zeek/testing/btest/plugins/binpac-flowbuffer-frame-length-plugin
Robin Sommer 9b0d525728
Let our TCP-based application analyzers operate without any TCP parent analyzer.
Conceptually, a TCP-based application analyzer should not need any
knowledge about the underlying TCP analysis; it's supposed to just
process its reassembled input stream as it's handed over. But our
analyzers break that assumption at a few places because sometimes
knowledge about the TCP state of the connection can be helpful for
heuristics. This is fine as long as there actually *is* a TCP parent
analyzer available. Sometimes, however, there isn't: if the payload
stream is encapsulated inside another application-layer protocol, the
semantic link to TCP is broken. And if the outer connection is even
UDP, then we don't have a TCP analyzer at all.

We didn't handle this situation well so far. Most analyzers needing
TCP state would just crash if there's no TCP analyzer (in debug mode
with an `assert`, in release mode with a null pointer deref ...). Only
HTTP did the right thing already: check if TCP is available and adapt
accordingly.

We know extend that check to all other analyzers as well: all accesses
to `TCP()` are guarded, with reasonable defaults if not available.
It's actually a pretty small change overall, which is evidence for how
little this layering violation actually matters.

The existing behavior is what's causing
https://github.com/corelight/zeek-spicy-openvpn/issues/3.
2022-01-28 16:25:27 +01:00
..
scripts Add test case for binpac flowbuffer frame length parsing bug 2020-03-19 22:09:23 -07:00
src Let our TCP-based application analyzers operate without any TCP parent analyzer. 2022-01-28 16:25:27 +01:00
.btest-ignore Add test case for binpac flowbuffer frame length parsing bug 2020-03-19 22:09:23 -07:00
CMakeLists.txt Update minimum required CMake to 3.5 2020-12-01 22:13:52 -08:00