2015-09-23 13:19:48 +00:00
|
|
|
# encoding: utf-8
|
2015-10-06 16:55:44 +00:00
|
|
|
# author: Christoph Hartmann
|
|
|
|
# author: Dominik Richter
|
2015-09-23 13:19:48 +00:00
|
|
|
|
|
|
|
# Usage:
|
|
|
|
# describe port(80) do
|
|
|
|
# it { should be_listening }
|
|
|
|
# its('protocol') {should eq 'tcp'}
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# not supported serverspec syntax
|
|
|
|
# describe port(80) do
|
|
|
|
# it { should be_listening.with('tcp') }
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# TODO: currently we return local ip only
|
|
|
|
# TODO: improve handling of same port on multiple interfaces
|
2015-10-26 03:04:18 +00:00
|
|
|
class Port < Inspec.resource(1)
|
2015-09-23 13:19:48 +00:00
|
|
|
name 'port'
|
|
|
|
|
|
|
|
def initialize(port)
|
|
|
|
@port = port
|
|
|
|
@port_manager = nil
|
|
|
|
@cache = nil
|
|
|
|
|
2015-10-26 03:04:18 +00:00
|
|
|
case inspec.os[:family]
|
2015-11-16 19:32:43 +00:00
|
|
|
when 'ubuntu', 'debian', 'redhat', 'fedora', 'centos', 'arch'
|
2015-10-26 03:04:18 +00:00
|
|
|
@port_manager = LinuxPorts.new(inspec)
|
2015-09-23 13:21:25 +00:00
|
|
|
when 'darwin'
|
2015-10-26 03:04:18 +00:00
|
|
|
@port_manager = DarwinPorts.new(inspec)
|
2015-09-23 13:22:31 +00:00
|
|
|
when 'windows'
|
2015-10-26 03:04:18 +00:00
|
|
|
@port_manager = WindowsPorts.new(inspec)
|
2015-09-23 13:24:46 +00:00
|
|
|
when 'freebsd'
|
2015-10-26 03:04:18 +00:00
|
|
|
@port_manager = FreeBsdPorts.new(inspec)
|
2015-09-23 13:19:48 +00:00
|
|
|
else
|
|
|
|
return skip_resource 'The `port` resource is not supported on your OS yet.'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def listening?(_protocol = nil, _local_address = nil)
|
2015-09-23 18:52:30 +00:00
|
|
|
info.size > 0
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def protocol
|
2015-09-23 18:53:47 +00:00
|
|
|
res = info.map { |x| x[:protocol] }.uniq.compact
|
|
|
|
res.size > 0 ? res : nil
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def process
|
2015-09-23 18:53:47 +00:00
|
|
|
res = info.map { |x| x[:process] }.uniq.compact
|
|
|
|
res.size > 0 ? res : nil
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def pid
|
2015-09-23 18:53:47 +00:00
|
|
|
res = info.map { |x| x[:pid] }.uniq.compact
|
|
|
|
res.size > 0 ? res : nil
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
|
2015-10-12 11:01:58 +00:00
|
|
|
def to_s
|
|
|
|
"Port #{@port}"
|
|
|
|
end
|
|
|
|
|
2015-09-23 13:19:48 +00:00
|
|
|
private
|
|
|
|
|
|
|
|
def info
|
|
|
|
return @cache if !@cache.nil?
|
|
|
|
# abort if os detection has not worked
|
|
|
|
return @cache = [] if @port_manager.nil?
|
|
|
|
# query ports
|
2015-09-23 16:29:06 +00:00
|
|
|
ports = @port_manager.info || []
|
|
|
|
@cache = ports.select { |p| p[:port] == @port }
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# implements an info method and returns all ip adresses and protocols for
|
|
|
|
# each port
|
|
|
|
# [{
|
|
|
|
# port: 80,
|
|
|
|
# address: [{
|
|
|
|
# ip: '0.0.0.0'
|
|
|
|
# protocol: 'tcp'
|
|
|
|
# }],
|
|
|
|
# }]
|
|
|
|
class PortsInfo
|
2015-10-26 03:04:18 +00:00
|
|
|
attr_reader :inspec
|
|
|
|
def initialize(inspec)
|
|
|
|
@inspec = inspec
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-23 18:55:21 +00:00
|
|
|
# TODO: Add UDP infromation Get-NetUDPEndpoint
|
2015-09-23 13:22:31 +00:00
|
|
|
# TODO: currently Windows only supports tcp ports
|
|
|
|
# TODO: Get-NetTCPConnection does not return PIDs
|
2015-09-23 18:55:21 +00:00
|
|
|
# TODO: double-check output with 'netstat -ano'
|
2015-09-23 13:22:31 +00:00
|
|
|
# @see https://connect.microsoft.com/PowerShell/feedback/details/1349420/get-nettcpconnection-does-not-show-processid
|
|
|
|
class WindowsPorts < PortsInfo
|
|
|
|
def info
|
|
|
|
# get all port information
|
2015-10-26 03:04:18 +00:00
|
|
|
cmd = inspec.command('Get-NetTCPConnection | Select-Object -Property State, Caption, Description, LocalAddress, LocalPort, RemoteAddress, RemotePort, DisplayName, Status | ConvertTo-Json')
|
2015-09-23 13:22:31 +00:00
|
|
|
|
|
|
|
begin
|
|
|
|
ports = JSON.parse(cmd.stdout)
|
|
|
|
rescue JSON::ParserError => _e
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
|
|
|
|
return nil if ports.nil?
|
|
|
|
|
|
|
|
ports.map { |x|
|
|
|
|
{
|
|
|
|
port: x['LocalPort'],
|
|
|
|
address: x['LocalAddress'],
|
|
|
|
protocol: 'tcp',
|
|
|
|
process: nil,
|
|
|
|
pid: nil,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-23 13:21:25 +00:00
|
|
|
# extracts udp and tcp ports from macos
|
|
|
|
class DarwinPorts < PortsInfo
|
|
|
|
def info
|
|
|
|
# collects UDP and TCP information
|
2015-10-26 03:04:18 +00:00
|
|
|
cmd = inspec.command('lsof -nP -iTCP -iUDP -sTCP:LISTEN')
|
2015-09-23 13:21:25 +00:00
|
|
|
return nil if cmd.exit_status.to_i != 0
|
|
|
|
|
|
|
|
ports = []
|
|
|
|
# split on each newline
|
|
|
|
cmd.stdout.each_line do |line|
|
|
|
|
# parse each line
|
|
|
|
# 1 - COMMAND, 2 - PID, 3 - USER, 4 - FD, 5 - TYPE, 6 - DEVICE, 7 - SIZE/OFF, 8 - NODE, 9 - NAME
|
|
|
|
parsed = /^(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+).*$/.match(line)
|
|
|
|
# extract network info
|
|
|
|
net_addr = parsed[9].split(':')
|
|
|
|
# convert to number if possible
|
|
|
|
net_port = net_addr[1]
|
|
|
|
net_port = net_port.to_i if /^\d+$/.match(net_port)
|
|
|
|
protocol = parsed[8].downcase
|
|
|
|
|
2015-09-23 18:55:03 +00:00
|
|
|
# add version to protocol
|
|
|
|
type = parsed[5].downcase
|
|
|
|
protocol += '6' if type == 'IPv6'
|
|
|
|
|
2015-09-23 13:21:25 +00:00
|
|
|
# map data
|
|
|
|
port_info = {
|
|
|
|
port: net_port,
|
|
|
|
address: net_addr[0],
|
|
|
|
protocol: protocol,
|
|
|
|
process: parsed[1],
|
|
|
|
pid: parsed[2].to_i,
|
|
|
|
}
|
|
|
|
|
|
|
|
# push data, if not headerfile
|
2015-09-23 18:55:03 +00:00
|
|
|
ports.push(port_info) if %w{tcp tcp6 udp udp6}.include?(protocol)
|
2015-09-23 13:21:25 +00:00
|
|
|
end
|
|
|
|
ports
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2015-09-23 13:19:48 +00:00
|
|
|
# extract port information from netstat
|
|
|
|
class LinuxPorts < PortsInfo
|
|
|
|
def info
|
2015-10-26 03:04:18 +00:00
|
|
|
cmd = inspec.command('netstat -tulpen')
|
2015-09-23 13:19:48 +00:00
|
|
|
return nil if cmd.exit_status.to_i != 0
|
|
|
|
|
|
|
|
ports = []
|
2015-09-26 00:24:35 +00:00
|
|
|
# parse all lines
|
2015-09-23 13:19:48 +00:00
|
|
|
cmd.stdout.each_line do |line|
|
2015-09-26 00:24:35 +00:00
|
|
|
port_info = parse_netstat_line(line)
|
|
|
|
|
|
|
|
# only push protocols we are interested in
|
|
|
|
next unless %w{tcp tcp6 udp udp6}.include?(port_info[:protocol])
|
|
|
|
ports.push(port_info)
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
|
|
|
ports
|
|
|
|
end
|
2015-09-26 00:24:35 +00:00
|
|
|
|
|
|
|
def parse_net_address(net_addr, protocol)
|
|
|
|
if protocol.eql?('tcp6') || protocol.eql?('udp6')
|
|
|
|
# prep for URI parsing, parse ip6 port
|
2015-11-17 11:12:59 +00:00
|
|
|
ip6 = /^(\S+):(\d+)$/.match(net_addr)
|
2015-09-26 00:24:35 +00:00
|
|
|
ip6addr = ip6[1]
|
|
|
|
ip6addr = '::' if /^:::$/.match(ip6addr)
|
|
|
|
# build uri
|
2015-10-01 13:25:08 +00:00
|
|
|
ip_addr = URI("addr://[#{ip6addr}]:#{ip6[2]}")
|
2015-09-26 00:24:35 +00:00
|
|
|
# replace []
|
|
|
|
host = ip_addr.host[1..ip_addr.host.size-2]
|
|
|
|
port = ip_addr.port
|
|
|
|
else
|
|
|
|
ip_addr = URI('addr://'+net_addr)
|
|
|
|
host = ip_addr.host
|
|
|
|
port = ip_addr.port
|
|
|
|
end
|
|
|
|
[host, port]
|
2015-11-17 11:14:05 +00:00
|
|
|
rescue URI::InvalidURIError => e
|
|
|
|
warn "Could not parse #{net_addr}, #{e}"
|
|
|
|
nil
|
2015-09-26 00:24:35 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def parse_netstat_line(line)
|
|
|
|
# parse each line
|
|
|
|
# 1 - Proto, 2 - Recv-Q, 3 - Send-Q, 4 - Local Address, 5 - Foreign Address, 6 - State, 7 - Inode, 8 - PID/Program name
|
2015-11-16 19:33:49 +00:00
|
|
|
parsed = /^(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)/.match(line)
|
2015-11-17 11:14:05 +00:00
|
|
|
|
2015-11-16 20:44:12 +00:00
|
|
|
return {} if parsed.nil? || line.match(/^proto/i)
|
2015-11-16 19:33:49 +00:00
|
|
|
|
2015-11-17 11:14:05 +00:00
|
|
|
# parse ip4 and ip6 addresses
|
|
|
|
protocol = parsed[1].downcase
|
2015-11-16 19:33:49 +00:00
|
|
|
|
2015-11-17 11:15:49 +00:00
|
|
|
# detect protocol if not provided
|
2015-11-17 11:29:33 +00:00
|
|
|
protocol += '6' if parsed[4].count(':') > 1 && %w{tcp udp}.include?(protocol)
|
2015-11-17 11:15:49 +00:00
|
|
|
|
2015-11-17 11:14:05 +00:00
|
|
|
# extract host and port information
|
|
|
|
host, port = parse_net_address(parsed[4], protocol)
|
2015-11-16 19:33:49 +00:00
|
|
|
|
2015-11-17 11:14:05 +00:00
|
|
|
# extract PID
|
|
|
|
process = parsed[9].split('/')
|
|
|
|
pid = process[0]
|
|
|
|
pid = pid.to_i if /^\d+$/.match(pid)
|
|
|
|
process = process[1]
|
|
|
|
|
|
|
|
# map data
|
|
|
|
{
|
|
|
|
port: port,
|
|
|
|
address: host,
|
|
|
|
protocol: protocol,
|
|
|
|
process: process,
|
|
|
|
pid: pid,
|
|
|
|
}
|
2015-09-26 00:24:35 +00:00
|
|
|
end
|
2015-09-23 13:19:48 +00:00
|
|
|
end
|
2015-09-23 13:24:46 +00:00
|
|
|
|
|
|
|
# extracts information from sockstat
|
|
|
|
class FreeBsdPorts < PortsInfo
|
|
|
|
def info
|
2015-10-26 03:04:18 +00:00
|
|
|
cmd = inspec.command('sockstat -46l')
|
2015-09-23 13:24:46 +00:00
|
|
|
return nil if cmd.exit_status.to_i != 0
|
|
|
|
|
|
|
|
ports = []
|
|
|
|
# split on each newline
|
|
|
|
cmd.stdout.each_line do |line|
|
2015-09-26 00:24:35 +00:00
|
|
|
port_info = parse_sockstat_line(line)
|
|
|
|
|
|
|
|
# push data, if not headerfile
|
|
|
|
next unless %w{tcp tcp6 udp udp6}.include?(port_info[:protocol])
|
|
|
|
ports.push(port_info)
|
2015-09-23 13:24:46 +00:00
|
|
|
end
|
|
|
|
ports
|
|
|
|
end
|
2015-09-26 00:24:35 +00:00
|
|
|
|
|
|
|
def parse_net_address(net_addr, protocol)
|
|
|
|
case protocol
|
|
|
|
when 'tcp4', 'udp4'
|
|
|
|
# replace * with 0.0.0.0
|
|
|
|
net_addr = net_addr.gsub(/^\*:/, '0.0.0.0:') if /^*:(\d+)$/.match(net_addr)
|
|
|
|
ip_addr = URI('addr://'+net_addr)
|
|
|
|
host = ip_addr.host
|
|
|
|
port = ip_addr.port
|
|
|
|
when 'tcp6', 'udp6'
|
|
|
|
return [] if net_addr == '*:*' # abort for now
|
|
|
|
# replace * with 0:0:0:0:0:0:0:0
|
|
|
|
net_addr = net_addr.gsub(/^\*:/, '0:0:0:0:0:0:0:0:') if /^*:(\d+)$/.match(net_addr)
|
|
|
|
# extract port
|
|
|
|
ip6 = /^(\S+):(\d+)$/.match(net_addr)
|
|
|
|
ip6addr = ip6[1]
|
2015-10-01 13:25:08 +00:00
|
|
|
ip_addr = URI("addr://[#{ip6addr}]:#{ip6[2]}")
|
2015-09-26 00:24:35 +00:00
|
|
|
# replace []
|
|
|
|
host = ip_addr.host[1..ip_addr.host.size-2]
|
|
|
|
port = ip_addr.port
|
|
|
|
end
|
|
|
|
[host, port]
|
2015-11-17 11:14:05 +00:00
|
|
|
rescue URI::InvalidURIError => e
|
|
|
|
warn "Could not parse #{net_addr}, #{e}"
|
|
|
|
nil
|
2015-09-26 00:24:35 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def parse_sockstat_line(line)
|
|
|
|
# 1 - USER, 2 - COMMAND, 3 - PID, 4 - FD 5 - PROTO, 6 - LOCAL ADDRESS, 7 - FOREIGN ADDRESS
|
|
|
|
parsed = /^(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)$/.match(line)
|
|
|
|
return {} if parsed.nil?
|
|
|
|
|
|
|
|
# extract ip information
|
|
|
|
protocol = parsed[5].downcase
|
|
|
|
host, port = parse_net_address(parsed[6], protocol)
|
|
|
|
return {} if host.nil? or port.nil?
|
|
|
|
|
|
|
|
# extract process
|
|
|
|
process = parsed[2]
|
|
|
|
|
|
|
|
# extract PID
|
|
|
|
pid = parsed[3]
|
|
|
|
pid = pid.to_i if /^\d+$/.match(pid)
|
|
|
|
|
|
|
|
# map tcp4 and udp4
|
|
|
|
protocol = 'tcp' if protocol.eql?('tcp4')
|
|
|
|
protocol = 'udp' if protocol.eql?('udp4')
|
|
|
|
|
|
|
|
# map data
|
|
|
|
{
|
|
|
|
port: port,
|
|
|
|
address: host,
|
|
|
|
protocol: protocol,
|
|
|
|
process: process,
|
|
|
|
pid: pid,
|
|
|
|
}
|
|
|
|
end
|
2015-09-23 13:24:46 +00:00
|
|
|
end
|