--- /dev/null
+/* Copyright (C) 2017-2018 Open Information Security Foundation
+ *
+ * You can copy, redistribute or modify this Program under the terms of
+ * the GNU General Public License version 2 as published by the Free
+ * Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * version 2 along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ * 02110-1301, USA.
+ */
+
+// written by Pierre Chifflier <chifflier@wzdftpd.net>
+
+use libc;
+use std;
+use std::ffi::{CStr,CString};
+use nom::IResult;
+use der_parser::der_read_element_header;
+use kerberos_parser::krb5_parser;
+use kerberos_parser::krb5::{EncryptionType,MessageType,PrincipalName,Realm};
+use applayer;
+use core;
+use core::{AppProto,Flow,ALPROTO_FAILED,ALPROTO_UNKNOWN,STREAM_TOCLIENT,STREAM_TOSERVER,sc_detect_engine_state_free};
+use parser::*;
+
+use log::*;
+
+#[repr(u32)]
+pub enum KRB5Event {
+ MalformedData = 0,
+ WeakCrypto,
+}
+
+pub struct KRB5State {
+ pub req_id: u8,
+
+ /// List of transactions for this session
+ transactions: Vec<KRB5Transaction>,
+
+ /// tx counter for assigning incrementing id's to tx's
+ tx_id: u64,
+}
+
+pub struct KRB5Transaction {
+ /// The message type: AS-REQ, AS-REP, etc.
+ pub msg_type: MessageType,
+
+ /// The client PrincipalName, if present
+ pub cname: Option<PrincipalName>,
+ /// The server Realm, if present
+ pub realm: Option<Realm>,
+ /// The server PrincipalName, if present
+ pub sname: Option<PrincipalName>,
+
+ /// Encryption used (only in AS-REP and TGS-REP)
+ pub etype: Option<EncryptionType>,
+
+ /// The internal transaction id
+ id: u64,
+
+ /// The detection engine state, if present
+ de_state: Option<*mut core::DetectEngineState>,
+
+ /// The events associated with this transaction
+ events: *mut core::AppLayerDecoderEvents,
+
+ logged: applayer::LoggerFlags,
+}
+
+pub fn to_hex_string(bytes: &[u8]) -> String {
+ let mut s = String::new();
+ for &b in bytes {
+ s.push_str(&format!("{:02X}", b));
+ }
+ s
+}
+
+impl KRB5State {
+ pub fn new() -> KRB5State {
+ KRB5State{
+ req_id: 0,
+ transactions: Vec::new(),
+ tx_id: 0,
+ }
+ }
+
+ /// Parse a Kerberos request message
+ ///
+ /// Returns The number of messages parsed, or -1 on error
+ fn parse(&mut self, i: &[u8], _direction: u8) -> i8 {
+ match der_read_element_header(i) {
+ IResult::Done(_rem,hdr) => {
+ // Kerberos messages start with an APPLICATION header
+ if hdr.class != 0b01 { return 1; }
+ match hdr.tag {
+ 10 => {
+ self.req_id = hdr.tag;
+ },
+ 11 => {
+ let res = krb5_parser::parse_as_rep(i);
+ res.map(|kdc_rep| {
+ let mut tx = self.new_tx();
+ tx.msg_type = MessageType::KRB_AS_REP;
+ tx.cname = Some(kdc_rep.cname);
+ tx.realm = Some(kdc_rep.crealm);
+ tx.sname = Some(kdc_rep.ticket.sname);
+ tx.etype = Some(kdc_rep.enc_part.etype);
+ self.transactions.push(tx);
+ self.check_crypto(kdc_rep.enc_part.etype);
+ });
+ self.req_id = 0;
+ },
+ 12 => {
+ self.req_id = hdr.tag;
+ },
+ 13 => {
+ let res = krb5_parser::parse_tgs_rep(i);
+ res.map(|kdc_rep| {
+ let mut tx = self.new_tx();
+ tx.msg_type = MessageType::KRB_TGS_REP;
