aboutsummaryrefslogtreecommitdiff
path: root/fuzz/fuzz_quic_get_crypto_data.c
diff options
context:
space:
mode:
authorIvan Nardi <12729895+IvanNardi@users.noreply.github.com>2022-12-01 12:21:04 +0100
committerGitHub <noreply@github.com>2022-12-01 12:21:04 +0100
commit02e7e3c23b29002267a89ae74e51c2285bb27da1 (patch)
treee81044cad57a397a940f278ac53f6aec3be0fc92 /fuzz/fuzz_quic_get_crypto_data.c
parentafb5c3e6bad82ebd265ab12254ac7c6e067a791b (diff)
Add a new fuzzer for QUIC (#1800)
QUIC packets are encrypted/obfuscated; that means that we need to decrypt them before parsing the real (TLS) message. Fuzzing is not effective here, since a random buffer is hardly a valid encrypted QUIC packet. Add a new fuzzer, testing *decrypted* QUIC packets. Add a basic corpus. Fix a few bugs already found by this fuzzer.
Diffstat (limited to 'fuzz/fuzz_quic_get_crypto_data.c')
-rw-r--r--fuzz/fuzz_quic_get_crypto_data.c136
1 files changed, 136 insertions, 0 deletions
diff --git a/fuzz/fuzz_quic_get_crypto_data.c b/fuzz/fuzz_quic_get_crypto_data.c
new file mode 100644
index 000000000..3e16446cd
--- /dev/null
+++ b/fuzz/fuzz_quic_get_crypto_data.c
@@ -0,0 +1,136 @@
+#include "ndpi_api.h"
+
+#include <stdint.h>
+#include <stdio.h>
+
+struct ndpi_detection_module_struct *ndpi_info_mod = NULL;
+struct ndpi_flow_struct *flow = NULL;
+
+extern const uint8_t *get_crypto_data(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow,
+ uint32_t version,
+ u_int8_t *clear_payload, uint32_t clear_payload_len,
+ uint64_t *crypto_data_len);
+extern void process_tls(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow,
+ const u_int8_t *crypto_data, uint32_t crypto_data_len,
+ uint32_t version);
+extern void process_chlo(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow,
+ const u_int8_t *crypto_data, uint32_t crypto_data_len);
+extern int is_version_with_tls(uint32_t version);
+
+
+int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {
+ const u_int8_t *crypto_data;
+ uint64_t crypto_data_len;
+ u_int32_t first_int, version = 0;
+
+ if(ndpi_info_mod == NULL) {
+ ndpi_info_mod = ndpi_init_detection_module(ndpi_enable_ja3_plus);
+ NDPI_PROTOCOL_BITMASK all;
+ NDPI_BITMASK_SET_ALL(all);
+ ndpi_set_protocol_detection_bitmask2(ndpi_info_mod, &all);
+#if 0
+ NDPI_PROTOCOL_BITMASK debug_bitmask;
+ NDPI_BITMASK_SET_ALL(debug_bitmask);
+ ndpi_set_log_level(ndpi_info_mod, 4);
+ ndpi_set_debug_bitmask(ndpi_info_mod, debug_bitmask);
+#endif
+ ndpi_finalize_initialization(ndpi_info_mod);
+
+ flow = ndpi_calloc(1, SIZEOF_FLOW_STRUCT);
+ }
+
+ if(Size < 4)
+ return 0;
+
+ first_int = ntohl(*(u_int32_t *)Data);
+ if((first_int % 4) == 0)
+ version = 0x00000001; /* v1 */
+ else if((first_int % 4) == 1)
+ version = 0x51303530; /* Q050 */
+ else if((first_int % 4) == 2)
+ version = 0x51303436; /* Q046 */
+ else if((first_int % 4) == 3)
+ version = 0x709A50C4; /* v2 */
+
+ memset(flow, '\0', sizeof(*flow));
+ flow->detected_protocol_stack[0] = NDPI_PROTOCOL_QUIC;
+ flow->l4_proto = IPPROTO_UDP;
+
+ crypto_data = get_crypto_data(ndpi_info_mod, flow, version, (u_int8_t *)Data + 4, Size - 4, &crypto_data_len);
+
+ if(crypto_data) {
+ if(!is_version_with_tls(version)) {
+ process_chlo(ndpi_info_mod, flow, crypto_data, crypto_data_len);
+ } else {
+ process_tls(ndpi_info_mod, flow, crypto_data, crypto_data_len, version);
+ }
+ }
+
+ ndpi_free_flow_data(flow);
+
+ return 0;
+}
+
+#ifdef BUILD_MAIN
+int main(int argc, char ** argv)
+{
+ FILE * data_file;
+ long data_file_size;
+ uint8_t * data_buffer;
+ int test_retval;
+
+ if (argc != 2) {
+ fprintf(stderr, "usage: %s: [data-file]\n",
+ (argc > 0 ? argv[0] : "fuzz_quic_get_crypto_data"));
+ return 1;
+ }
+
+ data_file = fopen(argv[1], "r");
+ if (data_file == NULL) {
+ perror("fopen failed");
+ return 1;
+ }
+
+ if (fseek(data_file, 0, SEEK_END) != 0) {
+ perror("fseek(SEEK_END) failed");
+ fclose(data_file);
+ return 1;
+ }
+
+ data_file_size = ftell(data_file);
+ if (data_file_size < 0) {
+ perror("ftell failed");
+ fclose(data_file);
+ return 1;
+ }
+
+ if (fseek(data_file, 0, SEEK_SET) != 0) {
+ perror("fseek(0, SEEK_SET) failed");
+ fclose(data_file);
+ return 1;
+ }
+
+ data_buffer = malloc(data_file_size);
+ if (data_buffer == NULL) {
+ perror("malloc failed");
+ fclose(data_file);
+ return 1;
+ }
+
+ if (fread(data_buffer, sizeof(*data_buffer), data_file_size, data_file) != (size_t)data_file_size) {
+ perror("fread failed");
+ fclose(data_file);
+ free(data_buffer);
+ return 1;
+ }
+
+ test_retval = LLVMFuzzerTestOneInput(data_buffer, data_file_size);
+ fclose(data_file);
+ free(data_buffer);
+
+ return test_retval;
+}
+#endif