diff options
| author | fengweihao <[email protected]> | 2020-01-17 10:59:34 +0800 |
|---|---|---|
| committer | fengweihao <[email protected]> | 2020-01-17 10:59:34 +0800 |
| commit | 7740e213daf2e14857b70252ecdcd6ac08547ae9 (patch) | |
| tree | f3c8bc0f3725bc561e640347f542a29f622af772 /platform/src/verify_policy.cpp | |
| parent | 3308970cdc287399b9f32466409b1703a8e88bf7 (diff) | |
*初始化两个maat能命中版本
Diffstat (limited to 'platform/src/verify_policy.cpp')
| -rw-r--r-- | platform/src/verify_policy.cpp | 377 |
1 files changed, 261 insertions, 116 deletions
diff --git a/platform/src/verify_policy.cpp b/platform/src/verify_policy.cpp index b755bd5..589b6d7 100644 --- a/platform/src/verify_policy.cpp +++ b/platform/src/verify_policy.cpp @@ -17,31 +17,44 @@ #include <cjson/cJSON.h> #include <event2/buffer.h> +#include <sys/socket.h>//inet_addr +#include <netinet/in.h>//inet_addr +#include <arpa/inet.h>//inet_addr +#include <MESA/stream.h> + #include "verify_policy.h" #include "MESA_prof_load.h" #include "MESA_handle_logger.h" +#include "verify_policy_utils.h" #include "verify_policy_logging.h" struct verify_proxy * g_verify_proxy = NULL; struct keyword_obj { - enum scan_table condition_type; - char *condition_scope; - char *keyword; -}; + int protocol_field; + char *content_type; + char *content; + char *protocol_field_name; -struct verify_policy_query -{ - enum scan_table object_type; - int addr_type; + struct ipaddr *ip_addr; + int addr_type; + int protocol; char *clientIp1; unsigned int clientPort1; char *serverIp1; unsigned int serverPort1; - struct keyword_obj keywords[16]; + char *subscriberid; +}; + +struct verify_policy_query +{ + int c_num; + enum policy_type type; + char *policy_type_name; + struct keyword_obj keywords[32]; }; /* VERSION STRING */ @@ -74,150 +87,265 @@ static int verify_policy_init(struct verify_proxy * verify, const char *profile) return xret; } -enum scan_table verify_type_str2idx(const char *action_str) +enum policy_type policy_type_str2idx(const char *action_str) { - const char * table_name[__SCAN_TABLE_MAX]; - table_name[PXY_CTRL_IP] = "ip"; - table_name[PXY_CTRL_HTTP_URL] = "url"; - table_name[PXY_CTRL_HTTP_FQDN] = "fqdn"; - table_name[PXY_CTRL_HTTP_REQ_HDR] = "req_hdr"; - table_name[PXY_CTRL_HTTP_REQ_BODY] = "keywords"; - table_name[PXY_CTRL_HTTP_RES_HDR] = "res_hdr"; - table_name[PXY_CTRL_HTTP_RES_BODY] = "keywords"; - table_name[PXY_CTRL_SUBSCRIBE_ID] = "subscribeid"; + const char * policy_name[__SCAN_POLICY_MAX]; + policy_name[PXY_TABLE_SECURITY] = "tsg_security"; + policy_name[PXY_TABLE_MANIPULATION] = "proxy_manipulation"; + policy_name[PXY_TABLE_DEFENCE] = "active_defence"; size_t i = 0; - for (i = 0; i < sizeof(table_name) / sizeof(const char *); i++) + for (i = 0; i < sizeof(policy_name) / sizeof(const char *); i++) { - if (0 == strcasecmp(action_str, table_name[i])) + if (0 == strcasecmp(action_str, policy_name[i])) break; } - return (enum scan_table)i; + return (enum policy_type)i; } -struct verify_policy_query *get_query_from_request(const char *data) +int field_type_str2idx(enum policy_type type, const char *action_str) { - int c_num = 0, i = 0; - char buff[VERIFY_STRING_MAX], *p = NULL;; + const char * table_name[__SECURITY_TABLE_MAX] ={0}; - cJSON* data_json = cJSON_Parse(data); - if(data_json == NULL) + switch(type) { - mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "invalid policy parameter"); - return NULL; + case PXY_TABLE_MANIPULATION: + table_name[PXY_CTRL_IP] = "TSG_OBJ_IP_ADDR"; + table_name[PXY_CTRL_HTTP_URL] = "TSG_FIELD_HTTP_URL"; + table_name[PXY_CTRL_HTTP_FQDN] = "TSG_FIELD_HTTP_HOST"; + table_name[PXY_CTRL_HTTP_REQ_HDR] = "TSG_FIELD_HTTP_REQ_HDR"; + table_name[PXY_CTRL_HTTP_REQ_BODY] = "TSG_FIELD_HTTP_REQ_CONTENT"; + table_name[PXY_CTRL_HTTP_RES_HDR] = "TSG_FIELD_HTTP_RES_HDR"; + table_name[PXY_CTRL_HTTP_RES_BODY] = "TSG_FIELD_HTTP_RES_CONTENT"; + table_name[PXY_CTRL_SUBSCRIBE_ID] = "TSG_OBJ_SUBSCRIBER_ID"; + break; + case PXY_TABLE_SECURITY: + table_name[PXY_SECURITY_IP] = "TSG_OBJ_IP_ADDR"; + table_name[PXY_SECURITY_HTTP_URL] = "TSG_FIELD_HTTP_URL"; + table_name[PXY_SECURITY_HTTP_FQDN] = "TSG_FIELD_HTTP_HOST"; + table_name[PXY_SECURITY_HTTP_REQ_HDR] = "TSG_FIELD_HTTP_REQ_HDR"; + table_name[PXY_SECURITY_HTTP_REQ_BODY] = "TSG_FIELD_HTTP_REQ_CONTENT"; + table_name[PXY_SECURITY_HTTP_RES_HDR] = "TSG_FIELD_HTTP_RES_HDR"; + table_name[PXY_SECURITY_HTTP_RES_BODY] = "TSG_FIELD_HTTP_RES_CONTENT"; + table_name[PXY_SECURITY_SUBSCRIBE_ID] = "TSG_OBJ_SUBSCRIBER_ID"; + table_name[PXY_SECURITY_HTTPS_SNI] = "TSG_FIELD_SSL_SNI"; + table_name[PXY_SECURITY_HTTPS_CN] = "TSG_FIELD_SSL_CN"; + table_name[PXY_SECURITY_HTTPS_SAN] = "TSG_FIELD_SSL_SAN"; + table_name[PXY_SECURITY_DNS_QNAME] = "TSG_FIELD_DNS_QNAME"; + table_name[PXY_SECURITY_MAIL_ACCOUNT] = "TSG_FIELD_MAIL_ACCOUNT"; + table_name[PXY_SECURITY_FTP_URI] = "TSG_FIELD_MAIL_ACCOUNT"; + table_name[PXY_SECURITY_MAIL_ACCOUNT] = "TSG_FIELD_MAIL_ACCOUNT"; + table_name[PXY_SECURITY_MAIL_FROM] = "TSG_FIELD_MAIL_FROM"; + table_name[PXY_SECURITY_MAIL_TO] = "TSG_FIELD_MAIL_TO"; + table_name[PXY_SECURITY_MAIL_SUBJECT] = "TSG_FIELD_MAIL_SUBJECT"; + table_name[PXY_SECURITY_MAIL_CONTENT] = "TSG_FIELD_MAIL_CONTENT"; + table_name[PXY_SECURITY_MAIL_ATT_NAME] = "TSG_FIELD_MAIL_ATT_NAME"; + table_name[PXY_SECURITY_MAIL_ATT_CONTENT] = "TSG_FIELD_MAIL_ATT_CONTENT"; + table_name[PXY_SECURITY_FTP_URI] = "TSG_FIELD_FTP_URI"; + table_name[PXY_SECURITY_FTP_CONTENT] = "TSG_FIELD_FTP_CONTENT"; + table_name[PXY_SECURITY_FTP_ACCOUNT] = "TSG_FIELD_MAIL_ATT_NAME"; + break; + case PXY_TABLE_DEFENCE: + break; + default: + break; } - struct verify_policy_query *query_ctx = ALLOC(struct verify_policy_query, 1); + size_t i = 0; - cJSON* item = NULL, *subitem = NULL; - item = cJSON_GetObjectItem(data_json,"objectType"); - if(item && item->type==cJSON_String) - { - query_ctx->object_type =verify_type_str2idx(item->valuestring); - } - item=cJSON_GetObjectItem(data_json,"addrType"); - if(item && item->type==cJSON_Number) + for (i = 0; i < sizeof(table_name) / sizeof(const char *); i++) { - query_ctx->addr_type = item->valueint; + if (0 == strcasecmp(action_str, table_name[i])) + break; } - item = cJSON_GetObjectItem(data_json,"clientIp1"); - if(item && item->type==cJSON_String) + + return i; +} + +void verify_policy_query(struct verify_policy_query *policy_query, int thread_id, cJSON *data_obj) +{ + int i = 0; + char buff[VERIFY_STRING_MAX], *p = NULL;; + + void *ctx = pangu_http_ctx_new(thread_id); + + mesa_runtime_log(RLOG_LV_INFO, MODULE_NAME, "Query policy table is %s", policy_query->policy_type_name); + for (i = 0; i < policy_query->c_num; i++) { - query_ctx->clientIp1 =strdup(item->valuestring); + p = buff; + if(0 == strcasecmp(policy_query->keywords[i].content_type, "ip")) + { + http_scan(policy_query->keywords[i].content, policy_query->type, PXY_CTRL_IP, ctx, data_obj, policy_query->keywords[i].ip_addr); + } + else if(0 == strcasecmp(policy_query->keywords[i].content_type, "subscriberid")) + { + p += snprintf(p, sizeof(buff) - (p - buff), "contentType=%s, subscriberid=%s", policy_query->keywords[i].content_type, + policy_query->keywords[i].subscriberid); + http_scan(policy_query->keywords[i].content, policy_query->type, PXY_CTRL_SUBSCRIBE_ID, ctx, data_obj, NULL); + }else + { + p += snprintf(p, sizeof(buff) - (p - buff), "contentType=%s, protocolField=%s content=%s", policy_query->keywords[i].content_type, + policy_query->keywords[i].protocol_field_name, policy_query->keywords[i].content); + http_scan(policy_query->keywords[i].content, policy_query->type, policy_query->keywords[i].protocol_field, ctx, data_obj, NULL); + } + *p = '\0'; + mesa_runtime_log(RLOG_LV_DEBUG, MODULE_NAME, "%s", buff); } - item = cJSON_GetObjectItem(data_json,"serverIp1"); - if(item && item->type==cJSON_String) + + FREE(&ctx); + + return; +} + +struct ipaddr *ip_to_stream_addr(char *clientIp1, unsigned int clientPort1, char *serverIp1, unsigned int serverPort1, int addr_type) +{ + struct ipaddr *ip_addr = ALLOC(struct ipaddr, 1); + if(addr_type == 4) { - query_ctx->serverIp1 =strdup(item->valuestring); + struct stream_tuple4_v4 *v4_addr = ALLOC(struct stream_tuple4_v4, 1); + ip_addr->addrtype=ADDR_TYPE_IPV4; + inet_pton(AF_INET,clientIp1,&(v4_addr->saddr)); + v4_addr->source=htons(clientPort1); + inet_pton(AF_INET,serverIp1,&(v4_addr->daddr)); + v4_addr->dest=htons(serverPort1); + ip_addr->v4=v4_addr; } - item = cJSON_GetObjectItem(data_json,"clientPort1"); - if(item && item->type==cJSON_String) + if(addr_type == 6) { - query_ctx->clientPort1 =atoi(item->valuestring); + struct stream_tuple4_v6 *v6_addr = ALLOC(struct stream_tuple4_v6, 1); + ip_addr->addrtype=ADDR_TYPE_IPV6; + inet_pton(AF_INET6,clientIp1,&(v6_addr->saddr)); + v6_addr->source=htons(clientPort1); + inet_pton(AF_INET6,serverIp1,&(v6_addr->daddr)); + v6_addr->dest=htons(serverPort1); + ip_addr->v6=v6_addr; } - item = cJSON_GetObjectItem(data_json,"serverPort1"); - if(item && item->type==cJSON_String) + return ip_addr; +} + +cJSON *get_query_from_request(const char *data, int thread_id) +{ + int c_num = 0, i = 0; + + cJSON* data_json = cJSON_Parse(data); + if(data_json == NULL) { - query_ctx->serverPort1 =atoi(item->valuestring); + mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "invalid policy parameter"); + return NULL; } - p = buff; - p += snprintf(p, sizeof(buff) - (p - buff), "Query key objectType:%d, addrType:%d, clientIp1:%s, serverIp1:%s, clientPort1:%d, serverPort1:%d", - query_ctx->object_type, query_ctx->addr_type, query_ctx->clientIp1, query_ctx->serverIp1, query_ctx->clientPort1, query_ctx->serverPort1); - item = cJSON_GetObjectItem(data_json,"keywordObj"); + + cJSON *policy_obj=NULL, *data_obj=NULL; + policy_obj=cJSON_CreateObject(); + + cJSON_AddNumberToObject(policy_obj, "code", 200); + cJSON_AddStringToObject(policy_obj, "msg", "Success"); + cJSON_AddNumberToObject(policy_obj, "success", 1); + + data_obj = cJSON_CreateObject(); + cJSON_AddItemToObject(policy_obj, "data", data_obj); + + cJSON* item = NULL, *subitem = NULL, *subchild = NULL; + item = cJSON_GetObjectItem(data_json,"verifyList"); if(item && item->type==cJSON_Array) { c_num=cJSON_GetArraySize(item); for (subitem = item->child; subitem != NULL; subitem = subitem->next) { - item = cJSON_GetObjectItem(subitem, "conditionScope"); + struct verify_policy_query *query_ctx = ALLOC(struct verify_policy_query, 1); + + item = cJSON_GetObjectItem(subitem,"policyType"); if(item && item->type==cJSON_String) { - query_ctx->keywords[i].condition_scope =strdup(item->valuestring); - query_ctx->keywords[i].condition_type = verify_type_str2idx(item->valuestring); + query_ctx->type = policy_type_str2idx(item->valuestring); + query_ctx->policy_type_name = item->valuestring; } - item = cJSON_GetObjectItem(subitem, "keywords"); - if(item && item->type==cJSON_String) + item = cJSON_GetObjectItem(subitem,"verifyConditions"); + if(item && item->type==cJSON_Array) { - query_ctx->keywords[i].keyword =strdup(item->valuestring); + query_ctx->c_num=c_num=cJSON_GetArraySize(item); + for (subchild = item->child; subchild != NULL; subchild = subchild->next) + { + item = cJSON_GetObjectItem(subchild, "contentType"); + if(item && item->type==cJSON_String) + { + query_ctx->keywords[i].content_type = item->valuestring; + } + if(0 == strcasecmp(query_ctx->keywords[i].content_type, "subscriberid")) + { + item = cJSON_GetObjectItem(subchild,"subscriberid"); + if(item && item->type==cJSON_String) + { + query_ctx->keywords[i].subscriberid = item->valuestring; + } + i++; + continue; + } + if(0 == strcasecmp(query_ctx->keywords[i].content_type, "ip")) + { + int addr_type=0, protocol=0; + char *clientIp1=NULL,*serverIp1=NULL; + unsigned int clientPort1=0,serverPort1=0; + item = cJSON_GetObjectItem(subchild,"clientIp"); + if(item && item->type==cJSON_String) + { + clientIp1 = item->valuestring; + } + item = cJSON_GetObjectItem(subchild,"serverIp"); + if(item && item->type==cJSON_String) + { + serverIp1 = (item->valuestring); + } + item = cJSON_GetObjectItem(subchild,"clientPort"); + if(item && item->type==cJSON_String) + { + clientPort1 =atoi(item->valuestring); + } + item = cJSON_GetObjectItem(subchild,"serverPort"); + if(item && item->type==cJSON_String) + { + serverPort1 =atoi(item->valuestring); + } + item = cJSON_GetObjectItem(subchild,"protocol"); + if(item && item->type==cJSON_Number) + { + protocol = item->valueint; + } + item=cJSON_GetObjectItem(subchild,"addrType"); + if(item && item->type==cJSON_Number) + { + addr_type = item->valueint; + } + + query_ctx->keywords[i].ip_addr = ip_to_stream_addr(clientIp1, clientPort1, serverIp1, serverPort1, addr_type); + i++; + continue; + } + item = cJSON_GetObjectItem(subchild, "protocolField"); + if(item && item->type==cJSON_String) + { + query_ctx->keywords[i].protocol_field = field_type_str2idx(query_ctx->type, item->valuestring); + query_ctx->keywords[i].protocol_field_name = item->valuestring; + } + item = cJSON_GetObjectItem(subchild, "content"); + if(item && item->type==cJSON_String) + { + query_ctx->keywords[i].content = item->valuestring; + } + i++; + } } - i++; - } - } - for (i = 0; i < c_num; i++) - { - p += snprintf(p, sizeof(buff) - (p - buff), ", conditionScope:%s, keywords:%s", query_ctx->keywords[i].condition_scope, query_ctx->keywords[i].keyword); - } - *p = '\0'; - mesa_runtime_log(RLOG_LV_DEBUG, MODULE_NAME, "%s", buff); - return query_ctx; -} - -char *verify_policy_scan(struct verify_policy_query *policy_query, int thread_id) -{ - int c_num = 0; char *policy_payload= NULL; - void * ctx = pangu_http_ctx_new(thread_id); - - for (c_num = 0; policy_query->keywords[c_num].keyword != NULL; c_num++) - { - struct keyword_obj *key_obj = &policy_query->keywords[c_num]; - if (key_obj->condition_scope == NULL) - key_obj->condition_type = policy_query->object_type; + verify_policy_query(query_ctx, thread_id, data_obj); - switch(key_obj->condition_type) - { - case PXY_CTRL_IP: - http_scan(key_obj->keyword, EV_HTTP_IP, NULL, 0, ctx); - break; - case PXY_CTRL_SUBSCRIBE_ID: - http_scan(key_obj->keyword, EV_HTTP_SUBSCRIBE_ID, NULL, 0, ctx); - case PXY_CTRL_HTTP_URL: - http_scan(key_obj->keyword, EV_HTTP_URL, NULL, 0, ctx); - break; - case PXY_CTRL_HTTP_FQDN: - http_scan(key_obj->keyword, EV_HTTP_FQDN, NULL, 0, ctx); - break; - case PXY_CTRL_HTTP_REQ_HDR: - http_scan(key_obj->keyword, EV_HTTP_REQ_HDR, NULL, 0, ctx); - break; - case PXY_CTRL_HTTP_RES_HDR: - http_scan(key_obj->keyword, EV_HTTP_RESP_HDR, NULL, 0, ctx); - break; - case PXY_CTRL_HTTP_REQ_BODY: - case PXY_CTRL_HTTP_RES_BODY: - http_scan(key_obj->keyword, EV_HTTP_CONTENT, NULL, 0, ctx); - break; - default: - break; + i=0; + FREE(&query_ctx); } } - policy_payload = web_json_table_add(ctx); - - return policy_payload; + cJSON_Delete(data_json); + return policy_obj; } -static int -evhttp_socket_send(struct evhttp_request *req, char *sendbuf) +static int evhttp_socket_send(struct evhttp_request *req, char *sendbuf) { struct evbuffer *evb = NULL; @@ -243,10 +371,9 @@ done: void evhttp_request_cb(struct evhttp_request *evh_req, void *arg) { - char *policy_payload= NULL; + char *policy_payload= NULL; cJSON *policy_obj; struct evbuffer * evbuf_body = NULL; char *input = NULL; ssize_t inputlen=0; - struct verify_policy_query *policy_query = NULL; struct verify_proxy_thread *thread_ctx = (struct verify_proxy_thread *)arg; @@ -261,7 +388,21 @@ void evhttp_request_cb(struct evhttp_request *evh_req, void *arg) mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Failed to get post data information."); goto error; } - policy_query = get_query_from_request(input); + + policy_obj = get_query_from_request(input, thread_ctx->id); + if(policy_obj == NULL) + { + goto error; + } + + policy_payload = cJSON_PrintUnformatted(policy_obj); + printf("%s\n", policy_payload); + evhttp_socket_send(evh_req, policy_payload); + + cJSON_Delete(policy_obj); + free(policy_payload); + + #if 0 if (policy_query == NULL) { mesa_runtime_log(RLOG_LV_FATAL, MODULE_NAME, "Data parsing failed."); @@ -275,6 +416,7 @@ void evhttp_request_cb(struct evhttp_request *evh_req, void *arg) evhttp_socket_send(evh_req, policy_payload); free(policy_payload); } + #endif goto finish; error: @@ -484,6 +626,9 @@ int main(int argc, char * argv[]) ret = pangu_policy_init(g_verify_proxy, main_profile); CHECK_OR_EXIT(ret == 0, "Failed at init panggu module, Exit."); + ret = security_policy_init(g_verify_proxy, main_profile); + CHECK_OR_EXIT(ret == 0, "Failed at init security module, Exit."); + ret = pangu_policy_work_thread_run(g_verify_proxy); return ret; |
