81
88
    except ImportError:
 
82
89
        SO_BINDTODEVICE = None
 
87
 
#logger = logging.getLogger('mandos')
 
88
 
logger = logging.Logger('mandos')
 
89
 
syslogger = (logging.handlers.SysLogHandler
 
90
 
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
 
91
 
              address = str("/dev/log")))
 
92
 
syslogger.setFormatter(logging.Formatter
 
93
 
                       ('Mandos [%(process)d]: %(levelname)s:'
 
95
 
logger.addHandler(syslogger)
 
97
 
console = logging.StreamHandler()
 
98
 
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
101
 
logger.addHandler(console)
 
 
92
stored_state_file = "clients.pickle"
 
 
94
logger = logging.getLogger()
 
 
98
    if_nametoindex = (ctypes.cdll.LoadLibrary
 
 
99
                      (ctypes.util.find_library("c"))
 
 
101
except (OSError, AttributeError):
 
 
102
    def if_nametoindex(interface):
 
 
103
        "Get an interface index the hard way, i.e. using fcntl()"
 
 
104
        SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
 
 
105
        with contextlib.closing(socket.socket()) as s:
 
 
106
            ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
 
 
107
                                struct.pack(b"16s16x", interface))
 
 
108
        interface_index = struct.unpack("I", ifreq[16:20])[0]
 
 
109
        return interface_index
 
 
112
def initlogger(debug, level=logging.WARNING):
 
 
113
    """init logger and add loglevel"""
 
 
116
    syslogger = (logging.handlers.SysLogHandler
 
 
118
                  logging.handlers.SysLogHandler.LOG_DAEMON,
 
 
119
                  address = "/dev/log"))
 
 
120
    syslogger.setFormatter(logging.Formatter
 
 
121
                           ('Mandos [%(process)d]: %(levelname)s:'
 
 
123
    logger.addHandler(syslogger)
 
 
126
        console = logging.StreamHandler()
 
 
127
        console.setFormatter(logging.Formatter('%(asctime)s %(name)s'
 
 
131
        logger.addHandler(console)
 
 
132
    logger.setLevel(level)
 
 
135
class PGPError(Exception):
 
 
136
    """Exception if encryption/decryption fails"""
 
 
140
class PGPEngine(object):
 
 
141
    """A simple class for OpenPGP symmetric encryption & decryption"""
 
 
143
        self.tempdir = tempfile.mkdtemp(prefix="mandos-")
 
 
144
        self.gnupgargs = ['--batch',
 
 
145
                          '--home', self.tempdir,
 
 
153
    def __exit__(self, exc_type, exc_value, traceback):
 
 
161
        if self.tempdir is not None:
 
 
162
            # Delete contents of tempdir
 
 
163
            for root, dirs, files in os.walk(self.tempdir,
 
 
165
                for filename in files:
 
 
166
                    os.remove(os.path.join(root, filename))
 
 
168
                    os.rmdir(os.path.join(root, dirname))
 
 
170
            os.rmdir(self.tempdir)
 
 
173
    def password_encode(self, password):
 
 
174
        # Passphrase can not be empty and can not contain newlines or
 
 
175
        # NUL bytes.  So we prefix it and hex encode it.
 
 
176
        encoded = b"mandos" + binascii.hexlify(password)
 
 
177
        if len(encoded) > 2048:
 
 
178
            # GnuPG can't handle long passwords, so encode differently
 
 
179
            encoded = (b"mandos" + password.replace(b"\\", b"\\\\")
 
 
180
                       .replace(b"\n", b"\\n")
 
 
181
                       .replace(b"\0", b"\\x00"))
 
 
184
    def encrypt(self, data, password):
 
 
185
        passphrase = self.password_encode(password)
 
 
186
        with tempfile.NamedTemporaryFile(dir=self.tempdir
 
 
188
            passfile.write(passphrase)
 
 
190
            proc = subprocess.Popen(['gpg', '--symmetric',
 
 
194
                                    stdin = subprocess.PIPE,
 
 
195
                                    stdout = subprocess.PIPE,
 
 
196
                                    stderr = subprocess.PIPE)
 
 
197
            ciphertext, err = proc.communicate(input = data)
 
 
198
        if proc.returncode != 0:
 
 
202
    def decrypt(self, data, password):
 
 
203
        passphrase = self.password_encode(password)
 
 
204
        with tempfile.NamedTemporaryFile(dir = self.tempdir
 
 
206
            passfile.write(passphrase)
 
 
208
            proc = subprocess.Popen(['gpg', '--decrypt',
 
 
212
                                    stdin = subprocess.PIPE,
 
 
213
                                    stdout = subprocess.PIPE,
 
 
214
                                    stderr = subprocess.PIPE)
 
 
215
            decrypted_plaintext, err = proc.communicate(input
 
 
217
        if proc.returncode != 0:
 
 
219
        return decrypted_plaintext
 
103
222
class AvahiError(Exception):
 
104
223
    def __init__(self, value, *args, **kwargs):
 
105
224
        self.value = value
 
106
 
        super(AvahiError, self).__init__(value, *args, **kwargs)
 
107
 
    def __unicode__(self):
 
108
 
        return unicode(repr(self.value))
 
 
225
        return super(AvahiError, self).__init__(value, *args,
 
110
228
class AvahiServiceError(AvahiError):
 
 
210
335
        elif state == avahi.ENTRY_GROUP_FAILURE:
 
211
336
            logger.critical("Avahi: Error in group state changed %s",
 
213
 
            raise AvahiGroupError("State changed: %s"
 
 
338
            raise AvahiGroupError("State changed: {!s}"
 
215
341
    def cleanup(self):
 
216
342
        """Derived from the Avahi example code"""
 
217
343
        if self.group is not None:
 
 
346
            except (dbus.exceptions.UnknownMethodException,
 
 
347
                    dbus.exceptions.DBusException):
 
219
349
            self.group = None
 
220
 
    def server_state_changed(self, state):
 
 
352
    def server_state_changed(self, state, error=None):
 
221
353
        """Derived from the Avahi example code"""
 
222
354
        logger.debug("Avahi server state change: %i", state)
 
223
 
        if state == avahi.SERVER_COLLISION:
 
224
 
            logger.error("Zeroconf server name collision")
 
 
355
        bad_states = { avahi.SERVER_INVALID:
 
 
356
                           "Zeroconf server invalid",
 
 
357
                       avahi.SERVER_REGISTERING: None,
 
 
358
                       avahi.SERVER_COLLISION:
 
 
359
                           "Zeroconf server name collision",
 
 
360
                       avahi.SERVER_FAILURE:
 
 
361
                           "Zeroconf server failure" }
 
 
362
        if state in bad_states:
 
 
363
            if bad_states[state] is not None:
 
 
365
                    logger.error(bad_states[state])
 
 
367
                    logger.error(bad_states[state] + ": %r", error)
 
226
369
        elif state == avahi.SERVER_RUNNING:
 
 
373
                logger.debug("Unknown state: %r", state)
 
 
375
                logger.debug("Unknown state: %r: %r", state, error)
 
228
377
    def activate(self):
 
229
378
        """Derived from the Avahi example code"""
 
230
379
        if self.server is None:
 
231
380
            self.server = dbus.Interface(
 
232
381
                self.bus.get_object(avahi.DBUS_NAME,
 
233
 
                                    avahi.DBUS_PATH_SERVER),
 
 
382
                                    avahi.DBUS_PATH_SERVER,
 
 
383
                                    follow_name_owner_changes=True),
 
234
384
                avahi.DBUS_INTERFACE_SERVER)
 
235
385
        self.server.connect_to_signal("StateChanged",
 
236
386
                                 self.server_state_changed)
 
237
387
        self.server_state_changed(self.server.GetState())
 
 
390
class AvahiServiceToSyslog(AvahiService):
 
 
392
        """Add the new name to the syslog messages"""
 
 
393
        ret = AvahiService.rename(self)
 
 
394
        syslogger.setFormatter(logging.Formatter
 
 
395
                               ('Mandos ({}) [%(process)d]:'
 
 
396
                                ' %(levelname)s: %(message)s'
 
240
401
class Client(object):
 
241
402
    """A representation of a client host served by this server.
 
244
 
    _approved:   bool(); 'None' if not yet approved/disapproved
 
 
405
    approved:   bool(); 'None' if not yet approved/disapproved
 
245
406
    approval_delay: datetime.timedelta(); Time to wait for approval
 
246
407
    approval_duration: datetime.timedelta(); Duration of one approval
 
247
408
    checker:    subprocess.Popen(); a running checker process used
 
 
264
426
    interval:   datetime.timedelta(); How often to start a new checker
 
265
427
    last_approval_request: datetime.datetime(); (UTC) or None
 
266
428
    last_checked_ok: datetime.datetime(); (UTC) or None
 
267
 
    last_enabled: datetime.datetime(); (UTC)
 
 
429
    last_checker_status: integer between 0 and 255 reflecting exit
 
 
430
                         status of last checker. -1 reflects crashed
 
 
431
                         checker, -2 means no checker completed yet.
 
 
432
    last_enabled: datetime.datetime(); (UTC) or None
 
268
433
    name:       string; from the config file, used in log messages and
 
269
434
                        D-Bus identifiers
 
270
435
    secret:     bytestring; sent verbatim (over TLS) to client
 
271
436
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
272
437
                                      until this client is disabled
 
 
438
    extended_timeout:   extra long timeout when secret has been sent
 
273
439
    runtime_expansions: Allowed attributes for runtime expansion.
 
 
440
    expires:    datetime.datetime(); time (UTC) when a client will be
 
 
442
    server_settings: The server_settings dict from main()
 
276
445
    runtime_expansions = ("approval_delay", "approval_duration",
 
277
 
                          "created", "enabled", "fingerprint",
 
278
 
                          "host", "interval", "last_checked_ok",
 
 
446
                          "created", "enabled", "expires",
 
 
447
                          "fingerprint", "host", "interval",
 
 
448
                          "last_approval_request", "last_checked_ok",
 
279
449
                          "last_enabled", "name", "timeout")
 
 
450
    client_defaults = { "timeout": "PT5M",
 
 
451
                        "extended_timeout": "PT15M",
 
 
453
                        "checker": "fping -q -- %%(host)s",
 
 
455
                        "approval_delay": "PT0S",
 
 
456
                        "approval_duration": "PT1S",
 
 
457
                        "approved_by_default": "True",
 
282
 
    def _timedelta_to_milliseconds(td):
 
283
 
        "Convert a datetime.timedelta() to milliseconds"
 
284
 
        return ((td.days * 24 * 60 * 60 * 1000)
 
285
 
                + (td.seconds * 1000)
 
286
 
                + (td.microseconds // 1000))
 
288
 
    def timeout_milliseconds(self):
 
289
 
        "Return the 'timeout' attribute in milliseconds"
 
290
 
        return self._timedelta_to_milliseconds(self.timeout)
 
292
 
    def interval_milliseconds(self):
 
293
 
        "Return the 'interval' attribute in milliseconds"
 
294
 
        return self._timedelta_to_milliseconds(self.interval)
 
296
 
    def approval_delay_milliseconds(self):
 
297
 
        return self._timedelta_to_milliseconds(self.approval_delay)
 
299
 
    def __init__(self, name = None, disable_hook=None, config=None):
 
300
 
        """Note: the 'checker' key in 'config' sets the
 
301
 
        'checker_command' attribute and *not* the 'checker'
 
 
462
    def config_parser(config):
 
 
463
        """Construct a new dict of client settings of this form:
 
 
464
        { client_name: {setting_name: value, ...}, ...}
 
 
465
        with exceptions for any special settings as defined above.
 
 
466
        NOTE: Must be a pure function. Must return the same result
 
 
467
        value given the same arguments.
 
 
470
        for client_name in config.sections():
 
 
471
            section = dict(config.items(client_name))
 
 
472
            client = settings[client_name] = {}
 
 
474
            client["host"] = section["host"]
 
 
475
            # Reformat values from string types to Python types
 
 
476
            client["approved_by_default"] = config.getboolean(
 
 
477
                client_name, "approved_by_default")
 
 
478
            client["enabled"] = config.getboolean(client_name,
 
 
481
            client["fingerprint"] = (section["fingerprint"].upper()
 
 
483
            if "secret" in section:
 
 
484
                client["secret"] = section["secret"].decode("base64")
 
 
485
            elif "secfile" in section:
 
 
486
                with open(os.path.expanduser(os.path.expandvars
 
 
487
                                             (section["secfile"])),
 
 
489
                    client["secret"] = secfile.read()
 
 
491
                raise TypeError("No secret or secfile for section {}"
 
 
493
            client["timeout"] = string_to_delta(section["timeout"])
 
 
494
            client["extended_timeout"] = string_to_delta(
 
 
495
                section["extended_timeout"])
 
 
496
            client["interval"] = string_to_delta(section["interval"])
 
 
497
            client["approval_delay"] = string_to_delta(
 
 
498
                section["approval_delay"])
 
 
499
            client["approval_duration"] = string_to_delta(
 
 
500
                section["approval_duration"])
 
 
501
            client["checker_command"] = section["checker"]
 
 
502
            client["last_approval_request"] = None
 
 
503
            client["last_checked_ok"] = None
 
 
504
            client["last_checker_status"] = -2
 
 
508
    def __init__(self, settings, name = None, server_settings=None):
 
 
510
        if server_settings is None:
 
 
512
        self.server_settings = server_settings
 
 
513
        # adding all client settings
 
 
514
        for setting, value in settings.items():
 
 
515
            setattr(self, setting, value)
 
 
518
            if not hasattr(self, "last_enabled"):
 
 
519
                self.last_enabled = datetime.datetime.utcnow()
 
 
520
            if not hasattr(self, "expires"):
 
 
521
                self.expires = (datetime.datetime.utcnow()
 
 
524
            self.last_enabled = None
 
306
527
        logger.debug("Creating client %r", self.name)
 
307
528
        # Uppercase and remove spaces from fingerprint for later
 
308
529
        # comparison purposes with return value from the fingerprint()
 
310
 
        self.fingerprint = (config["fingerprint"].upper()
 
312
531
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
313
 
        if "secret" in config:
 
314
 
            self.secret = config["secret"].decode("base64")
 
315
 
        elif "secfile" in config:
 
316
 
            with open(os.path.expanduser(os.path.expandvars
 
317
 
                                         (config["secfile"])),
 
319
 
                self.secret = secfile.read()
 
321
 
            raise TypeError("No secret or secfile for client %s"
 
323
 
        self.host = config.get("host", "")
 
324
 
        self.created = datetime.datetime.utcnow()
 
326
 
        self.last_approval_request = None
 
327
 
        self.last_enabled = None
 
328
 
        self.last_checked_ok = None
 
329
 
        self.timeout = string_to_delta(config["timeout"])
 
330
 
        self.interval = string_to_delta(config["interval"])
 
331
 
        self.disable_hook = disable_hook
 
 
532
        self.created = settings.get("created",
 
 
533
                                    datetime.datetime.utcnow())
 
 
535
        # attributes specific for this server instance
 
332
536
        self.checker = None
 
333
537
        self.checker_initiator_tag = None
 
334
538
        self.disable_initiator_tag = None
 
335
539
        self.checker_callback_tag = None
 
336
 
        self.checker_command = config["checker"]
 
337
540
        self.current_checker_command = None
 
338
 
        self.last_connect = None
 
339
 
        self._approved = None
 
340
 
        self.approved_by_default = config.get("approved_by_default",
 
342
542
        self.approvals_pending = 0
 
343
 
        self.approval_delay = string_to_delta(
 
344
 
            config["approval_delay"])
 
345
 
        self.approval_duration = string_to_delta(
 
346
 
            config["approval_duration"])
 
347
 
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
 
543
        self.changedstate = (multiprocessing_manager
 
 
544
                             .Condition(multiprocessing_manager
 
 
546
        self.client_structure = [attr for attr in
 
 
547
                                 self.__dict__.iterkeys()
 
 
548
                                 if not attr.startswith("_")]
 
 
549
        self.client_structure.append("client_structure")
 
 
551
        for name, t in inspect.getmembers(type(self),
 
 
555
            if not name.startswith("_"):
 
 
556
                self.client_structure.append(name)
 
 
558
    # Send notice to process children that client state has changed
 
349
559
    def send_changedstate(self):
 
350
 
        self.changedstate.acquire()
 
351
 
        self.changedstate.notify_all()
 
352
 
        self.changedstate.release()
 
 
560
        with self.changedstate:
 
 
561
            self.changedstate.notify_all()
 
354
563
    def enable(self):
 
355
564
        """Start this client's checker and timeout hooks"""
 
356
565
        if getattr(self, "enabled", False):
 
357
566
            # Already enabled
 
359
 
        self.send_changedstate()
 
 
568
        self.expires = datetime.datetime.utcnow() + self.timeout
 
360
570
        self.last_enabled = datetime.datetime.utcnow()
 
361
 
        # Schedule a new checker to be started an 'interval' from now,
 
362
 
        # and every interval from then on.
 
363
 
        self.checker_initiator_tag = (gobject.timeout_add
 
364
 
                                      (self.interval_milliseconds(),
 
366
 
        # Schedule a disable() when 'timeout' has passed
 
367
 
        self.disable_initiator_tag = (gobject.timeout_add
 
368
 
                                   (self.timeout_milliseconds(),
 
371
 
        # Also start a new checker *right now*.
 
 
572
        self.send_changedstate()
 
374
574
    def disable(self, quiet=True):
 
375
575
        """Disable this client."""
 
376
576
        if not getattr(self, "enabled", False):
 
379
 
            self.send_changedstate()
 
381
579
            logger.info("Disabling client %s", self.name)
 
382
 
        if getattr(self, "disable_initiator_tag", False):
 
 
580
        if getattr(self, "disable_initiator_tag", None) is not None:
 
383
581
            gobject.source_remove(self.disable_initiator_tag)
 
384
582
            self.disable_initiator_tag = None
 
385
 
        if getattr(self, "checker_initiator_tag", False):
 
 
584
        if getattr(self, "checker_initiator_tag", None) is not None:
 
386
585
            gobject.source_remove(self.checker_initiator_tag)
 
387
586
            self.checker_initiator_tag = None
 
388
587
        self.stop_checker()
 
389
 
        if self.disable_hook:
 
390
 
            self.disable_hook(self)
 
391
588
        self.enabled = False
 
 
590
            self.send_changedstate()
 
392
591
        # Do not run this again if called by a gobject.timeout_add
 
395
594
    def __del__(self):
 
396
 
        self.disable_hook = None
 
 
597
    def init_checker(self):
 
 
598
        # Schedule a new checker to be started an 'interval' from now,
 
 
599
        # and every interval from then on.
 
