321
313
        self.checker_command = config[u"checker"]
 
322
314
        self.current_checker_command = None
 
323
315
        self.last_connect = None
 
324
 
        self._approved = None
 
325
 
        self.approved_by_default = config.get(u"approved_by_default",
 
327
 
        self.approvals_pending = 0
 
328
 
        self.approved_delay = string_to_delta(
 
329
 
            config[u"approved_delay"])
 
330
 
        self.approved_duration = string_to_delta(
 
331
 
            config[u"approved_duration"])
 
332
 
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
334
 
    def send_changedstate(self):
 
335
 
        self.changedstate.acquire()
 
336
 
        self.changedstate.notify_all()
 
337
 
        self.changedstate.release()
 
339
317
    def enable(self):
 
340
318
        """Start this client's checker and timeout hooks"""
 
341
319
        if getattr(self, u"enabled", False):
 
342
320
            # Already enabled
 
344
 
        self.send_changedstate()
 
345
322
        self.last_enabled = datetime.datetime.utcnow()
 
346
323
        # Schedule a new checker to be started an 'interval' from now,
 
347
324
        # and every interval from then on.
 
 
500
475
            if error.errno != errno.ESRCH: # No such process
 
502
477
        self.checker = None
 
 
479
    def still_valid(self):
 
 
480
        """Has the timeout not yet passed for this client?"""
 
 
481
        if not getattr(self, u"enabled", False):
 
 
483
        now = datetime.datetime.utcnow()
 
 
484
        if self.last_checked_ok is None:
 
 
485
            return now < (self.created + self.timeout)
 
 
487
            return now < (self.last_checked_ok + self.timeout)
 
504
490
def dbus_service_property(dbus_interface, signature=u"v",
 
505
491
                          access=u"readwrite", byte_arrays=False):
 
 
513
499
    dbus.service.method, except there is only "signature", since the
 
514
500
    type from Get() and the type sent to Set() is the same.
 
516
 
    # Encoding deeply encoded byte arrays is not supported yet by the
 
517
 
    # "Set" method, so we fail early here:
 
518
 
    if byte_arrays and signature != u"ay":
 
519
 
        raise ValueError(u"Byte arrays not supported for non-'ay'"
 
520
 
                         u" signature %r" % signature)
 
521
502
    def decorator(func):
 
522
503
        func._dbus_is_property = True
 
523
504
        func._dbus_interface = dbus_interface
 
 
710
686
                                  + self.name.replace(u".", u"_")))
 
711
687
        DBusObjectWithProperties.__init__(self, self.bus,
 
712
688
                                          self.dbus_object_path)
 
714
 
    def _get_approvals_pending(self):
 
715
 
        return self._approvals_pending
 
716
 
    def _set_approvals_pending(self, value):
 
717
 
        old_value = self._approvals_pending
 
718
 
        self._approvals_pending = value
 
720
 
        if (hasattr(self, "dbus_object_path")
 
721
 
            and bval is not bool(old_value)):
 
722
 
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
723
 
            self.PropertyChanged(dbus.String(u"approved_pending"),
 
726
 
    approvals_pending = property(_get_approvals_pending,
 
727
 
                                 _set_approvals_pending)
 
728
 
    del _get_approvals_pending, _set_approvals_pending
 
731
691
    def _datetime_to_dbus(dt, variant_level=0):
 
 
820
780
            self.PropertyChanged(dbus.String(u"checker_running"),
 
821
781
                                 dbus.Boolean(False, variant_level=1))
 
824
 
    def _reset_approved(self):
 
825
 
        self._approved = None
 
828
 
    def approve(self, value=True):
 
829
 
        self.send_changedstate()
 
830
 
        self._approved = value
 
831
 
        gobject.timeout_add(self._timedelta_to_milliseconds(self.approved_duration),
 
832
 
                            self._reset_approved)
 
835
 
    ## D-Bus methods, signals & properties
 
 
784
    ## D-Bus methods & signals
 
836
785
    _interface = u"se.bsnet.fukt.Mandos.Client"
 
 
788
    @dbus.service.method(_interface)
 
 
790
        return self.checked_ok()
 
840
792
    # CheckerCompleted - signal
 
841
793
    @dbus.service.signal(_interface, signature=u"nxs")
 
 
858
810
    # GotSecret - signal
 
859
811
    @dbus.service.signal(_interface)
 
860
812
    def GotSecret(self):
 
862
 
        Is sent after a successful transfer of secret from the Mandos
 
863
 
        server to mandos-client
 
867
816
    # Rejected - signal
 
868
 
    @dbus.service.signal(_interface, signature=u"s")
 
869
 
    def Rejected(self, reason):
 
873
 
    # NeedApproval - signal
 
874
 
    @dbus.service.signal(_interface, signature=u"db")
 
875
 
    def NeedApproval(self, timeout, default):
 
882
 
    @dbus.service.method(_interface, in_signature=u"b")
 
883
 
    def Approve(self, value):
 
887
 
    @dbus.service.method(_interface)
 
889
 
        return self.checked_ok()
 
 
817
    @dbus.service.signal(_interface)
 
891
822
    # Enable - method
 
892
823
    @dbus.service.method(_interface)
 
 
911
842
    def StopChecker(self):
 
912
843
        self.stop_checker()
 
916
 
    # approved_pending - property
 
917
 
    @dbus_service_property(_interface, signature=u"b", access=u"read")
 
918
 
    def approved_pending_dbus_property(self):
 
919
 
        return dbus.Boolean(bool(self.approvals_pending))
 
921
 
    # approved_by_default - property
 
922
 
    @dbus_service_property(_interface, signature=u"b",
 
924
 
    def approved_by_default_dbus_property(self):
 
925
 
        return dbus.Boolean(self.approved_by_default)
 
927
 
    # approved_delay - property
 
928
 
    @dbus_service_property(_interface, signature=u"t",
 
930
 
    def approved_delay_dbus_property(self):
 
931
 
        return dbus.UInt64(self.approved_delay_milliseconds())
 
933
 
    # approved_duration - property
 
934
 
    @dbus_service_property(_interface, signature=u"t",
 
936
 
    def approved_duration_dbus_property(self):
 
937
 
        return dbus.UInt64(self._timedelta_to_milliseconds(
 
938
 
                self.approved_duration))
 
940
845
    # name - property
 
941
846
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
942
847
    def name_dbus_property(self):
 
 
1079
 
class ProxyClient(object):
 
1080
 
    def __init__(self, child_pipe, fpr, address):
 
1081
 
        self._pipe = child_pipe
 
1082
 
        self._pipe.send(('init', fpr, address))
 
1083
 
        if not self._pipe.recv():
 
1086
 
    def __getattribute__(self, name):
 
1087
 
        if(name == '_pipe'):
 
1088
 
            return super(ProxyClient, self).__getattribute__(name)
 
1089
 
        self._pipe.send(('getattr', name))
 
1090
 
        data = self._pipe.recv()
 
1091
 
        if data[0] == 'data':
 
1093
 
        if data[0] == 'function':
 
1094
 
            def func(*args, **kwargs):
 
1095
 
                self._pipe.send(('funcall', name, args, kwargs))
 
1096
 
                return self._pipe.recv()[1]
 
1099
 
    def __setattr__(self, name, value):
 
1100
 
        if(name == '_pipe'):
 
1101
 
            return super(ProxyClient, self).__setattr__(name, value)
 
1102
 
        self._pipe.send(('setattr', name, value))
 
1105
984
class ClientHandler(socketserver.BaseRequestHandler, object):
 
1106
985
    """A class to handle client connections.
 
 
1109
988
    Note: This will run in its own forked process."""
 
1111
990
    def handle(self):
 
1112
 
        with contextlib.closing(self.server.child_pipe) as child_pipe:
 
1113
 
            logger.info(u"TCP connection from: %s",
 
1114
 
                        unicode(self.client_address))
 
1115
 
            logger.debug(u"Pipe FD: %d",
 
1116
 
                         self.server.child_pipe.fileno())
 
 
991
        logger.info(u"TCP connection from: %s",
 
 
992
                    unicode(self.client_address))
 
 
993
        logger.debug(u"IPC Pipe FD: %d", self.server.pipe[1])
 
 
994
        # Open IPC pipe to parent process
 
 
995
        with closing(os.fdopen(self.server.pipe[1], u"w", 1)) as ipc:
 
1118
996
            session = (gnutls.connection
 
1119
997
                       .ClientSession(self.request,
 
1120
998
                                      gnutls.connection
 
1121
999
                                      .X509Credentials()))
 
 
1001
            line = self.request.makefile().readline()
 
 
1002
            logger.debug(u"Protocol version: %r", line)
 
 
1004
                if int(line.strip().split()[0]) > 1:
 
 
1006
            except (ValueError, IndexError, RuntimeError), error:
 
 
1007
                logger.error(u"Unknown protocol version: %s", error)
 
1123
1010
            # Note: gnutls.connection.X509Credentials is really a
 
1124
1011
            # generic GnuTLS certificate credentials object so long as
 
1125
1012
            # no X.509 keys are added to it.  Therefore, we can use it
 
1126
1013
            # here despite using OpenPGP certificates.
 
1128
1015
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
 
1129
1016
            #                      u"+AES-256-CBC", u"+SHA1",
 
1130
1017
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
 
 
1136
1023
            (gnutls.library.functions
 
1137
1024
             .gnutls_priority_set_direct(session._c_object,
 
1138
1025
                                         priority, None))
 
1140
 
            # Start communication using the Mandos protocol
 
1141
 
            # Get protocol number
 
1142
 
            line = self.request.makefile().readline()
 
1143
 
            logger.debug(u"Protocol version: %r", line)
 
1145
 
                if int(line.strip().split()[0]) > 1:
 
1147
 
            except (ValueError, IndexError, RuntimeError), error:
 
1148
 
                logger.error(u"Unknown protocol version: %s", error)
 
1151
 
            # Start GnuTLS connection
 
1153
1028
                session.handshake()
 
1154
1029
            except gnutls.errors.GNUTLSError, error:
 
 
1157
1032
                # established.  Just abandon the request.
 
1159
1034
            logger.debug(u"Handshake succeeded")
 
1161
 
            approval_required = False
 
1164
 
                    fpr = self.fingerprint(self.peer_certificate
 
1166
 
                except (TypeError, gnutls.errors.GNUTLSError), error:
 
1167
 
                    logger.warning(u"Bad certificate: %s", error)
 
1169
 
                logger.debug(u"Fingerprint: %s", fpr)
 
1172
 
                    client = ProxyClient(child_pipe, fpr,
 
1173
 
                                         self.client_address)
 
1177
 
                if client.approved_delay:
 
1178
 
                    delay = client.approved_delay
 
1179
 
                    client.approvals_pending += 1
 
1180
 
                    approval_required = True
 
1183
 
                    if not client.enabled:
 
1184
 
                        logger.warning(u"Client %s is disabled",
 
1186
 
                        if self.server.use_dbus:
 
1188
 
                            client.Rejected("Disabled")                    
 
1191
 
                    if client._approved or not client.approved_delay:
 
1192
 
                        #We are approved or approval is disabled
 
1194
 
                    elif client._approved is None:
 
1195
 
                        logger.info(u"Client %s need approval",
 
1197
 
                        if self.server.use_dbus:
 
1199
 
                            client.NeedApproval(
 
1200
 
                                client.approved_delay_milliseconds(),
 
1201
 
                                client.approved_by_default)
 
1203
 
                        logger.warning(u"Client %s was not approved",
 
1205
 
                        if self.server.use_dbus:
 
1207
 
                            client.Rejected("Disapproved")
 
1210
 
                    #wait until timeout or approved
 
1211
 
                    #x = float(client._timedelta_to_milliseconds(delay))
 
1212
 
                    time = datetime.datetime.now()
 
1213
 
                    client.changedstate.acquire()
 
1214
 
                    client.changedstate.wait(float(client._timedelta_to_milliseconds(delay) / 1000))
 
1215
 
                    client.changedstate.release()
 
