is a clever hack only clever if it works? 🤔 (re: color codes)
This commit is contained in:
parent
aa791870be
commit
7598e2bf6f
@ -1,40 +1,74 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
# TODO: can we use struct instead for blobParser?
|
||||||
|
|
||||||
import argparse
|
import argparse
|
||||||
import getpass
|
import getpass
|
||||||
import hashlib
|
import hashlib
|
||||||
|
import re
|
||||||
|
import sys
|
||||||
|
import os
|
||||||
|
from collections import defaultdict
|
||||||
try:
|
try:
|
||||||
import OpenSSL # "python-pyopenssl" package on Arch
|
import OpenSSL # "python-pyopenssl" package on Arch
|
||||||
except ImportError:
|
except ImportError:
|
||||||
exit('You need to install PyOpenSSL ("pip3 install --user PyOpenSSL" if pip3 is installed)')
|
exit('You need to install PyOpenSSL ("pip3 install --user PyOpenSSL" if pip3 is installed)')
|
||||||
import sys
|
|
||||||
import os
|
## DEFINE SOME PRETTY STUFF ##
|
||||||
|
class color(object):
|
||||||
|
# Windows doesn't support ANSI color escapes like sh does.
|
||||||
|
if sys.platform == 'win32':
|
||||||
|
# "You should be using subprocess!" yeah yeah yeah, I know, shut up.
|
||||||
|
# I already have OS imported and this is a quick hack.
|
||||||
|
BLACK = os.system('color 0')
|
||||||
|
BLUE = os.system('color 1')
|
||||||
|
GREEN = os.system('color 2')
|
||||||
|
DARKCYAN = os.system('color 3') # "Aqua" text
|
||||||
|
RED = os.system('color 4')
|
||||||
|
PURPLE = os.system('color 5')
|
||||||
|
YELLOW = os.system('color 6')
|
||||||
|
END = os.system('color 7') # "White" text
|
||||||
|
GRAY = os.system('color 8')
|
||||||
|
CYAN = os.system('color 9') # "Light Blue" text
|
||||||
|
LTGREEN = os.system('color A') # "Light Green" text
|
||||||
|
LTAQUA = os.system('color B') # "Light Aqua" text
|
||||||
|
LTRED = os.system('color C') # "Light Red" text
|
||||||
|
LTPURPLE = os.system('color D') # "Light Purple" text
|
||||||
|
LTYELLOW = os.system('color E') # "Light Yellow" text
|
||||||
|
BOLD = os.system('color F') # "Bright White" text
|
||||||
|
UNDERLINE = None
|
||||||
|
else:
|
||||||
|
PURPLE = '\033[95m'
|
||||||
|
CYAN = '\033[96m'
|
||||||
|
DARKCYAN = '\033[36m'
|
||||||
|
BLUE = '\033[94m'
|
||||||
|
GREEN = '\033[92m'
|
||||||
|
YELLOW = '\033[93m'
|
||||||
|
RED = '\033[91m'
|
||||||
|
BOLD = '\033[1m'
|
||||||
|
UNDERLINE = '\033[4m'
|
||||||
|
END = '\033[0m'
|
||||||
|
|
||||||
class Hasher(object):
|
class Hasher(object):
|
||||||
def __init__(self, args):
|
def __init__(self, args):
|
||||||
self.args = args
|
self.args = args
|
||||||
self.certChk()
|
self.blobGetter(self.args['cert'])
|
||||||
self.getPass()
|
self.blobParser()
|
||||||
|
|
||||||
def certChk(self):
|
|
||||||
self.args['cert'] = os.path.abspath(os.path.expanduser(self.args['cert']))
|
|
||||||
if not os.path.lexists(self.args['cert']):
|
|
||||||
raise FileNotFoundError('{0} does not exist!'.format(self.args['cert']))
|
|
||||||
return()
|
|
||||||
|
|
||||||
def getPass(self):
|
def getPass(self):
|
||||||
# Do we need to get the passphrase?
|
# Do we need to get the passphrase?
|
||||||
if self.args['passphrase']:
|
if self.args['passphrase']:
|
||||||
if self.args['passphrase'] == 'stdin':
|
if self.args['passphrase'] == 'stdin':
|
||||||
self.args['passphrase'] = sys.stdin.read().replace('\n', '')
|
self.args['passphrase'] = sys.stdin.read().replace('\n', '')
|
||||||
elif self.args['passphrase'] == 'prompt':
|
elif self.args['passphrase'] == 'prompt':
|
||||||
|
_colorargs = (color.BOLD, color.RED, self.args['cert'], color.END)
|
||||||
_repeat = True
|
_repeat = True
|
||||||
while _repeat == True:
|
while _repeat == True:
|
||||||
_pass_in = getpass.getpass(('\n\033[1mWhat is the encryption password ' +
|
_pass_in = getpass.getpass(('\n{0}What is the encryption password ' +
|
||||||
'for \033[91m{0}\033[0m\033[1m ?\033[0m ').format(self.args['cert']))
|
'for {1}{2}{0}{3}{0} ?{3} ').format(*_colorargs))
|
||||||
if not _pass_in or _pass_in == '':
|
if not _pass_in or _pass_in == '':
|
||||||
print(('\n\033[1mInvalid passphrase for \033[91m{0}\033[0m\033[1m ; ' +
|
print(('\n{0}Invalid passphrase for {1}{2}{0}{3}{0} ; ' +
|
||||||
'please enter a valid passphrase!\033[0m ').format(self.args['cert']))
|
'please enter a valid passphrase!{3} ').format(*_colorargs))
|
||||||
else:
|
else:
|
||||||
_repeat = False
|
_repeat = False
|
||||||
self.args['passphrase'] = _pass_in.replace('\n', '')
|
self.args['passphrase'] = _pass_in.replace('\n', '')
|
||||||
@ -44,23 +78,142 @@ class Hasher(object):
|
|||||||
return()
|
return()
|
||||||
|
|
||||||
def importCert(self):
|
def importCert(self):
|
||||||
|
self.getPass()
|
||||||
# Try loading the certificate
|
# Try loading the certificate
|
||||||
try:
|
try:
|
||||||
with open(self.args['cert'], 'rb') as f:
|
self.pkcs = OpenSSL.crypto.load_pkcs12(self.cert, self.args['passphrase'])
|
||||||
self.pkcs = OpenSSL.crypto.load_pkcs12(f.read(), self.args['passphrase'])
|
|
||||||
except OpenSSL.crypto.Error:
|
except OpenSSL.crypto.Error:
|
||||||
exit('Could not load certificate! (Wrong passphrase?)')
|
exit('Could not load certificate! (Wrong passphrase? Wrong file?)')
|
||||||
return()
|
return()
|
||||||
|
|
||||||
def hashCert(self):
|
def hashCert(self):
|
||||||
self.crt = self.pkcs.get_certificate()
|
self.crt_in = self.pkcs.get_certificate()
|
||||||
self.der = OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_ASN1,
|
self.der = OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_ASN1,
|
||||||
self.crt)
|
self.crt_in)
|
||||||
self.hash = hashlib.sha1(self.der).hexdigest().lower()
|
self.hash = hashlib.sha1(self.der).hexdigest().lower()
|
||||||
return(self.hash)
|
return(self.hash)
|
||||||
|
|
||||||
|
def blobGetter(self, blobpath):
|
||||||
|
self.cert = None
|
||||||
|
self.blob = None
|
||||||
|
_blst = blobpath.split(':')
|
||||||
|
if len(_blst) == 2:
|
||||||
|
blob = _blst[1]
|
||||||
|
self.certtype = _blst[0].lower()
|
||||||
|
elif len(_blst) == 1:
|
||||||
|
blob = _blst[0]
|
||||||
|
self.certtype = 'file'
|
||||||
|
else:
|
||||||
|
raise ValueError('{0} is not a supported path'.format(blobpath))
|
||||||
|
self.certtype = None
|
||||||
|
if self.certtype:
|
||||||
|
_hexblob = None
|
||||||
|
if self.certtype in ('plist', 'ini', 'file'):
|
||||||
|
blob = os.path.abspath(os.path.expanduser(blob))
|
||||||
|
if not os.path.isfile(blob):
|
||||||
|
raise FileNotFoundError('{0} does not exist'.format(blob))
|
||||||
|
if self.certtype == 'reg': # Only supported on Windows machines, obviously.
|
||||||
|
if sys.platform == 'win32':
|
||||||
|
import winreg
|
||||||
|
elif sys.platform == 'cygwin':
|
||||||
|
# https://bitbucket.org/sfllaw/cygwinreg/issues/5/support-python3
|
||||||
|
exit(('Python 3 under Cygwin does not support reading the registry. ' +
|
||||||
|
'Please use native-Windows Python 3 (for now) or ' +
|
||||||
|
'specify an actual PKCS #12 certificate file.'))
