/* NNCP -- Node to Node copy, utilities for store-and-forward data exchange Copyright (C) 2016-2021 Sergey Matveev This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ // Parse raw NNCP packet. package main import ( "bufio" "bytes" "flag" "fmt" "io" "log" "os" xdr "github.com/davecgh/go-xdr/xdr2" "github.com/klauspost/compress/zstd" "go.cypherpunks.ru/nncp/v7" ) func usage() { fmt.Fprintf(os.Stderr, nncp.UsageHeader()) fmt.Fprintf(os.Stderr, "nncp-pkt -- parse raw packet\n\n") fmt.Fprintf(os.Stderr, "Usage: %s [options]\nOptions:\n", os.Args[0]) flag.PrintDefaults() fmt.Fprintln(os.Stderr, "Packet is read from stdin.") } func doPlain(pkt nncp.Pkt, dump, decompress bool) { if dump { bufW := bufio.NewWriter(os.Stdout) var r io.Reader r = bufio.NewReader(os.Stdin) if decompress { decompressor, err := zstd.NewReader(r) if err != nil { log.Fatalln(err) } r = decompressor } if _, err := io.Copy(bufW, r); err != nil { log.Fatalln(err) } if err := bufW.Flush(); err != nil { log.Fatalln(err) } return } payloadType := "unknown" switch pkt.Type { case nncp.PktTypeFile: payloadType = "file" case nncp.PktTypeFreq: payloadType = "file request" case nncp.PktTypeExec: payloadType = "exec compressed" case nncp.PktTypeExecFat: payloadType = "exec uncompressed" case nncp.PktTypeTrns: payloadType = "transitional" } var path string switch pkt.Type { case nncp.PktTypeExec, nncp.PktTypeExecFat: path = string(bytes.Replace( pkt.Path[:pkt.PathLen], []byte{0}, []byte(" "), -1, )) case nncp.PktTypeTrns: path = nncp.Base32Codec.EncodeToString(pkt.Path[:pkt.PathLen]) default: path = string(pkt.Path[:pkt.PathLen]) } fmt.Printf( "Packet type: plain\nPayload type: %s\nNiceness: %s (%d)\nPath: %s\n", payloadType, nncp.NicenessFmt(pkt.Nice), pkt.Nice, path, ) return } func doEncrypted(pktEnc nncp.PktEnc, dump bool, cfgPath string, beginning []byte) { ctx, err := nncp.CtxFromCmdline(cfgPath, "", "", false, false, false, false) if err != nil { log.Fatalln("Error during initialization:", err) } if !dump { senderS := "unknown" recipientS := "unknown" if n, ok := ctx.Neigh[*pktEnc.Sender]; ok { senderS = n.Name } if n, ok := ctx.Neigh[*pktEnc.Recipient]; ok { recipientS = n.Name } fmt.Printf( "Packet type: encrypted\nNiceness: %s (%d)\nSender: %s (%s)\nRecipient: %s (%s)\n", nncp.NicenessFmt(pktEnc.Nice), pktEnc.Nice, pktEnc.Sender, senderS, pktEnc.Recipient, recipientS, ) return } if ctx.Self == nil { log.Fatalln("Config lacks private keys") } bufW := bufio.NewWriter(os.Stdout) if _, _, err = nncp.PktEncRead( ctx.Self, ctx.Neigh, io.MultiReader( bytes.NewReader(beginning), bufio.NewReader(os.Stdin), ), bufW, ); err != nil { log.Fatalln(err) } if err = bufW.Flush(); err != nil { log.Fatalln(err) } } func main() { var ( overheads = flag.Bool("overheads", false, "Print packet overheads") dump = flag.Bool("dump", false, "Write decrypted/parsed payload to stdout") decompress = flag.Bool("decompress", false, "Try to zstd decompress dumped data") cfgPath = flag.String("cfg", nncp.DefaultCfgPath, "Path to configuration file") version = flag.Bool("version", false, "Print version information") warranty = flag.Bool("warranty", false, "Print warranty information") ) log.SetFlags(log.Lshortfile) flag.Usage = usage flag.Parse() if *warranty { fmt.Println(nncp.Warranty) return } if *version { fmt.Println(nncp.VersionGet()) return } if *overheads { fmt.Printf( "Plain: %d\nEncrypted: %d\nSize: %d\n", nncp.PktOverhead, nncp.PktEncOverhead, nncp.PktSizeOverhead, ) return } beginning := make([]byte, nncp.PktOverhead) if _, err := io.ReadFull(os.Stdin, beginning); err != nil { log.Fatalln("Not enough data to read") } var pkt nncp.Pkt if _, err := xdr.Unmarshal(bytes.NewReader(beginning), &pkt); err == nil { switch pkt.Magic { case nncp.MagicNNCPPv1.B: log.Fatalln(nncp.MagicNNCPPv1.TooOld()) case nncp.MagicNNCPPv2.B: log.Fatalln(nncp.MagicNNCPPv2.TooOld()) case nncp.MagicNNCPPv3.B: doPlain(pkt, *dump, *decompress) return } } var pktEnc nncp.PktEnc if _, err := xdr.Unmarshal(bytes.NewReader(beginning), &pktEnc); err == nil { switch pkt.Magic { case nncp.MagicNNCPEv1.B: log.Fatalln(nncp.MagicNNCPEv1.TooOld()) case nncp.MagicNNCPEv2.B: log.Fatalln(nncp.MagicNNCPEv2.TooOld()) case nncp.MagicNNCPEv3.B: log.Fatalln(nncp.MagicNNCPEv3.TooOld()) case nncp.MagicNNCPEv4.B: log.Fatalln(nncp.MagicNNCPEv4.TooOld()) case nncp.MagicNNCPEv5.B: doEncrypted(pktEnc, *dump, *cfgPath, beginning) return } } log.Fatalln("Unable to determine packet type") }