forked from linuxmint/warpinator
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathauth.py
More file actions
165 lines (127 loc) * 4.99 KB
/
auth.py
File metadata and controls
165 lines (127 loc) * 4.99 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
#!/usr/bin/python3
import datetime
import stat
import os
from pathlib import Path
import secrets
import logging
import ipaddress
from cryptography import x509
from cryptography.hazmat.primitives import serialization as crypto_serialization
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.backends import default_backend as crypto_default_backend
from cryptography.x509.oid import NameOID
import nacl
from nacl import secret
import hashlib
import base64
from gi.repository import GLib, GObject
import util
import prefs
day = datetime.timedelta(1, 0, 0)
EXPIRE_TIME = 30 * day
singleton = None
def get_singleton():
global singleton
if singleton is None:
singleton = AuthManager()
return singleton
class AuthManager(GObject.Object):
__gsignals__ = {
'group-code-changed': (GObject.SignalFlags.RUN_LAST, None, ())
}
def __init__(self):
GObject.Object.__init__(self)
self.hostname = util.get_hostname()
self.ip_info = None
self.port = None
self.private_key = None
self.server_cert = None
self.remote_certs = {}
prefs.prefs_settings.connect("changed::group-code", self.notify_group_code_changed)
def notify_group_code_changed(self, settings, key, data=None):
self.emit("group-code-changed")
def update(self, ip_info, port):
self.ip_info = ip_info;
self.port = port
self._make_key_cert_pair()
def get_server_creds(self):
return (self.server_private_key, self.server_pub_key)
def get_cached_cert(self, hostname, ip_info):
try:
return self.remote_certs["%s.%s" % (hostname, ip_info)]
except KeyError:
return None
def process_remote_cert(self, hostname, ip_info, server_data):
if server_data is None:
return util.CertProcessingResult.FAILURE
decoded = base64.decodebytes(server_data)
hasher = hashlib.sha256()
hasher.update(bytes(prefs.get_group_code(), "utf-8"))
key = hasher.digest()
decoder = secret.SecretBox(key)
try:
cert = decoder.decrypt(decoded)
except nacl.exceptions.CryptoError as e:
logging.debug("Decryption failed for remote '%s': %s" % (hostname, str(e)))
cert = None
res = util.CertProcessingResult.FAILURE
if cert:
key = "%s.%s" % (hostname, ip_info)
val = self.remote_certs.get(key)
if val is None:
res = util.CertProcessingResult.CERT_INSERTED
elif val == cert:
res = util.CertProcessingResult.CERT_UP_TO_DATE
return res
else:
res = util.CertProcessingResult.CERT_UPDATED
self.remote_certs[key] = cert
return res
def get_encoded_local_cert(self):
hasher = hashlib.sha256()
hasher.update(bytes(prefs.get_group_code(), "utf-8"))
key = hasher.digest()
encoder = secret.SecretBox(key)
encrypted = encoder.encrypt(self.server_pub_key)
encoded = base64.encodebytes(encrypted)
return encoded
def _make_key_cert_pair(self):
logging.debug("Auth: Creating server credentials")
private_key = rsa.generate_private_key(
backend=crypto_default_backend(),
public_exponent=65537,
key_size=2048
)
public_key = private_key.public_key()
builder = x509.CertificateBuilder()
builder = builder.subject_name(x509.Name([
x509.NameAttribute(NameOID.COMMON_NAME, self.hostname),
]))
builder = builder.issuer_name(x509.Name([
x509.NameAttribute(NameOID.COMMON_NAME, self.hostname),
]))
builder = builder.not_valid_before(datetime.datetime.today() - day)
builder = builder.not_valid_after(datetime.datetime.today() + EXPIRE_TIME)
builder = builder.serial_number(x509.random_serial_number())
builder = builder.public_key(public_key)
alt_names = []
if self.ip_info.ip4_address is not None:
alt_names.append(x509.IPAddress(ipaddress.IPv4Address(self.ip_info.ip4_address)))
if self.ip_info.ip6_address is not None:
alt_names.append(x509.IPAddress(ipaddress.IPv6Address(self.ip_info.ip6_address)))
builder = builder.add_extension(x509.SubjectAlternativeName(alt_names), critical=True)
certificate = builder.sign(
private_key=private_key, algorithm=hashes.SHA256(),
backend=crypto_default_backend()
)
ser_private_key = private_key.private_bytes(
crypto_serialization.Encoding.PEM,
crypto_serialization.PrivateFormat.PKCS8,
crypto_serialization.NoEncryption())
ser_public_key = certificate.public_bytes(
crypto_serialization.Encoding.PEM
)
self.server_pub_key = ser_public_key
self.server_private_key = ser_private_key