mirror of https://github.com/OISF/suricata
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			572 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			C
		
	
			
		
		
	
	
			572 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			C
		
	
/* Copyright (C) 2007-2010 Open Information Security Foundation
 | 
						|
 *
 | 
						|
 * You can copy, redistribute or modify this Program under the terms of
 | 
						|
 * the GNU General Public License version 2 as published by the Free
 | 
						|
 * Software Foundation.
 | 
						|
 *
 | 
						|
 * This program is distributed in the hope that it will be useful,
 | 
						|
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
 * GNU General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU General Public License
 | 
						|
 * version 2 along with this program; if not, write to the Free Software
 | 
						|
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 | 
						|
 * 02110-1301, USA.
 | 
						|
 */
 | 
						|
 | 
						|
/**
 | 
						|
 * \file
 | 
						|
 *
 | 
						|
 * \author Pablo Rincon <pablo.rincon.crespo@gmail.com>
 | 
						|
 *
 | 
						|
 * ftpbounce keyword, part of the detection engine.
 | 
						|
 */
 | 
						|
 | 
						|
#include "suricata-common.h"
 | 
						|
#include "debug.h"
 | 
						|
#include "decode.h"
 | 
						|
#include "detect.h"
 | 
						|
#include "detect-parse.h"
 | 
						|
#include "detect-engine.h"
 | 
						|
#include "detect-engine-mpm.h"
 | 
						|
#include "detect-engine-state.h"
 | 
						|
#include "detect-content.h"
 | 
						|
 | 
						|
#include "app-layer.h"
 | 
						|
#include "app-layer-parser.h"
 | 
						|
#include "app-layer-ftp.h"
 | 
						|
#include "util-unittest.h"
 | 
						|
#include "util-unittest-helper.h"
 | 
						|
#include "util-debug.h"
 | 
						|
#include "flow.h"
 | 
						|
#include "flow-var.h"
 | 
						|
#include "flow-util.h"
 | 
						|
#include "threads.h"
 | 
						|
#include "detect-ftpbounce.h"
 | 
						|
#include "stream-tcp.h"
 | 
						|
#include "util-byte.h"
 | 
						|
 | 
						|
static int DetectFtpbounceALMatch(DetectEngineThreadCtx *,
 | 
						|
        Flow *, uint8_t, void *, void *,
 | 
						|
        const Signature *, const SigMatchCtx *);
 | 
						|
 | 
						|
static int DetectFtpbounceSetup(DetectEngineCtx *, Signature *, const char *);
 | 
						|
#ifdef UNITTESTS
 | 
						|
static void DetectFtpbounceRegisterTests(void);
 | 
						|
#endif
 | 
						|
static int g_ftp_request_list_id = 0;
 | 
						|
 | 
						|
static int InspectFtpRequest(DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
 | 
						|
        const struct DetectEngineAppInspectionEngine_ *engine, const Signature *s, Flow *f,
 | 
						|
        uint8_t flags, void *alstate, void *txv, uint64_t tx_id);
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief Registration function for ftpbounce: keyword
 | 
						|
 * \todo add support for no_stream and stream_only
 | 
						|
 */
 | 
						|
void DetectFtpbounceRegister(void)
 | 
						|
{
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].name = "ftpbounce";
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].desc = "detect FTP bounce attacks";
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].Setup = DetectFtpbounceSetup;
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].AppLayerTxMatch = DetectFtpbounceALMatch;
 | 
						|
#ifdef UNITTESTS
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].RegisterTests = DetectFtpbounceRegisterTests;
 | 
						|
#endif
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].url = "/rules/ftp-keywords.html#ftpbounce";
 | 
						|
    sigmatch_table[DETECT_FTPBOUNCE].flags = SIGMATCH_NOOPT;
 | 
						|
 | 
						|
    g_ftp_request_list_id = DetectBufferTypeRegister("ftp_request");
 | 
						|
 | 
						|
    DetectAppLayerInspectEngineRegister2(
 | 
						|
            "ftp_request", ALPROTO_FTP, SIG_FLAG_TOSERVER, 0, InspectFtpRequest, NULL);
 | 
						|
}
 | 
						|
 | 
						|
static int InspectFtpRequest(DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
 | 
						|
        const struct DetectEngineAppInspectionEngine_ *engine, const Signature *s, Flow *f,
 | 
						|
        uint8_t flags, void *alstate, void *txv, uint64_t tx_id)
 | 
						|
{
 | 
						|
    return DetectEngineInspectGenericList(
 | 
						|
            NULL, de_ctx, det_ctx, s, engine->smd, f, flags, alstate, txv, tx_id);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief This function is used to match ftpbounce attacks
 | 
						|
 *
 | 
						|
 * \param payload Payload of the PORT command
 | 
						|
 * \param payload_len Length of the payload
 | 
						|
 * \param ip_orig IP source to check the ftpbounce condition
 | 
						|
 * \param offset offset to the arguments of the PORT command
 | 
						|
 *
 | 
						|
 * \retval 1 if ftpbounce detected, 0 if not
 | 
						|
 */
 | 
						|
static int DetectFtpbounceMatchArgs(uint8_t *payload, uint16_t payload_len,
 | 
						|
                             uint32_t ip_orig, uint16_t offset)
 | 
						|
{
 | 
						|
    SCEnter();
 | 
						|
    SCLogDebug("Checking ftpbounce condition");
 | 
						|
    char *c = NULL;
 | 
						|
    uint16_t i = 0;
 | 
						|
    int octet = 0;
 | 
						|
    int octet_ascii_len = 0;
 | 
						|
    int noctet = 0;
 | 
						|
    uint32_t ip = 0;
 | 
						|
    /* PrintRawDataFp(stdout, payload, payload_len); */
 | 
						|
 | 
						|
    if (payload_len < 7) {
 | 
						|
        /* we need at least a differet ip address
 | 
						|
         * in the format 1,2,3,4,x,y where x,y is the port
 | 
						|
         * in two byte representation so let's look at
 | 
						|
         * least for the IP octets in comma separated */
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    if (offset + 7 >= payload_len)
 | 
						|
        return 0;
 | 
						|
 | 
						|
    c =(char*) payload;
 | 
						|
    if (c == NULL) {
 | 
						|
        SCLogDebug("No payload to check");
 | 
						|
        return 0;
 | 
						|
    }
 | 
						|
 | 
						|
    i = offset;
 | 
						|
    /* Search for the first IP octect(Skips "PORT ") */
 | 
						|
    while (i < payload_len && !isdigit((unsigned char)c[i])) i++;
 | 
						|
 | 
						|
    for (;i < payload_len && octet_ascii_len < 4 ;i++) {
 | 
						|
        if (isdigit((unsigned char)c[i])) {
 | 
						|
            octet =(c[i] - '0') + octet * 10;
 | 
						|
            octet_ascii_len++;
 | 
						|
        } else {
 | 
						|
            if (octet > 256) {
 | 
						|
                SCLogDebug("Octet not in ip format");
 | 
						|
                return 0;
 | 
						|
            }
 | 
						|
 | 
						|
            if (isspace((unsigned char)c[i]))
 | 
						|
                while (i < payload_len && isspace((unsigned char)c[i]) ) i++;
 | 
						|
 | 
						|
            if (i < payload_len && c[i] == ',') { /* we have an octet */
 | 
						|
                noctet++;
 | 
						|
                octet_ascii_len = 0;
 | 
						|
                ip =(ip << 8) + octet;
 | 
						|
                octet = 0;
 | 
						|
            } else {
 | 
						|
                SCLogDebug("Unrecognized character '%c'", c[i]);
 | 
						|
                return 0;
 | 
						|
            }
 | 
