mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1240 lines
40 KiB
C
1240 lines
40 KiB
C
/* Copyright (C) 2007-2021 Open Information Security Foundation
|
|
*
|
|
* You can copy, redistribute or modify this Program under the terms of
|
|
* the GNU General Public License version 2 as published by the Free
|
|
* Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* version 2 along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
* 02110-1301, USA.
|
|
*/
|
|
|
|
/**
|
|
* \ingroup httplayer
|
|
*
|
|
* @{
|
|
*/
|
|
|
|
|
|
/** \file
|
|
*
|
|
* \author Anoop Saldanha <anoopsaldanha@gmail.com>
|
|
* \author Victor Julien <victor@inliniac.net>
|
|
*
|
|
* \brief Handle HTTP user agent match
|
|
*
|
|
*/
|
|
|
|
#include "suricata-common.h"
|
|
#include "suricata.h"
|
|
#include "flow-util.h"
|
|
#include "flow.h"
|
|
#include "app-layer-parser.h"
|
|
#include "util-unittest.h"
|
|
#include "util-unittest-helper.h"
|
|
#include "app-layer.h"
|
|
#include "app-layer-htp.h"
|
|
#include "app-layer-protos.h"
|
|
#include "detect-engine-build.h"
|
|
#include "detect-engine-alert.h"
|
|
|
|
static int DetectEngineHttpUATest(
|
|
const uint8_t *buf, const uint32_t buf_len, const char *sig, const bool expect)
|
|
{
|
|
TcpSession ssn;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
FAIL_IF_NULL(alp_tctx);
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
Packet *p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
FAIL_IF_NULL(p);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, sig);
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
FAIL_IF_NULL(det_ctx);
|
|
|
|
int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, buf, buf_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
bool match = PacketAlertCheck(p, 1);
|
|
FAIL_IF_NOT(match == expect);
|
|
|
|
UTHFreePackets(&p, 1);
|
|
FLOW_DESTROY(&f);
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
StreamTcpFreeConfig(true);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
static int DetectEngineHttpUATest01(void)
|
|
{
|
|
uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CONNECT\"; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest02(void)
|
|
{
|
|
uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CO\"; depth:4; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest03(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http_user_agent test\"; "
|
|
"content:!\"ECT\"; depth:4; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest04(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"ECT\"; depth:4; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest05(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:!\"CON\"; depth:4; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest06(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"ECT\"; offset:3; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest07(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:!\"CO\"; offset:3; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest08(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:!\"ECT\"; offset:3; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest09(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CON\"; offset:3; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest10(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http_user_agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:\"EC\"; within:4; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest11(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:!\"EC\"; within:3; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest12(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http_user_agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:\"EC\"; within:3; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest13(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:!\"EC\"; within:4; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest14(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http_user_agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:\"EC\"; distance:2; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest15(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:!\"EC\"; distance:3; http_user_agent; "
|
|
"sid:1;)",
|
|
true);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest16(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:\"EC\"; distance:3; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectEngineHttpUATest17(void)
|
|
{
|
|
uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n"
|
|
"User-Agent: CONNECT\r\n"
|
|
"Host: www.onetwothreefourfivesixseven.org\r\n\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
return DetectEngineHttpUATest(http_buf, http_len,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http_user_agent test\"; "
|
|
"content:\"CO\"; http_user_agent; "
|
|
"content:!\"EC\"; distance:2; http_user_agent; "
|
|
"sid:1;)",
|
|
false);
|
|
}
|
|
|
|
static int DetectHttpUATestSigParse(const char *sig, const bool expect)
|
|
{
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, sig);
|
|
bool parsed = (s != NULL);
|
|
FAIL_IF_NOT(parsed == expect);
|
|
DetectEngineCtxFree(de_ctx);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test Test that a signature containing a http_user_agent is correctly parsed
|
|
* and the keyword is registered.
|
|
*/
|
|
static int DetectHttpUATest01(void)
|
|
{
|
|
return DetectHttpUATestSigParse("alert tcp any any -> any any "
|
|
"(msg:\"Testing http_user_agent\"; "
|
|
"content:\"one\"; http_user_agent; sid:1;)",
|
|
true);
|
|
}
|
|
|
|
/**
|
|
* \test Test that a signature containing an valid http_user_agent entry is
|
|
* parsed.
|
|
*/
|
|
static int DetectHttpUATest02(void)
|
|
{
|
|
return DetectHttpUATestSigParse("alert tcp any any -> any any "
|
|
"(msg:\"Testing http_user_agent\"; "
|
|
"content:\"one\"; http_user_agent:; sid:1;)",
|
|
true);
|
|
}
|
|
|
|
/**
|
|
* \test Test that an invalid signature containing no content but a
|
|
* http_user_agent is invalidated.
|
|
*/
|
|
static int DetectHttpUATest03(void)
|
|
{
|
|
return DetectHttpUATestSigParse("alert tcp any any -> any any "
|
|
"(msg:\"Testing http_user_agent\"; "
|
|
"http_user_agent; sid:1;)",
|
|
false);
|
|
}
|
|
|
|
/**
|
|
* \test Test that an invalid signature containing a rawbytes along with a
|
|
* http_user_agent is invalidated.
|
|
*/
|
|
static int DetectHttpUATest04(void)
|
|
{
|
|
return DetectHttpUATestSigParse("alert tcp any any -> any any "
|
|
"(msg:\"Testing http_user_agent\"; "
|
|
"content:\"one\"; rawbytes; http_user_agent; sid:1;)",
|
|
false);
|
|
}
|
|
|
|
/**
|
|
* \test Test that a http_user_agent with nocase is parsed.
|
|
*/
|
|
static int DetectHttpUATest05(void)
|
|
{
|
|
return DetectHttpUATestSigParse("alert tcp any any -> any any "
|
|
"(msg:\"Testing http_user_agent\"; "
|
|
"content:\"one\"; http_user_agent; nocase; sid:1;)",
|
|
true);
|
|
}
|
|
|
|
/**
|
|
*\test Test that the http_user_agent content matches against a http request
|
|
* which holds the content.
|
|
*/
|
|
static int DetectHttpUATest06(void)
|
|
{
|
|
TcpSession ssn;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy message body\r\n"
|
|
"Content-Type: text/html\r\n"
|
|
"\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
Packet *p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
FAIL_IF_NULL(p);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW | PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"message\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
FAIL_IF_NOT(PacketAlertCheck(p, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Test that the http_user_agent content matches against a http request
|
|
* which holds the content.
|
|
*/
|
|
static int DetectHttpUATest07(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p1 = NULL;
|
|
Packet *p2 = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http1_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy message";
|
|
uint8_t http2_buf[] =
|
|
"body1\r\n\r\n";
|
|
uint32_t http1_len = sizeof(http1_buf) - 1;
|
|
uint32_t http2_len = sizeof(http2_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p1->flow = &f;
|
|
p1->flowflags |= FLOW_PKT_TOSERVER;
|
|
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
p2->flow = &f;
|
|
p2->flowflags |= FLOW_PKT_TOSERVER;
|
|
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"message\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
|
|
|
FAIL_IF(PacketAlertCheck(p1, 1));
|
|
|
|
r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
|
FAIL_IF_NOT(PacketAlertCheck(p2, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p1, 1);
|
|
UTHFreePackets(&p2, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Test that the http_user_agent content matches against a http request
|
|
* which holds the content.
|
|
*/
|
|
static int DetectHttpUATest08(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p1 = NULL;
|
|
Packet *p2 = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http1_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy mess";
|
|
uint8_t http2_buf[] =
|
|
"age body\r\n\r\n";
|
|
uint32_t http1_len = sizeof(http1_buf) - 1;
|
|
uint32_t http2_len = sizeof(http2_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p1->flow = &f;
|
|
p1->flowflags |= FLOW_PKT_TOSERVER;
|
|
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
p2->flow = &f;
|
|
p2->flowflags |= FLOW_PKT_TOSERVER;
|
|
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"message\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
|
FAIL_IF(PacketAlertCheck(p1, 1));
|
|
|
|
r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
|
|
|
FAIL_IF_NOT(PacketAlertCheck(p2, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p1, 1);
|
|
UTHFreePackets(&p2, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Test that the http_user_agent content matches against a http request
|
|
* which holds the content, against a cross boundary present pattern.
|
|
*/
|
|
static int DetectHttpUATest09(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p1 = NULL;
|
|
Packet *p2 = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http1_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy body1";
|
|
uint8_t http2_buf[] =
|
|
"This is dummy message body2\r\n"
|
|
"Content-Type: text/html\r\n"
|
|
"Content-Length: 46\r\n"
|
|
"\r\n"
|
|
"This is dummy body1";
|
|
uint32_t http1_len = sizeof(http1_buf) - 1;
|
|
uint32_t http2_len = sizeof(http2_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p1->flow = &f;
|
|
p1->flowflags |= FLOW_PKT_TOSERVER;
|
|
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
p2->flow = &f;
|
|
p2->flowflags |= FLOW_PKT_TOSERVER;
|
|
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"body1This\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
|
FAIL_IF(PacketAlertCheck(p1, 1));
|
|
|
|
r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
|
|
|
FAIL_IF_NOT(PacketAlertCheck(p2, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p1, 1);
|
|
UTHFreePackets(&p2, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Test that the http_user_agent content matches against a http request
|
|
* against a case insensitive pattern.
|
|
*/
|
|
static int DetectHttpUATest10(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p1 = NULL;
|
|
Packet *p2 = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http1_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy bodY1";
|
|
uint8_t http2_buf[] =
|
|
"This is dummy message body2\r\n"
|
|
"Content-Type: text/html\r\n"
|
|
"Content-Length: 46\r\n"
|
|
"\r\n"
|
|
"This is dummy bodY1";
|
|
uint32_t http1_len = sizeof(http1_buf) - 1;
|
|
uint32_t http2_len = sizeof(http2_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p1->flow = &f;
|
|
p1->flowflags |= FLOW_PKT_TOSERVER;
|
|
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
p2->flow = &f;
|
|
p2->flowflags |= FLOW_PKT_TOSERVER;
|
|
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"body1this\"; http_user_agent; nocase;"
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
|
FAIL_IF(PacketAlertCheck(p1, 1));
|
|
|
|
r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
|
FAIL_IF_NOT(PacketAlertCheck(p2, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p1, 1);
|
|
UTHFreePackets(&p2, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Test that the negated http_user_agent content matches against a
|
|
* http request which doesn't hold the content.
|
|
*/
|
|
static int DetectHttpUATest11(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy message body\r\n"
|
|
"Content-Type: text/html\r\n"
|
|
"\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:!\"message\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
*\test Negative test that the negated http_user_agent content matches against a
|
|
* http request which holds hold the content.
|
|
*/
|
|
static int DetectHttpUATest12(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: This is dummy body\r\n"
|
|
"\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:!\"message\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF_NOT(PacketAlertCheck(p, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test Test that the http_user_agent content matches against a http request
|
|
* which holds the content.
|
|
*/
|
|
static int DetectHttpUATest13(void)
|
|
{
|
|
TcpSession ssn;
|
|
Packet *p = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
Flow f;
|
|
uint8_t http_buf[] =
|
|
"GET /index.html HTTP/1.0\r\n"
|
|
"Host: www.openinfosecfoundation.org\r\n"
|
|
"User-Agent: longbufferabcdefghijklmnopqrstuvwxyz0123456789bufferend\r\n"
|
|
"Content-Type: text/html\r\n"
|
|
"\r\n";
|
|
uint32_t http_len = sizeof(http_buf) - 1;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
Signature *s = DetectEngineAppendSig(de_ctx,
|
|
"alert http any any -> any any "
|
|
"(msg:\"http user agent test\"; "
|
|
"content:\"abcdefghijklmnopqrstuvwxyz0123456789\"; http_user_agent; "
|
|
"sid:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len);
|
|
FAIL_IF_NOT(r == 0);
|
|
FAIL_IF_NULL(f.alstate);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
FAIL_IF_NOT(PacketAlertCheck(p, 1));
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePackets(&p, 1);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test multiple http transactions and body chunks of request handling
|
|
*/
|
|
static int DetectHttpUATest14(void)
|
|
{
|
|
Signature *s = NULL;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
ThreadVars th_v;
|
|
Flow f;
|
|
TcpSession ssn;
|
|
Packet *p = NULL;
|
|
uint8_t httpbuf1[] = "POST / HTTP/1.1\r\n";
|
|
uint8_t httpbuf2[] = "Cookie: dummy1\r\n";
|
|
uint8_t httpbuf3[] = "User-Agent: Body one!!\r\n\r\n";
|
|
uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
|
|
uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
|
|
uint32_t httplen3 = sizeof(httpbuf3) - 1; /* minus the \0 */
|
|
uint8_t httpbuf4[] = "GET /?var=val HTTP/1.1\r\n";
|
|
uint8_t httpbuf5[] = "Cookie: dummy2\r\n";
|
|
uint8_t httpbuf6[] = "User-Agent: Body two\r\n\r\n";
|
|
uint32_t httplen4 = sizeof(httpbuf4) - 1; /* minus the \0 */
|
|
uint32_t httplen5 = sizeof(httpbuf5) - 1; /* minus the \0 */
|
|
uint32_t httplen6 = sizeof(httpbuf6) - 1; /* minus the \0 */
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.protoctx = (void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
f.flags |= FLOW_IPV4;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_HTTP1;
|
|
|
|
StreamTcpInitConfig(true);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
FAIL_IF_NULL(de_ctx);
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"POST\"; http_method; content:\"dummy1\"; http_cookie; content:\"Body one\"; http_user_agent; sid:1; rev:1;)");
|
|
FAIL_IF_NULL(s);
|
|
s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"GET\"; http_method; content:\"dummy2\"; http_cookie; content:\"Body two\"; http_user_agent; sid:2; rev:1;)");
|
|
FAIL_IF_NULL(s);
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
|
|
|
int r = AppLayerParserParse(
|
|
NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf1, httplen1);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf2, httplen2);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf3, httplen3);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF_NOT(PacketAlertCheck(p, 1));
|
|
p->alerts.cnt = 0;
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf4, httplen4);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
FAIL_IF(PacketAlertCheck(p, 2));
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf5, httplen5);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
FAIL_IF(PacketAlertCheck(p, 2));
|
|
|
|
SCLogDebug("sending data chunk 7");
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf6, httplen6);
|
|
FAIL_IF_NOT(r == 0);
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
FAIL_IF(PacketAlertCheck(p, 1));
|
|
FAIL_IF_NOT(PacketAlertCheck(p, 2));
|
|
p->alerts.cnt = 0;
|
|
|
|
HtpState *htp_state = f.alstate;
|
|
FAIL_IF_NULL(htp_state);
|
|
FAIL_IF_NOT(AppLayerParserGetTxCnt(&f, htp_state) == 2);
|
|
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(true);
|
|
FLOW_DESTROY(&f);
|
|
UTHFreePacket(p);
|
|
StatsThreadCleanup(&th_v);
|
|
PASS;
|
|
}
|
|
|
|
static void DetectHttpUARegisterTests(void)
|
|
{
|
|
UtRegisterTest("DetectEngineHttpUATest01", DetectEngineHttpUATest01);
|
|
UtRegisterTest("DetectEngineHttpUATest02", DetectEngineHttpUATest02);
|
|
UtRegisterTest("DetectEngineHttpUATest03", DetectEngineHttpUATest03);
|
|
UtRegisterTest("DetectEngineHttpUATest04", DetectEngineHttpUATest04);
|
|
UtRegisterTest("DetectEngineHttpUATest05", DetectEngineHttpUATest05);
|
|
UtRegisterTest("DetectEngineHttpUATest06", DetectEngineHttpUATest06);
|
|
UtRegisterTest("DetectEngineHttpUATest07", DetectEngineHttpUATest07);
|
|
UtRegisterTest("DetectEngineHttpUATest08", DetectEngineHttpUATest08);
|
|
UtRegisterTest("DetectEngineHttpUATest09", DetectEngineHttpUATest09);
|
|
UtRegisterTest("DetectEngineHttpUATest10", DetectEngineHttpUATest10);
|
|
UtRegisterTest("DetectEngineHttpUATest11", DetectEngineHttpUATest11);
|
|
UtRegisterTest("DetectEngineHttpUATest12", DetectEngineHttpUATest12);
|
|
UtRegisterTest("DetectEngineHttpUATest13", DetectEngineHttpUATest13);
|
|
UtRegisterTest("DetectEngineHttpUATest14", DetectEngineHttpUATest14);
|
|
UtRegisterTest("DetectEngineHttpUATest15", DetectEngineHttpUATest15);
|
|
UtRegisterTest("DetectEngineHttpUATest16", DetectEngineHttpUATest16);
|
|
UtRegisterTest("DetectEngineHttpUATest17", DetectEngineHttpUATest17);
|
|
|
|
UtRegisterTest("DetectHttpUATest01", DetectHttpUATest01);
|
|
UtRegisterTest("DetectHttpUATest02", DetectHttpUATest02);
|
|
UtRegisterTest("DetectHttpUATest03", DetectHttpUATest03);
|
|
UtRegisterTest("DetectHttpUATest04", DetectHttpUATest04);
|
|
UtRegisterTest("DetectHttpUATest05", DetectHttpUATest05);
|
|
UtRegisterTest("DetectHttpUATest06", DetectHttpUATest06);
|
|
UtRegisterTest("DetectHttpUATest07", DetectHttpUATest07);
|
|
UtRegisterTest("DetectHttpUATest08", DetectHttpUATest08);
|
|
UtRegisterTest("DetectHttpUATest09", DetectHttpUATest09);
|
|
UtRegisterTest("DetectHttpUATest10", DetectHttpUATest10);
|
|
UtRegisterTest("DetectHttpUATest11", DetectHttpUATest11);
|
|
UtRegisterTest("DetectHttpUATest12", DetectHttpUATest12);
|
|
UtRegisterTest("DetectHttpUATest13", DetectHttpUATest13);
|
|
UtRegisterTest("DetectHttpUATest14", DetectHttpUATest14);
|
|
}
|
|
|
|
/**
|
|
* @}
|
|
*/
|