2015-08-22 10:48:49 +02:00
|
|
|
|
from __future__ import division
|
2015-01-21 18:38:25 +01:00
|
|
|
|
|
2013-07-08 22:21:29 +02:00
|
|
|
|
# Libraries.
|
|
|
|
|
import os
|
|
|
|
|
import sys
|
|
|
|
|
import stat
|
2017-09-21 17:24:51 +02:00
|
|
|
|
import threading
|
|
|
|
|
import hashlib
|
|
|
|
|
import subprocess
|
2016-03-23 23:26:57 +01:00
|
|
|
|
from binascii import hexlify
|
2017-09-21 17:24:51 +02:00
|
|
|
|
from pyelliptic import arithmetic
|
2013-07-08 22:21:29 +02:00
|
|
|
|
|
|
|
|
|
# Project imports.
|
2017-09-21 17:24:51 +02:00
|
|
|
|
import state
|
2013-06-24 21:51:01 +02:00
|
|
|
|
import highlevelcrypto
|
2017-09-21 17:24:51 +02:00
|
|
|
|
from bmconfigparser import BMConfigParser
|
|
|
|
|
from debug import logger
|
2019-01-30 10:14:42 +01:00
|
|
|
|
from addresses import decodeAddress, encodeVarint
|
|
|
|
|
from helper_sql import sqlQuery
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verbose = 1
|
|
|
|
|
# This is obsolete with the change to protocol v3
|
|
|
|
|
# but the singleCleaner thread still hasn't been updated
|
|
|
|
|
# so we need this a little longer.
|
|
|
|
|
maximumAgeOfAnObjectThatIAmWillingToAccept = 216000
|
|
|
|
|
# Equals 4 weeks. You could make this longer if you want
|
|
|
|
|
# but making it shorter would not be advisable because
|
|
|
|
|
# there is a very small possibility that it could keep you
|
|
|
|
|
# from obtaining a needed pubkey for a period of time.
|
|
|
|
|
lengthOfTimeToHoldOnToAllPubkeys = 2419200
|
|
|
|
|
maximumAgeOfNodesThatIAdvertiseToOthers = 10800 # Equals three hours
|
2013-05-02 17:53:54 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
myECCryptorObjects = {}
|
|
|
|
|
MyECSubscriptionCryptorObjects = {}
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# The key in this dictionary is the RIPE hash which is encoded
|
|
|
|
|
# in an address and value is the address itself.
|
|
|
|
|
myAddressesByHash = {}
|
|
|
|
|
# The key in this dictionary is the tag generated from the address.
|
|
|
|
|
myAddressesByTag = {}
|
2013-05-02 17:53:54 +02:00
|
|
|
|
broadcastSendersForWhichImWatching = {}
|
|
|
|
|
printLock = threading.Lock()
|
|
|
|
|
statusIconColor = 'red'
|
2018-11-01 15:28:42 +01:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
thisapp = None # singleton lock instance
|
2019-02-01 18:14:56 +01:00
|
|
|
|
|
2013-06-24 21:51:01 +02:00
|
|
|
|
ackdataForWhichImWatching = {}
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# used by API command clientStatus
|
|
|
|
|
clientHasReceivedIncomingConnections = False
|
2013-08-25 01:40:48 +02:00
|
|
|
|
numberOfMessagesProcessed = 0
|
|
|
|
|
numberOfBroadcastsProcessed = 0
|
|
|
|
|
numberOfPubkeysProcessed = 0
|
2018-01-25 11:58:29 +01:00
|
|
|
|
|
2013-11-04 08:05:07 +01:00
|
|
|
|
maximumLengthOfTimeToBotherResendingMessages = 0
|
2013-05-02 17:53:54 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
2013-05-02 17:53:54 +02:00
|
|
|
|
def isAddressInMyAddressBook(address):
|
2013-08-29 14:03:45 +02:00
|
|
|
|
queryreturn = sqlQuery(
|
|
|
|
|
'''select address from addressbook where address=?''',
|
|
|
|
|
address)
|
2013-05-02 17:53:54 +02:00
|
|
|
|
return queryreturn != []
|
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
|
|
|
|
# At this point we should really just have a isAddressInMy(book, address)...
|
2013-06-14 03:55:38 +02:00
|
|
|
|
def isAddressInMySubscriptionsList(address):
|
2013-08-29 16:00:27 +02:00
|
|
|
|
queryreturn = sqlQuery(
|
2013-08-29 14:03:45 +02:00
|
|
|
|
'''select * from subscriptions where address=?''',
|
|
|
|
|
str(address))
|
2013-06-14 03:55:38 +02:00
|
|
|
|
return queryreturn != []
|
2013-06-14 04:03:03 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
2013-05-02 17:53:54 +02:00
|
|
|
|
def isAddressInMyAddressBookSubscriptionsListOrWhitelist(address):
|
|
|
|
|
if isAddressInMyAddressBook(address):
|
|
|
|
|
return True
|
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
queryreturn = sqlQuery(
|
|
|
|
|
'''SELECT address FROM whitelist where address=?'''
|
|
|
|
|
''' and enabled = '1' ''',
|
|
|
|
|
address)
|
|
|
|
|
if queryreturn != []:
|
2013-05-02 17:53:54 +02:00
|
|
|
|
return True
|
|
|
|
|
|
2013-08-29 16:00:27 +02:00
|
|
|
|
queryreturn = sqlQuery(
|
2017-09-21 17:24:51 +02:00
|
|
|
|
'''select address from subscriptions where address=?'''
|
|
|
|
|
''' and enabled = '1' ''',
|
2013-08-29 14:03:45 +02:00
|
|
|
|
address)
|
2017-09-21 17:24:51 +02:00
|
|
|
|
if queryreturn != []:
|
2013-05-02 17:53:54 +02:00
|
|
|
|
return True
|
|
|
|
|
return False
|
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
2013-05-02 17:53:54 +02:00
|
|
|
|
def decodeWalletImportFormat(WIFstring):
|
2017-09-21 17:24:51 +02:00
|
|
|
|
fullString = arithmetic.changebase(WIFstring, 58, 256)
|
2013-05-02 17:53:54 +02:00
|
|
|
|
privkey = fullString[:-4]
|
2017-09-21 17:24:51 +02:00
|
|
|
|
if fullString[-4:] != \
|
|
|
|
|
hashlib.sha256(hashlib.sha256(privkey).digest()).digest()[:4]:
|
|
|
|
|
logger.critical(
|
|
|
|
|
'Major problem! When trying to decode one of your'
|
|
|
|
|
' private keys, the checksum failed. Here are the first'
|
|
|
|
|
' 6 characters of the PRIVATE key: %s',
|
|
|
|
|
str(WIFstring)[:6]
|
|
|
|
|
)
|
2013-11-20 07:29:37 +01:00
|
|
|
|
os._exit(0)
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# return ""
|
2017-09-21 17:29:32 +02:00
|
|
|
|
elif privkey[0] == '\x80': # checksum passed
|
|
|
|
|
return privkey[1:]
|
|
|
|
|
|
|
|
|
|
logger.critical(
|
|
|
|
|
'Major problem! When trying to decode one of your private keys,'
|
|
|
|
|
' the checksum passed but the key doesn\'t begin with hex 80.'
|
|
|
|
|
' Here is the PRIVATE key: %s', WIFstring
|
|
|
|
|
)
|
|
|
|
|
os._exit(0)
|
2013-05-02 17:53:54 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def reloadMyAddressHashes():
|
2013-07-10 20:50:18 +02:00
|
|
|
|
logger.debug('reloading keys from keys.dat file')
|
2013-05-02 17:53:54 +02:00
|
|
|
|
myECCryptorObjects.clear()
|
|
|
|
|
myAddressesByHash.clear()
|
2013-09-15 03:06:26 +02:00
|
|
|
|
myAddressesByTag.clear()
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# myPrivateKeys.clear()
|
2013-06-27 12:02:52 +02:00
|
|
|
|
|
2017-01-11 17:00:00 +01:00
|
|
|
|
keyfileSecure = checkSensitiveFilePermissions(state.appdata + 'keys.dat')
|
2013-06-27 12:02:52 +02:00
|
|
|
|
hasEnabledKeys = False
|
2017-05-15 12:18:07 +02:00
|
|
|
|
for addressInKeysFile in BMConfigParser().addresses():
|
|
|
|
|
isEnabled = BMConfigParser().getboolean(addressInKeysFile, 'enabled')
|
|
|
|
|
if isEnabled:
|
|
|
|
|
hasEnabledKeys = True
|
2018-03-22 12:23:36 +01:00
|
|
|
|
# status
|
|
|
|
|
_, addressVersionNumber, streamNumber, hash = \
|
2017-09-21 17:24:51 +02:00
|
|
|
|
decodeAddress(addressInKeysFile)
|
|
|
|
|
if addressVersionNumber in (2, 3, 4):
|
|
|
|
|
# Returns a simple 32 bytes of information encoded
|
|
|
|
|
# in 64 Hex characters, or null if there was an error.
|
2017-05-15 12:18:07 +02:00
|
|
|
|
privEncryptionKey = hexlify(decodeWalletImportFormat(
|
2017-09-21 17:24:51 +02:00
|
|
|
|
BMConfigParser().get(addressInKeysFile, 'privencryptionkey'))
|
|
|
|
|
)
|
2017-05-15 12:18:07 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# It is 32 bytes encoded as 64 hex characters
|
|
|
|
|
if len(privEncryptionKey) == 64:
|
|
|
|
|
myECCryptorObjects[hash] = \
|
|
|
|
|
highlevelcrypto.makeCryptor(privEncryptionKey)
|
2017-05-15 12:18:07 +02:00
|
|
|
|
myAddressesByHash[hash] = addressInKeysFile
|
2017-09-21 17:24:51 +02:00
|
|
|
|
tag = hashlib.sha512(hashlib.sha512(
|
|
|
|
|
encodeVarint(addressVersionNumber) +
|
|
|
|
|
encodeVarint(streamNumber) + hash).digest()
|
|
|
|
|
).digest()[32:]
|
2017-05-15 12:18:07 +02:00
|
|
|
|
myAddressesByTag[tag] = addressInKeysFile
|
|
|
|
|
|
|
|
|
|
else:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
logger.error(
|
|
|
|
|
'Error in reloadMyAddressHashes: Can\'t handle'
|
|
|
|
|
' address versions other than 2, 3, or 4.\n'
|
|
|
|
|
)
|
2013-06-27 12:44:49 +02:00
|
|
|
|
|
|
|
|
|
if not keyfileSecure:
|
2017-01-11 17:00:00 +01:00
|
|
|
|
fixSensitiveFilePermissions(state.appdata + 'keys.dat', hasEnabledKeys)
|
2013-05-02 17:53:54 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
2013-05-02 17:53:54 +02:00
|
|
|
|
def reloadBroadcastSendersForWhichImWatching():
|
|
|
|
|
broadcastSendersForWhichImWatching.clear()
|
|
|
|
|
MyECSubscriptionCryptorObjects.clear()
|
2013-08-29 14:03:45 +02:00
|
|
|
|
queryreturn = sqlQuery('SELECT address FROM subscriptions where enabled=1')
|
2013-09-15 03:06:26 +02:00
|
|
|
|
logger.debug('reloading subscriptions...')
|
2013-05-02 17:53:54 +02:00
|
|
|
|
for row in queryreturn:
|
|
|
|
|
address, = row
|
2018-03-22 12:48:07 +01:00
|
|
|
|
# status
|
|
|
|
|
_, addressVersionNumber, streamNumber, hash = decodeAddress(address)
|
2013-05-02 17:53:54 +02:00
|
|
|
|
if addressVersionNumber == 2:
|
|
|
|
|
broadcastSendersForWhichImWatching[hash] = 0
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# Now, for all addresses, even version 2 addresses,
|
|
|
|
|
# we should create Cryptor objects in a dictionary which we will
|
|
|
|
|
# use to attempt to decrypt encrypted broadcast messages.
|
|
|
|
|
|
2013-09-15 03:06:26 +02:00
|
|
|
|
if addressVersionNumber <= 3:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
privEncryptionKey = hashlib.sha512(
|
|
|
|
|
encodeVarint(addressVersionNumber) +
|
|
|
|
|
encodeVarint(streamNumber) + hash
|
|
|
|
|
).digest()[:32]
|
|
|
|
|
MyECSubscriptionCryptorObjects[hash] = \
|
|
|
|
|
highlevelcrypto.makeCryptor(hexlify(privEncryptionKey))
|
2013-09-15 03:06:26 +02:00
|
|
|
|
else:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
doubleHashOfAddressData = hashlib.sha512(hashlib.sha512(
|
|
|
|
|
encodeVarint(addressVersionNumber) +
|
|
|
|
|
encodeVarint(streamNumber) + hash
|
|
|
|
|
).digest()).digest()
|
2013-09-15 03:06:26 +02:00
|
|
|
|
tag = doubleHashOfAddressData[32:]
|
|
|
|
|
privEncryptionKey = doubleHashOfAddressData[:32]
|
2017-09-21 17:24:51 +02:00
|
|
|
|
MyECSubscriptionCryptorObjects[tag] = \
|
|
|
|
|
highlevelcrypto.makeCryptor(hexlify(privEncryptionKey))
|
|
|
|
|
|
2013-05-02 17:53:54 +02:00
|
|
|
|
|
2013-06-11 00:53:15 +02:00
|
|
|
|
def fixPotentiallyInvalidUTF8Data(text):
|
|
|
|
|
try:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
unicode(text, 'utf-8')
|
2013-06-11 00:53:15 +02:00
|
|
|
|
return text
|
|
|
|
|
except:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
return 'Part of the message is corrupt. The message cannot be' \
|
|
|
|
|
' displayed the normal way.\n\n' + repr(text)
|
2013-07-14 22:12:59 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
|
|
|
|
# Checks sensitive file permissions for inappropriate umask
|
|
|
|
|
# during keys.dat creation. (Or unwise subsequent chmod.)
|
2013-07-10 10:43:18 +02:00
|
|
|
|
#
|
2013-06-27 12:44:49 +02:00
|
|
|
|
# Returns true iff file appears to have appropriate permissions.
|
2013-06-27 12:02:52 +02:00
|
|
|
|
def checkSensitiveFilePermissions(filename):
|
|
|
|
|
if sys.platform == 'win32':
|
|
|
|
|
# TODO: This might deserve extra checks by someone familiar with
|
|
|
|
|
# Windows systems.
|
2013-06-27 12:44:49 +02:00
|
|
|
|
return True
|
2013-11-29 01:20:16 +01:00
|
|
|
|
elif sys.platform[:7] == 'freebsd':
|
|
|
|
|
# FreeBSD file systems are the same as major Linux file systems
|
|
|
|
|
present_permissions = os.stat(filename)[0]
|
|
|
|
|
disallowed_permissions = stat.S_IRWXG | stat.S_IRWXO
|
|
|
|
|
return present_permissions & disallowed_permissions == 0
|
2013-06-27 12:02:52 +02:00
|
|
|
|
else:
|
2013-08-05 22:06:46 +02:00
|
|
|
|
try:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
# Skip known problems for non-Win32 filesystems
|
|
|
|
|
# without POSIX permissions.
|
|
|
|
|
fstype = subprocess.check_output(
|
|
|
|
|
'stat -f -c "%%T" %s' % (filename),
|
|
|
|
|
shell=True,
|
|
|
|
|
stderr=subprocess.STDOUT
|
|
|
|
|
)
|
2013-08-05 22:06:46 +02:00
|
|
|
|
if 'fuseblk' in fstype:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
logger.info(
|
|
|
|
|
'Skipping file permissions check for %s.'
|
|
|
|
|
' Filesystem fuseblk detected.', filename)
|
2013-08-05 22:06:46 +02:00
|
|
|
|
return True
|
|
|
|
|
except:
|
|
|
|
|
# Swallow exception here, but we might run into trouble later!
|
2013-08-13 02:32:13 +02:00
|
|
|
|
logger.error('Could not determine filesystem type. %s', filename)
|
2013-06-27 12:44:49 +02:00
|
|
|
|
present_permissions = os.stat(filename)[0]
|
|
|
|
|
disallowed_permissions = stat.S_IRWXG | stat.S_IRWXO
|
|
|
|
|
return present_permissions & disallowed_permissions == 0
|
2013-06-27 12:02:52 +02:00
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
2013-06-27 12:02:52 +02:00
|
|
|
|
# Fixes permissions on a sensitive file.
|
2013-06-27 12:44:49 +02:00
|
|
|
|
def fixSensitiveFilePermissions(filename, hasEnabledKeys):
|
|
|
|
|
if hasEnabledKeys:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
logger.warning(
|
|
|
|
|
'Keyfile had insecure permissions, and there were enabled'
|
|
|
|
|
' keys. The truly paranoid should stop using them immediately.')
|
2013-06-27 12:44:49 +02:00
|
|
|
|
else:
|
2017-09-21 17:24:51 +02:00
|
|
|
|
logger.warning(
|
|
|
|
|
'Keyfile had insecure permissions, but there were no enabled keys.'
|
|
|
|
|
)
|
2013-06-27 12:44:49 +02:00
|
|
|
|
try:
|
|
|
|
|
present_permissions = os.stat(filename)[0]
|
|
|
|
|
disallowed_permissions = stat.S_IRWXG | stat.S_IRWXO
|
2017-09-21 17:24:51 +02:00
|
|
|
|
allowed_permissions = ((1 << 32) - 1) ^ disallowed_permissions
|
2013-06-27 12:44:49 +02:00
|
|
|
|
new_permissions = (
|
|
|
|
|
allowed_permissions & present_permissions)
|
|
|
|
|
os.chmod(filename, new_permissions)
|
|
|
|
|
|
2013-07-08 22:21:29 +02:00
|
|
|
|
logger.info('Keyfile permissions automatically fixed.')
|
|
|
|
|
|
2017-09-21 17:24:51 +02:00
|
|
|
|
except Exception:
|
2013-07-08 22:21:29 +02:00
|
|
|
|
logger.exception('Keyfile permissions could not be fixed.')
|
2013-06-27 12:44:49 +02:00
|
|
|
|
raise
|
2017-09-21 17:24:51 +02:00
|
|
|
|
|
|
|
|
|
|
2014-09-15 08:34:33 +02:00
|
|
|
|
def openKeysFile():
|
|
|
|
|
if 'linux' in sys.platform:
|
2017-01-11 17:00:00 +01:00
|
|
|
|
subprocess.call(["xdg-open", state.appdata + 'keys.dat'])
|
2014-09-15 08:34:33 +02:00
|
|
|
|
else:
|
2017-01-11 17:00:00 +01:00
|
|
|
|
os.startfile(state.appdata + 'keys.dat')
|