new to ryu
i want the controller to diver the flow to a honeypot when it receives an
alert from snort
(using the simple switch snort); but its not working the way i want ;
attaching the code below
from __future__ import print_function
import array
from ryu.base import app_manager
from ryu.controller import ofp_event
from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER
from ryu.controller.handler import set_ev_cls
from ryu.ofproto import ofproto_v1_3
from ryu.lib.packet import packet
from ryu.lib.packet import ethernet
from ryu.lib.packet import ipv4, ipv6
from ryu.lib.packet import icmp, tcp, udp, arp
from ryu.lib import snortlib
class SimpleSwitchSnort(app_manager.RyuApp):
OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]
_CONTEXTS = {'snortlib': snortlib.SnortLib}
def __init__(self, *args, **kwargs):
super(SimpleSwitchSnort, self).__init__(*args, **kwargs)
self.snort = kwargs['snortlib']
self.snort_port = 3
self.mac_to_port = {}
self.datapath = None
socket_config = {'unixsock': False}
self.snort.set_config(socket_config)
self.snort.start_socket_server()
def packet_print(self, pkt):
pkt = packet.Packet(array.array('B', pkt))
eth = pkt.get_protocol(ethernet.ethernet)
_ipv4 = pkt.get_protocol(ipv4.ipv4)
_icmp = pkt.get_protocol(icmp.icmp)
if _icmp:
self.logger.info("%r", _icmp)
if _ipv4:
self.logger.info("%r", _ipv4)
if eth:
self.logger.info("%r", eth)
# for p in pkt.protocols:
# if hasattr(p, 'protocol_name') is False:
# break
# print('p: %s' % p.protocol_name)
#ipv4_dst = "192.168.1.4"
#actions = [parser.OFPActionOutput(ipv4_dst)]
#self.add_flow(datapath, priority, match, actions)
@set_ev_cls(snortlib.EventAlert, MAIN_DISPATCHER)
def process_snort_alert(self, ev):
self._dump_alert(ev)
msg = ev.msg
alertmsg = ''.join(msg.alertmsg)
if 'ryu block' in alertmsg:
self.logger.info('Diverting this flow:{0}'.format(alertmsg))
self.send_divert_flowrule(msg)
def _dump_alert(self, ev):
msg = ev.msg
print('alertmsg: %s' % ''.join(msg.alertmsg))
self.packet_print(msg.pkt)
@set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
def switch_features_handler(self, ev):
datapath = ev.msg.datapath
self.datapath = datapath
self.logger.info('add datapath id: {0}'.format(datapath.id))
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
# install table-miss flow entry
#
# We specify NO BUFFER to max_len of the output action due to
# OVS bug. At this moment, if we specify a lesser number, e.g.,
# 128, OVS will send Packet-In with invalid buffer_id and
# truncated packet data. In that case, we cannot output packets
# correctly.
match = parser.OFPMatch()
actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
ofproto.OFPCML_NO_BUFFER)]
self.add_flow(datapath, 0, match, actions)
def add_flow(self, datapath, priority, match, actions):
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
actions)]
mod = parser.OFPFlowMod(datapath=datapath, priority=priority,
match=match, instructions=inst)
datapath.send_msg(mod)
@set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
def _packet_in_handler(self, ev):
msg = ev.msg
datapath = msg.datapath
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
in_port = msg.match['in_port']
pkt = packet.Packet(msg.data)
eth = pkt.get_protocols(ethernet.ethernet)[0]
dst = eth.dst
src = eth.src
dpid = datapath.id
self.mac_to_port.setdefault(dpid, {})
# self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port)
# learn a mac address to avoid FLOOD next time.
self.mac_to_port[dpid][src] = in_port
if dst in self.mac_to_port[dpid]:
out_port = self.mac_to_port[dpid][dst]
else:
out_port = ofproto.OFPP_FLOOD
actions = [parser.OFPActionOutput(out_port),
parser.OFPActionOutput(self.snort_port)]
# install a flow to avoid packet_in next time
if out_port != ofproto.OFPP_FLOOD:
match = parser.OFPMatch(in_port=in_port, eth_dst=dst)
self.add_flow(datapath, 1, match, actions)
data = None
if msg.buffer_id == ofproto.OFP_NO_BUFFER:
data = msg.data
out = parser.OFPPacketOut(datapath=datapath,
buffer_id=msg.buffer_id,
in_port=in_port, actions=actions,
data=data)
datapath.send_msg(out)
def send_divert_flowrule(self, msg):
datapath = self.datapath
if datapath is None:
self.logger.info('no switch detected ')
return
ofproto = datapath.ofproto
parser = datapath.ofproto_parser
pkt = packet.Packet(array.array('B',msg.pkt))
pkt_eth = pkt.get_protocol(ethernet.ethernet)
mac_src = pkt_eth.src
eth_type = pkt_eth.ethertype
pkt_ipv4 = pkt.get_protocol(ipv4.ipv4)
if pkt_ipv4:
dst = pkt_ipv4.dst
src = "10.0.0.1"
ip_proto = pkt_ipv4.proto
pkt_tcp = pkt.get_protocol(tcp.tcp)
pkt_udp = pkt.get_protocol(udp.udp)
pkt_icmp = pkt.get_protocol(icmp.icmp)
#TCP flow
if pkt_tcp:
self.logger.info('received tcp packet')
L4_pkt = pkt_tcp
L4_src = L4_pkt.src_port
L4_dst = L4_pkt.dst_port
match = parser.OFPMatch(eth_src=mac_src,
eth_type=0x0800, ipv4_dst=pkt_ipv4.dst,
ipv4_src="10.0.0.1",
ip_proto=ip_proto, tcp_src=L4_src,
tcp_dst=L4_dst)
elif pkt_udp:
self.logger.info('received udp packet')
L4_pkt = pkt_udp
L4_src = L4_pkt.src_port
L4_dst = L4_pkt.dst_port
match = parser.OFPMatch(eth_src=mac_src,
eth_type=eth_type,
ipv4_dst=pkt_ipv4.dst, ipv4_src="10.0.0.1",
ip_proto=ip_proto, udp_src=L4_src,
udp_dst=L4_dst)
elif pkt_icmp:
self.logger.info('received icmp packet')
match = parser.OFPMatch(eth_src=mac_src,
eth_type=eth_type,
ipv4_dst=pkt_ipv4.dst, ipv4_src="10.0.0.1",
ip_proto=ip_proto)
else:
return
#out_port = 3
priority = 100
#actions = [parser.OFPActionOutput(out_port)]
#actions -modify packet header to change destination addr(this
is the redirect action part )
action_modify_headers =
[parser.OFPActionSetField(eth_dst="08:00:27:13:98:c5"),
parser.OFPActionSetField(ipv4_dst="192.168.1.4"),
parser.OFPActionOutput(2)]
self.add_flow(datapath, priority, match1, actions)
datapath.send_msg(out)
# def add_flow(self, datapath, priority, match, actions,
idle_timeout=0, hard_timeout=0, buffer_id=None):
# ofproto = datapath.ofproto
# parser = datapath.ofproto_parser
#
# inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
actions)]
# if buffer_id:
# mod = parser.OFPFlowMod(datapath = datapath, buffer_id =
buffer_id, priority = priority, match = match, instructions = inst)
# else:
# mod = parser.OFPFlowMod(datapath = datapath, priority =
priority, match = match, instructions = inst)
#
# datapath.send_msg(mod)
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel