From cce638a8adf4e045ca5505afea4bda57753c31dd Mon Sep 17 00:00:00 2001 From: Micah Anderson Date: Mon, 11 Aug 2014 16:33:29 -0400 Subject: initial import of debian package --- examples/security/stonehouse.py | 93 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 examples/security/stonehouse.py (limited to 'examples/security/stonehouse.py') diff --git a/examples/security/stonehouse.py b/examples/security/stonehouse.py new file mode 100644 index 0000000..276e87a --- /dev/null +++ b/examples/security/stonehouse.py @@ -0,0 +1,93 @@ +#!/usr/bin/env python + +''' +Stonehouse uses the "CURVE" security mechanism. + +This gives us strong encryption on data, and (as far as we know) unbreakable +authentication. Stonehouse is the minimum you would use over public networks, +and assures clients that they are speaking to an authentic server, while +allowing any client to connect. + +Author: Chris Laws +''' + +import logging +import os +import sys +import time + +import zmq +import zmq.auth +from zmq.auth.thread import ThreadAuthenticator + + +def run(): + ''' Run Stonehouse example ''' + + # These directories are generated by the generate_certificates script + base_dir = os.path.dirname(__file__) + keys_dir = os.path.join(base_dir, 'certificates') + public_keys_dir = os.path.join(base_dir, 'public_keys') + secret_keys_dir = os.path.join(base_dir, 'private_keys') + + if not (os.path.exists(keys_dir) and os.path.exists(keys_dir) and os.path.exists(keys_dir)): + logging.critical("Certificates are missing: run generate_certificates.py script first") + sys.exit(1) + + ctx = zmq.Context().instance() + + # Start an authenticator for this context. + auth = ThreadAuthenticator(ctx) + auth.start() + auth.allow('127.0.0.1') + # Tell the authenticator how to handle CURVE requests + auth.configure_curve(domain='*', location=zmq.auth.CURVE_ALLOW_ANY) + + server = ctx.socket(zmq.PUSH) + server_secret_file = os.path.join(secret_keys_dir, "server.key_secret") + server_public, server_secret = zmq.auth.load_certificate(server_secret_file) + server.curve_secretkey = server_secret + server.curve_publickey = server_public + server.curve_server = True # must come before bind + server.bind('tcp://*:9000') + + client = ctx.socket(zmq.PULL) + # We need two certificates, one for the client and one for + # the server. The client must know the server's public key + # to make a CURVE connection. + client_secret_file = os.path.join(secret_keys_dir, "client.key_secret") + client_public, client_secret = zmq.auth.load_certificate(client_secret_file) + client.curve_secretkey = client_secret + client.curve_publickey = client_public + + # The client must know the server's public key to make a CURVE connection. + server_public_file = os.path.join(public_keys_dir, "server.key") + server_public, _ = zmq.auth.load_certificate(server_public_file) + client.curve_serverkey = server_public + + client.connect('tcp://127.0.0.1:9000') + + server.send(b"Hello") + + if client.poll(1000): + msg = client.recv() + if msg == b"Hello": + logging.info("Stonehouse test OK") + else: + logging.error("Stonehouse test FAIL") + + # stop auth thread + auth.stop() + +if __name__ == '__main__': + if zmq.zmq_version_info() < (4,0): + raise RuntimeError("Security is not supported in libzmq version < 4.0. libzmq version {0}".format(zmq.zmq_version())) + + if '-v' in sys.argv: + level = logging.DEBUG + else: + level = logging.INFO + + logging.basicConfig(level=level, format="[%(levelname)s] %(message)s") + + run() -- cgit v1.2.3