~ubuntu-branches/ubuntu/oneiric/isc-dhcp/oneiric-security

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
#!/usr/bin/python

'''apport hook for dhcp server

(c) 2010 Canonical Ltd.
Author: Chuck Short <chuck.short@canonical.com>

This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your
option) any later version.  See http://www.gnu.org/copyleft/gpl.html for
the full text of the license.
'''

from apport.hookutils import *
from os import path
import re

def dhcp_leases(pattern):
	''' Extract options from '/var/lib/dhcp/dhcpd.leases' which match a regex.
	   pattern should be a "re" object. '''
	lines = ""
        if os.path.exists('/var/lib/dhcp/dhcpd.leases'):
		file = '/var/lib/dhcp/dhcpd.leases'
	else:
		return lines

	for line in open(file):
		if pattern.search(line):
			lines += line
	return lines
 
def recent_kernlog(pattern):
	'''Extract recent messages from kern.log or message which match a regex.
	   pattern should be a "re" object.  '''
	lines = ''
	if os.path.exists('/var/log/kern.log'):
		file = '/var/log/kern.log'
	elif os.path.exists('/var/log/messages'):
		file = '/var/log/messages'
	else:
		return lines

	for line in open(file):
		if pattern.search(line):
			lines += line
	return lines

def recent_auditlog(pattern):
	'''Extract recent messages from kern.log or message which match a regex.
	   pattern should be a "re" object.  '''
	lines = ''
	if os.path.exists('/var/log/audit/audit.log'):
		file = '/var/log/audit/audit.log'
	else:
		return lines

	for line in open(file):
		if pattern.search(line):
			lines += line
	return lines

def add_info(report, ui):
	response = ui.yesno("The contents of your /etc/dhcp/dhclient.conf file may help developers diagnose your bug more quickly, however, it may contain sensitive information. Do you want to include it in your bug report?")

	if response == None: #user cancelled
		raise StopIteration

	elif response == True:
		attach_file_if_exists(report, '/etc/dhcp/dhcpd.conf', 'DHCPServerConf')

		# get apparmor stuff, copied from libvirt-bin.py
		# runs hooks via attach_related packages
		attach_file(report, '/proc/version_signature', 'ProcVersionSignature')
		attach_file(report, '/proc/cmdline', 'ProcCmdLine')

		attach_related_packages(report, ['apparmor', 'libapparmor1',
			'libapparmor-perl', 'apparmor-utils', 'auditd', 'libaudit0'])

		sec_re = re.compile('audit\(|apparmor|selinux|security', re.IGNORECASE)
		report['KernLog'] = recent_kernlog(sec_re)

		attach_file(report, '/etc/apparmor.d/usr.sbin.dhcpd')

		if os.path.exists("/var/log/audit"):
			# this needs to be run as root
			report['AuditLog'] = recent_auditlog(sec_re)
		
		leases = re.compile('option|renew|rebind|expire', re.IGNORECASE)
		report['DhServerLeases'] = dhcp_leases(leases)