597 lines
16 KiB
Lua
Raw Normal View History

local comm = require "comm"
local match = require "match"
local stdnse = require "stdnse"
local string = require "string"
_ENV = stdnse.module("nbd", stdnse.seeall)
---
-- An implementation of the Network Block Device protocol.
-- https://github.com/NetworkBlockDevice/nbd/blob/master/doc/proto.md
--
-- @author "Mak Kolybabi <mak@kolybabi.com>"
-- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html
NBD = {
magic = {
init_passwd = string.char(0x4E, 0x42, 0x44, 0x4d, 0x41, 0x47, 0x49, 0x43),
cliserv_magic_old = string.char(0x00, 0x00, 0x42, 0x02, 0x81, 0x86, 0x12, 0x53),
cliserv_magic_new = string.char(0x49, 0x48, 0x41, 0x56, 0x45, 0x4F, 0x50, 0x54),
option = string.char(0x00, 0x03, 0xE8, 0x89, 0x04, 0x55, 0x65, 0xA9),
cmd_request = string.char(0x25, 0x60, 0x95, 0x13),
cmd_reply = string.char(0x67, 0x44, 0x66, 0x98),
},
handshake_flags = {
FIXED_NEWSTYLE = 0x0001,
NO_ZEROES = 0x0002,
},
client_flags = {
C_FIXED_NEWSTYLE = 0x00000001,
C_NO_ZEROES = 0x00000002,
},
transmission_flags = {
HAS_FLAGS = 0x0001,
READ_ONLY = 0x0002,
SEND_FLUSH = 0x0004,
SEND_FUA = 0x0008,
ROTATIONAL = 0x0010,
SEND_TRIM = 0x0020,
SEND_WRITE_ZEROES = 0x0040, -- WRITE_ZEROES Extension
SEND_DF = 0x0080, -- STRUCTURED_REPLY Extension
},
opt_req_types = {
EXPORT_NAME = 0x00000001,
ABORT = 0x00000002,
LIST = 0x00000003,
PEEK_EXPORT = 0x00000004, -- PEEK_EXPORT Extension
STARTTLS = 0x00000005,
INFO = 0x00000006, -- INFO Extension
GO = 0x00000007, -- INFO Extension
STRUCTURED_REPLY = 0x00000008, -- STRUCTURED_REPLY Extension
BLOCK_SIZE = 0x00000009, -- INFO Extension
},
opt_rep_types = {
ACK = 0x00000001,
SERVER = 0x00000002,
INFO = 0x00000003, -- INFO Extension
ERR_UNSUP = 0x80000001,
ERR_POLICY = 0x80000002,
ERR_INVALID = 0x80000003,
ERR_PLATFORM = 0x80000004,
ERR_TLS_REQD = 0x80000005,
ERR_UNKNOWN = 0x80000006, -- INFO Extension
ERR_SHUTDOWN = 0x80000007,
ERR_BLOCK_SIZE_REQD = 0x80000008, -- INFO Extension
},
opt_rep_ext_types = {
info = {
EXPORT = 0x0000,
NAME = 0x0001,
DESCRIPTION = 0x0002,
BLOCK_SIZE = 0x0003,
},
},
cmd_req_flags = {
FUA = 0x0001,
NO_HOLE = 0x0002, -- WRITE_ZEROES Extension
DF = 0x0004, -- STRUCTURED_REPLY Extension
},
cmd_req_types = {
READ = 0x0000,
WRITE = 0x0001,
DISC = 0x0002,
FLUSH = 0x0003,
TRIM = 0x0004,
CACHE = 0x0005, -- XNBD custom request types
WRITE_ZEROES = 0x0006, -- WRITE_ZEROES Extension
},
errors = {
EPERM = 0x00000001,
EIO = 0x00000005,
ENOMEM = 0x0000000C,
EINVAL = 0x00000016,
ENOSPC = 0x0000001C,
EOVERFLOW = 0x0000004B,
ESHUTDOWN = 0x0000006C,
},
}
Comm = {
--- Creates a new client instance.
--
-- @name Comm.new
--
-- @param host Table as received by the action method.
-- @param port Table as received by the action method.
--
-- @return o Instance of Client.
new = function(self, host, port)
local o = {host = host, port = port, exports = {}}
setmetatable(o, self)
self.__index = self
return o
end,
--- Connects to the NBD server.
--
-- @name Comm.connect
--
-- @return status true on success, false on failure.
connect = function(self)
-- NBD servers send a response when we connect. We are using
-- tryssl here as a precaution since there are several
-- implementations of the protocol and no reason it can't be
-- wrapped. IANA has rejected assigning another port for NBD over
-- TLS.
local sd, err, proto, rep = comm.tryssl(self.host, self.port, "", {recv_before = true})
if not sd then
return false, err
end
-- The socket connected successfully over whichever protocol.
-- Store the connection information.
self.socket = sd
self.protocol = {ssl_tls = (proto == "ssl")}
if #rep < 8 then
stdnse.debug1("Failed to receive first 64 bits of magic from server: %s", rep)
self:close()
return false
end
-- We may have received 8-100+ bytes of data, depending on timing. To make
-- the code simpler, we will seed a buffer to be used by this object's
-- receive function until empty.
self.receive_buffer = rep:sub(9)
rep = rep:sub(1, 8)
if rep ~= NBD.magic.init_passwd then
stdnse.debug1("First 64 bits from server don't match expected magic: %s", stdnse.tohex(rep, {separator = ":"}))
self:close()
return false
end
local status, rep = self:receive(8)
if not status then
stdnse.debug1("Failed to receive second 64 bits of magic from server: %s", rep)
return false
end
if rep == NBD.magic.cliserv_magic_new then
self.protocol.negotiation = "newstyle"
return self:connect_new()
end
if rep == NBD.magic.cliserv_magic_old then
self.protocol.negotiation = "oldstyle"
return self:connect_old()
end
self.protocol.negotiation = "unrecognized"
stdnse.debug1("Second 64 bits from server don't match any known protocol magic: %s", stdnse.tohex(rep, {separator = ":"}))
self:close()
return true
end,
--- Cycles the connection to the server.
--
-- @name Comm.reconnect
--
-- @return status true on success, false on failure.
reconnect = function(self)
self:close()
return self:connect(self.connect_options)
end,
--- Attaches to an named share on the server.
--
-- @name Comm.attach
--
-- @return status true on success, false on failure.
attach = function(self, name)
assert(self.protocol.negotiation == "newstyle" or self.protocol.negotiation == "fixed newstyle")
assert(type(name) == "string")
local req = self:build_opt_req("EXPORT_NAME", {export_name = name})
local status, err = self:send(req)
if not status then
stdnse.debug1("Failed to send attach request for '%s': %s", name, err)
self:close()
return
end
local status, size = self:receive(8)
if not status then
stdnse.debug1("Failed to receive response to attach request for '%s': %s", name, size)
self:close()
return
end
local size, pos = (">I8"):unpack(size)
if pos ~= 9 then
stdnse.debug1("Failed to unpack size of exported block device from server.")
self:close()
return false
end
local status, tflags = self:receive(2)
if not status then
stdnse.debug1("Failed to receive transmission flags from server while attaching to export: %s", tflags)
self:close()
return false
end
local tflags, pos = (">I2"):unpack(tflags)
if pos ~= 3 then
stdnse.debug1("Failed to unpack transmission flags from server.")
self:close()
return false
end
tflags = self:parse_transmission_flags(tflags)
if self.protocol.zero_pad == "required" then
local status, err = self:receive(124)
if not status then
stdnse.debug1("Failed to receive zero pad from server while attaching to export: %s", err)
self:close()
return false
end
end
self.exports[name] = {
size = size,
tflags = tflags,
}
return true
end,
--- Sends data to the server
--
-- @name Comm.send
--
-- @param pkt String containing the bytes to send.
--
-- @return status true on success, false on failure.
-- @return err string containing the error message on failure.
send = function(self, data)
assert(type(data) == "string")
return self.socket:send(data)
end,
--- Receives data from the server.
--
-- @name Comm.receive
--
-- @param len Number of bytes to receive.
--
-- @return status True on success, false on failure.
-- @return response String representing bytes received on success,
-- string containing the error message on failure.
receive = function(self, len)
assert(type(len) == "number")
-- Try to answer this request from the buffer.
if #self.receive_buffer >= len then
local rep = self.receive_buffer:sub(1, len)
self.receive_buffer = self.receive_buffer:sub(len + 1)
return true, rep
end
return self.socket:receive_buf(match.numbytes(len), true)
end,
--- Disconnects from the server.
--
-- @name Comm.close
close = function(self)
assert(self.socket)
self.socket:close()
self.socket = nil
end,
--- Continue in-progress newstyle handshake with server.
--
-- @name Comm.connect_new
--
-- @param len Number of bytes to receive.
--
-- @return status True on success, false on failure.
-- @return response String representing bytes received on success,
-- string containing the error message on failure.
connect_new = function(self)
local status, flags = self:receive(2)
if not status then
stdnse.debug1("Failed to receive handshake flags from server: %s", flags)
self:close()
return false
end
-- Receive and parse the handshake flags from the server, and use
-- them to build the client flags.
local hflags, pos = (">I2"):unpack(flags)
if pos ~= 3 then
stdnse.debug1("Failed to unpack handshake flags from server.")
self:close()
return false
end
local cflags = 0x0000
if hflags & NBD.handshake_flags.FIXED_NEWSTYLE then
cflags = cflags | NBD.client_flags.C_FIXED_NEWSTYLE
self.protocol.negotiation = "fixed newstyle"
end
self.protocol.zero_pad = "required"
if hflags & NBD.handshake_flags.NO_ZEROES then
cflags = cflags | NBD.client_flags.C_NO_ZEROES
self.protocol.zero_pad = "optional"
end
-- Send the client flags to the server.
local req = (">I4"):pack(cflags)
local status, err = self:send(req)
if not status then
stdnse.debug1("Failed to send client flags: %s", err)
self:close()
return false
end
return true
end,
--- Continue in-progress oldstyle handshake with server.
--
-- @name Comm.connect_old
--
-- @return response String representing bytes received on success,
-- string containing the error message on failure.
connect_old = function(self)
local status, size = self:receive(8)
if not status then
stdnse.debug1("Failed to receive size of exported block device from server: %s", size)
self:close()
return false
end
local size, pos = (">I8"):unpack(size)
if pos ~= 9 then
stdnse.debug1("Failed to unpack size of exported block device from server.")
self:close()
return false
end
local status, hflags = self:receive(4)
if not status then
stdnse.debug1("Failed to receive handshake flags from server: %s", hflags)
self:close()
return false
end
local hflags, pos = (">I4"):unpack(hflags)
if pos ~= 5 then
stdnse.debug1("Failed to unpack handshake flags from server.")
self:close()
return false
end
local status, pad = self:receive(124)
if not status then
stdnse.debug1("Failed to receive zero pad from server: %s", pad)
self:close()
return false
end
self.exports["(default)"] = {
size = size,
hflags = hflags,
}
return true
end,
--- Receives an option reply.
--
-- @name Comm.receive_opt_rep
--
-- @return reply Table representing option reply on success, false
-- on failure.
receive_opt_rep = function(self)
-- Receive the static header of the option.
local status, hdr = self:receive(20)
if not status then
stdnse.debug1("Failed to receive option reply header: %s", hdr)
return false
end
local len, pos = (">I4"):unpack(hdr, 17)
if pos ~= 21 then
stdnse.debug1("Failed to parse option reply header during receive.")
return false
end
local magic = hdr:sub(1, 8)
if magic ~= NBD.magic.option then
stdnse.debug1("First 64 bits of option reply don't match expected magic: %s", stdnse.tohex(magic, {separator = ":"}))
return false
end
if len == 0 then
return self:parse_opt_rep(hdr)
end
-- Receive the variable body of the option.
local status, body = self:receive(len)
if not status then
stdnse.debug1("Failed to receive option reply: %s", body)
return false
end
return self:parse_opt_rep(hdr .. body)
end,
--- Builds an option request.
--
-- @name Comm.build_opt_req
--
-- @param name String naming the option type.
-- @param options Table containing options.
--
-- @return req String representing the option request.
build_opt_req = function(self, name, options)
assert(type(name) == "string")
if not options then
options = {}
end
assert(type(options) == "table")
local otype = NBD.opt_req_types[name]
assert(otype)
local payload = ""
if name == "EXPORT_NAME" then
assert(options.export_name)
payload = options.export_name
end
return NBD.magic.cliserv_magic_new .. (">I4s4"):pack(otype, payload)
end,
--- Parses an option reply.
--
-- @name Comm.parse_opt_rep
--
-- @param buf String to be parsed.
-- @param rep Table representing the fields of the reply that have
-- already been parsed by the caller.
--
-- @return reply Table representing option reply on success, false
-- on failure.
parse_opt_rep = function(self, buf)
assert(type(buf) == "string")
if 20 - 1 > #buf then
stdnse.debug1("Buffer is too short to be parsed as an option reply.")
return false
end
local magic, otype, rtype, rlen, pos = (">c8I4I4I4"):unpack(buf)
if magic ~= NBD.magic.option then
stdnse.debug1("First 64 bits of option reply don't match expected magic: %s", stdnse.tohex(magic, {separator = ":"}))
return false
end
local otype_name = find_key(NBD.opt_req_types, otype)
local rtype_name = find_key(NBD.opt_rep_types, rtype)
local rep = {
otype = otype,
otype_name = otype_name,
rtype = rtype,
rtype_name = rtype_name,
}
if pos + rlen - 1 > #buf then
stdnse.debug1("Option reply payload length extends past end of buffer.")
return false
end
if rtype_name == "ACK" then
return rep
end
if rtype_name == "SERVER" then
if rlen < 4 then
stdnse.debug1("SERVER option reply payload length must be 4 or greater, but is %d.", rlen)
return false
end
local nlen, pos = (">I4"):unpack(buf, pos)
if pos + nlen - 1 > #buf then
stdnse.debug1("SERVER option reply payload name length extends past end of buffer.")
return false
end
-- An empty name represents the default export.
local name = ""
if nlen > 0 then
name = buf:sub(pos, pos + nlen - 1)
pos = pos + nlen
end
rep.export_name = name
return rep
end
return rep
end,
--- Parses the transmission flags describing an export.
--
-- @name Comm.parse_transmission_flags
--
-- @param flags Transmission flags sent by server.
--
-- @return Table of parsed flags as keys.
parse_transmission_flags = function(self, flags)
assert(type(flags) == "number")
-- This flag must always be set according to the standard.
if (flags & NBD.transmission_flags.HAS_FLAGS) == 0 then
stdnse.debug1("Transmission flags were not in a valid format, skipping.")
return {}
end
local tbl = {}
for k, v in pairs(NBD.transmission_flags) do
if (flags & v) ~= 0 then
tbl[k] = true
end
end
return tbl
end,
}
--- Finds a key corresponding with a value.
--
-- @name find_key
--
-- @param tbl Table in which to search.
-- @param val Value to search for.
--
-- @return key String on success, nil on failure
find_key = function(tbl, val)
assert(type(tbl) == "table")
assert(val ~= nil)
for k, v in pairs(tbl) do
if v == val then
return k
end
end
return nil
end
return _ENV;