacks |
343
|
|
|
|
|
|
|
as necessary. If you want finer control |
344
|
|
|
|
|
|
|
over what C does, you need to set up |
345
|
|
|
|
|
|
|
Net::Pcap yourself. |
346
|
|
|
|
|
|
|
|
347
|
|
|
|
|
|
|
The C parameter is used to determine |
348
|
|
|
|
|
|
|
the device via C from L. |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
The C<%OPTIONS> can be the following options: |
351
|
|
|
|
|
|
|
|
352
|
|
|
|
|
|
|
=over 4 |
353
|
|
|
|
|
|
|
|
354
|
|
|
|
|
|
|
=item * |
355
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
C - filename to which the whole capture stream is |
357
|
|
|
|
|
|
|
written, in L format. |
358
|
|
|
|
|
|
|
|
359
|
|
|
|
|
|
|
This is mostly |
360
|
|
|
|
|
|
|
useful for remote debugging of a problematic |
361
|
|
|
|
|
|
|
sequence of connections. |
362
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
=item * |
364
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
C - a preconfigured Net::Pcap device. |
366
|
|
|
|
|
|
|
|
367
|
|
|
|
|
|
|
This skips the detection of the device by name. If you have special |
368
|
|
|
|
|
|
|
configuration options, configure the device to your needs in your |
369
|
|
|
|
|
|
|
code and then pass it in. |
370
|
|
|
|
|
|
|
|
371
|
|
|
|
|
|
|
=item * |
372
|
|
|
|
|
|
|
|
373
|
|
|
|
|
|
|
C - the netmask to capture on. |
374
|
|
|
|
|
|
|
|
375
|
|
|
|
|
|
|
If you want to skip netmask detection, for example because your |
376
|
|
|
|
|
|
|
capture device has no IP address, you can pass in the netmask |
377
|
|
|
|
|
|
|
through this option. |
378
|
|
|
|
|
|
|
|
379
|
|
|
|
|
|
|
=item * |
380
|
|
|
|
|
|
|
|
381
|
|
|
|
|
|
|
C - size of the L capture buffer |
382
|
|
|
|
|
|
|
|
383
|
|
|
|
|
|
|
The size of this buffer can determine whether you lose packets |
384
|
|
|
|
|
|
|
while processing. A large value led to lost packets in at least one case. |
385
|
|
|
|
|
|
|
The default value is 16384. |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
=item |
388
|
|
|
|
|
|
|
|
389
|
|
|
|
|
|
|
C - the read timeout in ms while waiting for packets. The default is |
390
|
|
|
|
|
|
|
500 ms. |
391
|
|
|
|
|
|
|
|
392
|
|
|
|
|
|
|
=back |
393
|
|
|
|
|
|
|
|
394
|
|
|
|
|
|
|
=cut |
395
|
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
sub run { |
397
|
|
|
|
|
|
|
my ($self,$device_name,$pcap_filter,%options) = @_; |
398
|
|
|
|
|
|
|
|
399
|
|
|
|
|
|
|
$options{ device } ||= find_device($device_name); |
400
|
|
|
|
|
|
|
|
401
|
|
|
|
|
|
|
# Set a name so the error messages look good |
402
|
|
|
|
|
|
|
$device_name = '' |
403
|
|
|
|
|
|
|
if exists $options{ device }; |
404
|
|
|
|
|
|
|
$device_name = '' |
405
|
|
|
|
|
|
|
unless defined $device_name; |
406
|
|
|
|
|
|
|
|
407
|
|
|
|
|
|
|
$pcap_filter ||= "tcp port 80"; |
408
|
|
|
|
|
|
|
$options{ snaplen } ||= $self->snaplen; |
409
|
|
|
|
|
|
|
$options{ timeout } ||= 500; |
410
|
|
|
|
|
|
|
|
411
|
|
|
|
|
|
|
my ($err); |
412
|
|
|
|
|
|
|
if (! $options{ netmask }) { |
413
|
|
|
|
|
|
|
# detect the netmask unless we have a user-specified netmask |
414
|
|
|
|
|
|
|
my ($netmask, $address); |
415
|
|
|
|
|
|
|
if (Net::Pcap::lookupnet($options{ device }, \$address, \$netmask, \$err)) { |
416
|
|
|
|
|
|
|
die "Unable to look up device information for '$device_name': $err"; |
417
|
|
|
|
|
|
|
} |
418
|
|
|
|
|
|
|
warn $err if $err; |
419
|
|
|
|
|
|
|
$options{ netmask } = $netmask; |
420
|
|
|
|
|
|
|
}; |
421
|
|
|
|
|
|
|
|
422
|
|
|
|
|
|
|
# Create packet capture object on device |
423
|
|
|
|
|
|
|
my $pcap = Net::Pcap::open_live($options{ device }, $options{ snaplen }, -1, $options{ timeout }, \$err); |
424
|
|
|
|
|
|
|
unless (defined $pcap) { |
425
|
|
|
|
|
|
|
die "Unable to create packet capture on device '$device_name': $err"; |
426
|
|
|
|
|
|
|
}; |
427
|
|
|
|
|
|
|
|
428
|
|
|
|
|
|
|
$self->pcap_device($pcap); |
429
|
|
|
|
|
|
|
|
430
|
|
|
|
|
|
|
my $filter; |
431
|
|
|
|
|
|
|
Net::Pcap::compile( |
432
|
|
|
|
|
|
|
$pcap, |
433
|
|
|
|
|
|
|
\$filter, |
434
|
|
|
|
|
|
|
$pcap_filter, |
435
|
|
|
|
|
|
|
0, |
436
|
|
|
|
|
|
|
$options{ netmask }, |
437
|
|
|
|
|
|
|
) && die 'Unable to compile packet capture filter'; |
438
|
|
|
|
|
|
|
Net::Pcap::setfilter($pcap,$filter); |
439
|
|
|
|
|
|
|
|
440
|
|
|
|
|
|
|
my $save; |
441
|
|
|
|
|
|
|
if ($options{capture_file}) { |
442
|
|
|
|
|
|
|
$save = Net::Pcap::dump_open($pcap,$options{capture_file}); |
443
|
|
|
|
|
|
|
if(! $save) { |
444
|
|
|
|
|
|
|
warn "Could not save to $options{capture_file}"; |
445
|
|
|
|
|
|
|
}; |
446
|
|
|
|
|
|
|
#END { |
447
|
|
|
|
|
|
|
# # Emergency cleanup |
448
|
|
|
|
|
|
|
# if ($save) { |
449
|
|
|
|
|
|
|
# Net::Pcap::dump_flush($save); |
450
|
|
|
|
|
|
|
# Net::Pcap::dump_close($save); |
451
|
|
|
|
|
|
|
# undef $save; |
452
|
|
|
|
|
|
|
# } |
453
|
|
|
|
|
|
|
#}; |
454
|
|
|
|
|
|
|
}; |
455
|
|
|
|
|
|
|
|
456
|
|
|
|
|
|
|
Net::Pcap::loop($pcap, -1, sub { |
457
|
|
|
|
|
|
|
if ($save) { |
458
|
|
|
|
|
|
|
Net::Pcap::dump($save, @_[1,2]); |
459
|
|
|
|
|
|
|
}; |
460
|
|
|
|
|
|
|
$self->handle_eth_packet($_[2], $_[1]->{tv_sec}); |
461
|
|
|
|
|
|
|
}, '') |
462
|
|
|
|
|
|
|
|| die 'Unable to perform packet capture'; |
463
|
|
|
|
|
|
|
|
464
|
|
|
|
|
|
|
if ($save) { |
465
|
|
|
|
|
|
|
Net::Pcap::dump_flush($save); |
466
|
|
|
|
|
|
|
Net::Pcap::dump_close($save); |
467
|
|
|
|
|
|
|
undef $save; |
468
|
|
|
|
|
|
|
}; |
469
|
|
|
|
|
|
|
}; |
470
|
|
|
|
|
|
|
|
471
|
|
|
|
|
|
|
=head2 C<< run_file FILENAME, PCAP_FILTER >> |
472
|
|
|
|
|
|
|
|
473
|
|
|
|
|
|
|
"Listens" to the packets dumped into |
474
|
|
|
|
|
|
|
a file. This is convenient to use if you |
475
|
|
|
|
|
|
|
have packet captures from a remote machine |
476
|
|
|
|
|
|
|
or want to test new protocol sniffers. |
477
|
|
|
|
|
|
|
|
478
|
|
|
|
|
|
|
The file is presumed to contain an ethernet |
479
|
|
|
|
|
|
|
stream of packets. |
480
|
|
|
|
|
|
|
|
481
|
|
|
|
|
|
|
=cut |
482
|
|
|
|
|
|
|
|
483
|
|
|
|
|
|
|
sub run_file { |
484
|
|
|
|
|
|
|
my ($self, $filename, $pcap_filter) = @_; |
485
|
|
|
|
|
|
|
|
486
|
|
|
|
|
|
|
$pcap_filter ||= "tcp port 80"; |
487
|
|
|
|
|
|
|
|
488
|
|
|
|
|
|
|
my $err; |
489
|
|
|
|
|
|
|
|
490
|
|
|
|
|
|
|
my $pcap = Net::Pcap::open_offline($filename, \$err); |
491
|
|
|
|
|
|
|
unless (defined $pcap) { |
492
|
|
|
|
|
|
|
croak "Unable to create packet capture from filename '$filename': $err"; |
493
|
|
|
|
|
|
|
}; |
494
|
|
|
|
|
|
|
$self->pcap_device($pcap); |
495
|
|
|
|
|
|
|
|
496
|
|
|
|
|
|
|
my $filter; |
497
|
|
|
|
|
|
|
Net::Pcap::compile( |
498
|
|
|
|
|
|
|
$pcap, |
499
|
|
|
|
|
|
|
\$filter, |
500
|
|
|
|
|
|
|
$pcap_filter, |
501
|
|
|
|
|
|
|
0, |
502
|
|
|
|
|
|
|
0, |
503
|
|
|
|
|
|
|
) && die 'Unable to compile packet capture filter'; |
504
|
|
|
|
|
|
|
Net::Pcap::setfilter($pcap,$filter); |
505
|
|
|
|
|
|
|
|
506
|
|
|
|
|
|
|
Net::Pcap::loop($pcap, -1, sub { $self->handle_eth_packet($_[2], $_[1]->{tv_sec}) }, '') |
507
|
|
|
|
|
|
|
}; |
508
|
|
|
|
|
|
|
|
509
|
|
|
|
|
|
|
1; |
510
|
|
|
|
|
|
|
|
511
|
|
|
|
|
|
|
=head1 CALLBACKS |
512
|
|
|
|
|
|
|
|
513
|
|
|
|
|
|
|
=head2 C<< request REQ, CONN >> |
514
|
|
|
|
|
|
|
|
515
|
|
|
|
|
|
|
The C callback is called with the parsed request and the connection |
516
|
|
|
|
|
|
|
object. The request will be an instance of L and will |
517
|
|
|
|
|
|
|
have an absolute URI if possible. Currently, the hostname for the absolute URI |
518
|
|
|
|
|
|
|
is constructed from the C header. |
519
|
|
|
|
|
|
|
|
520
|
|
|
|
|
|
|
=head2 C<< response RES, REQ, CONN >> |
521
|
|
|
|
|
|
|
|
522
|
|
|
|
|
|
|
The C callback is called with the parsed response, the request |
523
|
|
|
|
|
|
|
and the connection object. |
524
|
|
|
|
|
|
|
|
525
|
|
|
|
|
|
|
=head2 C<< log MESSAGE >> |
526
|
|
|
|
|
|
|
|
527
|
|
|
|
|
|
|
The C callback is called whenever the connection makes progress |
528
|
|
|
|
|
|
|
and in other various situations. |
529
|
|
|
|
|
|
|
|
530
|
|
|
|
|
|
|
=head2 C<< tcp_log MESSAGE >> |
531
|
|
|
|
|
|
|
|
532
|
|
|
|
|
|
|
The C callback is passed on to the underlying C |
533
|
|
|
|
|
|
|
object and can be used to monitor the TCP connection. |
534
|
|
|
|
|
|
|
|
535
|
|
|
|
|
|
|
=head2 C<< stale_connection SNIFFER, CONN >> |
536
|
|
|
|
|
|
|
|
537
|
|
|
|
|
|
|
Is called whenever a connection goes over the C limit |
538
|
|
|
|
|
|
|
without any activity. The default handler weeds out stale |
539
|
|
|
|
|
|
|
connections with the following code: |
540
|
|
|
|
|
|
|
|
541
|
|
|
|
|
|
|
sub { |
542
|
|
|
|
|
|
|
my ($self,$conn,$key); |
543
|
|
|
|
|
|
|
$self->log->("Connection $key is stale."); |
544
|
|
|
|
|
|
|
delete $self->connections->{ $key } |
545
|
|
|
|
|
|
|
} |
546
|
|
|
|
|
|
|
|
547
|
|
|
|
|
|
|
=head1 EXAMPLE PCAP FILTERS |
548
|
|
|
|
|
|
|
|
549
|
|
|
|
|
|
|
Here are some example Net::Pcap filters for common things: |
550
|
|
|
|
|
|
|
|
551
|
|
|
|
|
|
|
Capture all HTTP traffic between your machine and C: |
552
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
(dest www.example.com && (tcp port 80)) |
554
|
|
|
|
|
|
|
|| (src www.example.com && (tcp port 80)) |
555
|
|
|
|
|
|
|
|
556
|
|
|
|
|
|
|
Capture all HTTP traffic between your machine |
557
|
|
|
|
|
|
|
and C or C: |
558
|
|
|
|
|
|
|
|
559
|
|
|
|
|
|
|
(dest www1.example.com && (tcp port 80)) |
560
|
|
|
|
|
|
|
||(src www1.example.com && (tcp port 80)) |
561
|
|
|
|
|
|
|
||(dest www2.example.com && (tcp port 80)) |
562
|
|
|
|
|
|
|
||(src www2.example.com && (tcp port 80)) |
563
|
|
|
|
|
|
|
|
564
|
|
|
|
|
|
|
Note that Net::Pcap resolves the IP addresses before using them, so you might |
565
|
|
|
|
|
|
|
actually get more data than you asked for. |
566
|
|
|
|
|
|
|
|
567
|
|
|
|
|
|
|
=head1 BUGS |
568
|
|
|
|
|
|
|
|
569
|
|
|
|
|
|
|
=head2 Closing Connections Properly |
570
|
|
|
|
|
|
|
|
571
|
|
|
|
|
|
|
Currently, it is not well-detected when a connection is closed by the |
572
|
|
|
|
|
|
|
starting side and no C packet is received from the remote side. This |
573
|
|
|
|
|
|
|
can even happen is you close the browser window instead of waiting |
574
|
|
|
|
|
|
|
for the connections to auto-close. |
575
|
|
|
|
|
|
|
|
576
|
|
|
|
|
|
|
I'm not sure how to fix this besides employing better guesswork |
577
|
|
|
|
|
|
|
and "closing" connections as soon as the C packet gets sent. |
578
|
|
|
|
|
|
|
|
579
|
|
|
|
|
|
|
|
580
|
|
|
|
|
|
|
=head2 Small Testsuite |
581
|
|
|
|
|
|
|
|
582
|
|
|
|
|
|
|
The whole module suite has almost no tests. |
583
|
|
|
|
|
|
|
|
584
|
|
|
|
|
|
|
If you experience problems, I supply me with a complete, |
585
|
|
|
|
|
|
|
relevant packet dump as the included C creates. Even |
586
|
|
|
|
|
|
|
better, supply me with (failing) tests. |
587
|
|
|
|
|
|
|
|
588
|
|
|
|
|
|
|
=head1 AUTHOR |
589
|
|
|
|
|
|
|
|
590
|
|
|
|
|
|
|
Max Maischein (corion@cpan.org) |
591
|
|
|
|
|
|
|
|
592
|
|
|
|
|
|
|
=head1 COPYRIGHT |
593
|
|
|
|
|
|
|
|
594
|
|
|
|
|
|
|
Copyright (C) 2005-2011 Max Maischein. All Rights Reserved. |
595
|
|
|
|
|
|
|
|
596
|
|
|
|
|
|
|
This code is free software; you can redistribute it and/or modify it |
597
|
|
|
|
|
|
|
under the same terms as Perl itself. |
598
|
|
|
|
|
|
|
|
599
|
|
|
|
|
|
|
=head1 SEE ALSO |
600
|
|
|
|
|
|
|
|
601
|
|
|
|
|
|
|
L, L, L |
602
|
|
|
|
|
|
|
|
603
|
|
|
|
|
|
|
=cut |