2018-01-18 23:25:10 +00:00
|
|
|
'''
|
|
|
|
Onionr - P2P Microblogging Platform & Social network
|
|
|
|
|
|
|
|
Netcontroller library, used to control/work with Tor/I2P and send requests through them
|
|
|
|
'''
|
|
|
|
'''
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
'''
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2019-01-08 05:51:39 +00:00
|
|
|
import subprocess, os, random, sys, logger, time, signal, config, base64, socket
|
2018-09-05 04:06:17 +00:00
|
|
|
from stem.control import Controller
|
2018-05-19 22:11:51 +00:00
|
|
|
from onionrblockapi import Block
|
2018-09-07 18:57:20 +00:00
|
|
|
from dependencies import secrets
|
2019-01-08 05:51:39 +00:00
|
|
|
|
|
|
|
def getOpenPort():
|
|
|
|
# taken from (but modified) https://stackoverflow.com/a/2838309
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
|
|
s.bind(("127.0.0.1",0))
|
|
|
|
s.listen(1)
|
|
|
|
port = s.getsockname()[1]
|
|
|
|
s.close()
|
|
|
|
return port
|
2018-01-18 23:25:10 +00:00
|
|
|
class NetController:
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
This class handles hidden service setup on Tor and I2P
|
2018-01-18 23:25:10 +00:00
|
|
|
'''
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-12-09 17:29:39 +00:00
|
|
|
def __init__(self, hsPort, apiServerIP='127.0.0.1'):
|
2018-09-26 04:58:11 +00:00
|
|
|
try:
|
|
|
|
self.dataDir = os.environ['ONIONR_HOME']
|
|
|
|
if not self.dataDir.endswith('/'):
|
|
|
|
self.dataDir += '/'
|
|
|
|
except KeyError:
|
|
|
|
self.dataDir = 'data/'
|
|
|
|
|
|
|
|
self.torConfigLocation = self.dataDir + 'torrc'
|
2018-01-18 23:25:10 +00:00
|
|
|
self.readyState = False
|
2019-01-08 05:51:39 +00:00
|
|
|
self.socksPort = getOpenPort()
|
2018-01-19 09:16:38 +00:00
|
|
|
self.hsPort = hsPort
|
2018-01-27 08:43:36 +00:00
|
|
|
self._torInstnace = ''
|
2018-01-19 21:28:34 +00:00
|
|
|
self.myID = ''
|
2018-12-09 17:29:39 +00:00
|
|
|
self.apiServerIP = apiServerIP
|
2018-09-05 04:06:17 +00:00
|
|
|
|
|
|
|
if os.path.exists('./tor'):
|
|
|
|
self.torBinary = './tor'
|
|
|
|
elif os.path.exists('/usr/bin/tor'):
|
|
|
|
self.torBinary = '/usr/bin/tor'
|
|
|
|
else:
|
|
|
|
self.torBinary = 'tor'
|
|
|
|
|
2018-08-19 04:07:09 +00:00
|
|
|
config.reload()
|
2018-01-27 03:42:20 +00:00
|
|
|
'''
|
2018-02-04 03:44:29 +00:00
|
|
|
if os.path.exists(self.torConfigLocation):
|
|
|
|
torrc = open(self.torConfigLocation, 'r')
|
|
|
|
if not str(self.hsPort) in torrc.read():
|
|
|
|
os.remove(self.torConfigLocation)
|
|
|
|
torrc.close()
|
2018-01-27 03:42:20 +00:00
|
|
|
'''
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-18 23:25:10 +00:00
|
|
|
return
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-18 23:25:10 +00:00
|
|
|
def generateTorrc(self):
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Generate a torrc file for our tor instance
|
|
|
|
'''
|
2018-08-19 04:07:09 +00:00
|
|
|
hsVer = '# v2 onions'
|
2018-12-09 17:29:39 +00:00
|
|
|
if config.get('tor.v3onions'):
|
2018-08-19 04:07:09 +00:00
|
|
|
hsVer = 'HiddenServiceVersion 3'
|
2019-01-08 05:51:39 +00:00
|
|
|
logger.debug('Using v3 onions')
|
2018-09-05 04:06:17 +00:00
|
|
|
|
2018-01-19 09:16:38 +00:00
|
|
|
if os.path.exists(self.torConfigLocation):
|
|
|
|
os.remove(self.torConfigLocation)
|
2018-09-05 04:06:17 +00:00
|
|
|
|
|
|
|
# Set the Tor control password. Meant to make it harder to manipulate our Tor instance
|
|
|
|
plaintext = base64.b64encode(os.urandom(50)).decode()
|
|
|
|
config.set('tor.controlpassword', plaintext, savefile=True)
|
2018-09-20 04:35:26 +00:00
|
|
|
config.set('tor.socksport', self.socksPort, savefile=True)
|
2018-09-05 04:06:17 +00:00
|
|
|
|
2019-01-08 05:51:39 +00:00
|
|
|
controlPort = getOpenPort()
|
2018-09-07 18:57:20 +00:00
|
|
|
|
2018-09-20 17:41:34 +00:00
|
|
|
config.set('tor.controlPort', controlPort, savefile=True)
|
|
|
|
|
2018-09-05 04:06:17 +00:00
|
|
|
hashedPassword = subprocess.Popen([self.torBinary, '--hash-password', plaintext], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
|
|
for line in iter(hashedPassword.stdout.readline, b''):
|
|
|
|
password = line.decode()
|
2018-09-09 05:12:41 +00:00
|
|
|
if 'warn' not in password:
|
|
|
|
break
|
2018-09-05 04:06:17 +00:00
|
|
|
|
2018-01-20 00:59:05 +00:00
|
|
|
torrcData = '''SocksPort ''' + str(self.socksPort) + '''
|
2018-09-26 04:58:11 +00:00
|
|
|
DataDirectory ''' + self.dataDir + '''tordata/
|
2018-09-05 04:06:17 +00:00
|
|
|
CookieAuthentication 1
|
2018-09-07 18:57:20 +00:00
|
|
|
ControlPort ''' + str(controlPort) + '''
|
2018-09-05 04:06:17 +00:00
|
|
|
HashedControlPassword ''' + str(password) + '''
|
2018-01-18 23:25:10 +00:00
|
|
|
'''
|
2018-12-09 17:29:39 +00:00
|
|
|
if config.get('general.security_level') == 0:
|
|
|
|
torrcData += '''\nHiddenServiceDir ''' + self.dataDir + '''hs/
|
|
|
|
\n''' + hsVer + '''\n
|
|
|
|
HiddenServicePort 80 ''' + self.apiServerIP + ''':''' + str(self.hsPort)
|
|
|
|
|
2018-01-19 09:16:38 +00:00
|
|
|
torrc = open(self.torConfigLocation, 'w')
|
|
|
|
torrc.write(torrcData)
|
|
|
|
torrc.close()
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-18 23:25:10 +00:00
|
|
|
return
|
|
|
|
|
|
|
|
def startTor(self):
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Start Tor with onion service on port 80 & socks proxy on random port
|
2018-01-20 00:59:05 +00:00
|
|
|
'''
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-19 21:28:34 +00:00
|
|
|
self.generateTorrc()
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-28 01:53:24 +00:00
|
|
|
if os.path.exists('./tor'):
|
2018-09-05 04:06:17 +00:00
|
|
|
self.torBinary = './tor'
|
2018-03-03 07:35:13 +00:00
|
|
|
elif os.path.exists('/usr/bin/tor'):
|
2018-09-05 04:06:17 +00:00
|
|
|
self.torBinary = '/usr/bin/tor'
|
2018-01-28 01:53:24 +00:00
|
|
|
else:
|
2018-09-05 04:06:17 +00:00
|
|
|
self.torBinary = 'tor'
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-28 01:53:24 +00:00
|
|
|
try:
|
2018-09-05 04:06:17 +00:00
|
|
|
tor = subprocess.Popen([self.torBinary, '-f', self.torConfigLocation], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
2018-01-28 01:53:24 +00:00
|
|
|
except FileNotFoundError:
|
2018-01-28 04:43:54 +00:00
|
|
|
logger.fatal("Tor was not found in your path or the Onionr directory. Please install Tor and try again.")
|
2018-01-28 01:53:24 +00:00
|
|
|
sys.exit(1)
|
2018-02-22 09:33:30 +00:00
|
|
|
else:
|
|
|
|
# Test Tor Version
|
2018-09-05 04:06:17 +00:00
|
|
|
torVersion = subprocess.Popen([self.torBinary, '--version'], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
2018-02-22 09:33:30 +00:00
|
|
|
for line in iter(torVersion.stdout.readline, b''):
|
|
|
|
if 'Tor 0.2.' in line.decode():
|
|
|
|
logger.warn("Running 0.2.x Tor series, no support for v3 onion peers")
|
|
|
|
break
|
|
|
|
torVersion.kill()
|
|
|
|
|
2018-01-20 00:59:05 +00:00
|
|
|
# wait for tor to get to 100% bootstrap
|
2018-05-18 06:22:16 +00:00
|
|
|
try:
|
|
|
|
for line in iter(tor.stdout.readline, b''):
|
|
|
|
if 'Bootstrapped 100%: Done' in line.decode():
|
|
|
|
break
|
|
|
|
elif 'Opening Socks listener' in line.decode():
|
|
|
|
logger.debug(line.decode().replace('\n', ''))
|
|
|
|
else:
|
2018-08-06 07:50:08 +00:00
|
|
|
logger.fatal('Failed to start Tor. Maybe a stray instance of Tor used by Onionr is still running?')
|
2018-05-18 06:22:16 +00:00
|
|
|
return False
|
|
|
|
except KeyboardInterrupt:
|
2018-11-11 03:25:40 +00:00
|
|
|
logger.fatal('Got keyboard interrupt.', timestamp = false, level = logger.LEVEL_IMPORTANT)
|
2018-01-28 01:53:24 +00:00
|
|
|
return False
|
2018-12-09 17:29:39 +00:00
|
|
|
|
2018-06-01 04:25:28 +00:00
|
|
|
logger.debug('Finished starting Tor.', timestamp=True)
|
2018-01-19 21:28:34 +00:00
|
|
|
self.readyState = True
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-12-09 17:29:39 +00:00
|
|
|
try:
|
|
|
|
myID = open(self.dataDir + 'hs/hostname', 'r')
|
|
|
|
self.myID = myID.read().replace('\n', '')
|
|
|
|
myID.close()
|
|
|
|
except FileNotFoundError:
|
|
|
|
self.myID = ""
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-09-26 04:58:11 +00:00
|
|
|
torPidFile = open(self.dataDir + 'torPid.txt', 'w')
|
2018-01-27 08:43:36 +00:00
|
|
|
torPidFile.write(str(tor.pid))
|
|
|
|
torPidFile.close()
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-28 01:53:24 +00:00
|
|
|
return True
|
2018-02-04 03:44:29 +00:00
|
|
|
|
2018-01-27 08:43:36 +00:00
|
|
|
def killTor(self):
|
2018-02-04 03:44:29 +00:00
|
|
|
'''
|
|
|
|
Properly kill tor based on pid saved to file
|
|
|
|
'''
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-27 08:43:36 +00:00
|
|
|
try:
|
2018-09-26 04:58:11 +00:00
|
|
|
pid = open(self.dataDir + 'torPid.txt', 'r')
|
2018-01-27 08:43:36 +00:00
|
|
|
pidN = pid.read()
|
|
|
|
pid.close()
|
|
|
|
except FileNotFoundError:
|
|
|
|
return
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-01-27 08:43:36 +00:00
|
|
|
try:
|
|
|
|
int(pidN)
|
|
|
|
except:
|
|
|
|
return
|
2018-03-03 07:35:13 +00:00
|
|
|
|
2018-02-21 02:44:56 +00:00
|
|
|
try:
|
|
|
|
os.kill(int(pidN), signal.SIGTERM)
|
2018-09-26 04:58:11 +00:00
|
|
|
os.remove(self.dataDir + 'torPid.txt')
|
2018-02-21 02:44:56 +00:00
|
|
|
except ProcessLookupError:
|
|
|
|
pass
|
|
|
|
except FileNotFoundError:
|
|
|
|
pass
|
2018-02-04 03:44:29 +00:00
|
|
|
|
|
|
|
return
|