1216
 
                    time2 = datetime.datetime.now()
 
1217
 
                    if (time2 - time) >= delay:
 
1218
 
                        if not client.approved_by_default:
 
1219
 
                            logger.warning("Client %s timed out while"
 
1220
 
                                           " waiting for approval",
 
1222
 
                            if self.server.use_dbus:
 
1224
 
                                client.Rejected("Time out")
 
1229
 
                        delay -= time2 - time
 
1232
 
                while sent_size < len(client.secret):
 
1234
 
                        sent = session.send(client.secret[sent_size:])
 
1235
 
                    except (gnutls.errors.GNUTLSError), error:
 
1236
 
                        logger.warning("gnutls send failed")
 
1238
 
                    logger.debug(u"Sent: %d, remaining: %d",
 
1239
 
                                 sent, len(client.secret)
 
1240
 
                                 - (sent_size + sent))
 
1243
 
                logger.info(u"Sending secret to %s", client.name)
 
1244
 
                # bump the timeout as if seen
 
1246
 
                if self.server.use_dbus:
 
 
1036
                fpr = self.fingerprint(self.peer_certificate(session))
 
 
1037
            except (TypeError, gnutls.errors.GNUTLSError), error:
 
 
1038
                logger.warning(u"Bad certificate: %s", error)
 
 
1041
            logger.debug(u"Fingerprint: %s", fpr)
 
1251
 
                if approval_required:
 
1252
 
                    client.approvals_pending -= 1
 
1255
 
                except (gnutls.errors.GNUTLSError), error:
 
1256
 
                    logger.warning("gnutls bye failed")
 
 
1043
            for c in self.server.clients:
 
 
1044
                if c.fingerprint == fpr:
 
 
1048
                ipc.write(u"NOTFOUND %s %s\n"
 
 
1049
                          % (fpr, unicode(self.client_address)))
 
 
1052
            # Have to check if client.still_valid(), since it is
 
 
1053
            # possible that the client timed out while establishing
 
 
1054
            # the GnuTLS session.
 
 
1055
            if not client.still_valid():
 
 
1056
                ipc.write(u"INVALID %s\n" % client.name)
 
 
1059
            ipc.write(u"SENDING %s\n" % client.name)
 
 
1061
            while sent_size < len(client.secret):
 
 
1062
                sent = session.send(client.secret[sent_size:])
 
 
1063
                logger.debug(u"Sent: %d, remaining: %d",
 
 
1064
                             sent, len(client.secret)
 
 
1065
                             - (sent_size + sent))
 
1259
1070
    def peer_certificate(session):
 
 
1322
 
class MultiprocessingMixIn(object):
 
1323
 
    """Like socketserver.ThreadingMixIn, but with multiprocessing"""
 
1324
 
    def sub_process_main(self, request, address):
 
1326
 
            self.finish_request(request, address)
 
1328
 
            self.handle_error(request, address)
 
1329
 
        self.close_request(request)
 
1331
 
    def process_request(self, request, address):
 
1332
 
        """Start a new process to process the request."""
 
1333
 
        multiprocessing.Process(target = self.sub_process_main,
 
1334
 
                                args = (request, address)).start()
 
1336
 
class MultiprocessingMixInWithPipe(MultiprocessingMixIn, object):
 
1337
 
    """ adds a pipe to the MixIn """
 
 
1133
class ForkingMixInWithPipe(socketserver.ForkingMixIn, object):
 
 
1134
    """Like socketserver.ForkingMixIn, but also pass a pipe."""
 
1338
1135
    def process_request(self, request, client_address):
 
1339
1136
        """Overrides and wraps the original process_request().
 
1341
1138
        This function creates a new pipe in self.pipe
 
1343
 
        parent_pipe, self.child_pipe = multiprocessing.Pipe()
 
1345
 
        super(MultiprocessingMixInWithPipe,
 
 
1140
        self.pipe = os.pipe()
 
 
1141
        super(ForkingMixInWithPipe,
 
1346
1142
              self).process_request(request, client_address)
 
1347
 
        self.child_pipe.close()
 
1348
 
        self.add_pipe(parent_pipe)
 
1350
 
    def add_pipe(self, parent_pipe):
 
 
1143
        os.close(self.pipe[1])  # close write end
 
 
1144
        self.add_pipe(self.pipe[0])
 
 
1145
    def add_pipe(self, pipe):
 
1351
1146
        """Dummy function; override as necessary"""
 
1354
 
class IPv6_TCPServer(MultiprocessingMixInWithPipe,
 
 
1150
class IPv6_TCPServer(ForkingMixInWithPipe,
 
1355
1151
                     socketserver.TCPServer, object):
 
1356
1152
    """IPv6-capable TCP server.  Accepts 'None' as address and/or port
 
 
1442
1238
            return socketserver.TCPServer.server_activate(self)
 
1443
1239
    def enable(self):
 
1444
1240
        self.enabled = True
 
1445
 
    def add_pipe(self, parent_pipe):
 
 
1241
    def add_pipe(self, pipe):
 
1446
1242
        # Call "handle_ipc" for both data and EOF events
 
1447
 
        gobject.io_add_watch(parent_pipe.fileno(),
 
1448
 
                             gobject.IO_IN | gobject.IO_HUP,
 
1449
 
                             functools.partial(self.handle_ipc,
 
1450
 
                                               parent_pipe = parent_pipe))
 
1452
 
    def handle_ipc(self, source, condition, parent_pipe=None,
 
1453
 
                   client_object=None):
 
 
1243
        gobject.io_add_watch(pipe, gobject.IO_IN | gobject.IO_HUP,
 
 
1245
    def handle_ipc(self, source, condition, file_objects={}):
 
1454
1246
        condition_names = {
 
1455
1247
            gobject.IO_IN: u"IN",   # There is data to read.
 
1456
1248
            gobject.IO_OUT: u"OUT", # Data can be written (without
 
 
1467
1259
                                       if cond & condition)
 
1468
1260
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
 
1469
1261
                     conditions_string)
 
1471
 
        # error or the other end of multiprocessing.Pipe has closed
 
1472
 
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
1475
 
        # Read a request from the child
 
1476
 
        request = parent_pipe.recv()
 
1477
 
        logger.debug(u"IPC request: %s", repr(request))
 
1478
 
        command = request[0]
 
1480
 
        if command == 'init':
 
1482
 
            address = request[2]
 
1484
 
            for c in self.clients:
 
1485
 
                if c.fingerprint == fpr:
 
1489
 
                logger.warning(u"Client not found for fingerprint: %s, ad"
 
1490
 
                               u"dress: %s", fpr, address)
 
1493
 
                    mandos_dbus_service.ClientNotFound(fpr, address)
 
1494
 
                parent_pipe.send(False)
 
1497
 
            gobject.io_add_watch(parent_pipe.fileno(),
 
1498
 
                                 gobject.IO_IN | gobject.IO_HUP,
 
1499
 
                                 functools.partial(self.handle_ipc,
 
1500
 
                                                   parent_pipe = parent_pipe,
 
1501
 
                                                   client_object = client))
 
1502
 
            parent_pipe.send(True)
 
1503
 
            # remove the old hook in favor of the new above hook on same fileno
 
1505
 
        if command == 'funcall':
 
1506
 
            funcname = request[1]
 
1510
 
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
1512
 
        if command == 'getattr':
 
1513
 
            attrname = request[1]
 
1514
 
            if callable(client_object.__getattribute__(attrname)):
 
1515
 
                parent_pipe.send(('function',))
 
1517
 
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
1519
 
        if command == 'setattr':
 
1520
 
            attrname = request[1]
 
1522
 
            setattr(client_object, attrname, value)
 
 
1263
        # Turn the pipe file descriptor into a Python file object
 
 
1264
        if source not in file_objects:
 
 
1265
            file_objects[source] = os.fdopen(source, u"r", 1)
 
 
1267
        # Read a line from the file object
 
 
1268
        cmdline = file_objects[source].readline()
 
 
1269
        if not cmdline:             # Empty line means end of file
 
 
1270
            # close the IPC pipe
 
 
1271
            file_objects[source].close()
 
