mirror of https://github.com/OISF/suricata
added http_stat_msg keyword support for detection module
parent
a4d19e4130
commit
1deae70cf7
@ -0,0 +1,709 @@
|
||||
/* Copyright (C) 2007-2010 Open Information Security Foundation
|
||||
*
|
||||
* You can copy, redistribute or modify this Program under the terms of
|
||||
* the GNU General Public License version 2 as published by the Free
|
||||
* Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* version 2 along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||||
* 02110-1301, USA.
|
||||
*/
|
||||
|
||||
/**
|
||||
* \file
|
||||
*
|
||||
* \author Gurvinder Singh <gurvindersinghdahiya@gmail.com>
|
||||
*
|
||||
* Implements the http_stat_msg keyword
|
||||
*/
|
||||
|
||||
#include "suricata-common.h"
|
||||
#include "threads.h"
|
||||
#include "debug.h"
|
||||
#include "decode.h"
|
||||
#include "detect.h"
|
||||
|
||||
#include "detect-parse.h"
|
||||
#include "detect-engine.h"
|
||||
#include "detect-content.h"
|
||||
|
||||
#include "flow.h"
|
||||
#include "flow-var.h"
|
||||
#include "flow-util.h"
|
||||
|
||||
#include "util-debug.h"
|
||||
#include "util-error.h"
|
||||
#include "util-unittest.h"
|
||||
#include "util-unittest-helper.h"
|
||||
#include "util-spm.h"
|
||||
#include "util-print.h"
|
||||
|
||||
#include "app-layer.h"
|
||||
|
||||
#include <htp/htp.h>
|
||||
#include "app-layer-htp.h"
|
||||
#include "detect-http-stat-msg.h"
|
||||
#include "stream-tcp-private.h"
|
||||
#include "stream-tcp.h"
|
||||
|
||||
int DetectHttpStatMsgMatch (ThreadVars *, DetectEngineThreadCtx *,
|
||||
Flow *, uint8_t , void *, Signature *,
|
||||
SigMatch *);
|
||||
static int DetectHttpStatMsgSetup (DetectEngineCtx *, Signature *, char *);
|
||||
void DetectHttpStatMsgRegisterTests(void);
|
||||
void DetectHttpStatMsgFree(void *);
|
||||
|
||||
/**
|
||||
* \brief Registration function for keyword: http_stat_msg
|
||||
*/
|
||||
void DetectHttpStatMsgRegister (void) {
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].name = "http_stat_msg";
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].Match = NULL;
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].AppLayerMatch = DetectHttpStatMsgMatch;
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].alproto = ALPROTO_HTTP;
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].Setup = DetectHttpStatMsgSetup;
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].Free = DetectHttpStatMsgFree;
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].RegisterTests = DetectHttpStatMsgRegisterTests;
|
||||
|
||||
sigmatch_table[DETECT_AL_HTTP_STAT_MSG].flags |= SIGMATCH_PAYLOAD;
|
||||
}
|
||||
|
||||
/**
|
||||
* \brief match the specified content in the signature with the received http
|
||||
* status message header in the http response.
|
||||
*
|
||||
* \param t pointer to thread vars
|
||||
* \param det_ctx pointer to the pattern matcher thread
|
||||
* \param f pointer to the current flow
|
||||
* \param flags flags to indicate the direction of the received packet
|
||||
* \param state pointer the app layer state, which will cast into HtpState
|
||||
* \param s pointer to the current signature
|
||||
* \param sm pointer to the sigmatch
|
||||
*
|
||||
* \retval 0 no match
|
||||
* \retval 1 match
|
||||
*/
|
||||
int DetectHttpStatMsgMatch (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
|
||||
Flow *f, uint8_t flags, void *state, Signature *s,
|
||||
SigMatch *sm)
|
||||
{
|
||||
SCEnter();
|
||||
|
||||
int ret = 0;
|
||||
size_t idx;
|
||||
|
||||
SCMutexLock(&f->m);
|
||||
SCLogDebug("got lock %p", &f->m);
|
||||
|
||||
DetectHttpStatMsgData *co = (DetectHttpStatMsgData *)sm->ctx;
|
||||
|
||||
HtpState *htp_state = (HtpState *)state;
|
||||
if (htp_state == NULL) {
|
||||
SCLogDebug("no HTTP layer state has been received, so no match");
|
||||
goto end;
|
||||
}
|
||||
|
||||
if (!(htp_state->flags & HTP_FLAG_STATE_OPEN)) {
|
||||
SCLogDebug("HTP state not yet properly setup, so no match");
|
||||
goto end;
|
||||
}
|
||||
|
||||
SCLogDebug("htp_state %p, flow %p", htp_state, f);
|
||||
SCLogDebug("htp_state->connp %p", htp_state->connp);
|
||||
SCLogDebug("htp_state->connp->conn %p", htp_state->connp->conn);
|
||||
|
||||
if (htp_state->connp == NULL || htp_state->connp->conn == NULL) {
|
||||
SCLogDebug("HTTP connection structure is NULL");
|
||||
goto end;
|
||||
}
|
||||
|
||||
htp_tx_t *tx = NULL;
|
||||
|
||||
for (idx = 0; idx < list_size(htp_state->connp->conn->transactions); idx++)
|
||||
{
|
||||
tx = list_get(htp_state->connp->conn->transactions, idx);
|
||||
if (tx == NULL)
|
||||
continue;
|
||||
|
||||
SCLogDebug("we have a response message");
|
||||
|
||||
/* call the case insensitive version if nocase has been specified in the sig */
|
||||
if (co->flags & DETECT_AL_HTTP_STAT_MSG_NOCASE) {
|
||||
if (SpmNocaseSearch((uint8_t *) bstr_ptr(tx->response_message),
|
||||
bstr_len(tx->response_message), co->data, co->data_len) != NULL)
|
||||
{
|
||||
SCLogDebug("match has been found in received request and given http_"
|
||||
"stat_msg rule");
|
||||
ret = 1;
|
||||
}
|
||||
} else {
|
||||
if (SpmSearch((uint8_t *) bstr_ptr(tx->response_message),
|
||||
bstr_len(tx->response_message), co->data, co->data_len) != NULL)
|
||||
{
|
||||
SCLogDebug("match has been found in received request and given http_"
|
||||
"stat_msg rule");
|
||||
ret = 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
SCMutexUnlock(&f->m);
|
||||
SCReturnInt(ret ^ ((co->flags & DETECT_AL_HTTP_STAT_MSG_NEGATED) ? 1 : 0));
|
||||
|
||||
end:
|
||||
SCMutexUnlock(&f->m);
|
||||
SCLogDebug("released lock %p", &f->m);
|
||||
SCReturnInt(ret);
|
||||
}
|
||||
|
||||
/**
|
||||
* \brief this function clears the memory of http_stat_msg modifier keyword
|
||||
*
|
||||
* \param ptr Pointer to the Detection Stat Message data
|
||||
*/
|
||||
void DetectHttpStatMsgFree(void *ptr)
|
||||
{
|
||||
DetectHttpStatMsgData *hsmd = (DetectHttpStatMsgData *)ptr;
|
||||
if (hsmd == NULL)
|
||||
return;
|
||||
if (hsmd->data != NULL)
|
||||
SCFree(hsmd->data);
|
||||
SCFree(hsmd);
|
||||
}
|
||||
|
||||
/**
|
||||
* \brief this function setups the http_stat_msg modifier keyword used in the rule
|
||||
*
|
||||
* \param de_ctx Pointer to the Detection Engine Context
|
||||
* \param s Pointer to the Signature to which the current keyword belongs
|
||||
* \param str Should hold an empty string always
|
||||
*
|
||||
* \retval 0 On success
|
||||
* \retval -1 On failure
|
||||
*/
|
||||
|
||||
static int DetectHttpStatMsgSetup (DetectEngineCtx *de_ctx, Signature *s, char *str)
|
||||
{
|
||||
DetectHttpStatMsgData *hd = NULL;
|
||||
SigMatch *sm = NULL;
|
||||
|
||||
/** new sig match to replace previous content */
|
||||
SigMatch *nm = NULL;
|
||||
|
||||
if (str != NULL && strcmp(str, "") != 0) {
|
||||
SCLogError(SC_ERR_INVALID_ARGUMENT, "http_stat_msg shouldn't be supplied"
|
||||
" with an argument");
|
||||
return -1;
|
||||
}
|
||||
|
||||
SigMatch *pm = DetectContentGetLastPattern(s->pmatch_tail);
|
||||
if (pm == NULL) {
|
||||
SCLogWarning(SC_ERR_INVALID_SIGNATURE, "http_stat_msg found inside "
|
||||
"the rule, without a content context. Please use a "
|
||||
"content keyword before using http_stat_msg");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* http_stat_msg should not be used with the fast_pattern rule */
|
||||
if (((DetectContentData *)pm->ctx)->flags & DETECT_CONTENT_FAST_PATTERN) {
|
||||
SCLogWarning(SC_WARN_COMPATIBILITY, "http_stat_msg rule can not "
|
||||
"be used with the fast_pattern rule keyword. "
|
||||
"Unsetting fast_pattern on this modifier. Signature ==> %s",
|
||||
s->sig_str);
|
||||
((DetectContentData *)pm->ctx)->flags &= ~DETECT_CONTENT_FAST_PATTERN;
|
||||
|
||||
/* http_stat_msg should not be used with the rawbytes rule */
|
||||
} else if (((DetectContentData *)pm->ctx)->flags & DETECT_CONTENT_RAWBYTES) {
|
||||
SCLogError(SC_ERR_INVALID_SIGNATURE, "http_stat_msg rule can not "
|
||||
"be used with the rawbytes rule keyword");
|
||||
return -1;
|
||||
}
|
||||
|
||||
nm = SigMatchAlloc();
|
||||
if (nm == NULL) {
|
||||
SCLogError(SC_ERR_MEM_ALLOC, "SigMatchAlloc failed");
|
||||
goto error;
|
||||
}
|
||||
|
||||
/* Setup the HttpStatMsg data from Content data structure */
|
||||
hd = SCMalloc(sizeof(DetectHttpStatMsgData));
|
||||
if (hd == NULL)
|
||||
goto error;
|
||||
|
||||
memset(hd, 0, sizeof(DetectHttpStatMsgData));
|
||||
|
||||
/* Setup the http_stat_msg keyword data */
|
||||
hd->data_len = ((DetectContentData *)pm->ctx)->content_len;
|
||||
hd->data = ((DetectContentData *)pm->ctx)->content;
|
||||
hd->flags |= (((DetectContentData *)pm->ctx)->flags & DETECT_CONTENT_NOCASE) ?
|
||||
DETECT_AL_HTTP_STAT_MSG_NOCASE : 0x00;
|
||||
hd->flags |= (((DetectContentData *)pm->ctx)->flags & DETECT_CONTENT_NEGATED) ?
|
||||
DETECT_AL_HTTP_STAT_MSG_NEGATED : 0x00;
|
||||
nm->type = DETECT_AL_HTTP_STAT_MSG;
|
||||
nm->ctx = (void *)hd;
|
||||
|
||||
/* pull the previous content from the pmatch list, append
|
||||
* the new match to the match list */
|
||||
SigMatchReplaceContent(s, pm, nm);
|
||||
|
||||
/* free the old content sigmatch, the content pattern memory
|
||||
* is taken over by the new sigmatch */
|
||||
BoyerMooreCtxDeInit(((DetectContentData *)pm->ctx)->bm_ctx);
|
||||
SCFree(pm->ctx);
|
||||
SCFree(pm);
|
||||
|
||||
/* Flagged the signature as to inspect the app layer data */
|
||||
s->flags |= SIG_FLAG_APPLAYER;
|
||||
|
||||
if (s->alproto != ALPROTO_UNKNOWN && s->alproto != ALPROTO_HTTP) {
|
||||
SCLogError(SC_ERR_CONFLICTING_RULE_KEYWORDS, "rule contains conflicting"
|
||||
" keywords.");
|
||||
goto error;
|
||||
}
|
||||
|
||||
s->alproto = ALPROTO_HTTP;
|
||||
return 0;
|
||||
error:
|
||||
if (hd != NULL) DetectHttpStatMsgFree(hd);
|
||||
if(sm !=NULL) SCFree(sm);
|
||||
return -1;
|
||||
}
|
||||
|
||||
#ifdef UNITTESTS
|
||||
|
||||
/**
|
||||
* \test Checks if a http_stat_msg is registered in a Signature, if content is not
|
||||
* specified in the signature or rawbyes is specified or fast_pattern is
|
||||
* provided in the signature.
|
||||
*/
|
||||
int DetectHttpStatMsgTest01(void)
|
||||
{
|
||||
DetectEngineCtx *de_ctx = NULL;
|
||||
int result = 0;
|
||||
|
||||
if ( (de_ctx = DetectEngineCtxInit()) == NULL)
|
||||
goto end;
|
||||
|
||||
de_ctx->flags |= DE_QUIET;
|
||||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||||
"(msg:\"Testing http_stat_msg\"; http_stat_msg;sid:1;)");
|
||||
if (de_ctx->sig_list != NULL)
|
||||
goto end;
|
||||
|
||||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||||
"(msg:\"Testing http_stat_msg\"; content:\"|FF F1|\";"
|
||||
" rawbytes; http_stat_msg;sid:1;)");
|
||||
if (de_ctx->sig_list != NULL)
|
||||
goto end;
|
||||
|
||||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||||
"(msg:\"Testing http_stat_msg\"; content:\"one\";"
|
||||
"fast_pattern; http_stat_msg;sid:1;)");
|
||||
if (de_ctx->sig_list == NULL ||
|
||||
((DetectContentData *)de_ctx->sig_list->amatch->ctx)->flags &
|
||||
DETECT_CONTENT_FAST_PATTERN)
|
||||
{
|
||||
goto end;
|
||||
}
|
||||
|
||||
result = 1;
|
||||
end:
|
||||
if (de_ctx != NULL)
|
||||
DetectEngineCtxFree(de_ctx);
|
||||
return result;
|
||||
}
|
||||
|
||||
/**
|
||||
* \test Checks if a http_stat_msg is registered in a Signature and also checks
|
||||
* the nocase
|
||||
*/
|
||||
int DetectHttpStatMsgTest02(void)
|
||||
{
|
||||
SigMatch *sm = NULL;
|
||||
DetectEngineCtx *de_ctx = NULL;
|
||||
int result = 0;
|
||||
|
||||
if ( (de_ctx = DetectEngineCtxInit()) == NULL)
|
||||
goto end;
|
||||
|
||||
de_ctx->flags |= DE_QUIET;
|
||||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||||
"(msg:\"Testing http_stat_msg\"; content:\"one\"; "
|
||||
"http_stat_msg; content:\"two\"; http_stat_msg; "
|
||||
"content:\"two\"; nocase; http_stat_msg; "
|
||||
"sid:1;)");
|
||||
if (de_ctx->sig_list == NULL) {
|
||||
printf("sig parse failed: ");
|
||||
goto end;
|
||||
}
|
||||
|
||||
result = 0;
|
||||
sm = de_ctx->sig_list->amatch;
|
||||
if (sm == NULL) {
|
||||
printf("no sigmatch(es): ");
|
||||
goto end;
|
||||
}
|
||||
|
||||
SigMatch *prev = NULL;
|
||||
while (sm != NULL) {
|
||||
if (sm->type == DETECT_AL_HTTP_STAT_MSG) {
|
||||
result = 1;
|
||||
} else {
|
||||
printf("expected DETECT_AL_HTTP_STAT_MSG, got %d: ", sm->type);
|
||||
goto end;
|
||||
}
|
||||
prev = sm;
|
||||
sm = sm->next;
|
||||
}
|
||||
|
||||
if (! (((DetectHttpStatMsgData *)prev->ctx)->flags &
|
||||
DETECT_AL_HTTP_STAT_MSG_NOCASE))
|
||||
{
|
||||
result = 0;
|
||||
}
|
||||
end:
|
||||
if (de_ctx != NULL)
|
||||
DetectEngineCtxFree(de_ctx);
|
||||
return result;
|
||||
}
|
||||
|
||||
/** \test Check the signature working to alert when http_stat_msg is matched . */
|
||||
static int DetectHttpStatMsgSigTest01(void) {
|
||||
int result = 0;
|
||||
Flow f;
|
||||
uint8_t httpbuf1[] = "POST / HTTP/1.0\r\nUser-Agent: Mozilla/1.0\r\n\r\n";
|
||||
uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
|
||||
uint8_t httpbuf2[] = "HTTP/1.0 200 OK\r\n\r\n";
|
||||
uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
|
||||
TcpSession ssn;
|
||||
Packet *p = NULL;
|
||||
Signature *s = NULL;
|
||||
ThreadVars th_v;
|
||||
DetectEngineThreadCtx *det_ctx = NULL;
|
||||
HtpState *http_state = NULL;
|
||||
|
||||
memset(&th_v, 0, sizeof(th_v));
|
||||
memset(&f, 0, sizeof(f));
|
||||
memset(&ssn, 0, sizeof(ssn));
|
||||
|
||||
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||||
|
||||
FLOW_INITIALIZE(&f);
|
||||
f.protoctx = (void *)&ssn;
|
||||
f.src.family = AF_INET;
|
||||
f.dst.family = AF_INET;
|
||||
|
||||
p->flow = &f;
|
||||
p->flowflags |= FLOW_PKT_TOSERVER;
|
||||
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
||||
p->flags |= PKT_HAS_FLOW;
|
||||
f.alproto = ALPROTO_HTTP;
|
||||
|
||||
StreamTcpInitConfig(TRUE);
|
||||
FlowL7DataPtrInit(&f);
|
||||
|
||||
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
||||
if (de_ctx == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
de_ctx->flags |= DE_QUIET;
|
||||
|
||||
s = de_ctx->sig_list = SigInit(de_ctx,"alert http any any -> any any (msg:"
|
||||
"\"HTTP status message\"; content:\"OK\"; "
|
||||
"http_stat_msg; sid:1;)");
|
||||
if (s == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
s->next = SigInit(de_ctx,"alert http any any -> any any (msg:\"HTTP "
|
||||
"Status message nocase\"; content:\"ok\"; nocase; "
|
||||
"http_stat_msg; sid:2;)");
|
||||
if (s->next == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
SigGroupBuild(de_ctx);
|
||||
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
||||
|
||||
int r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
|
||||
if (r != 0) {
|
||||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOCLIENT, httpbuf2, httplen2);
|
||||
if (r != 0) {
|
||||
printf("toclient chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
http_state = f.aldata[AlpGetStateIdx(ALPROTO_HTTP)];
|
||||
if (http_state == NULL) {
|
||||
printf("no http state: ");
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* do detect */
|
||||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
||||
|
||||
if (!(PacketAlertCheck(p, 1))) {
|
||||
printf("sid 1 didn't match but should have: ");
|
||||
goto end;
|
||||
}
|
||||
if (!(PacketAlertCheck(p, 2))) {
|
||||
printf("sid 2 didn't match but should have: ");
|
||||
goto end;
|
||||
}
|
||||
|
||||
result = 1;
|
||||
end:
|
||||
if (det_ctx != NULL) {
|
||||
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
||||
}
|
||||
if (de_ctx != NULL) {
|
||||
SigGroupCleanup(de_ctx);
|
||||
DetectEngineCtxFree(de_ctx);
|
||||
}
|
||||
|
||||
FlowL7DataPtrFree(&f);
|
||||
StreamTcpFreeConfig(TRUE);
|
||||
|
||||
UTHFreePackets(&p, 1);
|
||||
return result;
|
||||
}
|
||||
|
||||
/** \test Check the signature working to alert when http_stat_msg is not matched . */
|
||||
static int DetectHttpStatMsgSigTest02(void) {
|
||||
int result = 0;
|
||||
Flow f;
|
||||
uint8_t httpbuf1[] = "POST / HTTP/1.0\r\nUser-Agent: Mozilla/1.0\r\n\r\n";
|
||||
uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
|
||||
uint8_t httpbuf2[] = "HTTP/1.0 200 OK\r\n\r\n";
|
||||
uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
|
||||
TcpSession ssn;
|
||||
Packet *p = NULL;
|
||||
Signature *s = NULL;
|
||||
ThreadVars th_v;
|
||||
DetectEngineThreadCtx *det_ctx = NULL;
|
||||
HtpState *http_state = NULL;
|
||||
|
||||
memset(&th_v, 0, sizeof(th_v));
|
||||
memset(&f, 0, sizeof(f));
|
||||
memset(&ssn, 0, sizeof(ssn));
|
||||
|
||||
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||||
|
||||
FLOW_INITIALIZE(&f);
|
||||
f.protoctx = (void *)&ssn;
|
||||
f.src.family = AF_INET;
|
||||
f.dst.family = AF_INET;
|
||||
|
||||
p->flow = &f;
|
||||
p->flowflags |= FLOW_PKT_TOSERVER;
|
||||
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
||||
p->flags |= PKT_HAS_FLOW;
|
||||
f.alproto = ALPROTO_HTTP;
|
||||
|
||||
StreamTcpInitConfig(TRUE);
|
||||
FlowL7DataPtrInit(&f);
|
||||
|
||||
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
||||
if (de_ctx == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
de_ctx->flags |= DE_QUIET;
|
||||
|
||||
s = de_ctx->sig_list = SigInit(de_ctx,"alert http any any -> any any (msg:"
|
||||
"\"HTTP status message\"; content:\"no\"; "
|
||||
"http_stat_msg; sid:1;)");
|
||||
if (s == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
SigGroupBuild(de_ctx);
|
||||
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
||||
|
||||
int r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
|
||||
if (r != 0) {
|
||||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOCLIENT, httpbuf2, httplen2);
|
||||
if (r != 0) {
|
||||
printf("toclient chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
http_state = f.aldata[AlpGetStateIdx(ALPROTO_HTTP)];
|
||||
if (http_state == NULL) {
|
||||
printf("no http state: ");
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* do detect */
|
||||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
||||
|
||||
if (PacketAlertCheck(p, 1)) {
|
||||
printf("sid 1 matched but shouldn't: ");
|
||||
goto end;
|
||||
}
|
||||
|
||||
result = 1;
|
||||
end:
|
||||
if (det_ctx != NULL) {
|
||||
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
||||
}
|
||||
if (de_ctx != NULL) {
|
||||
SigGroupCleanup(de_ctx);
|
||||
DetectEngineCtxFree(de_ctx);
|
||||
}
|
||||
|
||||
FlowL7DataPtrFree(&f);
|
||||
StreamTcpFreeConfig(TRUE);
|
||||
|
||||
UTHFreePackets(&p, 1);
|
||||
return result;
|
||||
}
|
||||
|
||||
/** \test Check the signature working to alert when http_stat_msg is used with
|
||||
* negated content . */
|
||||
static int DetectHttpStatMsgSigTest03(void) {
|
||||
int result = 0;
|
||||
Flow f;
|
||||
uint8_t httpbuf1[] = "POST / HTTP/1.0\r\nUser-Agent: Mozilla/1.0\r\n\r\n";
|
||||
uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
|
||||
uint8_t httpbuf2[] = "HTTP/1.0 200 OK\r\n\r\n";
|
||||
uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
|
||||
TcpSession ssn;
|
||||
Packet *p = NULL;
|
||||
Signature *s = NULL;
|
||||
ThreadVars th_v;
|
||||
DetectEngineThreadCtx *det_ctx = NULL;
|
||||
HtpState *http_state = NULL;
|
||||
|
||||
memset(&th_v, 0, sizeof(th_v));
|
||||
memset(&f, 0, sizeof(f));
|
||||
memset(&ssn, 0, sizeof(ssn));
|
||||
|
||||
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||||
|
||||
FLOW_INITIALIZE(&f);
|
||||
f.protoctx = (void *)&ssn;
|
||||
f.src.family = AF_INET;
|
||||
f.dst.family = AF_INET;
|
||||
|
||||
p->flow = &f;
|
||||
p->flowflags |= FLOW_PKT_TOSERVER;
|
||||
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
||||
p->flags |= PKT_HAS_FLOW;
|
||||
f.alproto = ALPROTO_HTTP;
|
||||
|
||||
StreamTcpInitConfig(TRUE);
|
||||
FlowL7DataPtrInit(&f);
|
||||
|
||||
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
||||
if (de_ctx == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
de_ctx->flags |= DE_QUIET;
|
||||
|
||||
s = de_ctx->sig_list = SigInit(de_ctx,"alert http any any -> any any (msg:"
|
||||
"\"HTTP status message\"; content:\"ok\"; "
|
||||
"nocase; http_stat_msg; sid:1;)");
|
||||
if (s == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
s->next = SigInit(de_ctx,"alert http any any -> any any (msg:\"HTTP "
|
||||
"Status message nocase\"; content:!\"Not\"; "
|
||||
"http_stat_msg; sid:2;)");
|
||||
if (s->next == NULL) {
|
||||
goto end;
|
||||
}
|
||||
|
||||
SigGroupBuild(de_ctx);
|
||||
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
||||
|
||||
int r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
|
||||
if (r != 0) {
|
||||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
r = AppLayerParse(&f, ALPROTO_HTTP, STREAM_TOCLIENT, httpbuf2, httplen2);
|
||||
if (r != 0) {
|
||||
printf("toclient chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
http_state = f.aldata[AlpGetStateIdx(ALPROTO_HTTP)];
|
||||
if (http_state == NULL) {
|
||||
printf("no http state: ");
|
||||
result = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* do detect */
|
||||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
||||
|
||||
if (! PacketAlertCheck(p, 1)) {
|
||||
printf("sid 1 didn't matched but should have: ");
|
||||
goto end;
|
||||
}
|
||||
if (! PacketAlertCheck(p, 2)) {
|
||||
printf("sid 2 didn't matched but should have: ");
|
||||
goto end;
|
||||
}
|
||||
|
||||
result = 1;
|
||||
end:
|
||||
if (det_ctx != NULL) {
|
||||
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
||||
}
|
||||
if (de_ctx != NULL) {
|
||||
SigGroupCleanup(de_ctx);
|
||||
DetectEngineCtxFree(de_ctx);
|
||||
}
|
||||
|
||||
FlowL7DataPtrFree(&f);
|
||||
StreamTcpFreeConfig(TRUE);
|
||||
|
||||
UTHFreePackets(&p, 1);
|
||||
return result;
|
||||
}
|
||||
|
||||
#endif /* UNITTESTS */
|
||||
|
||||
/**
|
||||
* \brief Register the UNITTESTS for the http_stat_msg keyword
|
||||
*/
|
||||
void DetectHttpStatMsgRegisterTests (void)
|
||||
{
|
||||
#ifdef UNITTESTS /* UNITTESTS */
|
||||
|
||||
UtRegisterTest("DetectHttpStatMsgTest01", DetectHttpStatMsgTest01, 1);
|
||||
UtRegisterTest("DetectHttpStatMsgTest02", DetectHttpStatMsgTest02, 1);
|
||||
UtRegisterTest("DetectHttpStatMsgSigTest01", DetectHttpStatMsgSigTest01, 1);
|
||||
UtRegisterTest("DetectHttpStatMsgSigTest02", DetectHttpStatMsgSigTest02, 1);
|
||||
UtRegisterTest("DetectHttpStatMsgSigTest03", DetectHttpStatMsgSigTest03, 1);
|
||||
|
||||
#endif /* UNITTESTS */
|
||||
}
|
@ -0,0 +1,43 @@
|
||||
/* Copyright (C) 2007-2010 Open Information Security Foundation
|
||||
*
|
||||
* You can copy, redistribute or modify this Program under the terms of
|
||||
* the GNU General Public License version 2 as published by the Free
|
||||
* Software Foundation.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* version 2 along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||||
* 02110-1301, USA.
|
||||
*/
|
||||
|
||||
/**
|
||||
* \file
|
||||
*
|
||||
* \author Gurvinder Singh <gurvindersinghdahiya@gmail.com>
|
||||
*/
|
||||
|
||||
#ifndef _DETECT_HTTP_STAT_MSG_H
|
||||
#define _DETECT_HTTP_STAT_MSG_H
|
||||
|
||||
#define DETECT_AL_HTTP_STAT_MSG_NOCASE 0x01
|
||||
#define DETECT_AL_HTTP_STAT_MSG_NEGATED 0x02
|
||||
|
||||
typedef struct DetectHttpStatMsgData_ {
|
||||
uint8_t *data;
|
||||
uint8_t data_len;
|
||||
uint8_t flags;
|
||||
} DetectHttpStatMsgData;
|
||||
|
||||
/* prototypes */
|
||||
int DetectHttpStatMsgMatch (ThreadVars *, DetectEngineThreadCtx *,
|
||||
Flow *, uint8_t , void *, Signature *,
|
||||
SigMatch *);
|
||||
void DetectHttpStatMsgRegister(void);
|
||||
|
||||
#endif /* _DETECT_HTTP_STAT_MSG_H */
|
||||
|
Loading…
Reference in New Issue