summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorliuxueli <[email protected]>2024-03-12 17:11:11 +0800
committerliuxueli <[email protected]>2024-03-13 11:01:49 +0800
commit00218891bdf3833d5f3cd741fa736fe52329b119 (patch)
treed7dfe240f148250650f3a3bc91911c9233f07086
parent484cb7a71951b32e353ba649aa77f636699e8e4e (diff)
Feature: delete api -> ssl_get_ja3_fingerprint, rename ssl_ja3s_info -> ssl_ja_fingerprintv3.1.0
-rw-r--r--include/ssl.h18
-rw-r--r--src/SSL_Analyze.c1
-rw-r--r--src/SSL_Message.c25
-rw-r--r--src/SSl_ja3_fingerprint.cpp688
-rw-r--r--test/ssl_test_plug.cpp4
5 files changed, 25 insertions, 711 deletions
diff --git a/include/ssl.h b/include/ssl.h
index 16a7300..ef7ed03 100644
--- a/include/ssl.h
+++ b/include/ssl.h
@@ -107,19 +107,13 @@ struct ssl_client_hello
struct ssl_ja_fingerprint ja3;
};
-#define MAX_JA3S_FINGERPRINT_LEN 128
-struct ssl_ja3s_info
-{
- int fingerprint_md5_len;
- char fingerprint_md5[MAX_JA3S_FINGERPRINT_LEN];
-};
struct ssl_server_hello
{
int total_len; //3
unsigned short version;
unsigned short extension_len;
unsigned short extension_num;
- struct ssl_ja3s_info ja3s;
+ struct ssl_ja_fingerprint ja3s;
struct ssl_random random;
struct ssl_l1v session;
struct ssl_l2v ciphersuites;
@@ -240,13 +234,3 @@ const char* ssl_get_suite_name(unsigned char* suite_value, unsigned short suite_
int ssl_get_alpn_list(struct ssl_l2tv *extension_alpn, struct ssl_alpn_list* alpn_list, int alpn_size);
int ssl_read_specific_cert(const char* conj_cert_buf, uint32_t conj_buflen, uint8_t cert_type, char** cert, uint32_t* cert_len);
int ssl_read_all_cert(const char* conj_cert_buf, uint32_t conj_buflen, struct ssl_certificate_chain* cert_unit, uint32_t unit_size);
-
-struct ssl_ja3_info
-{
- int sni_len;
- int fp_len;
- char *sni;
- char *fp;
-};
-
-struct ssl_ja3_info *ssl_get_ja3_fingerprint(struct streaminfo *stream, unsigned char *payload, int payload_len, int thread_seq); \ No newline at end of file
diff --git a/src/SSL_Analyze.c b/src/SSL_Analyze.c
index 7c6d89a..d361b42 100644
--- a/src/SSL_Analyze.c
+++ b/src/SSL_Analyze.c
@@ -216,7 +216,6 @@ extern "C" int SSL_INIT(void)
MESA_load_profile_int_def(filename, "SSL", "MAX_CACHE_LEN", &g_ssl_runtime_para.max_cache_len, 10240);
MESA_load_profile_int_def(filename, "SSL", "PARSE_CERTIFICATE_DETAIL", &g_ssl_runtime_para.parse_certificate_detail, 1);
- ssl_ja3_init();
g_ssl_runtime_para.proto_tag_id=project_producer_register("MESA_PROTO", "struct", ssl_proto_tag_free);
return 0;
diff --git a/src/SSL_Message.c b/src/SSL_Message.c
index 86f9713..284c0a7 100644
--- a/src/SSL_Message.c
+++ b/src/SSL_Message.c
@@ -1,6 +1,7 @@
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
+#include <openssl/md5.h>
#include "utstring.h"
@@ -36,7 +37,6 @@
#define CERTIFICATE_HDRLEN 7
#define SSL_CERTIFICATE_HDRLEN 3
