You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
367 lines
16 KiB
367 lines
16 KiB
#!/usr/bin/env python
|
|
# Copyright 2014-2015, Tresys Technology, LLC
|
|
#
|
|
# This file is part of SETools.
|
|
#
|
|
# SETools is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 2 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# SETools is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with SETools. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
from __future__ import print_function
|
|
import setools
|
|
import argparse
|
|
import sys
|
|
import logging
|
|
|
|
|
|
def expand_attr(attr):
|
|
"""Render type and role attributes."""
|
|
items = "\n\t".join(sorted(str(i) for i in attr.expand()))
|
|
contents = items if items else "<empty attribute>"
|
|
return "{0}\n\t{1}".format(attr.statement(), contents)
|
|
|
|
parser = argparse.ArgumentParser(
|
|
description="SELinux policy information tool.")
|
|
parser.add_argument("--version", action="version", version=setools.__version__)
|
|
parser.add_argument("policy", help="Path to the SELinux policy to query.", nargs="?")
|
|
parser.add_argument("-x", "--expand", action="store_true",
|
|
help="Print additional information about the specified components.")
|
|
parser.add_argument("--flat", help="Print without item count nor indentation.",
|
|
dest="flat", default=False, action="store_true")
|
|
parser.add_argument("-v", "--verbose", action="store_true",
|
|
help="Print extra informational messages")
|
|
parser.add_argument("--debug", action="store_true", dest="debug", help="Enable debugging.")
|
|
|
|
queries = parser.add_argument_group("Component Queries")
|
|
queries.add_argument("-a", "--attribute", help="Print type attributes.", dest="typeattrquery",
|
|
nargs='?', const=True, metavar="ATTR")
|
|
queries.add_argument("-b", "--bool", help="Print Booleans.", dest="boolquery",
|
|
nargs='?', const=True, metavar="BOOL")
|
|
queries.add_argument("-c", "--class", help="Print object classes.", dest="classquery",
|
|
nargs='?', const=True, metavar="CLASS")
|
|
queries.add_argument("-r", "--role", help="Print roles.", dest="rolequery",
|
|
nargs='?', const=True, metavar="ROLE")
|
|
queries.add_argument("-t", "--type", help="Print types.", dest="typequery",
|
|
nargs='?', const=True, metavar="TYPE")
|
|
queries.add_argument("-u", "--user", help="Print users.", dest="userquery",
|
|
nargs='?', const=True, metavar="USER")
|
|
queries.add_argument("--category", help="Print MLS categories.", dest="mlscatsquery",
|
|
nargs='?', const=True, metavar="CAT")
|
|
queries.add_argument("--common", help="Print common permission set.", dest="commonquery",
|
|
nargs='?', const=True, metavar="COMMON")
|
|
queries.add_argument("--constrain", help="Print constraints.", dest="constraintquery",
|
|
nargs='?', const=True, metavar="CLASS")
|
|
queries.add_argument("--default", help="Print default_* rules.", dest="defaultquery",
|
|
nargs='?', const=True, metavar="CLASS")
|
|
queries.add_argument("--fs_use", help="Print fs_use statements.", dest="fsusequery",
|
|
nargs='?', const=True, metavar="FS_TYPE")
|
|
queries.add_argument("--genfscon", help="Print genfscon statements.", dest="genfsconquery",
|
|
nargs='?', const=True, metavar="FS_TYPE")
|
|
queries.add_argument("--initialsid", help="Print initial SIDs (contexts).", dest="initialsidquery",
|
|
nargs='?', const=True, metavar="NAME")
|
|
queries.add_argument("--netifcon", help="Print netifcon statements.", dest="netifconquery",
|
|
nargs='?', const=True, metavar="DEVICE")
|
|
queries.add_argument("--nodecon", help="Print nodecon statements.", dest="nodeconquery",
|
|
nargs='?', const=True, metavar="ADDR")
|
|
queries.add_argument("--permissive", help="Print permissive types.", dest="permissivequery",
|
|
nargs='?', const=True, metavar="TYPE")
|
|
queries.add_argument("--polcap", help="Print policy capabilities.", dest="polcapquery",
|
|
nargs='?', const=True, metavar="NAME")
|
|
queries.add_argument("--portcon", help="Print portcon statements.", dest="portconquery",
|
|
nargs='?', const=True, metavar="PORTNUM[-PORTNUM]")
|
|
queries.add_argument("--sensitivity", help="Print MLS sensitivities.", dest="mlssensquery",
|
|
nargs='?', const=True, metavar="SENS")
|
|
queries.add_argument("--typebounds", help="Print typebounds statements.", dest="typeboundsquery",
|
|
nargs='?', const=True, metavar="BOUND_TYPE")
|
|
queries.add_argument("--validatetrans", help="Print validatetrans.", dest="validatetransquery",
|
|
nargs='?', const=True, metavar="CLASS")
|
|
queries.add_argument("--all", help="Print all of the above. On a Xen policy, the Xen components "
|
|
"will also be printed", dest="all", default=False, action="store_true")
|
|
|
|
xen = parser.add_argument_group("Xen Component Queries")
|
|
xen.add_argument("--ioportcon", help="Print all ioportcon statements.", dest="ioportconquery",
|
|
default=False, action="store_true")
|
|
xen.add_argument("--iomemcon", help="Print all iomemcon statements.", dest="iomemconquery",
|
|
default=False, action="store_true")
|
|
xen.add_argument("--pcidevicecon", help="Print all pcidevicecon statements.",
|
|
dest="pcideviceconquery", default=False, action="store_true")
|
|
xen.add_argument("--pirqcon", help="Print all pirqcon statements.", dest="pirqconquery",
|
|
default=False, action="store_true")
|
|
xen.add_argument("--devicetreecon", help="Print all devicetreecon statements.",
|
|
dest="devicetreeconquery", default=False, action="store_true")
|
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
if args.debug:
|
|
logging.basicConfig(level=logging.DEBUG,
|
|
format='%(asctime)s|%(levelname)s|%(name)s|%(message)s')
|
|
elif args.verbose:
|
|
logging.basicConfig(level=logging.INFO, format='%(message)s')
|
|
else:
|
|
logging.basicConfig(level=logging.WARNING, format='%(message)s')
|
|
|
|
try:
|
|
p = setools.SELinuxPolicy(args.policy)
|
|
components = []
|
|
|
|
if args.boolquery or args.all:
|
|
q = setools.BoolQuery(p)
|
|
if isinstance(args.boolquery, str):
|
|
q.name = args.boolquery
|
|
|
|
components.append(("Booleans", q, lambda x: x.statement()))
|
|
|
|
if args.mlscatsquery or args.all:
|
|
q = setools.CategoryQuery(p)
|
|
if isinstance(args.mlscatsquery, str):
|
|
q.name = args.mlscatsquery
|
|
|
|
components.append(("Categories", q, lambda x: x.statement()))
|
|
|
|
if args.classquery or args.all:
|
|
q = setools.ObjClassQuery(p)
|
|
if isinstance(args.classquery, str):
|
|
q.name = args.classquery
|
|
|
|
components.append(("Classes", q, lambda x: x.statement()))
|
|
|
|
if args.commonquery or args.all:
|
|
q = setools.CommonQuery(p)
|
|
if isinstance(args.commonquery, str):
|
|
q.name = args.commonquery
|
|
|
|
components.append(("Commons", q, lambda x: x.statement()))
|
|
|
|
if args.constraintquery or args.all:
|
|
q = setools.ConstraintQuery(p, ruletype=["constrain", "mlsconstrain"])
|
|
if isinstance(args.constraintquery, str):
|
|
q.tclass = [args.constraintquery]
|
|
|
|
components.append(("Constraints", q, lambda x: x.statement()))
|
|
|
|
if args.defaultquery or args.all:
|
|
q = setools.DefaultQuery(p)
|
|
if isinstance(args.defaultquery, str):
|
|
q.tclass = [args.defaultquery]
|
|
|
|
components.append(("Default rules", q, lambda x: x.statement()))
|
|
|
|
if args.fsusequery or args.all:
|
|
q = setools.FSUseQuery(p)
|
|
if isinstance(args.fsusequery, str):
|
|
q.fs = args.fsusequery
|
|
|
|
components.append(("Fs_use", q, lambda x: x.statement()))
|
|
|
|
if args.genfsconquery or args.all:
|
|
q = setools.GenfsconQuery(p)
|
|
if isinstance(args.genfsconquery, str):
|
|
q.fs = args.genfsconquery
|
|
|
|
components.append(("Genfscon", q, lambda x: x.statement()))
|
|
|
|
if args.initialsidquery or args.all:
|
|
q = setools.InitialSIDQuery(p)
|
|
if isinstance(args.initialsidquery, str):
|
|
q.name = args.initialsidquery
|
|
|
|
components.append(("Initial SIDs", q, lambda x: x.statement()))
|
|
|
|
if args.netifconquery or args.all:
|
|
q = setools.NetifconQuery(p)
|
|
if isinstance(args.netifconquery, str):
|
|
q.name = args.netifconquery
|
|
|
|
components.append(("Netifcon", q, lambda x: x.statement()))
|
|
|
|
if args.nodeconquery or args.all:
|
|
q = setools.NodeconQuery(p)
|
|
if isinstance(args.nodeconquery, str):
|
|
q.network = args.nodeconquery
|
|
|
|
components.append(("Nodecon", q, lambda x: x.statement()))
|
|
|
|
if args.permissivequery or args.all:
|
|
q = setools.TypeQuery(p, permissive=True, match_permissive=True)
|
|
if isinstance(args.permissivequery, str):
|
|
q.name = args.permissivequery
|
|
|
|
components.append(("Permissive Types", q, lambda x: x.statement()))
|
|
|
|
if args.polcapquery or args.all:
|
|
q = setools.PolCapQuery(p)
|
|
if isinstance(args.polcapquery, str):
|
|
q.name = args.polcapquery
|
|
|
|
components.append(("Polcap", q, lambda x: x.statement()))
|
|
|
|
if args.portconquery or args.all:
|
|
q = setools.PortconQuery(p)
|
|
if isinstance(args.portconquery, str):
|
|
try:
|
|
ports = [int(i) for i in args.portconquery.split("-")]
|
|
except ValueError:
|
|
parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
|
|
|
|
if len(ports) == 2:
|
|
q.ports = ports
|
|
elif len(ports) == 1:
|
|
q.ports = (ports[0], ports[0])
|
|
else:
|
|
parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
|
|
|
|
components.append(("Portcon", q, lambda x: x.statement()))
|
|
|
|
if args.rolequery or args.all:
|
|
q = setools.RoleQuery(p)
|
|
if isinstance(args.rolequery, str):
|
|
q.name = args.rolequery
|
|
|
|
components.append(("Roles", q, lambda x: x.statement()))
|
|
|
|
if args.mlssensquery or args.all:
|
|
q = setools.SensitivityQuery(p)
|
|
if isinstance(args.mlssensquery, str):
|
|
q.name = args.mlssensquery
|
|
|
|
components.append(("Sensitivities", q, lambda x: x.statement()))
|
|
|
|
if args.typeboundsquery or args.all:
|
|
q = setools.BoundsQuery(p, ruletype=["typebounds"])
|
|
if isinstance(args.typeboundsquery, str):
|
|
q.child = args.typeboundsquery
|
|
|
|
components.append(("Typebounds", q, lambda x: x.statement()))
|
|
|
|
if args.typequery or args.all:
|
|
q = setools.TypeQuery(p)
|
|
if isinstance(args.typequery, str):
|
|
q.name = args.typequery
|
|
|
|
components.append(("Types", q, lambda x: x.statement()))
|
|
|
|
if args.typeattrquery or args.all:
|
|
q = setools.TypeAttributeQuery(p)
|
|
if isinstance(args.typeattrquery, str):
|
|
q.name = args.typeattrquery
|
|
|
|
components.append(("Type Attributes", q, expand_attr))
|
|
|
|
if args.userquery or args.all:
|
|
q = setools.UserQuery(p)
|
|
if isinstance(args.userquery, str):
|
|
q.name = args.userquery
|
|
|
|
components.append(("Users", q, lambda x: x.statement()))
|
|
|
|
if args.validatetransquery or args.all:
|
|
q = setools.ConstraintQuery(p, ruletype=["validatetrans", "mlsvalidatetrans"])
|
|
if isinstance(args.validatetransquery, str):
|
|
q.tclass = [args.validatetransquery]
|
|
|
|
components.append(("Validatetrans", q, lambda x: x.statement()))
|
|
|
|
if p.target_platform == "xen":
|
|
if args.ioportconquery or args.all:
|
|
q = setools.IoportconQuery(p)
|
|
components.append(("Ioportcon", q, lambda x: x.statement()))
|
|
|
|
if args.iomemconquery or args.all:
|
|
q = setools.IomemconQuery(p)
|
|
components.append(("Iomemcon", q, lambda x: x.statement()))
|
|
|
|
if args.pcideviceconquery or args.all:
|
|
q = setools.PcideviceconQuery(p)
|
|
components.append(("Pcidevicecon", q, lambda x: x.statement()))
|
|
|
|
if args.pirqconquery or args.all:
|
|
q = setools.PirqconQuery(p)
|
|
components.append(("Pirqcon", q, lambda x: x.statement()))
|
|
|
|
if args.devicetreeconquery or args.all:
|
|
q = setools.DevicetreeconQuery(p)
|
|
components.append(("Devicetreecon", q, lambda x: x.statement()))
|
|
|
|
if (not components or args.all) and not args.flat:
|
|
mls = "enabled" if p.mls else "disabled"
|
|
|
|
print("Statistics for policy file: {0}".format(p))
|
|
print("Policy Version: {0} (MLS {1})".format(p.version, mls))
|
|
print("Target Policy: {0}".format(p.target_platform))
|
|
print("Handle unknown classes: {0}".format(p.handle_unknown))
|
|
print(" Classes: {0:7} Permissions: {1:7}".format(
|
|
p.class_count, p.permission_count))
|
|
print(" Sensitivities: {0:7} Categories: {1:7}".format(
|
|
p.level_count, p.category_count))
|
|
print(" Types: {0:7} Attributes: {1:7}".format(
|
|
p.type_count, p.type_attribute_count))
|
|
print(" Users: {0:7} Roles: {1:7}".format(
|
|
p.user_count, p.role_count))
|
|
print(" Booleans: {0:7} Cond. Expr.: {1:7}".format(
|
|
p.boolean_count, p.conditional_count))
|
|
print(" Allow: {0:7} Neverallow: {1:7}".format(
|
|
p.allow_count, p.neverallow_count))
|
|
print(" Auditallow: {0:7} Dontaudit: {1:7}".format(
|
|
p.auditallow_count, p.dontaudit_count))
|
|
print(" Type_trans: {0:7} Type_change: {1:7}".format(
|
|
p.type_transition_count, p.type_change_count))
|
|
print(" Type_member: {0:7} Range_trans: {1:7}".format(
|
|
p.type_member_count, p.range_transition_count))
|
|
print(" Role allow: {0:7} Role_trans: {1:7}".format(
|
|
p.role_allow_count, p.role_transition_count))
|
|
print(" Constraints: {0:7} Validatetrans: {1:7}".format(
|
|
p.constraint_count, p.validatetrans_count))
|
|
print(" MLS Constrain: {0:7} MLS Val. Tran: {1:7}".format(
|
|
p.mlsconstraint_count, p.mlsvalidatetrans_count))
|
|
print(" Permissives: {0:7} Polcap: {1:7}".format(
|
|
p.permissives_count, p.polcap_count))
|
|
print(" Defaults: {0:7} Typebounds: {1:7}".format(
|
|
p.default_count, p.typebounds_count))
|
|
|
|
if p.target_platform == "selinux":
|
|
print(" Allowxperm: {0:7} Neverallowxperm: {1:7}".format(
|
|
p.allowxperm_count, p.neverallowxperm_count))
|
|
print(" Auditallowxperm: {0:7} Dontauditxperm: {1:7}".format(
|
|
p.auditallowxperm_count, p.dontauditxperm_count))
|
|
print(" Initial SIDs: {0:7} Fs_use: {1:7}".format(
|
|
p.initialsids_count, p.fs_use_count))
|
|
print(" Genfscon: {0:7} Portcon: {1:7}".format(
|
|
p.genfscon_count, p.portcon_count))
|
|
print(" Netifcon: {0:7} Nodecon: {1:7}".format(
|
|
p.netifcon_count, p.nodecon_count))
|
|
elif p.target_platform == "xen":
|
|
print(" Initial SIDs: {0:7} Devicetreecon {1:7}".format(
|
|
p.initialsids_count, p.devicetreecon_count))
|
|
print(" Iomemcon: {0:7} Ioportcon: {1:7}".format(
|
|
p.iomemcon_count, p.ioportcon_count))
|
|
print(" Pcidevicecon: {0:7} Pirqcon: {1:7}".format(
|
|
p.pcidevicecon_count, p.pirqcon_count))
|
|
|
|
for desc, component, expander in components:
|
|
results = sorted(component.results())
|
|
if not args.flat:
|
|
print("\n{0}: {1}".format(desc, len(results)))
|
|
for item in results:
|
|
result = expander(item) if args.expand else item
|
|
strfmt = " {0}" if not args.flat else "{0}"
|
|
print(strfmt.format(result))
|
|
|
|
except Exception as err:
|
|
if args.debug:
|
|
logging.exception(str(err))
|
|
else:
|
|
print(err)
|
|
|
|
sys.exit(1)
|