mirror of
https://github.com/safing/portmaster
synced 2025-09-02 10:39:22 +00:00
Tunnel flag bugfix and refactoring
This commit is contained in:
parent
fdc8ef5698
commit
edcb93bf5c
5 changed files with 88 additions and 159 deletions
|
@ -44,20 +44,22 @@ var (
|
||||||
ownPID = os.Getpid()
|
ownPID = os.Getpid()
|
||||||
)
|
)
|
||||||
|
|
||||||
const configChangeEvent = "config change"
|
const (
|
||||||
const profileConfigChangeEvent = "profile config change"
|
configChangeEvent = "config change"
|
||||||
|
profileConfigChangeEvent = "profile config change"
|
||||||
|
onSPNConnectEvent = "spn connect"
|
||||||
|
)
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
// TODO: Move interception module to own package (dir).
|
// TODO: Move interception module to own package (dir).
|
||||||
interceptionModule = modules.Register("interception", interceptionPrep, interceptionStart, interceptionStop, "base", "updates", "network", "notifications", "profiles")
|
interceptionModule = modules.Register("interception", interceptionPrep, interceptionStart, interceptionStop, "base", "updates", "network", "notifications", "profiles")
|
||||||
|
|
||||||
network.SetDefaultFirewallHandler(defaultHandler)
|
network.SetDefaultFirewallHandler(defaultHandler)
|
||||||
|
|
||||||
// setup event callback when spn has connected
|
|
||||||
captain.ResetConnections = resetAllConnectionsVerdict
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func interceptionPrep() error {
|
func interceptionPrep() error {
|
||||||
|
// Reset connections every time configuration changes
|
||||||
|
// this will be triggered on spn enable/disable
|
||||||
err := interceptionModule.RegisterEventHook(
|
err := interceptionModule.RegisterEventHook(
|
||||||
"config",
|
"config",
|
||||||
configChangeEvent,
|
configChangeEvent,
|
||||||
|
@ -71,10 +73,26 @@ func interceptionPrep() error {
|
||||||
_ = fmt.Errorf("failed registering event hook: %w", err)
|
_ = fmt.Errorf("failed registering event hook: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Reset connections every time profile changes
|
||||||
err = interceptionModule.RegisterEventHook(
|
err = interceptionModule.RegisterEventHook(
|
||||||
"profiles",
|
"profiles",
|
||||||
profileConfigChangeEvent,
|
profileConfigChangeEvent,
|
||||||
"firewall config change event",
|
"firewall profile change event",
|
||||||
|
func(ctx context.Context, _ interface{}) error {
|
||||||
|
resetAllConnections()
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
_ = fmt.Errorf("failed registering event hook: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reset connections when spn is connected
|
||||||
|
// disconnecting is triggered on config change event because disconnection happens instantly
|
||||||
|
err = interceptionModule.RegisterEventHook(
|
||||||
|
"captain",
|
||||||
|
onSPNConnectEvent,
|
||||||
|
"firewall spn connect event",
|
||||||
func(ctx context.Context, _ interface{}) error {
|
func(ctx context.Context, _ interface{}) error {
|
||||||
resetAllConnections()
|
resetAllConnections()
|
||||||
return nil
|
return nil
|
||||||
|
@ -92,11 +110,12 @@ func interceptionPrep() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func resetAllConnections() {
|
func resetAllConnections() {
|
||||||
log.Critical("Reseting all connections")
|
// Resetting will force all the connection to be evaluated by the firewall again
|
||||||
|
// this will set new verdicts if configuration was update or spn has been disabled or enabled
|
||||||
log.Info("interception: resetting all connections")
|
log.Info("interception: resetting all connections")
|
||||||
err := interception.DeleteAllConnections()
|
err := interception.ResetAllConnections()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Criticalf("failed to run ResetAllExternalConnections: %q", err)
|
log.Errorf("failed to reset all connections: %q", err)
|
||||||
}
|
}
|
||||||
for _, id := range network.GetAllIDs() {
|
for _, id := range network.GetAllIDs() {
|
||||||
conn, err := getConnectionByID(id)
|
conn, err := getConnectionByID(id)
|
||||||
|
@ -106,6 +125,8 @@ func resetAllConnections() {
|
||||||
|
|
||||||
if !captain.IsExcepted(conn.Entity.IP) {
|
if !captain.IsExcepted(conn.Entity.IP) {
|
||||||
conn.SetFirewallHandler(initialHandler)
|
conn.SetFirewallHandler(initialHandler)
|
||||||
|
// Don't keep the previous tunneled value
|
||||||
|
conn.Tunneled = false
|
||||||
// Reset entity if it exists.
|
// Reset entity if it exists.
|
||||||
if conn.Entity != nil {
|
if conn.Entity != nil {
|
||||||
conn.Entity.ResetLists()
|
conn.Entity.ResetLists()
|
||||||
|
@ -172,8 +193,6 @@ func handlePacket(ctx context.Context, pkt packet.Packet) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
//log.Errorf("%s -> %s", pkt, conn.Verdict)
|
|
||||||
|
|
||||||
// handle packet
|
// handle packet
|
||||||
conn.HandlePacket(pkt)
|
conn.HandlePacket(pkt)
|
||||||
}
|
}
|
||||||
|
@ -240,37 +259,6 @@ func getConnectionByID(id string) (*network.Connection, error) {
|
||||||
return connection, nil
|
return connection, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func resetAllConnectionsVerdict(ctx context.Context) {
|
|
||||||
resetAllConnections()
|
|
||||||
// interception.CloseAllConnections()
|
|
||||||
// network.ClearConnections()
|
|
||||||
// log.Critical("Clearing connections")
|
|
||||||
// interception.CloseAllConnections()
|
|
||||||
// ids := network.GetAllIDs()
|
|
||||||
// for _, id := range ids {
|
|
||||||
// connI, err, _ := getConnectionSingleInflight.Do(id, func() (interface{}, error) {
|
|
||||||
// // First, check for an existing connection.
|
|
||||||
// conn, ok := network.GetConnection(id)
|
|
||||||
// if ok {
|
|
||||||
// return conn, nil
|
|
||||||
// }
|
|
||||||
|
|
||||||
// return nil, nil
|
|
||||||
// })
|
|
||||||
|
|
||||||
// if err != nil || connI == nil {
|
|
||||||
// log.Errorf("Null connection with id %s", id)
|
|
||||||
// continue
|
|
||||||
// }
|
|
||||||
|
|
||||||
// conn := connI.(*network.Connection) //nolint:forcetypeassert // Can only be a *network.Connection.
|
|
||||||
// log.Errorf("Resetting connection for %s:%d", conn.LocalIP, conn.Entity.Port)
|
|
||||||
// // conn.Reset("Initialling SPN", "")
|
|
||||||
// checkTunneling(ctx, conn, nil)
|
|
||||||
// DecideOnConnection(ctx, conn, nil)
|
|
||||||
// }
|
|
||||||
}
|
|
||||||
|
|
||||||
// fastTrackedPermit quickly permits certain network critical or internal connections.
|
// fastTrackedPermit quickly permits certain network critical or internal connections.
|
||||||
func fastTrackedPermit(pkt packet.Packet) (handled bool) {
|
func fastTrackedPermit(pkt packet.Packet) (handled bool) {
|
||||||
meta := pkt.Info()
|
meta := pkt.Info()
|
||||||
|
|
|
@ -1,95 +0,0 @@
|
||||||
package interception
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/binary"
|
|
||||||
"fmt"
|
|
||||||
"net"
|
|
||||||
|
|
||||||
ct "github.com/florianl/go-conntrack"
|
|
||||||
|
|
||||||
"github.com/safing/portbase/log"
|
|
||||||
"github.com/safing/portmaster/firewall/interception/nfq"
|
|
||||||
)
|
|
||||||
|
|
||||||
// CloseAllConnections closes all active connection on conntrack.
|
|
||||||
func CloseAllConnections() error {
|
|
||||||
nfct, err := ct.Open(&ct.Config{})
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() { _ = nfct.Close() }()
|
|
||||||
|
|
||||||
connections, err := nfct.Dump(ct.Conntrack, ct.IPv4)
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
log.Criticalf("Number of connections: %d", len(connections))
|
|
||||||
for _, connection := range connections {
|
|
||||||
fmt.Printf("[%2d] %s - %s\n", connection.Origin.Proto.Number, connection.Origin.Src, connection.Origin.Dst)
|
|
||||||
err := nfct.Delete(ct.Conntrack, ct.IPv4, connection)
|
|
||||||
log.Errorf("Error deleting connection %q", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeleteAllConnections deletes all entries from conntrack table.
|
|
||||||
func DeleteAllConnections() error {
|
|
||||||
nfct, err := ct.Open(&ct.Config{})
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() { _ = nfct.Close() }()
|
|
||||||
|
|
||||||
connections, err := getAllPermanentConnections(nfct)
|
|
||||||
|
|
||||||
for _, connection := range connections {
|
|
||||||
_ = nfct.Delete(ct.Conntrack, ct.IPv4, connection)
|
|
||||||
}
|
|
||||||
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
// DeleteConnection deletes a specific connection.
|
|
||||||
func DeleteConnection(sourceIP net.IP, sourcePort uint16, destinationIP net.IP, destinationPort uint16) error {
|
|
||||||
nfct, err := ct.Open(&ct.Config{})
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() { _ = nfct.Close() }()
|
|
||||||
|
|
||||||
filter := &ct.IPTuple{Src: &sourceIP, Dst: &destinationIP, Proto: &ct.ProtoTuple{SrcPort: &sourcePort, DstPort: &destinationPort}}
|
|
||||||
connectionFilter := ct.Con{
|
|
||||||
Origin: filter,
|
|
||||||
}
|
|
||||||
|
|
||||||
connections, _ := nfct.Get(ct.Conntrack, ct.IPv4, connectionFilter)
|
|
||||||
for _, connection := range connections {
|
|
||||||
_ = nfct.Delete(ct.Conntrack, ct.IPv4, connection)
|
|
||||||
}
|
|
||||||
|
|
||||||
connectionFilter.Origin = nil
|
|
||||||
connectionFilter.Reply = filter
|
|
||||||
connections, err = nfct.Get(ct.Conntrack, ct.IPv4, connectionFilter)
|
|
||||||
for _, connection := range connections {
|
|
||||||
_ = nfct.Delete(ct.Conntrack, ct.IPv4, connection)
|
|
||||||
}
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
|
|
||||||
func getAllPermanentConnections(nfct *ct.Nfct) ([]ct.Con, error) {
|
|
||||||
permanentFlags := []uint32{nfq.MarkAccept, nfq.MarkBlock, nfq.MarkDrop, nfq.MarkAcceptAlways, nfq.MarkBlockAlways, nfq.MarkDropAlways, nfq.MarkRerouteSPN}
|
|
||||||
filter := ct.FilterAttr{}
|
|
||||||
filter.MarkMask = []byte{0xFF, 0xFF, 0xFF, 0xFF}
|
|
||||||
filter.Mark = []byte{0x00, 0x00, 0x00, 0x00} // 4 zeros starting value
|
|
||||||
connections := make([]ct.Con, 0)
|
|
||||||
for _, mark := range permanentFlags {
|
|
||||||
binary.BigEndian.PutUint32(filter.Mark, mark) // Little endian is in reverse not sure why. BigEndian makes it in correct order.
|
|
||||||
currentConnections, err := nfct.Query(ct.Conntrack, ct.IPv4, filter)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
connections = append(connections, currentConnections...)
|
|
||||||
}
|
|
||||||
return connections, nil
|
|
||||||
}
|
|
53
firewall/interception/nfq/conntrack.go
Normal file
53
firewall/interception/nfq/conntrack.go
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
//go:build linux
|
||||||
|
|
||||||
|
package nfq
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/binary"
|
||||||
|
|
||||||
|
ct "github.com/florianl/go-conntrack"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeleteAllMarkedConnection deletes all marked entries from the conntrack table.
|
||||||
|
func DeleteAllMarkedConnection() error {
|
||||||
|
nfct, err := ct.Open(&ct.Config{})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer func() { _ = nfct.Close() }()
|
||||||
|
|
||||||
|
// Delete all ipv4 marked connections
|
||||||
|
connections := getAllMarkedConnections(nfct, ct.IPv4)
|
||||||
|
for _, connection := range connections {
|
||||||
|
_ = nfct.Delete(ct.Conntrack, ct.IPv4, connection)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete all ipv6 marked connections
|
||||||
|
connections = getAllMarkedConnections(nfct, ct.IPv6)
|
||||||
|
for _, connection := range connections {
|
||||||
|
_ = nfct.Delete(ct.Conntrack, ct.IPv6, connection)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getAllMarkedConnections(nfct *ct.Nfct, f ct.Family) []ct.Con {
|
||||||
|
// initialize variables
|
||||||
|
permanentFlags := [...]uint32{MarkAccept, MarkBlock, MarkDrop, MarkAcceptAlways, MarkBlockAlways, MarkDropAlways, MarkRerouteNS, MarkRerouteSPN}
|
||||||
|
filter := ct.FilterAttr{}
|
||||||
|
filter.MarkMask = []byte{0xFF, 0xFF, 0xFF, 0xFF}
|
||||||
|
filter.Mark = []byte{0x00, 0x00, 0x00, 0x00} // 4 zeros starting value
|
||||||
|
connections := make([]ct.Con, 0)
|
||||||
|
|
||||||
|
// get all connections from the specified family (ipv4 or ipv6)
|
||||||
|
for _, mark := range permanentFlags {
|
||||||
|
binary.BigEndian.PutUint32(filter.Mark, mark) // Little endian is in reverse not sure why. BigEndian makes it in correct order.
|
||||||
|
currentConnections, err := nfct.Query(ct.Conntrack, f, filter)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
connections = append(connections, currentConnections...)
|
||||||
|
}
|
||||||
|
|
||||||
|
return connections
|
||||||
|
}
|
|
@ -341,3 +341,8 @@ func (dnfq *disabledNfQueue) PacketChannel() <-chan packet.Packet {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (dnfq *disabledNfQueue) Destroy() {}
|
func (dnfq *disabledNfQueue) Destroy() {}
|
||||||
|
|
||||||
|
// ResetAllConnections resets all connections so they are forced to go thought the firewall again
|
||||||
|
func ResetAllConnections() error {
|
||||||
|
return nfq.DeleteAllMarkedConnection()
|
||||||
|
}
|
||||||
|
|
|
@ -451,12 +451,6 @@ func GetAllIDs() []string {
|
||||||
return append(conns.keys(), dnsConns.keys()...)
|
return append(conns.keys(), dnsConns.keys()...)
|
||||||
}
|
}
|
||||||
|
|
||||||
// ClearConnections Clear all connections.
|
|
||||||
func ClearConnections() {
|
|
||||||
dnsConns = newConnectionStore()
|
|
||||||
conns = newConnectionStore()
|
|
||||||
}
|
|
||||||
|
|
||||||
// SetLocalIP sets the local IP address together with its network scope. The
|
// SetLocalIP sets the local IP address together with its network scope. The
|
||||||
// connection is not locked for this.
|
// connection is not locked for this.
|
||||||
func (conn *Connection) SetLocalIP(ip net.IP) {
|
func (conn *Connection) SetLocalIP(ip net.IP) {
|
||||||
|
@ -526,22 +520,6 @@ func (conn *Connection) Failed(reason, reasonOptionKey string) {
|
||||||
conn.FailedWithContext(reason, reasonOptionKey, nil)
|
conn.FailedWithContext(reason, reasonOptionKey, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Reset resets all values of the connection.
|
|
||||||
func (conn *Connection) Reset(reason, reasonOptionKey string) {
|
|
||||||
conn.Verdict.Current = VerdictUndecided
|
|
||||||
conn.Verdict.Previous = VerdictUndecided
|
|
||||||
conn.Verdict.User = VerdictUndecided
|
|
||||||
conn.Reason.Msg = reason
|
|
||||||
conn.Reason.Context = nil
|
|
||||||
|
|
||||||
conn.Reason.OptionKey = ""
|
|
||||||
conn.Reason.Profile = ""
|
|
||||||
if reasonOptionKey != "" && conn.Process() != nil {
|
|
||||||
conn.Reason.OptionKey = reasonOptionKey
|
|
||||||
conn.Reason.Profile = conn.Process().Profile().GetProfileSource(conn.Reason.OptionKey)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// SetVerdict sets a new verdict for the connection, making sure it does not interfere with previous verdicts.
|
// SetVerdict sets a new verdict for the connection, making sure it does not interfere with previous verdicts.
|
||||||
func (conn *Connection) SetVerdict(newVerdict Verdict, reason, reasonOptionKey string, reasonCtx interface{}) (ok bool) {
|
func (conn *Connection) SetVerdict(newVerdict Verdict, reason, reasonOptionKey string, reasonCtx interface{}) (ok bool) {
|
||||||
// if newVerdict >= conn.Verdict.Current {
|
// if newVerdict >= conn.Verdict.Current {
|
||||||
|
|
Loading…
Add table
Reference in a new issue