2
2
# -*- mode: python; coding: utf-8 -*-
4
4
# Mandos server - give out binary blobs to connecting clients.
6
6
# This program is partly derived from an example program for an Avahi
7
7
# service publisher, downloaded from
8
8
# <http://avahi.org/wiki/PythonPublishExample>. This includes the
9
9
# methods "add", "remove", "server_state_changed",
10
10
# "entry_group_state_changed", "cleanup", and "activate" in the
11
11
# "AvahiService" class, and some lines in "main".
13
13
# Everything else is
14
# Copyright © 2008-2017 Teddy Hogeborn
15
# Copyright © 2008-2017 Björn Påhlsson
14
# Copyright © 2008-2016 Teddy Hogeborn
15
# Copyright © 2008-2016 Björn Påhlsson
17
17
# This program is free software: you can redistribute it and/or modify
18
18
# it under the terms of the GNU General Public License as published by
19
19
# the Free Software Foundation, either version 3 of the License, or
86
86
import xml.dom.minidom
89
# Try to find the value of SO_BINDTODEVICE:
91
# This is where SO_BINDTODEVICE is in Python 3.3 (or 3.4?) and
92
# newer, and it is also the most natural place for it:
93
90
SO_BINDTODEVICE = socket.SO_BINDTODEVICE
94
91
except AttributeError:
96
# This is where SO_BINDTODEVICE was up to and including Python
98
93
from IN import SO_BINDTODEVICE
99
94
except ImportError:
100
# In Python 2.7 it seems to have been removed entirely.
101
# Try running the C preprocessor:
103
cc = subprocess.Popen(["cc", "--language=c", "-E",
105
stdin=subprocess.PIPE,
106
stdout=subprocess.PIPE)
107
stdout = cc.communicate(
108
"#include <sys/socket.h>\nSO_BINDTODEVICE\n")[0]
109
SO_BINDTODEVICE = int(stdout.splitlines()[-1])
110
except (OSError, ValueError, IndexError):
112
SO_BINDTODEVICE = None
95
SO_BINDTODEVICE = None
114
97
if sys.version_info.major == 2:
118
101
stored_state_file = "clients.pickle"
120
103
logger = logging.getLogger()
246
227
'--passphrase-file',
248
229
+ self.gnupgargs,
249
stdin=subprocess.PIPE,
250
stdout=subprocess.PIPE,
251
stderr=subprocess.PIPE)
252
ciphertext, err = proc.communicate(input=data)
230
stdin = subprocess.PIPE,
231
stdout = subprocess.PIPE,
232
stderr = subprocess.PIPE)
233
ciphertext, err = proc.communicate(input = data)
253
234
if proc.returncode != 0:
254
235
raise PGPError(err)
255
236
return ciphertext
257
238
def decrypt(self, data, password):
258
239
passphrase = self.password_encode(password)
259
240
with tempfile.NamedTemporaryFile(
260
dir=self.tempdir) as passfile:
241
dir = self.tempdir) as passfile:
261
242
passfile.write(passphrase)
263
244
proc = subprocess.Popen([self.gpg, '--decrypt',
264
245
'--passphrase-file',
266
247
+ self.gnupgargs,
267
stdin=subprocess.PIPE,
268
stdout=subprocess.PIPE,
269
stderr=subprocess.PIPE)
270
decrypted_plaintext, err = proc.communicate(input=data)
248
stdin = subprocess.PIPE,
249
stdout = subprocess.PIPE,
250
stderr = subprocess.PIPE)
251
decrypted_plaintext, err = proc.communicate(input = data)
271
252
if proc.returncode != 0:
272
253
raise PGPError(err)
273
254
return decrypted_plaintext
276
256
# Pretend that we have an Avahi module
277
257
class Avahi(object):
278
258
"""This isn't so much a class as it is a module-like namespace.
279
259
It is instantiated once, and simulates having an Avahi module."""
280
IF_UNSPEC = -1 # avahi-common/address.h
281
PROTO_UNSPEC = -1 # avahi-common/address.h
282
PROTO_INET = 0 # avahi-common/address.h
283
PROTO_INET6 = 1 # avahi-common/address.h
260
IF_UNSPEC = -1 # avahi-common/address.h
261
PROTO_UNSPEC = -1 # avahi-common/address.h
262
PROTO_INET = 0 # avahi-common/address.h
263
PROTO_INET6 = 1 # avahi-common/address.h
284
264
DBUS_NAME = "org.freedesktop.Avahi"
285
265
DBUS_INTERFACE_ENTRY_GROUP = DBUS_NAME + ".EntryGroup"
286
266
DBUS_INTERFACE_SERVER = DBUS_NAME + ".Server"
287
267
DBUS_PATH_SERVER = "/"
289
268
def string_array_to_txt_array(self, t):
290
269
return dbus.Array((dbus.ByteArray(s.encode("utf-8"))
291
270
for s in t), signature="ay")
292
ENTRY_GROUP_ESTABLISHED = 2 # avahi-common/defs.h
293
ENTRY_GROUP_COLLISION = 3 # avahi-common/defs.h
294
ENTRY_GROUP_FAILURE = 4 # avahi-common/defs.h
295
SERVER_INVALID = 0 # avahi-common/defs.h
296
SERVER_REGISTERING = 1 # avahi-common/defs.h
297
SERVER_RUNNING = 2 # avahi-common/defs.h
298
SERVER_COLLISION = 3 # avahi-common/defs.h
299
SERVER_FAILURE = 4 # avahi-common/defs.h
271
ENTRY_GROUP_ESTABLISHED = 2 # avahi-common/defs.h
272
ENTRY_GROUP_COLLISION = 3 # avahi-common/defs.h
273
ENTRY_GROUP_FAILURE = 4 # avahi-common/defs.h
274
SERVER_INVALID = 0 # avahi-common/defs.h
275
SERVER_REGISTERING = 1 # avahi-common/defs.h
276
SERVER_RUNNING = 2 # avahi-common/defs.h
277
SERVER_COLLISION = 3 # avahi-common/defs.h
278
SERVER_FAILURE = 4 # avahi-common/defs.h
303
281
class AvahiError(Exception):
304
282
def __init__(self, value, *args, **kwargs):
305
283
self.value = value
501
479
.format(self.name)))
505
482
# Pretend that we have a GnuTLS module
506
483
class GnuTLS(object):
507
484
"""This isn't so much a class as it is a module-like namespace.
508
485
It is instantiated once, and simulates having a GnuTLS module."""
510
library = ctypes.util.find_library("gnutls")
512
library = ctypes.util.find_library("gnutls-deb0")
513
_library = ctypes.cdll.LoadLibrary(library)
487
_library = ctypes.cdll.LoadLibrary(
488
ctypes.util.find_library("gnutls"))
515
489
_need_version = b"3.3.0"
517
490
def __init__(self):
518
# Need to use "self" here, since this method is called before
519
# the assignment to the "gnutls" global variable happens.
520
if self.check_version(self._need_version) is None:
521
raise self.Error("Needs GnuTLS {} or later"
522
.format(self._need_version))
491
# Need to use class name "GnuTLS" here, since this method is
492
# called before the assignment to the "gnutls" global variable
494
if GnuTLS.check_version(self._need_version) is None:
495
raise GnuTLS.Error("Needs GnuTLS {} or later"
496
.format(self._need_version))
524
498
# Unless otherwise indicated, the constants and types below are
525
499
# all from the gnutls/gnutls.h C header file.
529
503
E_INTERRUPTED = -52
534
508
CRD_CERTIFICATE = 1
535
509
E_NO_CERTIFICATE_FOUND = -49
536
510
OPENPGP_FMT_RAW = 0 # gnutls/openpgp.h
539
513
class session_int(ctypes.Structure):
541
515
session_t = ctypes.POINTER(session_int)
543
516
class certificate_credentials_st(ctypes.Structure):
545
518
certificate_credentials_t = ctypes.POINTER(
546
519
certificate_credentials_st)
547
520
certificate_type_t = ctypes.c_int
549
521
class datum_t(ctypes.Structure):
550
522
_fields_ = [('data', ctypes.POINTER(ctypes.c_ubyte)),
551
523
('size', ctypes.c_uint)]
553
524
class openpgp_crt_int(ctypes.Structure):
555
526
openpgp_crt_t = ctypes.POINTER(openpgp_crt_int)
556
openpgp_crt_fmt_t = ctypes.c_int # gnutls/openpgp.h
527
openpgp_crt_fmt_t = ctypes.c_int # gnutls/openpgp.h
557
528
log_func = ctypes.CFUNCTYPE(None, ctypes.c_int, ctypes.c_char_p)
558
529
credentials_type_t = ctypes.c_int
559
530
transport_ptr_t = ctypes.c_void_p
560
531
close_request_t = ctypes.c_int
563
534
class Error(Exception):
564
535
# We need to use the class name "GnuTLS" here, since this
565
536
# exception might be raised from within GnuTLS.__init__,
566
537
# which is called before the assignment to the "gnutls"
567
538
# global variable has happened.
568
def __init__(self, message=None, code=None, args=()):
539
def __init__(self, message = None, code = None, args=()):
569
540
# Default usage is by a message string, but if a return
570
541
# code is passed, convert it to a string with
571
542
# gnutls.strerror()
640
611
return _error_code(result)
641
612
result = func(*arguments)
644
615
# Unless otherwise indicated, the function declarations below are
645
616
# all from the gnutls/gnutls.h C header file.
648
619
priority_set_direct = _library.gnutls_priority_set_direct
649
620
priority_set_direct.argtypes = [session_t, ctypes.c_char_p,
650
621
ctypes.POINTER(ctypes.c_char_p)]
651
622
priority_set_direct.restype = _error_code
653
624
init = _library.gnutls_init
654
625
init.argtypes = [ctypes.POINTER(session_t), ctypes.c_int]
655
626
init.restype = _error_code
657
628
set_default_priority = _library.gnutls_set_default_priority
658
629
set_default_priority.argtypes = [session_t]
659
630
set_default_priority.restype = _error_code
661
632
record_send = _library.gnutls_record_send
662
633
record_send.argtypes = [session_t, ctypes.c_void_p,
664
635
record_send.restype = ctypes.c_ssize_t
665
636
record_send.errcheck = _retry_on_error
667
638
certificate_allocate_credentials = (
668
639
_library.gnutls_certificate_allocate_credentials)
669
640
certificate_allocate_credentials.argtypes = [
670
641
ctypes.POINTER(certificate_credentials_t)]
671
642
certificate_allocate_credentials.restype = _error_code
673
644
certificate_free_credentials = (
674
645
_library.gnutls_certificate_free_credentials)
675
certificate_free_credentials.argtypes = [
676
certificate_credentials_t]
646
certificate_free_credentials.argtypes = [certificate_credentials_t]
677
647
certificate_free_credentials.restype = None
679
649
handshake_set_private_extensions = (
680
650
_library.gnutls_handshake_set_private_extensions)
681
651
handshake_set_private_extensions.argtypes = [session_t,
683
653
handshake_set_private_extensions.restype = None
685
655
credentials_set = _library.gnutls_credentials_set
686
656
credentials_set.argtypes = [session_t, credentials_type_t,
688
658
credentials_set.restype = _error_code
690
660
strerror = _library.gnutls_strerror
691
661
strerror.argtypes = [ctypes.c_int]
692
662
strerror.restype = ctypes.c_char_p
694
664
certificate_type_get = _library.gnutls_certificate_type_get
695
665
certificate_type_get.argtypes = [session_t]
696
666
certificate_type_get.restype = _error_code
698
668
certificate_get_peers = _library.gnutls_certificate_get_peers
699
669
certificate_get_peers.argtypes = [session_t,
700
670
ctypes.POINTER(ctypes.c_uint)]
701
671
certificate_get_peers.restype = ctypes.POINTER(datum_t)
703
673
global_set_log_level = _library.gnutls_global_set_log_level
704
674
global_set_log_level.argtypes = [ctypes.c_int]
705
675
global_set_log_level.restype = None
707
677
global_set_log_function = _library.gnutls_global_set_log_function
708
678
global_set_log_function.argtypes = [log_func]
709
679
global_set_log_function.restype = None
711
681
deinit = _library.gnutls_deinit
712
682
deinit.argtypes = [session_t]
713
683
deinit.restype = None
715
685
handshake = _library.gnutls_handshake
716
686
handshake.argtypes = [session_t]
717
687
handshake.restype = _error_code
718
688
handshake.errcheck = _retry_on_error
720
690
transport_set_ptr = _library.gnutls_transport_set_ptr
721
691
transport_set_ptr.argtypes = [session_t, transport_ptr_t]
722
692
transport_set_ptr.restype = None
724
694
bye = _library.gnutls_bye
725
695
bye.argtypes = [session_t, close_request_t]
726
696
bye.restype = _error_code
727
697
bye.errcheck = _retry_on_error
729
699
check_version = _library.gnutls_check_version
730
700
check_version.argtypes = [ctypes.c_char_p]
731
701
check_version.restype = ctypes.c_char_p
733
703
# All the function declarations below are from gnutls/openpgp.h
735
705
openpgp_crt_init = _library.gnutls_openpgp_crt_init
736
706
openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
737
707
openpgp_crt_init.restype = _error_code
739
709
openpgp_crt_import = _library.gnutls_openpgp_crt_import
740
710
openpgp_crt_import.argtypes = [openpgp_crt_t,
741
711
ctypes.POINTER(datum_t),
742
712
openpgp_crt_fmt_t]
743
713
openpgp_crt_import.restype = _error_code
745
715
openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
746
716
openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
747
717
ctypes.POINTER(ctypes.c_uint)]
748
718
openpgp_crt_verify_self.restype = _error_code
750
720
openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
751
721
openpgp_crt_deinit.argtypes = [openpgp_crt_t]
752
722
openpgp_crt_deinit.restype = None
754
724
openpgp_crt_get_fingerprint = (
755
725
_library.gnutls_openpgp_crt_get_fingerprint)
756
726
openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
1078
1046
# The exception is when not debugging but nevertheless
1079
1047
# running in the foreground; use the previously
1080
1048
# created wnull.
1081
popen_args = {"close_fds": True,
1049
popen_args = { "close_fds": True,
1084
1052
if (not self.server_settings["debug"]
1085
1053
and self.server_settings["foreground"]):
1086
1054
popen_args.update({"stdout": wnull,
1088
pipe = multiprocessing.Pipe(duplex=False)
1056
pipe = multiprocessing.Pipe(duplex = False)
1089
1057
self.checker = multiprocessing.Process(
1091
args=(pipe[1], subprocess.call, command),
1059
args = (pipe[1], subprocess.call, command),
1060
kwargs = popen_args)
1093
1061
self.checker.start()
1094
1062
self.checker_callback_tag = GLib.io_add_watch(
1095
1063
pipe[0].fileno(), GLib.IO_IN,
1096
1064
self.checker_callback, pipe[0], command)
1097
1065
# Re-run this periodically if run by GLib.timeout_add
1100
1068
def stop_checker(self):
1101
1069
"""Force the checker process, if any, to stop."""
1102
1070
if self.checker_callback_tag:
1137
1105
func._dbus_name = func.__name__
1138
1106
if func._dbus_name.endswith("_dbus_property"):
1139
1107
func._dbus_name = func._dbus_name[:-14]
1140
func._dbus_get_args_options = {'byte_arrays': byte_arrays}
1108
func._dbus_get_args_options = {'byte_arrays': byte_arrays }
1143
1111
return decorator
1146
1114
def dbus_interface_annotations(dbus_interface):
1147
1115
"""Decorator for marking functions returning interface annotations
1151
1119
@dbus_interface_annotations("org.example.Interface")
1152
1120
def _foo(self): # Function name does not matter
1153
1121
return {"org.freedesktop.DBus.Deprecated": "true",
1154
1122
"org.freedesktop.DBus.Property.EmitsChangedSignal":
1158
1126
def decorator(func):
1159
1127
func._dbus_is_interface = True
1160
1128
func._dbus_interface = dbus_interface
1161
1129
func._dbus_name = dbus_interface
1164
1132
return decorator
1167
1135
def dbus_annotations(annotations):
1168
1136
"""Decorator to annotate D-Bus methods, signals or properties
1171
1139
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true",
1172
1140
"org.freedesktop.DBus.Property."
1173
1141
"EmitsChangedSignal": "false"})
1229
1197
for cls in self.__class__.__mro__
1230
1198
for name, athing in
1231
1199
inspect.getmembers(cls, self._is_dbus_thing(thing)))
1233
1201
@dbus.service.method(dbus.INTROSPECTABLE_IFACE,
1235
path_keyword='object_path',
1236
connection_keyword='connection')
1202
out_signature = "s",
1203
path_keyword = 'object_path',
1204
connection_keyword = 'connection')
1237
1205
def Introspect(self, object_path, connection):
1238
1206
"""Overloading of standard D-Bus method.
1240
1208
Inserts annotation tags on methods and signals.
1242
1210
xmlstring = dbus.service.Object.Introspect(self, object_path,
1245
1213
document = xml.dom.minidom.parseString(xmlstring)
1247
1215
for if_tag in document.getElementsByTagName("interface"):
1248
1216
# Add annotation tags
1249
1217
for typ in ("method", "signal"):
1460
1428
exc_info=error)
1461
1429
return xmlstring
1465
1432
dbus.OBJECT_MANAGER_IFACE
1466
1433
except AttributeError:
1467
1434
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
1470
1436
class DBusObjectWithObjectManager(DBusObjectWithAnnotations):
1471
1437
"""A D-Bus object with an ObjectManager.
1473
1439
Classes inheriting from this exposes the standard
1474
1440
GetManagedObjects call and the InterfacesAdded and
1475
1441
InterfacesRemoved signals on the standard
1476
1442
"org.freedesktop.DBus.ObjectManager" interface.
1478
1444
Note: No signals are sent automatically; they must be sent
1481
1447
@dbus.service.method(dbus.OBJECT_MANAGER_IFACE,
1482
out_signature="a{oa{sa{sv}}}")
1448
out_signature = "a{oa{sa{sv}}}")
1483
1449
def GetManagedObjects(self):
1484
1450
"""This function must be overridden"""
1485
1451
raise NotImplementedError()
1487
1453
@dbus.service.signal(dbus.OBJECT_MANAGER_IFACE,
1488
signature="oa{sa{sv}}")
1454
signature = "oa{sa{sv}}")
1489
1455
def InterfacesAdded(self, object_path, interfaces_and_properties):
1492
@dbus.service.signal(dbus.OBJECT_MANAGER_IFACE, signature="oas")
1458
@dbus.service.signal(dbus.OBJECT_MANAGER_IFACE, signature = "oas")
1493
1459
def InterfacesRemoved(self, object_path, interfaces):
1496
1462
@dbus.service.method(dbus.INTROSPECTABLE_IFACE,
1498
path_keyword='object_path',
1499
connection_keyword='connection')
1463
out_signature = "s",
1464
path_keyword = 'object_path',
1465
connection_keyword = 'connection')
1500
1466
def Introspect(self, object_path, connection):
1501
1467
"""Overloading of standard D-Bus method.
1503
1469
Override return argument name of GetManagedObjects to be
1504
1470
"objpath_interfaces_and_properties"
1544
1509
dbus.service.Object, it will add alternate D-Bus attributes with
1545
1510
interface names according to the "alt_interface_names" mapping.
1548
1513
@alternate_dbus_interfaces({"org.example.Interface":
1549
1514
"net.example.AlternateInterface"})
1550
1515
class SampleDBusObject(dbus.service.Object):
1551
1516
@dbus.service.method("org.example.Interface")
1552
1517
def SampleDBusMethod():
1555
1520
The above "SampleDBusMethod" on "SampleDBusObject" will be
1556
1521
reachable via two interfaces: "org.example.Interface" and
1557
1522
"net.example.AlternateInterface", the latter of which will have
1558
1523
its D-Bus annotation "org.freedesktop.DBus.Deprecated" set to
1559
1524
"true", unless "deprecate" is passed with a False value.
1561
1526
This works for methods and signals, and also for D-Bus properties
1562
1527
(from DBusObjectWithProperties) and interfaces (from the
1563
1528
dbus_interface_annotations decorator).
1566
1531
def wrapper(cls):
1567
1532
for orig_interface_name, alt_interface_name in (
1568
1533
alt_interface_names.items()):
1712
1675
"se.bsnet.fukt.Mandos"})
1713
1676
class ClientDBus(Client, DBusObjectWithProperties):
1714
1677
"""A Client class using D-Bus
1717
1680
dbus_object_path: dbus.ObjectPath
1718
1681
bus: dbus.SystemBus()
1721
1684
runtime_expansions = (Client.runtime_expansions
1722
1685
+ ("dbus_object_path", ))
1724
1687
_interface = "se.recompile.Mandos.Client"
1726
1689
# dbus.service.Object doesn't use super(), so we can't either.
1728
def __init__(self, bus=None, *args, **kwargs):
1691
def __init__(self, bus = None, *args, **kwargs):
1730
1693
Client.__init__(self, *args, **kwargs)
1731
1694
# Only now, when this client is initialized, can it show up on
1768
1731
dbus_value = transform_func(
1769
1732
type_func(value),
1770
variant_level=variant_level)
1733
variant_level = variant_level)
1771
1734
self.PropertyChanged(dbus.String(dbus_name),
1773
1736
self.PropertiesChanged(
1775
dbus.Dictionary({dbus.String(dbus_name):
1738
dbus.Dictionary({ dbus.String(dbus_name):
1778
1741
setattr(self, attrname, value)
1780
1743
return property(lambda self: getattr(self, attrname), setter)
1782
1745
expires = notifychangeproperty(datetime_to_dbus, "Expires")
1783
1746
approvals_pending = notifychangeproperty(dbus.Boolean,
1784
1747
"ApprovalPending",
1786
1749
enabled = notifychangeproperty(dbus.Boolean, "Enabled")
1787
1750
last_enabled = notifychangeproperty(datetime_to_dbus,
1789
1752
checker = notifychangeproperty(
1790
1753
dbus.Boolean, "CheckerRunning",
1791
type_func=lambda checker: checker is not None)
1754
type_func = lambda checker: checker is not None)
1792
1755
last_checked_ok = notifychangeproperty(datetime_to_dbus,
1793
1756
"LastCheckedOK")
1794
1757
last_checker_status = notifychangeproperty(dbus.Int16,
1799
1762
"ApprovedByDefault")
1800
1763
approval_delay = notifychangeproperty(
1801
1764
dbus.UInt64, "ApprovalDelay",
1802
type_func=lambda td: td.total_seconds() * 1000)
1765
type_func = lambda td: td.total_seconds() * 1000)
1803
1766
approval_duration = notifychangeproperty(
1804
1767
dbus.UInt64, "ApprovalDuration",
1805
type_func=lambda td: td.total_seconds() * 1000)
1768
type_func = lambda td: td.total_seconds() * 1000)
1806
1769
host = notifychangeproperty(dbus.String, "Host")
1807
1770
timeout = notifychangeproperty(
1808
1771
dbus.UInt64, "Timeout",
1809
type_func=lambda td: td.total_seconds() * 1000)
1772
type_func = lambda td: td.total_seconds() * 1000)
1810
1773
extended_timeout = notifychangeproperty(
1811
1774
dbus.UInt64, "ExtendedTimeout",
1812
type_func=lambda td: td.total_seconds() * 1000)
1775
type_func = lambda td: td.total_seconds() * 1000)
1813
1776
interval = notifychangeproperty(
1814
1777
dbus.UInt64, "Interval",
1815
type_func=lambda td: td.total_seconds() * 1000)
1778
type_func = lambda td: td.total_seconds() * 1000)
1816
1779
checker_command = notifychangeproperty(dbus.String, "Checker")
1817
1780
secret = notifychangeproperty(dbus.ByteArray, "Secret",
1818
1781
invalidate_only=True)
1820
1783
del notifychangeproperty
1822
1785
def __del__(self, *args, **kwargs):
1824
1787
self.remove_from_connection()
1859
1822
# Emit D-Bus signal
1860
1823
self.CheckerStarted(self.current_checker_command)
1863
1826
def _reset_approved(self):
1864
1827
self.approved = None
1867
1830
def approve(self, value=True):
1868
1831
self.approved = value
1869
1832
GLib.timeout_add(int(self.approval_duration.total_seconds()
1870
1833
* 1000), self._reset_approved)
1871
1834
self.send_changedstate()
1873
# D-Bus methods, signals & properties
1836
## D-Bus methods, signals & properties
1879
1842
# CheckerCompleted - signal
1880
1843
@dbus.service.signal(_interface, signature="nxs")
1881
1844
def CheckerCompleted(self, exitcode, waitstatus, command):
1885
1848
# CheckerStarted - signal
1886
1849
@dbus.service.signal(_interface, signature="s")
1887
1850
def CheckerStarted(self, command):
1891
1854
# PropertyChanged - signal
1892
1855
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true"})
1893
1856
@dbus.service.signal(_interface, signature="sv")
1894
1857
def PropertyChanged(self, property, value):
1898
1861
# GotSecret - signal
1899
1862
@dbus.service.signal(_interface)
1900
1863
def GotSecret(self):
1903
1866
server to mandos-client
1907
1870
# Rejected - signal
1908
1871
@dbus.service.signal(_interface, signature="s")
1909
1872
def Rejected(self, reason):
1913
1876
# NeedApproval - signal
1914
1877
@dbus.service.signal(_interface, signature="tb")
1915
1878
def NeedApproval(self, timeout, default):
1917
1880
return self.need_approval()
1921
1884
# Approve - method
1922
1885
@dbus.service.method(_interface, in_signature="b")
1923
1886
def Approve(self, value):
1924
1887
self.approve(value)
1926
1889
# CheckedOK - method
1927
1890
@dbus.service.method(_interface)
1928
1891
def CheckedOK(self):
1929
1892
self.checked_ok()
1931
1894
# Enable - method
1932
1895
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true"})
1933
1896
@dbus.service.method(_interface)
1934
1897
def Enable(self):
1938
1901
# StartChecker - method
1939
1902
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true"})
1940
1903
@dbus.service.method(_interface)
1941
1904
def StartChecker(self):
1943
1906
self.start_checker()
1945
1908
# Disable - method
1946
1909
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true"})
1947
1910
@dbus.service.method(_interface)
1948
1911
def Disable(self):
1952
1915
# StopChecker - method
1953
1916
@dbus_annotations({"org.freedesktop.DBus.Deprecated": "true"})
1954
1917
@dbus.service.method(_interface)
1955
1918
def StopChecker(self):
1956
1919
self.stop_checker()
1960
1923
# ApprovalPending - property
1961
1924
@dbus_service_property(_interface, signature="b", access="read")
1962
1925
def ApprovalPending_dbus_property(self):
1963
1926
return dbus.Boolean(bool(self.approvals_pending))
1965
1928
# ApprovedByDefault - property
1966
1929
@dbus_service_property(_interface,
2047
2010
self.checked_ok()
2049
2012
return datetime_to_dbus(self.last_checked_ok)
2051
2014
# LastCheckerStatus - property
2052
2015
@dbus_service_property(_interface, signature="n", access="read")
2053
2016
def LastCheckerStatus_dbus_property(self):
2054
2017
return dbus.Int16(self.last_checker_status)
2056
2019
# Expires - property
2057
2020
@dbus_service_property(_interface, signature="s", access="read")
2058
2021
def Expires_dbus_property(self):
2059
2022
return datetime_to_dbus(self.expires)
2061
2024
# LastApprovalRequest - property
2062
2025
@dbus_service_property(_interface, signature="s", access="read")
2063
2026
def LastApprovalRequest_dbus_property(self):
2064
2027
return datetime_to_dbus(self.last_approval_request)
2066
2029
# Timeout - property
2067
2030
@dbus_service_property(_interface,
2189
2152
class ClientHandler(socketserver.BaseRequestHandler, object):
2190
2153
"""A class to handle client connections.
