package sgfw import ( "fmt" "os" "os/user" "strconv" "strings" "sync" "syscall" "time" "github.com/godbus/dbus" "github.com/subgraph/fw-daemon/proc-coroner" ) func newPrompter(conn *dbus.Conn) *prompter { p := new(prompter) p.cond = sync.NewCond(&p.lock) p.dbusObj = conn.Object("com.subgraph.FirewallPrompt", "/com/subgraph/FirewallPrompt") p.policyMap = make(map[string]*Policy) go p.promptLoop() return p } type prompter struct { dbusObj dbus.BusObject lock sync.Mutex cond *sync.Cond policyMap map[string]*Policy policyQueue []*Policy } func (p *prompter) prompt(policy *Policy) { p.lock.Lock() defer p.lock.Unlock() _, ok := p.policyMap[policy.sandbox+"|"+policy.path] if ok { p.cond.Signal() return } p.policyMap[policy.sandbox+"|"+policy.path] = policy log.Debugf("Saving policy key:" + policy.sandbox + "|" + policy.path) p.policyQueue = append(p.policyQueue, policy) p.cond.Signal() } func (p *prompter) promptLoop() { // p.lock.Lock() for { p.processNextPacket() } } func (p *prompter) processNextPacket() bool { //fmt.Println("processNextPacket()") var pc pendingConnection = nil empty := true for { p.lock.Lock() pc, empty = p.nextConnection() p.lock.Unlock() if pc != nil { fmt.Println("GOT NON NIL") } //fmt.Println("XXX: processNextPacket() loop; empty = ", empty, " / pc = ", pc) if pc == nil && empty { return false } else if pc == nil { continue } else if pc != nil { break } } if pc.getPrompting() { log.Debugf("Skipping over already prompted connection") return false } pc.setPrompting(true) fmt.Println("processConnection") go p.processConnection(pc) return true } type PC2FDMapping struct { guid string inode uint64 fd int fdpath string prompter *prompter } var PC2FDMap = map[string]PC2FDMapping{} var PC2FDMapLock = &sync.Mutex{} var PC2FDMapRunning = false func monitorPromptFDs(pc pendingConnection) { guid := pc.getGUID() pid := pc.procInfo().Pid inode := pc.procInfo().Inode fd := pc.procInfo().FD prompter := pc.getPrompter() fmt.Printf("ADD TO MONITOR: %v | %v / %v / %v\n", pc.policy().application, guid, pid, fd) if pid == -1 || fd == -1 || prompter == nil { log.Warning("Unexpected error condition occurred while adding socket fd to monitor") return } PC2FDMapLock.Lock() defer PC2FDMapLock.Unlock() fdpath := fmt.Sprintf("/proc/%d/fd/%d", pid, fd) PC2FDMap[guid] = PC2FDMapping{guid: guid, inode: inode, fd: fd, fdpath: fdpath, prompter: prompter} return } func monitorPromptFDLoop() { fmt.Println("++++++++++= monitorPromptFDLoop()") for true { delete_guids := []string{} PC2FDMapLock.Lock() fmt.Println("++++ nentries = ", len(PC2FDMap)) for guid, fdmon := range PC2FDMap { fmt.Println("ENTRY:", fdmon) lsb, err := os.Stat(fdmon.fdpath) if err != nil { log.Warningf("Error looking up socket \"%s\": %v\n", fdmon.fdpath, err) delete_guids = append(delete_guids, guid) continue } sb, ok := lsb.Sys().(*syscall.Stat_t) if !ok { log.Warning("Not a syscall.Stat_t") delete_guids = append(delete_guids, guid) continue } inode := sb.Ino // fmt.Println("+++ INODE = ", inode) if inode != fdmon.inode { fmt.Printf("inode mismatch: %v vs %v\n", inode, fdmon.inode) delete_guids = append(delete_guids, guid) } } fmt.Println("guids to delete: ", delete_guids) saved_mappings := []PC2FDMapping{} for _, guid := range delete_guids { saved_mappings = append(saved_mappings, PC2FDMap[guid]) delete(PC2FDMap, guid) } PC2FDMapLock.Unlock() for _, mapping := range saved_mappings { call := mapping.prompter.dbusObj.Call("com.subgraph.FirewallPrompt.RemovePrompt", 0, mapping.guid) fmt.Println("DISPOSING CALL = ", call) prompter := mapping.prompter prompter.lock.Lock() for _, policy := range prompter.policyQueue { policy.lock.Lock() pcind := 0 for pcind < len(policy.pendingQueue) { if policy.pendingQueue[pcind].getGUID() == mapping.guid { fmt.Println("-------------- found guid to remove") policy.pendingQueue = append(policy.pendingQueue[:pcind], policy.pendingQueue[pcind+1:]...) } else { pcind++ } } policy.lock.Unlock() } prompter.lock.Unlock() } fmt.Println("++++++++++= monitorPromptFDLoop WAIT") time.Sleep(5 * time.Second) } } func (p *prompter) processConnection(pc pendingConnection) { var scope int32 var dres bool var rule string if !PC2FDMapRunning { PC2FDMapLock.Lock() if !PC2FDMapRunning { PC2FDMapRunning = true PC2FDMapLock.Unlock() go monitorPromptFDLoop() } else { PC2FDMapLock.Unlock() } } if pc.getPrompter() == nil { pc.setPrompter(p) } addr := pc.hostname() if addr == "" { addr = pc.dst().String() } policy := pc.policy() dststr := "" if pc.dst() != nil { dststr = pc.dst().String() } else { dststr = addr + " (via proxy resolver)" } monitorPromptFDs(pc) call := p.dbusObj.Call("com.subgraph.FirewallPrompt.RequestPromptAsync", 0, pc.getGUID(), policy.application, policy.icon, policy.path, addr, int32(pc.dstPort()), dststr, pc.src().String(), pc.proto(), int32(pc.procInfo().UID), int32(pc.procInfo().GID), uidToUser(pc.procInfo().UID), gidToGroup(pc.procInfo().GID), int32(pc.procInfo().Pid), pc.sandbox(), pc.socks(), pc.getTimestamp(), pc.getOptString(), FirewallConfig.PromptExpanded, FirewallConfig.PromptExpert, int32(FirewallConfig.DefaultActionID)) err := call.Store(&dres) if err != nil { log.Warningf("Error sending dbus async RequestPrompt message: %v", err) policy.removePending(pc) pc.drop() return } if !dres { fmt.Println("Unexpected: fw-prompt async RequestPrompt message returned:", dres) } return // the prompt sends: // ALLOW|dest or DENY|dest // // rule string needs to be: // VERB|dst|class|uid:gid|sandbox|[src] // sometimes there's a src // this needs to be re-visited toks := strings.Split(rule, "|") //verb := toks[0] //target := toks[1] sandbox := "" if len(toks) > 2 { sandbox = toks[2] } tempRule := fmt.Sprintf("%s|%s", toks[0], toks[1]) tempRule += "||-1:-1|" + sandbox + "|" if pc.src() != nil && !pc.src().IsLoopback() && sandbox != "" { //if !strings.HasSuffix(rule, "SYSTEM") && !strings.HasSuffix(rule, "||") { //rule += "||" //} //ule += "|||" + pc.src().String() // tempRule += "||-1:-1|" + sandbox + "|" + pc.src().String() tempRule += pc.src().String() } else { // tempRule += "||-1:-1|" + sandbox + "|" } r, err := policy.parseRule(tempRule, false) if err != nil { log.Warningf("Error parsing rule string returned from dbus RequestPrompt: %v", err) policy.removePending(pc) pc.drop() return } fscope := FilterScope(scope) if fscope == APPLY_SESSION { r.mode = RULE_MODE_SESSION } else if fscope == APPLY_PROCESS { r.mode = RULE_MODE_PROCESS r.pid = pc.procInfo().Pid pcoroner.MonitorProcess(r.pid) } if !policy.processNewRule(r, fscope) { p.lock.Lock() defer p.lock.Unlock() p.removePolicy(pc.policy()) } if fscope == APPLY_FOREVER { r.mode = RULE_MODE_PERMANENT policy.fw.saveRules() } log.Warningf("Prompt returning rule: %v", tempRule) dbusp.alertRule("sgfw prompt added new rule") } func (p *prompter) nextConnection() (pendingConnection, bool) { pind := 0 if len(p.policyQueue) == 0 { return nil, true } fmt.Println("policy queue len = ", len(p.policyQueue)) for pind < len(p.policyQueue) { fmt.Printf("policy loop %d of %d\n", pind, len(p.policyQueue)) //fmt.Printf("XXX: pind = %v of %v\n", pind, len(p.policyQueue)) policy := p.policyQueue[pind] pc, qempty := policy.nextPending() if pc == nil && qempty { p.removePolicy(policy) continue } else { pind++ pendingOnce := make([]PendingRule, 0) pendingOther := make([]PendingRule, 0) for _, r := range policy.rulesPending { if r.scope == int(APPLY_ONCE) { pendingOnce = append(pendingOnce, r) } else { pendingOther = append(pendingOther, r) } } fmt.Printf("# pending once = %d, other = %d, pc = %p / policy = %p\n", len(pendingOnce), len(pendingOther), pc, policy) policy.rulesPending = pendingOther // One time filters are all applied right here, at once. for _, pr := range pendingOnce { toks := strings.Split(pr.rule, "|") sandbox := "" if len(toks) > 2 { sandbox = toks[2] } tempRule := fmt.Sprintf("%s|%s", toks[0], toks[1]) tempRule += "||-1:-1|" + sandbox + "|" r, err := policy.parseRule(tempRule, false) if err != nil { log.Warningf("Error parsing rule string returned from dbus RequestPrompt: %v", err) continue } r.mode = RuleMode(pr.scope) fmt.Println("+++++++ processing one time rule: ", pr.rule) policy.processNewRuleOnce(r, pr.guid) } // if pc == nil && !qempty { if len(policy.rulesPending) > 0 { fmt.Println("non/once policy rules pending = ", len(policy.rulesPending)) prule := policy.rulesPending[0] policy.rulesPending = append(policy.rulesPending[:0], policy.rulesPending[1:]...) toks := strings.Split(prule.rule, "|") sandbox := "" if len(toks) > 2 { sandbox = toks[2] } tempRule := fmt.Sprintf("%s|%s", toks[0], toks[1]) tempRule += "||-1:-1|" + sandbox + "|" /*if pc.src() != nil && !pc.src().IsLoopback() && sandbox != "" { tempRule += "||-1:-1|" + sandbox + "|" + pc.src().String() } else { tempRule += "||-1:-1|" + sandbox + "|" }*/ r, err := policy.parseRule(tempRule, false) if err != nil { log.Warningf("Error parsing rule string returned from dbus RequestPrompt: %v", err) continue // policy.removePending(pc) // pc.drop() // return } else { fscope := FilterScope(prule.scope) if fscope == APPLY_SESSION { r.mode = RULE_MODE_SESSION } else if fscope == APPLY_PROCESS { r.mode = RULE_MODE_PROCESS /*r.pid = pc.procInfo().Pid pcoroner.MonitorProcess(r.pid)*/ } if !policy.processNewRule(r, fscope) { // p.lock.Lock() // defer p.lock.Unlock() // p.removePolicy(pc.policy()) } if fscope == APPLY_FOREVER { r.mode = RULE_MODE_PERMANENT policy.fw.saveRules() } log.Warningf("Prompt returning rule: %v", tempRule) dbusp.alertRule("sgfw prompt added new rule") } } if pc == nil && !qempty { // log.Errorf("FIX ME: I NEED TO SLEEP ON A WAKEABLE CONDITION PROPERLY!!") time.Sleep(time.Millisecond * 300) continue } if pc != nil && pc.getPrompting() { fmt.Println("SKIPPING PROMPTED") continue } return pc, qempty } } return nil, true } func (p *prompter) removePolicy(policy *Policy) { var newQueue []*Policy = nil // if DoMultiPrompt { if len(p.policyQueue) == 0 { log.Debugf("Skipping over zero length policy queue") newQueue = make([]*Policy, 0, 0) } // } // if !DoMultiPrompt || newQueue == nil { if newQueue == nil { newQueue = make([]*Policy, 0, len(p.policyQueue)-1) } for _, pol := range p.policyQueue { if pol != policy { newQueue = append(newQueue, pol) } } p.policyQueue = newQueue delete(p.policyMap, policy.sandbox+"|"+policy.path) } var userMap = make(map[int]string) var groupMap = make(map[int]string) var userMapLock = &sync.Mutex{} var groupMapLock = &sync.Mutex{} func lookupUser(uid int) string { if uid == -1 { return "[unknown]" } userMapLock.Lock() defer userMapLock.Unlock() u, err := user.LookupId(strconv.Itoa(uid)) if err != nil { return fmt.Sprintf("%d", uid) } return u.Username } func lookupGroup(gid int) string { if gid == -1 { return "[unknown]" } groupMapLock.Lock() defer groupMapLock.Unlock() g, err := user.LookupGroupId(strconv.Itoa(gid)) if err != nil { return fmt.Sprintf("%d", gid) } return g.Name } func uidToUser(uid int) string { uname, ok := userMap[uid] if ok { return uname } uname = lookupUser(uid) userMap[uid] = uname return uname } func gidToGroup(gid int) string { gname, ok := groupMap[gid] if ok { return gname } gname = lookupGroup(gid) groupMap[gid] = gname return gname }