#!/usr/bin/env python3 """ This tool is for checking the security hardening options of the Linux kernel. Author: Alexander Popov <alex.popov@linux.com> This module is the engine of checks. """ # pylint: disable=missing-class-docstring,missing-function-docstring # pylint: disable=line-too-long,invalid-name,too-many-branches GREEN_COLOR = '\x1b[32m' RED_COLOR = '\x1b[31m' COLOR_END = '\x1b[0m' def colorize_result(input_text): if input_text is None: return input_text if input_text.startswith('OK'): color = GREEN_COLOR else: assert(input_text.startswith('FAIL:')), f'unexpected result "{input_text}"' color = RED_COLOR return f'{color}{input_text}{COLOR_END}' class OptCheck: def __init__(self, reason, decision, name, expected): assert(name and name == name.strip() and len(name.split()) == 1), \ f'invalid name "{name}" for {self.__class__.__name__}' self.name = name assert(decision and decision == decision.strip() and len(decision.split()) == 1), \ f'invalid decision "{decision}" for "{name}" check' self.decision = decision assert(reason and reason == reason.strip() and len(reason.split()) == 1), \ f'invalid reason "{reason}" for "{name}" check' self.reason = reason assert(expected and expected == expected.strip()), \ f'invalid expected value "{expected}" for "{name}" check (1)' val_len = len(expected.split()) if val_len == 3: assert(expected in ('is not set', 'is not off')), \ f'invalid expected value "{expected}" for "{name}" check (2)' elif val_len == 2: assert(expected == 'is present'), \ f'invalid expected value "{expected}" for "{name}" check (3)' else: assert(val_len == 1), \ f'invalid expected value "{expected}" for "{name}" check (4)' self.expected = expected self.state = None self.result = None def check(self): # handle the 'is present' check if self.expected == 'is present': if self.state is None: self.result = 'FAIL: is not present' else: self.result = 'OK: is present' return # handle the 'is not off' option check if self.expected == 'is not off': if self.state == 'off': self.result = 'FAIL: is off' elif self.state == '0': self.result = 'FAIL: is off, "0"' elif self.state is None: self.result = 'FAIL: is off, not found' else: self.result = f'OK: is not off, "{self.state}"' return # handle the option value check if self.expected == self.state: self.result = 'OK' elif self.state is None: if self.expected == 'is not set': self.result = 'OK: is not found' else: self.result = 'FAIL: is not found' else: self.result = f'FAIL: "{self.state}"' def table_print(self, _mode, with_results): print(f'{self.name:<40}|{self.type:^7}|{self.expected:^12}|{self.decision:^10}|{self.reason:^18}', end='') if with_results: print(f'| {colorize_result(self.result)}', end='') def json_dump(self, with_results): dump = [self.name, self.type, self.expected, self.decision, self.reason] if with_results: dump.append(self.result) return dump class KconfigCheck(OptCheck): def __init__(self, *args, **kwargs): super().__init__(*args, **kwargs) self.name = 'CONFIG_' + self.name @property def type(self): return 'kconfig' class CmdlineCheck(OptCheck): @property def type(self): return 'cmdline' class SysctlCheck(OptCheck): @property def type(self): return 'sysctl' class VersionCheck: def __init__(self, ver_expected): assert(ver_expected and isinstance(ver_expected, tuple) and len(ver_expected) == 2), \ f'invalid version "{ver_expected}" for VersionCheck' self.ver_expected = ver_expected self.ver = () self.result = None @property def type(self): return 'version' def check(self): if self.ver[0] > self.ver_expected[0]: self.result = f'OK: version >= {self.ver_expected[0]}.{self.ver_expected[1]}' return if self.ver[0] < self.ver_expected[0]: self.result = f'FAIL: version < {self.ver_expected[0]}.{self.ver_expected[1]}' return if self.ver[1] >= self.ver_expected[1]: self.result = f'OK: version >= {self.ver_expected[0]}.{self.ver_expected[1]}' return self.result = f'FAIL: version < {self.ver_expected[0]}.{self.ver_expected[1]}' def table_print(self, _mode, with_results): ver_req = f'kernel version >= {self.ver_expected[0]}.{self.ver_expected[1]}' print(f'{ver_req:<91}', end='') if with_results: print(f'| {colorize_result(self.result)}', end='') class ComplexOptCheck: def __init__(self, *opts): self.opts = opts assert(self.opts), \ f'empty {self.__class__.__name__} check' assert(len(self.opts) != 1), \ f'useless {self.__class__.__name__} check: {opts}' assert(isinstance(opts[0], (KconfigCheck, CmdlineCheck, SysctlCheck))), \ f'invalid {self.__class__.__name__} check: {opts}' self.result = None @property def type(self): return 'complex' @property def name(self): return self.opts[0].name @property def expected(self): return self.opts[0].expected def table_print(self, mode, with_results): if mode == 'verbose': print(f' {"<<< " + self.__class__.__name__ + " >>>":87}', end='') if with_results: print(f'| {colorize_result(self.result)}', end='') for o in self.opts: print() o.table_print(mode, with_results) else: o = self.opts[0] o.table_print(mode, False) if with_results: print(f'| {colorize_result(self.result)}', end='') def json_dump(self, with_results): dump = self.opts[0].json_dump(False) if with_results: dump.append(self.result) return dump class OR(ComplexOptCheck): # self.opts[0] is the option that this OR-check is about. # Use cases: # OR(<X_is_hardened>, <X_is_disabled>) # OR(<X_is_hardened>, <old_X_is_hardened>) def check(self): for i, opt in enumerate(self.opts): opt.check() if opt.result.startswith('OK'): self.result = opt.result # Add more info for additional checks: if i != 0: if opt.result == 'OK': self.result = f'OK: {opt.name} is "{opt.expected}"' elif opt.result == 'OK: is not found': self.result = f'OK: {opt.name} is not found' elif opt.result == 'OK: is present': self.result = f'OK: {opt.name} is present' elif opt.result.startswith('OK: is not off'): self.result = f'OK: {opt.name} is not off' else: # VersionCheck provides enough info assert(opt.result.startswith('OK: version')), \ f'unexpected OK description "{opt.result}"' return self.result = self.opts[0].result class AND(ComplexOptCheck): # self.opts[0] is the option that this AND-check is about. # Use cases: # AND(<suboption>, <main_option>) # Suboption is not checked if checking of the main_option is failed. # AND(<X_is_disabled>, <old_X_is_disabled>) def check(self): for i, opt in reversed(list(enumerate(self.opts))): opt.check() if i == 0: self.result = opt.result return if not opt.result.startswith('OK'): # This FAIL is caused by additional checks, # and not by the main option that this AND-check is about. # Describe the reason of the FAIL. if opt.result.startswith('FAIL: \"') or opt.result == 'FAIL: is not found': self.result = f'FAIL: {opt.name} is not "{opt.expected}"' elif opt.result == 'FAIL: is not present': self.result = f'FAIL: {opt.name} is not present' elif opt.result in ('FAIL: is off', 'FAIL: is off, "0"'): self.result = f'FAIL: {opt.name} is off' elif opt.result == 'FAIL: is off, not found': self.result = f'FAIL: {opt.name} is off, not found' else: # VersionCheck provides enough info self.result = opt.result assert(opt.result.startswith('FAIL: version')), \ f'unexpected FAIL description "{opt.result}"' return SIMPLE_OPTION_TYPES = ('kconfig', 'cmdline', 'sysctl', 'version') def populate_simple_opt_with_data(opt, data, data_type): assert(opt.type != 'complex'), \ f'unexpected ComplexOptCheck "{opt.name}"' assert(opt.type in SIMPLE_OPTION_TYPES), \ f'invalid opt type "{opt.type}"' assert(data_type in SIMPLE_OPTION_TYPES), \ f'invalid data type "{data_type}"' assert(data), \ 'empty data' if data_type != opt.type: return if data_type in ('kconfig', 'cmdline', 'sysctl'): opt.state = data.get(opt.name, None) else: assert(data_type == 'version'), \ f'unexpected data type "{data_type}"' opt.ver = data def populate_opt_with_data(opt, data, data_type): assert(opt.type != 'version'), 'a single VersionCheck is useless' if opt.type != 'complex': populate_simple_opt_with_data(opt, data, data_type) else: for o in opt.opts: if o.type != 'complex': populate_simple_opt_with_data(o, data, data_type) else: # Recursion for nested ComplexOptCheck objects populate_opt_with_data(o, data, data_type) def populate_with_data(checklist, data, data_type): for opt in checklist: populate_opt_with_data(opt, data, data_type) def override_expected_value(checklist, name, new_val): for opt in checklist: if opt.name == name: assert(opt.type in ('kconfig', 'cmdline', 'sysctl')), \ f'overriding an expected value for "{opt.type}" checks is not supported yet' opt.expected = new_val def perform_checks(checklist): for opt in checklist: opt.check()