mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
421 lines
13 KiB
Rust
421 lines
13 KiB
Rust
/* Copyright (C) 2023-2024 Open Information Security Foundation
|
|
*
|
|
* You can copy, redistribute or modify this Program under the terms of
|
|
* the GNU General Public License version 2 as published by the Free
|
|
* Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* version 2 along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
* 02110-1301, USA.
|
|
|
|
// Author: Sascha Steinbiss <sascha@steinbiss.name>
|
|
|
|
*/
|
|
|
|
#[cfg(feature = "ja4")]
|
|
use digest::Digest;
|
|
use libc::c_uchar;
|
|
#[cfg(feature = "ja4")]
|
|
use sha2::Sha256;
|
|
#[cfg(feature = "ja4")]
|
|
use std::cmp::min;
|
|
use std::os::raw::c_char;
|
|
use tls_parser::{TlsCipherSuiteID, TlsExtensionType, TlsVersion};
|
|
#[cfg(feature = "ja4")]
|
|
use crate::jsonbuilder::HEX;
|
|
|
|
#[derive(Debug, PartialEq)]
|
|
pub struct JA4 {
|
|
tls_version: Option<TlsVersion>,
|
|
ciphersuites: Vec<TlsCipherSuiteID>,
|
|
extensions: Vec<TlsExtensionType>,
|
|
signature_algorithms: Vec<u16>,
|
|
domain: bool,
|
|
alpn: [char; 2],
|
|
quic: bool,
|
|
// Some extensions contribute to the total count component of the
|
|
// fingerprint, yet are not to be included in the SHA256 hash component.
|
|
// Let's track the count separately.
|
|
nof_exts: u16,
|
|
}
|
|
|
|
impl Default for JA4 {
|
|
fn default() -> Self {
|
|
Self::new()
|
|
}
|
|
}
|
|
|
|
// Stubs for when JA4 is disabled
|
|
#[cfg(not(feature = "ja4"))]
|
|
impl JA4 {
|
|
pub fn new() -> Self {
|
|
Self {
|
|
tls_version: None,
|
|
// Vec::new() does not allocate memory until filled, which we
|
|
// will not do here.
|
|
ciphersuites: Vec::new(),
|
|
extensions: Vec::new(),
|
|
signature_algorithms: Vec::new(),
|
|
domain: false,
|
|
alpn: ['0', '0'],
|
|
quic: false,
|
|
nof_exts: 0,
|
|
}
|
|
}
|
|
pub fn set_quic(&mut self) {}
|
|
pub fn set_tls_version(&mut self, _version: TlsVersion) {}
|
|
pub fn set_alpn(&mut self, _alpn: &[u8]) {}
|
|
pub fn add_cipher_suite(&mut self, _cipher: TlsCipherSuiteID) {}
|
|
pub fn add_extension(&mut self, _ext: TlsExtensionType) {}
|
|
pub fn add_signature_algorithm(&mut self, _sigalgo: u16) {}
|
|
pub fn get_hash(&self) -> String {
|
|
String::new()
|
|
}
|
|
}
|
|
|
|
#[cfg(feature = "ja4")]
|
|
impl JA4 {
|
|
#[inline]
|
|
fn is_grease(val: u16) -> bool {
|
|
match val {
|
|
0x0a0a | 0x1a1a | 0x2a2a | 0x3a3a | 0x4a4a | 0x5a5a | 0x6a6a | 0x7a7a | 0x8a8a
|
|
| 0x9a9a | 0xaaaa | 0xbaba | 0xcaca | 0xdada | 0xeaea | 0xfafa => true,
|
|
_ => false,
|
|
}
|
|
}
|
|
|
|
#[inline]
|
|
fn version_to_ja4code(val: Option<TlsVersion>) -> &'static str {
|
|
match val {
|
|
Some(TlsVersion::Tls13) => "13",
|
|
Some(TlsVersion::Tls12) => "12",
|
|
Some(TlsVersion::Tls11) => "11",
|
|
Some(TlsVersion::Tls10) => "10",
|
|
Some(TlsVersion::Ssl30) => "s3",
|
|
// the TLS parser does not support SSL 1.0 and 2.0 hence no
|
|
// support for "s1"/"s2"
|
|
_ => "00",
|
|
}
|
|
}
|
|
|
|
pub fn new() -> Self {
|
|
Self {
|
|
tls_version: None,
|
|
ciphersuites: Vec::with_capacity(20),
|
|
extensions: Vec::with_capacity(20),
|
|
signature_algorithms: Vec::with_capacity(20),
|
|
domain: false,
|
|
alpn: ['0', '0'],
|
|
quic: false,
|
|
nof_exts: 0,
|
|
}
|
|
}
|
|
|
|
pub fn set_quic(&mut self) {
|
|
self.quic = true;
|
|
}
|
|
|
|
pub fn set_tls_version(&mut self, version: TlsVersion) {
|
|
if JA4::is_grease(u16::from(version)) {
|
|
return;
|
|
}
|
|
// Track maximum of seen TLS versions
|
|
match self.tls_version {
|
|
None => {
|
|
self.tls_version = Some(version);
|
|
}
|
|
Some(cur_version) => {
|
|
if u16::from(version) > u16::from(cur_version) {
|
|
self.tls_version = Some(version);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn set_alpn(&mut self, alpn: &[u8]) {
|
|
if !alpn.is_empty() {
|
|
// If the first ALPN value is only a single character, then that character is treated as both the first and last character.
|
|
if alpn.len() == 2 {
|
|
// GREASE values are 2 bytes, so this could be one -- check
|
|
let v: u16 = ((alpn[0] as u16) << 8) | alpn[alpn.len() - 1] as u16;
|
|
if JA4::is_grease(v) {
|
|
return;
|
|
}
|
|
}
|
|
if !alpn[0].is_ascii_alphanumeric() || !alpn[alpn.len() - 1].is_ascii_alphanumeric() {
|
|
// If the first or last byte of the first ALPN is non-alphanumeric (meaning not 0x30-0x39, 0x41-0x5A, or 0x61-0x7A), then we print the first and last characters of the hex representation of the first ALPN instead.
|
|
self.alpn[0] = char::from(HEX[(alpn[0] >> 4) as usize]);
|
|
self.alpn[1] = char::from(HEX[(alpn[alpn.len() - 1] & 0xF) as usize]);
|
|
return
|
|
}
|
|
self.alpn[0] = char::from(alpn[0]);
|
|
self.alpn[1] = char::from(alpn[alpn.len() - 1]);
|
|
}
|
|
}
|
|
|
|
pub fn add_cipher_suite(&mut self, cipher: TlsCipherSuiteID) {
|
|
if JA4::is_grease(u16::from(cipher)) {
|
|
return;
|
|
}
|
|
self.ciphersuites.push(cipher);
|
|
}
|
|
|
|
pub fn add_extension(&mut self, ext: TlsExtensionType) {
|
|
if JA4::is_grease(u16::from(ext)) {
|
|
return;
|
|
}
|
|
if ext != TlsExtensionType::ApplicationLayerProtocolNegotiation
|
|
&& ext != TlsExtensionType::ServerName
|
|
{
|
|
self.extensions.push(ext);
|
|
} else if ext == TlsExtensionType::ServerName {
|
|
self.domain = true;
|
|
}
|
|
self.nof_exts += 1;
|
|
}
|
|
|
|
pub fn add_signature_algorithm(&mut self, sigalgo: u16) {
|
|
if JA4::is_grease(sigalgo) {
|
|
return;
|
|
}
|
|
self.signature_algorithms.push(sigalgo);
|
|
}
|
|
|
|
pub fn get_hash(&self) -> String {
|
|
// Calculate JA4_a
|
|
let ja4_a = format!(
|
|
"{proto}{version}{sni}{nof_c:02}{nof_e:02}{al1}{al2}",
|
|
proto = if self.quic { "q" } else { "t" },
|
|
version = JA4::version_to_ja4code(self.tls_version),
|
|
sni = if self.domain { "d" } else { "i" },
|
|
nof_c = min(99, self.ciphersuites.len()),
|
|
nof_e = min(99, self.nof_exts),
|
|
al1 = self.alpn[0],
|
|
al2 = self.alpn[1]
|
|
);
|
|
|
|
// Calculate JA4_b
|
|
let mut sorted_ciphers = self.ciphersuites.to_vec();
|
|
sorted_ciphers.sort_by(|a, b| u16::from(*a).cmp(&u16::from(*b)));
|
|
let sorted_cipherstrings: Vec<String> = sorted_ciphers
|
|
.iter()
|
|
.map(|v| format!("{:04x}", u16::from(*v)))
|
|
.collect();
|
|
let mut sha = Sha256::new();
|
|
let ja4_b_raw = sorted_cipherstrings.join(",");
|
|
sha.update(&ja4_b_raw);
|
|
let mut ja4_b = format!("{:x}", sha.finalize_reset());
|
|
ja4_b.truncate(12);
|
|
|
|
// Calculate JA4_c
|
|
let mut sorted_exts = self.extensions.to_vec();
|
|
sorted_exts.sort_by(|a, b| u16::from(*a).cmp(&u16::from(*b)));
|
|
let sorted_extstrings: Vec<String> = sorted_exts
|
|
.iter()
|
|
.map(|v| format!("{:04x}", u16::from(*v)))
|
|
.collect();
|
|
let ja4_c1_raw = sorted_extstrings.join(",");
|
|
let unsorted_sigalgostrings: Vec<String> = self
|
|
.signature_algorithms
|
|
.iter()
|
|
.map(|v| format!("{:04x}", (*v)))
|
|
.collect();
|
|
let ja4_c2_raw = unsorted_sigalgostrings.join(",");
|
|
let ja4_c_raw = format!("{}_{}", ja4_c1_raw, ja4_c2_raw);
|
|
sha.update(&ja4_c_raw);
|
|
let mut ja4_c = format!("{:x}", sha.finalize());
|
|
ja4_c.truncate(12);
|
|
|
|
return format!("{}_{}_{}", ja4_a, ja4_b, ja4_c);
|
|
}
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub extern "C" fn SCJA4New() -> *mut JA4 {
|
|
let j = Box::new(JA4::new());
|
|
Box::into_raw(j)
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4SetTLSVersion(j: &mut JA4, version: u16) {
|
|
j.set_tls_version(TlsVersion(version));
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4AddCipher(j: &mut JA4, cipher: u16) {
|
|
j.add_cipher_suite(TlsCipherSuiteID(cipher));
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4AddExtension(j: &mut JA4, ext: u16) {
|
|
j.add_extension(TlsExtensionType(ext));
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4AddSigAlgo(j: &mut JA4, sigalgo: u16) {
|
|
j.add_signature_algorithm(sigalgo);
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4SetALPN(j: &mut JA4, proto: *const c_char, len: u16) {
|
|
let b: &[u8] = std::slice::from_raw_parts(proto as *const c_uchar, len as usize);
|
|
j.set_alpn(b);
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4GetHash(j: &mut JA4, out: &mut [u8; 36]) {
|
|
let hash = j.get_hash();
|
|
out[0..36].copy_from_slice(hash.as_bytes());
|
|
}
|
|
|
|
#[no_mangle]
|
|
pub unsafe extern "C" fn SCJA4Free(j: &mut JA4) {
|
|
let ja4: Box<JA4> = Box::from_raw(j);
|
|
std::mem::drop(ja4);
|
|
}
|
|
|
|
#[cfg(all(test, feature = "ja4"))]
|
|
mod tests {
|
|
use super::*;
|
|
|
|
#[test]
|
|
fn test_is_grease() {
|
|
let mut alpn = "foobar".as_bytes();
|
|
let mut len = alpn.len();
|
|
let v: u16 = ((alpn[0] as u16) << 8) | alpn[len - 1] as u16;
|
|
assert!(!JA4::is_grease(v));
|
|
|
|
alpn = &[0x0a, 0x0a];
|
|
len = alpn.len();
|
|
let v: u16 = ((alpn[0] as u16) << 8) | alpn[len - 1] as u16;
|
|
assert!(JA4::is_grease(v));
|
|
}
|
|
|
|
#[test]
|
|
fn test_tlsversion_max() {
|
|
let mut j = JA4::new();
|
|
assert_eq!(j.tls_version, None);
|
|
j.set_tls_version(TlsVersion::Ssl30);
|
|
assert_eq!(j.tls_version, Some(TlsVersion::Ssl30));
|
|
j.set_tls_version(TlsVersion::Tls12);
|
|
assert_eq!(j.tls_version, Some(TlsVersion::Tls12));
|
|
j.set_tls_version(TlsVersion::Tls10);
|
|
assert_eq!(j.tls_version, Some(TlsVersion::Tls12));
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_hash_limit_numbers() {
|
|
// Test whether the limitation of the extension and ciphersuite
|
|
// count to 99 is reflected correctly.
|
|
let mut j = JA4::new();
|
|
|
|
for i in 1..200 {
|
|
j.add_cipher_suite(TlsCipherSuiteID(i));
|
|
}
|
|
for i in 1..200 {
|
|
j.add_extension(TlsExtensionType(i));
|
|
}
|
|
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i999900");
|
|
}
|
|
|
|
#[test]
|
|
fn test_short_alpn() {
|
|
let mut j = JA4::new();
|
|
|
|
j.set_alpn("b".as_bytes());
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i0000bb");
|
|
|
|
j.set_alpn("h2".as_bytes());
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i0000h2");
|
|
|
|
// from https://github.com/FoxIO-LLC/ja4/blob/main/technical_details/JA4.md#alpn-extension-value
|
|
j.set_alpn(&[0xab]);
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i0000ab");
|
|
|
|
j.set_alpn(&[0xab, 0xcd]);
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i0000ad");
|
|
|
|
j.set_alpn(&[0x30, 0xab]);
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i00003b");
|
|
|
|
j.set_alpn(&[0x30, 0x31, 0xab, 0xcd]);
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i00003d");
|
|
|
|
j.set_alpn(&[0x30, 0xab, 0xcd, 0x31]);
|
|
let mut s = j.get_hash();
|
|
s.truncate(10);
|
|
assert_eq!(s, "t00i000001");
|
|
}
|
|
|
|
#[test]
|
|
fn test_get_hash() {
|
|
let mut j = JA4::new();
|
|
|
|
// the empty JA4 hash
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "t00i000000_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set TLS version
|
|
j.set_tls_version(TlsVersion::Tls12);
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "t12i000000_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set QUIC
|
|
j.set_quic();
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12i000000_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set GREASE extension, should be ignored
|
|
j.add_extension(TlsExtensionType(0x0a0a));
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12i000000_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set SNI extension, should only increase count and change i->d
|
|
j.add_extension(TlsExtensionType(0x0000));
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12d000100_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set ALPN extension, should only increase count and set end of JA4_a
|
|
j.set_alpn(b"h3-16");
|
|
j.add_extension(TlsExtensionType::ApplicationLayerProtocolNegotiation);
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12d0002h6_e3b0c44298fc_d2e2adf7177b");
|
|
|
|
// set some ciphers
|
|
j.add_cipher_suite(TlsCipherSuiteID(0x1111));
|
|
j.add_cipher_suite(TlsCipherSuiteID(0x0a20));
|
|
j.add_cipher_suite(TlsCipherSuiteID(0xbada));
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12d0302h6_f500716053f9_d2e2adf7177b");
|
|
|
|
// set some extensions and signature algorithms
|
|
j.add_extension(TlsExtensionType(0xface));
|
|
j.add_extension(TlsExtensionType(0x0121));
|
|
j.add_extension(TlsExtensionType(0x1234));
|
|
j.add_signature_algorithm(0x6666);
|
|
let s = j.get_hash();
|
|
assert_eq!(s, "q12d0305h6_f500716053f9_2debc8880bae");
|
|
}
|
|
}
|