124
99
max_renames: integer; maximum number of renames
125
100
rename_count: integer; counter so we only rename after collisions
126
101
a sensible number of times
127
group: D-Bus Entry Group
129
bus: dbus.SystemBus()
131
103
def __init__(self, interface = avahi.IF_UNSPEC, name = None,
132
servicetype = None, port = None, TXT = None,
133
domain = u"", host = u"", max_renames = 32768,
134
protocol = avahi.PROTO_UNSPEC, bus = None):
104
type = None, port = None, TXT = None, domain = "",
105
host = "", max_renames = 32768):
135
106
self.interface = interface
137
self.type = servicetype
139
self.TXT = TXT if TXT is not None else []
140
114
self.domain = domain
142
116
self.rename_count = 0
143
self.max_renames = max_renames
144
self.protocol = protocol
145
self.group = None # our entry group
148
117
def rename(self):
149
118
"""Derived from the Avahi example code"""
150
119
if self.rename_count >= self.max_renames:
151
logger.critical(u"No suitable Zeroconf service name found"
152
u" after %i retries, exiting.",
154
raise AvahiServiceError(u"Too many renames")
155
self.name = self.server.GetAlternativeServiceName(self.name)
156
logger.info(u"Changing Zeroconf service name to %r ...",
158
syslogger.setFormatter(logging.Formatter
159
(u'Mandos (%s) [%%(process)d]:'
160
u' %%(levelname)s: %%(message)s'
120
logger.critical(u"No suitable service name found after %i"
121
u" retries, exiting.", rename_count)
122
raise AvahiServiceError("Too many renames")
123
name = server.GetAlternativeServiceName(name)
124
logger.error(u"Changing name to %r ...", name)
125
syslogger.setFormatter(logging.Formatter\
126
('Mandos (%s): %%(levelname)s:'
127
' %%(message)s' % name))
164
130
self.rename_count += 1
165
131
def remove(self):
166
132
"""Derived from the Avahi example code"""
167
if self.group is not None:
133
if group is not None:
170
136
"""Derived from the Avahi example code"""
171
if self.group is None:
172
self.group = dbus.Interface(
173
self.bus.get_object(avahi.DBUS_NAME,
174
self.server.EntryGroupNew()),
175
avahi.DBUS_INTERFACE_ENTRY_GROUP)
176
self.group.connect_to_signal('StateChanged',
177
self.entry_group_state_changed)
178
logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
179
self.name, self.type)
180
self.group.AddService(
183
dbus.UInt32(0), # flags
184
self.name, self.type,
185
self.domain, self.host,
186
dbus.UInt16(self.port),
187
avahi.string_array_to_txt_array(self.TXT))
189
def entry_group_state_changed(self, state, error):
190
"""Derived from the Avahi example code"""
191
logger.debug(u"Avahi state change: %i", state)
193
if state == avahi.ENTRY_GROUP_ESTABLISHED:
194
logger.debug(u"Zeroconf service established.")
195
elif state == avahi.ENTRY_GROUP_COLLISION:
196
logger.warning(u"Zeroconf service name collision.")
198
elif state == avahi.ENTRY_GROUP_FAILURE:
199
logger.critical(u"Avahi: Error in group state changed %s",
201
raise AvahiGroupError(u"State changed: %s"
204
"""Derived from the Avahi example code"""
205
if self.group is not None:
208
def server_state_changed(self, state):
209
"""Derived from the Avahi example code"""
210
if state == avahi.SERVER_COLLISION:
211
logger.error(u"Zeroconf server name collision")
213
elif state == avahi.SERVER_RUNNING:
216
"""Derived from the Avahi example code"""
217
if self.server is None:
218
self.server = dbus.Interface(
219
self.bus.get_object(avahi.DBUS_NAME,
220
avahi.DBUS_PATH_SERVER),
221
avahi.DBUS_INTERFACE_SERVER)
222
self.server.connect_to_signal(u"StateChanged",
223
self.server_state_changed)
224
self.server_state_changed(self.server.GetState())
139
group = dbus.Interface\
140
(bus.get_object(avahi.DBUS_NAME,
141
server.EntryGroupNew()),
142
avahi.DBUS_INTERFACE_ENTRY_GROUP)
143
group.connect_to_signal('StateChanged',
144
entry_group_state_changed)
145
logger.debug(u"Adding service '%s' of type '%s' ...",
146
service.name, service.type)
148
self.interface, # interface
149
avahi.PROTO_INET6, # protocol
150
dbus.UInt32(0), # flags
151
self.name, self.type,
152
self.domain, self.host,
153
dbus.UInt16(self.port),
154
avahi.string_array_to_txt_array(self.TXT))
157
# From the Avahi example code:
158
group = None # our entry group
159
# End of Avahi example code
227
162
class Client(object):
228
163
"""A representation of a client host served by this server.
231
name: string; from the config file, used in log messages and
165
name: string; from the config file, used in log messages
233
166
fingerprint: string (40 or 32 hexadecimal digits); used to
234
167
uniquely identify the client
235
secret: bytestring; sent verbatim (over TLS) to client
236
host: string; available for use by the checker command
237
created: datetime.datetime(); (UTC) object creation
238
last_enabled: datetime.datetime(); (UTC)
240
last_checked_ok: datetime.datetime(); (UTC) or None
241
timeout: datetime.timedelta(); How long from last_checked_ok
242
until this client is invalid
243
interval: datetime.timedelta(); How often to start a new checker
244
disable_hook: If set, called by disable() as disable_hook(self)
245
checker: subprocess.Popen(); a running checker process used
246
to see if the client lives.
247
'None' if no process is running.
168
secret: bytestring; sent verbatim (over TLS) to client
169
host: string; available for use by the checker command
170
created: datetime.datetime(); object creation, not client host
171
last_checked_ok: datetime.datetime() or None if not yet checked OK
172
timeout: datetime.timedelta(); How long from last_checked_ok
173
until this client is invalid
174
interval: datetime.timedelta(); How often to start a new checker
175
stop_hook: If set, called by stop() as stop_hook(self)
176
checker: subprocess.Popen(); a running checker process used
177
to see if the client lives.
178
'None' if no process is running.
248
179
checker_initiator_tag: a gobject event source tag, or None
249
disable_initiator_tag: - '' -
180
stop_initiator_tag: - '' -
250
181
checker_callback_tag: - '' -
251
182
checker_command: string; External command which is run to check if
252
183
client lives. %() expansions are done at
253
184
runtime with vars(self) as dict, so that for
254
185
instance %(name)s can be used in the command.
255
current_checker_command: string; current running checker_command
187
_timeout: Real variable for 'timeout'
188
_interval: Real variable for 'interval'
189
_timeout_milliseconds: Used when calling gobject.timeout_add()
190
_interval_milliseconds: - '' -
259
def _datetime_to_milliseconds(dt):
260
"Convert a datetime.datetime() to milliseconds"
261
return ((dt.days * 24 * 60 * 60 * 1000)
262
+ (dt.seconds * 1000)
263
+ (dt.microseconds // 1000))
265
def timeout_milliseconds(self):
266
"Return the 'timeout' attribute in milliseconds"
267
return self._datetime_to_milliseconds(self.timeout)
269
def interval_milliseconds(self):
270
"Return the 'interval' attribute in milliseconds"
271
return self._datetime_to_milliseconds(self.interval)
273
def __init__(self, name = None, disable_hook=None, config=None):
192
def _set_timeout(self, timeout):
193
"Setter function for 'timeout' attribute"
194
self._timeout = timeout
195
self._timeout_milliseconds = ((self.timeout.days
196
* 24 * 60 * 60 * 1000)
197
+ (self.timeout.seconds * 1000)
198
+ (self.timeout.microseconds
200
timeout = property(lambda self: self._timeout,
203
def _set_interval(self, interval):
204
"Setter function for 'interval' attribute"
205
self._interval = interval
206
self._interval_milliseconds = ((self.interval.days
207
* 24 * 60 * 60 * 1000)
208
+ (self.interval.seconds
210
+ (self.interval.microseconds
212
interval = property(lambda self: self._interval,
215
def __init__(self, name = None, stop_hook=None, config={}):
274
216
"""Note: the 'checker' key in 'config' sets the
275
217
'checker_command' attribute and *not* the 'checker'
280
220
logger.debug(u"Creating client %r", self.name)
281
221
# Uppercase and remove spaces from fingerprint for later
282
222
# comparison purposes with return value from the fingerprint()
284
self.fingerprint = (config[u"fingerprint"].upper()
224
self.fingerprint = config["fingerprint"].upper()\
286
226
logger.debug(u" Fingerprint: %s", self.fingerprint)
287
if u"secret" in config:
288
self.secret = config[u"secret"].decode(u"base64")
289
elif u"secfile" in config:
290
with closing(open(os.path.expanduser
292
(config[u"secfile"])))) as secfile:
293
self.secret = secfile.read()
227
if "secret" in config:
228
self.secret = config["secret"].decode(u"base64")
229
elif "secfile" in config:
230
sf = open(config["secfile"])
231
self.secret = sf.read()
295
234
raise TypeError(u"No secret or secfile for client %s"
297
self.host = config.get(u"host", u"")
298
self.created = datetime.datetime.utcnow()
300
self.last_enabled = None
236
self.host = config.get("host", "")
237
self.created = datetime.datetime.now()
301
238
self.last_checked_ok = None
302
self.timeout = string_to_delta(config[u"timeout"])
303
self.interval = string_to_delta(config[u"interval"])
304
self.disable_hook = disable_hook
239
self.timeout = string_to_delta(config["timeout"])
240
self.interval = string_to_delta(config["interval"])
241
self.stop_hook = stop_hook
305
242
self.checker = None
306
243
self.checker_initiator_tag = None
307
self.disable_initiator_tag = None
244
self.stop_initiator_tag = None
308
245
self.checker_callback_tag = None
309
self.checker_command = config[u"checker"]
310
self.current_checker_command = None
311
self.last_connect = None
246
self.check_command = config["checker"]
314
248
"""Start this client's checker and timeout hooks"""
315
self.last_enabled = datetime.datetime.utcnow()
316
249
# Schedule a new checker to be started an 'interval' from now,
317
250
# and every interval from then on.
318
self.checker_initiator_tag = (gobject.timeout_add
319
(self.interval_milliseconds(),
251
self.checker_initiator_tag = gobject.timeout_add\
252
(self._interval_milliseconds,
321
254
# Also start a new checker *right now*.
322
255
self.start_checker()
323
# Schedule a disable() when 'timeout' has passed
324
self.disable_initiator_tag = (gobject.timeout_add
325
(self.timeout_milliseconds(),
330
"""Disable this client."""
331
if not getattr(self, "enabled", False):
256
# Schedule a stop() when 'timeout' has passed
257
self.stop_initiator_tag = gobject.timeout_add\
258
(self._timeout_milliseconds,
262
The possibility that a client might be restarted is left open,
263
but not currently used."""
264
# If this client doesn't have a secret, it is already stopped.
265
if hasattr(self, "secret") and self.secret:
266
logger.info(u"Stopping client %s", self.name)
333
logger.info(u"Disabling client %s", self.name)
334
if getattr(self, u"disable_initiator_tag", False):
335
gobject.source_remove(self.disable_initiator_tag)
336
self.disable_initiator_tag = None
337
if getattr(self, u"checker_initiator_tag", False):
270
if getattr(self, "stop_initiator_tag", False):
271
gobject.source_remove(self.stop_initiator_tag)
272
self.stop_initiator_tag = None
273
if getattr(self, "checker_initiator_tag", False):
338
274
gobject.source_remove(self.checker_initiator_tag)
339
275
self.checker_initiator_tag = None
340
276
self.stop_checker()
341
if self.disable_hook:
342
self.disable_hook(self)
344
279
# Do not run this again if called by a gobject.timeout_add
347
281
def __del__(self):
348
self.disable_hook = None
351
def checker_callback(self, pid, condition, command):
282
self.stop_hook = None
284
def checker_callback(self, pid, condition):
352
285
"""The checker has completed, so take appropriate actions."""
