/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to server.py

  • Committer: Teddy Hogeborn
  • Date: 2008-07-29 03:35:39 UTC
  • Revision ID: teddy@fukt.bsnet.se-20080729033539-08zecoj3jwlkpjhw
* server.conf: New file.

* mandos-clients.conf: Renamed to clients.conf.

* Makefile (FORTIFY): New.
  (CFLAGS): Include $(FORTIFY).

* plugins.d/mandosclient.c (main): New "if_index" variable.  Bug fix:
                                   check if interface exists.  New
                                   "--connect" option.

* server.py (serviceInterface): Removed; replaced by
                                "AvahiService.interface".  All users
                                changed.
  (AvahiError, AvahiServiceError, AvahiGroupError): New exception
                                                    classes.
  (AvahiService): New class.
  (serviceName): Removed; replaced by "AvahiService.name".  All users
                 changed.
  (serviceType): Removed; replaced by "AvahiService.type".  All users
                 changed.
  (servicePort): Removed; replaced by "AvahiService.port".  All users
                 changed.
  (serviceTXT): Removed; replaced by "AvahiService.TXT".  All users
                changed.
  (domain): Removed; replaced by "AvahiService.domain".  All users
            changed.
  (host): Removed; replaced by "AvahiService.host".  All users
          changed.
  (rename_count): Removed; replaced by "AvahiService.rename_count" and
                 "AvahiService.max_renames".  All users changed.
  (Client.__init__): If no secret or secfile, raise TypeError instead
                     of RuntimeError.
  (Client.last_seen): Renamed to "Client.last_checked_ok".  All users
                      changed.
  (Client.stop, Client.stop_checker): Use "getattr" with default value
                                      instead of "hasattr".
  (Client.still_valid): Removed "now" argument.
  (Client.handle): Separate the "no client found" and "client invalid"
                   cases for clearer code.
  (IPv6_TCPServer.__init__): "options" argument replaced by
                             "settings".  All callers changed.
  (IPv6_TCPServer.options): Replaced by "IPv6_TCPServer.settings".
                            All users changed.
  (IPv6_TCPServer.server_bind): Use getattr instead of hasattr.
  (add_service): Removed; replaced by "AvahiService.add".  All callers
                 changed.
  (remove_service): Removed; replaced by "AvahiService.remove".  All
                    callers changed.
  (entry_group_state_changed): On entry group collision, call the new
                               AvahiService.rename method.  Raise
                               AvahiGroupError on group error.
  (if_nametoindex): Use ctypes.utils.find_library to locate the C
                    library.  Cache the result.  Loop on EINTR.
  (daemon): Use os.path.devnull to locate "/dev/null".
  (killme): Removed.  All callers changed to do "sys.exit()" instead,
            except where stated otherwise.
  (main): Removed "exitstatus".  Removed all default values from all
          non-bool options.  New option "--configdir".  New variables
          "server_defaults" and "server_settings", read from
          "%(configdir)s/server.conf".  Let any supplied command line
          options override server settings.   Variable "defaults"
          renamed to "client_defaults", which is read from
          "clients.conf" instead of "mandos-clients.conf".  New global
          AvahiService object "service" replaces old global variables.
          Catch AvahiError and exit with error if caught.

Show diffs side-by-side

added added

removed removed

Lines of Context:
6
6
# This program is partly derived from an example program for an Avahi
7
7
# service publisher, downloaded from
8
8
# <http://avahi.org/wiki/PythonPublishExample>.  This includes the
9
 
# methods "add" and "remove" in the "AvahiService" class, the
10
 
# "server_state_changed" and "entry_group_state_changed" functions,
11
 
# and some lines in "main".
 
9
# following functions: "AvahiService.add", "AvahiService.remove",
 
10
# "server_state_changed", "entry_group_state_changed", and some lines
 
11
# in "main".
12
12
13
13
# Everything else is
14
14
# Copyright © 2007-2008 Teddy Hogeborn & Björn Påhlsson
24
24
#     GNU General Public License for more details.
25
25
26
26
# You should have received a copy of the GNU General Public License
27
 
# along with this program.  If not, see
28
 
# <http://www.gnu.org/licenses/>.
 
27
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
29
28
30
29
# Contact the authors at <mandos@fukt.bsnet.se>.
31
30
62
61
from dbus.mainloop.glib import DBusGMainLoop
63
62
import ctypes
64
63
 
65
 
version = "1.0"
 
64
# Brief description of the operation of this program:
 
65
 
66
# This server announces itself as a Zeroconf service.  Connecting
 
67
# clients use the TLS protocol, with the unusual quirk that this
 
68
# server program acts as a TLS "client" while a connecting client acts
 
69
# as a TLS "server".  The client (acting as a TLS "server") must
 
70
# supply an OpenPGP certificate, and the fingerprint of this
 
71
# certificate is used by this server to look up (in a list read from a
 
72
# file at start time) which binary blob to give the client.  No other
 
73
# authentication or authorization is done by this server.
 
74
 
66
75
 
67
76
logger = logging.Logger('mandos')
68
77
syslogger = logging.handlers.SysLogHandler\
69
 
            (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
70
 
             address = "/dev/log")
 
78
            (facility = logging.handlers.SysLogHandler.LOG_DAEMON)
71
79
syslogger.setFormatter(logging.Formatter\
72
 
                        ('Mandos: %(levelname)s: %(message)s'))
 
80
                        ('%(levelname)s: %(message)s'))
73
81
logger.addHandler(syslogger)
 
82
del syslogger
74
83
 
75
 
console = logging.StreamHandler()
76
 
console.setFormatter(logging.Formatter('%(name)s: %(levelname)s:'
77
 
                                       ' %(message)s'))
78
 
logger.addHandler(console)
79
84
 
80
85
class AvahiError(Exception):
81
86
    def __init__(self, value):
91
96
 
92
97
 
93
98
class AvahiService(object):
94
 
    """An Avahi (Zeroconf) service.
95
 
    Attributes:
 
99
    """
96
100
    interface: integer; avahi.IF_UNSPEC or an interface index.
97
101
               Used to optionally bind to the specified interface.
98
 
    name: string; Example: 'Mandos'
99
 
    type: string; Example: '_mandos._tcp'.
100
 
                  See <http://www.dns-sd.org/ServiceTypes.html>
101
 
    port: integer; what port to announce
102
 
    TXT: list of strings; TXT record for the service
103
 
    domain: string; Domain to publish on, default to .local if empty.
104
 
    host: string; Host to publish records for, default is localhost
105
 
    max_renames: integer; maximum number of renames
106
 
    rename_count: integer; counter so we only rename after collisions
107
 
                  a sensible number of times
 
102
    name = string; Example: "Mandos"
 
103
    type = string; Example: "_mandos._tcp".
 
104
                   See <http://www.dns-sd.org/ServiceTypes.html>
 
105
    port = integer; what port to announce
 
106
    TXT = list of strings; TXT record for the service
 
107
    domain = string; Domain to publish on, default to .local if empty.
 
108
    host = string; Host to publish records for, default to localhost
 
109
                   if empty.
 
110
    max_renames = integer; maximum number of renames
 
111
    rename_count = integer; counter so we only rename after collisions
 
112
                   a sensible number of times
108
113
    """
109
114
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
110
115
                 type = None, port = None, TXT = None, domain = "",
111
 
                 host = "", max_renames = 32768):
 
116
                 host = "", max_renames = 12):
 
117
        """An Avahi (Zeroconf) service. """
112
118
        self.interface = interface
113
119
        self.name = name
114
120
        self.type = type
120
126
        self.domain = domain
121
127
        self.host = host
122
128
        self.rename_count = 0
123
 
        self.max_renames = max_renames
124
129
    def rename(self):
125
130
        """Derived from the Avahi example code"""
126
131
        if self.rename_count >= self.max_renames:
127
 
            logger.critical(u"No suitable Zeroconf service name found"
128
 
                            u" after %i retries, exiting.",
129
 
                            rename_count)
 
132
            logger.critical(u"No suitable service name found after %i"
 
133
                            u" retries, exiting.", rename_count)
130
134
            raise AvahiServiceError("Too many renames")
131
 
        self.name = server.GetAlternativeServiceName(self.name)
132
 
        logger.info(u"Changing Zeroconf service name to %r ...",
133
 
                    str(self.name))
134
 
        syslogger.setFormatter(logging.Formatter\
135
 
                               ('Mandos (%s): %%(levelname)s:'
136
 
                               ' %%(message)s' % self.name))
 
135
        name = server.GetAlternativeServiceName(name)
 
136
        logger.notice(u"Changing name to %r ...", name)
137
137
        self.remove()
138
138
        self.add()
139
139
        self.rename_count += 1
151
151
                     avahi.DBUS_INTERFACE_ENTRY_GROUP)
152
152
            group.connect_to_signal('StateChanged',
153
153
                                    entry_group_state_changed)
154
 
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
 
154
        logger.debug(u"Adding service '%s' of type '%s' ...",
155
155
                     service.name, service.type)
156
156
        group.AddService(
157
157
                self.interface,         # interface
175
175
    fingerprint: string (40 or 32 hexadecimal digits); used to
176
176
                 uniquely identify the client
177
177
    secret:    bytestring; sent verbatim (over TLS) to client
178
 
    host:      string; available for use by the checker command
 
178
    fqdn:      string (FQDN); available for use by the checker command
179
179
    created:   datetime.datetime(); object creation, not client host
180
180
    last_checked_ok: datetime.datetime() or None if not yet checked OK
181
181
    timeout:   datetime.timedelta(); How long from last_checked_ok
221
221
    interval = property(lambda self: self._interval,
222
222
                        _set_interval)
223
223
    del _set_interval
224
 
    def __init__(self, name = None, stop_hook=None, config={}):
225
 
        """Note: the 'checker' key in 'config' sets the
226
 
        'checker_command' attribute and *not* the 'checker'
227
 
        attribute."""
 
224
    def __init__(self, name=None, stop_hook=None, fingerprint=None,
 
225
                 secret=None, secfile=None, fqdn=None, timeout=None,
 
226
                 interval=-1, checker=None):
 
227
        """Note: the 'checker' argument sets the 'checker_command'
 
228
        attribute and not the 'checker' attribute.."""
228
229
        self.name = name
229
230
        logger.debug(u"Creating client %r", self.name)
230
 
        # Uppercase and remove spaces from fingerprint for later
231
 
        # comparison purposes with return value from the fingerprint()
232
 
        # function
233
 
        self.fingerprint = config["fingerprint"].upper()\
234
 
                           .replace(u" ", u"")
 
231
        # Uppercase and remove spaces from fingerprint
 
232
        # for later comparison purposes with return value of
 
233
        # the fingerprint() function
 
234
        self.fingerprint = fingerprint.upper().replace(u" ", u"")
235
235
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
236
 
        if "secret" in config:
237
 
            self.secret = config["secret"].decode(u"base64")
238
 
        elif "secfile" in config:
239
 
            sf = open(config["secfile"])
 
236
        if secret:
 
237
            self.secret = secret.decode(u"base64")
 
238
        elif secfile:
 
239
            sf = open(secfile)
240
240
            self.secret = sf.read()
241
241
            sf.close()
242
242
        else:
243
243
            raise TypeError(u"No secret or secfile for client %s"
244
244
                            % self.name)
245
 
        self.host = config.get("host", "")
 
245
        self.fqdn = fqdn
246
246
        self.created = datetime.datetime.now()
247
247
        self.last_checked_ok = None
248
 
        self.timeout = string_to_delta(config["timeout"])
249
 
        self.interval = string_to_delta(config["interval"])
 
248
        self.timeout = string_to_delta(timeout)
 
249
        self.interval = string_to_delta(interval)
250
250
        self.stop_hook = stop_hook
251
251
        self.checker = None
252
252
        self.checker_initiator_tag = None
253
253
        self.stop_initiator_tag = None
254
254
        self.checker_callback_tag = None
255
 
        self.check_command = config["checker"]
 
255
        self.check_command = checker
256
256
    def start(self):
257
257
        """Start this client's checker and timeout hooks"""
258
258
        # Schedule a new checker to be started an 'interval' from now,
271
271
        The possibility that a client might be restarted is left open,
272
272
        but not currently used."""
273
273
        # If this client doesn't have a secret, it is already stopped.
274
 
        if hasattr(self, "secret") and self.secret:
275
 
            logger.info(u"Stopping client %s", self.name)
 
274
        if self.secret:
 
275
            logger.debug(u"Stopping client %s", self.name)
276
276
            self.secret = None
277
277
        else:
278
278
            return False
297
297
        self.checker = None
298
298
        if os.WIFEXITED(condition) \
299
299
               and (os.WEXITSTATUS(condition) == 0):
300
 
            logger.info(u"Checker for %(name)s succeeded",
301
 
                        vars(self))
 
300
            logger.debug(u"Checker for %(name)s succeeded",
 
301
                         vars(self))
302
302
            self.last_checked_ok = now
303
303
            gobject.source_remove(self.stop_initiator_tag)
304
304
            self.stop_initiator_tag = gobject.timeout_add\
308
308
            logger.warning(u"Checker for %(name)s crashed?",
309
309
                           vars(self))
310
310
        else:
311
 
            logger.info(u"Checker for %(name)s failed",
312
 
                        vars(self))
 
311
            logger.debug(u"Checker for %(name)s failed",
 
312
                         vars(self))
313
313
    def start_checker(self):
314
314
        """Start a new checker subprocess if one is not running.
315
315
        If a checker already exists, leave it running and do
325
325
        if self.checker is None:
326
326
            try:
327
327
                # In case check_command has exactly one % operator
328
 
                command = self.check_command % self.host
 
328
                command = self.check_command % self.fqdn
329
329
            except TypeError:
330
330
                # Escape attributes for the shell
331
331
                escaped_attrs = dict((key, re.escape(str(val)))
338
338
                                 u' %s', self.check_command, error)
339
339
                    return True # Try again later
340
340
            try:
341
 
                logger.info(u"Starting checker %r for %s",
342
 
                            command, self.name)
343
 
                # We don't need to redirect stdout and stderr, since
344
 
                # in normal mode, that is already done by daemon(),
345
 
                # and in debug mode we don't want to.  (Stdin is
346
 
                # always replaced by /dev/null.)
 
341
                logger.debug(u"Starting checker %r for %s",
 
342
                             command, self.name)
347
343
                self.checker = subprocess.Popen(command,
348
344
                                                close_fds=True,
349
345
                                                shell=True, cwd="/")
350
346
                self.checker_callback_tag = gobject.child_watch_add\
351
347
                                            (self.checker.pid,
352
348
                                             self.checker_callback)
353
 
            except OSError, error:
 
349
            except subprocess.OSError, error:
354
350
                logger.error(u"Failed to start subprocess: %s",
355
351
                             error)
356
352
        # Re-run this periodically if run by gobject.timeout_add
362
358
            self.checker_callback_tag = None
363
359
        if getattr(self, "checker", None) is None:
364
360
            return
365
 
        logger.debug(u"Stopping checker for %(name)s", vars(self))
 
361
        logger.debug("Stopping checker for %(name)s", vars(self))
366
362
        try:
367
363
            os.kill(self.checker.pid, signal.SIGTERM)
368
364
            #os.sleep(0.5)
400
396
 
401
397
def fingerprint(openpgp):
402
398
    "Convert an OpenPGP bytestring to a hexdigit fingerprint string"
 
399
    # New empty GnuTLS certificate
 
400
    crt = gnutls.library.types.gnutls_openpgp_crt_t()
 
401
    gnutls.library.functions.gnutls_openpgp_crt_init\
 
402
        (ctypes.byref(crt))
403
403
    # New GnuTLS "datum" with the OpenPGP public key
404
404
    datum = gnutls.library.types.gnutls_datum_t\
405
405
        (ctypes.cast(ctypes.c_char_p(openpgp),
406
406
                     ctypes.POINTER(ctypes.c_ubyte)),
407
407
         ctypes.c_uint(len(openpgp)))
408
 
    # New empty GnuTLS certificate
409
 
    crt = gnutls.library.types.gnutls_openpgp_crt_t()
410
 
    gnutls.library.functions.gnutls_openpgp_crt_init\
411
 
        (ctypes.byref(crt))
412
408
    # Import the OpenPGP public key into the certificate
413
 
    gnutls.library.functions.gnutls_openpgp_crt_import\
414
 
                    (crt, ctypes.byref(datum),
415
 
                     gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
416
 
    # Verify the self signature in the key
417
 
    crtverify = ctypes.c_uint();
418
 
    gnutls.library.functions.gnutls_openpgp_crt_verify_self\
419
 
        (crt, 0, ctypes.byref(crtverify))
420
 
    if crtverify.value != 0:
421
 
        gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
422
 
        raise gnutls.errors.CertificateSecurityError("Verify failed")
 
409
    ret = gnutls.library.functions.gnutls_openpgp_crt_import\
 
410
        (crt,
 
411
         ctypes.byref(datum),
 
412
         gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
423
413
    # New buffer for the fingerprint
424
414
    buffer = ctypes.create_string_buffer(20)
425
415
    buffer_length = ctypes.c_size_t()
441
431
    Note: This will run in its own forked process."""
442
432
    
443
433
    def handle(self):
444
 
        logger.info(u"TCP connection from: %s",
 
434
        logger.debug(u"TCP connection from: %s",
445
435
                     unicode(self.client_address))
446
436
        session = gnutls.connection.ClientSession\
447
437
                  (self.request, gnutls.connection.X509Credentials())
448
 
        
449
 
        line = self.request.makefile().readline()
450
 
        logger.debug(u"Protocol version: %r", line)
451
 
        try:
452
 
            if int(line.strip().split()[0]) > 1:
453
 
                raise RuntimeError
454
 
        except (ValueError, IndexError, RuntimeError), error:
455
 
            logger.error(u"Unknown protocol version: %s", error)
456
 
            return
457
 
        
458
438
        # Note: gnutls.connection.X509Credentials is really a generic
459
439
        # GnuTLS certificate credentials object so long as no X.509
460
440
        # keys are added to it.  Therefore, we can use it here despite
473
453
        try:
474
454
            session.handshake()
475
455
        except gnutls.errors.GNUTLSError, error:
476
 
            logger.warning(u"Handshake failed: %s", error)
 
456
            logger.debug(u"Handshake failed: %s", error)
477
457
            # Do not run session.bye() here: the session is not
478
458
            # established.  Just abandon the request.
479
459
            return
480
460
        try:
481
461
            fpr = fingerprint(peer_certificate(session))
482
462
        except (TypeError, gnutls.errors.GNUTLSError), error:
483
 
            logger.warning(u"Bad certificate: %s", error)
 
463
            logger.debug(u"Bad certificate: %s", error)
484
464
            session.bye()
485
465
            return
486
466
        logger.debug(u"Fingerprint: %s", fpr)
490
470
                client = c
491
471
                break
492
472
        if not client:
493
 
            logger.warning(u"Client not found for fingerprint: %s",
494
 
                           fpr)
 
473
            logger.debug(u"Client not found for fingerprint: %s", fpr)
495
474
            session.bye()
496
475
            return
497
476
        # Have to check if client.still_valid(), since it is possible
498
477
        # that the client timed out while establishing the GnuTLS
499
478
        # session.
500
479
        if not client.still_valid():
501
 
            logger.warning(u"Client %(name)s is invalid",
502
 
                           vars(client))
 
480
            logger.debug(u"Client %(name)s is invalid", vars(client))
503
481
            session.bye()
504
482
            return
505
483
        sent_size = 0
531
509
        """This overrides the normal server_bind() function
532
510
        to bind to an interface if one was specified, and also NOT to
533
511
        bind to an address or port if they were not specified."""
534
 
        if self.settings["interface"]:
 
512
        if self.settings["interface"] != avahi.IF_UNSPEC:
535
513
            # 25 is from /usr/include/asm-i486/socket.h
536
514
            SO_BINDTODEVICE = getattr(socket, "SO_BINDTODEVICE", 25)
537
515
            try:
540
518
                                       self.settings["interface"])
541
519
            except socket.error, error:
542
520
                if error[0] == errno.EPERM:
543
 
                    logger.error(u"No permission to"
544
 
                                 u" bind to interface %s",
545
 
                                 self.settings["interface"])
 
521
                    logger.warning(u"No permission to"
 
522
                                   u" bind to interface %s",
 
523
                                   self.settings["interface"])
546
524
                else:
547
525
                    raise error
548
526
        # Only bind(2) the socket if we really need to.
551
529
                in6addr_any = "::"
552
530
                self.server_address = (in6addr_any,
553
531
                                       self.server_address[1])
554
 
            elif not self.server_address[1]:
 
532
            elif self.server_address[1] is None:
555
533
                self.server_address = (self.server_address[0],
556
534
                                       0)
557
 
#                 if self.settings["interface"]:
558
 
#                     self.server_address = (self.server_address[0],
559
 
#                                            0, # port
560
 
#                                            0, # flowinfo
561
 
#                                            if_nametoindex
562
 
#                                            (self.settings
563
 
#                                             ["interface"]))
564
535
            return super(type(self), self).server_bind()
565
536
 
566
537
 
577
548
    datetime.timedelta(1)
578
549
    >>> string_to_delta(u'1w')
579
550
    datetime.timedelta(7)
580
 
    >>> string_to_delta('5m 30s')
581
 
    datetime.timedelta(0, 330)
582
551
    """
583
 
    timevalue = datetime.timedelta(0)
584
 
    for s in interval.split():
585
 
        try:
586
 
            suffix=unicode(s[-1])
587
 
            value=int(s[:-1])
588
 
            if suffix == u"d":
589
 
                delta = datetime.timedelta(value)
590
 
            elif suffix == u"s":
591
 
                delta = datetime.timedelta(0, value)
592
 
            elif suffix == u"m":
593
 
                delta = datetime.timedelta(0, 0, 0, 0, value)
594
 
            elif suffix == u"h":
595
 
                delta = datetime.timedelta(0, 0, 0, 0, 0, value)
596
 
            elif suffix == u"w":
597
 
                delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
598
 
            else:
599
 
                raise ValueError
600
 
        except (ValueError, IndexError):
 
552
    try:
 
553
        suffix=unicode(interval[-1])
 
554
        value=int(interval[:-1])
 
555
        if suffix == u"d":
 
556
            delta = datetime.timedelta(value)
 
557
        elif suffix == u"s":
 
558
            delta = datetime.timedelta(0, value)
 
559
        elif suffix == u"m":
 
560
            delta = datetime.timedelta(0, 0, 0, 0, value)
 
561
        elif suffix == u"h":
 
562
            delta = datetime.timedelta(0, 0, 0, 0, 0, value)
 
563
        elif suffix == u"w":
 
564
            delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
 
565
        else:
601
566
            raise ValueError
602
 
        timevalue += delta
603
 
    return timevalue
 
567
    except (ValueError, IndexError):
 
568
        raise ValueError
 
569
    return delta
604
570
 
605
571
 
606
572
def server_state_changed(state):
607
573
    """Derived from the Avahi example code"""
608
574
    if state == avahi.SERVER_COLLISION:
609
 
        logger.error(u"Zeroconf server name collision")
 
575
        logger.warning(u"Server name collision")
610
576
        service.remove()
611
577
    elif state == avahi.SERVER_RUNNING:
612
578
        service.add()
614
580
 
615
581
def entry_group_state_changed(state, error):
616
582
    """Derived from the Avahi example code"""
617
 
    logger.debug(u"Avahi state change: %i", state)
 
583
    logger.debug(u"state change: %i", state)
618
584
    
619
585
    if state == avahi.ENTRY_GROUP_ESTABLISHED:
620
 
        logger.debug(u"Zeroconf service established.")
 
586
        logger.debug(u"Service established.")
621
587
    elif state == avahi.ENTRY_GROUP_COLLISION:
622
 
        logger.warning(u"Zeroconf service name collision.")
 
588
        logger.warning(u"Service name collision.")
623
589
        service.rename()
624
590
    elif state == avahi.ENTRY_GROUP_FAILURE:
625
 
        logger.critical(u"Avahi: Error in group state changed %s",
 
591
        logger.critical(u"Error in group state changed %s",
626
592
                        unicode(error))
627
593
        raise AvahiGroupError("State changed: %s", str(error))
628
594
 
629
 
def if_nametoindex(interface):
 
595
def if_nametoindex(interface, _func=[None]):
630
596
    """Call the C function if_nametoindex(), or equivalent"""
631
 
    global if_nametoindex
 
597
    if _func[0] is not None:
 
598
        return _func[0](interface)
632
599
    try:
633
600
        if "ctypes.util" not in sys.modules:
634
601
            import ctypes.util
635
 
        if_nametoindex = ctypes.cdll.LoadLibrary\
636
 
            (ctypes.util.find_library("c")).if_nametoindex
 
602
        while True:
 
603
            try:
 
604
                libc = ctypes.cdll.LoadLibrary\
 
605
                       (ctypes.util.find_library("c"))
 
606
                func[0] = libc.if_nametoindex
 
607
                return _func[0](interface)
 
608
            except IOError, e:
 
609
                if e != errno.EINTR:
 
610
                    raise
637
611
    except (OSError, AttributeError):
638
612
        if "struct" not in sys.modules:
639
613
            import struct
640
614
        if "fcntl" not in sys.modules:
641
615
            import fcntl
642
 
        def if_nametoindex(interface):
 
616
        def the_hard_way(interface):
643
617
            "Get an interface index the hard way, i.e. using fcntl()"
644
618
            SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
645
619
            s = socket.socket()
648
622
            s.close()
649
623
            interface_index = struct.unpack("I", ifreq[16:20])[0]
650
624
            return interface_index
651
 
    return if_nametoindex(interface)
652
 
 
653
 
 
654
 
def daemon(nochdir = False, noclose = False):
 
625
        _func[0] = the_hard_way
 
626
        return _func[0](interface)
 
627
 
 
628
 
 
629
def daemon(nochdir, noclose):
655
630
    """See daemon(3).  Standard BSD Unix function.
656
631
    This should really exist as os.daemon, but it doesn't (yet)."""
657
632
    if os.fork():
659
634
    os.setsid()
660
635
    if not nochdir:
661
636
        os.chdir("/")
662
 
    if os.fork():
663
 
        sys.exit()
664
637
    if not noclose:
665
638
        # Close all standard open file descriptors
666
639
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
678
651
    global main_loop_started
679
652
    main_loop_started = False
680
653
    
681
 
    parser = OptionParser(version = "%%prog %s" % version)
 
654
    parser = OptionParser()
682
655
    parser.add_option("-i", "--interface", type="string",
683
656
                      metavar="IF", help="Bind to interface IF")
684
657
    parser.add_option("-a", "--address", type="string",
687
660
                      help="Port number to receive requests on")
688
661
    parser.add_option("--check", action="store_true", default=False,
689
662
                      help="Run self-test")
690
 
    parser.add_option("--debug", action="store_true",
 
663
    parser.add_option("--debug", action="store_true", default=False,
691
664
                      help="Debug mode; run in foreground and log to"
692
665
                      " terminal")
693
666
    parser.add_option("--priority", type="string", help="GnuTLS"
718
691
    # Parse config file for server-global settings
719
692
    server_config = ConfigParser.SafeConfigParser(server_defaults)
720
693
    del server_defaults
721
 
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
 
694
    server_config.read(os.path.join(options.configdir, "server.conf"))
 
695
    server_section = "server"
722
696
    # Convert the SafeConfigParser object to a dict
723
 
    server_settings = server_config.defaults()
 
697
    server_settings = dict(server_config.items(server_section))
724
698
    # Use getboolean on the boolean config option
725
699
    server_settings["debug"] = server_config.getboolean\
726
 
                               ("DEFAULT", "debug")
 
700
                               (server_section, "debug")
727
701
    del server_config
 
702
    if not server_settings["interface"]:
 
703
        server_settings["interface"] = avahi.IF_UNSPEC
728
704
    
729
705
    # Override the settings from the config file with command line
730
706
    # options, if set.
736
712
    del options
737
713
    # Now we have our good server settings in "server_settings"
738
714
    
739
 
    debug = server_settings["debug"]
740
 
    
741
 
    if not debug:
742
 
        syslogger.setLevel(logging.WARNING)
743
 
        console.setLevel(logging.WARNING)
744
 
    
745
 
    if server_settings["servicename"] != "Mandos":
746
 
        syslogger.setFormatter(logging.Formatter\
747
 
                               ('Mandos (%s): %%(levelname)s:'
748
 
                                ' %%(message)s'
749
 
                                % server_settings["servicename"]))
750
 
    
751
715
    # Parse config file with clients
752
716
    client_defaults = { "timeout": "1h",
753
717
                        "interval": "5m",
754
 
                        "checker": "fping -q -- %(host)s",
755
 
                        "host": "",
 
718
                        "checker": "fping -q -- %%(fqdn)s",
756
719
                        }
757
720
    client_config = ConfigParser.SafeConfigParser(client_defaults)
758
721
    client_config.read(os.path.join(server_settings["configdir"],
761
724
    global service
762
725
    service = AvahiService(name = server_settings["servicename"],
763
726
                           type = "_mandos._tcp", );
764
 
    if server_settings["interface"]:
765
 
        service.interface = if_nametoindex\
766
 
                            (server_settings["interface"])
767
727
    
768
728
    global main_loop
769
729
    global bus
772
732
    DBusGMainLoop(set_as_default=True )
773
733
    main_loop = gobject.MainLoop()
774
734
    bus = dbus.SystemBus()
775
 
    server = dbus.Interface(bus.get_object(avahi.DBUS_NAME,
776
 
                                           avahi.DBUS_PATH_SERVER),
777
 
                            avahi.DBUS_INTERFACE_SERVER)
 
735
    server = dbus.Interface(
 
736
            bus.get_object( avahi.DBUS_NAME, avahi.DBUS_PATH_SERVER ),
 
737
            avahi.DBUS_INTERFACE_SERVER )
778
738
    # End of Avahi example code
779
739
    
 
740
    debug = server_settings["debug"]
 
741
    
 
742
    if debug:
 
743
        console = logging.StreamHandler()
 
744
        # console.setLevel(logging.DEBUG)
 
745
        console.setFormatter(logging.Formatter\
 
746
                             ('%(levelname)s: %(message)s'))
 
747
        logger.addHandler(console)
 
748
        del console
 
749
    
780
750
    clients = Set()
781
751
    def remove_from_clients(client):
782
752
        clients.remove(client)
783
753
        if not clients:
784
 
            logger.critical(u"No clients left, exiting")
 
754
            logger.debug(u"No clients left, exiting")
785
755
            sys.exit()
786
756
    
787
 
    clients.update(Set(Client(name = section,
 
757
    clients.update(Set(Client(name=section,
788
758
                              stop_hook = remove_from_clients,
789
 
                              config
790
 
                              = dict(client_config.items(section)))
 
759
                              **(dict(client_config\
 
760
                                      .items(section))))
791
761
                       for section in client_config.sections()))
792
 
    if not clients:
793
 
        logger.critical(u"No clients defined")
794
 
        sys.exit(1)
795
 
    
796
 
    if debug:
797
 
        # Redirect stdin so all checkers get /dev/null
798
 
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
799
 
        os.dup2(null, sys.stdin.fileno())
800
 
        if null > 2:
801
 
            os.close(null)
802
 
    else:
803
 
        # No console logging
804
 
        logger.removeHandler(console)
805
 
        # Close all input and output, do double fork, etc.
806
 
        daemon()
807
 
    
808
 
    pidfilename = "/var/run/mandos/mandos.pid"
809
 
    pid = os.getpid()
810
 
    try:
811
 
        pidfile = open(pidfilename, "w")
812
 
        pidfile.write(str(pid) + "\n")
813
 
        pidfile.close()
814
 
        del pidfile
815
 
    except IOError, err:
816
 
        logger.error(u"Could not write %s file with PID %d",
817
 
                     pidfilename, os.getpid())
 
762
    
 
763
    if not debug:
 
764
        daemon(False, False)
818
765
    
819
766
    def cleanup():
820
767
        "Cleanup function; run on exit"
847
794
                                clients=clients)
848
795
    # Find out what port we got
849
796
    service.port = tcp_server.socket.getsockname()[1]
850
 
    logger.info(u"Now listening on address %r, port %d, flowinfo %d,"
851
 
                u" scope_id %d" % tcp_server.socket.getsockname())
 
797
    logger.debug(u"Now listening on port %d", service.port)
852
798
    
853
 
    #service.interface = tcp_server.socket.getsockname()[3]
 
799
    if not server_settings["interface"]:
 
800
        service.interface = if_nametoindex\
 
801
                            (server_settings["interface"])
854
802
    
855
803
    try:
856
804
        # From the Avahi example code
867
815
                             tcp_server.handle_request\
868
816
                             (*args[2:], **kwargs) or True)
869
817
        
870
 
        logger.debug(u"Starting main loop")
 
818
        logger.debug("Starting main loop")
871
819
        main_loop_started = True
872
820
        main_loop.run()
873
821
    except AvahiError, error: