11
11
# "AvahiService" class, and some lines in "main".
 
13
13
# Everything else is
 
14
 
# Copyright © 2008-2020 Teddy Hogeborn
 
15
 
# Copyright © 2008-2020 Björn Påhlsson
 
17
 
# This file is part of Mandos.
 
19
 
# Mandos is free software: you can redistribute it and/or modify it
 
20
 
# under the terms of the GNU General Public License as published by
 
 
14
# Copyright © 2008-2016 Teddy Hogeborn
 
 
15
# Copyright © 2008-2016 Björn Påhlsson
 
 
17
# This program is free software: you can redistribute it and/or modify
 
 
18
# it under the terms of the GNU General Public License as published by
 
21
19
# the Free Software Foundation, either version 3 of the License, or
 
22
20
# (at your option) any later version.
 
24
 
#     Mandos is distributed in the hope that it will be useful, but
 
25
 
#     WITHOUT ANY WARRANTY; without even the implied warranty of
 
 
22
#     This program is distributed in the hope that it will be useful,
 
 
23
#     but WITHOUT ANY WARRANTY; without even the implied warranty of
 
26
24
#     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
27
25
#     GNU General Public License for more details.
 
29
27
# You should have received a copy of the GNU General Public License
 
30
 
# along with Mandos.  If not, see <http://www.gnu.org/licenses/>.
 
 
28
# along with this program.  If not, see
 
 
29
# <http://www.gnu.org/licenses/>.
 
32
31
# Contact the authors at <mandos@recompile.se>.
 
34
34
from __future__ import (division, absolute_import, print_function,
 
 
451
422
    def entry_group_state_changed(self, state, error):
 
452
423
        """Derived from the Avahi example code"""
 
453
 
        log.debug("Avahi entry group state change: %i", state)
 
 
424
        logger.debug("Avahi entry group state change: %i", state)
 
455
426
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
 
456
 
            log.debug("Zeroconf service established.")
 
 
427
            logger.debug("Zeroconf service established.")
 
457
428
        elif state == avahi.ENTRY_GROUP_COLLISION:
 
458
 
            log.info("Zeroconf service name collision.")
 
 
429
            logger.info("Zeroconf service name collision.")
 
460
431
        elif state == avahi.ENTRY_GROUP_FAILURE:
 
461
 
            log.critical("Avahi: Error in group state changed %s",
 
 
432
            logger.critical("Avahi: Error in group state changed %s",
 
463
434
            raise AvahiGroupError("State changed: {!s}".format(error))
 
465
436
    def cleanup(self):
 
 
523
495
class AvahiServiceToSyslog(AvahiService):
 
524
496
    def rename(self, *args, **kwargs):
 
525
497
        """Add the new name to the syslog messages"""
 
526
 
        ret = super(AvahiServiceToSyslog, self).rename(*args,
 
 
498
        ret = AvahiService.rename(self, *args, **kwargs)
 
528
499
        syslogger.setFormatter(logging.Formatter(
 
529
 
            "Mandos ({}) [%(process)d]: %(levelname)s: %(message)s"
 
 
500
            'Mandos ({}) [%(process)d]: %(levelname)s: %(message)s'
 
530
501
            .format(self.name)))
 
534
505
# Pretend that we have a GnuTLS module
 
536
 
    """This isn't so much a class as it is a module-like namespace."""
 
 
506
class GnuTLS(object):
 
 
507
    """This isn't so much a class as it is a module-like namespace.
 
 
508
    It is instantiated once, and simulates having a GnuTLS module."""
 
538
510
    library = ctypes.util.find_library("gnutls")
 
539
511
    if library is None:
 
540
512
        library = ctypes.util.find_library("gnutls-deb0")
 
541
513
    _library = ctypes.cdll.LoadLibrary(library)
 
 
515
    _need_version = b"3.3.0"
 
 
518
        # Need to use "self" here, since this method is called before
 
 
519
        # the assignment to the "gnutls" global variable happens.
 
 
520
        if self.check_version(self._need_version) is None:
 
 
521
            raise self.Error("Needs GnuTLS {} or later"
 
 
522
                             .format(self._need_version))
 
544
524
    # Unless otherwise indicated, the constants and types below are
 
545
525
    # all from the gnutls/gnutls.h C header file.
 
 
589
563
    class Error(Exception):
 
 
564
        # We need to use the class name "GnuTLS" here, since this
 
 
565
        # exception might be raised from within GnuTLS.__init__,
 
 
566
        # which is called before the assignment to the "gnutls"
 
 
567
        # global variable has happened.
 
590
568
        def __init__(self, message=None, code=None, args=()):
 
591
569
            # Default usage is by a message string, but if a return
 
592
570
            # code is passed, convert it to a string with
 
593
571
            # gnutls.strerror()
 
595
573
            if message is None and code is not None:
 
596
 
                message = gnutls.strerror(code).decode(
 
597
 
                    "utf-8", errors="replace")
 
598
 
            return super(gnutls.Error, self).__init__(
 
 
574
                message = GnuTLS.strerror(code)
 
 
575
            return super(GnuTLS.Error, self).__init__(
 
601
578
    class CertificateSecurityError(Error):
 
605
 
        def __init__(self, cls):
 
608
 
        def from_param(self, obj):
 
609
 
            if not isinstance(obj, self.cls):
 
610
 
                raise TypeError("Not of type {}: {!r}"
 
611
 
                                .format(self.cls.__name__, obj))
 
612
 
            return ctypes.byref(obj.from_param(obj))
 
614
 
    class CastToVoidPointer:
 
615
 
        def __init__(self, cls):
 
618
 
        def from_param(self, obj):
 
619
 
            if not isinstance(obj, self.cls):
 
620
 
                raise TypeError("Not of type {}: {!r}"
 
621
 
                                .format(self.cls.__name__, obj))
 
622
 
            return ctypes.cast(obj.from_param(obj), ctypes.c_void_p)
 
624
 
    class With_from_param:
 
626
 
        def from_param(cls, obj):
 
627
 
            return obj._as_parameter_
 
630
 
    class Credentials(With_from_param):
 
 
582
    class Credentials(object):
 
631
583
        def __init__(self):
 
632
 
            self._as_parameter_ = gnutls.certificate_credentials_t()
 
633
 
            gnutls.certificate_allocate_credentials(self)
 
 
584
            self._c_object = gnutls.certificate_credentials_t()
 
 
585
            gnutls.certificate_allocate_credentials(
 
 
586
                ctypes.byref(self._c_object))
 
634
587
            self.type = gnutls.CRD_CERTIFICATE
 
636
589
        def __del__(self):
 
637
 
            gnutls.certificate_free_credentials(self)
 
 
590
            gnutls.certificate_free_credentials(self._c_object)
 
639
 
    class ClientSession(With_from_param):
 
 
592
    class ClientSession(object):
 
640
593
        def __init__(self, socket, credentials=None):
 
641
 
            self._as_parameter_ = gnutls.session_t()
 
642
 
            gnutls_flags = gnutls.CLIENT
 
643
 
            if gnutls.check_version(b"3.5.6"):
 
644
 
                gnutls_flags |= gnutls.NO_TICKETS
 
646
 
                gnutls_flags |= gnutls.ENABLE_RAWPK
 
647
 
            gnutls.init(self, gnutls_flags)
 
649
 
            gnutls.set_default_priority(self)
 
650
 
            gnutls.transport_set_ptr(self, socket.fileno())
 
651
 
            gnutls.handshake_set_private_extensions(self, True)
 
 
594
            self._c_object = gnutls.session_t()
 
 
595
            gnutls.init(ctypes.byref(self._c_object), gnutls.CLIENT)
 
 
596
            gnutls.set_default_priority(self._c_object)
 
 
597
            gnutls.transport_set_ptr(self._c_object, socket.fileno())
 
 
598
            gnutls.handshake_set_private_extensions(self._c_object,
 
652
600
            self.socket = socket
 
653
601
            if credentials is None:
 
654
602
                credentials = gnutls.Credentials()
 
655
 
            gnutls.credentials_set(self, credentials.type,
 
 
603
            gnutls.credentials_set(self._c_object, credentials.type,
 
 
604
                                   ctypes.cast(credentials._c_object,
 
657
606
            self.credentials = credentials
 
659
608
        def __del__(self):
 
 
609
            gnutls.deinit(self._c_object)
 
662
611
        def handshake(self):
 
663
 
            return gnutls.handshake(self)
 
 
612
            return gnutls.handshake(self._c_object)
 
665
614
        def send(self, data):
 
666
615
            data = bytes(data)
 
667
616
            data_len = len(data)
 
668
617
            while data_len > 0:
 
669
 
                data_len -= gnutls.record_send(self, data[-data_len:],
 
 
618
                data_len -= gnutls.record_send(self._c_object,
 
673
 
            return gnutls.bye(self, gnutls.SHUT_RDWR)
 
 
623
            return gnutls.bye(self._c_object, gnutls.SHUT_RDWR)
 
675
625
    # Error handling functions
 
676
626
    def _error_code(result):
 
677
627
        """A function to raise exceptions on errors, suitable
 
678
 
        for the "restype" attribute on ctypes functions"""
 
679
 
        if result >= gnutls.E_SUCCESS:
 
 
628
        for the 'restype' attribute on ctypes functions"""
 
681
631
        if result == gnutls.E_NO_CERTIFICATE_FOUND:
 
682
632
            raise gnutls.CertificateSecurityError(code=result)
 
683
633
        raise gnutls.Error(code=result)
 
685
 
    def _retry_on_error(result, func, arguments,
 
686
 
                        _error_code=_error_code):
 
 
635
    def _retry_on_error(result, func, arguments):
 
687
636
        """A function to retry on some errors, suitable
 
688
 
        for the "errcheck" attribute on ctypes functions"""
 
689
 
        while result < gnutls.E_SUCCESS:
 
 
637
        for the 'errcheck' attribute on ctypes functions"""
 
690
639
            if result not in (gnutls.E_INTERRUPTED, gnutls.E_AGAIN):
 
691
640
                return _error_code(result)
 
692
641
            result = func(*arguments)
 
 
699
648
    priority_set_direct = _library.gnutls_priority_set_direct
 
700
 
    priority_set_direct.argtypes = [ClientSession, ctypes.c_char_p,
 
 
649
    priority_set_direct.argtypes = [session_t, ctypes.c_char_p,
 
701
650
                                    ctypes.POINTER(ctypes.c_char_p)]
 
702
651
    priority_set_direct.restype = _error_code
 
704
653
    init = _library.gnutls_init
 
705
 
    init.argtypes = [PointerTo(ClientSession), ctypes.c_int]
 
 
654
    init.argtypes = [ctypes.POINTER(session_t), ctypes.c_int]
 
706
655
    init.restype = _error_code
 
708
657
    set_default_priority = _library.gnutls_set_default_priority
 
709
 
    set_default_priority.argtypes = [ClientSession]
 
 
658
    set_default_priority.argtypes = [session_t]
 
710
659
    set_default_priority.restype = _error_code
 
712
661
    record_send = _library.gnutls_record_send
 
713
 
    record_send.argtypes = [ClientSession, ctypes.c_void_p,
 
 
662
    record_send.argtypes = [session_t, ctypes.c_void_p,
 
715
664
    record_send.restype = ctypes.c_ssize_t
 
716
665
    record_send.errcheck = _retry_on_error
 
 
718
667
    certificate_allocate_credentials = (
 
719
668
        _library.gnutls_certificate_allocate_credentials)
 
720
669
    certificate_allocate_credentials.argtypes = [
 
721
 
        PointerTo(Credentials)]
 
 
670
        ctypes.POINTER(certificate_credentials_t)]
 
722
671
    certificate_allocate_credentials.restype = _error_code
 
724
673
    certificate_free_credentials = (
 
725
674
        _library.gnutls_certificate_free_credentials)
 
726
 
    certificate_free_credentials.argtypes = [Credentials]
 
 
675
    certificate_free_credentials.argtypes = [
 
 
676
        certificate_credentials_t]
 
727
677
    certificate_free_credentials.restype = None
 
729
679
    handshake_set_private_extensions = (
 
730
680
        _library.gnutls_handshake_set_private_extensions)
 
731
 
    handshake_set_private_extensions.argtypes = [ClientSession,
 
 
681
    handshake_set_private_extensions.argtypes = [session_t,
 
733
683
    handshake_set_private_extensions.restype = None
 
735
685
    credentials_set = _library.gnutls_credentials_set
 
736
 
    credentials_set.argtypes = [ClientSession, credentials_type_t,
 
737
 
                                CastToVoidPointer(Credentials)]
 
 
686
    credentials_set.argtypes = [session_t, credentials_type_t,
 
738
688
    credentials_set.restype = _error_code
 
740
690
    strerror = _library.gnutls_strerror
 
 
759
709
    global_set_log_function.restype = None
 
761
711
    deinit = _library.gnutls_deinit
 
762
 
    deinit.argtypes = [ClientSession]
 
 
712
    deinit.argtypes = [session_t]
 
763
713
    deinit.restype = None
 
765
715
    handshake = _library.gnutls_handshake
 
766
 
    handshake.argtypes = [ClientSession]
 
767
 
    handshake.restype = ctypes.c_int
 
 
716
    handshake.argtypes = [session_t]
 
 
717
    handshake.restype = _error_code
 
768
718
    handshake.errcheck = _retry_on_error
 
770
720
    transport_set_ptr = _library.gnutls_transport_set_ptr
 
771
 
    transport_set_ptr.argtypes = [ClientSession, transport_ptr_t]
 
 
721
    transport_set_ptr.argtypes = [session_t, transport_ptr_t]
 
772
722
    transport_set_ptr.restype = None
 
774
724
    bye = _library.gnutls_bye
 
775
 
    bye.argtypes = [ClientSession, close_request_t]
 
776
 
    bye.restype = ctypes.c_int
 
 
725
    bye.argtypes = [session_t, close_request_t]
 
 
726
    bye.restype = _error_code
 
777
727
    bye.errcheck = _retry_on_error
 
779
729
    check_version = _library.gnutls_check_version
 
780
730
    check_version.argtypes = [ctypes.c_char_p]
 
781
731
    check_version.restype = ctypes.c_char_p
 
783
 
    _need_version = b"3.3.0"
 
784
 
    if check_version(_need_version) is None:
 
785
 
        raise self.Error("Needs GnuTLS {} or later"
 
786
 
                         .format(_need_version))
 
788
 
    _tls_rawpk_version = b"3.6.6"
 
789
 
    has_rawpk = bool(check_version(_tls_rawpk_version))
 
793
 
        class pubkey_st(ctypes.Structure):
 
795
 
        pubkey_t = ctypes.POINTER(pubkey_st)
 
797
 
        x509_crt_fmt_t = ctypes.c_int
 
799
 
        # All the function declarations below are from
 
801
 
        pubkey_init = _library.gnutls_pubkey_init
 
802
 
        pubkey_init.argtypes = [ctypes.POINTER(pubkey_t)]
 
803
 
        pubkey_init.restype = _error_code
 
805
 
        pubkey_import = _library.gnutls_pubkey_import
 
806
 
        pubkey_import.argtypes = [pubkey_t, ctypes.POINTER(datum_t),
 
808
 
        pubkey_import.restype = _error_code
 
810
 
        pubkey_get_key_id = _library.gnutls_pubkey_get_key_id
 
811
 
        pubkey_get_key_id.argtypes = [pubkey_t, ctypes.c_int,
 
812
 
                                      ctypes.POINTER(ctypes.c_ubyte),
 
813
 
                                      ctypes.POINTER(ctypes.c_size_t)]
 
814
 
        pubkey_get_key_id.restype = _error_code
 
816
 
        pubkey_deinit = _library.gnutls_pubkey_deinit
 
817
 
        pubkey_deinit.argtypes = [pubkey_t]
 
818
 
        pubkey_deinit.restype = None
 
820
 
        # All the function declarations below are from
 
823
 
        openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
824
 
        openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
825
 
        openpgp_crt_init.restype = _error_code
 
827
 
        openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
828
 
        openpgp_crt_import.argtypes = [openpgp_crt_t,
 
829
 
                                       ctypes.POINTER(datum_t),
 
831
 
        openpgp_crt_import.restype = _error_code
 
833
 
        openpgp_crt_verify_self = \
 
834
 
            _library.gnutls_openpgp_crt_verify_self
 
835
 
        openpgp_crt_verify_self.argtypes = [
 
838
 
            ctypes.POINTER(ctypes.c_uint),
 
840
 
        openpgp_crt_verify_self.restype = _error_code
 
842
 
        openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
843
 
        openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
844
 
        openpgp_crt_deinit.restype = None
 
846
 
        openpgp_crt_get_fingerprint = (
 
847
 
            _library.gnutls_openpgp_crt_get_fingerprint)
 
848
 
        openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
852
 
        openpgp_crt_get_fingerprint.restype = _error_code
 
854
 
    if check_version(b"3.6.4"):
 
855
 
        certificate_type_get2 = _library.gnutls_certificate_type_get2
 
856
 
        certificate_type_get2.argtypes = [ClientSession, ctypes.c_int]
 
857
 
        certificate_type_get2.restype = _error_code
 
 
733
    # All the function declarations below are from gnutls/openpgp.h
 
 
735
    openpgp_crt_init = _library.gnutls_openpgp_crt_init
 
 
736
    openpgp_crt_init.argtypes = [ctypes.POINTER(openpgp_crt_t)]
 
 
737
    openpgp_crt_init.restype = _error_code
 
 
739
    openpgp_crt_import = _library.gnutls_openpgp_crt_import
 
 
740
    openpgp_crt_import.argtypes = [openpgp_crt_t,
 
 
741
                                   ctypes.POINTER(datum_t),
 
 
743
    openpgp_crt_import.restype = _error_code
 
 
745
    openpgp_crt_verify_self = _library.gnutls_openpgp_crt_verify_self
 
 
746
    openpgp_crt_verify_self.argtypes = [openpgp_crt_t, ctypes.c_uint,
 
 
747
                                        ctypes.POINTER(ctypes.c_uint)]
 
 
748
    openpgp_crt_verify_self.restype = _error_code
 
 
750
    openpgp_crt_deinit = _library.gnutls_openpgp_crt_deinit
 
 
751
    openpgp_crt_deinit.argtypes = [openpgp_crt_t]
 
 
752
    openpgp_crt_deinit.restype = None
 
 
754
    openpgp_crt_get_fingerprint = (
 
 
755
        _library.gnutls_openpgp_crt_get_fingerprint)
 
 
756
    openpgp_crt_get_fingerprint.argtypes = [openpgp_crt_t,
 
 
760
    openpgp_crt_get_fingerprint.restype = _error_code
 
859
762
    # Remove non-public functions
 
860
763
    del _error_code, _retry_on_error
 
 
764
# Create the global "gnutls" object, simulating a module
 
863
768
def call_pipe(connection,       # : multiprocessing.Connection
 
 
1094
993
    def checker_callback(self, source, condition, connection,
 
1096
995
        """The checker has completed, so take appropriate actions."""
 
 
996
        self.checker_callback_tag = None
 
1097
998
        # Read return code from connection (see call_pipe)
 
1098
999
        returncode = connection.recv()
 
1099
1000
        connection.close()
 
1100
 
        if self.checker is not None:
 
1102
 
        self.checker_callback_tag = None
 
1105
1002
        if returncode >= 0:
 
1106
1003
            self.last_checker_status = returncode
 
1107
1004
            self.last_checker_signal = None
 
1108
1005
            if self.last_checker_status == 0:
 
1109
 
                log.info("Checker for %(name)s succeeded", vars(self))
 
 
1006
                logger.info("Checker for %(name)s succeeded",
 
1110
1008
                self.checked_ok()
 
1112
 
                log.info("Checker for %(name)s failed", vars(self))
 
 
1010
                logger.info("Checker for %(name)s failed", vars(self))
 
1114
1012
            self.last_checker_status = -1
 
1115
1013
            self.last_checker_signal = -returncode
 
1116
 
            log.warning("Checker for %(name)s crashed?", vars(self))
 
 
1014
            logger.warning("Checker for %(name)s crashed?",
 
1119
1018
    def checked_ok(self):
 
 
1155
1054
        if self.checker is not None and not self.checker.is_alive():
 
1156
 
            log.warning("Checker was not alive; joining")
 
 
1055
            logger.warning("Checker was not alive; joining")
 
1157
1056
            self.checker.join()
 
1158
1057
            self.checker = None
 
1159
1058
        # Start a new checker if needed
 
1160
1059
        if self.checker is None:
 
1161
1060
            # Escape attributes for the shell
 
1162
1061
            escaped_attrs = {
 
1163
 
                attr: shlex.quote(str(getattr(self, attr)))
 
 
1062
                attr: re.escape(str(getattr(self, attr)))
 
1164
1063
                for attr in self.runtime_expansions}
 
1166
1065
                command = self.checker_command % escaped_attrs
 
1167
1066
            except TypeError as error:
 
1168
 
                log.error('Could not format string "%s"',
 
1169
 
                          self.checker_command, exc_info=error)
 
 
1067
                logger.error('Could not format string "%s"',
 
 
1068
                             self.checker_command,
 
1170
1070
                return True     # Try again later
 
1171
1071
            self.current_checker_command = command
 
1172
 
            log.info("Starting checker %r for %s", command, self.name)
 
 
1072
            logger.info("Starting checker %r for %s", command,
 
1173
1074
            # We don't need to redirect stdout and stderr, since
 
1174
1075
            # in normal mode, that is already done by daemon(),
 
1175
1076
            # and in debug mode we don't want to.  (Stdin is
 
 
2268
 
    def __init__(self, child_pipe, key_id, fpr, address):
 
 
2160
class ProxyClient(object):
 
 
2161
    def __init__(self, child_pipe, fpr, address):
 
2269
2162
        self._pipe = child_pipe
 
2270
 
        self._pipe.send(("init", key_id, fpr, address))
 
 
2163
        self._pipe.send(('init', fpr, address))
 
2271
2164
        if not self._pipe.recv():
 
2272
 
            raise KeyError(key_id or fpr)
 
2274
2167
    def __getattribute__(self, name):
 
2276
2169
            return super(ProxyClient, self).__getattribute__(name)
 
2277
 
        self._pipe.send(("getattr", name))
 
 
2170
        self._pipe.send(('getattr', name))
 
2278
2171
        data = self._pipe.recv()
 
2279
 
        if data[0] == "data":
 
 
2172
        if data[0] == 'data':
 
2281
 
        if data[0] == "function":
 
 
2174
        if data[0] == 'function':
 
2283
2176
            def func(*args, **kwargs):
 
2284
 
                self._pipe.send(("funcall", name, args, kwargs))
 
 
2177
                self._pipe.send(('funcall', name, args, kwargs))
 
2285
2178
                return self._pipe.recv()[1]
 
2289
2182
    def __setattr__(self, name, value):
 
2291
2184
            return super(ProxyClient, self).__setattr__(name, value)
 
2292
 
        self._pipe.send(("setattr", name, value))
 
 
2185
        self._pipe.send(('setattr', name, value))
 
2295
2188
class ClientHandler(socketserver.BaseRequestHandler, object):
 
 
2301
2194
    def handle(self):
 
2302
2195
        with contextlib.closing(self.server.child_pipe) as child_pipe:
 
2303
 
            log.info("TCP connection from: %s",
 
2304
 
                     str(self.client_address))
 
2305
 
            log.debug("Pipe FD: %d", self.server.child_pipe.fileno())
 
 
2196
            logger.info("TCP connection from: %s",
 
 
2197
                        str(self.client_address))
 
 
2198
            logger.debug("Pipe FD: %d",
 
 
2199
                         self.server.child_pipe.fileno())
 
2307
2201
            session = gnutls.ClientSession(self.request)
 
2309
 
            # priority = ":".join(("NONE", "+VERS-TLS1.1",
 
 
2203
            # priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
2310
2204
            #                       "+AES-256-CBC", "+SHA1",
 
2311
2205
            #                       "+COMP-NULL", "+CTYPE-OPENPGP",
 
 
2314
2208
            priority = self.server.gnutls_priority
 
2315
2209
            if priority is None:
 
2316
2210
                priority = "NORMAL"
 
2317
 
            gnutls.priority_set_direct(session,
 
2318
 
                                       priority.encode("utf-8"), None)
 
 
2211
            gnutls.priority_set_direct(session._c_object,
 
 
2212
                                       priority.encode("utf-8"),
 
2320
2215
            # Start communication using the Mandos protocol
 
2321
2216
            # Get protocol number
 
2322
2217
            line = self.request.makefile().readline()
 
2323
 
            log.debug("Protocol version: %r", line)
 
 
2218
            logger.debug("Protocol version: %r", line)
 
2325
2220
                if int(line.strip().split()[0]) > 1:
 
2326
2221
                    raise RuntimeError(line)
 
2327
2222
            except (ValueError, IndexError, RuntimeError) as error:
 
2328
 
                log.error("Unknown protocol version: %s", error)
 
 
2223
                logger.error("Unknown protocol version: %s", error)
 
2331
2226
            # Start GnuTLS connection
 
2333
2228
                session.handshake()
 
2334
2229
            except gnutls.Error as error:
 
2335
 
                log.warning("Handshake failed: %s", error)
 
 
2230
                logger.warning("Handshake failed: %s", error)
 
2336
2231
                # Do not run session.bye() here: the session is not
 
2337
2232
                # established.  Just abandon the request.
 
2339
 
            log.debug("Handshake succeeded")
 
 
2234
            logger.debug("Handshake succeeded")
 
2341
2236
            approval_required = False
 
2343
 
                if gnutls.has_rawpk:
 
2346
 
                        key_id = self.key_id(
 
2347
 
                            self.peer_certificate(session))
 
2348
 
                    except (TypeError, gnutls.Error) as error:
 
2349
 
                        log.warning("Bad certificate: %s", error)
 
2351
 
                    log.debug("Key ID: %s",
 
2352
 
                              key_id.decode("utf-8",
 
2358
 
                        fpr = self.fingerprint(
 
2359
 
                            self.peer_certificate(session))
 
2360
 
                    except (TypeError, gnutls.Error) as error:
 
2361
 
                        log.warning("Bad certificate: %s", error)
 
2363
 
                    log.debug("Fingerprint: %s", fpr)
 
2366
 
                    client = ProxyClient(child_pipe, key_id, fpr,
 
 
2239
                    fpr = self.fingerprint(
 
 
2240
                        self.peer_certificate(session))
 
 
2241
                except (TypeError, gnutls.Error) as error:
 
 
2242
                    logger.warning("Bad certificate: %s", error)
 
 
2244
                logger.debug("Fingerprint: %s", fpr)
 
 
2247
                    client = ProxyClient(child_pipe, fpr,
 
2367
2248
                                         self.client_address)
 
2368
2249
                except KeyError:
 
 
2441
2324
                except gnutls.Error as error:
 
2442
 
                    log.warning("GnuTLS bye failed", exc_info=error)
 
 
2325
                    logger.warning("GnuTLS bye failed",
 
2445
2329
    def peer_certificate(session):
 
2446
 
        "Return the peer's certificate as a bytestring"
 
2448
 
            cert_type = gnutls.certificate_type_get2(
 
2449
 
                session, gnutls.CTYPE_PEERS)
 
2450
 
        except AttributeError:
 
2451
 
            cert_type = gnutls.certificate_type_get(session)
 
2452
 
        if gnutls.has_rawpk:
 
2453
 
            valid_cert_types = frozenset((gnutls.CRT_RAWPK,))
 
2455
 
            valid_cert_types = frozenset((gnutls.CRT_OPENPGP,))
 
2456
 
        # If not a valid certificate type...
 
2457
 
        if cert_type not in valid_cert_types:
 
2458
 
            log.info("Cert type %r not in %r", cert_type,
 
 
2330
        "Return the peer's OpenPGP certificate as a bytestring"
 
 
2331
        # If not an OpenPGP certificate...
 
 
2332
        if (gnutls.certificate_type_get(session._c_object)
 
 
2333
            != gnutls.CRT_OPENPGP):
 
2460
2334
            # ...return invalid data
 
2462
2336
        list_size = ctypes.c_uint(1)
 
2463
2337
        cert_list = (gnutls.certificate_get_peers
 
2464
 
                     (session, ctypes.byref(list_size)))
 
 
2338
                     (session._c_object, ctypes.byref(list_size)))
 
2465
2339
        if not bool(cert_list) and list_size.value != 0:
 
2466
2340
            raise gnutls.Error("error getting peer certificate")
 
2467
2341
        if list_size.value == 0:
 
 
2470
2344
        return ctypes.string_at(cert.data, cert.size)
 
2473
 
    def key_id(certificate):
 
2474
 
        "Convert a certificate bytestring to a hexdigit key ID"
 
2475
 
        # New GnuTLS "datum" with the public key
 
2476
 
        datum = gnutls.datum_t(
 
2477
 
            ctypes.cast(ctypes.c_char_p(certificate),
 
2478
 
                        ctypes.POINTER(ctypes.c_ubyte)),
 
2479
 
            ctypes.c_uint(len(certificate)))
 
2480
 
        # XXX all these need to be created in the gnutls "module"
 
2481
 
        # New empty GnuTLS certificate
 
2482
 
        pubkey = gnutls.pubkey_t()
 
2483
 
        gnutls.pubkey_init(ctypes.byref(pubkey))
 
2484
 
        # Import the raw public key into the certificate
 
2485
 
        gnutls.pubkey_import(pubkey,
 
2486
 
                             ctypes.byref(datum),
 
2487
 
                             gnutls.X509_FMT_DER)
 
2488
 
        # New buffer for the key ID
 
2489
 
        buf = ctypes.create_string_buffer(32)
 
2490
 
        buf_len = ctypes.c_size_t(len(buf))
 
2491
 
        # Get the key ID from the raw public key into the buffer
 
2492
 
        gnutls.pubkey_get_key_id(
 
2494
 
            gnutls.KEYID_USE_SHA256,
 
2495
 
            ctypes.cast(ctypes.byref(buf),
 
2496
 
                        ctypes.POINTER(ctypes.c_ubyte)),
 
2497
 
            ctypes.byref(buf_len))
 
2498
 
        # Deinit the certificate
 
2499
 
        gnutls.pubkey_deinit(pubkey)
 
2501
 
        # Convert the buffer to a Python bytestring
 
2502
 
        key_id = ctypes.string_at(buf, buf_len.value)
 
2503
 
        # Convert the bytestring to hexadecimal notation
 
2504
 
        hex_key_id = binascii.hexlify(key_id).upper()
 
2508
2347
    def fingerprint(openpgp):
 
2509
2348
        "Convert an OpenPGP bytestring to a hexdigit fingerprint"
 
2510
2349
        # New GnuTLS "datum" with the OpenPGP public key
 
 
2646
2484
                    (self.interface + "\0").encode("utf-8"))
 
2647
2485
            except socket.error as error:
 
2648
2486
                if error.errno == errno.EPERM:
 
2649
 
                    log.error("No permission to bind to interface %s",
 
 
2487
                    logger.error("No permission to bind to"
 
 
2488
                                 " interface %s", self.interface)
 
2651
2489
                elif error.errno == errno.ENOPROTOOPT:
 
2652
 
                    log.error("SO_BINDTODEVICE not available; cannot"
 
2653
 
                              " bind to interface %s", self.interface)
 
 
2490
                    logger.error("SO_BINDTODEVICE not available;"
 
 
2491
                                 " cannot bind to interface %s",
 
2654
2493
                elif error.errno == errno.ENODEV:
 
2655
 
                    log.error("Interface %s does not exist, cannot"
 
2656
 
                              " bind", self.interface)
 
 
2494
                    logger.error("Interface %s does not exist,"
 
 
2495
                                 " cannot bind", self.interface)
 
2659
2498
        # Only bind(2) the socket if we really need to.
 
2660
2499
        if self.server_address[0] or self.server_address[1]:
 
2661
 
            if self.server_address[1]:
 
2662
 
                self.allow_reuse_address = True
 
2663
2500
            if not self.server_address[0]:
 
2664
2501
                if self.address_family == socket.AF_INET6:
 
2665
2502
                    any_address = "::"  # in6addr_any
 
 
2738
2575
        request = parent_pipe.recv()
 
2739
2576
        command = request[0]
 
2741
 
        if command == "init":
 
2742
 
            key_id = request[1].decode("ascii")
 
2743
 
            fpr = request[2].decode("ascii")
 
2744
 
            address = request[3]
 
 
2578
        if command == 'init':
 
 
2580
            address = request[2]
 
2746
2582
            for c in self.clients.values():
 
2747
 
                if key_id == ("E3B0C44298FC1C149AFBF4C8996FB924"
 
2748
 
                              "27AE41E4649B934CA495991B7852B855"):
 
2750
 
                if key_id and c.key_id == key_id:
 
2753
 
                if fpr and c.fingerprint == fpr:
 
 
2583
                if c.fingerprint == fpr:
 
2757
 
                log.info("Client not found for key ID: %s, address:"
 
2758
 
                         " %s", key_id or fpr, address)
 
 
2587
                logger.info("Client not found for fingerprint: %s, ad"
 
 
2588
                            "dress: %s", fpr, address)
 
2759
2589
                if self.use_dbus:
 
2760
2590
                    # Emit D-Bus signal
 
2761
 
                    mandos_dbus_service.ClientNotFound(key_id or fpr,
 
 
2591
                    mandos_dbus_service.ClientNotFound(fpr,
 
2763
2593
                parent_pipe.send(False)
 
2766
2596
            GLib.io_add_watch(
 
2767
 
                GLib.IOChannel.unix_new(parent_pipe.fileno()),
 
2768
 
                GLib.PRIORITY_DEFAULT, GLib.IO_IN | GLib.IO_HUP,
 
 
2597
                parent_pipe.fileno(),
 
 
2598
                GLib.IO_IN | GLib.IO_HUP,
 
2769
2599
                functools.partial(self.handle_ipc,
 
2770
2600
                                  parent_pipe=parent_pipe,
 
 
2803
2633
def rfc3339_duration_to_delta(duration):
 
2804
2634
    """Parse an RFC 3339 "duration" and return a datetime.timedelta
 
2806
 
    >>> timedelta = datetime.timedelta
 
2807
 
    >>> rfc3339_duration_to_delta("P7D") == timedelta(7)
 
2809
 
    >>> rfc3339_duration_to_delta("PT60S") == timedelta(0, 60)
 
2811
 
    >>> rfc3339_duration_to_delta("PT60M") == timedelta(0, 3600)
 
2813
 
    >>> rfc3339_duration_to_delta("PT24H") == timedelta(1)
 
2815
 
    >>> rfc3339_duration_to_delta("P1W") == timedelta(7)
 
2817
 
    >>> rfc3339_duration_to_delta("PT5M30S") == timedelta(0, 330)
 
2819
 
    >>> rfc3339_duration_to_delta("P1DT3M20S") == timedelta(1, 200)
 
 
2636
    >>> rfc3339_duration_to_delta("P7D")
 
 
2637
    datetime.timedelta(7)
 
 
2638
    >>> rfc3339_duration_to_delta("PT60S")
 
 
2639
    datetime.timedelta(0, 60)
 
 
2640
    >>> rfc3339_duration_to_delta("PT60M")
 
 
2641
    datetime.timedelta(0, 3600)
 
 
2642
    >>> rfc3339_duration_to_delta("PT24H")
 
 
2643
    datetime.timedelta(1)
 
 
2644
    >>> rfc3339_duration_to_delta("P1W")
 
 
2645
    datetime.timedelta(7)
 
 
2646
    >>> rfc3339_duration_to_delta("PT5M30S")
 
 
2647
    datetime.timedelta(0, 330)
 
 
2648
    >>> rfc3339_duration_to_delta("P1DT3M20S")
 
 
2649
    datetime.timedelta(1, 200)
 
2824
2652
    # Parsing an RFC 3339 duration with regular expressions is not
 
 
2904
2732
def string_to_delta(interval):
 
2905
2733
    """Parse a string and return a datetime.timedelta
 
2907
 
    >>> string_to_delta("7d") == datetime.timedelta(7)
 
2909
 
    >>> string_to_delta("60s") == datetime.timedelta(0, 60)
 
2911
 
    >>> string_to_delta("60m") == datetime.timedelta(0, 3600)
 
2913
 
    >>> string_to_delta("24h") == datetime.timedelta(1)
 
2915
 
    >>> string_to_delta("1w") == datetime.timedelta(7)
 
2917
 
    >>> string_to_delta("5m 30s") == datetime.timedelta(0, 330)
 
 
2735
    >>> string_to_delta('7d')
 
 
2736
    datetime.timedelta(7)
 
 
2737
    >>> string_to_delta('60s')
 
 
2738
    datetime.timedelta(0, 60)
 
 
2739
    >>> string_to_delta('60m')
 
 
2740
    datetime.timedelta(0, 3600)
 
 
2741
    >>> string_to_delta('24h')
 
 
2742
    datetime.timedelta(1)
 
 
2743
    >>> string_to_delta('1w')
 
 
2744
    datetime.timedelta(7)
 
 
2745
    >>> string_to_delta('5m 30s')
 
 
2746
    datetime.timedelta(0, 330)
 
 
3045
2874
                       "foreground": "False",
 
3046
2875
                       "zeroconf": "True",
 
3050
2878
    # Parse config file for server-global settings
 
3051
 
    server_config = configparser.ConfigParser(server_defaults)
 
 
2879
    server_config = configparser.SafeConfigParser(server_defaults)
 
3052
2880
    del server_defaults
 
3053
2881
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
 
3054
 
    # Convert the ConfigParser object to a dict
 
 
2882
    # Convert the SafeConfigParser object to a dict
 
3055
2883
    server_settings = server_config.defaults()
 
3056
2884
    # Use the appropriate methods on the non-string config options
 
3057
 
    for option in ("debug", "use_dbus", "use_ipv6", "restore",
 
3058
 
                   "foreground", "zeroconf"):
 
 
2885
    for option in ("debug", "use_dbus", "use_ipv6", "foreground"):
 
3059
2886
        server_settings[option] = server_config.getboolean("DEFAULT",
 
3061
2888
    if server_settings["port"]:
 
 
3307
3131
                        for key, value in
 
3308
3132
                        bytes_old_client_settings.items()}
 
3309
3133
                    del bytes_old_client_settings
 
3310
 
                    # .host and .checker_command
 
3311
3135
                    for value in old_client_settings.values():
 
3312
 
                        for attribute in ("host", "checker_command"):
 
3313
 
                            if isinstance(value[attribute], bytes):
 
3314
 
                                value[attribute] = (value[attribute]
 
 
3136
                        if isinstance(value["host"], bytes):
 
 
3137
                            value["host"] = (value["host"]
 
3316
3139
            os.remove(stored_state_path)
 
3317
3140
        except IOError as e:
 
3318
3141
            if e.errno == errno.ENOENT:
 
3319
 
                log.warning("Could not load persistent state:"
 
3320
 
                            " %s", os.strerror(e.errno))
 
 
3142
                logger.warning("Could not load persistent state:"
 
 
3143
                               " {}".format(os.strerror(e.errno)))
 
3322
 
                log.critical("Could not load persistent state:",
 
 
3145
                logger.critical("Could not load persistent state:",
 
3325
3148
        except EOFError as e:
 
3326
 
            log.warning("Could not load persistent state: EOFError:",
 
 
3149
            logger.warning("Could not load persistent state: "
 
3329
3153
    with PGPEngine() as pgp:
 
3330
3154
        for client_name, client in clients_data.items():
 
 
3357
3181
            if client["enabled"]:
 
3358
3182
                if datetime.datetime.utcnow() >= client["expires"]:
 
3359
3183
                    if not client["last_checked_ok"]:
 
3360
 
                        log.warning("disabling client %s - Client"
 
3361
 
                                    " never performed a successful"
 
3362
 
                                    " checker", client_name)
 
 
3185
                            "disabling client {} - Client never "
 
 
3186
                            "performed a successful checker".format(
 
3363
3188
                        client["enabled"] = False
 
3364
3189
                    elif client["last_checker_status"] != 0:
 
3365
 
                        log.warning("disabling client %s - Client"
 
3366
 
                                    " last checker failed with error"
 
3367
 
                                    " code %s", client_name,
 
3368
 
                                    client["last_checker_status"])
 
 
3191
                            "disabling client {} - Client last"
 
 
3192
                            " checker failed with error code"
 
 
3195
                                client["last_checker_status"]))
 
3369
3196
                        client["enabled"] = False
 
3371
3198
                        client["expires"] = (
 
3372
3199
                            datetime.datetime.utcnow()
 
3373
3200
                            + client["timeout"])
 
3374
 
                        log.debug("Last checker succeeded, keeping %s"
 
3375
 
                                  " enabled", client_name)
 
 
3201
                        logger.debug("Last checker succeeded,"
 
 
3202
                                     " keeping {} enabled".format(
 
3377
3205
                client["secret"] = pgp.decrypt(
 
3378
3206
                    client["encrypted_secret"],
 
3379
3207
                    client_settings[client_name]["secret"])
 
3380
3208
            except PGPError:
 
3381
3209
                # If decryption fails, we use secret from new settings
 
3382
 
                log.debug("Failed to decrypt %s old secret",
 
 
3210
                logger.debug("Failed to decrypt {} old secret".format(
 
3384
3212
                client["secret"] = (client_settings[client_name]
 
 
3633
3462
                service.activate()
 
3634
3463
            except dbus.exceptions.DBusException as error:
 
3635
 
                log.critical("D-Bus Exception", exc_info=error)
 
 
3464
                logger.critical("D-Bus Exception", exc_info=error)
 
3638
3467
            # End of Avahi example code
 
3641
 
            GLib.IOChannel.unix_new(tcp_server.fileno()),
 
3642
 
            GLib.PRIORITY_DEFAULT, GLib.IO_IN,
 
3643
 
            lambda *args, **kwargs: (tcp_server.handle_request
 
3644
 
                                     (*args[2:], **kwargs) or True))
 
 
3469
        GLib.io_add_watch(tcp_server.fileno(), GLib.IO_IN,
 
 
3470
                          lambda *args, **kwargs:
 
 
3471
                          (tcp_server.handle_request
 
 
3472
                           (*args[2:], **kwargs) or True))
 
3646
 
        log.debug("Starting main loop")
 
 
3474
        logger.debug("Starting main loop")
 
3647
3475
        main_loop.run()
 
3648
3476
    except AvahiError as error:
 
3649
 
        log.critical("Avahi Error", exc_info=error)
 
 
3477
        logger.critical("Avahi Error", exc_info=error)
 
3652
3480
    except KeyboardInterrupt:
 
3654
3482
            print("", file=sys.stderr)
 
3655
 
        log.debug("Server received KeyboardInterrupt")
 
3656
 
    log.debug("Server exiting")
 
 
3483
        logger.debug("Server received KeyboardInterrupt")
 
 
3484
    logger.debug("Server exiting")
 
3657
3485
    # Must run before the D-Bus bus name gets deregistered
 
3661
 
def parse_test_args():
 
3662
 
    # type: () -> argparse.Namespace
 
3663
 
    parser = argparse.ArgumentParser(add_help=False)
 
3664
 
    parser.add_argument("--check", action="store_true")
 
3665
 
    parser.add_argument("--prefix", )
 
3666
 
    args, unknown_args = parser.parse_known_args()
 
3668
 
        # Remove test options from sys.argv
 
3669
 
        sys.argv[1:] = unknown_args
 
3672
 
# Add all tests from doctest strings
 
3673
 
def load_tests(loader, tests, none):
 
3675
 
    tests.addTests(doctest.DocTestSuite())
 
3678
 
if __name__ == "__main__":
 
3679
 
    options = parse_test_args()
 
3682
 
            extra_test_prefix = options.prefix
 
3683
 
            if extra_test_prefix is not None:
 
3684
 
                if not (unittest.main(argv=[""], exit=False)
 
3685
 
                        .result.wasSuccessful()):
 
3687
 
                class ExtraTestLoader(unittest.TestLoader):
 
3688
 
                    testMethodPrefix = extra_test_prefix
 
3689
 
                # Call using ./scriptname --test [--verbose]
 
3690
 
                unittest.main(argv=[""], testLoader=ExtraTestLoader())
 
3692
 
                unittest.main(argv=[""])
 
3700
 
# (lambda (&optional extra)
 
3701
 
#   (if (not (funcall run-tests-in-test-buffer default-directory
 
3703
 
#       (funcall show-test-buffer-in-test-window)
 
3704
 
#     (funcall remove-test-window)
 
3705
 
#     (if extra (message "Extra tests run successfully!"))))
 
3706
 
# run-tests-in-test-buffer:
 
3707
 
# (lambda (dir &optional extra)
 
3708
 
#   (with-current-buffer (get-buffer-create "*Test*")
 
3709
 
#     (setq buffer-read-only nil
 
3710
 
#           default-directory dir)
 
3712
 
#     (compilation-mode))
 
3713
 
#   (let ((process-result
 
3714
 
#          (let ((inhibit-read-only t))
 
3715
 
#            (process-file-shell-command
 
3716
 
#             (funcall get-command-line extra) nil "*Test*"))))
 
3717
 
#     (and (numberp process-result)
 
3718
 
#          (= process-result 0))))
 
3720
 
# (lambda (&optional extra)
 
3721
 
#   (let ((quoted-script
 
3722
 
#          (shell-quote-argument (funcall get-script-name))))
 
3724
 
#      (concat "%s --check" (if extra " --prefix=atest" ""))
 
3728
 
#   (if (fboundp 'file-local-name)
 
3729
 
#       (file-local-name (buffer-file-name))
 
3730
 
#     (or (file-remote-p (buffer-file-name) 'localname)
 
3731
 
#         (buffer-file-name))))
 
3732
 
# remove-test-window:
 
3734
 
#   (let ((test-window (get-buffer-window "*Test*")))
 
3735
 
#     (if test-window (delete-window test-window))))
 
3736
 
# show-test-buffer-in-test-window:
 
3738
 
#   (when (not (get-buffer-window-list "*Test*"))
 
3739
 
#     (setq next-error-last-buffer (get-buffer "*Test*"))
 
3740
 
#     (let* ((side (if (>= (window-width) 146) 'right 'bottom))
 
3741
 
#            (display-buffer-overriding-action
 
3742
 
#             `((display-buffer-in-side-window) (side . ,side)
 
3743
 
#               (window-height . fit-window-to-buffer)
 
3744
 
#               (window-width . fit-window-to-buffer))))
 
3745
 
#       (display-buffer "*Test*"))))
 
3748
 
#   (let* ((run-extra-tests (lambda () (interactive)
 
3749
 
#                             (funcall run-tests t)))
 
3750
 
#          (inner-keymap `(keymap (116 . ,run-extra-tests))) ; t
 
3751
 
#          (outer-keymap `(keymap (3 . ,inner-keymap))))     ; C-c
 
3752
 
#     (setq minor-mode-overriding-map-alist
 
3753
 
#           (cons `(run-tests . ,outer-keymap)
 
3754
 
#                 minor-mode-overriding-map-alist)))
 
3755
 
#   (add-hook 'after-save-hook run-tests 90 t))
 
 
3489
if __name__ == '__main__':