fuzzing.c 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320
  1. #include <assert.h>
  2. #include <stdint.h>
  3. #include <stdlib.h>
  4. #include <string.h>
  5. #include "defines.h"
  6. #include "fuzzing.h"
  7. #include "common/utils.h"
  8. #include "tcpedit/tcpedit.h"
  9. static unsigned int fuzz_seed;
  10. static unsigned int fuzz_factor;
  11. static unsigned int fuzz_running;
  12. void
  13. fuzzing_init(uint32_t _fuzz_seed, uint32_t _fuzz_factor)
  14. {
  15. assert(_fuzz_factor);
  16. fuzz_seed = _fuzz_seed;
  17. fuzz_factor = _fuzz_factor;
  18. fuzz_running = 1;
  19. }
  20. #define SGT_MAX_SIZE 16
  21. static inline int
  22. fuzz_get_sgt_size(uint32_t r, uint32_t caplen)
  23. {
  24. if (0 == caplen)
  25. return 0;
  26. if (caplen <= SGT_MAX_SIZE)
  27. /* packet too small, fuzzing only one byte */
  28. return 1;
  29. /* return random value between 1 and SGT_MAX_SIZE */
  30. return (1 + (r % (SGT_MAX_SIZE - 1)));
  31. }
  32. static inline int
  33. fuzz_reduce_packet_size(tcpedit_t *tcpedit, struct pcap_pkthdr *pkthdr,
  34. uint32_t new_len)
  35. {
  36. if (pkthdr->len < pkthdr->caplen) {
  37. tcpedit_seterr(tcpedit, "Packet length %u smaller than capture length %u",
  38. pkthdr->len, pkthdr->caplen);
  39. return -1;
  40. }
  41. if (new_len > pkthdr->caplen) {
  42. tcpedit_seterr(tcpedit, "Cannot fuzz packet of capture length %u to length %u",
  43. pkthdr->caplen, new_len);
  44. return -1;
  45. }
  46. if (new_len == pkthdr->caplen) {
  47. return 0;
  48. }
  49. pkthdr->len = new_len;
  50. pkthdr->caplen = pkthdr->len;
  51. /* do not fix lengths in ip/tcp/udp layers.
  52. * fixlen option already does so, and can be called with fuzzing option. */
  53. return 1;
  54. }
  55. int
  56. fuzzing(tcpedit_t *tcpedit, struct pcap_pkthdr *pkthdr,
  57. u_char **pktdata)
  58. {
  59. int chksum_update_required = 0;
  60. uint32_t r, s;
  61. uint16_t l2proto;
  62. uint8_t l4proto;
  63. u_char *packet, *l3data, *l4data, *end_ptr;
  64. tcpeditdlt_plugin_t *plugin;
  65. int l2len, l4len;
  66. tcpeditdlt_t *ctx;
  67. assert(tcpedit);
  68. assert(pkthdr);
  69. assert(*pktdata);
  70. if (!fuzz_running)
  71. goto done;
  72. assert(fuzz_factor);
  73. /*
  74. * Determine if this is one of the packets that is going to be altered.
  75. * No fuzzing for the other 7 out of 8 packets
  76. */
  77. r = tcpr_random(&fuzz_seed);
  78. if ((r % fuzz_factor) != 0)
  79. goto done;
  80. /* initializations */
  81. ctx = tcpedit->dlt_ctx;
  82. packet = *pktdata;
  83. end_ptr = packet + pkthdr->caplen;
  84. plugin = tcpedit->dlt_ctx->encoder;
  85. l2len = plugin->plugin_l2len(ctx, packet, pkthdr->caplen);
  86. l2proto = ntohs(plugin->plugin_proto(ctx, packet, pkthdr->caplen));
  87. if (l2len == -1 || (int)pkthdr->caplen < l2len)
  88. goto done;
  89. /*
  90. * Get a pointer to the network layer
  91. *
  92. * Note that this pointer may be in a working buffer and not on directly
  93. * to '*pktdata'. All alterations are done in this buffer, which later
  94. * will be copied back to '*pktdata', if necessary
  95. */
  96. l3data = plugin->plugin_get_layer3(ctx, packet, pkthdr->caplen);
  97. if (!l3data)
  98. goto done;
  99. switch (l2proto) {
  100. case (ETHERTYPE_IP):
  101. {
  102. l4data = get_layer4_v4((ipv4_hdr_t*)(packet + l2len), end_ptr);
  103. if (!l4data)
  104. goto done;
  105. l4len = l4data - packet;
  106. l4proto = ((ipv4_hdr_t *)l3data)->ip_p;
  107. break;
  108. }
  109. case (ETHERTYPE_IP6): {
  110. l4data = get_layer4_v6((ipv6_hdr_t*)(packet + l2len), end_ptr);
  111. if (!l4data)
  112. goto done;
  113. l4len = l4data - packet;
  114. l4proto = ((ipv6_hdr_t *)l3data)->ip_nh;
  115. break;
  116. }
  117. default:
  118. /* apply fuzzing on unknown packet types */
  119. l4len = pkthdr->caplen - l2len;
  120. l4data = packet + l2len;
  121. l4proto = IPPROTO_RAW;
  122. }
  123. /* adjust payload length based on layer 3 protocol */
  124. switch (l4proto) {
  125. case IPPROTO_TCP:
  126. l4len -= sizeof(tcp_hdr_t);
  127. l4data += sizeof(tcp_hdr_t);
  128. break;
  129. case IPPROTO_UDP:
  130. l4len -= sizeof(udp_hdr_t);
  131. l4data += sizeof(udp_hdr_t);
  132. break;
  133. }
  134. if (l4len <= 1 || l4data > end_ptr)
  135. goto done;
  136. /* add some additional randomization */
  137. r ^= r >> 16;
  138. s = r % FUZZING_TOTAL_ACTION_NUMBER;
  139. switch (s) {
  140. case FUZZING_DROP_PACKET:
  141. {
  142. /* simulate dropping the packet */
  143. if (fuzz_reduce_packet_size(tcpedit, pkthdr, 0) < 0)
  144. /* could not change packet size, so packet left unchanged */
  145. goto done;
  146. break;
  147. }
  148. case FUZZING_REDUCE_SIZE:
  149. {
  150. /* reduce packet size */
  151. uint32_t new_len = (r % (l4len - 1)) + 1;
  152. if (fuzz_reduce_packet_size(tcpedit, pkthdr, new_len) < 0)
  153. /* could not change packet size, so packet left unchanged */
  154. goto done;
  155. chksum_update_required = 1;
  156. break;
  157. }
  158. case FUZZING_CHANGE_START_ZERO:
  159. {
  160. /* fuzz random-size segment at the beginning of the packet with 0x00 */
  161. uint32_t sgt_size = fuzz_get_sgt_size(r, l4len);
  162. memset(l4data, 0x00, sgt_size);
  163. chksum_update_required = 1;
  164. break;
  165. }
  166. case FUZZING_CHANGE_START_RANDOM:
  167. {
  168. /*
  169. * fuzz random-size segment at the beginning of the packet payload
  170. * with random bytes
  171. */
  172. size_t i;
  173. uint32_t sgt_size = fuzz_get_sgt_size(r, l4len);
  174. if (!sgt_size)
  175. goto done;
  176. for (i = 0; i < sgt_size; i++)
  177. l4data[i] = l4data[i] ^ (u_char)(r >> 4);
  178. chksum_update_required = 1;
  179. break;
  180. }
  181. case FUZZING_CHANGE_START_FF:
  182. {
  183. /*
  184. * fuzz random-size segment at the beginning of the packet
  185. * payload with 0xff
  186. */
  187. uint32_t sgt_size = fuzz_get_sgt_size(r, l4len);
  188. if (!sgt_size)
  189. goto done;
  190. memset(l4data, 0xff, sgt_size);
  191. chksum_update_required = 1;
  192. break;
  193. }
  194. case FUZZING_CHANGE_MID_ZERO:
  195. {
  196. /* fuzz random-size segment inside the packet payload with 0x00 */
  197. if (l4len <= 2)
  198. goto done;
  199. uint32_t offset = ((r >> 16) % (l4len - 1)) + 1;
  200. uint32_t sgt_size = fuzz_get_sgt_size(r, l4len - offset);
  201. if (!sgt_size)
  202. goto done;
  203. memset(l4data + offset, 0x00, sgt_size);
  204. chksum_update_required = 1;
  205. break;
  206. }
  207. case FUZZING_CHANGE_MID_FF:
  208. {
  209. /* fuzz random-size segment inside the packet payload with 0xff */
  210. if (l4len <= 2)
  211. goto done;
  212. uint32_t offset = ((r >> 16) % (l4len - 1)) + 1;
  213. uint32_t sgt_size = fuzz_get_sgt_size(r, l4len - offset);
  214. if (!sgt_size)
  215. goto done;
  216. memset(l4data + offset, 0xff, sgt_size);
  217. chksum_update_required = 1;
  218. break;
  219. }
  220. case FUZZING_CHANGE_END_ZERO:
  221. {
  222. /* fuzz random-sized segment at the end of the packet payload with 0x00 */
  223. int sgt_size = fuzz_get_sgt_size(r, l4len);
  224. if (!sgt_size || sgt_size > l4len)
  225. goto done;
  226. memset(l4data + l4len - sgt_size, 0x00, sgt_size);
  227. chksum_update_required = 1;
  228. break;
  229. }
  230. case FUZZING_CHANGE_END_RANDOM:
  231. {
  232. /* fuzz random-sized segment at the end of the packet with random Bytes */
  233. int i;
  234. int sgt_size = fuzz_get_sgt_size(r, l4len);
  235. if (!sgt_size || sgt_size > l4len)
  236. goto done;
  237. for (i = (l4len - sgt_size); i < l4len; i++)
  238. l4data[i] = l4data[i] ^ (u_char)(r >> 4);
  239. chksum_update_required = 1;
  240. break;
  241. }
  242. case FUZZING_CHANGE_END_FF:
  243. {
  244. /* fuzz random-sized segment at the end of the packet with 0xff00 */
  245. int sgt_size = fuzz_get_sgt_size(r, l4len);
  246. if (!sgt_size || sgt_size > l4len)
  247. goto done;
  248. memset(l4data + l4len - sgt_size, 0xff, sgt_size);
  249. chksum_update_required = 1;
  250. break;
  251. }
  252. case FUZZING_CHANGE_MID_RANDOM:
  253. {
  254. /* fuzz random-size segment inside the packet with random Bytes */
  255. size_t i;
  256. uint32_t offset = ((r >> 16) % (l4len - 1)) + 1;
  257. int sgt_size = fuzz_get_sgt_size(r, l4len - offset);
  258. if (!sgt_size || sgt_size > l4len)
  259. goto done;
  260. for (i = offset; i < offset + sgt_size; i++)
  261. l4data[i] = l4data[i] ^ (u_char)(r >> 4);
  262. chksum_update_required = 1;
  263. break;
  264. }
  265. default:
  266. assert(false);
  267. }
  268. dbgx(3, "packet %llu fuzzed : %d", tcpedit->runtime.packetnum, s);
  269. done:
  270. return chksum_update_required;
  271. }