| [310] | 1 | /* SAMHAIN file system integrity testing */
|
|---|
| 2 | /* Copyright (C) 2011 Rainer Wichmann */
|
|---|
| 3 | /* */
|
|---|
| 4 | /* This program is free software; you can redistribute it */
|
|---|
| 5 | /* and/or modify */
|
|---|
| 6 | /* it under the terms of the GNU General Public License as */
|
|---|
| 7 | /* published by */
|
|---|
| 8 | /* the Free Software Foundation; either version 2 of the License, or */
|
|---|
| 9 | /* (at your option) any later version. */
|
|---|
| 10 | /* */
|
|---|
| 11 | /* This program is distributed in the hope that it will be useful, */
|
|---|
| 12 | /* but WITHOUT ANY WARRANTY; without even the implied warranty of */
|
|---|
| 13 | /* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the */
|
|---|
| 14 | /* GNU General Public License for more details. */
|
|---|
| 15 | /* */
|
|---|
| 16 | /* You should have received a copy of the GNU General Public License */
|
|---|
| 17 | /* along with this program; if not, write to the Free Software */
|
|---|
| 18 | /* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
|---|
| 19 |
|
|---|
| 20 | #include "config_xor.h"
|
|---|
| 21 |
|
|---|
| 22 | #ifndef NULL
|
|---|
| 23 | #if !defined(__cplusplus)
|
|---|
| 24 | #define NULL ((void*)0)
|
|---|
| 25 | #else
|
|---|
| 26 | #define NULL (0)
|
|---|
| 27 | #endif
|
|---|
| 28 | #endif
|
|---|
| 29 |
|
|---|
| 30 | #if defined(SH_WITH_CLIENT) || defined(SH_STANDALONE)
|
|---|
| 31 |
|
|---|
| 32 | #ifdef HAVE_REGEX_H
|
|---|
| 33 | #include <sys/types.h>
|
|---|
| 34 | #include <regex.h>
|
|---|
| 35 | #endif
|
|---|
| 36 | #include <stdlib.h>
|
|---|
| 37 | #include <string.h>
|
|---|
| 38 | #include <ctype.h>
|
|---|
| 39 |
|
|---|
| 40 | #include "samhain.h"
|
|---|
| 41 | #include "sh_mem.h"
|
|---|
| 42 | #include "sh_error_min.h"
|
|---|
| 43 | #include "sh_string.h"
|
|---|
| 44 | #include "sh_utils.h"
|
|---|
| 45 | #include "sh_restrict.h"
|
|---|
| 46 |
|
|---|
| 47 | #define FIL__ _("sh_restrict.c")
|
|---|
| 48 |
|
|---|
| 49 | #define SH_COND_NOT (1 << 0)
|
|---|
| 50 | #define SH_COND_PREFIX (1 << 1)
|
|---|
| 51 | #define SH_COND_REGEX (1 << 2)
|
|---|
| 52 | #define SH_COND_SIZE (1 << 3)
|
|---|
| 53 | #define SH_COND_PERM (1 << 4)
|
|---|
| 54 | #define SH_COND_FTYPE (1 << 5)
|
|---|
| 55 | #define SH_COND_PINCL (1 << 6)
|
|---|
| 56 |
|
|---|
| 57 | #define SH_COND_MAX 6
|
|---|
| 58 |
|
|---|
| 59 | struct sh_restrict_cond {
|
|---|
| 60 |
|
|---|
| 61 | unsigned char cond_type[SH_COND_MAX];
|
|---|
| 62 |
|
|---|
| 63 | #ifdef HAVE_REGEX_H
|
|---|
| 64 | regex_t * cond_preg[SH_COND_MAX];
|
|---|
| 65 | #endif
|
|---|
| 66 |
|
|---|
| 67 | char * cond_str[SH_COND_MAX];
|
|---|
| 68 |
|
|---|
| 69 | UINT64 cond_int[SH_COND_MAX];
|
|---|
| 70 |
|
|---|
| 71 | struct sh_restrict_cond * next;
|
|---|
| 72 | };
|
|---|
| 73 |
|
|---|
| 74 | static struct sh_restrict_cond * sh_restrict_list = NULL;
|
|---|
| 75 |
|
|---|
| 76 | extern int matches_filetype(SL_TICKET ft, char * test_type);
|
|---|
| 77 |
|
|---|
| 78 | #ifdef HAVE_REGEX_H
|
|---|
| 79 | static int matches_regex (const char * path, const regex_t * regex)
|
|---|
| 80 | {
|
|---|
| 81 | SL_ENTER(_("matches_regex"));
|
|---|
| 82 |
|
|---|
| 83 | if (0 == regexec(regex, path, 0, NULL, 0))
|
|---|
| 84 | {
|
|---|
| 85 | SL_RETURN(1, _("matches_regex"));
|
|---|
| 86 | }
|
|---|
| 87 | SL_RETURN(0, _("matches_regex"));
|
|---|
| 88 | }
|
|---|
| 89 | #else
|
|---|
| 90 | static int matches_string (const char * path, const char * string)
|
|---|
| 91 | {
|
|---|
| 92 | SL_ENTER(_("matches_string"));
|
|---|
| 93 |
|
|---|
| 94 | if (NULL == strstr(path, string))
|
|---|
| 95 | {
|
|---|
| 96 | SL_RETURN(0, _("matches_string"));
|
|---|
| 97 | }
|
|---|
| 98 | SL_RETURN(1, _("matches_string"));
|
|---|
| 99 | }
|
|---|
| 100 | #endif
|
|---|
| 101 |
|
|---|
| 102 | static int matches_prefix (const char * path, const char * prefix)
|
|---|
| 103 | {
|
|---|
| 104 | size_t path_len;
|
|---|
| 105 | size_t pref_len;
|
|---|
| 106 |
|
|---|
| 107 | SL_ENTER(_("matches_prefix"));
|
|---|
| 108 |
|
|---|
| 109 | path_len = sl_strlen(path);
|
|---|
| 110 | pref_len = sl_strlen(prefix);
|
|---|
| 111 |
|
|---|
| 112 | if (path_len >= pref_len)
|
|---|
| 113 | {
|
|---|
| 114 | if (0 == strncmp(path, prefix, pref_len))
|
|---|
| 115 | {
|
|---|
| 116 | SL_RETURN(1, _("matches_prefix"));
|
|---|
| 117 | }
|
|---|
| 118 | }
|
|---|
| 119 | SL_RETURN(0, _("matches_prefix"));
|
|---|
| 120 | }
|
|---|
| 121 |
|
|---|
| 122 | static int exceeds_size (UINT64 size, UINT64 maxsize)
|
|---|
| 123 | {
|
|---|
| 124 | SL_ENTER(_("exceeds_size"));
|
|---|
| 125 |
|
|---|
| 126 | if (size > maxsize)
|
|---|
| 127 | {
|
|---|
| 128 | SL_RETURN(1, _("exceeds_size"));
|
|---|
| 129 | }
|
|---|
| 130 | SL_RETURN(0, _("exceeds_size"));
|
|---|
| 131 | }
|
|---|
| 132 |
|
|---|
| 133 | static int matches_perm (UINT64 perm, UINT64 needed_perm)
|
|---|
| 134 | {
|
|---|
| 135 | SL_ENTER(_("matches_perm"));
|
|---|
| 136 |
|
|---|
| 137 | if (needed_perm == (perm & 07777))
|
|---|
| 138 | {
|
|---|
| 139 | SL_RETURN(1, _("matches_perm"));
|
|---|
| 140 | }
|
|---|
| 141 | SL_RETURN(0, _("matches_perm"));
|
|---|
| 142 | }
|
|---|
| 143 |
|
|---|
| 144 | static int includes_perm (UINT64 perm, UINT64 needed_perm)
|
|---|
| 145 | {
|
|---|
| 146 | UINT64 tmp = perm & 07777;
|
|---|
| 147 |
|
|---|
| 148 | SL_ENTER(_("includes_perm"));
|
|---|
| 149 |
|
|---|
| 150 | if (needed_perm == (tmp & needed_perm))
|
|---|
| 151 | {
|
|---|
| 152 | SL_RETURN(1, _("includes_perm"));
|
|---|
| 153 | }
|
|---|
| 154 | SL_RETURN(0, _("includes_perm"));
|
|---|
| 155 | }
|
|---|
| 156 |
|
|---|
| 157 | static int sh_restrict_test(const char * path,
|
|---|
| 158 | UINT64 size, UINT64 perm, SL_TICKET fh,
|
|---|
| 159 | struct sh_restrict_cond * current)
|
|---|
| 160 | {
|
|---|
| 161 | int i;
|
|---|
| 162 | unsigned char flag;
|
|---|
| 163 | int res = 0;
|
|---|
| 164 |
|
|---|
| 165 | (void) fh;
|
|---|
| 166 |
|
|---|
| 167 | SL_ENTER(_("sh_restrict_test"));
|
|---|
| 168 |
|
|---|
| 169 | for (i = 0; i < SH_COND_MAX; ++i)
|
|---|
| 170 | {
|
|---|
| 171 | flag = current->cond_type[i];
|
|---|
| 172 |
|
|---|
| 173 | if (flag != 0)
|
|---|
| 174 | {
|
|---|
| 175 | if ((flag & (SH_COND_PREFIX)) != 0) {
|
|---|
| 176 | res = matches_prefix(path, current->cond_str[i]);
|
|---|
| 177 | }
|
|---|
| 178 | else if ((flag & (SH_COND_REGEX)) != 0) {
|
|---|
| 179 | #ifdef HAVE_REGEX_H
|
|---|
| 180 | res = matches_regex(path, current->cond_preg[i]);
|
|---|
| 181 | #else
|
|---|
| 182 | res = matches_string(path, current->cond_str[i]);
|
|---|
| 183 | #endif
|
|---|
| 184 | }
|
|---|
| 185 | else if ((flag & (SH_COND_SIZE)) != 0) {
|
|---|
| 186 | res = exceeds_size(size, current->cond_int[i]);
|
|---|
| 187 | }
|
|---|
| 188 | else if ((flag & (SH_COND_PERM)) != 0) {
|
|---|
| 189 | res = matches_perm(perm, current->cond_int[i]);
|
|---|
| 190 | }
|
|---|
| 191 | else if ((flag & (SH_COND_PINCL)) != 0) {
|
|---|
| 192 | res = includes_perm(perm, current->cond_int[i]);
|
|---|
| 193 | }
|
|---|
| 194 | else if ((flag & (SH_COND_FTYPE)) != 0) {
|
|---|
| 195 | res = matches_filetype(fh, current->cond_str[i]);
|
|---|
| 196 | }
|
|---|
| 197 |
|
|---|
| 198 | /* Does condition hold?
|
|---|
| 199 | */
|
|---|
| 200 | if ((flag & (SH_COND_NOT)) != 0) {
|
|---|
| 201 | /*
|
|---|
| 202 | * Condition negated, ok if false (res == 0)
|
|---|
| 203 | */
|
|---|
| 204 | if (0 != res) {
|
|---|
| 205 | SL_RETURN(0, _("sh_restrict_this"));
|
|---|
| 206 | }
|
|---|
| 207 | }
|
|---|
| 208 | else {
|
|---|
| 209 | /* Condition ok if true (res != 0) */
|
|---|
| 210 | if (0 == res) {
|
|---|
| 211 | SL_RETURN(0, _("sh_restrict_this"));
|
|---|
| 212 | }
|
|---|
| 213 | }
|
|---|
| 214 | }
|
|---|
| 215 | else
|
|---|
| 216 | {
|
|---|
| 217 | break;
|
|---|
| 218 | }
|
|---|
| 219 | }
|
|---|
| 220 |
|
|---|
| 221 | /* All conditions true, restricted
|
|---|
| 222 | */
|
|---|
| 223 | SL_RETURN(1, _("sh_restrict_this"));
|
|---|
| 224 | }
|
|---|
| 225 |
|
|---|
| 226 | /* >>>>>>>>>> Evaluate the list <<<<<<<<<< */
|
|---|
| 227 |
|
|---|
| 228 | int sh_restrict_this(const char * path, UINT64 size, UINT64 perm, SL_TICKET fh)
|
|---|
| 229 | {
|
|---|
| 230 | struct sh_restrict_cond * current = sh_restrict_list;
|
|---|
| 231 |
|
|---|
| 232 | SL_ENTER(_("sh_restrict_this"));
|
|---|
| 233 |
|
|---|
| 234 | if (!current)
|
|---|
| 235 | {
|
|---|
| 236 | SL_RETURN(0, _("sh_restrict_this"));
|
|---|
| 237 | }
|
|---|
| 238 |
|
|---|
| 239 | while (current)
|
|---|
| 240 | {
|
|---|
| 241 | if (0 != sh_restrict_test(path, size, perm, fh, current))
|
|---|
| 242 | {
|
|---|
| 243 | /* The current conditions are true, restricted
|
|---|
| 244 | */
|
|---|
| 245 | SL_RETURN(1, _("sh_restrict_this"));
|
|---|
| 246 | }
|
|---|
| 247 | current = current->next;
|
|---|
| 248 | }
|
|---|
| 249 |
|
|---|
| 250 | SL_RETURN(0, _("sh_restrict_this"));
|
|---|
| 251 | }
|
|---|
| 252 |
|
|---|
| 253 |
|
|---|
| 254 | /* >>>>>>>>>> Purge the list <<<<<<<<<< */
|
|---|
| 255 |
|
|---|
| 256 | static void sh_restrict_delete (struct sh_restrict_cond * current)
|
|---|
| 257 | {
|
|---|
| 258 | int i;
|
|---|
| 259 |
|
|---|
| 260 | if (current->next)
|
|---|
| 261 | {
|
|---|
| 262 | sh_restrict_delete(current->next);
|
|---|
| 263 | }
|
|---|
| 264 |
|
|---|
| 265 | for (i = 0; i < SH_COND_MAX; ++i)
|
|---|
| 266 | {
|
|---|
| 267 | if (current->cond_str[i]) {
|
|---|
| 268 | SH_FREE(current->cond_str[i]);
|
|---|
| 269 | }
|
|---|
| 270 | #ifdef HAVE_REGEX_H
|
|---|
| 271 | if (current->cond_preg[i]) {
|
|---|
| 272 | regfree(current->cond_preg[i]);
|
|---|
| 273 | SH_FREE(current->cond_preg[i]);
|
|---|
| 274 | }
|
|---|
| 275 | #endif
|
|---|
| 276 | }
|
|---|
| 277 | SH_FREE(current);
|
|---|
| 278 | return;
|
|---|
| 279 | }
|
|---|
| 280 |
|
|---|
| 281 | void sh_restrict_purge ()
|
|---|
| 282 | {
|
|---|
| 283 | struct sh_restrict_cond * current = sh_restrict_list;
|
|---|
| 284 |
|
|---|
| 285 | sh_restrict_list = NULL;
|
|---|
| 286 | if (current)
|
|---|
| 287 | sh_restrict_delete(current);
|
|---|
| 288 |
|
|---|
| 289 | sh_restrict_add_ftype(NULL);
|
|---|
| 290 |
|
|---|
| 291 | return;
|
|---|
| 292 | }
|
|---|
| 293 |
|
|---|
| 294 | /* >>>>>>>>>> Create the list <<<<<<<<<< */
|
|---|
| 295 |
|
|---|
| 296 | static char * get_com(char * str)
|
|---|
| 297 | {
|
|---|
| 298 | char * s;
|
|---|
| 299 | char * e;
|
|---|
| 300 |
|
|---|
| 301 | /* skip leading WS
|
|---|
| 302 | */
|
|---|
| 303 | for (s = str; *s && isspace((int)*s); ++s) /* nothing */;
|
|---|
| 304 |
|
|---|
| 305 | e = strchr(s, '(');
|
|---|
| 306 | if (e && (e != s))
|
|---|
| 307 | {
|
|---|
| 308 | *e = '\0'; --e;
|
|---|
| 309 | while ( (e != s) && isspace((int)*e) )
|
|---|
| 310 | {
|
|---|
| 311 | *e = '\0'; --e;
|
|---|
| 312 | }
|
|---|
| 313 | if (e != s)
|
|---|
| 314 | return s;
|
|---|
| 315 | }
|
|---|
| 316 | return NULL;
|
|---|
| 317 | }
|
|---|
| 318 |
|
|---|
| 319 | static char * get_arg(char * str)
|
|---|
| 320 | {
|
|---|
| 321 | char * s;
|
|---|
| 322 | char * e;
|
|---|
| 323 |
|
|---|
| 324 | s = strchr(str, '(');
|
|---|
| 325 |
|
|---|
| 326 | if (s)
|
|---|
| 327 | {
|
|---|
| 328 | ++s;
|
|---|
| 329 |
|
|---|
| 330 | /* skip leading WS
|
|---|
| 331 | */
|
|---|
| 332 | for (; *s && isspace((int)*s); ++s) /* nothing */;
|
|---|
| 333 |
|
|---|
| 334 | e = strrchr(s, ')');
|
|---|
| 335 | if (e && (e != s))
|
|---|
| 336 | {
|
|---|
| 337 | /* strip trailing space */
|
|---|
| 338 | *e = '\0'; --e;
|
|---|
| 339 | while ( (e != s) && isspace((int)*e) )
|
|---|
| 340 | {
|
|---|
| 341 | *e = '\0'; --e;
|
|---|
| 342 | }
|
|---|
| 343 |
|
|---|
| 344 | if (e != s)
|
|---|
| 345 | return s;
|
|---|
| 346 | }
|
|---|
| 347 | }
|
|---|
| 348 | return NULL;
|
|---|
| 349 | }
|
|---|
| 350 |
|
|---|
| 351 | static int set_cond(struct sh_restrict_cond * current, int i,
|
|---|
| 352 | char * com, char * arg)
|
|---|
| 353 | {
|
|---|
| 354 | if (!com || !arg || (i >= SH_COND_MAX))
|
|---|
| 355 | return -1;
|
|---|
| 356 |
|
|---|
| 357 | if (0 == strcmp(com, _("match_prefix")))
|
|---|
| 358 | {
|
|---|
| 359 | current->cond_str[i] = sh_util_strdup(arg);
|
|---|
| 360 | current->cond_type[i] |= SH_COND_PREFIX;
|
|---|
| 361 | }
|
|---|
| 362 | else if (0 == strcmp(com, _("match_regex")))
|
|---|
| 363 | {
|
|---|
| 364 | #ifdef HAVE_REGEX_H
|
|---|
| 365 | regex_t * preg = SH_ALLOC(sizeof(regex_t));
|
|---|
| 366 |
|
|---|
| 367 | if (0 != regcomp(preg, arg, REG_NOSUB|REG_EXTENDED))
|
|---|
| 368 | {
|
|---|
| 369 | SH_FREE(preg);
|
|---|
| 370 | return (-1);
|
|---|
| 371 | }
|
|---|
| 372 | current->cond_preg[i] = preg;
|
|---|
| 373 | #else
|
|---|
| 374 | current->cond_str[i] = sh_util_strdup(arg);
|
|---|
| 375 | #endif
|
|---|
| 376 | current->cond_type[i] |= SH_COND_REGEX;
|
|---|
| 377 | }
|
|---|
| 378 | else if (0 == strcmp(com, _("size_exceeds")))
|
|---|
| 379 | {
|
|---|
| 380 | current->cond_int[i] = (UINT64) strtoul(arg, (char **) NULL, 0);
|
|---|
| 381 | current->cond_type[i] |= SH_COND_SIZE;
|
|---|
| 382 | }
|
|---|
| 383 | else if (0 == strcmp(com, _("match_permission")))
|
|---|
| 384 | {
|
|---|
| 385 | current->cond_int[i] = (UINT64) strtoul(arg, (char **) NULL, 8);
|
|---|
| 386 | current->cond_type[i] |= SH_COND_PERM;
|
|---|
| 387 | }
|
|---|
| 388 | else if (0 == strcmp(com, _("have_permission")))
|
|---|
| 389 | {
|
|---|
| 390 | current->cond_int[i] = (UINT64) strtoul(arg, (char **) NULL, 8);
|
|---|
| 391 | current->cond_type[i] |= SH_COND_PINCL;
|
|---|
| 392 | }
|
|---|
| 393 | else if (0 == strcmp(com, _("match_filetype")))
|
|---|
| 394 | {
|
|---|
| 395 | current->cond_str[i] = sh_util_strdup(arg);
|
|---|
| 396 | current->cond_type[i] |= SH_COND_FTYPE;
|
|---|
| 397 | }
|
|---|
| 398 | else
|
|---|
| 399 | {
|
|---|
| 400 | return (-1);
|
|---|
| 401 | }
|
|---|
| 402 | return 0;
|
|---|
| 403 | }
|
|---|
| 404 |
|
|---|
| 405 | /* Format is [!]cond1(arg), cond2(arg), ...
|
|---|
| 406 | */
|
|---|
| 407 | int sh_restrict_define(const char * str)
|
|---|
| 408 | {
|
|---|
| 409 | SL_ENTER(_("sh_restrict_define"));
|
|---|
| 410 |
|
|---|
| 411 | if (str)
|
|---|
| 412 | {
|
|---|
| 413 | size_t lengths[SH_COND_MAX];
|
|---|
| 414 | unsigned int nfields = SH_COND_MAX;
|
|---|
| 415 | char ** array;
|
|---|
| 416 | sh_string * def = sh_string_new_from_lchar(str, strlen(str));
|
|---|
| 417 |
|
|---|
| 418 | array = split_array_list(sh_string_str(def), &nfields, lengths);
|
|---|
| 419 |
|
|---|
| 420 | if (array && nfields > 0)
|
|---|
| 421 | {
|
|---|
| 422 | char * p;
|
|---|
| 423 | char * q;
|
|---|
| 424 | unsigned int i;
|
|---|
| 425 | struct sh_restrict_cond * current =
|
|---|
| 426 | SH_ALLOC(sizeof(struct sh_restrict_cond));
|
|---|
| 427 |
|
|---|
| 428 | current->next = NULL;
|
|---|
| 429 | for (i = 0; i < SH_COND_MAX; ++i)
|
|---|
| 430 | {
|
|---|
| 431 | current->cond_int[i] = 0;
|
|---|
| 432 | current->cond_type[i] = 0;
|
|---|
| 433 | current->cond_str[i] = NULL;
|
|---|
| 434 | #ifdef HAVE_REGEX_H
|
|---|
| 435 | current->cond_preg[i] = NULL;
|
|---|
| 436 | #endif
|
|---|
| 437 | }
|
|---|
| 438 |
|
|---|
| 439 | for (i = 0; i < nfields; ++i)
|
|---|
| 440 | {
|
|---|
| 441 | if (i == SH_COND_MAX)
|
|---|
| 442 | {
|
|---|
| 443 | sh_restrict_delete (current);
|
|---|
| 444 | sh_string_destroy(&def);
|
|---|
| 445 | SH_FREE(array);
|
|---|
| 446 | SL_RETURN((-1), _("sh_restrict_define"));
|
|---|
| 447 | }
|
|---|
| 448 |
|
|---|
| 449 | p = array[i];
|
|---|
| 450 |
|
|---|
| 451 | if (*p == '!')
|
|---|
| 452 | {
|
|---|
| 453 | current->cond_type[i] |= SH_COND_NOT;
|
|---|
| 454 | ++p;
|
|---|
| 455 | }
|
|---|
| 456 |
|
|---|
| 457 | q = get_arg(p);
|
|---|
| 458 | p = get_com(p);
|
|---|
| 459 |
|
|---|
| 460 | if (!q || !p || (0 != set_cond(current, i, p, q)))
|
|---|
| 461 | {
|
|---|
| 462 | sh_restrict_delete (current);
|
|---|
| 463 | sh_string_destroy(&def);
|
|---|
| 464 | SH_FREE(array);
|
|---|
| 465 | SL_RETURN((-1), _("sh_restrict_define"));
|
|---|
| 466 | }
|
|---|
| 467 | }
|
|---|
| 468 |
|
|---|
| 469 | SH_FREE(array);
|
|---|
| 470 |
|
|---|
| 471 | current->next = sh_restrict_list;
|
|---|
| 472 | sh_restrict_list = current;
|
|---|
| 473 | }
|
|---|
| 474 |
|
|---|
| 475 | sh_string_destroy(&def);
|
|---|
| 476 | SL_RETURN(0, _("sh_restrict_define"));
|
|---|
| 477 | }
|
|---|
| 478 |
|
|---|
| 479 | SL_RETURN((-1), _("sh_restrict_define"));
|
|---|
| 480 | }
|
|---|
| 481 |
|
|---|
| 482 |
|
|---|
| 483 | /* #if defined(SH_WITH_CLIENT) || defined(SH_STANDALONE) */
|
|---|
| 484 | #endif
|
|---|
| 485 |
|
|---|
| 486 | #ifdef SH_CUTEST
|
|---|
| 487 | #include "CuTest.h"
|
|---|
| 488 |
|
|---|
| 489 | void Test_restrict (CuTest *tc) {
|
|---|
| 490 |
|
|---|
| 491 | #if defined(SH_WITH_CLIENT) || defined(SH_STANDALONE)
|
|---|
| 492 |
|
|---|
| 493 | char str[256];
|
|---|
| 494 | char * p;
|
|---|
| 495 | char * q;
|
|---|
| 496 | int res;
|
|---|
| 497 | SL_TICKET fd;
|
|---|
| 498 | char buf[1024];
|
|---|
| 499 |
|
|---|
| 500 | strcpy(str, "match(this)");
|
|---|
| 501 | p = get_arg(str);
|
|---|
| 502 | q = get_com(str);
|
|---|
| 503 | CuAssertPtrNotNull(tc, p);
|
|---|
| 504 | CuAssertPtrNotNull(tc, q);
|
|---|
| 505 | CuAssertStrEquals(tc, "match", q);
|
|---|
| 506 | CuAssertStrEquals(tc, "this", p);
|
|---|
| 507 |
|
|---|
| 508 | strcpy(str, " match( this)");
|
|---|
| 509 | p = get_arg(str);
|
|---|
| 510 | q = get_com(str);
|
|---|
| 511 | CuAssertPtrNotNull(tc, p);
|
|---|
| 512 | CuAssertPtrNotNull(tc, q);
|
|---|
| 513 | CuAssertStrEquals(tc, "match", q);
|
|---|
| 514 | CuAssertStrEquals(tc, "this", p);
|
|---|
| 515 |
|
|---|
| 516 | strcpy(str, " match ( this ) ");
|
|---|
| 517 | p = get_arg(str);
|
|---|
| 518 | q = get_com(str);
|
|---|
| 519 | CuAssertPtrNotNull(tc, p);
|
|---|
| 520 | CuAssertPtrNotNull(tc, q);
|
|---|
| 521 | CuAssertStrEquals(tc, "match", q);
|
|---|
| 522 | CuAssertStrEquals(tc, "this", p);
|
|---|
| 523 |
|
|---|
| 524 | strcpy(str, " match (this ) ");
|
|---|
| 525 | p = get_arg(str);
|
|---|
| 526 | q = get_com(str);
|
|---|
| 527 | CuAssertPtrNotNull(tc, p);
|
|---|
| 528 | CuAssertPtrNotNull(tc, q);
|
|---|
| 529 | CuAssertStrEquals(tc, "match", q);
|
|---|
| 530 | CuAssertStrEquals(tc, "this", p);
|
|---|
| 531 |
|
|---|
| 532 | strcpy(str, "size_exceeds(800), match_prefix(/home), match_regex(.*\\.mpg) ");
|
|---|
| 533 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 534 | res = sh_restrict_define(str);
|
|---|
| 535 | CuAssertIntEquals(tc,0,res);
|
|---|
| 536 | CuAssertPtrNotNull(tc, sh_restrict_list);
|
|---|
| 537 |
|
|---|
| 538 | sh_restrict_purge();
|
|---|
| 539 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 540 |
|
|---|
| 541 | strcpy(str, "size_exceeds(800), match_prefix(/home), match_regex(.*\\.mpg), match_permission(0755) ");
|
|---|
| 542 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 543 | res = sh_restrict_define(str);
|
|---|
| 544 | CuAssertIntEquals(tc,0,res);
|
|---|
| 545 | CuAssertPtrNotNull(tc, sh_restrict_list);
|
|---|
| 546 |
|
|---|
| 547 | strcpy(str, "size_exceeds(800), match_prefix(/foo), have_permission(0100)");
|
|---|
| 548 | res = sh_restrict_define(str);
|
|---|
| 549 | CuAssertIntEquals(tc,0,res);
|
|---|
| 550 | CuAssertPtrNotNull(tc, sh_restrict_list);
|
|---|
| 551 |
|
|---|
| 552 | res = sh_restrict_this("/home/foo.mpg", 1000, 0755, 0);
|
|---|
| 553 | CuAssertIntEquals(tc,1,res);
|
|---|
| 554 |
|
|---|
| 555 | res = sh_restrict_this("/foo.mpg", 1000, 0755, 0);
|
|---|
| 556 | CuAssertIntEquals(tc,1,res);
|
|---|
| 557 |
|
|---|
| 558 | /* size too small */
|
|---|
| 559 | res = sh_restrict_this("/foo.mpg", 600, 0755, 0);
|
|---|
| 560 | CuAssertIntEquals(tc,0,res);
|
|---|
| 561 |
|
|---|
| 562 | /* no execute permission */
|
|---|
| 563 | res = sh_restrict_this("/foo.mpg", 600, 0644, 0);
|
|---|
| 564 | CuAssertIntEquals(tc,0,res);
|
|---|
| 565 |
|
|---|
| 566 | /* regex does not match */
|
|---|
| 567 | res = sh_restrict_this("/home/foo", 1000, 0755, 0);
|
|---|
| 568 | CuAssertIntEquals(tc,0,res);
|
|---|
| 569 |
|
|---|
| 570 | /* wrong permission */
|
|---|
| 571 | res = sh_restrict_this("/home/foo.mpg", 1000, 0705, 0);
|
|---|
| 572 | CuAssertIntEquals(tc,0,res);
|
|---|
| 573 |
|
|---|
| 574 | /* size too small */
|
|---|
| 575 | res = sh_restrict_this("/home/foo.mpg", 600, 0755, 0);
|
|---|
| 576 | CuAssertIntEquals(tc,0,res);
|
|---|
| 577 |
|
|---|
| 578 | /* wrong prefix */
|
|---|
| 579 | res = sh_restrict_this("/hoff/foo.mpg", 1000, 0755, 0);
|
|---|
| 580 | CuAssertIntEquals(tc,0,res);
|
|---|
| 581 |
|
|---|
| 582 | sh_restrict_purge();
|
|---|
| 583 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 584 |
|
|---|
| 585 | fd = sl_open_fastread(FIL__, __LINE__, "/bin/sh", SL_NOPRIV);
|
|---|
| 586 | CuAssertTrue(tc, fd > 0);
|
|---|
| 587 |
|
|---|
| 588 | strcpy(str, "match_prefix(/bin), match_filetype(EXECUTABLE:UNIX:ELF)");
|
|---|
| 589 | res = sh_restrict_define(str);
|
|---|
| 590 | CuAssertIntEquals(tc,0,res);
|
|---|
| 591 | CuAssertPtrNotNull(tc, sh_restrict_list);
|
|---|
| 592 |
|
|---|
| [341] | 593 | #if !defined(HOST_IS_CYGWIN)
|
|---|
| [310] | 594 | res = sh_restrict_this("/bin/sh", 1000, 0755, fd);
|
|---|
| 595 | CuAssertIntEquals(tc,1,res);
|
|---|
| [341] | 596 | #endif
|
|---|
| [310] | 597 |
|
|---|
| 598 | sl_close(fd);
|
|---|
| 599 |
|
|---|
| 600 | sh_restrict_purge();
|
|---|
| 601 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 602 |
|
|---|
| 603 | strcpy(str, "match_filetype(FILE:TEXT:COPYING)");
|
|---|
| 604 | res = sh_restrict_define(str);
|
|---|
| 605 | CuAssertIntEquals(tc,0,res);
|
|---|
| 606 | CuAssertPtrNotNull(tc, sh_restrict_list);
|
|---|
| 607 |
|
|---|
| 608 | p = getcwd(buf, sizeof(buf));
|
|---|
| 609 | CuAssertPtrNotNull(tc, p);
|
|---|
| 610 |
|
|---|
| 611 | strcpy(str, "0:0:0:FILE:TEXT:COPYING:Copying:=0a=53=41=4d=48=41=49=4e");
|
|---|
| 612 | res = sh_restrict_add_ftype(str);
|
|---|
| 613 | CuAssertIntEquals(tc,0,res);
|
|---|
| 614 |
|
|---|
| 615 | sl_strlcat(buf, "/COPYING", sizeof(buf));
|
|---|
| 616 | fd = sl_open_fastread(FIL__, __LINE__, buf, SL_NOPRIV);
|
|---|
| 617 | CuAssertTrue(tc, fd > 0);
|
|---|
| 618 |
|
|---|
| 619 | res = sh_restrict_this(buf, 1000, 0755, fd);
|
|---|
| 620 | CuAssertIntEquals(tc,1,res);
|
|---|
| 621 |
|
|---|
| 622 | res = sh_restrict_add_ftype(str);
|
|---|
| 623 | CuAssertIntEquals(tc,0,res);
|
|---|
| 624 | res = sh_restrict_add_ftype(str);
|
|---|
| 625 | CuAssertIntEquals(tc,0,res);
|
|---|
| 626 | res = sh_restrict_add_ftype(str);
|
|---|
| 627 | CuAssertIntEquals(tc,0,res);
|
|---|
| 628 |
|
|---|
| 629 | res = sh_restrict_add_ftype(str);
|
|---|
| 630 | CuAssertIntEquals(tc,0,res);
|
|---|
| 631 | res = sh_restrict_add_ftype(str);
|
|---|
| 632 | CuAssertIntEquals(tc,0,res);
|
|---|
| 633 | res = sh_restrict_add_ftype(str);
|
|---|
| 634 | CuAssertIntEquals(tc,0,res);
|
|---|
| 635 | res = sh_restrict_add_ftype(str);
|
|---|
| 636 | CuAssertIntEquals(tc,0,res);
|
|---|
| 637 |
|
|---|
| 638 | res = sh_restrict_add_ftype(str);
|
|---|
| 639 | CuAssertIntEquals(tc,0,res);
|
|---|
| 640 | res = sh_restrict_add_ftype(str);
|
|---|
| 641 | CuAssertIntEquals(tc,0,res);
|
|---|
| 642 | res = sh_restrict_add_ftype(str);
|
|---|
| 643 | CuAssertIntEquals(tc,0,res);
|
|---|
| 644 | res = sh_restrict_add_ftype(str);
|
|---|
| 645 | CuAssertIntEquals(tc,0,res);
|
|---|
| 646 |
|
|---|
| 647 | res = sh_restrict_add_ftype(str);
|
|---|
| 648 | CuAssertIntEquals(tc,0,res);
|
|---|
| 649 | res = sh_restrict_add_ftype(str);
|
|---|
| 650 | CuAssertIntEquals(tc,0,res);
|
|---|
| 651 | res = sh_restrict_add_ftype(str);
|
|---|
| 652 | CuAssertIntEquals(tc,0,res);
|
|---|
| 653 | res = sh_restrict_add_ftype(str);
|
|---|
| 654 | CuAssertIntEquals(tc,0,res);
|
|---|
| 655 |
|
|---|
| 656 | res = sh_restrict_add_ftype(str);
|
|---|
| 657 | CuAssertIntEquals(tc,-1,res);
|
|---|
| 658 |
|
|---|
| 659 | sh_restrict_purge();
|
|---|
| 660 | CuAssertTrue(tc, sh_restrict_list == NULL);
|
|---|
| 661 |
|
|---|
| 662 | res = sh_restrict_add_ftype(str);
|
|---|
| 663 | CuAssertIntEquals(tc,0,res);
|
|---|
| 664 |
|
|---|
| 665 | #else
|
|---|
| 666 | (void) tc;
|
|---|
| 667 | /* #if defined(SH_WITH_CLIENT) || defined(SH_STANDALONE) */
|
|---|
| 668 | #endif
|
|---|
| 669 |
|
|---|
| 670 | }
|
|---|
| 671 | #endif
|
|---|
| 672 |
|
|---|
| 673 |
|
|---|