11
11
# and some lines in "main".
 
13
13
# Everything else is
 
14
 
# Copyright © 2007-2008 Teddy Hogeborn & Björn Påhlsson
 
 
14
# Copyright © 2008 Teddy Hogeborn & Björn Påhlsson
 
16
16
# This program is free software: you can redistribute it and/or modify
 
17
17
# it under the terms of the GNU General Public License as published by
 
 
108
109
                  a sensible number of times
 
110
111
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
 
111
 
                 type = None, port = None, TXT = None, domain = "",
 
 
112
                 servicetype = None, port = None, TXT = None, domain = "",
 
112
113
                 host = "", max_renames = 32768):
 
113
114
        self.interface = interface
 
 
116
        self.type = servicetype
 
 
127
128
        if self.rename_count >= self.max_renames:
 
128
129
            logger.critical(u"No suitable Zeroconf service name found"
 
129
130
                            u" after %i retries, exiting.",
 
131
132
            raise AvahiServiceError("Too many renames")
 
132
133
        self.name = server.GetAlternativeServiceName(self.name)
 
133
134
        logger.info(u"Changing Zeroconf service name to %r ...",
 
 
222
223
    interval = property(lambda self: self._interval,
 
224
225
    del _set_interval
 
225
 
    def __init__(self, name = None, stop_hook=None, config={}):
 
 
226
    def __init__(self, name = None, stop_hook=None, config=None):
 
226
227
        """Note: the 'checker' key in 'config' sets the
 
227
228
        'checker_command' attribute and *not* the 'checker'
 
230
233
        logger.debug(u"Creating client %r", self.name)
 
231
234
        # Uppercase and remove spaces from fingerprint for later
 
 
237
240
        if "secret" in config:
 
238
241
            self.secret = config["secret"].decode(u"base64")
 
239
242
        elif "secfile" in config:
 
240
 
            sf = open(config["secfile"])
 
241
 
            self.secret = sf.read()
 
 
243
            secfile = open(os.path.expanduser(os.path.expandvars
 
 
244
                                              (config["secfile"])))
 
 
245
            self.secret = secfile.read()
 
244
248
            raise TypeError(u"No secret or secfile for client %s"
 
 
415
419
                    (crt, ctypes.byref(datum),
 
416
420
                     gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
 
417
421
    # Verify the self signature in the key
 
418
 
    crtverify = ctypes.c_uint();
 
 
422
    crtverify = ctypes.c_uint()
 
419
423
    gnutls.library.functions.gnutls_openpgp_crt_verify_self\
 
420
424
        (crt, 0, ctypes.byref(crtverify))
 
421
425
    if crtverify.value != 0:
 
422
426
        gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
423
427
        raise gnutls.errors.CertificateSecurityError("Verify failed")
 
424
428
    # New buffer for the fingerprint
 
425
 
    buffer = ctypes.create_string_buffer(20)
 
426
 
    buffer_length = ctypes.c_size_t()
 
 
429
    buf = ctypes.create_string_buffer(20)
 
 
430
    buf_len = ctypes.c_size_t()
 
427
431
    # Get the fingerprint from the certificate into the buffer
 
428
432
    gnutls.library.functions.gnutls_openpgp_crt_get_fingerprint\
 
429
 
        (crt, ctypes.byref(buffer), ctypes.byref(buffer_length))
 
 
433
        (crt, ctypes.byref(buf), ctypes.byref(buf_len))
 
430
434
    # Deinit the certificate
 
431
435
    gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
432
436
    # Convert the buffer to a Python bytestring
 
433
 
    fpr = ctypes.string_at(buffer, buffer_length.value)
 
 
437
    fpr = ctypes.string_at(buf, buf_len.value)
 
434
438
    # Convert the bytestring to hexadecimal notation
 
435
439
    hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
 
439
 
class tcp_handler(SocketServer.BaseRequestHandler, object):
 
 
443
class TCP_handler(SocketServer.BaseRequestHandler, object):
 
440
444
    """A TCP request handler class.
 
441
445
    Instantiated by IPv6_TCPServer for each request to handle it.
 
442
446
    Note: This will run in its own forked process."""
 
 
469
473
        if self.server.settings["priority"]:
 
470
474
            priority = self.server.settings["priority"]
 
471
475
        gnutls.library.functions.gnutls_priority_set_direct\
 
472
 
            (session._c_object, priority, None);
 
 
476
            (session._c_object, priority, None)
 
475
479
            session.handshake()
 
 
529
533
            self.clients = kwargs["clients"]
 
530
534
            del kwargs["clients"]
 
531
535
        self.enabled = False
 
532
 
        return super(type(self), self).__init__(*args, **kwargs)
 
 
536
        super(IPv6_TCPServer, self).__init__(*args, **kwargs)
 
533
537
    def server_bind(self):
 
534
538
        """This overrides the normal server_bind() function
 
535
539
        to bind to an interface if one was specified, and also NOT to
 
 
566
570
#                                             ["interface"]))
 
567
 
            return super(type(self), self).server_bind()
 
 
571
            return super(IPv6_TCPServer, self).server_bind()
 
568
572
    def server_activate(self):
 
570
 
            return super(type(self), self).server_activate()
 
 
574
            return super(IPv6_TCPServer, self).server_activate()
 
571
575
    def enable(self):
 
572
576
        self.enabled = True
 
 
638
642
    """Call the C function if_nametoindex(), or equivalent"""
 
639
643
    global if_nametoindex
 
641
 
        if "ctypes.util" not in sys.modules:
 
643
645
        if_nametoindex = ctypes.cdll.LoadLibrary\
 
644
646
            (ctypes.util.find_library("c")).if_nametoindex
 
645
647
    except (OSError, AttributeError):
 
 
686
 
    global main_loop_started
 
687
 
    main_loop_started = False
 
689
688
    parser = OptionParser(version = "%%prog %s" % version)
 
690
689
    parser.add_option("-i", "--interface", type="string",
 
691
690
                      metavar="IF", help="Bind to interface IF")
 
 
706
705
                      default="/etc/mandos", metavar="DIR",
 
707
706
                      help="Directory to search for configuration"
 
709
 
    (options, args) = parser.parse_args()
 
 
708
    options = parser.parse_args()[0]
 
711
710
    if options.check:
 
 
770
769
    tcp_server = IPv6_TCPServer((server_settings["address"],
 
771
770
                                 server_settings["port"]),
 
773
772
                                settings=server_settings,
 
775
774
    pidfilename = "/var/run/mandos.pid"
 
 
805
804
    service = AvahiService(name = server_settings["servicename"],
 
806
 
                           type = "_mandos._tcp", );
 
 
805
                           servicetype = "_mandos._tcp", )
 
807
806
    if server_settings["interface"]:
 
808
807
        service.interface = if_nametoindex\
 
809
808
                            (server_settings["interface"])
 
 
910
909
                             (*args[2:], **kwargs) or True)
 
912
911
        logger.debug(u"Starting main loop")
 
913
 
        main_loop_started = True
 
915
913
    except AvahiError, error:
 
916
914
        logger.critical(u"AvahiError: %s" + unicode(error))