|
||||||
|
#try:
|
||||||
|
# import cygwinreg as winreg
|
||||||
|
#except ImportError:
|
||||||
|
# exit('You must install the cygwinreg python module in your cygwin environment to read the registry.')
|
||||||
|
_keypath = blob.split('\\')
|
||||||
|
_hkey = getattr(winreg, _keypath[0])
|
||||||
|
_skeypath = _keypath[1:-1]
|
||||||
|
_ckey = _keypath[-1]
|
||||||
|
_r = winreg.OpenKey(_hkey, '\\'.join(_skeypath))
|
||||||
|
_hexblob, _ = winreg.QueryValueEx(_r, _ckey)
|
||||||
|
winreg.CloseKey(_r)
|
||||||
|
elif self.certtype == 'plist': # plistlib, however, is thankfully cross-platform.
|
||||||
|
import plistlib
|
||||||
|
with open(blob, 'rb') as f:
|
||||||
|
_pdata = plistlib.loads(f.read())
|
||||||
|
_hexblob = _pdata['net.certificate']
|
||||||
|
elif self.certtype == 'ini':
|
||||||
|
import configparser
|
||||||
|
_parser = configparser.RawConfigParser()
|
||||||
|
_parser.read(blob)
|
||||||
|
_cfg = defaultdict(dict)
|
||||||
|
for s in _parser.sections():
|
||||||
|
_cfg[s] = {}
|
||||||
|
for k in _parser.options(s):
|
||||||
|
_cfg[s][k] = _parser.get(s, k)
|
||||||
|
self.blob = _cfg['net']['certificate']
|
||||||
|
else: # It's (supposedly) a PKCS #12 file - obviously, cross-platform.
|
||||||
|
with open(blob, 'rb') as f:
|
||||||
|
self.cert = f.read()
|
||||||
|
return()
|
||||||
|
|
||||||
|
def blobParser(self):
|
||||||
|
if not self.blob:
|
||||||
|
return()
|
||||||
|
if self.blob == '':
|
||||||
|
raise ValueError('We could not find an embedded certificate.')
|
||||||
|
# A pox upon the house of Mumble for not using base64. A POX, I SAY.
|
||||||
|
# So instead we need to straight up de-byte-array the mess.
|
||||||
|
# The below is an eldritch horror, bound to twist the mind of any sane man
|
||||||
|
# into the depths of madness.
|
||||||
|
# I probably might have been able to use a struct here, but meh.
|
||||||
|
blob = re.sub('^"?@ByteArray\(0(.*)\)"?$',
|
||||||
|
'\g<1>',
|
||||||
|
self.blob,
|
||||||
|
re.MULTILINE, re.DOTALL)
|
||||||
|
_bytes = b'0'
|
||||||
|
for s in blob.split('\\x'):
|
||||||
|
if s == '':
|
||||||
|
continue
|
||||||
|
_chunk = list(s)
|
||||||
|
# Skip the first two chars for string interpolation - they're hex.
|
||||||
|
_start = 2
|
||||||
|
try:
|
||||||
|
_hex = ''.join(_chunk[0:2])
|
||||||
|
_bytes += bytes.fromhex(_hex)
|
||||||
|
except ValueError:
|
||||||
|
# We need to zero-pad, and alter the starting index
|
||||||
|
# because yep, you guessed it - their bytearray hex vals
|
||||||
|
# (in plaintext) aren't zero-padded, either.
|
||||||
|
_hex = ''.join(_chunk[0]).zfill(2)
|
||||||
|
_bytes += bytes.fromhex(_hex)
|
||||||
|
_start = 1
|
||||||
|
# And then append the rest as-is. "Mostly."
|
||||||
|
# Namely, we need to change the single-digit null byte notation
|
||||||
|
# to actual python null bytes, and then de-escape the escapes.
|
||||||
|
# (i.e. '\t' => ' ')
|
||||||
|
_str = re.sub('\\\\0([^0])',
|
||||||
|
'\00\g<1>',
|
||||||
|
''.join(_chunk[_start:])).encode('utf-8').decode('unicode_escape')
|
||||||
|
_bytes += _str.encode('utf-8')
|
||||||
|
self.cert = _bytes
|
||||||
|
return()
|
||||||
|
|
||||||
def parseArgs():
|
def parseArgs():
|
||||||
|
# Set the default cert path
|
||||||
|
_certpath = '~/Documents/MumbleAutomaticCertificateBackup.p12'
|
||||||
|
# This catches ALL versions of macOS/OS X.
|
||||||
|
if sys.platform == 'darwin':
|
||||||
|
_cfgpath = 'PLIST:~/Library/Preferences/net.sourceforge.mumble.Mumble.plist'
|
||||||
|
# ALL versions of windows, even Win10, on x86. Even 64-bit. I know.
|
||||||
|
elif sys.platform == 'win32':
|
||||||
|
_cfgpath = r'REG:HKEY_CURRENT_USER\Software\Mumble\Mumble\net\certificate'
|
||||||
|
# Some people are sensible.
|
||||||
|
if sys.platform == 'cygwin':
|
||||||
|
_cfgpath = r'REG:HKEY_CURRENT_USER\Software\Mumble\Mumble\net\certificate'
|
||||||
|
elif (sys.platform == 'linux') or (re.match('.*bsd.*', sys.platform)): # duh
|
||||||
|
_cfgpath = 'INI:~/.config/Mumble/Mumble.conf'
|
||||||
|
else:
|
||||||
|
# WHO KNOWS what we're running on
|
||||||
|
_cfgpath = None
|
||||||
|
if not os.path.isfile(os.path.abspath(os.path.expanduser(_certpath))):
|
||||||
|
_defcrt = _cfgpath
|
||||||
|
else:
|
||||||
|
_defcrt = 'FILE:{0}'.format(_certpath)
|
||||||
args = argparse.ArgumentParser()
|
args = argparse.ArgumentParser()
|
||||||
args.add_argument('-p',
|
args.add_argument('-p',
|
||||||
'--passphrase',
|
'--passphrase',
|
||||||
@ -72,9 +225,21 @@ def parseArgs():
|
|||||||
'if you specify \'stdin\' we will expect the passphrase to be given as a stdin pipe, ' +
|
'if you specify \'stdin\' we will expect the passphrase to be given as a stdin pipe, ' +
|
||||||
'if you specify \'prompt\', we will prompt you for a passphrase (it will not be echoed back' +
|
'if you specify \'prompt\', we will prompt you for a passphrase (it will not be echoed back' +
|
||||||
'to the console)'))
|
'to the console)'))
|
||||||
args.add_argument(dest = 'cert',
|
args.add_argument('-c', '--cert',
|
||||||
|
dest = 'cert',
|
||||||
|
default = _defcrt,
|
||||||
metavar = 'path/to/mumblecert.p12',
|
metavar = 'path/to/mumblecert.p12',
|
||||||
help = 'The path to your exported Mumble certificate.')
|
help = ('The path to your exported PKCS #12 Mumble certificate. ' +
|
||||||
|
'Special prefixes are ' +
|
||||||
|
'{0} (it is a PKCS #12 file, default), ' +
|
||||||
|
'{1} (it is embedded in a macOS/OS X PLIST file), ' +
|
||||||
|
'{2} (it is a Mumble.conf with embedded PKCS#12), or ' +
|
||||||
|
'{3} (it is a path to a Windows registry object). ' +
|
||||||
|
'Default: {4}').format('{0}FILE{1}'.format(color.BOLD, color.END),
|
||||||
|
'{0}PLIST{1}'.format(color.BOLD, color.END),
|
||||||
|
'{0}INI{1}'.format(color.BOLD, color.END),
|
||||||
|
'{0}REG{1}'.format(color.BOLD, color.END),
|
||||||
|
'{0}{1}{2}'.format(color.BOLD, _defcrt, color.END)))
|
||||||
return(args)
|
return(args)
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
@ -83,7 +248,7 @@ def main():
|
|||||||
cert.importCert()
|
cert.importCert()
|
||||||
h = cert.hashCert()
|
h = cert.hashCert()
|
||||||
print('\n\t\033[1mYour certificate\'s public hash is: \033[94m{0}\033[0m'.format(h))
|
print('\n\t\033[1mYour certificate\'s public hash is: \033[94m{0}\033[0m'.format(h))
|
||||||
print('\n\t\033[1mPlease provide this to the Mumble server administrator that has requested it.\033[0m')
|
print('\n\t\033[1mPlease provide this to the Mumble server administrator that has requested it.\033[0m\n')
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
main()
|
main()
|
||||||
|
Loading…
Reference in New Issue
Block a user