Merge remote-tracking branch 'origin/master' into topic/icmp6

This commit is contained in:
Daniel Thayer 2012-02-27 13:33:05 -06:00
commit 0a659c0907
68 changed files with 634 additions and 343 deletions

48
CHANGES
View file

@ -1,4 +1,52 @@
2.0-121 | 2012-02-24 16:34:17 -0800
* A number of smaller memory fixes and code cleanups. (Julien
Sentier)
* Add to_subnet bif. Fixes #782). (Jon Siwek)
* Fix IPAddr::Mask/ReverseMask not allowing argument of 0. (Jon
Siwek)
* Refactor IPAddr v4 initialization from string. Fixes #775. (Jon Siwek)
* Parse the dotted address string directly instead of canonicalizing
and passing to inet_pton. (Jon Siwek)
2.0-108 | 2012-02-24 15:21:07 -0800
* Refactoring a number of usages of new IPAddr class. (Jon Siwek)
* Fixed a bug in remask_addr bif. (Jon Siwek)
2.0-106 | 2012-02-24 15:02:20 -0800
* Raise minimum required CMake version to 2.6.3. (Jon Siwek)
2.0-104 | 2012-02-24 14:59:12 -0800
* Add test case for FTP over IPv4. (Daniel Thayer)
* Fix IPv6 URLs in ftp.log. (Daniel Thayer)
* Add a test for FTP over IPv6 (Daniel Thayer)
* Fix parsing of FTP EPRT command and EPSV response. (Daniel Thayer)
2.0-95 | 2012-02-22 05:27:34 -0800
* GeoIP installation documentation update. (Seth Hall)
* Decrease strictness of parsing IPv4 strings into addrs. Fixes #775. (Jon Siwek)
* Fix memory leak in DNS manager. Fixes #777. (Jon Siwek)
* Fix IPAddr/IPPrefix serialization bugs. (Jon Siwek)
* Fix compile error. (Jon Siwek)
2.0-86 | 2012-02-17 15:41:06 -0800 2.0-86 | 2012-02-17 15:41:06 -0800
* Changing ARP detection to always kick in even if no analyzer is * Changing ARP detection to always kick in even if no analyzer is

View file

@ -1,5 +1,5 @@
project(Bro C CXX) project(Bro C CXX)
cmake_minimum_required(VERSION 2.6 FATAL_ERROR) cmake_minimum_required(VERSION 2.6.3 FATAL_ERROR)
include(cmake/CommonCMakeConfig.cmake) include(cmake/CommonCMakeConfig.cmake)
######################################################################## ########################################################################

View file

@ -8,7 +8,7 @@ Prerequisites
Bro relies on the following libraries and tools, which need to be installed Bro relies on the following libraries and tools, which need to be installed
before you begin: before you begin:
* CMake 2.6 or greater http://www.cmake.org * CMake 2.6.3 or greater http://www.cmake.org
* Libpcap (headers and libraries) http://www.tcpdump.org * Libpcap (headers and libraries) http://www.tcpdump.org

4
NEWS
View file

@ -9,6 +9,10 @@ release. For a complete list of changes, see the ``CHANGES`` file.
Bro 2.1 Bro 2.1
------- -------
- Dependencies:
* Bro now requires CMake >= 2.6.3.
- Bro now supports IPv6 out of the box; the configure switch - Bro now supports IPv6 out of the box; the configure switch
--enable-brov6 is gone. --enable-brov6 is gone.

View file

@ -1 +1 @@
2.0-86 2.0-121

@ -1 +1 @@
Subproject commit 43308aab47a3357ca1885e1b6954154a2744d821 Subproject commit 3034da8f082b61157e234237993ffd7a95be6e62

@ -1 +1 @@
Subproject commit 139cc2e1e049c4e1cc7e95f20866102be1d3d599 Subproject commit f53bcb2b492cb0db3dd288384040abc2ab711767

@ -1 +1 @@
Subproject commit 930e7c78221929849086a578308e2fdc99ac3fb8 Subproject commit 3b63c3f1e7d915b1bda16862bfa4a8593ffc38f6

@ -1 +1 @@
Subproject commit e908ba686dceb56065bdf569c18dd0f67f662f6b Subproject commit 954538514d71983e7ef3f0e109960466096e1c1d

View file

@ -103,7 +103,13 @@ Optional Dependencies
Bro can use libGeoIP for geo-locating IP addresses, and sendmail for Bro can use libGeoIP for geo-locating IP addresses, and sendmail for
sending emails. sending emails.
* RPM/RedHat-based Linux: * RedHat Enterprise Linux:
.. console::
sudo yum install geoip-devel sendmail
* CentOS Linux:
.. console:: .. console::

View file

@ -165,7 +165,12 @@ function ftp_message(s: Info)
local arg = s$cmdarg$arg; local arg = s$cmdarg$arg;
if ( s$cmdarg$cmd in file_cmds ) if ( s$cmdarg$cmd in file_cmds )
{
if ( is_v4_addr(s$id$resp_h) )
arg = fmt("ftp://%s%s", s$id$resp_h, build_path_compressed(s$cwd, arg)); arg = fmt("ftp://%s%s", s$id$resp_h, build_path_compressed(s$cwd, arg));
else
arg = fmt("ftp://[%s]%s", s$id$resp_h, build_path_compressed(s$cwd, arg));
}
s$ts=s$cmdarg$ts; s$ts=s$cmdarg$ts;
s$command=s$cmdarg$cmd; s$command=s$cmdarg$cmd;
@ -270,7 +275,7 @@ event ftp_reply(c: connection, code: count, msg: string, cont_resp: bool) &prior
{ {
c$ftp$passive=T; c$ftp$passive=T;
if ( code == 229 && data$h == 0.0.0.0 ) if ( code == 229 && data$h == :: )
data$h = id$resp_h; data$h = id$resp_h;
ftp_data_expected[data$h, data$p] = c$ftp; ftp_data_expected[data$h, data$p] = c$ftp;

View file

@ -85,12 +85,13 @@ void BroDoc::AddImport(const std::string& s)
if ( ext_pos != std::string::npos ) if ( ext_pos != std::string::npos )
lname = lname.substr(0, ext_pos); lname = lname.substr(0, ext_pos);
const char* full_filename = "<error>"; const char* full_filename = NULL;
const char* subpath = "<error>"; const char* subpath = NULL;
FILE* f = search_for_file(lname.c_str(), "bro", &full_filename, true, FILE* f = search_for_file(lname.c_str(), "bro", &full_filename, true,
&subpath); &subpath);
if ( f ) if ( f && full_filename && subpath )
{ {
fclose(f); fclose(f);
@ -126,12 +127,14 @@ void BroDoc::AddImport(const std::string& s)
} }
delete [] tmp; delete [] tmp;
delete [] full_filename;
delete [] subpath;
} }
else else
fprintf(stderr, "Failed to document '@load %s' in file: %s\n", fprintf(stderr, "Failed to document '@load %s' in file: %s\n",
s.c_str(), reST_filename.c_str()); s.c_str(), reST_filename.c_str());
delete [] full_filename;
delete [] subpath;
} }
void BroDoc::SetPacketFilter(const std::string& s) void BroDoc::SetPacketFilter(const std::string& s)

View file

@ -108,12 +108,7 @@ char* CompositeHash::SingleValHash(int type_check, char* kp0,
case TYPE_INTERNAL_ADDR: case TYPE_INTERNAL_ADDR:
{ {
uint32* kp = AlignAndPadType<uint32>(kp0); uint32* kp = AlignAndPadType<uint32>(kp0);
uint32 bytes[4]; v->AsAddr().CopyIPv6(kp);
v->AsAddr().CopyIPv6(bytes);
kp[0] = bytes[0];
kp[1] = bytes[1];
kp[2] = bytes[2];
kp[3] = bytes[3];
kp1 = reinterpret_cast<char*>(kp+4); kp1 = reinterpret_cast<char*>(kp+4);
} }
break; break;
@ -121,12 +116,7 @@ char* CompositeHash::SingleValHash(int type_check, char* kp0,
case TYPE_INTERNAL_SUBNET: case TYPE_INTERNAL_SUBNET:
{ {
uint32* kp = AlignAndPadType<uint32>(kp0); uint32* kp = AlignAndPadType<uint32>(kp0);
uint32 bytes[4]; v->AsSubNet().Prefix().CopyIPv6(kp);
v->AsSubNet().Prefix().CopyIPv6(bytes);
kp[0] = bytes[0];
kp[1] = bytes[1];
kp[2] = bytes[2];
kp[3] = bytes[3];
kp[4] = v->AsSubNet().Length(); kp[4] = v->AsSubNet().Length();
kp1 = reinterpret_cast<char*>(kp+5); kp1 = reinterpret_cast<char*>(kp+5);
} }
@ -352,19 +342,10 @@ HashKey* CompositeHash::ComputeSingletonHash(const Val* v, int type_check) const
return new HashKey(v->ForceAsInt()); return new HashKey(v->ForceAsInt());
case TYPE_INTERNAL_ADDR: case TYPE_INTERNAL_ADDR:
{ return v->AsAddr().GetHashKey();
uint32 bytes[4];
v->AsAddr().CopyIPv6(bytes);
return new HashKey((void*)bytes, 4 * sizeof(uint32));
}
case TYPE_INTERNAL_SUBNET: case TYPE_INTERNAL_SUBNET:
{ return v->AsSubNet().GetHashKey();
uint32 bytes[5];
v->AsSubNet().Prefix().CopyIPv6(bytes);
bytes[4] = v->AsSubNet().Length();
return new HashKey((void*)bytes, 5 * sizeof(uint32));
}
case TYPE_INTERNAL_DOUBLE: case TYPE_INTERNAL_DOUBLE:
return new HashKey(v->InternalDouble()); return new HashKey(v->InternalDouble());

View file

@ -14,32 +14,6 @@
#include "PIA.h" #include "PIA.h"
#include "binpac.h" #include "binpac.h"
HashKey* ConnID::BuildConnKey() const
{
Key key;
// Lookup up connection based on canonical ordering, which is
// the smaller of <src addr, src port> and <dst addr, dst port>
// followed by the other.
if ( is_one_way ||
addr_port_canon_lt(src_addr, src_port, dst_addr, dst_port) )
{
src_addr.CopyIPv6(key.ip1);
dst_addr.CopyIPv6(key.ip2);
key.port1 = src_port;
key.port2 = dst_port;
}
else
{
dst_addr.CopyIPv6(key.ip1);
src_addr.CopyIPv6(key.ip2);
key.port1 = dst_port;
key.port2 = src_port;
}
return new HashKey(&key, sizeof(key));
}
void ConnectionTimer::Init(Connection* arg_conn, timer_func arg_timer, void ConnectionTimer::Init(Connection* arg_conn, timer_func arg_timer,
int arg_do_expire) int arg_do_expire)
{ {
@ -842,7 +816,7 @@ bool Connection::DoUnserialize(UnserialInfo* info)
id.src_port = orig_port; id.src_port = orig_port;
id.dst_port = resp_port; id.dst_port = resp_port;
id.is_one_way = 0; // ### incorrect for ICMP id.is_one_way = 0; // ### incorrect for ICMP
key = id.BuildConnKey(); key = BuildConnIDHashKey(id);
int len; int len;
if ( ! UNSERIALIZE(&len) ) if ( ! UNSERIALIZE(&len) )

View file

@ -37,48 +37,13 @@ struct ConnID {
IPAddr dst_addr; IPAddr dst_addr;
uint32 src_port; uint32 src_port;
uint32 dst_port; uint32 dst_port;
bool is_one_way; // if true, don't canonicalize bool is_one_way; // if true, don't canonicalize order
// Returns a ListVal suitable for looking up a connection in
// a hash table. addr/ports are expected to be in network order.
// Unless is_one_way is true, the lookup sorts src and dst,
// so src_addr/src_port and dst_addr/dst_port just have to
// reflect the two different sides of the connection,
// neither has to be the particular source/destination
// or originator/responder.
HashKey* BuildConnKey() const;
// The structure used internally for hashing.
struct Key {
uint32 ip1[4];
uint32 ip2[4];
uint16 port1;
uint16 port2;
};
}; };
static inline int addr_port_canon_lt(const IPAddr& addr1, uint32 p1, static inline int addr_port_canon_lt(const IPAddr& addr1, uint32 p1,
const IPAddr& addr2, uint32 p2) const IPAddr& addr2, uint32 p2)
{ {
uint32 a1[4]; return addr1 < addr2 || (addr1 == addr2 && p1 < p2);
uint32 a2[4];
addr1.CopyIPv6(a1);
addr2.CopyIPv6(a2);
// Because it's a canonical ordering, not a strict ordering,
// we can choose to give more weight to the least significant
// word than to the most significant word. This matters
// because for the common case of IPv4 addresses embedded in
// a IPv6 address, the top three words are identical, so we can
// save a few cycles by first testing the bottom word.
return a1[3] < a2[3] ||
(a1[3] == a2[3] &&
(a1[2] < a2[2] ||
(a1[2] == a2[2] &&
(a1[1] < a2[1] ||
(a1[1] == a2[1] &&
(a1[0] < a2[0] ||
(a1[0] == a2[0] &&
p1 < p2)))))));
} }
class Analyzer; class Analyzer;

View file

@ -440,7 +440,7 @@ Connection* ConnCompressor::NextFromOrig(PendingConn* pending, double t,
else if ( tp->th_flags & TH_SYN ) else if ( tp->th_flags & TH_SYN )
{ {
if ( ! tp->th_flags & TH_ACK ) if ( ! (tp->th_flags & TH_ACK) )
{ {
Weird(pending, t, "SYN_after_partial"); Weird(pending, t, "SYN_after_partial");
pending->SYN = 1; pending->SYN = 1;
@ -665,20 +665,8 @@ const IP_Hdr* ConnCompressor::PendingConnToPacket(const PendingConn* c)
reporter->InternalError("IPv6 snuck into connection compressor"); reporter->InternalError("IPv6 snuck into connection compressor");
else else
{ {
const uint32* src_bytes; ip1.CopyIPv4(c->ip1_is_src ? &ip->ip_src : &ip->ip_dst);
const uint32* dst_bytes; ip2.CopyIPv4(c->ip1_is_src ? &ip->ip_dst : &ip->ip_dst);
if ( c->ip1_is_src )
{
ip1.GetBytes(&src_bytes);
ip2.GetBytes(&dst_bytes);
}
else
{
ip2.GetBytes(&src_bytes);
ip1.GetBytes(&dst_bytes);
}
memcpy(&ip->ip_src, src_bytes, sizeof(ip->ip_src));
memcpy(&ip->ip_dst, dst_bytes, sizeof(ip->ip_dst));
} }
if ( c->ip1_is_src ) if ( c->ip1_is_src )

View file

@ -90,7 +90,12 @@ public:
unsigned int ACK:1; unsigned int ACK:1;
double time; double time;
ConnID::Key key; struct Key {
uint32 ip1[4];
uint32 ip2[4];
uint16 port1;
uint16 port2;
} key;
uint32 seq; uint32 seq;
uint32 ack; uint32 ack;
hash_t hash; hash_t hash;

View file

@ -363,8 +363,6 @@ DNS_Mgr::DNS_Mgr(DNS_MgrMode arg_mode)
mode = arg_mode; mode = arg_mode;
addr_mappings.SetDeleteFunc(DNS_Mgr_mapping_delete_func);
char err[NB_DNS_ERRSIZE]; char err[NB_DNS_ERRSIZE];
nb_dns = nb_dns_init(err); nb_dns = nb_dns_init(err);
@ -504,11 +502,11 @@ Val* DNS_Mgr::LookupAddr(const IPAddr& addr)
if ( mode != DNS_PRIME ) if ( mode != DNS_PRIME )
{ {
HashKey h(addr); AddrMap::iterator it = addr_mappings.find(addr);
DNS_Mapping* d = addr_mappings.Lookup(&h);
if ( d ) if ( it != addr_mappings.end() )
{ {
DNS_Mapping* d = it->second;
if ( d->Valid() ) if ( d->Valid() )
return d->Host(); return d->Host();
else else
@ -704,6 +702,7 @@ void DNS_Mgr::AddResult(DNS_Mgr_Request* dr, struct nb_dns_result* r)
if ( dr->ReqHost() ) if ( dr->ReqHost() )
{ {
new_dm = new DNS_Mapping(dr->ReqHost(), h, ttl); new_dm = new DNS_Mapping(dr->ReqHost(), h, ttl);
prev_dm = 0;
HostMap::iterator it = host_mappings.find(dr->ReqHost()); HostMap::iterator it = host_mappings.find(dr->ReqHost());
if ( it == host_mappings.end() ) if ( it == host_mappings.end() )
@ -711,15 +710,11 @@ void DNS_Mgr::AddResult(DNS_Mgr_Request* dr, struct nb_dns_result* r)
host_mappings[dr->ReqHost()].first = host_mappings[dr->ReqHost()].first =
new_dm->Type() == AF_INET ? new_dm : 0; new_dm->Type() == AF_INET ? new_dm : 0;
host_mappings[dr->ReqHost()].second = host_mappings[dr->ReqHost()].second =
new_dm->Type() == AF_INET6 ? new_dm : 0; new_dm->Type() == AF_INET ? 0 : new_dm;
prev_dm = 0;
} }
else else
{ {
prev_dm = 0;
if ( new_dm->Type() == AF_INET ) if ( new_dm->Type() == AF_INET )
{ {
prev_dm = it->second.first; prev_dm = it->second.first;
@ -747,13 +742,13 @@ void DNS_Mgr::AddResult(DNS_Mgr_Request* dr, struct nb_dns_result* r)
else else
{ {
new_dm = new DNS_Mapping(dr->ReqAddr(), h, ttl); new_dm = new DNS_Mapping(dr->ReqAddr(), h, ttl);
HashKey k(dr->ReqAddr()); AddrMap::iterator it = addr_mappings.find(dr->ReqAddr());
prev_dm = addr_mappings.Insert(&k, new_dm); prev_dm = (it == addr_mappings.end()) ? 0 : it->second;
addr_mappings[dr->ReqAddr()] = new_dm;
if ( new_dm->Failed() && prev_dm && prev_dm->Valid() ) if ( new_dm->Failed() && prev_dm && prev_dm->Valid() )
{ {
HashKey k2(dr->ReqAddr()); addr_mappings[dr->ReqAddr()] = prev_dm;
(void) addr_mappings.Insert(&k2, prev_dm);
++keep_prev; ++keep_prev;
} }
} }
@ -874,8 +869,7 @@ void DNS_Mgr::LoadCache(FILE* f)
} }
else else
{ {
HashKey h(m->ReqAddr()); addr_mappings[m->ReqAddr()] = m;
addr_mappings.Insert(&h, m);
} }
} }
@ -886,13 +880,13 @@ void DNS_Mgr::LoadCache(FILE* f)
fclose(f); fclose(f);
} }
void DNS_Mgr::Save(FILE* f, PDict(DNS_Mapping)& m) void DNS_Mgr::Save(FILE* f, const AddrMap& m)
{ {
IterCookie* cookie = m.InitForIteration(); for ( AddrMap::const_iterator it = m.begin(); it != m.end(); ++it )
DNS_Mapping* dm; {
if ( it->second )
while ( (dm = m.NextEntry(cookie)) ) it->second->Save(f);
dm->Save(f); }
} }
void DNS_Mgr::Save(FILE* f, const HostMap& m) void DNS_Mgr::Save(FILE* f, const HostMap& m)
@ -911,15 +905,16 @@ void DNS_Mgr::Save(FILE* f, const HostMap& m)
const char* DNS_Mgr::LookupAddrInCache(const IPAddr& addr) const char* DNS_Mgr::LookupAddrInCache(const IPAddr& addr)
{ {
HashKey h(addr); AddrMap::iterator it = dns_mgr->addr_mappings.find(addr);
DNS_Mapping* d = dns_mgr->addr_mappings.Lookup(&h);
if ( ! d ) if ( it == addr_mappings.end() )
return 0; return 0;
DNS_Mapping* d = it->second;
if ( d->Expired() ) if ( d->Expired() )
{ {
dns_mgr->addr_mappings.Remove(&h); dns_mgr->addr_mappings.erase(it);
delete d; delete d;
return 0; return 0;
} }
@ -1159,8 +1154,11 @@ void DNS_Mgr::Flush()
delete it->second.second; delete it->second.second;
} }
for ( AddrMap::iterator it2 = addr_mappings.begin(); it2 != addr_mappings.end(); ++it2 )
delete it2->second;
host_mappings.clear(); host_mappings.clear();
addr_mappings.Clear(); addr_mappings.clear();
} }
void DNS_Mgr::Process() void DNS_Mgr::Process()
@ -1272,6 +1270,6 @@ void DNS_Mgr::GetStats(Stats* stats)
stats->failed = failed; stats->failed = failed;
stats->pending = asyncs_pending; stats->pending = asyncs_pending;
stats->cached_hosts = host_mappings.size(); stats->cached_hosts = host_mappings.size();
stats->cached_addresses = addr_mappings.Length(); stats->cached_addresses = addr_mappings.size();
} }

View file

@ -29,7 +29,6 @@ struct nb_dns_result;
declare(PDict,ListVal); declare(PDict,ListVal);
class DNS_Mapping; class DNS_Mapping;
declare(PDict,DNS_Mapping);
enum DNS_MgrMode { enum DNS_MgrMode {
DNS_PRIME, // used to prime the cache DNS_PRIME, // used to prime the cache
@ -106,8 +105,9 @@ protected:
void DumpAddrList(FILE* f, ListVal* al); void DumpAddrList(FILE* f, ListVal* al);
typedef map<string, pair<DNS_Mapping*, DNS_Mapping*> > HostMap; typedef map<string, pair<DNS_Mapping*, DNS_Mapping*> > HostMap;
typedef map<IPAddr, DNS_Mapping*> AddrMap;
void LoadCache(FILE* f); void LoadCache(FILE* f);
void Save(FILE* f, PDict(DNS_Mapping)& m); void Save(FILE* f, const AddrMap& m);
void Save(FILE* f, const HostMap& m); void Save(FILE* f, const HostMap& m);
// Selects on the fd to see if there is an answer available (timeout // Selects on the fd to see if there is an answer available (timeout
@ -137,7 +137,7 @@ protected:
PDict(ListVal) services; PDict(ListVal) services;
HostMap host_mappings; HostMap host_mappings;
PDict(DNS_Mapping) addr_mappings; AddrMap addr_mappings;
DNS_mgr_request_list requests; DNS_mgr_request_list requests;

View file

@ -33,22 +33,6 @@ ExpectedConn::ExpectedConn(const ExpectedConn& c)
proto = c.proto; proto = c.proto;
} }
HashKey* ExpectedConn::GetKey() const
{
struct Key {
uint32 orig[4];
uint32 resp[4];
uint16 resp_p;
uint16 proto;
};
Key k;
orig.CopyIPv6(k.orig);
resp.CopyIPv6(k.resp);
k.resp_p = resp_p;
k.proto = proto;
return new HashKey(&k, sizeof(k));
}
DPM::DPM() DPM::DPM()
: expected_conns_queue(AssignedAnalyzer::compare) : expected_conns_queue(AssignedAnalyzer::compare)
{ {
@ -149,7 +133,7 @@ AnalyzerTag::Tag DPM::GetExpected(int proto, const Connection* conn)
ExpectedConn c(conn->OrigAddr(), conn->RespAddr(), ExpectedConn c(conn->OrigAddr(), conn->RespAddr(),
ntohs(conn->RespPort()), proto); ntohs(conn->RespPort()), proto);
HashKey* key = c.GetKey(); HashKey* key = BuildExpectedConnHashKey(c);
AssignedAnalyzer* a = expected_conns.Lookup(key); AssignedAnalyzer* a = expected_conns.Lookup(key);
delete key; delete key;
@ -158,7 +142,7 @@ AnalyzerTag::Tag DPM::GetExpected(int proto, const Connection* conn)
// Wildcard for originator. // Wildcard for originator.
c.orig = IPAddr(string("::")); c.orig = IPAddr(string("::"));
HashKey* key = c.GetKey(); HashKey* key = BuildExpectedConnHashKey(c);
a = expected_conns.Lookup(key); a = expected_conns.Lookup(key);
delete key; delete key;
} }
@ -365,7 +349,7 @@ void DPM::ExpectConnection(const IPAddr& orig, const IPAddr& resp,
{ {
if ( ! a->deleted ) if ( ! a->deleted )
{ {
HashKey* key = a->conn.GetKey(); HashKey* key = BuildExpectedConnHashKey(a->conn);
expected_conns.Remove(key); expected_conns.Remove(key);
delete key; delete key;
} }
@ -384,7 +368,7 @@ void DPM::ExpectConnection(const IPAddr& orig, const IPAddr& resp,
ExpectedConn c(orig, resp, resp_p, proto); ExpectedConn c(orig, resp, resp_p, proto);
HashKey* key = c.GetKey(); HashKey* key = BuildExpectedConnHashKey(c);
AssignedAnalyzer* a = expected_conns.Lookup(key); AssignedAnalyzer* a = expected_conns.Lookup(key);
@ -411,7 +395,7 @@ void DPM::Done()
AssignedAnalyzer* a = expected_conns_queue.top(); AssignedAnalyzer* a = expected_conns_queue.top();
if ( ! a->deleted ) if ( ! a->deleted )
{ {
HashKey* key = a->conn.GetKey(); HashKey* key = BuildExpectedConnHashKey(a->conn);
expected_conns.Remove(key); expected_conns.Remove(key);
delete key; delete key;
} }

View file

@ -32,8 +32,6 @@ public:
ExpectedConn(const ExpectedConn& c); ExpectedConn(const ExpectedConn& c);
HashKey* GetKey() const;
IPAddr orig; IPAddr orig;
IPAddr resp; IPAddr resp;
uint16 resp_p; uint16 resp_p;

View file

@ -142,7 +142,7 @@ int TraceState::LogTrace(const char* fmt, ...)
if ( ! loc.filename ) if ( ! loc.filename )
{ {
loc.filename = "<no filename>"; loc.filename = copy_string("<no filename>");
loc.last_line = 0; loc.last_line = 0;
} }
@ -735,7 +735,7 @@ string get_context_description(const Stmt* stmt, const Frame* frame)
loc = *stmt->GetLocationInfo(); loc = *stmt->GetLocationInfo();
else else
{ {
loc.filename = "<no filename>"; loc.filename = copy_string("<no filename>");
loc.last_line = 0; loc.last_line = 0;
} }

View file

@ -2664,8 +2664,6 @@ void AssignExpr::EvalIntoAggregate(const BroType* t, Val* aggr, Frame* f) const
Error("bad table insertion"); Error("bad table insertion");
TableVal* tv = aggr->AsTableVal(); TableVal* tv = aggr->AsTableVal();
const TableType* tt = tv->Type()->AsTableType();
const BroType* yt = tv->Type()->YieldType();
Val* index = op1->Eval(f); Val* index = op1->Eval(f);
Val* v = op2->Eval(f); Val* v = op2->Eval(f);
@ -4910,6 +4908,7 @@ Val* ListExpr::Eval(Frame* f) const
if ( ! ev ) if ( ! ev )
{ {
Error("uninitialized list value"); Error("uninitialized list value");
Unref(v);
return 0; return 0;
} }

View file

@ -42,6 +42,12 @@ Gnutella_Analyzer::Gnutella_Analyzer(Connection* conn)
resp_msg_state = new GnutellaMsgState(); resp_msg_state = new GnutellaMsgState();
} }
Gnutella_Analyzer::~Gnutella_Analyzer()
{
delete orig_msg_state;
delete resp_msg_state;
}
void Gnutella_Analyzer::Done() void Gnutella_Analyzer::Done()
{ {
TCP_ApplicationAnalyzer::Done(); TCP_ApplicationAnalyzer::Done();

View file

@ -35,6 +35,7 @@ public:
class Gnutella_Analyzer : public TCP_ApplicationAnalyzer { class Gnutella_Analyzer : public TCP_ApplicationAnalyzer {
public: public:
Gnutella_Analyzer(Connection* conn); Gnutella_Analyzer(Connection* conn);
~Gnutella_Analyzer();
virtual void Done (); virtual void Done ();
virtual void DeliverStream(int len, const u_char* data, bool orig); virtual void DeliverStream(int len, const u_char* data, bool orig);

View file

@ -103,16 +103,6 @@ HashKey::HashKey(const BroString* s)
is_our_dynamic = 0; is_our_dynamic = 0;
} }
HashKey::HashKey(const IPAddr& addr)
{
const uint32* bytes;
int len = addr.GetBytes(&bytes);
size = len * sizeof(uint32);
key = CopyKey(bytes, size);
is_our_dynamic = 1;
hash = HashBytes(key, size);
}
HashKey::HashKey(int copy_key, void* arg_key, int arg_size) HashKey::HashKey(int copy_key, void* arg_key, int arg_size)
{ {
size = arg_size; size = arg_size;

View file

@ -6,7 +6,6 @@
#include <stdlib.h> #include <stdlib.h>
#include "BroString.h" #include "BroString.h"
#include "IPAddr.h"
#define UHASH_KEY_SIZE 36 #define UHASH_KEY_SIZE 36
@ -29,7 +28,6 @@ public:
HashKey(const void* p); HashKey(const void* p);
HashKey(const char* s); HashKey(const char* s);
HashKey(const BroString* s); HashKey(const BroString* s);
HashKey(const IPAddr& addr);
~HashKey() ~HashKey()
{ {
if ( is_our_dynamic ) if ( is_our_dynamic )

View file

@ -1,15 +1,68 @@
// See the file "COPYING" in the main distribution directory for copyright. // See the file "COPYING" in the main distribution directory for copyright.
#include <string>
#include <vector>
#include "IPAddr.h" #include "IPAddr.h"
#include "Reporter.h" #include "Reporter.h"
#include "Conn.h"
#include "DPM.h"
const uint8_t IPAddr::v4_mapped_prefix[12] = { 0, 0, 0, 0, const uint8_t IPAddr::v4_mapped_prefix[12] = { 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0xff, 0xff }; 0, 0, 0xff, 0xff };
HashKey* BuildConnIDHashKey(const ConnID& id)
{
struct {
in6_addr ip1;
in6_addr ip2;
uint16 port1;
uint16 port2;
} key;
// Lookup up connection based on canonical ordering, which is
// the smaller of <src addr, src port> and <dst addr, dst port>
// followed by the other.
if ( id.is_one_way ||
addr_port_canon_lt(id.src_addr, id.src_port, id.dst_addr, id.dst_port)
)
{
key.ip1 = id.src_addr.in6;
key.ip2 = id.dst_addr.in6;
key.port1 = id.src_port;
key.port2 = id.dst_port;
}
else
{
key.ip1 = id.dst_addr.in6;
key.ip2 = id.src_addr.in6;
key.port1 = id.dst_port;
key.port2 = id.src_port;
}
return new HashKey(&key, sizeof(key));
}
HashKey* BuildExpectedConnHashKey(const ExpectedConn& c)
{
struct {
in6_addr orig;
in6_addr resp;
uint16 resp_p;
uint16 proto;
} key;
key.orig = c.orig.in6;
key.resp = c.resp.in6;
key.resp_p = c.resp_p;
key.proto = c.proto;
return new HashKey(&key, sizeof(key));
}
void IPAddr::Mask(int top_bits_to_keep) void IPAddr::Mask(int top_bits_to_keep)
{ {
if ( top_bits_to_keep <= 0 || top_bits_to_keep > 128 ) if ( top_bits_to_keep < 0 || top_bits_to_keep > 128 )
{ {
reporter->Error("Bad IPAddr::Mask value %d", top_bits_to_keep); reporter->Error("Bad IPAddr::Mask value %d", top_bits_to_keep);
return; return;
@ -38,7 +91,7 @@ void IPAddr::Mask(int top_bits_to_keep)
void IPAddr::ReverseMask(int top_bits_to_chop) void IPAddr::ReverseMask(int top_bits_to_chop)
{ {
if ( top_bits_to_chop <= 0 || top_bits_to_chop > 128 ) if ( top_bits_to_chop < 0 || top_bits_to_chop > 128 )
{ {
reporter->Error("Bad IPAddr::ReverseMask value %d", top_bits_to_chop); reporter->Error("Bad IPAddr::ReverseMask value %d", top_bits_to_chop);
return; return;
@ -71,11 +124,23 @@ void IPAddr::Init(const std::string& s)
{ {
memcpy(in6.s6_addr, v4_mapped_prefix, sizeof(v4_mapped_prefix)); memcpy(in6.s6_addr, v4_mapped_prefix, sizeof(v4_mapped_prefix));
if ( inet_pton(AF_INET, s.c_str(), &in6.s6_addr[12]) <=0 ) // Parse the address directly instead of using inet_pton since
// some platforms have more sensitive implementations than others
// that can't e.g. handle leading zeroes.
int a[4];
int n = sscanf(s.c_str(), "%d.%d.%d.%d", a+0, a+1, a+2, a+3);
if ( n != 4 || a[0] < 0 || a[1] < 0 || a[2] < 0 || a[3] < 0 ||
a[0] > 255 || a[1] > 255 || a[2] > 255 || a[3] > 255 )
{ {
reporter->Error("Bad IP address: %s", s.c_str()); reporter->Error("Bad IP address: %s", s.c_str());
memset(in6.s6_addr, 0, sizeof(in6.s6_addr)); memset(in6.s6_addr, 0, sizeof(in6.s6_addr));
return;
} }
uint32_t addr = (a[0] << 24) | (a[1] << 16) | (a[2] << 8) | a[3];
addr = htonl(addr);
memcpy(&in6.s6_addr[12], &addr, sizeof(uint32_t));
} }
else else
@ -110,6 +175,60 @@ string IPAddr::AsString() const
} }
} }
string IPAddr::AsHexString() const
{
char buf[33];
if ( GetFamily() == IPv4 )
{
uint32_t* p = (uint32_t*) &in6.s6_addr[12];
snprintf(buf, sizeof(buf), "%08x", (uint32_t) ntohl(*p));
}
else
{
uint32_t* p = (uint32_t*) in6.s6_addr;
snprintf(buf, sizeof(buf), "%08x%08x%08x%08x",
(uint32_t) ntohl(p[0]), (uint32_t) ntohl(p[1]),
(uint32_t) ntohl(p[2]), (uint32_t) ntohl(p[3]));
}
return buf;
}
string IPAddr::PtrName() const
{
if ( GetFamily() == IPv4 )
{
char buf[256];
uint32_t* p = (uint32_t*) &in6.s6_addr[12];
uint32_t a = ntohl(*p);
uint32_t a3 = (a >> 24) & 0xff;
uint32_t a2 = (a >> 16) & 0xff;
uint32_t a1 = (a >> 8) & 0xff;
uint32_t a0 = a & 0xff;
snprintf(buf, sizeof(buf), "%u.%u.%u.%u.in-addr.arpa", a0, a1, a2, a3);
return buf;
}
else
{
static const char hex_digit[] = "0123456789abcdef";
string ptr_name("ip6.arpa");
uint32_t* p = (uint32_t*) in6.s6_addr;
for ( unsigned int i = 0; i < 4; ++i )
{
uint32 a = ntohl(p[i]);
for ( unsigned int j = 1; j <=8; ++j )
{
ptr_name.insert(0, 1, '.');
ptr_name.insert(0, 1, hex_digit[(a >> (32-j*4)) & 0x0f]);
}
}
return ptr_name;
}
}
IPPrefix::IPPrefix(const in4_addr& in4, uint8_t length) IPPrefix::IPPrefix(const in4_addr& in4, uint8_t length)
: prefix(in4), length(96 + length) : prefix(in4), length(96 + length)
{ {

View file

@ -8,8 +8,12 @@
#include <string> #include <string>
#include "BroString.h" #include "BroString.h"
#include "Hash.h"
#include "util.h" #include "util.h"
struct ConnID;
class ExpectedConn;
typedef in_addr in4_addr; typedef in_addr in4_addr;
/** /**
@ -189,6 +193,37 @@ public:
memcpy(bytes, in6.s6_addr, sizeof(in6.s6_addr)); memcpy(bytes, in6.s6_addr, sizeof(in6.s6_addr));
} }
/**
* Retrieves a copy of the IPv6 raw byte representation of the address.
* @see CopyIPv6(uint32_t)
*/
void CopyIPv6(in6_addr* arg_in6) const
{
memcpy(arg_in6->s6_addr, in6.s6_addr, sizeof(in6.s6_addr));
}
/**
* Retrieves a copy of the IPv4 raw byte representation of the address.
* The caller should verify the address is of the IPv4 family type
* beforehand. @see GetFamily().
*
* @param in4 The pointer to a memory location in which the raw bytes
* of the address are to be copied in network byte-order.
*/
void CopyIPv4(in4_addr* in4) const
{
memcpy(&in4->s_addr, &in6.s6_addr[12], sizeof(in4->s_addr));
}
/**
* Returns a key that can be used to lookup the IP Address in a hash
* table. Passes ownership to caller.
*/
HashKey* GetHashKey() const
{
return new HashKey((void*)in6.s6_addr, sizeof(in6.s6_addr));
}
/** /**
* Masks out lower bits of the address. * Masks out lower bits of the address.
* *
@ -223,6 +258,19 @@ public:
return *this; return *this;
} }
/**
* Bitwise OR operator returns the IP address resulting from the bitwise
* OR operation on the raw bytes of this address with another.
*/
IPAddr operator|(const IPAddr& other)
{
in6_addr result;
for ( int i = 0; i < 16; ++i )
result.s6_addr[i] = this->in6.s6_addr[i] | other.in6.s6_addr[i];
return IPAddr(result);
}
/** /**
* Returns a string representation of the address. IPv4 addresses * Returns a string representation of the address. IPv4 addresses
* will be returned in dotted representation, IPv6 addresses in * will be returned in dotted representation, IPv6 addresses in
@ -230,12 +278,23 @@ public:
*/ */
string AsString() const; string AsString() const;
/**
* Returns a host-order, plain hex string representation of the address.
*/
string AsHexString() const;
/** /**
* Returns a string representation of the address. This returns the * Returns a string representation of the address. This returns the
* same as AsString(). * same as AsString().
*/ */
operator std::string() const { return AsString(); } operator std::string() const { return AsString(); }
/**
* Returns a reverse pointer name associated with the IP address.
* For example, 192.168.0.1's reverse pointer is 1.0.168.192.in-addr.arpa.
*/
string PtrName() const;
/** /**
* Comparison operator for IP address. * Comparison operator for IP address.
*/ */
@ -259,6 +318,11 @@ public:
return memcmp(&addr1.in6, &addr2.in6, sizeof(in6_addr)) < 0; return memcmp(&addr1.in6, &addr2.in6, sizeof(in6_addr)) < 0;
} }
friend HashKey* BuildConnIDHashKey(const ConnID& id);
friend HashKey* BuildExpectedConnHashKey(const ExpectedConn& c);
friend class IPPrefix;
unsigned int MemoryAllocation() const { return padded_sizeof(*this); } unsigned int MemoryAllocation() const { return padded_sizeof(*this); }
private: private:
@ -320,6 +384,16 @@ inline bool IPAddr::IsLoopback() const
&& (in6.s6_addr[14] == 0) && (in6.s6_addr[15] == 1)); && (in6.s6_addr[14] == 0) && (in6.s6_addr[15] == 1));
} }
/**
* Returns a hash key for a given ConnID. Passes ownership to caller.
*/
HashKey* BuildConnIDHashKey(const ConnID& id);
/**
* Returns a hash key for a given ExpectedConn instance. Passes ownership to caller.
*/
HashKey* BuildExpectedConnHashKey(const ExpectedConn& c);
/** /**
* Class storing both IPv4 and IPv6 prefixes * Class storing both IPv4 and IPv6 prefixes
* (i.e., \c 192.168.1.1/16 and \c FD00::/8. * (i.e., \c 192.168.1.1/16 and \c FD00::/8.
@ -425,6 +499,23 @@ public:
operator std::string() const { return AsString(); } operator std::string() const { return AsString(); }
/**
* Returns a key that can be used to lookup the IP Prefix in a hash
* table. Passes ownership to caller.
*/
HashKey* GetHashKey() const
{
struct {
in6_addr ip;
uint32 len;
} key;
key.ip = prefix.in6;
key.len = Length();
return new HashKey(&key, sizeof(key));
}
unsigned int MemoryAllocation() const { return padded_sizeof(*this); } unsigned int MemoryAllocation() const { return padded_sizeof(*this); }
/** /**

View file

@ -911,7 +911,7 @@ bool LogMgr::Write(EnumVal* id, RecordVal* columns)
return false; return false;
} }
if ( ! v->Type()->Tag() == TYPE_STRING ) if ( v->Type()->Tag() != TYPE_STRING )
{ {
reporter->Error("path_func did not return string"); reporter->Error("path_func did not return string");
Unref(v); Unref(v);

View file

@ -225,5 +225,7 @@ NCP_Analyzer::NCP_Analyzer(Connection* conn)
NCP_Analyzer::~NCP_Analyzer() NCP_Analyzer::~NCP_Analyzer()
{ {
delete session; delete session;
delete o_ncp;
delete r_ncp;
} }

View file

@ -248,12 +248,14 @@ void net_init(name_list& interfaces, name_list& readfiles,
FlowSocketSrc* fs = new FlowSocketSrc(netflows[i]); FlowSocketSrc* fs = new FlowSocketSrc(netflows[i]);
if ( ! fs->IsOpen() ) if ( ! fs->IsOpen() )
{
reporter->Error("%s: problem with netflow socket %s - %s\n", reporter->Error("%s: problem with netflow socket %s - %s\n",
prog, netflows[i], fs->ErrorMsg()); prog, netflows[i], fs->ErrorMsg());
else delete fs;
{
io_sources.Register(fs);
} }
else
io_sources.Register(fs);
} }
} }

View file

@ -131,6 +131,9 @@ int NetbiosSSN_Interpreter::ParseBroadcast(const u_char* data, int len,
return 0; return 0;
} }
delete srcname;
delete dstname;
return 0; return 0;
} }

View file

@ -65,15 +65,14 @@ OSFingerprint::OSFingerprint(FingerprintMode arg_mode)
bool OSFingerprint::CacheMatch(const IPAddr& addr, int id) bool OSFingerprint::CacheMatch(const IPAddr& addr, int id)
{ {
uint32 bytes[4]; HashKey* key = addr.GetHashKey();
addr.CopyIPv6(bytes);
HashKey key = HashKey(bytes, 4);
int* pid = new int; int* pid = new int;
*pid=id; *pid=id;
int* prev = os_matches.Insert(&key, pid); int* prev = os_matches.Insert(key, pid);
bool ret = (prev ? *prev != id : 1); bool ret = (prev ? *prev != id : 1);
if (prev) if (prev)
delete prev; delete prev;
delete key;
return ret; return ret;
} }

View file

@ -199,21 +199,17 @@ void PIA_TCP::FirstPacket(bool is_orig, const IP_Hdr* ip)
ip4_hdr = new IP_Hdr((const struct ip*) ip4); ip4_hdr = new IP_Hdr((const struct ip*) ip4);
} }
const uint32* obytes;
const uint32* rbytes;
Conn()->OrigAddr().GetBytes(&obytes);
Conn()->RespAddr().GetBytes(&rbytes);
if ( is_orig ) if ( is_orig )
{ {
memcpy(&ip4->ip_src.s_addr, obytes, sizeof(uint32)); Conn()->OrigAddr().CopyIPv4(&ip4->ip_src);
memcpy(&ip4->ip_dst.s_addr, rbytes, sizeof(uint32)); Conn()->RespAddr().CopyIPv4(&ip4->ip_dst);
tcp4->th_sport = htons(Conn()->OrigPort()); tcp4->th_sport = htons(Conn()->OrigPort());
tcp4->th_dport = htons(Conn()->RespPort()); tcp4->th_dport = htons(Conn()->RespPort());
} }
else else
{ {
memcpy(&ip4->ip_src.s_addr, rbytes, sizeof(uint32)); Conn()->RespAddr().CopyIPv4(&ip4->ip_src);
memcpy(&ip4->ip_dst.s_addr, obytes, sizeof(uint32)); Conn()->OrigAddr().CopyIPv4(&ip4->ip_dst);
tcp4->th_sport = htons(Conn()->RespPort()); tcp4->th_sport = htons(Conn()->RespPort());
tcp4->th_dport = htons(Conn()->OrigPort()); tcp4->th_dport = htons(Conn()->OrigPort());
} }

View file

@ -158,6 +158,7 @@ void POP3_Analyzer::ProcessRequest(int length, const char* line)
if ( e >= end ) if ( e >= end )
{ {
Weird("pop3_malformed_auth_plain"); Weird("pop3_malformed_auth_plain");
delete decoded;
return; return;
} }
@ -167,6 +168,7 @@ void POP3_Analyzer::ProcessRequest(int length, const char* line)
if ( s >= end ) if ( s >= end )
{ {
Weird("pop3_malformed_auth_plain"); Weird("pop3_malformed_auth_plain");
delete decoded;
return; return;
} }

View file

@ -65,7 +65,7 @@ PacketSortElement::PacketSortElement(PktSrc* arg_src,
payload_length = ip_hdr->PayloadLen() - tp->th_off * 4; payload_length = ip_hdr->PayloadLen() - tp->th_off * 4;
key = id.BuildConnKey(); key = BuildConnIDHashKey(id);
is_tcp = 1; is_tcp = 1;
} }

View file

@ -382,6 +382,7 @@ void PktSrc::AddSecondaryTablePrograms()
{ {
delete program; delete program;
Close(); Close();
return;
} }
SecondaryProgram* sp = new SecondaryProgram(program, se); SecondaryProgram* sp = new SecondaryProgram(program, se);

View file

@ -5,9 +5,7 @@ inline static prefix_t* make_prefix(const IPAddr& addr, int width)
{ {
prefix_t* prefix = (prefix_t*) safe_malloc(sizeof(prefix_t)); prefix_t* prefix = (prefix_t*) safe_malloc(sizeof(prefix_t));
uint32 bytes[4]; addr.CopyIPv6(&prefix->add.sin6);
addr.CopyIPv6(bytes);
memcpy(&prefix->add.sin6, bytes, 4 * sizeof(uint32));
prefix->family = AF_INET6; prefix->family = AF_INET6;
prefix->bitlen = width; prefix->bitlen = width;
prefix->ref_count = 1; prefix->ref_count = 1;

View file

@ -73,6 +73,9 @@ RuleHdrTest::RuleHdrTest(RuleHdrTest& h)
copied_set->ids = orig_set->ids; copied_set->ids = orig_set->ids;
loop_over_list(orig_set->patterns, l) loop_over_list(orig_set->patterns, l)
copied_set->patterns.append(copy_string(orig_set->patterns[l])); copied_set->patterns.append(copy_string(orig_set->patterns[l]));
delete copied_set;
// TODO: Why do we create copied_set only to then
// never use it?
} }
} }
@ -1116,9 +1119,14 @@ void id_to_maskedvallist(const char* id, maskedvalue_list* append_to)
val_list* vals = v->AsTableVal()->ConvertToPureList()->Vals(); val_list* vals = v->AsTableVal()->ConvertToPureList()->Vals();
loop_over_list(*vals, i ) loop_over_list(*vals, i )
if ( ! val_to_maskedval((*vals)[i], append_to) ) if ( ! val_to_maskedval((*vals)[i], append_to) )
{
delete_vals(vals);
return; return;
} }
delete_vals(vals);
}
else else
val_to_maskedval(v, append_to); val_to_maskedval(v, append_to);
} }

View file

@ -352,8 +352,8 @@ void SMTP_Analyzer::ProcessLine(int length, const char* line, bool orig)
const char* ext; const char* ext;
int ext_len; int ext_len;
get_word(end_of_line - line, line, ext_len, ext);
line = skip_whitespace(line + ext_len, end_of_line); line = skip_whitespace(line + ext_len, end_of_line);
get_word(end_of_line - line, line, ext_len, ext);
ProcessExtension(ext_len, ext); ProcessExtension(ext_len, ext);
} }
} }

View file

@ -135,12 +135,12 @@ NetSessions::~NetSessions()
delete SYN_OS_Fingerprinter; delete SYN_OS_Fingerprinter;
delete pkt_profiler; delete pkt_profiler;
Unref(arp_analyzer); Unref(arp_analyzer);
delete discarder;
delete stp_manager;
} }
void NetSessions::Done() void NetSessions::Done()
{ {
delete stp_manager;
delete discarder;
} }
namespace // private namespace namespace // private namespace
@ -575,7 +575,7 @@ void NetSessions::DoNextPacket(double t, const struct pcap_pkthdr* hdr,
return; return;
} }
HashKey* h = id.BuildConnKey(); HashKey* h = BuildConnIDHashKey(id);
if ( ! h ) if ( ! h )
reporter->InternalError("hash computation failed"); reporter->InternalError("hash computation failed");
@ -869,7 +869,7 @@ Connection* NetSessions::FindConnection(Val* v)
id.is_one_way = 0; // ### incorrect for ICMP connections id.is_one_way = 0; // ### incorrect for ICMP connections
HashKey* h = id.BuildConnKey(); HashKey* h = BuildConnIDHashKey(id);
if ( ! h ) if ( ! h )
reporter->InternalError("hash computation failed"); reporter->InternalError("hash computation failed");

View file

@ -231,7 +231,7 @@ bool StateAccess::CheckOldSet(const char* op, ID* id, Val* index,
bool StateAccess::MergeTables(TableVal* dst, Val* src) bool StateAccess::MergeTables(TableVal* dst, Val* src)
{ {
if ( ! src->Type()->Tag() == TYPE_TABLE ) if ( src->Type()->Tag() != TYPE_TABLE )
{ {
reporter->Error("type mismatch while merging tables"); reporter->Error("type mismatch while merging tables");
return false; return false;

View file

@ -990,7 +990,6 @@ void TCP_Analyzer::DeliverPacket(int len, const u_char* data, bool is_orig,
Conn()->SetLastTime(t); Conn()->SetLastTime(t);
const IPAddr orig_addr = Conn()->OrigAddr(); const IPAddr orig_addr = Conn()->OrigAddr();
const IPAddr resp_addr = Conn()->RespAddr();
uint32 tcp_hdr_len = data - (const u_char*) tp; uint32 tcp_hdr_len = data - (const u_char*) tp;

View file

@ -32,12 +32,8 @@ TCP_Endpoint::TCP_Endpoint(TCP_Analyzer* arg_analyzer, int arg_is_orig)
dst_addr = is_orig ? tcp_analyzer->Conn()->OrigAddr() : dst_addr = is_orig ? tcp_analyzer->Conn()->OrigAddr() :
tcp_analyzer->Conn()->RespAddr(); tcp_analyzer->Conn()->RespAddr();
const uint32* src_bytes; checksum_base = ones_complement_checksum(src_addr, 0);
const uint32* dst_bytes; checksum_base = ones_complement_checksum(dst_addr, checksum_base);
int n = src_addr.GetBytes(&src_bytes);
int m = dst_addr.GetBytes(&dst_bytes);
checksum_base = ones_complement_checksum((void*) src_bytes, n*4, 0);
checksum_base = ones_complement_checksum((void*) dst_bytes, m*4, checksum_base);
// Note, for IPv6, strictly speaking this field is 32 bits // Note, for IPv6, strictly speaking this field is 32 bits
// rather than 16 bits. But because the upper bits are all zero, // rather than 16 bits. But because the upper bits are all zero,
// we get the same checksum either way. The same applies to // we get the same checksum either way. The same applies to

View file

@ -410,7 +410,7 @@ Val* Trigger::Lookup(const CallExpr* expr)
return (i != cache.end()) ? i->second : 0; return (i != cache.end()) ? i->second : 0;
} }
const char* Trigger::Name() const char* Trigger::Name() const
{ {
assert(location); assert(location);
return fmt("%s:%d-%d", location->filename, return fmt("%s:%d-%d", location->filename,

View file

@ -60,7 +60,7 @@ public:
virtual void Access(Val* val, const StateAccess& sa) virtual void Access(Val* val, const StateAccess& sa)
{ QueueTrigger(this); } { QueueTrigger(this); }
virtual const char* Name(); virtual const char* Name() const;
static void QueueTrigger(Trigger* trigger); static void QueueTrigger(Trigger* trigger);

View file

@ -1858,13 +1858,8 @@ BroType* merge_types(const BroType* t1, const BroType* t2)
if ( t1->IsSet() ) if ( t1->IsSet() )
return new SetType(tl3, 0); return new SetType(tl3, 0);
else if ( tg1 == TYPE_TABLE )
return new TableType(tl3, y3);
else else
{ return new TableType(tl3, y3);
reporter->InternalError("bad tag in merge_types");
return 0;
}
} }
case TYPE_FUNC: case TYPE_FUNC:

View file

@ -910,11 +910,19 @@ bool AddrVal::DoUnserialize(UnserialInfo* info)
SubNetVal::SubNetVal(const char* text) : Val(TYPE_SUBNET) SubNetVal::SubNetVal(const char* text) : Val(TYPE_SUBNET)
{ {
const char* sep = strchr(text, '/'); string s(text);
if ( ! sep ) size_t slash_loc = s.find('/');
Internal("separator missing in SubNetVal::SubNetVal");
val.subnet_val = new IPPrefix(text, atoi(sep+1)); if ( slash_loc == string::npos )
{
reporter->Error("Bad string in SubNetVal ctor: %s", text);
val.subnet_val = new IPPrefix();
}
else
{
val.subnet_val = new IPPrefix(s.substr(0, slash_loc),
atoi(s.substr(slash_loc + 1).c_str()));
}
} }
SubNetVal::SubNetVal(const char* text, int width) : Val(TYPE_SUBNET) SubNetVal::SubNetVal(const char* text, int width) : Val(TYPE_SUBNET)

View file

@ -179,38 +179,8 @@ static void do_fmt(const char*& fmt, Val* v, ODesc* d)
// This makes only a very slight difference, so not // This makes only a very slight difference, so not
// clear it would e worth the hassle. // clear it would e worth the hassle.
const IPAddr& u = v->AsAddr(); snprintf(out_buf, sizeof(out_buf), "%s",
const uint32* net_order_u; v->AsAddr().AsHexString().c_str());
int len = u.GetBytes(&net_order_u);
if ( len == 4 )
{
// We explicitly convert the address to host order
// in a copy, because if we just call ntohl() for
// our invocation on snprintf() below, on some systems
// it turns a 32-bit value (Linux), whereas on
// others it returns a long (FreeBSD); the latter
// gets us in trouble if we have longs > 32 bits,
// because then the format specifier needs to be %lx
// rather than %x ....... what a pain!
//
// Also note that we don't change u in-place because
// that would alter the byte order of the underlying
// value.
uint32 host_order_u[4];
host_order_u[0] = ntohl(net_order_u[0]);
host_order_u[1] = ntohl(net_order_u[1]);
host_order_u[2] = ntohl(net_order_u[2]);
host_order_u[3] = ntohl(net_order_u[3]);
snprintf(out_buf, sizeof(out_buf), "%08x%08x%08x%08x",
host_order_u[0], host_order_u[1],
host_order_u[2], host_order_u[3]);
}
else
{
snprintf(out_buf, sizeof(out_buf), "%08x", ntohl(net_order_u[0]));
}
} }
else if ( ! check_fmt_type(t, ok_d_fmt) ) else if ( ! check_fmt_type(t, ok_d_fmt) )
@ -2135,7 +2105,7 @@ function counts_to_addr%(v: index_vec%): addr
## ##
## Returns: The :bro:type:`string` *str* as :bro:type:`int`. ## Returns: The :bro:type:`string` *str* as :bro:type:`int`.
## ##
## .. bro:see:: to_addr to_port ## .. bro:see:: to_addr to_port to_subnet
function to_int%(str: string%): int function to_int%(str: string%): int
%{ %{
const char* s = str->CheckString(); const char* s = str->CheckString();
@ -2192,7 +2162,7 @@ function double_to_count%(d: double%): count
## Returns: The :bro:type:`string` *str* as unsigned integer or if in invalid ## Returns: The :bro:type:`string` *str* as unsigned integer or if in invalid
## format. ## format.
## ##
## .. bro:see:: to_addr to_int to_port ## .. bro:see:: to_addr to_int to_port to_subnet
function to_count%(str: string%): count function to_count%(str: string%): count
%{ %{
const char* s = str->CheckString(); const char* s = str->CheckString();
@ -2287,9 +2257,11 @@ function count_to_port%(num: count, proto: transport_proto%): port
## ##
## ip: The :bro:type:`string` to convert. ## ip: The :bro:type:`string` to convert.
## ##
## Returns: The :bro:type:`string` *ip* as :bro:type:`addr`. ## Returns: The :bro:type:`string` *ip* as :bro:type:`addr` or the unspecified
## address ``::`` if the input string does not parse correctly.
## ##
## .. bro:see:: to_count to_int to_port count_to_v4_addr raw_bytes_to_v4_addr ## .. bro:see:: to_count to_int to_port count_to_v4_addr raw_bytes_to_v4_addr
## to_subnet
function to_addr%(ip: string%): addr function to_addr%(ip: string%): addr
%{ %{
char* s = ip->AsString()->Render(); char* s = ip->AsString()->Render();
@ -2298,13 +2270,30 @@ function to_addr%(ip: string%): addr
return ret; return ret;
%} %}
## Converts a :bro:type:`string` to a :bro:type:`subnet`.
##
## sn: The subnet to convert.
##
## Returns: The *sn* string as a :bro:type:`subnet` or the unspecified subnet
## ``::/0`` if the input string does not parse correctly.
##
## .. bro:see:: to_count to_int to_port count_to_v4_addr raw_bytes_to_v4_addr
## to_addr
function to_subnet%(sn: string%): subnet
%{
char* s = sn->AsString()->Render();
Val* ret = new SubNetVal(s);
delete [] s;
return ret;
%}
## Converts a :bro:type:`count` to an :bro:type:`addr`. ## Converts a :bro:type:`count` to an :bro:type:`addr`.
## ##
## ip: The :bro:type:`count` to convert. ## ip: The :bro:type:`count` to convert.
## ##
## Returns: The :bro:type:`count` *ip* as :bro:type:`addr`. ## Returns: The :bro:type:`count` *ip* as :bro:type:`addr`.
## ##
## .. bro:see:: raw_bytes_to_v4_addr to_addr ## .. bro:see:: raw_bytes_to_v4_addr to_addr to_subnet
function count_to_v4_addr%(ip: count%): addr function count_to_v4_addr%(ip: count%): addr
%{ %{
if ( ip > 4294967295LU ) if ( ip > 4294967295LU )
@ -2324,7 +2313,7 @@ function count_to_v4_addr%(ip: count%): addr
## ##
## Returns: The byte :bro:type:`string` *ip* as :bro:type:`addr`. ## Returns: The byte :bro:type:`string` *ip* as :bro:type:`addr`.
## ##
## .. bro:see:: raw_bytes_to_v4_addr to_addr ## .. bro:see:: raw_bytes_to_v4_addr to_addr to_subnet
function raw_bytes_to_v4_addr%(b: string%): addr function raw_bytes_to_v4_addr%(b: string%): addr
%{ %{
uint32 a = 0; uint32 a = 0;
@ -2347,7 +2336,7 @@ function raw_bytes_to_v4_addr%(b: string%): addr
## ##
## Returns: A :bro:type:`port` converted from *s*. ## Returns: A :bro:type:`port` converted from *s*.
## ##
## .. bro:see:: to_addr to_count to_int ## .. bro:see:: to_addr to_count to_int to_subnet
function to_port%(s: string%): port function to_port%(s: string%): port
%{ %{
int port = 0; int port = 0;
@ -2445,35 +2434,7 @@ function ptr_name_to_addr%(s: string%): addr
## .. bro:see:: ptr_name_to_addr parse_dotted_addr ## .. bro:see:: ptr_name_to_addr parse_dotted_addr
function addr_to_ptr_name%(a: addr%): string function addr_to_ptr_name%(a: addr%): string
%{ %{
const uint32* addr; return new StringVal(a->AsAddr().PtrName().c_str());
int len = a->AsAddr().GetBytes(&addr);
if ( len == 1 )
{
char buf[256];
uint32 a = ntohl(addr[0]);
uint32 a3 = (a >> 24) & 0xff;
uint32 a2 = (a >> 16) & 0xff;
uint32 a1 = (a >> 8) & 0xff;
uint32 a0 = a & 0xff;
sprintf(buf, "%u.%u.%u.%u.in-addr.arpa", a0, a1, a2, a3);
return new StringVal(buf);
}
else
{
static const char hex_digit[] = "0123456789abcdef";
string ptr_name("ip6.arpa");
for ( unsigned int i = 0; i < 4; ++i )
{
uint32 a = ntohl(addr[i]);
for ( unsigned int j = 1; j <=8; ++j )
{
ptr_name.insert(0, 1, '.');
ptr_name.insert(0, 1, hex_digit[(a >> (32-j*4)) & 0x0f]);
}
}
return new StringVal(ptr_name.c_str());
}
%} %}
# Transforms n0.n1.n2.n3 -> addr. # Transforms n0.n1.n2.n3 -> addr.
@ -2541,7 +2502,7 @@ static Val* parse_eftp(const char* line)
RecordVal* r = new RecordVal(ftp_port); RecordVal* r = new RecordVal(ftp_port);
int net_proto = 0; // currently not used int net_proto = 0; // currently not used
uint32 addr = 0; IPAddr addr; // unspecified IPv6 address (all 128 bits zero)
int port = 0; int port = 0;
int good = 0; int good = 0;
@ -2551,35 +2512,53 @@ static Val* parse_eftp(const char* line)
++line; ++line;
char delimiter = *line; char delimiter = *line;
good = 1;
char* next_delim; char* next_delim;
++line; // cut off delimiter if ( *line )
net_proto = strtol(line, &next_delim, 10); // currently ignored {
good = 1;
++line; // skip delimiter
net_proto = strtol(line, &next_delim, 10);
if ( *next_delim != delimiter ) if ( *next_delim != delimiter )
good = 0; good = 0;
line = next_delim + 1; line = next_delim;
if ( *line != delimiter ) // default of 0 is ok if ( *line )
++line;
if ( *line && *line != delimiter )
{ {
string s(line); const char* nptr = strchr(line, delimiter);
IPAddr tmp(s); if ( nptr == NULL )
const uint32* bytes; {
tmp.GetBytes(&bytes); nptr = line + strlen(line);
addr = *bytes;
if ( addr == 0 )
good = 0; good = 0;
} }
// FIXME: check for garbage between IP and delimiter. string s(line, nptr-line); // extract IP address
IPAddr tmp(s);
// on error, "tmp" will have all 128 bits zero
if ( tmp == addr )
good = 0;
addr = tmp;
}
line = strchr(line, delimiter); line = strchr(line, delimiter);
if ( line != NULL )
{
++line; // now the port ++line; // now the port
port = strtol(line, &next_delim, 10); port = strtol(line, &next_delim, 10);
if ( *next_delim != delimiter ) if ( *next_delim != delimiter )
good = 0; good = 0;
} }
}
}
r->Assign(0, new AddrVal(addr)); r->Assign(0, new AddrVal(addr));
r->Assign(1, new PortVal(port, TRANSPORT_TCP)); r->Assign(1, new PortVal(port, TRANSPORT_TCP));
r->Assign(2, new Val(good, TYPE_BOOL)); r->Assign(2, new Val(good, TYPE_BOOL));
@ -2605,7 +2584,7 @@ function parse_ftp_port%(s: string%): ftp_port
## The format is ``EPRT<space><d><net-prt><d><net-addr><d><tcp-port><d>``, ## The format is ``EPRT<space><d><net-prt><d><net-addr><d><tcp-port><d>``,
## where ``<d>`` is a delimiter in the ASCII range 33-126 (usually ``|``). ## where ``<d>`` is a delimiter in the ASCII range 33-126 (usually ``|``).
## ##
## s: The string of the FTP PORT command, e.g., ``"10,0,0,1,4,31"``. ## s: The string of the FTP EPRT command, e.g., ``"|1|10.0.0.1|1055|"``.
## ##
## Returns: The FTP PORT, e.g., ``[h=10.0.0.1, p=1055/tcp, valid=T]`` ## Returns: The FTP PORT, e.g., ``[h=10.0.0.1, p=1055/tcp, valid=T]``
## ##
@ -2645,7 +2624,7 @@ function parse_ftp_pasv%(str: string%): ftp_port
## The format is ``<text> (<d><d><d><tcp-port><d>)``, where ``<d>`` is a ## The format is ``<text> (<d><d><d><tcp-port><d>)``, where ``<d>`` is a
## delimiter in the ASCII range 33-126 (usually ``|``). ## delimiter in the ASCII range 33-126 (usually ``|``).
## ##
## str: The string containing the result of the FTP PASV command. ## str: The string containing the result of the FTP EPSV command.
## ##
## Returns: The FTP PORT, e.g., ``[h=10.0.0.1, p=1055/tcp, valid=T]`` ## Returns: The FTP PORT, e.g., ``[h=10.0.0.1, p=1055/tcp, valid=T]``
## ##
@ -3025,14 +3004,8 @@ function remask_addr%(a1: addr, a2: addr, top_bits_from_a1: count%): addr
IPAddr addr1(a1->AsAddr()); IPAddr addr1(a1->AsAddr());
addr1.Mask(top_bits_from_a1); addr1.Mask(top_bits_from_a1);
IPAddr addr2(a2->AsAddr()); IPAddr addr2(a2->AsAddr());
addr1.ReverseMask(top_bits_from_a1); addr2.ReverseMask(top_bits_from_a1);
uint32 x1[4]; return new AddrVal(addr1|addr2);
uint32 x2[4];
addr1.CopyIPv6(x1);
addr2.CopyIPv6(x2);
for ( unsigned int i = 0; i < 4; ++i )
x1[i] = x1[i] | x2[i];
return new AddrVal(x1);
%} %}
## Checks whether a given :bro:type:`port` has TCP as transport protocol. ## Checks whether a given :bro:type:`port` has TCP as transport protocol.
@ -3551,10 +3524,8 @@ function lookup_location%(a: addr%) : geo_location
#ifdef HAVE_GEOIP_COUNTRY_EDITION_V6 #ifdef HAVE_GEOIP_COUNTRY_EDITION_V6
if ( geoip_v6 && a->AsAddr().GetFamily() == IPAddr::IPv6 ) if ( geoip_v6 && a->AsAddr().GetFamily() == IPAddr::IPv6 )
{ {
const uint32* bytes;
a->AsAddr().GetBytes(&bytes);
geoipv6_t ga; geoipv6_t ga;
memcpy(&ga, bytes, 16); a->AsAddr().CopyIPv6(&ga);
if ( have_cityv6_db ) if ( have_cityv6_db )
gir = GeoIP_record_by_ipnum_v6(geoip_v6, ga); gir = GeoIP_record_by_ipnum_v6(geoip_v6, ga);
else else
@ -3648,10 +3619,8 @@ function lookup_asn%(a: addr%) : count
#ifdef HAVE_GEOIP_COUNTRY_EDITION_V6 #ifdef HAVE_GEOIP_COUNTRY_EDITION_V6
if ( a->AsAddr().GetFamily() == IPAddr::IPv6 ) if ( a->AsAddr().GetFamily() == IPAddr::IPv6 )
{ {
const uint32* bytes;
a->AsAddr().GetBytes(&bytes);
geoipv6_t ga; geoipv6_t ga;
memcpy(&ga, bytes, 16); a->AsAddr().CopyIPv6(&ga);
gir = GeoIP_name_by_ipnum_v6(geoip_asn, ga); gir = GeoIP_name_by_ipnum_v6(geoip_asn, ga);
} }
else else

View file

@ -31,6 +31,13 @@ int ones_complement_checksum(const void* p, int b, uint32 sum)
return sum; return sum;
} }
int ones_complement_checksum(const IPAddr& a, uint32 sum)
{
const uint32* bytes;
int len = a.GetBytes(&bytes);
return ones_complement_checksum(bytes, len*4, sum);
}
int tcp_checksum(const struct ip* ip, const struct tcphdr* tp, int len) int tcp_checksum(const struct ip* ip, const struct tcphdr* tp, int len)
{ {
// ### Note, this is only correct for IPv4. This routine is only // ### Note, this is only correct for IPv4. This routine is only

View file

@ -60,6 +60,7 @@ inline int seq_delta(uint32 a, uint32 b)
// Returns the ones-complement checksum of a chunk of b short-aligned bytes. // Returns the ones-complement checksum of a chunk of b short-aligned bytes.
extern int ones_complement_checksum(const void* p, int b, uint32 sum); extern int ones_complement_checksum(const void* p, int b, uint32 sum);
extern int ones_complement_checksum(const IPAddr& a, uint32 sum);
extern int tcp_checksum(const struct ip* ip, const struct tcphdr* tp, int len); extern int tcp_checksum(const struct ip* ip, const struct tcphdr* tp, int len);
extern int udp_checksum(const struct ip* ip, const struct udphdr* up, int len); extern int udp_checksum(const struct ip* ip, const struct udphdr* up, int len);

View file

@ -0,0 +1,32 @@
1: 127.255.0.0
2: 63.255.0.0
3: 31.255.0.0
4: 15.255.0.0
5: 7.255.0.0
6: 3.255.0.0
7: 1.255.0.0
8: 0.255.0.0
9: 0.127.0.0
10: 0.63.0.0
11: 0.31.0.0
12: 0.15.0.0
13: 0.7.0.0
14: 0.3.0.0
15: 0.1.0.0
16: 0.0.0.0
17: 0.0.128.0
18: 0.0.192.0
19: 0.0.224.0
20: 0.0.240.0
21: 0.0.248.0
22: 0.0.252.0
23: 0.0.254.0
24: 0.0.255.0
25: 0.0.255.128
26: 0.0.255.192
27: 0.0.255.224
28: 0.0.255.240
29: 0.0.255.248
30: 0.0.255.252
31: 0.0.255.254
32: 0.0.255.255

View file

@ -0,0 +1 @@
error: Bad IP address: not an IP

View file

@ -0,0 +1,9 @@
to_addr(0.0.0.0) = 0.0.0.0 (SUCCESS)
to_addr(1.2.3.4) = 1.2.3.4 (SUCCESS)
to_addr(01.02.03.04) = 1.2.3.4 (SUCCESS)
to_addr(001.002.003.004) = 1.2.3.4 (SUCCESS)
to_addr(10.20.30.40) = 10.20.30.40 (SUCCESS)
to_addr(100.200.30.40) = 100.200.30.40 (SUCCESS)
to_addr(10.0.0.0) = 10.0.0.0 (SUCCESS)
to_addr(10.00.00.000) = 10.0.0.0 (SUCCESS)
to_addr(not an IP) = :: (SUCCESS)

View file

@ -0,0 +1 @@
error: Bad string in SubNetVal ctor: 10.0.0.0

View file

@ -0,0 +1,3 @@
10.0.0.0/8, T
2607:f8b0::/32, T
::/0, T

View file

@ -0,0 +1,12 @@
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path conn
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p proto service duration orig_bytes resp_bytes conn_state local_orig missed_bytes history orig_pkts orig_ip_bytes resp_pkts resp_ip_bytes
#types time string addr port addr port enum string interval count count string bool count string count count count count
1329843175.736107 arKYeMETxOg 141.142.220.235 37604 199.233.217.249 56666 tcp ftp-data 0.112432 0 342 SF - 0 ShAdfFa 4 216 4 562
1329843179.871641 k6kgXLOoSKl 141.142.220.235 59378 199.233.217.249 56667 tcp ftp-data 0.111218 0 77 SF - 0 ShAdfFa 4 216 4 297
1329843194.151526 nQcgTWjvg4c 199.233.217.249 61920 141.142.220.235 33582 tcp ftp-data 0.056211 342 0 SF - 0 ShADaFf 5 614 3 164
1329843197.783443 j4u32Pc5bif 199.233.217.249 61918 141.142.220.235 37835 tcp ftp-data 0.056005 77 0 SF - 0 ShADaFf 5 349 3 164
1329843161.968492 UWkUyAuUGXf 141.142.220.235 50003 199.233.217.249 21 tcp ftp 38.055625 180 3146 SF - 0 ShAdDfFa 38 2164 25 4458

View file

@ -0,0 +1,9 @@
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path ftp
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p user password command arg mime_type mime_desc file_size reply_code reply_msg tags extraction_file
#types time string addr port addr port string string string string string string count count string table[string] file
1329843179.926563 UWkUyAuUGXf 141.142.220.235 50003 199.233.217.249 21 anonymous test RETR ftp://199.233.217.249/./robots.txt text/plain ASCII text 77 226 Transfer complete. - -
1329843197.727769 UWkUyAuUGXf 141.142.220.235 50003 199.233.217.249 21 anonymous test RETR ftp://199.233.217.249/./robots.txt text/plain ASCII text, with CRLF line terminators 77 226 Transfer complete. - -

View file

@ -0,0 +1,13 @@
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path conn
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p proto service duration orig_bytes resp_bytes conn_state local_orig missed_bytes history orig_pkts orig_ip_bytes resp_pkts resp_ip_bytes
#types time string addr port addr port enum string interval count count string bool count string count count count count
1329327783.316897 arKYeMETxOg 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49186 2001:470:4867:99::21 57086 tcp ftp-data 0.219721 0 342 SF - 0 ShAdfFa 5 372 4 642
1329327786.524332 k6kgXLOoSKl 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49187 2001:470:4867:99::21 57087 tcp ftp-data 0.217501 0 43 SF - 0 ShAdfFa 5 372 4 343
1329327787.289095 nQcgTWjvg4c 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49188 2001:470:4867:99::21 57088 tcp ftp-data 0.217941 0 77 SF - 0 ShAdfFa 5 372 4 377
1329327795.571921 j4u32Pc5bif 2001:470:4867:99::21 55785 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49189 tcp ftp-data 0.109813 77 0 SF - 0 ShADFaf 5 449 4 300
1329327777.822004 UWkUyAuUGXf 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49185 2001:470:4867:99::21 21 tcp ftp 26.658219 310 3448 SF - 0 ShAdDfFa 57 4426 34 5908
1329327800.017649 TEfuqmmG4bh 2001:470:4867:99::21 55647 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49190 tcp ftp-data 0.109181 342 0 SF - 0 ShADFaf 5 714 4 300

View file

@ -0,0 +1,9 @@
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path ftp
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p user password command arg mime_type mime_desc file_size reply_code reply_msg tags extraction_file
#types time string addr port addr port string string string string string string count count string table[string] file
1329327787.396984 UWkUyAuUGXf 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49185 2001:470:4867:99::21 21 anonymous test RETR ftp://[2001:470:4867:99::21]/robots.txt - - 77 226 Transfer complete. - -
1329327795.463946 UWkUyAuUGXf 2001:470:1f11:81f:c999:d94:aa7c:2e3e 49185 2001:470:4867:99::21 21 anonymous test RETR ftp://[2001:470:4867:99::21]/robots.txt - - 77 226 Transfer complete. - -

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,10 @@
# @TEST-EXEC: bro %INPUT >output
# @TEST-EXEC: btest-diff output
const one_to_32: vector of count = {1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32};
for ( i in one_to_32 )
{
print fmt("%s: %s", one_to_32[i],
remask_addr(0.0.255.255, 255.255.0.0, 96+one_to_32[i]));
}

View file

@ -0,0 +1,20 @@
# @TEST-EXEC: bro -b %INPUT >output 2>error
# @TEST-EXEC: btest-diff output
# @TEST-EXEC: btest-diff error
function test_to_addr(ip: string, expect: addr)
{
local result = to_addr(ip);
print fmt("to_addr(%s) = %s (%s)", ip, result,
result == expect ? "SUCCESS" : "FAILURE");
}
test_to_addr("0.0.0.0", 0.0.0.0);
test_to_addr("1.2.3.4", 1.2.3.4);
test_to_addr("01.02.03.04", 1.2.3.4);
test_to_addr("001.002.003.004", 1.2.3.4);
test_to_addr("10.20.30.40", 10.20.30.40);
test_to_addr("100.200.30.40", 100.200.30.40);
test_to_addr("10.0.0.0", 10.0.0.0);
test_to_addr("10.00.00.000", 10.0.0.0);
test_to_addr("not an IP", ::);

View file

@ -0,0 +1,11 @@
# @TEST-EXEC: bro -b %INPUT >output 2>error
# @TEST-EXEC: btest-diff output
# @TEST-EXEC: btest-diff error
global sn: subnet;
sn = to_subnet("10.0.0.0/8");
print sn, sn == 10.0.0.0/8;
sn = to_subnet("2607:f8b0::/32");
print sn, sn == 2607:f8b0::/32;
sn = to_subnet("10.0.0.0");
print sn, sn == ::/0;

View file

@ -0,0 +1,6 @@
# This tests both active and passive FTP over IPv4.
#
# @TEST-EXEC: bro -r $TRACES/ftp-ipv4.trace
# @TEST-EXEC: btest-diff conn.log
# @TEST-EXEC: btest-diff ftp.log

View file

@ -0,0 +1,6 @@
# This tests both active and passive FTP over IPv6.
#
# @TEST-EXEC: bro -r $TRACES/ipv6-ftp.trace
# @TEST-EXEC: btest-diff conn.log
# @TEST-EXEC: btest-diff ftp.log