Complete RedFlag codebase with two major security audit implementations.
== A-1: Ed25519 Key Rotation Support ==
Server:
- SignCommand sets SignedAt timestamp and KeyID on every signature
- signing_keys database table (migration 020) for multi-key rotation
- InitializePrimaryKey registers active key at startup
- /api/v1/public-keys endpoint for rotation-aware agents
- SigningKeyQueries for key lifecycle management
Agent:
- Key-ID-aware verification via CheckKeyRotation
- FetchAndCacheAllActiveKeys for rotation pre-caching
- Cache metadata with TTL and staleness fallback
- SecurityLogger events for key rotation and command signing
== A-2: Replay Attack Fixes (F-1 through F-7) ==
F-5 CRITICAL - RetryCommand now signs via signAndCreateCommand
F-1 HIGH - v3 format: "{agent_id}:{cmd_id}:{type}:{hash}:{ts}"
F-7 HIGH - Migration 026: expires_at column with partial index
F-6 HIGH - GetPendingCommands/GetStuckCommands filter by expires_at
F-2 HIGH - Agent-side executedIDs dedup map with cleanup
F-4 HIGH - commandMaxAge reduced from 24h to 4h
F-3 CRITICAL - Old-format commands rejected after 48h via CreatedAt
Verification fixes: migration idempotency (ETHOS #4), log format
compliance (ETHOS #1), stale comments updated.
All 24 tests passing. Docker --no-cache build verified.
See docs/ for full audit reports and deviation log (DEV-001 to DEV-019).
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
100 lines
3.9 KiB
Go
100 lines
3.9 KiB
Go
/*
|
|
Copyright 2022 Zheng Dayu
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package windowsupdate
|
|
|
|
import (
|
|
"github.com/go-ole/go-ole"
|
|
"github.com/go-ole/go-ole/oleutil"
|
|
)
|
|
|
|
// IUpdateSearcher searches for updates on a server.
|
|
// https://docs.microsoft.com/en-us/windows/win32/api/wuapi/nn-wuapi-iupdatesearcher
|
|
type IUpdateSearcher struct {
|
|
disp *ole.IDispatch
|
|
CanAutomaticallyUpgradeService bool
|
|
ClientApplicationID string
|
|
IncludePotentiallySupersededUpdates bool
|
|
Online bool
|
|
ServerSelection int32
|
|
ServiceID string
|
|
}
|
|
|
|
func toIUpdateSearcher(updateSearcherDisp *ole.IDispatch) (*IUpdateSearcher, error) {
|
|
var err error
|
|
iUpdateSearcher := &IUpdateSearcher{
|
|
disp: updateSearcherDisp,
|
|
}
|
|
|
|
if iUpdateSearcher.CanAutomaticallyUpgradeService, err = toBoolErr(oleutil.GetProperty(updateSearcherDisp, "CanAutomaticallyUpgradeService")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if iUpdateSearcher.ClientApplicationID, err = toStringErr(oleutil.GetProperty(updateSearcherDisp, "ClientApplicationID")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if iUpdateSearcher.IncludePotentiallySupersededUpdates, err = toBoolErr(oleutil.GetProperty(updateSearcherDisp, "IncludePotentiallySupersededUpdates")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if iUpdateSearcher.Online, err = toBoolErr(oleutil.GetProperty(updateSearcherDisp, "Online")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if iUpdateSearcher.ServerSelection, err = toInt32Err(oleutil.GetProperty(updateSearcherDisp, "ServerSelection")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if iUpdateSearcher.ServiceID, err = toStringErr(oleutil.GetProperty(updateSearcherDisp, "ServiceID")); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return iUpdateSearcher, nil
|
|
}
|
|
|
|
// Search performs a synchronous search for updates. The search uses the search options that are currently configured.
|
|
// https://docs.microsoft.com/en-us/windows/win32/api/wuapi/nf-wuapi-iupdatesearcher-search
|
|
func (iUpdateSearcher *IUpdateSearcher) Search(criteria string) (*ISearchResult, error) {
|
|
searchResultDisp, err := toIDispatchErr(oleutil.CallMethod(iUpdateSearcher.disp, "Search", criteria))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return toISearchResult(searchResultDisp)
|
|
}
|
|
|
|
// QueryHistory synchronously queries the computer for the history of the update events.
|
|
// https://docs.microsoft.com/en-us/windows/win32/api/wuapi/nf-wuapi-iupdatesearcher-queryhistory
|
|
func (iUpdateSearcher *IUpdateSearcher) QueryHistory(startIndex int32, count int32) ([]*IUpdateHistoryEntry, error) {
|
|
updateHistoryEntriesDisp, err := toIDispatchErr(oleutil.CallMethod(iUpdateSearcher.disp, "QueryHistory", startIndex, count))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return toIUpdateHistoryEntries(updateHistoryEntriesDisp)
|
|
}
|
|
|
|
// GetTotalHistoryCount returns the number of update events on the computer.
|
|
// https://docs.microsoft.com/en-us/windows/win32/api/wuapi/nf-wuapi-iupdatesearcher-gettotalhistorycount
|
|
func (iUpdateSearcher *IUpdateSearcher) GetTotalHistoryCount() (int32, error) {
|
|
return toInt32Err(oleutil.CallMethod(iUpdateSearcher.disp, "GetTotalHistoryCount"))
|
|
}
|
|
|
|
// QueryHistoryAll synchronously queries the computer for the history of all update events.
|
|
func (iUpdateSearcher *IUpdateSearcher) QueryHistoryAll() ([]*IUpdateHistoryEntry, error) {
|
|
count, err := iUpdateSearcher.GetTotalHistoryCount()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return iUpdateSearcher.QueryHistory(0, count)
|
|
}
|