mirror of https://github.com/OISF/suricata
dns/detect: dns.opcode keyword
Add a rule keyword, dns.opcode to match on the opcode flag found in the DNS request and response headers. Only exact matches are allowed with negation. Examples: - dns.opcode:4; - dns.opcode:!1;pull/4206/head
parent
c68fbfcfe6
commit
d79c23baa3
@ -0,0 +1,209 @@
|
|||||||
|
/* Copyright (C) 2019 Open Information Security Foundation
|
||||||
|
*
|
||||||
|
* You can copy, redistribute or modify this Program under the terms of
|
||||||
|
* the GNU General Public License version 2 as published by the Free
|
||||||
|
* Software Foundation.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* version 2 along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||||||
|
* 02110-1301, USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
use super::dns::DNSTransaction;
|
||||||
|
use crate::core;
|
||||||
|
use std::ffi::CStr;
|
||||||
|
use std::os::raw::{c_char, c_void};
|
||||||
|
|
||||||
|
#[derive(Debug, PartialEq)]
|
||||||
|
pub struct DetectDnsOpcode {
|
||||||
|
negate: bool,
|
||||||
|
opcode: u8,
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Parse a DNS opcode argument returning the code and if it is to be
|
||||||
|
/// negated or not.
|
||||||
|
///
|
||||||
|
/// For now only an indication that an error occurred is returned, not
|
||||||
|
/// the details of the error.
|
||||||
|
fn parse_opcode(opcode: &str) -> Result<DetectDnsOpcode, ()> {
|
||||||
|
let mut negated = false;
|
||||||
|
for (i, c) in opcode.chars().enumerate() {
|
||||||
|
match c {
|
||||||
|
' ' | '\t' => {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
'!' => {
|
||||||
|
negated = true;
|
||||||
|
}
|
||||||
|
_ => {
|
||||||
|
let code: u8 = (&opcode[i..]).parse().or_else(|_| Err(()))?;
|
||||||
|
return Ok(DetectDnsOpcode {
|
||||||
|
negate: negated,
|
||||||
|
opcode: code,
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Err(())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Perform the DNS opcode match.
|
||||||
|
///
|
||||||
|
/// 1 will be returned on match, otherwise 0 will be returned.
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "C" fn rs_dns_opcode_match(
|
||||||
|
tx: &mut DNSTransaction,
|
||||||
|
detect: &mut DetectDnsOpcode,
|
||||||
|
flags: u8,
|
||||||
|
) -> u8 {
|
||||||
|
let header_flags = if flags & core::STREAM_TOSERVER != 0 {
|
||||||
|
if let Some(request) = &tx.request {
|
||||||
|
request.header.flags
|
||||||
|
} else {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
} else if flags & core::STREAM_TOCLIENT != 0 {
|
||||||
|
if let Some(response) = &tx.response {
|
||||||
|
response.header.flags
|
||||||
|
} else {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Not to server or to client??
|
||||||
|
return 0;
|
||||||
|
};
|
||||||
|
|
||||||
|
if match_opcode(detect, header_flags) {
|
||||||
|
1
|
||||||
|
} else {
|
||||||
|
0
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn match_opcode(detect: &DetectDnsOpcode, flags: u16) -> bool {
|
||||||
|
let opcode = ((flags >> 11) & 0xf) as u8;
|
||||||
|
if detect.negate {
|
||||||
|
detect.opcode != opcode
|
||||||
|
} else {
|
||||||
|
detect.opcode == opcode
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[no_mangle]
|
||||||
|
pub unsafe extern "C" fn rs_detect_dns_opcode_parse(carg: *const c_char) -> *mut c_void {
|
||||||
|
if carg.is_null() {
|
||||||
|
return std::ptr::null_mut();
|
||||||
|
}
|
||||||
|
let arg = match CStr::from_ptr(carg).to_str() {
|
||||||
|
Ok(arg) => arg,
|
||||||
|
_ => {
|
||||||
|
return std::ptr::null_mut();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
match parse_opcode(&arg) {
|
||||||
|
Ok(detect) => std::mem::transmute(Box::new(detect)),
|
||||||
|
Err(_) => std::ptr::null_mut(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[no_mangle]
|
||||||
|
pub unsafe extern "C" fn rs_dns_detect_opcode_free(ptr: *mut c_void) {
|
||||||
|
if ptr != std::ptr::null_mut() {
|
||||||
|
let _: Box<DetectDnsOpcode> = std::mem::transmute(ptr);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod test {
|
||||||
|
use super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn parse_opcode_good() {
|
||||||
|
assert_eq!(
|
||||||
|
parse_opcode("1"),
|
||||||
|
Ok(DetectDnsOpcode {
|
||||||
|
negate: false,
|
||||||
|
opcode: 1
|
||||||
|
})
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
parse_opcode("123"),
|
||||||
|
Ok(DetectDnsOpcode {
|
||||||
|
negate: false,
|
||||||
|
opcode: 123
|
||||||
|
})
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
parse_opcode("!123"),
|
||||||
|
Ok(DetectDnsOpcode {
|
||||||
|
negate: true,
|
||||||
|
opcode: 123
|
||||||
|
})
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
parse_opcode("!123"),
|
||||||
|
Ok(DetectDnsOpcode {
|
||||||
|
negate: true,
|
||||||
|
opcode: 123
|
||||||
|
})
|
||||||
|
);
|
||||||
|
assert_eq!(parse_opcode(""), Err(()));
|
||||||
|
assert_eq!(parse_opcode("!"), Err(()));
|
||||||
|
assert_eq!(parse_opcode("! "), Err(()));
|
||||||
|
assert_eq!(parse_opcode("!asdf"), Err(()));
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_match_opcode() {
|
||||||
|
assert_eq!(
|
||||||
|
match_opcode(
|
||||||
|
&DetectDnsOpcode {
|
||||||
|
negate: false,
|
||||||
|
opcode: 0,
|
||||||
|
},
|
||||||
|
0b0000_0000_0000_0000,
|
||||||
|
),
|
||||||
|
true
|
||||||
|
);
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
match_opcode(
|
||||||
|
&DetectDnsOpcode {
|
||||||
|
negate: true,
|
||||||
|
opcode: 0,
|
||||||
|
},
|
||||||
|
0b0000_0000_0000_0000,
|
||||||
|
),
|
||||||
|
false
|
||||||
|
);
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
match_opcode(
|
||||||
|
&DetectDnsOpcode {
|
||||||
|
negate: false,
|
||||||
|
opcode: 4,
|
||||||
|
},
|
||||||
|
0b0010_0000_0000_0000,
|
||||||
|
),
|
||||||
|
true
|
||||||
|
);
|
||||||
|
|
||||||
|
assert_eq!(
|
||||||
|
match_opcode(
|
||||||
|
&DetectDnsOpcode {
|
||||||
|
negate: true,
|
||||||
|
opcode: 4,
|
||||||
|
},
|
||||||
|
0b0010_0000_0000_0000,
|
||||||
|
),
|
||||||
|
false
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,106 @@
|
|||||||
|
/* Copyright (C) 2019 Open Information Security Foundation
|
||||||
|
*
|
||||||
|
* You can copy, redistribute or modify this Program under the terms of
|
||||||
|
* the GNU General Public License version 2 as published by the Free
|
||||||
|
* Software Foundation.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* version 2 along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||||||
|
* 02110-1301, USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "suricata-common.h"
|
||||||
|
|
||||||
|
#include "detect-parse.h"
|
||||||
|
#include "detect-engine.h"
|
||||||
|
#include "detect-dns-opcode.h"
|
||||||
|
#include "app-layer-dns-common.h"
|
||||||
|
#include "rust-dns-detect-gen.h"
|
||||||
|
|
||||||
|
static int dns_opcode_list_id = 0;
|
||||||
|
|
||||||
|
static void DetectDnsOpcodeFree(void *ptr);
|
||||||
|
|
||||||
|
static int DetectDnsOpcodeSetup(DetectEngineCtx *de_ctx, Signature *s,
|
||||||
|
const char *str)
|
||||||
|
{
|
||||||
|
SCEnter();
|
||||||
|
|
||||||
|
if (DetectSignatureSetAppProto(s, ALPROTO_DNS) != 0) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
void *detect = rs_detect_dns_opcode_parse(str);
|
||||||
|
if (detect == NULL) {
|
||||||
|
SCLogNotice("Failed to parse dns.opcode: %s", str);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
SigMatch *sm = SigMatchAlloc();
|
||||||
|
if (unlikely(sm == NULL)) {
|
||||||
|
goto error;
|
||||||
|
}
|
||||||
|
|
||||||
|
sm->type = DETECT_AL_DNS_OPCODE;
|
||||||
|
sm->ctx = (void *)detect;
|
||||||
|
SigMatchAppendSMToList(s, sm, dns_opcode_list_id);
|
||||||
|
|
||||||
|
SCReturnInt(0);
|
||||||
|
|
||||||
|
error:
|
||||||
|
DetectDnsOpcodeFree(detect);
|
||||||
|
SCReturnInt(-1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void DetectDnsOpcodeFree(void *ptr)
|
||||||
|
{
|
||||||
|
SCEnter();
|
||||||
|
if (ptr != NULL) {
|
||||||
|
rs_dns_detect_opcode_free(ptr);
|
||||||
|
}
|
||||||
|
SCReturn;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int DetectDnsOpcodeMatch(DetectEngineThreadCtx *det_ctx,
|
||||||
|
Flow *f, uint8_t flags, void *state, void *txv, const Signature *s,
|
||||||
|
const SigMatchCtx *ctx)
|
||||||
|
{
|
||||||
|
return rs_dns_opcode_match(txv, (void *)ctx, flags);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int DetectEngineInspectRequestGenericDnsOpcode(ThreadVars *tv,
|
||||||
|
DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
|
||||||
|
const Signature *s, const SigMatchData *smd,
|
||||||
|
Flow *f, uint8_t flags, void *alstate,
|
||||||
|
void *txv, uint64_t tx_id)
|
||||||
|
{
|
||||||
|
return DetectEngineInspectGenericList(tv, de_ctx, det_ctx, s, smd,
|
||||||
|
f, flags, alstate, txv, tx_id);
|
||||||
|
}
|
||||||
|
|
||||||
|
void DetectDnsOpcodeRegister(void)
|
||||||
|
{
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].name = "dns.opcode";
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].desc = "Match the DNS header opcode flag.";
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].Setup = DetectDnsOpcodeSetup;
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].Free = DetectDnsOpcodeFree;
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].Match = NULL;
|
||||||
|
sigmatch_table[DETECT_AL_DNS_OPCODE].AppLayerTxMatch =
|
||||||
|
DetectDnsOpcodeMatch;
|
||||||
|
|
||||||
|
DetectAppLayerInspectEngineRegister("dns.opcode",
|
||||||
|
ALPROTO_DNS, SIG_FLAG_TOSERVER, 0,
|
||||||
|
DetectEngineInspectRequestGenericDnsOpcode);
|
||||||
|
|
||||||
|
DetectAppLayerInspectEngineRegister("dns.opcode",
|
||||||
|
ALPROTO_DNS, SIG_FLAG_TOCLIENT, 0,
|
||||||
|
DetectEngineInspectRequestGenericDnsOpcode);
|
||||||
|
|
||||||
|
dns_opcode_list_id = DetectBufferTypeGetByName("dns.opcode");
|
||||||
|
}
|
@ -0,0 +1,23 @@
|
|||||||
|
/* Copyright (C) 2019 Open Information Security Foundation
|
||||||
|
*
|
||||||
|
* You can copy, redistribute or modify this Program under the terms of
|
||||||
|
* the GNU General Public License version 2 as published by the Free
|
||||||
|
* Software Foundation.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* version 2 along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
||||||
|
* 02110-1301, USA.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef __DETECT_DNS_OPCODE_H__
|
||||||
|
#define __DETECT_DNS_OPCODE_H__
|
||||||
|
|
||||||
|
void DetectDnsOpcodeRegister(void);
|
||||||
|
|
||||||
|
#endif /* __DETECT_DNS_OPCODE_H__ */
|
Loading…
Reference in New Issue