/* Copyright (C) 2007-2021 Open Information Security Foundation * * You can copy, redistribute or modify this Program under the terms of * the GNU General Public License version 2 as published by the Free * Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * version 2 along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA * 02110-1301, USA. */ /** * \ingroup httplayer * * @{ */ /** \file * * \author Anoop Saldanha * \author Victor Julien * * \brief Handle HTTP user agent match * */ #include "suricata-common.h" #include "suricata.h" #include "flow-util.h" #include "flow.h" #include "app-layer-parser.h" #include "util-unittest.h" #include "util-unittest-helper.h" #include "app-layer.h" #include "app-layer-htp.h" #include "app-layer-protos.h" #include "detect-engine-build.h" #include "detect-engine-alert.h" static int DetectEngineHttpUATest( const uint8_t *buf, const uint32_t buf_len, const char *sig, const bool expect) { TcpSession ssn; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); FAIL_IF_NULL(alp_tctx); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); Packet *p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FAIL_IF_NULL(p); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, sig); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); FAIL_IF_NULL(det_ctx); int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, buf, buf_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); bool match = PacketAlertCheck(p, 1); FAIL_IF_NOT(match == expect); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p, 1); PASS; } static int DetectEngineHttpUATest01(void) { uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CONNECT\"; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest02(void) { uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CO\"; depth:4; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest03(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http_user_agent test\"; " "content:!\"ECT\"; depth:4; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest04(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"ECT\"; depth:4; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest05(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:!\"CON\"; depth:4; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest06(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"ECT\"; offset:3; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest07(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:!\"CO\"; offset:3; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest08(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:!\"ECT\"; offset:3; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest09(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CON\"; offset:3; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest10(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http_user_agent test\"; " "content:\"CO\"; http_user_agent; " "content:\"EC\"; within:4; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest11(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CO\"; http_user_agent; " "content:!\"EC\"; within:3; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest12(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http_user_agent test\"; " "content:\"CO\"; http_user_agent; " "content:\"EC\"; within:3; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest13(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CO\"; http_user_agent; " "content:!\"EC\"; within:4; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest14(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http_user_agent test\"; " "content:\"CO\"; http_user_agent; " "content:\"EC\"; distance:2; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest15(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CO\"; http_user_agent; " "content:!\"EC\"; distance:3; http_user_agent; " "sid:1;)", true); } static int DetectEngineHttpUATest16(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"CO\"; http_user_agent; " "content:\"EC\"; distance:3; http_user_agent; " "sid:1;)", false); } static int DetectEngineHttpUATest17(void) { uint8_t http_buf[] = "CONNECT /index.html HTTP/1.0\r\n" "User-Agent: CONNECT\r\n" "Host: www.onetwothreefourfivesixseven.org\r\n\r\n"; uint32_t http_len = sizeof(http_buf) - 1; return DetectEngineHttpUATest(http_buf, http_len, "alert http any any -> any any " "(msg:\"http_user_agent test\"; " "content:\"CO\"; http_user_agent; " "content:!\"EC\"; distance:2; http_user_agent; " "sid:1;)", false); } static int DetectHttpUATestSigParse(const char *sig, const bool expect) { DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, sig); bool parsed = (s != NULL); FAIL_IF_NOT(parsed == expect); DetectEngineCtxFree(de_ctx); PASS; } /** * \test Test that a signature containing a http_user_agent is correctly parsed * and the keyword is registered. */ static int DetectHttpUATest01(void) { return DetectHttpUATestSigParse("alert tcp any any -> any any " "(msg:\"Testing http_user_agent\"; " "content:\"one\"; http_user_agent; sid:1;)", true); } /** * \test Test that a signature containing an valid http_user_agent entry is * parsed. */ static int DetectHttpUATest02(void) { return DetectHttpUATestSigParse("alert tcp any any -> any any " "(msg:\"Testing http_user_agent\"; " "content:\"one\"; http_user_agent:; sid:1;)", true); } /** * \test Test that an invalid signature containing no content but a * http_user_agent is invalidated. */ static int DetectHttpUATest03(void) { return DetectHttpUATestSigParse("alert tcp any any -> any any " "(msg:\"Testing http_user_agent\"; " "http_user_agent; sid:1;)", false); } /** * \test Test that an invalid signature containing a rawbytes along with a * http_user_agent is invalidated. */ static int DetectHttpUATest04(void) { return DetectHttpUATestSigParse("alert tcp any any -> any any " "(msg:\"Testing http_user_agent\"; " "content:\"one\"; rawbytes; http_user_agent; sid:1;)", false); } /** * \test Test that a http_user_agent with nocase is parsed. */ static int DetectHttpUATest05(void) { return DetectHttpUATestSigParse("alert tcp any any -> any any " "(msg:\"Testing http_user_agent\"; " "content:\"one\"; http_user_agent; nocase; sid:1;)", true); } /** *\test Test that the http_user_agent content matches against a http request * which holds the content. */ static int DetectHttpUATest06(void) { TcpSession ssn; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy message body\r\n" "Content-Type: text/html\r\n" "\r\n"; uint32_t http_len = sizeof(http_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); Packet *p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FAIL_IF_NULL(p); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW | PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"message\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF_NOT(PacketAlertCheck(p, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p, 1); PASS; } /** *\test Test that the http_user_agent content matches against a http request * which holds the content. */ static int DetectHttpUATest07(void) { TcpSession ssn; Packet *p1 = NULL; Packet *p2 = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http1_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy message"; uint8_t http2_buf[] = "body1\r\n\r\n"; uint32_t http1_len = sizeof(http1_buf) - 1; uint32_t http2_len = sizeof(http2_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p1->flow = &f; p1->flowflags |= FLOW_PKT_TOSERVER; p1->flowflags |= FLOW_PKT_ESTABLISHED; p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; p2->flow = &f; p2->flowflags |= FLOW_PKT_TOSERVER; p2->flowflags |= FLOW_PKT_ESTABLISHED; p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"message\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1); FAIL_IF(PacketAlertCheck(p1, 1)); r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2); FAIL_IF_NOT(PacketAlertCheck(p2, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p1, 1); UTHFreePackets(&p2, 1); PASS; } /** *\test Test that the http_user_agent content matches against a http request * which holds the content. */ static int DetectHttpUATest08(void) { TcpSession ssn; Packet *p1 = NULL; Packet *p2 = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http1_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy mess"; uint8_t http2_buf[] = "age body\r\n\r\n"; uint32_t http1_len = sizeof(http1_buf) - 1; uint32_t http2_len = sizeof(http2_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p1->flow = &f; p1->flowflags |= FLOW_PKT_TOSERVER; p1->flowflags |= FLOW_PKT_ESTABLISHED; p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; p2->flow = &f; p2->flowflags |= FLOW_PKT_TOSERVER; p2->flowflags |= FLOW_PKT_ESTABLISHED; p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"message\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1); FAIL_IF(PacketAlertCheck(p1, 1)); r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2); FAIL_IF_NOT(PacketAlertCheck(p2, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p1, 1); UTHFreePackets(&p2, 1); PASS; } /** *\test Test that the http_user_agent content matches against a http request * which holds the content, against a cross boundary present pattern. */ static int DetectHttpUATest09(void) { TcpSession ssn; Packet *p1 = NULL; Packet *p2 = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http1_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy body1"; uint8_t http2_buf[] = "This is dummy message body2\r\n" "Content-Type: text/html\r\n" "Content-Length: 46\r\n" "\r\n" "This is dummy body1"; uint32_t http1_len = sizeof(http1_buf) - 1; uint32_t http2_len = sizeof(http2_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p1->flow = &f; p1->flowflags |= FLOW_PKT_TOSERVER; p1->flowflags |= FLOW_PKT_ESTABLISHED; p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; p2->flow = &f; p2->flowflags |= FLOW_PKT_TOSERVER; p2->flowflags |= FLOW_PKT_ESTABLISHED; p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"body1This\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1); FAIL_IF(PacketAlertCheck(p1, 1)); r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2); FAIL_IF_NOT(PacketAlertCheck(p2, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p1, 1); UTHFreePackets(&p2, 1); PASS; } /** *\test Test that the http_user_agent content matches against a http request * against a case insensitive pattern. */ static int DetectHttpUATest10(void) { TcpSession ssn; Packet *p1 = NULL; Packet *p2 = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http1_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy bodY1"; uint8_t http2_buf[] = "This is dummy message body2\r\n" "Content-Type: text/html\r\n" "Content-Length: 46\r\n" "\r\n" "This is dummy bodY1"; uint32_t http1_len = sizeof(http1_buf) - 1; uint32_t http2_len = sizeof(http2_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p1->flow = &f; p1->flowflags |= FLOW_PKT_TOSERVER; p1->flowflags |= FLOW_PKT_ESTABLISHED; p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; p2->flow = &f; p2->flowflags |= FLOW_PKT_TOSERVER; p2->flowflags |= FLOW_PKT_ESTABLISHED; p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"body1this\"; http_user_agent; nocase;" "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http1_buf, http1_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1); FAIL_IF(PacketAlertCheck(p1, 1)); r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http2_buf, http2_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2); FAIL_IF_NOT(PacketAlertCheck(p2, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p1, 1); UTHFreePackets(&p2, 1); PASS; } /** *\test Test that the negated http_user_agent content matches against a * http request which doesn't hold the content. */ static int DetectHttpUATest11(void) { TcpSession ssn; Packet *p = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy message body\r\n" "Content-Type: text/html\r\n" "\r\n"; uint32_t http_len = sizeof(http_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:!\"message\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p, 1); PASS; } /** *\test Negative test that the negated http_user_agent content matches against a * http request which holds hold the content. */ static int DetectHttpUATest12(void) { TcpSession ssn; Packet *p = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: This is dummy body\r\n" "\r\n"; uint32_t http_len = sizeof(http_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:!\"message\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF_NOT(PacketAlertCheck(p, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p, 1); PASS; } /** * \test Test that the http_user_agent content matches against a http request * which holds the content. */ static int DetectHttpUATest13(void) { TcpSession ssn; Packet *p = NULL; ThreadVars th_v; DetectEngineThreadCtx *det_ctx = NULL; Flow f; uint8_t http_buf[] = "GET /index.html HTTP/1.0\r\n" "Host: www.openinfosecfoundation.org\r\n" "User-Agent: longbufferabcdefghijklmnopqrstuvwxyz0123456789bufferend\r\n" "Content-Type: text/html\r\n" "\r\n"; uint32_t http_len = sizeof(http_buf) - 1; AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; Signature *s = DetectEngineAppendSig(de_ctx, "alert http any any -> any any " "(msg:\"http user agent test\"; " "content:\"abcdefghijklmnopqrstuvwxyz0123456789\"; http_user_agent; " "sid:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, http_buf, http_len); FAIL_IF_NOT(r == 0); FAIL_IF_NULL(f.alstate); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF_NOT(PacketAlertCheck(p, 1)); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePackets(&p, 1); PASS; } /** * \test multiple http transactions and body chunks of request handling */ static int DetectHttpUATest14(void) { Signature *s = NULL; DetectEngineThreadCtx *det_ctx = NULL; ThreadVars th_v; Flow f; TcpSession ssn; Packet *p = NULL; uint8_t httpbuf1[] = "POST / HTTP/1.1\r\n"; uint8_t httpbuf2[] = "Cookie: dummy1\r\n"; uint8_t httpbuf3[] = "User-Agent: Body one!!\r\n\r\n"; uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */ uint32_t httplen3 = sizeof(httpbuf3) - 1; /* minus the \0 */ uint8_t httpbuf4[] = "GET /?var=val HTTP/1.1\r\n"; uint8_t httpbuf5[] = "Cookie: dummy2\r\n"; uint8_t httpbuf6[] = "User-Agent: Body two\r\n\r\n"; uint32_t httplen4 = sizeof(httpbuf4) - 1; /* minus the \0 */ uint32_t httplen5 = sizeof(httpbuf5) - 1; /* minus the \0 */ uint32_t httplen6 = sizeof(httpbuf6) - 1; /* minus the \0 */ AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc(); memset(&th_v, 0, sizeof(th_v)); memset(&f, 0, sizeof(f)); memset(&ssn, 0, sizeof(ssn)); p = UTHBuildPacket(NULL, 0, IPPROTO_TCP); FLOW_INITIALIZE(&f); f.protoctx = (void *)&ssn; f.proto = IPPROTO_TCP; f.flags |= FLOW_IPV4; p->flow = &f; p->flowflags |= FLOW_PKT_TOSERVER; p->flowflags |= FLOW_PKT_ESTABLISHED; p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST; f.alproto = ALPROTO_HTTP1; StreamTcpInitConfig(true); DetectEngineCtx *de_ctx = DetectEngineCtxInit(); FAIL_IF_NULL(de_ctx); de_ctx->flags |= DE_QUIET; s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"POST\"; http_method; content:\"dummy1\"; http_cookie; content:\"Body one\"; http_user_agent; sid:1; rev:1;)"); FAIL_IF_NULL(s); s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"GET\"; http_method; content:\"dummy2\"; http_cookie; content:\"Body two\"; http_user_agent; sid:2; rev:1;)"); FAIL_IF_NULL(s); SigGroupBuild(de_ctx); DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx); int r = AppLayerParserParse( NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf1, httplen1); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf2, httplen2); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf3, httplen3); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF_NOT(PacketAlertCheck(p, 1)); p->alerts.cnt = 0; r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf4, httplen4); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); FAIL_IF(PacketAlertCheck(p, 2)); r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf5, httplen5); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); FAIL_IF(PacketAlertCheck(p, 2)); SCLogDebug("sending data chunk 7"); r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_HTTP1, STREAM_TOSERVER, httpbuf6, httplen6); FAIL_IF_NOT(r == 0); /* do detect */ SigMatchSignatures(&th_v, de_ctx, det_ctx, p); FAIL_IF(PacketAlertCheck(p, 1)); FAIL_IF_NOT(PacketAlertCheck(p, 2)); p->alerts.cnt = 0; HtpState *htp_state = f.alstate; FAIL_IF_NULL(htp_state); FAIL_IF_NOT(AppLayerParserGetTxCnt(&f, htp_state) == 2); AppLayerParserThreadCtxFree(alp_tctx); DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx); DetectEngineCtxFree(de_ctx); StreamTcpFreeConfig(true); FLOW_DESTROY(&f); UTHFreePacket(p); PASS; } static void DetectHttpUARegisterTests(void) { UtRegisterTest("DetectEngineHttpUATest01", DetectEngineHttpUATest01); UtRegisterTest("DetectEngineHttpUATest02", DetectEngineHttpUATest02); UtRegisterTest("DetectEngineHttpUATest03", DetectEngineHttpUATest03); UtRegisterTest("DetectEngineHttpUATest04", DetectEngineHttpUATest04); UtRegisterTest("DetectEngineHttpUATest05", DetectEngineHttpUATest05); UtRegisterTest("DetectEngineHttpUATest06", DetectEngineHttpUATest06); UtRegisterTest("DetectEngineHttpUATest07", DetectEngineHttpUATest07); UtRegisterTest("DetectEngineHttpUATest08", DetectEngineHttpUATest08); UtRegisterTest("DetectEngineHttpUATest09", DetectEngineHttpUATest09); UtRegisterTest("DetectEngineHttpUATest10", DetectEngineHttpUATest10); UtRegisterTest("DetectEngineHttpUATest11", DetectEngineHttpUATest11); UtRegisterTest("DetectEngineHttpUATest12", DetectEngineHttpUATest12); UtRegisterTest("DetectEngineHttpUATest13", DetectEngineHttpUATest13); UtRegisterTest("DetectEngineHttpUATest14", DetectEngineHttpUATest14); UtRegisterTest("DetectEngineHttpUATest15", DetectEngineHttpUATest15); UtRegisterTest("DetectEngineHttpUATest16", DetectEngineHttpUATest16); UtRegisterTest("DetectEngineHttpUATest17", DetectEngineHttpUATest17); UtRegisterTest("DetectHttpUATest01", DetectHttpUATest01); UtRegisterTest("DetectHttpUATest02", DetectHttpUATest02); UtRegisterTest("DetectHttpUATest03", DetectHttpUATest03); UtRegisterTest("DetectHttpUATest04", DetectHttpUATest04); UtRegisterTest("DetectHttpUATest05", DetectHttpUATest05); UtRegisterTest("DetectHttpUATest06", DetectHttpUATest06); UtRegisterTest("DetectHttpUATest07", DetectHttpUATest07); UtRegisterTest("DetectHttpUATest08", DetectHttpUATest08); UtRegisterTest("DetectHttpUATest09", DetectHttpUATest09); UtRegisterTest("DetectHttpUATest10", DetectHttpUATest10); UtRegisterTest("DetectHttpUATest11", DetectHttpUATest11); UtRegisterTest("DetectHttpUATest12", DetectHttpUATest12); UtRegisterTest("DetectHttpUATest13", DetectHttpUATest13); UtRegisterTest("DetectHttpUATest14", DetectHttpUATest14); } /** * @} */