diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:39:49 +0000 |
commit | a0aa2307322cd47bbf416810ac0292925e03be87 (patch) | |
tree | 37076262a026c4b48c8a0e84f44ff9187556ca35 /src/detect-parse.c | |
parent | Initial commit. (diff) | |
download | suricata-a0aa2307322cd47bbf416810ac0292925e03be87.tar.xz suricata-a0aa2307322cd47bbf416810ac0292925e03be87.zip |
Adding upstream version 1:7.0.3.upstream/1%7.0.3
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/detect-parse.c')
-rw-r--r-- | src/detect-parse.c | 4568 |
1 files changed, 4568 insertions, 0 deletions
diff --git a/src/detect-parse.c b/src/detect-parse.c new file mode 100644 index 0000000..b5e214d --- /dev/null +++ b/src/detect-parse.c @@ -0,0 +1,4568 @@ +/* Copyright (C) 2007-2021 Open Information Security Foundation + * + * You can copy, redistribute or modify this Program under the terms of + * the GNU General Public License version 2 as published by the Free + * Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * version 2 along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA + * 02110-1301, USA. + */ + +/** + * \file + * + * \author Victor Julien <victor@inliniac.net> + * + * signature parser + */ + +#include "suricata-common.h" + +#include "detect.h" +#include "detect-engine.h" +#include "detect-engine-address.h" +#include "detect-engine-port.h" +#include "detect-engine-mpm.h" +#include "detect-engine-state.h" +#include "detect-engine-build.h" + +#include "detect-content.h" +#include "detect-bsize.h" +#include "detect-pcre.h" +#include "detect-uricontent.h" +#include "detect-reference.h" +#include "detect-ipproto.h" +#include "detect-flow.h" +#include "detect-app-layer-protocol.h" +#include "detect-lua.h" +#include "detect-app-layer-event.h" +#include "detect-http-method.h" + +#include "pkt-var.h" +#include "host.h" +#include "util-profiling.h" +#include "decode.h" + +#include "flow.h" + +#include "util-rule-vars.h" +#include "conf.h" +#include "conf-yaml-loader.h" + +#include "app-layer.h" +#include "app-layer-protos.h" +#include "app-layer-parser.h" +#include "app-layer-htp.h" + +#include "util-classification-config.h" +#include "util-unittest.h" +#include "util-unittest-helper.h" +#include "util-debug.h" +#include "string.h" +#include "detect-parse.h" +#include "detect-engine-iponly.h" +#include "app-layer-detect-proto.h" + +#include "action-globals.h" +#include "util-validate.h" + +/* Table with all filehandler registrations */ +DetectFileHandlerTableElmt filehandler_table[DETECT_TBLSIZE]; + +void DetectFileRegisterFileProtocols(DetectFileHandlerTableElmt *reg) +{ + // file protocols with common file handling + typedef struct { + AppProto al_proto; + int direction; + int to_client_progress; + int to_server_progress; + } DetectFileHandlerProtocol_t; + static DetectFileHandlerProtocol_t al_protocols[] = { + { .al_proto = ALPROTO_NFS, .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT }, + { .al_proto = ALPROTO_SMB, .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT }, + { .al_proto = ALPROTO_FTP, .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT }, + { .al_proto = ALPROTO_FTPDATA, .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT }, + { .al_proto = ALPROTO_HTTP1, + .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT, + .to_client_progress = HTP_RESPONSE_BODY, + .to_server_progress = HTP_REQUEST_BODY }, + { .al_proto = ALPROTO_HTTP2, + .direction = SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT, + .to_client_progress = HTTP2StateDataServer, + .to_server_progress = HTTP2StateDataClient }, + { .al_proto = ALPROTO_SMTP, .direction = SIG_FLAG_TOSERVER } + }; + + for (size_t i = 0; i < ARRAY_SIZE(al_protocols); i++) { + int direction = al_protocols[i].direction == 0 + ? (int)(SIG_FLAG_TOSERVER | SIG_FLAG_TOCLIENT) + : al_protocols[i].direction; + + if (direction & SIG_FLAG_TOCLIENT) { + DetectAppLayerMpmRegister2(reg->name, SIG_FLAG_TOCLIENT, reg->priority, + reg->PrefilterFn, reg->GetData, al_protocols[i].al_proto, + al_protocols[i].to_client_progress); + DetectAppLayerInspectEngineRegister2(reg->name, al_protocols[i].al_proto, + SIG_FLAG_TOCLIENT, al_protocols[i].to_client_progress, reg->Callback, + reg->GetData); + } + if (direction & SIG_FLAG_TOSERVER) { + DetectAppLayerMpmRegister2(reg->name, SIG_FLAG_TOSERVER, reg->priority, + reg->PrefilterFn, reg->GetData, al_protocols[i].al_proto, + al_protocols[i].to_server_progress); + DetectAppLayerInspectEngineRegister2(reg->name, al_protocols[i].al_proto, + SIG_FLAG_TOSERVER, al_protocols[i].to_server_progress, reg->Callback, + reg->GetData); + } + } +} + +/* Table with all SigMatch registrations */ +SigTableElmt sigmatch_table[DETECT_TBLSIZE]; + +extern int sc_set_caps; + +static void SigMatchTransferSigMatchAcrossLists(SigMatch *sm, + SigMatch **src_sm_list, SigMatch **src_sm_list_tail, + SigMatch **dst_sm_list, SigMatch **dst_sm_list_tail); + +/** + * \brief Registration table for file handlers + */ +/** + * \brief We use this as data to the hash table DetectEngineCtx->dup_sig_hash_table. + */ +typedef struct SigDuplWrapper_ { + /* the signature we want to wrap */ + Signature *s; + /* the signature right before the above signature in the det_ctx->sig_list */ + Signature *s_prev; +} SigDuplWrapper; + +#define CONFIG_PARTS 8 + +#define CONFIG_ACTION 0 +#define CONFIG_PROTO 1 +#define CONFIG_SRC 2 +#define CONFIG_SP 3 +#define CONFIG_DIREC 4 +#define CONFIG_DST 5 +#define CONFIG_DP 6 +#define CONFIG_OPTS 7 + +/** helper structure for sig parsing */ +typedef struct SignatureParser_ { + char action[DETECT_MAX_RULE_SIZE]; + char protocol[DETECT_MAX_RULE_SIZE]; + char direction[DETECT_MAX_RULE_SIZE]; + char src[DETECT_MAX_RULE_SIZE]; + char dst[DETECT_MAX_RULE_SIZE]; + char sp[DETECT_MAX_RULE_SIZE]; + char dp[DETECT_MAX_RULE_SIZE]; + char opts[DETECT_MAX_RULE_SIZE]; +} SignatureParser; + +const char *DetectListToHumanString(int list) +{ +#define CASE_CODE_STRING(E, S) case E: return S; break + switch (list) { + CASE_CODE_STRING(DETECT_SM_LIST_MATCH, "packet"); + CASE_CODE_STRING(DETECT_SM_LIST_PMATCH, "payload"); + CASE_CODE_STRING(DETECT_SM_LIST_BASE64_DATA, "base64_data"); + CASE_CODE_STRING(DETECT_SM_LIST_POSTMATCH, "postmatch"); + CASE_CODE_STRING(DETECT_SM_LIST_TMATCH, "tag"); + CASE_CODE_STRING(DETECT_SM_LIST_SUPPRESS, "suppress"); + CASE_CODE_STRING(DETECT_SM_LIST_THRESHOLD, "threshold"); + CASE_CODE_STRING(DETECT_SM_LIST_MAX, "max (internal)"); + } +#undef CASE_CODE_STRING + return "unknown"; +} + +#define CASE_CODE(E) case E: return #E +const char *DetectListToString(int list) +{ + switch (list) { + CASE_CODE(DETECT_SM_LIST_MATCH); + CASE_CODE(DETECT_SM_LIST_PMATCH); + CASE_CODE(DETECT_SM_LIST_BASE64_DATA); + CASE_CODE(DETECT_SM_LIST_TMATCH); + CASE_CODE(DETECT_SM_LIST_POSTMATCH); + CASE_CODE(DETECT_SM_LIST_SUPPRESS); + CASE_CODE(DETECT_SM_LIST_THRESHOLD); + CASE_CODE(DETECT_SM_LIST_MAX); + } + return "unknown"; +} + +/** \param arg NULL or empty string */ +int DetectEngineContentModifierBufferSetup(DetectEngineCtx *de_ctx, + Signature *s, const char *arg, int sm_type, int sm_list, + AppProto alproto) +{ + SigMatch *sm = NULL; + int ret = -1; + + if (arg != NULL && strcmp(arg, "") != 0) { + SCLogError("%s shouldn't be supplied " + "with an argument", + sigmatch_table[sm_type].name); + goto end; + } + + if (s->init_data->list != DETECT_SM_LIST_NOTSET) { + SCLogError("\"%s\" keyword seen " + "with a sticky buffer still set. Reset sticky buffer " + "with pkt_data before using the modifier.", + sigmatch_table[sm_type].name); + goto end; + } + if (s->alproto != ALPROTO_UNKNOWN && !AppProtoEquals(s->alproto, alproto)) { + SCLogError("rule contains conflicting " + "alprotos set"); + goto end; + } + + sm = DetectGetLastSMByListId(s, + DETECT_SM_LIST_PMATCH, DETECT_CONTENT, -1); + if (sm == NULL) { + SCLogError("\"%s\" keyword " + "found inside the rule without a content context. " + "Please use a \"content\" keyword before using the " + "\"%s\" keyword", + sigmatch_table[sm_type].name, sigmatch_table[sm_type].name); + goto end; + } + DetectContentData *cd = (DetectContentData *)sm->ctx; + if (cd->flags & DETECT_CONTENT_RAWBYTES) { + SCLogError("%s rule can not " + "be used with the rawbytes rule keyword", + sigmatch_table[sm_type].name); + goto end; + } + if (cd->flags & DETECT_CONTENT_REPLACE) { + SCLogError("%s rule can not " + "be used with the replace rule keyword", + sigmatch_table[sm_type].name); + goto end; + } + if (cd->flags & (DETECT_CONTENT_WITHIN | DETECT_CONTENT_DISTANCE)) { + SigMatch *pm = DetectGetLastSMByListPtr(s, sm->prev, + DETECT_CONTENT, DETECT_PCRE, -1); + if (pm != NULL) { + if (pm->type == DETECT_CONTENT) { + DetectContentData *tmp_cd = (DetectContentData *)pm->ctx; + tmp_cd->flags &= ~DETECT_CONTENT_RELATIVE_NEXT; + } else { + DetectPcreData *tmp_pd = (DetectPcreData *)pm->ctx; + tmp_pd->flags &= ~DETECT_PCRE_RELATIVE_NEXT; + } + } + + if (s->init_data->curbuf != NULL && (int)s->init_data->curbuf->id == sm_list) { + pm = DetectGetLastSMByListPtr( + s, s->init_data->curbuf->tail, DETECT_CONTENT, DETECT_PCRE, -1); + if (pm != NULL) { + if (pm->type == DETECT_CONTENT) { + DetectContentData *tmp_cd = (DetectContentData *)pm->ctx; + tmp_cd->flags |= DETECT_CONTENT_RELATIVE_NEXT; + } else { + DetectPcreData *tmp_pd = (DetectPcreData *)pm->ctx; + tmp_pd->flags |= DETECT_PCRE_RELATIVE_NEXT; + } + } + } + } + s->alproto = alproto; + s->flags |= SIG_FLAG_APPLAYER; + + if (s->init_data->curbuf == NULL || (int)s->init_data->curbuf->id != sm_list) { + if (s->init_data->curbuf != NULL && s->init_data->curbuf->head == NULL) { + SCLogError("no matches for previous buffer"); + return -1; + } + bool reuse_buffer = false; + if (s->init_data->curbuf != NULL && (int)s->init_data->curbuf->id != sm_list) { + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + if (s->init_data->buffers[x].id == (uint32_t)sm_list) { + s->init_data->curbuf = &s->init_data->buffers[x]; + reuse_buffer = true; + break; + } + } + } + + if (!reuse_buffer) { + if (SignatureInitDataBufferCheckExpand(s) < 0) { + SCLogError("failed to expand rule buffer array"); + return -1; + } + + /* initialize a new buffer */ + s->init_data->curbuf = &s->init_data->buffers[s->init_data->buffer_index++]; + s->init_data->curbuf->id = sm_list; + s->init_data->curbuf->head = NULL; + s->init_data->curbuf->tail = NULL; + SCLogDebug("idx %u list %d set up curbuf %p s->init_data->buffer_index %u", + s->init_data->buffer_index - 1, sm_list, s->init_data->curbuf, + s->init_data->buffer_index); + } + } + + /* transfer the sm from the pmatch list to sm_list */ + SigMatchTransferSigMatchAcrossLists(sm, &s->init_data->smlists[DETECT_SM_LIST_PMATCH], + &s->init_data->smlists_tail[DETECT_SM_LIST_PMATCH], &s->init_data->curbuf->head, + &s->init_data->curbuf->tail); + + if (sm->type == DETECT_CONTENT) { + s->init_data->max_content_list_id = + MAX(s->init_data->max_content_list_id, (uint32_t)sm_list); + } + + ret = 0; + end: + return ret; +} + +SigMatch *SigMatchAlloc(void) +{ + SigMatch *sm = SCMalloc(sizeof(SigMatch)); + if (unlikely(sm == NULL)) + return NULL; + + memset(sm, 0, sizeof(SigMatch)); + sm->prev = NULL; + sm->next = NULL; + return sm; +} + +/** \brief free a SigMatch + * \param sm SigMatch to free. + */ +void SigMatchFree(DetectEngineCtx *de_ctx, SigMatch *sm) +{ + if (sm == NULL) + return; + + /** free the ctx, for that we call the Free func */ + if (sm->ctx != NULL) { + if (sigmatch_table[sm->type].Free != NULL) { + sigmatch_table[sm->type].Free(de_ctx, sm->ctx); + } + } + SCFree(sm); +} + +static enum DetectKeywordId SigTableGetIndex(const SigTableElmt *e) +{ + const SigTableElmt *table = &sigmatch_table[0]; + ptrdiff_t offset = e - table; + BUG_ON(offset >= DETECT_TBLSIZE); + return (enum DetectKeywordId)offset; +} + +/* Get the detection module by name */ +static SigTableElmt *SigTableGet(char *name) +{ + SigTableElmt *st = NULL; + int i = 0; + + for (i = 0; i < DETECT_TBLSIZE; i++) { + st = &sigmatch_table[i]; + + if (st->name != NULL) { + if (strcasecmp(name,st->name) == 0) + return st; + if (st->alias != NULL && strcasecmp(name,st->alias) == 0) + return st; + } + } + + return NULL; +} + +bool SigMatchSilentErrorEnabled(const DetectEngineCtx *de_ctx, + const enum DetectKeywordId id) +{ + return de_ctx->sm_types_silent_error[id]; +} + +bool SigMatchStrictEnabled(const enum DetectKeywordId id) +{ + if (id < DETECT_TBLSIZE) { + return ((sigmatch_table[id].flags & SIGMATCH_STRICT_PARSING) != 0); + } + return false; +} + +void SigTableApplyStrictCommandLineOption(const char *str) +{ + if (str == NULL) { + /* nothing to be done */ + return; + } + + /* "all" just sets the flag for each keyword */ + if (strcmp(str, "all") == 0) { + for (int i = 0; i < DETECT_TBLSIZE; i++) { + SigTableElmt *st = &sigmatch_table[i]; + st->flags |= SIGMATCH_STRICT_PARSING; + } + return; + } + + char *copy = SCStrdup(str); + if (copy == NULL) + FatalError("could not duplicate opt string"); + + char *xsaveptr = NULL; + char *key = strtok_r(copy, ",", &xsaveptr); + while (key != NULL) { + SigTableElmt *st = SigTableGet(key); + if (st != NULL) { + st->flags |= SIGMATCH_STRICT_PARSING; + } else { + SCLogWarning("'strict' command line " + "argument '%s' not found", + key); + } + key = strtok_r(NULL, ",", &xsaveptr); + } + + SCFree(copy); +} + +/** + * \brief Append a SigMatch to the list type. + * + * \param s Signature. + * \param new The sig match to append. + * \param list The list to append to. + */ +void SigMatchAppendSMToList(Signature *s, SigMatch *new, const int list) +{ + if (new->type == DETECT_CONTENT) { + s->init_data->max_content_list_id = MAX(s->init_data->max_content_list_id, (uint32_t)list); + } + + SCLogDebug("s:%p new:%p list:%d: %s, s->init_data->list_set %s s->init_data->list %d", s, new, + list, sigmatch_table[new->type].name, BOOL2STR(s->init_data->list_set), + s->init_data->list); + + if (list < DETECT_SM_LIST_MAX) { + if (s->init_data->smlists[list] == NULL) { + s->init_data->smlists[list] = new; + s->init_data->smlists_tail[list] = new; + new->next = NULL; + new->prev = NULL; + } else { + SigMatch *cur = s->init_data->smlists_tail[list]; + cur->next = new; + new->prev = cur; + new->next = NULL; + s->init_data->smlists_tail[list] = new; + } + new->idx = s->init_data->sm_cnt; + s->init_data->sm_cnt++; + + } else { + /* app-layer-events (and possibly others?) can get here w/o a "list" + * already set up. */ + + /* unset any existing list if it isn't the same as the new */ + if (s->init_data->list != DETECT_SM_LIST_NOTSET && list != s->init_data->list) { + SCLogDebug("reset: list %d != s->init_data->list %d", list, s->init_data->list); + s->init_data->list = DETECT_SM_LIST_NOTSET; + } + + if (s->init_data->curbuf != NULL && (int)s->init_data->curbuf->id != list) { + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + if (s->init_data->buffers[x].id == (uint32_t)list && + !s->init_data->buffers[x].multi_capable) { + SCLogDebug("reusing buffer %u as it isn't multi-capable", x); + s->init_data->curbuf = &s->init_data->buffers[x]; + break; + } + } + } + + if ((s->init_data->curbuf != NULL && (int)s->init_data->curbuf->id != list) || + s->init_data->curbuf == NULL) { + if (SignatureInitDataBufferCheckExpand(s) < 0) { + SCLogError("failed to expand rule buffer array"); + s->init_data->init_flags |= SIG_FLAG_INIT_OVERFLOW; + // SignatureInitDataBufferCheckExpand should not fail in this case + DEBUG_VALIDATE_BUG_ON(s->init_data->curbuf == NULL); + // keep curbuf even with wrong id as we error on this signature + } else { + /* initialize new buffer */ + s->init_data->curbuf = &s->init_data->buffers[s->init_data->buffer_index++]; + s->init_data->curbuf->id = list; + /* buffer set up by sigmatch is tracked in case we add a stickybuffer for the + * same list. */ + s->init_data->curbuf->sm_init = true; + SCLogDebug("s->init_data->buffer_index %u", s->init_data->buffer_index); + } + } + BUG_ON(s->init_data->curbuf == NULL); + + new->prev = s->init_data->curbuf->tail; + if (s->init_data->curbuf->tail) + s->init_data->curbuf->tail->next = new; + if (s->init_data->curbuf->head == NULL) + s->init_data->curbuf->head = new; + s->init_data->curbuf->tail = new; + new->idx = s->init_data->sm_cnt; + s->init_data->sm_cnt++; + SCLogDebug("appended %s to list %d, rule pos %u (s->init_data->list %d)", + sigmatch_table[new->type].name, list, new->idx, s->init_data->list); + + for (SigMatch *sm = s->init_data->curbuf->head; sm != NULL; sm = sm->next) { + SCLogDebug("buf:%p: id:%u: '%s' pos %u", s->init_data->curbuf, s->init_data->curbuf->id, + sigmatch_table[sm->type].name, sm->idx); + } + } +} + +void SigMatchRemoveSMFromList(Signature *s, SigMatch *sm, int sm_list) +{ + if (sm == s->init_data->smlists[sm_list]) { + s->init_data->smlists[sm_list] = sm->next; + } + if (sm == s->init_data->smlists_tail[sm_list]) { + s->init_data->smlists_tail[sm_list] = sm->prev; + } + if (sm->prev != NULL) + sm->prev->next = sm->next; + if (sm->next != NULL) + sm->next->prev = sm->prev; + + return; +} + +/** + * \brief Returns a pointer to the last SigMatch instance of a particular type + * in a Signature of the payload list. + * + * \param s Pointer to the tail of the sigmatch list + * \param type SigMatch type which has to be searched for in the Signature. + * + * \retval match Pointer to the last SigMatch instance of type 'type'. + */ +static SigMatch *SigMatchGetLastSMByType(SigMatch *sm, int type) +{ + while (sm != NULL) { + if (sm->type == type) { + return sm; + } + sm = sm->prev; + } + + return NULL; +} + +/** \brief get the last SigMatch from lists that support + * MPM. + * \note only supports the lists that are registered through + * DetectBufferTypeSupportsMpm(). + */ +SigMatch *DetectGetLastSMFromMpmLists(const DetectEngineCtx *de_ctx, const Signature *s) +{ + SigMatch *sm_last = NULL; + SigMatch *sm_new; + uint32_t sm_type; + + for (uint32_t i = 0; i < s->init_data->buffer_index; i++) { + const int id = s->init_data->buffers[i].id; + if (DetectEngineBufferTypeSupportsMpmGetById(de_ctx, id)) { + sm_new = DetectGetLastSMByListPtr(s, s->init_data->buffers[i].tail, DETECT_CONTENT, -1); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + } + /* otherwise brute force it */ + for (sm_type = 0; sm_type < DETECT_SM_LIST_MAX; sm_type++) { + if (!DetectEngineBufferTypeSupportsMpmGetById(de_ctx, sm_type)) + continue; + SigMatch *sm_list = s->init_data->smlists_tail[sm_type]; + sm_new = SigMatchGetLastSMByType(sm_list, DETECT_CONTENT); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + return sm_last; +} + +/** + * \brief Returns the sm with the largest index (added latest) from the lists + * passed to us. + * + * \retval Pointer to Last sm. + */ +SigMatch *DetectGetLastSMFromLists(const Signature *s, ...) +{ + SigMatch *sm_last = NULL; + SigMatch *sm_new; + + SCLogDebug("s->init_data->buffer_index %u", s->init_data->buffer_index); + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + if (s->init_data->list != DETECT_SM_LIST_NOTSET && + s->init_data->list != (int)s->init_data->buffers[x].id) { + SCLogDebug("skip x %u s->init_data->list %d (int)s->init_data->buffers[x].id %d", x, + s->init_data->list, (int)s->init_data->buffers[x].id); + + continue; + } + int sm_type; + va_list ap; + va_start(ap, s); + + for (sm_type = va_arg(ap, int); sm_type != -1; sm_type = va_arg(ap, int)) { + sm_new = SigMatchGetLastSMByType(s->init_data->buffers[x].tail, sm_type); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + va_end(ap); + } + + for (int buf_type = 0; buf_type < DETECT_SM_LIST_MAX; buf_type++) { + if (s->init_data->smlists[buf_type] == NULL) + continue; + if (s->init_data->list != DETECT_SM_LIST_NOTSET && + buf_type != s->init_data->list) + continue; + + int sm_type; + va_list ap; + va_start(ap, s); + + for (sm_type = va_arg(ap, int); sm_type != -1; sm_type = va_arg(ap, int)) + { + sm_new = SigMatchGetLastSMByType(s->init_data->smlists_tail[buf_type], sm_type); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + va_end(ap); + } + + return sm_last; +} + +/** + * \brief Returns the sm with the largest index (added last) from the list + * passed to us as a pointer. + * + * \param sm_list pointer to the SigMatch we should look before + * \param va_args list of keyword types terminated by -1 + * + * \retval sm_last to last sm. + */ +SigMatch *DetectGetLastSMByListPtr(const Signature *s, SigMatch *sm_list, ...) +{ + SigMatch *sm_last = NULL; + SigMatch *sm_new; + int sm_type; + + va_list ap; + va_start(ap, sm_list); + + for (sm_type = va_arg(ap, int); sm_type != -1; sm_type = va_arg(ap, int)) + { + sm_new = SigMatchGetLastSMByType(sm_list, sm_type); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + va_end(ap); + + return sm_last; +} + +/** + * \brief Returns the sm with the largest index (added last) from the list + * passed to us as an id. + * + * \param list_id id of the list to be searched + * \param va_args list of keyword types terminated by -1 + * + * \retval sm_last to last sm. + */ +SigMatch *DetectGetLastSMByListId(const Signature *s, int list_id, ...) +{ + SigMatch *sm_last = NULL; + SigMatch *sm_new; + int sm_type; + + if ((uint32_t)list_id >= DETECT_SM_LIST_MAX) { + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + sm_new = s->init_data->buffers[x].tail; + if (sm_new == NULL) + continue; + + va_list ap; + va_start(ap, list_id); + + for (sm_type = va_arg(ap, int); sm_type != -1; sm_type = va_arg(ap, int)) { + sm_new = SigMatchGetLastSMByType(s->init_data->buffers[x].tail, sm_type); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + va_end(ap); + } + } else { + SigMatch *sm_list = s->init_data->smlists_tail[list_id]; + if (sm_list == NULL) + return NULL; + + va_list ap; + va_start(ap, list_id); + + for (sm_type = va_arg(ap, int); sm_type != -1; sm_type = va_arg(ap, int)) { + sm_new = SigMatchGetLastSMByType(sm_list, sm_type); + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + va_end(ap); + } + return sm_last; +} + +/** + * \brief Returns the sm with the largest index (added latest) from this sig + * + * \retval sm_last Pointer to last sm + */ +SigMatch *DetectGetLastSM(const Signature *s) +{ + SigMatch *sm_last = NULL; + SigMatch *sm_new; + + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + sm_new = s->init_data->buffers[x].tail; + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + for (int i = 0; i < DETECT_SM_LIST_MAX; i++) { + sm_new = s->init_data->smlists_tail[i]; + if (sm_new == NULL) + continue; + if (sm_last == NULL || sm_new->idx > sm_last->idx) + sm_last = sm_new; + } + + return sm_last; +} + +static void SigMatchTransferSigMatchAcrossLists(SigMatch *sm, + SigMatch **src_sm_list, SigMatch **src_sm_list_tail, + SigMatch **dst_sm_list, SigMatch **dst_sm_list_tail) +{ + /* we won't do any checks for args */ + + if (sm->prev != NULL) + sm->prev->next = sm->next; + if (sm->next != NULL) + sm->next->prev = sm->prev; + + if (sm == *src_sm_list) + *src_sm_list = sm->next; + if (sm == *src_sm_list_tail) + *src_sm_list_tail = sm->prev; + + if (*dst_sm_list == NULL) { + *dst_sm_list = sm; + *dst_sm_list_tail = sm; + sm->next = NULL; + sm->prev = NULL; + } else { + SigMatch *cur = *dst_sm_list_tail; + cur->next = sm; + sm->prev = cur; + sm->next = NULL; + *dst_sm_list_tail = sm; + } + + return; +} + +int SigMatchListSMBelongsTo(const Signature *s, const SigMatch *key_sm) +{ + if (key_sm == NULL) + return -1; + + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + const SigMatch *sm = s->init_data->buffers[x].head; + while (sm != NULL) { + if (sm == key_sm) + return s->init_data->buffers[x].id; + sm = sm->next; + } + } + + for (int list = 0; list < DETECT_SM_LIST_MAX; list++) { + const SigMatch *sm = s->init_data->smlists[list]; + while (sm != NULL) { + if (sm == key_sm) + return list; + sm = sm->next; + } + } + + SCLogError("Unable to find the sm in any of the " + "sm lists"); + return -1; +} + +static int SigParseOptions(DetectEngineCtx *de_ctx, Signature *s, char *optstr, char *output, + size_t output_size, bool requires) +{ + SigTableElmt *st = NULL; + char *optname = NULL; + char *optvalue = NULL; + + /* Trim leading space. */ + while (isblank(*optstr)) { + optstr++; + } + + /* Look for the end of this option, handling escaped semicolons. */ + char *optend = optstr; + for (;;) { + optend = strchr(optend, ';'); + if (optend == NULL) { + SCLogError("no terminating \";\" found"); + goto error; + } + else if (optend > optstr && *(optend -1 ) == '\\') { + optend++; + } else { + break; + } + } + *(optend++) = '\0'; + + /* Find the start of the option value. */ + char *optvalptr = strchr(optstr, ':'); + if (optvalptr) { + *(optvalptr++) = '\0'; + + /* Trim trailing space from name. */ + for (size_t i = strlen(optvalptr); i > 0; i--) { + if (isblank(optvalptr[i - 1])) { + optvalptr[i - 1] = '\0'; + } else { + break; + } + } + + optvalue = optvalptr; + } + + /* Trim trailing space from name. */ + for (size_t i = strlen(optstr); i > 0; i--) { + if (isblank(optstr[i - 1])) { + optstr[i - 1] = '\0'; + } else { + break; + } + } + optname = optstr; + + /* Check for options that are only to be processed during the + * first "requires" pass. */ + bool requires_only = strcasecmp(optname, "requires") == 0 || strcasecmp(optname, "sid") == 0; + if ((requires && !requires_only) || (!requires && requires_only)) { + goto finish; + } + + /* Call option parsing */ + st = SigTableGet(optname); + if (st == NULL || st->Setup == NULL) { + SCLogError("unknown rule keyword '%s'.", optname); + goto error; + } + + if (!(st->flags & (SIGMATCH_NOOPT|SIGMATCH_OPTIONAL_OPT))) { + if (optvalue == NULL || strlen(optvalue) == 0) { + SCLogError( + "invalid formatting or malformed option to %s keyword: '%s'", optname, optstr); + goto error; + } + } else if (st->flags & SIGMATCH_NOOPT) { + if (optvalue && strlen(optvalue)) { + SCLogError("unexpected option to %s keyword: '%s'", optname, optstr); + goto error; + } + } + s->init_data->negated = false; + + if (st->flags & SIGMATCH_INFO_DEPRECATED) { +#define URL "https://suricata.io/our-story/deprecation-policy/" + if (st->alternative == 0) + SCLogWarning("keyword '%s' is deprecated " + "and will be removed soon. See %s", + st->name, URL); + else + SCLogWarning("keyword '%s' is deprecated " + "and will be removed soon. Use '%s' instead. " + "See %s", + st->name, sigmatch_table[st->alternative].name, URL); +#undef URL + } + + int setup_ret = 0; + + /* Validate double quoting, trimming trailing white space along the way. */ + if (optvalue != NULL && strlen(optvalue) > 0) { + size_t ovlen = strlen(optvalue); + char *ptr = optvalue; + + /* skip leading whitespace */ + while (ovlen > 0) { + if (!isblank(*ptr)) + break; + ptr++; + ovlen--; + } + if (ovlen == 0) { + SCLogError("invalid formatting or malformed option to %s keyword: \'%s\'", optname, + optstr); + goto error; + } + + /* see if value is negated */ + if ((st->flags & SIGMATCH_HANDLE_NEGATION) && *ptr == '!') { + s->init_data->negated = true; + ptr++; + ovlen--; + } + /* skip more whitespace */ + while (ovlen > 0) { + if (!isblank(*ptr)) + break; + ptr++; + ovlen--; + } + if (ovlen == 0) { + SCLogError("invalid formatting or malformed option to %s keyword: \'%s\'", optname, + optstr); + goto error; + } + /* if quoting is mandatory, enforce it */ + if (st->flags & SIGMATCH_QUOTES_MANDATORY && ovlen && *ptr != '"') { + SCLogError("invalid formatting to %s keyword: " + "value must be double quoted \'%s\'", + optname, optstr); + goto error; + } + + if ((st->flags & (SIGMATCH_QUOTES_OPTIONAL|SIGMATCH_QUOTES_MANDATORY)) + && ovlen && *ptr == '"') + { + for (; ovlen > 0; ovlen--) { + if (isblank(ptr[ovlen - 1])) { + ptr[ovlen - 1] = '\0'; + } else { + break; + } + } + if (ovlen && ptr[ovlen - 1] != '"') { + SCLogError("bad option value formatting (possible missing semicolon) " + "for keyword %s: \'%s\'", + optname, optvalue); + goto error; + } + if (ovlen > 1) { + /* strip leading " */ + ptr++; + ovlen--; + ptr[ovlen - 1] = '\0'; + ovlen--; + } + if (ovlen == 0) { + SCLogError("bad input " + "for keyword %s: \'%s\'", + optname, optvalue); + goto error; + } + } else { + if (*ptr == '"') { + SCLogError( + "quotes on %s keyword that