+ tx.cname = Some(kdc_rep.cname);
+ tx.realm = Some(kdc_rep.crealm);
+ tx.sname = Some(kdc_rep.ticket.sname);
+ tx.etype = Some(kdc_rep.enc_part.etype);
+ self.transactions.push(tx);
+ self.check_crypto(kdc_rep.enc_part.etype);
+ });
+ self.req_id = 0;
+ },
+ 14 => {
+ self.req_id = hdr.tag;
+ },
+ 15 => {
+ self.req_id = 0;
+ },
+ 30 => {
+ self.req_id = 0;
+ },
+ _ => { SCLogDebug!("unknown/unsupported tag {}", hdr.tag); },
+ }
+ 0
+ },
+ IResult::Incomplete(_) => {
+ SCLogDebug!("Insufficient data while parsing KRB5 data");
+ self.set_event(KRB5Event::MalformedData);
+ -1
+ },
+ IResult::Error(_) => {
+ SCLogDebug!("Error while parsing KRB5 data");
+ self.set_event(KRB5Event::MalformedData);
+ -1
+ },
+ }
+ }
+
+ fn check_crypto(&mut self, alg:EncryptionType) {
+ match alg {
+ EncryptionType::AES128_CTS_HMAC_SHA1_96 |
+ EncryptionType::AES256_CTS_HMAC_SHA1_96 |
+ EncryptionType::AES128_CTS_HMAC_SHA256_128 |
+ EncryptionType::AES256_CTS_HMAC_SHA384_192 |
+ EncryptionType::CAMELLIA128_CTS_CMAC |
+ EncryptionType::CAMELLIA256_CTS_CMAC => (),
+ _ => { // all other ciphers are weak or deprecated
+ SCLogDebug!("Kerberos5: weak encryption {:?}", alg);
+ self.set_event(KRB5Event::WeakCrypto);
+ }
+ }
+ }
+
+ pub fn free(&mut self) {
+ // All transactions are freed when the `transactions` object is freed.
+ // But let's be explicit
+ self.transactions.clear();
+ }
+
+ fn new_tx(&mut self) -> KRB5Transaction {
+ self.tx_id += 1;
+ KRB5Transaction::new(self.tx_id)
+ }
+
+ fn get_tx_by_id(&mut self, tx_id: u64) -> Option<&KRB5Transaction> {
+ self.transactions.iter().find(|&tx| tx.id == tx_id + 1)
+ }
+
+ fn free_tx(&mut self, tx_id: u64) {
+ let tx = self.transactions.iter().position(|ref tx| tx.id == tx_id + 1);
+ debug_assert!(tx != None);
+ if let Some(idx) = tx {
+ let _ = self.transactions.remove(idx);
+ }
+ }
+
+ /// Set an event. The event is set on the most recent transaction.
+ fn set_event(&mut self, event: KRB5Event) {
+ if let Some(tx) = self.transactions.last_mut() {
+ let ev = event as u8;
+ core::sc_app_layer_decoder_events_set_event_raw(&mut tx.events, ev);
+ }
+ }
+}
+
+impl KRB5Transaction {
+ pub fn new(id: u64) -> KRB5Transaction {
+ KRB5Transaction{
+ msg_type: MessageType(0),
+ cname: None,
+ realm: None,
+ sname: None,
+ etype: None,
+ id: id,
+ de_state: None,
+ events: std::ptr::null_mut(),
+ logged: applayer::LoggerFlags::new(),
+ }
+ }
+}
+
+impl Drop for KRB5Transaction {
+ fn drop(&mut self) {
+ if self.events != std::ptr::null_mut() {
+ core::sc_app_layer_decoder_events_free_events(&mut self.events);
+ }
+ if let Some(state) = self.de_state {
+ sc_detect_engine_state_free(state);
+ }
+ }
+}
+
+
+
+
+/// Returns *mut KRB5State
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_new() -> *mut libc::c_void {
+ let state = KRB5State::new();
+ let boxed = Box::new(state);
+ return unsafe{std::mem::transmute(boxed)};
+}
+
+/// Params:
+/// - state: *mut KRB5State as void pointer
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_free(state: *mut libc::c_void) {
+ // Just unbox...
+ let mut state: Box<KRB5State> = unsafe{std::mem::transmute(state)};
+ state.free();
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_get_tx(state: *mut libc::c_void,
+ tx_id: libc::uint64_t)
+ -> *mut libc::c_void
+{
+ let state = cast_pointer!(state,KRB5State);
+ match state.get_tx_by_id(tx_id) {
+ Some(tx) => unsafe{std::mem::transmute(tx)},
+ None => std::ptr::null_mut(),
+ }
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_get_tx_count(state: *mut libc::c_void)
+ -> libc::uint64_t
+{
+ let state = cast_pointer!(state,KRB5State);
+ state.tx_id
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_tx_free(state: *mut libc::c_void,
+ tx_id: libc::uint64_t)
+{
+ let state = cast_pointer!(state,KRB5State);
+ state.free_tx(tx_id);
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_progress_completion_status(
+ _direction: libc::uint8_t)
+ -> libc::c_int
+{
+ return 1;
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_tx_get_alstate_progress(_tx: *mut libc::c_void,
+ _direction: libc::uint8_t)
+ -> libc::c_int
+{
+ 1
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_tx_set_logged(_state: *mut libc::c_void,
+ tx: *mut libc::c_void,
+ logged: libc::uint32_t)
+{
+ let tx = cast_pointer!(tx,KRB5Transaction);
+ tx.logged.set(logged);
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_tx_get_logged(_state: *mut libc::c_void,
+ tx: *mut libc::c_void)
+ -> u32
+{
+ let tx = cast_pointer!(tx,KRB5Transaction);
+ return tx.logged.get();
+}
+
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_set_tx_detect_state(
+ tx: *mut libc::c_void,
+ de_state: &mut core::DetectEngineState) -> libc::c_int
+{
+ let tx = cast_pointer!(tx,KRB5Transaction);
+ tx.de_state = Some(de_state);
+ 0
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_get_tx_detect_state(
+ tx: *mut libc::c_void)
+ -> *mut core::DetectEngineState
+{
+ let tx = cast_pointer!(tx,KRB5Transaction);
+ match tx.de_state {
+ Some(ds) => ds,
+ None => std::ptr::null_mut(),
+ }
+}
+
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_get_events(state: *mut libc::c_void,
+ tx_id: libc::uint64_t)
+ -> *mut core::AppLayerDecoderEvents
+{
+ let state = cast_pointer!(state,KRB5State);
+ match state.get_tx_by_id(tx_id) {
+ Some(tx) => tx.events,
+ _ => std::ptr::null_mut(),
+ }
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_state_get_event_info(event_name: *const libc::c_char,
+ event_id: *mut libc::c_int,
+ event_type: *mut core::AppLayerEventType)
+ -> libc::c_int
+{
+ if event_name == std::ptr::null() { return -1; }
+ let c_event_name: &CStr = unsafe { CStr::from_ptr(event_name) };
+ let event = match c_event_name.to_str() {
+ Ok(s) => {
+ match s {
+ "malformed_data" => KRB5Event::MalformedData as i32,
+ _ => -1, // unknown event
+ }
+ },
+ Err(_) => -1, // UTF-8 conversion failed
+ };
+ unsafe{
+ *event_type = core::APP_LAYER_EVENT_TYPE_TRANSACTION;
+ *event_id = event as libc::c_int;
+ };
+ 0
+}
+static mut ALPROTO_KRB5 : AppProto = ALPROTO_UNKNOWN;
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_probing_parser(_flow: *const Flow, input:*const libc::uint8_t, input_len: u32, _offset: *const u32) -> AppProto {
+ let slice = build_slice!(input,input_len as usize);
+ let alproto = unsafe{ ALPROTO_KRB5 };
+ if slice.len() <= 10 { return unsafe{ALPROTO_FAILED}; }
+ match der_read_element_header(slice) {
+ IResult::Done(rem, ref hdr) => {
+ // Kerberos messages start with an APPLICATION header
+ if hdr.class != 0b01 { return unsafe{ALPROTO_FAILED}; }
+ // Tag number should be <= 30
+ if hdr.tag >= 30 { return unsafe{ALPROTO_FAILED}; }
+ // Kerberos messages contain sequences
+ if rem.is_empty() || rem[0] != 0x30 { return unsafe{ALPROTO_FAILED}; }
+ // XXX check kerberos version ?
+ // SCLogInfo!("probe hdr: {:?}", hdr);
+ return alproto;
+ },
+ IResult::Incomplete(_) => {
+ return ALPROTO_UNKNOWN;
+ },
+ IResult::Error(_) => {
+ return unsafe{ALPROTO_FAILED};
+ },
+ }
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_parse_request(_flow: *const core::Flow,
+ state: *mut libc::c_void,
+ _pstate: *mut libc::c_void,
+ input: *const libc::uint8_t,
+ input_len: u32,
+ _data: *const libc::c_void) -> i8 {
+ let buf = build_slice!(input,input_len as usize);
+ let state = cast_pointer!(state,KRB5State);
+ state.parse(buf, STREAM_TOSERVER)
+}
+
+#[no_mangle]
+pub extern "C" fn rs_krb5_parse_response(_flow: *const core::Flow,
+ state: *mut libc::c_void,
+ _pstate: *mut libc::c_void,
+ input: *const libc::uint8_t,
+ input_len: u32,
+ _data: *const libc::c_void) -> i8 {
+ let buf = build_slice!(input,input_len as usize);
+ let state = cast_pointer!(state,KRB5State);
+ state.parse(buf, STREAM_TOCLIENT)
+}
+
+
+const PARSER_NAME : &'static [u8] = b"krb5\0";
+
+#[no_mangle]
+pub unsafe extern "C" fn rs_register_krb5_parser() {
+ let default_port = CString::new("88").unwrap();
+ let parser = RustParser {
+ name : PARSER_NAME.as_ptr() as *const libc::c_char,
+ default_port : default_port.as_ptr(),
+ ipproto : libc::IPPROTO_UDP,
+ probe_ts : rs_krb5_probing_parser,
+ probe_tc : rs_krb5_probing_parser,
+ min_depth : 0,
+ max_depth : 16,
+ state_new : rs_krb5_state_new,
+ state_free : rs_krb5_state_free,
+ tx_free : rs_krb5_state_tx_free,
+ parse_ts : rs_krb5_parse_request,
+ parse_tc : rs_krb5_parse_response,
+ get_tx_count : rs_krb5_state_get_tx_count,
+ get_tx : rs_krb5_state_get_tx,
+ tx_get_comp_st : rs_krb5_state_progress_completion_status,
+ tx_get_progress : rs_krb5_tx_get_alstate_progress,
+ get_tx_logged : Some(rs_krb5_tx_get_logged),
+ set_tx_logged : Some(rs_krb5_tx_set_logged),
+ get_de_state : rs_krb5_state_get_tx_detect_state,
+ set_de_state : rs_krb5_state_set_tx_detect_state,
+ get_events : Some(rs_krb5_state_get_events),
+ get_eventinfo : Some(rs_krb5_state_get_event_info),
+ localstorage_new : None,
+ localstorage_free : None,
+ get_tx_mpm_id : None,
+ set_tx_mpm_id : None,
+ get_files : None,
+ };
+ let ip_proto_str = CString::new("udp").unwrap();
+ if AppLayerProtoDetectConfProtoDetectionEnabled(ip_proto_str.as_ptr(), parser.name) != 0 {
+ let alproto = AppLayerRegisterProtocolDetection(&parser, 1);
+ // store the allocated ID for the probe function
+ ALPROTO_KRB5 = alproto;
+ if AppLayerParserConfParserEnabled(ip_proto_str.as_ptr(), parser.name) != 0 {
+ let _ = AppLayerRegisterParser(&parser, alproto);
+ }
+ } else {
+ SCLogDebug!("Protocol detecter and parser disabled for KRB5.");
+ }
+}