支持CIDR格式的IP。
This commit is contained in:
@@ -186,7 +186,7 @@ int Maat_table_callback_register(Maat_feather_t feather,short table_id,
|
||||
enum MAAT_SCAN_OPT
|
||||
{
|
||||
MAAT_SET_SCAN_DISTRICT=1, //VALUE is a const char*,SIZE= strlen(string). DEFAULT: no default.
|
||||
MAAT_SET_SCAN_LAST_REGION //VALUE is NULL, SIZE=0. This option indicates that the follow scan is the last region of current scan cobination.
|
||||
MAAT_SET_SCAN_LAST_REGION //VALUE is NULL, SIZE=0. This option indicates that the follow scan is the last region of current scan combination.
|
||||
};
|
||||
//return 0 if success, return -1 when failed;
|
||||
int Maat_set_scan_status(Maat_feather_t feather,scan_status_t* mid,enum MAAT_SCAN_OPT type,const void* value,int size);
|
||||
@@ -209,7 +209,7 @@ int Maat_full_scan_string(Maat_feather_t feather,int table_id
|
||||
,enum MAAT_CHARSET charset,const char* data,int data_len
|
||||
,struct Maat_rule_t*result,int* found_pos,int rule_num
|
||||
,scan_status_t* mid,int thread_num);
|
||||
//hite_detail could be NULL if unconcern
|
||||
//hit_detail could be NULL if not cared.
|
||||
int Maat_full_scan_string_detail(Maat_feather_t feather,int table_id
|
||||
,enum MAAT_CHARSET charset,const char* data,int data_len
|
||||
,struct Maat_rule_t*result,int rule_num,struct Maat_hit_detail_t *hit_detail,int detail_num
|
||||
@@ -220,7 +220,7 @@ int Maat_stream_scan_string(stream_para_t* stream_para
|
||||
,enum MAAT_CHARSET charset,const char* data,int data_len
|
||||
,struct Maat_rule_t*result,int* found_pos,int rule_num
|
||||
,scan_status_t* mid);
|
||||
//hited_detail could be NULL if unconcern
|
||||
//hited_detail could be NULL if not cared.
|
||||
int Maat_stream_scan_string_detail(stream_para_t* stream_para
|
||||
,enum MAAT_CHARSET charset,const char* data,int data_len
|
||||
,struct Maat_rule_t*result,int rule_num,struct Maat_hit_detail_t *hit_detail,int detail_num
|
||||
|
||||
@@ -2894,6 +2894,7 @@ enum MAAT_IP_FORMAT
|
||||
{
|
||||
FORMAT_RANGE,
|
||||
FORMAT_MASK,
|
||||
FORMAT_CIDR,
|
||||
FORMAT_UNKNOWN
|
||||
};
|
||||
enum MAAT_IP_FORMAT ip_format_str2int(const char* format)
|
||||
@@ -2906,21 +2907,124 @@ enum MAAT_IP_FORMAT ip_format_str2int(const char* format)
|
||||
{
|
||||
return FORMAT_MASK;
|
||||
}
|
||||
else if(0==strcasecmp(format, "CIDR"))
|
||||
{
|
||||
return FORMAT_CIDR;
|
||||
}
|
||||
else
|
||||
{
|
||||
assert(0);
|
||||
}
|
||||
return FORMAT_UNKNOWN;
|
||||
}
|
||||
void ipv6_mask2range(const unsigned int ip[], unsigned int mask[], unsigned int range_begin[], unsigned int range_end[])
|
||||
int ip_format2range(int ip_type, enum MAAT_IP_FORMAT format, const char* ip1, const char* ip2, unsigned int range_begin[], unsigned int range_end[])
|
||||
{
|
||||
int i=0;
|
||||
unsigned int ipv4_addr=0, ipv4_mask=0, ipv4_range_end=0;
|
||||
unsigned int ipv6_addr[4]={0}, ipv6_mask[4]={0}, ipv6_range_end[4]={0};
|
||||
int cidr=0, bit32=0;
|
||||
int ret=0, i=0;
|
||||
if(ip_type!=4 && ip_type!=6)
|
||||
{
|
||||
assert(0);
|
||||
return -1;
|
||||
}
|
||||
if(ip_type==4)
|
||||
{
|
||||
ret=inet_pton(AF_INET, ip1, &ipv4_addr);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv4_addr=ntohl(ipv4_addr);
|
||||
switch (format)
|
||||
{
|
||||
case FORMAT_RANGE:
|
||||
range_begin[0]=ipv4_addr;
|
||||
ret=inet_pton(AF_INET, ip2, &ipv4_range_end);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv4_range_end=ntohl(ipv4_range_end);
|
||||
range_end[0]=ipv4_range_end;
|
||||
break;
|
||||
case FORMAT_MASK:
|
||||
ret=inet_pton(AF_INET, ip2, &ipv4_mask);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv4_mask=ntohl(ipv4_mask);
|
||||
range_begin[0]=ipv4_addr&ipv4_mask;
|
||||
range_end[0]=ipv4_addr|~ipv4_mask;
|
||||
break;
|
||||
case FORMAT_CIDR:
|
||||
cidr=atoi(ip2);
|
||||
if(cidr>32||cidr<0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv4_mask = (0xFFFFFFFFUL << (32 - cidr)) & 0xFFFFFFFFUL;
|
||||
range_begin[0]=ipv4_addr&ipv4_mask;
|
||||
range_end[0]=ipv4_addr|~ipv4_mask;
|
||||
break;
|
||||
default:
|
||||
assert(0);
|
||||
}
|
||||
}
|
||||
else //ipv6
|
||||
{
|
||||
ret=inet_pton(AF_INET6, ip1, ipv6_addr);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv6_ntoh(ipv6_addr);
|
||||
switch(format)
|
||||
{
|
||||
case FORMAT_RANGE:
|
||||
ret=inet_pton(AF_INET6, ip2, ipv6_range_end);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv6_ntoh(ipv6_range_end);
|
||||
memcpy(range_begin, ipv6_addr, sizeof(ipv6_addr));
|
||||
memcpy(range_end, ipv6_range_end, sizeof(ipv6_range_end));
|
||||
break;
|
||||
case FORMAT_MASK:
|
||||
ret=inet_pton(AF_INET6, ip2, ipv6_mask);
|
||||
if(ret<=0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
ipv6_ntoh(ipv6_mask);
|
||||
for(i=0; i<4; i++)
|
||||
{
|
||||
range_begin[i]=ip[i]&mask[i];
|
||||
range_end[i] = ip[i]|~mask[i];
|
||||
range_begin[i]=ipv6_addr[i]&ipv6_mask[i];
|
||||
range_end[i] = ipv6_addr[i]|~ipv6_mask[i];
|
||||
}
|
||||
return;
|
||||
break;
|
||||
case FORMAT_CIDR:
|
||||
cidr=atoi(ip2);
|
||||
if(cidr>128||cidr<0)
|
||||
{
|
||||
return -1;
|
||||
}
|
||||
for(i=0; i<4; i++)
|
||||
{
|
||||
bit32=128-cidr-32*(3-i);
|
||||
if(bit32<0) bit32=0;
|
||||
ipv6_mask[i]=(0xFFFFFFFFUL << bit32) & 0xFFFFFFFFUL;
|
||||
range_begin[i]=ipv6_addr[i]&ipv6_mask[i];
|
||||
range_end[i] = ipv6_addr[i]|~ipv6_mask[i];
|
||||
}
|
||||
break;
|
||||
default:
|
||||
assert(0);
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
void update_ip_rule(struct Maat_table_desc* table, const char* table_line, struct Maat_scanner *scanner, void* logger, int group_mode_on)
|
||||
{
|
||||
@@ -2933,7 +3037,6 @@ void update_ip_rule(struct Maat_table_desc* table, const char* table_line, struc
|
||||
int ret=0;
|
||||
int ret_array[8]={1},i=0;
|
||||
|
||||
unsigned int ipv4_addr1=0, ipv4_addr2=0, ipv6_addr1[4]={0}, ipv6_addr2[4]={0};
|
||||
switch(table->table_type)
|
||||
{
|
||||
case TABLE_TYPE_IP:
|
||||
@@ -3033,53 +3136,17 @@ void update_ip_rule(struct Maat_table_desc* table, const char* table_line, struc
|
||||
FORMAT_UNKNOWN==ip_format_str2int(dport_format))
|
||||
{
|
||||
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_module,
|
||||
"update error, invalid addr format of ip/ip_plus table %s:%s, should be range or mask",
|
||||
"update error, invalid addr format of ip/ip_plus table %s:%s, should be range, mask or CIDR",
|
||||
table->table_name[table->updating_name], table_line);
|
||||
table->udpate_err_cnt++;
|
||||
goto error_out;
|
||||
}
|
||||
|
||||
if(ip_rule->addr_type==4)
|
||||
{
|
||||
ret_array[0]=inet_pton(AF_INET, src_ip1, &ipv4_addr1);
|
||||
ipv4_addr1=ntohl(ipv4_addr1);
|
||||
ret_array[1]=inet_pton(AF_INET, src_ip2, &ipv4_addr2);
|
||||
ipv4_addr2=ntohl(ipv4_addr2);
|
||||
if(FORMAT_MASK==ip_format_str2int(saddr_format))
|
||||
{
|
||||
// min_saddr=(saddr&mask) max_saddr=(saddr|~mask)
|
||||
ip_rule->ipv4_rule.min_saddr=ipv4_addr1&ipv4_addr2;
|
||||
ip_rule->ipv4_rule.max_saddr=ipv4_addr1|~ipv4_addr2;
|
||||
}
|
||||
else
|
||||
{
|
||||
ip_rule->ipv4_rule.min_saddr=ipv4_addr1;
|
||||
ip_rule->ipv4_rule.max_saddr=ipv4_addr2;
|
||||
}
|
||||
if(FORMAT_MASK==ip_format_str2int(sport_format))
|
||||
{
|
||||
ip_rule->ipv4_rule.min_sport=src_port1&src_port2;
|
||||
ip_rule->ipv4_rule.max_sport=src_port1|~src_port2;
|
||||
}
|
||||
else
|
||||
{
|
||||
ip_rule->ipv4_rule.min_sport=src_port1;
|
||||
ip_rule->ipv4_rule.max_sport=src_port2;
|
||||
}
|
||||
ret_array[0]=ip_format2range(ip_rule->addr_type, ip_format_str2int(saddr_format), src_ip1, src_ip2, &ip_rule->ipv4_rule.min_saddr, &ip_rule->ipv4_rule.max_saddr);
|
||||
ret_array[1]=ip_format2range(ip_rule->addr_type, ip_format_str2int(daddr_format), dst_ip1, dst_ip2, &ip_rule->ipv4_rule.min_daddr, &ip_rule->ipv4_rule.max_daddr);
|
||||
|
||||
ret_array[2]=inet_pton(AF_INET, dst_ip1, &ipv4_addr1);
|
||||
ipv4_addr1=ntohl(ipv4_addr1);
|
||||
ret_array[3]=inet_pton(AF_INET, dst_ip2, &ipv4_addr2);
|
||||
ipv4_addr2=ntohl(ipv4_addr2);
|
||||
if(FORMAT_MASK==ip_format_str2int(daddr_format))
|
||||
{
|
||||
ip_rule->ipv4_rule.min_daddr=ipv4_addr1&ipv4_addr2;
|
||||
ip_rule->ipv4_rule.max_daddr=ipv4_addr1|~ipv4_addr2;
|
||||
}
|
||||
else
|
||||
{
|
||||
ip_rule->ipv4_rule.min_daddr=ipv4_addr1;
|
||||
ip_rule->ipv4_rule.max_daddr=ipv4_addr2;
|
||||
}
|
||||
if(FORMAT_MASK==ip_format_str2int(dport_format))
|
||||
{
|
||||
ip_rule->ipv4_rule.min_dport=dst_port1&dst_port2;
|
||||
@@ -3095,45 +3162,9 @@ void update_ip_rule(struct Maat_table_desc* table, const char* table_line, struc
|
||||
}
|
||||
else
|
||||
{
|
||||
ret_array[0]=inet_pton(AF_INET6, src_ip1, ipv6_addr1);
|
||||
ipv6_ntoh(ipv6_addr1);
|
||||
ret_array[1]=inet_pton(AF_INET6, src_ip2, ipv6_addr2);
|
||||
ipv6_ntoh(ipv6_addr2);
|
||||
if(FORMAT_MASK==ip_format_str2int(saddr_format))
|
||||
{
|
||||
// min_saddr=(saddr&mask) max_saddr=(saddr|~mask)
|
||||
ipv6_mask2range(ipv6_addr1, ipv6_addr2, ip_rule->ipv6_rule.min_saddr, ip_rule->ipv6_rule.max_saddr);
|
||||
}
|
||||
else
|
||||
{
|
||||
memcpy(ip_rule->ipv6_rule.min_saddr, ipv6_addr1, sizeof(ip_rule->ipv6_rule.min_saddr));
|
||||
memcpy(ip_rule->ipv6_rule.max_saddr, ipv6_addr2, sizeof(ip_rule->ipv6_rule.max_saddr));
|
||||
}
|
||||
if(FORMAT_MASK==ip_format_str2int(sport_format))
|
||||
{
|
||||
ip_rule->ipv6_rule.min_sport=src_port1&src_port2;
|
||||
ip_rule->ipv6_rule.max_sport=src_port1|~src_port2;
|
||||
}
|
||||
else
|
||||
{
|
||||
ip_rule->ipv6_rule.min_sport=src_port1;
|
||||
ip_rule->ipv6_rule.max_sport=src_port2;
|
||||
}
|
||||
ret_array[0]=ip_format2range(ip_rule->addr_type, ip_format_str2int(saddr_format), src_ip1, src_ip2, ip_rule->ipv6_rule.min_saddr, ip_rule->ipv6_rule.max_saddr);
|
||||
ret_array[1]=ip_format2range(ip_rule->addr_type, ip_format_str2int(daddr_format), dst_ip1, dst_ip2, ip_rule->ipv6_rule.min_daddr, ip_rule->ipv6_rule.max_daddr);
|
||||
|
||||
ret_array[2]=inet_pton(AF_INET6, dst_ip1, &ipv6_addr1);
|
||||
ipv6_ntoh(ipv6_addr1);
|
||||
ret_array[3]=inet_pton(AF_INET6, dst_ip2, &ipv6_addr2);
|
||||
ipv6_ntoh(ipv6_addr2);
|
||||
if(FORMAT_MASK==ip_format_str2int(daddr_format))
|
||||
{
|
||||
// min_saddr=(saddr&mask) max_saddr=(saddr|~mask)
|
||||
ipv6_mask2range(ipv6_addr1, ipv6_addr2, ip_rule->ipv6_rule.min_daddr, ip_rule->ipv6_rule.max_daddr);
|
||||
}
|
||||
else
|
||||
{
|
||||
memcpy(ip_rule->ipv6_rule.min_daddr, ipv6_addr1, sizeof(ip_rule->ipv6_rule.min_daddr));
|
||||
memcpy(ip_rule->ipv6_rule.max_daddr, ipv6_addr2, sizeof(ip_rule->ipv6_rule.max_daddr));
|
||||
}
|
||||
if(FORMAT_MASK==ip_format_str2int(dport_format))
|
||||
{
|
||||
ip_rule->ipv6_rule.min_dport=dst_port1&dst_port2;
|
||||
@@ -3149,7 +3180,7 @@ void update_ip_rule(struct Maat_table_desc* table, const char* table_line, struc
|
||||
}
|
||||
for(i=0;i<4;i++)
|
||||
{
|
||||
if(ret_array[i]<=0)
|
||||
if(ret_array[i]<0)
|
||||
{
|
||||
MESA_handle_runtime_log(logger,RLOG_LV_FATAL,maat_module ,
|
||||
"update error, invalid IP address format of ip table %s:%s"
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
VERS_2.4{
|
||||
global:
|
||||
extern "C++" {
|
||||
*MAAT_FRAME_VERSION_*;
|
||||
*Maat_*;
|
||||
*SFH_*;
|
||||
*GIE_*;
|
||||
|
||||
@@ -1066,6 +1066,82 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"compile_id": 158,
|
||||
"service": 0,
|
||||
"action": 0,
|
||||
"do_blacklist": 0,
|
||||
"do_log": 0,
|
||||
"effective_rage": 0,
|
||||
"user_region": "IPScan.IPv4_CIDR",
|
||||
"is_valid": "yes",
|
||||
"groups": [
|
||||
{
|
||||
"regions": [
|
||||
{
|
||||
"table_type": "ip_plus",
|
||||
"table_name": "IP_PLUS_CONFIG",
|
||||
"table_content": {
|
||||
"addr_type": "ipv4",
|
||||
"saddr_format": "CIDR",
|
||||
"src_ip1": "192.168.0.1",
|
||||
"src_ip2": "32",
|
||||
"sport_format": "range",
|
||||
"src_port1": "5210",
|
||||
"src_port2": "65520",
|
||||
"daddr_format": "CIDR",
|
||||
"dst_ip1": "10.0.6.1",
|
||||
"dst_ip2": "24",
|
||||
"dport_format": "mask",
|
||||
"dst_port1": "0",
|
||||
"dst_port2": "65535",
|
||||
"protocol": 6,
|
||||
"direction": "double"
|
||||
}
|
||||
}
|
||||
],
|
||||
"not_flag" : 0
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"compile_id": 159,
|
||||
"service": 0,
|
||||
"action": 0,
|
||||
"do_blacklist": 0,
|
||||
"do_log": 0,
|
||||
"effective_rage": 0,
|
||||
"user_region": "IPScan.IPv6_CIDR",
|
||||
"is_valid": "yes",
|
||||
"groups": [
|
||||
{
|
||||
"regions": [
|
||||
{
|
||||
"table_type": "ip_plus",
|
||||
"table_name": "IP_PLUS_CONFIG",
|
||||
"table_content": {
|
||||
"addr_type": "ipv6",
|
||||
"saddr_format": "CIDR",
|
||||
"src_ip1": "2001:db8::",
|
||||
"src_ip2": "120",
|
||||
"sport_format": "mask",
|
||||
"src_port1": "5210",
|
||||
"src_port2": "65520",
|
||||
"daddr_format": "CIDR",
|
||||
"dst_ip1": "2001:4860:4860::8888",
|
||||
"dst_ip2": "65",
|
||||
"dport_format": "mask",
|
||||
"dst_port1": "0",
|
||||
"dst_port2": "65535",
|
||||
"protocol": 6,
|
||||
"direction": "double"
|
||||
}
|
||||
}
|
||||
],
|
||||
"not_flag" : 0
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"plugin_table": [
|
||||
|
||||
@@ -452,7 +452,7 @@ TEST(StringScan, ExprPlusWithHex)
|
||||
return;
|
||||
|
||||
}
|
||||
|
||||
#define TEST_IPSCAN
|
||||
TEST(IPScan, IPv4_mask)
|
||||
{
|
||||
int table_id=0,ret=0;
|
||||
@@ -567,6 +567,62 @@ TEST(IPScan, IPv6_range)
|
||||
return;
|
||||
|
||||
}
|
||||
TEST(IPScan, IPv4_CIDR)
|
||||
{
|
||||
int table_id=0,ret=0;
|
||||
const char* table_name="IP_PLUS_CONFIG";
|
||||
struct Maat_rule_t result[4];
|
||||
scan_status_t mid=NULL;
|
||||
struct ipaddr ipv4_addr;
|
||||
struct stream_tuple4_v4 v4_addr;
|
||||
ipv4_addr.addrtype=ADDR_TYPE_IPV4;
|
||||
inet_pton(AF_INET, "192.168.0.1", &(v4_addr.saddr));
|
||||
v4_addr.source=htons(5210);
|
||||
inet_pton(AF_INET, "10.0.6.210", &(v4_addr.daddr));
|
||||
v4_addr.dest=htons(7400);
|
||||
ipv4_addr.v4=&v4_addr;
|
||||
|
||||
|
||||
table_id=Maat_table_register(g_feather, table_name);
|
||||
|
||||
EXPECT_GT(table_id, 0);
|
||||
|
||||
ret=Maat_scan_proto_addr(g_feather, table_id, &ipv4_addr, 6, result, 4, &mid, 0);
|
||||
|
||||
EXPECT_EQ(ret, 1);
|
||||
EXPECT_EQ(result[0].config_id, 158);
|
||||
|
||||
Maat_clean_status(&mid);
|
||||
return;
|
||||
}
|
||||
TEST(IPScan, IPv6_CIDR)
|
||||
{
|
||||
int table_id=0,ret=0;
|
||||
struct Maat_rule_t result[4];
|
||||
struct ipaddr ipv6_addr;
|
||||
struct stream_tuple4_v6 v6_addr;
|
||||
scan_status_t mid=NULL;
|
||||
|
||||
ipv6_addr.addrtype=ADDR_TYPE_IPV6;
|
||||
inet_pton(AF_INET6,"2001:db8::00fe",&(v6_addr.saddr));
|
||||
v6_addr.source=htons(5204);//5200~5299?
|
||||
inet_pton(AF_INET6,"2001:4860:4860::8888",&(v6_addr.daddr));
|
||||
v6_addr.dest=htons(80);//any
|
||||
ipv6_addr.v6=&v6_addr;
|
||||
const char* table_name="IP_PLUS_CONFIG";
|
||||
table_id=Maat_table_register(g_feather,table_name);
|
||||
EXPECT_GT(table_id, 0);
|
||||
|
||||
//for improving performance.
|
||||
Maat_set_scan_status(g_feather, &mid, MAAT_SET_SCAN_LAST_REGION,NULL, 0);
|
||||
ret=Maat_scan_proto_addr(g_feather, table_id, &ipv6_addr, 6, result,4, &mid, 0);
|
||||
EXPECT_EQ(ret, 1);
|
||||
EXPECT_EQ(result[0].config_id, 159);
|
||||
Maat_clean_status(&mid);
|
||||
return;
|
||||
|
||||
}
|
||||
#define TEST_NOTLogic 1
|
||||
|
||||
TEST(NOTLogic, OneRegion)
|
||||
{
|
||||
|
||||
Reference in New Issue
Block a user