-extern int ja3_md5sum(const char *str, int len, char *buf, int size);
extern struct ssl_serial_string g_astCipherSuit;
const struct ssl_serial_string g_astCompression[] =
@@ -56,6 +56,25 @@ const struct ssl_value2string ssl_version_list[] =
{ UNKNOWN_VERSION, NULL }
};
+int ja3_md5sum(const char *str, int len, char *buf, int size)
+{
+ int n;
+ int ret = 0;
+ MD5_CTX ctx;
+ unsigned char tmp[MD5_DIGEST_LENGTH];
+
+ MD5_Init(&ctx);
+ MD5_Update(&ctx, str, len);
+ MD5_Final(tmp, &ctx);
+
+ for (n = 0; n < MD5_DIGEST_LENGTH; n++)
+ {
+ ret += snprintf(buf + ret, size - ret, "%.2x", tmp[n]);
+ }
+
+ return ret;
+}
+
// https://tools.ietf.org/html/draft-davidben-tls-grease-00
static int ssl_is_grease_value(unsigned short val)
{
@@ -604,8 +623,8 @@ int ssl_parse_server_hello(struct ssl_server_hello *shello, unsigned char *paylo
}
ja3s_string[ja3s_string_offset]='\0';
- shello->ja3s.fingerprint_md5_len=ja3_md5sum(ja3s_string, ja3s_string_offset, shello->ja3s.fingerprint_md5, sizeof(shello->ja3s.fingerprint_md5));
- shello->ja3s.fingerprint_md5[shello->ja3s.fingerprint_md5_len]='\0';
+ shello->ja3s.md5_len=ja3_md5sum(ja3s_string, ja3s_string_offset, shello->ja3s.md5, sizeof(shello->ja3s.md5));
+ shello->ja3s.md5[shello->ja3s.md5_len]='\0';
return SSL_TRUE;
}
diff --git a/src/SSl_ja3_fingerprint.cpp b/src/SSl_ja3_fingerprint.cpp
deleted file mode 100644
index 5bfb453..0000000
--- a/src/SSl_ja3_fingerprint.cpp
+++ /dev/null
@@ -1,688 +0,0 @@
-#include <ctype.h>
-#include <stdint.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <openssl/md5.h>
-
-#include <MESA/stream.h>
-#include "ssl.h"
-
-int g_ssl_ja3_fingerprint_label_id=-1;
-
-#ifndef MIN
-#define MIN(a, b) ((a) > (b) ? (b) : (a))
-#endif
-
-#define BSB_INIT(b, buffer, size) \
- do \
- { \
- (b).buf = (unsigned char *)buffer; \
- (b).ptr = (unsigned char *)buffer; \
- int s = (int)size; \
- if ((buffer == NULL) || (s < 0)) \
- (b).end = 0; \
- else \
- (b).end = (unsigned char *)buffer + size; \
- } while (0)
-
-#define BSB_SET_ERROR(b) ((b).end = NULL)
-#define BSB_IS_ERROR(b) ((b).end == NULL)
-#define BSB_NOT_ERROR(b) ((b).end != NULL)
-#define BSB_LENGTH(b) ((b).ptr - (b).buf)
-#define BSB_POSITION BSB_LENGTH
-#define BSB_SIZE(b) ((b).end - (b).buf)
-#define BSB_REMAINING(b) ((b).end ? (b).end - (b).ptr : 0)
-#define BSB_WORK_PTR(b) ((b).ptr)
-
-#define BSB_EXPORT_u08(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 1 <= (b).end) \
- { \
- *(((b).ptr)++) = (unsigned char)x; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_u16(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 2 <= (b).end) \
- { \
- uint16_t t = (uint16_t)x; \
- *(((b).ptr)++) = (t & 0xff00) >> 8; \
- *(((b).ptr)++) = (t & 0x00ff); \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_u32(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 4 <= (b).end) \
- { \
- uint32_t t = x; \
- *(((b).ptr)++) = (t & 0xff000000) >> 24; \
- *(((b).ptr)++) = (t & 0x00ff0000) >> 16; \
- *(((b).ptr)++) = (t & 0x0000ff00) >> 8; \
- *(((b).ptr)++) = (t & 0x000000ff); \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_ptr(b, x, size) \
- do \
- { \
- if ((x || size == 0) && \
- (b).ptr + size <= (b).end && \
- (b).ptr + size >= (b).buf) \
- { \
- memcpy((b).ptr, x, size); \
- (b).ptr += size; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_ptr_some(b, x, size) \
- do \
- { \
- if ((b).ptr + size <= (b).end) \
- { \
- memcpy((b).ptr, x, size); \
- (b).ptr += size; \
- } \
- else if (BSB_NOT_ERROR(b)) \
- { \
- memcpy((b).ptr, x, BSB_REMAINING(b)); \
- (b).ptr += BSB_REMAINING(b); \
- } \
- } while (0)
-
-#define BSB_EXPORT_cstr(b, x) \
- do \
- { \
- const int size = sizeof x - 1; \
- if ((b).ptr + size <= (b).end) \
- { \
- memcpy((b).ptr, x, size); \
- (b).ptr += size; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_skip(b, size) \
- do \
- { \
- if ((b).ptr + size <= (b).end && \
- (b).ptr + size >= (b).buf) \
- { \
- (b).ptr += size; \
- if ((b).ptr < (b).buf) \
- (b).end = 0; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_EXPORT_rewind(b, size) \
- do \
- { \
- if ((b).ptr - size <= (b).end && \
- (b).ptr - size >= (b).buf) \
- { \
- (b).ptr -= size; \
- if ((b).ptr < (b).buf) \
- (b).end = 0; \
- } \
- else \
- { \
- BSB_SET_ERROR(b); \
- } \
- } while (0)
-
-#if defined(C9X)
-
-#define BSB_EXPORT_sprintf(b, ...) \
- do \
- { \
- if ((b).end != 0) \
- { \
- int l = snprintf((char *)(b).ptr, \
- (b).end - (b).ptr, \
- __VA_ARGS__); \
- if (l <= (b).end - (b).ptr) \
- { \
- (b).ptr += l; \
- } \
- else \
- { \
- BSB_SET_ERROR(b); \
- } \
- } \
- } while (0)
-
-#else
-
-#define BSB_EXPORT_sprintf(b, args...) \
- do \
- { \
- if ((b).end != 0) \
- { \
- int l = snprintf((char *)(b).ptr, \
- (b).end - (b).ptr, \
- ##args); \
- if (l <= (b).end - (b).ptr) \
- { \
- (b).ptr += l; \
- } \
- else \
- { \
- BSB_SET_ERROR(b); \
- } \
- } \
- } while (0)
-#endif
-
-#define BSB_IMPORT_u08(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 1 <= (b).end) \
- { \
- x = *(((b).ptr)++); \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_IMPORT_u16(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 2 <= (b).end) \
- { \
- x = ((uint16_t)((b).ptr)[0]) << 8 | \
- ((uint16_t)((b).ptr)[1]); \
- (b).ptr += 2; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_IMPORT_u24(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 3 <= (b).end) \
- { \
- x = ((uint32_t)((b).ptr)[0]) << 16 | \
- ((uint32_t)((b).ptr)[1]) << 8 | \
- ((uint32_t)((b).ptr)[2]); \
- (b).ptr += 3; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_IMPORT_u32(b, x) \
- do \
- { \
- if ((b).ptr && (b).ptr + 4 <= (b).end) \
- { \
- x = ((uint32_t)((b).ptr)[0]) << 24 | \
- ((uint32_t)((b).ptr)[1]) << 16 | \
- ((uint32_t)((b).ptr)[2]) << 8 | \
- ((uint32_t)((b).ptr)[3]); \
- (b).ptr += 4; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_LEXPORT_u08(b, x) BSB_EXPORT_u08(b, x)
-
-#define BSB_LEXPORT_u16(b, x) \
- do \
- { \
- if ((b).ptr + 2 <= (b).end) \
- { \
- uint16_t t = (uint16_t)x; \
- *(((b).ptr)++) = (t & 0x00ff); \
- *(((b).ptr)++) = (t & 0xff00) >> 8; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_LEXPORT_u32(b, x) \
- do \
- { \
- if ((b).ptr + 4 <= (b).end) \
- { \
- uint32_t t = x; \
- *(((b).ptr)++) = (t & 0x000000ff); \
- *(((b).ptr)++) = (t & 0x0000ff00) >> 8; \
- *(((b).ptr)++) = (t & 0x00ff0000) >> 16; \
- *(((b).ptr)++) = (t & 0xff000000) >> 24; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_LIMPORT_u08(b, x) BSB_IMPORT_u08(b, x)
-
-#define BSB_LIMPORT_u16(b, x) \
- do \
- { \
- if ((b).ptr + 2 <= (b).end) \
- { \
- x = ((uint16_t)((b).ptr)[1]) << 8 | \
- ((uint16_t)((b).ptr)[0]); \
- (b).ptr += 2; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_LIMPORT_u24(b, x) \
- do \
- { \
- if ((b).ptr + 3 <= (b).end) \
- { \
- x = ((uint32_t)((b).ptr)[2]) << 16 | \
- ((uint32_t)((b).ptr)[1]) << 8 | \
- ((uint32_t)((b).ptr)[0]); \
- (b).ptr += 3; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_LIMPORT_u32(b, x) \
- do \
- { \
- if ((b).ptr + 4 <= (b).end) \
- { \
- x = ((uint32_t)((b).ptr)[3]) << 24 | \
- ((uint32_t)((b).ptr)[2]) << 16 | \
- ((uint32_t)((b).ptr)[1]) << 8 | \
- ((uint32_t)((b).ptr)[0]); \
- (b).ptr += 4; \
- } \
- else \
- BSB_SET_ERROR(b); \
- } while (0)
-
-#define BSB_IMPORT_ptr(b, x, size) \
- do \
- { \
- if ((b).ptr + size <= (b).end && \
- (b).ptr + size >= (b).buf) \
- { \
- (x) = (b).ptr; \
- (b).ptr += size; \
- } \
- else \
- { \
- BSB_SET_ERROR(b); \
- x = 0; \
- } \
- } while (0)
-
-#define BSB_LIMPORT_ptr BSB_IMPORT_ptr
-#define BSB_IMPORT_skip BSB_EXPORT_skip
-#define BSB_LIMPORT_skip BSB_EXPORT_skip
-#define BSB_IMPORT_rewind BSB_EXPORT_rewind
-#define BSB_LIMPORT_rewind BSB_EXPORT_rewind
-
-#define BSB_memchr(b, ch, pos) \
- do \
- { \
- if (BSB_IS_ERROR(b)) \
- { \
- pos = 0; \
- break; \
- } \
- char *s = memchr((char *)b.ptr, ch, BSB_REMAINING(b)); \
- if (s) \
- pos = (char *)s - (char *)b.ptr; \
- else \
- pos = 0; \
- } while (0)
-
-#define BSB_memcmp(str, b, len) ((b).ptr + len <= (b).end ? memcmp(str, b.ptr, len) : -1)
-
-#define BSB_PEEK(b) ((b).ptr + 1 <= (b).end ? *b.ptr : -1)
-
-#define BSB_IMPORT_zbyte(b, x, size) \
- do \
- { \
- if ((b).ptr + size <= (b).end) \
- { \
- memcpy(x, b, size); \
- (x)[size] = 0; \
- (b).ptr += size; \
- } \
- else \
- { \
- BSB_SET_ERROR(b); \
- (x)[0] = 0; \
- } \
- } while (0)
-
-/* Private data structure */
-typedef struct bsb
-{
- unsigned char *buf;
- unsigned char *ptr;
- unsigned char *end;
-} BSB;
-
-struct ssl_fingerprint
-{
- struct ssl_ja3_info *ja3_info;
-};
-
-
-int ja3_md5sum(const char *str, int len, char *buf, int size)
-{
- int n;
- int ret = 0;
- MD5_CTX ctx;
- unsigned char tmp[MD5_DIGEST_LENGTH];
-
- MD5_Init(&ctx);
- MD5_Update(&ctx, str, len);
- MD5_Final(tmp, &ctx);
-
- for (n = 0; n < MD5_DIGEST_LENGTH; n++)
- {
- ret += snprintf(buf + ret, size - ret, "%.2x", tmp[n]);
- }
-
- return ret;
-}
-
-
-// https://tools.ietf.org/html/draft-davidben-tls-grease-00
-static int tls_is_grease_value(uint32_t val)
-{
- if ((val & 0x0f) != 0x0a)
- return 0;
-
- if ((val & 0xff) != ((val >> 8) & 0xff))
- return 0;
-
- return 1;
-}
-
-static int ssl_generate_ja3_fingerprint(const unsigned char *data, int len, char *ja3_fp, int ja3_fp_len, char *sni_buff, int sni_buff_len)
-{
- BSB sslbsb;
- //char ja3[30000];
- BSB ja3bsb;
- char ecfja3[1000];
- BSB ecfja3bsb;
- char eja3[10000];
- BSB eja3bsb;
- char ecja3[10000];
- BSB ecja3bsb;
-
- BSB_INIT(sslbsb, data, len);
- BSB_INIT(ja3bsb, ja3_fp, ja3_fp_len);
- BSB_INIT(ecja3bsb, ecja3, sizeof(ecja3));
- BSB_INIT(ecfja3bsb, ecfja3, sizeof(ecfja3));
- BSB_INIT(eja3bsb, eja3, sizeof(eja3));
-
- if (BSB_REMAINING(sslbsb) > 5)
- {
- unsigned char *ssldata = BSB_WORK_PTR(sslbsb);
- int ssllen = MIN(BSB_REMAINING(sslbsb) - 5, ssldata[3] << 8 | ssldata[4]);
-
- BSB pbsb;
- BSB_INIT(pbsb, ssldata + 5, ssllen);
-
- if (BSB_REMAINING(pbsb) > 7)
- {
- unsigned char *pdata = BSB_WORK_PTR(pbsb);
- int plen = MIN(BSB_REMAINING(pbsb) - 4, pdata[2] << 8 | pdata[3]);
-
- uint16_t ver = 0;
- BSB_IMPORT_skip(pbsb, 4); // type + len
- BSB_IMPORT_u16(pbsb, ver);
-
- BSB_EXPORT_sprintf(ja3bsb, "%d,", ver);
-
- BSB cbsb;
- BSB_INIT(cbsb, pdata + 6, plen - 2); // The - 4 for plen is done above, confusing
-
- if (BSB_REMAINING(cbsb) > 32)
- {
- BSB_IMPORT_skip(cbsb, 32); // Random
-
- int skiplen = 0;
- BSB_IMPORT_u08(cbsb, skiplen); // Session Id Length
- if (skiplen > 0 && BSB_REMAINING(cbsb) > skiplen)
- {
- // unsigned char *ptr = BSB_WORK_PTR(cbsb);
- // char sessionId[513];
- // int i;
-
- // for (i = 0; i < skiplen; i++)
- // {
- // sessionId[i * 2] = moloch_char_to_hexstr[ptr[i]][0];
- // sessionId[i * 2 + 1] = moloch_char_to_hexstr[ptr[i]][1];
- // }
- // sessionId[skiplen * 2] = 0;
- // moloch_field_string_add(srcIdField, session, sessionId, skiplen * 2, TRUE);
- }
- BSB_IMPORT_skip(cbsb, skiplen); // Session Id
-
- BSB_IMPORT_u16(cbsb, skiplen); // Ciper Suites Length
- while (BSB_NOT_ERROR(cbsb) && skiplen > 0)
- {
- uint16_t c = 0;
- BSB_IMPORT_u16(cbsb, c);
- if (!tls_is_grease_value(c))
- {
- BSB_EXPORT_sprintf(ja3bsb, "%d-", c);
- }
- skiplen -= 2;
- }
- BSB_EXPORT_rewind(ja3bsb, 1); // Remove last -
- BSB_EXPORT_u08(ja3bsb, ',');
-
- BSB_IMPORT_u08(cbsb, skiplen); // Compression Length
