mirror of
https://github.com/jtesta/ssh-audit.git
synced 2024-11-23 02:51:41 +01:00
104 lines
4.4 KiB
Python
104 lines
4.4 KiB
Python
|
"""
|
||
|
The MIT License (MIT)
|
||
|
|
||
|
Copyright (C) 2017-2020 Joe Testa (jtesta@positronsecurity.com)
|
||
|
Copyright (C) 2017 Andris Raugulis (moo@arthepsy.eu)
|
||
|
|
||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||
|
of this software and associated documentation files (the "Software"), to deal
|
||
|
in the Software without restriction, including without limitation the rights
|
||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||
|
copies of the Software, and to permit persons to whom the Software is
|
||
|
furnished to do so, subject to the following conditions:
|
||
|
|
||
|
The above copyright notice and this permission notice shall be included in
|
||
|
all copies or substantial portions of the Software.
|
||
|
|
||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||
|
THE SOFTWARE.
|
||
|
"""
|
||
|
# pylint: disable=unused-import
|
||
|
from typing import Dict, List, Set, Sequence, Tuple, Iterable # noqa: F401
|
||
|
from typing import Callable, Optional, Union, Any # noqa: F401
|
||
|
|
||
|
from ssh_audit.policy import Policy
|
||
|
from ssh_audit.utils import Utils
|
||
|
|
||
|
|
||
|
class AuditConf:
|
||
|
# pylint: disable=too-many-instance-attributes
|
||
|
def __init__(self, host: str = '', port: int = 22) -> None:
|
||
|
self.host = host
|
||
|
self.port = port
|
||
|
self.ssh1 = True
|
||
|
self.ssh2 = True
|
||
|
self.batch = False
|
||
|
self.client_audit = False
|
||
|
self.colors = True
|
||
|
self.json = False
|
||
|
self.verbose = False
|
||
|
self.level = 'info'
|
||
|
self.ipvo = () # type: Sequence[int]
|
||
|
self.ipv4 = False
|
||
|
self.ipv6 = False
|
||
|
self.make_policy = False # When True, creates a policy file from an audit scan.
|
||
|
self.policy_file = None # type: Optional[str] # File system path to a policy
|
||
|
self.policy = None # type: Optional[Policy] # Policy object
|
||
|
self.timeout = 5.0
|
||
|
self.timeout_set = False # Set to True when the user explicitly sets it.
|
||
|
self.target_file = None # type: Optional[str]
|
||
|
self.target_list = [] # type: List[str]
|
||
|
self.list_policies = False
|
||
|
self.lookup = ''
|
||
|
|
||
|
def __setattr__(self, name: str, value: Union[str, int, float, bool, Sequence[int]]) -> None:
|
||
|
valid = False
|
||
|
if name in ['ssh1', 'ssh2', 'batch', 'client_audit', 'colors', 'verbose', 'timeout_set', 'json', 'make_policy', 'list_policies']:
|
||
|
valid, value = True, bool(value)
|
||
|
elif name in ['ipv4', 'ipv6']:
|
||
|
valid = False
|
||
|
value = bool(value)
|
||
|
ipv = 4 if name == 'ipv4' else 6
|
||
|
if value:
|
||
|
value = tuple(list(self.ipvo) + [ipv])
|
||
|
else: # pylint: disable=else-if-used
|
||
|
if len(self.ipvo) == 0:
|
||
|
value = (6,) if ipv == 4 else (4,)
|
||
|
else:
|
||
|
value = tuple([x for x in self.ipvo if x != ipv])
|
||
|
self.__setattr__('ipvo', value)
|
||
|
elif name == 'ipvo':
|
||
|
if isinstance(value, (tuple, list)):
|
||
|
uniq_value = Utils.unique_seq(value)
|
||
|
value = tuple([x for x in uniq_value if x in (4, 6)])
|
||
|
valid = True
|
||
|
ipv_both = len(value) == 0
|
||
|
object.__setattr__(self, 'ipv4', ipv_both or 4 in value)
|
||
|
object.__setattr__(self, 'ipv6', ipv_both or 6 in value)
|
||
|
elif name == 'port':
|
||
|
valid, port = True, Utils.parse_int(value)
|
||
|
if port < 1 or port > 65535:
|
||
|
raise ValueError('invalid port: {}'.format(value))
|
||
|
value = port
|
||
|
elif name in ['level']:
|
||
|
if value not in ('info', 'warn', 'fail'):
|
||
|
raise ValueError('invalid level: {}'.format(value))
|
||
|
valid = True
|
||
|
elif name == 'host':
|
||
|
valid = True
|
||
|
elif name == 'timeout':
|
||
|
value = Utils.parse_float(value)
|
||
|
if value == -1.0:
|
||
|
raise ValueError('invalid timeout: {}'.format(value))
|
||
|
valid = True
|
||
|
elif name in ['policy_file', 'policy', 'target_file', 'target_list', 'lookup']:
|
||
|
valid = True
|
||
|
|
||
|
if valid:
|
||
|
object.__setattr__(self, name, value)
|