electrum-bitcoinprivate/lib/interface.py

367 lines
12 KiB
Python
Raw Normal View History

#!/usr/bin/env python
#
# Electrum - lightweight Bitcoin client
# Copyright (C) 2011 thomasv@gitorious
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import random, ast, re, errno, os
2012-03-31 02:47:16 -07:00
import threading, traceback, sys, time, json, Queue
import socket
import ssl
2012-02-03 06:45:41 -08:00
import requests
ca_path = requests.certs.where()
2012-11-06 13:20:54 -08:00
from version import ELECTRUM_VERSION, PROTOCOL_VERSION
import util
2013-10-02 01:21:25 -07:00
from simple_config import SimpleConfig
import x509
2014-07-27 15:13:40 -07:00
import util
DEFAULT_TIMEOUT = 5
2013-10-02 01:21:25 -07:00
2014-07-29 00:28:27 -07:00
def Interface(server, config = None):
host, port, protocol = server.split(':')
port = int(port)
if protocol in 'st':
return TcpInterface(server, config)
else:
raise Exception('Unknown protocol: %s'%protocol)
class TcpInterface(threading.Thread):
2013-10-06 03:28:45 -07:00
def __init__(self, server, config = None):
threading.Thread.__init__(self)
self.daemon = True
2013-10-06 03:28:45 -07:00
self.config = config if config is not None else SimpleConfig()
self.lock = threading.Lock()
self.is_connected = False
2013-10-04 07:00:20 -07:00
self.debug = False # dump network messages. can be changed at runtime using the console
2012-03-18 00:07:40 -07:00
self.message_id = 0
2012-05-04 00:28:44 -07:00
self.unanswered_requests = {}
# are we waiting for a pong?
self.is_ping = False
# parse server
2013-10-06 03:28:45 -07:00
self.server = server
2014-07-29 00:28:27 -07:00
self.host, self.port, self.protocol = self.server.split(':')
self.port = int(self.port)
self.use_ssl = (self.protocol == 's')
def print_error(self, *msg):
util.print_error("[%s]"%self.host, *msg)
2014-07-29 00:28:27 -07:00
def process_response(self, response):
2013-10-04 07:00:20 -07:00
if self.debug:
self.print_error("<--", response)
2014-07-29 00:28:27 -07:00
msg_id = response.get('id')
error = response.get('error')
result = response.get('result')
2014-07-27 15:13:40 -07:00
if msg_id is not None:
2014-07-27 15:13:40 -07:00
with self.lock:
method, params, _id, queue = self.unanswered_requests.pop(msg_id)
if queue is None:
queue = self.response_queue
2012-03-17 15:32:36 -07:00
else:
2013-09-11 23:41:27 -07:00
# notification
2014-07-29 00:28:27 -07:00
method = response.get('method')
params = response.get('params')
2014-07-27 15:13:40 -07:00
_id = None
2014-07-29 00:28:27 -07:00
queue = self.response_queue
# restore parameters
if method == 'blockchain.numblocks.subscribe':
result = params[0]
params = []
2012-10-25 06:40:30 -07:00
elif method == 'blockchain.headers.subscribe':
result = params[0]
params = []
elif method == 'blockchain.address.subscribe':
addr = params[0]
result = params[1]
params = [addr]
2014-07-29 00:28:27 -07:00
if method == 'server.version':
self.server_version = result
self.is_ping = False
2014-07-29 00:28:27 -07:00
return
2014-09-05 05:51:37 -07:00
if error:
queue.put((self, {'method':method, 'params':params, 'error':error, 'id':_id}))
else:
queue.put((self, {'method':method, 'params':params, 'result':result, 'id':_id}))
2012-03-19 07:57:47 -07:00
def check_host_name(self, peercert, name):
"""Simple certificate/host name checker. Returns True if the
certificate matches, False otherwise. Does not support
wildcards."""
# Check that the peer has supplied a certificate.
# None/{} is not acceptable.
if not peercert:
return False
if peercert.has_key("subjectAltName"):
for typ, val in peercert["subjectAltName"]:
if typ == "DNS" and val == name:
return True
else:
# Only check the subject DN if there is no subject alternative
# name.
cn = None
for attr, val in peercert["subject"]:
# Use most-specific (last) commonName attribute.
if attr == "commonName":
cn = val
if cn is not None:
return cn == name
return False
def get_simple_socket(self):
try:
l = socket.getaddrinfo(self.host, self.port, socket.AF_UNSPEC, socket.SOCK_STREAM)
except socket.gaierror:
self.print_error("cannot resolve hostname")
return
for res in l:
try:
s = socket.socket(res[0], socket.SOCK_STREAM)
s.connect(res[4])
return s
2015-02-28 10:45:10 -08:00
except BaseException as e:
continue
else:
self.print_error("failed to connect", str(e))
2013-09-30 05:01:49 -07:00
def get_socket(self):
2013-09-30 05:01:49 -07:00
if self.use_ssl:
2013-10-06 03:28:45 -07:00
cert_path = os.path.join( self.config.path, 'certs', self.host)
2013-09-30 05:01:49 -07:00
if not os.path.exists(cert_path):
2013-10-01 18:24:14 -07:00
is_new = True
s = self.get_simple_socket()
if s is None:
return
# try with CA first
try:
2014-10-31 06:59:59 -07:00
s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv23, cert_reqs=ssl.CERT_REQUIRED, ca_certs=ca_path, do_handshake_on_connect=True)
except ssl.SSLError, e:
s = None
if s and self.check_host_name(s.getpeercert(), self.host):
self.print_error("SSL certificate signed by CA")
return s
2013-11-13 11:35:35 -08:00
# get server certificate.
# Do not use ssl.get_server_certificate because it does not work with proxy
s = self.get_simple_socket()
try:
2014-10-31 06:59:59 -07:00
s = ssl.wrap_socket(s, ssl_version=ssl.PROTOCOL_SSLv23, cert_reqs=ssl.CERT_NONE, ca_certs=None)
except ssl.SSLError, e:
self.print_error("SSL error retrieving SSL certificate:", e)
2013-09-30 05:01:49 -07:00
return
dercert = s.getpeercert(True)
s.close()
cert = ssl.DER_cert_to_PEM_cert(dercert)
# workaround android bug
cert = re.sub("([^\n])-----END CERTIFICATE-----","\\1\n-----END CERTIFICATE-----",cert)
temporary_path = cert_path + '.temp'
with open(temporary_path,"w") as f:
2013-09-30 05:01:49 -07:00
f.write(cert)
2013-10-01 18:24:14 -07:00
else:
is_new = False
2013-09-30 05:01:49 -07:00
s = self.get_simple_socket()
if s is None:
return
2013-09-30 05:01:49 -07:00
s.settimeout(2)
s.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1)
2012-10-17 02:35:24 -07:00
if self.use_ssl:
2013-09-30 05:01:49 -07:00
try:
s = ssl.wrap_socket(s,
2014-10-31 06:59:59 -07:00
ssl_version=ssl.PROTOCOL_SSLv23,
2013-09-30 05:01:49 -07:00
cert_reqs=ssl.CERT_REQUIRED,
ca_certs= (temporary_path if is_new else cert_path),
2013-09-30 05:01:49 -07:00
do_handshake_on_connect=True)
except ssl.SSLError, e:
self.print_error("SSL error:", e)
2013-10-02 01:43:02 -07:00
if e.errno != 1:
return
2013-10-01 18:33:45 -07:00
if is_new:
2013-11-11 07:59:36 -08:00
rej = cert_path + '.rej'
if os.path.exists(rej):
os.unlink(rej)
os.rename(temporary_path, rej)
2013-10-02 01:36:29 -07:00
else:
with open(cert_path) as f:
cert = f.read()
try:
x = x509.X509()
x.parse(cert)
x.slow_parse()
except:
2014-07-29 00:28:27 -07:00
traceback.print_exc(file=sys.stderr)
self.print_error("wrong certificate")
return
try:
x.check_date()
except:
self.print_error("certificate has expired:", cert_path)
2013-10-02 01:36:29 -07:00
os.unlink(cert_path)
return
self.print_error("wrong certificate")
return
except BaseException, e:
self.print_error(e)
if e.errno == 104:
return
2014-07-29 00:28:27 -07:00
traceback.print_exc(file=sys.stderr)
2013-09-30 05:01:49 -07:00
return
if is_new:
self.print_error("saving certificate")
os.rename(temporary_path, cert_path)
2014-08-22 01:33:13 -07:00
return s
2014-07-27 15:13:40 -07:00
def send_request(self, request, queue=None):
_id = request.get('id')
method = request.get('method')
params = request.get('params')
with self.lock:
2014-07-29 05:19:23 -07:00
try:
r = {'id':self.message_id, 'method':method, 'params':params}
self.pipe.send(r)
if self.debug:
self.print_error("-->", r)
except socket.error, e:
self.print_error("socked error:", e)
2014-07-29 05:19:23 -07:00
self.is_connected = False
return
2014-07-27 15:13:40 -07:00
self.unanswered_requests[self.message_id] = method, params, _id, queue
2012-03-17 08:02:28 -07:00
self.message_id += 1
2012-11-24 11:31:07 -08:00
def stop(self):
2013-03-10 08:24:52 -07:00
if self.is_connected and self.protocol in 'st' and self.s:
2012-11-24 11:31:07 -08:00
self.s.shutdown(socket.SHUT_RDWR)
self.s.close()
2013-12-17 09:20:54 -08:00
self.is_connected = False
self.print_error("stopped")
2013-12-17 09:20:54 -08:00
2014-07-29 00:28:27 -07:00
def start(self, response_queue):
2014-07-27 15:13:40 -07:00
self.response_queue = response_queue
2013-03-10 01:24:42 -08:00
threading.Thread.start(self)
2013-09-08 08:23:01 -07:00
def run(self):
2014-08-22 01:33:13 -07:00
self.s = self.get_socket()
if self.s:
2015-03-07 13:47:25 -08:00
self.pipe = util.SocketPipe(self.s)
self.s.settimeout(2)
2014-08-22 01:33:13 -07:00
self.is_connected = True
self.print_error("connected")
2014-08-22 01:33:13 -07:00
2014-07-29 00:28:27 -07:00
self.change_status()
if not self.is_connected:
return
# ping timer
ping_time = 0
# request timer
request_time = False
2014-07-29 00:28:27 -07:00
while self.is_connected:
# ping the server with server.version
if time.time() - ping_time > 60:
if self.is_ping:
self.print_error("ping timeout")
self.is_connected = False
break
else:
self.send_request({'method':'server.version', 'params':[ELECTRUM_VERSION, PROTOCOL_VERSION]})
self.is_ping = True
ping_time = time.time()
2014-07-29 00:28:27 -07:00
try:
response = self.pipe.get()
except util.timeout:
if self.unanswered_requests:
if request_time is False:
request_time = time.time()
self.print_error("setting timer")
else:
if time.time() - request_time > 10:
self.print_error("request timeout", len(self.unanswered_requests))
self.is_connected = False
break
2014-07-29 00:28:27 -07:00
continue
if response is None:
self.is_connected = False
break
if request_time is not False:
self.print_error("stopping timer")
request_time = False
2014-07-29 00:28:27 -07:00
self.process_response(response)
2013-09-08 08:23:01 -07:00
self.change_status()
2014-07-29 03:13:21 -07:00
2013-09-08 08:23:01 -07:00
def change_status(self):
2014-07-27 15:13:40 -07:00
# print_error( "change status", self.server, self.is_connected)
self.response_queue.put((self, None))
2013-09-30 05:01:49 -07:00
2014-01-29 07:48:00 -08:00
2013-09-30 05:01:49 -07:00
2014-07-27 15:13:40 -07:00
2013-09-30 05:01:49 -07:00
def check_cert(host, cert):
try:
x = x509.X509()
x.parse(cert)
x.slow_parse()
except:
traceback.print_exc(file=sys.stdout)
return
try:
x.check_date()
expired = False
except:
expired = True
m = "host: %s\n"%host
m += "has_expired: %s\n"% expired
util.print_msg(m)
def test_certificates():
config = SimpleConfig()
mydir = os.path.join(config.path, "certs")
certs = os.listdir(mydir)
for c in certs:
print c
p = os.path.join(mydir,c)
with open(p) as f:
cert = f.read()
check_cert(c, cert)
if __name__ == "__main__":
test_certificates()