Add dns decoder (decodes base64 encoded abuf responses)
This commit is contained in:
		
							
								
								
									
										682
									
								
								abuf.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										682
									
								
								abuf.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,682 @@ | ||||
| # Copyright (c) 2016 RIPE NCC | ||||
| # | ||||
| # This program is free software: you can redistribute it and/or modify | ||||
| # it under the terms of the GNU General Public License as published by | ||||
| # the Free Software Foundation, either version 3 of the License, or | ||||
| # (at your option) any later version. | ||||
| # | ||||
| # This program is distributed in the hope that it will be useful, | ||||
| # but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
| # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||
| # GNU General Public License for more details. | ||||
| # | ||||
| # You should have received a copy of the GNU General Public License | ||||
| # along with this program.  If not, see <http://www.gnu.org/licenses/>. | ||||
|  | ||||
| from __future__ import absolute_import | ||||
|  | ||||
| import base64 | ||||
| import codecs | ||||
| import struct | ||||
|  | ||||
|  | ||||
| def base64_encodebytes(data): | ||||
|     if hasattr(base64, "encodebytes"): | ||||
|         return base64.encodebytes(data) | ||||
|     return base64.encodestring(data) | ||||
|  | ||||
|  | ||||
| class AbufParser(object): | ||||
|  | ||||
|     DNS_CTYPE = "ASCII" | ||||
|  | ||||
|     @classmethod | ||||
|     def parse(cls, buf, options=None): | ||||
|         """ | ||||
|         According to Philip, an abuf is like a TARDIS: it's bigger on the inside | ||||
|         """ | ||||
|  | ||||
|         error = [] | ||||
|         do_header = True | ||||
|         do_question = True | ||||
|         do_answer = True | ||||
|         do_authority = True | ||||
|         do_additional = True | ||||
|         do_options = True | ||||
|  | ||||
|         if options and isinstance(options, dict): | ||||
|             if 'DO_Header' in options and not options['DO_Header']: | ||||
|                 do_header = options['DO_Header'] | ||||
|             if 'DO_Question' in options and not options['DO_Question']: | ||||
|                 do_question = options['DO_Question'] | ||||
|             if 'DO_Answer' in options and not options['DO_Answer']: | ||||
|                 do_answer = options['DO_Answer'] | ||||
|             if 'DO_Authority' in options and not options['DO_Authority']: | ||||
|                 do_authority = options['DO_Authority'] | ||||
|             if 'DO_Additional' in options and not options['DO_Additional']: | ||||
|                 do_additional = options['DO_Additional'] | ||||
|             if 'DO_Options' in options and not options['DO_Options']: | ||||
|                 do_options = options['DO_Options'] | ||||
|  | ||||
|         dnsres = {} | ||||
|         offset = 0 | ||||
|         offset, hdr = cls._parse_header(buf, offset, error) | ||||
|         if do_header: | ||||
|             dnsres['HEADER'] = hdr | ||||
|         for i in range(hdr['QDCOUNT']): | ||||
|             res = cls._do_query(buf, offset, error) | ||||
|             if res is None: | ||||
|                 e = ('additional', offset, ('_do_query failed, additional record %d' % i)) | ||||
|                 error.append(e) | ||||
|                 dnsres['ERROR'] = error | ||||
|                 return dnsres | ||||
|             offset, qry = res | ||||
|             if do_question: | ||||
|                 if i == 0: | ||||
|                     dnsres['QuestionSection'] = [qry] | ||||
|                 else: | ||||
|                     dnsres['QuestionSection'].append(qry) | ||||
|         for i in range(hdr['ANCOUNT']): | ||||
|             res = cls._do_rr(buf, offset, error) | ||||
|             if res is None: | ||||
