mirror of
https://github.com/evilsocket/opensnitch.git
synced 2025-03-04 16:44:46 +01:00

- When reloading rules from a path: stop existing (domains,ips,regexp) lists monitors, stop rules watcher and start watching the new dir for changes, delete existing rules from memory, etc. - Previously, cli parameters (queue number, log file, etc) were taking into account before loading the configuration. Now the configuration file is loaded first (default-config.json), and if any of the cli parameter has been specified, it'll overwrite the loaded configuration from file. This means for example that if you use "-process-monitor-method proc", and "ebpf" is configured in default-config.json, firstly "ebpf" will be configured, and later "proc". (-queue-num option for now requires to match config option cfg.FwOptions.QueueNumber)
499 lines
13 KiB
Go
499 lines
13 KiB
Go
package rule
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"sort"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/evilsocket/opensnitch/daemon/conman"
|
|
"github.com/evilsocket/opensnitch/daemon/core"
|
|
"github.com/evilsocket/opensnitch/daemon/log"
|
|
"github.com/evilsocket/opensnitch/daemon/procmon"
|
|
|
|
"github.com/fsnotify/fsnotify"
|
|
)
|
|
|
|
// Loader is the object that holds the rules loaded from disk, as well as the
|
|
// rules watcher.
|
|
type Loader struct {
|
|
watcher *fsnotify.Watcher
|
|
rules map[string]*Rule
|
|
rulesKeys []string
|
|
Path string
|
|
liveReload bool
|
|
liveReloadRunning bool
|
|
checkSums bool
|
|
stopLiveReload chan struct{}
|
|
|
|
sync.RWMutex
|
|
}
|
|
|
|
// NewLoader loads rules from disk, and watches for changes made to the rules files
|
|
// on disk.
|
|
func NewLoader(liveReload bool) (*Loader, error) {
|
|
watcher, err := fsnotify.NewWatcher()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &Loader{
|
|
Path: "",
|
|
rules: make(map[string]*Rule),
|
|
liveReload: liveReload,
|
|
watcher: watcher,
|
|
liveReloadRunning: false,
|
|
stopLiveReload: make(chan struct{}),
|
|
}, nil
|
|
}
|
|
|
|
// NumRules returns he number of loaded rules.
|
|
func (l *Loader) NumRules() int {
|
|
l.RLock()
|
|
defer l.RUnlock()
|
|
return len(l.rules)
|
|
}
|
|
|
|
// GetAll returns the loaded rules.
|
|
func (l *Loader) GetAll() map[string]*Rule {
|
|
l.RLock()
|
|
defer l.RUnlock()
|
|
return l.rules
|
|
}
|
|
|
|
// EnableChecksums enables checksums field for rules globally.
|
|
func (l *Loader) EnableChecksums(enable bool) {
|
|
log.Debug("[rules loader] EnableChecksums: %v", enable)
|
|
l.checkSums = enable
|
|
procmon.EventsCache.SetComputeChecksums(enable)
|
|
procmon.EventsCache.AddChecksumHash(string(OpProcessHashMD5))
|
|
}
|
|
|
|
// HasChecksums checks if the rule will check for binary checksum matches
|
|
func (l *Loader) HasChecksums(op Operand) {
|
|
if op == OpProcessHashMD5 {
|
|
log.Debug("[rules loader] Adding MD5")
|
|
procmon.EventsCache.AddChecksumHash(string(OpProcessHashMD5))
|
|
} else if op == OpProcessHashSHA1 {
|
|
log.Debug("[rules loader] Adding SHA1")
|
|
procmon.EventsCache.AddChecksumHash(string(OpProcessHashSHA1))
|
|
}
|
|
}
|
|
|
|
// Reload loads rules from the specified path, deleting existing loaded
|
|
// rules from memory.
|
|
func (l *Loader) Reload(path string) error {
|
|
log.Info("rules.Loader.Reload(): %s", path)
|
|
|
|
// check that the new path exists before reloading
|
|
if core.Exists(path) == false {
|
|
return fmt.Errorf("The new path '%s' does not exist", path)
|
|
}
|
|
|
|
// stop monitors
|
|
if l.liveReloadRunning {
|
|
l.stopLiveReload <- struct{}{}
|
|
}
|
|
if l.watcher != nil {
|
|
l.watcher.Remove(l.Path)
|
|
}
|
|
for _, r := range l.rules {
|
|
l.cleanListsRule(r)
|
|
}
|
|
|
|
// then delete the rules, and reload everything
|
|
l.Lock()
|
|
l.rulesKeys = make([]string, 0)
|
|
l.rules = make(map[string]*Rule)
|
|
l.Unlock()
|
|
return l.Load(path)
|
|
}
|
|
|
|
// Load loads rules files from disk.
|
|
func (l *Loader) Load(path string) error {
|
|
log.Debug("rules.Loader.Load(): %s", path)
|
|
if core.Exists(path) == false {
|
|
return fmt.Errorf("Path '%s' does not exist\nCreate it if you want to save rules to disk", path)
|
|
}
|
|
path, err := core.ExpandPath(path)
|
|
if err != nil {
|
|
return fmt.Errorf("Error accessing rules path: %s.\nCreate it if you want to save rules to disk", err)
|
|
}
|
|
|
|
expr := filepath.Join(path, "*.json")
|
|
matches, err := filepath.Glob(expr)
|
|
if err != nil {
|
|
return fmt.Errorf("Error globbing '%s': %s", expr, err)
|
|
}
|
|
|
|
l.Path = path
|
|
if len(l.rules) == 0 {
|
|
l.rules = make(map[string]*Rule)
|
|
}
|
|
|
|
for _, fileName := range matches {
|
|
log.Debug("Reading rule from %s", fileName)
|
|
|
|
if err := l.loadRule(fileName); err != nil {
|
|
log.Warning("%s", err)
|
|
continue
|
|
}
|
|
}
|
|
|
|
if l.liveReload && l.liveReloadRunning == false {
|
|
go l.liveReloadWorker()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Add adds a rule to the list of rules, and optionally saves it to disk.
|
|
func (l *Loader) Add(rule *Rule, saveToDisk bool) error {
|
|
l.addUserRule(rule)
|
|
if saveToDisk {
|
|
fileName := filepath.Join(l.Path, fmt.Sprintf("%s.json", rule.Name))
|
|
return l.Save(rule, fileName)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Replace adds a rule to the list of rules, and optionally saves it to disk.
|
|
func (l *Loader) Replace(rule *Rule, saveToDisk bool) error {
|
|
if err := l.replaceUserRule(rule); err != nil {
|
|
return err
|
|
}
|
|
if saveToDisk {
|
|
l.Lock()
|
|
defer l.Unlock()
|
|
|
|
fileName := filepath.Join(l.Path, fmt.Sprintf("%s.json", rule.Name))
|
|
return l.Save(rule, fileName)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Save a rule to disk.
|
|
func (l *Loader) Save(rule *Rule, path string) error {
|
|
rule.Updated = time.Now()
|
|
raw, err := json.MarshalIndent(rule, "", " ")
|
|
if err != nil {
|
|
return fmt.Errorf("Error while saving rule %s to %s: %s", rule, path, err)
|
|
}
|
|
|
|
if err = ioutil.WriteFile(path, raw, 0600); err != nil {
|
|
return fmt.Errorf("Error while saving rule %s to %s: %s", rule, path, err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Delete deletes a rule from the list by name.
|
|
// If the duration is Always (i.e: saved on disk), it'll attempt to delete
|
|
// it from disk.
|
|
func (l *Loader) Delete(ruleName string) error {
|
|
l.Lock()
|
|
defer l.Unlock()
|
|
|
|
rule := l.rules[ruleName]
|
|
if rule == nil {
|
|
return nil
|
|
}
|
|
l.cleanListsRule(rule)
|
|
|
|
delete(l.rules, ruleName)
|
|
l.sortRules()
|
|
|
|
if rule.Duration != Always {
|
|
return nil
|
|
}
|
|
|
|
log.Info("Delete() rule: %s", rule)
|
|
return l.deleteRuleFromDisk(ruleName)
|
|
}
|
|
|
|
func (l *Loader) loadRule(fileName string) error {
|
|
raw, err := ioutil.ReadFile(fileName)
|
|
if err != nil {
|
|
return fmt.Errorf("Error while reading %s: %s", fileName, err)
|
|
}
|
|
l.Lock()
|
|
defer l.Unlock()
|
|
|
|
var r Rule
|
|
err = json.Unmarshal(raw, &r)
|
|
if err != nil {
|
|
return fmt.Errorf("Error parsing rule from %s: %s", fileName, err)
|
|
}
|
|
raw = nil
|
|
|
|
if oldRule, found := l.rules[r.Name]; found {
|
|
l.cleanListsRule(oldRule)
|
|
}
|
|
|
|
if !r.Enabled {
|
|
// XXX: we only parse and load the Data field if the rule is disabled and the Data field is not empty
|
|
// the rule will remain disabled.
|
|
if err = l.unmarshalOperatorList(&r.Operator); err != nil {
|
|
return err
|
|
}
|
|
} else {
|
|
if err := r.Operator.Compile(); err != nil {
|
|
log.Warning("Operator.Compile() error: %s: %s", err, r.Operator.Data)
|
|
return fmt.Errorf("(1) Error compiling rule: %s", err)
|
|
}
|
|
if r.Operator.Type == List {
|
|
for i := 0; i < len(r.Operator.List); i++ {
|
|
if err := r.Operator.List[i].Compile(); err != nil {
|
|
log.Warning("Operator.Compile() error: %s: ", err)
|
|
return fmt.Errorf("(1) Error compiling list rule: %s", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if oldRule, found := l.rules[r.Name]; found {
|
|
l.deleteOldRuleFromDisk(oldRule, &r)
|
|
}
|
|
|
|
log.Debug("Loaded rule from %s: %s", fileName, r.String())
|
|
l.rules[r.Name] = &r
|
|
l.sortRules()
|
|
|
|
if l.isTemporary(&r) {
|
|
err = l.scheduleTemporaryRule(r)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// deleteRule deletes a rule from memory if it has been deleted from disk.
|
|
// This is only called if fsnotify's Remove event is fired, thus it doesn't
|
|
// have to delete temporary rules (!Always).
|
|
func (l *Loader) deleteRule(filePath string) {
|
|
fileName := filepath.Base(filePath)
|
|
ruleName := fileName[:len(fileName)-5]
|
|
|
|
l.RLock()
|
|
rule, found := l.rules[ruleName]
|
|
delRule := found && rule.Duration == Always
|
|
l.RUnlock()
|
|
if delRule {
|
|
l.Delete(ruleName)
|
|
}
|
|
}
|
|
|
|
func (l *Loader) deleteRuleFromDisk(ruleName string) error {
|
|
path := fmt.Sprint(l.Path, "/", ruleName, ".json")
|
|
return os.Remove(path)
|
|
}
|
|
|
|
// deleteOldRuleFromDisk deletes a rule from disk if the Duration changes
|
|
// from Always (saved on disk), to !Always (temporary).
|
|
func (l *Loader) deleteOldRuleFromDisk(oldRule, newRule *Rule) {
|
|
if oldRule.Duration == Always && newRule.Duration != Always {
|
|
if err := l.deleteRuleFromDisk(oldRule.Name); err != nil {
|
|
log.Error("Error deleting old rule from disk: %s", oldRule.Name)
|
|
}
|
|
}
|
|
}
|
|
|
|
// cleanListsRule erases the lists loaded of an Operator of type Lists,
|
|
// and stops the workers monitoring the lists.
|
|
func (l *Loader) cleanListsRule(oldRule *Rule) {
|
|
if oldRule.Operator.Type == Lists {
|
|
oldRule.Operator.StopMonitoringLists()
|
|
} else if oldRule.Operator.Type == List {
|
|
for i := 0; i < len(oldRule.Operator.List); i++ {
|
|
if oldRule.Operator.List[i].Type == Lists {
|
|
oldRule.Operator.List[i].StopMonitoringLists()
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (l *Loader) isTemporary(r *Rule) bool {
|
|
return r.Duration != Restart && r.Duration != Always && r.Duration != Once
|
|
}
|
|
|
|
func (l *Loader) isUniqueName(name string) bool {
|
|
_, found := l.rules[name]
|
|
return !found
|
|
}
|
|
|
|
func (l *Loader) setUniqueName(rule *Rule) {
|
|
l.Lock()
|
|
defer l.Unlock()
|
|
|
|
idx := 1
|
|
base := rule.Name
|
|
for l.isUniqueName(rule.Name) == false {
|
|
idx++
|
|
rule.Name = fmt.Sprintf("%s-%d", base, idx)
|
|
}
|
|
}
|
|
|
|
// Deprecated: rule.Operator.Data no longer holds the operator list in json format as string.
|
|
func (l *Loader) unmarshalOperatorList(op *Operator) error {
|
|
if op.Type == List && len(op.List) == 0 && op.Data != "" {
|
|
if err := json.Unmarshal([]byte(op.Data), &op.List); err != nil {
|
|
return fmt.Errorf("error loading rule of type list: %s", err)
|
|
}
|
|
op.Data = ""
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (l *Loader) sortRules() {
|
|
l.rulesKeys = make([]string, 0, len(l.rules))
|
|
for k := range l.rules {
|
|
l.rulesKeys = append(l.rulesKeys, k)
|
|
}
|
|
sort.Strings(l.rulesKeys)
|
|
}
|
|
|
|
func (l *Loader) addUserRule(rule *Rule) {
|
|
if rule.Duration == Once {
|
|
return
|
|
}
|
|
|
|
l.setUniqueName(rule)
|
|
l.replaceUserRule(rule)
|
|
}
|
|
|
|
func (l *Loader) replaceUserRule(rule *Rule) (err error) {
|
|
l.Lock()
|
|
oldRule, found := l.rules[rule.Name]
|
|
l.Unlock()
|
|
|
|
if found {
|
|
// If the rule has changed from Always (saved on disk) to !Always (temporary),
|
|
// we need to delete the rule from disk and keep it in memory.
|
|
l.deleteOldRuleFromDisk(oldRule, rule)
|
|
|
|
// delete loaded lists, if this is a rule of type Lists
|
|
l.cleanListsRule(oldRule)
|
|
}
|
|
|
|
if err := l.unmarshalOperatorList(&rule.Operator); err != nil {
|
|
log.Error(err.Error())
|
|
}
|
|
|
|
if rule.Enabled {
|
|
if err := rule.Operator.Compile(); err != nil {
|
|
log.Warning("Operator.Compile() error: %s: %s", err, rule.Operator.Data)
|
|
return fmt.Errorf("(2) error compiling rule: %s", err)
|
|
}
|
|
|
|
if rule.Operator.Type == List {
|
|
for i := 0; i < len(rule.Operator.List); i++ {
|
|
if err := rule.Operator.List[i].Compile(); err != nil {
|
|
log.Warning("Operator.Compile() error: %s: ", err)
|
|
return fmt.Errorf("(2) error compiling list rule: %s", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
l.Lock()
|
|
l.rules[rule.Name] = rule
|
|
l.sortRules()
|
|
l.Unlock()
|
|
|
|
if l.isTemporary(rule) {
|
|
err = l.scheduleTemporaryRule(*rule)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func (l *Loader) scheduleTemporaryRule(rule Rule) error {
|
|
tTime, err := time.ParseDuration(string(rule.Duration))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
time.AfterFunc(tTime, func() {
|
|
l.Lock()
|
|
defer l.Unlock()
|
|
|
|
log.Info("Temporary rule expired: %s - %s", rule.Name, rule.Duration)
|
|
if newRule, found := l.rules[rule.Name]; found {
|
|
if newRule.Duration != rule.Duration {
|
|
log.Debug("%s temporary rule expired, but has new Duration, old: %s, new: %s", rule.Name, rule.Duration, newRule.Duration)
|
|
return
|
|
}
|
|
delete(l.rules, rule.Name)
|
|
l.sortRules()
|
|
}
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (l *Loader) liveReloadWorker() {
|
|
l.liveReloadRunning = true
|
|
|
|
log.Debug("Rules watcher started on path %s ...", l.Path)
|
|
if err := l.watcher.Add(l.Path); err != nil {
|
|
log.Error("Could not watch path: %s", err)
|
|
l.liveReloadRunning = false
|
|
return
|
|
}
|
|
|
|
for {
|
|
select {
|
|
case <-l.stopLiveReload:
|
|
goto Exit
|
|
case event := <-l.watcher.Events:
|
|
// a new rule json file has been created or updated
|
|
if event.Op&fsnotify.Write == fsnotify.Write {
|
|
if strings.HasSuffix(event.Name, ".json") {
|
|
log.Important("Ruleset changed due to %s, reloading ...", path.Base(event.Name))
|
|
if err := l.loadRule(event.Name); err != nil {
|
|
log.Warning("%s", err)
|
|
}
|
|
}
|
|
} else if event.Op&fsnotify.Remove == fsnotify.Remove {
|
|
if strings.HasSuffix(event.Name, ".json") {
|
|
log.Important("Rule deleted %s", path.Base(event.Name))
|
|
// we only need to delete from memory rules of type Always,
|
|
// because the Remove event is of a file, i.e.: Duration == Always
|
|
l.deleteRule(event.Name)
|
|
}
|
|
}
|
|
case err := <-l.watcher.Errors:
|
|
log.Error("File system watcher error: %s", err)
|
|
}
|
|
}
|
|
Exit:
|
|
log.Debug("[rules] liveReloadWorker() exited")
|
|
l.liveReloadRunning = false
|
|
}
|
|
|
|
// FindFirstMatch will try match the connection against the existing rule set.
|
|
func (l *Loader) FindFirstMatch(con *conman.Connection) (match *Rule) {
|
|
l.RLock()
|
|
defer l.RUnlock()
|
|
|
|
for _, idx := range l.rulesKeys {
|
|
rule, _ := l.rules[idx]
|
|
if rule.Enabled == false {
|
|
continue
|
|
}
|
|
if rule.Match(con, l.checkSums) {
|
|
// We have a match.
|
|
// Save the rule in order to don't ask the user to take action,
|
|
// and keep iterating until a Deny or a Priority rule appears.
|
|
match = rule
|
|
if rule.Action == Reject || rule.Action == Deny || rule.Precedence == true {
|
|
return rule
|
|
}
|
|
}
|
|
}
|
|
|
|
return match
|
|
}
|