firewall.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487
  1. #
  2. # The Qubes OS Project, http://www.qubes-os.org
  3. #
  4. # Copyright (C) 2011 Tomasz Sterna <tomek@xiaoka.com>
  5. #
  6. # This program is free software; you can redistribute it and/or
  7. # modify it under the terms of the GNU General Public License
  8. # as published by the Free Software Foundation; either version 2
  9. # of the License, or (at your option) any later version.
  10. #
  11. # This program is distributed in the hope that it will be useful,
  12. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. # GNU General Public License for more details.
  15. #
  16. # You should have received a copy of the GNU Lesser General Public License along
  17. # with this program; if not, see <http://www.gnu.org/licenses/>.
  18. #
  19. #
  20. import datetime
  21. import re
  22. from PyQt4 import QtCore, QtGui
  23. import qubesadmin.firewall
  24. from . import ui_newfwruledlg
  25. class FirewallModifiedOutsideError(ValueError):
  26. pass
  27. class QIPAddressValidator(QtGui.QValidator):
  28. def __init__(self, parent=None):
  29. super(QIPAddressValidator, self).__init__(parent)
  30. def validate(self, input, pos):
  31. # pylint: disable=too-many-return-statements,no-self-use
  32. hostname = str(input)
  33. if len(hostname) > 255 or len(hostname) == 0:
  34. return (QtGui.QValidator.Intermediate, input, pos)
  35. if hostname == "*":
  36. return (QtGui.QValidator.Acceptable, input, pos)
  37. unmask = hostname.split("/", 1)
  38. if len(unmask) == 2:
  39. hostname = unmask[0]
  40. mask = unmask[1]
  41. if mask.isdigit() or mask == "":
  42. if re.match(r"^([0-9]{1,3}\.){3}[0-9]{1,3}$", hostname) is None:
  43. return (QtGui.QValidator.Invalid, input, pos)
  44. if mask != "":
  45. mask = int(unmask[1])
  46. if mask < 0 or mask > 32:
  47. return (QtGui.QValidator.Invalid, input, pos)
  48. else:
  49. return (QtGui.QValidator.Invalid, input, pos)
  50. if hostname[-1:] == ".":
  51. hostname = hostname[:-1]
  52. if hostname[-1:] == "-":
  53. return (QtGui.QValidator.Intermediate, input, pos)
  54. allowed = re.compile(r"(?!-)[A-Z\d-]{1,63}(?<!-)$", re.IGNORECASE)
  55. if all(allowed.match(x) for x in hostname.split(".")):
  56. return (QtGui.QValidator.Acceptable, input, pos)
  57. return (QtGui.QValidator.Invalid, input, pos)
  58. class NewFwRuleDlg(QtGui.QDialog, ui_newfwruledlg.Ui_NewFwRuleDlg):
  59. def __init__(self, parent=None):
  60. super(NewFwRuleDlg, self).__init__(parent)
  61. self.setupUi(self)
  62. self.set_ok_state(False)
  63. self.addressComboBox.setValidator(QIPAddressValidator())
  64. self.addressComboBox.editTextChanged.connect(
  65. self.address_editing_finished)
  66. self.serviceComboBox.setValidator(QtGui.QRegExpValidator(
  67. QtCore.QRegExp("[a-z][a-z0-9-]+|[0-9]+(-[0-9]+)?",
  68. QtCore.Qt.CaseInsensitive), None))
  69. self.serviceComboBox.setEnabled(False)
  70. self.serviceComboBox.setInsertPolicy(QtGui.QComboBox.InsertAtBottom)
  71. self.populate_combos()
  72. self.serviceComboBox.setInsertPolicy(QtGui.QComboBox.InsertAtTop)
  73. def accept(self):
  74. if self.tcp_radio.isChecked() or self.udp_radio.isChecked():
  75. if len(self.serviceComboBox.currentText()) == 0:
  76. msg = QtGui.QMessageBox()
  77. msg.warning(self, self.tr("Firewall rule"),
  78. self.tr("You need to fill service "
  79. "name/port for TCP/UDP rule"))
  80. return
  81. QtGui.QDialog.accept(self)
  82. def populate_combos(self):
  83. example_addresses = [
  84. "", "www.example.com",
  85. "192.168.1.100", "192.168.0.0/16",
  86. "*"
  87. ]
  88. displayed_services = [
  89. '',
  90. 'http', 'https', 'ftp', 'ftps', 'smtp',
  91. 'smtps', 'pop3', 'pop3s', 'imap', 'imaps', 'odmr',
  92. 'nntp', 'nntps', 'ssh', 'telnet', 'telnets', 'ntp',
  93. 'snmp', 'ldap', 'ldaps', 'irc', 'ircs', 'xmpp-client',
  94. 'syslog', 'printer', 'nfs', 'x11',
  95. '1024-1234'
  96. ]
  97. for address in example_addresses:
  98. self.addressComboBox.addItem(address)
  99. for service in displayed_services:
  100. self.serviceComboBox.addItem(service)
  101. def address_editing_finished(self):
  102. self.set_ok_state(True)
  103. def set_ok_state(self, ok_state):
  104. ok_button = self.buttonBox.button(QtGui.QDialogButtonBox.Ok)
  105. if ok_button is not None:
  106. ok_button.setEnabled(ok_state)
  107. def on_tcp_radio_toggled(self, checked):
  108. if checked:
  109. self.serviceComboBox.setEnabled(True)
  110. def on_udp_radio_toggled(self, checked):
  111. if checked:
  112. self.serviceComboBox.setEnabled(True)
  113. def on_any_radio_toggled(self, checked):
  114. if checked:
  115. self.serviceComboBox.setEnabled(False)
  116. class QubesFirewallRulesModel(QtCore.QAbstractItemModel):
  117. def __init__(self, parent=None):
  118. QtCore.QAbstractItemModel.__init__(self, parent)
  119. self.__column_names = {0: "Address", 1: "Service", 2: "Protocol", }
  120. self.__services = list()
  121. pattern = re.compile(
  122. r"(?P<name>[a-z][a-z0-9-]+)\s+(?P<port>[0-9]+)/"
  123. r"(?P<protocol>[a-z]+)",
  124. re.IGNORECASE)
  125. file = open('/etc/services', 'r')
  126. for line in file:
  127. match = pattern.match(line)
  128. if match is not None:
  129. service = match.groupdict()
  130. self.__services.append(
  131. (service["name"], int(service["port"]),))
  132. file.close()
  133. self.fw_changed = False
  134. self.allow = None # is the default policy allow or deny
  135. self.temp_full_access_expire_time = None # temporary full access time
  136. self.__vm = None # VM that the model applies to
  137. self.__children = None # list of rules in the FW
  138. def sort(self, idx, order):
  139. from operator import attrgetter
  140. rev = (order == QtCore.Qt.AscendingOrder)
  141. self.children.sort(key=lambda x: self.get_column_string(idx, x)
  142. , reverse=rev)
  143. index1 = self.createIndex(0, 0)
  144. index2 = self.createIndex(len(self) - 1, len(self.__column_names) - 1)
  145. self.dataChanged.emit(index1, index2)
  146. def get_service_name(self, port):
  147. for service in self.__services:
  148. if str(service[1]) == str(port):
  149. return service[0]
  150. return str(port)
  151. def get_service_port(self, name):
  152. for service in self.__services:
  153. if service[0] == name:
  154. return service[1]
  155. return None
  156. def get_column_string(self, col, rule):
  157. # pylint: disable=too-many-return-statements
  158. # Address
  159. if col == 0:
  160. if rule.dsthost is None:
  161. return "*"
  162. else:
  163. if rule.dsthost.type == 'dst4'\
  164. and rule.dsthost.prefixlen == '32':
  165. return str(rule.dsthost)[:-3]
  166. elif rule.dsthost.type == 'dst6'\
  167. and rule.dsthost.prefixlen == '128':
  168. return str(rule.dsthost)[:-4]
  169. else:
  170. return str(rule.dsthost)
  171. # Service
  172. if col == 1:
  173. if rule.dstports is None:
  174. return "any"
  175. elif rule.dstports.range[0] != rule.dstports.range[1]:
  176. return str(rule.dstports)
  177. else:
  178. return self.get_service_name(rule.dstports)
  179. # Protocol
  180. if col == 2:
  181. if rule.proto is None:
  182. return "any"
  183. else:
  184. return str(rule.proto)
  185. return "unknown"
  186. @staticmethod
  187. def get_firewall_conf(vm):
  188. conf = {
  189. 'allow': None,
  190. 'expire': 0,
  191. 'rules': [],
  192. }
  193. allow_dns = False
  194. allow_icmp = False
  195. common_action = None
  196. reversed_rules = list(reversed(vm.firewall.rules))
  197. last_rule = reversed_rules.pop(0)
  198. if last_rule == qubesadmin.firewall.Rule('action=accept') \
  199. or last_rule == qubesadmin.firewall.Rule('action=drop'):
  200. common_action = last_rule.action
  201. else:
  202. FirewallModifiedOutsideError('Last rule must be either '
  203. 'drop all or accept all.')
  204. dns_rule = qubesadmin.firewall.Rule(None,
  205. action='accept', specialtarget='dns')
  206. icmp_rule = qubesadmin.firewall.Rule(None,
  207. action='accept', proto='icmp')
  208. while reversed_rules:
  209. rule = reversed_rules.pop(0)
  210. if rule == dns_rule:
  211. allow_dns = True
  212. continue
  213. if rule.proto == icmp_rule:
  214. allow_icmp = True
  215. continue
  216. if rule.specialtarget is not None or rule.icmptype is not None:
  217. raise FirewallModifiedOutsideError("Rule type unknown!")
  218. if (rule.dsthost is not None or rule.proto is not None) \
  219. and rule.expire is None:
  220. if rule.action == 'accept':
  221. conf['rules'].insert(0, rule)
  222. continue
  223. else:
  224. raise FirewallModifiedOutsideError('No blacklist support.')
  225. if rule.expire is not None and rule.dsthost is None \
  226. and rule.proto is None:
  227. conf['expire'] = int(str(rule.expire))
  228. continue
  229. raise FirewallModifiedOutsideError('it does not add up.')
  230. conf['allow'] = (common_action == 'accept')
  231. if not allow_icmp and not conf['allow']:
  232. raise FirewallModifiedOutsideError('ICMP must be allowed.')
  233. if not allow_dns and not conf['allow']:
  234. raise FirewallModifiedOutsideError('DNS must be allowed')
  235. return conf
  236. @staticmethod
  237. def write_firewall_conf(vm, conf):
  238. rules = []
  239. for rule in conf['rules']:
  240. rules.append(rule)
  241. if not conf['allow']:
  242. rules.append(qubesadmin.firewall.Rule(None,
  243. action='accept', specialtarget='dns'))
  244. if not conf['allow']:
  245. rules.append(qubesadmin.firewall.Rule(None,
  246. action='accept', proto='icmp'))
  247. if conf['allow']:
  248. rules.append(qubesadmin.firewall.Rule(None,
  249. action='accept'))
  250. else:
  251. rules.append(qubesadmin.firewall.Rule(None,
  252. action='drop'))
  253. vm.firewall.rules = rules
  254. def set_vm(self, vm):
  255. self.__vm = vm
  256. self.clear_children()
  257. conf = self.get_firewall_conf(vm)
  258. self.allow = conf["allow"]
  259. self.temp_full_access_expire_time = conf['expire']
  260. for rule in conf["rules"]:
  261. self.append_child(rule)
  262. def get_vm_name(self):
  263. return self.__vm.name
  264. def apply_rules(self, allow, temp_full_access=False,
  265. temp_full_access_time=None):
  266. assert self.__vm is not None
  267. if self.allow != allow or \
  268. (self.temp_full_access_expire_time != 0) != temp_full_access:
  269. self.fw_changed = True
  270. conf = {"allow": allow,
  271. "rules": list()
  272. }
  273. conf['rules'].extend(self.children)
  274. if temp_full_access and not allow:
  275. conf["rules"].append(qubesadmin.firewall.Rule(
  276. None,
  277. action='accept',
  278. expire=int(datetime.datetime.now().strftime("%s")) +
  279. temp_full_access_time * 60))
  280. if self.fw_changed:
  281. self.write_firewall_conf(self.__vm, conf)
  282. def populate_edit_dialog(self, dialog, row):
  283. address = self.get_column_string(0, self.children[row])
  284. dialog.addressComboBox.setItemText(0, address)
  285. dialog.addressComboBox.setCurrentIndex(0)
  286. service = self.get_column_string(1, self.children[row])
  287. if service == "any":
  288. service = ""
  289. dialog.serviceComboBox.setItemText(0, service)
  290. dialog.serviceComboBox.setCurrentIndex(0)
  291. protocol = self.get_column_string(2, self.children[row])
  292. if protocol == "tcp":
  293. dialog.tcp_radio.setChecked(True)
  294. elif protocol == "udp":
  295. dialog.udp_radio.setChecked(True)
  296. else:
  297. dialog.any_radio.setChecked(True)
  298. def run_rule_dialog(self, dialog, row=None):
  299. if dialog.exec_():
  300. address = str(dialog.addressComboBox.currentText())
  301. service = str(dialog.serviceComboBox.currentText())
  302. rule = qubesadmin.firewall.Rule(None, action='accept')
  303. if address is not None and address != "*":
  304. try:
  305. rule.dsthost = address
  306. except ValueError:
  307. QtGui.QMessageBox.warning(None, self.tr("Invalid address"),
  308. self.tr("Address '{0}' is invalid.").format(address))
  309. if dialog.tcp_radio.isChecked():
  310. rule.proto = 'tcp'
  311. elif dialog.udp_radio.isChecked():
  312. rule.proto = 'udp'
  313. if '-' in service:
  314. try:
  315. rule.dstports = service
  316. except ValueError:
  317. QtGui.QMessageBox.warning(
  318. None,
  319. self.tr("Invalid port or service"),
  320. self.tr("Port number or service '{0}' is invalid.")
  321. .format(service))
  322. elif service is not None and service != "":
  323. try:
  324. rule.dstports = service
  325. except (TypeError, ValueError):
  326. if self.get_service_port(service) is not None:
  327. rule.dstports = self.get_service_port(service)
  328. else:
  329. QtGui.QMessageBox.warning(None,
  330. self.tr("Invalid port or service"),
  331. self.tr("Port number or service '{0}' is invalid.")
  332. .format(service))
  333. if row is not None:
  334. self.set_child(row, rule)
  335. else:
  336. self.append_child(rule)
  337. def index(self, row, column, parent=QtCore.QModelIndex()):
  338. if not self.hasIndex(row, column, parent):
  339. return QtCore.QModelIndex()
  340. return self.createIndex(row, column, self.children[row])
  341. def parent(self, child): # pylint: disable=unused-argument,no-self-use
  342. return QtCore.QModelIndex()
  343. # pylint: disable=invalid-name,unused-argument
  344. def rowCount(self, parent=QtCore.QModelIndex()):
  345. return len(self)
  346. # pylint: disable=invalid-name,unused-argument
  347. def columnCount(self, parent=QtCore.QModelIndex()):
  348. return len(self.__column_names)
  349. # pylint: disable=invalid-name,no-self-use
  350. def hasChildren(self, index=QtCore.QModelIndex()):
  351. parent_item = index.internalPointer()
  352. if parent_item is not None:
  353. return False
  354. else:
  355. return True
  356. def data(self, index, role=QtCore.Qt.DisplayRole):
  357. if index.isValid() and role == QtCore.Qt.DisplayRole:
  358. return self.get_column_string(index.column(),
  359. self.children[index.row()])
  360. # pylint: disable=invalid-name
  361. def headerData(self, section, orientation, role=QtCore.Qt.DisplayRole):
  362. if section < len(self.__column_names) \
  363. and orientation == QtCore.Qt.Horizontal \
  364. and role == QtCore.Qt.DisplayRole:
  365. return self.__column_names[section]
  366. @property
  367. def children(self):
  368. return self.__children
  369. def append_child(self, child):
  370. row = len(self)
  371. self.beginInsertRows(QtCore.QModelIndex(), row, row)
  372. self.children.append(child)
  373. self.endInsertRows()
  374. index = self.createIndex(row, 0, child)
  375. self.dataChanged.emit(index, index)
  376. self.fw_changed = True
  377. def remove_child(self, i):
  378. if i >= len(self):
  379. return
  380. self.beginRemoveRows(QtCore.QModelIndex(), i, i)
  381. del self.children[i]
  382. self.endRemoveRows()
  383. index = self.createIndex(i, 0)
  384. self.dataChanged.emit(index, index)
  385. self.fw_changed = True
  386. def set_child(self, i, child):
  387. self.children[i] = child
  388. index = self.createIndex(i, 0, child)
  389. self.dataChanged.emit(index, index)
  390. self.fw_changed = True
  391. def clear_children(self):
  392. self.__children = list()
  393. def __len__(self):
  394. return len(self.children)