/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to mandos

  • Committer: Teddy Hogeborn
  • Date: 2008-09-13 19:20:50 UTC
  • Revision ID: teddy@fukt.bsnet.se-20080913192050-gxuo0jv4o25jn848
* TODO: Minor changes.

Show diffs side-by-side

added added

removed removed

Lines of Context:
24
24
#     GNU General Public License for more details.
25
25
26
26
# You should have received a copy of the GNU General Public License
27
 
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
27
# along with this program.  If not, see
 
28
# <http://www.gnu.org/licenses/>.
28
29
29
30
# Contact the authors at <mandos@fukt.bsnet.se>.
30
31
54
55
import stat
55
56
import logging
56
57
import logging.handlers
 
58
import pwd
57
59
 
58
60
import dbus
59
61
import gobject
123
125
    def rename(self):
124
126
        """Derived from the Avahi example code"""
125
127
        if self.rename_count >= self.max_renames:
126
 
            logger.critical(u"No suitable service name found after %i"
127
 
                            u" retries, exiting.", rename_count)
 
128
            logger.critical(u"No suitable Zeroconf service name found"
 
129
                            u" after %i retries, exiting.",
 
130
                            rename_count)
128
131
            raise AvahiServiceError("Too many renames")
129
132
        self.name = server.GetAlternativeServiceName(self.name)
130
 
        logger.info(u"Changing name to %r ...", str(self.name))
 
133
        logger.info(u"Changing Zeroconf service name to %r ...",
 
134
                    str(self.name))
131
135
        syslogger.setFormatter(logging.Formatter\
132
136
                               ('Mandos (%s): %%(levelname)s:'
133
137
                               ' %%(message)s' % self.name))
148
152
                     avahi.DBUS_INTERFACE_ENTRY_GROUP)
149
153
            group.connect_to_signal('StateChanged',
150
154
                                    entry_group_state_changed)
151
 
        logger.debug(u"Adding service '%s' of type '%s' ...",
 
155
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
152
156
                     service.name, service.type)
153
157
        group.AddService(
154
158
                self.interface,         # interface
337
341
            try:
338
342
                logger.info(u"Starting checker %r for %s",
339
343
                            command, self.name)
 
344
                # We don't need to redirect stdout and stderr, since
 
345
                # in normal mode, that is already done by daemon(),
 
346
                # and in debug mode we don't want to.  (Stdin is
 
347
                # always replaced by /dev/null.)
340
348
                self.checker = subprocess.Popen(command,
341
349
                                                close_fds=True,
342
350
                                                shell=True, cwd="/")
343
351
                self.checker_callback_tag = gobject.child_watch_add\
344
352
                                            (self.checker.pid,
345
353
                                             self.checker_callback)
346
 
            except subprocess.OSError, error:
 
354
            except OSError, error:
347
355
                logger.error(u"Failed to start subprocess: %s",
348
356
                             error)
349
357
        # Re-run this periodically if run by gobject.timeout_add
406
414
    gnutls.library.functions.gnutls_openpgp_crt_import\
407
415
                    (crt, ctypes.byref(datum),
408
416
                     gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
 
417
    # Verify the self signature in the key
 
418
    crtverify = ctypes.c_uint();
 
419
    gnutls.library.functions.gnutls_openpgp_crt_verify_self\
 
420
        (crt, 0, ctypes.byref(crtverify))
 
421
    if crtverify.value != 0:
 
422
        gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
423
        raise gnutls.errors.CertificateSecurityError("Verify failed")
409
424
    # New buffer for the fingerprint
410
425
    buffer = ctypes.create_string_buffer(20)
411
426
    buffer_length = ctypes.c_size_t()
503
518
    Attributes:
504
519
        settings:       Server settings
505
520
        clients:        Set() of Client objects
 
521
        enabled:        Boolean; whether this server is activated yet
506
522
    """
507
523
    address_family = socket.AF_INET6
508
524
    def __init__(self, *args, **kwargs):
512
528
        if "clients" in kwargs:
513
529
            self.clients = kwargs["clients"]
514
530
            del kwargs["clients"]
 
531
        self.enabled = False
515
532
        return super(type(self), self).__init__(*args, **kwargs)
516
533
    def server_bind(self):
517
534
        """This overrides the normal server_bind() function
548
565
#                                            (self.settings
549
566
#                                             ["interface"]))
550
567
            return super(type(self), self).server_bind()
 
568
    def server_activate(self):
 
569
        if self.enabled:
 
570
            return super(type(self), self).server_activate()
 
571
    def enable(self):
 
572
        self.enabled = True
551
573
 
552
574
 
553
575
def string_to_delta(interval):
563
585
    datetime.timedelta(1)
564
586
    >>> string_to_delta(u'1w')
565
587
    datetime.timedelta(7)
 
588
    >>> string_to_delta('5m 30s')
 
589
    datetime.timedelta(0, 330)
566
590
    """
567
 
    try:
568
 
        suffix=unicode(interval[-1])
569
 
        value=int(interval[:-1])
570
 
        if suffix == u"d":
571
 
            delta = datetime.timedelta(value)
572
 
        elif suffix == u"s":
573
 
            delta = datetime.timedelta(0, value)
574
 
        elif suffix == u"m":
575
 
            delta = datetime.timedelta(0, 0, 0, 0, value)
576
 
        elif suffix == u"h":
577
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, value)
578
 
        elif suffix == u"w":
579
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
580
 
        else:
 
591
    timevalue = datetime.timedelta(0)
 
592
    for s in interval.split():
 
593
        try:
 
594
            suffix=unicode(s[-1])
 
595
            value=int(s[:-1])
 
596
            if suffix == u"d":
 
597
                delta = datetime.timedelta(value)
 
598
            elif suffix == u"s":
 
599
                delta = datetime.timedelta(0, value)
 
600
            elif suffix == u"m":
 
601
                delta = datetime.timedelta(0, 0, 0, 0, value)
 
602
            elif suffix == u"h":
 
603
                delta = datetime.timedelta(0, 0, 0, 0, 0, value)
 
604
            elif suffix == u"w":
 
605
                delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
 
606
            else:
 
607
                raise ValueError
 
608
        except (ValueError, IndexError):
581
609
            raise ValueError
582
 
    except (ValueError, IndexError):
583
 
        raise ValueError
584
 
    return delta
 
610
        timevalue += delta
 
611
    return timevalue
585
612
 
586
613
 
587
614
def server_state_changed(state):
588
615
    """Derived from the Avahi example code"""
589
616
    if state == avahi.SERVER_COLLISION:
590
 
        logger.error(u"Server name collision")
 
617
        logger.error(u"Zeroconf server name collision")
591
618
        service.remove()
592
619
    elif state == avahi.SERVER_RUNNING:
593
620
        service.add()
595
622
 
596
623
def entry_group_state_changed(state, error):
597
624
    """Derived from the Avahi example code"""
598
 
    logger.debug(u"state change: %i", state)
 
625
    logger.debug(u"Avahi state change: %i", state)
599
626
    
600
627
    if state == avahi.ENTRY_GROUP_ESTABLISHED:
601
 
        logger.debug(u"Service established.")
 
628
        logger.debug(u"Zeroconf service established.")
602
629
    elif state == avahi.ENTRY_GROUP_COLLISION:
603
 
        logger.warning(u"Service name collision.")
 
630
        logger.warning(u"Zeroconf service name collision.")
604
631
        service.rename()
605
632
    elif state == avahi.ENTRY_GROUP_FAILURE:
606
 
        logger.critical(u"Error in group state changed %s",
 
633
        logger.critical(u"Avahi: Error in group state changed %s",
607
634
                        unicode(error))
608
635
        raise AvahiGroupError("State changed: %s", str(error))
609
636
 
700
727
    server_config = ConfigParser.SafeConfigParser(server_defaults)
701
728
    del server_defaults
702
729
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
703
 
    server_section = "server"
704
730
    # Convert the SafeConfigParser object to a dict
705
 
    server_settings = dict(server_config.items(server_section))
 
731
    server_settings = server_config.defaults()
706
732
    # Use getboolean on the boolean config option
707
733
    server_settings["debug"] = server_config.getboolean\
708
 
                               (server_section, "debug")
 
734
                               ("DEFAULT", "debug")
709
735
    del server_config
710
736
    
711
737
    # Override the settings from the config file with command line
733
759
    # Parse config file with clients
734
760
    client_defaults = { "timeout": "1h",
735
761
                        "interval": "5m",
736
 
                        "checker": "fping -q -- %%(host)s",
 
762
                        "checker": "fping -q -- %(host)s",
 
763
                        "host": "",
737
764
                        }
738
765
    client_config = ConfigParser.SafeConfigParser(client_defaults)
739
766
    client_config.read(os.path.join(server_settings["configdir"],
740
767
                                    "clients.conf"))
741
768
    
 
769
    clients = Set()
 
770
    tcp_server = IPv6_TCPServer((server_settings["address"],
 
771
                                 server_settings["port"]),
 
772
                                tcp_handler,
 
773
                                settings=server_settings,
 
774
                                clients=clients)
 
775
    pidfilename = "/var/run/mandos.pid"
 
776
    try:
 
777
        pidfile = open(pidfilename, "w")
 
778
    except IOError, error:
 
779
        logger.error("Could not open file %r", pidfilename)
 
780
    
 
781
    uid = 65534
 
782
    gid = 65534
 
783
    try:
 
784
        uid = pwd.getpwnam("mandos").pw_uid
 
785
    except KeyError:
 
786
        try:
 
787
            uid = pwd.getpwnam("nobody").pw_uid
 
788
        except KeyError:
 
789
            pass
 
790
    try:
 
791
        gid = pwd.getpwnam("mandos").pw_gid
 
792
    except KeyError:
 
793
        try:
 
794
            gid = pwd.getpwnam("nogroup").pw_gid
 
795
        except KeyError:
 
796
            pass
 
797
    try:
 
798
        os.setuid(uid)
 
799
        os.setgid(gid)
 
800
    except OSError, error:
 
801
        if error[0] != errno.EPERM:
 
802
            raise error
 
803
    
742
804
    global service
743
805
    service = AvahiService(name = server_settings["servicename"],
744
806
                           type = "_mandos._tcp", );
745
807
    if server_settings["interface"]:
746
 
        service.interface = if_nametoindex(server_settings["interface"])
 
808
        service.interface = if_nametoindex\
 
809
                            (server_settings["interface"])
747
810
    
748
811
    global main_loop
749
812
    global bus
752
815
    DBusGMainLoop(set_as_default=True )
753
816
    main_loop = gobject.MainLoop()
754
817
    bus = dbus.SystemBus()
755
 
    server = dbus.Interface(
756
 
            bus.get_object( avahi.DBUS_NAME, avahi.DBUS_PATH_SERVER ),
757
 
            avahi.DBUS_INTERFACE_SERVER )
 
818
    server = dbus.Interface(bus.get_object(avahi.DBUS_NAME,
 
819
                                           avahi.DBUS_PATH_SERVER),
 
820
                            avahi.DBUS_INTERFACE_SERVER)
758
821
    # End of Avahi example code
759
822
    
760
 
    clients = Set()
761
823
    def remove_from_clients(client):
762
824
        clients.remove(client)
763
825
        if not clients:
773
835
        logger.critical(u"No clients defined")
774
836
        sys.exit(1)
775
837
    
776
 
    if not debug:
 
838
    if debug:
 
839
        # Redirect stdin so all checkers get /dev/null
 
840
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
841
        os.dup2(null, sys.stdin.fileno())
 
842
        if null > 2:
 
843
            os.close(null)
 
844
    else:
 
845
        # No console logging
777
846
        logger.removeHandler(console)
 
847
        # Close all input and output, do double fork, etc.
778
848
        daemon()
779
849
    
780
 
    pidfilename = "/var/run/mandos/mandos.pid"
781
 
    pid = os.getpid()
782
850
    try:
783
 
        pidfile = open(pidfilename, "w")
 
851
        pid = os.getpid()
784
852
        pidfile.write(str(pid) + "\n")
785
853
        pidfile.close()
786
854
        del pidfile
787
855
    except IOError, err:
788
 
        logger.error(u"Could not write %s file with PID %d",
789
 
                     pidfilename, os.getpid())
 
856
        logger.error(u"Could not write to file %r with PID %d",
 
857
                     pidfilename, pid)
 
858
    except NameError:
 
859
        # "pidfile" was never created
 
860
        pass
 
861
    del pidfilename
790
862
    
791
863
    def cleanup():
792
864
        "Cleanup function; run on exit"
812
884
    for client in clients:
813
885
        client.start()
814
886
    
815
 
    tcp_server = IPv6_TCPServer((server_settings["address"],
816
 
                                 server_settings["port"]),
817
 
                                tcp_handler,
818
 
                                settings=server_settings,
819
 
                                clients=clients)
 
887
    tcp_server.enable()
 
888
    tcp_server.server_activate()
 
889
    
820
890
    # Find out what port we got
821
891
    service.port = tcp_server.socket.getsockname()[1]
822
892
    logger.info(u"Now listening on address %r, port %d, flowinfo %d,"