/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to server.py

  • Committer: Björn Påhlsson
  • Date: 2007-10-20 21:38:25 UTC
  • Revision ID: belorn@tower-20071020213825-abf6f0d1c33ee961
First working version with: IPv6, GnuTLS, X.509 certificates, DN
retrieval.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
#!/usr/bin/python
2
 
 
3
 
import SocketServer
4
 
import socket
5
 
import select
6
 
from optparse import OptionParser
7
 
import datetime
8
 
import errno
9
 
import gnutls.crypto
10
 
import gnutls.connection
11
 
import gnutls.errors
12
 
import ConfigParser
13
 
import sys
14
 
 
15
 
class Client(object):
16
 
    def __init__(self, name=None, dn=None, password=None,
17
 
                 passfile=None, fqdn=None, timeout=None,
18
 
                 interval=-1):
19
 
        self.name = name
20
 
        self.dn = dn
21
 
        if password:
22
 
            self.password = password
23
 
        elif passfile:
24
 
            self.password = open(passfile).readall()
25
 
        else:
26
 
            print "No Password or Passfile in client config file"
27
 
            # raise RuntimeError XXX
28
 
            self.password = "gazonk"
29
 
        self.fqdn = fqdn
30
 
        self.created = datetime.datetime.now()
31
 
        self.last_seen = None
32
 
        if timeout is None:
33
 
            timeout = self.server.options.timeout
34
 
        self.timeout = timeout
35
 
        if interval == -1:
36
 
            interval = self.server.options.interval
37
 
        self.interval = interval
38
 
        self.next_check = datetime.datetime.now()
39
 
 
40
 
def server_bind(self):
41
 
    if self.options.interface:
42
 
        if not hasattr(socket, "SO_BINDTODEVICE"):
43
 
            # From /usr/include/asm-i486/socket.h
44
 
            socket.SO_BINDTODEVICE = 25
45
 
        try:
46
 
            self.socket.setsockopt(socket.SOL_SOCKET,
47
 
                                   socket.SO_BINDTODEVICE,
48
 
                                   self.options.interface)
49
 
        except socket.error, error:
50
 
            if error[0] == errno.EPERM:
51
 
                print "Warning: Denied permission to bind to interface", \
52
 
                      self.options.interface
53
 
            else:
54
 
                raise error
55
 
    return super(type(self), self).server_bind()
56
 
 
57
 
 
58
 
def init_with_options(self, *args, **kwargs):
59
 
    if "options" in kwargs:
60
 
        self.options = kwargs["options"]
61
 
        del kwargs["options"]
62
 
    if "clients" in kwargs:
63
 
        self.clients = kwargs["clients"]
64
 
        del kwargs["clients"]
65
 
    if "credentials" in kwargs:
66
 
        self.credentials = kwargs["credentials"]
67
 
        del kwargs["credentials"]
68
 
    return super(type(self), self).__init__(*args, **kwargs)
69
 
 
70
 
 
71
 
class udp_handler(SocketServer.DatagramRequestHandler, object):
72
 
    def handle(self):
73
 
        self.wfile.write("Polo")
74
 
        print "UDP request answered"
75
 
 
76
 
 
77
 
class IPv6_UDPServer(SocketServer.UDPServer, object):
78
 
    __init__ = init_with_options
79
 
    address_family = socket.AF_INET6
80
 
    allow_reuse_address = True
81
 
    server_bind = server_bind
82
 
    def verify_request(self, request, client_address):
83
 
        print "UDP request came"
84
 
        return request[0] == "Marco"
85
 
 
86
 
 
87
 
class tcp_handler(SocketServer.BaseRequestHandler, object):
88
 
    def handle(self):
89
 
        print "TCP request came"
90
 
        print "Request:", self.request
91
 
        print "Client Address:", self.client_address
92
 
        print "Server:", self.server
93
 
        session = gnutls.connection.ServerSession(self.request,
94
 
                                                  self.server.credentials)
95
 
        session.handshake()
96
 
        if session.peer_certificate:
97
 
            print "DN:", session.peer_certificate.subject
98
 
        try:
99
 
            session.verify_peer()
100
 
        except gnutls.errors.CertificateError, error:
101
 
            print "Verify failed", error
102
 
            session.bye()
103
 
            return
104
 
        try:
105
 
            session.send(dict((client.dn, client.password)
106
 
                              for client in self.server.clients)
107
 
                         [session.peer_certificate.subject])
108
 
        except KeyError:
109
 
            session.send("gazonk")
110
 
            # Log maybe? XXX
111
 
        session.bye()
112
 
 
113
 
class IPv6_TCPServer(SocketServer.ForkingTCPServer, object):
114
 
    __init__ = init_with_options
115
 
    address_family = socket.AF_INET6
116
 
    allow_reuse_address = True
117
 
    request_queue_size = 1024
118
 
    server_bind = server_bind
119
 
 
120
 
 
121
 
in6addr_any = "::"
122
 
 
123
 
cred = None
124
 
 
125
 
def string_to_delta(interval):
126
 