- BSB_IMPORT_skip(cbsb, skiplen); // Compressions
-
- if (BSB_REMAINING(cbsb) > 6)
- {
- int etotlen = 0;
- BSB_IMPORT_u16(cbsb, etotlen); // Extensions Length
-
- etotlen = MIN(etotlen, BSB_REMAINING(cbsb));
-
- BSB ebsb;
- BSB_INIT(ebsb, BSB_WORK_PTR(cbsb), etotlen);
-
- while (BSB_REMAINING(ebsb) > 4)
- {
- uint16_t etype = 0, elen = 0;
-
- BSB_IMPORT_u16(ebsb, etype);
- BSB_IMPORT_u16(ebsb, elen);
-
- if (!tls_is_grease_value(etype))
- BSB_EXPORT_sprintf(eja3bsb, "%d-", etype);
-
- if (elen > BSB_REMAINING(ebsb))
- break;
-
- if (etype == 0)
- { // SNI
- BSB snibsb;
- BSB_INIT(snibsb, BSB_WORK_PTR(ebsb), elen);
- BSB_IMPORT_skip(ebsb, elen);
-
- int sni = 0;
- BSB_IMPORT_u16(snibsb, sni); // list len
- if (sni != BSB_REMAINING(snibsb))
- continue;
-
- BSB_IMPORT_u08(snibsb, sni); // type
- if (sni != 0)
- continue;
-
- BSB_IMPORT_u16(snibsb, sni); // len
- if (sni != BSB_REMAINING(snibsb))
- continue;
-
- memcpy(sni_buff, (char *)BSB_WORK_PTR(snibsb), (sni>sni_buff_len ? sni_buff_len : sni));
- // moloch_field_string_add(hostField, session, (char *)BSB_WORK_PTR(snibsb), sni, TRUE);
- }
- else if (etype == 0x000a)
- { // Elliptic Curves
- BSB bsb;
- BSB_INIT(bsb, BSB_WORK_PTR(ebsb), elen);
- BSB_IMPORT_skip(ebsb, elen);
-
- uint16_t llen = 0;
- BSB_IMPORT_u16(bsb, llen); // list len
- while (llen > 0 && !BSB_IS_ERROR(bsb))
- {
- uint16_t c = 0;
- BSB_IMPORT_u16(bsb, c);
- if (!tls_is_grease_value(c))
- {
- BSB_EXPORT_sprintf(ecja3bsb, "%d-", c);
- }
- llen -= 2;
- }
- BSB_EXPORT_rewind(ecja3bsb, 1); // Remove last -
- }
- else if (etype == 0x000b)
- { // Elliptic Curves point formats
- BSB bsb;
- BSB_INIT(bsb, BSB_WORK_PTR(ebsb), elen);
- BSB_IMPORT_skip(ebsb, elen);
-
- uint16_t llen = 0;
- BSB_IMPORT_u08(bsb, llen); // list len
- while (llen > 0 && !BSB_IS_ERROR(bsb))
- {
- uint8_t c = 0;
- BSB_IMPORT_u08(bsb, c);
- BSB_EXPORT_sprintf(ecfja3bsb, "%d-", c);
- llen -= 1;
- }
- BSB_EXPORT_rewind(ecfja3bsb, 1); // Remove last -
- }
- else
- {
- BSB_IMPORT_skip(ebsb, elen);
- }
- }
- BSB_EXPORT_rewind(eja3bsb, 1); // Remove last -
- }
- }
- }
- BSB_IMPORT_skip(sslbsb, ssllen + 5);
-
- if (BSB_LENGTH(ja3bsb) > 0 && BSB_NOT_ERROR(ja3bsb) && BSB_NOT_ERROR(ecja3bsb) && BSB_NOT_ERROR(eja3bsb) && BSB_NOT_ERROR(ecfja3bsb))
- {
- BSB_EXPORT_sprintf(ja3bsb, "%.*s,%.*s,%.*s", (int)BSB_LENGTH(eja3bsb), eja3, (int)BSB_LENGTH(ecja3bsb), ecja3, (int)BSB_LENGTH(ecfja3bsb), ecfja3);
- }
- return 1;
- }
-
- return 0;
-}
-
-static void free_ja3_fingerprint_label(int thread_seq, void *value)
-{
- struct ssl_fingerprint *fingerprint_info=(struct ssl_fingerprint *)value;
- if(value!=NULL)
- {
- if (fingerprint_info->ja3_info != NULL)
- {
- dictator_free(thread_seq, (void *)fingerprint_info->ja3_info->sni);
- fingerprint_info->ja3_info->sni = NULL;
-
