aboutsummaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorIvan Nardi <12729895+IvanNardi@users.noreply.github.com>2024-02-09 09:20:02 +0100
committerGitHub <noreply@github.com>2024-02-09 09:20:02 +0100
commitf352e4f77b4f9523a8722b9a1702377cc0375c16 (patch)
tree2b49ba7594f5e49e2e98a02613f563defe2ab340 /src/lib
parent2abb68c8caf02ddfceb687ba097b996a855abc69 (diff)
Improve normalization of `flow->host_server_name` (#2310)
Follow-up of 4543385d107fcc5a7e8632e35d9a60bcc40cb4f4 Remove trailing spaces for any HTTP header (we already remove leading spaces) We want: * a "normalized" string in `flow->host_server_name`, but * to parse the original string for flow risk checking `ndpi_hostname_sni_set()` is a private function, so there is no need to export its flags.
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/ndpi_main.c7
-rw-r--r--src/lib/protocols/fastcgi.c4
-rw-r--r--src/lib/protocols/http.c4
-rw-r--r--src/lib/protocols/quic.c4
-rw-r--r--src/lib/protocols/tls.c2
5 files changed, 14 insertions, 7 deletions
diff --git a/src/lib/ndpi_main.c b/src/lib/ndpi_main.c
index c6aec46e7..a99f6530d 100644
--- a/src/lib/ndpi_main.c
+++ b/src/lib/ndpi_main.c
@@ -8698,6 +8698,13 @@ static void parse_single_packet_line(struct ndpi_detection_module_struct *ndpi_s
if(h->line->len == 0)
h->line->ptr = NULL;
+ /* Stripping trailing spaces */
+ while(h->line->len > 0 && h->line->ptr[h->line->len - 1] == ' ') {
+ h->line->len--;
+ }
+ if(h->line->len == 0)
+ h->line->ptr = NULL;
+
break;
}
}
diff --git a/src/lib/protocols/fastcgi.c b/src/lib/protocols/fastcgi.c
index 6ccd96d43..6a1baa758 100644
--- a/src/lib/protocols/fastcgi.c
+++ b/src/lib/protocols/fastcgi.c
@@ -213,8 +213,8 @@ static void ndpi_search_fastcgi(struct ndpi_detection_module_struct *ndpi_struct
&ret_match, NDPI_PROTOCOL_FASTCGI);
ndpi_check_dga_name(ndpi_struct, flow,
flow->host_server_name, 1, 0);
- if(ndpi_is_valid_hostname(flow->host_server_name,
- strlen(flow->host_server_name)) == 0) {
+ if(ndpi_is_valid_hostname((char *)packet->host_line.ptr,
+ packet->host_line.len) == 0) {
char str[128];
snprintf(str, sizeof(str), "Invalid host %s", flow->host_server_name);
diff --git a/src/lib/protocols/http.c b/src/lib/protocols/http.c
index 2516f8158..8e4c60a5f 100644
--- a/src/lib/protocols/http.c
+++ b/src/lib/protocols/http.c
@@ -958,8 +958,8 @@ static void check_content_type_and_change_protocol(struct ndpi_detection_module_
hostname_just_set = 1;
- if(ndpi_is_valid_hostname(flow->host_server_name,
- strlen(flow->host_server_name)) == 0) {
+ if(ndpi_is_valid_hostname((char *)packet->host_line.ptr,
+ packet->host_line.len) == 0) {
char str[128];
snprintf(str, sizeof(str), "Invalid host %s", flow->host_server_name);
diff --git a/src/lib/protocols/quic.c b/src/lib/protocols/quic.c
index 6e40a21c5..89a6730e7 100644
--- a/src/lib/protocols/quic.c
+++ b/src/lib/protocols/quic.c
@@ -1465,8 +1465,8 @@ void process_chlo(struct ndpi_detection_module_struct *ndpi_struct,
ndpi_check_dga_name(ndpi_struct, flow,
flow->host_server_name, 1, 0);
- if(ndpi_is_valid_hostname(flow->host_server_name,
- strlen(flow->host_server_name)) == 0) {
+ if(ndpi_is_valid_hostname((char *)&crypto_data[tag_offset_start + prev_offset],
+ len) == 0) {
char str[128];
snprintf(str, sizeof(str), "Invalid host %s", flow->host_server_name);
diff --git a/src/lib/protocols/tls.c b/src/lib/protocols/tls.c
index d12aacd75..ee5cfdc12 100644
--- a/src/lib/protocols/tls.c
+++ b/src/lib/protocols/tls.c
@@ -2258,7 +2258,7 @@ int processClientServerHello(struct ndpi_detection_module_struct *ndpi_struct,
#ifdef DEBUG_TLS
printf("[TLS] SNI: [%s]\n", sni);
#endif
- if(ndpi_is_valid_hostname(sni, sni_len) == 0) {
+ if(ndpi_is_valid_hostname((char *)&packet->payload[offset+extension_offset+5], len) == 0) {
ndpi_set_risk(ndpi_struct, flow, NDPI_INVALID_CHARACTERS, sni);
/* This looks like an attack */