URI: 
       tscripts to check certificates - electrum - Electrum Bitcoin wallet
  HTML git clone https://git.parazyd.org/electrum
   DIR Log
   DIR Files
   DIR Refs
   DIR Submodules
       ---
   DIR commit 614254d037c411ee4ca87226ed9834849f5bfc1a
   DIR parent 36b61fccfd406cc873524bacbbc8dabe1cc4fe38
  HTML Author: ThomasV <thomasv@gitorious>
       Date:   Wed,  2 Oct 2013 10:21:25 +0200
       
       scripts to check certificates
       
       Diffstat:
         M lib/interface.py                    |      70 +++++++++++++++++--------------
       
       1 file changed, 39 insertions(+), 31 deletions(-)
       ---
   DIR diff --git a/lib/interface.py b/lib/interface.py
       t@@ -25,25 +25,49 @@ import ssl
        
        from version import ELECTRUM_VERSION, PROTOCOL_VERSION
        from util import print_error, print_msg
       +from simple_config import SimpleConfig
        
        
        DEFAULT_TIMEOUT = 5
        proxy_modes = ['socks4', 'socks5', 'http']
        
        
       -def is_expired(cert):
       +def check_cert(host, cert):
            from OpenSSL import crypto as c
            _cert = c.load_certificate(c.FILETYPE_PEM, cert)
       -    notAfter = _cert.get_notAfter() 
       -    notBefore = _cert.get_notBefore() 
       -    now = time.time()
       -    if now > time.mktime( time.strptime(notAfter[:-1] + "GMT", "%Y%m%d%H%M%S%Z") ):
       -        print "deprecated cert", self.host, notAfter
       -        return True
       -    if now < time.mktime( time.strptime(notBefore[:-1] + "GMT", "%Y%m%d%H%M%S%Z") ):
       -        print "notbefore", self.host, notBefore
       -        return True
       -    return False
       +
       +    m = "host: %s\n"%host
       +    m += "has_expired: %s\n"% _cert.has_expired()
       +    m += "pubkey: %s bits\n" % _cert.get_pubkey().bits()
       +    m += "serial number: %s\n"% _cert.get_serial_number() 
       +    #m += "issuer: %s\n"% _cert.get_issuer()
       +    #m += "algo: %s\n"% _cert.get_signature_algorithm() 
       +    m += "version: %s\n"% _cert.get_version()
       +    print_msg(m)
       +
       +
       +
       +def check_certificates():
       +    config = SimpleConfig()
       +    mydir = os.path.join(config.path, "certs")
       +    certs = os.listdir(mydir)
       +    for c in certs:
       +        print c
       +        p = os.path.join(mydir,c)
       +        with open(p) as f:
       +            cert = f.read()
       +        check_cert(c, cert)
       +    
       +
       +def cert_verify_hostname(s):
       +    # hostname verification (disabled)
       +    from backports.ssl_match_hostname import match_hostname, CertificateError
       +    try:
       +        match_hostname(s.getpeercert(True), host)
       +        print_error("hostname matches", host)
       +    except CertificateError, ce:
       +        print_error("hostname did not match", host)
       +
        
        
        class Interface(threading.Thread):
       t@@ -52,7 +76,6 @@ class Interface(threading.Thread):
            def __init__(self, config=None):
        
                if config is None:
       -            from simple_config import SimpleConfig
                    config = SimpleConfig()
        
                threading.Thread.__init__(self)
       t@@ -288,10 +311,10 @@ class Interface(threading.Thread):
                        dercert = s.getpeercert(True)
                        s.close()
                        cert = ssl.DER_cert_to_PEM_cert(dercert)
       -
                        temporary_path = cert_path + '.temp'
                        with open(temporary_path,"w") as f:
                            f.write(cert)
       +
                    else:
                        is_new = False
        
       t@@ -316,27 +339,18 @@ class Interface(threading.Thread):
                    except ssl.SSLError, e:
                        print_error("SSL error:", self.host, e)
                        if is_new:
       -                    os.unlink(temporary_path)
       +                    check_cert(self.host, cert)
       +                    os.rename(temporary_path, cert_path + '.rej')
                        return
                    except:
                        print_error("wrap_socket failed", self.host)
                        traceback.print_exc(file=sys.stdout)
       -                if is_new:
       -                    os.unlink(temporary_path)
                        return
        
                    if is_new:
                        print_error("saving certificate for", self.host)
                        os.rename(temporary_path, cert_path)
        
       -            # hostname verification (disabled)
       -            #from backports.ssl_match_hostname import match_hostname, CertificateError
       -            #try:
       -            #    match_hostname(s.getpeercert(), self.host)
       -            #    print_error("hostname matches", self.host)
       -            #except CertificateError, ce:
       -            #    print_error("hostname does not match", self.host, s.getpeercert())
       -            #    return
        
                s.settimeout(60)
                self.s = s
       t@@ -538,11 +552,5 @@ class Interface(threading.Thread):
        
        
        if __name__ == "__main__":
       -    
       -    q = Queue.Queue()
       -    i = Interface({'server':'btc.it-zone.org:50002:s', 'path':'/extra/key/wallet', 'verbose':True})
       -    i.start(q)
       -    time.sleep(1)
       -    exit()
        
       -    
       +    check_certificates()