-/* Copyright (C) 2007-2017 Open Information Security Foundation
+/* Copyright (C) 2007-2019 Open Information Security Foundation
*
* You can copy, redistribute or modify this Program under the terms of
* the GNU General Public License version 2 as published by the Free
#include "flow.h"
#include "app-layer.h"
#include "app-layer-parser.h"
+#include "app-layer-protos.h"
#include "app-layer-htp.h"
#include "detect.h"
static int g_buffer_id = 0;
#ifdef KEYWORD_TOSERVER
-/** \brief HTTP Headers Mpm prefilter callback
- *
- * \param det_ctx detection engine thread ctx
- * \param p packet to inspect
- * \param f flow to inspect
- * \param txv tx to inspect
- * \param pectx inspection context
- */
-static void PrefilterTxHttpRequestHeader(DetectEngineThreadCtx *det_ctx,
- const void *pectx,
- Packet *p, Flow *f, void *txv,
- const uint64_t idx, const uint8_t flags)
+static InspectionBuffer *GetRequestData(DetectEngineThreadCtx *det_ctx,
+ const DetectEngineTransforms *transforms, Flow *_f,
+ const uint8_t _flow_flags, void *txv, const int list_id)
{
SCEnter();
- const MpmCtx *mpm_ctx = (MpmCtx *)pectx;
- htp_tx_t *tx = (htp_tx_t *)txv;
- if (tx->request_headers == NULL)
- return;
-
- htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->request_headers,
- HEADER_NAME);
- if (h == NULL || h->value == NULL) {
- SCLogDebug("HTTP %s header not present in this request", HEADER_NAME);
- return;
- }
+ InspectionBuffer *buffer = InspectionBufferGet(det_ctx, list_id);
+ if (buffer->inspect == NULL) {
+ htp_tx_t *tx = (htp_tx_t *)txv;
- const uint32_t buffer_len = bstr_len(h->value);
- const uint8_t *buffer = bstr_ptr(h->value);
+ if (tx->request_headers == NULL)
+ return NULL;
- if (buffer_len >= mpm_ctx->minlen) {
- (void)mpm_table[mpm_ctx->mpm_type].Search(mpm_ctx,
- &det_ctx->mtcu, &det_ctx->pmq, buffer, buffer_len);
- }
-}
-#if 0
-static void PrefilterTxHttpRequestTrailers(DetectEngineThreadCtx *det_ctx,
- const void *pectx,
- Packet *p, Flow *f, void *txv,
- const uint64_t idx, const uint8_t flags)
-{
- SCEnter();
+ htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->request_headers,
+ HEADER_NAME);
+ if (h == NULL || h->value == NULL) {
+ SCLogDebug("HTTP %s header not present in this request",
+ HEADER_NAME);
+ return NULL;
+ }
- const MpmCtx *mpm_ctx = (MpmCtx *)pectx;
- htp_tx_t *tx = (htp_tx_t *)txv;
+ const uint32_t data_len = bstr_len(h->value);
+ const uint8_t *data = bstr_ptr(h->value);
- if (tx->request_headers == NULL)
- return;
- const HtpTxUserData *htud = (const HtpTxUserData *)htp_tx_get_user_data(tx);
- /* if the request wasn't flagged as having a trailer, we skip */
- if (htud && !htud->request_has_trailers)
- return;
-
- HtpState *htp_state = f->alstate;
- uint32_t buffer_len = 0;
- const uint8_t *buffer = DetectEngineHHDGetBufferForTX(tx, idx,
- NULL, det_ctx,
- f, htp_state,
- flags,
- &buffer_len);
-
- if (buffer_len >= mpm_ctx->minlen) {
- (void)mpm_table[mpm_ctx->mpm_type].Search(mpm_ctx,
- &det_ctx->mtcu, &det_ctx->pmq, buffer, buffer_len);
+ InspectionBufferSetup(buffer, data, data_len);
+ InspectionBufferApplyTransforms(buffer, transforms);
}
-}
-#endif
-static int PrefilterTxHttpRequestHeaderRegister(DetectEngineCtx *de_ctx,
- SigGroupHead *sgh, MpmCtx *mpm_ctx)
-{
- SCEnter();
- int r = PrefilterAppendTxEngine(de_ctx, sgh, PrefilterTxHttpRequestHeader,
- ALPROTO_HTTP, HTP_REQUEST_HEADERS,
- mpm_ctx, NULL, KEYWORD_NAME " (request)");
- return r;
-#if 0
- if (r != 0)
- return r;
- return PrefilterAppendTxEngine(sgh, PrefilterTxHttpRequestTrailers,
- ALPROTO_HTTP, HTP_REQUEST_TRAILER,
- mpm_ctx, NULL, "http_header (request)");
-#endif
+ return buffer;
}
-#endif
-
-#ifdef KEYWORD_TOCLIENT
-/** \brief HTTP Headers Mpm prefilter callback
- *
- * \param det_ctx detection engine thread ctx
- * \param p packet to inspect
- * \param f flow to inspect
- * \param txv tx to inspect
- * \param pectx inspection context
- */
-static void PrefilterTxHttpResponseHeader(DetectEngineThreadCtx *det_ctx,
- const void *pectx,
- Packet *p, Flow *f, void *txv,
- const uint64_t idx, const uint8_t flags)
-{
- SCEnter();
- const MpmCtx *mpm_ctx = (MpmCtx *)pectx;
- htp_tx_t *tx = (htp_tx_t *)txv;
- if (tx->response_headers == NULL)
- return;
-
- htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->response_headers,
- HEADER_NAME);
- if (h == NULL || h->value == NULL) {
- SCLogDebug("HTTP %s header not present in this request", HEADER_NAME);
- return;
- }
-
- const uint32_t buffer_len = bstr_len(h->value);
- const uint8_t *buffer = bstr_ptr(h->value);
-
- if (buffer_len >= mpm_ctx->minlen) {
- (void)mpm_table[mpm_ctx->mpm_type].Search(mpm_ctx,
- &det_ctx->mtcu, &det_ctx->pmq, buffer, buffer_len);
- }
-}
-#if 0
-static void PrefilterTxHttpResponseTrailers(DetectEngineThreadCtx *det_ctx,
- const void *pectx,
- Packet *p, Flow *f, void *txv,
- const uint64_t idx, const uint8_t flags)
-{
- SCEnter();
-
- const MpmCtx *mpm_ctx = (MpmCtx *)pectx;
- htp_tx_t *tx = (htp_tx_t *)txv;
-
- if (tx->response_headers == NULL)
- return;
- const HtpTxUserData *htud = (const HtpTxUserData *)htp_tx_get_user_data(tx);
- /* if the request wasn't flagged as having a trailer, we skip */
- if (htud && !htud->response_has_trailers)
- return;
-
- HtpState *htp_state = f->alstate;
- uint32_t buffer_len = 0;
- const uint8_t *buffer = DetectEngineHHDGetBufferForTX(tx, idx,
- NULL, det_ctx,
- f, htp_state,
- flags,
- &buffer_len);
-
- if (buffer_len >= mpm_ctx->minlen) {
- (void)mpm_table[mpm_ctx->mpm_type].Search(mpm_ctx,
- &det_ctx->mtcu, &det_ctx->pmq, buffer, buffer_len);
- }
-}
#endif
-static int PrefilterTxHttpResponseHeaderRegister(DetectEngineCtx *de_ctx,
- SigGroupHead *sgh, MpmCtx *mpm_ctx)
+#ifdef KEYWORD_TOCLIENT
+static InspectionBuffer *GetResponseData(DetectEngineThreadCtx *det_ctx,
+ const DetectEngineTransforms *transforms, Flow *_f,
+ const uint8_t _flow_flags, void *txv, const int list_id)
{
SCEnter();
- int r = PrefilterAppendTxEngine(de_ctx, sgh, PrefilterTxHttpResponseHeader,
- ALPROTO_HTTP, HTP_RESPONSE_HEADERS,
- mpm_ctx, NULL, KEYWORD_NAME " (response)");
- return r;
-#if 0
- if (r != 0)
- return r;
- return PrefilterAppendTxEngine(sgh, PrefilterTxHttpRequestTrailers,
- ALPROTO_HTTP, HTP_REQUEST_TRAILER,
- mpm_ctx, NULL, "http_header (request)");
-#endif
-}
-#endif
-
-#ifdef KEYWORD_TOSERVER
-static int InspectEngineHttpRequestHeader(ThreadVars *tv,
- DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
- const Signature *s, const SigMatchData *smd,
- Flow *f, uint8_t flags, void *alstate, void *txv, uint64_t tx_id)
-{
- htp_tx_t *tx = (htp_tx_t *)txv;
- if (tx->request_headers == NULL)
- goto end;
-
- htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->request_headers,
- HEADER_NAME);
- if (h == NULL || h->value == NULL) {
- SCLogDebug("HTTP UA header not present in this request");
- goto end;
- }
-
- const uint32_t buffer_len = bstr_len(h->value);
- uint8_t *buffer = bstr_ptr(h->value);
+ InspectionBuffer *buffer = InspectionBufferGet(det_ctx, list_id);
+ if (buffer->inspect == NULL) {
+ htp_tx_t *tx = (htp_tx_t *)txv;
- if (buffer_len == 0)
- goto end;
+ if (tx->response_headers == NULL)
+ return NULL;
- det_ctx->buffer_offset = 0;
- det_ctx->discontinue_matching = 0;
- det_ctx->inspection_recursion_counter = 0;
- int r = DetectEngineContentInspection(de_ctx, det_ctx, s, smd,
- f,
- buffer, buffer_len,
- 0, DETECT_CI_FLAGS_SINGLE,
- DETECT_ENGINE_CONTENT_INSPECTION_MODE_STATE, NULL);
- if (r == 1)
- return DETECT_ENGINE_INSPECT_SIG_MATCH;
+ htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->response_headers,
+ HEADER_NAME);
+ if (h == NULL || h->value == NULL) {
+ SCLogDebug("HTTP %s header not present in this request",
+ HEADER_NAME);
+ return NULL;
+ }
- end:
- if (AppLayerParserGetStateProgress(IPPROTO_TCP, ALPROTO_HTTP, tx, flags) > HTP_REQUEST_HEADERS)
- return DETECT_ENGINE_INSPECT_SIG_CANT_MATCH;
- else
- return DETECT_ENGINE_INSPECT_SIG_NO_MATCH;
-}
-#endif
-#ifdef KEYWORD_TOCLIENT
-static int InspectEngineHttpResponseHeader(ThreadVars *tv,
- DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
- const Signature *s, const SigMatchData *smd,
- Flow *f, uint8_t flags, void *alstate, void *txv, uint64_t tx_id)
-{
- htp_tx_t *tx = (htp_tx_t *)txv;
- if (tx->response_headers == NULL)
- goto end;
+ const uint32_t data_len = bstr_len(h->value);
+ const uint8_t *data = bstr_ptr(h->value);
- htp_header_t *h = (htp_header_t *)htp_table_get_c(tx->response_headers,
- HEADER_NAME);
- if (h == NULL || h->value == NULL) {
- SCLogDebug("HTTP header not present in this request");
- goto end;
+ InspectionBufferSetup(buffer, data, data_len);
+ InspectionBufferApplyTransforms(buffer, transforms);
}
- const uint32_t buffer_len = bstr_len(h->value);
- uint8_t *buffer = bstr_ptr(h->value);
-
- if (buffer_len == 0)
- goto end;
-
- det_ctx->buffer_offset = 0;
- det_ctx->discontinue_matching = 0;
- det_ctx->inspection_recursion_counter = 0;
- int r = DetectEngineContentInspection(de_ctx, det_ctx, s, smd,
- f,
- buffer, buffer_len,
- 0, DETECT_CI_FLAGS_SINGLE,
- DETECT_ENGINE_CONTENT_INSPECTION_MODE_STATE, NULL);
- if (r == 1)
- return DETECT_ENGINE_INSPECT_SIG_MATCH;
-
- end:
- if (AppLayerParserGetStateProgress(IPPROTO_TCP, ALPROTO_HTTP, tx, flags) > HTP_RESPONSE_HEADERS)
- return DETECT_ENGINE_INSPECT_SIG_CANT_MATCH;
- else
- return DETECT_ENGINE_INSPECT_SIG_NO_MATCH;
+ return buffer;
}
#endif
/**
- * \brief The setup function for the http_header keyword for a signature.
+ * \brief this function setup the http.header keyword used in the rule
*
- * \param de_ctx Pointer to the detection engine context.
- * \param s Pointer to signature for the current Signature being parsed
- * from the rules.
- * \param m Pointer to the head of the SigMatchs for the current rule
- * being parsed.
- * \param arg Pointer to the string holding the keyword value.
+ * \param de_ctx Pointer to the Detection Engine Context
+ * \param s Pointer to the Signature to which the current keyword belongs
+ * \param str Should hold an empty string always
*
- * \retval 0 On success.
- * \retval -1 On failure.
+ * \retval 0 On success
*/
-static int DetectHttpHeadersSetup(DetectEngineCtx *de_ctx, Signature *s, const char *arg)
+static int DetectHttpHeadersSetupSticky(DetectEngineCtx *de_ctx, Signature *s, const char *str)
{
- s->init_data->list = g_buffer_id;
+ if (DetectBufferSetActiveList(s, g_buffer_id) < 0)
+ return -1;
+
+ if (DetectSignatureSetAppProto(s, ALPROTO_HTTP) < 0)
+ return -1;
+
return 0;
}
static void DetectHttpHeadersRegisterStub(void)
{
sigmatch_table[KEYWORD_ID].name = KEYWORD_NAME;
+#ifdef KEYWORD_NAME_LEGACY
+ sigmatch_table[KEYWORD_ID].alias = KEYWORD_NAME_LEGACY;
+#endif
sigmatch_table[KEYWORD_ID].desc = KEYWORD_NAME " sticky buffer for the " BUFFER_DESC;
sigmatch_table[KEYWORD_ID].url = DOC_URL DOC_VERSION "/rules/" KEYWORD_DOC;
- sigmatch_table[KEYWORD_ID].Setup = DetectHttpHeadersSetup;
- sigmatch_table[KEYWORD_ID].flags |= SIGMATCH_NOOPT;
+ sigmatch_table[KEYWORD_ID].Setup = DetectHttpHeadersSetupSticky;
+ sigmatch_table[KEYWORD_ID].flags |= SIGMATCH_NOOPT | SIGMATCH_INFO_STICKY_BUFFER;
+
#ifdef KEYWORD_TOSERVER
- DetectAppLayerMpmRegister(BUFFER_NAME, SIG_FLAG_TOSERVER, 2,
- PrefilterTxHttpRequestHeaderRegister);
+ DetectAppLayerMpmRegister2(BUFFER_NAME, SIG_FLAG_TOSERVER, 2,
+ PrefilterGenericMpmRegister, GetRequestData,
+ ALPROTO_HTTP, HTP_REQUEST_HEADERS);
#endif
#ifdef KEYWORD_TOCLIENT
- DetectAppLayerMpmRegister(BUFFER_NAME, SIG_FLAG_TOCLIENT, 2,
- PrefilterTxHttpResponseHeaderRegister);
+ DetectAppLayerMpmRegister2(BUFFER_NAME, SIG_FLAG_TOCLIENT, 2,
+ PrefilterGenericMpmRegister, GetResponseData,
+ ALPROTO_HTTP, HTP_RESPONSE_HEADERS);
#endif
#ifdef KEYWORD_TOSERVER
- DetectAppLayerInspectEngineRegister(BUFFER_NAME,
+ DetectAppLayerInspectEngineRegister2(BUFFER_NAME,
ALPROTO_HTTP, SIG_FLAG_TOSERVER, HTP_REQUEST_HEADERS,
- InspectEngineHttpRequestHeader);
+ DetectEngineInspectBufferGeneric, GetRequestData);
#endif
#ifdef KEYWORD_TOCLIENT
- DetectAppLayerInspectEngineRegister(BUFFER_NAME,
+ DetectAppLayerInspectEngineRegister2(BUFFER_NAME,
ALPROTO_HTTP, SIG_FLAG_TOCLIENT, HTP_RESPONSE_HEADERS,
- InspectEngineHttpResponseHeader);
+ DetectEngineInspectBufferGeneric, GetResponseData);
#endif
DetectBufferTypeSetDescriptionByName(BUFFER_NAME, BUFFER_DESC);