亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? spp_ssh.c

?? 著名的入侵檢測系統snort的最新版本的源碼
?? C
?? 第 1 頁 / 共 2 頁
字號:
/* $Id *//*** Copyright (C) 2005 Sourcefire Inc.****** This program is free software; you can redistribute it and/or modify** it under the terms of the GNU General Public License Version 2 as** published by the Free Software Foundation.  You may not use, modify or** distribute this program under any other version of the GNU General** Public License.**** This program is distributed in the hope that it will be useful,** but WITHOUT ANY WARRANTY; without even the implied warranty of** MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the** GNU General Public License for more details.**** You should have received a copy of the GNU General Public License** along with this program; if not, write to the Free Software** Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.*//* * SSH preprocessor * Author: Chris Sherwin * Contributors: Adam Keeton * * * Alert for Gobbles, CRC32, protocol mismatch (Cisco catalyst vulnerability), * and a SecureCRT vulnerability.  Will also alert if the client or server  * traffic appears to flow the wrong direction, or if packets appear  * malformed/spoofed. *  */#ifdef HAVE_CONFIG_H#include "config.h"#endif  /* HAVE_CONFIG_H */#include "sf_snort_packet.h"#include "sf_dynamic_preprocessor.h"#include "sf_snort_plugin_api.h"#include "debug.h"#include "preprocids.h"#include "spp_ssh.h"#include <stdio.h>#include <syslog.h>#include <string.h>#ifndef WIN32#include <strings.h>#include <sys/time.h>#endif#include <stdlib.h>#include <ctype.h>#include "profiler.h"#ifdef PERF_PROFILINGPreprocStats sshPerfStats;#endif/* * Generator id. Define here the same as the official registry * in generators.h */#define GENERATOR_SPP_SSH	128/* * Function prototype(s) */SSHData* GetSSHData( SFSnortPacket* );static void SSHInit( char* );static void DisplaySSHConfig( void );static void FreeSSHData( void* );static void  ParseSSHArgs( u_char* );static void ProcessSSH( void*, void* );static INLINE int CheckSSHPort( u_int16_t );static int ProcessSSHProtocolVersionExchange( SSHData*, SFSnortPacket*, 		u_int8_t, u_int8_t );static int ProcessSSHKeyExchange( SSHData*, SFSnortPacket*, u_int8_t );static int ProcessSSHKeyInitExchange( SSHData*, SFSnortPacket*, u_int8_t );/* Ultimately calls SnortEventqAdd *//* Arguments are: gid, sid, rev, classification, priority, message, rule_info */#define ALERT(x,y) { _dpd.alertAdd(GENERATOR_SPP_SSH, x, 1, 0, 3, y, 0 ); }/* Convert port value into an index for the ssh_config.ports array */#define PORT_INDEX(port) port/8/* Convert port value into a value for bitwise operations */#define CONV_PORT(port) 1<<(port%8)/* * SSH preprocessor global configuration structure. */static SSHConfig ssh_config =	{		0, 				                /* Autodetection */		SSH_DEFAULT_MAX_ENC_PKTS, 	    /* Max enc pkts */		SSH_DEFAULT_MAX_CLIENT_BYTES,   /* Max client bytes */		0,				                /* Disable rules  */		SSH_ALERT_ALL,			        /* Enabled alerts */	};extern DynamicPreprocessorData _dpd;/* Called at preprocessor setup time. Links preprocessor keyword * to corresponding preprocessor initialization function. * * PARAMETERS:	None.*  * RETURNS:	Nothing. * */void SetupSSH(void){	/* Link preprocessor keyword to initialization function  	 * in the preprocessor list. 	 */	_dpd.registerPreproc( "ssh", SSHInit );}/* Initializes the SSH preprocessor module and registers * it in the preprocessor list. *  * PARAMETERS:   * * argp:        Pointer to argument string to process for config *                      data. * * RETURNS:     Nothing.  */static  voidSSHInit( char* argp ){#ifdef SUP_IP6    _dpd.fatalMsg("SSH is not currently supported when IPv6 is enabled.");#endif    if(!_dpd.streamAPI)     {        DynamicPreprocessorFatalMessage("SetupSSH(): The Stream preprocessor must be enabled.\n");    }	_dpd.addPreproc( ProcessSSH, PRIORITY_APPLICATION, PP_SSH );	ParseSSHArgs( (u_char *)argp );#ifdef PERF_PROFILING    _dpd.addPreprocProfileFunc("ssh", (void *)&sshPerfStats, 0, _dpd.totalPerfStats);#endif}/* Parses and processes the configuration arguments  * supplied in the SSH preprocessor rule. * * PARAMETERS:  * * argp:        Pointer to string containing the config arguments. *  * RETURNS:     Nothing. */static void ParseSSHArgs( u_char* argp ){	char* cur_tokenp = NULL;	char* argcpyp = NULL;    int port;        /* Set up default port to listen on */    ssh_config.ports[ PORT_INDEX( 22 ) ] |= CONV_PORT(22);	/* Sanity check(s) */	if ( !argp )	{        DisplaySSHConfig();		return;	}	argcpyp = strdup( (char*) argp );	if ( !argcpyp )	{		DynamicPreprocessorFatalMessage("Could not allocate memory to parse SSH options.\n");		return;	}	cur_tokenp = strtok( argcpyp, " ");	while ( cur_tokenp )	{		if ( !strcmp( cur_tokenp, SSH_SERVERPORTS_KEYWORD ))		{            /* If the user specified ports, remove '22' for now since              * it now needs to be set explicitely. */            ssh_config.ports[ PORT_INDEX( 22 ) ] = 0;            			/* Eat the open brace. */			cur_tokenp = strtok( NULL, " ");			if (( !cur_tokenp ) || ( cur_tokenp[0] != '{' ))			{				DynamicPreprocessorFatalMessage("Bad value specified for %s.\n",					                            SSH_SERVERPORTS_KEYWORD);                //free(argcpyp);                //return;			}			cur_tokenp = strtok( NULL, " ");			while (( cur_tokenp ) && ( cur_tokenp[0] != '}' ))			{				if ( !isdigit( (int)cur_tokenp[0] ))				{					DynamicPreprocessorFatalMessage("Bad port %s.