						|
            if (noctet == 4) {
 | 
						|
                /* Different IP than src, ftp bounce scan */
 | 
						|
                ip = SCByteSwap32(ip);
 | 
						|
 | 
						|
                if (ip != ip_orig) {
 | 
						|
                    SCLogDebug("Different ip, so Matched ip:%d <-> ip_orig:%d",
 | 
						|
                               ip, ip_orig);
 | 
						|
                    return 1;
 | 
						|
                }
 | 
						|
                SCLogDebug("Same ip, so no match here");
 | 
						|
                return 0;
 | 
						|
            }
 | 
						|
        }
 | 
						|
    }
 | 
						|
    SCLogDebug("No match");
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief This function is used to check matches from the FTP App Layer Parser
 | 
						|
 *
 | 
						|
 * \param t pointer to thread vars
 | 
						|
 * \param det_ctx pointer to the pattern matcher thread
 | 
						|
 * \param p pointer to the current packet
 | 
						|
 * \param m pointer to the sigmatch but we don't use it since ftpbounce
 | 
						|
 *          has no options
 | 
						|
 * \retval 0 no match
 | 
						|
 * \retval 1 match
 | 
						|
 */
 | 
						|
static int DetectFtpbounceALMatch(DetectEngineThreadCtx *det_ctx,
 | 
						|
        Flow *f, uint8_t flags,
 | 
						|
        void *state, void *txv,
 | 
						|
        const Signature *s, const SigMatchCtx *m)
 | 
						|
{
 | 
						|
    SCEnter();
 | 
						|
 | 
						|
    FtpState *ftp_state = (FtpState *)state;
 | 
						|
    if (ftp_state == NULL) {
 | 
						|
        SCLogDebug("no ftp state, no match");
 | 
						|
        SCReturnInt(0);
 | 
						|
    }
 | 
						|
 | 
						|
    int ret = 0;
 | 
						|
    if (ftp_state->command == FTP_COMMAND_PORT) {
 | 
						|
        ret = DetectFtpbounceMatchArgs(ftp_state->port_line,
 | 
						|
                  ftp_state->port_line_len, f->src.address.address_un_data32[0],
 | 
						|
                  ftp_state->arg_offset);
 | 
						|
    }
 | 
						|
 | 
						|
    SCReturnInt(ret);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief this function is used to add the parsed ftpbounce
 | 
						|
 *
 | 
						|
 * \param de_ctx pointer to the Detection Engine Context
 | 
						|
 * \param s pointer to the Current Signature
 | 
						|
 * \param m pointer to the Current SigMatch
 | 
						|
 * \param ftpbouncestr pointer to the user provided ftpbounce options
 | 
						|
 *                     currently there are no options.
 | 
						|
 *
 | 
						|
 * \retval 0 on Success
 | 
						|
 * \retval -1 on Failure
 | 
						|
 */
 | 
						|
int DetectFtpbounceSetup(DetectEngineCtx *de_ctx, Signature *s, const char *ftpbouncestr)
 | 
						|
{
 | 
						|
    SCEnter();
 | 
						|
 | 
						|
    SigMatch *sm = NULL;
 | 
						|
 | 
						|
    if (DetectSignatureSetAppProto(s, ALPROTO_FTP) != 0)
 | 
						|
        return -1;
 | 
						|
 | 
						|
    sm = SigMatchAlloc();
 | 
						|
    if (sm == NULL) {
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    sm->type = DETECT_FTPBOUNCE;
 | 
						|
 | 
						|
    /* We don't need to allocate any data for ftpbounce here.
 | 
						|
    *
 | 
						|
    * TODO: As a suggestion, maybe we can add a flag in the flow
 | 
						|
    * to set the stream as "bounce detected" for fast Match.
 | 
						|
    * When you do a ftp bounce attack you usually use the same
 | 
						|
    * communication control stream to "setup" various destinations
 | 
						|
    * whithout breaking the connection, so I guess we can make it a bit faster
 | 
						|
    * with a flow flag set lookup in the Match function.
 | 
						|
    */
 | 
						|
    sm->ctx = NULL;
 | 
						|
 | 
						|
    SigMatchAppendSMToList(s, sm, g_ftp_request_list_id);
 | 
						|
    SCReturnInt(0);
 | 
						|
}
 | 
						|
 | 
						|
#ifdef UNITTESTS
 | 
						|
 | 
						|
/**
 | 
						|
 * \test DetectFtpbounceTestSetup01 is a test for the Setup ftpbounce
 | 
						|
 */
 | 
						|
static int DetectFtpbounceTestSetup01(void)
 | 
						|
{
 | 
						|
    DetectEngineCtx *de_ctx = NULL;
 | 
						|
    Signature *s = SigAlloc();
 | 
						|
    FAIL_IF (s == NULL);
 | 
						|
 | 
						|
    /* ftpbounce doesn't accept options so the str is NULL */
 | 
						|
    FAIL_IF_NOT(DetectFtpbounceSetup(de_ctx, s, NULL) == 0);
 | 
						|
    FAIL_IF(s->sm_lists[g_ftp_request_list_id] == NULL);
 | 
						|
    FAIL_IF_NOT(s->sm_lists[g_ftp_request_list_id]->type & DETECT_FTPBOUNCE);
 | 
						|
 | 
						|
    SigFree(de_ctx, s);
 | 
						|
    PASS;
 | 
						|
}
 | 
						|
 | 
						|
#include "stream-tcp-reassemble.h"
 | 
						|
 | 
						|
/**
 | 
						|
 * \test Check the ftpbounce match, send a get request in three chunks
 | 
						|
 * + more data.
 | 
						|
 * \brief This test tests the ftpbounce condition match, based on the
 | 
						|
 *   ftp layer parser
 | 
						|
 */
 | 
						|
static int DetectFtpbounceTestALMatch02(void)
 | 
						|
{
 | 
						|
    int result = 0;
 | 
						|
 | 
						|
    uint8_t ftpbuf1[] = { 'P','O' };
 | 
						|
    uint32_t ftplen1 = sizeof(ftpbuf1);
 | 
						|
    uint8_t ftpbuf2[] = { 'R', 'T' };
 | 
						|
    uint32_t ftplen2 = sizeof(ftpbuf2);
 | 
						|
    uint8_t ftpbuf3[] = { ' ', '8','0',',','5' };
 | 
						|
    uint32_t ftplen3 = sizeof(ftpbuf3);
 | 
						|
    uint8_t ftpbuf4[] = "8,0,33,10,20\r\n";
 | 
						|
    uint32_t ftplen4 = sizeof(ftpbuf4);
 | 
						|
 | 
						|
    TcpSession ssn;
 | 
						|
    Flow f;
 | 
						|
    Packet *p = NULL;
 | 
						|
    Signature *s = NULL;
 | 
						|
    ThreadVars th_v;
 | 
						|
    DetectEngineThreadCtx *det_ctx = NULL;
 | 
						|
    AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
 | 
						|
 | 
						|
    memset(&th_v, 0, sizeof(th_v));
 | 
						|
    memset(&f, 0, sizeof(f));
 | 
						|
    memset(&ssn, 0, sizeof(ssn));
 | 
						|
 | 
						|
    p = UTHBuildPacketSrcDst(NULL, 0, IPPROTO_TCP, "1.2.3.4", "5.6.7.8");
 | 
						|
 | 
						|
    FLOW_INITIALIZE(&f);
 | 
						|
    f.src.address.address_un_data32[0]=0x01020304;
 | 
						|
    f.protoctx =(void *)&ssn;
 | 
						|
    f.proto = IPPROTO_TCP;
 | 
						|
 | 
						|
    p->flow = &f;
 | 
						|
    p->flowflags |= FLOW_PKT_TOSERVER;
 | 
						|
    p->flowflags |= FLOW_PKT_ESTABLISHED;
 | 
						|
    p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
 | 
						|
    f.alproto = ALPROTO_FTP;
 | 
						|
 | 
						|
    StreamTcpInitConfig(TRUE);
 | 
						|
 | 
						|
    DetectEngineCtx *de_ctx = DetectEngineCtxInit();
 | 
						|
    if (de_ctx == NULL) {
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    de_ctx->flags |= DE_QUIET;
 | 
						|
 | 
						|
    s = de_ctx->sig_list = SigInit(de_ctx,"alert tcp any any -> any any "
 | 
						|
                                   "(msg:\"Ftp Bounce\"; ftpbounce; sid:1;)");
 | 
						|
    if (s == NULL) {
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    SigGroupBuild(de_ctx);
 | 
						|
    DetectEngineThreadCtxInit(&th_v,(void *)de_ctx,(void *)&det_ctx);
 | 
						|
 | 
						|
    FLOWLOCK_WRLOCK(&f);
 | 
						|
    int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP,
 | 
						|
                                STREAM_TOSERVER, ftpbuf1, ftplen1);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf2, ftplen2);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf3, ftplen3);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf4, ftplen4);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    FLOWLOCK_UNLOCK(&f);
 | 
						|
 | 
						|
    FtpState *ftp_state = f.alstate;
 | 
						|
    if (ftp_state == NULL) {
 | 
						|
        SCLogDebug("no ftp state: ");
 | 
						|
        result = 0;
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ftp_state->command != FTP_COMMAND_PORT) {
 | 
						|
        SCLogDebug("expected command port not detected");
 | 
						|
        result = 0;
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    /* do detect */
 | 
						|
    SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
 | 
						|
 | 
						|
    if (!(PacketAlertCheck(p, 1))) {
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    result = 1;
 | 
						|
end:
 | 
						|
    if (alp_tctx != NULL)
 | 
						|
        AppLayerParserThreadCtxFree(alp_tctx);
 | 
						|
    SigGroupCleanup(de_ctx);
 | 
						|
    SigCleanSignatures(de_ctx);
 | 
						|
 | 
						|
    DetectEngineThreadCtxDeinit(&th_v,(void *)det_ctx);
 | 
						|
    DetectEngineCtxFree(de_ctx);
 | 
						|
 | 
						|
    StreamTcpFreeConfig(TRUE);
 | 
						|
    FLOW_DESTROY(&f);
 | 
						|
 | 
						|
    UTHFreePackets(&p, 1);
 | 
						|
    return result;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * \test Check the ftpbounce match
 | 
						|
 * \brief This test tests the ftpbounce condition match, based on
 | 
						|
 *  the ftp layer parser
 | 
						|
 */
 | 
						|
static int DetectFtpbounceTestALMatch03(void)
 | 
						|
{
 | 
						|
    int result = 0;
 | 
						|
 | 
						|
    uint8_t ftpbuf1[] = { 'P','O' };
 | 
						|
    uint32_t ftplen1 = sizeof(ftpbuf1);
 | 
						|
    uint8_t ftpbuf2[] = { 'R', 'T' };
 | 
						|
    uint32_t ftplen2 = sizeof(ftpbuf2);
 | 
						|
    uint8_t ftpbuf3[] = { ' ', '1',',','2',',' };
 | 
						|
    uint32_t ftplen3 = sizeof(ftpbuf3);
 | 
						|
    uint8_t ftpbuf4[] = "3,4,10,20\r\n";
 | 
						|
    uint32_t ftplen4 = sizeof(ftpbuf4);
 | 
						|
 | 
						|
    TcpSession ssn;
 | 
						|
    Flow f;
 | 
						|
    Packet *p = SCMalloc(SIZE_OF_PACKET);
 | 
						|
    if (unlikely(p == NULL))
 | 
						|
        return 0;
 | 
						|
    Signature *s = NULL;
 | 
						|
    ThreadVars th_v;
 | 
						|
    DetectEngineThreadCtx *det_ctx = NULL;
 | 
						|
    AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
 | 
						|
 | 
						|
    memset(&th_v, 0, sizeof(th_v));
 | 
						|
    memset(p, 0, SIZE_OF_PACKET);
 | 
						|
    memset(&f, 0, sizeof(f));
 | 
						|
    memset(&ssn, 0, sizeof(ssn));
 | 
						|
 | 
						|
    p->src.family = AF_INET;
 | 
						|
    p->dst.family = AF_INET;
 | 
						|
    p->src.addr_data32[0] = 0x04030201;
 | 
						|
    p->payload = NULL;
 | 
						|
    p->payload_len = 0;
 | 
						|
    p->proto = IPPROTO_TCP;
 | 
						|
 | 
						|
    FLOW_INITIALIZE(&f);
 | 
						|
    f.src.address.address_un_data32[0]=0x04030201;
 | 
						|
    f.protoctx =(void *)&ssn;
 | 
						|
    f.proto = IPPROTO_TCP;
 | 
						|
 | 
						|
    p->flow = &f;
 | 
						|
    p->flowflags |= FLOW_PKT_TOSERVER;
 | 
						|
    p->flowflags |= FLOW_PKT_ESTABLISHED;
 | 
						|
    p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
 | 
						|
    f.alproto = ALPROTO_FTP;
 | 
						|
 | 
						|
    StreamTcpInitConfig(TRUE);
 | 
						|
 | 
						|
    DetectEngineCtx *de_ctx = DetectEngineCtxInit();
 | 
						|
    if (de_ctx == NULL) {
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    de_ctx->flags |= DE_QUIET;
 | 
						|
 | 
						|
    s = de_ctx->sig_list = SigInit(de_ctx,"alert tcp any any -> any any "
 | 
						|
                                   "(msg:\"Ftp Bounce\"; ftpbounce; sid:1;)");
 | 
						|
    if (s == NULL) {
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    SigGroupBuild(de_ctx);
 | 
						|
    DetectEngineThreadCtxInit(&th_v,(void *)de_ctx,(void *)&det_ctx);
 | 
						|
 | 
						|
    FLOWLOCK_WRLOCK(&f);
 | 
						|
    int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP,
 | 
						|
                                STREAM_TOSERVER, ftpbuf1, ftplen1);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf2, ftplen2);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf3, ftplen3);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
 | 
						|
                            ftpbuf4, ftplen4);
 | 
						|
    if (r != 0) {
 | 
						|
        SCLogDebug("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
 | 
						|
        result = 0;
 | 
						|
        FLOWLOCK_UNLOCK(&f);
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
    FLOWLOCK_UNLOCK(&f);
 | 
						|
 | 
						|
    FtpState *ftp_state = f.alstate;
 | 
						|
    if (ftp_state == NULL) {
 | 
						|
        SCLogDebug("no ftp state: ");
 | 
						|
        result = 0;
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ftp_state->command != FTP_COMMAND_PORT) {
 | 
						|
        SCLogDebug("expected command port not detected");
 | 
						|
        result = 0;
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    /* do detect */
 | 
						|
    SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
 | 
						|
 | 
						|
    /* It should not match */
 | 
						|
    if (!(PacketAlertCheck(p, 1))) {
 | 
						|
        result = 1;
 | 
						|
    } else {
 | 
						|
        SCLogDebug("It should not match here!");
 | 
						|
    }
 | 
						|
 | 
						|
end:
 | 
						|
    if (alp_tctx != NULL)
 | 
						|
        AppLayerParserThreadCtxFree(alp_tctx);
 | 
						|
    SigGroupCleanup(de_ctx);
 | 
						|
    SigCleanSignatures(de_ctx);
 | 
						|
 | 
						|
    DetectEngineThreadCtxDeinit(&th_v,(void *)det_ctx);
 | 
						|
    DetectEngineCtxFree(de_ctx);
 | 
						|
 | 
						|
    StreamTcpFreeConfig(TRUE);
 | 
						|
    FLOW_DESTROY(&f);
 | 
						|
    SCFree(p);
 | 
						|
    return result;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief this function registers unit tests for DetectFtpbounce
 | 
						|
 */
 | 
						|
static void DetectFtpbounceRegisterTests(void)
 | 
						|
{
 | 
						|
    UtRegisterTest("DetectFtpbounceTestSetup01", DetectFtpbounceTestSetup01);
 | 
						|
    UtRegisterTest("DetectFtpbounceTestALMatch02",
 | 
						|
                   DetectFtpbounceTestALMatch02);
 | 
						|
    UtRegisterTest("DetectFtpbounceTestALMatch03",
 | 
						|
                   DetectFtpbounceTestALMatch03);
 | 
						|
}
 | 
						|
#endif /* UNITTESTS */
 |