 
600
        if self.checker_initiator_tag is not None:
 
 
601
            gobject.source_remove(self.checker_initiator_tag)
 
 
602
        self.checker_initiator_tag = (gobject.timeout_add
 
 
604
                                           .total_seconds() * 1000),
 
 
606
        # Schedule a disable() when 'timeout' has passed
 
 
607
        if self.disable_initiator_tag is not None:
 
 
608
            gobject.source_remove(self.disable_initiator_tag)
 
 
609
        self.disable_initiator_tag = (gobject.timeout_add
 
 
611
                                           .total_seconds() * 1000),
 
 
613
        # Also start a new checker *right now*.
 
399
616
    def checker_callback(self, pid, condition, command):
 
400
617
        """The checker has completed, so take appropriate actions."""
 
401
618
        self.checker_callback_tag = None
 
402
619
        self.checker = None
 
403
620
        if os.WIFEXITED(condition):
 
404
 
            exitstatus = os.WEXITSTATUS(condition)
 
 
621
            self.last_checker_status = os.WEXITSTATUS(condition)
 
 
622
            if self.last_checker_status == 0:
 
406
623
                logger.info("Checker for %(name)s succeeded",
 
408
625
                self.checked_ok()
 
 
573
845
class DBusObjectWithProperties(dbus.service.Object):
 
574
846
    """A D-Bus object with properties.
 
576
848
    Classes inheriting from this can use the dbus_service_property
 
577
849
    decorator to expose methods as D-Bus properties.  It exposes the
 
578
850
    standard Get(), Set(), and GetAll() methods on the D-Bus.
 
582
 
    def _is_dbus_property(obj):
 
583
 
        return getattr(obj, "_dbus_is_property", False)
 
 
854
    def _is_dbus_thing(thing):
 
 
855
        """Returns a function testing if an attribute is a D-Bus thing
 
 
857
        If called like _is_dbus_thing("method") it returns a function
 
 
858
        suitable for use as predicate to inspect.getmembers().
 
 
860
        return lambda obj: getattr(obj, "_dbus_is_{}".format(thing),
 
585
 
    def _get_all_dbus_properties(self):
 
 
863
    def _get_all_dbus_things(self, thing):
 
586
864
        """Returns a generator of (name, attribute) pairs
 
588
 
        return ((prop._dbus_name, prop)
 
590
 
                inspect.getmembers(self, self._is_dbus_property))
 
 
866
        return ((getattr(athing.__get__(self), "_dbus_name",
 
 
868
                 athing.__get__(self))
 
 
869
                for cls in self.__class__.__mro__
 
 
871
                inspect.getmembers(cls,
 
 
872
                                   self._is_dbus_thing(thing)))
 
592
874
    def _get_dbus_property(self, interface_name, property_name):
 
593
875
        """Returns a bound method if one exists which is a D-Bus
 
594
876
        property with the specified name and interface.
 
596
 
        for name in (property_name,
 
597
 
                     property_name + "_dbus_property"):
 
598
 
            prop = getattr(self, name, None)
 
600
 
                or not self._is_dbus_property(prop)
 
601
 
                or prop._dbus_name != property_name
 
602
 
                or (interface_name and prop._dbus_interface
 
603
 
                    and interface_name != prop._dbus_interface)):
 
 
878
        for cls in  self.__class__.__mro__:
 
 
879
            for name, value in (inspect.getmembers
 
 
881
                                 self._is_dbus_thing("property"))):
 
 
882
                if (value._dbus_name == property_name
 
 
883
                    and value._dbus_interface == interface_name):
 
 
884
                    return value.__get__(self)
 
606
886
        # No such property
 
607
887
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
608
888
                                   + interface_name + "."
 
 
704
1020
            xmlstring = document.toxml("utf-8")
 
705
1021
            document.unlink()
 
706
1022
        except (AttributeError, xml.dom.DOMException,
 
707
 
                xml.parsers.expat.ExpatError), error:
 
 
1023
                xml.parsers.expat.ExpatError) as error:
 
708
1024
            logger.error("Failed to override Introspection method",
 
710
1026
        return xmlstring
 
 
1029
def datetime_to_dbus(dt, variant_level=0):
 
 
1030
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
 
1032
        return dbus.String("", variant_level = variant_level)
 
 
1033
    return dbus.String(dt.isoformat(),
 
 
1034
                       variant_level=variant_level)
 
 
1037
def alternate_dbus_interfaces(alt_interface_names, deprecate=True):
 
 
1038
    """A class decorator; applied to a subclass of
 
 
1039
    dbus.service.Object, it will add alternate D-Bus attributes with
 
 
1040
    interface names according to the "alt_interface_names" mapping.
 
 
1043
    @alternate_dbus_interfaces({"org.example.Interface":
 
 
1044
                                    "net.example.AlternateInterface"})
 
 
1045
    class SampleDBusObject(dbus.service.Object):
 
 
1046
        @dbus.service.method("org.example.Interface")
 
 
1047
        def SampleDBusMethod():
 
 
1050
    The above "SampleDBusMethod" on "SampleDBusObject" will be
 
 
1051
    reachable via two interfaces: "org.example.Interface" and
 
 
1052
    "net.example.AlternateInterface", the latter of which will have
 
 
1053
    its D-Bus annotation "org.freedesktop.DBus.Deprecated" set to
 
 
1054
    "true", unless "deprecate" is passed with a False value.
 
 
1056
    This works for methods and signals, and also for D-Bus properties
 
 
1057
    (from DBusObjectWithProperties) and interfaces (from the
 
 
1058
    dbus_interface_annotations decorator).
 
 
1061
        for orig_interface_name, alt_interface_name in (
 
 
1062
            alt_interface_names.items()):
 
 
1064
            interface_names = set()
 
 
1065
            # Go though all attributes of the class
 
 
1066
            for attrname, attribute in inspect.getmembers(cls):
 
 
1067
                # Ignore non-D-Bus attributes, and D-Bus attributes
 
 
1068
                # with the wrong interface name
 
 
1069
                if (not hasattr(attribute, "_dbus_interface")
 
 
1070
                    or not attribute._dbus_interface
 
 
1071
                    .startswith(orig_interface_name)):
 
 
1073
                # Create an alternate D-Bus interface name based on
 
 
1075
                alt_interface = (attribute._dbus_interface
 
 
1076
                                 .replace(orig_interface_name,
 
 
1077
                                          alt_interface_name))
 
 
1078
                interface_names.add(alt_interface)
 
 
1079
                # Is this a D-Bus signal?
 
 
1080
                if getattr(attribute, "_dbus_is_signal", False):
 
 
1081
                    # Extract the original non-method undecorated
 
 
1082
                    # function by black magic
 
 
1083
                    nonmethod_func = (dict(
 
 
1084
                            zip(attribute.func_code.co_freevars,
 
 
1085
                                attribute.__closure__))["func"]
 
 
1087
                    # Create a new, but exactly alike, function
 
 
1088
                    # object, and decorate it to be a new D-Bus signal
 
 
1089
                    # with the alternate D-Bus interface name
 
 
1090
                    new_function = (dbus.service.signal
 
 
1092
                                     attribute._dbus_signature)
 
 
1093
                                    (types.FunctionType(
 
 
1094
                                nonmethod_func.func_code,
 
 
1095
                                nonmethod_func.func_globals,
 
 
1096
                                nonmethod_func.func_name,
 
 
1097
                                nonmethod_func.func_defaults,
 
 
1098
                                nonmethod_func.func_closure)))
 
 
1099
                    # Copy annotations, if any
 
 
1101
                        new_function._dbus_annotations = (
 
 
1102
                            dict(attribute._dbus_annotations))
 
 
1103
                    except AttributeError:
 
 
1105
                    # Define a creator of a function to call both the
 
 
1106
                    # original and alternate functions, so both the
 
 
1107
                    # original and alternate signals gets sent when
 
 
1108
                    # the function is called
 
 
1109
                    def fixscope(func1, func2):
 
 
1110
                        """This function is a scope container to pass
 
 
1111
                        func1 and func2 to the "call_both" function
 
 
1112
                        outside of its arguments"""
 
 
1113
                        def call_both(*args, **kwargs):
 
 
1114
                            """This function will emit two D-Bus
 
 
1115
                            signals by calling func1 and func2"""
 
 
1116
                            func1(*args, **kwargs)
 
 
1117
                            func2(*args, **kwargs)
 
 
1119
                    # Create the "call_both" function and add it to
 
 
1121
                    attr[attrname] = fixscope(attribute, new_function)
 
 
1122
                # Is this a D-Bus method?
 
 
1123
                elif getattr(attribute, "_dbus_is_method", False):
 
 
1124
                    # Create a new, but exactly alike, function
 
 
1125
                    # object.  Decorate it to be a new D-Bus method
 
 
1126
                    # with the alternate D-Bus interface name.  Add it
 
 
1128
                    attr[attrname] = (dbus.service.method
 
 
1130
                                       attribute._dbus_in_signature,
 
 
1131
                                       attribute._dbus_out_signature)
 
 
1133
                                       (attribute.func_code,
 
 
1134
                                        attribute.func_globals,
 
 
1135
                                        attribute.func_name,
 
 
1136
                                        attribute.func_defaults,
 
 
1137
                                        attribute.func_closure)))
 
 
1138
                    # Copy annotations, if any
 
 
1140
                        attr[attrname]._dbus_annotations = (
 
 
1141
                            dict(attribute._dbus_annotations))
 
 
1142
                    except AttributeError:
 
 
1144
                # Is this a D-Bus property?
 
 
1145
                elif getattr(attribute, "_dbus_is_property", False):
 
 
1146
                    # Create a new, but exactly alike, function
 
 
1147
                    # object, and decorate it to be a new D-Bus
 
 
1148
                    # property with the alternate D-Bus interface
 
 
1149
                    # name.  Add it to the class.
 
 
1150
                    attr[attrname] = (dbus_service_property
 
 
1152
                                       attribute._dbus_signature,
 
 
1153
                                       attribute._dbus_access,
 
 
1155
                                       ._dbus_get_args_options
 
 
1158
                                       (attribute.func_code,
 
 
1159
                                        attribute.func_globals,
 
 
1160
                                        attribute.func_name,
 
 
1161
                                        attribute.func_defaults,
 
 
1162
                                        attribute.func_closure)))
 
 
1163
                    # Copy annotations, if any
 
 
1165
                        attr[attrname]._dbus_annotations = (
 
 
1166
                            dict(attribute._dbus_annotations))
 
 
1167
                    except AttributeError:
 
 
1169
                # Is this a D-Bus interface?
 
 
1170
                elif getattr(attribute, "_dbus_is_interface", False):
 
 
1171
                    # Create a new, but exactly alike, function
 
 
1172
                    # object.  Decorate it to be a new D-Bus interface
 
 
1173
                    # with the alternate D-Bus interface name.  Add it
 
 
1175
                    attr[attrname] = (dbus_interface_annotations
 
 
1178
                                       (attribute.func_code,
 
 
1179
                                        attribute.func_globals,
 
 
1180
                                        attribute.func_name,
 
 
1181
                                        attribute.func_defaults,
 
 
1182
                                        attribute.func_closure)))
 
 
1184
                # Deprecate all alternate interfaces
 
 
1185
                iname="_AlternateDBusNames_interface_annotation{}"
 
 
1186
                for interface_name in interface_names:
 
 
1187
                    @dbus_interface_annotations(interface_name)
 
 
1189
                        return { "org.freedesktop.DBus.Deprecated":
 
 
1191
                    # Find an unused name
 
 
1192
                    for aname in (iname.format(i)
 
 
1193
                                  for i in itertools.count()):
 
 
1194
                        if aname not in attr:
 
 
1198
                # Replace the class with a new subclass of it with
 
 
1199
                # methods, signals, etc. as created above.
 
 
1200
                cls = type(b"{}Alternate".format(cls.__name__),
 
 
1206
@alternate_dbus_interfaces({"se.recompile.Mandos":
 
 
1207
                                "se.bsnet.fukt.Mandos"})
 
713
1208
class ClientDBus(Client, DBusObjectWithProperties):
 
714
1209
    """A Client class using D-Bus
 
 
736
1230
                                 ("/clients/" + client_object_name))
 
737
1231
        DBusObjectWithProperties.__init__(self, self.bus,
 
738
1232
                                          self.dbus_object_path)
 
740
 
    def _get_approvals_pending(self):
 
741
 
        return self._approvals_pending
 
742
 
    def _set_approvals_pending(self, value):
 
743
 
        old_value = self._approvals_pending
 
744
 
        self._approvals_pending = value
 
746
 
        if (hasattr(self, "dbus_object_path")
 
747
 
            and bval is not bool(old_value)):
 
748
 
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
749
 
            self.PropertyChanged(dbus.String("ApprovalPending"),
 
752
 
    approvals_pending = property(_get_approvals_pending,
 
753
 
                                 _set_approvals_pending)
 
754
 
    del _get_approvals_pending, _set_approvals_pending
 
757
 
    def _datetime_to_dbus(dt, variant_level=0):
 
758
 
        """Convert a UTC datetime.datetime() to a D-Bus type."""
 
759
 
        return dbus.String(dt.isoformat(),
 
760
 
                           variant_level=variant_level)
 
763
 
        oldstate = getattr(self, "enabled", False)
 
764
 
        r = Client.enable(self)
 
765
 
        if oldstate != self.enabled:
 
767
 
            self.PropertyChanged(dbus.String("Enabled"),
 
768
 
                                 dbus.Boolean(True, variant_level=1))
 
769
 
            self.PropertyChanged(
 
770
 
                dbus.String("LastEnabled"),
 
771
 
                self._datetime_to_dbus(self.last_enabled,
 
775
 
    def disable(self, quiet = False):
 
776
 
        oldstate = getattr(self, "enabled", False)
 
777
 
        r = Client.disable(self, quiet=quiet)
 
778
 
        if not quiet and oldstate != self.enabled:
 
780
 
            self.PropertyChanged(dbus.String("Enabled"),
 
781
 
                                 dbus.Boolean(False, variant_level=1))
 
 
1234
    def notifychangeproperty(transform_func,
 
 
1235
                             dbus_name, type_func=lambda x: x,
 
 
1237
        """ Modify a variable so that it's a property which announces
 
 
1238
        its changes to DBus.
 
 
1240
        transform_fun: Function that takes a value and a variant_level
 
 
1241
                       and transforms it to a D-Bus type.
 
 
1242
        dbus_name: D-Bus name of the variable
 
 
1243
        type_func: Function that transform the value before sending it
 
 
1244
                   to the D-Bus.  Default: no transform
 
 
1245
        variant_level: D-Bus variant level.  Default: 1
 
 
1247
        attrname = "_{}".format(dbus_name)
 
 
1248
        def setter(self, value):
 
 
1249
            if hasattr(self, "dbus_object_path"):
 
 
1250
                if (not hasattr(self, attrname) or
 
 
1251
                    type_func(getattr(self, attrname, None))
 
 
1252
                    != type_func(value)):
 
 
1253
                    dbus_value = transform_func(type_func(value),
 
 
1256
                    self.PropertyChanged(dbus.String(dbus_name),
 
 
1258
            setattr(self, attrname, value)
 
 
1260
        return property(lambda self: getattr(self, attrname), setter)
 
 
1262
    expires = notifychangeproperty(datetime_to_dbus, "Expires")
 
 
1263
    approvals_pending = notifychangeproperty(dbus.Boolean,
 
 
1266
    enabled = notifychangeproperty(dbus.Boolean, "Enabled")
 
 
1267
    last_enabled = notifychangeproperty(datetime_to_dbus,
 
 
1269
    checker = notifychangeproperty(dbus.Boolean, "CheckerRunning",
 
 
1270
                                   type_func = lambda checker:
 
 
1271
                                       checker is not None)
 
 
1272
    last_checked_ok = notifychangeproperty(datetime_to_dbus,
 
 
1274
    last_checker_status = notifychangeproperty(dbus.Int16,
 
 
1275
                                               "LastCheckerStatus")
 
 
1276
    last_approval_request = notifychangeproperty(
 
 
1277
        datetime_to_dbus, "LastApprovalRequest")
 
 
1278
    approved_by_default = notifychangeproperty(dbus.Boolean,
 
 
1279
                                               "ApprovedByDefault")
 
 
1280
    approval_delay = notifychangeproperty(dbus.UInt64,
 
 
1283
                                          lambda td: td.total_seconds()
 
 
1285
    approval_duration = notifychangeproperty(
 
 
1286
        dbus.UInt64, "ApprovalDuration",
 
 
1287
        type_func = lambda td: td.total_seconds() * 1000)
 
 
1288
    host = notifychangeproperty(dbus.String, "Host")
 
 
1289
    timeout = notifychangeproperty(dbus.UInt64, "Timeout",
 
 
1290
                                   type_func = lambda td:
 
 
1291
                                       td.total_seconds() * 1000)
 
 
1292
    extended_timeout = notifychangeproperty(
 
 
1293
        dbus.UInt64, "ExtendedTimeout",
 
 
1294
        type_func = lambda td: td.total_seconds() * 1000)
 
 
1295
    interval = notifychangeproperty(dbus.UInt64,
 
 
1298
                                    lambda td: td.total_seconds()
 
 
1300
    checker_command = notifychangeproperty(dbus.String, "Checker")
 
 
1302
    del notifychangeproperty
 
784
1304
    def __del__(self, *args, **kwargs):
 
 
812
1329
        return Client.checker_callback(self, pid, condition, command,
 
813
1330
                                       *args, **kwargs)
 
815
 
    def checked_ok(self, *args, **kwargs):
 
816
 
        r = Client.checked_ok(self, *args, **kwargs)
 
818
 
        self.PropertyChanged(
 
819
 
            dbus.String("LastCheckedOK"),
 
820
 
            (self._datetime_to_dbus(self.last_checked_ok,
 
824
 
    def need_approval(self, *args, **kwargs):
 
825
 
        r = Client.need_approval(self, *args, **kwargs)
 
827
 
        self.PropertyChanged(
 
828
 
            dbus.String("LastApprovalRequest"),
 
829
 
            (self._datetime_to_dbus(self.last_approval_request,
 
833
1332
    def start_checker(self, *args, **kwargs):
 
834
 
        old_checker = self.checker
 
835
 
        if self.checker is not None:
 
836
 
            old_checker_pid = self.checker.pid
 
838
 
            old_checker_pid = None
 
 
1333
        old_checker_pid = getattr(self.checker, "pid", None)
 
839
1334
        r = Client.start_checker(self, *args, **kwargs)
 
840
1335
        # Only if new checker process was started
 
841
1336
        if (self.checker is not None
 
842
1337
            and old_checker_pid != self.checker.pid):
 
843
1338
            # Emit D-Bus signal
 
844
1339
            self.CheckerStarted(self.current_checker_command)
 
845
 
            self.PropertyChanged(
 
846
 
                dbus.String("CheckerRunning"),
 
847
 
                dbus.Boolean(True, variant_level=1))
 
850
 
    def stop_checker(self, *args, **kwargs):
 
851
 
        old_checker = getattr(self, "checker", None)
 
852
 
        r = Client.stop_checker(self, *args, **kwargs)
 
853
 
        if (old_checker is not None
 
854
 
            and getattr(self, "checker", None) is None):
 
855
 
            self.PropertyChanged(dbus.String("CheckerRunning"),
 
856
 
                                 dbus.Boolean(False, variant_level=1))
 
859
1342
    def _reset_approved(self):
 
860
 
        self._approved = None
 
 
1343
        self.approved = None
 
863
1346
    def approve(self, value=True):
 
 
1347
        self.approved = value
 
 
1348
        gobject.timeout_add(int(self.approval_duration.total_seconds()
 
 
1349
                                * 1000), self._reset_approved)
 
864
1350
        self.send_changedstate()
 
865
 
        self._approved = value
 
866
 
        gobject.timeout_add(self._timedelta_to_milliseconds
 
867
 
                            (self.approval_duration),
 
868
 
                            self._reset_approved)
 
871
1352
    ## D-Bus methods, signals & properties
 
872
 
    _interface = "se.bsnet.fukt.Mandos.Client"
 
 
1353
    _interface = "se.recompile.Mandos.Client"
 
 
1357
    @dbus_interface_annotations(_interface)
 
 
1359
        return { "org.freedesktop.DBus.Property.EmitsChangedSignal":
 
 
1039
1514
        if value is not None:
 
1040
1515
            self.checked_ok()
 
1042
 
        if self.last_checked_ok is None:
 
1043
 
            return dbus.String("")
 
1044
 
        return dbus.String(self._datetime_to_dbus(self
 
 
1517
        return datetime_to_dbus(self.last_checked_ok)
 
 
1519
    # LastCheckerStatus - property
 
 
1520
    @dbus_service_property(_interface, signature="n",
 
 
1522
    def LastCheckerStatus_dbus_property(self):
 
 
1523
        return dbus.Int16(self.last_checker_status)
 
 
1525
    # Expires - property
 
 
1526
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1527
    def Expires_dbus_property(self):
 
 
1528
        return datetime_to_dbus(self.expires)
 
1047
1530
    # LastApprovalRequest - property
 
1048
1531
    @dbus_service_property(_interface, signature="s", access="read")
 
1049
1532
    def LastApprovalRequest_dbus_property(self):
 
1050
 
        if self.last_approval_request is None:
 
1051
 
            return dbus.String("")
 
1052
 
        return dbus.String(self.
 
1053
 
                           _datetime_to_dbus(self
 
1054
 
                                             .last_approval_request))
 
 
1533
        return datetime_to_dbus(self.last_approval_request)
 
1056
1535
    # Timeout - property
 
1057
1536
    @dbus_service_property(_interface, signature="t",
 
1058
1537
                           access="readwrite")
 
1059
1538
    def Timeout_dbus_property(self, value=None):
 
1060
1539
        if value is None:       # get
 
1061
 
            return dbus.UInt64(self.timeout_milliseconds())
 
 
1540
            return dbus.UInt64(self.timeout.total_seconds() * 1000)
 
 
1541
        old_timeout = self.timeout
 
1062
1542
        self.timeout = datetime.timedelta(0, 0, 0, value)
 
1064
 
        self.PropertyChanged(dbus.String("Timeout"),
 
1065
 
                             dbus.UInt64(value, variant_level=1))
 
1066
 
        if getattr(self, "disable_initiator_tag", None) is None:
 
1068
 
        # Reschedule timeout
 
1069
 
        gobject.source_remove(self.disable_initiator_tag)
 
1070
 
        self.disable_initiator_tag = None
 
1071
 
        time_to_die = (self.
 
1072
 
                       _timedelta_to_milliseconds((self
 
1077
 
        if time_to_die <= 0:
 
1078
 
            # The timeout has passed
 
1081
 
            self.disable_initiator_tag = (gobject.timeout_add
 
1082
 
                                          (time_to_die, self.disable))
 
 
1543
        # Reschedule disabling
 
 
1545
            now = datetime.datetime.utcnow()
 
 
1546
            self.expires += self.timeout - old_timeout
 
 
1547
            if self.expires <= now:
 
 
1548
                # The timeout has passed
 
 
1551
                if (getattr(self, "disable_initiator_tag", None)
 
 
1554
                gobject.source_remove(self.disable_initiator_tag)
 
 
1555
                self.disable_initiator_tag = (
 
 
1556
                    gobject.timeout_add(
 
 
1557
                        int((self.expires - now).total_seconds()
 
 
1558
                            * 1000), self.disable))
 
 
1560
    # ExtendedTimeout - property
 
 
1561
    @dbus_service_property(_interface, signature="t",
 
 
1563
    def ExtendedTimeout_dbus_property(self, value=None):
 
 
1564
        if value is None:       # get
 
 
1565
            return dbus.UInt64(self.extended_timeout.total_seconds()
 
 
1567
        self.extended_timeout = datetime.timedelta(0, 0, 0, value)
 
1084
1569
    # Interval - property
 
1085
1570
    @dbus_service_property(_interface, signature="t",
 
1086
1571
                           access="readwrite")
 
1087
1572
    def Interval_dbus_property(self, value=None):
 
1088
1573
        if value is None:       # get
 
1089
 
            return dbus.UInt64(self.interval_milliseconds())
 
 
1574
            return dbus.UInt64(self.interval.total_seconds() * 1000)
 
1090
1575
        self.interval = datetime.timedelta(0, 0, 0, value)
 
1092
 
        self.PropertyChanged(dbus.String("Interval"),
 
1093
 
                             dbus.UInt64(value, variant_level=1))
 
1094
1576
        if getattr(self, "checker_initiator_tag", None) is None:
 
1096
 
        # Reschedule checker run
 
1097
 
        gobject.source_remove(self.checker_initiator_tag)
 
1098
 
        self.checker_initiator_tag = (gobject.timeout_add
 
1099
 
                                      (value, self.start_checker))
 
1100
 
        self.start_checker()    # Start one now, too
 
 
1579
            # Reschedule checker run
 
 
1580
            gobject.source_remove(self.checker_initiator_tag)
 
 
1581
            self.checker_initiator_tag = (gobject.timeout_add
 
 
1582
                                          (value, self.start_checker))
 
 
1583
            self.start_checker()    # Start one now, too
 
1102
1585
    # Checker - property
 
1103
1586
    @dbus_service_property(_interface, signature="s",
 
1104
1587
                           access="readwrite")
 
1105
1588
    def Checker_dbus_property(self, value=None):
 
1106
1589
        if value is None:       # get
 
1107
1590
            return dbus.String(self.checker_command)
 
1108
 
        self.checker_command = value
 
1110
 
        self.PropertyChanged(dbus.String("Checker"),
 
1111
 
                             dbus.String(self.checker_command,
 
 
1591
        self.checker_command = unicode(value)
 
1114
1593
    # CheckerRunning - property
 
1115
1594
    @dbus_service_property(_interface, signature="b",
 
 
1487
2004
    def __init__(self, server_address, RequestHandlerClass,
 
1488
2005
                 interface=None, use_ipv6=True, clients=None,
 
1489
 
                 gnutls_priority=None, use_dbus=True):
 
 
2006
                 gnutls_priority=None, use_dbus=True, socketfd=None):
 
1490
2007
        self.enabled = False
 
1491
2008
        self.clients = clients
 
1492
2009
        if self.clients is None:
 
1493
 
            self.clients = set()
 
1494
2011
        self.use_dbus = use_dbus
 
1495
2012
        self.gnutls_priority = gnutls_priority
 
1496
2013
        IPv6_TCPServer.__init__(self, server_address,
 
1497
2014
                                RequestHandlerClass,
 
1498
2015
                                interface = interface,
 
1499
 
                                use_ipv6 = use_ipv6)
 
 
2016
                                use_ipv6 = use_ipv6,
 
 
2017
                                socketfd = socketfd)
 
1500
2018
    def server_activate(self):
 
1501
2019
        if self.enabled:
 
1502
2020
            return socketserver.TCPServer.server_activate(self)
 
1503
2022
    def enable(self):
 
1504
2023
        self.enabled = True
 
1505
 
    def add_pipe(self, parent_pipe):
 
 
2025
    def add_pipe(self, parent_pipe, proc):
 
1506
2026
        # Call "handle_ipc" for both data and EOF events
 
1507
2027
        gobject.io_add_watch(parent_pipe.fileno(),
 
1508
2028
                             gobject.IO_IN | gobject.IO_HUP,
 
1509
2029
                             functools.partial(self.handle_ipc,
 
1510
 
                                               parent_pipe = parent_pipe))
 
1512
2034
    def handle_ipc(self, source, condition, parent_pipe=None,
 
1513
 
                   client_object=None):
 
1515
 
            gobject.IO_IN: "IN",   # There is data to read.
 