doesn't support them: \'%s\'", optname, optstr); + goto error; + } + } + /* setup may or may not add a new SigMatch to the list */ + setup_ret = st->Setup(de_ctx, s, ptr); + } else { + /* setup may or may not add a new SigMatch to the list */ + setup_ret = st->Setup(de_ctx, s, NULL); + } + if (setup_ret < 0 || (s->init_data->init_flags & SIG_FLAG_INIT_OVERFLOW)) { + SCLogDebug("\"%s\" failed to setup", st->name); + if (s->init_data->init_flags & SIG_FLAG_INIT_OVERFLOW) { + SCLogError("rule %u tries to use too many buffers", s->id); + } + + /* handle 'silent' error case */ + if (setup_ret == -2) { + enum DetectKeywordId idx = SigTableGetIndex(st); + if (de_ctx->sm_types_silent_error[idx] == false) { + de_ctx->sm_types_silent_error[idx] = true; + return -1; + } + return -2; + } + return setup_ret; + } + s->init_data->negated = false; + +finish: + if (strlen(optend) > 0) { + strlcpy(output, optend, output_size); + return 1; + } + + return 0; + +error: + return -1; +} + +/** \brief Parse address string and update signature + * + * \retval 0 ok, -1 error + */ +static int SigParseAddress(DetectEngineCtx *de_ctx, + Signature *s, const char *addrstr, char flag) +{ + SCLogDebug("Address Group \"%s\" to be parsed now", addrstr); + + /* pass on to the address(list) parser */ + if (flag == 0) { + if (strcasecmp(addrstr, "any") == 0) + s->flags |= SIG_FLAG_SRC_ANY; + + s->init_data->src = DetectParseAddress(de_ctx, addrstr, + &s->init_data->src_contains_negation); + if (s->init_data->src == NULL) + goto error; + } else { + if (strcasecmp(addrstr, "any") == 0) + s->flags |= SIG_FLAG_DST_ANY; + + s->init_data->dst = DetectParseAddress(de_ctx, addrstr, + &s->init_data->dst_contains_negation); + if (s->init_data->dst == NULL) + goto error; + } + + return 0; + +error: + return -1; +} + +/** + * \brief Parses the protocol supplied by the Signature. + * + * http://www.iana.org/assignments/protocol-numbers + * + * \param s Pointer to the Signature instance to which the parsed + * protocol has to be added. + * \param protostr Pointer to the character string containing the protocol name. + * + * \retval 0 On successfully parsing the protocol sent as the argument. + * \retval -1 On failure + */ +static int SigParseProto(Signature *s, const char *protostr) +{ + SCEnter(); + + int r = DetectProtoParse(&s->proto, (char *)protostr); + if (r < 0) { + s->alproto = AppLayerGetProtoByName((char *)protostr); + /* indicate that the signature is app-layer */ + if (s->alproto != ALPROTO_UNKNOWN) { + s->flags |= SIG_FLAG_APPLAYER; + + AppLayerProtoDetectSupportedIpprotos(s->alproto, s->proto.proto); + } + else { + SCLogError("protocol \"%s\" cannot be used " + "in a signature. Either detection for this protocol " + "is not yet supported OR detection has been disabled for " + "protocol through the yaml option " + "app-layer.protocols.%s.detection-enabled", + protostr, protostr); + SCReturnInt(-1); + } + } + + /* if any of these flags are set they are set in a mutually exclusive + * manner */ + if (s->proto.flags & DETECT_PROTO_ONLY_PKT) { + s->flags |= SIG_FLAG_REQUIRE_PACKET; + } else if (s->proto.flags & DETECT_PROTO_ONLY_STREAM) { + s->flags |= SIG_FLAG_REQUIRE_STREAM; + } + + SCReturnInt(0); +} + +/** + * \brief Parses the port(source or destination) field, from a Signature. + * + * \param s Pointer to the signature which has to be updated with the + * port information. + * \param portstr Pointer to the character string containing the port info. + * \param Flag which indicates if the portstr received is src or dst + * port. For src port: flag = 0, dst port: flag = 1. + * + * \retval 0 On success. + * \retval -1 On failure. + */ +static int SigParsePort(const DetectEngineCtx *de_ctx, + Signature *s, const char *portstr, char flag) +{ + int r = 0; + + /* XXX VJ exclude handling this for none UDP/TCP proto's */ + + SCLogDebug("Port group \"%s\" to be parsed", portstr); + + if (flag == 0) { + if (strcasecmp(portstr, "any") == 0) + s->flags |= SIG_FLAG_SP_ANY; + + r = DetectPortParse(de_ctx, &s->sp, (char *)portstr); + } else if (flag == 1) { + if (strcasecmp(portstr, "any") == 0) + s->flags |= SIG_FLAG_DP_ANY; + + r = DetectPortParse(de_ctx, &s->dp, (char *)portstr); + } + + if (r < 0) + return -1; + + return 0; +} + +/** \retval 1 valid + * \retval 0 invalid + */ +static int SigParseActionRejectValidate(const char *action) +{ +#ifdef HAVE_LIBNET11 +#if defined HAVE_LIBCAP_NG && !defined HAVE_LIBNET_CAPABILITIES + if (sc_set_caps == TRUE) { + SCLogError("Libnet 1.1 is " + "incompatible with POSIX based capabilities with privs dropping. " + "For rejects to work, run as root/super user."); + return 0; + } +#endif +#else /* no libnet 1.1 */ + SCLogError("Libnet 1.1.x is " + "required for action \"%s\" but is not compiled into Suricata", + action); + return 0; +#endif + return 1; +} + +/** + * \brief Parses the action that has been used by the Signature and allots it + * to its Signature instance. + * + * \param s Pointer to the Signature instance to which the action belongs. + * \param action Pointer to the action string used by the Signature. + * + * \retval 0 On successfully parsing the action string and adding it to the + * Signature. + * \retval -1 On failure. + */ +static int SigParseAction(Signature *s, const char *action) +{ + if (strcasecmp(action, "alert") == 0) { + s->action = ACTION_ALERT; + } else if (strcasecmp(action, "drop") == 0) { + s->action = ACTION_DROP; + } else if (strcasecmp(action, "pass") == 0) { + s->action = ACTION_PASS; + } else if (strcasecmp(action, "reject") == 0 || + strcasecmp(action, "rejectsrc") == 0) + { + if (!(SigParseActionRejectValidate(action))) + return -1; + s->action = ACTION_REJECT|ACTION_DROP; + } else if (strcasecmp(action, "rejectdst") == 0) { + if (!(SigParseActionRejectValidate(action))) + return -1; + s->action = ACTION_REJECT_DST|ACTION_DROP; + } else if (strcasecmp(action, "rejectboth") == 0) { + if (!(SigParseActionRejectValidate(action))) + return -1; + s->action = ACTION_REJECT_BOTH|ACTION_DROP; + } else if (strcasecmp(action, "config") == 0) { + s->action = ACTION_CONFIG; + s->flags |= SIG_FLAG_NOALERT; + } else { + SCLogError("An invalid action \"%s\" was given", action); + return -1; + } + return 0; +} + +/** + * \brief Parse the next token in rule. + * + * For rule parsing a token is considered to be a string of characters + * separated by white space. + * + * \param input double pointer to input buffer, will be advanced as input is + * parsed. + * \param output buffer to copy token into. + * \param output_size length of output buffer. + */ +static inline int SigParseToken(char **input, char *output, + const size_t output_size) +{ + size_t len = *input == NULL ? 0 : strlen(*input); + + if (!len) { + return 0; + } + + while (len && isblank(**input)) { + (*input)++; + len--; + } + + char *endptr = strpbrk(*input, " \t\n\r"); + if (endptr != NULL) { + *(endptr++) = '\0'; + } + strlcpy(output, *input, output_size); + *input = endptr; + + return 1; +} + +/** + * \brief Parse the next rule "list" token. + * + * Parses rule tokens that may be lists such as addresses and ports + * handling the case when they may not be lists. + * + * \param input double pointer to input buffer, will be advanced as input is + * parsed. + * \param output buffer to copy token into. + * \param output_size length of output buffer. + */ +static inline int SigParseList(char **input, char *output, + const size_t output_size) +{ + int in_list = 0; + size_t len = *input != NULL ? strlen(*input) : 0; + + if (len == 0) { + return 0; + } + + while (len && isblank(**input)) { + (*input)++; + len--; + } + + size_t i = 0; + for (i = 0; i < len; i++) { + char c = (*input)[i]; + if (c == '[') { + in_list++; + } else if (c == ']') { + in_list--; + } else if (c == ' ') { + if (!in_list) { + break; + } + } + } + if (i == len) { + *input = NULL; + return 0; + } + (*input)[i] = '\0'; + strlcpy(output, *input, output_size); + *input = *input + i + 1; + + return 1; +} + +/** + * \internal + * \brief split a signature string into a few blocks for further parsing + * + * \param scan_only just scan, don't validate + */ +static int SigParseBasics(DetectEngineCtx *de_ctx, Signature *s, const char *sigstr, + SignatureParser *parser, uint8_t addrs_direction, bool scan_only) +{ + char *index, dup[DETECT_MAX_RULE_SIZE]; + + strlcpy(dup, sigstr, DETECT_MAX_RULE_SIZE); + index = dup; + + /* Action. */ + SigParseToken(&index, parser->action, sizeof(parser->action)); + + /* Protocol. */ + SigParseList(&index, parser->protocol, sizeof(parser->protocol)); + + /* Source. */ + SigParseList(&index, parser->src, sizeof(parser->src)); + + /* Source port(s). */ + SigParseList(&index, parser->sp, sizeof(parser->sp)); + + /* Direction. */ + SigParseToken(&index, parser->direction, sizeof(parser->direction)); + + /* Destination. */ + SigParseList(&index, parser->dst, sizeof(parser->dst)); + + /* Destination port(s). */ + SigParseList(&index, parser->dp, sizeof(parser->dp)); + + /* Options. */ + if (index == NULL) { + SCLogError("no rule options."); + goto error; + } + while (isspace(*index) || *index == '(') { + index++; + } + for (size_t i = strlen(index); i > 0; i--) { + if (isspace(index[i - 1]) || index[i - 1] == ')') { + index[i - 1] = '\0'; + } else { + break; + } + } + strlcpy(parser->opts, index, sizeof(parser->opts)); + + if (scan_only) { + return 0; + } + + /* Parse Action */ + if (SigParseAction(s, parser->action) < 0) + goto error; + + if (SigParseProto(s, parser->protocol) < 0) + goto error; + + if (strcmp(parser->direction, "<>") == 0) { + s->init_data->init_flags |= SIG_FLAG_INIT_BIDIREC; + } else if (strcmp(parser->direction, "->") != 0) { + SCLogError("\"%s\" is not a valid direction modifier, " + "\"->\" and \"<>\" are supported.", + parser->direction); + goto error; + } + + /* Parse Address & Ports */ + if (SigParseAddress(de_ctx, s, parser->src, SIG_DIREC_SRC ^ addrs_direction) < 0) + goto error; + + if (SigParseAddress(de_ctx, s, parser->dst, SIG_DIREC_DST ^ addrs_direction) < 0) + goto error; + + /* By AWS - Traditionally we should be doing this only for tcp/udp/sctp, + * but we do it for regardless of ip proto, since the dns/dnstcp/dnsudp + * changes that we made sees to it that at this point of time we don't + * set the ip proto for the sig. We do it a bit later. */ + if (SigParsePort(de_ctx, s, parser->sp, SIG_DIREC_SRC ^ addrs_direction) < 0) + goto error; + if (SigParsePort(de_ctx, s, parser->dp, SIG_DIREC_DST ^ addrs_direction) < 0) + goto error; + + return 0; + +error: + return -1; +} + +static inline bool CheckAscii(const char *str) +{ + for (size_t i = 0; i < strlen(str); i++) { + if (str[i] < 0x20) { + // LF CR TAB + if (str[i] == 0x0a || str[i] == 0x0d || str[i] == 0x09) { + continue; + } + return false; + } else if (str[i] == 0x7f) { + return false; + } + } + return true; +} + +/** + * \brief parse a signature + * + * \param de_ctx detection engine ctx to add it to + * \param s memory structure to store the signature in + * \param sigstr the raw signature as a null terminated string + * \param addrs_direction direction (for bi-directional sigs) + * \param require only scan rule for requires + * + * \param -1 parse error + * \param 0 ok + */ +static int SigParse(DetectEngineCtx *de_ctx, Signature *s, const char *sigstr, + uint8_t addrs_direction, SignatureParser *parser, bool requires) +{ + SCEnter(); + + if (!rs_check_utf8(sigstr)) { + SCLogError("rule is not valid UTF-8"); + SCReturnInt(-1); + } + + if (!CheckAscii(sigstr)) { + SCLogError("rule contains invalid (control) characters"); + SCReturnInt(-1); + } + + int ret = SigParseBasics(de_ctx, s, sigstr, parser, addrs_direction, requires); + if (ret < 0) { + SCLogDebug("SigParseBasics failed"); + SCReturnInt(-1); + } + + /* we can have no options, so make sure we have them */ + if (strlen(parser->opts) > 0) { + size_t buffer_size = strlen(parser->opts) + 1; + char input[buffer_size]; + char output[buffer_size]; + memset(input, 0x00, buffer_size); + memcpy(input, parser->opts, strlen(parser->opts) + 1); + + /* loop the option parsing. Each run processes one option + * and returns the rest of the option string through the + * output variable. */ + do { + memset(output, 0x00, buffer_size); + ret = SigParseOptions(de_ctx, s, input, output, buffer_size, requires); + if (ret == 1) { + memcpy(input, output, buffer_size); + } + + } while (ret == 1); + + if (ret < 0) { + /* Suricata didn't meet the rule requirements, skip. */ + goto end; + } + } + +end: + DetectIPProtoRemoveAllSMs(de_ctx, s); + + SCReturnInt(ret); +} + +/** \brief check if buffers array still has space left, expand if not + */ +int SignatureInitDataBufferCheckExpand(Signature *s) +{ + if (s->init_data->buffers_size >= 64) + return -1; + + if (s->init_data->buffer_index + 1 == s->init_data->buffers_size) { + void *ptr = SCRealloc(s->init_data->buffers, + (s->init_data->buffers_size + 8) * sizeof(SignatureInitDataBuffer)); + if (ptr == NULL) + return -1; + s->init_data->buffers = ptr; + for (uint32_t x = s->init_data->buffers_size; x < s->init_data->buffers_size + 8; x++) { + SignatureInitDataBuffer *b = &s->init_data->buffers[x]; + memset(b, 0, sizeof(*b)); + } + s->init_data->buffers_size += 8; + } + return 0; +} + +Signature *SigAlloc (void) +{ + Signature *sig = SCMalloc(sizeof(Signature)); + if (unlikely(sig == NULL)) + return NULL; + memset(sig, 0, sizeof(Signature)); + + sig->init_data = SCCalloc(1, sizeof(SignatureInitData)); + if (sig->init_data == NULL) { + SCFree(sig); + return NULL; + } + sig->init_data->mpm_sm_list = -1; + + sig->init_data->buffers = SCCalloc(8, sizeof(SignatureInitDataBuffer)); + if (sig->init_data->buffers == NULL) { + SCFree(sig); + return NULL; + } + sig->init_data->buffers_size = 8; + + /* assign it to -1, so that we can later check if the value has been + * overwritten after the Signature has been parsed, and if it hasn't been + * overwritten, we can then assign the default value of 3 */ + sig->prio = -1; + + sig->init_data->list = DETECT_SM_LIST_NOTSET; + return sig; +} + +/** + * \internal + * \brief Free Metadata list + * + * \param s Pointer to the signature + */ +static void SigMetadataFree(Signature *s) +{ + SCEnter(); + + DetectMetadata *mdata = NULL; + DetectMetadata *next_mdata = NULL; + + if (s == NULL || s->metadata == NULL) { + SCReturn; + } + + SCLogDebug("s %p, s->metadata %p", s, s->metadata); + + for (mdata = s->metadata->list; mdata != NULL;) { + next_mdata = mdata->next; + DetectMetadataFree(mdata); + mdata = next_mdata; + } + SCFree(s->metadata->json_str); + SCFree(s->metadata); + s->metadata = NULL; + + SCReturn; +} + +/** + * \internal + * \brief Free Reference list + * + * \param s Pointer to the signature + */ +static void SigRefFree (Signature *s) +{ + SCEnter(); + + DetectReference *ref = NULL; + DetectReference *next_ref = NULL; + + if (s == NULL) { + SCReturn; + } + + SCLogDebug("s %p, s->references %p", s, s->references); + + for (ref = s->references; ref != NULL;) { + next_ref = ref->next; + DetectReferenceFree(ref); + ref = next_ref; + } + + s->references = NULL; + + SCReturn; +} + +static void SigMatchFreeArrays(DetectEngineCtx *de_ctx, Signature *s, int ctxs) +{ + if (s != NULL) { + int type; + for (type = 0; type < DETECT_SM_LIST_MAX; type++) { + if (s->sm_arrays[type] != NULL) { + if (ctxs) { + SigMatchData *smd = s->sm_arrays[type]; + while(1) { + if (sigmatch_table[smd->type].Free != NULL) { + sigmatch_table[smd->type].Free(de_ctx, smd->ctx); + } + if (smd->is_last) + break; + smd++; + } + } + + SCFree(s->sm_arrays[type]); + } + } + } +} + +void SigFree(DetectEngineCtx *de_ctx, Signature *s) +{ + if (s == NULL) + return; + + if (s->cidr_dst != NULL) + IPOnlyCIDRListFree(s->cidr_dst); + + if (s->cidr_src != NULL) + IPOnlyCIDRListFree(s->cidr_src); + + int i; + + if (s->init_data && s->init_data->transforms.cnt) { + for(i = 0; i < s->init_data->transforms.cnt; i++) { + if (s->init_data->transforms.transforms[i].options) { + int transform = s->init_data->transforms.transforms[i].transform; + sigmatch_table[transform].Free( + de_ctx, s->init_data->transforms.transforms[i].options); + s->init_data->transforms.transforms[i].options = NULL; + } + } + } + if (s->init_data) { + for (i = 0; i < DETECT_SM_LIST_MAX; i++) { + SigMatch *sm = s->init_data->smlists[i]; + while (sm != NULL) { + SigMatch *nsm = sm->next; + SigMatchFree(de_ctx, sm); + sm = nsm; + } + } + + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + SigMatch *sm = s->init_data->buffers[x].head; + while (sm != NULL) { + SigMatch *nsm = sm->next; + SigMatchFree(de_ctx, sm); + sm = nsm; + } + } + SCFree(s->init_data->buffers); + s->init_data->buffers = NULL; + } + SigMatchFreeArrays(de_ctx, s, (s->init_data == NULL)); + if (s->init_data) { + SCFree(s->init_data); + s->init_data = NULL; + } + + if (s->sp != NULL) { + DetectPortCleanupList(NULL, s->sp); + } + if (s->dp != NULL) { + DetectPortCleanupList(NULL, s->dp); + } + + if (s->msg != NULL) + SCFree(s->msg); + + if (s->addr_src_match4 != NULL) { + SCFree(s->addr_src_match4); + } + if (s->addr_dst_match4 != NULL) { + SCFree(s->addr_dst_match4); + } + if (s->addr_src_match6 != NULL) { + SCFree(s->addr_src_match6); + } + if (s->addr_dst_match6 != NULL) { + SCFree(s->addr_dst_match6); + } + if (s->sig_str != NULL) { + SCFree(s->sig_str); + } + + SigRefFree(s); + SigMetadataFree(s); + + DetectEngineAppInspectionEngineSignatureFree(de_ctx, s); + + SCFree(s); +} + +int DetectSignatureAddTransform(Signature *s, int transform, void *options) +{ + /* we only support buffers */ + if (s->init_data->list == 0) { + SCReturnInt(-1); + } + if (!s->init_data->list_set) { + SCLogError("transforms must directly follow stickybuffers"); + SCReturnInt(-1); + } + if (s->init_data->transforms.cnt >= DETECT_TRANSFORMS_MAX) { + SCReturnInt(-1); + } + + s->init_data->transforms.transforms[s->init_data->transforms.cnt].transform = transform; + s->init_data->transforms.transforms[s->init_data->transforms.cnt].options = options; + + s->init_data->transforms.cnt++; + SCLogDebug("Added transform #%d [%s]", + s->init_data->transforms.cnt, + s->sig_str); + + SCReturnInt(0); +} + +int DetectSignatureSetAppProto(Signature *s, AppProto alproto) +{ + if (alproto == ALPROTO_UNKNOWN || + alproto >= ALPROTO_FAILED) { + SCLogError("invalid alproto %u", alproto); + return -1; + } + + /* since AppProtoEquals is quite permissive wrt dcerpc and smb, make sure + * we refuse `alert dcerpc ... smb.share; content...` explicitly. */ + if (alproto == ALPROTO_SMB && s->alproto == ALPROTO_DCERPC) { + SCLogError("can't set rule app proto to %s: already set to %s", AppProtoToString(alproto), + AppProtoToString(s->alproto)); + return -1; + } + + if (s->alproto != ALPROTO_UNKNOWN && !AppProtoEquals(s->alproto, alproto)) { + if (AppProtoEquals(alproto, s->alproto)) { + // happens if alproto = HTTP_ANY and s->alproto = HTTP1 + // in this case, we must keep the most restrictive HTTP1 + alproto = s->alproto; + } else { + SCLogError("can't set rule app proto to %s: already set to %s", + AppProtoToString(alproto), AppProtoToString(s->alproto)); + return -1; + } + } + + if (AppLayerProtoDetectGetProtoName(alproto) == NULL) { + SCLogError("disabled alproto %s, rule can never match", AppProtoToString(alproto)); + return -1; + } + s->alproto = alproto; + s->flags |= SIG_FLAG_APPLAYER; + return 0; +} + +/** + * \internal + * \brief build address match array for cache efficient matching + * + * \param s the signature + */ +static void SigBuildAddressMatchArray(Signature *s) +{ + /* source addresses */ + uint16_t cnt = 0; + uint16_t idx = 0; + DetectAddress *da = s->init_data->src->ipv4_head; + for ( ; da != NULL; da = da->next) { + cnt++; + } + if (cnt > 0) { + s->addr_src_match4 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv4)); + if (s->addr_src_match4 == NULL) { + exit(EXIT_FAILURE); + } + + for (da = s->init_data->src->ipv4_head; da != NULL; da = da->next) { + s->addr_src_match4[idx].ip = SCNtohl(da->ip.addr_data32[0]); + s->addr_src_match4[idx].ip2 = SCNtohl(da->ip2.addr_data32[0]); + idx++; + } + s->addr_src_match4_cnt = cnt; + } + + /* destination addresses */ + cnt = 0; + idx = 0; + da = s->init_data->dst->ipv4_head; + for ( ; da != NULL; da = da->next) { + cnt++; + } + if (cnt > 0) { + s->addr_dst_match4 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv4)); + if (s->addr_dst_match4 == NULL) { + exit(EXIT_FAILURE); + } + + for (da = s->init_data->dst->ipv4_head; da != NULL; da = da->next) { + s->addr_dst_match4[idx].ip = SCNtohl(da->ip.addr_data32[0]); + s->addr_dst_match4[idx].ip2 = SCNtohl(da->ip2.addr_data32[0]); + idx++; + } + s->addr_dst_match4_cnt = cnt; + } + + /* source addresses IPv6 */ + cnt = 0; + idx = 0; + da = s->init_data->src->ipv6_head; + for ( ; da != NULL; da = da->next) { + cnt++; + } + if (cnt > 0) { + s->addr_src_match6 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv6)); + if (s->addr_src_match6 == NULL) { + exit(EXIT_FAILURE); + } + + for (da = s->init_data->src->ipv6_head; da != NULL; da = da->next) { + s->addr_src_match6[idx].ip[0] = SCNtohl(da->ip.addr_data32[0]); + s->addr_src_match6[idx].ip[1] = SCNtohl(da->ip.addr_data32[1]); + s->addr_src_match6[idx].ip[2] = SCNtohl(da->ip.addr_data32[2]); + s->addr_src_match6[idx].ip[3] = SCNtohl(da->ip.addr_data32[3]); + s->addr_src_match6[idx].ip2[0] = SCNtohl(da->ip2.addr_data32[0]); + s->addr_src_match6[idx].ip2[1] = SCNtohl(da->ip2.addr_data32[1]); + s->addr_src_match6[idx].ip2[2] = SCNtohl(da->ip2.addr_data32[2]); + s->addr_src_match6[idx].ip2[3] = SCNtohl(da->ip2.addr_data32[3]); + idx++; + } + s->addr_src_match6_cnt = cnt; + } + + /* destination addresses IPv6 */ + cnt = 0; + idx = 0; + da = s->init_data->dst->ipv6_head; + for ( ; da != NULL; da = da->next) { + cnt++; + } + if (cnt > 0) { + s->addr_dst_match6 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv6)); + if (s->addr_dst_match6 == NULL) { + exit(EXIT_FAILURE); + } + + for (da = s->init_data->dst->ipv6_head; da != NULL; da = da->next) { + s->addr_dst_match6[idx].ip[0] = SCNtohl(da->ip.addr_data32[0]); + s->addr_dst_match6[idx].ip[1] = SCNtohl(da->ip.addr_data32[1]); + s->addr_dst_match6[idx].ip[2] = SCNtohl(da->ip.addr_data32[2]); + s->addr_dst_match6[idx].ip[3] = SCNtohl(da->ip.addr_data32[3]); + s->addr_dst_match6[idx].ip2[0] = SCNtohl(da->ip2.addr_data32[0]); + s->addr_dst_match6[idx].ip2[1] = SCNtohl(da->ip2.addr_data32[1]); + s->addr_dst_match6[idx].ip2[2] = SCNtohl(da->ip2.addr_data32[2]); + s->addr_dst_match6[idx].ip2[3] = SCNtohl(da->ip2.addr_data32[3]); + idx++; + } + s->addr_dst_match6_cnt = cnt; + } +} + +static int SigMatchListLen(SigMatch *sm) +{ + int len = 0; + for (; sm != NULL; sm = sm->next) + len++; + + return len; +} + +/** \brief convert SigMatch list to SigMatchData array + * \note ownership of sm->ctx is transferred to smd->ctx + */ +SigMatchData* SigMatchList2DataArray(SigMatch *head) +{ + int len = SigMatchListLen(head); + if (len == 0) + return NULL; + + SigMatchData *smd = (SigMatchData *)SCCalloc(len, sizeof(SigMatchData)); + if (smd == NULL) { + FatalError("initializing the detection engine failed"); + } + SigMatchData *out = smd; + + /* Copy sm type and Context into array */ + SigMatch *sm = head; + for (; sm != NULL; sm = sm->next, smd++) { + smd->type = sm->type; + smd->ctx = sm->ctx; + sm->ctx = NULL; // SigMatch no longer owns the ctx + smd->is_last = (sm->next == NULL); + } + return out; +} + +/** + * \internal + * \brief validate a just parsed signature for internal inconsistencies + * + * \param s just parsed signature + * + * \retval 0 invalid + * \retval 1 valid + */ +static int SigValidate(DetectEngineCtx *de_ctx, Signature *s) +{ + SCEnter(); + + uint32_t sig_flags = 0; + int nlists = 0; + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + nlists = MAX(nlists, (int)s->init_data->buffers[x].id); + } + nlists += (nlists > 0); + SCLogDebug("nlists %d", nlists); + + if (s->init_data->curbuf && s->init_data->curbuf->head == NULL) { + SCLogError("rule %u setup buffer %s but didn't add matches to it", s->id, + DetectEngineBufferTypeGetNameById(de_ctx, s->init_data->curbuf->id)); + SCReturnInt(0); + } + + bool has_frame = false; + bool has_app = false; + bool has_pkt = false; + bool has_pmatch = false; + + /* run buffer type validation callbacks if any */ + if (s->init_data->smlists[DETECT_SM_LIST_PMATCH]) { + if (!DetectContentPMATCHValidateCallback(s)) + SCReturnInt(0); + + has_pmatch = true; + } + + struct BufferVsDir { + int ts; + int tc; + } bufdir[nlists + 1]; + memset(&bufdir, 0, (nlists + 1) * sizeof(struct BufferVsDir)); + + for (uint32_t x = 0; x < s->init_data->buffer_index; x++) { + SignatureInitDataBuffer *b = &s->init_data->buffers[x]; + const DetectBufferType *bt = DetectEngineBufferTypeGetById(de_ctx, b->id); + if (bt == NULL) { + DEBUG_VALIDATE_BUG_ON(1); // should be impossible + continue; + } + SCLogDebug("x %u b->id %u name %s", x, b->id, bt->name); + for (SigMatch *sm = b->head; sm != NULL; sm = sm->next) { + SCLogDebug("sm %u %s", sm->type, sigmatch_table[sm->type].name); + } + + if (b->head == NULL) { + SCLogError("no matches in sticky buffer %s", bt->name); + SCReturnInt(0); + } + + has_frame |= bt->frame; + has_app |= (bt->frame == false && bt->packet == false); + has_pkt |= bt->packet; + + if ((s->flags & SIG_FLAG_REQUIRE_PACKET) && bt->packet == false) { + SCLogError("Signature combines packet " + "specific matches (like dsize, flags, ttl) with stream / " + "state matching by matching on app layer proto (like using " + "http_* keywords)."); + SCReturnInt(0); + } + + const DetectEngineAppInspectionEngine *app = de_ctx->app_inspect_engines; + for (; app != NULL; app = app->next) { + if (app->sm_list == b->id && + (AppProtoEquals(s->alproto, app->alproto) || s->alproto == 0)) { + SCLogDebug("engine %s dir %d alproto %d", + DetectEngineBufferTypeGetNameById(de_ctx, app->sm_list), app->dir, + app->alproto); + SCLogDebug("b->id %d nlists %d", b->id, nlists); + bufdir[b->id].ts += (app->dir == 0); + bufdir[b->id].tc += (app->dir == 1); + } + } + + if (!DetectEngineBufferRunValidateCallback(de_ctx, b->id, s, &de_ctx->sigerror)) { + SCReturnInt(0); + } + + if (!DetectBsizeValidateContentCallback(s, b)) { + SCReturnInt(0); + } + } + + int ts_excl = 0; + int tc_excl = 0; + int dir_amb = 0; + for (int x = 0; x < nlists; x++) { + if (bufdir[x].ts == 0 && bufdir[x].tc == 0) + continue; + ts_excl += (bufdir[x].ts > 0 && bufdir[x].tc == 0); + tc_excl += (bufdir[x].ts == 0 && bufdir[x].tc > 0); + dir_amb += (bufdir[x].ts > 0 && bufdir[x].tc > 0); + + SCLogDebug("%s/%d: %d/%d", DetectEngineBufferTypeGetNameById(de_ctx, x), x, bufdir[x].ts, + bufdir[x].tc); + } + if (ts_excl && tc_excl) { + SCLogError("rule %u mixes keywords with conflicting directions", s->id); + SCReturnInt(0); + } else if (ts_excl) { + SCLogDebug("%u: implied rule direction is toserver", s->id); + if (DetectFlowSetupImplicit(s, SIG_FLAG_TOSERVER) < 0) { + SCLogError("rule %u mixes keywords with conflicting directions", s->id); + SCReturnInt(0); + } + } else if (tc_excl) { + SCLogDebug("%u: implied rule direction is toclient", s->id); + if (DetectFlowSetupImplicit(s, SIG_FLAG_TOCLIENT) < 0) { + SCLogError("rule %u mixes keywords with conflicting directions", s->id); + SCReturnInt(0); + } + } else if (dir_amb) { + SCLogDebug("%u: rule direction cannot be deduced from keywords", s->id); + } + + if ((s->flags & SIG_FLAG_REQUIRE_PACKET) && + (s->flags & SIG_FLAG_REQUIRE_STREAM)) { + SCLogError("can't mix packet keywords with " + "tcp-stream or flow:only_stream. Invalidating signature."); + SCReturnInt(0); + } + + if ((sig_flags & (SIG_FLAG_TOCLIENT | SIG_FLAG_TOSERVER)) == (SIG_FLAG_TOCLIENT | SIG_FLAG_TOSERVER)) { + SCLogError("You seem to have mixed keywords " + "that require inspection in both directions. Atm we only " + "support keywords in one direction within a rule."); + SCReturnInt(0); + } + + if (has_pmatch && has_frame) { + SCLogError("can't mix pure content and frame inspection"); + SCReturnInt(0); + } + if (has_app && has_frame) { + SCLogError("can't mix app-layer buffer and frame inspection"); + SCReturnInt(0); + } + if (has_pkt && has_frame) { + SCLogError("can't mix pkt buffer and frame inspection"); + SCReturnInt(0); + } + + /* TCP: corner cases: + * - pkt vs stream vs depth/offset + * - pkt vs stream vs stream_size + */ + if (s->proto.proto[IPPROTO_TCP / 8] & (1 << (IPPROTO_TCP % 8))) { + if (s->init_data->smlists[DETECT_SM_LIST_PMATCH]) { + if (!(s->flags & (SIG_FLAG_REQUIRE_PACKET | SIG_FLAG_REQUIRE_STREAM))) { + s->flags |= SIG_FLAG_REQUIRE_STREAM; + for (SigMatch *sm = s->init_data->smlists[DETECT_SM_LIST_PMATCH]; sm != NULL; + sm = sm->next) { + if (sm->type == DETECT_CONTENT && + (((DetectContentData *)(sm->ctx))->flags & + (DETECT_CONTENT_DEPTH | DETECT_CONTENT_OFFSET))) { + s->flags |= SIG_FLAG_REQUIRE_PACKET; + break; + } + } + /* if stream_size is in use, also inspect packets */ + for (SigMatch *sm = s->init_data->smlists[DETECT_SM_LIST_MATCH]; sm != NULL; + sm = sm->next) { + if (sm->type == DETECT_STREAM_SIZE) { + s->flags |= SIG_FLAG_REQUIRE_PACKET; + break; + } + } + } + } + } +#ifdef HAVE_LUA + DetectLuaPostSetup(s); +#endif + + if (s->init_data->init_flags & SIG_FLAG_INIT_JA3 && s->alproto != ALPROTO_UNKNOWN && + s->alproto != ALPROTO_TLS && s->alproto != ALPROTO_QUIC) { + SCLogError("Cannot have ja3 with protocol %s.", AppProtoToString(s->alproto)); + SCReturnInt(0); + } + if ((s->flags & SIG_FLAG_FILESTORE) || s->file_flags != 0 || + (s->init_data->init_flags & SIG_FLAG_INIT_FILEDATA)) { + if (s->alproto != ALPROTO_UNKNOWN && + !AppLayerParserSupportsFiles(IPPROTO_TCP, s->alproto)) + { + SCLogError("protocol %s doesn't " + "support file matching", + AppProtoToString(s->alproto)); + SCReturnInt(0); + } + if (s->alproto == ALPROTO_HTTP2 && (s->file_flags & FILE_SIG_NEED_FILENAME)) { + SCLogError("protocol HTTP2 doesn't support file name matching"); + SCReturnInt(0); + } + + if (s->alproto == ALPROTO_HTTP1 || s->alproto == ALPROTO_HTTP) { + AppLayerHtpNeedFileInspection(); + } + } + + SCReturnInt(1); +} + +/** + * \internal + * \brief Helper function for SigInit(). + */ +static Signature *SigInitHelper(DetectEngineCtx *de_ctx, const char *sigstr, + uint8_t dir) +{ + SignatureParser parser; + memset(&parser, 0x00, sizeof(parser)); + + Signature *sig = SigAlloc(); + if (sig == NULL) + goto error; + + sig->sig_str = SCStrdup(sigstr); + if (unlikely(sig->sig_str == NULL)) { + goto error; + } + + /* default gid to 1 */ + sig->gid = 1; + + /* We do a first parse of the rule in a requires, or scan-only + * mode. Syntactic errors will be picked up here, but the only + * part of the rule that is validated completely is the "requires" + * keyword. */ + int ret = SigParse(de_ctx, sig, sigstr, dir, &parser, true); + if (ret == -4) { + /* Rule requirements not met. */ + de_ctx->sigerror_silent = true; + de_ctx->sigerror_ok = true; + de_ctx->sigerror_requires = true; + goto error; + } else if (ret < 0) { + goto error; + } + + /* Check for a SID before continuuing. */ + if (sig->id == 0) { + SCLogError("Signature missing required value \"sid\"."); + goto error; + } + + /* Now completely parse the rule. */ + ret = SigParse(de_ctx, sig, sigstr, dir, &parser, false); + BUG_ON(ret == -4); + if (ret == -3) { + de_ctx->sigerror_silent = true; + de_ctx->sigerror_ok = true; + goto error; + } else if (ret == -2) { + de_ctx->sigerror_silent = true; + goto error; + } else if (ret < 0) { + goto error; + } + + /* signature priority hasn't been overwritten. Using default priority */ + if (sig->prio == -1) + sig->prio = DETECT_DEFAULT_PRIO; + + sig->num = de_ctx->signum; + de_ctx->signum++; + + if (sig->alproto != ALPROTO_UNKNOWN) { + int override_needed = 0; + if (sig->proto.flags & DETECT_PROTO_ANY) { + sig->proto.flags &= ~DETECT_PROTO_ANY; + memset(sig->proto.proto, 0x00, sizeof(sig->proto.proto)); + override_needed = 1; + } else { + override_needed = 1; + size_t s = 0; + for (s = 0; s < sizeof(sig->proto.proto); s++) { + if (sig->proto.proto[s] != 0x00) { + override_needed = 0; + break; + } + } + } + + /* at this point if we had alert ip and the ip proto was not + * overridden, we use the ip proto that has been configured + * against the app proto in use. */ + if (override_needed) + AppLayerProtoDetectSupportedIpprotos(sig->alproto, sig->proto.proto); + } + + /* set the packet and app layer flags, but only if the + * app layer flag wasn't already set in which case we + * only consider the app layer */ + if (!(sig->flags & SIG_FLAG_APPLAYER)) { + if (sig->init_data->smlists[DETECT_SM_LIST_MATCH] != NULL) { + SigMatch *sm = sig->init_data->smlists[DETECT_SM_LIST_MATCH]; + for ( ; sm != NULL; sm = sm->next) { + if (sigmatch_table[sm->type].Match != NULL) + sig->init_data->init_flags |= SIG_FLAG_INIT_PACKET; + } + } else { + sig->init_data->init_flags |= SIG_FLAG_INIT_PACKET; + } + } + + if (!(sig->init_data->init_flags & SIG_FLAG_INIT_FLOW)) { + if ((sig->flags & (SIG_FLAG_TOSERVER|SIG_FLAG_TOCLIENT)) == 0) { + sig->flags |= SIG_FLAG_TOSERVER; + sig->flags |= SIG_FLAG_TOCLIENT; + } + } + + SCLogDebug("sig %"PRIu32" SIG_FLAG_APPLAYER: %s, SIG_FLAG_PACKET: %s", + sig->id, sig->flags & SIG_FLAG_APPLAYER ? "set" : "not set", + sig->init_data->init_flags & SIG_FLAG_INIT_PACKET ? "set" : "not set"); + + SigBuildAddressMatchArray(sig); + + /* run buffer type callbacks if any */ + for (uint32_t x = 0; x < DETECT_SM_LIST_MAX; x++) { + if (sig->init_data->smlists[x]) + DetectEngineBufferRunSetupCallback(de_ctx, x, sig); + } + for (uint32_t x = 0; x < sig->init_data->buffer_index; x++) { + DetectEngineBufferRunSetupCallback(de_ctx, sig->init_data->buffers[x].id, sig); + } + + /* validate signature, SigValidate will report the error reason */ + if (SigValidate(de_ctx, sig) == 0) { + goto error; + } + + /* check what the type of this sig is */ + SignatureSetType(de_ctx, sig); + + if (sig->type == SIG_TYPE_IPONLY) { + /* For IPOnly */ + if (IPOnlySigParseAddress(de_ctx, sig, parser.src, SIG_DIREC_SRC ^ dir) < 0) + goto error; + + if (IPOnlySigParseAddress(de_ctx, sig, parser.dst, SIG_DIREC_DST ^ dir) < 0) + goto error; + } + return sig; + +error: + if (sig != NULL) { + SigFree(de_ctx, sig); + } + return NULL; +} + +/** + * \brief Checks if a signature has the same source and destination + * \param s parsed signature + * + * \retval true if source and destination are the same, false otherwise + */ +static bool SigHasSameSourceAndDestination(const Signature *s) +{ + if (!(s->flags & SIG_FLAG_SP_ANY) || !(s->flags & SIG_FLAG_DP_ANY)) { + if (!DetectPortListsAreEqual(s->sp, s->dp)) { + return false; + } + } + + if (!(s->flags & SIG_FLAG_SRC_ANY) || !(s->flags & SIG_FLAG_DST_ANY)) { + DetectAddress *src = s->init_data->src->ipv4_head; + DetectAddress *dst = s->init_data->dst->ipv4_head; + + if (!DetectAddressListsAreEqual(src, dst)) { + return false; + } + + src = s->init_data->src->ipv6_head; + dst = s->init_data->dst->ipv6_head; + + if (!DetectAddressListsAreEqual(src, dst)) { + return false; + } + } + + return true; +} + +/** + * \brief Parses a signature and adds it to the Detection Engine Context. + * + * \param de_ctx Pointer to the Detection Engine Context. + * \param sigstr Pointer to a character string containing the signature to be + * parsed. + * + * \retval Pointer to the Signature instance on success; NULL on failure. + */ +Signature *SigInit(DetectEngineCtx *de_ctx, const char *sigstr) +{ + SCEnter(); + + uint32_t oldsignum = de_ctx->signum; + de_ctx->sigerror_ok = false; + de_ctx->sigerror_silent = false; + de_ctx->sigerror_requires = false; + + Signature *sig; + + if ((sig = SigInitHelper(de_ctx, sigstr, SIG_DIREC_NORMAL)) == NULL) { + goto error; + } + + if (sig->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + if (SigHasSameSourceAndDestination(sig)) { + SCLogInfo("Rule with ID %u is bidirectional, but source and destination are the same, " + "treating the rule as unidirectional", sig->id); + + sig->init_data->init_flags &= ~SIG_FLAG_INIT_BIDIREC; + } else { + sig->next = SigInitHelper(de_ctx, sigstr, SIG_DIREC_SWITCHED); + if (sig->next == NULL) { + goto error; + } + } + } + + SCReturnPtr(sig, "Signature"); + +error: + if (sig != NULL) { + SigFree(de_ctx, sig); + } + /* if something failed, restore the old signum count + * since we didn't install it */ + de_ctx->signum = oldsignum; + + SCReturnPtr(NULL, "Signature"); +} + +/** + * \brief The hash free function to be the used by the hash table - + * DetectEngineCtx->dup_sig_hash_table. + * + * \param data Pointer to the data, in our case SigDuplWrapper to be freed. + */ +static void DetectParseDupSigFreeFunc(void *data) +{ + if (data != NULL) + SCFree(data); + + return; +} + +/** + * \brief The hash function to be the used by the hash table - + * DetectEngineCtx->dup_sig_hash_table. + * + * \param ht Pointer to the hash table. + * \param data Pointer to the data, in our case SigDuplWrapper. + * \param datalen Not used in our case. + * + * \retval sw->s->id The generated hash value. + */ +static uint32_t DetectParseDupSigHashFunc(HashListTable *ht, void *data, uint16_t datalen) +{ + SigDuplWrapper *sw = (SigDuplWrapper *)data; + + return (sw->s->id % ht->array_size); +} + +/** + * \brief The Compare function to be used by the hash table - + * DetectEngineCtx->dup_sig_hash_table. + * + * \param data1 Pointer to the first SigDuplWrapper. + * \param len1 Not used. + * \param data2 Pointer to the second SigDuplWrapper. + * \param len2 Not used. + * + * \retval 1 If the 2 SigDuplWrappers sent as args match. + * \retval 0 If the 2 SigDuplWrappers sent as args do not match. + */ +static char DetectParseDupSigCompareFunc(void *data1, uint16_t len1, void *data2, + uint16_t len2) +{ + SigDuplWrapper *sw1 = (SigDuplWrapper *)data1; + SigDuplWrapper *sw2 = (SigDuplWrapper *)data2; + + if (sw1 == NULL || sw2 == NULL || + sw1->s == NULL || sw2->s == NULL) + return 0; + + /* sid and gid match required */ + if (sw1->s->id == sw2->s->id && sw1->s->gid == sw2->s->gid) return 1; + + return 0; +} + +/** + * \brief Initializes the hash table that is used to cull duplicate sigs. + * + * \param de_ctx Pointer to the detection engine context. + * + * \retval 0 On success. + * \retval -1 On failure. + */ +int DetectParseDupSigHashInit(DetectEngineCtx *de_ctx) +{ + de_ctx->dup_sig_hash_table = HashListTableInit(15000, + DetectParseDupSigHashFunc, + DetectParseDupSigCompareFunc, + DetectParseDupSigFreeFunc); + if (de_ctx->dup_sig_hash_table == NULL) + return -1; + + return 0; +} + +/** + * \brief Frees the hash table that is used to cull duplicate sigs. + * + * \param de_ctx Pointer to the detection engine context that holds this table. + */ +void DetectParseDupSigHashFree(DetectEngineCtx *de_ctx) +{ + if (de_ctx->dup_sig_hash_table != NULL) + HashListTableFree(de_ctx->dup_sig_hash_table); + + de_ctx->dup_sig_hash_table = NULL; + + return; +} + +/** + * \brief Check if a signature is a duplicate. + * + * There are 3 types of return values for this function. + * + * - 0, which indicates that the Signature is not a duplicate + * and has to be added to the detection engine list. + * - 1, Signature is duplicate, and the existing signature in + * the list shouldn't be replaced with this duplicate. + * - 2, Signature is duplicate, and the existing signature in + * the list should be replaced with this duplicate. + * + * \param de_ctx Pointer to the detection engine context. + * \param sig Pointer to the Signature that has to be checked. + * + * \retval 2 If Signature is duplicate and the existing signature in + * the list should be chucked out and replaced with this. + * \retval 1 If Signature is duplicate, and should be chucked out. + * \retval 0 If Signature is not a duplicate. + */ +static inline int DetectEngineSignatureIsDuplicate(DetectEngineCtx *de_ctx, + Signature *sig) +{ + /* we won't do any NULL checks on the args */ + + /* return value */ + int ret = 0; + + SigDuplWrapper *sw_dup = NULL; + SigDuplWrapper *sw = NULL; + + /* used for making a duplicate_sig_hash_table entry */ + sw = SCMalloc(sizeof(SigDuplWrapper)); + if (unlikely(sw == NULL)) { + exit(EXIT_FAILURE); + } + memset(sw, 0, sizeof(SigDuplWrapper)); + sw->s = sig; + + /* check if we have a duplicate entry for this signature */ + sw_dup = HashListTableLookup(de_ctx->dup_sig_hash_table, (void *)sw, 0); + /* we don't have a duplicate entry for this sig */ + if (sw_dup == NULL) { + /* add it to the hash table */ + HashListTableAdd(de_ctx->dup_sig_hash_table, (void *)sw, 0); + + /* add the s_prev entry for the previously loaded sw in the hash_table */ + if (de_ctx->sig_list != NULL) { + SigDuplWrapper *sw_old = NULL; + SigDuplWrapper sw_tmp; + memset(&sw_tmp, 0, sizeof(SigDuplWrapper)); + + /* the topmost sig would be the last loaded sig */ + sw_tmp.s = de_ctx->sig_list; + sw_old = HashListTableLookup(de_ctx->dup_sig_hash_table, + (void *)&sw_tmp, 0); + /* sw_old == NULL case is impossible */ + sw_old->s_prev = sig; + } + + ret = 0; + goto end; + } + + /* if we have reached here we have a duplicate entry for this signature. + * Check the signature revision. Store the signature with the latest rev + * and discard the other one */ + if (sw->s->rev <= sw_dup->s->rev) { + ret = 1; + SCFree(sw); + sw = NULL; + goto end; + } + + /* the new sig is of a newer revision than the one that is already in the + * list. Remove the old sig from the list */ + if (sw_dup->s_prev == NULL) { + SigDuplWrapper sw_temp; + memset(&sw_temp, 0, sizeof(SigDuplWrapper)); + if (sw_dup->s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + sw_temp.s = sw_dup->s->next->next; + de_ctx->sig_list = sw_dup->s->next->next; + SigFree(de_ctx, sw_dup->s->next); + } else { + sw_temp.s = sw_dup->s->next; + de_ctx->sig_list = sw_dup->s->next; + } + SigDuplWrapper *sw_next = NULL; + if (sw_temp.s != NULL) { + sw_next = HashListTableLookup(de_ctx->dup_sig_hash_table, + (void *)&sw_temp, 0); + sw_next->s_prev = sw_dup->s_prev; + } + SigFree(de_ctx, sw_dup->s); + } else { + SigDuplWrapper sw_temp; + memset(&sw_temp, 0, sizeof(SigDuplWrapper)); + if (sw_dup->s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + sw_temp.s = sw_dup->s->next->next; + /* If