Files
firegex-traffic-viewer/backend/proxy.py

265 lines
10 KiB
Python
Raw Normal View History

2022-07-08 11:35:12 +02:00
from typing import List
2022-07-10 23:30:53 +02:00
from pypacker import interceptor
from pypacker.layer3 import ip, ip6
from pypacker.layer4 import tcp, udp
from subprocess import Popen, PIPE
2022-07-08 11:35:12 +02:00
import os, traceback, pcre, re
QUEUE_BASE_NUM = 1000
class FilterTypes:
INPUT = "FIREGEX-INPUT"
OUTPUT = "FIREGEX-OUTPUT"
class ProtoTypes:
TCP = "tcp"
UDP = "udp"
class IPTables:
2022-07-10 15:05:56 +02:00
def __init__(self, ipv6=False):
self.ipv6 = ipv6
def command(self, params):
if os.geteuid() != 0:
exit("You need to have root privileges to run this script.\nPlease try again, this time using 'sudo'. Exiting.")
2022-07-10 15:05:56 +02:00
return Popen(["ip6tables"]+params if self.ipv6 else ["iptables"]+params, stdout=PIPE, stderr=PIPE).communicate()
2022-07-10 15:05:56 +02:00
def list_filters(self, param):
stdout, strerr = self.command(["-L", str(param), "--line-number", "-n"])
2022-07-11 14:59:34 +02:00
output = [re.findall(r"([^ ]*)[ ]{,10}([^ ]*)[ ]{,5}([^ ]*)[ ]{,5}([^ ]*)[ ]{,5}([^ ]*)[ ]+([^ ]*)[ ]+(.*)", ele) for ele in stdout.decode().split("\n")]
return [{
2022-07-11 14:59:34 +02:00
"id": ele[0][0].strip(),
"target": ele[0][1].strip(),
"prot": ele[0][2].strip(),
"opt": ele[0][3].strip(),
"source": ele[0][4].strip(),
"destination": ele[0][5].strip(),
"details": " ".join(ele[0][6:]).strip() if len(ele[0]) >= 7 else "",
} for ele in output if len(ele) > 0 and ele[0][0].isnumeric()]
2022-07-10 15:05:56 +02:00
def delete_command(self, param, id):
2022-07-11 14:59:34 +02:00
self.command(["-D", str(param), str(id)])
2022-07-10 15:05:56 +02:00
def create_chain(self, name):
self.command(["-N", str(name)])
2022-07-10 15:05:56 +02:00
def flush_chain(self, name):
self.command(["-F", str(name)])
2022-07-10 15:05:56 +02:00
def add_chain_to_input(self, name):
2022-07-11 14:59:34 +02:00
if not self.find_if_filter_exists("INPUT", str(name)):
self.command(["-I", "INPUT", "-j", str(name)])
if not self.find_if_filter_exists("DOCKER-USER", str(name)):
self.command(["-I", "DOCKER-USER", "-j", str(name)])
2022-07-10 15:05:56 +02:00
def add_chain_to_output(self, name):
2022-07-11 14:59:34 +02:00
if not self.find_if_filter_exists("OUTPUT", str(name)):
self.command(["-I", "OUTPUT", "-j", str(name)])
if not self.find_if_filter_exists("FORWARD", str(name)):
self.command(["-I", "FORWARD", "-j", str(name)])
if not self.find_if_filter_exists("DOCKER-USER", str(name)):
self.command(["-I", "DOCKER-USER", "-j", str(name)])
def find_if_filter_exists(self, type, target):
for filter in self.list_filters(type):
if filter["target"] == target:
return True
return False
2022-07-10 15:05:56 +02:00
def add_s_to_c(self, proto, port, queue_range):
init, end = queue_range
if init > end: init, end = end, init
2022-07-10 15:05:56 +02:00
self.command([
"-A", FilterTypes.OUTPUT, "-p", str(proto),
"--sport", str(port), "-j", "NFQUEUE",
"--queue-num" if init == end else "--queue-balance",
f"{init}" if init == end else f"{init}:{end}", "--queue-bypass"
])
2022-07-10 15:05:56 +02:00
def add_c_to_s(self, proto, port, queue_range):
init, end = queue_range
if init > end: init, end = end, init
2022-07-10 15:05:56 +02:00
self.command([
"-A", FilterTypes.INPUT, "-p", str(proto),
"--dport", str(port), "-j", "NFQUEUE",
"--queue-num" if init == end else "--queue-balance",
f"{init}" if init == end else f"{init}:{end}", "--queue-bypass"
])
class FiregexFilter():
2022-07-10 15:05:56 +02:00
def __init__(self, type, number, queue, proto, port, ipv6):
self.type = type
self.id = int(number)
self.queue = queue
self.proto = proto
self.port = int(port)
2022-07-10 15:05:56 +02:00
self.iptable = IPTables(ipv6)
def __repr__(self) -> str:
return f"<FiregexFilter type={self.type} id={self.id} port={self.port} proto={self.proto} queue={self.queue}>"
def delete(self):
2022-07-10 15:05:56 +02:00
self.iptable.delete_command(self.type, self.id)
2022-07-10 23:30:53 +02:00
class Interceptor:
def __init__(self, iptables, c_to_s, s_to_c, proto, ipv6, port, n_threads):
self.proto = proto
self.ipv6 = ipv6
self.itor_c_to_s, codes = self._start_queue(c_to_s, n_threads)
iptables.add_c_to_s(proto, port, codes)
self.itor_s_to_c, codes = self._start_queue(s_to_c, n_threads)
iptables.add_s_to_c(proto, port, codes)
def _start_queue(self,func,n_threads):
def func_wrap(ll_data, ll_proto_id, data, ctx, *args):
pkt_parsed = ip6.IP6(data) if self.ipv6 else ip.IP(data)
2022-07-10 23:30:53 +02:00
try:
level4 = None
if self.proto == ProtoTypes.TCP: level4 = pkt_parsed[tcp.TCP].body_bytes
elif self.proto == ProtoTypes.UDP: level4 = pkt_parsed[udp.UDP].body_bytes
if level4:
if func(level4):
return data, interceptor.NF_ACCEPT
2022-07-10 23:30:53 +02:00
elif self.proto == ProtoTypes.TCP:
pkt_parsed[tcp.TCP].flags &= 0x00
pkt_parsed[tcp.TCP].flags |= tcp.TH_FIN | tcp.TH_ACK
pkt_parsed[tcp.TCP].body_bytes = b""
return pkt_parsed.bin(), interceptor.NF_ACCEPT
else: return b"", interceptor.NF_DROP
else: return pkt_parsed.bin(), interceptor.NF_ACCEPT
except Exception:
traceback.print_exc()
return pkt_parsed.bin(), interceptor.NF_ACCEPT
ictor = interceptor.Interceptor()
starts = QUEUE_BASE_NUM
while True:
if starts >= 65536:
raise Exception("Netfilter queue is full!")
queue_ids = list(range(starts,starts+n_threads))
try:
ictor.start(func_wrap, queue_ids=queue_ids)
break
except interceptor.UnableToBindException as e:
starts = e.queue_id + 1
return ictor, (starts, starts+n_threads-1)
def stop(self):
self.itor_c_to_s.stop()
self.itor_s_to_c.stop()
class FiregexFilterManager:
2022-07-10 15:05:56 +02:00
def __init__(self, ipv6):
self.ipv6 = ipv6
self.iptables = IPTables(ipv6)
self.iptables.create_chain(FilterTypes.INPUT)
self.iptables.create_chain(FilterTypes.OUTPUT)
2022-07-11 14:59:34 +02:00
self.iptables.add_chain_to_input(FilterTypes.INPUT)
self.iptables.add_chain_to_output(FilterTypes.OUTPUT)
def get(self) -> List[FiregexFilter]:
res = []
for filter_type in [FilterTypes.INPUT, FilterTypes.OUTPUT]:
2022-07-10 15:05:56 +02:00
for filter in self.iptables.list_filters(filter_type):
queue_num = None
2022-07-08 11:35:12 +02:00
balanced = re.findall(r"NFQUEUE balance ([0-9]+):([0-9]+)", filter["details"])
numbered = re.findall(r"NFQUEUE num ([0-9]+)", filter["details"])
port = re.findall(r"[sd]pt:([0-9]+)", filter["details"])
2022-07-11 14:59:34 +02:00
if balanced: queue_num = (int(balanced[0][0]), int(balanced[0][1]))
2022-07-08 11:35:12 +02:00
if numbered: queue_num = (int(numbered[0]), int(numbered[0]))
if queue_num and port:
res.append(FiregexFilter(
type=filter_type,
number=filter["id"],
queue=queue_num,
proto=filter["prot"],
2022-07-10 15:05:56 +02:00
port=int(port[0]),
ipv6=self.ipv6
))
return res
2022-07-07 23:34:39 +02:00
def add(self, proto, port, func, n_threads = 1):
for ele in self.get():
if int(port) == ele.port: return None
2022-07-07 23:34:39 +02:00
2022-07-10 23:30:53 +02:00
def c_to_s(pkt): return func(pkt, True)
def s_to_c(pkt): return func(pkt, False)
2022-07-07 23:34:39 +02:00
2022-07-10 23:30:53 +02:00
itor = Interceptor( self.iptables,
c_to_s, s_to_c,
proto, self.ipv6, port,
int(os.getenv("N_THREADS_NFQUEUE","1")))
return itor
def delete_all(self):
for filter_type in [FilterTypes.INPUT, FilterTypes.OUTPUT]:
2022-07-10 15:05:56 +02:00
self.iptables.flush_chain(filter_type)
def delete_by_port(self, port):
for filter in self.get():
if filter.port == int(port):
filter.delete()
2022-06-11 21:57:50 +02:00
class Filter:
2022-06-17 20:48:27 +02:00
def __init__(self, regex, is_case_sensitive=True, is_blacklist=True, c_to_s=False, s_to_c=False, blocked_packets=0, code=None):
2022-06-11 21:57:50 +02:00
self.regex = regex
2022-06-17 20:48:27 +02:00
self.is_case_sensitive = is_case_sensitive
2022-06-11 21:57:50 +02:00
self.is_blacklist = is_blacklist
if c_to_s == s_to_c: c_to_s = s_to_c = True # (False, False) == (True, True)
self.c_to_s = c_to_s
self.s_to_c = s_to_c
2022-06-13 18:44:11 +02:00
self.blocked = blocked_packets
self.code = code
self.compiled_regex = self.compile()
2022-06-11 21:57:50 +02:00
def compile(self):
if isinstance(self.regex, str): self.regex = self.regex.encode()
if not isinstance(self.regex, bytes): raise Exception("Invalid Regex Paramether")
2022-07-08 11:35:12 +02:00
return pcre.compile(self.regex if self.is_case_sensitive else b"(?i)"+self.regex)
def check(self, data):
return True if self.compiled_regex.search(data) else False
2022-06-11 21:57:50 +02:00
class Proxy:
2022-07-10 15:05:56 +02:00
def __init__(self, port, ipv6, filters=None):
self.manager = FiregexFilterManager(ipv6)
2022-07-08 11:35:12 +02:00
self.port = port
2022-07-10 23:30:53 +02:00
self.filters = filters if filters else []
self.interceptor = None
2022-07-08 11:35:12 +02:00
def set_filters(self, filters):
elements_to_pop = len(self.filters)
for ele in filters:
self.filters.append(ele)
for _ in range(elements_to_pop):
self.filters.pop(0)
2022-07-07 21:56:34 +02:00
2022-07-08 11:35:12 +02:00
def start(self):
2022-07-10 23:30:53 +02:00
if not self.interceptor:
self.manager.delete_by_port(self.port)
def regex_filter(pkt, by_client):
try:
for filter in self.filters:
if (by_client and filter.c_to_s) or (not by_client and filter.s_to_c):
match = filter.check(pkt)
if (filter.is_blacklist and match) or (not filter.is_blacklist and not match):
filter.blocked+=1
return False
except IndexError: pass
return True
self.interceptor = self.manager.add(ProtoTypes.TCP, self.port, regex_filter)
2022-06-18 13:05:59 +02:00
2022-07-07 21:56:34 +02:00
def stop(self):
self.manager.delete_by_port(self.port)
2022-07-10 23:30:53 +02:00
if self.interceptor:
self.interceptor.stop()
self.interceptor = None
2022-07-07 21:56:34 +02:00
def restart(self):
self.stop()
2022-07-10 23:30:53 +02:00
self.start()