 
1272
            del file_objects[source]
 
 
1274
            # Stop calling this function
 
 
1277
        logger.debug(u"IPC command: %r", cmdline)
 
 
1279
        # Parse and act on command
 
 
1280
        cmd, args = cmdline.rstrip(u"\r\n").split(None, 1)
 
 
1282
        if cmd == u"NOTFOUND":
 
 
1283
            fpr, address = args.split(None, 1)
 
 
1284
            logger.warning(u"Client not found for fingerprint: %s, ad"
 
 
1285
                           u"dress: %s", fpr, address)
 
 
1288
                mandos_dbus_service.ClientNotFound(fpr, address)
 
 
1289
        elif cmd == u"INVALID":
 
 
1290
            for client in self.clients:
 
 
1291
                if client.name == args:
 
 
1292
                    logger.warning(u"Client %s is invalid", args)
 
 
1298
                logger.error(u"Unknown client %s is invalid", args)
 
 
1299
        elif cmd == u"SENDING":
 
 
1300
            for client in self.clients:
 
 
1301
                if client.name == args:
 
 
1302
                    logger.info(u"Sending secret to %s", client.name)
 
 
1309
                logger.error(u"Sending secret to unknown client %s",
 
 
1312
            logger.error(u"Unknown IPC command: %r", cmdline)
 
 
1314
        # Keep calling this function
 
 
1629
1420
    parser.add_option("--debug", action=u"store_true",
 
1630
1421
                      help=u"Debug mode; run in foreground and log to"
 
1632
 
    parser.add_option("--debuglevel", type=u"string", metavar="Level",
 
1633
 
                      help=u"Debug level for stdout output")
 
1634
1423
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
 
1635
1424
                      u" priority string (see GnuTLS documentation)")
 
1636
1425
    parser.add_option("--servicename", type=u"string",
 
 
1684
1472
    # options, if set.
 
1685
1473
    for option in (u"interface", u"address", u"port", u"debug",
 
1686
1474
                   u"priority", u"servicename", u"configdir",
 
1687
 
                   u"use_dbus", u"use_ipv6", u"debuglevel"):
 
 
1475
                   u"use_dbus", u"use_ipv6"):
 
1688
1476
        value = getattr(options, option)
 
1689
1477
        if value is not None:
 
1690
1478
            server_settings[option] = value
 
 
1814
1583
    if server_settings["interface"]:
 
1815
1584
        service.interface = (if_nametoindex
 
1816
1585
                             (str(server_settings[u"interface"])))
 
1819
 
        # Close all input and output, do double fork, etc.
 
1822
 
    global multiprocessing_manager
 
1823
 
    multiprocessing_manager = multiprocessing.Manager()
 
1825
1587
    client_class = Client
 
1827
1589
        client_class = functools.partial(ClientDBus, bus = bus)
 
1828
 
    def client_config_items(config, section):
 
1829
 
        special_settings = {
 
1830
 
            "approved_by_default":
 
1831
 
                lambda: config.getboolean(section,
 
1832
 
                                          "approved_by_default"),
 
1834
 
        for name, value in config.items(section):
 
1836
 
                yield (name, special_settings[name]())
 
1840
1590
    tcp_server.clients.update(set(
 
1841
1591
            client_class(name = section,
 
1842
 
                         config= dict(client_config_items(
 
1843
 
                        client_config, section)))
 
 
1592
                         config= dict(client_config.items(section)))
 
1844
1593
            for section in client_config.sections()))
 
1845
1594
    if not tcp_server.clients:
 
1846
1595
        logger.warning(u"No clients defined")
 
 
1598
        # Redirect stdin so all checkers get /dev/null
 
 
1599
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
 
1600
        os.dup2(null, sys.stdin.fileno())
 
 
1604
        # No console logging
 
 
1605
        logger.removeHandler(console)
 
 
1606
        # Close all input and output, do double fork, etc.
 
 
1610
        with closing(pidfile):
 
1850
1611
            pid = os.getpid()
 
1851
1612
            pidfile.write(str(pid) + "\n")