previous signature is bidirectional, + * it has 2 items in the linked list. + * So we need to change next->next instead of next + */ + if (sw_dup->s_prev->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + sw_dup->s_prev->next->next = sw_dup->s->next->next; + } else { + sw_dup->s_prev->next = sw_dup->s->next->next; + } + SigFree(de_ctx, sw_dup->s->next); + } else { + sw_temp.s = sw_dup->s->next; + if (sw_dup->s_prev->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + sw_dup->s_prev->next->next = sw_dup->s->next; + } else { + sw_dup->s_prev->next = sw_dup->s->next; + } + } + SigDuplWrapper *sw_next = NULL; + if (sw_temp.s != NULL) { + sw_next = HashListTableLookup(de_ctx->dup_sig_hash_table, + (void *)&sw_temp, 0); + sw_next->s_prev = sw_dup->s_prev; + } + SigFree(de_ctx, sw_dup->s); + } + + /* make changes to the entry to reflect the presence of the new sig */ + sw_dup->s = sig; + sw_dup->s_prev = NULL; + + if (de_ctx->sig_list != NULL) { + SigDuplWrapper sw_tmp; + memset(&sw_tmp, 0, sizeof(SigDuplWrapper)); + sw_tmp.s = de_ctx->sig_list; + SigDuplWrapper *sw_old = HashListTableLookup(de_ctx->dup_sig_hash_table, + (void *)&sw_tmp, 0); + if (sw_old->s != sw_dup->s) { + // Link on top of the list if there was another element + sw_old->s_prev = sig; + } + } + + /* this is duplicate, but a duplicate that replaced the existing sig entry */ + ret = 2; + + SCFree(sw); + +end: + return ret; +} + +/** + * \brief Parse and append a Signature into the Detection Engine Context + * signature list. + * + * If the signature is bidirectional it should append two signatures + * (with the addresses switched) into the list. Also handle duplicate + * signatures. In case of duplicate sigs, use the ones that have the + * latest revision. We use the sid and the msg to identify duplicate + * sigs. If 2 sigs have the same sid and gid, they are duplicates. + * + * \param de_ctx Pointer to the Detection Engine Context. + * \param sigstr Pointer to a character string containing the signature to be + * parsed. + * \param sig_file Pointer to a character string containing the filename from + * which signature is read + * \param lineno Line number from where signature is read + * + * \retval Pointer to the head Signature in the detection engine ctx sig_list + * on success; NULL on failure. + */ +Signature *DetectEngineAppendSig(DetectEngineCtx *de_ctx, const char *sigstr) +{ + Signature *sig = SigInit(de_ctx, sigstr); + if (sig == NULL) { + return NULL; + } + + /* checking for the status of duplicate signature */ + int dup_sig = DetectEngineSignatureIsDuplicate(de_ctx, sig); + /* a duplicate signature that should be chucked out. Check the previously + * called function details to understand the different return values */ + if (dup_sig == 1) { + SCLogError("Duplicate signature \"%s\"", sigstr); + goto error; + } else if (dup_sig == 2) { + SCLogWarning("Signature with newer revision," + " so the older sig replaced by this new signature \"%s\"", + sigstr); + } + + if (sig->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) { + if (sig->next != NULL) { + sig->next->next = de_ctx->sig_list; + } else { + goto error; + } + } else { + /* if this sig is the first one, sig_list should be null */ + sig->next = de_ctx->sig_list; + } + + de_ctx->sig_list = sig; + + /** + * In DetectEngineAppendSig(), the signatures are prepended and we always return the first one + * so if the signature is bidirectional, the returned sig will point through "next" ptr + * to the cloned signatures with the switched addresses + */ + return (dup_sig == 0 || dup_sig == 2) ? sig : NULL; + +error: + /* free the 2nd sig bidir may have set up */ + if (sig != NULL && sig->next != NULL) { + SigFree(de_ctx, sig->next); + sig->next = NULL; + } + if (sig != NULL) { + SigFree(de_ctx, sig); + } + return NULL; +} + +static DetectParseRegex *g_detect_parse_regex_list = NULL; + +int DetectParsePcreExec(DetectParseRegex *parse_regex, pcre2_match_data **match, const char *str, + int start_offset, int options) +{ + *match = pcre2_match_data_create_from_pattern(parse_regex->regex, NULL); + if (*match) + return pcre2_match(parse_regex->regex, (PCRE2_SPTR8)str, strlen(str), options, start_offset, + *match, NULL); + return -1; +} + +void DetectParseFreeRegex(DetectParseRegex *r) +{ + if (r->regex) { + pcre2_code_free(r->regex); + } + if (r->context) { + pcre2_match_context_free(r->context); + } + if (r->match) { + pcre2_match_data_free(r->match); + } +} + +void DetectParseFreeRegexes(void) +{ + DetectParseRegex *r = g_detect_parse_regex_list; + while (r) { + DetectParseRegex *next = r->next; + + DetectParseFreeRegex(r); + + SCFree(r); + r = next; + } + g_detect_parse_regex_list = NULL; +} + +/** \brief add regex and/or study to at exit free list + */ +void DetectParseRegexAddToFreeList(DetectParseRegex *detect_parse) +{ + DetectParseRegex *r = SCCalloc(1, sizeof(*r)); + if (r == NULL) { + FatalError("failed to alloc memory for pcre free list"); + } + r->regex = detect_parse->regex; + r->match = detect_parse->match; + r->next = g_detect_parse_regex_list; + g_detect_parse_regex_list = r; +} + +bool DetectSetupParseRegexesOpts(const char *parse_str, DetectParseRegex *detect_parse, int opts) +{ + int en; + PCRE2_SIZE eo; + + detect_parse->regex = + pcre2_compile((PCRE2_SPTR8)parse_str, PCRE2_ZERO_TERMINATED, opts, &en, &eo, NULL); + if (detect_parse->regex == NULL) { + PCRE2_UCHAR errbuffer[256]; + pcre2_get_error_message(en, errbuffer, sizeof(errbuffer)); + SCLogError("pcre compile of \"%s\" failed at " + "offset %d: %s", + parse_str, en, errbuffer); + return false; + } + detect_parse->match = pcre2_match_data_create_from_pattern(detect_parse->regex, NULL); + + DetectParseRegexAddToFreeList(detect_parse); + + return true; +} + +DetectParseRegex *DetectSetupPCRE2(const char *parse_str, int opts) +{ + int en; + PCRE2_SIZE eo; + DetectParseRegex *detect_parse = SCCalloc(1, sizeof(DetectParseRegex)); + if (detect_parse == NULL) { + return NULL; + } + + detect_parse->regex = + pcre2_compile((PCRE2_SPTR8)parse_str, PCRE2_ZERO_TERMINATED, opts, &en, &eo, NULL); + if (detect_parse->regex == NULL) { + PCRE2_UCHAR errbuffer[256]; + pcre2_get_error_message(en, errbuffer, sizeof(errbuffer)); + SCLogError("pcre2 compile of \"%s\" failed at " + "offset %d: %s", + parse_str, (int)eo, errbuffer); + SCFree(detect_parse); + return NULL; + } + detect_parse->match = pcre2_match_data_create_from_pattern(detect_parse->regex, NULL); + + detect_parse->next = g_detect_parse_regex_list; + g_detect_parse_regex_list = detect_parse; + return detect_parse; +} + +int SC_Pcre2SubstringCopy( + pcre2_match_data *match_data, uint32_t number, PCRE2_UCHAR *buffer, PCRE2_SIZE *bufflen) +{ + int r = pcre2_substring_copy_bynumber(match_data, number, buffer, bufflen); + if (r == PCRE2_ERROR_UNSET) { + buffer[0] = 0; + *bufflen = 0; + return 0; + } + return r; +} + +int SC_Pcre2SubstringGet( + pcre2_match_data *match_data, uint32_t number, PCRE2_UCHAR **bufferptr, PCRE2_SIZE *bufflen) +{ + int r = pcre2_substring_get_bynumber(match_data, number, bufferptr, bufflen); + if (r == PCRE2_ERROR_UNSET) { + *bufferptr = NULL; + *bufflen = 0; + return 0; + } + return r; +} + +void DetectSetupParseRegexes(const char *parse_str, DetectParseRegex *detect_parse) +{ + if (!DetectSetupParseRegexesOpts(parse_str, detect_parse, 0)) { + FatalError("pcre compile and study failed"); + } +} + + +/* + * TESTS + */ + +#ifdef UNITTESTS +#include "detect-engine-alert.h" +#include "packet.h" + +static int SigParseTest01 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1;)"); + if (sig == NULL) + result = 0; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +static int SigParseTest02 (void) +{ + int result = 0; + Signature *sig = NULL; + DetectPort *port = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + + if (de_ctx == NULL) + goto end; + + FILE *fd = SCClassConfGenerateValidDummyClassConfigFD01(); + SCClassConfLoadClassificationConfigFile(de_ctx, fd); + + sig = SigInit(de_ctx, "alert tcp any !21:902 -> any any (msg:\"ET MALWARE Suspicious 220 Banner on Local Port\"; content:\"220\"; offset:0; depth:4; pcre:\"/220[- ]/\"; sid:2003055; rev:4;)"); + if (sig == NULL) { + goto end; + } + + int r = DetectPortParse(de_ctx, &port, "0:20"); + if (r < 0) + goto end; + + if (DetectPortCmp(sig->sp, port) == PORT_EQ) { + result = 1; + } else { + DetectPortPrint(port); printf(" != "); DetectPortPrint(sig->sp); printf(": "); + } + +end: + if (port != NULL) + DetectPortCleanupList(de_ctx, port); + if (sig != NULL) + SigFree(de_ctx, sig); + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test SigParseTest03 test for invalid direction operator in rule + */ +static int SigParseTest03 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp 1.2.3.4 any <- !1.2.3.4 any (msg:\"SigParseTest03\"; sid:1;)"); + if (sig != NULL) { + result = 0; + printf("expected NULL got sig ptr %p: ",sig); + } + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +static int SigParseTest04 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp 1.2.3.4 1024: -> !1.2.3.4 1024: (msg:\"SigParseTest04\"; sid:1;)"); + if (sig == NULL) + result = 0; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Port validation */ +static int SigParseTest05 (void) +{ + int result = 0; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp 1.2.3.4 1024:65536 -> !1.2.3.4 any (msg:\"SigParseTest05\"; sid:1;)"); + if (sig == NULL) { + result = 1; + } else { + printf("signature didn't fail to parse as we expected: "); + } + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Parsing bug debugging at 2010-03-18 */ +static int SigParseTest06 (void) +{ + int result = 0; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp any any -> any any (flow:to_server; content:\"GET\"; nocase; http_method; uricontent:\"/uri/\"; nocase; content:\"Host|3A| abc\"; nocase; sid:1; rev:1;)"); + if (sig != NULL) { + result = 1; + } else { + printf("signature failed to parse: "); + } + +end: + if (sig != NULL) + SigFree(de_ctx, sig); + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test Parsing duplicate sigs. + */ +static int SigParseTest07(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)"); + + result = (de_ctx->sig_list != NULL && de_ctx->sig_list->next == NULL); + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test Parsing duplicate sigs. + */ +static int SigParseTest08(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:2;)"); + + result = (de_ctx->sig_list != NULL && de_ctx->sig_list->next == NULL && + de_ctx->sig_list->rev == 2); + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test Parsing duplicate sigs. + */ +static int SigParseTest09(void) +{ + int result = 1; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:2;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:6;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:4;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:2;)"); + result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 && + de_ctx->sig_list->rev == 2); + if (result == 0) + goto end; + result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 && + de_ctx->sig_list->next->rev == 6); + if (result == 0) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:1;)"); + result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 && + de_ctx->sig_list->rev == 2); + if (result == 0) + goto end; + result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 && + de_ctx->sig_list->next->rev == 6); + if (result == 0) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:4;)"); + result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 && + de_ctx->sig_list->rev == 4); + if (result == 0) + goto end; + result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 && + de_ctx->sig_list->next->rev == 6); + if (result == 0) + goto end; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test Parsing duplicate sigs. + */ +static int SigParseTest10(void) +{ + int result = 1; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:3; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:4; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:5; rev:1;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:3; rev:2;)"); + DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:2;)"); + + result &= ((de_ctx->sig_list->id == 2) && + (de_ctx->sig_list->next->id == 3) && + (de_ctx->sig_list->next->next->id == 5) && + (de_ctx->sig_list->next->next->next->id == 4) && + (de_ctx->sig_list->next->next->next->next->id == 1)); + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test Parsing sig with trailing space(s) as reported by + * Morgan Cox on oisf-users. + */ +static int SigParseTest11(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, + "drop tcp any any -> any 80 (msg:\"Snort_Inline is blocking the http link\"; sid:1;) "); + if (s == NULL) { + printf("sig 1 didn't parse: "); + goto end; + } + + s = DetectEngineAppendSig(de_ctx, "drop tcp any any -> any 80 (msg:\"Snort_Inline is blocking " + "the http link\"; sid:2;) "); + if (s == NULL) { + printf("sig 2 didn't parse: "); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test file_data with rawbytes + */ +static int SigParseTest12(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (file_data; content:\"abc\"; rawbytes; sid:1;)"); + if (s != NULL) { + printf("sig 1 should have given an error: "); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test packet/stream sig + */ +static int SigParseTest13(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; sid:1;)"); + if (s == NULL) { + printf("sig 1 invalidated: failure"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) { + printf("sig doesn't have stream flag set\n"); + goto end; + } + + if (s->flags & SIG_FLAG_REQUIRE_PACKET) { + printf("sig has packet flag set\n"); + goto end; + } + + result = 1; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test packet/stream sig + */ +static int SigParseTest14(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; dsize:>0; sid:1;)"); + if (s == NULL) { + printf("sig 1 invalidated: failure"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) { + printf("sig doesn't have packet flag set\n"); + goto end; + } + + if (s->flags & SIG_FLAG_REQUIRE_STREAM) { + printf("sig has stream flag set\n"); + goto end; + } + + result = 1; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test packet/stream sig + */ +static int SigParseTest15(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; offset:5; sid:1;)"); + if (s == NULL) { + printf("sig 1 invalidated: failure"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) { + printf("sig doesn't have packet flag set\n"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) { + printf("sig doesn't have stream flag set\n"); + goto end; + } + + result = 1; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test packet/stream sig + */ +static int SigParseTest16(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; depth:5; sid:1;)"); + if (s == NULL) { + printf("sig 1 invalidated: failure"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) { + printf("sig doesn't have packet flag set\n"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) { + printf("sig doesn't have stream flag set\n"); + goto end; + } + + result = 1; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test packet/stream sig + */ +static int SigParseTest17(void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; offset:1; depth:5; sid:1;)"); + if (s == NULL) { + printf("sig 1 invalidated: failure"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) { + printf("sig doesn't have packet flag set\n"); + goto end; + } + + if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) { + printf("sig doesn't have stream flag set\n"); + goto end; + } + + result = 1; + +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test sid value too large. Bug #779 */ +static int SigParseTest18 (void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:99999999999999999999;)") != NULL) + goto end; + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test gid value too large. Related to bug #779 */ +static int SigParseTest19 (void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1; gid:99999999999999999999;)") != NULL) + goto end; + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test rev value too large. Related to bug #779 */ +static int SigParseTest20 (void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1; rev:99999999999999999999;)") != NULL) + goto end; + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test address parsing */ +static int SigParseTest21 (void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + if (DetectEngineAppendSig(de_ctx, "alert tcp [1.2.3.4, 1.2.3.5] any -> !1.2.3.4 any (sid:1;)") == NULL) + goto end; + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test address parsing */ +static int SigParseTest22 (void) +{ + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + if (DetectEngineAppendSig(de_ctx, "alert tcp [10.10.10.0/24, !10.10.10.247] any -> [10.10.10.0/24, !10.10.10.247] any (sid:1;)") == NULL) + goto end; + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test rule ending in carriage return + */ +static int SigParseTest23(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + + Signature *s = NULL; + + s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; offset:1; depth:5; sid:1;)\r"); + FAIL_IF_NULL(s); + + DetectEngineCtxFree(de_ctx); + PASS; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest06 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any - 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest07 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <- 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest08 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any < 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest09 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any > 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest10 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -< 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest11 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any >- 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (invalid) */ +static int SigParseBidirecTest12 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any >< 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig == NULL) + result = 1; + +end: + if (sig != NULL) SigFree(de_ctx, sig); + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (valid) */ +static int SigParseBidirecTest13 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <> 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig != NULL) + result = 1; + +end: + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Direction operator validation (valid) */ +static int SigParseBidirecTest14 (void) +{ + int result = 1; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)"); + if (sig != NULL) + result = 1; + +end: + if (de_ctx != NULL) DetectEngineCtxFree(de_ctx); + return result; +} + +/** \test Ensure that we don't set bidirectional in a + * normal (one direction) Signature + */ +static int SigTestBidirec01 (void) +{ + Signature *sig = NULL; + int result = 0; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 1024:65535 -> !1.2.3.4 any (msg:\"SigTestBidirec01\"; sid:1;)"); + if (sig == NULL) + goto end; + if (sig->next != NULL) + goto end; + if (sig->init_data->init_flags & SIG_FLAG_INIT_BIDIREC) + goto end; + if (de_ctx->signum != 1) + goto end; + + result = 1; + +end: + if (de_ctx != NULL) { + SigCleanSignatures(de_ctx); + SigGroupCleanup(de_ctx); + DetectEngineCtxFree(de_ctx); + } + return result; +} + +/** \test Ensure that we set a bidirectional Signature correctly */ +static int SigTestBidirec02 (void) +{ + int result = 0; + Signature *sig = NULL; + Signature *copy = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + de_ctx->flags |= DE_QUIET; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 1024:65535 <> !1.2.3.4 any (msg:\"SigTestBidirec02\"; sid:1;)"); + if (sig == NULL) + goto end; + if (de_ctx->sig_list != sig) + goto end; + if (!(sig->init_data->init_flags & SIG_FLAG_INIT_BIDIREC)) + goto end; + if (sig->next == NULL) + goto end; + if (de_ctx->signum != 2) + goto end; + copy = sig->next; + if (copy->next != NULL) + goto end; + if (!(copy->init_data->init_flags & SIG_FLAG_INIT_BIDIREC)) + goto end; + + result = 1; + +end: + if (de_ctx != NULL) { + SigCleanSignatures(de_ctx); + SigGroupCleanup(de_ctx); + DetectEngineCtxFree(de_ctx); + } + + return result; +} + +/** \test Ensure that we set a bidirectional Signature correctly +* and we install it with the rest of the signatures, checking +* also that it match with the correct addr directions +*/ +static int SigTestBidirec03 (void) +{ + int result = 0; + Signature *sig = NULL; + Packet *p = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + de_ctx->flags |= DE_QUIET; + + const char *sigs[3]; + sigs[0] = "alert tcp any any -> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 1\"; sid:1;)"; + sigs[1] = "alert tcp any any <> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 2 bidirectional\"; sid:2;)"; + sigs[2] = "alert tcp any any -> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 3\"; sid:3;)"; + UTHAppendSigs(de_ctx, sigs, 3); + + /* Checking that bidirectional rules are set correctly */ + sig = de_ctx->sig_list; + if (sig == NULL) + goto end; + if (sig->next == NULL) + goto end; + if (sig->next->next == NULL) + goto end; + if (sig->next->next->next == NULL) + goto end; + if (sig->next->next->next->next != NULL) + goto end; + if (de_ctx->signum != 4) + goto end; + + uint8_t rawpkt1_ether[] = { + 0x00,0x50,0x56,0xea,0x00,0xbd,0x00,0x0c, + 0x29,0x40,0xc8,0xb5,0x08,0x00,0x45,0x00, + 0x01,0xa8,0xb9,0xbb,0x40,0x00,0x40,0x06, + 0xe0,0xbf,0xc0,0xa8,0x1c,0x83,0xc0,0xa8, + 0x01,0x01,0xb9,0x0a,0x00,0x50,0x6f,0xa2, + 0x92,0xed,0x7b,0xc1,0xd3,0x4d,0x50,0x18, + 0x16,0xd0,0xa0,0x6f,0x00,0x00,0x47,0x45, + 0x54,0x20,0x2f,0x20,0x48,0x54,0x54,0x50, + 0x2f,0x31,0x2e,0x31,0x0d,0x0a,0x48,0x6f, + 0x73,0x74,0x3a,0x20,0x31,0x39,0x32,0x2e, + 0x31,0x36,0x38,0x2e,0x31,0x2e,0x31,0x0d, + 0x0a,0x55,0x73,0x65,0x72,0x2d,0x41,0x67, + 0x65,0x6e,0x74,0x3a,0x20,0x4d,0x6f,0x7a, + 0x69,0x6c,0x6c,0x61,0x2f,0x35,0x2e,0x30, + 0x20,0x28,0x58,0x31,0x31,0x3b,0x20,0x55, + 0x3b,0x20,0x4c,0x69,0x6e,0x75,0x78,0x20, + 0x78,0x38,0x36,0x5f,0x36,0x34,0x3b,0x20, + 0x65,0x6e,0x2d,0x55,0x53,0x3b,0x20,0x72, + 0x76,0x3a,0x31,0x2e,0x39,0x2e,0x30,0x2e, + 0x31,0x34,0x29,0x20,0x47,0x65,0x63,0x6b, + 0x6f,0x2f,0x32,0x30,0x30,0x39,0x30,0x39, + 0x30,0x32,0x31,0x37,0x20,0x55,0x62,0x75, + 0x6e,0x74,0x75,0x2f,0x39,0x2e,0x30,0x34, + 0x20,0x28,0x6a,0x61,0x75,0x6e,0x74,0x79, + 0x29,0x20,0x46,0x69,0x72,0x65,0x66,0x6f, + 0x78,0x2f,0x33,0x2e,0x30,0x2e,0x31,0x34, + 0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,0x74, + 0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68, + 0x74,0x6d,0x6c,0x2c,0x61,0x70,0x70,0x6c, + 0x69,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2f, + 0x78,0x68,0x74,0x6d,0x6c,0x2b,0x78,0x6d, + 0x6c,0x2c,0x61,0x70,0x70,0x6c,0x69,0x63, + 0x61,0x74,0x69,0x6f,0x6e,0x2f,0x78,0x6d, + 0x6c,0x3b,0x71,0x3d,0x30,0x2e,0x39,0x2c, + 0x2a,0x2f,0x2a,0x3b,0x71,0x3d,0x30,0x2e, + 0x38,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70, + 0x74,0x2d,0x4c,0x61,0x6e,0x67,0x75,0x61, + 0x67,0x65,0x3a,0x20,0x65,0x6e,0x2d,0x75, + 0x73,0x2c,0x65,0x6e,0x3b,0x71,0x3d,0x30, + 0x2e,0x35,0x0d,0x0a,0x41,0x63,0x63,0x65, + 0x70,0x74,0x2d,0x45,0x6e,0x63,0x6f,0x64, + 0x69,0x6e,0x67,0x3a,0x20,0x67,0x7a,0x69, + 0x70,0x2c,0x64,0x65,0x66,0x6c,0x61,0x74, + 0x65,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70, + 0x74,0x2d,0x43,0x68,0x61,0x72,0x73,0x65, + 0x74,0x3a,0x20,0x49,0x53,0x4f,0x2d,0x38, + 0x38,0x35,0x39,0x2d,0x31,0x2c,0x75,0x74, + 0x66,0x2d,0x38,0x3b,0x71,0x3d,0x30,0x2e, + 0x37,0x2c,0x2a,0x3b,0x71,0x3d,0x30,0x2e, + 0x37,0x0d,0x0a,0x4b,0x65,0x65,0x70,0x2d, + 0x41,0x6c,0x69,0x76,0x65,0x3a,0x20,0x33, + 0x30,0x30,0x0d,0x0a,0x43,0x6f,0x6e,0x6e, + 0x65,0x63,0x74,0x69,0x6f,0x6e,0x3a,0x20, + 0x6b,0x65,0x65,0x70,0x2d,0x61,0x6c,0x69, + 0x76,0x65,0x0d,0x0a,0x0d,0x0a }; /* end rawpkt1_ether */ + + FlowInitConfig(FLOW_QUIET); + p = UTHBuildPacketFromEth(rawpkt1_ether, sizeof(rawpkt1_ether)); + if (p == NULL) { + SCLogDebug("Error building packet"); + goto end; + } + UTHMatchPackets(de_ctx, &p, 1); + + uint32_t sids[3] = {1, 2, 3}; + uint32_t results[3] = {1, 1, 1}; + result = UTHCheckPacketMatchResults(p, sids, results, 1); + +end: + if (p != NULL) { + PacketRecycle(p); + SCFree(p); + } + FlowShutdown(); + return result; +} + +/** \test Ensure that we set a bidirectional Signature correctly +* and we install it with the rest of the signatures, checking +* also that it match with the correct addr directions +*/ +static int SigTestBidirec04 (void) +{ + int result = 0; + Signature *sig = NULL; + Packet *p = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + de_ctx->flags |= DE_QUIET; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> any any (msg:\"SigTestBidirec03 sid 1\"; sid:1;)"); + if (sig == NULL) + goto end; + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <> any any (msg:\"SigTestBidirec03 sid 2 bidirectional\"; sid:2;)"); + if (sig == NULL) + goto end; + if ( !(sig->init_data->init_flags & SIG_FLAG_INIT_BIDIREC)) + goto end; + if (sig->next == NULL) + goto end; + if (sig->next->next == NULL) + goto end; + if (sig->next->next->next != NULL) + goto end; + if (de_ctx->signum != 3) + goto end; + + sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> any any (msg:\"SigTestBidirec03 sid 3\"; sid:3;)"); + if (sig == NULL) + goto end; + if (sig->next == NULL) + goto end; + if (sig->next->next == NULL) + goto end; + if (sig->next->next->next == NULL) + goto end; + if (sig->next->next->next->next != NULL) + goto end; + if (de_ctx->signum != 4) + goto end; + + uint8_t rawpkt1_ether[] = { + 0x00,0x50,0x56,0xea,0x00,0xbd,0x00,0x0c, + 0x29,0x40,0xc8,0xb5,0x08,0x00,0x45,0x00, + 0x01,0xa8,0xb9,0xbb,0x40,0x00,0x40,0x06, + 0xe0,0xbf,0xc0,0xa8,0x1c,0x83,0xc0,0xa8, + 0x01,0x01,0xb9,0x0a,0x00,0x50,0x6f,0xa2, + 0x92,0xed,0x7b,0xc1,0xd3,0x4d,0x50,0x18, + 0x16,0xd0,0xa0,0x6f,0x00,0x00,0x47,0x45, + 0x54,0x20,0x2f,0x20,0x48,0x54,0x54,0x50, + 0x2f,0x31,0x2e,0x31,0x0d,0x0a,0x48,0x6f, + 0x73,0x74,0x3a,0x20,0x31,0x39,0x32,0x2e, + 0x31,0x36,0x38,0x2e,0x31,0x2e,0x31,0x0d, + 0x0a,0x55,0x73,0x65,0x72,0x2d,0x41,0x67, + 0x65,0x6e,0x74,0x3a,0x20,0x4d,0x6f,0x7a, + 0x69,0x6c,0x6c,0x61,0x2f,0x35,0x2e,0x30, + 0x20,0x28,0x58,0x31,0x31,0x3b,0x20,0x55, + 0x3b,0x20,0x4c,0x69,0x6e,0x75,0x78,0x20, + 0x78,0x38,0x36,0x5f,0x36,0x34,0x3b,0x20, + 0x65,0x6e,0x2d,0x55,0x53,0x3b,0x20,0x72, + 0x76,0x3a,0x31,0x2e,0x39,0x2e,0x30,0x2e, + 0x31,0x34,0x29,0x20,0x47,0x65,0x63,0x6b, + 0x6f,0x2f,0x32,0x30,0x30,0x39,0x30,0x39, + 0x30,0x32,0x31,0x37,0x20,0x55,0x62,0x75, + 0x6e,0x74,0x75,0x2f,0x39,0x2e,0x30,0x34, + 0x20,0x28,0x6a,0x61,0x75,0x6e,0x74,0x79, + 0x29,0x20,0x46,0x69,0x72,0x65,0x66,0x6f, + 0x78,0x2f,0x33,0x2e,0x30,0x2e,0x31,0x34, + 0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,0x74, + 0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68, + 0x74,0x6d,0x6c,0x2c,0x61,0x70,0x70,0x6c, + 0x69,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2f, + 0x78,0x68,0x74,0x6d,0x6c,0x2b,0x78,0x6d, + 0x6c,0x2c,0x61,0x70,0x70,0x6c,0x69,0x63, + 0x61,0x74,0x69,0x6f,0x6e,0x2f,0x78,0x6d, + 0x6c,0x3b,0x71,0x3d,0x30,0x2e,0x39,0x2c, + 0x2a,0x2f,0x2a,0x3b,0x71,0x3d,0x30,0x2e, + 0x38,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70, + 0x74,0x2d,0x4c,0x61,0x6e,0x67,0x75,0x61, + 0x67,0x65,0x3a,0x20,0x65,0x6e,0x2d,0x75, + 0x73,0x2c,0x65,0x6e,0x3b,0x71,0x3d,0x30, + 0x2e,0x35,0x0d,0x0a,0x41,0x63,0x63,0x65, + 0x70,0x74,0x2d,0x45,0x6e,0x63,0x6f,0x64, + 0x69,0x6e,0x67,0x3a,0x20,0x67,0x7a,0x69, + 0x70,0x2c,0x64,0x65,0x66,0x6c,0x61,0x74, + 0x65,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70, + 0x74,0x2d,0x43,0x68,0x61,0x72,0x73,0x65, + 0x74,0x3a,0x20,0x49,0x53,0x4f,0x2d,0x38, + 0x38,0x35,0x39,0x2d,0x31,0x2c,0x75,0x74, + 0x66,0x2d,0x38,0x3b,0x71,0x3d,0x30,0x2e, + 0x37,0x2c,0x2a,0x3b,0x71,0x3d,0x30,0x2e, + 0x37,0x0d,0x0a,0x4b,0x65,0x65,0x70,0x2d, + 0x41,0x6c,0x69,0x76,0x65,0x3a,0x20,0x33, + 0x30,0x30,0x0d,0x0a,0x43,0x6f,0x6e,0x6e, + 0x65,0x63,0x74,0x69,0x6f,0x6e,0x3a,0x20, + 0x6b,0x65,0x65,0x70,0x2d,0x61,0x6c,0x69, + 0x76,0x65,0x0d,0x0a,0x0d,0x0a }; /* end rawpkt1_ether */ + + p = PacketGetFromAlloc(); + if (unlikely(p == NULL)) + return 0; + DecodeThreadVars dtv; + ThreadVars th_v; + DetectEngineThreadCtx *det_ctx; + + memset(&th_v, 0, sizeof(th_v)); + + FlowInitConfig(FLOW_QUIET); + DecodeEthernet(&th_v, &dtv, p, rawpkt1_ether, sizeof(rawpkt1_ether)); + DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); + + /* At this point we have a list of 4 signatures. The last one + is a copy of the second one. If we receive a packet + with source 192.168.1.1 80, all the sids should match */ + + SigGroupBuild(de_ctx); + SigMatchSignatures(&th_v, de_ctx, det_ctx, p); + + /* only sid 2 should match with a packet going to 192.168.1.1 port 80 */ + if (PacketAlertCheck(p, 1) <= 0 && PacketAlertCheck(p, 3) <= 0 && + PacketAlertCheck(p, 2) == 1) { + result = 1; + } + + if (p != NULL) { + PacketRecycle(p); + } + FlowShutdown(); + DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx); + +end: + if (de_ctx != NULL) { + SigCleanSignatures(de_ctx); + SigGroupCleanup(de_ctx); + DetectEngineCtxFree(de_ctx); + } + + if (p != NULL) + SCFree(p); + return result; +} + +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation01 (void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + Signature *s = DetectEngineAppendSig(de_ctx, "alert tcp !any any -> any any (sid:1;)"); + FAIL_IF_NOT_NULL(s); + DetectEngineCtxFree(de_ctx); + PASS; +} + +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation02 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any !any -> any any (msg:\"SigTest41-02 src ip is !any \"; classtype:misc-activity; sid:410002; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation03 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any any -> any [80:!80] (msg:\"SigTest41-03 dst port [80:!80] \"; classtype:misc-activity; sid:410003; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation04 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any any -> any [80,!80] (msg:\"SigTest41-03 dst port [80:!80] \"; classtype:misc-activity; sid:410003; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation05 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any any -> [192.168.0.2,!192.168.0.2] any (msg:\"SigTest41-04 dst ip [192.168.0.2,!192.168.0.2] \"; classtype:misc-activity; sid:410004; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation06 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any any -> any [100:1000,!1:20000] (msg:\"SigTest41-05 dst port [100:1000,!1:20000] \"; classtype:misc-activity; sid:410005; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test check that we don't allow invalid negation options + */ +static int SigParseTestNegation07 (void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + Signature *s = DetectEngineAppendSig( + de_ctx, "alert tcp any any -> [192.168.0.2,!192.168.0.0/24] any (sid:410006;)"); + FAIL_IF_NOT_NULL(s); + DetectEngineCtxFree(de_ctx); + PASS; +} + +/** + * \test check valid negation bug 1079 + */ +static int SigParseTestNegation08 (void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tcp any any -> [192.168.0.0/16,!192.168.0.0/24] any (sid:410006; rev:1;)"); + if (s == NULL) { + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test mpm + */ +static int SigParseTestMpm01 (void) +{ + int result = 0; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp any any -> any any (msg:\"mpm test\"; content:\"abcd\"; sid:1;)"); + if (sig == NULL) { + printf("sig failed to init: "); + goto end; + } + + if (sig->init_data->smlists[DETECT_SM_LIST_PMATCH] == NULL) { + printf("sig doesn't have content list: "); + goto end; + } + + result = 1; +end: + if (sig != NULL) + SigFree(de_ctx, sig); + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test mpm + */ +static int SigParseTestMpm02 (void) +{ + int result = 0; + Signature *sig = NULL; + + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + + sig = SigInit(de_ctx, "alert tcp any any -> any any (msg:\"mpm test\"; content:\"abcd\"; content:\"abcdef\"; sid:1;)"); + if (sig == NULL) { + printf("sig failed to init: "); + goto end; + } + + if (sig->init_data->smlists[DETECT_SM_LIST_PMATCH] == NULL) { + printf("sig doesn't have content list: "); + goto end; + } + + result = 1; +end: + if (sig != NULL) + SigFree(de_ctx, sig); + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test test tls (app layer) rule + */ +static int SigParseTestAppLayerTLS01(void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS01 \"; sid:410006; rev:1;)"); + if (s == NULL) { + printf("parsing sig failed: "); + goto end; + } + + if (s->alproto == 0) { + printf("alproto not set: "); + goto end; + } + + result = 1; +end: + if (s != NULL) + SigFree(de_ctx, s); + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + + return result; +} + +/** + * \test test tls (app layer) rule + */ +static int SigParseTestAppLayerTLS02(void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS02 \"; tls.version:1.0; sid:410006; rev:1;)"); + if (s == NULL) { + printf("parsing sig failed: "); + goto end; + } + + if (s->alproto == 0) { + printf("alproto not set: "); + goto end; + } + + result = 1; +end: + if (s != NULL) + SigFree(de_ctx, s); + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +/** + * \test test tls (app layer) rule + */ +static int SigParseTestAppLayerTLS03(void) +{ + int result = 0; + DetectEngineCtx *de_ctx; + Signature *s=NULL; + + de_ctx = DetectEngineCtxInit(); + if (de_ctx == NULL) + goto end; + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS03 \"; tls.version:2.5; sid:410006; rev:1;)"); + if (s != NULL) { + SigFree(de_ctx, s); + goto end; + } + + result = 1; +end: + if (de_ctx != NULL) + DetectEngineCtxFree(de_ctx); + return result; +} + +static int SigParseTestUnbalancedQuotes01(void) +{ + DetectEngineCtx *de_ctx; + Signature *s; + + de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + + s = SigInit(de_ctx, + "alert http any any -> any any (msg:\"SigParseTestUnbalancedQuotes01\"; " + "pcre:\"/\\/[a-z]+\\.php\\?[a-z]+?=\\d{7}&[a-z]+?=\\d{7,8}$/U\" " + "flowbits:set,et.exploitkitlanding; classtype:trojan-activity; sid:2017078; rev:5;)"); + FAIL_IF_NOT_NULL(s); + + PASS; +} + +static int SigParseTestContentGtDsize01(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + + Signature *s = SigInit(de_ctx, + "alert http any any -> any any (" + "dsize:21; content:\"0123456789001234567890|00 00|\"; " + "sid:1; rev:1;)"); + FAIL_IF_NOT_NULL(s); + + PASS; +} + +static int SigParseTestContentGtDsize02(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + + Signature *s = SigInit(de_ctx, + "alert http any any -> any any (" + "dsize:21; content:\"0123456789|00 00|\"; offset:10; " + "sid:1; rev:1;)"); + FAIL_IF_NOT_NULL(s); + + PASS; +} + +static int CountSigsWithSid(const DetectEngineCtx *de_ctx, const uint32_t sid) +{ + int cnt = 0; + for (Signature *s = de_ctx->sig_list; s != NULL; s = s->next) { + if (sid == s->id) + cnt++; + } + return cnt; +} + +static int SigParseBidirWithSameSrcAndDest01(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + + Signature *s = DetectEngineAppendSig(de_ctx, "alert tcp any any <> any any (sid:1;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 1) == 1); + FAIL_IF(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + s = DetectEngineAppendSig(de_ctx, "alert tcp any [80, 81] <> any [81, 80] (sid:2;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 2) == 1); + FAIL_IF(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + s = DetectEngineAppendSig(de_ctx, + "alert tcp [1.2.3.4, 5.6.7.8] [80, 81] <> [5.6.7.8, 1.2.3.4] [81, 80] (sid:3;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 3) == 1); + FAIL_IF(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + DetectEngineCtxFree(de_ctx); + PASS; +} + +static int SigParseBidirWithSameSrcAndDest02(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + de_ctx->flags |= DE_QUIET; + + // Source is a subset of destination + Signature *s = DetectEngineAppendSig( + de_ctx, "alert tcp 1.2.3.4 any <> [1.2.3.4, 5.6.7.8, ::1] any (sid:1;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 1) == 2); + FAIL_IF_NOT(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + // Source is a subset of destination + s = DetectEngineAppendSig( + de_ctx, "alert tcp [1.2.3.4, ::1] [80, 81, 82] <> [1.2.3.4, ::1] [80, 81] (sid:2;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 2) == 2); + FAIL_IF_NOT(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + // Source intersects with destination + s = DetectEngineAppendSig(de_ctx, + "alert tcp [1.2.3.4, ::1, ABCD:AAAA::1] [80] <> [1.2.3.4, ::1] [80, 81] (sid:3;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 3) == 2); + FAIL_IF_NOT(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + // mix in negation, these are the same + s = DetectEngineAppendSig( + de_ctx, "alert tcp [!1.2.3.4, 1.2.3.0/24] any <> [1.2.3.0/24, !1.2.3.4] any (sid:4;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 4) == 1); + FAIL_IF(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + // mix in negation, these are not the same + s = DetectEngineAppendSig( + de_ctx, "alert tcp [1.2.3.4, 1.2.3.0/24] any <> [1.2.3.0/24, !1.2.3.4] any (sid:5;)"); + FAIL_IF_NULL(s); + FAIL_IF_NOT(CountSigsWithSid(de_ctx, 5) == 2); + FAIL_IF_NOT(s->init_data->init_flags & SIG_FLAG_INIT_BIDIREC); + + DetectEngineCtxFree(de_ctx); + PASS; +} + +static int SigParseTestActionReject(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + + Signature *sig = DetectEngineAppendSig( + de_ctx, "reject tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1;)"); +#ifdef HAVE_LIBNET11 + FAIL_IF_NULL(sig); + FAIL_IF_NOT((sig->action & (ACTION_DROP | ACTION_REJECT)) == (ACTION_DROP | ACTION_REJECT)); +#else + FAIL_IF_NOT_NULL(sig); +#endif + + DetectEngineCtxFree(de_ctx); + PASS; +} + +static int SigParseTestActionDrop(void) +{ + DetectEngineCtx *de_ctx = DetectEngineCtxInit(); + FAIL_IF_NULL(de_ctx); + + Signature *sig = DetectEngineAppendSig( + de_ctx, "drop tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1;)"); + FAIL_IF_NULL(sig); + FAIL_IF_NOT(sig->action & ACTION_DROP); + + DetectEngineCtxFree(de_ctx); + PASS; +} + +#endif /* UNITTESTS */ + +#ifdef UNITTESTS +void DetectParseRegisterTests (void); +#include "tests/detect-parse.c" +#endif + +void SigParseRegisterTests(void) +{ +#ifdef UNITTESTS + DetectParseRegisterTests(); + + UtRegisterTest("SigParseTest01", SigParseTest01); + UtRegisterTest("SigParseTest02", SigParseTest02); + UtRegisterTest("SigParseTest03", SigParseTest03); + UtRegisterTest("SigParseTest04", SigParseTest04); + UtRegisterTest("SigParseTest05", SigParseTest05); + UtRegisterTest("SigParseTest06", SigParseTest06); + UtRegisterTest("SigParseTest07", SigParseTest07); + UtRegisterTest("SigParseTest08", SigParseTest08); + UtRegisterTest("SigParseTest09", SigParseTest09); + UtRegisterTest("SigParseTest10", SigParseTest10); + UtRegisterTest("SigParseTest11", SigParseTest11); + UtRegisterTest("SigParseTest12", SigParseTest12); + UtRegisterTest("SigParseTest13", SigParseTest13); + UtRegisterTest("SigParseTest14", SigParseTest14); + UtRegisterTest("SigParseTest15", SigParseTest15); + UtRegisterTest("SigParseTest16", SigParseTest16); + UtRegisterTest("SigParseTest17", SigParseTest17); + UtRegisterTest("SigParseTest18", SigParseTest18); + UtRegisterTest("SigParseTest19", SigParseTest19); + UtRegisterTest("SigParseTest20", SigParseTest20); + UtRegisterTest("SigParseTest21 -- address with space", SigParseTest21); + UtRegisterTest("SigParseTest22 -- address with space", SigParseTest22); + UtRegisterTest("SigParseTest23 -- carriage return", SigParseTest23); + + UtRegisterTest("SigParseBidirecTest06", SigParseBidirecTest06); + UtRegisterTest("SigParseBidirecTest07", SigParseBidirecTest07); + UtRegisterTest("SigParseBidirecTest08", SigParseBidirecTest08); + UtRegisterTest("SigParseBidirecTest09", SigParseBidirecTest09); + UtRegisterTest("SigParseBidirecTest10", SigParseBidirecTest10); + UtRegisterTest("SigParseBidirecTest11", SigParseBidirecTest11); + UtRegisterTest("SigParseBidirecTest12", SigParseBidirecTest12); + UtRegisterTest("SigParseBidirecTest13", SigParseBidirecTest13); + UtRegisterTest("SigParseBidirecTest14", SigParseBidirecTest14); + UtRegisterTest("SigTestBidirec01", SigTestBidirec01); + UtRegisterTest("SigTestBidirec02", SigTestBidirec02); + UtRegisterTest("SigTestBidirec03", SigTestBidirec03); + UtRegisterTest("SigTestBidirec04", SigTestBidirec04); + UtRegisterTest("SigParseTestNegation01", SigParseTestNegation01); + UtRegisterTest("SigParseTestNegation02", SigParseTestNegation02); + UtRegisterTest("SigParseTestNegation03", SigParseTestNegation03); + UtRegisterTest("SigParseTestNegation04", SigParseTestNegation04); + UtRegisterTest("SigParseTestNegation05", SigParseTestNegation05); + UtRegisterTest("SigParseTestNegation06", SigParseTestNegation06); + UtRegisterTest("SigParseTestNegation07", SigParseTestNegation07); + UtRegisterTest("SigParseTestNegation08", SigParseTestNegation08); + UtRegisterTest("SigParseTestMpm01", SigParseTestMpm01); + UtRegisterTest("SigParseTestMpm02", SigParseTestMpm02); + UtRegisterTest("SigParseTestAppLayerTLS01", SigParseTestAppLayerTLS01); + UtRegisterTest("SigParseTestAppLayerTLS02", SigParseTestAppLayerTLS02); + UtRegisterTest("SigParseTestAppLayerTLS03", SigParseTestAppLayerTLS03); + UtRegisterTest("SigParseTestUnbalancedQuotes01", SigParseTestUnbalancedQuotes01); + + UtRegisterTest("SigParseTestContentGtDsize01", + SigParseTestContentGtDsize01); + UtRegisterTest("SigParseTestContentGtDsize02", + SigParseTestContentGtDsize02); + + UtRegisterTest("SigParseBidirWithSameSrcAndDest01", + SigParseBidirWithSameSrcAndDest01); + UtRegisterTest("SigParseBidirWithSameSrcAndDest02", + SigParseBidirWithSameSrcAndDest02); + UtRegisterTest("SigParseTestActionReject", SigParseTestActionReject); + UtRegisterTest("SigParseTestActionDrop", SigParseTestActionDrop); +#endif /* UNITTESTS */ +} |