|                 e = ('additional', offset, ('_do_rr failed, additional record %d' % i)) | ||||
|                 error.append(e) | ||||
|                 dnsres['ERROR'] = error | ||||
|                 return dnsres | ||||
|             offset, rr = res | ||||
|             if do_answer: | ||||
|                 if i == 0: | ||||
|                     dnsres['AnswerSection'] = [rr] | ||||
|                 else: | ||||
|                     dnsres['AnswerSection'].append(rr) | ||||
|         for i in range(hdr['NSCOUNT']): | ||||
|             res = cls._do_rr(buf, offset, error) | ||||
|             if res is None: | ||||
|                 e = ('additional', offset, ('_do_rr failed, additional record %d' % i)) | ||||
|                 error.append(e) | ||||
|                 dnsres['ERROR'] = error | ||||
|                 return dnsres | ||||
|             offset, rr = res | ||||
|             if do_authority: | ||||
|                 if i == 0: | ||||
|                     dnsres['AuthoritySection'] = [rr] | ||||
|                 else: | ||||
|                     dnsres['AuthoritySection'].append(rr) | ||||
|         for i in range(hdr['ARCOUNT']): | ||||
|             res = cls._do_rr(buf, offset, error) | ||||
|             if res is None: | ||||
|                 e = ('additional', offset, ('_do_rr failed, additional record %d' % i)) | ||||
|                 error.append(e) | ||||
|                 dnsres['ERROR'] = error | ||||
|                 return dnsres | ||||
|             offset, rr = res | ||||
|             if do_options: | ||||
|                 if "EDNS0" in rr: | ||||
|                     dnsres['EDNS0'] = rr['EDNS0'] | ||||
|                     continue | ||||
|             if do_additional: | ||||
|                 if 'AdditionalSection' in dnsres: | ||||
|                     dnsres['AdditionalSection'].append(rr) | ||||
|                 else: | ||||
|                     dnsres['AdditionalSection'] = [rr] | ||||
|  | ||||
|         if offset < len(buf): | ||||
|             e = ('end', offset, 'trailing garbage, buf size = %d' % len(buf)) | ||||
|             error.append(e) | ||||
|             #result['decodedabufs_with_ERROR'] += 1 | ||||
|             dnsres['ERROR'] = error | ||||
|  | ||||
|         return dnsres | ||||
|  | ||||
|     @staticmethod | ||||
|     def _opcode_to_text(opcode): | ||||
|         return { 0: 'QUERY', 1: 'IQUERY', 2: 'STATUS', | ||||
|                 4: 'NOTIFY', 5: 'UPDATE'}.get(opcode, opcode) | ||||
|  | ||||
|     @staticmethod | ||||
|     def _class_to_text(rdataclass): | ||||
|         return {0: 'RESERVED0', 1: 'IN', 3: 'CH', 4: 'HS', | ||||
|                 254: 'NONE', 255: 'ANY'}.get(rdataclass, rdataclass) | ||||
|  | ||||
|     @staticmethod | ||||
|     def _rcode_to_text(rcode): | ||||
|         return {0: 'NOERROR', 1: 'FORMERR', 2: 'SERVFAIL', 3: 'NXDOMAIN', | ||||
|                 4: 'NOTIMP',  5: 'REFUSED', 6: 'YXDOMAIN', 7: 'YXRRSET', | ||||
|                 8: 'NXRRSET', 9: 'NOTAUTH', 10: 'NOTZONE', | ||||
|                 16: 'BADVERS'}.get(rcode, rcode) | ||||
|  | ||||
|     @staticmethod | ||||
|     def _type_to_text(rdatatype): | ||||
|         return {0: 'NONE', 1: 'A', 2: 'NS', 3: 'MD', 4: 'MF', 5: 'CNAME', 6: 'SOA', | ||||
|                 7: 'MB', 8: 'MG', 9: 'MR', 10: 'NULL', 11: 'WKS', 12: 'PTR', 13: 'HINFO', | ||||
|                 14: 'MINFO', 15: 'MX', 16: 'TXT', 17: 'RP', 18: 'AFSDB', 19: 'X25', | ||||
|                 20: 'ISDN', 21: 'RT', 22: 'NSAP', 23: 'NSAP_PTR', 24: 'SIG', 25: 'KEY', | ||||
|                 26: 'PX', 27: 'GPOS', 28: 'AAAA', 29: 'LOC', 30: 'NXT', 33: 'SRV', | ||||
|                 35: 'NAPTR', 36: 'KX', 37: 'CERT', 38: 'A6', 39: 'DNAME', 41: 'OPT', | ||||
|                 42: 'APL', 43: 'DS', 44: 'SSHFP', 45: 'IPSECKEY', 46: 'RRSIG', 47: 'NSEC', | ||||
|                 48: 'DNSKEY', 49: 'DHCID', 50: 'NSEC3', 51: 'NSEC3PARAM', 52: 'TLSA', | ||||
|                 55: 'HIP', 99: 'SPF', 103: 'UNSPEC', 249: 'TKEY', 250: 'TSIG', 251: 'IXFR', | ||||
|                 252: 'AXFR', 253: 'MAILB', 254: 'MAILA', 255: 'ANY', 32768: 'TA', | ||||
|                 32769: 'DLV'}.get(rdatatype, rdatatype) | ||||
|  | ||||
|     @classmethod | ||||
|     def _bytes_as_hex_str(cls, b): | ||||
|         b_as_hex = codecs.getencoder('hex_codec')(b)[0] | ||||
|         b_as_hex_str = b_as_hex.decode(cls.DNS_CTYPE) | ||||
|         return b_as_hex_str | ||||
|  | ||||
|     @classmethod | ||||
|     def _types_bitmap(cls, data, error): | ||||
|         bits = [] | ||||
|         o = 0 | ||||
|         while o < len(data): | ||||
|             fmt = "!BB" | ||||
|             fmtsz = struct.calcsize(fmt) | ||||
|             dat = data[o:o+fmtsz] | ||||
|             if len(dat) != fmtsz: | ||||
|                 e = ("_types_bitmap", o, 'offset out of range: data size = %d' % len(data)) | ||||
|                 error.append(e) | ||||
|                 return None | ||||
|             block, bytes = struct.unpack(fmt, dat) | ||||
|             o += fmtsz | ||||
|             for i in range(bytes): | ||||
|                 b = struct.unpack("!B", data[o+i:o+i+1])[0] | ||||
|                 for j in range(8): | ||||
|                         if b & (1 << (7-j)): | ||||
|                                 bits.append((block*32+i)*8+j) | ||||
|             o += bytes | ||||
|         return bits | ||||
|  | ||||
|     @classmethod | ||||
|     def _parse_header(cls, buf, offset, error): | ||||
|  | ||||
|         fmt = "!HHHHHH" | ||||
|         reqlen = struct.calcsize(fmt) | ||||
|         strng = buf[offset:offset + reqlen] | ||||
|         if len(strng) != reqlen: | ||||
|             e = ("_parse_header", offset, 'offset out of range: buf size = %d' % len(buf)) | ||||
|             error.append(e) | ||||
|             return None | ||||
|         res = struct.unpack(fmt, strng) | ||||
|         hdr = { | ||||
|             "ID": res[0] | ||||
|         } | ||||
|  | ||||
|         qr = 0x8000 | ||||
|         opcode_mask = 0x7800 | ||||
|         opcode_shift = 11 | ||||
|         aa = 0x0400 | ||||
|         tc = 0x0200 | ||||
|         rd = 0x0100 | ||||
|         ra = 0x0080 | ||||
|         z_mask = 0x0040 | ||||
|         z_shift = 6 | ||||
|         ad = 0x0020 | ||||
|         cd = 0x0010 | ||||
|         rcode_mask = 0x000F | ||||
|         rcode_shift = 0 | ||||
|  | ||||
|         hdr['QR'] = bool(res[1] & qr) | ||||
|         hdr['OpCode'] = cls._opcode_to_text((res[1] & opcode_mask) >> opcode_shift) | ||||
|         hdr['AA'] = bool(res[1] & aa) | ||||
|         hdr['TC'] = bool(res[1] & tc) | ||||
|         hdr['RD'] = bool(res[1] & rd) | ||||
|         hdr['RA'] = bool(res[1] & ra) | ||||
|         hdr['Z'] = (res[1] & z_mask) >> z_shift | ||||
|         hdr['AD'] = bool(res[1] & ad) | ||||
|         hdr['CD'] = bool(res[1] & cd) | ||||
|         hdr['ReturnCode'] = cls._rcode_to_text((res[1] & rcode_mask) >> rcode_shift) | ||||
|         hdr['QDCOUNT'] = res[2] | ||||
|         hdr['ANCOUNT'] = res[3] | ||||
|         hdr['NSCOUNT'] = res[4] | ||||
|         hdr['ARCOUNT'] = res[5] | ||||
|  | ||||
|         return offset + reqlen, hdr | ||||
|  | ||||
|     @classmethod | ||||
|     def _do_query(cls, buf, offset, error): | ||||
|         qry = {} | ||||
|         res = cls._do_name(buf, offset, 0, error) | ||||
|         if res is None: | ||||
|             e = ("_do_query", offset, "_do_name failed") | ||||
|             error.append(e) | ||||
|             return None | ||||
|         offset, name = res | ||||
|         qry['Qname'] = name | ||||
|  | ||||
|         fmt = "!HH" | ||||
|         reqlen = struct.calcsize(fmt) | ||||
|         strng = buf[offset:offset + reqlen] | ||||
|         if len(strng) != reqlen: | ||||
|             e = ("_do_query", offset, 'offset out of range: buf size = %d' % len(buf)) | ||||
|             error.append(e) | ||||
|             return None | ||||
|         res = struct.unpack(fmt, strng) | ||||
|         qry['Qtype'] = cls._type_to_text(res[0]) | ||||
|         qry['Qclass'] = cls._class_to_text(res[1]) | ||||
|  | ||||
|         return offset + reqlen, qry | ||||
|  | ||||
|     @classmethod | ||||
|     def _clean_up_string(cls, strng): | ||||
|         result = '' | ||||
|         strng = bytearray(strng) | ||||
|         for o in strng: | ||||
|             if o < ord(' ') or o > ord('~'): | ||||
|                 result += ("\\%03d" % o) | ||||
|             elif o == ord('"') or o == ord('\\'): | ||||
|                 result += "\\" + chr(o) | ||||
|             else: | ||||
|                 result += chr(o) | ||||
|         return result | ||||
|  | ||||
|     @classmethod | ||||
|     def _do_rr(cls, buf, offset, error): | ||||
|         edns0_opt_nsid = 3  # this is also hardcoded in dns.edns.py | ||||
|         rr = {} | ||||
|         res = cls._do_name(buf, offset, 0, error) | ||||
|         if res is None: | ||||
|             e = ("_do_rr", offset, "_do_name failed") | ||||
|             error.append(e) | ||||
|             return None | ||||
|         offset, name = res | ||||
|         rr['Name'] = name | ||||
|         fmt = "!HHIH" | ||||
|         reqlen = struct.calcsize(fmt) | ||||
|         dat = buf[offset:offset + reqlen] | ||||
|         if len(dat) != reqlen: | ||||
|             e = ("_do_rr", offset, 'offset out of range: buf size = %d' % len(buf)) | ||||
|             error.append(e) | ||||
|             return None | ||||
|         res = struct.unpack(fmt, dat) | ||||
|         rr['Type'] = cls._type_to_text(res[0]) | ||||
|         rr['Class'] = cls._class_to_text(res[1]) | ||||
|         rr['TTL'] = res[2] | ||||
|         rr['RDlength'] = res[3] | ||||
|  | ||||
|         offset += reqlen | ||||
|  | ||||
|         rdata = buf[offset:offset + rr['RDlength']] | ||||
|         rdata_offset = offset | ||||
|  | ||||
|         offset = offset + rr['RDlength'] | ||||
|  | ||||
|         if rr['Type'] == 'OPT':      # this is per cls._type_to_text function | ||||
|             edns0 = { | ||||
|                 'UDPsize':            res[1], | ||||
|                 'ExtendedReturnCode': res[2] >> 24, | ||||
|                 'Version':            (res[2] & 0x00ff0000) >> 16, | ||||
|                 'Z':                  (res[2] & 0x007fff), | ||||
|                 'Type':               'OPT', | ||||
|                 'Option':             [], | ||||
|                 'Name':               name, | ||||
|             } | ||||
|             if res[2] & 0x8000: | ||||
|                 edns0['DO']= True | ||||
|  | ||||
|             o = 0 | ||||
|             while o < len(rdata): | ||||
|                 fmt = "!HH" | ||||
|                 reqlen = struct.calcsize(fmt) | ||||
|                 dat = rdata[o:o + reqlen] | ||||
|                 if len(dat) != reqlen: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 res = struct.unpack(fmt, dat) | ||||
|                 opt = { | ||||
|                     'OptionCode': res[0], | ||||
|                     'OptionLength': res[1], | ||||
|                 } | ||||
|                 o += reqlen | ||||
|                 if opt['OptionCode'] == edns0_opt_nsid: | ||||
|                     opt['OptionName'] = 'NSID' | ||||
|                     nsid = rdata[o:o + opt['OptionLength']] | ||||
|                     nsid_as_str = nsid.decode(cls.DNS_CTYPE) | ||||
|                     opt[opt['OptionName']] = nsid_as_str | ||||
|  | ||||
|                 o = o + opt['OptionLength'] | ||||
|                 edns0['Option'].append(opt) | ||||
|  | ||||
|             del rr['Class'] | ||||
|             del rr['RDlength'] | ||||
|             del rr['TTL'] | ||||
|             del rr['Name'] | ||||
|             del rr['Type'] | ||||
|             rr['EDNS0'] = edns0 | ||||
|             return offset, rr | ||||
|  | ||||
|         if rr['Class'] == "IN": | ||||
|             # this is per cls._type_to_text function | ||||
|             if rr['Type'] == 'A': | ||||
|                 fmt = "!BBBB" | ||||
|                 reqlen = struct.calcsize(fmt) | ||||
|                 if reqlen > len(rdata): | ||||
|                     e = ("_do_rr", rdata_offset, 'rdata too small: size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Address'] = '.'.join(str(byte) for byte in struct.unpack(fmt, rdata)) | ||||
|             elif rr['Type'] == 'AAAA': | ||||
|                 fmt = "!HHHHHHHH" | ||||
|                 reqlen = struct.calcsize(fmt) | ||||
|                 if reqlen > len(rdata): | ||||
|                     e = ("_do_rr", rdata_offset, 'rdata too small: size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 addr = ':'.join(("%x" % quad) for quad in struct.unpack(fmt, rdata)) | ||||
|                 rr['Address'] = addr | ||||
|             elif rr['Type'] == 'CNAME': | ||||
|                 doffset, name = cls._do_name(buf, rdata_offset, 0, error) | ||||
|                 rr['Target'] = name | ||||
|             elif rr['Type'] == 'DNSKEY': | ||||
|                 fmt = '!HBB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Flags'], rr['Protocol'], rr['Algorithm'] =\ | ||||
|                         struct.unpack(fmt, dat) | ||||
|                 key = rdata[struct.calcsize(fmt):] | ||||
|                 key_as_base64 = base64_encodebytes(key) | ||||
|                 key_as_base64_str = key_as_base64.decode(cls.DNS_CTYPE) | ||||
|                 rr['Key'] = ''.join(key_as_base64_str.split()) | ||||
|             elif rr['Type'] == 'DS': | ||||
|  | ||||
|                 fmt = '!HBB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Tag'], rr['Algorithm'], rr['DigestType'] = \ | ||||
|                         struct.unpack(fmt, dat) | ||||
|                 key = rdata[struct.calcsize(fmt):] | ||||
|                 rr['DelegationKey'] = cls._bytes_as_hex_str(key) | ||||
|             elif rr['Type'] == 'HINFO': | ||||
|                 fmt = "!B" | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 o = 0 | ||||
|                 for tag in ('Cpu', 'Os'): | ||||
|                     dat = rdata[o:o+fmtsz] | ||||
|                     if len(dat) != fmtsz: | ||||
|                         e = ("_do_rr", rdata_offset, | ||||
|                              'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                         error.append(e) | ||||
|                         return None | ||||
|                     o += fmtsz | ||||
|                     slen = struct.unpack(fmt, dat)[0] | ||||
|                     strng = rdata[o:o+slen] | ||||
|                     if len(strng) < slen: | ||||
|                         e = ("_do_rr", rdata_offset, | ||||
|                              'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                         error.append(e) | ||||
|                         return None | ||||
|                     rr[tag] = cls._clean_up_string(strng) | ||||
|                     o += slen | ||||
|             elif rr['Type'] == 'MX': | ||||
|                 fmt = '!H' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Preference'] = struct.unpack(fmt, dat)[0] | ||||
|                 rr_offset, rr['MailExchanger'] = cls._do_name(buf, rdata_offset + fmtsz, 0, error) | ||||
|             elif rr['Type'] == 'NS': | ||||
|                 doffset, name = cls._do_name(buf, rdata_offset, 0, error) | ||||
|                 rr['Target'] = name | ||||
|             elif rr['Type'] == 'NSEC': | ||||
|                 doffset, name = cls._do_name(buf, rdata_offset, 0, error) | ||||
|                 rr['NextDomainName'] = name | ||||
|                 o = doffset-rdata_offset | ||||
|                 bits = cls._types_bitmap(rdata[o:rr['RDlength']], error) | ||||
|                 if bits is None: | ||||
|                     e = ("_do_rr", 'failed to parse types bitmap') | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Types'] = bits | ||||
|             elif rr['Type'] == 'NSEC3': | ||||
|                 fmt = '!BBHB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['HashAlg'], rr['Flags'], rr['Iterations'], SaltLength = struct.unpack(fmt, dat) | ||||
|                 o = fmtsz | ||||
|                 salt = rdata[o:o+SaltLength] | ||||
|                 rr['Salt']= cls._bytes_as_hex_str(salt) | ||||
|                 o += SaltLength | ||||
|                 fmt = '!B' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[o:o+fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 HashLength = struct.unpack(fmt, dat)[0] | ||||
|                 o += fmtsz | ||||
|                 hash = rdata[o:o+HashLength] | ||||
|                 b32str = base64.b32encode(hash) | ||||
|                 while b32str[-1] == '=': | ||||
|                         b32str = b32str[:-1] | ||||
|                 # Note that we need extended hexadecimal instead of actual base32 | ||||
|                 # Just remap the input | ||||
|                 hexmap = { | ||||
|                     'A': '0', 'B': '1', 'C': '2', 'D': '3', | ||||
|                     'E': '4', 'F': '5', 'G': '6', 'H': '7', | ||||
|                     'I': '8', 'J': '9', 'K': 'a', 'L': 'b', | ||||
|                     'M': 'c', 'N': 'd', 'O': 'e', 'P': 'f', | ||||
|                     'Q': 'g', 'R': 'h', 'S': 'i', 'T': 'j', | ||||
|                     'U': 'k', 'V': 'l', 'W': 'm', 'X': 'n', | ||||
|                     'Y': 'o', 'Z': 'p', '2': 'q', '3': 'r', | ||||
|                     '4': 's', '5': 't', '6': 'u', '7': 'v' | ||||
|                 } | ||||
|                 b32str = ''.join([hexmap[l] for l in b32str.decode(cls.DNS_CTYPE) ]) | ||||
|                 rr['Hash'] = b32str | ||||
|                 o += HashLength | ||||
|                 bits = cls._types_bitmap(rdata[o:rr['RDlength']], error) | ||||
|                 if bits is None: | ||||
|                     e = ("_do_rr", 'failed to parse types bitmap') | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Types'] = bits | ||||
|             elif rr['Type'] == 'NSEC3PARAM': | ||||
|                 fmt = '!BBHB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Algorithm'], rr['Flags'], rr['Iterations'], SaltLength = struct.unpack(fmt, dat) | ||||
|                 o = fmtsz | ||||
|                 salt = rdata[o:o+SaltLength] | ||||
|                 rr['Salt'] = cls._bytes_as_hex_str(salt) | ||||
|                 o += SaltLength | ||||
|             elif rr['Type'] == 'PTR': | ||||
|                 doffset, name = cls._do_name(buf, rdata_offset, 0, error) | ||||
|                 rr['Target'] = name | ||||
|             elif rr['Type'] == 'RRSIG': | ||||
|                 # https://tools.ietf.org/html/rfc4034#section-3.1 | ||||
|  | ||||
|                 """ The RDATA for an RRSIG RR consists of a 2 octet Type | ||||
|                 Covered field, a 1 octet Algorithm field, a 1 octet Labels | ||||
|                 field, a 4 octet Original  TTL field, a 4 octet Signature | ||||
|                 Expiration field, a 4 octet Signature Inception field, a 2 | ||||
|                 octet Key tag, the Signer's Name field, and the Signature | ||||
|                 field. """ | ||||
|  | ||||
|                 fmt = "!HBBIIIH" | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['TypeCovered'], rr['Algorithm'], rr['Labels'], rr['OriginalTTL'], rr['SignatureExpiration'], rr['SignatureInception'], rr['KeyTag'] = struct.unpack(fmt, dat) | ||||
|                 rr['TypeCovered'] = cls._type_to_text( rr['TypeCovered'] ) | ||||
|  | ||||
|                 res = cls._do_name(rdata, fmtsz, 0, error) | ||||
|                 if res is None: | ||||
|                     e = ("_do_rr", offset, "_do_name failed") | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 signature_offset, rr['SignerName'] = res | ||||
|  | ||||
|                 sig = rdata[signature_offset:] | ||||
|                 #sig_as_base64 = base64.encodebytes(sig) | ||||
|                 sig_as_base64 = base64_encodebytes(sig) | ||||
|                 sig_as_base64_str = sig_as_base64.decode(cls.DNS_CTYPE) | ||||
|                 rr['Signature'] = ''.join(sig_as_base64_str.split()) | ||||
|             elif rr['Type'] == 'SOA': | ||||
|                 offset_name = cls._do_name(buf, rdata_offset, 0, error) | ||||
|                 if offset_name is None: | ||||
|                         e = ("do_rr", rdata_offset, '_do_name failed') | ||||
|                         error.append(e) | ||||
|                         return None | ||||
|                 rr_offset, rr['MasterServerName'] = offset_name | ||||
|                 offset_name = cls._do_name(buf, rr_offset, 0, error) | ||||
|                 if offset_name is None: | ||||
|                         e = ("do_rr", rr_offset, '_do_name failed') | ||||
|                         error.append(e) | ||||
|                         return None | ||||
|                 rr_offset, rr['MaintainerName'] = offset_name | ||||
|                 fmt = '!IIIII' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = buf[rr_offset:rr_offset + fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rr_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['Serial'], rr['Refresh'], rr['Retry'], rr['Expire'], rr['NegativeTtl'] = struct.unpack(fmt, dat) | ||||
|             elif rr['Type'] == 'SRV': | ||||
|                 fmt = '!HHH' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 (rr['Priority'], rr['Weight'], rr['Port']) = struct.unpack(fmt, dat) | ||||
|                 rr_offset, rr['Target'] = cls._do_name(buf, rdata_offset+fmtsz, 0, error) | ||||
|             elif rr['Type'] == 'SSHFP': | ||||
|                 fmt = '!BB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 (rr['Algorithm'], rr['DigestType']) = struct.unpack(fmt, dat) | ||||
|                 rr['Fingerprint'] = cls._bytes_as_hex_str(rdata[fmtsz:]) | ||||
|             elif rr['Type'] == 'TLSA': | ||||
|                 fmt = '!BBB' | ||||
|                 fmtsz = struct.calcsize(fmt) | ||||
|                 dat = rdata[:fmtsz] | ||||
|                 if len(dat) != fmtsz: | ||||
|                     e = ("_do_rr", rdata_offset, 'offset out of range: rdata size = %d' % len(rdata)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 rr['CertUsage'], rr['Selector'], rr['MatchingType']= \ | ||||
|                         struct.unpack(fmt, dat) | ||||
|                 rr['CertAssData'] = cls._bytes_as_hex_str(rdata[fmtsz:]) | ||||
|  | ||||
|         if rr['Type'] == 'TXT': | ||||
|             if rr['Class'] == "IN" or rr['Class'] == "CH": | ||||
|                 fmt = "!B" | ||||
|                 reqlen = struct.calcsize(fmt) | ||||
|                 o = 0 | ||||
|                 rr['Data'] = [] | ||||
|                 while o < len(rdata): | ||||
|                         strng = rdata[o:o+reqlen] | ||||
|                         if len(strng) != reqlen: | ||||
|                             e = ("_do_rr", rdata_offset, | ||||
|                                 'offset out of range: rdata size = %d' % | ||||
|                                 len(rdata)) | ||||
|                             error.append(e) | ||||
|                             return None | ||||
|                         res = struct.unpack(fmt, strng) | ||||
|                         llen = res[0] | ||||
|                         o += reqlen | ||||
|                         strng = rdata[o:o+llen] | ||||
|                         if len(strng) < llen: | ||||
|                             e = ("_do_rr", rdata_offset, | ||||
