Source code for tlslite.integration.clienthelper

# Authors: 
#   Trevor Perrin
#   Dimitris Moraitis - Anon ciphersuites
#
# See the LICENSE file for legal information regarding use of this file.

"""
A helper class for using TLS Lite with stdlib clients
(httplib, xmlrpclib, imaplib, poplib).
"""

from tlslite.checker import Checker
from tlslite.utils.dns_utils import is_valid_hostname

[docs] class ClientHelper(object): """This is a helper class used to integrate TLS Lite with various TLS clients (e.g. poplib, smtplib, httplib, etc.)"""
[docs] def __init__(self, username=None, password=None, certChain=None, privateKey=None, checker=None, settings=None, anon=False, host=None): """ For client authentication, use one of these argument combinations: - username, password (SRP) - certChain, privateKey (certificate) For server authentication, you can either rely on the implicit mutual authentication performed by SRP, or you can do certificate-based server authentication with one of these argument combinations: - x509Fingerprint Certificate-based server authentication is compatible with SRP or certificate-based client authentication. The constructor does not perform the TLS handshake itself, but simply stores these arguments for later. The handshake is performed only when this class needs to connect with the server. Then you should be prepared to handle TLS-specific exceptions. See the client handshake functions in :py:class:`~tlslite.tlsconnection.TLSConnection` for details on which exceptions might be raised. :param str username: SRP username. Requires the 'password' argument. :param str password: SRP password for mutual authentication. Requires the 'username' argument. :param X509CertChain certChain: Certificate chain for client authentication. Requires the 'privateKey' argument. Excludes the SRP arguments. :param RSAKey privateKey: Private key for client authentication. Requires the 'certChain' argument. Excludes the SRP arguments. :param Checker checker: Callable object called after handshaking to evaluate the connection and raise an Exception if necessary. :type settings: HandshakeSettings :param settings: Various settings which can be used to control the ciphersuites, certificate types, and SSL/TLS versions offered by the client. :param bool anon: set to True if the negotiation should advertise only anonymous TLS ciphersuites. Mutually exclusive with client certificate authentication or SRP authentication :type host: str or None :param host: the hostname that the connection is made to. Can be an IP address (in which case the SNI extension won't be sent). Can include the port (in which case the port will be stripped and ignored). """ self.username = None self.password = None self.certChain = None self.privateKey = None self.checker = None self.anon = anon #SRP Authentication if username and password and not \ (certChain or privateKey): self.username = username self.password = password #Certificate Chain Authentication elif certChain and privateKey and not \ (username or password): self.certChain = certChain self.privateKey = privateKey #No Authentication elif not password and not username and not \ certChain and not privateKey: pass else: raise ValueError("Bad parameters") self.checker = checker self.settings = settings self.tlsSession = None if host is not None and not self._isIP(host): # name for SNI so port can't be sent colon = host.find(':') if colon > 0: host = host[:colon] self.serverName = host if host and not is_valid_hostname(host): raise ValueError("Invalid hostname: {0}".format(host)) else: self.serverName = None
@staticmethod def _isIP(address): """Return True if the address is an IPv4 address""" if not address: return False vals = address.split('.') if len(vals) != 4: return False for i in vals: if not i.isdigit(): return False j = int(i) if not 0 <= j <= 255: return False return True def _handshake(self, tlsConnection): if self.username and self.password: tlsConnection.handshakeClientSRP(username=self.username, password=self.password, checker=self.checker, settings=self.settings, session=self.tlsSession, serverName=self.serverName) elif self.anon: tlsConnection.handshakeClientAnonymous(session=self.tlsSession, settings=self.settings, checker=self.checker, serverName=self.serverName) else: tlsConnection.handshakeClientCert(certChain=self.certChain, privateKey=self.privateKey, checker=self.checker, settings=self.settings, session=self.tlsSession, serverName=self.serverName) self.tlsSession = tlsConnection.session