2192
2155
Instantiated once for each connection to handle it.
2193
2156
Note: This will run in its own forked process."""
2195
2158
def handle(self):
2196
2159
with contextlib.closing(self.server.child_pipe) as child_pipe:
2197
2160
logger.info("TCP connection from: %s",
2198
2161
str(self.client_address))
2199
2162
logger.debug("Pipe FD: %d",
2200
2163
self.server.child_pipe.fileno())
2202
2165
session = gnutls.ClientSession(self.request)
2204
# priority = ':'.join(("NONE", "+VERS-TLS1.1",
2205
# "+AES-256-CBC", "+SHA1",
2206
# "+COMP-NULL", "+CTYPE-OPENPGP",
2167
#priority = ':'.join(("NONE", "+VERS-TLS1.1",
2168
# "+AES-256-CBC", "+SHA1",
2169
# "+COMP-NULL", "+CTYPE-OPENPGP",
2208
2171
# Use a fallback default, since this MUST be set.
2209
2172
priority = self.server.gnutls_priority
2210
2173
if priority is None:
2211
2174
priority = "NORMAL"
2212
gnutls.priority_set_direct(session._c_object,
2213
priority.encode("utf-8"),
2175
gnutls.priority_set_direct(session._c_object, priority,
2216
2178
# Start communication using the Mandos protocol
2217
2179
# Get protocol number
2218
2180
line = self.request.makefile().readline()
2383
2345
class MultiprocessingMixIn(object):
2384
2346
"""Like socketserver.ThreadingMixIn, but with multiprocessing"""
2386
2348
def sub_process_main(self, request, address):
2388
2350
self.finish_request(request, address)
2389
2351
except Exception:
2390
2352
self.handle_error(request, address)
2391
2353
self.close_request(request)
2393
2355
def process_request(self, request, address):
2394
2356
"""Start a new process to process the request."""
2395
proc = multiprocessing.Process(target=self.sub_process_main,
2396
args=(request, address))
2357
proc = multiprocessing.Process(target = self.sub_process_main,
2358
args = (request, address))
2401
2363
class MultiprocessingMixInWithPipe(MultiprocessingMixIn, object):
2402
2364
""" adds a pipe to the MixIn """
2404
2366
def process_request(self, request, client_address):
2405
2367
"""Overrides and wraps the original process_request().
2407
2369
This function creates a new pipe in self.pipe
2409
2371
parent_pipe, self.child_pipe = multiprocessing.Pipe()
2411
2373
proc = MultiprocessingMixIn.process_request(self, request,
2412
2374
client_address)
2413
2375
self.child_pipe.close()
2414
2376
self.add_pipe(parent_pipe, proc)
2416
2378
def add_pipe(self, parent_pipe, proc):
2417
2379
"""Dummy function; override as necessary"""
2418
2380
raise NotImplementedError()
2467
2428
# socket_wrapper(), if socketfd was set.
2468
2429
socketserver.TCPServer.__init__(self, server_address,
2469
2430
RequestHandlerClass)
2471
2432
def server_bind(self):
2472
2433
"""This overrides the normal server_bind() function
2473
2434
to bind to an interface if one was specified, and also NOT to
2474
2435
bind to an address or port if they were not specified."""
2475
global SO_BINDTODEVICE
2476
2436
if self.interface is not None:
2477
2437
if SO_BINDTODEVICE is None:
2478
# Fall back to a hard-coded value which seems to be
2480
logger.warning("SO_BINDTODEVICE not found, trying 25")
2481
SO_BINDTODEVICE = 25
2483
self.socket.setsockopt(
2484
socket.SOL_SOCKET, SO_BINDTODEVICE,
2485
(self.interface + "\0").encode("utf-8"))
2486
except socket.error as error:
2487
if error.errno == errno.EPERM:
2488
logger.error("No permission to bind to"
2489
" interface %s", self.interface)
2490
elif error.errno == errno.ENOPROTOOPT:
2491
logger.error("SO_BINDTODEVICE not available;"
2492
" cannot bind to interface %s",
2494
elif error.errno == errno.ENODEV:
2495
logger.error("Interface %s does not exist,"
2496
" cannot bind", self.interface)
2438
logger.error("SO_BINDTODEVICE does not exist;"
2439
" cannot bind to interface %s",
2443
self.socket.setsockopt(
2444
socket.SOL_SOCKET, SO_BINDTODEVICE,
2445
(self.interface + "\0").encode("utf-8"))
2446
except socket.error as error:
2447
if error.errno == errno.EPERM:
2448
logger.error("No permission to bind to"
2449
" interface %s", self.interface)
2450
elif error.errno == errno.ENOPROTOOPT:
2451
logger.error("SO_BINDTODEVICE not available;"
2452
" cannot bind to interface %s",
2454
elif error.errno == errno.ENODEV:
2455
logger.error("Interface %s does not exist,"
2456
" cannot bind", self.interface)
2499
2459
# Only bind(2) the socket if we really need to.
2500
2460
if self.server_address[0] or self.server_address[1]:
2501
2461
if not self.server_address[0]:
2502
2462
if self.address_family == socket.AF_INET6:
2503
any_address = "::" # in6addr_any
2463
any_address = "::" # in6addr_any
2505
any_address = "0.0.0.0" # INADDR_ANY
2465
any_address = "0.0.0.0" # INADDR_ANY
2506
2466
self.server_address = (any_address,
2507
2467
self.server_address[1])
2508
2468
elif not self.server_address[1]:
2542
2502
self.gnutls_priority = gnutls_priority
2543
2503
IPv6_TCPServer.__init__(self, server_address,
2544
2504
RequestHandlerClass,
2545
interface=interface,
2505
interface = interface,
2506
use_ipv6 = use_ipv6,
2507
socketfd = socketfd)
2549
2509
def server_activate(self):
2550
2510
if self.enabled:
2551
2511
return socketserver.TCPServer.server_activate(self)
2553
2513
def enable(self):
2554
2514
self.enabled = True
2556
2516
def add_pipe(self, parent_pipe, proc):
2557
2517
# Call "handle_ipc" for both data and EOF events
2558
2518
GLib.io_add_watch(
2559
2519
parent_pipe.fileno(),
2560
2520
GLib.IO_IN | GLib.IO_HUP,
2561
2521
functools.partial(self.handle_ipc,
2562
parent_pipe=parent_pipe,
2522
parent_pipe = parent_pipe,
2565
2525
def handle_ipc(self, source, condition,
2566
2526
parent_pipe=None,
2568
2528
client_object=None):
2569
2529
# error, or the other end of multiprocessing.Pipe has closed
2570
2530
if condition & (GLib.IO_ERR | GLib.IO_HUP):
2571
2531
# Wait for other process to exit
2575
2535
# Read a request from the child
2576
2536
request = parent_pipe.recv()
2577
2537
command = request[0]
2579
2539
if command == 'init':
2580
2540
fpr = request[1]
2581
2541
address = request[2]
2583
2543
for c in self.clients.values():
2584
2544
if c.fingerprint == fpr:
2649
2609
>>> rfc3339_duration_to_delta("P1DT3M20S")
2650
2610
datetime.timedelta(1, 200)
2653
2613
# Parsing an RFC 3339 duration with regular expressions is not
2654
2614
# possible - there would have to be multiple places for the same
2655
2615
# values, like seconds. The current code, while more esoteric, is
2656
2616
# cleaner without depending on a parsing library. If Python had a
2657
2617
# built-in library for parsing we would use it, but we'd like to
2658
2618
# avoid excessive use of external libraries.
2660
2620
# New type for defining tokens, syntax, and semantics all-in-one
2661
2621
Token = collections.namedtuple("Token", (
2662
2622
"regexp", # To match token; if "value" is not None, must have
2849
2806
parser.add_argument("--no-zeroconf", action="store_false",
2850
2807
dest="zeroconf", help="Do not use Zeroconf",
2853
2810
options = parser.parse_args()
2855
2812
if options.check:
2857
2814
fail_count, test_count = doctest.testmod()
2858
2815
sys.exit(os.EX_OK if fail_count == 0 else 1)
2860
2817
# Default values for config file for server-global settings
2861
server_defaults = {"interface": "",
2866
"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP:!RSA"
2867
":+SIGN-DSA-SHA256",
2868
"servicename": "Mandos",
2874
"statedir": "/var/lib/mandos",
2875
"foreground": "False",
2818
server_defaults = { "interface": "",
2823
"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP:!RSA"
2824
":+SIGN-DSA-SHA256",
2825
"servicename": "Mandos",
2831
"statedir": "/var/lib/mandos",
2832
"foreground": "False",
2879
2836
# Parse config file for server-global settings
2880
2837
server_config = configparser.SafeConfigParser(server_defaults)
2881
2838
del server_defaults
3011
2967
.format(uid, gid, os.strerror(error.errno)))
3012
2968
if error.errno != errno.EPERM:
3016
2972
# Enable all possible GnuTLS debugging
3018
2974
# "Use a log level over 10 to enable all debugging options."
3019
2975
# - GnuTLS manual
3020
2976
gnutls.global_set_log_level(11)
3022
2978
@gnutls.log_func
3023
2979
def debug_gnutls(level, string):
3024
2980
logger.debug("GnuTLS: %s", string[:-1])
3026
2982
gnutls.global_set_log_function(debug_gnutls)
3028
2984
# Redirect stdin so all checkers get /dev/null
3029
2985
null = os.open(os.devnull, os.O_NOCTTY | os.O_RDWR)
3030
2986
os.dup2(null, sys.stdin.fileno())
3034
2990
# Need to fork before connecting to D-Bus
3035
2991
if not foreground:
3036
2992
# Close all input and output, do double fork, etc.
3039
2995
# multiprocessing will use threads, so before we use GLib we need
3040
2996
# to inform GLib that threads will be used.
3041
2997
GLib.threads_init()
3043
2999
global main_loop
3044
3000
# From the Avahi example code
3045
3001
DBusGMainLoop(set_as_default=True)
3063
3019
protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
3064
3020
service = AvahiServiceToSyslog(
3065
name=server_settings["servicename"],
3066
servicetype="_mandos._tcp",
3021
name = server_settings["servicename"],
3022
servicetype = "_mandos._tcp",
3023
protocol = protocol,
3069
3025
if server_settings["interface"]:
3070
3026
service.interface = if_nametoindex(
3071
3027
server_settings["interface"].encode("utf-8"))
3073
3029
global multiprocessing_manager
3074
3030
multiprocessing_manager = multiprocessing.Manager()
3076
3032
client_class = Client
3078
client_class = functools.partial(ClientDBus, bus=bus)
3034
client_class = functools.partial(ClientDBus, bus = bus)
3080
3036
client_settings = Client.config_parser(client_config)
3081
3037
old_client_settings = {}
3082
3038
clients_data = {}
3084
3040
# This is used to redirect stdout and stderr for checker processes
3086
wnull = open(os.devnull, "w") # A writable /dev/null
3042
wnull = open(os.devnull, "w") # A writable /dev/null
3087
3043
# Only used if server is running in foreground but not in debug
3089
3045
if debug or not foreground:
