✨ feat(integration decoders): http and glimpse_detector
compile pass, todo test
This commit is contained in:
152
decoders/glimpse_detector/libprotoident/tcp/lpi_ftpdata.cc
Normal file
152
decoders/glimpse_detector/libprotoident/tcp/lpi_ftpdata.cc
Normal file
@@ -0,0 +1,152 @@
|
||||
/*
|
||||
*
|
||||
* Copyright (c) 2011-2016 The University of Waikato, Hamilton, New Zealand.
|
||||
* All rights reserved.
|
||||
*
|
||||
* This file is part of libprotoident.
|
||||
*
|
||||
* This code has been developed by the University of Waikato WAND
|
||||
* research group. For further information please see http://www.wand.net.nz/
|
||||
*
|
||||
* libprotoident is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Lesser General Public License as published by
|
||||
* the Free Software Foundation; either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* libprotoident is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Lesser General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Lesser General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*
|
||||
*/
|
||||
|
||||
#include <string.h>
|
||||
|
||||
#include "libprotoident.h"
|
||||
#include "proto_manager.h"
|
||||
#include "proto_common.h"
|
||||
|
||||
static inline bool match_bulk_response(uint32_t payload, uint32_t len) {
|
||||
|
||||
/* Most FTP-style transactions result in no packets being sent back
|
||||
* to server (aside from ACKs) */
|
||||
|
||||
if (len == 0)
|
||||
return true;
|
||||
|
||||
/* However, there is at least one FTP client that sends some sort of
|
||||
* sequence number back to the server - maybe allowing for resumption
|
||||
* of paused transfers?
|
||||
*
|
||||
* XXX This seems to be related to completely failing to implement the
|
||||
* FTP protocol correctly. There is usually a flow preceding these
|
||||
* flows that sends commands like "get" and "dir" to the server,
|
||||
* which are not actually part of the FTP protocol. Instead, these
|
||||
* are often commands typed into FTP CLI clients that are converted
|
||||
* into the appropriate FTP commands. No idea what software is doing
|
||||
* this, but it is essentially emulating FTP so I'll keep it in here
|
||||
* for now.
|
||||
* */
|
||||
|
||||
if (len == 4 && MATCH(payload, 0x00, 0x00, ANY, ANY))
|
||||
return true;
|
||||
|
||||
|
||||
/* Another weird FTP client: sends the occasional one byte response */
|
||||
if (len == 1 && MATCH(payload, 0x00, 0x00, 0x00, 0x00))
|
||||
return true;
|
||||
return false;
|
||||
|
||||
}
|
||||
|
||||
|
||||
/* Bulk download covers files being downloaded through a separate channel,
|
||||
* like FTP data. We identify these by observing file type identifiers at the
|
||||
* start of the packet. This is not a protocol in itself, but it's almost
|
||||
* certainly FTP.
|
||||
*/
|
||||
static inline bool match_bulk_download(lpi_data_t *data) {
|
||||
|
||||
if (match_bulk_response(data->payload[1], data->payload_len[1]) &&
|
||||
(data->observed[0] == 0 && (data->payload[0])))
|
||||
return true;
|
||||
if (match_bulk_response(data->payload[0], data->payload_len[0]) &&
|
||||
(data->observed[1] == 0 && match_file_header(data->payload[1])))
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
static inline bool match_directory(lpi_data_t *data) {
|
||||
|
||||
/* FTP Data can start with directory permissions */
|
||||
if ( (MATCH(data->payload[0], '-', ANY, ANY, ANY) ||
|
||||
MATCH(data->payload[0], 'd', ANY, ANY, ANY)) &&
|
||||
(MATCH(data->payload[0], ANY, '-', ANY, ANY) ||
|
||||
MATCH(data->payload[0], ANY, 'r', ANY, ANY)) &&
|
||||
(MATCH(data->payload[0], ANY, ANY, '-', ANY) ||
|
||||
MATCH(data->payload[0], ANY, ANY, 'w', ANY)) &&
|
||||
(MATCH(data->payload[0], ANY, ANY, ANY, '-') ||
|
||||
MATCH(data->payload[0], ANY, ANY, ANY, 'x')) )
|
||||
|
||||
return true;
|
||||
|
||||
if ( (MATCH(data->payload[1], '-', ANY, ANY, ANY) ||
|
||||
MATCH(data->payload[1], 'd', ANY, ANY, ANY)) &&
|
||||
(MATCH(data->payload[1], ANY, '-', ANY, ANY) ||
|
||||
MATCH(data->payload[1], ANY, 'r', ANY, ANY)) &&
|
||||
(MATCH(data->payload[1], ANY, ANY, '-', ANY) ||
|
||||
MATCH(data->payload[1], ANY, ANY, 'w', ANY)) &&
|
||||
(MATCH(data->payload[1], ANY, ANY, ANY, '-') ||
|
||||
MATCH(data->payload[1], ANY, ANY, ANY, 'x')) )
|
||||
|
||||
return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
static inline bool match_ftp_data(lpi_data_t *data, lpi_module_t *mod UNUSED) {
|
||||
|
||||
if (match_bulk_download(data))
|
||||
return true;
|
||||
|
||||
/* XXX All rules below this are for one-way exchanges only */
|
||||
if (data->payload_len[0] > 0 && data->payload_len[1] > 0)
|
||||
return false;
|
||||
|
||||
/* All rules for ftp data are for first observed data only */
|
||||
if(data->observed[0] != 0 || data->observed[1] != 0)
|
||||
return false;
|
||||
|
||||
if (match_directory(data))
|
||||
return true;
|
||||
|
||||
/* Virus definition updates from CA are delivered via FTP */
|
||||
if (match_str_either(data, "Viru"))
|
||||
return true;
|
||||
|
||||
/* XXX - I hate having to look at port numbers but there are no
|
||||
* useful headers in FTP data exchanges; all the FTP protocol stuff
|
||||
* is done using the control channel */
|
||||
if (data->client_port == 20 || data->server_port == 20)
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
static lpi_module_t lpi_ftpdata = {
|
||||
LPI_PROTO_FTP_DATA,
|
||||
LPI_CATEGORY_FILES,
|
||||
"FTP_Data",
|
||||
7, /* Some of these rules rely on port numbers and one-way data, so
|
||||
* should have a lower priority than more concrete rules */
|
||||
match_ftp_data
|
||||
};
|
||||
|
||||
void register_ftpdata(LPIModuleMap *mod_map) {
|
||||
register_protocol(&lpi_ftpdata, mod_map);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user