Server IP : 180.180.241.3 / Your IP : 216.73.216.252 Web Server : Microsoft-IIS/7.5 System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586 User : IUSR ( 0) PHP Version : 5.3.28 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : /Program Files/MySQL/MySQL Workbench 6.3 CE/ |
Upload File : |
# Copyright (c) 2012, 2017, Oracle and/or its affiliates. All rights reserved. # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 of the # License. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA # 02110-1301 USA from __future__ import with_statement import platform import threading import random import Queue import traceback import socket import select import sys import time import os import mforms import paramiko from workbench.log import log_warning, log_error, log_debug, log_debug2, log_debug3, log_info from wb_common import SSHFingerprintNewError, format_bad_host_exception import grt SSH_PORT = 22 REMOTE_PORT = 3306 # timeout for closing an unused tunnel TUNNEL_TIMEOUT = 3 SSH_CONNECTION_TIMEOUT = 10 # paramiko 1.6 didn't have this class if hasattr(paramiko, "WarningPolicy"): WarningPolicy = paramiko.WarningPolicy else: class WarningPolicy(paramiko.MissingHostKeyPolicy): def missing_host_key(self, client, hostname, key): import binascii log_warning('WARNING: Unknown %s host key for %s: %s\n' % (key.get_name(), hostname, binascii.hexlify(key.get_fingerprint()))) class StoreIfConfirmedPolicy(paramiko.MissingHostKeyPolicy): def missing_host_key(self, client, hostname, key): raise SSHFingerprintNewError("Key mismatched", client, hostname, key) tunnel_serial=0 class Tunnel(threading.Thread): """This class is a threaded implementation of an SSH tunnel. You should not access the attributes that starts with an underscore outside this thread of execution (e.g. self._server) for this could run into race conditions. Even when accessing its public attributes (those that don't start with an underscore) you should be careful of acquiring the self.lock reentrant lock (and releasing it once done): with tunnel.lock: if tunnel.connecting: ... whatever... """ def __init__(self, q, server, username, target, password, keyfile): super(Tunnel, self).__init__() self.daemon = True self._server = server self._username = username self._target = target self._password = password self._keyfile = keyfile # Acquire and release this lock while accessing the attributes of objects # of this class from the main thread: self.lock = threading.RLock() # This event marks when a random port is selected to be used: self.port_is_set = threading.Event() self.local_port = None self._listen_sock = None self.q = q self._shutdown = False self.connecting = False self._client = paramiko.SSHClient() self._connections = [] def is_connecting(self): with self.lock: return self.connecting def run(self): try: self.do_run() except Exception, e: log_error("Unhandled exception in SSH tunnel: %s\n" % e) def do_run(self): global tunnel_serial tunnel_serial += 1 mforms.Utilities.set_thread_name("SSHTunnel%i"%tunnel_serial) sys.stdout.write('Thread started\n') # sys.stdout.write is thread safe while print isn't log_debug2("SSH Tunel %i thread started\n" % tunnel_serial) # Create a socket and pick a random port number for it: self._listen_sock = socket.socket() while True: local_port = random.randint(1024, 65535) try: self._listen_sock.bind(('127.0.0.1', local_port)) self._listen_sock.listen(2) with self.lock: self.local_port = local_port break except socket.error, exc: sys.stdout.write('Socket error: %s for port %d\n' % (exc, local_port) ) err, msg = exc.args if err == 22: continue # retry self.notify_exception_error('ERROR',"Error initializing server end of tunnel", sys.exc_info()) raise exc finally: with self.lock: self.connecting = True self.port_is_set.set() if self._keyfile: self.notify('INFO', 'Connecting to SSH server at %s:%s using key %s...' % (self._server[0], self._server[1], self._keyfile) ) else: self.notify('INFO', 'Connecting to SSH server at %s:%s...' % (self._server[0], self._server[1]) ) connected = self._connect_ssh() if not connected: self._listen_sock.close() self._shutdown = True with self.lock: self.connecting = False if connected: self.notify('INFO', 'Connection opened') del self._password last_activity = time.time() while not self._shutdown: try: socks = [self._listen_sock] for sock, chan in self._connections: socks.append(sock) socks.append(chan) r, w, x = select.select(socks, [], [], TUNNEL_TIMEOUT) except Exception, e: if not self._shutdown: self.notify_exception_error('ERROR', 'Error while forwarding data: %r' % e, sys.exc_info()) break if not r and len(socks) <= 1 and time.time() - last_activity > TUNNEL_TIMEOUT: self.notify('INFO', 'Closing tunnel to %s:%s for inactivity...' % (self._server[0], self._server[1]) ) break last_activity = time.time() if self._listen_sock in r: self.notify('INFO', 'New client connection') self.accept_client() closed = [] for sock, chan in self._connections: if sock in r: data = sock.recv(1024) if not data: closed.append((sock, chan)) else: chan.send(data) if chan in r: data = chan.recv(1024) if not data: closed.append((sock, chan)) else: sock.send(data) for item in set(closed): # set() will remove duplicates from closed list sock, chan = item try: sock.close() except: pass try: chan.close() except: pass self.notify('INFO', 'Client for %s disconnected' % local_port) self._connections.remove(item) if closed and not self._connections and time.time() - last_activity > TUNNEL_TIMEOUT: self.notify('INFO', 'Closing tunnel to %s:%s for inactivity...' % (self._server[0], self._server[1]) ) break # Time to shutdown: for sock, chan in self._connections: try: sock.close() except: pass try: chan.close() except: pass self._listen_sock.close() self._client.close() log_debug("Leaving tunnel thread %s\n" % self.local_port) def notify(self, msg_type, msg_object): log_debug2("tunnel_%i: %s %s\n" % (self.local_port, msg_type, msg_object)) self.q.put((msg_type, msg_object)) def notify_exception_error(self, msg_type, msg_txt, msg_obj = None): self.notify(msg_type, msg_txt) log_error("%s\n" % traceback.format_exc()) def match(self, server, username, target): with self.lock: return self._server == server and self._username == username and self._target == target def _get_ssh_config_path(self): paths = [] user_path = grt.root.wb.options.options['pathtosshconfig'] if grt.root.wb.options.options['pathtosshconfig'] is not None else None if user_path: paths.append(user_path) if platform.system().lower() == "windows": paths.append("%s\ssh\config" % mforms.App.get().get_user_data_folder()) paths.append("%s\ssh\ssh_config" % mforms.App.get().get_user_data_folder()) else: paths.append("~/.ssh/config") paths.append("~/.ssh/ssh_config") for path in paths: if os.path.isfile(os.path.expanduser(path)): return os.path.expanduser(path) else: log_debug3("ssh config file not found") return None def _connect_ssh(self): """Create the SSH client and set up the connection. Any exception coming from paramiko will be notified as an error that would cause the failure of the connection. Some of these are: paramiko.AuthenticationException --- raised when authentication failed for some reason paramiko.PasswordRequiredException --- raised when a password is needed to unlock a private key file; this is a subclass of paramiko.AuthenticationException """ try: config = paramiko.config.SSHConfig() config_file_path = self._get_ssh_config_path() if config_file_path: with open(config_file_path) as f: config.parse(f) opts = config.lookup(self._server[0]) ssh_known_hosts_file = None if "userknownhostsfile" in opts: ssh_known_hosts_file = opts["userknownhostsfile"] else: self._client.get_host_keys().clear() ssh_known_hosts_file = '~/.ssh/known_hosts' if platform.system().lower() == "windows": ssh_known_hosts_file = '%s\ssh\known_hosts' % mforms.App.get().get_user_data_folder() try: self._client.load_host_keys(os.path.expanduser(ssh_known_hosts_file)) except IOError, e: log_warning("IOError, probably caused by file %s not found, the message was: %s\n" % (ssh_known_hosts_file, e)) if "stricthostkeychecking" in opts and opts["stricthostkeychecking"].lower() == "no": self._client.set_missing_host_key_policy(WarningPolicy()) else: self._client.set_missing_host_key_policy(StoreIfConfirmedPolicy()) has_key = bool(self._keyfile) self._client.connect(self._server[0], self._server[1], username=self._username, key_filename=self._keyfile, password=self._password, look_for_keys=has_key, allow_agent=has_key, timeout=SSH_CONNECTION_TIMEOUT) except paramiko.BadHostKeyException, exc: self.notify_exception_error('ERROR',format_bad_host_exception(exc, '%s\ssh\known_hosts' % mforms.App.get().get_user_data_folder() if platform.system().lower() == "windows" else "~/.ssh/known_hosts file")) return False except paramiko.BadAuthenticationType, exc: self.notify_exception_error('ERROR', "Bad authentication type, the server is not accepting this type of authentication.\nAllowed ones are:\n %s" % exc.allowed_types, sys.exc_info()); return False except paramiko.AuthenticationException, exc: self.notify_exception_error('ERROR', "Authentication failed, please check credentials.\nPlease refer to logs for details", sys.exc_info()) return False except socket.gaierror, exc: self.notify_exception_error('ERROR', "Error connecting to SSH server: %s\nPlease refer to logs for details." % str(exc)) return False except paramiko.ChannelException, exc: self.notify_exception_error('ERROR', "Error connecting SSH channel.\nPlease refer to logs for details: %s" % str(exc), sys.exc_info()) return False except SSHFingerprintNewError, exc: self.notify_exception_error('KEY_ERROR', { 'msg': "The authenticity of host '%(0)s (%(0)s)' can't be established.\n%(1)s key fingerprint is %(2)s\nAre you sure you want to continue connecting?" % {'0': "%s:%s" % (self._server[0], self._server[1]), '1': exc.key.get_name(), '2': exc.fingerprint}, 'obj': exc}) return False except IOError, exc: #Io should be report to the user, so maybe he will be able to fix this issue self.notify_exception_error('IO_ERROR', "IO Error: %s.\n Please refer to logs for details." % str(exc), sys.exc_info()) return False except Exception, exc: self.notify_exception_error('ERROR', "Authentication error, unhandled exception caught in tunnel manager, please refer to logs for details", sys.exc_info()) return False else: log_debug("connect_ssh2 OK\n") return True def close(self): self.notify('INFO', 'Closing tunnel') self._listen_sock.close() self._shutdown = True def accept_client(self): try: local_sock, peeraddr = self._listen_sock.accept() except Exception, e: self.notify_exception_error('ERROR', 'Error accepting new tunnel client: %r' % e,sys.exc_info()) return self.notify('INFO', 'Client connection established') transport = self._client.get_transport() try: sshchan = transport.open_channel('direct-tcpip', self._target, local_sock.getpeername()) except paramiko.ChannelException, exc: self.notify_exception_error('ERROR', 'Could not open port forwarding SSH channel: %s' % exc) local_sock.close() return except Exception, e: self.notify_exception_error('ERROR', 'Remote connection to %s:%d failed: %r' % (self._target[0], self._target[1], e), sys.exc_info()) local_sock.close() return if sshchan is None: self.notify_exception_error('ERROR', 'Remote connection to %s:%d was rejected by the SSH server.' % (self._target[0], self._target[1]), sys.exc_info()) local_sock.close() return self.notify('INFO', 'Tunnel now open %r -> %r -> %r' % (local_sock.getsockname(), sshchan.getpeername(), self._target)) self._connections.append((local_sock, sshchan)) class TunnelManager: def __init__(self): self.tunnel_by_port = {} self.inpipe = sys.stdin self.outpipe = sys.stdout def _address_port_tuple(self, raw_address, default_port): if type(raw_address) is str: if ':' in raw_address: address, port = raw_address.split(':', 1) try: port = int(port) except: port = default_port return (address, port) else: return (raw_address, default_port) else: return raw_address def lookup_tunnel(self, server, username, target): server = self._address_port_tuple(server, default_port=SSH_PORT) target = self._address_port_tuple(target, default_port=REMOTE_PORT) for port, tunnel in self.tunnel_by_port.iteritems(): if tunnel.match(server, username, target) and tunnel.isAlive(): with tunnel.lock: return tunnel.local_port return None def open_tunnel(self, server, username, password, keyfile, target): try: port = self.open_ssh(server, username, password, keyfile, target) except Exception: traceback.print_exc() return (False, str(traceback.format_exc())) return (True, port) def open_ssh(self, server, username, password, keyfile, target): server = self._address_port_tuple(server, default_port=SSH_PORT) target = self._address_port_tuple(target, default_port=REMOTE_PORT) password = password or '' keyfile = keyfile or None if keyfile is not None: keyfile = keyfile.decode('utf-8') found = None for tunnel in self.tunnel_by_port.itervalues(): if tunnel.match(server, username, target) and tunnel.isAlive(): found = tunnel break if found: with tunnel.lock: log_debug('Reusing tunnel at port %d' % tunnel.local_port) return tunnel.local_port else: tunnel = Tunnel(Queue.Queue(), server, username, target, password, keyfile) tunnel.start() tunnel.port_is_set.wait() with tunnel.lock: port = tunnel.local_port self.tunnel_by_port[port] = tunnel return port def wait_connection(self, port): tunnel = self.tunnel_by_port.get(port) if not tunnel: return 'Could not find a tunnel for port %d' % port error = None tunnel.port_is_set.wait() if tunnel.isAlive(): while True: # Process any message in queue. Every retrieved message is printed. # If an error is detected in the queue, exit returning its message: try: msg_type, msg = tunnel.q.get_nowait() except Queue.Empty: continue else: if msg_type == 'KEY_ERROR': if mforms.Utilities.show_message("SSH Server Fingerprint Missing", msg['msg'], "Continue", "Cancel", "") == mforms.ResultOk: msg['obj'].client._host_keys.add(msg['obj'].hostname, msg['obj'].key.get_name(), msg['obj'].key) if msg['obj'].client._host_keys_filename is not None: try: if os.path.isdir(os.path.dirname(msg['obj'].client._host_keys_filename)) == False: log_warning("Host_keys directory is missing, recreating it\n") os.makedirs(os.path.dirname(msg['obj'].client._host_keys_filename)) if os.path.exists(msg['obj'].client._host_keys_filename) == False: log_warning("Host_keys file is missing, recreating it\n") open(msg['obj'].client._host_keys_filename, 'a').close() msg['obj'].client.save_host_keys(msg['obj'].client._host_keys_filename) log_warning("Successfully saved host_keys file.\n") except IOError, e: error = str(e) break; error = "Server key has been stored" else: error = "User cancelled" break # Exit returning the error message elif msg_type == 'IO_ERROR': error = msg break # Exit returning the error message else: time.sleep(0.3) _msg = msg if type(msg) is tuple: msg = '\n' + ''.join(traceback.format_exception(*msg)) _msg = str(_msg[1]) log_debug("%s: %s\n" % (msg_type, msg)) if msg_type == 'ERROR': error = _msg break # Exit returning the error message if (not tunnel.is_connecting() or not tunnel.isAlive()) and tunnel.q.empty(): break time.sleep(0.3) log_debug("returning from wait_connection(%s): %s\n" % (port, error)) return error def get_message(self, port): if port not in self.tunnel_by_port: log_error("Looking up invalid port %s\n" % port) return None tunnel = self.tunnel_by_port[port] try: return tunnel.q.get_nowait() except Queue.Empty: return None def set_keepalive(self, port, keepalive): if keepalive == 0: log_info("SSH KeepAlive setting skipped.\n") return tunnel = self.tunnel_by_port.get(port) if not tunnel: log_error("Looking up invalid port %s\n" % port) return transport = tunnel._client.get_transport() if transport is None: log_error("SSHTransport not ready yet %d\n" % port) return transport.set_keepalive(keepalive) def close(self, port): pass # tunnels auto-close when inactive #tunnel = self.tunnel_by_port.get(port, None) #if tunnel: # tunnel.num_clients -= 1 # if tunnel.num_clients == 0: # tunnel.close() # del self.tunnel_by_port[port] def send(self, code, arg=''): if arg: self.outpipe.write(code + ' ' + arg + '\n') else: self.outpipe.write(code + '\n') self.outpipe.flush() def shutdown(self): for tunnel in self.tunnel_by_port.itervalues(): tunnel.close() tunnel.join() # FIXME: It seems that this function is never called. Should we remove it? def wait_requests(self): #print "SSH Tunnel Manager started, waiting for requests..." self.send("READY") while True: request = self.inpipe.readline() if not request: #print "Exiting tunnel manager..." break try: cmd, args = eval(request, {}, {}) except: self.send("ERROR", "Invalid request") continue if cmd == "LOOKUP": try: port = self.lookup_tunnel(*args) if port is not None: self.send("OK", str(port)) else: self.send("ERROR", "not found") except Exception, exc: self.send("ERROR", str(exc)) elif cmd == "OPENSSH": try: port = self.open_ssh(*args) self.send("OK", str(port)) except Exception, exc: self.send("ERROR", str(exc)) elif cmd == "CLOSE": #self.close(args[0]) self.send("OK") elif cmd == "WAIT": # wait for the SSH connection to be established error = self.wait_connection(args) if not error: self.send("OK") else: self.send("ERROR "+error) elif cmd == "MESSAGE": msg = self.get_message(args) if msg: self.send(msg) else: self.send("NONE") else: log_error("Invalid request %s\n" % request) self.send("ERROR", "Invalid request") """ if "--single" in sys.argv: target = sys.argv[2] if "-pw" in sys.argv: password = sys.argv[sys.argv.index("-pw")+1] else: password = None if "-i" in sys.argv: keyfile = sys.argv[sys.argv.index("-i")+1] else: keyfile = None server = sys.argv[-1] tunnel = Tunnel(None, False) if "@" in server: username, server = server.split("@", 1) else: username = "" print "Starting tunnel..." if type(server) == str: if ':' in server: server = server.split(":", 1) server = (server[0], int(server[1])) else: server = (server, SSH_PORT) if type(target) == str: if ':' in target: target = target.split(":", 1) target = (target[0], int(target[1])) else: target = (target, REMOTE_PORT) tunnel.start(server, username, password or "", keyfile, target) else: tm = TunnelManager() sys.stdout = sys.stderr try: tm.wait_requests() except KeyboardInterrupt, e: pass """