mirror of
https://github.com/safing/portmaster
synced 2025-09-01 18:19:12 +00:00
Work on portmaster restructuring
This commit is contained in:
parent
5bdb021c88
commit
be8a1d1739
13 changed files with 301 additions and 191 deletions
|
@ -13,7 +13,6 @@ import (
|
||||||
"github.com/Safing/portmaster/firewall/interception"
|
"github.com/Safing/portmaster/firewall/interception"
|
||||||
"github.com/Safing/portmaster/network"
|
"github.com/Safing/portmaster/network"
|
||||||
"github.com/Safing/portmaster/network/packet"
|
"github.com/Safing/portmaster/network/packet"
|
||||||
"github.com/Safing/portmaster/portmaster"
|
|
||||||
"github.com/Safing/portmaster/process"
|
"github.com/Safing/portmaster/process"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -122,11 +121,11 @@ func handlePacket(pkt packet.Packet) {
|
||||||
// check if packet is destined for tunnel
|
// check if packet is destined for tunnel
|
||||||
switch pkt.IPVersion() {
|
switch pkt.IPVersion() {
|
||||||
case packet.IPv4:
|
case packet.IPv4:
|
||||||
if portmaster.TunnelNet4 != nil && portmaster.TunnelNet4.Contains(pkt.GetIPHeader().Dst) {
|
if TunnelNet4 != nil && TunnelNet4.Contains(pkt.GetIPHeader().Dst) {
|
||||||
tunnelHandler(pkt)
|
tunnelHandler(pkt)
|
||||||
}
|
}
|
||||||
case packet.IPv6:
|
case packet.IPv6:
|
||||||
if portmaster.TunnelNet6 != nil && portmaster.TunnelNet6.Contains(pkt.GetIPHeader().Dst) {
|
if TunnelNet6 != nil && TunnelNet6.Contains(pkt.GetIPHeader().Dst) {
|
||||||
tunnelHandler(pkt)
|
tunnelHandler(pkt)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -184,12 +183,12 @@ func initialHandler(pkt packet.Packet, link *network.Link) {
|
||||||
|
|
||||||
// make a decision if not made already
|
// make a decision if not made already
|
||||||
if connection.Verdict == network.UNDECIDED {
|
if connection.Verdict == network.UNDECIDED {
|
||||||
portmaster.DecideOnConnection(connection, pkt)
|
DecideOnConnection(connection, pkt)
|
||||||
}
|
}
|
||||||
if connection.Verdict != network.CANTSAY {
|
if connection.Verdict != network.CANTSAY {
|
||||||
link.UpdateVerdict(connection.Verdict)
|
link.UpdateVerdict(connection.Verdict)
|
||||||
} else {
|
} else {
|
||||||
portmaster.DecideOnLink(connection, link, pkt)
|
DecideOnLink(connection, link, pkt)
|
||||||
}
|
}
|
||||||
|
|
||||||
// log decision
|
// log decision
|
||||||
|
@ -280,7 +279,7 @@ func verdict(pkt packet.Packet, action network.Verdict) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// func tunnelHandler(pkt packet.Packet) {
|
// func tunnelHandler(pkt packet.Packet) {
|
||||||
// tunnelInfo := portmaster.GetTunnelInfo(pkt.GetIPHeader().Dst)
|
// tunnelInfo := GetTunnelInfo(pkt.GetIPHeader().Dst)
|
||||||
// if tunnelInfo == nil {
|
// if tunnelInfo == nil {
|
||||||
// pkt.Block()
|
// pkt.Block()
|
||||||
// return
|
// return
|
||||||
|
|
|
@ -10,8 +10,6 @@ import (
|
||||||
"github.com/Safing/portmaster/network"
|
"github.com/Safing/portmaster/network"
|
||||||
"github.com/Safing/portmaster/network/netutils"
|
"github.com/Safing/portmaster/network/netutils"
|
||||||
"github.com/Safing/portmaster/network/packet"
|
"github.com/Safing/portmaster/network/packet"
|
||||||
"github.com/Safing/portmaster/port17/mode"
|
|
||||||
"github.com/Safing/portmaster/profiles"
|
|
||||||
|
|
||||||
"github.com/agext/levenshtein"
|
"github.com/agext/levenshtein"
|
||||||
)
|
)
|
||||||
|
@ -51,7 +49,7 @@ func DecideOnConnectionBeforeIntel(connection *network.Connection, fqdn string)
|
||||||
}
|
}
|
||||||
|
|
||||||
// check user class
|
// check user class
|
||||||
if profile.Flags.Has(profiles.System) {
|
if profile.Flags.Has(profile.System) {
|
||||||
if !connection.Process().IsSystem() {
|
if !connection.Process().IsSystem() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has System flag set, but process is not executed by System", connection)
|
log.Infof("sheriff: denying connection %s, profile has System flag set, but process is not executed by System", connection)
|
||||||
connection.AddReason("must be executed by system")
|
connection.AddReason("must be executed by system")
|
||||||
|
@ -59,7 +57,7 @@ func DecideOnConnectionBeforeIntel(connection *network.Connection, fqdn string)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if profile.Flags.Has(profiles.Admin) {
|
if profile.Flags.Has(profile.Admin) {
|
||||||
if !connection.Process().IsAdmin() {
|
if !connection.Process().IsAdmin() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has Admin flag set, but process is not executed by Admin", connection)
|
log.Infof("sheriff: denying connection %s, profile has Admin flag set, but process is not executed by Admin", connection)
|
||||||
connection.AddReason("must be executed by admin")
|
connection.AddReason("must be executed by admin")
|
||||||
|
@ -67,7 +65,7 @@ func DecideOnConnectionBeforeIntel(connection *network.Connection, fqdn string)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if profile.Flags.Has(profiles.User) {
|
if profile.Flags.Has(profile.User) {
|
||||||
if !connection.Process().IsUser() {
|
if !connection.Process().IsUser() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has User flag set, but process is not executed by a User", connection)
|
log.Infof("sheriff: denying connection %s, profile has User flag set, but process is not executed by a User", connection)
|
||||||
connection.AddReason("must be executed by user")
|
connection.AddReason("must be executed by user")
|
||||||
|
@ -77,7 +75,7 @@ func DecideOnConnectionBeforeIntel(connection *network.Connection, fqdn string)
|
||||||
}
|
}
|
||||||
|
|
||||||
// check for any network access
|
// check for any network access
|
||||||
if !profile.Flags.Has(profiles.Internet) && !profile.Flags.Has(profiles.LocalNet) {
|
if !profile.Flags.Has(profile.Internet) && !profile.Flags.Has(profile.LocalNet) {
|
||||||
log.Infof("sheriff: denying connection %s, profile denies Internet and local network access", connection)
|
log.Infof("sheriff: denying connection %s, profile denies Internet and local network access", connection)
|
||||||
connection.Block()
|
connection.Block()
|
||||||
return
|
return
|
||||||
|
@ -139,7 +137,7 @@ func DecideOnConnectionAfterIntel(connection *network.Connection, fqdn string, r
|
||||||
|
|
||||||
// check Strict flag
|
// check Strict flag
|
||||||
// TODO: drastically improve this!
|
// TODO: drastically improve this!
|
||||||
if profile.Flags.Has(profiles.Strict) {
|
if profile.Flags.Has(profile.Strict) {
|
||||||
matched := false
|
matched := false
|
||||||
pathElements := strings.Split(connection.Process().Path, "/")
|
pathElements := strings.Split(connection.Process().Path, "/")
|
||||||
if len(pathElements) > 2 {
|
if len(pathElements) > 2 {
|
||||||
|
@ -173,18 +171,18 @@ func DecideOnConnectionAfterIntel(connection *network.Connection, fqdn string, r
|
||||||
|
|
||||||
// tunneling
|
// tunneling
|
||||||
// TODO: link this to real status
|
// TODO: link this to real status
|
||||||
port17Active := mode.Client()
|
// gate17Active := mode.Client()
|
||||||
if port17Active {
|
// if gate17Active {
|
||||||
tunnelInfo, err := AssignTunnelIP(fqdn)
|
// tunnelInfo, err := AssignTunnelIP(fqdn)
|
||||||
if err != nil {
|
// if err != nil {
|
||||||
log.Errorf("portmaster: could not get tunnel IP for routing %s: %s", connection, err)
|
// log.Errorf("portmaster: could not get tunnel IP for routing %s: %s", connection, err)
|
||||||
return nil // return nxDomain
|
// return nil // return nxDomain
|
||||||
}
|
// }
|
||||||
// save original reply
|
// // save original reply
|
||||||
tunnelInfo.RRCache = rrCache
|
// tunnelInfo.RRCache = rrCache
|
||||||
// return tunnel IP
|
// // return tunnel IP
|
||||||
return tunnelInfo.ExportTunnelIP()
|
// return tunnelInfo.ExportTunnelIP()
|
||||||
}
|
// }
|
||||||
|
|
||||||
return rrCache
|
return rrCache
|
||||||
}
|
}
|
||||||
|
@ -212,7 +210,7 @@ func DecideOnConnection(connection *network.Connection, pkt packet.Packet) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// check user class
|
// check user class
|
||||||
if profile.Flags.Has(profiles.System) {
|
if profile.Flags.Has(profile.System) {
|
||||||
if !connection.Process().IsSystem() {
|
if !connection.Process().IsSystem() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has System flag set, but process is not executed by System", connection)
|
log.Infof("sheriff: denying connection %s, profile has System flag set, but process is not executed by System", connection)
|
||||||
connection.AddReason("must be executed by system")
|
connection.AddReason("must be executed by system")
|
||||||
|
@ -220,7 +218,7 @@ func DecideOnConnection(connection *network.Connection, pkt packet.Packet) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if profile.Flags.Has(profiles.Admin) {
|
if profile.Flags.Has(profile.Admin) {
|
||||||
if !connection.Process().IsAdmin() {
|
if !connection.Process().IsAdmin() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has Admin flag set, but process is not executed by Admin", connection)
|
log.Infof("sheriff: denying connection %s, profile has Admin flag set, but process is not executed by Admin", connection)
|
||||||
connection.AddReason("must be executed by admin")
|
connection.AddReason("must be executed by admin")
|
||||||
|
@ -228,7 +226,7 @@ func DecideOnConnection(connection *network.Connection, pkt packet.Packet) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if profile.Flags.Has(profiles.User) {
|
if profile.Flags.Has(profile.User) {
|
||||||
if !connection.Process().IsUser() {
|
if !connection.Process().IsUser() {
|
||||||
log.Infof("sheriff: denying connection %s, profile has User flag set, but process is not executed by a User", connection)
|
log.Infof("sheriff: denying connection %s, profile has User flag set, but process is not executed by a User", connection)
|
||||||
connection.AddReason("must be executed by user")
|
connection.AddReason("must be executed by user")
|
||||||
|
@ -238,7 +236,7 @@ func DecideOnConnection(connection *network.Connection, pkt packet.Packet) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// check for any network access
|
// check for any network access
|
||||||
if !profile.Flags.Has(profiles.Internet) && !profile.Flags.Has(profiles.LocalNet) {
|
if !profile.Flags.Has(profile.Internet) && !profile.Flags.Has(profile.LocalNet) {
|
||||||
log.Infof("sheriff: denying connection %s, profile denies Internet and local network access", connection)
|
log.Infof("sheriff: denying connection %s, profile denies Internet and local network access", connection)
|
||||||
connection.AddReason("no network access allowed")
|
connection.AddReason("no network access allowed")
|
||||||
connection.Block()
|
connection.Block()
|
||||||
|
@ -248,21 +246,21 @@ func DecideOnConnection(connection *network.Connection, pkt packet.Packet) {
|
||||||
switch connection.Domain {
|
switch connection.Domain {
|
||||||
case "I":
|
case "I":
|
||||||
// check Service flag
|
// check Service flag
|
||||||
if !profile.Flags.Has(profiles.Service) {
|
if !profile.Flags.Has(profile.Service) {
|
||||||
log.Infof("sheriff: denying connection %s, profile does not declare service", connection)
|
log.Infof("sheriff: denying connection %s, profile does not declare service", connection)
|
||||||
connection.AddReason("not a service")
|
connection.AddReason("not a service")
|
||||||
connection.Drop()
|
connection.Drop()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
// check if incoming connections are allowed on any port, but only if there no other restrictions
|
// check if incoming connections are allowed on any port, but only if there no other restrictions
|
||||||
if !!profile.Flags.Has(profiles.Internet) && !!profile.Flags.Has(profiles.LocalNet) && len(profile.ListenPorts) == 0 {
|
if !!profile.Flags.Has(profile.Internet) && !!profile.Flags.Has(profile.LocalNet) && len(profile.ListenPorts) == 0 {
|
||||||
log.Infof("sheriff: granting connection %s, profile allows incoming connections from anywhere and on any port", connection)
|
log.Infof("sheriff: granting connection %s, profile allows incoming connections from anywhere and on any port", connection)
|
||||||
connection.Accept()
|
connection.Accept()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
case "D":
|
case "D":
|
||||||
// check Directconnect flag
|
// check Directconnect flag
|
||||||
if !profile.Flags.Has(profiles.Directconnect) {
|
if !profile.Flags.Has(profile.Directconnect) {
|
||||||
log.Infof("sheriff: denying connection %s, profile does not declare direct connections", connection)
|
log.Infof("sheriff: denying connection %s, profile does not declare direct connections", connection)
|
||||||
connection.AddReason("direct connections (without DNS) not allowed")
|
connection.AddReason("direct connections (without DNS) not allowed")
|
||||||
connection.Drop()
|
connection.Drop()
|
||||||
|
@ -298,14 +296,14 @@ func DecideOnLink(connection *network.Connection, link *network.Link, pkt packet
|
||||||
remoteIP = pkt.GetIPHeader().Dst
|
remoteIP = pkt.GetIPHeader().Dst
|
||||||
}
|
}
|
||||||
if netutils.IPIsLocal(remoteIP) {
|
if netutils.IPIsLocal(remoteIP) {
|
||||||
if !profile.Flags.Has(profiles.LocalNet) {
|
if !profile.Flags.Has(profile.LocalNet) {
|
||||||
log.Infof("sheriff: dropping link %s, profile does not allow communication in the local network", link)
|
log.Infof("sheriff: dropping link %s, profile does not allow communication in the local network", link)
|
||||||
link.AddReason("profile does not allow access to local network")
|
link.AddReason("profile does not allow access to local network")
|
||||||
link.UpdateVerdict(network.BLOCK)
|
link.UpdateVerdict(network.BLOCK)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if !profile.Flags.Has(profiles.Internet) {
|
if !profile.Flags.Has(profile.Internet) {
|
||||||
log.Infof("sheriff: dropping link %s, profile does not allow communication with the Internet", link)
|
log.Infof("sheriff: dropping link %s, profile does not allow communication with the Internet", link)
|
||||||
link.AddReason("profile does not allow access to the Internet")
|
link.AddReason("profile does not allow access to the Internet")
|
||||||
link.UpdateVerdict(network.BLOCK)
|
link.UpdateVerdict(network.BLOCK)
|
||||||
|
|
|
@ -2,12 +2,12 @@ package intel
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
|
||||||
"github.com/Safing/portbase/database"
|
"github.com/Safing/portbase/database"
|
||||||
"github.com/Safing/portbase/database/record"
|
"github.com/Safing/portbase/database/record"
|
||||||
|
"github.com/Safing/portbase/utils"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -21,16 +21,16 @@ type IPInfo struct {
|
||||||
record.Base
|
record.Base
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
|
|
||||||
IP net.IP
|
IP string
|
||||||
Domains []string
|
Domains []string
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeIPInfoKey(ip net.IP) string {
|
func makeIPInfoKey(ip string) string {
|
||||||
return fmt.Sprintf("intel:IPInfo/%s", ip.String())
|
return fmt.Sprintf("intel:IPInfo/%s", ip)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetIPInfo gets an IPInfo record from the database.
|
// GetIPInfo gets an IPInfo record from the database.
|
||||||
func GetIPInfo(ip net.IP) (*IPInfo, error) {
|
func GetIPInfo(ip string) (*IPInfo, error) {
|
||||||
key := makeIPInfoKey(ip)
|
key := makeIPInfoKey(ip)
|
||||||
|
|
||||||
r, err := ipInfoDatabase.Get(key)
|
r, err := ipInfoDatabase.Get(key)
|
||||||
|
@ -57,6 +57,17 @@ func GetIPInfo(ip net.IP) (*IPInfo, error) {
|
||||||
return new, nil
|
return new, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// AddDomain adds a domain to the list and reports back if it was added, or was already present.
|
||||||
|
func (ipi *IPInfo) AddDomain(domain string) (added bool) {
|
||||||
|
if !utils.StringInSlice(ipi.Domains, domain) {
|
||||||
|
newDomains := make([]string, 1, len(ipi.Domains)+1)
|
||||||
|
newDomains[0] = domain
|
||||||
|
ipi.Domains = append(newDomains, ipi.Domains...)
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
// Save saves the IPInfo record to the database.
|
// Save saves the IPInfo record to the database.
|
||||||
func (ipi *IPInfo) Save() error {
|
func (ipi *IPInfo) Save() error {
|
||||||
ipi.SetKey(makeIPInfoKey(ipi.IP))
|
ipi.SetKey(makeIPInfoKey(ipi.IP))
|
||||||
|
|
|
@ -31,6 +31,7 @@ func start() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// GetIntelAndRRs returns intel and DNS resource records for the given domain.
|
||||||
func GetIntelAndRRs(domain string, qtype dns.Type, securityLevel uint8) (intel *Intel, rrs *RRCache) {
|
func GetIntelAndRRs(domain string, qtype dns.Type, securityLevel uint8) (intel *Intel, rrs *RRCache) {
|
||||||
intel, err := GetIntel(domain)
|
intel, err := GetIntel(domain)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -15,6 +15,7 @@ import (
|
||||||
"github.com/Safing/portbase/log"
|
"github.com/Safing/portbase/log"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// DNS Classes
|
||||||
const (
|
const (
|
||||||
DNSClassMulticast = dns.ClassINET | 1<<15
|
DNSClassMulticast = dns.ClassINET | 1<<15
|
||||||
)
|
)
|
||||||
|
|
|
@ -15,7 +15,7 @@ import (
|
||||||
"github.com/Safing/portmaster/intel"
|
"github.com/Safing/portmaster/intel"
|
||||||
"github.com/Safing/portmaster/network"
|
"github.com/Safing/portmaster/network"
|
||||||
"github.com/Safing/portmaster/network/netutils"
|
"github.com/Safing/portmaster/network/netutils"
|
||||||
"github.com/Safing/portmaster/portmaster"
|
"github.com/Safing/portmaster/firewall"
|
||||||
)
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
@ -113,7 +113,7 @@ func handleRequest(w dns.ResponseWriter, query *dns.Msg) {
|
||||||
// check profile before we even get intel and rr
|
// check profile before we even get intel and rr
|
||||||
if connection.Verdict == network.UNDECIDED {
|
if connection.Verdict == network.UNDECIDED {
|
||||||
// start = time.Now()
|
// start = time.Now()
|
||||||
portmaster.DecideOnConnectionBeforeIntel(connection, fqdn)
|
firewall.DecideOnConnectionBeforeIntel(connection, fqdn)
|
||||||
// log.Tracef("nameserver: took %s to make decision", time.Since(start))
|
// log.Tracef("nameserver: took %s to make decision", time.Since(start))
|
||||||
}
|
}
|
||||||
if connection.Verdict == network.BLOCK || connection.Verdict == network.DROP {
|
if connection.Verdict == network.BLOCK || connection.Verdict == network.DROP {
|
||||||
|
@ -138,7 +138,7 @@ func handleRequest(w dns.ResponseWriter, query *dns.Msg) {
|
||||||
|
|
||||||
// do a full check with intel
|
// do a full check with intel
|
||||||
if connection.Verdict == network.UNDECIDED {
|
if connection.Verdict == network.UNDECIDED {
|
||||||
rrCache = portmaster.DecideOnConnectionAfterIntel(connection, fqdn, rrCache)
|
rrCache = firewall.DecideOnConnectionAfterIntel(connection, fqdn, rrCache)
|
||||||
}
|
}
|
||||||
if rrCache == nil || connection.Verdict == network.BLOCK || connection.Verdict == network.DROP {
|
if rrCache == nil || connection.Verdict == network.BLOCK || connection.Verdict == network.DROP {
|
||||||
nxDomain(w, query)
|
nxDomain(w, query)
|
||||||
|
@ -163,6 +163,7 @@ func handleRequest(w dns.ResponseWriter, query *dns.Msg) {
|
||||||
ipInfo, err := intel.GetIPInfo(v.AAAA.String())
|
ipInfo, err := intel.GetIPInfo(v.AAAA.String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ipInfo = &intel.IPInfo{
|
ipInfo = &intel.IPInfo{
|
||||||
|
IP:
|
||||||
Domains: []string{fqdn},
|
Domains: []string{fqdn},
|
||||||
}
|
}
|
||||||
ipInfo.Create(v.AAAA.String())
|
ipInfo.Create(v.AAAA.String())
|
||||||
|
|
|
@ -8,6 +8,11 @@ import (
|
||||||
"github.com/Safing/portmaster/process"
|
"github.com/Safing/portmaster/process"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
deadLinksTimeout = 5 * time.Minute
|
||||||
|
thresholdDuration = 1 * time.Minute
|
||||||
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
go cleaner()
|
go cleaner()
|
||||||
}
|
}
|
||||||
|
@ -21,18 +26,21 @@ func cleaner() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func markDeadLinks() {
|
func cleanLinks() {
|
||||||
activeIDs := process.GetActiveConnectionIDs()
|
activeIDs := process.GetActiveConnectionIDs()
|
||||||
|
|
||||||
allLinksLock.RLock()
|
dataLock.Lock()
|
||||||
defer allLinksLock.RUnlock()
|
defer dataLock.Lock()
|
||||||
|
|
||||||
now := time.Now().Unix()
|
now := time.Now().Unix()
|
||||||
var found bool
|
deleteOlderThan := time.Now().Add(-deadLinksTimeout).Unix()
|
||||||
for key, link := range allLinks {
|
|
||||||
|
|
||||||
// skip dead links
|
var found bool
|
||||||
if link.Ended > 0 {
|
for key, link := range links {
|
||||||
|
|
||||||
|
// delete dead links
|
||||||
|
if link.Ended > 0 && link.Ended < deleteOlderThan {
|
||||||
|
link.Delete()
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -54,50 +62,18 @@ func markDeadLinks() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func purgeDeadFor(age time.Duration) {
|
func cleanConnections() {
|
||||||
connections := make(map[*Connection]bool)
|
dataLock.Lock()
|
||||||
processes := make(map[*process.Process]bool)
|
defer dataLock.Lock()
|
||||||
|
|
||||||
allLinksLock.Lock()
|
threshold := time.Now().Add(-thresholdDuration).Unix()
|
||||||
defer allLinksLock.Unlock()
|
for _, conn := range connections {
|
||||||
|
if conn.FirstLinkEstablished < threshold && conn.LinkCount == 0 {
|
||||||
// delete old dead links
|
conn.Delete()
|
||||||
// make a list of connections without links
|
|
||||||
ageAgo := time.Now().Add(-1 * age).Unix()
|
|
||||||
for key, link := range allLinks {
|
|
||||||
if link.Ended != 0 && link.Ended < ageAgo {
|
|
||||||
link.Delete()
|
|
||||||
delete(allLinks, key)
|
|
||||||
_, ok := connections[link.Connection()]
|
|
||||||
if !ok {
|
|
||||||
connections[link.Connection()] = false
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
connections[link.Connection()] = true
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
// delete connections without links
|
|
||||||
// make a list of processes without connections
|
func cleanProcesses() {
|
||||||
for conn, active := range connections {
|
process.CleanProcessStorage(thresholdDuration)
|
||||||
if conn != nil {
|
|
||||||
if !active {
|
|
||||||
conn.Delete()
|
|
||||||
_, ok := processes[conn.Process()]
|
|
||||||
if !ok {
|
|
||||||
processes[conn.Process()] = false
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
processes[conn.Process()] = true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// delete processes without connections
|
|
||||||
for proc, active := range processes {
|
|
||||||
if proc != nil && !active {
|
|
||||||
proc.Delete()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
package network
|
package network
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"sync"
|
"sync"
|
||||||
|
@ -19,67 +20,69 @@ type Connection struct {
|
||||||
record.Base
|
record.Base
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
|
|
||||||
Domain string
|
Domain string
|
||||||
Direction bool
|
Direction bool
|
||||||
Intel *intel.Intel
|
Intel *intel.Intel
|
||||||
process *process.Process
|
process *process.Process
|
||||||
Verdict Verdict
|
Verdict Verdict
|
||||||
Reason string
|
Reason string
|
||||||
Inspect bool
|
Inspect bool
|
||||||
|
|
||||||
FirstLinkEstablished int64
|
FirstLinkEstablished int64
|
||||||
LastLinkEstablished int64
|
LastLinkEstablished int64
|
||||||
|
LinkCount uint
|
||||||
}
|
}
|
||||||
|
|
||||||
// Process returns the process that owns the connection.
|
// Process returns the process that owns the connection.
|
||||||
func (m *Connection) Process() *process.Process {
|
func (conn *Connection) Process() *process.Process {
|
||||||
return m.process
|
return conn.process
|
||||||
}
|
}
|
||||||
|
|
||||||
// CantSay sets the connection verdict to "can't say", the connection will be further analysed.
|
// CantSay sets the connection verdict to "can't say", the connection will be further analysed.
|
||||||
func (m *Connection) CantSay() {
|
func (conn *Connection) CantSay() {
|
||||||
if m.Verdict != CANTSAY {
|
if conn.Verdict != CANTSAY {
|
||||||
m.Verdict = CANTSAY
|
conn.Verdict = CANTSAY
|
||||||
m.Save()
|
conn.Save()
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Drop sets the connection verdict to drop.
|
// Drop sets the connection verdict to drop.
|
||||||
func (m *Connection) Drop() {
|
func (conn *Connection) Drop() {
|
||||||
if m.Verdict != DROP {
|
if conn.Verdict != DROP {
|
||||||
m.Verdict = DROP
|
conn.Verdict = DROP
|
||||||
m.Save()
|
conn.Save()
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Block sets the connection verdict to block.
|
// Block sets the connection verdict to block.
|
||||||
func (m *Connection) Block() {
|
func (conn *Connection) Block() {
|
||||||
if m.Verdict != BLOCK {
|
if conn.Verdict != BLOCK {
|
||||||
m.Verdict = BLOCK
|
conn.Verdict = BLOCK
|
||||||
m.Save()
|
conn.Save()
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Accept sets the connection verdict to accept.
|
// Accept sets the connection verdict to accept.
|
||||||
func (m *Connection) Accept() {
|
func (conn *Connection) Accept() {
|
||||||
if m.Verdict != ACCEPT {
|
if conn.Verdict != ACCEPT {
|
||||||
m.Verdict = ACCEPT
|
conn.Verdict = ACCEPT
|
||||||
m.Save()
|
conn.Save()
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddReason adds a human readable string as to why a certain verdict was set in regard to this connection
|
// AddReason adds a human readable string as to why a certain verdict was set in regard to this connection
|
||||||
func (m *Connection) AddReason(newReason string) {
|
func (conn *Connection) AddReason(newReason string) {
|
||||||
m.Lock()
|
conn.Lock()
|
||||||
defer m.Unlock()
|
defer conn.Unlock()
|
||||||
|
|
||||||
if m.Reason != "" {
|
if conn.Reason != "" {
|
||||||
m.Reason += " | "
|
conn.Reason += " | "
|
||||||
}
|
}
|
||||||
m.Reason += newReason
|
conn.Reason += newReason
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetConnectionByFirstPacket returns the matching connection from the internal storage.
|
// GetConnectionByFirstPacket returns the matching connection from the internal storage.
|
||||||
|
@ -92,16 +95,17 @@ func GetConnectionByFirstPacket(pkt packet.Packet) (*Connection, error) {
|
||||||
|
|
||||||
// if INBOUND
|
// if INBOUND
|
||||||
if direction {
|
if direction {
|
||||||
connection, err := GetConnectionFromProcessNamespace(proc, "I")
|
connection, ok := GetConnection(proc.Pid, "I")
|
||||||
if err != nil {
|
if !ok {
|
||||||
connection = &Connection{
|
connection = &Connection{
|
||||||
Domain: "I",
|
Domain: "I",
|
||||||
Direction: true,
|
Direction: Inbound,
|
||||||
process: proc,
|
process: proc,
|
||||||
Inspect: true,
|
Inspect: true,
|
||||||
FirstLinkEstablished: time.Now().Unix(),
|
FirstLinkEstablished: time.Now().Unix(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
connection.process.AddConnection()
|
||||||
return connection, nil
|
return connection, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -109,28 +113,32 @@ func GetConnectionByFirstPacket(pkt packet.Packet) (*Connection, error) {
|
||||||
ipinfo, err := intel.GetIPInfo(pkt.FmtRemoteIP())
|
ipinfo, err := intel.GetIPInfo(pkt.FmtRemoteIP())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// if no domain could be found, it must be a direct connection
|
// if no domain could be found, it must be a direct connection
|
||||||
connection, err := GetConnectionFromProcessNamespace(proc, "D")
|
connection, ok := GetConnection(proc.Pid, "D")
|
||||||
if err != nil {
|
if !ok {
|
||||||
connection = &Connection{
|
connection = &Connection{
|
||||||
Domain: "D",
|
Domain: "D",
|
||||||
|
Direction: Outbound,
|
||||||
process: proc,
|
process: proc,
|
||||||
Inspect: true,
|
Inspect: true,
|
||||||
FirstLinkEstablished: time.Now().Unix(),
|
FirstLinkEstablished: time.Now().Unix(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
connection.process.AddConnection()
|
||||||
return connection, nil
|
return connection, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// FIXME: how to handle multiple possible domains?
|
// FIXME: how to handle multiple possible domains?
|
||||||
connection, err := GetConnectionFromProcessNamespace(proc, ipinfo.Domains[0])
|
connection, ok := GetConnection(proc.Pid, ipinfo.Domains[0])
|
||||||
if err != nil {
|
if !ok {
|
||||||
connection = &Connection{
|
connection = &Connection{
|
||||||
Domain: ipinfo.Domains[0],
|
Domain: ipinfo.Domains[0],
|
||||||
|
Direction: Outbound,
|
||||||
process: proc,
|
process: proc,
|
||||||
Inspect: true,
|
Inspect: true,
|
||||||
FirstLinkEstablished: time.Now().Unix(),
|
FirstLinkEstablished: time.Now().Unix(),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
connection.process.AddConnection()
|
||||||
return connection, nil
|
return connection, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -149,19 +157,70 @@ func GetConnectionByDNSRequest(ip net.IP, port uint16, fqdn string) (*Connection
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
connection, err := GetConnectionFromProcessNamespace(proc, fqdn)
|
connection, ok := GetConnection(proc.Pid, fqdn)
|
||||||
if err != nil {
|
if !ok {
|
||||||
connection = &Connection{
|
connection = &Connection{
|
||||||
Domain: fqdn,
|
Domain: fqdn,
|
||||||
process: proc,
|
process: proc,
|
||||||
Inspect: true,
|
Inspect: true,
|
||||||
}
|
}
|
||||||
connection.CreateInProcessNamespace()
|
connection.process.AddConnection()
|
||||||
|
connection.Save()
|
||||||
}
|
}
|
||||||
return connection, nil
|
return connection, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddLink applies the connection to the link.
|
// GetConnection fetches a connection object from the internal storage.
|
||||||
|
func GetConnection(pid int, domain string) (conn *Connection, ok bool) {
|
||||||
|
dataLock.RLock()
|
||||||
|
defer dataLock.RUnlock()
|
||||||
|
conn, ok = connections[fmt.Sprintf("%d/%s", pid, domain)]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (conn *Connection) makeKey() string {
|
||||||
|
return fmt.Sprintf("%d/%s", conn.process.Pid, conn.Domain)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save saves the connection object in the storage and propagates the change.
|
||||||
|
func (conn *Connection) Save() error {
|
||||||
|
if conn.process == nil {
|
||||||
|
return errors.New("cannot save connection without process")
|
||||||
|
}
|
||||||
|
|
||||||
|
if conn.DatabaseKey() == "" {
|
||||||
|
conn.SetKey(fmt.Sprintf("network:tree/%d/%s", conn.process.Pid, conn.Domain))
|
||||||
|
conn.CreateMeta()
|
||||||
|
}
|
||||||
|
|
||||||
|
key := conn.makeKey()
|
||||||
|
dataLock.RLock()
|
||||||
|
_, ok := connections[key]
|
||||||
|
dataLock.RUnlock()
|
||||||
|
|
||||||
|
if !ok {
|
||||||
|
dataLock.Lock()
|
||||||
|
connections[key] = conn
|
||||||
|
dataLock.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
dbController.PushUpdate(conn)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete deletes a connection from the storage and propagates the change.
|
||||||
|
func (conn *Connection) Delete() {
|
||||||
|
dataLock.Lock()
|
||||||
|
defer dataLock.Unlock()
|
||||||
|
delete(connections, conn.makeKey())
|
||||||
|
conn.Lock()
|
||||||
|
defer conn.Lock()
|
||||||
|
conn.Meta().Delete()
|
||||||
|
dbController.PushUpdate(conn)
|
||||||
|
conn.process.RemoveConnection()
|
||||||
|
}
|
||||||
|
|
||||||
|
// AddLink applies the connection to the link and increases sets counter and timestamps.
|
||||||
func (conn *Connection) AddLink(link *Link) {
|
func (conn *Connection) AddLink(link *Link) {
|
||||||
link.Lock()
|
link.Lock()
|
||||||
defer link.Unlock()
|
defer link.Unlock()
|
||||||
|
@ -172,6 +231,7 @@ func (conn *Connection) AddLink(link *Link) {
|
||||||
|
|
||||||
conn.Lock()
|
conn.Lock()
|
||||||
defer conn.Unlock()
|
defer conn.Unlock()
|
||||||
|
conn.LinkCount++
|
||||||
conn.LastLinkEstablished = time.Now().Unix()
|
conn.LastLinkEstablished = time.Now().Unix()
|
||||||
if conn.FirstLinkEstablished == 0 {
|
if conn.FirstLinkEstablished == 0 {
|
||||||
conn.FirstLinkEstablished = conn.FirstLinkEstablished
|
conn.FirstLinkEstablished = conn.FirstLinkEstablished
|
||||||
|
@ -179,24 +239,32 @@ func (conn *Connection) AddLink(link *Link) {
|
||||||
conn.Save()
|
conn.Save()
|
||||||
}
|
}
|
||||||
|
|
||||||
// FORMATTING
|
// RemoveLink lowers the link counter by one.
|
||||||
|
func (conn *Connection) RemoveLink() {
|
||||||
func (m *Connection) String() string {
|
conn.Lock()
|
||||||
switch m.Domain {
|
defer conn.Unlock()
|
||||||
case "I":
|
if conn.LinkCount > 0 {
|
||||||
if m.process == nil {
|
conn.LinkCount--
|
||||||
return "? <- *"
|
}
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%s <- *", m.process.String())
|
|
||||||
case "D":
|
// String returns a string representation of Connection.
|
||||||
if m.process == nil {
|
func (conn *Connection) String() string {
|
||||||
return "? -> *"
|
switch conn.Domain {
|
||||||
}
|
case "I":
|
||||||
return fmt.Sprintf("%s -> *", m.process.String())
|
if conn.process == nil {
|
||||||
default:
|
return "? <- *"
|
||||||
if m.process == nil {
|
}
|
||||||
return fmt.Sprintf("? -> %s", m.Domain)
|
return fmt.Sprintf("%s <- *", conn.process.String())
|
||||||
}
|
case "D":
|
||||||
return fmt.Sprintf("%s -> %s", m.process.String(), m.Domain)
|
if conn.process == nil {
|
||||||
|
return "? -> *"
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("%s -> *", conn.process.String())
|
||||||
|
default:
|
||||||
|
if conn.process == nil {
|
||||||
|
return fmt.Sprintf("? -> %s", conn.Domain)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("%s -> %s", conn.process.String(), conn.Domain)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,14 +17,12 @@ import (
|
||||||
type FirewallHandler func(pkt packet.Packet, link *Link)
|
type FirewallHandler func(pkt packet.Packet, link *Link)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
linkTimeout = 10 * time.Minute
|
linkTimeout = 10 * time.Minute
|
||||||
allLinks = make(map[string]*Link)
|
|
||||||
allLinksLock sync.RWMutex
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Link describes a distinct physical connection (e.g. TCP connection) - like an instance - of a Connection.
|
// Link describes a distinct physical connection (e.g. TCP connection) - like an instance - of a Connection.
|
||||||
type Link struct {
|
type Link struct {
|
||||||
record.Record
|
record.Base
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
|
|
||||||
ID string
|
ID string
|
||||||
|
@ -120,21 +118,22 @@ func (link *Link) Save() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
if link.DatabaseKey() == "" {
|
if link.DatabaseKey() == "" {
|
||||||
|
|
||||||
link.SetKey(fmt.Sprintf("network:tree/%d/%s/%s", link.connection.Process().Pid, link.connection.Domain, link.ID))
|
link.SetKey(fmt.Sprintf("network:tree/%d/%s/%s", link.connection.Process().Pid, link.connection.Domain, link.ID))
|
||||||
link.CreateMeta()
|
link.CreateMeta()
|
||||||
|
|
||||||
dataLock.Lock()
|
|
||||||
defer dataLock.Unlock()
|
|
||||||
|
|
||||||
links[link.ID] = link
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if link.orphaned && link.connection != nil {
|
dataLock.RLock()
|
||||||
p.SetKey()
|
_, ok := links[link.ID]
|
||||||
|
dataLock.RUnlock()
|
||||||
|
|
||||||
|
if !ok {
|
||||||
|
dataLock.Lock()
|
||||||
|
links[link.ID] = link
|
||||||
|
dataLock.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
dbController.PushUpdate(link)
|
dbController.PushUpdate(link)
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Delete deletes a link from the storage and propagates the change.
|
// Delete deletes a link from the storage and propagates the change.
|
||||||
|
@ -146,6 +145,7 @@ func (link *Link) Delete() {
|
||||||
defer link.Lock()
|
defer link.Lock()
|
||||||
link.Meta().Delete()
|
link.Meta().Delete()
|
||||||
dbController.PushUpdate(link)
|
dbController.PushUpdate(link)
|
||||||
|
link.connection.RemoveLink()
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetLink fetches a Link from the database from the default namespace for this object
|
// GetLink fetches a Link from the database from the default namespace for this object
|
||||||
|
@ -159,7 +159,7 @@ func GetLink(id string) (*Link, bool) {
|
||||||
|
|
||||||
// GetOrCreateLinkByPacket returns the associated Link for a packet and a bool expressing if the Link was newly created
|
// GetOrCreateLinkByPacket returns the associated Link for a packet and a bool expressing if the Link was newly created
|
||||||
func GetOrCreateLinkByPacket(pkt packet.Packet) (*Link, bool) {
|
func GetOrCreateLinkByPacket(pkt packet.Packet) (*Link, bool) {
|
||||||
link, ok := GetLink(pkt.GetConnectionID())
|
link, ok := GetLink(pkt.GetLinkID())
|
||||||
if ok {
|
if ok {
|
||||||
return link, false
|
return link, false
|
||||||
}
|
}
|
||||||
|
@ -169,7 +169,7 @@ func GetOrCreateLinkByPacket(pkt packet.Packet) (*Link, bool) {
|
||||||
// CreateLinkFromPacket creates a new Link based on Packet.
|
// CreateLinkFromPacket creates a new Link based on Packet.
|
||||||
func CreateLinkFromPacket(pkt packet.Packet) *Link {
|
func CreateLinkFromPacket(pkt packet.Packet) *Link {
|
||||||
link := &Link{
|
link := &Link{
|
||||||
ID: pkt.GetConnectionID(),
|
ID: pkt.GetLinkID(),
|
||||||
Verdict: UNDECIDED,
|
Verdict: UNDECIDED,
|
||||||
Started: time.Now().Unix(),
|
Started: time.Now().Unix(),
|
||||||
RemoteAddress: pkt.FmtRemoteAddress(),
|
RemoteAddress: pkt.FmtRemoteAddress(),
|
||||||
|
|
|
@ -106,10 +106,10 @@ type TCPUDPHeader struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
type PacketBase struct {
|
type PacketBase struct {
|
||||||
connectionID string
|
linkID string
|
||||||
Direction bool
|
Direction bool
|
||||||
InTunnel bool
|
InTunnel bool
|
||||||
Payload []byte
|
Payload []byte
|
||||||
*IPHeader
|
*IPHeader
|
||||||
*TCPUDPHeader
|
*TCPUDPHeader
|
||||||
}
|
}
|
||||||
|
@ -146,25 +146,25 @@ func (pkt *PacketBase) IPVersion() IPVersion {
|
||||||
return pkt.Version
|
return pkt.Version
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pkt *PacketBase) GetConnectionID() string {
|
func (pkt *PacketBase) GetLinkID() string {
|
||||||
if pkt.connectionID == "" {
|
if pkt.linkID == "" {
|
||||||
pkt.createConnectionID()
|
pkt.createLinkID()
|
||||||
}
|
}
|
||||||
return pkt.connectionID
|
return pkt.linkID
|
||||||
}
|
}
|
||||||
|
|
||||||
func (pkt *PacketBase) createConnectionID() {
|
func (pkt *PacketBase) createLinkID() {
|
||||||
if pkt.IPHeader.Protocol == TCP || pkt.IPHeader.Protocol == UDP {
|
if pkt.IPHeader.Protocol == TCP || pkt.IPHeader.Protocol == UDP {
|
||||||
if pkt.Direction {
|
if pkt.Direction {
|
||||||
pkt.connectionID = fmt.Sprintf("%d-%s-%d-%s-%d", pkt.Protocol, pkt.Dst, pkt.DstPort, pkt.Src, pkt.SrcPort)
|
pkt.linkID = fmt.Sprintf("%d-%s-%d-%s-%d", pkt.Protocol, pkt.Dst, pkt.DstPort, pkt.Src, pkt.SrcPort)
|
||||||
} else {
|
} else {
|
||||||
pkt.connectionID = fmt.Sprintf("%d-%s-%d-%s-%d", pkt.Protocol, pkt.Src, pkt.SrcPort, pkt.Dst, pkt.DstPort)
|
pkt.linkID = fmt.Sprintf("%d-%s-%d-%s-%d", pkt.Protocol, pkt.Src, pkt.SrcPort, pkt.Dst, pkt.DstPort)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
if pkt.Direction {
|
if pkt.Direction {
|
||||||
pkt.connectionID = fmt.Sprintf("%d-%s-%s", pkt.Protocol, pkt.Dst, pkt.Src)
|
pkt.linkID = fmt.Sprintf("%d-%s-%s", pkt.Protocol, pkt.Dst, pkt.Src)
|
||||||
} else {
|
} else {
|
||||||
pkt.connectionID = fmt.Sprintf("%d-%s-%s", pkt.Protocol, pkt.Src, pkt.Dst)
|
pkt.linkID = fmt.Sprintf("%d-%s-%s", pkt.Protocol, pkt.Src, pkt.Dst)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -299,7 +299,7 @@ type Packet interface {
|
||||||
IsOutbound() bool
|
IsOutbound() bool
|
||||||
SetInbound()
|
SetInbound()
|
||||||
SetOutbound()
|
SetOutbound()
|
||||||
GetConnectionID() string
|
GetLinkID() string
|
||||||
IPVersion() IPVersion
|
IPVersion() IPVersion
|
||||||
|
|
||||||
// MATCHING
|
// MATCHING
|
||||||
|
|
|
@ -3,6 +3,7 @@ package process
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"sync"
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/Safing/portbase/database"
|
"github.com/Safing/portbase/database"
|
||||||
"github.com/tevino/abool"
|
"github.com/tevino/abool"
|
||||||
|
@ -16,10 +17,6 @@ var (
|
||||||
dbControllerFlag = abool.NewBool(false)
|
dbControllerFlag = abool.NewBool(false)
|
||||||
)
|
)
|
||||||
|
|
||||||
func makeProcessKey(pid int) string {
|
|
||||||
return fmt.Sprintf("network:tree/%d", pid)
|
|
||||||
}
|
|
||||||
|
|
||||||
// GetProcessFromStorage returns a process from the internal storage.
