2003-11-04 03:34:24 -05:00
|
|
|
#!/usr/bin/python
|
|
|
|
|
2003-12-30 17:24:21 -05:00
|
|
|
import sys, os, socket, threading, logging, traceback, base64
|
2003-11-10 03:49:50 -05:00
|
|
|
import paramiko
|
2003-11-04 03:34:24 -05:00
|
|
|
|
|
|
|
# setup logging
|
2003-11-10 03:49:50 -05:00
|
|
|
l = logging.getLogger("paramiko")
|
2003-11-04 03:34:24 -05:00
|
|
|
l.setLevel(logging.DEBUG)
|
|
|
|
if len(l.handlers) == 0:
|
2003-11-09 23:54:02 -05:00
|
|
|
f = open('demo_server.log', 'w')
|
2003-11-04 03:34:24 -05:00
|
|
|
lh = logging.StreamHandler(f)
|
|
|
|
lh.setFormatter(logging.Formatter('%(levelname)-.3s [%(asctime)s] %(name)s: %(message)s', '%Y%m%d:%H%M%S'))
|
|
|
|
l.addHandler(lh)
|
|
|
|
|
2003-12-24 15:49:38 -05:00
|
|
|
#host_key = paramiko.RSAKey()
|
2003-12-30 02:18:20 -05:00
|
|
|
#host_key.read_private_key_file('demo_rsa_key')
|
2003-12-24 15:49:38 -05:00
|
|
|
|
|
|
|
host_key = paramiko.DSSKey()
|
|
|
|
host_key.read_private_key_file('demo_dss_key')
|
2003-12-30 02:18:20 -05:00
|
|
|
|
2003-12-30 17:24:21 -05:00
|
|
|
print 'Read key: ' + paramiko.util.hexify(host_key.get_fingerprint())
|
2003-11-04 03:34:24 -05:00
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-11-10 03:49:50 -05:00
|
|
|
class ServerTransport(paramiko.Transport):
|
2003-12-30 17:24:21 -05:00
|
|
|
# 'data' is the output of base64.encodestring(str(key))
|
|
|
|
data = 'AAAAB3NzaC1yc2EAAAABIwAAAIEAyO4it3fHlmGZWJaGrfeHOVY7RWO3P9M7hpfAu7jJ2d7eothvfeuoRFtJwhUmZDluRdFyhFY/hFAh76PJKGAusIqIQKlkJxMCKDqIexkgHAfID/6mqvmnSJf0b5W8v5h2pI/stOSwTQ+pxVhwJ9ctYDhRSlF0iTUWT10hcuO4Ks8='
|
|
|
|
good_pub_key = paramiko.RSAKey(data=base64.decodestring(data))
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
def check_channel_request(self, kind, chanid):
|
|
|
|
if kind == 'session':
|
2003-11-09 23:54:02 -05:00
|
|
|
return ServerChannel(chanid)
|
2003-11-09 16:14:21 -05:00
|
|
|
return self.OPEN_FAILED_ADMINISTRATIVELY_PROHIBITED
|
|
|
|
|
|
|
|
def check_auth_password(self, username, password):
|
|
|
|
if (username == 'robey') and (password == 'foo'):
|
|
|
|
return self.AUTH_SUCCESSFUL
|
|
|
|
return self.AUTH_FAILED
|
|
|
|
|
2003-12-30 17:24:21 -05:00
|
|
|
def check_auth_publickey(self, username, key):
|
2004-01-04 04:29:13 -05:00
|
|
|
print 'Auth attempt with key: ' + paramiko.util.hexify(key.get_fingerprint())
|
2003-12-30 17:24:21 -05:00
|
|
|
if (username == 'robey') and (key == self.good_pub_key):
|
|
|
|
return self.AUTH_SUCCESSFUL
|
|
|
|
return self.AUTH_FAILED
|
|
|
|
|
2003-12-31 01:31:43 -05:00
|
|
|
def get_allowed_auths(self, username):
|
|
|
|
return 'password,publickey'
|
|
|
|
|
|
|
|
|
2003-11-10 03:49:50 -05:00
|
|
|
class ServerChannel(paramiko.Channel):
|
2003-11-09 23:54:02 -05:00
|
|
|
"Channel descendant that pretends to understand pty and shell requests"
|
|
|
|
|
|
|
|
def __init__(self, chanid):
|
2003-11-10 03:49:50 -05:00
|
|
|
paramiko.Channel.__init__(self, chanid)
|
2003-11-09 23:54:02 -05:00
|
|
|
self.event = threading.Event()
|
|
|
|
|
|
|
|
def check_pty_request(self, term, width, height, pixelwidth, pixelheight, modes):
|
|
|
|
return True
|
|
|
|
|
|
|
|
def check_shell_request(self):
|
|
|
|
self.event.set()
|
|
|
|
return True
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
# now connect
|
|
|
|
try:
|
|
|
|
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
|
|
|
sock.bind(('', 2200))
|
|
|
|
except Exception, e:
|
2004-01-04 04:29:13 -05:00
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
print '*** Bind failed: ' + str(e)
|
|
|
|
traceback.print_exc()
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
try:
|
|
|
|
sock.listen(100)
|
2003-12-24 15:49:38 -05:00
|
|
|
print 'Listening for connection ...'
|
2003-11-04 03:34:24 -05:00
|
|
|
client, addr = sock.accept()
|
|
|
|
except Exception, e:
|
|
|
|
print '*** Listen/accept failed: ' + str(e)
|
|
|
|
traceback.print_exc()
|
|
|
|
sys.exit(1)
|
|
|
|
|
2003-12-24 15:49:38 -05:00
|
|
|
print 'Got a connection!'
|
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
try:
|
|
|
|
event = threading.Event()
|
2003-11-09 16:14:21 -05:00
|
|
|
t = ServerTransport(client)
|
2003-12-27 22:20:42 -05:00
|
|
|
try:
|
|
|
|
t.load_server_moduli()
|
|
|
|
except:
|
|
|
|
print '(Failed to load moduli -- gex will be unsupported.)'
|
|
|
|
raise
|
2003-11-04 03:34:24 -05:00
|
|
|
t.add_server_key(host_key)
|
|
|
|
t.start_server(event)
|
2003-12-30 17:24:21 -05:00
|
|
|
while 1:
|
|
|
|
event.wait(0.1)
|
|
|
|
if not t.is_active():
|
|
|
|
print '*** SSH negotiation failed.'
|
|
|
|
sys.exit(1)
|
|
|
|
if event.isSet():
|
|
|
|
break
|
2003-11-04 03:34:24 -05:00
|
|
|
# print repr(t)
|
2003-11-09 16:14:21 -05:00
|
|
|
|
2003-11-10 01:52:35 -05:00
|
|
|
# wait for auth
|
2003-12-27 22:20:42 -05:00
|
|
|
chan = t.accept(20)
|
2003-11-10 01:52:35 -05:00
|
|
|
if chan is None:
|
|
|
|
print '*** No channel.'
|
|
|
|
sys.exit(1)
|
2003-12-27 22:20:42 -05:00
|
|
|
print 'Authenticated!'
|
2003-11-09 23:54:02 -05:00
|
|
|
chan.event.wait(10)
|
|
|
|
if not chan.event.isSet():
|
|
|
|
print '*** Client never asked for a shell.'
|
|
|
|
sys.exit(1)
|
|
|
|
|
2003-11-09 16:14:21 -05:00
|
|
|
chan.send('\r\n\r\nWelcome to my dorky little BBS!\r\n\r\n')
|
|
|
|
chan.send('We are on fire all the time! Hooray! Candy corn for everyone!\r\n')
|
|
|
|
chan.send('Happy birthday to Robot Dave!\r\n\r\n')
|
|
|
|
chan.send('Username: ')
|
|
|
|
f = chan.makefile('rU')
|
|
|
|
username = f.readline().strip('\r\n')
|
|
|
|
chan.send('\r\nI don\'t like you, ' + username + '.\r\n')
|
|
|
|
chan.close()
|
|
|
|
|
2003-11-04 03:34:24 -05:00
|
|
|
except Exception, e:
|
|
|
|
print '*** Caught exception: ' + str(e.__class__) + ': ' + str(e)
|
|
|
|
traceback.print_exc()
|
|
|
|
try:
|
|
|
|
t.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
sys.exit(1)
|
|
|
|
|