Skip to content

Commit

Permalink
smtp: adds server side detection
Browse files Browse the repository at this point in the history
Ticket: OISF#1125
  • Loading branch information
catenacyber committed Feb 2, 2023
1 parent d9e6301 commit 4b95987
Show file tree
Hide file tree
Showing 2 changed files with 153 additions and 0 deletions.
96 changes: 96 additions & 0 deletions rust/src/util.rs
Expand Up @@ -18,7 +18,103 @@
use std::ffi::CStr;
use std::os::raw::c_char;

use nom7::bytes::complete::take_while1;
use nom7::character::complete::char;
use nom7::character::{is_alphabetic, is_alphanumeric};
use nom7::combinator::verify;
use nom7::multi::many1_count;
use nom7::IResult;

#[no_mangle]
pub unsafe extern "C" fn rs_check_utf8(val: *const c_char) -> bool {
CStr::from_ptr(val).to_str().is_ok()
}

fn is_alphanumeric_or_hyphen(chr: u8) -> bool {
return is_alphanumeric(chr) || chr == b'-';
}

fn parse_domain_label(i: &[u8]) -> IResult<&[u8], ()> {
let (i, _) = verify(take_while1(is_alphanumeric_or_hyphen), |x: &[u8]| {
is_alphabetic(x[0]) && x[x.len() - 1] != b'-'
})(i)?;
return Ok((i, ()));
}

fn parse_subdomain(input: &[u8]) -> IResult<&[u8], ()> {
let (input, _) = parse_domain_label(input)?;
let (input, _) = char('.')(input)?;
return Ok((input, ()));
}

fn parse_domain(input: &[u8]) -> IResult<&[u8], ()> {
let (input, _) = many1_count(parse_subdomain)(input)?;
let (input, _) = parse_domain_label(input)?;
return Ok((input, ()));
}

#[no_mangle]
pub unsafe extern "C" fn rs_validate_domain(input: *const u8, in_len: u32) -> u32 {
let islice = build_slice!(input, in_len as usize);
match parse_domain(islice) {
Ok((rem, _)) => {
return (islice.len() - rem.len()) as u32;
}
_ => {
return 0;
}
}
}

#[cfg(test)]
mod tests {

use super::*;

#[test]
fn test_parse_domain() {
let buf0: &[u8] = "a-1.oisf.net more".as_bytes();
let r0 = parse_domain(buf0);
match r0 {
Ok((rem, _)) => {
// And we should have 5 bytes left.
assert_eq!(rem.len(), 5);
}
_ => {
panic!("Result should have been ok.");
}
}
let buf1: &[u8] = "justatext".as_bytes();
let r1 = parse_domain(buf1);
match r1 {
Ok((_, _)) => {
panic!("Result should not have been ok.");
}
_ => {}
}
let buf1: &[u8] = "1.com".as_bytes();
let r1 = parse_domain(buf1);
match r1 {
Ok((_, _)) => {
panic!("Result should not have been ok.");
}
_ => {}
}
let buf1: &[u8] = "a-.com".as_bytes();
let r1 = parse_domain(buf1);
match r1 {
Ok((_, _)) => {
panic!("Result should not have been ok.");
}
_ => {}
}
let buf1: &[u8] = "a(x)y.com".as_bytes();
let r1 = parse_domain(buf1);
match r1 {
Ok((_, _)) => {
panic!("Result should not have been ok.");
}
_ => {}
}
}
}
57 changes: 57 additions & 0 deletions src/app-layer-smtp.c
Expand Up @@ -1612,6 +1612,50 @@ static int SMTPStateGetEventInfoById(int event_id, const char **event_name,
return 0;
}

static AppProto SMTPServerProbingParser(
Flow *f, uint8_t direction, const uint8_t *input, uint32_t len, uint8_t *rdir)
{
// another check for minimum length
if (len < 5) {
return ALPROTO_UNKNOWN;
}
// begins by 220
if (input[0] != '2' || input[1] != '2' || input[2] != '0') {
return ALPROTO_FAILED;
}
// followed by space or hypen
if (input[3] != ' ' && input[3] != '-') {
return ALPROTO_FAILED;
}
// If client side is SMTP, do not validate domain
// so that server banner can be parsed first.
if (f->alproto_ts == ALPROTO_SMTP) {
for (uint32_t i = 4; i < len; i++) {
if (input[i] == '\n') {
return ALPROTO_SMTP;
}
}
return ALPROTO_UNKNOWN;
}
AppProto r = ALPROTO_UNKNOWN;
if (f->todstbytecnt > 4 && f->alproto_ts == ALPROTO_UNKNOWN) {
// Only validates SMTP if client side is unknown
// despite having received bytes.
r = ALPROTO_SMTP;
}
uint32_t offset = rs_validate_domain(input + 4, len - 4);
if (offset == 0) {
return ALPROTO_FAILED;
}
for (uint32_t i = offset + 4; i < len; i++) {
if (input[i] == '\n') {
return r;
}
}
// This should not go forever because of engine limiting probing parsers.
return ALPROTO_UNKNOWN;
}

static int SMTPRegisterPatternsForProtocolDetection(void)
{
if (AppLayerProtoDetectPMRegisterPatternCI(IPPROTO_TCP, ALPROTO_SMTP,
Expand All @@ -1629,6 +1673,19 @@ static int SMTPRegisterPatternsForProtocolDetection(void)
{
return -1;
}
if (!AppLayerProtoDetectPPParseConfPorts(
"tcp", IPPROTO_TCP, "smtp", ALPROTO_SMTP, 0, 5, NULL, SMTPServerProbingParser)) {
AppLayerProtoDetectPPRegister(IPPROTO_TCP, "25", ALPROTO_SMTP, 0, 5, STREAM_TOCLIENT, NULL,
SMTPServerProbingParser);
}
if (AppLayerProtoDetectPMRegisterPatternCSwPP(IPPROTO_TCP, ALPROTO_SMTP, "220 ", 4, 0,
STREAM_TOCLIENT, SMTPServerProbingParser, 5, 5) < 0) {
return -1;
}
if (AppLayerProtoDetectPMRegisterPatternCSwPP(IPPROTO_TCP, ALPROTO_SMTP, "220-", 4, 0,
STREAM_TOCLIENT, SMTPServerProbingParser, 5, 5) < 0) {
return -1;
}

return 0;
}
Expand Down

0 comments on commit 4b95987

Please sign in to comment.