2018-01-31 05:23:57 +03:00
/ *
Copyright 2018 Intel Corporation
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
/ * *
* @ description MeshCmd , command line tool for Intel AMT and MeshCentral .
* @ author Ylian Saint - Hilaire
* @ version v0 . 2.0
* /
2017-11-01 02:19:58 +03:00
var fs = require ( 'fs' ) ;
var os = require ( 'os' ) ;
var net = require ( 'net' ) ;
var http = require ( 'http' ) ;
var dgram = require ( 'dgram' ) ;
var httpHeaders = require ( 'http-headers' ) ;
var tcpserver = null ;
var broadcastSockets = { } ;
var multicastSockets = { } ;
var discoveryInterval = null ;
var membershipIPv4 = '239.255.255.235' ;
var membershipIPv6 = 'FF02:0:0:0:0:0:0:FE' ;
2017-12-13 03:04:54 +03:00
var settings = null ;
2018-01-31 05:23:57 +03:00
var meshCmdVersion = '***Mesh*Cmd*Version***' ; // Dynamically replaced with MeshCentral version
2017-12-13 03:04:54 +03:00
var amtLms = null , amtMei = null , amtMeiState = null ;
2018-02-08 05:45:14 +03:00
var wsstack = null , amtstack = null ;
var oswsstack = null , osamtstack = null ;
2017-12-13 03:04:54 +03:00
// MeshCommander for Firmware (GZIP'ed, Base64)
var Small _IntelAmtWebApp = " H4sIAAAAAAAEAHq / e7 + Noou / c0hkgCuA0 + psjxSHwX + F7ZVbYCZTYMn13vt9FViAnxibM562PPnvJ4 + ZBMLkWupYVnn1SpbtVaYWl2 / tX681B4FphbysTBwGwROSI7DLtzUaIEXT + Pjnhm / TP / xfP / Q / VnUDhmcCvVxJg9KkD7 / 8 NEVW4kNncis3uDdvbIwkr0C3aNKNKfzVw6HTj52y / 8 uhwd5eQo1poXQNxmdoMDdcyaFXgU2lJKZSUUjB5ZWnUaQPOak89Aw5SnkNJb5pZOlVGov0IQMD8Y0wyaDFxfw1 / + 2 j73 / aBV9 / XqqUPB2JuMwUO3QDNpIa9v5wrbaoC6F2ccUZQ5kUiuAXUHNxiEFzEK + 9 CsUWDc / htdeCbP0WNS + cYsvfYbxuTJIroXScCcivkoz + lFptJIt3FTdIMXXJpW9UEwenhcDC3K40AbJLf4fZFTekuskrPwch1MbEUkm82dpQeIIgMD9tXNminJHX6t05aTsVTgTXgncOGoFqgDEuyzggMWQoOsbbRsCB0lWUrkt9xyVTO9sjg / z94V5yxuGOM1O5QjjfcWUL0k1cVESQsCQld9bHiNcQb3nLDbLOrn2GudJgG82l42weBfPCqtoe + zd6DkovA5jNoii5rsLutvJh2BjXCDvXUpkSbNgLo2pfNPthK4TB7TpTxqg6XpDkuooGEdb / JcBiHGAx8U8VbLq / sZhPLcYdGlmAho0BkqSaSk70bXRLYBvFpUE9PBtEKSTX79npRHqNavmxEAXfI0vcWekPyel09Od2sWz2I0cLWKwXwVAkuETQfqmBcZTmeTi7YFi + 9 npVL3jy + tE8moez3LPN94JwNFqVGts2g3NgXNDzeKI7cIpijbOAXHI5IntOBSepUGU3VM + yDLILtxHeu + MZO8o8o2NpKj + vuGDPFWMvRga4QiyQDIqNEDkKcTaTdbO / ScGV + YZq2rkzEMlZDVz + D2fhxWLq7nT2LSOOOdq3s1X4IHgpY3JKISVs76vD2tVhGM + NEReQhJqhvu1Xr1WCM + 9 UlWm4Ue2W0TJaFH / XSvO + k5zmsZNgARcQuE5y4MPuNONCQhDQr / 2 / ujlelum / P9fHm8NvG8gxlmqnoUnGR8kFikYdNovG5zkYuZzY67ujjERBN7m + SBp2Pa095eENr8TLIbHDtCfU4rAWUXdGOPvPbmb3XQiPVrNVtMymSbWNpokyvPOHt8zEzylFw2vUPbwBrkeQ5YDh1O60QZb1gMblkUXifnRNzO + f4pMXQkjBnYuoG0PcgZbdPW4e5YH9Ii37bgq7PmU70E9M2OtnkIbGBsFe9 / 2 n4d7xbRVvtHg + fGuVvPiL16JYdBQG / sue1uu2PhEkJYVAjXdLKQ + 3 Gk1 / ft13zy8ycxrXH7uW2811m + QxBRBgcQcs3FfXGTl0c9XfnN2ptj + fY6Hyyt7cbvtIFWNd3Z2bXucyedbguA5S1mXhtpiEo8ul0 + koY4TgMzeYggVfzme + 6 Aty1ZTnrOn1bb4LjzsKKqUcL9C6Ss1KYR4z8P2I2L225bjLLBkNKUx1UjlIzX2JKF6ZjLRxZNO21aoIFnyeEtHiAzdwPFAudvjoXM0coz1BTqcTA4cw2pcmc1weLW / aBAnB5kg09yB0Hg99PW7D3PVdIMe3j55893j / QT3OKAGHrLksOGk / O8n53YP8Lw + aqjSf1egAclMm1WLTJOVOsGA5kOzW3eieLyNgwUl2bTM / 7 u5Nq7 / ahTkR1zkcveS4TIkJFdjt21 / WDh7U2rlpgEUDI9yeJvI / udP53frgL + sXMrQOgVVsuFm3SX2HFqae + 2 h4gzrVpI8g9cXSH8Zb3WtivHEH0rOeoZJOryZQGkl0FUQkMNzkVRRGnrC04cqAYzXU44KV1Ftn7gQa0RdZsDJWvWOGszUcQxrgX / lxCgv0iXnnUE8c5 / ZVtGyD3cDYpmYn8N + 0 + Td30jZky1duEbYI / mJsriRnwpZ3vzqSUCzXMNvLANJpOjo6TRpMTUgYg5MO410Z4jlVSZgOYhA2lL5xyhMT4HAQpkxOljhHf7KYuEXn6It6LxVfQSQ / pLtt9Mw2qu82i5Gd34CrtgUEiW3aubSvWvxhmfg6oJr8KhM3gdVOj16BbUOwENAp + 6 W8xgrjkIc4Ki2zQO6yMgvilS6ziqOsOJgfgAC3yKlK60fVIyJxEkdIKjlTb7p9qGMLG3D0RpW8Rzzk4uOKsJUo79c4FuSO3qjBI5lEJnEaC8rBtHWF2x1RKwfhEwqDqYP8CDM2VSm5IIQXEdEdhUwM1dsyFHsnYAAuQE8ybItyPtm0kMpXpi31KehvNGGIi7Zg2SkPZHAL5GZCeBBEiamgM8m6kd6zex + eOTVlYZ + SQNAVmPafmlRfs9ml0ZpyJj / xidwsbYq6ntNJnd4mzwH9sA2OgeRgdplggO31ekdvYDTHc1hs3bzVhbY0BgM40sKpHFlsKRUKhomHxH2ZclES + 1 HoP07vcdvtzI7wbL5lnKzRnGOesqM3 + AVtUIU3kIh3ZJ1wgs4IexQLzWJ6FYiexPsW00AkLQRdxKoBFCZxFntUgT2S2OdPQsfoMnmwGLpVHPUaeULxA8miTCowJhLhmvAPCX1Ec8K52B1bL5X6VMy + Z4SiY98XdsUB0WwRU1JAo4HpbbUdfKnVjTW3Xb1lJiY5y3ZzBedkif1JYPzisFDFCwTLlvJVmeKkmGR8zuwojIVvVU24RSpIxXAyUzJtCT1v0Nyn4Ya3jGa + E97ErMkQzDguEUmsI + MVC8TZF / GCbd4eLWZ3aRwLQM3l6M1CHSZNNYcGajqcWQfLVq7r / NFKrF6j5bdt926WLyeBi10RD4saMupt0bbrHKAljhgBr72Y / QRaqVP4oEjuRcH3q5ChXfj8kqFlSNfyuLJVkkYBWhCUbgLMSXBwhDVtezUZ0aD / S0n7y / hD7yENv + z05isSRb1kQ + LzZwEa46j9JXSK2Tdv3jAi6IR821VutAfEIojkb3DwFAoG2x5mm + d / yXGxeRfX9 + eX3flxV5Q44 + EXEY4fUvxAxAyJu0v6JWgjnW0ighlB / or4j2hFqPAC6QyOZQ / UVGoUblV0063zcEnxmkhQrxZ0F7YdwUEh5Vn1Nf7OwCYZ2 + 8 + azM24BtBaOVaMUP8tEludtJbVglotqcHTBOH3IF9Sgwxr4KYHrbPAlh5uXu3mQ0rmI0qmGWcvk1oZAiZoXEF7UkV7aKrt1hMiiwOK1i4lZq3Q4LFwHOqqA1KqMkKQdnaeAKZhElzXGBUiMnAaUFzpD3P7N6zJlbIK / IOyt7oYcb / CLfw4R3BPKWEnUUP7U42I5NFsBVCwJ9palDyFP1UbU2jj0l5fSM7 / wxH6ySeXYCP + IKSh7fo + Ooe3ZEgpPqSaZNQjhKK3v9whZZKcBQyJFYP + WTwsjP92QGCNSq3gXiCSAwgKOS9mpjiDf5o9d4mHwg9ltL / YzSsTc1EClBhnHC0AVlJIOTPKy9kLCUIKwjkq1y / Z2lQlRaQ5Wgxpo78BQ1P9SvvbY28Tkb2XOnsZCoShW8HP4Oo9V9o3Z + enlbkQpnmpBrIHGzj5VRozewZXSBZeE1bdwnHnKBLsswkTAGVo + 2 uyCe / SCJM6VutnxoSd8C9SEOSoIaEzt1APt + xMjhN7T55eIgIghIHMZ8SEqN1EhAg / Ei2G6iuIKzzlMYq5dAzQfIhzk3opPAdkDJiCcekWMBwu6M1apWt / c1zdYq589Ii9u1EPg9CjqiyxkA5PsQ02MfIbR097Ul3bPeSWMt3usLxA0F8RbTpM7lhyVIOacHX2F + F8e / Rc + tWElduAvTTqvEhNeswlmYcmu / W7p / leDKVbiRI5x2d5QT1wfhJsVQ / StQIEnh6kadJHBOfG3lWfptAbtD5CL0Zjz9t7b61dlKYQzyanYXMV1xJYLl941MAbqw1kXEb6nql2B0w11eURJiHTyJF8HH8hBkQAntD0r1NRwMHqVxyOnB2ng86SKpFhX1zQ22 / HlDBI4mB85rEaVEf6yRlRGokMF + NHtVsutFz6SY3sxbpKczpr7tZ6HclG / x / YInQnFFL + oP
var Medium _IntelAmtWebApp = " H4sIAAAAAAAEAHq / e7 + Noou / c0hkgCuA0 + pekxQF4q / i5uit2lnXuZxzvn9LKZVvEDik0 / rNux802qNjz6WJTcVfRfAqXbOrt / av1 + gjw7RCWlY6DoPgiaEjkKu3NWowglr6 + OeW7tI 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
var Large _IntelAmtWebApp = " H4sIAAAAAAAEAHq / e7 + Noou / c0hkgCuA0 + psjxSHwX + F7ZVbYDosud57v68CC / ATY3PG05Yn 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
2017-11-01 02:19:58 +03:00
// Check the server certificate fingerprint
function onVerifyServer ( clientName , certs ) {
2018-01-27 04:01:38 +03:00
if ( certs == null ) { certs = clientName ; } // Temporary thing until we fix duktape
2017-11-01 02:19:58 +03:00
try { for ( var i in certs ) { if ( certs [ i ] . fingerprint . replace ( /:/g , '' ) == settings . serverHttpsHash ) { return ; } } } catch ( e ) { }
2017-11-10 04:18:30 +03:00
if ( serverhash != null ) { console . log ( 'Error: Failed to verify server certificate.' ) ; throw 'Invalid server certificate' ; }
2017-11-01 02:19:58 +03:00
}
// Print a debug message
function debug ( level , message ) { if ( ( settings . debugLevel != null ) && ( settings . debugLevel >= level ) ) { console . log ( message ) ; } }
2017-12-13 03:04:54 +03:00
function exit ( status ) { if ( status == null ) { status = 0 ; } try { process . exit ( status ) ; } catch ( e ) { } }
2017-11-01 02:19:58 +03:00
2017-11-03 04:44:27 +03:00
// Parse the input arguments into an object
function parceArguments ( argv ) {
var r = { } ;
for ( var i in argv ) {
i = parseInt ( i ) ;
if ( argv [ i ] . startsWith ( '--' ) == true ) {
var key = argv [ i ] . substring ( 2 ) . toLowerCase ( ) , val = true ;
if ( ( ( i + 1 ) < argv . length ) && ( argv [ i + 1 ] . startsWith ( '--' ) == false ) ) { val = argv [ i + 1 ] ; }
r [ key ] = val ;
}
}
return r ;
}
2018-01-31 05:23:57 +03:00
// Parse the incoming arguments
2017-11-01 02:19:58 +03:00
function run ( argv ) {
2017-12-13 03:04:54 +03:00
if ( meshCmdVersion [ 0 ] == '*' ) { meshCmdVersion = '' ; } else { meshCmdVersion = ' v' + meshCmdVersion ; }
2017-11-03 04:44:27 +03:00
var args = parceArguments ( argv ) ;
2017-12-13 03:04:54 +03:00
console . log ( 'MeshCentral Command' + meshCmdVersion ) ;
//console.log('addedModules = ' + JSON.stringify(addedModules));
2017-11-01 02:19:58 +03:00
var actionpath = 'meshaction.txt' ;
2017-11-03 04:44:27 +03:00
if ( args . actionfile != null ) { actionpath = args . actionfile ; }
2018-02-02 23:46:09 +03:00
var actions = [ 'ROUTE' , 'AMTLMS' , 'AMTLOADWEBAPP' , 'AMTLOADSMALLWEBAPP' , 'AMTLOADLARGEWEBAPP' , 'AMTCLEARWEBAPP' , 'AMTSTORAGESTATE' , 'MEINFO' , 'MEVERSIONS' , 'MEHASHES' , 'AMTSAVESTATE' , 'MESCRIPT' ] ;
2017-12-13 03:04:54 +03:00
2017-11-01 02:19:58 +03:00
// Load the action file
var actionfile = null ;
try { actionfile = fs . readFileSync ( actionpath ) ; } catch ( e ) { }
2017-12-13 03:04:54 +03:00
if ( ( actionpath != 'meshaction.txt' ) && ( actionfile == null ) ) { console . log ( 'Unable to load \"' + actionpath + '\". Create this file or specify the location using --actionfile [filename].' ) ; exit ( 1 ) ; return ; }
if ( actionfile != null ) { try { settings = JSON . parse ( actionfile ) ; } catch ( e ) { console . log ( actionpath , e ) ; exit ( 1 ) ; return ; } } else { if ( argv . length >= 2 ) { settings = { action : argv [ 1 ] } } }
2017-12-16 00:43:04 +03:00
if ( settings == null ) { settings = { } ; }
2017-11-01 02:19:58 +03:00
2017-11-03 04:44:27 +03:00
// Set the arguments
2017-12-16 00:43:04 +03:00
if ( ( typeof args . action ) == 'string' ) { settings . action = args . action ; }
2017-11-03 04:44:27 +03:00
if ( ( typeof args . localport ) == 'string' ) { settings . localport = parseInt ( args . localport ) ; }
if ( ( typeof args . remotenodeid ) == 'string' ) { settings . remoteNodeId = args . remotenodeid ; }
if ( ( typeof args . username ) == 'string' ) { settings . username = args . username ; }
if ( ( typeof args . password ) == 'string' ) { settings . password = args . password ; }
if ( ( typeof args . user ) == 'string' ) { settings . username = args . user ; }
if ( ( typeof args . pass ) == 'string' ) { settings . password = args . pass ; }
2017-12-13 03:04:54 +03:00
if ( ( typeof args . host ) == 'string' ) { settings . hostname = args . host ; }
if ( ( typeof args . hostname ) == 'string' ) { settings . hostname = args . hostname ; }
2017-11-03 04:44:27 +03:00
if ( ( typeof args . serverid ) == 'string' ) { settings . serverId = args . serverid ; }
if ( ( typeof args . serverhttpshash ) == 'string' ) { settings . serverHttpsHash = args . serverhttpshash ; }
if ( ( typeof args . remoteport ) == 'string' ) { settings . remotePort = parseInt ( args . remoteport ) ; }
2018-01-26 03:12:53 +03:00
if ( ( typeof args . out ) == 'string' ) { settings . output = args . out ; }
if ( ( typeof args . output ) == 'string' ) { settings . output = args . output ; }
2017-12-13 03:04:54 +03:00
if ( ( typeof args . debug ) == 'string' ) { settings . debugLevel = parseInt ( args . debug ) ; }
2018-02-02 23:46:09 +03:00
if ( ( typeof args . script ) == 'string' ) { settings . script = args . script ; }
2018-01-26 03:28:52 +03:00
if ( args . noconsole ) { settings . noconsole = true ; }
if ( args . nocommander ) { settings . noconsole = true ; }
2018-01-26 03:12:53 +03:00
if ( args . lmsdebug ) { settings . lmsdebug = true ; }
if ( args . tls ) { settings . tls = true ; }
2017-12-16 00:43:04 +03:00
if ( ( argv . length > 1 ) && ( actions . indexOf ( argv [ 1 ] . toUpperCase ( ) ) >= 0 ) ) { settings . action = argv [ 1 ] ; }
2017-11-03 04:44:27 +03:00
2017-11-01 02:19:58 +03:00
// Validate meshaction.txt
2017-12-16 00:43:04 +03:00
if ( settings . action == null ) { console . log ( 'No action specified, valid actions are ' + actions . join ( ', ' ) + '.' ) ; exit ( 1 ) ; return ; }
2017-11-01 02:19:58 +03:00
settings . action = settings . action . toLowerCase ( ) ;
2017-12-13 03:04:54 +03:00
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
2018-01-31 05:23:57 +03:00
if ( settings . action == 'route' ) {
// MeshCentral Router, port map local TCP port to a remote computer
2017-12-13 03:04:54 +03:00
if ( ( settings . localPort == null ) || ( typeof settings . localPort != 'number' ) || ( settings . localPort < 0 ) || ( settings . localPort > 65535 ) ) { console . log ( 'No or invalid \"localPort\" specified, use --localport [localport].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . remoteNodeId == null ) || ( typeof settings . remoteNodeId != 'string' ) ) { console . log ( 'No or invalid \"remoteNodeId\" specified.' ) ; exit ( 1 ) ; return ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { console . log ( 'No or invalid \"username\" specified, use --username [username].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . serverId == null ) || ( typeof settings . serverId != 'string' ) || ( settings . serverId . length != 96 ) ) { console . log ( 'No or invalid \"serverId\" specified.' ) ; exit ( 1 ) ; return ; }
if ( ( settings . serverHttpsHash == null ) || ( typeof settings . serverHttpsHash != 'string' ) || ( settings . serverHttpsHash . length != 96 ) ) { console . log ( 'No or invalid \"serverHttpsHash\" specified.' ) ; exit ( 1 ) ; return ; }
if ( ( settings . remotePort == null ) || ( typeof settings . remotePort != 'number' ) || ( settings . remotePort < 0 ) || ( settings . remotePort > 65535 ) ) { console . log ( 'No or invalid \"remotePort\" specified, use --remoteport [remoteport].' ) ; exit ( 1 ) ; return ; }
if ( settings . serverUrl != null ) { startRouter ( ) ; } else { discoverMeshServer ( ) ; } // Start MeshCentral Router
}
2017-12-16 00:43:04 +03:00
else if ( ( settings . action == 'amtloadwebapp' ) || ( settings . action == 'amtloadsmallwebapp' ) || ( settings . action == 'amtloadlargewebapp' ) || ( settings . action == 'amtclearwebapp' ) || ( settings . action == 'amtstoragestate' ) ) { // Intel AMT Web Application Actions
2018-01-31 05:23:57 +03:00
// Intel AMT 11.6+ Load MeshCommander into firmware
2017-12-13 03:04:54 +03:00
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
settings . protocol = 'http:' ;
settings . localport = 16992 ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
digest = require ( 'http-digest' ) . create ( settings . username , settings . password ) ;
digest . http = require ( 'http' ) ;
2017-12-16 00:43:04 +03:00
if ( settings . action == 'amtstoragestate' ) {
2017-12-13 03:04:54 +03:00
getAmtStorage ( function ( statusCode , data ) { if ( statusCode == 200 ) { console . log ( "Storage State: " + JSON . stringify ( data , null , 2 ) ) ; exit ( ) ; return ; } else { console . log ( "Unable to read storage state." ) ; exit ( ) ; return ; } } ) ;
} else {
2017-12-16 00:43:04 +03:00
if ( settings . action == 'amtloadwebapp' ) { settings . webapp = Medium _IntelAmtWebApp ; }
else if ( settings . action == 'amtloadsmallwebapp' ) { settings . webapp = Small _IntelAmtWebApp ; }
else if ( settings . action == 'amtloadlargewebapp' ) { settings . webapp = Large _IntelAmtWebApp ; }
else if ( settings . action == 'amtclearwebapp' ) { settings . webapp = null ; }
2017-12-13 03:04:54 +03:00
nextStepStorageUpload ( ) ;
}
} else if ( ( settings . action == 'meversion' ) || ( settings . action == 'meversions' ) || ( settings . action == 'mever' ) ) {
2018-01-31 05:23:57 +03:00
// Display Intel AMT versions
var amtMeiModule = require ( 'amt-mei' ) ;
2017-12-13 03:04:54 +03:00
var amtMei = new amtMeiModule ( ) ;
2018-01-26 03:28:52 +03:00
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
2017-12-13 03:04:54 +03:00
amtMei . on ( 'connect' , function ( ) {
this . getVersion ( function ( val ) {
console . log ( "MEI Version = " + val . BiosVersion . toString ( ) ) ;
for ( var version in val . Versions ) { console . log ( val . Versions [ version ] . Description + " = " + val . Versions [ version ] . Version ) ; }
exit ( 1 ) ; return ;
} ) ;
} ) ;
} else if ( settings . action == 'mehashes' ) {
2018-01-31 05:23:57 +03:00
// Display Intel AMT list of trusted hashes
var amtMeiModule = require ( 'amt-mei' ) ;
2017-12-13 03:04:54 +03:00
var amtMei = new amtMeiModule ( ) ;
2018-01-26 03:28:52 +03:00
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
2017-12-13 03:04:54 +03:00
amtMei . on ( 'connect' , function ( ) {
this . getHashHandles ( function ( handles ) {
exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) {
this . getCertHashEntry ( handles [ i ] , function ( result ) {
2018-01-26 03:28:52 +03:00
console . log ( result . name + ', (' + ( result . isDefault ? 'Default' : '' ) + ( result . isActive ? ', Active' : ', Disabled' ) + ')\r\n ' + result . hashAlgorithmStr + ': ' + result . certificateHash ) ;
if ( -- exitOnCount == 0 ) { exit ( 1 ) ; }
2017-12-13 03:04:54 +03:00
} ) ;
}
} ) ;
} ) ;
} else if ( settings . action == 'meinfo' ) {
2018-01-31 05:23:57 +03:00
// Display Intel AMT version and activation state
var amtMeiModule = require ( 'amt-mei' ) ;
2017-12-13 03:04:54 +03:00
var amtMei = new amtMeiModule ( ) ;
2018-01-26 03:28:52 +03:00
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
2017-12-13 03:04:54 +03:00
amtMei . on ( 'connect' , function ( ) {
mestate = { } ;
this . getVersion ( function ( val ) { for ( var version in val . Versions ) { if ( val . Versions [ version ] . Description == 'AMT' ) { mestate . ver = val . Versions [ version ] . Version ; } } } ) ;
this . getProvisioningState ( function ( result ) { mestate . ProvisioningState = result ; } ) ;
this . getProvisioningMode ( function ( result ) { mestate . ProvisioningMode = result ; } ) ;
this . getEHBCState ( function ( result ) { mestate . ehbc = result ; } ) ;
this . getControlMode ( function ( result ) { mestate . controlmode = result ; } ) ;
this . getMACAddresses ( function ( result ) { mestate . mac = result ; } ) ;
this . getDnsSuffix ( function ( result ) {
mestate . dns = result ;
var str = 'Intel AMT v' + mestate . ver ;
2017-12-16 00:43:04 +03:00
if ( mestate . ProvisioningState . stateStr == 'PRE' ) { str += ', pre-provisioning state' ; }
else if ( mestate . ProvisioningState . stateStr == 'IN' ) { str += ', in-provisioning state' ; }
else if ( mestate . ProvisioningState . stateStr == 'POST' ) { if ( mestate . ProvisioningMode . modeStr == 'ENTERPRISE' ) { str += ', activated in ' + [ "none" , "client control mode" , "admin control mode" , "remote assistance mode" ] [ mestate . controlmode . controlMode ] ; } else { str += ', activated in ' + mestate . ProvisioningMode . modeStr ; } }
if ( mestate . ehbc . EHBC == true ) { str += ', EHBC enabled' ; }
2017-12-13 03:04:54 +03:00
console . log ( str + '.' ) ;
exit ( 1 ) ;
} ) ;
} ) ;
2018-01-03 03:52:49 +03:00
} else if ( settings . action == 'amtsavestate' ) {
2018-01-31 05:23:57 +03:00
// Save the entire state of Intel AMT info a JSON file
2018-01-26 03:12:53 +03:00
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( settings . output == null ) || ( typeof settings . output != 'string' ) || ( settings . output == '' ) ) { console . log ( 'No or invalid \"output\" file specified, use --output [filename].' ) ; exit ( 1 ) ; return ; }
settings . protocol = 'http:' ;
settings . localport = 16992 ;
debug ( 1 , "Settings: " + JSON . stringify ( settings ) ) ;
2018-01-03 03:52:49 +03:00
saveEntireAmtState ( ) ;
2017-12-16 00:43:04 +03:00
} else if ( settings . action == 'amtlms' ) {
2018-01-31 05:23:57 +03:00
// Start Intel AMT MicroLMS
startLms ( function ( state ) { console . log ( [ 'MicroLMS did not start. MicroLMS must run as administrator or LMS any already be active.' , 'MicroLMS started.' , 'MicroLMS started, MeshCommander on HTTP/16994.' , 'MEI error' ] [ state ] ) ; if ( state == 0 ) { exit ( 0 ) ; } } ) ;
2018-02-02 23:46:09 +03:00
} else if ( settings . action == 'mescript' ) {
// Start running a MEScript
if ( ( settings . password == null ) || ( typeof settings . password != 'string' ) || ( settings . password == '' ) ) { console . log ( 'No or invalid \"password\" specified, use --password [password].' ) ; exit ( 1 ) ; return ; }
if ( ( settings . hostname == null ) || ( typeof settings . hostname != 'string' ) || ( settings . hostname == '' ) ) { settings . hostname = '127.0.0.1' ; }
if ( ( settings . username == null ) || ( typeof settings . username != 'string' ) || ( settings . username == '' ) ) { settings . username = 'admin' ; }
if ( ( settings . script == null ) || ( typeof settings . script != 'string' ) || ( settings . script == '' ) ) { console . log ( 'No or invalid \"script\" file specified, use --script [filename].' ) ; exit ( 1 ) ; return ; }
startMeScript ( ) ;
2017-11-01 02:19:58 +03:00
} else {
2017-12-13 03:04:54 +03:00
console . log ( 'Invalid \"action\" specified.' ) ; exit ( 1 ) ; return ;
2017-11-01 02:19:58 +03:00
}
2017-12-13 03:04:54 +03:00
}
2017-11-01 02:19:58 +03:00
2018-02-02 23:46:09 +03:00
//
// Run MESCRIPT
//
function startMeScript ( ) {
// See if MicroLMS needs to be started
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) { settings . noconsole = true ; startLms ( startMeScriptEx ) ; return ; } else { startMeScriptEx ( ) ; }
}
function startMeScriptEx ( ) {
console . log ( 'Running script...' ) ;
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
amtstack = new amt ( wsstack ) ;
2018-02-08 05:45:14 +03:00
//IntelAmtEntireStateProgress = 101;
//amtstack.onProcessChanged = onWsmanProcessChanged;
2018-02-02 23:46:09 +03:00
var scriptData = null ;
try { scriptData = fs . readFileSync ( settings . script ) ; } catch ( e ) { console . log ( 'Unable to read script file (1): ' + settings . script + '.' ) ; exit ( 1 ) ; return ; }
if ( scriptData == null ) { console . log ( 'Unable to read script file (2): ' + settings . script + '.' ) ; exit ( 1 ) ; return ; }
try { scriptData = JSON . parse ( scriptData ) ; } catch ( e ) { console . log ( 'Unable to read script file (3): ' + settings . script + '.' ) ; exit ( 1 ) ; return ; }
if ( scriptData . mescript == null ) { console . log ( 'Unable to read script file (4): ' + settings . script + '.' ) ; exit ( 1 ) ; return ; }
var scriptData = Buffer . from ( scriptData . mescript , 'base64' ) ;
var scriptModule = require ( 'amt-script' ) ;
var script = scriptModule . setup ( scriptData , { } )
script . amtstack = amtstack ;
script . start ( ) ;
2018-02-08 05:45:14 +03:00
script . onCompleted = function ( ) { exit ( 1 ) ; }
2018-02-02 23:46:09 +03:00
}
2018-01-31 05:23:57 +03:00
//
// FETCH ALL INTEL AMT STATE
//
2018-01-03 03:52:49 +03:00
// Save the entire Intel AMT state
function saveEntireAmtState ( ) {
2018-01-26 03:28:52 +03:00
// See if MicroLMS needs to be started
if ( ( settings . hostname == '127.0.0.1' ) || ( settings . hostname . toLowerCase ( ) == 'localhost' ) ) { settings . noconsole = true ; startLms ( ) ; }
2018-01-26 03:12:53 +03:00
console . log ( 'Fetching all Intel AMT state, this may take a few minutes...' ) ;
2018-01-31 05:23:57 +03:00
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
2018-01-26 03:12:53 +03:00
wsstack = new wsman ( transport , settings . hostname , settings . tls ? 16993 : 16992 , settings . username , settings . password , settings . tls ) ;
2018-01-03 03:52:49 +03:00
amtstack = new amt ( wsstack ) ;
2018-01-26 03:28:52 +03:00
amtstack . onProcessChanged = onWsmanProcessChanged ;
//var AllWsman = "AMT_GeneralSystemDefenseCapabilities".split(',');
2018-01-03 03:52:49 +03:00