- dictator_free(thread_seq, (void *)fingerprint_info->ja3_info->fp);
- fingerprint_info->ja3_info->fp = NULL;
-
- dictator_free(thread_seq, fingerprint_info->ja3_info);
- fingerprint_info->ja3_info = NULL;
- }
-
- dictator_free(thread_seq, value);
- value=NULL;
- }
-
- return ;
-}
-
-struct ssl_ja3_info *ssl_get_ja3_fingerprint(struct streaminfo *stream, unsigned char *payload, int payload_len, int thread_seq)
-{
- int ret=0;
- char ja3_fp[8192]={0};
- char sni_buff[1024]={0};
- struct ssl_ja3_info *ja3_info = NULL;
-
- struct ssl_fingerprint *fingerprint_info=(struct ssl_fingerprint *)project_req_get_struct(stream, g_ssl_ja3_fingerprint_label_id);
- if (fingerprint_info == NULL)
- {
- fingerprint_info = (struct ssl_fingerprint *)dictator_malloc(thread_seq, sizeof(struct ssl_fingerprint));
- memset(fingerprint_info, 0, sizeof(struct ssl_fingerprint));
- project_req_add_struct(stream, g_ssl_ja3_fingerprint_label_id, (void *)fingerprint_info);
- }
- else if(fingerprint_info->ja3_info!=NULL)
- {
- return fingerprint_info->ja3_info;
- }
-
- ret=ssl_generate_ja3_fingerprint(payload, payload_len, ja3_fp, sizeof(ja3_fp), sni_buff, sizeof(sni_buff));
- if(ret==1)
- {
- fingerprint_info->ja3_info=(struct ssl_ja3_info *)dictator_malloc(thread_seq, sizeof(struct ssl_ja3_info));
- ja3_info = fingerprint_info->ja3_info;
-
- if(strlen(sni_buff)>0 && strlen(sni_buff)<sizeof(sni_buff))
- {
- ja3_info->sni_len=strlen(sni_buff);
- ja3_info->sni=(char *)dictator_malloc(thread_seq, ja3_info->sni_len+1);
- memcpy(ja3_info->sni, sni_buff, ja3_info->sni_len);
- ja3_info->sni[ja3_info->sni_len]='\0';
- }
- else
- {
- ja3_info->sni=NULL;
- ja3_info->sni_len=0;
- }
-
- if(strlen(ja3_fp)>0)
- {
- ja3_info->fp=(char *)dictator_malloc(thread_seq, MD5_DIGEST_LENGTH*2+1);
- ja3_info->fp_len=ja3_md5sum(ja3_fp, strlen(ja3_fp), ja3_info->fp, MD5_DIGEST_LENGTH*2+1);
- ja3_info->fp[ja3_info->fp_len]='\0';
- }
- else
- {
- ja3_info->fp=NULL;
- ja3_info->fp_len=0;
- }
-
- return ja3_info;
- }
-
- return NULL;
-}
-
-int ssl_ja3_init(void)
-{
- g_ssl_ja3_fingerprint_label_id=project_producer_register("JA3_FINGERPRINT_LABEL", "struct", free_ja3_fingerprint_label);
-
- return 0;
-}
diff --git a/test/ssl_test_plug.cpp b/test/ssl_test_plug.cpp
index 9a1d27a..b7b09c7 100644
--- a/test/ssl_test_plug.cpp
+++ b/test/ssl_test_plug.cpp
@@ -106,9 +106,9 @@ extern "C" unsigned char SSL_TEST_PLUG_ENTRY(stSessionInfo *session_info, void *
}
break;
case SSL_SERVER_HELLO:
- if (a_ssl->shello->ja3s.fingerprint_md5 != NULL && a_ssl->shello->ja3s.fingerprint_md5_len > 0)
+ if (a_ssl->shello->ja3s.md5 != NULL && a_ssl->shello->ja3s.md5_len > 0)
{
- cJSON_AddStringToObject(ctx, "ssl_ja3s_hash", a_ssl->shello->ja3s.fingerprint_md5);
+ cJSON_AddStringToObject(ctx, "ssl_ja3s_hash", a_ssl->shello->ja3s.md5);
}
break;
case SSL_CERTIFICATE_DETAIL: