#!/usr/bin/python import sys import os import os.path import subprocess import xen.lowlevel.xl POLICY_FILE_DIR="/etc/qubes_rpc/policy" QREXEC_CLIENT="/usr/lib/qubes/qrexec_client" def line_to_dict(line): tokens=line.split() if len(tokens) < 3: return None dict={} dict['source']=tokens[0] dict['dest']=tokens[1] action_list=tokens[2].split(',') dict['action']=action_list.pop(0) for iter in action_list: paramval=iter.split("=") dict["action."+paramval[0]]=paramval[1] return dict def read_policy_file(exec_index): policy_file=POLICY_FILE_DIR+"/"+exec_index if not os.path.isfile(policy_file): return None policy_list=list() f = open(policy_file) for iter in f.readlines(): dict = line_to_dict(iter) if dict is not None: policy_list.append(dict) f.close() return policy_list def is_match(item, config_term): return (item is not "dom0" and config_term == "anyvm") or item == config_term def get_default_policy(): dict={} dict["action"]="deny" return dict def find_policy(policy, domain, target): for iter in policy: if not is_match(domain, iter["source"]): continue if not is_match(target, iter["dest"]): continue return iter return get_default_policy() def is_domain_running(target): xl_ctx = xen.lowlevel.xl.ctx() domains = xl_ctx.list_domains() for dominfo in domains: domname = xl_ctx.domid_to_name(dominfo.domid) if domname == target: return True return False def spawn_target_if_necessary(target): if is_domain_running(target): return null=open("/dev/null", "r+") subprocess.call(["qvm-run", "-a", "-q", target, "true"], stdin=null, stdout=null) null.close() def do_execute(domain, target, user, exec_index, process_ident): if target == "dom0": cmd="/usr/lib/qubes/qubes_rpc_multiplexer "+exec_index + " " + domain elif target == "dispvm": cmd = "/usr/lib/qubes/qfile-daemon-dvm " + exec_index + " " + domain + " " +user else: # see the previous commit why "qvm-run -a" is broken and dangerous # also, dangling "xl" would keep stderr open and may prevent closing connection spawn_target_if_necessary(target) cmd= QREXEC_CLIENT + " -d " + target + " '" + user cmd+=":/usr/lib/qubes/qubes_rpc_multiplexer "+ exec_index + " " + domain + "'" os.execl(QREXEC_CLIENT, "qrexec_client", "-d", domain, "-l", cmd, "-c", process_ident) def confirm_execution(domain, target, exec_index): text = "Do you allow domain \"" +domain + "\" to execute " + exec_index text+= " operation on the domain \"" + target +"\"?" retcode = subprocess.call(["/usr/bin/zenity", "--question", "--text", text]) return retcode==0 def policy_editor(domain, target, exec_index): text = "Policy editor not yet implemented. Please add a line in the form \"" text+= domain + " " + target + "action_to_take\"" text+= " to /etc/qubes_rpc/policy/" + exec_index +" file in dom0, then close this info." subprocess.call(["/usr/bin/zenity", "--info", "--text", text]) def main(): domain=sys.argv[1] target=sys.argv[2] exec_index=sys.argv[3] process_ident=sys.argv[4] policy_list=read_policy_file(exec_index) if policy_list==None: policy_editor(domain, target, exec_index) policy_list=read_policy_file(exec_index) if policy_list==None: policy_list=list() policy_dict=find_policy(policy_list, domain, target) if policy_dict["action"] == "ask": if confirm_execution(domain, target, exec_index): policy_dict["action"] = "allow" else: policy_dict["action"] = "deny" if policy_dict["action"] == "allow": if policy_dict.has_key("action.target"): target=policy_dict["action.target"] if policy_dict.has_key("action.user"): user=policy_dict["action.user"] else: user="user" do_execute(domain, target, user, exec_index, process_ident) print >> sys.stderr, "Rpc denied:", domain, target, exec_index os.execl(QREXEC_CLIENT, "qrexec_client", "-d", domain, "-l", "/bin/false", "-c", process_ident) main()