Complete RedFlag codebase with two major security audit implementations.
== A-1: Ed25519 Key Rotation Support ==
Server:
- SignCommand sets SignedAt timestamp and KeyID on every signature
- signing_keys database table (migration 020) for multi-key rotation
- InitializePrimaryKey registers active key at startup
- /api/v1/public-keys endpoint for rotation-aware agents
- SigningKeyQueries for key lifecycle management
Agent:
- Key-ID-aware verification via CheckKeyRotation
- FetchAndCacheAllActiveKeys for rotation pre-caching
- Cache metadata with TTL and staleness fallback
- SecurityLogger events for key rotation and command signing
== A-2: Replay Attack Fixes (F-1 through F-7) ==
F-5 CRITICAL - RetryCommand now signs via signAndCreateCommand
F-1 HIGH - v3 format: "{agent_id}:{cmd_id}:{type}:{hash}:{ts}"
F-7 HIGH - Migration 026: expires_at column with partial index
F-6 HIGH - GetPendingCommands/GetStuckCommands filter by expires_at
F-2 HIGH - Agent-side executedIDs dedup map with cleanup
F-4 HIGH - commandMaxAge reduced from 24h to 4h
F-3 CRITICAL - Old-format commands rejected after 48h via CreatedAt
Verification fixes: migration idempotency (ETHOS #4), log format
compliance (ETHOS #1), stale comments updated.
All 24 tests passing. Docker --no-cache build verified.
See docs/ for full audit reports and deviation log (DEV-001 to DEV-019).
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
91 lines
2.2 KiB
Go
91 lines
2.2 KiB
Go
package scanner
|
|
|
|
import (
|
|
"bufio"
|
|
"bytes"
|
|
"fmt"
|
|
"os/exec"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/Fimeg/RedFlag/aggregator-agent/internal/client"
|
|
)
|
|
|
|
// APTScanner scans for APT package updates
|
|
type APTScanner struct{}
|
|
|
|
// NewAPTScanner creates a new APT scanner
|
|
func NewAPTScanner() *APTScanner {
|
|
return &APTScanner{}
|
|
}
|
|
|
|
// IsAvailable checks if APT is available on this system
|
|
func (s *APTScanner) IsAvailable() bool {
|
|
_, err := exec.LookPath("apt")
|
|
return err == nil
|
|
}
|
|
|
|
// Scan scans for available APT updates
|
|
func (s *APTScanner) Scan() ([]client.UpdateReportItem, error) {
|
|
// Update package cache (sudo may be required, but try anyway)
|
|
updateCmd := exec.Command("apt-get", "update")
|
|
updateCmd.Run() // Ignore errors since we might not have sudo
|
|
|
|
// Get upgradable packages
|
|
cmd := exec.Command("apt", "list", "--upgradable")
|
|
output, err := cmd.Output()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to run apt list: %w", err)
|
|
}
|
|
|
|
return parseAPTOutput(output)
|
|
}
|
|
|
|
func parseAPTOutput(output []byte) ([]client.UpdateReportItem, error) {
|
|
var updates []client.UpdateReportItem
|
|
scanner := bufio.NewScanner(bytes.NewReader(output))
|
|
|
|
// Regex to parse apt output:
|
|
// package/repo version arch [upgradable from: old_version]
|
|
re := regexp.MustCompile(`^([^\s/]+)/([^\s]+)\s+([^\s]+)\s+([^\s]+)\s+\[upgradable from:\s+([^\]]+)\]`)
|
|
|
|
for scanner.Scan() {
|
|
line := scanner.Text()
|
|
if strings.HasPrefix(line, "Listing...") {
|
|
continue
|
|
}
|
|
|
|
matches := re.FindStringSubmatch(line)
|
|
if len(matches) < 6 {
|
|
continue
|
|
}
|
|
|
|
packageName := matches[1]
|
|
repository := matches[2]
|
|
newVersion := matches[3]
|
|
oldVersion := matches[5]
|
|
|
|
// Determine severity (simplified - in production, query Ubuntu Security Advisories)
|
|
severity := "moderate"
|
|
if strings.Contains(repository, "security") {
|
|
severity = "important"
|
|
}
|
|
|
|
update := client.UpdateReportItem{
|
|
PackageType: "apt",
|
|
PackageName: packageName,
|
|
CurrentVersion: oldVersion,
|
|
AvailableVersion: newVersion,
|
|
Severity: severity,
|
|
RepositorySource: repository,
|
|
Metadata: map[string]interface{}{
|
|
"architecture": matches[4],
|
|
},
|
|
}
|
|
|
|
updates = append(updates, update)
|
|
}
|
|
|
|
return updates, nil
|
|
}
|