|
|
|
|
@ -17,21 +17,23 @@
|
|
|
|
|
|
|
|
|
|
// written by Pierre Chifflier <chifflier@wzdftpd.net>
|
|
|
|
|
|
|
|
|
|
use std;
|
|
|
|
|
use std::ffi::CString;
|
|
|
|
|
use nom7::{Err, IResult};
|
|
|
|
|
use nom7::number::streaming::be_u32;
|
|
|
|
|
use der_parser::der::der_read_element_header;
|
|
|
|
|
use der_parser::ber::Class;
|
|
|
|
|
use kerberos_parser::krb5_parser;
|
|
|
|
|
use kerberos_parser::krb5::{EncryptionType,ErrorCode,MessageType,PrincipalName,Realm,KrbError};
|
|
|
|
|
use asn1_rs::FromDer;
|
|
|
|
|
use suricata_sys::sys::AppProto;
|
|
|
|
|
use crate::applayer::{self, *};
|
|
|
|
|
use crate::core;
|
|
|
|
|
use crate::core::{ALPROTO_FAILED,ALPROTO_UNKNOWN, IPPROTO_TCP, IPPROTO_UDP};
|
|
|
|
|
use crate::core::{ALPROTO_FAILED, ALPROTO_UNKNOWN, IPPROTO_TCP, IPPROTO_UDP};
|
|
|
|
|
use crate::direction::Direction;
|
|
|
|
|
use crate::flow::Flow;
|
|
|
|
|
use asn1_rs::FromDer;
|
|
|
|
|
use der_parser::ber::Class;
|
|
|
|
|
use der_parser::der::der_read_element_header;
|
|
|
|
|
use kerberos_parser::krb5::{
|
|
|
|
|
EncryptionType, ErrorCode, KrbError, MessageType, PrincipalName, Realm,
|
|
|
|
|
};
|
|
|
|
|
use kerberos_parser::krb5_parser;
|
|
|
|
|
use nom7::number::streaming::be_u32;
|
|
|
|
|
use nom7::{Err, IResult};
|
|
|
|
|
use std;
|
|
|
|
|
use std::ffi::CString;
|
|
|
|
|
use suricata_sys::sys::AppProto;
|
|
|
|
|
|
|
|
|
|
#[derive(AppLayerEvent)]
|
|
|
|
|
pub enum KRB5Event {
|
|
|
|
|
@ -126,13 +128,15 @@ impl KRB5State {
|
|
|
|
|
/// Returns 0 in case of success, or -1 on error
|
|
|
|
|
fn parse(&mut self, i: &[u8], direction: Direction) -> i32 {
|
|
|
|
|
match der_read_element_header(i) {
|
|
|
|
|
Ok((_rem,hdr)) => {
|
|
|
|
|
Ok((_rem, hdr)) => {
|
|
|
|
|
// Kerberos messages start with an APPLICATION header
|
|
|
|
|
if hdr.class() != Class::Application { return 0; }
|
|
|
|
|
if hdr.class() != Class::Application {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
match hdr.tag().0 {
|
|
|
|
|
10 => {
|
|
|
|
|
let req = krb5_parser::parse_as_req(i);
|
|
|
|
|
if let Ok((_,kdc_req)) = req {
|
|
|
|
|
if let Ok((_, kdc_req)) = req {
|
|
|
|
|
let mut tx = self.new_tx(direction);
|
|
|
|
|
tx.msg_type = MessageType::KRB_AS_REQ;
|
|
|
|
|
tx.cname = kdc_req.req_body.cname;
|
|
|
|
|
@ -142,10 +146,10 @@ impl KRB5State {
|
|
|
|
|
self.transactions.push(tx);
|
|
|
|
|
};
|
|
|
|
|
self.req_id = 10;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
11 => {
|
|
|
|
|
let res = krb5_parser::parse_as_rep(i);
|
|
|
|
|
if let Ok((_,kdc_rep)) = res {
|
|
|
|
|
if let Ok((_, kdc_rep)) = res {
|
|
|
|
|
let mut tx = self.new_tx(direction);
|
|
|
|
|
tx.msg_type = MessageType::KRB_AS_REP;
|
|
|
|
|
if self.req_id > 0 {
|
|
|
|
|
@ -164,10 +168,10 @@ impl KRB5State {
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
self.req_id = 0;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
12 => {
|
|
|
|
|
let req = krb5_parser::parse_tgs_req(i);
|
|
|
|
|
if let Ok((_,kdc_req)) = req {
|
|
|
|
|
if let Ok((_, kdc_req)) = req {
|
|
|
|
|
let mut tx = self.new_tx(direction);
|
|
|
|
|
tx.msg_type = MessageType::KRB_TGS_REQ;
|
|
|
|
|
tx.cname = kdc_req.req_body.cname;
|
|
|
|
|
@ -177,10 +181,10 @@ impl KRB5State {
|
|
|
|
|
self.transactions.push(tx);
|
|
|
|
|
};
|
|
|
|
|
self.req_id = 12;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
13 => {
|
|
|
|
|
let res = krb5_parser::parse_tgs_rep(i);
|
|
|
|
|
if let Ok((_,kdc_rep)) = res {
|
|
|
|
|
if let Ok((_, kdc_rep)) = res {
|
|
|
|
|
let mut tx = self.new_tx(direction);
|
|
|
|
|
tx.msg_type = MessageType::KRB_TGS_REP;
|
|
|
|
|
if self.req_id > 0 {
|
|
|
|
|
@ -199,16 +203,16 @@ impl KRB5State {
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
self.req_id = 0;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
14 => {
|
|
|
|
|
self.req_id = 14;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
15 => {
|
|
|
|
|
self.req_id = 0;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
30 => {
|
|
|
|
|
let res = KrbError::from_der(i);
|
|
|
|
|
if let Ok((_,error)) = res {
|
|
|
|
|
if let Ok((_, error)) = res {
|
|
|
|
|
let mut tx = self.new_tx(direction);
|
|
|
|
|
if self.req_id > 0 {
|
|
|
|
|
// set request type only if previous message
|
|
|
|
|
@ -223,21 +227,23 @@ impl KRB5State {
|
|
|
|
|
self.transactions.push(tx);
|
|
|
|
|
};
|
|
|
|
|
self.req_id = 0;
|
|
|
|
|
},
|
|
|
|
|
_ => { SCLogDebug!("unknown/unsupported tag {}", hdr.tag()); },
|
|
|
|
|
}
|
|
|
|
|
_ => {
|
|
|
|
|
SCLogDebug!("unknown/unsupported tag {}", hdr.tag());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
0
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(Err::Incomplete(_)) => {
|
|
|
|
|
SCLogDebug!("Insufficient data while parsing KRB5 data");
|
|
|
|
|
self.set_event(KRB5Event::MalformedData);
|
|
|
|
|
-1
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(_) => {
|
|
|
|
|
SCLogDebug!("Error while parsing KRB5 data");
|
|
|
|
|
self.set_event(KRB5Event::MalformedData);
|
|
|
|
|
-1
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@ -274,7 +280,7 @@ impl KRB5State {
|
|
|
|
|
|
|
|
|
|
impl KRB5Transaction {
|
|
|
|
|
pub fn new(direction: Direction, id: u64) -> KRB5Transaction {
|
|
|
|
|
let krbtx = KRB5Transaction{
|
|
|
|
|
let krbtx = KRB5Transaction {
|
|
|
|
|
msg_type: MessageType(0),
|
|
|
|
|
cname: None,
|
|
|
|
|
realm: None,
|
|
|
|
|
@ -291,24 +297,22 @@ impl KRB5Transaction {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// Return true if Kerberos `EncryptionType` is weak
|
|
|
|
|
pub fn test_weak_encryption(alg:EncryptionType) -> bool {
|
|
|
|
|
pub fn test_weak_encryption(alg: EncryptionType) -> bool {
|
|
|
|
|
match alg {
|
|
|
|
|
EncryptionType::AES128_CTS_HMAC_SHA1_96 |
|
|
|
|
|
EncryptionType::AES256_CTS_HMAC_SHA1_96 |
|
|
|
|
|
EncryptionType::AES128_CTS_HMAC_SHA256_128 |
|
|
|
|
|
EncryptionType::AES256_CTS_HMAC_SHA384_192 |
|
|
|
|
|
EncryptionType::CAMELLIA128_CTS_CMAC |
|
|
|
|
|
EncryptionType::CAMELLIA256_CTS_CMAC => false,
|
|
|
|
|
EncryptionType::AES128_CTS_HMAC_SHA1_96
|
|
|
|
|
| EncryptionType::AES256_CTS_HMAC_SHA1_96
|
|
|
|
|
| EncryptionType::AES128_CTS_HMAC_SHA256_128
|
|
|
|
|
| EncryptionType::AES256_CTS_HMAC_SHA384_192
|
|
|
|
|
| EncryptionType::CAMELLIA128_CTS_CMAC
|
|
|
|
|
| EncryptionType::CAMELLIA256_CTS_CMAC => false,
|
|
|
|
|
_ => true, // all other ciphers are weak or deprecated
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/// Returns *mut KRB5State
|
|
|
|
|
extern "C" fn krb5_state_new(_orig_state: *mut std::os::raw::c_void, _orig_proto: AppProto) -> *mut std::os::raw::c_void {
|
|
|
|
|
extern "C" fn krb5_state_new(
|
|
|
|
|
_orig_state: *mut std::os::raw::c_void, _orig_proto: AppProto,
|
|
|
|
|
) -> *mut std::os::raw::c_void {
|
|
|
|
|
let state = KRB5State::new();
|
|
|
|
|
let boxed = Box::new(state);
|
|
|
|
|
return Box::into_raw(boxed) as *mut _;
|
|
|
|
|
@ -317,156 +321,156 @@ extern "C" fn krb5_state_new(_orig_state: *mut std::os::raw::c_void, _orig_proto
|
|
|
|
|
/// Params:
|
|
|
|
|
/// - state: *mut KRB5State as void pointer
|
|
|
|
|
extern "C" fn krb5_state_free(state: *mut std::os::raw::c_void) {
|
|
|
|
|
let mut state: Box<KRB5State> = unsafe{Box::from_raw(state as _)};
|
|
|
|
|
let mut state: Box<KRB5State> = unsafe { Box::from_raw(state as _) };
|
|
|
|
|
state.free();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_state_get_tx(state: *mut std::os::raw::c_void,
|
|
|
|
|
tx_id: u64)
|
|
|
|
|
-> *mut std::os::raw::c_void
|
|
|
|
|
{
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
unsafe extern "C" fn krb5_state_get_tx(
|
|
|
|
|
state: *mut std::os::raw::c_void, tx_id: u64,
|
|
|
|
|
) -> *mut std::os::raw::c_void {
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
match state.get_tx_by_id(tx_id) {
|
|
|
|
|
Some(tx) => tx as *const _ as *mut _,
|
|
|
|
|
None => std::ptr::null_mut(),
|
|
|
|
|
None => std::ptr::null_mut(),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_state_get_tx_count(state: *mut std::os::raw::c_void)
|
|
|
|
|
-> u64
|
|
|
|
|
{
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
unsafe extern "C" fn krb5_state_get_tx_count(state: *mut std::os::raw::c_void) -> u64 {
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
state.tx_id
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_state_tx_free(state: *mut std::os::raw::c_void,
|
|
|
|
|
tx_id: u64)
|
|
|
|
|
{
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
unsafe extern "C" fn krb5_state_tx_free(state: *mut std::os::raw::c_void, tx_id: u64) {
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
state.free_tx(tx_id);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pub extern "C" fn krb5_tx_get_alstate_progress(_tx: *mut std::os::raw::c_void,
|
|
|
|
|
_direction: u8)
|
|
|
|
|
-> std::os::raw::c_int
|
|
|
|
|
{
|
|
|
|
|
pub extern "C" fn krb5_tx_get_alstate_progress(
|
|
|
|
|
_tx: *mut std::os::raw::c_void, _direction: u8,
|
|
|
|
|
) -> std::os::raw::c_int {
|
|
|
|
|
1
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static mut ALPROTO_KRB5 : AppProto = ALPROTO_UNKNOWN;
|
|
|
|
|
static mut ALPROTO_KRB5: AppProto = ALPROTO_UNKNOWN;
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_probing_parser(_flow: *const Flow,
|
|
|
|
|
_direction: u8,
|
|
|
|
|
input:*const u8, input_len: u32,
|
|
|
|
|
_rdir: *mut u8) -> AppProto
|
|
|
|
|
{
|
|
|
|
|
unsafe extern "C" fn krb5_probing_parser(
|
|
|
|
|
_flow: *const Flow, _direction: u8, input: *const u8, input_len: u32, _rdir: *mut u8,
|
|
|
|
|
) -> AppProto {
|
|
|
|
|
if input.is_null() {
|
|
|
|
|
return ALPROTO_UNKNOWN;
|
|
|
|
|
}
|
|
|
|
|
let slice = build_slice!(input,input_len as usize);
|
|
|
|
|
let slice = build_slice!(input, input_len as usize);
|
|
|
|
|
let alproto = ALPROTO_KRB5;
|
|
|
|
|
if slice.len() <= 10 { return ALPROTO_FAILED; }
|
|
|
|
|
if slice.len() <= 10 {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
match der_read_element_header(slice) {
|
|
|
|
|
Ok((rem, ref hdr)) => {
|
|
|
|
|
// Kerberos messages start with an APPLICATION header
|
|
|
|
|
if hdr.class() != Class::Application { return ALPROTO_FAILED; }
|
|
|
|
|
if hdr.class() != Class::Application {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
// Tag number should be <= 30
|
|
|
|
|
if hdr.tag().0 > 30 { return ALPROTO_FAILED; }
|
|
|
|
|
if hdr.tag().0 > 30 {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
// Kerberos messages contain sequences
|
|
|
|
|
if rem.is_empty() || rem[0] != 0x30 { return ALPROTO_FAILED; }
|
|
|
|
|
if rem.is_empty() || rem[0] != 0x30 {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
// Check kerberos version
|
|
|
|
|
if let Ok((rem,_hdr)) = der_read_element_header(rem) {
|
|
|
|
|
if let Ok((rem, _hdr)) = der_read_element_header(rem) {
|
|
|
|
|
if rem.len() > 5 {
|
|
|
|
|
#[allow(clippy::single_match)]
|
|
|
|
|
match (rem[2],rem[3],rem[4]) {
|
|
|
|
|
match (rem[2], rem[3], rem[4]) {
|
|
|
|
|
// Encoding of DER integer 5 (version)
|
|
|
|
|
(2,1,5) => { return alproto; },
|
|
|
|
|
_ => (),
|
|
|
|
|
(2, 1, 5) => {
|
|
|
|
|
return alproto;
|
|
|
|
|
}
|
|
|
|
|
_ => (),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(Err::Incomplete(_)) => {
|
|
|
|
|
return ALPROTO_UNKNOWN;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(_) => {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_probing_parser_tcp(_flow: *const Flow,
|
|
|
|
|
direction: u8,
|
|
|
|
|
input:*const u8, input_len: u32,
|
|
|
|
|
rdir: *mut u8) -> AppProto
|
|
|
|
|
{
|
|
|
|
|
unsafe extern "C" fn krb5_probing_parser_tcp(
|
|
|
|
|
_flow: *const Flow, direction: u8, input: *const u8, input_len: u32, rdir: *mut u8,
|
|
|
|
|
) -> AppProto {
|
|
|
|
|
if input.is_null() {
|
|
|
|
|
return ALPROTO_UNKNOWN;
|
|
|
|
|
}
|
|
|
|
|
let slice = build_slice!(input,input_len as usize);
|
|
|
|
|
if slice.len() <= 14 { return ALPROTO_FAILED; }
|
|
|
|
|
match be_u32(slice) as IResult<&[u8],u32> {
|
|
|
|
|
let slice = build_slice!(input, input_len as usize);
|
|
|
|
|
if slice.len() <= 14 {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
match be_u32(slice) as IResult<&[u8], u32> {
|
|
|
|
|
Ok((rem, record_mark)) => {
|
|
|
|
|
// protocol implementations forbid very large requests
|
|
|
|
|
if record_mark > 16384 { return ALPROTO_FAILED; }
|
|
|
|
|
return krb5_probing_parser(_flow, direction,
|
|
|
|
|
rem.as_ptr(), rem.len() as u32, rdir);
|
|
|
|
|
},
|
|
|
|
|
if record_mark > 16384 {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
}
|
|
|
|
|
return krb5_probing_parser(_flow, direction, rem.as_ptr(), rem.len() as u32, rdir);
|
|
|
|
|
}
|
|
|
|
|
Err(Err::Incomplete(_)) => {
|
|
|
|
|
return ALPROTO_UNKNOWN;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(_) => {
|
|
|
|
|
return ALPROTO_FAILED;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pub unsafe extern "C" fn krb5_parse_request(_flow: *const Flow,
|
|
|
|
|
state: *mut std::os::raw::c_void,
|
|
|
|
|
_pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice,
|
|
|
|
|
_data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
pub unsafe extern "C" fn krb5_parse_request(
|
|
|
|
|
_flow: *const Flow, state: *mut std::os::raw::c_void, _pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice, _data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let buf = stream_slice.as_slice();
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
if state.parse(buf, Direction::ToServer) < 0 {
|
|
|
|
|
return AppLayerResult::err();
|
|
|
|
|
}
|
|
|
|
|
AppLayerResult::ok()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_parse_response(_flow: *const Flow,
|
|
|
|
|
state: *mut std::os::raw::c_void,
|
|
|
|
|
_pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice,
|
|
|
|
|
_data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
unsafe extern "C" fn krb5_parse_response(
|
|
|
|
|
_flow: *const Flow, state: *mut std::os::raw::c_void, _pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice, _data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let buf = stream_slice.as_slice();
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
if state.parse(buf, Direction::ToClient) < 0 {
|
|
|
|
|
return AppLayerResult::err();
|
|
|
|
|
}
|
|
|
|
|
AppLayerResult::ok()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_parse_request_tcp(_flow: *const Flow,
|
|
|
|
|
state: *mut std::os::raw::c_void,
|
|
|
|
|
_pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice,
|
|
|
|
|
_data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
unsafe extern "C" fn krb5_parse_request_tcp(
|
|
|
|
|
_flow: *const Flow, state: *mut std::os::raw::c_void, _pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice, _data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
let buf = stream_slice.as_slice();
|
|
|
|
|
|
|
|
|
|
let mut v : Vec<u8>;
|
|
|
|
|
let mut v: Vec<u8>;
|
|
|
|
|
let tcp_buffer = match state.record_ts {
|
|
|
|
|
0 => buf,
|
|
|
|
|
_ => {
|
|
|
|
|
// sanity check to avoid memory exhaustion
|
|
|
|
|
if state.defrag_buf_ts.len() + buf.len() > 100000 {
|
|
|
|
|
SCLogDebug!("rs_krb5_parse_request_tcp: TCP buffer exploded {} {}",
|
|
|
|
|
state.defrag_buf_ts.len(), buf.len());
|
|
|
|
|
SCLogDebug!(
|
|
|
|
|
"rs_krb5_parse_request_tcp: TCP buffer exploded {} {}",
|
|
|
|
|
state.defrag_buf_ts.len(),
|
|
|
|
|
buf.len()
|
|
|
|
|
);
|
|
|
|
|
return AppLayerResult::err();
|
|
|
|
|
}
|
|
|
|
|
v = state.defrag_buf_ts.split_off(0);
|
|
|
|
|
@ -477,11 +481,11 @@ unsafe extern "C" fn krb5_parse_request_tcp(_flow: *const Flow,
|
|
|
|
|
let mut cur_i = tcp_buffer;
|
|
|
|
|
while !cur_i.is_empty() {
|
|
|
|
|
if state.record_ts == 0 {
|
|
|
|
|
match be_u32(cur_i) as IResult<&[u8],u32> {
|
|
|
|
|
Ok((rem,record)) => {
|
|
|
|
|
match be_u32(cur_i) as IResult<&[u8], u32> {
|
|
|
|
|
Ok((rem, record)) => {
|
|
|
|
|
state.record_ts = record as usize;
|
|
|
|
|
cur_i = rem;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(Err::Incomplete(_)) => {
|
|
|
|
|
state.defrag_buf_ts.extend_from_slice(cur_i);
|
|
|
|
|
return AppLayerResult::ok();
|
|
|
|
|
@ -507,23 +511,24 @@ unsafe extern "C" fn krb5_parse_request_tcp(_flow: *const Flow,
|
|
|
|
|
AppLayerResult::ok()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsafe extern "C" fn krb5_parse_response_tcp(_flow: *const Flow,
|
|
|
|
|
state: *mut std::os::raw::c_void,
|
|
|
|
|
_pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice,
|
|
|
|
|
_data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let state = cast_pointer!(state,KRB5State);
|
|
|
|
|
unsafe extern "C" fn krb5_parse_response_tcp(
|
|
|
|
|
_flow: *const Flow, state: *mut std::os::raw::c_void, _pstate: *mut std::os::raw::c_void,
|
|
|
|
|
stream_slice: StreamSlice, _data: *const std::os::raw::c_void,
|
|
|
|
|
) -> AppLayerResult {
|
|
|
|
|
let state = cast_pointer!(state, KRB5State);
|
|
|
|
|
let buf = stream_slice.as_slice();
|
|
|
|
|
|
|
|
|
|
let mut v : Vec<u8>;
|
|
|
|
|
let mut v: Vec<u8>;
|
|
|
|
|
let tcp_buffer = match state.record_tc {
|
|
|
|
|
0 => buf,
|
|
|
|
|
_ => {
|
|
|
|
|
// sanity check to avoid memory exhaustion
|
|
|
|
|
if state.defrag_buf_tc.len() + buf.len() > 100000 {
|
|
|
|
|
SCLogDebug!("rs_krb5_parse_response_tcp: TCP buffer exploded {} {}",
|
|
|
|
|
state.defrag_buf_tc.len(), buf.len());
|
|
|
|
|
SCLogDebug!(
|
|
|
|
|
"rs_krb5_parse_response_tcp: TCP buffer exploded {} {}",
|
|
|
|
|
state.defrag_buf_tc.len(),
|
|
|
|
|
buf.len()
|
|
|
|
|
);
|
|
|
|
|
return AppLayerResult::err();
|
|
|
|
|
}
|
|
|
|
|
v = state.defrag_buf_tc.split_off(0);
|
|
|
|
|
@ -534,11 +539,11 @@ unsafe extern "C" fn krb5_parse_response_tcp(_flow: *const Flow,
|
|
|
|
|
let mut cur_i = tcp_buffer;
|
|
|
|
|
while !cur_i.is_empty() {
|
|
|
|
|
if state.record_tc == 0 {
|
|
|
|
|
match be_u32(cur_i) as IResult<&[u8],_> {
|
|
|
|
|
Ok((rem,record)) => {
|
|
|
|
|
match be_u32(cur_i) as IResult<&[u8], _> {
|
|
|
|
|
Ok((rem, record)) => {
|
|
|
|
|
state.record_tc = record as usize;
|
|
|
|
|
cur_i = rem;
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
Err(Err::Incomplete(_)) => {
|
|
|
|
|
state.defrag_buf_tc.extend_from_slice(cur_i);
|
|
|
|
|
return AppLayerResult::ok();
|
|
|
|
|
@ -567,39 +572,39 @@ unsafe extern "C" fn krb5_parse_response_tcp(_flow: *const Flow,
|
|
|
|
|
export_tx_data_get!(krb5_get_tx_data, KRB5Transaction);
|
|
|
|
|
export_state_data_get!(krb5_get_state_data, KRB5State);
|
|
|
|
|
|
|
|
|
|
const PARSER_NAME : &[u8] = b"krb5\0";
|
|
|
|
|
const PARSER_NAME: &[u8] = b"krb5\0";
|
|
|
|
|
|
|
|
|
|
#[no_mangle]
|
|
|
|
|
pub unsafe extern "C" fn SCRegisterKrb5Parser() {
|
|
|
|
|
let default_port = CString::new("88").unwrap();
|
|
|
|
|
let mut parser = RustParser {
|
|
|
|
|
name : PARSER_NAME.as_ptr() as *const std::os::raw::c_char,
|
|
|
|
|
default_port : default_port.as_ptr(),
|
|
|
|
|
ipproto : core::IPPROTO_UDP,
|
|
|
|
|
probe_ts : Some(krb5_probing_parser),
|
|
|
|
|
probe_tc : Some(krb5_probing_parser),
|
|
|
|
|
min_depth : 0,
|
|
|
|
|
max_depth : 16,
|
|
|
|
|
state_new : krb5_state_new,
|
|
|
|
|
state_free : krb5_state_free,
|
|
|
|
|
tx_free : krb5_state_tx_free,
|
|
|
|
|
parse_ts : krb5_parse_request,
|
|
|
|
|
parse_tc : krb5_parse_response,
|
|
|
|
|
get_tx_count : krb5_state_get_tx_count,
|
|
|
|
|
get_tx : krb5_state_get_tx,
|
|
|
|
|
tx_comp_st_ts : 1,
|
|
|
|
|
tx_comp_st_tc : 1,
|
|
|
|
|
tx_get_progress : krb5_tx_get_alstate_progress,
|
|
|
|
|
get_eventinfo : Some(KRB5Event::get_event_info),
|
|
|
|
|
get_eventinfo_byid : Some(KRB5Event::get_event_info_by_id),
|
|
|
|
|
localstorage_new : None,
|
|
|
|
|
localstorage_free : None,
|
|
|
|
|
get_tx_files : None,
|
|
|
|
|
get_tx_iterator : Some(applayer::state_get_tx_iterator::<KRB5State, KRB5Transaction>),
|
|
|
|
|
get_tx_data : krb5_get_tx_data,
|
|
|
|
|
get_state_data : krb5_get_state_data,
|
|
|
|
|
apply_tx_config : None,
|
|
|
|
|
flags : 0,
|
|
|
|
|
name: PARSER_NAME.as_ptr() as *const std::os::raw::c_char,
|
|
|
|
|
default_port: default_port.as_ptr(),
|
|
|
|
|
ipproto: core::IPPROTO_UDP,
|
|
|
|
|
probe_ts: Some(krb5_probing_parser),
|
|
|
|
|
probe_tc: Some(krb5_probing_parser),
|
|
|
|
|
min_depth: 0,
|
|
|
|
|
max_depth: 16,
|
|
|
|
|
state_new: krb5_state_new,
|
|
|
|
|
state_free: krb5_state_free,
|
|
|
|
|
tx_free: krb5_state_tx_free,
|
|
|
|
|
parse_ts: krb5_parse_request,
|
|
|
|
|
parse_tc: krb5_parse_response,
|
|
|
|
|
get_tx_count: krb5_state_get_tx_count,
|
|
|
|
|
get_tx: krb5_state_get_tx,
|
|
|
|
|
tx_comp_st_ts: 1,
|
|
|
|
|
tx_comp_st_tc: 1,
|
|
|
|
|
tx_get_progress: krb5_tx_get_alstate_progress,
|
|
|
|
|
get_eventinfo: Some(KRB5Event::get_event_info),
|
|
|
|
|
get_eventinfo_byid: Some(KRB5Event::get_event_info_by_id),
|
|
|
|
|
localstorage_new: None,
|
|
|
|
|
localstorage_free: None,
|
|
|
|
|
get_tx_files: None,
|
|
|
|
|
get_tx_iterator: Some(applayer::state_get_tx_iterator::<KRB5State, KRB5Transaction>),
|
|
|
|
|
get_tx_data: krb5_get_tx_data,
|
|
|
|
|
get_state_data: krb5_get_state_data,
|
|
|
|
|
apply_tx_config: None,
|
|
|
|
|
flags: 0,
|
|
|
|
|
get_frame_id_by_name: None,
|
|
|
|
|
get_frame_name_by_id: None,
|
|
|
|
|
get_state_id_by_name: None,
|
|
|
|
|
|