mirror of
https://github.com/freedombox/FreedomBox.git
synced 2026-02-04 08:13:38 +00:00
Show the number of vulnerabilities reported by debsecan for freedombox package and for managed_packages of each installed app. Essential apps are not included in the list. Also note that dependencies of the managed_packages are not included yet. The purpose of this information is to help users decide which apps to use, and what level of personal information to store in each app. Closes #1609. Signed-off-by: James Valleroy <jvalleroy@mailbox.org> [sunil@medhas.org Show essential apps too] [sunil@medhas.org Fix HTML tags] [sunil@medhas.org Use setup_helper to get the installed state of an app] Signed-off-by: Sunil Mohan Adapa <sunil@medhas.org> Reviewed-by: Sunil Mohan Adapa <sunil@medhas.org>
153 lines
4.3 KiB
Python
153 lines
4.3 KiB
Python
#
|
|
# This file is part of FreedomBox.
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
"""
|
|
FreedomBox app for security configuration.
|
|
"""
|
|
|
|
import subprocess
|
|
from collections import defaultdict
|
|
|
|
from django.utils.translation import ugettext_lazy as _
|
|
|
|
from plinth import actions
|
|
from plinth import app as app_module
|
|
from plinth import menu, module_loader
|
|
|
|
from .manifest import backup # noqa, pylint: disable=unused-import
|
|
|
|
version = 6
|
|
|
|
is_essential = True
|
|
|
|
name = _('Security')
|
|
|
|
managed_packages = ['fail2ban', 'debsecan']
|
|
|
|
managed_services = ['fail2ban']
|
|
|
|
manual_page = 'Security'
|
|
|
|
ACCESS_CONF_FILE = '/etc/security/access.d/50freedombox.conf'
|
|
ACCESS_CONF_FILE_OLD = '/etc/security/access.conf'
|
|
ACCESS_CONF_SNIPPET = '-:ALL EXCEPT root fbx plinth (admin) (sudo):ALL'
|
|
OLD_ACCESS_CONF_SNIPPET = '-:ALL EXCEPT root fbx (admin) (sudo):ALL'
|
|
ACCESS_CONF_SNIPPETS = [OLD_ACCESS_CONF_SNIPPET, ACCESS_CONF_SNIPPET]
|
|
|
|
app = None
|
|
|
|
|
|
class SecurityApp(app_module.App):
|
|
"""FreedomBox app for security."""
|
|
|
|
app_id = 'security'
|
|
|
|
def __init__(self):
|
|
"""Create components for the app."""
|
|
super().__init__()
|
|
menu_item = menu.Menu('menu-security', name, None, 'fa-lock',
|
|
'security:index', parent_url_name='system')
|
|
self.add(menu_item)
|
|
|
|
|
|
def init():
|
|
"""Initialize the module"""
|
|
global app
|
|
app = SecurityApp()
|
|
app.set_enabled(True)
|
|
|
|
|
|
def setup(helper, old_version=None):
|
|
"""Install the required packages"""
|
|
helper.install(managed_packages)
|
|
setup_fail2ban()
|
|
|
|
# Migrate to new config file.
|
|
enabled = get_restricted_access_enabled()
|
|
set_restricted_access(False)
|
|
if enabled:
|
|
set_restricted_access(True)
|
|
|
|
|
|
def setup_fail2ban():
|
|
actions.superuser_run('service', ['unmask', 'fail2ban'])
|
|
actions.superuser_run('service', ['enable', 'fail2ban'])
|
|
actions.superuser_run('service', ['reload', 'fail2ban'])
|
|
|
|
|
|
def get_restricted_access_enabled():
|
|
"""Return whether restricted access is enabled"""
|
|
with open(ACCESS_CONF_FILE_OLD, 'r') as conffile:
|
|
if any(line.strip() in ACCESS_CONF_SNIPPETS
|
|
for line in conffile.readlines()):
|
|
return True
|
|
|
|
try:
|
|
with open(ACCESS_CONF_FILE, 'r') as conffile:
|
|
return any(line.strip() in ACCESS_CONF_SNIPPETS
|
|
for line in conffile.readlines())
|
|
except FileNotFoundError:
|
|
return False
|
|
|
|
|
|
def set_restricted_access(enabled):
|
|
"""Enable or disable restricted access"""
|
|
action = 'disable-restricted-access'
|
|
if enabled:
|
|
action = 'enable-restricted-access'
|
|
|
|
actions.superuser_run('security', [action])
|
|
|
|
|
|
def get_vulnerability_counts():
|
|
"""Return number of security vulnerabilities for each app"""
|
|
lines = subprocess.check_output(['debsecan']).decode().split('\n')
|
|
cves = defaultdict(set)
|
|
for line in lines:
|
|
if line:
|
|
(label, package, *_) = line.split()
|
|
cves[label].add(package)
|
|
|
|
apps = {
|
|
'freedombox': {
|
|
'name': 'freedombox',
|
|
'packages': {'freedombox'},
|
|
'count': 0,
|
|
}
|
|
}
|
|
for module_name, module in module_loader.loaded_modules.items():
|
|
try:
|
|
packages = module.managed_packages
|
|
except AttributeError:
|
|
continue # app has no managed packages
|
|
|
|
# filter out apps not setup yet
|
|
if module.setup_helper.get_state() == 'needs-setup':
|
|
continue
|
|
|
|
apps[module_name] = {
|
|
'name': module_name,
|
|
'packages': set(packages),
|
|
'count': 0,
|
|
}
|
|
|
|
for cve_packages in cves.values():
|
|
for app_ in apps.values():
|
|
if cve_packages & app_['packages']:
|
|
app['count'] += 1
|
|
|
|
return apps
|