88
81
    except ImportError:
 
89
82
        SO_BINDTODEVICE = None
 
92
 
stored_state_file = "clients.pickle"
 
94
 
logger = logging.getLogger()
 
 
87
#logger = logging.getLogger('mandos')
 
 
88
logger = logging.Logger('mandos')
 
95
89
syslogger = (logging.handlers.SysLogHandler
 
96
90
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
 
97
91
              address = str("/dev/log")))
 
100
 
    if_nametoindex = (ctypes.cdll.LoadLibrary
 
101
 
                      (ctypes.util.find_library("c"))
 
103
 
except (OSError, AttributeError):
 
104
 
    def if_nametoindex(interface):
 
105
 
        "Get an interface index the hard way, i.e. using fcntl()"
 
106
 
        SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
 
107
 
        with contextlib.closing(socket.socket()) as s:
 
108
 
            ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
 
109
 
                                struct.pack(str("16s16x"),
 
111
 
        interface_index = struct.unpack(str("I"),
 
113
 
        return interface_index
 
116
 
def initlogger(debug, level=logging.WARNING):
 
117
 
    """init logger and add loglevel"""
 
119
 
    syslogger.setFormatter(logging.Formatter
 
120
 
                           ('Mandos [%(process)d]: %(levelname)s:'
 
122
 
    logger.addHandler(syslogger)
 
125
 
        console = logging.StreamHandler()
 
126
 
        console.setFormatter(logging.Formatter('%(asctime)s %(name)s'
 
130
 
        logger.addHandler(console)
 
131
 
    logger.setLevel(level)
 
134
 
class PGPError(Exception):
 
135
 
    """Exception if encryption/decryption fails"""
 
139
 
class PGPEngine(object):
 
140
 
    """A simple class for OpenPGP symmetric encryption & decryption"""
 
142
 
        self.tempdir = tempfile.mkdtemp(prefix="mandos-")
 
143
 
        self.gnupgargs = ['--batch',
 
144
 
                          '--home', self.tempdir,
 
152
 
    def __exit__(self, exc_type, exc_value, traceback):
 
160
 
        if self.tempdir is not None:
 
161
 
            # Delete contents of tempdir
 
162
 
            for root, dirs, files in os.walk(self.tempdir,
 
164
 
                for filename in files:
 
165
 
                    os.remove(os.path.join(root, filename))
 
167
 
                    os.rmdir(os.path.join(root, dirname))
 
169
 
            os.rmdir(self.tempdir)
 
172
 
    def password_encode(self, password):
 
173
 
        # Passphrase can not be empty and can not contain newlines or
 
174
 
        # NUL bytes.  So we prefix it and hex encode it.
 
175
 
        encoded = b"mandos" + binascii.hexlify(password)
 
176
 
        if len(encoded) > 2048:
 
177
 
            # GnuPG can't handle long passwords, so encode differently
 
178
 
            encoded = (b"mandos" + password.replace(b"\\", b"\\\\")
 
179
 
                       .replace(b"\n", b"\\n")
 
180
 
                       .replace(b"\0", b"\\x00"))
 
183
 
    def encrypt(self, data, password):
 
184
 
        passphrase = self.password_encode(password)
 
185
 
        with tempfile.NamedTemporaryFile(dir=self.tempdir
 
187
 
            passfile.write(passphrase)
 
189
 
            proc = subprocess.Popen(['gpg', '--symmetric',
 
193
 
                                    stdin = subprocess.PIPE,
 
194
 
                                    stdout = subprocess.PIPE,
 
195
 
                                    stderr = subprocess.PIPE)
 
196
 
            ciphertext, err = proc.communicate(input = data)
 
197
 
        if proc.returncode != 0:
 
201
 
    def decrypt(self, data, password):
 
202
 
        passphrase = self.password_encode(password)
 
203
 
        with tempfile.NamedTemporaryFile(dir = self.tempdir
 
205
 
            passfile.write(passphrase)
 
207
 
            proc = subprocess.Popen(['gpg', '--decrypt',
 
211
 
                                    stdin = subprocess.PIPE,
 
212
 
                                    stdout = subprocess.PIPE,
 
213
 
                                    stderr = subprocess.PIPE)
 
214
 
            decrypted_plaintext, err = proc.communicate(input
 
216
 
        if proc.returncode != 0:
 
218
 
        return decrypted_plaintext
 
 
92
syslogger.setFormatter(logging.Formatter
 
 
93
                       ('Mandos [%(process)d]: %(levelname)s:'
 
 
95
logger.addHandler(syslogger)
 
 
97
console = logging.StreamHandler()
 
 
98
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
 
101
logger.addHandler(console)
 
221
103
class AvahiError(Exception):
 
222
104
    def __init__(self, value, *args, **kwargs):
 
 
279
159
                            " after %i retries, exiting.",
 
280
160
                            self.rename_count)
 
281
161
            raise AvahiServiceError("Too many renames")
 
282
 
        self.name = unicode(self.server
 
283
 
                            .GetAlternativeServiceName(self.name))
 
 
162
        self.name = unicode(self.server.GetAlternativeServiceName(self.name))
 
284
163
        logger.info("Changing Zeroconf service name to %r ...",
 
 
165
        syslogger.setFormatter(logging.Formatter
 
 
166
                               ('Mandos (%s) [%%(process)d]:'
 
 
167
                                ' %%(levelname)s: %%(message)s'
 
289
172
        except dbus.exceptions.DBusException as error:
 
290
 
            logger.critical("D-Bus Exception", exc_info=error)
 
 
173
            logger.critical("DBusException: %s", error)
 
293
176
        self.rename_count += 1
 
295
177
    def remove(self):
 
296
178
        """Derived from the Avahi example code"""
 
 
179
        if self.group is not None:
 
 
182
            except (dbus.exceptions.UnknownMethodException,
 
 
183
                    dbus.exceptions.DBusException) as e:
 
297
186
        if self.entry_group_state_changed_match is not None:
 
298
187
            self.entry_group_state_changed_match.remove()
 
299
188
            self.entry_group_state_changed_match = None
 
300
 
        if self.group is not None:
 
304
190
        """Derived from the Avahi example code"""
 
306
 
        if self.group is None:
 
307
 
            self.group = dbus.Interface(
 
308
 
                self.bus.get_object(avahi.DBUS_NAME,
 
309
 
                                    self.server.EntryGroupNew()),
 
310
 
                avahi.DBUS_INTERFACE_ENTRY_GROUP)
 
 
192
        self.group = dbus.Interface(
 
 
193
            self.bus.get_object(avahi.DBUS_NAME,
 
 
194
                                self.server.EntryGroupNew(),
 
 
195
                                follow_name_owner_changes=True),
 
 
196
            avahi.DBUS_INTERFACE_ENTRY_GROUP)
 
311
197
        self.entry_group_state_changed_match = (
 
312
198
            self.group.connect_to_signal(
 
313
 
                'StateChanged', self.entry_group_state_changed))
 
 
199
                'StateChanged', self .entry_group_state_changed))
 
314
200
        logger.debug("Adding Zeroconf service '%s' of type '%s' ...",
 
315
201
                     self.name, self.type)
 
316
202
        self.group.AddService(
 
 
433
283
    interval:   datetime.timedelta(); How often to start a new checker
 
434
284
    last_approval_request: datetime.datetime(); (UTC) or None
 
435
285
    last_checked_ok: datetime.datetime(); (UTC) or None
 
436
 
    last_checker_status: integer between 0 and 255 reflecting exit
 
437
 
                         status of last checker. -1 reflects crashed
 
438
 
                         checker, -2 means no checker completed yet.
 
