Files
firegex-traffic-viewer/backend/modules/porthijack/nftables.py

108 lines
5.0 KiB
Python
Raw Normal View History

2022-08-11 16:11:32 +02:00
from typing import List
from modules.porthijack.models import Service
2022-08-11 16:11:32 +02:00
from utils import ip_parse, ip_family, NFTableManager
2022-08-10 21:35:30 +02:00
class FiregexHijackRule():
def __init__(self, proto:str, public_port:int,proxy_port:int, ip_int:str, target:str, id:int):
self.id = id
2022-08-11 16:11:32 +02:00
self.target = target
self.proto = proto
self.public_port = public_port
self.proxy_port = proxy_port
2022-08-11 16:11:32 +02:00
self.ip_int = str(ip_int)
2022-08-10 21:35:30 +02:00
2022-08-11 16:11:32 +02:00
def __eq__(self, o: object) -> bool:
if isinstance(o, FiregexHijackRule):
return self.public_port == o.public_port and self.proto == o.proto and ip_parse(self.ip_int) == ip_parse(o.ip_int)
elif isinstance(o, Service):
return self.public_port == o.public_port and self.proto == o.proto and ip_parse(self.ip_int) == ip_parse(o.ip_int)
2022-08-11 16:11:32 +02:00
return False
2022-08-10 21:35:30 +02:00
class FiregexTables(NFTableManager):
2022-08-11 13:12:12 +00:00
prerouting_porthijack = "prerouting_porthijack"
postrouting_porthijack = "postrouting_porthijack"
2022-08-10 21:35:30 +02:00
def __init__(self):
super().__init__([
{"add":{"chain":{
"family":"inet",
"table":self.table_name,
"name":self.prerouting_porthijack,
2022-08-11 13:12:12 +00:00
"type":"filter",
"hook":"prerouting",
"prio":-300,
"policy":"accept"
}}},
{"add":{"chain":{
"family":"inet",
"table":self.table_name,
"name":self.postrouting_porthijack,
"type":"filter",
"hook":"postrouting",
"prio":-300,
2022-08-10 21:35:30 +02:00
"policy":"accept"
}}}
],[
{"flush":{"chain":{"table":self.table_name,"family":"inet", "name":self.prerouting_porthijack}}},
2022-08-11 13:12:12 +00:00
{"delete":{"chain":{"table":self.table_name,"family":"inet", "name":self.prerouting_porthijack}}},
{"flush":{"chain":{"table":self.table_name,"family":"inet", "name":self.postrouting_porthijack}}},
{"delete":{"chain":{"table":self.table_name,"family":"inet", "name":self.postrouting_porthijack}}}
2022-08-10 21:35:30 +02:00
])
def add(self, srv:Service):
for ele in self.get():
if ele.__eq__(srv): return
ip_int = ip_parse(srv.ip_int)
2022-08-10 21:35:30 +02:00
ip_addr = str(ip_int).split("/")[0]
ip_addr_cidr = int(str(ip_int).split("/")[1])
self.cmd({ "insert":{ "rule": {
"family": "inet",
"table": self.table_name,
"chain": self.prerouting_porthijack,
"expr": [
{'match': {'left': {'payload': {'protocol': ip_family(ip_int), 'field': 'daddr'}}, 'op': '==', 'right': {"prefix": {"addr": ip_addr, "len": ip_addr_cidr}}}},
{'match': {'left': { "payload": {"protocol": str(srv.proto), "field": "dport"}}, "op": "==", "right": int(srv.public_port)}},
{'mangle': {'key': {'payload': {'protocol': str(srv.proto), 'field': 'dport'}}, 'value': int(srv.proxy_port)}}
2022-08-10 21:35:30 +02:00
]
}}})
2022-08-11 13:12:12 +00:00
self.cmd({ "insert":{ "rule": {
2022-08-10 21:35:30 +02:00
"family": "inet",
"table": self.table_name,
2022-08-11 13:12:12 +00:00
"chain": self.postrouting_porthijack,
2022-08-10 21:35:30 +02:00
"expr": [
2022-08-11 13:12:12 +00:00
{'match': {'left': {'payload': {'protocol': ip_family(ip_int), 'field': 'saddr'}}, 'op': '==', 'right': {"prefix": {"addr": ip_addr, "len": ip_addr_cidr}}}},
{'match': {'left': { "payload": {"protocol": str(srv.proto), "field": "sport"}}, "op": "==", "right": int(srv.proxy_port)}},
{'mangle': {'key': {'payload': {'protocol': str(srv.proto), 'field': 'sport'}}, 'value': int(srv.public_port)}}
2022-08-10 21:35:30 +02:00
]
}}})
2022-08-11 16:11:32 +02:00
def get(self) -> List[FiregexHijackRule]:
2022-08-11 16:11:32 +02:00
res = []
for filter in self.list_rules(tables=[self.table_name], chains=[self.prerouting_porthijack,self.postrouting_porthijack]):
2022-08-11 16:11:32 +02:00
ip_int = None
if isinstance(filter["expr"][0]["match"]["right"],str):
ip_int = str(ip_parse(filter["expr"][0]["match"]["right"]))
else:
ip_int = f'{filter["expr"][0]["match"]["right"]["prefix"]["addr"]}/{filter["expr"][0]["match"]["right"]["prefix"]["len"]}'
res.append(FiregexHijackRule(
2022-08-11 16:11:32 +02:00
target=filter["chain"],
id=int(filter["handle"]),
proto=filter["expr"][1]["match"]["left"]["payload"]["protocol"],
public_port=filter["expr"][1]["match"]["right"] if filter["target"] == self.prerouting_porthijack else filter["expr"][2]["mangle"]["value"],
proxy_port=filter["expr"][1]["match"]["right"] if filter["target"] == self.postrouting_porthijack else filter["expr"][2]["mangle"]["value"],
2022-08-11 16:11:32 +02:00
ip_int=ip_int
))
return res
def delete(self, srv:Service):
for filter in self.get():
if filter.__eq__(srv):
self.cmd({ "delete":{ "rule": {
"family": "inet",
"table": self.table_name,
"chain": filter.target,
"handle": filter.id
}}})