mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00

* Because frameworks/analyzer is loaded via init-frameworks-and-bifs the dpd functionality (really just dpd.log and disabling of analyzers) is now enabled even in bare mode. * Not sure we need to keep frameworks/base/dpd/__load__.zeek around or can just remove it right away.
29 lines
929 B
Text
29 lines
929 B
Text
##! This script enables logging of packet segment data when a protocol
|
|
##! parsing violation is encountered. The amount of data from the
|
|
##! packet logged is set by the :zeek:see:`DPD::packet_segment_size` variable.
|
|
##! A caveat to logging packet data is that in some cases, the packet may
|
|
##! not be the packet that actually caused the protocol violation.
|
|
|
|
@load base/frameworks/analyzer
|
|
|
|
module DPD;
|
|
|
|
export {
|
|
redef record Info += {
|
|
## A chunk of the payload that most likely resulted in the
|
|
## analyzer violation.
|
|
packet_segment: string &optional &log;
|
|
};
|
|
|
|
## Size of the packet segment to display in the DPD log.
|
|
option packet_segment_size: int = 255;
|
|
}
|
|
|
|
|
|
event analyzer_violation(c: connection, atype: AllAnalyzers::Tag, aid: count,
|
|
reason: string) &priority=4
|
|
{
|
|
if ( ! c?$dpd ) return;
|
|
|
|
c$dpd$packet_segment=fmt("%s", sub_bytes(get_current_packet()$data, 0, packet_segment_size));
|
|
}
|