Hot-keys on this page

r m x p   toggle line displays

j k   next/prev highlighted chunk

0   (zero) top of page

1   (one) first highlighted chunk

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

# Authors: Rob Crittenden <rcritten@redhat.com> 

#          John Dennis <jdennis@redhat.com> 

# 

# Copyright (C) 2009    Red Hat 

# see file 'COPYING' for use and warranty information 

# 

# This program is free software; you can redistribute it and/or modify 

# it under the terms of the GNU General Public License as published by 

# the Free Software Foundation, either version 3 of the License, or 

# (at your option) any later version. 

# 

# This program is distributed in the hope that it will be useful, 

# but WITHOUT ANY WARRANTY; without even the implied warranty of 

# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.    See the 

# GNU General Public License for more details. 

# 

# You should have received a copy of the GNU General Public License 

# along with this program.  If not, see <http://www.gnu.org/licenses/>. 

# 

 

import sys 

import httplib 

import getpass 

import socket 

from ipapython.ipa_log_manager import * 

 

from nss.error import NSPRError 

import nss.io as io 

import nss.nss as nss 

import nss.ssl as ssl 

import nss.error as error 

 

def auth_certificate_callback(sock, check_sig, is_server, certdb): 

    cert_is_valid = False 

 

    cert = sock.get_peer_certificate() 

 

    root_logger.debug("auth_certificate_callback: check_sig=%s is_server=%s\n%s", 

                              check_sig, is_server, str(cert)) 

 

    pin_args = sock.get_pkcs11_pin_arg() 

    if pin_args is None: 

        pin_args = () 

 

    # Define how the cert is being used based upon the is_server flag.  This may 

    # seem backwards, but isn't. If we're a server we're trying to validate a 

    # client cert. If we're a client we're trying to validate a server cert. 

    if is_server: 

        intended_usage = nss.certificateUsageSSLClient 

    else: 

        intended_usage = nss.certificateUsageSSLServer 

 

    try: 

        # If the cert fails validation it will raise an exception, the errno attribute 

        # will be set to the error code matching the reason why the validation failed 

        # and the strerror attribute will contain a string describing the reason. 

        approved_usage = cert.verify_now(certdb, check_sig, intended_usage, *pin_args) 

    except Exception, e: 

        root_logger.error('cert validation failed for "%s" (%s)', cert.subject, e.strerror) 

        cert_is_valid = False 

        return cert_is_valid 

 

    root_logger.debug("approved_usage = %s intended_usage = %s", 

                              ', '.join(nss.cert_usage_flags(approved_usage)), 

                              ', '.join(nss.cert_usage_flags(intended_usage))) 

 

    # Is the intended usage a proper subset of the approved usage 

    if approved_usage & intended_usage: 

        cert_is_valid = True 

    else: 

        cert_is_valid = False 

 

    # If this is a server, we're finished 

    if is_server or not cert_is_valid: 

        root_logger.debug('cert valid %s for "%s"', cert_is_valid,  cert.subject) 

        return cert_is_valid 

 

    # Certificate is OK.  Since this is the client side of an SSL 

    # connection, we need to verify that the name field in the cert 

    # matches the desired hostname.  This is our defense against 

    # man-in-the-middle attacks. 

 

    hostname = sock.get_hostname() 

    try: 

        # If the cert fails validation it will raise an exception 

        cert_is_valid = cert.verify_hostname(hostname) 

    except Exception, e: 

        root_logger.error('failed verifying socket hostname "%s" matches cert subject "%s" (%s)', 

                                  hostname, cert.subject, e.strerror) 

        cert_is_valid = False 

        return cert_is_valid 

 

    root_logger.debug('cert valid %s for "%s"', cert_is_valid,  cert.subject) 

    return cert_is_valid 

 

def client_auth_data_callback(ca_names, chosen_nickname, password, certdb): 

    cert = None 

    if chosen_nickname: 

        try: 

            cert = nss.find_cert_from_nickname(chosen_nickname, password) 

            priv_key = nss.find_key_by_any_cert(cert, password) 

            return cert, priv_key 

        except NSPRError: 

            return False 

    else: 

        nicknames = nss.get_cert_nicknames(certdb, nss.SEC_CERT_NICKNAMES_USER) 

        for nickname in nicknames: 

            try: 

                cert = nss.find_cert_from_nickname(nickname, password) 

                if cert.check_valid_times(): 

                    if cert.has_signer_in_ca_names(ca_names): 

                        priv_key = nss.find_key_by_any_cert(cert, password) 

                        return cert, priv_key 

            except NSPRError: 

                return False 

        return False 

 

_af_dict = { 

    socket.AF_INET: io.PR_AF_INET, 

    socket.AF_INET6: io.PR_AF_INET6, 

    socket.AF_UNSPEC: io.PR_AF_UNSPEC 

} 

 

class NSSAddressFamilyFallback(object): 

    def __init__(self, family): 

        self.sock_family = family 

        self.family = self._get_nss_family(self.sock_family) 

 

    def _get_nss_family(self, sock_family): 

        """ 

        Translate a family from python socket module to nss family. 

        """ 

        try: 

            return _af_dict[sock_family] 

        except KeyError: 

            raise ValueError('Uknown socket family %d\n', sock_family) 

 

    def _create_socket(self): 

        self.sock = io.Socket(family=self.family) 

 

    def connect_socket(self, host, port): 

        try: 

            addr_info = io.AddrInfo(host, family=self.family) 

        except Exception: 

             raise NSPRError(error.PR_ADDRESS_NOT_SUPPORTED_ERROR, 

                             "Cannot resolve %s using family %s" % (host, 

                                 io.addr_family_name(self.family))) 

 

        for net_addr in addr_info: 

            root_logger.debug("Connecting: %s", net_addr) 

            net_addr.port = port 

            self.family = net_addr.family 

            try: 

                self._create_socket() 

                self.sock.connect(net_addr) 

                return 

            except Exception, e: 

                root_logger.debug("Could not connect socket to %s, error: %s", 

                        net_addr, str(e)) 

                root_logger.debug("Try to continue with next family...") 

                continue 

 

        raise NSPRError(error.PR_ADDRESS_NOT_SUPPORTED_ERROR, 

                "Could not connect to %s using any address" % host) 

 

 

class NSSConnection(httplib.HTTPConnection, NSSAddressFamilyFallback): 

    default_port = httplib.HTTPSConnection.default_port 

 

    def __init__(self, host, port=None, strict=None, 

                 dbdir=None, family=socket.AF_UNSPEC, no_init=False): 

        """ 

        :param host: the server to connect to 

        :param port: the port to use (default is set in HTTPConnection) 

        :param dbdir: the NSS database directory 

        :param family: network family to use (default AF_UNSPEC) 

        :param no_init: do not initialize the NSS database. This requires 

                        that the database has already been initialized or 

                        the request will fail. 

        """ 

        httplib.HTTPConnection.__init__(self, host, port, strict) 

        NSSAddressFamilyFallback.__init__(self, family) 

 

        if not dbdir: 

            raise RuntimeError("dbdir is required") 

 

        root_logger.debug('%s init %s', self.__class__.__name__, host) 

        if not no_init and nss.nss_is_initialized(): 

            # close any open NSS database and use the new one 

            ssl.clear_session_cache() 

            try: 

                nss.nss_shutdown() 

            except NSPRError, e: 

                if e.errno != error.SEC_ERROR_NOT_INITIALIZED: 

                    raise e 

        nss.nss_init(dbdir) 

        ssl.set_domestic_policy() 

        nss.set_password_callback(self.password_callback) 

 

    def _create_socket(self): 

        # TODO: remove the try block once python-nss is guaranteed to contain 

        # these values 

        try: 

            #pylint: disable=E1101 

            ssl_enable_renegotiation  = ssl.SSL_ENABLE_RENEGOTIATION 

            ssl_require_safe_negotiation = ssl.SSL_REQUIRE_SAFE_NEGOTIATION 

            ssl_renegotiate_requires_xtn = ssl.SSL_RENEGOTIATE_REQUIRES_XTN 

        except: 

            ssl_enable_renegotiation  = 20 

            ssl_require_safe_negotiation = 21 

            ssl_renegotiate_requires_xtn = 2 

 

        # Create the socket here so we can do things like let the caller 

        # override the NSS callbacks 

        self.sock = ssl.SSLSocket(family=self.family) 

        self.sock.set_ssl_option(ssl.SSL_SECURITY, True) 

        self.sock.set_ssl_option(ssl.SSL_HANDSHAKE_AS_CLIENT, True) 

        self.sock.set_ssl_option(ssl_require_safe_negotiation, False) 

        self.sock.set_ssl_option(ssl_enable_renegotiation, ssl_renegotiate_requires_xtn) 

        # Provide a callback which notifies us when the SSL handshake is complete 

        self.sock.set_handshake_callback(self.handshake_callback) 

 

        # Provide a callback to verify the servers certificate 

        self.sock.set_auth_certificate_callback(auth_certificate_callback, 

                                                nss.get_default_certdb()) 

        self.sock.set_hostname(self.host) 

 

    def password_callback(self, slot, retry, password): 

        if not retry and password: return password 

        return getpass.getpass("Enter password for %s: " % slot.token_name); 

 

    def handshake_callback(self, sock): 

        """ 

        Verify callback. If we get here then the certificate is ok. 

        """ 

        root_logger.debug("handshake complete, peer = %s", sock.get_peer_name()) 

        pass 

 

    def connect(self): 

        self.connect_socket(self.host, self.port) 

 

    def close(self): 

        """Close the connection to the HTTP server.""" 

        if self.sock: 

            self.sock.close()   # close it manually... there may be other refs 

            self.sock = None 

 

    def endheaders(self, message=None): 

        """ 

        Explicitly close the connection if an error is returned after the 

        headers are sent. This will likely mean the initial SSL handshake 

        failed. If this isn't done then the connection is never closed and 

        subsequent NSS activities will fail with a BUSY error. 

        """ 

        try: 

            # FIXME: httplib uses old-style classes so super doesn't work 

            # Python 2.7 changed the API for endheaders. This is an attempt 

            # to work across versions 

            (major, minor, micro, releaselevel, serial) = sys.version_info 

            if major == 2 and minor < 7: 

                httplib.HTTPConnection.endheaders(self) 

            else: 

                httplib.HTTPConnection.endheaders(self, message) 

        except NSPRError, e: 

            self.close() 

            raise e 

 

class NSSHTTPS(httplib.HTTP): 

    # We would like to use HTTP 1.1 not the older HTTP 1.0 but xmlrpclib 

    # and httplib do not play well together. httplib when the protocol 

    # is 1.1 will add a host header in the request. But xmlrpclib 

    # always adds a host header irregardless of the HTTP protocol 

    # version. That means the request ends up with 2 host headers, 

    # but Apache freaks out if it sees 2 host headers, a known Apache 

    # issue. httplib has a mechanism to skip adding the host header 

    # (i.e. skip_host in HTTPConnection.putrequest()) but xmlrpclib 

    # doesn't use it. Oh well, back to 1.0  :-( 

    # 

    #_http_vsn = 11 

    #_http_vsn_str = 'HTTP/1.1' 

 

    _connection_class = NSSConnection 

 

    def __init__(self, host='', port=None, strict=None, dbdir=None, no_init=False): 

        # provide a default host, pass the X509 cert info 

 

        # urf. compensate for bad input. 

        if port == 0: 

            port = None 

        self._setup(self._connection_class(host, port, strict, dbdir=dbdir, no_init=no_init)) 

 

    def getreply(self): 

        """ 

        Override so we can close duplicated file connection on non-200 

        responses. This was causing nss_shutdown() to fail with a busy 

        error. 

        """ 

        (status, reason, msg) = httplib.HTTP.getreply(self) 

        if status != 200: 

            self.file.close() 

        return (status, reason, msg) 

 

#------------------------------------------------------------------------------ 

 

if __name__ == "__main__": 

    standard_logging_setup('nsslib.log', debug=True, filemode='a') 

    root_logger.info("Start") 

 

    if False: 

        conn = NSSConnection("www.verisign.com", 443, dbdir="/etc/pki/nssdb") 

        conn.set_debuglevel(1) 

        conn.connect() 

        conn.request("GET", "/") 

        response = conn.getresponse() 

        print response.status 

        #print response.msg 

        print response.getheaders() 

        data = response.read() 

        #print data 

        conn.close() 

 

    if True: 

        h = NSSHTTPS("www.verisign.com", 443, dbdir="/etc/pki/nssdb") 

        h.connect() 

        h.putrequest('GET', '/') 

        h.endheaders() 

        http_status, http_reason, headers = h.getreply() 

        print "status = %s %s" % (http_status, http_reason) 

        print "headers:\n%s" % headers 

        f = h.getfile() 

        data = f.read() # Get the raw HTML 

        f.close() 

        #print data