Friday, November 30, 2007

Setting up OpenMoko

OpenMoko [http://www.openmoko.org/] is a Linux based open software development platform.

I got my OpenMoko device yesterday and tried installing it. It is a neat little device lets see where it goes after Google announced its Open Handset Alliance; Android [http://code.google.com/android]

So the first thing you want to do when you get your device is update the kernel and the rootfs on the phone.

You will need to put the phone on uboot menu by pressing the AUX button along with the POWER button when not connected to a computer.

1st thing that I did after that was to reset the timeout on the boot menu. Otherwise the phone will shutdown after 30 seconds when idle in uboot mode. Here is how you do it:

Install the uucp package.
cu -l /dev/ttyACM0
GTA01Bv4 # setenv boot_menu_timeout 65000
GTA01Bv4 # saveenv


Download the latest OpenMoko image from their site @ http://buildhost.openmoko.org/

Download dfu-util from: http://buildhost.openmoko.org/OM2007.1/tmp/deploy/images/dfu-util

I installed the August 2007 image using the following commands.

To update the kernel:
./dfu-util -a kernel -R -D ./uImage-2.6.21.5-r3-fic-gta01.bin

To update the root filesystem:
./dfu-util -a rootfs -R -D ./OpenMoko-openmoko-devel-image-glibc-P1-August-Snapshot-20070819-fic-gta01.rootfs.jffs2

You are all set!

Play with Qtopia [http://www.qtopia.net/modules/mydownloads/] as well. the UI for qtopia is pretty cool.
On the Qtopia website you will see a download for NEO 1973 thats the one that you want. The commands are the same as above.

For some reason the phone is not able to recognize the SIM card that I am putting in there. Trying to figure this one out :-)

Sunday, November 25, 2007

Using Libpcap

Libpcap (pcap) is a high level OpenSource API for packet-capturing framework. I was surprised to find out how ridiculously easy it is to use :-)

libpcap can be downloaded at: http://www.tcpdump.org/

To do packet-sniffing using libpcap you need to:
  1. Setup an interface to listen on. You can listen on all the available interfaces if you like.
  2. Filtering network traffic.
  3. Doing the real sniffing.
The people at Berkley did a great job in making this API so easy to use.

Setting up an interface.
This is very easy. You have 2 options:
  • pcap_lookupdev



    char *dev, errbuf[PCAP_ERRBUF_SIZE];

    dev = pcap_lookupdev(errbuf);

    if (dev == NULL)

    {

      fprintf(stderr, "Couldn't find default device: %s\n", errbuf);

      return(2);

    }

    printf("Device: %s\n", dev);




  • pcap_findalldevs


    char *dev, errbuf[PCAP_ERRBUF_SIZE];

    int udev;

    pcap_if_t *alldevsp;

    if(pcap_findalldevs(&alldevsp, errbuf))

    {

      fprintf(stderr, "Couldn't find devices: %s\n", errbuf);

      return(3);

    }

    char *trav = alldevsp;

    printf("Available Device(s): \n");

    while(trav != NULL)

    {

      printf("\t%d) %s\n\t\t%s\n",i++,trav->name,trav->description);

      trav = trav->next;

    }

    printf("Capture on Device (1 - %d): ", (i-1));

    scanf ("%d",&udev);

     

    trav = alldevsp;

    while((udev-1) > 0)

    {

      trav = trav->next;

      udev--;

    }

    dev = trav->name;

    printf("Device: %s\n",dev);



    I am sure there are better ways of doing this. I thought this was the easiest to understand.

    Remember to free the memory:


    pcap_freealldevs(alldevsp);



One really cool thing about pcap is that it provides all the functions with a char ptr to a error string. errbuff should be of size PCAP_ERRBUF_SIZE.

After this you just need to open the device for sniffing.


int promiscuous= 1;

pcap_t *handle = pcap_open_live(dev, BUFSIZ, promiscuous, 1000, errbuf);

if (handle == NULL)

{

  fprintf(stderr, "Couldn't open device %s: %s\n", dev, errbuf);

  return(2);

}


Good practice to close the handle:


pcap_close(handle);



Filtering network traffic.
Yes you can get all the packets and then decide what packets you want to look at OR HAVE BPF DO IT FOR YOU!!!!

This is a two step process.
  1. Compile the filter.
  2. Set the filter.
Easily done :


char *FILTER = "tcp";

struct bpf_program filter_code;

bpf_u_int32 local_net, netmask;

/* Lookup the subnet and mask for the device */

if(pcap_lookupnet(dev, &local_net, &netmask, errbuf) == -1)

  return(3);

/* Compile the BPF filter expression */

if(pcap_compile(handle, &filter_code, FILTER, 1, netmask) == -1)

  return(4);

/* Apply the BPF filter */

if(pcap_setfilter(handle, &filter_code) == -1)

  return(5);



Sniff
Starting sniffing is fairly easy. I am just interested in indefinitely looping (-1) for packets.


pcap_loop(handle, -1, packet_handler, NULL);


packet_handler is the callback function.

Now What
cast cast cast! Do as much casting as possible :)
Here is some snippet form the callback function:


void packet_handler(u_char *args, const struct pcap_pkthdr *pkthdr, const u_char *packet)

{

  printf("length of this packet (off wire): %d\n", pkthdr->len);

  struct ether_header *ethheader;

  struct iphdr *ipheader;

  struct tcphdr *tcpheader;

  struct in_addr source, dest;

 

  ethheader = (struct ether_header *)packet;

  ipheader = (struct iphdr *)(packet + sizeof(struct ether_header));

  tcpheader = (struct tcphdr *)(packet + sizeof(struct ether_header) + sizeof(struct iphdr));

  const char *payload = (u_char *)(packet + sizeof(struct ether_header) + sizeof(struct iphdr) + sizeof(struct tcphdr));

 

  source.s_addr = ipheader->saddr;

  dest.s_addr = ipheader->daddr;

 

  printf("From: %s:%i\t", inet_ntoa(source), ntohs(tcpheader->source));

  printf("To: %s:%i\n", inet_ntoa(dest), ntohs(tcpheader->dest));

  ........



Now you have the payload do whatever you want to do with it!