11
11
# and some lines in "main".
 
13
13
# Everything else is
 
14
 
# Copyright © 2007-2008 Teddy Hogeborn & Björn Påhlsson
 
 
14
# Copyright © 2008 Teddy Hogeborn & Björn Påhlsson
 
16
16
# This program is free software: you can redistribute it and/or modify
 
17
17
# it under the terms of the GNU General Public License as published by
 
 
107
109
                  a sensible number of times
 
109
111
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
 
110
 
                 type = None, port = None, TXT = None, domain = "",
 
 
112
                 servicetype = None, port = None, TXT = None, domain = "",
 
111
113
                 host = "", max_renames = 32768):
 
112
114
        self.interface = interface
 
 
116
        self.type = servicetype
 
 
126
128
        if self.rename_count >= self.max_renames:
 
127
129
            logger.critical(u"No suitable Zeroconf service name found"
 
128
130
                            u" after %i retries, exiting.",
 
130
132
            raise AvahiServiceError("Too many renames")
 
131
133
        self.name = server.GetAlternativeServiceName(self.name)
 
132
134
        logger.info(u"Changing Zeroconf service name to %r ...",
 
 
221
223
    interval = property(lambda self: self._interval,
 
223
225
    del _set_interval
 
224
 
    def __init__(self, name = None, stop_hook=None, config={}):
 
 
226
    def __init__(self, name = None, stop_hook=None, config=None):
 
225
227
        """Note: the 'checker' key in 'config' sets the
 
226
228
        'checker_command' attribute and *not* the 'checker'
 
229
233
        logger.debug(u"Creating client %r", self.name)
 
230
234
        # Uppercase and remove spaces from fingerprint for later
 
 
236
240
        if "secret" in config:
 
237
241
            self.secret = config["secret"].decode(u"base64")
 
238
242
        elif "secfile" in config:
 
239
 
            sf = open(config["secfile"])
 
240
 
            self.secret = sf.read()
 
 
243
            secfile = open(config["secfile"])
 
 
244
            self.secret = secfile.read()
 
243
247
            raise TypeError(u"No secret or secfile for client %s"
 
 
414
418
                    (crt, ctypes.byref(datum),
 
415
419
                     gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
 
416
420
    # Verify the self signature in the key
 
417
 
    crtverify = ctypes.c_uint();
 
 
421
    crtverify = ctypes.c_uint()
 
418
422
    gnutls.library.functions.gnutls_openpgp_crt_verify_self\
 
419
423
        (crt, 0, ctypes.byref(crtverify))
 
420
424
    if crtverify.value != 0:
 
421
425
        gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
422
426
        raise gnutls.errors.CertificateSecurityError("Verify failed")
 
423
427
    # New buffer for the fingerprint
 
424
 
    buffer = ctypes.create_string_buffer(20)
 
425
 
    buffer_length = ctypes.c_size_t()
 
 
428
    buf = ctypes.create_string_buffer(20)
 
 
429
    buf_len = ctypes.c_size_t()
 
426
430
    # Get the fingerprint from the certificate into the buffer
 
427
431
    gnutls.library.functions.gnutls_openpgp_crt_get_fingerprint\
 
428
 
        (crt, ctypes.byref(buffer), ctypes.byref(buffer_length))
 
 
432
        (crt, ctypes.byref(buf), ctypes.byref(buf_len))
 
429
433
    # Deinit the certificate
 
430
434
    gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
431
435
    # Convert the buffer to a Python bytestring
 
432
 
    fpr = ctypes.string_at(buffer, buffer_length.value)
 
 
436
    fpr = ctypes.string_at(buf, buf_len.value)
 
433
437
    # Convert the bytestring to hexadecimal notation
 
434
438
    hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
 
438
 
class tcp_handler(SocketServer.BaseRequestHandler, object):
 
 
442
class TCP_handler(SocketServer.BaseRequestHandler, object):
 
439
443
    """A TCP request handler class.
 
440
444
    Instantiated by IPv6_TCPServer for each request to handle it.
 
441
445
    Note: This will run in its own forked process."""
 
 
468
472
        if self.server.settings["priority"]:
 
469
473
            priority = self.server.settings["priority"]
 
470
474
        gnutls.library.functions.gnutls_priority_set_direct\
 
471
 
            (session._c_object, priority, None);
 
 
475
            (session._c_object, priority, None)
 
474
478
            session.handshake()
 
 
518
522
        settings:       Server settings
 
519
523
        clients:        Set() of Client objects
 
 
524
        enabled:        Boolean; whether this server is activated yet
 
521
526
    address_family = socket.AF_INET6
 
522
527
    def __init__(self, *args, **kwargs):
 
 
526
531
        if "clients" in kwargs:
 
527
532
            self.clients = kwargs["clients"]
 
528
533
            del kwargs["clients"]
 
529
 
        return super(type(self), self).__init__(*args, **kwargs)
 
 
535
        super(IPv6_TCPServer, self).__init__(*args, **kwargs)
 
530
536
    def server_bind(self):
 
531
537
        """This overrides the normal server_bind() function
 
532
538
        to bind to an interface if one was specified, and also NOT to
 
 
563
569
#                                             ["interface"]))
 
564
 
            return super(type(self), self).server_bind()
 
 
570
            return super(IPv6_TCPServer, self).server_bind()
 
 
571
    def server_activate(self):
 
 
573
            return super(IPv6_TCPServer, self).server_activate()
 
567
578
def string_to_delta(interval):
 
 
630
641
    """Call the C function if_nametoindex(), or equivalent"""
 
631
642
    global if_nametoindex
 
633
 
        if "ctypes.util" not in sys.modules:
 
635
644
        if_nametoindex = ctypes.cdll.LoadLibrary\
 
636
645
            (ctypes.util.find_library("c")).if_nametoindex
 
637
646
    except (OSError, AttributeError):
 
 
678
 
    global main_loop_started
 
679
 
    main_loop_started = False
 
681
687
    parser = OptionParser(version = "%%prog %s" % version)
 
682
688
    parser.add_option("-i", "--interface", type="string",
 
683
689
                      metavar="IF", help="Bind to interface IF")
 
 
698
704
                      default="/etc/mandos", metavar="DIR",
 
699
705
                      help="Directory to search for configuration"
 
701
 
    (options, args) = parser.parse_args()
 
 
707
    options = parser.parse_args()[0]
 
703
709
    if options.check:
 
 
758
764
    client_config.read(os.path.join(server_settings["configdir"],
 
 
768
    tcp_server = IPv6_TCPServer((server_settings["address"],
 
 
769
                                 server_settings["port"]),
 
 
771
                                settings=server_settings,
 
 
773
    pidfilename = "/var/run/mandos.pid"
 
 
775
        pidfile = open(pidfilename, "w")
 
 
776
    except IOError, error:
 
 
777
        logger.error("Could not open file %r", pidfilename)
 
 
782
        uid = pwd.getpwnam("mandos").pw_uid
 
 
785
            uid = pwd.getpwnam("nobody").pw_uid
 
 
789
        gid = pwd.getpwnam("mandos").pw_gid
 
 
792
            gid = pwd.getpwnam("nogroup").pw_gid
 
 
798
    except OSError, error:
 
 
799
        if error[0] != errno.EPERM:
 
762
803
    service = AvahiService(name = server_settings["servicename"],
 
763
 
                           type = "_mandos._tcp", );
 
 
804
                           servicetype = "_mandos._tcp", )
 
764
805
    if server_settings["interface"]:
 
765
806
        service.interface = if_nametoindex\
 
766
807
                            (server_settings["interface"])
 
 
805
845
        # Close all input and output, do double fork, etc.
 
808
 
    pidfilename = "/var/run/mandos/mandos.pid"
 
811
 
        pidfile = open(pidfilename, "w")
 
812
850
        pidfile.write(str(pid) + "\n")
 
816
 
        logger.error(u"Could not write %s file with PID %d",
 
817
 
                     pidfilename, os.getpid())
 
 
854
        logger.error(u"Could not write to file %r with PID %d",
 
 
857
        # "pidfile" was never created
 
820
862
        "Cleanup function; run on exit"
 
 
840
882
    for client in clients:
 
843
 
    tcp_server = IPv6_TCPServer((server_settings["address"],
 
844
 
                                 server_settings["port"]),
 
846
 
                                settings=server_settings,
 
 
886
    tcp_server.server_activate()
 
848
888
    # Find out what port we got
 
849
889
    service.port = tcp_server.socket.getsockname()[1]
 
850
890
    logger.info(u"Now listening on address %r, port %d, flowinfo %d,"
 
 
868
908
                             (*args[2:], **kwargs) or True)
 
870
910
        logger.debug(u"Starting main loop")
 
871
 
        main_loop_started = True
 
873
912
    except AvahiError, error:
 
874
913
        logger.critical(u"AvahiError: %s" + unicode(error))