286
now = datetime.datetime.now()
353
287
self.checker_callback_tag = None
354
288
self.checker = None
355
if os.WIFEXITED(condition):
356
exitstatus = os.WEXITSTATUS(condition)
358
logger.info(u"Checker for %(name)s succeeded",
362
logger.info(u"Checker for %(name)s failed",
289
if os.WIFEXITED(condition) \
290
and (os.WEXITSTATUS(condition) == 0):
291
logger.info(u"Checker for %(name)s succeeded",
293
self.last_checked_ok = now
294
gobject.source_remove(self.stop_initiator_tag)
295
self.stop_initiator_tag = gobject.timeout_add\
296
(self._timeout_milliseconds,
298
elif not os.WIFEXITED(condition):
365
299
logger.warning(u"Checker for %(name)s crashed?",
368
def checked_ok(self):
369
"""Bump up the timeout for this client.
371
This should only be called when the client has been seen,
374
self.last_checked_ok = datetime.datetime.utcnow()
375
gobject.source_remove(self.disable_initiator_tag)
376
self.disable_initiator_tag = (gobject.timeout_add
377
(self.timeout_milliseconds(),
302
logger.info(u"Checker for %(name)s failed",
380
304
def start_checker(self):
381
305
"""Start a new checker subprocess if one is not running.
383
306
If a checker already exists, leave it running and do
385
308
# The reason for not killing a running checker is that if we
462
359
if error.errno != errno.ESRCH: # No such process
464
361
self.checker = None
466
362
def still_valid(self):
467
363
"""Has the timeout not yet passed for this client?"""
468
if not getattr(self, u"enabled", False):
470
now = datetime.datetime.utcnow()
364
now = datetime.datetime.now()
471
365
if self.last_checked_ok is None:
472
366
return now < (self.created + self.timeout)
474
368
return now < (self.last_checked_ok + self.timeout)
477
class ClientDBus(Client, dbus.service.Object):
478
"""A Client class using D-Bus
481
dbus_object_path: dbus.ObjectPath
482
bus: dbus.SystemBus()
484
# dbus.service.Object doesn't use super(), so we can't either.
486
def __init__(self, bus = None, *args, **kwargs):
488
Client.__init__(self, *args, **kwargs)
489
# Only now, when this client is initialized, can it show up on
491
self.dbus_object_path = (dbus.ObjectPath
493
+ self.name.replace(u".", u"_")))
494
dbus.service.Object.__init__(self, self.bus,
495
self.dbus_object_path)
498
def _datetime_to_dbus(dt, variant_level=0):
499
"""Convert a UTC datetime.datetime() to a D-Bus type."""
500
return dbus.String(dt.isoformat(),
501
variant_level=variant_level)
504
oldstate = getattr(self, u"enabled", False)
505
r = Client.enable(self)
506
if oldstate != self.enabled:
508
self.PropertyChanged(dbus.String(u"enabled"),
509
dbus.Boolean(True, variant_level=1))
510
self.PropertyChanged(
511
dbus.String(u"last_enabled"),
512
self._datetime_to_dbus(self.last_enabled,
516
def disable(self, signal = True):
517
oldstate = getattr(self, u"enabled", False)
518
r = Client.disable(self)
519
if signal and oldstate != self.enabled:
521
self.PropertyChanged(dbus.String(u"enabled"),
522
dbus.Boolean(False, variant_level=1))
525
def __del__(self, *args, **kwargs):
527
self.remove_from_connection()
530
if hasattr(dbus.service.Object, u"__del__"):
531
dbus.service.Object.__del__(self, *args, **kwargs)
532
Client.__del__(self, *args, **kwargs)
534
def checker_callback(self, pid, condition, command,
536
self.checker_callback_tag = None
539
self.PropertyChanged(dbus.String(u"checker_running"),
540
dbus.Boolean(False, variant_level=1))
541
if os.WIFEXITED(condition):
542
exitstatus = os.WEXITSTATUS(condition)
544
self.CheckerCompleted(dbus.Int16(exitstatus),
545
dbus.Int64(condition),
546
dbus.String(command))
549
self.CheckerCompleted(dbus.Int16(-1),
550
dbus.Int64(condition),
551
dbus.String(command))
553
return Client.checker_callback(self, pid, condition, command,
556
def checked_ok(self, *args, **kwargs):
557
r = Client.checked_ok(self, *args, **kwargs)
559
self.PropertyChanged(
560
dbus.String(u"last_checked_ok"),
561
(self._datetime_to_dbus(self.last_checked_ok,
565
def start_checker(self, *args, **kwargs):
566
old_checker = self.checker
567
if self.checker is not None:
568
old_checker_pid = self.checker.pid
570
old_checker_pid = None
571
r = Client.start_checker(self, *args, **kwargs)
572
# Only if new checker process was started
573
if (self.checker is not None
574
and old_checker_pid != self.checker.pid):
576
self.CheckerStarted(self.current_checker_command)
577
self.PropertyChanged(
578
dbus.String(u"checker_running"),
579
dbus.Boolean(True, variant_level=1))
582
def stop_checker(self, *args, **kwargs):
583
old_checker = getattr(self, u"checker", None)
584
r = Client.stop_checker(self, *args, **kwargs)
585
if (old_checker is not None
586
and getattr(self, u"checker", None) is None):
587
self.PropertyChanged(dbus.String(u"checker_running"),
588
dbus.Boolean(False, variant_level=1))
591
## D-Bus methods & signals
592
_interface = u"se.bsnet.fukt.Mandos.Client"
595
@dbus.service.method(_interface)
597
return self.checked_ok()
599
# CheckerCompleted - signal
600
@dbus.service.signal(_interface, signature=u"nxs")
601
def CheckerCompleted(self, exitcode, waitstatus, command):
605
# CheckerStarted - signal
606
@dbus.service.signal(_interface, signature=u"s")
607
def CheckerStarted(self, command):
611
# GetAllProperties - method
612
@dbus.service.method(_interface, out_signature=u"a{sv}")
613
def GetAllProperties(self):
615
return dbus.Dictionary({
616
dbus.String(u"name"):
617
dbus.String(self.name, variant_level=1),
618
dbus.String(u"fingerprint"):
619
dbus.String(self.fingerprint, variant_level=1),
620
dbus.String(u"host"):
621
dbus.String(self.host, variant_level=1),
622
dbus.String(u"created"):
623
self._datetime_to_dbus(self.created,
625
dbus.String(u"last_enabled"):
626
(self._datetime_to_dbus(self.last_enabled,
628
if self.last_enabled is not None
629
else dbus.Boolean(False, variant_level=1)),
630
dbus.String(u"enabled"):
631
dbus.Boolean(self.enabled, variant_level=1),
632
dbus.String(u"last_checked_ok"):
633
(self._datetime_to_dbus(self.last_checked_ok,
635
if self.last_checked_ok is not None
636
else dbus.Boolean (False, variant_level=1)),
637
dbus.String(u"timeout"):
638
dbus.UInt64(self.timeout_milliseconds(),
640
dbus.String(u"interval"):
641
dbus.UInt64(self.interval_milliseconds(),
643
dbus.String(u"checker"):
644
dbus.String(self.checker_command,
646
dbus.String(u"checker_running"):
647
dbus.Boolean(self.checker is not None,
649
dbus.String(u"object_path"):
650
dbus.ObjectPath(self.dbus_object_path,
654
# IsStillValid - method
655
@dbus.service.method(_interface, out_signature=u"b")
656
def IsStillValid(self):
657
return self.still_valid()
659
# PropertyChanged - signal
660
@dbus.service.signal(_interface, signature=u"sv")
661
def PropertyChanged(self, property, value):
665
# ReceivedSecret - signal
666
@dbus.service.signal(_interface)
667
def ReceivedSecret(self):
672
@dbus.service.signal(_interface)
677
# SetChecker - method
678
@dbus.service.method(_interface, in_signature=u"s")
679
def SetChecker(self, checker):
680
"D-Bus setter method"
681
self.checker_command = checker
683
self.PropertyChanged(dbus.String(u"checker"),
684
dbus.String(self.checker_command,
688
@dbus.service.method(_interface, in_signature=u"s")
689
def SetHost(self, host):
690
"D-Bus setter method"
693
self.PropertyChanged(dbus.String(u"host"),
694
dbus.String(self.host, variant_level=1))
696
# SetInterval - method
697
@dbus.service.method(_interface, in_signature=u"t")
698
def SetInterval(self, milliseconds):
699
self.interval = datetime.timedelta(0, 0, 0, milliseconds)
701
self.PropertyChanged(dbus.String(u"interval"),
702
(dbus.UInt64(self.interval_milliseconds(),
706
@dbus.service.method(_interface, in_signature=u"ay",
708
def SetSecret(self, secret):
709
"D-Bus setter method"
710
self.secret = str(secret)
712
# SetTimeout - method
713
@dbus.service.method(_interface, in_signature=u"t")
714
def SetTimeout(self, milliseconds):
715
self.timeout = datetime.timedelta(0, 0, 0, milliseconds)
717
self.PropertyChanged(dbus.String(u"timeout"),
718
(dbus.UInt64(self.timeout_milliseconds(),
722
@dbus.service.method(_interface)
727
# StartChecker - method
728
@dbus.service.method(_interface)
729
def StartChecker(self):
734
@dbus.service.method(_interface)
739
# StopChecker - method
740
@dbus.service.method(_interface)
741
def StopChecker(self):
747
class ClientHandler(socketserver.BaseRequestHandler, object):
748
"""A class to handle client connections.
750
Instantiated once for each connection to handle it.
371
def peer_certificate(session):
372
"Return the peer's OpenPGP certificate as a bytestring"
373
# If not an OpenPGP certificate...
374
if gnutls.library.functions.gnutls_certificate_type_get\
375
(session._c_object) \
376
!= gnutls.library.constants.GNUTLS_CRT_OPENPGP:
377
# ...do the normal thing
378
return session.peer_certificate
379
list_size = ctypes.c_uint()
380
cert_list = gnutls.library.functions.gnutls_certificate_get_peers\
381
(session._c_object, ctypes.byref(list_size))
382
if list_size.value == 0:
385
return ctypes.string_at(cert.data, cert.size)
388
def fingerprint(openpgp):
389
"Convert an OpenPGP bytestring to a hexdigit fingerprint string"
390
# New GnuTLS "datum" with the OpenPGP public key
391
datum = gnutls.library.types.gnutls_datum_t\
392
(ctypes.cast(ctypes.c_char_p(openpgp),
393
ctypes.POINTER(ctypes.c_ubyte)),
394
ctypes.c_uint(len(openpgp)))
395
# New empty GnuTLS certificate
396
crt = gnutls.library.types.gnutls_openpgp_crt_t()
397
gnutls.library.functions.gnutls_openpgp_crt_init\
399
# Import the OpenPGP public key into the certificate
400
gnutls.library.functions.gnutls_openpgp_crt_import\
401
(crt, ctypes.byref(datum),
402
gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
403
# New buffer for the fingerprint
404
buffer = ctypes.create_string_buffer(20)
405
buffer_length = ctypes.c_size_t()
406
# Get the fingerprint from the certificate into the buffer
407
gnutls.library.functions.gnutls_openpgp_crt_get_fingerprint\
408
(crt, ctypes.byref(buffer), ctypes.byref(buffer_length))
409
# Deinit the certificate
410
gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
411
# Convert the buffer to a Python bytestring
412
fpr = ctypes.string_at(buffer, buffer_length.value)
413
# Convert the bytestring to hexadecimal notation
414
hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
418
class tcp_handler(SocketServer.BaseRequestHandler, object):
419
"""A TCP request handler class.
420
Instantiated by IPv6_TCPServer for each request to handle it.
751
421
Note: This will run in its own forked process."""
753
423
def handle(self):
754
424
logger.info(u"TCP connection from: %s",
755
unicode(self.client_address))
756
logger.debug(u"IPC Pipe FD: %d", self.server.pipe[1])
757
# Open IPC pipe to parent process
758
with closing(os.fdopen(self.server.pipe[1], u"w", 1)) as ipc:
759
session = (gnutls.connection
760
.ClientSession(self.request,
764
line = self.request.makefile().readline()
765
logger.debug(u"Protocol version: %r", line)
767
if int(line.strip().split()[0]) > 1:
769
except (ValueError, IndexError, RuntimeError), error:
770
logger.error(u"Unknown protocol version: %s", error)
773
# Note: gnutls.connection.X509Credentials is really a
774
# generic GnuTLS certificate credentials object so long as
775
# no X.509 keys are added to it. Therefore, we can use it
776
# here despite using OpenPGP certificates.
778
#priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
779
# u"+AES-256-CBC", u"+SHA1",
780
# u"+COMP-NULL", u"+CTYPE-OPENPGP",
782
# Use a fallback default, since this MUST be set.
783
priority = self.server.gnutls_priority
786
(gnutls.library.functions
787
.gnutls_priority_set_direct(session._c_object,
792
except gnutls.errors.GNUTLSError, error:
793
logger.warning(u"Handshake failed: %s", error)
794
# Do not run session.bye() here: the session is not
795
# established. Just abandon the request.
797
logger.debug(u"Handshake succeeded")
799
fpr = self.fingerprint(self.peer_certificate(session))
800
except (TypeError, gnutls.errors.GNUTLSError), error:
801
logger.warning(u"Bad certificate: %s", error)
804
logger.debug(u"Fingerprint: %s", fpr)
806
for c in self.server.clients:
807
if c.fingerprint == fpr:
811
ipc.write(u"NOTFOUND %s\n" % fpr)
814
# Have to check if client.still_valid(), since it is
815
# possible that the client timed out while establishing
816
# the GnuTLS session.
817
if not client.still_valid():
818
ipc.write(u"INVALID %s\n" % client.name)
821
ipc.write(u"SENDING %s\n" % client.name)
823
while sent_size < len(client.secret):
824
sent = session.send(client.secret[sent_size:])
825
logger.debug(u"Sent: %d, remaining: %d",
826
sent, len(client.secret)
827
- (sent_size + sent))
832
def peer_certificate(session):
833
"Return the peer's OpenPGP certificate as a bytestring"
834
# If not an OpenPGP certificate...
835
if (gnutls.library.functions
836
.gnutls_certificate_type_get(session._c_object)
837
!= gnutls.library.constants.GNUTLS_CRT_OPENPGP):
838
# ...do the normal thing
839
return session.peer_certificate
840
list_size = ctypes.c_uint(1)
841
cert_list = (gnutls.library.functions
842
.gnutls_certificate_get_peers
843
(session._c_object, ctypes.byref(list_size)))
844
if not bool(cert_list) and list_size.value != 0:
845
raise gnutls.errors.GNUTLSError(u"error getting peer"
847
if list_size.value == 0:
850
return ctypes.string_at(cert.data, cert.size)
853
def fingerprint(openpgp):
854
"Convert an OpenPGP bytestring to a hexdigit fingerprint"
855
# New GnuTLS "datum" with the OpenPGP public key
856
datum = (gnutls.library.types
857
.gnutls_datum_t(ctypes.cast(ctypes.c_char_p(openpgp),
860
ctypes.c_uint(len(openpgp))))
861
# New empty GnuTLS certificate
862
crt = gnutls.library.types.gnutls_openpgp_crt_t()
863
(gnutls.library.functions
864
.gnutls_openpgp_crt_init(ctypes.byref(crt)))
865
# Import the OpenPGP public key into the certificate
866
(gnutls.library.functions
867
.gnutls_openpgp_crt_import(crt, ctypes.byref(datum),
868
gnutls.library.constants
869
.GNUTLS_OPENPGP_FMT_RAW))
870
# Verify the self signature in the key
871
crtverify = ctypes.c_uint()
872
(gnutls.library.functions
873
.gnutls_openpgp_crt_verify_self(crt, 0,
874
ctypes.byref(crtverify)))
875
if crtverify.value != 0:
876
gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
877
raise (gnutls.errors.CertificateSecurityError
879
# New buffer for the fingerprint
880
buf = ctypes.create_string_buffer(20)
881
buf_len = ctypes.c_size_t()
882
# Get the fingerprint from the certificate into the buffer
883
(gnutls.library.functions
884
.gnutls_openpgp_crt_get_fingerprint(crt, ctypes.byref(buf),
885
ctypes.byref(buf_len)))
886
# Deinit the certificate
887
gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
888
# Convert the buffer to a Python bytestring
889
fpr = ctypes.string_at(buf, buf_len.value)
890
# Convert the bytestring to hexadecimal notation
891
hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
895
class ForkingMixInWithPipe(socketserver.ForkingMixIn, object):
896
"""Like socketserver.ForkingMixIn, but also pass a pipe.
898
Assumes a gobject.MainLoop event loop.
900
def process_request(self, request, client_address):
901
"""Overrides and wraps the original process_request().
903
This function creates a new pipe in self.pipe
905
self.pipe = os.pipe()
906
super(ForkingMixInWithPipe,
907
self).process_request(request, client_address)
908
os.close(self.pipe[1]) # close write end
909
# Call "handle_ipc" for both data and EOF events
910
gobject.io_add_watch(self.pipe[0],
911
gobject.IO_IN | gobject.IO_HUP,
913
def handle_ipc(source, condition):
914
"""Dummy function; override as necessary"""
919
class IPv6_TCPServer(ForkingMixInWithPipe,
920
socketserver.TCPServer, object):
921
"""IPv6-capable TCP server. Accepts 'None' as address and/or port
425
unicode(self.client_address))
426
session = gnutls.connection.ClientSession\
427
(self.request, gnutls.connection.X509Credentials())
429
line = self.request.makefile().readline()
430
logger.debug(u"Protocol version: %r", line)
432
if int(line.strip().split()[0]) > 1:
434
except (ValueError, IndexError, RuntimeError), error:
435
logger.error(u"Unknown protocol version: %s", error)
438
# Note: gnutls.connection.X509Credentials is really a generic
439
# GnuTLS certificate credentials object so long as no X.509
440
# keys are added to it. Therefore, we can use it here despite
441
# using OpenPGP certificates.
443
#priority = ':'.join(("NONE", "+VERS-TLS1.1", "+AES-256-CBC",
444
# "+SHA1", "+COMP-NULL", "+CTYPE-OPENPGP",
446
priority = "NORMAL" # Fallback default, since this
448
if self.server.settings["priority"]:
449
priority = self.server.settings["priority"]
450
gnutls.library.functions.gnutls_priority_set_direct\
451
(session._c_object, priority, None);
455
except gnutls.errors.GNUTLSError, error:
456
logger.warning(u"Handshake failed: %s", error)
457
# Do not run session.bye() here: the session is not
458
# established. Just abandon the request.
461
fpr = fingerprint(peer_certificate(session))
462
except (TypeError, gnutls.errors.GNUTLSError), error:
463
logger.warning(u"Bad certificate: %s", error)
466
logger.debug(u"Fingerprint: %s", fpr)
468
for c in self.server.clients:
469
if c.fingerprint == fpr:
473
logger.warning(u"Client not found for fingerprint: %s",
477
# Have to check if client.still_valid(), since it is possible
478
# that the client timed out while establishing the GnuTLS
480
if not client.still_valid():
481
logger.warning(u"Client %(name)s is invalid",
486
while sent_size < len(client.secret):
487
sent = session.send(client.secret[sent_size:])
488
logger.debug(u"Sent: %d, remaining: %d",
489
sent, len(client.secret)
490
- (sent_size + sent))
495
class IPv6_TCPServer(SocketServer.ForkingTCPServer, object):
496
"""IPv6 TCP server. Accepts 'None' as address and/or port.
924
enabled: Boolean; whether this server is activated yet
925
interface: None or a network interface name (string)
926
use_ipv6: Boolean; to use IPv6 or not
928
clients: set of Client objects
929
gnutls_priority GnuTLS priority string
930
use_dbus: Boolean; to emit D-Bus signals or not
498
settings: Server settings
499
clients: Set() of Client objects
932
def __init__(self, server_address, RequestHandlerClass,
933
interface=None, use_ipv6=True, clients=None,
934
gnutls_priority=None, use_dbus=True):
936
self.interface = interface
938
self.address_family = socket.AF_INET6
939
self.clients = clients
940
self.use_dbus = use_dbus
941
self.gnutls_priority = gnutls_priority
942
socketserver.TCPServer.__init__(self, server_address,
501
address_family = socket.AF_INET6
502
def __init__(self, *args, **kwargs):
503
if "settings" in kwargs:
504
self.settings = kwargs["settings"]
505
del kwargs["settings"]
506
if "clients" in kwargs:
507
self.clients = kwargs["clients"]
508
del kwargs["clients"]
509
return super(type(self), self).__init__(*args, **kwargs)
944
510
def server_bind(self):
945
511
"""This overrides the normal server_bind() function
946
512
to bind to an interface if one was specified, and also NOT to
947
513
bind to an address or port if they were not specified."""
948
if self.interface is not None:
949
if SO_BINDTODEVICE is None:
950
logger.error(u"SO_BINDTODEVICE does not exist;"
951
u" cannot bind to interface %s",
955
self.socket.setsockopt(socket.SOL_SOCKET,
959
except socket.error, error:
960
if error[0] == errno.EPERM:
961
logger.error(u"No permission to"
962
u" bind to interface %s",
964
elif error[0] == errno.ENOPROTOOPT:
965
logger.error(u"SO_BINDTODEVICE not available;"
966
u" cannot bind to interface %s",
514
if self.settings["interface"]:
515
# 25 is from /usr/include/asm-i486/socket.h
516
SO_BINDTODEVICE = getattr(socket, "SO_BINDTODEVICE", 25)
518
self.socket.setsockopt(socket.SOL_SOCKET,
520
self.settings["interface"])
521
except socket.error, error:
522
if error[0] == errno.EPERM:
523
logger.error(u"No permission to"
524
u" bind to interface %s",
525
self.settings["interface"])
970
528
# Only bind(2) the socket if we really need to.
971
529
if self.server_address[0] or self.server_address[1]:
972
530
if not self.server_address[0]:
973
if self.address_family == socket.AF_INET6:
974
any_address = u"::" # in6addr_any
976
any_address = socket.INADDR_ANY
977
self.server_address = (any_address,
532
self.server_address = (in6addr_any,
978
533
self.server_address[1])
979
534
elif not self.server_address[1]:
980
535
self.server_address = (self.server_address[0],
537
# if self.settings["interface"]:
983
538
# self.server_address = (self.server_address[0],
988
return socketserver.TCPServer.server_bind(self)
989
def server_activate(self):
991
return socketserver.TCPServer.server_activate(self)
994
def handle_ipc(self, source, condition, file_objects={}):
996
gobject.IO_IN: u"IN", # There is data to read.
997
gobject.IO_OUT: u"OUT", # Data can be written (without
999
gobject.IO_PRI: u"PRI", # There is urgent data to read.
1000
gobject.IO_ERR: u"ERR", # Error condition.
1001
gobject.IO_HUP: u"HUP" # Hung up (the connection has been
1002
# broken, usually for pipes and
1005
conditions_string = ' | '.join(name
1007
condition_names.iteritems()
1008
if cond & condition)
1009
logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
1012
# Turn the pipe file descriptor into a Python file object
1013
if source not in file_objects:
1014
file_objects[source] = os.fdopen(source, u"r", 1)
1016
# Read a line from the file object
1017
cmdline = file_objects[source].readline()
1018
if not cmdline: # Empty line means end of file
1019
# close the IPC pipe
1020
file_objects[source].close()
1021
del file_objects[source]
1023
# Stop calling this function
1026
logger.debug(u"IPC command: %r", cmdline)
1028
# Parse and act on command
1029
cmd, args = cmdline.rstrip(u"\r\n").split(None, 1)
1031
if cmd == u"NOTFOUND":
1032
logger.warning(u"Client not found for fingerprint: %s",
1036
mandos_dbus_service.ClientNotFound(args)
1037
elif cmd == u"INVALID":
1038
for client in self.clients:
1039
if client.name == args:
1040
logger.warning(u"Client %s is invalid", args)
1046
logger.error(u"Unknown client %s is invalid", args)
1047
elif cmd == u"SENDING":
1048
for client in self.clients:
1049
if client.name == args:
1050
logger.info(u"Sending secret to %s", client.name)
1054
client.ReceivedSecret()
1057
logger.error(u"Sending secret to unknown client %s",
1060
logger.error(u"Unknown IPC command: %r", cmdline)
1062
# Keep calling this function
544
return super(type(self), self).server_bind()
1066
547
def string_to_delta(interval):
1067
548
"""Parse a string and return a datetime.timedelta
1069
>>> string_to_delta(u'7d')
550
>>> string_to_delta('7d')
1070
551
datetime.timedelta(7)
1071
>>> string_to_delta(u'60s')
552
>>> string_to_delta('60s')
1072
553
datetime.timedelta(0, 60)
1073
>>> string_to_delta(u'60m')
554
>>> string_to_delta('60m')
1074
555
datetime.timedelta(0, 3600)
1075
>>> string_to_delta(u'24h')
556
>>> string_to_delta('24h')
1076
557
datetime.timedelta(1)
1077
558
>>> string_to_delta(u'1w')
1078
559
datetime.timedelta(7)
1079
>>> string_to_delta(u'5m 30s')
1080
datetime.timedelta(0, 330)
1082
timevalue = datetime.timedelta(0)
1083
for s in interval.split():
1085
suffix = unicode(s[-1])
1088
delta = datetime.timedelta(value)
1089
elif suffix == u"s":
1090
delta = datetime.timedelta(0, value)
1091
elif suffix == u"m":
1092
delta = datetime.timedelta(0, 0, 0, 0, value)
1093
elif suffix == u"h":
1094
delta = datetime.timedelta(0, 0, 0, 0, 0, value)
1095
elif suffix == u"w":
1096
delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
1099
except (ValueError, IndexError):
562
suffix=unicode(interval[-1])
563
value=int(interval[:-1])
565
delta = datetime.timedelta(value)
567
delta = datetime.timedelta(0, value)
569
delta = datetime.timedelta(0, 0, 0, 0, value)
571
delta = datetime.timedelta(0, 0, 0, 0, 0, value)
573
delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
1100
575
raise ValueError
576
except (ValueError, IndexError):
581
def server_state_changed(state):
582
"""Derived from the Avahi example code"""
583
if state == avahi.SERVER_COLLISION:
584
logger.error(u"Server name collision")
586
elif state == avahi.SERVER_RUNNING:
590
def entry_group_state_changed(state, error):
591
"""Derived from the Avahi example code"""
592
logger.debug(u"state change: %i", state)
594
if state == avahi.ENTRY_GROUP_ESTABLISHED:
595
logger.debug(u"Service established.")
596
elif state == avahi.ENTRY_GROUP_COLLISION:
597
logger.warning(u"Service name collision.")
599
elif state == avahi.ENTRY_GROUP_FAILURE:
600
logger.critical(u"Error in group state changed %s",
602
raise AvahiGroupError("State changed: %s", str(error))
1105
604
def if_nametoindex(interface):
1106
"""Call the C function if_nametoindex(), or equivalent
1108
Note: This function cannot accept a unicode string."""
605
"""Call the C function if_nametoindex(), or equivalent"""
1109
606
global if_nametoindex
1111
if_nametoindex = (ctypes.cdll.LoadLibrary
1112
(ctypes.util.find_library(u"c"))
608
if "ctypes.util" not in sys.modules:
610
if_nametoindex = ctypes.cdll.LoadLibrary\
611
(ctypes.util.find_library("c")).if_nametoindex
1114
612
except (OSError, AttributeError):
1115
logger.warning(u"Doing if_nametoindex the hard way")
613
if "struct" not in sys.modules:
615
if "fcntl" not in sys.modules:
1116
617
def if_nametoindex(interface):
1117
618
"Get an interface index the hard way, i.e. using fcntl()"
1118
619
SIOCGIFINDEX = 0x8933 # From /usr/include/linux/sockios.h
1119
with closing(socket.socket()) as s:
1120
ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
1121
struct.pack(str(u"16s16x"),
1123
interface_index = struct.unpack(str(u"I"),
621
ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
622
struct.pack("16s16x", interface))
624
interface_index = struct.unpack("I", ifreq[16:20])[0]
1125
625
return interface_index
1126
626
return if_nametoindex(interface)
1129
629
def daemon(nochdir = False, noclose = False):
1130
630
"""See daemon(3). Standard BSD Unix function.
1132
631
This should really exist as os.daemon, but it doesn't (yet)."""
1190
683
# Default values for config file for server-global settings
1191
server_defaults = { u"interface": u"",
1196
u"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
1197
u"servicename": u"Mandos",
1198
u"use_dbus": u"True",
1199
u"use_ipv6": u"True",
684
server_defaults = { "interface": "",
689
"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
690
"servicename": "Mandos",
1202
693
# Parse config file for server-global settings
1203
server_config = configparser.SafeConfigParser(server_defaults)
694
server_config = ConfigParser.SafeConfigParser(server_defaults)
1204
695
del server_defaults
1205
server_config.read(os.path.join(options.configdir,
696
server_config.read(os.path.join(options.configdir, "mandos.conf"))
697
server_section = "server"
1207
698
# Convert the SafeConfigParser object to a dict
1208
server_settings = server_config.defaults()
1209
# Use the appropriate methods on the non-string config options
1210
for option in (u"debug", u"use_dbus", u"use_ipv6"):
1211
server_settings[option] = server_config.getboolean(u"DEFAULT",
1213
if server_settings["port"]:
1214
server_settings["port"] = server_config.getint(u"DEFAULT",
699
server_settings = dict(server_config.items(server_section))
700
# Use getboolean on the boolean config option
701
server_settings["debug"] = server_config.getboolean\
702
(server_section, "debug")
1216
703
del server_config
1218
705
# Override the settings from the config file with command line
1219
706
# options, if set.
1220
for option in (u"interface", u"address", u"port", u"debug",
1221
u"priority", u"servicename", u"configdir",
1222
u"use_dbus", u"use_ipv6"):
707
for option in ("interface", "address", "port", "debug",
708
"priority", "servicename", "configdir"):
1223
709
value = getattr(options, option)
1224
710
if value is not None:
1225
711
server_settings[option] = value
1227
# Force all strings to be unicode
1228
for option in server_settings.keys():
1229
if type(server_settings[option]) is str:
1230
server_settings[option] = unicode(server_settings[option])
1231
713
# Now we have our good server settings in "server_settings"
1233
##################################################################
1236
debug = server_settings[u"debug"]
1237
use_dbus = server_settings[u"use_dbus"]
1238
use_ipv6 = server_settings[u"use_ipv6"]
715
debug = server_settings["debug"]
1241
718
syslogger.setLevel(logging.WARNING)
1242
console.setLevel(logging.WARNING)
1244
if server_settings[u"servicename"] != u"Mandos":
1245
syslogger.setFormatter(logging.Formatter
1246
(u'Mandos (%s) [%%(process)d]:'
1247
u' %%(levelname)s: %%(message)s'
1248
% server_settings[u"servicename"]))
720
if server_settings["servicename"] != "Mandos":
721
syslogger.setFormatter(logging.Formatter\
722
('Mandos (%s): %%(levelname)s:'
724
% server_settings["servicename"]))
1250
726
# Parse config file with clients
1251
client_defaults = { u"timeout": u"1h",
1253
u"checker": u"fping -q -- %%(host)s",
727
client_defaults = { "timeout": "1h",
729
"checker": "fping -q -- %%(host)s",
1256
client_config = configparser.SafeConfigParser(client_defaults)
1257
client_config.read(os.path.join(server_settings[u"configdir"],
1260
global mandos_dbus_service
1261
mandos_dbus_service = None
1264
tcp_server = IPv6_TCPServer((server_settings[u"address"],
1265
server_settings[u"port"]),
1268
server_settings[u"interface"],
1272
server_settings[u"priority"],
1274
pidfilename = u"/var/run/mandos.pid"
1276
pidfile = open(pidfilename, u"w")
1278
logger.error(u"Could not open file %r", pidfilename)
1281
uid = pwd.getpwnam(u"_mandos").pw_uid
1282
gid = pwd.getpwnam(u"_mandos").pw_gid
1285
uid = pwd.getpwnam(u"mandos").pw_uid
1286
gid = pwd.getpwnam(u"mandos").pw_gid
1289
uid = pwd.getpwnam(u"nobody").pw_uid
1290
gid = pwd.getpwnam(u"nobody").pw_gid
1297
except OSError, error:
1298
if error[0] != errno.EPERM:
1301
# Enable all possible GnuTLS debugging
1303
# "Use a log level over 10 to enable all debugging options."
1305
gnutls.library.functions.gnutls_global_set_log_level(11)
1307
@gnutls.library.types.gnutls_log_func
1308
def debug_gnutls(level, string):
1309
logger.debug(u"GnuTLS: %s", string[:-1])
1311
(gnutls.library.functions
1312
.gnutls_global_set_log_function(debug_gnutls))
731
client_config = ConfigParser.SafeConfigParser(client_defaults)
732
client_config.read(os.path.join(server_settings["configdir"],
736
service = AvahiService(name = server_settings["servicename"],
737
type = "_mandos._tcp", );
738
if server_settings["interface"]:
739
service.interface = if_nametoindex(server_settings["interface"])
1314
741
global main_loop
1315
744
# From the Avahi example code
1316
745
DBusGMainLoop(set_as_default=True )
1317
746
main_loop = gobject.MainLoop()
1318
747
bus = dbus.SystemBus()
748
server = dbus.Interface(
749
bus.get_object( avahi.DBUS_NAME, avahi.DBUS_PATH_SERVER ),
750
avahi.DBUS_INTERFACE_SERVER )
1319
751
# End of Avahi example code
1321
bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos", bus)
1322
protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
1323
service = AvahiService(name = server_settings[u"servicename"],
1324
servicetype = u"_mandos._tcp",
1325
protocol = protocol, bus = bus)
1326
if server_settings["interface"]:
1327
service.interface = (if_nametoindex
1328
(str(server_settings[u"interface"])))
1330
client_class = Client
1332
client_class = functools.partial(ClientDBus, bus = bus)
1334
client_class(name = section,
1335
config= dict(client_config.items(section)))
1336
for section in client_config.sections()))
754
console = logging.StreamHandler()
755
# console.setLevel(logging.DEBUG)
756
console.setFormatter(logging.Formatter\
757
('%(levelname)s: %(message)s'))
758
logger.addHandler(console)
762
def remove_from_clients(client):
763
clients.remove(client)
765
logger.critical(u"No clients left, exiting")
768
clients.update(Set(Client(name = section,
769
stop_hook = remove_from_clients,
771
= dict(client_config.items(section)))
772
for section in client_config.sections()))
1338
logger.warning(u"No clients defined")
774
logger.critical(u"No clients defined")
1341
# Redirect stdin so all checkers get /dev/null
1342
null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
1343
os.dup2(null, sys.stdin.fileno())
1347
# No console logging
1348
logger.removeHandler(console)
1349
# Close all input and output, do double fork, etc.
780
pidfilename = "/var/run/mandos/mandos.pid"
1353
with closing(pidfile):
1355
pidfile.write(str(pid) + "\n")
783
pidfile = open(pidfilename, "w")
784
pidfile.write(str(pid) + "\n")
1358
logger.error(u"Could not write to file %r with PID %d",
1361
# "pidfile" was never created
788
logger.error(u"Could not write %s file with PID %d",
789
pidfilename, os.getpid())
1366
792
"Cleanup function; run on exit"
794
# From the Avahi example code
795
if not group is None:
798
# End of Avahi example code
1370
801
client = clients.pop()
1371
client.disable_hook = None
802
client.stop_hook = None
1374
805
atexit.register(cleanup)