61 static int rule_warnings_only = 0;
117 { 0,
false,
false,
true,
"http_uri",
"http uri" },
118 { 0,
false,
false,
false,
"http_raw_uri",
"http raw uri" },
119 { 0,
false,
true,
false,
"http_method",
"http method" },
120 { 0,
false,
false,
false,
"http_request_line",
"http request line" },
121 { 0,
false,
false,
false,
"http_client_body",
"http client body" },
122 { 0,
false,
false,
true,
"http_header",
"http header" },
123 { 0,
false,
false,
false,
"http_raw_header",
"http raw header" },
124 { 0,
false,
false,
true,
"http_cookie",
"http cookie" },
125 { 0,
false,
false,
false,
"http_user_agent",
"http user agent" },
126 { 0,
false,
false,
false,
"http_host",
"http host" },
127 { 0,
false,
false,
false,
"http_raw_host",
"http raw host" },
128 { 0,
false,
false,
false,
"http_accept_enc",
"http accept enc" },
129 { 0,
false,
false,
false,
"http_referer",
"http referer" },
130 { 0,
false,
false,
false,
"http_content_type",
"http content type" },
131 { 0,
false,
false,
false,
"http_header_names",
"http header names" },
134 { 0,
false,
false,
false,
"http_stat_msg",
"http stat msg" },
135 { 0,
false,
false,
false,
"http_stat_code",
"http stat code" },
136 { 0,
false,
true,
false,
"file_data",
"http server body" },
139 { 0,
false,
false,
false,
"http_request_line",
"http request line" },
140 { 0,
false,
false,
false,
"http_accept",
"http accept" },
141 { 0,
false,
false,
false,
"http_accept_lang",
"http accept lang" },
142 { 0,
false,
false,
false,
"http_connection",
"http connection" },
143 { 0,
false,
false,
false,
"http_content_len",
"http content len" },
144 { 0,
false,
false,
false,
"http_protocol",
"http protocol" },
145 { 0,
false,
false,
false,
"http_start",
"http start" },
148 { 0,
false,
false,
false,
"http_response_line",
"http response line" },
149 { 0,
false,
false,
false,
"http.server",
"http server" },
150 { 0,
false,
false,
false,
"http.location",
"http location" },
153 static void FpPatternStatsAdd(
FpPatternStats *fp,
int list, uint16_t patlen)
162 else if (patlen < f->min)
174 int fast_pattern_set = 0;
175 int fast_pattern_only_set = 0;
176 int fast_pattern_chop_set = 0;
181 if (mpm_sm != NULL) {
184 fast_pattern_set = 1;
186 fast_pattern_only_set = 1;
188 fast_pattern_chop_set = 1;
194 fprintf(fp,
"== Sid: %u ==\n", s->
id);
195 fprintf(fp,
"%s\n", line);
197 fprintf(fp,
" Fast Pattern analysis:\n");
199 fprintf(fp,
" Prefilter on: %s\n",
206 fprintf(fp,
" No content present\n");
211 fprintf(fp,
" Fast pattern matcher: ");
212 int list_type = mpm_sm_list;
214 fprintf(fp,
"content\n");
219 fprintf(fp,
"%s (%s)\n", desc,
name);
224 fprintf(fp,
" Flags:");
226 fprintf(fp,
" Offset");
229 fprintf(fp,
" Depth");
233 fprintf(fp,
" Within");
237 fprintf(fp,
" Distance");
241 fprintf(fp,
" Nocase");
245 fprintf(fp,
" Negated");
249 fprintf(fp,
" None");
252 fprintf(fp,
" Fast pattern set: %s\n", fast_pattern_set ?
"yes" :
"no");
253 fprintf(fp,
" Fast pattern only set: %s\n", fast_pattern_only_set ?
"yes" :
"no");
254 fprintf(fp,
" Fast pattern chop set: %s\n", fast_pattern_chop_set ?
"yes" :
"no");
255 if (fast_pattern_chop_set) {
256 fprintf(fp,
" Fast pattern offset, length: %u, %u\n", fp_cd->
fp_chop_offset,
267 fprintf(fp,
" Original content: ");
271 if (fast_pattern_chop_set) {
280 fprintf(fp,
" Final content: ");
286 fprintf(fp,
" Final content: ");
305 int fp_engine_analysis_set = 0;
307 if ((
SCConfGetBool(
"engine-analysis.rules-fast-pattern", &fp_engine_analysis_set)) == 0) {
311 if (fp_engine_analysis_set == 0)
315 char *log_path =
SCMalloc(PATH_MAX);
316 if (log_path == NULL) {
317 FatalError(
"Unable to allocate scratch memory for rule filename");
319 snprintf(log_path, PATH_MAX,
"%s/%s%s", log_dir,
322 FILE *fp = fopen(log_path,
"w");
324 SCLogError(
"failed to open %s: %s", log_path, strerror(errno));
331 SCLogInfo(
"Engine-Analysis for fast_pattern printed to file - %s",
336 gettimeofday(&tval, NULL);
338 struct tm *tms =
SCLocalTime(tval.tv_sec, &local_tm);
339 fprintf(fp,
"----------------------------------------------"
340 "---------------------\n");
342 "Date: %" PRId32
"/%" PRId32
"/%04d -- "
344 tms->tm_mday, tms->tm_mon + 1, tms->tm_year + 1900, tms->tm_hour, tms->tm_min,
346 fprintf(fp,
"----------------------------------------------"
347 "---------------------\n");
360 #define DETECT_PERCENT_ENCODING_REGEX "%[0-9|a-f|A-F]{2}"
366 PCRE2_ZERO_TERMINATED, opts, &en, &eo, NULL);
368 PCRE2_UCHAR errbuffer[256];
369 pcre2_get_error_message(en, errbuffer,
sizeof(errbuffer));
390 }
else if (value && strcasecmp(value,
"warnings-only") == 0) {
392 rule_warnings_only = 1;
397 char log_path[PATH_MAX];
398 snprintf(log_path,
sizeof(log_path),
"%s/%s%s", log_dir,
402 SCLogError(
"failed to open %s: %s", log_path, strerror(errno));
406 SCLogInfo(
"Engine-Analysis for rules printed to file - %s",
410 gettimeofday(&tval, NULL);
412 struct tm *tms =
SCLocalTime(tval.tv_sec, &local_tm);
414 "----------------------------------------------"
415 "---------------------\n");
417 "Date: %" PRId32
"/%" PRId32
"/%04d -- "
419 tms->tm_mday, tms->tm_mon + 1, tms->tm_year + 1900, tms->tm_hour, tms->tm_min,
422 "----------------------------------------------"
423 "---------------------\n");
426 if (!PerCentEncodingSetup(
de_ctx->
ea)) {
428 "Error compiling regex; can't check for percent encoding in normalized "
434 SCLogInfo(
"Conf parameter \"engine-analysis.rules\" not found. "
435 "Defaulting to not printing the rules analysis report.");
438 SCLogInfo(
"Engine-Analysis for rules disabled in conf file.");
447 fprintf(fp,
"============\n"
448 "Summary:\n============\n");
456 "%s, smallest pattern %u byte(s), longest pattern %u byte(s), number of patterns "
457 "%u, avg pattern len %.2f byte(s)\n",
459 (
float)((
double)f->
tot / (
float)f->
cnt));
479 *fp_analysis =
false;
480 *rule_analysis =
false;
484 FatalError(
"Unable to allocate per-engine analysis context");
489 if (cfg_prefix_len > 0) {
494 FatalError(
"Unable to allocate per-engine analysis context name buffer");
500 *fp_analysis = SetupFPAnalyzer(
de_ctx);
501 *rule_analysis = SetupRuleAnalyzer(
de_ctx);
503 if (!(*fp_analysis || *rule_analysis)) {
516 CleanupRuleAnalyzer(
de_ctx);
517 CleanupFPAnalyzer(
de_ctx);
534 static int PerCentEncodingMatch(
EngineAnalysisCtx *ea_ctx, uint8_t *content, uint16_t content_len)
538 pcre2_match_data *match = pcre2_match_data_create_from_pattern(ea_ctx->
percent_re, NULL);
539 ret = pcre2_match(ea_ctx->
percent_re, (PCRE2_SPTR8)content, content_len, 0, 0, match, NULL);
542 }
else if (ret < -1) {
543 SCLogError(
"Error parsing content - %s; error code is %d", content, ret);
546 pcre2_match_data_free(match);
556 if (mpm_sm != NULL) {
594 const int list_type = mpm_sm_list;
603 payload ? (stream ?
"payload and reassembled stream" :
"payload")
604 :
"reassembled stream");
611 }
else if (desc ||
name) {
631 fprintf(tmp_fp,
"== Sid: UNKNOWN ==\n");
632 fprintf(tmp_fp,
"%s\n", line);
633 fprintf(tmp_fp,
" FAILURE: invalid rule.\n");
634 fprintf(tmp_fp,
" File: %s.\n", file);
635 fprintf(tmp_fp,
" Line: %d.\n", lineno);
636 fprintf(tmp_fp,
"\n");
653 vsnprintf(
str,
sizeof(
str), fmt, ap);
657 ctx->js_notes = SCJbNewArray();
659 SCJbAppendString(
ctx->js_notes,
str);
668 vsnprintf(
str,
sizeof(
str), fmt, ap);
671 if (!
ctx->js_warnings)
672 ctx->js_warnings = SCJbNewArray();
673 if (
ctx->js_warnings)
674 SCJbAppendString(
ctx->js_warnings,
str);
677 #define CHECK(pat) if (strlen((pat)) <= len && memcmp((pat), buf, MIN(len, strlen((pat)))) == 0) return true;
679 static bool LooksLikeHTTPMethod(
const uint8_t *buf, uint16_t
len)
688 static bool LooksLikeHTTPUA(
const uint8_t *buf, uint16_t
len)
690 CHECK(
"User-Agent: ");
691 CHECK(
"\nUser-Agent: ");
697 char pattern_str[1024] =
"";
700 SCJbSetString(js,
"pattern", pattern_str);
709 SCJbSetUint(js,
"offset", cd->
offset);
712 SCJbSetUint(js,
"depth", cd->
depth);
715 SCJbSetInt(js,
"distance", cd->
distance);
718 SCJbSetInt(js,
"within", cd->
within);
737 SCJbOpenArray(js,
"matches");
741 SCJbSetString(js,
"name", mname);
747 SCJbOpenObject(js,
"content");
750 AnalyzerNote(
ctx, (
char *)
"'fast_pattern:only' option is silently ignored and "
751 "is interpreted as regular 'fast_pattern'");
755 (
char *)
"pattern looks like it inspects HTTP, use http.request_line or "
756 "http.method and http.uri instead for improved performance");
760 (
char *)
"pattern looks like it inspects HTTP, use http.user_agent "
761 "or http.header for improved performance");
764 AnalyzerNote(
ctx, (
char *)
"'within' option for pattern w/o previous content "
765 "was converted to 'depth'");
768 AnalyzerNote(
ctx, (
char *)
"'distance' option for pattern w/o previous content "
769 "was converted to 'offset'");
777 SCJbOpenObject(js,
"pcre");
782 (
char *)
"'/B' (rawbytes) option is a no-op and is silently ignored");
789 SCJbOpenObject(js,
"byte_jump");
790 SCJbSetUint(js,
"nbytes", cd->
nbytes);
791 SCJbSetInt(js,
"offset", cd->
offset);
792 SCJbSetUint(js,
"multiplier", cd->
multiplier);
796 SCJbSetString(js,
"base",
"unset");
799 SCJbSetString(js,
"base",
"oct");
802 SCJbSetString(js,
"base",
"dec");
805 SCJbSetString(js,
"base",
"hex");
808 SCJbOpenArray(js,
"flags");
810 SCJbAppendString(js,
"from_beginning");
812 SCJbAppendString(js,
"little_endian");
814 SCJbAppendString(js,
"big_endian");
816 SCJbAppendString(js,
"string");
818 SCJbAppendString(js,
"relative");
820 SCJbAppendString(js,
"align");
822 SCJbAppendString(js,
"dce");
824 SCJbAppendString(js,
"offset_be");
826 SCJbAppendString(js,
"from_end");
834 SCJbOpenObject(js,
"byte_test");
835 SCJbSetUint(js,
"nbytes", cd->
nbytes);
836 SCJbSetInt(js,
"offset", cd->
offset);
839 SCJbSetString(js,
"base",
"unset");
842 SCJbSetString(js,
"base",
"oct");
845 SCJbSetString(js,
"base",
"dec");
848 SCJbSetString(js,
"base",
"hex");
851 SCJbOpenArray(js,
"flags");
853 SCJbAppendString(js,
"little_endian");
855 SCJbAppendString(js,
"big_endian");
857 SCJbAppendString(js,
"string");
859 SCJbAppendString(js,
"relative");
861 SCJbAppendString(js,
"dce");
868 SCJbOpenObject(js,
"absent");
869 SCJbSetBool(js,
"or_else", dad->
or_else);
877 SCJbOpenObject(js,
"ipopts");
879 SCJbSetString(js,
"option", flag);
886 SCJbOpenObject(js,
"flowbits");
889 SCJbSetString(js,
"cmd",
"isset");
892 SCJbSetString(js,
"cmd",
"isnotset");
895 SCJbSetString(js,
"cmd",
"set");
898 SCJbSetString(js,
"cmd",
"unset");
901 SCJbSetString(js,
"cmd",
"toggle");
905 SCJbOpenArray(js,
"names");
911 const char *varname =
913 SCJbAppendString(js, varname);
918 SCJbSetString(js,
"operator",
"or");
926 SCJbOpenObject(js,
"xbits");
929 SCJbSetString(js,
"cmd",
"isset");
932 SCJbSetString(js,
"cmd",
"isnotset");
935 SCJbSetString(js,
"cmd",
"set");
938 SCJbSetString(js,
"cmd",
"unset");
941 SCJbSetString(js,
"cmd",
"toggle");
947 SCJbSetString(js,
"track",
"ip_src");
950 SCJbSetString(js,
"track",
"ip_dst");
953 SCJbSetString(js,
"track",
"ip_pair");
956 SCJbSetString(js,
"track",
"tx");
960 SCJbSetUint(js,
"expire", xd->
expire);
967 SCJbOpenObject(js,
"flowint");
970 SCJbSetString(js,
"cmd",
"set");
973 SCJbSetString(js,
"cmd",
"add");
976 SCJbSetString(js,
"cmd",
"sub");
979 SCJbSetString(js,
"cmd",
"lt");
982 SCJbSetString(js,
"cmd",
"lte");
985 SCJbSetString(js,
"cmd",
"eq");
988 SCJbSetString(js,
"cmd",
"ne");
991 SCJbSetString(js,
"cmd",
"gte");
994 SCJbSetString(js,
"cmd",
"gt");
997 SCJbSetString(js,
"cmd",
"isset");
1000 SCJbSetString(js,
"cmd",
"isnotset");
1004 if (varname != NULL) {
1005 SCJbSetString(js,
"var", varname);
1019 SCJbOpenObject(js,
"ack");
1020 SCDetectU32ToJson(js, cd);
1026 SCJbOpenObject(js,
"seq");
1027 SCDetectU32ToJson(js, cd);
1033 SCJbOpenObject(js,
"tcp_mss");
1034 SCDetectU16ToJson(js, cd);
1040 SCJbOpenObject(js,
"dsize");
1041 SCDetectU16ToJson(js, cd);
1047 SCJbOpenObject(js,
"code");
1048 SCDetectU8ToJson(js, cd);
1054 SCJbOpenObject(js,
"ttl");
1055 SCDetectU8ToJson(js, cd);
1061 SCJbOpenObject(js,
"id");
1062 SCDetectU16ToJson(js, cd);
1068 SCJbOpenObject(js,
"window");
1069 SCDetectU16ToJson(js, cd);
1075 SCJbOpenObject(js,
"flow_age");
1076 SCDetectU32ToJson(js, cd);
1081 const uint8_t *dfd = (
const uint8_t *)smd->
ctx;
1082 SCJbOpenObject(js,
"flow_elephant");
1084 case DETECT_FLOW_TOSERVER:
1085 SCJbSetString(js,
"dir",
"toserver");
1087 case DETECT_FLOW_TOCLIENT:
1088 SCJbSetString(js,
"dir",
"toclient");
1090 case DETECT_FLOW_TOEITHER:
1091 SCJbSetString(js,
"dir",
"either");
1093 case DETECT_FLOW_TOBOTH:
1094 SCJbSetString(js,
"dir",
"both");
1117 ctx.js = SCJbNewObject();
1128 SCJbSetUint(
ctx.js,
"id", s->
id);
1129 SCJbSetUint(
ctx.js,
"gid", s->
gid);
1130 SCJbSetUint(
ctx.js,
"rev", s->
rev);
1131 SCJbSetString(
ctx.js,
"msg", s->
msg);
1134 SCJbSetString(
ctx.js,
"app_proto", alproto);
1136 SCJbOpenArray(
ctx.js,
"requirements");
1138 SCJbAppendString(
ctx.js,
"payload");
1141 SCJbAppendString(
ctx.js,
"no_payload");
1144 SCJbAppendString(
ctx.js,
"flow");
1147 SCJbAppendString(
ctx.js,
"tcp_flags_init_deinit");
1150 SCJbAppendString(
ctx.js,
"tcp_flags_unusual");
1153 SCJbAppendString(
ctx.js,
"engine_event");
1156 SCJbAppendString(
ctx.js,
"real_pkt");
1160 SCJbOpenObject(
ctx.js,
"match_policy");
1161 SCJbOpenArray(
ctx.js,
"actions");
1163 SCJbAppendString(
ctx.js,
"alert");
1166 SCJbAppendString(
ctx.js,
"drop");
1169 SCJbAppendString(
ctx.js,
"reject");
1172 SCJbAppendString(
ctx.js,
"reject_dst");
1175 SCJbAppendString(
ctx.js,
"reject_both");
1178 SCJbAppendString(
ctx.js,
"config");
1181 SCJbAppendString(
ctx.js,
"pass");
1184 SCJbAppendString(
ctx.js,
"accept");
1190 switch (flow_action) {
1192 SCJbSetString(
ctx.js,
"scope",
"packet");
1195 SCJbSetString(
ctx.js,
"scope",
"flow");
1198 SCJbSetString(
ctx.js,
"scope",
"flow_if_stateful");
1205 SCJbSetString(
ctx.js,
"scope",
"packet");
1208 SCJbSetString(
ctx.js,
"scope",
"flow");
1211 SCJbSetString(
ctx.js,
"scope",
"hook");
1214 SCJbSetString(
ctx.js,
"scope",
"tx");
1224 SCJbSetString(
ctx.js,
"type",
"unset");
1227 SCJbSetString(
ctx.js,
"type",
"ip_only");
1230 SCJbSetString(
ctx.js,
"type",
"like_ip_only");
1233 SCJbSetString(
ctx.js,
"type",
"pd_only");
1236 SCJbSetString(
ctx.js,
"type",
"de_only");
1239 SCJbSetString(
ctx.js,
"type",
"pkt");
1242 SCJbSetString(
ctx.js,
"type",
"pkt_stream");
1245 SCJbSetString(
ctx.js,
"type",
"stream");
1248 SCJbSetString(
ctx.js,
"type",
"app_layer");
1251 SCJbSetString(
ctx.js,
"type",
"app_tx");
1254 SCJbSetString(
ctx.js,
"type",
"error");
1260 SCJbOpenObject(
ctx.js,
"dependencies");
1261 SCJbOpenObject(
ctx.js,
"flowbits");
1262 SCJbOpenObject(
ctx.js,
"upstream");
1264 SCJbOpenObject(
ctx.js,
"state_modifying_rules");
1265 SCJbOpenArray(
ctx.js,
"sids");
1270 SCJbOpenArray(
ctx.js,
"names");
1273 SCJbAppendString(
ctx.js,
1286 SCJbOpenArray(
ctx.js,
"flags");
1288 SCJbAppendString(
ctx.js,
"src_any");
1291 SCJbAppendString(
ctx.js,
"dst_any");
1294 SCJbAppendString(
ctx.js,
"sp_any");
1297 SCJbAppendString(
ctx.js,
"dp_any");
1300 SCJbAppendString(
ctx.js,
"noalert");
1303 SCJbAppendString(
ctx.js,
"dsize");
1306 SCJbAppendString(
ctx.js,
"applayer");
1309 SCJbAppendString(
ctx.js,
"need_packet");
1312 SCJbAppendString(
ctx.js,
"need_stream");
1315 SCJbAppendString(
ctx.js,
"negated_mpm");
1318 SCJbAppendString(
ctx.js,
"flush");
1321 SCJbAppendString(
ctx.js,
"need_flowvar");
1324 SCJbAppendString(
ctx.js,
"filestore");
1327 SCJbAppendString(
ctx.js,
"toserver");
1330 SCJbAppendString(
ctx.js,
"toclient");
1333 SCJbAppendString(
ctx.js,
"tlsstore");
1336 SCJbAppendString(
ctx.js,
"bypass");
1339 SCJbAppendString(
ctx.js,
"prefilter");
1342 SCJbAppendString(
ctx.js,
"src_is_target");
1345 SCJbAppendString(
ctx.js,
"dst_is_target");
1352 SCJbOpenArray(
ctx.js,
"pkt_engines");
1354 for ( ; pkt != NULL; pkt = pkt->
next) {
1369 SCJbStartObject(
ctx.js);
1370 SCJbSetString(
ctx.js,
"name",
name);
1371 SCJbSetBool(
ctx.js,
"is_mpm", pkt->
mpm);
1373 SCJbOpenArray(
ctx.js,
"transforms");
1375 SCJbStartObject(
ctx.js);
1376 SCJbSetString(
ctx.js,
"name",
1389 SCJbOpenArray(
ctx.js,
"frame_engines");
1391 for (; frame != NULL; frame = frame->
next) {
1393 SCJbStartObject(
ctx.js);
1394 SCJbSetString(
ctx.js,
"name",
name);
1395 SCJbSetBool(
ctx.js,
"is_mpm", frame->
mpm);
1397 SCJbOpenArray(
ctx.js,
"transforms");
1399 SCJbStartObject(
ctx.js);
1400 SCJbSetString(
ctx.js,
"name",
1412 bool has_stream =
false;
1413 bool has_client_body_mpm =
false;
1414 bool has_file_data_mpm =
false;
1416 SCJbOpenArray(
ctx.js,
"engines");
1418 for ( ; app != NULL; app = app->
next) {
1433 }
else if (app->
mpm && strcmp(
name,
"http_client_body") == 0) {
1434 has_client_body_mpm =
true;
1435 }
else if (app->
mpm && strcmp(
name,
"file_data") == 0) {
1436 has_file_data_mpm =
true;
1439 SCJbStartObject(
ctx.js);
1440 SCJbSetString(
ctx.js,
"name",
name);
1441 const char *direction = app->
dir == 0 ?
"toserver" :
"toclient";
1442 SCJbSetString(
ctx.js,
"direction", direction);
1443 SCJbSetBool(
ctx.js,
"is_mpm", app->
mpm);
1448 SCJbOpenArray(
ctx.js,
"transforms");
1450 SCJbStartObject(
ctx.js);
1451 SCJbSetString(
ctx.js,
"name",
1465 if (has_stream && has_client_body_mpm)
1466 AnalyzerNote(&
ctx, (
char *)
"mpm in http_client_body combined with stream match leads to stream buffering");
1467 if (has_stream && has_file_data_mpm)
1468 AnalyzerNote(&
ctx, (
char *)
"mpm in file_data combined with stream match leads to stream buffering");
1471 SCJbOpenObject(
ctx.js,
"lists");
1481 if (pkt_mpm || app_mpm) {
1482 SCJbOpenObject(
ctx.js,
"mpm");
1490 SCJbSetString(
ctx.js,
"buffer",
name);
1497 switch (smd->
type) {
1501 DumpContent(
ctx.js, cd);
1513 SCJbOpenObject(
ctx.js,
"prefilter");
1520 SCJbSetString(
ctx.js,
"buffer",
name);
1522 SCJbSetString(
ctx.js,
"name", mname);
1526 if (
ctx.js_warnings) {
1527 SCJbClose(
ctx.js_warnings);
1528 SCJbSetObject(
ctx.js,
"warnings",
ctx.js_warnings);
1529 SCJbFree(
ctx.js_warnings);
1530 ctx.js_warnings = NULL;
1533 SCJbClose(
ctx.js_notes);
1534 SCJbSetObject(
ctx.js,
"notes",
ctx.js_notes);
1535 SCJbFree(
ctx.js_notes);
1536 ctx.js_notes = NULL;
1540 const char *filename =
"rules.json";
1542 char json_path[PATH_MAX] =
"";
1543 snprintf(json_path,
sizeof(json_path),
"%s/%s%s", log_dir,
1547 FILE *fp = fopen(json_path,
"a");
1549 fwrite(SCJbPtr(
ctx.js), SCJbLen(
ctx.js), 1, fp);
1563 SCJsonBuilder *root_jb = SCJbNewObject();
1567 SCJbOpenArray(root_jb,
"buffers");
1571 char str[1024] =
"";
1575 SCJsonBuilder *jb = arrays[p->
sm_list];
1576 if (arrays[p->
sm_list] == NULL) {
1577 jb = arrays[p->
sm_list] = SCJbNewObject();
1583 SCJbSetString(jb,
"name",
name);
1584 SCJbSetUint(jb,
"list_id", p->
sm_list);
1586 SCJbOpenArray(jb,
"patterns");
1589 SCJbStartObject(jb);
1590 SCJbSetString(jb,
"pattern",
str);
1592 SCJbSetUint(jb,
"cnt", p->
cnt);
1593 SCJbSetUint(jb,
"mpm", p->
mpm);
1594 SCJbOpenObject(jb,
"flags");
1605 SCJsonBuilder *jb = arrays[i];
1612 SCJbAppendObject(root_jb, jb);
1618 const char *filename =
"patterns.json";
1620 char json_path[PATH_MAX] =
"";
1621 snprintf(json_path,
sizeof(json_path),
"%s/%s%s", log_dir,
1625 FILE *fp = fopen(json_path,
"a");
1627 fwrite(SCJbPtr(root_jb), SCJbLen(root_jb), 1, fp);
1648 EngineAnalysisItemsReset(ea_ctx);
1656 FatalError(
"Unable to allocate analysis scratch pad");
1666 analyzer_item->
item_id = (uint16_t)item_id;
1667 if (analyzer_item->
item_id == -1) {
1669 FatalError(
"unable to initialize engine-analysis table: detect buffer \"%s\" not "
1702 uint32_t rule_bidirectional = 0;
1703 uint32_t rule_pcre = 0;
1704 uint32_t rule_pcre_http = 0;
1705 uint32_t rule_content = 0;
1706 uint32_t rule_flow = 0;
1707 uint32_t rule_flags = 0;
1708 uint32_t rule_flow_toserver = 0;
1709 uint32_t rule_flow_toclient = 0;
1710 uint32_t rule_flow_nostream = 0;
1711 uint32_t rule_ipv4_only = 0;
1712 uint32_t rule_ipv6_only = 0;
1713 uint32_t rule_flowbits = 0;
1714 uint32_t rule_flowint = 0;
1715 uint32_t rule_content_http = 0;
1716 uint32_t rule_content_offset_depth = 0;
1717 int32_t list_id = 0;
1718 uint32_t rule_warning = 0;
1719 uint32_t stream_buf = 0;
1720 uint32_t packet_buf = 0;
1721 uint32_t file_store = 0;
1722 uint32_t warn_pcre_no_content = 0;
1723 uint32_t warn_pcre_http_content = 0;
1724 uint32_t warn_pcre_http = 0;
1725 uint32_t warn_content_http_content = 0;
1726 uint32_t warn_content_http = 0;
1727 uint32_t warn_tcp_no_flow = 0;
1728 uint32_t warn_client_ports = 0;
1729 uint32_t warn_direction = 0;
1730 uint32_t warn_method_toclient = 0;
1731 uint32_t warn_method_serverbody = 0;
1732 uint32_t warn_pcre_method = 0;
1733 uint32_t warn_encoding_norm_http_buf = 0;
1734 uint32_t warn_file_store_not_present = 0;
1735 uint32_t warn_offset_depth_pkt_stream = 0;
1736 uint32_t warn_offset_depth_alproto = 0;
1737 uint32_t warn_non_alproto_fp_for_alproto_sig = 0;
1738 uint32_t warn_no_direction = 0;
1739 uint32_t warn_both_direction = 0;
1741 EngineAnalysisItemsInit(
de_ctx->
ea);
1747 rule_bidirectional = 1;
1761 rule_ipv4_only += 1;
1764 rule_ipv6_only += 1;
1772 if (item_slot == -1) {
1780 if (item_slot == -1) {
1785 rule_content_offset_depth++;
1791 rule_content_http++;
1798 warn_encoding_norm_http_buf += 1;
1805 rule_flow_toserver = 1;
1808 rule_flow_toclient = 1;
1813 rule_flow_nostream = 1;
1827 if (sm->
ctx != NULL) {
1837 warn_file_store_not_present = 1;
1840 if (rule_pcre > 0 && rule_content == 0 && rule_content_http == 0) {
1842 warn_pcre_no_content = 1;
1845 if (rule_content_http > 0 && rule_pcre > 0 && rule_pcre_http == 0) {
1847 warn_pcre_http_content = 1;
1853 if (rule_content > 0 && rule_content_http > 0) {
1855 warn_content_http_content = 1;
1859 warn_content_http = 1;
1861 if (rule_content == 1) {
1866 (rule_content || rule_content_http || rule_pcre || rule_pcre_http || rule_flowbits ||
1869 warn_tcp_no_flow = 1;
1871 if (rule_flow && !rule_bidirectional && (rule_flow_toserver || rule_flow_toclient)
1876 warn_client_ports = 1;
1879 if (rule_flow && rule_bidirectional && (rule_flow_toserver || rule_flow_toclient)) {
1884 if (*http_method_item_seen_ptr) {
1885 if (rule_flow && rule_flow_toclient) {
1887 warn_method_toclient = 1;
1889 if (*http_server_body_item_seen_ptr) {
1891 warn_method_serverbody = 1;
1893 if (rule_content == 0 && rule_content_http == 0 && (rule_pcre > 0 || rule_pcre_http > 0)) {
1895 warn_pcre_method = 1;
1898 if (rule_content_offset_depth > 0 && stream_buf && packet_buf) {
1900 warn_offset_depth_pkt_stream = 1;
1904 warn_offset_depth_alproto = 1;
1909 warn_non_alproto_fp_for_alproto_sig = 1;
1913 warn_no_direction += 1;
1921 warn_both_direction += 1;
1926 if (!rule_warnings_only || (rule_warnings_only && rule_warning > 0)) {
1928 fprintf(fp,
"== Sid: %u ==\n", s->
id);
1929 fprintf(fp,
"%s\n", line);
1935 fprintf(fp,
" Rule is ip only.\n");
1938 fprintf(fp,
" Rule is like ip only.\n");
1941 fprintf(fp,
" Rule is PD only.\n");
1944 fprintf(fp,
" Rule is DE only.\n");
1947 fprintf(fp,
" Rule is packet inspecting.\n");
1950 fprintf(fp,
" Rule is packet and stream inspecting.\n");
1953 fprintf(fp,
" Rule is stream inspecting.\n");
1956 fprintf(fp,
" Rule is app-layer inspecting.\n");
1959 fprintf(fp,
" Rule is App-layer TX inspecting.\n");
1965 fprintf(fp,
" Rule is IPv6 only.\n");
1967 fprintf(fp,
" Rule is IPv4 only.\n");
1969 fprintf(fp,
" Rule matches on packets.\n");
1970 if (!rule_flow_nostream && stream_buf &&
1971 (rule_flow || rule_flowbits || rule_flowint || rule_content || rule_pcre)) {
1972 fprintf(fp,
" Rule matches on reassembled stream.\n");
1977 fprintf(fp,
" Rule matches on %s buffer.\n", ai->
display_name);
1983 if (rule_content || rule_content_http || rule_pcre || rule_pcre_http) {
1985 " Rule contains %u content options, %u http content options, %u pcre "
1986 "options, and %u pcre options with http modifiers.\n",
1987 rule_content, rule_content_http, rule_pcre, rule_pcre_http);
1992 fprintf(fp,
" Prefilter on: %s.\n",
1995 EngineAnalysisRulesPrintFP(
de_ctx, s);
1999 if (warn_pcre_no_content ) {
2000 fprintf(fp,
" Warning: Rule uses pcre without a content option present.\n"
2001 " -Consider adding a content to improve performance of this "
2004 if (warn_pcre_http_content ) {
2005 fprintf(fp,
" Warning: Rule uses content options with http_* and pcre options "
2006 "without http modifiers.\n"
2007 " -Consider adding http pcre modifier.\n");
2009 else if (warn_pcre_http ) {
2010 fprintf(fp,
" Warning: Rule app layer protocol is http, but pcre options do not "
2011 "have http modifiers.\n"
2012 " -Consider adding http pcre modifiers.\n");
2014 if (warn_content_http_content ) {
2016 " Warning: Rule contains content with http_* and content without http_*.\n"
2017 " -Consider adding http content modifiers.\n");
2019 if (warn_content_http ) {
2020 fprintf(fp,
" Warning: Rule app layer protocol is http, but content options do not "
2021 "have http_* modifiers.\n"
2022 " -Consider adding http content modifiers.\n");
2024 if (rule_content == 1) {
2027 if (warn_encoding_norm_http_buf) {
2028 fprintf(fp,
" Warning: Rule may contain percent encoded content for a normalized "
2029 "http buffer match.\n");
2031 if (warn_tcp_no_flow
2033 fprintf(fp,
" Warning: TCP rule without a flow or flags option.\n"
2034 " -Consider adding flow or flags to improve performance of "
2037 if (warn_client_ports
2042 " Warning: Rule contains ports or port variables only on the client side.\n"
2043 " -Flow direction possibly inconsistent with rule.\n");
2045 if (warn_direction ) {
2046 fprintf(fp,
" Warning: Rule is bidirectional and has a flow option with a specific "
2049 if (warn_method_toclient ) {
2050 fprintf(fp,
" Warning: Rule uses content or pcre for http_method with "
2051 "flow:to_client or from_server\n");
2053 if (warn_method_serverbody ) {
2054 fprintf(fp,
" Warning: Rule uses content or pcre for http_method with content or "
2055 "pcre for http_server_body.\n");
2057 if (warn_pcre_method
2059 fprintf(fp,
" Warning: Rule uses pcre with only a http_method content; possible "
2060 "performance issue.\n");
2062 if (warn_offset_depth_pkt_stream) {
2063 fprintf(fp,
" Warning: Rule has depth"
2064 "/offset with raw content keywords. Please note the "
2065 "offset/depth will be checked against both packet "
2066 "payloads and stream. If you meant to have the offset/"
2067 "depth checked against just the payload, you can update "
2068 "the signature as \"alert tcp-pkt...\"\n");
2070 if (warn_offset_depth_alproto) {
2072 " Warning: Rule has "
2073 "offset/depth set along with a match on a specific "
2074 "app layer protocol - %d. This can lead to FNs if we "
2075 "have a offset/depth content match on a packet payload "
2076 "before we can detect the app layer protocol for the "
2080 if (warn_non_alproto_fp_for_alproto_sig) {
2081 fprintf(fp,
" Warning: Rule app layer "
2082 "protocol is http, but the fast_pattern is set on the raw "
2083 "stream. Consider adding fast_pattern over a http "
2084 "buffer for increased performance.");
2086 if (warn_no_direction) {
2087 fprintf(fp,
" Warning: Rule has no direction indicator.\n");
2089 if (warn_both_direction) {
2090 fprintf(fp,
" Warning: Rule is inspecting both the request and the response.\n");
2092 if (warn_file_store_not_present) {
2093 fprintf(fp,
" Warning: Rule requires file-store but the output file-store is not "
2096 if (rule_warning == 0) {
2097 fprintf(fp,
" No warnings for this rule.\n");
2108 uint32_t accept_rules = 0;
2109 SCJbSetString(
ctx->js,
"policy",
"drop:flow");
2110 SCJbOpenArray(
ctx->js,
"rules");
2119 if (direction == STREAM_TOSERVER) {
2136 if (accept_rules == 0) {
2137 AnalyzerWarning(
ctx, (
char *)
"no accept rules for state, default policy will be applied");
2144 ctx.js = SCJbNewObject();
2148 SCJbOpenObject(
ctx.js,
"tables");
2149 SCJbOpenObject(
ctx.js,
"packet:filter");
2150 SCJbSetString(
ctx.js,
"policy",
"drop:packet");
2151 SCJbOpenArray(
ctx.js,
"rules");
2152 uint32_t accept_rules = 0;
2153 uint32_t last_sid = 0;
2160 if (last_sid == s->
id)
2167 if (accept_rules == 0) {
2168 AnalyzerWarning(&
ctx,
2169 (
char *)
"no accept rules for \'packet:filter\', default policy will be applied");
2171 if (
ctx.js_warnings) {
2172 SCJbClose(
ctx.js_warnings);
2173 SCJbSetObject(
ctx.js,
"warnings",
ctx.js_warnings);
2174 SCJbFree(
ctx.js_warnings);
2175 ctx.js_warnings = NULL;
2180 if (!AppProtoIsValid(a))
2189 const uint8_t complete_state_ts =
2191 for (uint8_t state = 0; state < complete_state_ts; state++) {
2194 char table_name[128];
2196 SCJbOpenObject(
ctx.js, table_name);
2197 FirewallAddRulesForState(
de_ctx, a, state, STREAM_TOSERVER, &
ctx);
2198 if (
ctx.js_warnings) {
2199 SCJbClose(
ctx.js_warnings);
2200 SCJbSetObject(
ctx.js,
"warnings",
ctx.js_warnings);
2201 SCJbFree(
ctx.js_warnings);
2202 ctx.js_warnings = NULL;
2206 const uint8_t complete_state_tc =
2208 for (uint8_t state = 0; state < complete_state_tc; state++) {
2211 char table_name[128];
2213 SCJbOpenObject(
ctx.js, table_name);
2214 FirewallAddRulesForState(
de_ctx, a, state, STREAM_TOCLIENT, &
ctx);
2215 if (
ctx.js_warnings) {
2216 SCJbClose(
ctx.js_warnings);
2217 SCJbSetObject(
ctx.js,
"warnings",
ctx.js_warnings);
2218 SCJbFree(
ctx.js_warnings);
2219 ctx.js_warnings = NULL;
2225 SCJbOpenObject(
ctx.js,
"packet:td");
2226 SCJbSetString(
ctx.js,
"policy",
"accept:hook");
2228 SCJbOpenArray(
ctx.js,
"rules");
2234 if (last_sid == s->
id)
2241 SCJbOpenObject(
ctx.js,
"app:td");
2242 SCJbSetString(
ctx.js,
"policy",
"accept:hook");
2244 SCJbOpenArray(
ctx.js,
"rules");
2250 if (last_sid == s->
id)
2259 SCJbOpenObject(
ctx.js,
"lists");
2260 SCJbOpenObject(
ctx.js,
"firewall");
2262 SCJbOpenArray(
ctx.js,
"rules");
2266 if (last_sid == s->
id)
2274 SCJbOpenObject(
ctx.js,
"td");
2276 SCJbOpenArray(
ctx.js,
"rules");
2280 if (last_sid == s->
id)
2288 SCJbOpenObject(
ctx.js,
"all");
2290 SCJbOpenArray(
ctx.js,
"rules");
2292 if (last_sid == s->
id)
2304 const char *filename =
"firewall.json";
2306 char json_path[PATH_MAX] =
"";
2307 snprintf(json_path,
sizeof(json_path),
"%s/%s", log_dir, filename);
2310 FILE *fp = fopen(json_path,
"w");
2312 fwrite(SCJbPtr(
ctx.js), SCJbLen(
ctx.js), 1, fp);