var AllWsman = " AMT _8021xCredentialContext , AMT _8021XProfile , AMT _ActiveFilterStatistics , AMT _AgentPresenceCapabilities , AMT _AgentPresenceInterfacePolicy , AMT _AgentPresenceService , AMT _AgentPresenceWatchdog , AMT _AgentPresenceWatchdogAction , AMT _AlarmClockService , IPS _AlarmClockOccurrence , AMT _AssetTable , AMT _AssetTableService , AMT _AuditLog , AMT _AuditPolicyRule , AMT _AuthorizationService , AMT _BootCapabilities , AMT _BootSettingData , AMT _ComplexFilterEntryBase , AMT _CRL , AMT _CryptographicCapabilities , AMT _EACCredentialContext , AMT _EndpointAccessControlService , AMT _EnvironmentDetectionInterfacePolicy , AMT _EnvironmentDetectionSettingData , AMT _EthernetPortSettings , AMT _EventLogEntry , AMT _EventManagerService , AMT _EventSubscriber , AMT _FilterEntryBase , AMT _FilterInSystemDefensePolicy , AMT _GeneralSettings , AMT _GeneralSystemDefenseCapabilities , AMT _Hdr8021Filter , AMT _HeuristicPacketFilterInterfacePolicy , AMT _HeuristicPacketFilterSettings , AMT _HeuristicPacketFilterStatistics , AMT _InterfacePolicy , AMT _IPHeadersFilter , AMT _KerberosSettingData , AMT _ManagementPresenceRemoteSAP , AMT _MessageLog , AMT _MPSUsernamePassword , AMT _NetworkFilter , AMT _NetworkPortDefaultSystemDefensePolicy , AMT _NetworkPortSystemDefenseCapabilities , AMT _NetworkPortSystemDefensePolicy , AMT _PCIDevice , AMT _PETCapabilities , AMT _PETFilterForTarget , AMT _PETFilterSetting , AMT _ProvisioningCertificateHash , AMT _PublicKeyCertificate , AMT _PublicKeyManagementCapabilities , AMT _PublicKeyManagementService , AMT _PublicPrivateKeyPair , AMT _RedirectionService , AMT _RemoteAccessCapabilities , AMT _RemoteAccessCredentialContext , AMT _RemoteAccessPolicyAppliesToMPS , AMT _RemoteAccessPolicyRule , AMT _RemoteAccessService , AMT _SetupAndConfigurationService , AMT _SNMPEventSubscriber , AMT _StateTransitionCondition , AMT _SystemDefensePolicy , AMT _SystemDefensePolicyInService , AMT _SystemDefenseService , AMT _SystemPowerScheme , AMT _ThirdPartyDataStorageAdministrationService , AMT _ThirdPartyDataStorageService , AMT _TimeSynchronizationService , AMT _TLSCredentialContext , AMT _TLSProtocolEndpoint , AMT _TLSProtocolEndpointCollection , AMT _TLSSettingData , AMT _TrapTargetForService , AMT _UserInitiatedConnectionService , AMT _WebUIService , AMT _WiFiPortConfigurationService , CIM _AbstractIndicationSubscription , CIM _Account , CIM _AccountManagementCapabilities , CIM _AccountManagementService , CIM _AccountOnSystem , CIM _AdminDomain , CIM _AlertIndication , CIM _AssignedIdentity , CIM _AssociatedPowerManagementService , CIM _AuthenticationService , CIM _AuthorizationService , CIM _BIOSElement , CIM _BIOSFeature , CIM _BIOSFeatureBIOSElements , CIM _BootConfigSetting , CIM _BootService , CIM _BootSettingData , CIM _BootSourceSetting , CIM _Capabilities , CIM _Card , CIM _Chassis , CIM _Chip , CIM _Collection , CIM _Component , CIM _ComputerSystem , CIM _ComputerSystemPackage , CIM _ConcreteComponent , CIM _ConcreteDependency , CIM _Controller , CIM _CoolingDevice , CIM _Credential , CIM _CredentialContext , CIM _CredentialManagementService , CIM _Dependency , CIM _DeviceSAPImplementation , CIM _ElementCapabilities , CIM _ElementConformsToProfile , CIM _ElementLocation , CIM _ElementSettingData , CIM _ElementSoftwareIdentity , CIM _ElementStatisticalData , CIM _EnabledLogicalElement , CIM _EnabledLogicalElementCapabilities , CIM _EthernetPort , CIM _Fan , CIM _FilterCollection , CIM _FilterCollectionSubscription , CIM _HostedAccessPoint , CIM _HostedDependency , CIM _HostedService , CIM _Identity , CIM _IEEE8021xCapabilities , CIM _IEEE8021xSettings , CIM _Indication , CIM _IndicationService , CIM _InstalledSoftwareIdentity , CIM _KVMRedirectionSAP , CIM _LANEndpoint , CIM _ListenerDestination , CIM _ListenerDestinationWSManagement , CIM _Location , CIM _Log , CIM _LogEntry , CIM _LogicalDevice , CIM _LogicalElement , CIM _LogicalPort , CIM _LogicalPortCapabilities , CIM _LogManagesRecord , CIM _ManagedCredential , CIM _ManagedElement , CIM _ManagedSystemElement , CIM _MediaAccessDevice , CIM _MemberOfCollection , CIM _Memory , CIM _MessageLog , CIM _NetworkPort , CIM _NetworkPortCapabilities , CIM _NetworkPortConfigurationService , CIM _OrderedComponent , CIM _OwningCollectionElement , CIM _OwningJobElement , CIM _PCIController , CIM _PhysicalComponent , CIM _PhysicalElement , CIM _PhysicalElementLocation , CIM _PhysicalFrame , CIM _PhysicalMemory , CIM _PhysicalPackage , CIM _Policy , CIM _PolicyAction , CIM _PolicyCondition , CIM _PolicyInSystem , CIM _PolicyRule , CIM _PolicyR
2018-01-26 03:28:52 +03:00
IntelAmtEntireStateProgress = 101 ;
2018-01-03 03:52:49 +03:00
IntelAmtEntireStateCalls = 3 ;
IntelAmtEntireState = { 'localtime' : Date ( ) , 'utctime' : new Date ( ) . toUTCString ( ) , 'isotime' : new Date ( ) . toISOString ( ) } ;
amtstack . BatchEnum ( null , AllWsman , saveEntireAmtStateOk2 , null , true ) ;
amtstack . GetAuditLog ( saveEntireAmtStateOk3 ) ;
amtstack . GetMessageLog ( saveEntireAmtStateOk4 ) ;
}
2018-01-26 03:28:52 +03:00
function onWsmanProcessChanged ( a , b ) { var x = Math . floor ( ( a * 100 ) / b ) ; if ( x < IntelAmtEntireStateProgress ) { IntelAmtEntireStateProgress = x ; console . log ( ( 100 - x ) + '%' ) ; } }
2018-01-03 03:52:49 +03:00
//function onWsmanResponse(stack, name, responses, status) { console.log('onWsmanResponse', JSON.stringify(responses), status); exit(1); }
2018-01-26 03:28:52 +03:00
function saveEntireAmtStateOk2 ( stack , name , responses , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'wsmanenums' ] = responses ; saveEntireAmtStateDone ( ) ; }
function saveEntireAmtStateOk3 ( stack , messages , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'auditlog' ] = messages ; saveEntireAmtStateDone ( ) ; }
function saveEntireAmtStateOk4 ( stack , messages , tag , status ) { if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; exit ( 2 ) ; } IntelAmtEntireState [ 'eventlog' ] = messages ; saveEntireAmtStateDone ( ) ; }
2018-01-03 03:52:49 +03:00
2018-01-31 05:23:57 +03:00
// Called when the entire state of Intel AMT is fetched.
2018-01-03 03:52:49 +03:00
function saveEntireAmtStateDone ( ) {
if ( -- IntelAmtEntireStateCalls != 0 ) return ;
2018-01-26 03:12:53 +03:00
var out = fs . openSync ( settings . output , 'w' ) ;
fs . writeSync ( out , new Buffer ( JSON . stringify ( IntelAmtEntireState ) , 'utf8' ) ) ;
fs . closeSync ( out ) ;
console . log ( 'Done, results written to ' + settings . output + '.' ) ;
2018-01-03 03:52:49 +03:00
exit ( 1 ) ;
}
2018-01-31 05:23:57 +03:00
//
// FETCH ALL INTEL AMT MEI STATE
//
2017-12-13 03:04:54 +03:00
// Get Intel AMT information using MEI
function getAmtInfo ( func , tag ) {
if ( amtMei == null ) { if ( func != null ) { func ( null , tag ) ; } return ; }
2018-01-03 03:52:49 +03:00
amtMeiTmpState = { Flags : 0 } ; // Flags: 1=EHBC, 2=CCM, 4=ACM
2017-12-13 03:04:54 +03:00
amtMei . getProtocolVersion ( function ( result ) { if ( result != null ) { amtMeiTmpState . MeiVersion = result ; } } ) ;
amtMei . getVersion ( function ( val ) {
amtMeiTmpState . Versions = { } ;
if ( val != null ) {
for ( var version in val . Versions ) { amtMeiTmpState . Versions [ val . Versions [ version ] . Description ] = val . Versions [ version ] . Version ; }
amtMei . getProvisioningMode ( function ( result ) { if ( result != null ) { amtMeiTmpState . ProvisioningMode = result . mode ; } } ) ;
amtMei . getProvisioningState ( function ( result ) { if ( result != null ) { amtMeiTmpState . ProvisioningState = result . state ; } } ) ;
amtMei . getEHBCState ( function ( result ) { if ( ( result != null ) && ( result . EHBC == true ) ) { amtMeiTmpState . Flags += 1 ; } } ) ;
amtMei . getControlMode ( function ( result ) { if ( result != null ) { if ( result . controlMode == 1 ) { amtMeiTmpState . Flags += 2 ; } if ( result . controlMode == 2 ) { amtMeiTmpState . Flags += 4 ; } } } ) ;
//amtMei.getMACAddresses(function (result) { if (result != null) { amtMeiTmpState.mac = result; } });
amtMei . getDnsSuffix ( function ( result ) { if ( result != null ) { amtMeiTmpState . dns = result ; } } ) ;
amtMei . getHashHandles ( function ( handles ) {
amtMeiTmpState . TrustedHashes = [ ] ;
exitOnCount = handles . length ;
for ( var i = 0 ; i < handles . length ; ++ i ) {
amtMei . getCertHashEntry ( handles [ i ] , function ( result ) {
amtMeiTmpState . TrustedHashes . push ( { Active : result . isActive , Default : result . isDefault , HashAlgorithm : result . hashAlgorithm , Name : result . name , Hash : result . certificateHash } ) ;
2018-02-02 23:46:09 +03:00
if ( -- exitOnCount == 0 ) { amtMeiTmpState . Notifications = lmsNotifications ; amtMeiState = amtMeiTmpState ; if ( func != null ) { func ( amtMeiTmpState , tag ) ; } }
2017-12-13 03:04:54 +03:00
} ) ;
}
} ) ;
} else {
amtMeiState = amtMeiTmpState ;
amtMeiState . ProvisioningMode = - 858993460 ;
amtMeiState . TrustedHashes = { } ;
2018-02-02 23:46:09 +03:00
amtMeiState . Notifications = lmsNotifications ;
2017-12-13 03:04:54 +03:00
if ( func != null ) { func ( amtMeiState , tag ) ; }
}
} ) ;
}
2018-01-31 05:23:57 +03:00
//
// MicroLMS
//
2018-02-02 23:46:09 +03:00
var lmsControlSockets = { } ;
var lmsControlSocketsNextId = 1 ;
var lmsNotifications = [ ] ;
2018-01-26 03:28:52 +03:00
function startLms ( func ) {
2018-01-31 05:23:57 +03:00
var lme _heci = require ( 'amt-lme' ) ;
2017-12-13 03:04:54 +03:00
var amtLms = null ;
var http = require ( 'http' ) ;
2018-02-02 23:46:09 +03:00
// MeshCommander LMS v0.6.0
2018-02-13 23:28:11 +03:00
var _IntelAmtWebApp _etag = "mFi3RDMFyxzvW299RFnl" ;
var _IntelAmtWebApp = " H4sIAAAAAAAEAOy96XrbyJIg + l9PAaOmZaIIUSS1WCYEqSmKslnWVqJkV7WORh82kiiRAA2AWizryebHPNJ9hRuRC5DYSMquc7rn6z7dZRG5RETGlhGZicT / 93 / + 7 + 6 bw7PO5Z / nXWkUTcZ7u / ivFEZPY0cfOe5wFLUa9fq / Qblj2Hu7EycyoGE0XXO + ztx7 / Y + 1 q / Zax59Mjcg1x45k + V7keJEu97q6Yw8dmXWJyyPnMVpHHJo1MoLQifRZNFjbkUWgHdp47fJp6rD + njFx9IEfTIxozXYix4pc3xOhjp3pyPcc3fMB5dj17qTAGeuyC01kKQJAujsxhs761BtKo8AZ6LJtREYrLtRMI3S2N1X388HZxUP904ehrwMkwog907efngVuaBPjcU189u + dYDD2H1oj17YdTxsAYWsDY + KOn1pG4BpjVRo543snci1DlULDC9dCJ3AHtGHofnNa76eRZvljP2iZY8O6A3qsu2Hgzzy79TByIwdwBkPXW4v8aavOH8bOIEqeAkJQXVt7cMw7N4KmM2u0ZhnjsT + LWh6wJ66aAXogYQyMZBV3KJSC8on / rag0zBfmCl7G7jMlDYiaGrbtekP49TI2TGf8bLvhdGw8wXB9GC4d + oPr2f4D6ogw / jWxTisA + ODa0YgKgsJujVAgzzkQI2DQGJmkZZ4Jxhejde + GwGr7GZ9Bzyw / MFDR6HBon1 / qmwNsijq2TDtKCiszjI2NZlN7GTWeE8k3GiB68vhAVcr0x3ZKF0Rpb00fRVVo1JNn048if9LahpKXUfM5rVtLI9hOI9jOwQcJTp / n9Ngs6JHS0CYSGNkZAl + iUb6Es28WhEDs1HfB4APRNoClhvZSQ + 8E7 aY + yA8FMXAfHVujtsKMhFsHs9vtd0CFCGjb2H6 / XReLQMSOEawNA8N2wc1UGhtbtjNUJdZUqv + b + stmc7OxYUmofArQMQ38YeCEoWkUEkOQFtPTzJAzGLx3NoDVNddLMXsTBf5SG / vDZ7G5aZqGuUUrGqU1UoSuTIqClheBZxi5Y7vi27aS6uDsOM4ArLc2mI3HljMeF47kPZDBhxCLmQ4NarIO8aU2MVzvB4A1trYLwDHbpxxBzkE9 + tbxmgH27LUAKKD0jPsyObxP5BDjY26EIDT9APQp0Vcp9MeuLXGpFKATOfiu + a65PZinSptMk2hLoknGtrFl1GNNAuIbz9zHNYACYKuEf3di8yKcnmvXZOZYC6eG5YBvegiMqZYxJYKomdKwjWbanuspkLn + QdaVQVH9OTd9QSnoJWUrY3kj5ivw5UkjzpQyFOnAHs3ngsKNV4PZKJsQftnZ2Gm + M / ODCqcBeJTUnC / MMvm5iQ0xcieIhpAn0PWLYVqG08j34xXQcyKw8R3hIvA + NU1slnvxXIQAgnikIJrPaRIfjMB7LgHzi1XH / 6 HTgbip8cyGjA6dc2Ir5abWAmfqGDjds19iHYmtWrNgXBFjraE74LHWRX384exwPOq227 + 3 j0 / O28ed5tPj + 8 OgPn5qfpld7BzZs9no96exf / bl2zd7 + DTZ / vD0H7OvjfX7d9WvndHU + uu3 + m / OH5N3ztb9 / fr6 + tPHrYM2QGvvtI / b5H + / t w / w z 8 X T z s n 4 t 6 + N 5 t m J 6 Y R m t / 3 0 V / e k c 3 r w 2 f + r 5 z 9 1 T k a / t f / 8 c 3 h 4 1 n h 4 O O n U f z s 2 h p v d 9 s 6 H Q / / 8 4 O n T n 8 Z B t 3 P V + + 3 w Y T Q 8 6 z 4 8 H P n D 9 u n J p 7 8 O f 3 / o B C c f O 6 O N p 4 v O + c n W z H 9 / / v E h a o + 7 O + 8 + d p z 2 l u 3 1 f j u / O B l e f j t 6 d / D 7 7 7 9 9 O v j 9 6 6 D 9 + 4 e T 0 e a f H 0 Y P z v j i z 4 v 2 Y a j L C u N 4 8 1 / K 8 d + 6 h + 3 z w 8 8 n x u T k 8 A G Y d C 5 y 8 C T D w d 6 T 1 6 t O D 4 K 2 8 c V z / d M v X 1 3 P / P 0 3 6 3 L D + O 1 b / c u H / p / G s P 2 b F R n 1 s 9 4 4 N A e 9 4 + Y V B G K H v z 9 + a o d 9 N 7 z 8 6 7 D X 9 t t n D 3 o y 2 o 1 / 6 W g / 9 T 6 2 j 7 v W R + e P 6 J 1 R o D v r 4 u i t z O h P D e c 4 s I 4 n X 0 5 6 0 w d 3 + h 8 H p 7 0 P 4 z 8 P N r + 1 p 3 8 d G X 8 e t P / 6 8 / f L P z d H f 3 z o f x 1 1 v l x s G P 3 j 6 o H X 3 X n s t b v d o X H w + P v h 7 2 5 7 8 w v M w c 6 w / / v x 0 e b V x 3 b o b 3 4 Y T X 7 z u v 3 P d x f v 2 l 9 / b / 5 + Z 1 1 9 v G q E d 5 2 7 z + 3 Q 6 V q d R D 8 i Z 3 K A s x m b E j C S m I C 1 8 / C h X h q E 0 U k M p w 3 K b 2 M W + f E E B / P R L C S V B c 7 R 2 j F 3 G n n n a E G + N 4 O f S J L l B l y M T U G M T W E O p S g 2 0 / E N c d U p A j e J x x J h Z 8 O + U v K 3 C s m n E 2 o c X w n z J q L i f G z m 0 C 6 a L F 5 q s / C 5 O M d y P Y g 0 j H F h m k X o L k i z S O 6 R S 7 N Y a Z g v z B V A b O V 4 s y K G s Y m I Z C V 8 v F t k v L x H 6 V i 3 z f e 2 9 Y 5 w x k M s J 9 A h F S U e v c f / A x S P a + H I g M y s B Q G x h I K X g q F p V K S 6 y v 6 / t i E p W n 5 O t C x L k + L Y z D C h G C S Q j t n H b g i z H + b g d B C 5 5 G + L W U E 8 O R M h P / L n L X z + t g a Z o / P Y 2 i I z m z X B 4 f C E b H N z U + O J q O t h l L Z G 8 9 F U h L m T 6 I t g T b w E K d 4 S n l l Y g k W F + S G l b W f r 3 7 h l 2 c 7 A m I 2 j f J T L m R M 4 Y + h / 7 8 T k p 7 P K w X v 8 v 1 Q E + v 7 9 e + 1 l d 5 0 u X + x G b g R / j k / 6 0 o k T j j r + Z G I A R 4 L d d V q x S 5 I C 3 5 t 5 Y 9 + w d d k a O 4 Y 3 m 1 Y U G Q q Z / F F h 9 B F 0 G z u d R C M q z j 1 E s 8 r e r u 3 e S 6 6 t 1 y V r b I S h T t M x Q G z g o h B d T R L i J 2 a S W 8 A i a I P t b O m e h G y 6 D N y U J R q r 6 j L 9 K + / t T h l g j I k K B i J U N 5 G O R g 7 k H g w W i a G k 0 t Z C s h a P o J l e + 2 r G X r M o 7 A s c G + B C z / S / D N Q G Q 8 P T K A Z Z i E 8 t h 5 i p q E h U h Z O o D / 3 6 3 i 5 E 8 B 6 C 3 N w 7 B g l B 2 1 q t B t K F U h B e Q P 9 z P f B g d K n L n I E G e j j + m a N 3 x n 7 o o C D H r n W n g 7 K D R D 1 w H h U l Q + 9 W M b 3 c P F B 3 a V t a n u M G W U k h f p 0 z L 7 8 S s J 2 x m y a O L o E J 2 g + z P Q n b O Y z t W A L k Z 9 r D x c O K f H + M K k q e K n W F s Y x B T W J o A L G 3 6 p n h V F v 9 5 f 2 7 d 9 s a 5 2 L M i X J G X j g D 0 J Z R j H M 8 C V k R s p L 2 A j Z u F 3 R t W 2 C + R u S A 2 A q 4 K k L k L V M g 3 x W A P H S M p Y E m b V N g d w r A H v s g r c U Q S b M U s P c F w O Q e C G m 8 G j h D T W q f X E o c u L w A O n i Y g T u c B U 6 i o y l N b d Q Z A D Y f N I i R p J s 0 y p u k G 3 K L l / O T Y J f 8 T x P J 1 P I z F p u r U J 3 f b y b a S g y Z z 1 M b w j z U w B R L m D f B C 0 r 8 v 1 9 2 y P / y 0 y X a l S w 6 L z 6 D l 5 h A o 9 5 Q E r / R 2 N h b N c G s u b p 3 W L g j c U 6 T 6 U l g z J I 4 m i K O z S K H k U J 7 1 T + Q + k 4 0 m 9 Z M 1 5 O 6 t h v 5 Q a F M / s c V z X d F p 8 4 D 2 i h H O Q v N W 8 9 5 I K w 9 E O 0 y 3 / N s 6 n j Z r j 6 U 5 f u i H I p 8 W d + 4 d 7 I Q Q i g T I W R l S g e f W Y j j 4 c 7 a U y u 0 A h / U J L M y G q / M E d P a 4 v J B w t 7 l g 4 r 8 v E p 1 Q c w 0 E N D G d j y j Z m V C J l v i s 3 b D 2 T Q v M q w m 3 g x E N Z v u o U t L q / S J 4 U E O G n B J J k N P E o + 9 D 0 4 E h U Y Q O b Z k P u 0 a 5 V J k f d N 6 t r c 7 2 7 M C S I V B b 3 f X Z 8 B l Y 8 + Q o J 8 0 c M e O m o G X F m 0 p Q G w m w v M k 5 x F C b y g C a A 6 G F 3 4 g 2 Y E x l F b h j z + d Y o 0 h h f H A E b c E f 6 O R G 0 p 0 p 6 Z W a N k 7 i 9 x y u v n 7 / F a k l v c C G L f x 0 J M u + q b U j v n g H U S V t w v o n A R F B 6 k p N i 4 G L t w 5 T 1 M M F n U 5 g F E H M G R j H D o y r Y H h e v m K f M S V 1 t q N n W T w U 6 R j 6 D e S U T R i C E O / g s 7 c 2 O s / h e i N + 5 E R z U I U F O / W L O n W J N 0 + G o H 9 Y A S O 1 P P o F i r x 9 U n v 7 Z L e 2 6 R 3 F 0 N 8 n L r F L r G H z h G 6 R T q 1 Z + D c s 5 2 a Z a N r s u H B d A D m I 3 b Z K e m x Q z q c O t G D H 9 y h A a K u p l g C L q K E w n e k L 5 p 5 4 I E t F n Y u Y 0 m D 8 q T v g A 2 5 0 V N x 5 / d l n d 9 T 3 g y R o e e g T I 5 n p U b b K B t u Y 0 e U / 6 E z c L w w 3 b N U c S h r r 0 K Y o d q W B X N k l N a c j T K Z b J C O X 4 w 7 R 2 q P j W B C u z F z C 6 m o c B M 0 T F k 0 X 3 w q N O d Y A f h m U F L T L M 0 S 6 f E D d x A Y E 4 c 0 3 Z j b l I d O d c B N O 2 W J 2 M z 7 h W Q u
2018-01-31 05:23:57 +03:00
var amtMeiModule = require ( 'amt-mei' ) ;
2017-12-13 03:04:54 +03:00
amtMei = new amtMeiModule ( ) ;
2018-01-26 03:28:52 +03:00
amtMei . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + e ) ; exit ( 1 ) ; return ; } ) ;
2017-12-13 03:04:54 +03:00
//console.log('PTHI Connecting...');
amtMei . on ( 'connect' , function ( ) {
//console.log("PTHI Connected.");
2018-01-26 03:12:53 +03:00
amtLms = new lme _heci ( { debug : settings . lmsdebug } ) ;
2018-01-26 03:28:52 +03:00
amtLms . on ( 'error' , function ( e ) {
//console.log('LME connection failed', e);
2018-01-31 05:23:57 +03:00
if ( func ) { func ( amtLms . connected == false ? 0 : 3 ) ; }
} ) ;
2018-02-02 00:45:26 +03:00
amtLms . on ( 'notify' , function ( data , options , str ) {
2018-02-02 23:46:09 +03:00
if ( str != null ) {
var notify = { date : Date . now ( ) , str : str } ;
lmsNotifications . push ( notify ) ;
while ( lmsNotifications . length > 100 ) { lmsNotifications . shift ( ) ; }
var notifyBuf = Buffer . concat ( [ Buffer . from ( '0900' , 'hex' ) , Buffer . from ( JSON . stringify ( notify ) ) ] ) // Add a notification
for ( var i in lmsControlSockets ) { lmsControlSockets [ i ] . write ( notifyBuf ) ; }
//console.log(str);
}
//else { console.log(JSON.stringify(data)); }
2018-01-26 03:28:52 +03:00
} ) ;
2017-12-13 03:04:54 +03:00
//console.log('LME Connecting...');
amtLms . on ( 'connect' , function ( ) {
2018-01-31 05:23:57 +03:00
amtLms . connected = true ;
2018-02-08 05:45:14 +03:00
amtMei . getLocalSystemAccount ( function ( x ) {
var transport = require ( 'amt-wsman-duk' ) ;
var wsman = require ( 'amt-wsman' ) ;
var amt = require ( 'amt' ) ;
//oswsstack = new wsman(transport, '127.0.0.1', 16992, x.user, x.pass, false);
oswsstack = new wsman ( transport , '127.0.0.1' , 16992 , 'admin' , 'P@ssw0rd' , false ) ;
osamtstack = new amt ( oswsstack ) ;
//osamtstack.BatchEnum(null, ['CIM_SoftwareIdentity'], startLmsWsmanResponse, null, true);
//AllWsmanRequests = "AMT_8021xCredentialContext,AMT_8021XProfile,AMT_ActiveFilterStatistics,AMT_AgentPresenceCapabilities,AMT_AgentPresenceInterfacePolicy,AMT_AgentPresenceService,AMT_AgentPresenceWatchdog,AMT_AgentPresenceWatchdogAction,AMT_AlarmClockService,IPS_AlarmClockOccurrence,AMT_AssetTable,AMT_AssetTableService,AMT_AuditLog,AMT_AuditPolicyRule,AMT_AuthorizationService,AMT_BootCapabilities,AMT_BootSettingData,AMT_ComplexFilterEntryBase,AMT_CRL,AMT_CryptographicCapabilities,AMT_EACCredentialContext,AMT_EndpointAccessControlService,AMT_EnvironmentDetectionInterfacePolicy,AMT_EnvironmentDetectionSettingData,AMT_EthernetPortSettings,AMT_EventLogEntry,AMT_EventManagerService,AMT_EventSubscriber,AMT_FilterEntryBase,AMT_FilterInSystemDefensePolicy,AMT_GeneralSettings,AMT_GeneralSystemDefenseCapabilities,AMT_Hdr8021Filter,AMT_HeuristicPacketFilterInterfacePolicy,AMT_HeuristicPacketFilterSettings,AMT_HeuristicPacketFilterStatistics,AMT_InterfacePolicy,AMT_IPHeadersFilter,AMT_KerberosSettingData,AMT_ManagementPresenceRemoteSAP,AMT_MessageLog,AMT_MPSUsernamePassword,AMT_NetworkFilter,AMT_NetworkPortDefaultSystemDefensePolicy,AMT_NetworkPortSystemDefenseCapabilities,AMT_NetworkPortSystemDefensePolicy,AMT_PCIDevice,AMT_PETCapabilities,AMT_PETFilterForTarget,AMT_PETFilterSetting,AMT_ProvisioningCertificateHash,AMT_PublicKeyCertificate,AMT_PublicKeyManagementCapabilities,AMT_PublicKeyManagementService,AMT_PublicPrivateKeyPair,AMT_RedirectionService,AMT_RemoteAccessCapabilities,AMT_RemoteAccessCredentialContext,AMT_RemoteAccessPolicyAppliesToMPS,AMT_RemoteAccessPolicyRule,AMT_RemoteAccessService,AMT_SetupAndConfigurationService,AMT_SNMPEventSubscriber,AMT_StateTransitionCondition,AMT_SystemDefensePolicy,AMT_SystemDefensePolicyInService,AMT_SystemDefenseService,AMT_SystemPowerScheme,AMT_ThirdPartyDataStorageAdministrationService,AMT_ThirdPartyDataStorageService,AMT_TimeSynchronizationService,AMT_TLSCredentialContext,AMT_TLSProtocolEndpoint,AMT_TLSProtocolEndpointCollection,AMT_TLSSettingData,AMT_TrapTargetForService,AMT_UserInitiatedConnectionService,AMT_WebUIService,AMT_WiFiPortConfigurationService,CIM_AbstractIndicationSubscription,CIM_Account,CIM_AccountManagementCapabilities,CIM_AccountManagementService,CIM_AccountOnSystem,CIM_AdminDomain,CIM_AlertIndication,CIM_AssignedIdentity,CIM_AssociatedPowerManagementService,CIM_AuthenticationService,CIM_AuthorizationService,CIM_BIOSElement,CIM_BIOSFeature,CIM_BIOSFeatureBIOSElements,CIM_BootConfigSetting,CIM_BootService,CIM_BootSettingData,CIM_BootSourceSetting,CIM_Capabilities,CIM_Card,CIM_Chassis,CIM_Chip,CIM_Collection,CIM_Component,CIM_ComputerSystem,CIM_ComputerSystemPackage,CIM_ConcreteComponent,CIM_ConcreteDependency,CIM_Controller,CIM_CoolingDevice,CIM_Credential,CIM_CredentialContext,CIM_CredentialManagementService,CIM_Dependency,CIM_DeviceSAPImplementation,CIM_ElementCapabilities,CIM_ElementConformsToProfile,CIM_ElementLocation,CIM_ElementSettingData,CIM_ElementSoftwareIdentity,CIM_ElementStatisticalData,CIM_EnabledLogicalElement,CIM_EnabledLogicalElementCapabilities,CIM_EthernetPort,CIM_Fan,CIM_FilterCollection,CIM_FilterCollectionSubscription,CIM_HostedAccessPoint,CIM_HostedDependency,CIM_HostedService,CIM_Identity,CIM_IEEE8021xCapabilities,CIM_IEEE8021xSettings,CIM_Indication,CIM_IndicationService,CIM_InstalledSoftwareIdentity,CIM_KVMRedirectionSAP,CIM_LANEndpoint,CIM_ListenerDestination,CIM_ListenerDestinationWSManagement,CIM_Location,CIM_Log,CIM_LogEntry,CIM_LogicalDevice,CIM_LogicalElement,CIM_LogicalPort,CIM_LogicalPortCapabilities,CIM_LogManagesRecord,CIM_ManagedCredential,CIM_ManagedElement,CIM_ManagedSystemElement,CIM_MediaAccessDevice,CIM_MemberOfCollection,CIM_Memory,CIM_MessageLog,CIM_NetworkPort,CIM_NetworkPortCapabilities,CIM_NetworkPortConfigurationService,CIM_OrderedComponent,CIM_OwningCollectionElement,CIM_OwningJobElement,CIM_PCIController,CIM_PhysicalComponent,CIM_PhysicalElement,CIM_PhysicalElementLocation,CIM_PhysicalFrame,CIM_PhysicalMemory,CIM_PhysicalPackage,CIM_Policy,CIM_PolicyAction,CIM_PolicyCondition,CIM_PolicyInSystem,CIM_Poli
//var AllWsman = "IPS_SecIOService,IPS_ScreenSettingData,IPS_ProvisioningRecordLog,IPS_HostBasedSetupService,IPS_HostIPSettings,IPS_IPv6PortSettings".split(',');
//var xx = AllWsman[4];
//console.log(xx);
//osamtstack.Get(AllWsmanRequests.shift(), startLmsWsmanResponse, null, true);
2018-02-12 04:13:26 +03:00
//osamtstack.Get('IPS_SecIOService', startLmsWsmanResponse, null, true);
2018-02-08 05:45:14 +03:00
//osamtstack.BatchEnum(null, ['IPS_KVMRedirectionSettingData', 'CIM_SoftwareIdentity'], startLmsWsmanResponse, null, true);
//osamtstack.BatchEnum(null, AllWsman, startLmsWsmanResponse, null, true);
} ) ;
console . log ( "LME Connected." ) ;
2018-01-26 03:28:52 +03:00
if ( settings . noconsole !== true ) {
amtLms . meshCommander = http . createServer ( ) ;
amtLms . meshCommander . listen ( 16994 ) ;
amtLms . meshCommander . on ( 'upgrade' , function ( req , socket , head ) {
//console.log("WebSocket for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/lms.ashx' : // MeshCommander control channel (PTHI)
socket . ws = socket . upgradeWebSocket ( ) ;
socket . ws . on ( 'data' , processLmsControlData ) ;
2018-02-02 23:46:09 +03:00
socket . ws . on ( 'end' , function ( ) { if ( lmsControlSockets [ this . id ] ) { delete lmsControlSockets [ this . id ] ; /*console.log('removeControl', JSON.stringify(lmsControlSockets));*/ } } ) ;
var id = lmsControlSocketsNextId ++ ;
lmsControlSockets [ id ] = socket . ws ;
socket . ws . id = id ;
//socket.ws.write(Buffer.concat([Buffer.from('0900', 'hex'), Buffer.from(JSON.stringify(lmsNotifications))])); // Send out full list of notifications
//console.log('addControl', JSON.stringify(lmsControlSockets));
2018-01-26 03:28:52 +03:00
break ;
case '/webrelay.ashx' : // MeshCommander data channel (LME)
socket . ws = socket . upgradeWebSocket ( ) ;
amtLms . bindDuplexStream ( socket . ws , 'IPv4' , 16992 ) ;
break ;
default :
socket . end ( ) ;
break ;
}
} ) ;
amtLms . meshCommander . on ( 'request' , function ( req , rsp ) {
//console.log("WebRequest for " + req.url.split('?')[0]);
switch ( req . url . split ( '?' ) [ 0 ] ) {
case '/' : // Serve MeshCommander Web Application for LMS
2018-02-02 23:46:09 +03:00
var lmscommander = null ;
try { lmscommander = fs . readFileSync ( 'lmscommander.htm' ) ; } catch ( e ) { }
if ( lmscommander != null ) {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Transfer-Encoding' : 'chunked' } ) ;
rsp . end ( lmscommander ) ;
} else {
rsp . writeHead ( 200 , 'OK' , { Server : 'JSLMS' , 'Cache-Control' : 'max-age=0, no-cache' , 'X-Frame-Options' : 'DENY' , 'Content-Type' : 'text/html' , 'Content-Encoding' : 'gzip' , 'Transfer-Encoding' : 'chunked' , ETag : _IntelAmtWebApp _etag } ) ;
rsp . end ( Buffer . from ( _IntelAmtWebApp , 'base64' ) ) ;
}
2018-01-26 03:28:52 +03:00
break ;
default : // Unknown request
rsp . statusCode = 404 ;
rsp . statusMessage = "Not Found" ;
rsp . end ( ) ;
break ;
}
2017-12-13 03:04:54 +03:00
2018-01-26 03:28:52 +03:00
} ) ;
//console.log("LMS started, MeshCommander on HTTP/16994.");
if ( func ) { func ( 2 ) ; }
} else {
//console.log("LMS started.");
if ( func ) { func ( 1 ) ; }
}
2017-12-13 03:04:54 +03:00
} ) ;
} ) ;
}
2018-02-08 05:45:14 +03:00
function startLmsWsmanResponse ( stack , name , responses , status ) {
if ( status == 600 ) { console . log ( 'ERROR: Unable to connect to Intel(R) AMT.' ) ; }
else if ( status != 200 ) { console . log ( 'ERROR: Unable to get object from Intel(R) AMT, status = ' + status + '.' ) ; }
else { console . log ( JSON . stringify ( responses . Body ) , status ) ; }
//amtstack.Get(AllWsmanRequests.shift(), startLmsWsmanResponse, null, true);
}
2018-01-31 05:23:57 +03:00
// Process commands in the LMS control channel
2018-02-02 23:46:09 +03:00
// Command 9 is add a notification.
2017-12-13 03:04:54 +03:00
function processLmsControlData ( data ) {
if ( data . length < 2 ) return ;
var cmdid = data . readUInt16LE ( 0 ) ;
switch ( cmdid ) {
case 1 : // Request basic Intel AMT information (CMD = 1)
2018-01-31 05:23:57 +03:00
{ getAmtInfo ( function ( meinfo , socket ) { meinfo . LoginMode = 2 ; socket . write ( Buffer . concat ( [ Buffer . from ( '0100' , 'hex' ) , Buffer . from ( JSON . stringify ( meinfo ) ) ] ) ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 2 : // Intel AMT MEI Unprovision (CMD = 2)
2018-01-31 05:23:57 +03:00
{ if ( data . length < 6 ) break ; amtMei . unprovision ( data . readUInt32LE ( 2 ) , function ( status , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 2 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 3 : // Intel AMT MEI GetLocalSystemAccount (CMD = 3)
2018-01-31 05:23:57 +03:00
{ amtMei . getLocalSystemAccount ( function ( account , socket ) { socket . write ( Buffer . concat ( [ Buffer . from ( '030000000000' , 'hex' ) , account . raw ] ) ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 4 : // Instruct Intel AMT to start remote configuration (CMD = 4)
2018-01-31 05:23:57 +03:00
{ amtMei . startConfiguration ( function ( status , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 5 : // Instruct Intel AMT to stop remote configuration (CMD = 5)
2018-01-31 05:23:57 +03:00
{ amtMei . stopConfiguration ( function ( status , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 6 : // Instruct Intel AMT connect CIRA (CMD = 6)
2018-01-31 05:23:57 +03:00
{ amtMei . openUserInitiatedConnection ( function ( status , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 7 : // Instruct Intel AMT disconnect CIRA (CMD = 7)
2018-01-31 05:23:57 +03:00
{ amtMei . closeUserInitiatedConnection ( function ( status , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 7 , 0 ) ; data . writeUInt32LE ( status , 2 ) ; socket . write ( data ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
case 8 : // Get Intel AMT CIRA State (CMD = 8)
2018-01-31 05:23:57 +03:00
{ amtMei . getRemoteAccessConnectionStatus ( function ( state , socket ) { var data = new Buffer ( 6 ) ; data . writeUInt16LE ( 8 , 0 ) ; data . writeUInt32LE ( state . status , 2 ) ; socket . write ( Buffer . concat ( [ data , state . raw ] ) ) ; } , this ) ; break ; }
2017-12-13 03:04:54 +03:00
}
2017-11-01 02:19:58 +03:00
}
2018-01-31 05:23:57 +03:00
//
// MeshCentral TCP port router
//
2017-11-01 02:19:58 +03:00
function startRouter ( ) {
tcpserver = net . createServer ( OnTcpClientConnected ) ;
2018-01-27 04:01:38 +03:00
tcpserver . on ( 'error' , function ( e ) { console . log ( 'ERRORa: ' + JSON . stringify ( e ) ) ; exit ( 0 ) ; return ; } ) ;
2017-11-01 02:19:58 +03:00
tcpserver . listen ( settings . localPort , function ( ) {
// We started listening.
if ( settings . remoteName == null ) {
console . log ( 'Redirecting local port ' + settings . localPort + ' to remote port ' + settings . remotePort + '.' ) ;
} else {
console . log ( 'Redirecting local port ' + settings . localPort + ' to ' + settings . remoteName + ':' + settings . remotePort + '.' ) ;
}
console . log ( 'Press ctrl-c to terminal.' ) ;
// If settings has a "cmd", run it now.
//process.exec("notepad.exe");
} ) ;
}
// Called when a TCP connect is received on the local port. Launch a tunnel.
function OnTcpClientConnected ( c ) {
try {
// 'connection' listener
debug ( 1 , 'Client connected' ) ;
c . on ( 'end' , function ( ) { disconnectTunnel ( this , this . websocket , 'Client closed' ) ; } ) ;
c . pause ( ) ;
try {
options = http . parseUri ( settings . serverUrl + '?user=' + settings . username + '&pass=' + settings . password + '&nodeid=' + settings . remoteNodeId + '&tcpport=' + settings . remotePort ) ;
2017-12-13 03:04:54 +03:00
} catch ( e ) { console . log ( 'Unable to parse \"serverUrl\".' ) ; process . exit ( 1 ) ; return ; }
2017-11-01 02:19:58 +03:00
options . checkServerIdentity = onVerifyServer ;
2018-01-27 04:01:38 +03:00
options . rejectUnauthorized = false ;
2017-11-01 02:19:58 +03:00
c . websocket = http . request ( options ) ;
c . websocket . tcp = c ;
c . websocket . tunneling = false ;
c . websocket . upgrade = OnWebSocket ;
2018-01-27 04:01:38 +03:00
c . websocket . on ( 'error' , function ( e ) { console . log ( 'ERROR: ' + JSON . stringify ( e ) ) ; } ) ;
2017-11-01 02:19:58 +03:00
c . websocket . end ( ) ;
} catch ( e ) { debug ( 2 , e ) ; }
}
// Disconnect both TCP & WebSocket connections and display a message.
function disconnectTunnel ( tcp , ws , msg ) {
if ( ws != null ) { try { ws . end ( ) ; } catch ( e ) { debug ( 2 , e ) ; } }
if ( tcp != null ) { try { tcp . end ( ) ; } catch ( e ) { debug ( 2 , e ) ; } }
debug ( 1 , 'Tunnel disconnected: ' + msg ) ;
}
// Called when the web socket gets connected
function OnWebSocket ( msg , s , head ) {
debug ( 1 , 'Websocket connected' ) ;
s . on ( 'data' , function ( msg ) {
if ( this . parent . tunneling == false ) {
msg = msg . toString ( ) ;
if ( msg == 'c' ) {
this . parent . tunneling = true ; this . pipe ( this . parent . tcp ) ; this . parent . tcp . pipe ( this ) ; debug ( 1 , 'Tunnel active' ) ;
} else if ( ( msg . length > 6 ) && ( msg . substring ( 0 , 6 ) == 'error:' ) ) {
console . log ( msg . substring ( 6 ) ) ;
disconnectTunnel ( this . tcp , this , msg . substring ( 6 ) ) ;
}
}
} ) ;
s . on ( 'error' , function ( msg ) { disconnectTunnel ( this . tcp , this , 'Websocket error' ) ; } ) ;
s . on ( 'close' , function ( msg ) { disconnectTunnel ( this . tcp , this , 'Websocket closed' ) ; } ) ;
s . parent = this ;
}
// Try to discover the location of the mesh server
function discoverMeshServer ( ) { console . log ( 'Looking for server...' ) ; discoveryInterval = setInterval ( discoverMeshServerOnce , 5000 ) ; discoverMeshServerOnce ( ) ; }
// Try to discover the location of the mesh server only once
function discoverMeshServerOnce ( ) {
var interfaces = os . networkInterfaces ( ) ;
for ( var adapter in interfaces ) {
if ( interfaces . hasOwnProperty ( adapter ) ) {
2017-12-13 03:04:54 +03:00
for ( var i = 0 ; i < interfaces [ adapter ] . length ; ++ i ) {
2017-11-01 02:19:58 +03:00
var addr = interfaces [ adapter ] [ i ] ;
multicastSockets [ i ] = dgram . createSocket ( { type : ( addr . family == "IPv4" ? "udp4" : "udp6" ) } ) ;
multicastSockets [ i ] . bind ( { address : addr . address , exclusive : false } ) ;
if ( addr . family == "IPv4" ) {
multicastSockets [ i ] . addMembership ( membershipIPv4 ) ;
//multicastSockets[i].setMulticastLoopback(true);
multicastSockets [ i ] . once ( 'message' , OnMulticastMessage ) ;
multicastSockets [ i ] . send ( settings . serverId , 16989 , membershipIPv4 ) ;
}
}
}
}
}
// Called when a multicast packet is received
function OnMulticastMessage ( msg , rinfo ) {
var m = msg . toString ( ) . split ( '|' ) ;
if ( ( m . length == 3 ) && ( m [ 0 ] == 'MeshCentral2' ) && ( m [ 1 ] == settings . serverId ) ) {
settings . serverUrl = m [ 2 ] . replace ( '%s' , rinfo . address ) . replace ( '/agent.ashx' , '/meshrelay.ashx' ) ;
console . log ( 'Found server at ' + settings . serverUrl + '.' ) ;
if ( discoveryInterval != null ) { clearInterval ( discoveryInterval ) ; discoveryInterval = null ; }
startRouter ( ) ;
}
}
2018-01-31 05:23:57 +03:00
//
// PUSH MESHCOMMANDER INTO FIRMWARE
//
2017-12-13 03:04:54 +03:00
function nextStepStorageUpload ( ) {
debug ( 3 , "nextStepStorageUpload" ) ;
getAmtStorage ( function ( statusCode , data ) {
if ( statusCode == 200 ) {
debug ( 2 , "getAmtStorage: " + JSON . stringify ( data , null , 2 ) ) ;
if ( ( data [ 'content' ] != null ) && ( data [ 'content' ] [ 'index.htm' ] != null ) ) { nextStepStorageUpload3 ( 'index.htm' ) ; }
else if ( ( data [ 'content' ] != null ) && ( data [ 'content' ] [ 'logon.htm' ] != null ) ) { nextStepStorageUpload3 ( 'logon.htm' ) ; }
else if ( ( data [ 'content' ] != null ) && ( data [ 'content' ] [ 'logon.htm' ] != null ) ) { nextStepStorageUpload3 ( 'logon.htm' ) ; }
else { nextStepStorageUpload2 ( 'index.htm' , null ) ; }
} else {
console . log ( "Unable to read storage state." ) ;
exit ( ) ;
return ;
}
} ) ;
}
function nextStepStorageUpload2 ( uploadName , linkName ) {
debug ( 3 , "nextStepStorageUpload2" ) ;
if ( settings . webapp == null ) { console . log ( "Done." ) ; exit ( ) ; return ; } else {
console . log ( "Uploading MeshCommander..." ) ;
pushToStorage ( uploadName , linkName , Buffer . from ( settings . webapp , 'base64' ) , function ( statusCode ) {
if ( statusCode == 500 ) { console . log ( "Error, check that computer is powered on." ) ; exit ( ) ; return ; }
if ( statusCode != 200 ) {
if ( uploadName == 'index.htm' ) {
nextStepStorageUpload2 ( 'mesh/commander/console' , 'MeshCommander' ) ;
} else {
console . log ( "Unable to upload MeshCommander, status = " + statusCode + "." ) ; exit ( ) ; return ;
}
} else {
console . log ( "Verifying MeshCommander..." ) ;
verifyStorage ( uploadName , Buffer . from ( settings . webapp , 'base64' ) , function ( verified ) {
if ( verified == true ) { console . log ( 'Done.' ) ; } else { console . log ( 'MeshCommander verification failed.' ) ; }
exit ( ) ; return ;
} ) ;
}
} ) ;
}
}
function nextStepStorageUpload3 ( deleteName ) {
console . log ( "Deleting " + deleteName + " from storage..." ) ;
deleteStorage ( deleteName , function ( statusCode ) {
if ( statusCode == 500 ) { console . log ( "Error, check that computer is powered on." ) ; exit ( ) ; return ; }
if ( statusCode == 200 ) { nextStepStorageUpload ( ) ; } else { console . log ( "Unable to delete " + deleteName + "." ) ; exit ( ) ; return ; }
} ) ;
}
// Fetch the Intel AMT storage document
function getAmtStorage ( func , noretry ) {
var req = digest . request ( { protocol : settings . protocol , method : "GET" , host : settings . hostname , path : "/amt-storage/" , port : settings . localport } ,
function ( response ) {
if ( response . statusCode != 200 ) { console . log ( "Unable to connect to Intel(R) AMT." ) ; func ( response . statusCode , null ) ; }
response . on ( 'data' , function ( chunk ) { if ( response . acc == null ) { response . acc = chunk ; } else { response . acc += chunk ; } } ) ;
response . on ( 'end' , function ( ) {
var data = response . acc . toString ( ) , len , data2 , amtstorage = null ;
try {
do { len = data . length ; data2 = data ; data = data2 . replace ( '\x00' , '' ) ; } while ( data != data2 ) ; // Remove all zero's, this is needed because firmware sometimes returns garbage we must fix.
do { len = data . length ; data2 = data ; data = data2 . replace ( '\x22\x01\x22' , '\x22\x22' ) ; } while ( data != data2 ) ; // "\x01", this is needed because firmware sometimes returns garbage we must fix.
amtstorage = JSON . parse ( data ) ;
} catch ( e ) { console . log ( "Error: Unable to parse Intel AMT response." ) ; func ( null ) ; }
if ( func != null ) { func ( response . statusCode , amtstorage ) ; }
} ) ;
} ) ;
req . on ( 'error' , function ( e ) { console . log ( "Error occured: " + JSON . stringify ( e ) ) ; if ( noretry == true ) { if ( func != null ) { func ( null ) ; } } else { getAmtStorage ( func , true ) ; } } ) ;
req . end ( ) ;
}
// Fetch the Intel AMT storage document
function pushToStorage ( name , linkname , data , func , ptr ) {
if ( ptr == null ) { ptr = 0 ; }
2018-01-26 03:12:53 +03:00
var req = digest . request ( { protocol : settings . protocol , method : "PUT" , host : settings . hostname , path : ( "/amt-storage/" + name + ( ( ptr != 0 ) ? '?append=' : '' ) ) , port : settings . localport } ) ;
2017-12-13 03:04:54 +03:00
req . on ( 'error' , function ( e ) { console . log ( "Error occured: " + JSON . stringify ( e ) ) ; if ( func != null ) { func ( null ) ; } } ) ;
2018-01-26 03:12:53 +03:00
req . on ( 'response' , function ( response ) {
debug ( 1 , 'Chunk Done' , data . length , ptr ) ;
if ( ( response . statusCode == 200 ) && ( ptr < data . length ) ) { pushToStorage ( name , linkname , data , func , ptr ) ; } else { if ( func != null ) { func ( response . statusCode ) ; } }
} ) ;
2017-12-13 03:04:54 +03:00
var header = ( ptr > 0 ) ? '<metadata></metadata>' : '<metadata><headers><h>Content-Encoding:gzip</h><h>Content-Type:text/html</h></headers>' + ( ( linkname != null ) ? ( '<link>' + linkname + '</link>' ) : '' ) + '</metadata>' ;
var blocklen = ( ( data . length - ptr ) > ( 7000 - header . length ) ) ? ( 7000 - header . length ) : ( data . length - ptr ) ;
req . write ( Buffer . concat ( [ new Buffer ( header ) , data . slice ( ptr , ptr + blocklen ) ] ) ) ;
ptr += blocklen ;
req . end ( ) ;
}
// Fetch the Intel AMT storage document
function verifyStorage ( name , data , func ) {
2018-01-26 03:12:53 +03:00
var req = digest . request ( { protocol : settings . protocol , method : "GET" , host : settings . hostname , path : ( "/amt-storage/" + name ) , port : settings . localport } ) ;
2017-12-13 03:04:54 +03:00
req . on ( 'error' , function ( e ) { console . log ( "Verify error occured: " + JSON . stringify ( e ) ) ; if ( func != null ) { func ( null ) ; } } ) ;
2018-01-26 03:12:53 +03:00
req . on ( 'response' , function ( response ) {
response . ptr = 0 ;
response . ok = true ;
2018-01-27 04:01:38 +03:00
response . on ( 'data' , function ( data2 ) { if ( data2 . toString ( 'hex' ) != data . slice ( response . ptr , response . ptr + data2 . length ) . toString ( 'hex' ) ) { response . ok = false ; console . log ( 'Verifiy failed (' + response . ptr + ', ' + data2 . length + ').' ) ; } response . ptr += data2 . length ; } ) ;
2018-01-26 03:12:53 +03:00
response . on ( 'end' , function ( ) { if ( func != null ) { func ( response . ok ) ; } } ) ;
} ) ;
2017-12-13 03:04:54 +03:00
req . end ( ) ;
}
// Fetch the Intel AMT storage document
function deleteStorage ( name , func , noretry ) {
2018-01-26 03:12:53 +03:00
var req = digest . request ( { protocol : settings . protocol , method : "DELETE" , host : settings . hostname , path : "/amt-storage/" + name , port : settings . localport } ) ;
2017-12-13 03:04:54 +03:00
req . on ( 'error' , function ( e ) { if ( ( e == 'Error: Socket was unexpectedly closed' ) && ( noretry != true ) ) { deleteStorage ( name , func , true ) ; } else { if ( func != null ) { if ( e . statusCode ) { func ( e . statusCode ) ; } else { func ( null ) ; } } } } ) ;
2018-01-26 03:12:53 +03:00
req . on ( 'response' , function ( response ) { if ( func != null ) { func ( response . statusCode ) ; } } ) ;
2017-12-13 03:04:54 +03:00
req . end ( ) ;
}
2018-01-31 05:23:57 +03:00
// Run MeshCmd
2018-01-26 03:28:52 +03:00
try { run ( process . argv ) ; } catch ( e ) { console . log ( 'ERROR: ' + e ) ; }