print-syslog.c revision 1.9
1/*
2 * Copyright (c) 1998-2004  Hannes Gredler <hannes@gredler.at>
3 *      The TCPDUMP project
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code
7 * distributions retain the above copyright notice and this paragraph
8 * in its entirety, and (2) distributions including binary code include
9 * the above copyright notice and this paragraph in its entirety in
10 * the documentation or other materials provided with the distribution.
11 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
12 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
13 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
14 * FOR A PARTICULAR PURPOSE.
15 */
16
17#include <sys/cdefs.h>
18#ifndef lint
19__RCSID("$NetBSD: print-syslog.c,v 1.9 2023/08/17 20:19:40 christos Exp $");
20#endif
21
22/* \summary: Syslog protocol printer */
23/* specification: RFC 3164 (not RFC 5424) */
24
25#ifdef HAVE_CONFIG_H
26#include <config.h>
27#endif
28
29#include "netdissect-stdinc.h"
30
31#include "netdissect.h"
32#include "extract.h"
33
34
35/*
36 * tokenlists and #defines taken from Ethereal - Network traffic analyzer
37 * by Gerald Combs <gerald@ethereal.com>
38 */
39
40#define SYSLOG_SEVERITY_MASK 0x0007  /* 0000 0000 0000 0111 */
41#define SYSLOG_FACILITY_MASK 0x03f8  /* 0000 0011 1111 1000 */
42#define SYSLOG_MAX_DIGITS 3 /* The maximum number of priority digits to read in. */
43
44static const struct tok syslog_severity_values[] = {
45  { 0,      "emergency" },
46  { 1,      "alert" },
47  { 2,      "critical" },
48  { 3,      "error" },
49  { 4,      "warning" },
50  { 5,      "notice" },
51  { 6,      "info" },
52  { 7,      "debug" },
53  { 0, NULL },
54};
55
56static const struct tok syslog_facility_values[] = {
57  { 0,     "kernel" },
58  { 1,     "user" },
59  { 2,     "mail" },
60  { 3,     "daemon" },
61  { 4,     "auth" },
62  { 5,     "syslog" },
63  { 6,     "lpr" },
64  { 7,     "news" },
65  { 8,     "uucp" },
66  { 9,     "cron" },
67  { 10,    "authpriv" },
68  { 11,    "ftp" },
69  { 12,    "ntp" },
70  { 13,    "security" },
71  { 14,    "console" },
72  { 15,    "cron" },
73  { 16,    "local0" },
74  { 17,    "local1" },
75  { 18,    "local2" },
76  { 19,    "local3" },
77  { 20,    "local4" },
78  { 21,    "local5" },
79  { 22,    "local6" },
80  { 23,    "local7" },
81  { 0, NULL },
82};
83
84void
85syslog_print(netdissect_options *ndo,
86             const u_char *pptr, u_int len)
87{
88    uint16_t msg_off = 0;
89    uint16_t pri = 0;
90    uint16_t facility,severity;
91
92    ndo->ndo_protocol = "syslog";
93    /* extract decimal figures that are
94     * encapsulated within < > tags
95     * based on this decimal figure extract the
96     * severity and facility values
97     */
98
99    if (GET_U_1(pptr) != '<')
100        goto invalid;
101    msg_off++;
102
103    while (msg_off <= SYSLOG_MAX_DIGITS &&
104           GET_U_1(pptr + msg_off) >= '0' &&
105           GET_U_1(pptr + msg_off) <= '9') {
106        pri = pri * 10 + (GET_U_1(pptr + msg_off) - '0');
107        msg_off++;
108    }
109
110    if (GET_U_1(pptr + msg_off) != '>')
111        goto invalid;
112    msg_off++;
113
114    facility = (pri & SYSLOG_FACILITY_MASK) >> 3;
115    severity = pri & SYSLOG_SEVERITY_MASK;
116
117    if (ndo->ndo_vflag < 1 )
118    {
119        ND_PRINT("SYSLOG %s.%s, length: %u",
120               tok2str(syslog_facility_values, "unknown (%u)", facility),
121               tok2str(syslog_severity_values, "unknown (%u)", severity),
122               len);
123        return;
124    }
125
126    ND_PRINT("SYSLOG, length: %u\n\tFacility %s (%u), Severity %s (%u)\n\tMsg: ",
127           len,
128           tok2str(syslog_facility_values, "unknown (%u)", facility),
129           facility,
130           tok2str(syslog_severity_values, "unknown (%u)", severity),
131           severity);
132
133    /* print the syslog text in verbose mode */
134    /*
135     * RFC 3164 Section 4.1.3: "There is no ending delimiter to this part.
136     * The MSG part of the syslog packet MUST contain visible (printing)
137     * characters."
138     *
139     * RFC 5424 Section 8.2: "This document does not impose any mandatory
140     * restrictions on the MSG or PARAM-VALUE content.  As such, they MAY
141     * contain control characters, including the NUL character."
142     *
143     * Hence, to aid in protocol debugging, print the full MSG without
144     * beautification to make it clear what was transmitted on the wire.
145     */
146    if (len > msg_off)
147        (void)nd_printn(ndo, pptr + msg_off, len - msg_off, NULL);
148
149    if (ndo->ndo_vflag > 1)
150        print_unknown_data(ndo, pptr, "\n\t", len);
151    return;
152
153invalid:
154    nd_print_invalid(ndo);
155}
156