57
56
import logging.handlers
58
from contextlib import closing
62
64
from dbus.mainloop.glib import DBusGMainLoop
65
# Brief description of the operation of this program:
67
# This server announces itself as a Zeroconf service. Connecting
68
# clients use the TLS protocol, with the unusual quirk that this
69
# server program acts as a TLS "client" while the connecting clients
70
# acts as a TLS "server". The clients (acting as a TLS "server") must
71
# supply an OpenPGP certificate, and the fingerprint of this
72
# certificate is used by this server to look up (in a list read from a
73
# file at start time) which binary blob to give the client. No other
74
# authentication or authorization is done by this server.
77
70
logger = logging.Logger('mandos')
78
71
syslogger = logging.handlers.SysLogHandler\
79
(facility = logging.handlers.SysLogHandler.LOG_DAEMON)
72
(facility = logging.handlers.SysLogHandler.LOG_DAEMON,
80
74
syslogger.setFormatter(logging.Formatter\
81
('%(levelname)s: %(message)s'))
75
('Mandos: %(levelname)s: %(message)s'))
82
76
logger.addHandler(syslogger)
85
# This variable is used to optionally bind to a specified interface.
86
# It is a global variable to fit in with the other variables from the
88
serviceInterface = avahi.IF_UNSPEC
78
console = logging.StreamHandler()
79
console.setFormatter(logging.Formatter('%(name)s: %(levelname)s:'
81
logger.addHandler(console)
83
class AvahiError(Exception):
84
def __init__(self, value):
86
super(AvahiError, self).__init__()
88
return repr(self.value)
90
class AvahiServiceError(AvahiError):
93
class AvahiGroupError(AvahiError):
97
class AvahiService(object):
98
"""An Avahi (Zeroconf) service.
100
interface: integer; avahi.IF_UNSPEC or an interface index.
101
Used to optionally bind to the specified interface.
102
name: string; Example: 'Mandos'
103
type: string; Example: '_mandos._tcp'.
104
See <http://www.dns-sd.org/ServiceTypes.html>
105
port: integer; what port to announce
106
TXT: list of strings; TXT record for the service
107
domain: string; Domain to publish on, default to .local if empty.
108
host: string; Host to publish records for, default is localhost
109
max_renames: integer; maximum number of renames
110
rename_count: integer; counter so we only rename after collisions
111
a sensible number of times
113
def __init__(self, interface = avahi.IF_UNSPEC, name = None,
114
servicetype = None, port = None, TXT = None, domain = "",
115
host = "", max_renames = 32768):
116
self.interface = interface
118
self.type = servicetype
126
self.rename_count = 0
127
self.max_renames = max_renames
129
"""Derived from the Avahi example code"""
130
if self.rename_count >= self.max_renames:
131
logger.critical(u"No suitable Zeroconf service name found"
132
u" after %i retries, exiting.",
134
raise AvahiServiceError("Too many renames")
135
self.name = server.GetAlternativeServiceName(self.name)
136
logger.info(u"Changing Zeroconf service name to %r ...",
138
syslogger.setFormatter(logging.Formatter\
139
('Mandos (%s): %%(levelname)s:'
140
' %%(message)s' % self.name))
143
self.rename_count += 1
145
"""Derived from the Avahi example code"""
146
if group is not None:
149
"""Derived from the Avahi example code"""
152
group = dbus.Interface\
153
(bus.get_object(avahi.DBUS_NAME,
154
server.EntryGroupNew()),
155
avahi.DBUS_INTERFACE_ENTRY_GROUP)
156
group.connect_to_signal('StateChanged',
157
entry_group_state_changed)
158
logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
159
service.name, service.type)
161
self.interface, # interface
162
avahi.PROTO_INET6, # protocol
163
dbus.UInt32(0), # flags
164
self.name, self.type,
165
self.domain, self.host,
166
dbus.UInt16(self.port),
167
avahi.string_array_to_txt_array(self.TXT))
89
170
# From the Avahi example code:
90
serviceName = "Mandos"
91
serviceType = "_mandos._tcp" # http://www.dns-sd.org/ServiceTypes.html
92
servicePort = None # Not known at startup
93
serviceTXT = [] # TXT record for the service
94
domain = "" # Domain to publish on, default to .local
95
host = "" # Host to publish records for, default to localhost
96
group = None #our entry group
97
rename_count = 12 # Counter so we only rename after collisions a
98
# sensible number of times
171
group = None # our entry group
99
172
# End of Avahi example code
102
class Client(object):
175
class Client(dbus.service.Object):
103
176
"""A representation of a client host served by this server.
105
178
name: string; from the config file, used in log messages
106
179
fingerprint: string (40 or 32 hexadecimal digits); used to
107
180
uniquely identify the client
108
181
secret: bytestring; sent verbatim (over TLS) to client
109
fqdn: string (FQDN); available for use by the checker command
110
created: datetime.datetime()
111
last_seen: datetime.datetime() or None if not yet seen
112
timeout: datetime.timedelta(); How long from last_seen until
113
this client is invalid
182
host: string; available for use by the checker command
183
created: datetime.datetime(); object creation, not client host
185
last_checked_ok: datetime.datetime() or None if not yet checked OK
186
timeout: datetime.timedelta(); How long from last_checked_ok
187
until this client is invalid
114
188
interval: datetime.timedelta(); How often to start a new checker
115
189
stop_hook: If set, called by stop() as stop_hook(self)
116
190
checker: subprocess.Popen(); a running checker process used
117
191
to see if the client lives.
118
Is None if no process is running.
192
'None' if no process is running.
119
193
checker_initiator_tag: a gobject event source tag, or None
120
194
stop_initiator_tag: - '' -
121
195
checker_callback_tag: - '' -
122
196
checker_command: string; External command which is run to check if
123
client lives. %()s expansions are done at
197
client lives. %() expansions are done at
124
198
runtime with vars(self) as dict, so that for
125
199
instance %(name)s can be used in the command.
126
200
Private attibutes:
127
201
_timeout: Real variable for 'timeout'
128
202
_interval: Real variable for 'interval'
129
_timeout_milliseconds: Used by gobject.timeout_add()
203
_timeout_milliseconds: Used when calling gobject.timeout_add()
130
204
_interval_milliseconds: - '' -
206
interface = u"org.mandos_system.Mandos.Clients"
208
@dbus.service.method(interface, out_signature="s")
210
"D-Bus getter method"
213
@dbus.service.method(interface, out_signature="s")
214
def getFingerprint(self):
215
"D-Bus getter method"
216
return self.fingerprint
218
@dbus.service.method(interface, in_signature="ay",
220
def setSecret(self, secret):
221
"D-Bus setter method"
132
224
def _set_timeout(self, timeout):
133
"Setter function for 'timeout' attribute"
225
"Setter function for the 'timeout' attribute"
134
226
self._timeout = timeout
135
227
self._timeout_milliseconds = ((self.timeout.days
136
228
* 24 * 60 * 60 * 1000)
137
229
+ (self.timeout.seconds * 1000)
138
230
+ (self.timeout.microseconds
140
timeout = property(lambda self: self._timeout,
233
self.TimeoutChanged(self._timeout_milliseconds)
234
timeout = property(lambda self: self._timeout, _set_timeout)
237
@dbus.service.method(interface, out_signature="t")
238
def getTimeout(self):
239
"D-Bus getter method"
240
return self._timeout_milliseconds
242
@dbus.service.signal(interface, signature="t")
243
def TimeoutChanged(self, t):
143
247
def _set_interval(self, interval):
144
"Setter function for 'interval' attribute"
248
"Setter function for the 'interval' attribute"
145
249
self._interval = interval
146
250
self._interval_milliseconds = ((self.interval.days
147
251
* 24 * 60 * 60 * 1000)
150
254
+ (self.interval.microseconds
152
interval = property(lambda self: self._interval,
257
self.IntervalChanged(self._interval_milliseconds)
258
interval = property(lambda self: self._interval, _set_interval)
154
259
del _set_interval
155
def __init__(self, name=None, options=None, stop_hook=None,
156
fingerprint=None, secret=None, secfile=None,
157
fqdn=None, timeout=None, interval=-1, checker=None):
158
"""Note: the 'checker' argument sets the 'checker_command'
159
attribute and not the 'checker' attribute.."""
