sparoid 1.0.1 → 1.0.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +1 -0
- data/CHANGELOG.md +24 -1
- data/lib/sparoid.rb +44 -31
- data/lib/sparoid/cli.rb +26 -13
- data/lib/sparoid/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a9c9e31643c35e5466c71be88339a2c7999e401d893b6c7364597380def920cf
|
4
|
+
data.tar.gz: 237a5a03c2b3a306b25ad947754ce92acb866dcf2985650e27720773edc1f39e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a417c0b53950536d98a43f417690952e2b4bf41b3bcb72b13e8bd52e367f9a0a814b7e10ce9072b57098b48cd8ee36c41166f354f6eb6b0782430e4a945e7bf3
|
7
|
+
data.tar.gz: fc30ef678295a18379cd770840f702c2c328047fcbe9bbaa6fd65514c95105a29b88fd946a0c7bcf0cf93703dba2a6cd547a81ec6dc9c31e73f7bf06626e9c45
|
data/.gitignore
CHANGED
data/CHANGELOG.md
CHANGED
@@ -1,4 +1,27 @@
|
|
1
|
-
## [
|
1
|
+
## [1.0.6] - 2021-04-13
|
2
|
+
|
3
|
+
- Use static IP for opendns resolver, saves one DNS lookup
|
4
|
+
|
5
|
+
## [1.0.5] - 2021-04-12
|
6
|
+
|
7
|
+
- Prefix all logging with `Sparoid: `
|
8
|
+
|
9
|
+
## [1.0.4] - 2021-03-25
|
10
|
+
|
11
|
+
- Only warn if config is missing when connecting with CLI
|
12
|
+
|
13
|
+
## [1.0.3] - 2021-03-17
|
14
|
+
|
15
|
+
- Nicer error handling in CLI, remove --fdpass option
|
16
|
+
|
17
|
+
## [1.0.2] - 2021-03-15
|
18
|
+
|
19
|
+
- `sparoid send` renamed to `sparoid auth`
|
20
|
+
- `sparoid connect [host] [port]` added for automatic fd passing
|
21
|
+
|
22
|
+
## [1.0.1] - 2021-03-12
|
23
|
+
|
24
|
+
- --fdpass option to send
|
2
25
|
|
3
26
|
## [1.0.0] - 2021-03-11
|
4
27
|
|
data/lib/sparoid.rb
CHANGED
@@ -7,20 +7,41 @@ require "resolv"
|
|
7
7
|
|
8
8
|
# Single Packet Authorisation client
|
9
9
|
module Sparoid
|
10
|
-
|
10
|
+
extend self
|
11
|
+
|
12
|
+
# Send an authorization packet
|
13
|
+
def auth(key, hmac_key, host, port)
|
11
14
|
msg = message(public_ip)
|
12
15
|
data = prefix_hmac(hmac_key, encrypt(key, msg))
|
13
|
-
|
16
|
+
sendmsg(host, port, data)
|
14
17
|
end
|
15
18
|
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
19
|
+
# Generate new aes and hmac keys, print to stdout
|
20
|
+
def keygen
|
21
|
+
cipher = OpenSSL::Cipher.new("aes-256-cbc")
|
22
|
+
key = cipher.random_key.unpack1("H*")
|
23
|
+
hmac_key = OpenSSL::Random.random_bytes(32).unpack1("H*")
|
24
|
+
puts "key = #{key}"
|
25
|
+
puts "hmac-key = #{hmac_key}"
|
26
|
+
end
|
27
|
+
|
28
|
+
# Connect to a TCP server and pass the FD to the parent
|
29
|
+
def fdpass(host, port, connect_timeout: 20)
|
30
|
+
tcp = Socket.tcp host, port, connect_timeout: connect_timeout
|
31
|
+
parent = Socket.for_fd(1)
|
32
|
+
parent.sendmsg "\0", 0, nil, Socket::AncillaryData.unix_rights(tcp)
|
33
|
+
end
|
34
|
+
|
35
|
+
private
|
36
|
+
|
37
|
+
def sendmsg(host, port, data)
|
38
|
+
UDPSocket.open do |socket|
|
39
|
+
socket.connect host, port
|
40
|
+
socket.sendmsg data, 0
|
41
|
+
end
|
21
42
|
end
|
22
43
|
|
23
|
-
def
|
44
|
+
def encrypt(key, data)
|
24
45
|
key = [key].pack("H*") # hexstring to bytes
|
25
46
|
raise ArgumentError, "Key must be 32 bytes hex encoded" if key.bytesize != 32
|
26
47
|
|
@@ -34,7 +55,7 @@ module Sparoid
|
|
34
55
|
output << cipher.final
|
35
56
|
end
|
36
57
|
|
37
|
-
def
|
58
|
+
def prefix_hmac(hmac_key, data)
|
38
59
|
hmac_key = [hmac_key].pack("H*") # hexstring to bytes
|
39
60
|
raise ArgumentError, "HMAC key must be 32 bytes hex encoded" if hmac_key.bytesize != 32
|
40
61
|
|
@@ -42,37 +63,29 @@ module Sparoid
|
|
42
63
|
hmac + data
|
43
64
|
end
|
44
65
|
|
45
|
-
def
|
66
|
+
def message(ip)
|
46
67
|
version = 1
|
47
68
|
ts = (Time.now.utc.to_f * 1000).floor
|
48
69
|
nounce = OpenSSL::Random.random_bytes(16)
|
49
70
|
[version, ts, nounce, ip.address].pack("Nq>a16a4")
|
50
71
|
end
|
51
72
|
|
52
|
-
def
|
53
|
-
Resolv::DNS.open(nameserver: ["
|
54
|
-
dns.
|
55
|
-
case resolv
|
56
|
-
when Resolv::IPv4 then return resolv
|
57
|
-
end
|
58
|
-
end
|
59
|
-
raise Error, "No public IPv4 address found"
|
73
|
+
def public_ip
|
74
|
+
Resolv::DNS.open(nameserver: ["208.67.222.222", "208.67.220.220"]) do |dns|
|
75
|
+
dns.getresource("myip.opendns.com", Resolv::DNS::Resource::IN::A).address
|
60
76
|
end
|
61
77
|
end
|
62
78
|
|
63
|
-
|
64
|
-
cipher = OpenSSL::Cipher.new("aes-256-cbc")
|
65
|
-
key = cipher.random_key.unpack1("H*")
|
66
|
-
hmac_key = OpenSSL::Random.random_bytes(32).unpack1("H*")
|
67
|
-
puts "key = #{key}"
|
68
|
-
puts "hmac-key = #{hmac_key}"
|
69
|
-
end
|
79
|
+
class Error < StandardError; end
|
70
80
|
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
parent.sendmsg "\0", 0, nil, Socket::AncillaryData.unix_rights(ssh)
|
75
|
-
end
|
81
|
+
# Instance of SPAroid that only resolved public_ip once
|
82
|
+
class Instance
|
83
|
+
include Sparoid
|
76
84
|
|
77
|
-
|
85
|
+
private
|
86
|
+
|
87
|
+
def public_ip
|
88
|
+
@public_ip ||= super
|
89
|
+
end
|
90
|
+
end
|
78
91
|
end
|
data/lib/sparoid/cli.rb
CHANGED
@@ -6,19 +6,27 @@ require_relative "../sparoid"
|
|
6
6
|
module Sparoid
|
7
7
|
# CLI
|
8
8
|
class CLI < Thor
|
9
|
-
desc "
|
10
|
-
method_option :config, desc: "Path to a config file, INI format, with key and hmac-key"
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
9
|
+
desc "auth HOST [PORT]", "Send a authorization packet"
|
10
|
+
method_option :config, desc: "Path to a config file, INI format, with key and hmac-key", default: "~/.sparoid.ini"
|
11
|
+
def auth(host, port = 8484)
|
12
|
+
send_auth(host, port, options[:config])
|
13
|
+
rescue Errno::ENOENT
|
14
|
+
abort "Sparoid: Config not found"
|
15
|
+
rescue StandardError => e
|
16
|
+
abort "Sparoid: #{e.message}"
|
17
|
+
end
|
18
18
|
|
19
|
-
|
20
|
-
|
21
|
-
|
19
|
+
desc "connect HOST PORT [SPA-PORT]", "Send a SPA, TCP connect, and then pass the FD back to the parent"
|
20
|
+
method_option :config, desc: "Path to a config file, INI format, with key and hmac-key", default: "~/.sparoid.ini"
|
21
|
+
def connect(host, port, spa_port = 8484)
|
22
|
+
begin
|
23
|
+
send_auth(host, spa_port, options[:config])
|
24
|
+
rescue Errno::ENOENT
|
25
|
+
warn "Sparoid: Config not found"
|
26
|
+
end
|
27
|
+
Sparoid.fdpass(host, port)
|
28
|
+
rescue StandardError => e
|
29
|
+
abort "Sparoid: #{e.message}"
|
22
30
|
end
|
23
31
|
|
24
32
|
desc "keygen", "Generate an encryption key and a HMAC key"
|
@@ -32,8 +40,13 @@ module Sparoid
|
|
32
40
|
|
33
41
|
private
|
34
42
|
|
43
|
+
def send_auth(host, port, config)
|
44
|
+
key, hmac_key = get_keys(parse_ini(config))
|
45
|
+
Sparoid.auth(key, hmac_key, host, port.to_i)
|
46
|
+
end
|
47
|
+
|
35
48
|
def parse_ini(path)
|
36
|
-
File.readlines(path).map! { |
|
49
|
+
File.readlines(File.expand_path(path)).map! { |line| line.split("=", 2).map!(&:strip) }.to_h
|
37
50
|
end
|
38
51
|
|
39
52
|
def get_keys(config)
|
data/lib/sparoid/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: sparoid
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.6
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Carl Hörberg
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-04-13 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: thor
|
@@ -69,7 +69,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
69
69
|
- !ruby/object:Gem::Version
|
70
70
|
version: '0'
|
71
71
|
requirements: []
|
72
|
-
rubygems_version: 3.
|
72
|
+
rubygems_version: 3.2.3
|
73
73
|
signing_key:
|
74
74
|
specification_version: 4
|
75
75
|
summary: Single Packet Authorisation client
|