\n", cur_tokenp );                    //free(argcpyp);                    //return;				}				else				{                    port = atoi( cur_tokenp );                    if( port < 0 || port > MAX_PORTS )                     {					    DynamicPreprocessorFatalMessage("Port value illegitimate: %s\n", cur_tokenp);                        //free(argcpyp);                        //return;                    }                                        ssh_config.ports[ PORT_INDEX( port ) ] |= CONV_PORT(port);				}				cur_tokenp = strtok( NULL, " ");			}						}		else if ( !strcmp( cur_tokenp, SSH_AUTODETECT_KEYWORD ))		{			ssh_config.AutodetectEnabled++;		}		else if ( !strcmp( cur_tokenp, SSH_MAX_ENC_PKTS_KEYWORD ))		{			cur_tokenp = strtok( NULL, " ");			if (( !cur_tokenp ) || !isdigit((int)cur_tokenp[0]) )			{				_dpd.logMsg("Bad value specified for %s."					"Reverting to default value %d. ",					SSH_MAX_ENC_PKTS_KEYWORD, 					SSH_DEFAULT_MAX_ENC_PKTS );			}			else			{				ssh_config.MaxEncryptedPackets = (u_int16_t)						atoi( cur_tokenp );			}		}		else if (!strcmp( cur_tokenp, SSH_MAX_CLIENT_BYTES_KEYWORD ))		{			cur_tokenp = strtok( NULL, " ");			if (( !cur_tokenp ) || !isdigit((int)cur_tokenp[0]) )			{				_dpd.logMsg("Bad value specified for %s."					"Reverting to default value %d. ",					SSH_MAX_CLIENT_BYTES_KEYWORD, 					SSH_DEFAULT_MAX_CLIENT_BYTES );			}			else			{				ssh_config.MaxClientBytes = (u_int16_t)						atoi( cur_tokenp );			}		}		else if ( !strcmp( cur_tokenp, SSH_DISABLE_GOBBLES_KEYWORD ))		{			ssh_config.EnabledAlerts &= ~SSH_ALERT_GOBBLES;		}		else if ( !strcmp( cur_tokenp, SSH_DISABLE_CRC32_KEYWORD ))		{			ssh_config.EnabledAlerts &= ~SSH_ALERT_CRC32;		}		else if ( 		   !strcmp( cur_tokenp, SSH_DISABLE_SECURECRT_KEYWORD ))		{			ssh_config.EnabledAlerts &= ~SSH_ALERT_SECURECRT;		}		else if ( 		   !strcmp( cur_tokenp, SSH_DISABLE_PROTOMISMATCH_KEYWORD ))		{			ssh_config.EnabledAlerts &= ~SSH_ALERT_PROTOMISMATCH;		}		else if ( 		   !strcmp( cur_tokenp, SSH_DISABLE_WRONGDIR_KEYWORD ))		{			ssh_config.EnabledAlerts &= ~SSH_ALERT_WRONGDIR;		}		else if ( !strcmp( cur_tokenp, SSH_DISABLE_RULES_KEYWORD ))		{			ssh_config.DisableRules++;			}         else if( !strcmp( cur_tokenp, SSH_DISABLE_PAYLOAD_SIZE ))         {            ssh_config.EnabledAlerts &= ~SSH_ALERT_PAYSIZE;        }        else if( !strcmp( cur_tokenp, SSH_DISABLE_UNRECOGNIZED_VER ))        {            ssh_config.EnabledAlerts &= ~SSH_ALERT_UNRECOGNIZED;        }        else        {		    DynamicPreprocessorFatalMessage("Invalid argument: %s\n", cur_tokenp);    		return;        }		cur_tokenp = strtok( NULL, " " );	}	DisplaySSHConfig();    free(argcpyp);}/* Display the configuration for the SSH preprocessor.  *  * PARAMETERS:	None. * * RETURNS: Nothing. */static voidDisplaySSHConfig(void){    int index;    int newline;    	_dpd.logMsg("SSH config: \n");	_dpd.logMsg("    Autodetection: %s\n", 			ssh_config.AutodetectEnabled ? 			"ENABLED":"DISABLED");	_dpd.logMsg("    GOBBLES Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_GOBBLES ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    SSH1 CRC32 Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_CRC32 ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Server Version String Overflow Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_SECURECRT ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Protocol Mismatch Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_PROTOMISMATCH?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Bad Message Direction Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_WRONGDIR ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Bad Payload Size Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_PAYSIZE ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Unrecognized Version Alert: %s\n",			ssh_config.EnabledAlerts & SSH_ALERT_UNRECOGNIZED ?			"ENABLED" : "DISABLED" );	_dpd.logMsg("    Max Encrypted Packets: %d %s \n", 			ssh_config.MaxEncryptedPackets, 			ssh_config.MaxEncryptedPackets 			    == SSH_DEFAULT_MAX_ENC_PKTS ?			    "(Default)" : "" );	if ( ssh_config.EnabledAlerts & 		(SSH_ALERT_GOBBLES | SSH_ALERT_CRC32))	{		_dpd.logMsg("    MaxClientBytes: %d %s \n",   			ssh_config.MaxClientBytes, 			ssh_config.MaxClientBytes			    == SSH_DEFAULT_MAX_CLIENT_BYTES ?			    "(Default)" : "" );	}    /* Traverse list, printing ports, 5 per line */    newline = 1;	_dpd.logMsg("    Ports:\n");     for(index = 0; index < MAX_PORTS; index++)     {        if( ssh_config.ports[ PORT_INDEX(index) ] & CONV_PORT(index) )        {    	    _dpd.logMsg("\t%d", index);            if ( !((newline++)% 5) )            {    	        _dpd.logMsg("\n");            }        }    }	_dpd.logMsg("\n");}/* Main runtime entry point for SSH preprocessor.  * Analyzes SSH packets for anomalies/exploits.  *  * PARAMETERS: * * packetp:    Pointer to current packet to process.  * contextp:    Pointer to context block, not used. * * RETURNS:     Nothing. */static voidProcessSSH( void* ipacketp, void* contextp ){	SSHData* sessp = NULL;	u_int8_t source = 0;	u_int8_t dest = 0;	u_int8_t known_port = 0;	u_int8_t direction; 	SFSnortPacket* packetp;    PROFILE_VARS;	packetp = (SFSnortPacket*) ipacketp;	/* Make sure this preprocessor should run. */	if (( !packetp ) ||	    ( !packetp->payload ) ||	    ( !packetp->payload_size ) ||	    ( !packetp->ip4_header ) ||	    ( !packetp->tcp_header ) ||        /* check if we're waiting on stream reassembly */        ( packetp->flags & FLAG_STREAM_INSERT))	{ 		return;	}     /* If we picked up mid-stream do not process further */    if ( _dpd.streamAPI->get_session_flags(            packetp->stream_session_ptr) & SSNFLAG_MIDSTREAM )    {        return;    }	/* If not doing autodetection, check the ports to make sure this is 	 * running on an SSH port, otherwise no need to examine the traffic.	 */	source = (u_int8_t)CheckSSHPort( packetp->src_port );	dest = (u_int8_t)CheckSSHPort( packetp->dst_port );	if ( !ssh_config.AutodetectEnabled && !source && !dest )	{		/* Not one of the ports we care about. */		return;	}    PREPROC_PROFILE_START(sshPerfStats);	/* See if a known server port is involved. */	known_port = ( source || dest ? 1 : 0 );	/* Get the direction of the packet. */	direction = ( (packetp->flags & FLAG_FROM_SERVER ) ? 			SSH_DIR_FROM_SERVER : SSH_DIR_FROM_CLIENT );	/* Check the stream session. If it does not currently	 * have our SSH data-block attached, create one.	 */	sessp = GetSSHData( packetp );	if ( !sessp )	{		/* Could not get/create the session data for this packet. */        PREPROC_PROFILE_END(sshPerfStats);		return;	}	if ( !(sessp->state_flags & SSH_FLG_SESS_ENCRYPTED ))	{		/* If server and client have not performed the protocol 		 * version exchange yet, must look for version strings.	 	 */		if ( (sessp->state_flags & SSH_FLG_BOTH_IDSTRING_SEEN)			!= SSH_FLG_BOTH_IDSTRING_SEEN )		{			if ( ProcessSSHProtocolVersionExchange( sessp, 					packetp, direction, known_port ) ==				SSH_FAILURE )			{				/*Error processing protovers exchange msg */			}            PREPROC_PROFILE_END(sshPerfStats);			return;		}		/* Expecting to see the key init exchange at this point 		 * (in SSH2) or the actual key exchange if SSH1 		 */		if ((( sessp->state_flags & SSH_FLG_V1_KEYEXCH_DONE )			!= SSH_FLG_V1_KEYEXCH_DONE ) &&		     ((sessp->state_flags & SSH_FLG_V2_KEXINIT_DONE )			!= SSH_FLG_V2_KEXINIT_DONE ))		{		    ProcessSSHKeyInitExchange( sessp, packetp, direction );			            PREPROC_PROFILE_END(sshPerfStats);			return;		}		/* If SSH2, need to process the actual key exchange msgs.		 * The actual key exchange type was negotiated in the		 * key exchange init msgs. SSH1 won't arrive here.		 */		ProcessSSHKeyExchange( sessp, packetp, direction );	}	else	{		/* Traffic on this session is currently encrypted. 		 * Two of the major SSH exploits, SSH1 CRC-32 and 		 * the GOBBLES attack occur within the encrypted 		 * portion of the SSH session. Therefore, the only		 * way to detect these attacks is by examining 		 * amounts of data exchanged for anomalies.  		 */		sessp->num_enc_pkts++;		if ( sessp->num_enc_pkts <= ssh_config.MaxEncryptedPackets )		{			if ( direction == SSH_DIR_FROM_CLIENT )			{			   sessp->num_client_bytes += packetp->payload_size;			   if ( sessp->num_client_bytes >= 				ssh_config.MaxClientBytes ) 			   {				/* Probable exploit in progress.*/				if (sessp->version == SSH_VERSION_1) 				{					if ( ssh_config.EnabledAlerts & SSH_ALERT_CRC32 )					{        			    ALERT(SSH_EVENT_CRC32, SSH_EVENT_CRC32_STR);			            _dpd.streamAPI->stop_inspection(             				packetp->stream_session_ptr,             				packetp,             				SSN_DIR_BOTH, -1, 0 ); 					}				}				else				{					if ( ssh_config.EnabledAlerts & SSH_ALERT_GOBBLES )					{						ALERT(SSH_EVENT_GOBBLES, SSH_EVENT_GOBBLES_STR);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲日本韩国一区| 在线不卡一区二区| 国产欧美一区二区精品性色超碰| 麻豆精品在线看| 久久综合狠狠综合久久综合88| 久久99蜜桃精品| 国产欧美日韩久久| 91蜜桃在线观看| 亚洲第一在线综合网站| 欧美日韩在线亚洲一区蜜芽| 视频一区二区欧美| 欧美一二三区在线观看| 久久99久久久欧美国产| 精品少妇一区二区三区免费观看 | 精品久久一区二区| 卡一卡二国产精品| 国产午夜精品久久久久久免费视 | www一区二区| 国产精品538一区二区在线| 久久久午夜精品理论片中文字幕| 国产99久久久国产精品潘金| 中文字幕欧美日韩一区| 色8久久人人97超碰香蕉987| 五月综合激情网| 欧美mv日韩mv亚洲| 成人综合婷婷国产精品久久蜜臀| 国产精品久久久久久久午夜片| 91性感美女视频| 日精品一区二区| 2019国产精品| 91亚洲精华国产精华精华液| 亚洲成人1区2区| 精品免费99久久| 成人不卡免费av| 一区二区三区欧美亚洲| 日韩欧美一二三四区| 成人一级黄色片| 国产精品久久久久久久岛一牛影视 | 香蕉加勒比综合久久| 日韩欧美一区二区视频| 国产高清在线观看免费不卡| 亚洲欧美成人一区二区三区| 欧美一区二区三区喷汁尤物| 大美女一区二区三区| 性久久久久久久久久久久| 精品电影一区二区三区| 91性感美女视频| 久久爱另类一区二区小说| 亚洲色图欧美在线| 日韩久久久精品| 色久优优欧美色久优优| 久久福利资源站| 亚洲男人的天堂在线观看| 日韩欧美国产一二三区| 91麻豆福利精品推荐| 国产最新精品免费| 亚洲国产视频在线| 欧美激情在线观看视频免费| 51精品视频一区二区三区| 国产乱码精品1区2区3区| 天堂成人国产精品一区| 国产视频在线观看一区二区三区| 欧美美女直播网站| 成人动漫一区二区| 精品一二三四在线| 日韩在线a电影| 亚洲欧美激情小说另类| 欧美国产日本视频| 精品国产乱码91久久久久久网站| 在线精品视频免费观看| 成人av资源在线观看| 国产乱一区二区| 日本免费新一区视频| 亚洲主播在线观看| 亚洲免费视频中文字幕| 欧美激情艳妇裸体舞| 精品国精品自拍自在线| 欧美一区二区高清| 色婷婷国产精品久久包臀| 国产精品一区免费视频| 国产精一品亚洲二区在线视频| 麻豆精品视频在线观看| 视频在线观看91| 亚洲va欧美va人人爽| 亚洲综合精品久久| 亚洲美女淫视频| 亚洲人一二三区| 中文字幕制服丝袜一区二区三区| 日韩欧美电影一二三| 欧美福利视频一区| 欧美日韩国产bt| 欧美日韩一级二级| 欧美日韩一区二区三区四区五区 | 欧美成人精品二区三区99精品| 欧美日韩在线精品一区二区三区激情| 99久久免费精品高清特色大片| 成人激情av网| 国产精品一区专区| 精品在线一区二区三区| 亚洲国产精品麻豆| 日韩激情一区二区| 一个色妞综合视频在线观看| 亚洲国产乱码最新视频 | 国产精品私人影院| 中文字幕亚洲一区二区av在线 | 有坂深雪av一区二区精品| 亚洲综合偷拍欧美一区色| 一区二区三区不卡视频| 亚洲国产视频a| 日本aⅴ亚洲精品中文乱码| 日本成人在线不卡视频| 激情六月婷婷久久| 成人性生交大片| www.亚洲色图.com| 欧美主播一区二区三区美女| 欧美日韩高清一区二区不卡| 日韩小视频在线观看专区| 久久久久久夜精品精品免费| 久久久久久久综合| 中文字幕乱码亚洲精品一区| 亚洲午夜三级在线| 亚洲超碰精品一区二区| 国产一区二区在线免费观看| av电影一区二区| 欧美性色aⅴ视频一区日韩精品| 日韩欧美一级在线播放| 久久久99精品免费观看| 亚洲精品亚洲人成人网| 日韩中文字幕亚洲一区二区va在线 | 亚洲女人****多毛耸耸8| 五月婷婷欧美视频| 国产精品综合久久| 在线视频一区二区免费| 国产校园另类小说区| 偷拍日韩校园综合在线| 国产成人在线视频网站| 欧美日韩国产一二三| 久久精品人人做人人爽人人| 一区二区三区在线播| 久久99九九99精品| 92精品国产成人观看免费| 欧美一区二区黄| 亚洲日本在线视频观看| 韩国理伦片一区二区三区在线播放| 国产福利一区二区三区视频在线| 色狠狠一区二区| 久久综合久色欧美综合狠狠| 亚洲免费观看高清完整版在线观看| 午夜精品视频在线观看| 欧美激情一区二区三区在线| 日本vs亚洲vs韩国一区三区二区 | 91蝌蚪porny九色| 欧美一区二区三区性视频| 亚洲精品欧美激情| 丁香激情综合五月| 久久这里只有精品首页| 日韩电影免费在线看| 欧美天堂一区二区三区| 亚洲欧洲韩国日本视频| 国内成人免费视频| 欧美一区二区视频在线观看2020 | 日韩激情中文字幕| 成人av动漫在线| 欧美国产成人在线| 国产不卡一区视频| 久久综合色婷婷| 麻豆成人久久精品二区三区红| 欧美日韩一区二区三区不卡| 亚洲精选免费视频| 成人ar影院免费观看视频| 国产婷婷色一区二区三区四区| 久久99精品久久久久久动态图| 欧美嫩在线观看| 午夜成人免费视频| 欧美日韩亚洲综合在线| 亚洲成av人片在www色猫咪| 欧美亚洲愉拍一区二区| 亚洲人成精品久久久久久 | 91色乱码一区二区三区| 国产精品久久久久天堂| 成人av免费在线观看| 中文字幕在线一区| 91色九色蝌蚪| 日韩一区在线播放| 国产精品视频一区二区三区不卡| 国产一区二区看久久| 国产亚洲短视频| 国产69精品久久久久777| 欧美午夜电影网| 日韩电影在线免费看| 51精品秘密在线观看| 美女免费视频一区二区| 欧美tickling网站挠脚心| 国内精品嫩模私拍在线| 国产日韩欧美a| 成人激情黄色小说| 亚洲一区二区三区在线播放| 欧美日韩精品欧美日韩精品一| 视频一区二区不卡| 精品动漫一区二区三区在线观看|