diff options
author | Luca <deri@ntop.org> | 2024-05-22 18:04:33 +0200 |
---|---|---|
committer | Luca <deri@ntop.org> | 2024-05-22 18:04:33 +0200 |
commit | 44a290286b298a461b3a88a0bfdc4e0361a247f3 (patch) | |
tree | 8fb52896c1c62153b5953f20e86cde65ae6b0187 /src | |
parent | 74d3843ebe0d181072acc6700e6c41595ce75f0d (diff) |
More NDPI_PROBING_ATTEMPT changes
Diffstat (limited to 'src')
-rw-r--r-- | src/include/ndpi_typedefs.h | 4 | ||||
-rw-r--r-- | src/lib/ndpi_main.c | 64 | ||||
-rw-r--r-- | src/lib/ndpi_utils.c | 3 |
3 files changed, 65 insertions, 6 deletions
diff --git a/src/include/ndpi_typedefs.h b/src/include/ndpi_typedefs.h index 98897d462..ffc98ecd1 100644 --- a/src/include/ndpi_typedefs.h +++ b/src/include/ndpi_typedefs.h @@ -163,11 +163,12 @@ typedef enum { NDPI_HTTP_OBSOLETE_SERVER, NDPI_PERIODIC_FLOW, /* Set in case a flow repeats at a specific pace [used by apps on top of nDPI] */ NDPI_MINOR_ISSUES, /* Generic packet issues (e.g. DNS with 0 TTL) */ - NDPI_TCP_ISSUES, /* 50 */ /* TCP issues such as connection failed, probing or scan */ + NDPI_TCP_ISSUES, /* 50 */ /* TCP issues such as connection failed or scan */ NDPI_FULLY_ENCRYPTED, /* This (unknown) session is fully encrypted */ NDPI_TLS_ALPN_SNI_MISMATCH, /* Invalid ALPN/SNI combination */ NDPI_MALWARE_HOST_CONTACTED, /* Flow client contacted a malware host */ NDPI_BINARY_DATA_TRANSFER, /* Attempt to transfer something in binary format */ + NDPI_PROBING_ATTEMPT, /* Probing attempt (e.g. TCP connection with no data exchanged or unidirection traffic for bidirectional flows such as SSH) */ /* Leave this as last member */ NDPI_MAX_RISK /* must be <= 63 due to (**) */ @@ -1451,6 +1452,7 @@ struct ndpi_flow_struct { /* Only packets with L5 data (ie no TCP SYN, pure ACKs, ...) */ u_int16_t packet_counter; // can be 0 - 65000 u_int16_t packet_direction_counter[2]; + u_int8_t packet_direction_with_payload_observed[2]; /* 0 = no packet with payload observed, 1 = at least one packet with payload observed */ /* All packets even those without payload */ u_int16_t all_packets_counter; diff --git a/src/lib/ndpi_main.c b/src/lib/ndpi_main.c index c8675ecfc..7d65c9748 100644 --- a/src/lib/ndpi_main.c +++ b/src/lib/ndpi_main.c @@ -195,6 +195,7 @@ static ndpi_risk_info ndpi_known_risks[] = { { NDPI_TLS_ALPN_SNI_MISMATCH, NDPI_RISK_MEDIUM, CLIENT_FAIR_RISK_PERCENTAGE, NDPI_CLIENT_ACCOUNTABLE }, { NDPI_MALWARE_HOST_CONTACTED, NDPI_RISK_SEVERE, CLIENT_HIGH_RISK_PERCENTAGE, NDPI_CLIENT_ACCOUNTABLE }, { NDPI_BINARY_DATA_TRANSFER, NDPI_RISK_MEDIUM, CLIENT_FAIR_RISK_PERCENTAGE, NDPI_CLIENT_ACCOUNTABLE }, + { NDPI_PROBING_ATTEMPT, NDPI_RISK_MEDIUM, CLIENT_FAIR_RISK_PERCENTAGE, NDPI_CLIENT_ACCOUNTABLE }, /* Leave this as last member */ { NDPI_MAX_RISK, NDPI_RISK_LOW, CLIENT_FAIR_RISK_PERCENTAGE, NDPI_NO_ACCOUNTABILITY } @@ -7064,6 +7065,9 @@ static void ndpi_connection_tracking(struct ndpi_detection_module_struct *ndpi_s flow->packet_direction_complete_counter[packet->packet_direction]++; } + if(packet->payload_packet_len > 0) + flow->packet_direction_with_payload_observed[packet->packet_direction] = 1; + if(!ndpi_is_multi_or_broadcast(packet)) { /* ! (multicast or broadcast) */ @@ -7598,6 +7602,51 @@ static void ndpi_check_tcp_flags(struct ndpi_flow_struct *flow) { ndpi_set_risk(flow, NDPI_TCP_ISSUES, "TCP probing attempt"); } +/* ******************************************************************** */ + +static void ndpi_check_probing_attempt(struct ndpi_flow_struct *flow) { + if(flow->l4_proto == IPPROTO_TCP) { + if(flow->packet_direction_with_payload_observed[0] + && flow->packet_direction_with_payload_observed[1]) { + /* Both directions observed */ + + if(flow->confidence == NDPI_CONFIDENCE_DPI) { + switch(flow->detected_protocol_stack[0]) { + case NDPI_PROTOCOL_SSH: + if(flow->protos.ssh.hassh_server[0] == '\0') + ndpi_set_risk(flow, NDPI_PROBING_ATTEMPT, "SSH Probing"); + break; + + case NDPI_PROTOCOL_TLS: + case NDPI_PROTOCOL_QUIC: + case NDPI_PROTOCOL_MAIL_SMTPS: + case NDPI_PROTOCOL_MAIL_POPS: + case NDPI_PROTOCOL_MAIL_IMAPS: + case NDPI_PROTOCOL_DTLS: + if(flow->host_server_name[0] == '\0') + ndpi_set_risk(flow, NDPI_PROBING_ATTEMPT, "TLS/QUIC Probing"); + break; + } + } + } else { + switch(flow->confidence) { + case NDPI_CONFIDENCE_MATCH_BY_PORT: + case NDPI_CONFIDENCE_NBPF: + case NDPI_CONFIDENCE_DPI_PARTIAL_CACHE: + case NDPI_CONFIDENCE_DPI_CACHE: + case NDPI_CONFIDENCE_MATCH_BY_IP: + case NDPI_CONFIDENCE_CUSTOM_RULE: + /* Skipping rules where an early match might be confused with a probing attempt */ + break; + + default: + ndpi_set_risk(flow, NDPI_PROBING_ATTEMPT, + "TCP connection with unidirectional traffic"); + } + } + } +} + /* ********************************************************************************* */ ndpi_protocol ndpi_detection_giveup(struct ndpi_detection_module_struct *ndpi_str, struct ndpi_flow_struct *flow, @@ -7612,9 +7661,11 @@ ndpi_protocol ndpi_detection_giveup(struct ndpi_detection_module_struct *ndpi_st if(!ndpi_str || !flow) return(ret); - if(flow->l4_proto == IPPROTO_TCP) + if(flow->l4_proto == IPPROTO_TCP) { ndpi_check_tcp_flags(flow); - + ndpi_check_probing_attempt(flow); + } + /* Init defaults */ ret.master_protocol = flow->detected_protocol_stack[1], ret.app_protocol = flow->detected_protocol_stack[0]; ret.protocol_by_ip = flow->guessed_protocol_id_by_ip; @@ -8331,7 +8382,7 @@ static ndpi_protocol ndpi_internal_detection_process_packet(struct ndpi_detectio t.tuple.l3_proto = flow->l4_proto; if(packet->tcp) - t.tuple.l4_src_port = packet->tcp->source, t.tuple.l4_dst_port = packet->tcp->dest; + t.tuple.l4_src_port = packet->tcp->source, t.tuple.l4_dst_port = packet->tcp->dest; else if(packet->udp) t.tuple.l4_src_port = packet->udp->source, t.tuple.l4_dst_port = packet->udp->dest; @@ -9879,7 +9930,7 @@ int ndpi_match_hostname_protocol(struct ndpi_detection_module_struct *ndpi_struc change_category(flow, ret_match.protocol_category); if(subproto == NDPI_PROTOCOL_OOKLA) { - ookla_add_to_cache(ndpi_struct, flow); + ookla_add_to_cache(ndpi_struct, flow); } return(1); @@ -10147,8 +10198,11 @@ u_int8_t ndpi_extra_dissection_possible(struct ndpi_detection_module_struct *ndp flow->detected_protocol_stack[1], !!flow->extra_packets_func); - if(!flow->extra_packets_func) + if(!flow->extra_packets_func) { + ndpi_check_probing_attempt(flow); return(0); + } + return(1); } diff --git a/src/lib/ndpi_utils.c b/src/lib/ndpi_utils.c index dc732e522..9c0819747 100644 --- a/src/lib/ndpi_utils.c +++ b/src/lib/ndpi_utils.c @@ -2094,6 +2094,9 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) { case NDPI_BINARY_DATA_TRANSFER: return("Binary file/data transfer (attempt)"); + case NDPI_PROBING_ATTEMPT: + return("Probing attempt"); + default: ndpi_snprintf(buf, sizeof(buf), "%d", (int)risk); return(buf); |