# BAREOS - Backup Archiving REcovery Open Sourced
#
# Copyright (C) 2015-2024 Bareos GmbH & Co. KG
#
# This program is Free Software; you can redistribute it and/or
# modify it under the terms of version three of the GNU Affero General Public
# License as published by the Free Software Foundation and included
# in the file LICENSE.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Affero General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
# 02110-1301, USA.
"""
Low Level socket methods to communicate with a Bareos Daemon.
"""
# Authentication code is taken from
# https://github.com/hanxiangduo/bacula-console-python
import hashlib
import hmac
import logging
import random
import re
from select import select
import socket
import ssl
import struct
import sys
import time
import warnings
from bareos.bsock.constants import Constants
from bareos.bsock.connectiontype import ConnectionType
from bareos.bsock.protocolmessageids import ProtocolMessageIds
from bareos.bsock.protocolmessages import ProtocolMessages
from bareos.bsock.protocolversions import ProtocolVersions
from bareos.util.bareosbase64 import BareosBase64
from bareos.util.password import Password
import bareos.exceptions
# The ssl module support TLS-PSK (Transport Layer Security - Pre-Shared-Key)
# since Python >= 3.13.
# For some older Python versions, the TLS-PSK functionality
# can be added by the sslpsk module,
# with implement TLS-PSK on top of the ssl module.
# If it is also not available, we continue anyway,
# but don't use TLS-PSK.
if not getattr(ssl, "HAS_PSK", False):
warnings.formatwarning = format_warning_short
try:
import sslpsk
except ImportError:
warnings.warn(
"Connection encryption via TLS-PSK is not available "
"(not available in 'ssl' and extra module 'sslpsk' is not installed)."
)
[docs]class LowLevel(object):
"""
Low Level socket methods to communicate with a Bareos Daemon.
This class should not be used by itself,
only by inherited classed.
"""
[docs] @staticmethod
def argparser_get_bareos_parameter(args):
"""Extract arguments.
This method is usually used together with the method :py:func:`argparser_add_default_command_line_arguments`.
Args:
args (ArgParser.Namespace): Arguments retrieved by :py:func:`ArgumentParser.parse_args`.
Returns:
dict: The relevant parameter from args to initialize a connection.
"""
result = {}
for key, value in vars(args).items():
if value is not None:
if key.startswith("BAREOS_"):
bareoskey = key.split("BAREOS_", 1)[1]
result[bareoskey] = value
return result
def __init__(self):
self.logger = logging.getLogger()
self.logger.debug("init")
self.status = None
self.address = None
self.timeout = 30
self.password = None
self.pam_username = None
self.pam_password = None
self.port = None
self.dirname = None
self.socket = None
self.auth_credentials_valid = False
self.max_reconnects = 0
self.tls_psk_enable = True
self.tls_psk_require = False
try:
self.tls_version = ssl.PROTOCOL_TLS
except AttributeError:
self.tls_version = ssl.PROTOCOL_SSLv23
self.connection_type = None
self.requested_protocol_version = None
self.protocol_messages = ProtocolMessages()
# identity_prefix have to be set in each class
self.identity_prefix = "R_NONE"
self.receive_buffer = b""
def __del__(self):
self.close()
[docs] def connect(
self,
address,
port,
dirname,
connection_type,
name=None,
password=None,
timeout=None,
):
"""Establish a network connection and authenticate.
Args:
address (str): Address of the Bareos Director (hostname or IP).
port (int): Port number of the Bareos Director.
dirname (str, optional):
Name of the Bareos Director. Deprecated, normally not required.
connection_type (int): See :py:class:`bareos.bsock.connectiontype.ConnectionType`.
name (str, optional):
Credential name.
password (str, bareos.util.Password):
Credential password, in cleartext or as Password object.
timeout (int, optional):
Connection timeout in seconds. Default OS specific.
Returns:
bool: True, if the authentication succeeds. In earlier versions, authentication failures returned False. However, now an authentication failure raises an exception.
Raises:
bareos.exceptions.ConnectionError: If connection can be established.
bareos.exceptions.PamAuthenticationError: If PAM authentication fails.
bareos.exceptions.AuthenticationError: If Bareos authentication fails.
"""
self.address = address
self.port = int(port)
if dirname:
self.dirname = dirname
else:
self.dirname = address
if timeout:
self.timeout = timeout
self.connection_type = connection_type
self.name = name
if password is None:
raise bareos.exceptions.ConnectionError("Parameter 'password' is required.")
if isinstance(password, Password):
self.password = password
else:
self.password = Password(password)
return self.__connect()
def __connect(self):
connected = False
connected_plain = False
auth = False
if self.tls_psk_require:
if not self.is_tls_psk_available():
raise bareos.exceptions.ConnectionError(
"TLS-PSK is required, but not available."
)
if not self.tls_psk_enable:
raise bareos.exceptions.ConnectionError(
"TLS-PSK is required, but not enabled."
)
if self.tls_psk_enable and self.is_tls_psk_available():
try:
self.__connect_tls_psk()
except (bareos.exceptions.ConnectionError, ssl.SSLError) as e:
self._handleSocketError(e)
if self.tls_psk_require:
raise
else:
self.logger.warning(
"Failed to connect via TLS-PSK. Trying plain connection."
)
else:
connected = True
self.logger.debug("Encryption: {0}".format(self.socket.cipher()))
if not connected:
self.__connect_plain()
connected = True
connected_plain = True
self.logger.debug("Encryption: None")
if connected:
try:
auth = self.auth()
except bareos.exceptions.PamAuthenticationError:
raise
except bareos.exceptions.AuthenticationError:
if (
self.connection_type == ConnectionType.DIRECTOR
and self.requested_protocol_version is None
and self.get_protocol_version() > ProtocolVersions.bareos_12_4
):
# reconnect and try old protocol
self.logger.warning(
"Failed to connect using protocol version {0}. Trying protocol version {1}. ".format(
self.get_protocol_version(), ProtocolVersions.bareos_12_4
)
)
self.close()
self.__connect_plain()
self.protocol_messages.set_version(ProtocolVersions.bareos_12_4)
auth = self.auth()
else:
raise
return auth
def __connect_plain(self):
# initialize
try:
self.socket = socket.create_connection(
(self.address, self.port), timeout=self.timeout
)
except (socket.error, socket.gaierror) as e:
self._handleSocketError(e)
raise bareos.exceptions.ConnectionError(
"Failed to connect to host {0}, port {1}: {2}".format(
self.address, self.port, str(e)
)
)
self.logger.debug("connected to {0}:{1}".format(self.address, self.port))
return True
def __connect_tls_psk(self):
"""
Connect and establish a TLS-PSK connection on top of the connection.
"""
self.__connect_plain()
# wrap socket with TLS-PSK
client_socket = self.socket
identity = self.get_tls_psk_identity()
if isinstance(self.password, Password):
password = self.password.md5()
else:
raise bareos.exceptions.ConnectionError("No password provided.")
self.logger.debug("identity = {0}, password = {1}".format(identity, password))
ciphers = "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH"
if getattr(ssl, "HAS_PSK", False):
context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
context.check_hostname = False
context.set_ciphers(ciphers)
context.set_psk_client_callback(lambda hint: (identity, password))
self.socket = context.wrap_socket(client_socket, server_side=False)
else:
try:
self.socket = sslpsk.wrap_socket(
client_socket,
ssl_version=self.tls_version,
ciphers=ciphers,
psk=(password, identity),
server_side=False,
)
except ssl.SSLError as e:
# raise ConnectionError(
# "failed to connect to host {0}, port {1}: {2}".format(self.address, self.port, str(e)))
# Using a general raise to keep more information about the type of error.
raise
return True
[docs] def get_tls_psk_identity(self):
"""Bareos TLS-PSK excepts the identity is a specific format."""
name = str(self.name)
if isinstance(self.name, bytes):
name = self.name.decode("utf-8")
result = "{0}{1}{2}".format(
self.identity_prefix, Constants.record_separator, name
)
return bytes(bytearray(result, "utf-8"))
[docs] @staticmethod
def is_tls_psk_available():
"""Checks if TLS-PSK is available."""
return getattr(ssl, "HAS_PSK", False) or ("sslpsk" in sys.modules)
[docs] def get_protocol_version(self):
"""Get the Bareos Console protocol version that is used.
Returns:
int: Number that represents the Bareos Console protocol version (see :py:class:`bareos.bsock.protocolversions.ProtocolVersions`.)
"""
return self.protocol_messages.get_version()
[docs] def get_cipher(self):
"""
If a encrypted connection is used, returns information about the encryption. Else it returns None.
Returns:
tuple or None: Returns a three-value tuple containing the name of the cipher being used, the version of the SSL protocol that defines its use, and the number of secret bits being used. If the connection is unencrypted or has been established, returns None.
"""
if hasattr(self.socket, "cipher"):
return self.socket.cipher()
else:
return None
[docs] def auth(self):
"""
Login to a Bareos Daemon.
Returns:
bool: True, if the authentication succeeds. In earlier versions, authentication failures returned False. However, now an authentication failure raises an exception.
Raises:
bareos.exceptions.AuthenticationError: if authentication fails.
"""
bashed_name = self.protocol_messages.hello(self.name, type=self.connection_type)
# send the bash to the director
self.send(bashed_name)
try:
(ssl, result_compatible, result) = self._cram_md5_respond(
password=self.password.md5(), tls_remote_need=0
)
except bareos.exceptions.SignalReceivedException as e:
self._handleSocketError(e)
raise bareos.exceptions.AuthenticationError(
"Received unexcepted signal: {0}".format(str(e))
)
if not result:
raise bareos.exceptions.AuthenticationError("failed (in response)")
if not self._cram_md5_challenge(
clientname=self.name,
password=self.password.md5(),
tls_local_need=0,
compatible=True,
):
raise bareos.exceptions.AuthenticationError("failed (in challenge)")
self._finalize_authentication()
return self.auth_credentials_valid
[docs] def receive_and_evaluate_response_message(self):
"""Retrieve a message and evaluate it.
Only used during in the authentication phase.
Returns:
2-tuple: (code, text).
"""
regex_str = r"^(\d\d\d\d){0}(.*)$".format(
Constants.record_separator_compat_regex
)
regex = bytes(bytearray(regex_str, "utf8"))
incoming_message = self.recv_msg(regex)
match = re.search(regex, incoming_message, re.DOTALL)
code = int(match.group(1))
text = match.group(2)
return (code, text)
def _init_connection(self):
pass
[docs] def close(self):
"""Close the connection."""
if self.socket is not None:
self.socket.close()
self.socket = None
[docs] def reconnect(self):
"""
Tries to reconnect.
Returns:
bool: True, if the connection could be reestablished.
"""
result = False
if self.max_reconnects > 0:
try:
self.max_reconnects -= 1
if self.__connect() and self._init_connection():
result = True
except (socket.error, bareos.exceptions.ConnectionLostError):
self.logger.warning("failed to reconnect")
return result
[docs] def call(self, command):
"""Call a Bareos command.
Args:
command (str or list): Command to execute. Best provided as a list.
Returns:
bytes: Result received from the Daemon.
"""
if isinstance(command, list):
command = " ".join(command)
return self._send_a_command_and_receive_result(command)
def _send_a_command_and_receive_result(self, command):
"""Send a command and receive the result.
If connection is lost, try to reconnect.
Args:
command (str or list): Command to execute. Best provided as a list.
Returns:
bytes: Result received from the Daemon.
Raises:
bareos.exceptions.SocketEmptyHeader:
if an empty header is received.
bareos.exceptions.ConnectionLostError:
if the connection is lost-
"""
result = b""
try:
self.send(bytearray(command, "utf-8"))
result = self.recv_msg()
except (
bareos.exceptions.SocketEmptyHeader,
bareos.exceptions.ConnectionLostError,
) as e:
self.logger.error(
"connection problem (%s): %s" % (type(e).__name__, str(e))
)
if self.reconnect():
return self._send_a_command_and_receive_result(command, count + 1)
else:
raise
return result
[docs] def send_command(self, command):
"""Alias for :py:func:`call`.
:deprecated: 15.2.0
"""
return self.call(command)
[docs] def send(self, msg=None):
"""Send message to the Daemon.
Args:
msg (bytearray): Message to send.
"""
self.__check_socket_connection()
msg_len = len(msg) # plus the msglen info
try:
# convert to network flow
self.logger.debug("{0}".format(msg.rstrip()))
self.socket.sendall(struct.pack("!i", msg_len) + msg)
except socket.error as e:
self._handleSocketError(e)
[docs] def recv_bytes(self, length, timeout=10):
"""Receive a number of bytes.
Args:
length (int): Number of bytes to receive.
timeout (float): Timeout in seconds.
Raises:
bareos.exceptions.ConnectionLostError:
If the socket connection gets lost.
socket.timeout:
If a timeout occurs on the socket connection,
meaning no data received.
"""
self.socket.settimeout(timeout)
msg = b""
# get the message
while length > 0:
self.logger.debug("expecting {0} bytes.".format(length))
submsg = self.socket.recv(length)
if len(submsg) == 0:
errormsg = "Failed to retrieve data. Assuming the connection is lost."
self._handleSocketError(errormsg)
raise bareos.exceptions.ConnectionLostError(errormsg)
length -= len(submsg)
msg += submsg
return msg
[docs] def recv(self):
"""Receive a single message.
This is,
header (4 bytes): if
* > 0: length of the following message
* < 0: Bareos signal
Returns:
bytearray: Message retrieved via the connection.
Raises:
bareos.exceptions.SignalReceivedException:
If a Bareos signal is received.
"""
self.__check_socket_connection()
# get the message header
header = self.__get_header()
if header <= 0:
self.logger.debug("header: " + str(header))
raise bareos.exceptions.SignalReceivedException(header)
# get the message
length = header
msg = self.recv_submsg(length)
return msg
[docs] def recv_msg(self, regex=b"^\d\d\d\d OK.*$"):
"""Receive a full message.
It retrieves messages (header + message text),
until
1. the message contains the specified regex or
2. the header indicates a signal.
Args:
regex (bytes): Descripes the expected end of the message.
Returns:
bytearray: Message retrieved via the connection.
Raises:
bareos.exceptions.SignalReceivedException:
If a Bareos signal is received.
"""
self.__check_socket_connection()
try:
timeouts = 0
while True:
# get the message header
try:
header = self.__get_header()
except (socket.timeout, ssl.SSLError) as exception:
# When using a SSL connection,
# a timeout is raised as
# ssl.SSLError exception with message: 'The read operation timed out'.
# ssl.SSLError is inherited from socket.error.
# Because we can't be sure,
# that it is really a timeout, we log it.
if isinstance(exception, ssl.SSLError) and self.logger.isEnabledFor(
logging.DEBUG
):
# self.logger.exception('On SSL connections, timeout are raised as ssl.SSLError exceptions:')
self.logger.debug("{0}".format(repr(exception)))
self.logger.debug("timeout (%i) on receiving header" % (timeouts))
timeouts += 1
else:
if header <= 0:
# header is a signal
self.__set_status(header)
if self.is_end_of_message(header):
result = self.receive_buffer
self.receive_buffer = b""
return result
else:
# header is the length of the next message
length = header
submsg = self.recv_submsg(length)
# check for regex in new submsg
# and last line in old message,
# which might have been incomplete without new submsg.
lastlineindex = self.receive_buffer.rfind(b"\n") + 1
self.receive_buffer += submsg
match = re.search(
regex, self.receive_buffer[lastlineindex:], re.DOTALL
)
# Bareos indicates end of command result by line starting with 4 digits
if match:
self.logger.debug(
'msg "{0}" matches regex "{1}"'.format(
self.receive_buffer.strip(), regex
)
)
result = self.receive_buffer[
0 : lastlineindex + match.end()
]
self.receive_buffer = self.receive_buffer[
lastlineindex + match.end() + 1 :
]
return result
except socket.error as e:
self._handleSocketError(e)
[docs] def recv_submsg(self, length):
"""Retrieve a message of the specific length.
Args:
length (int): Number of bytes to retrieve.
Returns:
bytearray: Retrieved message.
"""
msg = self.recv_bytes(length)
if type(msg) is str:
msg = bytearray(msg.decode("utf-8", "replace"), "utf-8")
if type(msg) is bytes:
msg = bytearray(msg)
self.logger.debug(str(msg))
return msg
[docs] def interactive(self):
"""Enter the interactive mode.
Exit via typing "exit" or "quit".
Returns:
bool: True, if exited by user command.
"""
command = ""
while command != "exit" and command != "quit" and self.is_connected():
try:
command = self._get_input()
except EOFError:
return False
try:
if command == "exit" or command == "quit":
return True
resultmsg = self.call(command)
self._show_result(resultmsg)
except bareos.exceptions.JsonRpcErrorReceivedException as exp:
print(str(exp))
# print(str(exp.jsondata))
return True
def _get_input(self):
# Wrapper to retrieve user keyboard input.
# Python2: raw_input, Python3: input
try:
myinput = raw_input
except NameError:
myinput = input
data = myinput(">>")
return data
def _show_result(self, msg):
# print(msg.decode('utf-8'))
sys.stdout.write(msg.decode("utf-8", "replace"))
# add a linefeed, if there isn't one already
if len(msg) >= 2:
if msg[-2] != ord(b"\n"):
sys.stdout.write("\n")
def __get_header(self, timeout=10):
header = self.recv_bytes(4, timeout)
return self.__get_header_data(header)
def __get_header_data(self, header):
# struct.unpack:
# !: network (big/little endian conversion)
# i: integer (4 bytes)
data = struct.unpack("!i", header)[0]
return data
[docs] def is_end_of_message(self, data):
"""Checks if a Bareos signal indicates the end of a message.
Args:
data (int): Negative integer.
Returns:
bool: True, if regular end of message is reached.
"""
return (
(not self.is_connected())
or data == Constants.BNET_EOD
or data == Constants.BNET_TERMINATE
or data == Constants.BNET_MAIN_PROMPT
or data == Constants.BNET_SUB_PROMPT
)
[docs] def is_connected(self):
"""Verifes that last status still indicates connected.
Returns:
bool: True, if still connected.
"""
return self.status != Constants.BNET_TERMINATE
def _cram_md5_challenge(
self, clientname, password, tls_local_need=0, compatible=True
):
"""
client launch the challenge,
client confirm the dir is the correct director
"""
# get the timestamp
# here is the console
# to confirm the director so can do this on bconsole`way
rand = random.randint(1000000000, 9999999999)
# chal = "<%u.%u@%s>" %(rand, int(time.time()), self.dirname)
chal = "<%u.%u@%s>" % (rand, int(time.time()), clientname)
msg = bytearray("auth cram-md5 %s ssl=%d\n" % (chal, tls_local_need), "utf-8")
# send the confirmation
self.send(msg)
# get the response
msg = self.recv()
if msg[-1] == 0:
del msg[-1]
self.logger.debug("received: " + str(msg))
# hash with password
hmac_md5 = hmac.new(password, None, hashlib.md5)
hmac_md5.update(bytes(bytearray(chal, "utf-8")))
bbase64compatible = BareosBase64().string_to_base64(
bytearray(hmac_md5.digest()), True
)
bbase64notcompatible = BareosBase64().string_to_base64(
bytearray(hmac_md5.digest()), False
)
self.logger.debug("string_to_base64, compatible: " + str(bbase64compatible))
self.logger.debug(
"string_to_base64, not compatible: " + str(bbase64notcompatible)
)
is_correct = (msg == bbase64compatible) or (msg == bbase64notcompatible)
# check against compatible base64 and Bareos specific base64
if is_correct:
self.send(ProtocolMessages.auth_ok())
else:
self.logger.error(
"expected result: %s or %s, but get %s"
% (bbase64compatible, bbase64notcompatible, msg)
)
self.send(ProtocolMessages.auth_failed())
# check the response is equal to base64
return is_correct
def _cram_md5_respond(self, password, tls_remote_need=0, compatible=True):
"""
client connect to dir,
the dir confirm the password and the config is correct
"""
# receive from the director
chal = ""
ssl = 0
result = False
msg = ""
try:
msg = self.recv()
except RuntimeError:
self.logger.error("RuntimeError exception in recv")
return (0, True, False)
# invalid username
if ProtocolMessages.is_not_authorized(msg):
self.logger.error("failed: " + str(msg))
return (0, True, False)
# check the receive message
self.logger.debug("(recv): " + str(msg).rstrip())
msg_list = msg.split(b" ")
chal = msg_list[2]
# get th timestamp and the tle info from director response
ssl = int(msg_list[3][4])
compatible = True
# hmac chal and the password
hmac_md5 = hmac.new((password), None, hashlib.md5)
hmac_md5.update(bytes(chal))
# base64 encoding
msg = BareosBase64().string_to_base64(bytearray(hmac_md5.digest()))
# send the base64 encoding to director
self.send(msg)
received = self.recv()
if ProtocolMessages.is_auth_ok(received):
result = True
else:
self.logger.error("failed: " + str(received))
return (ssl, compatible, result)
def __set_status(self, status):
self.status = status
status_text = Constants.get_description(status)
self.logger.debug(str(status_text) + " (" + str(status) + ")")
[docs] def has_data(self):
"""Is readable data available?
Returns:
bool: True: if readable data is available.
"""
self.__check_socket_connection()
timeout = 0.1
readable, writable, exceptional = select([self.socket], [], [], timeout)
return readable
def _get_to_prompt(self):
time.sleep(0.1)
if self.has_data():
msg = self.recv_msg()
self.logger.debug("received message: " + str(msg))
# TODO: check prompt
return True
def __check_socket_connection(self):
result = True
if self.socket is None:
result = False
if self.auth_credentials_valid:
# connection have worked before, but now it is gone
raise bareos.exceptions.ConnectionLostError(
"currently no network connection"
)
else:
raise RuntimeError("should connect to director first before send data")
return result
def _handleSocketError(self, exception):
self.logger.warning("socket error: {0}".format(str(exception)))
self.close()