diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
commit | a0aa2307322cd47bbf416810ac0292925e03be87 (patch) | |
tree | 37076262a026c4b48c8a0e84f44ff9187556ca35 /src/detect-ftpbounce.c | |
parent | Initial commit. (diff) | |
download | suricata-a0aa2307322cd47bbf416810ac0292925e03be87.tar.xz suricata-a0aa2307322cd47bbf416810ac0292925e03be87.zip |
Adding upstream version 1:7.0.3.upstream/1%7.0.3
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/detect-ftpbounce.c')
-rw-r--r-- | src/detect-ftpbounce.c | 235 |
1 files changed, 235 insertions, 0 deletions
diff --git a/src/detect-ftpbounce.c b/src/detect-ftpbounce.c new file mode 100644 index 0000000..318f72c --- /dev/null +++ b/src/detect-ftpbounce.c @@ -0,0 +1,235 @@ +/* Copyright (C) 2007-2010 Open Information Security Foundation + * + * You can copy, redistribute or modify this Program under the terms of + * the GNU General Public License version 2 as published by the Free + * Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * version 2 along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + * 02110-1301, USA. + */ + +/** + * \file + * + * \author Pablo Rincon <pablo.rincon.crespo@gmail.com> + * + * ftpbounce keyword, part of the detection engine. + */ + +#include "suricata-common.h" +#include "decode.h" +#include "detect.h" +#include "detect-parse.h" +#include "detect-engine.h" +#include "detect-engine-mpm.h" +#include "detect-engine-state.h" +#include "detect-content.h" +#include "detect-engine-build.h" + +#include "app-layer.h" +#include "app-layer-parser.h" +#include "app-layer-ftp.h" +#include "util-unittest.h" +#include "util-unittest-helper.h" +#include "util-debug.h" +#include "flow.h" +#include "flow-var.h" +#include "flow-util.h" +#include "threads.h" +#include "detect-ftpbounce.h" +#include "stream-tcp.h" +#include "util-byte.h" + +static int DetectFtpbounceALMatch(DetectEngineThreadCtx *, + Flow *, uint8_t, void *, void *, + const Signature *, const SigMatchCtx *); + +static int DetectFtpbounceSetup(DetectEngineCtx *, Signature *, const char *); +static int g_ftp_request_list_id = 0; + +/** + * \brief Registration function for ftpbounce: keyword + * \todo add support for no_stream and stream_only + */ +void DetectFtpbounceRegister(void) +{ + sigmatch_table[DETECT_FTPBOUNCE].name = "ftpbounce"; + sigmatch_table[DETECT_FTPBOUNCE].desc = "detect FTP bounce attacks"; + sigmatch_table[DETECT_FTPBOUNCE].Setup = DetectFtpbounceSetup; + sigmatch_table[DETECT_FTPBOUNCE].AppLayerTxMatch = DetectFtpbounceALMatch; + sigmatch_table[DETECT_FTPBOUNCE].url = "/rules/ftp-keywords.html#ftpbounce"; + sigmatch_table[DETECT_FTPBOUNCE].flags = SIGMATCH_NOOPT; + + g_ftp_request_list_id = DetectBufferTypeRegister("ftp_request"); + + DetectAppLayerInspectEngineRegister2( + "ftp_request", ALPROTO_FTP, SIG_FLAG_TOSERVER, 0, DetectEngineInspectGenericList, NULL); +} + +/** + * \brief This function is used to match ftpbounce attacks + * + * \param payload Payload of the PORT command + * \param payload_len Length of the payload + * \param ip_orig IP source to check the ftpbounce condition + * \param offset offset to the arguments of the PORT command + * + * \retval 1 if ftpbounce detected, 0 if not + */ +static int DetectFtpbounceMatchArgs( + uint8_t *payload, uint32_t payload_len, uint32_t ip_orig, uint32_t offset) +{ + SCEnter(); + SCLogDebug("Checking ftpbounce condition"); + char *c = NULL; + uint32_t i = 0; + int octet = 0; + int octet_ascii_len = 0; + int noctet = 0; + uint32_t ip = 0; + /* PrintRawDataFp(stdout, payload, payload_len); */ + + if (payload_len < 7) { + /* we need at least a different ip address + * in the format 1,2,3,4,x,y where x,y is the port + * in two byte representation so let's look at + * least for the IP octets in comma separated */ + return 0; + } + + if (offset + 7 >= payload_len) + return 0; + + c =(char*) payload; + if (c == NULL) { + SCLogDebug("No payload to check"); + return 0; + } + + i = offset; + /* Search for the first IP octect(Skips "PORT ") */ + while (i < payload_len && !isdigit((unsigned char)c[i])) i++; + + for (;i < payload_len && octet_ascii_len < 4 ;i++) { + if (isdigit((unsigned char)c[i])) { + octet =(c[i] - '0') + octet * 10; + octet_ascii_len++; + } else { + if (octet > 256) { + SCLogDebug("Octet not in ip format"); + return 0; + } + + if (isspace((unsigned char)c[i])) + while (i < payload_len && isspace((unsigned char)c[i]) ) i++; + + if (i < payload_len && c[i] == ',') { /* we have an octet */ + noctet++; + octet_ascii_len = 0; + ip =(ip << 8) + octet; + octet = 0; + } else { + SCLogDebug("Unrecognized character '%c'", c[i]); + return 0; + } + if (noctet == 4) { + /* Different IP than src, ftp bounce scan */ + ip = SCNtohl(ip); + + if (ip != ip_orig) { + SCLogDebug("Different ip, so Matched ip:%d <-> ip_orig:%d", + ip, ip_orig); + return 1; + } + SCLogDebug("Same ip, so no match here"); + return 0; + } + } + } + SCLogDebug("No match"); + return 0; +} + +/** + * \brief This function is used to check matches from the FTP App Layer Parser + * + * \param t pointer to thread vars + * \param det_ctx pointer to the pattern matcher thread + * \param p pointer to the current packet + * \param m pointer to the sigmatch but we don't use it since ftpbounce + * has no options + * \retval 0 no match + * \retval 1 match + */ +static int DetectFtpbounceALMatch(DetectEngineThreadCtx *det_ctx, + Flow *f, uint8_t flags, + void *state, void *txv, + const Signature *s, const SigMatchCtx *m) +{ + SCEnter(); + + FtpState *ftp_state = (FtpState *)state; + if (ftp_state == NULL) { + SCLogDebug("no ftp state, no match"); + SCReturnInt(0); + } + + int ret = 0; + if (ftp_state->command == FTP_COMMAND_PORT) { + ret = DetectFtpbounceMatchArgs(ftp_state->port_line, + ftp_state->port_line_len, f->src.address.address_un_data32[0], + ftp_state->arg_offset); + } + + SCReturnInt(ret); +} + +/** + * \brief this function is used to add the parsed ftpbounce + * + * \param de_ctx pointer to the Detection Engine Context + * \param s pointer to the Current Signature + * \param m pointer to the Current SigMatch + * \param ftpbouncestr pointer to the user provided ftpbounce options + * currently there are no options. + * + * \retval 0 on Success + * \retval -1 on Failure + */ +int DetectFtpbounceSetup(DetectEngineCtx *de_ctx, Signature *s, const char *ftpbouncestr) +{ + SCEnter(); + + SigMatch *sm = NULL; + + if (DetectSignatureSetAppProto(s, ALPROTO_FTP) != 0) + return -1; + + sm = SigMatchAlloc(); + if (sm == NULL) { + return -1; + } + + sm->type = DETECT_FTPBOUNCE; + + /* We don't need to allocate any data for ftpbounce here. + * + * TODO: As a suggestion, maybe we can add a flag in the flow + * to set the stream as "bounce detected" for fast Match. + * When you do a ftp bounce attack you usually use the same + * communication control stream to "setup" various destinations + * without breaking the connection, so I guess we can make it a bit faster + * with a flow flag set lookup in the Match function. + */ + sm->ctx = NULL; + + SigMatchAppendSMToList(s, sm, g_ftp_request_list_id); + SCReturnInt(0); +} |