88
82
    except ImportError:
 
89
83
        SO_BINDTODEVICE = None
 
92
 
stored_state_file = "clients.pickle"
 
94
 
logger = logging.getLogger()
 
98
 
    if_nametoindex = (ctypes.cdll.LoadLibrary
 
99
 
                      (ctypes.util.find_library("c"))
 
101
 
except (OSError, AttributeError):
 
102
 
    def if_nametoindex(interface):
 
103
 
        "Get an interface index the hard way, i.e. using fcntl()"
 
104
 
        SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
 
105
 
        with contextlib.closing(socket.socket()) as s:
 
106
 
            ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
 
107
 
                                struct.pack(str("16s16x"),
 
109
 
        interface_index = struct.unpack(str("I"),
 
111
 
        return interface_index
 
114
 
def initlogger(debug, level=logging.WARNING):
 
115
 
    """init logger and add loglevel"""
 
117
 
    syslogger = (logging.handlers.SysLogHandler
 
119
 
                  logging.handlers.SysLogHandler.LOG_DAEMON,
 
120
 
                  address = str("/dev/log")))
 
121
 
    syslogger.setFormatter(logging.Formatter
 
122
 
                           ('Mandos [%(process)d]: %(levelname)s:'
 
124
 
    logger.addHandler(syslogger)
 
127
 
        console = logging.StreamHandler()
 
128
 
        console.setFormatter(logging.Formatter('%(asctime)s %(name)s'
 
132
 
        logger.addHandler(console)
 
133
 
    logger.setLevel(level)
 
136
 
class PGPError(Exception):
 
137
 
    """Exception if encryption/decryption fails"""
 
141
 
class PGPEngine(object):
 
142
 
    """A simple class for OpenPGP symmetric encryption & decryption"""
 
144
 
        self.tempdir = tempfile.mkdtemp(prefix="mandos-")
 
145
 
        self.gnupgargs = ['--batch',
 
146
 
                          '--home', self.tempdir,
 
154
 
    def __exit__(self, exc_type, exc_value, traceback):
 
162
 
        if self.tempdir is not None:
 
163
 
            # Delete contents of tempdir
 
164
 
            for root, dirs, files in os.walk(self.tempdir,
 
166
 
                for filename in files:
 
167
 
                    os.remove(os.path.join(root, filename))
 
169
 
                    os.rmdir(os.path.join(root, dirname))
 
171
 
            os.rmdir(self.tempdir)
 
174
 
    def password_encode(self, password):
 
175
 
        # Passphrase can not be empty and can not contain newlines or
 
176
 
        # NUL bytes.  So we prefix it and hex encode it.
 
177
 
        encoded = b"mandos" + binascii.hexlify(password)
 
178
 
        if len(encoded) > 2048:
 
179
 
            # GnuPG can't handle long passwords, so encode differently
 
180
 
            encoded = (b"mandos" + password.replace(b"\\", b"\\\\")
 
181
 
                       .replace(b"\n", b"\\n")
 
182
 
                       .replace(b"\0", b"\\x00"))
 
185
 
    def encrypt(self, data, password):
 
186
 
        passphrase = self.password_encode(password)
 
187
 
        with tempfile.NamedTemporaryFile(dir=self.tempdir
 
189
 
            passfile.write(passphrase)
 
191
 
            proc = subprocess.Popen(['gpg', '--symmetric',
 
195
 
                                    stdin = subprocess.PIPE,
 
196
 
                                    stdout = subprocess.PIPE,
 
197
 
                                    stderr = subprocess.PIPE)
 
198
 
            ciphertext, err = proc.communicate(input = data)
 
199
 
        if proc.returncode != 0:
 
203
 
    def decrypt(self, data, password):
 
204
 
        passphrase = self.password_encode(password)
 
205
 
        with tempfile.NamedTemporaryFile(dir = self.tempdir
 
207
 
            passfile.write(passphrase)
 
209
 
            proc = subprocess.Popen(['gpg', '--decrypt',
 
213
 
                                    stdin = subprocess.PIPE,
 
214
 
                                    stdout = subprocess.PIPE,
 
215
 
                                    stderr = subprocess.PIPE)
 
216
 
            decrypted_plaintext, err = proc.communicate(input
 
218
 
        if proc.returncode != 0:
 
220
 
        return decrypted_plaintext
 
 
88
#logger = logging.getLogger('mandos')
 
 
89
logger = logging.Logger('mandos')
 
 
90
syslogger = (logging.handlers.SysLogHandler
 
 
91
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
 
 
92
              address = str("/dev/log")))
 
 
93
syslogger.setFormatter(logging.Formatter
 
 
94
                       ('Mandos [%(process)d]: %(levelname)s:'
 
 
96
logger.addHandler(syslogger)
 
 
98
console = logging.StreamHandler()
 
 
99
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
 
102
logger.addHandler(console)
 
223
104
class AvahiError(Exception):
 
224
105
    def __init__(self, value, *args, **kwargs):
 
 
435
299
    interval:   datetime.timedelta(); How often to start a new checker
 
436
300
    last_approval_request: datetime.datetime(); (UTC) or None
 
437
301
    last_checked_ok: datetime.datetime(); (UTC) or None
 
438
 
    last_checker_status: integer between 0 and 255 reflecting exit
 
439
 
                         status of last checker. -1 reflects crashed
 
440
 
                         checker, -2 means no checker completed yet.
 
441
 
    last_enabled: datetime.datetime(); (UTC) or None
 
 
302
    last_enabled: datetime.datetime(); (UTC)
 
442
303
    name:       string; from the config file, used in log messages and
 
443
304
                        D-Bus identifiers
 
444
305
    secret:     bytestring; sent verbatim (over TLS) to client
 
445
306
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
446
307
                                      until this client is disabled
 
447
 
    extended_timeout:   extra long timeout when secret has been sent
 
 
308
    extended_timeout:   extra long timeout when password has been sent
 
448
309
    runtime_expansions: Allowed attributes for runtime expansion.
 
449
310
    expires:    datetime.datetime(); time (UTC) when a client will be
 
450
311
                disabled, or None
 
451
 
    server_settings: The server_settings dict from main()
 
454
314
    runtime_expansions = ("approval_delay", "approval_duration",
 
455
 
                          "created", "enabled", "expires",
 
456
 
                          "fingerprint", "host", "interval",
 
457
 
                          "last_approval_request", "last_checked_ok",
 
 
315
                          "created", "enabled", "fingerprint",
 
 
316
                          "host", "interval", "last_checked_ok",
 
458
317
                          "last_enabled", "name", "timeout")
 
459
 
    client_defaults = { "timeout": "PT5M",
 
460
 
                        "extended_timeout": "PT15M",
 
462
 
                        "checker": "fping -q -- %%(host)s",
 
464
 
                        "approval_delay": "PT0S",
 
465
 
                        "approval_duration": "PT1S",
 
466
 
                        "approved_by_default": "True",
 
470
319
    def timeout_milliseconds(self):
 
471
320
        "Return the 'timeout' attribute in milliseconds"
 
472
 
        return timedelta_to_milliseconds(self.timeout)
 
 
321
        return _timedelta_to_milliseconds(self.timeout)
 
474
323
    def extended_timeout_milliseconds(self):
 
475
324
        "Return the 'extended_timeout' attribute in milliseconds"
 
476
 
        return timedelta_to_milliseconds(self.extended_timeout)
 
 
325
        return _timedelta_to_milliseconds(self.extended_timeout)
 
478
327
    def interval_milliseconds(self):
 
479
328
        "Return the 'interval' attribute in milliseconds"
 
480
 
        return timedelta_to_milliseconds(self.interval)
 
 
329
        return _timedelta_to_milliseconds(self.interval)
 
482
331
    def approval_delay_milliseconds(self):
 
483
 
        return timedelta_to_milliseconds(self.approval_delay)
 
486
 
    def config_parser(config):
 
487
 
        """Construct a new dict of client settings of this form:
 
488
 
        { client_name: {setting_name: value, ...}, ...}
 
489
 
        with exceptions for any special settings as defined above.
 
490
 
        NOTE: Must be a pure function. Must return the same result
 
491
 
        value given the same arguments.
 
494
 
        for client_name in config.sections():
 
495
 
            section = dict(config.items(client_name))
 
496
 
            client = settings[client_name] = {}
 
498
 
            client["host"] = section["host"]
 
499
 
            # Reformat values from string types to Python types
 
500
 
            client["approved_by_default"] = config.getboolean(
 
501
 
                client_name, "approved_by_default")
 
502
 
            client["enabled"] = config.getboolean(client_name,
 
505
 
            client["fingerprint"] = (section["fingerprint"].upper()
 
507
 
            if "secret" in section:
 
508
 
                client["secret"] = section["secret"].decode("base64")
 
509
 
            elif "secfile" in section:
 
510
 
                with open(os.path.expanduser(os.path.expandvars
 
511
 
                                             (section["secfile"])),
 
513
 
                    client["secret"] = secfile.read()
 
515
 
                raise TypeError("No secret or secfile for section {0}"
 
517
 
            client["timeout"] = string_to_delta(section["timeout"])
 
518
 
            client["extended_timeout"] = string_to_delta(
 
519
 
                section["extended_timeout"])
 
520
 
            client["interval"] = string_to_delta(section["interval"])
 
521
 
            client["approval_delay"] = string_to_delta(
 
522
 
                section["approval_delay"])
 
523
 
            client["approval_duration"] = string_to_delta(
 
524
 
                section["approval_duration"])
 
525
 
            client["checker_command"] = section["checker"]
 
526
 
            client["last_approval_request"] = None
 
527
 
            client["last_checked_ok"] = None
 
528
 
            client["last_checker_status"] = -2
 
532
 
    def __init__(self, settings, name = None, server_settings=None):
 
 
332
        return _timedelta_to_milliseconds(self.approval_delay)
 
 
334
    def __init__(self, name = None, disable_hook=None, config=None):
 
 
335
        """Note: the 'checker' key in 'config' sets the
 
 
336
        'checker_command' attribute and *not* the 'checker'
 
534
 
        if server_settings is None:
 
536
 
        self.server_settings = server_settings
 
537
 
        # adding all client settings
 
538
 
        for setting, value in settings.iteritems():
 
539
 
            setattr(self, setting, value)
 
542
 
            if not hasattr(self, "last_enabled"):
 
543
 
                self.last_enabled = datetime.datetime.utcnow()
 
544
 
            if not hasattr(self, "expires"):
 
545
 
                self.expires = (datetime.datetime.utcnow()
 
548
 
            self.last_enabled = None
 
551
341
        logger.debug("Creating client %r", self.name)
 
552
342
        # Uppercase and remove spaces from fingerprint for later
 
553
343
        # comparison purposes with return value from the fingerprint()
 
 
345
        self.fingerprint = (config["fingerprint"].upper()
 
555
347
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
556
 
        self.created = settings.get("created",
 
557
 
                                    datetime.datetime.utcnow())
 
559
 
        # attributes specific for this server instance
 
 
348
        if "secret" in config:
 
 
349
            self.secret = config["secret"].decode("base64")
 
 
350
        elif "secfile" in config:
 
 
351
            with open(os.path.expanduser(os.path.expandvars
 
 
352
                                         (config["secfile"])),
 
 
354
                self.secret = secfile.read()
 
 
356
            raise TypeError("No secret or secfile for client %s"
 
 
358
        self.host = config.get("host", "")
 
 
359
        self.created = datetime.datetime.utcnow()
 
 
361
        self.last_approval_request = None
 
 
362
        self.last_enabled = None
 
 
363
        self.last_checked_ok = None
 
 
364
        self.timeout = string_to_delta(config["timeout"])
 
 
365
        self.extended_timeout = string_to_delta(config
 
 
366
                                                ["extended_timeout"])
 
 
367
        self.interval = string_to_delta(config["interval"])
 
 
368
        self.disable_hook = disable_hook
 
560
369
        self.checker = None
 
561
370
        self.checker_initiator_tag = None
 
562
371
        self.disable_initiator_tag = None
 
563
373
        self.checker_callback_tag = None
 
 
374
        self.checker_command = config["checker"]
 
564
375
        self.current_checker_command = None
 
 
376
        self.last_connect = None
 
 
377
        self._approved = None
 
 
378
        self.approved_by_default = config.get("approved_by_default",
 
566
380
        self.approvals_pending = 0
 
 
381
        self.approval_delay = string_to_delta(
 
 
382
            config["approval_delay"])
 
 
383
        self.approval_duration = string_to_delta(
 
 
384
            config["approval_duration"])
 
567
385
        self.changedstate = (multiprocessing_manager
 
568
386
                             .Condition(multiprocessing_manager
 
570
 
        self.client_structure = [attr for attr in
 
571
 
                                 self.__dict__.iterkeys()
 
572
 
                                 if not attr.startswith("_")]
 
573
 
        self.client_structure.append("client_structure")
 
575
 
        for name, t in inspect.getmembers(type(self),
 
579
 
            if not name.startswith("_"):
 
580
 
                self.client_structure.append(name)
 
582
 
    # Send notice to process children that client state has changed
 
583
389
    def send_changedstate(self):
 
584
 
        with self.changedstate:
 
585
 
            self.changedstate.notify_all()
 
 
390
        self.changedstate.acquire()
 
 
391
        self.changedstate.notify_all()
 
 
392
        self.changedstate.release()
 
587
394
    def enable(self):
 
588
395
        """Start this client's checker and timeout hooks"""
 
589
396
        if getattr(self, "enabled", False):
 
590
397
            # Already enabled
 
592
 
        self.expires = datetime.datetime.utcnow() + self.timeout
 
594
 
        self.last_enabled = datetime.datetime.utcnow()
 
596
399
        self.send_changedstate()
 
598
 
    def disable(self, quiet=True):
 
599
 
        """Disable this client."""
 
600
 
        if not getattr(self, "enabled", False):
 
603
 
            logger.info("Disabling client %s", self.name)
 
604
 
        if getattr(self, "disable_initiator_tag", None) is not None:
 
605
 
            gobject.source_remove(self.disable_initiator_tag)
 
606
 
            self.disable_initiator_tag = None
 
608
 
        if getattr(self, "checker_initiator_tag", None) is not None:
 
609
 
            gobject.source_remove(self.checker_initiator_tag)
 
610
 
            self.checker_initiator_tag = None
 
614
 
            self.send_changedstate()
 
615
 
        # Do not run this again if called by a gobject.timeout_add
 
621
 
    def init_checker(self):
 
622
400
        # Schedule a new checker to be started an 'interval' from now,
 
623
401
        # and every interval from then on.
 
624
 
        if self.checker_initiator_tag is not None:
 
625
 
            gobject.source_remove(self.checker_initiator_tag)
 
626
402
        self.checker_initiator_tag = (gobject.timeout_add
 
627
403
                                      (self.interval_milliseconds(),
 
628
404
                                       self.start_checker))
 
629
405
        # Schedule a disable() when 'timeout' has passed
 
630
 
        if self.disable_initiator_tag is not None:
 
631
 
            gobject.source_remove(self.disable_initiator_tag)
 
 
406
        self.expires = datetime.datetime.utcnow() + self.timeout
 
632
407
        self.disable_initiator_tag = (gobject.timeout_add
 
633
408
                                   (self.timeout_milliseconds(),
 
 
411
        self.last_enabled = datetime.datetime.utcnow()
 
635
412
        # Also start a new checker *right now*.
 
636
413
        self.start_checker()
 
 
415
    def disable(self, quiet=True):
 
 
416
        """Disable this client."""
 
 
417
        if not getattr(self, "enabled", False):
 
 
420
            self.send_changedstate()
 
 
422
            logger.info("Disabling client %s", self.name)
 
 
423
        if getattr(self, "disable_initiator_tag", False):
 
 
424
            gobject.source_remove(self.disable_initiator_tag)
 
 
425
            self.disable_initiator_tag = None
 
 
427
        if getattr(self, "checker_initiator_tag", False):
 
 
428
            gobject.source_remove(self.checker_initiator_tag)
 
 
429
            self.checker_initiator_tag = None
 
 
431
        if self.disable_hook:
 
 
432
            self.disable_hook(self)
 
 
434
        # Do not run this again if called by a gobject.timeout_add
 
 
438
        self.disable_hook = None
 
638
441
    def checker_callback(self, pid, condition, command):
 
639
442
        """The checker has completed, so take appropriate actions."""
 
640
443
        self.checker_callback_tag = None
 
641
444
        self.checker = None
 
642
445
        if os.WIFEXITED(condition):
 
643
 
            self.last_checker_status = os.WEXITSTATUS(condition)
 
644
 
            if self.last_checker_status == 0:
 
 
446
            exitstatus = os.WEXITSTATUS(condition)
 
645
448
                logger.info("Checker for %(name)s succeeded",
 
647
450
                self.checked_ok()
 
 
1046
752
        except (AttributeError, xml.dom.DOMException,
 
1047
753
                xml.parsers.expat.ExpatError) as error:
 
1048
754
            logger.error("Failed to override Introspection method",
 
1050
756
        return xmlstring
 
1053
 
def datetime_to_dbus(dt, variant_level=0):
 
 
759
def datetime_to_dbus (dt, variant_level=0):
 
1054
760
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
1056
762
        return dbus.String("", variant_level = variant_level)
 
1057
763
    return dbus.String(dt.isoformat(),
 
1058
764
                       variant_level=variant_level)
 
1061
 
def alternate_dbus_interfaces(alt_interface_names, deprecate=True):
 
1062
 
    """A class decorator; applied to a subclass of
 
1063
 
    dbus.service.Object, it will add alternate D-Bus attributes with
 
1064
 
    interface names according to the "alt_interface_names" mapping.
 
1067
 
    @alternate_dbus_interfaces({"org.example.Interface":
 
1068
 
                                    "net.example.AlternateInterface"})
 
1069
 
    class SampleDBusObject(dbus.service.Object):
 
1070
 
        @dbus.service.method("org.example.Interface")
 
1071
 
        def SampleDBusMethod():
 
1074
 
    The above "SampleDBusMethod" on "SampleDBusObject" will be
 
1075
 
    reachable via two interfaces: "org.example.Interface" and
 
1076
 
    "net.example.AlternateInterface", the latter of which will have
 
1077
 
    its D-Bus annotation "org.freedesktop.DBus.Deprecated" set to
 
1078
 
    "true", unless "deprecate" is passed with a False value.
 
1080
 
    This works for methods and signals, and also for D-Bus properties
 
1081
 
    (from DBusObjectWithProperties) and interfaces (from the
 
1082
 
    dbus_interface_annotations decorator).
 
 
766
class AlternateDBusNamesMetaclass(DBusObjectWithProperties
 
 
768
    """Applied to an empty subclass of a D-Bus object, this metaclass
 
 
769
    will add additional D-Bus attributes matching a certain pattern.
 
1085
 
        for orig_interface_name, alt_interface_name in (
 
1086
 
            alt_interface_names.iteritems()):
 
1088
 
            interface_names = set()
 
1089
 
            # Go though all attributes of the class
 
1090
 
            for attrname, attribute in inspect.getmembers(cls):
 
 
771
    def __new__(mcs, name, bases, attr):
 
 
772
        # Go through all the base classes which could have D-Bus
 
 
773
        # methods, signals, or properties in them
 
 
774
        for base in (b for b in bases
 
 
775
                     if issubclass(b, dbus.service.Object)):
 
 
776
            # Go though all attributes of the base class
 
 
777
            for attrname, attribute in inspect.getmembers(base):
 
1091
778
                # Ignore non-D-Bus attributes, and D-Bus attributes
 
1092
779
                # with the wrong interface name
 
1093
780
                if (not hasattr(attribute, "_dbus_interface")
 
1094
781
                    or not attribute._dbus_interface
 
1095
 
                    .startswith(orig_interface_name)):
 
 
782
                    .startswith("se.recompile.Mandos")):
 
1097
784
                # Create an alternate D-Bus interface name based on
 
1098
785
                # the current name
 
1099
786
                alt_interface = (attribute._dbus_interface
 
1100
 
                                 .replace(orig_interface_name,
 
1101
 
                                          alt_interface_name))
 
1102
 
                interface_names.add(alt_interface)
 
 
787
                                 .replace("se.recompile.Mandos",
 
 
788
                                          "se.bsnet.fukt.Mandos"))
 
1103
789
                # Is this a D-Bus signal?
 
1104
790
                if getattr(attribute, "_dbus_is_signal", False):
 
1105
 
                    # Extract the original non-method undecorated
 
1106
 
                    # function by black magic
 
 
791
                    # Extract the original non-method function by
 
1107
793
                    nonmethod_func = (dict(
 
1108
794
                            zip(attribute.func_code.co_freevars,
 
1109
795
                                attribute.__closure__))["func"]
 
 
2123
 
def rfc3339_duration_to_delta(duration):
 
2124
 
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
2126
 
    >>> rfc3339_duration_to_delta("P7D")
 
2127
 
    datetime.timedelta(7)
 
2128
 
    >>> rfc3339_duration_to_delta("PT60S")
 
2129
 
    datetime.timedelta(0, 60)
 
2130
 
    >>> rfc3339_duration_to_delta("PT60M")
 
2131
 
    datetime.timedelta(0, 3600)
 
2132
 
    >>> rfc3339_duration_to_delta("PT24H")
 
2133
 
    datetime.timedelta(1)
 
2134
 
    >>> rfc3339_duration_to_delta("P1W")
 
2135
 
    datetime.timedelta(7)
 
2136
 
    >>> rfc3339_duration_to_delta("PT5M30S")
 
2137
 
    datetime.timedelta(0, 330)
 
2138
 
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
2139
 
    datetime.timedelta(1, 200)
 
2142
 
    # Parsing an RFC 3339 duration with regular expressions is not
 
2143
 
    # possible - there would have to be multiple places for the same
 
2144
 
    # values, like seconds.  The current code, while more esoteric, is
 
2145
 
    # cleaner without depending on a parsing library.  If Python had a
 
2146
 
    # built-in library for parsing we would use it, but we'd like to
 
2147
 
    # avoid excessive use of external libraries.
 
2149
 
    # New type for defining tokens, syntax, and semantics all-in-one
 
2150
 
    Token = collections.namedtuple("Token",
 
2151
 
                                   ("regexp", # To match token; if
 
2152
 
                                              # "value" is not None,
 
2153
 
                                              # must have a "group"
 
2155
 
                                    "value",  # datetime.timedelta or
 
2157
 
                                    "followers")) # Tokens valid after
 
2159
 
    # RFC 3339 "duration" tokens, syntax, and semantics; taken from
 
2160
 
    # the "duration" ABNF definition in RFC 3339, Appendix A.
 
2161
 
    token_end = Token(re.compile(r"$"), None, frozenset())
 
2162
 
    token_second = Token(re.compile(r"(\d+)S"),
 
2163
 
                         datetime.timedelta(seconds=1),
 
2164
 
                         frozenset((token_end,)))
 
2165
 
    token_minute = Token(re.compile(r"(\d+)M"),
 
2166
 
                         datetime.timedelta(minutes=1),
 
2167
 
                         frozenset((token_second, token_end)))
 
2168
 
    token_hour = Token(re.compile(r"(\d+)H"),
 
2169
 
                       datetime.timedelta(hours=1),
 
2170
 
                       frozenset((token_minute, token_end)))
 
2171
 
    token_time = Token(re.compile(r"T"),
 
2173
 
                       frozenset((token_hour, token_minute,
 
2175
 
    token_day = Token(re.compile(r"(\d+)D"),
 
2176
 
                      datetime.timedelta(days=1),
 
2177
 
                      frozenset((token_time, token_end)))
 
2178
 
    token_month = Token(re.compile(r"(\d+)M"),
 
2179
 
                        datetime.timedelta(weeks=4),
 
2180
 
                        frozenset((token_day, token_end)))
 
2181
 
    token_year = Token(re.compile(r"(\d+)Y"),
 
2182
 
                       datetime.timedelta(weeks=52),
 
2183
 
                       frozenset((token_month, token_end)))
 
2184
 
    token_week = Token(re.compile(r"(\d+)W"),
 
2185
 
                       datetime.timedelta(weeks=1),
 
2186
 
                       frozenset((token_end,)))
 
2187
 
    token_duration = Token(re.compile(r"P"), None,
 
2188
 
                           frozenset((token_year, token_month,
 
2189
 
                                      token_day, token_time,
 
2191
 
    # Define starting values
 
2192
 
    value = datetime.timedelta() # Value so far
 
2194
 
    followers = frozenset(token_duration,) # Following valid tokens
 
2195
 
    s = duration                # String left to parse
 
2196
 
    # Loop until end token is found
 
2197
 
    while found_token is not token_end:
 
2198
 
        # Search for any currently valid tokens
 
2199
 
        for token in followers:
 
2200
 
            match = token.regexp.match(s)
 
2201
 
            if match is not None:
 
2203
 
                if token.value is not None:
 
2204
 
                    # Value found, parse digits
 
2205
 
                    factor = int(match.group(1), 10)
 
2206
 
                    # Add to value so far
 
2207
 
                    value += factor * token.value
 
2208
 
                # Strip token from string
 
2209
 
                s = token.regexp.sub("", s, 1)
 
2212
 
                # Set valid next tokens
 
2213
 
                followers = found_token.followers
 
2216
 
            # No currently valid tokens were found
 
2217
 
            raise ValueError("Invalid RFC 3339 duration")
 
2222
1731
def string_to_delta(interval):
 
2223
1732
    """Parse a string and return a datetime.timedelta
 
 
2546
2037
    client_class = Client
 
2548
 
        client_class = functools.partial(ClientDBus, bus = bus)
 
2550
 
    client_settings = Client.config_parser(client_config)
 
2551
 
    old_client_settings = {}
 
2554
 
    # This is used to redirect stdout and stderr for checker processes
 
2556
 
    wnull = open(os.devnull, "w") # A writable /dev/null
 
2557
 
    # Only used if server is running in foreground but not in debug
 
2559
 
    if debug or not foreground:
 
2562
 
    # Get client data and settings from last running state.
 
2563
 
    if server_settings["restore"]:
 
2565
 
            with open(stored_state_path, "rb") as stored_state:
 
2566
 
                clients_data, old_client_settings = (pickle.load
 
2568
 
            os.remove(stored_state_path)
 
2569
 
        except IOError as e:
 
2570
 
            if e.errno == errno.ENOENT:
 
2571
 
                logger.warning("Could not load persistent state: {0}"
 
2572
 
                                .format(os.strerror(e.errno)))
 
2574
 
                logger.critical("Could not load persistent state:",
 
2577
 
        except EOFError as e:
 
2578
 
            logger.warning("Could not load persistent state: "
 
2579
 
                           "EOFError:", exc_info=e)
 
2581
 
    with PGPEngine() as pgp:
 
2582
 
        for client_name, client in clients_data.iteritems():
 
2583
 
            # Skip removed clients
 
2584
 
            if client_name not in client_settings:
 
2587
 
            # Decide which value to use after restoring saved state.
 
2588
 
            # We have three different values: Old config file,
 
2589
 
            # new config file, and saved state.
 
2590
 
            # New config value takes precedence if it differs from old
 
2591
 
            # config value, otherwise use saved state.
 
2592
 
            for name, value in client_settings[client_name].items():
 
2594
 
                    # For each value in new config, check if it
 
2595
 
                    # differs from the old config value (Except for
 
2596
 
                    # the "secret" attribute)
 
2597
 
                    if (name != "secret" and
 
2598
 
                        value != old_client_settings[client_name]
 
2600
 
                        client[name] = value
 
2604
 
            # Clients who has passed its expire date can still be
 
2605
 
            # enabled if its last checker was successful.  Clients
 
2606
 
            # whose checker succeeded before we stored its state is
 
2607
 
            # assumed to have successfully run all checkers during
 
2609
 
            if client["enabled"]:
 
2610
 
                if datetime.datetime.utcnow() >= client["expires"]:
 
2611
 
                    if not client["last_checked_ok"]:
 
2613
 
                            "disabling client {0} - Client never "
 
2614
 
                            "performed a successful checker"
 
2615
 
                            .format(client_name))
 
2616
 
                        client["enabled"] = False
 
2617
 
                    elif client["last_checker_status"] != 0:
 
2619
 
                            "disabling client {0} - Client "
 
2620
 
                            "last checker failed with error code {1}"
 
2621
 
                            .format(client_name,
 
2622
 
                                    client["last_checker_status"]))
 
2623
 
                        client["enabled"] = False
 
2625
 
                        client["expires"] = (datetime.datetime
 
2627
 
                                             + client["timeout"])
 
2628
 
                        logger.debug("Last checker succeeded,"
 
2629
 
                                     " keeping {0} enabled"
 
2630
 
                                     .format(client_name))
 
 
2039
        client_class = functools.partial(ClientDBusTransitional,
 
 
2041
    def client_config_items(config, section):
 
 
2042
        special_settings = {
 
 
2043
            "approved_by_default":
 
 
2044
                lambda: config.getboolean(section,
 
 
2045
                                          "approved_by_default"),
 
 
2047
        for name, value in config.items(section):
 
2632
 
                client["secret"] = (
 
2633
 
                    pgp.decrypt(client["encrypted_secret"],
 
2634
 
                                client_settings[client_name]
 
2637
 
                # If decryption fails, we use secret from new settings
 
2638
 
                logger.debug("Failed to decrypt {0} old secret"
 
2639
 
                             .format(client_name))
 
2640
 
                client["secret"] = (
 
2641
 
                    client_settings[client_name]["secret"])
 
2643
 
    # Add/remove clients based on new changes made to config
 
2644
 
    for client_name in (set(old_client_settings)
 
2645
 
                        - set(client_settings)):
 
2646
 
        del clients_data[client_name]
 
2647
 
    for client_name in (set(client_settings)
 
2648
 
                        - set(old_client_settings)):
 
2649
 
        clients_data[client_name] = client_settings[client_name]
 
2651
 
    # Create all client objects
 
2652
 
    for client_name, client in clients_data.iteritems():
 
2653
 
        tcp_server.clients[client_name] = client_class(
 
2654
 
            name = client_name, settings = client,
 
2655
 
            server_settings = server_settings)
 
 
2049
                yield (name, special_settings[name]())
 
 
2053
    tcp_server.clients.update(set(
 
 
2054
            client_class(name = section,
 
 
2055
                         config= dict(client_config_items(
 
 
2056
                        client_config, section)))
 
 
2057
            for section in client_config.sections()))
 
2657
2058
    if not tcp_server.clients:
 
2658
2059
        logger.warning("No clients defined")
 
2661
 
        if pidfile is not None:
 
2665
 
                    pidfile.write(str(pid) + "\n".encode("utf-8"))
 
2667
 
                logger.error("Could not write to file %r with PID %d",
 
 
2065
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
 
2068
            logger.error("Could not write to file %r with PID %d",
 
 
2071
            # "pidfile" was never created
 
2670
2073
        del pidfilename
 
 
2075
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
2672
2077
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
2673
2078
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
 
2676
 
        @alternate_dbus_interfaces({"se.recompile.Mandos":
 
2677
 
                                        "se.bsnet.fukt.Mandos"})
 
2678
 
        class MandosDBusService(DBusObjectWithProperties):
 
 
2081
        class MandosDBusService(dbus.service.Object):
 
2679
2082
            """A D-Bus proxy object"""
 
2680
2083
            def __init__(self):
 
2681
2084
                dbus.service.Object.__init__(self, bus, "/")
 
2682
2085
            _interface = "se.recompile.Mandos"
 
2684
 
            @dbus_interface_annotations(_interface)
 
2686
 
                return { "org.freedesktop.DBus.Property"
 
2687
 
                         ".EmitsChangedSignal":
 
2690
2087
            @dbus.service.signal(_interface, signature="o")
 
2691
2088
            def ClientAdded(self, objpath):
 
 
2737
 
        mandos_dbus_service = MandosDBusService()
 
 
2133
        class MandosDBusServiceTransitional(MandosDBusService):
 
 
2134
            __metaclass__ = AlternateDBusNamesMetaclass
 
 
2135
        mandos_dbus_service = MandosDBusServiceTransitional()
 
2740
2138
        "Cleanup function; run on exit"
 
2741
2139
        service.cleanup()
 
2743
2141
        multiprocessing.active_children()
 
2745
 
        if not (tcp_server.clients or client_settings):
 
2748
 
        # Store client before exiting. Secrets are encrypted with key
 
2749
 
        # based on what config file has. If config file is
 
2750
 
        # removed/edited, old secret will thus be unrecovable.
 
2752
 
        with PGPEngine() as pgp:
 
2753
 
            for client in tcp_server.clients.itervalues():
 
2754
 
                key = client_settings[client.name]["secret"]
 
2755
 
                client.encrypted_secret = pgp.encrypt(client.secret,
 
2759
 
                # A list of attributes that can not be pickled
 
2761
 
                exclude = set(("bus", "changedstate", "secret",
 
2762
 
                               "checker", "server_settings"))
 
2763
 
                for name, typ in (inspect.getmembers
 
2764
 
                                  (dbus.service.Object)):
 
2767
 
                client_dict["encrypted_secret"] = (client
 
2769
 
                for attr in client.client_structure:
 
2770
 
                    if attr not in exclude:
 
2771
 
                        client_dict[attr] = getattr(client, attr)
 
2773
 
                clients[client.name] = client_dict
 
2774
 
                del client_settings[client.name]["secret"]
 
2777
 
            with (tempfile.NamedTemporaryFile
 
2778
 
                  (mode='wb', suffix=".pickle", prefix='clients-',
 
2779
 
                   dir=os.path.dirname(stored_state_path),
 
2780
 
                   delete=False)) as stored_state:
 
2781
 
                pickle.dump((clients, client_settings), stored_state)
 
2782
 
                tempname=stored_state.name
 
2783
 
            os.rename(tempname, stored_state_path)
 
2784
 
        except (IOError, OSError) as e:
 
2790
 
            if e.errno in (errno.ENOENT, errno.EACCES, errno.EEXIST):
 
2791
 
                logger.warning("Could not save persistent state: {0}"
 
2792
 
                               .format(os.strerror(e.errno)))
 
2794
 
                logger.warning("Could not save persistent state:",
 
2798
 
        # Delete all clients, and settings from config
 
2799
2142
        while tcp_server.clients:
 
2800
 
            name, client = tcp_server.clients.popitem()
 
 
2143
            client = tcp_server.clients.pop()
 
2802
2145
                client.remove_from_connection()
 
 
2146
            client.disable_hook = None
 
2803
2147
            # Don't signal anything except ClientRemoved
 
2804
2148
            client.disable(quiet=True)