You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
suricata/src/detect-engine-threshold.c

675 lines
21 KiB
C

/* Copyright (C) 2007-2010 Open Information Security Foundation
*
* You can copy, redistribute or modify this Program under the terms of
* the GNU General Public License version 2 as published by the Free
* Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* version 2 along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
* 02110-1301, USA.
*/
16 years ago
/**
* \defgroup threshold Thresholding
*
* This feature is used to reduce the number of logged alerts for noisy rules.
* This can be tuned to significantly reduce false alarms, and it can also be
* used to write a newer breed of rules. Thresholding commands limit the number
* of times a particular event is logged during a specified time interval.
*
* @{
*/
/**
* \file
*
16 years ago
* \author Breno Silva <breno.silva@gmail.com>
* \author Victor Julien <victor@inliniac.net>
*
* Threshold part of the detection engine.
16 years ago
*/
#include "suricata-common.h"
#include "debug.h"
#include "detect.h"
#include "flow.h"
#include "detect-parse.h"
#include "detect-engine-sigorder.h"
#include "detect-engine-siggroup.h"
#include "detect-engine-address.h"
#include "detect-engine-port.h"
#include "detect-engine-mpm.h"
#include "detect-engine-iponly.h"
#include "detect-engine.h"
#include "detect-engine-threshold.h"
#include "detect-content.h"
#include "detect-uricontent.h"
#include "util-hash.h"
#include "util-time.h"
#include "util-error.h"
#include "util-debug.h"
#include "util-var-name.h"
#include "tm-modules.h"
/**
* \brief Check if a certain signature has threshold option
*
* \param sig Signature pointer
* \param p Packet structure
*
* \retval tsh Return the threshold data from signature or NULL if not found
16 years ago
*/
DetectThresholdData *SigGetThresholdType(Signature *sig, Packet *p)
{
SigMatch *sm = sig->sm_lists_tail[DETECT_SM_LIST_MATCH];
16 years ago
DetectThresholdData *tsh = NULL;
if (p == NULL)
16 years ago
return NULL;
while (sm != NULL) {
if (sm->type == DETECT_THRESHOLD || sm->type == DETECT_DETECTION_FILTER) {
16 years ago
tsh = (DetectThresholdData *)sm->ctx;
return tsh;
}
sm = sm->prev;
16 years ago
}
return NULL;
}
/**
* \brief Search for a threshold data into threshold hash table
*
* \param de_ctx Dectection Context
* \param tsh_ptr Threshold element
* \param p Packet structure
*
* \retval lookup_tsh Return the threshold element
*/
DetectThresholdEntry *ThresholdHashSearch(DetectEngineCtx *de_ctx, DetectThresholdEntry *tsh_ptr, Packet *p)
16 years ago
{
SCEnter();
DetectThresholdEntry *lookup_tsh = NULL;
SCLogDebug("tsh_ptr->track %u", tsh_ptr->track);
16 years ago
if (tsh_ptr->track == TRACK_DST) {
if (PKT_IS_IPV4(p)) {
SCLogDebug("ipv4 dst");
lookup_tsh = HashListTableLookup(de_ctx->ths_ctx.threshold_hash_table_dst, tsh_ptr, sizeof(DetectThresholdEntry));
} else if (PKT_IS_IPV6(p)) {
lookup_tsh = HashListTableLookup(de_ctx->ths_ctx.threshold_hash_table_dst_ipv6, tsh_ptr, sizeof(DetectThresholdEntry));
}
16 years ago
} else if (tsh_ptr->track == TRACK_SRC) {
if (PKT_IS_IPV4(p)) {
SCLogDebug("ipv4 src");
lookup_tsh = HashListTableLookup(de_ctx->ths_ctx.threshold_hash_table_src, tsh_ptr, sizeof(DetectThresholdEntry));
} else if (PKT_IS_IPV6(p))
lookup_tsh = HashListTableLookup(de_ctx->ths_ctx.threshold_hash_table_src_ipv6, tsh_ptr, sizeof(DetectThresholdEntry));
} else {
SCLogDebug("no track, weird");
16 years ago
}
SCReturnPtr(lookup_tsh, "DetectThresholdEntry");
16 years ago
}
/**
* \brief Remove timeout threshold hash elements
*
* \param de_ctx Dectection Context
*
*/
/** \todo In some conditions HashListtableRemove returns at dt->array = NULL
* Must need to check it
**/
static inline void ThresholdTimeoutRemove(DetectEngineCtx *de_ctx, struct timeval *tv)
16 years ago
{
HashListTableBucket *next = NULL;
HashListTableBucket *buck = HashListTableGetListHead(de_ctx->ths_ctx.threshold_hash_table_src);
while (buck != NULL) {
/* get the next before we free "buck" */
next = HashListTableGetListNext(buck);
DetectThresholdEntry *tsh = HashListTableGetListData(buck);
if (tsh == NULL)
goto next;
if ((tv->tv_sec - tsh->tv_sec1) <= tsh->seconds)
goto next;
16 years ago
switch(tsh->ipv) {
case 4:
if (tsh->track == TRACK_SRC) {
HashListTableRemove(de_ctx->ths_ctx.threshold_hash_table_src,
tsh, sizeof(DetectThresholdEntry));
} else if (tsh->track == TRACK_DST) {
HashListTableRemove(de_ctx->ths_ctx.threshold_hash_table_dst,
tsh, sizeof(DetectThresholdEntry));
}
break;
case 6:
if (tsh->track == TRACK_SRC) {
HashListTableRemove(de_ctx->ths_ctx.threshold_hash_table_src_ipv6,
tsh, sizeof(DetectThresholdEntry));
} else if (tsh->track == TRACK_DST) {
HashListTableRemove(de_ctx->ths_ctx.threshold_hash_table_dst_ipv6,
tsh, sizeof(DetectThresholdEntry));
}
break;
16 years ago
}
next:
buck = next;
16 years ago
}
return;
}
/**
* \brief Add threshold element into hash table
*
* \param de_ctx Dectection Context
* \param tsh_ptr Threshold element
* \param p Packet structure
*
*/
void ThresholdHashAdd(DetectEngineCtx *de_ctx, DetectThresholdEntry *tsh_ptr, Packet *p)
16 years ago
{
SCEnter();
16 years ago
int ret = 0;
switch(tsh_ptr->ipv) {
case 4:
if (tsh_ptr->track == TRACK_DST) {
ret = HashListTableAdd(de_ctx->ths_ctx.threshold_hash_table_dst,
tsh_ptr, sizeof(DetectThresholdEntry));
} else if (tsh_ptr->track == TRACK_SRC) {
ret = HashListTableAdd(de_ctx->ths_ctx.threshold_hash_table_src,
tsh_ptr, sizeof(DetectThresholdEntry));
}
break;
case 6:
if (tsh_ptr->track == TRACK_DST)
ret = HashListTableAdd(de_ctx->ths_ctx.threshold_hash_table_dst_ipv6,
tsh_ptr, sizeof(DetectThresholdEntry));
else if (tsh_ptr->track == TRACK_SRC)
ret = HashListTableAdd(de_ctx->ths_ctx.threshold_hash_table_src_ipv6,
tsh_ptr, sizeof(DetectThresholdEntry));
break;
16 years ago
}
if(ret == -1) {
SCLogError(SC_ERR_THRESHOLD_HASH_ADD,
"failed to add element into the hash table");
16 years ago
}
SCReturn;
}
static inline DetectThresholdEntry *DetectThresholdEntryAlloc(DetectThresholdData *td, Packet *p, Signature *s) {
SCEnter();
DetectThresholdEntry *ste = SCMalloc(sizeof(DetectThresholdEntry));
if (ste == NULL) {
SCReturnPtr(NULL, "DetectThresholdEntry");
}
if (PKT_IS_IPV4(p))
ste->ipv = 4;
else if (PKT_IS_IPV6(p))
ste->ipv = 6;
ste->sid = s->id;
ste->gid = s->gid;
if (td->track == TRACK_DST) {
COPY_ADDRESS(&p->dst, &ste->addr);
} else if (td->track == TRACK_SRC) {
COPY_ADDRESS(&p->src, &ste->addr);
}
ste->track = td->track;
ste->seconds = td->seconds;
ste->tv_timeout = 0;
SCReturnPtr(ste, "DetectThresholdEntry");
16 years ago
}
/**
* \brief Make the threshold logic for signatures
*
* \param de_ctx Dectection Context
* \param tsh_ptr Threshold element
* \param p Packet structure
* \param s Signature structure
*
* \retval 1 alert on this event
* \retval 0 do not alert on this event
16 years ago
*/
int PacketAlertThreshold(DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
DetectThresholdData *td, Packet *p, Signature *s)
16 years ago
{
SCEnter();
int ret = 0;
DetectThresholdEntry *lookup_tsh = NULL;
DetectThresholdEntry ste;
if (td == NULL) {
SCReturnInt(0);
}
/* setup the Entry we use to search our hash with */
if (PKT_IS_IPV4(p))
ste.ipv = 4;
else if (PKT_IS_IPV6(p))
ste.ipv = 6;
else {
SCReturnInt(0);
}
ste.sid = s->id;
ste.gid = s->gid;
if (td->track == TRACK_DST) {
COPY_ADDRESS(&p->dst, &ste.addr);
} else if (td->track == TRACK_SRC) {
COPY_ADDRESS(&p->src, &ste.addr);
}
ste.track = td->track;
ste.seconds = td->seconds;
16 years ago
SCMutexLock(&de_ctx->ths_ctx.threshold_table_lock);
switch(td->type) {
16 years ago
case TYPE_LIMIT:
{
SCLogDebug("limit");
16 years ago
lookup_tsh = ThresholdHashSearch(de_ctx, &ste, p);
SCLogDebug("lookup_tsh %p", lookup_tsh);
16 years ago
if (lookup_tsh != NULL) {
if ((p->ts.tv_sec - lookup_tsh->tv_sec1) < td->seconds) {
if (lookup_tsh->current_count < td->count) {
ret = 1;
16 years ago
}
lookup_tsh->current_count++;
} else {
lookup_tsh->tv_sec1 = p->ts.tv_sec;
16 years ago
lookup_tsh->current_count = 1;
ret = 1;
16 years ago
}
} else {
DetectThresholdEntry *e = DetectThresholdEntryAlloc(td, p, s);
if (e == NULL) {
break;
}
e->tv_sec1 = p->ts.tv_sec;
e->current_count = 1;
e->ipv = ste.ipv;
ret = 1;
16 years ago
ThresholdHashAdd(de_ctx, e, p);
16 years ago
}
break;
}
16 years ago
case TYPE_THRESHOLD:
{
SCLogDebug("threshold");
16 years ago
lookup_tsh = ThresholdHashSearch(de_ctx, &ste, p);
16 years ago
if (lookup_tsh != NULL) {
if ((p->ts.tv_sec - lookup_tsh->tv_sec1) < td->seconds) {
16 years ago
lookup_tsh->current_count++;
if (lookup_tsh->current_count >= td->count) {
ret = 1;
16 years ago
lookup_tsh->current_count = 0;
}
} else {
lookup_tsh->tv_sec1 = p->ts.tv_sec;
16 years ago
lookup_tsh->current_count = 1;
}
} else {
if (td->count == 1) {
ret = 1;
16 years ago
} else {
DetectThresholdEntry *e = DetectThresholdEntryAlloc(td, p, s);
if (e == NULL) {
break;
}
e->current_count = 1;
e->tv_sec1 = p->ts.tv_sec;
e->ipv = ste.ipv;
ThresholdHashAdd(de_ctx, e, p);
16 years ago
}
}
break;
}
16 years ago
case TYPE_BOTH:
{
SCLogDebug("both");
16 years ago
lookup_tsh = ThresholdHashSearch(de_ctx, &ste, p);
if (lookup_tsh != NULL) {
if ((p->ts.tv_sec - lookup_tsh->tv_sec1) < td->seconds) {
16 years ago
lookup_tsh->current_count++;
if (lookup_tsh->current_count == td->count) {
ret = 1;
16 years ago
}
} else {
lookup_tsh->tv_sec1 = p->ts.tv_sec;
16 years ago
lookup_tsh->current_count = 1;
}
} else {
DetectThresholdEntry *e = DetectThresholdEntryAlloc(td, p, s);
if (e == NULL) {
break;
}
e->current_count = 1;
e->tv_sec1 = p->ts.tv_sec;
e->ipv = ste.ipv;
16 years ago
ThresholdHashAdd(de_ctx, e, p);
/* for the first match we return 1 to
* indicate we should alert */
if (td->count == 1) {
ret = 1;
16 years ago
}
}
break;
}
/* detection_filter */
case TYPE_DETECTION:
{
SCLogDebug("detection_filter");
lookup_tsh = ThresholdHashSearch(de_ctx, &ste, p);
if (lookup_tsh != NULL) {
if ((p->ts.tv_sec - lookup_tsh->tv_sec1) < td->seconds) {
lookup_tsh->current_count++;
if (lookup_tsh->current_count >= td->count) {
ret = 1;
}
} else {
lookup_tsh->tv_sec1 = p->ts.tv_sec;
lookup_tsh->current_count = 1;
}
} else {
if (td->count == 1) {
ret = 1;
}
DetectThresholdEntry *e = DetectThresholdEntryAlloc(td, p, s);
if (e == NULL) {
break;
}
e->current_count = 1;
e->tv_sec1 = p->ts.tv_sec;
e->ipv = ste.ipv;
ThresholdHashAdd(de_ctx, e, p);
}
break;
}
/* rate_filter */
case TYPE_RATE:
{
SCLogDebug("rate_filter");
/* tracking by src/dst or by rule? */
if (td->track != TRACK_RULE)
lookup_tsh = ThresholdHashSearch(de_ctx, &ste, p);
else
lookup_tsh = (DetectThresholdEntry *)de_ctx->ths_ctx.th_entry[s->num];
if (lookup_tsh != NULL) {
/* Check if we have a timeout enabled, if so,
* we still matching (and enabling the new_action) */
if ( (p->ts.tv_sec - lookup_tsh->tv_timeout) > td->timeout) {
/* Ok, we are done, timeout reached */
td->timeout = 0;
} else {
/* Already matching */
/* Take the action to perform */
switch (td->new_action) {
case TH_ACTION_ALERT:
ALERT_PACKET(p);
break;
case TH_ACTION_DROP:
DROP_PACKET(p);
break;
case TH_ACTION_REJECT:
REJECT_PACKET(p);
break;
case TH_ACTION_PASS:
PASS_PACKET(p);
break;
default:
/* Weird, leave the default action */
break;
}
ret = 1;
}
/* Update the matching state with the timeout interval */
if ( (p->ts.tv_sec - lookup_tsh->tv_sec1) < td->seconds) {
lookup_tsh->current_count++;
if (lookup_tsh->current_count >= td->count) {
/* Then we must enable the new action by setting a
* timeout */
lookup_tsh->tv_timeout = p->ts.tv_sec;
/* Take the action to perform */
switch (td->new_action) {
case TH_ACTION_ALERT:
ALERT_PACKET(p);
break;
case TH_ACTION_DROP:
DROP_PACKET(p);
break;
case TH_ACTION_REJECT:
REJECT_PACKET(p);
break;
case TH_ACTION_PASS:
PASS_PACKET(p);
break;
default:
/* Weird, leave the default action */
break;
}
ret = 1;
}
} else {
lookup_tsh->tv_sec1 = p->ts.tv_sec;
lookup_tsh->current_count = 1;
}
} else {
if (td->count == 1) {
ret = 1;
}
DetectThresholdEntry *e = DetectThresholdEntryAlloc(td, p, s);
if (e == NULL) {
break;
}
e->current_count = 1;
e->tv_sec1 = p->ts.tv_sec;
e->tv_timeout = 0;
e->ipv = ste.ipv;
/** The track is by src/dst or by rule? */
if (td->track != TRACK_RULE)
ThresholdHashAdd(de_ctx, e, p);
else
de_ctx->ths_ctx.th_entry[s->num] = e;
}
break;
}
16 years ago
}
/* handle timing out entries */
ThresholdTimeoutRemove(de_ctx, &p->ts);
SCMutexUnlock(&de_ctx->ths_ctx.threshold_table_lock);
SCReturnInt(ret);
16 years ago
}
void ThresholdFreeFunc(void *data)
{
if (data != NULL)
SCFree(data);
16 years ago
return;
}
/**
* \brief Compare elements into the hash table
*
* \param data1 First element to compare
* \param len1 length of first element
* \param data2 Second element to compare
* \param len2 length of second element
*
* \retval 1 Match or 0 No Match
*/
char ThresholdCompareFunc(void *data1, uint16_t len1, void *data2,uint16_t len2)
{
SCEnter();
16 years ago
DetectThresholdEntry *a = (DetectThresholdEntry *)data1;
DetectThresholdEntry *b = (DetectThresholdEntry *)data2;
16 years ago
if ((a->sid == b->sid) && (a->gid == b->gid) &&
(CMP_ADDR(&a->addr,&b->addr)))
{
SCReturnInt(1);
}
SCReturnInt(0);
16 years ago
}
/**
* \brief Create the hash for threshold tables
*
* \param ht Hash Table
* \param data Data that will be used to create the hash
* \param datalen Data length
*
* \retval hash the hash
*/
uint32_t ThresholdHashFunc(HashListTable *ht, void *data, uint16_t datalen)
{
SCEnter();
DetectThresholdEntry *dt = (DetectThresholdEntry *)data;
16 years ago
uint32_t hash = 0;
if (dt->ipv == 4)
hash = (dt->sid + dt->gid + dt->addr.addr_data32[0]);
16 years ago
else if (dt->ipv == 6)
hash = (dt->sid + dt->gid + dt->addr.addr_data32[0] +
dt->addr.addr_data32[1] +
dt->addr.addr_data32[2] +
dt->addr.addr_data32[3]);
else {
SCLogDebug("no dt->ipv");
}
16 years ago
SCReturnInt(hash % THRESHOLD_HASH_SIZE);
16 years ago
}
/**
* \brief Init threshold context hash tables
*
* \param de_ctx Dectection Context
*
*/
void ThresholdHashInit(DetectEngineCtx *de_ctx)
{
if (de_ctx->ths_ctx.threshold_hash_table_dst == NULL ||
de_ctx->ths_ctx.threshold_hash_table_src == NULL ||
de_ctx->ths_ctx.threshold_hash_table_src_ipv6 == NULL ||
de_ctx->ths_ctx.threshold_hash_table_dst_ipv6 == NULL) {
16 years ago
de_ctx->ths_ctx.threshold_hash_table_dst = HashListTableInit(THRESHOLD_HASH_SIZE, ThresholdHashFunc, ThresholdCompareFunc, ThresholdFreeFunc);
16 years ago
if(de_ctx->ths_ctx.threshold_hash_table_dst == NULL) {
SCLogError(SC_ERR_MEM_ALLOC,
"Threshold: Failed to initialize ipv4 dst hash table.");
exit(EXIT_FAILURE);
}
de_ctx->ths_ctx.threshold_hash_table_src = HashListTableInit(THRESHOLD_HASH_SIZE, ThresholdHashFunc, ThresholdCompareFunc, ThresholdFreeFunc);
if(de_ctx->ths_ctx.threshold_hash_table_dst == NULL) {
SCLogError(SC_ERR_MEM_ALLOC,
"Threshold: Failed to initialize ipv4 src hash table.");
exit(EXIT_FAILURE);
}
de_ctx->ths_ctx.threshold_hash_table_src_ipv6 = HashListTableInit(THRESHOLD_HASH_SIZE, ThresholdHashFunc, ThresholdCompareFunc, ThresholdFreeFunc);
if(de_ctx->ths_ctx.threshold_hash_table_dst == NULL) {
SCLogError(SC_ERR_MEM_ALLOC,
"Threshold: Failed to initialize ipv6 src hash table.");
exit(EXIT_FAILURE);
}
de_ctx->ths_ctx.threshold_hash_table_dst_ipv6 = HashListTableInit(THRESHOLD_HASH_SIZE, ThresholdHashFunc, ThresholdCompareFunc, ThresholdFreeFunc);
if(de_ctx->ths_ctx.threshold_hash_table_dst == NULL) {
SCLogError(SC_ERR_MEM_ALLOC,
"Threshold: Failed to initialize ipv6 dst hash table.");
exit(EXIT_FAILURE);
}
if (SCMutexInit(&de_ctx->ths_ctx.threshold_table_lock, NULL) != 0) {
SCLogError(SC_ERR_MEM_ALLOC,
"Threshold: Failed to initialize hash table mutex.");
exit(EXIT_FAILURE);
}
}
}
/**
* \brief Destroy threshold context hash tables
*
* \param de_ctx Dectection Context
*
*/
void ThresholdContextDestroy(DetectEngineCtx *de_ctx)
{
HashListTableFree(de_ctx->ths_ctx.threshold_hash_table_dst);
HashListTableFree(de_ctx->ths_ctx.threshold_hash_table_src);
HashListTableFree(de_ctx->ths_ctx.threshold_hash_table_dst_ipv6);
HashListTableFree(de_ctx->ths_ctx.threshold_hash_table_src_ipv6);
if (de_ctx->ths_ctx.th_entry != NULL)
SCFree(de_ctx->ths_ctx.th_entry);
16 years ago
}
/**
* @}
*/