439
 
    last_enabled: datetime.datetime(); (UTC) or None
 
 
286
    last_enabled: datetime.datetime(); (UTC)
 
440
287
    name:       string; from the config file, used in log messages and
 
441
288
                        D-Bus identifiers
 
442
289
    secret:     bytestring; sent verbatim (over TLS) to client
 
443
290
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
444
291
                                      until this client is disabled
 
445
 
    extended_timeout:   extra long timeout when secret has been sent
 
446
292
    runtime_expansions: Allowed attributes for runtime expansion.
 
447
 
    expires:    datetime.datetime(); time (UTC) when a client will be
 
449
 
    server_settings: The server_settings dict from main()
 
452
295
    runtime_expansions = ("approval_delay", "approval_duration",
 
453
 
                          "created", "enabled", "expires",
 
454
 
                          "fingerprint", "host", "interval",
 
455
 
                          "last_approval_request", "last_checked_ok",
 
 
296
                          "created", "enabled", "fingerprint",
 
 
297
                          "host", "interval", "last_checked_ok",
 
456
298
                          "last_enabled", "name", "timeout")
 
457
 
    client_defaults = { "timeout": "PT5M",
 
458
 
                        "extended_timeout": "PT15M",
 
460
 
                        "checker": "fping -q -- %%(host)s",
 
462
 
                        "approval_delay": "PT0S",
 
463
 
                        "approval_duration": "PT1S",
 
464
 
                        "approved_by_default": "True",
 
 
301
    def _timedelta_to_milliseconds(td):
 
 
302
        "Convert a datetime.timedelta() to milliseconds"
 
 
303
        return ((td.days * 24 * 60 * 60 * 1000)
 
 
304
                + (td.seconds * 1000)
 
 
305
                + (td.microseconds // 1000))
 
468
307
    def timeout_milliseconds(self):
 
469
308
        "Return the 'timeout' attribute in milliseconds"
 
470
 
        return timedelta_to_milliseconds(self.timeout)
 
472
 
    def extended_timeout_milliseconds(self):
 
473
 
        "Return the 'extended_timeout' attribute in milliseconds"
 
474
 
        return timedelta_to_milliseconds(self.extended_timeout)
 
 
309
        return self._timedelta_to_milliseconds(self.timeout)
 
476
311
    def interval_milliseconds(self):
 
477
312
        "Return the 'interval' attribute in milliseconds"
 
478
 
        return timedelta_to_milliseconds(self.interval)
 
 
313
        return self._timedelta_to_milliseconds(self.interval)
 
480
315
    def approval_delay_milliseconds(self):
 
481
 
        return timedelta_to_milliseconds(self.approval_delay)
 
484
 
    def config_parser(config):
 
485
 
        """Construct a new dict of client settings of this form:
 
486
 
        { client_name: {setting_name: value, ...}, ...}
 
487
 
        with exceptions for any special settings as defined above.
 
488
 
        NOTE: Must be a pure function. Must return the same result
 
489
 
        value given the same arguments.
 
492
 
        for client_name in config.sections():
 
493
 
            section = dict(config.items(client_name))
 
494
 
            client = settings[client_name] = {}
 
496
 
            client["host"] = section["host"]
 
497
 
            # Reformat values from string types to Python types
 
498
 
            client["approved_by_default"] = config.getboolean(
 
499
 
                client_name, "approved_by_default")
 
500
 
            client["enabled"] = config.getboolean(client_name,
 
503
 
            client["fingerprint"] = (section["fingerprint"].upper()
 
505
 
            if "secret" in section:
 
506
 
                client["secret"] = section["secret"].decode("base64")
 
507
 
            elif "secfile" in section:
 
508
 
                with open(os.path.expanduser(os.path.expandvars
 
509
 
                                             (section["secfile"])),
 
511
 
                    client["secret"] = secfile.read()
 
513
 
                raise TypeError("No secret or secfile for section {0}"
 
515
 
            client["timeout"] = string_to_delta(section["timeout"])
 
516
 
            client["extended_timeout"] = string_to_delta(
 
517
 
                section["extended_timeout"])
 
518
 
            client["interval"] = string_to_delta(section["interval"])
 
519
 
            client["approval_delay"] = string_to_delta(
 
520
 
                section["approval_delay"])
 
521
 
            client["approval_duration"] = string_to_delta(
 
522
 
                section["approval_duration"])
 
523
 
            client["checker_command"] = section["checker"]
 
524
 
            client["last_approval_request"] = None
 
525
 
            client["last_checked_ok"] = None
 
526
 
            client["last_checker_status"] = -2
 
530
 
    def __init__(self, settings, name = None, server_settings=None):
 
 
316
        return self._timedelta_to_milliseconds(self.approval_delay)
 
 
318
    def __init__(self, name = None, disable_hook=None, config=None):
 
 
319
        """Note: the 'checker' key in 'config' sets the
 
 
320
        'checker_command' attribute and *not* the 'checker'
 
532
 
        if server_settings is None:
 
534
 
        self.server_settings = server_settings
 
535
 
        # adding all client settings
 
536
 
        for setting, value in settings.iteritems():
 
537
 
            setattr(self, setting, value)
 
540
 
            if not hasattr(self, "last_enabled"):
 
541
 
                self.last_enabled = datetime.datetime.utcnow()
 
542
 
            if not hasattr(self, "expires"):
 
543
 
                self.expires = (datetime.datetime.utcnow()
 
546
 
            self.last_enabled = None
 
549
325
        logger.debug("Creating client %r", self.name)
 
550
326
        # Uppercase and remove spaces from fingerprint for later
 
551
327
        # comparison purposes with return value from the fingerprint()
 
 
329
        self.fingerprint = (config["fingerprint"].upper()
 
553
331
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
554
 
        self.created = settings.get("created",
 
555
 
                                    datetime.datetime.utcnow())
 
557
 
        # attributes specific for this server instance
 
 
332
        if "secret" in config:
 
 
333
            self.secret = config["secret"].decode("base64")
 
 
334
        elif "secfile" in config:
 
 
335
            with open(os.path.expanduser(os.path.expandvars
 
 
336
                                         (config["secfile"])),
 
 
338
                self.secret = secfile.read()
 
 
340
            raise TypeError("No secret or secfile for client %s"
 
 
342
        self.host = config.get("host", "")
 
 
343
        self.created = datetime.datetime.utcnow()
 
 
345
        self.last_approval_request = None
 
 
346
        self.last_enabled = None
 
 
347
        self.last_checked_ok = None
 
 
348
        self.timeout = string_to_delta(config["timeout"])
 
 
349
        self.interval = string_to_delta(config["interval"])
 
 
350
        self.disable_hook = disable_hook
 
558
351
        self.checker = None
 
559
352
        self.checker_initiator_tag = None
 
560
353
        self.disable_initiator_tag = None
 
561
354
        self.checker_callback_tag = None
 
 
355
        self.checker_command = config["checker"]
 
562
356
        self.current_checker_command = None
 
 
357
        self.last_connect = None
 
 
358
        self._approved = None
 
 
359
        self.approved_by_default = config.get("approved_by_default",
 
564
361
        self.approvals_pending = 0
 
565
 
        self.changedstate = (multiprocessing_manager
 
566
 
                             .Condition(multiprocessing_manager
 
568
 
        self.client_structure = [attr for attr in
 
569
 
                                 self.__dict__.iterkeys()
 
570
 
                                 if not attr.startswith("_")]
 
571
 
        self.client_structure.append("client_structure")
 
573
 
        for name, t in inspect.getmembers(type(self),
 
577
 
            if not name.startswith("_"):
 
578
 
                self.client_structure.append(name)
 
 
362
        self.approval_delay = string_to_delta(
 
 
363
            config["approval_delay"])
 
 
364
        self.approval_duration = string_to_delta(
 
 
365
            config["approval_duration"])
 
 
366
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
580
 
    # Send notice to process children that client state has changed
 
581
368
    def send_changedstate(self):
 
582
 
        with self.changedstate:
 
583
 
            self.changedstate.notify_all()
 
 
369
        self.changedstate.acquire()
 
 
370
        self.changedstate.notify_all()
 
 
371
        self.changedstate.release()
 
585
373
    def enable(self):
 
586
374
        """Start this client's checker and timeout hooks"""
 
587
375
        if getattr(self, "enabled", False):
 
588
376
            # Already enabled
 
590
 
        self.expires = datetime.datetime.utcnow() + self.timeout
 
 
378
        self.send_changedstate()
 
592
379
        self.last_enabled = datetime.datetime.utcnow()
 
594
 
        self.send_changedstate()
 
596
 
    def disable(self, quiet=True):
 
597
 
        """Disable this client."""
 
598
 
        if not getattr(self, "enabled", False):
 
601
 
            logger.info("Disabling client %s", self.name)
 
602
 
        if getattr(self, "disable_initiator_tag", None) is not None:
 
603
 
            gobject.source_remove(self.disable_initiator_tag)
 
604
 
            self.disable_initiator_tag = None
 
606
 
        if getattr(self, "checker_initiator_tag", None) is not None:
 
607
 
            gobject.source_remove(self.checker_initiator_tag)
 
608
 
            self.checker_initiator_tag = None
 
612
 
            self.send_changedstate()
 
613
 
        # Do not run this again if called by a gobject.timeout_add
 
619
 
    def init_checker(self):
 
620
380
        # Schedule a new checker to be started an 'interval' from now,
 
621
381
        # and every interval from then on.
 
622
 
        if self.checker_initiator_tag is not None:
 
623
 
            gobject.source_remove(self.checker_initiator_tag)
 
624
382
        self.checker_initiator_tag = (gobject.timeout_add
 
625
383
                                      (self.interval_milliseconds(),
 
626
384
                                       self.start_checker))
 
627
385
        # Schedule a disable() when 'timeout' has passed
 
628
 
        if self.disable_initiator_tag is not None:
 
629
 
            gobject.source_remove(self.disable_initiator_tag)
 
630
386
        self.disable_initiator_tag = (gobject.timeout_add
 
631
387
                                   (self.timeout_milliseconds(),
 
633
390
        # Also start a new checker *right now*.
 
634
391
        self.start_checker()
 
 
393
    def disable(self, quiet=True):
 
 
394
        """Disable this client."""
 
 
395
        if not getattr(self, "enabled", False):
 
 
398
            self.send_changedstate()
 
 
400
            logger.info("Disabling client %s", self.name)
 
 
401
        if getattr(self, "disable_initiator_tag", False):
 
 
402
            gobject.source_remove(self.disable_initiator_tag)
 
 
403
            self.disable_initiator_tag = None
 
 
404
        if getattr(self, "checker_initiator_tag", False):
 
 
405
            gobject.source_remove(self.checker_initiator_tag)
 
 
406
            self.checker_initiator_tag = None
 
 
408
        if self.disable_hook:
 
 
409
            self.disable_hook(self)
 
 
411
        # Do not run this again if called by a gobject.timeout_add
 
 
415
        self.disable_hook = None
 
636
418
    def checker_callback(self, pid, condition, command):
 
637
419
        """The checker has completed, so take appropriate actions."""
 
638
420
        self.checker_callback_tag = None
 
639
421
        self.checker = None
 
640
422
        if os.WIFEXITED(condition):
 
641
 
            self.last_checker_status = os.WEXITSTATUS(condition)
 
642
 
            if self.last_checker_status == 0:
 
 
423
            exitstatus = os.WEXITSTATUS(condition)
 
643
425
                logger.info("Checker for %(name)s succeeded",
 
645
427
                self.checked_ok()
 
 
867
592
class DBusObjectWithProperties(dbus.service.Object):
 
868
593
    """A D-Bus object with properties.
 
870
595
    Classes inheriting from this can use the dbus_service_property
 
871
596
    decorator to expose methods as D-Bus properties.  It exposes the
 
872
597
    standard Get(), Set(), and GetAll() methods on the D-Bus.
 
876
 
    def _is_dbus_thing(thing):
 
877
 
        """Returns a function testing if an attribute is a D-Bus thing
 
879
 
        If called like _is_dbus_thing("method") it returns a function
 
880
 
        suitable for use as predicate to inspect.getmembers().
 
882
 
        return lambda obj: getattr(obj, "_dbus_is_{0}".format(thing),
 
 
601
    def _is_dbus_property(obj):
 
 
602
        return getattr(obj, "_dbus_is_property", False)
 
885
 
    def _get_all_dbus_things(self, thing):
 
 
604
    def _get_all_dbus_properties(self):
 
886
605
        """Returns a generator of (name, attribute) pairs
 
888
 
        return ((getattr(athing.__get__(self), "_dbus_name",
 
890
 
                 athing.__get__(self))
 
891
 
                for cls in self.__class__.__mro__
 
893
 
                inspect.getmembers(cls,
 
894
 
                                   self._is_dbus_thing(thing)))
 
 
607
        return ((prop._dbus_name, prop)
 
 
609
                inspect.getmembers(self, self._is_dbus_property))
 
896
611
    def _get_dbus_property(self, interface_name, property_name):
 
897
612
        """Returns a bound method if one exists which is a D-Bus
 
898
613
        property with the specified name and interface.
 
900
 
        for cls in  self.__class__.__mro__:
 
901
 
            for name, value in (inspect.getmembers
 
903
 
                                 self._is_dbus_thing("property"))):
 
904
 
                if (value._dbus_name == property_name
 
905
 
                    and value._dbus_interface == interface_name):
 
906
 
                    return value.__get__(self)
 
 
615
        for name in (property_name,
 
 
616
                     property_name + "_dbus_property"):
 
 
617
            prop = getattr(self, name, None)
 
 
619
                or not self._is_dbus_property(prop)
 
 
620
                or prop._dbus_name != property_name
 
 
621
                or (interface_name and prop._dbus_interface
 
 
622
                    and interface_name != prop._dbus_interface)):
 
908
625
        # No such property
 
909
626
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
910
627
                                   + interface_name + "."
 
 
1044
725
        except (AttributeError, xml.dom.DOMException,
 
1045
726
                xml.parsers.expat.ExpatError) as error:
 
1046
727
            logger.error("Failed to override Introspection method",
 
1048
729
        return xmlstring
 
1051
 
def datetime_to_dbus(dt, variant_level=0):
 
1052
 
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
1054
 
        return dbus.String("", variant_level = variant_level)
 
1055
 
    return dbus.String(dt.isoformat(),
 
1056
 
                       variant_level=variant_level)
 
1059
 
def alternate_dbus_interfaces(alt_interface_names, deprecate=True):
 
1060
 
    """A class decorator; applied to a subclass of
 
1061
 
    dbus.service.Object, it will add alternate D-Bus attributes with
 
1062
 
    interface names according to the "alt_interface_names" mapping.
 
1065
 
    @alternate_dbus_interfaces({"org.example.Interface":
 
1066
 
                                    "net.example.AlternateInterface"})
 
1067
 
    class SampleDBusObject(dbus.service.Object):
 
1068
 
        @dbus.service.method("org.example.Interface")
 
1069
 
        def SampleDBusMethod():
 
1072
 
    The above "SampleDBusMethod" on "SampleDBusObject" will be
 
1073
 
    reachable via two interfaces: "org.example.Interface" and
 
1074
 
    "net.example.AlternateInterface", the latter of which will have
 
1075
 
    its D-Bus annotation "org.freedesktop.DBus.Deprecated" set to
 
1076
 
    "true", unless "deprecate" is passed with a False value.
 
1078
 
    This works for methods and signals, and also for D-Bus properties
 
1079
 
    (from DBusObjectWithProperties) and interfaces (from the
 
1080
 
    dbus_interface_annotations decorator).
 
1083
 
        for orig_interface_name, alt_interface_name in (
 
1084
 
            alt_interface_names.iteritems()):
 
1086
 
            interface_names = set()
 
1087
 
            # Go though all attributes of the class
 
1088
 
            for attrname, attribute in inspect.getmembers(cls):
 
1089
 
                # Ignore non-D-Bus attributes, and D-Bus attributes
 
1090
 
                # with the wrong interface name
 
1091
 
                if (not hasattr(attribute, "_dbus_interface")
 
1092
 
                    or not attribute._dbus_interface
 
1093
 
                    .startswith(orig_interface_name)):
 
1095
 
                # Create an alternate D-Bus interface name based on
 
1097
 
                alt_interface = (attribute._dbus_interface
 
1098
 
                                 .replace(orig_interface_name,
 
1099
 
                                          alt_interface_name))
 
1100
 
                interface_names.add(alt_interface)
 
1101
 
                # Is this a D-Bus signal?
 
1102
 
                if getattr(attribute, "_dbus_is_signal", False):
 
1103
 
                    # Extract the original non-method undecorated
 
1104
 
                    # function by black magic
 
1105
 
                    nonmethod_func = (dict(
 
1106
 
                            zip(attribute.func_code.co_freevars,
 
1107
 
                                attribute.__closure__))["func"]
 
1109
 
                    # Create a new, but exactly alike, function
 
1110
 
                    # object, and decorate it to be a new D-Bus signal
 
1111
 
                    # with the alternate D-Bus interface name
 
1112
 
                    new_function = (dbus.service.signal
 
1114
 
                                     attribute._dbus_signature)
 
1115
 
                                    (types.FunctionType(
 
1116
 
                                nonmethod_func.func_code,
 
1117
 
                                nonmethod_func.func_globals,
 
1118
 
                                nonmethod_func.func_name,
 
1119
 
                                nonmethod_func.func_defaults,
 
1120
 
                                nonmethod_func.func_closure)))
 
1121
 
                    # Copy annotations, if any
 
1123
 
                        new_function._dbus_annotations = (
 
1124
 
                            dict(attribute._dbus_annotations))
 
1125
 
                    except AttributeError:
 
1127
 
                    # Define a creator of a function to call both the
 
1128
 
                    # original and alternate functions, so both the
 
1129
 
                    # original and alternate signals gets sent when
 
1130
 
                    # the function is called
 
1131
 
                    def fixscope(func1, func2):
 
1132
 
                        """This function is a scope container to pass
 
1133
 
                        func1 and func2 to the "call_both" function
 
1134
 
                        outside of its arguments"""
 
1135
 
                        def call_both(*args, **kwargs):
 
1136
 
                            """This function will emit two D-Bus
 
1137
 
                            signals by calling func1 and func2"""
 
1138
 
                            func1(*args, **kwargs)
 
1139
 
                            func2(*args, **kwargs)
 
1141
 
                    # Create the "call_both" function and add it to
 
1143
 
                    attr[attrname] = fixscope(attribute, new_function)
 
1144
 
                # Is this a D-Bus method?
 
1145
 
                elif getattr(attribute, "_dbus_is_method", False):
 
1146
 
                    # Create a new, but exactly alike, function
 
1147
 
                    # object.  Decorate it to be a new D-Bus method
 
1148
 
                    # with the alternate D-Bus interface name.  Add it
 
1150
 
                    attr[attrname] = (dbus.service.method
 
1152
 
                                       attribute._dbus_in_signature,
 
1153
 
                                       attribute._dbus_out_signature)
 
1155
 
                                       (attribute.func_code,
 
1156
 
                                        attribute.func_globals,
 
1157
 
                                        attribute.func_name,
 
1158
 
                                        attribute.func_defaults,
 
1159
 
                                        attribute.func_closure)))
 
1160
 
                    # Copy annotations, if any
 
1162
 
                        attr[attrname]._dbus_annotations = (
 
1163
 
                            dict(attribute._dbus_annotations))
 
1164
 
                    except AttributeError:
 
1166
 
                # Is this a D-Bus property?
 
1167
 
                elif getattr(attribute, "_dbus_is_property", False):
 
1168
 
                    # Create a new, but exactly alike, function
 
1169
 
                    # object, and decorate it to be a new D-Bus
 
1170
 
                    # property with the alternate D-Bus interface
 
1171
 
                    # name.  Add it to the class.
 
1172
 
                    attr[attrname] = (dbus_service_property
 
1174
 
                                       attribute._dbus_signature,
 
1175
 
                                       attribute._dbus_access,
 
1177
 
                                       ._dbus_get_args_options
 
1180
 
                                       (attribute.func_code,
 
1181
 
                                        attribute.func_globals,
 
1182
 
                                        attribute.func_name,
 
1183
 
                                        attribute.func_defaults,
 
1184
 
                                        attribute.func_closure)))
 
1185
 
                    # Copy annotations, if any
 
1187
 
                        attr[attrname]._dbus_annotations = (
 
1188
 
                            dict(attribute._dbus_annotations))
 
1189
 
                    except AttributeError:
 
1191
 
                # Is this a D-Bus interface?
 
1192
 
                elif getattr(attribute, "_dbus_is_interface", False):
 
1193
 
                    # Create a new, but exactly alike, function
 
1194
 
                    # object.  Decorate it to be a new D-Bus interface
 
1195
 
                    # with the alternate D-Bus interface name.  Add it
 
1197
 
                    attr[attrname] = (dbus_interface_annotations
 
1200
 
                                       (attribute.func_code,
 
1201
 
                                        attribute.func_globals,
 
1202
 
                                        attribute.func_name,
 
1203
 
                                        attribute.func_defaults,
 
1204
 
                                        attribute.func_closure)))
 
1206
 
                # Deprecate all alternate interfaces
 
1207
 
                iname="_AlternateDBusNames_interface_annotation{0}"
 
1208
 
                for interface_name in interface_names:
 
1209
 
                    @dbus_interface_annotations(interface_name)
 
1211
 
                        return { "org.freedesktop.DBus.Deprecated":
 
1213
 
                    # Find an unused name
 
1214
 
                    for aname in (iname.format(i)
 
1215
 
                                  for i in itertools.count()):
 
1216
 
                        if aname not in attr:
 
1220
 
                # Replace the class with a new subclass of it with
 
1221
 
                # methods, signals, etc. as created above.
 
1222
 
                cls = type(b"{0}Alternate".format(cls.__name__),
 
1228
 
@alternate_dbus_interfaces({"se.recompile.Mandos":
 
1229
 
                                "se.bsnet.fukt.Mandos"})
 
1230
732
class ClientDBus(Client, DBusObjectWithProperties):
 
1231
733
    """A Client class using D-Bus
 
 
1252
755
                                 ("/clients/" + client_object_name))
 
1253
756
        DBusObjectWithProperties.__init__(self, self.bus,
 
1254
757
                                          self.dbus_object_path)
 
1256
 
    def notifychangeproperty(transform_func,
 
1257
 
                             dbus_name, type_func=lambda x: x,
 
1259
 
        """ Modify a variable so that it's a property which announces
 
1260
 
        its changes to DBus.
 
1262
 
        transform_fun: Function that takes a value and a variant_level
 
1263
 
                       and transforms it to a D-Bus type.
 
1264
 
        dbus_name: D-Bus name of the variable
 
1265
 
        type_func: Function that transform the value before sending it
 
1266
 
                   to the D-Bus.  Default: no transform
 
1267
 
        variant_level: D-Bus variant level.  Default: 1
 
1269
 
        attrname = "_{0}".format(dbus_name)
 
1270
 
        def setter(self, value):
 
1271
 
            if hasattr(self, "dbus_object_path"):
 
1272
 
                if (not hasattr(self, attrname) or
 
1273
 
                    type_func(getattr(self, attrname, None))
 
1274
 
                    != type_func(value)):
 
1275
 
                    dbus_value = transform_func(type_func(value),
 
1278
 
                    self.PropertyChanged(dbus.String(dbus_name),
 
1280
 
            setattr(self, attrname, value)
 
1282
 
        return property(lambda self: getattr(self, attrname), setter)
 
1284
 
    expires = notifychangeproperty(datetime_to_dbus, "Expires")
 
1285
 
    approvals_pending = notifychangeproperty(dbus.Boolean,
 
1288
 
    enabled = notifychangeproperty(dbus.Boolean, "Enabled")
 
1289
 
    last_enabled = notifychangeproperty(datetime_to_dbus,
 
1291
 
    checker = notifychangeproperty(dbus.Boolean, "CheckerRunning",
 
1292
 
                                   type_func = lambda checker:
 
1293
 
                                       checker is not None)
 
1294
 
    last_checked_ok = notifychangeproperty(datetime_to_dbus,
 
1296
 
    last_checker_status = notifychangeproperty(dbus.Int16,
 
1297
 
                                               "LastCheckerStatus")
 
1298
 
    last_approval_request = notifychangeproperty(
 
1299
 
        datetime_to_dbus, "LastApprovalRequest")
 
1300
 
    approved_by_default = notifychangeproperty(dbus.Boolean,
 
1301
 
                                               "ApprovedByDefault")
 
1302
 
    approval_delay = notifychangeproperty(dbus.UInt64,
 
1305
 
                                          timedelta_to_milliseconds)
 
1306
 
    approval_duration = notifychangeproperty(
 
1307
 
        dbus.UInt64, "ApprovalDuration",
 
1308
 
        type_func = timedelta_to_milliseconds)
 
1309
 
    host = notifychangeproperty(dbus.String, "Host")
 
1310
 
    timeout = notifychangeproperty(dbus.UInt64, "Timeout",
 
1312
 
                                   timedelta_to_milliseconds)
 
1313
 
    extended_timeout = notifychangeproperty(
 
1314
 
        dbus.UInt64, "ExtendedTimeout",
 
1315
 
        type_func = timedelta_to_milliseconds)
 
1316
 
    interval = notifychangeproperty(dbus.UInt64,
 
1319
 
                                    timedelta_to_milliseconds)
 
1320
 
    checker_command = notifychangeproperty(dbus.String, "Checker")
 
1322
 
    del notifychangeproperty
 
 
759
    def _get_approvals_pending(self):
 
 
760
        return self._approvals_pending
 
 
761
    def _set_approvals_pending(self, value):
 
 
762
        old_value = self._approvals_pending
 
 
763
        self._approvals_pending = value
 
 
765
        if (hasattr(self, "dbus_object_path")
 
 
766
            and bval is not bool(old_value)):
 
 
767
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
 
768
            self.PropertyChanged(dbus.String("ApprovalPending"),
 
 
771
    approvals_pending = property(_get_approvals_pending,
 
 
772
                                 _set_approvals_pending)
 
 
773
    del _get_approvals_pending, _set_approvals_pending
 
 
776
    def _datetime_to_dbus(dt, variant_level=0):
 
 
777
        """Convert a UTC datetime.datetime() to a D-Bus type."""
 
 
778
        return dbus.String(dt.isoformat(),
 
 
779
                           variant_level=variant_level)
 
 
782
        oldstate = getattr(self, "enabled", False)
 
 
783
        r = Client.enable(self)
 
 
784
        if oldstate != self.enabled:
 
 
786
            self.PropertyChanged(dbus.String("Enabled"),
 
 
787
                                 dbus.Boolean(True, variant_level=1))
 
 
788
            self.PropertyChanged(
 
 
789
                dbus.String("LastEnabled"),
 
 
790
                self._datetime_to_dbus(self.last_enabled,
 
 
794
    def disable(self, quiet = False):
 
 
795
        oldstate = getattr(self, "enabled", False)
 
 
796
        r = Client.disable(self, quiet=quiet)
 
 
797
        if not quiet and oldstate != self.enabled:
 
 
799
            self.PropertyChanged(dbus.String("Enabled"),
 
 
800
                                 dbus.Boolean(False, variant_level=1))
 
1324
803
    def __del__(self, *args, **kwargs):
 
 
2028
1506
    def __init__(self, server_address, RequestHandlerClass,
 
2029
1507
                 interface=None, use_ipv6=True, clients=None,
 
2030
 
                 gnutls_priority=None, use_dbus=True, socketfd=None):
 
 
1508
                 gnutls_priority=None, use_dbus=True):
 
2031
1509
        self.enabled = False
 
2032
1510
        self.clients = clients
 
2033
1511
        if self.clients is None:
 
 
1512
            self.clients = set()
 
2035
1513
        self.use_dbus = use_dbus
 
2036
1514
        self.gnutls_priority = gnutls_priority
 
2037
1515
        IPv6_TCPServer.__init__(self, server_address,
 
2038
1516
                                RequestHandlerClass,
 
2039
1517
                                interface = interface,
 
2040
 
                                use_ipv6 = use_ipv6,
 
2041
 
                                socketfd = socketfd)
 
 
1518
                                use_ipv6 = use_ipv6)
 
2042
1519
    def server_activate(self):
 
2043
1520
        if self.enabled:
 
2044
1521
            return socketserver.TCPServer.server_activate(self)
 
2046
1522
    def enable(self):
 
2047
1523
        self.enabled = True
 
2049
 
    def add_pipe(self, parent_pipe, proc):
 
 
1524
    def add_pipe(self, parent_pipe):
 
2050
1525
        # Call "handle_ipc" for both data and EOF events
 
2051
1526
        gobject.io_add_watch(parent_pipe.fileno(),
 
2052
1527
                             gobject.IO_IN | gobject.IO_HUP,
 
2053
1528
                             functools.partial(self.handle_ipc,
 
 
1529
                                               parent_pipe = parent_pipe))
 
2058
1531
    def handle_ipc(self, source, condition, parent_pipe=None,
 
2059
 
                   proc = None, client_object=None):
 
2060
 
        # error, or the other end of multiprocessing.Pipe has closed
 
2061
 
        if condition & (gobject.IO_ERR | gobject.IO_HUP):
 
2062
 
            # Wait for other process to exit
 
 
1532
                   client_object=None):
 
 
1534
            gobject.IO_IN: "IN",   # There is data to read.
 
 
1535
            gobject.IO_OUT: "OUT", # Data can be written (without
 
 
1537
            gobject.IO_PRI: "PRI", # There is urgent data to read.
 
 
1538
            gobject.IO_ERR: "ERR", # Error condition.
 
 
1539
            gobject.IO_HUP: "HUP"  # Hung up (the connection has been
 
 
1540
                                    # broken, usually for pipes and
 
 
1543
        conditions_string = ' | '.join(name
 
 
1545
                                       condition_names.iteritems()
 
 
1546
                                       if cond & condition)
 
 
1547
        # error or the other end of multiprocessing.Pipe has closed
 
 
1548
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
2066
1551
        # Read a request from the child
 
 
2071
1556
            fpr = request[1]
 
2072
1557
            address = request[2]
 
2074
 
            for c in self.clients.itervalues():
 
 
1559
            for c in self.clients:
 
2075
1560
                if c.fingerprint == fpr:
 
2079
 
                logger.info("Client not found for fingerprint: %s, ad"
 
2080
 
                            "dress: %s", fpr, address)
 
 
1564
                logger.warning("Client not found for fingerprint: %s, ad"
 
 
1565
                               "dress: %s", fpr, address)
 
2081
1566
                if self.use_dbus:
 
2082
1567
                    # Emit D-Bus signal
 
2083
 
                    mandos_dbus_service.ClientNotFound(fpr,
 
 
1568
                    mandos_dbus_service.ClientNotFound(fpr, address[0])
 
2085
1569
                parent_pipe.send(False)
 
2088
1572
            gobject.io_add_watch(parent_pipe.fileno(),
 
2089
1573
                                 gobject.IO_IN | gobject.IO_HUP,
 
2090
1574
                                 functools.partial(self.handle_ipc,
 
 
1575
                                                   parent_pipe = parent_pipe,
 
 
1576
                                                   client_object = client))
 
2096
1577
            parent_pipe.send(True)
 
2097
 
            # remove the old hook in favor of the new above hook on
 
 
1578
            # remove the old hook in favor of the new above hook on same fileno
 
2100
1580
        if command == 'funcall':
 
2101
1581
            funcname = request[1]
 
2102
1582
            args = request[2]
 
2103
1583
            kwargs = request[3]
 
2105
 
            parent_pipe.send(('data', getattr(client_object,
 
 
1585
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
2109
1587
        if command == 'getattr':
 
2110
1588
            attrname = request[1]
 
2111
1589
            if callable(client_object.__getattribute__(attrname)):
 
2112
1590
                parent_pipe.send(('function',))
 
2114
 
                parent_pipe.send(('data', client_object
 
2115
 
                                  .__getattribute__(attrname)))
 
 
1592
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
2117
1594
        if command == 'setattr':
 
2118
1595
            attrname = request[1]
 
2119
1596
            value = request[2]
 
2120
1597
            setattr(client_object, attrname, value)
 
2125
 
def rfc3339_duration_to_delta(duration):
 
2126
 
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
2128
 
    >>> rfc3339_duration_to_delta("P7D")
 
2129
 
    datetime.timedelta(7)
 
2130
 
    >>> rfc3339_duration_to_delta("PT60S")
 
2131
 
    datetime.timedelta(0, 60)
 
2132
 
    >>> rfc3339_duration_to_delta("PT60M")
 
2133
 
    datetime.timedelta(0, 3600)
 
2134
 
    >>> rfc3339_duration_to_delta("PT24H")
 
2135
 
    datetime.timedelta(1)
 
2136
 
    >>> rfc3339_duration_to_delta("P1W")
 
2137
 
    datetime.timedelta(7)
 
2138
 
    >>> rfc3339_duration_to_delta("PT5M30S")
 
2139
 
    datetime.timedelta(0, 330)
 
2140
 
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
2141
 
    datetime.timedelta(1, 200)
 
2144
 
    # Parsing an RFC 3339 duration with regular expressions is not
 
2145
 
    # possible - there would have to be multiple places for the same
 
2146
 
    # values, like seconds.  The current code, while more esoteric, is
 
2147
 
    # cleaner without depending on a parsing library.  If Python had a
 
2148
 
    # built-in library for parsing we would use it, but we'd like to
 
2149
 
    # avoid excessive use of external libraries.
 
2151
 
    # New type for defining tokens, syntax, and semantics all-in-one
 
2152
 
    Token = collections.namedtuple("Token",
 
2153
 
                                   ("regexp", # To match token; if
 
2154
 
                                              # "value" is not None,
 
2155
 
                                              # must have a "group"
 
2157
 
                                    "value",  # datetime.timedelta or
 
2159
 
                                    "followers")) # Tokens valid after
 
2161
 
    # RFC 3339 "duration" tokens, syntax, and semantics; taken from
 
2162
 
    # the "duration" ABNF definition in RFC 3339, Appendix A.
 
2163
 
    token_end = Token(re.compile(r"$"), None, frozenset())
 
2164
 
    token_second = Token(re.compile(r"(\d+)S"),
 
2165
 
                         datetime.timedelta(seconds=1),
 
2166
 
                         frozenset((token_end,)))
 
2167
 
    token_minute = Token(re.compile(r"(\d+)M"),
 
2168
 
                         datetime.timedelta(minutes=1),
 
2169
 
                         frozenset((token_second, token_end)))
 
2170
 
    token_hour = Token(re.compile(r"(\d+)H"),
 
2171
 
                       datetime.timedelta(hours=1),
 
2172
 
                       frozenset((token_minute, token_end)))
 
2173
 
    token_time = Token(re.compile(r"T"),
 
2175
 
                       frozenset((token_hour, token_minute,
 
2177
 
    token_day = Token(re.compile(r"(\d+)D"),
 
2178
 
                      datetime.timedelta(days=1),
 
2179
 
                      frozenset((token_time, token_end)))
 
2180
 
    token_month = Token(re.compile(r"(\d+)M"),
 
2181
 
                        datetime.timedelta(weeks=4),
 
2182
 
                        frozenset((token_day, token_end)))
 
2183
 
    token_year = Token(re.compile(r"(\d+)Y"),
 
2184
 
                       datetime.timedelta(weeks=52),
 
2185
 
                       frozenset((token_month, token_end)))
 
2186
 
    token_week = Token(re.compile(r"(\d+)W"),
 
2187
 
                       datetime.timedelta(weeks=1),
 
2188
 
                       frozenset((token_end,)))
 
2189
 
    token_duration = Token(re.compile(r"P"), None,
 
2190
 
                           frozenset((token_year, token_month,
 
2191
 
                                      token_day, token_time,
 
2193
 
    # Define starting values
 
2194
 
    value = datetime.timedelta() # Value so far
 
2196
 
    followers = frozenset(token_duration,) # Following valid tokens
 
2197
 
    s = duration                # String left to parse
 
2198
 
    # Loop until end token is found
 
2199
 
    while found_token is not token_end:
 
2200
 
        # Search for any currently valid tokens
 
2201
 
        for token in followers:
 
2202
 
            match = token.regexp.match(s)
 
2203
 
            if match is not None:
 
2205
 
                if token.value is not None:
 
2206
 
                    # Value found, parse digits
 
2207
 
                    factor = int(match.group(1), 10)
 
2208
 
                    # Add to value so far
 
2209
 
                    value += factor * token.value
 
2210
 
                # Strip token from string
 
2211
 
                s = token.regexp.sub("", s, 1)
 
2214
 
                # Set valid next tokens
 
2215
 
                followers = found_token.followers
 
2218
 
            # No currently valid tokens were found
 
2219
 
            raise ValueError("Invalid RFC 3339 duration")
 
2224
1602
def string_to_delta(interval):
 
2225
1603
    """Parse a string and return a datetime.timedelta
 
 
2501
1862
         .gnutls_global_set_log_function(debug_gnutls))
 
2503
1864
        # Redirect stdin so all checkers get /dev/null
 
2504
 
        null = os.open(os.devnull, os.O_NOCTTY | os.O_RDWR)
 
 
1865
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
2505
1866
        os.dup2(null, sys.stdin.fileno())
 
 
1870
        # No console logging
 
 
1871
        logger.removeHandler(console)
 
2509
1873
    # Need to fork before connecting to D-Bus
 
2511
1875
        # Close all input and output, do double fork, etc.
 
2514
 
    # multiprocessing will use threads, so before we use gobject we
 
2515
 
    # need to inform gobject that threads will be used.
 
2516
 
    gobject.threads_init()
 
2518
1878
    global main_loop
 
2519
1879
    # From the Avahi example code
 
2520
 
    DBusGMainLoop(set_as_default=True)
 
 
1880
    DBusGMainLoop(set_as_default=True )
 
2521
1881
    main_loop = gobject.MainLoop()
 
2522
1882
    bus = dbus.SystemBus()
 
2523
1883
    # End of Avahi example code
 
2526
 
            bus_name = dbus.service.BusName("se.recompile.Mandos",
 
 
1886
            bus_name = dbus.service.BusName("se.bsnet.fukt.Mandos",
 
2527
1887
                                            bus, do_not_queue=True)
 
2528
 
            old_bus_name = (dbus.service.BusName
 
2529
 
                            ("se.bsnet.fukt.Mandos", bus,
 
2531
1888
        except dbus.exceptions.NameExistsException as e:
 
2532
 
            logger.error("Disabling D-Bus:", exc_info=e)
 
 
1889
            logger.error(unicode(e) + ", disabling D-Bus")
 
2533
1890
            use_dbus = False
 
2534
1891
            server_settings["use_dbus"] = False
 
2535
1892
            tcp_server.use_dbus = False
 
2536
1893
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
2537
 
    service = AvahiServiceToSyslog(name =
 
2538
 
                                   server_settings["servicename"],
 
2539
 
                                   servicetype = "_mandos._tcp",
 
2540
 
                                   protocol = protocol, bus = bus)
 
 
1894
    service = AvahiService(name = server_settings["servicename"],
 
 
1895
                           servicetype = "_mandos._tcp",
 
 
1896
                           protocol = protocol, bus = bus)
 
2541
1897
    if server_settings["interface"]:
 
2542
1898
        service.interface = (if_nametoindex
 
2543
1899
                             (str(server_settings["interface"])))
 
 
2548
1904
    client_class = Client
 
2550
1906
        client_class = functools.partial(ClientDBus, bus = bus)
 
2552
 
    client_settings = Client.config_parser(client_config)
 
2553
 
    old_client_settings = {}
 
2556
 
    # This is used to redirect stdout and stderr for checker processes
 
2558
 
    wnull = open(os.devnull, "w") # A writable /dev/null
 
2559
 
    # Only used if server is running in foreground but not in debug
 
2561
 
    if debug or not foreground:
 
2564
 
    # Get client data and settings from last running state.
 
2565
 
    if server_settings["restore"]:
 
2567
 
            with open(stored_state_path, "rb") as stored_state:
 
2568
 
                clients_data, old_client_settings = (pickle.load
 
2570
 
            os.remove(stored_state_path)
 
2571
 
        except IOError as e:
 
2572
 
            if e.errno == errno.ENOENT:
 
2573
 
                logger.warning("Could not load persistent state: {0}"
 
2574
 
                                .format(os.strerror(e.errno)))
 
2576
 
                logger.critical("Could not load persistent state:",
 
2579
 
        except EOFError as e:
 
2580
 
            logger.warning("Could not load persistent state: "
 
2581
 
                           "EOFError:", exc_info=e)
 
2583
 
    with PGPEngine() as pgp:
 
2584
 
        for client_name, client in clients_data.iteritems():
 
2585
 
            # Skip removed clients
 
2586
 
            if client_name not in client_settings:
 
2589
 
            # Decide which value to use after restoring saved state.
 
2590
 
            # We have three different values: Old config file,
 
2591
 
            # new config file, and saved state.
 
2592
 
            # New config value takes precedence if it differs from old
 
2593
 
            # config value, otherwise use saved state.
 
2594
 
            for name, value in client_settings[client_name].items():
 
2596
 
                    # For each value in new config, check if it
 
2597
 
                    # differs from the old config value (Except for
 
2598
 
                    # the "secret" attribute)
 
2599
 
                    if (name != "secret" and
 
2600
 
                        value != old_client_settings[client_name]
 
2602
 
                        client[name] = value
 
2606
 
            # Clients who has passed its expire date can still be
 
2607
 
            # enabled if its last checker was successful.  Clients
 
2608
 
            # whose checker succeeded before we stored its state is
 
2609
 
            # assumed to have successfully run all checkers during
 
2611
 
            if client["enabled"]:
 
2612
 
                if datetime.datetime.utcnow() >= client["expires"]:
 
2613
 
                    if not client["last_checked_ok"]:
 
2615
 
                            "disabling client {0} - Client never "
 
2616
 
                            "performed a successful checker"
 
2617
 
                            .format(client_name))
 
2618
 
                        client["enabled"] = False
 
2619
 
                    elif client["last_checker_status"] != 0:
 
2621
 
                            "disabling client {0} - Client "
 
2622
 
                            "last checker failed with error code {1}"
 
2623
 
                            .format(client_name,
 
2624
 
                                    client["last_checker_status"]))
 
2625
 
                        client["enabled"] = False
 
2627
 
                        client["expires"] = (datetime.datetime
 
2629
 
                                             + client["timeout"])
 
2630
 
                        logger.debug("Last checker succeeded,"
 
2631
 
                                     " keeping {0} enabled"
 
2632
 
                                     .format(client_name))
 
 
1907
    def client_config_items(config, section):
 
 
1908
        special_settings = {
 
 
1909
            "approved_by_default":
 
 
1910
                lambda: config.getboolean(section,
 
 
1911
                                          "approved_by_default"),
 
 
1913
        for name, value in config.items(section):
 
2634
 
                client["secret"] = (
 
2635
 
                    pgp.decrypt(client["encrypted_secret"],
 
2636
 
                                client_settings[client_name]
 
2639
 
                # If decryption fails, we use secret from new settings
 
2640
 
                logger.debug("Failed to decrypt {0} old secret"
 
2641
 
                             .format(client_name))
 
2642
 
                client["secret"] = (
 
2643
 
                    client_settings[client_name]["secret"])
 
2645
 
    # Add/remove clients based on new changes made to config
 
2646
 
    for client_name in (set(old_client_settings)
 
2647
 
                        - set(client_settings)):
 
2648
 
        del clients_data[client_name]
 
2649
 
    for client_name in (set(client_settings)
 
2650
 
                        - set(old_client_settings)):
 
2651
 
        clients_data[client_name] = client_settings[client_name]
 
2653
 
    # Create all client objects
 
2654
 
    for client_name, client in clients_data.iteritems():
 
2655
 
        tcp_server.clients[client_name] = client_class(
 
2656
 
            name = client_name, settings = client,
 
2657
 
            server_settings = server_settings)
 
 
1915
                yield (name, special_settings[name]())
 
 
1919
    tcp_server.clients.update(set(
 
 
1920
            client_class(name = section,
 
 
1921
                         config= dict(client_config_items(
 
 
1922
                        client_config, section)))
 
 
1923
            for section in client_config.sections()))
 
2659
1924
    if not tcp_server.clients:
 
2660
1925
        logger.warning("No clients defined")
 
2663
 
        if pidfile is not None:
 
2667
 
                    pidfile.write(str(pid) + "\n".encode("utf-8"))
 
2669
 
                logger.error("Could not write to file %r with PID %d",
 
 
1931
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
 
1934
            logger.error("Could not write to file %r with PID %d",
 
 
1937
            # "pidfile" was never created
 
2672
1939
        del pidfilename
 
 
1941
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
2674
1943
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
2675
1944
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
 
2678
 
        @alternate_dbus_interfaces({"se.recompile.Mandos":
 
2679
 
                                        "se.bsnet.fukt.Mandos"})
 
2680
 
        class MandosDBusService(DBusObjectWithProperties):
 
 
1947
        class MandosDBusService(dbus.service.Object):
 
2681
1948
            """A D-Bus proxy object"""
 
2682
1949
            def __init__(self):
 
2683
1950
                dbus.service.Object.__init__(self, bus, "/")
 
2684
 
            _interface = "se.recompile.Mandos"
 
2686
 
            @dbus_interface_annotations(_interface)
 
2688
 
                return { "org.freedesktop.DBus.Property"
 
2689
 
                         ".EmitsChangedSignal":
 
 
1951
            _interface = "se.bsnet.fukt.Mandos"
 
2692
1953
            @dbus.service.signal(_interface, signature="o")
 
2693
1954
            def ClientAdded(self, objpath):
 
 
2742
2002
        "Cleanup function; run on exit"
 
2743
2003
        service.cleanup()
 
2745
 
        multiprocessing.active_children()
 
2747
 
        if not (tcp_server.clients or client_settings):
 
2750
 
        # Store client before exiting. Secrets are encrypted with key
 
2751
 
        # based on what config file has. If config file is
 
2752
 
        # removed/edited, old secret will thus be unrecovable.
 
2754
 
        with PGPEngine() as pgp:
 
2755
 
            for client in tcp_server.clients.itervalues():
 
2756
 
                key = client_settings[client.name]["secret"]
 
2757
 
                client.encrypted_secret = pgp.encrypt(client.secret,
 
2761
 
                # A list of attributes that can not be pickled
 
2763
 
                exclude = set(("bus", "changedstate", "secret",
 
2764
 
                               "checker", "server_settings"))
 
2765
 
                for name, typ in (inspect.getmembers
 
2766
 
                                  (dbus.service.Object)):
 
2769
 
                client_dict["encrypted_secret"] = (client
 
2771
 
                for attr in client.client_structure:
 
2772
 
                    if attr not in exclude:
 
2773
 
                        client_dict[attr] = getattr(client, attr)
 
2775
 
                clients[client.name] = client_dict
 
2776
 
                del client_settings[client.name]["secret"]
 
2779
 
            with (tempfile.NamedTemporaryFile
 
2780
 
                  (mode='wb', suffix=".pickle", prefix='clients-',
 
2781
 
                   dir=os.path.dirname(stored_state_path),
 
2782
 
                   delete=False)) as stored_state:
 
2783
 
                pickle.dump((clients, client_settings), stored_state)
 
2784
 
                tempname=stored_state.name
 
2785
 
            os.rename(tempname, stored_state_path)
 
2786
 
        except (IOError, OSError) as e:
 
2792
 
            if e.errno in (errno.ENOENT, errno.EACCES, errno.EEXIST):
 
2793
 
                logger.warning("Could not save persistent state: {0}"
 
2794
 
                               .format(os.strerror(e.errno)))
 
2796
 
                logger.warning("Could not save persistent state:",
 
2800
 
        # Delete all clients, and settings from config
 
2801
2005
        while tcp_server.clients:
 
2802
 
            name, client = tcp_server.clients.popitem()
 
 
2006
            client = tcp_server.clients.pop()
 
2804
2008
                client.remove_from_connection()
 
 
2009
            client.disable_hook = None
 
2805
2010
            # Don't signal anything except ClientRemoved
 
2806
2011
            client.disable(quiet=True)
 
2808
2013
                # Emit D-Bus signal
 
2809
 
                mandos_dbus_service.ClientRemoved(client
 
 
2014
                mandos_dbus_service.ClientRemoved(client.dbus_object_path,
 
2812
 
        client_settings.clear()
 
2814
2017
    atexit.register(cleanup)
 
2816
 
    for client in tcp_server.clients.itervalues():
 
 
2019
    for client in tcp_server.clients:
 
2818
2021
            # Emit D-Bus signal
 
2819
2022
            mandos_dbus_service.ClientAdded(client.dbus_object_path)
 
2820
 
        # Need to initiate checking of clients
 
2822
 
            client.init_checker()
 
2824
2025
    tcp_server.enable()
 
2825
2026
    tcp_server.server_activate()