Server IP : 192.64.112.168 / Your IP : 3.144.1.100 Web Server : Apache System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64 User : expressoneac ( 1128) PHP Version : 8.0.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/python3.6/site-packages/sos/report/plugins/ |
Upload File : |
# This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import (Plugin, IndependentPlugin, SoSPredicate) class FirewallTables(Plugin, IndependentPlugin): """Collects information about local firewall tables, such as iptables, and nf_tables (via nft). Note that this plugin does _not_ collect firewalld information, which is handled by a separate plugin. Collections from this plugin are largely gated byt the presence of relevant kernel modules - for example, the plugin will not collect the nf_tables ruleset if both the `nf_tables` and `nfnetlink` kernel modules are not currently loaded (unless using the --allow-system-changes option). """ short_desc = 'firewall tables' plugin_name = "firewall_tables" profiles = ('network', 'system') files = ('/etc/nftables',) kernel_mods = ('ip_tables', 'ip6_tables', 'nf_tables', 'nfnetlink', 'ebtables') def collect_iptable(self, tablename): """ Collecting iptables rules for a table loads either kernel module of the table name (for kernel <= 3), or nf_tables (for kernel >= 4). If neither module is present, the rules must be empty.""" modname = "iptable_" + tablename cmd = "iptables -t " + tablename + " -nvL" self.add_cmd_output( cmd, pred=SoSPredicate(self, kmods=[modname, 'nf_tables'])) def collect_ip6table(self, tablename): """ Same as function above, but for ipv6 """ modname = "ip6table_" + tablename cmd = "ip6tables -t " + tablename + " -nvL" self.add_cmd_output( cmd, pred=SoSPredicate(self, kmods=[modname, 'nf_tables'])) def collect_nftables(self): """ Collects nftables rulesets with 'nft' commands if the modules are present """ # collect nftables ruleset nft_pred = SoSPredicate(self, kmods=['nf_tables', 'nfnetlink'], required={'kmods': 'all'}) return self.collect_cmd_output("nft -a list ruleset", pred=nft_pred, changes=True) def setup(self): # first, collect "nft list ruleset" as collecting commands like # ip6tables -t mangle -nvL # depends on its output # store in nft_ip_tables lists of ip[|6] tables from nft list nft_list = self.collect_nftables() nft_ip_tables = {'ip': [], 'ip6': []} nft_lines = nft_list['output'] if nft_list['status'] == 0 else '' for line in nft_lines.splitlines(): words = line.split()[0:3] if len(words) == 3 and words[0] == 'table' and \ words[1] in nft_ip_tables: nft_ip_tables[words[1]].append(words[2]) # collect iptables -t for any existing table, if we can't read the # tables, collect 2 default ones (mangle, filter) # do collect them only when relevant nft list ruleset exists default_ip_tables = "mangle\nfilter\nnat\n" try: proc_net_ip_tables = '/proc/net/ip_tables_names' with open(proc_net_ip_tables, 'r', encoding='UTF-8') as ifile: ip_tables_names = ifile.read() except IOError: ip_tables_names = default_ip_tables for table in ip_tables_names.splitlines(): if nft_list['status'] == 0 and table in nft_ip_tables['ip']: self.collect_iptable(table) # collect the same for ip6tables try: proc_net_ip6_tables = '/proc/net/ip6_tables_names' with open(proc_net_ip6_tables, 'r', encoding='UTF-8') as ipfile: ip_tables_names = ipfile.read() except IOError: ip_tables_names = default_ip_tables for table in ip_tables_names.splitlines(): if nft_list['status'] == 0 and table in nft_ip_tables['ip6']: self.collect_ip6table(table) # When iptables is called it will load: # 1) the modules iptables_filter (for kernel <= 3) or # nf_tables (for kernel >= 4) if they are not loaded. # 2) nft 'ip filter' table will be created # The same goes for ipv6. if nft_list['status'] != 0 or 'filter' in nft_ip_tables['ip']: self.add_cmd_output( "iptables -vnxL", pred=SoSPredicate(self, kmods=['iptable_filter', 'nf_tables']) ) if nft_list['status'] != 0 or 'filter' in nft_ip_tables['ip6']: self.add_cmd_output( "ip6tables -vnxL", pred=SoSPredicate(self, kmods=['ip6table_filter', 'nf_tables']) ) self.add_copy_spec([ "/etc/nftables", "/etc/sysconfig/nftables.conf", "/etc/nftables.conf", ]) # vim: set et ts=4 sw=4 :