123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288 |
- // MITMEngine (monster-in-the-middle engine) is a library for detecting HTTPS
- // interception from the server's vantage point, and is based on heuristics
- // developed in https://zakird.com/papers/https_interception.pdf.
- package mitmengine
- import (
- "bufio"
- "bytes"
- "errors"
- "fmt"
- "io"
- "io/ioutil"
- "log"
- "os"
- "strings"
- "github.com/cloudflare/mitmengine/db"
- fp "github.com/cloudflare/mitmengine/fputil"
- "github.com/cloudflare/mitmengine/loader"
- )
- var (
- // ErrorUnknownUserAgent indicates that the user agent is not supported.
- ErrorUnknownUserAgent = errors.New("unknown_user_agent")
- )
- // A Processor generates heuristic-based monster-in-the-middle (MITM) detection
- // reports for a TLS client hello and corresponding HTTP user agent.
- type Processor struct {
- FileNameMap map[string]string
- BrowserDatabase db.Database
- MitmDatabase db.Database
- BadHeaderSet fp.StringSet
- }
- // A Config contains information for initializing the processor such as the
- // file names to read records from, as well as Loader information in the case
- // the fingerprints are read from any datasource.
- type Config struct {
- BrowserFileName string
- MitmFileName string
- BadHeaderFileName string
- Loader loader.Loader
- }
- // NewProcessor returns a new Processor initialized from the config.
- func NewProcessor(config *Config) (Processor, error) {
- var a Processor
- err := a.Load(config)
- return a, err
- }
- // Load (or reload) the processor state from the provided configuration.
- func (a *Processor) Load(config *Config) error {
- browserFingerprints, err := LoadFile(config.BrowserFileName, config.Loader)
- if err != nil {
- log.Printf("WARNING: loading file \"%s\" produced error \"%s\"", config.BrowserFileName, err)
- browserFingerprints = ioutil.NopCloser(bytes.NewReader(nil))
- }
- if a.BrowserDatabase, err = db.NewDatabase(browserFingerprints); err != nil {
- return err
- }
- browserFingerprints.Close()
- mitmFingerprints, err := LoadFile(config.MitmFileName, config.Loader)
- if err != nil {
- log.Printf("WARNING: loading file \"%s\" produced error \"%s\"", config.MitmFileName, err)
- mitmFingerprints = ioutil.NopCloser(bytes.NewReader(nil))
- }
- if a.MitmDatabase, err = db.NewDatabase(mitmFingerprints); err != nil {
- return err
- }
- mitmFingerprints.Close()
- badHeaders, err := LoadFile(config.BadHeaderFileName, config.Loader)
- if err != nil {
- log.Printf("WARNING: loading file \"%s\" produced error \"%s\"", config.BadHeaderFileName, err)
- badHeaders = ioutil.NopCloser(bytes.NewReader(nil))
- }
- scanner := bufio.NewScanner(badHeaders)
- var badHeaderList fp.StringList
- for scanner.Scan() {
- badHeaderList = append(badHeaderList, scanner.Text())
- }
- a.BadHeaderSet = badHeaderList.Set()
- badHeaders.Close()
- return nil
- }
- // LoadFile loads individual files from local file storage or from a Loader interface.
- func LoadFile(fileName string, dbReader loader.Loader) (io.ReadCloser, error) {
- var file io.ReadCloser
- var readErr error
- if dbReader == nil { // read directly from file
- file, readErr = os.Open(fileName)
- } else {
- file, readErr = dbReader.LoadFile(fileName)
- }
- return file, readErr
- }
- // Check if the supplied client hello fields match the expected client hello
- // fields for the the brower specified by the supplied user agent, and return a
- // report including the mitm detection result, security details, and client
- // hello fingerprints.
- func (a *Processor) Check(uaFingerprint fp.UAFingerprint, rawUa string, actualReqFin fp.RequestFingerprint) Report {
- // Add user agent fingerprint quirks.
- if strings.Contains(rawUa, "Dragon/") {
- uaFingerprint.Quirk = append(uaFingerprint.Quirk, "dragon")
- }
- if strings.Contains(rawUa, "GSA/") {
- uaFingerprint.Quirk = append(uaFingerprint.Quirk, "gsa")
- }
- if strings.Contains(rawUa, "Silk-Accelerated=true") {
- uaFingerprint.Quirk = append(uaFingerprint.Quirk, "silk_accelerated")
- }
- if strings.Contains(rawUa, "PlayStation Vita") {
- uaFingerprint.Quirk = append(uaFingerprint.Quirk, "playstation")
- }
- // Remove grease ciphers, extensions, and curves from request fingerprint and add as quirk instead.
- hasGreaseCipher, newSize := removeGrease(actualReqFin.Cipher)
- actualReqFin.Cipher = actualReqFin.Cipher[:newSize] // Remove grease ciphers
- hasGreaseExtension, newSize := removeGrease(actualReqFin.Extension)
- actualReqFin.Extension = actualReqFin.Extension[:newSize] // Remove grease extensions
- hasGreaseCurve, newSize := removeGrease(actualReqFin.Curve)
- actualReqFin.Curve = actualReqFin.Curve[:newSize] // Remove grease curves
- if hasGreaseCipher || hasGreaseExtension || hasGreaseCurve {
- actualReqFin.Quirk = append(actualReqFin.Quirk, "grease")
- }
- // Check for 'bad' headers that browsers never send and add as quirk.
- hasBadHeader := false
- for _, elem := range actualReqFin.Header {
- if a.BadHeaderSet[elem] {
- hasBadHeader = true
- }
- }
- if hasBadHeader {
- actualReqFin.Quirk = append(actualReqFin.Quirk, "badhdr")
- }
- // Create mitm detection report
- var r Report
- // Find the browser record matching the user agent fingerprint
- browserRecordIds := a.BrowserDatabase.GetByUAFingerprint(uaFingerprint)
- if len(browserRecordIds) == 0 {
- return Report{Error: ErrorUnknownUserAgent}
- }
- var browserRecord db.Record
- var maxSimilarity int
- match := false
- for _, id := range browserRecordIds {
- tempRecord := a.BrowserDatabase.Records[id]
- recordMatch, similarity := tempRecord.RequestSignature.Match(actualReqFin)
- if recordMatch == fp.MatchPossible {
- match = true
- browserRecord = tempRecord
- break
- } else { // else, if similarity of unmatched record is greater than previously saved similarity, save record
- if similarity >= maxSimilarity {
- browserRecord = tempRecord
- maxSimilarity = similarity
- }
- }
- }
- browserReqSig := browserRecord.RequestSignature
- r.MatchedUASignature = browserRecord.UASignature.String()
- r.BrowserSignature = browserReqSig.String()
- r.BrowserGrade = browserReqSig.Grade()
- r.ActualGrade = actualReqFin.Version.Grade().Merge(fp.GlobalCipherCheck.Grade(actualReqFin.Cipher))
- // No need to add to the report if we have match.
- if match {
- r.BrowserSignatureMatch = fp.MatchPossible
- return r
- }
- // Find the heuristics that flagged the connection as invalid
- matchMap, _ := browserReqSig.MatchMap(actualReqFin)
- var reason []string
- var reasonDetails []string
- switch {
- case matchMap["version"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_version")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Version, actualReqFin.Version))
- case matchMap["cipher"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_cipher")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Cipher, actualReqFin.Cipher.String()))
- case matchMap["extension"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_extension")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Extension, actualReqFin.Extension.String()))
- case matchMap["curve"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_curve")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Curve, actualReqFin.Curve.String()))
- case matchMap["ecpointfmt"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_ecpointfmt")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.EcPointFmt, actualReqFin.EcPointFmt.String()))
- case matchMap["header"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_header")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Header, actualReqFin.Header))
- case matchMap["quirk"] == fp.MatchImpossible:
- r.BrowserSignatureMatch = fp.MatchImpossible
- reason = append(reason, "impossible_quirk")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Quirk, actualReqFin.Quirk))
- // put 'unlikely' reasons after 'impossible' reasons
- case matchMap["version"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_version")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Version, actualReqFin.Version))
- case matchMap["cipher"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_cipher")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Cipher, actualReqFin.Cipher.String()))
- case matchMap["extension"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_extension")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Extension, actualReqFin.Extension.String()))
- case matchMap["curve"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_curve")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Curve, actualReqFin.Curve.String()))
- case matchMap["ecpointfmt"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_ecpointfmt")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.EcPointFmt, actualReqFin.EcPointFmt.String()))
- case matchMap["header"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_header")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Header, actualReqFin.Header))
- case matchMap["quirk"] == fp.MatchUnlikely:
- r.BrowserSignatureMatch = fp.MatchUnlikely
- reason = append(reason, "unlikely_quirk")
- reasonDetails = append(reasonDetails, fmt.Sprintf("%s vs %s", browserReqSig.Quirk, actualReqFin.Quirk))
- default:
- r.BrowserSignatureMatch = fp.MatchPossible
- }
- r.Reason = strings.Join(reason, ",")
- r.ReasonDetails = strings.Join(reasonDetails, ",")
- // Check if MITM affects the connection security level
- switch r.BrowserSignatureMatch {
- case fp.MatchImpossible, fp.MatchUnlikely:
- if browserReqSig.IsPfs() && fp.GlobalCipherCheck.IsFirstPfs(actualReqFin.Cipher) {
- r.LosesPfs = true
- }
- mitmRecordIds := a.MitmDatabase.GetByRequestFingerprint(actualReqFin)
- if len(mitmRecordIds) == 0 {
- break
- }
- mitmRecord := a.MitmDatabase.Records[mitmRecordIds[0]]
- r.ActualGrade = r.ActualGrade.Merge(mitmRecord.MitmInfo.Grade)
- r.MatchedMitmName = mitmRecord.MitmInfo.NameList.String()
- r.MatchedMitmType = mitmRecord.MitmInfo.Type
- r.MatchedMitmSignature = mitmRecord.RequestSignature.String()
- }
- return r
- }
- func removeGrease(list fp.IntList) (bool, int) {
- hasGrease := false
- idx := 0
- for _, elem := range list {
- if (elem & 0x0f0f) == 0x0a0a {
- hasGrease = true
- } else {
- list[idx] = elem
- idx++
- }
- }
- return hasGrease, idx
- }
|