2006-01-26 22:13:02 -05:00
|
|
|
#!/usr/bin/env python
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2009-07-19 22:45:02 -04:00
|
|
|
# Copyright (C) 2003-2007 Robey Pointer <robeypointer@gmail.com>
|
2005-02-28 03:06:08 -05:00
|
|
|
#
|
|
|
|
# This file is part of paramiko.
|
|
|
|
#
|
|
|
|
# Paramiko is free software; you can redistribute it and/or modify it under the
|
|
|
|
# terms of the GNU Lesser General Public License as published by the Free
|
|
|
|
# Software Foundation; either version 2.1 of the License, or (at your option)
|
|
|
|
# any later version.
|
|
|
|
#
|
2013-09-28 00:29:18 -04:00
|
|
|
# Paramiko is distributed in the hope that it will be useful, but WITHOUT ANY
|
2005-02-28 03:06:08 -05:00
|
|
|
# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
|
|
|
|
# details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with Paramiko; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
# 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
|
|
|
|
|
2006-01-26 22:13:02 -05:00
|
|
|
import base64
|
2006-08-01 14:20:53 -04:00
|
|
|
from binascii import hexlify
|
2006-01-26 22:13:02 -05:00
|
|
|
import os
|
|
|
|
import socket
|
|
|
|
import sys
|
|
|
|
import threading
|
|
|
|
import traceback
|
|
|
|
|
2003-11-10 03:49:50 -05:00
|
|
|
import paramiko
|
2013-11-02 23:18:18 -04:00
|
|
|
from paramiko.py3compat import b, u, decodebytes
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2006-01-26 22:13:02 -05:00
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
# setup logging
|
2004-04-06 04:16:02 -04:00
|
|
|
paramiko.util.log_to_file('demo_server.log')
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2006-01-26 22:13:02 -05:00
|
|
|
host_key = paramiko.RSAKey(filename='test_rsa.key')
|
|
|
|
#host_key = paramiko.DSSKey(filename='test_dss.key')
|
2003-12-30 02:18:20 -05:00
|
|
|
|
2013-10-31 18:35:35 -04:00
|
|
|
print('Read key: ' + u(hexlify(host_key.get_fingerprint())))
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2004-08-26 20:57:40 -04:00
|
|
|
class Server (paramiko.ServerInterface):
|
2003-12-30 17:24:21 -05:00
|
|
|
# 'data' is the output of base64.encodestring(str(key))
|
2006-01-26 22:13:02 -05:00
|
|
|
# (using the "user_rsa_key" files)
|
2013-10-31 18:35:35 -04:00
|
|
|
data = b('AAAAB3NzaC1yc2EAAAABIwAAAIEAyO4it3fHlmGZWJaGrfeHOVY7RWO3P9M7hp' + \
|
|
|
|
'fAu7jJ2d7eothvfeuoRFtJwhUmZDluRdFyhFY/hFAh76PJKGAusIqIQKlkJxMC' + \
|
|
|
|
'KDqIexkgHAfID/6mqvmnSJf0b5W8v5h2pI/stOSwTQ+pxVhwJ9ctYDhRSlF0iT' + \
|
|
|
|
'UWT10hcuO4Ks8=')
|
2013-11-02 23:18:18 -04:00
|
|
|
good_pub_key = paramiko.RSAKey(data=decodebytes(data))
|
2003-12-30 17:24:21 -05:00
|
|
|
|
2004-09-03 18:39:20 -04:00
|
|
|
def __init__(self):
|
|
|
|
self.event = threading.Event()
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
def check_channel_request(self, kind, chanid):
|
|
|
|
if kind == 'session':
|
2004-09-03 18:39:20 -04:00
|
|
|
return paramiko.OPEN_SUCCEEDED
|
|
|
|
return paramiko.OPEN_FAILED_ADMINISTRATIVELY_PROHIBITED
|
2003-11-09 16:14:21 -05:00
|
|
|
|
|
|
|
def check_auth_password(self, username, password):
|
|
|
|
if (username == 'robey') and (password == 'foo'):
|
2004-09-03 18:39:20 -04:00
|
|
|
return paramiko.AUTH_SUCCESSFUL
|
|
|
|
return paramiko.AUTH_FAILED
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-12-30 17:24:21 -05:00
|
|
|
def check_auth_publickey(self, username, key):
|
2013-10-31 18:35:35 -04:00
|
|
|
print('Auth attempt with key: ' + u(hexlify(key.get_fingerprint())))
|
2003-12-30 17:24:21 -05:00
|
|
|
if (username == 'robey') and (key == self.good_pub_key):
|
2004-09-03 18:39:20 -04:00
|
|
|
return paramiko.AUTH_SUCCESSFUL
|
|
|
|
return paramiko.AUTH_FAILED
|
2003-12-30 17:24:21 -05:00
|
|
|
|
2003-12-31 01:31:43 -05:00
|
|
|
def get_allowed_auths(self, username):
|
|
|
|
return 'password,publickey'
|
|
|
|
|
2004-09-03 18:39:20 -04:00
|
|
|
def check_channel_shell_request(self, channel):
|
|
|
|
self.event.set()
|
2003-11-09 23:54:02 -05:00
|
|
|
return True
|
|
|
|
|
2004-09-03 18:39:20 -04:00
|
|
|
def check_channel_pty_request(self, channel, term, width, height, pixelwidth,
|
|
|
|
pixelheight, modes):
|
2003-11-09 23:54:02 -05:00
|
|
|
return True
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
# now connect
|
|
|
|
try:
|
|
|
|
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
sock.bind(('', 2200))
|
2013-10-31 18:35:35 -04:00
|
|
|
except Exception:
|
|
|
|
e = sys.exc_info()[1]
|
|
|
|
print('*** Bind failed: ' + str(e))
|
2003-11-04 03:34:24 -05:00
|
|
|
traceback.print_exc()
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
try:
|
|
|
|
sock.listen(100)
|
2013-10-31 18:35:35 -04:00
|
|
|
print('Listening for connection ...')
|
2003-11-04 03:34:24 -05:00
|
|
|
client, addr = sock.accept()
|
2013-10-31 18:35:35 -04:00
|
|
|
except Exception:
|
|
|
|
e = sys.exc_info()[1]
|
|
|
|
print('*** Listen/accept failed: ' + str(e))
|
2003-11-04 03:34:24 -05:00
|
|
|
traceback.print_exc()
|
|
|
|
sys.exit(1)
|
|
|
|
|
2013-10-31 18:35:35 -04:00
|
|
|
print('Got a connection!')
|
2003-12-24 15:49:38 -05:00
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
try:
|
2004-08-26 20:57:40 -04:00
|
|
|
t = paramiko.Transport(client)
|
2003-12-27 22:20:42 -05:00
|
|
|
try:
|
|
|
|
t.load_server_moduli()
|
|
|
|
except:
|
2013-10-31 18:35:35 -04:00
|
|
|
print('(Failed to load moduli -- gex will be unsupported.)')
|
2003-12-27 22:20:42 -05:00
|
|
|
raise
|
2003-11-04 03:34:24 -05:00
|
|
|
t.add_server_key(host_key)
|
2004-09-03 18:39:20 -04:00
|
|
|
server = Server()
|
2006-01-26 22:13:02 -05:00
|
|
|
try:
|
|
|
|
t.start_server(server=server)
|
2013-10-31 18:35:35 -04:00
|
|
|
except paramiko.SSHException:
|
|
|
|
print('*** SSH negotiation failed.')
|
2006-01-26 22:13:02 -05:00
|
|
|
sys.exit(1)
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-11-10 01:52:35 -05:00
|
|
|
# wait for auth
|
2003-12-27 22:20:42 -05:00
|
|
|
chan = t.accept(20)
|
2003-11-10 01:52:35 -05:00
|
|
|
if chan is None:
|
2013-10-31 18:35:35 -04:00
|
|
|
print('*** No channel.')
|
2003-11-10 01:52:35 -05:00
|
|
|
sys.exit(1)
|
2013-10-31 18:35:35 -04:00
|
|
|
print('Authenticated!')
|
2006-01-26 22:13:02 -05:00
|
|
|
|
2004-09-03 18:39:20 -04:00
|
|
|
server.event.wait(10)
|
|
|
|
if not server.event.isSet():
|
2013-10-31 18:35:35 -04:00
|
|
|
print('*** Client never asked for a shell.')
|
2003-11-09 23:54:02 -05:00
|
|
|
sys.exit(1)
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
chan.send('\r\n\r\nWelcome to my dorky little BBS!\r\n\r\n')
|
|
|
|
chan.send('We are on fire all the time! Hooray! Candy corn for everyone!\r\n')
|
|
|
|
chan.send('Happy birthday to Robot Dave!\r\n\r\n')
|
|
|
|
chan.send('Username: ')
|
|
|
|
f = chan.makefile('rU')
|
|
|
|
username = f.readline().strip('\r\n')
|
|
|
|
chan.send('\r\nI don\'t like you, ' + username + '.\r\n')
|
|
|
|
chan.close()
|
|
|
|
|
2013-10-31 18:35:35 -04:00
|
|
|
except Exception:
|
|
|
|
e = sys.exc_info()[1]
|
|
|
|
print('*** Caught exception: ' + str(e.__class__) + ': ' + str(e))
|
2003-11-04 03:34:24 -05:00
|
|
|
traceback.print_exc()
|
|
|
|
try:
|
|
|
|
t.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
sys.exit(1)
|
|
|
|
|