Hide keyboard shortcuts

Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

# SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. 

#  

# This software is provided under under a slightly modified version 

# of the Apache Software License. See the accompanying LICENSE file 

# for more information. 

#  

 

import array 

import struct 

 

from impacket.ImpactPacket import Header, Data 

from impacket.IP6_Address import IP6_Address 

 

 

class ICMP6(Header): 

#IP Protocol number for ICMP6 

IP_PROTOCOL_NUMBER = 58 

protocol = IP_PROTOCOL_NUMBER #ImpactDecoder uses the constant "protocol" as the IP Protocol Number 

 

#Size of ICMP6 header (excluding payload) 

HEADER_SIZE = 4 

 

#ICMP6 Message Type numbers 

DESTINATION_UNREACHABLE = 1 

PACKET_TOO_BIG = 2 

TIME_EXCEEDED = 3 

PARAMETER_PROBLEM = 4 

ECHO_REQUEST = 128 

ECHO_REPLY = 129 

ROUTER_SOLICITATION = 133 

ROUTER_ADVERTISEMENT = 134 

NEIGHBOR_SOLICITATION = 135 

NEIGHBOR_ADVERTISEMENT = 136 

REDIRECT_MESSAGE = 137 

NODE_INFORMATION_QUERY = 139 

NODE_INFORMATION_REPLY = 140 

 

#Destination Unreachable codes 

NO_ROUTE_TO_DESTINATION = 0 

ADMINISTRATIVELY_PROHIBITED = 1 

BEYOND_SCOPE_OF_SOURCE_ADDRESS = 2 

ADDRESS_UNREACHABLE = 3 

PORT_UNREACHABLE = 4 

SOURCE_ADDRESS_FAILED_INGRESS_EGRESS_POLICY = 5 

REJECT_ROUTE_TO_DESTINATION = 6 

 

#Time Exceeded codes 

HOP_LIMIT_EXCEEDED_IN_TRANSIT = 0 

FRAGMENT_REASSEMBLY_TIME_EXCEEDED = 1 

 

#Parameter problem codes 

ERRONEOUS_HEADER_FIELD_ENCOUNTERED = 0 

UNRECOGNIZED_NEXT_HEADER_TYPE_ENCOUNTERED = 1 

UNRECOGNIZED_IPV6_OPTION_ENCOUNTERED = 2 

 

#Node Information codes 

NODE_INFORMATION_QUERY_IPV6 = 0 

NODE_INFORMATION_QUERY_NAME_OR_EMPTY = 1 

NODE_INFORMATION_QUERY_IPV4 = 2 

NODE_INFORMATION_REPLY_SUCCESS = 0 

NODE_INFORMATION_REPLY_REFUSED = 1 

NODE_INFORMATION_REPLY_UNKNOWN_QTYPE = 2 

 

#Node Information qtypes 

NODE_INFORMATION_QTYPE_NOOP = 0 

NODE_INFORMATION_QTYPE_UNUSED = 1 

NODE_INFORMATION_QTYPE_NODENAME = 2 

NODE_INFORMATION_QTYPE_NODEADDRS = 3 

NODE_INFORMATION_QTYPE_IPv4ADDRS = 4 

 

#ICMP Message semantic types (error or informational)  

ERROR_MESSAGE = 0 

INFORMATIONAL_MESSAGE = 1 

 

#ICMP message dictionary - specifying text descriptions and valid message codes 

#Key: ICMP message number 

#Data: Tuple ( Message Type (error/informational), Text description, Codes dictionary (can be None) ) 

#Codes dictionary 

#Key: Code number 

#Data: Text description 

 

#ICMP message dictionary tuple indexes 

MSG_TYPE_INDEX = 0 

DESCRIPTION_INDEX = 1 

CODES_INDEX = 2 

 

icmp_messages = { 

DESTINATION_UNREACHABLE : (ERROR_MESSAGE, "Destination unreachable", 

{ NO_ROUTE_TO_DESTINATION : "No route to destination", 

ADMINISTRATIVELY_PROHIBITED : "Administratively prohibited", 

BEYOND_SCOPE_OF_SOURCE_ADDRESS : "Beyond scope of source address", 

ADDRESS_UNREACHABLE : "Address unreachable", 

PORT_UNREACHABLE : "Port unreachable", 

SOURCE_ADDRESS_FAILED_INGRESS_EGRESS_POLICY : "Source address failed ingress/egress policy", 

REJECT_ROUTE_TO_DESTINATION : "Reject route to destination" 

}), 

PACKET_TOO_BIG : (ERROR_MESSAGE, "Packet too big", None), 

TIME_EXCEEDED : (ERROR_MESSAGE, "Time exceeded", 

{HOP_LIMIT_EXCEEDED_IN_TRANSIT : "Hop limit exceeded in transit", 

FRAGMENT_REASSEMBLY_TIME_EXCEEDED : "Fragment reassembly time exceeded" 

}), 

PARAMETER_PROBLEM : (ERROR_MESSAGE, "Parameter problem", 

{ 

ERRONEOUS_HEADER_FIELD_ENCOUNTERED : "Erroneous header field encountered", 

UNRECOGNIZED_NEXT_HEADER_TYPE_ENCOUNTERED : "Unrecognized Next Header type encountered", 

UNRECOGNIZED_IPV6_OPTION_ENCOUNTERED : "Unrecognized IPv6 Option Encountered" 

}), 

ECHO_REQUEST : (INFORMATIONAL_MESSAGE, "Echo request", None), 

ECHO_REPLY : (INFORMATIONAL_MESSAGE, "Echo reply", None), 

ROUTER_SOLICITATION : (INFORMATIONAL_MESSAGE, "Router Solicitation", None), 

ROUTER_ADVERTISEMENT : (INFORMATIONAL_MESSAGE, "Router Advertisement", None), 

NEIGHBOR_SOLICITATION : (INFORMATIONAL_MESSAGE, "Neighbor Solicitation", None), 

NEIGHBOR_ADVERTISEMENT : (INFORMATIONAL_MESSAGE, "Neighbor Advertisement", None), 

REDIRECT_MESSAGE : (INFORMATIONAL_MESSAGE, "Redirect Message", None), 

NODE_INFORMATION_QUERY: (INFORMATIONAL_MESSAGE, "Node Information Query", None), 

NODE_INFORMATION_REPLY: (INFORMATIONAL_MESSAGE, "Node Information Reply", None), 

} 

 

 

 

 

############################################################################ 

def __init__(self, buffer = None): 

Header.__init__(self, self.HEADER_SIZE) 

if (buffer): 

self.load_header(buffer) 

 

def get_header_size(self): 

return self.HEADER_SIZE 

 

def get_ip_protocol_number(self): 

return self.IP_PROTOCOL_NUMBER 

 

def __str__(self): 

type = self.get_type() 

code = self.get_code() 

checksum = self.get_checksum() 

 

s = "ICMP6 - Type: " + str(type) + " - " + self.__get_message_description() + "\n" 

s += "Code: " + str(code) 

if (self.__get_code_description() != ""): 

s += " - " + self.__get_code_description() 

s += "\n" 

s += "Checksum: " + str(checksum) + "\n" 

return s 

 

def __get_message_description(self): 

return self.icmp_messages[self.get_type()][self.DESCRIPTION_INDEX] 

 

def __get_code_description(self): 

code_dictionary = self.icmp_messages[self.get_type()][self.CODES_INDEX] 

if (code_dictionary is None): 

return "" 

else: 

return code_dictionary[self.get_code()] 

 

############################################################################ 

def get_type(self): 

return (self.get_byte(0)) 

 

def get_code(self): 

return (self.get_byte(1)) 

 

def get_checksum(self): 

return (self.get_word(2)) 

 

############################################################################ 

def set_type(self, type): 

self.set_byte(0, type) 

 

def set_code(self, code): 

self.set_byte(1, code) 

 

def set_checksum(self, checksum): 

self.set_word(2, checksum) 

 

############################################################################ 

def calculate_checksum(self): 

#Initialize the checksum value to 0 to yield a correct calculation 

self.set_checksum(0) 

#Fetch the pseudo header from the IP6 parent packet 

pseudo_header = self.parent().get_pseudo_header() 

#Fetch the ICMP data 

icmp_header = self.get_bytes() 

#Build an array of bytes concatenating the pseudo_header, the ICMP header and the ICMP data (if present) 

checksum_array = array.array('B') 

checksum_array.extend(pseudo_header) 

checksum_array.extend(icmp_header) 

189 ↛ 193line 189 didn't jump to line 193, because the condition on line 189 was never false if (self.child()): 

checksum_array.extend(self.child().get_bytes()) 

 

#Compute the checksum over that array 

self.set_checksum(self.compute_checksum(checksum_array)) 

 

def is_informational_message(self): 

return self.icmp_messages[self.get_type()][self.MSG_TYPE_INDEX] == self.INFORMATIONAL_MESSAGE 

 

def is_error_message(self): 

return self.icmp_messages[self.get_type()][self.MSG_TYPE_INDEX] == self.ERROR_MESSAGE 

 

def is_well_formed(self): 

well_formed = True 

 

#Check that the message type is known 

well_formed &= self.get_type() in self.icmp_messages.keys() 

 

#Check that the code is known (zero, if there are no codes defined) 

code_dictionary = self.icmp_messages[self.get_type()][self.CODES_INDEX] 

if (code_dictionary is None): 

well_formed &= self.get_code() == 0 

else: 

well_formed &= self.get_code() in code_dictionary.keys() 

 

return well_formed 

 

############################################################################ 

 

@classmethod 

def Echo_Request(class_object, id, sequence_number, arbitrary_data = None): 

return class_object.__build_echo_message(ICMP6.ECHO_REQUEST, id, sequence_number, arbitrary_data) 

 

@classmethod 

def Echo_Reply(class_object, id, sequence_number, arbitrary_data = None): 

return class_object.__build_echo_message(ICMP6.ECHO_REPLY, id, sequence_number, arbitrary_data) 

 

@classmethod 

def __build_echo_message(class_object, type, id, sequence_number, arbitrary_data): 

#Build ICMP6 header 

icmp_packet = ICMP6() 

icmp_packet.set_type(type) 

icmp_packet.set_code(0) 

 

#Pack ICMP payload 

icmp_bytes = struct.pack('>H', id) 

icmp_bytes += struct.pack('>H', sequence_number) 

236 ↛ 238line 236 didn't jump to line 238, because the condition on line 236 was never false if (arbitrary_data is not None): 

icmp_bytes += array.array('B', arbitrary_data).tostring() 

icmp_payload = Data() 

icmp_payload.set_data(icmp_bytes) 

 

#Link payload to header 

icmp_packet.contains(icmp_payload) 

 

return icmp_packet 

 

 

############################################################################ 

@classmethod 

def Destination_Unreachable(class_object, code, originating_packet_data = None): 

unused_bytes = [0x00, 0x00, 0x00, 0x00] 

return class_object.__build_error_message(ICMP6.DESTINATION_UNREACHABLE, code, unused_bytes, originating_packet_data) 

 

@classmethod 

def Packet_Too_Big(class_object, MTU, originating_packet_data = None): 

MTU_bytes = struct.pack('!L', MTU) 

return class_object.__build_error_message(ICMP6.PACKET_TOO_BIG, 0, MTU_bytes, originating_packet_data) 

 

@classmethod 

def Time_Exceeded(class_object, code, originating_packet_data = None): 

unused_bytes = [0x00, 0x00, 0x00, 0x00] 

return class_object.__build_error_message(ICMP6.TIME_EXCEEDED, code, unused_bytes, originating_packet_data) 

 

@classmethod 

def Parameter_Problem(class_object, code, pointer, originating_packet_data = None): 

pointer_bytes = struct.pack('!L', pointer) 

return class_object.__build_error_message(ICMP6.PARAMETER_PROBLEM, code, pointer_bytes, originating_packet_data) 

 

@classmethod 

def __build_error_message(class_object, type, code, data, originating_packet_data): 

#Build ICMP6 header 

icmp_packet = ICMP6() 

icmp_packet.set_type(type) 

icmp_packet.set_code(code) 

 

#Pack ICMP payload 

icmp_bytes = array.array('B', data).tostring() 

277 ↛ 279line 277 didn't jump to line 279, because the condition on line 277 was never false if (originating_packet_data is not None): 

icmp_bytes += array.array('B', originating_packet_data).tostring() 

icmp_payload = Data() 

icmp_payload.set_data(icmp_bytes) 

 

#Link payload to header 

icmp_packet.contains(icmp_payload) 

 

return icmp_packet 

 

############################################################################ 

 

@classmethod 

def Neighbor_Solicitation(class_object, target_address): 

return class_object.__build_neighbor_message(ICMP6.NEIGHBOR_SOLICITATION, target_address) 

 

@classmethod 

def Neighbor_Advertisement(class_object, target_address): 

return class_object.__build_neighbor_message(ICMP6.NEIGHBOR_ADVERTISEMENT, target_address) 

 

@classmethod 

def __build_neighbor_message(class_object, msg_type, target_address): 

#Build ICMP6 header 

icmp_packet = ICMP6() 

icmp_packet.set_type(msg_type) 

icmp_packet.set_code(0) 

 

# Flags + Reserved 

icmp_bytes = array.array('B', [0x00] * 4).tostring() 

 

# Target Address: The IP address of the target of the solicitation. 

# It MUST NOT be a multicast address. 

icmp_bytes += array.array('B', IP6_Address(target_address).as_bytes()).tostring() 

 

icmp_payload = Data() 

icmp_payload.set_data(icmp_bytes) 

 

#Link payload to header 

icmp_packet.contains(icmp_payload) 

 

return icmp_packet 

 

############################################################################ 

 

def get_target_address(self): 

return IP6_Address(self.child().get_bytes()[4:20]) 

 

def set_target_address(self, target_address): 

address = IP6_Address(target_address) 

payload_bytes = self.child().get_bytes() 

payload_bytes[4:20] = address.get_bytes() 

self.child().set_bytes(payload_bytes) 

 

# 0 1 2 3 4 5 6 7  

# +-+-+-+-+-+-+-+-+ 

# |R|S|O|reserved | 

# +-+-+-+-+-+-+-+-+ 

 

def get_neighbor_advertisement_flags(self): 

return self.child().get_byte(0) 

 

def set_neighbor_advertisement_flags(self, flags): 

self.child().set_byte(0, flags) 

 

def get_router_flag(self): 

return (self.get_neighbor_advertisement_flags() & 0x80) != 0 

 

def set_router_flag(self, flag_value): 

curr_flags = self.get_neighbor_advertisement_flags() 

if flag_value: 

curr_flags |= 0x80 

else: 

curr_flags &= ~0x80 

self.set_neighbor_advertisement_flags(curr_flags) 

 

def get_solicited_flag(self): 

return (self.get_neighbor_advertisement_flags() & 0x40) != 0 

 

def set_solicited_flag(self, flag_value): 

curr_flags = self.get_neighbor_advertisement_flags() 

if flag_value: 

curr_flags |= 0x40 

else: 

curr_flags &= ~0x40 

self.set_neighbor_advertisement_flags(curr_flags) 

 

def get_override_flag(self): 

return (self.get_neighbor_advertisement_flags() & 0x20) != 0 

 

def set_override_flag(self, flag_value): 

curr_flags = self.get_neighbor_advertisement_flags() 

if flag_value: 

curr_flags |= 0x20 

else: 

curr_flags &= ~0x20 

self.set_neighbor_advertisement_flags(curr_flags) 

 

############################################################################ 

@classmethod 

def Node_Information_Query(class_object, code, payload = None): 

return class_object.__build_node_information_message(ICMP6.NODE_INFORMATION_QUERY, code, payload) 

 

@classmethod 

def Node_Information_Reply(class_object, code, payload = None): 

return class_object.__build_node_information_message(ICMP6.NODE_INFORMATION_REPLY, code, payload) 

 

@classmethod 

def __build_node_information_message(class_object, type, code, payload = None): 

#Build ICMP6 header 

icmp_packet = ICMP6() 

icmp_packet.set_type(type) 

icmp_packet.set_code(code) 

 

#Pack ICMP payload 

qtype = 0 

flags = 0 

nonce = [0x00] * 8 

 

icmp_bytes = struct.pack('>H', qtype) 

icmp_bytes += struct.pack('>H', flags) 

icmp_bytes += array.array('B', nonce).tostring() 

 

if payload is not None: 

icmp_bytes += array.array('B', payload).tostring() 

 

icmp_payload = Data() 

icmp_payload.set_data(icmp_bytes) 

 

#Link payload to header 

icmp_packet.contains(icmp_payload) 

 

return icmp_packet 

 

def get_qtype(self): 

return self.child().get_word(0) 

 

def set_qtype(self, qtype): 

self.child().set_word(0, qtype) 

 

def get_nonce(self): 

return self.child().get_bytes()[4:12] 

 

def set_nonce(self, nonce): 

payload_bytes = self.child().get_bytes() 

payload_bytes[4:12] = array.array('B', nonce) 

self.child().set_bytes(payload_bytes) 

 

# 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 

# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 

# | unused |G|S|L|C|A|T| 

# +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 

 

def get_flags(self): 

return self.child().get_word(2) 

 

def set_flags(self, flags): 

self.child().set_word(2, flags) 

 

def get_flag_T(self): 

return (self.get_flags() & 0x0001) != 0 

 

def set_flag_T(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0001 

else: 

curr_flags &= ~0x0001 

self.set_flags(curr_flags) 

 

def get_flag_A(self): 

return (self.get_flags() & 0x0002) != 0 

 

def set_flag_A(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0002 

else: 

curr_flags &= ~0x0002 

self.set_flags(curr_flags) 

 

def get_flag_C(self): 

return (self.get_flags() & 0x0004) != 0 

 

def set_flag_C(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0004 

else: 

curr_flags &= ~0x0004 

self.set_flags(curr_flags) 

 

def get_flag_L(self): 

return (self.get_flags() & 0x0008) != 0 

 

def set_flag_L(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0008 

else: 

curr_flags &= ~0x0008 

self.set_flags(curr_flags) 

 

def get_flag_S(self): 

return (self.get_flags() & 0x0010) != 0 

 

def set_flag_S(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0010 

else: 

curr_flags &= ~0x0010 

self.set_flags(curr_flags) 

 

def get_flag_G(self): 

return (self.get_flags() & 0x0020) != 0 

 

def set_flag_G(self, flag_value): 

curr_flags = self.get_flags() 

if flag_value: 

curr_flags |= 0x0020 

else: 

curr_flags &= ~0x0020 

self.set_flags(curr_flags) 

 

def set_node_information_data(self, data): 

payload_bytes = self.child().get_bytes() 

payload_bytes[12:] = array.array('B', data) 

self.child().set_bytes(payload_bytes) 

 

def get_note_information_data(self): 

return self.child().get_bytes()[12:] 

 

############################################################################ 

def get_echo_id(self): 

return self.child().get_word(0) 

 

def get_echo_sequence_number(self): 

return self.child().get_word(2) 

 

def get_echo_arbitrary_data(self): 

return self.child().get_bytes()[4:] 

 

def get_mtu(self): 

return self.child().get_long(0) 

 

def get_parm_problem_pointer(self): 

return self.child().get_long(0) 

 

def get_originating_packet_data(self): 

return self.child().get_bytes()[4:]