This commit is contained in:
Bandie 2018-03-29 00:58:36 +02:00
parent ae3043b1de
commit 600524809c
Signed by: Bandie
GPG Key ID: C1E133BC65A822DD
9 changed files with 39 additions and 40 deletions

View File

@ -1,28 +1,28 @@
#!/bin/bash #!/bin/bash
## Server private key ## Server private key
echo -n "Where to save your server's key file? ($PWD/ding_server.key): " echo -n "Where to save your server's key file? ($PWD/dingd.key): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_server.key" save="$PWD/dingd.key"
fi fi
key=$save key=$save
openssl genrsa -out $save 4096 openssl genrsa -out $save 4096
## CSR ## CSR
echo -n "Where to save your Certificate Signing Request (CSR)? ($PWD/ding_server.csr): " echo -n "Where to save your Certificate Signing Request (CSR)? ($PWD/dingd.csr): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_server.csr" save="$PWD/dingd.csr"
fi fi
csr=$save csr=$save
echo -e "\033[01;33mPlease enter some information. THEY MUST BE DIFFERENT FROM THE CA's INFORMATION.\033[00m" echo -e "\033[01;33mPlease enter some information. THEY MUST BE DIFFERENT FROM THE CA's INFORMATION.\033[00m"
@ -50,14 +50,14 @@ else
loadCAkey="$PWD/CA.key" loadCAkey="$PWD/CA.key"
fi fi
echo -n "Where to save your signed server certificate? ($PWD/ding_server.crt): " echo -n "Where to save your signed server certificate? ($PWD/dingd.crt): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_server.crt" save="$PWD/dingd.crt"
fi fi
echo -n "How many days should the certificate be valid? (365): " echo -n "How many days should the certificate be valid? (365): "

View File

@ -1,28 +1,28 @@
#!/bin/bash #!/bin/bash
## Server private key ## Server private key
echo -n "Where to save your client's key file? ($PWD/ding_client.key): " echo -n "Where to save your client's key file? ($PWD/ding.key): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_client.key" save="$PWD/ding.key"
fi fi
key=$save key=$save
openssl genrsa -out $save 4096 openssl genrsa -out $save 4096
## CSR ## CSR
echo -n "Where to save your Certificate Signing Request (CSR)? ($PWD/ding_client.csr): " echo -n "Where to save your Certificate Signing Request (CSR)? ($PWD/ding.csr): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_client.csr" save="$PWD/ding.csr"
fi fi
csr=$save csr=$save
echo -e "\033[01;33mPlease enter some information. THEY MUST BE DIFFERENT FROM THE CA's AND SERVER's INFORMATION.\033[00m" echo -e "\033[01;33mPlease enter some information. THEY MUST BE DIFFERENT FROM THE CA's AND SERVER's INFORMATION.\033[00m"
@ -50,14 +50,14 @@ else
loadCAkey="$PWD/CA.key" loadCAkey="$PWD/CA.key"
fi fi
echo -n "Where to save your signed client certificate? ($PWD/ding_client.crt): " echo -n "Where to save your signed client certificate? ($PWD/ding.crt): "
read temp read temp
if [ -n "$temp" ] if [ -n "$temp" ]
then then
save=$temp save=$temp
else else
save="$PWD/ding_client.crt" save="$PWD/ding.crt"
fi fi
echo -n "How many days should the certificate be valid? (365): " echo -n "How many days should the certificate be valid? (365): "

View File

@ -28,12 +28,12 @@ Step 1 to 3 can only be run on UNIX or GNU/Linux.
1. Run `./1_generateCA.sh` to generate a CA. 1. Run `./1_generateCA.sh` to generate a CA.
2. Run `./2_generateServCert.sh` to generate a signed Server Certificate. 2. Run `./2_generateServCert.sh` to generate a signed Server Certificate.
3. Run `./3_generateClientCert.sh` to generate a signed Client Certificate. 3. Run `./3_generateClientCert.sh` to generate a signed Client Certificate.
4. Move `ding_client`, `ding_client.cfg`, `ding_client.crt`, `ding_client.key` and `CA.crt` to the computer which should be able to send commands to the server. 4. Move `ding`, `ding.cfg`, `ding.crt`, `ding.key` and `CA.crt` to the computer which should be able to send commands to the server.
* UNIX or GNU/Linux: Also move `ding_client.cfg` to that computer. * UNIX or GNU/Linux: Also move `ding.cfg` to that computer.
* Windows: Also move `ding_client.win.cfg` to that computer. * Windows: Also move `ding.win.cfg` to that computer.
5. Do some configuration on the server and client (`ding_server.cfg`, `ding_client.cfg` or `ding_server.win.cfg`, `ding_client.win.cfg` on Windows). 5. Do some configuration on the server and client (`dingd.cfg`, `ding.cfg` or `dingd.win.cfg`, `ding.win.cfg` on Windows).
6. Start the server using `./ding_server` or `python .\ding_server` on Windows. (You may want to put this in a tmux session. [Ctrl+B, D] ;) ). 6. Start the server using `./dingd` or `python .\dingd` on Windows. (You may want to put this in a tmux session. [Ctrl+B, D] ;) ).
7. Try out the client using `./ding_client <command>` òr `python .\ding_client <command>` on Windows. 7. Try out the client using `./ding <command>` òr `python .\ding <command>` on Windows.
## Optional: Cleartext password with timeout ## Optional: Cleartext password with timeout
@ -45,9 +45,9 @@ You might want to do something like `$ history -c` after sending the password vi
### How to enable the password ### How to enable the password
1. Open your `ding_server.cfg` or `ding_server.win.cfg`. 1. Open your `dingd.cfg` or `dingd.win.cfg`.
2. Set `pw_on=true`. 2. Set `pw_on=true`.
3. Set a password, like `password=abc def`. 3. Set a password, like `password=abc def`.
4. Set a password timeout: `pwtimeout=10` for 10 seconds. 4. Set a password timeout: `pwtimeout=10` for 10 seconds.
If you have a password with special characters as in spaces and the like, you may want to use quotation marks around your password. `./ding_client "abc def"` or `python .\ding_client "abc def"` on Windows. If you have a password with special characters as in spaces and the like, you may want to use quotation marks around your password. `./ding "abc def"` or `python .\ding "abc def"` on Windows.

View File

@ -13,9 +13,9 @@ exitcode = 1
def readConfig(): def readConfig():
if(os.name == 'nt'): if(os.name == 'nt'):
CONFIG = "ding_client.win.cfg" CONFIG = "ding.win.cfg"
else: else:
CONFIG = "ding_client.cfg" CONFIG = "ding.cfg"
cfg = configparser.SafeConfigParser() cfg = configparser.SafeConfigParser()
try: try:
@ -30,7 +30,7 @@ def readConfig():
certfile = cfg.get("Client", "certfile") certfile = cfg.get("Client", "certfile")
keyfile = cfg.get("Client", "keyfile") keyfile = cfg.get("Client", "keyfile")
except configparser.NoSectionError: except configparser.NoSectionError:
print("No suitable config found. Expecting some config in", CONFIG) print("No suitable config found. Expecting some config in", CONFIG, file=sys.stderr)
quit(3) quit(3)
@ -47,10 +47,10 @@ def send(conn, cmd):
print("Error. Server said: The command isn't set on the server.", file=sys.stderr) print("Error. Server said: The command isn't set on the server.", file=sys.stderr)
exitcode = 1 exitcode = 1
elif(buf == b"ERR CMD_ERR"): elif(buf == b"ERR CMD_ERR"):
print("Error. Server said: The command doesn't work because the file doesn't exist on the server.") print("Error. Server said: The command doesn't work because the file doesn't exist on the server.", file=sys.stderr)
exitcode = 2 exitcode = 2
elif(buf == b"ERR PW"): elif(buf == b"ERR PW"):
print("Error. Password required. The password was wrong.") print("Error. Password required. The password was wrong.", file=sys.stderr)
exitcode = 4 exitcode = 4
elif(b"OK PW" in buf): elif(b"OK PW" in buf):
bufr=str(buf.decode('utf-8')) bufr=str(buf.decode('utf-8'))

View File

@ -5,6 +5,6 @@ port=13573
cafile=CA.crt cafile=CA.crt
#Client Certificate/key signed by the CA above #Client Certificate/key signed by the CA above
certfile=ding_client.crt certfile=ding.crt
keyfile=ding_client.key keyfile=ding.key

View File

@ -5,6 +5,6 @@ port=13573
cafile=CA.crt cafile=CA.crt
#Client Certificate/key signed by the CA above #Client Certificate/key signed by the CA above
certfile=ding_client.crt certfile=ding.crt
keyfile=ding_client.key keyfile=ding.key

View File

@ -3,7 +3,7 @@
# Author: Bandie Canis # Author: Bandie Canis
# License: 2-Clause BSD license # License: 2-Clause BSD license
import ssl, socket, subprocess, time, os import ssl, socket, subprocess, time, os, sys
import configparser import configparser
@ -104,9 +104,9 @@ def init():
global CONFIG, host, port, cafile, certfile, keyfile, pw_on, password, pwtimeout, tmppw_on, context, bindsocket global CONFIG, host, port, cafile, certfile, keyfile, pw_on, password, pwtimeout, tmppw_on, context, bindsocket
if(os.name == 'nt'): if(os.name == 'nt'):
CONFIG = "ding_server.win.cfg" CONFIG = "dingd.win.cfg"
else: else:
CONFIG = "ding_server.cfg" CONFIG = "dingd.cfg"
cfg = configparser.SafeConfigParser() cfg = configparser.SafeConfigParser()
cfg.read(CONFIG) cfg.read(CONFIG)
@ -125,11 +125,10 @@ def init():
else: else:
pw_on = False pw_on = False
tmppw_on=pw_on tmppw_on=pw_on
except configparser.NoOptionError as e: except configparser.NoSectionError as e:
print("Error in configuration file:", e) print("Error in configuration file:", e, file=sys.stderr)
quit(1) quit(1)
try: try:
context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH, cafile=cafile) context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH, cafile=cafile)
context.load_cert_chain(certfile=certfile, keyfile=keyfile) context.load_cert_chain(certfile=certfile, keyfile=keyfile)
@ -156,7 +155,7 @@ def init():
print("Error: Can't bind for port number ", port, ". Permission denied.", sep="") print("Error: Can't bind for port number ", port, ". Permission denied.", sep="")
quit(1) quit(1)
print("Running ding server on ", host, ":", port, print("Running dingd on ", host, ":", port,
"\nConfig: ", CONFIG, "\nConfig: ", CONFIG,
"\nCAFile: ", cafile, "\nCAFile: ", cafile,
"\nCertfile: ", certfile, "\nCertfile: ", certfile,

View File

@ -7,10 +7,10 @@ port=13573
cafile=CA.crt cafile=CA.crt
# Server's certificate [signed by the CA above] # Server's certificate [signed by the CA above]
certfile=ding_server.crt certfile=dingd.crt
# Server's private key # Server's private key
keyfile=ding_server.key keyfile=dingd.key
## Optional cleartext password ## Optional cleartext password
# To unlock the commands you need to send the password before sending the command. # To unlock the commands you need to send the password before sending the command.

View File

@ -7,10 +7,10 @@ port=13573
cafile=CA.crt cafile=CA.crt
# Server's certificate [signed by the CA above] # Server's certificate [signed by the CA above]
certfile=ding_server.crt certfile=dingd.crt
# Server's private key # Server's private key
keyfile=ding_server.key keyfile=dingd.key
## Optional cleartext password ## Optional cleartext password
# To unlock the commands you need to send the password before sending the command. # To unlock the commands you need to send the password before sending the command.