261
@dbus.service.method(interface, out_signature="t")
262
def getInterval(self):
263
"D-Bus getter method"
264
return self._interval_milliseconds
266
@dbus.service.signal(interface, signature="t")
267
def IntervalChanged(self, t):
271
def __init__(self, name = None, stop_hook=None, config=None):
272
"""Note: the 'checker' key in 'config' sets the
273
'checker_command' attribute and *not* the 'checker'
275
dbus.service.Object.__init__(self, bus,
277
% name.replace(".", "_"))
161
# Uppercase and remove spaces from fingerprint
162
# for later comparison purposes with return value of
163
# the fingerprint() function
164
self.fingerprint = fingerprint.upper().replace(u" ", u"")
166
self.secret = secret.decode(u"base64")
169
self.secret = sf.read()
281
logger.debug(u"Creating client %r", self.name)
282
# Uppercase and remove spaces from fingerprint for later
283
# comparison purposes with return value from the fingerprint()
285
self.fingerprint = config["fingerprint"].upper()\
287
logger.debug(u" Fingerprint: %s", self.fingerprint)
288
if "secret" in config:
289
self.secret = config["secret"].decode(u"base64")
290
elif "secfile" in config:
291
with closing(open(os.path.expanduser
293
(config["secfile"])))) \
295
self.secret = secfile.read()
172
raise RuntimeError(u"No secret or secfile for client %s"
174
self.fqdn = fqdn # string
297
raise TypeError(u"No secret or secfile for client %s"
299
self.host = config.get("host", "")
175
300
self.created = datetime.datetime.now()
176
self.last_seen = None
178
self.timeout = options.timeout
180
self.timeout = string_to_delta(timeout)
182
self.interval = options.interval
184
self.interval = string_to_delta(interval)
302
self.last_checked_ok = None
303
self.timeout = string_to_delta(config["timeout"])
304
self.interval = string_to_delta(config["interval"])
185
305
self.stop_hook = stop_hook
186
306
self.checker = None
187
307
self.checker_initiator_tag = None
188
308
self.stop_initiator_tag = None
189
309
self.checker_callback_tag = None
190
self.check_command = checker
310
self.check_command = config["checker"]
192
313
"""Start this client's checker and timeout hooks"""
193
315
# Schedule a new checker to be started an 'interval' from now,
194
316
# and every interval from then on.
195
317
self.checker_initiator_tag = gobject.timeout_add\
201
323
self.stop_initiator_tag = gobject.timeout_add\
202
324
(self._timeout_milliseconds,
327
self.StateChanged(True)
329
@dbus.service.signal(interface, signature="b")
330
def StateChanged(self, started):
206
The possibility that this client might be restarted is left
207
open, but not currently used."""
208
# If this client doesn't have a secret, it is already stopped.
210
logger.debug(u"Stopping client %s", self.name)
335
"""Stop this client."""
336
if getattr(self, "started", False):
337
logger.info(u"Stopping client %s", self.name)
214
if hasattr(self, "stop_initiator_tag") \
215
and self.stop_initiator_tag:
340
if getattr(self, "stop_initiator_tag", False):
216
341
gobject.source_remove(self.stop_initiator_tag)
217
342
self.stop_initiator_tag = None
218
if hasattr(self, "checker_initiator_tag") \
219
and self.checker_initiator_tag:
343
if getattr(self, "checker_initiator_tag", False):
220
344
gobject.source_remove(self.checker_initiator_tag)
221
345
self.checker_initiator_tag = None
222
346
self.stop_checker()
223
347
if self.stop_hook:
224
348
self.stop_hook(self)
350
self.StateChanged(False)
225
351
# Do not run this again if called by a gobject.timeout_add
354
Stop = dbus.service.method(interface)(stop)
227
356
def __del__(self):
228
357
self.stop_hook = None
230
360
def checker_callback(self, pid, condition):
231
361
"""The checker has completed, so take appropriate actions."""
232
now = datetime.datetime.now()
233
362
self.checker_callback_tag = None
234
363
self.checker = None
235
364
if os.WIFEXITED(condition) \
236
365
and (os.WEXITSTATUS(condition) == 0):
237
logger.debug(u"Checker for %(name)s succeeded",
240
gobject.source_remove(self.stop_initiator_tag)
241
self.stop_initiator_tag = gobject.timeout_add\
242
(self._timeout_milliseconds,
366
logger.info(u"Checker for %(name)s succeeded",
369
self.CheckerCompleted(True)
244
371
elif not os.WIFEXITED(condition):
245
372
logger.warning(u"Checker for %(name)s crashed?",
375
self.CheckerCompleted(False)
248
logger.debug(u"Checker for %(name)s failed",
377
logger.info(u"Checker for %(name)s failed",
380
self.CheckerCompleted(False)
382
@dbus.service.signal(interface, signature="b")
383
def CheckerCompleted(self, success):
387
def bump_timeout(self):
388
"""Bump up the timeout for this client.
389
This should only be called when the client has been seen,
392
self.last_checked_ok = datetime.datetime.now()
393
gobject.source_remove(self.stop_initiator_tag)
394
self.stop_initiator_tag = gobject.timeout_add\
395
(self._timeout_milliseconds, self.stop)
397
bumpTimeout = dbus.service.method(interface)(bump_timeout)
250
399
def start_checker(self):
251
400
"""Start a new checker subprocess if one is not running.
252
401
If a checker already exists, leave it running and do
261
410
# is as it should be.
262
411
if self.checker is None:
264
command = self.check_command % self.fqdn
413
# In case check_command has exactly one % operator
414
command = self.check_command % self.host
265
415
except TypeError:
416
# Escape attributes for the shell
266
417
escaped_attrs = dict((key, re.escape(str(val)))
268
419
vars(self).iteritems())
270
421
command = self.check_command % escaped_attrs
271
422
except TypeError, error:
272
logger.critical(u'Could not format string "%s":'
273
u' %s', self.check_command, error)
423
logger.error(u'Could not format string "%s":'
424
u' %s', self.check_command, error)
274
425
return True # Try again later
276
logger.debug(u"Starting checker %r for %s",
278
self.checker = subprocess.\
280
close_fds=True, shell=True,
427
logger.info(u"Starting checker %r for %s",
429
# We don't need to redirect stdout and stderr, since
430
# in normal mode, that is already done by daemon(),
431
# and in debug mode we don't want to. (Stdin is
432
# always replaced by /dev/null.)
433
self.checker = subprocess.Popen(command,
282
436
self.checker_callback_tag = gobject.child_watch_add\
283
437
(self.checker.pid,
284
438
self.checker_callback)
285
except subprocess.OSError, error:
440
self.CheckerStarted(command)
441
except OSError, error:
286
442
logger.error(u"Failed to start subprocess: %s",
288
444
# Re-run this periodically if run by gobject.timeout_add
447
@dbus.service.signal(interface, signature="s")
448
def CheckerStarted(self, command):
451
@dbus.service.method(interface, out_signature="b")
452
def checkerIsRunning(self):
453
"D-Bus getter method"
454
return self.checker is not None
290
456
def stop_checker(self):
291
457
"""Force the checker process, if any, to stop."""
292
458
if self.checker_callback_tag:
293
459
gobject.source_remove(self.checker_callback_tag)
294
460
self.checker_callback_tag = None
295
if not hasattr(self, "checker") or self.checker is None:
461
if getattr(self, "checker", None) is None:
297
logger.debug("Stopping checker for %(name)s", vars(self))
463
logger.debug(u"Stopping checker for %(name)s", vars(self))
299
465
os.kill(self.checker.pid, signal.SIGTERM)
301
467
#if self.checker.poll() is None:
302
468
# os.kill(self.checker.pid, signal.SIGKILL)
303
469
except OSError, error:
304
if error.errno != errno.ESRCH:
470
if error.errno != errno.ESRCH: # No such process
306
472
self.checker = None
307
def still_valid(self, now=None):
474
StopChecker = dbus.service.method(interface)(stop_checker)
476
def still_valid(self):
308
477
"""Has the timeout not yet passed for this client?"""
310
now = datetime.datetime.now()
311
if self.last_seen is None:
480
now = datetime.datetime.now()
481
if self.last_checked_ok is None:
312
482
return now < (self.created + self.timeout)
314
return now < (self.last_seen + self.timeout)
484
return now < (self.last_checked_ok + self.timeout)
486
stillValid = dbus.service.method(interface, out_signature="b")\
317
492
def peer_certificate(session):
334
509
def fingerprint(openpgp):
335
510
"Convert an OpenPGP bytestring to a hexdigit fingerprint string"
336
# New empty GnuTLS certificate
337
crt = gnutls.library.types.gnutls_openpgp_crt_t()
338
gnutls.library.functions.gnutls_openpgp_crt_init\
340
511
# New GnuTLS "datum" with the OpenPGP public key
341
512
datum = gnutls.library.types.gnutls_datum_t\
342
513
(ctypes.cast(ctypes.c_char_p(openpgp),
343
514
ctypes.POINTER(ctypes.c_ubyte)),
344
515
ctypes.c_uint(len(openpgp)))
516
# New empty GnuTLS certificate
517
crt = gnutls.library.types.gnutls_openpgp_crt_t()
518
gnutls.library.functions.gnutls_openpgp_crt_init\
345
520
# Import the OpenPGP public key into the certificate
346
ret = gnutls.library.functions.gnutls_openpgp_crt_import\
349
gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
521
gnutls.library.functions.gnutls_openpgp_crt_import\
522
(crt, ctypes.byref(datum),
523
gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
524
# Verify the self signature in the key
525
crtverify = ctypes.c_uint()
526
gnutls.library.functions.gnutls_openpgp_crt_verify_self\
527
(crt, 0, ctypes.byref(crtverify))
528
if crtverify.value != 0:
529
gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
530
raise gnutls.errors.CertificateSecurityError("Verify failed")
350
531
# New buffer for the fingerprint
351
buffer = ctypes.create_string_buffer(20)
352
buffer_length = ctypes.c_size_t()
532
buf = ctypes.create_string_buffer(20)
533
buf_len = ctypes.c_size_t()
353
534
# Get the fingerprint from the certificate into the buffer
354
535
gnutls.library.functions.gnutls_openpgp_crt_get_fingerprint\
355
(crt, ctypes.byref(buffer), ctypes.byref(buffer_length))
536
(crt, ctypes.byref(buf), ctypes.byref(buf_len))
356
537
# Deinit the certificate
357
538
gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
358
539
# Convert the buffer to a Python bytestring
359
fpr = ctypes.string_at(buffer, buffer_length.value)
540
fpr = ctypes.string_at(buf, buf_len.value)
360
541
# Convert the bytestring to hexadecimal notation
361
542
hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
365
class tcp_handler(SocketServer.BaseRequestHandler, object):
546
class TCP_handler(SocketServer.BaseRequestHandler, object):
366
547
"""A TCP request handler class.
367
548
Instantiated by IPv6_TCPServer for each request to handle it.
368
549
Note: This will run in its own forked process."""
370
551
def handle(self):
371
logger.debug(u"TCP connection from: %s",
372
unicode(self.client_address))
373
session = gnutls.connection.ClientSession(self.request,
552
logger.info(u"TCP connection from: %s",
553
unicode(self.client_address))
554
session = gnutls.connection.ClientSession\
555
(self.request, gnutls.connection.X509Credentials())
557
line = self.request.makefile().readline()
558
logger.debug(u"Protocol version: %r", line)
560
if int(line.strip().split()[0]) > 1:
562
except (ValueError, IndexError, RuntimeError), error:
563
logger.error(u"Unknown protocol version: %s", error)
566
# Note: gnutls.connection.X509Credentials is really a generic
567
# GnuTLS certificate credentials object so long as no X.509
568
# keys are added to it. Therefore, we can use it here despite
569
# using OpenPGP certificates.
377
571
#priority = ':'.join(("NONE", "+VERS-TLS1.1", "+AES-256-CBC",
378
572
# "+SHA1", "+COMP-NULL", "+CTYPE-OPENPGP",
380
priority = "SECURE256"
574
# Use a fallback default, since this MUST be set.
575
priority = self.server.settings.get("priority", "NORMAL")
382
576
gnutls.library.functions.gnutls_priority_set_direct\
383
(session._c_object, priority, None);
577
(session._c_object, priority, None)
386
580
session.handshake()
387
581
except gnutls.errors.GNUTLSError, error:
388
logger.debug(u"Handshake failed: %s", error)
582
logger.warning(u"Handshake failed: %s", error)
389
583
# Do not run session.bye() here: the session is not
390
584
# established. Just abandon the request.
393
587
fpr = fingerprint(peer_certificate(session))
394
588
except (TypeError, gnutls.errors.GNUTLSError), error:
395
logger.debug(u"Bad certificate: %s", error)
589
logger.warning(u"Bad certificate: %s", error)
398
592
logger.debug(u"Fingerprint: %s", fpr)
426
class IPv6_TCPServer(SocketServer.ForkingTCPServer, object):
623
class IPv6_TCPServer(SocketServer.ForkingMixIn,
624
SocketServer.TCPServer, object):
427
625
"""IPv6 TCP server. Accepts 'None' as address and/or port.
429
options: Command line options
627
settings: Server settings
430
628
clients: Set() of Client objects
629
enabled: Boolean; whether this server is activated yet
432
631
address_family = socket.AF_INET6
433
632
def __init__(self, *args, **kwargs):
434
if "options" in kwargs:
435
self.options = kwargs["options"]
436
del kwargs["options"]
633
if "settings" in kwargs:
634
self.settings = kwargs["settings"]
635
del kwargs["settings"]
437
636
if "clients" in kwargs:
438
637
self.clients = kwargs["clients"]
439
638
del kwargs["clients"]
440
return super(type(self), self).__init__(*args, **kwargs)
640
super(IPv6_TCPServer, self).__init__(*args, **kwargs)
441
641
def server_bind(self):
442
642
"""This overrides the normal server_bind() function
443
643
to bind to an interface if one was specified, and also NOT to
444
644
bind to an address or port if they were not specified."""
445
if self.options.interface:
446
if not hasattr(socket, "SO_BINDTODEVICE"):
447
# From /usr/include/asm-i486/socket.h
448
socket.SO_BINDTODEVICE = 25
645
if self.settings["interface"]:
646
# 25 is from /usr/include/asm-i486/socket.h
647
SO_BINDTODEVICE = getattr(socket, "SO_BINDTODEVICE", 25)
450
649
self.socket.setsockopt(socket.SOL_SOCKET,
451
socket.SO_BINDTODEVICE,
452
self.options.interface)
651
self.settings["interface"])
453
652
except socket.error, error:
454
653
if error[0] == errno.EPERM:
455
logger.warning(u"No permission to"
456
u" bind to interface %s",
457
self.options.interface)
654
logger.error(u"No permission to"
655
u" bind to interface %s",
656
self.settings["interface"])
460
659
# Only bind(2) the socket if we really need to.
482
693
datetime.timedelta(1)
483
694
>>> string_to_delta(u'1w')
484
695
datetime.timedelta(7)
696
>>> string_to_delta('5m 30s')
697
datetime.timedelta(0, 330)
487
suffix=unicode(interval[-1])
488
value=int(interval[:-1])
490
delta = datetime.timedelta(value)
492
delta = datetime.timedelta(0, value)
494
delta = datetime.timedelta(0, 0, 0, 0, value)
496
delta = datetime.timedelta(0, 0, 0, 0, 0, value)
498
delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
699
timevalue = datetime.timedelta(0)
700
for s in interval.split():
702
suffix = unicode(s[-1])
705
delta = datetime.timedelta(value)
707
delta = datetime.timedelta(0, value)
709
delta = datetime.timedelta(0, 0, 0, 0, value)
711
delta = datetime.timedelta(0, 0, 0, 0, 0, value)
713
delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
716
except (ValueError, IndexError):
501
except (ValueError, IndexError):
507
"""Derived from the Avahi example code"""
508
global group, serviceName, serviceType, servicePort, serviceTXT, \
511
group = dbus.Interface(
512
bus.get_object( avahi.DBUS_NAME,
513
server.EntryGroupNew()),
514
avahi.DBUS_INTERFACE_ENTRY_GROUP)
515
group.connect_to_signal('StateChanged',
516
entry_group_state_changed)
517
logger.debug(u"Adding service '%s' of type '%s' ...",
518
serviceName, serviceType)
521
serviceInterface, # interface
522
avahi.PROTO_INET6, # protocol
523
dbus.UInt32(0), # flags
524
serviceName, serviceType,
526
dbus.UInt16(servicePort),
527
avahi.string_array_to_txt_array(serviceTXT))
531
def remove_service():
532
"""From the Avahi example code"""
535
if not group is None:
539
722
def server_state_changed(state):
540
723
"""Derived from the Avahi example code"""
541
724
if state == avahi.SERVER_COLLISION:
542
logger.warning(u"Server name collision")
725
logger.error(u"Zeroconf server name collision")
544
727
elif state == avahi.SERVER_RUNNING:
548
731
def entry_group_state_changed(state, error):
549
732
"""Derived from the Avahi example code"""
550
global serviceName, server, rename_count
552
logger.debug(u"state change: %i", state)
733
logger.debug(u"Avahi state change: %i", state)
554
735
if state == avahi.ENTRY_GROUP_ESTABLISHED:
555
logger.debug(u"Service established.")
736
logger.debug(u"Zeroconf service established.")
556
737
elif state == avahi.ENTRY_GROUP_COLLISION:
558
rename_count = rename_count - 1
560
name = server.GetAlternativeServiceName(name)
561
logger.warning(u"Service name collision, "
562
u"changing name to '%s' ...", name)
567
logger.error(u"No suitable service name found after %i"
568
u" retries, exiting.", n_rename)
738
logger.warning(u"Zeroconf service name collision.")
570
740
elif state == avahi.ENTRY_GROUP_FAILURE:
571
logger.error(u"Error in group state changed %s",
741
logger.critical(u"Avahi: Error in group state changed %s",
743
raise AvahiGroupError("State changed: %s", str(error))
576
745
def if_nametoindex(interface):
577
"""Call the C function if_nametoindex()"""
746
"""Call the C function if_nametoindex(), or equivalent"""
747
global if_nametoindex
579
libc = ctypes.cdll.LoadLibrary("libc.so.6")
580
return libc.if_nametoindex(interface)
749
if_nametoindex = ctypes.cdll.LoadLibrary\
750
(ctypes.util.find_library("c")).if_nametoindex
581
751
except (OSError, AttributeError):
582
752
if "struct" not in sys.modules:
584
754
if "fcntl" not in sys.modules:
586
SIOCGIFINDEX = 0x8933 # From /usr/include/linux/sockios.h
588
ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
589
struct.pack("16s16x", interface))
591
interface_index = struct.unpack("I", ifreq[16:20])[0]
592
return interface_index
595
def daemon(nochdir, noclose):
756
def if_nametoindex(interface):
757
"Get an interface index the hard way, i.e. using fcntl()"
758
SIOCGIFINDEX = 0x8933 # From /usr/include/linux/sockios.h
759
with closing(socket.socket()) as s:
760
ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
761
struct.pack("16s16x", interface))
762
interface_index = struct.unpack("I", ifreq[16:20])[0]
763
return interface_index
764
return if_nametoindex(interface)
767
def daemon(nochdir = False, noclose = False):
596
768
"""See daemon(3). Standard BSD Unix function.
597
769
This should really exist as os.daemon, but it doesn't (yet)."""
616
def killme(status = 0):
617
logger.debug("Stopping server with exit status %d", status)
619
if main_loop_started:
628
global main_loop_started
629
main_loop_started = False
631
parser = OptionParser()
791
parser = OptionParser(version = "%%prog %s" % version)
632
792
parser.add_option("-i", "--interface", type="string",
633
default=None, metavar="IF",
634
help="Bind to interface IF")
635
parser.add_option("-a", "--address", type="string", default=None,
793
metavar="IF", help="Bind to interface IF")
794
parser.add_option("-a", "--address", type="string",
636
795
help="Address to listen for requests on")
637
parser.add_option("-p", "--port", type="int", default=None,
796
parser.add_option("-p", "--port", type="int",
638
797
help="Port number to receive requests on")
639
parser.add_option("--timeout", type="string", # Parsed later
641
help="Amount of downtime allowed for clients")
642
parser.add_option("--interval", type="string", # Parsed later
644
help="How often to check that a client is up")
645
798
parser.add_option("--check", action="store_true", default=False,
646
799
help="Run self-test")
647
parser.add_option("--debug", action="store_true", default=False,
649
(options, args) = parser.parse_args()
800
parser.add_option("--debug", action="store_true",
801
help="Debug mode; run in foreground and log to"
803
parser.add_option("--priority", type="string", help="GnuTLS"
804
" priority string (see GnuTLS documentation)")
805
parser.add_option("--servicename", type="string", metavar="NAME",
806
help="Zeroconf service name")
807
parser.add_option("--configdir", type="string",
808
default="/etc/mandos", metavar="DIR",
809
help="Directory to search for configuration"
811
options = parser.parse_args()[0]
651
813
if options.check:
653
815
doctest.testmod()
656
# Parse the time arguments
658
options.timeout = string_to_delta(options.timeout)
660
parser.error("option --timeout: Unparseable time")
662
options.interval = string_to_delta(options.interval)
664
parser.error("option --interval: Unparseable time")
667
defaults = { "checker": "fping -q -- %%(fqdn)s" }
668
client_config = ConfigParser.SafeConfigParser(defaults)
669
#client_config.readfp(open("global.conf"), "global.conf")
670
client_config.read("mandos-clients.conf")
818
# Default values for config file for server-global settings
819
server_defaults = { "interface": "",
824
"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
825
"servicename": "Mandos",
828
# Parse config file for server-global settings
829
server_config = ConfigParser.SafeConfigParser(server_defaults)
831
server_config.read(os.path.join(options.configdir, "mandos.conf"))
832
# Convert the SafeConfigParser object to a dict
833
server_settings = server_config.defaults()
834
# Use getboolean on the boolean config option
835
server_settings["debug"] = server_config.getboolean\
839
# Override the settings from the config file with command line
841
for option in ("interface", "address", "port", "debug",
842
"priority", "servicename", "configdir"):
843
value = getattr(options, option)
844
if value is not None:
845
server_settings[option] = value
847
# Now we have our good server settings in "server_settings"
849
debug = server_settings["debug"]
852
syslogger.setLevel(logging.WARNING)
853
console.setLevel(logging.WARNING)
855
if server_settings["servicename"] != "Mandos":
856
syslogger.setFormatter(logging.Formatter\
857
('Mandos (%s): %%(levelname)s:'
859
% server_settings["servicename"]))
861
# Parse config file with clients
862
client_defaults = { "timeout": "1h",
864
"checker": "fping -q -- %(host)s",
867
client_config = ConfigParser.SafeConfigParser(client_defaults)
868
client_config.read(os.path.join(server_settings["configdir"],
872
tcp_server = IPv6_TCPServer((server_settings["address"],
873
server_settings["port"]),
875
settings=server_settings,
877
pidfilename = "/var/run/mandos.pid"
879
pidfile = open(pidfilename, "w")
880
except IOError, error:
881
logger.error("Could not open file %r", pidfilename)
886
uid = pwd.getpwnam("mandos").pw_uid
889
uid = pwd.getpwnam("nobody").pw_uid
893
gid = pwd.getpwnam("mandos").pw_gid
896
gid = pwd.getpwnam("nogroup").pw_gid
902
except OSError, error:
903
if error[0] != errno.EPERM:
907
service = AvahiService(name = server_settings["servicename"],
908
servicetype = "_mandos._tcp", )
909
if server_settings["interface"]:
910
service.interface = if_nametoindex\
911
(server_settings["interface"])
676
917
DBusGMainLoop(set_as_default=True )
677
918
main_loop = gobject.MainLoop()
678
919
bus = dbus.SystemBus()
679
server = dbus.Interface(
680
bus.get_object( avahi.DBUS_NAME, avahi.DBUS_PATH_SERVER ),
681
avahi.DBUS_INTERFACE_SERVER )
920
server = dbus.Interface(bus.get_object(avahi.DBUS_NAME,
921
avahi.DBUS_PATH_SERVER),
922
avahi.DBUS_INTERFACE_SERVER)
682
923
# End of Avahi example code
684
debug = options.debug
687
console = logging.StreamHandler()
688
# console.setLevel(logging.DEBUG)
689
console.setFormatter(logging.Formatter\
690
('%(levelname)s: %(message)s'))
691
logger.addHandler(console)
695
925
def remove_from_clients(client):
696
926
clients.remove(client)
698
logger.debug(u"No clients left, exiting")
928
logger.critical(u"No clients left, exiting")
701
clients.update(Set(Client(name=section, options=options,
931
clients.update(Set(Client(name = section,
702
932
stop_hook = remove_from_clients,
703
**(dict(client_config\
934
= dict(client_config.items(section)))
705
935
for section in client_config.sections()))
937
logger.critical(u"No clients defined")
941
# Redirect stdin so all checkers get /dev/null
942
null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
943
os.dup2(null, sys.stdin.fileno())
948
logger.removeHandler(console)
949
# Close all input and output, do double fork, etc.
954
pidfile.write(str(pid) + "\n")
958
logger.error(u"Could not write to file %r with PID %d",
961
# "pidfile" was never created
711
966
"Cleanup function; run on exit"
727
982
signal.signal(signal.SIGINT, signal.SIG_IGN)
728
signal.signal(signal.SIGHUP, lambda signum, frame: killme())
729
signal.signal(signal.SIGTERM, lambda signum, frame: killme())
983
signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
984
signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
731
986
for client in clients:
734
tcp_server = IPv6_TCPServer((options.address, options.port),
738
# Find out what random port we got
740
servicePort = tcp_server.socket.getsockname()[1]
741
logger.debug(u"Now listening on port %d", servicePort)
743
if options.interface is not None:
744
global serviceInterface
745
serviceInterface = if_nametoindex(options.interface)
747
# From the Avahi example code
748
server.connect_to_signal("StateChanged", server_state_changed)
750
server_state_changed(server.GetState())
751
except dbus.exceptions.DBusException, error:
752
logger.critical(u"DBusException: %s", error)
754
# End of Avahi example code
756
gobject.io_add_watch(tcp_server.fileno(), gobject.IO_IN,
757
lambda *args, **kwargs:
758
tcp_server.handle_request(*args[2:],
761
logger.debug("Starting main loop")
762
main_loop_started = True
990
tcp_server.server_activate()
992
# Find out what port we got
993
service.port = tcp_server.socket.getsockname()[1]
994
logger.info(u"Now listening on address %r, port %d, flowinfo %d,"
995
u" scope_id %d" % tcp_server.socket.getsockname())
997
#service.interface = tcp_server.socket.getsockname()[3]
1000
# From the Avahi example code
1001
server.connect_to_signal("StateChanged", server_state_changed)
1003
server_state_changed(server.GetState())
1004
except dbus.exceptions.DBusException, error:
1005
logger.critical(u"DBusException: %s", error)
1007
# End of Avahi example code
1009
gobject.io_add_watch(tcp_server.fileno(), gobject.IO_IN,
1010
lambda *args, **kwargs:
1011
tcp_server.handle_request\
1012
(*args[2:], **kwargs) or True)
1014
logger.debug(u"Starting main loop")
1016
except AvahiError, error:
1017
logger.critical(u"AvahiError: %s" + unicode(error))
764
1019
except KeyboardInterrupt:
770
1023
if __name__ == '__main__':