7 changed files with 238 additions and 339 deletions
@ -0,0 +1,172 @@
|
||||
import sys |
||||
import re |
||||
import dns |
||||
import traceback |
||||
|
||||
import bitcoin |
||||
from util import StoreDict, print_error |
||||
from i18n import _ |
||||
|
||||
# Import all of the rdtypes, as py2app and similar get confused with the dnspython |
||||
# autoloader and won't include all the rdatatypes |
||||
try: |
||||
import dns.name |
||||
import dns.query |
||||
import dns.dnssec |
||||
import dns.message |
||||
import dns.resolver |
||||
import dns.rdatatype |
||||
import dns.rdtypes.ANY.NS |
||||
import dns.rdtypes.ANY.CNAME |
||||
import dns.rdtypes.ANY.DLV |
||||
import dns.rdtypes.ANY.DNSKEY |
||||
import dns.rdtypes.ANY.DS |
||||
import dns.rdtypes.ANY.NSEC |
||||
import dns.rdtypes.ANY.NSEC3 |
||||
import dns.rdtypes.ANY.NSEC3PARAM |
||||
import dns.rdtypes.ANY.RRSIG |
||||
import dns.rdtypes.ANY.SOA |
||||
import dns.rdtypes.ANY.TXT |
||||
import dns.rdtypes.IN.A |
||||
import dns.rdtypes.IN.AAAA |
||||
from dns.exception import DNSException |
||||
OA_READY = True |
||||
except ImportError: |
||||
OA_READY = False |
||||
|
||||
|
||||
class Contacts(StoreDict): |
||||
|
||||
def __init__(self, config): |
||||
StoreDict.__init__(self, config, 'contacts') |
||||
|
||||
def resolve(self, k): |
||||
if bitcoin.is_address(k): |
||||
return { |
||||
'address': k, |
||||
'type': 'address' |
||||
} |
||||
|
||||
if k in self.keys(): |
||||
_type, addr = self[k] |
||||
if _type == 'address': |
||||
return { |
||||
'address': addr, |
||||
'type': 'contact' |
||||
} |
||||
|
||||
out = self.resolve_openalias(k) |
||||
if out: |
||||
address, name = out |
||||
try: |
||||
validated = self.validate_dnssec(k) |
||||
except: |
||||
validated = False |
||||
traceback.print_exc(file=sys.stderr) |
||||
return { |
||||
'address': address, |
||||
'name': name, |
||||
'type': 'openalias', |
||||
'validated': validated |
||||
} |
||||
|
||||
raise Exception("Invalid Bitcoin address or alias", k) |
||||
|
||||
def resolve_openalias(self, url): |
||||
'''Resolve OpenAlias address using url.''' |
||||
print_error('[OA] Attempting to resolve OpenAlias data for ' + url) |
||||
|
||||
url = url.replace('@', '.') # support email-style addresses, per the OA standard |
||||
prefix = 'btc' |
||||
retries = 3 |
||||
err = None |
||||
for i in range(0, retries): |
||||
try: |
||||
resolver = dns.resolver.Resolver() |
||||
resolver.timeout = 2.0 |
||||
resolver.lifetime = 4.0 |
||||
records = resolver.query(url, dns.rdatatype.TXT) |
||||
for record in records: |
||||
string = record.strings[0] |
||||
if string.startswith('oa1:' + prefix): |
||||
address = self.find_regex(string, r'recipient_address=([A-Za-z0-9]+)') |
||||
name = self.find_regex(string, r'recipient_name=([^;]+)') |
||||
if not name: |
||||
name = address |
||||
if not address: |
||||
continue |
||||
return (address, name) |
||||
err = _('No OpenAlias record found.') |
||||
break |
||||
except dns.resolver.NXDOMAIN: |
||||
err = _('No such domain.') |
||||
continue |
||||
except dns.resolver.Timeout: |
||||
err = _('Timed out while resolving.') |
||||
continue |
||||
except DNSException: |
||||
err = _('Unhandled exception.') |
||||
continue |
||||
except Exception, e: |
||||
err = _('Unexpected error: ' + str(e)) |
||||
continue |
||||
break |
||||
if err: |
||||
print_error(err) |
||||
return 0 |
||||
|
||||
def find_regex(self, haystack, needle): |
||||
regex = re.compile(needle) |
||||
try: |
||||
return regex.search(haystack).groups()[0] |
||||
except AttributeError: |
||||
return None |
||||
|
||||
def validate_dnssec(self, url): |
||||
print_error('Checking DNSSEC trust chain for ' + url) |
||||
default = dns.resolver.get_default_resolver() |
||||
ns = default.nameservers[0] |
||||
parts = url.split('.') |
||||
|
||||
for i in xrange(len(parts), 0, -1): |
||||
sub = '.'.join(parts[i - 1:]) |
||||
query = dns.message.make_query(sub, dns.rdatatype.NS) |
||||
response = dns.query.udp(query, ns, 3) |
||||
if response.rcode() != dns.rcode.NOERROR: |
||||
print_error("query error") |
||||
return False |
||||
|
||||
if len(response.authority) > 0: |
||||
rrset = response.authority[0] |
||||
else: |
||||
rrset = response.answer[0] |
||||
|
||||
rr = rrset[0] |
||||
if rr.rdtype == dns.rdatatype.SOA: |
||||
#Same server is authoritative, don't check again |
||||
continue |
||||
|
||||
query = dns.message.make_query(sub, |
||||
dns.rdatatype.DNSKEY, |
||||
want_dnssec=True) |
||||
response = dns.query.udp(query, ns, 3) |
||||
if response.rcode() != 0: |
||||
self.print_error("query error") |
||||
return False |
||||
# HANDLE QUERY FAILED (SERVER ERROR OR NO DNSKEY RECORD) |
||||
|
||||
# answer should contain two RRSET: DNSKEY and RRSIG(DNSKEY) |
||||
answer = response.answer |
||||
if len(answer) != 2: |
||||
print_error("answer error", answer) |
||||
return False |
||||
|
||||
# the DNSKEY should be self signed, validate it |
||||
name = dns.name.from_text(sub) |
||||
try: |
||||
dns.dnssec.validate(answer[0], answer[1], {name: answer[0]}) |
||||
except dns.dnssec.ValidationFailure: |
||||
print_error("validation error") |
||||
return False |
||||
|
||||
return True |
||||
@ -1,297 +0,0 @@
|
||||
# Copyright (c) 2014-2015, The Monero Project |
||||
# |
||||
# All rights reserved. |
||||
|
||||
# This plugin is licensed under the GPL v3 license (see the LICENSE file in the base of |
||||
# the project source code). The Monero Project reserves the right to change this license |
||||
# in future to match or be compliant with any relicense of the Electrum project. |
||||
|
||||
# This plugin implements the OpenAlias standard. For information on the standard please |
||||
# see: https://openalias.org |
||||
|
||||
# Donations for ongoing development of the standard and hosting resolvers can be sent to |
||||
# openalias.org or donate.monero.cc |
||||
|
||||
# Version: 0.1 |
||||
# Todo: optionally use OA resolvers; add DNSCrypt support |
||||
|
||||
import re |
||||
import traceback |
||||
|
||||
from PyQt4.QtGui import * |
||||
from PyQt4.QtCore import * |
||||
|
||||
from electrum_gui.qt.util import * |
||||
from electrum.plugins import BasePlugin, hook |
||||
from electrum.util import print_error |
||||
from electrum.i18n import _ |
||||
|
||||
|
||||
# Import all of the rdtypes, as py2app and similar get confused with the dnspython |
||||
# autoloader and won't include all the rdatatypes |
||||
try: |
||||
import dns.name |
||||
import dns.query |
||||
import dns.dnssec |
||||
import dns.message |
||||
import dns.resolver |
||||
import dns.rdatatype |
||||
import dns.rdtypes.ANY.NS |
||||
import dns.rdtypes.ANY.CNAME |
||||
import dns.rdtypes.ANY.DLV |
||||
import dns.rdtypes.ANY.DNSKEY |
||||
import dns.rdtypes.ANY.DS |
||||
import dns.rdtypes.ANY.NSEC |
||||
import dns.rdtypes.ANY.NSEC3 |
||||
import dns.rdtypes.ANY.NSEC3PARAM |
||||
import dns.rdtypes.ANY.RRSIG |
||||
import dns.rdtypes.ANY.SOA |
||||
import dns.rdtypes.ANY.TXT |
||||
import dns.rdtypes.IN.A |
||||
import dns.rdtypes.IN.AAAA |
||||
from dns.exception import DNSException |
||||
OA_READY = True |
||||
except ImportError: |
||||
OA_READY = False |
||||
|
||||
|
||||
class Plugin(BasePlugin): |
||||
def is_available(self): |
||||
return OA_READY |
||||
|
||||
def __init__(self, gui, name): |
||||
BasePlugin.__init__(self, gui, name) |
||||
self._is_available = OA_READY |
||||
self.print_error('OA_READY is ' + str(OA_READY)) |
||||
self.previous_payto = '' |
||||
|
||||
@hook |
||||
def init_qt(self, gui): |
||||
self.gui = gui |
||||
self.win = gui.main_window |
||||
|
||||
def requires_settings(self): |
||||
return True |
||||
|
||||
def settings_widget(self, window): |
||||
return EnterButton(_('Settings'), self.settings_dialog) |
||||
|
||||
@hook |
||||
def timer_actions(self): |
||||
if self.win.payto_e.hasFocus(): |
||||
return |
||||
if self.win.payto_e.is_multiline(): # only supports single line entries atm |
||||
return |
||||
if self.win.payto_e.is_pr: |
||||
return |
||||
|
||||
url = str(self.win.payto_e.toPlainText()) |
||||
|
||||
if url == self.previous_payto: |
||||
return |
||||
self.previous_payto = url |
||||
|
||||
if not (('.' in url) and (not '<' in url) and (not ' ' in url)): |
||||
return |
||||
|
||||
data = self.resolve(url) |
||||
|
||||
if not data: |
||||
self.previous_payto = url |
||||
return True |
||||
|
||||
address, name = data |
||||
new_url = url + ' <' + address + '>' |
||||
self.win.payto_e.setText(new_url) |
||||
self.previous_payto = new_url |
||||
|
||||
if self.config.get('openalias_autoadd') == 'checked': |
||||
self.win.contacts[url] = ('openalias', name) |
||||
self.win.update_contacts_tab() |
||||
|
||||
self.win.payto_e.setFrozen(True) |
||||
try: |
||||
self.validated = self.validate_dnssec(url) |
||||
except: |
||||
self.validated = False |
||||
traceback.print_exc(file=sys.stderr) |
||||
|
||||
if self.validated: |
||||
self.win.payto_e.setGreen() |
||||
else: |
||||
self.win.payto_e.setExpired() |
||||
|
||||
@hook |
||||
def before_send(self): |
||||
''' |
||||
Change URL to address before making a send. |
||||
IMPORTANT: |
||||
return False to continue execution of the send |
||||
return True to stop execution of the send |
||||
''' |
||||
|
||||
if self.win.payto_e.is_multiline(): # only supports single line entries atm |
||||
return False |
||||
if self.win.payto_e.is_pr: |
||||
return |
||||
payto_e = str(self.win.payto_e.toPlainText()) |
||||
regex = re.compile(r'^([^\s]+) <([A-Za-z0-9]+)>') # only do that for converted addresses |
||||
try: |
||||
(url, address) = regex.search(payto_e).groups() |
||||
except AttributeError: |
||||
return False |
||||
|
||||
if not self.validated: |
||||
msgBox = QMessageBox() |
||||
msgBox.setText(_('WARNING: the address ' + address + ' could not be validated via an additional security check, DNSSEC, and thus may not be correct.')) |
||||
msgBox.setInformativeText(_('Do you wish to continue?')) |
||||
msgBox.setStandardButtons(QMessageBox.Cancel | QMessageBox.Ok) |
||||
msgBox.setDefaultButton(QMessageBox.Cancel) |
||||
reply = msgBox.exec_() |
||||
if reply != QMessageBox.Ok: |
||||
return True |
||||
|
||||
return False |
||||
|
||||
def settings_dialog(self): |
||||
'''Settings dialog.''' |
||||
d = QDialog() |
||||
d.setWindowTitle("Settings") |
||||
layout = QGridLayout(d) |
||||
layout.addWidget(QLabel(_('Automatically add to contacts')), 0, 0) |
||||
autoadd_checkbox = QCheckBox() |
||||
autoadd_checkbox.setEnabled(True) |
||||
autoadd_checkbox.setChecked(self.config.get('openalias_autoadd', 'unchecked') != 'unchecked') |
||||
layout.addWidget(autoadd_checkbox, 0, 1) |
||||
ok_button = QPushButton(_("OK")) |
||||
ok_button.clicked.connect(d.accept) |
||||
layout.addWidget(ok_button, 1, 1) |
||||
|
||||
def on_change_autoadd(checked): |
||||
if checked: |
||||
self.config.set_key('openalias_autoadd', 'checked') |
||||
else: |
||||
self.config.set_key('openalias_autoadd', 'unchecked') |
||||
|
||||
autoadd_checkbox.stateChanged.connect(on_change_autoadd) |
||||
|
||||
return bool(d.exec_()) |
||||
|
||||
|
||||
@hook |
||||
def resolve_address(self, url): |
||||
data = self.resolve(url) |
||||
if not data: |
||||
return |
||||
address, name = data |
||||
try: |
||||
validated = self.validate_dnssec(url) |
||||
except: |
||||
validated = False |
||||
traceback.print_exc(file=sys.stderr) |
||||
return { |
||||
'address': address, |
||||
'name': name, |
||||
'type': 'openalias', |
||||
'validated': validated |
||||
} |
||||
|
||||
|
||||
def resolve(self, url): |
||||
'''Resolve OpenAlias address using url.''' |
||||
self.print_error('[OA] Attempting to resolve OpenAlias data for ' + url) |
||||
|
||||
url = url.replace('@', '.') # support email-style addresses, per the OA standard |
||||
prefix = 'btc' |
||||
retries = 3 |
||||
err = None |
||||
for i in range(0, retries): |
||||
try: |
||||
resolver = dns.resolver.Resolver() |
||||
resolver.timeout = 2.0 |
||||
resolver.lifetime = 4.0 |
||||
records = resolver.query(url, dns.rdatatype.TXT) |
||||
for record in records: |
||||
string = record.strings[0] |
||||
if string.startswith('oa1:' + prefix): |
||||
address = self.find_regex(string, r'recipient_address=([A-Za-z0-9]+)') |
||||
name = self.find_regex(string, r'recipient_name=([^;]+)') |
||||
if not name: |
||||
name = address |
||||
if not address: |
||||
continue |
||||
return (address, name) |
||||
QMessageBox.warning(self.win, _('Error'), _('No OpenAlias record found.'), _('OK')) |
||||
return 0 |
||||
except dns.resolver.NXDOMAIN: |
||||
err = _('No such domain.') |
||||
continue |
||||
except dns.resolver.Timeout: |
||||
err = _('Timed out while resolving.') |
||||
continue |
||||
except DNSException: |
||||
err = _('Unhandled exception.') |
||||
continue |
||||
except Exception, e: |
||||
err = _('Unexpected error: ' + str(e)) |
||||
continue |
||||
break |
||||
if err: |
||||
QMessageBox.warning(self.win, _('Error'), err, _('OK')) |
||||
return 0 |
||||
|
||||
def find_regex(self, haystack, needle): |
||||
regex = re.compile(needle) |
||||
try: |
||||
return regex.search(haystack).groups()[0] |
||||
except AttributeError: |
||||
return None |
||||
|
||||
def validate_dnssec(self, url): |
||||
self.print_error('Checking DNSSEC trust chain for ' + url) |
||||
default = dns.resolver.get_default_resolver() |
||||
ns = default.nameservers[0] |
||||
parts = url.split('.') |
||||
|
||||
for i in xrange(len(parts), 0, -1): |
||||
sub = '.'.join(parts[i - 1:]) |
||||
query = dns.message.make_query(sub, dns.rdatatype.NS) |
||||
response = dns.query.udp(query, ns, 3) |
||||
if response.rcode() != dns.rcode.NOERROR: |
||||
self.print_error("query error") |
||||
return False |
||||
|
||||
if len(response.authority) > 0: |
||||
rrset = response.authority[0] |
||||
else: |
||||
rrset = response.answer[0] |
||||
|
||||
rr = rrset[0] |
||||
if rr.rdtype == dns.rdatatype.SOA: |
||||
#Same server is authoritative, don't check again |
||||
continue |
||||
|
||||
query = dns.message.make_query(sub, |
||||
dns.rdatatype.DNSKEY, |
||||
want_dnssec=True) |
||||
response = dns.query.udp(query, ns, 3) |
||||
if response.rcode() != 0: |
||||
self.print_error("query error") |
||||
return False |
||||
# HANDLE QUERY FAILED (SERVER ERROR OR NO DNSKEY RECORD) |
||||
|
||||
# answer should contain two RRSET: DNSKEY and RRSIG(DNSKEY) |
||||
answer = response.answer |
||||
if len(answer) != 2: |
||||
self.print_error("answer error", answer) |
||||
return False |
||||
|
||||
# the DNSKEY should be self signed, validate it |
||||
name = dns.name.from_text(sub) |
||||
try: |
||||
dns.dnssec.validate(answer[0], answer[1], {name: answer[0]}) |
||||
except dns.dnssec.ValidationFailure: |
||||
self.print_error("validation error") |
||||
return False |
||||
|
||||
return True |
||||
Loading…
Reference in new issue