3092
3048
# Get client data and settings from last running state.
3093
3049
if server_settings["restore"]:
3095
3051
with open(stored_state_path, "rb") as stored_state:
3096
if sys.version_info.major == 2:
3052
if sys.version_info.major == 2:
3097
3053
clients_data, old_client_settings = pickle.load(
3100
3056
bytes_clients_data, bytes_old_client_settings = (
3101
pickle.load(stored_state, encoding="bytes"))
3102
# Fix bytes to strings
3057
pickle.load(stored_state, encoding = "bytes"))
3058
### Fix bytes to strings
3105
clients_data = {(key.decode("utf-8")
3106
if isinstance(key, bytes)
3109
bytes_clients_data.items()}
3061
clients_data = { (key.decode("utf-8")
3062
if isinstance(key, bytes)
3065
bytes_clients_data.items() }
3110
3066
del bytes_clients_data
3111
3067
for key in clients_data:
3112
value = {(k.decode("utf-8")
3113
if isinstance(k, bytes) else k): v
3115
clients_data[key].items()}
3068
value = { (k.decode("utf-8")
3069
if isinstance(k, bytes) else k): v
3071
clients_data[key].items() }
3116
3072
clients_data[key] = value
3117
3073
# .client_structure
3118
3074
value["client_structure"] = [
3119
3075
(s.decode("utf-8")
3120
3076
if isinstance(s, bytes)
3121
3077
else s) for s in
3122
value["client_structure"]]
3078
value["client_structure"] ]
3123
3079
# .name & .host
3124
3080
for k in ("name", "host"):
3125
3081
if isinstance(value[k], bytes):
3126
3082
value[k] = value[k].decode("utf-8")
3127
# old_client_settings
3083
## old_client_settings
3129
3085
old_client_settings = {
3130
3086
(key.decode("utf-8")
3131
3087
if isinstance(key, bytes)
3132
3088
else key): value
3133
3089
for key, value in
3134
bytes_old_client_settings.items()}
3090
bytes_old_client_settings.items() }
3135
3091
del bytes_old_client_settings
3137
3093
for value in old_client_settings.values():
3243
3199
pidfilename, pid)
3245
3201
del pidfilename
3247
3203
for termsig in (signal.SIGHUP, signal.SIGTERM):
3248
3204
GLib.unix_signal_add(GLib.PRIORITY_HIGH, termsig,
3249
3205
lambda: main_loop.quit() and False)
3253
3209
@alternate_dbus_interfaces(
3254
{"se.recompile.Mandos": "se.bsnet.fukt.Mandos"})
3210
{ "se.recompile.Mandos": "se.bsnet.fukt.Mandos" })
3255
3211
class MandosDBusService(DBusObjectWithObjectManager):
3256
3212
"""A D-Bus proxy object"""
3258
3214
def __init__(self):
3259
3215
dbus.service.Object.__init__(self, bus, "/")
3261
3217
_interface = "se.recompile.Mandos"
3263
3219
@dbus.service.signal(_interface, signature="o")
3264
3220
def ClientAdded(self, objpath):
3268
3224
@dbus.service.signal(_interface, signature="ss")
3269
3225
def ClientNotFound(self, fingerprint, address):
3273
3229
@dbus_annotations({"org.freedesktop.DBus.Deprecated":
3275
3231
@dbus.service.signal(_interface, signature="os")
3276
3232
def ClientRemoved(self, objpath, name):
3280
3236
@dbus_annotations({"org.freedesktop.DBus.Deprecated":
3282
3238
@dbus.service.method(_interface, out_signature="ao")
3310
3266
self.client_removed_signal(c)
3312
3268
raise KeyError(object_path)
3316
3272
@dbus.service.method(dbus.OBJECT_MANAGER_IFACE,
3317
out_signature="a{oa{sa{sv}}}")
3273
out_signature = "a{oa{sa{sv}}}")
3318
3274
def GetManagedObjects(self):
3319
3275
"""D-Bus method"""
3320
3276
return dbus.Dictionary(
3321
{client.dbus_object_path:
3323
{interface: client.GetAll(interface)
3325
client._get_all_interface_names()})
3326
for client in tcp_server.clients.values()})
3277
{ client.dbus_object_path:
3279
{ interface: client.GetAll(interface)
3281
client._get_all_interface_names()})
3282
for client in tcp_server.clients.values()})
3328
3284
def client_added_signal(self, client):
3329
3285
"""Send the new standard signal and the old signal"""
3376
3327
client.encrypted_secret = pgp.encrypt(client.secret,
3378
3329
client_dict = {}
3380
3331
# A list of attributes that can not be pickled
3382
exclude = {"bus", "changedstate", "secret",
3383
"checker", "server_settings"}
3333
exclude = { "bus", "changedstate", "secret",
3334
"checker", "server_settings" }
3384
3335
for name, typ in inspect.getmembers(dbus.service
3386
3337
exclude.add(name)
3388
3339
client_dict["encrypted_secret"] = (client
3389
3340
.encrypted_secret)
3390
3341
for attr in client.client_structure:
3391
3342
if attr not in exclude:
3392
3343
client_dict[attr] = getattr(client, attr)
3394
3345
clients[client.name] = client_dict
3395
3346
del client_settings[client.name]["secret"]
3398
3349
with tempfile.NamedTemporaryFile(