1516
 
            gobject.IO_OUT: "OUT", # Data can be written (without
 
1518
 
            gobject.IO_PRI: "PRI", # There is urgent data to read.
 
1519
 
            gobject.IO_ERR: "ERR", # Error condition.
 
1520
 
            gobject.IO_HUP: "HUP"  # Hung up (the connection has been
 
1521
 
                                    # broken, usually for pipes and
 
1524
 
        conditions_string = ' | '.join(name
 
1526
 
                                       condition_names.iteritems()
 
1527
 
                                       if cond & condition)
 
1528
 
        # error or the other end of multiprocessing.Pipe has closed
 
1529
 
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
 
2035
                   proc = None, client_object=None):
 
 
2036
        # error, or the other end of multiprocessing.Pipe has closed
 
 
2037
        if condition & (gobject.IO_ERR | gobject.IO_HUP):
 
 
2038
            # Wait for other process to exit
 
1532
2042
        # Read a request from the child
 
 
1537
2047
            fpr = request[1]
 
1538
2048
            address = request[2]
 
1540
 
            for c in self.clients:
 
 
2050
            for c in self.clients.itervalues():
 
1541
2051
                if c.fingerprint == fpr:
 
1545
 
                logger.warning("Client not found for fingerprint: %s, ad"
 
1546
 
                               "dress: %s", fpr, address)
 
 
2055
                logger.info("Client not found for fingerprint: %s, ad"
 
 
2056
                            "dress: %s", fpr, address)
 
1547
2057
                if self.use_dbus:
 
1548
2058
                    # Emit D-Bus signal
 
1549
 
                    mandos_dbus_service.ClientNotFound(fpr, address[0])
 
 
2059
                    mandos_dbus_service.ClientNotFound(fpr,
 
1550
2061
                parent_pipe.send(False)
 
1553
2064
            gobject.io_add_watch(parent_pipe.fileno(),
 
1554
2065
                                 gobject.IO_IN | gobject.IO_HUP,
 
1555
2066
                                 functools.partial(self.handle_ipc,
 
1556
 
                                                   parent_pipe = parent_pipe,
 
1557
 
                                                   client_object = client))
 
1558
2072
            parent_pipe.send(True)
 
1559
 
            # remove the old hook in favor of the new above hook on same fileno
 
 
2073
            # remove the old hook in favor of the new above hook on
 
1561
2076
        if command == 'funcall':
 
1562
2077
            funcname = request[1]
 
1563
2078
            args = request[2]
 
1564
2079
            kwargs = request[3]
 
1566
 
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
 
2081
            parent_pipe.send(('data', getattr(client_object,
 
1568
2085
        if command == 'getattr':
 
1569
2086
            attrname = request[1]
 
1570
2087
            if callable(client_object.__getattribute__(attrname)):
 
1571
2088
                parent_pipe.send(('function',))
 
1573
 
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
 
2090
                parent_pipe.send(('data', client_object
 
 
2091
                                  .__getattribute__(attrname)))
 
1575
2093
        if command == 'setattr':
 
1576
2094
            attrname = request[1]
 
1577
2095
            value = request[2]
 
1578
2096
            setattr(client_object, attrname, value)
 
 
2101
def rfc3339_duration_to_delta(duration):
 
 
2102
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
 
2104
    >>> rfc3339_duration_to_delta("P7D")
 
 
2105
    datetime.timedelta(7)
 
 
2106
    >>> rfc3339_duration_to_delta("PT60S")
 
 
2107
    datetime.timedelta(0, 60)
 
 
2108
    >>> rfc3339_duration_to_delta("PT60M")
 
 
2109
    datetime.timedelta(0, 3600)
 
 
2110
    >>> rfc3339_duration_to_delta("PT24H")
 
 
2111
    datetime.timedelta(1)
 
 
2112
    >>> rfc3339_duration_to_delta("P1W")
 
 
2113
    datetime.timedelta(7)
 
 
2114
    >>> rfc3339_duration_to_delta("PT5M30S")
 
 
2115
    datetime.timedelta(0, 330)
 
 
2116
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
 
2117
    datetime.timedelta(1, 200)
 
 
2120
    # Parsing an RFC 3339 duration with regular expressions is not
 
 
2121
    # possible - there would have to be multiple places for the same
 
 
2122
    # values, like seconds.  The current code, while more esoteric, is
 
 
2123
    # cleaner without depending on a parsing library.  If Python had a
 
 
2124
    # built-in library for parsing we would use it, but we'd like to
 
 
2125
    # avoid excessive use of external libraries.
 
 
2127
    # New type for defining tokens, syntax, and semantics all-in-one
 
 
2128
    Token = collections.namedtuple("Token",
 
 
2129
                                   ("regexp", # To match token; if
 
 
2130
                                              # "value" is not None,
 
 
2131
                                              # must have a "group"
 
 
2133
                                    "value",  # datetime.timedelta or
 
 
2135
                                    "followers")) # Tokens valid after
 
 
2137
    # RFC 3339 "duration" tokens, syntax, and semantics; taken from
 
 
2138
    # the "duration" ABNF definition in RFC 3339, Appendix A.
 
 
2139
    token_end = Token(re.compile(r"$"), None, frozenset())
 
 
2140
    token_second = Token(re.compile(r"(\d+)S"),
 
 
2141
                         datetime.timedelta(seconds=1),
 
 
2142
                         frozenset((token_end,)))
 
 
2143
    token_minute = Token(re.compile(r"(\d+)M"),
 
 
2144
                         datetime.timedelta(minutes=1),
 
 
2145
                         frozenset((token_second, token_end)))
 
 
2146
    token_hour = Token(re.compile(r"(\d+)H"),
 
 
2147
                       datetime.timedelta(hours=1),
 
 
2148
                       frozenset((token_minute, token_end)))
 
 
2149
    token_time = Token(re.compile(r"T"),
 
 
2151
                       frozenset((token_hour, token_minute,
 
 
2153
    token_day = Token(re.compile(r"(\d+)D"),
 
 
2154
                      datetime.timedelta(days=1),
 
 
2155
                      frozenset((token_time, token_end)))
 
 
2156
    token_month = Token(re.compile(r"(\d+)M"),
 
 
2157
                        datetime.timedelta(weeks=4),
 
 
2158
                        frozenset((token_day, token_end)))
 
 
2159
    token_year = Token(re.compile(r"(\d+)Y"),
 
 
2160
                       datetime.timedelta(weeks=52),
 
 
2161
                       frozenset((token_month, token_end)))
 
 
2162
    token_week = Token(re.compile(r"(\d+)W"),
 
 
2163
                       datetime.timedelta(weeks=1),
 
 
2164
                       frozenset((token_end,)))
 
 
2165
    token_duration = Token(re.compile(r"P"), None,
 
 
2166
                           frozenset((token_year, token_month,
 
 
2167
                                      token_day, token_time,
 
 
2169
    # Define starting values
 
 
2170
    value = datetime.timedelta() # Value so far
 
 
2172
    followers = frozenset((token_duration,)) # Following valid tokens
 
 
2173
    s = duration                # String left to parse
 
 
2174
    # Loop until end token is found
 
 
2175
    while found_token is not token_end:
 
 
2176
        # Search for any currently valid tokens
 
 
2177
        for token in followers:
 
 
2178
            match = token.regexp.match(s)
 
 
2179
            if match is not None:
 
 
2181
                if token.value is not None:
 
 
2182
                    # Value found, parse digits
 
 
2183
                    factor = int(match.group(1), 10)
 
 
2184
                    # Add to value so far
 
 
2185
                    value += factor * token.value
 
 
2186
                # Strip token from string
 
 
2187
                s = token.regexp.sub("", s, 1)
 
 
2190
                # Set valid next tokens
 
 
2191
                followers = found_token.followers
 
 
2194
            # No currently valid tokens were found
 
 
2195
            raise ValueError("Invalid RFC 3339 duration")
 
1583
2200
def string_to_delta(interval):
 
1584
2201
    """Parse a string and return a datetime.timedelta
 
 
1731
2350
    # Convert the SafeConfigParser object to a dict
 
1732
2351
    server_settings = server_config.defaults()
 
1733
2352
    # Use the appropriate methods on the non-string config options
 
1734
 
    for option in ("debug", "use_dbus", "use_ipv6"):
 
 
2353
    for option in ("debug", "use_dbus", "use_ipv6", "foreground"):
 
1735
2354
        server_settings[option] = server_config.getboolean("DEFAULT",
 
1737
2356
    if server_settings["port"]:
 
1738
2357
        server_settings["port"] = server_config.getint("DEFAULT",
 
 
2359
    if server_settings["socket"]:
 
 
2360
        server_settings["socket"] = server_config.getint("DEFAULT",
 
 
2362
        # Later, stdin will, and stdout and stderr might, be dup'ed
 
 
2363
        # over with an opened os.devnull.  But we don't want this to
 
 
2364
        # happen with a supplied network socket.
 
 
2365
        if 0 <= server_settings["socket"] <= 2:
 
 
2366
            server_settings["socket"] = os.dup(server_settings
 
1740
2368
    del server_config
 
1742
2370
    # Override the settings from the config file with command line
 
1743
2371
    # options, if set.
 
1744
2372
    for option in ("interface", "address", "port", "debug",
 
1745
2373
                   "priority", "servicename", "configdir",
 
1746
 
                   "use_dbus", "use_ipv6", "debuglevel"):
 
 
2374
                   "use_dbus", "use_ipv6", "debuglevel", "restore",
 
 
2375
                   "statedir", "socket", "foreground", "zeroconf"):
 
1747
2376
        value = getattr(options, option)
 
1748
2377
        if value is not None:
 
1749
2378
            server_settings[option] = value
 
1751
2380
    # Force all strings to be unicode
 
1752
2381
    for option in server_settings.keys():
 
1753
 
        if type(server_settings[option]) is str:
 
1754
 
            server_settings[option] = unicode(server_settings[option])
 
 
2382
        if isinstance(server_settings[option], bytes):
 
 
2383
            server_settings[option] = (server_settings[option]
 
 
2385
    # Force all boolean options to be boolean
 
 
2386
    for option in ("debug", "use_dbus", "use_ipv6", "restore",
 
 
2387
                   "foreground", "zeroconf"):
 
 
2388
        server_settings[option] = bool(server_settings[option])
 
 
2389
    # Debug implies foreground
 
 
2390
    if server_settings["debug"]:
 
 
2391
        server_settings["foreground"] = True
 
1755
2392
    # Now we have our good server settings in "server_settings"
 
1757
2394
    ##################################################################
 
 
2396
    if (not server_settings["zeroconf"] and
 
 
2397
        not (server_settings["port"]
 
 
2398
             or server_settings["socket"] != "")):
 
 
2399
            parser.error("Needs port or socket to work without"
 
1759
2402
    # For convenience
 
1760
2403
    debug = server_settings["debug"]
 
1761
2404
    debuglevel = server_settings["debuglevel"]
 
1762
2405
    use_dbus = server_settings["use_dbus"]
 
1763
2406
    use_ipv6 = server_settings["use_ipv6"]
 
 
2407
    stored_state_path = os.path.join(server_settings["statedir"],
 
 
2409
    foreground = server_settings["foreground"]
 
 
2410
    zeroconf = server_settings["zeroconf"]
 
 
2413
        initlogger(debug, logging.DEBUG)
 
 
2418
            level = getattr(logging, debuglevel.upper())
 
 
2419
            initlogger(debug, level)
 
1765
2421
    if server_settings["servicename"] != "Mandos":
 
1766
2422
        syslogger.setFormatter(logging.Formatter
 
1767
 
                               ('Mandos (%s) [%%(process)d]:'
 
1768
 
                                ' %%(levelname)s: %%(message)s'
 
1769
 
                                % server_settings["servicename"]))
 
 
2423
                               ('Mandos ({}) [%(process)d]:'
 
 
2424
                                ' %(levelname)s: %(message)s'
 
 
2425
                                .format(server_settings
 
1771
2428
    # Parse config file with clients
 
1772
 
    client_defaults = { "timeout": "1h",
 
1774
 
                        "checker": "fping -q -- %%(host)s",
 
1776
 
                        "approval_delay": "0s",
 
1777
 
                        "approval_duration": "1s",
 
1779
 
    client_config = configparser.SafeConfigParser(client_defaults)
 
 
2429
    client_config = configparser.SafeConfigParser(Client
 
1780
2431
    client_config.read(os.path.join(server_settings["configdir"],
 
1781
2432
                                    "clients.conf"))
 
1783
2434
    global mandos_dbus_service
 
1784
2435
    mandos_dbus_service = None
 
 
2438
    if server_settings["socket"] != "":
 
 
2439
        socketfd = server_settings["socket"]
 
1786
2440
    tcp_server = MandosServer((server_settings["address"],
 
1787
2441
                               server_settings["port"]),
 
 
1843
2490
         .gnutls_global_set_log_function(debug_gnutls))
 
1845
2492
        # Redirect stdin so all checkers get /dev/null
 
1846
 
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
 
2493
        null = os.open(os.devnull, os.O_NOCTTY | os.O_RDWR)
 
1847
2494
        os.dup2(null, sys.stdin.fileno())
 
1851
 
        # No console logging
 
1852
 
        logger.removeHandler(console)
 
1854
2498
    # Need to fork before connecting to D-Bus
 
1856
2500
        # Close all input and output, do double fork, etc.
 
 
2503
    # multiprocessing will use threads, so before we use gobject we
 
 
2504
    # need to inform gobject that threads will be used.
 
 
2505
    gobject.threads_init()
 
1859
2507
    global main_loop
 
1860
2508
    # From the Avahi example code
 
1861
 
    DBusGMainLoop(set_as_default=True )
 
 
2509
    DBusGMainLoop(set_as_default=True)
 
1862
2510
    main_loop = gobject.MainLoop()
 
1863
2511
    bus = dbus.SystemBus()
 
1864
2512
    # End of Avahi example code
 
1867
 
            bus_name = dbus.service.BusName("se.bsnet.fukt.Mandos",
 
 
2515
            bus_name = dbus.service.BusName("se.recompile.Mandos",
 
1868
2516
                                            bus, do_not_queue=True)
 
1869
 
        except dbus.exceptions.NameExistsException, e:
 
1870
 
            logger.error(unicode(e) + ", disabling D-Bus")
 
 
2517
            old_bus_name = (dbus.service.BusName
 
 
2518
                            ("se.bsnet.fukt.Mandos", bus,
 
 
2520
        except dbus.exceptions.NameExistsException as e:
 
 
2521
            logger.error("Disabling D-Bus:", exc_info=e)
 
1871
2522
            use_dbus = False
 
1872
2523
            server_settings["use_dbus"] = False
 
1873
2524
            tcp_server.use_dbus = False
 
1874
 
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
1875
 
    service = AvahiService(name = server_settings["servicename"],
 
1876
 
                           servicetype = "_mandos._tcp",
 
1877
 
                           protocol = protocol, bus = bus)
 
1878
 
    if server_settings["interface"]:
 
1879
 
        service.interface = (if_nametoindex
 
1880
 
                             (str(server_settings["interface"])))
 
 
2526
        protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
 
2527
        service = AvahiServiceToSyslog(name =
 
 
2528
                                       server_settings["servicename"],
 
 
2529
                                       servicetype = "_mandos._tcp",
 
 
2530
                                       protocol = protocol, bus = bus)
 
 
2531
        if server_settings["interface"]:
 
 
2532
            service.interface = (if_nametoindex
 
 
2533
                                 (server_settings["interface"]
 
1882
2536
    global multiprocessing_manager
 
1883
2537
    multiprocessing_manager = multiprocessing.Manager()
 
 
1885
2539
    client_class = Client
 
1887
2541
        client_class = functools.partial(ClientDBus, bus = bus)
 
1888
 
    def client_config_items(config, section):
 
1889
 
        special_settings = {
 
1890
 
            "approved_by_default":
 
1891
 
                lambda: config.getboolean(section,
 
1892
 
                                          "approved_by_default"),
 
1894
 
        for name, value in config.items(section):
 
 
2543
    client_settings = Client.config_parser(client_config)
 
 
2544
    old_client_settings = {}
 
 
2547
    # This is used to redirect stdout and stderr for checker processes
 
 
2549
    wnull = open(os.devnull, "w") # A writable /dev/null
 
 
2550
    # Only used if server is running in foreground but not in debug
 
 
2552
    if debug or not foreground:
 
 
2555
    # Get client data and settings from last running state.
 
 
2556
    if server_settings["restore"]:
 
 
2558
            with open(stored_state_path, "rb") as stored_state:
 
 
2559
                clients_data, old_client_settings = (pickle.load
 
 
2561
            os.remove(stored_state_path)
 
 
2562
        except IOError as e:
 
 
2563
            if e.errno == errno.ENOENT:
 
 
2564
                logger.warning("Could not load persistent state: {}"
 
 
2565
                                .format(os.strerror(e.errno)))
 
 
2567
                logger.critical("Could not load persistent state:",
 
 
2570
        except EOFError as e:
 
 
2571
            logger.warning("Could not load persistent state: "
 
 
2572
                           "EOFError:", exc_info=e)
 
 
2574
    with PGPEngine() as pgp:
 
 
2575
        for client_name, client in clients_data.items():
 
 
2576
            # Skip removed clients
 
 
2577
            if client_name not in client_settings:
 
 
2580
            # Decide which value to use after restoring saved state.
 
 
2581
            # We have three different values: Old config file,
 
 
2582
            # new config file, and saved state.
 
 
2583
            # New config value takes precedence if it differs from old
 
 
2584
            # config value, otherwise use saved state.
 
 
2585
            for name, value in client_settings[client_name].items():
 
 
2587
                    # For each value in new config, check if it
 
 
2588
                    # differs from the old config value (Except for
 
 
2589
                    # the "secret" attribute)
 
 
2590
                    if (name != "secret" and
 
 
2591
                        value != old_client_settings[client_name]
 
 
2593
                        client[name] = value
 
 
2597
            # Clients who has passed its expire date can still be
 
 
2598
            # enabled if its last checker was successful.  Clients
 
 
2599
            # whose checker succeeded before we stored its state is
 
 
2600
            # assumed to have successfully run all checkers during
 
 
2602
            if client["enabled"]:
 
 
2603
                if datetime.datetime.utcnow() >= client["expires"]:
 
 
2604
                    if not client["last_checked_ok"]:
 
 
2606
                            "disabling client {} - Client never "
 
 
2607
                            "performed a successful checker"
 
 
2608
                            .format(client_name))
 
 
2609
                        client["enabled"] = False
 
 
2610
                    elif client["last_checker_status"] != 0:
 
 
2612
                            "disabling client {} - Client last"
 
 
2613
                            " checker failed with error code {}"
 
 
2614
                            .format(client_name,
 
 
2615
                                    client["last_checker_status"]))
 
 
2616
                        client["enabled"] = False
 
 
2618
                        client["expires"] = (datetime.datetime
 
 
2620
                                             + client["timeout"])
 
 
2621
                        logger.debug("Last checker succeeded,"
 
 
2622
                                     " keeping {} enabled"
 
 
2623
                                     .format(client_name))
 
1896
 
                yield (name, special_settings[name]())
 
1900
 
    tcp_server.clients.update(set(
 
1901
 
            client_class(name = section,
 
1902
 
                         config= dict(client_config_items(
 
1903
 
                        client_config, section)))
 
1904
 
            for section in client_config.sections()))
 
 
2625
                client["secret"] = (
 
 
2626
                    pgp.decrypt(client["encrypted_secret"],
 
 
2627
                                client_settings[client_name]
 
 
2630
                # If decryption fails, we use secret from new settings
 
 
2631
                logger.debug("Failed to decrypt {} old secret"
 
 
2632
                             .format(client_name))
 
 
2633
                client["secret"] = (
 
 
2634
                    client_settings[client_name]["secret"])
 
 
2636
    # Add/remove clients based on new changes made to config
 
 
2637
    for client_name in (set(old_client_settings)
 
 
2638
                        - set(client_settings)):
 
 
2639
        del clients_data[client_name]
 
 
2640
    for client_name in (set(client_settings)
 
 
2641
                        - set(old_client_settings)):
 
 
2642
        clients_data[client_name] = client_settings[client_name]
 
 
2644
    # Create all client objects
 
 
2645
    for client_name, client in clients_data.items():
 
 
2646
        tcp_server.clients[client_name] = client_class(
 
 
2647
            name = client_name, settings = client,
 
 
2648
            server_settings = server_settings)
 
1905
2650
    if not tcp_server.clients:
 
1906
2651
        logger.warning("No clients defined")
 
1912
 
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
1915
 
            logger.error("Could not write to file %r with PID %d",
 
1918
 
            # "pidfile" was never created
 
 
2654
        if pidfile is not None:
 
 
2658
                    pidfile.write("{}\n".format(pid).encode("utf-8"))
 
 
2660
                logger.error("Could not write to file %r with PID %d",
 
1920
2663
        del pidfilename
 
1922
 
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1924
2665
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
1925
2666
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
 
1928
 
        class MandosDBusService(dbus.service.Object):
 
 
2669
        @alternate_dbus_interfaces({"se.recompile.Mandos":
 
 
2670
                                        "se.bsnet.fukt.Mandos"})
 
 
2671
        class MandosDBusService(DBusObjectWithProperties):
 
1929
2672
            """A D-Bus proxy object"""
 
1930
2673
            def __init__(self):
 
1931
2674
                dbus.service.Object.__init__(self, bus, "/")
 
1932
 
            _interface = "se.bsnet.fukt.Mandos"
 
 
2675
            _interface = "se.recompile.Mandos"
 
 
2677
            @dbus_interface_annotations(_interface)
 
 
2679
                return { "org.freedesktop.DBus.Property"
 
 
2680
                         ".EmitsChangedSignal":
 
1934
2683
            @dbus.service.signal(_interface, signature="o")
 
1935
2684
            def ClientAdded(self, objpath):
 
 
1983
2733
        "Cleanup function; run on exit"
 
 
2737
        multiprocessing.active_children()
 
 
2739
        if not (tcp_server.clients or client_settings):
 
 
2742
        # Store client before exiting. Secrets are encrypted with key
 
 
2743
        # based on what config file has. If config file is
 
 
2744
        # removed/edited, old secret will thus be unrecovable.
 
 
2746
        with PGPEngine() as pgp:
 
 
2747
            for client in tcp_server.clients.itervalues():
 
 
2748
                key = client_settings[client.name]["secret"]
 
 
2749
                client.encrypted_secret = pgp.encrypt(client.secret,
 
 
2753
                # A list of attributes that can not be pickled
 
 
2755
                exclude = { "bus", "changedstate", "secret",
 
 
2756
                            "checker", "server_settings" }
 
 
2757
                for name, typ in (inspect.getmembers
 
 
2758
                                  (dbus.service.Object)):
 
 
2761
                client_dict["encrypted_secret"] = (client
 
 
2763
                for attr in client.client_structure:
 
 
2764
                    if attr not in exclude:
 
 
2765
                        client_dict[attr] = getattr(client, attr)
 
 
2767
                clients[client.name] = client_dict
 
 
2768
                del client_settings[client.name]["secret"]
 
 
2771
            with (tempfile.NamedTemporaryFile
 
 
2772
                  (mode='wb', suffix=".pickle", prefix='clients-',
 
 
2773
                   dir=os.path.dirname(stored_state_path),
 
 
2774
                   delete=False)) as stored_state:
 
 
2775
                pickle.dump((clients, client_settings), stored_state)
 
 
2776
                tempname=stored_state.name
 
 
2777
            os.rename(tempname, stored_state_path)
 
 
2778
        except (IOError, OSError) as e:
 
 
2784
            if e.errno in (errno.ENOENT, errno.EACCES, errno.EEXIST):
 
 
2785
                logger.warning("Could not save persistent state: {}"
 
 
2786
                               .format(os.strerror(e.errno)))
 
 
2788
                logger.warning("Could not save persistent state:",
 
 
2792
        # Delete all clients, and settings from config
 
1986
2793
        while tcp_server.clients:
 
1987
 
            client = tcp_server.clients.pop()
 
 
2794
            name, client = tcp_server.clients.popitem()
 
1989
2796
                client.remove_from_connection()
 
1990
 
            client.disable_hook = None
 
1991
2797
            # Don't signal anything except ClientRemoved
 
1992
2798
            client.disable(quiet=True)
 
1994
2800
                # Emit D-Bus signal
 
1995
 
                mandos_dbus_service.ClientRemoved(client.dbus_object_path,
 
 
2801
                mandos_dbus_service.ClientRemoved(client
 
 
2804
        client_settings.clear()
 
1998
2806
    atexit.register(cleanup)
 
2000
 
    for client in tcp_server.clients:
 
 
2808
    for client in tcp_server.clients.itervalues():
 
2002
2810
            # Emit D-Bus signal
 
2003
2811
            mandos_dbus_service.ClientAdded(client.dbus_object_path)
 
 
2812
        # Need to initiate checking of clients
 
 
2814
            client.init_checker()
 
2006
2816
    tcp_server.enable()
 
2007
2817
    tcp_server.server_activate()
 
2009
2819
    # Find out what port we got
 
2010
 
    service.port = tcp_server.socket.getsockname()[1]
 
 
2821
        service.port = tcp_server.socket.getsockname()[1]
 
2012
2823
        logger.info("Now listening on address %r, port %d,"
 
2013
 
                    " flowinfo %d, scope_id %d"
 
2014
 
                    % tcp_server.socket.getsockname())
 
 
2824
                    " flowinfo %d, scope_id %d",
 
 
2825
                    *tcp_server.socket.getsockname())
 
2016
 
        logger.info("Now listening on address %r, port %d"
 
2017
 
                    % tcp_server.socket.getsockname())
 
 
2827
        logger.info("Now listening on address %r, port %d",
 
 
2828
                    *tcp_server.socket.getsockname())
 
2019
2830
    #service.interface = tcp_server.socket.getsockname()[3]
 
2022
 
        # From the Avahi example code
 
2025
 
        except dbus.exceptions.DBusException, error:
 
2026
 
            logger.critical("DBusException: %s", error)
 
2029
 
        # End of Avahi example code
 
 
2834
            # From the Avahi example code
 
 
2837
            except dbus.exceptions.DBusException as error:
 
 
2838
                logger.critical("D-Bus Exception", exc_info=error)
 
 
2841
            # End of Avahi example code
 
2031
2843
        gobject.io_add_watch(tcp_server.fileno(), gobject.IO_IN,
 
2032
2844
                             lambda *args, **kwargs: