diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
commit | a0aa2307322cd47bbf416810ac0292925e03be87 (patch) | |
tree | 37076262a026c4b48c8a0e84f44ff9187556ca35 /rust/src/snmp/snmp.rs | |
parent | Initial commit. (diff) | |
download | suricata-a0aa2307322cd47bbf416810ac0292925e03be87.tar.xz suricata-a0aa2307322cd47bbf416810ac0292925e03be87.zip |
Adding upstream version 1:7.0.3.upstream/1%7.0.3
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'rust/src/snmp/snmp.rs')
-rw-r--r-- | rust/src/snmp/snmp.rs | 429 |
1 files changed, 429 insertions, 0 deletions
diff --git a/rust/src/snmp/snmp.rs b/rust/src/snmp/snmp.rs new file mode 100644 index 0000000..a4481f4 --- /dev/null +++ b/rust/src/snmp/snmp.rs @@ -0,0 +1,429 @@ +/* Copyright (C) 2017-2021 Open Information Security Foundation + * + * You can copy, redistribute or modify this Program under the terms of + * the GNU General Public License version 2 as published by the Free + * Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * version 2 along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + * 02110-1301, USA. + */ + +// written by Pierre Chifflier <chifflier@wzdftpd.net> + +use crate::snmp::snmp_parser::*; +use crate::core::{self, *}; +use crate::applayer::{self, *}; +use std; +use std::ffi::CString; + +use asn1_rs::Oid; +use der_parser::ber::BerObjectContent; +use der_parser::der::parse_der_sequence; +use nom7::{Err, IResult}; +use nom7::error::{ErrorKind, make_error}; + +#[derive(AppLayerEvent)] +pub enum SNMPEvent { + MalformedData, + UnknownSecurityModel, + VersionMismatch, +} + +#[derive(Default)] +pub struct SNMPState<'a> { + state_data: AppLayerStateData, + + /// SNMP protocol version + pub version: u32, + + /// List of transactions for this session + transactions: Vec<SNMPTransaction<'a>>, + + /// tx counter for assigning incrementing id's to tx's + tx_id: u64, +} + +pub struct SNMPPduInfo<'a> { + pub pdu_type: PduType, + + pub err: ErrorStatus, + + pub trap_type: Option<(TrapType,Oid<'a>,NetworkAddress)>, + + pub vars: Vec<Oid<'a>>, +} + +pub struct SNMPTransaction<'a> { + /// PDU version + pub version: u32, + + /// PDU info, if present (and cleartext) + pub info: Option<SNMPPduInfo<'a>>, + + /// Community, if present (SNMPv2) + pub community: Option<String>, + + /// USM info, if present (SNMPv3) + pub usm: Option<String>, + + /// True if transaction was encrypted + pub encrypted: bool, + + /// The internal transaction id + id: u64, + + tx_data: applayer::AppLayerTxData, +} + +impl<'a> Transaction for SNMPTransaction<'a> { + fn id(&self) -> u64 { + self.id + } +} + +impl<'a> SNMPState<'a> { + pub fn new() -> SNMPState<'a> { + Default::default() + } +} + +impl<'a> Default for SNMPPduInfo<'a> { + fn default() -> SNMPPduInfo<'a> { + SNMPPduInfo{ + pdu_type: PduType(0), + err: ErrorStatus::NoError, + trap_type: None, + vars: Vec::new() + } + } +} + +impl<'a> State<SNMPTransaction<'a>> for SNMPState<'a> { + fn get_transaction_count(&self) -> usize { + self.transactions.len() + } + + fn get_transaction_by_index(&self, index: usize) -> Option<&SNMPTransaction<'a>> { + self.transactions.get(index) + } +} + +impl<'a> SNMPState<'a> { + fn add_pdu_info(&mut self, pdu: &SnmpPdu<'a>, tx: &mut SNMPTransaction<'a>) { + let mut pdu_info = SNMPPduInfo { + pdu_type: pdu.pdu_type(), + ..Default::default() + }; + match *pdu { + SnmpPdu::Generic(ref pdu) => { + pdu_info.err = pdu.err; + }, + SnmpPdu::Bulk(_) => { + }, + SnmpPdu::TrapV1(ref t) => { + pdu_info.trap_type = Some((t.generic_trap,t.enterprise.clone(),t.agent_addr)); + } + } + + for var in pdu.vars_iter() { + pdu_info.vars.push(var.oid.to_owned()); + } + tx.info = Some(pdu_info); + } + + fn handle_snmp_v12(&mut self, msg: SnmpMessage<'a>, _direction: Direction) -> i32 { + let mut tx = self.new_tx(_direction); + // in the message, version is encoded as 0 (version 1) or 1 (version 2) + if self.version != msg.version + 1 { + SCLogDebug!("SNMP version mismatch: expected {}, received {}", self.version, msg.version+1); + self.set_event_tx(&mut tx, SNMPEvent::VersionMismatch); + } + self.add_pdu_info(&msg.pdu, &mut tx); + tx.community = Some(msg.community); + self.transactions.push(tx); + 0 + } + + fn handle_snmp_v3(&mut self, msg: SnmpV3Message<'a>, _direction: Direction) -> i32 { + let mut tx = self.new_tx(_direction); + if self.version != msg.version { + SCLogDebug!("SNMP version mismatch: expected {}, received {}", self.version, msg.version); + self.set_event_tx(&mut tx, SNMPEvent::VersionMismatch); + } + match msg.data { + ScopedPduData::Plaintext(pdu) => { + self.add_pdu_info(&pdu.data, &mut tx); + }, + _ => { + tx.encrypted = true; + } + } + match msg.security_params { + SecurityParameters::USM(usm) => { + tx.usm = Some(usm.msg_user_name); + }, + _ => { + self.set_event_tx(&mut tx, SNMPEvent::UnknownSecurityModel); + } + } + self.transactions.push(tx); + 0 + } + + /// Parse an SNMP request message + /// + /// Returns 0 if successful, or -1 on error + fn parse(&mut self, i: &'a [u8], direction: Direction) -> i32 { + if self.version == 0 { + if let Ok((_, x)) = parse_pdu_envelope_version(i) { + self.version = x; + } + } + match parse_snmp_generic_message(i) { + Ok((_rem,SnmpGenericMessage::V1(msg))) | + Ok((_rem,SnmpGenericMessage::V2(msg))) => self.handle_snmp_v12(msg, direction), + Ok((_rem,SnmpGenericMessage::V3(msg))) => self.handle_snmp_v3(msg, direction), + Err(_e) => { + SCLogDebug!("parse_snmp failed: {:?}", _e); + self.set_event(SNMPEvent::MalformedData); + -1 + }, + } + } + + fn free(&mut self) { + // All transactions are freed when the `transactions` object is freed. + // But let's be explicit + self.transactions.clear(); + } + + fn new_tx(&mut self, direction: Direction) -> SNMPTransaction<'a> { + self.tx_id += 1; + SNMPTransaction::new(direction, self.version, self.tx_id) + } + + fn get_tx_by_id(&mut self, tx_id: u64) -> Option<&SNMPTransaction> { + self.transactions.iter().rev().find(|&tx| tx.id == tx_id + 1) + } + + fn free_tx(&mut self, tx_id: u64) { + let tx = self.transactions.iter().position(|tx| tx.id == tx_id + 1); + debug_assert!(tx.is_some()); + if let Some(idx) = tx { + let _ = self.transactions.remove(idx); + } + } + + /// Set an event. The event is set on the most recent transaction. + fn set_event(&mut self, event: SNMPEvent) { + if let Some(tx) = self.transactions.last_mut() { + tx.tx_data.set_event(event as u8); + } + } + + /// Set an event on a specific transaction. + fn set_event_tx(&self, tx: &mut SNMPTransaction, event: SNMPEvent) { + tx.tx_data.set_event(event as u8); + } +} + +impl<'a> SNMPTransaction<'a> { + pub fn new(direction: Direction, version: u32, id: u64) -> SNMPTransaction<'a> { + SNMPTransaction { + version, + info: None, + community: None, + usm: None, + encrypted: false, + id, + tx_data: applayer::AppLayerTxData::for_direction(direction), + } + } +} + +/// Returns *mut SNMPState +#[no_mangle] +pub extern "C" fn rs_snmp_state_new(_orig_state: *mut std::os::raw::c_void, _orig_proto: AppProto) -> *mut std::os::raw::c_void { + let state = SNMPState::new(); + let boxed = Box::new(state); + return Box::into_raw(boxed) as *mut _; +} + +/// Params: +/// - state: *mut SNMPState as void pointer +#[no_mangle] +pub extern "C" fn rs_snmp_state_free(state: *mut std::os::raw::c_void) { + let mut snmp_state = unsafe{ Box::from_raw(state as *mut SNMPState) }; + snmp_state.free(); +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_parse_request(_flow: *const core::Flow, + state: *mut std::os::raw::c_void, + _pstate: *mut std::os::raw::c_void, + stream_slice: StreamSlice, + _data: *const std::os::raw::c_void, + ) -> AppLayerResult { + let state = cast_pointer!(state,SNMPState); + state.parse(stream_slice.as_slice(), Direction::ToServer).into() +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_parse_response(_flow: *const core::Flow, + state: *mut std::os::raw::c_void, + _pstate: *mut std::os::raw::c_void, + stream_slice: StreamSlice, + _data: *const std::os::raw::c_void, + ) -> AppLayerResult { + let state = cast_pointer!(state,SNMPState); + state.parse(stream_slice.as_slice(), Direction::ToClient).into() +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_state_get_tx(state: *mut std::os::raw::c_void, + tx_id: u64) + -> *mut std::os::raw::c_void +{ + let state = cast_pointer!(state,SNMPState); + match state.get_tx_by_id(tx_id) { + Some(tx) => tx as *const _ as *mut _, + None => std::ptr::null_mut(), + } +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_state_get_tx_count(state: *mut std::os::raw::c_void) + -> u64 +{ + let state = cast_pointer!(state,SNMPState); + state.tx_id +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_state_tx_free(state: *mut std::os::raw::c_void, + tx_id: u64) +{ + let state = cast_pointer!(state,SNMPState); + state.free_tx(tx_id); +} + +#[no_mangle] +pub extern "C" fn rs_snmp_tx_get_alstate_progress(_tx: *mut std::os::raw::c_void, + _direction: u8) + -> std::os::raw::c_int +{ + 1 +} + +static mut ALPROTO_SNMP : AppProto = ALPROTO_UNKNOWN; + +// Read PDU sequence and extract version, if similar to SNMP definition +fn parse_pdu_envelope_version(i:&[u8]) -> IResult<&[u8],u32> { + match parse_der_sequence(i) { + Ok((_,x)) => { + #[allow(clippy::single_match)] + match x.content { + BerObjectContent::Sequence(ref v) => { + if v.len() == 3 { + match v[0].as_u32() { + Ok(0) => { return Ok((i,1)); }, // possibly SNMPv1 + Ok(1) => { return Ok((i,2)); }, // possibly SNMPv2c + _ => () + } + } else if v.len() == 4 && v[0].as_u32() == Ok(3) { + return Ok((i,3)); // possibly SNMPv3 + } + }, + _ => () + }; + Err(Err::Error(make_error(i, ErrorKind::Verify))) + }, + Err(Err::Incomplete(i)) => Err(Err::Incomplete(i)), + Err(Err::Failure(_)) | + Err(Err::Error(_)) => Err(Err::Error(make_error(i,ErrorKind::Verify))) + } +} + +#[no_mangle] +pub unsafe extern "C" fn rs_snmp_probing_parser(_flow: *const Flow, + _direction: u8, + input:*const u8, + input_len: u32, + _rdir: *mut u8) -> AppProto { + let slice = build_slice!(input,input_len as usize); + let alproto = ALPROTO_SNMP; + if slice.len() < 4 { return ALPROTO_FAILED; } + match parse_pdu_envelope_version(slice) { + Ok((_,_)) => alproto, + Err(Err::Incomplete(_)) => ALPROTO_UNKNOWN, + _ => ALPROTO_FAILED, + } +} + +export_tx_data_get!(rs_snmp_get_tx_data, SNMPTransaction); +export_state_data_get!(rs_snmp_get_state_data, SNMPState); + +const PARSER_NAME : &[u8] = b"snmp\0"; + +#[no_mangle] +pub unsafe extern "C" fn rs_register_snmp_parser() { + let default_port = CString::new("161").unwrap(); + let mut parser = RustParser { + name : PARSER_NAME.as_ptr() as *const std::os::raw::c_char, + default_port : default_port.as_ptr(), + ipproto : core::IPPROTO_UDP, + probe_ts : Some(rs_snmp_probing_parser), + probe_tc : Some(rs_snmp_probing_parser), + min_depth : 0, + max_depth : 16, + state_new : rs_snmp_state_new, + state_free : rs_snmp_state_free, + tx_free : rs_snmp_state_tx_free, + parse_ts : rs_snmp_parse_request, + parse_tc : rs_snmp_parse_response, + get_tx_count : rs_snmp_state_get_tx_count, + get_tx : rs_snmp_state_get_tx, + tx_comp_st_ts : 1, + tx_comp_st_tc : 1, + tx_get_progress : rs_snmp_tx_get_alstate_progress, + get_eventinfo : Some(SNMPEvent::get_event_info), + get_eventinfo_byid : Some(SNMPEvent::get_event_info_by_id), + localstorage_new : None, + localstorage_free : None, + get_tx_files : None, + get_tx_iterator : Some(applayer::state_get_tx_iterator::<SNMPState, SNMPTransaction>), + get_tx_data : rs_snmp_get_tx_data, + get_state_data : rs_snmp_get_state_data, + apply_tx_config : None, + flags : 0, + truncate : None, + get_frame_id_by_name: None, + get_frame_name_by_id: None, + }; + let ip_proto_str = CString::new("udp").unwrap(); + if AppLayerProtoDetectConfProtoDetectionEnabled(ip_proto_str.as_ptr(), parser.name) != 0 { + // port 161 + let alproto = AppLayerRegisterProtocolDetection(&parser, 1); + // store the allocated ID for the probe function + ALPROTO_SNMP = alproto; + if AppLayerParserConfParserEnabled(ip_proto_str.as_ptr(), parser.name) != 0 { + let _ = AppLayerRegisterParser(&parser, alproto); + } + // port 162 + let default_port_traps = CString::new("162").unwrap(); + parser.default_port = default_port_traps.as_ptr(); + let _ = AppLayerRegisterProtocolDetection(&parser, 1); + if AppLayerParserConfParserEnabled(ip_proto_str.as_ptr(), parser.name) != 0 { + let _ = AppLayerRegisterParser(&parser, alproto); + } + } else { + SCLogDebug!("Protocol detector and parser disabled for SNMP."); + } +} |