| 1 | + | use std::{ |
| 2 | + | fmt::Debug, |
| 3 | + | net::{IpAddr, Ipv4Addr, Ipv6Addr}, |
| 4 | + | }; |
| 5 | + | |
| 6 | + | use aya::{ |
| 7 | + | maps::{AsyncPerfEventArray, HashMap, MapData}, |
| 8 | + | programs::lsm::LsmLink, |
| 9 | + | util::online_cpus, |
| 10 | + | }; |
| 11 | + | use bytes::BytesMut; |
| 12 | + | use guardity_common::{ |
| 13 | + | alerts as ebpf_alerts, |
| 14 | + | policy::{self as ebpf_policy, IpAddrs}, |
| 15 | + | }; |
| 16 | + | use once_cell::sync::Lazy; |
| 17 | + | use tokio::{ |
| 18 | + | sync::{ |
| 19 | + | mpsc::{self, Receiver}, |
| 20 | + | Mutex, |
| 21 | + | }, |
| 22 | + | task, |
| 23 | + | }; |
| 24 | + | |
| 25 | + | use crate::{alerts, policy, InodeSubjectMap}; |
| 26 | + | |
| 27 | + | static INODE_SUBJECT_MAP: Lazy<Mutex<InodeSubjectMap>> = |
| 28 | + | Lazy::new(|| Mutex::new(InodeSubjectMap::default())); |
| 29 | + | |
| 30 | + | pub struct All { |
| 31 | + | pub bprm_check_security: BprmCheckSecurity, |
| 32 | + | pub file_open: FileOpen, |
| 33 | + | pub task_fix_setuid: TaskFixSetuid, |
| 34 | + | pub socket_bind: SocketBind, |
| 35 | + | pub socket_connect: SocketConnect, |
| 36 | + | } |
| 37 | + | |
| 38 | + | impl All { |
| 39 | + | pub async fn add_policy(&mut self, policy: policy::Policy) -> anyhow::Result<()> { |
| 40 | + | match policy { |
| 41 | + | policy::Policy::FileOpen(policy) => self.file_open.add_policy(policy).await?, |
| 42 | + | policy::Policy::TaskFixSetuid(policy) => { |
| 43 | + | self.task_fix_setuid.add_policy(policy).await? |
| 44 | + | } |
| 45 | + | policy::Policy::SocketBind(policy) => self.socket_bind.add_policy(policy).await?, |
| 46 | + | policy::Policy::SocketConnect(policy) => self.socket_connect.add_policy(policy).await?, |
| 47 | + | } |
| 48 | + | |
| 49 | + | Ok(()) |
| 50 | + | } |
| 51 | + | } |
| 52 | + | |
| 53 | + | pub struct BprmCheckSecurity { |
| 54 | + | #[allow(dead_code)] |
| 55 | + | pub(crate) program_link: Option<LsmLink>, |
| 56 | + | pub(crate) perf_array: AsyncPerfEventArray<MapData>, |
| 57 | + | } |
| 58 | + | |
| 59 | + | impl BprmCheckSecurity { |
| 60 | + | pub async fn alerts(&mut self) -> anyhow::Result<Receiver<alerts::BprmCheckSecurity>> { |
| 61 | + | perf_array_alerts::<ebpf_alerts::BprmCheckSecurity, alerts::BprmCheckSecurity>( |
| 62 | + | &mut self.perf_array, |
| 63 | + | ) |
| 64 | + | .await |
| 65 | + | } |
| 66 | + | } |
| 67 | + | |
| 68 | + | pub struct FileOpen { |
| 69 | + | #[allow(dead_code)] |
| 70 | + | pub(crate) program_link: Option<LsmLink>, |
| 71 | + | pub(crate) allowed_map: HashMap<MapData, u64, ebpf_policy::Paths>, |
| 72 | + | pub(crate) denied_map: HashMap<MapData, u64, ebpf_policy::Paths>, |
| 73 | + | pub(crate) perf_array: AsyncPerfEventArray<MapData>, |
| 74 | + | } |
| 75 | + | |
| 76 | + | impl FileOpen { |
| 77 | + | pub async fn add_policy(&mut self, policy: policy::FileOpen) -> anyhow::Result<()> { |
| 78 | + | let bin_inode = { |
| 79 | + | let mut map = INODE_SUBJECT_MAP.lock().await; |
| 80 | + | map.resolve_path(policy.subject)? |
| 81 | + | }; |
| 82 | + | |
| 83 | + | let allow: ebpf_policy::Paths = policy.allow.into(); |
| 84 | + | let deny: ebpf_policy::Paths = policy.deny.into(); |
| 85 | + | |
| 86 | + | self.allowed_map.insert(bin_inode, allow, 0)?; |
| 87 | + | self.denied_map.insert(bin_inode, deny, 0)?; |
| 88 | + | |
| 89 | + | Ok(()) |
| 90 | + | } |
| 91 | + | |
| 92 | + | pub async fn list_policies(&self) -> anyhow::Result<Vec<policy::FileOpen>> { |
| 93 | + | let mut policies = Vec::new(); |
| 94 | + | |
| 95 | + | for res in self.allowed_map.iter() { |
| 96 | + | let (bin_inode, allow) = res?; |
| 97 | + | let deny = self.denied_map.get(&bin_inode, 0)?; |
| 98 | + | |
| 99 | + | let subject = { |
| 100 | + | let map = INODE_SUBJECT_MAP.lock().await; |
| 101 | + | map.resolve_inode(bin_inode) |
| 102 | + | }; |
| 103 | + | |
| 104 | + | policies.push(policy::FileOpen { |
| 105 | + | subject, |
| 106 | + | allow: allow.into(), |
| 107 | + | deny: deny.into(), |
| 108 | + | }); |
| 109 | + | } |
| 110 | + | |
| 111 | + | Ok(policies) |
| 112 | + | } |
| 113 | + | |
| 114 | + | pub async fn alerts(&mut self) -> anyhow::Result<Receiver<alerts::FileOpen>> { |
| 115 | + | perf_array_alerts::<ebpf_alerts::FileOpen, alerts::FileOpen>(&mut self.perf_array).await |
| 116 | + | } |
| 117 | + | } |
| 118 | + | |
| 119 | + | pub struct TaskFixSetuid { |
| 120 | + | #[allow(dead_code)] |
| 121 | + | pub(crate) program_link: Option<LsmLink>, |
| 122 | + | pub(crate) allowed_map: HashMap<MapData, u64, u8>, |
| 123 | + | pub(crate) denied_map: HashMap<MapData, u64, u8>, |
| 124 | + | pub(crate) perf_array: AsyncPerfEventArray<MapData>, |
| 125 | + | } |
| 126 | + | |
| 127 | + | impl TaskFixSetuid { |
| 128 | + | pub async fn add_policy(&mut self, policy: policy::TaskFixSetuid) -> anyhow::Result<()> { |
| 129 | + | let bin_inode = { |
| 130 | + | let mut map = INODE_SUBJECT_MAP.lock().await; |
| 131 | + | map.resolve_path(policy.subject)? |
| 132 | + | }; |
| 133 | + | |
| 134 | + | if policy.allow { |
| 135 | + | self.allowed_map.insert(bin_inode, 0, 0)?; |
| 136 | + | } else { |
| 137 | + | self.denied_map.insert(bin_inode, 0, 0)?; |
| 138 | + | } |
| 139 | + | |
| 140 | + | Ok(()) |
| 141 | + | } |
| 142 | + | |
| 143 | + | pub async fn list_policies(&self) -> anyhow::Result<Vec<policy::TaskFixSetuid>> { |
| 144 | + | let mut policies = Vec::new(); |
| 145 | + | |
| 146 | + | for res in self.allowed_map.iter() { |
| 147 | + | let (bin_inode, _) = res?; |
| 148 | + | |
| 149 | + | let subject = { |
| 150 | + | let map = INODE_SUBJECT_MAP.lock().await; |
| 151 | + | map.resolve_inode(bin_inode) |
| 152 | + | }; |
| 153 | + | |
| 154 | + | policies.push(policy::TaskFixSetuid { |
| 155 | + | subject, |
| 156 | + | allow: true, |
| 157 | + | }); |
| 158 | + | } |
| 159 | + | |
| 160 | + | for res in self.denied_map.iter() { |
| 161 | + | let (bin_inode, _) = res?; |
| 162 | + | |
| 163 | + | let subject = { |
| 164 | + | let map = INODE_SUBJECT_MAP.lock().await; |
| 165 | + | map.resolve_inode(bin_inode) |
| 166 | + | }; |
| 167 | + | |
| 168 | + | policies.push(policy::TaskFixSetuid { |
| 169 | + | subject, |
| 170 | + | allow: false, |
| 171 | + | }); |
| 172 | + | } |
| 173 | + | |
| 174 | + | Ok(policies) |
| 175 | + | } |
| 176 | + | |
| 177 | + | pub async fn alerts(&mut self) -> anyhow::Result<Receiver<alerts::TaskFixSetuid>> { |
| 178 | + | perf_array_alerts::<ebpf_alerts::TaskFixSetuid, alerts::TaskFixSetuid>(&mut self.perf_array) |
| 179 | + | .await |
| 180 | + | } |
| 181 | + | } |
| 182 | + | |
| 183 | + | pub struct SocketBind { |
| 184 | + | #[allow(dead_code)] |
| 185 | + | pub(crate) program_link: Option<LsmLink>, |
| 186 | + | pub(crate) allowed_map: HashMap<MapData, u64, ebpf_policy::Ports>, |
| 187 | + | pub(crate) denied_map: HashMap<MapData, u64, ebpf_policy::Ports>, |
| 188 | + | pub(crate) perf_array: AsyncPerfEventArray<MapData>, |
| 189 | + | } |
| 190 | + | |
| 191 | + | impl SocketBind { |
| 192 | + | pub async fn add_policy(&mut self, policy: policy::SocketBind) -> anyhow::Result<()> { |
| 193 | + | let bin_inode = { |
| 194 | + | let mut map = INODE_SUBJECT_MAP.lock().await; |
| 195 | + | map.resolve_path(policy.subject)? |
| 196 | + | }; |
| 197 | + | |
| 198 | + | let allow: ebpf_policy::Ports = policy.allow.into(); |
| 199 | + | let deny: ebpf_policy::Ports = policy.deny.into(); |
| 200 | + | |
| 201 | + | self.allowed_map.insert(bin_inode, allow, 0)?; |
| 202 | + | self.denied_map.insert(bin_inode, deny, 0)?; |
| 203 | + | |
| 204 | + | Ok(()) |
| 205 | + | } |
| 206 | + | |
| 207 | + | pub async fn list_policies(&self) -> anyhow::Result<Vec<policy::SocketBind>> { |
| 208 | + | let mut policies = Vec::new(); |
| 209 | + | |
| 210 | + | for res in self.allowed_map.iter() { |
| 211 | + | let (bin_inode, allow) = res?; |
| 212 | + | let deny = self.denied_map.get(&bin_inode, 0)?; |
| 213 | + | |
| 214 | + | let subject = { |
| 215 | + | let map = INODE_SUBJECT_MAP.lock().await; |
| 216 | + | map.resolve_inode(bin_inode) |
| 217 | + | }; |
| 218 | + | |
| 219 | + | policies.push(policy::SocketBind { |
| 220 | + | subject, |
| 221 | + | allow: allow.into(), |
| 222 | + | deny: deny.into(), |
| 223 | + | }); |
| 224 | + | } |
| 225 | + | |
| 226 | + | Ok(policies) |
| 227 | + | } |
| 228 | + | |
| 229 | + | pub async fn alerts(&mut self) -> anyhow::Result<Receiver<alerts::SocketBind>> { |
| 230 | + | perf_array_alerts::<ebpf_alerts::SocketBind, alerts::SocketBind>(&mut self.perf_array).await |
| 231 | + | } |
| 232 | + | } |
| 233 | + | |
| 234 | + | pub struct SocketConnect { |
| 235 | + | #[allow(dead_code)] |
| 236 | + | pub(crate) program_link: Option<LsmLink>, |
| 237 | + | pub(crate) allowed_map_v4: HashMap<MapData, u64, ebpf_policy::Ipv4Addrs>, |
| 238 | + | pub(crate) denied_map_v4: HashMap<MapData, u64, ebpf_policy::Ipv4Addrs>, |
| 239 | + | pub(crate) allowed_map_v6: HashMap<MapData, u64, ebpf_policy::Ipv6Addrs>, |
| 240 | + | pub(crate) denied_map_v6: HashMap<MapData, u64, ebpf_policy::Ipv6Addrs>, |
| 241 | + | pub(crate) perf_array: AsyncPerfEventArray<MapData>, |
| 242 | + | } |
| 243 | + | |
| 244 | + | impl SocketConnect { |
| 245 | + | pub async fn add_policy(&mut self, policy: policy::SocketConnect) -> anyhow::Result<()> { |
| 246 | + | let bin_inode = { |
| 247 | + | let mut map = INODE_SUBJECT_MAP.lock().await; |
| 248 | + | map.resolve_path(policy.subject)? |
| 249 | + | }; |
| 250 | + | |
| 251 | + | let (allow_v4, allow_v6) = policy.allow.into_ebpf(); |
| 252 | + | let (deny_v4, deny_v6) = policy.deny.into_ebpf(); |
| 253 | + | |
| 254 | + | self.allowed_map_v4.insert(bin_inode, allow_v4, 0)?; |
| 255 | + | self.denied_map_v4.insert(bin_inode, deny_v4, 0)?; |
| 256 | + | self.allowed_map_v6.insert(bin_inode, allow_v6, 0)?; |
| 257 | + | self.denied_map_v6.insert(bin_inode, deny_v6, 0)?; |
| 258 | + | |
| 259 | + | Ok(()) |
| 260 | + | } |
| 261 | + | |
| 262 | + | pub async fn list_policies(&self) -> anyhow::Result<Vec<policy::SocketConnect>> { |
| 263 | + | let mut policies = Vec::new(); |
| 264 | + | |
| 265 | + | for res in self.allowed_map_v4.iter() { |
| 266 | + | let (bin_inode, allow_v4) = res?; |
| 267 | + | let deny_v4 = self.denied_map_v4.get(&bin_inode, 0)?; |
| 268 | + | let allow_v6 = self.allowed_map_v6.get(&bin_inode, 0)?; |
| 269 | + | let deny_v6 = self.denied_map_v6.get(&bin_inode, 0)?; |
| 270 | + | |
| 271 | + | let subject = { |
| 272 | + | let map = INODE_SUBJECT_MAP.lock().await; |
| 273 | + | map.resolve_inode(bin_inode) |
| 274 | + | }; |
| 275 | + | |
| 276 | + | let allow = if allow_v4.all() { |
| 277 | + | if allow_v6.all() { |
| 278 | + | policy::Addresses::All |
| 279 | + | } else { |
| 280 | + | return Err(anyhow::anyhow!("Inconsistent policy state")); |
| 281 | + | } |
| 282 | + | } else { |
| 283 | + | if allow_v4.all() { |
| 284 | + | return Err(anyhow::anyhow!("Inconsistent policy state")); |
| 285 | + | } |
| 286 | + | let mut addrs = Vec::new(); |
| 287 | + | for addr in allow_v4.addrs.iter() { |
| 288 | + | addrs.push(IpAddr::V4(Ipv4Addr::from(addr.to_owned()))); |
| 289 | + | } |
| 290 | + | for addr in allow_v6.addrs.iter() { |
| 291 | + | addrs.push(IpAddr::V6(Ipv6Addr::from(addr.to_owned()))); |
| 292 | + | } |
| 293 | + | policy::Addresses::Addresses(addrs) |
| 294 | + | }; |
| 295 | + | let deny = if deny_v4.all() { |
| 296 | + | if deny_v6.all() { |
| 297 | + | policy::Addresses::All |
| 298 | + | } else { |
| 299 | + | return Err(anyhow::anyhow!("Inconsistent policy state")); |
| 300 | + | } |
| 301 | + | } else { |
| 302 | + | if deny_v4.all() { |
| 303 | + | return Err(anyhow::anyhow!("Inconsistent policy state")); |
| 304 | + | } |
| 305 | + | let mut addrs = Vec::new(); |
| 306 | + | for addr in deny_v4.addrs.iter() { |
| 307 | + | addrs.push(IpAddr::V4(Ipv4Addr::from(addr.to_owned()))); |
| 308 | + | } |
| 309 | + | for addr in deny_v6.addrs.iter() { |
| 310 | + | addrs.push(IpAddr::V6(Ipv6Addr::from(addr.to_owned()))); |
| 311 | + | } |
| 312 | + | policy::Addresses::Addresses(addrs) |
| 313 | + | }; |
| 314 | + | |
| 315 | + | policies.push(policy::SocketConnect { |
| 316 | + | subject, |
| 317 | + | allow, |
| 318 | + | deny, |
| 319 | + | }); |
| 320 | + | } |
| 321 | + | |
| 322 | + | Ok(policies) |
| 323 | + | } |
| 324 | + | |
| 325 | + | pub async fn alerts(&mut self) -> anyhow::Result<Receiver<alerts::SocketConnect>> { |
| 326 | + | perf_array_alerts::<ebpf_alerts::SocketConnect, alerts::SocketConnect>(&mut self.perf_array) |
| 327 | + | .await |
| 328 | + | } |
| 329 | + | } |
| 330 | + | |
| 331 | + | pub async fn perf_array_alerts<E, U>( |
| 332 | + | perf_array: &mut AsyncPerfEventArray<MapData>, |
| 333 | + | ) -> anyhow::Result<Receiver<U>> |
| 334 | + | where |
| 335 | + | E: ebpf_alerts::Alert, |
| 336 | + | U: alerts::Alert + Debug + Send + From<E> + 'static, |
| 337 | + | { |
| 338 | + | let (tx, rx) = mpsc::channel(32); |
| 339 | + | |
| 340 | + | let cpus = online_cpus()?; |
| 341 | + | for cpu_id in cpus { |
| 342 | + | let tx = tx.clone(); |
| 343 | + | let mut buf = perf_array.open(cpu_id, None)?; |
| 344 | + | |
| 345 | + | task::spawn(async move { |
| 346 | + | let mut buffers = (0..10) |
| 347 | + | .map(|_| BytesMut::with_capacity(1024)) |
| 348 | + | .collect::<Vec<_>>(); |
| 349 | + | loop { |
| 350 | + | let events = buf.read_events(&mut buffers).await.unwrap(); |
| 351 | + | for buf in buffers.iter_mut().take(events.read) { |
| 352 | + | let alert: U = { |
| 353 | + | let ptr = buf.as_ptr() as *const E; |
| 354 | + | let alert = unsafe { ptr.read_unaligned() }; |
| 355 | + | alert.into() |
| 356 | + | }; |
| 357 | + | tx.send(alert).await.unwrap(); |
| 358 | + | } |
| 359 | + | } |
| 360 | + | }); |
| 361 | + | } |
| 362 | + | |
| 363 | + | Ok(rx) |
| 364 | + | } |
| 365 | + | |