147
151
        self.group = None       # our entry group
 
148
152
        self.server = None
 
 
154
        self.entry_group_state_changed_match = None
 
150
155
    def rename(self):
 
151
156
        """Derived from the Avahi example code"""
 
152
157
        if self.rename_count >= self.max_renames:
 
153
 
            logger.critical(u"No suitable Zeroconf service name found"
 
154
 
                            u" after %i retries, exiting.",
 
 
158
            logger.critical("No suitable Zeroconf service name found"
 
 
159
                            " after %i retries, exiting.",
 
155
160
                            self.rename_count)
 
156
 
            raise AvahiServiceError(u"Too many renames")
 
157
 
        self.name = self.server.GetAlternativeServiceName(self.name)
 
158
 
        logger.info(u"Changing Zeroconf service name to %r ...",
 
 
161
            raise AvahiServiceError("Too many renames")
 
 
162
        self.name = unicode(self.server.GetAlternativeServiceName(self.name))
 
 
163
        logger.info("Changing Zeroconf service name to %r ...",
 
160
165
        syslogger.setFormatter(logging.Formatter
 
161
 
                               (u'Mandos (%s) [%%(process)d]:'
 
162
 
                                u' %%(levelname)s: %%(message)s'
 
 
166
                               ('Mandos (%s) [%%(process)d]:'
 
 
167
                                ' %%(levelname)s: %%(message)s'
 
 
172
        except dbus.exceptions.DBusException as error:
 
 
173
            logger.critical("DBusException: %s", error)
 
166
176
        self.rename_count += 1
 
167
177
    def remove(self):
 
168
178
        """Derived from the Avahi example code"""
 
169
179
        if self.group is not None:
 
 
182
            except (dbus.exceptions.UnknownMethodException,
 
 
183
                    dbus.exceptions.DBusException) as e:
 
 
186
        if self.entry_group_state_changed_match is not None:
 
 
187
            self.entry_group_state_changed_match.remove()
 
 
188
            self.entry_group_state_changed_match = None
 
172
190
        """Derived from the Avahi example code"""
 
173
 
        if self.group is None:
 
174
 
            self.group = dbus.Interface(
 
175
 
                self.bus.get_object(avahi.DBUS_NAME,
 
176
 
                                    self.server.EntryGroupNew()),
 
177
 
                avahi.DBUS_INTERFACE_ENTRY_GROUP)
 
178
 
            self.group.connect_to_signal('StateChanged',
 
180
 
                                         .entry_group_state_changed)
 
181
 
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
 
 
192
        self.group = dbus.Interface(
 
 
193
            self.bus.get_object(avahi.DBUS_NAME,
 
 
194
                                self.server.EntryGroupNew(),
 
 
195
                                follow_name_owner_changes=True),
 
 
196
            avahi.DBUS_INTERFACE_ENTRY_GROUP)
 
 
197
        self.entry_group_state_changed_match = (
 
 
198
            self.group.connect_to_signal(
 
 
199
                'StateChanged', self .entry_group_state_changed))
 
 
200
        logger.debug("Adding Zeroconf service '%s' of type '%s' ...",
 
182
201
                     self.name, self.type)
 
183
202
        self.group.AddService(
 
 
191
210
        self.group.Commit()
 
192
211
    def entry_group_state_changed(self, state, error):
 
193
212
        """Derived from the Avahi example code"""
 
194
 
        logger.debug(u"Avahi state change: %i", state)
 
 
213
        logger.debug("Avahi entry group state change: %i", state)
 
196
215
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
 
197
 
            logger.debug(u"Zeroconf service established.")
 
 
216
            logger.debug("Zeroconf service established.")
 
198
217
        elif state == avahi.ENTRY_GROUP_COLLISION:
 
199
 
            logger.warning(u"Zeroconf service name collision.")
 
 
218
            logger.info("Zeroconf service name collision.")
 
201
220
        elif state == avahi.ENTRY_GROUP_FAILURE:
 
202
 
            logger.critical(u"Avahi: Error in group state changed %s",
 
 
221
            logger.critical("Avahi: Error in group state changed %s",
 
204
 
            raise AvahiGroupError(u"State changed: %s"
 
 
223
            raise AvahiGroupError("State changed: %s"
 
205
224
                                  % unicode(error))
 
206
225
    def cleanup(self):
 
207
226
        """Derived from the Avahi example code"""
 
208
 
        if self.group is not None:
 
211
 
    def server_state_changed(self, state):
 
 
228
    def server_state_changed(self, state, error=None):
 
212
229
        """Derived from the Avahi example code"""
 
213
 
        if state == avahi.SERVER_COLLISION:
 
214
 
            logger.error(u"Zeroconf server name collision")
 
 
230
        logger.debug("Avahi server state change: %i", state)
 
 
231
        bad_states = { avahi.SERVER_INVALID:
 
 
232
                           "Zeroconf server invalid",
 
 
233
                       avahi.SERVER_REGISTERING: None,
 
 
234
                       avahi.SERVER_COLLISION:
 
 
235
                           "Zeroconf server name collision",
 
 
236
                       avahi.SERVER_FAILURE:
 
 
237
                           "Zeroconf server failure" }
 
 
238
        if state in bad_states:
 
 
239
            if bad_states[state]:
 
 
240
                logger.error(bad_states[state])
 
216
242
        elif state == avahi.SERVER_RUNNING:
 
 
245
            logger.debug("Unknown state: %r", state)
 
218
246
    def activate(self):
 
219
247
        """Derived from the Avahi example code"""
 
220
248
        if self.server is None:
 
221
249
            self.server = dbus.Interface(
 
222
250
                self.bus.get_object(avahi.DBUS_NAME,
 
223
 
                                    avahi.DBUS_PATH_SERVER),
 
 
251
                                    avahi.DBUS_PATH_SERVER,
 
 
252
                                    follow_name_owner_changes=True),
 
224
253
                avahi.DBUS_INTERFACE_SERVER)
 
225
 
        self.server.connect_to_signal(u"StateChanged",
 
 
254
        self.server.connect_to_signal("StateChanged",
 
226
255
                                 self.server_state_changed)
 
227
256
        self.server_state_changed(self.server.GetState())
 
 
231
260
    """A representation of a client host served by this server.
 
234
 
    name:       string; from the config file, used in log messages and
 
236
 
    fingerprint: string (40 or 32 hexadecimal digits); used to
 
237
 
                 uniquely identify the client
 
238
 
    secret:     bytestring; sent verbatim (over TLS) to client
 
239
 
    host:       string; available for use by the checker command
 
240
 
    created:    datetime.datetime(); (UTC) object creation
 
241
 
    last_enabled: datetime.datetime(); (UTC)
 
243
 
    last_checked_ok: datetime.datetime(); (UTC) or None
 
244
 
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
245
 
                                      until this client is invalid
 
246
 
    interval:   datetime.timedelta(); How often to start a new checker
 
247
 
    disable_hook:  If set, called by disable() as disable_hook(self)
 
 
263
    _approved:   bool(); 'None' if not yet approved/disapproved
 
 
264
    approval_delay: datetime.timedelta(); Time to wait for approval
 
 
265
    approval_duration: datetime.timedelta(); Duration of one approval
 
248
266
    checker:    subprocess.Popen(); a running checker process used
 
249
267
                                    to see if the client lives.
 
250
268
                                    'None' if no process is running.
 
251
 
    checker_initiator_tag: a gobject event source tag, or None
 
252
 
    disable_initiator_tag: - '' -
 
253
 
    checker_callback_tag:  - '' -
 
254
 
    checker_command: string; External command which is run to check if
 
255
 
                     client lives.  %() expansions are done at
 
 
269
    checker_callback_tag: a gobject event source tag, or None
 
 
270
    checker_command: string; External command which is run to check
 
 
271
                     if client lives.  %() expansions are done at
 
256
272
                     runtime with vars(self) as dict, so that for
 
257
273
                     instance %(name)s can be used in the command.
 
 
274
    checker_initiator_tag: a gobject event source tag, or None
 
 
275
    created:    datetime.datetime(); (UTC) object creation
 
258
276
    current_checker_command: string; current running checker_command
 
 
277
    disable_hook:  If set, called by disable() as disable_hook(self)
 
 
278
    disable_initiator_tag: a gobject event source tag, or None
 
 
280
    fingerprint: string (40 or 32 hexadecimal digits); used to
 
 
281
                 uniquely identify the client
 
 
282
    host:       string; available for use by the checker command
 
 
283
    interval:   datetime.timedelta(); How often to start a new checker
 
 
284
    last_approval_request: datetime.datetime(); (UTC) or None
 
 
285
    last_checked_ok: datetime.datetime(); (UTC) or None
 
 
286
    last_enabled: datetime.datetime(); (UTC)
 
 
287
    name:       string; from the config file, used in log messages and
 
 
289
    secret:     bytestring; sent verbatim (over TLS) to client
 
 
290
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
 
291
                                      until this client is disabled
 
 
292
    runtime_expansions: Allowed attributes for runtime expansion.
 
 
295
    runtime_expansions = ("approval_delay", "approval_duration",
 
 
296
                          "created", "enabled", "fingerprint",
 
 
297
                          "host", "interval", "last_checked_ok",
 
 
298
                          "last_enabled", "name", "timeout")
 
262
301
    def _timedelta_to_milliseconds(td):
 
263
302
        "Convert a datetime.timedelta() to milliseconds"
 
 
281
323
        if config is None:
 
283
 
        logger.debug(u"Creating client %r", self.name)
 
 
325
        logger.debug("Creating client %r", self.name)
 
284
326
        # Uppercase and remove spaces from fingerprint for later
 
285
327
        # comparison purposes with return value from the fingerprint()
 
287
 
        self.fingerprint = (config[u"fingerprint"].upper()
 
289
 
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
 
290
 
        if u"secret" in config:
 
291
 
            self.secret = config[u"secret"].decode(u"base64")
 
292
 
        elif u"secfile" in config:
 
293
 
            with closing(open(os.path.expanduser
 
295
 
                               (config[u"secfile"])))) as secfile:
 
 
329
        self.fingerprint = (config["fingerprint"].upper()
 
 
331
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
 
332
        if "secret" in config:
 
 
333
            self.secret = config["secret"].decode("base64")
 
 
334
        elif "secfile" in config:
 
 
335
            with open(os.path.expanduser(os.path.expandvars
 
 
336
                                         (config["secfile"])),
 
296
338
                self.secret = secfile.read()
 
298
 
            raise TypeError(u"No secret or secfile for client %s"
 
 
340
            raise TypeError("No secret or secfile for client %s"
 
300
 
        self.host = config.get(u"host", u"")
 
 
342
        self.host = config.get("host", "")
 
301
343
        self.created = datetime.datetime.utcnow()
 
302
344
        self.enabled = False
 
 
345
        self.last_approval_request = None
 
303
346
        self.last_enabled = None
 
304
347
        self.last_checked_ok = None
 
305
 
        self.timeout = string_to_delta(config[u"timeout"])
 
306
 
        self.interval = string_to_delta(config[u"interval"])
 
 
348
        self.timeout = string_to_delta(config["timeout"])
 
 
349
        self.interval = string_to_delta(config["interval"])
 
307
350
        self.disable_hook = disable_hook
 
308
351
        self.checker = None
 
309
352
        self.checker_initiator_tag = None
 
310
353
        self.disable_initiator_tag = None
 
311
354
        self.checker_callback_tag = None
 
312
 
        self.checker_command = config[u"checker"]
 
 
355
        self.checker_command = config["checker"]
 
313
356
        self.current_checker_command = None
 
314
357
        self.last_connect = None
 
 
358
        self._approved = None
 
 
359
        self.approved_by_default = config.get("approved_by_default",
 
 
361
        self.approvals_pending = 0
 
 
362
        self.approval_delay = string_to_delta(
 
 
363
            config["approval_delay"])
 
 
364
        self.approval_duration = string_to_delta(
 
 
365
            config["approval_duration"])
 
 
366
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
 
368
    def send_changedstate(self):
 
 
369
        self.changedstate.acquire()
 
 
370
        self.changedstate.notify_all()
 
 
371
        self.changedstate.release()
 
316
373
    def enable(self):
 
317
374
        """Start this client's checker and timeout hooks"""
 
318
 
        if getattr(self, u"enabled", False):
 
 
375
        if getattr(self, "enabled", False):
 
319
376
            # Already enabled
 
 
378
        self.send_changedstate()
 
321
379
        self.last_enabled = datetime.datetime.utcnow()
 
322
380
        # Schedule a new checker to be started an 'interval' from now,
 
323
381
        # and every interval from then on.
 
324
382
        self.checker_initiator_tag = (gobject.timeout_add
 
325
383
                                      (self.interval_milliseconds(),
 
326
384
                                       self.start_checker))
 
327
 
        # Also start a new checker *right now*.
 
329
385
        # Schedule a disable() when 'timeout' has passed
 
330
386
        self.disable_initiator_tag = (gobject.timeout_add
 
331
387
                                   (self.timeout_milliseconds(),
 
333
389
        self.enabled = True
 
 
390
        # Also start a new checker *right now*.
 
 
393
    def disable(self, quiet=True):
 
336
394
        """Disable this client."""
 
337
395
        if not getattr(self, "enabled", False):
 
339
 
        logger.info(u"Disabling client %s", self.name)
 
340
 
        if getattr(self, u"disable_initiator_tag", False):
 
 
398
            self.send_changedstate()
 
 
400
            logger.info("Disabling client %s", self.name)
 
 
401
        if getattr(self, "disable_initiator_tag", False):
 
341
402
            gobject.source_remove(self.disable_initiator_tag)
 
342
403
            self.disable_initiator_tag = None
 
343
 
        if getattr(self, u"checker_initiator_tag", False):
 
 
404
        if getattr(self, "checker_initiator_tag", False):
 
344
405
            gobject.source_remove(self.checker_initiator_tag)
 
345
406
            self.checker_initiator_tag = None
 
346
407
        self.stop_checker()
 
 
412
481
                command = self.checker_command % self.host
 
413
482
            except TypeError:
 
414
483
                # Escape attributes for the shell
 
415
 
                escaped_attrs = dict((key,
 
416
 
                                      re.escape(unicode(str(val),
 
420
 
                                     vars(self).iteritems())
 
 
484
                escaped_attrs = dict(
 
 
486
                     re.escape(unicode(str(getattr(self, attr, "")),
 
 
490
                    self.runtime_expansions)
 
422
493
                    command = self.checker_command % escaped_attrs
 
423
 
                except TypeError, error:
 
424
 
                    logger.error(u'Could not format string "%s":'
 
425
 
                                 u' %s', self.checker_command, error)
 
 
494
                except TypeError as error:
 
 
495
                    logger.error('Could not format string "%s":'
 
 
496
                                 ' %s', self.checker_command, error)
 
426
497
                    return True # Try again later
 
427
498
            self.current_checker_command = command
 
429
 
                logger.info(u"Starting checker %r for %s",
 
 
500
                logger.info("Starting checker %r for %s",
 
430
501
                            command, self.name)
 
431
502
                # We don't need to redirect stdout and stderr, since
 
432
503
                # in normal mode, that is already done by daemon(),
 
 
456
527
        if self.checker_callback_tag:
 
457
528
            gobject.source_remove(self.checker_callback_tag)
 
458
529
            self.checker_callback_tag = None
 
459
 
        if getattr(self, u"checker", None) is None:
 
 
530
        if getattr(self, "checker", None) is None:
 
461
 
        logger.debug(u"Stopping checker for %(name)s", vars(self))
 
 
532
        logger.debug("Stopping checker for %(name)s", vars(self))
 
463
534
            os.kill(self.checker.pid, signal.SIGTERM)
 
465
536
            #if self.checker.poll() is None:
 
466
537
            #    os.kill(self.checker.pid, signal.SIGKILL)
 
467
 
        except OSError, error:
 
 
538
        except OSError as error:
 
468
539
            if error.errno != errno.ESRCH: # No such process
 
470
541
        self.checker = None
 
472
 
    def still_valid(self):
 
473
 
        """Has the timeout not yet passed for this client?"""
 
474
 
        if not getattr(self, u"enabled", False):
 
476
 
        now = datetime.datetime.utcnow()
 
477
 
        if self.last_checked_ok is None:
 
478
 
            return now < (self.created + self.timeout)
 
480
 
            return now < (self.last_checked_ok + self.timeout)
 
483
 
def dbus_service_property(dbus_interface, signature=u"v",
 
484
 
                          access=u"readwrite", byte_arrays=False):
 
 
543
def dbus_service_property(dbus_interface, signature="v",
 
 
544
                          access="readwrite", byte_arrays=False):
 
485
545
    """Decorators for marking methods of a DBusObjectWithProperties to
 
486
546
    become properties on the D-Bus.
 
 
560
625
        # No such property
 
561
 
        raise DBusPropertyNotFound(self.dbus_object_path + u":"
 
562
 
                                   + interface_name + u"."
 
 
626
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
 
627
                                   + interface_name + "."
 
565
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ss",
 
 
630
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ss",
 
567
632
    def Get(self, interface_name, property_name):
 
568
633
        """Standard D-Bus property Get() method, see D-Bus standard.
 
570
635
        prop = self._get_dbus_property(interface_name, property_name)
 
571
 
        if prop._dbus_access == u"write":
 
 
636
        if prop._dbus_access == "write":
 
572
637
            raise DBusPropertyAccessException(property_name)
 
574
 
        if not hasattr(value, u"variant_level"):
 
 
639
        if not hasattr(value, "variant_level"):
 
576
641
        return type(value)(value, variant_level=value.variant_level+1)
 
578
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ssv")
 
 
643
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ssv")
 
579
644
    def Set(self, interface_name, property_name, value):
 
580
645
        """Standard D-Bus property Set() method, see D-Bus standard.
 
582
647
        prop = self._get_dbus_property(interface_name, property_name)
 
583
 
        if prop._dbus_access == u"read":
 
 
648
        if prop._dbus_access == "read":
 
584
649
            raise DBusPropertyAccessException(property_name)
 
585
 
        if prop._dbus_get_args_options[u"byte_arrays"]:
 
 
650
        if prop._dbus_get_args_options["byte_arrays"]:
 
 
651
            # The byte_arrays option is not supported yet on
 
 
652
            # signatures other than "ay".
 
 
653
            if prop._dbus_signature != "ay":
 
586
655
            value = dbus.ByteArray(''.join(unichr(byte)
 
587
656
                                           for byte in value))
 
590
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"s",
 
591
 
                         out_signature=u"a{sv}")
 
 
659
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="s",
 
 
660
                         out_signature="a{sv}")
 
592
661
    def GetAll(self, interface_name):
 
593
662
        """Standard D-Bus property GetAll() method, see D-Bus
 
 
602
671
                # Interface non-empty but did not match
 
604
673
            # Ignore write-only properties
 
605
 
            if prop._dbus_access == u"write":
 
 
674
            if prop._dbus_access == "write":
 
608
 
            if not hasattr(value, u"variant_level"):
 
 
677
            if not hasattr(value, "variant_level"):
 
609
678
                all[name] = value
 
611
680
            all[name] = type(value)(value, variant_level=
 
612
681
                                    value.variant_level+1)
 
613
 
        return dbus.Dictionary(all, signature=u"sv")
 
 
682
        return dbus.Dictionary(all, signature="sv")
 
615
684
    @dbus.service.method(dbus.INTROSPECTABLE_IFACE,
 
617
686
                         path_keyword='object_path',
 
618
687
                         connection_keyword='connection')
 
619
688
    def Introspect(self, object_path, connection):
 
620
689
        """Standard D-Bus method, overloaded to insert property tags.
 
622
691
        xmlstring = dbus.service.Object.Introspect(self, object_path,
 
624
 
        document = xml.dom.minidom.parseString(xmlstring)
 
626
 
        def make_tag(document, name, prop):
 
627
 
            e = document.createElement(u"property")
 
628
 
            e.setAttribute(u"name", name)
 
629
 
            e.setAttribute(u"type", prop._dbus_signature)
 
630
 
            e.setAttribute(u"access", prop._dbus_access)
 
632
 
        for if_tag in document.getElementsByTagName(u"interface"):
 
633
 
            for tag in (make_tag(document, name, prop)
 
635
 
                        in self._get_all_dbus_properties()
 
636
 
                        if prop._dbus_interface
 
637
 
                        == if_tag.getAttribute(u"name")):
 
638
 
                if_tag.appendChild(tag)
 
639
 
        xmlstring = document.toxml(u"utf-8")
 
 
694
            document = xml.dom.minidom.parseString(xmlstring)
 
 
695
            def make_tag(document, name, prop):
 
 
696
                e = document.createElement("property")
 
 
697
                e.setAttribute("name", name)
 
 
698
                e.setAttribute("type", prop._dbus_signature)
 
 
699
                e.setAttribute("access", prop._dbus_access)
 
 
701
            for if_tag in document.getElementsByTagName("interface"):
 
 
702
                for tag in (make_tag(document, name, prop)
 
 
704
                            in self._get_all_dbus_properties()
 
 
705
                            if prop._dbus_interface
 
 
706
                            == if_tag.getAttribute("name")):
 
 
707
                    if_tag.appendChild(tag)
 
 
708
                # Add the names to the return values for the
 
 
709
                # "org.freedesktop.DBus.Properties" methods
 
 
710
                if (if_tag.getAttribute("name")
 
 
711
                    == "org.freedesktop.DBus.Properties"):
 
 
712
                    for cn in if_tag.getElementsByTagName("method"):
 
 
713
                        if cn.getAttribute("name") == "Get":
 
 
714
                            for arg in cn.getElementsByTagName("arg"):
 
 
715
                                if (arg.getAttribute("direction")
 
 
717
                                    arg.setAttribute("name", "value")
 
 
718
                        elif cn.getAttribute("name") == "GetAll":
 
 
719
                            for arg in cn.getElementsByTagName("arg"):
 
 
720
                                if (arg.getAttribute("direction")
 
 
722
                                    arg.setAttribute("name", "props")
 
 
723
            xmlstring = document.toxml("utf-8")
 
 
725
        except (AttributeError, xml.dom.DOMException,
 
 
726
                xml.parsers.expat.ExpatError) as error:
 
 
727
            logger.error("Failed to override Introspection method",
 
 
648
736
    dbus_object_path: dbus.ObjectPath
 
649
737
    bus: dbus.SystemBus()
 
 
740
    runtime_expansions = (Client.runtime_expansions
 
 
741
                          + ("dbus_object_path",))
 
651
743
    # dbus.service.Object doesn't use super(), so we can't either.
 
653
745
    def __init__(self, bus = None, *args, **kwargs):
 
 
746
        self._approvals_pending = 0
 
655
748
        Client.__init__(self, *args, **kwargs)
 
656
749
        # Only now, when this client is initialized, can it show up on
 
 
751
        client_object_name = unicode(self.name).translate(
 
658
754
        self.dbus_object_path = (dbus.ObjectPath
 
660
 
                                  + self.name.replace(u".", u"_")))
 
 
755
                                 ("/clients/" + client_object_name))
 
661
756
        DBusObjectWithProperties.__init__(self, self.bus,
 
662
757
                                          self.dbus_object_path)
 
 
759
    def _get_approvals_pending(self):
 
 
760
        return self._approvals_pending
 
 
761
    def _set_approvals_pending(self, value):
 
 
762
        old_value = self._approvals_pending
 
 
763
        self._approvals_pending = value
 
 
765
        if (hasattr(self, "dbus_object_path")
 
 
766
            and bval is not bool(old_value)):
 
 
767
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
 
768
            self.PropertyChanged(dbus.String("ApprovalPending"),
 
 
771
    approvals_pending = property(_get_approvals_pending,
 
 
772
                                 _set_approvals_pending)
 
 
773
    del _get_approvals_pending, _set_approvals_pending
 
665
776
    def _datetime_to_dbus(dt, variant_level=0):
 
 
668
779
                           variant_level=variant_level)
 
670
781
    def enable(self):
 
671
 
        oldstate = getattr(self, u"enabled", False)
 
 
782
        oldstate = getattr(self, "enabled", False)
 
672
783
        r = Client.enable(self)
 
673
784
        if oldstate != self.enabled:
 
674
785
            # Emit D-Bus signals
 
675
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
 
786
            self.PropertyChanged(dbus.String("Enabled"),
 
676
787
                                 dbus.Boolean(True, variant_level=1))
 
677
788
            self.PropertyChanged(
 
678
 
                dbus.String(u"last_enabled"),
 
 
789
                dbus.String("LastEnabled"),
 
679
790
                self._datetime_to_dbus(self.last_enabled,
 
680
791
                                       variant_level=1))
 
683
 
    def disable(self, signal = True):
 
684
 
        oldstate = getattr(self, u"enabled", False)
 
685
 
        r = Client.disable(self)
 
686
 
        if signal and oldstate != self.enabled:
 
 
794
    def disable(self, quiet = False):
 
 
795
        oldstate = getattr(self, "enabled", False)
 
 
796
        r = Client.disable(self, quiet=quiet)
 
 
797
        if not quiet and oldstate != self.enabled:
 
687
798
            # Emit D-Bus signal
 
688
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
 
799
            self.PropertyChanged(dbus.String("Enabled"),
 
689
800
                                 dbus.Boolean(False, variant_level=1))
 
 
742
861
            # Emit D-Bus signal
 
743
862
            self.CheckerStarted(self.current_checker_command)
 
744
863
            self.PropertyChanged(
 
745
 
                dbus.String(u"checker_running"),
 
 
864
                dbus.String("CheckerRunning"),
 
746
865
                dbus.Boolean(True, variant_level=1))
 
749
868
    def stop_checker(self, *args, **kwargs):
 
750
 
        old_checker = getattr(self, u"checker", None)
 
 
869
        old_checker = getattr(self, "checker", None)
 
751
870
        r = Client.stop_checker(self, *args, **kwargs)
 
752
871
        if (old_checker is not None
 
753
 
            and getattr(self, u"checker", None) is None):
 
754
 
            self.PropertyChanged(dbus.String(u"checker_running"),
 
 
872
            and getattr(self, "checker", None) is None):
 
 
873
            self.PropertyChanged(dbus.String("CheckerRunning"),
 
755
874
                                 dbus.Boolean(False, variant_level=1))
 
758
 
    ## D-Bus methods & signals
 
759
 
    _interface = u"se.bsnet.fukt.Mandos.Client"
 
762
 
    @dbus.service.method(_interface)
 
764
 
        return self.checked_ok()
 
 
877
    def _reset_approved(self):
 
 
878
        self._approved = None
 
 
881
    def approve(self, value=True):
 
 
882
        self.send_changedstate()
 
 
883
        self._approved = value
 
 
884
        gobject.timeout_add(self._timedelta_to_milliseconds
 
 
885
                            (self.approval_duration),
 
 
886
                            self._reset_approved)
 
 
889
    ## D-Bus methods, signals & properties
 
 
890
    _interface = "se.bsnet.fukt.Mandos.Client"
 
766
894
    # CheckerCompleted - signal
 
767
 
    @dbus.service.signal(_interface, signature=u"nxs")
 
 
895
    @dbus.service.signal(_interface, signature="nxs")
 
768
896
    def CheckerCompleted(self, exitcode, waitstatus, command):
 
772
900
    # CheckerStarted - signal
 
773
 
    @dbus.service.signal(_interface, signature=u"s")
 
 
901
    @dbus.service.signal(_interface, signature="s")
 
774
902
    def CheckerStarted(self, command):
 
778
906
    # PropertyChanged - signal
 
779
 
    @dbus.service.signal(_interface, signature=u"sv")
 
 
907
    @dbus.service.signal(_interface, signature="sv")
 
780
908
    def PropertyChanged(self, property, value):
 
784
 
    # ReceivedSecret - signal
 
785
913
    @dbus.service.signal(_interface)
 
786
 
    def ReceivedSecret(self):
 
 
916
        Is sent after a successful transfer of secret from the Mandos
 
 
917
        server to mandos-client
 
790
921
    # Rejected - signal
 
791
 
    @dbus.service.signal(_interface)
 
 
922
    @dbus.service.signal(_interface, signature="s")
 
 
923
    def Rejected(self, reason):
 
 
927
    # NeedApproval - signal
 
 
928
    @dbus.service.signal(_interface, signature="tb")
 
 
929
    def NeedApproval(self, timeout, default):
 
 
931
        return self.need_approval()
 
 
936
    @dbus.service.method(_interface, in_signature="b")
 
 
937
    def Approve(self, value):
 
 
941
    @dbus.service.method(_interface)
 
796
945
    # Enable - method
 
797
946
    @dbus.service.method(_interface)
 
798
947
    def Enable(self):
 
 
816
965
    def StopChecker(self):
 
817
966
        self.stop_checker()
 
820
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
821
 
    def name_dbus_property(self):
 
 
970
    # ApprovalPending - property
 
 
971
    @dbus_service_property(_interface, signature="b", access="read")
 
 
972
    def ApprovalPending_dbus_property(self):
 
 
973
        return dbus.Boolean(bool(self.approvals_pending))
 
 
975
    # ApprovedByDefault - property
 
 
976
    @dbus_service_property(_interface, signature="b",
 
 
978
    def ApprovedByDefault_dbus_property(self, value=None):
 
 
979
        if value is None:       # get
 
 
980
            return dbus.Boolean(self.approved_by_default)
 
 
981
        self.approved_by_default = bool(value)
 
 
983
        self.PropertyChanged(dbus.String("ApprovedByDefault"),
 
 
984
                             dbus.Boolean(value, variant_level=1))
 
 
986
    # ApprovalDelay - property
 
 
987
    @dbus_service_property(_interface, signature="t",
 
 
989
    def ApprovalDelay_dbus_property(self, value=None):
 
 
990
        if value is None:       # get
 
 
991
            return dbus.UInt64(self.approval_delay_milliseconds())
 
 
992
        self.approval_delay = datetime.timedelta(0, 0, 0, value)
 
 
994
        self.PropertyChanged(dbus.String("ApprovalDelay"),
 
 
995
                             dbus.UInt64(value, variant_level=1))
 
 
997
    # ApprovalDuration - property
 
 
998
    @dbus_service_property(_interface, signature="t",
 
 
1000
    def ApprovalDuration_dbus_property(self, value=None):
 
 
1001
        if value is None:       # get
 
 
1002
            return dbus.UInt64(self._timedelta_to_milliseconds(
 
 
1003
                    self.approval_duration))
 
 
1004
        self.approval_duration = datetime.timedelta(0, 0, 0, value)
 
 
1006
        self.PropertyChanged(dbus.String("ApprovalDuration"),
 
 
1007
                             dbus.UInt64(value, variant_level=1))
 
 
1010
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1011
    def Name_dbus_property(self):
 
822
1012
        return dbus.String(self.name)
 
824
 
    # fingerprint - property
 
825
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
826
 
    def fingerprint_dbus_property(self):
 
 
1014
    # Fingerprint - property
 
 
1015
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1016
    def Fingerprint_dbus_property(self):
 
827
1017
        return dbus.String(self.fingerprint)
 
830
 
    @dbus_service_property(_interface, signature=u"s",
 
832
 
    def host_dbus_property(self, value=None):
 
 
1020
    @dbus_service_property(_interface, signature="s",
 
 
1022
    def Host_dbus_property(self, value=None):
 
833
1023
        if value is None:       # get
 
834
1024
            return dbus.String(self.host)
 
835
1025
        self.host = value
 
836
1026
        # Emit D-Bus signal
 
837
 
        self.PropertyChanged(dbus.String(u"host"),
 
 
1027
        self.PropertyChanged(dbus.String("Host"),
 
838
1028
                             dbus.String(value, variant_level=1))
 
841
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
842
 
    def created_dbus_property(self):
 
 
1030
    # Created - property
 
 
1031
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1032
    def Created_dbus_property(self):
 
843
1033
        return dbus.String(self._datetime_to_dbus(self.created))
 
845
 
    # last_enabled - property
 
846
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
847
 
    def last_enabled_dbus_property(self):
 
 
1035
    # LastEnabled - property
 
 
1036
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1037
    def LastEnabled_dbus_property(self):
 
848
1038
        if self.last_enabled is None:
 
849
 
            return dbus.String(u"")
 
 
1039
            return dbus.String("")
 
850
1040
        return dbus.String(self._datetime_to_dbus(self.last_enabled))
 
853
 
    @dbus_service_property(_interface, signature=u"b",
 
855
 
    def enabled_dbus_property(self, value=None):
 
 
1042
    # Enabled - property
 
 
1043
    @dbus_service_property(_interface, signature="b",
 
 
1045
    def Enabled_dbus_property(self, value=None):
 
856
1046
        if value is None:       # get
 
857
1047
            return dbus.Boolean(self.enabled)
 
 
863
 
    # last_checked_ok - property
 
864
 
    @dbus_service_property(_interface, signature=u"s",
 
866
 
    def last_checked_ok_dbus_property(self, value=None):
 
 
1053
    # LastCheckedOK - property
 
 
1054
    @dbus_service_property(_interface, signature="s",
 
 
1056
    def LastCheckedOK_dbus_property(self, value=None):
 
867
1057
        if value is not None:
 
868
1058
            self.checked_ok()
 
870
1060
        if self.last_checked_ok is None:
 
871
 
            return dbus.String(u"")
 
 
1061
            return dbus.String("")
 
872
1062
        return dbus.String(self._datetime_to_dbus(self
 
873
1063
                                                  .last_checked_ok))
 
876
 
    @dbus_service_property(_interface, signature=u"t",
 
878
 
    def timeout_dbus_property(self, value=None):
 
 
1065
    # LastApprovalRequest - property
 
 
1066
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1067
    def LastApprovalRequest_dbus_property(self):
 
 
1068
        if self.last_approval_request is None:
 
 
1069
            return dbus.String("")
 
 
1070
        return dbus.String(self.
 
 
1071
                           _datetime_to_dbus(self
 
 
1072
                                             .last_approval_request))
 
 
1074
    # Timeout - property
 
 
1075
    @dbus_service_property(_interface, signature="t",
 
 
1077
    def Timeout_dbus_property(self, value=None):
 
879
1078
        if value is None:       # get
 
880
1079
            return dbus.UInt64(self.timeout_milliseconds())
 
881
1080
        self.timeout = datetime.timedelta(0, 0, 0, value)
 
882
1081
        # Emit D-Bus signal
 
883
 
        self.PropertyChanged(dbus.String(u"timeout"),
 
 
1082
        self.PropertyChanged(dbus.String("Timeout"),
 
884
1083
                             dbus.UInt64(value, variant_level=1))
 
885
 
        if getattr(self, u"disable_initiator_tag", None) is None:
 
 
1084
        if getattr(self, "disable_initiator_tag", None) is None:
 
887
1086
        # Reschedule timeout
 
888
1087
        gobject.source_remove(self.disable_initiator_tag)
 
 
918
1117
                                      (value, self.start_checker))
 
919
1118
        self.start_checker()    # Start one now, too
 
922
 
    @dbus_service_property(_interface, signature=u"s",
 
924
 
    def checker_dbus_property(self, value=None):
 
 
1120
    # Checker - property
 
 
1121
    @dbus_service_property(_interface, signature="s",
 
 
1123
    def Checker_dbus_property(self, value=None):
 
925
1124
        if value is None:       # get
 
926
1125
            return dbus.String(self.checker_command)
 
927
1126
        self.checker_command = value
 
928
1127
        # Emit D-Bus signal
 
929
 
        self.PropertyChanged(dbus.String(u"checker"),
 
 
1128
        self.PropertyChanged(dbus.String("Checker"),
 
930
1129
                             dbus.String(self.checker_command,
 
931
1130
                                         variant_level=1))
 
933
 
    # checker_running - property
 
934
 
    @dbus_service_property(_interface, signature=u"b",
 
936
 
    def checker_running_dbus_property(self, value=None):
 
 
1132
    # CheckerRunning - property
 
 
1133
    @dbus_service_property(_interface, signature="b",
 
 
1135
    def CheckerRunning_dbus_property(self, value=None):
 
937
1136
        if value is None:       # get
 
938
1137
            return dbus.Boolean(self.checker is not None)
 
 
942
1141
            self.stop_checker()
 
944
 
    # object_path - property
 
945
 
    @dbus_service_property(_interface, signature=u"o", access=u"read")
 
946
 
    def object_path_dbus_property(self):
 
 
1143
    # ObjectPath - property
 
 
1144
    @dbus_service_property(_interface, signature="o", access="read")
 
 
1145
    def ObjectPath_dbus_property(self):
 
947
1146
        return self.dbus_object_path # is already a dbus.ObjectPath
 
950
 
    @dbus_service_property(_interface, signature=u"ay",
 
951
 
                           access=u"write", byte_arrays=True)
 
952
 
    def secret_dbus_property(self, value):
 
 
1149
    @dbus_service_property(_interface, signature="ay",
 
 
1150
                           access="write", byte_arrays=True)
 
 
1151
    def Secret_dbus_property(self, value):
 
953
1152
        self.secret = str(value)
 
 
1157
class ProxyClient(object):
 
 
1158
    def __init__(self, child_pipe, fpr, address):
 
 
1159
        self._pipe = child_pipe
 
 
1160
        self._pipe.send(('init', fpr, address))
 
 
1161
        if not self._pipe.recv():
 
 
1164
    def __getattribute__(self, name):
 
 
1165
        if(name == '_pipe'):
 
 
1166
            return super(ProxyClient, self).__getattribute__(name)
 
 
1167
        self._pipe.send(('getattr', name))
 
 
1168
        data = self._pipe.recv()
 
 
1169
        if data[0] == 'data':
 
 
1171
        if data[0] == 'function':
 
 
1172
            def func(*args, **kwargs):
 
 
1173
                self._pipe.send(('funcall', name, args, kwargs))
 
 
1174
                return self._pipe.recv()[1]
 
 
1177
    def __setattr__(self, name, value):
 
 
1178
        if(name == '_pipe'):
 
 
1179
            return super(ProxyClient, self).__setattr__(name, value)
 
 
1180
        self._pipe.send(('setattr', name, value))
 
958
1183
class ClientHandler(socketserver.BaseRequestHandler, object):
 
959
1184
    """A class to handle client connections.
 
 
962
1187
    Note: This will run in its own forked process."""
 
964
1189
    def handle(self):
 
965
 
        logger.info(u"TCP connection from: %s",
 
966
 
                    unicode(self.client_address))
 
967
 
        logger.debug(u"IPC Pipe FD: %d", self.server.pipe[1])
 
968
 
        # Open IPC pipe to parent process
 
969
 
        with closing(os.fdopen(self.server.pipe[1], u"w", 1)) as ipc:
 
 
1190
        with contextlib.closing(self.server.child_pipe) as child_pipe:
 
 
1191
            logger.info("TCP connection from: %s",
 
 
1192
                        unicode(self.client_address))
 
 
1193
            logger.debug("Pipe FD: %d",
 
 
1194
                         self.server.child_pipe.fileno())
 
970
1196
            session = (gnutls.connection
 
971
1197
                       .ClientSession(self.request,
 
972
1198
                                      gnutls.connection
 
973
1199
                                      .X509Credentials()))
 
975
 
            line = self.request.makefile().readline()
 
976
 
            logger.debug(u"Protocol version: %r", line)
 
978
 
                if int(line.strip().split()[0]) > 1:
 
980
 
            except (ValueError, IndexError, RuntimeError), error:
 
981
 
                logger.error(u"Unknown protocol version: %s", error)
 
984
1201
            # Note: gnutls.connection.X509Credentials is really a
 
985
1202
            # generic GnuTLS certificate credentials object so long as
 
986
1203
            # no X.509 keys are added to it.  Therefore, we can use it
 
987
1204
            # here despite using OpenPGP certificates.
 
989
 
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
 
990
 
            #                      u"+AES-256-CBC", u"+SHA1",
 
991
 
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
 
 
1206
            #priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
 
1207
            #                      "+AES-256-CBC", "+SHA1",
 
 
1208
            #                      "+COMP-NULL", "+CTYPE-OPENPGP",
 
993
1210
            # Use a fallback default, since this MUST be set.
 
994
1211
            priority = self.server.gnutls_priority
 
995
1212
            if priority is None:
 
997
1214
            (gnutls.library.functions
 
998
1215
             .gnutls_priority_set_direct(session._c_object,
 
999
1216
                                         priority, None))
 
 
1218
            # Start communication using the Mandos protocol
 
 
1219
            # Get protocol number
 
 
1220
            line = self.request.makefile().readline()
 
 
1221
            logger.debug("Protocol version: %r", line)
 
 
1223
                if int(line.strip().split()[0]) > 1:
 
 
1225
            except (ValueError, IndexError, RuntimeError) as error:
 
 
1226
                logger.error("Unknown protocol version: %s", error)
 
 
1229
            # Start GnuTLS connection
 
1002
1231
                session.handshake()
 
1003
 
            except gnutls.errors.GNUTLSError, error:
 
1004
 
                logger.warning(u"Handshake failed: %s", error)
 
 
1232
            except gnutls.errors.GNUTLSError as error:
 
 
1233
                logger.warning("Handshake failed: %s", error)
 
1005
1234
                # Do not run session.bye() here: the session is not
 
1006
1235
                # established.  Just abandon the request.
 
1008
 
            logger.debug(u"Handshake succeeded")
 
 
1237
            logger.debug("Handshake succeeded")
 
 
1239
            approval_required = False
 
1010
 
                fpr = self.fingerprint(self.peer_certificate(session))
 
1011
 
            except (TypeError, gnutls.errors.GNUTLSError), error:
 
1012
 
                logger.warning(u"Bad certificate: %s", error)
 
1015
 
            logger.debug(u"Fingerprint: %s", fpr)
 
 
1242
                    fpr = self.fingerprint(self.peer_certificate
 
 
1245
                        gnutls.errors.GNUTLSError) as error:
 
 
1246
                    logger.warning("Bad certificate: %s", error)
 
 
1248
                logger.debug("Fingerprint: %s", fpr)
 
 
1251
                    client = ProxyClient(child_pipe, fpr,
 
 
1252
                                         self.client_address)
 
 
1256
                if client.approval_delay:
 
 
1257
                    delay = client.approval_delay
 
 
1258
                    client.approvals_pending += 1
 
 
1259
                    approval_required = True
 
 
1262
                    if not client.enabled:
 
 
1263
                        logger.warning("Client %s is disabled",
 
 
1265
                        if self.server.use_dbus:
 
 
1267
                            client.Rejected("Disabled")                    
 
 
1270
                    if client._approved or not client.approval_delay:
 
 
1271
                        #We are approved or approval is disabled
 
 
1273
                    elif client._approved is None:
 
 
1274
                        logger.info("Client %s needs approval",
 
 
1276
                        if self.server.use_dbus:
 
 
1278
                            client.NeedApproval(
 
 
1279
                                client.approval_delay_milliseconds(),
 
 
1280
                                client.approved_by_default)
 
 
1282
                        logger.warning("Client %s was not approved",
 
 
1284
                        if self.server.use_dbus:
 
 
1286
                            client.Rejected("Denied")
 
 
1289
                    #wait until timeout or approved
 
 
1290
                    #x = float(client._timedelta_to_milliseconds(delay))
 
 
1291
                    time = datetime.datetime.now()
 
 
1292
                    client.changedstate.acquire()
 
 
1293
                    client.changedstate.wait(float(client._timedelta_to_milliseconds(delay) / 1000))
 
 
1294
                    client.changedstate.release()
 
 
1295
                    time2 = datetime.datetime.now()
 
 
1296
                    if (time2 - time) >= delay:
 
 
1297
                        if not client.approved_by_default:
 
 
1298
                            logger.warning("Client %s timed out while"
 
 
1299
                                           " waiting for approval",
 
 
1301
                            if self.server.use_dbus:
 
 
1303
                                client.Rejected("Approval timed out")
 
 
1308
                        delay -= time2 - time
 
 
1311
                while sent_size < len(client.secret):
 
 
1313
                        sent = session.send(client.secret[sent_size:])
 
 
1314
                    except gnutls.errors.GNUTLSError as error:
 
 
1315
                        logger.warning("gnutls send failed")
 
 
1317
                    logger.debug("Sent: %d, remaining: %d",
 
 
1318
                                 sent, len(client.secret)
 
 
1319
                                 - (sent_size + sent))
 
 
1322
                logger.info("Sending secret to %s", client.name)
 
 
1323
                # bump the timeout as if seen
 
 
1325
                if self.server.use_dbus:
 
1017
 
            for c in self.server.clients:
 
1018
 
                if c.fingerprint == fpr:
 
1022
 
                ipc.write(u"NOTFOUND %s %s\n"
 
1023
 
                          % (fpr, unicode(self.client_address)))
 
1026
 
            # Have to check if client.still_valid(), since it is
 
1027
 
            # possible that the client timed out while establishing
 
1028
 
            # the GnuTLS session.
 
1029
 
            if not client.still_valid():
 
1030
 
                ipc.write(u"INVALID %s\n" % client.name)
 
1033
 
            ipc.write(u"SENDING %s\n" % client.name)
 
1035
 
            while sent_size < len(client.secret):
 
1036
 
                sent = session.send(client.secret[sent_size:])
 
1037
 
                logger.debug(u"Sent: %d, remaining: %d",
 
1038
 
                             sent, len(client.secret)
 
1039
 
                             - (sent_size + sent))
 
 
1330
                if approval_required:
 
 
1331
                    client.approvals_pending -= 1
 
 
1334
                except gnutls.errors.GNUTLSError as error:
 
 
1335
                    logger.warning("GnuTLS bye failed")
 
1044
1338
    def peer_certificate(session):
 
 
1100
1394
        # Convert the buffer to a Python bytestring
 
1101
1395
        fpr = ctypes.string_at(buf, buf_len.value)
 
1102
1396
        # Convert the bytestring to hexadecimal notation
 
1103
 
        hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
 
 
1397
        hex_fpr = ''.join("%02X" % ord(char) for char in fpr)
 
1107
 
class ForkingMixInWithPipe(socketserver.ForkingMixIn, object):
 
1108
 
    """Like socketserver.ForkingMixIn, but also pass a pipe."""
 
 
1401
class MultiprocessingMixIn(object):
 
 
1402
    """Like socketserver.ThreadingMixIn, but with multiprocessing"""
 
 
1403
    def sub_process_main(self, request, address):
 
 
1405
            self.finish_request(request, address)
 
 
1407
            self.handle_error(request, address)
 
 
1408
        self.close_request(request)
 
 
1410
    def process_request(self, request, address):
 
 
1411
        """Start a new process to process the request."""
 
 
1412
        multiprocessing.Process(target = self.sub_process_main,
 
 
1413
                                args = (request, address)).start()
 
 
1415
class MultiprocessingMixInWithPipe(MultiprocessingMixIn, object):
 
 
1416
    """ adds a pipe to the MixIn """
 
1109
1417
    def process_request(self, request, client_address):
 
1110
1418
        """Overrides and wraps the original process_request().
 
1112
1420
        This function creates a new pipe in self.pipe
 
1114
 
        self.pipe = os.pipe()
 
1115
 
        super(ForkingMixInWithPipe,
 
 
1422
        parent_pipe, self.child_pipe = multiprocessing.Pipe()
 
 
1424
        super(MultiprocessingMixInWithPipe,
 
1116
1425
              self).process_request(request, client_address)
 
1117
 
        os.close(self.pipe[1])  # close write end
 
1118
 
        self.add_pipe(self.pipe[0])
 
1119
 
    def add_pipe(self, pipe):
 
 
1426
        self.child_pipe.close()
 
 
1427
        self.add_pipe(parent_pipe)
 
 
1429
    def add_pipe(self, parent_pipe):
 
1120
1430
        """Dummy function; override as necessary"""
 
1124
 
class IPv6_TCPServer(ForkingMixInWithPipe,
 
 
1431
        raise NotImplementedError
 
 
1433
class IPv6_TCPServer(MultiprocessingMixInWithPipe,
 
1125
1434
                     socketserver.TCPServer, object):
 
1126
1435
    """IPv6-capable TCP server.  Accepts 'None' as address and/or port
 
 
1212
1521
            return socketserver.TCPServer.server_activate(self)
 
1213
1522
    def enable(self):
 
1214
1523
        self.enabled = True
 
1215
 
    def add_pipe(self, pipe):
 
 
1524
    def add_pipe(self, parent_pipe):
 
1216
1525
        # Call "handle_ipc" for both data and EOF events
 
1217
 
        gobject.io_add_watch(pipe, gobject.IO_IN | gobject.IO_HUP,
 
1219
 
    def handle_ipc(self, source, condition, file_objects={}):
 
 
1526
        gobject.io_add_watch(parent_pipe.fileno(),
 
 
1527
                             gobject.IO_IN | gobject.IO_HUP,
 
 
1528
                             functools.partial(self.handle_ipc,
 
 
1529
                                               parent_pipe = parent_pipe))
 
 
1531
    def handle_ipc(self, source, condition, parent_pipe=None,
 
 
1532
                   client_object=None):
 
1220
1533
        condition_names = {
 
1221
 
            gobject.IO_IN: u"IN",   # There is data to read.
 
1222
 
            gobject.IO_OUT: u"OUT", # Data can be written (without
 
 
1534
            gobject.IO_IN: "IN",   # There is data to read.
 
 
1535
            gobject.IO_OUT: "OUT", # Data can be written (without
 
1224
 
            gobject.IO_PRI: u"PRI", # There is urgent data to read.
 
1225
 
            gobject.IO_ERR: u"ERR", # Error condition.
 
1226
 
            gobject.IO_HUP: u"HUP"  # Hung up (the connection has been
 
 
1537
            gobject.IO_PRI: "PRI", # There is urgent data to read.
 
 
1538
            gobject.IO_ERR: "ERR", # Error condition.
 
 
1539
            gobject.IO_HUP: "HUP"  # Hung up (the connection has been
 
1227
1540
                                    # broken, usually for pipes and
 
 
1231
1544
                                       for cond, name in
 
1232
1545
                                       condition_names.iteritems()
 
1233
1546
                                       if cond & condition)
 
1234
 
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
 
1237
 
        # Turn the pipe file descriptor into a Python file object
 
1238
 
        if source not in file_objects:
 
1239
 
            file_objects[source] = os.fdopen(source, u"r", 1)
 
1241
 
        # Read a line from the file object
 
1242
 
        cmdline = file_objects[source].readline()
 
1243
 
        if not cmdline:             # Empty line means end of file
 
1244
 
            # close the IPC pipe
 
1245
 
            file_objects[source].close()
 
1246
 
            del file_objects[source]
 
1248
 
            # Stop calling this function
 
1251
 
        logger.debug(u"IPC command: %r", cmdline)
 
1253
 
        # Parse and act on command
 
1254
 
        cmd, args = cmdline.rstrip(u"\r\n").split(None, 1)
 
1256
 
        if cmd == u"NOTFOUND":
 
1257
 
            logger.warning(u"Client not found for fingerprint: %s",
 
1261
 
                mandos_dbus_service.ClientNotFound(args)
 
1262
 
        elif cmd == u"INVALID":
 
1263
 
            for client in self.clients:
 
1264
 
                if client.name == args:
 
1265
 
                    logger.warning(u"Client %s is invalid", args)
 
1271
 
                logger.error(u"Unknown client %s is invalid", args)
 
1272
 
        elif cmd == u"SENDING":
 
1273
 
            for client in self.clients:
 
1274
 
                if client.name == args:
 
1275
 
                    logger.info(u"Sending secret to %s", client.name)
 
1279
 
                        client.ReceivedSecret()
 
1282
 
                logger.error(u"Sending secret to unknown client %s",
 
1285
 
            logger.error(u"Unknown IPC command: %r", cmdline)
 
1287
 
        # Keep calling this function
 
 
1547
        # error or the other end of multiprocessing.Pipe has closed
 
 
1548
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
 
1551
        # Read a request from the child
 
 
1552
        request = parent_pipe.recv()
 
 
1553
        command = request[0]
 
 
1555
        if command == 'init':
 
 
1557
            address = request[2]
 
 
1559
            for c in self.clients:
 
 
1560
                if c.fingerprint == fpr:
 
 
1564
                logger.warning("Client not found for fingerprint: %s, ad"
 
 
1565
                               "dress: %s", fpr, address)
 
 
1568
                    mandos_dbus_service.ClientNotFound(fpr, address[0])
 
 
1569
                parent_pipe.send(False)
 
 
1572
            gobject.io_add_watch(parent_pipe.fileno(),
 
 
1573
                                 gobject.IO_IN | gobject.IO_HUP,
 
 
1574
                                 functools.partial(self.handle_ipc,
 
 
1575
                                                   parent_pipe = parent_pipe,
 
 
1576
                                                   client_object = client))
 
 
1577
            parent_pipe.send(True)
 
 
1578
            # remove the old hook in favor of the new above hook on same fileno
 
 
1580
        if command == 'funcall':
 
 
1581
            funcname = request[1]
 
 
1585
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
 
1587
        if command == 'getattr':
 
 
1588
            attrname = request[1]
 
 
1589
            if callable(client_object.__getattribute__(attrname)):
 
 
1590
                parent_pipe.send(('function',))
 
 
1592
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
 
1594
        if command == 'setattr':
 
 
1595
            attrname = request[1]
 
 
1597
            setattr(client_object, attrname, value)
 
1291
1602
def string_to_delta(interval):
 
1292
1603
    """Parse a string and return a datetime.timedelta
 
1294
 
    >>> string_to_delta(u'7d')
 
 
1605
    >>> string_to_delta('7d')
 
1295
1606
    datetime.timedelta(7)
 
1296
 
    >>> string_to_delta(u'60s')
 
 
1607
    >>> string_to_delta('60s')
 
1297
1608
    datetime.timedelta(0, 60)
 
1298
 
    >>> string_to_delta(u'60m')
 
 
1609
    >>> string_to_delta('60m')
 
1299
1610
    datetime.timedelta(0, 3600)
 
1300
 
    >>> string_to_delta(u'24h')
 
 
1611
    >>> string_to_delta('24h')
 
1301
1612
    datetime.timedelta(1)
 
1302
 
    >>> string_to_delta(u'1w')
 
 
1613
    >>> string_to_delta('1w')
 
1303
1614
    datetime.timedelta(7)
 
1304
 
    >>> string_to_delta(u'5m 30s')
 
 
1615
    >>> string_to_delta('5m 30s')
 
1305
1616
    datetime.timedelta(0, 330)
 
1307
1618
    timevalue = datetime.timedelta(0)
 
 
1380
1692
    ##################################################################
 
1381
1693
    # Parsing of options, both command line and config file
 
1383
 
    parser = optparse.OptionParser(version = "%%prog %s" % version)
 
1384
 
    parser.add_option("-i", u"--interface", type=u"string",
 
1385
 
                      metavar="IF", help=u"Bind to interface IF")
 
1386
 
    parser.add_option("-a", u"--address", type=u"string",
 
1387
 
                      help=u"Address to listen for requests on")
 
1388
 
    parser.add_option("-p", u"--port", type=u"int",
 
1389
 
                      help=u"Port number to receive requests on")
 
1390
 
    parser.add_option("--check", action=u"store_true",
 
1391
 
                      help=u"Run self-test")
 
1392
 
    parser.add_option("--debug", action=u"store_true",
 
1393
 
                      help=u"Debug mode; run in foreground and log to"
 
1395
 
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
 
1396
 
                      u" priority string (see GnuTLS documentation)")
 
1397
 
    parser.add_option("--servicename", type=u"string",
 
1398
 
                      metavar=u"NAME", help=u"Zeroconf service name")
 
1399
 
    parser.add_option("--configdir", type=u"string",
 
1400
 
                      default=u"/etc/mandos", metavar=u"DIR",
 
1401
 
                      help=u"Directory to search for configuration"
 
1403
 
    parser.add_option("--no-dbus", action=u"store_false",
 
1404
 
                      dest=u"use_dbus", help=u"Do not provide D-Bus"
 
1405
 
                      u" system bus interface")
 
1406
 
    parser.add_option("--no-ipv6", action=u"store_false",
 
1407
 
                      dest=u"use_ipv6", help=u"Do not use IPv6")
 
1408
 
    options = parser.parse_args()[0]
 
 
1695
    parser = argparse.ArgumentParser()
 
 
1696
    parser.add_argument("-v", "--version", action="version",
 
 
1697
                        version = "%%(prog)s %s" % version,
 
 
1698
                        help="show version number and exit")
 
 
1699
    parser.add_argument("-i", "--interface", metavar="IF",
 
 
1700
                        help="Bind to interface IF")
 
 
1701
    parser.add_argument("-a", "--address",
 
 
1702
                        help="Address to listen for requests on")
 
 
1703
    parser.add_argument("-p", "--port", type=int,
 
 
1704
                        help="Port number to receive requests on")
 
 
1705
    parser.add_argument("--check", action="store_true",
 
 
1706
                        help="Run self-test")
 
 
1707
    parser.add_argument("--debug", action="store_true",
 
 
1708
                        help="Debug mode; run in foreground and log"
 
 
1710
    parser.add_argument("--debuglevel", metavar="LEVEL",
 
 
1711
                        help="Debug level for stdout output")
 
 
1712
    parser.add_argument("--priority", help="GnuTLS"
 
 
1713
                        " priority string (see GnuTLS documentation)")
 
 
1714
    parser.add_argument("--servicename",
 
 
1715
                        metavar="NAME", help="Zeroconf service name")
 
 
1716
    parser.add_argument("--configdir",
 
 
1717
                        default="/etc/mandos", metavar="DIR",
 
 
1718
                        help="Directory to search for configuration"
 
 
1720
    parser.add_argument("--no-dbus", action="store_false",
 
 
1721
                        dest="use_dbus", help="Do not provide D-Bus"
 
 
1722
                        " system bus interface")
 
 
1723
    parser.add_argument("--no-ipv6", action="store_false",
 
 
1724
                        dest="use_ipv6", help="Do not use IPv6")
 
 
1725
    options = parser.parse_args()
 
1410
1727
    if options.check:
 
 
1415
1732
    # Default values for config file for server-global settings
 
1416
 
    server_defaults = { u"interface": u"",
 
1421
 
                        u"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
 
1422
 
                        u"servicename": u"Mandos",
 
1423
 
                        u"use_dbus": u"True",
 
1424
 
                        u"use_ipv6": u"True",
 
 
1733
    server_defaults = { "interface": "",
 
 
1738
                        "SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
 
 
1739
                        "servicename": "Mandos",
 
1427
1745
    # Parse config file for server-global settings
 
1428
1746
    server_config = configparser.SafeConfigParser(server_defaults)
 
1429
1747
    del server_defaults
 
1430
1748
    server_config.read(os.path.join(options.configdir,
 
1432
1750
    # Convert the SafeConfigParser object to a dict
 
1433
1751
    server_settings = server_config.defaults()
 
1434
1752
    # Use the appropriate methods on the non-string config options
 
1435
 
    for option in (u"debug", u"use_dbus", u"use_ipv6"):
 
1436
 
        server_settings[option] = server_config.getboolean(u"DEFAULT",
 
 
1753
    for option in ("debug", "use_dbus", "use_ipv6"):
 
 
1754
        server_settings[option] = server_config.getboolean("DEFAULT",
 
1438
1756
    if server_settings["port"]:
 
1439
 
        server_settings["port"] = server_config.getint(u"DEFAULT",
 
 
1757
        server_settings["port"] = server_config.getint("DEFAULT",
 
1441
1759
    del server_config
 
1443
1761
    # Override the settings from the config file with command line
 
1444
1762
    # options, if set.
 
1445
 
    for option in (u"interface", u"address", u"port", u"debug",
 
1446
 
                   u"priority", u"servicename", u"configdir",
 
1447
 
                   u"use_dbus", u"use_ipv6"):
 
 
1763
    for option in ("interface", "address", "port", "debug",
 
 
1764
                   "priority", "servicename", "configdir",
 
 
1765
                   "use_dbus", "use_ipv6", "debuglevel"):
 
1448
1766
        value = getattr(options, option)
 
1449
1767
        if value is not None:
 
1450
1768
            server_settings[option] = value
 
 
1458
1776
    ##################################################################
 
1460
1778
    # For convenience
 
1461
 
    debug = server_settings[u"debug"]
 
1462
 
    use_dbus = server_settings[u"use_dbus"]
 
1463
 
    use_ipv6 = server_settings[u"use_ipv6"]
 
1466
 
        syslogger.setLevel(logging.WARNING)
 
1467
 
        console.setLevel(logging.WARNING)
 
1469
 
    if server_settings[u"servicename"] != u"Mandos":
 
 
1779
    debug = server_settings["debug"]
 
 
1780
    debuglevel = server_settings["debuglevel"]
 
 
1781
    use_dbus = server_settings["use_dbus"]
 
 
1782
    use_ipv6 = server_settings["use_ipv6"]
 
 
1784
    if server_settings["servicename"] != "Mandos":
 
1470
1785
        syslogger.setFormatter(logging.Formatter
 
1471
 
                               (u'Mandos (%s) [%%(process)d]:'
 
1472
 
                                u' %%(levelname)s: %%(message)s'
 
1473
 
                                % server_settings[u"servicename"]))
 
 
1786
                               ('Mandos (%s) [%%(process)d]:'
 
 
1787
                                ' %%(levelname)s: %%(message)s'
 
 
1788
                                % server_settings["servicename"]))
 
1475
1790
    # Parse config file with clients
 
1476
 
    client_defaults = { u"timeout": u"1h",
 
1478
 
                        u"checker": u"fping -q -- %%(host)s",
 
 
1791
    client_defaults = { "timeout": "1h",
 
 
1793
                        "checker": "fping -q -- %%(host)s",
 
 
1795
                        "approval_delay": "0s",
 
 
1796
                        "approval_duration": "1s",
 
1481
1798
    client_config = configparser.SafeConfigParser(client_defaults)
 
1482
 
    client_config.read(os.path.join(server_settings[u"configdir"],
 
 
1799
    client_config.read(os.path.join(server_settings["configdir"],
 
1485
1802
    global mandos_dbus_service
 
1486
1803
    mandos_dbus_service = None
 
1488
 
    tcp_server = MandosServer((server_settings[u"address"],
 
1489
 
                               server_settings[u"port"]),
 
 
1805
    tcp_server = MandosServer((server_settings["address"],
 
 
1806
                               server_settings["port"]),
 
1491
 
                              interface=server_settings[u"interface"],
 
 
1808
                              interface=(server_settings["interface"]
 
1492
1810
                              use_ipv6=use_ipv6,
 
1493
1811
                              gnutls_priority=
 
1494
 
                              server_settings[u"priority"],
 
 
1812
                              server_settings["priority"],
 
1495
1813
                              use_dbus=use_dbus)
 
1496
 
    pidfilename = u"/var/run/mandos.pid"
 
1498
 
        pidfile = open(pidfilename, u"w")
 
1500
 
        logger.error(u"Could not open file %r", pidfilename)
 
 
1815
        pidfilename = "/var/run/mandos.pid"
 
 
1817
            pidfile = open(pidfilename, "w")
 
 
1819
            logger.error("Could not open file %r", pidfilename)
 
1503
 
        uid = pwd.getpwnam(u"_mandos").pw_uid
 
1504
 
        gid = pwd.getpwnam(u"_mandos").pw_gid
 
 
1822
        uid = pwd.getpwnam("_mandos").pw_uid
 
 
1823
        gid = pwd.getpwnam("_mandos").pw_gid
 
1505
1824
    except KeyError:
 
1507
 
            uid = pwd.getpwnam(u"mandos").pw_uid
 
1508
 
            gid = pwd.getpwnam(u"mandos").pw_gid
 
 
1826
            uid = pwd.getpwnam("mandos").pw_uid
 
 
1827
            gid = pwd.getpwnam("mandos").pw_gid
 
1509
1828
        except KeyError:
 
1511
 
                uid = pwd.getpwnam(u"nobody").pw_uid
 
1512
 
                gid = pwd.getpwnam(u"nobody").pw_gid
 
 
1830
                uid = pwd.getpwnam("nobody").pw_uid
 
 
1831
                gid = pwd.getpwnam("nobody").pw_gid
 
1513
1832
            except KeyError:
 
1519
 
    except OSError, error:
 
 
1838
    except OSError as error:
 
1520
1839
        if error[0] != errno.EPERM:
 
1523
 
    # Enable all possible GnuTLS debugging
 
 
1842
    if not debug and not debuglevel:
 
 
1843
        syslogger.setLevel(logging.WARNING)
 
 
1844
        console.setLevel(logging.WARNING)
 
 
1846
        level = getattr(logging, debuglevel.upper())
 
 
1847
        syslogger.setLevel(level)
 
 
1848
        console.setLevel(level)
 
 
1851
        # Enable all possible GnuTLS debugging
 
1525
1853
        # "Use a log level over 10 to enable all debugging options."
 
1526
1854
        # - GnuTLS manual
 
1527
1855
        gnutls.library.functions.gnutls_global_set_log_level(11)
 
1529
1857
        @gnutls.library.types.gnutls_log_func
 
1530
1858
        def debug_gnutls(level, string):
 
1531
 
            logger.debug(u"GnuTLS: %s", string[:-1])
 
 
1859
            logger.debug("GnuTLS: %s", string[:-1])
 
1533
1861
        (gnutls.library.functions
 
1534
1862
         .gnutls_global_set_log_function(debug_gnutls))
 
 
1864
        # Redirect stdin so all checkers get /dev/null
 
 
1865
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
 
1866
        os.dup2(null, sys.stdin.fileno())
 
 
1870
        # No console logging
 
 
1871
        logger.removeHandler(console)
 
 
1873
    # Need to fork before connecting to D-Bus
 
 
1875
        # Close all input and output, do double fork, etc.
 
1536
1878
    global main_loop
 
1537
1879
    # From the Avahi example code
 
 
1540
1882
    bus = dbus.SystemBus()
 
1541
1883
    # End of Avahi example code
 
1543
 
        bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos", bus)
 
 
1886
            bus_name = dbus.service.BusName("se.bsnet.fukt.Mandos",
 
 
1887
                                            bus, do_not_queue=True)
 
 
1888
        except dbus.exceptions.NameExistsException as e:
 
 
1889
            logger.error(unicode(e) + ", disabling D-Bus")
 
 
1891
            server_settings["use_dbus"] = False
 
 
1892
            tcp_server.use_dbus = False
 
1544
1893
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
1545
 
    service = AvahiService(name = server_settings[u"servicename"],
 
1546
 
                           servicetype = u"_mandos._tcp",
 
 
1894
    service = AvahiService(name = server_settings["servicename"],
 
 
1895
                           servicetype = "_mandos._tcp",
 
1547
1896
                           protocol = protocol, bus = bus)
 
1548
1897
    if server_settings["interface"]:
 
1549
1898
        service.interface = (if_nametoindex
 
1550
 
                             (str(server_settings[u"interface"])))
 
 
1899
                             (str(server_settings["interface"])))
 
 
1901
    global multiprocessing_manager
 
 
1902
    multiprocessing_manager = multiprocessing.Manager()
 
1552
1904
    client_class = Client
 
1554
1906
        client_class = functools.partial(ClientDBus, bus = bus)
 
 
1907
    def client_config_items(config, section):
 
 
1908
        special_settings = {
 
 
1909
            "approved_by_default":
 
 
1910
                lambda: config.getboolean(section,
 
 
1911
                                          "approved_by_default"),
 
 
1913
        for name, value in config.items(section):
 
 
1915
                yield (name, special_settings[name]())
 
1555
1919
    tcp_server.clients.update(set(
 
1556
1920
            client_class(name = section,
 
1557
 
                         config= dict(client_config.items(section)))
 
 
1921
                         config= dict(client_config_items(
 
 
1922
                        client_config, section)))
 
1558
1923
            for section in client_config.sections()))
 
1559
1924
    if not tcp_server.clients:
 
1560
 
        logger.warning(u"No clients defined")
 
1563
 
        # Redirect stdin so all checkers get /dev/null
 
1564
 
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
1565
 
        os.dup2(null, sys.stdin.fileno())
 
1569
 
        # No console logging
 
1570
 
        logger.removeHandler(console)
 
1571
 
        # Close all input and output, do double fork, etc.
 
1575
 
        with closing(pidfile):
 
1577
 
            pidfile.write(str(pid) + "\n")
 
1580
 
        logger.error(u"Could not write to file %r with PID %d",
 
1583
 
        # "pidfile" was never created
 
1588
 
        "Cleanup function; run on exit"
 
 
1925
        logger.warning("No clients defined")
 
1591
 
        while tcp_server.clients:
 
1592
 
            client = tcp_server.clients.pop()
 
1593
 
            client.disable_hook = None
 
1596
 
    atexit.register(cleanup)
 
 
1931
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
 
1934
            logger.error("Could not write to file %r with PID %d",
 
 
1937
            # "pidfile" was never created
 
1599
1941
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1600
1943
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
1601
1944
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
 
 
1604
1947
        class MandosDBusService(dbus.service.Object):
 
1605
1948
            """A D-Bus proxy object"""
 
1606
1949
            def __init__(self):
 
1607
 
                dbus.service.Object.__init__(self, bus, u"/")
 
1608
 
            _interface = u"se.bsnet.fukt.Mandos"
 
1610
 
            @dbus.service.signal(_interface, signature=u"oa{sv}")
 
1611
 
            def ClientAdded(self, objpath, properties):
 
1615
 
            @dbus.service.signal(_interface, signature=u"s")
 
1616
 
            def ClientNotFound(self, fingerprint):
 
1620
 
            @dbus.service.signal(_interface, signature=u"os")
 
 
1950
                dbus.service.Object.__init__(self, bus, "/")
 
 
1951
            _interface = "se.bsnet.fukt.Mandos"
 
 
1953
            @dbus.service.signal(_interface, signature="o")
 
 
1954
            def ClientAdded(self, objpath):
 
 
1958
            @dbus.service.signal(_interface, signature="ss")
 
 
1959
            def ClientNotFound(self, fingerprint, address):
 
 
1963
            @dbus.service.signal(_interface, signature="os")
 
1621
1964
            def ClientRemoved(self, objpath, name):
 
1625
 
            @dbus.service.method(_interface, out_signature=u"ao")
 
 
1968
            @dbus.service.method(_interface, out_signature="ao")
 
1626
1969
            def GetAllClients(self):
 
1628
1971
                return dbus.Array(c.dbus_object_path
 
1629
1972
                                  for c in tcp_server.clients)
 
1631
1974
            @dbus.service.method(_interface,
 
1632
 
                                 out_signature=u"a{oa{sv}}")
 
 
1975
                                 out_signature="a{oa{sv}}")
 
1633
1976
            def GetAllClientsWithProperties(self):
 
1635
1978
                return dbus.Dictionary(
 
1636
 
                    ((c.dbus_object_path, c.GetAll(u""))
 
 
1979
                    ((c.dbus_object_path, c.GetAll(""))
 
1637
1980
                     for c in tcp_server.clients),
 
1638
 
                    signature=u"oa{sv}")
 
1640
 
            @dbus.service.method(_interface, in_signature=u"o")
 
 
1983
            @dbus.service.method(_interface, in_signature="o")
 
1641
1984
            def RemoveClient(self, object_path):
 
1643
1986
                for c in tcp_server.clients: