mirror of
https://github.com/zeek/zeek.git
synced 2025-10-17 05:58:20 +00:00
Merge remote-tracking branch 'origin/topic/timw/2720-vxlan-geneve-confirmation'
* origin/topic/timw/2720-vxlan-geneve-confirmation: Call AnalyzerConfirmation earlier in VXLAN/Geneve analysis Add validation of session to start of AYIYA/VXLAN/Geneve analysis
This commit is contained in:
commit
cea7fc4907
5 changed files with 65 additions and 25 deletions
15
CHANGES
15
CHANGES
|
@ -1,3 +1,18 @@
|
|||
6.0.0-dev.38 | 2023-02-14 07:35:50 -0700
|
||||
|
||||
* Call AnalyzerConfirmation earlier in VXLAN/Geneve analysis (Tim Wojtulewicz, Corelight)
|
||||
|
||||
* Add validation of session to start of AYIYA/VXLAN/Geneve analysis (Tim Wojtulewicz, Corelight)
|
||||
|
||||
This mimics how the Teredo analyzer is already doing it, including
|
||||
sending a weird if the session is invalid and bailing out if the
|
||||
protocol was already violated.
|
||||
|
||||
* ci/collect-repo-info.py: Recognize git worktrees, too (Arne Welzel, Corelight)
|
||||
|
||||
Benjamin reported ci/collect-repo-info.py failing for him in
|
||||
Git worktrees, use `git` to actually check if we're in a repo.
|
||||
|
||||
6.0.0-dev.33 | 2023-02-13 12:56:01 +0100
|
||||
|
||||
* GH-1405: Add zeek -V/--build-info (Arne Welzel, Corelight)
|
||||
|
|
2
VERSION
2
VERSION
|
@ -1 +1 @@
|
|||
6.0.0-dev.33
|
||||
6.0.0-dev.38
|
||||
|
|
|
@ -13,6 +13,17 @@ bool AYIYAAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* packe
|
|||
if ( ! BifConst::Tunnel::enable_ayiya )
|
||||
return false;
|
||||
|
||||
// AYIYA always comes from a TCP or UDP connection, which means that session
|
||||
// should always be valid and always be a connection. Return a weird if we
|
||||
// didn't have a session stored.
|
||||
if ( ! packet->session )
|
||||
{
|
||||
Analyzer::Weird("ayiya_missing_connection");
|
||||
return false;
|
||||
}
|
||||
else if ( AnalyzerViolated(packet->session) )
|
||||
return false;
|
||||
|
||||
if ( packet->encap && packet->encap->Depth() >= BifConst::Tunnel::max_depth )
|
||||
{
|
||||
Weird("exceeded_tunnel_max_depth", packet);
|
||||
|
|
|
@ -11,6 +11,17 @@ GeneveAnalyzer::GeneveAnalyzer() : zeek::packet_analysis::Analyzer("Geneve") { }
|
|||
|
||||
bool GeneveAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* packet)
|
||||
{
|
||||
// Geneve always comes from a UDP connection, which means that session should always
|
||||
// be valid and always be a connection. Return a weird if we didn't have a session
|
||||
// stored.
|
||||
if ( ! packet->session )
|
||||
{
|
||||
Analyzer::Weird("geneve_missing_connection");
|
||||
return false;
|
||||
}
|
||||
else if ( AnalyzerViolated(packet->session) )
|
||||
return false;
|
||||
|
||||
if ( packet->encap && packet->encap->Depth() >= BifConst::Tunnel::max_depth )
|
||||
{
|
||||
Weird("exceeded_tunnel_max_depth", packet);
|
||||
|
@ -59,6 +70,9 @@ bool GeneveAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pack
|
|||
len -= hdr_size;
|
||||
data += hdr_size;
|
||||
|
||||
// We've successfully parsed everything, so we might as well confirm this.
|
||||
AnalyzerConfirmation(packet->session);
|
||||
|
||||
int encap_index = 0;
|
||||
auto inner_packet = packet_analysis::IPTunnel::build_inner_packet(
|
||||
packet, &encap_index, nullptr, len, data, DLT_RAW, BifEnum::Tunnel::GENEVE,
|
||||
|
@ -70,21 +84,13 @@ bool GeneveAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pack
|
|||
if ( len > hdr_size )
|
||||
fwd_ret_val = ForwardPacket(len, data, inner_packet.get(), next_header);
|
||||
|
||||
if ( fwd_ret_val )
|
||||
if ( fwd_ret_val && geneve_packet )
|
||||
{
|
||||
AnalyzerConfirmation(packet->session);
|
||||
|
||||
if ( geneve_packet && packet->session )
|
||||
{
|
||||
EncapsulatingConn* ec = inner_packet->encap->At(encap_index);
|
||||
if ( ec && ec->ip_hdr )
|
||||
inner_packet->session->EnqueueEvent(geneve_packet, nullptr,
|
||||
packet->session->GetVal(),
|
||||
ec->ip_hdr->ToPktHdrVal(), val_mgr->Count(vni));
|
||||
}
|
||||
EncapsulatingConn* ec = inner_packet->encap->At(encap_index);
|
||||
if ( ec && ec->ip_hdr )
|
||||
inner_packet->session->EnqueueEvent(geneve_packet, nullptr, packet->session->GetVal(),
|
||||
ec->ip_hdr->ToPktHdrVal(), val_mgr->Count(vni));
|
||||
}
|
||||
else
|
||||
AnalyzerViolation("Geneve invalid inner packet", packet->session);
|
||||
|
||||
return fwd_ret_val;
|
||||
}
|
||||
|
|
|
@ -11,6 +11,17 @@ VXLAN_Analyzer::VXLAN_Analyzer() : zeek::packet_analysis::Analyzer("VXLAN") { }
|
|||
|
||||
bool VXLAN_Analyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* packet)
|
||||
{
|
||||
// VXLAN always comes from a UDP connection, which means that session should always
|
||||
// be valid and always be a connection. Return a weird if we didn't have a session
|
||||
// stored.
|
||||
if ( ! packet->session )
|
||||
{
|
||||
Analyzer::Weird("vxlan_missing_connection");
|
||||
return false;
|
||||
}
|
||||
else if ( AnalyzerViolated(packet->session) )
|
||||
return false;
|
||||
|
||||
if ( packet->encap && packet->encap->Depth() >= BifConst::Tunnel::max_depth )
|
||||
{
|
||||
Weird("exceeded_tunnel_max_depth", packet);
|
||||
|
@ -36,6 +47,9 @@ bool VXLAN_Analyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pack
|
|||
len -= hdr_size;
|
||||
data += hdr_size;
|
||||
|
||||
// We've successfully parsed everything, so we might as well confirm this.
|
||||
AnalyzerConfirmation(packet->session);
|
||||
|
||||
int encap_index = 0;
|
||||
auto inner_packet = packet_analysis::IPTunnel::build_inner_packet(
|
||||
packet, &encap_index, nullptr, len, data, DLT_RAW, BifEnum::Tunnel::VXLAN,
|
||||
|
@ -45,18 +59,12 @@ bool VXLAN_Analyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pack
|
|||
if ( len > hdr_size )
|
||||
fwd_ret_val = ForwardPacket(len, data, inner_packet.get());
|
||||
|
||||
if ( fwd_ret_val )
|
||||
if ( fwd_ret_val && vxlan_packet )
|
||||
{
|
||||
AnalyzerConfirmation(packet->session);
|
||||
|
||||
if ( vxlan_packet && packet->session )
|
||||
{
|
||||
EncapsulatingConn* ec = inner_packet->encap->At(encap_index);
|
||||
if ( ec && ec->ip_hdr )
|
||||
inner_packet->session->EnqueueEvent(vxlan_packet, nullptr,
|
||||
packet->session->GetVal(),
|
||||
ec->ip_hdr->ToPktHdrVal(), val_mgr->Count(vni));
|
||||
}
|
||||
EncapsulatingConn* ec = inner_packet->encap->At(encap_index);
|
||||
if ( ec && ec->ip_hdr )
|
||||
inner_packet->session->EnqueueEvent(vxlan_packet, nullptr, packet->session->GetVal(),
|
||||
ec->ip_hdr->ToPktHdrVal(), val_mgr->Count(vni));
|
||||
}
|
||||
|
||||
return fwd_ret_val;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue