-
Notifications
You must be signed in to change notification settings - Fork 53
/
sniffer.py
executable file
·360 lines (299 loc) · 11.8 KB
/
sniffer.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
#!/usr/bin/env python3
#
# Copyright (c) 2016-2017, The OpenThread Authors.
# All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
"""
Sniffer tool that outputs raw pcap.
Real-time stream to wireshark:
./sniffer.py | wireshark -k -i -
Save stream to file or pipe:
./sniffer.py > trace.pcap
"""
import sys
import optparse
import time
import os
import threading
from datetime import datetime
import spinel.util as util
import spinel.config as CONFIG
from spinel.const import SPINEL
from spinel.codec import WpanApi
from spinel.stream import StreamOpen
from spinel.pcap import PcapCodec
if sys.platform == 'win32':
import ctypes
import msvcrt
# Nodeid is required to execute ot-ncp-ftd for its sim radio socket port.
# This is maximum that works for MacOS.
DEFAULT_NODEID = 34 # same as WELLKNOWN_NODE_ID
DEFAULT_CHANNEL = 11
DEFAULT_BAUDRATE = 115200
DLT_IEEE802_15_4_WITHFCS = 195
DLT_IEEE802_15_4_TAP = 283
def parse_args():
""" Parse command line arguments for this applications. """
args = sys.argv[1:]
opt_parser = optparse.OptionParser()
opt_parser.add_option("-u",
"--uart",
action="store",
dest="uart",
type="string")
opt_parser.add_option("-b",
"--baudrate",
action="store",
dest="baudrate",
type="int",
default=DEFAULT_BAUDRATE)
opt_parser.add_option("--rtscts",
action="store_true",
dest="rtscts",
default=False),
opt_parser.add_option("-p",
"--pipe",
action="store",
dest="pipe",
type="string")
opt_parser.add_option("-s",
"--socket",
action="store",
dest="socket",
type="string")
opt_parser.add_option("-n",
"--nodeid",
action="store",
dest="nodeid",
type="string",
default=str(DEFAULT_NODEID))
opt_parser.add_option("-d",
"--debug",
action="store",
dest="debug",
type="int",
default=CONFIG.DEBUG_ENABLE)
opt_parser.add_option("-x", "--hex", action="store_true", dest="hex")
opt_parser.add_option("-o",
"--output",
action="store",
dest="output",
type="string")
opt_parser.add_option("-c",
"--channel",
action="store",
dest="channel",
type="int",
default=DEFAULT_CHANNEL)
opt_parser.add_option('--crc',
action='store_true',
dest='crc',
default=False)
opt_parser.add_option('--rssi',
action='store_true',
dest='rssi',
default=False)
opt_parser.add_option('--no-reset',
action='store_true',
dest='no_reset',
default=False)
opt_parser.add_option('--tap',
action='store_true',
dest='tap',
default=False)
opt_parser.add_option('--is-fifo',
action='store_true',
dest='is_fifo',
default=False)
opt_parser.add_option('--use-host-timestamp',
action='store_true',
dest='use_host_timestamp',
default=False)
return opt_parser.parse_args(args)
def sniffer_init(wpan_api, options):
"""" Send spinel commands to initialize sniffer node. """
wpan_api.queue_register(SPINEL.HEADER_DEFAULT)
wpan_api.queue_register(SPINEL.HEADER_ASYNC)
sys.stderr.write("Initializing sniffer...\n")
if not options.no_reset:
wpan_api.cmd_send(SPINEL.CMD_RESET)
time.sleep(1)
wpan_api.prop_set_value(SPINEL.PROP_PHY_ENABLED, 1)
result = wpan_api.prop_set_value(SPINEL.PROP_MAC_FILTER_MODE,
SPINEL.MAC_FILTER_MODE_MONITOR)
if result is None:
return False
result = wpan_api.prop_set_value(SPINEL.PROP_PHY_CHAN, options.channel)
if result is None:
return False
result = wpan_api.prop_set_value(SPINEL.PROP_MAC_RAW_STREAM_ENABLED, 1)
if result is None:
return False
return True
FIFO_CHECK_INTERVAL = 0.1
def check_fifo(fifo):
if sys.platform == 'win32':
kernel32 = ctypes.WinDLL('kernel32', use_last_error=True)
handle = msvcrt.get_osfhandle(fifo.fileno())
data = b''
p_data = ctypes.c_char_p(data)
written = ctypes.c_ulong(0)
while True:
time.sleep(FIFO_CHECK_INTERVAL)
if not kernel32.WriteFile(handle, p_data, 0, ctypes.byref(written),
None):
error = ctypes.get_last_error()
if error in (
0xe8, # ERROR_NO_DATA
0xe9, # ERROR_PIPE_NOT_CONNECTED
):
os._exit(0)
else:
raise ctypes.WinError(error)
else:
while True:
time.sleep(FIFO_CHECK_INTERVAL)
try:
os.stat(fifo.name)
except OSError:
os._exit(0)
def main():
""" Top-level main for sniffer host-side tool. """
(options, remaining_args) = parse_args()
if options.debug:
CONFIG.debug_set_level(options.debug)
if options.use_host_timestamp:
print('WARNING: Using host timestamp, may be inaccurate',
file=sys.stderr)
# Set default stream to pipe
stream_type = 'p'
stream_descriptor = "../../examples/apps/ncp/ot-ncp-ftd " + options.nodeid
if options.uart:
stream_type = 'u'
stream_descriptor = options.uart
elif options.socket:
stream_type = 's'
stream_descriptor = options.socket
elif options.pipe:
stream_type = 'p'
stream_descriptor = options.pipe
if options.nodeid:
stream_descriptor += " " + str(options.nodeid)
else:
if len(remaining_args) > 0:
stream_descriptor = " ".join(remaining_args)
stream = StreamOpen(stream_type, stream_descriptor, False, options.baudrate,
options.rtscts)
if stream is None:
exit()
wpan_api = WpanApi(stream, options.nodeid)
result = sniffer_init(wpan_api, options)
if not result:
sys.stderr.write("ERROR: failed to initialize sniffer\n")
exit()
else:
sys.stderr.write("SUCCESS: sniffer initialized\nSniffing...\n")
pcap = PcapCodec()
hdr = pcap.encode_header(
DLT_IEEE802_15_4_TAP if options.tap else DLT_IEEE802_15_4_WITHFCS)
if options.hex:
hdr = util.hexify_str(hdr) + "\n"
if options.output:
output = open(options.output, 'wb')
elif hasattr(sys.stdout, 'buffer'):
output = sys.stdout.buffer
else:
output = sys.stdout
output.write(hdr)
output.flush()
if options.is_fifo:
threading.Thread(target=check_fifo, args=(output,)).start()
epoch = datetime(1970, 1, 1)
timebase = datetime.utcnow() - epoch
timebase_sec = timebase.days * 24 * 60 * 60 + timebase.seconds
timebase_usec = timebase.microseconds
try:
tid = SPINEL.HEADER_ASYNC
prop_id = SPINEL.PROP_STREAM_RAW
while True:
result = wpan_api.queue_wait_for_prop(prop_id, tid)
if result and result.prop == prop_id:
length = wpan_api.parse_S(result.value)
pkt = result.value[2:2 + length]
# metadata format (totally 19 bytes or 26 bytes):
# 0. RSSI(int8)
# 1. Noise Floor(int8)
# 2. Flags(uint16)
# 3. PHY-specific data struct contains:
# 3.0 Channel(uint8)
# 3.1 LQI(uint8)
# 3.2 Timestamp in microseconds(uint64)
# 4. Vendor data struct contains:
# 4.0 Receive error(uint8)
# 5. (optional) MAC data struct contains:
# 5.0 ACK key ID(uint8)
# 5.1 ACK frame counter(uint32)
if len(result.value) in [2 + length + 19, 2 + length + 26]:
metadata = wpan_api.parse_fields(
result.value[2 + length:2 + length + 19],
"ccSt(CCX)t(i)")
timestamp = metadata[3][2]
timestamp_sec = timestamp / 1000000
timestamp_usec = timestamp % 1000000
# (deprecated) metadata format (totally 17 bytes):
# 0. RSSI(int8)
# 1. Noise Floor(int8)
# 2. Flags(uint16)
# 3. PHY-specific data struct contains:
# 3.0 Channel(uint8)
# 3.1 LQI(uint8)
# 3.2 Timestamp Msec(uint32)
# 3.3 Timestamp Usec(uint16)
# 4. Vendor data struct contains:
# 4.0 Receive error(uint8)
elif len(result.value) == 2 + length + 17:
metadata = wpan_api.parse_fields(
result.value[2 + length:2 + length + 17],
"ccSt(CCLS)t(i)")
timestamp_usec = timebase_usec + metadata[3][
2] * 1000 + metadata[3][3]
timestamp_sec = timebase_sec + timestamp_usec / 1000000
timestamp_usec = timestamp_usec % 1000000
# Some old version NCP doesn't contain timestamp information in metadata
else:
timestamp = datetime.utcnow() - epoch
timestamp_sec = timestamp.days * 24 * 60 * 60 + timestamp.seconds
timestamp_usec = timestamp.microseconds
if options.rssi:
sys.stderr.write(
"WARNING: failed to display RSSI, please update the NCP version\n"
)
if options.use_host_timestamp:
timestamp = round(time.time() * 1000000)
timestamp_sec = timestamp // 1000000
timestamp_usec = timestamp % 1000000
pkt = pcap.encode_frame(pkt, int(timestamp_sec), timestamp_usec,
options.rssi, options.crc, metadata)
if options.hex:
pkt = util.hexify_str(pkt) + "\n"
output.write(pkt)
output.flush()
except KeyboardInterrupt:
pass
if wpan_api:
wpan_api.stream.close()
output.close()
if __name__ == "__main__":
main()