|                                 'offset out of range: rdata size = %d' % | ||||
|                                 len(rdata)) | ||||
|                             error.append(e) | ||||
|                             return None | ||||
|                         strng = cls._clean_up_string(strng) | ||||
|                         rr['Data'].append(strng) | ||||
|                         o += llen | ||||
|  | ||||
|         if isinstance(rr["Class"], int) or isinstance(rr["Type"], int): | ||||
|             # Unknown class or type. Just add a RDATA field with hex data | ||||
|             rr['Rdata'] = cls._bytes_as_hex_str(rdata) | ||||
|  | ||||
|         return offset, rr | ||||
|  | ||||
|     @classmethod | ||||
|     def _do_name(cls, buf, offset, recurs, error): | ||||
|         if recurs >= 256: | ||||
|             e = ("_do_name", offset, 'too much recursion') | ||||
|             error.append(e) | ||||
|             return None | ||||
|  | ||||
|         name = '' | ||||
|         while True: | ||||
|             fmt = "!B" | ||||
|             reqlen = struct.calcsize(fmt) | ||||
|             strng = buf[offset:offset + reqlen] | ||||
|             if len(strng) != reqlen: | ||||
|                 e = ("_do_name", offset, 'offset out of range: buf size = %d' % len(buf)) | ||||
|                 error.append(e) | ||||
|                 return None | ||||
|             res = struct.unpack(fmt, strng) | ||||
|             llen = res[0] | ||||
|             if llen <= 63: | ||||
|                 # Label | ||||
|                 offset += 1 | ||||
|                 label = buf[offset:offset + llen] | ||||
|                 offset = offset + llen | ||||
|                 label_as_str = cls._clean_up_string(label) | ||||
|                 if name == '' or label_as_str != '': | ||||
|                     name = name + label_as_str + '.' | ||||
|                 if llen == 0: | ||||
|                     break | ||||
|             elif llen >= 0xC0: | ||||
|                 fmt = "!H" | ||||
|                 reqlen = struct.calcsize(fmt) | ||||
|                 strng = buf[offset:offset + reqlen] | ||||
|                 if len(strng) != reqlen: | ||||
|                     e = ("_do_name", offset, 'offset out of range: buf size = %d' % len(buf)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 res = struct.unpack(fmt, strng) | ||||
|                 poffset = res[0] & ~0xC000 | ||||
|                 n = cls._do_name(buf, poffset, recurs+1, error) | ||||
|                 if n is None: | ||||
|                     e = ("_do_name", poffset, | ||||
|                          'bad offset %d at offset %d' % (poffset, offset)) | ||||
|                     error.append(e) | ||||
|                     return None | ||||
|                 poffset, pname = n | ||||
|                 offset += reqlen | ||||
|                 name = name + pname | ||||
|                 break | ||||
|             else: | ||||
|                 e = ("_do_name", offset, 'bad len 0x%x' % llen) | ||||
|                 error.append(e) | ||||
|                 return None | ||||
|  | ||||
|         return offset, name | ||||
|  | ||||
|  | ||||
| __all__ = ( | ||||
|     "DnsResult", | ||||
| ) | ||||
							
								
								
									
										13
									
								
								dns-decoder.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										13
									
								
								dns-decoder.py
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,13 @@ | ||||
| import base64 | ||||
| import sys | ||||
| import abuf | ||||
| import json | ||||
|  | ||||
|  | ||||
| if len(sys.argv) < 2: | ||||
|     print('no argument given, please provide a base64 encoded DNS response') | ||||
|     exit(1) | ||||
|  | ||||
| buf = sys.argv[1] | ||||
| raw_data = abuf.AbufParser.parse(base64.b64decode(buf)) | ||||
| print(json.dumps(raw_data)) | ||||
		Reference in New Issue
	
	Block a user