    """Parse a string and return a datetime.timedelta
127
 
 
128
 
    >>> string_to_delta('7d')
129
 
    datetime.timedelta(7)
130
 
    >>> string_to_delta('60s')
131
 
    datetime.timedelta(0, 60)
132
 
    >>> string_to_delta('60m')
133
 
    datetime.timedelta(0, 3600)
134
 
    >>> string_to_delta('24h')
135
 
    datetime.timedelta(1)
136
 
    >>> string_to_delta(u'1w')
137
 
    datetime.timedelta(7)
138
 
    """
139
 
    try:
140
 
        suffix=unicode(interval[-1])
141
 
        value=int(interval[:-1])
142
 
        if suffix == u"d":
143
 
            delta = datetime.timedelta(value)
144
 
        elif suffix == u"s":
145
 
            delta = datetime.timedelta(0, value)
146
 
        elif suffix == u"m":
147
 
            delta = datetime.timedelta(0, 0, 0, 0, value)
148
 
        elif suffix == u"h":
149
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, value)
150
 
        elif suffix == u"w":
151
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
152
 
        else:
153
 
            raise ValueError
154
 
    except (ValueError, IndexError):
155
 
        raise ValueError
156
 
    return delta
157
 
 
158
 
def main():
159
 
    parser = OptionParser()
160
 
    parser.add_option("-i", "--interface", type="string",
161
 
                      default="eth0", metavar="IF",
162
 
                      help="Interface to bind to")
163
 
    parser.add_option("--cert", type="string", default="cert.pem",
164
 
                      metavar="FILE",
165
 
                      help="Public key certificate to use")
166
 
    parser.add_option("--key", type="string", default="key.pem",
167
 
                      metavar="FILE",
168
 
                      help="Private key to use")
169
 
    parser.add_option("--ca", type="string", default="ca.pem",
170
 
                      metavar="FILE",
171
 
                      help="Certificate Authority certificate to use")
172
 
    parser.add_option("--crl", type="string", default="crl.pem",
173
 
                      metavar="FILE",
174
 
                      help="Certificate Revokation List to use")
175
 
    parser.add_option("-p", "--port", type="int", default=49001,
176
 
                      help="Port number to receive requests on")
177
 
    parser.add_option("--dh", type="int", metavar="BITS",
178
 
                      help="DH group to use")
179
 
    parser.add_option("-t", "--timeout", type="string", # Parsed later
180
 
                      default="15m",
181
 
                      help="Amount of downtime allowed for clients")
182
 
    parser.add_option("--interval", type="string", # Parsed later
183
 
                      default="5m",
184
 
                      help="How often to check that a client is up")
185
 
    parser.add_option("--check", action="store_true", default=False,
186
 
                      help="Run self-test")
187
 
    (options, args) = parser.parse_args()
188
 
 
189
 
    if options.check:
190
 
        import doctest
191
 
        doctest.testmod()
192
 
        sys.exit()
193
 
    
194
 
    # Parse the time arguments
195
 
    try:
196
 
        options.timeout = string_to_delta(options.timeout)
197
 
    except ValueError:
198
 
        parser.error("option --timeout: Unparseable time")
199
 
    
200
 
    try:
201
 
        options.interval = string_to_delta(options.interval)
202
 
    except ValueError:
203
 
        parser.error("option --interval: Unparseable time")
204
 
    
205
 
    cert = gnutls.crypto.X509Certificate(open(options.cert).read())
206
 
    key = gnutls.crypto.X509PrivateKey(open(options.key).read())
207
 
    ca = gnutls.crypto.X509Certificate(open(options.ca).read())
208
 
    crl = gnutls.crypto.X509CRL(open(options.crl).read())
209
 
    cred = gnutls.connection.X509Credentials(cert, key, [ca], [crl])
210
 
    
211
 
    # Parse config file
212
 
    defaults = {}
213
 
    client_config_object = ConfigParser.SafeConfigParser(defaults)
214
 
    client_config_object.read("mandos-clients.conf")
215
 
    clients = [Client(name=section,
216
 
                      **(dict(client_config_object.items(section))))
217
 
               for section in client_config_object.sections()]
218
 
    
219
 
    udp_server = IPv6_UDPServer((in6addr_any, options.port),
220
 
                                udp_handler,
221
 
                                options=options)
222
 
    
223
 
    tcp_server = IPv6_TCPServer((in6addr_any, options.port),
224
 
                                tcp_handler,
225
 
                                options=options,
226
 
                                clients=clients,
227
 
                                credentials=cred)
228
 
    
229
 
    while True:
230
 
        in_, out, err = select.select((udp_server,
231
 
                                       tcp_server), (), ())
232
 
        for server in in_:
233
 
            server.handle_request()
234
 
 
235
 
 
236
 
if __name__ == "__main__":
237
 
    main()
238