views.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. from __future__ import unicode_literals
  2. from django.core.mail import EmailMessage
  3. from desecapi.models import Domain
  4. from desecapi.serializers import DomainSerializer, DonationSerializer
  5. from rest_framework import generics
  6. from desecapi.permissions import IsOwner
  7. from rest_framework import permissions
  8. from django.http import Http404
  9. from rest_framework.views import APIView
  10. from rest_framework.response import Response
  11. from rest_framework.reverse import reverse
  12. from rest_framework.authentication import TokenAuthentication, get_authorization_header
  13. from rest_framework.renderers import StaticHTMLRenderer
  14. from dns import resolver
  15. import subprocess
  16. import re
  17. from django.template.loader import get_template
  18. from django.template import Context
  19. from desecapi.authentication import BasicTokenAuthentication, URLParamAuthentication
  20. import base64
  21. from desecapi import settings
  22. class DomainList(generics.ListCreateAPIView):
  23. serializer_class = DomainSerializer
  24. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  25. def get_queryset(self):
  26. return Domain.objects.filter(owner=self.request.user.pk)
  27. def perform_create(self, serializer):
  28. obj = serializer.save(owner=self.request.user)
  29. def sendDynDnsEmail(domain):
  30. content_tmpl = get_template('emails/domain-dyndns/content.txt')
  31. subject_tmpl = get_template('emails/domain-dyndns/subject.txt')
  32. from_tmpl = get_template('emails/from.txt')
  33. context = Context({
  34. 'domain': domain.name,
  35. 'url': 'https://update.dedyn.io/',
  36. 'username': domain.name,
  37. 'password': self.request.auth.key
  38. })
  39. email = EmailMessage(subject_tmpl.render(context),
  40. content_tmpl.render(context),
  41. from_tmpl.render(context),
  42. [self.request.user.email])
  43. email.send()
  44. if obj.dyn:
  45. sendDynDnsEmail(obj)
  46. class DomainDetail(generics.RetrieveUpdateDestroyAPIView):
  47. serializer_class = DomainSerializer
  48. permission_classes = (permissions.IsAuthenticated, IsOwner,)
  49. def get_queryset(self):
  50. return Domain.objects.filter(owner=self.request.user.pk)
  51. def pre_save(self, obj):
  52. # Set the owner of this domain to the current user (important for new domains)
  53. obj.owner = self.request.user
  54. def put(self, request, pk, format=None):
  55. # Don't accept PUT requests for non-existent or non-owned domains.
  56. domain = Domain.objects.filter(owner=self.request.user.pk, pk=pk)
  57. if len(domain) is 0:
  58. raise Http404
  59. return super(DomainDetail, self).put(request, pk, format)
  60. class DomainDetailByName(DomainDetail):
  61. lookup_field = 'name'
  62. class Root(APIView):
  63. def get(self, request, format=None):
  64. if self.request.user and self.request.user.is_authenticated():
  65. return Response({
  66. 'domains': reverse('domain-list'),
  67. 'user': reverse('user'),
  68. 'logout:': reverse('logout'),
  69. })
  70. else:
  71. return Response({
  72. 'login': reverse('login', request=request, format=format),
  73. 'register': reverse('register', request=request, format=format),
  74. })
  75. class DnsQuery(APIView):
  76. def get(self, request, format=None):
  77. desecio = resolver.Resolver()
  78. if not 'domain' in request.GET:
  79. return Response(status=400)
  80. domain = str(request.GET['domain'])
  81. def getRecords(domain, type):
  82. records = []
  83. try:
  84. for ip in desecio.query(domain, type):
  85. records.append(str(ip))
  86. except resolver.NoAnswer:
  87. return []
  88. except resolver.NoNameservers:
  89. return []
  90. except resolver.NXDOMAIN:
  91. return []
  92. return records
  93. # find currently active NS records
  94. nsrecords = getRecords(domain, 'NS')
  95. # find desec.io nameserver IP address with standard nameserver
  96. ips = desecio.query('ns2.desec.io')
  97. desecio.nameservers = []
  98. for ip in ips:
  99. desecio.nameservers.append(str(ip))
  100. # query desec.io nameserver for A and AAAA records
  101. arecords = getRecords(domain, 'A')
  102. aaaarecords = getRecords(domain, 'AAAA')
  103. return Response({
  104. 'domain': domain,
  105. 'ns': nsrecords,
  106. 'a': arecords,
  107. 'aaaa': aaaarecords,
  108. '_nameserver': desecio.nameservers
  109. })
  110. class ScanLogjam(APIView):
  111. def get(self, request, format=None):
  112. # retrieve address to connect to
  113. addr = str(request.GET['host']) + ':' + str(int(request.GET['port']))
  114. starttls = str(request.GET['starttls'])
  115. def getOpenSSLOutput(cipher, connect, starttls=None, openssl='openssl-1.0.2a'):
  116. if starttls not in ['smtp', 'pop3', 'imap', 'ftp', 'xmpp']:
  117. starttls = None
  118. if starttls:
  119. starttlsparams = ['-starttls', starttls]
  120. else:
  121. starttlsparams = []
  122. if cipher:
  123. cipherparams = ['-cipher', cipher]
  124. else:
  125. cipherparams = []
  126. cmd = [
  127. openssl,
  128. 's_client',
  129. '-connect',
  130. connect
  131. ] + starttlsparams + cipherparams
  132. p_openssl = subprocess.Popen(cmd,
  133. stdin=subprocess.PIPE,
  134. stdout=subprocess.PIPE,
  135. stderr=subprocess.PIPE)
  136. stdout, stderr = p_openssl.communicate()
  137. return (stdout, stderr)
  138. # check if there is an SSL-enabled host
  139. output = getOpenSSLOutput(None, addr, openssl='openssl')
  140. if (not re.search('SSL-Session:', output[0])):
  141. raise Http404('Can\'t connect via SSL/TLS')
  142. # find DH size
  143. dhsize = None
  144. output = getOpenSSLOutput('EDH', addr, starttls)
  145. res = re.search('Server Temp Key: DH, ([0-9]+) bits', output[0])
  146. if res:
  147. dhsize = int(res.group(1))
  148. else:
  149. if (re.search('handshake failure:', output[1])):
  150. # server does not accept EDH connections, or no connections at all
  151. pass
  152. else:
  153. raise Http404('Failed to determine DH key size.')
  154. # check EXP cipher suits
  155. exp = True
  156. output = getOpenSSLOutput('EXP', addr, starttls)
  157. res = re.search('handshake failure:', output[1])
  158. if res:
  159. exp = False
  160. else:
  161. if (re.search('SSL-Session:', output[0])):
  162. # connection was established
  163. exp = True
  164. else:
  165. raise Exception('Failed to check for EXP cipher suits.')
  166. return Response({
  167. 'openssl': {
  168. 'addr': addr,
  169. 'logjam': {
  170. 'dhsize': dhsize,
  171. 'expcipher': exp
  172. },
  173. 'version': 'openssl-1.0.2a',
  174. }
  175. })
  176. class DynDNS12Update(APIView):
  177. authentication_classes = (TokenAuthentication, BasicTokenAuthentication, URLParamAuthentication,)
  178. renderer_classes = [StaticHTMLRenderer]
  179. def findDomain(self, request):
  180. def findDomainname(request):
  181. # 1. hostname parameter
  182. if 'hostname' in request.query_params and request.query_params['hostname'] != 'YES':
  183. return request.query_params['hostname']
  184. # 2. host_id parameter
  185. if 'host_id' in request.query_params:
  186. return request.query_params['host_id']
  187. # 3. http basic auth username
  188. try:
  189. return base64.b64decode(get_authorization_header(request).split(' ')[1]).split(':')[0]
  190. except:
  191. pass
  192. # 4. username parameter
  193. if 'username' in request.query_params:
  194. return request.query_params['username']
  195. # 5. only domain associated with this user account
  196. if len(request.user.domains.all()) == 1:
  197. return request.user.domains[0].name
  198. return None
  199. domainname = findDomainname(request)
  200. domain = None
  201. # load and check permissions
  202. try:
  203. domain = Domain.objects.filter(owner=self.request.user.pk, name=domainname).all()[0]
  204. except:
  205. pass
  206. return domain
  207. def findIP(self, request, params, version=4):
  208. if version == 4:
  209. lookfor = '.'
  210. elif version == 6:
  211. lookfor = ':'
  212. else:
  213. raise Exception
  214. # Check URL parameters
  215. for p in params:
  216. if p in request.query_params and lookfor in request.query_params[p]:
  217. return request.query_params[p]
  218. # Check remote IP address
  219. client_ip = self.get_client_ip(request)
  220. if lookfor in client_ip:
  221. return client_ip
  222. # give up
  223. return ''
  224. def get_client_ip(self, request):
  225. x_forwarded_for = request.META.get('HTTP_X_FORWARDED_FOR')
  226. if x_forwarded_for:
  227. ip = x_forwarded_for.split(',')[0]
  228. else:
  229. ip = request.META.get('REMOTE_ADDR')
  230. return ip
  231. def findIPv4(self, request):
  232. return self.findIP(request, ['myip', 'myipv4', 'ip'])
  233. def findIPv6(self, request):
  234. return self.findIP(request, ['myipv6', 'ipv6', 'myip', 'ip'], version=6)
  235. def get(self, request, format=None):
  236. domain = self.findDomain(request)
  237. if domain is None:
  238. raise Http404
  239. domain.arecord = self.findIPv4(request)
  240. domain.aaaarecord = self.findIPv6(request)
  241. domain.save()
  242. return Response('good')
  243. class DonationList(generics.CreateAPIView):
  244. serializer_class = DonationSerializer
  245. def perform_create(self, serializer):
  246. iban = serializer.validated_data['iban']
  247. obj = serializer.save()
  248. def sendDonationEmails(donation):
  249. context = Context({
  250. 'donation': donation,
  251. 'creditoridentifier': settings.SEPA['CREDITOR_ID'],
  252. 'complete_iban': iban
  253. })
  254. # internal desec notification
  255. content_tmpl = get_template('emails/donation/desec-content.txt')
  256. subject_tmpl = get_template('emails/donation/desec-subject.txt')
  257. attachment_tmpl = get_template('emails/donation/desec-attachment-jameica.txt')
  258. from_tmpl = get_template('emails/from.txt')
  259. email = EmailMessage(subject_tmpl.render(context),
  260. content_tmpl.render(context),
  261. from_tmpl.render(context),
  262. ['donation@desec.io'],
  263. attachments=[
  264. ('jameica-directdebit.xml',
  265. attachment_tmpl.render(context),
  266. 'text/xml')
  267. ])
  268. email.send()
  269. # donor notification
  270. if donation.email:
  271. content_tmpl = get_template('emails/donation/donor-content.txt')
  272. subject_tmpl = get_template('emails/donation/donor-subject.txt')
  273. test = content_tmpl.render(context)
  274. email = EmailMessage(subject_tmpl.render(context),
  275. content_tmpl.render(context),
  276. from_tmpl.render(context),
  277. [donation.email])
  278. email.send()
  279. # send emails
  280. sendDonationEmails(obj)