mirror of https://github.com/subgraph/fw-daemon
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
993 lines
23 KiB
993 lines
23 KiB
package sgfw
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
|
|
// nfnetlink "github.com/subgraph/go-nfnetlink"
|
|
"github.com/google/gopacket/layers"
|
|
nfqueue "github.com/subgraph/go-nfnetlink/nfqueue"
|
|
"github.com/subgraph/go-procsnitch"
|
|
"net"
|
|
"os"
|
|
"syscall"
|
|
"time"
|
|
"unsafe"
|
|
)
|
|
|
|
var _interpreters = []string{
|
|
"python",
|
|
"ruby",
|
|
"bash",
|
|
}
|
|
|
|
type pendingConnection interface {
|
|
policy() *Policy
|
|
procInfo() *procsnitch.Info
|
|
hostname() string
|
|
getOptString() string
|
|
proto() string
|
|
src() net.IP
|
|
srcPort() uint16
|
|
dst() net.IP
|
|
dstPort() uint16
|
|
sandbox() string
|
|
socks() bool
|
|
accept()
|
|
acceptTLSOnly()
|
|
drop()
|
|
setPrompting(bool)
|
|
getPrompting() bool
|
|
setPrompter(*prompter)
|
|
getPrompter() *prompter
|
|
getGUID() string
|
|
getTimestamp() string
|
|
print() string
|
|
}
|
|
|
|
type pendingPkt struct {
|
|
pol *Policy
|
|
name string
|
|
pkt *nfqueue.NFQPacket
|
|
pinfo *procsnitch.Info
|
|
optstring string
|
|
prompting bool
|
|
prompter *prompter
|
|
guid string
|
|
timestamp time.Time
|
|
}
|
|
|
|
/* Not a *REAL* GUID */
|
|
func genGUID() string {
|
|
frnd, err := os.Open("/dev/urandom")
|
|
if err != nil {
|
|
log.Fatal("Error reading random data source:", err)
|
|
}
|
|
|
|
rndb := make([]byte, 16)
|
|
frnd.Read(rndb)
|
|
frnd.Close()
|
|
|
|
guid := fmt.Sprintf("%x-%x-%x-%x", rndb[0:4], rndb[4:8], rndb[8:12], rndb[12:])
|
|
return guid
|
|
}
|
|
|
|
func getEmptyPInfo() *procsnitch.Info {
|
|
pinfo := procsnitch.Info{}
|
|
pinfo.UID, pinfo.GID, pinfo.Pid, pinfo.ParentPid = -1, -1, -1, -1
|
|
pinfo.ExePath = "[unknown-exe]"
|
|
pinfo.CmdLine = "[unknown-cmdline]"
|
|
pinfo.FirstArg = "[unknown-arg]"
|
|
pinfo.ParentCmdLine = "[unknown-pcmdline]"
|
|
pinfo.ParentExePath = "[unknown-pexe]"
|
|
return &pinfo
|
|
}
|
|
|
|
func (pp *pendingPkt) sandbox() string {
|
|
return pp.pinfo.Sandbox
|
|
}
|
|
|
|
func (pp *pendingPkt) getTimestamp() string {
|
|
return pp.timestamp.Format("15:04:05.00")
|
|
}
|
|
|
|
func (pp *pendingPkt) socks() bool {
|
|
return false
|
|
}
|
|
|
|
func (pp *pendingPkt) policy() *Policy {
|
|
return pp.pol
|
|
}
|
|
|
|
func (pp *pendingPkt) procInfo() *procsnitch.Info {
|
|
if pp.pinfo == nil {
|
|
return getEmptyPInfo()
|
|
}
|
|
|
|
return pp.pinfo
|
|
}
|
|
|
|
func (pp *pendingPkt) getOptString() string {
|
|
return pp.optstring
|
|
}
|
|
|
|
func (pp *pendingPkt) hostname() string {
|
|
return pp.name
|
|
}
|
|
|
|
func (pp *pendingPkt) src() net.IP {
|
|
src, _ := getPacketIPAddrs(pp.pkt)
|
|
return src
|
|
}
|
|
|
|
func (pp *pendingPkt) dst() net.IP {
|
|
_, dst := getPacketIPAddrs(pp.pkt)
|
|
return dst
|
|
}
|
|
|
|
func getNFQProto(pkt *nfqueue.NFQPacket) string {
|
|
if pkt.Packet.Layer(layers.LayerTypeTCP) != nil {
|
|
return "tcp"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeUDP) != nil {
|
|
return "udp"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeICMPv4) != nil {
|
|
return "icmp"
|
|
}
|
|
|
|
return "[unknown]"
|
|
}
|
|
|
|
func (pp *pendingPkt) proto() string {
|
|
return getNFQProto(pp.pkt)
|
|
}
|
|
|
|
func (pp *pendingPkt) srcPort() uint16 {
|
|
srcp, _ := getPacketTCPPorts(pp.pkt)
|
|
return srcp
|
|
}
|
|
|
|
func (pp *pendingPkt) dstPort() uint16 {
|
|
if pp.proto() == "tcp" {
|
|
_, dstp := getPacketTCPPorts(pp.pkt)
|
|
return dstp
|
|
} else if pp.proto() == "udp" {
|
|
_, dstp := getPacketUDPPorts(pp.pkt)
|
|
return dstp
|
|
} else if pp.proto() == "icmp" {
|
|
code, _ := getpacketICMPCode(pp.pkt)
|
|
return uint16(code)
|
|
}
|
|
|
|
return 0
|
|
}
|
|
|
|
func (pp *pendingPkt) accept() {
|
|
pp.pkt.Accept()
|
|
}
|
|
|
|
func (pp *pendingPkt) acceptTLSOnly() {
|
|
// Not implemented
|
|
|
|
pp.pkt.SetMark(1)
|
|
pp.pkt.Accept()
|
|
}
|
|
|
|
func (pp *pendingPkt) drop() {
|
|
pp.pkt.SetMark(1)
|
|
pp.pkt.Accept()
|
|
}
|
|
|
|
func (pp *pendingPkt) setPrompter(val *prompter) {
|
|
pp.prompter = val
|
|
}
|
|
|
|
func (pp *pendingPkt) getPrompter() *prompter {
|
|
return pp.prompter
|
|
}
|
|
|
|
func (pp *pendingPkt) getGUID() string {
|
|
if pp.guid == "" {
|
|
pp.guid = genGUID()
|
|
}
|
|
|
|
return pp.guid
|
|
}
|
|
|
|
func (pp *pendingPkt) getPrompting() bool {
|
|
return pp.prompting
|
|
}
|
|
|
|
func (pp *pendingPkt) setPrompting(val bool) {
|
|
pp.prompting = val
|
|
}
|
|
|
|
func (pp *pendingPkt) print() string {
|
|
return printPacket(pp.pkt, pp.name, pp.pinfo)
|
|
}
|
|
|
|
type PendingRule struct {
|
|
rule string
|
|
scope int
|
|
policy string
|
|
guid string
|
|
}
|
|
|
|
type Policy struct {
|
|
fw *Firewall
|
|
path string
|
|
sandbox string
|
|
application string
|
|
icon string
|
|
rules RuleList
|
|
pendingQueue []pendingConnection
|
|
promptInProgress bool
|
|
lock sync.Mutex
|
|
rulesPending []PendingRule
|
|
}
|
|
|
|
func (fw *Firewall) PolicyForPath(path string) *Policy {
|
|
fw.lock.Lock()
|
|
defer fw.lock.Unlock()
|
|
|
|
return fw.policyForPath(path)
|
|
}
|
|
|
|
func (fw *Firewall) PolicyForPathAndSandbox(path string, sandbox string) *Policy {
|
|
fw.lock.Lock()
|
|
defer fw.lock.Unlock()
|
|
|
|
return fw.policyForPathAndSandbox(path, sandbox)
|
|
}
|
|
|
|
func (fw *Firewall) policyForPathAndSandbox(path string, sandbox string) *Policy {
|
|
policykey := sandbox + "|" + path
|
|
if _, ok := fw.policyMap[policykey]; !ok {
|
|
p := new(Policy)
|
|
p.fw = fw
|
|
p.path = path
|
|
p.application = path
|
|
p.sandbox = sandbox
|
|
entry := entryForPath(path)
|
|
if entry != nil {
|
|
p.application = entry.name
|
|
p.icon = entry.icon
|
|
}
|
|
fw.policyMap[policykey] = p
|
|
log.Infof("Creating new policy for path and sandbox: %s\n", policykey)
|
|
fw.policies = append(fw.policies, p)
|
|
}
|
|
return fw.policyMap[policykey]
|
|
}
|
|
|
|
func (fw *Firewall) policyForPath(path string) *Policy {
|
|
if _, ok := fw.policyMap[path]; !ok {
|
|
p := new(Policy)
|
|
p.fw = fw
|
|
p.path = path
|
|
p.application = path
|
|
entry := entryForPath(path)
|
|
if entry != nil {
|
|
p.application = entry.name
|
|
p.icon = entry.icon
|
|
}
|
|
fw.policyMap[path] = p
|
|
fw.policies = append(fw.policies, p)
|
|
}
|
|
return fw.policyMap[path]
|
|
}
|
|
|
|
func (p *Policy) processPacket(pkt *nfqueue.NFQPacket, timestamp time.Time, pinfo *procsnitch.Info, optstr string) {
|
|
fmt.Println("policy processPacket() running against packet...")
|
|
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
dstb := pkt.Packet.NetworkLayer().NetworkFlow().Dst().Raw()
|
|
dstip := net.IP(dstb)
|
|
srcip := net.IP(pkt.Packet.NetworkLayer().NetworkFlow().Src().Raw())
|
|
|
|
/* Can we pass this through quickly? */
|
|
/* this probably isn't a performance enhancement. */
|
|
/*_, dstp := getPacketPorts(pkt)
|
|
fres := p.rules.filter(pkt, srcip, dstip, dstp, dstip.String(), pinfo, optstr)
|
|
if fres == FILTER_ALLOW {
|
|
fmt.Printf("Packet passed wildcard rules without requiring DNS lookup; accepting: %s:%d\n", dstip, dstp)
|
|
pkt.Accept()
|
|
return
|
|
}*/
|
|
|
|
name := p.fw.dns.Lookup(dstip, pinfo.Pid)
|
|
|
|
if !FirewallConfig.LogRedact {
|
|
log.Infof("Lookup(%s): %s", dstip.String(), name)
|
|
} else {
|
|
dbLogger.logRedacted("default", fmt.Sprintf("Lookup(%s): %s", dstip.String(), name))
|
|
}
|
|
|
|
result := p.rules.filterPacket(pkt, pinfo, srcip, name, optstr)
|
|
switch result {
|
|
case FILTER_DENY:
|
|
pkt.SetMark(1)
|
|
pkt.Accept()
|
|
case FILTER_ALLOW:
|
|
pkt.Accept()
|
|
case FILTER_PROMPT:
|
|
p.processPromptResult(&pendingPkt{pol: p, name: name, pkt: pkt, pinfo: pinfo, optstring: optstr, prompter: nil, timestamp: timestamp, prompting: false})
|
|
default:
|
|
log.Warningf("Unexpected filter result: %d", result)
|
|
}
|
|
}
|
|
|
|
func (p *Policy) processPromptResult(pc pendingConnection) {
|
|
p.pendingQueue = append(p.pendingQueue, pc)
|
|
p.promptInProgress = true
|
|
go p.fw.dbus.prompter.prompt(p)
|
|
}
|
|
|
|
func (p *Policy) nextPending() (pendingConnection, bool) {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
|
|
if len(p.pendingQueue) == 0 {
|
|
return nil, true
|
|
}
|
|
|
|
for i := 0; i < len(p.pendingQueue); i++ {
|
|
// fmt.Printf("XXX: pendingQueue %v of %v: %v\n", i, len(p.pendingQueue), p.pendingQueue[i])
|
|
if !p.pendingQueue[i].getPrompting() {
|
|
return p.pendingQueue[i], false
|
|
}
|
|
}
|
|
|
|
return nil, false
|
|
}
|
|
|
|
func (p *Policy) removePending(pc pendingConnection) {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
|
|
remaining := []pendingConnection{}
|
|
for _, c := range p.pendingQueue {
|
|
if c != pc {
|
|
remaining = append(remaining, c)
|
|
}
|
|
}
|
|
if len(remaining) != len(p.pendingQueue) {
|
|
p.pendingQueue = remaining
|
|
}
|
|
}
|
|
|
|
func (p *Policy) processNewRuleOnce(r *Rule, guid string) bool {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
|
|
fmt.Println("----------------------- processNewRule() ONCE")
|
|
p.filterPendingOne(r, guid)
|
|
return true
|
|
}
|
|
|
|
func (p *Policy) processNewRule(r *Rule, scope FilterScope) bool {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
|
|
if scope != APPLY_ONCE {
|
|
p.rules = append(p.rules, r)
|
|
}
|
|
fmt.Println("----------------------- processNewRule()")
|
|
p.filterPending(r)
|
|
if len(p.pendingQueue) == 0 {
|
|
p.promptInProgress = false
|
|
}
|
|
|
|
return p.promptInProgress
|
|
}
|
|
|
|
func (p *Policy) parseRule(s string, add bool) (*Rule, error) {
|
|
//log.Noticef("XXX: attempt to parse rule: |%s|\n", s)
|
|
r := new(Rule)
|
|
r.pid = -1
|
|
r.mode = RULE_MODE_PERMANENT
|
|
r.policy = p
|
|
if !r.parse(s) {
|
|
return nil, parseError(s)
|
|
}
|
|
if add {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
p.rules = append(p.rules, r)
|
|
}
|
|
p.fw.addRule(r)
|
|
return r, nil
|
|
}
|
|
|
|
func (p *Policy) removeRule(r *Rule) {
|
|
p.lock.Lock()
|
|
defer p.lock.Unlock()
|
|
|
|
var newRules RuleList
|
|
for _, rr := range p.rules {
|
|
if rr.id != r.id {
|
|
newRules = append(newRules, rr)
|
|
}
|
|
}
|
|
p.rules = newRules
|
|
}
|
|
|
|
func (p *Policy) filterPendingOne(rule *Rule, guid string) {
|
|
remaining := []pendingConnection{}
|
|
|
|
for _, pc := range p.pendingQueue {
|
|
if guid != "" && guid != pc.getGUID() {
|
|
continue
|
|
}
|
|
|
|
if rule.match(pc.src(), pc.dst(), pc.dstPort(), pc.hostname(), pc.proto(), pc.procInfo().UID, pc.procInfo().GID, uidToUser(pc.procInfo().UID), gidToGroup(pc.procInfo().GID), pc.procInfo().Sandbox) {
|
|
prompter := pc.getPrompter()
|
|
|
|
if prompter == nil {
|
|
fmt.Println("-------- prompter = NULL")
|
|
} else {
|
|
call := prompter.dbusObj.Call("com.subgraph.FirewallPrompt.RemovePrompt", 0, pc.getGUID())
|
|
fmt.Println("CAAAAAAAAAAAAAAALL = ", call)
|
|
}
|
|
|
|
log.Infof("Adding rule for: %s", rule.getString(FirewallConfig.LogRedact))
|
|
if FirewallConfig.LogRedact {
|
|
dbLogger.logRedacted("default", fmt.Sprintf("Adding rule for: %s", rule.getString(false)))
|
|
}
|
|
// log.Noticef("%s > %s", rule.getString(FirewallConfig.LogRedact), pc.print())
|
|
if rule.rtype == RULE_ACTION_ALLOW {
|
|
pc.accept()
|
|
} else if rule.rtype == RULE_ACTION_ALLOW_TLSONLY {
|
|
pc.acceptTLSOnly()
|
|
} else {
|
|
srcs := pc.src().String() + ":" + strconv.Itoa(int(pc.srcPort()))
|
|
log.Warningf("DENIED outgoing connection attempt by %s from %s %s -> %s:%d (user prompt) %v",
|
|
pc.procInfo().ExePath, pc.proto(), srcs, pc.dst(), pc.dstPort, rule.rtype)
|
|
pc.drop()
|
|
}
|
|
|
|
// XXX: If matching a GUID, we can break out immediately
|
|
} else {
|
|
remaining = append(remaining, pc)
|
|
}
|
|
}
|
|
if len(remaining) != len(p.pendingQueue) {
|
|
p.pendingQueue = remaining
|
|
}
|
|
}
|
|
|
|
func (p *Policy) filterPending(rule *Rule) {
|
|
remaining := []pendingConnection{}
|
|
for _, pc := range p.pendingQueue {
|
|
if rule.match(pc.src(), pc.dst(), pc.dstPort(), pc.hostname(), pc.proto(), pc.procInfo().UID, pc.procInfo().GID, uidToUser(pc.procInfo().UID), gidToGroup(pc.procInfo().GID), pc.procInfo().Sandbox) {
|
|
prompter := pc.getPrompter()
|
|
|
|
if prompter == nil {
|
|
fmt.Println("-------- prompter = NULL")
|
|
} else {
|
|
call := prompter.dbusObj.Call("com.subgraph.FirewallPrompt.RemovePrompt", 0, pc.getGUID())
|
|
fmt.Println("CAAAAAAAAAAAAAAALL = ", call)
|
|
}
|
|
|
|
log.Infof("Adding rule for: %s", rule.getString(FirewallConfig.LogRedact))
|
|
if FirewallConfig.LogRedact {
|
|
dbLogger.logRedacted("default", fmt.Sprintf("Adding rule for: %s", rule.getString(false)))
|
|
}
|
|
// log.Noticef("%s > %s", rule.getString(FirewallConfig.LogRedact), pc.print())
|
|
if rule.rtype == RULE_ACTION_ALLOW {
|
|
pc.accept()
|
|
} else if rule.rtype == RULE_ACTION_ALLOW_TLSONLY {
|
|
pc.acceptTLSOnly()
|
|
} else {
|
|
srcs := pc.src().String() + ":" + strconv.Itoa(int(pc.srcPort()))
|
|
dests := STR_REDACTED
|
|
if !FirewallConfig.LogRedact {
|
|
dests = fmt.Sprintf("%s%d", pc.dst(), pc.dstPort)
|
|
} else {
|
|
dbLogger.logRedacted("default",
|
|
fmt.Sprintf("DENIED outgoing connection attempt by %s from %s %s -> %s:%d (user prompt) %v",
|
|
pc.procInfo().ExePath, pc.proto(), srcs, pc.dst(), pc.dstPort, rule.rtype))
|
|
}
|
|
|
|
log.Warningf("DENIED outgoing connection attempt by %s from %s %s -> %s (user prompt) %v",
|
|
pc.procInfo().ExePath, pc.proto(), srcs, dests, rule.rtype)
|
|
pc.drop()
|
|
}
|
|
} else {
|
|
remaining = append(remaining, pc)
|
|
}
|
|
}
|
|
if len(remaining) != len(p.pendingQueue) {
|
|
p.pendingQueue = remaining
|
|
}
|
|
}
|
|
|
|
func (p *Policy) hasPersistentRules() bool {
|
|
for _, r := range p.rules {
|
|
if r.mode != RULE_MODE_SESSION {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func printPacket(pkt *nfqueue.NFQPacket, hostname string, pinfo *procsnitch.Info) string {
|
|
proto := "???"
|
|
SrcPort, DstPort := uint16(0), uint16(0)
|
|
SrcIp, DstIp := getPacketIPAddrs(pkt)
|
|
code := 0
|
|
codestr := ""
|
|
|
|
if pkt.Packet.Layer(layers.LayerTypeTCP) != nil {
|
|
proto = "TCP"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeUDP) != nil {
|
|
proto = "UDP"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeICMPv4) != nil {
|
|
proto = "ICMP"
|
|
}
|
|
|
|
if proto == "TCP" {
|
|
SrcPort, DstPort = getPacketTCPPorts(pkt)
|
|
} else if proto == "UDP" {
|
|
SrcPort, DstPort = getPacketUDPPorts(pkt)
|
|
} else if proto == "ICMP" {
|
|
code, codestr = getpacketICMPCode(pkt)
|
|
}
|
|
|
|
if FirewallConfig.LogRedact {
|
|
hostname = STR_REDACTED
|
|
}
|
|
name := hostname
|
|
if name == "" {
|
|
name = DstIp.String()
|
|
}
|
|
if pinfo == nil {
|
|
if proto == "ICMP" {
|
|
return fmt.Sprintf("(%s %s -> %s: %s [%d])", proto, SrcIp, name, codestr, code)
|
|
}
|
|
return fmt.Sprintf("(%s %s:%d -> %s:%d)", proto, SrcIp, SrcPort, name, DstPort)
|
|
}
|
|
|
|
return fmt.Sprintf("%s %s %s:%d -> %s:%d", pinfo.ExePath, proto, SrcIp, SrcPort, name, DstPort)
|
|
}
|
|
|
|
func (fw *Firewall) filterPacket(pkt *nfqueue.NFQPacket, timestamp time.Time) {
|
|
// fmt.Println("firewall: filterPacket()")
|
|
isudp := pkt.Packet.Layer(layers.LayerTypeUDP) != nil
|
|
|
|
if basicAllowPacket(pkt) {
|
|
if isudp {
|
|
srcport, _ := getPacketUDPPorts(pkt)
|
|
|
|
if srcport == 53 {
|
|
fw.dns.processDNS(pkt)
|
|
}
|
|
}
|
|
|
|
pkt.Accept()
|
|
return
|
|
}
|
|
|
|
/* if isudp {
|
|
srcport, _ := getPacketUDPPorts(pkt)
|
|
|
|
if srcport == 53 {
|
|
fw.dns.processDNS(pkt)
|
|
pkt.Accept()
|
|
return
|
|
}
|
|
|
|
}
|
|
*/
|
|
_, dstip := getPacketIPAddrs(pkt)
|
|
/* _, dstp := getPacketPorts(pkt)
|
|
} */
|
|
|
|
ppath := "*"
|
|
strictness := procsnitch.MATCH_STRICT
|
|
|
|
if isudp {
|
|
strictness = procsnitch.MATCH_LOOSE
|
|
}
|
|
|
|
pinfo, optstring := findProcessForPacket(pkt, false, strictness)
|
|
if pinfo == nil {
|
|
pinfo = getEmptyPInfo()
|
|
ppath = "[unknown]"
|
|
optstring = "[Connection could not be mapped]"
|
|
log.Warningf("No proc found for %s", printPacket(pkt, fw.dns.Lookup(dstip, pinfo.Pid), nil))
|
|
// pkt.Accept()
|
|
// return
|
|
} else {
|
|
ppath = pinfo.ExePath
|
|
cf := strings.Fields(pinfo.CmdLine)
|
|
if len(cf) > 1 && strings.HasPrefix(cf[1], "/") {
|
|
for _, intp := range _interpreters {
|
|
if strings.Contains(pinfo.ExePath, intp) {
|
|
ppath = cf[1]
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
log.Debugf("filterPacket [%s] %s", ppath, printPacket(pkt, fw.dns.Lookup(dstip, pinfo.Pid), nil))
|
|
/* if basicAllowPacket(pkt) {
|
|
pkt.Accept()
|
|
return
|
|
}
|
|
*/
|
|
policy := fw.PolicyForPathAndSandbox(ppath, pinfo.Sandbox)
|
|
//log.Notice("XXX: flunked basicallowpacket; policy = ", policy)
|
|
policy.processPacket(pkt, timestamp, pinfo, optstring)
|
|
}
|
|
|
|
func readFileDirect(filename string) ([]byte, error) {
|
|
bfilename, err := syscall.BytePtrFromString(filename)
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
res, _, err := syscall.Syscall(syscall.SYS_OPEN, uintptr(unsafe.Pointer(bfilename)), syscall.O_RDONLY, 0)
|
|
fdlong := int64(res)
|
|
|
|
if fdlong < 0 {
|
|
return nil, err
|
|
}
|
|
|
|
fd := int(res)
|
|
data := make([]byte, 65535)
|
|
|
|
i := 0
|
|
val := 0
|
|
for i = 0; i < 65535; {
|
|
val, err = syscall.Read(fd, data[i:])
|
|
i += val
|
|
if err != nil && val != 0 {
|
|
return nil, err
|
|
}
|
|
if val == 0 {
|
|
break
|
|
}
|
|
}
|
|
|
|
data = data[0:i]
|
|
/*
|
|
val, err := syscall.Read(fd, data)
|
|
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
*/
|
|
syscall.Close(fd)
|
|
/*
|
|
if val < 65535 {
|
|
data = data[0:val]
|
|
}
|
|
*/
|
|
return data, nil
|
|
}
|
|
|
|
func getAllProcNetDataLocal() ([]string, error) {
|
|
data := ""
|
|
OzInitPidsLock.Lock()
|
|
|
|
for i := 0; i < len(OzInitPids); i++ {
|
|
fname := fmt.Sprintf("/proc/%d/net/tcp", OzInitPids[i])
|
|
//fmt.Println("XXX: opening: ", fname)
|
|
bdata, err := readFileDirect(fname)
|
|
|
|
if err != nil {
|
|
fmt.Println("Error reading proc data from ", fname, ": ", err)
|
|
} else {
|
|
data += string(bdata)
|
|
}
|
|
|
|
}
|
|
|
|
OzInitPidsLock.Unlock()
|
|
|
|
lines := strings.Split(data, "\n")
|
|
rlines := make([]string, 0)
|
|
ctr := 1
|
|
|
|
for l := 0; l < len(lines); l++ {
|
|
lines[l] = strings.TrimSpace(lines[l])
|
|
ssplit := strings.Split(lines[l], ":")
|
|
|
|
if len(ssplit) != 6 {
|
|
continue
|
|
}
|
|
|
|
ssplit[0] = fmt.Sprintf("%d", ctr)
|
|
ctr++
|
|
rlines = append(rlines, strings.Join(ssplit, ":"))
|
|
}
|
|
|
|
return rlines, nil
|
|
}
|
|
|
|
func GetRealRoot(pathname string, pid int) string {
|
|
pfname := fmt.Sprintf("/proc/%d/root", pid)
|
|
lnk, err := os.Readlink(pfname)
|
|
|
|
if err != nil {
|
|
fmt.Printf("Error reading link at %s: %v\n", pfname, err)
|
|
return pathname
|
|
}
|
|
|
|
if lnk == "/" {
|
|
return pathname
|
|
}
|
|
|
|
if strings.HasPrefix(pathname, lnk) {
|
|
return pathname[len(lnk):]
|
|
}
|
|
|
|
return pathname
|
|
}
|
|
|
|
// XXX: This is redundant code.... it should be called by findProcessForPacket()
|
|
func LookupSandboxProc(srcip net.IP, srcp uint16, dstip net.IP, dstp uint16, proto string, strictness, icode int) (*procsnitch.Info, string) {
|
|
var res *procsnitch.Info = nil
|
|
var optstr string
|
|
removePids := make([]int, 0)
|
|
OzInitPidsLock.Lock()
|
|
|
|
for i := 0; i < len(OzInitPids); i++ {
|
|
data := ""
|
|
fname := fmt.Sprintf("/proc/%d/net/%s", OzInitPids[i].Pid, proto)
|
|
//fmt.Println("XXX: opening: ", fname)
|
|
bdata, err := readFileDirect(fname)
|
|
|
|
if err != nil {
|
|
fmt.Println("Error reading proc data from ", fname, ": ", err)
|
|
|
|
if err == syscall.ENOENT {
|
|
removePids = append(removePids, OzInitPids[i].Pid)
|
|
}
|
|
|
|
continue
|
|
} else {
|
|
data = string(bdata)
|
|
lines := strings.Split(data, "\n")
|
|
rlines := make([]string, 0)
|
|
for l := 0; l < len(lines); l++ {
|
|
lines[l] = strings.TrimSpace(lines[l])
|
|
ssplit := strings.Split(lines[l], ":")
|
|
|
|
if len(ssplit) != 6 {
|
|
continue
|
|
}
|
|
|
|
rlines = append(rlines, strings.Join(ssplit, ":"))
|
|
}
|
|
|
|
// log.Warningf("Looking for %s:%d => %s:%d \n %s\n******\n", srcip, srcp, dstip, dstp, data)
|
|
|
|
if proto == "tcp" {
|
|
res = procsnitch.LookupTCPSocketProcessAll(srcip, srcp, dstip, dstp, rlines)
|
|
} else if proto == "udp" {
|
|
res = procsnitch.LookupUDPSocketProcessAll(srcip, srcp, dstip, dstp, rlines, strictness)
|
|
} else if proto == "icmp" {
|
|
res = procsnitch.LookupICMPSocketProcessAll(srcip, dstip, icode, rlines)
|
|
} else {
|
|
fmt.Printf("unknown proto: %s", proto)
|
|
}
|
|
|
|
if res != nil {
|
|
// optstr = "Sandbox: " + OzInitPids[i].Name
|
|
res.Sandbox = OzInitPids[i].Name
|
|
res.ExePath = GetRealRoot(res.ExePath, OzInitPids[i].Pid)
|
|
break
|
|
} /*else {
|
|
log.Warningf("*****\nCouldn't find proc for %s:%d => %s:%d \n %s\n******\n", srcip, srcp, dstip, dstp, data)
|
|
} */
|
|
}
|
|
|
|
}
|
|
|
|
OzInitPidsLock.Unlock()
|
|
|
|
for _, p := range removePids {
|
|
removeInitPid(p)
|
|
}
|
|
|
|
return res, optstr
|
|
}
|
|
|
|
func findProcessForPacket(pkt *nfqueue.NFQPacket, reverse bool, strictness int) (*procsnitch.Info, string) {
|
|
srcip, dstip := getPacketIPAddrs(pkt)
|
|
srcp, dstp := getPacketPorts(pkt)
|
|
proto := ""
|
|
optstr := ""
|
|
icode := -1
|
|
|
|
if reverse {
|
|
dstip, srcip = getPacketIPAddrs(pkt)
|
|
dstp, srcp = getPacketPorts(pkt)
|
|
}
|
|
|
|
if pkt.Packet.Layer(layers.LayerTypeTCP) != nil {
|
|
proto = "tcp"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeUDP) != nil {
|
|
proto = "udp"
|
|
} else if pkt.Packet.Layer(layers.LayerTypeICMPv4) != nil {
|
|
proto = "icmp"
|
|
icode, _ = getpacketICMPCode(pkt)
|
|
} else if pkt.Packet.Layer(layers.LayerTypeICMPv6) != nil {
|
|
proto = "icmp"
|
|
icode, _ = getpacketICMPCode(pkt)
|
|
}
|
|
|
|
if proto == "" {
|
|
log.Warningf("Packet has unknown protocol: %d", pkt.Packet.NetworkLayer().LayerType())
|
|
return nil, optstr
|
|
}
|
|
|
|
// log.Noticef("XXX proto = %s, from %v : %v -> %v : %v\n", proto, srcip, srcp, dstip, dstp)
|
|
|
|
var res *procsnitch.Info = nil
|
|
|
|
// Try normal way first, before the more resource intensive/invasive way.
|
|
if proto == "tcp" {
|
|
res = procsnitch.LookupTCPSocketProcessAll(srcip, srcp, dstip, dstp, nil)
|
|
} else if proto == "udp" {
|
|
res = procsnitch.LookupUDPSocketProcessAll(srcip, srcp, dstip, dstp, nil, strictness)
|
|
} else if proto == "icmp" {
|
|
res = procsnitch.LookupICMPSocketProcessAll(srcip, dstip, icode, nil)
|
|
}
|
|
|
|
if res == nil {
|
|
removePids := make([]int, 0)
|
|
OzInitPidsLock.Lock()
|
|
|
|
for i := 0; i < len(OzInitPids); i++ {
|
|
data := ""
|
|
fname := fmt.Sprintf("/proc/%d/net/%s", OzInitPids[i].Pid, proto)
|
|
//fmt.Println("XXX: opening: ", fname)
|
|
bdata, err := readFileDirect(fname)
|
|
|
|
if err != nil {
|
|
fmt.Println("Error reading proc data from ", fname, ": ", err)
|
|
|
|
if err == syscall.ENOENT {
|
|
removePids = append(removePids, OzInitPids[i].Pid)
|
|
}
|
|
|
|
continue
|
|
} else {
|
|
data = string(bdata)
|
|
lines := strings.Split(data, "\n")
|
|
rlines := make([]string, 0)
|
|
|
|
for l := 0; l < len(lines); l++ {
|
|
lines[l] = strings.TrimSpace(lines[l])
|
|
ssplit := strings.Split(lines[l], ":")
|
|
|
|
if len(ssplit) != 6 {
|
|
continue
|
|
}
|
|
|
|
rlines = append(rlines, strings.Join(ssplit, ":"))
|
|
}
|
|
|
|
if proto == "tcp" {
|
|
res = procsnitch.LookupTCPSocketProcessAll(srcip, srcp, dstip, dstp, rlines)
|
|
} else if proto == "udp" {
|
|
res = procsnitch.LookupUDPSocketProcessAll(srcip, srcp, dstip, dstp, rlines, strictness)
|
|
} else if proto == "icmp" {
|
|
res = procsnitch.LookupICMPSocketProcessAll(srcip, dstip, icode, rlines)
|
|
}
|
|
|
|
if res != nil {
|
|
optstr = "Sandbox: " + OzInitPids[i].Name
|
|
res.ExePath = GetRealRoot(res.ExePath, OzInitPids[i].Pid)
|
|
break
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
OzInitPidsLock.Unlock()
|
|
|
|
for _, p := range removePids {
|
|
removeInitPid(p)
|
|
}
|
|
|
|
}
|
|
|
|
return res, optstr
|
|
}
|
|
|
|
func basicAllowPacket(pkt *nfqueue.NFQPacket) bool {
|
|
srcip, dstip := getPacketIPAddrs(pkt)
|
|
if pkt.Packet.Layer(layers.LayerTypeUDP) != nil {
|
|
_, dport := getPacketUDPPorts(pkt)
|
|
if dport == 53 {
|
|
// fw.dns.processDNS(pkt)
|
|
return true
|
|
}
|
|
}
|
|
if pkt.Packet.Layer(layers.LayerTypeICMPv4) != nil && srcip.Equal(dstip) {
|
|
// An ICMP dest unreach packet sent to ourselves probably isn't a big security risk.
|
|
return true
|
|
}
|
|
return dstip.IsLoopback() ||
|
|
dstip.IsLinkLocalMulticast() ||
|
|
(pkt.Packet.Layer(layers.LayerTypeTCP) == nil &&
|
|
pkt.Packet.Layer(layers.LayerTypeUDP) == nil &&
|
|
pkt.Packet.Layer(layers.LayerTypeICMPv4) == nil &&
|
|
pkt.Packet.Layer(layers.LayerTypeICMPv6) == nil)
|
|
}
|
|
|
|
func getPacketIPAddrs(pkt *nfqueue.NFQPacket) (net.IP, net.IP) {
|
|
ipv4 := true
|
|
ipLayer := pkt.Packet.Layer(layers.LayerTypeIPv4)
|
|
|
|
if ipLayer == nil {
|
|
ipv4 = false
|
|
ipLayer = pkt.Packet.Layer(layers.LayerTypeIPv6)
|
|
}
|
|
|
|
if ipLayer == nil {
|
|
if ipv4 {
|
|
return net.IP{0, 0, 0, 0}, net.IP{0, 0, 0, 0}
|
|
}
|
|
return net.IP{}, net.IP{}
|
|
}
|
|
|
|
if !ipv4 {
|
|
ip6, _ := ipLayer.(*layers.IPv6)
|
|
return ip6.SrcIP, ip6.DstIP
|
|
}
|
|
|
|
ip4, _ := ipLayer.(*layers.IPv4)
|
|
return ip4.SrcIP, ip4.DstIP
|
|
}
|
|
|
|
func getpacketICMPCode(pkt *nfqueue.NFQPacket) (int, string) {
|
|
icmpLayer := pkt.Packet.Layer(layers.LayerTypeICMPv4)
|
|
|
|
if icmpLayer == nil {
|
|
return -1, ""
|
|
}
|
|
|
|
icmp, _ := icmpLayer.(*layers.ICMPv4)
|
|
return int(icmp.TypeCode.Code()), icmp.TypeCode.String()
|
|
}
|
|
|
|
func getPacketTCPPorts(pkt *nfqueue.NFQPacket) (uint16, uint16) {
|
|
tcpLayer := pkt.Packet.Layer(layers.LayerTypeTCP)
|
|
|
|
if tcpLayer == nil {
|
|
return 0, 0
|
|
}
|
|
|
|
tcp, _ := tcpLayer.(*layers.TCP)
|
|
return uint16(tcp.SrcPort), uint16(tcp.DstPort)
|
|
}
|
|
|
|
func getPacketUDPPorts(pkt *nfqueue.NFQPacket) (uint16, uint16) {
|
|
udpLayer := pkt.Packet.Layer(layers.LayerTypeUDP)
|
|
|
|
if udpLayer == nil {
|
|
return 0, 0
|
|
}
|
|
|
|
udp, _ := udpLayer.(*layers.UDP)
|
|
return uint16(udp.SrcPort), uint16(udp.DstPort)
|
|
}
|
|
|
|
func getPacketPorts(pkt *nfqueue.NFQPacket) (uint16, uint16) {
|
|
s, d := getPacketTCPPorts(pkt)
|
|
|
|
if s == 0 && d == 0 {
|
|
s, d = getPacketUDPPorts(pkt)
|
|
}
|
|
|
|
return s, d
|
|
}
|