2021-09-22 20:18:55 +00:00
package main
import (
"bytes"
2022-06-23 20:44:45 +00:00
"compress/bzip2"
2021-09-22 20:18:55 +00:00
"crypto/tls"
2021-10-14 13:09:58 +00:00
"embed"
2021-09-22 20:18:55 +00:00
"encoding/json"
2021-11-24 20:56:54 +00:00
"errors"
2021-09-22 20:18:55 +00:00
"flag"
"fmt"
2022-06-23 20:44:45 +00:00
"io"
2021-09-22 20:18:55 +00:00
"log"
"math/rand"
"net/http"
2021-10-14 13:09:58 +00:00
"os"
2022-08-26 19:43:06 +00:00
"path"
2022-06-23 20:44:45 +00:00
"path/filepath"
2022-08-26 19:43:06 +00:00
"runtime"
2022-06-28 18:11:49 +00:00
"strconv"
2021-09-22 20:18:55 +00:00
"strings"
2021-10-14 13:09:58 +00:00
"sync"
2021-09-22 20:18:55 +00:00
"text/template"
"time"
2021-11-01 18:23:31 +00:00
"github.com/fleetdm/fleet/v4/server/fleet"
2022-05-31 13:15:58 +00:00
"github.com/fleetdm/fleet/v4/server/ptr"
2021-11-01 18:23:31 +00:00
"github.com/fleetdm/fleet/v4/server/service"
2021-09-22 20:18:55 +00:00
"github.com/google/uuid"
2021-10-14 13:09:58 +00:00
"github.com/valyala/fasthttp"
2021-09-22 20:18:55 +00:00
)
2021-10-14 13:09:58 +00:00
//go:embed *.tmpl
var templatesFS embed . FS
2022-01-28 13:05:11 +00:00
//go:embed *.software
var softwareFS embed . FS
var vulnerableSoftware [ ] fleet . Software
func init ( ) {
vulnerableSoftwareData , err := softwareFS . ReadFile ( "vulnerable.software" )
if err != nil {
log . Fatal ( "reading vulnerable software file: " , err )
}
lines := bytes . Split ( vulnerableSoftwareData , [ ] byte ( "\n" ) )
for _ , line := range lines {
parts := bytes . Split ( line , [ ] byte ( "##" ) )
if len ( parts ) < 2 {
fmt . Println ( "skipping" , string ( line ) )
continue
}
vulnerableSoftware = append ( vulnerableSoftware , fleet . Software {
2022-02-14 15:14:26 +00:00
Name : strings . TrimSpace ( string ( parts [ 0 ] ) ) ,
Version : strings . TrimSpace ( string ( parts [ 1 ] ) ) ,
2022-01-28 13:05:11 +00:00
Source : "apps" ,
} )
}
log . Printf ( "Loaded %d vulnerable software\n" , len ( vulnerableSoftware ) )
}
2021-10-14 13:09:58 +00:00
type Stats struct {
errors int
enrollments int
2022-10-28 17:27:21 +00:00
orbitenrollments int
2021-10-14 13:09:58 +00:00
distributedwrites int
2022-10-28 17:27:21 +00:00
orbitErrors int
desktopErrors int
2021-10-14 13:09:58 +00:00
l sync . Mutex
}
2022-10-28 17:27:21 +00:00
func ( s * Stats ) IncrementErrors ( errors int ) {
2021-10-14 13:09:58 +00:00
s . l . Lock ( )
defer s . l . Unlock ( )
s . errors += errors
2022-10-28 17:27:21 +00:00
}
func ( s * Stats ) IncrementEnrollments ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
s . enrollments ++
}
func ( s * Stats ) IncrementOrbitEnrollments ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
s . orbitenrollments ++
}
func ( s * Stats ) IncrementDistributedWrites ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
s . distributedwrites ++
}
func ( s * Stats ) IncrementOrbitErrors ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
s . orbitErrors ++
}
func ( s * Stats ) IncrementDesktopErrors ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
s . desktopErrors ++
2021-10-14 13:09:58 +00:00
}
func ( s * Stats ) Log ( ) {
s . l . Lock ( )
defer s . l . Unlock ( )
fmt . Printf (
2022-10-28 17:27:21 +00:00
"%s :: error rate: %.2f \t enrollments: %d \t orbit enrollments: %d \t writes: %d\n \t orbit errors: %d \t desktop errors: %d" ,
2021-10-14 13:09:58 +00:00
time . Now ( ) . String ( ) ,
float64 ( s . errors ) / float64 ( s . enrollments ) ,
s . enrollments ,
2022-10-28 17:27:21 +00:00
s . orbitenrollments ,
2021-10-14 13:09:58 +00:00
s . distributedwrites ,
2022-10-28 17:27:21 +00:00
s . orbitErrors ,
s . desktopErrors ,
2021-10-14 13:09:58 +00:00
)
}
func ( s * Stats ) runLoop ( ) {
ticker := time . Tick ( 10 * time . Second )
for range ticker {
s . Log ( )
}
}
2021-11-01 18:23:31 +00:00
type nodeKeyManager struct {
2021-10-14 13:09:58 +00:00
filepath string
l sync . Mutex
nodekeys [ ] string
}
2021-11-01 18:23:31 +00:00
func ( n * nodeKeyManager ) LoadKeys ( ) {
2021-10-14 13:09:58 +00:00
if n . filepath == "" {
return
}
n . l . Lock ( )
defer n . l . Unlock ( )
data , err := os . ReadFile ( n . filepath )
if err != nil {
fmt . Println ( "WARNING (ignore if creating a new node key file): error loading nodekey file:" , err )
return
}
n . nodekeys = strings . Split ( string ( data ) , "\n" )
2021-12-09 21:05:32 +00:00
n . nodekeys = n . nodekeys [ : len ( n . nodekeys ) - 1 ] // remove last empty node key due to new line.
2021-10-14 13:09:58 +00:00
fmt . Printf ( "loaded %d node keys\n" , len ( n . nodekeys ) )
}
2021-11-01 18:23:31 +00:00
func ( n * nodeKeyManager ) Get ( i int ) string {
2021-10-14 13:09:58 +00:00
n . l . Lock ( )
defer n . l . Unlock ( )
if len ( n . nodekeys ) > i {
return n . nodekeys [ i ]
}
return ""
}
2021-11-01 18:23:31 +00:00
func ( n * nodeKeyManager ) Add ( nodekey string ) {
2021-10-14 13:09:58 +00:00
if n . filepath == "" {
return
}
// we lock just to make sure we write one at a time
n . l . Lock ( )
defer n . l . Unlock ( )
2022-05-31 13:15:58 +00:00
f , err := os . OpenFile ( n . filepath , os . O_APPEND | os . O_CREATE | os . O_WRONLY , 0 o600 )
2021-10-14 13:09:58 +00:00
if err != nil {
fmt . Println ( "error opening nodekey file:" , err . Error ( ) )
return
}
defer f . Close ( )
if _ , err := f . WriteString ( nodekey + "\n" ) ; err != nil {
fmt . Println ( "error writing nodekey file:" , err )
}
}
2021-11-01 18:23:31 +00:00
type agent struct {
2022-08-29 18:40:16 +00:00
agentIndex int
softwareCount softwareEntityCount
userCount entityCount
policyPassProb float64
munkiIssueProb float64
munkiIssueCount int
strings map [ string ] string
serverAddress string
fastClient fasthttp . Client
stats * Stats
nodeKeyManager * nodeKeyManager
nodeKey string
templates * template . Template
os string
2022-05-31 13:15:58 +00:00
// deviceAuthToken holds Fleet Desktop device authentication token.
//
// Non-nil means the agent is identified as orbit osquery,
// nil means the agent is identified as vanilla osquery.
deviceAuthToken * string
2022-10-28 17:27:21 +00:00
orbitNodeKey * string
2021-12-09 21:05:32 +00:00
scheduledQueries [ ] string
// The following are exported to be used by the templates.
2023-02-08 14:49:42 +00:00
EnrollSecret string
UUID string
2023-02-17 20:10:49 +00:00
SerialNumber string
2023-02-08 14:49:42 +00:00
ConfigInterval time . Duration
QueryInterval time . Duration
DiskEncryptionEnabled bool
2021-12-09 21:05:32 +00:00
}
2021-12-09 20:20:32 +00:00
2021-12-09 21:24:48 +00:00
type entityCount struct {
2021-12-09 21:05:32 +00:00
common int
unique int
2021-09-22 20:18:55 +00:00
}
2022-01-28 13:05:11 +00:00
type softwareEntityCount struct {
entityCount
2023-04-05 16:53:43 +00:00
vulnerable int
withLastOpened int
lastOpenedProb float64
commonSoftwareUninstallCount int
commonSoftwareUninstallProb float64
uniqueSoftwareUninstallCount int
uniqueSoftwareUninstallProb float64
2022-01-28 13:05:11 +00:00
}
2021-11-19 11:50:25 +00:00
func newAgent (
2021-12-09 21:05:32 +00:00
agentIndex int ,
2021-11-19 11:50:25 +00:00
serverAddress , enrollSecret string , templates * template . Template ,
2022-01-28 13:05:11 +00:00
configInterval , queryInterval time . Duration , softwareCount softwareEntityCount , userCount entityCount ,
2021-11-19 11:50:25 +00:00
policyPassProb float64 ,
2022-05-31 13:15:58 +00:00
orbitProb float64 ,
2022-08-29 18:40:16 +00:00
munkiIssueProb float64 , munkiIssueCount int ,
2023-02-28 17:55:04 +00:00
emptySerialProb float64 ,
2021-11-19 11:50:25 +00:00
) * agent {
2022-05-31 13:15:58 +00:00
var deviceAuthToken * string
if rand . Float64 ( ) <= orbitProb {
deviceAuthToken = ptr . String ( uuid . NewString ( ) )
}
// #nosec (osquery-perf is only used for testing)
tlsConfig := & tls . Config {
InsecureSkipVerify : true ,
}
2023-02-28 17:55:04 +00:00
serial := randSerial ( )
if rand . Float64 ( ) <= emptySerialProb {
serial = ""
}
2021-11-01 18:23:31 +00:00
return & agent {
2022-08-29 18:40:16 +00:00
agentIndex : agentIndex ,
serverAddress : serverAddress ,
softwareCount : softwareCount ,
userCount : userCount ,
strings : make ( map [ string ] string ) ,
policyPassProb : policyPassProb ,
munkiIssueProb : munkiIssueProb ,
munkiIssueCount : munkiIssueCount ,
2021-12-09 21:05:32 +00:00
fastClient : fasthttp . Client {
2022-05-31 13:15:58 +00:00
TLSConfig : tlsConfig ,
2021-12-09 21:05:32 +00:00
} ,
2022-05-31 13:15:58 +00:00
templates : templates ,
deviceAuthToken : deviceAuthToken ,
2022-08-29 16:34:40 +00:00
os : strings . TrimRight ( templates . Name ( ) , ".tmpl" ) ,
2021-12-09 21:05:32 +00:00
2021-09-22 20:18:55 +00:00
EnrollSecret : enrollSecret ,
ConfigInterval : configInterval ,
QueryInterval : queryInterval ,
2023-02-17 20:10:49 +00:00
UUID : strings . ToUpper ( uuid . New ( ) . String ( ) ) ,
2023-02-28 17:55:04 +00:00
SerialNumber : serial ,
2021-09-22 20:18:55 +00:00
}
}
type enrollResponse struct {
NodeKey string ` json:"node_key" `
}
type distributedReadResponse struct {
Queries map [ string ] string ` json:"queries" `
}
2022-10-28 17:27:21 +00:00
func ( a * agent ) isOrbit ( ) bool {
return a . deviceAuthToken != nil
}
2021-11-01 18:23:31 +00:00
func ( a * agent ) runLoop ( i int , onlyAlreadyEnrolled bool ) {
2022-10-28 17:27:21 +00:00
if a . isOrbit ( ) {
if err := a . orbitEnroll ( ) ; err != nil {
return
}
}
2021-11-01 18:23:31 +00:00
if err := a . enroll ( i , onlyAlreadyEnrolled ) ; err != nil {
2021-10-14 13:09:58 +00:00
return
}
2021-09-22 20:18:55 +00:00
2021-11-01 18:23:31 +00:00
a . config ( )
2021-09-22 20:18:55 +00:00
resp , err := a . DistributedRead ( )
if err != nil {
log . Println ( err )
} else {
if len ( resp . Queries ) > 0 {
a . DistributedWrite ( resp . Queries )
}
}
2022-10-28 17:27:21 +00:00
if a . isOrbit ( ) {
go a . runOrbitLoop ( )
}
2021-09-22 20:18:55 +00:00
configTicker := time . Tick ( a . ConfigInterval )
liveQueryTicker := time . Tick ( a . QueryInterval )
for {
select {
case <- configTicker :
2021-11-01 18:23:31 +00:00
a . config ( )
2021-09-22 20:18:55 +00:00
case <- liveQueryTicker :
resp , err := a . DistributedRead ( )
if err != nil {
log . Println ( err )
2022-04-26 18:16:59 +00:00
} else if len ( resp . Queries ) > 0 {
a . DistributedWrite ( resp . Queries )
2021-09-22 20:18:55 +00:00
}
}
}
}
2022-10-28 17:27:21 +00:00
func ( a * agent ) runOrbitLoop ( ) {
orbitClient , err := service . NewOrbitClient (
"" ,
a . serverAddress ,
"" ,
true ,
a . EnrollSecret ,
2023-04-27 11:44:39 +00:00
nil ,
2023-03-13 21:54:18 +00:00
fleet . OrbitHostInfo {
HardwareUUID : a . UUID ,
HardwareSerial : a . SerialNumber ,
Hostname : a . CachedString ( "hostname" ) ,
} ,
2022-10-28 17:27:21 +00:00
)
if err != nil {
log . Println ( "creating orbit client: " , err )
}
orbitClient . TestNodeKey = * a . orbitNodeKey
2023-04-27 11:44:39 +00:00
deviceClient , err := service . NewDeviceClient ( a . serverAddress , true , "" , nil , "" )
2022-10-28 17:27:21 +00:00
if err != nil {
log . Println ( "creating device client: " , err )
}
// orbit does a config check when it starts
if _ , err := orbitClient . GetConfig ( ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "orbitClient.GetConfig: " , err )
}
tokenRotationEnabled := orbitClient . GetServerCapabilities ( ) . Has ( fleet . CapabilityOrbitEndpoints ) &&
orbitClient . GetServerCapabilities ( ) . Has ( fleet . CapabilityTokenRotation )
// it also writes and checks the device token
if tokenRotationEnabled {
if err := orbitClient . SetOrUpdateDeviceToken ( * a . deviceAuthToken ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "orbitClient.SetOrUpdateDeviceToken: " , err )
}
if err := deviceClient . CheckToken ( * a . deviceAuthToken ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "deviceClient.CheckToken: " , err )
}
}
// checkToken is used to simulate Fleet Desktop polling until a token is
// valid, we make a random number of requests to properly emulate what
// happens in the real world as there are delays that are not accounted by
// the way this simulation is arranged.
checkToken := func ( ) {
min := 1
max := 5
numberOfRequests := rand . Intn ( max - min + 1 ) + min
ticker := time . NewTicker ( 5 * time . Second )
defer ticker . Stop ( )
for {
<- ticker . C
numberOfRequests --
if err := deviceClient . CheckToken ( * a . deviceAuthToken ) ; err != nil {
log . Println ( "deviceClient.CheckToken: " , err )
}
if numberOfRequests == 0 {
break
}
}
}
// fleet desktop performs a burst of check token requests when it's initialized
checkToken ( )
// orbit makes a call to check the config and update the CLI flags every 5
// seconds
orbitConfigTicker := time . Tick ( 30 * time . Second )
// orbit makes a call every 5 minutes to check the validity of the device
// token on the server
orbitTokenRemoteCheckTicker := time . Tick ( 5 * time . Minute )
// orbit pings the server every 1 hour to rotate the device token
orbitTokenRotationTicker := time . Tick ( 1 * time . Hour )
// orbit polls the /orbit/ping endpoint every 5 minutes to check if the
// server capabilities have changed
capabilitiesCheckerTicker := time . Tick ( 5 * time . Minute )
// fleet desktop polls for policy compliance every 5 minutes
fleetDesktopPolicyTicker := time . Tick ( 5 * time . Minute )
for {
select {
case <- orbitConfigTicker :
if _ , err := orbitClient . GetConfig ( ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "orbitClient.GetConfig: " , err )
}
case <- orbitTokenRemoteCheckTicker :
if tokenRotationEnabled {
if err := deviceClient . CheckToken ( * a . deviceAuthToken ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "deviceClient.CheckToken: " , err )
}
}
case <- orbitTokenRotationTicker :
if tokenRotationEnabled {
newToken := ptr . String ( uuid . NewString ( ) )
if err := orbitClient . SetOrUpdateDeviceToken ( * newToken ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "orbitClient.SetOrUpdateDeviceToken: " , err )
}
a . deviceAuthToken = newToken
// fleet desktop performs a burst of check token requests after a token is rotated
checkToken ( )
}
case <- capabilitiesCheckerTicker :
if err := orbitClient . Ping ( ) ; err != nil {
a . stats . IncrementOrbitErrors ( )
log . Println ( "orbitClient.Ping: " , err )
}
case <- fleetDesktopPolicyTicker :
if _ , err := deviceClient . NumberOfFailingPolicies ( * a . deviceAuthToken ) ; err != nil {
a . stats . IncrementDesktopErrors ( )
log . Println ( "deviceClient.NumberOfFailingPolicies: " , err )
}
}
}
}
2021-11-01 18:23:31 +00:00
func ( a * agent ) waitingDo ( req * fasthttp . Request , res * fasthttp . Response ) {
2021-12-09 21:05:32 +00:00
err := a . fastClient . Do ( req , res )
2021-10-14 13:09:58 +00:00
for err != nil || res . StatusCode ( ) != http . StatusOK {
fmt . Println ( err , res . StatusCode ( ) )
2022-10-28 17:27:21 +00:00
a . stats . IncrementErrors ( 1 )
2021-10-14 13:09:58 +00:00
<- time . Tick ( time . Duration ( rand . Intn ( 120 ) + 1 ) * time . Second )
2021-12-09 21:05:32 +00:00
err = a . fastClient . Do ( req , res )
2021-09-22 20:18:55 +00:00
}
}
2022-10-28 17:27:21 +00:00
// TODO: add support to `alreadyEnrolled` akin to the `enroll` function. for
// now, we assume that the agent is not already enrolled, if you kill the agent
// process then those Orbit node keys are gone.
func ( a * agent ) orbitEnroll ( ) error {
2023-02-28 17:55:04 +00:00
params := service . EnrollOrbitRequest {
EnrollSecret : a . EnrollSecret ,
HardwareUUID : a . UUID ,
HardwareSerial : a . SerialNumber ,
}
2022-10-28 17:27:21 +00:00
jsonBytes , err := json . Marshal ( params )
if err != nil {
log . Println ( "orbit json marshall:" , err )
return err
}
2023-02-28 17:55:04 +00:00
req := fasthttp . AcquireRequest ( )
2022-10-28 17:27:21 +00:00
req . SetBody ( jsonBytes )
req . Header . SetMethod ( "POST" )
req . Header . SetContentType ( "application/json" )
req . Header . SetRequestURI ( a . serverAddress + "/api/fleet/orbit/enroll" )
resp := fasthttp . AcquireResponse ( )
a . waitingDo ( req , resp )
2023-02-28 17:55:04 +00:00
fasthttp . ReleaseRequest ( req )
2022-10-28 17:27:21 +00:00
defer fasthttp . ReleaseResponse ( resp )
if resp . StatusCode ( ) != http . StatusOK {
log . Println ( "orbit enroll status:" , resp . StatusCode ( ) )
return fmt . Errorf ( "status code: %d" , resp . StatusCode ( ) )
}
var parsedResp service . EnrollOrbitResponse
if err := json . Unmarshal ( resp . Body ( ) , & parsedResp ) ; err != nil {
log . Println ( "orbit json parse:" , err )
return err
}
a . orbitNodeKey = & parsedResp . OrbitNodeKey
a . stats . IncrementOrbitEnrollments ( )
return nil
}
2021-11-01 18:23:31 +00:00
func ( a * agent ) enroll ( i int , onlyAlreadyEnrolled bool ) error {
2021-12-09 21:05:32 +00:00
a . nodeKey = a . nodeKeyManager . Get ( i )
if a . nodeKey != "" {
2022-10-28 17:27:21 +00:00
a . stats . IncrementEnrollments ( )
2021-10-14 13:09:58 +00:00
return nil
}
if onlyAlreadyEnrolled {
2021-11-24 20:56:54 +00:00
return errors . New ( "not enrolled" )
2021-09-22 20:18:55 +00:00
}
var body bytes . Buffer
2021-12-09 21:05:32 +00:00
if err := a . templates . ExecuteTemplate ( & body , "enroll" , a ) ; err != nil {
2021-09-22 20:18:55 +00:00
log . Println ( "execute template:" , err )
2021-10-14 13:09:58 +00:00
return err
2021-09-22 20:18:55 +00:00
}
2021-10-14 13:09:58 +00:00
req := fasthttp . AcquireRequest ( )
req . SetBody ( body . Bytes ( ) )
req . Header . SetMethod ( "POST" )
req . Header . SetContentType ( "application/json" )
2021-09-22 20:18:55 +00:00
req . Header . Add ( "User-Agent" , "osquery/4.6.0" )
2022-04-05 15:35:53 +00:00
req . SetRequestURI ( a . serverAddress + "/api/osquery/enroll" )
2021-10-14 13:09:58 +00:00
res := fasthttp . AcquireResponse ( )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
a . waitingDo ( req , res )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
fasthttp . ReleaseRequest ( req )
defer fasthttp . ReleaseResponse ( res )
if res . StatusCode ( ) != http . StatusOK {
log . Println ( "enroll status:" , res . StatusCode ( ) )
return fmt . Errorf ( "status code: %d" , res . StatusCode ( ) )
2021-09-22 20:18:55 +00:00
}
var parsedResp enrollResponse
2021-10-14 13:09:58 +00:00
if err := json . Unmarshal ( res . Body ( ) , & parsedResp ) ; err != nil {
2021-09-22 20:18:55 +00:00
log . Println ( "json parse:" , err )
2021-10-14 13:09:58 +00:00
return err
2021-09-22 20:18:55 +00:00
}
2021-12-09 21:05:32 +00:00
a . nodeKey = parsedResp . NodeKey
2022-10-28 17:27:21 +00:00
a . stats . IncrementEnrollments ( )
2021-10-14 13:09:58 +00:00
2021-12-09 21:05:32 +00:00
a . nodeKeyManager . Add ( a . nodeKey )
2021-10-14 13:09:58 +00:00
return nil
2021-09-22 20:18:55 +00:00
}
2021-11-01 18:23:31 +00:00
func ( a * agent ) config ( ) {
2021-12-09 21:05:32 +00:00
body := bytes . NewBufferString ( ` { "node_key": " ` + a . nodeKey + ` "} ` )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
req := fasthttp . AcquireRequest ( )
req . SetBody ( body . Bytes ( ) )
req . Header . SetMethod ( "POST" )
req . Header . SetContentType ( "application/json" )
2021-09-22 20:18:55 +00:00
req . Header . Add ( "User-Agent" , "osquery/4.6.0" )
2022-04-05 15:35:53 +00:00
req . SetRequestURI ( a . serverAddress + "/api/osquery/config" )
2021-10-14 13:09:58 +00:00
res := fasthttp . AcquireResponse ( )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
a . waitingDo ( req , res )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
fasthttp . ReleaseRequest ( req )
defer fasthttp . ReleaseResponse ( res )
if res . StatusCode ( ) != http . StatusOK {
log . Println ( "config status:" , res . StatusCode ( ) )
2021-09-22 20:18:55 +00:00
return
}
2021-12-09 20:20:32 +00:00
parsedResp := struct {
Packs map [ string ] struct {
Queries map [ string ] interface { } ` json:"queries" `
} ` json:"packs" `
} { }
if err := json . Unmarshal ( res . Body ( ) , & parsedResp ) ; err != nil {
log . Println ( "json parse at config:" , err )
return
}
var scheduledQueries [ ] string
for packName , pack := range parsedResp . Packs {
for queryName := range pack . Queries {
scheduledQueries = append ( scheduledQueries , packName + "_" + queryName )
}
}
a . scheduledQueries = scheduledQueries
2021-09-22 20:18:55 +00:00
}
2021-10-14 13:09:58 +00:00
const stringVals = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_."
2021-09-22 20:18:55 +00:00
2022-08-29 18:40:16 +00:00
func randomString ( n int ) string {
2021-10-14 13:09:58 +00:00
sb := strings . Builder { }
sb . Grow ( n )
for i := 0 ; i < n ; i ++ {
sb . WriteByte ( stringVals [ rand . Int63 ( ) % int64 ( len ( stringVals ) ) ] )
2021-09-22 20:18:55 +00:00
}
2021-10-14 13:09:58 +00:00
return sb . String ( )
}
2021-09-22 20:18:55 +00:00
2021-11-01 18:23:31 +00:00
func ( a * agent ) CachedString ( key string ) string {
2021-10-14 13:09:58 +00:00
if val , ok := a . strings [ key ] ; ok {
return val
2021-09-22 20:18:55 +00:00
}
2022-08-29 18:40:16 +00:00
val := randomString ( 12 )
2021-10-14 13:09:58 +00:00
a . strings [ key ] = val
return val
}
2021-09-22 20:18:55 +00:00
2022-11-15 13:24:40 +00:00
func ( a * agent ) hostUsers ( ) [ ] map [ string ] string {
2021-12-09 21:24:48 +00:00
groupNames := [ ] string { "staff" , "nobody" , "wheel" , "tty" , "daemon" }
shells := [ ] string { "/bin/zsh" , "/bin/sh" , "/usr/bin/false" , "/bin/bash" }
2022-08-29 16:34:40 +00:00
commonUsers := make ( [ ] map [ string ] string , a . userCount . common )
2021-12-09 21:24:48 +00:00
for i := 0 ; i < len ( commonUsers ) ; i ++ {
2022-08-29 16:34:40 +00:00
commonUsers [ i ] = map [ string ] string {
"uid" : fmt . Sprint ( i ) ,
"username" : fmt . Sprintf ( "Common_%d" , i ) ,
"type" : "" , // Empty for macOS.
"groupname" : groupNames [ i % len ( groupNames ) ] ,
"shell" : shells [ i % len ( shells ) ] ,
2021-12-09 21:24:48 +00:00
}
}
2022-08-29 16:34:40 +00:00
uniqueUsers := make ( [ ] map [ string ] string , a . userCount . unique )
2021-12-09 21:24:48 +00:00
for i := 0 ; i < len ( uniqueUsers ) ; i ++ {
2022-08-29 16:34:40 +00:00
uniqueUsers [ i ] = map [ string ] string {
"uid" : fmt . Sprint ( i ) ,
"username" : fmt . Sprintf ( "Unique_%d_%d" , a . agentIndex , i ) ,
"type" : "" , // Empty for macOS.
"groupname" : groupNames [ i % len ( groupNames ) ] ,
"shell" : shells [ i % len ( shells ) ] ,
2021-12-09 21:24:48 +00:00
}
}
users := append ( commonUsers , uniqueUsers ... )
rand . Shuffle ( len ( users ) , func ( i , j int ) {
users [ i ] , users [ j ] = users [ j ] , users [ i ]
} )
return users
}
2022-06-23 20:44:45 +00:00
func extract ( src , dst string ) {
srcF , err := os . Open ( src )
if err != nil {
panic ( err )
}
defer srcF . Close ( )
dstF , err := os . Create ( dst )
if err != nil {
panic ( err )
}
defer dstF . Close ( )
r := bzip2 . NewReader ( srcF )
// ignoring "G110: Potential DoS vulnerability via decompression bomb", as this is test code.
_ , err = io . Copy ( dstF , r ) //nolint:gosec
if err != nil {
panic ( err )
}
}
2022-08-29 16:34:40 +00:00
func loadSoftware ( platform string , ver string ) [ ] map [ string ] string {
2022-08-26 19:43:06 +00:00
_ , exFilename , _ , ok := runtime . Caller ( 0 )
if ! ok {
panic ( "No caller information" )
}
exDir := path . Dir ( exFilename )
2022-06-23 20:44:45 +00:00
srcPath := filepath . Join (
2022-08-26 19:43:06 +00:00
exDir ,
2022-06-23 20:44:45 +00:00
".." ,
".." ,
"server" ,
"vulnerabilities" ,
"testdata" ,
2022-08-26 18:55:03 +00:00
platform ,
2022-06-23 20:44:45 +00:00
"software" ,
2022-08-26 18:55:03 +00:00
fmt . Sprintf ( "%s_%s-software.json.bz2" , platform , ver ) ,
2022-06-23 20:44:45 +00:00
)
2022-10-28 17:27:21 +00:00
tmpDir , err := os . MkdirTemp ( "" , "osquery-perf" )
2022-06-23 20:44:45 +00:00
if err != nil {
panic ( err )
}
defer os . RemoveAll ( tmpDir )
dstPath := filepath . Join ( tmpDir , fmt . Sprintf ( "%s-software.json" , ver ) )
extract ( srcPath , dstPath )
2022-06-08 01:09:47 +00:00
type softwareJSON struct {
Name string ` json:"name" `
Version string ` json:"version" `
2022-08-26 18:55:03 +00:00
Release string ` json:"release,omitempty" `
Arch string ` json:"arch,omitempty" `
2022-06-08 01:09:47 +00:00
}
var software [ ] softwareJSON
2022-10-28 17:27:21 +00:00
contents , err := os . ReadFile ( dstPath )
2022-06-08 01:09:47 +00:00
if err != nil {
2022-08-26 18:55:03 +00:00
log . Printf ( "reading vuln software for %s %s: %s\n" , platform , ver , err )
2022-06-08 01:09:47 +00:00
return nil
}
err = json . Unmarshal ( contents , & software )
if err != nil {
2022-08-26 18:55:03 +00:00
log . Printf ( "unmarshalling vuln software for %s %s:%s" , platform , ver , err )
2022-06-08 01:09:47 +00:00
return nil
}
2022-08-29 16:34:40 +00:00
var r [ ] map [ string ] string
2022-06-08 01:09:47 +00:00
for _ , fi := range software {
2022-08-29 16:34:40 +00:00
r = append ( r , map [ string ] string {
"name" : fi . Name ,
"version" : fi . Version ,
"source" : "osquery-perf" ,
2022-06-08 01:09:47 +00:00
} )
}
return r
}
2022-08-29 16:34:40 +00:00
func ( a * agent ) softwareWindows11 ( ) [ ] map [ string ] string {
2022-08-26 18:55:03 +00:00
return loadSoftware ( "windows" , "11" )
}
2022-08-29 16:34:40 +00:00
func ( a * agent ) softwareUbuntu2204 ( ) [ ] map [ string ] string {
2022-08-26 18:55:03 +00:00
return loadSoftware ( "ubuntu" , "2204" )
2022-06-08 01:09:47 +00:00
}
2022-08-29 16:34:40 +00:00
func ( a * agent ) softwareMacOS ( ) [ ] map [ string ] string {
2022-04-26 18:16:59 +00:00
var lastOpenedCount int
2022-08-29 16:34:40 +00:00
commonSoftware := make ( [ ] map [ string ] string , a . softwareCount . common )
2021-12-09 21:05:32 +00:00
for i := 0 ; i < len ( commonSoftware ) ; i ++ {
2022-08-29 16:34:40 +00:00
var lastOpenedAt string
if l := a . genLastOpenedAt ( & lastOpenedCount ) ; l != nil {
lastOpenedAt = l . Format ( time . UnixDate )
}
commonSoftware [ i ] = map [ string ] string {
"name" : fmt . Sprintf ( "Common_%d" , i ) ,
"version" : "0.0.1" ,
"bundle_identifier" : "com.fleetdm.osquery-perf" ,
"source" : "osquery-perf" ,
"last_opened_at" : lastOpenedAt ,
2021-11-01 18:23:31 +00:00
}
}
2023-04-05 16:53:43 +00:00
if a . softwareCount . commonSoftwareUninstallProb > 0.0 && rand . Float64 ( ) <= a . softwareCount . commonSoftwareUninstallProb {
rand . Shuffle ( len ( commonSoftware ) , func ( i , j int ) {
commonSoftware [ i ] , commonSoftware [ j ] = commonSoftware [ j ] , commonSoftware [ i ]
} )
commonSoftware = commonSoftware [ : a . softwareCount . common - a . softwareCount . commonSoftwareUninstallCount ]
}
2022-08-29 16:34:40 +00:00
uniqueSoftware := make ( [ ] map [ string ] string , a . softwareCount . unique )
2021-12-09 21:05:32 +00:00
for i := 0 ; i < len ( uniqueSoftware ) ; i ++ {
2022-08-29 16:34:40 +00:00
var lastOpenedAt string
if l := a . genLastOpenedAt ( & lastOpenedCount ) ; l != nil {
lastOpenedAt = l . Format ( time . UnixDate )
}
uniqueSoftware [ i ] = map [ string ] string {
"name" : fmt . Sprintf ( "Unique_%s_%d" , a . CachedString ( "hostname" ) , i ) ,
"version" : "1.1.1" ,
"bundle_identifier" : "com.fleetdm.osquery-perf" ,
"source" : "osquery-perf" ,
"last_opened_at" : lastOpenedAt ,
2021-12-09 21:05:32 +00:00
}
}
2023-04-05 16:53:43 +00:00
if a . softwareCount . uniqueSoftwareUninstallProb > 0.0 && rand . Float64 ( ) <= a . softwareCount . uniqueSoftwareUninstallProb {
rand . Shuffle ( len ( uniqueSoftware ) , func ( i , j int ) {
uniqueSoftware [ i ] , uniqueSoftware [ j ] = uniqueSoftware [ j ] , uniqueSoftware [ i ]
} )
uniqueSoftware = uniqueSoftware [ : a . softwareCount . unique - a . softwareCount . uniqueSoftwareUninstallCount ]
}
2022-08-29 16:34:40 +00:00
randomVulnerableSoftware := make ( [ ] map [ string ] string , a . softwareCount . vulnerable )
2022-01-28 13:05:11 +00:00
for i := 0 ; i < len ( randomVulnerableSoftware ) ; i ++ {
2022-04-26 18:16:59 +00:00
sw := vulnerableSoftware [ rand . Intn ( len ( vulnerableSoftware ) ) ]
2022-08-29 16:34:40 +00:00
var lastOpenedAt string
if l := a . genLastOpenedAt ( & lastOpenedCount ) ; l != nil {
lastOpenedAt = l . Format ( time . UnixDate )
}
randomVulnerableSoftware [ i ] = map [ string ] string {
"name" : sw . Name ,
"version" : sw . Version ,
"bundle_identifier" : sw . BundleIdentifier ,
"source" : sw . Source ,
"last_opened_at" : lastOpenedAt ,
}
2022-01-28 13:05:11 +00:00
}
2021-12-09 21:05:32 +00:00
software := append ( commonSoftware , uniqueSoftware ... )
2022-01-28 13:05:11 +00:00
software = append ( software , randomVulnerableSoftware ... )
2021-12-09 21:05:32 +00:00
rand . Shuffle ( len ( software ) , func ( i , j int ) {
software [ i ] , software [ j ] = software [ j ] , software [ i ]
} )
2021-11-01 18:23:31 +00:00
return software
}
func ( a * agent ) DistributedRead ( ) ( * distributedReadResponse , error ) {
2021-10-14 13:09:58 +00:00
req := fasthttp . AcquireRequest ( )
2021-12-09 21:05:32 +00:00
req . SetBody ( [ ] byte ( ` { "node_key": " ` + a . nodeKey + ` "} ` ) )
2021-10-14 13:09:58 +00:00
req . Header . SetMethod ( "POST" )
req . Header . SetContentType ( "application/json" )
req . Header . Add ( "User-Agent" , "osquery/4.6.0" )
2022-04-05 15:35:53 +00:00
req . SetRequestURI ( a . serverAddress + "/api/osquery/distributed/read" )
2021-10-14 13:09:58 +00:00
res := fasthttp . AcquireResponse ( )
a . waitingDo ( req , res )
fasthttp . ReleaseRequest ( req )
defer fasthttp . ReleaseResponse ( res )
2021-09-22 20:18:55 +00:00
var parsedResp distributedReadResponse
2021-10-14 13:09:58 +00:00
if err := json . Unmarshal ( res . Body ( ) , & parsedResp ) ; err != nil {
log . Println ( "json parse:" , err )
return nil , err
2021-09-22 20:18:55 +00:00
}
return & parsedResp , nil
}
2021-11-01 18:23:31 +00:00
var defaultQueryResult = [ ] map [ string ] string {
{ "foo" : "bar" } ,
2021-09-22 20:18:55 +00:00
}
2022-04-26 18:16:59 +00:00
func ( a * agent ) genLastOpenedAt ( count * int ) * time . Time {
if * count >= a . softwareCount . withLastOpened {
return nil
}
* count ++
if rand . Float64 ( ) <= a . softwareCount . lastOpenedProb {
now := time . Now ( )
return & now
}
return nil
}
2021-11-19 11:50:25 +00:00
func ( a * agent ) runPolicy ( query string ) [ ] map [ string ] string {
if rand . Float64 ( ) <= a . policyPassProb {
return [ ] map [ string ] string {
{ "1" : "1" } ,
}
}
2022-09-12 19:37:38 +00:00
return [ ] map [ string ] string { }
2021-11-19 11:50:25 +00:00
}
2021-12-09 20:20:32 +00:00
func ( a * agent ) randomQueryStats ( ) [ ] map [ string ] string {
var stats [ ] map [ string ] string
for _ , scheduledQuery := range a . scheduledQueries {
stats = append ( stats , map [ string ] string {
"name" : scheduledQuery ,
"delimiter" : "_" ,
"average_memory" : fmt . Sprint ( rand . Intn ( 200 ) + 10 ) ,
"denylisted" : "false" ,
"executions" : fmt . Sprint ( rand . Intn ( 100 ) + 1 ) ,
"interval" : fmt . Sprint ( rand . Intn ( 100 ) + 1 ) ,
"last_executed" : fmt . Sprint ( time . Now ( ) . Unix ( ) ) ,
"output_size" : fmt . Sprint ( rand . Intn ( 100 ) + 1 ) ,
"system_time" : fmt . Sprint ( rand . Intn ( 4000 ) + 10 ) ,
"user_time" : fmt . Sprint ( rand . Intn ( 4000 ) + 10 ) ,
"wall_time" : fmt . Sprint ( rand . Intn ( 4000 ) + 10 ) ,
} )
}
return stats
}
2022-11-15 13:24:40 +00:00
var possibleMDMServerURLs = [ ] string {
"https://kandji.com/1" ,
"https://jamf.com/1" ,
"https://airwatch.com/1" ,
"https://microsoft.com/1" ,
"https://simplemdm.com/1" ,
"https://example.com/1" ,
"https://kandji.com/2" ,
"https://jamf.com/2" ,
"https://airwatch.com/2" ,
"https://microsoft.com/2" ,
"https://simplemdm.com/2" ,
"https://example.com/2" ,
}
2022-08-10 19:15:01 +00:00
2022-11-15 13:24:40 +00:00
func ( a * agent ) mdmMac ( ) [ ] map [ string ] string {
2021-12-21 12:37:58 +00:00
enrolled := "true"
if rand . Intn ( 2 ) == 1 {
enrolled = "false"
}
installedFromDep := "true"
if rand . Intn ( 2 ) == 1 {
installedFromDep = "false"
}
2022-11-15 13:24:40 +00:00
ix := rand . Intn ( len ( possibleMDMServerURLs ) )
2021-12-21 12:37:58 +00:00
return [ ] map [ string ] string {
2022-11-15 13:24:40 +00:00
{ "enrolled" : enrolled , "server_url" : possibleMDMServerURLs [ ix ] , "installed_from_dep" : installedFromDep } ,
}
}
func ( a * agent ) mdmWindows ( ) [ ] map [ string ] string {
autopilot := rand . Intn ( 2 ) == 1
ix := rand . Intn ( len ( possibleMDMServerURLs ) )
serverURL := possibleMDMServerURLs [ ix ]
providerID := fleet . MDMNameFromServerURL ( serverURL )
installType := "Microsoft Workstation"
if rand . Intn ( 4 ) == 1 {
installType = "Microsoft Server"
}
rows := [ ] map [ string ] string {
{ "key" : "discovery_service_url" , "value" : serverURL } ,
{ "key" : "installation_type" , "value" : installType } ,
}
if providerID != "" {
rows = append ( rows , map [ string ] string { "key" : "provider_id" , "value" : providerID } )
2021-12-21 12:37:58 +00:00
}
2022-11-15 13:24:40 +00:00
if autopilot {
rows = append ( rows , map [ string ] string { "key" : "autopilot" , "value" : "true" } )
}
return rows
2021-12-21 12:37:58 +00:00
}
2022-08-29 18:40:16 +00:00
var munkiIssues = func ( ) [ ] string {
// generate a list of random munki issues (messages)
issues := make ( [ ] string , 1000 )
for i := range issues {
// message size: between 60 and 200, with spaces between each 10-char word so
// that it can still make a bit of sense for UI tests.
numParts := rand . Intn ( 15 ) + 6 // number between 0-14, add 6 to get between 6-20
var sb strings . Builder
for j := 0 ; j < numParts ; j ++ {
if j > 0 {
sb . WriteString ( " " )
}
sb . WriteString ( randomString ( 10 ) )
}
issues [ i ] = sb . String ( )
}
return issues
} ( )
2021-12-21 12:37:58 +00:00
func ( a * agent ) munkiInfo ( ) [ ] map [ string ] string {
2022-08-29 18:40:16 +00:00
var errors , warnings [ ] string
if rand . Float64 ( ) <= a . munkiIssueProb {
for i := 0 ; i < a . munkiIssueCount ; i ++ {
if rand . Intn ( 2 ) == 1 {
errors = append ( errors , munkiIssues [ rand . Intn ( len ( munkiIssues ) ) ] )
} else {
warnings = append ( warnings , munkiIssues [ rand . Intn ( len ( munkiIssues ) ) ] )
}
}
}
errList := strings . Join ( errors , ";" )
warnList := strings . Join ( warnings , ";" )
2021-12-21 12:37:58 +00:00
return [ ] map [ string ] string {
2022-08-29 18:40:16 +00:00
{ "version" : "1.2.3" , "errors" : errList , "warnings" : warnList } ,
2021-12-21 12:37:58 +00:00
}
}
2021-12-21 20:36:19 +00:00
func ( a * agent ) googleChromeProfiles ( ) [ ] map [ string ] string {
count := rand . Intn ( 5 ) // return between 0 and 4 emails
result := make ( [ ] map [ string ] string , count )
for i := range result {
email := fmt . Sprintf ( "user%d@example.com" , i )
if i == len ( result ) - 1 {
// if the maximum number of emails is returned, set a random domain name
// so that we have email addresses that match a lot of hosts, and some
// that match few hosts.
domainRand := rand . Intn ( 10 )
email = fmt . Sprintf ( "user%d@example%d.com" , i , domainRand )
}
result [ i ] = map [ string ] string { "email" : email }
}
return result
}
2022-06-28 18:11:49 +00:00
func ( a * agent ) batteries ( ) [ ] map [ string ] string {
count := rand . Intn ( 3 ) // return between 0 and 2 batteries
result := make ( [ ] map [ string ] string , count )
for i := range result {
health := "Good"
cycleCount := rand . Intn ( 2000 )
switch {
case cycleCount > 1500 :
health = "Poor"
case cycleCount > 1000 :
health = "Fair"
}
result [ i ] = map [ string ] string {
"serial_number" : fmt . Sprintf ( "%04d" , i ) ,
"cycle_count" : strconv . Itoa ( cycleCount ) ,
"health" : health ,
}
}
return result
}
2022-09-21 19:16:31 +00:00
func ( a * agent ) diskSpace ( ) [ ] map [ string ] string {
// between 1-100 gigs, between 0-99 percentage available
gigs := rand . Intn ( 100 )
gigs ++
pct := rand . Intn ( 100 )
return [ ] map [ string ] string {
{ "percent_disk_space_available" : strconv . Itoa ( gigs ) , "gigs_disk_space_available" : strconv . Itoa ( pct ) } ,
}
}
2022-11-02 19:44:02 +00:00
func ( a * agent ) diskEncryption ( ) [ ] map [ string ] string {
// 50% of results have encryption enabled
2023-02-08 14:49:42 +00:00
a . DiskEncryptionEnabled = rand . Intn ( 2 ) == 1
if a . DiskEncryptionEnabled {
2022-11-02 19:44:02 +00:00
return [ ] map [ string ] string { { "1" : "1" } }
}
return [ ] map [ string ] string { }
}
2022-12-19 13:01:59 +00:00
func ( a * agent ) diskEncryptionLinux ( ) [ ] map [ string ] string {
// 50% of results have encryption enabled
2023-02-08 14:49:42 +00:00
a . DiskEncryptionEnabled = rand . Intn ( 2 ) == 1
if a . DiskEncryptionEnabled {
2022-12-19 13:01:59 +00:00
return [ ] map [ string ] string {
{ "path" : "/etc" , "encrypted" : "0" } ,
{ "path" : "/tmp" , "encrypted" : "0" } ,
{ "path" : "/" , "encrypted" : "1" } ,
}
}
return [ ] map [ string ] string {
{ "path" : "/etc" , "encrypted" : "0" } ,
{ "path" : "/tmp" , "encrypted" : "0" } ,
}
}
2022-06-01 16:57:44 +00:00
func ( a * agent ) processQuery ( name , query string ) ( handled bool , results [ ] map [ string ] string , status * fleet . OsqueryStatus ) {
2022-05-31 13:15:58 +00:00
const (
hostPolicyQueryPrefix = "fleet_policy_query_"
hostDetailQueryPrefix = "fleet_detail_query_"
)
2022-06-01 16:57:44 +00:00
statusOK := fleet . StatusOK
2022-09-26 19:39:39 +00:00
statusNotOK := fleet . OsqueryStatus ( 1 )
2022-05-31 13:15:58 +00:00
switch {
case strings . HasPrefix ( name , hostPolicyQueryPrefix ) :
2022-06-01 16:57:44 +00:00
return true , a . runPolicy ( query ) , & statusOK
2022-05-31 13:15:58 +00:00
case name == hostDetailQueryPrefix + "scheduled_query_stats" :
2022-06-01 16:57:44 +00:00
return true , a . randomQueryStats ( ) , & statusOK
2022-05-31 13:15:58 +00:00
case name == hostDetailQueryPrefix + "mdm" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
2022-11-15 13:24:40 +00:00
results = a . mdmMac ( )
}
return true , results , & ss
case name == hostDetailQueryPrefix + "mdm_windows" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . mdmWindows ( )
2021-12-21 12:37:58 +00:00
}
2022-06-01 16:57:44 +00:00
return true , results , & ss
2022-05-31 13:15:58 +00:00
case name == hostDetailQueryPrefix + "munki_info" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . munkiInfo ( )
2021-12-21 12:37:58 +00:00
}
2022-06-01 16:57:44 +00:00
return true , results , & ss
2022-05-31 13:15:58 +00:00
case name == hostDetailQueryPrefix + "google_chrome_profiles" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . googleChromeProfiles ( )
2021-12-21 20:36:19 +00:00
}
2022-06-01 16:57:44 +00:00
return true , results , & ss
2022-06-28 18:11:49 +00:00
case name == hostDetailQueryPrefix + "battery" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . batteries ( )
}
return true , results , & ss
2022-08-29 16:34:40 +00:00
case name == hostDetailQueryPrefix + "users" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
2022-11-15 13:24:40 +00:00
results = a . hostUsers ( )
2022-08-29 16:34:40 +00:00
}
return true , results , & ss
case name == hostDetailQueryPrefix + "software_macos" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . softwareMacOS ( )
}
return true , results , & ss
case name == hostDetailQueryPrefix + "software_windows" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . softwareWindows11 ( )
}
return true , results , & ss
case name == hostDetailQueryPrefix + "software_linux" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
switch a . os {
case "ubuntu_22.04" :
results = a . softwareUbuntu2204 ( )
}
}
return true , results , & ss
2022-09-21 19:16:31 +00:00
case name == hostDetailQueryPrefix + "disk_space_unix" || name == hostDetailQueryPrefix + "disk_space_windows" :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . diskSpace ( )
}
return true , results , & ss
2022-12-19 13:01:59 +00:00
case strings . HasPrefix ( name , hostDetailQueryPrefix + "disk_encryption_linux" ) :
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . diskEncryptionLinux ( )
}
return true , results , & ss
2023-02-08 14:49:42 +00:00
case name == hostDetailQueryPrefix + "disk_encryption_darwin" ||
name == hostDetailQueryPrefix + "disk_encryption_windows" :
2022-11-02 19:44:02 +00:00
ss := fleet . OsqueryStatus ( rand . Intn ( 2 ) )
if ss == fleet . StatusOK {
results = a . diskEncryption ( )
}
return true , results , & ss
2022-09-26 19:39:39 +00:00
case name == hostDetailQueryPrefix + "kubequery_info" && a . os != "kubequery" :
// Real osquery running on hosts would return no results if it was not
// running kubequery (due to discovery query). Returning true here so that
// the caller knows it is handled, will not try to return lorem-ipsum-style
// results.
return true , nil , & statusNotOK
2022-05-31 13:15:58 +00:00
default :
// Look for results in the template file.
2021-12-09 21:05:32 +00:00
if t := a . templates . Lookup ( name ) ; t == nil {
2022-06-01 16:57:44 +00:00
return false , nil , nil
2021-09-22 20:18:55 +00:00
}
2021-11-01 18:23:31 +00:00
var ni bytes . Buffer
2021-12-09 21:05:32 +00:00
err := a . templates . ExecuteTemplate ( & ni , name , a )
2021-11-01 18:23:31 +00:00
if err != nil {
panic ( err )
}
2022-05-31 13:15:58 +00:00
err = json . Unmarshal ( ni . Bytes ( ) , & results )
2021-11-01 18:23:31 +00:00
if err != nil {
panic ( err )
2021-09-22 20:18:55 +00:00
}
2022-08-26 18:55:03 +00:00
2022-06-01 16:57:44 +00:00
return true , results , & statusOK
2022-05-31 13:15:58 +00:00
}
}
func ( a * agent ) DistributedWrite ( queries map [ string ] string ) {
r := service . SubmitDistributedQueryResultsRequest {
Results : make ( fleet . OsqueryDistributedQueryResults ) ,
Statuses : make ( map [ string ] fleet . OsqueryStatus ) ,
}
r . NodeKey = a . nodeKey
for name , query := range queries {
2022-06-01 16:57:44 +00:00
handled , results , status := a . processQuery ( name , query )
if ! handled {
// If osquery-perf does not handle the incoming query,
// always return status OK and the default query result.
r . Results [ name ] = defaultQueryResult
r . Statuses [ name ] = fleet . StatusOK
} else {
if results != nil {
r . Results [ name ] = results
}
if status != nil {
r . Statuses [ name ] = * status
}
2022-05-31 13:15:58 +00:00
}
2021-11-01 18:23:31 +00:00
}
body , err := json . Marshal ( r )
if err != nil {
panic ( err )
2021-09-22 20:18:55 +00:00
}
2021-10-14 13:09:58 +00:00
req := fasthttp . AcquireRequest ( )
2021-11-01 18:23:31 +00:00
req . SetBody ( body )
2021-10-14 13:09:58 +00:00
req . Header . SetMethod ( "POST" )
req . Header . SetContentType ( "application/json" )
2021-12-21 12:37:58 +00:00
req . Header . Add ( "User-Agent" , "osquery/5.0.1" )
2022-04-05 15:35:53 +00:00
req . SetRequestURI ( a . serverAddress + "/api/osquery/distributed/write" )
2021-10-14 13:09:58 +00:00
res := fasthttp . AcquireResponse ( )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
a . waitingDo ( req , res )
2021-09-22 20:18:55 +00:00
2021-10-14 13:09:58 +00:00
fasthttp . ReleaseRequest ( req )
defer fasthttp . ReleaseResponse ( res )
2022-10-28 17:27:21 +00:00
a . stats . IncrementDistributedWrites ( )
2021-09-22 20:18:55 +00:00
// No need to read the distributed write body
}
func main ( ) {
2022-11-15 13:24:40 +00:00
validTemplateNames := map [ string ] bool {
"mac10.14.6.tmpl" : true ,
"windows_11.tmpl" : true ,
"ubuntu_22.04.tmpl" : true ,
}
allowedTemplateNames := make ( [ ] string , 0 , len ( validTemplateNames ) )
for k := range validTemplateNames {
allowedTemplateNames = append ( allowedTemplateNames , k )
}
var (
2023-04-05 16:53:43 +00:00
serverURL = flag . String ( "server_url" , "https://localhost:8080" , "URL (with protocol and port of osquery server)" )
enrollSecret = flag . String ( "enroll_secret" , "" , "Enroll secret to authenticate enrollment" )
hostCount = flag . Int ( "host_count" , 10 , "Number of hosts to start (default 10)" )
randSeed = flag . Int64 ( "seed" , time . Now ( ) . UnixNano ( ) , "Seed for random generator (default current time)" )
startPeriod = flag . Duration ( "start_period" , 10 * time . Second , "Duration to spread start of hosts over" )
configInterval = flag . Duration ( "config_interval" , 1 * time . Minute , "Interval for config requests" )
queryInterval = flag . Duration ( "query_interval" , 10 * time . Second , "Interval for live query requests" )
onlyAlreadyEnrolled = flag . Bool ( "only_already_enrolled" , false , "Only start agents that are already enrolled" )
nodeKeyFile = flag . String ( "node_key_file" , "" , "File with node keys to use" )
commonSoftwareCount = flag . Int ( "common_software_count" , 10 , "Number of common installed applications reported to fleet" )
commonSoftwareUninstallCount = flag . Int ( "common_software_uninstall_count" , 1 , "Number of common software to uninstall" )
commonSoftwareUninstallProb = flag . Float64 ( "common_software_uninstall_prob" , 0.1 , "Probability of uninstalling common_software_uninstall_count unique software/s" )
uniqueSoftwareCount = flag . Int ( "unique_software_count" , 10 , "Number of uninstalls " )
uniqueSoftwareUninstallCount = flag . Int ( "unique_software_uninstall_count" , 1 , "Number of unique software to uninstall" )
uniqueSoftwareUninstallProb = flag . Float64 ( "unique_software_uninstall_prob" , 0.1 , "Probability of uninstalling unique_software_uninstall_count common software/s" )
2022-11-15 13:24:40 +00:00
vulnerableSoftwareCount = flag . Int ( "vulnerable_software_count" , 10 , "Number of vulnerable installed applications reported to fleet" )
withLastOpenedSoftwareCount = flag . Int ( "with_last_opened_software_count" , 10 , "Number of applications that may report a last opened timestamp to fleet" )
lastOpenedChangeProb = flag . Float64 ( "last_opened_change_prob" , 0.1 , "Probability of last opened timestamp to be reported as changed [0, 1]" )
commonUserCount = flag . Int ( "common_user_count" , 10 , "Number of common host users reported to fleet" )
uniqueUserCount = flag . Int ( "unique_user_count" , 10 , "Number of unique host users reported to fleet" )
policyPassProb = flag . Float64 ( "policy_pass_prob" , 1.0 , "Probability of policies to pass [0, 1]" )
orbitProb = flag . Float64 ( "orbit_prob" , 0.5 , "Probability of a host being identified as orbit install [0, 1]" )
munkiIssueProb = flag . Float64 ( "munki_issue_prob" , 0.5 , "Probability of a host having munki issues (note that ~50% of hosts have munki installed) [0, 1]" )
munkiIssueCount = flag . Int ( "munki_issue_count" , 10 , "Number of munki issues reported by hosts identified to have munki issues" )
osTemplates = flag . String ( "os_templates" , "mac10.14.6" , fmt . Sprintf ( "Comma separated list of host OS templates to use (any of %v, with or without the .tmpl extension)" , allowedTemplateNames ) )
2023-02-28 17:55:04 +00:00
emptySerialProb = flag . Float64 ( "empty_serial_prob" , 0.1 , "Probability of a host having no serial number [0, 1]" )
2022-11-15 13:24:40 +00:00
)
2021-09-22 20:18:55 +00:00
flag . Parse ( )
rand . Seed ( * randSeed )
2022-11-15 13:24:40 +00:00
if * onlyAlreadyEnrolled {
// Orbit enrollment does not support the "already enrolled" mode at the
// moment (see TODO in this file).
* orbitProb = 0
2022-06-08 01:09:47 +00:00
}
2023-04-05 16:53:43 +00:00
if * commonSoftwareUninstallCount >= * commonSoftwareCount {
log . Fatalf ( "Argument common_software_uninstall_count cannot be bigger than common_software_count" )
}
if * uniqueSoftwareUninstallCount >= * uniqueSoftwareCount {
log . Fatalf ( "Argument unique_software_uninstall_count cannot be bigger than unique_software_count" )
}
2022-06-08 01:09:47 +00:00
var tmpls [ ] * template . Template
2022-11-15 13:24:40 +00:00
requestedTemplates := strings . Split ( * osTemplates , "," )
for _ , nm := range requestedTemplates {
if ! strings . HasSuffix ( nm , ".tmpl" ) {
nm += ".tmpl"
}
if ! validTemplateNames [ nm ] {
log . Fatalf ( "Invalid template name: %s (accepted values: %v)" , nm , allowedTemplateNames )
}
tmpl , err := template . ParseFS ( templatesFS , nm )
2022-06-08 01:09:47 +00:00
if err != nil {
log . Fatal ( "parse templates: " , err )
}
tmpls = append ( tmpls , tmpl )
2021-09-22 20:18:55 +00:00
}
2021-11-01 18:23:31 +00:00
// Spread starts over the interval to prevent thundering herd
2021-09-22 20:18:55 +00:00
sleepTime := * startPeriod / time . Duration ( * hostCount )
2021-10-14 13:09:58 +00:00
stats := & Stats { }
go stats . runLoop ( )
2021-11-01 18:23:31 +00:00
nodeKeyManager := & nodeKeyManager { }
2021-10-14 13:09:58 +00:00
if nodeKeyFile != nil {
nodeKeyManager . filepath = * nodeKeyFile
nodeKeyManager . LoadKeys ( )
}
2021-09-22 20:18:55 +00:00
for i := 0 ; i < * hostCount ; i ++ {
2022-06-08 01:09:47 +00:00
tmpl := tmpls [ i % len ( tmpls ) ]
2022-05-31 13:15:58 +00:00
a := newAgent ( i + 1 , * serverURL , * enrollSecret , tmpl , * configInterval , * queryInterval ,
softwareEntityCount {
entityCount : entityCount {
common : * commonSoftwareCount ,
unique : * uniqueSoftwareCount ,
} ,
2023-04-05 16:53:43 +00:00
vulnerable : * vulnerableSoftwareCount ,
withLastOpened : * withLastOpenedSoftwareCount ,
lastOpenedProb : * lastOpenedChangeProb ,
commonSoftwareUninstallCount : * commonSoftwareUninstallCount ,
commonSoftwareUninstallProb : * commonSoftwareUninstallProb ,
uniqueSoftwareUninstallCount : * uniqueSoftwareUninstallCount ,
uniqueSoftwareUninstallProb : * uniqueSoftwareUninstallProb ,
2022-05-31 13:15:58 +00:00
} , entityCount {
common : * commonUserCount ,
unique : * uniqueUserCount ,
2022-01-28 13:05:11 +00:00
} ,
2022-05-31 13:15:58 +00:00
* policyPassProb ,
* orbitProb ,
2022-08-29 18:40:16 +00:00
* munkiIssueProb ,
* munkiIssueCount ,
2023-02-28 17:55:04 +00:00
* emptySerialProb ,
2022-05-31 13:15:58 +00:00
)
2021-12-09 21:05:32 +00:00
a . stats = stats
a . nodeKeyManager = nodeKeyManager
2022-11-15 13:24:40 +00:00
go a . runLoop ( i , * onlyAlreadyEnrolled )
2021-09-22 20:18:55 +00:00
time . Sleep ( sleepTime )
}
fmt . Println ( "Agents running. Kill with C-c." )
<- make ( chan struct { } )
}
2023-02-17 20:10:49 +00:00
// numbers plus capital letters without I, L, O for readability
const serialLetters = "0123456789ABCDEFGHJKMNPQRSTUVWXYZ"
func randSerial ( ) string {
b := make ( [ ] byte , 12 )
for i := range b {
//nolint:gosec // not used for crypto, only to generate random serial for testing
b [ i ] = serialLetters [ rand . Intn ( len ( serialLetters ) ) ]
}
return string ( b )
}