11
11
# "AvahiService" class, and some lines in "main".
 
13
13
# Everything else is
 
14
 
# Copyright © 2008-2016 Teddy Hogeborn
 
15
 
# Copyright © 2008-2016 Björn Påhlsson
 
17
 
# This program is free software: you can redistribute it and/or modify
 
18
 
# it under the terms of the GNU General Public License as published by
 
 
14
# Copyright © 2008-2020 Teddy Hogeborn
 
 
15
# Copyright © 2008-2020 Björn Påhlsson
 
 
17
# This file is part of Mandos.
 
 
19
# Mandos is free software: you can redistribute it and/or modify it
 
 
20
# under the terms of the GNU General Public License as published by
 
19
21
# the Free Software Foundation, either version 3 of the License, or
 
20
22
# (at your option) any later version.
 
22
 
#     This program is distributed in the hope that it will be useful,
 
23
 
#     but WITHOUT ANY WARRANTY; without even the implied warranty of
 
 
24
#     Mandos is distributed in the hope that it will be useful, but
 
 
25
#     WITHOUT ANY WARRANTY; without even the implied warranty of
 
24
26
#     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
25
27
#     GNU General Public License for more details.
 
27
29
# You should have received a copy of the GNU General Public License
 
28
 
# along with this program.  If not, see
 
29
 
# <http://www.gnu.org/licenses/>.
 
 
30
# along with Mandos.  If not, see <http://www.gnu.org/licenses/>.
 
31
32
# Contact the authors at <mandos@recompile.se>.
 
 
505
534
# Pretend that we have a GnuTLS module
 
506
 
class GnuTLS(object):
 
507
 
    """This isn't so much a class as it is a module-like namespace.
 
508
 
    It is instantiated once, and simulates having a GnuTLS module."""
 
 
536
    """This isn't so much a class as it is a module-like namespace."""
 
510
538
    library = ctypes.util.find_library("gnutls")
 
511
539
    if library is None:
 
512
540
        library = ctypes.util.find_library("gnutls-deb0")
 
513
541
    _library = ctypes.cdll.LoadLibrary(library)
 
515
 
    _need_version = b"3.3.0"
 
518
 
        # Need to use "self" here, since this method is called before
 
519
 
        # the assignment to the "gnutls" global variable happens.
 
520
 
        if self.check_version(self._need_version) is None:
 
521
 
            raise self.Error("Needs GnuTLS {} or later"
 
522
 
                             .format(self._need_version))
 
524
544
    # Unless otherwise indicated, the constants and types below are
 
525
545
    # all from the gnutls/gnutls.h C header file.
 
 
563
589
    class Error(Exception):
 
564
 
        # We need to use the class name "GnuTLS" here, since this
 
565
 
        # exception might be raised from within GnuTLS.__init__,
 
566
 
        # which is called before the assignment to the "gnutls"
 
567
 
        # global variable has happened.
 
568
590
        def __init__(self, message=None, code=None, args=()):
 
569
591
            # Default usage is by a message string, but if a return
 
570
592
            # code is passed, convert it to a string with
 
571
593
            # gnutls.strerror()
 
573
595
            if message is None and code is not None:
 
574
 
                message = GnuTLS.strerror(code)
 
575
 
            return super(GnuTLS.Error, self).__init__(
 
 
596
                message = gnutls.strerror(code)
 
 
597
            return super(gnutls.Error, self).__init__(
 
578
600
    class CertificateSecurityError(Error):
 
582
 
    class Credentials(object):
 
583
605
        def __init__(self):
 
584
606
            self._c_object = gnutls.certificate_credentials_t()
 
585
607
            gnutls.certificate_allocate_credentials(
 
 
589
611
        def __del__(self):
 
590
612
            gnutls.certificate_free_credentials(self._c_object)
 
592
 
    class ClientSession(object):
 
593
615
        def __init__(self, socket, credentials=None):
 
594
616
            self._c_object = gnutls.session_t()
 
595
 
            gnutls.init(ctypes.byref(self._c_object), gnutls.CLIENT)
 
 
617
            gnutls_flags = gnutls.CLIENT
 
 
618
            if gnutls.check_version(b"3.5.6"):
 
 
619
                gnutls_flags |= gnutls.NO_TICKETS
 
 
621
                gnutls_flags |= gnutls.ENABLE_RAWPK
 
 
622
            gnutls.init(ctypes.byref(self._c_object), gnutls_flags)
 
596
624
            gnutls.set_default_priority(self._c_object)
 
597
625
            gnutls.transport_set_ptr(self._c_object, socket.fileno())
 
598
626
            gnutls.handshake_set_private_extensions(self._c_object,
 
 
730
758
    check_version.argtypes = [ctypes.c_char_p]
 
731
759
    check_version.restype = ctypes.c_char_p
 
733
 
    # All the function declarations below are from gnutls/openpgp.h
 
735
 
    openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
736
 
    openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
737
 
    openpgp_crt_init.restype = _error_code
 
739
 
    openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
740
 
    openpgp_crt_import.argtypes = [openpgp_crt_t,
 
741
 
                                   ctypes.POINTER(datum_t),
 
743
 
    openpgp_crt_import.restype = _error_code
 
745
 
    openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
 
746
 
    openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
 
747
 
                                        ctypes.POINTER(ctypes.c_uint)]
 
748
 
    openpgp_crt_verify_self.restype = _error_code
 
750
 
    openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
751
 
    openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
752
 
    openpgp_crt_deinit.restype = None
 
754
 
    openpgp_crt_get_fingerprint = (
 
755
 
        _library.gnutls_openpgp_crt_get_fingerprint)
 
756
 
    openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
760
 
    openpgp_crt_get_fingerprint.restype = _error_code
 
 
761
    _need_version = b"3.3.0"
 
 
762
    if check_version(_need_version) is None:
 
 
763
        raise self.Error("Needs GnuTLS {} or later"
 
 
764
                         .format(_need_version))
 
 
766
    _tls_rawpk_version = b"3.6.6"
 
 
767
    has_rawpk = bool(check_version(_tls_rawpk_version))
 
 
771
        class pubkey_st(ctypes.Structure):
 
 
773
        pubkey_t = ctypes.POINTER(pubkey_st)
 
 
775
        x509_crt_fmt_t = ctypes.c_int
 
 
777
        # All the function declarations below are from gnutls/abstract.h
 
 
778
        pubkey_init = _library.gnutls_pubkey_init
 
 
779
        pubkey_init.argtypes = [ctypes.POINTER(pubkey_t)]
 
 
780
        pubkey_init.restype = _error_code
 
 
782
        pubkey_import = _library.gnutls_pubkey_import
 
 
783
        pubkey_import.argtypes = [pubkey_t, ctypes.POINTER(datum_t),
 
 
785
        pubkey_import.restype = _error_code
 
 
787
        pubkey_get_key_id = _library.gnutls_pubkey_get_key_id
 
 
788
        pubkey_get_key_id.argtypes = [pubkey_t, ctypes.c_int,
 
 
789
                                      ctypes.POINTER(ctypes.c_ubyte),
 
 
790
                                      ctypes.POINTER(ctypes.c_size_t)]
 
 
791
        pubkey_get_key_id.restype = _error_code
 
 
793
        pubkey_deinit = _library.gnutls_pubkey_deinit
 
 
794
        pubkey_deinit.argtypes = [pubkey_t]
 
 
795
        pubkey_deinit.restype = None
 
 
797
        # All the function declarations below are from gnutls/openpgp.h
 
 
799
        openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
 
800
        openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
 
801
        openpgp_crt_init.restype = _error_code
 
 
803
        openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
 
804
        openpgp_crt_import.argtypes = [openpgp_crt_t,
 
 
805
                                       ctypes.POINTER(datum_t),
 
 
807
        openpgp_crt_import.restype = _error_code
 
 
809
        openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
 
 
810
        openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
 
 
811
                                            ctypes.POINTER(ctypes.c_uint)]
 
 
812
        openpgp_crt_verify_self.restype = _error_code
 
 
814
        openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
 
815
        openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
 
816
        openpgp_crt_deinit.restype = None
 
 
818
        openpgp_crt_get_fingerprint = (
 
 
819
            _library.gnutls_openpgp_crt_get_fingerprint)
 
 
820
        openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
 
824
        openpgp_crt_get_fingerprint.restype = _error_code
 
 
826
    if check_version(b"3.6.4"):
 
 
827
        certificate_type_get2 = _library.gnutls_certificate_type_get2
 
 
828
        certificate_type_get2.argtypes = [session_t, ctypes.c_int]
 
 
829
        certificate_type_get2.restype = _error_code
 
762
831
    # Remove non-public functions
 
763
832
    del _error_code, _retry_on_error
 
764
 
# Create the global "gnutls" object, simulating a module
 
768
835
def call_pipe(connection,       # : multiprocessing.Connection
 
 
776
843
    connection.close()
 
779
 
class Client(object):
 
780
847
    """A representation of a client host served by this server.
 
783
850
    approved:   bool(); 'None' if not yet approved/disapproved
 
784
851
    approval_delay: datetime.timedelta(); Time to wait for approval
 
785
852
    approval_duration: datetime.timedelta(); Duration of one approval
 
786
 
    checker:    subprocess.Popen(); a running checker process used
 
787
 
                                    to see if the client lives.
 
788
 
                                    'None' if no process is running.
 
 
853
    checker: multiprocessing.Process(); a running checker process used
 
 
854
             to see if the client lives. 'None' if no process is
 
789
856
    checker_callback_tag: a GLib event source tag, or None
 
790
857
    checker_command: string; External command which is run to check
 
791
858
                     if client lives.  %() expansions are done at
 
 
825
894
    runtime_expansions = ("approval_delay", "approval_duration",
 
826
 
                          "created", "enabled", "expires",
 
 
895
                          "created", "enabled", "expires", "key_id",
 
827
896
                          "fingerprint", "host", "interval",
 
828
897
                          "last_approval_request", "last_checked_ok",
 
829
898
                          "last_enabled", "name", "timeout")
 
 
2161
 
class ProxyClient(object):
 
2162
 
    def __init__(self, child_pipe, fpr, address):
 
 
2244
    def __init__(self, child_pipe, key_id, fpr, address):
 
2163
2245
        self._pipe = child_pipe
 
2164
 
        self._pipe.send(('init', fpr, address))
 
 
2246
        self._pipe.send(('init', key_id, fpr, address))
 
2165
2247
        if not self._pipe.recv():
 
 
2248
            raise KeyError(key_id or fpr)
 
2168
2250
    def __getattribute__(self, name):
 
2169
2251
        if name == '_pipe':
 
 
2237
2319
            approval_required = False
 
2240
 
                    fpr = self.fingerprint(
 
2241
 
                        self.peer_certificate(session))
 
2242
 
                except (TypeError, gnutls.Error) as error:
 
2243
 
                    logger.warning("Bad certificate: %s", error)
 
2245
 
                logger.debug("Fingerprint: %s", fpr)
 
2248
 
                    client = ProxyClient(child_pipe, fpr,
 
 
2321
                if gnutls.has_rawpk:
 
 
2324
                        key_id = self.key_id(
 
 
2325
                            self.peer_certificate(session))
 
 
2326
                    except (TypeError, gnutls.Error) as error:
 
 
2327
                        logger.warning("Bad certificate: %s", error)
 
 
2329
                    logger.debug("Key ID: %s", key_id)
 
 
2334
                        fpr = self.fingerprint(
 
 
2335
                            self.peer_certificate(session))
 
 
2336
                    except (TypeError, gnutls.Error) as error:
 
 
2337
                        logger.warning("Bad certificate: %s", error)
 
 
2339
                    logger.debug("Fingerprint: %s", fpr)
 
 
2342
                    client = ProxyClient(child_pipe, key_id, fpr,
 
2249
2343
                                         self.client_address)
 
2250
2344
                except KeyError:
 
 
2330
2424
    def peer_certificate(session):
 
2331
 
        "Return the peer's OpenPGP certificate as a bytestring"
 
2332
 
        # If not an OpenPGP certificate...
 
2333
 
        if (gnutls.certificate_type_get(session._c_object)
 
2334
 
            != gnutls.CRT_OPENPGP):
 
 
2425
        "Return the peer's certificate as a bytestring"
 
 
2427
            cert_type = gnutls.certificate_type_get2(session._c_object,
 
 
2429
        except AttributeError:
 
 
2430
            cert_type = gnutls.certificate_type_get(session._c_object)
 
 
2431
        if gnutls.has_rawpk:
 
 
2432
            valid_cert_types = frozenset((gnutls.CRT_RAWPK,))
 
 
2434
            valid_cert_types = frozenset((gnutls.CRT_OPENPGP,))
 
 
2435
        # If not a valid certificate type...
 
 
2436
        if cert_type not in valid_cert_types:
 
 
2437
            logger.info("Cert type %r not in %r", cert_type,
 
2335
2439
            # ...return invalid data
 
2337
2441
        list_size = ctypes.c_uint(1)
 
 
2345
2449
        return ctypes.string_at(cert.data, cert.size)
 
 
2452
    def key_id(certificate):
 
 
2453
        "Convert a certificate bytestring to a hexdigit key ID"
 
 
2454
        # New GnuTLS "datum" with the public key
 
 
2455
        datum = gnutls.datum_t(
 
 
2456
            ctypes.cast(ctypes.c_char_p(certificate),
 
 
2457
                        ctypes.POINTER(ctypes.c_ubyte)),
 
 
2458
            ctypes.c_uint(len(certificate)))
 
 
2459
        # XXX all these need to be created in the gnutls "module"
 
 
2460
        # New empty GnuTLS certificate
 
 
2461
        pubkey = gnutls.pubkey_t()
 
 
2462
        gnutls.pubkey_init(ctypes.byref(pubkey))
 
 
2463
        # Import the raw public key into the certificate
 
 
2464
        gnutls.pubkey_import(pubkey,
 
 
2465
                             ctypes.byref(datum),
 
 
2466
                             gnutls.X509_FMT_DER)
 
 
2467
        # New buffer for the key ID
 
 
2468
        buf = ctypes.create_string_buffer(32)
 
 
2469
        buf_len = ctypes.c_size_t(len(buf))
 
 
2470
        # Get the key ID from the raw public key into the buffer
 
 
2471
        gnutls.pubkey_get_key_id(pubkey,
 
 
2472
                                 gnutls.KEYID_USE_SHA256,
 
 
2473
                                 ctypes.cast(ctypes.byref(buf),
 
 
2474
                                             ctypes.POINTER(ctypes.c_ubyte)),
 
 
2475
                                 ctypes.byref(buf_len))
 
 
2476
        # Deinit the certificate
 
 
2477
        gnutls.pubkey_deinit(pubkey)
 
 
2479
        # Convert the buffer to a Python bytestring
 
 
2480
        key_id = ctypes.string_at(buf, buf_len.value)
 
 
2481
        # Convert the bytestring to hexadecimal notation
 
 
2482
        hex_key_id = binascii.hexlify(key_id).upper()
 
2348
2486
    def fingerprint(openpgp):
 
2349
2487
        "Convert an OpenPGP bytestring to a hexdigit fingerprint"
 
2350
2488
        # New GnuTLS "datum" with the OpenPGP public key
 
 
2577
2718
        command = request[0]
 
2579
2720
        if command == 'init':
 
2581
 
            address = request[2]
 
 
2721
            key_id = request[1].decode("ascii")
 
 
2722
            fpr = request[2].decode("ascii")
 
 
2723
            address = request[3]
 
2583
2725
            for c in self.clients.values():
 
2584
 
                if c.fingerprint == fpr:
 
 
2726
                if key_id == "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855":
 
 
2728
                if key_id and c.key_id == key_id:
 
 
2731
                if fpr and c.fingerprint == fpr:
 
2588
 
                logger.info("Client not found for fingerprint: %s, ad"
 
2589
 
                            "dress: %s", fpr, address)
 
 
2735
                logger.info("Client not found for key ID: %s, address"
 
 
2736
                            ": %s", key_id or fpr, address)
 
2590
2737
                if self.use_dbus:
 
2591
2738
                    # Emit D-Bus signal
 
2592
 
                    mandos_dbus_service.ClientNotFound(fpr,
 
 
2739
                    mandos_dbus_service.ClientNotFound(key_id or fpr,
 
2594
2741
                parent_pipe.send(False)
 
2597
2744
            GLib.io_add_watch(
 
2598
 
                parent_pipe.fileno(),
 
2599
 
                GLib.IO_IN | GLib.IO_HUP,
 
 
2745
                GLib.IOChannel.unix_new(parent_pipe.fileno()),
 
 
2746
                GLib.PRIORITY_DEFAULT, GLib.IO_IN | GLib.IO_HUP,
 
2600
2747
                functools.partial(self.handle_ipc,
 
2601
2748
                                  parent_pipe=parent_pipe,
 
 
2634
2781
def rfc3339_duration_to_delta(duration):
 
2635
2782
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
2637
 
    >>> rfc3339_duration_to_delta("P7D")
 
2638
 
    datetime.timedelta(7)
 
2639
 
    >>> rfc3339_duration_to_delta("PT60S")
 
2640
 
    datetime.timedelta(0, 60)
 
2641
 
    >>> rfc3339_duration_to_delta("PT60M")
 
2642
 
    datetime.timedelta(0, 3600)
 
2643
 
    >>> rfc3339_duration_to_delta("PT24H")
 
2644
 
    datetime.timedelta(1)
 
2645
 
    >>> rfc3339_duration_to_delta("P1W")
 
2646
 
    datetime.timedelta(7)
 
2647
 
    >>> rfc3339_duration_to_delta("PT5M30S")
 
2648
 
    datetime.timedelta(0, 330)
 
2649
 
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
2650
 
    datetime.timedelta(1, 200)
 
 
2784
    >>> rfc3339_duration_to_delta("P7D") == datetime.timedelta(7)
 
 
2786
    >>> rfc3339_duration_to_delta("PT60S") == datetime.timedelta(0, 60)
 
 
2788
    >>> rfc3339_duration_to_delta("PT60M") == datetime.timedelta(0, 3600)
 
 
2790
    >>> rfc3339_duration_to_delta("PT24H") == datetime.timedelta(1)
 
 
2792
    >>> rfc3339_duration_to_delta("P1W") == datetime.timedelta(7)
 
 
2794
    >>> rfc3339_duration_to_delta("PT5M30S") == datetime.timedelta(0, 330)
 
 
2796
    >>> rfc3339_duration_to_delta("P1DT3M20S") == datetime.timedelta(1, 200)
 
2653
2800
    # Parsing an RFC 3339 duration with regular expressions is not
 
 
2733
2880
def string_to_delta(interval):
 
2734
2881
    """Parse a string and return a datetime.timedelta
 
2736
 
    >>> string_to_delta('7d')
 
2737
 
    datetime.timedelta(7)
 
2738
 
    >>> string_to_delta('60s')
 
2739
 
    datetime.timedelta(0, 60)
 
2740
 
    >>> string_to_delta('60m')
 
2741
 
    datetime.timedelta(0, 3600)
 
2742
 
    >>> string_to_delta('24h')
 
2743
 
    datetime.timedelta(1)
 
2744
 
    >>> string_to_delta('1w')
 
2745
 
    datetime.timedelta(7)
 
2746
 
    >>> string_to_delta('5m 30s')
 
2747
 
    datetime.timedelta(0, 330)
 
 
2883
    >>> string_to_delta('7d') == datetime.timedelta(7)
 
 
2885
    >>> string_to_delta('60s') == datetime.timedelta(0, 60)
 
 
2887
    >>> string_to_delta('60m') == datetime.timedelta(0, 3600)
 
 
2889
    >>> string_to_delta('24h') == datetime.timedelta(1)
 
 
2891
    >>> string_to_delta('1w') == datetime.timedelta(7)
 
 
2893
    >>> string_to_delta('5m 30s') == datetime.timedelta(0, 330)
 
 
2875
3021
                       "foreground": "False",
 
2876
3022
                       "zeroconf": "True",
 
2879
3026
    # Parse config file for server-global settings
 
2880
 
    server_config = configparser.SafeConfigParser(server_defaults)
 
 
3027
    server_config = configparser.ConfigParser(server_defaults)
 
2881
3028
    del server_defaults
 
2882
3029
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
 
2883
 
    # Convert the SafeConfigParser object to a dict
 
 
3030
    # Convert the ConfigParser object to a dict
 
2884
3031
    server_settings = server_config.defaults()
 
2885
3032
    # Use the appropriate methods on the non-string config options
 
2886
 
    for option in ("debug", "use_dbus", "use_ipv6", "foreground"):
 
 
3033
    for option in ("debug", "use_dbus", "use_ipv6", "restore",
 
 
3034
                   "foreground", "zeroconf"):
 
2887
3035
        server_settings[option] = server_config.getboolean("DEFAULT",
 
2889
3037
    if server_settings["port"]:
 
 
3468
3621
            # End of Avahi example code
 
3470
 
        GLib.io_add_watch(tcp_server.fileno(), GLib.IO_IN,
 
3471
 
                          lambda *args, **kwargs:
 
3472
 
                          (tcp_server.handle_request
 
3473
 
                           (*args[2:], **kwargs) or True))
 
 
3624
            GLib.IOChannel.unix_new(tcp_server.fileno()),
 
 
3625
            GLib.PRIORITY_DEFAULT, GLib.IO_IN,
 
 
3626
            lambda *args, **kwargs: (tcp_server.handle_request
 
 
3627
                                     (*args[2:], **kwargs) or True))
 
3475
3629
        logger.debug("Starting main loop")
 
3476
3630
        main_loop.run()
 
 
3486
3640
    # Must run before the D-Bus bus name gets deregistered
 
 
3644
def should_only_run_tests():
 
 
3645
    parser = argparse.ArgumentParser(add_help=False)
 
 
3646
    parser.add_argument("--check", action='store_true')
 
 
3647
    args, unknown_args = parser.parse_known_args()
 
 
3648
    run_tests = args.check
 
 
3650
        # Remove --check argument from sys.argv
 
 
3651
        sys.argv[1:] = unknown_args
 
 
3654
# Add all tests from doctest strings
 
 
3655
def load_tests(loader, tests, none):
 
 
3657
    tests.addTests(doctest.DocTestSuite())
 
3490
3660
if __name__ == '__main__':
 
 
3662
        if should_only_run_tests():
 
 
3663
            # Call using ./mandos --check [--verbose]