/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to mandos

  • Committer: Teddy Hogeborn
  • Date: 2021-02-03 08:33:43 UTC
  • Revision ID: teddy@recompile.se-20210203083343-spdbhxgd5v8e3lv9
Update copyright year

* debian/copyright: Update copyright year to 2021.
* dracut-module/password-agent.c: - '' -
* dracut-module/password-agent.xml: Update copyright year to 2020.
* intro.xml: - '' -
* plugin-helpers/mandos-client-iprouteadddel.c: Update copyright year
  to 2021.
* plugin-runner.c: - '' -
* plugins.d/askpass-fifo.c: - '' -
* plugins.d/mandos-client.c: - '' -
* plugins.d/password-prompt.c: - '' -
* plugins.d/plymouth.c: - '' -
* plugins.d/splashy.c: - '' -
* plugins.d/usplash.c: - '' -

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
#!/usr/bin/python
 
1
#!/usr/bin/python3 -bI
2
2
# -*- mode: python; after-save-hook: (lambda () (let ((command (if (fboundp 'file-local-name) (file-local-name (buffer-file-name)) (or (file-remote-p (buffer-file-name) 'localname) (buffer-file-name))))) (if (= (progn (if (get-buffer "*Test*") (kill-buffer "*Test*")) (process-file-shell-command (format "%s --check" (shell-quote-argument command)) nil "*Test*")) 0) (let ((w (get-buffer-window "*Test*"))) (if w (delete-window w))) (progn (with-current-buffer "*Test*" (compilation-mode)) (display-buffer "*Test*" '(display-buffer-in-side-window)))))); coding: utf-8 -*-
3
3
#
4
4
# Mandos server - give out binary blobs to connecting clients.
11
11
# "AvahiService" class, and some lines in "main".
12
12
#
13
13
# Everything else is
14
 
# Copyright © 2008-2019 Teddy Hogeborn
15
 
# Copyright © 2008-2019 Björn Påhlsson
 
14
# Copyright © 2008-2020 Teddy Hogeborn
 
15
# Copyright © 2008-2020 Björn Påhlsson
16
16
#
17
17
# This file is part of Mandos.
18
18
#
78
78
import collections
79
79
import codecs
80
80
import unittest
 
81
import random
 
82
import shlex
81
83
 
82
84
import dbus
83
85
import dbus.service
91
93
 
92
94
if sys.version_info.major == 2:
93
95
    __metaclass__ = type
 
96
    str = unicode
 
97
 
 
98
# Add collections.abc.Callable if it does not exist
 
99
try:
 
100
    collections.abc.Callable
 
101
except AttributeError:
 
102
    class abc:
 
103
        Callable = collections.Callable
 
104
    collections.abc = abc
 
105
    del abc
 
106
 
 
107
# Add shlex.quote if it does not exist
 
108
try:
 
109
    shlex.quote
 
110
except AttributeError:
 
111
    shlex.quote = re.escape
94
112
 
95
113
# Show warnings by default
96
114
if not sys.warnoptions:
122
140
            # No value found
123
141
            SO_BINDTODEVICE = None
124
142
 
125
 
if sys.version_info.major == 2:
126
 
    str = unicode
127
 
 
128
143
if sys.version_info < (3, 2):
129
144
    configparser.Configparser = configparser.SafeConfigParser
130
145
 
131
 
version = "1.8.8"
 
146
version = "1.8.13"
132
147
stored_state_file = "clients.pickle"
133
148
 
134
149
logger = logging.getLogger()
203
218
            output = subprocess.check_output(["gpgconf"])
204
219
            for line in output.splitlines():
205
220
                name, text, path = line.split(b":")
206
 
                if name == "gpg":
 
221
                if name == b"gpg":
207
222
                    self.gpg = path
208
223
                    break
209
224
        except OSError as e:
214
229
                          '--force-mdc',
215
230
                          '--quiet']
216
231
        # Only GPG version 1 has the --no-use-agent option.
217
 
        if self.gpg == "gpg" or self.gpg.endswith("/gpg"):
 
232
        if self.gpg == b"gpg" or self.gpg.endswith(b"/gpg"):
218
233
            self.gnupgargs.append("--no-use-agent")
219
234
 
220
235
    def __enter__(self):
509
524
class AvahiServiceToSyslog(AvahiService):
510
525
    def rename(self, *args, **kwargs):
511
526
        """Add the new name to the syslog messages"""
512
 
        ret = super(AvahiServiceToSyslog, self).rename(*args, **kwargs)
 
527
        ret = super(AvahiServiceToSyslog, self).rename(*args,
 
528
                                                       **kwargs)
513
529
        syslogger.setFormatter(logging.Formatter(
514
530
            'Mandos ({}) [%(process)d]: %(levelname)s: %(message)s'
515
531
            .format(self.name)))
759
775
 
760
776
        x509_crt_fmt_t = ctypes.c_int
761
777
 
762
 
        # All the function declarations below are from gnutls/abstract.h
 
778
        # All the function declarations below are from
 
779
        # gnutls/abstract.h
763
780
        pubkey_init = _library.gnutls_pubkey_init
764
781
        pubkey_init.argtypes = [ctypes.POINTER(pubkey_t)]
765
782
        pubkey_init.restype = _error_code
779
796
        pubkey_deinit.argtypes = [pubkey_t]
780
797
        pubkey_deinit.restype = None
781
798
    else:
782
 
        # All the function declarations below are from gnutls/openpgp.h
 
799
        # All the function declarations below are from
 
800
        # gnutls/openpgp.h
783
801
 
784
802
        openpgp_crt_init = _library.gnutls_openpgp_crt_init
785
803
        openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
791
809
                                       openpgp_crt_fmt_t]
792
810
        openpgp_crt_import.restype = _error_code
793
811
 
794
 
        openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
795
 
        openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
796
 
                                            ctypes.POINTER(ctypes.c_uint)]
 
812
        openpgp_crt_verify_self = \
 
813
            _library.gnutls_openpgp_crt_verify_self
 
814
        openpgp_crt_verify_self.argtypes = [
 
815
            openpgp_crt_t,
 
816
            ctypes.c_uint,
 
817
            ctypes.POINTER(ctypes.c_uint),
 
818
        ]
797
819
        openpgp_crt_verify_self.restype = _error_code
798
820
 
799
821
        openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
1037
1059
        if self.checker_initiator_tag is not None:
1038
1060
            GLib.source_remove(self.checker_initiator_tag)
1039
1061
        self.checker_initiator_tag = GLib.timeout_add(
1040
 
            int(self.interval.total_seconds() * 1000),
 
1062
            random.randrange(int(self.interval.total_seconds() * 1000
 
1063
                                 + 1)),
1041
1064
            self.start_checker)
1042
1065
        # Schedule a disable() when 'timeout' has passed
1043
1066
        if self.disable_initiator_tag is not None:
1053
1076
        # Read return code from connection (see call_pipe)
1054
1077
        returncode = connection.recv()
1055
1078
        connection.close()
1056
 
        self.checker.join()
 
1079
        if self.checker is not None:
 
1080
            self.checker.join()
1057
1081
        self.checker_callback_tag = None
1058
1082
        self.checker = None
1059
1083
 
1117
1141
        if self.checker is None:
1118
1142
            # Escape attributes for the shell
1119
1143
            escaped_attrs = {
1120
 
                attr: re.escape(str(getattr(self, attr)))
 
1144
                attr: shlex.quote(str(getattr(self, attr)))
1121
1145
                for attr in self.runtime_expansions}
1122
1146
            try:
1123
1147
                command = self.checker_command % escaped_attrs
1412
1436
                raise ValueError("Byte arrays not supported for non-"
1413
1437
                                 "'ay' signature {!r}"
1414
1438
                                 .format(prop._dbus_signature))
1415
 
            value = dbus.ByteArray(b''.join(chr(byte)
1416
 
                                            for byte in value))
 
1439
            value = dbus.ByteArray(bytes(value))
1417
1440
        prop(value)
1418
1441
 
1419
1442
    @dbus.service.method(dbus.PROPERTIES_IFACE,
2452
2475
        buf = ctypes.create_string_buffer(32)
2453
2476
        buf_len = ctypes.c_size_t(len(buf))
2454
2477
        # Get the key ID from the raw public key into the buffer
2455
 
        gnutls.pubkey_get_key_id(pubkey,
2456
 
                                 gnutls.KEYID_USE_SHA256,
2457
 
                                 ctypes.cast(ctypes.byref(buf),
2458
 
                                             ctypes.POINTER(ctypes.c_ubyte)),
2459
 
                                 ctypes.byref(buf_len))
 
2478
        gnutls.pubkey_get_key_id(
 
2479
            pubkey,
 
2480
            gnutls.KEYID_USE_SHA256,
 
2481
            ctypes.cast(ctypes.byref(buf),
 
2482
                        ctypes.POINTER(ctypes.c_ubyte)),
 
2483
            ctypes.byref(buf_len))
2460
2484
        # Deinit the certificate
2461
2485
        gnutls.pubkey_deinit(pubkey)
2462
2486
 
2707
2731
            address = request[3]
2708
2732
 
2709
2733
            for c in self.clients.values():
2710
 
                if key_id == "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855":
 
2734
                if key_id == ("E3B0C44298FC1C149AFBF4C8996FB924"
 
2735
                              "27AE41E4649B934CA495991B7852B855"):
2711
2736
                    continue
2712
2737
                if key_id and c.key_id == key_id:
2713
2738
                    client = c
2748
2773
        if command == 'getattr':
2749
2774
            attrname = request[1]
2750
2775
            if isinstance(client_object.__getattribute__(attrname),
2751
 
                          collections.Callable):
 
2776
                          collections.abc.Callable):
2752
2777
                parent_pipe.send(('function', ))
2753
2778
            else:
2754
2779
                parent_pipe.send((
2765
2790
def rfc3339_duration_to_delta(duration):
2766
2791
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
2767
2792
 
2768
 
    >>> rfc3339_duration_to_delta("P7D")
2769
 
    datetime.timedelta(7)
2770
 
    >>> rfc3339_duration_to_delta("PT60S")
2771
 
    datetime.timedelta(0, 60)
2772
 
    >>> rfc3339_duration_to_delta("PT60M")
2773
 
    datetime.timedelta(0, 3600)
2774
 
    >>> rfc3339_duration_to_delta("PT24H")
2775
 
    datetime.timedelta(1)
2776
 
    >>> rfc3339_duration_to_delta("P1W")
2777
 
    datetime.timedelta(7)
2778
 
    >>> rfc3339_duration_to_delta("PT5M30S")
2779
 
    datetime.timedelta(0, 330)
2780
 
    >>> rfc3339_duration_to_delta("P1DT3M20S")
2781
 
    datetime.timedelta(1, 200)
 
2793
    >>> timedelta = datetime.timedelta
 
2794
    >>> rfc3339_duration_to_delta("P7D") == timedelta(7)
 
2795
    True
 
2796
    >>> rfc3339_duration_to_delta("PT60S") == timedelta(0, 60)
 
2797
    True
 
2798
    >>> rfc3339_duration_to_delta("PT60M") == timedelta(0, 3600)
 
2799
    True
 
2800
    >>> rfc3339_duration_to_delta("PT24H") == timedelta(1)
 
2801
    True
 
2802
    >>> rfc3339_duration_to_delta("P1W") == timedelta(7)
 
2803
    True
 
2804
    >>> rfc3339_duration_to_delta("PT5M30S") == timedelta(0, 330)
 
2805
    True
 
2806
    >>> rfc3339_duration_to_delta("P1DT3M20S") == timedelta(1, 200)
 
2807
    True
 
2808
    >>> del timedelta
2782
2809
    """
2783
2810
 
2784
2811
    # Parsing an RFC 3339 duration with regular expressions is not
2864
2891
def string_to_delta(interval):
2865
2892
    """Parse a string and return a datetime.timedelta
2866
2893
 
2867
 
    >>> string_to_delta('7d')
2868
 
    datetime.timedelta(7)
2869
 
    >>> string_to_delta('60s')
2870
 
    datetime.timedelta(0, 60)
2871
 
    >>> string_to_delta('60m')
2872
 
    datetime.timedelta(0, 3600)
2873
 
    >>> string_to_delta('24h')
2874
 
    datetime.timedelta(1)
2875
 
    >>> string_to_delta('1w')
2876
 
    datetime.timedelta(7)
2877
 
    >>> string_to_delta('5m 30s')
2878
 
    datetime.timedelta(0, 330)
 
2894
    >>> string_to_delta('7d') == datetime.timedelta(7)
 
2895
    True
 
2896
    >>> string_to_delta('60s') == datetime.timedelta(0, 60)
 
2897
    True
 
2898
    >>> string_to_delta('60m') == datetime.timedelta(0, 3600)
 
2899
    True
 
2900
    >>> string_to_delta('24h') == datetime.timedelta(1)
 
2901
    True
 
2902
    >>> string_to_delta('1w') == datetime.timedelta(7)
 
2903
    True
 
2904
    >>> string_to_delta('5m 30s') == datetime.timedelta(0, 330)
 
2905
    True
2879
2906
    """
2880
2907
 
2881
2908
    try:
3251
3278
                             if isinstance(s, bytes)
3252
3279
                             else s) for s in
3253
3280
                            value["client_structure"]]
3254
 
                        # .name & .host
3255
 
                        for k in ("name", "host"):
 
3281
                        # .name, .host, and .checker_command
 
3282
                        for k in ("name", "host", "checker_command"):
3256
3283
                            if isinstance(value[k], bytes):
3257
3284
                                value[k] = value[k].decode("utf-8")
3258
3285
                        if "key_id" not in value:
3268
3295
                        for key, value in
3269
3296
                        bytes_old_client_settings.items()}
3270
3297
                    del bytes_old_client_settings
3271
 
                    # .host
 
3298
                    # .host and .checker_command
3272
3299
                    for value in old_client_settings.values():
3273
 
                        if isinstance(value["host"], bytes):
3274
 
                            value["host"] = (value["host"]
3275
 
                                             .decode("utf-8"))
 
3300
                        for attribute in ("host", "checker_command"):
 
3301
                            if isinstance(value[attribute], bytes):
 
3302
                                value[attribute] = (value[attribute]
 
3303
                                                    .decode("utf-8"))
3276
3304
            os.remove(stored_state_path)
3277
3305
        except IOError as e:
3278
3306
            if e.errno == errno.ENOENT: