2
 
# -*- mode: python; after-save-hook: (lambda () (let ((command (if (fboundp 'file-local-name) (file-local-name (buffer-file-name)) (or (file-remote-p (buffer-file-name) 'localname) (buffer-file-name))))) (if (= (progn (if (get-buffer "*Test*") (kill-buffer "*Test*")) (process-file-shell-command (format "%s --check" (shell-quote-argument command)) nil "*Test*")) 0) (let ((w (get-buffer-window "*Test*"))) (if w (delete-window w))) (progn (with-current-buffer "*Test*" (compilation-mode)) (display-buffer "*Test*" '(display-buffer-in-side-window)))))); coding: utf-8 -*-
 
 
2
# -*- mode: python; coding: utf-8 -*-
 
4
4
# Mandos server - give out binary blobs to connecting clients.
 
6
6
# This program is partly derived from an example program for an Avahi
 
7
7
# service publisher, downloaded from
 
8
8
# <http://avahi.org/wiki/PythonPublishExample>.  This includes the
 
9
9
# methods "add", "remove", "server_state_changed",
 
10
10
# "entry_group_state_changed", "cleanup", and "activate" in the
 
11
11
# "AvahiService" class, and some lines in "main".
 
13
13
# Everything else is
 
14
 
# Copyright © 2008-2020 Teddy Hogeborn
 
15
 
# Copyright © 2008-2020 Björn Påhlsson
 
17
 
# This file is part of Mandos.
 
19
 
# Mandos is free software: you can redistribute it and/or modify it
 
20
 
# under the terms of the GNU General Public License as published by
 
 
14
# Copyright © 2008-2016 Teddy Hogeborn
 
 
15
# Copyright © 2008-2016 Björn Påhlsson
 
 
17
# This program is free software: you can redistribute it and/or modify
 
 
18
# it under the terms of the GNU General Public License as published by
 
21
19
# the Free Software Foundation, either version 3 of the License, or
 
22
20
# (at your option) any later version.
 
24
 
#     Mandos is distributed in the hope that it will be useful, but
 
25
 
#     WITHOUT ANY WARRANTY; without even the implied warranty of
 
 
22
#     This program is distributed in the hope that it will be useful,
 
 
23
#     but WITHOUT ANY WARRANTY; without even the implied warranty of
 
26
24
#     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
27
25
#     GNU General Public License for more details.
 
29
27
# You should have received a copy of the GNU General Public License
 
30
 
# along with Mandos.  If not, see <http://www.gnu.org/licenses/>.
 
 
28
# along with this program.  If not, see
 
 
29
# <http://www.gnu.org/licenses/>.
 
32
31
# Contact the authors at <mandos@recompile.se>.
 
35
34
from __future__ import (division, absolute_import, print_function,
 
 
276
246
                                     '--passphrase-file',
 
278
248
                                    + self.gnupgargs,
 
279
 
                                    stdin=subprocess.PIPE,
 
280
 
                                    stdout=subprocess.PIPE,
 
281
 
                                    stderr=subprocess.PIPE)
 
282
 
            ciphertext, err = proc.communicate(input=data)
 
 
249
                                    stdin = subprocess.PIPE,
 
 
250
                                    stdout = subprocess.PIPE,
 
 
251
                                    stderr = subprocess.PIPE)
 
 
252
            ciphertext, err = proc.communicate(input = data)
 
283
253
        if proc.returncode != 0:
 
284
254
            raise PGPError(err)
 
285
255
        return ciphertext
 
287
257
    def decrypt(self, data, password):
 
288
258
        passphrase = self.password_encode(password)
 
289
259
        with tempfile.NamedTemporaryFile(
 
290
 
                dir=self.tempdir) as passfile:
 
 
260
                dir = self.tempdir) as passfile:
 
291
261
            passfile.write(passphrase)
 
293
263
            proc = subprocess.Popen([self.gpg, '--decrypt',
 
294
264
                                     '--passphrase-file',
 
296
266
                                    + self.gnupgargs,
 
297
 
                                    stdin=subprocess.PIPE,
 
298
 
                                    stdout=subprocess.PIPE,
 
299
 
                                    stderr=subprocess.PIPE)
 
300
 
            decrypted_plaintext, err = proc.communicate(input=data)
 
 
267
                                    stdin = subprocess.PIPE,
 
 
268
                                    stdout = subprocess.PIPE,
 
 
269
                                    stderr = subprocess.PIPE)
 
 
270
            decrypted_plaintext, err = proc.communicate(input = data)
 
301
271
        if proc.returncode != 0:
 
302
272
            raise PGPError(err)
 
303
273
        return decrypted_plaintext
 
306
275
# Pretend that we have an Avahi module
 
308
 
    """This isn't so much a class as it is a module-like namespace."""
 
309
 
    IF_UNSPEC = -1               # avahi-common/address.h
 
310
 
    PROTO_UNSPEC = -1            # avahi-common/address.h
 
311
 
    PROTO_INET = 0               # avahi-common/address.h
 
312
 
    PROTO_INET6 = 1              # avahi-common/address.h
 
 
277
    """This isn't so much a class as it is a module-like namespace.
 
 
278
    It is instantiated once, and simulates having an Avahi module."""
 
 
279
    IF_UNSPEC = -1              # avahi-common/address.h
 
 
280
    PROTO_UNSPEC = -1           # avahi-common/address.h
 
 
281
    PROTO_INET = 0              # avahi-common/address.h
 
 
282
    PROTO_INET6 = 1             # avahi-common/address.h
 
313
283
    DBUS_NAME = "org.freedesktop.Avahi"
 
314
284
    DBUS_INTERFACE_ENTRY_GROUP = DBUS_NAME + ".EntryGroup"
 
315
285
    DBUS_INTERFACE_SERVER = DBUS_NAME + ".Server"
 
316
286
    DBUS_PATH_SERVER = "/"
 
319
 
    def string_array_to_txt_array(t):
 
 
287
    def string_array_to_txt_array(self, t):
 
320
288
        return dbus.Array((dbus.ByteArray(s.encode("utf-8"))
 
321
289
                           for s in t), signature="ay")
 
322
 
    ENTRY_GROUP_ESTABLISHED = 2  # avahi-common/defs.h
 
323
 
    ENTRY_GROUP_COLLISION = 3    # avahi-common/defs.h
 
324
 
    ENTRY_GROUP_FAILURE = 4      # avahi-common/defs.h
 
325
 
    SERVER_INVALID = 0           # avahi-common/defs.h
 
326
 
    SERVER_REGISTERING = 1       # avahi-common/defs.h
 
327
 
    SERVER_RUNNING = 2           # avahi-common/defs.h
 
328
 
    SERVER_COLLISION = 3         # avahi-common/defs.h
 
329
 
    SERVER_FAILURE = 4           # avahi-common/defs.h
 
 
290
    ENTRY_GROUP_ESTABLISHED = 2 # avahi-common/defs.h
 
 
291
    ENTRY_GROUP_COLLISION = 3   # avahi-common/defs.h
 
 
292
    ENTRY_GROUP_FAILURE = 4     # avahi-common/defs.h
 
 
293
    SERVER_INVALID = 0          # avahi-common/defs.h
 
 
294
    SERVER_REGISTERING = 1      # avahi-common/defs.h
 
 
295
    SERVER_RUNNING = 2          # avahi-common/defs.h
 
 
296
    SERVER_COLLISION = 3        # avahi-common/defs.h
 
 
297
    SERVER_FAILURE = 4          # avahi-common/defs.h
 
332
300
class AvahiError(Exception):
 
333
301
    def __init__(self, value, *args, **kwargs):
 
 
524
492
class AvahiServiceToSyslog(AvahiService):
 
525
493
    def rename(self, *args, **kwargs):
 
526
494
        """Add the new name to the syslog messages"""
 
527
 
        ret = super(AvahiServiceToSyslog, self).rename(*args, **kwargs)
 
 
495
        ret = AvahiService.rename(self, *args, **kwargs)
 
528
496
        syslogger.setFormatter(logging.Formatter(
 
529
497
            'Mandos ({}) [%(process)d]: %(levelname)s: %(message)s'
 
530
498
            .format(self.name)))
 
534
501
# Pretend that we have a GnuTLS module
 
536
 
    """This isn't so much a class as it is a module-like namespace."""
 
538
 
    library = ctypes.util.find_library("gnutls")
 
540
 
        library = ctypes.util.find_library("gnutls-deb0")
 
541
 
    _library = ctypes.cdll.LoadLibrary(library)
 
 
502
class GnuTLS(object):
 
 
503
    """This isn't so much a class as it is a module-like namespace.
 
 
504
    It is instantiated once, and simulates having a GnuTLS module."""
 
 
506
    _library = ctypes.cdll.LoadLibrary(
 
 
507
        ctypes.util.find_library("gnutls"))
 
 
508
    _need_version = b"3.3.0"
 
 
510
        # Need to use class name "GnuTLS" here, since this method is
 
 
511
        # called before the assignment to the "gnutls" global variable
 
 
513
        if GnuTLS.check_version(self._need_version) is None:
 
 
514
            raise GnuTLS.Error("Needs GnuTLS {} or later"
 
 
515
                               .format(self._need_version))
 
544
517
    # Unless otherwise indicated, the constants and types below are
 
545
518
    # all from the gnutls/gnutls.h C header file.
 
549
522
    E_INTERRUPTED = -52
 
555
527
    CRD_CERTIFICATE = 1
 
556
528
    E_NO_CERTIFICATE_FOUND = -49
 
561
 
    KEYID_USE_SHA256 = 1        # gnutls/x509.h
 
562
529
    OPENPGP_FMT_RAW = 0         # gnutls/openpgp.h
 
565
532
    class session_int(ctypes.Structure):
 
567
534
    session_t = ctypes.POINTER(session_int)
 
569
535
    class certificate_credentials_st(ctypes.Structure):
 
571
537
    certificate_credentials_t = ctypes.POINTER(
 
572
538
        certificate_credentials_st)
 
573
539
    certificate_type_t = ctypes.c_int
 
575
540
    class datum_t(ctypes.Structure):
 
576
541
        _fields_ = [('data', ctypes.POINTER(ctypes.c_ubyte)),
 
577
542
                    ('size', ctypes.c_uint)]
 
579
543
    class openpgp_crt_int(ctypes.Structure):
 
581
545
    openpgp_crt_t = ctypes.POINTER(openpgp_crt_int)
 
582
 
    openpgp_crt_fmt_t = ctypes.c_int  # gnutls/openpgp.h
 
 
546
    openpgp_crt_fmt_t = ctypes.c_int # gnutls/openpgp.h
 
583
547
    log_func = ctypes.CFUNCTYPE(None, ctypes.c_int, ctypes.c_char_p)
 
584
548
    credentials_type_t = ctypes.c_int
 
585
549
    transport_ptr_t = ctypes.c_void_p
 
586
550
    close_request_t = ctypes.c_int
 
589
553
    class Error(Exception):
 
590
 
        def __init__(self, message=None, code=None, args=()):
 
 
554
        # We need to use the class name "GnuTLS" here, since this
 
 
555
        # exception might be raised from within GnuTLS.__init__,
 
 
556
        # which is called before the assignment to the "gnutls"
 
 
557
        # global variable has happened.
 
 
558
        def __init__(self, message = None, code = None, args=()):
 
591
559
            # Default usage is by a message string, but if a return
 
592
560
            # code is passed, convert it to a string with
 
593
561
            # gnutls.strerror()
 
595
563
            if message is None and code is not None:
 
596
 
                message = gnutls.strerror(code)
 
597
 
            return super(gnutls.Error, self).__init__(
 
 
564
                message = GnuTLS.strerror(code)
 
 
565
            return super(GnuTLS.Error, self).__init__(
 
600
568
    class CertificateSecurityError(Error):
 
 
572
    class Credentials(object):
 
605
573
        def __init__(self):
 
606
574
            self._c_object = gnutls.certificate_credentials_t()
 
607
575
            gnutls.certificate_allocate_credentials(
 
608
576
                ctypes.byref(self._c_object))
 
609
577
            self.type = gnutls.CRD_CERTIFICATE
 
611
579
        def __del__(self):
 
612
580
            gnutls.certificate_free_credentials(self._c_object)
 
615
 
        def __init__(self, socket, credentials=None):
 
 
582
    class ClientSession(object):
 
 
583
        def __init__(self, socket, credentials = None):
 
616
584
            self._c_object = gnutls.session_t()
 
617
 
            gnutls_flags = gnutls.CLIENT
 
618
 
            if gnutls.check_version(b"3.5.6"):
 
619
 
                gnutls_flags |= gnutls.NO_TICKETS
 
621
 
                gnutls_flags |= gnutls.ENABLE_RAWPK
 
622
 
            gnutls.init(ctypes.byref(self._c_object), gnutls_flags)
 
 
585
            gnutls.init(ctypes.byref(self._c_object), gnutls.CLIENT)
 
624
586
            gnutls.set_default_priority(self._c_object)
 
625
587
            gnutls.transport_set_ptr(self._c_object, socket.fileno())
 
626
588
            gnutls.handshake_set_private_extensions(self._c_object,
 
 
668
630
                return _error_code(result)
 
669
631
            result = func(*arguments)
 
672
634
    # Unless otherwise indicated, the function declarations below are
 
673
635
    # all from the gnutls/gnutls.h C header file.
 
676
638
    priority_set_direct = _library.gnutls_priority_set_direct
 
677
639
    priority_set_direct.argtypes = [session_t, ctypes.c_char_p,
 
678
640
                                    ctypes.POINTER(ctypes.c_char_p)]
 
679
641
    priority_set_direct.restype = _error_code
 
681
643
    init = _library.gnutls_init
 
682
644
    init.argtypes = [ctypes.POINTER(session_t), ctypes.c_int]
 
683
645
    init.restype = _error_code
 
685
647
    set_default_priority = _library.gnutls_set_default_priority
 
686
648
    set_default_priority.argtypes = [session_t]
 
687
649
    set_default_priority.restype = _error_code
 
689
651
    record_send = _library.gnutls_record_send
 
690
652
    record_send.argtypes = [session_t, ctypes.c_void_p,
 
692
654
    record_send.restype = ctypes.c_ssize_t
 
693
655
    record_send.errcheck = _retry_on_error
 
695
657
    certificate_allocate_credentials = (
 
696
658
        _library.gnutls_certificate_allocate_credentials)
 
697
659
    certificate_allocate_credentials.argtypes = [
 
698
660
        ctypes.POINTER(certificate_credentials_t)]
 
699
661
    certificate_allocate_credentials.restype = _error_code
 
701
663
    certificate_free_credentials = (
 
702
664
        _library.gnutls_certificate_free_credentials)
 
703
 
    certificate_free_credentials.argtypes = [
 
704
 
        certificate_credentials_t]
 
 
665
    certificate_free_credentials.argtypes = [certificate_credentials_t]
 
705
666
    certificate_free_credentials.restype = None
 
707
668
    handshake_set_private_extensions = (
 
708
669
        _library.gnutls_handshake_set_private_extensions)
 
709
670
    handshake_set_private_extensions.argtypes = [session_t,
 
711
672
    handshake_set_private_extensions.restype = None
 
713
674
    credentials_set = _library.gnutls_credentials_set
 
714
675
    credentials_set.argtypes = [session_t, credentials_type_t,
 
716
677
    credentials_set.restype = _error_code
 
718
679
    strerror = _library.gnutls_strerror
 
719
680
    strerror.argtypes = [ctypes.c_int]
 
720
681
    strerror.restype = ctypes.c_char_p
 
722
683
    certificate_type_get = _library.gnutls_certificate_type_get
 
723
684
    certificate_type_get.argtypes = [session_t]
 
724
685
    certificate_type_get.restype = _error_code
 
726
687
    certificate_get_peers = _library.gnutls_certificate_get_peers
 
727
688
    certificate_get_peers.argtypes = [session_t,
 
728
689
                                      ctypes.POINTER(ctypes.c_uint)]
 
729
690
    certificate_get_peers.restype = ctypes.POINTER(datum_t)
 
731
692
    global_set_log_level = _library.gnutls_global_set_log_level
 
732
693
    global_set_log_level.argtypes = [ctypes.c_int]
 
733
694
    global_set_log_level.restype = None
 
735
696
    global_set_log_function = _library.gnutls_global_set_log_function
 
736
697
    global_set_log_function.argtypes = [log_func]
 
737
698
    global_set_log_function.restype = None
 
739
700
    deinit = _library.gnutls_deinit
 
740
701
    deinit.argtypes = [session_t]
 
741
702
    deinit.restype = None
 
743
704
    handshake = _library.gnutls_handshake
 
744
705
    handshake.argtypes = [session_t]
 
745
706
    handshake.restype = _error_code
 
746
707
    handshake.errcheck = _retry_on_error
 
748
709
    transport_set_ptr = _library.gnutls_transport_set_ptr
 
749
710
    transport_set_ptr.argtypes = [session_t, transport_ptr_t]
 
750
711
    transport_set_ptr.restype = None
 
752
713
    bye = _library.gnutls_bye
 
753
714
    bye.argtypes = [session_t, close_request_t]
 
754
715
    bye.restype = _error_code
 
755
716
    bye.errcheck = _retry_on_error
 
757
718
    check_version = _library.gnutls_check_version
 
758
719
    check_version.argtypes = [ctypes.c_char_p]
 
759
720
    check_version.restype = ctypes.c_char_p
 
761
 
    _need_version = b"3.3.0"
 
762
 
    if check_version(_need_version) is None:
 
763
 
        raise self.Error("Needs GnuTLS {} or later"
 
764
 
                         .format(_need_version))
 
766
 
    _tls_rawpk_version = b"3.6.6"
 
767
 
    has_rawpk = bool(check_version(_tls_rawpk_version))
 
771
 
        class pubkey_st(ctypes.Structure):
 
773
 
        pubkey_t = ctypes.POINTER(pubkey_st)
 
775
 
        x509_crt_fmt_t = ctypes.c_int
 
777
 
        # All the function declarations below are from gnutls/abstract.h
 
778
 
        pubkey_init = _library.gnutls_pubkey_init
 
779
 
        pubkey_init.argtypes = [ctypes.POINTER(pubkey_t)]
 
780
 
        pubkey_init.restype = _error_code
 
782
 
        pubkey_import = _library.gnutls_pubkey_import
 
783
 
        pubkey_import.argtypes = [pubkey_t, ctypes.POINTER(datum_t),
 
785
 
        pubkey_import.restype = _error_code
 
787
 
        pubkey_get_key_id = _library.gnutls_pubkey_get_key_id
 
788
 
        pubkey_get_key_id.argtypes = [pubkey_t, ctypes.c_int,
 
789
 
                                      ctypes.POINTER(ctypes.c_ubyte),
 
790
 
                                      ctypes.POINTER(ctypes.c_size_t)]
 
791
 
        pubkey_get_key_id.restype = _error_code
 
793
 
        pubkey_deinit = _library.gnutls_pubkey_deinit
 
794
 
        pubkey_deinit.argtypes = [pubkey_t]
 
795
 
        pubkey_deinit.restype = None
 
797
 
        # All the function declarations below are from gnutls/openpgp.h
 
799
 
        openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
800
 
        openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
801
 
        openpgp_crt_init.restype = _error_code
 
803
 
        openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
804
 
        openpgp_crt_import.argtypes = [openpgp_crt_t,
 
805
 
                                       ctypes.POINTER(datum_t),
 
807
 
        openpgp_crt_import.restype = _error_code
 
809
 
        openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
 
810
 
        openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
 
811
 
                                            ctypes.POINTER(ctypes.c_uint)]
 
812
 
        openpgp_crt_verify_self.restype = _error_code
 
814
 
        openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
815
 
        openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
816
 
        openpgp_crt_deinit.restype = None
 
818
 
        openpgp_crt_get_fingerprint = (
 
819
 
            _library.gnutls_openpgp_crt_get_fingerprint)
 
820
 
        openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
824
 
        openpgp_crt_get_fingerprint.restype = _error_code
 
826
 
    if check_version(b"3.6.4"):
 
827
 
        certificate_type_get2 = _library.gnutls_certificate_type_get2
 
828
 
        certificate_type_get2.argtypes = [session_t, ctypes.c_int]
 
829
 
        certificate_type_get2.restype = _error_code
 
 
722
    # All the function declarations below are from gnutls/openpgp.h
 
 
724
    openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
 
725
    openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
 
726
    openpgp_crt_init.restype = _error_code
 
 
728
    openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
 
729
    openpgp_crt_import.argtypes = [openpgp_crt_t,
 
 
730
                                   ctypes.POINTER(datum_t),
 
 
732
    openpgp_crt_import.restype = _error_code
 
 
734
    openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
 
 
735
    openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
 
 
736
                                        ctypes.POINTER(ctypes.c_uint)]
 
 
737
    openpgp_crt_verify_self.restype = _error_code
 
 
739
    openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
 
740
    openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
 
741
    openpgp_crt_deinit.restype = None
 
 
743
    openpgp_crt_get_fingerprint = (
 
 
744
        _library.gnutls_openpgp_crt_get_fingerprint)
 
 
745
    openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
 
749
    openpgp_crt_get_fingerprint.restype = _error_code
 
831
751
    # Remove non-public functions
 
832
752
    del _error_code, _retry_on_error
 
 
753
# Create the global "gnutls" object, simulating a module
 
835
756
def call_pipe(connection,       # : multiprocessing.Connection
 
836
757
              func, *args, **kwargs):
 
837
758
    """This function is meant to be called by multiprocessing.Process
 
839
760
    This function runs func(*args, **kwargs), and writes the resulting
 
840
761
    return value on the provided multiprocessing.Connection.
 
842
763
    connection.send(func(*args, **kwargs))
 
843
764
    connection.close()
 
 
766
class Client(object):
 
847
767
    """A representation of a client host served by this server.
 
850
770
    approved:   bool(); 'None' if not yet approved/disapproved
 
851
771
    approval_delay: datetime.timedelta(); Time to wait for approval
 
852
772
    approval_duration: datetime.timedelta(); Duration of one approval
 
853
 
    checker: multiprocessing.Process(); a running checker process used
 
854
 
             to see if the client lives. 'None' if no process is
 
 
773
    checker:    subprocess.Popen(); a running checker process used
 
 
774
                                    to see if the client lives.
 
 
775
                                    'None' if no process is running.
 
856
776
    checker_callback_tag: a GLib event source tag, or None
 
857
777
    checker_command: string; External command which is run to check
 
858
778
                     if client lives.  %() expansions are done at
 
 
1535
1447
                         exc_info=error)
 
1536
1448
        return xmlstring
 
1540
1451
    dbus.OBJECT_MANAGER_IFACE
 
1541
1452
except AttributeError:
 
1542
1453
    dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
 
1545
1455
class DBusObjectWithObjectManager(DBusObjectWithAnnotations):
 
1546
1456
    """A D-Bus object with an ObjectManager.
 
1548
1458
    Classes inheriting from this exposes the standard
 
1549
1459
    GetManagedObjects call and the InterfacesAdded and
 
1550
1460
    InterfacesRemoved signals on the standard
 
1551
1461
    "org.freedesktop.DBus.ObjectManager" interface.
 
1553
1463
    Note: No signals are sent automatically; they must be sent
 
1556
1466
    @dbus.service.method(dbus.OBJECT_MANAGER_IFACE,
 
1557
 
                         out_signature="a{oa{sa{sv}}}")
 
 
1467
                         out_signature = "a{oa{sa{sv}}}")
 
1558
1468
    def GetManagedObjects(self):
 
1559
1469
        """This function must be overridden"""
 
1560
1470
        raise NotImplementedError()
 
1562
1472
    @dbus.service.signal(dbus.OBJECT_MANAGER_IFACE,
 
1563
 
                         signature="oa{sa{sv}}")
 
 
1473
                         signature = "oa{sa{sv}}")
 
1564
1474
    def InterfacesAdded(self, object_path, interfaces_and_properties):
 
1567
 
    @dbus.service.signal(dbus.OBJECT_MANAGER_IFACE, signature="oas")
 
 
1477
    @dbus.service.signal(dbus.OBJECT_MANAGER_IFACE, signature = "oas")
 
1568
1478
    def InterfacesRemoved(self, object_path, interfaces):
 
1571
1481
    @dbus.service.method(dbus.INTROSPECTABLE_IFACE,
 
1573
 
                         path_keyword='object_path',
 
1574
 
                         connection_keyword='connection')
 
 
1482
                         out_signature = "s",
 
 
1483
                         path_keyword = 'object_path',
 
 
1484
                         connection_keyword = 'connection')
 
1575
1485
    def Introspect(self, object_path, connection):
 
1576
1486
        """Overloading of standard D-Bus method.
 
1578
1488
        Override return argument name of GetManagedObjects to be
 
1579
1489
        "objpath_interfaces_and_properties"
 
 
2522
 
class MultiprocessingMixIn:
 
 
2365
class MultiprocessingMixIn(object):
 
2523
2366
    """Like socketserver.ThreadingMixIn, but with multiprocessing"""
 
2525
2368
    def sub_process_main(self, request, address):
 
2527
2370
            self.finish_request(request, address)
 
2528
2371
        except Exception:
 
2529
2372
            self.handle_error(request, address)
 
2530
2373
        self.close_request(request)
 
2532
2375
    def process_request(self, request, address):
 
2533
2376
        """Start a new process to process the request."""
 
2534
 
        proc = multiprocessing.Process(target=self.sub_process_main,
 
2535
 
                                       args=(request, address))
 
 
2377
        proc = multiprocessing.Process(target = self.sub_process_main,
 
 
2378
                                       args = (request, address))
 
2540
 
class MultiprocessingMixInWithPipe(MultiprocessingMixIn):
 
 
2383
class MultiprocessingMixInWithPipe(MultiprocessingMixIn, object):
 
2541
2384
    """ adds a pipe to the MixIn """
 
2543
2386
    def process_request(self, request, client_address):
 
2544
2387
        """Overrides and wraps the original process_request().
 
2546
2389
        This function creates a new pipe in self.pipe
 
2548
2391
        parent_pipe, self.child_pipe = multiprocessing.Pipe()
 
2550
2393
        proc = MultiprocessingMixIn.process_request(self, request,
 
2551
2394
                                                    client_address)
 
2552
2395
        self.child_pipe.close()
 
2553
2396
        self.add_pipe(parent_pipe, proc)
 
2555
2398
    def add_pipe(self, parent_pipe, proc):
 
2556
2399
        """Dummy function; override as necessary"""
 
2557
2400
        raise NotImplementedError()
 
2560
2403
class IPv6_TCPServer(MultiprocessingMixInWithPipe,
 
2561
 
                     socketserver.TCPServer):
 
 
2404
                     socketserver.TCPServer, object):
 
2562
2405
    """IPv6-capable TCP server.  Accepts 'None' as address and/or port
 
2565
2408
        enabled:        Boolean; whether this server is activated yet
 
2566
2409
        interface:      None or a network interface name (string)
 
2567
2410
        use_ipv6:       Boolean; to use IPv6 or not
 
2570
2413
    def __init__(self, server_address, RequestHandlerClass,
 
2571
2414
                 interface=None,
 
 
2683
2523
        self.gnutls_priority = gnutls_priority
 
2684
2524
        IPv6_TCPServer.__init__(self, server_address,
 
2685
2525
                                RequestHandlerClass,
 
2686
 
                                interface=interface,
 
 
2526
                                interface = interface,
 
 
2527
                                use_ipv6 = use_ipv6,
 
 
2528
                                socketfd = socketfd)
 
2690
2530
    def server_activate(self):
 
2691
2531
        if self.enabled:
 
2692
2532
            return socketserver.TCPServer.server_activate(self)
 
2694
2534
    def enable(self):
 
2695
2535
        self.enabled = True
 
2697
2537
    def add_pipe(self, parent_pipe, proc):
 
2698
2538
        # Call "handle_ipc" for both data and EOF events
 
2699
2539
        GLib.io_add_watch(
 
2700
 
            GLib.IOChannel.unix_new(parent_pipe.fileno()),
 
2701
 
            GLib.PRIORITY_DEFAULT, GLib.IO_IN | GLib.IO_HUP,
 
 
2540
            parent_pipe.fileno(),
 
 
2541
            GLib.IO_IN | GLib.IO_HUP,
 
2702
2542
            functools.partial(self.handle_ipc,
 
2703
 
                              parent_pipe=parent_pipe,
 
 
2543
                              parent_pipe = parent_pipe,
 
2706
2546
    def handle_ipc(self, source, condition,
 
2707
2547
                   parent_pipe=None,
 
2709
2549
                   client_object=None):
 
2710
2550
        # error, or the other end of multiprocessing.Pipe has closed
 
2711
2551
        if condition & (GLib.IO_ERR | GLib.IO_HUP):
 
2712
2552
            # Wait for other process to exit
 
2716
2556
        # Read a request from the child
 
2717
2557
        request = parent_pipe.recv()
 
2718
2558
        command = request[0]
 
2720
2560
        if command == 'init':
 
2721
 
            key_id = request[1].decode("ascii")
 
2722
 
            fpr = request[2].decode("ascii")
 
2723
 
            address = request[3]
 
 
2562
            address = request[2]
 
2725
2564
            for c in self.clients.values():
 
2726
 
                if key_id == "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855":
 
2728
 
                if key_id and c.key_id == key_id:
 
2731
 
                if fpr and c.fingerprint == fpr:
 
 
2565
                if c.fingerprint == fpr:
 
2735
 
                logger.info("Client not found for key ID: %s, address"
 
2736
 
                            ": %s", key_id or fpr, address)
 
 
2569
                logger.info("Client not found for fingerprint: %s, ad"
 
 
2570
                            "dress: %s", fpr, address)
 
2737
2571
                if self.use_dbus:
 
2738
2572
                    # Emit D-Bus signal
 
2739
 
                    mandos_dbus_service.ClientNotFound(key_id or fpr,
 
 
2573
                    mandos_dbus_service.ClientNotFound(fpr,
 
2741
2575
                parent_pipe.send(False)
 
2744
2578
            GLib.io_add_watch(
 
2745
 
                GLib.IOChannel.unix_new(parent_pipe.fileno()),
 
2746
 
                GLib.PRIORITY_DEFAULT, GLib.IO_IN | GLib.IO_HUP,
 
 
2579
                parent_pipe.fileno(),
 
 
2580
                GLib.IO_IN | GLib.IO_HUP,
 
2747
2581
                functools.partial(self.handle_ipc,
 
2748
 
                                  parent_pipe=parent_pipe,
 
2750
 
                                  client_object=client))
 
 
2582
                                  parent_pipe = parent_pipe,
 
 
2584
                                  client_object = client))
 
2751
2585
            parent_pipe.send(True)
 
2752
2586
            # remove the old hook in favor of the new above hook on
 
 
2756
2590
            funcname = request[1]
 
2757
2591
            args = request[2]
 
2758
2592
            kwargs = request[3]
 
2760
2594
            parent_pipe.send(('data', getattr(client_object,
 
2761
2595
                                              funcname)(*args,
 
2764
2598
        if command == 'getattr':
 
2765
2599
            attrname = request[1]
 
2766
2600
            if isinstance(client_object.__getattribute__(attrname),
 
2767
 
                          collections.abc.Callable):
 
 
2601
                          collections.Callable):
 
2768
2602
                parent_pipe.send(('function', ))
 
2770
2604
                parent_pipe.send((
 
2771
2605
                    'data', client_object.__getattribute__(attrname)))
 
2773
2607
        if command == 'setattr':
 
2774
2608
            attrname = request[1]
 
2775
2609
            value = request[2]
 
2776
2610
            setattr(client_object, attrname, value)
 
2781
2615
def rfc3339_duration_to_delta(duration):
 
2782
2616
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
2784
 
    >>> rfc3339_duration_to_delta("P7D") == datetime.timedelta(7)
 
2786
 
    >>> rfc3339_duration_to_delta("PT60S") == datetime.timedelta(0, 60)
 
2788
 
    >>> rfc3339_duration_to_delta("PT60M") == datetime.timedelta(0, 3600)
 
2790
 
    >>> rfc3339_duration_to_delta("PT24H") == datetime.timedelta(1)
 
2792
 
    >>> rfc3339_duration_to_delta("P1W") == datetime.timedelta(7)
 
2794
 
    >>> rfc3339_duration_to_delta("PT5M30S") == datetime.timedelta(0, 330)
 
2796
 
    >>> rfc3339_duration_to_delta("P1DT3M20S") == datetime.timedelta(1, 200)
 
 
2618
    >>> rfc3339_duration_to_delta("P7D")
 
 
2619
    datetime.timedelta(7)
 
 
2620
    >>> rfc3339_duration_to_delta("PT60S")
 
 
2621
    datetime.timedelta(0, 60)
 
 
2622
    >>> rfc3339_duration_to_delta("PT60M")
 
 
2623
    datetime.timedelta(0, 3600)
 
 
2624
    >>> rfc3339_duration_to_delta("PT24H")
 
 
2625
    datetime.timedelta(1)
 
 
2626
    >>> rfc3339_duration_to_delta("P1W")
 
 
2627
    datetime.timedelta(7)
 
 
2628
    >>> rfc3339_duration_to_delta("PT5M30S")
 
 
2629
    datetime.timedelta(0, 330)
 
 
2630
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
 
2631
    datetime.timedelta(1, 200)
 
2800
2634
    # Parsing an RFC 3339 duration with regular expressions is not
 
2801
2635
    # possible - there would have to be multiple places for the same
 
2802
2636
    # values, like seconds.  The current code, while more esoteric, is
 
2803
2637
    # cleaner without depending on a parsing library.  If Python had a
 
2804
2638
    # built-in library for parsing we would use it, but we'd like to
 
2805
2639
    # avoid excessive use of external libraries.
 
2807
2641
    # New type for defining tokens, syntax, and semantics all-in-one
 
2808
2642
    Token = collections.namedtuple("Token", (
 
2809
2643
        "regexp",  # To match token; if "value" is not None, must have
 
 
2996
2827
    parser.add_argument("--no-zeroconf", action="store_false",
 
2997
2828
                        dest="zeroconf", help="Do not use Zeroconf",
 
3000
2831
    options = parser.parse_args()
 
 
2835
        fail_count, test_count = doctest.testmod()
 
 
2836
        sys.exit(os.EX_OK if fail_count == 0 else 1)
 
3002
2838
    # Default values for config file for server-global settings
 
3003
 
    if gnutls.has_rawpk:
 
3004
 
        priority = ("SECURE128:!CTYPE-X.509:+CTYPE-RAWPK:!RSA"
 
3005
 
                    ":!VERS-ALL:+VERS-TLS1.3:%PROFILE_ULTRA")
 
3007
 
        priority = ("SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP:!RSA"
 
3008
 
                    ":+SIGN-DSA-SHA256")
 
3009
 
    server_defaults = {"interface": "",
 
3013
 
                       "priority": priority,
 
3014
 
                       "servicename": "Mandos",
 
3020
 
                       "statedir": "/var/lib/mandos",
 
3021
 
                       "foreground": "False",
 
 
2839
    server_defaults = { "interface": "",
 
 
2844
                        "SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP:!RSA"
 
 
2845
                        ":+SIGN-DSA-SHA256",
 
 
2846
                        "servicename": "Mandos",
 
 
2852
                        "statedir": "/var/lib/mandos",
 
 
2853
                        "foreground": "False",
 
3026
2857
    # Parse config file for server-global settings
 
3027
 
    server_config = configparser.ConfigParser(server_defaults)
 
 
2858
    server_config = configparser.SafeConfigParser(server_defaults)
 
3028
2859
    del server_defaults
 
3029
2860
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
 
3030
 
    # Convert the ConfigParser object to a dict
 
 
2861
    # Convert the SafeConfigParser object to a dict
 
3031
2862
    server_settings = server_config.defaults()
 
3032
2863
    # Use the appropriate methods on the non-string config options
 
3033
 
    for option in ("debug", "use_dbus", "use_ipv6", "restore",
 
3034
 
                   "foreground", "zeroconf"):
 
 
2864
    for option in ("debug", "use_dbus", "use_ipv6", "foreground"):
 
3035
2865
        server_settings[option] = server_config.getboolean("DEFAULT",
 
3037
2867
    if server_settings["port"]:
 
 
3210
3040
        protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
3211
3041
        service = AvahiServiceToSyslog(
 
3212
 
            name=server_settings["servicename"],
 
3213
 
            servicetype="_mandos._tcp",
 
 
3042
            name = server_settings["servicename"],
 
 
3043
            servicetype = "_mandos._tcp",
 
 
3044
            protocol = protocol,
 
3216
3046
        if server_settings["interface"]:
 
3217
3047
            service.interface = if_nametoindex(
 
3218
3048
                server_settings["interface"].encode("utf-8"))
 
3220
3050
    global multiprocessing_manager
 
3221
3051
    multiprocessing_manager = multiprocessing.Manager()
 
3223
3053
    client_class = Client
 
3225
 
        client_class = functools.partial(ClientDBus, bus=bus)
 
 
3055
        client_class = functools.partial(ClientDBus, bus = bus)
 
3227
3057
    client_settings = Client.config_parser(client_config)
 
3228
3058
    old_client_settings = {}
 
3229
3059
    clients_data = {}
 
3231
3061
    # This is used to redirect stdout and stderr for checker processes
 
3233
 
    wnull = open(os.devnull, "w")  # A writable /dev/null
 
 
3063
    wnull = open(os.devnull, "w") # A writable /dev/null
 
3234
3064
    # Only used if server is running in foreground but not in debug
 
3236
3066
    if debug or not foreground:
 
3239
3069
    # Get client data and settings from last running state.
 
3240
3070
    if server_settings["restore"]:
 
3242
3072
            with open(stored_state_path, "rb") as stored_state:
 
3243
 
                if sys.version_info.major == 2:
 
 
3073
                if sys.version_info.major == 2:                
 
3244
3074
                    clients_data, old_client_settings = pickle.load(
 
3247
3077
                    bytes_clients_data, bytes_old_client_settings = (
 
3248
 
                        pickle.load(stored_state, encoding="bytes"))
 
3249
 
                    #   Fix bytes to strings
 
 
3078
                        pickle.load(stored_state, encoding = "bytes"))
 
 
3079
                    ### Fix bytes to strings
 
3252
 
                    clients_data = {(key.decode("utf-8")
 
3253
 
                                     if isinstance(key, bytes)
 
3256
 
                                    bytes_clients_data.items()}
 
 
3082
                    clients_data = { (key.decode("utf-8")
 
 
3083
                                      if isinstance(key, bytes)
 
 
3086
                                     bytes_clients_data.items() }
 
3257
3087
                    del bytes_clients_data
 
3258
3088
                    for key in clients_data:
 
3259
 
                        value = {(k.decode("utf-8")
 
3260
 
                                  if isinstance(k, bytes) else k): v
 
3262
 
                                 clients_data[key].items()}
 
 
3089
                        value = { (k.decode("utf-8")
 
 
3090
                                   if isinstance(k, bytes) else k): v
 
 
3092
                                  clients_data[key].items() }
 
3263
3093
                        clients_data[key] = value
 
3264
3094
                        # .client_structure
 
3265
3095
                        value["client_structure"] = [
 
3266
3096
                            (s.decode("utf-8")
 
3267
3097
                             if isinstance(s, bytes)
 
3268
3098
                             else s) for s in
 
3269
 
                            value["client_structure"]]
 
3270
 
                        # .name, .host, and .checker_command
 
3271
 
                        for k in ("name", "host", "checker_command"):
 
 
3099
                            value["client_structure"] ]
 
 
3101
                        for k in ("name", "host"):
 
3272
3102
                            if isinstance(value[k], bytes):
 
3273
3103
                                value[k] = value[k].decode("utf-8")
 
3274
 
                        if "key_id" not in value:
 
3275
 
                            value["key_id"] = ""
 
3276
 
                        elif "fingerprint" not in value:
 
3277
 
                            value["fingerprint"] = ""
 
3278
 
                    #  old_client_settings
 
 
3104
                    ## old_client_settings
 
3280
3106
                    old_client_settings = {
 
3281
3107
                        (key.decode("utf-8")
 
3282
3108
                         if isinstance(key, bytes)
 
3283
3109
                         else key): value
 
3284
3110
                        for key, value in
 
3285
 
                        bytes_old_client_settings.items()}
 
 
3111
                        bytes_old_client_settings.items() }
 
3286
3112
                    del bytes_old_client_settings
 
3287
 
                    # .host and .checker_command
 
3288
3114
                    for value in old_client_settings.values():
 
3289
 
                        for attribute in ("host", "checker_command"):
 
3290
 
                            if isinstance(value[attribute], bytes):
 
3291
 
                                value[attribute] = (value[attribute]
 
 
3115
                        if isinstance(value["host"], bytes):
 
 
3116
                            value["host"] = (value["host"]
 
3293
3118
            os.remove(stored_state_path)
 
3294
3119
        except IOError as e:
 
3295
3120
            if e.errno == errno.ENOENT: