2006-01-26 22:01:14 -05:00
|
|
|
#!/usr/bin/env python
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2009-07-19 22:45:02 -04:00
|
|
|
# Copyright (C) 2003-2007 Robey Pointer <robeypointer@gmail.com>
|
2005-02-28 03:06:08 -05:00
|
|
|
#
|
|
|
|
# This file is part of paramiko.
|
|
|
|
#
|
|
|
|
# Paramiko is free software; you can redistribute it and/or modify it under the
|
|
|
|
# terms of the GNU Lesser General Public License as published by the Free
|
|
|
|
# Software Foundation; either version 2.1 of the License, or (at your option)
|
|
|
|
# any later version.
|
|
|
|
#
|
2013-09-28 00:29:18 -04:00
|
|
|
# Paramiko is distributed in the hope that it will be useful, but WITHOUT ANY
|
2005-02-28 03:06:08 -05:00
|
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
|
|
|
|
# details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with Paramiko; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
|
|
|
|
|
2005-12-03 23:49:21 -05:00
|
|
|
|
2006-01-26 22:01:14 -05:00
|
|
|
import base64
|
2006-08-01 14:20:53 -04:00
|
|
|
from binascii import hexlify
|
2006-01-26 22:01:14 -05:00
|
|
|
import getpass
|
|
|
|
import os
|
|
|
|
import select
|
|
|
|
import socket
|
|
|
|
import sys
|
|
|
|
import time
|
|
|
|
import traceback
|
2005-12-03 23:49:21 -05:00
|
|
|
|
2003-11-10 03:49:50 -05:00
|
|
|
import paramiko
|
2013-10-30 19:19:30 -04:00
|
|
|
try:
|
|
|
|
import interactive
|
|
|
|
except ImportError:
|
|
|
|
from . import interactive
|
2003-11-04 03:34:24 -05:00
|
|
|
|
|
|
|
|
2006-01-26 22:01:14 -05:00
|
|
|
def agent_auth(transport, username):
|
|
|
|
"""
|
|
|
|
Attempt to authenticate to the given transport using any of the private
|
|
|
|
keys available from an SSH agent.
|
|
|
|
"""
|
|
|
|
|
2005-07-06 21:35:31 -04:00
|
|
|
agent = paramiko.Agent()
|
|
|
|
agent_keys = agent.get_keys()
|
2006-01-26 22:01:14 -05:00
|
|
|
if len(agent_keys) == 0:
|
|
|
|
return
|
|
|
|
|
|
|
|
for key in agent_keys:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('Trying ssh-agent key %s' % hexlify(key.get_fingerprint()))
|
2006-01-26 22:01:14 -05:00
|
|
|
try:
|
|
|
|
transport.auth_publickey(username, key)
|
2013-10-30 19:05:47 -04:00
|
|
|
print('... success!')
|
2006-01-26 22:01:14 -05:00
|
|
|
return
|
2006-07-23 16:41:16 -04:00
|
|
|
except paramiko.SSHException:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('... nope.')
|
2005-07-06 21:35:31 -04:00
|
|
|
|
2006-01-26 22:01:14 -05:00
|
|
|
|
|
|
|
def manual_auth(username, hostname):
|
2005-07-06 21:35:31 -04:00
|
|
|
default_auth = 'p'
|
|
|
|
auth = raw_input('Auth by (p)assword, (r)sa key, or (d)ss key? [%s] ' % default_auth)
|
|
|
|
if len(auth) == 0:
|
|
|
|
auth = default_auth
|
|
|
|
|
|
|
|
if auth == 'r':
|
2006-01-26 22:01:14 -05:00
|
|
|
default_path = os.path.join(os.environ['HOME'], '.ssh', 'id_rsa')
|
2005-07-06 21:35:31 -04:00
|
|
|
path = raw_input('RSA key [%s]: ' % default_path)
|
|
|
|
if len(path) == 0:
|
|
|
|
path = default_path
|
|
|
|
try:
|
|
|
|
key = paramiko.RSAKey.from_private_key_file(path)
|
|
|
|
except paramiko.PasswordRequiredException:
|
|
|
|
password = getpass.getpass('RSA key password: ')
|
|
|
|
key = paramiko.RSAKey.from_private_key_file(path, password)
|
2006-01-26 22:01:14 -05:00
|
|
|
t.auth_publickey(username, key)
|
2005-07-06 21:35:31 -04:00
|
|
|
elif auth == 'd':
|
2006-01-26 22:01:14 -05:00
|
|
|
default_path = os.path.join(os.environ['HOME'], '.ssh', 'id_dsa')
|
2005-07-06 21:35:31 -04:00
|
|
|
path = raw_input('DSS key [%s]: ' % default_path)
|
|
|
|
if len(path) == 0:
|
|
|
|
path = default_path
|
|
|
|
try:
|
|
|
|
key = paramiko.DSSKey.from_private_key_file(path)
|
|
|
|
except paramiko.PasswordRequiredException:
|
|
|
|
password = getpass.getpass('DSS key password: ')
|
|
|
|
key = paramiko.DSSKey.from_private_key_file(path, password)
|
2006-01-26 22:01:14 -05:00
|
|
|
t.auth_publickey(username, key)
|
2005-07-06 21:35:31 -04:00
|
|
|
else:
|
|
|
|
pw = getpass.getpass('Password for %s@%s: ' % (username, hostname))
|
2006-01-26 22:01:14 -05:00
|
|
|
t.auth_password(username, pw)
|
2003-11-04 03:34:24 -05:00
|
|
|
|
|
|
|
|
|
|
|
# setup logging
|
2004-04-05 15:36:40 -04:00
|
|
|
paramiko.util.log_to_file('demo.log')
|
2003-11-04 03:34:24 -05:00
|
|
|
|
|
|
|
username = ''
|
|
|
|
if len(sys.argv) > 1:
|
|
|
|
hostname = sys.argv[1]
|
|
|
|
if hostname.find('@') >= 0:
|
|
|
|
username, hostname = hostname.split('@')
|
|
|
|
else:
|
|
|
|
hostname = raw_input('Hostname: ')
|
|
|
|
if len(hostname) == 0:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Hostname required.')
|
2003-11-04 03:34:24 -05:00
|
|
|
sys.exit(1)
|
|
|
|
port = 22
|
|
|
|
if hostname.find(':') >= 0:
|
|
|
|
hostname, portstr = hostname.split(':')
|
|
|
|
port = int(portstr)
|
|
|
|
|
|
|
|
# now connect
|
|
|
|
try:
|
|
|
|
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
sock.connect((hostname, port))
|
|
|
|
except Exception, e:
|
|
|
|
print '*** Connect failed: ' + str(e)
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Connect failed: ' + str(e))
|
2003-11-04 03:34:24 -05:00
|
|
|
traceback.print_exc()
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
try:
|
2003-11-10 03:49:50 -05:00
|
|
|
t = paramiko.Transport(sock)
|
2006-01-26 22:13:02 -05:00
|
|
|
try:
|
|
|
|
t.start_client()
|
2006-07-23 16:41:16 -04:00
|
|
|
except paramiko.SSHException:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** SSH negotiation failed.')
|
2003-11-04 03:34:24 -05:00
|
|
|
sys.exit(1)
|
|
|
|
|
2005-07-13 22:19:13 -04:00
|
|
|
try:
|
|
|
|
keys = paramiko.util.load_host_keys(os.path.expanduser('~/.ssh/known_hosts'))
|
|
|
|
except IOError:
|
2005-08-17 11:54:29 -04:00
|
|
|
try:
|
|
|
|
keys = paramiko.util.load_host_keys(os.path.expanduser('~/ssh/known_hosts'))
|
|
|
|
except IOError:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Unable to open host keys file')
|
2005-08-17 11:54:29 -04:00
|
|
|
keys = {}
|
2005-07-13 22:19:13 -04:00
|
|
|
|
2006-01-27 13:19:25 -05:00
|
|
|
# check server's host key -- this is important.
|
2004-04-05 18:32:03 -04:00
|
|
|
key = t.get_remote_server_key()
|
2013-10-30 19:05:47 -04:00
|
|
|
if hostname not in keys:
|
|
|
|
print('*** WARNING: Unknown host key!')
|
|
|
|
elif key.get_name() not in keys[hostname]:
|
|
|
|
print('*** WARNING: Unknown host key!')
|
2004-10-18 00:54:27 -04:00
|
|
|
elif keys[hostname][key.get_name()] != key:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** WARNING: Host key has changed!!!')
|
2003-11-04 03:34:24 -05:00
|
|
|
sys.exit(1)
|
|
|
|
else:
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Host key OK.')
|
2003-11-04 03:34:24 -05:00
|
|
|
|
|
|
|
# get username
|
|
|
|
if username == '':
|
|
|
|
default_username = getpass.getuser()
|
|
|
|
username = raw_input('Username [%s]: ' % default_username)
|
|
|
|
if len(username) == 0:
|
|
|
|
username = default_username
|
|
|
|
|
2006-01-26 22:01:14 -05:00
|
|
|
agent_auth(t, username)
|
2005-07-06 21:35:31 -04:00
|
|
|
if not t.is_authenticated():
|
2006-01-26 22:01:14 -05:00
|
|
|
manual_auth(username, hostname)
|
2003-11-04 03:34:24 -05:00
|
|
|
if not t.is_authenticated():
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Authentication failed. :(')
|
2003-11-04 03:34:24 -05:00
|
|
|
t.close()
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
chan = t.open_session()
|
|
|
|
chan.get_pty()
|
|
|
|
chan.invoke_shell()
|
2013-10-30 19:05:47 -04:00
|
|
|
print('*** Here we go!\n')
|
2006-01-26 22:01:14 -05:00
|
|
|
interactive.interactive_shell(chan)
|
2003-11-04 03:34:24 -05:00
|
|
|
chan.close()
|
|
|
|
t.close()
|
|
|
|
|
2013-10-30 19:05:47 -04:00
|
|
|
except Exception:
|
|
|
|
e = sys.exc_info()[1]
|
|
|
|
print('*** Caught exception: ' + str(e.__class__) + ': ' + str(e))
|
2003-11-04 03:34:24 -05:00
|
|
|
traceback.print_exc()
|
|
|
|
try:
|
|
|
|
t.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
sys.exit(1)
|
|
|
|
|
2006-01-26 22:01:14 -05:00
|
|
|
|