|
// GetProcessFromStorage returns a process from the internal storage.
|
||||||
func GetProcessFromStorage(pid int) (*Process, bool) {
|
func GetProcessFromStorage(pid int) (*Process, bool) {
|
||||||
processesLock.RLock()
|
processesLock.RLock()
|
||||||
|
@ -48,13 +45,18 @@ func (p *Process) Save() {
|
||||||
defer p.Unlock()
|
defer p.Unlock()
|
||||||
|
|
||||||
if p.DatabaseKey() == "" {
|
if p.DatabaseKey() == "" {
|
||||||
p.SetKey(makeProcessKey(p.Pid))
|
p.SetKey(fmt.Sprintf("network:tree/%d", p.Pid))
|
||||||
p.CreateMeta()
|
p.CreateMeta()
|
||||||
|
}
|
||||||
|
|
||||||
|
processesLock.RLock()
|
||||||
|
_, ok := processes[p.Pid]
|
||||||
|
processesLock.RUnlock()
|
||||||
|
|
||||||
|
if !ok {
|
||||||
processesLock.Lock()
|
processesLock.Lock()
|
||||||
defer processesLock.Unlock()
|
|
||||||
|
|
||||||
processes[p.Pid] = p
|
processes[p.Pid] = p
|
||||||
|
processesLock.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
if dbControllerFlag.IsSet() {
|
if dbControllerFlag.IsSet() {
|
||||||
|
@ -62,6 +64,33 @@ func (p *Process) Save() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Delete deletes a process from the storage and propagates the change.
|
||||||
|
func (p *Process) Delete() {
|
||||||
|
processesLock.Lock()
|
||||||
|
defer processesLock.Unlock()
|
||||||
|
delete(processes, p.Pid)
|
||||||
|
p.Lock()
|
||||||
|
defer p.Lock()
|
||||||
|
p.Meta().Delete()
|
||||||
|
|
||||||
|
if dbControllerFlag.IsSet() {
|
||||||
|
dbController.PushUpdate(p)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CleanProcessStorage cleans the storage from old processes.
|
||||||
|
func CleanProcessStorage(thresholdDuration time.Duration) {
|
||||||
|
processesLock.Lock()
|
||||||
|
defer processesLock.Unlock()
|
||||||
|
|
||||||
|
threshold := time.Now().Add(-thresholdDuration).Unix()
|
||||||
|
for _, p := range processes {
|
||||||
|
if p.FirstConnectionEstablished < threshold && p.ConnectionCount == 0 {
|
||||||
|
p.Delete()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// SetDBController sets the database controller and allows the package to push database updates on a save. It must be set by the package that registers the "network" database.
|
// SetDBController sets the database controller and allows the package to push database updates on a save. It must be set by the package that registers the "network" database.
|
||||||
func SetDBController(controller *database.Controller) {
|
func SetDBController(controller *database.Controller) {
|
||||||
dbController = controller
|
dbController = controller
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"runtime"
|
"runtime"
|
||||||
"sync"
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
processInfo "github.com/shirou/gopsutil/process"
|
processInfo "github.com/shirou/gopsutil/process"
|
||||||
|
|
||||||
|
@ -32,14 +33,38 @@ type Process struct {
|
||||||
Name string
|
Name string
|
||||||
Icon string
|
Icon string
|
||||||
// Icon is a path to the icon and is either prefixed "f:" for filepath, "d:" for database cache path or "c:"/"a:" for a the icon key to fetch it from a company / authoritative node and cache it in its own cache.
|
// Icon is a path to the icon and is either prefixed "f:" for filepath, "d:" for database cache path or "c:"/"a:" for a the icon key to fetch it from a company / authoritative node and cache it in its own cache.
|
||||||
|
|
||||||
|
FirstConnectionEstablished int64
|
||||||
|
LastConnectionEstablished int64
|
||||||
|
ConnectionCount uint
|
||||||
}
|
}
|
||||||
|
|
||||||
// Strings returns a string represenation of process
|
// Strings returns a string represenation of process
|
||||||
func (m *Process) String() string {
|
func (p *Process) String() string {
|
||||||
if m == nil {
|
if p == nil {
|
||||||
return "?"
|
return "?"
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%s:%s:%d", m.UserName, m.Path, m.Pid)
|
return fmt.Sprintf("%s:%s:%d", p.UserName, p.Path, p.Pid)
|
||||||
|
}
|
||||||
|
|
||||||
|
// AddConnection increases the connection counter and the last connection timestamp.
|
||||||
|
func (p *Process) AddConnection() {
|
||||||
|
p.Lock()
|
||||||
|
defer p.Unlock()
|
||||||
|
p.ConnectionCount++
|
||||||
|
p.LastConnectionEstablished = time.Now().Unix()
|
||||||
|
if p.FirstConnectionEstablished == 0 {
|
||||||
|
p.FirstConnectionEstablished = p.LastConnectionEstablished
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoveConnection lowers the connection counter by one.
|
||||||
|
func (p *Process) RemoveConnection() {
|
||||||
|
p.Lock()
|
||||||
|
defer p.Unlock()
|
||||||
|
if p.ConnectionCount > 0 {
|
||||||
|
p.ConnectionCount--
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetOrFindProcess returns the process for the given PID.
|
// GetOrFindProcess returns the process for the given PID.
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package process
|
package process
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
// UnknownProcess is used when a process cannot be found.
|
||||||
UnknownProcess = &Process{
|
UnknownProcess = &Process{
|
||||||
UserID: -1,
|
UserID: -1,
|
||||||
UserName: "Unknown",
|
UserName: "Unknown",
|
||||||
|
|
Loading…
Add table
Reference in a new issue