# # The Qubes OS Project, http://www.qubes-os.org # # Copyright (C) 2011 Tomasz Sterna # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # import datetime import ipaddress import os import re import sys import xml.etree.ElementTree from PyQt4.QtCore import * from PyQt4.QtGui import * import qubesadmin.firewall from . import ui_newfwruledlg class FirewallModifiedOutsideError(ValueError): pass class QIPAddressValidator(QValidator): def __init__(self, parent = None): super (QIPAddressValidator, self).__init__(parent) def validate(self, input, pos): hostname = str(input) if len(hostname) > 255 or len(hostname) == 0: return (QValidator.Intermediate, input, pos) if hostname == "*": return (QValidator.Acceptable, input, pos) unmask = hostname.split("/", 1) if len(unmask) == 2: hostname = unmask[0] mask = unmask[1] if mask.isdigit() or mask == "": if re.match("^([0-9]{1,3}\.){3}[0-9]{1,3}$", hostname) is None: return (QValidator.Invalid, input, pos) if mask != "": mask = int(unmask[1]) if mask < 0 or mask > 32: return (QValidator.Invalid, input, pos) else: return (QValidator.Invalid, input, pos) if hostname[-1:] == ".": hostname = hostname[:-1] if hostname[-1:] == "-": return (QValidator.Intermediate, input, pos) allowed = re.compile("(?!-)[A-Z\d-]{1,63}(?[a-z][a-z0-9-]+)\s+(?P[0-9]+)/(?P[a-z]+)", re.IGNORECASE) f = open('/etc/services', 'r') for line in f: match = pattern.match(line) if match is not None: service = match.groupdict() self.__services.append( (service["name"], int(service["port"]),) ) f.close() self.fw_changed = False def sort(self, idx, order): from operator import attrgetter rev = (order == Qt.AscendingOrder) if idx==0: self.children.sort(key=lambda x: x['address'], reverse = rev) if idx==1: self.children.sort(key=lambda x: self.get_service_name(x[ "portBegin"]) if x["portEnd"] == None else x["portBegin"], reverse = rev) if idx==2: self.children.sort(key=lambda x: x['proto'], reverse = rev) index1 = self.createIndex(0, 0) index2 = self.createIndex(len(self)-1, len(self.__columnValues)-1) self.dataChanged.emit(index1, index2) def get_service_name(self, port): for service in self.__services: if service[1] == port: return service[0] return str(port) def get_service_port(self, name): for service in self.__services: if service[0] == name: return service[1] return None def get_column_string(self, col, row): return self.__columnValues[col](row) def rule_to_dict(self, rule): if rule.dsthost is None: raise FirewallModifiedOutsideError('no dsthost') d = {} if not rule.proto: d['proto'] = 'any' d['portBegin'] = 'any' d['portEnd'] = None else: d['proto'] = rule.proto if rule.dstports is None: raise FirewallModifiedOutsideError('no dstport') d['portBegin'] = rule.dstports.range[0] d['portEnd'] = rule.dstports.range[1] \ if rule.dstports.range[0] != rule.dstports.range[1] \ else None if rule.dsthost.type == 'dsthost': d['address'] = str(rule.dsthost) d['netmask'] = 32 elif rule.dsthost.type == 'dst4': network = ipaddress.IPv4Network(rule.dsthost) d['address'] = str(network.network_address) d['netmask'] = int(network.prefixlen) else: raise FirewallModifiedOutsideError( 'cannot map dsthost.type={!s}'.format(rule.dsthost)) if rule.expire is not None: d['expire'] = int(rule.expire) return d def get_firewall_conf(self, vm): conf = { 'allow': None, 'allowDns': False, 'allowIcmp': False, 'allowYumProxy': False, 'rules': [], } common_action = None tentative_action = None reversed_rules = list(reversed(vm.firewall.rules)) while reversed_rules: rule = reversed_rules[0] if rule.dsthost is not None or rule.proto is not None: break tentative_action = reversed_rules.pop(0).action if not reversed_rules: conf['allow'] = tentative_action == 'accept' return conf for rule in reversed_rules: if rule.specialtarget == 'dns': conf['allowDns'] = (rule.action == 'accept') continue if rule.proto == 'icmp': if rule.icmptype is not None: raise FirewallModifiedOutsideError( 'cannot map icmptype != None') conf['allowIcmp'] = (rule.action == 'accept') continue if common_action is None: common_action = rule.action elif common_action != rule.action: raise FirewallModifiedOutsideError('incoherent action') conf['rules'].insert(0, self.rule_to_dict(rule)) if common_action is None or common_action != tentative_action: # we've got only specialtarget and/or icmp conf['allow'] = tentative_action == 'accept' return conf raise FirewallModifiedOutsideError('it does not add up') def write_firewall_conf(self, vm, conf): common_action = qubesadmin.firewall.Action( 'drop' if conf['allow'] else 'accept') rules = [] for rule in conf['rules']: kwargs = {} if rule['proto'] != 'any': kwargs['proto'] = rule['proto'] if rule['portBegin'] != 'any': kwargs['dstports'] = '-'.join(map(str, filter((lambda x: x), (rule['portBegin'], rule['portEnd'])))) netmask = str(rule['netmask']) if rule['netmask'] != 32 else None rules.append(qubesadmin.firewall.Rule(None, action=common_action, dsthost='/'.join(map(str, filter((lambda x: x), (rule['address'], netmask)))), **kwargs)) if conf['allowDns']: rules.append(qubesadmin.firewall.Rule(None, action='accept', specialtarget='dns')) if conf['allowIcmp']: rules.append(qubesadmin.firewall.Rule(None, action='accept', proto='icmp')) if common_action == 'drop': rules.append(qubesadmin.firewall.Rule(None, action='accept')) vm.firewall.rules = rules def set_vm(self, vm): self.__vm = vm self.clearChildren() conf = self.get_firewall_conf(vm) self.allow = conf["allow"] self.allowDns = conf["allowDns"] self.allowIcmp = conf["allowIcmp"] self.allowYumProxy = conf["allowYumProxy"] self.tempFullAccessExpireTime = 0 for rule in conf["rules"]: self.appendChild(rule) if "expire" in rule and rule["address"] == "0.0.0.0": self.tempFullAccessExpireTime = rule["expire"] def get_vm_name(self): return self.__vm.name def apply_rules(self, allow, dns, icmp, yumproxy, tempFullAccess=False, tempFullAccessTime=None): assert self.__vm is not None if self.allow != allow or self.allowDns != dns or \ self.allowIcmp != icmp or self.allowYumProxy != yumproxy or \ (self.tempFullAccessExpireTime != 0) != tempFullAccess: self.fw_changed = True conf = { "allow": allow, "allowDns": dns, "allowIcmp": icmp, "allowYumProxy": yumproxy, "rules": list() } for rule in self.children: if "expire" in rule and rule["address"] == "0.0.0.0" and \ rule["netmask"] == 0 and rule["proto"] == "any": # rule already present, update its time if tempFullAccess: rule["expire"] = \ int(datetime.datetime.now().strftime("%s")) + \ tempFullAccessTime*60 tempFullAccess = False conf["rules"].append(rule) if tempFullAccess and not allow: conf["rules"].append({"address": "0.0.0.0", "netmask": 0, "proto": "any", "expire": int( datetime.datetime.now().strftime("%s"))+\ tempFullAccessTime*60 }) if self.fw_changed: self.write_firewall_conf(self.__vm, conf) if self.__vm.is_running(): vm = self.__vm.netvm while vm is not None: if vm.is_proxyvm() and vm.is_running(): vm.write_iptables_qubesdb_entry() vm = vm.netvm def index(self, row, column, parent=QModelIndex()): if not self.hasIndex(row, column, parent): return QModelIndex() return self.createIndex(row, column, self.children[row]) def parent(self, child): return QModelIndex() def rowCount(self, parent=QModelIndex()): return len(self) def columnCount(self, parent=QModelIndex()): return len(self.__columnValues) def hasChildren(self, index=QModelIndex()): parentItem = index.internalPointer() if parentItem is not None: return False else: return True def data(self, index, role=Qt.DisplayRole): if index.isValid() and role == Qt.DisplayRole: return self.__columnValues[index.column()](index.row()) def headerData(self, section, orientation, role=Qt.DisplayRole): if section < len(self.__columnNames) \ and orientation == Qt.Horizontal and role == Qt.DisplayRole: return self.__columnNames[section] @property def children(self): return self.__children def appendChild(self, child): row = len(self) self.beginInsertRows(QModelIndex(), row, row) self.children.append(child) self.endInsertRows() index = self.createIndex(row, 0, child) self.dataChanged.emit(index, index) self.fw_changed = True def removeChild(self, i): if i >= len(self): return self.beginRemoveRows(QModelIndex(), i, i) del self.children[i] self.endRemoveRows() index = self.createIndex(i, 0) self.dataChanged.emit(index, index) self.fw_changed = True def setChild(self, i, child): self.children[i] = child index = self.createIndex(i, 0, child) self.dataChanged.emit(index, index) self.fw_changed = True def clearChildren(self): self.__children = list() def __len__(self): return len(self.children)